Volume-3 Issue-6


Version
Download0
Stock
File Size4.00 KB
Create DateAugust 28, 2017
Download

 Download Abstract Book

S. No

Volume-3 Issue-6, May 2015, ISSN: 2319–6386 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

M. A. Gopalan, S. Vidhyalakshmi, N. Thiruniraiselvi

Paper Title:

Pythagorean Triangle with Hypotenuse-4 (Area/Perimeter) is 3 Times a Square Integer

Abstract: We present infinity many Pythagorean triangles, where, in each, the hypotenuse -4(Area/Perimeter) is a square multiple of 3. A few numerical examples are presented. Also, a few interesting relations among the sides of the Pythagorean triangles are given. Further, by considering suitable linear combination among the generators of the Pythagorean triangles, Diophantine 3-tuples and special dio-3 tuples with suitable property are obtained.

Keywords:
Area/perimeter, Pythagorean triangle, square integer.


References:

1.        L.E.  Dickson ., “History of theory of numbers”,vol.2,Chelsea Publishing Company,NewYork,1952.
2.        D.E.  Smith, “History of Mathematics”,vol.1 and 2,Dover Publications, New York,1953.

3.        S.G.  Telang, “Number Theory”,Tata McGraw-Hill Publishing Company,New Delhi,1996.

4.        Thomas Koshy, “Elementary Number Theory with Applications”,Academic Press,2005.

5.        T. Nagell, “Introduction to Number Theory”,Plencem,New York,1988.

6.        L.J.  Mordell, “Diophantine Equations”,Academic Press,New York,1969.

7.        M.A. Gopalan and S. Leelavathi, “Pythagorean triangle with 2(Area/Perimeter) as a cubic integer”, Bulletin of Pure and Applied Sciences,vol.27 E(2),2007,pp. 197-200.

8.        M.A. Gopalan and G. Janaki, “Pythagorean triangle with Area/Perimeter as a special polygonal number”, Bulletin of Pure and Applied Sciences,vol.27 E(2),2008,pp. 393-402.

9.        M.A. Gopalan  and  S. Devibala, “Pythagorean triangle with triangular number as a leg”, Impact J.Sci.Tech. vol.2(4), 2008,pp.195-199.

10.     M.A. Gopalan  and G. Janaki, “Pythagorean triangle with nasty number as a leg”,Journal of Applied Mathematical Analysis and Applications”,vol.4(1-2),2008,pp.13-17.

11.     M.A. Gopalan  and G. Janaki, “Pythagorean triangle with perimeter  as a pentagonal number”,Antarctica J.Math., vol.5(2), 2008,pp.15-18.

12.     M.A. Gopalan  and A. Gnanam, “ Pythagorean triangles and special polygonal numbers”,International Journal of Mathematical Sciences vol.9(1-2),2010,pp.211-215.

13.     M.A. Gopalan  and G. Sangeetha, “Pythagoream triangles with perimeter as triangular number”,The Global Journal of Applied Mathematics and Mathematical Sciences,vol.3(1-2),2010,pp.93-97.

14.     M.A. Gopalan   and B. Sivakami, “Pythagorean Triangle with Hypotenuse minus 2(Area/Perimeter) as a  square integer”,Archimedes J.Math.,vol.2(2),2012,pp.153-166.

15.     M.A. Gopalan  and V. Geetha,”Pythagorean triangle with Area/Perimeter as a special polygonal number”,International Refereed Journal of Engineering and Science,vol.2(7),2013,pp.28-34.

16.     M.A. Gopalan, Manju Somanath  and K. Geetha,”Pythagorean triangle with Area/Perimeter as a special polygonal number”,IOSR-JM,vol.7(3),2013,pp52-62.

17.     M.A. Gopalan, Manju Somanath  and V.Sangeetha, “Pythagorean triangles and pentagonal number”, Cayley J.Math,,vol.2(2),2013,pp.151-156.

18.     M.A. Gopalan, Manju Somanath  and V.Sangeetha, “Pythagorean triangles and special pyramidal  numbers”, IOSR-JM, vol.7(4), 2013,pp.21-22.

19.     P. Thirunavukkarasu and S. Sriram, “Pythagorean triangle with Area/Perimeter as quartic integer”, International Journal of Engineering and Innovative Technology (IJEIT), vol.3(7),2014,pp.100-102.

20.     M.A. Gopalan, Manju Somanath  and V.Sangeetha, “Pythagorean Triangle with Area/Perimeter as a Quartic Integer”, IJERM, vol-02, Issue-03, March-2015

 

1-5

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Dhiren Pandit, Jayesh Dhodiya

Paper Title:

PCA+LDA Method for Face Recognition Using Neural Network

Abstract: Face recognition plays important role in many applications like video surveillance, retrieval of an identity from a database for criminal investigations and forensic applications. The face is considered as good bio-metric for many reasons: the acquisition process is non-intrusive and does not require collaboration of the subject to be recognized. The acquisition process of a face from a scene is simpler and cheaper than the acquisition of other bio-metrics as the iris and the fingerprint. On the other hand, many problems arise, because of the variability of many parameters like face expression, pose, scale, lighting, and other environmental parameters. Face recognition involved in application like problem of recognition of an identity in a scene. A system that automatically recognizes a face in a scene first detects it and normalizes it with respect to the pose, lighting and scale. Then, the system tries to associate the face to one or more faces stored in its database, and gives the set of faces that are considered as nearest to the detected face. This requires more computational resources and very robust algorithms for detection, normalization and recognition. In this paper we have implement different face recognition methods like Principle component analysis, Linear Discriminant Analysis and Fusion of PCA and LDA for face recognition. And better recognition rate is achieved by implementing neural network for classification.

Keywords:
PCA, LDA, FFNN, MLP, PCA-NN, LDA-NN.

References:

1.        Belhumeur P., Hespanha J., Kriegman D. Using discriminant eigenfeatures for image retrieval. PAMI, 19(7):711720, 1997.
2.        Bledsoe W. Man-Machine Facial Recognition, Panoramic Research Inc.Palo Alto, CA, (1966) Rep. PRI:22.

3.        Chellappa R., Wilson C.L.. Human and machine recognition of faces:A survey, Proc, IEEE 83Vol. 5 (1995) 705-741.

4.        Duda R.O., Hart P.E., Stork D.G., Pattern Classification, John Wiley Sons, USA (2001)

5.        Gonzalez R. Digital Image Processing Using MATLAB, Publisher-Tata McGraw-Hill Education, ISBN 0070702624, 9780070702622, 2013.

6.        Haykin S. Neural Networks: A Comprehensive Foundation , Prentice Hall Inc.,New Jersey, 1999.

7.        Kirby M., Sirovich L. Sirovich, Application of the Karhunen-Loeve Procedure for the Charac terization of Human Faces, IEEE PAMI, Vol. 12 (1990) 103-108.

8.        Mitchell T. Machine Learning, , McGraw-Hill, Editions International,New York, 1997***

9.        Moghaddam B., Pentland A. Probabilistic visual learning for object recognition. PAMI, 9(7):696710, 1997.

10.     Russell D. , Robert J. Neural Smithing, Supervised Learning in Feed forward Artificial Neural Networks (A Bradford Book), The MIT Press, 1999

11.     Tunglin D. Facial Expression Classification Using PCA and Hierarchical Radial Basis Function Network”, Journal of Information Science And Engineering 22, pp. 1033-1046, Taiwan, 2006.

12.     Turk M. , Pentland A. Eigenfaces for Recognition, Journal of Cognitive Neuroscience, Vol. 3, (1991) 71-86.

 

6-11

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

S. Vidhyalakshmi, M. A. Gopalan, K. Lakshmi

Paper Title:

On The Non-Homogeneous Quintic Equation with Seven Unknowns

Abstract: We obtain infinitely many non-zero integer solutions satisfying the non- homogeneous quintic equation with seven unknowns given by. Various interesting relations between the solutions and special numbers, namely, polygonal numbers, Pyramidal numbers, Stella Octangular numbers, Octahedral numbers, Jacobsthal number, Jacobsthal-Lucas number, keynea number, Centered pyramidal numbers are presented

Keywords:
Centered pyramidal numbers, Integral solutions, Non-homogeneous Quintic equation, Polygonal numbers, Pyramidal numbers.

References:

1.        L.E.Dickson, History of Theory of Numbers, Vol.11, Chelsea Publishing company, New York (1952).
2.        L.J.Mordell, Diophantine equations, Academic Press,  London(1969).

3.        Carmichael,R.D.The theory of numbers and Diophantine  Analysis,Dover Publications, New York (1959)

4.        M.A.Gopalan & A.Vijayashankar, An Interesting Diophantine problem, Advances in Mathematics, Scientific Developments and Engineering Application, Narosa Publishing House, Pp 1-6, 2010.

5.        M.A.Gopalan & A.Vijayashankar, Integral solutions of ternary quintic Diophantine equation ,International Journal of Mathematical  Sciences 19(1-2), 165-169, Jan-June 2010

6.        M.A.Gopalan,G.Sumathi & S.Vidhyalakshmi, Integral solutions of non-homogeneous   ternary quintic equation in terms of pells sequence , JAMS (Research India Publication), Vol.6 (1), 59-62, 2013

7.        S.Vidhyalakshmi, K.Lakshmi and M.A.Gopalan,  Observations   on     the homogeneous    quintic   equation with four unknowns  ,International Journal of Engineering, Science and Mathematics (IJESM), Vol 2(2), 40-45, June   2013.

8.        M.A.Gopalan & A.Vijayashankar, Integral solutions of   non-homogeneous quintic  equation with five   unknowns, Bessel J.Math.,1(1),23- 30,2011. 

9.        M.A.Gopalan & A.Vijayashankar, solutions of uintic equation with five unknowns, Accepted for Publication   in International Review of Pure and Applied Mathematics.

10.     M.A.Gopalan, G. Sumathi & S.Vidhyalakshmi, On        the non-homogenous quintic equation with five knowns, IJMIE, Vol.3 (4), 501-506, April- 2013.

 

12-15

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

K. Ram Kumar, C. Suriyakumar, L. Vishnuvardan, S. Vignesh, C. Vigneswaran

Paper Title:

One Wheeled Electric Personal Transporter

Abstract: Inpresent scenario, every individual has a two wheeler and they are using this even for reaching short distances. By this, conventional resources like petrol are consumed more and more. Not only the depletion of resourses, it produces more environmental pollution hazards. To overcome this issue, comparatively unconventional energy resourses should be used. For this we have developed a electric operated unicycle., The outcomes this research paper is to design, build and control a self-balancing electric unicycle are presented. The design of the mechanical and electrical components is discussed, followed by a derivation of the dynamics of a generic unicycle. A linear control strategy to stabilize the unicycle is implemented on the physical system and a simulated model is derived from the system dynamics. Finally, comparisons of the results from simulations conducted on a model of the unicycle as well as experimental results are presented.

Keywords:
One wheeled electric vehicle, robotic system, stabilization, state feedback control.


References:

1.        R. C. Ooi, 2003, “Balancing a Two-Wheeled Autonomous Robot”, Final Year Thesis, The University of Western Australia School of Mechanical Engineering, Faculty of Engineering and Mathematical Sciences University of Western Australia, Australia.
2.        Popescu, Cristina; Paraschiv, Nicolae; Cangea, Otilia.(2011) Comparison s Between Pid And Fuzzy Controllers Used In Mobile Robot Co annals of daaam& proceedings;jan2011, p223.

3.        YoungSooSuh.(2003) .Attitude Estimation Using Low Cost Accelerometer And Gyroscope.Proceedings KORUS 2003. The 7th Korea-Russia International Symposium on Volume: 2 Page(s): 423 - 427 vol.2.

4.        Y. O. Chee and M. S. Z. Abidin, 2006, “Design and Development of Two Wheeled Autonomous Balancing Robot”, Student Conference on Research and Development, June 27-28 2006, pp. 169-172, Shah Alam, Selangor, Malaysia.

5.        D. Küçük, 2010, “Design of Two-Wheeled Twin Rotored Hybrid Robotic Platform”, M.Sc Thesis, Atılım University, Ankara.

 

16-21

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

A. Kathiravan, Alamelu Nachiappan, K. Magueswary

Paper Title:

A Firefly Algorithm Based Coordinated Design of Power System Stabilizer and Static Synchronous Series Compensator in Multi-Machine Power System

Abstract: It is widely accepted that power system stability is an important aspect in planning and promoting electric power system. This paper presents the transient stability analysis of the three-machine nine-bus test system using MATLAB. Generator angular frequency is a reliable indicator of the stability of the power system. Change in load, power generation or fault causes a fluctuation of the speed of the generators in the power system, resulting in fluctuation of the angular frequency of the power system. So rate of change of angular frequency is used as indicator of the transient stability of the system and measures taken to maintain stability and frequency of the system. This paper presents a coordinated control tuning of power system stabilizer (PSS) with Static Synchronous Series Compensator (SSSC) by firefly algorithm to enhance the power transient stability.

Keywords:
Firefly Algorithm, Power system stabilizers, Static Synchronous Series Compensator (SSSC).


References:

1.        Prabha Kundur, John Paserba, Venkat Ajjarapu, Goran Andersson, Aryan Bose, Claudio Canizares, Nikos Hatziargyriou, David Hill, Alex Stankovic, Carson Taylor, Thierry Van Cutsem, and Vijay Vittal, "Definition and Classification of Power System stability" IEEE Trans. Power Syst., vol.19, no.2, pp. 1387-1401, May 2004.
2.        P. Kundur, Power System Stability and Control. New York: McGraw-Hill, 1994.

3.        P. M. Anderson and A. A. Fouad, Power system control and stability. Piscataway, N.J.: Wiley-Interscience, 2003.

4.        G. Hingorani and L. Gyugyi, "Understanding FACTS-Concepts and Technology of Flexible AC Transmission Systems" New York: IEEE Press, 2000.

5.        M. A. Abido, "Optimal Design of Power-System Stabilizers Using Particle Swarm Optimization" IEEE Trans. Energy Conv., vol. 17, no. 3, pp. 406-413, September 2002.

6.        H. Shayeghi, H.A. Shayanfar, A. Safari, and R. Aghmasheh, "A robust PSSs design using PSO in a multi-machine environment" Energy Convers. Manage., vol. 51, pp. 696-702, 2010.

7.        M. A. Abido, "Analysis of Power System Stability Enhancement via Excitation and Facts-Based Stabilizers" Elect. Power Compon. and Syst., vol. 32, no. 1, pp. 75-91, 2004.

8.        Sidhartha Panda, and Narayana Prasad Padhy, "Comparison of particle swarm optimization and genetic algorithm for FACTS-based controller design" Applied Soft Computing,vol.8,pp.1418-1427,2008.

9.        Xianzhang Lei, Edwin N. Lerch, and Dusan Povh "Optimization and Coordination of Damping Controls for Improving System Dynamic Performance" IEEE Trans. Power Syst., vol. 16, no. 3, August 2001. 

10.     Y.L. Abdel-Magid, M.A. Abido "Robust coordinated design of excitation and TCSC-based stabilizers using genetic algorithms" Electric Power Syst. Res., vol. 69, pp.129-141, 2004.

11.     E.S. Ali, S.M. Abd-Elazim "Coordinated design of PSSs and TCSC via bacterial swarm optimization algorithm in a multimachine power system" Int. J. Elect. Power and Energy Syst., vol. 36, pp. 84-92,2012.

12.     W. Qiao, R.G. Harley, G.K. Venayagamoorthy, "Fault- Tolerant Optimal Neurocontrol for a Static Synchronous Series Compensator Connected to a power network", IEEE transactions on industrial applications vol. 44, no. 1, pp.74-84, 2008.

13.     H.F. Wang, "Design of SSSC Damping Controller to Improve Power System Oscillation Stability", IEEE conference, pp.495-500, 1999.

14.     X. S. Yang, “Firefly algorithm, stochastic test functions and design optimisation,” International Journal of Bio-Inspired Computation, vol. 2, no. 2, pp. 78–84, 2010.    

15.     S. Khani, M. Sadeghi, S.H. Hosseini, "Optimal Design of SSSC Damping Controller to Improve Power System Dynamic Stability Using Modified Intelligent Algorithms", IEEE conference on power electronics and drive systems and technologies, pp.393-397, 2010.

16.     X. S. Yang, Nature-Inspired Meta-Heuristic Algorithms, Luniver Press, Beckington, UK, 2008.

17.     S. Lukasik and S. Zak, “Firefly algorithm for con-tinuous constrained optimization tasks,” in Proceedings of the International Conference on Computer and Computational Intelligence (ICCCI ’09), N. T. Nguyen, R. Kowalczyk, and S.-M. Chen, Eds., vol. 5796 of LNAI, pp. 97–106, Springer, Wroclaw, Poland, October 2009.

18.     X. S. Yang, “Firefly algorithms formultimodal optimization,” in Proceedings of the Stochastic Algorithms: Foundations and Applications (SAGA ’09), vol. 5792 of Lecture Notes in Computing Sciences, pp. 178–178, Springer, Sapporo, Japan, October 2009.

19.     X. S. Yang, “Firefly algorithm, Levy flights and global optimization,” in Research and Development in Intelligent Systems XXVI, pp. 209–218, Springer, London, UK, 2010.

22-28

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Manju Somanath, V. Sangeetha, M. A. Gopalan, M. Bhuvaneshwari

Paper Title:

On the Ternary Cubic Equation 

Abstract: The non-homogeneous ternary cubic Diophantine equation given by  is considered. Different patterns of non-zero distinct integer solutions to the above equation are obtained. For each of these patterns, a few interesting relations between the solutions and the special figurate numbers are obtained.

Keywords:
Non-homogeneous, ternary cubic Diophantine equation, integer solutions, polygonal numbers, pyramidal numbers. 2010 Mathematics Subject Classification: 11 D 25.


References:

1.        Dickson. L.E., 2005, “History of Theory of Numbers”, Vol 2. Diophantine analysis, New York,Dover.
2.        Mordell .L.J.1969, “Diophantine Equations” Academic Press,New York.

3.        Carmichael .R.D,1959, “The Theory of numbers           and Diophantine Analysis”, New York,Dover.

4.        GopalanM.A., Manju Somanath and              VanithaN., 2007, “On Ternary cubic equation  ”,Acta Ciencia Indica, Vol XXXIIIM, No-3,705-707.

5.        GopalanM.A. and SangeethaG, 2011,“On The Ternary Cubic Diophantine Equation ”, Archimedes J.Math, 1(1),7-14.

6.        GopalanM.A.,.VijayasankarA, VidhyalakshmiS., 2011, “Integral Solutions of Ternary Cubic Equation  ,”Archimedes J.Math,1(1),59-65.

7.        GopalanM.A. and SrividhyaG., 2011, “Integral solutions of the ternary cubic Diophantine equation ”, Acta Ciencia Indica,Vol.XXXVIIM,No-4,805-808.

8.        GopalanM.A. and PandiselviV. 2011, “Observations on the ternary cubic equation”, Archimedes J.Math,1(1),31-37.

9.        GopalanM.A. and VijayalaksmiR, 2012, “Integral solutions of ternary cubic equation”, Antarctica J.Math., 9(7),607-612.

10.     GopalanM.A and SivakamiB.,2012,“On the ternary cubic equation ”, Bessels J.Math., 2(3),171-177.

11.     GopalanM.A and SivakamiB.,2012, “Integral Solutions of Ternary Cubic Equation ,” Impact J.Sci.Tech.,Vol        6,No.1,15-22.

12.     GopalanM.A.,VidhyalakshmiS, MallikaS.,2013, On the ternary non-homogeneous cubic equation  ,” Impact J.Sci.Tech.,Vol  7,No.1, 41-45.

13.     GopalanM.A.,.Vidhyalakshmi S, LakshmiK.,2013, “Lattice points on the non- homogeneous cubic equation  , Impact J.Sci.Tech.,Vol  7, No.1, 51-55.

14.     Gopalan M.A., Vidhyalakshmi S.,Lakshmi K ,2013, “Lattice points on the non-homogeneous  cubic  equation ”, Impact  J.Sci.Tech.,Vol  7, No.1, 21-25.

15.     Gopalan M.A.,Vidhyalakshmi S.,Kavitha A,2013, “Observation On The Ternary CubicEquation ”,Antarctica J.Math.,10(5),453-460.

16.     Gopalan M.A.and Geetha K., 2013, “On the ternary cubic diophantine equation” , Bessels J.Math., 3(2),119-123.

17.     Vidhyalakshmi S.,Gopalan M.A.,Kavitha A., 2013, “Observations on the ternary cubic equation ”,International Journal of Computational Engineering Research,  Vol 3, Issue 5, 17-22.  

18.     Gopalan M.A., Vidhyalakshmi S., Sumathi G., 2013,“On The Ternary Cubic Diophantine Equation   ”, Impact J.Sci Tech,Vol.7(2),01-06.

19.     Vidhyalakshmi S., Usharani T.R.,Gopalan M.A.,2013,“Integral Solutions Of Non-       Homogeneous Cubic Equation ”, Diophantine J.Math., 22(1), 31-38.

20.     MeenaK., Gopalan M.A.,Vidhyalakshmi S,Aarthy Thangam.S,2014, “ On the ternary  non- homogeneous cubic equation Bessel J.Math., 4(3),75-80.

21.     Vidhyalakshmi  S., Gopalan M.A.,Kavitha A.,2014, “On the         ternary cubic equation ”,IJIRR,1         (10) ,99-101.

22.     Gopalan M.A., Vidhyalakshmi S and Premalatha E, 2014, “Cubic Diophantine equation with three unknowns ,” Sch.J.Eng.Tech,2(5A),733-737.

23.     MeenaK., Gopalan M.A.,Vidhyalakshmi S. Thiruniraiselvi.N., 2014,“On the non- Homogeneous ternary cubic equation Universe of Emerging Technologies and Science, 1(4),1-5.

 

29-31

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Mahdi Hosseini, Hadi Hosseini, Seyed Amin Ahmadi Olounabadi, Ahmad Hosseini

Paper Title:

Study the Effective of Lateral Load on Story Drift in RC Frame Structures

Abstract: Story drift is defined as the difference in lateral deflection between two adjacent stories. Lateral deflection and drift have three effects on a structure; the movement can affect the structural elements (such as beams and columns); the movements can affect non-structural elements (such as the windows and cladding); and the movements can affect adjacent structures. Without proper consideration during the design process, large deflections and drifts can have adverse effects on structural elements, nonstructural elements, and adjacent structures. Drift problem as the horizontal displacement of all tall buildings is one of the most serious issues in tall building design, relating to the dynamic characteristics of the building during earthquakes and strong winds. Drift shall be caused by the accumulated deformations of each member, such as a beam, column and shear wall. In this study 20 story building with  RC shear wall analysis is done with changing structural parameters to observe the effect on the drift (lateral deflection) of the tall building due to both wind and earthquake loading. There are three major types of structures were identified in this study, such as rigid frame, coupled shear wall and wall frame structures. So lateral forces due to wind or seismic loading must be considered for tall building design along with gravity forces vertical loads. Tall and slender buildings are strongly wind sensitive and wind forces are applied to the exposed surfaces of the building, whereas seismic forces are inertial (body forces), which result from the distortion of the ground and the inertial resistance of the building. These forces cause horizontal deflection is the predicted movement of a structure under lateral loads and The structural prototype is prepared and lots of data is been collected from the prototype. All the aspects such as safety of structure in shear, moment and in story drift have been collected. Main problems that would be arising due to earthquake in the structure are story drift and deflection of the building due to its large height and also torsion and others, so if the structure is proved to be safe in all the above mentioned problems than the structure would be safe in all cases in respect earthquake.

Keywords:
Story drift, wind load, frame structure, Seismic Load, shear wall.


References:

1.        IS-456-2000-Code of Practice for Plane and Reinforced Concrete .
2.        IS 1893(Part 1)-2002:Eriteria for Earthquake Resistant Design of Structure.

3.        IS:875(Part1)-1987- Code of Practice for Design Load(other than earthquake) for Buildings and Structure –Dead loads

4.        IS:875(Part2)-1987- Code of Practice for Design Load(other than earthquake) for Buildings and Structure –Imposed Load

5.        IS:875(Part2)-1987- Code of Practice for Design Load(other than earthquake) for Buildings and Structure –Wind Load

6.        Mark fintel-Hand Book of Concrete Engineering. Second Edition .CBS Publishers &Distributors-New Delhi,2004

7.        Anil k.Chopra-Dynamics of Structure :Theory and Application to Earthquake Engineering, Second Edition ,Pearson Education (Singapore) Pvt.Ltd 2005

8.        Mariopaz-Structure Dynamics : Theory and Computations,(Second Edition) , .CBS Publishers &Distributors-New Delhi,2004

9.        Indian Society of Earthquake Technology –Proceedings of the Sixth World Conference Earthquake Engineering,Vol.1,Published by Sarita Prakashan,Merut,1977.

10.     A.r.chandrasekharan and D.s.prakash rao –a Seismic Design of Multi –Storied RCC Buildings (published in the proceeding ot the 12th symposium on earthquake engineering held iit-roorkee in dec 2002)

11.     Medhekar,m.s,and Jain,s,k, Seismic Behavior ,Design and Detailing of RC Shear Wall,part 1:behavior and strength –an icj compilation .

12.     Kaustubh dasgupta ,C.v.r.murty and Shailesh k.agrawal,Seismic Shear Design of RC Structural Walls897-971.

13.     Crandell, J., and S. Herrenbruck. 2006.Residential wall bracing principles and design options. Journal of Building Safety. August2006

14.     Mahdi hosseini , Ahmed najim Abdullah alaskari,  Prof.N.V.Ramana Rao, International Journal of Civil Engineering and Technology (IJCIET), ISSN 0976 –6316(Online), Volume 5, Issue 8, August (2014)

15.     Dr,hadi hosseini, Mahdi hosseini, ahmad hosseini,American journals of engineering and research e-ISSN : 2320-0847 p-ISSN : 2320-0936, Volume-03, Issue-10 november2014

16.     Dr,hadi hosseini, Mahdi hosseini, ahmad hosseini,American journals of engineering and research  e-ISSN : 2320-0847 p-ISSN : 2320-0936 Volume-03, Issue-11,october 2014

 

32-43

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Shanshan Guo

Paper Title:

The Present Situation and Development Trend of the Express Logistics Industry

Abstract: In recent years, with the express logistics market demand expands gradually, the express industry revealed a rapid development momentum. But in its crazy expansion but there are many fatal behind the hidden trouble. This paper first to express the development of logistics industry in China are analyzed, and then discusses the logistics industry in China in the market structure, express policy laws, the good faith system, enterprise's main body treatment and so on, the defects of the logistics industry in China and to express the healthy development of the corresponding countermeasures.

Keywords:
Express logistics; diversification structures; centralization.


References:

1.        Rui,Wang,Problems and Solutions of the private courier industry development,Modern Marketing,vol.12,,2010.
2.        Fengchun,Hao,Development Status and Legal Countermeasures of Chinese Logistics Industry,China Trade,vol.33,,2011.

3.        Zongxun,Duan,Current Situation and Development Trend of Chinese express industry analysis,Enterprise Herald,vol.03,,2012.

 

44-46

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Rajesh Kumar Panda, Ralesh Ranjan Biswal, Jyoti Sankar Sahoo

Paper Title:

Power Efficient Double Gate MOSFET Full Adder Circuit using 45nm Technology

Abstract: In designing an arithmetic circuit many aspects are to be taken into consideration. The main aspect is the power consumption. It is a tough task for the designers to design a circuit which consume less power in standby mode as well as in active mode. In an arithmetic circuit, the adder is an important module not only for addition operation but it is also the nucleus for many arithmetic operations. Hence it is required to reduce the power consumption of adder circuit in order to reduce the power consumption of the arithmetic module. As the efficiency of adder circuit is directly influence the efficiency of the arithmetic circuit, therefore many designs have been proposed in various literatures to resolve this issue. The very promising and advanced design is to implement the full adder circuit with double gate MOSFET. As technology growing, the full adder is now implemented by using 10 number of double gate transistors instead of 28 transistors as in the peer CMOS design. But still the power consumption of this circuit is not appreciably reduced. In this paper we  proposed a design which is made up of 10T double gate (DG) MOSFETs in which all the bodies of P-type Double Gate-MOSFETs are connected to a supply less than the main supply and all the bodies of N-type Double Gate-MOSFETs are connected to another supply voltage whose value is slightly greater than zero. In the earlier design the output is not prominently stated but in this proposed modified design the output waveform is clearly distinguished by adding extra buffers to the output. In this new proposed design the static or standby power is reduced nearby 93% and the total power is reduced nearby 79% as compared to the earlier design. Simulation results of the proposed modified design is performed by cadence virtuoso with 45nm technology for validation.

Keywords:
DG-MOSFET, 10T Full adder, Low power adder circuit.


References:

1.        Y. Leblebici, S.M. Kang, CMOS Digital Integrated Circuits, 2nd ed., Mc Graw Hill, Singapore, 1999.
2.        J. Rabaey, Digital Integrated Circuits (A Design Perspective), Prentice-Hall, Englewood Cliffs, NJ, 1996.

3.        Neil H. E. Weste, David Harris and Ayan Banerjee, CMOS VLSI Design: A Circuit and System Perspective, 3rd Ed., Pearson Education, 2011.

4.        Anuj Kumar Shrivastava, Shyam Akashe, Design high performance and low power 10T full adder using Double Gate MOSFET at 45nm technology, ICCCCM, (2013), pp.1-5.

5.        S.Mukhopadhay and K. Roy, Design of high performance sense amplifier using independent gate control in sub-50nm double gate MOSFET,  Proceeding of 6th Int. Symp. On Quality of Electronic Design (ISQED), 21-23 March. (2005), USA, pp. 4-25.

6.        Santosh Kumar Gupta, Gaurab G. Pathak, Debajit Das, Chandan Sharma, Double Gate MOSFET and its Application for Efficient Digital Circuits, 3rd international Conference on Electronics Computer Technology (JCECT), IEEE (2011), pp. 33-36.

7.        J.P.Colinge, FinFETs and Other Multi-Gate Transistors, 1st ed. Springer: New York, (2008), pp. 4-25.

8.        Amara Amara, Oliver Rozeau, Editors, Planar Double-Gate Transistor from Technology to circuit, Springer (2009), pp. 1-20.

9.        http://en.wikipedia.org/wiki/Multigate_device.

10.     H-S.P. Wong, et.al, Device design consideration for double gate, ground-plane, single- gated ultrathin. SOI MOSFET at the 25nm channel length generation, in IEDM, (1998), pp.407-410.

11.     E. Nowak, et.al, Turning Silicon on its edge, IEEE circuits and Device Magazine, Jan/Feb (2004), pp.20-31.

12.     Jin-Woo Han, Chung-Jim Kim, and Yang-Kyu Choi, Universal Potential Model in Tied and Separated Double-Gate MOSFETs with consideration of symmetric and asymmetric structure , IEEE Transaction on Electron Devices (2008), Vol.-55, No.-6, pp. 1472-1479.

13.     Ruchika, Sharma, T., Sharma, K.G.,Double Gate MOSFETs circuit design, in ICRAIE, (2014), pp. 1-4

14.     Jean-Pierre Colinge, Editor, FinFET and other Multi-Gate Transistors, Springer, (2008), pp. 1-13.

15.     Mohammad Hossein Moaiyeri and Reza Faghih Mirzaee, Keivan Navi, Two New Low-Power and High-Performance Full Adders, Journal Of Computers, Vol.4, No. 2, February (2009), pp. 100-104

16.     Mariano Aguirre- Hermandez and Monico Linares-Aranda, CMOS Full Adders for Energy-Efficient Arithmetic Applications, IEEE Transactions On Very Large Scale Integration (VLSI) Systems, Vol. 19, No.4, April (2011), pp. 718-721.

 

47-51

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Prarthana Gupta, Brajesh Patel

Paper Title:

Simulation Model for Benchmarking Cloud Services Over Internet

Abstract: With an increasing footprint of Cloud in daily lives of individuals and businesses, the question of embracing Cloud is no longer on how, but how soon. Cloud is at the center stage on the topic of innovation and consumers find a differentiating advantage of with adoption of Cloud. This is aided due to multiple factors such as Open Source development, Big Data, and Social Computing being made available for consumer use. As a matter of fact the cloud computing technologies are now playing a very vital role in almost every commercial as well as non-commercial field; including large or small-scale businesses, IT organizations, Government, Quasi-Government, Public and Private sectors. The outreach of Cloud products and services has been the maximum in Individual Consumer segment due to the significant growth and innovation in Mobile space in the last decade. However in most cases, these services are pre-packaged and given to consumers, by manufacturers or service providers. The consumer has little choice to offer when they buy a packaged solution. The ability to appreciate the salient features and how can that be put to optimal use is a question that many consumers struggle with. The decision is also influenced by a variety of sources of information on cloud services and products who offer a good perspective, but often do not compare cloud products and services using a standard benchmarking technique. As it is a growing market, cloud providers try to attract the customers by highlighting only their strengths, and other marketing techniques. Over the last three research papers on similar topic, we have explained the rationale of why is a standard benchmarking technique needed, and how can that be achieved using a Service Demand Handler and Catalogue Manager for Cloud, and Unified Master Services Catalogue Manager. In this paper, we demonstrate how this technique can be used simulated using MATLAB software, and can be put to product implementation that can be used by standards benchmarking organizations such as IEEE or SPEC for further development.

Keywords:
Cloud Computing, Cloud Standards, Cloud Service Providers, Cloud Benchmarking, Cloud Benchmarking Parameters, Cloud, Unified Service Catalogue, Service Demand Handle, Cloud Computing Benchmarking.


References:

1.        Gupta, Prarthana: Service Demand Handler and Catalogue Manager for Clouds; International Journal of Computer Technology and Electronics Engineering, Volume 2, Issue 1. ISSN 2249-6343
2.        Gupta, Prarthana: Unified Master Services Catalogue Manager for Cloud; International Journal of Soft Computing and Engineering, Volume 2, Issue 3. ISSN 2231-2307

3.        Gupta, Prarthana: Computing Services

4.        Berkeley RAD Lab Project at http://radlab.cs.berkeley.edu/wiki/Projects/Cloudstone

5.        M. Armbrust and A. Fox et al. Above the clouds: A Berkeley view of cloud computing, Technical Report EECS-2009-28, UC Berkeley, 2009.

6.        A. Li and X. Yang et al.: Shopping for a Cloud Made Easy, Proceeding of the 2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 10), 2012.

7.        T. Liu, Y. Li, and X. Li, A Collaborative Management as a Service Framework for Managing Internetware Systems, First Asia-Pacific Symposium on Internetware (Internetware 2009), 2009.

8.        T. Wood and R. Shenoy et al. The Case for Enterprise-Ready Virtual Private Clouds,

9.        jgaard-Hansen, K. ; Huan Cong Nguyen ; Schwefel, H. Session mobility solution for client-based application migration scenarios, Wireless On-Demand Network Systems and Services (WONS), 2011, p.76

10.     David S. Linthicum, Cloud Computing and SOA Convergence in your Enterprise, Pearson, 2012

11.     Mehrdad Mahdavi Boroujerdi, Soheil Nazem, Cloud Computing: Changing Cogitation about Computing, World Academy of Science, Engineering and Technology 58 2011

12.     R. Buyya, C. S. Yeo, and S. Venugopal, “Market oriented Cloud Computing: Vision, hype, and reality for delivering it services as computing utilities”, in Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications

13.     Controlling Data in the Cloud: Outsourcing computation without Outsourcing Control, Richard Chow, Philippe Golle, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina Elaine Shi, Jessica Staddon Parc, CCSW 2009, Chicago, Illinois, USA.

14.     “Utility Based Cloud Power,” (2011) Computers Journal, www.dirjournal.com

15.     Chong, F. and G. Carraro (2011) “Architecture Strategies for Catching the Long Tail,” Microsoft Corporation, April 2011

16.     Miller, M. (2008) Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online, Indianapolis: Que Publishing, 2008

17.     SPEC. (2011) Standard Performance Evaluation Corporation. [Online] http://www.spec.org/index.html

18.     Stefan Bouckaert, Stephen C Philips, Jerker Wilander, Shafqat Ur Rehman, Walid Dabbous, Thierry Turletti – Benchmarking Computers and Computer Networks

 

52-57

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Prarthana Gupta, Brajesh Patel

Paper Title:

Definition of Attributes for Standard Benchmarking of Cloud Services

Abstract: Today's era is now embracing the cloud computing as a new emerging technology. As a matter of fact the cloud computing technologies are now playing a very vital role in almost every commercial as well as non-commercial field; including large or small-scale businesses, IT organizations, Government, Quasi-Government, Public and Private sectors. In a cloud environment the service provision is usually handled by large number of different service providers. As it is a growing market, these providers try to attract the customers by highlighting their strengths, and also undermining their areas of improvement. In this competitive era it's very difficult for the customer to evaluate or compare the Service Quality and Service Ratings for offered services. This tends to create even more complex situation in case of multi-cloud management environment when customers are required to choose different services from multi-cloud platform involving different service providers in order to fulfill their organizational needs. The Problem is to choose a service which provides optimum, cost-effective, highly available, reliable, portable, scalable, efficient and secured services in cloud environment. This problem becomes more severe in case of multi-cloud management platform, where complexity will be higher as involvement of different providers, result into a cumbersome process of choosing the best provider. If the customers are new user for this technology, it is very difficult task for choosing a provider. Even if customer is having some information regarding services  or those who are familiar with the provider services, this problem of choosing best provider is also complex as it involves comparing all the services from each service providers individually, understanding all their security terms, rules and financial aspects separately. This process is thus time consuming, slow, complex and annoying for the customers especially for new users. There must be certain criteria's which forms the basis of Quality Rating Comparison Analysis of services between different service providers. If the standardization of the searched criteria is further worked-out, then it will help in creating a benchmarking for comparing services provided by different service providers. Also it will help in reducing the complexity and extra workload required by customers in searching best service provider, thus enabling faster and less time consuming approach.

Keywords:
Cloud Computing, Cloud Standards, Cloud Service Providers, Cloud Benchmarking, Cloud Benchmarking Parameters, Cloud, Unified Service Catalogue, Service Demand Handler.


References:

1.        Berkeley RAD Lab Project at http://radlab.cs.berkeley.edu/wiki/Projects/Cloudstone
2.        M. Armbrust and A. Fox et al. Above the clouds: A Berkeley view of cloud computing, Technical Report EECS-2009-28, UC Berkeley, 2009.

3.        A. Li and X. Yang et al.: Shopping for a Cloud Made Easy, Proceeding of the 2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 10), 2012.

4.        T. Liu, Y. Li, and X. Li, A Collaborative Management as a Service Framework for Managing Internetware Systems, First Asia-Pacific Symposium on Internetware (Internetware 2009), 2009.

5.        T. Wood and R. Shenoy et al. The Case for Enterprise-Ready Virtual Private Clouds,

6.        jgaard-Hansen, K. ; Huan Cong Nguyen ; Schwefel, H. Session mobility solution for client-based application migration scenarios, Wireless On-Demand Network Systems and Services (WONS), 2011, p.76

7.        David S. Linthicum, Cloud Computing and SOA Convergence in your Enterprise, Pearson, 2012

8.        Mehrdad Mahdavi Boroujerdi, Soheil Nazem, Cloud Computing: Changing Cogitation about Computing, World Academy of Science, Engineering and Technology 58 2011

9.        R. Buyya, C. S. Yeo, and S. Venugopal, “Market oriented Cloud Computing: Vision, hype, and reality for delivering it services as computing utilities”, in Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications

10.     Controlling Data in the Cloud: Outsourcing computation without Outsourcing Control, Richard Chow, Philippe Golle, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina Elaine Shi, Jessica Staddon Parc, CCSW 2009, Chicago, Illinois, USA.

11.     “Utility Based Cloud Power,” (2011) Computers Journal, www.dirjournal.com

12.     Chong, F. and G. Carraro (2011) “Architecture Strategies for Catching the Long Tail,” Microsoft Corporation, April 2011

13.     Miller, M. (2008) Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online, Indianapolis: Que Publishing, 2008

14.     SPEC. (2011) Standard Performance Evaluation Corporation. [Online] http://www.spec.org/index.html

15.     Stefan Bouckaert, Stephen C Philips, Jerker Wilander, Shafqat Ur Rehman, Walid Dabbous, Thierry Turletti – Benchmarking Computers and Computer Networks

 

58-62

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Preeti Bhatt, ArunimaVerma

Paper Title:

Design and Cost Analysis of PV System Using Nano Solar Cell and Cost Comparison with Grid

Abstract: Nanotechnology is worldwide regarded as a key technology for innovations and technological progress in almost all branches of economy. In the present day scenario of electricity generation, photovoltaic system using nano solar cells is fast becoming an important area of research to make it a commercial product. Presently the PV market is dominated by wafer based crystalline Si cells, but is hampered by high cost. The paper presents the designing of PV system for a commercial organization to meet its load demand with nano solar cell. Moreover, the cost comparison of grid system and nano PV system carried out in this paper shows the economical superiority of nano solar cells over grid system.

Keywords:
Nano solar cell, grid, nano PV system.


References:

1.        Dr. M.N.Bandyopadhyay& O.P. Rahi, "Non-conventional Energy Sources", Proceedings of All India Seminar on Power Systems: Recent Advances and Prospects in 21st Century, AICTE, Jaipur, 17 February 2001, pp 1-3.
2.        A. Dey, A.Tripathi, A.Verma& A. Banodha,“Analysis of Solar Photovoltaic(SPV) Systems for Residential Application”,  National Journal of The  IE(I), vol. 87, May 06, pp 6-9.

3.        Tracy Dahl, “Photovoltaic Power Systems Technology”, White paper, www.polarpower.org,  2004, pp 1-33.

4.        ShirishSinha, AnandShukla&NanditaHazarika, "From Sunlight to Electricity: Solar Photovoltaic Applications", Journal of Tata Energy Research Institute (TERI), New Delhi, 1998.

5.        Dutta, A.K. ; Banpil Photonics, Inc., Santa Clara, CA, USA ” Prospects of nanotechnology for high-efficiency solar cells”,Electrical & Computer Engineering (ICECE), 2012 7th International Conference on20-22 Dec. 2012,IEEE.

6.        ArunimaDey “ Application of Renewable Energy sources for Domestic load”, ME Thesis, MNIT Jaipur, Rajasthan University, December 2001.

7.        Yang Yan,Liu Xiang and Wu Dianfeng,” Increasing the   Reliability of Solar Power”, IEEE Power & Energy Magazine, April 2014  Issue.

8.        Ministry of Nonconventional Energy Resources, http://www.mnre.gov.in.

9.        The Indian Renewable Energy Development Agency (IREDA), http://www.ireda.gov.in.

10.     TATA BP Solar Company, Indira Nagar, Lucknow, www.tatabpsolar.com.

11.     Nano Solar Company, www.nanosolar.com .

12.     Neil Savage, “Nanowire Silicon Solar Cell for Powering Small Circuits”, Spectrum IEEE, October 2007.

13.     National Thermal Power Corporation, Lucknow.

14.     GREGJ. SHIREK&BRIANA. LASSITER,”Modelingsolar plants’load levelsand theireffects on thedistributionsystem”, IEEE Industry Application  Magzine,July-August 2013.

15.     ParmitaMohanty, “Renewable Energy Engineering and Technology”    pp267-327

63-67

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

H. Lookman Sithic, R. Uma Rani

Paper Title:

An Analysis of Cancer Affected People using Classification Data Mining Algorithms

Abstract: Data mining is a collection of exploration techniques based on advanced analytical methods and tools for handling a large amount of information. The techniques can find novel patterns that may assist as enterprise in understanding the business better and in forecasting. Much research is being carried out in applying data mining to a variety of applications in healthcare[1]. This article explores data mining techniques in healthcare management.  Particularly, it talk about data mining and its various application in areas where people are mostly affected rigorously by cancer in Erode District, Tamil Nadu, India. The people affected by cancer using tobacco, chemical water. This paper identifies the cancer level using classification algorithms and finds meaningful hidden patterns which gives meaningful decision making to this socio-economic real world health venture.

Keywords:
Data Mining, Cancer, Classification algorithms.


References:

1.        Introduction to Data Mining with Case Studies – G.K.Gupta
2.        Langdon JD, Russel RC , Williams NS, Bulstrode CJK Arnold, Oral and Oropharyngeal cancer practice of surgery, London: Hodder Headline Group;2000.

3.        Werning, John W (may 16,2007). Oral cancer : Diagnosis, Management, and rehabilitation. P.1.ISBN 978 – 1588903099.

4.        crispian scully, Jose.V.Bagan, Colin Hopper, Joel.B.Epstien, “oral Cancer: Current and future diagnostics Techniques – A review article”, American journal of Dentistry, vol. 21,No.4,pp 199-209, Augest 2008.

5.        Arun K.Pujari, “Data mining Techniques”, University Press, First edition, fourteenth                   reprint,  2009.

6.        Peter Reutemann, Ian H. Witten,“The WEKA Data Mining Software: An Update”, SIGKDD Explorations, Volume 11, issue 1  pages10 to 18, 2005.

7.        Weka 3.6.4 data miner manual. 2010

8.        P.Rajeswari, G.Sophia Reena, ”Analysis of Liver Disorder Using Data mining     Algorithms”, Global Journal of computer science and Technology, Volume 1, issue 1, November 2010 page 48 to 52. ISSN:0975-4172

9.        A.V.L.N.S.H.Hariharan and K.S.R. Murthy, “Determination of Fluoride in and around  Visakhapatnam City, Andhra Pradesh”, International Journal of Applied Biology and      Pharmaceutical Technology, Volume: I: Issue-3: Nov-Dec -2010, pages 1261-64 ISSN:0976-4550.

 

68-72

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

R. Parameswari, N. Prabakaran

Paper Title:

A Mobile Cloud Security on Electronic Healthcare Monitoring System through Virtual Private Network Using Blowfish Algorithm

Abstract: An Electronic Healthcare Monitoring System (EHMS) provides a mechanism to transfer patient’s healthcare records and images to healthcare professionals in an encrypted format by using blowfish algorithm for securing sensitive and confidential information as it is stored in cloud server through virtual private network (VPN). The mobile cloud server respects the privacy of a patient and keeps it secured by protecting the medical images and healthcare record like Electronic Health Record  (EHR), Electronic Medical Record (EMR) and Personal Health Record (PHR) of the patients. EHMS is conserving the privacy of the healthcare information ensuring that this information cannot misuse. The Digital Imaging and Communications in Medicine (DICOM) medical images are considered with an aim to secure them during its storage and transmission. This is achieved using Blowfish Algorithm, a type of symmetric key cryptography. The two processes, encryption and decryption together form the cryptographic process. For ensuring security, the patients’ healthcare record and images are encrypted by the patient before transmitting them and are decrypted by the doctors’ after receiving them so that only the sender and the intended person can see the content in the healthcare record as well as images. Blowfish algorithm which uses a key of variable size up to 448 bits simply iterates the function 16 times (Feistel network). In this system DICOM image processing is done using MATLAB and the Blowfish encryption-decryption is performed using the VHSIC HDL (Very High Speed Integrated Circuit Hardware Description Language) platform. All the encrypted images and healthcare records will be stored it in a cloud server through virtual private network in a secured manner.

Keywords:
Cloud Computing, Virtual Private Network, Blowfish algorithm, DICOM Images.


References:

1.        Dr. J. Abdul Jaleel, Jisha Mary Thomas, “Guarding Images using a symmetric Cryptographic Technique: Blowfish Algorithm” International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 2, August 2013 
2.        Irfan Landge, Burhanuddin Contractor, Aamna Patel and Rozina Choudhary "Image encryption and decryption using Blowfish algorithm" Proceedings of the 2012 National Conference of Emerging Trends in Information Technology, Shirpur, Maharashtra, April 21 , 2012.

3.        Deepak Kumar Dakate and Pawan Dubey, “Blowfish Encryption: A Comparative Analysis using VHDL”, IJAET, vol. 1, pp. 2249-8958, 2012.

4.        Dr. V Ramaswamy and Krishnamurthy G N, “Performance Analysis of Blowfish and its Modified Version using Encryption quality, Key sensitivity”, International Journal of Recent Trends in Engineering, vol. 1, pp, 1-4, May 2009.

5.        P. Umamaheswari,  K. Ashok Kumar,” An Encryption Technique to Maintain the E-Health Information Using Blowfish Algorithm, Transactions on Engineering and Sciences ISSN: 2347-1964 (Online) 2347-1875 (Print) Vol.3, Issue 3, March 2015

6.        Bruce Schneier. The Blowfish Encryption Algorithm Retrieved October 25, 2008, http://www.schneier.com/blowfish.html

7.        Shasi Mehlrotra seth, Rajan Mishra ― Comparative Analysis of Encryption Algorithms For Data Communication‖,  IJCST Vol. 2, Issue 2, June 2011

8.        A.A. Tamimi, ''Performance Analysis of Data Encryption Algorithms. Retrieved October 1, 2008 from http://www.cs.wustl.edu/~jain/cse567-06/ftp/encryption_perf/index.html

9.        Himani Agrawal, "MATLAB Implementation, Analysis and Comparisonof AES and BLOWFISH", International J. of Multidispl.Research & Advcs. in Engg. (IJMRAE), ISSN 0975-7074, Vol. 2, No. II, July 2010. pp. 283-290.

10.     Vaishnavi B, Yogeshwari R, “A Secured Patient Healthcare Monitoring in Cloud Infrastructure” International Journal of Scientific Engineering and Research (IJSER), Volume 2 Issue 1, January 2014

11.     H. Lo¨hr, A.-R. Sadeghi, and M. Winandy, “Securing the E-Health Cloud,”Proc. First ACM Int’l Health Informatics Symp. (IHI ’10),      pp. 220- 229, 2010.

 

73-78

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

R. M. Wahul, B. Y. Pawar

Paper Title:

Cloud Based Suburban Railway Ticket Booking and Validating System for Android Phone

Abstract: In today’s scenario booking suburban railway ticket is time consuming when compared to booking long journey tickets because later can be done through the Internet in the form of 'E-ticket’ but there is no such provision for buying suburban tickets . Hence the “Cloud based suburban railway ticket booking and validating system for Android phone” can be used to buy a ticket with a smart phone. This system enables one to carry the ticket in his smart phone. User's ticket information is stored on the server side. The ticket will be produced in the form of a Unique Identification Number (UID). The user will have to create his account on his first visit and recharge his account then he can use this balance for future transactions. To bestow security to this application Secure Hash Algorithm (SHA) is used. Also the ticket checker is provided with a checker application to validate the user's UID ticket. Thus this application basically aims at making the task of buying suburban tickets much easier by saving time as people no longer have to stand in queues. Also job of the ticket checker becomes less tedious.

Keywords:
Android app, Cloud database, Suburban railway   ticket booking.


References:

1.        2012 IEEE International Conference on Advanced Communication   Control and Computing Technologies (ICACCCT) Android Suburban Railway Ticketing with GPS as Ticket Checker.
2.        Journal homepage: www.elsevier.com/locate/cose A survey of electronic ticketing applied to transport.

3.        Journal homepage: www.elsevier.com/locate/camwa Executing mobile applications on the cloud: Framework and issues.

4.        “Developer Economics 2011” (http://www. visionmobile.com/ blog/2011/06/developer-economics-2011-winners-and-losers-in-the-platform-race/)

5.         http:/ / www. netbeans. org/

6.        "What is Web Services?" (http:/ / www. wstutorial. com/ what-is-web-services/ ). . Retrieved 2011-07-26.

7.        http:/ / glassfish. java. net/

8.        "Java Web Applications" (http:/ / www. netbeans. org/ features/ web/ web-app. html). Netbeans.org. . Retrieved 2008-04-19

9.        “Cloud computing A practical approach” by Anthony T.Velte, Toby J.Velte, Robert  Elsenpeter ,TATA McGRAW HILL edition

10.     “Android application development” by Rick Rogers, John Lornbardo, Zigurd Mednieks and Blake Meike

 

79-81

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Anupam Choubey, D. H. Das, Gautam Choubey

Paper Title:

Numerical Investigation of Performance of Double Tube Heat Exchanger using Nano Fluid

Abstract: The current research aims at analyzing the heat transfer rate of the nano particles with double tube heat exchanger. Graphene, the nano particle under consideration, can be prepared using Hummers and Offeman method. The analysis has been done with the help of Ansys14 Fluent software. The physical properties (density, thermal conductivity, specific heat, viscosity) of the nano particles are taken from a standard journal and analyzed in a double tube heat exchanger. The simulation is done using the Ansys fluent for a particular concentration of graphene and the results are found to be almost similar. Hence the result obtained is standardized. The analysis is done for various concentration of graphene i.e. graphene 1(0.07% by weight) and graphene 2(0.080% by weight) with corresponding properties and analysis has been continued by making grooves on the outer surface of the inner tube in case of double tube heat exchanger. It has been found that the performance and heat transfer rate of double tube heat exchanger with grooving is better than that of without grooving.

Keywords:
Nanofluids, Convective heat transfer, Laminar flow, Graphene.


References:

1.        France, J.L. Routbort, S.U.S. Choi, Review and comparison of nanofluid thermal conductivity and heat transfer enhancements, Heat Transfer Eng. 29 (5) (2008)432–460.
2.        S. Zeinali Heris, S.Gh. Etemad, M. Nasr Esfahany, Experimental investigation of oxide nanofluids laminar flow convective heat transfer, Int. Commun. Heat Mass Transfer 33 (4) (2006) 529–535.

3.        D. Wen, Y. Ding, Experimental investigation into convective heat transfer of nanofluids at the entrance region under laminar flow conditions, Int. J. Heat Mass Transfer 47 (24) (2004) 5181–5188.

4.        W. Daungthongsuk, S. Wongwises, A critical review of convective heat transfer of nanofluids, Renew. Sustain. Energy Rev. 11 (5) (2007) 797–817.

5.        S. Kakaç, A. Pramuanjaroenkij, Review of convective heat transfer enhancement with nanofluids, Int. J. Heat Mass Transfer 52 (13–14) (2009) 3187–3196.

6.        A.A. Balandin, S. Ghosh, W. Bao, I. Calizo, D. Teweldebrhan, F. Miao, C.N. Lau, Superior thermal conductivity of single-layer graphene, Nano Lett. 8 (3) (2008)902–907.

7.        B.C. Pak, Y.I. Cho, Hydrodynamic and heat transfer study of dispersed fluids with submicron metallic oxide particles, Exp. Heat Transfer 11 (1999) 151–170.

8.        Y.M. Xuan, Q. Li, Investigation on convective heat transfer and flow features of nanofluids, ASME J. Heat Transfer 125 (2003) 151–155.

9.        Y. Yang, Z.G. Zhong, E.A. Grulke, W.B. Anderson, G. Wu, Heat transfer properties of nanoparticle-in-fluid dispersion (nanofluids) in laminar flow, Int. J. Heat Mass Transfer 48 (2005) 1107–1116.

10.     D.S. Wen, Y.L. Ding, Experimental investigation into convective heat transfer of nanofluids at entrance area under laminar flow region, Int. J. Heat Mass Transfer 47 (24) (2004) 5181–5188.

82-85

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

R. Akila, M. Nandhini, S. N. Sivanandam

Paper Title:

Hetero Associative Memory Based Neural Network Classifier for Health Care Data Diagnosis

Abstract: Classification is one of the predictive data mining tasks used to discover a model from the past data to predict some response of interest. In this work, Hetero Associative Memory based Neural Network (HAMNN) classifier is employed for health care data diagnosis. Classifier performance is enhanced by using Lern matrix, a popular model for associative memory. HAMNN classifier is built efficiently to improve the classification accuracy. This classifier provides promising results when experiments were conducted using six health care datasets from UCI machine learning repository.

Keywords:
Neural network, Associative memory, Hetero associative memory, Lern matrix.


References:

1.        Bart kosko, “Bidirectional Associative Memories”, IEEE transactions on systems, man and cybernetics, Vol. 18, No. 1, 1988 49-60.
2.        Cornelio Yáñez Márquez and Itzamá López Yáñez, “A New Model of BAM: Alpha-Beta Bidirectional Associative Memories”, Journal of computers, Vol. 2, No. 4, June 2007.

3.        Mario Aldape-Péreza, Cornelio Yánez-Márqueza, Oscar Camacho-Nietoa,Amadeo J.Argüelles-Cruz ,“An Associative Memory approach to Medical Decision Support Systems”,Journal of Computer Methods and Programs In Biomedicine,Vol.106, Elsevier Ireland Ltd 2012, 287-307.

4.        Uriarte-Arcia AV,Lopez-Ya'nez,Yanez-Marquez C,“One-Hot Vector Hybrid Associative Classifier for Medical Data Classification”,Journal of  PLoSONE 9 (4): e95715, doi: 10.1371/journal.pone.009571- 2014.

5.        Furao Shen, QiubaoOuyang, WataruKasai , OsamuHasegawa ,“A  General Associative Memory Based on Self-Organizing Incremental Neural Network” , Journal of Neurocomputing,Vol.104,Elsevier 2013, 57-71.

6.        Gang Bao,ZhigangZeng, “Analysis and Design of Associative Memories Based on Recurrent Neural Network with Discontinuous Activation Functions”, Journal of Neurocomputing ,Vol .77, Elsevier 2012,101-107.

7.        Miguel F. Rocha ESIME, Instituto Politécnico Nacional, U.P. A.L. Mateos, G. A. Madero, México D.F. 07738, México, “Implementation of an Expert System to Diagnose Spinal Diseases”,Journal of Industrial and Intelligent Information,    Vol. 3, No. 1, March 2015.

8.        Zhe Yao, Vincent Gripony and Michael G. Rabbat,“A Massively Parallel Associative Memory Based on Sparse Neural Networks”, Journal of arXiv:1303.7032v2[cs.AI],21 Jul 2013.

 

86-89

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Reza Ghasemzade

Paper Title:

Solid Waste Management and Estimation of Methane Production by Land Gem Simulation Model, Case Study: Iran, Rasht

Abstract: Rapid population growth, rapid economic growth and rising living standards increasing municipal solid waste (MSW) production that causing its management to be a major worldwide challenge. There are different methods for disposal of wastes (waste disposal according to the current situation in various ways, such as the Landfill disposal, anaerobic purification methods, producing RDF (Refuse Derived Fuel), waste incineration and composting is done). Landfilling is the most common way of municipal solid waste (MSW) disposal in Iran. Because of the land available for burials and also the simplicity of this method of waste management, was expected for at least two decades later, is still one of the main methods of waste management in Iran. Methane production in landfill typically begin 6 to 12 month after the waste placement then raise to a maximum shortly after landfill closure and finally gradually decline over the period of 30-50 years. The aim of MBT, reduce the volume of waste to landfills and reduce the land needed to raise and lower the volume of leachate and leachate control is the fact that 70% of the waste is more, the volume of leachate as lack of proper control and also because of the high level of groundwater in the northern part of the country can bring great environmental hazard. We use LandGem for estimation of gas production in landfill nad our case study is Rasht in north of Iran. The amount of methane generation in first year is 9.514283 (Mg/year) and it is the peak of gas generation.

Keywords:
Solid waste Management, Landfill, LandGem, Rasht, Iran, Composting.


References:

1.        Imam, B. Mohammed, D.C. Wilson. C.R. Cheeseman, “Solid waste management in Abuja, Nigeria”, Waste Management, 28 (2) (2008), 468-472.
2.        Collivignarelli, S. Sorlini, M. Vaccari, “Solid wastes management in developing countries”, CD-ROM of ISWA 2004 Worl Congress, October 17-21, Rome, Italy.

3.        Gilan composting plant annual report, 2007.

4.        J. Falzon, “Landfill gas: an Australian perspective”, Sixth International Landfill Symposium, Sardinia, Italy, 2 pp 487-496 (1997).

5.        M. Berkun, E. Aras, S. Nemlioglu,. “Disposal of solid waste in Istanbul and along the Black Sea coast of Turkey”. Waste Management, 25 (2005), 847-855.

6.        M. Sharholy, K. Ahmad, G.  Mahmood, R.C. Trivedi, “Municipal solid waste management in Indian cities – A review”, Waste management 28 (2) (2008), 459-467.

7.        R.C. Couth, S. Trois, V. Jones, “Modeling of greenhouse gas emissions from municipal solid waste disposal in Africa”, International Journal of Greenhouse Gas Control. Vol. 5, Issue 6, pp 1443-1453 (2011).

8.        R. Chiriac, J. Carre, Y. Perrosin, L. Fine, J. M. Letoffe, “Characterisation of VOCs emitted by open cells receiving municipal solid waste”, Journal of Hazardous Material 149, pp 249-263 (2007).

9.        S.S. Chung, W.H.LO Carlos, “Local waste management constraints and waste administrators in China”, Waste Management 28 (2) (2008), 272-281.

10.     Technical report (2007), OWRCMR (Organization for waste recovery and composting of municipality of Rasht)

11.     US EPA, (2005) May. Landfill Gas Emissions Model (LandGem) version 3.02 user's guide. United States Environmental Protection Agency, EPA-600/R-05/047. http://www.epa.gov/ttncatcl/dirl/landgem-v302-guide.pdf

 

90-94

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Aleksandar Tsenov

Paper Title:

Approaches for Improvement of IT Systems Management

Abstract: TM Forum has developed the eTOM-ITIL Application Note [1] in order to give the IT society a direction to find an appropriate combination of different IT Management frameworks in order to improve the effectiveness of their management systems. In the past years the set of standards GB921 was developed. These standards cover a wide aria of applications that use a combined use of business and technical management frameworks. The aim of this work is to make a proposal for enhancement of the operability of the combined use of eTOM and ITIL for improvement of the services quality in the information systems. The paper presents three different ways for studying and evaluating of the relationships between these two frameworks.

Keywords:
eTOM, ITIL, Management Frameworks, combined use.


References:

1.        GB921L v4.0, “eTOM – ITIL Application note: Using eTOM for modelling ITIL processes”, TeleManagement Forum, March 2004
2.        The Official Introduction to the ITIL Service Lifecycle, 2007.

3.        Nabiollahi A., Considering Service Strategy in ITIL V3 as a Framework for IT Governance, The IT Service Management Forum, UK , 2007

4.        “ITIL Das Munich Institute for IT Service Management – m ITSM”, available on http://www.mitsm.de/

5.        “ITIL Forum 2008-Neupositionierung und Wertorientierung”, available on http://www.itil-kongress-iir.de/

6.        “ITIL process procedure templates”, available on http://www.metocube.com

7.        ITU-T – Series M3050x, Enhanced Telecom Operations Map (eTOM), 2004 – 2007

8.        TM Forum Business Benchmarking, Broadband Business Performance Study, Period: Q4 2007 through Q2 2008

9.        TM Forum – GB929 v.3.2, Applications Framework (TAM) – The BSS/OSS Systems Landscape, 2008

10.     ITIL V3 - Service Design - Management guide, Office of Government Commerce, first issue, 2008

11.     eTOM and ITIL: a powerful combination for end-to-end service management, White paper, Hewlett-Packard Development Company, may 2008

12.     L. Bozga, M. Mateescu, G.Suba, “Current challenges of IT service management”, Conference Proceedings of Managerial Challenges of the Contemporary Society;2013, Issue 5, pp. 44-49, January 2013

13.     Bashani S., A. Semma, N. Sellam, “Towards a New Approach For Combining The IT Frameworks”, IJCSI International Journal of Computer Science Issues, Volume 12, Issue 1, No 1, January 2015

14.     Georgiev T., Al. Tsenov, “Modeling ITIL-SLM Process Flows with eTOM Level 3 Process Elements”,  Proceedings of XLVI-th International Scientific Conference ICEST 2011, Nish, Serbia,  June 29 – July 01, vol. 1, pp.77-80, 2011

15.     Hristov H., Trifonov V., “Security of Telecommunication Networks: a dominant feature within current safety problems., International Journal on Information Technologies & Security N 2, pp.19-27, 2009

 

95-98

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html