interinternanational jtional jourournal ofnal of r recent ... · 8. ahmed amara konate heping pan,...
TRANSCRIPT
ISSN : 2277 - 3878Website: www.ijrte.org
Technology and EngineeringTechnology and EngineeringInternational Journal of Recent International Journal of Recent
Volume-9 Issue-3, SEPTEMBER 2020
Blue Eyes Intelligence Engineering and Sciences Publication
Published by:
d E na n g y i n g e o e l r o i n n h g c e T t n e c e R I n f to e l r n a n a r t i u o o n J l a
IJRTE
Exploring Innovation
www.ijrte.org
EXPLORING INNO
VATION
NGI &R
E
SE
C
N
I
I
E
G
N
N
C
E
E
S
E
C
P
N
U
E
B
G
L
I
I
L
C
L
A
E
T
T
I
N
O
I
N
S
EY E E
ULB
NGI &R
E
SE
C
N
I
I
E
G
N
N
C
E
E
S
E
C
P
N
U
E
B
G
L
I
I
L
C
L
A
E
T
T
I
N
O
I
N
S
EY E E
ULB
NGI &R
E
SE
C
N
I
I
E
G
N
N
C
E
E
S
E
C
P
N
U
E
B
G
L
I
I
L
C
L
A
E
T
T
I
N
O
I
N
S
EY E E
ULB
NGI &R
E
SE
C
N
I
I
E
G
N
N
C
E
E
S
E
C
P
N
U
E
B
G
L
I
I
L
C
L
A
E
T
T
I
N
O
I
N
S
EY E E
ULB
NGI &R
E
SE
C
N
I
I
E
G
N
N
C
E
E
S
E
C
P
N
U
E
B
G
L
I
I
L
C
L
A
E
T
T
I
N
O
I
N
S
EY E E
ULB
NGI &R
E
SE
C
N
I
I
E
G
N
N
C
E
E
S
E
C
P
N
U
E
B
G
L
I
I
L
C
L
A
E
T
T
I
N
O
I
N
S
EY E E
ULB
Editor-In-Chief Dr. Shiv Kumar
Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE, Member of the Elsevier Advisory Panel
CEO, Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP), Bhopal (MP), India
Associate Editor-In-Chief Dr. Takialddin Al Smadi
Professor, Department of Communication and Electronics, Jerash Universtiy, Jerash, Jordan
Dr. Vo Quang Minh
Senior Lecturer and Head, Department of Land Resources, College of Environment and Natural Resources (CENRes), Can Tho City,
Vietnam.
Dr. Stamatis Papadakis
Lecturer, Department of Preschool Education, University of Crete, Greece.
Dr. Ali OTHMAN Al Janaby
Lecturer, Department of Communications Engineering, College of Electronics Engineering University of Ninevah, Iraq.
Dr. Rabiul Ahasan
Professor, Department of Industrial Engineering, King Saud University, Saudi Arabia.
Dr. Hakimjon Zaynidinov
Professor and Head, Department of Computer Science, Tashkent University of Information Technologies, Uzbekistan.
Prof. MPS Chawla
Ex-Chairman, IEEE MP Sub-Section, India, Professor-Incharge (head)-Library, Associate Professor in Electrical Engineering, G.S.
Institute of Technology & Science Indore, Madhya Pradesh, India.
Associate Editor-In-Chief Members Dr. Anil Kumar Yadav
Ph.D(ME), ME(ME), BE(ME)
Professor, Department of Mechanical Engineering, LNCT Group of Colleges, Bhopal (M.P.), India
Dr. Gamal Abd El-Nasser Ahmed Mohamed Said
Ph.D(CSE), MS(CSE), BSc(EE)
Department of Computer and Information Technology , Port Training Institute, Arab Academy for Science, Technology and Maritime
Transport, Egypt.
Dr. Ahmed Daabo
Lecturer and Researcher, Department of Mining Engineering, University of Mosul, Iraq
Dr. Carlo H. Godoy Jr
Professor, Department of Support, Human Edge Software Philippines, Philippines
Dr. Morteza Pakdaman
Assistant Professor, Department of CRI, Climatology of Atmospheric Disasters Research Group, Climatological Research Institute
(CRI), Mashhad, Iran.
Scientific Editors Dr. Fadiya Samson Oluwaseun
Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern
Cyprus, Turkey.
Dr. Robert Brian Smith
International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie
Centre, North Ryde, New South Wales, Australia
Dr. Durgesh Mishra
Professor (CSE) and Director, Microsoft Innovation Centre, Sri Aurobindo Institute of Technology, Indore, Madhya Pradesh India
Dr. Vinod Kumar Singh
Associate Professor and Head, Department of Electrical Engineering, S.R.Group of Institutions, Jhansi (U.P.), India
Dr. Rachana Dubey
Ph.D.(CSE), MTech(CSE), B.E(CSE)
Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal
(M.P.), India
Executive Editor Chair Dr. Deepak Garg
Professor, Department of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India
Members of Executive Editor Chair Dr. Vahid Nourani
Professor, Faculty of Civil Engineering, University of Tabriz, Iran.
Dr. Saber Mohamed Abd-Allah
Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.
Dr. Xiaoguang Yue
Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.
Dr. Sunandan Bhunia
Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia
(Bengal), India.
Dr. Awatif Mohammed Ali Elsiddieg
Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,
Saudi Arabia.
Technical Program Committee Dr. Mohd. Nazri Ismail
Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.
Technical Program Committee Members Dr. Wilson Udo Udofia
Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.
Dr. Ch. Ravi Kumar
Dean and Professor, Department of Electronics and Communication Engineering, Prakasam Engineering College, Kandukur (Andhra
Pradesh), India.
Dr. Sanjay Pande MB
FIE Dip. CSE., B.E, CSE., M.Tech.(BMI), Ph.D.,MBA (HR)
Professor, Department of Computer Science and Engineering, G M Institute of Technology, Visvesvaraya Technological University
Belgaum (Karnataka), India.
Dr. Hany Elazab
Assistant Professor and Program Director, Faculty of Engineering, Department of Chemical Engineering, British University, Egypt.
Dr. M.Varatha Vijayan
Principal, Department of Mechanical Engineering, Mother Terasa College of Engineering and Technology, Pudukkottai (Tamil Nadu)
India.
Dr. S. Balamurugan
Director, Research and Development, Intelligent Research Consultancy Services (IRCS), Coimbatore (Tamil Nadu), India.
Dr. Rajalakshmi Rahul
FIE Dip. CSE., B.E, CSE., M.Tech.(BMI), Ph.D.,MBA (HR)
Founder and CEO Talaash Research Consultants, Chennai (Tamil Nadu), India.
Reviewer Chair Dr. Arun Murlidhar Ingle
Director, Padmashree Dr. Vithalrao Vikhe Patil Foundation’s Institute of Business Management and Rural Development, Ahmednagar
(Maharashtra) India.
Members of Reviewer Chair Dr. S. A. Mohan Krishna
Associate Professor, Department of Information Science and Engineering, Vidyavardhaka College of Engineering, Mysuru
(Karnataka), India
Dr. Ashok Koujalagi
Assistant Professor & Postdoctoral Researcher, Department of Computer Science, Basaveshwar Science College, Bagalkot
(Karnataka), India
Dr. A. Baradeswaran
Principal, Department of Electronics & Communication Engineering, Madha Engineering College, Chennai (Tamil Nadu), India
Dr. R. Padma Priya
Professor, Department of Electronics & Communication Engineering, Madha Engineering College, Chennai (Tamil Nadu), India
Dr. Raghunath Satpathy
Assistant Professor, Department of Biotechnology, Majhighariani Institute of Technology and Science, Odisha, India
Dr. Hema Chandran K.
Professor & HOD, Department of Electronics & Communication Engineering, Ashoka Institute of Engineering and Technology,
Hyderabad (Telangana), India
Dr. M. Rakesh
Assistant Professor, Department of Electronics and Communication Engineering, Vignan’s Institute of Management and Technology
for Women, Ghatkeser (Hyderabad), India
Dr. Parul Mishra
Assistant Professor, Department of English, GD Goenka University Gurugram, Gurgaon (Haryana), India
Dr. Sunil Kumar Mishra
Associate Professor, Department of Communication Skills (English), Amity University, Gurgaon (Haryana), India
Dr. Kaushik Mukherjee
Faculty of Management Studies, Assistant Professor, AKS University, Satna(MP), India
Dr. Siva Reddy Sheri
Associate Professor, Department of Mathematics, School of Technology Hyderabad Campus, GITAM University, Visakhapatnam
(Andhra Pradesh), India.
Dr. Nitasha Soni
Assistant Professor, Department of Computer Science, Manav Rachna International Institute of Research and Studies, Faridabad
(Haryana), India.
Dr. Pushpender Sarao
Professor, Department of Computer Science & Engineering, Hyderabad Institute of Technology and Management, Hyderabad
(Telangana), India.
Dr. K. Priya
Professor & Head, Department of Commerce, Vivekanandha College of Arts & Sciences for Women (Autonomous, Elayampalayam,
Namakkal (Tamil Nadu), India.
Dr. Sunil Tekale
Professor, Dean Academics, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Secunderabad
(Telangana), India.
Dr. Brijesh Singh
Senior Yoga Expert and Head, Department of Yoga, Samutakarsha Academy of Yoga, Music & Holistic Living, Prahladnagar,
Ahmedabad (Gujarat), India.
Dr. Vinita Kumar
Department of Physics, Dr. D. Ram D A V Public School, Danapur, Patna(Bihar), India
Dr. Rama Shanker
Professor & Head, Department of Statistics, Eritrea Institute of Technology, Asmara, Eritrea
Dr. Subhash Laxman Gadhave
Professor, Department of Mechanical Engineering, Shri Jagdishprasad Jhabarmal Tibrewala University, (Rajasthan) India.
Dr. Raja Mohammad Latif
Professor, Department of Mathematics and Natural Sciences, University of Alberta Edmonton, Canada.
Dr. S.N. Ramaswamy
Professor, Department of Civil Engineering, Kalasalingam University, (Krishnankoil) India.
S. No
Volume-9 Issue-3, September 2020, ISSN: 2277–3878 (Online)
Published By: Lattice Science Publication
Page No.
1.
Authors: Dattatray Kisan Rajmane, Milind Laxman Waikar
Paper Title: Projection of Temperature and Precipitation using Multiple Linear Regression and Artificial Neural
Network as a Downscaling Methodology for Upper Bhima Basin
Abstract: Study of Climate change effect on water resources is very important for its effective management.
Projection of temperature and precipitation can be performed by using General Circulation Model (GCM)
outputs. GCM can make the projections of climate parameters with different emission scenarios at coarser scale.
However hydrological models require climate parameters at smaller scale Downscaling technique is used for
obtaining small scale climate variables from large scale variables of GCM outputs. In this study downscaling has
been carried out by using Multiple Linear Regression (MLR) and Artificial Neural Network (ANN) techniques.
Performance of MLR and ANN models has been evaluated considering Coefficient of determination value (R2).
It has been observed that ANN performs better against MLR Model, showed the results that rainfall distribution
pattern is varied, in monsoon season rainfall decreases while it increases in post monsoon period. Due to its good
evaluation performance such techniques can be applicable for downscaling purpose
Keywords: Artificial neural network, General Circulation model, Multiple linear regression, Upper Bhima
Basin
References:
1. Climate Change 2007: Synthesis Report (IPCC)
2. IPCC Report 2014.
3. B. C. Hewitson and R.G. Crane, ―Climate downscaling: techniques and application‖, Clim. Res., vol.7, (1996), 85–95. 4. R.L. Wilby, M.L. Wigley, D. Conway, P.D. Jones, B.C. Hewitson, J. Main and D.S. Wilks, ―Statistical downscaling of general
circulation model output: a comparison of methods‖, Water Resour. Res., 34,(1998), 2995–3008.
5. A. J. Askew, ―The influence of climate change and climate variability on the hydrologic regime and water resources‖, IAHS Publication,Vol.168, (1987), pp. 421-430.
6. E.P. Salathe, Jr., P.W. Mote and M.W. Wiley, ―Review of scenario selection and downscaling methods for the assessment of climate
change impacts on hydrology in the United States Pacific Northwest‖, Int. J. Climatol., Vol. 27, (2007), 1611–1621. 7. Rao S. Govindaraju, ―Artificial neural network in hydrology I: Preliminary concepts‖, Journal of Hydrologic Engineering, Vol. 5,
April 2000, 115-123
8. Ahmed Amara Konate Heping Pan, Nasir Khan and Jie Huai Yang, ― Generalized regression and feed forward back propagation neuralnetwork in modelling porosity from Geophysical well logs‖, Journal of Petroleum exploration and production Technology,
Vol.5, (2015), 157-166.
9. David E. Rumelhart, Geoffrey E. Hintont & Ronald J. WilliamsJ. Wang, ―Learning representations by back-propagating errors‖, Nature Publishing Group, Vol.323 (9), 1986, pp 533-536.
10. Government of Maharashtra Hydrology Project II, Water Resources Department, ―Real Time Streamflow Forecasting and Reservoir Operation System for Krishna and Bhima River Basins in Maharashtra‖ (RTSF & ROS), Inception Report, December 2011,
11. Subimal Ghosh, P.P. Mujumdar, ―Statistical Downscaling of GCM simulations to streamflow using relevance vector machine‖,
Advances in Water Resources, Vol 31, July 2007, pp. 132-146 12. K. Pearson, ―Mathematical contributions to the theory of evolution III regression heredity and panmixia. Philos‖. Trans. R Soc. Lond.
Ser., 187, (1896), 253–318.
1-8
2.
Authors: Anicia Coleen S. Reyes, Gem Ryan C. Milan, James Marvin M. Quilaton, Bryant Exel G. Sigue,
Steven Valentino E. Arellano, Kenneth C. Karamihan
Paper Title: SBC-Based Diabetic Retinopathy and Diabetic Macular Edema Classification System using Deep
Convolutional Neural Network
Abstract: This Raspberry Pi Single-Board Computer-Based Diabetic Retinopathy (DR) and Diabetic Macular
Edema (DME) Classification System using Deep Convolutional Neural Network through Inception v3 Transfer
Learning and MATLAB digital image processing paradigm based on International Clinical DR and DME
Disease Severity Scale with Python application, which would capture the image of the retina of diabetic patients
to classify the grade, severity, and types of DR; and the grade of DME without using dilating drops. It would
also display, save, search and print the partial diagnosis that can be done to the patients. Diabetic patients,
endocrinologists and ophthalmologists of one of the medical centers in City of San Pedro, Laguna, Philippines
tested the system. Obtained results indicated that the classification of DR and DME, and its characteristics using
the system were accurate and reliable, which could be an assistive device for endocrinologists and
ophthalmologists.
Keywords: Diabetic retinopathy, diabetic macular edema, deep convolutional neural network, digital image
processing, transfer learning
References:
1. Z. Punthakee, R. Goldenberg, and P. Katz. (2018). Definition, Classification and Diagnosis of Diabetes, Prediabetes and Metabolic
Syndrome. Canadian Journal of Diabetes [Online]. 42(1), pp. S10-S15. Available: https://guidelines.diabetes.ca/docs/cpg/Ch3-Definition-Classification-and-Diagnosis-of-Diabetes-Prediabetes-and-Metabolic-Syndrome.pdf
2. World Health Organization (2016). Diabetes Country Profiles- Philippines [Online]. Available: https://www.who.int/diabetes/country -
profiles/phl_en.pdf?ua=1 3. R. Cheloni, S. A. Gandolfi, C. Signorelli, and A. Odone. (2019). Global prevalence of diabetic retinopathy: protocol for a systematic
review and meta-analysis. BMJ Open [Online]. 9(3), e022188. Available: http://dx.doi.org/10.1136/bmjopen-2018-022188
4. Mayo Clinic (2018). Diabetic Retinopathy [Online]. Available: https://www.mayoclinic.org/diseases-conditions/diabetic-retinopathy/diagnosis-treatment/drc-20371617
5. B. Curry. (2018, July 27). An Introduction to Transfer Learning in Machine Learning [Online]. Available: https://medium.com/kansas-
city -machine-learning-artificial-intelligen/an-introduction-to-transfer-learning-in-machine-learning-7efd104b6026
9-16
6. Mindfire Solutions. (2017, October 3). Python: 7 important Reason Why You Should Use Python [Online]. Available:
https://medium.com/@mindfiresolutions.usa/python-7-important-reasons-why-you-should-use-python-5801a98a0d0b 7. A. M. Azab, J. Toth, L. S. Mihaylova, and M. Arvaneh, ―Signal Processing and Machine Learning for Brain-Machine Interfaces‖, 1st
ed. vol. 114, The Institution of Engineering and Technology, London, United Kingdom, 2018, pp. 81-101.
8. M. D. Abràmoff, Y. Lou, A. Erginay, W. Clarida, R. Amelon, J. C. Folk, and M. Niemeijer. (2016). Improved Automated Detection of
Diabetic Retinopathy on a Publicly Available Dataset Through Integration of Deep Learning. Investigative Ophthalmology & Visual
Science [Online]. 57(13), pp. 5200-5206. Available: https://doi.org/10.1167/iovs.16-19964
9. R. Gargeya, and T. Leng. (2017). Automated Identification of Diabetic Retinopathy Using Deep Learning. Ophthalmology [Online]. 124(7), pp. 962-969. Available: https://doi.org/10.1016/j.ophtha.2017.02.008
10. D. K. Prasad, L. Vibha, and K. P. Venugopal. (2015, December). Early detection of diabetic retinopathy from digital retinal fundus
images. Recent Advances in Intelligent Computational Systems (RAICS) IIEE [Online]. 1(1) pp. 240-245. Available: https://doi.org/10.1109/RAICS.2015.7488421
11. R. Pires, S. Avila, J. Wainer, E. Valle, M. D. Abramoff, and A. Rocha. (2019). A data-driven approach to referable diabetic retinopathy
detection. Artificial Intelligence in Medicine [Online]. 96(1), pp. 93-106. Available: https://doi.org/10.1016/j.artmed.2019.03.009 12. S. Wan, Y. Liang, and Y. Zhang. (2018). Deep convolutional neural networks for diabetic retinopathy detection by image classification.
Computers & Electrical Engineering [Online]. 72(1), pp. 274-282. Available: https://doi.org/10.1016/j.compeleceng.2018.07.042
3.
Authors: Sunay Dharwadkar, Sarvesh Harmalkar, Chinmay Nagzarkar, Vivkanand Tendulkar
Paper Title: Surveillance FPV Drone with Obstacle Avoidance System
Abstract: The unmanned air vehicle (UAV) is mostly used in inspection and surveillance operations recent.
The UAV is also termed as vertical take-off landing (VTOL), since it is capable of vertical take-off and landing
without need of a runway. The big tunnels, infrastructure and large bridges are inserted using UAV by
photographic inspection. UAVs are also used for surveillance purposes by the military and by the security
guards. Since this is a new technology of the last decade, deep research has to be done.
UAVS have the cross structure arrangement to which the rotor blades are attached at the end points of cross
beams. These rotors are driven by the DC brush motors and motors are powered by the lithium ion rechargeable
battery. The working principle of quad- rotors is the same as the chopper by controlling the rpm of each rotor
blade, due to which the gyroscopic torque will act and the vehicle will move in the desired direction. To hold the
quad- rotor at a stationary position at some height constant rpm of all rotors has to be maintained. This signal is
given by the controller from some distance, which is received by the, and then it processes the signal and drives
the motor via the flight controller and drives the rotors. A quad- rotor is equipped with a high quality camera for
photography and video shooting during surveillance. Since a quad rotor is manoeuvring in air, the wind may
exert a drag force and take it along with it and the quad rotor may hit any obstacle or inspection objects. To
avoid this, it is equipped with the ultrasonic sensors which is capable of sensing the obstacle and realize collision
avoidance between wall or any object.
Keywords: About four key words or phrases in alphabetical order, separated by commas.
References:
1. Prathamesh Salaskar , Saee Paranjpe , Jagdish Reddy , Arish Shah, ―Quadcopter – Obstacle Detection and Collision Avoidance,‖ in
International Journal of Engineering Trends and Technology (IJETT) – Volume 17 Number 2 – Nov 2014 2. Joseph Azeta1, , Christian Bolu1 , Daniel Hinvi1 and Abiodun A Abioye1, ―Obstacle detection using ultrasonic sensor for a mob ile
robot,‖ in IOP Conf. Series: Materials Science and Engineering 707 (2019) 012012 IOP Publishing doi:10.1088/1757-
899X/707/1/0120124. 3. Muhammad Fazlur Rahman, Rianto Adhy Sasongko, ―Obstacle Avoidance for Quadcopter using Ultrasonic Sensor,‖ in IOP Conf.
Series: Journal of Physics: Conf. Series 1005 (2018) 012037 doi :10.1088/1742-6596/1005/1/012037
4. Marco Claudio De Simone * ID , Zandra Betzabe Rivera and Domenico Guida ―Obstacle Avoidance System for Unmanned Ground Vehicles by Using Ultrasonic Sensors in machines.
5. Kenjiro Niwa, Keigo Watanabe, and Isaku Nagai ―A Detection Method Using Ultrasonic Sensors for Avoiding a Wall Collision of
Quadrotors,‖ in International conference of mechatronics and Aotpmation August 6-9, Takamatsu, japan.
17-20
4.
Authors: Swetharani K, Vara Prasad
Paper Title: Design and Implementation of an Efficient Rose Leaf Disease Detection using K-Nearest Neighbours
Abstract: Plants are prone to different diseases caused by multiple reasons like environmental conditions, light,
bacteria, and fungus. These diseases always have some physical characteristics on the leaves, stems, and fruit,
such as changes in natural appearance, spot, size, etc. Due to similar patterns, distinguishing and identifying
category of plant disease is the most challenging task. Therefore, efficient and flawless mechanisms should be
discovered earlier so that accurate identification and prevention can be performed to avoid several losses of the
entire plant. Therefore, an automated identification system can be a key factor in preventing loss in the
cultivation and maintaining high quality of agriculture products. This paper introduces modeling of rose plant
leaf disease classification technique using feature extraction process and supervised learning mechanism. The
outcome of the proposed study justifies the scope of the proposed system in terms of accuracy towards the
classification of different kind of rose plant disease.
Keywords: Plant Disease, Rose, Machine Learning, KNN, Classification.
References:
1. DeLind, Laura B. "Are local food and the local food movement taking us where we want to go? Or are we hitching our wagons to the wrong stars?." Agriculture and human values, 28, no. 2 (2011): 273-283.
2. Arora, Naveen Kumar. "Agricultural sustainability and food security." (2018): 217-219.
3. Pingali, Prabhu, Anaka Aiyar, Mathew Abraham, and Andaleeb Rahman. "Economic Growth, Agriculture, and Food Systems: Explaining Regional Diversity." In Transforming Food Systems for a Rising India, pp. 15-45. Palgrave Macmillan, Cham, 2019.
21-27
4. Rey, Dolores, Ian P. Holman, and Jerry W. Knox. "Developing drought resilience in irrigated agriculture in the face of increasing water
scarcity." Regional Environmental Change 17, no. 5 (2017): 1527-1540. 5. J. K. Kamble, "Plant Disease Detector," 2018 International Conference On Advances in Communication and Computing Technology
(ICACCT), Sangamner, 2018, pp. 97-101.
6. Rishabh Sinha ―Study on Rose Diseases: Identification, Detection and Cure‖ International Journal of Engineering Development and
Research, 2017
7. Minaee, Saeed & Jafari, Mehrnoosh&Safaie, Naser. (2018). Design and development of a rose plant disease-detection and site-specific
spraying system based on a combination of infrared and visible images. Journal of Agricultural Science and Technology. 20. 23-36. 8. Song, Chorong, Miho Igarashi, Harumi Ikei, and Yoshifumi Miyazaki. "Physiological effects of viewing fresh red
roses." Complementary therapies in medicine 35 (2017): 78-84.
9. https://www.apsnet.org/edcenter/apsnetfeatures/Pages/Roses.aspx 10. Gavhale, Ms& Gawande, Ujwalla. (2014). An Overview of the Research on Plant Leaves Disease detection using Image Processing
Techniques. IOSR Journal of Computer Engineering. 16. 10-16. 10.9790/0661-16151016.
11. Sandhu, Gurleen Kaur, and Rajbir Kaur. "Plant Disease Detection Techniques: A Review." In 2019 International Conference on Automation, Computational and Technology Management (ICACTM), pp. 34-38. IEEE, 2019.
12. Patel, Arpita & Joshi, Barkha. (2017). A Survey on the Plant Leaf Disease Detection Techniques. IJARCCE. 6. 229-231.
10.17148/IJARCCE.2017.6143. 13. Wheeler, Bryan Edward John. "An introduction to plant diseases." An introduction to plant diseases. (1969).
14. Akhtar, Asma, Aasia Khanum, Shoab A. Khan, and Arslan Shaukat. "Automated plant disease analysis (APDA): performance
comparison of machine learning techniques." In 2013 11th International Conference on Frontiers of Information Technology, pp. 60-65. IEEE, 2013.
15. C. G. Dhaware and K. H. Wanjale, "A modern approach for plant leaf disease classification which depends on leaf image processing,"
2017 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, 2017, pp. 1-4. 16. J. N. Reddy, K. Vinod and A. S. RemyaAjai, "Analysis of Classification Algorithms for Plant Leaf Disease Detection," 2019 IEEE
International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, India, 2019, pp. 1-6.
17. U. Shruthi, V. Nagaveni and B. K. Raghavendra, "A Review on Machine Learning Classification Techniques for Plant Disease Detection," 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Coimbatore, India,
2019, pp. 281-284.
18. Kaur, Manpreet, and Rekha Bhatia. "Leaf Disease Detection and Classification: A Comprehensive Survey." In Proceedings of International Conference on IoT Inclusive Life (ICIIL 2019), NITTTR Chandigarh, India, pp. 291-304. Springer, Singapore, 2020.
19. Lu, Yang, Shujuan Yi, Nianyin Zeng, Yurong Liu, and Yong Zhang. "Identification of rice diseases using deep convolutional neural
networks." Neurocomputing 267 (2017): 378-384. 20. R. M. Prakash, G. Saraswathy, G. Ramalakshmi, K. Mangaleswari, and T. Kaviya, ―Detection of leaf diseases and classification using
digital image processing,‖ in Innovations in Information, Embedded and Communication Systems (ICIIECS), 2017 International
Conference on. IEEE, 2017, pp. 1–4. 21. Dhingra, Gittaly, Vinay Kumar, and Hem Dutt Joshi. "A novel computer vision based neutrosophic approach for leaf disease
identification and classification." Measurement 135 (2019): 782-794.
22. V. Pooja, R. Das, and V. Kanchana, ―Identification of plant leaf diseases using image processing techniques,‖ in Technological Innovations in ICT for Agriculture and Rural Development (TIAR), 2017 IEEE. IEEE, 2017, pp. 130–133.
23. Nidhis, A. D., Chandrapati Naga Venkata Pardhu, K. Charishma Reddy, and K. Deepa. "Cluster Based Paddy Leaf Disease Detection, Classification and Diagnosis in Crop Health Monitoring Unit." In Computer Aided Intervention and Diagnostics in Clinical and
Medical Images, pp. 281-291. Springer, Cham, 2019.
24. P. B. Padol and A. A. Yadav, ―Svm classifier based grape leaf disease detection,‖ in Advances in Signal Processing (CASP), Conference on. IEEE, 2016, pp. 175–179.
25. Pooja Kulinavar, Vidya I. Hadimani, ―Classification of leaf diseases based on multiclass SVM classifier,‖ International Journal of
Advance Research, Ideas and Innovations in Technology, Vol.3, Issue.4, pp321-325, 2017 26. Islam, Taohidul, Manish Sah, SudiptoBaral, and Rudra RoyChoudhury. "A Faster Technique on Rice Disease Detectionusing Image
Processing of Affected Area in Agro-Field." In 2018 Second International Conference on Inventive Communication and
Computational Technologies (ICICCT), pp. 62-66. IEEE, 2018. 27. Santos Ferreira, Alessandro, Daniel Matte Freitas, Gercina Gonçalves da Silva, HemersonPistori, and Marcelo TheophiloFolhes.
"Weed detection in soybean crops using ConvNets." Computers and Electronics in Agriculture 143 (2017): 314-324.
28. Prashar, K., Dr. Rajneesh Talwar, Dr.Chander Kant, ―Robust Automatic Cotton Crop Disease Recognition (ACDR) Method using the Hybrid Feature Descriptor with SVM‖. 4th International Conference on Computing on sustainable Global Development, March, 2017.
5.
Authors: Wageda Alsobky, Hala Saeed, Ali N.Elwakeil
Paper Title: Different Types of Attacks on Block Ciphers
Abstract: Cryptanalysis is a very important challenge that faces cryptographers. It has several types that should
be well studied by cryptographers to be able to design cryptosystem more secure and able to resist any type of
attacks. This paper introduces six types of attacks: Linear, Differential , Linear-Differential, Truncated
differential Impossible differential attack and Algebraic attacks. In this paper, algebraic attack is used to
formulate the substitution box(S-box) of a block cipher to system of nonlinear equations and solve this system
by using a classical method called Bases . By Solving these equations, we made algebraic attack on S-box.
Keywords: Linear attack; Differential attack; Algebraic attack; S-box; Bases
References:
1. Christof Paar · Jan Pelzl2009Understanding Cryptography: A Textbook for Students and PractitionersSpringer Heidelberg Dordrecht
London New York.
2. William Stallings2011Cryptography and network security : principles and practiceFifth edition. Boston Prentice Hall.
3. Blondeau, C., & Gérard, B. (2009, May). On the data complexity of statistical attacks against block ciphers. In Workshop on coding
and cryptography-wcc (Vol. 2009, pp. 469-488).
4. Weinmann, R. P. (2009). Algebraic methods in block cipher cryptanalysis (Doctoral dissertation, Technische Universität). 5. The Laws of Cryptography with Java Code2003Available online at Neal Wagner's home page1-334
6. Analysis of Development of Dynamic S-Box Generation2017Computer Science and Information Technology154-163
7. Cryptographic analysis of all 4 × 4-bit S-boxes2012Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)118-133
8. Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber
Security and Mobility, 4(1), 65-88. 9. Lai, X., Massey, J. L., & Murphy, S. (1991, April). Markov ciphers and differential cryptanalysis. In Workshop on the Theory and
Application of of Cryptographic Techniques (pp. 17-38). Springer, Berlin, Heidelberg.
28-31
10. Matsui, M. (1993, May). Linear cryptanalysis method for DES cipher. In Workshop on the Theory and Application of Cryptographic
Techniques (pp. 386-397). Springer, Berlin, Heidelberg. 11. Langford, S. K., & Hellman, M. E. (1994, August). Differential-linear cryptanalysis. In Annual International Cryptology
Conference (pp. 17-25). Springer, Berlin, Heidelberg.
12. Lee, S., Hong, S., Lee, S., Lim, J., & Yoon, S. (2001, December). Truncated differential cryptanalysis of Camellia. In International
Conference on Information Security and Cryptology (pp. 32-38). Springer, Berlin, Heidelberg.
13. Kim, J., Hong, S., Sung, J., Lee, S., Lim, J., & Sung, S. (2003, December). Impossible differential cryptanalysis for block cipher
structures. In International Conference on Cryptology in India (pp. 82-96). Springer, Berlin, Heidelberg. 14. Bard, G. (2009). Algebraic cryptanalysis. Springer Science & Business Media.
15. Improved rijndael-like S-box and its transform domain analysis2006Lecture Notes in Computer Science including subseries Lecture
Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)153-167 16. Evaluating algebraic attacks on the AES2003Diplom thesis, Technische
17. Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath20151-
21 18. Resistance of S-boxes against algebraic attacks2004Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics)83-93
19. Gröbner bases, Gaussian elimination and resolution of systems of algebraic equations1983Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)146-156
20. An introduction to Gröbner bases1994American Mathematical Soc.
21. ―Algebraic Construction of Powerful Substitution‖ International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277 3878, Volume-8 Issue-6, March 2020.
22. -―Performance Analysis of Advanced Encryption Standard (AES) S-boxes ―International Journal of Recent Technology and
Engineering (IJRTE) ISSN: 2277-3878, Volume-9 Issue-1, May 2020. 23. ‖A Review of Advanced Encryption Standard (AES) Performance‖ Benha Journal of Engineering Science and Technology (BJEST)
ISSN: 2357-0105, Volume-1 Issue-1, July 2018
6.
Authors: Mukhitdinova Firyuza Abdurashidovna, Mukhamedov Хaidarali Mеlievich
Paper Title: Improving the Legal Framework and Social Policy in the Context of a Pandemic
Abstract: The article examines the essence of social policy in the field of support in the context of a
pandemic. The analysis of the situation in the social sphere and its structural components in the Republic of
Uzbekistan in the context of the pandemic is given. It is proposed to improve the legislative framework for
improving social protection and living standards of the country's population, as well as to modernize the system
of state guarantees in the social sphere.
Keywords: law. the right to the protection of social sphere, social policy, situation, employment, strategy,
development)
References:
1. Constitution Of The Republic Of Uzbekistan. T. 2018, Uzbekistan, C 2. 2. European Convention for the protection of rights and fundamental freedoms (1950)\
3. 3. Decree of the President of the Republic of Uzbekistan no. PP-3839 dated July 5, 2018 "on measures to further improve labor
migration abroad» 4. 4. Decree of the President of the Republic of Uzbekistan dated December 10, 2018 no. PP-4056 "on improving the activities of the
National center for human rights of the Republic of Uzbekistan".
5. 5. Decree of the President of the Republic of Uzbekistan on January 9, 2019 "on radical improvement of the system of raising legal awareness and legal culture in society»
6. 6. Resolution of the President of the Republic of Uzbekistan" on additional measures to strengthen the social protection of orphans and
children left without parental care " dated February 11, 2019 7. 7. Decree of the President of the Republic of Uzbekistan dated April 23, 2019 "on additional measures to further strengthen guarantees
of the rights of the child»
8. 8. Labor Code of Uzbekistan. Leх. UzM. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.
32-35
7.
Authors: Jolan Baccay Sy, Marlon Gan Rojo, Eunelfa Regie Calibara, Alain Vincent Comendador, Wubishet
Degife
Paper Title: Multi-Station Automated Hand Washing System (MSAHWS)
Abstract: The paper presents a design and development of a multi-station automated hand-washing system
(MSAHWS) that could be integrated into overall solution strategies for combating the threat of SARS-Cov-2
infections and minimizing the health and economic devastation the virus spread can inflict. The researchers seek
to create a system that uses a single micro-controller and caters to several users, each of them being served
independently of each other. The MSAHWS development follows a four-part methodology: formulation of the
sanitary, operational, manufacturing and economic requirements; design, modeling, and simulation of the micro-
controller-based control system; MSAHWS hardware prototype development; and system test and data
collection. The MSAHWS design and development focuses on a double-station system that uses a single
Arduino Uno, an ultrasonic sensor for each station, 4 FET‘s, 4 liquid pumps, a water tank, a soap reservoir, a
power supply and a frame to house the system. The non-contact system eliminates possible viral
transmission from one person to another via the hand washing machine yet ensures the required cleanliness of
the hands. The system is first simulated in PROTEUS to test its functionality and responses based on the
demanded or required criteria. A prototype is then built to test and verify the system‘s actual operation and
responses and thence to make the necessary adjustment of parameters to realize an acceptable performance level.
Tests show that all the requirements are met. Photos of the built and tested prototype, a diagram of the initial
system design concept, a screen capture of the control system software model, a schematic diagram of the
control system, a sketch with dimensions of the hand washing machine frame or housing, and the flowchart on
which the Arduino script is developed. The operation and user-interaction of the actual system is also described.
The control system program is written such that the resulting hand washing activity complies with the WHO
36-43
standard on hand washing duration and makes entirely possible a complete and hygienic hand washing activity
with soap and water. The system is envisioned for strategic deployment in public and private areas like public
markets, banks, hospitals, schools, offices, residences, and many others. The paper has shown that it is possible
to control multiple hand washing stations, each acting independently of each other, using a single micro-
controller and a proper control system programming.
Keywords: Arduino Automated System, Covid19, Handwashing, Hygiene, Proteus.
References:
1. worldometer 2020, COVID-19 CORONAVIRUS PANDEMIC, worldometer, 22 July 2020, <https://www.worldometers.info/coronavirus/ >
2. 2.worldometer 2020, WORLD / COUNTRIES / ETHIOPIA, worldometer, 22 July 2020, <https://www.worldometers.info/coronavirus/country/ethiopia/ >
3. 3.OECD 2020, COVID-19 and Africa: Socio-economic implications and policy responses, OECD, 22 July2020,
<https://www.oecd.org/coronavirus/policy-responses/covid-19-and-africa-socio-economic-implications-and-policy-responses-96e1b282/#section-d1e1646 >
4. Wikipedia 2020, COVID-19 vaccine, Wikipedia, 22 July2020,<https://en.wikipedia.org/wiki/COVID -
19_vaccine#Compressed_timelines > 5. 5.Wikipedia 2020, Hand washing, Wikipedia, 22 July2020, <https://en.wikipedia.org/wiki/Hand_ washing >
6. 6.WHO 2020, Clean Care is Safer Care, WHO, 22 July2020, <https://www.who.int/gpsc/clean_hands_ protection/en/ >
7. Hurriyatul fitriyah,Edita Rosana Widasari,Eko Setiawan, and Brian Angga kusuma ―Interaction Design of Automatic Faucet for Standard Hand-Wash‖ renew. Energy, matec web of conferences 154, 03003 (2018) icet4sd 2017
8. Swayam pragyan parida1, vikas bhatia2 "handwashing: a household social vaccine against covid 19 and multiple communicable
diseases" international journal of research in medical sciences parida sp et al. Int j res med sci. 2020 jul;8(7): www.msjonline.org pissn 2320-6071 | eissn 2320-6012
9. Michael brauer1,2, jeff t zhao1 , fiona b bennitt1 , jeffrey d stanaway1 global access to handwashing: implications for covid-19 control
in low-income countries"https://doi.org/10.1101/2020.04.07.20057117. 10. Sadru walji, shazia tanvir,marc aucoin, william a. Anderson" testing the effect of faucet flowrate on handwashing efficacy"
t:https://www.researchgate.net/publication/338921497
11. Thi sin , tran thi thu ngoc vo2,3, tran thi bich chau vo4. id" handwashing in against of coronavirus disease 2019 infection" j res clin med, 2020, 8: 19 doi: 10.34172/jrcm.2020.019 https://jrcm.tbzmed.ac.ir
12. Marta mazzotta 1, luna girolamini 1, maria rosaria pascale 1, jessica lizzadro 1, silvano salaris 1, ada dormi 2 and sandra cristino 1,"
the role of sensor‐activated faucets in surgical handwashing environment as a reservoir of legionella" pathogens 2020, 9, 446
8.
Authors: Ajendra Kumar, Preet Pal Singh, Dipa Sharma, Pawan Joshi
Paper Title: Utilization of Grid Neural Network Model and RT-PCR test to detect the COVID-19 Patients and to
avoid the Spreading of SARS-CoV-2
Abstract: In December 2019, a new virus, also named a novel coronavirus, started as an emerging pathogen
for humans and resulted in a pandemic. World Health Organization (WHO) called this novel coronavirus as
COVID-19 on 11 February 2020, and the virus responsible for causing COVID-19 is SARS-CoV-2 (severe acute
respiratory syndrome coronavirus 2), which is a positive-stranded RNA virus. This paper proposed an artificial
neural network model in a grid computing system to identify COVID-19 patients. It can help us to identify the
suspected patients and shortlist those patients who need to check by the RT-PCR test kit. The purpose of this
research is to increase the time efficiency to test those patients, which has a higher chance of getting affected by
COVID-19. Increasing the time efficiency in this type of pandemic situation can make a huge impact on
reducing the fatality rate. This is because, according to ICMR, 1,191,946 samples have been tested as of 5 May,
and 46,433 individuals have been confirmed positive. It means that only 3.85% of persons get positive results
and 96.15% persons with a negative result. It implies that the time to test this 96.15% of cases is wasted. Hence
we aim to detect the COVID-19 patients in less time and utilize this large amount of time to test those at higher
risk of being affected by this epidemic (COVID-19). This model will also help those countries to overcome the
problem of the shortage of this type of test kits such as - RT-PCR.
Keywords: Artificial Neural Network (ANN), Grid Computing, SARS-CoV-2, Reverse Transcription
Polymerase Chain Reaction (RT-PCR) test.
References:
1. Bansal, M.: Cardiovascular disease and COVID-19. Diabetes & Metabolic Syndrome: Clinical Research & Reviews, 14(3), pp.247-
250. (2020). https://doi.org/10.1016/j.dsx.2020.03.013.
2. Chan, K., Zheng, J., Mok, Y., LI, Y., Liu, Y., Chu, C. and Ip, M.: SARS: prognosis, outcome and sequelae. Respirology, 8(s1), pp.S36-S40. (2003). https://doi.org/10.1046/j.1440-1843.2003.00522.x
3. Choi, B., Madusanka, N., et.al: Convolutional Neural Network-based MR Image Analysis for Alzheimer‘s Disease
Classification. Current Medical Imaging Formerly Current Medical Imaging Reviews, 16(1), pp.27-35. (2020). DOI: 10.2174/1573405615666191021123854.
4. Czajkowski, K., Fitzgerald, S., Foster, I. and Kesselman, C., n.d. Grid information services for distributed resource
sharing. Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.
5. Das, A., Rad, P., Choo, K., Nouhi, B., Lish, J. and Martel, J.: Distributed machine learning cloud teleophthalmology IoT for predicting
AMD disease progression. Future Generation Computer Systems, 93, pp.486-498, (2019).
6. Driggin, E., Madhavan, M., Bikdeli, B., et.al: Cardiovascular Considerations for Patients, Health Care Workers, and Health Systems During the COVID-19 Pandemic. Journal of the American College of Cardiology, 75(18), pp.2352-2371, (2020).
7. Gentile, S., Strollo, F. and Ceriello, A.: COVID-19 infection in Italian people with diabetes: Lessons learned for our future (an
experience to be used). Diabetes Research and Clinical Practice, 162, (2020). https://doi.org/10.1016/j.diabres.2020.108137. 8. Guan, W., Liang, W., Zhao, Y., et.al: Comorbidity and its impact on 1590 patients with COVID-19 in China: a nationwide
analysis. European Respiratory Journal, 55(5), (2020). https://doi.org/10.1183/13993003.00547-2020. 9. Guan, W., Ni, Z., Hu, Y., et.al: Clinical characteristics of 2019 novel coronavirus infection in China. The New England Journal of
Medicine. (2020). https://doi.org/10.1101/2020.02.06.20020974.
10. Han, C., Youn, C. and Jung, W.: Web-Based System for Advanced Heart Disease Identification Using Grid Computing Technology. 2008 21st IEEE International Symposium on Computer-Based Medical Systems. (2008).
44-50
11. Huang, C. and Wang, Y., et.al: Clinical Features of Patients Infected with 2019 Novel Coronavirus in Wuhan, China. (2020). [online]
Available at: https://doi.org/10.1016/ S0140-6736(20)30183-5. Accessed 27 May 2020. 12. Indian Council of Medical Research, New Delhi (2020). [online] Icmr.gov.in. Available at: https://www.icmr.gov.in/. Accessed 27
May 2020.
13. Landman, A., Feetham, L. and Stuckey, D., (2020). Cancer patients in SARS-CoV-2 infection: a nationwide analysis in China. The
Lancet Oncology, [online] 21(3). Available at: https://doi.org/10.1016/ S1470-2045(20)30096-6. Accessed 27 May 2020.
14. Li, B., Yang, J., Zhao, F. et al: Prevalence and impact of cardiovascular metabolic diseases on COVID-19 in China. Clinical Research
in Cardiology, 109, 531–538. (2020). https://doi.org/10.1007/s00392-020-01626-9. 15. Liu K., fang Y.Y., et.al: Clinical characteristics of novel coronavirus cases in tertiary hospitals in Hubei Province. Chinese Medical
Journal. (2020). https://doi.org/10.1097/CM9.0000000000000744.
16. Meng J., Guohui X., et.al: Renin-angiotensin system inhibitors improve the clinical outcomes of COVID 19 patients with hypertension. Emerging Microbes and Infections, 9(1), 757-760. (2020).
17. Nasser I.M., Al-Shawwa M.O, Abu-Naser S.S: Artificial Neural Network for Diagnose Autism Spectrum Disorder. International
Journal of Academic Information Systems Research (IJAISR), 3(2), 27-32. (2019). 18. National Foundation for Infectious Diseases. 2020. Coronaviruses. [online] Available at: https://www.nfid.org/infectious-
diseases/coronaviruses/. Accessed 27 May 2020.
19. Park S.C., Tan J., et.al: Computer-aided detection of early interstitial lung diseases using low-dose CT images. Physics in Medicine and Biology, 56(4), 1139–1153. (2011).
20. Shah D., Dixit R., Shah A., Shah P., Shah M.: A Comprehensive Analysis Regarding Several Breakthroughs Based on Computer
Intelligence Targeting Various syndromes. Augmented Human Research, 5(14), (2020). https://doi.org/10.1007/s41133-020-00033-z. 21. Singh. A. K., Gupta. R., Misra. A.: Co-morbidities in Covid-19: Outcomes in hypertensive cohort and controversies with angiotensin
system blockers. Diabetes & Metabolic Syndrome: Clinical Research & Review, 14(4), 283-287. (2020).
https://doi.org/10.1016/j.dsx.2020.03.016 22. Sirois S., Wei D.Q., Du Q., Chou K.C.: Virtual Screening for SARS-CoV Protease Based on KZ7088 Pharmacophore points.
J.Chem.Inf.Comput.Sci, 44, 1111-1122. (2004). https://doi.org/10.1021/ci034270n.
23. South. A. M., Diz. D. I., Chappell. M. C.: COVID-19, ACE2, and the cardiovascular consequences. American journal of Physiology, 318(5). H1084-H1090. (2020). https://doi.org/10.1152/ajpheart.00217.2020.
24. Wang D., Hu B., et.al: Clinical Characteristics of 138 Hospitalized patients With 2019 Novel Coronavirus-Infected Pneumonia in
Wuhan, China. JAMA, 323(11). (2020). 1061-1069. doi:10.1001/jama.2020.1585. 25. Zhang P., Zhu L., et.al: Association of Inpatients Use of Angiotensin Converting Enzyme Inhibitors and Angiotensin II Receptor
Blockers with Mortality among Patients with Hypertension Hospitalized with COVID-19. Circulation Research. (2020).
https://doi.org/10.1161/CIRCRESAHA.120.317134. 26. Zhu. N., Zhang. D., Wang. W., et.al: A Novel Coronavirus from Patients with Pneumonia in China, 2019. The New England Journal of
Medicine, (2020). DOI: 10.1056/NEJMoa2001017.
9.
Authors: Ajijur Rahman, Shanowaj Choudury
Paper Title: Abstraction, the Big Idea, and it’s Significance in Science and Technology Education
Abstract: this paper discusses the role of abstraction in science and technology education. It starts with a
humble introduction of abstraction in general, while discussing the first few encounters of a learner with this
idea. Significance of abstraction and the required motivation level of learner are also discussed. An expected
change in the attitude of a learner at transition to higher studies is proposed. Thereafter the contribution of
abstraction in the evolution of Computer Science and Engineering is discussed in some detail. Moreover a
deduction of the Computer Science Curriculum is also shown along the same line as its evolution. Finally the
paper concludes with emphasizing the importance of understanding links between different layers of
abstractions.
Keywords: abstraction, computer science, learner, link
References:
1. B. P. Lathi, ―Signal Processing and Linear System,‖ 2nd Ed, Oxford university Press.
2. H. S. Hall, S. R. Knight, ―Elementary Algebra for Schools‖, Cambridge University Press.
3. P. J. Nahin, ―An Imaginary Tale: The story of i,‖ Princeton University Press. 4. Harry R. Lewis, Christos H. Papadimitriou, ―Elements of the Theory of Computation‖, Second Edition, Prentice Hall.
5. Morris Mano, ―Digital Design‖, PHI.
6. R. C Gonzalez & Woods, ―Digital Image Processing‖, Prentice Hall. 7. Davis Martin, ―Engines of Logic-mathematicians and origin of computers‖.
8. Anant Agarwal, Jeffrey H. Lang, ―Foundation of Analog and Digital Electronics,‖ Elsevier.
9. H. S. Hornby, ―Oxford Advanced learner Dictionary‖.
51-54
10.
Authors: P. Ramakrishna, T. Vamshika, M. Swathi
Paper Title: Fpga Implementation of Memory Bists using Single Interface
Abstract: The development of IC integration technologies leads to an extensive use of memories and buffers
in different memory intensive applications. Therefore, probability of occurrence of fault in every single read and
writes operation is increased in Memory BIST (MBIST). There were many testing approaches that were
developed for efficient testing and diagnosis of fault. However, all algorithms are not strengthened enough to
detect all possible faults that may be present due to fabrication errors or environmental disturbance. Keeping this
in mind and taking the possibility of development of efficient algorithm a hybrid memory testing algorithm is
presented. To overcome those drawbacks, pipelining based MBIST designed to detect the all the types of
memory faults by utilizing March-C testing algorithm. By introducing the Pipelining approach, majorly path
delays are reducing. The proposed architecture designed and verified using Xilinx ISE environment under
various testing methods with respect to the different category of memories. The simulation and synthesis results
shows that the proposed method shows the enhanced performance with the hardware resource utilization and
delay consumption compared to the conventional approaches.
55-58
Keywords: DFT, MBIST, PRPG, RAM, SOC, VLSI
References:
1. Ogasahara, Yasuhiro, et al. "Implementation of pseudo-linear feedback shift register-based physical unclonable functions on silicon
and sufficient Challenge–Response pair acquisition using Built-In Self-Test before shipping." Integration 71 (2020): 144-153.
2. LIANG, Huaguo, et al. "A novel BIST scheme for circuit aging measurement of aerospace chips." Chinese Journal of Aeronautics 31.7
(2018): 1594-1601. 3. DeMara, R. F., N. Imran, and R. A. Ashraf. "Emerging Resilience Techniques for Embedded Devices." Rugged Embedded Systems:
Computing in Harsh Environments, Elsevier Publishing.
4. Jamal, K., K. Manjunatha Chari, and P. Srihari. "Test pattern generation using thermometer code counter in TPC technique for BIST implementation." Microprocessors and Microsystems 71 (2019): 102890.
5. Kumar, Mahesh. "An Efficient Fault Detection of FPGA and Memory Using Built-in Self Test [BIST]." American Journal of Electrical
and Computer Engineering 3.1 (2019): 38-45. 6. Harutyunyan, Gurgen, Samvel Shoukourian, and Yervant Zorian. "Fault Awareness for Memory BIST Architecture Shaped by
Multidimensional Prediction Mechanism." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 38.3 (2018): 562-575.
7. Lee, Kuen-Jong, Bo-Ren Chen, and Michael Andreas Kochte. "On-chip self-test methodology with all deterministic compressed test
patterns recorded in scan chains." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 38.2 (2018): 309-321.
8. Lee, Sanghoon, et al. "A built-in self-test andin situanalog circuit optimization platform." IEEE Transactions on Circuits and Systems I:
Regular Papers 65.10 (2018): 3445-3458. 9. Moghaddam, Elham, et al. "Logic BIST with capture-per-clock hybrid test points." IEEE Transactions on Computer-Aided Design of
Integrated Circuits and Systems 38.6 (2018): 1028-1041.
10. Efanov, Dmitry V., et al. "Synthesis of Built-in Self-Test Control Circuits Based on the Method of Boolean Complement to Constant-Weight 1-out-of-n Codes." Automatic Control and Computer Sciences 53.6 (2019): 481-491.
11. Balaji, G. Naveen, and S. Chenthur Pandian. "Design of test pattern generator (TPG) by an optimized low power design for testability
(DFT) for scan BIST circuits using transmission gates." Cluster Computing 22.6 (2019): 15231-15244. 12. Moghaddam, Elham, et al. "Logic BIST with capture-per-clock hybrid test points." IEEE Transactions on Computer-Aided Design of
Integrated Circuits and Systems 38.6 (2018): 1028-1041.
13. Cui, Xiaole, et al. "Design and Test of the In-Array Build-In Self-Test Scheme for the Embedded RRAM Array." IEEE Journal of the Electron Devices Society 7 (2019): 1007-1012.
14. Silveira, Reinaldo, Qadeer Qureshi, and Rodrigo Zeli. "Flexible architecture of memory BISTs." 2018 IEE 19th Latin-American Test
Symposium. IEEE, 2018.
11.
Authors: V. V. Mandhare, D. R Pede, P. S. Vikhe
Paper Title: Network Intrusion Detection using a Deep Learning Approach
Abstract: At present situation network communication is at high risk for external and internal attacks due to
large number of applications in various fields. The network traffic can be monitored to determine abnormality
for software or hardware security mechanism in the network using Intrusion Detection System (IDS). As
attackers always change their techniques of attack and find alternative attack methods, IDS must also evolve in
response by adopting more sophisticated methods of detection .The huge growth in the data and the significant
advances in computer hardware technologies resulted in the new studies existence in the deep learning field,
including ID. Deep Learning (DL) is a subgroup of Machine Learning (ML) which is hinged on data description.
The new model based on deep learning is presented in this research work to activate operation of IDS from
modern networks. Model depicts combination of deep learning and machine learning, having capacity of wide
range accurate analysis of traffic network. The new approach proposes non-symmetric deep auto encoder
(NDAE) for learning the features in unsupervised manner. Furthermore, classification model is constructed
using stacked NDAEs for classification. The performance is evaluated using a network intrusion detection
analysis dataset, particularly the WSN Trace dataset. The contribution work is to implement advanced deep
learning algorithm consists IDS use, which are efficient in taking instant measures in order to stop or minimize
the malicious actions.
Keywords: Intrusion Detection System (IDS), Non- Symmetric Deep Auto-Encoder (NDAE), Deep Learning
(DL), WSN Trace, Machine Learning (ML).
References:
1. R. Bace and P. Mell, ―NIST special publication on intrusion detection systems,‖ BOOZ-ALLEN AND HAMILTON INC MCLEAN VA, 2001.
2. A. Lazarevic, V. Kumar, and J. Srivastava, ―Intrusion detection: A survey,‖ in Managing Cyber Threats, Springer, 2005, pp. 19–78.
3. W. Stallings, ―Cryptography and network security principles and practices,‖ USA: Prentice Hall, 2006. 4. M. H. Aghdam and P. Kabiri, ―Feature Selection for Intrusion Detection System Using Ant Colony Optimization,‖ IJ Netw. Secur, vol.
18, no. 3, pp. 420–432, 2016.
5. C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin, ―Intrusion detection by machine learning: A review,‖ Expert Syst. Appl., vol. 36, no. 10, pp. 11994–12000, 2009.
6. B. Dong and X. Wang, ―Comparison deep learning method to traditional methods using for network intrusion detection,‖ in Proc. 8th
IEEE Int. Conf. Commun. Softw. Netw. Beijing, China, Jun. 2016, pp. 581–585.
7. R. Zhao, R. Yan, Z. Chen, K. Mao, P. Wang, and R. X. Gao, ―Deep learning and its applications to machine health monitoring: A
survey,‖ Submitted to IEEE Trans. Neural Netw. Learn. Syst., 2016. [Online]. Available: http://arxiv.org/abs/1612.07640.
8. S. Pouyanfar et al., ―A Survey on Deep Learning: Algorithms, Techniques, and Applications,‖ ACM Comput. Surv. vol. 51, no. 5, p. 92, 2018.
9. Y. LeCun, Y. Bengio, and G. Hinton, ―Deep learning. nature 521 (7553): 436,‖ Google Sch., 2015.
10. N. Shone, T. N. Ngoc, V. D. Phai and Q. Shi, "A Deep Learning Approach to Network Intrusion Detection," in IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 41-50, Feb. 2018.
11. F. Farahnakian and J. Heikkonen, ―A deep auto-encoder based approach for intrusion detection system,‖ in Advanced Communication
Technology (ICACT), 2018 20th International Conference on, 2018, pp. 178–183. 12. N. Gao, L. Gao, Q. Gao, and H. Wang, ―An intrusion detection model based on deep belief networks,‖ in Advanced Cloud and Big
Data (CBD), 2014 Second International Conference on, 2014, pp. 247– 252.
59-64
13. S. Seo, S. Park, and J. Kim, ―Improvement of Network Intrusion Detection Accuracy by Using Restricted Boltzmann Machine,‖ in
Computational Intelligence and Communication Networks (CICN), 2016 8th International Conference on, 2016, pp. 413–417 14. M. A. Salama, H. F. Eid, R. A. Ramadan, A. Darwish, and A.E. Hassanien, ―Hybrid intelligent intrusion detection scheme,‖ in Soft
computing in industrial applications, Springer, 2011, pp. 293–303.
15. Y. Li, R. Ma, and R. Jiao, ―A hybrid malicious code detection method based on deep learning,‖ methods, vol. 9, no. 5, 2015.
16. K. Alrawashdeh and C. Purdy, ―Toward an online anomaly intrusion detection system based on deep learning,‖ in Machine Learning
and Applications (ICMLA), 2016 15th IEEE International Conference on, 2016, pp. 195–200.
17. J. Kim, J. Kim, H. L. T. Thu, and H. Kim, ―Long short term memory recurrent neural network classifier for intrusion detection,‖ in Platform Technology and Service (PlatCon), 2016 International Conference on, 2016, pp. 1–5.
18. C. Yin, Y. Zhu, J. Fei, and X. He, ―A deep learning approach for intrusion detection using recurrent neural networks,‖ IEEE Access,
vol. 5, pp. 21954–21961, 2017. 19. S. Althubiti, W. Nick, J. Mason, X. Yuan, and A. Esterline, ―Applying Long Short-Term Memory Recurrent Neural Network for
Intrusion Detection,‖ in SoutheastCon 2018, 2018, pp. 1–5.
20. T. A. Tang, S. Ali, R. Zaidi, D. Mclernon, L. Mhamdi, and M. Ghogho, ―Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks,‖ in 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), 2018, pp. 25–29.
21. Y. Yao, Y. Wei, F. Gao, and G. Yu, ―Anomaly intrusion detection approach using hybrid MLP/CNN neural network,‖ in Intelligent
Systems Design and Applications, 2006. ISDA‘06. Sixth International Conference on, 2006, vol. 2, pp. 1095–1102. 22. K. Wu, Z. Chen, and W. Li, ―A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks,‖
IEEE Access, vol. 6, pp. 50850–50859, 2018.
23. J. Kim, N. Shin, S. Y. Jo, and S. H. Kim, ―Method of intrusion detection using deep neural network,‖ in Big Data and Smart Computing (BigComp), 2017 IEEE International Conference on, 2017, pp. 313–316.
24. T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, ―Deep learning approach for network intrusion detection in
software defined networking,‖ in Wireless Networks and Mobile Communications (WINCOM), 2016 International Conference on, 2016, pp. 258–263.
25. Revathi, S & Malathi, A. (2013). A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for
Intrusion Detection. International Journal of Engineering Research & Technology (IJERT). 2. 1848-1853. 26. Claude Turner*, Rolston Jeremiah, Dwight Richards, Anthony Joseph, ―A Rule Status Monitoring Algorithm for Rule-Based Intrusion
Detection and Detection Systems‖, Procedia Computer Science, ISSN: 1877-0509, Vol: 95, Page: 361-368, 2016
12.
Authors: Anjani K. Upadhyay, Debasmita Chatterjee, Madhuri Swain, Lopamudra Ray
Paper Title: Evaluation of a Potential Antibacterial, Produced by Streptomyces Cinereoruber Sp. Isolated from
Chlika lake.
Abstract: Streptomyces, isolated from marine and estuarine habitat have been widely recognized as a
potential source of antifungal, anti-tumour, anti-bacterial compounds. In the present study, the antimicrobial
agent production potential of a Streptomyces cinereoruber sp was evaluated. The selective isolation of the strain
was carried out on starch casein agar. The primary screening of the Streptomyces isolate was done by cross
streak method against pathogenic test strains Escherichia.coli MTCC 82, Staphylococcus aureus MTCC 96,
Bacillus cereus IP406 and Salmonella typhi MTCC 734 and Micrococcus leuteus and the antimicrobial property
against Micrococcus leuteus was confirmed. The secondary screening was carried out by using the culture
supernatant against the test strain by agar well diffusion method. The growth and antimicrobial production
ability of the strain against Micrococcus leuteus was studied. The antimicrobial agent production was also
observed till pH 11 and NaCl concentration 3% (w/v). The partially purified compound showed a peak similar to
streptomycin in HPLC. The culture condition for the production of the compound was optimised.
Keywords: Streptomyces, Antibacterial, Optimization
References:
1. Andrews, J. M. 2001. Determination of minimum inhibitory concentrations. J. Antimicrob. Chemother. 48(Suppl. 1):5–16
2. Betina V.1983. The chemistry and biology of antibiotics. Amsterdam: Elsevier Scientific Pub. Co; p. 190.
3. Costanza R, Kemp WM, Boynton WR.1993. Predictability, scale, and biodiversity in coastal and estuarine ecosystems: implications for management. Ambio.1:88-96.
4. de lima procopio, R. E; da silva, I. R; Martins, M.K; de azevedo, J.L & de Araujo, J. M. (2012) Antibitics produced by Streptomyces.
Braz J Infect Dis. 16: 466-471.
5. Goodfellow, M. (1989). The Actinomycetes I. Supragenericclassifcation of actinomycetes. In Bergey's Manual of
SystematicBacteriology, vol. 4, pp. 2333±2339. Edited by S. T. Williams, M. E. Sharpe & J. G. Holt. Baltimore: Williams &Wilkins. 6. Goodfellow, M., Kumar, Y., Labeda, D. P. & Sembiring, L. 2007. The Streptomyces violaceusniger clade: a home for streptomycetes
with rugose ornamented spores. Antonie Van Leeuwenhoek 92,173-99.
7. Gordon, R. E., Barnett, D. A., Handerhan, J. E. and Pang, C. H.N. 1974. Nocardia coeliaca, Nocardia autotrophica, and the nocardin strain. Int J Bacteriol 24, 54-63.
8. Holder, I.A., and Boyce, S. T. 1994. Agar well diffusion assay testing of bacteriak susceptibilitu to various antimicrobials in
concentration non-toxic for human cell in culture. Burns, 20 426-429. 9. Jayapal KP, Lian W, Glod F, Sherman DH, Hu WS. 2007. Comparative genomic hybridizations reveal absence of large Streptomyces
coelicolor genomic islands in Streptomyces lividans. BMC Genomics, 8:229.
10. Kagan IA, Flythe MD. 2014. Thin-layer chromatographic (TLC) separations and bioassays of plant extracts to identify antimicrobial compounds. JoVE. (85).
11. Kampfer, P. & Labeda, D. P. 2006. International Committee on Systematics of Prokaryotes; Subcommittee on the taxonomy of the
Streptomycetaceae: Minutes of the meeting, 25 July 2005, San Francisco, CA, USA. Int J Syst Evol Microbiol 56, 495.
12. Kelly, K.I. 1964. Inter-society color council-national bureau of standard color-name charts illustrated with centroid colors. US
Government Printing Office, Washington. 13. Shirling, E. B. & Gottlieb, D. 1966. Methods for characterization of Str8eptomyces species. Int J Syst Bacteriol 16, 313–340.
14. Srinivas TN, Kumar PA, Sucharitha K, Sasikala C, Ramana CV.2009. Allochromatium phaeobacterium sp. nov. Int J Syst Evol Microbiol. 59:750-3.
15. Sucharita K, Sasikala C, Park SC, Baik KS, Seong CN, Ramana CV.2009. Shewanella chilikensis sp. nov., a moderately alkaliphilic
gammaproteobacterium isolated from a lagoon. International journal of systematic and evolutionary microbiology.59:3111-5. 16. Taddi, A; Rodriguez, H. J.; Marquez-Vilchez; Castelli, C. 2006. Isolation and identification of streptomyces sp. From venezuelan site:
Morphological and biochemical studies. Microbiological Research 161:222-231.
17. Tindall, B. J., Sikorski, J., Smibert, R. M. & Kreig, N. R. 2007. Phenotypic characterization and the principles of comparative systematics. In Methods for General and Molecular Microbiology, 3rd edn, pp. 330–393. Edited by C. A. Reddy, T. J. Beveridge, J. A.
Breznak, G. A. Marzluf, T. M. Schmidt & L. R. Snyder. Washington, DC: American Society for Microbiology.
18. Williams, S.T., Goodfellow, M., Alderson, G., Wellington, E. M. H., Sneath, P. H. A., Sackin, M. J. 1983. Numerical classification of
65-69
Streptomyces and related genera. J. Gen Microbiol 129, 1743-1813.
19. Williams, S.T., Goodfellow, M., & Alderson, G. 1989. Genus Streptomyces Waksman and Henrici 1943. 339 AL. In Bergey’s manual of Sytematic Bacteriology, vol. 4, pp. 2452-2492. Edited by S.T. Williams, M. E. Sharpe & J. G. Holt. Baltimore: Williama &Wikins.
13.
Authors: P.Pitchaipandi, C.Baskaran
Paper Title: Use of Web 2.0 Social Networking Sites for Collaborative Sharing Research Information by the
Social Science Research Scholars at Alagappa University, Karaikudi.
Abstract: This study attempts to the Web 2.0 Social Networking Sites for Collaborative Sharing Research
Information by the Social Science Research Scholars at Alagappa University, Karaikudi. A sample size 97
Scholars was selected by random sampling method. The data required for the study were collected through a
questionnaire. The findings of the study: 30.9% of the respondents using Facebook/ WhatsApp along with most
highly used in the popular web browser used for Google chrome 72.2% Google chrome. 48.5% of respondents‘
preference of ―Very Strongly Agree‖ Collaborate with Research projects and Teams. Whereas 46.4% ―Research
Collaboration ―Strongly agree‖ of the respondents respectively. 30.9% purpose of Web 2.0 for Collaborations of
Research Communication while 19.6% Opportunities and Learning for Web 2.0 tools support social interaction
in the learning process of the respondents respectively.
Keywords: Web 2.0 tools, Collaborative learning, Sharing Research Information, Web 2.0 Opportunities,
Blog/Wiki articles.
References:
1. Seema Sood, S. K. (2015). Web 2.0 Technology, Social Online Networking And Its Implications For Academic Libraries. International
Journal of Digital Library Services , 5 (1), 38-47. 2. Gopal, K. (2001). Intellectual freedom in Digital Libraries , Scholarly Books, 1-287.
3. Baskaran, C. (2018). Use of Social Networks (SNs) and Medias on Dissemination of Scholarly information among the Research Scholars in Alagappa University, Karaikudi, Tamil Nadu. Journal of Advances in Library and Information Science, 7(3), 257-261.
4. Baskaran, C. (2014). Information Resources Access Pattern at Alagappa University Library, Karaikudi, and Tamilnadu,
India. International Journal of Library and Information Studies, 4(1), 19-23. 5. Baskaran, C. (2019). Scholarly Information Share through Social Networks (SNs) and Medias among Social Science Scholars in
selected State Universities in Tamilnadu. International Journal of Library and Information Studies, 9(3), 83-92.
6. Baskaran, C., & Prasad, M. (2019). Research Quantify with faculty member's perception and expectations in e-context at the academic sphere. Library Philosophy and Practice, 1-16.
7. Baskaran, C., & Binu, P. C. (2019). Information acceleration into access on acquiring skill under consortium based resources in the
selected Universities of Kerala, India. Library Philosophy and Practice, 1-17. 8. Tautkevičienė, G., & Dubosas, M. (2014). The Purposes of Students‘ Use of Web 2.0 Tools for Learning at the University. Journal of
Emerging Trends in Computing and Information Sciences, 5(12).
9. Williams, J. B., & Jacobs, J. (2004). Exploring the use of blogs as learning spaces in the higher education sector. Australasian journal of educational technology, 20(2).
10. Chang, A. (2011). Web 2.0 Social Network Sites And Facebook Marketing. Binus Business Review, 2(2), 708-717.
70-74
14.
Authors: Pankaj Agarwal, Sapna Yadav, Juhi Chaudhary
Paper Title: How India and its Neighbors are doing during Covid-19 Pandemics- a Critical Analysis
Abstract: The prime objective of this work is to understand how India & its neighbors are doing during the
ongoing period of Covid-19 pandemics. We have used the web crawlers to find specific data of India from
official website www.mohfw.gov.in. We also referred to a dataset of global cases from Gitub for our work. We
have analyzed the covid19 cases from 22/1/2020 till 1/5/2020. We applied a time series prediction model to
forecast the possible deaths for next five days. We have taken into account six of our neighbors excluding China
to understand how India is doing in comparison to our neighbors. We observed that considering the size of India
population India has done fairly well. However the number of increasing cases in India particularly in the month
of May needs a serious call from Indian Govt. We have presented the outcomes of our work through different
kinds of comparisons & analysis. He have presented the prediction of next ten days for India & its neighbors for
the duration 4/5/2020 to 13/5/2020
Keywords: Covid-19, SARIMA model, Prediction Analysis, Time Series, Indian Neighbors
References:
1. www.mohfw.gov.in
2. World Health Organization (WHO): https://www.who.int/
3. Johns Hopkins CSSE: https://github.com/CSSEGISandData/COVID-19 4. WorldoMeters: https://www.worldometers.info/coronavirus/
75-79
15.
Authors: Carlos I. Poclin Meza, Kevin L. Monteza Corrales, Lenis R. Wong Portillo
Paper Title: Techniques for Malignant Melanoma Diagnosis: A Systematic Literature Review
Abstract: Malignant melanoma is the deadliest type of skin cancer. If melanoma detection and diagnosis is
performed in its early stages, the probabilities of recovery and survival are higher. Dermoscopy is a manual
method which is applied by doctors to diagnose this disease, but it strongly depends on the experience of the
specialist who performs this skin assessment. Although, many proposals have been made for automated
detection and diagnosis of malignant melanoma based on images processing, there are still improvement
opportunities for melanoma diagnosis. This paper aims to identify the current status of the latest researches
related to techniques for malignant melanoma diagnosis based on images analysis, considering the three research
questions that have been elaborated for the systematic literature review: Q1) Which are the latest methods for
80-86
malignant melanoma detection? Q2) Which systems for malignant melanoma diagnosis have been implemented
in the last 5 years? And Q3) Which CAD systems for malignant melanoma detection have been developed?
Furthermore, a cross-analysis of the outcome was performed. The results propose the implementation of systems
using Inception V3 and the classifier Support Vector Machine, which achieved high accuracies in malignant
melanoma diagnosis based on images processing.
Keywords: CAD Systems for Melanoma Diagnosis, CNN for Melanoma Detection, Dermoscopic Images
Processing, Melanoma Detection, Support Vector Machine.
References:
1. I. Márquez Rodas, J. A. Avilés, E. Mercader, J. L. Escat, V. Parra, and A. Álvarez. 2020. ―Melanoma‖. In Sociedad Española de
Oncología Médica. Available: https://seom.org/info-sobre-el-cancer/melanoma?showall=1.
2. N. E. Herrera Gonzáles and A. Y. Aco Flores, ―El melanoma en México‖, Revista de Especialidades Medico-Quirurgicas, vol. 15, no. 3, pp. 161-164, julio–septiembre 2010.
3. World Health Organization (WHO). 2005. ―La Organización Mundial de la Salud desaconseja el uso de camas solares a las personas
menores de 18 años‖. Available: https://www.who.int/mediacentre/news/notes/2005/np07/es/. 4. L. Wong, D. Mauricio, and G. Rodriguez. ―A Systematic Literature Review About Software Requirements Elicitation‖. In Journal of
Engineering Science and Technology (JESTEC), pp. 296 – 317, Feb. 2017.
5. B. A. Kitchenham and S. Charters. ―Guidelines for performing systematic literature reviews in software engineering version 2.3‖. Retrieved January 9, 2014. Available: http://www.elsevier.com/__data/promis_misc/ 525444systematicreviewsguide.pdf.
6. L. Rosado, M. João, M. Vasconcelos, and M. Ferreira. 2015. ―Pigmented skin lesion computerized analysis via mobile devices‖. In
Proceedings of the 31st Spring Conference on Computer Graphics (SCCG ‘15). Association for Computing Machinery, New York, NY, USA, 105–108. DOI: https://doi.org/10.1145/2788539.2788553.
7. A. Sáez, J. Sánchez-Monedero, P. A. Gutiérrez, and C. Hervás-Martínez, "Machine Learning Methods for Binary and Multiclass
Classification of Melanoma Thickness From Dermoscopic Images," in IEEE Transactions on Medical Imaging, vol. 35, no. 4, pp. 1036-1045, April 2016, doi: 10.1109/TMI.2015.2506270.
8. Z. Waheed, A. Waheed, M. Zafar, and F. Riaz, "An efficient machine learning approach for the detection of melanoma using
dermoscopic images," 2017 International Conference on Communication, Computing and Digital Systems (C-CODE), Islamabad, 2017, pp. 316-319, doi: 10.1109/C-CODE.2017.7918949.
9. A. A. A. Al-abayechi, H. A. Jalab, and R. W. Ibrahim. 2017. ―A classification of skin lesion using fractional poisson for texture feature
extraction‖. In Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing (ICC ‘17). Association for Computing Machinery, New York, NY, USA, Article 136, 1–7. DOI: https://doi.org/10.1145/3018896.3036379.
10. L. Yu, H. Chen, Q. Dou, J. Qin, and P. Heng, "Automated Melanoma Recognition in Dermoscopy Images via Very Deep Residual
Networks," in IEEE Transactions on Medical Imaging, vol. 36, no. 4, pp. 994-1004, April 2017, doi: 10.1109/TMI.2016.2642839. 11. A. H. Shahin, A. Kamal, and M. A. Elattar, "Deep Ensemble Learning for Skin Lesion Classification from Dermoscopic Images," 2018
9th Cairo International Biomedical Engineering Conference (CIBEC), Cairo, Egypt, 2018, pp. 150-153, doi:
10.1109/CIBEC.2018.8641815.
12. L. B. Maia, A. Lima, R. M. Pinheiro Pereira, G. B. Junior, J. Dallyson Sousa de Almeida, and A. C. de Paiva, "Evaluation of
Melanoma Diagnosis using Deep Features," 2018 25th International Conference on Systems, Signals and Image Processing (IWSSIP), Maribor, 2018, pp. 1-4, doi: 10.1109/IWSSIP.2018.8439373.
13. A. Gupta, M. Bhatnagar, A. Issac, M. K. Dutta, and C. M. Travieso. 2019. ―Imaging method for noise removal and segmentation of
skin lesions from dermoscopic images‖. In Proceedings of the 2nd International Conference on Applications of Intelligent Systems (APPIS ‘19). Association for Computing Machinery, New York, NY, USA, Article 16, 1–5. DOI:
https://doi.org/10.1145/3309772.3309788.
14. J. Jaworek-Korjakowska, P. Kleczek, and M. Gorgon, "Melanoma Thickness Prediction Based on Convolutional Neural Network With VGG-19 Model Transfer Learning," 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW),
Long Beach, CA, USA, 2019, pp. 2748-2756, doi: 10.1109/CVPRW.2019.00333.
15. R. Ali, R. C. Hardie, B. Narayanan Narayanan, and S. De Silva, "Deep Learning Ensemble Methods for Skin Lesion Analysis towards Melanoma Detection," 2019 IEEE National Aerospace and Electronics Conference (NAECON), Dayton, OH, USA, 2019, pp. 311-316,
doi: 10.1109/NAECON46414.2019.9058245.
16. O. Abuzaghleh, B. D. Barkana, and M. Faezipour, "Noninvasive Real-Time Automated Skin Lesion Analysis System for Melanoma Early Detection and Prevention," in IEEE Journal of Translational Engineering in Health and Medicine, vol. 3, pp. 1-12, 2015, Art no.
4300212, doi: 10.1109/JTEHM.2015.2419612.
17. N. C. F. Codella, Q.-B. Nguyen, S. Pankanti, D. A. Gutman, B. Helba, A. C. Halpern, and J. R. Smith. 2017. ―Deep learning ensembles
for melanoma recognition in dermoscopy images‖. IBM J. Res. Dev. 61, 4–5 (July/September 2017), 5:1–5:15. DOI:
https://doi.org/10.1147/JRD.2017.2708299.
18. Y. Hasija, N. Garg, and S. Sourav, "Automated detection of dermatological disorders through image-processing and machine learning," 2017 International Conference on Intelligent Sustainable Systems (ICISS), Palladam, 2017, pp. 1047-1051, doi:
10.1109/ISS1.2017.8389340.
19. S. Mustafa and A. Kimura, "A SVM-based diagnosis of melanoma using only useful image features," 2018 International Workshop on Advanced Image Technology (IWAIT), Chiang Mai, 2018, pp. 1-4, doi: 10.1109/IWAIT.2018.8369646.
20. S. M. Alizadeh and A. Mahloojifar, "A Mobile Application for Early Detection of Melanoma by Image Processing Algorithms," 2018
25th National and 3rd International Iranian Conference on Biomedical Engineering (ICBME), Qom, Iran, 2018, pp. 1-5, doi: 10.1109/ICBME.2018.8703575.
21. R. Moussa, F. Gerges, C. Salem, R. Akiki, O. Falou, and D. Azar, "Computer-aided detection of Melanoma using geometric features,"
2016 3rd Middle East Conference on Biomedical Engineering (MECBME), Beirut, 2016, pp. 125-128, doi: 10.1109/MECBME.2016.7745423.
22. Y. Ge, B. Li, Y. Zhao, E. Guan, and W. Yan. 2018. ―Melanoma Segmentation and Classification in Clinical Images Using Deep
Learning‖. In Proceedings of the 2018 10th International Conference on Machine Learning and Computing (ICMLC 2018). Association for Computing Machinery, New York, NY, USA, 252–256. DOI: https://doi.org/10.1145/3195106.3195164.
23. N. Hameed, A. Shabut, and M. A. Hossain, "A Computer-aided diagnosis system for classifying prominent skin lesions using machine
learning," 2018 10th Computer Science and Electronic Engineering (CEEC), Colchester, United Kingdom, 2018, pp. 186-191, doi: 10.1109/CEEC.2018.8674183.
24. Z. Yu et al., "Melanoma Recognition in Dermoscopy Images via Aggregated Deep Convolutional Features," in IEEE Transactions on
Biomedical Engineering, vol. 66, no. 4, pp. 1006-1016, April 2019, doi: 10.1109/TBME.2018.2866166. 25. L. Rosado and M. J. Vasconcelos. ―Automatic segmentation methodology for dermatological images acquired via mobile devices‖, in
8th International Conference on Health Informatics, 2015, pp. 246-250.
26. M. J. M. Vasconcelos, L. Rosado, and M. Ferreira. ―Border abruptness assessment methodology for skin lesion image analysis‖, in 20th Edition of the Portuguese Conference on Pattern Recognition, 2014.
27. M. J. M. Vasconcelos, L. Rosado, and M. Ferreira. ―Principal axes-based asymmetry assessment methodology for skin lesion image
analysis‖, in Advances in Visual Computing-Springer, 2014, pp. 21-31. 28. M. J. M. Vasconcelos, L. Rosado, and M. Ferreira. ―A new color assessment methodology using cluster-based features for skin lesion
analysis‖, in 38th International ICT Convention MIPRO, 2015.
29. M. A. Hall and G. Holmes. ―Benchmarking attribute selection techniques for discrete class data mining‖, Knowledge and Data Engineering IEEE Transactions on 15, 2003, pp. 1437-1447.
30. H. Liu and L. Yu. ―Toward integrating feature selection algorithms for classification and clustering‖, Knowledge and Data Engineering
IEEE Transactions on 17, 2005, pp. 491-502.
31. R. B. Oliveira, A. S. Pereira, and J. M. R. S. Tavares. 2018. ―Computational diagnosis of skin lesions from dermoscopic images using
combined features‖. Neural Computing and Applications, 8.
32. N. Otsu, ―Threshold selection method from gray-level histograms.‖ IEEE Trans Syst Man Cybern, vol. SMC-9, no. 1, pp. 62–66, 1979. 33. M. Celebi, H. Kingravi, B. Uddin, H. Iyatomi, Y. Aslandogan, W. Stoecker, and R. Moss, ―A methodological approach to the
classification of dermoscopy images,‖ Computerized Medical Imaging and Graphics, vol. 31, no. 6, pp. 362–373, 2007.
34. A. Sáez, C. Serrano, and B. Acha, ―Model-based classification methods of global patterns in dermoscopic images,‖ IEEE Transactions on Medical Imaging, vol. 33, no. 5, pp. 1137–1147, 2014.
35. T. Ojala, M. Pietikinen, and T. Menp, ―Multiresolution gray-scale and rotation invariant texture classification with local binary
patterns,‖ IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 7, pp. 971–987, 2002. 36. C. Hervás-Martínez and F. Martínez-Estudillo, ―Logistic regression using covariates obtained by product-unit neural network models,‖
Pattern Recognition, vol. 40, no. 1, pp. 52–64, 2007.
37. C. Hervás-Martínez, F. J. Martínez-Estudillo, and M. Carbonero-Ruz, ―Multilogistic regression by means of evolutionary product-unit neural networks,‖ Neural Networks, vol. 21, no. 7, pp. 951–961, 2008.
38. A. A. Abbas and W.-H. Tan. 2013. ―An improved Automatic Segmentation Skin Lesion from Dermoscopic Images Using Optimal
RGB Channel‖. In Conference on Computer Science & Computational Mathematics (ICCSCM 2013), 39. 39. A. A. A. Al-Abayechi, R. Logeswaran, X. Guo, and W.-H. Tan. 2013. ―Lesion border detection in dermoscopy images using bilateral
filter‖. In Signal and Image Processing Applications (ICSIPA), 2013 IEEE International Conference on IEEE, 365-368.
40. K. Sikka, N. Sinha, P. K. Singh, and A. K. Mishra. 2009. ―A fully automated algorithm under modified FCM framework for improved brain MR image segmentation‖. Magnetic Resonance Imaging 27, 7, 994-1004.
41. N. Otsu. 1975. ―A threshold selection method from gray-level histograms‖. Automatica 11, 285-296, 23-27.
42. N. Laskin. 2003. ―Fractional poisson process‖. Communications in Nonlinear Science and Numerical Simulation 8, 3, 201-213. 43. N. Razmjooy, B. S. Mousavi, F. Soleymani, and M. H. Khotbesara. 2013. ―A computer-aided diagnosis system for malignant
melanomas‖. Neural Computing and Applications 23, 7-8, 2059-2071.
44. T. G. Dietterich. 2000. ―Ensemble methods in machine learning‖. In International workshop on multiple classifier systems Springer, 1-15.
45. J. M. D. C. Viana. 2009. ―Classification of skin tumours through the analysis of unconstrained images‖.
46. P. Li, Gennady. Samorodnitsk, and John. Hopcroft, "Sign cauchy projections and chi-square kernel," presented at the Proc. Adv. Neural Inform. Process. Syst., 2013.
47. K. He, X. Zhang, S. Ren, and J. Sun, ―Deep Residual Learning for Image Recognition,‖ in 2016 IEEE Conference on Computer Vision
and Pattern Recognition (CVPR), 2016, pp. 770–778. 48. A. Vedaldi and A. Zisserman, "Efficient Additive Kernels via Explicit Feature Maps". In IEEE Trans. Pattern Anal. Mach. Intell., vol.
34, pp. 480-492, 2012.
49. M. Faraki, M. Harandi, A. Wiliem, and B. Lovell, "Fisher tensors for classifying human epithelial cells". In Pattern Recognit., vol. 47, pp. 2348-2359, 2014.
50. C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, ―Rethinking the Inception Architecture for Computer Vision‖. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016, pp. 2818–2826
51. B. Lei, W. Li, Y. Yao, X. Jiang, E. Tan, J. Qin, et al., "Multi-modal and multi-layout discriminative learning for placental maturity
staging," in Pattern Recognit., ed, 2016. 52. K. Simonyan and A. Zisserman, ―Very deep convolutional networks for large-scale image recognition‖, 2014.
53. C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, ―Going deeper with
convolutions‖, in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 1–9. 54. B. Efron, ―The efficiency of logistic regression compared to normal discriminant analysis,‖ Journal of the American Statistical
Association, vol. 70, no. 352, pp. 892–898, 1975.
55. M. A. Hearst, S. T. Dumais, E. Osuna, J. Platt, and B. Scholkopf, ―Support vector machines,‖ IEEE Intelligent Systems and their applications, vol. 13, no. 4, pp. 18–28, 1998.
56. H. Zhang, ―The optimality of naive bayes,‖ AA, vol. 1, no. 2, p. 3, 2004.
57. Y. Freund and R. E. Schapire, ―A decision-theoretic generalization of on-line learning and an application to boosting,‖ Journal of computer and system sciences, vol. 55, no. 1, pp. 119–139, 1997.
58. T. K. Ho, ―Random decision forests,‖ in Document analysis and recognition, 1995., proceedings of the third international conference
on, vol. 1. IEEE, 1995, pp. 278–282. 59. N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. Philip Kegelmeyer. ―Smote: Synthetic minority oversampling technique‖. J. Artif.
Intell. Res., 16:321–357, 2002.
60. G. Huang, Z. Liu, L. van der Maaten, and K. Q. Weinberger. ―Densely connected convolutional networks‖. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 2261–2269, 2017.
61. G. D. Finlayson, and E. Trezzi. 2004. ―Shades of gray and colour constancy‖. In Color and Imaging Conference (Vol. 2004, No. 1, pp.
37-41). Society for Imaging Science and Technology. 62. D. Whiteman and A. Green, ―Melanoma and sunburn‖, Cancer Causes Control, vol. 5, no. 6, pp. 564-572, 1994.
63. C. Cortes and V. Vapnik, ―Support-vector networks‖, Mach. Learn., vol. 20, no. 3, pp. 273-297, 1995.
64. G. H. John and P. Langley, "Estimating continuous distributions in Bayesian classifiers," in Proceedings of the Eleventh conference on Uncertainty in artificial intelligence, 1995, pp. 338-345: Morgan Kaufmann Publishers Inc.
65. J. Long, E. Shelhamer, and T. Darrell, ―Fully convolutional networks for semantic segmentation‖, 2015. [Online]. Available:
https://arxiv.org/abs/1411.4038. 66. A. Krizhevsky, I. Sutskever, and G. E. Hinton, ―ImageNet classification with deep convolutional neural networks,‖ in Proc. Adv.
Neural Inf. Process. Syst., 2012, pp. 1106–1114. [Online]. Available: https://papers.nips.cc/paper/4824-imagenetclassification-with-
deep-convolutional-neural-networks.pdf. 67. O. Ronneberger, P. Fischer, and T. Brox, ―U-net: Convolutional networks for biomedical image segmentation,‖ in Medical Image
Computing and Computer-Assisted Intervention (MICCAI) (Lecture Notes in Computer Science, vol. 9351). New York, NY, USA:
Springer, 2015, pp. 234–241. [Online]. Available: http://arxiv.org/abs/1505.04597. 68. R. Carsten, K. Vladimir, and B. Andrew, "Grabcut: Interactive foreground extraction using iterated graph cuts.," ACM Transactions on
Graphics (SIGGRAPH), vol. 23, no. 3, pp. 309-314, 2004.
69. American Academy of Dermatology, "What to look for: ABCDEs of melanoma," October 2017. [Online]. Available: https:/Iwww.aad.org/public/spot-skin-cancer/learn-about-skin-cancer/detect/what-to-look-for.
70. C. Hsu and C. Chang, ―A practical guide to support vector classification‖, Department of Computer Science, National Taiwan
University, Tech. Rep., 2003. 71. S. Jain, N. Pise, and others, ―Computer aided Melanoma skin cancer detection using Image Processing,‖ Procedia Comput. Sci., vol.
48, pp. 735–740, 2015.
16. Authors: Isaac Ñuflo, Franco Mecca, Lenis Wong
Paper Title: Machine Learning and Deep Learning Techniques, Features and Obstacles in the Cataract
Diagnosis
Abstract: Cataract is a degenerative condition that, according to estimations, will rise globally. Even though
there are various proposals about its diagnosis, there are remaining problems to be solved. This paper aims to
identify the current situation of the recent investigations on cataract diagnosis using a framework to conduct the
literature review with the intention of answering the following research questions: RQ1) Which are the existing
methods for cataract diagnosis? RQ2) Which are the features considered for the diagnosis of cataracts? RQ3)
Which is the existing classification when diagnosing cataracts? RQ4) And Which obstacles arise when
diagnosing cataracts? Additionally, a cross-analysis of the results was made. The results showed that new
research is required in: (1) the classification of ―congenital cataract‖ and, (2) portable solutions, which are
necessary to make cataract diagnoses easily and at a low cost.
Keywords: Cataract Diagnosis, Image Processing, Ophthalmology, Machine Learning Techniques, Deep
Learning Techniques.
References:
1. J. Jamison, cataracts, clinical guide to nutrition & dietary supplements in disease management, 2003, pp. 259-264.
2. W. Sodeman and t. Sodeman, cataracts: patient and caregiver‘s guide, instructions for geriatic patients, 2005, pp. 70.
3. R. Abel, cataracts, integrative medicine, vol. 4, 2018, pp. 830-837. 4. L. Wong, d. Mauricio and g. Rodriguez, a systematic literature review about software requirements elicitation, journal of engineering
science and technology, v. 12, n. 2, 2017, pp. 296-317.
5. B.a. Kitchenham and s. Charters, guidelines for performing systematic literature reviews in software engineering version 2.3, 2007 6. M. Kugamourthy and o. Goonetileke, ―eophthalmologist -- intelligent eye disease diagnosis system‖, 5th conference on intelligent
systems, modelling and simulation, 2014, pp. 339-344.
7. J. Zheng, l. Guo and l. Peng, ―fundus image based cataract classification‖, ieee international conference on imaging systems and techniques (ist) proceedings, 2014, pp. 1-6.
8. X. Gao, s. Lin and t. Y. Wong, ―automatic feature learning to grade nuclear cataracts based on deep learning‖, ieee transactions on
biomedical engineering, vol. 62, 2015, pp. 2693-2701. 9. S. Patange and a. Jagadale, ―framework for detection of cataract and gradation according to its severity‖, international conference on
pervasive computing (icpc), 2015, pp. 1-3.
10. M. Kaur, j. Kaur and r. Kaur, ―low cost cataract detection system using smart phone‖, international conference on green computing and internet of things (icgciot), 2015, pp. 1607-1609.
11. Y. N. Fuadah, a. W. Setiawan, t. L. R. Mengko and budiman, ―mobile cataract detection using optimal combination of statistical
texture analysis‖, 4th international conference on instrumentation, communications, information technology, and biomedical engineering (icici-bme), 2015, pp. 232-236.
12. L. Guo, j. Yang, l. Peng, j. Li and q. Liang, ―a computer-aided healthcare system for cataract classification and grading based on
fundus image analysis‖, computers in industry, vol. 69, 2015, pp. 72-80. 13. V. Harini and v. Bhanumathi, ―automatic cataract classification system‖, international conference on communication and signal
processing (iccsp), 2016, pp. 0815-0819.
14. D. Patil, a. Nair, n. Bhat, r. Chavan and d. Jadhav, ―analysis and study of cataract detection techniques‖, international conference on global trends in signal processing, information computing and communication (icgtspicc), 2016, pp. 516-519.
15. i. Shaheen and m. U. Akram, ―an integrated framework for clinical grading of cataract‖, 1st international conference on next
generation computing applications (nextcomp), 2017, pp. 92-97. 16. Z. Qiao, q. Zhang, y. Dong and j. Yang, ―application of svm based on genetic algorithm in classification of cataract fundus images‖,
ieee international conference on imaging systems and techniques (ist), 2017, pp. 1-5.
17. J. Rana and s. M. Galib, ―cataract detection using smartphone‖, 3rd international conference on electrical information and communication technology (eict), 2017, pp. 1-4.
18. J. Li, q. Hu, a. Imran, l. Zhang, j. Yang and q. Wang, ―vessel recognition of retinal fundus images based on fully convolutional
network‖, ieee 42nd annual computer software and applications conference (compsac), 2018, pp. 413-418. 19. J. Cheng, ―sparse range-constrained learning and its application for medical image grading‖, ieee transactions on medical imaging, vol.
37, 2018, pp. 2729-2738.
20. A. Dixit, s. Pathak, r. Raj, c. Naveen and v. R. Satpute, ―an efficient fuzzy based edge estimation for iris localization and pupil
detection in human eye for automated cataract detection system‖, international conference on computing, communication and
networking technologies (icccnt), 2018, pp. 1-6.
21. Y. Xiong, z. He, k. Niu, h. Zhang and h. Song, ―automatic cataract classification based on multi-feature fusion and svm‖, ieee 4th international conference on computer and communications (iccc), 2018, pp. 1557-1561.
22. T. Pratap and p. Kokil, ―computer-aided diagnosis of cataract using deep transfer learning, biomedical signal processing and control‖,
vol. 53, 2019. 23. W. Song, y. Cao, x. Qiao, q. Wang and j. Yang, ―an improved semi-supervised learning method on cataract fundus image
classification‖, ieee 43rd annual computer software and applications conference (compsac), 2019, pp. 362-367.
24. H. I. Morales lopez, j. C. Sanchez garcia and j. A. Diaz mendez, ―cataract detection techniques: a review‖, ieee latin america transactions, vol. 14, 2016, pp. 3074-3079.
25. H. Lin, r. Li, z. Liu, j. Chen, y. Yang, h. Chen, z. Lin, w. Lai, e, long, x. Wu, d. Lin, y. Zhu, c. Chen, d. Wu, t. Yu, q. Cao, x. Li, j. Li, w. Li, j. Wang, m. Yang, h. Hu, l. Zhang, y. Yu, x. Chen, j. Hu, k. Zhu, s. Jian, y. Huang, g. Tan, j. Huang, x. Lin, x. Zhang, l. Luo ,
x. Liu, b. Cheng, d. Zheng, m. Wu, w. Chen and y. Liu, ―diagnostic efficacy and therapeutic decision-making capacity of an artificial
intelligence platform for childhood cataracts‖, eye clinics: a multicentre randomized controlled trial, vol. 9, 2019, pp. 1-8. 26. M. Yusuf, s. Theophilous, j. Adejoke, a. Hassan, ―web-based cataract detection system using deep convolutional neural network‖, ieee
2nd international conference of the ieee nigeria computer chapter (nigeriacomputconf), 2019, pp. 1-7.
27. R. Sigit, m. Kom, m. Bayu, d. Kurnia. And s. Si, ―classification of cataract slit-lamp image based on machine learning‖, international
seminar on application for technology of information and communication, 2018, pp 1-6.
28. J. Erichsen, a. Mensah and l. Kessel, ―non-invasive tryptophan fluorescence measurements as a novel method of grading cataract‖,
experimental eye research, vol. 165, 2017, pp. 1-6. 29. Y. Zhou, g. Li and h. Li, ―automatic cataract classification using deep neural network with discrete state transition‖, ieee transactions
on medical imaging, vol. 39, 2019, pp. 1-11.
30. J. Li, x. Xu and y. Guan, ―automatic cataract diagnosis by image-based interpretability‖, ieee international conference on systems, man, and cybernetics, 2018, pp. 1-6.
31. H. Zhang and he, ―automatic cataract grading methods based on deep learning‖, computer methods and programs in biomedicine, vol.
182, 2019, pp. 1-19. 32. C. Palomo and m. Puell, ―capacity of straylight and disk halo size to diagnose cataract‖, journal of cataract & refractive surgery, vol.
41, 2015, pp. 2069-2074
33. J. Yang, j. Li, r. Shen and y. Zeng, ―exploiting ensemble learning for automatic cataract detection and grading‖, computer methods and
87-93
programs in biomedicine, vol. 124, 2016, pp. 1-24.
34. P. Chen, p. Tsai, c. Lee and c. Chang, ―congenital cataracts diagnosed by prenatal ultrasound‖, taiwanese journal of obstetrics and gynecology, vol. 54, 2015, pp. 1-2.
17.
Authors: Ahmad Farhad Farahmand, Bhartesh, Sayed Shuaib Qammer
Paper Title: Displacement Analysis of RC Frames and Its Seismic Performance Appraisal
Abstract: In India when structure engineer‘s analysis and design a structure like buildings, they are checking
it for displacement because of safety and control of damages; so in this paper a set of frames with different
height of reinforced moment resisting frames were analyzed by two popular methods of performance-based
plastic design method and direct displacement-based design method. For calculation of base shear, the IS code
has been used in both methods and ETABS software used for seismic performance evaluation by nonlinear static
pushover analysis. The results of analysis with different methods compared by suitable parameters and graphs,
such as: (a) story lateral force, (b) beam seismic moment, (c) displacement profile and (d) capacity curve.
Results shows acceptable performance in 2 methods in terms of capacity and deformation.
Keywords: Performance-based plastic design, displacement profile, Seismic performance, Direct displacement-
based design, beam seismic moment, capacity curve.
References:
1. Subhash C. Goel and Shih-Ho Chao, (2008), Performance based plastic design: Earthquake Resistant Steel Structure, ICC publication, USA.
2. Shibata A, sozen m. (1976), ―Substitute structure method for seismic design in reinforced concrete ―. J struct Div, ASCE, Vol .102, No.
1, PP 1-18. 3. Moechle JP. (1996), ―displacement-based seismic design criteria‖, In: proceedings of 11th world conference on Earthquake
Engineering, Acapulco, Mexico. Paper no. 2125. Oxford: pergamon.
4. SEAOC. (Vision 200), ―performance based seismic design of buildings‖, vol. I and II: conceptual framework Sacramento (CA): Structure Engineering Association of California.
5. ATC 40(1996), ―Seismic evaluation and retrofit of existing concrete buildings‖, Redwood city (CA): Applied Technology Council.
6. FEMA 273 (1996),‖ NEHRP guidelines for the seismic rehabilitation building‖ FEMA 274 commentary. Washington (DC): Federal Emergency management Agency.
7. R> O> Hamburger, C. Rojahn and J. A. Heintz , and m. G. Mahoney, (2012) ― FEMA p58: Next-Generation Building Seismic
performance Assessment Methodology‖, WCEE. 8. GULKAN, P. and Sozen, M.A, (1974). Inelastic response of reinforced concrete structures to earthquake motions. ACI journal.
71(12): p. 604-610
9. Shibata, A. and Sozen, M.A, (1976). Substitute-structure method for seismic design in R/C journal structure division. 102(1): P. 1-18 10. Moehli, J.P, (1992). Displacement-based design of building structures subjected to earthquakes. Earthquake spectra. 8(3): P
11. Kowalsky, M.J, Preistly, M.J.N, and MacRae, G.A, (1995). Displacement-Based Design of RC Bridge columns in seismic Rejoins.
Earthquake Engineering and Structural Dynamics. 24(12): P. 1623-1643. 12. Calvi, G.M. and kingsly, G.R, (1995). Displacement-based seismic Design of Multi-Degree-of-freedom, Bridge Structurea. Earthquake
Engineering and Structure Dynamics. 24(9): p. 1247-1266.
13. Chopra, A.K. and Goel, R.K, (2001). Direct Displacement-based Design: Use of Inelastic Design Spectra Versus Elastic Design Spectra. Earthquake Spectra. EERI 17(1): p. 47-64.
14. Prestley M.J.N., Calvi, M.C., and Kowalsky, M.J. 2007., Direct Displacement-Based Seismic Design of concrete building. Bulletin of
the New Zealand Society for Earthquake Engineering. 33(4), 421-444. 15. Sullivan, T.J., Priestley, M.J.N., and Calvi, G.M., (2006). Direct Displacement-Based design of Frame-Wall Structures. Journal of
Earthquake Engineering. 10(sup001): p. 91-124.
16. Priestley, M.J.N., and Calvi, M.C., and Kowalsy, (2007). Direct Displacement-Based design of Structures, NZSEE Conference. 17. Sullivan, T.J. and Lago, A., (2012). Towards a simplified Direct DBD Procedure for the seismic design of moment resisting frames
with viscous dampers. Engineering Structures, 35: P. 140-148.
18. Malekpour, S., GHaffarzadeh, H., and Dashti, F., (2013). Direct displacement-based design of steel-braced reinforced concrete frames. Structural Design Tall and Special Buildings. 22(18): P. 1422-1438.
19. Chao, S.-H, Goel, S. C., and Lee, S.-S. (2007)., ―A seismic design of lateral force distribution based on inelastic state of structures,‖ Earthquake Spectra, Earthquake Engineering Research Institute, Vol. 23, NO. 3, pp. 547-569.
20. Leelataviwat, S. 1999 ―Drift and Yield Mechanism based Seismic Design and Upgrading of Steel Moment Frames.‖ Ph.D. Thesis,
Department of Civ. & Env. Engrg., University Michigan, Ann Arbor, MI, USA, 21. Lee, Soon-Sik and Goel, S. C. 2001, ―Performance-Based Design of Steel Moment Frames Using Target Drift and Yield Mechanism‖
Report No. UMCEE 01-17, Department of Civ, & Env. Engrg., University of Michigan, Ann Arbor, MI, USA.
22. Goel, S. C. and Chao, S.-H. (2009)., Performance-Based Plastic Design: Earthquake-resistant Steel Structures, ICC, USA. 23. Wen-Cheng Liaol and Subbash C. Goel. (2012)., ―Performance-Based Plastic Design and Evaluation of Seismic Resistant RC Moment
Frame‖, Journal of Marine Science and Technology.
24. Priestley, M.J.N., and Calvi, G.M., and Kowalsy, M.J., ―Displacement-Based design of Structures‖, IUSS Press, Press, pavia, Italy, 2007.
25. Alok Madan, Arshad K. Hashmi., ―Performance based design of masonry infilled reinforced concrete frames for near-field earthquakes
Using energy methods‖ International Journal of Civil, Environmental, Structural, construction and Architectural Engineering Vol:8, No:6, 2014.
26. IS 1893 (part 1): 2002, ―Criteria for Earthquake Resistant Design of structures‖, Part-1 General Provisions and Buildings (Fifth
Revision), Bureau of Indian Standard, New Delhi. 27. IS 456:2000, ―Plain and Reinforced code of Practice (fourth Revision)‖, bureau of Indian standard, New Delhi.
28. IS 13920:1993, ―Ductile Detailing of Reinforced Concrete Structures Subjected to Seismic Forces‖, bureau of Indian standard, New
Delhi.
94-101
18.
Authors: Anshu Parashar, Anand Kumar Pandey, Ritesh Kumar Rai
Paper Title: Placement of PV Units Considering Uncertainties of Generation and Load in Distribution Systems
Abstract: In conventional power system the transmission and distribution (T&D) losses is a major concern.
Renewable energy resources placed at load centers can reduce the T&D losses. For power system planners and
researchers it is essential to find the optimal size and position of renewable energy resources to be place in
distribution networks. Renewable energy source such as solar energy is abundantly present in the environment.
102-106
With the help of solar photovoltaic (SPV) system solar energy can be converted to electrical energy. Placement
of SPV in distribution system is an interesting area for researchers and planners, the random placement of SPV
in distribution system leads to more power losses and poor voltage profile. In this article mathematical
modelling of time varying nature of SPV and variable load has been explained and particle swarm optimization
(PSO) method is proposed to find the best size and location of the SPV system. This method is tested on IEEE
33 bus system. For the validation of result existing technique based on analytical expression is selected. It is
found that PSO gives better result in compare to analytical method.
Keywords: Solar photovoltaic system, Multi-objective index, Time varying solar irradiance, Power system
optimization, Particle swarm optimization.
References:
1. Duong Quoc Hung, N.M., and and K.Y. Lee, Determining PV penetration for Distribution systems with Time-Varying load Models.
IEEE TRANSACTIONS ON POWER SYSTEMS, 2014. 29 NO. 6. 2. Niknam T, Taheri SI, Aghaei J, Tabatabaei S, Nayeripour M. A modified honey bee mating optimization algorithm for multiobjective
placement of renewable energy resources. Appl Energy 2011;88(12):4817–30.
3. Taher N. A new HBMO algorithm for multiobjective daily Volt/Var control in distribution systems considering distributed generators. Appl Energy 2011;88(3):778–88.
4. Martinez-Rojas M, Sumper A, Gomis-Bellmunt O, Sudrià-Andreu A. Reactive power dispatch in wind farms using particle swarm
optimization technique and feasible solutions search. Appl Energy 2011;88(12):4678–86. 5. Anand Kumar Pandey and Sheeraz Kirmani. "Multi-objective optimal location and sizing of hybrid system using analytical crow
search optimization algorithm.‖ International Transactions on Electrical Energy Systems 30, no. 5(2020), e12327.
6. L. F. Ochoa, A. Padilha-Feltrin, and G. P. Harrison, ―Evaluating distributed generation impacts with a multiobjective index,‖ IEEE Trans Power Del., vol. 21, no. 3, pp. 1452–1458, Jul. 2006.
7. D. Singh and K. S. Verma, ―Multiobjective optimization for DG planning with load models,‖ IEEE Trans. Power Syst., vol. 24, no. 1,
pp. 427–436, Jan. 2009. 8. A.M. El-Zonkoly, ―Optimal placement of multi-distributed generation units including different load models using particle swarm
optimisation,‖ IETGener. Transm. Distrib., vol. 5, no. 7, pp. 760–771, Jul. 2011.
9. Bakos GC. Distributed power generation: a case study of small scale PV power plant in Greece. Appl Energy 2009; 86(9):1757–66. 10. Wang C, Nehrir MH. Analytical approaches for optimal placement of distributed generation sources in power systems. IEEE Trans
Power Syst 2004;19(4):2068–76. Acharya N, Mahat P, Mithulananthan N. An analytical approach for DG allocation in primary
distribution network. Int J Elect Power Energy Syst 2006;28(10):669–78. 11. Hung DQ, Mithulananthan N, Bansal RC. Analytical expressions for DG allocation in primary distribution networks. IEEE Trans
Energy Convers 2010;25(3):814–20.
12. Singh D, Verma KS. Multiobjective optimization for DG planning with load models. IEEE Trans Power Syst 2009;24(1):427–36. 13. Khatod DK, Pant V, Sharma J. Evolutionary programming based optimal placement of renewable distributed generators.
14. IEEE Trans Power Syst 2013;28(2):683–95. Ochoa LF, Harrison GP. Minimizing energy losses: optimal accommodation and smart operation of renewable distributed generation. IEEE Trans Power Syst 2011;26(1):198–205.
15. Hung DQ, Mithulananthan N, Bansal RC. Analytical strategies for renewable distributed generation integration considering energy
loss minimization. Appl Energy 2013; 105:75–85. 16. Anand Kumar Pandey and Sheeraz Kirmani. "Multi-Objective Optimal Location and Sizing of Hybrid Photovoltaic System in
Distribution Systems Using Crow Search Algorithm." International Journal of Renewable Energy Research (IJRER) 9.4 (2019): 1681-
1693. 17. C. T. Ioan, ―The particle swarm optimization algorithm: Convergence analysis and parameter selection,‖ Inf. Process. Lett. vol. 85, pp.
317–325, 2003.
18. Lee S-H, Park J-W. Selection of optimal location and size of multiple distributed generations by using kalman filter algorithm. Power Syst IEEE Trans 2009; 24:1393–400.
19. Singh D, Singh D, Verma K. GA based optimal sizing and placement of distributed generation for loss minimization. Int J Electr
Comput Eng 2007; 2:556–62. 20. Nara K, Hayashi Y, Ikeda K, Ashizawa T. Application of tabu search to optimal placement of distributed generators. in: IEEE Power
Engineering Society Winter Meeting, vol. 2; 2001, p. 918–923.
19.
Authors: P.Sivasankaran B.Radjaram, K.Karthigayan
Paper Title: Maximizing Machine Capacity by Improving Efficiency using Linear Programming Model
Abstract: In the global manufacturing system, machine performance is considered to be one of the vital role
in organization wellbeing. In specific analysing the capacity utilization of machines in each shift is a big
challenging job in industrial organization. The primary importance is keeping the machines in uptime condition
at the same time loading the jobs in machines decides the capacity usage of machines to do the useful jobs. In
this paper focus is made on the capacity planning of machines in production shift. capacity utilization measures
the actual capacity of machine with respect to the potential output within a specific period. In real situations if
the demand for the product increases the production capacity also increases but at the same time if the demand
falls capacity will also become very low. Hence in this work attempt has been made to develop a mathematical
model for machine capacity planning using linear programming model solved by using LINDO software.
Keywords: Capacity utilization,uptime,LINDO, Linear Programming
References:
1. Arabacı, Ö. ve Arabacı, R. (2008). Kapasite Kullanım Oranları ve Enflasyon İlişkisi:Türkiye Örneği. Uludağ Üniversitesi. İktisadi ve
İdari Bilimler Fakültesi Dergisi. Cilt:27,Sayı:2, 93-109.
2. Bircan, H. ve Kartal, Z. (2003). Doğrusal Programlama Tekniği ile Kapasite PlanlamasıYaklaşımı ve Çimento İşletmesinde Bir Uygulaması. Cumhuriyet Üniversitesi. İktisadi veİdari Bilimler Dergisi. Cilt:5, Sayı:1, 131-149.
3. Bulut, Z.A. (2004). İşletmeler Açısından Kapasite Planlaması ve Kapasite PlanlamasınaEtki Eden Faktörler. Mevzuat Dergisi. Yıl:7,
Sayı:80. Erişim Tarihi: 14 Aralık 2013,http://www.mevzuatdergisi.com/2004/08a/06.htm 4. Büyükkeklik, M. (2007). Üretim Planlama Problemlerinde Doğrusal Programlama
5. Modellerinin Kullanımı: Bir Üretim şletmesinde Uygulama. Yüksek Lisans Tezi, NÜ Sosyal
6. Bilimler Enstitüsü, Niğde. 7. Candes, E. J., & Tao, T. (2005). Decoding by linear programming. Information Theory,IEEE Transactions on, 51(12), 4203-4215.
107-114
8. Charnes, A., & Cooper, W. W. (1961). Management models and industrial applications oflinear programming [by] A. Charnes [and]
WW Cooper (Vol. 1). John Wiley & Sons. 9. Dantzig, G. B. (1965). Linear programming and extensions. Princeton university press.
10. Ekodialog.com.(2009). Erişim Tarihi: 25 Aralık 2013.
http://www.ekodialog.com/isletme_ekonomisi/isletme_kapasite_planlamasi_2.html
11. Ergülen, A., & Kazan, H. (2012). Taşımacılık Sektörünün İşleyiş Süreci, Bulanık DağıtımProbleminin Tamsayılı Doğrusal
Programlama Model Denemesi. Uluslararası Yönetimİktisat ve İşletme Dergisi, 3(6), 109-126.
12. Esin, A. (1998). Yöneylem Araştırmasında Yararlanılan Kantitatif Yöntemler. Ankara:Gazi Üniversitesi. Yayın Nu:128, S.24-298. 13. Ferrier, G. D., & Lovell, C. K. (1990). Measuring cost efficiency in banking:econometric and linear programming evidence. Journal of
econometrics, 46(1), 229-245.
20.
Authors: Jahidul Haque Chaudhuri, Rohan Deb, Jhinuk De
Paper Title: Innovative Way to Decrease the Water Consumption of Direct Evaporative Air-Cooler
Abstract: In the present study the existing direct evaporative coolers (DEC) is modified in such a way that
DEC consume less amount of water and provide better cooling effect. In desert area, water consumption by air
cooler is a serious problem. Therefore, the present study addressed this issue and primary objective of the study
is to minimize the consumption of water. For this purpose, the property of the endothermic reaction is utilized.
There are few salts that produce endothermic reaction if it is diluted in water. Those salt crystals absorb heat
from the surrounding environment (water) and ultimately the temperature of the overall solution gets reduced.
This cold solution is then passed through honeycomb cooling pad, as a result more amount of air can be cooled
using the same volume of water as compared to the traditional air-cooler. Ammonium Chloride (NH4Cl),
Ammonium Nitrite (NH4NO3) salts satisfy the basic criteria for the endothermic reaction but NH4Cl will be
more useful to use in the air-coolers, as Ammonium Nitrite is costlier and also hazardous. A salt water separator
arrangement also attached with modified air-cooler which will help to regenerate Ammonium Chloride crystal
from solution with the help of solar energy. In this study, firstly discussed about proposed design of an air-cooler
system, which is able to nicely handle chemical solution. Then compared the study with experimental outcome
which have been carried out with and without using salt. From the result it has been observed that modified
design of air cooler has great potential to improve the traditional air cooler in terms of cooling effect and water
consumption.
Keywords: direct evaporative cooler; NH4Cl; honeycomb cooling pad; modified air-cooler design.
References:
1. Bishoyi, D., & Sudhakar, K. (2017). Experimental performance of a direct evaporative cooler in composite climate of India. Energy and
Buildings, 153, 190-200. 2. Kovačević, I., & Sourbron, M. (2017). The numerical model for direct evaporative cooler. Applied Thermal Engineering, 113, 8-19.
3. Franco, A., Valera, D. L., & Peña, A. (2014). Energy efficiency in greenhouse evaporative cooling techniques: cooling boxes versus
cellulose pads. Energies, 7(3), 1427-1447. 4. Sellami, K., Feddaoui, M., Labsi, N., Najim, M., Oubella, M., & Benkahla, Y. K. (2019). Direct evaporative cooling performance of
ambient air using a ceramic wet porous layer. Chemical Engineering Research and Design, 142, 225-236.
5. Heidarinejad, G., & Bozorgmehr, M. (2008). Heat and mass transfer modeling of two stage indirect/direct evaporative air coolers. ASHRAE journal Thailand.
6. Dai, Y. J., & Sumathy, K. (2002). Theoretical study on a cross-flow direct evaporative cooler using honeycomb paper as packing
material. Applied thermal engineering, 22(13), 1417-1430. 7. Al-Badri, A. R., & Al-Waaly, A. A. (2017). The influence of chilled water on the performance of direct evaporative cooling. Energy and
Buildings, 155, 143-150.
8. Dhamneya, A. K., Rajput, S. P. S., & Singh, A. (2018). Thermodynamic performance analysis of direct evaporative cooling system for increased heat and mass transfer area. Ain Shams Engineering Journal, 9(4), 2951-2960.
9. Guan, L., Bennett, M., & Bell, J. (2015). Evaluating the potential use of direct evaporative cooling in Australia. Energy and Buildings,
108, 185-194. 10. Kavaklioglu, K., Koseoglu, M. F., & Caliskan, O. (2018). Experimental investigation and radial basis function network modeling of
direct evaporative cooling systems. International Journal of Heat and Mass Transfer, 126, 139-150.
11. Kim, M. H., & Jeong, J. W. (2013). Cooling performance of a 100% outdoor air system integrated with indirect and direct evaporative coolers. Energy, 52, 245-257.
12. Wu, J. M., Huang, X., & Zhang, H. (2009). Theoretical analysis on heat and mass transfer in a direct evaporative cooler. Applied
Thermal Engineering, 29(5-6), 980-984. 13. Roux, A., Musbally, G. M., Perron, G., Desnoyers, J. E., Singh, P. P., Woolley, E. M., & Hepler, L. G. (1978). Apparent molal heat
capacities and volumes of aqueous electrolytes at 25° C: NaClO3, NaClO4, NaNO3, NaBrO3, NaIO3, KClO3, KBrO3, KIO3,
NH4NO3, NH4Cl, and NH4ClO4. Canadian Journal of Chemistry, 56(1), 24-28. 14. Kabeel, A. E., & Bassuoni, M. M. (2017). A simplified experimentally tested theoretical model to reduce water consumption of a direct
evaporative cooler for dry climates. International Journal of Refrigeration, 82, 487-494.
115-121
21.
Authors: Mohan Rawat, R N Singh
Paper Title: Thermal Performance of Composite Roof Structures with Insulating Layers in Non-Conditioned
Buildings for Hot-Dry Climate
Abstract: The roof configurations with an insulating layer and their impact on hourly floating temperature
analyzed in a hot-dry climate context. A predefined computer program using a modified Fourier admittance
method utilized as the primary research. The thermal performance of ten composite roof structures evaluated to
obtain optimal roof structure for hot-dry climate, Jodhpur. Nine composite roof structures with an insulation
layer and one without insulation layer as the base case were analyzed for the summer months (April-September).
The utilization of roof thermal insulation showed a significant influence on the overall thermal performance of
roofs. It also revealed that minimum temperature variation found about 8.8 0C for the composite roof structure
of Reinforced Cement Concrete (RCC) with foam concrete insulation (i.e., RF-5) with thicknesses 150 mm and
140 mm respectively. The analysis assessed that composite roof structure with an insulating layer is a useful
122-127
technique to reduced indoor temperature in non-conditioned buildings of hot-dry climate.
Keywords: Fourier admittance method, Heat Gain, Hot-dry climate, Thermal comfort, Simulation.
References:
1. Lee, S. W., Lim, C. H., Chan, S. A., & Von, K. L. ―Techno-economic evaluation of roof thermal insulation for a hypermarket in
equatorial climate‖: Malaysia. Sustainable cities and society,2017, 35, 209-223.
2. Al-Homoud, M. S. ―The effectiveness of thermal insulation in different types of buildings in hot climates‖. Journal of Thermal Envelope and Building Science, 2004, 27(3), 235-247.
3. Schiavoni, S., Bianchi, F., & Asdrubali, F. ―Insulation materials for the building sector: A review and comparative
analysis‖. Renewable and Sustainable Energy Reviews,2016, 62, 988-1011. 4. Yew, M. C., Sulong, N. R., Chong, W. T., Poh, S. C., Ang, B. C., & Tan, K. H. ―Integration of thermal insulation coating and moving-
air-cavity in a cool roof system for attic temperature reduction‖. Energy Conversion and Management, 2013,75, 241-248. 5. Sansaniwal, S. K., Mathur, J., Garg, V., & Gupta, R. ―Review of studies on thermal comfort in Indian residential buildings‖. Science
and Technology for the Built Environment, 2020 1-22.
6. Arumugam, R. S., Garg, V., Ram, V. V., & Bhatia, A. ―Optimizing roof insulation for roofs with high albedo coating and radiant barriers in India‖. Journal of Building Engineering, 2015, 2, 52-58.
7. Kaynakli, O. ―A review of the economical and optimum thermal insulation thickness for building applications‖. Renewable and
Sustainable Energy Reviews, 2012, 16(1), 415-425. 8. Sodha, M. S., Kaur, B., Kumar, A., & Bansal, N. K.‖Comparison of the admittance and Fourier methods for predicting heating/cooling
loads‖. Solar energy, 36(2), 1986, 125-128.
9. Bansal, N. K., Garg, S. N., & Kothari, S. ―Effect of exterior surface colour on the thermal performance of buildings‖. Building and environment, 1992, 27(1), 31-37.
10. Sodha, M. S., Singh, S. P., & Sawhney, R. L. ―Evaluation of discomfort in a room with desert cooler‖. International Journal of Energy
Research, 1990, 14(7), 745-756. 11. Kumar, A., & Suman, B. M. ―Experimental evaluation of insulation materials for walls and roofs and their impact on indoor thermal
comfort under composite climate‖. Building and Environment, 2013, 59, 635-643.
12. Yumrutaş, R., Kaşka, Ö.,& Yıldırım, E. ―Estimation of total equivalent temperature difference values for multilayer walls and flat roofs by using periodic solution‖. Building and Environment, 2007, 42(5), 1878-1885.
13. Shi, D., Zhuang, C., Lin, C., Zhao, X., Chen, D., Gao, Y., & Levinson, R. ―Effects of natural soiling and weathering on cool roof
energy savings for dormitory buildings in Chinese cities with hot summers‖. Solar Energy Materials and Solar Cells,2019, 200, 110016
22.
Authors: Alfonso Alexander Ruesta Sedano, Jeanette Giuliana Gamarra Herrera, Lenis Rossi Wong Portillo
Paper Title: Techniques for Images Processing, Factors and Results of Colposcopy to Diagnose Cervical Cancer
Abstract: The colposcopy is a test that is performed if you have relationed symptoms with cancer or if the
result of Pap smears test gives an abnormal cells; however, it has a continue problem because there are few
doctors who know about colposcopy and it leads to misinterpretation. Therefore, in the last years various
proposals have emerged to solve this problem. The present study aims to identify the current state of the latest
research related to the detection of cervical cancer during the colposcopy test using the image evaluation. A
framework is proposed based on 3 research questions: (1) What techniques are used for image processing with
colposcopy to diagnose cervical cancer? (2) What are the factors that help diagnose cervical cancer during
colposcopy? And (3) What results corroborate or provide the diagnosis produced by the colposcopy test in the
detection of cervical cancer? One of the results proposes that the use of Convolution Neural Network (CNN)
improves the sensitivity of the diagnosis of cervical cancer, since it achieved greater precision in colposcopy
image processing. Furthermore, the diagnosis can be corroborated with the ―results‖ of the ―Biopsy‖ and ―Expert
Judgment‖.
Keywords: Colposcopy, Colposcopy techniques, Colposcopy image, Convolutional Neuronal Network.
References:
1. National Cancer Institute, ―Cervical Cancer Treatment (PDQ®)–Patient Version‖ 27 september 2019. [Online]. Available:
https://www.cancer.gov/types/cervical/patient/cervical-treatment-pdq
2. American Cancer Society, ―Test for Cevical Cancer‖ 5 december 2016. [Online]. Available: https://www.cancer.org/cancer/cervical-cancer/detection-diagnosis-staging/how-diagnosed.html#written_by [Last access: october 2019].
3. J. Ruiz, ―Pasado, presente y futuro de la colposcopia‖, Medigraphic, vol. 2, nº 2, april 2010.
4. E. Alvarez, ―Manual de la Clinica de Detección Temprana Colposcopia‖ 27 november 2010. [Online]. Available: https://www.paho.org/gut/index.php?option=com_docman&view=download&alias=225-manual-de-la-clinica-de-deteccion-temprana-
colposcopia&category_slug=temas-de-salud&Itemid=518
5. International Agency for Research on Cancer, ―Cancer Today‖ 2019. [Online]. Available: https://gco.iarc.fr/today/online-analysis-multi-
bars?v=2018&mode=cancer&mode_population=countries&population=900&populations=900&key=total&sex=2&cancer=39&type=0
&statistic=5&prevalence=0&population_group=0&ages_group%5B%5D=0&ages_group%5B%5D=17&nb_items=10&group_cancer=1&include_nmsc=1&include_nmsc_other=1&type_multiple=%257B%2522inc%2522%253Atrue%252C%2522mort%2522%253Afals
e%252C%2522prev%2522%253Afalse%257D&orientation=horizontal&type_sort=0&type_nb_items=%257B%2522top%2522%253
Atrue%252C%2522bottom%2522%253Afalse%257D&population_group_globocan_id= [Last access: october 2019]. 6. International Agency for Research on Cancer, ―Cancer Today‖ 2019. [Online]. Available: https://gco.iarc.fr/today/online-analysis-
multi-
bars?v=2018&mode=cancer&mode_population=countries&population=900&populations=604&key=total&sex=2&cancer=39&type=0&statistic=5&prevalence=0&population_group=0&ages_group%5B%5D=0&ages_group%5B%5D=17&nb_items=1&group_cancer=1
&include_nmsc=1&include_nmsc_other=1&type_multiple=%257B%2522inc%2522%253Atrue%252C%2522mort%2522%253Afalse
%252C%2522prev%2522%253Afalse%257D&orientation=horizontal&type_sort=0&type_nb_items=%257B%2522top%2522%253Atrue%252C%2522bottom%2522%253Afalse%257D&population_group_globocan_id= [Last access: octubre 2019].
7. L. Wong, D. Mauricio y G. Rodriguez, ―A systematic literature review about software requirements elicitation‖, Journal of
Engineering Science and Technology, vol. 12, nº 2, february 2017. 8. S. Boonlikit, ―Performance of the abbreviated Reid colposcopic index in prediction of high-grade lesions‖, International Journal of
Gynecology & Obstetrics, vol. 134, 2016.
9. S. Kushwah y B. Kushwah, ―Correlation of two colposcopic indices for predicting premalignant lesions of cervix‖, Journal of Mid-Life Health, vol. 8, 2017.
128-133
10. J. Louwers, A. Zaal, M. Kocken, J. Berkhof, E. Papagiannakis, P. Snijders, C. Meijer y R. Verheijen, ―The performance of dynamic
spectral imaging colposcopy depends on indication for referrals‖, Gynecologic Oncology, vol. 139, 2015. 11. H. Aydoğmuş y S. Aydoğmuş, ―Comparison of colposcopic biopsy results of patients who have cytomorphological normal but HPV
16-18 or other high-risk HPV subtypes positive‖, Asian Pacific Journal of Cancer Prevention, vol. 20, 2019.
12. P. J. Coronado y M. Fasero, ―Colposcopy combined with dynamic spectral imaging. A prospective clinical study‖, European Journal of Obstetrics & Gynecology and Reproductive Biology, vol. 196, 2016.
13. A. Kaufmann, C. Founta, E. Papagiannakis, R. Naik y A. Fisher, ―Standardized digital colposcopy with dynamic spectral imaging for
conservative patient management‖, Case Rep Obstet Gynecol, 2017. 14. M. T. Roensbo, A. Hammer y J. Blaakær, ―Can dynamic spectral imaging system colposcopy replace conventional colposcopy in the
detection of high‐grade cervical lesions?‖, Acta Obstetricia et Gynecologica Scandinavica, vol. 94, 2015.
15. S. G. Parra, A. M. Rodriguez, K. D. Cherry, R. A. Schwarz, R. M. Gowen, L. B. Guerra, A. M. Milbourne, P. A. Toscano, S. P. Fisher-Hoch, K. M. Schemeler y R. R. Richards-Kortum, ―Low-cost, high-resolution imaging for detecting cervical precancer in medically-
underserved areas of Texas‖, Gynecologic Oncology, vol. 154, 2019.
16. E. De Castro Hillmann, O. Moreira Bacha, M. Roy, G. Paris, D. Berbiche, V. Nizard y J. G. Lopes Ramos, ―Cervical digital photography: An alternative method to colposcopy‖ Gynecologic Oncology, vol. 14, nº 8, agosto 2019.
17. Y. Tanaka, Y. Ueda, A. Okazawa, M. Kakuda, S. Matsuzaki, E. Kobayashi, K. Yoshino y T. Kimura, ―'Smartscopy' as an alternative
device for cervical cancer screening: a pilot study‖, BMJ Innov, vol. 3, 2017. 18. Y. Tanaka, Y. Ueda, R. Kakubare, M. Kakuda, S. Kubota, S. Matsuzaki, A. Okazawa, T. Egawa-Takata, S. Matsuzaki, E. Kobayashi y
T. Kimura, ―Histologic correlation between smartphone and coloposcopic findings in patients with abnormal cervical cytology:
experiences in a tertiary referral hospital‖, American Journal of Obstetrics and Gynecology, vol. 221, 2019. 19. C. Gallay, A. Girardet, M. Viviano, R. Catarino, A. C. Benski, P. L. Tran, C. Ecabert, J. P. Thiran, P. Vassilakos y P. Petignat,
―Cervical cancer screening in low-resource settings: a smartphone image application as an alternative to colposcopy‖, Int J Womens
Health, vol. 9, 2017. 20. S. K. Saini, V. Bansal, R. Kaur y M. Juneja, ―ColpoNet for automated cervical cancer screening using colposcopy images‖ Machine
Vision and Applications, vol. 31, nº 15, 25 march 2020.
21. C. Buiu, V.-R. Dânâilâ y C. N. Râdutâ, ―MobileNetV2 ensemble for cervical precancerous lesions classification‖ Processes, vol. 8, 16 may 2020.
22. Z. Yue, D. Shuai, Z. Weidong, W. Hao, M. Jie, Y. Zhang y Y. Zhang, ―Automatic CIN grades prediction of sequential cervigram image
using LSTM with multistate CNN features‖ IEEE Journal of Biomedical and Health Informatics, vol. PP, pp. 1-1, 13 june 2019. 23. T. Zhang, Y.-m. Luo, P. Li, Y.-z. Du, P. Sun, B. Dong y H. Xue, ―Cervical precancerous lesions classification using pre-trained densely
connected convolutional networks with colposcopy images‖ Biomedical Signal Processing and Control, vol. 55, january 2020.
24. M. A. Godfrey, M. Nikilopoulos, N. Povolotskaya, R. Chenoy y R. Wuntakal, ―Post-coital bleeding: What is the incidence of significant gynaecological pathology in women referred for colposcopy?‖, Sexual and Reproductive Healthcare, vol. 22, 2019.
25. A. T. Marujo, L. Correia, M. Brito, T. Paula y J. Borrego, ―ASC-H cytological result: clinical relevance and accuracy of colposcopy in
predicting high-grade histological lesions—a 7-year experience of a single institution in Portugal‖, Journal of the American Society of Cytopathology, vol. 6, 2017.
26. X. Zhang, Y. Dou, M. Wang, Y. Li, F. Wang, X. Xie y X. Wang, ―A retrospective analysis on 1901 women with high grade cervical
intraepithelial neoplasia by colposcopic biopsy‖, vol. 217, 2017. 27. V. J. M. Pop, T. Wouters, R. L. M. Bekkers, V. R. M. Spek y J. M. J. Piek, ―Development of the patient‘s experience and attitude
colposcopy eindhoven 1uestionnaire (PEACE-q)‖, BMC Health Serv Res, vol. 19, 2019. 28. D. Beyer, A. Rody, C. Cirkel, N. Schmidt y K. Neumann, ―Mandatory colposcopic findings of severe cervical dysplasia. Are there key-
signs that need our special attention?‖, Journal of Gynecology Obstetrics and Human Reproduction, vol. 46, 2017.
29. A. Ciavattini, M. Serri, J. Di Giuseppe, C. A. Liverani, M. G. Fallani, D. Tsiroglou, M. Papiccio, G. Delli Carpini, A. Pieralli, N. Clemente y F. Sopracordevole, ―Reliability of colposcopy during pregnancy‖, European Journal of Obsterics & Gynecology and
Reproductive Biology, vol. 229, 2018.
30. I. Baasland, B. Haguen, C. Vogt, M. Valla y P. R. Romundstad, ―Colposcopy and additive diagnostic value of biopsies from colposcopy‐negative areas to detect cervical dysplasia‖, Acta Obstetricia et Gynecologica Scandinavica, vol. 95, 2016.
31. B. Abolafia-Cañe, J. Á. Monserrat-Jordán, J. Cuevas-Cruces y J. E. Arjona-Berral, ―Diagnóstico precoz del cáncer de cérvix:
correlación entre citología, colposcopia y biopsia‖ Revista Española de Patología, vol. 51, nº 3, july - september 2018.
23.
Authors: Mohanapria M K, Rajambal K
Paper Title: Switched-Capacitor based Quadruple Boost 9-Level Inverter Topology with Multicarrier PWM
Technique
Abstract: This paper presents Switched-Capacitor based Quadruple Boost 9-Level Inverter topology which
possesses several advantages over conventional MLI types, SCMLI topologies. The self-voltage balancing
capability of switched capacitors which reduces complexity in control is compared with existing SCMLI
topology. The simulation study of the SCQB9LI topology is carried out. Switched capacitors are designed for
self-voltage balancing nature. The MLS-PWM strategy is employed for generating gate pulses. The performance
of the chosen inverter topology is investigated for different modulation indices and its results are presented. A
comparative study with conventional SCMLI topologies proves the effectiveness of SCQB9LI topology.
Keywords: Multicarrier Level Shifted Pulse Width Modulation (MLS-PWM) technique, Quadruple Boost,
Self-Voltage balance, Switched-Capacitor based Quadruple Boost 9-Level Inverter (SCQB9LI).
References:
1. L. Tolbert, F.-Z. Peng, and T. Habetler, ―Multilevel converters for large electric drives,‖ IEEE Trans. Ind. Applicat., vol. 35, pp. 36–44, Jan./Feb. 1999.
2. J. S. Lai and F. Z. Peng, ―Multilevel converters–A new breed of power converters,‖ IEEE Trans. Ind. Applicat., vol. 32, pp. 509–517,
May/June 1996.
3. Rodriguez, J.; Bernet, S.; Wu, B.; Pontt, J.O.; Kouro, S.; "Multilevel Voltage-Source-Converter Topologies for Industrial Medium-
Voltage Drives," Industrial Electronics, IEEE Transactions on, vol.54, no.6, pp.2930-2945, Dec. 2007.
4. P. P. Rodriguez, M. M. D. Bellar, R. R. S. Munoz-Aguilar, S. S. Busquets- ˜ Monge, and F. F. Blaabjerg, ―Multilevel clamped multilevel converters (MLC),‖ IEEE Trans. Power Electron., vol. 27, no. 3, pp. 1055–1060, Mar. 2012.
5. K. Ilves, A. Antonopoulos, S. Norrga, and H.-.P. Nee, ―A new modulation method for the modular multilevel converter allowing
fundamental switching frequency,‖ IEEE Trans. Power Electron., vol. 27, no. 8, pp. 3482–3494, Aug. 2012. 6. M. F. Kangarlu and E. Babaei, "A generalized cascaded multilevel inverter using the series connection of sub multilevel inverters,"
IEEE Trans. Power Electron., vol. 28, no. 2, pp. 625–636, Feb. 2013. 7. Y. Hinago and H. Koizumi, "A switched-capacitor inverter using series/parallel conversion with an inductive load," IEEE Trans. Ind.
Electron., vol. 59, no. 2, pp. 878–887, 2012.
8. J. Liu, K. Cheng, and Y. Ye, "A cascaded multilevel inverter based on switched-capacitor for high-frequency ac power distribution system," IEEE Tran. Power Electron., vol. 29, no. 8, pp. 4219–4230, 2014.
134-139
9. J. Liu, W. Lin, J. Wu, and J. Zeng, ―A novel nine-level quadruple boost inverter with inductive-load ability,‖ IEEE Tran. Power
Electron., pp. 1–1, 2018. 10. N. Sandeep, Jagabar Sathik Mohammed Ali, Udaykumar R. Yaragatti, and Krishnasamy Vijayakumar, "Switched-Capacitor Based
Quadruple Boost Nine-Level Inverter", IEEE Trans. Power Electron., Volume: 34, Issue: 8, Aug. 2019.
11. Taghvaie, J. Adabi, and M. Rezanejad, ―A self-balanced step-up multilevel inverter based on switched-capacitor structure,‖ IEEE Trans.
Power Electron., vol. 33, no. 1, pp. 199–209, 2018.
12. J. Zeng, J. Wu, J. Liu, and H. Guo, "A quasi-resonant switched-capacitor multilevel inverter with self-voltage balancing for single-phase
high-frequency ac microgrids," IEEE Trans. Ind. Inform., vol. 13, no. 5, pp. 2669–2679, 2017. 13. Z. Zheng, K. Wang, L. Xu, and Y. Li, ―A Hybrid Cascaded Multilevel Converter for Battery Energy Management Applied in Electric
Vehicles,‖ IEEE Trans. Power Electron., vol. 29, no. 7, pp. 3537–3546, 2014.
14. J. S. M. Ali and V. Kumar, ―Compact switched capacitor multilevel inverter (cscmli) with self voltage balancing and boosting ability,‖ IEEE Trans. Power Electron., pp. 1–1, 2018.
15. S. S. Lee, M. Sidorov, C. S. Lim, N. R. N. Idris, and Y. E. Heng, ―Hybrid cascaded multilevel inverter (hcmli) with improved
symmetrical 4-level submodule,‖ IEEE Trans. Power Electron., vol. 33, no. 2, pp. 932–935,2018.
24.
Authors: Veena Malik, S. C. Dharmadhikari
Paper Title: Enriching E-Commerce Fraud Detection by using Machine Learning
Abstract: As there has been a proliferation of the internet platform, it has been increasingly getting affordable
for a lot of individuals. The rise has been instrumental in achieving several services including the E-commerce
platform. This has led to an unprecedented increase in the amount of fraud that is being committed on this
platform. The fraud that is being committed on the E-commerce platforms is very different from the frauds
committed on other platforms online. Numerous researches have been performed to combat the evils of credit
card frauds and money laundering rings. But there is a severe lack of research on the fraud that is committed on
the E-commerce platform. Therefore, this research paper defines an innovative approach for the identification of
fraud on E-commerce platforms through the implementation of machine learning approaches. The presented
technique utilizes Linear Clustering, Entropy Estimation and Frequent itemset mining in addition to the
inclusion of Artificial Neural Networks, Hypergraph formation and Fuzzy classification. The implementation of
this system will give more security for E-commerce platform-based transactions by identifying fraudulent
activities with better efficiency. The methodology has been tested extensively through rigorous experimentation
to evaluate the performance metrics which yielded significantly positive results.
Keywords: Linear Clustering, Entropy Estimation, Frequent Itemset, Hyper graph, Artificial Neural Network,
Fuzzy Classification.
References:
1. Elina Bumbiere, ―The basic of Ecommerce Fraud-What it is and how to manage,‖ [Online] Available:http//www.printful.com/blog/the-
basic-of- ecommerce-fraud-what-is-it-and-how-to-manage-it/. 2. V. Malik and Dr. S. C. Dharmadhikari, ―Analysis of fraudulent Transaction Detection Techniques based on Customers Behavioural
Patterns,‖ CIIT International Journal of Artificial Intelligent System and Machine Learning, Vol. 11, No. 12, pp. 219-224,
December2019. 3. W.H. Ju and Y. Vardi, ―A hybrid high-order Markov chain model for computer intrusion detection,‖ Journal of Computational and
Graphical Statistics, vol.10, pp.277-295, 2004.
4. T. Guo, and G. Li, ―Neural data mining for credit card fraud detection‖, International Conference on Machine Learning and Cybernetics, pp.3630-3634, July 2008.
5. R. Chen, S. Luo, X. Liang and V.C.S. Lee, ―Personalized Approach Based on SVM and ANN for Detection Credit Card Fraud‖,
International Conference on Neural Networks and brain, pp. 810-815, April 2006. 6. G. Mota, J. Fernandes and O. Belo, ―Usage signature and applications analysis an alternative method for preventing fraud in
ecommerce applications,‖ Proc. IEEE International Conference on data science and Advance Analytics, pp.203-208, October 2014.
7. N. Kimoto and Y. Endo, ―On Linear Clustering with Constraints on Cluster Size,‖ Joint International Conference on Soft Computing and Intelligent Systems and International Symposium on Advanced Intelligent Systems, pp. 832-836, December 2018.
8. G. Ciuperca, V. Girardin and L. Lhote, ―Computation and Estimation of Generalized Entropy rates for Denumerable Markov Chains,‖
IEEE Transactions on Information theory vol. 57, July 2011. 9. T. Murata and H. Ishibuchi, ―Adjusting Membership Functions of Fuzzy Classification Rules by Genetics Algorithms,‖ Proc. of IEEE
International Conference on Fuzzy Systems, 1995.
10. S. Surbhi and Sanjeev Kumar, ―Fraud Detection during Money Transaction and Prevention,‖ International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT 2019).
11. R. Rambola, P. Varshney and P. Vishwakarma, ―Data Mining Techniques for Fraud Detection in Banking Sector,‖ International
Conference on Computing Communication and Automation (ICCCA 2018). 12. J. Kingston, ―Representing, Reasoning and Predicting Fraud using Fraud Plans,‖ International Conference on Research Challenges in
Information Science (RCIS 2017).
13. O. Elrajubi, A. Elshawesh and M. Abuzaraida, ―Detection of Bypass Fraud based on Speaker Recognition‖, International Conference on Information Technology (ICIT 2017).
14. V. Mareeswari and G. Gunasekaran, ―Prevention of Credit Card Fraud Detection based on HSVM,‖ International Conference on
Information Communication and Embedded System (ICICES 2016). 15. E. Tarmazakov and D. Silnov, ―Modern Approaches to Prevent Fraud in Mobile Communications Networks,‖ IEEE Conference of
Russian Young Researchers in Electrical and Electronic Engineering (EIConRus 2018).
16. X. Min and R Lin, ―K-Means Algorithm: Fraud Detection Based on Signaling Data,‖ IEEE World Congress on Service, 2018.
17. S. Delecourt and Li Guo, ―Building a robust mobile payment fraud detection system with adversarial examples,‖ IEEE Second
International Conference on Artificial Intelligence and Knowledge Engineering (AIKE 2019).
18. A. Kasgari, M. Taghavifard, and S. Kharazi ―Price manipulation fraud detection by Intelligent Visual Fraud surveillance system,‖ International Conference on Control, Decision and Information Technologies, 2019.
19. M. Zamini and G Montazer, ―Credit Card Fraud Detection using autoencoder based clustering,‖ International Symposium on
Telecommunications, IST, 2018. 20. K. Yang, ―A Memory-Enhanced Framework for Financial Fraud Detection,‖ IEEE International Conference on Machine Learning and
21. Applications, 2018.
22. B. Omair and A. Alturki, ―Taxonomy of Fraud Detection Metrics for Business Processes,‖ IEEE Access, 2020. 23. N. Malini and M. Pushpa, ―Analysis on Credit Card Fraud Identification Techniques based on KNN and Outlier Detection,‖
International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEEICB 2017).
140-146
24. I. Benchaji, S. Douzi and B. Ouahidi, ―Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for credit card fraud
detection,‖ Cyber Security in Networking Conference (CSNet), 2018. 25. Y. Chen and C. Wu, ―On Big Data-based Fraud Detection Method for Financial Statements of Business Groups,‖ IIAI International
Congress on Advanced Applied Informatics, 2017.
26. H. Weng, Z. Li, S. Ji, C. Chu, H. Lu, T. Du, and Q. He, ―Online E-Commerce Fraud:A Large-scale Detection and Analysis,‖
International Conference on Data Engineering, IEEE ,2018.
25.
Authors:
Suspended Paper Title:
Abstract:
Keywords:
References:
147-152
26.
Authors: S.Rajeswari, S.A.Arunmozhi, Y.Venkataramani
Paper Title: Q- Learning Algorithm with Network Coding in Multi-Path Transfer Protocol for Wireless Mesh
Network
Abstract: In a wireless mesh network, the network coding algorithm used to improve network efficiency. In
this paper, we have implemented the Q-learning algorithm with CSMA/CA as in distributed co-ordination
function along with multi-path transfer protocol (MPTP). The functioning of CSMA/CA is based on physical
carrier sensing. Q-learning algorithm, along with network coding, is implemented to achieve better throughput.
Our proposed method has used to reduce the packet loss and to minimize the end to end delay of the network
communication. Also, it will improve the possibility of receiver buffer blocking.
Keywords: Network Coding, Q-Learning Algorithm, Mptp, Ieee802.11 Dcf.
References:
1. Amerimehr.M and Ashtiani.F, ―Delay and Throughput Analysis of a Two-Way Opportunistic Network Coding-Based Relay
Network,‖ IEEE Transactions on Wireless Communications, vol. 13, no. 5, (2014), pp. 2863–2873
2. Ahlswede.R, Cai.N and Yeung.R, ―Network Information Flow,‖ IEEE Transactions on Information Theory, vol. 46, no. 4,
(2014),pp. 1204–1216.
3. Ashtiani.F, Amerimehr.M.H and Iraj.M.B, ―An Analytical Approach for Throughput Evaluation of Wireless Network Coding,‖ in
Proceedings of the IEEE International Conference on Communications (ICC‘09), (2009) pp. 1696–1700.
4. Chiu.M Le.J and Lui.J , ―On the Performance Bounds of Practical Wireless Network Coding,‖ IEEE Transactions on Mobile
Computing, vol. 9, no. 8, (2010), pp. 1134–1146
5. Denno.S, Morikura.M, Hirano.T, Sugiyama.T, and Umehara.D, ―Wireless Network Coding in Slotted ALOHA with Two-hop
Unbalanced Traffic,‖ IEEE Journal on Selected Areas in Communications, vol. 27, no. 5 (2013), pp. 647–661.
6. Denno.S, Morikura.M, Sugiyama.T, and Umehara.D, ―Performance Analysis of Slotted ALOHA and Network Coding for Single-
Relay Multi-User Wireless Networks,‖ Ad Hoc Networks, vol. 9, no. 2, (2011), pp. 164 – 179.
7. Ephremides.A and Sagduyu.Y, ―On Broadcast Stability Region in Random Access through Network Coding,‖ in Proceedings of the
44th Annual Allerton Conference on Communication, Control, and Computing, vol. 15, no. 1, (2006),pp. 298–313.
8. Fu.L, Lin.S, Wang.X and Xie.J, ―Hybrid Network Coding for Unbalanced Slotted ALOHA Relay Networks,‖ IEEE Transactions
on Wireless Communications, vol. 15, no. 1, (2016), pp. 298–313.
9. Fu.L and Lin.S,―Unsaturated Throughput Analysis of Physical Layer Network Coding Based on IEEE 802.11 Distributed Coordination
Function,‖ IEEE Transactions on Wireless Communications, vol. 12, no. 11, (2013),pp. 5544–5556.
10. Fragiadakis.C, Georgiadis.L, Paschos.G and Tassiulas.L, ―Wireless Network Coding with Partial Overhearing Information,‖ in
Proceedings of IEEE INFOCOM, (2013), pp. 2337–2345.
11. Geordiadis.L and Xiang.Y, ―A New Wireless Multicast Queuing Design Using Network Coding and Data-Flow Model,‖ IEEE
Communications Letters, vol. 20, no. 8, (2016), pp. 1603–1606.
12. Guo.S, Ji.H, Xiang.Y and Zeng.D, ―On the Throughput of Two Way Relay Networks Using Network Coding,‖ IEEE Transactions on
Parallel and Distributed Systems, vol. 25, no. 1, (2014), pp. 191–199.
13. Jamali.V, Schober.R and Zlatanov.N, ―Bidirectional Buffer-Aided Relay Networks With Fixed Rate Transmission-Part II: Delay
Constrained Case,‖ IEEE Transactions on Wireless Communications, vol. 14, no. 3, (2015), pp. 1339–1355.
14. Li.H and Moghadam.N, ―Queue Stability Analysis in Network Coded Wireless Multicast Network,‖ IEEE Communications Letters,
vol. 20, no. 5, (2016), pp. 950–953.
15. Sagduyu.Y and Ephremides.A, ―Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks,‖
IEEE Transactions on Information Theory, vol. 54, no. 2, (2008), pp. 554–571
153-157
27.
Authors: Elmer Diaz, Andres Ccopa, Lenis Wong
Paper Title: Cervical Cancer: Machine Learning Techniques for Detection, Risk Factors and Prevention
Measures
Abstract: Cervical Cancer is considered the fourth most common female malignancy worldwide and represents
a major global health challenge. As a result, in recent years, various proposals and researches have been
conducted. This study aims to analyze the data presented in current researches regarding cervical cancer and
contribute to future research, all through the framework of literature review, based on 3 research questions: Q1:
What are the risk factors that cause cervical cancer? Q2: What preventive measures are currently established for
cervical cancer? and, Q3: What are the techniques to detect cervical cancer? Findings show that detection
techniques are complementary since they are categorized under machine learning. Therefore, we recommend
that further study be promoted in these techniques as they are helpful in the detection process. In addition, risk
factors can be considered for a greater scope in detection, such as HPV infection, since it is the most relevant
factor for the development of cervical cancer. Finally, we suggest to conduct further research on preventive
158-163
measures for cervical cancer.
Keywords: Cervical cancer, Cervical cancer diagnosis, Machine learning.
References:
1. Zur Hausen, H, (2002), ―Papillomaviruses and cancer: from basic studies to clinical application‖. Nature Reviews Cancer, 2(5), 342–
350. doi:10.1038/nrc798.
2. MINSA, (2016) ―Guía de práctica clínica para la prevención y manejo del cancer de cuello uterino‖. Available: ftp://ftp2.minsa.gob.pe/descargas/Prevencion_salud/guia_tecnica_cancer_cuello_utero.pdf
3. P. Cohen et al., ―Cervical Cancer‖ in The Lancent, vol. 393, no. 10167, pp. 169-182, Jan 2019, doi: 10.1016/S0140-6736(18)32470-X.
4. L. Wong, D. Mauricio and G. Rodriguez, ―A systematic literature review about software requirements elicitation‖ in Journal of Engineering Science and Technology, vol. 12, no 2, pp. 296-317, Feb. 2017.
5. B.A Kitchenham and S. Charters, ―Guidelines for performing systematic literature reviews in software engineering version 2.3‖, 2014, from http://www.elsevier.com/__data/promis_misc/ 525444sy stematicreviewsguide.pdf
6. T. Stewart, J. Moodley and F. Walter, ―Population risk factors for late-stage presentation of cervical cancer in sub-Saharan Africa‖, in
Cancer Epidemiology, vol. 53, pp. 81-92, 2018, doi: 10.17863/CAM.17958. 7. M. Fani et al., ―Correlation of human papillomavirus 16 and 18 with cervical cancer and their diagnosis methods in Iranian women: A
systematic review and meta-analysis‖ Current Problems in Cancer, vol. 44, no. 1, 2019, doi: 10.1016/j.currproblcancer.2019.06.008.
8. P. Sharma and S. Pattanshetty ―A study on risk factors of cervical cancer among patients attending a tertiary care hospital: A case-control study‖, Clinical Epidemiology and Global Health, vol. 6, no. 2, pp. 83–87, 2017, doi. 10.1016/j.cegh.2017.10.001.
9. H. Xu et al., ―Hormonal contraceptive use and smoking as risk factors for high-grade cervical intraepithelial neoplasia in unvaccinated
women aged 30–44 years: A case-control study in New South Wales, Australia‖, in Cancer Epidemiology, vol. 55, pp. 162–169, 2018, doi: 10.1016/j.canep.2018.05.013.
10. D. Zahras and Z. Rustam, "Cervical Cancer Risk Classification Based on Deep Convolutional Neural Network," 2018 International
Conference on Applied Information Technology and Innovation (ICAITI), Padang, Indonesia, 2018, pp. 149-153, doi: 10.1109/ICAITI.2018.8686767.
11. K. Okunade et al., ―Comparative analysis of serum trace element levels in women with invasive cervical cancer in Lagos, Nigeria‖ in
Pan African Medical Journal, vol. 31, no 194, 2018, doi: 10.11604/pamj.2018.31.194.14425. 12. M. Smith et al., ―Potential for HPV vaccination and primary HPV screening to reduce cervical cancer disparities: Example from New
Zealand‖ in Vaccine, vol. 36, no. 42, pp. 6314-6324, 2018, doi: 10.1016/j.vaccine.2018.08.063.
13. S. Almazrou, B. Saddik and H. Jradi, ―Knowledge, attitudes, and practices of Saudi physicians regarding cervical cancer and the human papilloma virus vaccine‖ in Journal of Infection and Public Health, vol. 13, no. 4, pp. 584-590, 2019, doi: 10.1016/j.jiph.2019.09.002.
14. R. Sankaranarayanan, ―HPV vaccination: The most pragmatic cervical cancer primary prevention strategy‖, in International Journal of
Gynecology & Obstetrics, vol. 131, pp. 33–35, 2015, doi: 10.1016/j.ijgo.2015.02.014. 15. J. Firmino-Machado et al., ―A 3-step intervention to improve adherence to cervical cancer screening: The SCAN randomized controlled
trial‖ in Preventive Medicine, vol. 123, pp. 250-261, 2019, doi: 10.1016/j.ypmed.2019.03.025.
16. S. Mustafa, S. Adeshina, M. Dauda and W. Soboyejo, "Classification of cervical cancer tissues using a novel low cost methodology for effective screening in rural settings," 2014 11th International Conference on Electronics, Computer and Computation (ICECCO),
Abuja, 2014, pp. 1-4, doi: 10.1109/ICECCO.2014.6997552.
17. S. Kaaviya, V. Saranyadevi and M. Nirmala, "PAP smear image analysis for cervical cancer detection," 2015 IEEE International Conference on Engineering and Technology (ICETECH), Coimbatore, 2015, pp. 1-4, doi: 10.1109/ICETECH.2015.7275029.
18. M. Kuko and M. Pourhomayoun, "An Ensemble Machine Learning Method for Single and Clustered Cervical Cell Classification,"
2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI), Los Angeles, CA, USA, 2019, pp. 216-222, doi: 10.1109/IRI.2019.00043.
19. K. V. Bhuvaneshwari, and B. Poornima ―Cervical Cancer Cell Identification & Detection Using Fuzzy C Mean and K nearest Neighbor
Techniques‖ in International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 8, no. 10, pp. 1080-1084, 2019, doi: 10.35940/ijitee.I7892.0881019.
20. S. Nehra, J. L. Raheja, K. Butte and A. Zope, "Detection of Cervical Cancer using GLCM and Support Vector Machines," 2018 6th
Edition of International Conference on Wireless Networks & Embedded Systems (WECON), Rajpura (near Chandigarh), India, 2018, pp. 49-53, doi: 10.1109/WECON.2018.8782065.
21. D. Kashyap et al., "Cervical cancer detection and classification using Independent Level sets and multi SVMs," 2016 39th International
Conference on Telecommunications and Signal Processing (TSP), Vienna, 2016, pp. 523-528, doi: 10.1109/TSP.2016.7760935. 22. Han Yeong Oh, Seong Hyun Kim and Dong Wook Kim, "A study on the development of diagnosis algorithm and application program
for early diagnosis of cervical cancer using cervix cell," Fourth edition of the International Conference on the Innovative Computing
Technology (INTECH 2014), Luton, 2014, pp. 37-40, doi: 10.1109/INTECH.2014.6927749.
23. M. Rohmatillah, S. H. Pramono, Rahmadwati, H. Suyono and S. A. Sena, "Automatic Cervical Cell Classification Using Features
Extracted by Convolutional Neural Network," 2018 Electrical Power, Electronics, Communications, Controls and Informatics Seminar
(EECCIS), Batu, East Java, Indonesia, 2018, pp. 382-386, doi: 10.1109/EECCIS.2018.8692888. 24. D. Sharma, A. Bhan and A. Goyal, "Cervical Cancer Screening in Pap Smear Images Using Improved Distance Regularized Level
Sets," 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, 2018, pp. 1445-1448, doi:
10.1109/ICOEI.2018.8553943. 25. A. Ghoneim, G. Muhammad and M. S. Hossain, ―Cervical cancer classification using convolutional neural networks and extreme
learning machines‖ in Future Generation Computer Systems, vol. 102, pp. 643-649, 2019, doi: 10.1016/j.future.2019.09.015. 26. M. Devi et al., ―Classification of Cervical Cancer Using Artificial Neural Networks‖, in Procedia Computer Science, vol. 89, pp. 465-
472, 2016, doi: 10.1016/j.procs.2016.06.105.
27. P. Makkonen et al., ―Impact of organized and opportunistic Pap testing on the risk of cervical cancer in young women – A case-control study from Finland‖ in Gynecologic Oncology, vol. 147, no. 3, pp. 601–606, 2017, doi: 10.1016/j.ygyno.2017.09.010.
28. N. Wentzensen et al., ―A prospective study of risk-based colposcopy demonstrates improved detection of cervical precancers‖, in
American Journal of Obstetrics and Gynecology, vol. 218, no. 6, pp. 604.e1–604.e8, 2018, doi: 10.1016/j.ajog.2018.02.009. 29. J. Jagtap et al., "Effective Screening and Classification of Cervical Precancer Biopsy Imagery," in IEEE Transactions on
NanoBioscience, vol. 16, no. 8, pp. 687-693, Dec. 2017, doi: 10.1109/TNB.2017.2728321.
30. Y. Song et al., ―Random biopsy in colposcopy-negative quadrant is not effective in women with positive colposcopy in practice‖ in
Cancer Epidemiology, vol. 39, no. 2, pp. 237–241, 2015, doi: 10.1016/j.canep.2015.01.008.
28.
Authors: Rasheed Saleem Abed
Paper Title: Al-Hadba Minaret in the Last 100 Years
Abstract: Al-Hadba minaret is located in a central location on the right side of the river Tigris within the city of
Mosul North of Iraq. It is one of the important heritage landmarks in Iraq, Mostly characterized by its curvature
and height. It was built before more than 800 years. Later, It was destroyed due to military actions in the summer
of 2017. Recently plans for reconstruction are going on. Accordingly, many different data has to be collected
164-166
and organized to help form a model closer to the original shape. Prior to its destruction, careful surveying was
performed to record the shape and movement of the minaret. This research provides a description of the results
of this work. For a century, the minaret leaning has been slowly growing closer to the danger point. Modern
construction techniques can be used to rebuild a more stable structure and avoid that movement.
Keywords: AlHadba minaret, Mosul heritage, leaning, deformation surveying.
References:
1. https://en.wikipedia.org/wiki/Great_Mosque_of_al-Nuri_(Mosul) retrieved on 20/7/2020. 2. M. T. H. Al-Layla, "Al-Hadbaa Minaret-problems and solutions," (Proceedings of symposium, 2011). in Arabic.
3. Al-Omari, A., Khalil, A. A., & Khattab, S. (2020). From in situ investigation to FEM analysis: Application of Al-Hadba minaret
foundation. In AIP Conference Proceedings (Vol. 2213 4. Al-Shaikh K.,(1979). Leaning Minarets of Mosul. J. Summer. No.31.
5. Lizzi, F., and G. Carnervale,(1981). The Static Restoration of the Leaning AL-Hadba Minaret in Mosul (Iraq), 3rd International
Symposium on Babylon, Ashor, and Haditha, Baghdad, Iraq. 6. Mahmood, M. N., and Sarsam, H.H., (1989). Leaning of Old Minarets in MOSUL City, International Conference on Case Histories in
Structural Failures, CHSF89, Singapore, pp G28-G39.
7. Abed, Rasheed. S. and Ghassan N. (2013). Measurements in Alhadba Minaret using Robotic Total Station. Eng.& Tech Journal, Vol.31, Part (A), No,5.
29.
Authors: R.Sravani, P.Deepak Reddy
Paper Title: V/C Digital Controlled DC-DC Converter
Abstract: In this paper, the switching of dc-dc converter using voltage/current digital control is proposed. It is
the combination of existed digital average voltage and digital average current controls. The stability analysis of
V/C digital controlled dc-dc converter is derived by using sampled data model. The transient analysis of V/C
digital controlled dc-dc converter is also derived by using z-domain small signal model. The proposed V/C
digital controlled dc-dc converter has over current protection, fast load transient response, no sub-harmonic
oscillations at any value of duty cycle, and wider stability range. The proposed system is analysed with a simple
buck converter. The output voltage and inductor current weighting factors influence the stability boundary and
transient performances of V/C digital controlled dc-dc converter. The stability analysis and transient analysis is
investigated and verified by circuit simulations.
Keywords: sampled data modelling, stability analysis, transfer function, transient analysis, z-domain small
signal modelling.
References:
1. K.-H. Cheng, C.-W. Su, and H.-H. Ko, ―A high-accuracy and highefficiency on-chip current sensing for current-mode control CMOS
DCDC buck converter,‖ in Proc. IEEE 15th Int. Conf. Electron. Circuits Syst., Aug./Sep. 2008, pp. 458–461.
2. Y.-C. Lin, C.-J. Chen, D. Chen, and B. Wang, ―A ripple-based constant on-time control with virtual inductor current and offset cancellation for DC power converters,‖ IEEE Trans. Power Electron., vol. 27, no. 10, pp. 4301–4310, Oct. 2012.
3. K. Yao, Y. Ren, and F. C. Lee, ―Critical bandwidth for the load transient response of voltage regulator modules,‖ IEEE Trans. Power
Electron., vol. 19, no. 6, pp. 1454–1461, Nov. 2004. 4. Y. Chi, X.-Q. Lai, and H.-X. Du, ―Fast transient response high-accuracy current-sensing technique for step-up DC–DC converter,‖
Electron. Lett., vol. 51, no. 7, pp. 577–579, Apr. 2015.
5. G. Zhou, J. Xu, and J. Wang, ―Constant-frequency peak-ripple-based control of buck converter in CCM: Review, unification, and duality,‖ IEEE Trans. Ind. Electron., vol. 61, no. 3, pp. 1280–1291, Mar. 2013.
6. R. Mammano, ―Switching power supply topology voltage mode vs. current mode,‖ Unitrode Corp., Merrimack, NH, USA, Unitrode
Design Note DN-62, 1994. 7. C.-S. Huang, C.-Y. Wang, J.-H. Wang, and C.-H. Tsai, ―A fast-transient quasi-V2 switching buck regulator using AOT control,‖ in
Proc. IEEE Asian Solid-State Circuits Conf., Nov. 2011, pp. 53–56.
8. C.-C. Fang and C.-J. Chen, ―Subharmonic instability limits for V2controlled buck converter with outer loop closed/open,‖ IEEE Trans. Power Electron., vol. 31, no. 2, pp. 1657–1664, Feb. 2016.
9. G. Zhou, S. He, X. Zhang, and S. Zhong, ―Critical output-capacitor ESR for stability of V2 controlled buck converter in CCM and
DCM,‖ Electron. Lett., vol. 50, no. 12, pp. 884–886, Jun. 2014. 10. D. M. Mitchell, ―An analytical investigation of current-injected control for constant-frequency switching regulators,‖ IEEE Trans.
Power Electron., vol. PE-1, no. 3, pp. 167–174, Jul. 1986.
11. W. Tang, F. C. Lee, and R. B. Ridley, ―Small-signal modeling of average current-mode control,‖ IEEE Trans. Power Electron., vol. 8, no. 2, pp. 112–119, Apr. 1993.
12. C. Restrepo, J. Calvente, A. Romero, E. Vidal-Idiarte, and R. Giral, ―Current-mode control of a coupled-inductor buck–boost DC–DC
switching converter,‖ IEEE Trans. Power Electron., vol. 27, no. 5, pp. 2536–2549, May 2012. 13. F. Wang, J. Xu, and B. Wang, ―Comparison study of switching DC-DC converter control techniques,‖ in Proc. IEEE Int. Conf.
Commun. Circuits Syst., Jun. 2006, pp. 2713–2717.
14. C. Mi, J. Xu, G. Zhou, and Y. Jin, ―On the stability of V2C controlled boost converter in continuous conduction mode,‖ in Proc. IEEE 6th Int. Power Electron. Motion Control Conf., May 2009, pp. 1300–1304.
15. W. Huang, ―A new control for multi-phase buck converter with fast transient response,‖ in Proc. IEEE 16th Annu. Appl. Power
Electron. Conf. Expo., Mar. 2001, pp. 273–279.
16. P. Cortés, M. P. Kazmierkowski, R. M. Kennel, D. E. Quevedo, and J. Rodríguez, ―Predictive control in power electronics and drives,‖
IEEE Trans. Ind. Electron., vol. 55, no. 12, pp. 4312–4324, Dec. 2008.
17. Z. Zhang et al., ―Predictive control with novel virtual-flux estimation for back-to-back power converters,‖ IEEE Trans. Ind. Electron., vol. 62, no. 5, pp. 2823–2834, May 2015.
18. J. Chen, A. Prodic, R. W. Erickson, and D. Maksimovic, ―Predictive digital current programmed control,‖ IEEE Trans. Power Electron.,
vol. 18, no. 1, pp. 411–419, Jan. 2003. 19. G. Zhou, J. P. Xu, and Y. Y. Jin, ―Improved digital peak voltage predictive control for switching DC–DC converters,‖ IET Power
Electron., vol. 4, no. 2, pp. 227–234, Feb. 2011.
20. G. Zhou, J. Xu, and Y. Jin, ―Elimination of subharmonic oscillation of digital-average-current-controlled switching DC–DC converters,‖ IEEE Trans. Ind. Electron., vol. 57, no. 8, pp. 2904–2907, Aug. 2010.
21. X. Liu, G. Zhou, M. Leng, and S. Zhou, ―Digital average voltage control for switching DC-DC converters,‖ in Proc. IEEE8th Int. Power
167-175
Electron. Motion Control Conf., May 2016, pp. 1156–1160.
22. J. Xu, G. Zhou, and M. He, ―Improved digital peak voltage predictive control for switching DC–DC converters,‖ IEEE Trans. Ind. Electron., vol. 56, no. 8, pp. 3222–3229, Aug. 2009.
23. G. Zhou, J. Xu, J. Wang, and Y. Jin, ―Comparison study on digital peak current, digital peak voltage, and digital peak voltage/peak
current controlled buck converter,‖ in Proc. IEEE 4th Conf. Ind. Electron. Appl., May 2009, pp. 799–804.
24. G. Feng, E. Meyer, and Y.-F. Liu, ―A new digital control algorithm to achieve optimal dynamic performance in DC-to-DC converters,‖
IEEE Trans. Power Electron., vol. 22, no. 4, pp. 1489–1498, Jul. 2007.
25. P. Karamanakos, T. Geyer, and S. Manias, ―Direct voltage control of DC-DC boost converters using model predictive control based on enumeration,‖ in Proc. IEEE 15th Int. Power Electron. Motion Control Conf., Sep. 2013, pp. DS2c.10-1–DS2c.10-8.
26. L. Cheng, P. Acuna, R. P. Aguilera, M. Ciobotaru, and J. Jiang, ―Model predictive control for DC-DC boost converters with constant
switching frequency,‖ in Proc. IEEE 2nd Annu. Southern Power Electron. Conf., Auckland, New Zealand, Dec. 2016, pp. 1–6. 27. R. Redl and J. Sun, ―Ripple-based control of switching regulators— An overview,‖ IEEE Trans. Power Electron., vol. 24, no. 12, pp.
2669–2680, Dec. 2009.
28. G. F. Franklin, J. D. Powell, and M. L. Workman, Digital Control of Dynamic Systems, 3rd ed. Reading, MA, USA: Addison-Wesley, 1998.
29. K.-H. Cheng, C.-W. Su, and H.-H. Ko, ―A high-accuracy and highefficiency on-chip current sensing for current-mode control CMOS
DCDC buck converter,‖ in Proc. IEEE 15th Int. Conf. Electron. Circuits Syst., Aug./Sep. 2008, pp. 458–461. 30. Guohua Zhou, hongbo zhao, W.Z, S.Xu ―Digital average voltage/ digital average current predictive control for switching dc-dc
converters,‖ IEEE Journal of emerging and selected topics in power electronics, vol.6, no.4, December 2018.
30.
Authors: Ponraj A, Aswin Kumar M, Balasubramaniam AS, Giridhar K
Paper Title: Smart Warehouse Governance using AI and Raspberry Pi
Abstract: Sorting is the process of systematic selection and arrangement. Sorting involves intense labor work.
The use of Artificial Intelligence in recognizing the objects by their color makes the process of sorting
completely autonomous. Modern Industries require modern solutions for the problems encountered during the
process of sorting. With the advent of Artificial Intelligence, the machines that can recognize an object by their
color proves to be a primary solution that can completely automate the process of sorting. This paper presents a
five-axis arm mounted on a robotic model that makes use of a color sorting technique. It performs pick and place
operations in real-time. The color sorting technique detects the color of the object in the frame captured by the
camera. The frame size is used to detect the position of the object in the real world. The robot model moves
according to the frame size of the object. Raspberry Pi microcontroller drives the servo motor and dc motor to
move the five-axis arm and the robotic model to sort and perform pick and place operation based on their color.
The color sorting algorithm is based on the Hue-Saturation-Value model. This model finds its application in
places where sorting is done based on color and not the object itself. For example, it is used to sort objects like
different colored clothes, food items, etc. It also finds its application in very large scale warehouses such as
Amazon, Flipkart, etc which focusses on smart automated warehouses that reduce the labor requirements.
Keywords: Microcontroller, Gripper, Servo motors, Webcam, DC motors, Robotic arm, Image processing
References:
1. Goldy Katal, Saahil Gupta, Shitij Kakkar, ―Design and Operation of Synchronized Robotic Arm‖, IJRET: International Journal of
Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308, Volume: 02 Issue: 08 | Aug-2013.
2. Minu Mariya Thomas, Resmi Jose, Sumeesh V.R, Tony George,‖ Objecto-Sortometer‖ International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 p-ISSN: 2395-0072 Volume: 03 Issue: 03 | Mar-2016
3. Lim jie shen*, Irda hassan ‖Design and Development of Color Sorting Robot‖ EURECA 2014 Special Issue January (2015).
4. Peng An, (2016), ―Obstacle avoidance strategy of mobile robot based on wireless sensor networks‖, International Journal of Online and Biomedical Engineering, Vol 12, No11.
5. Rodica Holonec, (2008), ―An Automated Sorting System Based on Virtual Instrumentation Techniques‖, International Journal of
Online and Biomedical Engineering, Vol 4.
176-179
31.
Authors: José Luis Hernández Corona, Ernesto Mendoza Vázquez, Alejandra Ortiz Castro, Amador Arroyo
López, Moisés Martínez Aguirre
Paper Title: Implementation of an Automated System in the Measurement of Temperature in Broken Dynamic
Equipment
Abstract: This article presents a titration project describing the implementation in the rotodynamic equipment
of an economical automated temperature module, as a preventive solution for future failures caused by the lack
of analysis in the increase or decrease in temperature. The project is currently contextualized in the area of
industry, first, providing background to frame the importance of temperature control and measurement and also
know what its evolution has been like. Immediately focuses on explaining the theoretical basis for giving context
to the reader. For the purpose of detecting the increase or decrease of heat in machinery by implementing a
monitoring system. The development of the project is based on the use of an LM35 transistor that connected to
an Arduino Uno through various cables, will display the temperature measurement and make interface of the
obtained results that will be reflected in a 2x16 LCD screen. The project is applied in a prototype bench in three
key parts of the pulley, and in the two bearings to make the simulations, then perform corresponding tests and
check that theory. A simple and lower cost system, but above all efficient that meets the expectations of the
problem presented.
Keywords: Control, automation, electromechanical failures, Signals, Simulation.
References:
1. Albañil, HH, & Espejo Mora, E. (2002). Fracture Mechanics And Failure Analysis. Bogotá: National University of Colombia.
2. Coltters, R. (August 20, 2013). Thermal fatigue - effect of temperature. Obtained from
Metfsusion:https://metfusion.wordpress.com/2013/08/20/fatiga-termica/ .Consult Friday, June 12. 3. Granda, G. (April 24, 2020). The reason. Main Models of Thermal graphic cameras.
180-183
4. How to prevent overheating in heavy machinery? (January 10, 2018). Obtained from Bardhal,
industry:https://www.bardahlindustria.com/blog/page/57/ .Retrieved Friday, June 12. 5. "Protection systems and safety devices in machinery and equipment used in workplaces" Official Mexican Standard, NOM-004-STPS-
199, Official Gazette of the Federation, May 31, 1999.
6. Enriquez Harper G. [Ed.1]. (2004). Fundamentals of electric motor control in industry. Mexico City. Mexico: Limusa p. (125,150).
7. Villena, R. The protector of Tools. Extremadura The Newspaper obtained
fromhttps://www.elperiodicoextremadura.com/noticias/almendralejo/protector-herTools_1236008.html, accessed June 5, 2020.
8. CDMX Electronics, (2020). LM35 temperature sensor obtained from:https://www.cdmxelectronica.com/producto/sensor-de-temperatura-lm35/
9. Montero, Á. G. (2015). Electronics I An innovative, simple, easy-to-use system that can revolutionize data acquisition and process
control: fast, simple, intuitive, easy. Research and Science. obtained from:https://www.investigacionyciencia.es/blogs/fisica-y-quimica/9/posts/electrnica-libre-i-12878
10. Educate for change. (2020). Schematic of the complete assembly of the Prototype. Obtained
from:https://educarparaelcambio.com/arduino/reto-4-liquid-crystal-display-pantalla-lcd/
32.
Authors: Alex R Mathew
Paper Title: Threats and Protection on E-Sim
Abstract: Threats involve various risks and threats are associated with the embedded SIM technology, for
instance, the Internet of things (IoT) identity. IoT refers to the working capabilities enabling the allocation of
unique identifiers (UID) to effectively connect with the related devices thus enhancing communication. An e-
SIM application cannot produce reliable and actual data used to obtain the subscriber‘s anticipated outcome. The
SIM technology does not provide some reliable data that can be employed by the user to formulate some serious
productive outcomes. Failure by the technology to process and automatically provide the user with the
notification suppose of any infringement or hacking. SIM-jacking is the other notable threats facing the
embedded universal integrated connectivity card (e-UICC). Incompetent Log Rhythm Al Engine influences the
fraudster hacking experience due to failure protections within the operational surrounding. The e-SIM
technology system lacks timely threat, risk, and other various vital operations predictability to react to the
experienced unbearable operations challenges induced by the fraudsters. Similarly, the embedded SIM incurs the
insider threats whereby the service providers fail to secure the much-needed privacy concerning an individual‘s
vital information. The situations of personal data leakage are witnessed within the system operations.The e-SIM
hijacking enables the fraudsters to secretly obtain the victim‘s vital data of the subscriber, hijack, and receive the
information intended to the individual to his/her personal phone. The process results to complete mobile account
operations by the hacker resulting to further access to the victim‘s bank information and transfer of cash. The
other threat experienced by e-SIM users is the provision of false information. The SIM subscribers normally fall
into traps of the fraudsters by receiving short messages (SMS) citing assistance kind of news from the service
providers, thus drawing the victim‘s bank amount. Identity fraud and device poisoning are other additional
threats encountered in the application of e-SIM. Generally, the entire process of fraud invasion and victimization
influence the victim‘s business decisions of the affected individuals. Protections focuses on the embedded SIM
provides greater security in addition to a re-programmable technological system, unlike the physical SIM card.
The subscriber's personal information is not contained within the e-SIM but with the service providers, thus
enhancing its effectiveness. An e-SIM enables the consumers to effectively shift carriers between the T-Mobile
and Sprint without physical movement, thus supportive of security systems. Despite the security measures put
into place, e-SIM like any other SIM card experiences information theft. Therefore, the service providers should
encounter the emerging fraudster effects by proper monitoring of the network system to enable security
restrictions. The system should induce strict conditions that enable the evaluation and differentiation between the
IoT and the non-IoT devices during their operation.
Keywords: Cellular network, Charging, IoT and non-IoT devices, and Security.
References:
1. M. M. Danziger, L. M. Shekhtman, A. Bashan, Y. Berezin, and S. Havlin, 2016.
Vulnerability of interdependent networks and networks of networks. In Interconnected
networks (pp. 79-99). Springer, Cham. 2. J. Franklin, C. Brown, S. Dog, N. McNab, S. Voss-Northrop, M. Peck, and B. Stidham, 2016. Assessing Threats to Mobile Devices &
Infrastructure: the Mobile Threat Catalogue (No. NIST Internal or Interagency Report (NISTIR) 8144 (Draft)). National Institute of
Standards and Technology. 3. J. M. Heikkilä, 2017. Information security risk analysis and mitigation methods for industrial internet in industrial vendor
segment (Master's thesis).
4. Y. Huang, and P. Mishra, 2020, March. Vulnerability-aware Dynamic Reconfiguration of Partially Protected Caches. In 2020 21st International Symposium on Quality Electronic Design (ISQED) (pp. 255-260). IEEE.
5. S. R. Hussain, M. Echeverria, A. Singla, O. Chowdhury, and E. Bertino, 2019, May. Insecure connection bootstrapping in cellular
networks: the root of all evil. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (pp. 1-11).
6. M. Jakobsson, 2020. Social Engineering Resistant 2FA. arXiv preprint arXiv:2001.06075.
7. Y. S. Jang, 2020. Detection of SQL Injection Vulnerability in Embedded SQL. IEICE Transactions on Information and Systems, 103(5), pp.1173-1176.
8. M. Khan, P. Ginzboorg, K. Järvinen, and V. Niemi, 2018, November. Defeating the downgrade attack on identity privacy in 5G.
In International Conference on Research in Security Standardisation (pp. 95-119). Springer, Cham. 9. P. Pathak, N. Vyas, and S. Joshi, 2017. Security Challenges for Communications on IOT & Big Data. International Journal of
Advanced Research in Computer Science, 8(3).
10. K. Sung, B. Levine, and M. Zheleva, 2020, July. Protecting location privacy from untrusted wireless service providers. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (pp. 266-277).
11. Y. Wang, J. Shen, J. Lin, and R. Lou, 2019. Staged method of code similarity analysis for firmware vulnerability detection. IEEE
Access, 7, pp.14171-14185. 12. T. Xie, G. H. Tu, C. Y. Li, and C. Peng, 2020. How Can IoT Services Pose New Security Threats In Operational Cellular
184-186
Networks? IEEE Transactions on Mobile Computing.
33.
Authors: Anjani K. Upadhyay, Debasmita Chatterjee, Madhuri Swain, Lopamudra Ray
Paper Title: Evaluation of a Potential Antibacterial, Produced by Streptomyces Cinereoruber Sp. Isolated from
Chlika lake.
Abstract: Streptomyces, isolated from marine and estuarine habitat have been widely recognized as a potential
source of antifungal, anti-tumour, anti-bacterial compounds. In the present study, the antimicrobial agent
production potential of a Streptomyces cinereoruber sp was evaluated. The selective isolation of the strain was
carried out on starch casein agar. The primary screening of the Streptomyces isolate was done by cross streak
method against pathogenic test strains Escherichia.coli MTCC 82, Staphylococcus aureus MTCC 96, Bacillus
cereus IP406 and Salmonella typhi MTCC 734 and Micrococcus leuteus and the antimicrobial property against
Micrococcus leuteus was confirmed. The secondary screening was carried out by using the culture supernatant
against the test strain by agar well diffusion method. The growth and antimicrobial production ability of the
strain against Micrococcus leuteus was studied. The antimicrobial agent production was also observed till pH 11
and NaCl concentration 3% (w/v). The partially purified compound showed a peak similar to streptomycin in
HPLC. The culture condition for the production of the compound was optimised.
Keywords: Streptomyces, Antibacterial, Optimization
References:
1. Andrews, J. M. 2001. Determination of minimum inhibitory concentrations. J. Antimicrob. Chemother. 48(Suppl. 1):5–16
2. Betina V.1983. The chemistry and biology of antibiotics. Amsterdam: Elsevier Scientific Pub. Co; p. 190.
3. Costanza R, Kemp WM, Boynton WR.1993. Predictability, scale, and biodiversity in coastal and estuarine ecosystems: implications for management. Ambio.1:88-96.
4. de lima procopio, R. E; da silva, I. R; Martins, M.K; de azevedo, J.L & de Araujo, J. M. (2012) Antibitics produced by Streptomyces.
Braz J Infect Dis. 16: 466-471. 5. Goodfellow, M. (1989). The Actinomycetes I. Supragenericclassifcation of actinomycetes. In Bergey's Manual of
SystematicBacteriology, vol. 4, pp. 2333±2339. Edited by S. T. Williams, M. E. Sharpe & J. G. Holt. Baltimore: Williams &Wilkins.
6. Goodfellow, M., Kumar, Y., Labeda, D. P. & Sembiring, L. 2007. The Streptomyces violaceusniger clade: a home for streptomycetes with rugose ornamented spores. Antonie Van Leeuwenhoek 92,173-99.
7. Gordon, R. E., Barnett, D. A., Handerhan, J. E. and Pang, C. H.N. 1974. Nocardia coeliaca, Nocardia autotrophica, and the nocardin
strain. Int J Bacteriol 24, 54-63. 8. Holder, I.A., and Boyce, S. T. 1994. Agar well diffusion assay testing of bacteriak susceptibilitu to various antimicrobials in
concentration non-toxic for human cell in culture. Burns, 20 426-429.
9. Jayapal KP, Lian W, Glod F, Sherman DH, Hu WS. 2007. Comparative genomic hybridizations reveal absence of large Streptomyces
coelicolor genomic islands in Streptomyces lividans. BMC Genomics, 8:229.
10. Kagan IA, Flythe MD. 2014. Thin-layer chromatographic (TLC) separations and bioassays of plant extracts to identify antimicrobial
compounds. JoVE. (85). 11. Kampfer, P. & Labeda, D. P. 2006. International Committee on Systematics of Prokaryotes; Subcommittee on the taxonomy of the
Streptomycetaceae: Minutes of the meeting, 25 July 2005, San Francisco, CA, USA. Int J Syst Evol Microbiol 56, 495.
12. Kelly, K.I. 1964. Inter-society color council-national bureau of standard color-name charts illustrated with centroid colors. US Government Printing Office, Washington.
13. Shirling, E. B. & Gottlieb, D. 1966. Methods for characterization of Str8eptomyces species. Int J Syst Bacteriol 16, 313–340.
14. Srinivas TN, Kumar PA, Sucharitha K, Sasikala C, Ramana CV.2009. Allochromatium phaeobacterium sp. nov. Int J Syst Evol Microbiol. 59:750-3.
15. Sucharita K, Sasikala C, Park SC, Baik KS, Seong CN, Ramana CV.2009. Shewanella chilikensis sp. nov., a moderately alkaliphilic
gammaproteobacterium isolated from a lagoon. International journal of systematic and evolutionary microbiology.59:3111-5. 16. Taddi, A; Rodriguez, H. J.; Marquez-Vilchez; Castelli, C. 2006. Isolation and identification of streptomyces sp. From venezuelan site:
Morphological and biochemical studies. Microbiological Research 161:222-231.
17. Tindall, B. J., Sikorski, J., Smibert, R. M. & Kreig, N. R. 2007. Phenotypic characterization and the principles of comparative systematics. In Methods for General and Molecular Microbiology, 3rd edn, pp. 330–393. Edited by C. A. Reddy, T. J. Beveridge, J. A.
Breznak, G. A. Marzluf, T. M. Schmidt & L. R. Snyder. Washington, DC: American Society for Microbiology.
18. Williams, S.T., Goodfellow, M., Alderson, G., Wellington, E. M. H., Sneath, P. H. A., Sackin, M. J. 1983. Numerical classification of Streptomyces and related genera. J. Gen Microbiol 129, 1743-1813.
19. Williams, S.T., Goodfellow, M., & Alderson, G. 1989. Genus Streptomyces Waksman and Henrici 1943. 339 AL. In Bergey’s manual of
Sytematic Bacteriology, vol. 4, pp. 2452-2492. Edited by S.T. Williams, M. E. Sharpe & J. G. Holt. Baltimore: Williama &Wikins.
187-197
34.
Authors: Nurul Syahira Binti Nordin, Woo Ying Yee, Md Saeed Hasan Joarder, Badrul Hisham Bin Ahmad.
Paper Title: Compression Studies on LoRa Antenna Design for IoT Applications
Abstract: In this paper, a review on the LoRa antenna design for IoT application is studied. The expansion of
the Internet of Things ( IoT) has led the industry to develop new communication solutions, as current protocols
are inadequate in terms of scope and energy efficiency to satisfy IoT requirements. Before studying antenna
design, some background LoRa and IoT were discussed at beginning of the paper. LoRaWAN is an open
LPWAN standard developed by LoRa Alliance and has main characteristics such as low energy consumption,
long-range communication, builtin protection and GPS-free positioning. Besides, a comparison according to the
method, resonance frequency, material, size of the antenna and the output is shown in the form of table. In
addition, the strength and the weakness of each of the antenna design were discussed before the end of the paper.
Keywords: LoRa, IoT, antenna design, resonance frequency.
References:
1. H. Karjaluoto, ―An Investigation of Third Generation ( 3G ) Mobile Technologies and Services", May, 2014.
2. V. T. Conference, 2000 IEEE 51 st Vehicular Technology Conference. 2000. 3. N. Todtenberg and R. Kraemer, ―Ad Hoc Networks A survey on Bluetooth multi-hop networks‖, Ad Hoc Networks, vol. 93, 2019.
4. B. Hammi, R. Khatoun, A. Fayad, and L. Khoukhi, ―Internet of Things (IoT) Technologies for Smart Cities Internet of Things (IoT)
198-201
Technologies for Smart Cities‖, 2017.
5. R. G. P. V. K, ―Agriculture Monitoring with Lora Based Wireless Sensor Networks‖, vol. 7, no. 02, 2019, pp. 650–655. 6. M. Usmonov and F. Gregoretti, ―Design and implementation of a LoRa based wireless control for drip irrigation systems Design and
Implementation of a LoRa Based Wireless Control for Drip Irrigation Systems‖, 2019.
7. D. Bankov, E. Khorov, and A. Lyakhov, ―On the Limits of LoRaWAN Channel Access‖, November, 2016.
8. J. Buckley et al., ―Compact 433 MHz antenna for wireless smart system applications Compact 433 MHz antenna for wireless smart
system applications,‖ April, 2014, pp. 2013–2015.
9. L. H. Trinh et al., ―Miniature Antenna for IoT Devices Using LoRa Technology‖, 2017, pp. 170–173. 10. F. Ferrero and S. Antipolis, ―Dual-band LoRa Antenna : Design and Experiments‖, pp. 243–246.
11. Q. Zhang and Y. Gao, ―Embedded Antenna Design on LoRa Radio for IoT Applications‖, pp. 2–4.
12. L. H. Trinh, T. Q. K. Nguyen, H. L. Tran, P. C. Nguyen, N. V Truong, and F. Ferrero, ―Low-profile horizontal omni-directional antenna for LoRa wearable devices‖, 2017, pp. 136–139.
13. H. T. Chattha, M. K. Ishfaq, Y. Saleem, Y. Huang, and S. J. Boyes, ―Band-Notched Ultrawide Band Planar Inverted-F Antenna‖, 2012.
35.
Authors: Susamma Mathew, Garima Saini, S.S Gill
Paper Title: Design of Compact MIMO Antenna for 5G Mobile Terminal
Abstract: This report gives the research work carried out for design and analysis of MIMO antenna using two
identical Microstrip slot radiators having enhanced isolation. The slot radiators offer compact size in order to
accommodate other electronic components for reduction of volume of the wireless communication system. The
defected ground structure is formed on the ground plane in between the antenna elements and feed lines to
improve the isolation between them. The substrate used for constructing the antenna is FR-4 having the
measurements of 26mm x 22mm x 0.8mm and it has the relative permittivity of 4.4. The printed microfilm strip
etched on the opposite side of the substratum is used to couple the signal to each antenna. The HFSS software is
used in this paper for designing the antenna and for checking the performance of the antenna. The -10dB
bandwidth is 1.1GHz in the frequency range of 3.1 GHZ to 4.2GHz. The maximum isolation obtained after
simulation is -23.1dB at 3.13GHz. The maximum gain of 2.26dB is obtained. Simulated radiation diagram of the
designed antenna indicates that it is a good radiator for 5G applications in the sub 6GHz frequency band.
Keywords: MIMO, Microstrip Slot radiators, Reflection coefficient, Isolation, 5G
References:
1. S.Sharawi, Muhammad Ikram and Atif Shamim, ―A Two Concentric Slot Loop Based Connected Array MIMO Antenna System for 4G/5G Terminals‖, IEEE Transactions on Antennas and Propagation, Vol. 65, Issue: 12, Page(s): 6679 – 6686, December 2017
2. Haitham Alsaif, Muhammad Usman, Muhammad T. Chughtai, and Jamal Nasir, ―Cross Polarized 2×2 UWB-MIMO Antenna System
for 5G Wireless Applications‖, Progress In Electromagnetics Research , Vol. 76, pp.157–166,2018(Received 11 October 2018, Accepted 21 November 2018, Scheduled 7 December 2018)
3. Mujeeb Abdullah, Yong-Ling Ban, Kai Kang, Ming-Yang Li, and Muhammad Amin, ―Eight-Element Antenna Array at 3.5GHz for
MIMO Wireless Application‖, Progress In Electromagnetics Research , Vol. 78, pp:209–216, 2017(Received 23 August 2017, Accepted 29 September 2017, Scheduled 17 October 2017)
4. He Huang, Xiaoping Li and Yanming Liu ―A Low Profile, Dual-polarized Patch Antenna for 5G MIMO Application‖, IEEE
Transactions on Antennas and Propagation, Volume: 67, Issue: 2, pp.1275-1279, Feb. 2019 5. Huiqing Zhai, Lei Xi, Yiping Zang and Long Li ―A Low Profile Dual-polarized High Isolation MIMO Antenna Arrays for Wideband
Base Station Applications‖, IEEE Transactions on Antennas and Propagation, Volume: 66,Issue:1,pp:191-202, Jan. 2018
6. Ming-Yang Li, Yong-Ling Ban, Zi-Qiang Xu and Gang Wu, ―Eight-Port Orthogonally Dual- Polarized Antenna Array for 5G Smartphone Applications‖, IEEE Transactions on Antennas and Propagation, Volume: 64, Issue: 9, pp.3820-3830, September 2016
7. Muhammad Ikram, Rifaqat Hussain and Mohammad S. Sharawi, ―4G/5G antenna system with dual function planar connected array‖,
IET Microwaves, Antennas & Propagation, Vol.11,Issue 12, pp. 1760-1764, October 2017 8. Manish Kumar Soni and Garima Saini, ―A Compact Dual Element PIFA Array for Wireless MIMO Advanced TDD LTE
Applications‖, International Journal of Advancement in Engineering Technology, Management and Applied Science, Volume: 04,
Issue: 09, PP. 85-93, September 2017
9. R. Anita, P. V. Vinesh, K. C. Prakash, P. Mohanan, and K. Vasudevan, ―A Compact Quad Element Slotted Ground Wideband Antenna
for MIMO Applications‖, IEEE Transactions on Antennas and Propagation,Vol:64,Issue:10,pp:4550-4553,October2016, 10. Vincent Tseng and Cheng‐Yuan Chang ―Linear Tapered Slot Antenna for Ultra‐Wideband Radar Sensor: Design Consideration and
Recommendation‖, MDPI Sensors, pp: 1-24, Received: 6 January 2019;; Accepted:5 March 2019;Published 9 March 2019 5 March
2019; www.mdpi.com/journal/sensors. 11. Nurhayati, Eko Setijadi, and Gamantyo Hendrantoro, ―Radiation Pattern Analysis and Modeling of Coplanar Vivaldi Antenna Element
for Linear Array Pattern Evaluation‖, Progress In Electromagnetics Research B, Vol. 84, pp: 79-96, 2019, Received 5 April 2019,
Accepted 22 May 2019, Scheduled 14 June 2019
202-206
36.
Authors: Aditi
Paper Title: Health and Housing for Urban Poor in India Post Covid-19
Abstract: The COVID-19 pandemic has built a troublesome new standard for everybody through shelter-in-
place systems and physical and social distancing guidelines. Yet for billions of urban underprivileged, certain
guidelines aren‘t merely troublesome; they‘re radically impracticable. Social and physical distancing is a
severely significant acknowledgement to the pandemic COVID-19 however, it additionally implies that
occupants must have sufficient space, services and social security nets to sustain such an order. It is candidly not
the fact over cities in Asia, Latin America and Africa. Health facilities and services are deficient in terms of the
transition from state to local level causing negligence of slum areas at global to micro-level. These dwellers of
slums area accustomed to unhygienic and un-sanitized environment much on a regular basis. Majority of slums
are vastly located near urban centers i.e. in and around in economically less developed countries, experiencing
urbanization at a greater rate compared to more developed countries. Many countries often lack the ability to
provide infrastructure like roads, affordable housing, basic services like water, sanitation etc., sufficiently for in-
fluxing people in the cities due to urbanization creating a big concern for the country. Health policies need to
208-216
consider equity and social justice for urban poor in order to equally uplift them in the society. The paper deals
with the issues faced by the urban poor in India and the programs and policies that had been issued over time
during the past which could not suffice to positively impact the downfalls of these people. The paper also
highlights the health conditions of these urban poor and the areas where it has been lacking behind. The
pandemic has caused the nation to come to a halt but the urban poor having no such privilege to comply with the
situation are forced to thrive in degrading conditions. The research paper will help figure out trigger areas for
downfall of these inhabitants of the nation and formulate strategies to counteract the same in post COVID-19
situation.
Keywords: Health conditions, Housing, Slums, Urban and rural India urbanization, Urban poor
References:
1. Agarwal S, Sangar K. Need for dedicated focus on urban health within national rural health mission. Indian J Public Health.
2005;49(3):141-51. 2. Challenges of Slums-Global Report on Human Settlements 2003 available on www.unchs.org
3. Govt. of India, Ministry of Housing and Urban Poverty Alleviation.2001.Draft National Slum Policy:2001. Nirman Bhawan, New
Delhi 4. Ramachandran R. Urbanization and urban system in India. New Delhi: Oxford University Press. 2001.
5. Report of the committee on slum statistics/census, Government of India, 2001, pp. 6-7.
6. Report of the 11th Five Year Plan(2007-2012).Working Group on Urban Housing with Focus on Urban Slums. Ministry of Housing and Urban Poverty Alleviation, Govt. of India
7. Women‘s medical service. Summary of the findings of investigations into the causes of maternal mortality in India. New Delhi, 1947.
8. Urban Health Resource Centre, ―Health of the urban poor in India; key results from the NFHS, 2005–2006‖. 2007. 9. http://pdf.usaid.gov/pdf_docs/Pnadk385.pdf
10. http://nbo.nic.in/images/pdf/report_of_slum_committee.pdf
11. https://shodhganga.inflibnet.ac.in/bitstream/10603/115771/15/15_chapter%208.pdf
37.
Authors: Sachchidanand Shukla, Pratima Soni, Naresh Kumar Chaudhary, Geetika Srivastava
Paper Title: Development of Low Frequency Small Signal Amplifier using BJT-JFET in Sziklai Pair Topology
Abstract: A new PSpice Model of BJT and JFET is proposed and its hybrid combination is used in Sziklai pair
topology to design small signal amplifier. The proposed amplifier with maximum voltage gain 30.41, maximum
current gain 43.05 and THD 2.44% is capable of amplifying low magnitude signals in a frequency range
distributed from 3.035Hz to 93.808Hz. This feature explores the possibility to use proposed amplifier circuit in
EEG, seismographs and underwater communication circuits. Three different circuit/device combinations are also
exposed during the exploration of proposed amplifier and therefore mentioned with primary details. Qualitative
behaviour, e.g. temperature dependency, noise behaviour, effect of the variation of biasing resistances and
capacitors, small signal AC analysis etc., of the proposed circuit, is also studied to observe its performance under
different environment
Keywords: Sziklai pair, Circuit Simulation, Small signal Amplifier.
References:
1. Rod Elliott, ―Compound pair Vs Darlington pair‖, http://sound.westhost.com/articles/cmpd-vs-darl.htm, January 6, 2011
2. David A. Hodges, ―Darlington‘s Contribution to Transistor Circuit Design‖, IEEE Transactions on Circuits and Systems-I, Vol.46, No.-1, January 1999, pp 102-104
3. George C. Sziklai, ―Push-pull complementary type transistor amplifier‖, U.S. Patent 2,762,870, September 11, 1956
4. B. Pandey, S. Srivastava, S. N. Tiwari, J. Singh and S. N. Shukla, ―Qualitative Analysis of Small Signal Modified Sziklai Pair Amplifier‖, Indian Journal of Pure and Applied Physics, 50, 2012, pp 272-276
5. S.N.Shukla and S.Srivastrava, ―A New Circuit Model of Small-signal Sziklai pair amplifier‖, International Journal of Applied Physics and Mathematics, Vol.3, No.4, 2013, pp 231-236
6. S.N. Shukla, G. Srivastava, P. Soni, R. Mishra, ―Development of a Small Signal Amplifier with Modelling of BJT-JFET Unit in Sziklai
Pair Topology‖, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol.8, Issue 5, 2019, pp 1530-1538
7. M. H. Rashid, ―Introduction to PSpice Using OrCAD for Circuits and Electronics‖, Pearson Education, 3rd Ed., 2004, pp 255-256
8. R. Green, G. R. Nicol, ―An amplifier and recording system for seismic crustal refraction work‖, New Zealand Journal of Geology and Geophysics, Vol.12, 1969, pp 771-783
9. R.S. Khandpur, ―Hand Book of Bio-medical Instrumentation‖, Tata McGraw Hill, 2nd ed. (Sixth reprint), 2005, pp 170-175
10. Y.Q. Tan, F. Ibrahim and M. Moghavvemi, ―Two Electrodes Low Voltage Input EEG Amplifier for Brain Computer Interface‖, IEEE International Conference on Intelligent and Advanced Systems, 2007, pp 315-320
11. M. H. Sayed ElAhl, M. M. E. Fahmi, S. N. Mohammad, ―Qualitative analysis of high frequency performance of modified Darlington
pair‖, Solid State Electronics, Vol. 46, 2002, pp 593-595 12. M.H. Ali, Aliyu Sisa Aminu, ―Analysis of Darlington pair in Distributed Amplifier Circuit‖, IOSR Journal of Electrical and
Electronics Engineering, Vol.10, Issue 2, Ver.I, 2015, pp 77-80
13. S. N. Shukla, ―Small-signal amplifier with JFETs in triple Darlington topology‖, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol.3, Issue 9, 2014, pp 18812-18819
14. A. Mottershead, ―Electronic Devices and Circuits‖, Printice-Hall of India, 16th reprint, 1993, pp 360
15. Bridget Benson, Ying Li, Brian Faunce, Kenneth Domond, Don Kimball, Curt Schurgers, Ryan Kastner, ―Design of a Low-Cost Underwater Acoustic Modem‖, IEEE Embedded Systems Letters, VOL. 2, NO. 3, 2010, pp 58-61
16. R. Zimmerman, G. L. D'Spain and C. D. Chadwell, "Decreasing the radiated acoustic and vibration noise of a mid-size AUV," in IEEE
Journal of Oceanic Engineering, vol. 30, no. 1, 2005, pp. 179-187
217-223
38.
Authors: T. Tritva Jyothi Kiran
Paper Title: Deep Transform Learning Vision Accuracy Analysis on GPU using Tensor Flow
Abstract: Transfer learning is one of the most amazing concepts in machine learning and A.I. Transfer learning 224-227
is completely unsupervised model. Transfer learning is a machine learning technique in which a network that has
been trained to perform a specific task is being reused or repurposed as a starting point to perform another
similar task. For this work I used ImageNet Dataset and MobileNet model to analyse Accuracy performance of
my Deep Transform learning model on GPU of Intel® Core™ i3-7100U CPU using TensorFlow 2.0 Hub and
Keras. ImageNet is an open source Large-Scale dataset of images consisting of 1000 classes and over 1.5 million
images. And my overall idea is to analyse accuracy of Vision performance on the very poor network
configuration. This work reached an Accuracy almost near to 100% on GPU of Intel® Core™ i3-7100U CPU
which is great result with datasets used in this work are not easy to deal and having a lot of classes. That‘s why
it‘s impacting the performance of the network. To classify and predict from tons of images from more classes on
low configured network is really challenging one, it‘s a great thing the computer vision accuracy showed an
excellent vision nearly 100% on GPU in my work.
Keywords: Accuracy, Vision, TensorFlow, Transform Learning, Deep Learning, GPU, Dense layer, ImageNet
Database.
References:
1. Jyothi Maggu, Emilie Chouzenoux, Giovanni Chiercha and Angshul Majumdar, Convolutional Transform learning, ICONIP,
pp.162-174, 2018.
2. Shruti Nagpal, Maneet Singh, Richa Singh, Mayank Vatsa, Face Sketch Matching via Coupled Deep Transform Learning, ICCV, 2017. 3. Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, ImageNet Large Scale Visual Recognition Challenge, cs.CV, 2015.
4. Mark Sandler, Andrew Howard, Menglong Zhu, Andey Zhmoginov, MobileNetV2: Inverted Residuals and Linear Bottlenecks, arXiv,
2019. 5. T. Chugh, M. Singh, S. Nagpal, Transfer Learning based evolutionary algorithm for composite face sketch recognition. In IEEE
Conference, 2017.
6. Emilio Soria Olivas, Jose David Martin Guerreo, Marcelino Martinez Sober, Hand Book of Research on Machine Learning Applications and Trends.
7. Mobilenetv2 source code. Available from
8. https://github.com/tensorflow/models/tree/master/research/slim/ 9. nets/mobilenet.
10. ImageNet dataset open source available from: http://www.image-net.org/
39.
Authors: Md. K.M.Farooqui, K.V.L Somasekhar, D.V.Seshagirirao, P. Nagavsrinivas, S. Durga prasad
Paper Title: Reducing Defects on Cam Shaft by Six Sigma Methodology
Abstract: The efficiency of an IC engine is mainly depends on opening and closing of inlet and outlet valves.
The valves are operated by cam shaft. So cam shaft must be free from defects to maintain proper combustion of
a internal combustion engine. Thus we are focusing to reduce the defects and improving quality in the
manufacturing process and operations of a cam shaft in manufacturing industry for different automotives. In
camshaft manufacturing the considerable defects are material selection, changing their mechanical properties
while machining, temperature defects, casting defects, tolerances and surface roughness. So manufactured cam
shaft has to overcome above defects for safe operating of valves. Six Sigma is a business technique and a
methodical philosophy utilization of which prompts achievement in benefit through quantum gain in item
quality, consumer loyalty and efficiency. The goal was to diminish the quantity of deformities to as low as 3.4
parts per million chances. Methodology used: DMAIC is one of the tool of six sigma used to improve the
process and also to find root causes for any problem to reduce the defects occuring in any industry. we are using
DMAIC tool to reduce defects and improve quality. DMAIC stands for define, measure, analyze, improve,
control.
Keywords: Six sigma, DMAIC, defects per million opportunities, control charts, xbar chart.
References:
1. Hsiang-Chin Hung and Ming-Hsien Sung, (2011), ―Applying Six Sigma to Manufacturing Processes in the Food Industry to
Reduce Quality‖ Scientific Research.
2. S.Pimsakul,N.Somsuk,W.Junboon,T.Laosirihongthong,(2013),- Production Process Improvement Using the Six Sigma DMAIC Methodology: A Case Study of a Laser Computer Mouse Production Process‖ The 19th International Conference on Industrial
Engineering and Engineering Management.
3. Mohit Taneja1, Arpan Manchanda,(2013), ―Six Sigma an Approach to Improve Productivity in Manufacturing Industry‖ International Journal of Engineering Trends and Technology (IJETT).
4. Adan Valles et. Al (2009), ―Implementation of Six Sigma in a Manufacturing Process: A case study‖, International Journal of
Industrial Engineering. 5. Nilesh V Fursule Dr Satish V Bansode Swati N Fursule (2012), Understanding the Benefits and Limitations of Six Sigma
Methodology‖, International Journal Of Scientific And Research Publications.
6. Shewhart, W. A. (1931, 1980). Economic Control of Quality of Manufacturing, Milwaukee, WI: ASQ Quality Press.
228-235
40.
Authors: Roopa KV, Sanjeev Kumar K.M
Paper Title: “One Tap Shopping”: Impulsive Fashion And Apparel Buying Behaviour
Abstract: Digitalization has transformed brick and motor fashion-oriented business to one tap convenient
business through smart phones via mobile applications. The digital age is more inclined towards fashion and
apparel due to ample exposure of current trends in fashion industry through internet, social media, travelling,
cultural exchange and others. The study emphasized on discovering the online fashion and apparel buying
behavior, satisfaction level, and exploring the most influential factors towards the digital consumers for online
fashion and apparel shopping by analyzing 256 respondents through convenient and judgmental sampling. Data
236-242
is analyzed through Factor analysis and multiple regression. The study reveals that Price sensitivity factors has
significant weightage towards online fashion and apparel shopping like flash sales, loyalty programs and points,
spike sales- exciting offers on all categories for limited period, cashback offers, Discounts and offers.
Keywords: Spike sales, ―YAMI‖- young – aspirational- mobile native - impulsive action, social engagement,
website artistry.
References:
1. Internet usage in India, statistics and facts. July 7 2020. Statista from https://www.statista.com/topics/2157/internet-usage-in-india/ 2. Global E-commerce sales to reach nearly $ 3.46 trillion in 2019. Nov13, 2019. Digital commerce 360 from
https://www.digitalcommerce360.com/article/global-ecommerce-sales/
3. E-commerce sales by country in 2019, Oberlo from https://www.oberlo.com/statistics/ecommerce-sales-by-country. 4. E-commerce in India- statistics and facts, Aug 4, 2020, Statista from https://www.statista.com/topics/2454/e-commerce-in-india/.
5. The Era of the connected consumers, Jan 22,2020. Economic times, Brand Equity from
https://brandequity.economictimes.indiatimes.com/news/digital/the-era-of-the-connected-consumer/73478274 6. Online fashion market in India, Nov, 2019.Redseers from https://redseer.com/newsletters/online-fashion-market-in-india/
7. Amazon and flip kart are taking fashion beyond metros, Sep 30, 2019. Financial express from
https://www.financialexpress.com/industry/amazon-and-flipkart-are-making-fashion-sense-beyond-metros/1721343/. 8. Pani, A., & Sharma, M. (2012). Emerging trends in fashion marketing: a case study of apparel retailing in
41.
Authors: Rubina Jahangir Khan, Raj Kulkarni , Jagannath Jadhav
Paper Title: A Machine Learning Approach for Ecg Analysis for Emotions
Abstract: Emotions are feelings which one can feel and are hard to be put in a form by a person .However they
reflect the mental state of a person. Emotions like joy and sadness can be somehow detected from the facial
expressions or through the body language. But these emotions do have an impact upon our system. An
individual‘s electrocardiogram is a way through which one can know the impact of different parameters such as
stress, joy, sadness, anger on the mechanism of our body. The emotions such as anger, sadness have an adverse
effect on the cardio system and is seen in the form of abnormal ECG which can be a good pointer to a counselor
when finding out the reasons and diagnosis. The decomposition technique along with the Hilbert transform can
be used for feature retrieval. The different emotions are detected through the binary classification technique
Keywords: denoised, mean frequency, fission, fusion, decomposition, classifier
References:
1. A.N PAithane,Dr. Bormane,Sneha Dinde ,‖Human Emotion Recognition using Electrocardiogram Signals.‖,International Journal on Recent and Innovation Trends in Computing and Communication
2. Volume: 2 Issue: 2 194 – 197
3. 1Amjad M.R. AlzeerAlhouseini,Imad Fakhri Al-Shaikhli,Abdul Wahab bin Abdul Rahman, International Journal of Advancements in Computing Technology(IJACT) Volume8, Number3, June 2016
4. WANG Bin ,LIU Guang-Yuan, An Experimental Study on Electrocardiography toward Emotion Recognition in 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.
5. I. S. Jacobs and C. P. Bean, ―Fine particles, thin films and exchange anisotropy,‖ in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
6. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, ―Electron spectroscopy studies on magneto-optical media and plastic substrate interface,‖ IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].
7. M. Young, The Technical Writer‘s Handbook. Mill Valley, CA: University Science, 1989.
8. Foteini Agrafioti, Adam K.Anderson―ECG Pattern Analysis for Emotion Detection‖, IEEE Transactions on Affectiv Computing, 2012, Vol. 3, No.1, pp.102-115.
9. N.E. Huang, Z. Shen, R.R. Long, M.L. Wu, Q. Zheng, N.C. Yen, and C.C. Tung, ―The Empirical Mode Decomposition and Hilbert Spectrum for Nonlinear and Nonstationary Time Series Analysis,‖ Proc. Royal Soc. London, vol. 454, pp. 903-995, 1998.
10. S.M.A. Bhuiyan, R.R. Adhami, and J.F. Khan, ―A Novel Approachof Fast and Adaptive Bidimensional Empirical Mode Decomposition,‖
243-246
42.
Authors: G Chandhini, B Chithra, P Kiruthikadevi, Bhagya sasi, V. Kamal Kumar
Paper Title: IoT Based Underground Drainage Monitoring System
Abstract: Underground drainage monitoring system plays an important role in keeping the cities clean and
healthy. Compared to other countries, India consists of highest number of sewage workers. Exposure of sewage
workers to poisonous gases like hydrogen sulphide, sulphur dioxide, carbon monoxide, methane, ammonia,
nitrogen oxide increases the death of the sewage workers. The main aim of this project is to design a network
system which helps in monitoring poisonous gases present in sewage. Whenever the gas level crosses the
threshold value, the information with different gas ppm values is displayed in the smart phone through the app. It
also indicates whether it is safe for the manual scavengers to work in the environment or not.
Keywords: Smart phone, IOT, Alarm, Threshold value, Sensors, Application, LED, Sewage system.
References:
1. Prof S. A. Shaikhl, Suvarna A. Sonawane2, ―Monitoring Smart City Application Using Node MCU on IOT‖ International Journal of
Innovative science, Engineering and Technology, Vol 5Issue VIL,July 2017. 2. Prof Muragesh SK1, Santhosha Rao2,‖Automated Internet of Things for Underground Drainage and Manhole Monitoring systems for
Metropolitan Cities.‖International Journal of Innovative Science, Engineering & Technology, Vol. 2 june 4, june 2015.
3. Lazarescu, M. T., ―Design of a WSN Platform for Long-Term Environment Monitoring for IoT Applications, ―Emerging and Selected
247-249
Topics in Circuits and system, IEEE journal on, vol 3, no.1,pp.45,54, March 2013.
4. T.Leppanen, Harjula, E., Ylianttila, M., Ojala, T.,,,and Yang, L. T. (2013).‖Cloud things: A common architecture for integrating the internet of things with cloud computing.‖ Proceeding of the 2013 IEEE 17th
International conference on computer supported cooperative work in design (CSCWD), 651-657(june).
5. Manna, s., Bhunia, S. S., and Mukherjee, N. (2014).‖Vehicular pollution monitoring using iot‖ International Conference on Recent
Advances and Innovation in Engineering(ICRAIE-2014), 1-5(May).
43.
Authors: Jenifer Mahilraj
Paper Title: Trajectory Based Location Prediction and Enriched Ontological User Profiles for Efficient
Website Recommendation
Abstract: The spread over of huge amount of information in the vast area of internet makes difficult for the
users to obtain the search items that are relevant to them. The adoption of web usage mining helps to discover
the accurate search results that satisfy their requirements. To fulfill their need, it is necessary to know their
preferences of search at various contexts. In general, the user profiles are used to determine the taste of the
users. The traditional method of user profiling does not provide a complete detail regarding their search. In
addition, the search preference of the individuals varies in accordance with time and
location. The user profiles do not update the dynamic location changes of the users. The traditional location
based recommendation systems suggest the search results based on their location to compensate the dynamic
preferences of the users. The drawbacks of the conventional systems are resolved by the Location and User
Profile (LUP) based recommendation system. To attain a higher user satisfaction by providing accurate search
results, a trajectory based location prediction and enriched ontological user profiles to recommend the
appropriate websites to the users is proposed in this paper. In this article, we suggest a novel method for
predicting the location of a user's profile using Semantic Trajectory Pattern (STP), based on both the place and
semantic features of user trajectories. Our prediction model 's central concept is based on a novel cluster-based
prediction approach that evaluates the location of user search data based on the regular activities of related users
in the same cluster, calculated by evaluating the typical behavior of users in semantic trajectories. The
combination of location information along with enriched ontological user profiles improves the efficiency of
the proposed web recommendation system. The experimental results are evaluated using recall, precision and F-
measure metrics.
Keywords: Geographic mining , Ontological user profiles, semantic mining, Trajectory pattern mining,
Web usage mining.
References:
1. Bao, J., Zheng, Y., Wilkie, D., & Mokbel, M.‖Recommendations in location- based social networks: a survey‖,Geoinformatica,2015,
vol 19, pp 525-565. 2. Cheng, C., Yang, H., King, I., & Lyu, M. R. ―Fused Matrix Factorization with Geographical and Social Influence in Location-
Based Social Networks‖, Paper presented at the Aaai conference,2012.
3. Eyharabide, V., & Amandi, A. (2012). ―Ontology-based user profile learning‖ AppliedIntelligence, vol 36, page 857-869. 4. Gao, H., Tang, J., & Liu, H. ―Mobile location prediction in spatio-temporal context‖. Paper presented at the Nokia mobile data
challenge workshop,2012.
5. Jagan, S., & Rajagopalan, S.‖ A Survey on Web Personalization of Web UsageMining‖. International Research Journal of Engineering and Technology,2015,vol 2 issue 1, pp 6-12.
6. Levandoski, J. J., Sarwat, M., Eldawy, A., & Mokbel, M. F.‖ LARS: A Location-Aware Recommender System‖,Paper presented at
the 2012 IEEE 28th International Conference on Data Engineering, 1-5 April 2012. 7. Liu, X., & Aberer, K. ―SoCo: a social network aided context-aware recommender system‖. Paper presented at the
Proceedings of the 22nd international conference on World Wide Web,2013.
8. Liu, Y., Zhao, Y., Chen, L., Pei, J., & Han, J. ―Mining frequent trajectory patterns for activity monitoring using radio frequency tag arrays‖, IEEE Transactions on Parallel and Distributed Systems, 2012,vol 23, pp2138-2149.
9. Majid, A., Chen, L., Chen, G., Mirza, H. T., Hussain, I., & Woodward, J. ―A context-aware personalized travel recommendation
system based on geotagged social media data mining‖. International Journal of Geographical Information Science,2013,vol 27,pp 662-684.
10. Makvana, K., Shah, P., & Shah, P. ,‖A novel approach to personalize web search through user profiling and query
reformulation‖, paper presented at the International Conference on Data Mining and Intelligent Computing (ICDMIC), 2014 11. Mathew, W., Raposo, R., & Martins, B.‖Predicting future locations with hidden Markov models‖,paper presented at the
Proceedings of the 2012 ACM Conference on Ubiquitous Computing.
12. Meehan, K., Lunney, T., Curran, K., & McCaughey, A.‖Context-aware intelligent recommendation system for tourism‖ paper presented at the 2013 IEEE International Conference on PervasiveComputing and Communications Workshops (PERCOM
Workshops).
13. Mehtaa, P., Parekh, B., Modi, K., & Solanki, P,‖Web personalization using web mining: concept and research issue‖, International Journal of Information and Education Technology, 2012,vol 2, pp 510.
14. Noulas, A., Scellato, S., Lathia, N., & Mascolo, C,‖A random walk around the city: New venue recommendation in location-based
social networks‖,Paper presented at the International Conference on Privacy, Security, Risk and Trust (PASSAT), 2012 and International Confernece on Social Computing (SocialCom),2012
15. Savage, N. S., Baranski, M., Chavez, N. E., & Höllerer, T. (2012).‖loco: A location based context aware recommendation system
Advances in Location-Based Services ―Springer,2012,pp 37-54.
16. Wang, X., Rosenblum, D., & Wang, Y. ―Context-aware mobile music recommendation for daily activities.‖,paper presented
at the Proceedings of the 20th ACM international conference on Multimedia,2012.
17. Yin, H., Sun, Y., Cui, B., Hu, Z., & Chen, L‖LCARS: a location-content- aware recommender system‖,paper presented at the Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining,2013.
18. Ying, J.-C., Chen, H.-S., Lin, K. W., Lu, E. H.-C., Tseng, V. S., Tsai, H.-W., . . . Lin,S.-C..‖Semantic trajectory-based high utility
item recommendation system. Expert Systems with Applications‖, 2014 ,vol 41, pp 4762-4776. 19. M.jenifer,Dr.Thabasu kannan‖ LACFAC-Location-Aware Collaborative Filtering and Association-based Clustering Approach for Web
Service Recommendation‖ Int. J. Web Engineering and Technology, Vol. 13, No. 3, 2018,pp 203-222. 20. David Martin et.al,‖OWL-S: Semantic Markup for Web Services‖, W3C Member Submission 22 November 2004.
21. Josh Jia-Ching Ying et al.,‖ Semantic trajectory mining for location prediction‖, Proceedings of the 19th ACM SIGSPATIAL
International Conference on Advances in Geographic Information SystemsNovember 2011,Pages 34–43.
250-257
44.
Authors: Shreerang J. More, Pranav S. Patil, Jitendra M. More, Prayag S. Patil, Satish S. Marathe
Paper Title: IoT based Patient Health Care for COVID 19 Centre
Abstract: In this paper, COVID 19 centre monitoring and management system has been proposed and
integration of different sensor network with Internet of Things (IoT). The sensors implemented can
communicate with data collection and processing unit. The data collection done by that unit can directly
transferred to cloud using internet connectivity at COVID 19 centre. Therefore work aimed to propose COVID
19 centre management with IoT based approach to handle medical services and patient monitoring and treatment
work flow. In the experimented model, Node MCU ESP8266 controller and temperature sensor (DHT11) are
integrated. A system has capability to monitor and control COVID 19 centre services and patient monitoring via
remote connection. It is evaluated with three temperature sensors connected to measure temperature of patients.
Mobile based blynk has been utilized for the cloud based IoT implementation. Sensor sends data over blynk
server and then can be seen anywhere using smart phone application. In addition, when patient get fever more
than regular value, an alert was sent to authority in a quick time. After results, it is indicated that the developed
system has effective potential to work in pandemic situation and has technological feasibility. The benefits of
implemented research methods are useful in digital health management in pandemic scenario. Even hospitals,
COVID centers, intensive care unit (ICU) can be operated effectively and patient diagnosis application based on
online database has wide scope in the area of internet of things and patient health management.
Keywords: Blynk , COVID 19, Health Care, IoT, Node MCU, Sensor Network.
References:
1. Singh, Ravi Pratap, et al. "Internet of things (IoT) applications to fight against COVID-19 pandemic." Diabetes & Metabolic Syndrome: Clinical Research & Reviews (2020).
2. Durani, Homera, et al. "Smart automated home application using IoT with Blynk app." 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE, 2018.
3. Krishnan, D. Shiva Rama, Subhash Chand Gupta, and Tanupriya Choudhury. "An IoT based patient health monitoring system." 2018
International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. 4. Serikul, Peerasak, Nuttapun Nakpong, and Nitigan Nakjuatong. "Smart farm monitoring via the Blynk IoT platform: case study:
humidity monitoring and data recording." 2018 16th International Conference on ICT and Knowledge Engineering (ICT&KE). IEEE,
2018. 5. Chamola, Vinay, et al. "A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain, and 5G in
Managing its Impact." IEEE Access 8 (2020): 90225-90265.
6. Cacovean, Dan, Irina Ioana, and Gabriela Nitulescu. "IoT System in Diagnosis of Covid-19 Patients." Informatica Economica 24.2 (2020): 75-89.
7. Senthamilarasi, C., et al. "A smart patient health monitoring system using IoT." International Journal of Pure and Applied
Mathematics 119.6 (2018): 59-70. 8. Rahman, Ruhani Ab, et al. "IoT-based personal health care monitoring device for diabetic patients." 2017 IEEE Symposium on
Computer Applications & Industrial Electronics (ISCAIE). IEEE, 2017.
9. https://docs.blynk.cc/
258-263
45.
Authors: Chaarumathi P, Divya S.R, Divyajothi R, Mehareethaa K.V, Kamalkumar V
Paper Title: Voice Controlled Fire Fighting Robot
Abstract: Even though there are a lot of advancements in technology, there have been an increased number of
devastating losses in the field of fire-fighting. Fire accidents that occur in industries like atomic power plants,
petroleum refineries, chemical factories and other large-scale fire industries end in quite serious consequences
which can cause injuries or even death of individuals. Therefore, this paper is enhanced to develop an automated
fire extinguishing robotic vehicle that saves the lives of firefighters and other persons in those areas. The
proposed robotic vehicle is controlled using specified speech commands. The language input is more familiar
which makes interaction with the robotic vehicle much easier. The advantages of voice-controlled robots are
hands-free and rapid data input operations. The speech recognition process is done in such a way that it
recognizes specified commands from the user and the designed robot navigates based on the instructions via the
speech commands. The fire can be extinguished using a water tank that is fitted along with the robotic vehicle.
Consequently, the site of fire is live monitored using ESP 32 and the status of the fire zone is updated to the user
through message.
Keywords: Arduino, ESP32, Fire extinguishing, Live monitoring.
References:
1. Ratnesh Malik, ―Fire Fighting Robot: An Approach‖, Indian Streams Research Journal Vol.2, Issue.II/March; 12pp.1-4
2. Swati A. Deshmukh, Karishma A. Matte and Rashmi A. Pandhare, ―Wireless Fire Fighting Robot‖, International Journal For Research In Emerging Science and Technology.
3. Lakshay Arora, Prof.Amol Joglekar, ―Cell Phone Controlled Robot with Fire Detection Sensors‖, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (3), 2015, 2954-2958.
4. Arpit Sharma, Reetesh Verma, Saurabh Gupta and Sukhdeep Kaur Bhatia, ―Android Phone Controlled Robot Using Bluetooth‖,
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 5 (2014), pp. 443-448
5. Saravanan P, ―Design and Development of Integrated Semi- Autonomous Fire Fighting Mobile Robot‖, International Journal of
Engineering Science and Innovative Technology (IJESIT) Volume 4, Issue 2, March 2015. 6. Guiseppe Riccardi (2015), ‗Active Learning: Theory and Applications to Automatic Speech Recognition‘, IEEE Transaction of Speech
and Audio Processing, Vol. 13, No. 4, pp 1-8.
7. Shantanu Chakrabarthy ―Robust Speech Feature Extraction by Growth Transformation in reproducing kernel Hillber space‖, IEEE
264-267
Transactions on Audio Speech and Language Processing, Vol.15, No 6, June2007.
8. T. Aprille and T. Trick, ―Steady-State Analysis of Nonlinear Circuits with Periodic Inputs‖, Proceedings of the IEEE, vol. 60, no.1, pp.108-114, January 2015.
9. Rakib, T. and Sarkar, M.R., ―Design and fabrication of an autonomous fire fighting robot with multisensor fire detection using PID controller‖, 2016 5th IEEE International Conference on Informatics, Electronics and Vision (ICIEV), May 13-14, 2016, Bangladesh,
pp. 909-914.
10. Suresh, J., ―Fire-fighting robot‖, 2017 IEEE International Conference on Computational Intelligence in Data Science (ICCIDS), June 2-3, 2017, India, pp. 1-4.
46.
Authors: Aidy Ali, M. F. Abdullah, M. K. Faidzi, Kannan Rassiah
Paper Title: Fatigue Lifetime Prediction of Laminated Composites, A Review
Abstract: It is evident that laminated reinforced composite are successfully prolonging the life of composites
compared to particle and fiber type of reinforced composites method. The question on how this laminated
composites take up the fatigue loading is crucial in order to give sound confident to industry replacing their
design from metal to composites based. The lack of confident and uncertainties‘ life of composites components
become an issue to designer to shift from metal based to composites based especially when the design required
to be done in short time. This review gives a clear picture the state of fatigue life modelling and the life
prediction of laminated composites structures. The types of model are favorable when it is accurate, simple and
required less input parameters. In the end, this review gives clear pictures on mechanism that involve and the
fundamental of formula that available at present.
Keywords: Fatigue of Composite, Laminated Composites, Modelling of Fatigue Composite, Life Prediction.
References:
1. R.G. Budynas, and J.K. Nisbett, Shigley's Mechanical Engineering Design, 10th Edition New York. McGraw-Hill, 2015. 2. S. Kalpakjian, S.R. Schmid, and K.S. Sekar, Manufacturing engineering and technology, Pearson Education South Asia Pte Ltd, 2014.
3. W.D. Callister, and D.G. Rethwisch, Materials science and engineer an introduction, New York: John Wiley & Sons, 2007.
4. J.F. Shackelford, Y.H. Han, S. Kim, and S.H. Kwon, CRC materialsscience and engineering handbook. CRC press, 2016. 5. K. Rassiah, and M. M. H. Megat Ahmad, ―A review on mechanicalproperties of bamboo fiber reinforced polymer composite‖
Australian Journal of Basic and Applied Sciences 7, 2013, pp. 247-253.
6. M.R. Sanjay, G.R. Arpitha, and B. Yogesha, ―Study on mechanicalproperties of natural-glass fibre reinforced polymer hybrid composites: A review‖, Materials today: proceedings, 2(4-5), 2015, pp. 2959-2967.
7. K.G. Satish, B. Siddeswarappa, and K.M. Kaleemulla, ―Characterization of in-plane mechanical properties of laminated
hybridcomposites‖, Journal of Minerals and Materials Characterization and Engineering, Vol. 9 (2), 2010, pp. 105-114.
8. R. Agarwal, N.S. Saxena, K.B. Sharma, S. Thomas, and L.A. Pothan, ―Thermal conduction and diffusion through glass-banana fibe
polyester composites‖, Ind. J. Pure Appl. Phys., Vol.41 (6), 2003, pp 448-452.
9. P.N.B. Reis, J.A.M Ferreira, F.V. Antunes, and J.D.M. Costa, ―Flexural 10. behaviour of hybrid laminated composites‖, Composites Part A: Applied Science and Manufacturing, Vol. 38, Issue 6, 2007, pp. 1612-
1620.
11. Y. Liu, M. Farnsworth, and A. Tiwari, A review of optimisation 12. techniques used in the composite recycling area: State-of-the-art and steps towards a research agenda. DOI :
10.1016/j.jclepro.2016.08.038
13. J.N. Reddy, Mechanics of laminated composite plates and shells: theoryand analysis. CRC press, 2004. 14. S.S. Morye and R. P. Wool, ―Mechanical properties of glass/flax hybrid
15. composites based on a novel modified soybean oil matrix material‖, Polymer Composites Vol 26, no. 4, 2005, pp. 407 - 416. DOI:
10.1002/pc.20099 16. S. Suresh, Fatigue of Materials, 2nd edition Massachusetts Institute of
17. Technology, Cambridge University Press, 1998. Online ISBN:9780511806575 https://doi.org/10.1017/CBO9780511806575
18. Aidy Ali, Mike W. Brown, and C. A Rodopoulous, ―Modelling of crack 19. coalescence in 2024-T351 Al alloy friction stir welded joints‖, International Journal of Fatigue, Vol 30, 2008, pp. 2030-2043.
20. Aidy Ali, X. An, C. A. Rodopoulos, M. W. Brown, P. O'Hara, A. Levers
21. d and S. Gardiner, ―The Effect of Controlled Shot Peening on the Fatigue Behaviour of 2024-T3 Aluminium Friction Stir Welds‖, International Journal of Fatigue, Vol 29, 2007, pp. 1531-1545.
22. Laird Nan M and James H. Ware, ―Random-Eff ects Models for Longitudinal Data‖, Biometrics Vol 38, 1982, pp. 963-974. 23. Aidy Ali, Ng Wei Kuan, Faiz Arifin, Kannan Rassiah, Faiz Othman, Shauqi Hazin, and Megat Hamdan Megat Ahmad, "Fracture
properties of hybrid woven bamboo/woven e-glass fiber composites", International Journal of Structural Integrity, Emerald, Vol 9, No
4, 2018, pp. 491-519. https://doi.org/10.1108/IJSI-09-2017-0051 24. Aidy Ali, Rabiatun Adawiyah, Kannan Rassiah, Wei. Kuan Ng, Faiz Arifin, Faiz Othman, Muhammad Shauqi Hazin, M.K Faidzi, M.
Abdullah, and M.M.H. Megat Ahmad, "Ballistic Impact Properties of Woven Bamboo-Woven E Glass- Unsaturated Polyester Hybrid
Composites", Defense Technology. Vol 9 No 4, pp. 491-519, 2018. https://doi.org/10.1108/IJSI-09-017-0051 25. M. Kaminski, F. Laurin, J.F. Maire, C. Rakotoarisoa, and E. Hémon. Fatigue damage modeling of composite structures: the onera
viewpoint. AerospaceLab, 2015, pp. 1-12. Available: https://hal.archives-ouvertes.fr/hal-01193150
26. W. Huang, J. Zhao, A. Xing, G. Wang, and H, Tao. ―Influence of tool path strategies on fatigue performance of high-speed ball-end-milled AISI H13 steel‖, The International Journal of Advanced Manufacturing Technology, Vol. 94, no. 1-4, 2018, pp. 371-380.
27. J.W. Weeton, K.L. Thomas, and D.M. Peter, Engineer‘ guide to composited material: American Society for Metal International, 1987.
28. Clemence Rubiella, Cyrus A. Hessabi, and Arash Soleiman Fallah, ―State of the art in fatigue modelling of composite wind turbine blades‖, International Journal of Fatigue 117, 2018, pp. 230-245.
29. F.H. Bhuiyan, and R.S Fertig III, ―Predicting matrix and delamination fatigue in fiber-reinforced polymer composites using kinetic
theory of fracture‖, International Journal of Fatigue, 117, 2018, pp. 327-339. 30. T. Suzuki, H. Mahfuz, and M. Takanashi, ―A new stiffness degradation model for fatigue life prediction of GFRPs under random
loading‖, International Journal of Fatigue, 119, 2019, pp. 220-228.
31. C. Ganesan, P.S. Joanna, and G. Srilochan, ―Modeling the damage of composite materials subjected to fatigue loading‖, In IOP Conference Series: Materials Science and Engineering, Vol. 377, No. 1, 2018, (p. 012093), IOP Publishing, DOI: 10.1088/1757-
899X/377/1/012093.
32. A. Tabiei, and W. Zhang, ―Composite laminate delamination simulation and experiment: a review of recent development‖, Applied Mechanics Reviews, 70(3), 2018, 030801. DOI: 10.1115/1.4040448.
33. J. Llobet, P. Maimí, Y. Essa, andF.M. de la Escalera, ―Progressive matrix cracking in carbon/epoxy cross-ply laminates under static and
fatigue loading‖, International Journal of Fatigue, 119, 2019, pp. 330-337. 34. C. Tao, S. Mukhopadhyay, B. Zhang, L.F. Kawashita, J. Qiu, and S.R. Hallett, ―An improved delamination fatigue cohesive interface
268-278
model for complex three-dimensional multi-interface cases‖, Composites Part A: Applied Science and Manufacturing, 107, 2018 pp.
633-646. 35. H. Ijaz, W. Saleem, M. Zain-ul-Abdein, A.A. Taimoor, and A.S.B. Mahfouz, ―Fatigue Delamination Crack Growth in GFRP
Composite Laminates: Mathematical Modelling and FE Simulation‖, International Journal of Aerospace Engineering, vol. 2018, Article
ID 2081785, 8 pages, 2018. https://doi.org/10.1155/2018/2081785.
36. G. Allegri, ―Modelling fatigue delamination growth in fibre-reinforced composites: Power-law equations or artificial neural networks‖,
Materials & Design, 155, 2018, pp. 59-70.
37. N. Jagannathan, S. Gururaja, and C.M. Manjunatha, ―Probabilistic strength based matrix crack evolution model in multi-directional composite laminates under fatigue loading‖, International Journal of Fatigue, 117, 2018, pp. 135-147.
38. M. K. Faidzi, A. K. Hamizi, M. F Abdullah, M. A Aliimran, K. Z Ku
39. Ahmad, Raja Nor Othman, Aidy Ali, ―Fatigue Crack Growth Behaviour of Sandwiched Metal Panel of Aluminium and Mild Steel under Constant Amplitude Loading‖, International Journal of Engineering and Technology, 7 (4.33), 2018, pp. 362-366.
40. Mohd Khairul Faidzi Muhamad Paudzi, Mohamad Faizal Abdullah,
41. Aidy Ali. Fatigue Analysis of Hybrid Composites of Kenaf/Kevlar Fibre Reinforced Epoxy Composites, Jurnal Kejuruteraan (Journal of Engineering), Online First http://dx.doi.org/10.17576/jkukm-2018-SI-1(7),2018, ISSN:0128-0198, E-ISSN:2289-7526
47.
Authors: Durga Pathrikar, V. N. Jirafe
Paper Title: Implementation of Iterative bilateral filtering for removal of Rician noise in MR images using FPGA
Abstract: Magnetic resonance image noise reduction is important to process further and visual analysis.
Bilateral filter is denoises image and also preserves edge. It proposes Iterative bilateral filter which reduces
Rician noise in the magnitude magnetic resonance images and retains the fine structures, edges and it also
reduces the bias caused by Rician noise. The visual and diagnostic quality of the image is retained. The
quantitative analysis is based on analysis of standard quality metrics parameters like peak signal-to-noise ratio
and mean structural similarity index matrix reveals that these methods yields better results than the other
proposed denoising methods for MRI. Problem associated with the method is that it is computationally complex
hence time consuming. It is not recommended for real time applications. To use in real time application a
parallel implantation of the same using FPGA is proposed.
Keywords: Iterative Bilateral Filtering, MRI, Rician Noise, FPGA
References:
1. Wright, G.: Magnetic resonance imaging. IEEE Signal Process. Mag. 1, 56–66 (1997) 2. Nishimura, D.G.: Principles of Magnetic Resonance Imaging. Stanford University, Stanford, CA (2010)
3. Manjón, J.V., Carbonell-Caballero, J., Lull, J.J., Garciá-Martí, G., Martí-Bonmatí, L., Robles, M.: MRI denoising using non-local
means. Med. Image Anal. 12, 514–523 (2008) 4. Wiest-Daesslé, N., Prima, S., Coupé, P., Morrissey, S. P., Barillo, C.: Rician noise removal by non-local means filtering for low signal-
to-noise ratio MRI: applications to DT-MRI. In: Proceedings of MICCAI, pp. 171-179 (2008)
5. Manjón, J.V., Coupé, P., Martí-Bonmatí, L., Collins, D.L., Robles, M.: Adaptive non local means denoising of MR images with spatially varying noise levels. J. Magn. Reson. Imaging 31, 192–203(2010)
6. R. Riji, Jeny Rajan, Jan Sijbers, Madhu S. Nair. "Iterative bilateral filter for Rician noise reduction in MR images", Signal, Image and
Video Processing, 2014
279-284
48.
Authors: Baratov Mirodilzhon, Tukhtashev Khikmatilla
Paper Title: Trends in Development Private Ownership of land and land Parcels in Uzbekistan: Scientific and
Theoretical Analysis
Abstract: the article analyzes the stages of privatization of non-agricultural land and the stages of their
development. It also analyzed the theoretical aspects and studied the peculiarities of developed countries Peru,
Poland, France and the United States in the area of land privatization. In the article recommendations and
conclusions on the development of existing legislation were developed based on foreign and domestic
experience in land privatization.
Keywords: land plots, privatization of land plots, land of industrial, commercial and service points, auction
sale, sale of private property.
References:
1. G. O. Young, ―Synthetic structure of industrial plastics (Book style with paper title and editor),‖ in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.
2. W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.
3. H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4. 4. B. Smith, ―An approach to graphs of linear forms (Unpublished work style),‖ unpublished.
5. E. H. Miller, ―A note on reflector arrays (Periodical style—Accepted for publication),‖ IEEE Trans. Antennas Propagat., to be
published. 6. J. Wang, ―Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),‖ IEEE J. Quantum
Electron., submitted for publication.
7. C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.
8. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, ―Electron spectroscopy studies on magneto-optical media and plastic substrate
interfaces(Translation Journals style),‖ IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics
Japan, 1982, p. 301]. 9. M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.
10. (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue).
Available: http://www.(URL) 11. J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com
12. Shagayda N.I. The turnover of agricultural land in Russia: the transformation of institutions and practice // Scientific works № 142 p. –
M., In-t. Gaidara, 2010. – 332 P .; Sitkova O.N. Private property right to agricultural land plots and problems of its protection: dissertation ofcand. legal sciences. –Krasnodar: 2007. – 28 p.
13. Issues of development and improvement of land legislation of the Republic of Uzbekistan: a set of issues of the Republican scientific-
285-289
practical conference. –Tashkent: Tashkent State University of Law, 2019. – 373 p.
14. Amelina N.E. Free privatization of land plots from the lands of settlements and problems of recognition of ownership of them by citizens: Abstract diss. ... cand. legal sciences. –Krasnodar: 2007. – 27 P.; Tyapkina E.A. Legal problems of privatization of state
enterprises: Author. diss. ... cand. legal sciences. –M., 2003. – 27 p.
15. Bezbach V.V. Private land ownership in Latin America (legal regulation): Doctor of Law dissertation 12.00.03. –M., 1997. –17 p.
16. Kholmuminov J.T. Natural resource law in foreign countries: comparative analysis and improvement of legislation. Monograph. –
Tashkent: Tashkent State University of Law, 2012 –P.44-45.
17. Kresnikova N. Regulation of land use in foreign countries and Russia // International Agricultural Journal. 2005. –№2. –P.43-46. 18. National Database of Legislation (LexUZ), dated 13.08.2019, № 03/19/552/3541.
19. Usmonov M.B. Renting in agriculture. –Tashkent: Tashkent State University of Law 2005. – 76 p.
20. Jalilov I.D. The emergence and development of Soviet land law in Uzbekistan. –Tashkent: Sci., 1970. – 29 p. 21. According to Article 17 of the Land Code, legal entities must have land plots on the basis of permanent possession, permanent use,
term (temporary) use, lease and property rights, and individuals (citizens) must have the right for land plots to inherit, lifelong
possession, permanent use, temporary (temporary) use, lease and ownership. 22. Usmonov M.B., Jo'raev Y.O., Rustamboev M.X. and others. Land law. –Tashkent: Tashkent State University of Law, 2002. – 58 p.
(The author of this chapter is U.Bozorov).
23. Collection of Legislation of the Republic of Uzbekistan, 2005, № 28-29, Article 204. 24. National Database of Legislation (LexUz), 04.05.2018, № 06/18/5428/1158.
25. http://lex.uz/docs/767394.
26. This resolution repealed according to the Resolution of the Cabinet of Ministers of the Republic of Uzbekistan from April 11, 1995 of № 126 "About the procedure for sale of objects of commercial and service pointss with the lands where they are located and on private
property // Collection of Resolutions of the Government of the Republic of Uzbekistan, 1995, № 4, Article 15.
27. Bulletin of the Supreme Council of the Republic of Uzbekistan, 1994, № 11-12, Article 301. 28. Collection of Resolutions of the Government of the Republic of Uzbekistan, 1995, № 4, Article 15.
29. National Database of Legislation, 05.01.2018, № 03/18/456/0512.
30. Collection of Legislation of the Republic of Uzbekistan, 2006, № 30, Article 288. 31. Collection of Legislation of the Republic of Uzbekistan, 2012, № 39, Article 446.
49.
Authors: Aditya Kaduskar, Omkar Vengurlekar, Varunraj Shinde
Paper Title: RSSI Filtering Methods Applied to Localization using Bluetooth Low Energy
Abstract: Bluetooth Low Energy or BLE is a technology targeting mostly small-scale IoT applications
including wearables and broadcasting beacons that require devices to send small amounts of data using minimal
power. This paper focuses on our implementation, which is a system, designed to filter RSSI (Received Signal
Strength Indicator), calculate the co-ordinates of a BLE device that is programmed as a Beacon and display the
coordinates. Since RSSI is susceptible to noise and a downgrade in its reliability is unavoidable, several filtration
methods have been used. The ‗Kalman – Histogram‘ method, which incorporates the usage of a histogram of the
RSSI readings along with the Kalman filter, is our own approach to tackle issues regarding noisy RSSI readings.
The localization of stationary ‗Assets‘, has been evaluated using the Trilateration algorithm: a result in
mathematics which is used to locate a single point using its distance from three or more other points. The
purpose of this research work is to provide a comparative result analysis of the results obtained using the
aforementioned filters, indicating the effect of these filters on our localization system. As our research suggests,
the ‗Kalman – Histogram‘ filter performs better as compared to other filters and can be used in localization
applications for better accuracy.
Keywords: Bluetooth Low Energy (BLE), Raspberry Pi, Localization
References:
1. O. Silver, ―An Indoor Localization System Based on BLE Mesh Network‖, 2016.
2. R. Heydon, ―Detailed Bluetooth Low Energy: The Developer's Handbook‖, 2013.
3. F. Zafari, A. Gkelias, and K. K. Leung, A Survey of Indoor Localization Systems and Technologies,‖ IEEE Communications Surveys
& Tutorials, vol. 21, no. 3, pp. 2568-2599, 2019.
4. A. Pal, ―Localization Algorithms in Wireless Sensor Networks: Current Approaches and Future Challenges.‖, Network Protocols &
Algorithms, vol. 2, no. 1, pp. 45-73, 2010.
5. P. Kriz, F. Maly, and T. Kozel, ―Improving Indoor Localization Using Bluetooth Low Energy Beacons‖, Mobile
Information Systems, vol. 2016, 2016.
6. C. M. El Amine, O. Mohamed, and B. Boualam, ―The Implementation of Indoor Localization Based On An Experimental Study of
RSSI Using a Wireless Sensor Network‖, Peer-to-Peer Networking and Applications, vol. 9, no. 4, pp. 795-808, 2016.
7. J. Du, J.-F. Diouris, and Y. Wang, ―A RSSI-Based Parameter Tracking Strategy for Constrained Position Localization‖, EURASIP
Journal on Advances in Signal Processing,‖ vol. 2017, no. 1, pp. 1-10, 2017.
8. P. Askari and F. Barekat, ―Trilateration and Bilateration in 3D and 2D Space Using Active Tags,‖ 10 2017.
9. V. Canton Paterna, A. Calveras Auge, J. Paradells Aspas, and M. A. Perez Bullones, ―A Bluetooth Low Energy Indoor Positioning
System With Channel Diversity, Weighted Trilateration And Kalman Filtering,‖ Sensors, vol. 17, no. 12, p. 2927, 2017.
10. S. Subedi, G.-R. Kwon, S. Shin, S.-s. Hwang, and J.-Y. Pyun, ―Beacon Based Indoor Posi-tioning System Using Weighted
Centroid Localization Approach‖, in 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN),
pp. 1016-1019, IEEE, 2016.
11. K. Curran, E. Furey, T. Lunney, J. Santos, D. Woods, and A. McCaughey, ―An Evaluation of Indoor Location Determination
Technologies‖, Journal of Location Based Services, vol. 5, no. 2, pp. 61-78, 2011.
12. J. Talvitie, M. Renfors, and E. S. Lohan, ―A Comparison Of Received Signal Strength Statistics Between 2.4 GHz and 5 GHz
Bands For Wl-Based Indoor Positioning‖, in 2015 IEEE globecom workshops (GC Wkshps), pp. 1-6, IEEE, 2015.
13. R. Faragher and R. Harle, ―Location Fingerprinting With Bluetooth Low Energy Beacons‖, IEEE journal on Selected Areas in
Communications, vol. 33, no. 11, pp. 2418-2428, 2015.
14. H. Park, J. Noh, and S. Cho, ―Three-Dimensional Positioning System Using Bluetooth Low-Energy Beacons‖, International Journal
of Distributed Sensor Networks, vol. 12, no. 10, p. 1550147716671720, 2016.
15. M. WENGER, J. CARRERA, and Z. ZHAO, Indoor Positioning Using Raspberry Pi With uwb‖, Bachelor Thesis, University of Bern,
Institute of Computer Science, 2019.
16. X. Zhu, Y. Feng, et al., ―RSSI-Based Algorithm For Indoor Localization‖, Communications and Network, vol. 5, no. 02, p. 37, 2013.
17. Google, Bluetooth SIG, ―https://www.bluetooth.com/blog/proximity-and-rssi/‖,
290-299
18. (accessed September 21, 2015).
19. Google, Bluetooth SIG, ―https://www.bluetooth.com/blog/introducing-bluetooth-mesh-networ king/‖, (accessed July 18, 2017).
50.
Authors: Palwinder Kaur Mangat, Kamaljit Singh Saini
Paper Title: Predictive Analytics for Students’ Performance Prediction
Abstract: Personalized learning is being popular due to digitizations that enable a large number of
technologies to support it. To predict students‘ learning abilities, it is necessary to estimate their behavior to
know about their weaknesses and strengths. If it is possible for teachers to predict in advance at-risk and dropout
students, they can plan more effectively to handle them. We are describing in this paper various intelligent
tutoring systems with Educational Data Mining, Predictive Learning Analytics, prediction of at-risk students at
an earlier basis, how this prediction task is done. We are describing various prediction models that can be used
to predict students‘ behavior and how portable these predictive models are and the various risk prediction
systems that are being used.
Keywords: Predictive Learning Analytics, Intelligent Tutoring Systems, Student Risk Prediction, Risk
Prediction Systems, EDM, Early Warning Systems (EWS).
References:
1. R. Conijn, C. Snijders, A. Kleingeld, and U. Matzat, ―Predicting Student Performance from LMS Data : A Comparison of 17 Blended Courses Using Moodle LMS,‖ vol. 10, no. 1, pp. 17–29, 2017.
2. U. States, ―On early prediction of risks in academic performance for students,‖ vol. 59, no. 6, pp. 1–14, 2015.
3. D. Baneres, M. E. Rodríguez, and M. Serra, ―An Early Feedback Prediction System for Learners At-risk within a First-year Higher Education Course,‖ vol. 1382, no. c, 2019.
4. W. Chen, C. G. Brinton, D. Cao, A. Mason-singh, C. Lu, and M. Chiang, ―Early Detection Prediction of Learning Outcomes in Online
Short-Courses via Learning Behaviors,‖ vol. 1382, no. c, pp. 1–14, 2018. 5. C. Ramos, C. Frasson, S. Ramachandran, and C. Ramos, ―Introduction to the Special Issue on Real World Applications of Intelligent
Tutoring Systems,‖ IEEE Trans. Learn. Technol., vol. 2, no. 2, pp. 62–63, 2009.
6. S. U. N. Yu and X. U. Tianwei, ―Intelligent Search Agents for Web-based Intelligent Tutoring Systems,‖ pp. 1148–1151, 2008. 7. D. Riofr, J. Ram, and M. Berrocal-lobo, ―Predicting Student Actions in a Procedural Training Environment,‖ vol. X, no. c, pp. 1–13,
2017.
8. [8] L. I. U. L. Wu, M. W. Hua, I. E. College, and I. Technology, ―Design an Applied Student Model for Intelligent Tutoring System,‖ pp. 2–6.
9. B. I. Mohammad, S. I. Shaheen, and S. A. Mokhtar, ―Novel Online Tutor Modeling For Intelligent Tutoring Systems,‖ 2001.
10. G. Gutjahr, K. Menon, and P. Nedungadi, ―Using an intelligent tutoring system to predict mathematics and English assessments,‖ Proc.
- 5th IEEE Int. Conf. MOOCs, Innov. Technol. Educ. MITE 2017, pp. 135–140, 2018.
11. S. Ke and X. Lu, ―Study on intelligent tutoring system based on multi-agents,‖ Proc. - 2010 6th Int. Conf. Nat. Comput. ICNC 2010,
vol. 6, no. Icnc, pp. 2948–2952, 2010. 12. S. U. N. Yu, ―A Multi-Agent Intelligent Tutoring System,‖ pp. 1724–1728, 2009.
13. R. Rollande and J. Grundspenkis, ―Representation of study program as a part of graph based framework for tutoring module of
intelligent tutoring system,‖ 2012 2nd Int. Conf. Digit. Inf. Process. Commun. ICDIPC 2012, pp. 108–113, 2012. 14. T. A. O. Ren and J. Xiao, ―The Influence of Student Abilities and High School on Student Growth : A Case Study of Chinese National
College Entrance Exam,‖ vol. 7, 2019.
15. S. P. M. Choi et al., ―International Forum of Educational Technology & Society Learning Analytics at Low Cost : At-risk Student Prediction with Clicker Data and Systematic Proactive Interventions Published by : International Forum of Educational Technology &
Society Linked refe,‖ vol. 21, no. 2, 2018.
16. R. M. M. F. Luis, M. Llamas-Nistal, and M. J. F. Iglesias, ―Enhancing learners‘ experience in e-learning based scenarios using Intelligent tutoring systems and learning analytics: First results from a perception survey,‖ Iber. Conf. Inf. Syst. Technol. Cist., pp. 1–4,
2017.
17. M. Srilekshmi, ―Learning Analytics to Identify Students at-risk in MOOCs,‖ pp. 194–199, 2016. 18. R. Umer, T. Susnjak, A. Mathrani, and S. Suriadi, ―A learning analytics approach : Using online weekly student engagement data to
make predictions on student performance .,‖ 2018 Int. Conf. Comput. Electron. Electr. Eng. (ICE Cube), pp. 1–5, 2018.
19. J. Jonathan, S. Sohail, F. Kotob, and G. Salter, ―The Role of Learning Analytics in Performance Measurement in a Higher Education
Institution,‖ 2018 IEEE Int. Conf. Teaching, Assessment, Learn. Eng., no. December, pp. 1201–1203, 2018.
20. E. Seidel, ―Using predictive analytics to target and improve first year student attrition,‖ no. 2011, 2017. 21. L. W. Santoso, ―Early Warning System for Academic using Data Mining,‖ 2018 Fourth Int. Conf. Adv. Comput. Commun. Autom.,
pp. 1–4, 2018.
22. S. Milinkovi and V. Vujovi, ―Students ‘ Success Predictive Models Based on Selected Input Parameters Set,‖ 2019 18th Int. Symp. INFOTEH-JAHORINA, no. March, pp. 1–6, 2019.
23. A. Wolff, Z. Zdrahal, and M. Pantucek, ―Improving retention : predicting at-risk students by analysing clicking behaviour in a virtual
learning environment,‖ pp. 145–149, 2013.
300-305
51.
Authors: Aboli V. Chavhan, Arif Khan
Paper Title: Water Pollution – Sources, Effects and Control
Abstract: Water could be a basic asset inside the lives of people World Health Organization each enjoys its
utilization and World Health Organization square measure harmed by its abuse and flightiness (flooding, dry
spells, saltiness, causticity, and debased quality). Water could be a limited and weak asset. Thus, utilization of
polluted water places lives and jobs in peril because of water have no substitute. There square measure numerous
ways during which water implied for human utilization will get debased. These grasp squanders from businesses
like mining and development, food process, hot squanders from power creating enterprises, household and
agrarian squanders and by shifted microbiological operators. These days, water is being refined by differed ways
anyway examination is being led to appear for a great deal of dependable and less expensive ways that may
cleanse water at a sensible worth.
Keywords: water contamination, impact, spillover, control measures, composts
306-310
References:
1. Adetunde, L.A. what's more, Glover, R.L.K. (2010). Bacteriological Quality of Borehole Water utilized by Students' of University for Development Studies, Navrongo Campus in Upper-East Region of
2. Ghana. Ebb and flow Research Journal of Biological Sciences. 2(6):361-364. Akio, M. (1992). Severe Sea: The Human Cost of
Minamata sickness. First Edition. Kosei Publishing, Japan. 3. 3.Baig, J.A., Kazi, T. G., Arain,M. B., Afridi, H. I., Kandhro, G.A., Sarfraz, R. A., Jamali, M. K. What's more, Shah, A. Q. (2009)?
Assessment of arsenic and other physico-compound boundaries of surface and spring water of Jamshoro, Pakistan. Diary of Hazardous
Materials. 166, 662–669. 4. Bu, H., Tan, X., Li, S. What's more, Zhang, Q. (2010)? Water quality appraisal of the Jinshui River (China) utilizing multivariate
measurable procedures. Environ Earth Sci. 60, 1631–1639.
5. Craftsman, S.R., Caraco, N.F., Correll, D.L., Howarth, R.W., Sharpley, A.N. what's more, Smith, V.H. (1998). Non point contamination of surface waters with phosphorus and nitrogen. Natural Applications. 8: 559-568.
6. CPCB Report. (2013). Status of Water Quality in India 2011. Observing of Indian National Aquatic Resources, Series:
MINARS/35/2013-14. Pp. 1-212. 7. Friberg, L., Piscator, M., Nordberg, G.F and Kjellstrom, T. (1974). Cadmium inside nature, second version, Chemical Rubber
Company Press, Cleveland, Ohio, 248 pp.
8. Goolsby, D.A. what's more, Battaglin, W.A. (2001). Long haul changes in focuses and transition of nitrogen inside the Mississippi Basin, U.S.A. Hydrological Processes. 15: 1209-1226.
9. 9.Howarth, R. W., Billen,G., Swaney, D., Townsend, A., Jaworski, N., Lajtha, K., Downing, J.A., Elmgren, R.,
10. Murdoch, P. Also, Zhu, Z. (1996). Local nitrogen financial plans and riverine N and P motions for the wastes toward the North Atlantic Ocean: Natural and human impacts. Biogeochemistry.35:181–226.
11. Kumar, R., Singh, R.D. also, Sharma, K.D. (2005). Water assets of India. Current Science. 85(5): 794-811.
12. Larry, W. (2006). World Water Day. A Billion people Worldwide Lack Safe Drinking http://environment.about.com/od/environmentalevents/a/waterdayqa.htm, March 22nd, 2006.
13. Mian, I. A., Begum, S., Riaz, M., Ridealgh, M., mcclean, C. J. Also, Cresser, M. S. (2010).
52.
Authors: Ankush S, Vinayprasad M S
Paper Title: Enhance Security for Authentication
Abstract: An enhanced security for authentication is defined because it is vital that authentication is an
extremely important crucial robust process for each user to access any of the applications. Magnificent growth
and usage of the internet raise agitate about the way to communicate, protect data and sensitive information
safely. In today's world hackers use differing types of attacks in order to acquire valuable information. Many of
the attacks are primarily used to get into an application to steal the credentials followed by internal information
of the users. The first thing of security is defined in three terms. i.e., confidentiality, integrity and availability.
Confidentiality can protect information from unauthorized access and exploiting of sensitive data. Integrity
measures protect information from unauthorized alteration. Whereas availability so as for a data system to be
useful it must be available to authorized users. The most objective of this paper is to supply information about
confidentiality in terms of multifactor authentication. Confidentiality plays a serious role in terms of
authentication. Authentication is the process of proving or showing to be true. This includes confidentiality and
integrity. The improved security for authentication is additionally known for multifactor authentication for the
users. This multifactor authentication is implemented for an android application using a visual-picture login
technique to access the an application.
Keywords: Multifactor authentication (MFA), One-time-password(OTP), Visual-picture login, Confidentiality,
Integrity, Click-points, Coordinates.
References:
1. ABBAS ACAR, ―A PRIVACY-PRESERVING MFA‖, IEEE INTERNATIONAL JOURNAL, 2019.
2. XINYI HUANG, YANG XIANG, ―ROBUST MULTI-FACTOR AUTHENTICATION FOR FRAGILE COMMUNICATIONS‖, IEEE INTERNATIONAL
JOURNAL, 2014.
3. NAPA SAE-BAE, ―BIOMETRIC-RICH GESTURE: BASED ON MULTI-TOUCH‖, INTERNATIONAL JOURNAL, 2012.K. ELISSA, ―TITLE OF PAPER
IF KNOWN,‖ UNPUBLISHED. 4. ALIREZA PIRAYESH, ANGELOS STAVROU, ―UNIVERSAL MULTI-FACTOR AUTHENTICATION USING GRAPHICAL PASSWORDS‖, IEEE
INTERNATIONAL JOURNAL 2008.
5. ABBAS ACAR, WENYI LIU, ―A PRIVACY-PRESERVING MULTIFACTOR AUTHENTICATION SYSTEM‖, WILEY JOURNAL, 2019M. YOUNG, THE TECHNICAL WRITER‘S HANDBOOK. MILL VALLEY, CA: UNIVERSITY SCIENCE, 1989.
6. B. MADHURAVANI, DR. P. BHASKARA REDDY, ―A COMPREHENSIVE STUDY ON DIFFERENT AUTHENTICATION FACTORS‖, IJERT 2013.
7. ALZAHRAA J. MOHAMMED AND ALI A. YASSIN, ―EFFICIENT AND FLEXIBLE MULTI-FACTOR AUTHENTICATION PROTOCOL BASED ON
FUZZY EXTRACTOR OF ADMINISTRATOR‘S FINGERPRINT AND SMART MOBILE DEVICE‖, MDPI ARTICLE, 2019.
8. NEENU ANN SHAJI, SUMITHA SOMAN, ―MULTI-FACTOR AUTHENTICATION FOR NET BANKING‖, INTERNATIONAL JOURNAL OF SYSTEM
AND SOFTWARE ENGINEERING, VOL 5, 2017. 9. DIVYA JAMES, MINTU PHILIP, ―A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY‖, IEEE 2012
10. SUGATA SANYAL, AYU TIWARI, AND SUDIP SANYAL, ―A MULTIFACTOR SECURE AUTHENTICATION SYSTEM FOR WIRELESS
PAYMENT‖, SPRINGER-VERLAG, 2010 11. https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/ https://developer.android.com/docs
311-315
53.
Authors: Klodian Gumeni
Paper Title: Analyzing and Solving Stability Problems during the Commissioning of the Steam Turbine
Abstract: The commissioning of the steam turbine in the CCPP of Vlore (Albania) was carried out after a
shutdown of about one year. During previous operation of the unit, in particular in a couple of shutdowns, were
observed high vibration at bearing MAD 21. Before the restart, the oil deflector of the MAD21 bearing (the
bearing located in the front standard, on the inlet side of the steam turbine and adjacent to the clutch) was
modified increasing the radial clearance on the part of the oil deflector acting as a thermal shield with the aim of
316-320
eliminating / preventing the risk of rubbings. Rubs at the location of the above mention oil deflector were
considered as the very likely cause of high vibration at bearing MAD 21. A lot of tests were carried out during
the recommissioning phase and the data received were analyzed. This paper details the discovery of the
problems, initial attempts to address them and the use of the rotor dynamics tools to find a solution of the
problem by the optimization of the bearings.
The bearings were not optimized as per rotordynamics analysis (RDA) findings, because it was a too expensive
solution. The solution was found making some modification on control system of the ST, without affecting the
mechanical integrity of the machine.
Keywords: bearing vibration, critical speed, shut down and start up trends, trip limit.
References:
1. J.S.Rao, ―Vibratory Condition Monitoring of Machines‖, Narosa Publishing House, 2000.
2. Ansaldo Energia, ST – Start UP Curves, pp 2 – 3, 5 – 6. 3. Ansaldo Energia, Steam Turbine General Description, pp. 2 – 3, 5 – 7.
4. Ansaldo Energia, ST – Start UP Procedures, pp. 9 – 10.
5. ISO 7919-2, Mechanical Vibration – Evaluation of machine vibration by measurements on rotating shafts, pp.8. 6. Ansaldo Energia, ST Commissioning Procedure, pp. 80 – 85.
7. C.Scheffer, P.Girdhar, ―Practical Machinery Vibration Analysis and Predictive Maintenance‖, Newnes, An Imprint of Elsevier, 2004,
pp. 134 – 145. 8. Maurice L. Adams, Jr. ―Rotating Machinery Vibration‖, Marcel Dekker, 2000.
54.
Authors: J.Karpagam, P.Bavithra, I.Infranta Merlin, J.Kousalya
Paper Title: IoT Based Smart Farming
Abstract: Agriculture is the key factor to satisfy the economy of our country and it is one of the basic needs of
the human resources. Watering the plants is very important in agriculture. By using recent and current
technologies irrigation system can be upgraded with the help of sensors and Microcontrollers. Thus, this
irrigation system can be groomed and upgraded into an automated process.
Keywords: Irrigation, Water level sensor, GSM Module, Arduino-UNO.
References:
1. Aman Bafna, Anish Jain, Nisrag Shah and Rishab Parekh, ―IoT Based Irrigation using Arduino and Android on the bases of Weather
Prediction‖, International Research Journal of Engineering and Technology, Vol 05 Issue 05, 2018, pp. 433-437
2. Kim. Y, Evans. R. G, Iversen. W.M, 2008 ‗Remote Sensing and Control of an Irrigation System using a Distributed Wireless Sensor Network‘, IEEE Transactions on Instrumentation and Measurement, Vol. 57, No.:8, pp 1-6.
3. Dhivya A, Infanta J, Chakrapani K, 2012 ‗Automated Agricultural Process using PLC and Zigbee‘, Journal of Artificial Intelligence,
Vol.5, No.:4, pp 123-130. 4. Satyanarayana G. V, Mazaruddin S. D, 2013 ‗Wireless Sensor Based Remote Monitoring System for Agriculture using Zigbee and
GPS‘, in Proceedings of Conference on Advances in Communication and Control Systems, pp. 110-114.
5. DewesgvreeRane, ‗Review Paper based on Automatic Irrigation System based on RF Module‘, International Journal of AICT, Vol.1, No. 9, January 2015.
6. A Goap, D Sharma, AK Shukla, CR Krishna ,2018, ‗Smart Irrigation System‘, Computers and Electronics in agriculture 155, 41-49,
2018
321-324
55.
Authors: Kehdinga George Fomunyam
Paper Title: Theory or Practice? the Search for Value for Money in Engineering Education
Abstract: Engineering education was predicated on two sources. One on trade apprenticeship where people that
are trained locally under the tutelage of someone are engaged in further studies to broaden their theoretical and
practical knowledge. The other source of engineering education was within the four walls of the educational
institution which has in its core natural sciences and it emphasizes specialization in a specific aspect of
engineering. This study seeks to understand if value for money in engineering education is in theory or practice.
Value for money is one of the measures of quality of education. Value for money as a concept that has been
defined by various authors and the World Bank defined value for money as the effective, efficient, and economic
use of resources, which requires the evaluation of relevant costs and benefits with the assessment of risks and of
non-priced items and/or cost of life cycle. The objective of this research is to determine if the search for value
for money in engineering education is a theory or practice. Findings from the study revealed that engineering
education is one of foundation for the development of the society. By engineering education, the dynamics of
life has been influenced and also human culture giving more substance to civilization and politics. It was also
found out that value for money is not only a financial marker but it has with it various economic, social, physical
dimension. In engineering education costs are expended and this this necessitates the drive for value for money.
This study recommends that there is a need for better measures of value for money in engineering education and
there is a need to advance knowledge on the theories of engineering to ensure relevance in this changing era.
Keywords: engineering, engineering education, value for money, search for value for money, theory, practice.
References:
1. Barnett C, Barr J, Christie A, et al. 2010. Measuring the impact and value for money of governance and conflict programmes. ITAD: Hive, East Sussex, http://assets.publishing.service.gov.uk/media/57a08b1eed915d3cfd000b44/60797_ITAD-VFM-Report-Dec10.pdf
2. Blandin, B. 2012. ―The Competence of an Engineer and How It Is Built Through an Apprenticeship Program: A Tentative Model.‖
International Journal of Engineering Education 28 (1): 57–71. doi:0949-149X/91.
325-330
3. Booth, S. (2004). Engineering Education and the Pedagogy of Awareness. In Brown, S.(Ed) Effective Learning and Teaching in Higher
Education (PP 9-23). London: Taylor & Francis E-Library. 4. Booth, S. (2004). Engineering Education and the Pedagogy of Awareness. In Brown, S.(Ed) Effective Learning and Teaching in Higher
Education (PP 9-23). London: Taylor & Francis E-Library.
5. Continental AG. ―In Search of Global Engineering Excellence: Educating the Next Generation of Engineers for the Global
Workplace‖. Hanover, Germany, Continental AG, 2006. (Available at http://www.conti-online.com).
6. Davidson A, Miskelly J, Kelly A. (2008). Audit commission: Value for money in Schools-Literature and Data Review final report.
7. Department for international development (DFID)DFIDs approach to value for money(VFM)London. 2011. http://www.gov.uk/government/uploads/system/uploads/attachment_data/file/67479/DFID-approach-value-money.pdf
8. Erlendsson J. 2002. Value for money studies in higher education. http://hi.is/~joner/eaps/wh_vfmhe.htm
9. Fomunyam, K. G. (2016a). Student teachers negotiating teachers‘ professional identity. Journal of Educational Science, 13(2), 186-193.
10. Fomunyam, K. G. (2017a). Education as politics in the context of Operation Ghost Town in Southern Cameroon. Knowledge for
Transformation, 1(1), 1-4. 11. Grasso, Dominico; Burkins, Melody B. (Eds); Holistic Engineering Education, Beyond Technology, Springer Verlag, New York, 2010.
12. Harvey L. 2006. Understanding quality. Section B 4 1-1 of ―Introducing Bologna objectives and tools in Purser, L(Ed) EUA Bologna
Handbook: Making Bologna Work, Brussels European University Association and Berlin, Raabe 13. Holz-Clause, M., Guntuku, D., Koundinya, V., Clause, R., & Singh, K. (2015). Current and Future Trends in Higher Education
Learning: Implications for Curriculum. In N. Ololube, P. Kpolovie, & L. Makewa (Eds.), Handbook of Research on Enhancing
Teacher Education with Advanced Instructional Technologies (pp. 277-292). Hershey, PA: IGI Global. 14. http://www.whitehouse.gov/issues/education/educate-innovate (accessed on 26 June 2011).
15. https://www.raeng.org.uk/international/activities/pdf/RAEng_
16. Itabashi-Campbell, R., and J. Gluesing. 2013. ―Engineering Problem-Solving in Social Contexts: ‗Collective Wisdom‘ and ‗Ba‘.‖ In Engineering Practice in a Global Context: Understanding the Technical and the Social, edited by B. Williams, J. D. Figueiredo, and J.
P. Trevelyan, 129–158. Leiden, Netherlands: CRC/ Balkema
17. Jackson, P. 2012. Value for money and international development.: deconstructing myths to promote a more constructive discussion. Paris: OECD. http://oecd.org/development/effectiveness/49652541.pdf
18. Obama‘s Campaign to Improve the Participation and Performance of America‘s Students in Science, Technology, Engineering, and
Mathematics (STEM). ―Educate to Innovate‖. 2009. Available online: http://www.whitehouse.gov/issues/education/educate-innovate (accessed on 26 June 2011).
19. Royal Academy of Engineering. (2012). Engineers for Africa: Identifying Engineering Capacity Needs in Sub-Saharan Africa.
Summary Report. Retrieved on December 13, 2013, from https://www.raeng.org.uk/international/activities/pdf/RAEng_Africa_Summary_Report.pdf
20. Treasury HM. 2004. Regularity, propriety and value for money:London:HM Treasury.
http://webarchive.nationalarchives.gov.uk/20130129110402/ http://www.hm-treasury.gov.uk/d/reg_prop_and_VfM-November04.pdf 21. World Bank (2016). Value for money: Achieving VFM in investments projects financed by the World Bank.
http://www.worldbank.org.
56.
Authors: Kehdinga George Fomunyam
Paper Title: Social Capital in the Context of Fitness for Purpose: Do Engineering Students in Africa Possesses the
Right Capital?
Abstract: Social capital is important as it becomes an imperative as key indices for development and growth of
students who opt for engineering education. Engineering educators have important role to play in motivating
engineering students with untapped potentials to possess the right capital by creating productive teaching
platforms. This paper explored the relationship of social capital on engineering education in addition to students
possessing the right capital in their respective course of study. This paper argued that engineering educators
should develop students‘ social capital within the context of social networks and norms by promoting
knowledge-based social capital and its productivity among engineering students. This paper was guided by
Social Capital Theory, which lay emphases on the views that student learning should be centred on education
invested on human capital and social capital. Specifically, we explore engineering students having the right
capital in their study and social capital is a quality criterion that enhances students in possessing the right capital
towards EE in Africa. Thus, to address the social capital gaps in engineering education, it suggested that
engineering educational curriculum as well as staff development and capacity building should be designed in
developing engineering student to possess the right capital in their field of study. A number of educational-
oriented recommendations for social capital in engineering education investment were made.
Keywords: Africa, Curriculum, Development, Engineering students, Social capital
References:
1. Abdullah I., Malek A., Manaf A. (2019). Formulating Strategic Management in Social Capital within Gated and Guarded Community to Achieve Social Well-Being. Academy of Strategic Management Journal; 18(3).
2. Ahlborg M.G., Svedberg P., Nyholm M., Morgan A., Nygren J.M. (2019). Into the realm of social capital for adolescents: A latent
profile analysis. PLOS ONE; 14(2): e0212564. 3. Akintimehin O.O., Eniola A.A., Alabi O.J., Eluyela D.F., Okere W., Ozordi E. (2019). Social capital and its effect on business
performance in the Nigeria informal sector. Heliyon; 5 (7).
4. Almohamed A., Vyas D. (2019). Rebuilding Social Capital in Refugees and Asylum Seekers. ACM Transactions on Computer-Human Interaction; 26 (6): 1–30.
5. Amaewhule, C. E., Abraham, N. M. (2019). Social Capital Investment as Determinant of Teachers Emotional Intelligence in Public
Secondary Schools in Rivers State. International Journal of Innovative Social & Science Education Research, 7(2), 133–142. 6. Babalola O.K., Ahmed S., Onuh U.A.L. (2020). Engineering education (EE): a veritable tool for job creation and sustainable
development in Nigeria. International Journal of Electrical and Electronics Engineering (IJEEE); 9 (1): 1–8.
7. Batistic S., Tymon A. (2017). Networking Behaviour, Graduate Employability: A Social Capital Perspective. Education + Training; 59 (4): 374–388.
8. Benbow R.J., Lee C. (2019). Teaching-focused social networks among college faculty: exploring conditions for the development of social capital. Higher Education; 78 (1): 67–89.
9. Berthelsen H., Westerlund H., Pejtersen J.H., Hadzibajramovic E. (2019). Construct validity of a global scale for Workplace Social
Capital based on COPSOQ III. PLoS ONE; 14 (8). 10. Bosbach M., Maietta O.W. (2019). The Implicit Price for Fair Trade Coffee: Does Social Capital Matter? Ecological Economics; 158:
34–41.
331-338
11. Bourdieu P. (1986). The Forms of Capital. In J. G. Richardson (Ed.), Handbook of theory and research for the sociology of education;
New York: Greenwood Press. Pp. 241–258. 12. Bourdieu P., Wacquant L.P.D. (1992). An invitation to Reflexive sociology. Chicago: University of Chicago Press.
13. Brown S., Flick L., Williamson K. (2005). Social Capital in Engineering Education. 35th ASEE/IEEE Frontiers in Education
Conference, S3D-10, October 19-22, 2005, Indianapolis, IN.
14. Buck-Mcfadyen E., Isaacs S., Strachan P., Akhtar-Danesh N., Valaitis R. (2019). How the Rural Context Influences Social Capital:
Experiences in Two Ontario Communities. Journal of Rural and Community Development; 14 (1): 1–18.
15. Carreras M., Bowler S. (2019). Community Size, Social Capital, and Political Participation in Latin America. Political Behavior; 41(3): 723–745.
16. Ceryn E, Rees G, Taylor C, Wright C. (2017). Widening Access‘ to Higher Education: the Reproduction of University Hierarchies
Through Policy Enactment. Journal of Education Policy; 34 (1): 101–116. 17. Chen Y., Starobin S.S. (2019). Formation of Social Capital for Community College Students: A Second-Order Confirmatory Factor
Analysis. Community College Review; 47 (1): 3–30.
18. Coleman J.S. (1988). Social Capital in the Creation of Human Capital. American Journal of Sociology, 94 (supplement): S95–S120. 19. Coleman J.S. (1990). Foundations of social theory. Cambridge: Harvard University Press.
20. Coleman J.S. (1993). Rational reconstruction of society. American Sociological Review, 58(1), 1–15.
21. Coleman J.S. (2000). Social capital in the creation of human capital. In Knowledge and social capital; Elsevier: Pp. 17–41. 22. Cooke P., Clifton N., Oleaga M. (2005). Social capital, firm embeddedness and regional development. Regional Studies; 39 (8): 1065–
1077.
23. Danko A. I (2016), The Role of Engineering Education in National Development Entrepreneurship Education for Vocational and Technical Students (2nd Edition) Abuja Benchmark Publishers Ltd.Ch.3, pp 23-27.
24. Erinne J.N. (2015). Engineering Education for 21st Century Africa: The Chemical Engineering and Nigerian Perspectives, the Nigeria
Institution of Mechanical Engineering Annual Symposium. 25. Gilani D. (2019): Creating connections: the role of universities in enhancing graduates‘ social capital and challenging nepotism,
Perspectives: Policy and Practice in Higher Education. Pp. 1-6.
26. Harris C.M., Wright P.M., McMahan G.C. (2019). The emergence of human capital: Roles of social capital and coordination that drive unit performance. Human Resource Management Journal; 29 (2); 162–180.
27. Juma, C.O. (2015) ―Unleash the Power of Universities‖, New African Magazine. Accessed on June 30th, 2020 from
http://newafricanmagazine.com/calestous-juma-unleash-the-power-of-universities. 28. Kang, D.S., Gold J., Kim J., Kim I. (2019). Social capital and career growth. International Journal of Manpower.
29. Magana A.J., Falk M.L., Vieira C., Reese M.J. (2016). A case study of undergraduate engineering students‘ computational literacy and
self-beliefs about computing in the context of authentic practices. Computers in Human Behavior; 61: 427– 442. 30. Magana A.J., Ortega-Alvarez J.D., Lovan R., Gomez D., Marulanda J., Dyke S. (2017). Virtual, local and remote laboratories for
conceptual understanding of dynamic systems. International Journal of Engineering Education; 33(1–A): 91–105.
31. Magana A.J., Fennell H., Vieira C., Falk M.L. (2019). Characterizing the interplay of cognitive and metacognitive knowledge in computational modeling and Simulation practices. Journal of Engineering Education; 7(2).
32. Marilyn C. (2018). Rethinking Graduate Employability: The Role of Capital, Individual Attributes and Context. Studies in Higher
Education; 43 (11): 1923–1937. 33. Martin J.P., Simmons D.R., Yu S.L. (2013). The Role of Social Capital in the Experiences of Hispanic Women Engineering Majors.
Journal of Engineering Education; 102 (2): 227–243. 34. Mejia J.A., Revelo R.A., Villanueva I., Mejia J. (2018). Critical Theoretical Frameworks in Engineering Education: An Anti-Deficit
and Liberative Approach. Educ. Sci.; 8, 158.
35. Putnam, R.D. (2001). Social Capital: Measurement and Consequences. Isuma: Canadian Journal of Policy Research 2 (Spring 2001). 36. Rogošić S., Baranovic B. (2016). Social Capital and Educational Achievements: Coleman vs. Bourdieu. CEPS Journal; 6 (2): Pp. 81-
100.
37. Saukani N., Ismail N.A. (2019). Identifying the Components of Social Capital by Categorical Principal Component Analysis (CATPCA). Soc Indic Res; 141:631–655.
38. Skvoretz J., Kersaint G., Campbell-Montalvo R., Ware J.D., Smith C.A.S., Puccia E., Martin J.P., Lee R., MacDonald G., Wao H.
(2019). Pursuing an engineering major: social capital of women and underrepresented minorities, Studies in Higher Education; Pp. 1-17.
39. Thompson JJ, Jensen-Ryan D. (2018). Becoming a ―Science Person‖: Faculty Recognition and the Development of Cultural Capital in
the Context of Undergraduate Biology Research. CBE—Life Sciences Education, Winter ; 17:ar62: 1–17. 40. World Economic Forum, (2016a). Africa Skills Initiative: Stakeholders Consultation Workshop, 20 July 2016, Johannesburg, South
Africa.
41. World Economic Forum, (2016b). The Future of Jobs: Employment, Skills and Workforce Strategy for the Fourth Industrial Revolution. Executive Briefing, World Economic Forum: Geneva Switzerland. Pp. 1-68.
42. World Economic Forum (2016c). The Human Capital Report 2016. Executive Briefing, World Economic Forum: Geneva Switzerland.
Pp. 1-10. 43. World Economic Forum, (2017a). Realizing Human Potential in the Fourth Industrial Revolution: An Agenda for Leaders to Shape the
Future of Education, Gender and Work. Executive Briefing, World Economic Forum: Geneva Switzerland. Pp. 1-53.
44. World Economic Forum (2017b). The Future of Jobs and Skills in Africa: Preparing the Region for the Fourth Industrial Revolution. Executive Briefing, World Economic Forum: Geneva Switzerland. Pp. 1-28.
57.
Authors: Kehdinga George Fomunyam
Paper Title: Engineering Education and soft skills in the Era of the Fourth Industrial Revolution in Africa
Abstract: The Fourth Industrial Revolution (4IR) is impacting engineering education (EE) in diverse with
several changes from the effects of the previous three industrial revolutions. Remarkable industrialization has
been recorded in the fourth industrial revolution. However, certain skill gaps has been identified missing in
engineering courses and curriculum as employers seek skills development aligned with the fourth industrial
revolution (4IR). This paper was guided by Lifelong Learning Theory which explain that the paradigm shift
from the first three industrial revolutions to 4IR has led to EE transformation of acquiring not only technical
skills but also soft skills. This has led to critical EE curriculum review to extrapolate its impacts of soft skills on
4IR emerging workforce. This paper takes a broad look at the EE and soft skills in the era of 4IR in Africa, while
examining the EE in previous revolutions and, exploring the impacts and implications of soft skills on EE. The
possibilities of adequate investments in EE and soft skills programmes becomes an imperative to address skill
gaps and prepare engineering graduate students for future work. The importance of soft skills, values, and
improvement of soft skills in engineering education in 4IR era are discussed among others. Thus, to address soft
skills gaps in EE, industrial cooperation and educational partnership is significant to centre on EE curriculum
future-oriented skills development to consolidate with 4IR workforce demands. A number of policy
339-345
recommendations for 4IR compatibility with EE polices are made.
Keywords: Africa, Curriculum, Engineering education, Soft skills, Lifelong
References:
1. Akokuwebe M.E. & Okunola R.A. (2015). Demographic transition and rural development in Nigeria. Journal of Developing Country
Studies (USA), 5 (6), 1-13.
2. Akokuwebe M.E. (2017). Youth unemployment and electoral malpractices in Nigeria. The Nigerian Journal of Sociology and Anthropology (Nigeria) 2017; 15(3):35-52.
3. Akokuwebe M.E., Ukpabi D., Ejeh S.O. (2017). Mass media and effective socialization amongst in-school adolescents: a perceptive
study. Centrepoint Journal (Humanities Edition), University of Ilorin (Ilorin: Nigeria), 20 (2), 1-18. 4. Andrews, J. & Higson, H (2008). Graduate employability. ‖soft skill ‖verses hard‖ business knowledge: A European study. Higher
Education in Europe, 33: 411-422. 5. Atman C.J., Sheppard S.D., Turns J., Adams R.S., Fleming L.N., Stevens R., Streveler R.A., Smith K.A., Miller R.L., Leifer L.J.,
Yasuhara K., Lund D. (2010). Enabling Engineering Student Success: The Final Report for the Center for the Advancement of
Engineering Education. San Rafael, CA: Morgan & Claypool Publishers. 6. Brunhaver S. (2015). Early career outcomes of engineering alumni: Exploring their connection to the undergraduate experience
(dissertation). Stanford, CA: Stanford University.
7. Brunhaver S., Korte R., Lande M., Sheppard S. (2010). Supports and barriers that recent engineering graduates experience in the workplace. Proceedings of the American Society for Engineering Education Annual Conference and Exposition, June 20–23,
Louisville, KY.
8. Business-Higher Education Forum (BHEF). 2011. Creating the Workforce of the Future: The STEM Interest and Proficiency Challenge. Washington.
9. Carnevale AP, Smith N, Melton M. 2011. STEM. Washington: Georgetown University Center on Education and the Workforce.
10. Carrico C.A., Winters K.E., Brunhaver S., Matusovich H.M. (2012). The pathways taken by early career professionals and the factors that contribute to pathway choices. Proceedings of the American Society for Engineering Education Annual Conference and
Exposition, June 10–13, San Antonio.
11. Dameron S. & Durand T. (2013). Strategies for business school in a multi-polar word. Education and training 55,323-335. 12. Fomunyam KG (2019). Education and the Fourth Industrial Revolution: Challenges and Possibilities for Engineering Education.
International Journal of Mechanical Engineering and Technology (IJMET), 10 (8), 271-284.
13. Forbes MH, Bielefeldt AR, Sullivan JF. 2015. The choice opportunity disparity: Exploring curricular choice opportunities for engineering vs. non-engineering majors. Proceedings of the ASEE Annual Conference and Exposition, June 14–17, Seattle.
14. Gibb S. (2014). Soft skills assessment: theory development and the research agenda. International Journal of Lifelong Learning
Education, 33 (4), 455-471. 15. Gray A. (2016). The 10 skills you need to thrive in the Fourth Industrial Revolution. Accessed on 27th May, 2020 from
https://www.weforum.org/agenda/2016/01/the-10-skills-you-need-to-thrive-in-the-fourth-industrial-revolution/.
16. Hoit R., Sawicki S. & Sloan J. (2010). A theoretical review of skill shortages and skill need: Evidence report 20. Accessed on 26th of May, 2020 from http://www.ukces.org.uk/asset/bispartn ers/docs/publication/evidence.report.20.a.theoretical-review-of-skill-
shortageand.skill-need.pdf.
17. Illeris, K.(2011). The fundament of workplace learning. Understanding how people learn in working life. London: Routledge. 18. Illeris, K.(2011). The fundamentals of workplace learning: understand how people learn in working life. London: Routledge.
19. Julia Gross, 2012. Lifelong learning and your career, in Building Your Library Career with Web 2.0, 2012.
20. Kechagias, K. (ED.) (2011). Teaching and assessing soft skills MASS project report school Thessaloniki, Neapoli. 21. Kirk D. (2010). Causes of unemployment in South Africa. Accessed on May 29th, 2020 from
https://twentythirdfloor.co.za/2010/12/01/causes-of-unemployment-in-south-africa/.
22. Knobbs C.G. & Grayson D.J. (2012). An approach to developing independent learning and non-technical skills amongst final year mining engineering students. European Journal of Engineering Education, 37 (3), 5-10.
23. Litchfield K., Javernick-Will A., Maul A. (2016). Technical and professional skills of engineers involved and not involved in
engineering service. Journal of Engineering Education, 105 (1), 70–92.
24. Marco Kalz, 2015. Lifelong Learning and Its Support with New Technologies in International Encyclopaedia of the Social &
Behavioural Sciences (Second Edition).
25. Martins J., Duarte M., Cunha S., Almada-Lobo B., Marques A.T., Magalhaes B. (2007). The role of hard and soft skills on engineering education. International Conference on Engineering Education ─ ICEE 2007, Coimbra, Portugal, September 3-7, 2007, 1-6.
26. Mejia JA, Revelo RA, Villanueva I, Mejia J (2018). Critical Theoretical Frameworks in Engineering Education: An Anti-Deficit and
Liberative Approach. Educ. Sci., 8 (158), 1-13.
27. Mourtos NJ (2015). Preparing Engineers for the 21st Century: How to teach engineering students process skills. International Journal
of Quality Assurance in Engineering and Technology Education, 4 (4), 1-26.
28. Naji K.K., Ebead U., Al-Ali A.K., Du X. (2020). Comparing Models of Problem and Project-Based Learning (PBL) Courses and Student Engagement in Civil Engineering in Qatar. Eurasia Journal of Mathematics, Science and Technology Education, 16 (8), 1867.
29. National Academy of Engineering (NAE) (2004). The Engineer of 2020: Visions of Engineering in the New Century, Washington.
D.C.: The National Academies Press. 30. Ongbali SO, Afolalu SA, Udo MO. (2019). Factors causing youth unemployment problem in Nigeria: A review. International Journal
of Mechanical Engineering and Technology, 10 (1), 1874-1879. 31. Peters MA (2017). Technological unemployment: educating for the fourth industrial revolution. Educational Philosophy and Theory,
49 (1), 1-6.
32. Peters, Michael A. (2017). Technological unemployment: educating for the Fourth Industrial Revolution. Journal of Self-governance and Management economics 5, No. 1, 25-33.
33. Pradhan A., Agwa-Ejon J. (2018). Opportunities and challenges of embracing smart factory in South Africa. In 2018 Portland
International Conference on Management of Engineering and Technology (PICMET). Honolulu, HI, USA, IEEE. 34. Ra S., Shrestha U., Khatiwada S., Yoon S.W. & Kwon K. (2019). The rise of technology and impact on skills. International Journal of
Training Research, 17 (1), 26-40.
35. Reaves J. (2019). 21st-Century Skills and the Fourth Industrial Revolution: A Critical Future Role for Online Education. International
Journal on Innovations in Online Education, 3 (1), 1-21.
36. Sackey SM, Bester A. (2016). Industrial engineering curriculum in Industry 4.0 in a South African context. South African Journal of
Industrial Engineering, 27 (4), 101-114. 37. Schwab K. (2016). The Fourth industrial Revolution: What it means, how to respond. Accessed on 22nd May, 2020 from
https://www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-it-means-and-how-to-respond/
38. Shvetsova OA, Kuzmina AD. (2018). Development of engineering personnel in the era of the Fourth Industrial Revolution. In 2018 Third International Conference on Human Factors in Complex Technical Systems and Environment (ERGO) and Environments
(ERGO). St. Petersburg, Russia, IEEE, 45-48.
39. Tonso K.L. (2014). Engineering identity. In: Cambridge Handbook of Engineering Education Research, eds Johri A, Olds BM. New York: Cambridge University Press.
40. Tracey TJG, Sodano SM. 2013. Structure of interests and competence perceptions. In: Handbook of Vocational Psychology, 4th ed.,
eds Walsh WB, Savickas ML, Hartung PJ. New York: Taylor & Francis.
41. World Economic Forum (WEF) (2015a). The Human Capital Report 2015. World Economic Forum Global Agenda Council White
Paper, Geneva: World Economic Forum, 2015 42. World Economic Forum (WEF) (2015b). Global Agenda Council on the Future of Software and Society, Deep Shift: Technology
Tipping Points and Societal Impact, World Economic Forum Global Agenda Council White Paper, 2015.
43. World Economic Forum (WEF) (2016). The Future of Jobs: Employment, Skills and Workforce Strategy for the Fourth Industrial
Revolution. Geneva: World Economic Forum, 2016. Accessed on 23rd May, 2020 from
http://www3.weforum.org/dos/WEF_Future_of_Jobs.pdf.
44. World Economic Forum (WEF) (2017a). Realizing human potential in the Fourth Industrial Revolution. An Agenda for Leaders to Shape the Future of Education, Gender and Work. Paper Presented at World Economic Forum, Geneva, 2017.
45. World Economic Forum (WEF) (2017b). Accelerating Workforce Reskilling for the Fourth Industrial Revolution an agenda for leaders
to shape the future of education, gender and work. Paper Presented at World Economic Forum, Geneva, 2017.
58.
Authors: Kehdinga George Fomunyam
Paper Title: Engineering for Survival in Rural Africa in the Era of Covid-19
Abstract: Engineering has been reputed as a discipline that makes things work better. By the ingenuity of
engineering, there is the potential to deploy creativity to solve some of the problems of the world and help in
shaping the future. Shortly after the novel coronavirus, SARS-COV-2 (2019-NCov) was initially identified in
the Chinese city of Wuhan in a group of patients diagnosed with pneumonia on December 31, 2019, it resulted
to fast paced human to human transmission which has generated lots of media stirs and hype concerning issues
of public health globally. Corona virus disease 2019 (COVID-19) is a ribonucleic acid virus (RNA) which has
the physical appearance of a crown when viewed under the microscope which is as a result of glycoprotein
spikes on its envelope. Findings from the study revealed that engineering has great impact on health conditions
in rural Africa and the era of COVID-19 brought with it various consequences on the health systems of people.
Understanding that there is no known cure for COVID-19 is key and various countries of the world depended on
their knowledge and expertise to deal with the disease. This study therefore recommends that there is a need for
intensified effort on engineering in rural Africa.
Keywords: engineering, survival, COVID-19, corona virus, rural Africa
References:
1. African Union: Impact of the Coronavirus COVID-19 on the African Economy. African Union. 2020; Accessed on April 22, 2020.
2. Corman VM, Landt O, Kaiser M, et al. Detection of 2019 novel coronavirus (2019- nCoV) by real-time RT-PCR. Euro Surveill
2020;25(January (3)), doi:http://dx. doi.org/10.2807/1560-7917.ES.2020.25.3.2000045.
3. Haider N, Yavlinsky A, Simons D, Osman AY, Ntoumi F, Zumla A, et al. Passengers‘ destinations from China: low risk of novel
coronavirus (2019-nCoV) transmis-sion into Africa and South America. Epidemiol Infect 2020a;148:e41, doi:http://
dx.doi.org/10.1017/S0950268820000424 Published 2020 Feburary 26. 4. Hoffman SJ, Silverberg SL. Delays in global disease outbreak responses: lessons from H1N1, Ebola, and Zika. Am J Public Health
2018;108(3):329–33, doi:http://dx. doi.org/10.2105/AJPH.2017.304245.
5. http://www.africacdc.org/Africa centers for disease control and prevention. . [Accessed 17 February 2020]. 6. http://www.merriam-webster.com/dictionary/survival#h1
7. http://www.raeng.org.uk/publications/reports/assessing-the-economic-returns-ofengineering-rese
8. Huang, C.; Wang, Y.; Li, Z.; Ren, L.; Zhao, J.; Hu, Y.; Zhang, L.; Fan, G.; Xu, J.; Gu, X.; et al. Clinical features of patients infected with 2019 novel coronavirus in Wuhan, China. Lancet 2020, 395, 497–506.
9. Ippolito G, Hui DS, Ntoumi F, MAeurer M, Zumla A. 2020. Toning down the 2019-nCov hype-and restoring hope. Lancet Resp Med.
8(3):230-1, doi: http//dx.doi.org/10.1016/S2213-2600(20)30070-9 10. Largent EA. EBOLA and FDA: reviewing the response to the 2014 outbreak, to find lessons for the future. J Law Biosci
2016;3(3)489–537, doi:http://dx.doi.org/ 10.1093/jlb/lsw046 [published 2016 September 16].
11. Li Q, Guan X, Wu P, et al. 2020. Early transmission dynamics in Wuhan, China, of novel coronavirus-infected pneumonia. N Engl J Med. Doi:http//dx.doi.org/10.1056/NEJMoa2001316
12. Lu, H.; Stratton, C.W.; Tang, Y.W. Outbreak of pneumonia of unknown etiology in Wuhan, China: The mystery and the miracle. J.
Med. Virol. 2020, 92, 401–402. 13. Lu, R.; Zhao, X.; Li, J.; Niu, P.; Yang, B.; Wu, H.; Wang, W.; Song, H.; Huang, B.; Zhu, N.; et al. Genomic characterization and
epidemiology of 2019 novel coronavirus: Implications for virus origins and receptor binding. Lancet 2020, 395, 565–574.
14. Matthews, P., Ryan-Collins, L., Wells, J., Sillem, H. and Wright, H. (2012). Engineers for Africa: Identifying engineering capacity needs in sub-Saharan Africa. Royal Academy of Engineering, Africa-United Kingdom Engineering for Development Partnership.
15. ncov.pdf (accessed on 25 March 2020).
16. Nduka Orjinmo. 2020. Coronavirus: Nigeria's mega churches adjust to empty auditoriums https://www.bbc.com/news/world-africa-52189785
17. Nigeria CDC 2020. https://ncdc.gov.ng/ncdc. [Accessed 18 February 2020].
18. Perlman, S.; Netland, J. Coronaviruses post-SARS: Update on replication and pathogenesis. Nat. Rev. Microbiol. 2009, 7, 439–450. 19. Phan, T. Novel coronavirus: From discovery to clinical diagnostics. Infect. Genet. Evol. 2020, 79.
20. Respirology 2018,23, 130–137
21. Royal Academy of Engineering. 2020. Project CARE (COVID-19 AFRICAN Rapid Entrepreneurs) https://www.raeng.org.uk/policy/engineering-response-COVID-19-coronavirus/project-care
22. Talisuna AO, Okiro EA, Yahaya AA, et al. Spatial and temporal distribution of infectious disease epidemics, disasters and other
potential public health emergencies in the World Health Organisation Africa region, 2016-2018. Global Health 2020;16(1)9, doi:http://dx.doi.org/10.1186/s12992-019-0540-4 [published 2020 January 15
23. WHO. Ebola virus disease. 2020. https://www.afro.who.int/health-topics/ebola- virus-disease.
24. WHO. WHO African Region: JEE mission reports. 2020. https://www.who.int/ihr/ procedures/mission-reports-africa/en/. 25. World Bank. 2020. How countries are using edtech (including online learning, radio, television, texting) to support access to remote
learning during the COVID-19 pandemic. https://www.worldbank.org/en/topic/edutech/brief/how-countries-are-using-edtech-to-
support-remote-learning-during-the-COVID-19-pandemic 26. World Economic Forum. 2020. Here‘s how Africans are using tech to combat the coronavirus pandemic.
https://www.weforum.org/agenda/2020/04/africa-technology-coronavirus-covid19-innovation-mobile-tech-pandemic
27. World Health Organization Director-General‘s Opening Remarks at the Media Briefing on COVID-19–11 March 2020. Available online: https://www.who.int/dg/speeches/detail/who-director-general-s-openingremarks-
28. at-the-media-briefing-on-COVID-19---11-march-2020 29. World Health Organization Novel Coronavirus (2019-nCoV), Situation Report 1. 21 January 2020. Available online:
https://www.who.int/docs/default-source/coronaviruse/situation-reports/20200121-sitrep-1-2019-
346-350
30. Yin, Y.;Wunderink, R.G. MERS, SARS and other coronaviruses as causes of pneumonia.
59.
Authors: Anushree H R, Sowmya B P
Paper Title: Ensembled Machine Learning Model for Aviation Incident Risk Prediction
Abstract: With the fabulous development of air traffic request expected throughout the following two decades,
the security of the air transportation framework is of expanding concern. In this paper, we encourage the
"proactive security" worldview to expand framework wellbeing with an emphasis on anticipating the seriousness
of strange flight occasions as far as their hazard levels. To achieve this objective, a prescient model should be
created to look at a wide assortment of potential cases and measure the hazard related with the conceivable
result. By using the episode reports accessible in the Aviation Safety Reporting System (ASRS), we construct a
half breed model comprising of help vector machine and K-closest neighbor calculation to evaluate the hazard
related with the result of each perilous reason. The proposed system is created in four stages. Initially, we
classify all the occasions, in view of the degree of hazard related with the occasion result, into five gatherings:
high hazard, decently high hazard, medium hazard, respectably medium hazard, and okay. Furthermore, a help
vector machine model is utilized to find the connections between the occasion outline in text configuration and
occasion result. In this application K-closest neighbors (KNN) and bolster vector machines (SVM) are applied to
group the everyday nearby climate types In equal, knn calculation is utilized to highlights and occasion results
subsequently improving the forecast. At long last, the forecast on hazard level order is stretched out to occasion
level results through a probabilistic choice tree.
Keywords: ASRS, KNN, SVM, Decision Tree.
References:
1. Choubin, B., et al., Snow avalanche hazard prediction using machine learning methods. Journal of Hydrology,2019. 577.
2. Dehghani, M., et al., Prediction of hydropower generation using Grey wolf optimization adaptive neuro-fuzzyinference system.
Energies, 2019. 12(2). 3. Mosavi, A., Y. Bathla, and A. Varkonyi-Koczy, Predicting the future using web knowledge:,D. Luca, L. Sirghi, and C. Costin, Editors.
2018, Springer Verlag. p. 341-349.
4. Maxwell, A.E., T.A. Warner, and F. Fang, Implementation of machine-learning classification in remote sensing: International Journal of Remote Sensing, 2018. 39(9): p. 2784-2817.
351-353
60.
Authors: Abdul Awwal, Aarish Khan
Paper Title: Performance Analysis of a Roundabout and a 3-leg Intersection Under Heterogeneous Traffic
Abstract: This paper addresses the analysis of the operational performance of a roundabout and a 3-legged
intersection located in quite a busy area of the Aligarh city. The city has an urban population of around 0.9
million people. The roundabout and 3-legged intersection are located in the close proximity of busy commercial
areas and schools. Roundabout that has been taken under consideration is un-signalized and 3-legged
intersection is priority controlled. The Current study has been undertaken analyze the operational execution of
the two intersections and to pave the way for forthcoming investigations related to improvement of the
intersections in the Aligarh District region. Traffic data was accumulated on weekdays during peak periods (5:30
pm to 6:30 pm). Video recording was taken in consideration to accomplish this task. The traffic was categorized
in 3 classes; light vehicles, heavy vehicles and bicycles. To execute the evaluation of functioning performance of
both intersections, SIDRA INTERSECTION software has been used. Results have shown that both the
roundabout and 3-legged intersection are operating nearly at their maximum capacities and Level of Service
(LOS) is not adequate for such amount of traffic influx into both the intersections. Volume to capacity (v/c) ratio
has revealed that both the roundabout and 3-legged intersection are in an unstable state and roundabout condition
is worse than the 3-legged intersection as the heavy vehicle volume influx is quite higher for the roundabout.
Keywords: Capacity, Level of Service, SIDRA Intersection, Heterogenous Traffic
References:
1. Falcocchio, John C., and Herbert S. Levinson. Road traffic congestion: a concise guide. Vol. 7. Cham: Springer, 2015. 2. Olagunju, K. (2015, March). Evaluating traffic congestion in developing countries–a case study of Nigeria. In A paper presented at the. 3. Jain, V., Sharma, A., & Subramanian, L. (2012, March). Road traffic congestion in the developing world. In Proceedings of the 2nd
ACM Symposium on Computing for Development (pp. 1-10). 4. Acharjee, A., Sarkar, P. P., & Pal, J. (2018). Effect of socioeconomic and latent variables in vehicle ownership: A case study of
Agartala city, India. International Journal of Engineering & Technology, 7(1.1), 472-476. 5. Surbakti, M., & Iswahyudi, F. (2018, February). Roundabout performance analysis in the city of Medan. In IOP Conference Series:
Materials Science and Engineering (Vol. 309, No. 1, p. 012115). IOP Publishing. 6. Dargay, J., Gately, D., & Sommer, M. (2007). Vehicle ownership and income growth, worldwide: 1960-2030. The energy
journal, 28(4). 7. Rao, B. S., Rambabu, T., & Rao, G. V. (2017). ANALYSIS OF CAPACIT SERVICE AT UNC INTERSECTIONS UNDER
TRAFFIC CON. International Journal of Civil Engineering, 8(8). 8. Ranjitkar, P., Shahin, A., & Shirwali, F. (2014). Evaluating operational performance of intersections using SIDRA. The Open
Transportation Journal, 8(1). 9. Mukhtyarali, S. S., Zala, L. B., & Amin, A. A. (2017). Capacities and LOS Measures of Intersections. Kalpa Publications in Civil
Engineering, 1, 209-218. 10. Naik, M. R., Umapathi, M., & Vishwas, R. K. M. J. (2017). A STUDY ON DESIRABLE IMPROVEMENTS AT SELECTED 11. UNSIGNALISED INTERSECTION ON NH-206 AND NH-13. International Journal of Advance Engineering and Research
Development, 4(5). 12. Marfani, S., Shihora, D., Kanthariya, C., & Kansara, H. (2018). Traffic Improvement for Urban Road Intersection, Surat. International
Research Journal of Engineering and Technology, 5(03).
354-359
13. Chandramouli, C., & General, R. (2011). Census of india 2011. Provisional Population Totals. New Delhi: Government of India, 409-
413. 14. Zawawa, G., & Naghawi, H. (2017). Evaluation of the Operational Performance of Continuous Green T-Intersection under Different
Levels of Congestion. Periodica Polytechnica Transportation Engineering. 15. Naghawi, H., Jadaan, K., Al-Louzi, R., & Hadidi, T. (2018). Analysis of the Operational Performance of Three Unconventional
Arterial Intersection Designs: Median U-Turn, Superstreet and Single Quadrant. International Journal of Architectural, Civil and
Construction Sciences, 12(3), 387-395. 16. Ragab, M., & El-Naga, I. A. (2019). MEASURES TO IMPROVE TRAFFIC OPERATIONS AT SIGNALIZED INTERSECTIONS IN
URBAN AREAS. International Journal for Traffic and Transport Engineering, 9(4). 17. Mukhtyarali, S. S., Zala, L. B., & Amin, A. A. (2017). Capacities and LOS Measures of Intersections. Kalpa Publications in Civil
Engineering, 1, 209-218. 18. Zainuddin, N. I., Shah, S. M. R., Hashim, M. Z., Roslam, M. S., & Tey, L. S. (2018, October). Comparison of operational performance
before and after improvement: Case study at Pengkalan Weld, Pulau Pinang. In AIP Conference Proceedings (Vol. 2020, No. 1, p.
020027). AIP Publishing LLC. 19. Ragab, M., & El-Naga, I. A. (2019). MEASURES TO IMPROVE TRAFFIC OPERATIONS AT SIGNALIZED INTERSECTIONS IN
URBAN AREAS. International Journal for Traffic and Transport Engineering, 9(4). 20. Nguyen, Q. V. (2017). Operational performance of roundabout intersection at Sheldon and Waterman Road. 21. Zainuddin, N. I., Shah, S. M. R., Hashim, M. Z., Roslam, M. S., & Tey, L. S. (2018, October). Comparison of operational performance
before and after improvement: Case study at Pengkalan Weld, Pulau Pinang. In AIP Conference Proceedings (Vol. 2020, No. 1, p.
020027). AIP Publishing LLC. 22. Manual, H. C. (2000). Highway capacity manual. Washington, DC, 2. 23. Muley, D., & Al-Mandhari, H. S. (2014). Performance evaluation of Al Jame‘Roundabout using SIDRA. World Academy of Science,
Engineering and Technology, International Journal of Civil, Environmental, Structural, Construction and Architectural Engineering, 8(12), 1296-1301.
24. Said, M. S. Determination of Peak Hours And Level Of Service At An Unsignalised Intersection Using aa SIDRA 2.0. 25. Kang, N., & Nakamura, H. (2016). An analysis of heavy vehicle impact on roundabout entry capacity in Japan. Transportation
research procedia, 15, 308-318. 26. Li, J., Yue, Z. Q., & Wong, S. C. (2004). Performance evaluation of signalized urban intersections under mixed traffic conditions by
gray system theory. Journal of Transportation Engineering, 130(1), 113-121. 27. Akçelik, R., & Troutbeck, R. (1991, July). Implementation of the Australian roundabout analysis method in SIDRA. In Highway
Capacity and Level of Service-Proceddings of the International Symposium on Highway Capacity (pp. 17-34). U. Brannolte). AA
Balkema, Rotterdam.
61.
Authors: Kenneth Gitonga Ntonja, Geoffrey Muchiri Muketha, Gabriel Ndungu Kamau
Paper Title: Cloud Data Privacy Preserving Model for Health Information Systems Based on Multi Factor
Authentication
Abstract: With cloud computing (CC) becoming popular in recent years, variety of institutions, organizations,
businesses and individual users are creating interest. They are adopting the technology in order to take advantage
of shared web applications, low infrastructure cost, utility and distributed computing, cluster computing as well
as reliable IT architecture. In the area of health, Cloud Health Information Systems (CHIS) play a key role not
only on the healthcare businesses but patients as well. On the patient side, CHIS aid in sharing of medical data
and health information, timely access of critical patient information and coordination of clinical services.
Patients, who continue to demand for instantaneous and quality healthcare services are now able to access the
services from experts even when they are not necessarily in the same physical location. This is being aided by
proliferation of telemedicine through hosted cloud architecture. From the business perspective, CC has helped to
cut down operational expenses by way of cost-effective clinical information system infrastructure through the
implementation of a distributed platform. The platform has therefore saved businesses millions of dollars that
would have gone to infrastructural and human resource investment. Even with these immense opportunities,
cloud computing uptake has been serious inhibited by the privacy and security concerns. Due to the sensitivity of
personal health information, businesses and individuals are apprehensive when it comes to adopting the
technology or releasing the data to the cloud. This study is a results discussion of an enhanced model for
attainment of data privacy on the cloud through use of multi factor authentication.
Keywords: Cloud Computing, Health Management Systems, Multi-factor Authentication, One Time
Password.
References:
1. Bajwa, M. S., Himani, & Sandeep, S. K. H. (2015). An Enhanced Data OwnerCentric Model for Ensuring Data Security in Cloud. 2015
Second InternationalConference on Advances in Computing and Communication Engineering 2. Avizienis, J. Laprie, B. Randell, and C. Landwehr, ―Basic concepts and taxonomy of dependable and secure computing,‖ IEEE
Transactions on Dependable and Secure Computing, vol. 1,no. 1, pp. 11–33, 2004.
3. Hyokyung Chang and Euiin Choi, ―User Authentication in Cloud Computing‖, Springer-Verlag Berlin Heidelberg 2011, UCMA 2011, Part II, CCIS 151, pp. 338–342.
4. Baliga, P. Kamat, and L. Iftode, ―Lurking in the Shadows: Identifying Systemic Threats to Kernel Data (Short Paper),‖ in 2007 IEEE
Symposium on Security and Privacy, May 2007. 5. Jiangshan Yu, Guilin Wang, Yi Mu, and Wei Gao, "An Efficient Generic Framework for Three-Factor Authentication with Provably
Secure Instantiation", IEEE, 2013
6. Behl, ―Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation,‖ in Proceedings of the World Congress on Information and Communication Technologies (WICT ‘11), pp. 217–222, IEEE, December 2011.
7. Pandey, R. M. Tugnayat, and A. K. Tiwari, ―Data Security Framework for Cloud Computing Networks,‖ International Journal of
Computer Engineering & Technology, vol. 4, no. 1, pp. 178–181, 2013. 8. A.Ibrahim, B.Mahmood and M.Singhal, A secure framework for sharing electronic health records over clouds, in Proc. of IEEE
International Conference on Serious Games and Applications for Health (SeGAH), pp. 1-8, 2016.
9. Amir, M. T., Rodziah, T., Rusli, A. & Masrah, A. A. M. (2012). Security Frameworkof Cloud Data Storage Based on Multi Agent System Architecture – A Pilot Study.
10. Shirly Lee, Tae Yong Kim and Hoon-Jae Lee, "Mutual Authentication Scheme for Cloud Computing", Future Information
Communication Technology and Applications, Springer, chapter 17, 2013, pp 149-157. 11. PrachiSoni and MonaliSahoo, "Multi-factor Authentication Security Framework in Cloud Computing", International Journal of
Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 1, ISSN: 2277 128X, January 2015
360-367
12. Arockiam L. and Monikandan S., Data security and privacy in cloud storage using hybrid symmetric encryption algorithm. International
Journal of Advanced Research in Computer and Communication Engineering, 2(8), pp.3064-3070, 2013. 13. Bartock, M. et al. (2015). Trusted Geolocation in the Cloud: Proof of ConceptImplementation.National Institute of Standards and
Technology.Beal, V. (2015).Data. http://www.webopedia.com/TERM/D/data.html. Accessed 20.09.2018.
14. E. Keller, J. Szefer, J. Rexford, and R. B. Lee, ―NoHype: virtualized cloud infrastructure without the virtualization,‖ in Proc. 37th annual
international symposium on Computer architecture, New York, NY, USA, 2010, pp. 350-361.
15. F. Monrose, P. Wycko, and A. D. Rubin, ―Distributed execution with remote audit,‖ In NDSS, 1999.
16. Keramidas, A. Antonopoulos, D. N. Serpanos, and S. Kaxiras, ―Non deterministic caches: A simple and effective defense against side channel attacks,‖ Design Automation for Embedded Systems, 12(3):221-230, 2008.
17. G. Kumaresan, N. Veeraragavan, Dr. L. Arockiam, "A Study of User Authentication Techniques in Cloud Computing", Journal of
Emerging Technologies and Innovative Research (JETIR) (ISSN-2349-5162), Volume 2, Issue 8, August 2015, pp. 3309-3314. 18. HyosikAhn, Hyokyung Chang, Changbok Jang, and Euiin Choi, ―User Authentication Platform Using Provisioning in Cloud Computing
Environment‖, Springer-Verlag Berlin Heidelberg 2011, ACN 2011, CCIS 199, pp. 132–138.
19. Kong, O. Aciicmez, J.-P. Seifert, and H. Zhou, ―Deconstructing new cache designs for thwarting software cache-based side channel attacks, In 2nd ACM Workshop on Computer Security Architectures, pages 25-34, October 2008.
20. Szefer, E. Keller, R. B. Lee, and J. Rexford, ―Eliminating the hypervisor attack surface for a more secure cloud,‖ in Proc. 18th ACM
conference on Computer and communications security, New York, NY, USA, 2011, pp. 401-412.. 21. Benson, R. Dowsley, and H. Shacham, ―Do you know where your cloud files are?,‖ in Proc. 3rd ACM workshop on Cloud computing
security workshop, New York, NY, USA, 2011, pp. 73-82.
22. Suzaki, K. Iijima, T. Yagi, and C. Artho, ―Memory deduplication as a threat to the guest OS,‖ in Proc. Fourth European Workshop on System Security, New York, NY, USA, 2011, p. 1:1-1:6.
23. Blanton, Y. Zhang, and K. B. Frikken, ―Secure and Verifiable Outsourcing of Large-Scale Biometric Computations,‖ in Privacy,
Security, Risk and Trust (PASSAT), IEEE Third International Conference on Social Computing (SocialCom), 2011, pp. 1185-1191. 24. J. Atallah and K. B. Frikken, ―Securely outsourcing linear algebra computations,‖ In ASIACCS, 2010.
25. M. Y. A. Younis and K. Kifayat, ―Secure cloud computing for critical infrastructure: a survey,‖ Tech. Rep., Liverpool John Moores
University, Liverpool, UK, 2013. 26. Michael E.Whitman In defense of the realm: Understanding the threats to information security International Journal of Information
Management, 24, 2004, pp.43-57.
27. Nan Chen and Rui Jiang, "Security Analysis and Improvement of User Authentication Framework for Cloud Computing", Journal of Networks, Vol. 9, No. 1, January 2014, Pp 198-203.
28. Rohitash Kumar Banyal, Pragya Jain and Vijendra Kumar Jain, "Multi-factor Authentication Framework for Cloud Computing", IEEE
Computer Society, Fifth International Conference on Computational Intelligence, Modelling and Simulation, pp 105-110.
62.
Authors: Abdulrazag Y. Zekri, Li Yang, Gamal Alusta, Mamdouh Ghannam
Paper Title: Sequential Injection of Carbonated Water: A Possible Process for Coupling CO2 Enhanced Oil
Recovery and Storage
Abstract: Low salinity and carbonated water flooding have been investigated as possible techniques of
improved/enhanced oil recovery. Carbonated water injection consists of dissolving carbon dioxide CO2 in water
prior to injection and could be considered as a way to store greenhouse gas safely. Low salinity water flooding is
a process of diluting high salinity injection water to a very low level of salinity. In this project, the effect of
combining the two techniques in a sequential flooding was studied. The primary aim of this study is to optimize
the oil recovery and evaluate CO2 storage during this process, employing low permeability carbonate cores and
different sequential carbonated and non-carbonated brines flooding. Formation brine, seawater, low salinity
carbonated and non-carbonated were used in this work. Core samples grouped as composite cores with similar
over all reservoir permeability. Different sequences of brines were employed to determine the optimum system.
The experiment's result showed that carbonated water performs better than the noncarbonated brines. A new
technique for estimate CO2 retention based on the displacement efficiency of the carbonated water flooding
system is presented. The interfacial tension, contact angle measurements results indicated that wettability is the
dominant mechanism of the studied systems. A sequential composite core flooding consists of carbonated low
salinity followed by low salinity and seawater injection (CLSW- LSW-SW) is the optimum flooding system
among the studied systems. Technically, CLSW flooding displayed an excellent incremental displacement
efficiency ∆DE of 21.4% and CSW exhibited the best CO2 retention per incremental ∆Np.
Keywords: CO2 storage, Sequential Flooding, Carbonated Water, CO2-EOR, Low Salinity, Low Permeability.
References:
1. Ahmed, T., 2018. Reservoir Engineering Handbook. Gulf Professional Publishing, 5th Edition, 1282-1283.
2. Alizadeh A, Ioannidis M and Piri M (eds), 2011. CO2-saturated brine flooding: An effective process for mobilization and recovery of water flood residual oil. Proceeding of International Symposium of the Society of Core Analysts, Austin, TX, USA, 19–21.
3. Bisweswar, G., Al‑Hamairi, A., Jin, S., 2019. Carbonated water injection: an efficient EOR approach. A review of fundamentals and
prospects. Journal of Petroleum Exploration and Production Technology (2020) 10:673–685. https://doi.org/10.1007/s13202-019-0738-2.
4. Burton, M., Bryant, SL, (2009). Eliminating buoyant migration of sequestered CO2 through surface dissolution: implementation costs
and technical challenges. SPE Reservoir Eval. Eng. 12(03):399–407. 5. Chang, Y.B., Coats, B.K., Nolen, J.S., 1998. A compositional model for CO2 floods including CO2 solubility in water. SPE Reservoir
Evaluation. Eng. 1 (2) (1998) 155–160.
6. Chung, F. H., Jones, R.A., Nguyen, H.T., 1988. Measurements and correlations of the physical properties of properties of CO2/heavy
crude oil mixtures. SPE Reservoir Eng. 3 (3) (1988) 822–828.
7. Dong, Y., Dindoruk, B., Ishizawa, C., and Lewis, E.J., 2011. An experimental investigation of carbonated water flooding. SPE Annual
Technical Conference and Exhibition; 2011: Society of Petroleum Engineers. Denver, Colorado, USA, 30 October–2 November (2011). https://doi.org/10.2118/145380-MS.
8. Enick, R.M., Klara, S.M., 1990. CO2 solubility in water and brine under reservoir conditions. Chem. Eng. Commun. 90(1):23–33.
9. Herzog, H., 2000. The economics of CO2 separation and capture. Open source. 10. Kechut, N. I., Sohrabi, M., Jamiolahmady, M., 2011. Experimental and numerical evaluation of carbonated water injection (CWI) for
improved oil recovery and CO2 storage. SPE-143005. 10. 11. McGlade, C., 2019). Can CO2-EOR really provide carbon-negative oil? https://www.iea.org/commentaries/can-CO2-eor-really-
provide-carbon-negative-oil
12. Metz, B., 2007. Special report on carbon dioxide capture and storage https://www.ipcc.ch/pub/repor%20ts.htm 13. Mohammadkhania, S., Shahverdia, H., Nielsenb, S., Esfahanya, M., Shapiroc, A., 2019. Bicarbonate flooding of homogeneous and
368-376
heterogeneous cores from a carbonaceous petroleum reservoir, Journal of Petroleum Science and Engineering, 178, 251-26.
14. Riazi, M., 2011. Pore Scale Mechanisms of Carbonated Water Injection in Oil Reservoirs. Heriot-Watt University, Edinburgh, Scotland. http://hdl.handle.net/10399/2454.
15. Mosavat, N., and Torabi, F., 2016. Micro-optical analysis of carbonated water injection in irregular and heterogeneous pore geometry.
Fuel 175:191–201.
16. Ruidiaz, E. M., Winter, A., Trevisan, O. V., 2018. Oil recovery and wettability alteration in carbonates due to carbonate water
injection. Journal of Petroleum Exploration and Production Technology volume 8, 249–258B.
17. Shu, G., Dong, M., Chen, S., Hassanzadeh, H., 2016. Mass transfer of CO2 in a carbonated water–oil system at high pressures. Indus Eng Chem Res 56(1):404–416.
18. Seyyedi, M., Mahzari, P., Sohrabi, M., 2017. An integrated study of the dominant Mechanism leading to improved oil recovery by
carbonated water injection. J Indus Eng. Chem. 45:22–32. 19. Sohrabi, M., Riazi, M., Jamiolahmady, M., Ireland, S., Brown, C., 2008. Carbonated water injection for oil recovery and CO2 storage.
Symposium of the Sustainable energy UK conference: Meeting the Science and Engineering challenge, Oxford, UK.
20. Sohrabi, M., Emadi, A., Farzaneh, S.A., Ireland, S., 2015. A thorough investigation of mechanisms of enhanced oil recovery by carbonated water injection. Proceedings of the SPE Annual Technical Conference and Exhibition; Houston, Texas, USA, 28–30.
21. Soleimania, P., Shadizadehb, S., Kharratc, R., 2020. Experimental assessment of hybrid smart carbonated water flooding for carbonate
reservoirs, Petroleum, in press https://doi.org/10.1016/j.petlm.2020.03.006 22. Steffens, A., 2010. Modeling and laboratory study of carbonated water flooding. Delft University of Technology, Delft.
http://resolver.tudelft.nl/uuid:ff0d9ac4-b77d-4546-b18a-194e69919475
23. Welker, J.R., Dunlop, D.D., 1963. Physical properties of carbonated oils, J. Petrol. Technol. 15 (1963) 873–876 08. 24. Zekri, A., Al-Attar, H., Al-Farisi, O., Almehaideb , R., Lwisa, E., 2015. Experimental investigation of the effect of injection water
salinity on the displacement efficiency of miscible carbon dioxide WAG flooding in a selected carbonate reservoir. Journal of
Petroleum Exploration and Production Technology, 2015, DOI 10.1007/s13202-015-0155-0.
63.
Authors: G Ajay Bhaskar Naidu, Y Avinash Reddy, CH Naveen Chowdary
Paper Title: Design of 5g Mimo Antenna with Enhanced Isolation
Abstract: In this paper, MIMO 2-port, 2-element antenna for 5G applications is presented. This is monopole
antenna structure consists of two-rectangular patch of same shapes. Each antenna has a feeding plate connect at
the centre of the patch antenna for enhancing isolation the etching of rectangular slots on the ground plane in
between the two patches along with thick and sheet of the substrate just below at the centre of the patch.
Maximum isolation achieved among the ports is less than -30db. envelope correlation coefficient is below 0.10
in bands of interest. The minimum frequency range covered by the four ports of this antenna is from around 3.0
to 4.0 GHz, thus covering expected future 5G band (3300–3700 MHz).
Keywords: Maximum isolation achieved among the ports is less than -30db.
References:
1. J.G. Andrews, S. Buzzi, W. Choi, S.V. Hanley, A. Lozano, A.C.K. Soong, and J.C. Zhang, ‗‗Whatwill5Gbe?‘‘IEEEJ.Sel. Areas
Common., vol.32, no. 6, pp. 1065–1082, Jun. 2014.
2. G. J. Foschini and M. J. Gans, ‗‗On limits of wireless communications in a fading environment when using multiple antennas,‘‘ Wireless Pers. Commun., vol. 6, no. 3, pp. 311–335, Mar. 1998.
3. P.-S. Kildal and K. Rosengren, ‗‗Correlation and capacity of MIMO systems and mutual coupling, radiation efficiency, and diversity
gain of their antennas: Simulations and measurements in a reverberation chamber,‘‘ IEEE Commun. Mag., vol. 42, no. 12, pp. 104–112, Dec. 2004.
4. R. G. Vaughan and J. B. Andersen, ‗‗Antenna diversity in mobile communications,‘‘ IEEE Trans. Veh. Technol., vol. VT-36, no. 4, pp.
147–172, Nov. 1987. 5. Mattheijssen, M.H.A.J. Herben, G. Dolmans, and L.Leyten, ‗‗Antennapatterndiversityversusspacediversityforuseathandhelds,‘‘IEEE
Trans. Veh. Technol., vol. 53, no. 4, pp. 1035–1042, Jul. 2004.
6. S. D. Targonski, R. B. Waterhouse, and D. M. Pozar. v "Wideband aperture coupled stacked patch antenna using thick substrates," Electronics Letters, vol. 32, no. 21, pp. 1941–1942, 1996.
7. J. A. Ansari and R. B. Ram, "Broadband stacked U-slot micro strip patch antenna," Progress in Electromagnetics Research Letters, vol.
4, pp. 17–24, 2008.
8. D. Uzer, S. S. Gultekin, and O. Dundar, "Estimation and design of U-slot physical patch parameters with artificial neural networks," in
Proceedings of Progress in Electro-Magnetic Research Symposium, Kuala Lumpur, Malaysia, 2012, pp. 27– 30. 9. Michael D. Foegelle ―MIMO device performance measurements in a wireless environment simulator‖ IEEE Electromagnetic
Compatibility Magazine (Volume: 1, 123 - 130, Fourth Quarter 2012).
10. S. Zhang, Z. Ying, J. Xiong, and S. He, ―Ultrawideband MIMO/Diversity Antennas With a Tree-Like Structure to Enhance WidebandIsolation‖, IEEE Antennas Wireless Propag Lett 8 (2009),1279–1282.
11. A. Diallo, C. Luxey, P. L. Thuc, R. Staraj, and G. Kossiavas, ‗‗Study and reduction of the mutual coupling between two mobile phone
PIFAs operating in the DCS 1800 and UMTS bands,‘‘ IEEE Trans. Antennas Propag., vol. 54, no. 11, pp. 3063–3074, Nov. 2006. 12. H. Li, J. Xiong, and S. L. He, ‗‗Extremely compact dual-band PIFAs for MIMO application,‘‘ Electron. Lett., vol. 45, no. 17, pp. 869–
870, Aug. 2009.
13. M. K. Meshram, R. K. Animeh, A. T. Pimpale, and N. K. Nikolova, ‗‗A novel quad-band diversity antenna for LTE and Wi-Fi applications with high isolation,‘‘ IEEE Trans. Antennas Propag., vol. 60, no. 9, pp. 4360–4371, Sep. 2012.
14. A. Ramachandran, S. V. Pushpakaran, M. Pezholil, and V. Kesavath, ‗‗A four-port MIMO antenna using concentric square-ring
patches loaded with CSRR for high isolation,‘‘ IEEE Antennas Wireless Propag. Lett., vol. 15, pp. 1196–1199, 2016. 15. C.-Y. Chiu and R. D. Murch, ‗‗Compact four-port antenna suitable for portable MIMO devices,‘‘ IEEE Antennas Wireless Propag.
Lett., vol. 7, pp. 142–144, 2008.
16. Arun, H., A. K. Sarma, M. Kanagasabai, S. Velan, C. Raviteja, and M. Alsath, ―Deployment of modified serpentine structure for
mutual coupling reduction in MIMO antennas,‖ IEEE Antennas Wireless Propag. Lett., Vol. 13, 277–280, 2014.
17. Tang, T. C. and K. H. Lin, ―An ultrawideband MIMO antenna with dua lband-notched function,‖ IEEE Antennas Wireless Propag.
Lett., Vol. 13, 1076–1079, 2014 18. T. Taga, ‗‗Analysis for mean effective gain of mobile antennas in land mobile radio environments,‘‘ IEEE Trans. Veh. Technol., vol.
39, no. 2, pp. 117–131, May 1990.
19. J. Yang, S. Pivnenko, T. Laitinen, J. Carlsson, and X. Chen, ‗‗Measurements of diversity gain and radiation efficiency of the Eleven antenna by using different measurement techniques,‘‘inProc. 4thEur.Conf. Antennas Propag., Apr. 2010, pp. 1–5.
377-380
64. Authors: Deepti Varshney, Mamta Bansal, Birendra Kumar Sharma
Paper Title: Robust Watermarking Technique for Sharing Family Photos on Social Media using Aadhar Number
and DCT
Abstract: The mind setup of persons has been changed in today‘s environment due to the easily available of
internet and smart phone on very low-price cost. Smart phone and internet are two main resources which are
being used by persons most of the time in his/her daily routine specially in lockdown due to COVID-19. In this
lockdown, persons are doing some creative activity, making fun, etc and recording all his/her this personal
information in the form of multimedia contents like text, images, audio and video. This created multimedia
content is shared by persons frequently on globe through internet in the daily routine life and some other
persons are watching this daily routine activity and making huge business with these data by sometimes with
original content or sometimes with modified content without concerns/information/permission of the originator.
In this process if everything is going in right way then no issues but if something going wrong then require legal
issues and for this, we need to protect our data legally through some methodology. So this paper proposed secure
watermarking technique for protecting multimedia content like images using Aadhar number and Discrete
Cosine Transform (DCT) technique. In this proposed methodology individual can share the information‘s with
watermarked information which is hidden in shared images and on demand at the time of legal issue originator
will show the actuality and its ownership. This paper explained details concepts of the embedding and reverse of
embedding ( i.e. extracting) process for authentication of the images and its protection from the misuse or fraud.
The experimental result of the proposed methodology is shown on different family photos shared on globe and
found robust results.
Keywords: Discrete Cosine Transform (DCT), Document Based (DB), Working Domain Based (WDB),
Human Perception Based (HPB) and Application Based (AB), Discrete Wavelet Transform (DWT), Intellectual
Property Right (IPR), Similarity Ratio (SR)
References:
1. Himanshu Rastogi and B. K. Sharma, ―A Study on Intellectual Property Right and Digital Watermarking‖, International Journal of
Advanced Research in Computer Science, Volume 8, No. 7, July – August 2017, ISSN ISSN No. 0976-5697 2. Nishith Desai Associates, Intellectual Property Law in India, July (2015)
3. http://eprints.uthm.edu.my/6936/1/MOHAMED_ABDISALAN_SAID.pdf
4. http://eprints.rclis.org/28939/1/Intellectual%20Property%20Rights%20in%20Digital%20Environment_ISI.pdf 5. Arathi Chitla, M. Chandra Mohan, ―Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of
Elliptic Curve Cryptography‖, International Journal of Computer Applications (0975 – 8887) Volume 57– No.6, November 2012
6. Peyman Rahmati, and Andy Adler, and Thomas Tran. ―Watermarking in E-commerce‖, International Journal of Advanced Computer
Science and Applications,Vol. 4, No. 6, 2013
7. Rania A. Ghazy, Alaa M. Abbas ―Block-based SVD image watermarking in spatial and transform domains‖ , International Journal of Electronics, 2015 Vol. 102, No. 7, 1091–1113
8. Malli B, Lagishetty Mounica, Nandhitha.N.M ,Balamurugan.V, ―Development of efficient Quality Preserving Invisible Watermarking
Technique to embed both Images and Data in an Image‖ IEEE Online International Conference on Green Engineering and Technologies (IC-GET), 2016,
9. https://www.wipo.int/edocs/pubdocs/en/intproperty/450/wipo_pub_450.pdf
10. https://gss.bsa.org/wp-content/uploads/2018/05/2018_BSA_GSS_Report_en.pdf 11. Lalit Kumar Saini & Vishal Shrivastava, ―A Survey of Digital Watermarking Techniques and its Applications‖, International Journal
of Computer Science Trends and Technology (IJCST), Volume 2 Issue 3, PP- 70-73, May-Jun 2014.
12. Prabhishek Singh, R S Chadha ,―A Survey of Digital Watermarking Techniques, Applications and Attacks‖,International Journal of Engineering and Innovative Technology (IJEIT), Volume 2, Issue 9, March 2013
13. Monika Patel,Priti Srinivas Sajja and Ravi K. Sheth, ―Analysis and Survey of Digital Watermarking Techniques‖, International Journal
of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 10, PP 203-210, October 2013 14. M.Hariharalakshmi, Dr. M.Sivajothi, Dr.M.Mohamed SathikInternational ―Survey of Digital Watermarking techniques for Data
security‖ Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue 3, March 2017
15. B.K.Sharma ―Watermarking for copyright protection of software codes‖ A Ph.D. Thesis, 2012
16. Sunil Kumar Vishwakarma, B. K. Sharma, Syed Qamar Abbas, ―Digital Watermarking for Image authentication using Spatial-Scale
Domain based Techniques‖ IJRTE, ISSN: 2277-3878, Volume-8 Issue-4, November 2019
17. Himanshu Rastogi and Birendra Kumar Sharma, ―Methodology implementation for IPR protection of Mobile Application Code using Digital Watermarking‖, International Journal of Scientific & Technology Research (IJSTR), Volume.-8, Issue- 10, October, 2019, ,
ISSN ISSN No. 2277-8616
18. Himanshu Rastogi and Birendra Kumar Sharma, ―Implementation of Digital Watermarking Technique to secure IPR of Web Application code‖, International Journal of Innovative Technology and Exploring Engineering (IJITEE),Volume.-8, Issue-11,
September 2019 , ISSN ISSN No. 2278- 3075
19. Deepti Varshney, Mamta Bansal, Birendra Kumar Sharma ―Watermarking for Images using Alphanumeric Technique‖, International Journal of Recent Technology and Engineering (IJRTE), Volume.-8, Issue-6, March 2020, ISSN ISSN No. 2277-3878
20. www.csitweb.com
381-387
65.
Authors: Kittimeth Wattananaphakasem, Ubolrat Wangrakdiskul, Jakawat Deeying
Paper Title: The Effect of Laser Energy and Nitrogen Flow in Solder Joints Properties of Head Gimbal Assembly
Abstract: The objective of this research is to study the effect of laser energy and Nitrogen flow on the solder
joints of the Head Gimbal Assembly (HGA). The soldering of the HGA components isn't the same as general
semiconductors. Since the soldering figure perpendicular to each other so that, it was used the laser solder jet
bonding system. The solder jet bonding system uses a solder ball consisting of Sn-2.0Ag-0.7Cu (SAC207) is
used for connection of the HGA pad made from a Cu trace coated with Au. The growth of intermetallic
compounds (IMCs) and shear strength will be analyzed to investigate the effects of laser energy and Nitrogen
flow on solder joint reliability. In this research, laser energy levels since 2, 2.5, 3, 3.5, 4, and 4.5 mJ and keep the
Nitrogen flow value at 90 mbar. As for the Nitrogen flow effect analysis, the Nitrogen flow level was used at 80,
100, 120, and 140 mbar and keep the laser energy value 3.5 mJ. The results of the study show that the increased
levels of laser energy can inhibit the growth of intermetallic compounds as well as the AuSn4 phase that can
388-394
present benefit to solder joints with results showing within the shear strength to increase significantly. The
increase in Nitrogen flow levels has the same effect as the increase in laser energy levels, which can decreases
the growth of intermetallic compounds and AuSn4 phase also including increased shear strength. The difference
between laser energy and Nitrogen flow increasing shows the level of laser energy can clearly distinct the effect
on each level. But the increase in Nitrogen flow level is statistically insignificant from each level.
Keywords: Intermetallic compound, Laser solder jet bonding, SAC solder, solder joints
References:
1. Wood, E. P., and K. L. Nimmo, ―In search of new lead-free electronic solders,‖ Journal of Electronic Materials, vol. 23.8, pp. 709-713, 1994.
2. Hu, Yu-hua, et al, ―Reliability studies of Sn–9Zn/Cu and Sn–9Zn–0.06 Nd/Cu joints with aging treatment,‖ Materials & Design, vol. 34, pp. 768-775, 2012.
3. Jiang, Hongjin, Kyoung-sik Moon, and C. P. Wong, ―Recent advances of nanolead-free solder material for low processing temperature
interconnect applications,‖ Microelectronics Reliability, vol. 53.12, pp. 1968-1978, 2013. 4. Canyook, Rungsinee, and Kittichai Fakpan, ―Effect of Cu and Ni Addition on Microstructure and Wettability of Sn-Zn Solders,‖ Key
Engineering Materials, vol. 728, pp. 9-14, 2017.
5. Sona, Mrunali, and K. Narayan Prabhu, ―Wetting kinetics and joint strength of Sn-0.3 Ag-0.7 Cu lead-free solder alloy on copper substrate as a function of reflow time,‖ Materials Science Forum, vol. 830, pp. 286-289, 2015.
6. Liu, Xiaoying, et al, ―The adsorption of Ag3Sn nano-particles on Cu–Sn intermetallic compounds of Sn–3Ag–0.5 Cu/Cu during
soldering,‖ Journal of alloys and compounds, vol. 492.1-2, pp. 433-438, 2010. 7. Li, Xiao Yan, et al, ―Isothermal aging effects on the microstructure, IMC and strength of SnAgCu/Cu solder joint,‖ Key Engineering
Materials, vol. 353, pp. 2928-2931, 2007.
8. Mayappan, Ramani, and Zainal Arifin Ahmad, ―Effect of Bi addition on the activation energy for the growth of Cu5Zn8 intermetallic in the Sn–Zn lead-free solder,‖ Intermetallics, vol. 18.4, pp. 730-735, 2010.
9. Luo, Z-B., et al, ―Revisiting mechanisms to inhibit Ag3Sn plates in Sn–Ag–Cu solders with 1 wt.% Zn addition,‖ Journal of alloys and
compounds, vol. 500.1, pp. 39-45, 2010. 10. Kamarudin, Maslinda, Abu Seman Anasyida, and Nurulakmal Mohd Sharif, ―Effect of Aluminium and Silicon to IMC Formation in
Low Ag-SAC Solder,‖ Materials Science Forum, vol. 819, pp. 63-67, 2015.
11. Yahya, Iziana, et al, ―Intermetallic evolution of Sn-3.5 Ag-1.0 Cu-0.1 Zn/Cu interface under thermal aging,‖ Advanced Materials Research, vol. 620, pp. 142-146, 2013.
12. Tsao, L. C., et al, ―Effects of nano-Al2O3 particles on microstructure and mechanical properties of Sn3. 5Ag0. 5Cu composite solder
ball grid array joints on Sn/Cu pads,‖ Materials & Design, vol. 50, pp. 774-781, 2013. 13. Hanim, Azmah, et al, ―Interfacial Reaction Analysis of Sn-Ag-Cu Solder Reinforced with 0.01 wt% CNTs with Isothermal Aging,‖
Materials Science Forum, vol. 864, pp. 175-179, 2016.
14. Chellvarajoo, Srivalli, M. Z. Abdullah, and C. Y. Khor, ―Effects of diamond nanoparticles reinforcement into lead-free Sn–3.0 Ag–0.5 Cu solder pastes on microstructure and mechanical properties after reflow soldering process,‖ Materials & Design, vol. 82, pp. 206-215,
2015.
15. Li, Hui, ―Effects of small amount addition of rare earth Y on microstructure and property of Sn3. 0Ag0. 5Cu solder,‖ Key Engineering Materials, vol. 584. Pp. 3-8, 2014.
16. Fakpan, Kittichai, and Rungsinee Canyook, ―Effects of Sb and Zn Addition on Mechanical Properties and Corrosion Resistance of Sn–
Ag–Cu Solders,‖ Key Engineering Materials, vol. 728, pp. 129-134, 2017. 17. Fu, Shen Li, et al, ―Reliability and Bondability Study on Interfacial Behavior between SnAgCu Solder and Cu-Ni-Au OSP Pads,‖ Key
Engineering Materials, vol. 573, pp. 1-7, 2014.
18. Sungkhaphaitoon, Phairote, and Thawatchai Plookphol, ―Effect of Cooling Rate on the Microstructure and Mechanical Properties of Sn-0.7 wt.% Cu Solder Alloy,‖ Key Engineering Materials, vol. 675, pp. 513-516, 2016.
19. Tian, Yanhong, et al, ―Intermetallic compounds formation at interface between PBGA solder ball and Au/Ni/Cu/BT PCB substrate after
laser reflow processes,‖ Materials Science and Engineering: B, vol. 95.3, pp. 254-262, 2002. 20. WANG, Jian-xin, et al, ―Effect of diode-laser parameters on shear force of micro-joints soldered with Sn-Ag-Cu lead-free solder on
Au/Ni/Cu pad,‖ Transactions of nonferrous metals society of China, vol. 16.6, pp. 1374-1379, 2006.
21. Park, Yong-Sung, et al, ―Effects of fine size lead-free solder ball on the interfacial reactions and joint reliability,‖ 2010 Proceedings 60th Electronic Components and Technology Conference (ECTC). IEEE, Las Vegas, NV, USA, June 1-4, 2010, pp. 1436-1441.
22. Pan, Jianbiao, et al, ―Effect of gold content on the reliability of SnAgCu solder joints,‖ IEEE Transactions on Components, Packaging
and Manufacturing Technology, vol. 1.10, pp. 1662-1669 2011.
23. Ji, Hongjun, Jiao Wang, and Mingyu Li, ―Microstructure and reliability of hybrid interconnects by Au stud bump with Sn-0.7 Cu solder
for flip chip power device packaging.‖ Microelectronics Reliability, vol. 66, pp. 134-142, 2016.
24. Huang, M. L., Yuemei Liu, and J. X. Gao, ―Interfacial reaction between Au and Sn films electroplated for LED bumps,‖ Journal of Materials Science: Materials in Electronics, vol. 22.2, 2011.
66.
Authors: Pollypriya Buragohain
Paper Title: Use of Information and Communication Technology and Product Promotion
Abstract: E-agriculture, i.e., Information and communication technology (ICT) in agriculture enriches the
agriculture and brings rural development. Due to this upbringing of information and communication technology,
agricultural production has increased and also enhancing the market which indicates a complete change of
makeover. Indian farming is revolutionized and all farmers including small landholders are benefited through the
use of ICT in agriculture. ICT helps a lot to increase the demand for new perspectives in agricultural field. The
present study was basically conducted in Jorhat district of Assam during the time of 2018 and data was collected
from 40 farmers through a well structured questionnaire. The main mathematical or statistical tools that have
been used in this study are percentages, Likert Scale and measurement of central tendency. The present study
tries to analyse the socio-economic characteristics of the farmers which consider or use the information and
communication technology in agriculture. This study also focuses on the farmer‘s attitude towards using ICT in
agriculture and also the frequency of using ICT in agriculture. In this study, it is obtained that there are highest
37.50 percent of farmers are small farmers with a land holding of 1-2 ha and highest 40 percent of farmers have
16 to 20 years of farming experience. From the analysis, it is also noticed that majority(4.68) of farmers strongly
agree with the statement that ICT helps in community based planning by providing timely information regarding
agricultural field which is followed by the concept of ICTs helpful for reducing the distance in Digital Divide or
Technological gap(4.63). With some statements the farmers are strongly disagree or disagree such as ICT helps
395-398
to exchange the opinion, knowledge, experience and also the assets(2.94) and by improving rural livelihoods
ICT fill up the social segregation gap(2.15). Again it is observed that to gaining knowledge and information all
40 farmers are using mobile phones as ICT very frequently.
Keywords: ICT, Agriculture, Development, Digital Divide, Farmer.
References:
1. Kafura, A. R. (2016), Use of ICT as Extension Tool by The Farmers of Gazipur District in Bangladesh, M.S. Thesis, Department of
Agricultural Extension and Rural Development, Bangabandhu Sheikh Mujibur Rahman Agricultural University, Gazipur-1706, Bangladesh.
2. Lokeswari K. (2016), A Study of the use of ICT among rural farmers, International Journal of Communication Research, Vol. 6(3):
232-238. 3. Mittal, S.(2012), Modern ICT for Agricultural Development and Risk Management in Small holder Agriculture in India, Socio-
Economic Working paper 3. 4. Raghuprasad K.P., Devaraja S.C. and Gopala Y.M. (2013), An analysis of knowledge level of farmers on utilization of ICT tools for
farm communication, Journal of rural development Nird, Hyderabad, Vol. 32, no. (3) pp. 301-310.
5. Syiem R., Saravann R. (2015), Access and Usage of ICTs for Agriculture and Rural Development by the tribal farmers in Meghalaya State of North-East India. Journal of Agricultural Informatics. Vol. 6(3): 24-41.
67.
Authors: P. Oliver jayaprakash, A K.Gunasekaran
Paper Title: Theoretical Framework for the Freight Movements Through a Multicommodity Port
Abstract: Port based freight movement planning is a complicated task that could be carried out efficiently to
handle the cargo, optimally utilize the infrastructure and plan the future infrastructure requirements. The nature
of activities at the port is dynamic with uncertainties,since the operationsare time bound, scholastic and
probabilistic.As the huge capital is involved in port infrastructure, the inter-relationship between port activities
need to be understood and a system model enveloping the relationship among the variables is much needed for
optimal utilization of existing facilities and to predict the future infrastructure requirements. The conventional
four step model approach for modeling the person trips would not effectively reflect the commercial scheduling
constraintsand requirements of freight trips. This research workattemptsto model the port operations, to assess
the level of service of roads and gate operations as subsystems to understand the interdependencies between the
variables and the impact on the port operations as a whole.
Keywords: System, Modeling, Multicommodity port, dynamic commodity flow, Turnaround time, Vessel
arrival.
References:
1. Kek, C.C. ―Port performance indicators:transportation, water and urban development department‖, World Bank, Transport Report No.
PS-6, 1993.
2. Wadhwa, L. C. ―Capacity and performance of bulk handling ports‖, Proceeding of Australian transportation research forum. Vol. 15, Part I, 1990.
3. Wadhwa, L.C., Whelan, G. A., Morel, D.L. and Schneider, M. ―Establishing relationships between port capacity, throughput and
performance by simulation studies‖, International congress on modelling and simulation proceedings, IMACS, 1997. 4. Peter Marlow, B. and Ana Paixão, C.―Measuring lean ports performance‖, International journal of transport management, Vol. 1, No.
4, pp. 189-202, 2003.
5. Jose Tongzon, L. ―Determinants of port performance and efficiency‖, Transportation Research Part A: Policy and Practice, Vol. 29, No. 3, pp. 245-252, 1995.
6. Ng Siew,M. and Muhammad, Z.―Petroleum Terminal‘s operation processes on vessel turnaround time‖, Proceedings of EASTS-
International Symposium on Sustainable Transportation incorporating Malaysian Universities, Transport Research Forum Conference, 2008.
7. Asperen Van, E., Borgman, B., and Dekker, R. ―Evaluating container stacking rules using simulation‖, International journal of
Hugan& E. Yücesan (Eds.),proceedings of the 2010 Winter Simulation Conference Proceedings of the Winter Simulation Conference, Baltimore.pp. 1924-1933, 2010
8. Daniela, A., and Elena, T. ―A discrete event simulation model for the analysis of critical factors in the expansion plan of a marine
container terminal‖, Proceedings 23rd European conference on Modelling and Simulation, 2009 . 9. Borgman, B., Asperen Van, E., and Dekker, R. ―Evaluating container stacking rules using simulation‖, International journal of
Hugan& E. Yücesan (Eds.),proceedings of the 2010 Winter Simulation Conference Proceedings of the Winter Simulation
Conference, Baltimore.pp. 1924-1933, 2010. 10. Petering, M. E. H."Decision support for yard capacity, fleet composition, truck substitutability, and scalability issues at seaport
container terminals via discrete event simulation, "Transportation Research E, 47, pp.85-103,2011.
11. Su Min, J., Kap Hwan, K., Herbert, K.―Routing automated guided vehicles in container terminals through the Q-learning technique‖, Journal of Logistics Research , Vol. 3, No. 1, pp. 19-27, 2011.
12. YounJu, W., Kap Hwan, K.― Estimating the space requirement for outbound container inventories in port container terminals‖,
International Journal of Production Economics, Vol. 133, No. 1, pp. 293-301, 2011. 13. Byung Kwon, L. and Kap Hwan, K. ―Comparison and evaluation of various cycle-time models for yard cranes in container terminals‖,
International Journal of Production Economics, Vol. 126, No. 2, pp. 350-360, 2010.
14. Dhingra, S.L., Mujumdar, P. and Gajjar R. ―Time Series Modelling of Urban Attracted Truck Movements‖, Journal of Advanced
Transportation, Vol.27-3 (Special issue), Winter, 1993.
15. Haitham Al-Deek, M. ―Which method is better for developing freight planning models at seaports-neural networks or multiple
regressions?‖, TRR,TRB, Washington, D.C., pp. 90-97, 2007. 16. Nathan, H., Michael, W. and Jeff, D.―Finding the number of yard cranes needed to achieve desired truck turn time at marine container
terminals‖, TRR,TRB,Washington,D.C. pp.98-108, 2007.
17. Rodrigo G. and Felipe A.―Modeling the internal transport system in a container port‖, TRR,TRB,No.1782,Washington, D.C., pp. 84-91, 2002.
18. Khalid Bichou, ―Review of port performance approaches and a supply chain framework to port performance benchmarking‖, Research
in Transportation Economics, Vol. 17, No. 6, pp. 567-598, 2006. 19. Wisinee, W. ―Commodity Distribution Model Incorporating Spatial Interactions for Urban Freight Movement‖, 85th Annual Meeting
of the TRB, Washington D.C., 2006.
399-410
20. Amelia Regan, C., and Rodrigo Corido, A. ―Modelling freight demand and shippers behaviours State of the art future directions‖, ITE,
USA, Pergamon press, 2002. 21. Daniel, P.―Forecasting growth with time series models‖, Journal of Forecasting, Vol. 14, No. 2, pp. 97-105, 1995.
22. Amaury, L., Michel, V., Eric de Bodt, Marie, C. and Philippe, G.―Forecasting time-series by kohonen classification‖, ESANN'
Proceedings, pp. 221-226, 1998.
23. Siem Jan, K. and Marius, O.―Forecasting daily time series using periodic unobserved components time series models‖, Computational
Statistics & Data Analysis, Vol. 51, No. 2, pp.885-903, 2006.
24. Vedat,Y.―The analysis of forecasting performance by using time series data for two mediterranean islands‖, Review of Social, Economic and Business Studies, Vol. 2, pp. 175-196, 2003.
25. Kalekar and Prajakta, S. ―Time series forecasting using Holt-Winters Exponential Smoothing‖, Kanwalrekhi school of information
technology, 2004. 26. Nghiep, N. and Cripps,Al. ―Predicting housing value: a comparison of multiple regression analysis and artificial neural networks‖,
Journal of Real Estate Research, Vol. 22, No. 3, pp. 313-336, 2001.
27. Ram Pandyala, M., ―Urban highway freight modeling including intermodal connectors for florida‖, BC208,Research Center. Florida Department of Transportation, Final Report DOT-T-97-10, 2002.
28. Roselina, S., Siti, M., Shamsuddin, H., Siti, Z.,Mohammed, H., and Ajith, A. ―Forecasting time series data using hybrid grey Relational
artificial neural network and Auto regressive integrated Moving average model‖, Neural Network World, Vol. 6, pp. 573-605, 2007 29. Taylor,A.J. ―System dynamics in shipping‖, Operational research quarterly, Pergamon press, Vol. 27, No. 1, pp .41-56, 1976.
30. Krishnamurthy. ―Data mining- statistics applications: a key to managerial decision making‖, Socio-economic Voices, pp. 1-11, 2010.
31. Kia, M., Shayan, E. and Ghotb, F.―Investigation of port capacity under the new approach by computer simulation‖, Journal of Computers and Industrial Engineering, Vol. 42, pp. 533-540, 2002.
32. Dimitris P., and Anne Kremidjian, S.―Ship traffic modeling methodology for ports‖, Vol. 129, Vol. 5, pp. 163-202, 2003.
33. Hanne-Lovise, S., Katherine, G., and MagnhildViste, ―Visualized system dynamics models as information and planning tools‖, Proceedings of Informing Science Conference, pp.1113-1123, 2003.
34. Dahal, K., Galloway, Stuart, Burt, Graeme, McDonald, Jim,Hopkins, and Ian, ―A port system simulation facility with an optimisation
capability‖, International Journal of Computational Intelligence and Applications, Vol. 3, No. 4. pp. 395-410, 2003. 35. Sampsa, R. ―National sea transport demand and capacity forecasting with system dynamics‖, Master‘s thesis, Systems analysis
laboratory, Helsinki University of Technology, Helsinki, 2008.
36. Carlucci, F., and Cira, A.―Modeling a plan for seaport investments‖, Pomorstvo‖, GOD, Vol. 23, pp.405-425, 2009. 37. Shabayek, A. A., and Yeung, W. W. ―A simulation model for the kwaichung container terminals in Hong Kong‖, European Journal of
Operational Research, Vol. 140, pp. 1-11, 2002.
38. Naggar, El. ―Application of queuing theory to the container terminal at Alexandria seaport‖, Journal of Soil Science and Environmental Management, Vol. 1, No. 4, pp. 77-85, 2010.
68.
Authors: Swamy H.C.M, G. Prince Arul Raj
Paper Title: Rheological Behavior of Ordinary Concrete, SCC with and without Glass and Steel Fibers
Abstract: Rheology indicates its flowability and deformation. These two parameters indicate directly
workability. It measures the normal and shearing forces in fresh concrete state. In this article the flowability and
its measurement are discussed for ordinary and SCC with Glass and steel fibers are demonstrated. The strength
parameter for a particular concrete mix is demonstrated with sampling and acceptance criteria. The new draft
code on design of concrete mix (IS-10262) verified by compliance with specifications. The different parameters
like percentage of Glass and Steel fibers, different percentages of silica fume, and different dosages of
superplasticizer are tested and reported. A comparative analysis for, with and without glass fibers on ordinary
and SCC predicted.
Keywords: Rheology of ordinary concrete, Flowability of SCC, Workability of SCC with Glass fibers,
Rheology of SCC with steel fibers, Sampling and acceptance criteria for SCC, Compliance with specification for
SCC.
References:
1. L.D‘Aloia Schwartzentruber, etl .(2006) ―Rehological behavior of fresh cement paste formulated from a SCC‖ ,Cement and concrete
research361203-1213
2. Mette R. Geiker, etl.(2002) ―The effect of measuring procedure on the apparent rheological properties of SCC , Cement and concrete research32(2002)1791-1795
3. Tomasz Ponikiewski, etl. ―The Rheological and Mechanical Properties of SCC with High Calcium Fly Ash ―,
http://www.claisse.info/Proceedings.html 4. Oladipupo.S , etl.(2015) ―Evaluation of Fresh and Hardened Properties of SCC, open journal of CE,2015,5-7
5. M. Benacha ,etl.(2013) ―Rehological Charactrization of SCC: V-Funnal and Horizontal Plexiglass Channal, IJESIT, ISSN:2319-5967
Vol2, Issu1, January 2013 6. A Vennila, etl.(2016) ―Study on Mechanical Properties of SCC with mineral admixture and Glass fibers‖ Journal of Advances in CE.
Vol 2( 1) 2016. Pp.13-20
7. A.M. Neville,etl.‖Concrete technology‖ ELBS 8. M.L.Gambhir, ―Concrete technology‖ Fourth EditionMc Graw-Hill Higher Education.
411-417
69.
Authors: Usmanova Muborak Akmalzhanovna, Burkhanhadzhaeva Khurshida Vahdatovna
Paper Title: Social Assistance and Social Services for Citizens during the Quarantine Period from a Pandemic
(On the Example of Uzbekistan and International Experience
Abstract: The article considers the state policy of social protection of the population in the Republic of
Uzbekistan. Methods of legal regulation of social security law. The system of social security law is analyzed.
The history of formation and development of social security in the Republic of Uzbekistan is studied. Attention
is paid to the rights of social security during the period of quarantine from a pandemic, and international
legislation and experience are comparatively analyzed . The article deals with themain characteristics of the legal
regulation of remote workers ' labor; theconcept and features of remote laboras a subject of labor law. The
authors analyzed therelationship of an employment contract with a remote employee with other labor contracts.
Legal acts in the field of regulating the work of remote workersin the context of a pandemic have been studied.
Features of concluding an employment contract with a remote employee. Electronic interaction during the
418-424
pandemic period, whichis under the control of the employer; - interaction between the employer and the
employee is carried outusing public information and telecommunications networks.
Keywords: principle. law, social security, citizens, law, experience, quarantine, need, conditions, law, labor,
remotely, law, pandemic, Internet
References:
1. Constitution Of The Republic Of Uzbekistan (1992). Tashkent.Uzbekistan. 2019. - from 40
2. Regulatory legal acts, international documents 3. The universal Declaration of human rights (1948).
4. The international Covenant on civil and political rights (1966).
5. The international Covenant on economic, social and cultural rights (1966). 6. . European Convention for the protection of human rights and fundamental freedoms (1950).
7. European social Charter (1988). 8. ILO Convention No. 48 establishing a system of international co-operation for the maintenance of rights arising from disability, old
age and survivors ' insurance (1935).
9. ILO social security minimum standards Convention No. 102 (1952). 10. ILO Convention No. 117 on basic aims and standards of social policy (1962).
11. ILO Convention No. 128 on disability, old age and survivors ' benefits (1967).
12. ILO Convention No. 130 on medical assistance and sickness benefits (1969). 13. the Law of the Republic of Uzbekistan ―on state pension provision for citizens". www.lex.uz
14. Law of the Republic of Uzbekistan no. ZRK-272 of 22.12.2011 "On amendments and additions to the Labor code of the Republic of
Uzbekistan and the law of the Republic of Uzbekistan "on state pension provision for citizens"". www.lex.uz Law of the Republic of Uzbekistan dated December 23, 2010 № ZRU-272 "on amendments and additions to the Labor code of the
Republic of Uzbekistan and the law of the Republic of Uzbekistan "on state pension carefor citizens" " www.lex.uz
15. Law of the Republic of Uzbekistan from 02.12.2004 N 702-II "on accumulative pension provision of citizens" "Collection of legislation of the Republic of Uzbekistan", 2004, N 51, article 512
16. .DecreeOf the President of the Republic of Uzbekistan "on the state program for implementing the strategy of action on five priority
areas of development of the Republic of Uzbekistan in 2017-2021 in the" year of active investment and social development» dated January 17, 2019 no. up-5635
17. Tursunov Y., Usmanova M., Sattarova G. the Law of social security. Textbook for Universities. Vol.: Aloqachi, 2008. 498c.
18. Machulskaya E. E. Pravo sotsial'nogo obepecheniya [the Law of social welfare]. Moscow: yurait, 2011, 315 p
70.
Authors: W.F.Tang, S.L.Mak, C.H.Li
Paper Title: Additive Manufacturing Technology in Orthodontic Devices Development
Abstract: Traditional wires and brackets has been widely used as orthodontic devices for long time. The metal
wires and brackets help to correct the position of teeth as well as fix the cavity. However, metal brace wires have
quite a lot limitations. Patients wearing metal brace have many food restrictions and feel not comfortable.
Brushing and flossing are required to remove the food debris frequently. Hence, clear plastic aligners have
popped up recently. Since the metal brace fabrication process has associated with prolonged process time as a
result of a long workflow process starting from brace mold presentation to the prosthesis execution. The growing
of additive manufacturing technology make it possible to develop complex structures and shapes of dental brace.
By combining 3D oral scanning, it is possible to shorten the lead time of orthodontic treatment process. This
review, therefore, investigates the use of Digital Light Processing (DLP) Additive Manufacturing Technology
for plastic dental brace development as a remedy to the problems associated with the traditional methods. The
study reveals that it is feasible to fabricate these plastic braces utilising the DLP technology. DLP technology is
affordable and arguably able to produce dental models with high levels of assurance and accuracy.
Keywords: dental brace, clear aligners, orthodontic device, additive manufacturing, stereolithography, fused
deposition modelling
References:
1. , A., 2020. Safe braces. British Dental Journal, 228(10), pp.739-739.
2. Bártolo, P.J. ed., 2011. Stereolithography: materials, processes and applications. Springer Science & Business Media.
3. Benson, P.E., Da'as, T., Johal, A., Mandall, N.A., Williams, A.C., Baker, SR and Marshman, Z., 2015. Relationships between dental appearance, self-esteem, socio-economic status, and oral health-related quality of life in U.K schoolchildren: A 3-year cohort study.
European journal of orthodontics, 37(5), pp.481-490.
4. Bowman, S.J., 2017, March. Improving the predictability of clear aligners. In Seminars in orthodontics (Vol. 23, No. 1, pp. 65-75). WB Saunders.
5. Castiaux, A.D., Pinger, C.W., Hayter, E.A., Bunn, M.E., Martin, R.S. and Spence, D.M., 2019. PolyJet 3D-printed enclosed
microfluidic channels without photocurable supports. Analytical Chemistry, 91(10), pp.6910-6917. 6. Charalambis, A., Davoudinejad, A., Tosello, G. and Pedersen, D.B., 2017. Cost estimation of a specially designed direct light
processing (DLP) additive manufacturing machine for precision printing. In euspen’s 17th International Conference & Exhibition. The
European Society for Precision Engineering and Nanotechnology. 7. Choi, J.W., Kim, H.C. and Wicker, R., 2011. Multi-material stereolithography. Journal of Materials Processing Technology, 211(3),
pp.318-328.
8. Comba, B., Parrini, SIMONE, Rossini, G.A.B.R.I.E.L.E., Castroflorio, T. and Deregibus, A., 2017. Three-dimensional finite element analysis of upper-canine destabilisation with clear aligners, composite attachments, and class II elastics. J Clin Orthod, 51(1), pp.24-8.
9. Davoudnejad, A., Pedersen, D.B. and Tosello, G., 2017. Characterization of additive manufacturing processes for polymer micro parts
productions using direct light processing (DLP) method. In the 33rd International Conference of the Polymer Processing Society (PPS-33).
10. Dawood, A., Marti, B.M., Sauret-Jackson, V. and Darwood, A., 2015. 3D printing in dentistry. British dental journal, 219(11), pp.521-
529. 11. Dul, S., Fambri, L. and Pegoretti, A., 2016. Fused deposition modelling with ABS–graphene nanocomposites. Composites Part A:
Applied Science and Manufacturing, 85, pp.181-191. 12. Francois, M.M., Sun, A., King, W.E., Henson, N.J., Tourret, D., Bronkhorst, C.A., Carlson, N.N., Newman, C.K., Haut, T.S., Bakosi,
J. and Gibbs, J.W., 2017. Modelling of additive manufacturing processes for metals: Challenges and opportunities. Current Opinion in
425-432
Solid State and Materials Science, 21(LA-UR-16-24513; SAND-2017-6832J).
13. Garino, F., Castroflorio, T., Daher, S., Ravera, S., Rossini, G., Cugliari, G. and Deregibus, A., 2016. Effectiveness of composite attachments in controlling upper-molar movement with aligners. J Clin Orthod, 50(6), pp.341-7.
14. Gomez, J.P., Peña, F.M., Martínez, V., Giraldo, D.C. and Cardona, C.I., 2015. Initial force systems during bodily tooth movement with
plastic aligners and composite attachments: A three-dimensional finite element analysis. The Angle Orthodontist, 85(3), pp.454-460.
15. Gokuldoss, P.K., Kolla, S. and Eckert, J., 2017. Additive manufacturing processes: Selective laser melting, electron beam melting and
binder jetting—Selection guidelines. Materials, 10(6), p.672.
16. Harun, W.S.W., Kamariah, MSIN, Muhamad, N., Ghani, S.A.C., Ahmad, F. and Mohamed, Z., 2018. A review of powder additive manufacturing processes for metallic biomaterials. Powder Technology, 327, pp.128-151
17. Hilliard, J.K., 2008. System and method for fabricating orthodontic aligners. U.S. Patent Application 11/842,411.
18. Javaid, M. and Haleem, A., 2019. Current applications and status of additive manufacturing in dentistry: A literature-based review. Journal of craniofacial and oral biology research, 9(3), pp.179-185.
19. Jasiuk, I., Abueidda, D.W., Kozuch, C., Pang, S., Su, F.Y. and McKittrick, J., 2018. An overview of additive manufacturing of
polymers. Jom, 70(3), pp.275-283. 20. Jesson, J., Matheson, L. and Lacey, F.M., 2011. Doing your literature review: Traditional and systematic techniques. Sage.
21. Jindal, P., Juneja, M., Bajaj, D., Siena, F.L. and Breedon, P., 2020. Effects of post-curing conditions on mechanical properties of 3D
printed clear dental aligners. Rapid Prototyping Journal. 22. Jiang, J., 2019. Support Optimisation for Additive Manufacturing.
23. Kaluđerović, M.R., Schreckenbach, J.P. and Graf, H.L., 2016. Titanium dental implant surfaces obtained by anodic spark deposition–
from the past to the future. Materials Science and Engineering: C, 69, pp.1429-1441. 24. Kazemi, M. and Rahimi, A., 2019. Improving the efficiency of fabrication of AM parts by segmentation design in the DLP process.
Rapid Prototyping Journal.
25. Kiviat, J. and Fleming, Y., 2018. Orthodontic Appliance Intolerance Due to Dental Adhesive Allergy. Dermatitis, 29(6), pp.349-350. 26. Lee, H., Lim, C.H.J., Low, M.J., Tham, N., Murukeshan, V.M. and Kim, Y.J., 2017. Lasers in additive manufacturing: A review.
International Journal of Precision Engineering and Manufacturing-Green Technology, 4(3), pp.307-322.
27. Marotti, J., Heger, S., Tinschert, J., Tortamano, P., Chuembou, F., Radermacher, K. and Wolfart, S., 2013. Recent advances of ultrasound imaging in dentistry–a review of the literature. Oral surgery, oral medicine, oral pathology and oral radiology, 115(6),
pp.819-832.
28. Melchels, F.P., Feijen, J. and Grijpma, D.W., 2010. A review on stereolithography and its applications in biomedical engineering. Biomaterials, 31(24), pp.6121-6130.
29. Millett, D.T., Mandall, N.A., Mattick, R.C., Hickman, J. and Glenny, A.M., 2017. Adhesives for bonded molar tubes during fixed
brace treatment. Cochrane Database of Systematic Reviews, (2). 30. Moser, N., Santander, P. and Quast, A., 2018. From 3D imaging to 3D printing in the dentistry-a practical guide. International journal
of computerised dentistry, 21(4), pp.345-356.
31. Mu, Q., Wang, L., Dunn, C.K., Kuang, X., Duan, F., Zhang, Z., Qi, HJ and Wang, T., 2017. Digital light processing 3D printing of complex conductive structures. Additive Manufacturing, 18, pp.74-83.
32. Nayar, S.K. and Boult, T.E., Columbia University of New York, 2014. Adaptive imaging using digital light processing. US Patent
8,675,119. 33. Oliveira, G., 2019. Accuracy And Precision Of 3-dimensional Printed Dental Models Produced By Different Additive Manufacturing
Technologies. 34. Resnik, D.B., 2015. What is ethics in research & why is it essential—National Institute of Environmental health sciences?
35. Sherman, S.L., Kadioglu, O., Currier, G.F., Kierl, J.P. and Li, J., 2020. Accuracy of digital light processing printing of 3-dimensional
dental models. American Journal of Orthodontics and Dentofacial Orthopedics, 157(3), pp.422-428. 36. Shivapuja, P.K., Shah, D., Shah, N. and Shah, S., Real 3d Polymers Group LLC, 2019. Direct 3D-printed orthodontic aligners with
torque, rotation, and full control anchors. U.S. Patent 10,179,035.
37. Shkarin, V.V., Davydov, B.N., Domenyuk, D.A. and Dmitrienko, S.V., 2018. Non-removable arch orthodontic appliances for treating children with congenital maxillofacial pathologies–efficiency evaluation. Archiv EuroMedica, 8(1), pp.97-98.
38. Singh, R., 2011. Process capability study of polyjet printing for plastic components. Journal of mechanical science and technology,
25(4), pp.1011-1015. 39. Singamneni, S., Diegel, O., Huang, B., Gibson, I. and Chowdhury, R., 2010. Curved-layer fused deposition modelling. Journal for New
Generation Sciences, 8(2), pp.95-107.
40. Sood, A.K., Ohdar, R.K. and Mahapatra, SS, 2010. Parametric appraisal of mechanical property of fused deposition modelling processed parts. Materials & Design, 31(1), pp.287-295.
41. Szuhanek, C., Grigore, A., Schiller, E., Bratu, D.C., Onisei, D. and Onisei, D., 2015. The role of digital setup in the orthodontic
treatment with plastic aligners. Mat. Plast, 52, p.522. 42. Szuhanek, C., Fleser, T. and Grigore, A., 2015. Applications of Thermoplastic Materials in the Fabrication of Orthodontic Aligners.
Mat. Plast, 52, p.385.
43. Sorooshian, S. and Kamarozaman, A.A., 2018. Fashion braces: an alarming trend. Sao Paulo Medical Journal, 136(5), pp.497-498. 44. Thrasher, C.J., Schwartz, J.J. and Boydston, A.J., 2017. Modular elastomer photo resins for digital light processing additive
manufacturing. ACS applied materials & interfaces, 9(45), pp.39708-39716.
45. Uno, M., Yokokawa, Y., Kawaki, H., Oka, T., Tamaki, Y. and Ishigami, H., 2019. Investigating the effectiveness of ceramic materials, particularly zirconium oxide, and the advantages the white metal holds over traditional materials used in dentistry: impact, 2019(2),
pp.68-70.
46. Vandenberghe, B., 2018. The digital patient–Imaging science in dentistry. Journal of dentistry, 74, pp.S21-S26. 47. Wang, X., Gao, W.Y., Luan, J., Wojtas, L. and Ma, S., 2016. A most effective strategy to boost the robustness of metal-organic
frameworks via the introduction of size-matching ligand braces. Chemical Communications, 52(9), pp.1971-1974.
48. Weir, T., 2017. Clear aligners in orthodontic treatment. Australian dental journal, 62, pp.58-62. 49. Ziemian, C., Sharma, M. and Ziemian, S., 2012. Anisotropic mechanical properties of ABS parts fabricated by fused deposition
modelling. Mechanical engineering, 23.
50. Zuzak, K.J., Cadeddu, J.A., Ufret-vincenty, R., Francis, R.P. and Livingston, E., University of Texas System, 2013. Digital light processing hyperspectral imaging apparatus. US Patent Application 13/776,105.
71.
Authors: Preeti Tripathi, Imran Khan
Paper Title: Computational Simulation - Design & Analysis Functionality of Grid Connected (GC) Photo-Voltaic
(PV) System
Abstract: The electrical power produced via photo-voltaic (PV) array relies largely on weather conditions. In
this paper, we presented a continuous state functionality of the PV grid-connected (GC) unit at distinct solar
irradiances. The presented model is developed on MATLAB environment, which includes the PV
array using an improved perturb and observe (MP&O) tracking system interconnected to DC to DC boosting
conversion application, the 3-phase 3 level electric power inverter which usually associated to the utility grid
using low pass filter, coupled transformer and synchronous control mechanism of PV inverter. The presented
model is lab-created within day-by- day climatic conditions to estimate its working mechanism. The simulation
433-438
results of the proposed system satisfy requirements grid performance with high power quality. In the proposed
work number of cell modules used 90, number of parallel strings 60, maximum PV output
voltage1000wb/m2 at 274 V, minimum voltage at 600 wb/m2 at 250V, maximum power at 1000 wb/m2-100
kw, and minimum power at 600 wb/m2-57 kw.
Keywords: PV, MP&O, boost converter, UG
References:
1. Physical Progress (Achievements), Ministry of New andRenewable Energy, Govt. of India. 31 January 2014. Retrieved 21February 2014.
2. State wise installed solar power capacity (PDF), Ministry of New andRenewable Energy, Govt. of India. 1 March 2016. Retrieved24
March 2016. 3. D. M. Tobnaghi, ―A Review on Impacts of Grid-Connected PV System on Distribution Network,‖ International Journal of
Electrical, Computer, Energetic, Electronic and Communication Engg. , Vol. 10, No.1, 2016.
4. ―Grid Integration of Distributed Solar Photovoltaics (PV) in India,‖A Prayas (Energy Group) Report, July 2014. 5. IEEE Standard 519-1992 – Recommended Practices and Requirements for Harmonic Control in Electrical Power Systems. Revision
to IEEE 519-2014.
6. B. K. Perera, P. Ciufo, S. Perera, ―Point of Common Coupling (PCC) voltage control of a grid-connected solar Photovoltaic (PV) system,‖ 39th Annual Conference of the IEEE Industrial Electronics Society (IECON 2013), 2013, pp.7475-7480.
7. H. Ko, S. R. Lee, H. Dehbonei, and C. V. Nayar, "Applicationof Voltage-and Current-Controlled Voltage Source Inverters
forDistributed Generation Systems," IEEE Transactions on EnergyConversion, vol. 21, pp. 782-792, 2006. 8. M. P. Kazmierkowski and L. Malesani, "Current ControlTechniques for Three-Phase Voltage-Source PWM Converters:A
Survey," IEEE Transactions on Industrial Electronics, vol. 45, no. 5, pp. 691-703, 1998.E.
9. Adel A. Elbaset, Hamdi Ali and Montaser Abd-El Sattar ―NovelSeven-Parameter Model for Photovoltaic Modules‖ Solar Energy Materials & Solar Cells, vol. 130, pp. 442-455, 2014.Polycarpou, M.M.: Stable Adaptive Neural Control Scheme for Nonlinear
Systems. IEEE Trans. Automat. Contr., 41 (1996) 447-450.
10. Brigitte Hauke–―Basic Calculation of a Boost Converter's Power Stage‖ Application Report SLVA372B – November 2009 – Revised July 2010-Texas Instrument.Ge, S.S., et al.: A Direct Method for Robust Adaptive Nonlinear Control with Guaranteed
Transient Performance. System Control Lett., 37 (1999) 275-284
11. SoerenBaekhoejKjaer et al ―A Review of Single-Phase Grid- Connected Inverters for Photovoltaic Modules‖ IEEE Transactions on Industry Applications, vol. 41, no. 5, September/October 2005.
12. M. Prodanović and T. C. Green, "Control and filter design of three- phase inverters for high power quality grid connection," IEEE
Transactions on Power Electronics, vol. 18, no. 1, pp. 373-380, January 2003. 13. T. C. Wang, Z. Ye, G. Sinha, and X. Yuan, "Output FilterDesign for a Grid-Interconnected Three-Phase Inverter," in IEEE 34th
Annual Power Electronics Specialist Conference (PESC'03), pp. 779-784, Acapulco, Mexico, June 15-19,2003.
14. Gabriel OoiHeo Peng, ―Investigation and Implementation of Multilevel Power Converters for Low/Medium/High Power Applications‖, Ph.D Thesis, School of Electrical and Electronic Engineering, Nanyang Technological University, 2015.
15. J. Rodriguez, J.-S. Lai, and F. Z. Peng, "Multilevel Inverters: A Survey of Topologies, Controls, and Applications," IEEE Transactions on Industrial Electronics, vol. 49, no. 4, pp. 724- 738, August 2002.
16. J. S. Lai and F. Z. Peng, "Multilevel Converters-A New Breed of Power Converters," IEEE Transactions on Industry Applications, vol.
32, no. 3, pp. 509-517, May/June 1996. 17. C. Hochgraf, R. Lasseter, D. Divan, and T. Lipo"Comparison of multilevel inverters for static var compensation," in IEEE Conference
Record of Industry Applications Society Annual Meeting, pp. 921-928, Denver, Colorado, October 2-6, 1994.
18. E.D. Mehleri, H. Sarimveis, N.C. Markatos, and L.G.Papageorgiou, ―Optimal Design and Operation of DistributedEnergy Systems: Application to Greek Residential Sector,‖Renewable Energy, vol. 51, pp. 331-342, March 2013.
72.
Authors: Gowtham Kishor Kumar B, P. Palson,
Paper Title: Factors Influencing Cost Overrun and Delay with Their Risks in Construction Management.
Abstract: Cost overrun and delay are the most important factors which affect the rate of progress in
construction industries. There are numerous Risks are involved in cost and schedule overrun which leads to
unprofitable situation or dropping the project. Previous literature studies are mainly focused only on cost overrun
and delay but they do not deal with their risks which is important to study. This study is to assess the factors
influencing time and cost overruns on construction projects and their risks also. The objectives of the study were
achieved through valid questionnaire. The questionnaires are collected over 40 construction companies. From
this survey, identify and ranking the various elements which are responsible for the inflation of cost and
schedule overrun using analytical software like SPSS. And discuss about the significant values obtained from the
collecting data and recommendation and mitigation ideas from the ranking of overrun factors. The significant
value should be more than 0.05 and from our analysis most of the factors are above that value. The study
clarified that incorrect estimates and low productivity level of labors highly contributes to overrun in
construction management. It will leads to unprofitable situation, so proper scheduling and better management
will rectify these problems.
Keywords: Elements, Cost overrun, Schedule overrun, Construction projects.
References:
1. Emmanuel Bentil and Edward Nana and Alfred Fokuo, 2016, Existence and Impact of Overruns in construction projects in GHANA.
2. Adam Abderisak, per-Erik Josephson and Goran Lindal,2015, Implication of Overruns in Major Public construction projects 3. Fouzi A. HOSSEN (2010), ―Project cost risk assessment: an application of project risk management process in Libyan construction
projects‖ Faculty of Engineering, University of Omar Elmukhtar, Libya
4. Sai Murali Krishna Reddy. Raya and S.S Bhanu Prakash (2016), ―Cost and Time Overrun in Indian Construction Industry‖ Industrial Science Research Journal,2(4),1-9.
5. Paul Terna Gbahabo and Oluseye Samuel Ajuwon, Effects of cost overrun and schedule delay in Sub Saharan Africa, efficient and
effective monitoring and evaluation performance. 6. Aftab Hameed Memon, et al (2014), ―Significant Factors Causing Time Overrun in Construction Projects of Peninsular Malaysia‖
Modern Applied Science;8(4), 16-28
7. Alirezarezaei and saeedjalal,2016 Investigation on Causes of Delay and Cost overrun in Construction Industry
8. N.Hamezah, et al (2011) ―Causes of construction Delay Theoretical framework‖
439-443
9. Raj kapur shah,2016, Exploration of Causes for Delay and Cost Overruns in Construction Projects: Case Study of Australia, Malaysia
&Ghana, 10. Adriana Gomez and Jose Luiz poniz tienda (2017), INTI journal.
73.
Authors: Veena Devi Shastrimath V., Ashwini, Andrea Olivero, Deepa Bhat
Paper Title: Railway Access Control System using Face Recognition
Abstract: Nowadays booking tickets and getting inside a railway station is adifficult task. Manual checking
becomes a burden and time consuming. Also as everything is getting digitized in this modern world introduce
face recognition and Quick Response (QR) code system for entry helps in passenger convenience.Face
recognition is a method of identifying or verifying the identity of an individual using their face. Face recognition
systems can be used to identify people in photos, video, or in real-time.So this system focuses on passengers‘
convenience through allowing them to book tickets online and by introducing face recognition system and QR
code system for entry to a railway station.This system helps inidentifying people who try to travel without
buying tickets and also helps toapprehend the blacklisted person which increases security in the railway station.
Online booking is one of the convenient ways tobook the ticket. This system also provides the convenience to
passenger by issuing the digital ticket in the form of QR code thus avoiding any fuss due to the loss of the
physical ticket.
Keywords: Entry Control System, Face Detection, Face Recognition, User Interface.
References:
1. M. Nakada, H. Wang, and D. Terzopoulos, ―Acfr: Active facerecognition using convolutional neural networks,‖ in 2017 IEEE
Conference on Computer Visionand Pattern Recognition Workshops (CVPRW), 2017, pp. 35–40.
2. W.-K. CF. Guzzi, L. D. Bortoli, S. Marsi, S. Carrato, and G. Ramponi, ―Distillation of a cnn for a high accuracy mobile face recognition system,‖ in 2019 42nd International Convention on Information and Communication Technology, Electronics
andMicroelectronics (MIPRO), 2019, pp. 989–994..
3. Q. Li, ―An improved face detection method based on face recognition application,‖in 2019 4th Asia-Pacific Conference on Intelligent Robot Systems (ACIRS),2019, pp. 260–264E.
4. X. Zhang, M. Peng, and T. Chen, ―Face recognition from near-infrared images with convolutional neural network,‖ in 2016 8th
International Conference onWireless Communications Signal Processing (WCSP), 2016, pp. 1–5. 5. C. Ding and D. Tao, ―Trunk-branch ensemble convolutional neural networks for video-based face recognition,‖ IEEE Transactions on
Pattern Analysis and Machine Intelligence, vol. 40, no. 4, pp. 1002–1014, 2018.C.
6. Hou A-Lin, Feng Yuan, and Geng Ying, ―Qr code image detection using runlength coding,‖ in Proceedings of 2011 International Conference on Computer Science and Network Technology, vol. 4, 2011, pp. 2130–2134.
7. Lihong Wan, Na Liu, Hong Huo, and Tao Fang, ―Face recognition with convolutional neural networks and subspace learning,‖ in
2017 2nd InternationalConference on Image, Vision and Computing (ICIVC), 2017, pp. 228–233 8. A. Jamnik, M. Shahare, S. Kamble, N. Kale, M. Bhadade, and S. V. Sonekar, ―Digital ticket booking and checking using aadhaar card
or fingerprint and android application,‖ in 2019 3rd International Conference on Recent Developments in Control, Automation Power
Engineering (RDCAPE), 2019, pp. 503–507., 9. K. He, X. Zhang, S. Ren, and J. Sun, ―Deep residual learning for image recognition,‖ in 2016 IEEE Conference on Computer Vision
and Pattern Recognition (CVPR), 2016, pp. 770–778.
444-448
74.
Authors: G.Sundari, J.Shanmugapriyan
Paper Title: Design and Implementation of PID, GA and Fuzzy logic Controllers for an Electrical Drive with
Various Noise Disturbances
Abstract: It is a great challenge for human being to keep up the constant speed in drive when external Noise
disturbances occur due to fluctuations of power supply. In order to avoid these issues, PID controllers are
intended using predictable method such as Ziegler Nichols method. But finest level is not obtained in transient
and steady state. During the MATLAB Simulation, the error is present transient and steady state behavior in
conventional PID controllers. Hence it is necessary to design a PID controller with Novel intelligent technique
for speed control of drive like fuzzy and Genetic Algorithm. It considers error as fitness function which is to be
minimized using various GA operators such as mutation etc. The Drive will be operated with different external
noises like sinusoidal noise, Saw tooth noise and Ramp noise and comparison between PID, GA and Fuzzy PID
will be presented and their performances are studied.
Keywords: Noise disturbances PID controller, Genetic controller, fuzzy controller.
References:
1. Younis S. Dawood , Ali K. Mahmood and Muhammed ―Comparison of PID, GA and Fuzzy Logic Controllers for Cruise Control System ―, A. International Journal of Computing and Digital Systems ISSN (2210-142X) Int. J. Com. Dig. Sys. 7, No.5 (Sep-2018)
2. Ramesh Chandra Chourasia, Mukesh Kumar ,―Speed Control of S.E.D.C. Motor by Using Pi and Fuzzy Logic Controller‖,
International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-2, May 2013 3. Umesh Kumar Bansal and Rakesh Narvey, ―Speed Control of DC Motor Using Fuzzy PID Controller‖. ISSN 2231-1297,Volume 3,
Number 9 (2013), pp. 1209-1220 © Research India Publications 4. Sharad Chandra Rajpoot1, Prashant Singh, Rajpoot2, Premlata3, Durga Sharma4―Design and Simulation of Neuro Fuzzy Controller for
Speed Control of a Separately Excited dc Motor‖, IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN:
2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 6 Ver. IV (Nov. – Dec. 2016), PP 56-67 5. Hybrid control technique for minimizing the torque ripple of brushless direct current motor‖Measurement and Control 2018, Vol. 51(7-
8) 321–335 © The Author(s) 2018 Article reuse guidelines: sagepub.com/journals-permission
6. Akbarzadeh M.R , Kim T, Y.T. &B.Feerouzbakhah, ‗Evolutionary Fuzzy speed regulation for a DC motor‘],‖ ‗ NASA Center for Autonomous control Engineering,
7. Chin- Hung wang, Tzung- Pei Hong, and Shian- Shyong Teng‖ Integrating Fuzzy knowledge by Genetic Algorithms‖, (1998),
,IEEE Transactions on Evolutionary computation, VOL.2, No.4. 8. Abdulla Ismail and Sharaf A.M (2002),‖An Efficient Neuro Fuzzy speed controller for Large Industrial Motor Drives,‖ IEEE
International conference on Control Applications, September 18-20,2002,Glasgow, Scotland,U.K.
449-453
9. Chin- Hung wang, Tzung- Pei Hong, and Shian- Shyong Teng (1998)]‗Evolutionary Fuzzy speed regulation for a DC motor‘, NASA
Center for Autonomous control Engineering,
75.
Authors: Putta. Rama Krishna Veni, C Aruna Bala
Paper Title: The Multi Stage U-net Design for Brain Tumor Segmentation using Deep Learning Architecture.
Abstract: Now a day‘s diagnosis and accurate segmentation of brain tumors are critical conditions for
successful treatment. The manual segmentation takes time consuming process, more cost and inaccurate. In this
paper implementation of cascaded U-net segmentation Architecture are divided into substructures of brain tumor
segmentation. The neural network is competent of end to end multi modal brain tumor segmentations.The Brain
tumor segments are divided three categories. The tumor core (TC),the enhancing tumor(ET),the whole tumor
(WT).The distinct data enhancement steps are better achievement. The proposed method can test result
conclude average counter scores of 0.83268, 0.88797 and 0.83698, as well as Hausdorff distances 95%) of
2.65056, 4.61809 and 4.13071, for the enhancing tumor(ET), whole tumor (WT) and tumor core (TC)
respectively. In this method validating with BraTS 2019 dataset and identify the test time enhancement improves
the Brain tumor segmentation accurate images.
Keywords: Deep learning • Brain tumor segmentation • U-Net
References:
1. Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: Navab, N., Hornegger,
J., Wells, W.M., Frangi, A.F. (eds.) MICCAI 2015. LNCS, vol. 9351, pp. 234–241. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24574-4 28
2. Roth, H.R., et al.: A multi-scale pyramid of 3D fully convolutional networks for abdominal multi-organ segmentation. In: Frangi,
A.F., Schnabel, J.A., Davatzikos, 3. C., Alberola-L´opez, C., Fichtinger, G. (eds.) MICCAI 2018. LNCS, vol. 11073, pp. 417–425. Springer, Cham (2018).
https://doi.org/10.1007/978-3-030-00937-3 48 20. Shen, H., Wang, R., Zhang, J., McKenna, S.J.: Boundary-aware fully convolutional network for brain tumor segmentation. In: Descoteaux, M., Maier-Hein, L.,
4. Franz, A., Jannin, P., Collins, D.L., Duchesne, S. (eds.) MICCAI 2017. LNCS, vol. 10434, pp. 433–441. Springer, Cham (2017).
https://doi.org/10.1007/978-3-319- 66185-8 49 5. Siskind, J.M., Pearlmutter, B.A.: Divide-and-conquer checkpointing for arbitrary programs with no user annotation. Optim. Methods
Softw. 33(4–6), 1288–1330 (2018)
6. Tu, Z., Bai, X.: Auto-context and its application to high-level vision tasks and 3D brain image segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 32(10), 1744–1757 (2009)
7. Wu, Y., He, K.: Group normalization. In: Ferrari, V., Hebert, M., Sminchisescu, C.,
Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11217, pp. 3–19. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01261-8 1
8. Zhao, X., Wu, Y., Song, G., Li, Z., Zhang, Y., Fan, Y.: A deep learning model integrating FCNNS and CRFS for brain tumor
segmentation. Med. Image Anal. 43, 98–111 (2018) 9. Zhou, C., Chen, S., Ding, C., Tao, D.: Learning contextual and attentive information for brain tumor segmentation. In: Crimi, A.,
Bakas, S., Kuijf, H., Keyvan, F.,
10. Reyes, M., van Walsum, T. (eds.) BrainLes 2018. LNCS, vol. 11384, pp. 497–507. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11726-9 44
11. Zhou, C., Ding, C., Lu, Z., Wang, X., Tao, D.: One-pass multi-task convolutional neural networks for efficient brain tumor
segmentation. In: Frangi, A.F., Schnabel, 12. J.A., Davatzikos, C., Alberola-L´opez, C., Fichtinger, G. (eds.) MICCAI 2018. LNCS, vol. 11072, pp. 637–645. Springer, Cham
(2018). https://doi.org/10.1007/ 978-3-030-00931-1 73
13. Zhou, C., Ding, C., Wang, X., Lu, Z., Tao, D.: One-pass multi-task networks with cross-task guided attention for brain tumor segmentation. arXiv preprint arXiv:1906.01796 (2019)
454-460
76.
Authors: Divya Sathya Sree.I, Pangedaiah.B
Paper Title: A New Islanding Detection Technique using Ensemble Empirical Mode Decomposition
Abstract: Penetration of distributed generation (DG) is rapidly increasing but their main issue is islanding.
Advanced signal processing methods needs a renewed focus in detecting islanding. The proposed scheme is
based on Ensemble Empirical Mode Decomposition (EEMD) in which Gaussian white noise is added to original
signal which solves the mode mixing problem of Empirical mode decomposition (EMD) and Hilbert transform
is applied to obtained Intrinsic mode functions(IMF). The proposed method reliably and accurately detects
disturbances at different events.
Keywords: Distributed Generation (DG), Empirical Mode Decomposition (EMD), Ensemble Empirical Mode
Decomposition (EEMD), Intrinsic Mode Function (IMF).
References:
1. P. Mahat, Z. Chen, and B. Jensen, ―Review of islanding detection methods for distributed generation,‖ in Proc. 3rd Int. Conf. Electric
Utility Deregulation Restructuring Power Technol., Nanjing, China, 2008, pp. 2743– 2748. 2. H. H. Zeineldin and S. Kennedy, ―Sandia frequency-shift parameter selection to eliminate nondetection zones,‖ IEEE Trans. Power
Del., vol. 24, no. 1, pp. 486–487, Jan. 2009.
3. H. H. Zeineldin and M. M. A. Salama, ―Impact of load frequency dependence on the NDZ and performance of the SFS islanding detection method,‖ IEEE Trans. Ind. Electron., vol. 58, no. 1, pp. 139–146, Jan. 2011.
4. A. Samui and S. R. Samantaray, ―Assessment of ROCPAD relay for islanding detection in distributed generation,‖ IEEE Trans. Smart
Grid, vol. 2, no. 2, pp. 391–398, Jun. 2011. 5. S. Jang and K. Kim, ―An islanding detection method for distributed generation algorithm using voltage unbalance and total harmonic
distortion of current,‖ IEEE Trans. Power Del., vol. 19, no. 2, pp. 745–752, Apr. 2004.
6. V. Menon and M. H. Nehrir, ―A hybrid islanding detection technique using voltage unbalance and frequency set point,‖ IEEE Trans. Power Syst., vol. 22, no. 1, pp. 442–448, Feb. 2007.
7. Y. H. Gu and M. H. J. Bollen, ―Time-frequency and time-scale domain analysis of voltage disturbances,‖ IEEE Trans. Power Del., vol.
461-466
15, no. 4, pp. 1279–1284, Oct. 2000.
8. S. R. Samantaray, A. Samui, and B. C. Babu, ―Time-frequency transform based islanding detection in distributed generation,‖ IET Renew. Power Gener., vol. 5, no. 6, pp. 431–438, Nov. 2011.
9. A. Khamis and H. Shareef, ―Pattern recognition of islanding detection using TT-transform,‖ J. Asian Sci. Res., vol. 2, pp. 607–613,
Nov. 2012.
10. S. Santoso, W. M. Grady, E. J. Powers, J. Lamoree, and S. C. Bhatt, ―Characterization of distribution power quality events with Fourier
and wavelet transforms,‖ IEEE Trans. Power Del., vol. 15, no. 1, pp. 247–254, Jan. 2000.
11. P. K. Ray, N. Kishor, and S. R. Mohanty, ―Islanding and power quality disturbance detection in grid-connected hybrid power system using wavelet and S-transform,‖ IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1082–1094, Sep. 2012.
12. C. Tao Hsieh, J. Min Lin, and S. J Huang, ―Enhancement of islandingdetection of distributed generation systems via wavelet
transform-based approaches,‖ Electr. Power Energy Syst., vol. 30, no. 10, pp. 575–580, 2008. 13. O. Poisson, P. Rioual, and M. Meunier, ―Detection and measurement of power quality disturbances using wavelet transform,‖ IEEE
Trans. Power Del., vol. 15, no. 3, pp. 1039–1044, Jul. 2000.
14. K. T. Sweeney, S. F. McLoone, and T. E. Ward, ―The use of ensemble empirical mode decomposition with canonical correlation analysis as a novel artifact removal technique,‖ IEEE Trans. Biomed. Eng., vol. 60, no. 1, pp. 97–105, 2013.
15. Dan Chen, Duan Li, Muzhou Xiong, Hong Bao, and Xiaoli Li, ―GPGPU-Aided Ensemble Empirical-Mode Decomposition for EEG
Analysis During Anesthesia,‖ IEEE Trans. Inf. Technol. Biomed., vol. 14, no. 6, pp. 1417–1427, 2010. 16. S.Biswal, M.Biswal, and O.P.Malik, ―Hilbert Huang Transform Based Online Differential Relay Algorithm for Shunt Compensated
Transmission Line,‖ IEEE Trans.Power Deliv., vol. 33, no. 6, pp. 2803–2811, 2018.
77.
Authors: Arpita Dey, Buddhadeb Sau
Paper Title: Locating Targets in RFID System in a Sensing Covered Anchor-Free Network
Abstract: In an RFID system, the RFID readers consume huge energy and are considerably expensive in
practical applications. To minimize the total number of readers with guaranteed surveillance such that the
position of each tag can be uniquely determined is a challenge. This paper considers a simple but practically
useful model of anchor-free network of RFID readers where each tag falls within the sensing zone of at least two
readers. To maintain the quality of service in the real applications, a practical condition, the communication
range is at least twice its sensing range, is considered. Under this condition, a characterization of a network is
proved. An efficient algorithm for recognizing such a network is then developed without any initial position
information of the readers. Using these readers as the references, an algorithm is designed for finding the exact
positions of the tags in distributed manner. Unlike the existing techniques, it requires no external references for
tag tracking. The proposed technique finds at most two possible positions (in some cases, unique position), out
of which one is correct, for each tag.
Keywords: Targets tracking, exact positions of RFID read-ers, 2-sensing covered network, locating targets with
no anchors, locating RFID tags with RFID readers.
References:
1. Zoe¨ Abrams, Ashish Goel, and Serge Plotkin. Set k-cover algorithms for energy efficient monitoring in wireless sensor networks. In Information Processing in Sensor Networks, 2004. IPSN 2004. Third International Symposium on, pages 424–432. IEEE, 2004
2. A. Bekkali, H. Sanson, and M. Matsumoto. Rfid indoor positioning based on probabilistic rfid map and kalman filtering. In Wireless
and Mobile Computing, Networking and Communications, 2007. WiMOB 2007. Third IEEE International Conference on, pages 21–21,
Oct 2007.
3. Pratik Biswas, Kim-Chuan Toh, and Yinyu Ye. A distributed sdp approach for large-scale noisy anchor-free graph realization with applications to molecular conformation. SIAM Journal on Scientific Computing, 30(3):1251–1277, 2008.
4. Mathieu Bouet and Aldri L Dos Santos. Rfid tags: Positioning principles and localization techniques. In Wireless Days, 2008.
WD‘08.1st IFIP, pages 1–5. IEEE, 2008. 5. K. Chawla, G. Robins, and Liuyi Zhang. Object localization using rfid.In Wireless Pervasive Computing (ISWPC), 2010 5th IEEE
International Symposium on, pages 301–306, May 2010.
6. A. Dey and B. Sau. Tracking of rfid tags in a sensing covered anchorfree network of rfid readers. In 2016 IEEE 6th International Conference on Advanced Computing (IACC), pages 689–694, 2016.
7. Lance Doherty, Kristofer SJ Pister, and Laurent El Ghaoui. Convex position estimation in wireless sensor networks. In INFOCOM
2001. Twentieth Annual Joint Conference of the IEEE Computer and Com munications Societies. Proceedings. IEEE, volume 3, pages 1655 1663.EEE, 2001.
8. Robert C Francis, James P McGee, Robert A Sainati, Richard L Sheehan Jr, and Sai-Kit K Tong. Object tracking and management
system and method using radio-frequency identification tags, jul 29 2003. US Patent 6,600,418. 9. Daniel Hahnel, Wolfram Burgard, Dieter Fox, Ken Fishkin, and MatthaiPhilipose. Mapping and localization with rfid technology. In
Roboticsand Automation, 2004. Proceedings. ICRA‘04. 2004 IEEE InternationalConference on, volume 1, pages 1015–1020. IEEE,
2004. 10. C. Hekimian-Williams, B. Grant, Xiuwen Liu, Zhenghao Zhang, and P. Kumar. Accurate localization of rfid tags using phase
difference. In RFID, 2010 IEEE International Conference on, pages 89–96, April 2010.
11. Bruce Hendrickson. Conditions for unique graph realizations. 21(1):65– 84, 1992. 12. Bill Jackson and Tibor Jordan´. Connected rigidity matroids and unique realizations of graphs. Journal of Combinatorial Theory, Series
B, 94(1):1–29, 2005.
13. Hai Liu, Miodrag Bolic, Amiya Nayak, and Ivan Stojmenovic´. Tax-onomy and challenges of the integration of rfid and wireless sensor networks. Network, IEEE, 22(6):26–35, 2008.
14. R. Olfati-Saber. Distributed kalman filtering for sensor networks. In 2007 46th IEEE Conference on Decision and Control, pages
5492–5498, Dec 2007. 15. Himani S Parekh, Darshak G Thakore, and Udesang K Jaliya. A survey on object detection and tracking methods. International Journal
of Innovative Research in Computer and Communication Engineering, 2(2):2970–2979, 2014.
16. A. Ribeiro, I. D. Schizas, S. I. Roumeliotis, and G. Giannakis. Kalman filtering in wireless sensor networks. IEEE Control Systems, 30(2):66– 86, April 2010.
17. B. Sau and K. Mukhopadhyaya. Length-based anchor-free distributed localization in a covered sensor network. pages 77–82, Dec
2008. 18. Buddhadeb Sau and Krishnendu Mukhopadhyaya. Length-based anchor-free localization in a fully covered sensor network. In
Communication Systems and Networks and Workshops, 2009. COMSNETS 2009. First International, pages 1–10. IEEE, 2009. 19. Buddhadeb Sau and Krishnendu Mukhopadhyaya. Localizability of wireless sensor networks: Beyond wheel extension. In
Stabilization, Safety, and Security of Distributed Systems, pages 326–340. Springer, 2013.
467-475
20. Anthony Man-Cho So and Yinyu Ye. Theory of semidefinite pro-gramming for sensor network localization. Mathematical
Programming,109(2-3):367–384, 2007. 21. Dong-Liang Wu, W.W.Y. Ng, D.S. Yeung, and Hai-Lan Ding. A brief survey on current rfid applications. In Machine Learning and
Cybernetics, 2009 International Conference on, volume 4, pages 2330– 2335, July 2009.
22. Alper Yilmaz, Omar Javed, and Mubarak Shah. Object tracking: A survey. Acm computing surveys (CSUR), 38(4):13, 2006.
23. Yimin Zhang and Moeness G Amin. Localization and tracking of passive rfid tags. In Defense and Security Symposium, pages
624809–624809. International Society for Optics and Photonics, 2006.
24. Yimin Zhang, Moeness G Amin, and Shashank Kaushik. Localization and tracking of passive rfid tags based on direction estimation. Interna-tional Journal of Antennas and Propagation, 2007, 2007.
78.
Authors: A.Asyraf, S. Syafiie, M. Halim Shah Ismail
Paper Title: Type 1 Diabetes Mellitus Mobile Application with Blood Glucose Simulation
Abstract: There are many mobile applications for diabetes currently in the market which try to help people with
diabetes better manage their condition. Common features are the ability to log in user meal intake, amount of
carbohydrates, insulin, physical activity and etc. and present the data back to them in a more organize manner
such as in charts so that they can learn their blood glucose trend. However, few are trying to simulate their blood
glucose level which might help them understand better the effect of these input to their blood glucose. In this
paper, a mobile application is presented which can predict the trend of glucose from the meal and insulin intake
of diabetes patient. The application used a glucose-insulin dynamics mathematical model to simulate the
changes of blood glucose level over time for the user. Data of a clinical patient was used as input to the
developed application to study its performance. It was found out that the accuracy of the application made the
application to not be 100% reliable as predictor of blood glucose but a good educational tool for diabetes patient
as it can simulate the glucose response from carbohydrate and insulin intake. A more accurate and complex
mathematical model needs to be use for future development as the current linear and relatively simple model
may not be accurate enough for the application.
Keywords: Application, Diabetes, Glucose, Insulin, Mobile, Simulation, T1DM,
References:
1. C. for D. C. and Prevention, ―National diabetes fact sheet: national estimates and general information on diabetes and prediabetes in the
United States, 2011,‖ Atlanta, GA US Dep. Heal. Hum. Serv. centers Dis. Control Prev., vol. 201, no. 1, pp. 2568–2569, 2011. 2. A. D. Association, ―Diagnosis and classification of diabetes mellitus,‖ Diabetes Care, vol. 37, no. Supplement 1, pp. S81–S90, 2014.
3. WebMD, ―What Are Autoimmune Disorders?,‖ WebMD, 2018. https://www.webmd.com/a-to-z-guides/autoimmune-diseases.
4. World Health Organization, ―Diabetes,‖ 2019. https://www.who.int/en/news-room/fact-sheets/detail/diabetes. 5. O. El-Gayar, P. Timsina, N. Nawar, and W. Eid, ―Mobile applications for diabetes self-management: Status and potential,‖ J. Diabetes
Sci. Technol., vol. 7, no. 1, pp. 247–262, 2013, doi: 10.1177/193229681300700130.
6. M. Arnhold, M. Quade, and W. Kirch, ―Mobile applications for diabetics: a systematic review and expert-based usability evaluation considering the special requirements of diabetes patients age 50 years or older,‖ J. Med. Internet Res., vol. 16, no. 4, p. e104, 2014.
7. T. Chomutare, N. Tatara, E. Årsand, and G. Hartvigsen, ―Designing a diabetes mobile application with social network support.,‖ in
HIC, 2013, pp. 58–64. 8. C. Hou, B. Carter, J. Hewitt, T. Francisa, and S. Mayor, ―Do mobile phone applications improve glycemic control (HbA1c) in the self-
management of diabetes? A systematic review, meta-analysis, and GRADE of 14 randomized trials,‖ Diabetes Care, vol. 39, no. 11,
pp. 2089–2095, 2016. 9. S. Kumar, H. Moseson, J. Uppal, and J. L. Juusola, ―A diabetes mobile app with in-app coaching from a certified diabetes educator
reduces A1C for individuals with type 2 diabetes,‖ Diabetes Educ., vol. 44, no. 3, pp. 226–236, 2018.
10. S. G. Mougiakakou, I. Kouris, D. Iliopoulou, A. Vazeou, and D. Koutsouris, ―Mobile technology to empower people with Diabetes Mellitus: Design and development of a mobile application,‖ in 2009 9th International Conference on Information Technology and
Applications in Biomedicine, 2009, pp. 1–4.
11. E. Årsand, N. Tatara, G. Østengen, and G. Hartvigsen, ―Mobile phone-based self-management tools for type 2 diabetes: the few touch application,‖ J. Diabetes Sci. Technol., vol. 4, no. 2, pp. 328–336, 2010.
12. L. T. Harris et al., ―Designing mobile support for glycemic control in patients with diabetes,‖ J. Biomed. Inform., vol. 43, no. 5, pp. S37–S40, 2010.
13. E. D. Lehmann and T. Deutsch, ―A physiological model of glucose-insulin interaction in type 1 diabetes mellitus,‖ J. Biomed. Eng.,
vol. 14, no. 3, pp. 235–242, 1992, doi: 10.1016/0141-5425(92)90058-S. 14. M. Berger and D. Rodbard, ―Computer simulation of plasma insulin and glucose dynamics after subcutaneous insulin injection,‖
Diabetes Care, vol. 12, no. 10, pp. 725–736, 1989, doi: 10.2337/diacare.12.10.725.
15. J. D. Lambert, Numerical methods for ordinary differential systems: the initial value problem. John Wiley & Sons, Inc., 1991. 16. Y. A. Çengel, Differential Equations for Engineers and Scientists. McGraw Hill, 2013.
17. G. Krishnan, ―Using the power of familiarity in design,‖ UX Collective, 2019. https://uxdesign.cc/familiarity-in-design-70df1979f80.
18. I. B. Hirsch, ―Type 1 diabetes mellitus and the use of flexible insulin regimens,‖ Am. Fam. Physician, vol. 60, no. 8, p. 2343, 1999. 19. Am Fam Physician, ―Diabetes: How to Use Insulin,‖ American Academy of Family Physicians, 1999.
https://www.aafp.org/afp/1999/0801/p649.html (accessed Jul. 13, 2020).
476-480
79.
Authors: Anusha Nellutla, Gnana Sai Ganesh Chittajallu, Shaik Feroz
Paper Title: Leaf Disease Detection using Labview Imaq Vision
Abstract: The intension of our project is to design a system which can identify the good leaves from the
diseased ones. Image processing is a powerful tool capable of many applications. Image processing combined
with Machine Vision can simulate and execute real time projects. In this project we have used LabVIEW along
with IMAQ Vision to acquire real time images and process them. LabVIEW IMAQ Vision is potentially useful
for agricultural products since it combines the merits of both LabVIEW and IMAQ Vision, which have graphical
programming environment and rich image processing functions. The project aims to provide a brief introduction
into the IMAQ vision components like Image Acquisition, Calibration, Defect detection. Major leaf diseases‘
symptoms include spots or discolouration of leaves. The presence or absence of macro and micro nutrients, bug
481-492
infestation and other diseases can be identified through leaves. In this project we have obtained the images
through LabVIEW IMAQ vision pallet. Further on two procedures were followed – one based on colour of the
leaves and other is based on spots and patterns present on the leaves. For the discolouration we first split the
image into its constituent planes- RGB and CMYK, here we used Green, Cyan and Yellow planes. Then on we
decided a threshold based on sample data using Linear Regression based prediction model of Machine Learning
to classify the data into three states – safe, risk and high risk.The second method was detecting spots. First, we
split the images into its constituent planes to convert the RGB image to Greyscale and increase the contrast using
the Colour Plane Extraction tool then use the Look up table tool to further enhance the contrast. Then on locate
the bright objects and then using dilation from the Morphology tool box we increase the size of the spots to
increase detection rate. Using Advanced Morphology tool box we removed the boundary objects to isolate the
spots. Then using the shape detection or circle detection algorithm we can detect the spots. Several samples
were obtained and are successfully classified. Finally, current limitations and likely future development trends
are discussed. Combining LabVIEW along with different programming algorithms can help in raising the
accuracy of the system.
Keywords: Image acquisition, colour plane extraction, Gray morphological operation, Edge detection, Real
time Colour matching.
References:
1. Malti K. Singh, Subrat Chetia2, ―Detection and Classification of Plant Leaf Diseases in Image Processing using MATLAB‖, International Journal of Life Sciences Research, Vol. 5, Issue 4, pp: (120-124), Month: October - December 2017.
2. Z. Husin, A.Y.M. Shakaff, A.H.A. Aziz, R.S.M. Farook, ―Plant Chili Disease Detection using the RGB Color Model‖,
3. https://www.google.com/search?q=diseased+leaves&rlz=1C1CHBF_enIN883IN883&oq=diseased+leaves&aqs=chrome..69i57j0l7.9136j1j7&sourceid=chrome&ie=UTF-8
4. Sandesh Raut, Kartik Ingole, ―Review On Leaf Disease Detection Using Image Processing Techniques‖, International Research Journal
of Engineering and Technology, Volume: 04 Issue: 04 | Apr -2017. 5. https://www.ni.com/pdf/manuals/320999c.pdf
6. https://www.ni.com/pdf/manuals/371077a.pdf
7. https://www.geeksforgeeks.org/linear-regression-python-implementation/ 8. https://knowledge.ni.com/KnowledgeArticleDetails?id=kA00Z0000019UFmSAM&l=en-IN
80.
Authors: Ankit Balvanshi, H.L. Tiwari, Mayank Gupta, Akhilesh Sharma
Paper Title: Statistical Downscaling of Maximum Temperature in Hoshangabad District of India
Abstract: The Global Climate ModelsCanESM2 and CGCM3 were utilised to downscale the maximum
temperature for Hoshangabad district of Madhya Pradesh, India. The area of study comprises to be of 6704 km2.
The predictors employed for CanESM2 were ncepmslpgl, ncepp500gl, ncepp850gl and ncepmslpas, ncepp500gl,
ncepp850gl were the predictors fixed for CGCM3. The total duration of the study was from the years 1979 –
2001. The two GCMs, CGCM3 and CanESM2 were checked for their capability in downscaling the maximum
temperature climatic parameter. The GCM outputs were evaluated on Nash Sutcliffe Efficiency (NSE) and
coefficient of determination (r2) criterias. The period of calibration was taken to be 1979-1995 and 1996-2001
was chosen as the period of validation. GCM CanESM2 obtained NSE of 0.77, 0.75 and r2 of 0.79, 0.79 during
the periods of calibration and validation respectively. It was concluded that CanESM2 model is found
comparatively more suitable for downscaling of maximum temperature for Hoshangabad region. The GCM can
be further employed to generate the future scenario of maximum temperature in the region.
Keywords: Global Climate Model, CGCM3, CanESM2, NSE, r2.
References:
1. IPCC (2007), Summary for Policymakers. In: Climate Change 2007: The Physical Science Basis, Contribution of Working Group I to
the Fourth Assessment Report of the Intergovernmental Panel on Climate Change, Cambridge University Press, Cambridge, United
Kingdom and New York, NY, USA. 2. Parekh, F. and Prajapati, K.P. (2013), Climate Change Impacts on Crop Water Requirement for Sukhi Reservoir Project, International
Journal of Innovative Research in Science, Engineering and Technology, 2(9), 4285-4292.
3. Shukla, R., Khare, D. and Deo, R. (2015), Statistical Downscaling of Climate Change Scenarios of Rainfall and Temperature over Indira Sagar Canal Command area in Madhya Pradesh, India, IEEE 14th International Conference on Machine Learning and
Applications, 313-317.
4. Kundu, S., Khare, D., and Mondal, A. (2017), Future Changes in Rainfall, Temperature and Reference Evapotranspiration in the Central India by Least Square Support Vector Machine, Geoscience Frontiers, 8(3),583-596.
5. Jaiswal, R.K., Tiwari, H.L., Lohani, A.K. and Yadava, R.N. (2018), Statistical Downscaling of Minimum Temperature of Raipur
(C.G.) India, Climate Change Impacts. Water Science and Technology Library, 82, 35-45. 6. STARDEX, (2005), Downscaling climate extremes, Final Report: 1-21.
7. Fowler, H. J., Blenkinsop, S., and Tebaldi, C. (2007), Linking Climate Change Modelling to Impacts Studies: Recent Advances in
Downscaling Techniques for Hydrological Modelling, International Journal of Climatology 27(12), 1547-1578.
8. Wilby, R. L., Troni, J., Biot, Y., Tedd, L., Hewitson, B. C., Smith, D. M., and Sutton, R. T. (2009), A Review of Climate Risk
Information for Adaptation and Development Planning, International Journal of Climatology, 29(9), 1193-1215.
9. Daniels, A. E., Morrison, J. F., Joyce, L. A., Crookston, N. L., Chen, S. C., and McNully, S. G. (2012), Climate Projections General Technical Report, Fort Collins, CO, U.S. Department of Agriculture, Forest Service, Rocky Mountain Research Station: 1-32.
10. Wilby, R.L. and Dawson, C.W. (2007), A Decision Support Tool for the Assessment of Regional Climate Change Impacts, User
Manual, UK.
493-496
81.
Authors: Raamesh. ASP, Balasundaram. N., Karthik. V.
Paper Title: An Investigation on the Impact of Industrial Wastes as A Replacement for Sand In Fiber-Reinforced
M20 Grade Concrete
Abstract: Waste disposal in environment due to rapid urbanization and industrialization is increasing day by
day. Disposal of wastes in the environment is more difficult in the construction industry. Marble powder and
quarry dust are the waste materials obtained from the dressing and processing unit of marble production and
quarries respectively. These waste materials are dumped in the environment as a landfill, and they can be used as
a viable substitute material to the ingredients of concrete to a great extent. This will result in the production of
economically green concrete; this happens because of less usage of river sand, leading to reduction in damage to
to the environment. In this paper, natural sand used in the fiber-reinforced concrete (FRC) of grade 20 was
replaced by varying proportions (0%, 25%, and 50%) and combinations of quarry dust (QD) and marble powder
(MP) with 0.5% of basalt fiber added to the mix in order to explore the impact of QD and MP on the mechanical
properties of concrete. The strength properties were assessed at 3rd, 7th, 14th and 28th day and the obtained
results are tabulated. It is observed that a particular proportion of QD and MP enhances the strength of FRC.
Keywords: Marble powder, Quarry Dust, Fiber Reinforced Concrete, Basalt Fiber.
References:
1. P. Sivakumar, Dr. N. Balasundaram, K. Vivek, ―Study on the performance of White Crystal Stone with Fine Aggregate Flyash based
SCC of Grade M30‖, International Journal of Civil Engineering and Technology (IJCIET), Volume 9, Issue 7, July 2018, pp. 1678–
1684, ISSN Print: 0976-6308 and ISSN Online: 0976-6316. 2. K. Tamilselvan, N. Balasundaram, V. Karthik, S. Suryarakash, ―An Experimental Investigation on the Strength Characteristics of
Hybrid Fiber Reinforced Self Compacting Concrete‖, Pakistan Journal of Biotechnology, Vol 15 (4) 957-960 (2018).
3. Karthik V, G.Baskar., ―Investigation on strength properties of self compacting concrete with copper slag as fine aggregate‖, International Journal of Civil Engineering Research and Development (IJCERD), ISSN 2248- 9428, Volume 5, Number 1, January -
April (2015) Volume 10, pg: 18-25
4. V.Karthik, G. Baskar., ―Study on durability properties of self-compacting concrete with copper slag partially replaced for fine aggregate‖, International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976-6308 and 0976-6316 Volume 6, Issue 9,
Sep 2015, pp. 20-30.
5. Sounthararajan V. M. and Sivakumar A. (2013), Effect of the lime content in marble Powder for producing high strength concrete, ARPN Journal of Engineering and Applied Sciences Vol. 8, No. 4.
6. Sakalkale A. D., Dhawale G.D., Kedar R. S. (2014), Experimental Study on Use of Waste Marble Dust in Concrete, International
Journal of Engineering Research and Applications, Vol. 4, No. 10 , pp. 44-50. 7. Pathan V. G. and Pathan M. G. (2014) Feasibility and Need of use of Waste Marble Powder in Concrete Production. IOSR Journal of
Mechanical and Civil Engineering (IOSR-JMCE) e-ISSN: 2278-1684, p-ISSN: 2320-334X PP 23-26
8. laidi A.S.E. , Azzouz L , Kadri E. and Kenai S.( 2012), Effect of natural pozzolana and marble powder on the properties of self-compacting concrete, Construction and Building Materials, Vol. 31, pp. 251–257.
9. Rai B., Khan N. H., Kr A., Tabin R. S. and Duggal S.K. (2011), Influence of Marble powder/granules in Concrete mix, International
Journal of Civil and Structural Engineering, Vol. 1, No. 4.
10. Aruntas H.Y.,Gürü M., Dayı M and Tekin I. (2010), Utilization of waste marble dust as an additive in cement production, Materials
and Design, Vol. 31, pp. 4039–4042.
11. Ilangovan R, Mahendran N and Nagamani K (2008), "Strength and durability properties of concrete containing quarry rock dust as fine aggregates", ARPN Journal of Engineering and Applied Science, Vol.3(5), pp.20-26.
12. Ilangovan R. and Nagamani K. 2006. Application of quarry Rock dust as fine aggregate in concrete construction. National Journal on
construction Management: NICMR. Pune. December. pp. 5-13. 13. M. Sahul Hameed and A.S.S. Sekar 2009. Properties of Green concrete containing Quarry dust and Marble sludge Powder as a
aggregate. APRN Journal pp. 83-89.
14. Tumadhir M , ―Thermal and Mechanical Properties of Basalt Fiber Reinforced Concrete‖ , World Academy of Science, Engineering and Technology ,Vol:7 2013-04-26.
15. Kunal Singha, “A Short Review on Basalt Fiber”, International Journal of Textile Science 2012, 1(4): 19-28
DOI:10.5923/j.textile.20120104.02.
497-501
82.
Authors: Himanshi Koli, M.P.S. Chawla
Paper Title: Design Analysis of PV-Wind Energy System with Pumped Hydro Storage using HOMER Pro
Abstract: Renewable energy in the recent era world-widely has proven to be a major shift for clean energy
generation. It is a great opportunity or solutions to address increasing clean energy demand especially in a
developing country such as India. As wind energy and solar energy are most commonly used renewable
resources, gives their abundance in the region. Focusing aim of the analysis is to present the reliability of
pumped hydro storage (PHS) system with respect to battery banks on the basis of operation and maintenance
(O&M) cost with minimum loss. Thus, this system will have feasibility and practical capability to provide
persistent supply operation to remote areas. The Hybrid Optimization Model for Electric Renewable (HOMER)
software also known as HOMER Prois used to conduct simulation of the system.
Keywords: Renewable energy system, PV-wind energy system, PHS, HOMER Pro.
References:
1. https://las493energy.wordpress.com/2018/10/01/an-exploration-of-hybrid-pumped-hydro-storage-systems/
2. A. K. Raji and D. N. Luta, ―Modeling and Optimization of a Community Microgrid Components,‖Energy Procedia, vol. 156, pp. 406–
411, Jan. 2019.
3. Shashikant Golande and Manohar Kalgunde, ―Utilization Of Solar Energy With Pumped Hydro Storage Based On Standalone
Photovoltaic Power Generation,‖ 2017 International Conference on Computer Electrical & Communication Engineering(ICCECE), Kolkata,pp. 1-4.
4. Afshin Izadin, Arash Pourtaherian and Sarasadat Motahari, ― Basic Model and Governing Equation of Solar Cells used in Power and
Control Applications,‖ Sept 2011 5. D.P.Kothari, K.C.Singhal, ―Renewable energy sources and emerging technologies‖, PHI Learning Private limited, second edition,
August 2017
6. Motupalli Priyanka, Niranchana R, S Selvakumar, Nithya Venkatesan, ―Feasibility Study of Replacement of Hybrid Renewable Energy – A Case Study,‖IJITEE Trans BEIESP, Volume-8, Issue-6S3, April 2019.
7. S.P. Koko, K. Kusakana, and H.J. Vermaak, ―Grid-interactive micro-hydrokinetic with pumped-hydro storage: The case study of three
502-505
South African demand sectors,‖2017 International Conference on the Domestic Use of Energy(DUE)
8. Bruno P. Pougoue Tchintchui, Atanda K. Raji, ―Techno-economic analysis of a renewable energy solution for an off-grid residence,‖ Cape Peninsula University of Technology, Cape Town, South Africa, 2019 Proceedings of the 27th Domestic use of Energy
Conference.
83.
Authors: Arun Kumar Chaudhary, Vijay Kumar
Paper Title: Half Logistic Exponential Extension Distribution with Properties and Applications
Abstract: In this article, we have introduced a new distribution based on type I half logistic-G family and
exponential extension as a base distribution known as Half Logistic Exponential Extension (HLEE) distribution.
The statistical properties of this model are also explored, such as the behavior of probability density, hazard rate,
and quantile functions are investigated. The Maximum likelihood estimation (MLE) method is used to estimate
model parameters. For the potentiality of the proposed model we have compared the goodness of fit with some
others models. We have proven the importance and flexibility of the new distribution in modeling with real data
applications empirically.
Keywords: Estimation, Exponential extension, Half-logistic exponential extension distribution, MLE.
References:
1. Abdulkabir, M., & Ipinyomi, R. A. (2020). Type II half logistic exponentiated exponential distribution: properties and applications. Pakistan Journal of Statistics, 36(1).
2. Afify, A.Z., Cordeiro, G.M., Yousof, H.M., Alzaatreh, A. & Nofal, Z.M. (2016). The Kumaraswamy transmuted-G family of
distributions: Properties and applications. Journal of Data Science, 14(2), 245-270. 3. Almarashi, A. M., Elgarhy, M., Elsehetry, M. M., Kibria, B. G., & Algarni, A. (2019). A new extension of exponential distribution
with statistical properties and applications. Journal of Nonlinear Sciences and Applications, 12, 135-145.
4. Ashour, S. K., & Eltehiwy, M. A. (2015). Exponentiated Power Lindley distribution. Journal of advanced research, 6(6), 895-905. 5. Balakrishnan, N. (1985). Order statistics from the half logistic distribution. Journal of Statistical Computation and Simulation, 20(4),
287-309.
6. Barreto-Souza, W., Santos, A.H.S. & Cordeiro, G.M. (2010). The beta generalized exponential distribution. Journal of Statistical Computation and Simulation, 80(2), 159-172.
7. Cordeiro, G.M. & de Castro, M. (2011). A new family of generalized distributions. Journal of Statistical Computation and Simulation,
81, 883-898. 8. Cordeiro, G.M., Alizadeh, M. & Diniz Marinho, P.R. (2015). The type I half-logistic family of distributions, Journal of Statistical
Computation and Simulation, 86(4), 707-728.
9. Ghitany, M.E.,Atieh, B. & ,Nadarajah, S. (2008). Lindley distribution and its application. Mathematics and Computers in Simulation,
78, 493-506.
10. Gomez, Y.M., Bolfarine, H. & Gomez, H.W. (2014). A new extension of the exponential distribution. Revista Colombiana de
Estadistica, 37(1), 25-34. 11. Gupta, R.D. & Kundu, D. (2001). Exponentiated exponential family; an alternative to gamma and Weibull. Biometrical Journal, 43,
117-130.
12. Hassan, A. S., Mohamd, R. E., Elgarhy, M., & Fayomi, A. (2018). Alpha power transformed extended exponential distribution: properties and applications. Journal of Nonlinear Sciences and Applications, 12(4), 62-67.
13. Kumar, V. (2010). Bayesian analysis of exponential extension model. J. Nat. Acad. Math, 24, 109-128.
14. Kumar, V. & Ligges, U. (2011). reliaR : A package for some probability distributions. http://cran.r-project.org/web/packages/reliaR/index.html
15. Kundu, D., & Raqab, M.Z. (2005). Generalized Rayleigh Distribution: Different Methods of Estimation, Computational Statistics and
Data Analysis, 49, 187-200. 16. Lemonte, A. J. (2013). A new exponential-type distribution with constant, decreasing, increasing, upside-down bathtub and bathtub-
shaped failure rate function. Computational Statistics & Data Analysis, 62, 149-170.
17. Louzada, F., Marchi, V. & Roman, M. (2014). The exponentiated exponential geometric distribution: a distribution with decreasing, increasing and unimodal failure rate. Statistics: A Journal of Theoretical and Applied Statistics, 48(1), 167-181.
18. Merovci, F. (2013). Transmuted exponentiated exponential distribution. Mathematical Sciences And Applications E-Notes, 1(2), 112-
122.
19. Moors, J. J. A. (1988). A quantile alternative for kurtosis. Journal of the Royal Statistical Society: Series D (The Statistician), 37(1),
25-32.
20. Murthy, D.N.P., Xie, M. & Jiang, R. (2003). Weibull Models, Wiley, New York 21. Nadarajah, S., & Haghighi, F. (2011). An extension of the exponential distribution. Statistics, 45(6), 543-558.
22. Nadarajah, S. & Kotz, S. (2006), The beta exponential distribution. Reliability Engineering and System Safety, 91(6), 689-697.
23. Ristic, M.M. & Balakrishnan, N. (2012), The gamma-exponentiated exponential distribution. Journal of Statistical Computation and Simulation, 82(8), 1191-1206.
24. Schmuller, J. (2017). Statistical Analysis with R For Dummies, John Wiley & Sons, Inc., New Jerse
25. Venables, W. N., Smith, D. M. & R Development Core Team (2020). An Introduction to R, R Foundation for Statistical Computing, Vienna,Austria. ISBN 3-900051-12-7. URL http://www.r-project.org.
506-512
84.
Authors: Kenji Sakoma, Makoto Sakamoto
Paper Title: A Consideration on "Sweetness" by 3D CG with Fruits as an Example
Abstract: Today, there are a lot of images and videos drawn by 3D computer graphics (hereinafter referred to as
3DCG) around us, and 3DCG is permeating our lives [1]. Recently, research and development of 3DCG-related
technologies such as 3D printers, AR, and VR have been actively carried out, and further progress in 3DCG can
be expected in the future. 3DCG is a technology that creates images and videos by creating objects in a virtual
three-dimensional space. CAD, VR, AR, simulators, 3D printers, etc. have been developed as technologies that
apply this. One of the reasons why it was applied to such technology is the high expressiveness of 3DCG. It is
possible to express various substances such as wood, metal, plastic, and glass, and it is becoming possible to
reproduce things that do not have a specific shape, such as flames, smoke, and fluids. One of the researches on
such 3DCG technology is digital food, and research is being conducted with the aim of putting it into practical
use in the future. Digital food is expected to solve problems related to food freshness management, disposal, new
513-516
product development simulation, etc., but even with the expressive power of 3DCG, meat and fish are still
difficult. I am not good at expressing fresh foods such as vegetables and fruits, and "freshness" and "organic
coloring" such as "fresh flowers". This is one of the issues that cannot be avoided even in the research and
development of digital foods and must be solved. In this technology, while understanding the principle of
3DCG, I learned using some software in order to explore what technology is necessary to create a digital food.
Also, in learning, we set the goal of "expressing fresh fruits", which is one of the challenges of digital food, and
the gloss of the skin peculiar to fruits, the slight unevenness of the surface, especially the freshness of the cut
surface of fruits we focused on reproducing the expression of freshness.
Keywords: Computer graphics, Ambient light, Specular reflection light, Diffuse reflected light, Subsurface
scattering, Fresnel formula
References:
1. Haruka Tsuboi. ―Fundamental Study on Tourism Support Using 3DCG‖, Proceedings of the International Conference on Artificial
Life and Robotics, OS1-4(D-ROM) pp.272-275(2018).
2. Hdeki Komuro, ―POV-Ray de manabu jisshu konpyu-ta gurafikkusu‖ [Practical computer graphics to learn with POV-Ray], ASCII
MEDIA WORKS Inc., (2000). 3. Japan Sensor Corporation, Unavailable: https://www.japansensor.co.jp/faq/968/index.html, Ltd., (2020-01-29).
4. Hiroshi Harada, ―Blender nyumon‖ [Introduction to Blender], Available: https://www.blender3d.biz.html. (2020 -01-29).
5. Noriko Kurachi, ―CG Magic: rendaring‖ [CG Magic: Render], Available: https://www.mext.go.jp/content/1407196_21_1_1_2.pdf. 6. Max Born and Emil Wolf, Principles of Optics,Cambridge University Press, Cambridge, (1997).
7. H. W. Jensen et all.‖ Rendering of Wet Materials,‖Proceedings of the Seventh Eurographics Workshop on Rendering, pp. 273-282,
(1999). 8. Warren J. Smith. Modern Optical Engineering.McGraw-Hill. pp. 228-256.3).
85.
Authors: Kenji Sakoma, Makoto Sakamoto
Paper Title: For Colorization using Template Matching Basic Research on
Abstract: Colorization, also known as colorization, is a term introduced by Wilson Markle in 1970, and is a
method of coloring black-and-white images and videos using a computer. Coloring is important. Imagine
coloring a picture as an example. The painting before painting only gives information of existence, such as trees,
flowers, and clouds. Some things can be identified by color. This does not give us enough information from the
picture. But what about coloring? If you paint the sky red, it will be a sunset, and if you paint the ground green,
it will be a meadow. In other words, it is possible to express not only the background but also the background.
This makes it possible to read information that cannot be understood only in black and white. With the
development of digital devices such as smartphones these days, the chances of seeing black-and-white images
are decreasing, but in modern times, black-and-white images are used for X-ray images, MRI images, aerial
photographs, fixed-point observations, etc. There are many opportunities to be lost. The development of color
photography began in the world in the 1800s, and the development of color photography began in Japan in 1940.
In other words, the photographs before that were black and white, and colorization was used to colorize them.
Currently, many researchers are studying colorization methods and processes, and the processing time and the
burden on users are being reduced. However, software that can perform highly complete colorization is
expensive, and some are complicated to operate. Therefore, in this research, as basic research for the
development of a fully automatic colorization program for free software, color images (template images) lacking
information by template matching using ZNCC and black-and-white images with similar brightness patterns are
colored. We made a prototype of a colorization program that restores images.
Keywords: Computer graphics, Colorization, Zero-means Normalized Cross-Correlation, BMP image, HSV
color space, Color Propagation
References:
1. Hiroaki Kinumatsu, ―Kararize-shon ni kansuru kisokenkyu‖ [Basic research on colorization], Master Thesis, University of Miyazaki (2012).
2. ―Bitmappu gazo‖ [Bitmap image], Available: http://ja.wikipedia.org/wiki/.
3. RGB, Available: http://ja.wikipedia.org/wiki/RGB. 4. ―HSV kukan‖ [HSV space], Available: http://ja.wikipedia.org/wiki/.
5. ―Tenpure-to macchingu ni tuite rikaisuru‖ [Understand template matching], Available: https://www.yukisako.xyz/entry/template-
matching. 6. Seiki Inoue, Nobuyuki Yagi, Masaki Hayashi, Eisuke Nakasu, Koji Mitani, Makoto Okui, ―C gengo de manabu jissen gazo shori‖
[Practical image processing to learn in C language], Ohmsha, Ltd., (1999).
7. Uruma Kazunori, Seiichiro Hangai, ―Kararize-shon: shiro kuro gazo / eizo wo jido de kara-ka suru‖ [Colorization: Automatic colorization of black and white images/videos], IEICE Fundamentls Review Vol.11 No.3 2017.
517-519
86.
Authors: Hamdy Amin Morsy
Paper Title: Developing a New CCN Technique for Arabic Handwritten Digits Recognition
Abstract: Convolutional Neural Networks (CNN) have many applications in object recognition such as
character and digit recognition. Few researches are performed on Arabic handwritten digits recognition. In this
research, we will develop a new algorithm to utilize the convolutional neural networks with sigmoid function (ζ-
CNN) to recognize Arabic handwritten digits recognition. The performance of this method provides minimum
cost functions with maximum testing accuracy results in compared to other existing techniques.
520-524
Keywords: Machine Learning, Neural Networks, Image Processing, Natural Language Processing
References:
1. A.Charu, "Neural Networks and Deep Learning: A Textbook", Springer, 1st ed. 2018 Edition.
2. Oludare I. Abiodun et al, "Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition", DOI
10.1109/ACCESS.2019.2945545, IEEE Access.
3. S. Al-Ma‘adeed, D. Elliman, C. A. Higgins, "A data base for Arabic handwritten text recognition research", In Proceedings eighth international workshop on frontiers in handwriting recognition, IEEE 2002, pp 485–489.
4. H. A. Morsy, "Comparison of Commonly Used Non-Adaptive Image Scaling Techniques",CiiT Digital Image Processing 10 (9), 177-
180. 5. H. A. Morsy, H, "Performance Analysis of the Effects of Non-Adaptive Image Scaling on Image Edges", IJRTE 7 (6), 1692 – 1696.
6. D. C. Ciresan, U. Meier, L. M. Gambardella, J. Schmidhuber, "Convolutional neural network committees for handwritten character
classification", In 2011 International conference on document analysis and recognition, pp 1135–1139. IEEE. 7. A. El-Sawy, M. Loey, E. Hazem, "Convolutional neural network for Arabic handwritten characters dataset classification" ,
https://www.kaggle.com/mloey1/cnn-for-arabic-handwritten-characters/comments. Accessed: 30 May 2019. 8. I. Goodfellow, Y. Bengio, A. Courville,"Deep learning. MIT Press", 2016,http://www.deeplearningbook.org.
9. S. Impedovo, F. M. Mangini, D. Barbuzzi, "A novel prototype generation technique for handwriting digit recognition", Pattern
Recognit, 2014, 47(3):1002–1010. 10. G. Latif, J. Alghazo, L. Alzubaidi, M. M. Naseer, Y. Alghazo, "Deep convolutional neural network for recognition of unified multi-
language handwritten numerals" In 2018 IEEE 2nd International workshop on Arabic and derived script analysis and recognition
(ASAR), pp 90–95. 11. Y. LeCun, L. Bottou, Y. Bengio, P. Haffner, et al, "Gradient based learning applied to document recognition", Proc IEEE, 1998, 86
(11):2278–2324.
12. A. Mars, G. Antoniadis, "Arabic online handwriting recognition using neural network", Int J ArtifIntell Appl(IJAIA), 2016,7(5). 13. M. A. Mudhsh, Almodfer R, "Arabic handwritten alphanumeric character recognition using very deep neural network", 2017,
Information 8(3).
14. M. Ramzan, H. U. Khan, S. M. Awan, W. Akhtar, M. Ilyas, A. Mahmood, A. Zamir, "A survey on using neural network based algorithms for hand written digit recognition", 2018, Int J Adv Comput Sci Appl. https://doi.org/10.14569/IJACSA.2018.090965.
15. N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, R. Salakhutdinov, "Dropout: a simple way to prevent neural networks from
overfitting", 2005, J Mach Learn Res 15(1):1929–1958. 16. J. Wu, "Introduction to convolutional neural networks. National Key Lab for Novel Software Technology", 2017, vol 5, Nanjing
University, China, p 23.
17. K. Younis, "Arabic handwritten characters recognition based on deep convolutional neural networks", 2018, Jordan J Comput Inform Technol (JJCIT) 3.
18. U. R. Babu, Y. Venkateswarlu, A. K. Chintha, "Handwritten digit recognition using k-nearest neighbor classifier", In Proceedings of
the 2014 World Congress on Computing and Communication Technologies, (WCCCT 2014), Trichirappalli, India, 27 February–1 March 2014; pp. 60–65.
19. X. X. Niu, C. Y. Suen, "A novel hybrid CNN-SVM classifier for recognizing handwritten digits", Pattern Recognit. 2012, 45, 1318–
1325. [CrossRef].
20. F. A. Al-omari, O. Al-jarrah, "Handwritten Indian numerals recognition system using probabilistic neural networks", Adv. Eng.
Inform. 2004, 18, 9–16.
21. M. Takruri, R. Al-Hmouz, A. Al-Hmouz, "A three-level classifier: fuzzy C means, support vector machine and unique pixels for Arabic handwritten digits", In: World Symposium on Proceedings of Computer Applications & Research (WSCAR), pp. 1—5 (2014).
22. J. H. Alkhateeb, M. Alseid, "DBN – based learning for Arabic handwritten digit recognition using DCT features", In: 2014
6thInternational Conference on Computer Science and Information Technology (CSIT), pp. 222—226 (2014). 23. M. Salameh, "Arabic digits recognition using statistical analysis for end/conjunction points and fuzzy logic for pattern recognition
techniques", World Comput. Sci. Inf. Technol. J. 4(4), 50—56 (2014).
24. O. E. Melhaoui, M. E. Hitmy, F. Lekhal, "Arabic numerals recognition based on an improved version of the loci characteristic", Int. J. Comput. Appl. 24(1), 36—41 (2011).
25. P. P. Selvi, T. Meyyappan, "Recognition of Arabic numerals with grouping and ungrouping using back propagation neural network",
In: International Conference on Proceedings of Pattern Recognition, Informatics and Mobile Engineering (PRIME), pp. 322—327 (2013).
26. S. A. Mahmoud, "Arabic (Indian) handwritten digits recognition using Gabor-based features", In: International Conference on
Proceedings of Innovations in Information Technology, IIT 2008, pp. 683—687 (2008). 27. A. El-Sawy, H. El-Bakery, M. Loey, "CNN for Handwritten Arabic digits recognition based on LeNet-5", Springer International
Publishing AG 2017.
87.
Authors: Mahima Chandane, Ankita Chavan, Renuka Kamath, Dipali Madane, Madhuri Badole
Paper Title: Intelligent Music Player Based on Emotions
Abstract: This project presents a system to automatically detect emotional dichotomy and mixed emotional
experience using a Linux based system. Facial expressions, head movements and facial gestures were captured
from pictorial input in order to create attributes such as distance, coordinates and movement of tracked points.
Web camera is used to extract spectral attributes. Features are calculated using Fisherface algorithm. Emotion
detected by cascade classifier and feature level fusion was used to create a combined feature vector. Live
actions of user are to be used for recording emotions. As per calculated result system will play songs and display
books list.
Keywords: Smart Emotion, Face Detection, Face Recognition, Emotion Prediction, OpenCV.
References:
1. Amol S Patwardhan. "Multimodal mixed emotion detection", 2017 2nd International Conference on Communication and Electronics Systems (ICCES), 2017
2. Eman Alajrami, Hani Tabash, Yassir Singer, M.T. El Astal. "On using AI-Based Human Identification in Improving Surveillance
System Efficiency", 2019 International Conference on Promising Electronic Technologies (ICPET), 2019 3. A. M. Jagtap, Vrushabh Kangake, Kushal Unune, Prathmesh Gosavi. "A Study of LBPH, Eigenface, Fisherface and Haar-like attributes
for Face recognition using OpenCV", 2019 International Conference on Intelligent Sustainable Systems (ICISS), 2019
4. van der Zwaag, Marjolein D., Joris H. Janssen, and Joyce HDM Westerink. "Directing Physiology and Mood through Music: Validation of an Affective Music Player", IEEE Transactions on Affective Computing, 2012.
5. "Machine Learning Based Malware Detection: a Boosting Methodology", International Journal of Innovative Technology and
525-528
Exploring Engineering, 2020
6. Marjolein D. van der Zwaag, Joris H. Janssen, Joyce H.D.M. Westerink. "Directing Physiology and Mood through Music: Validation of an Affective Music Player", IEEE Transactions on Affective Computing, 2013.
88.
Authors: Shruti Bhavsar, Sanjana Khairnar, Pauravi Nagarkar, Sonali Raina, Amol Dumbare
Paper Title: On Time Document Retrieval using Speech Conversation and Diverse Keyword Clustering During
Presentations
Abstract: In this paper we present the idea of extracting keywords from discussions, with the point of using
these words to recuperate, for each small piece of conversation and generating reports to individuals. Regardless,
even a smaller piece contains a blend of words, which can be effortlessly interrelated to a couple of subjects;
additionally, using a customized talk affirmation (ASR) system presents slips among them. Thus it is hard to
sum up effectively the data needs of the conversation individuals. We initially propose a count to kill significant
words from the yield of an ASR system which makes usage of topic showing strategies and of a sub particular
prize limit which supports varying characteristics in the word set, to organize the potential contrasting
characteristics of subjects and diminish ASR disturbance. By then, we set forward a strategy to surmise different
topically detached requests from this definitive word set, remembering the ultimate objective is to build the
potential outcomes of making at any rate one appropriate proposition while using these inquiries to investigate
the English Wikipedia. The readings depict that our pronouncement continue ahead over past procedures that
watch simply word recurrence or idea commonality, and states the good response for a report recommended
framework to be used as a piece of conversations.
Keywords: Document Recommendation, Information retrieval keyword extraction, Meeting analysis, Local
database, Extraction, Keyword, Clustering
References:
1. A. Csomai and R. Mihalcea, ―Linking educational materials to encyclopedic knowledge,‖ in Proc. Conf. Artif. Intell.Educat.:
BuildingTechnol. Rich Learn. Contexts That Work, 2007, pp. 557–559. 2. Habibi, M., Popescu-Belis, A. (2015), Keyword Extraction and Clustering for Document Recommendation in Conversations,
IEEE/ACM Transactions on Audio, Speech, and Language Processing, 23(4), 746–759. doi:10.1109/taslp.2015.2405482
3. Hunyadi, L. - Keyword extraction: aims and ways today and tomorrow. - In: Proceedings of the Keyword Project: Unlocking Content through Computational Linguistics. 2001.
4. Pere R. Comas and Jordi Turmo ― Spoken Document Retrieval Based on Approximated Sequence Alignment‖
5. Scott Deerwester ,Susan T. Dumais , ―Indexing by latent semantic analysis‖ 6. Melville and Vikas Sindhwani, IBM T.J. Watson Research Center,Yorktown Heights, NY 105, Recommender System Prem
hw}@us.ibm.com
7. Christopher D. Manning, Prabhakar Raghavan, and Hinrich Schütze, An Introduction to Information Retrieval. Cambridge University Press, 2008
8. Khalid Al-Kofahi, Peter Jackson, Mike Dahn*, Charles Elberti, William Keenan, John Duprey.A "Document Recommendation
System Blending Retrieval and Categorization Technologies". 9. Michael J. Pazzani and "Daniel Billsus, Content-based Recommendation Systems ―.
10. Sangeetha. J 1, Kavitha R ," An Improved Privacy Policy Inference over the Socially Shared Images with Automated Annotation
Process ", / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (3) , 2015, 3166-3169. 11. Aishwarya Singh, Bhavesh Mandalkar, Sushmita Singh , Prof. yogesh Pawar, "A Survey on User-Uploaded Images Privacy Policy
Prediction Using Classification and Policy Mining",International Journal of Innovative Research in Computer and Communication
Engineering .Vol. 3, Issue 9, September 2015. 12. X. Liu, X. Zhou, Z. Fu, F. Wei, and M. Zhou, ―Exacting social events for tweets using a factor graph,‖ in Proc. AAAI Conf. Artif.
Intell., 2012, pp. 1692–1698.
13. A. Cui, M. Zhang, Y. Liu, S. Ma, and K. Zhang, ―Discover breaking events with popular hashtags in twitter,‖ in Proc. 21st ACM Int. Conf. Inf. Knowl. Manage., 2012, pp. 1794–1798.
14. A. Ritter, Mausam, O. Etzioni, and S. Clark, ―Open domain event extraction from twitter,‖ in Proc. 18th ACM SIGKDD Int. Conf.
Knowledge Discovery Data Mining, 2012, pp. 1104–1112.
529-532
89.
Authors: Abarna M, Jane Lourde Teresha A, Devisri R, Maithreyini M, V. Kumar Chinnaiyan
Paper Title: Helping Hand for Unsighted People-Acousticsight
Abstract: Technology is best when it brings people together. Today technology plays a vital role in humanity.
Also applied science can make the impossible possible. The proposed project aims to show equality in the safe
navigation of visually impaired people just like a normal person. The project aims to help the secure guidance of
humans with bad eyesight. This system support the sole in attaining the landing place, leading them across the
way and alert them about the barrier that are expected in their path through the vibration and generate simulated
speech output through headset. Therefore, this technology hold back them from striking the barrier. It add on
value to conventional canes with barrier predicting, preventing human from accident and reducing difficulties in
navigation. An ultrasonic sensor is execute to determine the distant of obstacles from the person. It is a
Raspberry Pi based platform that is used to alert the person of impending obstacles. Also can create the place for
all other components and it has functioning code. Here, a vibration motor is used to warn the person from the
collision. Combined with the role of guiding, it also has aid preventing plan in case of emergency. The GPS is
included to find the location of person and the location is sent to the person‘s family through the notification by
means of Blynk app. Accordingly, The project convince the visually impaired people can travel alone without
getting fear or accidents at the moment.
Keywords: Visually impaired, sensing, vibration motor, barrier prediction.
References:
1. Alessio Carulllo and Marco Parvis (2001) ‗An Ultrasonic Sensor for Distane Measurement in Automotive Applications‘, IEEE Sensor
534-536
Journal, Vol. 1.
2. K.Gopala Krishnan, C.M.Porkodi, and K.kanimozhi (2013) ‗Image Recognition for Visually Impaired people By Sound‘, International conference on Communication and Signal Processing, Vol. 39, pp. 943-946.
3. Shashank Chaurasis and K.V.N.Kavitha (2014) ‗An Electronic Walking Stick for Blinds‘, International Conference on Information
Communication and Embedded Systems(ICICES).
4. Sung Jae Kang, Young Ho, Kim, In Hyuk Moon (2001) ‗Development of an Intelligent Guide-stick for the Blind, Seoul of Korea,
IEEE International Conference on Robotics & Automation Vol. 4.
5. N.Mahumad, R.K. Saha, R.B. Zafar , M.B.H. Bhuian and S.S.Sarwar (2014) ‗Vibration and Voice Operated System for Visually Impaired Person‘, International Conference on Informatics Electronics & Vision (ICIEV) IEEE,pp. 1-5.
90.
Authors: Kurshid Madina, Saksham Mansotra
Paper Title: Genderpredictions using Convolution Neural Networks
Abstract: Nowadays Deep learning was advanced so much in our daily life. From 2014, there is massive growth
in this technology as there is a vast amount of data present. We are even getting better results from whatever we
may do. In my work, I have used Convolution Neural Networks as my project depends on image classification.
So what I‘m trying to do is I‘m using two classes in which one class is male and one class is female. I‘m
classifying both the classes and trying to predict who is male and who is female. For this, I have been using
layers like Sequential, Convolution2D, Max-pooling, Flattening, and finally Dense. So, I connect all of these
layers. I have been using two more extra layers which are Convolution2D and max-pooling connected as one
layer for better classifications. In my model, I‘m using Adam optimizer as I‘m having only two classes and in
my experiments, I found Adam as a good optimizer and I use binary cross entropy as my loss function as I‘m
using only two classes if we have more than two classes we can use categorical loss function and the images
which I use for predictions will be converted into 64*64 matrix form. In the end, I will be getting predictions as
1 for male and 0 for female.
Keywords: Computer Vision, Gender Classification, Human-computer interaction, Convolution Neural
Network (CNN).
References:
1. M. K. Bhuyan., et al. ―A novel set of features for continuous hand gesture recognition,‖ Journal on Multimodal User Interfaces., vol.
8, no. 4, pp. 333–343, 2014. 2. Kasthurirangan Gopalakrishnan, et al. – Deep Convolution Neural Networks with transfer learning for computer vision-based data-
driven pavement distress detection,|| Journal on Elsevier, vol 157, pp 322-330,2017.
3. Deegan J Atha, et al. – Evaluation of deep learning approaches based on convolution neural networks for corrosion detection, || Journal on sage, 2017.
4. Gil Levi, Taj Hassner. – Age and Gender Classification using Convolution Neural Networks.|| predeedings of IEEE Conference on
Computer vision and pattern recognition (CVPR) Workshops, pp.34-42 ,2015. 5. Yann LeCun, et al. – Gradient-Based Learning Applied to Document Recognition.|| Proc. Of the IEEE, 1998.
6. Jianxin Wu – Introduction to Convolution Neural Networks, 2017.
7. C.-C. Jay Kuo – Understanding Convolution Neural Networks with a Mathematical Model, arXiv, 2016. 8. Dominik Scherer et al. – Evaluation of pooling Operations in Convolution Architectures for Object Recognition, ICANN,pp 92-
101,2010.
9. JonghoonJin, et al. – Flattened Convolution Neural Networks for FeedForward Acceleration, arXiv, 2015. 10. Zixian Zeng, et al. – CNN Model Design of Gesture Recognition Based on Tensorflow Framework, IEEE, 2019.
537-540
91.
Authors: Najihah Mohd Noor, Yumi Zuhanis Has-Yun Hashim, Muhammad Shirwan Abdullah Sani, Wan
Wardatul Amani Wan Salim
Paper Title: Characterization, Antibacterial and Anti-Inflammatory Activities of Electrospun poly (vinyl alcohol)
(PVA) Containing Aquilaria Malaccencis Leaf Extract (ALEX) Nanofibers
Abstract: Plant-based electrospun nanofibers are widely fabricated as wound dressing in recent years primarily
due to the presence of bioactive compounds which can facilitate the wound healing effects. In this study,
poly(vinyl alcohol) (PVA) fibre mats containing Aquilaria malaccensis leaf extract (ALEX) [5, 10 and 15
%(w/w)] were fabricated by electrospinning method as potential wound dressing material. The nanofibers were
uniform, beadless and randomly oriented with average diameters ranged between 195.27 – 281.20 nm. The
presence of ALEX in the PVA nanofibers were evaluated by Attenuated total reflectance-Fourier transform
infrared spectroscopy (ATR-FTIR) and differential scanning calorimetry (DSC). The mechanical properties,
swelling degree and weight loss of nanofiber mats were also determined. ALEX was rapidly released from the
ALEX-loaded PVA nanofibers in the first 12 hours and increased gradually afterwards. The released rate of
ALEX was dependent on the ALEX content in the PVA nanofibers. This result is also contributed by the
swelling degree and porosity of the nanofibers where the results were found to be between 241.66 – 305.86%
and 64.53 – 30.81%, respectively. Meanwhile, the tensile stress and maximum elongation at break for all
electrospun nanofiber mats were in the range of 8.56 – 2.68 MPa and 205.94 – 166.31%, respectively. The
nanofiber mats inhibited growth of Escherichia coli, Vibrio vulnificus, Bacillus subtilis and Staphylococcus
aureus with zone of inhibition of 7.5 - 15.0 mm for gram positive bacteria and 6.1 - 11.7 mm for gram negative
bacteria. ALEX-loaded PVA nanofibers also showed potent anti-inflammatory activity against lipoxygenase
with percentage of inhibition between 80.887 – 86.977%. Taken together, the results of this study suggest that
ALEX-loaded PVA nanofibers have the desired properties of bioactive wound dressing.
Keywords: Electrospinning, agarwood, polyvinyl alcohol, wound dressing
References:
1. Pilehvar-Soltanahmadi, Y., Dadashpour, M., Mohajeri, A., Fattahi, A., Sheervalilou, R., & Zarghami, N. (2017). An Overview on Application of Natural Substances Incorporated with Electrospun Nanofibrous Scaffolds to Development of Innovative Wound
541-549
Dressings. Mini-Reviews in Medicinal Chemistry, 18(5), 414–427. https://doi.org/10.2174/1389557517666170308112147
2. Yousefi, I., Pakravan, M., Rahimi, H., Bahador, A., Farshadzadeh, Z., & Haririan, I. (2017). An investigation of electrospun Henna leaves extract-loaded chitosan based nanofibrous mats for skin tissue engineering. Materials Science and Engineering C, 75, 433–444.
https://doi.org/10.1016/j.msec.2017.02.076
3. Liu, Y., Wei, J., Gao, Z., Zhang, Z., & Lyu, J. (2017). A Review of Quality Assessment and Grading for Agarwood. Chinese Herbal Medicines, 9(1), 22–30. https://doi.org/10.1016/S1674-6384(17)60072-8
4. Elias, M. F., Ibrahim, H., & Mahamod, W. R. W. (2017). A Review on the Malaysian Aquilaria species in Karas Plantation and
Agarwood Production. International Journal of Academic Research in Business and Social Sciences, 7(4), 1021–1029. https://doi.org/10.6007/ijarbss/v7-i4/2911
5. Eissa, M., Hashim, Y. Z. H. Y., & Zainurin, N. A. A. (2018). Aquilaria malaccensis Leaf as an Alternative Source of Anti-inflammatory
Compounds. International Journal on Advanced Science, Engineering and Information Technology, 8(4–2), 1625. https://doi.org/10.18517/ijaseit.8.4-2.7054
6. Komakech, R., Matsabisa, M. G., & Kang, Y. (2019). The Wound Healing Potential of Aspilia africana (Pers.) C. D. Adams
(Asteraceae) . Evidence-Based Complementary and Alternative Medicine, 2019, 1–12. https://doi.org/10.1155/2019/7957860 7. Dev, S. K., Choudhury, P. K., Srivastava, R., & Sharma, M. (2019). Antimicrobial, anti-inflammatory and wound healing activity of
polyherbal formulation. Biomedicine and Pharmacotherapy, 111(September 2018), 555–567.
https://doi.org/10.1016/j.biopha.2018.12.075 8. Zainurin, N. A. A., Hashim, Y. Z. H. Y., Mohamed Azmin, N. F., & Al-Khatib, M. F. R. (2020). Understanding the effects of different
parameters of soxhlet extraction on bioactive compounds from aquilaria malaccensis leaf through GCMS-based profiling. Food
Research, 4, 63–73. https://doi.org/10.26656/fr.2017.4(S1).S09 9. Vatankhah, E. (2018). Rosmarinic acid-loaded electrospun nanofibers: In vitro release kinetic study and bioactivity assessment.
Engineering in Life Sciences, 18(10), 732–742. https://doi.org/10.1002/elsc.201800046
10. Suwantong, O., Pankongadisak, P., Deachathai, S., & Supaphol, P. (2013). The potential of electrospun poly(L-lactic acid) fiber mats containing a crude garcinia dulcis extract for use as wound dressings. Chiang Mai Journal of Science, 40(3), 517–533.
https://doi.org/10.1007/s00289-014-1102-9
11. Li, C. W., Fu, R. Q., Yu, C. P., Li, Z. H., Guan, H. Y., Hu, D. Q., … Lu, L. C. (2013). Silver nanoparticle/chitosan oligosaccharide/poly(vinyl alcohol) nanofibers as wound dressings: A preclinical study. International Journal of Nanomedicine, 8,
4131–4145. https://doi.org/10.2147/IJN.S51679
12. Shalaby, T., Hamad, H., Ibrahim, E., Mahmoud, O., & Al-Oufy, A. (2018). Electrospun nanofibers hybrid composites membranes for highly efficient antibacterial activity. Ecotoxicology and Environmental Safety, 162(July), 354–364.
https://doi.org/10.1016/j.ecoenv.2018.07.016
13. Azhar, U. haq, Malik, A., Anis, I., Khan, S. B., Ahmed, E., Ahmed, Z., Nawaz, S. A., & Choudhary, M. I. (2004). Enzymes Inhibiting Lignans from Vitex negundo. Chem. Pharm. Bull, 52(11), 1269–1272.
14. Tort, S., Acartürk, F., & Beşikci, A. (2017). Evaluation of three-layered doxycycline-collagen loaded nanofiber wound dressing. In
International Journal of Pharmaceutics (Vol. 529). https://doi.org/10.1016/j.ijpharm.2017.07.027 15. Adeli, H., Khorasani, M. T., & Parvazinia, M. (2018). Wound dressing based on electrospun PVA/chitosan/starch nanofibrous mats:
Fabrication, antibacterial and cytocompatibility evaluation and in vitro healing assay. International Journal of Biological
Macromolecules, 122, 238–254. https://doi.org/10.1016/j.ijbiomac.2018.10.115 16. Tobin, D. J. (2017). Introduction to skin aging. Journal of Tissue Viability, 26(1), 37–46. https://doi.org/10.1016/j.jtv.2016.03.002
17. Ramalingam, R., Dhand, C., Leung, C. M., Ezhilarasu, H., Prasannan, P., Ong, S. T., … Arunachalam, K. D. (2019). Poly-ε-caprolactone/gelatin hybrid electrospun composite nanofibrous mats containing ultrasound assisted herbal extract: Antimicrobial and
cell proliferation study. Nanomaterials, 9(3). https://doi.org/10.3390/nano9030462
18. Bayat, S., Amiri, N., Pishavar, E., Kalalinia, F., Movaffagh, J., & Hahsemi, M. (2019). Bromelain-loaded chitosan nanofibers prepared by electrospinning method for burn wound healing in animal models. Life Sciences, 229, 57–66.
https://doi.org/10.1016/j.lfs.2019.05.028
19. Vakilian, S., Norouzi, M., Soufi-Zomorrod, M., Shabani, I., Hosseinzadeh, S., & Soleimani, M. (2018). L. inermis-loaded nanofibrous scaffolds for wound dressing applications. Tissue and Cell, 51(February), 32–38. https://doi.org/10.1016/j.tice.2018.02.004
20. Garcia-Orue, I., Gainza, G., Gutierrez, F. B., Aguirre, J. J., Evora, C., Pedraz, J. L., … Igartua, M. (2017). Novel nanofibrous dressings
containing rhEGF and Aloe vera for wound healing applications. International Journal of Pharmaceutics, 523(2), 556–566. https://doi.org/10.1016/j.ijpharm.2016.11.006
21. Ramalingam, R., Dhand, C., Leung, C. M., Ong, S. T., Annamalai, S. K., Kamruddin, M., … Arunachalam, K. D. (2019). Antimicrobial
properties and biocompatibility of electrospun poly-ε-caprolactone fibrous mats containing Gymnema sylvestre leaf extract. Materials Science and Engineering C, 98(August 2018), 503–514. https://doi.org/10.1016/j.msec.2018.12.135
22. Manotham, S., Pengpat, K., Eitssayeam, S., Rujijanagul, G., Sweatman, D. R., & Tunkasiri, T. (2015). Fabrication of
Polycaprolactone/Centella asiatica Extract Biopolymer Nanofiber by Electrospinning. Applied Mechanics and Materials, 804, 151–154. https://doi.org/10.4028/www.scientific.net/amm.804.151
23. Suganya, S., Senthil Ram, T., Lakshmi, B. S., & Giridev, V. R. (2011). Herbal Drug Incorporated Antibacterial Nanofibrous Mat
Fabricated by Electrospinning: An Excellent Matrix For Wound Dressings. Journal of Applied Polymer Science, 121(5), 2893–2899. https://doi.org/10.1002/app.33915
24. Wisastra, R., Ghizzoni, M., Boltjes, A., Haisma, H. J., & Dekker, F. J. (2012). Anacardic acid derived salicylates are inhibitors or
activators of lipoxygenases. Bioorganic and Medicinal Chemistry, 20(16), 5027–5032. https://doi.org/10.1016/j.bmc.2012.06.019 25. Whitman, S., Gezginci, M., Timmermann, B. N., & Holman, T. R. (2002). Structure-activity relationship studies of nordihydroguaiaretic
acid inhibitors toward soybean, 12-human, and 15-human lipoxygenase. Journal of Medicinal Chemistry, 45(12), 2659–2661.
https://doi.org/10.1021/jm0201262 26. Leelaprakash, G., & Mohan Dass, S. (2011). Invitro anti-inflammatory activity of methanol extract of enicostemma axillare.
International Journal of Drug Development and Research, 3(3), 189–196.
92.
Authors: Pallavi S Biradar, Anand Jatti
Paper Title: Face and Thumb Based Multimodal Bio-Metric Authentication using Harris Feature Extraction and
Stenography
Abstract: In the past recent, identification of a person in an effective manner is a foremost concern for any
security authentication in numerous applications such as, banking, e-commerce, communications etc. One of the
best identification technology for person identification and authentication compared with the existing password
based authentication is the multimodal biometric technology. Multimodal can be defined as, a system which uses
two or more biometrics for identification of person. In the paper we propose a multimodal bio-metric system
with a unique methodology and features extraction method incorporated in system for a secure authentication.
The two modalities used in the system are face and thumb. We use Harris based image feature extraction for
both and choose the best unique features from both and fused using concatenation. The extracted unique features
are embedded in a cover image using modulo operator based steganography technique. This encrypted data is
shared as an image file to the receiver for authentication. At the receiver end the hidden features are decrypted
and separated into face and thumb features. These decrypted features are compared with the pre-trained
550-555
authorized person feature, based on the multi-svm classifier result the person is decided as authorized or
unauthorized. The accuracy of the system is been calculated and was resulted in a good accuracy. The system
can be made much more secure by adding an additional secret key for encryption and decryption.
Keywords: Bio-metric, Harris, modulo operator, multi-modal, multi-svm. Stenography.
References:
1. X. Zhang, D. Cheng, P. Jia, Y. Dai and X. Xu, "An Efficient Android-Based Multimodal Biometric Authentication System With Face
and Voice," in IEEE Access, vol. 8, pp. 102757-102772, 2020, doi: 10.1109/ACCESS.2020.2999115. 2. A. Herbadji, N. Guermat, L. Ziet and M. Cheniti, "Multimodal Biometric Verification using the Iris and Major Finger Knuckles," 2019
International Conference on Advanced Electrical Engineering (ICAEE), Algiers, Algeria, 2019, pp. 1-5, doi:
10.1109/ICAEE47123.2019.9014704. 3. B. Ammour, T. Bouden and L. Boubchir, "Face-Iris Multimodal Biometric System Based on Hybrid Level Fusion," 2018 41st
International Conference on Telecommunications and Signal Processing (TSP), Athens, 2018, pp. 1-5, doi: 10.1109/TSP.2018.8441279.
4. K. Meng, Z. Huang, X. Wang and K. Wang, "Multimodal Biometric Verification Using Sparse Representation Based Classification,"
2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC), Chongqing, 2018, pp. 26-31, doi: 10.1109/ICIVC.2018.8492886.
5. P. Jayapriya and R. Manimegalai, "Finger Knuckle Biometric Authentication using Texture-Based Statistical Approach," 2018
International Conference on Intelligent Computing and Communication for Smart World (I2C2SW), Erode, India, 2018, pp. 170-174, doi: 10.1109/I2C2SW45816.2018.8997143.
6. M. G. Gurubasavanna, S. Ulla Shariff, R. Mamatha and N. Sathisha, "Multimode authentication based Electronic voting Kiosk using
Raspberry Pi," 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on, Palladam, India, 2018, pp. 528-535, doi:
10.1109/I-SMAC.2018.8653726.
7. K. Ramesh, M. V. Prasad and K. Hemachandran, "Design and implementation of advanced ARM7 based biometric security system using wireless communication," 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, 2018, pp.
543-546, doi: 10.1109/ICISC.2018.8398859.
8. M. Hammad, Y. Liu, and K. Wang, ―Multimodal Biometric Authentication Systems Using Convolution Neural Network based on Different Level Fusion of ECG and Fingerprint,‖ IEEE Access, vol. 7, pp. 26527-26542, 2018.
9. S. Nakagawa, L. Wang, and S. Ohtsuka, ―Speaker identification and verification by combining MFCC and phase information,‖ IEEE
Trans. Audio Spe., vol. 20, no. 4, pp.1085-1095, 2012. 10. W. Yang, Z. Wang, and B. Zhang, ―Face recognition using adaptive local ternary patterns method,‖ Neurocomputing, vol. 213, pp.183-
190, 2016.
93.
Authors: Shrugal Varde, M.S.Panse
Paper Title: Stereo Vision-based Path Finder for Visually Impaired
Abstract: This paper introduces a novel electronic mobility aid for visually impaired users that helps them
navigate in any given environment and avoid knee level to head height obstacles. The mobility aid uses stereo
imaging system to capture the images of the area in front of the user. The processing unit generates a disparity
map and a segmentation algorithm extracts information about the relative distance of obstacles from the user.
This information is relayed to the user in simplified vibration pattern feedback to inform the user of the path to
be taken to avoid collision with the obstacle. Special hardware was designed to make the system portable and
cost effective.The mobility aid was validated on 55 visually impaired users. The subjects walked in a controlled
test environment with a varying number of obstacles placed in their path. The accuracy of the device to help the
user avoid obstacles and the average speed of walking of the user were determined. The results obtained were
satisfactory and the device has the potential for use in standalone mode as well as in conjunction with a white
cane and thus help visually impaired people counter mobility problems.
Keywords: visually impaired, stereo, mobility, disparity, navigation
References:
1. Global data on visually impairement. World Health Organization, 2010.
2. C. Jackson, ―Correspondence with Carroll L. Jackson, Executive Director of the Upshaw Institute for the Blind,‖, Available ftp.eecs.umich.edu/people/johannb/Carroll_Jackson_Letter.pdf, Aug.1995
3. I. Ulrich and J. Borenstein, "The GuideCane-applying mobile robot technologies to assist the visually impaired," in IEEE Transactions
on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol. 31, no. 2, pp. 131-136, March 2001. 4. K. Ito, M. Okamoto, J. Akita, T. Ono, I. Gyobu, T. Tagaki, T. Hoshi, and Y. Mishima, ―CyARM: An alternative aid device for blind
persons,‖ CHI '05 Extended Abstracts on Human Factors in Computing Systems, Portland, OR, Apr. 2–7, 2005, pp. 1483–1488.
5. S. Shoval, J. Borenstein and Y. Koren, "Mobile robot obstacle avoidance in a computerized travel aid for the blind," Proceedings of the 1994 IEEE International Conference on Robotics and Automation, San Diego, CA, USA, 1994, pp. 2023-2028 vol.3.
6. D. Aguerrevere, M. Choudhury, and A. Barreto, ―Portable 3D sound / sonar navigation system for blind individuals,‖ presented at the
2nd LACCEI Int. Latin Amer. Caribbean Conf. Eng. Technol. Miami, FL, Jun. 2–4 2004. 7. S. Meers and K. Ward, ―A substitute vision system for providing 3D perception and GPS navigation via electro-tactile stimulation,‖
presented at the 1st Int. Conf. Senor. Technology, Palmerston North, New Zealand, Nov. 21–23, 2005
8. L. A. Johnson and C. M. Higgins, "A Navigation Aid for the Blind Using Tactile-Visual Sensory Substitution," 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, New York, NY, 2006, pp. 6289-6292.
9. P. B. L. Meijer, "An experimental system for auditory image representations," in IEEE Transactions on Biomedical Engineering, vol.
39, no. 2, pp. 112-121, Feb. 1992. 10. J. L. Gonzalez-Mora, A. F. Rodriguez-Hernaindez, E. Burunat, F. Martin and M. A. Castellano, "Seeing the world by hearing: Virtual
Acoustic Space (VAS) a new space perception system for blind people.," 2006 2nd International Conference on Information &
Communication Technologies, Damascus, 2006, pp. 837-842. 11. S. Kammoun, G. Parseihian, O. Gutierrez, A. Brilhault, A. Serpa, M. Raynal, B. Oriola, M.J.-M. Macé, M. Auvray, M. Denis, S.J.
Thorpe, P. Truillet, B.F.G. Katz, C. Jouffrais, Navigation and space perception assistance for the visually impaired: The NAVIG
project,IRBM,Volume 33, Issue 2,2012,Pages 182-189.
556-561
94. Authors: Rohit B Kaliwal, Santosh L Deshpande
Paper Title: Efficiency of Probabilistic Network Model for Assessment in E-Learning System
Abstract: The knowledge acquirement by the learner is a major assignment of an E-Learning framework.
Evaluation is required in order to adapt knowledge resources and task to learner ability. Assessment provides
learner‘s an approach to evaluate the skills gained through the e-learning domain they are accessing. A
dissimilar method can be used to assess the information acquirement, such as probabilistic Bayesian Network
model. A Bayesian Network is a graphical representation of the probabilistic relationships of a complex system.
This network can be used for reasoning with uncertainty. Bayesian Network is the most challenging task in e-
learning system as learner evaluation model are an element of uncertainty. In this paper the current proposed
scheme is constructed on Bayesian Network to deduce the stage of knowledge possessed by the learner. It also
proposes type of assessment to identify the knowledge whatever the learner identifies. Throughout the
assessment, it can be performed by two approaches namely Sequential and Random. In Sequential approach,
questions can be displayed on the learner machine in sequential order. In Random approach, questions can be
displayed on the learner machine in random order. However, both have their inherent limitations. Questions that
are considered to be answered easily by the learner may also be presented to the learner who is not desirable.
This system determined on the illustration of Bayesian Network model and algorithm for inference about
learner‘s knowledge. The Bayesian Network model was efficiently implemented for three levels of learner called
Higher Learners (HL), Regular Learners (RL) and Irregular Learners (IL) for learner‘s assessment and was
successfully implemented with 81.1% of probabilities for learner‘s assessment.
Keywords: Assessment, Knowledge design, Bayesian Network (BN), Evaluation, E-Learning, Intelligent
Tutoring System (ITS)
References:
1. Carbonell, J.R, ―AI in CAI: an artificial intelligence approach to computer assisted instruction‖, IEEE transaction on Man. Machine System, pp.190–202, 1970.
2. R. Santhi, B. Priya, J.M. Nandhini, ―Review of intelligent tutoring systems using bayesian approach‖, 2013.
3. Radenkovic, B, ―Web portal for adaptive e-learning. Telecommunication in Modern Satellite Cable and Broadcasting Services (TELSIKS)‖, 10th International Conference, pp. 365 – 368, 2011.
4. Joseph Psotka, Sharon A. Mutter, ―Intelligent Tutoring Systems: Lessons Learned‖, Lawrence Erlbaum Associates, ISBN 0-8058-
0192–8, 1988. 5. Ramırez-Noriega, A. Juarez-Ramırez, R. Huertas, C. Martınez-Ramırez, Y, ―A Methodology for building Bayesian Networks for
Knowledge Representation in Intelligent Tutoring Systems‖, In: Congreso Internacional de Investigacion e Innovacion en Ingenierıa de
Software, pp. 124–133, 2015. 6. Millan E, Descal co, L. Castillo, G. Oliveira, P. Diogo S, ―Using Bayesian networks to improve knowledge assessment‖, Computers &
Education, pp.436–447, 2013.
7. Kammerdiner, ―A.: Bayesian networks Bayesian Networks‖, In: Floudas, C.A., Pardalos, P.M. (eds.) Encyclopedia of Optimization SE - 32, pp. 187–196. Springer US 2009.
8. Liu, Z., Wang H, ―A Modeling Method Based on Bayesian Networks in Intelligent Tutoring System Structure‖, pp. 967–972, 2007.
9. Srinivas. R. M, Dr. D.H. Rao, ―Application of Bayesian Networks for Learner Assessment in E-Learning Systems‖, International Journal of Computer Applications Volume 4 – No.4, pp. 0975 – 8887, July 2010.
10. Goguadze, G. Sosnovsky, S. Isotani, S., McLaren, B.M, ―Evaluating a Bayesian Student Model of Decimal Misconceptions‖, In:
Proceedings of the 4th International Conference on Educational Data Mining, 2011. 11. Torabi, R., Moradi, P., Khantaimoori, A.R, ―Predict Student Scores Using Bayesian Networks‖, Procedia - Social and Behavioral
Sciences, pp.4476–4480, 2012.
12. Mahbobe Bani Asad Askari, Mostafa Ghazizadeh Ahsaee, ―Bayesian network structure learning based on cuckoo search algorithm‖, 6th Iranian Joint Congress on Fuzzy and Intelligent Systems, 2018.
13. De Bruyn, E. Mostert, E. Van Schoor, ―Computer-based testing - The ideal tool to assess on the different levels of Bloom‘s taxonomy‖, 2011 14th International Conference on Interactive Collaborative Learning, ICL 2011 - 11th International Conference Virtual
University, VU‘11,September, pp.444–449, 2011.
14. Oktariani Nurul Pratiwi, Yenie Syukriyah, ―Question Classification for e-Learning Using Machine Learning Approach‖, International
Conference on ICT for Smart Society (ICISS), 2020.
15. J Pearl, ―Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference‖, Morgan Kaufmann, 1988. 16. Nazeeh Ghatasheh, ―Knowledge Level Assessment in e-Learning Systems Using Machine Learning and User Activity Analysis‖,
International Journal of Advanced Computer Science and Applications, Vol. 6, No. 4, 2015.
562-566
95.
Authors: Sk. Faruque Ahmed, Mohibul Khan, Nillohit Mukherjee
Paper Title: Synthesis and Optical Characterization of Carbon Nanofibers
Abstract: Radio frequency plasma enhanced chemical vapor deposition technique has been used to synthesized
graphitic carbon nanofibers thin films. Ni catalyst in thin film form used for the synthesis of carbon nanofibers.
The deposition temperature of the substrate has been varied from 500 - 600 0C. The morphology of the CNF
thin films changed with the variation of substrate temperature. The graphitic phase of the synthesized carbon
nanofibers has confirmed by X-ray diffraction patterns analyses. Field emission scanning electron microscopic
studies showed fibrous structure in the films. The length of the carbon nanofibers few micrometers and the
diameter range 300-400 nm. The different vibrational modes of carbon nanofibers analyzed using Fourier
transformed infrared spectroscopy measurements. Photoluminescence of the carbon nanofibers have also been
studied which showed a strong emission peak at 468 nm.
Keywords: Carbon nanofibers; RF-PECVD; XRD; FESEM; FTIR, Photoluminescence.
References:
1. H. W. Kroto, J. R. Heath, S. C. O‘Brien, R.F. Curl, R. E. Smalley, ―C60: Buckminsterfullerene‖ Nature, 354 (1985) 162-163
2. S Ijima, ―Helical microtubules of graphitic carbon‖, Nature, 354 (1991) 56-58.
3. A. G. Rinzler, J.H. Hafner, P. Nikolaev, L. Lou, S. G. Kim, D. Tomanek, P. Nordlander, D. T. Colbert, R. E. Smalley, ―Unraveling
567-570
Nanotubes: Field Emission from an Atomic Wire‖, Science, 269 (1995) 1550-1553.
4. S. Tatsuura, M. Furuki, Y. Sato, I. Iwasa, M. Tian, H. Mitsu, ―Semiconductor Carbon Nanotubes as Ultrafast Switching Materials for Optical Telecommunications‖, Adv. Mater., 15 (2003) 534-537.
5. K. Liu, Ph Avouris, R. Martel, W.K. Hsu, ―Electrical transport in doped multiwalled carbon nanotubes‖, Phys. Rev. B, 63 (2001)
161404 (R).
6. V. V. Simonyan, J. K. Johnson, ―Hydrogen storage in carbon nanotubes and graphitic nanofibers‖, J. Alloys and Comp., 330-332
(2002) 659-665.
7. Y. Y. Wei, G. Eres, ―Directed assembly of carbon nanotube electronic circuits,‖ Appl. Phys. Lett., 76 (2000) 3759. 8. N. Choi, T. Uchihashi, H. Nishijima, T. Ishida, W. Mizutani, S. Akita, Y. Nakayama, M. Ishikawa, H. Tokumoto, ―Atomic Force
Microscopy of Single-Walled Carbon Nanotubes Using Carbon Nanotube Tip‖, Jpn. J. Appl. Phys., 39 Part1 (2000) 3707.
9. N. Gupta, S. M. Gupta, S. K. Sharma, ―Carbon nanotubes: synthesis, properties and engineering applications‖, Carbon Letters, 29 (2019) 419-447.
10. Y. Ando, X. Zhao, ―Synthesis of Carbon Nanotubes by Arc Discharge method, New Diamond and frontier carbon technology‖, New
Diamond and Frontier Carbon Technology, 16 (2006) 123-137. 11. C. M. Chena, Y. M. Dai, J. G. Huan, J. M. Jehng, ―Intermetallic catalyst for carbon nanotubes (CNTs) growth by thermal chemical
vapor deposition method‖, Carbon, 44 (2006) 1808-1820.
12. Y. Matsumoto, M. T. Oe, M. Nakao, K. Kamimura, Y. Onuma, H. Matsushima, ―Preparation of carbon nanofibers by hot filament-assisted sputtering‖, Mater. Science and Eng. B, 74 (2000) 218-221.
13. S. Hondaa, K. Y. Leea , K. Fujimotoa , K. Tsujia , S. Ohkuraa , M. Katayamaa , T. Hiraob , K. Ouraa, ―Formation of carbon nanofiber
films by RF magnetron sputtering method‖, Physica B, 323 (2002) 347-349. 14. T. Ikunoa, J. T. Ryub, T. Oyamaa, S. Ohkuraa, Y. G. Baeka, S. Hondaa, M. Katayamaa, T. Hiraoc, K. Ouraa, ―Characterization of low
temperature growth carbon nanofibers synthesized by using plasma enhanced chemical vapor deposition‖, Vacuum, 66 (2002) 341-
345. 15. Sk. F. Ahmed, M. Khan, N. Mukherjee, ―Enhancement of Electrical Property of Carbon Nanotube by Silicon Incorporation‖
International Journal of Engineering and Advanced Technology, 10 (2020) 62-65.
16. T. Yanase, T. Miura, T. Shiratori, M. Weng, T. Nagahama, T. Shimada, ―Synthesis of Carbon Nanotubes by Plasma-Enhanced Chemical Vapor Deposition Using Fe1−xMnxO Nanoparticles as Catalysts: How Does the Catalytic Activity of Graphitization Affect the
Yields and Morphology‖, Journal of Carbon Research, 5 (2019) 46.
17. R. Seshadri, A. Govindaraj, N. H. Aiyer, R. Sen, G. N. Subbanna, A. R. Raju and C. N. R. Rao "Investigations of Carbon Nanotubes", Current Science, 66 (1994) 839-847.
18. JCPDS data file no. 00-013-0148.
19. C. Balazsi, Z. Konya, F. Weber, L. P. Biro, P. Arato, ―Preparation and characterization of carbon nanotube reinforced silicon nitride composites‖ Materials Science and Engineering C, 23 (2003) 1133-1167.
20. J. Jang, J. Bae, S. H. Yoon, ―A study on the effect of surface treatment of carbon nanotubes for liquid crystalline epoxide–carbon
nanotube composites‖ J. Mater. Chem. 13 (2003) 676-681. 21. C. Deeney, S. Wang, S. A. Belhout, A. Gowen, B. J. Rodriguez, G. Redmond, S. J. Quinn, ―Templated microwave synthesis of
luminescent carbon nanofibers‖ RSC Adv., 8 (2018) 12907-12917.
22. C. Li, G Shi, ―Carbon nanotube-based fluorescence sensors‖ J. of Photochemistry and Photobiology C: Photochemistry Reviews, 19 (2014) 20-34.
96.
Authors: Victor Alcántara Alza
Paper Title: Cyanide in salt bath Applied to ASTM A-517 Steel: Effects on Hardness, Wear and Microstructure
Abstract: The effects of the cyanide treatment (CN) in a salt bath at elevated temperatures on the hardness;
adhesive and abrasive wear; of ASTM A-517 steel, were investigated. For abrasive wear, 1‖ x 3‖ x 5/16"
samples were prepared according to ASTM G-65 standard. For adhesive wear, specimens wit ring-shaped: φ ext.
= 40 mm, φ int = 20 mm and 10 mm thick, according to ASTM G -77. The CN treatment was carried out, at high
temperatures: 800 – 850 – 900 – 950 °C, immersing the samples in a salt bath: 6% NaCN + 80% BaCl2 + 14%
NaCl before entering the muffle furnace, with soaking time of 3 hr. Hardness tests were performed on a
Rockwell Durometer taking measurements on the HRC scale. The adhesive wear tests were carried out on a
parallel lathe coupling the Amsler device, following the ASTM G-77 standard. The abrasive wear tests were
performed according to the ASTM G65 standard. Microscopy was done at the optical level. A maximum
hardness of 63.5 HRC was found in all samples, representing an increase of 11.3% with respect to the state of
supply (T&R). In abrasive wear, its value increased to 66%, compared to supply samples. The most suitable
microstructure is presented by cyanide samples at 850ºC, with a layer of compounds (hard layer) formed by:
massive cementite; tempered martensite and carbide. It is concluded that when applying cyanide to ASTM A-
517 steel, the hardness and wear properties are increased to optimal values, if the cyanide treatment (CN) is
carried out at 850 °C.
Keywords: Cyanide, adhesive wear, abrasive wear, wear steels, surface hardening
References:
1. M. Ferreira, ―Desgaste de Materiales – Introducción‖ [online]. Available:
2. https://docplayer.es/9344147-Desgaste-de-materiales.html
3. K. Hock, ―Wear Resistance of pernitrided hardcoated steels for tools and machine components‖. Elsevier Science Publishers, Amsterdam, 1996
4. T. Kumar, J. Ambulingam, M. Gopal, A. Rajadurai., ―Surface hardening of AISI 304, 316, 304l and 316l SS using cyanide free sa lt
bath nitriding process‖. International Symposium of Research Students on Materials Science and Engineering. December 2002-04
Chennai India.
5. B. Selcuk, R. Ipek, and B.M. Karami M., ―A study on friction and wear behaviour of carburized, carbonitrided and borided AISI 1020
and 5115 steels‖. Journal of Materials processing Technology. Vol 141, pp 189-196. 6. G.Wahl, ―Effect of carbonitriding schedules and subsequent oxidation on the properties of articles‖. VII International Congress on Heat
Treatment of Materials. Vol
7. 33, No 7, pp 487-490. 8. A. P Guliaev, ―Metalografía‖. 2º Edición. Editorial Mir, Moscú, 1983
9. G. J. Li, Q. Peng, C. Li, Y. Wang, J. Gao, S. Chenc, J. Wang and B. Shen (2008), ―Effect of DC plasma nitriding temperature on
microstructure and dry-sliding wear properties of 316L stainless steel‖. Journal of Surface Coatings. 202(12), pp: 2749-2754. 10. J. Suchanek and V. Kuklik,. (2009), ―Influence of heat and thermochemical on abrasion resistance of structural and tool steels‖. Wear,
vol 267, pp 2100-2108
571-580
11. S.P Ayodeji, T.E Abioye and S.O Olanrewaju; ―Investigation of Surface Hardness of Steels in Cyanide Salt Bath Heat Treatment
Process" IMECS 2011, March 16-18, 2011, Hong Kong, Vol II, ISBN: 978-988-19251-2-1 12. I. Hilerio, E. López, H. Jiménez, M.A. Barrón. (2006) ―Estudio del comportamiento del acero AISI 8620 en abrasion seca‖ Memorias
del XII congreso internacional anual de la SOMIM, México.
13. C. Bohórquez, (2007), Nitrocarburación austenítica de los aceros AISI/SAE 1020 y 8620 mediante el empleo de alcoholes y nitrurantes
líquidos, Universidad libre, Bogotá, colombia.‖8° congreso iberoamericano de Ing. Mecánica‖.
14. Z. Zhou, M. Dai, Z. Shen, J. Hu; A novel rapid D.C. salt bath nitrocarburizing technology, Vacuum 109 (2014) 144-147
15. DOI: http://dx.doi.org/10.1016/j.vacuum.2014.07.016 16. 13. A.P. García, G. Vargas, J. López; Evolución microestructural de la superficie del acero inoxidable AISI 304 L oxinitrocarburizado
en un baño de sal libre de cianuro y su potencial aplicación en colectores insolares, Surface & coatings Technology 353 (2018) 190-198
17. 14. Propiedades del Acero Antidesgaste CHRONIT T-1, Aceros Bohler del Perú, S.A. (2007). Available: 18. https://dokumen.tips/documents/propiedades-acero-chronit-t-1-400-y-chronit-t-1-500-plancha-antidesgaste.html (URL)
19. 15. Friction, Lubrication, and Wear Technology, ASM Handbook 1992, Vol. 18, International. USA
20. 16. K.H. Zum Gahr., Microstructure and wear of materials, Elsevier, Amsterdam, 80 – 350, 1987. 21. 17. M.A.L. Márquez, Diseño de una máquina tribológica para pruebas de desgaste abrasivo severo, Tesis de Maestría, SEPI ESIME
IPN, México, Febrero de 2002.
22. 18. N. P. Suh, Tribophysics, Edit. Prentice Hall, USA. 1986 23. 19. R. G. Bayer, Mechanical wear prediction and prevention, Edi. Marcel Dekker, 1994. USA
24. 20. I. Hutchings, P. Shipway, Tribology: Friction and wear of engineering materials, Second Edition, 2017. Ed. Elsevier
25. eBook ISBN: 9780081009512
97.
Authors: Edy Budiman, Andi Tejawati, Ummul Hairah
Paper Title: Bioinformatics Database Query Performance and Optimization
Abstract: Borneo bioinformatics portal test is a critical element of SQA and represents a comprehensive review
of specifications, design and coding. The test represents an abnormality in the development of the portal. A
series of tests systematically reveals several different types of errors. This study aims to evaluate the
performance and optimization of Borneo's Bioinformatics portal with a series test activities using the Web
Performance Optimization methodology. Testing query performance with measuring the response time and page
loading timings from the object relationship mapping (ORM) model Laravel PHP framework in offline and
online. For optimization, we set a pre-test and post-test scenario to evaluate the efficiency performance test
results. The results study found that the query relation model, parsing script (javaScript and CSS), service scale
and dimension images in the interaction process to the database are the dominant resources affecting the
performance of the Bioinformatics portal. Performance optimization through determining the appropriate query
relation model, minify and defer parsing script or combine images using CSS sprites to reduce scala image.
Keywords: Bioinformatics, query, database relationship, ORM.
References:
1. J. Y. Chen, J. V. Carlis, and N. Gao, ―A complex biological databases querying method,‖ Proceedings of the ACM Symposium on Applied Computing, vol. 1, no. March 2005, pp. 110–114, 2005, doi: 10.1145/1066677.1066708.
2. A. Messina, A. Fiannaca, L. La Paglia, M. La Rosa, and A. Urso, ―BioGraph: A web application and a graph database for querying and
analyzing bioinformatics resources,‖ BMC Systems Biology, 2018, doi: 10.1186/s12918-018-0616-4. 3. H. Haviluddin, E. Budiman, and N. F. Hidayat, ―A database integrated system based on SOAP web service,‖ TEM Journal, 2019, doi:
10.18421/TEM83-12.
4. A. Kalderimis et al., ―InterMine: Extensive web services for modern biology,‖ Nucleic Acids Research, 2014, doi: 10.1093/nar/gku301. 5. E. Budiman, N. Puspitasari, Haerullah, M. Jamil, M. Wati, and A. Saudek, ―Evaluation of the bioinformatics resource portal,‖ in
Proceedings - 2018 3rd International Conference on Information Technology, Information Systems and Electrical Engineering,
ICITISEE 2018, 2018, pp. 54–59, doi: 10.1109/ICITISEE.2018.8720973. 6. J. Chomicki and D. Toman, ―Temporal Databases,‖ in Foundations of Artificial Intelligence, Volume 1., L. V. M. Fisher, D. Gabbay,
Ed. Elsevier B.V., 2005, pp. 429–467.
7. P. Cybula, H. Kozankiewicz, K. Stencel, and K. Subieta, ―Optimization of distributed queries in grid via caching,‖ 2005, doi:
10.1007/11575863_58.
8. E. Budiman, N. Puspitasari, S. N. Alam, T. M. A. Akbar, Haeruddin, and D. Indra, ―Performance analysis of the resource loading time for borneo biodiversity information system,‖ 2018, doi: 10.1109/IAC.2018.8780515.
9. S. Wu, F. Li, S. Mehrotra, and B. C. Ooi, ―Query optimization for massively parallel data processing,‖ 2011, doi:
10.1145/2038916.2038928. 10. E. Budiman, N. Puspitasari, M. Wati, J. A. Widians, and Haviluddin, ―Web Performance Optimization Techniques for Biodiversity
Resource Portal,‖ Journal of Physics: Conference Series, vol. 1230, no. 1, 2019, doi: 10.1088/1742-6596/1230/1/012011.
11. L. Zamboulis, N. Martin, and A. Poulovassilis, ―Query performance evaluation of an architecture for fine-grained integration of heterogeneous grid data sources,‖ Future Generation Computer Systems, 2010, doi: 10.1016/j.future.2010.05.008.
12. E. Budiman and S. N. Alam, ―Database: Taxonomy of plants Nomenclature for borneo biodiversity information system,‖ 2018, doi:
10.1109/IAC.2017.8280642. 13. L. Caroprese, E. Zumpano, and E. Vocaturo, ―No SQL Database Management Systems for Big Data,‖ International Journal of
Engineering and Advanced Technology, vol. 9, no. 5, pp. 21–26, 2020, doi: 10.35940/ijeat.D9145.069520.
14. N. Puspitasari and E. Budiman, ―Evaluation of Borneo‘s Biodiversity Information System,‖ 2018 Electrical Power, Electronics, Communications, Controls and Informatics Seminar, EECCIS 2018, pp. 434–439, 2019, doi: 10.1109/EECCIS.2018.8692955.
15. N. K. Gundla and Z. Chen, ―Creating NoSQL Biological Databases with Ontologies for Query Relaxation,‖ 2016, doi:
10.1016/j.procs.2016.07.120.
16. N. Dengen, E. Budiman, J. A. Widians, M. Wati, U. Hairah, and M. Ugiarto, ―Biodiversity information system: Tropical rainforest
borneo and traditional knowledge ethnic of dayak,‖ Journal of Telecommunication, Electronic and Computer Engineering, vol. 10, no.
1–9, 2018. 17. E. Budiman, M. Jamil, U. Hairah, H. Jati, and Rosmasari, ―Eloquent object relational mapping models for biodiversity information
system,‖ in 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), Aug.
2017, vol. 2018-Janua, pp. 1–5, doi: 10.1109/CAIPT.2017.8320662. 18. U. Hairah, A. Tejawati, E. Budiman, and F. Agus, ―Borneo biodiversity: Exploring endemic tree species and wood characteristics,‖ in
Proceeding - 2017 3rd International Conference on Science in Information Technology: Theory and Application of IT for Education,
Industry and Society in Big Data Era, ICSITech 2017, 2017, vol. 2018-Janua, pp. 435–440, doi: 10.1109/ICSITech.2017.8257152. 19. L. A. Bultet et al., ―The SIB Swiss Institute of bioinformatics‘ resources: Focus on curated databases,‖ Nucleic Acids Research, vol. 44,
no. D1, pp. D27–D37, 2016, doi: 10.1093/nar/gkv1310.
581-588
20. M. Cannataro and P. Veltri, ―Bioinformatics web portals,‖ in Selected Readings on Database Technologies and Applications, 2008.
21. P. Artimo et al., ―ExPASy: SIB bioinformatics resource portal,‖ Nucleic Acids Research, 2012, doi: 10.1093/nar/gks400. 22. Haeruddin, H. Johan, U. Hairah, and E. Budiman, ―Ethnobotany database: Exploring diversity medicinal plants of Dayak Tribe
Borneo,‖ in International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 2017, vol. 2017-Decem,
doi: 10.1109/EECSI.2017.8239094.
23. J.-S. Varré, B. Schmidt, S. Janot, and M. Giraud, ―Manycore High-Performance Computing in Bioinformatics,‖ 2011.
24. P. D. Karp et al., ―A comparison of microbial genome web portals,‖ Frontiers in Microbiology. 2019, doi: 10.3389/fmicb.2019.00208.
25. W. W. Li et al., ―Building cyberinfrastructure for bioinformatics using service oriented architecture,‖ 2006, doi: 10.1109/ccgrid.2006.1630932.
26. E. Budiman and S. N. Alam, ―User perceptions of mobile internet services performance in borneo,‖ in 2017 Second International
Conference on Informatics and Computing (ICIC), Nov. 2017, vol. 2018-Janua, pp. 1–6, doi: 10.1109/IAC.2017.8280643. 27. S. Kaur, K. Kaur, and P. Kaur, ―An Empirical Performance Evaluation of Universities Website,‖ International Journal of Computer
Applications, 2016, doi: 10.5120/ijca2016910922.
28. D. E. Luna, L. F. Luna-Reyes, J. R. Gil-Garcia, and R. Sandoval-Almazán, ―Government web portals performance evaluation using data envelopment analysis,‖ 2011, doi: 10.1145/2037556.2037617.
29. D. google, ―About PageSpeed Insights,‖ developers.google.com. https://developers.google.com/speed/docs/insights/v5/.
30. Marcelduran, ―Web Performance Best Practices and Rules,‖ yslow.org. http://yslow.org/. 31. Carbon60, ―Recommendations,‖ gtmetrix.com. https://gtmetrix.com/recommendations.html (accessed Jun. 06, 2020).
32. marcelduran, ―YSlow Ruleset Matrix,‖ yslow.org. http://yslow.org/ruleset-matrix/.
33. Widjaja, Kekinian Keanekaragaman Hayati Indonesia 2014. 2014. 34. E. Budiman, N. Puspitasari, M. Wati, Haviluddin, and R. Rahim, ―Model Framework for Development of Biodiversity Information
Systems,‖ Journal of Physics: Conference Series, vol. 1230, no. 1, 2019, doi: 10.1088/1742-6596/1230/1/012012.
35. D. F. R. A. Cleary and L. DeVantier, ―Indonesia: Threats to the Country‘s Biodiversity,‖ Encyclopedia of Environmental Health, no. November 2017, pp. 622–632, 2011, doi: 10.1016/B978-0-444-52272-6.00504-3.
98.
Authors: D.B.Shanmugam, J.Dhilipan, A.Vignesh, T.Prabhu
Paper Title: Challenges in Data Quality and Complexity of Managing Data Quality Assessment in Big Data
Abstract: High Quality Data are the precondition for examining and making use of enormous facts and for
making sure the estimation of the facts. As of now, far reaching exam and research of price gauges and
satisfactory appraisal strategies for massive records are inadequate. To begin with, this paper abridges audits of
Data excellent studies. Second, this paper examines the records attributes of the enormous records condition,
presents high-quality difficulties appeared by large data, and defines a progressive facts exceptional shape from
the point of view of records clients. This system accommodates of big records best measurements, best
attributes, and best files. At long last, primarily based on this system, this paper builds a dynamic appraisal
technique for records exceptional. This technique has excellent expansibility and versatility and can address the
troubles of enormous facts fine appraisal. A few explores have verified that preserving up the character of
statistics is regularly recognized as hazardous, however at the equal time is considered as simple to effective
basic leadership in building aid the executives. Enormous data sources are exceptionally wide and statistics
structures are thoughts boggling. The facts got may additionally have satisfactory troubles, for example, facts
mistakes, lacking data, irregularities, commotion, and so forth. The motivation behind facts cleansing (facts
scouring) is to pick out and expel mistakes and irregularities from facts so as to decorate their quality.
Information cleansing may be separated into 4 examples dependent on usage techniques and degrees manual
execution, composing of splendid software programs, records cleaning inconsequential to specific software
fields, and taking care of the difficulty of a kind of explicit software area. In these 4 methodologies, the 1/3 has
terrific down to earth esteem and may be connected effectively.
Keywords: Total Data Quality Management, Data Quality Metrics, Data Quality Assessment,
References:
1. Almutiry, O., Wills, G., &Alwabel, A. (2013, June 24–26). Toward a framework for data quality in cloudbased health information system. Paper presented at the International Conference on Information Society (i-Society 2013).
2. Batini, C., &Scannapieco, M. (2016). Data and information quality: Dimensions, principles and techniques. Cham: Springer.
3. Eppler, M. J. (2006). Managing information quality: Increasing the value of information in knowledge intensive products and processes (2nd ed.). Berlin: Springer.
4. Katal, A., Wazid, M., &Goudar, R. (2013) Big Data: Issues, Challenges, Tools and Good Practices. Procedures of the 2013 Sixth
International Conference on Contemporary Computing, Noida: IEEE, pp 404–409. 5. McGilvray, D. (2008) Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information, California: Morgan
Kaufmann.
6. McGilvray, D. (2010) Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information, Beijing: Publishing House of Electronics Industry.
7. Meng, X. F., & Ci, X. (2013) Big Data Management: Concepts, Techniques and Challenges. Journal of Computer Research and
Development 50(1), pp 146–169. 8. Nature (2008) Big Data. Retrieved November 5, 2013 from the www.http://www.nature.com/ news/specials/bigdata/index.html.
9. Song, M., & Qin, Z. (2007) Reviews of Foreign Studies on Data Quality Management. Journal of Information2, pp 7–9.
10. Wang, H., & Zhu, W. M. (2007) Quality of Audit Data: A Perspective of Evidence. Journal of Nanjing University(Natural Sciences)
43(1), pp 29–34.
11. Wang, J. L., Li, H., & Wang, Q. (2010) Research on ISO 8000 Series Standards for Data Quality. Standard Science12, pp 44–46.
12. LavanyaBandla,Rajkumar Rajasekaran,JollyMasih,Twitter sentimental Analysis using Hadoop Eco System (2020), Xi'an JianzhuKejiDaxueXuebao/Journal of Xi'an University of Architecture & Technology, 10.37896/JXAT12.08/2747
13. Rajkumar Rajasekaran, Govinda k, Ashrith Reddy, Uday Sai Reddy, Yashwanth Reddy: Visual Analysis of Temperature Time Series
and Rainfall Using Big Data. DOI:10.36872/LEPI/V50I3/201023 14. Rajasekaran Rajkumar, Jolly Masih, K.Govinda: An analysis of mobile pass-codes in case of criminal investigations through social
network data. International Journal of Computers and Applications 09/2019, DOI:10.1080/1206212X.2019.1662169
589-593
99. Authors: Velmurugan. PS, Jyoti Ranjan Sahoo
Paper Title: Public Debt, Current Account Deficit and Economic Growth: A Study on Indian Context
Abstract: External debt and internal debt form main components of the public debt structure in India. India‘s
debt profile shows increasing external debt and simultaneously increasing the deficit in current account which
have impact on economic growth of India. Our study assesses the impact of India‘s Gross External Debt (GED),
Internal Debt (IND) and Current Account Deficit (CAD) on economic growth (GDP) by using time series data
from 1998-99 to 2018-19. We intend to find long-run as well as short run relationship between the variables with
the help of Eviews software. Stationarity of data is tested by considering Augmented Dickey-Fuller (ADF) test
statistics and used Johansen Co-integration test and Vector Error Correction Model (VECM). The result shows
co-integration among the variables with one equation. The result of VECM shows existence of long-run
relationship among the variables. But the study fails to find the short-run causality among the variables. The
results show external debt (GED), internal debt (IND), and Current Account Deficit (CAD) have negative and
statistically insignificant relationship with GDP. It shows increase in public debt and deficit in current account
results in decrease in GDP growth.
Keywords: External Debt, Internal Debt, GDP, Current Account, CAD, VECM, India
References:
1. Abubakar, A.B., Alagiriswamy, J. and Ahmad, S.I., International Journal of Research in Commerce, Economics and Management. 2. ALOYSIUS, C., 2016. AN EMPIRICAL STUDY OF THE IMPACT OF PUBLIC DEBT ON ECONOMIC GROWTH OF
INDIA (Doctoral dissertation, University of Madras Chennai).
3. Bal, D.P. and Rath, B.N., 2014. Public debt and economic growth in India: A reassessment. Economic Analysis and Policy, 44(3), pp.292-300.
4. Calderon, C.A., Chong, A. and Loayza, N.V., 2002. Determinants of current account deficits in developing countries. The BE Journal
of Macroeconomics, 2(1). 5. Chowdhury, A., 2001. External debt and growth in developing countries: a sensitivity and causal analysis. WIDER-Discussion Papers.
6. Coskun, A., 2010. Current account sustainability: post-2001 application of Turkey. (Unpublished master‘s thesis). Istanbul University,
Turkey. 7. Dhir, Sonia., 2017. Economic Growth, Public Debt and Public Expenditure in India- An Empirical Analysis. Aussie Sino Studies. v(3),
p.104.
8. Edo, S., Osadolor, N.E. and Dading, I.F., 2019. Growing external debt and declining export: The concurrent impediments in economic growth of Sub-Saharan African countries. International Economics.
9. Gomez-Gonzalez, P., 2019. Inflation-linked public debt in emerging economies. Journal of International Money and Finance, 93,
pp.313-334. 10. Ibhagui, O.W., 2018. External debt and current account adjustments: The role of trade openness. Cogent Economics & Finance, 6(1),
p.1446247.
11. Kaur, K., 2014. Time Series Analysis of Indian External Debt. Total Reserves and Economic Growth Rates: In International journal of scientific research, 3(4).
12. Mehta, B.M. and Kayumi, H.F., 2014. Effect of India‘s current account deficit on external debts and foreign exchange rates. IOSR
Journal Of Economics And Finance, 1(7), pp.54-65. 13. Murat, S., Hobikoğlu, E.H. and Dalyancı, L., 2014. Structure and sustainability of current account deficit in Turkish
economy. Procedia-Social and Behavioral Sciences, 150, pp.977-984.
14. Nyoni, T., Musisinyani, B. and Nyoni, M., 2017. The impact of current account deficits on economic growth in Zimbabwe. International journal for innovative research in multidisciplinary field, 3(8).
15. Putunoi, G.K. and Mutuku, C.M., 2013. Domestic debt and economic growth nexus in Kenya. Current Research Journal of Economic
Theory, 5(1), pp.1-10. 16. Qureshi, I. and Liaqat, Z., 2020. The long-term consequences of external debt: Revisiting the evidence and inspecting the mechanism
using panel VARs. Journal of Macroeconomics, 63, p.103184.
17. Rathnayake, A.S.K., 2020. Sustainability of the fiscal imbalance and public debt under fiscal policy asymmetries in Sri Lanka. Journal of Asian Economics, 66, p.101161.
18. Sahin, I.E. and Mucuk, M., 2014, July. The effect of current account deficit on economic growth: The case of Turkey. In Proceedings
of International Academic Conferences (No. 0301828). International Institute of Social and Economic Sciences.
19. Yurdakul, F. and Ucar, B., 2015. The relationship between current deficit and economic growth: An empirical study on
Turkey. Procedia Economics and Finance, 26, pp.101-108.
20. Yusuf, S. and Said, A.O., 2018. Public Debt and Economic Growth: Evidence from Tanzania. Journal of Economics, Management and Trade, pp.1-12.
594-601
100.
Authors: Yendluri Lohith JayaSurya , Yendluri Priya Yasaswini , Somepalli Saranya
Paper Title: Image Steganography
Abstract: Steganography is the practice of concealing a file, message, image, or video within another file,
message, image, or video. The advantage of steganography is that the intended secret message does not attract
attention to itself as an object of scrutiny. Steganography is concerned both with concealing the fact that a secret
message is being sent and its contents. The change is so subtle that someone who is not specially looking for it is
unlikely to notice the change. We intend to perform image steganography by designing a neural network that
prepares the secret jpg image and hides the prepared jpg image in a cover jpg image.
Keywords: steganography , neural network , jpg image
References:
1. Shumeet Baluja,Hiding Images in Plain Sight: Deep Steganography, 31st Conference on Neural Information Processing Systems(NIPS
2017), Long Beach, CA, USA. 2. Jessica Fridrich,Miroslav Goljan,and RuiDu.Detecting lsb steganography in color,and gray-scale images.IEEE multimedia, 8(4):2228,
2001.
3. Yinlong Qian, Jing Dong, Wei Wang, and Tieniu Tan. Deep learning for steganalysis via convolutional neuralnetworks.In SPIE/IST Electronic Imaging ,International Society for Optics and Photonics, 2015H.
4. Sabah Husien and Haitham Badi.Articial neural network for steganography.Neural Computing and Applications, 26(1):111116, 2015.
602-605
5. Robert Jaruek,Eva Volna,and Martin Kotyrba. Neural network approach to image steganography techniques.In Mendel 2015, pages
317327.Springer, 20 6. Georey E Hinton and Ruslan R Salakhutdinov.Reducing the dimensionality of data with neural networks.Science, 313(5786):504507,
2006.
101.
Authors: C Ankita, Supriya A, Bhagya R
Paper Title: Design and Simulation of millimeter wave Mylar based flexible Antenna for 5G wireless
Applications
Abstract: The millimeter wave (mm-wave) is expected to play a crucial role in providing broad frequency
bandwidth for large data transmission. The restrictions of wave propagation are anticipated to get eliminated in
mm-wave propagation through the assistance of antenna technologies. The higher frequency spectrum
prevalence of the 5G applications are likely to be dependent on a small advanced antenna technology. This paper
presents an antenna design which uses Mylar as substrate for the 5G wireless applications. The structure of the
antenna adopted here is of a T-shaped patch designed with ideal symmetrical slot structures. To increase the
bandwidth the idea of defective ground structure (DGS) is used. The antenna model discussed here shows a high
impedance bandwidth and a fair radiation pattern in the required direction with a maximum gain of 8.35dB at 28
GHz frequency. The proposed antenna is compared with the basic microstrip patch antenna which is designed at
low frequency to prove that the bandwidth is enhanced and so other parameters in the proposed antenna such
that it is suitable for mm-wave 5G wireless applications.
Keywords: Directivity, HFSS, microstrip patch antenna, millimeter waves, radiation pattern, return loss.
References:
1. Y.R.Li, B.Gao, X.Zhang and K.Huang, "Beam Management in Millimeter-Wave Communications for 5G and Beyond," in IEEE
Access, vol. 8, pp. 13282-13293, 2020.
2. M. Faisal, A. Gafur, S. Z. Rashid, M. O. Shawon, K. I. Hasan and M. B. Billah, "Return Loss and Gain Improvement for 5G Wireless Communication Based on Single Band Microstrip Square Patch Antenna," 2019 1st International Conference on Advances in Science,
Engineering and Robotics Technology (ICASERT), Dhaka, Bangladesh, 2019, pp. 1-5.
3. S. F. Jilani and A. Alomainy, "Millimetre-wave T-shaped MIMO antenna with defected ground structures for 5G cellular networks," in IET Microwaves, Antennas & Propagation, vol. 12, no. 5, pp. 672-677, 18 4 2018.
4. F. Al-Ogaili and R. M. Shubair, "Millimeter-wave mobile communications for 5G: Challenges and opportunities," 2016 IEEE
International Symposium on Antennas and Propagation (APSURSI), Fajardo, 2016, pp. 1003-1004. 5. M. M. Amir Faisal, M. Nabil and M. Kamruzzaman, "Design and Simulation of a Single Element High Gain Microstrip Patch Antenna
for 5G Wireless Communication," 2018 International Conference on Innovations in Science, Engineering and Technology (ICISET),
Chittagong, Bangladesh, 2018, pp. 290-293.
6. U.Farooq et al., "Design of a 1×4 CPW Microstrip Antenna Array on PET substrate for Biomedical Applications," 2019 IEEE
International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting, Atlanta, GA, USA, 2019, pp. 1345-
1346
606-610
102.
Authors: Joan Hazel V. Tiongson, Marifel Grace C. Kummer
Paper Title: Rural Health Unit Decision Support System with Mapping
Abstract: In this highly challenging and demanding world, presence of data and technology are overwhelming.
But at present, some institutions still engage in manual-type of operations like the Rural Health Unit of the
Municipality of Solano, Nueva Vizcaya. Problems, issues and challenges encountered by the unitin the delivery
of its medical servicesand the extent of compliance in ISO/IEC 25010 Software Quality Standards were
identified. And with the uncontrollable availability of data, these can be handled and treated using data mining
techniques to predict disease occurrences. In this study, the clustering and classification data mining techniques
were utilized in order to predict disease occurrences of every barangay of the municipality at a given time. An
efficient record management system along with a decision support system was developed to meet the challenges
of the unit. It mainly features the disease-occurrence mapping to assist physicians and other health professionals
in the unit in their decision-making tasks particularly in diagnosis, treatment and recommendations.In terms of
ISO/IEC 25010 Software Quality Standards, the system gained a ―very great extent‖ qualitative rating.
Keywords: Challenges, Clinical Decision Support System (CDSS), Data Mining, Electronic Medical Record
(EMR), Health Information Technology (HIT)
References:
1. Aguilar, Remo-tito. (nd). Disruptions in Health: Healthcare information technology in a limited resource community. Retrieved from
http://remomd.com/technology/disruptions-in-health-healthcare-information-technology-in-a-limited-resource-community.html
2. Allianz Care. (nd). Healthcare in the Philippines. Retrieved from https://www.allianzworldwidecare.com/en/support/view/national-healthcare-systems/healthcare-in-philippines/
3. Chapple, Mike. (2020). The Use of Classification in Data Mining. Retrieved from https://www.lifewire.com/classification-1019653
4. Dey, Monali and Siddharth Swarup Rautaray. (2014). Study and Analysis of Data Mining Algorithms for Healthcare Decision Support
System. Retrieved from https://pdfs.semanticscholar.org/d32e/c14e005d9907603d2e46daa1b68a9b63d95b.pdf
5. Estdale, John and Elli Georgiadou. (2018). Applying the ISO/IEC 25010 Quality Models to Software Product. Retrieved from
https://www.researchgate.net/publication/326896024_Applying_the_ISOIEC_25010_Quality_Models_to_Software_Product_25th_European_Conference_EuroSPI_2018_Bilbao_Spain_September_5-7_2018_Proceedings
6. Estinar, Aaron O. et. al. (2018). Pampanga‘s Barangay Health Information System (PBHIS): A Decision Support & Health Information
System for Rural Health Unit 1. Retrieved from https://www.dlsu.edu.ph/wp-content/uploads/pdf/conferences/research-congress-proceedings/2018/fnh-12.pdf
7. Garcia, Gabriel et. al. (2015). DiabeSys. Retrieved on from https://www.dlsu.edu.ph/wp-content/uploads/pdf/conferences/research-
congress-proceedings/2015/FNH/018FNH_Tangkeko_MS.pdf 8. Hicks, Joy. (2018). Benefits of Integrating an Electronic Health Record System. Retrieved on from
https://www.verywellhealth.com/benefits-of-integrating-electronic-health-records-2317142
611-616
9. Jones, Mila. (2018). HealthCare: How Technology Impacts The Healthcare Industry. Retrieved from
https://healthcareinamerica.us/healthcare-how-technology-impacts-the-healthcare-industry-b2ba6271c4b4 10. Kalyani, P. (2012). Approaches to Partition Medical Data using Clustering Algorithms. Retrieved from
https://pdfs.semanticscholar.org/82e1/22314dcbe9170e3f8fe9863737cc6f2237ec.pdf
11. Manca, Donna P. (2015). Do electronic medical records improve quality of care? Yes. Retrieved from
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4607324/
12. Manila Times. (2018). At a glance: The Philippine health care system. Retrieved from https://www.manilatimes.net/at-a-glance-the-
philippine-health-care-system/395117/ 13. Ogbuabor and Ugwoke. (2018). Clustering algorithm for a Healthcare dataset Using Silhouette Score Value. Retrieved from
https://aircconline.com/ijcsit/V10N2/10218ijcsit03.pdf
14. Peth, Linda. (2017). Why technology integration is essential in home health care. Retrieved from https://ndocsoftware.com/2017/07/technology-integration-essential-home-health-care/
15. Silitonga, Parasian. (2018). Clustering of Patient Disease Data by Using K-Means Clustering. Retrieved from
https://www.researchgate.net/publication/323772077_Clustering_of_Patient_Disease_Data_by_Using_K-Means_Clustering#fullTextFileContent
16. Triotree.com. (2019). Significance of IT in Healthcare. Retrieved from http://triotree.com/blog/significance-of-it-in-healthcare/
17. Venkatesan, E. and T. Velmurugan. (2015). Role of Classification Algorithms in Medical domain: A Survey. Retrieved from https://www.researchgate.net/publication/280858435_Role_of_Classification_Algorithms_in_Medical_domain_A_Survey
103.
Authors: Telesphore Tiendrebeogo, Cheick Yacouba Rachid Coulibaly, Maliki Badolo
Paper Title: Robust Formal Watermarking Model Based on the Hyperbolic Geometry for Image Security
Abstract: The digital revolution has led to an increase in the production and exchange of valuable digitized
documents across institutions, companies and the general public alike. Ensuring the authenticity, integrity and
ownership of these official or high-value documents is essential if they are to be considered useful. Digital
watermarking is a possible solution to this challenge as it has already been used for copyright protection, source
tracking, and video authentication to name just a few applications of its use. It also enables integrity protection,
which is of value for numerous documents types (e.g., official documents, medical images). In this paper, we
propose a new watermarking solution that is applicable to image watermarking and is based on hyperbolic
geometry. Our new solution builds upon existing work in geometrical watermarking.
Keywords: Watermarking Hyperbolic Geometry, Poincaré Disk Model, Hypercatadioptric Projection,
Cryptography, Image Processing
References:
1. B. Macq, P. R. Alface, M. Montanola, Applicability of watermarking for intellectual property rights protection in a 3d printing scenario, in: Proceedings of the 20th International Conference on 3D Web Technology, 2015, pp. 89–95.
doi:10.1145/2775292.2775313.
2. Y. Z., L. L., Digital image watermarking algorithms based on dual transform domain and self-recovery, International Journal on Smart Sensing and Intelligence Systems 8 (1) (2015) 199–219.
3. D. X., W. F., W. Y., F. Duan, C. L., W. H., Self-calibration of hybrid central catadioptric and perspective cameras, Computer Vision
and Image Understanding 116 (6) (2012) 715–729. 4. T. T., M. D., Virtual and consistent hyperbolic tree: A new structure for distributed database management, in: 3rd International
Conference on Networked Systems, Lecture Notes in Computer Science vol. 9466, 2015.
5. M. M., T. K., A cryptographic method for secure watermark detection, in: Information Hiding, Lecture Notes in Computer Science vol. 4473, 2006, pp. 26–41.
6. K. M., K. V., A survey on digital image watermarking and its techniques, International Journal of Signal Processing, Image Processing
and Pattern Recognition 8 (5) (2015) 145–150. 7. C. G., S. R., Y. K. R., Classification of watermarking based upon various parameters, International Journal of Computer Applications
& Information Technology 1 (2) (2012) 16–19.
8. Y. U., S. J.P., S. D., S. P.K., Different watermarking techniques & its applications: A review, International Journal of Scientific & Engineering Research 5 (4) (2014) 1288–1294.
9. D. P., K. K., A study on spatial and transform domain watermarking techniques, International Journal of Computer Applications 71 (14) (2013) 38–41.
10. N. K.D., D. D.S., Performance comparison of two hybrid techniques for image steganography in frequency domain, International
Journal of Inno- vative Research in Computer and Communication Engineering 3 (6) (2015) 68–74. 11. G. M., H. E.M., M. M., An improved image watermarking method in frequency domain, Journal of Applied Security Research 12 (2)
(2017) 260–275.
12. A. Y.B., T. I., D. N., B. M.S., Euclidean distance distortion based robust and blind mesh watermarking, International Journal of Interactive Multi-media and Artificial Intelligence 4 (2) (2016) 46–51.
13. H. O., S. W.M., Y. B. A. B., A. M.A., Public watermarking scheme for 3d laser scanned archeological models, in: IEEE Symposium
on Computers and Communications, 2012, pp. 382–389. 14. G.-J. L., K.-Y. Y., An improved double image digital watermarking scheme using the position property, Journal Multimedia Tools and
Applications 74 (17) (2015) 7261–7283.
15. S. B., S. L., Efficient descriptor for full and partial shape matching, Journal of Multimedia Tools and Applications 75 (6) (2016) 2989–3011.
16. K. Wang, G. Lavoué, F. Denis, A. Baskurt, Hierarchical watermarking ofsemiregular meshes based on wavelet transform, IEEE
TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 3 (4) (2008) 620–634. 17. S. S.S., Blind wavelet based watermarking technique for image authentication, International Journal of Advanced Research in
Computer Science 6(1) (2015) 127–131.
18. W. Y.H., M. S.D., Data hiding technique using audio watermarking, International Journal Of Engineering And Computer Science 4 (3) (2015) 11109–11112.
19. A. N., T. H., Pde based scheme for multi-modal medical image watermarking, International Journal BioMedical Engineering 14 (2015)
108–126. 20. B. L., S. H.I., A. M.B., Enhanced watermarking scheme for 3d mesh models, in: 7th International Conference on Information
Technology, 2015, pp. 612–619.
21. P. W., X. Hongling, W. L., S. Wenlong, Harris scale invariant corner detection algorithm based on the significant region, International Journal of Signal Processing, Image Processing and Pattern Recognition 9 (3) (2016) 413–420.
22. H.D., ―Foundations of geometry,thesis in mathematics‖, in: The Open Court Publishing Company, Univerty of G¨ottingen, 1950, p.
105. 23. M. P., Premiers principes de la métagéométrie ou géométrie générale, Revue néo-scolastique. 3ème année 1896 (10) (1896) 143–170.
617-627
24. T. S., Hyperbolic geometry: history, models, and axioms, U.U.D.M. Project Report (2004).
25. B. Y., Hyperbolic geometry tiling (08 2006). 26. T. T., A. D., M. D., Reliable and scalable distributed hash tables harnessing hyperbolic coordinates, in: IFIP International Conference
on New Technologies, Mobility and Security, 2012, pp. 1–6.
27. M. A., Un afficheur générique d‘arbres à l‘aide de la géométrie hyperbolique, Journées francophones des langages applicatifs (JFLA)
(2000).
28. B. A. F., M. D., The hyperbolic metric and geometric function theory, in: International Workshop on Quasiconformal Mappings And
Their Applications, 2006. 29. S. L. A catadioptric sensor withmultiple viewpoints, In Robotics and Autonomous Systems 51 (2005) 667–674.
30. B. S., N. S. K., A theory of single-viewpoint catadioptric image formation, International Journal of Computer Vision 35 (2) (1999) 1–
22. 31. B. D. A., Geometry (06 2002).
32. M. J., Vision stéréoscopique par ordinateur pour la détection et le suivi de cibles pour une application automobile, Ph.D. thesis, Institut
National Polytechnique de Grenoble (2008). 33. T. R., Suivi d‘objet pour la television interactive, Ph.D. thesis, Ecole TELECOM ParisTech (2008).
34. P. P., De l‘importance des points d‘int´erˆet et du maillage 2d, Ph.D. thesis, Institut National Polytechnique de Toulouse (2009).
35. B. J.P., General central projection systems : Modeling, calibration and visual servoing, Ph.D. thesis, University of Coimbra (2003). 36. C. F., D. K. C. C., S. O., étalonnage de caméras catadioptriques hyper-boloïdes, Traitement du signal:Vision omnidirectionnelle 22 (5)
(2005).
37. D. W., H. M.E., New directions in cryptography, IEEE Transactions on Information Theory 26 (6) (1976) 644–654. 38. J. D., P. K., The self-synchronizing stream cipher, Springer Lecture Notes in Computer Science 4986 (2008) 210–223.
39. D. R. L., An introduction to chaotic dynamical systems (04 1989).
40. B. I., V. P., G. J.-P., Continuous wavelet transform on the hyperboloid, Applied and Computational Harmonic Analysis 59 (2) (1975) 375–382.
41. S. L., Analyse: Topologie générale et analyse fonctionnelle, in: Hermann, 1970, p. 432.
42. J. Bahi, C. Guyeux, Hash functions using chaotic iterations, Journal of Algorithms and Computational Technology 4 (2) (2010) 167–181.
104.
Authors: Mohammed Salahuddin, R G Nauman Khan, Mohammed Moiz, Mohammed Tosif Ahmed
Paper Title: Seismic Assessment of R.C.C Frame Building using Pushover Analysis
Abstract: India is a making country with an arrangement of structure practices and social and money related
structure, which needs to build up its own special strategies for seismic danger appraisal. The latest decade has
shown our lack in peril decline programs, during the couple of hurting seismic quakes. In view of this quake
alone in India there was massive loss of life and property. After this troublesome adversity thought is by and by
being given to the appraisal of the adequacy of solidarity in structures to contradict strong ground developments.
After Bhuj seismic quake IS-1893 was revised and appropriated in the year 2002, going before this scene it was
refreshed in 1984. The code was first conveyed in 1962 as 'Recommendations for Earthquake Resistant Design
of Structure'. The central reason behind the loss of life and property was inadequacy of learning of direct of
structures during ground developments. The frailty of the structures against seismic development must be
fundamentally inspected. The most preferred strategy for seismic evaluation is Inelastic static assessment or
Pushover examination in view of its straightforwardness. Inelastic static examination frameworks join Capacity
Spectrum Method, Displacement Coefficient Method and the Secant Method. In this examination we are looking
over seismic execution of G+17 standard RCC structure. The structure has been surveyed using Pushover
Analysis.
Keywords: Pushover Analysis, Nonlinear Static investigation, Performance point, Capacity bend, Displacement,
Drift of stories, seismic zone, Etabs programming
References:
1. FEMA. NEHRP guidelines for the seismic rehabilitation of buildings (FEMA 273).Washington (DC): Building Seismic Safety
Council; 1997.
2. FEMA 356 NEHRP Pre standard and commentary for the seismic rehabilitation of buildings. (2000). 3. Chopra AK. Dynamics of structures: theory and applications to earthquake engineering. Englewood Cliffs, NJ. 1995.
4. R.Hasan (2002), ―Push-over analysis for performance-based seismic design‖ Computers and Structures 80 (2002) 2483-2493.
5. Erolkalkan (2007), ―Assessment of current nonlinear static procedures for seismic evaluation of buildings‖ , Engineering Structures 29 (2007) 305-316.
6. Dynamics of structures – Third edition - Anil k Chopra, Pearson Press. Earthquake resistance design of structure – Second Edition –
S.K Duggal, Oxford University press , New Delhi
628-634
105.
Authors: Najmu Nissa, Sanjay Jamwal, Shahid Mohammad
Paper Title: Early Detection of Cardiovascular Disease using Machine learning Techniques an Experimental
Study
Abstract: Human body prioritizes the heart as the second most important organ after the brain. Any disruption
in the heart ultimately leads to disruption of the entire body. Being the members of modern era, enormous
changes are happening to us on a daily basis that impact our lives in one way or the other. A major disease
among top five fatal diseases includes the heart disease which has been consuming lives worldwide. Therefore,
the prediction of this disease is of prime importance as it will enable one to take a proper and needful approach
at a proper time. Data mining and machine learning are taking out and refining of useful information from a
massive amount of data. It is a basic and primary process in defining and discovering useful information and
hidden patterns from databases. The flexibility and adaptability of optimization algorithms find its use in dealing
with complex non -linear problems. Machine Learning techniques find its use in medical sciences in solving real
health-related issues by early prediction and treatment of various diseases. In this paper, six machine learning
algorithms are used and then compared accordingly based on the evaluation of performance. Among all
classifiers, decision tree outperforms over the other algorithms with a testing accuracy of 97.29%.
635-641
Keywords: Heart Disease, Machine Learning Models, Python, Spyder.
References:
1. Babu, Sarath, ―Heart disease diagnosing using data mining technique.‖ Electronics Communication and Aerospace Technology
(ICECA),2017 International conference of vol.1.IEEE,2017
2. MissChaitrali S. Dangare, Dr.Mrs. SulabhaS.Apte, A data mining approach for prediction of heart disease using neural networks, international journal of computer engineering and technology, 2012.
3. https://www.statista.com/statistics/1108824/cardiovascular-as-cause-of-death-estimate-and-actual-worldwide/
4. Jayumin Patel, Prof.TejalUpadhyay, Dr.SamirPatel,‖Heart Disease Prediction Using Machine Learning and Data Mining Techniques ‖, IJCSC, vol 7.No 1-sept 2015-Mar 2016.
5. SonamNikahr, A. M.Karandikhar, "Prediction Of Heart Disease Using Machine Learning Algorithms", International Journal Of
Advanced Engineering, Management and Science, vol-2, June-2016. 6. SeyedaminPouriyeh, Sara Vahid, Giovanna Sannino,‖A Comprehensive Investigation and Comparison Of Machine Learning
Techniques In The Domain Of Heart Disease‖, 22nd IEEE symposium on computers and communication(ISCC 2017):workshop-
ICTS4EHealth 2017. 7. YounessKhourdifi, Mohamed Bahaj, ― Heart Disease Prediction and Classification Using Machine Learning Algorithms Optimized By
Particle Swarm Optimization and Ant Colony Optimization‖, international journal of intelligent engineering and systems, vol-12, No-
1,2019. 8. Mamta Alex P and Shaicy P Shaji,‖Prediction and diagnosis of heart disease patients using data mining techniques‖, International
Conference on Communication and Signal Processing, April 4-6,2019.
9. Anaconda Inc., ―Anaconda Distribution,‖ Anaconda, 2019, [Online]. Available: https://www.anaconda.com/distribution/ 10. Mythili T., Dev Mukherji, Nikita Padalia, and Abhiram Naidu,‖ A Heart Disease Prediction Model using SVM-Decision Trees-Logistic
Regression (SDL)‖, International Journal of Computer Applications (0975 – 8887) Volume 68– No.16, April 2013.
11. Larose,D.," Discovering knowledge in data: an introduction to data mining‘‘. New jersey: john wiley&sons, inc,2005. 12. Umair Shafique, Faiz Majeed, Haseeb Qaiser,and Irfan Ul Mustafa,‖Data Mining in Healthcare for Heart Disease‖, internationaljournal
of innovation and applied sciences, vol.10 No.4 Mar,2015,pp.1312-1322
13. https://encryptedtbn0.gstatic.com/images?q=tbn%3AANd9GcRb0oOWXHEXhRAdMH_YVV8nP6_HJEIda-gwYQ&usqp=CAU] 14. Umair Shafique, Faiz Majeed, Haseeb Qaiser, and Irfan Ul Mustafa,‖Data Mining in Healthcare for Heart Disease", internationaljornal
of innovation and applied sciences, vol.10 No.4 Mar 2015,pp.1312-1322.
15. https://www.analyticsvidhya.com/blog/wp-content/uploads/2014/10/ANN.png 16. GeorgeJonh and Pat Langley. ―Estimating continuousdistributions in Bayesian classifiers‖ in proceedings of the Eleventh Conference
On Uncertainty in Artificial Intelligence, Morgan Kaufman, pages 338-345,1995.
17. Umair Shafique, Faiz Majeed, Haseeb Qaiser, and Irfan Ul Mustafa,‖Data Mining in Healthcare for Heart Disease", internationaljornal of innovation and applied sciences, vol.10 No.4 Mar 2015,pp.1312-1322.
18. Sonam Nikhar and A.M. Karandikar,‖Prediction Of Heart Disease Using Machine Learning Algorithms‖, International Journal Of
Advanced Engineering, Management and Science, vol-2,issue-6, June-2016. 19. H.Benjamin Fedrick David and S. Antony Belcy, ―Heart Disease Prediction Using Data Mining Techniques‖
20. https://miro.medium.com/max/1170/1*58f1CZ8M4il0OZYg2oRN4w.png 21. D.K. Srivastava and L. Bhambhu, ―Data classification using support vector machine,‖ J.Theor.Appl.Info.Technol.,2009
22. A. A. Abdillah and Suwarno, ―Diagnosis of diabetes using support vector machines with radial basis function kernels,‖ Int. J. Technol.,
vol. 7, no. 5, pp. 849–858, 2016, DOI: 10.14716/ijtech.v7i5.1370.
106.
Authors: R.Sundaramoorthy, J.Justin Maria Hillary, S.R.Raja Balayanan, K.Kalidas, R.V.Rangarajan
Paper Title: Composite Wear Actions of Glass Fiber Reinforced Titanates Filled Epoxy Resin
Abstract: Glass fibre-reinforced polymer composites find numerous applications in today 's aggressive world
because of their different benefits such as high wear resistance, strength to weight ratio and low cost. Particle
fillers can be further enhanced with the added composite efficiency. Titanates are successfully used as polymer
filler to achieve this. A number of these short-glass epoxy composites and the study of their wear behavior are
included in current work. They are manufactured and characterized. It also outlines a technique for parametric
analysis of the sliding wear behavior, based on Taguchi‘s test-design approach.
Keywords: Polymer composites; Titanates; Epoxy; Wear test; Taguchi.
References:
1. Anisha Christy, Rajesh Purohit, R. S. Rana, (2017) ―Development and Analysis of Epoxy/nano SiO2 Polymer Matrix Composite fabricated by Ultrasonic Vibration assisted Processing‖, Materials Today Proceedings, Volume 4, pp. 2748–275.
2. Enqiu He, Shijie Wang, Yunlong Li, Quan Wang, (2017) ―Enhanced tribological properties of polymer composites by incorporation of
nano-SiO2 particles: A molecular dynamics simulation study‖ Computational Materials Science, Volume 134, pp. 93–99. 3. Prashanthakuamr H D, Bhanuprakash N, (2017) ―Friction and wear behaviour of polymer matrix composites – a review‖ International
Research Journal of Engineering and Technology (IRJET), Volume 04, pp. 988-991.
4. Zhongnan Wang, Derek G. Chetwynd, Ken Mao, (2018) ―Friction characteristics of polymers applicable to small-scale devices‖, Tribology International, S0301-679X (17)30550-9.
5. Yuanliang Zhao, XiaowenQi, YuDong, JianMaa, Qinglong Zhang, Laizhou Song, YulinYang, Qingxiang Yang, (2016) ―Mechanical,
thermal and tribologicl properties of polyimide/nano- SiO2 composites synthesized using an in-situ polymerization‖, Tribology International, Volume 103, pp. 599–608.
6. T.Madhsudhan, M. Senthilkumar, Athith D.(2016) ―Mechanical characteristics and tribological behaviour study on natural - glass fiber
reinforced polymer hybrid composites: a review‖, International Research Journal of Engineering and Technology (IRJET), Volume 03,
Issue 04, pp. 2243-2246.
7. Andrey I. Dmitrieva Anton Yu nikonov, Wener Osterle, (2016) ― Multiscale modeling of low friction sliding behavior of a hybrid
epoxy matrix nanocomposite‖, Procedia Structural Integrity , Volume 2, pp. 2347-2354. 8. S. Basavarajappa , S. Ellangovan , K.V. Arun (2009) ―Study on dry sliding wear behaviour of Graphite filled glass–epoxy composites‖
Materials and Design, Volume30, pp. 2670–2675.
9. Peerapan Dittanet, Raymond A. Pearson (2012) ―Effect of silica nano particle size on toughening mechanisms of filled epoxy‖, Polymer, Volume 53, pp. 1890-1905.
10. M. Conradi, M. Zorko, (2013) ―Mechanical properties of epoxy composites reinforced with a low volume fraction of nanosilica
fillers‖, Materials Chemistry and Physics, Volume 137, pp. 910-915. 11. Sundaramoorthy R., Ravindran R.,(2018), ―Amalgamation of aluminium-Mg2Si alloys in various weight percentage and study of their
tensile and wear behaviors‖. Int. J. Additive and Subtractive Materials Manufacturing, vol.2, No.1,pp.45-60.
642-647
12. J Justin Maria Hillary , R Ramamoorthi, J Dixon Jim Joseph
and C Samson Jerold Samuel,(2020), ―A study on microstructural effect and mechanical behaviour of Al6061–5%SiC–TiB2 particulates reinforced hybrid metal matrix composites, Vol. 54(17) 2327–2337.
13. Sundaramoorthy R, Ravindran R, (2017), ‗Synthesis of Aluminum-Magnesium Silicide(Al-Mg2Si) Alloys and study of their
mechanical properties‘, Journal of Material Science and Surface Engineering, vol. 5, no. 2, pp. 533-536.
14. Mainak Sen, Pujan Sarkar, Nipu Modak, Prasanta Sahoo (2015) ―Woven E-glass Fiber Reinforced Epoxy Composite – Preparation and
Tribological Characterization‖, International Journal of Materials Chemistry and Physics, Vol. 1, pp. 189-197.
15. Kishore , P. Sampathkumaran , S. Seetharamu , S. Vynatheya , A. Murali , R.K. Kumar (2000),―SEM observations of the effects of velocity and load on the sliding wear characteristics of glass fabric–epoxy composites with different fillers‖ Wear, Volume 237, pp.
20–27.
16. Umanath K, 2011, ‗Friction and Wear Behavior of Al-6061 Alloy (SiCp + Al2O3) Hybrid Composites‘, International Journal of Engineering Science and Technology, vol. 3, pp. 5441-5451.
17. A.P. Harsha, Sanjeev Kumar Jha (2008) ―Erosive wear studies of epoxy-based composites at normal incidence‖ Wear, Volume 265,
pp. 1129–1135. 18. B. Suresha, G. Chandramohan, P. Samapthkumaran, S. Seetharamu and S. Vynatheya (2006), ―Friction and Wear Characteristics of
Carbon-epoxy and Glass-epoxy Woven Roving Fiber Composites‖. Journal of Reinforced Plastics and Composite, Volume 25, pp.
771-782. 19. N.Mohan, C.R.Mahesha, B.M.Rajaprakash (2013) ―Erosive wear behaviour of WC filled glass epoxy composites‖ Procedia
Engineering, Volume 68, pp. 694 – 702.
20. Sundaramoorthy R., Ravindran R.,(2019), ―Tool wear optimization in CNC milling operation of Al-Mg2Si alloys by Taguchi Method‖. SN Applied Sciences, vol.1, No.9, pp.1093.
21. S.S. Mahapatra, and A. Patnaik, (2006), Parametric Analysis and Optimization of Drilling of Metal Matrix Composites based
on the Taguchi Method, The International Journal for Manufacturing Science and Technology, vol. 8(1), pp. 5-12. 22. B. D, Agarwal L. J. Broutman (1990), Analysis and performance of fiber composites: Second Edition. John Wiley and Sons, Inc.
23. S.P. Glen, (1993). Taguchi methods: A hands on approach. Addison Wesley, New York.
107.
Authors: Romy Jun A. Sunico, Elwin S. Argana, Mark Anthony T. Golo, Maribel A. Aniňon
Paper Title: Vulca Loc: A Mobile Application for Finding Vulcanizing Shops embedding GPS
Abstract: This paper discusses the ideas and process of developing a mobile locator application for Vulcanizing
Shops in Siargao Island with Global Positioning System (GPS) and Google Map Application Programming
Interface (API). This mobile application is an innovation tool to show the location, availability and services of
the vehicle services shops available in the island to ease the hassle of the tourists with vehicle errors. It also
provides shortest possible route method that includes relevant information about the services of the shops. The
study adopts the Rapid Application Development model and used ISO 9126 to evaluate the application in terms
of usability (4.37), functionality (4.13) and Maintainability (4.20). Therefore, the application is certain to
provide a significant support to the local and foreign tourists; therefore, providing an accurate and hassle time-
free locating a vulcanizing shops
Keywords: API, GPS, RAD Model, Siargao, Vehicle Services Shop
References:
1. CNN Philippines, Best Asia Islands 2018, Available: http://cnnphilippines.com/lifestyle/2018/10/11/siargao-boracay-palawan-best-
asia-islands-2018.html
2. Beermann, Mattias, et al. "Locating position within enclosure." U.S. Patent No. 9,612,121. 4 Apr. 2017. 3. Leng, Limyen. ATM Locator Mobile Application. Diss. University Malaysia Pahang, 2012.
4. Ramos, Anna Liza A., et al. "E-Vision: A Campus Locator Map Mobile Application using A* Algorithm." International Journal of
Computer Science and Software Engineering 7.1 (2018): 6-11. 5. Basal, Ahmet, et al. "Effectiveness of mobile applications in vocabulary teaching." Contemporary Educational Technology 7.1 (2016):
47-59.
6. Shuib, Liyana, Shahaboddin Shamshirband, and Mohammad Hafiz Ismail. "A review of mobile pervasive learning: Applications and issues." Computers in Human Behavior 46 (2015): 239-244.
7. David G. Go Live! Mobile for the Nation’s Largest Telephone Locator Platform. 2017
648-652
108.
Authors: Anjali Dadhich, Blessy Thankachan
Paper Title: Design of NLP technique fore-customer review
Abstract: With the passage of time and the growth of ecommercea new web world needs to be built their users
can share their ideas and opinions differently domains.There are thousands of websites that sell these various
products. The quick growth in the number of reviews and their availability and the arrival of rich reviews for
rich products for sale online, the right choice for many products has been difficult for users. Consumers will
soon be able to verify the authenticity and quality of the products. What better way is there to ask people who
have already bought the product? That‘s where customer reviews come from. What‘s worse is the popular
products with thousands of updates — we don‘t have the time or the patience to read all of them thousands.
Therefore, our app simplifies this task by analysing and summarizing all the reviews that will help the user
determine what other consumers have experienced in purchasing this product. This function focuses on mining
updates from websites like Amazon, allowing the user to write freely to view. Automatically removes updates
from websites. It also uses algorithms such as the Naïve Bayes classifier, Logistic Regression and SentiWordNet
algorithm to classify reviews as good and bad reviews. Finally, we used quality metric parameters to measure
the performance of each algo.
Keywords: Sentiment Analysis, Naïve Bayes classifier, Logistic Regression, Senti Word Net, Opinion Mining.
References:
1. G.Angulakshmi, Dr.R.ManickaChezian, ―An Analysis on Opinion Mining: Techniques and Tools.‖ International Journal of Advanced
653-655
Research in Computer and Communication Engineering, Vol. 3, Issue 7, July 2014.
2. Callen Rain, ―Sentiment Analysis in Amazon Reviews Using Probabilistic Machine Learning‖, Swarthmore College Compter Society, November 2013
3. Weishu Hu, Zhiguo Gong, JingzhiGuo, ―Mining Product Features from Online Reviews‖IEEE International Conference on E-Business
Engineering, 2010.
4. PoojaKherwa, ArjitSachdeva, Dhruv Mahajan, ―An approach towards comprehensive sentimental data analysis and opinion mining‖.
IEEE International Advance Computing Conference (IACC), 2014.
5. Toqir Ahmad Rana, Yu-N Cheah, ―Hybrid Rule-Based Approach for Aspect Extraction and Categorization from Customer Reviews‖, 9th International Conference on IT in Asia (CITA'15), At Kuching, Sarawak, Malaysia, August 2015
6. Prashast Kumar, ArjitSachdeva, ―An approach towards feature specific opinion mining and sentimental analysis across e-commerce
websites‖. 5th International Conference- Confluence the Next Generation Information Technology Summit (Confluence), 2014. a. Hui Song, Jianfeng Chu, Yun Hu, Xiaoqiang Liu, ―Semantic Analysis and Implicit Target Extraction of Comments from E-commerce
Websites‖. Fourth World Congress on Software Engineering, 2013.
b. R. Piryani, D. Madhavi, V.K. Singh, ―Analytical mapping of opinion mining and sentiment analysis research during 2000-2015‖, Information Processing and Management, ScienceDirect, Elsevier 2016
c. Vidisha M. Pradhan, Jay Vala, Prem Balani, ―A Survey on Sentiment AnalysisAlgorithms for Opinion Mining‖, International Journal of
Computer Applications, Volume 133, No.9, January 2016 7. G. Sneka, CT. Vidhya, ―Algorithms for Opinion Mining and Sentiment Analysis: An Overview‖, International Journal of Advanced
Research in Computer Scinece and Software Engineering, Volume 6, Issue 2, February 2016
8. Neetu, ―Hierarchical classification of web content using Naïve Bayes approach‖,International Jouranal on Computer Science and Engineering (IJCSE), Vol. 5, No. 05, May 2013
a. Daniel Jurafsky, James H Martin, Chapter on ‖Logistic Regression – Speech and Language Processing‖, Standford University,
November 2016 b. Andrea Esuli, Fabrizio Sebastiani, ―SentiWordNet: A Publicly Available Lexial Resource for Opinion Mining‖, 5th Conference on
Lanuage Resources and Evaluation (LREC 2006), Genova, IT, 2006
c. Stefano Baccianella, Andrea Esuli, Fabrizio Sebastiani, ‖SentiWordNet 3.0: An Enhanced Lexical Resource for Sentiment Analysis and Opinion Mining‖ Proceedings of the 7th Conference on Language Resources and Evaluation (LREC 2010), Valletta, MT, 2010
109.
Authors: Noor Faisal Abas, Omosebi. Taiwo.O
Paper Title: Utilization of Pet Wastes Aggregate in Building Construction - A Review
Abstract: The rapid increase of plastics waste produced worldwide today poses a danger to human health
because of the pollution caused by the unsafe disposal and non-biodegradability of this waste combined with
toxic gas emissions during incineration. Globally, PET (polyethylene terephalate) is commonly used for bottling
water and other plastic containers. Recycling the waste would be an additional benefit. This study focuses some
researchers on the forms, methods of recycling and various literature applications of PET wastes. Recycled PET
can of course be used when combined with the sand aggregate to manufacture of various construction materials,
such as tiles, bricks, paving stones etc. This research focuses on its application as it attracts substantial building
materials such as the manufacture of various PET waste tiles and their unique mechanical , physical and
chemical properties; There are some important studies discussed in relation to PET waste, recycling methods ,
and results from the study. Even various applications are described here. Its usefulness is further defined as
roofing Composite concrete, floor tiling and other applications.
Keywords: polyethylene terephthalate; waste; recycling; aggregate; tile; etc.
References:
1. Suganthy, P., Chandrasekar, D., and Kumar, S.P.K. ―Utilization of pulverized plastic in cement concrete as fine aggregate" in
International Journal of Research in Engineering and Technology, (2013) 2(6), pp. 1015{1018}.
2. Foti, D. ―Use of recycled waste pet bottles fibers for the reinforcement of concrete" in Composite Structures, . (2013) 96, pp. 396{404}.
3. Ruiz-Herrero, J.L., Nieto, D.V., Lopez-Gil, A., Arranz, A., Fernandez, A., Lorenzana, A., and RodrguezPerez, M.A. ―Mechanical and
thermal performance of concrete and mortar cellular materials containing plastic waste" in Construction and Building Materials, (2016)
104, pp. 298{310}.
4. Sadiq, M.M. and Khattak, M.R. ―Literature review on differentplasticwastematerialsuseinconcrete" in Journal of Emerging Technologies and Innovative Research (JETIR), (2015) 2(6), pp. 1800{1803}.
5. Malak, K.R. ―Use of waste plastic in concrete mixture as aggregate replacement" in International Journal of Engineering, Education
and Technology (ARDIJEET), (2015) 3(2), pp. 1{7}. 6. Patil, P.S., Mali, J.R., Tapkire, G.V., and Kumavat, H.R. (2014) ―Innovative techniques of waste plastic used in concrete mixture" in
International Journal of Research in Engineering and Technology, (2014 3(9), pp.29{31}.
7. G. O. Bamigboye, B.U. Ngene, D. Ademola. J. k. Jolayemi ―Experimental Study on the Use of Waste Polyethylene Terephthalate (PET) and River Sand in Roof Tile Production‖ in International Conference on Engineering for Sustainable World, Journal of Physics:
Conference Series (2019) 1378 (042105).
8. T.M. Coelho, R. Castro 1, J.A. Gobbo Jr ―PET containers in Brazil: Opportunities and challenges of a logistics model for post-consumer waste recycling‖ in Resources, Conservation and Recycling (2011) 55, 291–299.
9. Ghernouti, Y., Rabehi, B., Bouziani, T., Ghezraoui, H., and Makhlou, A. ―Fresh and hardened properties of self-compacting concrete
containing plastic bag waste bers (WFSCC)" in Construction and Building Materials, (2015) 82, pp. 89{100}. 10. Virginija JANKAUSKAITĖ, Gintaras MACIJAUSKAS, Ramūnas LYGAITIS―Polyethylene Terephthalate Waste Recycling and
Application Possibilities: a Review in ISSN (2008) 1392–1320 MATERIALS SCIENCE (MEDŽIAGOTYRA). Vol. 14, No. 2.
11. 11. Nikles, D. E., Farahat, M. S.―New Motivation for the Depolymerization Products Derived from Poly(ethylene Terephthalate) (PET)
Waste‖: a Review Macromolecular Materials and Engineering (2005) 290: pp. 13 – 30.
12. FindLaw ―Points to Consider for the Use of Recycled Plastics in Food Packaging: Chemistry Considerations‖: U.S. Food and Drug
Administration, December 1992. Available from http://corporate.findlaw.com/(date of access May 2008). 13. US Patent 5876644. Food Quality Polyester Recycling, 1999.
14. Fisher, M. M.―Plastics Recycling. In: Plastics and Environment. Ed. by A. L. Andrady, John Wiley & Sons, 2003: pp. 563 – 627.
15. Gupta, V. B., Bashir, Z. ―PET Fibres Films, and Bottles‖ Handbook of Thermoplastic Polyesters. Ed. By Fakirov S. Vol. 1, Weinheim, Germany: Wiley-VCH,(2002) pp. 317 – 388.
16. Oldenburg, K. U. ―Changing the way, we think: cleaner production is simply being more efficient‖. Our planet. (1993) 5(3), 8-9.
17. Zhao, R., Torley, P., and Halley, P.J. ―Emerging biodegradable materials: starch-and protein-based bio Nano composites" in Journal of Materials Science, (2008) 43(9), pp. 3058{3071}.
18. 18 .http:/www.plastiseurope.org.
656-663
19. 19. Ruiz-Herrero, J.L., Nieto, D.V., Lopez-Gil, A., Arranz, A., Fernandez, A., Lorenzana, A., and RodrguezPerez, M.A.―Mechanical
and thermal performance of concrete and mortar cellular materials containing plastic waste" in Construction and Building Materials, (2016) 104, pp. 298{310}.
20. 20. Usman, M., Javaid, A., and Panchal, S. ―Feasibility of waste polythene bags in concrete" in International Journal of Engineering
Trends and Technology (IJETT), (2008) 23(6), pp. 317{319}.
21. 21. Marzouk OY, Dheilly RM, Queneudec M. ―Valorization of post-consumer waste plastic in cementations concrete composites‖ in
Waste Manage; (2007), 27(2):310–8. [15].
22. 22. Reis JML, Chianelli-Junior R, Cardoso JL, Marinho FJV. ―Effect of recycled PET in the fracture mechanics of polymer mortar‖. In Constr Build Mater; (2011) 25(6):2799–804. [16].
23. 23. Afshoon, I.,Sharif, Y., ―Ground Copper Slag as a supplementary Cementry material and its influence on the fresh properties of
selt-consolidating concrete IESJ.part A Civ. Struct. Eng. (2014) 7(4),229-242. 24. 24. Mohammed Jalaluddin J ―Use of plastic waste in civil constructions and innovative decorative material (eco-friendly)‖ in MOJ
Civil Eng. 2017;3(5):359‒368. DOI: 10.15406/mojce.2017.03.00082.
25. 25. EPA, ―Report on Plastics‖ (2003), USA. 26. 26. T.M. Coelho, R. Castro 1, J.A. Gobbo Jr ―PET containers in Brazil: Opportunities and challenges of a logistics model for post-
consumer waste recycling‖ in Resources Conservation and Recycling (2011) 55; 291–299.
27. 27. Foolmaun RK, Ramjeawon T. ―Life cycle assessment (LCA) of PET bottles and comparative LCA of three disposal options in Mauritius‖ in Journal Environment and Waste Management; (2008) 2(1/2):125–38.
28. 28. Diptikar Behera, Yirgalem Damtew, Aman Mola ―EXPERIMENTAL INVESTIGATION ON RECYCLING OF PLASTIC
WASTES AND BROKEN GLASS IN TO CONSTRUCTION MATERIAL‖ in IJCRT | Volume 6, Issue 1 January 2018 | ISSN: 2320-2882.
29. 29. Hannawi K, Kamali-Bernard S, Prince W. ―Physical and mechanical properties of mortars containing PET and PC waste
aggregates‖ in Waste Manage; 2019; 30(11):2312–20. [17]. 30. 30. Amano, M. ―PET bottle system in Sweden and Japan‖ an integrated analysis from a life-cycle perspective (2004), Lund, Sweden.
31. 31. Albano C, Camacho N, Hernandez M, Matheus A, Gutiérrez A. ―Influence of content and particle size of waste pet bottles on
concrete behavior at different w/c ratios‖ in Waste Manage; 2009: 29:2707–16. 32. 32. E. Rahmani , M. Dehestani , M.H.A. Beygi , H. Allahyari , I.M. Nikbin) ―On the mechanical properties of concrete containing
waste PET particles‖ in Construction and Building Materials (2013) 47: 1302–1308.
33. 33. Ayalon O, Avnimelech Y, Shechter M. ―Application of a comparative multidimensional LCA in solid waste management policy: the case of soft drink containers‖ in Journal of Environmental Science and Policy;(2000) 3(2–3):135–44
34. 34. Boustead I. ―Eco-profiles of the European plastics industry. Report 8: polyethylene terephthalate (PET)‖. Brussels: Association of
Plastic Manufacturers in Europe Technical and environmental Centre (1995). 35. 35. National association for PET container resources ―Report on post-consumer PET container recycling activity‖ 2000.
36. 36. American Society for Testing and Materials (ASTM C128). ―Standard Test Method for Density, Relative Density (Specific
Gravity), and Absorption of Fine Aggregate‖ in West Conshohocken, (2001). PA, USA. 37. 37. British Standard (BS EN ISO 604). Plastics-Determination of compressive properties. (1999), British Standard, United Kingdom.
38. 38. American Society for Testing and Materials (ASTM C29/C29M). Standard Test Method for Bulk Density (―Unit Weight‖) and
Voids in Aggregate. West Conshohocken, (2009) PA, USA. 39. 39. British Standard (BS EN ISO 62). ―Plastics-determination of water absorption‖ (1999) in British Standard, United Kingdom.
40. 40. Dinesh.S, Dinesh.A, Kirubakaran.K (2016) ―UTILISATION OF WASTE PLASTIC IN MANUFACTURING OF BRICKS AND PAVER BLOCKS‖ International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 11 No.3 © Research India
Publications; http/www.ripublication.com/ijaer.htm
41. 41. Mendes MR, Amaraki T, Hanaki K. ―Comparison of the environmental impact of incineration and landfilling in Sao Paulo city as determined by LCA. Journal Resources, Conservation and Recycling; (2004) 41(4):47–63.
42. 42. V. Mohan, S. Gayathri―Effective Utilization of Plastic Wastes in Tile Manufacturing: A step Towards Sustainability‖ in
International Journal of Science Research and Engineering Development—Volume 2issue 3, May-June 2019. 43. 43. Pagar S. R.,Panchamiya P. B., Bagul. K. P., Kale A. B.,―Effect of Plastic Waste on Tile By Using Thermosetting Method‖ in 6th
International Conference on Recent Trends in Engineering & Technology (ICRTET-2018).
44. 44. Ridham Dhawan, Brij Mohan Singh Bisht, Rajeev Kumar, Saroj Kumar, S.K.Dhawan,―Recycling of Plastic Waste into Tiles with reduced Flammability and Improved Tensile Strength‖ in Process Safety and Environmental Protection 124 (2019) 299-307.
45. 45. R. Saxena, T. Gupta, R.K. Shama, S. Chaudhary, and A. Jain, ―Assessment of mechanical and durability properties of concrete
containing PET waste‖ in Scientra Iranica .2020; 27 (1), 1-9. 46. 46. G. Siva Kumar Reddt, G. Javid Hussain, A. Muni Teja, P. Madhan Kumar, B. Hemanth Kumar, (2019)―Effect of Plastic Waste on
Tile by Using Thermosetting Method‖ in International Journal of Resaerch in Enginering, Science and Management Volume-2,Issue-
11, November-2019. 47. 47. Prof. T.S. VandaLI,Prof. M.R. Ingalagi, Mr Raghavendr Paste, Mr Akansh Patil, Mr. Prajwal G V.‖Design and Fabrication of
Composite Tile Maker Machine by Recycling of Plastics‖ in a Journal of Composition Theory Volume XII Issue VI JUNE 2019.
48. 48. P. O. Awoyera, A. Adesina,―Plastic Waste to c Construction Products: Status, Limitations and Future Perspective‖ in case studies in construction materials 2020; 12 e00330.
49. 49. Agunwamba, J.Waste: engineering and management tools, 2001;Immaculate publications, enugu
50. 50. Williams PT. ―Waste treatment and disposal‖ in Chisterter: (1998) Wiley. 51. 51. Pereira de Oliveira LA, Castro-Gomes JP. ―Physical and mechanical behavior of recycled PET fiber reinforced mortar‖ in Constr
Build Mater;2011; 25(4):1712–7.
52. 52. Frigione M. ‖Recycling of PET bottles as fine aggregate in concrete. Waste Manag;30(6):1101–6. [11] (2010). 53. 53. Choi YW, Moon DJ, Kim YJ, Lachemi M.―Characteristics of mortar and concrete containing fine aggregate manufactured from
recycled waste polyethylene terephthalate bottles‖ in Constr Build Mater; (2009)23(8):2829–35. [12]
54. 54. Choi YW, Moon DJ, Seung CJ, Cho SK. ‖Effects of waste PET bottles aggregate on the properties of concrete‖ in Cem Concr Res 2005;35(4):776–81. [13]
55. 55. Akçaozoglu S, Atis CD, Akçaozoglu K.―An investigation on the use of shredded waste PET bottles as aggregate in lightweight
concrete‖ in Waste Manage;2010; 30(2):285–90. [14] 56. 56. Denison R. A. ―Environmental lifecycle comparisons of recycling, landfilling, and incineration‖ a review of recent studies. Annual
Review of Energy and the Environment;1996; 21:191–237.
57. 57. Grant, T, James, KL, Lundie, S, Sonneveld, K. ―Life cycle assessment for paper and packaging‖ in waste management scenarios in Victoria; (2001) p. 2
58. 58. Grimberg E, Blauth P. Coleta Seletiva reciclando materiais, reciclando valores. São Paulo: Polis; 1998.
59. 59. Manzini E, Vezzoli C. O (2005)―desenvolvimento de produtos sustentáveis‖. São Paulo: Edusp; 2005 60. 60. Molgaard C. Environmental impacts by disposal of plastic from municipal solid waste. Journal Resources, Conservation and
Recycling 1995;15(1):51–63.
61. 61. Person, L, et al. Life cycle assessment of packaging systems for beer and soft drinks. Technical report 6: disposable PET bottles. Ministry of Environment and Energy, Denmark, Danish Environmental Protection Agency, Miljprojekt no. 405; 1998. p. 198.
62. 62. Perugini F, Mastellone ML, Umberto A. Environmental aspects of mechanical recycling of PE and PET: a life cycle assessment
study. Progress in Rubber, Plastics and Recycling Technology 2004;20(1):69–84 63. 63. Molgaard C. Environmental impacts by disposal of plastic from municipal solid waste. Journal Resources, Conservation and
Recycling 1995;15(1):51–63.
64. 64. Perugini F, Mastellone ML, Umberto A. Environmental aspects of mechanical recycling of PE and PET: a life cycle assessment
study. Progress in Rubber, Plastics and Recycling Technology 2004;20(1):69–84
65. 65. Diptikar Behera, Yirgalem Damtew, Aman Mola ―EXPERIMENTAL INVESTIGATION ON RECYCLING OF PLASTIC WASTES AND BROKEN GLASS IN TO CONSTRUCTION MATERIAL‖ in © 2018 IJCRT | Volume 6, Issue 1 January 2018 |
ISSN: 2320-2882.
66. 66. Prashant Kumar, Ranjit Kumar Yadav , Ravi Kumar , Shivangi Maury, Subodh Chand, Sudhir Yadav, Prof. (Dr.) V.K. Saini
―RECYLING OF WASTE PLASTIC USING EXTRUSION PROCESS‖ in IJARIIE-ISSN(O)-2395-4396
67. 67. Scheirs, J., 1998. Polymer Recycling: Science, Technology, and Applications. Wiley.
68. 68.. Hopewell, J., Dvorak, R., Kosior, E.,. Plastics recycling: challenges and opportunities. Philos. Trans. R. Soc. B-Biol. Sci. 2009; 364, pp 2115–2126.
69. 69. George, N., Kurian, T., Recent developments in the chemical recycling of postconsumer poly(ethylene terephthalate) waste. Ind.
Eng. Chem. Res.2014, 53, 14185–14198. 70. 70. Awaja, F., Pavel, D., 2005. Recycling of PET. Eur. Polymer J. 41, 1453–1477.
71. 71. Aguado, J., S, D.P. ―Feedstock Recycling of Plastic Waste., 1999.
72. 72. Al-Salem, S., Lettieri, P., Baeyens, J.,. Recycling and recovery routes of plastic solid waste (PSW): a review. Waste Manage. 2009a, 29, 2625–2643.
73. 73. Al-Salem, S., Lettieri, P., Baeyens, J.. Thermal treatment of different grades and types of Polyethylene (PE) wasted articles. In:
Proceedings of 8th World Congress of Chemical Engineering Montreal (Quebec), 2009b ,pp. 1–4. 74. 74. Al-Salem, S., Lettieri, P., Baeyens, J., 2010. The valorization of plastic solid waste (PSW) by primary to quaternary routes: from
re-use to energy and chemicals. Prog. Energy Combust. Sci. 36, 103–129.
75. 75. Scheirs, J., Kaminsky, W., 2006. Feedstock Recycling and Pyrolysis into Diesel and Other Fuels. 76. 76. Scheirs, J., Kaminsky, W., 2006b. Feedstock Recycling and Pyrolysis of Waste Plastics. John Wiley & Sons.
77. 77. R. Miandad, M.A. Barakat, Asad S. Aburiazaiza, M. Rehan b , I.M.I. Ismail b , A.S. Nizami ―Effect of plastic waste types on
pyrolysis liquid oil‖ in International Biodeterioration & Biodegradation 119 (2017) 239-252. 78. 78. American Society for Testing and Materials (ASTM C29/C29M). Standard Test Method for Bulk Density (―Unit Weight‖) and
Voids in Aggregate. West Conshohocken, 1997; PA, USA ]
79. 79. Alyamac, K. E, Tugrul, E ―A durable eco friend and aesthetic concrete work; marble concrete, in 11 th International Congress on Advance in Civil Engineering (ACE 2014), Vol. 50 pp 21-25.
80. 80. Afshoon, I.,Sharif, Y., ―Ground Copper Slag as a supplementary Cementry material and its influence on the fresh properties of selt-
consolidating concrete IESJ.part A Civ. Struct. Eng. 2014; 7(4),229-242. 81. 81. Al-jabri, K.S.,Al-Saidu, A.H. Taha, R. ―Effect of Copper Slag as a fine aggregate on the properties of cement mortars and concrete.
Const. Build. Mater. 2011, 25(2), 933-938.
82. 82. Ghafoori, N, Bucholc, J., ―Investigation of lignite based botton ash for structural concrete, J. Mater. Civ. Eng. .1996, 8(3), 128-137. 83. 83. Ghosi, A. Ghosi, A., Neogi, S., ―Reuse of fly ash and bottom ash in mortars with improved thermal conductivity performance for
buildings. Helijon 2018), 4(11), 00934.
84. 84. Gorai, B., Jana, R.K, (2003 ―Characteristic and utilization of copper slag- a review – Resourc. Conserv. Recycl. 2003, 39(4), 299-932.
85. 85. Guney, Y., Sari. Y. D., Yaldin, M., Tuncan, A. Donmez, S., ―Re-usage of waste foundry sand in high-strengh concrete waste
manag. 2010, 30(8-9), 1705-1713. 86. 86. Kurama, H. Kaya. M. ―Usage of coal combustion bottom ash in concrete mixture. Const. Build. Mater. 2008, 22(9: 1650-1663.
87. 87. Kim. H. K., Ha, K.A., Lee, HG.K., ―Internal Curing for high- strength mortar Const. Build. Mater.2016, 126, 1-8. 88. 88. Khanduri, A. Siddique, R. G―Properties of mortar incorporating waste foundry sand. Maters Dissertation, 2010, pp. 1-63.
89. 89. Khyaliya, R.K., Kabeer, K.S.A, Vyas. A.K., ―Evaluation of strength and durability of lean mortar mixes containing marble waste.
Constr. Build. Mater.2017, 147. 598-607. 90. 90. Eren. O., Marar. K.―Effects of limestone crusher dust and steel fibres on concrete. Constr. Build. Mater. 2009, 23(2), 981-988.
91. 91. Madheswaran, C.K. Ambily, P.S., Daratreya, J.K. Rajamane, N.P., ―Studies on use of copper slag as replacement material for river
sand in building constructions. J. Inst. Eng.: Series A 2014, 95(3), 169-177. 92. 92. Mailar. G., Sujay Raghavendra, N. Hiremath, D., Sreedhara, B.M., Manu, D.S., ―Sustainable Utilization of discarded foundry sand
and crushed brick masonry aggregate in the production of lightweight concrete Eng. Struct. Technol.2017, 9(1), 52-61.
93. 93. Mandal. A.K. Paramkusam, B.R. Sinha, O. P.―Fluidized bed combustion bottom ash: a better and alternative geo-material resource for construction waste manag. Res. 2018, 36(4), 351-360.
94. 94. Monosi. S., Sani, D., Tittarelli, F., ―Used foundary sand in cement mortars and concrete production. Open waste Manag. J. 2010,
3(1). 95. 95. Moon. H.Y., Choi. Y.W., Song. Y.K. Jeon. J. K.(2005) ―Fundamental properties of mortar and concrete using waste foundry sand .
J. Korea concr. Inst. 17(1), 141-147.
96. 96. Mu, O., Du, H., Zhoux, He. K., Lin, Z. Yan, F., Guo, R ―Performance of copper slag contained mortars after exposure to elevated temps. Constr. Build. Mater. 2018, 172, 378-386.
97. 97. Mubiayi. M. P., ―Characterisation of sand stones: mineralogy and physical properties in: 2014, proceedings of the world congress
on Engineering. 98. 98. Naik, T.R. Singh S. S., Ramme. B. W ―Performance and leading assessment of foldable slurry: J. Environ. Eng.2001, 127(4), 359-
368
99. 99. Oruji, S. Bake.,N. A. Gudru, R. K. Nalluri, L. Gunay-din- Sen. O., Khard, K. Ingran, E. Mitigation of ASR expansion in concrete using ultra-fine coal bottom ash, Constr. Build. Mater. 2019, 203. 814-824.
100. 100. OZ, D. Koca. S. Koca. H. ―Recycling of coal combustion waste, Watse Mabag. Res. 2009, 27(3), 267-273.
101. 101. Prabhu. G. G. Hyun. J. H. Kim. Y. Y. ―Effects of foundary sand as a fine aggregate in concrete production. Constr. Build. Mater, 2014, 70, 514-521
102. 102. Ratielzonooz, M., Mirza, J., Sahim, M. R. Husin, M.W., Khankhje, E. ―Investigation of coal bottom ash and fly ash in concrete as
replacement for sand and cement. Constr. Build. Mater 2016, 116. 15-24. 103. 103. Rajaasekar, A. Amnachalam. K. Kottaisany. M. ―Assessment of strength and durability characteristics of the fine aggregate in
mansonry mortar. Arabian. J Sci. Eng. 2019, 39 (2), 737-745.
104. 104. Ramzi, N. I.R., Shahidan, S., Maarof. M. Z., Ali. N ―Physical and chemical properties of coal bottom ash (CBA) from Tanjuma Bin Power Plant. In IOD Conference series: Materials Science and Engineering Vol. 160. IOP Publishing p. 2016, 12056.1.
105. 105. Ramodoss . P. Sundrarajar, T., ―Utilization of Ignite based bottom ash as partial replacement of fine aggregate in mansory mortar,
Arabian J. Sci. Eng. 2014, 39 (2), 737-745. 106. 106. Siddique, R. ―Compressive strength, water absorption, sorptivity, abrasion resiustance and permeability of self-compacting
concrete containing coal bottom ash, Constr. Build. Mater. 2013, 47, 1444-1450
107. 107. Singh, G., SI=iddique, R ―Effect of waste foundary sand (wfs) as partial replacement of sand on the strength, ultrasonic pulse velocity and permeability of concrete. Constr. Build. Mater. 2012, 26 (1), 416-422.
108. 108. Zain, M. F.M., Islam, M.N. Raduri. S.S. Yap. S. G. ―Cement- based solidification for the safe disposal of blasted copper slag,
cement Concr. Compos. 2004, 26(7), 845-851. 109. 109. Yoon, J. Y., Lee J. Y. Kim. J. H. ―Use of raw- state bottom ash for aggregates in construction materials. J. Mater. Cycle waste
Manag.2019, 1-12.
110. 110. Jarusiripot. C., ―Removal of reactive dye by absorption over chemical pre-treatment coal based bottom ash . Procedia Chem. 2014, 9. 121-130.
111. 111. Cevik. S. Mutuk. T, Oktay. B. M. Demirbas. A.k. Mechanical and Micro structural characterization of cement mortars prepared by
waste foundry sand (wfs). J. Aust. Ceram. Soc. 2017, 53(2), 829-837.
112. Mohammed Jalaluddin J ―Use of plastic waste in civil constructions and innovative decorative material (eco-friendly)‖ in MOJ Civil
Eng. 2017;3(5):359‒368. DOI: 10.15406/mojce.2017.03.00082.
110.
Authors: M Laxmidevi Ramanaiah
Paper Title: Multi-Objective Grey Wolf Optimization for Optimal Allocation of Distributed Generators in
Distribution Networks
Abstract: The power loss in the radial distribution network is appreciable as compared to transmission network.
To reduce the power loss in distribution network which is radial in nature, the solution methodology adopted in
this paper is optimal placement of distributed generators (DG). The optimization incorporated is Multi-objective
Grey Wolf Optimization (MOGWO). The optimization is accomplished for three different cases. In each case
two objective functions are simultaneously optimized to obtain non-dominated solutions using Multi-objective
Grey Wolf Optimization. Case (1): To minimize the real power loss and maximize the savings obtained due to
DG installation. Case (2): To minimize real power loss and maximum voltage deviation in the network. Case
(3): To minimize real power loss and rating of DG installed. MOGWO method maintains an archive which
contains pareto-optimal solutions. The archive mimics the behaviour of grey wolves. MOGWO method is
verified on radial distribution networks. The effectiveness of the optimization method is proven by comparing
the results with other optimization methods available in the literature.
Keywords: Distributed Generators, Multi-objective Grey Wolf Optimization, Real Power Loss, Savings,
Voltage deviation.
References:
1. W. L. Theo, J. S. Lim, W. S. Ho, H. Hashim, and C. T. Lee, ―Review of distributed generation (DG) system planning and optimisation
techniques: Comparison of numerical and mathematical modelling methods,‖ Renewable and Sustainable Energy Reviews, vol. 67, pp. 531–573, 2017.
A. M. El-Zonkoly, ―Optimal placement of multi-distributed generation units including different load models using particle swarm optimization,‖ Swarm and Evolutionary Computation, vol. 1, no. 1, pp. 50–59, 2011.
2. F. S. Abu-Mouti and M. E. El-Hawary, ―Optimal distributed generation allocation and sizing in distribution systems via artificial bee
colony algorithm,‖ IEEE Transactions on Power Delivery, vol. 26, no. 4, pp. 2090–2101, 2011. 3. R. Varikuti and D. M. D. Reddy, ―Optimal Placement of DG Units Using Fuzzy and Real Coded Genetic Algorithm,‖ Journal of
Theoretical and Applied Information Technology, pp. 145–151, 2009.
4. D. Q. Hung and N. Mithulananthan, ―Multiple distributed generator placement in primary distribution networks for loss reduction,‖ IEEE Transactions on Industrial Electronics, vol. 60, no. 4, pp. 1700–1708, 2013.
5. B. Mohanty and S. Tripathy, ―A teaching learning based optimization technique for optimal location and size of DG in distribution
network,‖ Journal of Electrical Systems and Information Technology, vol. 3, no. 1, pp. 33–44, 2016. 6. K. Nekooei, M. M. Farsangi, H. Nezamabadi-Pour, and K. Y. Lee, ―An improved multi-objective harmony search for optimal
placement of DGs in distribution systems,‖ IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 557–567, 2013.
7. P. S. Georgilakis and N. D. Hatziargyriou, ―A review of power distribution planning in the modern power systems era: Models, methods and future research,‖ Electric Power Systems Research, vol. 121, pp. 89–100, 2015.
8. D. Rama Prabha and T. Jayabarathi, ―Optimal placement and sizing of multiple distributed generating units in distribution networks by
invasive weed optimization algorithm,‖ Ain Shams Engineering Journal, vol. 7, no. 2, pp. 683–694, 2016. 9. S.Kansal, V. Kumar, and B. Tyagi, ―Hybrid approach for optimal placement of multiple DGs of multiple types in distribution
networks,‖ International Journal of Electrical Power and Energy Systems, vol. 75, no. October, pp. 226–235, 2016.
10. S. Ganguly and D. Samajpati, ―Distributed generation allocation on radial distribution networks under uncertainties of load and generation using genetic algorithm,‖ IEEE Transactions on Sustainable Energy, vol. 6, no. 3, pp. 688–697, 2015.
11. S.Kansal, B. Tyagi, and V. Kumar, ―Cost–benefit analysis for optimal distributed generation placement in distribution systems,‖
International Journal of Ambient Energy, vol. 38, no. 1, pp. 45–54, 2017. 12. M. Laxmidevi Ramanaiah and M. D. Reddy, ―Optimal Unified Power Quality Conditioner Allocation in Distribution Systems for Loss
Minimization using Grey Wolf Optimization,‖ International Journal of Engineering Research and Applications, vol. 7, no. 11, pp. 48–
53, 2017. 13. S. Mirjalili, S. M. Mirjalili, and A. Lewis, ―Grey Wolf Optimizer,‖ Advances in Engineering Software, vol. 69, pp. 46–61, 2014.
14. S. Mirjalili, S. Saremi, S. M. Mirjalili, and L. D. S. Coelho, ―Multi-objective grey wolf optimizer: A novel algorithm for multi-criterion
optimization,‖ Expert Systems with Applications, vol. 47, pp. 106–119, 2016. 15. M. E. Baran and F. F. Wu, ―Network reconfiguration in distribution systems for loss reduction and load balancing,‖ IEEE Transactions
on Power Delivery, vol. 4, no. 2, pp. 1401–1407, 1989.
16. M. E. Baran and F. F. Wu, ―Optimal capacitor placement on radial distribution systems,‖ IEEE Transactions on Power Delivery, vol. 4, no. 1, pp. 725–734, 1989.
17. M.Laxmidevi Ramanaiah and Dr. M. Damodar Reddy, ―Performance of Unified Power Quality Conditioner in radial distribution
networks using Particle Swarm Optimization Method,‖ International Journal of Applied Engineering Research, vol. 12, no. 24, pp. 14718-14726, 2017.
664-670
111.
Authors: Deepthi Chamkur V, C R Byrareddy
Paper Title: Heptagonal Shaped UWB Antenna with DGS for Wireless LTE with Enhanced Bandwidth
Abstract: The paper discusses about the implementation of Heptagonal shaped compact ultra-wideband planar
Microstrip patch antenna with and without defected ground plane structure (DGS) with analysis of various
parameters like return loss, VSWR bandwidth etc. A substrate made up of dielectric constant FR4 epoxy is
utilized and the 2D and 3D radiation pattern are also discussed. DGS has helped to fine tune and increase the
bandwidth & its effects have been studied. A volume of 28x32x1.7 (1523.2 mm^3) is occupied by the size of
antenna with dielectric constant of εr = 4.4, tanδ= 0.02. In order to provide fine tuning in the return loss graph, a
50Ω line with width of W=3mm direct line feeding method has been used for the micro-strip line and slots have
been introduced in the ground plane structure, for achieving the good bandwidth coupling between the slots
plays an important role. The antenna parameters including VSWR, Gain and return losses v/s frequency effects
for the antenna with variation of slots and dimensions has been studied in this paper along with the analysis of
important parameters such as return loss (dB), bandwidth, VSWR (Voltage Standing Wave Ratio) of patch
antenna which has been performed using Ansoft HFSS v15 tool. The proposed design of the heptagonal shaped
671-677
antenna operates as an ultra-wide band antenna ranging from 3.20 GHz to 10 GHz and beyond covering most of
applications from LTE, Wimax (3.5/5.55GHz), Radio altimeter, RFID and ISM WLAN 5.2/5.8GHz etc.
Keywords: Microstrip Patch, heptagonal, defected ground structure, VSWR, 2D and 3D patterns, HFSS,
Wireless
References:
1. Deepthi Chamkur V, C R Byrareddy, Saleem Ulla Shariff, ―Split-ground Compact Ultra-wide Band Patch Antenna for Wireless
LTE/UMTS Operations", International Journal of Recent Technology and Engineering, 2019. DOI: 10.35940/ijrte.C5497.098319 2. T Kshitija, S Ramakrishna, Suhas B Shirol, Priyatam Kumar. "Micro - Strip Patch Antenna Using Various Types of Feeding
Techniques: An Implementation", 2019 International Conference on Intelligent Sustainable Systems (ICISS), 2019
3. Mst. Dilshad Jahan, Chinmoy Das, Nayan Sarker. "Design & Analysis of a Micro-strip Patch Antenna for RFID, WiMAX and X-band Applications", 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT),
2019 4. Chen Jing Zhang,Mei Song Tong,"A Multiband LTE Antenna with Resonant Rings"
5. W. T. Li, Y. Q. Hei, W. Feng and X. W. Shi, "Planar Antenna for 3G/Bluetooth/WiMAX and UWB Applications With Dual Band-
Notched Characteristics," in IEEE Antennas and Wireless Propagation Letters, vol. 11, pp. 61-64, 2012. 6. L. Dang, Z. Y. Lei, Y. J. Xie, G. L. Ning and J. Fan, "A Compact Microstrip Slot Triple-Band Antenna for WLAN/WiMAX
Applications," in IEEE Antennas and Wireless Propagation Letters, vol. 9, pp. 1178-1181, 2010.
7. C. A. Balanis, ―Antenna Theory: Analysis and Design‖,1997 by John Wiley & Sons, Inc. 8. R. Garg, P. Bhartia, I. Bahl, A. Ittipiboon, ―Microstrip Antenna Design Handbook‖, ARTECH HOUSE, Boston 2001.
9. Chao-Ming Wu, Yung-Lun Chen, and Wen-Chung Liu, ―A Compact Ultrawideband Slotted Patch Antenna for Wireless USB Dongle
Application‖, IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS, VOL. 11, 2012. DOI: https://doi.org/10.1109/LAWP.2012.2202366
10. Farnaz Mirza mohammadi, Javad Nourinia and Changiz Ghobadi, "A Novel Dual-Wideband Monopole-Like Microstrip Antenna with
Controllable Frequency Response ", 'IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS, VOL. 11, 2012 289. DOI: https://doi.org/10.1109/LAWP.2012.2190130
11. Help Share Ideas website, http;//www.helpshareideas.com
12. Intelligent Data Communication Technologies and Internet of Things", Springer Science and Business Media LLC, 2020 13. Ansoft HFSS (High Frequency Structure Simulation) V-15 tool used, HFSS user manual, Ansoft Corporation, USA.
14. Pozar, David M., Microwave Engineering, Second Edition, Wiley, New York 1998.
15. Sigmaplot and Microsoft excel Software. 16. Biao Li, Ying-Zeng Yin, Wei Hu, YangDing and Yang Zhao, ―Wideband Dual-Polarized Patch Antenna With Low Cross Polarization
and High Isolation‖, IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS, VOL. 11, 2012 427. DOI:
https://doi.org/10.1109/LAWP.2012.2195149
112.
Authors: Heet Savla, Vruddhi Mehta, Ramchandra Mangrulkar
Paper Title: Prediction and Diagnosis of COVID-19 using Machine Learning Algorithms
Abstract: The world is reworking in a digital era. However, the field of medicine was quite repulsive to
technology. Recently, the advent of newer technologies like machine learning has catalyzed its adoption into
healthcare. The blending of technology and medicine is facilitating a wealth of innovation that continues to
improve lives. With the realm of possibility, machine learning is discovering various trends in a dataset and it is
globally practiced in various medical conditions to predict the results, diagnose, analyze, treat, and recover.
Machine Learning is aiding a lot to fight the battle against Covid-19. For instance, a face scanner that uses ML is
used to detect whether a person has a fever or not. Similarly, the data from wearable technology like Apple
Watch and Fitbit can be used to detect the changes in resting heart rate patterns which help in detecting
coronavirus. According to a study by the Hindustan Times, the number of cases is rapidly increasing. Careful
risk assessments should identify hotspots and clusters, and continued efforts should be made to further
strengthen capacities to respond, especially at sub-national levels. The core public health measures for the
Covid-19 response remain, rapidly detect, test, isolate, treat, and trace all contacts. The work presented in this
paper represents the system that predicts the number of coronavirus cases in the upcoming days as well as the
possibility of the infection in a particular person based on the symptoms. The work focuses on Linear Regression
and SVM models for predicting the curve of active cases. SVM is least affected by noisy data, and it is not prone
to overfitting. To diagnose a person our application has a certain question that needs to be answered. Based on
this, the KNN model provides the maximum likelihood result of a person being infected or not. Tracking and
monitoring in the course of such pandemic help us to be prepared.
Keywords: Healthcare, K-Nearest Neighbor, Linear Regression, Machine Learning Support Vector Machine.
References:
1. Krati Saxena, Dr. Zubair Khan, Shefali Singh," Diagnosis of Diabetes Mellitus using K Nearest Neighbor Algorithm," International
Journal of Computer Science Trends and Technology (IJCST) – Volume 2 Issue 4, July-Aug 2014, Page 36, ISSN: 2347-8578.
2. M. Nirmala Devi, S. A. alias Balamurugan and U. V. Swathi, "An amalgam KNN to predict diabetes mellitus," 2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN), Tirunelveli, 2013, pp.
691-695, DOI: 10.1109/ICE-CCN.2013.6528591.
3. V. Chamola, V. Hassija, V. Gupta and M. Guizani, "A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain, and 5G in Managing its Impact," in IEEE Access, vol. 8, pp. 90225-90265, 2020, doi:
10.1109/ACCESS.2020.2992341.
4. Ramesh, D., Katheria, Y.S. Ensemble method based predictive model for analyzing disease datasets: a predictive analysis approach. Health Techno. 9, 533–545(2019).https://doi.org/10.1007/s12553-019-00299-3
5. S. S. Arun and G. Neelakanta Iyer, "On the Analysis of COVID19 - Novel Corona Viral Disease Pandemic Spread Data Using Machine
Learning Techniques," 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2020, pp. 1222-1227, doi: 10.1109/ICICCS48265.2020.9121027.
6. F. Rustam et al., "COVID-19 Future Forecasting Using Supervised Machine Learning Models," in IEEE Access, vol. 8, pp. 101489-
101499, 2020, DOI: 10.1109/ACCESS.2020.2997311. 7. Ahmad S, Hafeez A, Siddqui SA, Ahmad M, Mishra S. A Review of COVID-19 (Coronavirus Disease-2019) Diagnosis, Treatments
678-683
and Prevention. EJMO 2020;4(2):116–125.
8. M.K., Arti. (2020). Modeling and Predictions for COVID 19 Spread in India. 10.13140/RG.2.2.11427.81444. 9. Ghosal S., Sengupta S., Majumder M., Sinha B. Linear Regression Analysis to predict the number of deaths in India due to SARS-
CoV-2 at 6 weeks from day 0 (100 cases - March 14th 2020) Diabetes Metab Syndr. 2020;14:311–315. doi:
10.1016/j.dsx.2020.03.017.
10. Lixiang Li, Zihang Yang, Zhongkai Dang, Cui Meng, Jingze Huang, Haotian Meng, Deyu Wang, Guanhua Chen Jiaxuan Zhang,
Haipeng Peng, Yiming Shao, Propagation Analysis and Prediction of the COVID-19, Infectious Disease Modelling, Volume 5, 2020,
Pages 282-292.
113.
Authors: Junhwan Moon
Paper Title: Research Method of Clustering of COVID-19 with Text-mining
Abstract: A suspected patient with symptoms similar to coronavirus infection-19 was identified for the first
time on January 8, 2020 in Korea. After that, the world was dominated by COVID-19. People all around the
world must face a new society that will be changed by COVID-19. To prepare for such future, this study
collected related words around the keyword COVID-19 and has predicted what risk factors and opportunity
factors occur. As a result of SNA analysis by collecting news data from January to May, 2020, when COVID-19
was rapidly spreading, the key words "Prevention of epidemics", "Inspection", "Quarantine", "Infection",
"Government", Keywords such as "Patient", "Addition", "Diffusion", "Judgment" and "Prohibition" have had
important influences. Furthermore, COVID-19 has been affecting the daily lives of individual citizens, and their
interest in the government response process increased. Therefore, the response to the new infectious disease
must be quarantine based on science and technology and data, and it is imperative to establish a legal basis for
using social facilities as treatment facilities.
Keywords: Coronavirus, COVID-19, Big data, Social Network Analysis, Cluster Analysis, Future Prediction,
South Korea.
References:
1. C. Batini, C. Cappiello, C. Francalanci, A. Maurino, and G. Viscusi. (2011, August). ―A capacity and value based model for data
architectures adopting integration technologies,‖ In AMCIS.
2. Central Accident Remediation Headquarters. Central Defense Response Headquarters, 2020. [Online]. Available: http://ncov.mohw.go.kr/tcmBoardView.do?brdId=3&brdGubun=31&dataGubun=&ncvContSeq=583&contSeq=583&board_id=311&g
ubun=ALL
3. Central Accident Remediation Headquarters. Central Defense Response Headquarters, 2020. [Online]. Available:
http://ncov.mohw.go.kr/tcmBoardView.do?brdId=3&brdGubun=31&dataGubun=&ncvContSeq=1241&contSeq=1241&board_id=311
&gubun=ALL
4. Central Accident Remediation Headquarters. Central Defense Response Headquarters, 2020. [Online]. Available: http://ncov.mohw.go.kr/tcmBoardView.do?brdId=&brdGubun=&dataGubun=&ncvContSeq=353682&contSeq=353682&board_id=&g
ubun=ALL
5. Ministry of Education, 2020. [Online]. Available: https://www.moe.go.kr/sub/info.do?m=020102&s=moe 6. Ministry of Employment and Labor, 2020. [Online]. Available:
http://www.moel.go.kr/news/enews/report/enewsView.do?news_seq=10754
7. National Trauma Center, 2020. [Online]. Available: https://nct.go.kr/serviceCenter/pressDetail.do?currentPageNo=2&refnceSeq=339&searchKeyword1=
8. Ying Liu, Albert A Gayle, Annelies Wilder-Smith and Joacim Rocklöv, ―The reproductive number of COVID-19 is higher compared to
SARS coronavirus‖, Journal of travel medicine, 2020. 9. Yan Bai, Lingsheng Yao, Tao Wei, Fei Tian, Dong-Yan Jin, Lijuan Chen and Meiyun Wang, ―Presumed asymptomatic carrier
transmission of COVID-19‖, Jama, 323(14), 1406-1407, 2020.
10. Freeman, Linton C. (Ed.)., Research methods in social network analysis. Routledge, 2017. 11. Milgram, Stanley, ―The small world problem‖, Psychology today, Vol. 2, no. 1, pp.60-67, 1967.
12. Freeman, Linton, ―The development of social network analysis‖, A Study in the Sociology of Science, 1, 687, 2004.
13. Marin, Alexandra and Barry Wellman, "Social network analysis: An introduction", The SAGE handbook of social network analysis, 11, 2011.
14. Otte, Evelien, and Ronald Rousseau, ―Social network analysis: a powerful strategy, also for the information sciences‖, Journal of
information Science, Vol. 28, no. 6, pp.441-453, 2002. 15. Kim, Jooho, and Makarand Hastak, ―Social network analysis: Characteristics of online social networks after a disaster‖, International
Journal of Information Management, Vol. 38, no. 1, pp.86-96, 2018.
16. Wasserman, Stanley, and Katherine Faust, Social network analysis: Methods and applications, Vol. 8, Cambridge university press, 1994.
17. Lee, Min-Joong, Sunghee Choi, and Chin-Wan Chung, ―Efficient algorithms for updating betweenness centrality in fully dynamic
graphs‖, Information Sciences, 326, pp.278-296, 2016. 18. Scott, Robert A, The Making of Blind Men, Deviance: A Symbolic Interactionist Approach, 236, 1995.
19. De Nooy, Wouter, Andrej Mrvar, and Vladimir Batagelj, ―Exploratory social network analysis with Pajek: Revised and expanded
edition for updated software‖, Vol. 46, Cambridge University Press, 2018. 20. Rowley, Timothy J, ―Moving beyond dyadic ties: A network theory of stakeholder influences‖, Academy of management Review, Vol.
22, no. 4, pp.887-910, 1997.
21. Ng, Andrew Y., Michael I. Jordan, and Yair Weiss, ―On spectral clustering: Analysis and an algorithm‖, In Advances in neural information processing systems, pp. 849-856, 2002.
22. Xie, Junyuan, Ross Girshick, and Ali Farhadi, ―Unsupervised deep embedding for clustering analysis‖, In International conference on
machine learning, pp. 478-487, 2016. 23. Lee, Jae Yun, Heejung Kim, and Pan Jun Kim, ―Domain analysis with text mining: Analysis of digital library research trends using
profiling methods‖, Journal of Information Science, Vol. 36, no. 2, pp.144-161, 2010.
24. Kim, Heejung, and Jae Lee, ―Archiving research trends in LIS domain using profiling analysis‖, Scientometrics, Vol. 80, no. 1, pp75-90, 2009.
25. Huang, Wei, and Sung-Kwun Oh, ―Optimized polynomial neural network classifier designed with the aid of space search simultaneous
tuning strategy and data preprocessing techniques‖, Journal of Electrical Engineering & Technology, Vol. 12, no. 2, pp.911-917, 2017.
684-690
114. Authors: Islahuddin Jalal, Hashmatullah Rasekh, Qudrattullah Omerkhel, Qamaruddin Shamsi
Paper Title: Risk Analysis of BYOD in Afghanistan’s Organization
Abstract: Improving ICT management strategies is an ongoing need for almost all organizations. At the same
time, the challenges that BYOD brings to the organization need to be carefully considered. BYOD terminology
can refer to related concepts, technologies, and strategies that enable employees to use organizational resources.
The use of different databases, applications, and personal devices such as smartphones, laptops, tablets, and any
other mobile device such as memory chips and external hard drives can provide examples of these resources.
The implementation of BYOD has brought a clear advantage to the organization. However, the use of BYOD in
organizations can pose some risks and threats. The main purpose of this study was to analyze BYOD risks in
Afghan organizations through cross-sectional quantitative research methods. An online survey of 24 questions
was conducted on various aspects of BYOD risk from various organizations in Afghanistan. Through the use of
raw data, survey results related to BYOD implementation in Afghanistan have been collected. Thus, the
researchers found out that IT staffs have a low level of awareness of the risks and challenges of BYOD security
and the latest technologies used by Afghan organizations. Finally, recommendations have been made.
Keywords: Risk Analysis, Bring Your Own Device (BYOD), Cyber Security, Information Security.
References:
1. G. O. Young, ―Synthetic structure of industrial plastics (Book style with paper title and editor),‖ in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.
2. W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.
3. H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4. 4. B. Smith, ―An approach to graphs of linear forms (Unpublished work style),‖ unpublished.
5. E. H. Miller, ―A note on reflector arrays (Periodical style—Accepted for publication),‖ IEEE Trans. Antennas Propagat., to be
published. 6. J. Wang, ―Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),‖ IEEE J. Quantum
Electron., submitted for publication.
7. C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995. 8. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, ―Electron spectroscopy studies on magneto-optical media and plastic substrate
interfaces(Translation Journals style),‖ IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics
Japan, 1982, p. 301]. 9. M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.
10. (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue).
Available: http://www.(URL) 11. J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com
12. (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.
Available: http://www.(URL) research work, membership, achievements, with photo that will be maximum 200-400 words.
691-698
115.
Authors: Rohan Yashraj Gupta, Satya Sai Mudigonda, Pallav Kumar Baruah, Phani Krishna Kandala
Paper Title: Implementation of Correlation and Regression Models for Health Insurance Fraud in Covid-19
Environment using Actuarial and Data Science Techniques
Abstract: Fraud acts as a major deterrent to a company‘s growth if uncontrolled. It challenges the fundamental
value of ―Trust‖ in the Insurance business. COVID-19 brought additional challenges of increased potential fraud
to health insurance business. This work describes implementation of existing and enhanced fraud detection
methods in the pre-COVID-19 and COVID-19 environments. For this purpose, we have developed an innovative
enhanced fraud detection framework using actuarial and data science techniques. Triggers specific to COVID-19
are identified in addition to the existing triggers. We have also explored the relationship between insurance fraud
and COVID-19. To determine this we calculated Pearson correlation coefficient and fitted logarithmic regression
model between fraud in health insurance and COVID-19 cases. This work uses two datasets: health insurance
dataset and Kaggle dataset on COVID-19 cases for the same select geographical location in India. Our
experimental results shows Pearson correlation coefficient of 0.86, which implies that the month on month rate
of fraudulent cases is highly correlated with month on month rate of COVID-19 cases. The logarithmic
regression performed on the data gave the r-squared value of 0.91 which indicates that the model is a good fit.
This work aims to provide much needed tools and techniques for health insurance business to counter the fraud.
Keywords: Fraud detection framework, Pearson correlation, Logarithmic regression, COVID-19, actuarial
techniques, data science techniques, fraud detection, fraud prevention, fraud triggers.
References:
1. R. A. Bauder and T. M. Khoshgoftaar, ―Medicare Fraud Detection Using Machine Learning Methods,‖ in 2017 16th IEEE International
Conference on Machine Learning and Applications (ICMLA), 2017, vol. 2018-Janua, pp. 858–865, doi: 10.1109/ICMLA.2017.00-48.
2. L. V. . M. R. M. Ekin Tahir; Fulton, T. Ekin, R. M. Musal, and L. V. Fulton, ―Overpayment models for medical audits: multiple scenarios,‖ J. Appl. Stat., vol. 42, no. 11, pp. 2391–2405, Nov. 2015, doi: 10.1080/02664763.2015.1034659.
3. A. Gangopadhyaya and A. B. Garrett, ―Unemployment, Health Insurance, and the COVID-19 Recession,‖ SSRN Electron. J., Apr.
2020, doi: 10.2139/ssrn.3568489. 4. D. Thornton et al., ―Predicting Healthcare Fraud in Medicaid: A Multidimensional Data Model and Analysis Techniques for Fraud
Detection,‖ Procedia Technol., vol. 9, pp. 1252–1264, 2013, doi: 10.1016/j.protcy.2013.12.140.
5. ―Insurance Fraud in Times of Crisis - FRISS.‖ [Online]. Available: https://www.friss.com/blog/insurance-fraud-in-times-of-crisis/. [Accessed: 05-Jun-2020].
6. ―Coalition Against Insurance Fraud: Rapid National Response Urged To Head Off Coming Wave of COVID-19 Insurance Scams -
InsuranceNewsNet.‖ [Online]. Available: https://insurancenewsnet.com/oarticle/coalition-against-insurance-fraud-rapid-national-response-urged-to-head-off-coming-wave-of-covid-19-insurance-scams#.Xts8DzozbIX. [Accessed: 06-Jun-2020].
7. ―Indian general insurance market grows 14.5% | Insurance Business.‖ [Online]. Available:
https://www.insurancebusinessmag.com/asia/news/breaking-news/indian-general-insurance-market-grows-14-5-213662.aspx. [Accessed: 20-Sep-2020].
699-706
8. S.-H. Li, D. C. Yen, W.-H. Lu, and C. Wang, ―Identifying the signs of fraudulent accounts using data mining techniques,‖ Comput.
Human Behav., vol. 28, no. 3, pp. 1002–1013, May 2012, doi: 10.1016/j.chb.2012.01.002. 9. N. Pillay, A. P. Engelbrecht, A. Abraham, M. C. Du Plessis, V. Snášel, and A. K. Muda, Advances in Nature and Biologically Inspired
Computing, vol. 419. Cham: Springer International Publishing, 2016.
10. ―How European Insurers Can Manage The Impact Of Covid-19.‖ [Online]. Available: https://www.oliverwyman.com/our-
expertise/insights/2020/mar/covid-19-european-insurance.html. [Accessed: 05-Jun-2020].
11. ―COVID-19 Impact on Global Insurance Fraud Detection Industry 2020: Industry Trends, Size, Share, Growth Applications, SWOT
Analysis by Top Key Players and Forecast Report to 2026 – Jewish Market Reports.‖ [Online]. Available: https://jewishlifenews.com/uncategorized/covid-19-impact-on-global-insurance-fraud-detection-industry-2020-industry-trends-size-
share-growth-applications-swot-analysis-by-top-key-players-and-forecast-report-to-2026/. [Accessed: 05-Jun-2020].
12. ―Impact of COVID-19 on Life And Health Insurance | TCS.‖ [Online]. Available: https://www.tcs.com/blogs/how-technology-can-aid-insurers-combat-covid-19. [Accessed: 27-May-2020].
13. ―COVID-19 Impact on Fraud Detection and Prevention (FDP) Market | Coronavirus Outbreak & FDP Industry |
MarketsandMarkets.‖ [Online]. Available: https://www.marketsandmarkets.com/Market-Reports/covid-19-impact-on-fraud-detection-and-prevention-market-23997778.html. [Accessed: 05-Jun-2020].
14. ―COVID-19 online fraud trends: Industries, schemes and targets - Help Net Security.‖ [Online]. Available:
https://www.helpnetsecurity.com/2020/05/15/covid-19-online-fraud/. [Accessed: 05-Jun-2020]. 15. ―COVID-19 (C-19) and Fraudulent Claims.‖
16. ―COVID-19 – A backdoor to increased fraud risk?‖ [Online]. Available: https://www2.deloitte.com/ch/en/pages/financial-
advisory/articles/covid-19-operating-in-the-new-normal-fraud-risk.html. [Accessed: 05-Jun-2020]. 17. N. Dragano, C. J. Rupprecht, O. Dortmann, M. Scheider, and M. Wahrendorf, ―Higher risk of COVID-19 hospitalization for
unemployed: an analysis of 1,298,416 health insured individuals in Germany,‖ medRxiv, p. 2020.06.17.20133918, Jun. 2020, doi:
10.1101/2020.06.17.20133918. 18. J. W. Goodell, ―COVID-19 and finance: Agendas for future research,‖ Financ. Res. Lett., vol. 35, Jul. 2020, doi:
10.1016/j.frl.2020.101512.
19. ―Evaluating the impact of COVID-19 on insurance sector technology - Omdia.‖ [Online]. Available: https://technology.informa.com/623267/evaluating-the-impact-of-covid-19-on-insurance-sector-technology. [Accessed: 05-Jun-2020].
20. ―How Will COVID-19 Impact Personal Injury Cases?‖ [Online]. Available: https://www.atltriallaw.com/how-will-covid-19-impact-
personal-injury-cases/. [Accessed: 05-Jun-2020]. 21. R. Y. Gupta, S. Sai Mudigonda, P. K. Kandala, and P. K. Baruah, ―Implementation of a Predictive Model for Fraud Detection in Motor
Insurance using Gradient Boosting Method and Validation with Actuarial Models,‖ in 2019 IEEE International Conference on Clean
Energy and Energy Efficient Electronics Circuit for Sustainable Development (INCCES), 2019, pp. 1–6, doi: 10.1109/INCCES47820.2019.9167733.
22. V. Chandola, ―Anomaly Detection : A Survey,‖ 2009.
23. D. Cutler, ―How Will COVID-19 Affect the Health Care Economy?,‖ JAMA - Journal of the American Medical Association, vol. 323, no. 22. American Medical Association, pp. 2237–2238, 09-Jun-2020, doi: 10.1001/jama.2020.7308.
24. ―Insurance sector in India: Overview, IRDAI, Companies, Stats & Trends.‖ [Online]. Available:
https://www.acko.com/articles/general-info/insurance-sector-india/. [Accessed: 08-Jun-2020]. 25. ―Insurance Sector in India: Industry Overview, Market Size & Trends | IBEF.‖ [Online]. Available:
https://www.ibef.org/industry/insurance-sector-india.aspx. [Accessed: 08-Jun-2020]. 26. ―Potential Impact Of COVID-19 On Insurance Fraud Detection Market | Leading Companies Analysis 2027 – Cole Reports.‖ [Online].
Available: https://coleofduty.com/news/2020/05/23/potential-impact-of-covid-19-on-insurance-fraud-detection-market-leading-
companies-analysis-2027/. [Accessed: 05-Jun-2020]. 27. P. Babuna, X. Yang, A. Gyilbag, D. A. Awudi, D. Ngmenbelle, and D. Bian, ―The Impact of COVID-19 on the Insurance Industry,‖
Int. J. Environ. Res. Public Health, vol. 17, no. 16, p. 5766, Aug. 2020, doi: 10.3390/ijerph17165766.
28. E. Summary, T. Nadu, I. A. I. Office, and B. T. Results, ―COVID-19 A Study and Projections for India - An Update.‖ 29. R. Y. Gupta, S. S. Mudigonda, P. K. Kandala, and P. K. Baruah, ―A Framework for Comprehensive Fraud Management using Actuarial
Techniques,‖ vol. 10, no. 3, pp. 780–791, 2019.
30. N. Rai, P. K. Baruah, S. S. Mudigonda, and P. K. Kandala, ―Fraud Detection Supervised Machine Learning Models for an Automobile Insurance,‖ Int. J. Sci. Eng. Res., vol. 9, no. 11, pp. 473–479, 2018.
31. ―Rise in searches for ‗How to set fire‘ a sign insurance fraud beckons as economy crashes.‖ [Online]. Available:
https://www.washingtonexaminer.com/news/rise-in-searches-for-how-to-set-fire-a-sign-insurance-fraud-beckons-as-economy-crashes. [Accessed: 06-Jun-2020].
32. ―COVID-19 in India | Kaggle.‖ [Online]. Available: https://www.kaggle.com/sudalairajkumar/covid19-in-india. [Accessed: 19-Sep-
2020].
116.
Authors: Amena Begum, Md. Zahidur Rahman, Nurunnahar Nancy, Md. Enamul Haq
Paper Title: Comparative Performance Evaluation of Mobile Ad-hoc Network Routing Protocols using NS2
Simulator
Abstract: A Mobile Ad-hoc Network (MANET) is an independent assortment of mobile users that communicate
over moderately bandwidth constrained wireless links. MANET‘s topology is dynamic that can change rapidly
because the nodes move freely and can organize themselves randomly; has the advantage of being quickly
deployable. Although numerous routing protocols have been proposed for mobile ad hoc networks, there is no
universal scheme that works well in scenarios with different network sizes, traffic loads and node mobility
patterns, so mobile ad hoc routing protocol election presents a great challenge. In this paper, an attempt has
been made to compare the performance of three routing protocols in Mobile Ad-hoc Networks – Ad-Hoc On-
demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Destination Sequenced Distance Vector
(DSDV). We have evaluated the performance of these routing protocols with varying the number of mobile
nodes and packet sizes on the basis of four important metrics such as packet delivery ratio, average end to
end delay, normalized routing overhead and throughput. Network Simulator version 2.35 (NS-2.35) is used
as the simulation tool for evaluating these performance metrics. The outcome of this research shows that AODV
protocol outperforms DSDV and DSR protocols.
Keywords: MANET, AODV, DSR, DSDV, NS2, Performance Metrics, Analysis
References:
1. Network Simulator version 2 (NS-2). [Online]. Available at: http://www.isi.edu/nsnam/ns. 2. Magnus Frodigh, Per Johansson and Peter Larsson, ―Wireless ad hoc networking—The art of networking without a network,‖ 2010.
3. Ayush Pandeyand Anuj Srivastava, ―Performance Evaluation of MANET through NS2 Simulation,‖ International Journal of
Electronic and Electrical Engineering, volume 7, issue 1, pp. 25-30, 2014.
707-713
4. C. Perkins and P. Bhagwat, ―Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV)‖ for Mobile Computers,
ACM SIGCOMM, October 1994. 5. Shree Murthy, J.J. Garcia-Luna-Aveces, ―A Routing Protocol for Packet Radio Networks,‖ ACM International Conference on
Mobile Computing and Networking, pp. 86-95, November, 1995.
6. C.-C. Chiang, ―Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel,‖ IEEE SICON ‘97, pp. 197–
211, 1997.
7. C.E. Perkins, E. Royer, and S.R. Das, ―Ad hoc on demand distance vector (AODV) routing,‖ Internet Draft, March 2000.
8. D B. Johnson, D A. Maltz, and Y. Hu, ―The dynamic source routing protocol for mobile ad hoc network,‖ Internet-Draft, April 2003. 9. Haas Z.J, ―A new routing protocol for the reconfigurable wireless network,‖ IEEE 6th International Conference on Universal Personal
Communications, ICUPC ‗97, San Diego, CA, pp. 562 - 566, 1997.
10. Marc Greis tutorial on ns2. [Online]. Available at: www.isi.edu/nsnam/ns/tutorial. 11. K. Fall and K. Varadhan, ―The NS Manual,‖ The VINT Project, UC Berkeley, January 2002.
117.
Authors: Rutuja Gugale, Pratiksha Sonar, Anagha Mandekar, Sonali Ubale, Vaishali Latke
Paper Title: Brain Tumor Detection using Deep Learning
Abstract: Nowadays the leading techniques for diagnosing and revealing the different diseases are image
processing. And there is an increase in the cases of cancer these days. The unrestricted development of cells
cause‘s lumps which leads to brain tumor also called glioblastoma. There are mainly two types of tumor benign
which has covering over the tumor and malignant is the one which spreads throughout the places. Earlier the
development of unrestricted cells used to be diagnosed by doctors physically through monitoring the image by
which the results were not used to be precise sometimes. But time along boarding of medical fields lead to
different medical facilities by which the results could be precise. The broadly approach method of imaging that
scrutinizes the internal structure of the human race is Magnetic resonance Imaging. This approach of imaging
techniques is also used for detecting brain tumors. The detection of glioblastoma processes has machine vision
methods such as Image pre-processing, Segmentation in Image, Feature extraction and classification. Several
image segmentation and image classification techniques are available for detecting tumor of the brain.
Convolution neural networks (CNN) based classifiers are proposed to prevail the limitations. This CNN is such a
classifier which is used to differentiate between the competent data and the trail data, from which the results
could be obtained.
Keywords: Brain tumor Detection, Watershed Algorithm,Capsule Network, Convolutional Neural Network,
MRI Images, Tumor Boundary.
References:
1. iNilesh Bhaskarrao Bahadur, Arun Kumar Ray and Har Pal Thethi,‖Image Analysis for MRI Based Brain Tumor Detection and Feature Extraction Using Biologically Inspired BWT and SVM‖, Hindawi International Journal of Biomedical Imaging volume 2017
2. iAndras Jakab, Stefan Bauer et al.,―TheMultimodal Brain Tumor ImageSegmentation Benchmark (BRATS) ―IEEE TRANSACTIONS ON MEDICAL IMAGING, VOL. 34, NO. 10, 2015.
3. iIsrael D. Gebru, Xavier Alameda-Pineda, Florence Forbes and RaduHoraud, ―EM Algorithms for WeightedData Clustering with Application to Audio-Visual Scene Analysis ― IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. XX, NO. Y, 2016.
4. Prateek Katiyar, Mathew R. Divine et al., ―A Novel Unsupervised Segmentation Approach Quantifies Tumor Tissue Populations Using Multiparametric MRI: First Results with Histological Validation‖ Mol Imaging Biol 19:391Y397 DOI: 10.1007/s11307-016-1009-y , 2016.
714-717
118.
Authors: Mayu S.Bankar, Vidya P. Kodgirwar
Paper Title: Electrical Pole Climbing Robot for Fault Detection using Wi-Fi
Abstract: This project is to create electrical pole climbing robot which can be used to reduce risk of electrician
to connect the distribution lines for supplying purposes. Pole climbing robot, nowadays, is very common and
interesting idea, which mainly works by connecting the distribution lines according to the directions given to it.
In this modern era robots are being developed for various purposes to accomplish many tasks which seem to be
complex and life endangering for humans. Benefits of using robots have been immense in terms of risk-free,
speed and efficiency of doing required tasks compared to that of humans. The main objective of this work is to
save human lives. Considering on that issue, a pole climbing robot has been designed. However, further
modifications of this work might be able to perform the wiring and repairing tasks instead of an electrician. The
developed robot works on the principle of linear motor, which is partially autonomous. With the installation of
this project, risk of human injuries and death can be minimized while working in the distribution lines which is
the main consideration of this project.
Keywords: Wi-Fi, Microcontroller, Robot Arms, DC motors, Power supply, Gripper.
References:
1. BAKHTIAR KHALID, MD. HASIBULLAH, RAZU AHMED, ZAKIR HASAN CHOUDHURY, IMRULKAISH AND MD. KHALILUR RHAMAN,
“ELECTRICAL POLE CLIMBING ROBOTS FOR WIRING AND REPAIRING DISTRIBUTION LINES”, 18TH INTERNATIONAL
CONFERENCE ON COMPUTER & INFORMATION TECHNOLOGY, 21-23 DECEMBER 2015
2. Salataren, R., Aracil, R., Sabater, J.M., Reinoso, O. and Jimenez,L.M. (1999), ―Modeling, simulation and conception of parallel
climbing robots for construction and service‖, paper presented at the 2nd International Conference on Climbing and Walking Robots, pp. 253-5.
3. J. C., M. Prieto, M. Armada, and P. G. de Santos, ―A six-legged climbing robot for high payloads‖, in IEEE Int. Conf. on Cont. App,
Trieste, Italy, Sept. 1998, pp. 446–450
4. M. NiliAhmadabadi, Senior Member, IEEE , H. Moradi, Member, IEEE , A. Sadeghi, A. Madani, andM. Farahnak, ―The Evolution of
UT Pole Climbing Robots‖
718-722
5. M. Saidur Rahman, F. Rahman, A. Rahman. B. Kamran, A. Biswas and J. Hossain, ―Burn Injury in Bangladesh: Electrical Injury a
Major Contribution‖, Int J Burns Trauma.2011;(1): 62–67, PMCID: PMC3415945, Published online 2011 Sep 3 6. R. Azizur & U. Kutub, 9-10 January, 2010, ―Ensuring Safety: A Great Challenge for Electricity Distribution System‖, proceeding of
the 2010 International Conference on Industrial Engineering and Operation Management, Dhaka, Bangladesh
7. M. Tavakoli, M.R. Zakerzadeh, G.R. Vossoughi, S. Bagheri, (2005),"A hybrid pole climbing and manipulating robot with minimum
DOFs for construction and service applications", Industrial Robot: An International Journal, Vol. 32 Iss: 2 pp. 171 – 178
8. T. Mahmoud, ―Design, Implementation, Pathplanning, and Control of Pole Climbing Robot‖, University of Coimbra, Faculty of
Science and Technology, Department of Electrical and Computer Engineering, Coimbrca, July 2010
119.
Authors: J.R.Arunkumar, M.Sundar Rajan, Anusuya Ramasamy, Bhupesh Kumar Singh
Paper Title: Efficient Cognitive Skill Based Learning System using Augmented Reality
Abstract: Augmented Reality provides an interactive experience by imposing virtual objects over real world
environment and used in different field in learning, entertainment, or edutainment by developing higher order
cognitive and practical learning skills. With the infusion of digital technology, nowadays all the educational
institutions adapted the online mode learning environment like smart classroom for content delivery, Webcast
Lecture by using AR. AR attracts research attention for its ability to allow students to be immersed in realistic
experiences. AR will allow learners too deep about real time and cognitive skill development experiences.
Recent scenario in education and academic sectors needs emerging technologies for learning system. In that
scenario AR technology will be used to create new type of self-learning and automated application in academic.
This technology is used to enhance the teaching and learning for students in effective way and efficient too.
Even this technology will attract the students to learn fast and improve the cognitive skill also. This is a new
standard, merging features from ubiquitous computing, tangible computing, and social computing. The benefits
of this proposed component include inspiring deep and thoughtful education, in real world problems and
challenges can be refining the creative problem solving abilities while also as long as exposure/ new perception.
This proposed research paper goals to improve present educational system using Augmented Reality.
Keywords: Augmented Reality, Learning, Education, Social Computing.
References:
1. Bujak, K.R.; Radu, I.; Catrambone, R.; MacIntyre, B.; Zheng, R.; Golubski, G. A Psychological Perspective on Augmented Reality in
the Mathematics Classroom. Comput. Educ. 2013, 68, 536–544. 2. Pacheco, D.; Wierenga, S.; Omedas, P.; Oliva, L.S.; Wilbricht, S.; Billib, S.; Knoch, H.; Verschure, P.F.M.J. A Location-Based
Augmented Reality System for the Spatial Interaction with Historical Datasets. In Proceedings of the 2015 Digital Heritage, Granada,
Spain, 28 September–2 October 2015; IEEE: Washington, DC, USA, 2016; pp. 393–396. 3. A High Level Framework for Interacive, Animated 3D Graphics Applications,‖ proceedings of ACM SiGGRAPH 9 4, pp.421-434
(1994) Azuma, 1997; Zhou, Duh, &Billinghurst, 2008.
4. Broll et al., 2008; Johnson et al., 2010b; Liu, 2009 5. Arvinitis et al, 2007; Dunleavy, Dede & Mitchell, 2008
6. AIR-EDUTECH, Lamees Mahmoud Mohd Said Al Qassem, Hessa Al Hawai, M. Jamal Zemerly, 2016M. Billinghurst, ―Augmented
Reality in Education‖, New horizons for learning IX , October 2003. 7. Hsin-Yi Chang, Hsin-Kai Wu and Ying-Shao Hsu; ―Integrating a mobile augmented reality activity to contextualize student learning of
a socioscientific issue, 2013.
8. Kangdon Lee, ―Augmented Reality in Education and Training‖, 2012. 9. Freitas, R., & Campos, P. (2008). SMART: a System of augmented reality for teaching 2nd grade students. Proceedings of the 22nd
British Computer Society Conference on Human-Computer Interaction (HCI 2008), 27-30. Liverpool John Moores University, UK.
10. M.Billinghurst, H. Kato and I. Poupyrev, "The Magicbook: Moving Seamlessly Between Reality and Virtuality", IEEE Computer Graphics and Applications, vol. 21, no. 3, pp. 6-8, May/June 2001.
11. Billinghurst, M. (2002). Augmented Reality in Education. Seattle WA: New Horizons for Learning - Technology in Education.
12. Kiyokawa, K., Billinghurst, M., Hayes, S., Gupta, A., Sannohe, Y., & Kato, H. (2002). Communication Behaviors of Co-Located Users in Collaborative AR Interfaces. IEEE and ACM International Symposium on Mixed and Augmented Reality (ISMAR 2002) (pp. 139-
148). Darmstadt, Germany: IEEE Press.
13. Liarokapis, F., & Anderson, E. F. (2010). Using Augmented Reality as a Medium to Assist Teaching in Higher Education. (October 2016). https://doi.org/10.2312/eged.20101010.
14. Paper,C., &Baldiris, S. (2017). Augmented Reality Applications for Education : Five Directions for Future Augmented Reality
Applications for Education : Five Directions for Future Research. (June). https://doi.org/10.1007/978-3-319-60922-5. 15. Trondsen, E., Member, B., & Vikings, S. (2019). Augmented / Virtual Reality in Nordic / Baltic Education, Learning and Training.
(April), 1–73.
16. Burton, E.P., Frazier, W., Annetta, L., Lamb, R., Cheng, R. and Chmiel, M. 2011. Modeling Augmented Reality Games with Preservice Elementary and Secondary Science Teachers. Journal of Technology and Teacher Education 19, 303-329.
17. Coffin, C., Bostandjiev, S., Ford, J. And Hollerer, T. 2010. Enhancing classroom and distance learning through augmented reality. In
World Conference on Educational Multimedia, Hypermedia and Telecommunications, 1140-1147. 18. Kesim, M. and Ozarslan, Y. 2012. Augmented Reality in Education: Current Technologies and the Potential for Education. Procedia -
Social and Behavioral Sciences 47, 297-302. https://doi.org/10.1016/j.sbspro.2012.06.654
19. Abdullah Mubarak Ghare, Mohammed Akhtar Khan, Mustafa Rangwala, Shadab Kazi ,Prof. Sameer Panwala, Prof. Abdus Salam‖Augmented Reality for Educational Enhancement‖International Journal of Advanced Research in Computer and
Communication Engineering Vol. 6, Issue 3, March 2017.
20. MonaAlkhattabi .‖Augmented Reality as E-learning Tool in Primary Schools‘ Education: Barriers to Teachers‘ Adoption‖ iJET ‒ Vol.
12, No. 2, 2017 https://doi.org/10.3991/ijet.v12i02.6158.
21. AnuroopKatiyar, Karan Kalra and Chetan Garg.‖Marker Based Augmented Reality ―Advances in Computer Science and Information
Technology (ACSIT) Volume 2, Number 5; April-June, 2015 pp. 441-445. 22. MARE: Mobile Augmented Reality Based Experiments in Science, Technology and Engineering C. Onime, J. Uhomoibhi and S.
Radicella, Online Experimentation: Emerging Technologies and IoT,The International journal of analytical and experimental modal
analysis Volume XII, Issue IV, April/2020 ISSN NO:0886-9367 Page No:622. 23. A Review of Augmented Reality Applications for History Education and Heritage Visualisation Jennifer Challenor * and Minhua Ma,
Multimodal Technol. Interact. 2019, 3, 39; doi:10.3390/mti3020039.
723-727
120. Authors: S.R.Pranav Sai*, Ajay Singh Pawar, Satya Sai Mudigonda, Phani Krishna Kandala, Pallav Kumar
Baruah
Paper Title: Assessing the sustainability of General Insurance Business through Real Time Monitoring of KPIs
using Recurrent Neural Network
Abstract: A company‘s sustainability is driven significantly by its operational efficiency. Operational
efficiency plays a significant role in the growth and the profitability of a company. Thus, operational efficiency
of a company forms the basis for the metrics known as the Key Performance Indicators(KPIs). These KPIs
bridge the concept of performance an operation and a means to measure the same quantitatively. In this work,
we used Recurrent Neural Network (RNN) with the Long Short Term Memory(LSTM) cells for projecting the
public disclosure data of select General Insurance(GI) companies operating in India to the future. We use this
data to calculate the KPIs pertaining to the operations of general insurance companies and calculate how the
operations of the GI company affect its performance at various levels. Since this analysis is done for the
projected data, we get a framework to assess the sustainability of the GI companies by monitoring these KPIs in
real-time. The complex RNN and LSTM algorithms were implemented with the help of the Google Colaboratory
platform by using the GPUs of the Google Hardware with the help of the Cloud Computing framework.
Keywords: Actuarial Analysis, General Insurance, Public Disclosure, RNN, LSTM, Google Colaboratory
References:
1. Sai, Pranav & Kandala, Phani & Mudigonda, Satya & Baruah, Pallav Kumar. (2019). Assessing Sustainability of General Insurance
Business through Real Time KPI using GPUs and Neural Networks.2277-3878.10.35940/ijrte.D1129.1284S219.
2. Pradyumna M, Pranav Sai S.R.- A Framework for assessing performance sensitivity of select KPIs for General Insurance companies in India using Risk Management Dashboard Approach, IJSER, Volume 10, Issue 3, March 2019Edition
3. Shiu, Y. (2004). Determinants of United Kingdom General Insurance Company Performance. British Actuarial Journal.
1010.1017/S1357321700002968. 4. www.irdai.gov.in. (n.d.). Retrieved from
https://www.irdai.gov.in/ADMINCMS/cms/NormalData_Layout.aspx?page=PageNo765&mid=31.2
5. Shiu,Y.,2004.DeterminantsofUnitedKingdomGeneral Insurance Company Performance. British ActuarialJournal. 6. Booth, P., Chadburn, R., Cooper, D., Haberman, S. & James, D., Modern actuarial theory and practice, second edition, September 2004,
ISBN-13: 978-1584883685, Chapman & Hall, U.K.McGraw-Hill,U.K.
7. Browne, Mark J., and Robert E. Hoyt. ―Economic and Market Predictors of Insolvencies in the Property-Liability Insurance Industry.‖ The Journal of Risk and Insurance, vol. 62, no. 2, 1995, pp. 309–327.JSTOR, www.jstor.org/stable/253794.
8. Canadian Institute of Actuaries (1998). Standard of practice on dynamic capital adequacy testing (in effect January 1, 1999). This
document is available at http://www.actuaries.ca/publications/sope.html 9. Blum, Peter, and Michel Dacorogna. "DFA‐Dynamic Financial Analysis." Wiley StatsRef: Statistics Reference Online(2014).
10. Enz, R. & Karl, K. (2001). The profitability of the non-lifeinsuranceindustry:it'sback-to-basicstime.SwissRe. Sigma, 5, 1-37.
11. Greene, William H. Econometric Analysis.2003, ISBN 13: 9780130132970. Pearson EducationIndia
12. Gujarati, Damodar N., Basic econometrics, third edition, 1995, ISBN 0‐07‐025214‐9, New York: McGraw-Hill.
13. Neter, J., Wasserman, W. and Kutner, M.H. (1989) Applied Linear Regression Models. 2nd Edition, RichardD.Irwin, Inc., Homewood
14. Pesaran,H.,Smith,R.&Im,K.(1996).Dynamiclinear models for heterogeneous panels. In the econometrics of panel data. Edited by Ma¨ tya¨ s, L. & Sevestre, P. (second revised edition). Kluwer Academic Publishers, The Netherlands.
15. https://www.irdai.gov.in/ADMINCMS/cms/NormalData_La yout.aspx?page=PageNo129&mid=3.1.9
16. Gonzalez, R. (2018, July). A work in progress. The Actuary, The magazine of the Institute and Faculty of Actuaries, pp.23-25. 17. https://www.irdai.gov.in/ADMINCMS/cms/NormalData_La yout.aspx?page=PageNo264&mid=3.2.10
18. Schmidhuber, Jürgen. "Deep learning in neural networks:Anoverview."Neuralnetworks61(2015):85-117.
19. Glorot, Xavier, and Yoshua Bengio. "Understandingthe difficulty of training deep feedforward neural networks." Proceedings of the thirteenth international conference on artificial intelligence and statistics.2010.
20. Ilya Sutskever, Oriol Vinyals, Quoc V. Le, Sequence to Sequence Learning with Neural Networks, (Submitted on 10 Sep 2014 (v1),
last revised 14 Dec 2014 (this version,v3)) 21. Bergstra,James,etal."Theano:DeeplearningonGPUs with python." NIPS 2011, BigLearning Workshop, Granada, Spain. Vol. 3.
Microtome Publishing.,2011.
22. W. Keckler, Stephen & Dally, William & Khailany, Brucek & Garland, Michael & Glasco, David. (2011). GPUs and the Future of Parallel Computing. Micro, IEEE. 31. 7 - 17. 10.1109/MM.2011.89.
23. Warburton, Kevin. "Deep learning and education for sustainability." International Journal of Sustainability in Higher Education 4.1
(2003):44-56. 24. Seiya Tokui, Kenta Oono, Shohei Hido, Justin Clayton. Chainer: a Next-Generation Open Source Framework for Deep Learning. In
Workshop on Machine Learning Systems at Neural InformationProcessingSystems (NIPS), 2015.
25. Alec Radford & Luke Metz indico Research Boston, MA {alec,luke}@indico.io, Soumith Chintala Facebook AI Research New York, NY [email protected] UNSUPERVISED REPRESENTATION LEARNING WITH DEEP CONVOLUTIONAL GENERATIVE
ADVERSARIALNETWORKS
26. Ade Ibiwoye, O. O. E. A. A. B. S., 2012. Artificial Neural Network Model for Predicting Insurance Insolvency. International Journal of management and business research, pp. 59-68.
27. Akhter Mohiuddin Rather, A. A. V., 2015. Recurrent neural network and a hybrid model for prediction of stock returns. Expert Systems with Applications, 42(6), pp. 3234-3241.
28. AlevDilekAydın,S.Ç.C.,2015.PredictionofFinancial CrisiswithArtificialNeuralNetwork:AnEmpiricalAnalysis onTurkey.
29. Chakraborty, S., 2007. Prediction of corporate financial health by an Artificial Neural Network. International Journal of ElectronicFinance.
30. Constantin, D., 2016. A NEW MODEL FOR ESTIMATING THE RISK OF BANKRUPTCY OF THE INSURANCE COMPANIES
BASED ON THE ARTIFICIAL NEURAL NETWORKS.Romania,International Multidisciplinary Scientific Geo Conference. 31. Isseveroglu Gulsun, G. U., 2010. Early warning model with statistical analysis procedures in Turkish insurance companies.
32. Patrick L. Brockett, L. L. G. J. J. C. Y., 2006. A Comparison of Neural Network, Statistical Methods, and Variable Choice for Life
Insurers' Financial Distress Prediction. The journal of risk andinsurance. 33. SanchoSalcedo-Sanz, 2005. Genetic programming for thepredictionofinsolvencyinnon-lifeinsurancecompanies. In: Computers &
Operations Research. s.l.:s.n., pp.749-765.
34. PeterDEnglandandRichardJVerrall,Stochasticclaims reserving in general insurance, British Actuarial Journal,vol. 8, no. 3, pp. 443–5182002
35. Segovia-Vargas, M. J., 2004. PREDICTION OF INSOLVENCY INNON-LIFE INSURANCE COMPANIES USING SUPPORT
VECTOR MACHINES, GENETIC ALGORITHMS, AND SIMULATED ANNEALING.FuzzyEconomic Review, January, pp. 79-94. 36. Badi H. Baltagi, Econometric Analysis of Panel Data, Fifth Edition, September 2013, ISBN: 978-1-118-67232-7, John Wiley &. Sons,
Ltd Copyright © 2005 John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex P019 8SQ,England
37. TadaakiHosaka, 2019. Bankruptcy prediction using imaged financial ratios and convolutional neural networks. ExpertSystemswithApplications,Volume117,pp.287-299.
728-738
38. https://www.ibef.org. (n.d.). Retrieved from https://www.ibef.org/industry/insurancesector-india.aspx