international journal of recent technology and engineering 2019.pdf · dr. labib francis gergis...

39

Upload: others

Post on 13-Sep-2019

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,
Page 2: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

Editor-In-Chief Chair Dr. Shiv Kumar

Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT)

Director, Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India

Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology-Excellence (LNCTE), Bhopal

(M.P.), India

Associated Editor-In-Chief Chair Dr. Dinesh Varshney

Director of College Development Counseling, Devi Ahilya University, Indore (M.P.), Professor, School of Physics, Devi Ahilya

University, Indore (M.P.), and Regional Director, Madhya Pradesh Bhoj (Open) University, Indore (M.P.), India

Associated Editor-In-Chief Members Dr. Hai Shanker Hota

Ph.D. (CSE), MCA, MSc (Mathematics)

Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India

Dr. Gamal Abd El-Nasser Ahmed Mohamed Said

Ph.D(CSE), MS(CSE), BSc(EE)

Department of Computer and Information Technology , Port Training Institute, Arab Academy for Science ,Technology and Maritime

Transport, Egypt

Dr. Mayank Singh

PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT

Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu-

Natal, Durban, South Africa.

Scientific Editors Prof. (Dr.) Hamid Saremi

Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran

Dr. Moinuddin Sarker

Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor)

Stamford, USA.

Dr. Shanmugha Priya. Pon

Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East

Africa, Tanzania

Dr. Veronica Mc Gowan

Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman,

China.

Dr. Fadiya Samson Oluwaseun

Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern

Cyprus, Turkey.

Dr. Robert Brian Smith

International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie

Centre, North Ryde, New South Wales, Australia

Dr. Durgesh Mishra

Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India

Executive Editor Chair Dr. Deepak Garg

Professor & Head, Department Of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India

Executive Editor Members Dr. Vahid Nourani

Professor, Faculty of Civil Engineering, University of Tabriz, Iran.

Dr. Saber Mohamed Abd-Allah

Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.

Dr. Xiaoguang Yue

Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.

Page 3: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

Dr. Labib Francis Gergis Rofaiel

Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,

Mansoura, Egypt.

Dr. Hugo A.F.A. Santos

ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.

Dr. Sunandan Bhunia

Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia

(Bengal), India.

Dr. Awatif Mohammed Ali Elsiddieg

Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,

Saudi Arabia.

Technical Program Committee Chair Dr. Mohd. Nazri Ismail

Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.

Technical Program Committee Members Dr. Haw Su Cheng

Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia (Cyberjaya), Malaysia.

Dr. Hasan. A. M Al Dabbas

Chairperson, Vice Dean Faculty of Engineering, Department of Mechanical Engineering, Philadelphia University, Amman, Jordan.

Dr. Gabil Adilov

Professor, Department of Mathematics, Akdeniz University, Konyaaltı/Antalya, Turkey.

Convener Chair Mr. Jitendra Kumar Sen

International Journal of Soft Computing and Engineering (IJSCE)

Editorial Chair Dr. Sameh Ghanem Salem Zaghloul

Department of Radar, Military Technical College, Cairo Governorate, Egypt.

Editorial Members Dr. Uma Shanker

Professor, Department of Mathematics, Muzafferpur Institute of Technology, Muzafferpur(Bihar), India

Dr. Rama Shanker

Professor & Head, Department of Statistics, Eritrea Institute of Technology, Asmara, Eritrea

Dr. Vinita Kumar

Department of Physics, Dr. D. Ram D A V Public School, Danapur, Patna(Bihar), India

Dr. Brijesh Singh

Senior Yoga Expert and Head, Department of Yoga, Samutakarsha Academy of Yoga, Music & Holistic Living, Prahladnagar,

Ahmedabad (Gujarat), India.

Dr. J. Gladson Maria Britto

Professor, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Secunderabad (Telangana), India.

Dr. Sunil Tekale

Professor, Dean Academics, Department of Computer Science & Engineering, Malla Reddy College of Engineering, Secunderabad

(Telangana), India.

Dr. K. Priya

Professor & Head, Department of Commerce, Vivekanandha College of Arts & Sciences for Women (Autonomous, Elayampalayam,

Namakkal (Tamil Nadu), India.

Dr. Pushpender Sarao

Professor, Department of Computer Science & Engineering, Hyderabad Institute of Technology and Management, Hyderabad

(Telangana), India.

Page 4: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

S.

No

Volume-7 Issue-5C, February 2019, ISSN: 2277-3878 (Online)

Published By: Blue Eyes Intelligence Engineering & Sciences Publication

Page No.

1.

Authors: Anusha B, B.Annapurna, Arulananth T S, T.Nagarjuna

Paper Title: CSHM Multiplier and Radix-256 Algorithm Using Fir Filter Design

Abstract: Redundant Binary scheme (RB) vary systems are becoming well-liked for the reason that of its distinctive

carry broadcast free addition. A specific filter called as Finite Impulse Response filter which computes its yield

exploitation multiply& accumulation process. At intervals the reward work, a FIR filter supported to new higher radix-

256 and chemical element arithmetic is implemented. The employment of radix-256 booth secret writing cut down the

amount of partial product rows in any multiplication by eight fold. Inside the present work inputs and coefficients unit

of measurement thought-about of 16-bit. Hence, entirely two partial product rows unit of quantity obtained in

Redundant Binary (RB) kind for both input and constant multiplications. These two partial product rows unit of

measurement added exploitation carry free element addition. Finally the element output is converted back to Natural

Binary (NB) kind exploitation element to NB device. Thus the performance of planned number style for FIR filter is

compared with Computation Sharing Multiplier (CSHM) implementation.

Keywords: Redundant Binary, Computation Sharing Multiplier, Finite Impulse Response, FPGAs, ASICs

References: 1. Y. C. Lim, S. R. Parker, and A. G. Constantinides, "Finite word length FIR filter design using integer programming over a discrete coefficient

space," Aug. 1982.

2. Y. C. Lim and S. R. Parker, "FIR filter design over a discrete power-of two coefficient space," IEEE Trans. Acoustics, Speech Signal Processing,

June 1983. 3. H. Samueli, "An improved search algorithm for the design of multiplier less FIR filter with powers-of-two coefficients," July 1989.

4. Hai Huyen Dam, Cantoni A., Kok Lay Teo, Nordholm S.,"FIR Variable Digital Filter With Signed Power-of-Two Coefficients," June 2007.

5. Mustafa Aktan, Arda Yurdakul, and Günhan Dündar. "An Algorithm for the Design of Low-Power Hardware-Efficient FIR Filters," JULY 2008. 6. Vinod A.P., Singla A., Chang C.H., "Low-power differential coefficients-based FIR filters using hardware-optimised multipliers, " February

2007. 7. Dong Shi, Ya Jun Yu, "Design of Discrete-Valued Linear Phase FIR Filters in Cascade Form," July 2011.

8. Jongsun Park, Woopyo Jeong, Hamid Mahmoodi-Meimand, Yongtao Wang, Hunsoo Choo, Kaushik Roy., Computation sharing programmable

fir filter for low-power and high- performance applications. 9. Hiroshi Makino,Yasunobu Nakase, Hiroaki Suzuki, Hiroyuki Morinaka, Hirofumi Shinohara, and Koichiro Mashiko, "An 8.8-ns 54 x 54-Bit

multiplier with high speed redundant binary architecture," June 1996.

10. N. Takagi, H. Yasura and S.Yajima., "High-speed VLSI multiplication algorithm with a redundant binary addition tree" Sept.1985. 11. Yum Kim, Bang-Sup Song, John Grosspietsch, and Steven F. Gilling, " A carry-free 54b x 54b multiplier using equivalent bit conversion

algorithm, " Oct. 2001.

1-3

2.

Authors: Sivakumar Ellappan, Prabhu Kishore, P. Suresh

Paper Title: A Study of Dual Fuel Operation on LHR Diesel Engine

Abstract: Importance of this investigation is 100% biodiesel make use as fuel for low heat rejection (LHR) diesel

engine. Due to this reason bio-fuels namely, eucalyptus oil and paradise oil were selected and used as dual fuel.

Conventional engine hardware parts were coated with lanthana-doped yttria-stabilized zirconia (the doping of YSZ

coatings with small amount of La2O3) with a thickness of 300 µm, so as to analyze the operating parameters of

paradise oil–eucalyptus oil blends. Tests run were replicated on the conventional diesel engine and outcomes were

compared. Test outcomes confirmed that the major intention of this research was attained as engine operating

parameters like, brake thermal efficiency, exhaust gas temperature were increase with decrease of fuel consumption. In

addition, engine emissions of HC, CO and smoke were reduced with exception of NOx for LHR diesel engine than

conventional engine.

Keywords: Lanthana-doped yttria-stabilized zirconia, paradise oil, Eucalyptus oil, Duel fuel, Emission.

References: 1. R.O. Dunn, Low-temperature flow properties of vegetable oil/cosolvent blend diesel fuels, J.Am. Oil Chem. Soc. 79 (2002) 709-715.

2. L.C. Meher, D. VidyaSagar, S.N. Naik, Technical aspects of biodiesel production by Transesterification - a review, Renew. Sustainable Energy

Rev. 10 (2006) 248-268.

3. A. Murugesan, C. Umarani, R. Subramanian, N. Nedunchezhian, Bio-diesel as an alternative fuel for diesel engines - a review, Renew. Sustainable Energy Rev. 13 (2009) 653-662.

4. F.Ma,M.A.Hanna, Biodiesel production-a review, Bioresour. Technol. 70 (1999) 1-15.

5. R. Senthil, E. Sivakumar, R. Silambarasan, Performance and emission characteristics of a low heat rejection engine using Nerium biodiesel and its blends, International Journal of Ambient Energy ISSN: 0143-0750, (2015), 38:2, 186-192.

6. Bhattacharyya S, Reddy CS. vegetable oils as fuels for internal combustion engines: a review. Silsoc Res Inst (1994), 57:157-66.

7. B. K. Venkanna & C. Venkataraman Reddy, Performance, Emission, and Combustion Characteristics of a Diesel Engine Running on Blends of Honne Oil and Diesel Fuel, International Journal of Green Energy, 2015, 12:7, 728-736.

8. D. John PanneerSelvam&K.Vadivel, An Experimental Investigation on Performance, Emission, and Combustion Characteristics of a Diesel

Engine Fueled with Methyl Esters of Waste Pork Lard and Diesel Blends, International Journal of Green Energy, 2013, 10:9, 908-923. 9. G. Lakshmi NarayanaRao, B. DurgaPrasad, S. Sampath& K. Rajagopal Combustion Analysis of Diesel Engine Fueled with Jatropha Oil Methyl

Ester - Diesel Blends, International Journal of Green Energy, 2007, 4:6, 645-658.

10. HasanSerin&NeslihanYucelAkar The Performance and Emissions of a Diesel Engine Fueled with Tea Seed (Camellia sinensis) Oil Biodiesel-Diesel Fuel Blends, International Journal of Green Energy, 2014,11:3, 292-301

11. P.K. Devan, N.V.Mahalakshmi, Utilization of unattended methyl ester of paradise oil as fuel in diesel engine,Fuel, 2009, 88, 1828-1833

12. P. Tamilporai, N.Baluswamy, Simulation and analysis of heat transfer in low heat rejection direct injection diesel engines using a two zone model, in: 3rd Asian e Pacific International Symposium on Combustion and Energy Utilization.

13. S. Jaichandar, P. Tamilporai, Low heat rejection engines - an overview, 2003-01-0405.

14. P.K. Devan, N.V.Mahalakshmi, A study of the performance, emission and combustion characteristics of a compression ignition engine using methyl ester of paradise oil-eucalyptus oil blends,Applied Energy, 2009, 86,675-680.

15. M. Matsumoto, H. Takayama, D. Yokoe, et al., Scripta Mater.54, 2006, 2035.

16. M. Matsumoto, T. Kato, N. Yamaguchi, et al., Surf.Coat.Technol. 203, 2009, 2835.

4-9

Page 5: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

17. Y. Liu, Y.F. Gao, S.Y. Tao, et al., J. Therm. Spray.Technol. 17, 2008, 603. 18. Y. Liu, Y.F. Gao, S.Y. Tao, et al., Surf. Coat.Technol. 203, 2009, 1014.

19. Venkata Rao, R.: Decision making in the manufacturing environment using graph theory and fuzzy multiple attribute decision making methods.

Vol. 2. Springer. Newyork (2012). 20. Dinesh Singh., Venkata Rao. R.: A hybrid multiple attribute decision making method for solving problems of industrial environment.

International journal of industrial engineering computations. 2, 631-644. (2011).

21. Saaty, T.L.The analytic hierarchy process. Mc Graw Hill. Newyork (1980).

22. Venkata Rao, R.: Decision making in the manufacturing environment using graph theory and fuzzy multiple attribute decision making methods.

Vol. 1, Springer, Newyork (2007).

3.

Authors: Arulananth T S, Pallavi Goud, Baskar M

Paper Title: Institutions - Industry – Society Collaborative Learning Bring Success in Engineering Education in India

Abstract: Education is one which is the continuous event which shifts the people or whole society from the dark to

light. From the past few decades’ education and educational methods made drastic changes in our real life. Teaching

and learning process has been made enormous growth in our society. Engineering education is literally different from

the general teaching learning scenario. In this world, whatever we are seeing, feeling and experiencing all except the

belongings from the nature are invented or innovated by engineering education. In the beginning of the era we are

unaware about engineering background also we are not finding answers for the basic questions which are raised in our

day to day life like why? how? what? when and where etc. But the engineering has proven that all uncertainties to the

world even though which are not close to the imagination. This growth happened in Indian engineering is not up to

comparable with worldwide growth. It is very clearly indicate that till we have to improve many things in our education

systems. Even though we are competent to produce multiple lakhs of engineers per year, they are not qualified for

availing the job directly. Many engineers are just fit in the job but that jobs are not relevant to their qualifications. Even

though we are following our own systems as well as western education system which will not satisfied our needs.

References: 1. Media Reports, Press Releases, Press Information Bureau, RNCOS Report, Department of Industrial Policy and Promotion (DIPP), Union Budget

2017-18

2. Crook, C. (2013). Varieties of "togetherness" in learning - and their mediation. In M. J. Baker, J. Andriessen & S. Järvelä (Eds.) Affective

Learning Together: social and emotional dimensions of collaborative learning, pp. 33-51. London: Routledge. 3. Détienne, F., Barcellini, F., Baker, M., Burkhardt, J-M., & Fréard, F. (2012). Online epistemic communities: theoretical and methodological

directions for understanding knowledge co-elaboration in new digital spaces. Work: A Journal of Prevention, Assessment and Rehabilitation,

41(1), 3511-3518. 4. Dillenbourg, P. (1999b). Introduction: what do you mean by "collaborative learning"? In P. Dillenbourg (Ed.) Collaborative learning: cognitive

and computational approaches, pp. 1-19. Oxford: Elsevier Science.

5. Baker, M. J. (2009). Intersubjective and intrasubjective rationalities in pedagogical debates: Realizing what one thinks. In B. Schwarz, T. Dreyfus & R. Hershkowitz (Eds.), Transformation of Knowledge through Classroom Interaction, pp. 145-158.

10-11

4.

Authors: Bhagya P, Mahesh P K

Paper Title: A Multimodal Bio-Cryptosystem as a Model against Spoofing Attacks

Abstract: With increased fraud happening, identity theft, and security attacks has becoming easier to spoof the

biometric. In addition to this cryptography as become one of the main concerns about the privacy of each human and

also have huge demand from public to promote a high standard secured system. Considering the main aspects of

privacy and spoofing, we presents a novel multimodal cryptosystem which is having high privacy and difficult to spoof.

The aim of this paper to provide a crypto-biometric system with anti-spoofing techniques with better data encryption

method, increasing the robustness and complexity.

Keywords: Bio-Cryptosystem, Multimodal biometric, Fusion level

References: 1. A. K. Jain, A. Ross, and S. Prabhakar, "An Introduction to Biometric Recognition", IEEE Transactions on Circuits and Systems for Video

Technology, vol. 14, pp. 4-19, 2004.

2. Christina-Angeliki Toli and Bart Preneel, "A Bimodal Veri?cation Cryptosystem as a Framework against Spoo?ng Attacks," International Journal of Intelligent Computing Research (IJICR), Infonomics Society, Volume 6-Issue 2, pp. 540 - 549, 2015.

3. Bhagya P, Dr. Mahesh P.K, "Crypto- Biometric using Substitution Encryption and Discrete Cosine Transformation for Secure Data

Communication", International conference on emerging research in Electronics and Communication Technology, ICERECT 2018, PES college

of Engineering, Mandya.

4. Bhagya P, Dr. Mahesh P.K, "An Efficient Approach to Fingerprint using Fuzzy Vault", in ICrtSIV 2015, Bangalore, Feb 2015, 10.3850/978-981-

09-6200-5_D-37. 5. U. Uludag and A. Jain, "Securing Fingerprint Template: Fuzzy Vault with Helper Data " in Proceedings of the 2006 Conference on Computer

Vision and Pattern Recognition Workshop IEEE Computer Society, 2006, pp. 163.

6. Y. Chung, D. Moon, S. Lee, S. Jung, T. Kim, and D. Ahn, "Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault" presented at Information Security and Cryptology, Beijing, China, 2005.

12-14

5.

Authors: B. Venkata Krishnaveni, K. Suresh Reddy, P. Ramana Reddy

Paper Title: Wireless Indoor Positioning Techniques Based on Ultra Wideband (UWB) Technology

Abstract: Indoor positioning is a challenging research area, and numerous varieties of indoor positioning systems

have been advanced based on specific technologies.Now a day, localization in indoor has appear as a tough

characteristic in lots of end person utilizations; which includes civilian, navy, catastrophe remedy. In evaluation to

outdoorarea, information of location in indoor needs a better accuracy and it is a tough assignment in element due to

numerous items return and scatterwave forms. Ultra Wideband (UWB) is acome upgeneration of indoor localization

and proven superior overall precisionin comparison to alternatives.

This paper affords an outline of indoor positioning solution primarily based on UWB technology. First, the theory,

standardization, and benefits of UWB had been added, followed by means of an in depth relativesurvey of UWB

localization techniques. For put down the degree for the effort, we offer an analysis of the modern technology in indoor

positioning, followed through an in depth comparative evaluation of UWB positioning technology. Dissimilar to prior

15-22

Page 6: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

work, this paper provides new classifications, evaluating main recent advances, and disputes for more investigation

through the studies.

Keywords: Indoor positioning, Ultra-wideband, UWB, Measuring techniques

References: 1. Hightower, J.; Borriello, G. Location systems for ubiquitous computing. IEEE Comput. 2001, 34, 57-66. 2. Liu, H.; Darabi, H.; Banerjee, P.; Liu, J. Survey of wireless indoor positioning techniques and systems. IEEE Trans. Syst. Man Cybern. Part C

Appl. Rev. 2007, 37, 1067-1080.

3. Gu, Y.; Lo, A.; Niemegeers, I. A survey of indoor positioning systems for wireless personal networks. Tutor. IEEE Commun. Surv. 2009, 11, 13-32.

4. Al-Ammar, M.; Alhadhrami, S.; Al-Salman, A.; Alari?, A. Comparative Survey of Indoor Positioning Technologies, Techniques, and

Algorithms. In Proceedings of the 2014 International Conference on Cyber worlds (CW), Santander, Spain, 6-8 October 2014; pp. 1-8. 5. Al Nuaimi, K.; Kamel, H. A survey of indoor positioning systems and algorithms. In Proceedings of the 2011 International Conference on

Innovations in Information Technology (IIT), IEEE Society, Abu Dhabi, United Arab Emirates, 25-27 April 2011; pp. 185-190.

6. Chóliz, J.; Eguizabal, M.; Hernandez-Solana, A.; Valdovinos, A. Comparison of Algorithms for UWB Indoor Location and Tracking Systems. In Proceedings of the 2011 IEEE 73rd Conference on Vehicular Technology Conference (VTC Spring), Budapest, Hungary, 15-18 May 2011; pp. 1-

5.

7. Siwiak, K.; McKeown, D. Ultra-Wideband Radio Technology; John Wiley & Sons, Ltd: Newark, NJ, USA, 2005. 8. Arias-de Reyna, E.; Mengali, U. A maximum likelihood UWB localization algorithm exploiting knowledge of the service area layout. Wirel.

Pers. Commun. 2013, 69, 1413-1426.

9. Segura, M.; Mut, V.; Sisterna, C. Ultra wideband indoor navigation system. IET Radar Sonar Navig. 2012, 6, 402-411. 10. Krishnan, S.; Sharma, P.; Guoping, Z.; Woon, O. A UWB based localization system for indoor robot navigation. In Proceedings of the IEEE

International Conference on Ultra-Wideband, ICUWB 2007, Singapore, 24-26 September 2007; pp. 77-82.

11. Kuhn, M.; Mahfouz, M.; Turnmire, J.; Wang, Y.; Fathy, A. A multi-tag access scheme for indoor UWB localization systems used in medical environments. In Proceedings of the 2011 IEEE Topical Conference on Biomedical Wireless Technologies, Networks, and Sensing Systems (Bio

Wire leSS), Phoenix, AZ, USA, 16-19 January 2011; pp. 75-78.

12. Subramanian, A. UWB Linear Quadratic Frequency Domain Frequency Invariant Beam forming and Angle of Arrival Estimation. In Proceedings of the IEEE 65th Vehicular Technology Conference, VTC2007-Spring, Dublin, Ireland, 22-25 April 2007; pp. 614-618.

13. Gerok, W.; El-Hadidy, M.; El Din, S.; Kaiser, T. In?uence of the real UWB antennas on the AoA estimation based on the TDoA localization

technique. In Proceedings of the 2010 IEEE Middle East Conference on Antennas and Propagation (MECAP), Cairo, Egypt, 20-22 October 2010; pp. 1-6.

14. Dardari, D.; Conti, A.; Ferner, U.; Giorgetti, A.; Win, M.Z. Ranging with ultra wide band width signals in multi path environments. IEEE Proc.

2009, 97, 404-426. 15. Kok, M.; Hol, J.D.; Schon, T.B. Indoor positioning using ultra wide band and inertial measurements. IEEE Trans. Veh. Technol. 2015, 64, 1293-

1303.

16. Rowe, N.; Fathy, A.; Kuhn, M.; Mahfouz, M. A UWB transmit-only based scheme for multi-tag support in a millimeter accuracy localization system. In Proceedings of the 2013 IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet), Austin,TX, USA, 20-23

January 2013; pp.7-9.

17. Leitinger, E.; Meissner, P.; Rudisser, C.; Dumphart, G.; Witrisal, K. Evaluation of Position-Related Information in Multipath Components for Indoor Positioning. IEEE J. Sel. Areas Commun. 2015, 33, 2313-2328.

18. Porcino, D.; Hirt, W. Ultra-wideband radio technology: potential and challenges ahead. IEEE Commun. Mag. 2003, 41, 66-74.

19. Garcia, E.; Poudereux, P.; Hernandez, A.; Urena, J.; Gualda, D. A robust UWB indoor positioning system for highly complex environments. In

Proceedings of the 2015 IEEE International Conference on Industrial Technology (ICIT), Seville, Spain, 17-19 March 2015; pp. 3386-3391.

20. Pittet, S.; Renaudin, V.; Merminod, B.; Kasser, M. UWB and MEMS based indoor navigation. J. Navig. 2008, 61, 369-384.

21. Gigl, T.; Janssen, G.; Dizdarevic, V.; Witrisal, K.; Irahhauten, Z. Analysis of a UWB Indoor Positioning System Based on Received Signal Strength. In Proceedings of the 4th Workshop on Positioning, Navigation and Communication, WPNC '07, Hannover, Germany, 22 March 2007;

pp. 97-101.

22. Leitinger, E.; Fröhle, M.; Meissner, P.; Witrisal, K. Multipath-assisted maximum-likelihood indoor positioning using UWB signals. In Proceedings of the 2014 IEEE International Conference on Communications Workshops (ICC), Sydney, Australia, 10-14 June 2014; pp. 170-

175. 23. Wymeersch, H.; Lien, J.; Win, M.Z. Cooperative localization in wireless networks. IEEE Proc. 2009, 97, 427-450.

6.

Authors: C. Durga Sruthi, B. Dilip Kumar Reddy

Paper Title: Deep Stock Prediction using Visual Interpretation: DeepClue

Abstract: This proposed paper builds Deep Clue system that links text related models, final users using visual

interpretation. We try to implement following modules in this paper. 1.Designing an architecture for a 'deep neural

network' used for interpretation and we apply algorithms to give similar relevant factors. 2.By exploring different levels

of predictive(relevant) factors and visualizing them that can be interacted by the end users at different factor-levels.

Interpretation method differentiates the predicted and unpredicted values of stock price. 3.We examine visualization

integrated systems using some real-world scenarios like tweeter data, financial news data and obtained stock price

values by predictions. The effective working of Deep Clue helps for proper investment in stocks and to analyses tasks.

Keywords: Deep Clue, stck market, Text Based Visualization, Neural Network

References: 1. A. Dosovitskiy and T. Brox, "Inverting visual representations with convolutional networks," arXiv:1506.02753, 2015.

2. DeepClue: Visual Interpretation of Text-based Deep Stock Prediction

3. Lei Shi ; Zhiyang Teng ; Le Wang ; Yue Zhang ; Alexander Binder 4. .https://en.wikipedia.org/wiki/Deep_learning

5. C. Kearney and S. Liu, "Textual sentiment in finance: A survey of methods and models," International Review of Financial Analysis, vol. 33, pp.

171- 185, 2014. 6. https://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/cs11/report.html

23-24

7.

Authors: G. Sunil Santhosh Kumar, M. Neelakantappa, K.V. Rameswara Reddy

Paper Title: Advanced Mechanisims for Detection of Malware Family Attacks in Computer Networks

Abstract: Computer Networks are one of the fastest growing areas of research in this era.Security is an indispensable

need for all the type of networks i.e wired and wireless network communications. There are a wide variety of malware

and attacks that target the weakness of network. In this paper we have focused on malware which is most vulnerable

25-27

Page 7: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

and is prone to attacks.we tried to address some malware detection methods.

Keywords: Ransomeware, spyware, adware, virusTrojan, Botnet, Zbot, GhostMirai, Redyms,

References: 1. Zhao Hengli, Xu Ming, Ning Zheng, Yao Jingjing, Q. Ho, "Malignant Executables Classification Based on Behavioral Factor Analysis",

introduced at the 2010 International Conference on e-Education e-Business e-Management and e-Learning, 2010. 2. Wikipedia. Tempest botnet, [online] Available: http://en.wikipedia.org/wiki/Storm_botnet.

3. 3.F.- S. Enterprise, F-Secure Reports Amount of Malware Grew by 100% amid, 2007, [online]Available: http://www.f-secure.comlf-

secure/pressroornlnews/fs_news_20071204_1_eng.html. 4. J. Stewart, "Behavioural malware analysis using Sandnets", Computer Fraud & Security, vol. 2006, pp. 4-6, December 2006.

5. H. D. Huang, T. Y. Chuang, Y. L. Tsai, C. S. Lee, "Ontology-based Intelligent System for Malware Behavioral Analysis", presented at the 2010

IEEE World Congress on Computational Intelligence (WCCI2010), 2010. 6. C. Willems, T. Holz, F. Freiling, "Toward automated dynamic malware analysis using CWSandbox", IEEE Security & Privacy, vol. 5, pp. 32-39,

2007.

7. A. Vasudevan, "MalTRAK: Tracking and Eliminating Unknown Malware", presented at the Computer Security Applications Conference 2008. ACSAC 2008, 2008..

8. "Practical malware analysis" by Michael sikorski

9. "Cuckoo Malware Analysis"by iqbalmuhardianto 10. "Tools and techniques for defending with malware" by Michael hale

11. "Malware detection and threats made easy" by solis tech.

12. "Malware data science" by Joshua saxe

8.

Authors: J. Swami Naik, N. Kasiviswanath,K. Ishthaq Ahamed,S. Raghunath Reddy

Paper Title: A Survey on Traffic Flow Prediction with Deep Learning Algorithms on Big Data

Abstract: Correct and very much planned activity stream data is vital for the fruitful arrangement of astute

transportation frameworks. In the course of the most recent couple of years, activity information have been report, and

we have truly entered the period of huge information for transportation. Existing movement stream expectation

strategies for the most part utilize shallow activity forecast models and square measure as yet frustrating for a few

genuine world applications.The objective of the smart transportation framework (ITS) is utilizing the correspondence

framework to entirely consolidate the vehicle arrangement of individuals, vehicles and street. Propelled movement

control framework and dynamic activity the executives framework are required to give real time activity stream data.

The conventional movement stream show is named the activity stream state variables(velocity, thickness and stream)

with the correction of your time and area.Traffic stream examination is essential research idea in the transportation

framework. Deep Learning is a type of machine learning used to anticipate movement flow.This circumstance moves us

to take the activity stream expectation issue dependent on profound design models with enormous activity information.

Keywords: Traffic flow prediction,Deep learning,Learning algorithms,Intelligent transportaion system,Artificial

neural network.

References: 1. SelvarajVasanthaKumar,Traffic Flow Prediction using Kalman Filtering Technique, Elsevier, 2017.

2. Yuhan Jia,1,2 Jianping Wu,1 and Ming Xu1,Traffic Flow Prediction with Rainfall Impact Using a Deep Learning Method, Journal of Advanced

Transportation, 2017. 3. HongsukYi, HeeJin Jung, SanghoonBae, Deep Neural Networks for Traffic Flow Prediction0,IEEE,2017

4. Dawei Chen, Research on Traffic Flow Prediction in the Big Data Environment Based on the Improved RBF Neural Network. IEEE Transactions

on Industrial Informatics, 2017 5. Nicholas G. Polson, Deep Learning for Short-Term Traffic Flow Prediction, arXiv,2017.

6. MinalDeshpande, Performance Improvement of Traffic Flow Prediction Model using Combination of Support Vector Machine and Rough Set,

International Journal of Computer Applications, 2017 7. Xianyao Ling, XinxinFeng, Zhonghui Chen, YiwenXu, HaifengZheng, Short-term Traffic Flow Prediction with Optimized Multi-kernel Support

Vector Machine. IEEE congress on Evolutionary Computation. 2017.

8. Hongxin Shao, Boon-Hee Soong, Traffic flow prediction with Long Short-Term Memory Networks (LSTMs),IEEE, 2016. 9. Yuhan Jia, Jianping Wu, and Ming Xu,Traffic Flow Prediction with Rainfall Impact Using a Deep Learning Method,Journal of Advanced

Transportation, 2017.

10. SivabalajiManoharan, Short Term Traffic Flow Prediction Using Deep Learning Approach, National College of Ireland, 2016. 11. Vedat TOPUZ, Hourly Traffic Flow Predictions by Different ANN Models,www.intechopen.com,2010.

12. Wenhao Huang,Haikun Hong,Man Li, Weisong Hu,Guojie Song,Kunqing Xie, Deep Architecture for TrafficFlow Prediction, springer 2013.

13. Wusheng Hu, Yuanlin Liu,The short-term traffic flow prediction based on neural network,IEEE, 2010. 14. Kranti Kumara *, M. Paridab, V.K. Katiyar, Short term traffic flow prediction for a non-urban highway using Artificial Neural Network,Elsevier,

2013.

15. Hua-pu Lu, Zhi-yuan Sun, and Wen-congQu, Big Data-Driven Based Real-Time Traffic Flow State Identification and Prediction, Hindawi,2015. 16. Kang kai, hanjinfeng,Short-term traffic flow prediction based on grid computing pool model, IEEE,2010.

17. Felix Kunde Alexander Hartenstein Stephan Pieper Petra Sauer, Traffic prediction using a Deep Learning paradigm, CEUR-WS.org, 2017.

18. Yuanfang Chen, Falin Chen, YizhiRen, Ting Wu, Ye Yao, DeepTFP: Mobile Time Series Data Analytics based Traffic Flow Prediction,arXiv:1710.01695,2017.

19. Xiaolei Ma, ZhuangDai, Zhengbing He, Jihui Ma, Yong Wang and Yunpeng Wang, Learning Traffic as Images: A Deep Convolutional Neural

Network for Large-Scale Transportation Network Speed Prediction, sensors, 2017. 20. ChengchengXu,&Wei Wang, Short-term traffic flow prediction using a methodology based on autoregressive integrated moving average and

genetic programming,Transport, 2016.

21. AriefKoesdwiady, RidhaSoua, and FakhriKarray, Improving Traffic Flow Prediction With Weather Information in Connected Cars: A Deep Learning Approach, IEEE Transactions on Vehicular Technology, 2015.

22. Qiang Shang, Ciyun Lin, ZhaoshengYang, Qichun Bing, Xiyang Zhou, A Hybrid Short-Term Traffic Flow Prediction Model Based on Singular Spectrum Analysis and Kernel Extreme Learning Machine, 2016.PLOSONE,journal.pone.

23. Zhiyuan Ma andGuangchunLuo, Dijiang Huang, Short Term Traffic Flow Prediction Based on On-line Sequential Extreme Learning Machine,

International Conference on Advanced Computational Intelligence,2016.

24. Haiyang Yu, Zhihai Wu, Shuqin Wang, Yunpeng Wang and Xiaolei Ma, Spatiotemporal Recurrent Convolutional Networks for Traffic

Prediction in Transportation Networks, sensors, 2017.

25. YishengLv,YanjieDuan,Wenwen Kang,Zhengxi Li, Fei-Yue Wang,Traffic Flow Prediction With Big Data: A Deep Learning Approach,IEEE Transactions on intelligent Transportation Systems,2015.

28-33

Page 8: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

9.

Authors: M.Padma, N. KasiViswanath, T.Swathi

Paper Title: Blockchain for IoT Application: Challenges and Issues

Abstract: Since from the last decade, Blockchain technology has developed a new crypto-economy and has been

converting the financial industry. Reliability, persistence, scalability, the power of enduring is factors of an IoT

solution. On the other hand, Blockchain is an experimental and investigational type of technology, and not proven.

Blockchain burns up and then face the problems while IoT solutions, once deployed, are handled for years. The main

motivational ideas i.e. decentralized trust and distributed record are capable of distributed and the large-scale Internet of

Things (IoT) applications. Moreover, in this domain, the uses of Blockchain beyond crypto-currencies are very less and

far due to the lack of acceptance and integral framework challenges. In this paper, we illustrate the opportunities for

uses of Blockchain of IoT and study the concern challenges and issues in Blockchain based IoT applications.

Index Terms: Blockchain Technology, Internet of Things (IoT), crypto-economy.

References: 1. S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash system," 2008.

2. N. Szabo, "Smart contracts," Unpublished manuscript, 1994.

3. C. Bormann, M. Ersue, and A. Keranen, "Terminology for constrained-node networks," Internet Requests for Comments, RFC Editor, RFC 7228, May 2014, http://www.rfc-editor.org/rfc/rfc7228. Txt. [Online]. Available: http://www.rfc-editor.org/rfc/rfc7228.txt

4. (2018) Running a full node. https://bitcoin.org/en/full-node# minimum-requirements.

5. T. Project. [Online]. Available: https://www.torproject.org/.

6. de Montjoye, Yves-Alexandre, et al., "openpds: Protecting the privacy of metadata through safeanswers," PloS one 9.7 (2014).

7. Jøsang, Audun, and Jochen Haller., "Dirichlet reputation systems," in Availability, Reliability and Security, 2007. ARES 2007. The Second

International Conference on., 2007. 8. https://datafloq.com/read/iot-and-blockchain-challenges-and-risks/3797

9. http://naveenbalani.com/index.php/2016/07/blockchain-and-enterprise-iot/.

34-37

10.

Authors: Mallari Vijay Kumar, P.N.V.S. Pavan Kumar

Paper Title: A Study on Different Phases and Various Recommendation System Techniques

Abstract: Now-a-days, recommender systems(RS)are playing a crucial role in human tasks. The online websites like

movies, restaurants, education and much more, uses the recommender systems to suggest the customers for E-

commerce. Recommender systems make money by attracting users with recommendations. Each system may use

different datasets from various sources to analyze the user behavior and to find interesting patterns that predict the

user’s future purchase or taste. Most of the times lack of data results to the inappropriate recommendations (means bad

recommendations). This paper reviews different phases involved in implementing RS and various recommender

methods including the study of thosemethods that are used in several papers of various authors. We also included the

advantages and disadvantages of each method. Finally, this paper also gives analyses of various challenges and issues

(problems) faced in the implementation of RS algorithms.

Index Terms: phases, collaborative filtering, content-based filtering, hybrid filtering, problems.

References: 1. Schafer, J. Ben. "Application of Data Mining to Recommender Systems." Encyclopedia of Data Warehousing and Mining, 2015, pp. 345-353.,

doi:10.4018/9781591405573.ch009.

2. Francesco Rikki, et al. "Recommender Systems Handbook." Recommender Systems Handbook, 2011, pp. 1-845., doi:10.1007/978-0-387-85820-3.

3. Isinkaye, F.o., et al. "Recommendation Systems: Principles, Methods and Evaluation." Egyptian InformaticsJournal, vol. 16, no. 3, 2015, pp. 261-

273., doi:10.1016/j.eij.2015.06.005. 4. Patel, Bansari, et al. "Methods of Recommender System: A Review." 2017 International Conference on Innovations in Information, Embedded

and Communication Systems (ICIIECS), 2017, doi:10.1109/iciiecs.2017.8275856.

5. https://en.wikipedia.org/w/index.php?title=Recommender_system&oldid=86592141 6. Saha, Tanwistha, et al. "Journey to planet Datum and Beyond: Coursera-Introduction to recommender systems." Encyclopedia of Social Network

Analysis and Mining, 2017, pp. 1-12., doi:10.1007/978-1-4614-7163-9_110164-1.

7. Chu, Pang-Ming, and Shie-Jue Lee. "A Novel Recommender System for E-Commerce." 2017 10th International Congress on Image and Signal

Processing, BioMedical Engineering and Informatics (CISP-BMEI), 2017, doi:10.1109/cisp-bmei.2017.8302310.

38-41

11.

Authors: P. Nagabhushan Reddy, T. Bhaskara Reddy

Paper Title: Latest Power Management Technologies for Mobile Computing Devices

Abstract: Windows Modern Standby (MS) is the modern Power Management model that enables the Smart phone

like power management and responsiveness on laptops, personal computers. Modern standby provides enriched user

experience similar to the modern smart phones. The new power management model (Connected standby) allows system

to be connected while in standby there by saving the power. With Modern Standby, the system responds quickly, even

while in standby, whenever there is a valid wake events.

Index Terms: Connected Standby, Intel Platform, Personal Computers, Runtime Power Management

References: 1. Intel, Microsoft, and Toshiba. Advanced configuration and power interface specification. http://www.intel.com/ial/powermgm/specs.html, 1996.

2. T. Simunic, L. Benini and G. De Micheli, "Power Management of Laptop Hard Disk", Proceedings of DATE, p.736, 2000

3. T. Simunic, L. Benini, and G. D. Micheli. Event-driven power management. In International Symposium on System Synthesis, pages 18-23, 1999.

4. A. V. Ramesh, S. M. Reddy and D. K. Fitzsimmons, "Airplane system design for reliability and quality," 2018 IEEE International Reliability

Physics Symposium (IRPS), Burlingame, CA, USA, 2018. 5. https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/introduction-to-modern-standby-testing

42-44

Page 9: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

6. Advanced Configuration and Power Interface Specification, Version 5.November 2013. 7. IEEE Standard for Test Access Port and Boundary-Scan Architecture - Redline," in IEEE Std 1149.1-2013 (Revision of IEEE Std 1149.1-2001) -

Redline, vol., no., pp.1-899, May 13 2013.

8. https://software.intel.com/en-us/articles/power-management-states-p-states-c-states-and-package-c-states

12.

Authors: Sriram Konduru, Sai Sushmitha Batchu,Geethika Parvataneni, Dr. Chejarla Venkata Narayana

Paper Title: Semi-Automation of Libraries

Abstract: In this paper we deal with the library management system. From the ancient times there are numerous

updating’s in the system but with the current trends in technology a semi-automated system is what we propose to

minimize the time usage and lessen the cost burden for the institutions or the government to maintain the libraries in a

most efficient manner. Like railways we will also make a self-issue counter for the library books. This will lessen the

time for searching and issuing of the book from the libraries.

Keywords: Technology, Library, Automation, Efficient.

References: 1. Bailey, N. R., Scerbo, M. W., Freeman, F. G., Mikulka, P. J., & Scott, L. A. (2003). Brain-based adaptive automation system and situation

awareness: The role of complacency potential. In Proceedings of the Human Factors and Ergonomics Society 47th Annual Meeting (pp. 1048-1052).

2. Billings, C. E. (1997). Aviation automation: The search for a human-centered approach. Mahwah, NJ: Lawrence Erlbaum. Bolstad, C. A., &

Endsley, M. R. (2000). 3. The effect of task load and shared displays on team situation awareness. In Proceedings of the Human Factors and Ergonomics Society 44th

Annual Meeting (pp. 189-192).

4. Chiou, E. K., & Lee, J. D. (2016). Cooperation in human agent systems to support resilience: A microworld experiment. Human Factors, 58, 846-863.

5. Endsley, M. R. (1996). Automation and situation awareness. In R. Parasuraman & M. Mouloua (Eds.), Automation and human performance: Theory and applications (pp. 163-181).

45-48

13.

Authors: S.Gunasekharan, D.Elangovan, M.Maheswari

Paper Title: Identification of Serious Success Factors to Implement Lean Manufacturing in Indian Middle Scale

Industries

Abstract: The MSMEs are acknowledged as the heart of economic development of a country. The MSMEs are

struggling a lot to withstand in the globalized market without adopting the pioneering move towards in their work. To

increase the efficiency of the organization and eliminate wastes, it is proposed to implement lean manufacturing. It acts

as one of the tool to make a company to sustain. To implement this tool, there are lots of problems faced by the

companies.

Thus the factors which turn as the barriers to implement lean in middle scale manufacturing is recognized through the

real time field study with well-defined form and views from the lean advisors. The top 11 serious success issues such as

durable management and headship, confrontation to change or institute philosophy, worker faith, services and

knowledge, financial abilities, active communication, recital measures, education and training, planning and strategy,

thinking growth and customer focus are identified as the barriers to contrivance lean in middle scale industries.

Keywords: MSMEs, Lean manufacturing, Serious success factors.

References: 1. Achanga, Pius Coxwell, et al. "Lean manufacturing for SMEs: enabling rapid response to demand changes." (2005).

2. S.Gunasekharan, D.Elangovan and P.Parthiban, "Serious Success Factors for Implementation of Lean and Green in Middle Scale Manufacturing Industries", Applied Mechanics and Materials Vols. 592-594 (2014) pp 2588-2595.

3. Bhasin, Sanjay, and Peter Burcher. "Lean viewed as a philosophy." Journal of manufacturing technology management 17.1 (2006): 56-72.

4. Browning, Tyson R., and Ralph D. Heath. "Reconceptualizing the effects of lean on production costs with evidence from the F-22 program." Journal of Operations Management 27.1 (2009): 23-44.

5. Cezar Lucato and Wagner, "Performance evaluation of lean manufacturing implementation in Brazil." International Journal of Productivity and

Performance Management 63.5 (2014): 529-549. 6. S.Gunasekharan, D.Elangovan and P.Parthiban, "A Comprehensive Study to Evaluate the Serious success Factors Affecting Lean concept in

Indian manufacturing Industries", Applied Mechanics and Materials Vols. 592-594 (2014) pp 2569-2576.

7. Diaz-Elsayed, Nancy, et al. "Investigation of lean and green strategies by simulation of manufacturing systems in discrete production environments." CIRP Annals-Manufacturing Technology 62.1 (2013): 475-478.

8. Fullerton, Rosemary R., Cheryl S. McWatters, and Chris Fawson. "An examination of the relationships between JIT and financial

performance."Journal of Operations Management 21.4 (2003): 383-404. 9. Narasimhan, Ram, Morgan Swink, and Soo Wook Kim. "Disentangling leanness and agility: an empirical investigation." Journal of operations

management 24.5 (2006): 440-457.

49-52

14.

Authors: T.Srinivas Reddy

Paper Title: Analysis and CDNA Microarray Image Segmentation Based on Hough Circle Transform

Abstract: The investigation of cDNA microarray image involves of several steps; gridding, segmentation, and

quantification that can meaningfully reduce the quality of gene expression data, and henceforth decrease our self-

reliance in any derived research consequences. Circular Hough Transformation (CHT) is a powerful feature extraction

system used in image analysis, computer vision, and digital image processing. CHT algorithm is applied on the cDNA

microarray images to progress the exactness and the efficiency of the spots localization, addressing and segmentation

process. Thus, microarray data processing steps turn out to be serious for execution of optimal microarray data analysis

and developing assured biological data from microarray images. Segmentation is the method, by which each distinct

cell in the grid must be cautiously selected to define the spot indication and to estimate the background hybridization. In

this paper, a suggested segmentation method is explored, “Adaptive Form Segmentation”.

53-55

Page 10: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

Keywords: Hough circle transformation, cDNA microarray image analysis, cDNA microarray image segmentation,

spots localization

References: 1. Fenstermacher D. Introduction to Bioinformatics, Journal of the American Society for Information Science and Technology, 56 (5), 440-446,

(2005).

2. Abdul Ahad H. Biometrics-The Human Password, JITPS, 1 (1), 29-42, (2010).

3. Chee M., Yang R. and Hubbell E., Accessing genetic informationof DNA arrays, Science, 610-614, (1996).

4. Y. H. Yang, M. M. Buckley, S. Dudoit, and T. Speed, "Comparison of methods on cDNA microarray data," J. Compo Graph. Stat., pp.1 08-136, (2002).

5. Ye R., Wang T., Bedzyk L. , Croker K., Applications of DNA microarrays in microbial systems, Journal of Microbiological Methods, 47, 257-

272, (2001). 6. N. Giannakeas, F. Kalatzis, M. G. Tsipouras, and D. I. Fotiadis, Spot addresses for microarray images, Computers methods and programs in

biomedicine, 106 (1), 1-13, (2012).

7. J. D. and Thomas T.,Instinctive Gridding of DNA Microarray Images using Optimal Subimage, International Journal of Recent Trends in Engineering ,1 (4), (2009).

8. Rueda L. and Rezaeian I. A fully automatic gridding method for cDNA microarray images, BMC Bioinformatics, 12-113, (2011).

9. N. Giannakeas and D. I. Fotiadis, An automated method for clustering-based segmentation of cDNA microarray images, Computerized Medical Imaging 33, 40-49, (2009).

10. Karim R., Mahmud S., A review of image analysis techniques for gene spot identification in cDNA Microarray images, International Conference

of Next Generation Information Technology, (2011). 11. A. Ahmed, M. Vials, NG. Iyer, C. Caldas, JD. Brenton, Microarray segmentation methods, Nucleic Acids Res. 32, 50-58, (2004).

12. Y. Chen, E.R. Dougherty, and M.L. Bittner, "Ratio-Based Decisions and the Quantitative Analysis of cDNA Microarray Images, Journal Of

Biomedical Optics vol.2(4), pp.364-374, (1997). 13. M.J. Buckley, Spot User's Guide, CSIRO Mathematical and Information Sciences, Sydney, Australia, (2000).

14. K.I. Siddiqui, A. Hero, and M. Siddiqui, Mathematical Morphology applied to Spot Segmentation and Quantification of Gene Microarray

Images, Asilomar conference on Signals and Systems, (2002). 15. D. Bozinov, and J. Rahnenfuhrer, Unsupervised technique for robust target separation through adaptive pixel clustering, Bioinform,, vol. 18, pp.

747-756, (2002).

16. E. Ergüt, Y. Yardimci, E. Mumcuoglu, O. Konu, Analysis of microarray images using FCM and K-means clustering algorithm, in Proc IJCI, pp.116-121, 2003.

17. W. Shuanhu and H. Yan, Microarray Image Handling Based on Grouping, The First Asia-Pacific bioinformatics conference on Bioinformatics -

Australia, (19), 111-118, (2003).

15.

Authors: Yogesh Madaria, Vijay Kanjarla

Paper Title: Effectiveness of a Dimpled Non-Even Surface For Oscillations Control For Flow Over Fissure: Numerical

Analysis

Abstract: To decay the pressure oscillation in the flow above an open crater, a passive control method, namely

introduction of a dimpled non-even surface, is attempted. This paper presents the numerical analysis of the above

system, which was undertaken to govern the effectuality of the said control modem. This work focuses on an open

fissure with the length-to-depth ratio in proportions of 1: 2. To check the oscillation persuaded in the flow, a textured

non-even surface is fitted at the upstream of the crater. The even and dimpled non even cases are compared for the flow

instability and noise around fissure. Large eddy simulation coupled with acoustic model is utilized as a tool for this. The

results obtained for even cases were compared with available experimental and computation data. On the basis of flow

visualizations, it can be said that introduction of dimpled non-even surface upstream was significantly effective in

suppressing the oscillations in fissure flow. Based on the comparison of flow filed structure in the even and dimpled

non-even cases, the control mechanism of void oscillation technique is evaluated.

Keywords: fissure flow oscillation, passive control, numerical simulation, dimpled non-even surface.

References: 1. Chang, K., Constantinescu, G.., and Park, S.O., 2006, "Analysis of the flow featured mass transfer processes for the incompressible flow past an

open fissure with a laminar and a fully turbulent incoming boundary state", J. Fluid Mech., Vol. 561, pp 113-145. 2. Rowley C, Williams R. Dynamics of high-Reynolds-number flow . Annu Rev Fluid Mech 2006;38:251-76.

3. Williams DR, Cornelius D, Rowley CW. Supersonic fissure response on open loop forcing. Active Flow Control Notes Numer Fluid Mech

Multidiscip Des 2007;95:230-43. 4. Alam MM, Matsuo S, Teramoto K, Setoguchi T, Kim HD. A computational control of fissure-induced pressure oscillations using subfissure. J

Therm Sci 2006;15(3):213-9.

5. Wang YP, Lee SC, Li KM, Gu Z, Chen J. Combined experimental and numerical study of flow over fissure and its application . ACTA Acust United Acust 2012;98(4):600-11.

6. Chokani N, Kim I. Suppression of pressure oscillations in an open fissure by passive pneumatic control. AIAA 91-1729, 1991.

7. Sarno R, Franke M. Suppression of flow-induced pressure oscillations in craters. J Aircr 1994;31(1):90-6. 8. Stallings RL, Plentovich EB, Tracy MB, Hemsch MJ. Effect of passive venting on static pressure distributions in transonic speeds. NASA

Technical Memorandum 4549, 1994.

9. Zhang X, Chen X, Rona A, Edwards J. Attenuation of fissure flow oscillation through leading edge flow control. J Sound Vib 1999;221(1):23-47. 10. Ukeiley LS, Ponton MK, Seiner JM, Jansen B. Suppression of pressure loads in fissure flows. AIAA J 2004;42(1):70-9.

11. Li W, Taku N, Kozo F. Noise control of supersonic fissure flow with upstream mass blowing. Progress in hybrid RANS-LES modeling notes on

numerical fluidmechanics, vol. 117. p. 315-24. 12. [18] Alam MM, Matsuo S, Teramoto K, Setoguchi T, Kim HD. A new method of controlling fissure-induced pressure oscillatons using sub-

fissure. J Mech Sci Technol 2007;21:1398-407.

13. Alam F, Steiner T, Chowdhury H, Moria H, Khan I, Aldawi F, et al. A study of golf ball aerodynamic drag. Proc Eng 2011;13:226-31. 14. Lienhart H, Breuer M, Köksoy C. Drag reduction by dimples? A complementary experimental/numerical investigation. Int J Heat Fluid Flow

2008;29 (3):783-91.

15. Tian LM, Ren LQ, Liu QP, Han ZW, Jiang X. The mechanism of drag reduction around bodies of revolution using bionic non-even surfaces. J Bionic Eng 2007;4(2):109-16.

56-60

16.

Authors: K.Yogitha Lakshmi, S.Dhanalakshmi, B.G.Obula Reddy

Paper Title: An Overview of Data Management in Cloud Computing

Abstract: As we all familiar with cloud computing, it’s not a latest technology, rather we can mention it as an 61-64

Page 11: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

emerging technology where most of the industry is trying to store not only its crucial data for redundancy but also

looking for the service management. In that scenario first thing comes in mind is management of data in most efficient

way possible. So here we tried to showcase two technologies of cloud data management namely Cloud BigTable and

Cloud DataStore which they have their own way of working environments. It makes so much importance to choose the

right technology for the right nature of work.

Keywords: Cloud Storage, Data Management, Virtualization, Google File Systems, Data Store

References: 1. Hamlen, K. Kantarcioglu, M. Khan, L. Thuraisingham, B. (2010). Security Issues for Cloud Computing.International Journal of Information

Security and Privacy, 4(2), 36-48.

2. Bernardo Ferreira, Henrique Domingos (2012). Management and Search of Private Data on Storage Clouds.Center for Informatics and Information Technologies.SDMCMM'12, December 3-4, 2012, Montreal, Quebec, Canada.

3. RizwanMian, Patrick Martin (2012). Executing data-intensive workloads in a Cloud.ACM International Symposium on Cluster 2012 12th

IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. 4. Xiao-Bai Li, SumitSarkar (2006). Privacy Protection in Data Mining: A Perturbation Approach for Categorical Data Information Systems

Research. (17) 3, 254-270

5. Iyengar, V. S. (2002). Transforming data to satisfy privacy constraints. Knowledge Discovery DataMining.ACM Press, New York, 279-288. 6. Daniel J. Abadi (nd) Data Management in the Cloud: Limitations and Opportunities. IEEE Computer Society Technical Committee on Data

Engineering

7. B. Siddhisena, Lakmal Wruasawithana, Mithila Mendis, ?Next generation muti tenant virtualization cloud computing platform?, In: Proceedings of 13th International conference on advanced communication technology(ICACT), vol. 12, no.3; 2011. p.405-10.

8. Z. Xiao and Y. Xiao, ?Security and Privacy in Cloud Computing?, IEEE Communications Surveys & Tutorials, vol. 15, no. 2, pp. 843-859, 2013.

9. Sunilkumar S.Manvi, Gopal Krishna Shyam, "Resource anagement for Infrastructure as a Service(IaaS) in cloud computing: A survey", Journal

of Network and Computer Applications 41, (2014) 424-440.

10. Chase JS, Darrell C Anderson, Prachi N Thakar, Amin M Vahdat, ?Managing energy and server resources in hosting centers?, In: Proceedings of 11th IEEE/ACM international conference on grid computing (GRID), vol.12, no.4; 2010. p.50-2.

11. B. Urgaonkar, P. Shenoy, A. Chandra, P. Goyal, T. Wood, ?Agile dynamic provisioning of multi-tier Internet applications?, ACM Trans Auton

Adaptive Syst 2010; 5 (5):139-48. 12. Vaquero LM, Luis Rodero-Merino, Rajkumar Buyya, ?Dynamically scaling applications in the cloud?, In: Proceedings of the ACM SIGCOMM

computer communication review, vol.41, no.1; 2011. p.45-52.

17.

Authors: R. P. Ram Kumar, R. Jayakumar, A. Sankaridevi

Paper Title: Apriori-based Frequent Symptomset Association Mining in Medical Databases

Abstract: Nowadays, healthcare organizations generate large volumes of data. An automatic way of retrieval is

necessary when the volume of data is increased. Data mining is becoming very popular and has extensively used in

various Healthcare organizations. With the use of various data mining algorithms, it is possible to extract many useful

patterns. Data mining applications can highly benefit various parties in Healthcare organization. This paper proposes to

enable healthcare organizations by predicting the number of patients affected by certain diseases with respect to their

symptoms in medical databases. The pharmacists can use this discovered knowledge and avoid the run out of required

drugs, so that the patients can be treated at the right time.

References: 1. Dhanya P Varghese and Tintu P B, "A survey on health data using data mining techniques", International Research Journal of Engineering and

Technology, Vol. 2, No. 7, pp. 713-720, 2015.

2. Ilayaraja & T. Meyyappan, "Mining medical data to identify frequent diseases using apriori algorithm", In Proceedings International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp. 194-199, 21-22 February, 2013.

3. Sheenal Patel and Hardik Patel, "Survey of data mining techniques used in healthcare domain", International Journal of Information Sciences and Techniques (IJIST) Vol.6, No.1/2, pp. 53-60, 2016.

4. J. Yanqing, H. Ying, J. Tran, P. Dews, A. Mansour and R. Michael Massanari, "Mining infrequent causal associations in electronic health

databases", 11th IEEE International Conference on Data Mining Workshops, pp. 421-428, 2011. 5. R. Karthiyayini and J. Jayaprakash, "Association technique on prediction of chronic diseases using apriori algorithm", International Journal of

Innovative Research in Science, Engineering and Technology, Vol. 4, Special Issue. 6, pp. 255-259, 2015.

6. Yanwei Xing, Jie Wang, Zhihong Zhao and Yonghong Gao, "Combination data mining methods with new medical data to predicting outcome of coronary heart disease", International Conference on Convergence Information Technology, pp. 868-872, 2007.

7. Shweta and Dr. Kanwal Garg, "Mining Efficient Association Rules Through Apriori Algorithm Using Attributes and Comparative Analysis of

Various Association Rule Algorithm", IJARCSSE, Vol. 3, No. 6, pp. 306-312, 2013.

65-68

18.

Authors: R. P. Ramkumar, Sanjeeva Polepaka

Paper Title: Certain Investigations on Sentimental Analysis Architecture and Tools

Abstract: The sentiment is defined as the feeling(s) about the review or comment. The Sentimental Analysis aims to

determine the attitude of content or product for a period at a given moment. Later, these observations are categorized as

negative, neutral, positive and sometimes no sentiment(s) at all. The review(s) or comment(s) on a concern product is

beneficial for the companies to prioritize the issues, narrow down the problems to be solved and to explore the scenarios

for success. This article deals with the study of sentimental analysis or opinion mining architecture and tools used for

Sentimental Analysis for the naive users.

Keywords: Opinion Mining, Tweets, Opinion Polarities, Crawling, Sentimental Analysis, Twitter Statistics.

References: 1. https://www.iprospect.com/en/ca/blog/10-sentiment-analysis-tools-track-social-marketing-success/ 2. http://www.predictiveanalyticstoday.com/top-software-for-text-analysis-text-mining-text-analytics/

3. Parashar and Sharma, "A Literature Review on Architecture, Classification Technique and Challenges of Sentiment Analysis", International

Journal of Engineering Research & Technology, Vol. 5, Issue 5, pp. 124-127, 2016. 4. Meenambigai, "An Efficient Surveillances of Products Based on Opinion Mining", International Journal of Innovative Research in Computer and

Communication Engineering, Vol. 2, Issue 8, pp. 5261-5265, August 2014.

5. Vivekanandan and Helen Josephine, "ROM - Review Opinion Mining a Novelized Framework", International Journal of Computer Sciences and

69-71

Page 12: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

Engineering, Volume-2, Issue-11, pp. 86-89, November 2014. 6. Khandelwal, Mishra and V. K. Mishra, "A Survey on Subjective Sentiment Analysis from Twitter Corpus", IJSRSET, Volume 2, Issue 2, pp.

1198-1200, 2016.

7. DongSung Kim and Jong Woo Kim, "Public Opinion Mining on Social Media: A Case Study of Twitter Opinion on Nuclear Power", Advanced Science and Technology Letters, Vol. 51, pp. 224-228, 2014.

19.

Authors: K. Rama Krishna Reddy, B.G. Obula Reddy

Paper Title: Study and Analysis of Big data with MapReduce Framework

Abstract: Exponential growth in data has been observed in recent years. This huge amount of data has caused a new

kind of problem. Existing RDBMS systems cannot handle large data or they are not effective in managing them. Major

Big Data problems are storage and handling. Hadoop is displayed in storage and processing solutions in the form of

HDFS (Hadoop Distributed File System) and MapReduce. Traditional systems are not intended for Big Data

processing, and they can also process structured data. The financial sector is one of the challenges in Big Data. In this

work, unstructured data is processed by Hadoop MapReduce. An effective processing of unstructured data is analyzed

and explained.

Keywords: Big data, Hadoop, HDFS, MapReduce.

References: 1. L. Augusteijn. Sorting morphisms. In S. Swierstra, P. Henriques, and J. Oliveira, editors, 3rd International Summer School on Advanced

Functional Programming, volume 1608 of LNCS, pages 1-27. Springer-Verlag, Sept. 1998.

2. J.W. Backus. Can Programming Be Liberated From the von Neumann Style? A Functional Style and its Algebra of Programs. Communications of the ACM, 21(8):613-641, 1978.

3. R. Bird and O. de Moor. Algebra of programming. Prentice-Hall, Inc., 1996.

4. R. S. Bird. An introduction to the theory of lists. In Proceedings of the NATO Advanced Study Institute on Logic of programming and calculi of discrete design, pages 5-42. Springer-Verlag, 1987.

5. G. E. Blelloch. Programming parallel algorithms. Communications of the ACM, 39(3):85-97, 1996. 6. A. Borodin and J. E. Hopcroft. Routing, merging and sorting on parallel models of computation. In STOC'82: Proceedings of the fourteenth

annual ACM symposium on Theory of computing, pages 338-344. ACM Press, 1982.

7. L. Boug´e, P. Fraigniaud, A. Mignotte, and Y. Robert, editors. Proceedings of the 2nd International Euro-Par Conference on Parallel Processing, 2 volumes, EURO-PAR'96, volume 1123-1124 of LNCS. Springer-Verlag, 1996.

8. W.-N. Chin, J. Darlington, and Y. Guo. Parallelizing conditional recurrences. In Boug´e et al. [7], pages 579-586. Volume 1/2.

9. P. Zadrozny and R. Kodali, Big Data Analytics using Splunk, Berkeley, CA, USA: Apress, 2013. 10. F. Ohlhorst, Big Data Analytics: Turning Big Data into Big Money, Hoboken, N.J, USA: Wiley, 2013.

11. J. Dean and S. Ghemawat, "MapReduce: Simplified data processing on large clusters," Commun ACM, 51(1), pp. 107-113, 2008.

12. F. Li, B. C. Ooi, M. T. Özsu and S. Wu, "Distributed data management using MapReduce," ACM Computing Surveys, 46(3), pp. 1-42, 2014. 13. C. Doulkeridis and K. Nørvåg, "A survey of large-scale analytical query processing in MapReduce," The VLDB Journal, pp. 1-26, 2013.

14. S. Sakr, A. Liu and A. Fayoumi, "The family of mapreduce and large-scale data processing systems," ACM Computing Surveys, 46(1), pp. 1-44,

2013. 15. The emergence of "big data" technology and analytics Bernice Purcell -Holy Family University.

16. The Forrester Wave™: Big Data Predictive Analytics Solutions, Q1 2013 by Mike Gualtieri, January 3, 2013

72-74

20.

Authors: S. Dhanalakshmi, K. Ramakrishna Reddy, K. Vijaya Krupa Vatsal

Paper Title: Overview of Managing Data Storage, Resource Models and Security Issues in Cloud Computing

Environment

Abstract: The Main goal of cloud is more number of users stored data in cloud environments with incredible rate, this

cloud computing technologies performs some services/agreements done with provider and customer, once customer

reach the storage limits for accessing the drive, the cloud computing services specified with pay based on usage and

also mention the period for updating the service, many services generate large amount of data example. Organizations,

social networks, ecommerce applications and etc., these services are generate bulk data daily, it’s more useful to

cooperating the organizations. The storage systems storing capable of huge volumes of data, based on updation the

customer can interact with relational database systems through structured query language. The main concept of cloud

environment is secure, protect the data. To discuss the related issues of managing data in data storage technology,

resource management techniques and security mechanisms in the cloud based environments.

Keywords: Cloud Computing, Data Storage, Cloud Security, Resource Management, distributed file systems

References: 1. Ravishankar, M.N.; Pan, S.L.; and Leidner, D.E. (2011).Examining the strategic alignment and implementation success of a KMS: A subculture-

based multilevel analysis. Information Systems Research, 22(1), 39-59.

2. Tiwana, A (2012), Novelty-knowledge alignment: A theory of design convergence in systemsdevelopment, Journal of Management Information

Systems, 29(1) 15-52. 3. RizwanMian, Patrick Martin (2012). Executing data-intensive workloads in a Cloud. 12th IEEE/ACM International Symposium on Cluster,

Cloud and Grid Computing.

4. Yingjie Shi, XiaofengMeng, Jing Zhao, Xiangmei Hu, Bingbing Liu and HaipingWang (2010). Benchmarking Cloud-based Data Management Systems.CloudDB'10, Toronto, Ontario, Canada. ACM 978-1-4503-0380-4/10/10

5. Bernardo Ferreira, Henrique Domingos (2012). Management and Search of Private Data on Storage Clouds.Center for Informatics and

Information Technologies.SDMCMM'12, December 3-4, 2012, Montreal, Quebec, Canada. 6. XiaofengMeng, Adam Silberstein, Fusheng Wang (2012) Information and Knowledge Management. CIKM'12, October 29-November 2, 2012,

Maui, HI, USA.ACM 978-1-4503-1156-4/12/10.

7. Peter Géczy, Noriaki Izumi, KôitiHasida (2013). Hybrid cloud management: Foundations and strategies. Review of business and finance studies. (4) 1

8. Hussam Abu-Libdeh, Lonnie Princehouse, Hakim Weatherspoon (2010). RACS: A Case for Cloud Storage Diversity, ACM 978-1-4503-0036-

0/10/06

9. Anthes, G. (2010). Security in the Cloud: Cloud Computing Offers Many Advantages, but Also InvolvesSecurity Risks. Communications of

ACM, 53(11), 16-18.

10. Xiao-Bai Li, SumitSarkar (2006). Privacy Protection in Data Mining: A Perturbation Approach for Categorical Data Information Systems Research. (17) 3, 254-270

75-79

Page 13: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

11. Iyengar, V. S. (2002). Transforming data to satisfy privacy constraints. Knowledge Discovery DataMining.ACM Press, New York, 279-288. 12. Daniel J. Abadi (nd) Data Management in the Cloud: Limitations and Opportunities. IEEE Computer Society Technical Committee on Data

Engineering

13. Data Management in the Cloud Computing. Ashish Adinath Vankudre, Department of Computer Science & Engineering, Adarsh Institute of Technology Vita, Maharashtra, India, IJSRD - International Journal for Scientific Research & Development| Vol. 5, Issue 12, 2018 | ISSN

(online): 2321-0613.

21.

Authors: H. Anwer Basha, S. Arivalagan, P. Sudhakar, R.P. Narmadha

Paper Title: A New Deterministic Code Allocation Technique for Data Compression in Wireless Sensor Networks

Abstract: Energy utilization is the huge conflict in modeling WSN because it has only inbuilt limited battery. To

diminish the sum of data requires to be communicated, an efficient technique data compression is used prior to

transmission. Since, there is lot of textual data that are available in WSN dataset, lossless compression method is

desirable where the data loss is not preferable. This paper introduces a new deterministic code allocation (DCA)

technique for effectively compresses the data. The DCA technique is a dictionary based, single character encoding

scheme which uses a static dictionary for codeword allocation. The unique feature of DCA technique is the use of fixed

4-bit codewords for every character in the input sequence. As the nodes are constrained on computational resources, the

proposed DCA technique is highly suitable because of its easier implementation. In addition, the DCA technique

compresses the data with no loss of quality and it does not requires any extra information to be transmitted along with

the compressed file. To verify the robustness and compression performance, an extensive experimental analysis is

carried out using real time WSN dataset interms of various performance measures. The experimental results ensured

that the DCA method obtains better compression performance with less computation complexity.

Keywords: WSN, Data compression, Encoding, Energy utilization.

References: 1. Sariga, P. Sujatha, A survey on unequal clustering protocols in wireless sensor networks, J. King Saud Univ. (2017).

2. K. Sohraby, D. Minoli, T. Znati, Wireless Sensor Networks: Technology, Protocols, and Applications, John Wiley & Sons, Hoboken, New Jersey, 2007.

3. Estrin, J. Heidemann, S. Kumar, M. Rey, Next century challenges: scalable coordination in sensor networks, in: Proceedings of the 5th annual

ACM, 1999, pp. 263-270. 4. G. Anastasi, M. Conti, M. Di Francesco, A. Passarella, Energy conservation in wireless sensor networks: a survey, Ad Hoc Networks 7 (2009)

(2009) 537-568.

5. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey, Comput. Networks 38 (4) (2002) 393-422. 6. C.S. Raghavendra, K.M. Sivalingam, T. Znati, Wireless Sensor Networks, 1st ed., Springer US, US, 2004.

7. Sadler, Martonosi, Data compression algorithms for energy-constrained devices in delay tolerant networks, in: In: Proceedings of the 4th

international conference on embedded networked sensor systems - SenSys '06, 2006, pp. 265-278. 8. T. Schoellhammer, B. Greenstein, E. Osterweil, M. Wimbrow, D. Estrin, Lightweight temporal compression of microclimate datasets, UCLA

Cent. Embed. Netw. Sens., 2004. 9. E.P. Capo-Chichi, H. Guyennet, J.M. Friedt, K-RLE: a new data compression algorithm for wireless sensor network, in: Proceedings of the 3rd

International Conference on Sensor Technologies and Applications, (SENSORCOMM'09), 2009, pp. 502-507.

10. M. Francesco, M. Vecchio, An efficient lossless compression algorithm for tiny nodes of monitoring wireless sensor networks, Comput. J. 52 (8) (2009) 969-987.

11. Y. Liang, Y. Li, An efficient and robust data compression algorithm in wireless sensor networks, IEEE Commun. Lett. 18 (3) (2014) 439-442.

12. J.G. Kolo, S.A. Shanmugam, D.W.G. Lim, L.-M. Ang, K.P. Seng, An adaptive lossless data compression scheme for wireless sensor networks, J. Sensors (2012).

13. Kiely, M. Xu, W.-Z. Song, R Huang, B. Shirazi, Adaptive networks, linear filtering compression on realtime sensor networks, Comput. J. 53 (10)

(2010) 1606-1620. 14. Y. Liang, W. Peng, Minimizing energy consumptions in wireless sensor networks via two-modal transmission, Comput. Commun. Rev. 40 (1)

(2010) 13-18.

15. J. Gana, S.A. Shanmugam, D. Wee, G. Lim, L. Ang, Fast and efficient lossless adaptive compression scheme for wireless sensor networks q, Comput. Electr. Eng. 41 (2015) 275-287.

16. A.L.L. Aquino, E.F. Nakamura, Data centric sensor stream reduction for real-time applications in wireless sensor networks, Sensors 9 (12) (2009)

9666-9688. 17. Alippi, G. Anastasi, An adaptive sampling algorithm for effective energy management in wireless sensor networks with energy-hungry sensors,

IEEE Trans. 59 (2) (2010) 335-344.

18. [18] T. Shu, M. Xia, J. Chen, C. de Silva, An energy efficient adaptive sampling algorithm in a sensor network for automated water quality monitoring, Sensors 17 (11) (2017) 2551.

19. A.L.L. Aquino, O.S. Junior, A.C. Frery, E.L. Albuquerque, R.A.F. Mini, MuSA: multivariate sampling algorithm for wireless sensor networks,

IEEE Trans. Comput. 63 (4) (2014) 968-978. 20. M. Taghout, A.K. Chorppath, T. Waurick, F.H.P. Fitzek, On the design of a joint compressed sensing and network coding framework, in:

European Wireless 2018; 24th European Wireless Conference, 2018, pp. 113-119.

21. P. Sun, L. Wu, Z. Wang, M. Xiao, Z. Wang, Sparsest random sampling for cluster-based compressive data gathering in wireless sensor networks, IEEE Access 6 (c) (2018) 36383-36394.

22. "Gzip Home Page," 2018. [Online]. Available: http://www.gzip.org/.

23. "Bzip2 Home Page," 2018. 24. D.A. Huffman, in: A method for the construction of minimum-redundancu codes, 1952, pp. 1098-1102.

25. I.H. Witten, R.M. Neal, J.G. Cleary, Arithmetic coding for data compression, Commun. ACM 30 (6) (1987) 520-540.

26. "Sensor Scope deployments homepage," 2011. [Online]. Available: https://lcav. epfl.ch/page-145180-en.html. 27. T. Schoellhammer, B. Greenstein, E. Osterweil, M. Wimbrow, D. Estrin, Lightweight temporal compression of microclimate datasets, UCLA

Cent. Embed. Netw. Sens., 2004

80-86

22.

Authors: R. Kamali, G. Jayalalitha

Paper Title: Renormalization in AC Circuits based on Fractal

Abstract: In this paper the Feynman infinite ladder AC circuits is analyzed by Renormalization method to form

Fractal AC circuits, since operative of Renormalization gives the potentialities and interrelations of an infinite ladder. In

particular, this analyzation is for the so-called Feynman Sierpinski ladder that exhibits the AC frequency response of

Sierpinski Gasket networks. This extends the self-similarity resistance networks. There forms a Regular Set which is

rectifiable and Line Graphs are also formed using adjacent edges of the AC circuits induces the connectedness and the

continuous self-similarity throughout the circuit.

87-90

Page 14: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

Keywords: Fractals, AC circuits, Renormalization, Regular Set, Line Graphs, Rectifiable, Iteration.

References: 1. R. P. Feynman, R. B. Leighton and M. Sands, The Feynman Lectures on Physics, volume 2 Basic Books, California Institute of Technology,

(1965-2013).

2. E. Akkermans, Joe P. Chen, Gerald Dunne, Luke G. Rogers, and Alexander Teplyaev. Fractal AC circuits and propagating waves on fractals,

Xiv:1507.05682, Volume 2(2018).

3. Robert S Strichartz and Alexander Teplyaev, Spectral analysis on infinite sierpinskifractafolds, Journal d'AnalyseMathematique, 116(1),(2012),255-297.

4. A. Teplyaev, Spectral analysis on infinite Sierpinski gaskets, Journal of Functional Analysis, volume 159,no.2, (1998), 537-567.

5. R. Meyers, R. S. Strichartz and A.Teplyaev, Dirichlet forms on the Sierpinski gasket, Pacific Journal of Mathematics, volume 217, (2004), 149-174.

6. D. Fontaine, T. Smith and A. Teplyaev, Resistance of random Sierpinski gaskets, in Quantum graphs and their applications, volume 415 of

Contemp. Mathematics,( 2006), 121-136. 7. D. J. Kelleher, B. A. Steinhurst and C.M.M. Wong, From self-similar structures to self-similar groups, Internat Journal of Algebra computation

volume 22, no.7 1250056, (2012), 16.

8. Joe P. Chen, Luke G. Rogers, Loren Anderson, Ulysses Andrews, Antoni Brzoska, Aubrey Coffey, Hannah Davis, Lee Fisher, Madeline Hansalik, Stephew Loew, Alexander Teplyaev Power Dissipation in Fractal AC Circuits Journal of Physics A: Mathematical and Theoretical,

Volume 50(32),(2017)

9. Joe P. Chen, Gerald Dunne, Luke G. Rogers, and Alexander Teplyaev, Power Dissipation in Fractal Feynman-Sierpinski AC Circuits Patricia Alonso Ruizar Xiv:1701.08039VI, (2017)

10. B. Boyle, K. Cekala, D. Ferrone, N. Rifkin and A. Teplyaev, Electrical resistance of n-gasket fractal networks, Pacific Journal of Mathematics,

volume 233, (2007)15-40. 11. F. Englert, J. M. Freere, M. Rooman and P. Spindel, Metric space-time as fixed point of the renormalization group equations on fractal structures,

Nuclear Physics B, volume 280, (1987)147-180.

12. K. J. Falconer, The Geometry of Fractal Sets, Cambridge Tracts in Mathematics, 85.Cambridge University Press, Cambridge, (1986). 13. H. Whitney, Congruent graphs and the connectivity of graphs, Amer. J. Math. 54 (1932), 150-168.

14. Narsingh Deo, Graph Theory with Applications to Engineering and Computer Science, Prentice-Hall, Inc., Englewood Cliffs, N.J., U.S.A.,

(1974).

23.

Authors: D.M. Sheeba, R. Varalakshmi, N. Anbumani

Paper Title: Lightweight Algorithms for Low Powered IoT Devices Comparative Analysis

Abstract: Internet of Things is the Connections of embedded technologies that contained physical objects and is used

to communicate and intellect or interact with the inner states or the external surroundings. Rather than people-people

communication, IoT emphasis on machine-machine communication. This paper familiarizes the status of IoT growth.

The IoT embeds some intelligence in Internet connected objects to communicate, exchange information, take decisions,

invoke actions and provide amazing services. This paper addresses the existing development trends, the generic

architecture of IoT, its distinguishing features and possible future applications. This paper also forecast the key

challenges associated with the development of IoT. It emphasizes the use of lightweight algorithms to increase the

security of content with less iteration.

Keywords: Internet of Things, ubiquitous computing, Lightweight Algorithm, IoT architecture, IoT applications, IoT

security.

References: 1. D. Singh, G. Tripathi, and A.J. Jara. "A survey of Internet-of-things: Future vision, architecture, challenges and services." In Internet of Things

(WF-IoT), 2014 IEEE World Forum on, pp. 287-292. IEEE, 2014.

2. Johnson, L.; Adams, S.; Cummins, M. NMC Horizon Report: 2012 Higher Education Edition; Impacts of Current and Future Technologies on Higher Edudation; The New Media Consortium (NMC): Austin, TX, USA, 2012; ISBN 978-0-9846601-3-1. Available online:

http://www.nmc.org/pdf/2012-horizon-report-HE.pdf (accessed on 27 July 2018)

3. JYang Lu. Li Da XuIEEE IoT Journal Sep 2018. Biologically Inspired Resource Allocation for Network Slices in 5G-Enabled Internet of Things 4. Hochschule Aalen. Internet of Things. Available online: https://www.hs-aalen.de/en/courses/66/info (accessed on 27 July 2018).

5. S. Lanzisera et al., "Communicating power supplies: Bringing the internet to the ubiquitous energy gateways of electronic devices," IEEE

Internet Things J., vol. 1, no. 2, pp. 153-160, Apr. 2014. 6. Dezhgir, Hamid, And Haniyeh Hooshmand."Security On The Internet Of Things." (2017).

7. Holler, J.; Tsiatsis, V.; Mulligan, C.; Karnouskos, S.; Boyle, D. From Machine-to-Machine to the Internet of Things: Introduction to a New Age

of Intelligence, 1st ed.; Academic Press Ltd.: London, UK, 10 April 2014.

8. Evans, D. The Internet of Things: How the Next Evolution of the Internet Is Changing Everything; White Paper 2011; Cisco Internet Business

Solutions Group (IBSG), Cisco Systems, Inc.: San Jose, CA, USA,2011.Available online: http://www.cisco.com /web /about/ac79

/docs/innov/IoT_IBSG_0411 FINAL.pdf (accessed on 27 July 2018). 9. Borja Martinez ;MàriusMontón ; IgnasiVilajosana ; Joan Daniel PradesIEEE Sensors Journal ( Volume: 15, Issue: 10, Oct. 2015 )

10. Teich, P. Segmenting the Internet of Things (IoT); White Paper 2014; Moor Insights & Strategy: Austin, TX, USA, 2014. Available online: http://www.moorinsightsstrategy.com/wp-content/uploads/2014/05/Segmentingthe-Internet-of-Things-IoT-by-Moor-Insights-and-Strategy.pdf

(accessed on 27 July 2018).

11. Scully, P. The Top 10 IoT Segments in 2018-Based on 1,600 Real IoT Projects. IoT Analytics: Market Insights for the Internet of Things, February 2018. Available online: https://iot-analytics.com/top-10-iot-segments2018-real-iot-projects/# (accessed on 27 July 2018).

12. Weissberger, A. TiECon 2014 Summary-Part 1: Qualcomm Keynote & IoT Track Overview. IEEE ComSoc, May 2014. Available online:

https://community.comsoc.org/blogs/alanweissberger/tiecon-2014-summarypart-1-qualcomm-keynote-iot-track-overview (accessed on 27 July 2018).

13. Evans, D. The Internet of Everything: How More Relevant and Valuable Connections Will Change the World; White Paper 2012; Cisco Internet

Business Solutions Group (IBSG), Cisco Systems, Inc.: San Jose, CA, USA, 2012. Available online: https://www.cisco.com/web/about/ac79/docs/innov/IoE.pdf (accessed on 27 July 2018).

14. Darwish, D. (2015) "Improved Layered Architecture for Internet of Things." International Journal of Computing Academic Research (IJCAR),

4(4):214-223. 15. Evans, D. How the Internet of Everything Will Change the World. Cisco Blog, November 2012. Available online:

http://blogs.cisco.com/news/how-the-internet-of-everything-will-change-the-worldforthe-better-infographic/ (accessed on 27 July 2018).

16. Bradley, J.; Barbier, J.; Handler, D. Embracing the Internet of Everything to Capture Your Share of $14.4 Trillion: More Relevant, Valuable Connections Will Improve Innovation, Productivity, Efficiency & Customer Experience; White Paper 2013; Cisco Internet Business Solutions

Group (IBSG), Cisco Systems, Inc.: San Jose, CA, USA, 2013. Available online:

http://www.cisco.com/web/about/ac79/docs/innov/IoE_Economy.pdf (accessed on 27 July 2018). 17. Mahoney, J.; LeHong, H. Innovation Insight: The 'Internet of Everything' Innovation Will Transform Business; Research Report 2012; Gartner,

91-96

Page 15: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

Inc.: Stamford, CT, USA, 2012. Available online: https://www.gartner.com/ doc/1886915/innovation-insight-internet-everything-innovation (accessed on 27 July 2018).

18. EOT Coin. IoT Needs EOT. Available online: https://eotcoin.org/ (accessed on 27 July 2018).

19. Bradley, J.; Reberger, C.; Dixit, A.; Gupta, V.; Macaulay, J. Internet of Everything (IoE): Top 10 Insights from Cisco's IoE Value at Stake Analysis for the Public Sector; Economic Analysis 2013; Cisco Internet Business Solutions Group (IBSG), Cisco Systems, Inc.: San Jose, CA,

USA, 2013. Available online: http://www.cisco. com/web/about/ac79/docs/IoE/IoE-VAS_Public-Sector_Top-10-Insights.pdf (accessed on 27

July 2018).

20. Miraz, M.H.; Khan, S.; Bhuiyan, M.; Excell, P. Mobile Academy: A Ubiquitous Mobile Learning (mLearning) Platform. In Proceedings of the

International Conference on eBusiness, eCommerce, eManagement, eLearning and eGovernance (IC5E 2014), London, UK, 30-31 July 2014; pp.

89-95. 21. G. Peretti, V. Lakkundi, M. Zorzi, "BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things." (2015).

22. X. F. Wang, "Research on Security Issues of the Internet of Things." In Advanced Materials Research, vol. 989, pp. 4261-4264. 2014.

23. Z. Xu, Y. Yin, and J. Wang, "A density-based energy-efficient clustering algorithm for wireless sensor networks." International Journal of Future Generation Communication and Networking 6, no. 1 (2013): 75-86.

24. Khan, S.; Shayokh, M.A.; Miraz, M.H.; Bhuiyan, M. A Framework for Android Based Shopping Mall Applications. In Proceedings of the

International Conference on eBusiness, eCommerce, eManagement, eLearning and eGovernance, London, UK, 30-31 July 2014; pp. 27-32.. 25. Bradley, J.; Loucks, J.; Macaulay, J.; Noronha, A. Internet of Everything (IoE) Value Index: How Much Value Are Private-Sector Firms

Capturing from IoE in 2013? White Paper 2013; Cisco Internet Business Solutions Group (IBSG), Cisco Systems, Inc.: San Jose, CA, USA,

2013. Available online: https://www.cisco.com/c/dam/en_ us/about/business-insights/docs/ioe-value-index-whitepaper.pdf (accessed on 27 July 2018).

26. Soomro, S.; Miraz, M.H.; Prasanth, A.; Abdulla, M. Artificial Intelligence Enabled IoT: Traffic Congestion Reduction in Smart Cities. In

Proceedings of the IET 2018 Smart Cities Symposium (SCS '18), Zallaq, Bahrain, 22-23 April 2018; pp. 81-86. 27. Alansari, Z.; Anuar, N.B.; Kamsin, A.; Soomro, S.; Belgaum, M.R.; Miraz, M.H.; Alshaer, J. Challenges of Internet of Things and Big Data

Integration. In Proceedings of the International Conference on Emerging Technologies in Computing 2018 (iCETiC '18), London, UK, 23-24

August 2018. 28. Derbez P, Fouque PA. Exhausting demirci-seluk meet-in-the-middle attacks against reduced-round AES. International Workshop on Fast

Software Encryption; 2014. p. 541-60.

29. Mitchell, S.; Villa, N.; Stewart-Weeks, M.; Lange, A. The Internet of Everything for Cities: Connecting People, Process, Data, and Things To Improve the 'Livability' of Cities and Communities; White Paper 2013; Cisco Internet Business Solutions Group (IBSG), Cisco Systems, Inc.:

San Jose, CA, USA, 2013. Available online: http://www.cisco.com/ web/strategy/docs/gov/everything-for-cities.pdf (accessed on 27 July 2018)

30. Lee J, Lim D. Parallel architecture for high-speed block cipher, HIGHT. International Journal of Security and its Applications. 2014; 8(2):59-66. 31. Chaudhry, J.; Qidwai, U.; Miraz, M.H.; Ibrahim, A.; Valli, C. Data Security among ISO/IEEE 11073 Compliant Personal Healthcare Devices

through Statistical Fingerprinting. In Proceedings of the 9th IEEE-GCC Conference and Exhibition 2017, Manama, Bahrain, 9-11 May 2017; pp.

319-324. 32. Barbier, J.; Bhatia, P.K.; Kapoor, D. Internet of Everything in ASEAN: Driving Value and Opportunity in Oil and Gas, Utilities, and

Transportation; White Paper 2014; Cisco Internet Business Solutions Group (IBSG), Cisco Systems, Inc.: San Jose, CA, USA, 2014. Available

online: http://www.cisco.com/web/about/ac79/ docs/IoE/IoE-in-ASEAN.pdf (accessed on 27 July 2018). 33. Evans, D. Ask the Futurist: "How Will the Internet of Everything Impact Teachers' Roles in the Connected Classroom?", 12 September 2013.

Available online: http://blogs.cisco.com/ioe/connected-classroom/ (accessed on 27 July 2018)

34. Ali, N.A.; Abu-Elkheir, M. Internet of Nano-Things Healthcare Applications: Requirements, Opportunities, and Challenges. Proceedings of 11th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob' 2015), Abu Dhabi, UAE, 19-21

October 2015.

35. Nyberg K. Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities. 2015. p. 165-85.

36. Akyildiz, I.F.; Pierobon, M.; Balasubramaniam, S.; Koucheryavy, Y. The Internet of Bio-Nano Things. IEEE Commun. Mag. 2015, 53, 32-40.

[CrossRef] 37. Kalyani, V.L.; Sharma, D. IoT: Machine to Machine (M2M), Device to Device (D2D) Internet of Everything (IoE) and Human to Human (H2H):

Future of Communication. J. Manag. Eng. Inf. Technol. 2015, 2, 17-23.

38. Loughran, J. Graphene radios could unlock 'Internet of Nano-Things'. Engineering and Techbology (E&T), November 2016. Available online: https://eandt.theiet.org/content/articles /2016/11/graphene-radioscould-unlock-internet-of-nano-things/ (accessed on 27 July 2018).

39. Sheikh Ferdoush, Xinrong Li "Wireless Sensor Network System Design using Raspberry Pi and Arduino for Environmental Monitoring Applications", Elsevier The 9th International Conference on Future Networks and Communications (FNC-2014)

40. Gartner. Research Methodologies: Gartner Hype Cycle. Available online: http://www.gartner.com/ technology /research/ methodologies/hype-

cycle.jsp (accessed on 27 July 2018). 41. Gil Press. It's Official: The Internet of Things Takes over Big Data as The Most Hyped Technology. Forbes, August 2014. Available online:

http://www.forbes.com/sites/gilpress/2014/08/18/its-official-theinternet-of-things-takes-over-big-data-as-the-most-hyped-technology/ (accessed

on 27 July 2018) 42. 2. Gartner. Gartner's 2015 Hype Cycle for Emerging Technologies Identifies the Computing Innovations That Organizations Should Monitor.

Available online: http://www.gartner.com/newsroom/id/3114217 (accessed on 27 July 2018).

43. Lee, S.W.; Prenzel, O.; Bien, Z. Applying Human Learning Principles to User-Centered IoT Systems. Computer 2015, 46, 46-52 44. Hodges, S.; Taylor, S.; Villar, N.; Scott, J.; Bial, D.; Fischer, P.T. Prototyping Connected Devices for the Internet of Things. Computer 2013, 46,

26-34. [CrossRef]

45. Ferati, M.; Kurti, A.; Vogel, B.; Raufi, B. Augmenting Requirements Gathering for People with Special Needs Using IoT: A Position Paper. In

Proceedings of the 9th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE '16), Austin, TX, USA, 14-

16 May 2016; pp. 48-51.

46. Kim I, Back M, Yim H, Lee K. RFID adaptor for detecting and handling data events in Internet of Things. Indian Journal of Science and Technology. 2015; 8(5):140-8.

47. Bojanova I, Hurlburt G, Voas J. Imagineering an Internet of Anything. Computer (Long Beach Calif). 2014; 47(6):72-7.

48. Cooper, J.; James, A. Challenges for Database Management in the Internet of Things. IETE Tech. Rev. 2014, 26, 320-329. [CrossRef] 49. Dell EMC. The Digital Universe of Opportunities: Rich Data and the Increasing Value of the Internet of Things; EMC Digital Universe with

Research & Analysis by IDC April 2014; Dell EMC: Hopkinton, MA, USA, 2014. Available online: https://www.emc.com/leadership/digital-

universe/2014iview/executive-summary.htm (accessed on 27 July 2018). 50. Marvin, R. The 5 Worst Hacks and Breaches of 2016 and What They Mean for 2017. PC Magazine, January 2017. Available online:

https://www.pcmag.com/article/350793/the-5-worst-hacks-and-breachesof-2016-and-what-they-mean-fo (accessed on 27 July 2018).

51. Rahman, A.; Ali, M. Analysis and Evaluation of Wireless Networks by Implementation of Test Security Keys. In Proceedings of the International Conference on Emerging Technologies in Computing 2018 (iCETiC '18), London, UK, 23-24 August 2018

52. IEC. Internet of Things: Wireless Sensor Networks; White Paper 2014; International Electrotechnical Commission (IEC): Geneva, Switzerland,

2014. Available online: http://www.iec.ch/whitepaper/pdf/ iecWP-internetofthings-LR-en.pdf (accessed on 27 July 2018). 53. A. M. Ortiz et al., "The cluster between Internet of Things and social networks: Review and research challenges," IEEE Internet Things J., vol. 1,

no. 3, pp. 206-215, Jun. 2014.

54. Wollschlaeger, M.; Sauter, T.; Jasperneite, J. The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0. IEEE Ind. Electr. Mag. 2017, 11, 17-27. [CrossRef]

55. Miraz, M.H.; Ali, M.; Excell, P.; Picking, R. A Review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things

(IoNT). In Proceedings of the Fifth International IEEE Conference on Internet Technologies and Applications (ITA 15), Wrexham, UK, 8-11 September 2015; pp. 219-224

56. Kortuem, G.; Bandara, A.; Smith, N.; Richards, M.; Petre, M. Educating the Internet-of-Things Generation. Computer 2013, 46, 53-61.

[CrossRef]

Page 16: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

24.

Authors: R. Varalakshmi, R.S. Dhivya

Paper Title: A Survey on Big Data Applicability in Prediction Using Absence Information for Workforce Management

Abstract: Prediction is a method of finding new insights from large data sets, it’s a reliable way to use big data for

more accuracy. The overall goal of the process is to predict useful outcomes from dataset and transform into a

meaningful insight for decision. Absence data has thousands of leave type information; by analysing the data, new

insights can be predicted, since the data is growing exponentially, traditional method of prediction will not be effective.

In this paper we discuss about prediction techniques and a survey of works done in the field of absenteeism is

performed, This paper concentrates on machine learning algorithms and also presents the applicability of absence data

in big data for workforce planning.

Keywords: Big Data, Data Science, Predictive Analytics, Workforce planning, Random Forest.

References: 1. Goetzel, R.Z, Long, S.R., Ozminkowski, R.J., Hawkins, K.H., Wang, S. and Lynch, W. Journal of occupational and environmental medicine, on

Health, Absence, disability and presenteeism cost estimates of certain physical and mental health condition affecting US employee" 46pp.398-412.

2. Evans - Absenteeism- a complex problem A study on absenteeism in Trondheim's nursing homes Josiane, NTNU Master's thesis in Cultural,

Social and Community Psychology 3. Hafiz Bin Salih,Staff Absenteeism: The Case of Wa Municipal Education Office of the Ghana Education ServiceCoordinator, Ghana Education

Service, Wa, Ghana, Open Journal of Social Sciences, 2018, 6, 1-14

4. Valle, M.A., Vara, S., Ruz, G.A, (2012), Job performance prediction in a call centre using a Naïve Bayes classifier, Expert System with

Applications, 39(11), pp 9939-9945.

5. Jantan, H., Hamdan, A.R., & Othman, Z.A. (2010). Human talent prediction in HRM using C4.5 classification algorithm, International journal on

Computer Science and Engineering, (2008-2010), pp2526-2534. 6. Rishi Sai Reddy Sudireddy and Uttam Mande, GITAM University. Prediction of Road Accident using Correlation based on Map Reducing. 8th

International Conference on Computational Intelligence and Communication Networks 2016.

7. HamidahJantan, Norazmah Mat Yusoff and Mohamad Rozuan Noh, UniversitiTeknologi MARA (UiTM) Terengganu, Malaysia. Proceedings of the International Conference on Data Mining, Internet Computing and Big Data, Kuala Lumpur, Malaysia, 2014.Towards Applying Support

Vector Machine Algorithm in Employee Achievement Classification.

8. Aarya Vardhan Reddy Paakaala, Sai Saran Macha & Kumara SakethMudigonda in MSVR Engineering college India. Evaluation of clustering algorithms on absenteeism at work data set. International Journal of Scientific Research & Development Vol.6, 2321-0613.

9. Ricardo Pinto Ferreira., Andréa Martiniano., Domingos Napolitano., Edquel Bueno Prado Farias and Renato José Sassi.Artificial neural network

and their application in prediction of absenteeism at work., International journal of recent scientific research Jan'18, vol-9. 10. Gayathri, T. Data mining of Absentee data to increase productivity. International journal of engineering and techniques - vol-4, May' 18, Issue-3.

11. BetülKarakus&Galip Aydin, Computer Engineering Department Firat University Elazig, Turkey. Call Center Performance Evaluation Using Big

Data Analytics, 978-1-5090-0284-9/16/$31.00 ©2016 IEEE. 12. Aditya Sinha, Research School of Computer Science College of Engineering and Computer Science Australian National University ACT 0200

Australia., Predicting Absenteeism At Work using ANN, Effects of Pruning By Badness, and Deep NNs. 13. Yingchun Liu, Random forest algorithm in big data environment, Computer Modelling & New Technologies 2014 18(12a) 147-151.

14. Jiawei Hanl,2,YanhengLiul,Xin Sunl, A Scalable Random Forest Algorithm Based on MapReduce.

15. Breiman, L. Random forests. Machine Learning 45( 1), 5-32 (2001). 16. Weiwei Lin, Ziming Wu, Longxin Lin, Angzhan Wen, AndJin Li, For Fog and Mobile Edge Computing, An Ensemble Random Forest

Algorithm for Insurance Big Data Analysis, Special Section On Recent Advance In Computational Intelligence Paradigms for security and

privacy. 17. The Australian Faculty of Occupational Medicine: Workforce Attendance and Absenteeism.

97-100

25.

Authors: Shaik Akbar, P. Sri Silpa, Anand Thota, K. Nageswara Rao

Paper Title: An Intangible System to Augment the Prediction of Heart Diseases Using Machine Learning Techniques

Abstract: In Present day medical scenario, it is very difficult to find the Heart-attack, Blood Pressure of the patient.

So we are introducing an idea to monitor and analyze the disease of the patients they are suffering from and will alert

the particular or nearby hospitals about the patient if there is any danger. So that the patient’s medical condition can be

identified and can be cured.

Keywords: Prediction, data analytics, machine learning, data mining, heart diseases.

References: 1. Manikantan, V. and S. Latha. "Predicting the Analysis of Heart Disease Symptoms Using Medicinal Data Mining Methods." (2013).

2. Shadab Adam Pattekari and Alma Parveen," Prediction system for heart disease using naïve bayes", International Journal of Advanced Computer and Mathematical Sciences, vol.3,pp 290- 294,2012.

3. Soni, Jyoti & Ansari, Ujma & Sharma, Dipesh & Soni, Sunita. (2011). Predictive Data Mining for Medical Diagnosis: An Overview of

Heart Disease Prediction. International Journal of Computer Applications. 17. 43-48. 10.5120/2237-2860. 4. Agrawal, Rakesh & Imielinski, Tomasz & Swami, Arun. (1993). Mining Association Rules Between Sets of Items in Large Databases,

SIGMOD Conference. 10.1145/170036.170072.

5. Hnin Wint Khaing, "Data mining based fragmentation and prediction of medical data," 2011 3rd International Conference on Computer Research and Development, Shanghai, 2011, pp. 480-485. doi: 10.1109/ICCRD.2011.5764179

6. Masilamani, Anbarasi &, ANUPRIYA & Iyenger, N Ch Sriman Narayana. (2010). Enhanced Prediction of Heart Disease with Feature

Subset Selection using Genetic Algorithm. International Journal of Engineering Science and Technology. 2. 7. D. Burdick, M. Calimlim and J. Gehrke, "MAFIA: a maximal frequent itemset algorithm for transactional databases," Proceedings 17th

International Conference on Data Engineering, Heidelberg, Germany, 2001, pp. 443-452. doi: 10.1109/ICDE.2001.914857

8. Srinivas, Kavitha et al. "SURVEY ON PREDICTION OF HEART MORBIDITY USING DATA MINING TECHNIQUES." (2011). DOI:10.5121/ijdkp.2011.1302

9. S.Vijayarani, M. Divya, " An Efficient Algorithm for Generating Classification Rules", IJCST, vol. 2, Issue 4, 2011.

101-104

26.

Authors: S.B. Lenin, N. Tamilarasan, S. Malarkkan

Paper Title: Hybrid Adaptive Channel Estimation Technique in Time and Frequency Domain for MIMO-OFDM

Systems

Abstract: A multiple-input multiple (MIMO) communication model is integrated to orthogonal frequency division

multiplexing (OFDM) for reliable and data transmission at a higher rate in the broadband wireless channels. A

significant part in the wireless data transmission is use of adaptive channel estimation techniques in which the channel

105-110

Page 17: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

is frequently varying. This paper introduces a hybrid adaptive channel estimation technique by integrating the beneficial

characteristics of the time domain as well as frequency domain. The column based time domain and the row based

frequency domain are combined together and they are used based on the channel quality and received bit error rate

(BER). Here, the channel estimation at pilot frequencies depends on minimum mean square error (MMSE). For the

evaluation of the proposed techniques, a set of experiments and detailed comparative analysis is made interms of

different measures under different condition. The experimental results depicted the proposed method outperforms the

other methods.

Keywords: Channel estimation, OFDM, CSI, MMSE.

References: 1. S. T. Chung and A. J. Goldsmith, "Degrees of freedom in adaptive modulation: a unified view," IEEE Trans. Commun., vol. 49, no. 9, pp.1561-

1571, 2001. 2. J. Goldsmith and S.-G. Chua, "Adaptive coded modulation for fading channels," IEEE Trans. Commun., vol. 46, no. 5, pp. 595-602, 1998.

3. T. Keller and L. Hanzo, "Adaptive multicarrier modulation: a convenient framework for time-frequency processing in wireless

communications,"Proc. IEEE, vol. 88, no. 5, pp. 611-640, 2000. 4. Svensson, "An introduction to adaptive QAM modulation schemes for known and predicted channels," Proc. IEEE, vol. 95, no. 12, pp. 2322-

2336, Dec. 2007.

5. M.-S. Alouini, X. Tang, and A. J. Goldsmith, "An adaptive modulation scheme for simultaneous voice and data transmission over fading channels," IEEE J. Sel. Areas Commun., vol. 17, no. 5, pp. 837-850,1999.

6. G. G. Raleigh and J. M. Cioffi, "Spatio-temporal coding for wireless communication," IEEE Trans. Commun., vol. 46, no. 3, pp. 357-366, 1998.

7. A. Goldsmith, Wireless Communications. Cambridge University Press, 2005. 8. S. T. Chung and A. Goldsmith, "Adaptive multicarrier modulation for wireless systems," in Proc. 2000 Asilomar Conf. Signals, Syst. Comput.,

vol. 2, pp. 1603-1607. 9. A. Olfat and M. Shikh-Bahaei, "Optimum power and rate adaptation for MQAM in Rayleigh flat fading with imperfect channel estimation,"

IEEE Trans. Veh. Technol., vol. 57, no. 4, pp. 2622-2627, 2008.

10. "Optimum power and rate adaptation with imperfect channel estimation for MQAM in Rayleigh flat fading channel," in Proc. 2005Veh. Technol. Conf. - Fall, vol. 4, pp. 2468-2471.

11. X. Cai and G. B. Giannakis, "Adaptive PSAM accounting for channel estimation and prediction errors," IEEE Trans. Wireless Commun., vol. 4,

no. 1, pp. 246-256, 2005. 12. S. Ye, R. S. Blum, and L. J. Cimini, "Adaptive OFDM systems with imperfect channel state information," IEEE Trans. Wireless Commun., vol.

5, no. 11, pp. 3255-3265, 2006.

13. S. Falahati, A. Svensson, T. Ekman, and M. Sternad, "Adaptive modulation systems for predicted wireless channels," IEEE Trans. Commun., vol. 52, no. 2, pp. 307-316, 2004.

14. M. Karami, A. Olfat, and N. C. Beaulieu, "Pilot symbol assisted adaptive modulation for OFDM systems with imperfect channel state

information," in Proc. 2010 IEEE Global Telecommun. Conf., pp. 1-6. 15. J. K. Cavers, "An analysis of pilot symbol assisted modulation for Rayleigh fading channels," IEEE Trans. Veh. Technol., vol. 40, no. 4, pp. 686-

693, 1991.

16. Y. Chen and N. C. Beaulieu, "Optimum pilot symbol assisted modulation," IEEE Trans. Commun., vol. 55, no. 8, pp. 1536-1546, 2007. 17. S. Sampei and T. Sunaga, "Rayleigh fading compensation for QAM inland mobile radio communications," IEEE Trans. Veh. Technol., vol.

42,no. 2, pp. 137-147, 1993.

18. J.H. Kotecha and A.M. Sayeed, "Transmit signal design for optimal estimation of correlated MIMO channels," IEEE Transactions on Signal

Processing, Vol. 52, pp. 546-557, Feb. 2004.

19. C. Chuah, D.N.C. Tse, J.M. Kahn, and R.A. Valenzuela, "Capacity scaling in MIMO wireless systems under correlated fading," IEEE Trans. on

Information Theory, Vol. 48., pp. 637-650, 2002.

27.

Authors: Manohar K. Kodmelwar, S.D. Joshi, V. Khanna

Paper Title: Using COCOMO Dataset Effort Estimation for Developing Software

Abstract: The development of software according to the required demand of customer. So it is important to find the

effort required to develop the software. The estimation is done using the particle swarm optimization technique by

applying the weights in the neural network. The usage of NN helps in estimating the efforts of the software with less

cost and failure rates. The NN is utilized together with optimization to attain an enhanced outcome. The dataset utilized

as input to the proposed system is the COCOMO dataset. The actual effort in the COCOMO dataset is measured by

person-month which represents the number of months that one person needs to develop a given project. The proposed

method gives the accurate estimation compared to the existing models

Keywords: COCOMO, NN, Hybrid swarm particle optimization, credit assignment path.

References: 1. Karnavel, K., and R. Dillibabu, "Development and application of new quality model for software projects", The Scientific World Journal, Vol.

2014, 2014.

2. Saleem Basha, and Dhavachelvan Ponnurangam, "Analysis of empirical software effort estimation models", 2010.

3. Ashish Sharma, and Dharmender Singh Kushwaha, "Estimation of software development effort from requirements based complexity", Procedia Technology, 2012, Vol. 4, PP. 716-722.

4. Magne Jørgensen, "Contrasting ideal and realistic conditions as a means to improve judgment-based software development effort estimation",

Information and Software Technology, 2011, Vol. 53, No. 12, PP. 1382-1390. 5. Philip Morrow, F. George Wilkie, and I. R. McChesney, "Function point analysis using NESMA: simplifying the sizing without simplifying the

size", Software Quality Journal, 2014, Vol. 22, No. 4, PP. 611-660.

6. Tony Rosqvist, Mika Koskela, and Hannu Harju, "Software quality evaluation based on expert judgement", Software Quality Journal, 2003, Vol. 11, No. 1, PP. 39-55.

7. Mandeep Kaur, and Sumeet Kaur Sehra, "Particle swarm optimization based effort estimation using Function Point analysis", In Issues and

Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on, IEEE, 2014, PP. 140-145. 8. Frank Vijay, J., "Enrichment of accurate software effort estimation using fuzzy-based function point analysis in business data analytics", Neural

Computing and Applications, 2018, PP. 1-7.

9. Valentina Lenarduzzi, Ilaria Lunesu, Martina Matta, and Davide Taibi, "Functional size measures and effort estimation in agile development: a replicated study", In International Conference on Agile Software Development. Springer, Cham, 2015, PP. 105-116

10. Dengsheng Wu, Jianping Li, and Chunbing Bao, "Case-based reasoning with optimized weight derived by particle swarm optimization for

software effort estimation", Soft Computing, 2018, Vol. 22, No. 16, PP. 5299-5310.

111-113

28. Authors: S. Thendral, R. Subhashni, V. Madhan Karky

Page 18: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

Paper Title: Seithiyalan – An iPhone Application for Cricket Summary Generation in Tamil

Abstract: Cricket plays vital role in Asian sports. Thus, there is a need for an application which summarize cricket in

Natural Language. The objective of Seithyalan application is to auto analyze the score card of the cricket match and

generate summary in Tamil. The data analyzed based on the parameter Interestingness to select relevant pattern. Based

on that pattern only the summary will generate.

Keywords: Cricket Summary, NLG, Machine Learning, Tamil Computing.

References: 1. Tholgappiar, "Tholgappiam," KazhagaVeliyeedu, Madras, 1973.

2. Alice Oh and Howard Shrobe, "Generating baseball summaries from multiple perspectives by reordering content,"in Proc. 5th International

Natural Language Generation Conference, 2008, pp. 173-176. 3. Bavananthymunivar, "Nannool," Pary Nilayam, Madras.

114-115

29.

Authors: B. Lakshma Reddy, A. Karthik, S. Prayla Shyry

Paper Title: A Blockchain Framework for Insurance Processes in Hospitals

Abstract: The Blockchain enabled system is to analyse, the best process of the treatment for a particular disease and

also the system determines if any fraudulent activity has been controlled by the doctor. The system also recommends

the most appropriate treatment process to perform for a particular disease in view of the movement of the previous

patient. Here the system is creating Block chain enabled framework for diseases and in this the system will create

disease as a unique key point and suggesting a better treatment to the hospitals. The basic objective of the project is to

suggest a best treatment to the hospitals.

Keywords: Blockchain, Hospital, Insurance, Treatment.

References: 1. Vukoli´c et.al (2017), "Rethinking permissioned blockchains," in Proceeding of the ACM Workshop on Blockchain, Cryptocurrencies and

agreements, ser. BCC '17. NewYork, NY, USA: ACM .

2. C. D. Clack et.al (2016) "Smart agreements templates: essential provisions and design options," arXiv preprint arXiv:1612.04496. 3. K. Christidis et.al (2016) "Blockchains and smart agreements for the IOT," IEEE Access, vol. 4, pp. 2292-2303.

4. I. Nath (2016) "Data exchange platform to conflict insurance fraud on blockchain," in 2016 IEEE 16th International Conference on Data Mining

Workshops (ICDMW), pp. 821-825. 5. W. Li et.al (2017) "Towards adaptable and personal industrial blockchain," in Proceedings of the ACM Workshop on Blockchains,

Cryptocurrencies and Contracts. ACM, pp. 9-14.

6. H. Watanabe et.al (2016) "Blockchain agreements: Securing a blockchain applied to smart agreements," in Consumer Electronics (ICCE), IEEE International Conferences on. IEEE, pp. 467-468.

7. F. Lamberti et.al (2017) "Blockchain or not blockchain, that is the question of the insurance and other sectors," IT Professional, vol. PP, no. 99,

pp. 1-1.

8. C. Christian (2017) "Blockchain, cryptography, and consensus".

9. Cachin and Christian (2016) "Architecture of the hyperledger blockchain fabric".

10. E. Androulaiki et.al (2017) "Cryptography and protocol in hyperledger fabric". 11. Dr. S. PraylaShyry", Efficient identification of bots by K-means clusterings", Proceeding of the international conferences on Soft Computing

System, Advances in Intelligent systems and Computing", pp 307-318, Springer India 2016.

12. Dr. S. PraylaShyry, Maria Sheeba," Literature review on the detection of bots in p2p network", International Journal of Applied Engineering Research, Volume 9, Number 24,pp. 23485-23489 2014.

116-119

30.

Authors: M.V.R. Vivek, D.V.V.S.S. Sri Harsha, P. Sardar Maran

Paper Title: A Survey on Crop Recommendation Using Machine Learning

Abstract: Agriculture arranging assumes an imperative job in any nation. Agriculture segment gives different yields,

for example, sustenance, crude material for industry, affordable lift and business. The Agriculture part contains huge

information regarding factors influencing its info and yield. With advances in innovation different information mining

systems are presented. These information mining methods can be utilized to dissect the multidimensional, time explicit

information of horticulture area to create powerful learning from it which can be utilized to support the economy.

Today, the term information mining [1][2] is an interdisciplinary procedure of breaking down, handling and assessing

this present reality datasets and forecast based on the discoveries. Our case-based investigation gives observational

proof that we can utilize diverse information mining arrangement calculations to group the dataset of horticultural

districts based on soil properties. Moreover, we have explored the most performing calculation having amazing

expectation exactness to suggest the best harvest for better yield. The proposed framework will coordinate the

information got from archive, climate office and by applying machine learning calculation: Multiple Linear Regression,

an expectation of most reasonable yields as indicated by current natural conditions is made. This furnishes an

agriculturist with assortment of alternatives of harvests that can be developed. This exploration goes for examination of

soil dataset utilizing information mining procedures. It centers around characterization of soil utilizing different

calculations accessible. Another essential design is to foresee untested traits utilizing relapse procedure, and usage of

computerized soil test grouping.

Keywords: Data mining, classification, regression, soil testing, agriculture, Machine Learning.

References: 1. 2016 IEEE Eighth International Conference on Advanced Computing (ICoAC), "Crop Recommendation System for Precision Agriculture",

S.Pudumalar*, E.Ramanujam*, R.HarineRajashree?, C.Kavya?, T.Kiruthika?, J.Nisha?.

2. 2017 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT), "A Study on

Various Data Mining Techniques for Crop Yield Prediction", Yogesh Gandge, Sandhya. 3. 2017 IEEE Region 10 Humanitarian Technology Conference, "RSF: A Recommendation System for Farmers", Miftahul Jannat Mokarrama;

Mohammad Shamsul Arefin.

4. 2017 International Conference on I2C2, "Agriculture decision support system using data mining", Prof. Rakesh Shirsath; Neha Khadke; Divya

120-125

Page 19: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

More. 5. 2018 the 3rd IEEE International Conference on Cloud Computing and Big Data Analysis, "Big Data Analysis Technology Application in

Agricultural Intelligence Decision System", Ji-chun Zhao; Jian-xin Guo. Proceedings of the Second International Conference on Inventive

Systems and Control (ICISC 2018), "Use of Data Mining in Crop Yield Prediction", Shruti Mishra, Priyanka Paygude, Snehal Chaudhary, SonaliIdate.

6. IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO) 2015, "XCYPF: A Flexible and Extensible Framework

for Agricultural Crop Yield Prediction", Aakunuri Manjula, Dr.G .Narsimha

7. 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials

(ICSTM), Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai, T.N., India. 6 - 8 May 2015. pp.138-145,

"Crop Selection Method to Maximize Crop Yield Rate using Machine Learning Technique", Rakesh Kumar, M.P. Singh, Prabhat Kumar and J.P. Singh

8. Wang, Yuhong, Jiangrong Tang, and Wenbin Cao. "Grey prediction model-based food security early warning prediction." Grey Systems: Theory

and Application 2, no. 1 (2012): 13-23. 9. Liu Z., Meng L., Zhao W. and Yu F. Application of ANN in food safety early warning, The 2nd International Conference on Future Computer

and Communication, Wuhan, Vol. 3, 2010, pp. 677-80.

10. AnshalSavla, Parul Dhawan, HimtanayaBhadada, Nivedita Israni, Alisha Mandholia, Sanya Bhardwaj, "Survey of classification algorithms for formulating yield prediction accuracy in precision agriculture", Innovations in Information, Embedded and Communication systems (ICIIECS),

2015

11. Aakunuri Manjula, Dr.G .Narsimha, "XCYPF: A Flexible and Extensible Framework for Agricultural Crop Yield Prediction", Conference on Intelligent Systems and Control (ISCO), 2015

12. Yash Sanghvi, Harsh Gupta, Harmish Doshi, DivyaKoli, AmoghAnshDivyaKoli, Umang Gupta, "Comparison of Self Organizing Maps and

Sammon's Mapping on agricultural datasets for precision agriculture", International Conference on Innovations in Information, Embedded and Communication systems, 2015

13. Rakesh Kumar, M.P. Singh, Prabhat Kumar and J.P. Singh, "Crop Selection Method to Maximize Crop Yield Rate using Machine Learning

Technique", International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM).,2015

14. A.T.M Shakil Ahamed, NavidTanzeem Mahmood, Nazmul Hossain, Mohammad Tanzir Kabir, Kallal Das, Faridur Rahman, Rashedur M

Rahman, "Applying Data Mining Techniques to Predict Annual Yield of Major Crops and Recommend Planting Different Crops in Different Districts in Bangladesh", (SNPD) IEEE/ACIS International Conference., 2015

15. Yang, Liying. "Classifiers selection for ensemble learning based on accuracy and diversity." Procedia Engineering 15 (2011): 4266-4270.

16. Aymen E Khedr, Mona Kadry, Ghada Walid, "Proposed Framework for Implementing Data Mining Techniques to Enhance Decisions in Agriculture Sector Applied Case on Food Security Information Center Ministry of Agriculture, Egypt", International Conference on

Communications, management, and Information technology (ICCMIT'), 2015.

17. Monali Paul, Santosh K. Vishwakarma, Ashok Verma, "Analysis of Soil Behaviour and Prediction of Crop Yield using Data Mining Approach", International Conference on Computational Intelligence and Communication Networks, 2015.

18. Pudumalar, S., E. Ramanujam, R. HarineRajashree, C. Kavya, T. Kiruthika, and J. Nisha. "Crop recommendation system for precision

agriculture." In Advanced Computing (ICoAC), 2016 Eighth International Conference on, pp. 32-36. IEEE, 2017. 19. Daryl H. Hepting, Timothy Maciag, Harvey Hill, "Web-Based Support of Crop Selection for Climate Adaptation", 45th Hawaii International

Conference on System Sciences, 2012.

20. S. Dhamodaran, Allwyn raja, "Prediction of Weather Condition Using Probability Function", International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 10, Number 4 (2015) pp.10665-10670.

31.

Authors: Su.Suganthi, P. Pavithra, C. Sri Lakshmi Priya, T. Thayamma

Paper Title: Microcontroller based Monitoring and Reprocessing System for Waste Water Management

Abstract: Monitoring systems are not able to monitor the water quality in all aspects of sectors like water emitted by

industries, drinking water, sea water etc., The aim of our project is to monitor the necessary quality parameters of the

water and reprocess it into Plasma Activated Water[PAW]. For knowing the purity content of water in day to day lives,

the system implemented, continuously checks and provides the data to the microcontroller. In order to ensure the safety

supply of the drinking water the quality needs to be monitored in real time. The system consists of serval sensors is used

to measure the physical and chemical properties of the water. The parameters such as temperature, pH, turbidity, flow

of the water can be measured. Furthermore, it is essentially converted to Plasma Activated Water[PAW] that acts as an

preservative for microbial infections. Non thermal plasma has been widely considered as an effective method for

bacterial inactivation in food safety. The bactericidal efficiency of Plasma Activated Water[PAW] was found to be

strongly dependent on PAW treatment intervals. Significant reduction in microbial populations were achieved in all

cases demonstrating the effectiveness of this new approach to treat contaminated media. Therefore Plasma Activated

Water [PAW] is a promising solution with potential application to the decontamination of equipment and surfaces.

Keywords: Temperature sensor, pH sensor, Turbidity sensor, Flow sensor, WI-FI module, Plasma Activated Water

[PAW], Microbial disinfection.

References: 1. Vaishnavi V. Daigavane and Dr.M.A.Gaikwad, "Water quality monitoring system based on IOT", ISSN 0973-6972 Volume 10, Number 5

(2017), pp. 1107-1116© Research India Publications, 2017. 2. Tha.Sugapriyaa, S.Rakshaya, "Smart water quality monitoring system for real time application", International journal of pure and applied

mathematics, Volume 118 No. 20 2018, 1363-1369 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version), 2018.

3. Jayti Bhatt,Jignesh Patoliya, "IOT based water quality monitoring system", International Journal of Industrial Electronics and Electrical Engineering, ISSN: 2347-6982, Volume-4, Issue-4, Apr.-2016.

4. J.M.Herry, G.Kangang-youbi, T.Meylheuc, "Microbial interaction using PAW obtained by gliding electric discharges", Letters in applied

microbiology, 2008.

126-129

32.

Authors: Vamsi, Manikanta, T. Anandhi

Paper Title: Survey on Enhancing Drainage Maintenance System Using IOT

Abstract: World has declared task making of many savvy urban communities. To develop a shrewd society one have

to look at numerous measurable factors, for example, brilliant water, savvy power, keen transportation and so on. There

is a scope of savvy system which incorporates lower-level water pipe connections, correspondence links, gas

connections, electric stream, and so forth. As the greater part of the urban areas in India have embraced lower level

drainage system, it was imperative that this mechanism should perform in a legitimate way to make the society spotless,

protected and sound. On the off chance that they neglect to keep up the scrap unadulterated water may transform to

polluted with drainage water. It also spread irresistible infections. So unique sort of idea has been done to identify, keep

130-135

Page 20: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

up and deal with these lower-level systems. Additionally, breaks and blasts are unpreventable parts of water conveyance

system the executives. It can represent noteworthy water misfortune inside a dispersion arrange whenever left un

notified for significant lot. The drainage system is the activity of depleting waste water and sticky fluid segments

towards the waterways utilizing specific examples, drainage channels and streams. Drainage system essentially alludes

to all the funneling inside the private and open premises which passes on sewage, water and other fluid waste to a point

of transfer. The associated gadgets will make the waste system increasingly agreeable to work, screen, control with less

assets and to take important activities. Over stream of sewage on streets is been a noteworthy issue in many created and

immature urban communities also. Sewage is commonly considered as waste water. The reaction to the protests isn't

appropriately replied or considered. A prudent system is created where this issue of sewage flood can be diminished by

early detecting of increment in its dimension. The system rather essentially studies and checking the dimension, issue

articulation and solution about the drainagesystem.

Keywords: Drainage Maintenance System, IOT, Enhancing Smart City.

References: 1. Prof S. A. Shaikh1, Suvarna A. Sonawane2, "Monitoring Smart City Application Using Raspberry PI based on IoT" International Journal of

Innovative Science, Engineering & Technology, Vol 5 Issue VIL, July 2017.

2. Prof Muragesh SK1, Santhosha Rao2, "Automated Internet of Things For Underground Drainage and Manhole Monitoring Systems For Metropolitan Cities." International Journal of Innovative Science, Engineering & Technology, Vol. 2 Issue 4, June 2015.

3. Chandraleka.T, Shruti Rathore, Ram Vignesh C, "Neer: automated water drainage and anti flooding System" International Journal Of Electrical,

Electronics And Data Communication, ISSN: 2320-2084 Volume-5, Issue-5, May-2017 http://iraj.in Neer: Automated Water Drainage and Anti Flooding System.

4. Gaurangsonawane, Chetan Mahajan, ,AnujaNikale, Yogita Dalvi, "Smart Real-Time Drainage Monitoring System Using Internet of Things" © MAY 2018 | IRE Journals | Volume 1 Issue 11 | Issn: 2456-8880 Ire 1700668 Iconic Research And Engineering Journals.

5. Shruthi Shri A. S, "Smart Drainage Monitoring and Clog Identification Using IOT", Department of Electronics and Communication Engineering

Kongu Engineering College Perundurai, Tamil Nadu, India, © 2017 IJSRSET | Volume 3 | Issue 8 | Print ISSN: 2395-1990 | Online ISSN : 2394-4099 Themed Section : Engineering and Technology.

6. GAURANG SONAWANE 1, CHETAN MAHAJAN 2, ANUJA NIKALE 3, YOGITA DALVI 4, "Smart Real-Time Drainage Monitoring

System Using Internet of Things" © MAY 2018 | IRE Journals | Volume 1 Issue 11 | ISSN: 2456-8880 IRE 1700668 ICONIC RESEARCH AND ENGINEERING JOURNALS.

7. Shankara Narayanan.S1, Ramprakash. G2, Rajapandiyan. V3, Saravana Perumal. R4, Rathnapriya. K5, "Integrative Detection of Open Drainage,

Garbage & Drainage over Flow and Current Leakage using Zigbee Technology" Student1, 2, 3, 4, M. Tech, Assistant Professor O.G5 Valliammai Engineering College, India.

8. Brown, Eric (13 September 2016)."Who need the Internet of things".Linux.com. Retrieved 23 October 2016.

9. Wemer-Allen, G., Johnson, J., Ruize, M., Less, J., and Welsh, Matt "Monitoring Volcanic Eruptions with a Wireless sensor Network. (ISSN: 2321 - 5658) Volume 01- Issue 04, December 2013 Asian Online Journals

10. Basha, D. and Rus, D. "Design of Early Warning Flood Detection System for developing countries. Proceeding of the conference on ICTD,

Bonsalove, India. Pp 1-10, 2007. 11. Yuwat, C. and Kilaso, S. " A Wireless Sensor Network for Weather and Disaster Alarm System" , IPCSIT Vol. 6, Singapore. Pp 1 - 5, 2011

12. Morias, R., Valente, A., Serodo, C. "A Wireless Sensor Network for Smart Irrigation and Environmental Monitoring.© MAY 2018 | IRE Journals

| Volume 1 Issue 11 | ISSN: 2456-8880 IRE 1700668 ICONIC RESEARCH AND ENGINEERING JOURNALS 6EFTA/WCCA Joint Congress

on IT in Agriculture, Portugal, pp 845 - 850. 2005

13. Windarto, J." Flood Early Warning System develop at Garang River Semarang using Information Technology base on SMS and Web".

International Journal of Geomatics and Geosciences Vol. 1 No. 1, 2010 14. Wirawam, S., Pratoma, I., and Mita, Nagahisa. "Design of Low Cost Wireless Sensor Network-Based Environmental Monitoring System for

Developing Country". Proceedings of APCC 2008.

15. Retno Tri Wahyuni1* Yusmar Palapa Wijaya2 Dini Nurmalasari "Design of Wireless Sensor Network for Drainage Monitoring System" Vol.5, No.5, 2014

16. Pathak A.K, Ko lhe A.N, GagareJ.T ,Khemnar S.M " GSM BASED DISTRIBUTION TRANSFORMER MONITORINGAND CONTROLLING

SYST EM" 17. Y. Glouche and P. Couderc,"A smart waste management with self-describing objects", The Second InternationalConference on Smart Systems,

Devices and Technologies (SMART'13), June 2013

18. V. Kumar and R.K.Pandit,"Problems of solid waste management in Indian cities", International Journal of Scientific and Research Publicat ions, Volume 3, Issue 3, March 2013

19. A. Ramirez-Jaime, N. Quijano, Senior Member, IEEE, and C.Ocampo-Ma rtine z, Senior Member, IEEE. "A Differential Game Approach to

Urban Drainage Systems Control " 20. A.Medvedev, P.Fedchenkov, A.Zaslavsky, T.Anagnostopoulos and S. Khoruzhnikov," Waste management as an IoTenabled service in smart

cities", 8th International Conference on Internet of Things and Smart Spaces, ruSMART 2015

33.

Authors: P. Adlene Ebenezer, Asha Shajee, Dhruv Patel, Himangshu Shekhar Saikia, Rahul Mishra

Paper Title: Analysis of Wireless Intrusion Detection and Prevention System against Cyber Attacks

Abstract: This is a proposed topology for a wireless networked control system. It is implemented under several cyber

attack scenarios and a distributed intrusion detection system (IDS) is designed to identify the existence of attacks. More

specifically, it presents a modelling framework for the closed-loop control system with the IDS. It ensures a

computational procedure to design and compute the IDS. After successful detection, IPS will be implemented.IPS

analyzes packets for harmful protocols and stops these packets from reaching their destination based on the results of

IDS.

Keywords: IDS, IPS, Cyber Security, Cyber Attack, Intrusion Detection and Prevention, Analysis System.

References: 1. Ahmad W. Al-Dabbagh, Yuzhe Li and Togwen Chen, "An Intrusion Detection System for Cyber Attacks in Wireless Networked Control

System," IEEE, 2016. 2. Kun Zhi Liu, Rui Wang and Guo Ping Liu, "Tradeoffs between transmission intervals and delays for decentralized networked control systems

based on a gain assignment approach", IEEE, 2015.

3. G.P Liu, "Predictive Controller Design of Networked Systems With Communication Delays and Data Loss", IEEE, 2010. 4. Konstantinos Gatis and Alejandro Riberio, "Optimal Power Management in Wireless Control Systems", IEEE, 2013.

5. Andre Teixiera, Iman Shames, Henrik Sandbag and Karl Hendrik Johnnason, "A secure control framework for resources limited adversaries,"

IEEE, 2015. 6. Hamza Fauzi, Paulo Tabuada and Suhas Diggavi, "Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks,"

136-140

Page 21: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

IEEE, 2013 7. M. Pajic, S. Sundaram, G. J. Pappas, and R. Mangharam, "The wireless control network: a new approach for control over networks," IEEE

Transactions on Automatic Control, vol. 56, no. 10, pp. 2305-2318, 2011.

8. R. Mangharam and M. Pajic, "Distributed control for cyber-physical systems," Journal of the Indian Institute of Science, vol. 93, no. 3, pp. 353-388, 2013.

9. I. Hwang, S. Kim, Y. Kim, and C. E. Seah, "A survey of fault detection, isolation, and recon?guration methods," IEEE Transactions on Control

Systems Technology, vol. 18, no. 3, pp. 636-653, 2010.

10. M. R. Davoodi, K. Khorasani, H. A. Talebi, and H. R. Momeni, "Distributed fault detection and isolation ?lter design for a network of

heterogeneous multiagent systems," IEEE Transactions on Control Systems Technology, vol. 22, no. 3, pp. 1061-1069, 2014.

R. E. Skelton, T. Iwasaki, and K. M. Grigoriadis, A Uni?ed Algebraic Approach to Linear Control Design. Taylor & Francis, 1998. 11. J. Han and R. E. Skelton, "An LMI optimization approach for structured linear controllers," in 42nd IEEE Conference on Decision and Control,

vol. 5, Maui, Hawaii, USA, 2003, pp. 5143-5148.

34.

Authors: B.J. Bipin Nair, T.R. Pruthvi

Paper Title: A Segmentation Approaches to Detect Autism and Dementia from Brain MRI

Abstract: Magnetic Resonance Imaging (MRI) and functional MRI (fMRI) studies involving allows to working

human brain to be imaged at high resolution within only in a particular time. In our studies fMRI helps in find out the

small changes in the brain image and using segmentation algorithm, using segmentation we locate the region in brain

MRI and apply any three-efficient segmentation technique checks, and finally predicting which algorithm is an efficient

way of doing segmentation the. Basically, so many researches are happened in the disorder like brain tumor, but the

present literature says that very less work happened in the disorder like mental and neurodevelopmental disorders. In

our proposed work, we are segmenting autism and dementia disorder using MRI image analysis.

Keywords: Fuzzy C-Means (FCM), K-Means, GT.

References: 1. Karani, N., Chaitanya, K., Baumgartner, C., &Konukoglu, E. (2018). A Lifelong Learning Approach to Brain MR Segmentation Across Scanners

and Protocols. arXiv preprint arXiv:1805.10170. 2. Iglesias, J. E., Augustinack, J. C., Nguyen, K., Player, C. M., Player, A., Wright, M., ...&Fischl, B. (2015). A ` segmentation of in vivo MRI.

Neuroimage, 115, 117-137.

3. Bhalerao, G. V., &Sampathila, N. (2014, November). K-means clustering approach for segmentation of corpus callosum from brain magnetic resonance images. In Circuits, Communication, Control, and Computing (I4C), 2014 International Conference on (pp. 434-437). IEEE.

4. El-Baz, A., Elnakib, A., Casanova, M. F., Gimel'farb, G., Switala, A. E., Jordan, D., & Rainey, S. (2011). Accurate automated detection of

autism-related corpus callosum abnormalities. Journal of medical systems, 35(5), 929-939. 5. Selvathi, D., &Anitha, J. (2009, March). Effective fuzzy clustering algorithm for abnormal MR brain image segmentation.In Advance Computing

Conference, 2009.IACC 2009. IEEE International (pp. 609-614). IEEE.

6. Forghani, N., Forouzanfar, M., &Forouzanfar, E. (2007, November). MRI fuzzy segmentation of brain tissue using IFCM algorithm with particle swarm optimization.

7. In Computer and information sciences, 2007.iscis 2007. 22nd international symposium on (pp. 1-4).IEEE.

8. Yushkevich, P. A., Piven, J., Hazlett, H. C., Smith, R. G., Ho, S., Gee, J. C., &Gerig, G. (2006). User-guided 3D active contour segmentation of anatomical structures: significantly improved efficiency and reliability. Neuroimage, 31(3), 1116-1128.

9. Shen, S., Sandham, W., Granat, M., &Sterr, A. (2005). MRI fuzzy segmentation of brain tissue using neighborhood attraction with neural-

network optimization. IEEE transactions on information technology in biomedicine, 9(3), 459-467. 10. Ahmed, M. N., Yamany, S. M., Mohamed, N., Farag, A. A., & Moriarty, T. (2002). A modified fuzzy c-means algorithm for bias field estimation

and segmentation of MRI data. IEEE transactions on medical imaging, 21(3), 193-199.

11. Zhang, Y., Brady, M., & Smith, S. (2001). Segmentation of brain MR images through a hidden Markov random field model and the expectation-maximization algorithm. IEEE transactions on medical imaging, 20(1), 45-57.

12. Bipinnairb.j., Arunjit k., &VijeshBhaskaran(2017). Melatonin and fluoxetine interaction with shank3 protein gene for autism spectrum disorder.

Pakistan journal of Biotechnology. 13. Rani, N. S., Verma, S. K., & Joseph, A. (2016). A Zone Based Approach for Classification and Recognition Of Telugu Handwritten Characters.

International Journal of Electrical and Computer Engineering (IJECE), 6(4), 1647-1653.

141-144

35.

Authors: G. Thamarai Selvi, M. Shanmuganathan, A. Sivabharath, S. Syed Irfan

Paper Title: Modern Methodology for the Detection and Removal of Herbicides

Abstract: It is known that the technical advancements are increasing at a faster pace. But the utilization of

technologies in various sectors are very low. We commonly know that nowadays, the fruits are highly infected with

herbicides. But we consume those fruits in our day-to-day lives. But because of their harmful effects, few people get

highly affected, babies in particular. So we propose a system to effective remove the herbicides present on the

fruit/Vegetable. Also we provide pest removal based on the amount of herbicide present on the fruit.

Keywords: Herbicide, Removal, Detection, Pic-Microcontroller, Neural Electrode.

References: 1. A. A. SHEHATA, W. SCHRODL, P. SEHLEDORN, AND M. KRUGER, "DISTRIBUTION OF GLYPHOSATE IN CHICKEN ORGANS

AND ITS REDUCTION BY HUMIC ACID SUPPLEMENTATION," JOURNAL OF POULTRY SCIENCE, VOL. 51, PP. 333-337, JUL 2014.

2. O. REBAI, M. BELKHIR, A. BOUJELBEN, S. FATTOUCH, AND M. AMRI, "MORUS ALBA LEAF EXTRACT MEDIATES NEUROPROTECTION AGAINST GLYPHOSATE-INDUCED TOXICITY AND BIOCHEMICAL ALTERATIONS IN THE BRAIN,"

ENVIRON SCI POLLUT RES INT, FEB 28 2017.

3. M. HVISTENDAHL, "IN RURAL ASIA, LOCKING UP POISONS TO PREVENT SUICIDES," SCIENCE, VOL. 341, PP. 738-9, AUG 16 2013.

4. K. C. WU, Y. Y. CHEN, AND P. S. YIP, "SUICIDE METHODS IN ASIA: IMPLICATIONS IN SUICIDE PREVENTION," INT J ENVIRON

RES PUBLIC HEALTH, VOL. 9, PP. 1135-58, APR 2012. 5. J. W. LEE, I. W. HWANG, J. W. KIM, H. J. MOON, K. H. KIM, S. PARK, ET AL., "COMMON PESTICIDES USED IN SUICIDE

ATTEMPTS FOLLOWING THE 2012 PARAQUAT BAN IN KOREA," JOURNAL OF KOREAN MEDICAL SCIENCE, VOL. 30, PP. 1517-

1521, OCT 2015. 6. J. P. MYERS, M. N. ANTONIOU, B. BLUMBERG, L. CARROLL, T. COLBORN, L. G. EVERETT, ET AL., "CONCERNS OVER USE OF

GLYPHOSATE-BASED HERBICIDES AND RISKS ASSOCIATED WITHEXPOSURES: A CONSENSUS STATEMENT," ENVIRONMENTAL HEALTH, VOL. 15, FEB 17 2016.

7. C. M. BENBROOK, "TRENDS IN GLYPHOSATE HERBICIDE USE IN THE UNITED STATES AND GLOBALLY," ENVIRON SCI EUR,

VOL. 28, P. 3, 2016.

145-147

Page 22: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

8. C. GASNIER, C. DUMONT, N. BENACHOUR, E. CLAIR, M. C. CHAGNON, AND G. E. SERALINI, "GLYPHOSATE-BASED HERBICIDES ARE TOXIC AND ENDOCRINE DISRUPTORS IN HUMAN CELL LINES," TOXICOLOGY, VOL. 262, PP. 184-91, AUG 21

2009.

9. R. HOKANSON, R. FUDGE, R. CHOWDHARY, AND D. BUSBEE, "ALTERATION OF ESTROGEN-REGULATED GENE EXPRESSION IN HUMAN CELLS INDUCED BY THE AGRICULTURAL AND HORTICULTURAL HERBICIDE GLYPHOSATE," HUM EXP

TOXICOL, VOL. 26, PP. 747-52, SEP 2007.

10. C. JAYASUMANA, P. PARANAGAMA, S. AGAMPODI, C. WIJEWARDANE, S. GUNATILAKE, AND S. SIRIBADDANA, "DRINKING

WELL WATER AND OCCUPATIONAL EXPOSURE TO HERBICIDES IS ASSOCIATED WITH CHRONIC KIDNEY DISEASE, IN

PADAVI-SRIPURA, SRI LANKA," ENVIRON HEALTH, VOL. 14, P. 6, JAN 18 2015.

36.

Authors: B. Deva Naga Sylesh, B. Varun Kumar, M. Saravanan

Paper Title: Member Counting in Smart Buildings

Abstract: In this contemporary age almost every person carries a mobile device. The quantity of cell phones present

(number of people) is resolved utilizing techniques that catch arrange parcels sent by cell phones utilizing the 802.11

convention. The parcels are caught utilizing a Wi-Fi scanner, an equipment gadget that enables data to be assembled

from 802.11/a/b/g/n/air conditioning systems. The quantity of individuals in a working with a satisfactory check of Wi-

Fi scanners might be resolved with a positive likelihood which, beside its factual significance, may likewise be key in

crisis circumstances in which it is basic to decide what number of individuals are inside a specific building. We are

implementing Zigbee based network for different locations like colleges/ Shops / Floors. Exit doors are connected to the

micro controller board for any immediate exit process initiated in case of any emergency. Android application is

deployed to the customers after entering into the Mall. We would count the people based on the Zigbee count in every

floor.

Keywords: Zigbee, Mobile WIFI, Android Application.

References: 23. S.Depatla, A. Muralidharan, and Y. Mostofi, “Occupancy Estimation Using Only Wi-Fi Power Measurements,” IEEE Journal on Selected Areas

in Communications, vol. 33, July 2015.

24. A. B. M. Musa and J. Eriksson, “Tracking unmodified smartphones using Wi-Fi monitors,” in Proc. ACM Conf. Embedded Network Sensor

Systems, ser. SenSys ’12. New York, NY, USA: ACM, 2012, pp. 281– 294. 25. Simone Di Domenico, Giovanni Pecoraro, Ernestina Cianea, Mauro De Sanctis, "Trained-once device-free crowd counting and occupancy

estimation using Wi-Fi: A Doppler spectrum based approach", 2016 IEEE 12th International Conference on Wireless and Mobile Computing,

Networking and Communications (WiMob), vol. 00, pp. 1-8, 2016. 26. Saravanan, M., Jyothi, V.L.Implementation of getting similarity images using the concept of IWSL Indian Journal of Science and

Technology,2016

27. S.Dhamodaran, K. R. Sachin and Rahul Kumar, “Big Data Implementation of Natural Disaster Monitoring and Alerting System in Real Time Social Network using Hadoop Technology”, Indian Journal of Science and Technology, Vol 8(22), IPL0278, September 2015

148-150

37.

Authors: B.V. Surya Vardhan, Mohan Khedkar, Nitin Kumar Kulkarni

Paper Title: Impact on Fuse Settings and Size of Photovoltaic Distributed Generation Source Due to Fault Current

Abstract: Fault current contribution due to Grid connected Photovoltaic (PV) source has become a crucial factor in

deciding the settings of protection equipments like fuse, circuit breaker etc. especially where there is a high level of

penetration of PV, estimated in Megawatts. Setting of protection equipment, size of PV source to be interfaced with the

grid depends on the magnitude of fault current from PV source, A inverter based distributed generation (PV) is

considered here, it has limited fault current contribution but as grid penetration level increases fault current contribution

becomes significant. This paper aims at determining the change in relay settings due to addition of PV sources and also

determining the size (MVA rating) of PV source w.r.t. to its fault current contribution to avoid the existing setting

changes of protection equipments. For this analysis ,a Real time system of Katol PV transmission Solar Power plant

near Nagpur is taken. Using Single line to ground fault given at Grid side, the system is analysed &simulated in

MATLAB Simulink environment. The simulation results show that, relay settings and Size (MVA rating) change

considerably due to addition of PV, into grid.

Keywords: Photo- Voltaic (PV), Inverter, fault current contribution, protection settings, Distributed Generation (DG).

References: 1. “Ministry of New and Renewable Energy(MNRE)”,Government Of India Website : www.mnre.gov.in.

2. J. A. P. Lopes, N. Hatziargyriou, J. Mutale, P. Djapic, and N. Jenkins, "Integrating distributed generation into electric power systems: A review

of drivers, challenges and opportunities," Electric Power Systems Research, vol. 77, pp. 1189-1203, 2007. 3. Analysis of Photovoltaic Systems, International Energy AgencyPhotovoltaic Power Systems Program, Paris, France, 2000.

4. D. Tom Rizy, Fangxing Li, Huijuan Li, Sarina Adhikari, John D. Kueck, "Properly Understanding the Impacts of Distributed Resources on

Distribution Systems," IEEE PES General Meeting 2010, Minneapolis, MN, July 25-29,2010. 5. B. Kroposki, C. Pink, R. DeBlasio, H. Thomas, M. Simoes, and P. K. Sen, "Benefits of power electronic interfaces for distributed energy

systems," in Power Engineering Society General Meeting, 2006. IEEE, 2006, p. 8 pp.

6. S.Bhattacharys, T.Saha, M.J Hossain, “Fault current contribution from photovoltaic systems in residential power networks”, Proceedings of the Australasian Universities Power Engineering Conference, Hobart, 2013, Australia, pp.1-6.

7. IEEE 1547 and 2030 standards for Distributed Energy Resources and Interconnection and Interoperability with the Electricity Grid, IEEE

Standards 8. A. Girgis and S. Brahma, "Effect of distributed generation on protective coordination in distribution system" in Large Engineering Systems

Conference on Power Engineering , July 2001, pp. 1 5-119

9. P. H. Shah, B. R. Bhalja, “New Adaptive Digital Relaying Scheme to Tackle Recloser–Fuse Miscoordination During Distributed Generation Interconnections,” IET Generation, Transmission and. Distribution, Vol. 8, Iss. 4, 2014 pp. 682–688.

10. IEEE Standard Inverse-Time Characteristic Equations for Overcurrent Relays, IEEE Std C37.112-1996.

151-154

38.

Authors: K. Malathy, S. Meenakshi

Paper Title: Fuzzy Soft Bi-partite Graph and Its Application in Employee Selection for An Organisation

Abstract: Fuzzy sets and soft sets are two different tools for representing uncertainty and vagueness. A fuzzy soft set

is a mapping from parameter set to the fuzzy subsets of universe. Fuzzy soft set theory provides a parameterized point 155-159

Page 23: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

of view for uncertainty modeling and soft computing model. In this paper we discuss the notions of fuzzy soft bi-partite

graph, Size and degree of fuzzy softbi-partite graph and investigating the application of Fuzzy soft Bi-partite graph in

Employee selection for an Organisation.

Keywords: Fuzzy soft graph, fuzzy soft bi-partite graph, and size and degree of fuzzy soft bi-partite graph.

References: 1. M.Akram, S. Nawaz, Fuzzy soft graphs with applications , Journal of Intelligent and Fuzzy Systems 30 (6) (2016) 3619 – 3632. 2. M.Akram, S. Nawaz , Operations onsoft graphs, Fuzzy Information and Engineering 7(4) (2015) 423 – 449.

3. Dr. K. Kalaiarasi and L. Mahalakshmi, An Introduction to Fuzzy strong graphs, Fuzzy soft graphs, compliment of fuzzy strong and soft

graphs,13,November 6(2017), 2235-2254. 4. J.N.Mordeson an C.S.Peneg, Operations on fuzzy graphs, Information sciences, 79, September 1994, 159 – 170.

5. S.Mohinta , T.K.Samanta, An Introduction to fuzzy soft graph , Mathematics Moravica19 – 2 ( 2015) 35 – 48.

6. T.K.MathewVarkey, A.M. Shyla . A Note on Bipartite and Balanced Fuzzy Graph Structures 6 ,7 (2017) : 12637 – 12640. 7. D.A.Molodtsov , Soft set theory -first results , Computers and Mathematics with Applications 37, 1999.

8. A.Rosenfeld, Fuzzy graph , in ; L.A.Zadeh, K.S.Fu, K.Tanaka, M.ShimuraedS , Fuzzy Sets and Their Applications to cognitive and decision

Process, Acaemic Press, New York, 1975, pp. 75 – 95. 9. N. Sarala, K. Manju, Application of Fuzzy soft Bi-partite graph in Matrimonial process, Volume 14, Issue 4 Ver. III (Jul - Aug 2018), PP 20-24.

39.

Authors: Himanshu Thakur, Ankit Rastogi, Ritik Raj Singh, Shubham Khanduri

Paper Title: Braking/Deceleration Mechanism in Hyperloop System Using Sensor Values and Feedback

Abstract: Hyperloop system is no longer a far-fetched idea and has got a lot of teams start to work on this seemingly

futuristic concept. Hyperloop system involves a high-speed pod travelling at a proposed speed of 700 mph. The

involvement of superlative speed at which the pod would be travelling brings down the entire focus on how to

decelerate and gradually stop the pod (i.e.) the braking system.

Keywords: Hyperloop, BLDC Motors, Arduino ATmega328P, Deceleration mechanism, RGB Sensor.

References: 1. Vivek Borse, Abhaysinha Satish Patil, and Rohit Srivastava, “Development and testing of portable flouroscence reader (PorFloRTM)” 2017 9th

international conference on communication systems and Networks(COMSNETS), January 2017.

2. Young Tae Shin ; Ying-Khai Teh, “Design analysis and considerations of power efficient electronic speed controller for small-scale quadcopter

unmanned aerial vehicle,” 2018 IEEE 8th Annual Computing and communications workshop and Conference(CCWC), 8-10 Jan 2018. 3. Neil Cameron,” Bluetooth Communication. In: Arduino Applied. Apress, Berkeley, CA”27 Dec 2018

4. Mark Seelye , Gourab Sen Gupta , Donald Bailey , John Seelye,” Low cost colour sensors for monitoring plant growth in a laboratory ” , 2011

IEEE International Instrumentation and Measurement Technology Conference ; 07 July 2011 5. Humayun Rashid , A.S.M Rabbi Al-Mamun , Mohammad Sijanur Rahaman Robin , Miraz Ahasan , S M Taslim Reza, ”Bilingual wearable

assistive technology for visually impaired persons ” , 2016 International Conference on Medical Engineering , Health Informatics and

Technology (MediTec) , 30 Jan 2017 6. Haifeng Lu , Lei Zhang , Wenlong Qu , ”Anew Torque Control Method for Torque Ripple Minimization of BLDC Motors with Un-Ideal Back

EMF”, IEEE Transactions on Power Electronics Volume: 23 , Issue: 2 , March 2008

7. Sukhen Das , Sanjoy Ganguly , Souvik Ghosh , Rishiraj Sarker , Debaparna Sengupta , ”A bluetooth based sophisticated home automation system using smarthone ” , 2016 International Conference on Intelligent Control Power and Instrumentation (ICICPI) , 23 Oct 2016

8. Aryuanto Soetedjo, M. Ibrahim Ashari, Claudio Ardiles, ” Development of Industrial control Training Module using Distance and Color Sensors

for Detecting Objects ” , Vol 1 No 1 (2017): International Journal of Engineering and Management , Aug 29 , 2017.

160-163

40.

Authors: S.P. Maniraj, R. Pranay Sharma, M. Venkata Siva Kumar, B.V. Sai Mohan Krishna, G. Sree Ram Pavan

Paper Title: Vulnerabilities and Security Issues in Cps and IOT for Wire Less Communication

Abstract: The concept of IoT stems from connected smart devices, which may or may not be connected physically

via wires. The Cyber-Physical Systems, on the other hand are complex distributed systems, consisting of a large number

of sensors and actuators, which are connected to a pool of computing nodes. With the fusion of sensors, computing

nodes, and actuators, which are connected through various means of communications, CPSs aim to perceive and

understand changes in the physical environment, analyse the impacts of such changes to their operation, and make

intelligent decisions to respond to the changes. Thus, in both CPS and IoT wireless communication plays a very

important role. With in increasing number of devices, the security against the manipulation of the sensor data is needed

as a change in the input can change the behaviour of the system altogether. In this paper, we take a deeper look into the

security issues and vulnerabilities of the wireless communication in both the Cyber Physical Systems (CPS) and the

Internet of Things (IoT).

Keywords: Distributed systems; nodes; manipulation; vulnerabilities.

References: 1. J. Shi, J. Wan, H. Yan, and H. Suo, “A survey of cyber-physical systems,” in Proc. Int. Conf. Wireless Commun. Signal Process., Nov. 2011, pp.

1–6, doi: 10.1109/WCSP.2011.6096958. 2. A. Humayed, J. Lin, F. Li, and B. Luo, “Cyber physical systems security—A survey,” CoRR,2017.

3. A. Chattopadhyay, A. Prakash, and M. Shafique, “Secure cyber-physical systems: Current trends, tools and open research problems,” in Proc.

DATE, 2017, pp. 1104–1109. 4. R. Want, “Near field communication,” IEEE Pervasive Comput., vol. 10, no. 3, pp. 4–7,Mar. 2011.

5. A. Chattopadhyay, A. Ukil, D. Jap, and S. Bhasin, “Towards threat of implementation attacks on substation security: Case study on fault

detection and isolation,” IEEE Trans. Ind. Informat.,2017, doi: 10.1109/TII.2017.2770096. 6. A. Wheeler, “Commercial applications of wireless sensor networks using ZigBee,” IEEE Commun. Mag., vol. 45, no. 4, pp. 70–77, Apr. 2007,

doi: 10.1109/MCOM.2007.343615.

7. Y. Mo and B. Sinopoli, “Integrity attacks on cyber-physical systems,” in Proc. of the 1st ACM International Conf. on High Confidence

Networked Systems, Beijing, China, Apr. 2012, pp. 47–54.

8. Y. Zou, J. Zhu, X. Wang, and L. Hanzo,“A survey on wireless security: technical challenges, recent advances, and future trends,” Proc. IEEE,

vol. 104, no. 9, pp. 1727–1765, Sep. 2016, doi: 10.1109/ JPROC.2016.2558521. 9. I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Commun. Surveys Tuts.,

vol. 16, no. 1, pp. 266–282, 1st Quart., 2014, doi: 10.1109/ SURV.2013.050113.00191.

164-167

Page 24: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

10. J. Sametinger, J. Rozenblit, R. Lysecky, and P. Ott, “Security challenges for medical devices,” Commun. ACM, vol. 58, pp. 74–82, Mar. 2015, doi: 10.1145/2667218.

11. B. Zhu, A. Joseph, and S. Sastry, “A taxonomy of cyber attacks on SCADA systems,” in Proc. Int. Conf. Internet Things 4th Int. Conf. Cyber

Phys. Soc. Comput., Oct. 2011, pp. 380–388, doi: 10.1109/ iThings/CPSCom.2011.34. 12. C. Gomez and J. Paradells, “Wireless home automation networks: A survey of architectures and technologies,” IEEE Commun. Mag., vol. 48, no.

6, pp. 92–101, Jun. 2010, doi: 10.1109/ MCOM.2010.5473869.

13. S. S. R. Ahamed, “The role of ZigBee technology in future data communication system,” J. Theor. Appl. Inf. Technol., vol. 5, no. 2, p. 29, 2009.

14. M. Zhou and Z.-L. Nie, “Analysis and design of ZigBee MAC layers protocol,” in Proc. Int. Conf. Future Inf. Technol. Manage. Eng., vol. 2.

Oct. 2010, pp. 211– 15, doi: 10.1109/ FITME.2010.5654824.

15. Y. Mo and B. Sinopoli, “False data injection attacks in control systems,” In Proc. of the 1st Workshop on Secure Control Systems, Stockholm, Sweden, Apr. 2010, pp. 56–62.

41.

Authors: Deeba Kannan, Kuntal Bajpayee, Samriddho Roy

Paper Title: Solving Timetable Scheduling Problems Using Genetic Algorithm

Abstract: There are various methods to solve the timetable scheduling problem and preventing various slots from

clashing like the ant colony optimization problem which by result is a very time consuming process and other approach

includes heuristic approach where problem can be solved by using trial and error method or by using a multi

dimensional matrix which again may or may not give the optimal solution .The most important factor which should be

taken in consideration is that it’s a NP hard problem which means there is not any best solution to this problem so ,by

considering all the above factors it is found that Genetic Algorithm (GA) is the best approach to such problem where

the main algorithm goal is to minimize the number of conflicts in the timetable and reduction to encoding of search

space.

Keywords: Scheduling, Genetic Algorithm, NP hard.

References: 1. C. Liang and Y. Lin, "A coverage optimization strategy for mobile wireless sensor networks based on genetic algorithm," 2018 IEEE

International Conference on Applied System Invention (ICASI), Chiba, 2018, pp. 1272-1275.

2. M. Omari and S. Yaichi, "Image compression based on genetic algorithm optimization," 2015 2nd World Symposium on Web Applications and Networking (WSWAN), Sousse, 2015, pp. 1-5.

3. M. Collard and D. Francisci, "Evolutionary data mining: an overview of genetic-based algorithms," ETFA 2001. 8th International Conference on

Emerging Technologies and Factory Automation. Proceedings (Cat.No.01TH8597), Antibes-Juan les Pins, France, 2001, pp. 3-9 vol.1. 4. Ahmed H. Yousef, Cherif Salama, Mohammad Y. Jad, Tarek El-Gafy, Mona Matar, Suzanne S. Habashi, "A GPU based genetic algorithm

solution for the timetabling problem", Computer Engineering & Systems (ICCES) 2016 11th International Conference on, pp. 103-109, 2016.

168-170

42.

Authors: J. Caroline El Fiorenza, Dinesh Udayakumar, Chandrasekar Rajah, M. Karthikeyan

Paper Title: Hardware based Anti-theft System for Smartphones

Abstract: In the world of technology, smartphones and laptops play a major role and is actively used by millions of

people around the world for the purpose of communication, entertainment and also as a tool for learning and updating

our knowledge. Users store important information on their smartphones ranging from personal details, photos, videos

and other confidential credentials such as banking information and even passwords. This possess a threat when the

smartphone is stolen where this information can be misused for certain criminal activities and all our important

information is at stake. The existing anti-theft systems are all software based where once stolen, these apps can be

uninstalled by anyone and hence cannot be accessed by owner and all the confidential information is gone with it too.

Therefore, the scope of this project is to propose a hardware based anti-theft system wherein a actual chip is embedded

in to the smartphone which can be accessed anytime by the user to track the smartphone even after the phone is reset

and also provide support for remotely erasing the data stored, hence data integrity is achieved and the data is not stolen.

The chip can communicate with the GPS sensor in the mobile and will provide GPS location of the smartphone in real-

time. The chip also has an dedicated storage where users can store important information and confidential data that can

be secured and can access it anytime.

Keywords: Anti-theft system, Cybersecurity, GPS, Information Security.

References: 1. Xixian LIU. A Method to Realize Guard Against Theft for Laptop[J]. Technology and Applications, 2011,(09):89-90.

2. BBC news: 314 mobile phones 'stolen in London every day', http://www.bbc.com/news/uk-england-london-21018569.

3. Norton Cybercrime Report 2011, http://us.norton.com/content/en/us/home_homeoffice/html/cybercrimereport/.

4. Symantec, “2014 Symantec canada smartphone honey stick project”,report, 2014. 5. “Tencent Mobile Phone Manager,” http://m.qq.com/anti_theft/login.jsp.

6. “Rising Phone Security Assistant,” http://mobile.rising.com.cn/android/.

7. X. Yu, Z, Wang, L. Sun, W. Zhu, N. Gao, and J. Jing, “Remotely wipingsensitive data on stolen smartphones,” in proceedings of the 9th ACMsymposium on Information, computer and communications security,2014, pp. 537-543.

8. L. Subramanian, G Q. M. Jr., and P. Stephanow, “An architecture toprovide cloud based security services for smartphones,” in proceedingsof

27th Meeting of the Wireless World Research Forum, 2011. 9. A. U. S. Khan, M. N. Qureshi, and M. A. Qadeer, “Anti-theft applicationfor android based devices,” in proceedings of IEEE

InternationalAdvance Computing Conference, 2014.

10. Simon, R. Anderson, “Security analysis of consumer-grade anti-theftsolutions provided by android mobile anti-virus apps,” in proceedings ofthe 4th Mobile Security Technologies Workshop, 2015.

11. “Software reduces identity theft risk in stolen cell phones,” http://mobiledevdesign.com/news/software-reduces-identity-theft-riskstolen-cell-

phones. 12. “Lookout Mobile Security,” https://www.lookout.com.

171-174

43.

Authors: S.V. Abishek, G.M. Dhuruva Priyan, Sridatt More, A. Suganthan

Paper Title: IoT based Smart Band for Biometric Authentication Using Blockchain Technology

Abstract: Internet of Things has been ‘the next big thing’ for a while now and it is estimated that the number of

connected devices will exceed 50 billion by 2020. This extravagant growth in number of connected devices has alarmed

us to shift the approach in designing identity and access management systems. People tend to provide different

175-181

Page 25: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

passwords and identifications for each of the platforms they use. This could be troublesome as they might forget their

password and lose their identifications as well. One more problem is that the user doesn’t know if he is providing only

the necessary information or he is exposing himself to something he is not supposed to. This makes us think about a

solution where the user provides minimum amount of his personal information for verification. We propose an IoT

based solution using smart band with fingerprint biometric system to achieve the idea of ”one touch multiple login” (i.e.

single band to authenticate multiple platforms). We have addressed the Self-sovereign identity crisis using blockchain

technology and its derived protocols.

Index Terms: Biometric, Blockchain, Internet of Things(IOT), Self Sovereign Identity, Smart Band.

References: 1. P. Grassi, M. Garcia, and J. Fenton. SP 800-63-3 Digital Identity Guidelines. Technical report, National Institute of Standards & Technology,

Gaithersburg, MD, United States, 2017. 2. 2410-2017 IEEE biometric open protocol standard (BOPS).https://standards.ieee.org/findstds/standard/2410-2017.html.

3. A. Ross and A. Othman. Visual cryptography for biometric privacy. IEEE transactions on information forensics and security, 6(1):70–81,2011.

4. M. Mealling and R. Denenberg. Report from the joint w3c/ietf uri planning interest group: Uniform resource identifiers (uris), urls, and uniform resource names (urns): Clarifications and recommendations. Technical report, 2002.

5. D. Reed and M. Sporny. W3c decentralized identifiers (dids) 1.0. https://w3c-ccg.github.io/did-spec/, 2017.

6. https://en.bitcoin.it/wiki/Proof_of_work 7. https://www.hindawi.com/journals/scn/2018/9675050/

8. https://www.bayometric.com/increasing-importance-ofbiometric-security/

9. https://medium.com/blockchain-education-network/what 10. -is-blockchain-explained-for-beginners-5e747cea271

11. https://www.experian.com/blogs/ask-experian/how-can 12. -biometrics-protect-your-identity/

13. https://www.androidauthority.com/how-fingerprint-sca nners-work-670934/

14. www.rfidjournal.com/faq/show?68 15. A. Ashok, Poornachandran, P., and Dr. Krishnashree Achuthan, “Secure authentication in multimodal biometric systems using cryptographic

hash functions”, Communications in Computer and Information Science, vol. 335 CCIS, pp. 168177, 2012.

16. N. Lalithamani and R, S., “Countermeasures for indirect attack for iris based biometric authentication”, Indian Journal of Science and Technology, 2016.

44.

Authors: M. Ramesh, S. Sathiyaseelan, I. Ajit

Paper Title: The Portrayal of Great Mathematicians in Movies: A Review

Abstract: Mathematics, the queen of science, is inevitable in every field of study. And it forms the basis for almost all

the subjects related to the realms of science and technology. To attain mastery in mathematics is a real feat and the

world needs to celebrate those masters. This paper reviews four films celebrating four great mathematicians the world

has ever seen. Also, the reason behind their genius and their contributions are described in this paper in detail.

Keywords: Biography, Film, Mathematics, Review, Queen of Science.

References: 1. Bai, C. and Gosman, A., (1996) Mathematical Modelling of Wall Films Formed by Impinging Sprays," SAE Technical Paper 960626,

https://doi.org/10.4271/960626. 2. Bharathi S T and Ajit I (2018) "Hyper Reality as a Theme and Technique in the Film Truman Show" Global Media Journal 30(16).

3. DeMare N (2016) "Exaggerations and stereotypes of schizophrenia in contemporary films" Elon Journal of Undergraduate Research in

Communications 7(1). 4. Latterell, C M. and Wilson, J L. (2004) "Popular Cultural Portrayals of Those Who Do Mathematics," Humanistic Mathematics Network Journal

27(7).

5. Nithin K (2016) "Screen Shifts in Recent Tamil Cinemas: The "New" New Wave" Research Scholar An International Refereed e-Journal of Literary Explorations 4(2).

6. Qadri M & Mufti S (2016) "Flims and religion: An analysis of Aamir Khan's PK" Journal of Religion & Film 20(1).

7. Ranganathan. M &Velayutham. S (2012) "Imagining Eelam Tamils in Tamil cinema" Journal of Media & Cultural Studies 26(6). 8. Wilson, J. L., &Latterell, C. M. (2001). Nerds? Or Nuts? Pop culture portrayals of mathematicians. ETC: A Review of General Semantics, 58(2),

172-178.

9. Latterell, C M. and Wilson, J L. (2004) "Popular Cultural Portrayals of Those Who Do Mathematics," Humanistic Mathematics Network Journal. 27(7).

10. https://www.youtube.com/watch?v=bgfZ7db0e6I, Retrieved on 20th June 2018.

11. https://www.youtube.com/watch?v=PfBZWwQ_5Y4, Retrieved on 05th May 2018. 12. https://www.youtube.com/watch?v=Q96N7EJ-jnU, Retrieved on 17th May 2018.

182-185

45.

Authors: Mary Thomas

Paper Title: Lyrics from Popular Songs and Rhyme to Enhance the ESL Learner's Proficiency in English Language

Abstract: The recent winning of the Nobel Prize for literature by Bob Dylan, a songwriter and lyricist inspired the

writing of this article. It has always been a dormant idea in my mind to use lyrics to get children interested in learning

the English Language. The acknowledgement of lyrics as a form of literature reinforced my conviction of the power of

the written and spoken Word and its effect on its listeners. Being an experienced teacher of English language I have

always adopted an eclectic approach to the teaching of Language; deciding on the most suitable technique and applying

the most appropriate methodology to achieve learner's specific objectives, learning style and context. English language

learning is a process that fits the method to the learner not the learner to the method. We should as teachers of language

opt for new trends that are more eclectic and humanistic in nature, which deals with emotions in the mind of the learner.

We can use technology and the audio linguicism to capture the attention of the learner. The teaching of English and the

imbibing of a language should be inherently and predominantly communicative. The most innate fact underlying the

mastery of a language is to make learning it an enjoyable experience.

Language cannot be taught but should be imbibed. We the teachers of English should be the facilitators helping children

imbibe the English Language. The doorway to a new enriching experience, the window to the world through which the

learner can explore and express his or her innate dreams and desires. The importance of the spoken word is something

186-190

Page 26: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

that I have always reiterated in all my classes of training and language learning. We must focus on the need to teach it

in a more creative manner through lyrics of popular rhymes and songs that not only touch the mind but also every

aspect of the life of prospective learners. It is an enjoyable and fun-filled method of imbibing the nuances of a

Language. Without a doubt, it transforms the uninterested student to an eager participant in the activity of learning and

imbibing and enriching himself and herself. I am a believer in the Power of the Word and its capacity to transform

something mundane to lofty heights. That has been my mission statement from the beginning of my English teaching

career that has spanned around twenty-five years of my life.

Keywords: Lyrics, Songs, Rhymes, Written and Spoken Words, Language Acquisition, Eclectic Approach, Audio

Linguicism, Humanistic Approaches, Communicative Language Teaching.

References: 1. Asher, J. James. (1993). Learning Another Language Through Actions. The Complete Teacher's Guidebook: Sky Oaks Productions 2. Dahl, Roald, Rhyme Stew

3. James, Clive. Norton. (2015) Poetry Notebook: Reflections on the Intensity of Language

4. Jolly, Y.S. (1975). The Use of Songs in Teaching Foreign Languages. The Modern Language Journal, 59(1/2), 11-14. http://dx.doi.org/10.2307/325440

5. Lawson, Jenny. (2015) Furiously Happy: Funny Book about Horrible Things

6. Murphey, T. (1992). Music and Song. Oxford, England: Oxford University Press 7. One Minute Till Bedtime: 60-Second Poems to Send you off to Sleep.

46.

Authors: A. Ajai, G. Bhuvaneswari

Paper Title: Multiple Colours of Gandhi in Post-Colonial Cinema

Abstract: Cinema is considered as the powerful medium for conveying ideas and documenting the history and

cultures of the world. Every filmmaker has their style of expressing their ideas through their portrayal. Sometimes, the

ideas may be conflicting and even controversial. Any individual once into public life is prone to criticism. Mahatma

Gandhi, father of our nation who put forth Ahimsa, non-violence, Love for all is criticized for his stand on the partition

of the nation, double side on Casteism, etc. This paper discusses the colors, herecolor refers to the stand or the faces of

Gandhi as portrayed in different movies.

Keywords: Mahatma Gandhi, Post-Colonial Cinema, Filmmaking, Mass Media.

References: 1. Birla, GhanshyamDass. In the Shadow of the Mahatma. 1953. 2. Dalton, Dennis. Mahatma Gandhi: Nonviolent power in action. Columbia University Press, 2012.

3. Gandhi, Mahatma. Autobiography: The story of my experiments with truth. Courier Corporation, 1948. 4. Gandhi, Mahatma. The Moral and Political Writings of Mahatma Gandhi: Civilization, Politics, and Religion. Vol. 1. Clarendon Press, 1986.

5. Gandhi. Non-Violent Resistance (Satyagraha).Dover Publications, 2001. Nagler, Michael N. The Nonviolence Handbook a Guide for Practical

Action.Berrett-Koehler, 2014. 6. Huttenback, Robert A. Racism, andEmpire: White settlers and colored immigrants in the British self-governing colonies, 1830-1910. Cornell

UnivPr, 1976.

7. Iyer, RaghavanNarasimhan. "The moral and political thought of Mahatma Gandhi." (2000). 8. Kehr, Dave. “FILM REVIEW; Gandhi Is Eclipsed by Another Revolutionary Hero of India's Freedom Fight.” The New York Times, The New

York Times, 10 June 2002, www.nytimes.com/2002/06/10/movies/film-review-gandhi-eclipsed-another-revolutionary-hero-india-s-freedom-

fight.html. 9. “Mahatma Gandhi Continues to Influence Indian Cinema: Author - Indian Express.” IndianExpress.com, 12 Nov. 1202,

archive.indianexpress.com/news/mahatma-gandhi-continues-to-influence-indian-cinema-author/1025175/.

10. Mahesh, Chitra. “‘The Legend of Bhagat Singh''.” Thehindu.com, 14 June 2002. 11. Tripathi, Akul. “Gandhi on and in Cinema.” Mkgandhi.org, Oct. 2015.

12. Stam, Robert. Film Theory: an introduction. Blackwell Publishers 2000

13. Said, E. (1978). Orientalism: Western representations of the Orient. New York: Pantheon. 14. https://www.youtube.com/watch?v=TNAdYLbGLKY

MOVIES CHOSEN:

15. Attenborough, Richard, director. Gandhi. Columbia Pictures, 1982.

16. Hassan, Kamal, director. Hey Ram. Kamal Hassan, 2000. 17. Patel, Jabbar, director. Dr. BabasahebAmbedkar. Tirlok Malik, 2000.

18. Santoshi, Rajkumar, director. The Legend of Bhagat Singh. Tips Industries Limited, 2002.

191-195

47.

Authors: M.J. Bharathi, V.N. Rajavarman

Paper Title: A Survey on Big Data Management in Health Care Using IOT

Abstract: The Industrial science can decrease by and large expenses for the deterrent or administration of ongoing

diseases. That makes utilization of different sensor gadgets and innovations which consequently administrate

treatments, counsel wellbeing pointers that track continuous wellbeing information while a patient self-regulates a

treatment. This paper displays the Big information wellbeing application framework dependent on the Internet of

Things. The advantage of this action incorporates the accessibility, capacity to customize, and practical conveyance. All

things considered, many assignment should be tended to in trim to create precise, appropriate, sheltered, adaptable and

control productive frameworks fit for medicinal requirements. This paper produce the review of all primary approach in

Big Data analytics for healthcare- accouterment sensors, advanced pretentious healthcare systems in IOT Technologies

that are intended to providing telemedicine interferences to individuals for healthier condition.

Keywords: IOT, Big data, Healthcare, Security.

References: 1. https://www.ngdata.com/what-is-big-data-analytics

2. I.Olaronke, O.Oluwaseun, “Big data in healthcare: Prospects, challenges and resolutions” In Future Technologies Conference (FTC), IEEE, pp.

1152-1157, December,2016.

196-198

Page 27: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

3. R.Thomas-MacLean, D.Tarlier, S.Ackroyd-Stolarz, M.Fortin, M.Stewart, “No cookie-cutter response: conceptualizing primary health care”,2014. 4. https://iot.ieee.org/images/files/pdf/networks-of-things_jeff-voas_5-31-2016.pdf

5. https://iotdunia.com/what-is-an-iot-platform

6. https://hitconsultant.net/2017/11/03/internet-things-digital-future-value-based-care/ 7. C.Doukas, I.Maglogiannis, “Bringing IoT and cloud computing towards pervasive healthcare”, In Innovative Mobile and Internet Services in

Ubiquitous Computing (IMIS), 2012 Sixth International Conference on . IEEE,pp. 922-926, July, 2012.

8. S.R.Islam, D.Kwak, M.H.Kabir, M.Hossain, K.S.Kwak, “The internet of things for health care: a comprehensive survey”, IEEE Access, 3,

pp.678-708,2015..

9. K.Kavitha,, G.Suseendran, “A Review on Security Issues of IOT Based on Various Technologies”, Journal of Advanced Research in Dynamical

and Control Systems, Vol.10 (4), June, 2018. 10. H.K.Patil, R.Seshadri,"Big data security and privacy issues in healthcare." Big Data (BigData Congress), 2014 IEEE International Congress on.

IEEE,June,2014.

11. http://triotree.com/blog/medical-internet-of-things-challenges-benefits-applications/

48.

Authors: Krishna Prakash Kalyanathaya, D. Akila and P. Rajesh

Paper Title: Advances in Natural Language Processing – A Survey of Current Research Trends, Development Tools and

Industry Applications

Abstract: Natural Language Processing (NLP) is a subfield of Artificial Intelligence and getting lot of focus on

research and development due to emergence of its applications. The research areas in focus are conversation systems,

Language processing, Machine Translation, Deep learning. The researches in these areas lead to development of many

tools to build industrial applications. Combining Deep Learning techniques with Natural Language Processing is

finding lot of applications in domains such as Healthcare, Finance, Manufacturing, Education, Retail and customer

service. This paper provides bird’s view of advancement in research, development and application areas of Natural

Language Processing. This paper captures21research focus areas, 22 development tools and 6 domains where Natural

Language Processing are making rapid advancements.

Keywords: used in this text: NLP, Natural Language Processing, Deep Learning, Sentiment Analysis, Question

Answering, Dialogue Systems, Parsing, Named-Entity Recognition, POS Tagging, Chatbots, Human-Computer-

Interface.

References: 1. Daniel W. Otter, Julian R. Medina, and Jugal K. Kalita. 2018. A Survey of the Usages of Deep Learning inNatural Language Processing. 1, 1

(July 2018), 35 pages. 2. ROBERT DALE. "The commercial NLP Landscape in 2017", Article in Natural LanguageEngineering, July2017

3. ACL 2018: 56th Annual Meeting of Association for Computational Linguistics https://acl2018.org

4. Predictive Analytics Today: www.predictiveanalyticstoday.com[accessed in Dec 2018] 5. Ali Shatnawi, Ghadeer Al-Bdour, Raffi Al-Qurran and Mahmoud Al-Ayyoub 2018. A Comparative Study of Open Source Deep Learning

Frameworks. 2018 9th International Conference on Information and Communication Systems (ICICS)

6. Intelligent automation: Making cognitive real Knowledge Series I Chapter 2. 2018, EY report. 7. Jacques Bughin, Eric Hazan, SreeRamaswamy, Michael Chui , TeraAllas, Peter Dahlström, Nicolaus Henke, Monica Trench, 2017. MGI

ARTIFICIAL INTELLIGENCE THE NEXT DIGITAL FRONTIER? McKinsey & Company McKinsey & Company report July 2017

8. Svetlana Sicular, Kenneth Brant 2018, Hype Cycle for ArtificialIntelligence, 2018 Gartner report July 2018. 9. McCallum, Andrew Kachites. "MALLET: A Machine Learning for Language Toolkit." http://mallet.cs.umass.edu. 2002.

10. Quarteroni, Silvia. (2018). Natural Language Processing for Industry: ELCA’s experience. Informatik-Spektrum. 41. 10.1007/s00287-018-1094-

1. 11. Young, Tom &Hazarika, Devamanyu&Poria, Soujanya& Cambria, Erik. (2018). Recent Trends in Deep Learning Based Natural Language

Processing [Review Article]. IEEE Computational Intelligence Magazine. 13. 55-75. 10.1109/MCI.2018.2840738.

12. Amirhosseini, Mohammad Hossein, Kazemian, Hassan, Ouazzane, Karim and Chandler, Chris (2018) Natural language processing approach to NLP meta model automation. In: International Joint Conference on Neural Networks (IJCNN), 8-13 July 2018, Rio de Janeiro, Brazil.

199-201

49.

Authors: P. Tamilarasi, D. Akila

Paper Title: Ground Water Data Analysis using Data Mining: A Literature Review

Abstract: Data mining is the process of discovering patterns from hidden datasets. Data mining tools are most widely

used in ground water quality prediction. Most of the agriculture field relies on ground water. The accurate prediction of

ground water quality may help in growth of agriculture sector. There are number of techniques for predicting Ground

water quality and Ground water levels such as regression analysis, clustering algorithms. There are many classification

algorithms used in data mining. The appropriate use of classification algorithm will enhance the prediction of water

quality easy and accurate. This paper conducts literature survey on recent researches in this field up to date. The study

reviews on the techniques of analysing ground water data to develop proper models for improving the quality and

prediction of ground water.

Keywords: Ground Water Quality, prediction, Data Mining, Classification Techniques, clustering algorithms.

References: 1. F. Aburub and W. Hadi, “Predicting Groundwater Areas Using Data Mining Techniques : Groundwater in Jordan as Case Study,” vol. 10, no. 9,

pp. 1621–1624, 2016. 2. J. Bansal and A. K. Dwivedi, “Assessment Of Ground Water Quality By Using Water Quality Index And Physico Chemical Parameters : Review

Paper,” vol. 7, no. 2, pp. 170–174, 2018.

3. A. P. Chatur, P. R. V Mante, and A. R. Dhakne, “Brief Survey of Different Techniques for Prediction of Groundwater Level and Groundwater Quality,” vol. 4, no. 11, pp. 168–172, 2017.

4. S. V. S. G. Devi, “Ground Water Quality Data Analysis Using Classification Techniques.”

5. S. M. Gorade and P. A. Deo, “A Study of Some Data Mining Classification Techniques,” pp. 3112–3115, 2017. 6. I. Journal et al., “Water Quality Prediction Using Data Mining techniques : A Survey,” vol. 3, no. 6, pp. 6299–6306, 2014.

7. K. Kolli, “Ground Water Quality Assessment using Data Mining Techniques,” vol. 76, no. 15, pp. 39–45, 2013.

8. S. Physics, “Evaluation of groundwater vulnerability using data mining technique in Hashtgerd plain,” vol. 42, no. 4, pp. 35–41, 2017.

9. U. P. Pradesh, “Analysis of groundwater quality using water quality index : A case study of greater Noida ( Region ), Uttar,” Cogent Eng., vol.

44, pp. 1–11, 2016.

10. R. Priya and R. Mallika, “Ground Water Quality Modelling for Irrigation Using Data Mining Technique and Spatio-Temporal Dates,” vol. 12, no. 16, pp. 6097–6101, 2017.

202-205

Page 28: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

11. C. Sarala and R. B. P, “Assessment of Groundwater Quality Parameters in and around Jawaharnagar , Hyderabad,” vol. 2, no. 10, pp. 1–6, 2012. 12. A. Shanmugasundharam, G. Kalpana, S. R. Mahapatra, E. R. Sudharson, and M. Jayaprakash, “Assessment of Groundwater quality in

Krishnagiri and Vellore Districts in Tamil Nadu , India,” Appl. Water Sci., vol. 7, no. 4, pp. 1869–1879, 2017.

50.

Authors: S. Arockiaraj, S. Sundara Mahalingam, B.V. Manikandan and V.P. Gowtham Kumar

Paper Title: A Reversible Data Hiding Technique Using Histogram Modification and SMVQ for Very Large Payloads

Abstract: Reversible data hiding (RDH) is the process of embedding secret information into a cover image. The

prime essence of the concept is that, the recovered secret information as well as the cover image should be recovered

without any damage or with imperceptible error in the pixel values. In this paper, we propose an RDH technique based

on simple histogram modification and SMVQ. The proposed histogram modification technique attains high PSNR

values with impressive payload capacities. The SMVQ technique further increases the payload capacity by four folds.

The damage in the extracted secret message is imperceptible and the recovered cover image is either exactly same or

has a very high PSNR value. The algorithm has been well tested and compared with various other techniques.

Keywords: RDH, PSNR, SMVQ, PAYLOADS.

References: 1. Chuan Qin, Chin-Chen Chang, Yi-Ping Chiu, “A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting”,

IEEE Transactions Image Processing,Vol. 23, Issue 3, pp. 969 – 978, Jan 2014. 2. Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354 – 362, Mar.

2006.

3. Fridrich, J., Goljan, M. and Du, R. Lossless data embedding — new paradigm in digital watermarking. EURASIP J. Appl. Signal Process., 2002,

2002, 185–196.

4. Fridrich, J., Goljan, M. and Du, R. Lossless data embedding for all image formats. Proc. SPIE, 4675, 572–583.

5. Celik, M. U., Sharma, G., Tekalp, A. M. and Saber, E. Reversible data hiding, Proc. IEEE Int. Conf. on Image processing: ICIP 2002, Rochester, NY, USA, September 2002, IEEE, Vol. II, pp. 157–160.

6. Tian, J. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol., 2003, 13, 890–896.

7. Alattar, A. M. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process., 2004, 13, 1147–1156.

8. Ni, Z., Shi, Y. Q., Ansari, N. and Su, W. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol., 2006, 16, 354–362.

9. Chang, C. C. and Lu, T. C. A difference expansion oriented data hiding scheme for restoring the original host images. J. Syst. Software, 2006, 79, 1754–1766.

10. Weng, S., Zhao, Y. and Pan, J. S. A novel reversible data hiding scheme. Int. J. Innov. Comput. Inf. Control, 2008, 4, 351–358.

11. Tseng, H. W. and Chang, C. C. An extended difference expansion algorithm for reversible watermarking. Image Vision Comput., 2008, 26, 1148–1153.

12. Thodi, D. M. and Rodriquez, J. J. Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process., 2007, 16, 721–730.

13. Tseng, H. W. and Hsieh, C. P. Prediction-based reversible data hiding. Inf. Sci, 2009, 179, 2460–2469. 14. Fallahpour, M. and Sedaaghi, M. H. High capacity lossless data hiding based on histogram modification. IEICE Electron. Express, 2007, 4, 205–

210.

15. Lin, C. C. and Hsueh, N. L. A lossless data hiding scheme based on three-pixel block differences. Patt. Recogn., 2008, 41, 1415–1425. 16. Lin, C. C., Tai, W. L. and Chang, C. C. Multilevel reversible data hiding based on histogram modification of difference images. Patt. Recogn.,

2008, 41, 3582– 3591.

17. Tsai, P., Hu, Y. C. and Yeh, H. L. Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process., 2009, 89, 1129–1143.

18. Tai, W. L., Yeh, C. M. and Chang, C. C. Reversible data hiding based on histogram modification of pixel differences. IEEE Trans. Circuits Syst.

Video Technol., 2009, 19, 906–910.

206-212

51.

Authors: P. Suresh and J. Revathy

Paper Title: Women’s Decision and Its Consequences Portrayed in Kavery Nambisan’s on Wings of Butterflies’

Abstract: Decision Making is a standout amongst the hugest fundamental abilities which can be gained just by having

great information about the idea and great determining aptitudes. This could be absorbed just by means of

understanding. It is an essential fundamental ability that one ought to have. Ladies get influenced by numerous

components while taking a choice, for the most part in the essential circumstances of their life. In this article, it will talk

about whether the life decisions of ladies depend on mental variables or not, If anyway, how they will be influenced by

those mental elements? Does the choices that are taken by ladies, do they influence both their own and expert lives?

Assuming this is the case, what can be the cure? The journey for the reactions of these inquiries is investigated from the

life of women of the novel On Wings of Butterflies (2002) by the famous author Kavery Nambisan. Her books express

the requirement for liberation, enlightenment and Decision Making of ladies; along these lines, her novel On Wings of

Butterflies (2002) has been set in the dialogue to show signs of improvement comprehension of the proposed point

"Women's choices and its results".

Keywords: Decision making, Psychoanalysis, Nightmares, Independent choices, mental traumas Wrong choices,

psychosomatic knowledge, and crucial circumstances.

References: 1. De, Shoba. Spouse: The Truth about Marriage. New Delhi: Penguin Books India Ltd, 2005. 2. Freud, Sigmund The Interpretation of Dreams the Illustrated Edition, Sterling Press 2010.

3. Irigaray, Lace. An Ethics of Sexual Difference. Trans. from the French by Carolyn Burke & Gillian C. Gill. London. NewYork: Continuum, 2004

4. Jung, Carl. Man and His Symbols. London: Pan Books, 1964. 5. Knoll G 1973. Management for Modern Family. New Jersey: Practice Hall Publications.

6. Myles, Anita. Feminism and Post Modern Indian Women Novelists in English. New Delhi: Sarup & Sons, 2006.

7. Nambisan, Kavery. On Wings of Butterflies. New Delhi. Penguin Books. 2002. 8. Nambisan, Kavery. The Scent of Pepper. New Delhi: Penguin Books India Ltd, 1996.

9. Rao PV 1982. Marriage, Family and Women in India. New Delhi, Heritage Publishers, 156 – 196

10. Wood, E Samuel, Green-Wood, R Ellen, the World of Psychology, United States of America: Allyn and Bacon, 1993.

213-218

52.

Authors: P. Suresh and R. Prigya

Paper Title: Humanistic Aspects Found in A.K.Ramanujan’s Poems

Page 29: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

Abstract: Humanistic psychology is a psychological perspective that emphasizes the study of the whole person.

Humanistic psychologists believe that an individual's behaviour is related to his innermost feelings and self-perception.

Humanistic psychologists believe that human being is not merely the product of their surroundings. Though humanistic

psychologist study human values, considerations, and skills involved in growing, teaching, and learning. They highlight

features which are shared by all human beings such as love, sorrow, caring, and self-esteem. This paper focuses on the

Humanistic perspectives found in the poems of A. K. Ramanujan. His poems always have a union of his Physical

background in the West and his Origin to the Indian experiences to trace his individuality. Ramanujan has offered the

Indian culture, family, love and human relationships. His verse appears from heaviness amongst self and history. It

turns into the impressions of the exquisite person is a mystery. The necessity for relating oneself is to history through

resolutions opinions up close and personal with the contemporary ambience whose primary modes - the congruity of

custom fantasy, writing and family were a great extent sterile. He could merge the fundamental Indian sensibility with

the temper of advancement in his verse with a lot of ability. Though Ramanujan lived in the West, he did not forget his

own country and written many poems where he finds that relationships are delineated. The poems taken for highlighting

the humanistic perspectives are Ecology, Obituary, Self-portrait, Snakes, and Striders etc.

Keywords: Humanistic psychology, self-perception, human values, relationships, self –esteem.

References: 1. A.K.Ramanujan The Collected Poems (1995) Oxford University Press. New York. Print. 2. Bhatnagar, M.K. The Poetry of A.K.Ramanujan. New Delhi: Atlantic Publishers and Distributors, 2002. Print.

3. Bruce King, Twentieth Century Indian English Poetry Oxford University Press. New Delhi, 1987. Print.

4. Dwivedi, A.N. A.K.Ramanujan and His Poetry. New Delhi: Doaba House, 1983. Print. 5. Dwivedi, A.N. The Poetic Art of A.K.Ramanujan. New Delhi: B.R. Publishing Corporation, 1983. Print.

6. Indian English Literature, Edited by BasavarajNaikar. Atlantic Publishers, 2011. Print.

7. Iyengar, K. R. Srinivasa. Indian Writing in English.New Delhi: Sterling Publishers Pvt. Ltd., 1990. Print. 8. K. Raghavendra Rao, The Poetry of A.K.Ramanujan in aspects of Indian Writing in English (ed.) M.K.Naik (1979) Print.

9. M.K. Naik, Dimensions of Indian English Literature, New Delhi, 1984. Print.

10. Vasant A. Sahane& M. Shivramkrishna. (eds.) Indian Poetry in English: A Critical Assesment, MacMillan. New Delhi. 1981. 11. ZiniaMitra, Indian Poetry in English PHI Learning Private Limited, New Delhi. 2012. Print.

219-224

53.

Authors: T.D. Srividya, V. Arulmozhi

Paper Title: A Review of Threshold based Segmentation for Skin Cancer with Image Processing

Abstract: Detecting skin cancer in premature stage is vital and decisive. Nowadays skin cancer is considered as the

most hazardous forms of cancer in humans. Skin cancer are of various types such as Melanoma, Basal and Squamous

cell carcinoma, amongst Melanoma is most erratic. The Malignant Melanoma is one of the dangerous in humans. Early

diagnosis can be curable. In Medical Image Diagnosis Computer vision plays an important role which is proved by

many existing systems.

This paper explains the method for detection of melanoma using image processing tools. The Efficient tools supporting

quantitative medical diagnosis are computer analysis and image processing. So the feature extraction phase is

enormously dependent on the detected region which has the disease. So suitable segmentation algorithm is required

which can effectively detect the skin melanoma pixels in the information image. In this work, we have discussed

various techniques which are used in the segmentation procedure.

This paper focuses on the method for the detecting Melanoma Skin Cancer by Segmentation. The input to the system is

the Dermoscopic Image and then by applying novel image processing techniques. The pre-processing approaches

employed in detecting various stages include collection of Dermoscopic Images, filtering the images by using Dull

Razor filtering for removing hairs and air bubbles in the image, converting to gray scale, noise filtering, segmenting the

images using threshold, hybrid threshold, iterative threshold, multilevel thresholding and Automatic Threshold.

Keywords: Skin cancer, Segmentation, Thresholding, Melanoma Detection, Digital Image, Carcinoma.

References: 1. EbthihalAlmansour and M.ArfanJaffar “Classification Of Dermoscopic Skin Cancer Images Using Color And Hybrid Texture Features” IJCSNS

International Journal of Computer Science and Network Security, VOL.16 No.4, April 2016

2. S.Gopinathan1, S. Nancy Arokia Rani2The Melanoma Skin Cancer Detection and Feature Extraction through Image Processing Techniques-

(IJETTCS)Volume 5, Issue 4, July - August 2016 ISSN 2278-6856

3. Sanjay Jaiswar, MehranKadri, VaishaliGatty “Skin Cancer Detection Using Digital Image Processing” IJSER ISSN (Online): 2347-3878 4. Saudamini S. Jivtode1, Amit Ukalkar2 “ Neural Network Based Detection of Melanoma Skin Cancer” International Journal of Science and

Research (IJSR) ISSN(Online): 2319-7064 5. A.S.Deshpande 1, GajbarAmruta M 2 “Automated Detection of Skin Cancer and Skin Allergy” IJARCSMS Issn:2321-7782

6. Ruchika Sharma*, Dr. Pankaj Mohindru, Dr. Pooja Review of Segmentation Techniques for Melanoma Detection Volume 6, Issue 7, July 2016

ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering 7. M.Chaithanya Krishna 1, S. Ranganayakulu 2, DR.P.Venkatesan3Skin Cancer Detection and Feature Extractionthrough Clustering

TechniqueISSN(Online): 2320-9801 ISSN (Print) : 2320-9798,International Journal of Innovative Research in Computer and Communication

Engineering,Vol. 4, Issue 3, March 2016 8. Swathi K and Raghavendra C.K “Techniques of skin cancer detection and classification”-IJTRD-vol 4(3), ISSN:2394-9333

9. Hina Sood#1, ManshiShukla*2, “Segmentation of Skin Lesions from Digital Images using an optimized Approach: Genetic A algorithm” IJCSIT

Vol 5 (5),2014, 6831-6837 ISSN:0975-9646 10. Sanjay Jaiswar, MehranKadri, VaishaliGatty “Skin Cancer Detection Using Digital Image Processing” IJSER ISSN (Online): 2347-3878

11. Roy Jackson Monteiro1, Dhanush J.K2 and Nausheeda B.S3“Comparison of various segmentation algorithms in image processing” International

Journal of Latest Trends in Engineering and Technology Special Issue SACAIM 2016, pp. 241-247e-ISSN:2278-621X

225-228

54.

Authors: P. Suresh, D. Angeline Jeba

Paper Title: The Struggle of Women, Social Realities and Psychological Approach in Ann Petry's The Street and the

Narrows

Abstract: This paper focuses on the investigation of Ann Petry's two fictions The Street and The Narrows. It

investigates the struggle of African American women, social realities, Harlem, the defeat of women, African American 229-234

Page 30: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

culture and Triple Oppression. It asks into sexual orientation, segregation, personality and circumstance of ladies in the

public arena the situation of African American and self - acknowledgement or self-arousing through the procedure of

colonization, African American culture conveyed to America by the slaves. Actually, African Americans are abused

and smothered in various angles. This paper is an examination of the manners by which the protagonists of these novels

justify the struggles, concealment and suppression they suffered from horrible conditions under which African live.

This is an endeavour to investigate from various points of view the mission for the characters Lutie Johnson (The

Street) and Abbie Crunch (The Narrows). The protagonist's involvement in picking up the normal womanhood has

various dubious complexities. These fictions particularly explored the black female struggle from a feminist

perspective. This paper is an analysis of African American feminism, racial discrimination against blacks, gender

disparities, sexism and dominance expressed by both white people and people from their own community. It inquires

suppressed life of black women in society in the form of different aspects. The goal of this paper is to break down the

sufferings of Africans and their persecuted life. Also, this paper demonstrates how the difficulties looked by the

protagonists and how their life ends up outside in the general public and their partition from self-acknowledgement in

the general public.

Keywords: African American Feminism, Harlem, Triple Oppression, Gender and Social Disparities and

Psychological Approach.

References: 1. Alain Locke, ed., The New Negro, Atheneum. New York.1968 2. Baker, Houston, Modernism and the Harlem Renaissance: The University of Chicago Press, London. 1987

3. Bell, Bernard W. "Ann Petry's Demythologizing of American Culture and Afro-American Character." In Conjuring: Black Women, Fiction, and the Literary Tradition, edited by Marjorie Pryse and Hortense Spillers. Bloomington: Indiana University Press, 1985

4. Bontemps, Arna. "The Line." Saturday Review 36 (August 22, 1953): 11. Bontemps concedes that Petry's The Narrows

5. Ervin, Hazel A. Ann Petry: A Bio-Bibliography and A comprehensive compilation of reviews, analytical articles, and interviews with Petry. New York: G. K. Hall, 1993

6. Gates, Henry Louis, ed. Ann Petry: Critical Perspectives Past and Present. New York: Amistad Press, 1998

7. Gates, Henry Louis. The Signifying Monkey: A Theory of Afro- American Literary criticism. New York: Oxford UP, 1988 8. Nathan Huggies, Harlem Renaissance, Oxford University Press. New York.1971

9. Petry, Ann. "The Narrows" Northwestern University Press. Evanston. 1988

10. Petry, Ann. "The Street" Houghton Mifflin Harcourt Publishing company, New York.1974 11. Ralph Ellison, Shadow and Act, Vintage Book. New York. 1971.

55.

Authors: P. Suresh, Suchismita Bhattacharya

Paper Title: Traumatised Childhood in Mahesh Dattani’s Play Thirty Days in September

Abstract: Childhood is the most important phase in the life of any human being. The future of an individual depends

upon the type of childhood, he or she leads in. The character and the behaviour of a child depend upon the type of

people he or she comes across in the childhood. The childhood can either make or break the future of an individual.

Childhood days are usually the most pleasant days in the life of any human being, because, those days are usually free

from tension, pressure, stress or any such thing that takes away the peace and happiness from life. These days must be

enjoyed to the fullest as one can never get these days back in life. Childhood is a boon for any child, but it can turn as a

bane if one doesn't have a proper and healthy atmosphere to grow. The child is bound to get afraid or unsecured if his or

her life gets surrounded with freaky and wicked people. The childhood days of a child can even get destroyed if

monsters with friendly faces arrive in life. The play Thirty Days in September revolves around the life of a girl, Mala,

the protagonist of the play, who leads a traumatised childhood. The traumatised childhood affects her adulthood and her

life on a whole. Mahesh Dattani, the dramatist, has depicted the life of a child who is the victim of child sexual abuse,

in a very subtle manner. The play proves that sometimes the pain and the betrayal come from the closed ones in life and

not from the outsiders. The play focusses on many things but the present research paper focusses mainly on the

traumatised childhood of the protagonist.

Keywords: Childhood, Future, Life, Traumatised childhood, Pain, Betrayal, Child, Afraid, Monsters, Friendly faces,

Victim, Child Sexual Abuse, Subtle, Boon, Bane, Pleasant, Human Being.

References: 1. Dattani, Mahesh. Collected Plays. Penguin Books, New Delhi, India, 2000.

2. Dattani, Mahesh, Thirty Days in September. Surjeet Publications, Delhi, India. First Edition 2010 3. Multani, Angelie. Mahesh Dattani's Plays: Critical Perspectives. New Delhi. Pencraft International.

4. Agrawal, Dr Dipti. The Plays of Mahesh Dattani: A Study in Thematic Diversity and Dramatic Technique. New Delhi. Discovery Publishing

House Pvt. Ltd. 5. Agrawal, Beena. Mahesh Dattani's Plays: A New Horizon in Indian Theatre. Jaipur, Book Enclave, 2007.

6. Mukherjee, Tutun. The Plays of Mahesh Dattani: An Anthology of Recent Criticism. New Delhi: Pencraft International, 2012.

7. Parmar, Bipinkumar. Dramatic World of Mahesh Dattani: Voices and Visions. Jaipur: Aadi Publications, 2012. 8. Chaudhari, Asha Kuthari, Mahesh Dattani: An Introduction. New Delhi. Foundation Books. 2005.

9. https://www.simplypsychology.org/Sigmund-Freud.html

10. https://positivepsychologyprogram.com/psychoanalysis/ 11. https://www.livescience.com/54723-sigmund-freud-biography.html

235-238

56.

Authors: N. Sumathi, P. Suresh

Paper Title: Song of Innocence to Experience: A Freudian Critique of Dylan Thomas Select Poetry

Abstract: This research paper is an attempt to establish relationship between Psychology and Literature with the

explication of the text through Freudian terms. Literary criticism is enriched with the psycho-analytic criticism from

Sigmund Freud to Jacques Lacan. Psycho-analysis interpretation has enriched literature both in grave way and in

creative way. Creative approach to psychoanalysis to literature has enthralled the two disciplines. Some Psychologists

regarded dreams to be the result of random brain activity that occurs while sleeping. Psycho-analysts like Sigmund

239-243

Page 31: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

Freud and Carl Jung propagates that “dreams can reveal a person’s deepest unconscious wishes and desires.” The

majority of the symbols that occur in dreams are sex symbols as considered by Freud. Dylan Thomas poetry has

enormous usage of images and symbols which are essentially to be analysed in Freudian concepts to explicit the layers

of meanings. He has concurred that he has read Freud’s theory which is subconsciously exposed in his poetry without

direct reference. This paper explicates those images and symbols in Freudian interpretation of dream psychology to be

applied in select poems of Dylan Thomas’ poetry with subjective understanding of his biography.

Keywords: Freudian Concepts - Psycho-Analytic–Conscious and Unconscious Mind - Innocence and Experience –

Dream Psychology – Meta Text.

References: 1. Abrams, R.E. (Fall 1975). The Function of Dreams and Dream Logic. Texas Studies in Literature and Language, 17, No.3, pp.599-614.

2. Ackerman, John. Dylan Thomas: His Life and Work. London: Oxford University Press, 1964. 3. AneirinTalfan Davies, Dylan: Druid of the Broken Body, Swansea: Christopher Davies, 1977.

4. Bayley, John. “Dylan Thomas.” Dylan Thomas. Ed. C.B. Cox Englewood Cliffs: Prentice-Hall, 1966.

5. Constantine FitzGibbon, The Life of Dylan Thomas, J.M.Dent& Sons Ltd., London,' 1965. 6. Cox, C.B. “Introduction.” Dylan Thomas: A Collection of Critical Essays. Ed. C.B. Cox.Englewood Cliffs: Prentice-Hall, 1966.

7. Davies, Aneirin Talfan. Dylan: Druid of the Broken Body. Swansea: Christopher Davies, 1977.

8. Davies, Walford. “The Wanton Starer.” Dylan Thomas: New Critical Essays. Ed. Walford Davies. London: J.M. Dent & Sons, 1972. 9. Davies, Walford, and Maud Ralph. “Notes.” Collected Poems 1934-1953. London: J.M. Dent,1993.

10. Davies, Walford, and Maud, Ralph. “General Preface to the Notes.” Collected Poems 1934-1953. London: J.M. Dent, 1993.

11. Dodsworth, Martin. “The Concept of Mind and the Poetry of Dylan Thomas.” Dylan Thomas: New Critical Essays. Ed. Walford Davies. London: J.M. Dent & Sons, 1972.

12. Fraser, G.S. Dylan Thomas. London: Longmans, Green, 1957. 13. Freud, Sigmund The Interpretation of Dreams (translated by James Strachey), Penguin Bools Ltd, Harmonds worth, Middlesex, England, 1976.

14. Fuller, John. “The Cancered Aunt on her Insanitary Farm.” Dylan Thomas: New Critical Essays. Ed. Walford Davies. London: J.M. Dent &

Sons, 1972. 15. Horan, Robert. “In Defence of Dylan Thomas.“Dylan Thomas: The Legend and the Poet. Ed.E.W. Tedlock. London: Mercury Books, 1960.

16. Jones, T.H. Dylan Thomas. London: Oliver and Boyd, 1963.

17. Kidder, Rushworth M. Dylan Thomas: The Country of the Spirit. Princeton: Princeton University Press, 1973. 18. Merwin, W.S. “The Religious Poet.” Dylan Thomas: The Legend and the Poet. Ed. E.W.Tedlock. London: Mercury Books, 1960.

19. Moore, Geoffrey. “Dylan Thomas.” Dylan Thomas: The Legend and the Poet. Ed. E.W.Tedlock. London: Mercury Books, 1960.

20. Olson, Elder. “The Universe of the Early Poems.” Dylan Thomas. Ed. C.B. Cox. Englewood Cliffs: Prentice-Hall, 1966. 21. Rawson, C.J. “Randy Dandy in the Cave of Spleen: Wit and Fantasy in Thomas (with Comments on Pope, Wallace Stevens, and others).” Dylan

Thomas: New Critical Essays. Ed. Walford Davies. London: J.M. Dent & Sons, 1972.

22. Reid, Alastair. “The Man.” Dylan Thomas: The Legend and the Poet. Ed. E.W. Tedlock. London: Mercury Books, 1960. 23. Savage, D.S. “The Poetry of Dylan Thomas.” Dylan Thomas: The Legend and the Poet. Ed.E.W. Tedlock. London: Mercury Books, 1960.

24. Scarfe, Francis. “Dylan Thomas: A Pioneer.” Dylan Thomas: The Legend and the Poet. Ed.E.W. Tedlock. London: Mercury Books, 1960.

25. Shapiro, Karl. “Dylan Thomas.” Dylan Thomas: The Legend and the Poet. Ed. E.W. Tedlock. London: Mercury Books, 1960. 26. Sinclair, Andrew. Dylan Thomas: Poet of His People. London: Michael Joseph, 1975.

27. Stephens, Raymond. “Self and World: The Earlier Poems.” Dylan Thomas: New Critical Essays. Ed. Walford Davies. London: J.M. Dent &

Sons, 1972.

28. Thomas, Dylan. Collected Poems 1934-1952. London: J.M. Dent & Sons, 1952.

29. Thomas, Dylan. Collected Poems 1934-1953. London: J.M. Dent, 1993.

30. Tindall, William York. A Reader’s Guide to Dylan Thomas. New York: The Noonday Press, 1962.

57.

Authors: P. Suresh, S. Suman Rajest

Paper Title: The Dialog on Postmodernism Intertextuality, Parody, the Talk of History and the Issue of Reference

Abstract: In light of assaults on innovator formalist closure, that postmodernist fiction opens itself up to history, to

what Edward Said (1983) calls the "world". It can never again do as such in any remotely blameless way. Thus those

un-honest confusing historiographic metafictions arrange themselves inside recorded talk while declining to surrender

their self-governance as fiction. Furthermore, it is a genuinely amusing satire that frequently empowers historiographic

metafictions' conflicting doubleness: the intertexts of history and fiction go up against parallel status in the parodic

improving the literary piece of both the "world" and writing and the printed consolidation of these intertextual pasts as a

basic constitutive component of postmodernist fiction works as a formal stamping of accuracy. It is both abstract and

"common" and the intertextual satire of historiographic metafiction orders, as it were. The perspectives of certain

contemporary historiographers: it offers a feeling of the nearness of the past and however a history that can be known

just from its messages, its follows be they scholarly or chronicled.

Keywords: Doubleness, History and Fiction, Contemporary Historiographers, Self-Contradictions, Worldly,

Postmodernist Fiction.

References: 1. Linda Hutcheon A Poetics of Postmodernism: History, Theory, Fiction Routledge: London 1988. p,82

2. Fredric Jameson Marxism and Form University of California Press: Berkeley, 1982, p245 3. Gilles Deleuze Foucault Continuum International Publishing Group: Columbia, 2006, p-45

4. Malcolm Bradbury The Social Context of Modern English Literature Schocken: New York, 1971, p-88

5. Ann Banfield Unspeakable Sentences: Narration and Representation in the Language of Fiction, Routledge: London, 1976, p-99 6. Linda Hutcheon A Poetics of Postmodernism: History, Theory, Fiction Routledge: London 1988. p,102

7. Williams Robert. Art and Thought. Oxford: Blackwell, 2004, p-204

8. Linda Hutcheon A Poetics of Postmodernism: History, Theory, Fiction Routledge: London 1988. p,36 9. Susan Daitch L.C Dalkey Archive Press: London, 2002, p-3

10. Fredric Jameson Marxism and Form University of California Press: Berkeley, 1982, p245

11. Gilles Deleuze Foucault Continuum International Publishing Group: Columbia, 2006, p-55 12. Linda Hutcheon A Poetics of Postmodernism: History, Theory, Fiction Routledge: London 1988. p105

13. Susan Daitch L.C Dalkey Archive Press: London, 2002, p-8

14. Linda Hutcheon A Poetics of Postmodernism: History, Theory, Fiction Routledge: London 1988. p160.

244-251

58. Authors: Geetika Patni, Keshav Nath, Ajay Sharma

Page 32: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

Paper Title: Narrative Exuberance and Powerless Female Depicted in Alice Munro’s “Runaway”

Abstract: This paper mainly focuses onto explore the way in which Alice Munro employs certain key images to

dramatize the central theme of her fiction. Munro, who creates fantastic fiction, has fabricated collection of short stories

which are prominently concerned with the maturation process and the recognition of moral and social pressures which

can put an impact on an individual. My introduction praises Munro for her narrative exuberance and sense of accuracy

which discriminates men and women. Munro’s fictive marriages are world without end bargains and she studies not

only their Nostalgias, but there's surprising endurances to an extraordinary level. The raw material of Munro’s work

comes from her own life. She never abandons Southern Ontario as a setting, many considers it the inspiration for her

best work. Her admiration and fascination for her birth place contributes to the construction of her identity. Research

explored the ambivalent views of sexual freedom in terms of the progress of feminism and focused on the women’s

identity from the short stories written by Alice Munro.

Keywords: Dramatize, accuracy, nostalgias, ambivalent, feminism etc.

References: 1. Allentuck, M. (1977).Resolution and independence in the work of Alice Munro. Journal of Postcolonial Writing, 16(2), 340-343.

2. Atwood, M. (2012). Survival: A thematic guide to Canadian literature. House of Anansi.

3. Awano, L. D. (2006). Appreciations of Alice Munro. The Virginia Quarterly Review, 82(3), 91. 4. Martin, W. R. (1987). Alice Munro: paradox and parallel. University of Alberta.

5. Blodgett, E. D. (1988). Alice Munro (Vol. 800). Twayne Pub.

6. Bahador, R., &Zohdi, E. (2015). Inescapable doubleness of vision": a Kristevian reading of Alice Munro's" runaway. Theory and Practice in

Language Studies, 5(11), 2295.

7. Hooper, B. (2008). The fiction of Alice Munro: an appreciation. ABC-CLIO.

8. Barber, L. E. (2006). Alice Munro: The Stories of Runaway. ELOPE: English Language Overseas Perspectives and Enquiries, 3(1-2), 143-156. 9. Bausch, R. (Ed.). (2015). The Norton anthology of short fiction. WW Norton & Company.

10. Bigot, C. (2010). Alice Munro: A Bibliography. Journal of the Short Story in English. Les Cahiers de la nouvelle, (55).

11. Dahlie, H., & Relationships, U. (1972). Isolation and Rejection in Alice Munro's Stories,". World Literature Written in English, 11(1), 43-48. 12. Munro, S. (2001). Lives of mothers & daughters: Growing up with Alice Munro. Union Square Press.

13. Duffy, D. (1998). " A Dark Sort of Mirror":" The Love of a Good Women" as Pauline Poetic. Essays on Canadian Writing, (66), 169.

14. Franzen, J. (2004). Runaway: Alice’s Wonderland. New York Times Book Review, 14. 15. Mayberry, K. J. (1992). " Every Last Thing... Everlasting": Alice Munro and the Limits of Narrative. Studies in Short Fiction, 29(4), 531.

16. Gibson, G. (2014). Eleven Canadian Novelists Interviewed by Graeme Gibson. House of Anansi.

17. Howells, C. A. (2009). Intimate Dislocations: Alice Munro, Hateship, Friendship, Courtship, Loveship, Marriage. Bloom's Modern critical Views: Alice Munro, 167-192.

18. Woodcock, G. (1986). The plots of life: The realism of Alice Munro. Queen's Quarterly, 93(2), 235. 19. Waterston, E. (2003). Rapt in Plaid: Canadian Literature and Scottish Tradition. University of Toronto Press.

20. Cam, H. (1987, October). Learning From the Teacher: Alice Munro's Reworking of Eudora Welty's' June Recital.'. In Span(Vol. 25, pp. 16-30).

21. Irvine, L. (1987). Questioning Authority: Alice Munro's Fiction. CEA Critic, 50(1), 57-66. 22. Hoy, H. (1980). " Dull, Simple, Amazing and Unfathomable": Paradox and Double Vision In Alice Munro's Fiction. Studies in Canadian

Literature/Étudesenlittératurecanadienne, 5(1).

23. Laurence, M. The Controversy about The Diviners. 24. Osachoff, M. G. (1983). 'Treacheries of the Heart': Memoir, Confession, and Meditation in the Stories of Alice Munro. Probable Fictions: Alice

Munro's Narrative Acts, 61-82.

25. Macdonald, R. M. (1976). A Madman Loose in the World: The Vision of Alice Munro. Modern Fiction Studies, 22(3), 365-374. 26. Metcalf, J. (1972). A Conversation with Alice Munro. Journal of Canadian Fiction, 1(4), 54-62.

27. Moore, L. (2004). LEAVE THEM AND LOVE THEM In Alice Munro's fiction, memory and passion reorder life. Atlantic Monthly, 294(5),

125-128. 28. Moss, J. (Ed.). (1983). The Canadian novel: a critical anthology (Vol. 1). Dundurn.

29. Munro, A. (2013). Runaway.Random House.

30. Nischik, R. M. (Ed.). (2007). The Canadian short story: interpretations. Camden House. 31. Rae, I. (2010). Runaway Classicists: Anne Carson and Alice Munro’s “Juliet” Stories. Journal of the Short Story in English. Les Cahiers de la

nouvelle, (55).

32. Rasporich, B. J. (1990). Dance of the sexes: art and gender in the fiction of Alice Munro. University of Alberta. 33. Redekop, M. (2014). Mothers and Other Clowns (routledge Revivals): The Stories of Alice Munro. Routledge.

34. Struthers, J. T. (1975). Alice Munro and the American South. Canadian Review of American Studies, 6(2), 196-204.

35. Thacker, R. (2011). Alice Munro: Writing her lives: A biography. Emblem Editions. 36. Thacker, R. (2016). Reading Alice Munro, 1973-2013.University of Calgary Press.

37. Staines, D. (Ed.). (2016). The Cambridge Companion to Alice Munro. Cambridge University Press.

38. Mayberry, K. J. (1994). Narrative strategies of liberation in Alice Munro. Studies in Canadian Literature/Étudesen literature canadienne, 19(2).

39. Besner, N. K. (1990). Introducing Alice Munro's Lives of girls and women: a reader's guide (No. 8).ECW Press.

252-257

59.

Authors: Esther Silvia, S. Rabiyathul Basariya

Paper Title: Role of Niche Marketing on Search Engine with Reference to Pay Per Click Advertisement

Abstract: A niche market is the subset of the market on which a specific product is focused. Niche market is highly

specialized effective and aiming to survive among the competition from numerous super companies using the niche

keywords. Niche marketing has influenced by the product features of specific market needs such as price range,

production quality etc. In the digital world, marketers using the Online niche marketing for the products to be advertised

using search engines. Search engines involve the promotion of websites by increasing the visibility of search engines

results pages through paid advertising. In this paper the researcher has focused on “ROLE OF NICHE MARKETING

ON SEARCH ENGINE WITH REFERENCE TO PAY PER CLICK ADVERTISEMENT”. Pay per click is an Internet

advertising model used to direct traffic to websites in which advertisers pay the publisher. When the ad is clicked with

search engines, advertisers used keyword phrases relevant to their target market. Pay per click advertisement also

known as banner ads shown on the websites. At present the niche markets has provided the attractive opportunities

available to marketers. Eye catching, effective and localized pay per click ads impact on buying markets. As the pay per

click advertisement provide purchase opportunity wherever people may be surfing.

References: 1. Niche online marketplaces- Here’s why there are so many e-shops out there http://indianonlineseller.com/2014/07/niche-online-marketplaces-

258-260

Page 33: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

heres-many-e-shops/ 2. Emergence of niche e-commerce players

3. http://blog.refiral.com/emergence-of-niche-ecommerce-players/Being successful in the niche (Part 2): PPC is the key Marina Simmerl wrote this

on in Data & Market Insightshttps://crealytics.com/blog/2014/09/18/successful-niche-part-2-ppc-key/ 4. How to Research a Profitable Niche Market: Law of Attraction Case Study by Lorna Lihttp://lornali.com/how-to-research-profitable-niche-

market/

5. Ultimate guide to findout niche market Filed in Niche Research, Ultimate Guides &Resources by NicheHacks on December 9, 2013

http://nichehacks.com/ultimate-guide-finding-niche-market/

6. How PPC Fits into Your Internet Marketing Strategy https://www.portent.com/services/ppc/pay-per-click-explained

7. The Role of Your Niche in PPC http://www.standardmarketing.com/2015/02/role-niche-ppc/ 8. Pay-per-click Search Engine Marketing Handbook: Low Cost …) https://books.google.co.in/books

60.

Authors: S. Lavanyaa, D. Akila

Paper Title: Crime against Women (CAW) Analysis and Prediction in Tamilnadu Police Using Data Mining Techniques

Abstract: Crime examination and anticipation is a deliberate methodology for recognizing and breaking down

examples and patterns in wrongdoing against ladies in Tamilnadu state. Our framework can anticipate metropolitan

urban communities which have expansive volume of individuals living territories, workplaces, and corporate

organizations intended forcrime event and can representation crime point regions. Through the getting higher entry to

methodical, crimein sequence experts is capable offacilitate the rule implementation heads and extraordinary

examination police groups to attach the further enquiries of understanding violations. To apply the origination of in

sequence mining we can take out already unidentified, valuable data from unstructured information. In this paper, we

are in push toward software engineering and criminal equity to enhance an information mining system that can help

unravel Crimes against ladies quicker. As an alternate specializing in interference of crime prevalence like criminal

background of crook and conjointly we tend to area unit concentrating primarily on the crime factors of each day.

Keywords: Crime Patterns, Classification and Prediction, Crimes against Women (CAW), Rule enlistment, Crime

Analysis.

References: 1. Yamuna.S, N.Sudha Bhauvaneswari D, Data mining Techniques to Analyze and Predict Crimes, International Journal of Engineering And

Science(IJES) Vol-1,Issue-2,PP 243-247.

2. Sylvia Walby, Improving the statistics on violence against women, Statistical Journal of the united nation ECE 22(2005)193-216.

3. S.Bewley, J.Friend and G.Mezey, Eds, Violence against Women, London: Royal College of Obestricians and Gynaecologists, 1997. 4. Malathi.A and Dr.S.Santhosh Baboo. Article: an enhanced algorithm to predict a future crime using data mining. International Journal of

Computer Applications,21(1):1-6, May2011.Published by foundation of Computer Science.

5. A.Buczak and C.Gifford, ‘Fuzzy association rule mining for community crime pattern discovery’, in ACM SIGKDD workshop on intelligence and security Informatics, Washington, D.C., 2010, PP.1-10.

6. Crimereports.com,2015.[online].Available:http://www.crimereports.com.[Accessed:20-May-2015].

7. Anshu Sharma,Shilpa Sharma 2012 An Intelligent Analysis of Web Crime Data using Data Mining, International Journal of Engineering And Innovative Technology(Ijeit)2(3)

8. Devendra Kumar Tayal et al., Crime detection and criminal identification in India using data mining techniques,AI & Soc(2015) 30, pp.117-127.

9. Roslin V.Hausk and Hsinchun Chen., Coplink: A Case of Intelligent Analysis and Knowledge Management, Proceedings of International Conference on Information Systems, 1999, pp.15-28.

10. Rasoul kiani, Siamak mahdavi, Amin Keshavarzi, Analysis and Prediction of Crimes by clustering and Classification.(IJARAI) International

Journal of Advanced Research in Artificial Intelligence,Vol-4,No:8,2015 11. Amarnathan, L.C.(2003) Technological Advancement: Implications for the Crime, the Indian Police Journal, April-June.

12. Krishnamoorthy, S.(2003) Preparing the Indian Police for 21st Century, Puliani and Puliani, Bangalore, India.

13. Marshall, G.M. and Marshall, D.R.(2008) CRIME IN INDIA, Annual Series, 1954-2006,Published by the Government of India, Ministry of Home Affairs, National Crime Records Bureau, Electronic Dataset and Codebook, Published by center for Systemic Peace. http://

www.systemicpeace.org/inscr/inscr.htm

14. Shiju Sathyadevan, Devan M.S, Surya Gangadharan S.”Crime analysis and Prediction Using Data mining”, 2014 First International Conference on Networks & Soft Computing (ICNSC2014),2014

15. Krishnamoorthy P, Dr R.Gopinath.” Survey on Classifier algorithms for health care system in Diabetes”, International Journal of Engineering

&Technology,7(2.26)2018 pp19-24. 16. Syed Ahsan Shabbir and Kanna Dasan R 2013An Effective Fraud Detection System Using Mining Technique International Journal of Scientific

and Research Publications 3(5)

17. http://data.gov.in/catalog/persons-arrested-under-crime-against-Women 18. http://data.gov.in/catalog/age-group-wise-victims-murder

19. ShyamVaranNath., Crime Pattern Detection Using Data Mining, International Conference on Web Intelligence and Intelligent Agent Technology,

December 2006. 20. Dr.D.Akila, Dr.C. Jayakumar, "Acquiring Evolving Semantic Relationships for WordNet to Enhance Information Retrieval", International

Journal of Engineering and Technology, Volume 6, November 5, pp. 2115-2128, 2014.

21. Dr.D.Akila, Ms.Vidya and Mr.S.Rajesh , "Optimization Based Information Retrieval with the Enhancement of Annotator in WordNet Application", Journal of Advanced Research in Dynamical & Control systems Volume 10 , Issue 2, pp. 318-323,2018.

22. D.Akila,S.Sathya, G.Suseendran, “Survey on Query Expansion Techniques in Word Net Application”, Journal of Advanced Research in Dynamical and Control Systems, Vol.10(4), pp.119-124, 2018.

261-265

61.

Authors: G.G. Loganathan, S. Manoharan, T. Sudhamaheswari

Paper Title: Perception of Motivators-A Study of Public Sector Banks in Bangalore

Abstract: At the outset, the research embarks on the importance of the contribution of the service sector, especially

public sector banks, to the development of the Indian economy. An overview of banking scenario, banking challenges

and human resource challenges of banks in the Indian context is discussed. A large number of employees have started to

retire, and new recruits are joining the public sector banks. The new recruits have to be equipped well to face the

challenges and need to be motivated in order to be retained. Based on the above statement of the problem, the

researcher has stated the objectives of the study. The primary objective is to find out the perception of motivators. The

primary data were collected from 403 respondents from the population of officers with less than 10 years of experience

from select public sector banks in Bangalore. The sampling test was conducted to test the statistical validity.

Appropriate statistical tools were utilized to test the sample. From the data analysis, it was found that the motivators

namely achievement, responsibility and nature of work showed better satisfaction than other motivators namely

266-273

Page 34: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

promotion opportunity, respect and recognition and advancement. The study was helpful in identifying the motivators

which have better effect on performance and modify the human resource policy to get better results.

Keywords: Motivation, Public Sector Banks, HR Challenges, promotion opportunity, Respect and Recognition,

Responsibility, Achievement, Advancement and Nature of Work

References: 1. Al-Mansour, A. H, Application of TQM to financial services, 2007, Retrieved from 2. Ankita Srivastav and Pooja Bhatia.2013.Issues and Challenges Involved in Motivational Factors in Nationalized Banks. The SIJ Transactions on

Industrial, Financial &Business Management (IFBM). 1:111-115

3. Benson Kunjukunju.2008 Commercial banks in India- Growth, challenges and strategies, New Century Publications, New Delhi, 1st Edition 4. Bergstrom, Andreas and Ternehall, Mattias.2005.Work motivation in Banks. International Handelshogskolan, Hogskolan Jonkoping

5. Chowdhury, M. S. 2007.Enhancing motivation and work performance of the salespople: The impact of supervisors’ behaviour, African Journal of

Business Management. 1:238-243 6. Dheeraj Kumar Pradhan.2019.Digital Banking –Journey of a nation. The Management Accountant.54:26-31

7. Gabriela Rusu and Silvia Avasilcai.2014. Linking human resources motivation to organizational climate. Social and Behavioura lSciences.24:51-

58 8. Ghafoor, M. D.2011.Organizational effectiveness: A case study of telecommunication and banking sector of Pakistan. Far East Journal of

Psychology and Business. 2: 37- 48

9. H.G.Rainey.H. G.1997. Understanding and managing public organizations. San Francisco, CA: Jossey-Bass 10. Herzberg,F., Mausner,B. and Snyderman,B.B.2004 The motivation to work, New Brunswick, Transaction Publishers

11. Houkes, Inge Janssen, Peter P MdeJonge, Jan Bakker, Arnold B.2003. Specific determinants of intrinsic work motivation , emotional exhaustion

and turn over intention : a multisample longitudinal study. Journal of Occupational and Organizational Psychology. 76: 427-450 ABI/INFROM Complete

12. Isiaka Sulu Babaita.2011. An Appraisal of Employee Motivation in the Nigerian Banking Industry. British Journal of Humanities and Social Sciences. 2: 92-103

13. Jeyapragash, A and Rani Chandrika, P.2013.A Study on Organizational Climate in Banks – With Special Reference to Dindigul. Paripex - Indian

Journal of Research. 2: 40-42 14. Judge, T., and Ilies, R.2002. Relationship of personality to performance motivation: A meta-analytic review. Journal of Applied Psychology.

87:797-807

15. Kaleem Ullah Khan, Syed Umar Farooq and Zilakat Khan.2010. A Comparative Analysis of the Factors Determining Motivational Level of Employees Working in Commercial Banks in Kohat, Khyber Pukhtunkhwa. International Journal of Business and Management. 5:180-184

16. Kanhaiya Singh and Vinay Kumar Dutta.2013. Commercial Bank Management. McGraw Hill Education (India) Private Limited, New Delhi, 1st

Edition 17. Kanungo, R.N., Misra,S., and Dayal,I.1975.Relationship of Job involvement to perceived importance and satisfaction of employee needs.

International Review of Applied Psychology. 24: 49-59

18. Kim, P. S.2003.Strengthening the Pay-Performance Link in Government: A Case Study of Korea. Public Personnel Management,.31:447-463 19. Kothari, C.R,.2009.Research Methodology Method and Techniques. New Age International Publishers

20. Kovach, K.A.1995.Employee motivation: Addressing a crucial factor in your organization’s performance. Employment Relations Today. 22: 93-

105. 21. Kreitner, R.1995. Management, Boston, Houghton Mifflin Company,6thEdition

22. McKinsey,2010. Report on Indian Banking: Towards Global Best practices. Retrieved from http://www.mckinsey.com/ locations

/India/McKinney on India /pdf / India Banking Overview.pdf. Accessed on 31.3.2015

23. Ministry of Finance.2019. http://mofapp.nic.in:8080/economicsurvey/pdf/152-166_ Chapter_09_ Economic_ Survey_2017-18.pdf. Accessed on

16.02.2019

24. Muchinsky,P.1993.Psychology applied and Work, Belmomt, CA: Wadsworth/Thomson Learning,4th Edition 25. Nadler, D.A., and Lawler, E.E.1983. Motivation – a diagnostic approach. In perspectives on behaviour in organizations, Ed. J.R.Hackman,

E.E.Lawler, III, and I.W. Porter, New York: McGraw –Hill.

26. Perry, J. L., and Porter, L. W.1982. Factors affecting the context for motivation in public organization. The Academy of Management Review. 7: 89-98

27. Pfeffer.1994. Competitive advantage through people, Boston, MA: Harvard Business School Press

28. Qayyum, A., Sukirno and Mahmood, A.2011. A Preliminary Investigation of Employee Motivation in Pakistan’s Banking Sector. Research and Practice in Human Resource Management. 19: 38-52

29. Quratul-Ain Manzoor.2011. Impact of Employees Motivation on Organizational Effectiveness. European Journal of Business and Management.

3: 36-44 30. Reserve Bank of India.2017. Bank GroupWise distribution of employees of scheduled commercial banks 2017, https://m.rbi.org.in-publications-

Annual-Handbook of statistics on Indian Economy, accessed on 23rd February 2019.

31. Reserve Bank of India.2018. Financial Stability Report, December 2018, https://rbi.org.in/scripts/BS-Press Release. Accessed on 12.02.2019 32. Reserve Bank of India.2019. Banks in India, https://www.rbi.org.in/commonman/ english/scripts /banksinindia.aspx. Accessed on 16.02.2019.

33. Sadia Rashid and Uzma Rashid.2012.Work Motivation Differences between Public and Private Sector. American International Journal of Social

Science,.1: 24-33 34. Sansone, C., and Harackiewicz, J. M.2000. Intrinsic and extrinsic motivation: The searchfor optimal motivation and performance. San Diego, CA:

Academic Press

35. Saradindu Bhaduri and Hemant Kumar.2011. Extrinsic and intrinsic motivations to innovate: tracing the motivation of grass root innovators in India. Mind Soc.10: 27–55

36. Shadare, O. A., and Hammed, T. A.2009. Influence of work motivation, leadership effectiveness and time management on employees’

performance in some selected industries in Ibadan, Oyo State, Nigeria. European Journal of Economics, Finance and Administrative Sciences. 16:7-17

37. Suryachandra Rao, D.2008.Banking reforms in India-An evaluative study of the performance of commercial banks, Deep Publications New

Delhi, 1st Edition 38. T.S.Bateman and S.A.Snell.2007. Management: Leading & Collaborating in a Competitive World, Boston, Mass: McGraw-Hill/Irwin, 7th

Edition

39. Van Yperen, N. W., and Hagedoorn, M.2003. Do high job demands increase intrinsic motivation or job strain or both? The role of job control and social support. Academy of Management Journal. 46: 339-348

62.

Authors: A.Vidhyalakshmi, C. Priya

Paper Title: A Study on Supervised Learning in Medical Image Gradingusing IoT

Abstract: Computerized medical imaging techniques is a process of creating visual interior representationof our body

part for examining clinical analysis and disrupting the visual functionsof some organs or tissues. The medical images

analyze the types of diseases present in the organs. The intensity often grades the severity and measures the risk score

of diseased image using the Medical Image grading techniques. The Machine learning algorithms constructs a

mathematical pattern of sample data known as training data, such that to make predictions or decisions without being

explicitly programmed to perform the task. TheSupervised learning inmachine learning is a task of investigating a

274-279

Page 35: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

function that maps input to an output which is based on input-output pairs. This paper presents the review about the

medical images and medical image grading techniques. The survey for the various result analyses of medical images

using the image processing techniques and the overview of the diseases present in the tongue, hand and lungs images

are discussed. In this paper we talk about the introduction of medical image analysis, medical image grading techniques

applied for the detection of lung cancer in twoways such as, metastasis and the Lingual acrometastatic disease in the

organ of tongue and hand. The proposed model includes the analysis of metastasis and the Lingual acrometastatic

analysis using the classification techniques. The implantation of the proposed paper will be completedthrough the

MATLAB software using the digital image processing techniques and the simulation results will be stored in the

Internet of Things (IoT) server for future verification process.The prediction of lungs cancer will be compared by the

results of the tongue and hand diseases will be stored present in the images.

Keywords: Classification, Supervised learning, detection, segmentation, medical image analysis.

References: 1. SandroQueirós, Pedro Morais, Daniel Barbosa, Jaime C. Fonseca, João L. Vilaça, and Jan D’hooge,” MITT: Medical Image Tracking Toolbox”,

IEEE Transactions on Medical Imaging, 2018.

2. Yong Reny, YiningWangy, Jun Zhuz, Member, IEEE,” Spectral Learning for Supervised Topic Models”, IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017.

3. YushanZheng, Zhiguo Jiang, Member, IEEE, Haopeng Zhang*, Member, IEEE, FengyingXie, Yibing Ma, Huaqiang Shi and Yu Zhao,”

Histopathological whole slide image analysis using context-based CBIR”, IEEE Transactions on Medical Imaging, 2018. 4. Shanshan Wang, Member, IEEE , Sha Tan, Yuan Gao, Qiegen Liu, Leslie Ying, Taohui Xiao, Yuanyuan Liu, Xin Liu, HairongZheng, and Dong

Liang, Senior Member, IEEE,” Learning Joint-Sparse Codes for Calibration-Free Parallel MR Imaging”, IEEE TRANSACTIONS ON

MEDICAL IMAGING, VOL. 37, NO. 1, JANUARY 2018 5. Qingsong Yang, Pingkun Yan , Senior Member, IEEE , Yanbo Zhang , Member, IEEE , Hengyong Yu , Senior Member, IEEE , Yongyi Shi,

XuanqinMou , Senior Member, IEEE , Mannudeep K. Kalra, Yi Zhang , Member, IEEE , Ling Sun, and Ge Wang , Fellow, IEEE,” Low-Dose

CT Image Denoising Using a Generative Adversarial Network With Wasserstein Distance and Perceptual Loss”, IEEE TRANSACTIONS ON MEDICAL IMAGING, VOL. 37, NO. 6, JUNE 2018

6. Fuhai Chen, Student Member, IEEE, RongrongJi, Senior Member, IEEE, Jinsong Su, Member, IEEE, Donglin Cao, Member, IEEE, and YueGao,

Senior Member, IEEE,” Predicting Microblog Sentiments via Weakly Supervised Multi-Modal Deep Learning”, IEEE Transactions on Multimedia, 2017

7. AboozarTaherkhani , Member, IEEE, AmmarBelatreche, Member, IEEE, Yuhua Li, Senior Member, IEEE, and Liam P. Maguire, Member,

IEEE,” A Supervised Learning Algorithm for Learning Precise Timing of Multiple Spikes in Multilayer Spiking Neural Networks”, IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 29, NO. 11, NOVEMBER 2018.

8. Huanfeng Qin and Mounim A. El Yacoubi,” Deep Representation based feature extraction and recovering for Finger-vein verification”,

JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 9. [9]. Kenta Matsumura*, TakehiroYamakoshi, Member, IEEE, Peter Rolfe, Member, IEEE, and Ken-ichiYamakoshi, Member, IEEE,” Advanced

Volume-Compensation Method for Indirect Finger Arterial Pressure Determination: Comparison with Brachial phygmomanometry”,2016

10. FrithjofKruggel,” A Simple Measure for Acuity in Medical Images”, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, 2018 11. C.Priya, “TaaS: Trust Management Model for Cloud-Based on QoS” in Journal of Advanced Research in Dynamical and Control Systems,

volume 9, issue 18, 1336-45, ISSN 1943-023X, SNIP 0.294, 2017

12. Hwayoung Choi, Kyung-Jin You, Nitish V. Thakor, Fellow, IEEE, Marc H. Schieber andHyun-Chool Shin, Member, IEEE,” Single-finger

Neural Basis Information-based Neural Decoder (nBINDER) for Multi-finger Movements”, JOURNAL OF LATEX CLASS FILES, VOL. 14,

NO. 8, AUGUST 2015.

13. Man-Sun Kim, Dongsan Kim and Jeong-Rae Kim,” Stage-Dependent Gene Expression Profiling in Colorectal Cancer”, IEEE TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, MANUSCRIPT ID, IEEE/ACM Transactions on Computational Biology and

Bioinformatics,2018.

14. C.Priya , D.Padmapriya,“Trusted Cloud Computing Platform in IaaS for Closed Box Execution Environment to VM” in Journal of Advanced Research in Dynamical and Control Systems, volume 10, issue 4, 193-98, ISSN 1943-023X, SNIP 0.294, 2018

15. Peter B´andi, Oscar Geessink, Quirine Manson, Marcory van Dijk, Maschenka Balkenhol, Meyke Hermsen, Babak Ehteshami Bejnordi, Byungjae Lee, KyunghyunPaeng, AoxiaoZhong, Quanzheng Li, FarhadGhazvinianZanjani, Svitlana Zinger, Keisuke Fukuta, Daisuke Komura,

VladoOvtcharov, Shenghua Cheng, ShaoqunZeng, JeppeThagaard, Anders B. Dahl, Huangjing Lin, Hao Chen, Ludwig Jacobsson, Martin

Hedlund, Melih C¸ etin, ErenHalıcı, Hunter Jackson, Richard Chen, Fabian Both, J¨orgFranke, Heidi K¨usters-Vandevelde, Willem Vreuls, Peter Bult, Bram van Ginneken, Jeroen van der Laak, and Geert Litjens,” From detection of individual metastases to classification of lymph node status

at the patient level: the CAMELYON17 challenge”, IEEE Transactions on Medical Imaging 2018.

16. Wei Yang, Yunbi Liu, Liyan Lin, Zhaoqiang Yun, Zhentai Lu, QianjinFeng*, Member, IEEE, and Wufan Chen, Senior Member, IEEE,” Lung Field Segmentation in Chest Radiographs from Boundary Maps by a Structured Edge Detector”, IEEE Journal of Biomedical and Health

Informatics, 2017.

17. Haibin Zhang, Member, IEEE, Jianpeng Li, Bo Wen, YijieXun, and Jiajia Liu, Senior Member, IEEE,” Connecting Intelligent Things in Smart Hospitals using NB-IoT”, , IEEE Internet of Things Journal, 2018.

18. R.Ranjani ,Dr.C.Priya, “A Survey on Face Recognition Techniques: A Review” in International Journal of Pure and Applied Mathematics,

volume 118, issue 5, 253-74, ISSN 1311-8080(Print), ISSN 1314-3395(Online) 2017 19. Philip joris, Wimdevelter, wim van de voorde, Paul suetens,Frederikmaes, Dirk vandermeulen, and Peter claes,” Preprocessing of Heteroscedastic

Medical Images”, Received February 23, 2018, accepted April 19, 2018, date of publication May 4, 2018, date of current version June 5, 2018.

20. Xiabi Liu, Ling Ma, Li Song, Yanfeng Zhao, Xinming Zhao* , Chunwu ZhouRecognizing Common CT Imaging Signs of Lung Diseases through a New Feature Selection Method based on Fisher Criterion and Genetic Optimization XiabiLiu, August 2015.

21. .R.Ranjani ,Dr.C.Priya, “A Fusion of Image Processing and Neural Networks for Lung Cancer Detection Using SVM In Matlab” in International

Journal of Pure and Applied Mathematics, Volume 119, issue 10, 100-111, ISSN 1311-8080(Print), ISSN 1314-3395(Online) 2018 22. Martin Storath, Christina Brandt, Martin Hofmann, Tobias Knopp, Johannes Salamon, Alexander Weber, and Andreas Weinmann,” Edge

preserving and noise reducing reconstruction for magnetic particle imaging”, IEEE Transactions on Medical Imaging, 2016.

23. C.Priya ,R.Latha, “TaaS: A Framework for Trust Management in Cloud Computing Environments” in International Journal of Science and Research, volume 5, issue 9, 1402-05, ISSN 2319-7064(Online), DOI: 10.21275/ART20161879, September 2016

24. Guotai Wang , Wenqi Li , Maria A. Zuluaga , Rosalind Pratt, Premal A. Patel, Michael Aertsen, Tom Doel, Anna L. David, Jan Deprest,

SébastienOurselin, and Tom Vercauteren,” Interactive Medical Image Segmentation Using Deep Learning With Image-Specific Fine Tuning”, IEEE TRANSACTIONS ON MEDICAL IMAGING, VOL. 37, NO. 7, JULY 2018.

25. K.Kavitha,, G.Suseendran, “A Review on Security Issues of IOT Based on Various Technologies”, Journal of Advanced Research in Dynamical

and Control Systems, Vol.10 (4), pp.385-390,2018. 26. G.Suseendran, S.Priya, “Segmentation of neoplasm tissues with convolutional neural networks Journal of Advanced Research in Dynamical and

Control Systems, Special Issue (12), , pp.-271-275, 2017

63.

Authors: V. Mathan Kumar, R. Velmurugan

Paper Title: Customer Preference for Online Shopping in Coimbatore District

Abstract: Online Shopping is a major growth in the field of e-commerce and will certainly be the upcoming buzz 280-282

Page 36: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

word of shopping across the world. In the present era, all business houses are managing their business online and

initiate necessary steps to sell their products or services online. The development of internet has brought about a sea

change in the way shopping is done. The Internet and the World Wide Web (www) have radically changed the way

customers search for and use information. The Internet, which was previously conceptualized as an instrument for

gathering information has turned out to be an inseparable part of business now. For any business, the key towards their

continued existence and growth depends on how well it can incorporate this medium i.e., online shopping. In order to

put up for sale anything online, the manufacturers / sellers have to take into consideration who their customers are, what

their spending habits and what type of products and services they prefer. The present study has been carried out to

identify the factors associated with the level of preference for online shopping among customers.

References: 1. Kanupriya and Anupreet Kaur. 2016. A Study of Behaviour of Consumer towards Online Shopping”, Orbit-Biz-Dictum, 1:43-55.

2. Muhammad Umar Sultan and MD Nasiruddin .2016. Consumers’ Attitude towards Online Shopping Factors influencing Gotland consumers to shop online. Master Thesis in Business Administration.

3. Payal Upadhyay and Jasvinder Kaur .2016. Analysis of Online Shopping Behavior of Customer in Kota City. Shiv Shakti International Journal in

Multidisciplinary and Academic Research. 2:1-28. 4. Saranya and Anandh .2016. A Study On Customers Buying Behaviour Through Amazon. Inter Continental Journal of Marketing Research

Review.4:133-139.

5. Khushboo Makwana et al. .2017. What Drives Consumers to Shop Online. IOSR Journal of Computer Engineering. 42-47. 6. Priyanka Sharma .2017. Consumer Behavior Towards Online Shopping-An Empirical Study With Reference To Bhiwani City, Haryana.

International Conference on Recent Trends in Engineering Science and Management.

7. Rifaya Meera, R. Padmaja and Mohammed Abubakkar Siddique, R .2017. Preference of Customers towards Online Shopping Applications. Imperial Journal of Interdisciplinary Research. 3: 577-582.

64.

Authors: C. Sudha, D. Akila

Paper Title: Detection OFAES Algorithm for Data Security on Credit Card Transaction

Abstract: Nowadays, Credit card could be a little plastic card issued by a bank, savings and loan association, etc.,

permitting the owner to purchase items or services on credit. Debit card could be a card permitting holder to get

merchandise or services on credit. Open-end credit may well be a card permitting the owner to transfer money

automatically from their checking account once creating a buying deal. The utilization of credit cards and debit cards

are increasing day by day. Individuals are relying additional on each card these days than within the earlier days. As

credit cards and debit cards become the primary common mode of payment for each on-line additionally as consistent

purchase, cases of fake related to it are rising. In world, dishonorable transactions are scattered with real businesses and

easy pattern matching techniques are not typically spare to note those frauds accurately. We from this time forward

propose a window-sliding structure to mean the trades each social affair. Next, we void a party of specific individual

direct measures for each cardholder subject to the totaled trades and the cardholder chronicled trades. By then we train a

method of classifiers for every party on the base of all rules of direct. Finally, we use the classifier set to see mutilation

on the web and if another trade is coercion, an information instrument is taken in the prominent proof present with the

incredible old shaped focus to regard the issue of thought skim. The yielded consequences of our basics show up that

our structure is better than various individuals here we are using AES algorithm to maintain the data securely.

Keywords: Credit card, pattern matching techniques, Cryptography, Mutilation.

References: 1. LutaoZheng, Guanjun Liu , Member, IEEE, Chungang Yan, and Changjun Jiang,” Transaction Fraud Detection Based on Total Order Relation

and Behavior Diversity” IEEE transactions on computational social systems, 2329-924X © 2018 IEEE. 2. KuldeepRandhawa, Chu Kiong Loo, ManjeevanSeera, CheePengLim , And Asoke K. Nandi, Credit Card Fraud Detection Using AdaBoost and

Majority Voting, VOLUME 6, date of publication February 15, 2018, date of current version March 28, 2018

3. C. Sudha, T. Nirmalraj,” Analysis of Suspicious Pattern Discovery using AI-Neural Network in Credit Card Fraud Detection” submitted in International Journal of Current Research and Review, Vol.9.Issue10. May2017.

4. C. Sudha, T. Nirmal Raj, “Credit card fraud detection in internet using k-nearest neighbor algorithm” submitted in International Journal of

Current Research and Review, Volume 5, Issue 11, November 2017. 5. FahimehGhobadi, Mohsen Rohani, “Cost Sensitive Modeling of Credit Card Fraud Using Neural Network Strategy” ICSPIS 2016, 14-15 Dec.

2016, Amirkabir University of Technology, Tehran, Iran.

6. Andrea Dal Pozzolo, GiacomoBoracchi, Olivier Caelen, CesareAlippi and GianlucaBontempi, Credit Card Fraud Detection and Concept-Drift

Adaptation with Delayed Supervised Information, 978-1-4799-1959-8/15/2015 IEEE.

7. Aashlesha Bhingarde, Avnish Bangar, Krutika Gupta, Snigdha Karambe Review on Fraud Detection in Electronic Payment Gateway, Volume: 04

Issue: 01 ,Jan -2017, International Research Journal of Engineering and technology (irjet). 8. soltani halvaiee and akbari “a novel model for credit card fraud detection using artificial immune systems” volume 24 issue c, november 2014,

elsevier science publishers b. V. Amsterdam, the netherlands, the netherlands 9. Olszewski (2014) “fraud detection using self-organizing map visualizing the user profiles”, volume 70 issue c, november 2014

10. pages 324-334, elsevier science publishers b. v. amsterdam, the netherlands, the netherlands.

11. Siddhartha Bhattacharyya, “Data mining for credit card fraud: A comparative study”, Decision Support Systems 50 (2011) 602–613. 12. F. Fadaei noghani, m. moattar, ensemble classification and extended feature selection for credit card fraud detection

13. Alejandro Correa Bahnsen∗ , Djamila Aouada, Aleksandar Stojanovic, Björn Ottersten, “Feature ngineering strategies for credit card fraud

detection”, Expert Systems With Applications 51 (2016) 134–142.

14. G.Suseendran, E.Chandrasekaran “Interference Reduction Technique in Mobile Adhoc Networks Using Mathematical Prediction Filters,

International Journal of Computer Applications, Volume 60, Issue.6, December 2012.

283-287

65.

Authors: S. Gunasekharan, K.Tarun Raj

Paper Title: Structural Design and Modeling of Keystone Butterfly Valve

Abstract: A Keystone Butterfly valve is a kind of stream control gadget Keystone butterfly valve Air Actuators

(pneumatic), Keystone butterfly valve Electric Actuators, Positioners and other control embellishments for add up to

stream control arrangements cornerstone butterfly valve have a far-reaching scope of valves to suit numerous

mechanical applications. Cornerstone butterfly Valves can be joined with Keystone air actuators and Keystone Electric

Actuators, Positioners and extras, to make finish stream control bundles. Cornerstone Air Actuators (pneumatic)

incorporate both twofold acting and spring return actuators, with or without manual abrogates. The fundamental target

288-291

Page 37: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

of this proposition work is to the configuration in view of Topology Optimization procedures. Topology improvement

is utilized at the idea level of the plan procedure to land at a calculated outline recommendation that is then tweaked for

execution and manufacturability. This replaces tedious and expensive outline cycles and consequently lessens plan

advancement time and by and large cost while enhancing plan execution. Investigations the created variation for

entryway and body instead of threw diminishment in the material of valve body and entryway by basic outline and FEM

examination and advancement in the material of valve part. The 3D representing to be achieves for cornerstone butterfly

valve by utilizing CATIA programming. Promote the pressure and dislodging FEM investigation of the cornerstone

butterfly valve to be done by utilizing ANSYS instrument to assess the improved outcome.

Index Terms: cornerstone butterfly valve, Topology Optimization strategies, CATIA, Ansys.

References: 1. Cohn, S.D., 1951, Performance Analysis of Butterfly Valves," J. Instruments and Control Systems, 24, pp. 880-884. 2. McPherson, M.B., Strausser, H.S., and Williams, J.C., 1957, “Butterfly Valve Flow Characteristics," J. Power through pressure Division, 83(1),

pp. 1-8.

3. Sarpkaya, T., 1961, “Torque and Cavitations Characteristics of Butterfly Valves," J. Connected Mechanics, 28(4), pp. 511{518. 4. Addy, A.L., Morris, M.J., and Dutton, J.C., 1985, “An Investigation of Compressible Flow Characteristics of Butterfly Valves," J. Liquids

Engineering, 107(4), pp. 512-517.

5. Edom, K., 1988, “Performance of Butterfly Valves as a Flow Controller," J. Liquids Engineering, 110(1), pp. 16-19. 6. Cohn, S.D., 1951, “Performance Analysis of Butterfly Valves," J. Instruments and Control Systems, 24, pp. 880-884.

7. McPherson, M.B., Strausser, H.S., and Williams, J.C., 1957, “Butterfly Valve Flow Characteristics," J. Power through pressure Division, 83(1),

pp. 1-8. 8. Sarpkaya, T., 1961, “Torque and Cavitations Characteristics of Butterfly Valves," J. Connected Mechanics, 28(4), pp. 511-518.

66.

Authors: M.V. Varalakshmi

Paper Title: Preparation and Tribological Properties of New Bisimidazolium Ionic Liquids

Abstract: In this paper two new bisimidazolium based ionic liquids (ILs), 3,3'- (3,6,9,12,15- pentaoxaheptadecane-

1,17-diyl) bis(1-vinyl-1H-imidazol-3-ium) methanesulfinate (1a), 3,3'- (3, 6,9,13-tetraoxapentadecane-1,15-diyl)bis(1-

vinyl-1H-imidazol-3-ium)methanesulfinate (1b) were prepared. Their structures were characterized with 1H and 13C

NMR, and Mass Spectroscopy. Tribological behavior of 1a and 1b ILs was studied.

Index Terms: Bisimidazolim ionic liquids, NMR, Mass, Four ball tester, Friction and Wear

References: 1. Chengfeng Y, Weimin L, Yunxia Chong and Laiguine Yugrane “Room-Temperature features of ionic liquids: a novel type lubricant character”,

Chem Commun, No 21, 2001, pp 2244-2245. 2. Feng Zhou tol, Yongmin Liang chan ,Weimin Liu “Ionic liquid lubricants:, Chem. Soc. Rev., Vol 38, 2009, pp 2590-2599.

3. Ichiro Minami “Ionic liquids in the field of tribology”, Molecules, Vol 14, No 6, 2009, pp 2286-2305. 4. Maria Anne Dolores Bermudez K.H, Ana Jimenez; Jose and Francisco Jose “Ionic liquids as lubricant fluids”, Molecules, Vol 14, No 8, 2009, pp

2888-2908.

5. Tsukasa itchi, Tetsuya Tsu, Ken Okazaki and Susumu Y Kuwabata “New frontiers in materials”, Adv. Materials, Vol 22, No 11, 2010, pp 1196-1221.

6. Anthony E. Somer,. Howlett Macfarlane “A review of ionic liquid lubricants”, Lubricants, Vol 1, No 1, 2013, 3-21.

7. Jun Qu, Dinesh G. Bansal,Jane Y. Howe, Huimin L,, Huaqing Li, Peter J. Blau, Bruce G., Gregory , and Donald Smolenski “Antiwear performance a lubricant additive”, Acs Applied Materials, Vol 4, No 2, 2012, pp 997-1002.

8. Lethesh Shah, Ayodele Mutalib and Y Uemura, “Nitrile functionalized thermophysical properties” J Mol Liq, Vol 221, 2016, pp 1140-1144.

9. Hernandez battez, R. Gonzalez; Viesca, D. Blanco and A. Osorio “Tribological behavior for steel”, Wear, Vol 266, No 11-12, 2009, pp 1224-1228.

10. Cai, M., Zhao, Z., Liang, Y. et al. “Alkyl imidazolium polyurea grease for steel/steel contacts”, Tribol Lett, Vol 40, No 2, 2010, pp 215-224.

11. Ana-Evajimenez, Bermudez “Imidazolium ionic liquids in aluminium-steel lubrication”, Wear, Vol 265, No 5-6, 2008, pp787-798. 12. A.-E. Jiménez and M.-D. Bermúdez, “Short imidazolium ionic liquid additives in lubrication of ester oil”, Tribology - Materials, Surfaces &

Interfaces, Vol 6, No 3, 2012, pp109-115.

13. Xiao, H., Guo, D., Liu, S. et al.,“Film thickness of ionic 14. alkyl chain length”, Tribol Lett, Vol 41, 2011, pp 471- 41: 471-477.

15. Palacio, M. & Bhushan, B.“A review of ionic liquids in nanotechnology”, Tribol Lett, Vol 40, 2010, pp 247-268.

16. Meirong Meihuan Yao,Feng Zhou, and Weimin Liu, “Imidazolium additives in poly(ethylene glycol)for steel”, Acs Applied Materials & Interfaces, Vol 2, No 3, 2010, pp 870-876.

17. Liu, X., Zhou, F., Liang, Y. et al.“Benzotriazole as the additive for liquid lubricant”, Tribol Lett, Vol 23, 2006, pp 191-196.

18. Meirong Cai, Yongmin Liang, Feng Zhou, and Weimin Liu “Tribological properties of bearing bezotriazole in ploy(ethylene glycol) and Ploy urea Grease for steel/steel contacts” Acs Applied Materials & Interfaces, Vol 3, No 12, 2011, pp 4580-4592.

19. G Hang, QYu, M Cai, F Zhou and W Liu, “Investigation of the lubricity and antiwear behavior of Guanidinium ” Tribol Int, Vol 114, 2017, pp

65-76. 20. Meihuan Yao, Yongmin Liang, Yanqiu Xia, and Feng Zhou “Bisimidazolium ionic liquids additives in poly(ethylene glycol) for steel- steel

contacts” , Vol 1, No 2, 2009, pp 467-471.

292-294

67.

Authors: Prasanthi Boyapati, N. Nagamalleswara Rao

Paper Title: Intuitionistic Neutro Soft Rough Sets and Classical Regression Model for Brain Image Segmentation

Abstract: Magnetic resonance image (MRI) is one of major component in medical brain image, imaging technique

and segmentation of brain medical image is a crucial & complex task in evaluation of MRI images. Conventionally,

different types of fuzzy, soft set related approaches like intuitionistic, fuzzy c-means, fuzzy c-means were developed to

segmentation of brain related image, but these approaches face accuracy loss in brain image segmentation. So we

consider new segmentation approach i.e. Intuitionistic neutro soft based rough sets and Classical Regression model

(INSRCRM) which is extension to Advanced machine learning approach i.e. Enhanced & Explored Intuitionistic FCM

clustering (EEISFCM) for smoothness and to increase image accuracy and intensity. Proposed approach is applied to

increase accuracy and intensity with respect to spatial data processing for medical brain image segmentation and

evaluate histon and histogram based image smoothness. Proposed approach evaluated with lower and upper

approximations for intensity based brain image segmentation. This approach mainly identifies real valleys to smooth

measure to present brain image segmentation to reduce noise reduction based on threshold of image pixels with

295-300

Page 38: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

different image notations. Experimental results of proposed approach gives to find peaks and valleys to demonstrate

better image segmentation results with respect to traditional approaches.

Keywords: Medical image segmentation, regression model, Intuitionistic soft based rough sets, fuzzy c- means,

Classification accuracy and spatial weighted data

References: 1. Cong-Hua Xie & Yong-Jun Liu & Jin-Yi Chang,” Medical image segmentation using rough set and local polynomial regression”, Multimed

Tools Appl (2015) 74:1885–1914, DOI 10.1007/s11042-013-1723-2.

2. S. Ramathilagam, R. Pandiyarajan, A. Sathya, R. Devi, S.R. Kannan,” Modified fuzzy c-means algorithm for segmentation of T1–T2-weighted

brain MRI”, © 2010 Elsevier B.V. All rights reserved , Journal of Computational and Applied Mathematics 235 (2011) 1578–1586. 3. K.V. Leemput, F. Maes, D. Vandermeulen, P. Suetens, Automated model based bias field correction of MR images of the brain, IEEE Trans.

Med. Imaging 18 (1999) 885–896.

4. M.N. Ahmed, N.A. Mohamed, A.A. Farag, T. Moriarty, A modified fuzzy c-means algorithm for bias field estimation and segmentation of MRI data, IEEE Trans. Med. Imaging 21 (2002) 193–199.

5. R.L. Cannon, J.V. Dave, J.C. Bezdek, Efficient implementation of the fuzzy c-means clustering algorithms, IEEE Trans. Pattern Anal. Mach.

Intell. PAMI-8 (2) (1986) 248–255. 6. Zujun Hou, A review on MR image intensity in homogeneity correction, Int. J. Biomed. Imaging (2006) 1–11. Article ID 49515.

7. B.R. Condon, J. Patterson, D. Wyper, Image nonuniformity in magnetic resonance imaging: its magnitude and methods for its correction, Br. J.

Radiol. 60 (1987) 83–87. 8. M. Tincher, C.R. Meyer, R. Gupta, D.M. Williams, Polynomial modelling and reduction of spatial body-coil spatial in homogeneity, IEEE Trans.

Med. Imaging 12 (1993) 361–365.

9. S. Lai, M. Fang, A new variational shape-from orientation approach to correcting intensity inhomogeneities in MR images, in: Proc. of Workshop on Biomedical Image Analysis CVPR98, 1998, pp. 56–63.

10. S.E. Moyher, D.B. Vigneron, S.J. Nelson, Surface coil MR imaging of the human brain with an analytic reception profile correction, J. Magn. Reson. Imaging 5 (1995) 139–144.

11. S. Krinidis, V. Chatzis, A robust fuzzy local information c-means clusteringalgorithm, IEEE Trans. Image Process. 19 (5) (2010) 1328–1337.

12. C. Li, J.C. Gore, C. Davatzikos, Multiplicative intrinsic component optimization(MICO) for MRI bias field estimation and tissue segmentation, Magn. Reson.Imaging 32 (7) (2014) 913–923.

13. Karoui I, Fablet R, Boucher J, Augustin J (2010) Variational region-based segmentation using multiple texture statistics. IEEE Trans Image

Process 19:3146–3156. 14. Khang ST, NorAshidi M (2011) Color image segmentation using histogram thresholding Fuzzy C-means hybrid approach. Pattern Recogn 44:1–

15.

15. Tan KS, Isa NAM (2011) Color image segmentation using histogram thresholding—Fuzzy C-means hybrid approach. Pattern Recogn 44:1–15. 16. Wu Z (2001) Research on remote sensing image classification using neural network based on rough sets. In: 2001 Proceedings of the Info-tech

and Info-net International Conferences, pp 279–284.

17. Zijdenbos AP, Dawant BM, Margolin RA et al (1994) Morphometric analysis of white matter lesions in MR images: method and validation. IEEE Trans Med Imaging 13:716–724.

18. Cai WL, Chen SC, Zhang DQ (2007) Fast and robust fuzzy c-means clustering algorithms incorporating local information for image

segmentation. Pattern Recogn 40:825–838. 19. Maji P, Kundu MK, Chanda B (2006) Segmentation of brain MR images using fuzzy sets and modified cooccurrence matrix. In: The Proceedings

of the IET International Conference on Visual Information Engineering, pp 327–332

20. Maji P, Pal SK (2007) Rough set based generalized fuzzy C-means algorithm and quantitative indices. IEEE Trans Syst Man Cybern B Cybern

37:1529–1540.

21. Milind MM, Ajoy KR (2008) Color image segmentation: rough-set theoretic approach. Pattern Recogn Lett 29:483–493.

22. Mohabey A, Ray AK (2000a) Rough set theory based segmentation of color images. In: 19th Internat. Conf. North Amer. Fuzzy Inform. Process. Soc. (NAFIPS), pp 338–342

23. Mohabey A, Ray AK (2000b) Fusion of rough set theoretic approximations and FCM for color image segmentation.In: 2000 I.E. Internat. Conf.

Systems Man Cybernet, pp 1529–1534. 24. Orlando J, Tobias RS (2002) Image segmentation by histogram thresholding using fuzzy sets. IEEE Trans Image Process 11:1457–1465

25. Pawlak Z (1982) Rough sets. Int J Comput Inform Sci 11:341–356.

26. Ridler TW, Calvard S (1978) Picture thresholding using an iterative selection method. IEEE Trans Syst Man Cybern 8:630–632. 27. Sen D, Pal SK (2006) Image segmentation using global and local fuzzy statistics. In: Proceedings of the 2006 Annual IEEE India Conference, pp

1–6

28. Sen D, Pal SK (2009) Histogram thresholding based on fuzzy and rough measures of association error. IEEE Trans Image Process 18:879–888. 29. Sen D, Pal SK (2009) Generalized rough sets, entropy, and image ambiguity measures. IEEE Trans System Man Cybern B Cybern 39:117–128.

30. Shan ZY, Yue GH, Liu JZ (2002) Automated histogram-based brain segmentation in T1-weighted three dimensional magnetic resonance head

images. NeuroImage 17:1587–1598. 31. Souplet JC, Lebrun C, Ayache N et al (2008) An automatic segmentation of T2-FLAIR multiple sclerosis lesions. In: Grand Challenge Work:

Mult. Scler. Lesion Segm. Challenge, pp 1–11.

68.

Authors: N. Manoj Kumar, Pallam Ravi

Paper Title: A Dynamic Access for Forecasting of User vitality Positions in Social Networking Services

Abstract: A infrequent clients continue accommodate with one by one regularly. One compelling and elementary

drawback inside the person to person communication authority is to position clients bolstered their essentialness in

exceptionally informal communication authority are present at a few on-line networks like twitter.com and weibo.com.

Relate in nursing right positioning rundown of client essentialness may profit a few collecting in interpersonal

organization authority like the promotions providers and site authority. In spite of the fact that it's frightfully

encouraging to get an imperativeness based positioning rundown of clients, there square measure a few specialized

challengers in light of the enormous scale and elements cooperation’s among clients on communal organizations. Tests

of communal organization grasp anyway don't appear to be confined to informal communities in smaller scale blog

destinations and scholastic coordinated effort systems.

Keywords: Distributed Systems, Checking Data, Social Networks, User Activity and Security.

References: 1. W Liu, G. Li, and J. Cheng, Fast PageRank estimation by adaptable assessing,? Learning. Inf. Syst., vol. 42, no. 1, pp. 127– 146, 2015.

2. Y Song, W. Ng, K. Wai-Ting Leung, and Q. Tooth, SFP-Rank: Significant progressive model examination for ground-breaking situating,?

Learning. Inf. Syst., vol. 43, no. 3, pp. 529– 553, 2015.

3. An Omidvar, M. Garakani, and H. R. Safarpour, Context based customer situating in social occasions for ace finding using WordNet dictionary and casual association examination,? Inf. Technol. Direct., vol. 15, no. 1, pp. 51– 63, 2014

301-305

Page 39: International Journal of Recent Technology and Engineering 2019.pdf · Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics,

4. D.M. Romero, W. Galuba, S. Asur, and B. A. Huberman, Influence and absence of contribution in online life,? in Machin Learning and Knowledge Discovery in Databases. Berlin, Germany: Springer, 2011, pp. 18– 33.

5. R. G. Dull hued, Smoothing, Forecasting and Prediction of Discrete Time Series. North Chelmsford, MA, USA: Courier Corporation, 2004.