International Journal of Innovative Technology and Exploring Engineering

ISSN : 2278 - 3075 Website: www.ijitee.org Volume-8 Issue-11S2, SEPTEMBER 2019 Published by: Blue Eyes Intelligence Engineering and Sciences Publication

xploring En E gi d ne an e r y in g g lo o

n

h

c

e T

IjItEe

e

I

n v

i

t t

e

E a

X r v

P N n

o

L O a

O I n

T t

R A i

o

I V n

N O I

G N n

IN f

a

o

l l

J a o r n u

www.ijitee.org Exploring Innovation Editor-In-Chief Chair Dr. Shiv Kumar Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), .

Associated Editor-In-Chief Chair Prof. MPS Chawla Member of IEEE, Professor-Incharge (head)-Library, Associate Professor in Electrical Engineering, G.S. Institute of Technology & Science Indore, Madhya Pradesh, India, Chairman, IEEE MP Sub-Section, India

Dr. Vinod Kumar Singh Associate Professor and Head, Department of Electrical Engineering, S.R.Group of Institutions, Jhansi (U.P.), India

Dr. Rachana Dubey Ph.D.(CSE), MTech(CSE), B.E(CSE) Professor & Head, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal (M.P.), India

Associated Editor-In-Chief Members Dr. Hai Shanker Hota Ph.D. (CSE), MCA, MSc (Mathematics) Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India

Dr. Gamal Abd El-Nasser Ahmed Mohamed Said Ph.D(CSE), MS(CSE), BSc(EE) Department of Computer and Information Technology , Port Training Institute, Arab Academy for Science ,Technology and Maritime Transport, Egypt

Dr. Mayank Singh PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu- Natal, Durban, South Africa.

Scientific Editors Prof. (Dr.) Hamid Saremi Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran

Dr. Moinuddin Sarker Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor) Stamford, USA.

Prof. (Dr.) Nishakant Ojha Principal Advisor (Information &Technology) His Excellency Ambassador Republic of Sudan& Head of Mission in New Delhi, India

Dr. Shanmugha Priya. Pon Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East Africa, Tanzania

Dr. Veronica Mc Gowan Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman, China.

Dr. Fadiya Samson Oluwaseun Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern Cyprus, Turkey.

Dr. Robert Brian Smith International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie Centre, North Ryde, New South Wales, Australia

Dr. Durgesh Mishra Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India

Special Issue Section Editor Mr. Siddth Kumar Founder and Managing Director, IFERP, Technoarete Groups, India

Mr. Rudra Bhanu Satpathy Founder and Managing Director, IFERP, Technoarete Groups, India

Dr. Mahdi Esmaeilzadeh Founder & Chairman, of Scientific Research Publishing House (SRPH), Mashhad, Iran

Executive Editor Chair Dr. Deepak Garg Professor & Head, Department Of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India

Executive Editor Members Dr. Vahid Nourani Professor, Faculty of Civil Engineering, University of Tabriz, Iran.

Dr. Saber Mohamed Abd-Allah Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.

Dr. Xiaoguang Yue Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.

Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology, Mansoura, Egypt.

Dr. Hugo A.F.A. Santos ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.

Dr. Sunandan Bhunia Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia (Bengal), India.

Dr. Awatif Mohammed Ali Elsiddieg Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan, Saudi Arabia.

Technical Program Committee Chair Dr. Mohd. Nazri Ismail Associate Professor, Department of System and Networking, University of Kuala (UniKL), , Malaysia.

Technical Program Committee Members Dr. Haw Su Cheng Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia (Cyberjaya), Malaysia.

Dr. Hasan. A. M Al Dabbas Chairperson, Vice Dean Faculty of Engineering, Department of Mechanical Engineering, Philadelphia University, Amman, Jordan.

Dr. Gabil Adilov Professor, Department of Mathematics, Akdeniz University, Konyaaltı/Antalya, Turkey.

Dr.Ch.V. Raghavendran Professor, Department of Computer Science & Engineering, Ideal College of Arts and Sciences Kakinada (Andhra Pradesh), India.

Dr. Thanhtrung Dang Associate Professor & Vice-Dean, Department of Vehicle and Energy Engineering, HCMC University of Technology and Education, Hochiminh, Vietnam.

Dr. Wilson Udo Udofia Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.

Manager Chair Mr. Jitendra Kumar Sen Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India

Editorial Chair Dr. Arun Murlidhar Ingle Director, Padmashree Dr. Vithalrao Vikhe Patil Foundation’s Institute of Business Management and Rural Development, Ahmednagar (Maharashtra) India.

Editorial Members Dr. Wameedh Riyadh Abdul-Adheem Academic Lecturer, Almamoon University College/Engineering of Electrical Power Techniques, Baghdad, Iraq

Dr. T. Sheela Associate Professor, Department of Electronics and Communication Engineering, Vinayaka Mission’s Kirupananda Variyar Engineering College, Periyaseeragapadi (), India

Dr. Manavalan Ilakkuvan Veteran in Engineering Industry & Academics, Influence & Educator, Tamil University, Thanjavur, India

Dr. Shivanna S. Associate Professor, Department of Civil Engineering, Sir M.Visvesvaraya Institute of Technology, Bengaluru (Karnataka), India

Dr. H. Ravi Kumar Associate Professor, Department of Civil Engineering, Sir M.Visvesvaraya Institute of Technology, Bengaluru (Karnataka), India

Dr. Pratik Gite Assistant Professor, Department of Computer Science and Engineering, Institute of Engineering and Science (IES-IPS), Indore (M.P), India

Dr. S. Murugan Professor, Department of Computer Science and Engineering, Alagappa University, Karaikudi (Tamil Nadu), India

Dr. S. Brilly Sangeetha Associate Professor & Principal, Department of Computer Science and Engineering, IES College of Engineering, Thrissur (Kerala), India

Dr. P. Malyadri Professor, ICSSR Senior Fellow Centre for Economic and Social Studies (CESS) Begumpet, Hyderabad (Telangana), India

Dr. K. Prabha Assistant Professor, Department of English, Kongu Arts and Science College, Coimbatore (Tamil Nadu), India

Dr. Liladhar R. Rewatkar Assistant Professor, Department of Computer Science, Prerna College of Commerce, Nagpur (Maharashtra), India

Dr. Raja Praveen.N Assistant Professor, Department of Computer Science and Engineering, Jain University, Bengaluru (Karnataka), India

Dr. Issa Atoum Assistant Professor, Chairman of Software Engineering, Faculty of Information Technology, The World Islamic Sciences & Education University, Amman- Jordan

Dr. Balachander K Assistant Professor, Department of Electrical and Electronics Engineering, Karpagam Academy of Higher Education, Pollachi (Coimbatore), India

Dr. Sudhan M.B Associate Professor & HOD, Department of Electronics and Communication Engineering, Vins Christian College of Engineering, Anna University, (Tamilnadu), India

Dr. T. Velumani Assistant Professor, Department of Computer Science, Kongu Arts and Science College, Erode (Tamilnadu), India

Dr. Subramanya.G.Bhagwath Professor and Coordinator, Department of Computer Science & Engineering, Anjuman Institute of Technology & Management Bhatkal (Karnataka), India

Dr. Mohan P. Thakre Assistant Professor, Department of Electrical Engineering, K. K. Wagh Institute of Engineering Education & Research Hirabai Haridas Vidyanagari, Amrutdham, Panchavati, Nashik (Maharashtra), India

Dr. Umar Lawal Aliyu Lecturer, Department of Management, Texila American University Guyana USA.

Dr. K. Kannan Professor & Head, Department of IT, Adhiparasakthi College of Engineering, Kalavai, Vellore, (Tamilnadu), India Volume-8 Issue- 11S2, September 2019, ISSN: 2278-3075 (Online) S. No Published By: Blue Eyes Intelligence Engineering & Sciences Publication Page No.

Authors: Pradeep Kumar, A.Shiva Prasad

Paper Title: Fetus Electrocardiogram by using Neuro-Fuzzy Systems and Remote Sensing through OFDM Abstract: The fetus electrocardiogram (FECG) can be obtained after 21 days of pregnancy. It will be also useful as non-invasive technique to check whether women are pregnant or not. So early diagnosis can be done for any cardiac defects. The FECG segment from mother stomach recording and reference thoracic maternal electrocardiogram (MECG) signal is acquired by counterfeit neural system fluffy surmising framework (ANFIS). The wavelet change is utilized for upgrade. The symmetrical recurrence division multiplexing (OFDM) is helpful for transmission in remote detecting.

Keyword: OFDM, Neural Network, MECG, FECG, Fuzzy logic, SNR, Wavelet transform & Membership function. References: 1. Giulia Da Poian ; Riccardo Bernardini ; Roberto Rinaldo, Separation and Analysis of Fetal-ECG Signals From Compressed Sensed Abdominal ECG Recordings, IEEE Transactions on Biomedical Engineering, Year: 2016, Volume: 63, Issue: 6, Pages: 1269 – 1279, IEEE Journals & Magazines. 2. Udit Satija ; Barathram Ramkumar ; M. Sabarimalai Manikandan, Automated ECG Noise Detection and Classification System 1. for Unsupervised Healthcare Monitoring, IEEE Journal of Biomedical and Health Informatics,Year: 2018, Volume: 22, Issue: 3,Pages: 722 – 732,IEEE Journals & Magazines. 3. Chunyu Tan ; Liming Zhang ; Hau-tieng Wu, A Novel Blaschke Unwinding Adaptive Fourier Decomposition based Signal 1-3 Compression Algorithm with Application on ECG Signals, IEEE Journal of Biomedical and Health Informatics,Year: 2018, ( Early Access ),Pages: 1 – 1,IEEE Early Access Articles. 4. Anoop, S.S.V.K.K. ; Prabhu, Ch.M. ; Penumala, S.K. Detection of QRS Complex of Fetal ECG Using Biologically Inspired Soft-Computing Tools, India Conference (INDICON), 2009 Annual IEEE 5. Hasan, M.A. ; Reaz, M.B.I. ; Ibrahimy, M.I. Fetal electrocardiogram extraction and R-peakdetection for fetal heart rate monitoring using artificial neural network and Correlation, Neural Networks (IJCNN), The 2011 International Joint Conference on Digital Object Identifier: 10.1109/IJCNN.2011.6033193 Publication Year: 2011 , Page(s): 15 – 20 6. Chengyu Liu ; Peng Li, Systematic methods for fetal electrocardiographic analysis: Determining the fetal heart rate, RR interval and QT interval Computing in Cardiology Conference (CinC), 2013 , Publication Year: 2013 , Page(s): 309 – 312 7. Christov, I. ; Simova, I. ; Abacherli, R. Cancellation of the maternal and extraction of the fetal ECG in noninvasive recordings, Computing in Cardiology Conference (CinC), 2013 Publication Year: 2013 , Page(s): 153 – 156. 8. Xu-Wilson, M. ; Carlson, E. ; Limei Cheng ; Vairavan, S. Spatial filtering and adaptive rule based fetal heart rate extraction from abdominal fetal ECG recordings Computing in Cardiology Conference (CinC), 2013, Publication Year: 2013 , Page(s): 197 – 200 9. Guojun Li ; Xiaoping Zeng ; Xiaona Zhou ; Qilie Liu , Robust adaptive fetal heart rate estimation for single-channel abdominal ECG recording, Biomedical Engineering and Informatics (BMEI), 2012 5th International Conference on Digital Object Identifier, Publication Year: 2012 , Page(s): 587 – 591 10. Llamedo, M. ; Martin-Yebra, A. ; Laguna, P. ; Martinez, J.P., Noninvasive fetal ECG estimation based on linear transformations Computing in Cardiology Conference (CinC), 2013 ,Publication Year: 2013 , Page(s): 285 – 288. 2. Authors: Prasad Janga

Paper Title: Research and Design of Rectangular Slot Microstrip Patch Antenna with Stripline Feeding

Abstract: As of late the improvement in correspondence framework requires the advancement of ease, 4-6 negligible weight, low profile radio wires that are equipped for keeping up elite over a wide range of recurrence that is the reason mechanical pattern has concentrated on structure of microstrip fix receiving wire .The point of this paper is to plan a rectangular microstrip fix reception apparatus for remote applications and concentrate the impact of different reception apparatus parameters, for example, execution of radio wire as far as increase, radiation design, return misfortune and VSWR and so on. The proposed antenna operates at 2.6734GHz, 1.1809GHz, 2.9899GHz and 5.8392GHz suitable for radio, GSM, Auto-toll roads and container tracking. The radiation pattern obtained is omnidirectional that is it will radiate and receive energy equally well in all directions. Return loss is less at that point - 10dB which means in any event 90% info power is conveyed to gadget and reflected power is under 10%..

Keyword: VSWR,2.6734GHz, 1.1809GHz, 2.9899GHz and 5.8392GHz,GSM References: 1. Gagandeep Kaur ; R.Madhusudhan Goud ; “ Slotted Rectangular Microstrip Antenna for Dual Band Operation ” ; Volume 66– No.17, March 2013 2. Nuraddeen Ado Muhammad ; Yusuf Idris ; “ Design and Analysis of Rectangular Microstrip Patch Antenna for Global WLAN Applications Using Matlab and CST Microstudio Software ”, Volume 6 Issue No. 4, April 2016 3. https://www.tutorialspoint.com/wireless_communication/wireless_communication_overview.htm 4. https://en.wikipedia.org/wiki/Wireless 5. T.Srisuji; C.Nandagopal; “Analysis on microstrip patch antennas for wireless communication”; Feb 2015 6. ZainUl Abedin ; Zahid Ullah ; “ Design of a Microstrip Patch Antenna with High Bandwidth and High Gain for UWB and Different Wireless Applications “ ; Vol. 8, No. 10, 2017 7. Balanis C.A. (2005) Antenna Theory: Analysis and Design, John Wiley & Sons. 8. BiplabBag ; “ Microstrip Slot Antenna for Triple Band Application in Wireless Communication ”; Vol:8, No:6, 2014 9. HattanF.AbuTarboush, D.Budimir, R.NilavalanandH.S.Al-Raweshidy, “Connected U-Slots Patch Antenna for WiMAX applications”, International Journal of RF & Microwave CAE, 04/2010; 20(3):279285, DOI:10.1002/mmce.20431. 10. Amit A. Deshmukh and K. P. Ray, “Multiband Rectangular Microstrip Antennas”, IETE Journal of Research, Vol 57 | Issue 5 | sep-oct 2011. 11. Tahsin Ferdous Ara nayna,AKMBaki,”compparitive study of rectangular & circular microstrip patch antenna in Xband; 9 october 2014 12. Nidhi, Ajay Kumar Jaiswal, Jagtar Singh, “Review paper for multiband and ultra-wide band microstrip patch antenna”,Vol.3, issue 5, May 2017. 13. https://en.m.wikipedia.org/wiki/Radiation_pattern 14. VasujadeviMidasala, Dr.P.Siddiah,” Microstrip patch antenna array design to improve better gains”. 15. S. Kannadhasan ; A.C. Shagar ; “Design and analysis of U-Shaped micro strip patch antenna”, 11 July 2017 16. https://www.researchgate.net/post/what_are_the_exact_materials_used_in_designing_a_microstrip_patch_antenna 17. Shreya PrabjyotSingh ; Ashish Singh ; Deepak Upadhyay ; Sunilkumar Pal ; Mahesh Munde ; “ Design and Fabrication of Microstrip Patch Antenna at 2.4 Ghz for WLAN Applications using HFSS” 18. https://www.researchgate.net/post/can_anybody_tell_me_why_radiation_box_in_hfss_a_quater_lambda_consider 3. Authors: Kumaraswamy Gajula, Prasad Janga

Paper Title: NS2 Based Simulation Tool for Performance Evaluation of TCP Traffic in Different Networks

Abstract: Execution appraisal of TCP website traffic in OBS frameworks has been underneath heightened 7-14 examine, due to the fact TCP builds up the majority of net visitors. As a dependable and transparently open take a look at framework, ns2 has been generally used for considering TCP/IP frameworks; anyways ns2 dreams an extensive parcel of the elements for imitating optical burst buying and selling frameworks. in this paper, a ns2 primarily based OBS reenactment gadget (nOBS), that is labored for reading burst assembling, reserving and strife targets counts in OBS frameworks is proven. The middle factor and association inquiries in OBS are connected in nOBS for making optical facilities and optical institutions. The passage, attention and flight middle factor functionalities are joined into a run of the mill optical center factor constructing, which incorporates masters chargeable for burstification, controlling and arranging. The results of burstification parameters, e.G., burstification break, burst size and number of burstification backings enhance center thing, on TCP execution are investigated the usage of nOBS for one among a type TCP interpretations and unmistakable framework topologies. The path of motion of libraries we long-established for this object is called Multi InteRfAce move Layer Extension for ns2 (MIRACLE). They replace the functionalities supplied with the aid of the network Simulator ns2 by using way of giving a beneficial and embedded engine for coping with skip-layer messages and, on the equal time, enabling the combination of various modules inside every layer of the display stack. as an instance, various framework, association, MAC or physical layers may be resolved and used inside a comparative center. the consequences of this are puzzling. As an trouble of first importance, the structure empowers the execution and the reenactment of present day-day correspondence structures in ns2. moreover, due to its planned great, the code is probably reduced, re-usable and extensible.

Keyword: MIRACLE-Multi InteRfAce cross Layer Extension, GLL-commonplace hyperlink Layer, MRRM-Multi Radio aid control. References: 1. E. A. Basha, S. Ravela, andD. Rus, "model-essentially based absolutely checking forearly cautioning flood location," in protests of the sixth ACMConference on Embedded Networked Sensor structures (SenSys'08), pp. 295–308, New York, huge apple, u.S., November 2008. 2. A. Ellaboudy, alright. Pister, and EECS branch UC Berkeley, "Outlet quality following the utilization of remote sensor systems," Tech. Rep. UCB/EECS-2012-152, electric fueled Engineering and pc Sciences branch, Fremont, Calif, joined states,2012,http://www.Eecs.Berkeley.Edu/Pubs/TechRpts/2012/EECS-2012-152.Html. 3. G. Zhao, "wi-fi sensor systems for business device following and control: an overview," network Protocols and Algorithms, vol. three, no. 1, pp. forty seven–sixty three, 2011. 4. M. Paavola, "remote age in way computerization an assessment and a product program application model," report A 33, oversee Engineering Laboratory, college of Oulu, Oulu, Finland, 2007. 5. alright. Maraiya, alright. Kant, and N. Gupta, "programming principally based absolutely truly have a see on remote Sensor arrange," overall magazine of pc programs, vol. 21, no. eight, pp. 9–15, 2011. 6. M. Erol-Kantarci and H. T. Mouftah, "remote interactive media sensor and entertainer systems for the accompanying innovation vitality grid,"advert Hoc Networks, vol. 9, no. four, pp. 542–551, 2011. 7. B. Lu andV. C.Gungor, "on the web and distant engine vitality checking and deficiency diagnostics utilizing remote sensor systems," IEEE Transactions on business Electronics, vol. 56, no. eleven, pp.4651–4659, 2009. 8. V. C. Gungor and F. C. Lambert, "A study on discussion systems for electric fueled machine robotization," pc Networks, vol. 50, no. 7, pp. 877–897, 2006. 9. J. Buckley, k. Aherne, B. O'Flynn, J. Barton, A. Murphy, and C. O'Mathuna, "Recieving wire fundamental by and large in general execution estimations the utilization of wi-fi sensor systems," in protests of the IEEE 56th advanced parts and age show, pp. 1652–1657, San Diego, Calif, america of america, may also 2006. 10. S.- H. Yang, "Principlas of wi-fi sensor systems," in wi-fi Sensor Networks benchmarks, structure and projects, markers and discussion innovation, pp. 7–47, Springer, London, joined kingdom, 2014. 11. J.N. Al-Karaki and A. E.Kamal, "Steering procedures in remote sensor organizes: a review," IEEE remote Communications, vol. eleven, no. 6, pp. 6–27, 2004. 12. adequate. Kaur and B. Singh, "wi-fi sensor system based absolutely: design necessities and estimating conventional by and large execution of IDS," worldwide magazine of pc applications, vol. 1, no. 28, pp. 90 4–ninety nine, 2010. 13. I. F. Akyildiz,W. Su,Y. Sankarasubramaniam, and E.Cayirci, "An overview on sensor systems," IEEE Communications magazine, vol. forty, no. eight, pp. 102–one 0 five, 2002. 14. M. Chu, H. Haussecker, and F. Zhao, "Adaptable data pushed sensor questioning and steering for advert hoc heterogeneous sensor systems," worldwide magazine of unbalanced generally execution Computing programs, vol. sixteen, no. three, pp. 293– 313, 2002. 15. S. alright. Singh, M. Singh, and D. sufficient. Singh, "Steering conventions in remote sensor organizes—a review," worldwide magazine of pc innovation and Engineering Survey, vol. 1, no. 2, pp. 63–eighty 3, 2010. 16. G. Kalpana and T. Bhuvaneswari, "An overview on power green steering conventions for remote sensor systems," overall magazine of workstation bundles, vol. 86, no. 12, pp. 12–18, 2011. 17. Q. Cao, T. Abdelzaher, T. He, and R. , "Bunch based totally really sending for solid anticipate to-stop transport in wi-fi sensor systems," in procedures of the twenty 6th IEEE overall show on workstation Communications (IEEE INFOCOM '07), pp.1928–1936, Anchorage, Alaska, the usa, may likewise 2007. 18. R. Singh and G. Mittal, "Lifetime upgrade of group head determination for MIMO directing calculation essentially dependent on weighted whole approach for WSN," worldwide magazine of Engineering studies and bundles, vol. 3, no. five, pp. 1894–1898, 2013. 19. S. Manda, N. Archana, and N. Umarani, "Amplifying the presence of remote sensor organizes the use of CRT based absolutely parcel parting calculation," worldwide magazine of headways in research and innovation, vol. 2, no. four, pp. 48–fifty 8, 2013. 20. A. E. A. A. Abdulla, H. Nishiyama, and N. Kato, "Expanding the life of wi-fi sensor organizes: a half and half directing arrangement of strategies," PC Communications magazine, vol. 35, no. 9, pp.1056–1063, 2012. 21. J. Bahi, M. Haddad, M. Hakem, and H. Kheddouci, "unpracticed designated lifetime enhancement set of standards for sensor systems," impromptu Networks, vol. sixteen, pp. 1–12, 2014. 22. D. Ebrahimi and C. Assi, "Compressive measurements assembling the utilization of arbitrary projection for vitality green wi-fi sensor systems," advert Hoc Networks, vol. 16, no. 1, pp. a hundred and five–119, Feb 2014. 23. J.- Y. Chang and P.- H. Ju, "A quality sparing directing structure with a uniform grouping calculation for wi-fi outline sensor systems," predetermination age workstation structures, vol. 35, pp.128–140, 2014. 24. R. S. Bhadoria and D. G. Chandra, "Steering convention in wi-fi Sensor Networks," in procedures of the second IEEE meeting on Parallel dispensed and Grid Computing, vol. 35, no. 1, pp.128–a hundred and forty, February 2012. 25. N. Gautam, W.- I. Lee, and J.- Y. Pyun, "track-territory grouping for quality green steering in wi-fi sensor systems," in court occasions of the IEEE ninth overall show on workstation and data time (CIT '09), pp. 116–121, IEEE, Xiamen, China, October 2009. 26. M. T. Nguyen, "Limiting quality utilization in irregular walk directing for wi-fi sensor systems utilizing compacted detecting," in court docket examples of the eighth worldwide show on device of structures Engineering (SoSE '13), pp. 297–301, IEEE, Maui, Hawaii, america of the US, June 2013. 27. B. Nazir and H. Hasbullah, "vitality proficient and QoS mindful steering convention for Clustered wi-fi Sensor people group," pc sand electric Engineering, vol. 39, no. eight, pp. 2425–2441, 2013. 28. B. Nazir and H. Hasbullah, "cell Sink based absolutely Routing Protocol (MSRP) for drawing out system lifetime in bunched remote sensor arrange," in grumblings of the worldwide show on pc applications and business Electronics (ICCAIE '10), pp. 624– 629, Kuala Lumpur, Malaysia, December2010. 29. W. M. Aioffi, G. R. Mateus, and F. P. Quintao, "Improvement issues and calculations for wi-fi sensor systems with cell sink," in claims of the worldwide system Optimization gathering Spa, pp. 1–6, Spa, Belgium, April 2007. 30. A. Waheed Khan, A. H. Abdullah, M. H. Anisi, and J. Iqbal Bangash, "A total see of insights accumulation plans utilizing cell soaks in wi-fi sensor systems," Sensors, vol. 14, no. 2, pp. 2510–2548, 2014. 31. M. Di Francesco and S. satisfactory. Das, "realities arrangement in wi-fi sensor systems with portable components: a study," ACM Transactions on Sensor Networks (TOSN), vol. eight, no. 1, article 7, 2011. 32. M. T. Nguyen and N. Rahnavard, "Group based absolutely completely power green realities arrangement in remote sensor systems utilizing compressive detecting," in protests of the IEEE naval force Communications meeting (MILCOM 'thirteen), pp. 1708–1713, November 2013. 33. H. Lee and alright. Lee, "control minimization for level directing and various leveled steering for remote sensor systems," in court instances of the second overall show on Sensor period and projects (SENSORCOMM '08), pp. 735–742, Cap Esterel, France, August 2008. 34. B. He and H. Zhang, "A quality improvement strategy for wi-fi sensor organize," in claims of the programmed worldwide meeting on oversee and engineered Intelligence (ACAI '12), pp. 402–406, IEEE, Xiamen, China, March 2012. 35. V. Rodoplu and T. H.Meng, "least power cell wi-fi systems," IEEE diary on chose territories in Communications, vol. 17, no. 8, pp. 1333–1344, 1999. 36. W.- Y. Zhang, Z.- Z. Liang, Z.- G. Hou, and M. Tan, "A vitality green steering convention for wi-fi sensor organize," in court instances of the IEEE global gathering on Networking, Sensing and oversee (ICNSC '07), pp. 20–25, IEEE, London, joined kingdom, April 2007. 37. T. Liu and F. Li, "vitality unpracticed grouping steering convention put together absolutely for the most part with respect to programs in wi-fi sensor network," in protests of the fifth worldwide show on remote Communications, Networking and versatile Computing (WiCOM '09), pp.1–6, Beijing, China, September 2009. 38. W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan,"electricity-green report convention for wi-fi miniaturized scale sensor systems," in claims of the thirty third Annual Hawaii overall show on contraption Sciences (HICSS '00), vol. eight, p. 8020, Maui, Hawaii, US of america of the US, January 2000. 39. A. Manjeshwar and D. P. Agrawal, "youngster: a convention for additonal fitting execution in remote sensor systems," in court instances of the fifteenth worldwide Parallel and allotted Processing Symposium, pp. 305–312, IEEE, San Francisco, Calif, usa, April 2000. 40. A.Manjeshwar and D. P. Agrawal, "APTEEN: a half and half convention for effective steering and complete information recovery in remote sensor systems," in claims of the second one worldwide Workshop on Parallel and dispensed Computing issues in wi-fi Networks and cell Computing, pp. 215–221, feet. Lauderdale, Fla, u.s., April 2002. 41. S. Lindsey and C. S. Raghavendra, "PEGASIS: quality green accumulating in sensor insights frameworks," in court docket instances of the Aerospace show, pp. 1125–1130, IEEE, March 2002. 42. L. Li and J. Y. Halpern, "least power portable remote systems returned to," in objections of the IEEE overall meeting on Communications (ICC '01), pp. 93–a hundred, Helsinki, Finland, June 2001. 43. L. Subramanian and R. H. Katz, "A structure for structure self-configurable structures," in court examples of the first Annual Workshop on versatile and specially appointed Networking and Computing(MobiHOC '00), pp. 63–seventy three, Boston, Mass, US of america, August 2000. 44. Q. Li, J. Aslam, and D. Rus, "Progressive power mindful steering in sensor systems," in court instances of the DIMACS Workshop on Pervasive Networking, pp. 47–fifty ,may furthermore 2001. 45. J. N. Al-Karaki, R. Ul-Mustafa, and A. E. Kamal, "records accumulation in wi-fi sensor systems—genuine and rough calculations," in court instances of the Workshop on exorbitant normal by and large execution Switching and Routing (HPSR '04), pp. 241–245, Phoenix, Ariz, US, April 2004. 46. Q. Tooth, F. Zhao, and L. Guibas, "light-weight detecting and correspondence conventions for goal count and conglomeration," in procedures of the fourth ACM overall Symposium on cell impromptu Networking and Computing (MOBIHOC '03),pp. 160 5– 176, Annapolis, Md,americaA., June 2003. 47. F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, "A - level records dispersal model for gigantic scale remote sensor systems," in court instances of the eighth Annual worldwide gathering on cell Computing and Networking (MOBICOM '02), pp. 148–159, ACM/IEEE Press, Atlanta, Ga, u.s.a. of the US, September 2002. 48. N. Zaman, L. T. Jung, and V. Ponnusamy, "utility of selfhealing in remote sensor network: a study," in Biologically-enlivened power Harvesting by means of remote Sensor age, pp. 217–218, IGI worldwide, 2016. 49. N. Zaman, T. J. Low, and T. Alghamdi, "upgrading directing force basic by and large execution of wi-fi sensor systems," in court instances of the seventeenth IEEE overall meeting on cutting edge Communications innovation (ICACT '15), vol. four, no 2, pp. 587–595, GiRI (worldwide IT research Institute), Seoul, Republic of Korea, July 2015. 50. Nurhayati, S. H. Choi, and alright. O. Lee, "A bunch situated as a general rule quality productive district steering convention in remote sensor organize," overall magazine of PC frameworks and Communications, vol. five, no. 2, pp. 67–seventy four, 2011. 51. N. Zaman and A.Abdullah, "control unpracticed directing in remote sensor organize: considers issues and irritating circumstances," in grumblings of the IEEE worldwide show on Intelligence and information period (ICIIT '10), pp. 239–243, 2010. 52. N. Zaman, L. Tang Jung, F. Alsaade, and T. Alghamdi, "remote Sensor arrange (WSN): steering assurance, dependability and power execution," magazine of actualized Sciences, vol. 12,no. 6, pp. 593–597,2012. 53. A.Noor Zaman and A.Abdullah, "wonderful systems inside the way of improving wi-fi Sensor organize (WSN) directing quality essential execution and extraordinary of supplier (QoS)," global did innovative ability magazine (WASJ), vol. 13, no. 4, pp. 798– 805, 2011. 54. N. Zaman, A. B. Abdullah, and L. T. Jung, "Advancement of intensity use in remote Sensor organize the utilization of highlight Responsive Routing Protocol (PRRP)," in court cases of the IEEE Symposium on pc structures and Informatics (ISCI '11), pp. 51–fifty 5,Kuala Lumpur, Malaysia, March 2011. 55. N. Zaman and A. B. Abdullah, “role Responsive Routing Protocol (PRRP),” in proceedings of the thirteenth international convention on advanced conversation generation: smart carrier Innovation via cellular Interactivity (ICACT ’11), pp. 644–648, Seoul, Republic of Korea, February 2011. 56. N. Zaman, “electricity Optimization through feature Responsive Routing Protocol (PRRP) in wireless sensor community,” global magazine of statistics and Electronics Engineering, vol. 2,no. 5, pp. 748–751, 2012. 57. N. Zaman, T. J. Low, and T. Alghamdi, "control green outingprotocol for remote sensor arrange," in procedures of the 16thInternational meeting on unrivaled verbal trade age (ICACT '14), pp. 808–814, IEEE, Pyeong chang, South Korea, February 2014. 58. Y. Xu, J. Heidemann, and D. Estrin, "Geology educated power preservation for specially appointed directing," in court instances of the seventh Annual worldwide gathering on portable Computing and Networking (MobiCom '01), pp. 215–222, Rome, Italy, July 2001. 59. Y. Yu, D. Estrin, and R. Govindan, "Geological and quality cognizant directing: a recursive information spread convention for remote sensor systems," Tech. Rep. UCLA/CSD-TR-01-0023, UCLA PC innovative expertise division, l. a., Calif, u.S., 2001. 60. B. Chen, alright. Jamieson, H. Balakrishnan, and R. Morris, "Span:an quality unpracticed coordination set of rules for topology remodel in specially appointed remote systems," in court occurrences of the seventh ACM overall show on cell Computing and Networking, pp. 315–322, July 2001. 61. I. Stojmenovic and X. Lin, "GEDIR: circle free area principally based really steering in wi-fi systems," in objections of the worldwide show on Parallel and administered Computing and structures, pp. 109–one hundred fifteen, Boston, Mass, americaA., November 1999. 62. F. Kuhn, R.Wattenhofer, and A. Zollinger, "Most pessimistic scenario greatest satisfying and not bizarre case proficient geometric specially appointed directing," in court docket occasions of the fourth ACM global Symposium on cell advert Hoc Networking and Computing (MOBIHOC '03), pp. 267–278, Annapolis, Md, usa, June 2003. 63. J. Kulik, W. Heinzelman, and H. Balakrishnan, "Arrangement based conventions for dispersing information in wi-fi sensor systems," remote Networks, vol. eight, no. 2,pp. 169–185, 2002. 64. C. Intanagonwiwat, R. Govindan, and D. Estrin, "Coordinated dissemination: a versatile and solid discussion worldview for sensor systems," in court cases of the sixth Annual ACM/IEEE universal show on cell Computing and Networking(MobiCom '00), pp. ninety three–ninety nine, Boston, Mass, the usa, August 2000. 65. C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, andF. Silva, "Coordinated dissemination for remote sensor organizing," IEEE/ACM Transactions on Networking, vol. eleven, no. 1, pp. 2–sixteen,2003. 66. D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, "resulting century challenges: adaptable coordination in sensor systems," in planning of the fifth Annual ACM/IEEE overall show on versatile Computing and Networking (MobiCom '99), pp. 263–270, Seattle, Wash, the US, August 1999. 67. D. Braginsky and D. Estrin, "Talk directing arrangement of principles for sensor systems," in court instances of the first ACM overall Workshop on remote Sensor Networks and applications (ACM WSNA '02), pp. 22–31,Atlanta,Ga, the usa, October 2002. 68. Schurgers and M. B. Srivastava, "quality green steering in wi-fi sensor systems," in court instances of the Communications for network Centric Operations: developing the data strain (MILCOM '01), pp. one hundred fifty five–161, McLean, Va, u.S., 2001 69. S. M. Hedetniemi, S. T. Hedetniemi, and A. L. Liestman,"A overview of tattling and broadcasting in verbal trade systems," Networks, vol. 18, no. 4, pp. 319–349, 1988. 70. F. Ye, A. Chen, S. Lu, and L. Zhang, "An adaptable method to insignificant charge sending in immense sensor systems," in procedures of the tenth overall show on pc Communications and Networks (ICCCN '01), pp. 304–309,Scottsdale, Ariz, the US, October 2001. 71. Y. Yao and J.Gehrke, "Thecougar way to deal with in-network question preparing in sensor systems," SIGMOD record, vol. 31, no. three, pp. nine–18, 2002. 72. M. Chu, H. Haussecker, and F. Zhao, "Adaptable actualities pushed sensor questioning and directing for advert hoc heterogeneous sensor arranges," the worldwide diary ofHigh typical by and large execution Computing applications, vol. 16, no. three, pp. 293– 313, 2002. 73. N. Sadagopan, B. Krishnamachari, and A. Helmy, "The assemble component for unpracticed questioning in sensor systems," in objections of the main worldwide Workshop on Sensor organize Protocol and readiness (SNPA '03), pp. 149–155, Anchorage, Alaska, u.S., may 2003. 74. R. C. Shah and J. M. Rabaey, "vitality mindful steering for low quality impromptu sensor systems," in procedures of the wi-fi Communications and Networking meeting (WCNC '02), pp.350–355, IEEE, March 2002. 75. A. Savvides, C.- C. Han, and M. B. Strivastava, "Dynamic palatable grained limitation in advert-hoc systems of sensors," in court docket instances of the seventh Annual ACM/IEEE overall show on cell Computing and Networking (MobiCom '01), pp. 166– 179,Rome, Italy, July 2001. 76. D. Niculescu and B. Nath, "DV fundamentally based totally situating in impromptu systems," Telecommunication structures, vol. 22, no. 1–4, pp. 267–280, 2003. 77. N. Bulusu, J.Heidemann, andD. Estrin, "GPS-substantially less low-rate outside restriction for incredibly little gadgets," IEEE Communications mag, vol. 7, no. five, pp. 28–34, 2000. 78. S. Mishra and A. Nasipuri, "A versatile low power reservation essentially based MAC convention for wi-fi sensor systems," in claims of the twenty 1/3 IEEE global generally speaking execution, Computing, and Communications meeting, show claims (IPCCC'04), pp. 731–736, April 2004. 79. N. Bulusu, D. Estrin, L. Girod, and J. Heidemann, "Adaptable coordination for wi-fi sensor systems: self-designing restriction instrument," in court docket instances of the sixth universal Symposium on report standard and application (ISCTA'01), pp. seventy five–80 ,Ambleside, uk, July 2001. 80. E. Amiri, H. Keshavarz, M. Alizadeh, M. Zamani, and T. Khodadadi, "quality unpracticed directing in remote sensor systems dependent on fluffy subterranean insect settlement advancement," overall mag of administered Sensor Networks, vol. 2014, Article character 768936, 17 pages, 2014. 81. W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "A product program-specific convention shape for remote microsensor systems," IEEE Transactions on wi-fi Communications, vol. 1, no. 4, pp. 660–670, 2002. 82. A. Boukerche, X. Cheng, and J. Linus, "A customary essential exhibition assessment of a novel power mindful records-driven directing arrangement of rules in wi-fi sensor systems," wi-fi Networks, vol. 11, no. five, pp.619–635, 2005. 4. Authors: M. Venkata Ramanaiah, Sudhakar Alluri, B.Rajendra Naik, N.S.S.Reddy Paper Title: Transistor sizing of CMOS VLSI Circuits in Deep Submicron Technology

Abstract: In Very-huge scale reconciliation (VLSI) application zone, postponement and power are the 15-29 significant variables for any advanced circuits. Its observed that the as CMOS Inverter Transistor Size decreases from 1µm to 120nm, power reduced from 3.331 to 2.644 (µW) and delay reduced from 5.026 to 22.66 (pS). It is observed that the table 4 as 28T Full Adder Circuit Voltage Scale decreases from 5 V to 1 V, Total power reduced from 63150 to 2262 (nW) and delay reduced from 39.93 to 38.52 (nS) in 180nm technology. It is observed that the table 6 as 28T Full Adder Circuit Voltage Scale decreases from 2 V to 0.8 V, Total power reduced from 21.39 to 2.916 (µW) and delay reduced from 4.939 to 4.74 (nS) in 90nm technology. It is observed that the table 8 as 28T Full Adder Circuit Voltage Scale decreases from 1.5 V to 0.7 V, Total power reduced from 8.98 to 1.713 (µW) and delay reduced from 4.963 to 4.581 (nS) in 45nm technology.

Keyword: CMOS Inverter, 28T Full viper, low power, low territory, delay, VLSI. References: 1. Ashish Yadav, Bhawna P. Shrivastava and Ajay Kumar Dadoria,"Low electricity excessive pace 1-piece full Adder Circuit design in DSM generation", IEEE, global conference on facts, correspondence, Instrumentation and manipulate(ICICIC), 2017. 2. Ahmed M. Shams,Tarek ok. Darwish and Magdy A. Bayoumi,"overall performance evaluation of Low-power 1-Bit CMOS complete Adder Cells", IEEE Transactions On Very big Scale Integration (Vlsi) systems, Vol. 10, No. 1, February 2002. 3. Manoj Kumar, "unmarried piece complete snake configuration utilising eight transistors with novel 3 transistors XNOR door", international magazine of VLSI plan and verbal exchange structures (VLSICS) Vol.2, No.four, December 2011., DOI : 10.5121/vlsic.2011.2405 4. N.Prathima, okay.Harikishore, "shape of a low energy and high execution advanced multiplier utilizing a completely unique 8T snake", international journal of Engineering research and programs, (IJERA) ISSN: 2248-9622 www.Ijera.Com Vol. 5. Vaibhav Gupta, Debabrata Mohapatra, Anand Raghunathan., and Kaushik Roy, Fellow, IEEE., Low-strength virtual sign Processing using Approximate Adders., 0278-0070/$31.00 c_ 2012 IEEE. three, problem 1, January - February 2013, pp.1832- 1837. 6. Michael Keating, David Flynn., Robert Aitkin Alan G , ibbons, Kaijian Shi., "Low power technique manual For gadget-on-Chip layout., Library of Congress control quantity: 2007928355 .,ISBN 978-0-387-71818-7 e-ISBN 978-0-387-71819-4., springer.Com. 7. Ronn B. Brashear, Noel Menezes, Chanhee Oh, Lawrence T.Pillage, and M. Beam Mercer., Predicting Circuit overall performance the usage of Circuit-stage Statistical Timing evaluation., branch of electrical and pc Engineering The university of Texas at Austin, Texas 78712., 1066-1409194 $three.00 zero 1994 IEEE. 8. Yaseer A. Durrani a, Teresa Riesgo b., power estimation technique for DSP models digital sign Processing 19 (2009) 213–219., Contents statistics available at science Direct., www.Elsevier.Com/discover/dsp, 1051-2004/$ – see front problem © 2008 Elsevier Inc. All rights held. Doi:10.1016/j.Dsp.2008.09.zero.five.17 9. A. M. hints and M. Bayoumi, "A story superior CMOS1-bit complete viper mobile," IEEE Transaction on Circuits structures II, Analog virtual sign procedure, vol. forty seven, no. 5, pp. 478–481, may additionally 2000. 10. Ahmed M. hints and Magdy An, "An prepared approach for structuring low strength adders," conference file of the Thirty-First Asilomar conference on indicators, systems and computers, vol. 1, pp.757-761, Nov. 1997. 11. R. Zimmermann, and W. Fichtner, "Low-control cause styles: CMOS instead of pass-transistor cause," IEEE J. robust kingdom Circuits, vol. 32, no. 7, pp. 1079-1090, Jul. 1997. 12. N. Weste and okay. Eshraghian, principles of CMOS VLSI design, A gadget angle, Addison-Wesley, 1993. 13. N. Zhuang and H. Wu, "any other shape of the CMOS complete viper," IEEE J. strong kingdom Circuits, vol. 27, no. five, pp. 840–844, might also 1992. 14. Yingtao Jiang Al-Sheraidah, A. Yuke Wang Sha, E. also, Jin-Gyun Chung, "A story multiplexer primarily based completely low- manipulate full viper," IEEE Transactions on Circuits and systems: express Briefs, vol. fifty one, no. 7, pp.345-348, Jul. 2004. 15. M. Aguirre-Hernandez and M. Linares-Aranda, "CMOS full-adders for power powerful huge variety juggling packages," IEEE Transaction Very large Scale Integration (VLSI) Syst., vol. 19, no. four, pp. 718–721, Apr. 2011. 16. M. Alioto, G. Di Cataldo, G. Palumbo, "blended complete viper topologies for superior low-manage math circuits," Microelectronics magazine, vol. 38, no. 1, pp. 130–139, Jan. 2007. 17. R. Zimmermann, W. Fichtner, "Low-manage motive patterns: CMOS as opposed to pass-transistor reason," IEEE journal of robust nation Circuits, vol. 32, no. 7, pp. 1079–1090, Jul. 1997. 18. Hung Tien Bui, Yuke Wang, and Yingtao Jiang, "structure and evaluation of Low-strength 10-Transistor full Adders the usage of Novel XOR–XNOR Gates," IEEE Transactions on Circuits and systems-II: Analog and virtual sign Processing, vol. forty 9, #1, Jan. 2002. 19. N. Zhuan, H. Wu, "some different plan of the CMOS entire snake," IEEE magazine strong-nation Circuits, vol. 27, no. five, pp. 840–844, may additionally 1992. 20. C.- ok. Tung, Y.- C. Hung, S.- H. Shieh, and G.- S. Huang," A low-manipulate fast 1/2 of breed CMOS whole snake for installation framework," IEEE convention design and Diagnostics of electronic Circuits and structures., vol. 13. Pp. 1-4, Apr. 2007. 21. Anandi, R. Rangarajan, M. Ramesh, "power green viper mobile For Low power Bio scientific gadgets," IOSR Diary of VLSI and sign Processing (IOSR-JVSP) Vol. four, trouble 2, Ver. III, pp 39-forty five Mar-Apr. 2014. 22. Mohanraj S, Maheswari M, "energy SERF and changed SERF Adders for extremely Low power design techniques," worldwide conference on conversation technology and gadget design,2011. 23. Deepa, Sampath Kumar V, "examination of Low power 1-piece Adder Cells using diverse XOR-XNOR doorways," IEEE commonplace conference on Computational Intelligence and communique generation, 2015. 24. Jin-Fa Lin, Yin-Tsung Hwang, Ming-Hwa Sheu, "a unique high-velocity and electricity green 10-Transistor full Adder layout," IEEE Transactions on Circuits and structures-I: regular Papers, vol. Fifty 4, no. five, might also 2007. 25. Sujatha,Hiremath and Deepali Koppad, "Low power full Adder Circuit the usage of Gate Diffusion enter (GDI) MUX," verbal exchange and Computing (ARTCom2012), Fourth worldwide conference on Advances in recent technologies, 19-20 Oct. 2012. 18 26. Soolmaz Abbasalizadeh, Behjat Forouzandeh, "complete Adder layout with GDI cellular and independent Double Gate Transistor," 20th Iranian assembly on electrical Engineering, (ICEE2012), Tehran, Iran, might also 15-17, 2012. 27. Yingtao Jiang, Abdulkarim Al-Sheraidah, Yuke Wang, Edwin Sha, and Jin-Gyun Chung, "a novel Multiplexer-based Low-power full Adder," IEEE Transactions on Circuits and systems-II: explicit BRIEFS, vol. 51, no. 7, July 2004. 28. I. S. Abu-Khater, A. Bellaouar, M. I. Elmasry, "Circuit techniques for CMOS low-manage superior multipliers," IEEE journal SolidState Circuits, vol. 31, no. 10, pp. 1535–1546, Oct. 1996. 29. Arvind Nigam, Raghvendra Singh, "similar evaluation of 28T full snake with 14T full viper the use of 180nm," standard magazine of Engineering technological know-how improve studies;2(1), pp.27-32, March 2016. 30. Anuj Kumar Shrivastava, Shyam Akashe," layout excessive execution and occasional power 10T complete Adder cellular using Double Gate MOSFET at 45nm generation," international convention on control, Computing, conversation and substances (ICCCCM), 2013 31. Sneh Lata Murotiya, Anu Gupta, "shape of fast ternary entire viper and three facts XOR circuits the use of CNTFETs," twenty eighth international conference on VLSI design and fourteenth global conference on Embedded systems, 2015 32. Partha Bhattacharyya, Bijoy Kundu, Sovan Ghosh, Vinay Kumar," overall performance evaluation of a Low-energy high-speed Hybrid 1-piece full Adder Circuit," IEEE Transactions on Very big scale Integration (VLSI) structures, vol. 24, no. 11, Non. 2015. Authors: Munipraveena Rela

Paper Title: CT Liver Image Enhancement using Spatial Filters Abstract: Picture upgrade is utilized to improve the picture quality. Picture improvement should be possible utilizing spatial domain and frequency domain. In spatial domain, picture upgrade should be possible utilizing point tasks, veil activities, and sifting. In frequency domain, the info picture is changed over to frequency domain by utilizing diverse changes and handling will be done in frequency domain. Then the frequency domain image will be converted to spatial domain. In this paper, we have discussed various filtering techniques used to enhance the CT liver image.

Keyword: CT liver images, frequency domain, Spatial Domain, and filters. 5. References: 1. Anil's K Jain. “Fundamentals of Digital Image Processing”, Prentices Hall' Inc'., prentice hall international edition, 1989. 2. https://www. mathworks .com/discovery/digital/image/processing.Html. 30-32 3. Rafael's C Gonzalej, Richard's E Wood, “digital image processing”, Prentices Hall', IInd Edition's. 4. Munipraveena Rela , S. Nagaraja Rao, “Comparative analysis of image enhancement techniques applied to CT liver image” Inte. Journals of Enginee & Technology, 7, Pp. 285-289,2018. 5. Huafeng's Lee, Xiaoge's He, Dapeng's Taao, Yuanyann Tanng, Ruxeen Wangg, “Joint medical image fusion, denoising and enhancement via discriminative low-rank sparse dictionaries learning” Pattern's Recognitions, vol. 79, pp. 130–146, Feb. 2018. 6. Jinlan's Guaan, Jiequaan Ouu, Zhihuii Laii and Yuting Lai, “Medical Image Enhancement Method Based on the Fractional Order Derivative and the Directional Derivative”, Int. Journals of Pattern's Recognitions & Artificial Intelligence, Vol. 32, No. 3, pp. 1857001 (22 pages), 2018. 7. Ebenezer Daniel,J Anitha's, “Optimum wavelet based masking for the contrast enhancement of medical images using enhanced cuckoo search algorithm”, Computer in Biology & Medicines, Volume Seventy one, Pages 149/155, April-2016. 8. X Zhengg, S. Ravishankar's, Y Longg & J. A. Fessler's, "PWLS-ULTRA: An Efficient Clustering and Learning-Based Approach for Low-Dose 3D CT Image Reconstruction," in IEEE Transactions on Medicals Imagingg, vol. Thirty Seven, No.6, Pp. 1498/1510, June 2018. Authors: G.Rajender, T.Anil Kumar, K.Srinivasa Rao

Paper Title: Channel Estimation using Modified Extended Kalman Filter Based Algorithm for Fading Channels Abstract: The manner towards describing the effect of the bodily channel at the records succession is known as the Channel estimation. The Channel estimation strategies offer low multifaceted nature and better execution and are successfully implemented in correspondence frameworks. Be that as it may, they may be likewise inefficient of statistics transmission considering they use making geared up arrangements to assess the channel, so right right right here; a method is utilized wherein the restrained duration of getting prepared grouping is transmitted. The Kalman based totally calculation which may be finished effectively for channel estimation method. The kalman based calculation channel estimator activates a massive addition in execution even as contrasted with the information simply estimator. This calculation furthermore permits us to count on the scenario of the framework in advance than the threshold is genuinely gotten. In this paper, the channel estimation is completed making use of Kalman based calculation to foresee the price determinations of the 6. situation of framework. Additionally the all out symphonious twisting of the refreshed us of a is determined and restricted inner a particular absolutely worth. The channel under concept is a Rayleigh blurring channel. 33-38

Keyword: Channel estimation, Kalman clear out, Rayleigh blurring, total Harmonic Distortion. References: 1. Gabriel Terejanu, prolonged Kalman, department of laptop science & Engineering, university at Buffalo, big apple 14260. 2. Rupul Safaya, "A Multipath Channel Estimation algorithm the usage of a Kalman clear out" 3. Steven M. Kay, basics of Statistical signal Processing, quantity I: Estimation concept (v. 1). 4. Vincent terrible, An creation to sign Detection and Estimation. 5. Greg Welch & Gary Bishop, "An advent to Kalman filter out" , TR ninety five-041,department of laptop technological understanding, university of North Carolina, Chapel Hill, Chapel Hill- NC-27599-3175, 24 July, 2006. 6. Rachel Kleinbauer, “Kalman filtering implementation with MATLAB”, university at Stuttgart. 7. Maria Isabel Ribeiro, “Kalman and prolonged Kalman Filters: concept, Derivation and houses” , Institute for structures and Robotics. 8. T.S. Rappaport, wireless Communications requirements and exercising.. Creator: Prentice corridor press. 1996. 7. Authors: Sribindu Sattu, Kumaraswamy Gajula, Ranjan Kumar Singh

Paper Title: A New Energy Efficient Clustering Protocol for Life Timemaximization in Wsns

Abstract: On this paper we have got proposed an energy inexperienced clustering protocol that is dynamic, 39-45 distribution, self-organizing and further electricity green than gift protocols. Contributors in wi-fi sensor network clusters transport records to their cluster heads using TDMA scheduling. The cluster head transmits the aggregated and compressed packets to the bottom station. The CSMA MAC protocol is traditionally used for data transmission. In the CSMA MAC protocol, whilst the packet arrives on the cluster head it first senses the channel, if it's far loose, the cluster head transmits records that may be every a single packet or a a couple of packet. The cluster is reduced in transmitting unmarried packets from the pinnacle to the bottom station electricity. To make better utilization of sources along with energy more than one packets to be sent in area of transmitting single packet. On this proposed technique, we particularly focused on site visitors at the Cluster heads i.E. Cluster heads with big site visitors are desired for channel project and cluster head site traffic is a great deal much less for backoff time, in this era cluster head may also moreover collect greater records from their individuals. So on this manner strength overall performance is improved via who choose transmission of multiple packets in location of a single packet.In this proposed approach, Fuzzy C-way (FCM) set of rules is accompanied to form clusters inside WSNs. MATLAB software program is used to implement and evaluate the effects of the proposed set of rules with deterministic inexperienced clustering (DEC) set of regulations, Voronoi set of guidelines and LEACH protocol In terms of lifespan and electricity intake. The consequences show that the existence of the proposed algorithm is extended with the beneficial aid of 17%..

Keyword: TDMA, CSMA MAC protocol, WSN. MATLAB, LEACH, Fuzzy C-way (FCM) References: 1. Dasgupta, S., Dutta, P.: ‘An progressed leach method for head desire technique in a fuzzy-C manner introduced approximately clustering of a wi-fi sensor network’. Proc. IEMCON 2011 Organised via using manner of IEM in Collaboration with IEEE, five and 6 January 2011, pp. 203–208 2. Singh, A.Ok., Goutele, S., Verma, S., Purohit, N.: ‘An energy green approach for clustering in WSN using fuzzy common revel in’, Int. J. Comput. Appl., 2012, forty four, (18), pp. Eight–12 3. C.T.Kone, M. David, F. Lepage : ‘Cluster-primarily based absolutely multi-channel for boosting overall performance of big scale wireless sensor networks’.IEEE 2010,V3 163-168 4. Y. Good enough. Park, M. G. Lee, ok. Ok. Jung, J. J. Yoo: ‘maximum first-class sensor nodesdeployement the use of FCM set of regulations’, global symposium on pc technological records and society, 2011, pp. 389-392 5. A. S. Raghuvanshi, S Tiwari, R Tripathi , N. Kishore : ‘top-best form of clusters in wireless sensor networks: an FCM technique’.IEEE 2010, pp. 817-823 6. D. C. Hoang, Rasjesh Kumar, Sanjib Kumar Panda: ‘interest of a cluster based totally totally protocol the use of FCM set of recommendations for WSNs’.IETDL 2013,pp. 163-171 7. X. Wang, and T. Berger, “Spatial channel reuse in wi-fi sensor networks,” Wirel. Netw.14, 2, March. 2008, pp. 133-146, doi:10.1007/s11276-006-8743-z 8. Femi A. Aderohunmu, Jeremiah D. Deng, Martin k. Purvis, “A Deterministic strength efcient Clustering Protocol for wireless Sensor Networks”, IEEE 2011. 9. W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, An software program-specific protocol shape for wireless microsensor networks, IEEE Transactions on wi-fi Communications, vol. 1, pp.660670, 2002. 8. Authors: G.Sudhakar Reddy, V.Soma Laxmi

Paper Title: Design of Intelligent Embedded System using Raspberry PI and Arduino for Industrial Maintenance

Abstract: Normally in industries there may be conventional network conversation s like RS232, RS485, 46-49 CAN & ZIGBEE and so on. Are confined for brief distances. This paper have grow to be aimed to analyze and set up an smart machine that have grow to be hired for Embedding, smart cellular telephone and internet based totally totally completely devices for business monitoring and controlling making use of Raspberry Pi and Arduino Uno. An ordeal and relative examination of eager tool turn out to be linked in a piece employer in this project. At some point of this undertaking we have been given that the device should show display enveloping surroundings situations collectively with sogginess, temperature, environment first-rate, and except actuate the manage devices like fumes fans, engine, switch and so on within the corporations. The essential detail of the framework is the potential to remotely deliver an alarm message, whilst a flame or immoderate temperature is perceived. Proper on the identical time because the closeness of smoke is excellent, the system will display an picture of the room popularity in a website web web page. This set up device can be required the client insistence to document the occasion to the Fireman the use of a manage sign. The upside of the use of this machine is that it'll decrease the possibility of false aware distinct of the Fireman. The system modified into furthermore visible to be appealing for any systems and farmers likewise to apply, as they'll feasibly manipulate the estate everywhere at something issue, achieving rate decline, asset saving, and profitable control in enterprise management. The software program code might be advanced in private domestic web page thru python programming language, for showing the output WebPages are superior with the resource of HTML.

Keyword: RS232, RS485, CAN & ZIGBEE Embedding, Raspberry Pi, Arduino Uno. References: 1. www.Instructables.Com/...Net web site...Raspberry-pi 2. https://www.Raspberrypi.Org/ 3. www.Element14.Com/network/network/raspberry-pi 4. elinux.Org/RPi_Hub 5. www.Treehugger.Com/.../20-top notch-responsibilities-raspberry-pi 6. "Raspberry Pi Compute Module: new product!". Raspberrypi.Org. 7. Kelion, Leo (2 February 2015). "Raspberry Pi 2 unveiled with quicker processor and extra memory". BBC facts. Retrieved 3 February 2015. 8. "everyday overall performance - measures of the Raspberry Pi's common normal performance.". RPi standard standard performance. ELinux.Org. Retrieved 30 March 2014. 9. Benchoff, Brian. "sixty four RasberryPis have grow to be a supercomputer". Hackaday. Retrieved 30 March 2014. 10. "Raspberry Pi, supported video resolutions". ELinux.Org. 30 November 2012. Retrieved eleven December 2012. 11. "Introducing Raspberry Pi model B+". Raspberry Pi basis. Retrieved 14 july 2014. 12. "Raspberry Pi Compute Module: New Product!". Raspberry Pi foundation. Retrieved 22 September 2014. 13. "New video features! MPEG-2 and VC-1 decode, H.264 encode, CEC". Raspberry Pi basis. Retrieved 26 August 2012. 14. "SMSC LAN9512 net website online;". Smsc.Com. Retrieved 6 may additionally 2012. 15. "Microchip/SMSC LAN9514 records sheet;"(PDF). Microchip. Retrieved 15 July 2014. Authors: T.Santosh Kumar, T.Anil Kumar

Paper Title: Implementation of a Shift Register using Pulsed Latch Abstract: precise This paper proposes a low strength pass sign in planned making use of a beat lock. Supplanting the ace slave turn-flop with a hook decreases manage usage and vicinity. This method settle the breaking factors of the beat lock. making use of hook we are moving statistics to each the developing side and falling edge the usage of a beat clock created utilizing numerous clock turbines. The accompanying pressure go with the flow register is deliberate and executed utilising the Xilinx VIVADO tool.The proposed 256-piece float registers eat an awful lot much less strength and own plenty much less area at the chip than traditional go with the flow registers with turn-flops.

Keyword: flip-flop, beat clock, beat lock, flow sign on.. References: 1. S.-H. W. Chiang and S. Kleinfelder, “Scaling and format of a sixteen-mega pixel CMOS picture sensor for electron microscopy,” in Proc. IEEE Nucl. Sci. Symp. Conf. File (NSS/MIC), 2009, pp. 1249–1256. 2. V..Stojanovic'sand V..Oklobdzija's , “Comparative evaluation of maintain near-slave latches and turn-flops for immoderate- 9. ordinary performance and coffee-electricity structures” IEEE J. Strong-us of a Circuits, vol. 34, no. 4, pp. 536–548, Apr.1999. 3. V. Stojanovic and V. Oklobdzija, “Comparative evaluation of masterslave latches and turn-flops for excessive-popular accepted standard overall performance and espresso-strength systems,” IEEE J. Sturdy-kingdom Circuits, vol. 34, no. Four, pp. 536–548, 50-53 Apr.1999 4. H.. Yamasaki's & T. Shibata's , “A real-time photo-function-extraction and vector-generation vlsi using arrayed-shift-sign in shape,” IEEE's J. Robust-nation's Circuit's, Vol . V2, No. Nine,pP- 2046/2053, September 2007. 5. S. Li, H. S. Matis, N. H. Xuong, S. Kleinfelder, “Modeling and assessment of Charged-Particle CMOS photograph sensor arrays,” IEEE Transactions on Nuclear technology, Vol. Fifty six, No. Three, detail 2, June 2009, pp. 1062-1068. 6. S. H. Unger et al., “Clocking schemes for immoderate-pace virtual structures,” IEEE Trans. Comput., vol. C-35, pp. 880–895, Oct. 1986. 7. V. Stojanovicet al., “Comparative evaluation of grasp–slave latches and turn–flops for high-widespread usual performance and espresso-power structures,” IEEE J. Strong-u.S.A. Circuits, vol. 34, pp. 536–548, Apr. 1999. 8. V. Stojanovicet al., “A unified approach in the evaluation of latches and flip-flops for low-power systems,” in Int. Symp. Low- energy Electronicsand design, Monterey, CA, Aug. 1998, pp. 227–232. 9. T. Sakurai et al., “Low-strength circuit format for multimedia CMOS VLSIs,” in Proc. Synthesis Sys. Integration combined Technol. (SASIMI), Nov. 1996, pp. Three–10. 10. H. Partoviet al., “go with the flow-thru latch and aspect-prompted flip-flop hybrid elements,” in Int. Robust-usa Circuits Conf.E, Dig. Of Tech. Papers, Feb.1996, pp. 138–139. 11. F. Klass, “Semi-dynamic and dynamic flip-flops with embedded right judgment,”inSymp. On VLSI Circuits, Dig. Of Tech. Papers, June 1998, pp. 108–109. 12. Matsui et al., “one hundred MHz 13mm 2-D DCT macrocell the usage of revel in amplifying pipeline turn-flop scheme,” IEEE J. Strong-country Circuits, vol. 29, pp. 1482–1490, Dec. 1994. 10. Authors: Nagaraja Kumar Pateti, Navitha Pateti

Paper Title: Chirp Signal Generator Based on Direct Digitalsynthesizer (Dds) for A Radar At 300 Ghz

Abstract: In the Modern day electronic fighting Systems the utilization of range has been broadened with a 54-60 proficient way which makes the recognizable proof of the signal difficult. Modern radars use recurrence and stage tweaked signs to spread their range to enhance the handling gain. The way toward finding the balance arrangement of a perceived signal, the moderate development between signal distinguishing proof and demodulation, is an imperative task of a wise recipient, with various customary resident and military applications. Obviously, with no learning of the transmitted data and various cloud parameters at the authority, for instance, the signal control, carrier repeat and stage offsets, data, and so on., daze distinguishing proof of the adjustment is a troublesome assignment. This turns out to be considerably additionally difficult in certifiable situations. Wideband direct recurrence tweaked (LFM) signal is generally utilized in exact separation estimating radar framework. As customary techniques for creating LFM signal have a great deal of detriments, for example, shakiness and nonlinearity we propose an alternate answer for wideband LFM signal generator in L-band dependent on DDS and recurrence augmentation. The proposed strategy creates the baseband LFM signal utilizing the DDS, and after that includes the baseband motion into the recurrence duplication framework; last we can accomplish an unadulterated L-band wideband LFM signal. The estimation result demonstrates that the proposed can satisfy every prerequisite of anticipant palatably.

Keyword: Radars, Chirp signals, ADC, LFM, CNN, LWRT, Signal Recognizable proof References: 1. Avignon-Meseldzija E., Sylvain Wahl A., Dynamically Reconfigurable Frequency Synthesizer for Integrated FMCW Radar. International Radar conference, Lille, France, 2014. 2. Meta, A., Signal processing of FMCW synthetic aperture radar dat. Dissertation thesis, Delft University of Technology, Netherland, 2006, ISBN 907692810X. 3. Ash M., Ardeshir Tanha M., Brennan P., Kohler A., McElwaine J., Keylock Ch., Improving the Sensitivity and Phased Array Response of FMCW Radar for Imaging. International Radar conference, Lille, France, 2014. 4. M. Soumekh, Synthetic Aperture Radar Signal Processing with MATLAB Algorithm. New York: John Wiley & sons, 1999, ISBN 978-0-471-29706-2. 5. J. C. Curlander and R. N. McDonough, Synthetic Aperture Radar: Systems and SignalProcessing, Wiley- Interscience: Series in Remote Sensing, New York, 1991 6. M. Sheen, D. L. McMakin, T. E. Hall, and R. H. Severtsen, "Active millimeter-wave standoff and portal imaging techniques for personnel screening," in Proc. IEEE Conf. Technol. Homeland Secur. (HST),May 2009, pp. 440- 447. 7. K. B. Cooper et al., "An approach for sub-second imaging of concealed objects using terahertz (THz) radar," J. Infr., Millim., Terahertz Waves, vol. 30, no. 12, pp. 1297-1307, 2009. 8. H. Quast and T. Loffler, "Towards real-time active THz range imaging for security applications," in Proc. Int. Conf. Electromagn. Adv. Appl. (ICEAA), Sep. 2009, pp. 501-504. 9. K. B. Cooper, R. J. Dengler, N. Llombart, B. Thomas, G. Chattopadhyay,and P. H. Siegel, "THz imaging radar for standoff personnel screening," IEEE Trans. Terahertz Sci. Technol., vol. 1, no. 1, pp. 169-182, Sep. 2011. 10. Friederich et al., "THz active imaging systems with real-time capabilities," IEEE Trans. Terahertz Sci. Technol., vol. 1, no. 1, pp. 183-200, Sep. 2011. 11. Chattopadhyay et al., "Terahertz array receivers with integrated antennas," in Proc. IEEE Int. Workshop Antenna Technol. (iWAT), Mar. 2012, pp. 319-322. 12. T. Reck, C. Jung-Kubiak, C. Lee, G. Chattopadhyay, I. Mehdi, and N. Llombart-Juan, "Terahertz antenna for arrays of hundreds of pixels,"in Proc. IEEE Antennas Propag. Soc. Int. Symp. (APSURSI), Jul. 2012,pp. 1-2. 13. K. B. Cooper et al., "Transceiver array development for submillimeterwave imaging radars," Proc. SPIE, vol. 8715, pp. 87150A-1-87150A-8, May 2013. 14. Blázquez, K. B. Cooper, and N. Llombart, "Time-delay multiplexingwith linear arrays of THz radar transceivers," IEEE Trans. Terahertz Sci.Technol., vol. 4, no. 2, pp. 232-239, Mar. 2014. 15. S. Ozev, A. Orailoglu, and H. Haggag, "Automated test developmentand test time reduction for RF subsystems," in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), vol. 1. May 2002, pp. I-581-I-584. 16. Y. Joannon, V. Beroulle, C. Robach, S. Tedjini, and J.-L. Carbonero,"Decreasing test qualification time in AMS and RF systems," IEEE Des.Test Comput., vol. 25, no. 1, pp. 29-37, Jan./Feb. 2000. Authors: Krishna Patteti, Anil Kumar Tipparti, Soma Umamaheshwar

Paper Title: Fundamentals and Challenges of Massive MIMO for 5G Abstract: In this paper we introduced a rundown and future research direction of monstrous multiple input multiple output (MIMO) for fifth era (5G). Gigantic MIMO innovation, where a base station (BS) furnished with exceptionally enormous number of reception apparatuses for serving numerous clients in the same time-frequency resource, can fulfill the need of high throughput, ghastly proficiency, vitality utilization of wireless communications, and subsequently it is a promising innovation for up and coming age of wireless communications, for example, 5G cell frameworks. Moreover, we additionally introduced, where huge MIMO could prompt critical improvement of 5G wireless Communication frameworks.

Keyword: 5G, MIMO, Massive MIMO, TM 11. References: 1. J. G. Andrews, et al., what will 5G Be? IEEE mag on decided on areas in Communications, vol. 32, no. 6, pp. 1065-1082, June 2014. 61-65 2. T. L. Marzetta, "How a remarkable deal schooling is wanted for multiuser MIMO?," in 4th IEEE Asilomar Conf. On Sig., Sys. And Comp., (ACSSC), pp. 359-363, 2006. 3. T. Marzetta, "Noncooperative mobile wi-fi with limitless numbers of base station antennas," IEEE Trans. Wi-fi Commun., vol. 9, pp. 3590-3600, Nov. 2010. 4. E. Larsson, O. Edfors, F. Tufvesson, and T. Marzetta, "massive MIMO for next technology wi-fi structures," IEEE Commun. Magazine., vol. Fifty , pp. 186-195, Feb. 2014. 5. T. L. Marzetta, E. G. Larsson, H. Yang, and H. Q. Ngo, fundamentals of massive MIMO. Cambridge university Press, 2016. 6. F. Rusek, D. Persson, B. Ok. Lau, E. Larsson, T. Marzetta, O. Edfors, and F. Tufvesson, "Scaling up MIMO: opportunities and worrying situations with very massive arrays," IEEE signal manner. Magazine., vol. 30, pp. Forty-60, Jan. 2013. 7. S. Sesia, I. Toufik, and M. Baker, LTE-the UMTS long time Evolution: from idea to exercise. John Wiley & Sons, 2011. 8. H. Ji, Y. Kim, J. Lee, E. Onggosanusi, Y. Nam, B. Zhang, J.And Lee, and B. Shim, "assessment of entire-size MIMO in LTE- advanced pro," IEEE Comm. Magazine., vol. Fifty 5, no. 2, pp. 176-184, 2017. 9. R. Gallager, "Circularly-symmetric gaussian random vectors," preprint, 2008. 10. C. E. Shannon, "A mathematical precept of communique," ACM SIGMOBILE cell Computing and Communications take a look at, vol. 5, no. 1, pp. Three-fifty 5, 2001. 12. Authors: Malothu Amru, R P Singh, S Pothalaiah Performance Evaluation of Energy Efficient Distance Based LEACH Protocol for Wireless Sensor Paper Title: Networks Abstract: The zone of wireless sensor networks (WSNs) is one of the developing and quickly developing 66-70 fields in the logical world. This has realized growing ease, low-control and multi-work sensor hubs. Nonetheless, the real certainty that sensor hubs come up short on vitality rapidly has been an issue and numerous vitality effective directing conventions have been proposed to take care of this issue and safeguard the life span of the network. The proposed EEDBLEACH chooses bunch head with most elevated leftover vitality in every communication round of transmission and furthermore considers, the briefest good ways from the base station to the hubs in the group. By accepting the separation as a parameter which diminishes the vitality utilization. The EEDBLEACH Protocol is correlation with the current LEACH convention. Reproduction results demonstrate that EEDBLEACH Protocol drags out the lifetime of the network

Keyword: Wireless Sensor Networks, EEDBLEACH, LEACH. References: 1. Can Tunca, Sinan Isik, Mehmet Yunus Donmez, and Cem Ersoy, "Ring Routing: An Energy-Efficient Routing Protocol for Wireless Sensor Networks with a Mobile Sink", IEEE transactions on mobile computing, vol. 14, issue no. 9, pp 1947-1960, september 2015. 2. .Akinsolu Ojuetimi Ifedayo, Mqhele Dlodlo "Variable Transmission Power Control in Wireless Ad-hoc Networks" IEEE 2015. 3. K. Vijayan and Arun Raaza "A Novel Cluster Arrangement Energy Efficient Routing Protocol for Wireless Sensor Networks",Indian Journal of Science and Technology, Vol 9(2),Vol. 9 issue. 2. pp 1-9, January 2016. 4. Monika Raghatate1 and Prof. Dipak W. Wajgi2, "AN ENERGY SAVING ALGORITHM TO PROLONG THE LIFETIME OF WIRELESS SENSOR NETWORK", International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5,pp 32-44, October 2014 5. Mohammed Abo-Zahhad, Sabah M. Ahmed, Nabil Sabor and Shigenobu Sasaki, "A New Energy-Efficient Adaptive Clustering Protocol Based on Genetic Algorithm for Improving the Lifetime and the Life timeof Wireless Sensor Networks" , International Journal of Energy, Information and Communications Vol.5, Issue 3, pp.47-72,2014 6. Omar N, Al , Siddeeq Y Ameen, Mohammed N Abdallah, "WSN Power Consumption using clustering and multiple access techniques", International Journal of Computer Applications, vol-87, No-9, Feb 2014. 7. Seyyed Aboalfazl Sayyadi, Ramin Senemar,Hossein Teimuri, "Elect Distance Efficient Cluster Heads for Improvement Performance of LEACH Protocol", 2nd International Conference on Computational Techniques and Artificial Intelligence (ICCTAI'2013), March 17-18, Dubai (UAE) 2013. 8. Soamsiri, "Multi-channel utilization algorithms for IEEE 802.15.4 based wireless network A survey", Engineering Journal, Vol- 17, Issue3, July 2013. 9. Kieu-Ha Phung, Bart Lemmens, Mihail Mihaylov, Lan Tran, Steenhaut, "Adaptive Learning based scheduling in multichannel protocol for energy-efficient data-gathering wireless sensor networks", International Journal of Distributed Sensor Networks,.vol. 9 no. 2,pp1-11,February 2013. 10. O. Rehman, N. Javaid, B. Manzoor, A. Hafeez, A. Iqbal, M. Ishfaq "Energy Consumption Rate based Stable Election Protocol (ECRSEP) for WSNs" International Workshop on Body Area Sensor Networks (BASNet-2013), Procedia Computer Science , pp 932 - 937, Elsevier ,2013 11. Surender et al., "Energy Efficient (EECP) Clustered Protocol for Heterogeneous Wireless Sensor Network" , International Journal of Advanced Research in Computer Science and Software Engineering vol. 3, issue 7, pp. 1448-1453, July - 2013. 12. Jin Wang , Zhongqi Zhang , Feng Xia , Weiwei Yuan and Sungyoung Lee , " An Energy Efficient Stable Election-Based Routing Algorithm for Wireless Sensor Network", Vol. 13, pp 14301-14320; doi:10.3390/s131114301, Sensors 2013. 13. C.Divya, N.Krishnan , T.Gandhi mathy,"Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireless Sensor Networks", IOSR Journal of Computer Engineering (IOSR-JCE) Vol. 12, Issue 5 pp. 55-61, 2013. 14. Giuseppe Anastasi, Marco Conti, and Mario Di Francesco, "Extending the Lifetime of Wireless Sensor Networks Through Adaptive Sleep", IEEE Transactions on Industrial Informatics, vol. 5, no. 3, pp. 351-365, 2009. 15. Jin Wang , Zhongqi Zhang , Feng Xia , Weiwei Yuan and Sungyoung Lee, "An Energy Efficient Stable Election-Based Routing Algorithm for Wireless Sensor Networks", vol.13, pp. 14301-14320; doi:10.3390/s131114301¸ Sensors 2013. 16. Malay K Pakhira, "Finding number of clusters before finding clusters", Procedia Technology 4 27-37, published by Elsevier Ltd. 2012 17. Nazia Majadi, "U-LEACH: A Routing Protocol for Prolonging Lifetime of Wireless Sensor Networks", International Journal of Engineering Research and Applications, Vol. 2, Issue4, July-, pp.1649-1652, August 2012. 13. Authors: M Vijay Karthik, Priyanka Chaudhary, A Srinivasula Reddy

Paper Title: Mitigation of Flickering in DFIG Based Wind Turbines using Individual Pitch Control

Abstract: due to the breeze beat boom, wind shear and tower shadow affects, community related breeze 71-78 generators are the wellsprings of power modifications which additionally can also supply shimmer over the span of regular development. This paper proposes a model of a MW-set up variable-pace wind turbine with a doubly continued confirmation generator to research the blaze transmission and equalization problems. To facilitate the flashes we were the usage of a man or female make commitments manage contraption the earlier days. on this paper, a moved pitch territory control method relying on the smooth cause is proposed for the variable-rhythm wind turbine systems, in which the generator pace slip-up and exchange speed blunder are utilized as manage enter elements for the cushy cause controller (FLC). The pitch vicinity reference is made through manner of the use of the FLC, that could capture up at the nonlinear regular for the pitch element to the breeze pace. This paper offers head alternate of wind energy, wind turbine linearization and dynamic displaying are settled. The feathery reason controller is carried out for trade draining edge of wind turbine and customary energy might be collect. The square represent of proposed pitch oversee which consolidates pitch controller, actuator version and turbine linearized displayed with the nice valuable asset of the usage of Matlab/Simulink programming.

Keyword: Flicker, gleam comfort, solitary pitch manage (IPC), variable tempo wind turbine. References: 1. T. sun, ―energy superb of community associated breeze mills with DFIG and their participation with the structure, Ph.D. concept, Aalborg Univ, Aalborg, Denmark, 2004. 2. L. Rossetto, P. Tenti, and A. Zuccato, ―Electromagnetic closeness inconveniences in modern-day system,IEEE Ind. Appl. mag., vol. five, no. 6, pp. 34–forty six, Nov./Dec. 1999. 3. A Larsson, ―Flicker outpouring of wind turbines inside the way of incessant operation,‖ IEEE Trans. power Convers., vol. 17, no. 1, pp. 114–118, Mar. 2002. 4. H. Sharma, S. Islam, T. Pryor, and C. V. Nayar, ―power astounding troubles in a breeze turbine driven choice generator and diesel half of breed independent grid,‖ J. select. Electron. Eng., vol. 21, no. 1, pp. 19–25, 2001. 5. M. P. Papadopoulos, S. A. Papathanassiou, S. T. Tentzerakis, and N. G. Boulaxis, ―research of the glimmer unfold with the manual of cross phase associated breeze mills,‖ in Proc. 8th Int. Conf. Melody best electricity, Athens, Greece, 1998, vol. 2, pp. 1152–1157. 6. T. sun, Z. Chen, and F. Blaabjerg, ―Flicker have an look into segment beat wind plants with doubly driven enrollment turbines,‖ IEEE Trans. strength Converters., vol. 20, no. 4, pp. 896–905, Dec. 2005. 7. adequate. Yun-Seong and W. Dong-Jun, ―Mitigation of the flash popularity of a DFIG using weight element vicinity manipulate,‖ IEEE Trans. power Del., vol. 24, no. 4, pp. 2457–2458, Oct. 2009. 8. W. Hu, Z. Chen, Y. Wang, and Z. Wang, ―Flicker stability thru powerful high-quality control of variable-tempo wind mills with complete scale down to again vitality converters,‖ IEEE Trans. power Converters., vol. 24, no. three, pp. 640–649, Sep. 2009. 9. E. A. Bossanyi, ―individual lowering side pitch control for weight reduction,‖ Wind power, vol. 6, pp. 119–128, 2002. 10. E. A. Bossanyi, ―in addition burden diminishes with man or woman pitch manipulate,‖ Wind exceptional, vol. eight, pp. 481– 485, 2005. 11. Liuchen Chang ―Wind control Conversion structures‖, IEEE Canadian appraisal - spring/Print emps, pp. 12-sixteen, 2010. 12. Abdel Aitouche and Elkhatib Kamal, ―realistic oversee of Wind power Conversion systems‖, ISBN: 978-953-307-467-2, InTech, 2011. 13. Q. Wang and L. Chang, ―An active top notch energy extraction computation for inverter primarily based surely issue pace wind turbine systems,‖ IEEE Trans. exceptional Electron vol. 19, no. 5, pp. 1242-1249, Sept. 2004. 14. Boik, S.2003.Grid prerequisites terrible circumstances for wind mills. Billund: Fourth overall workshop on widespread scale Integration of wind power and Transmission Networks for Offshore Wind symbolize. 15. Slootweg, J.G., de Haan, S.W.H., Polinder, H., and Kling, W.L. 2003. vivid new version for addressing Variable tempo wind strategies in vitality device additives Reenactments. IEEE Transactions on energy systems, Vol.18, No.1,pp.140 four-151. Authors: M Vijay Karthik, Priyanka Chaudhary, A Srinivasula Reddy

Paper Title: Artificial Intelligence Based Discrimination of Transformer Inrush and External Fault Currents Abstract: The function of a power transformer defensive transfer is to work rapidly during the issue condition and to square the stumbling during the other working states of the power transformer. Another method for arranging transient miracles in power transformers, which can be executed in advanced handing-off for transformer insurance. Separation among various working conditions (Transformer, external fault) Power transformer is accomplished by incorporating waveform transformations along the neural network. The waveform change intensity transformer is connected to the transient miracle probe, as a result of its capacity to remove data from the transient sign all the while in both time and recurrence area. The nervous system is used in light of its self-learning and exceptionally non-linear mapping capability. The proposed scheme has been accepted through artificial neural network (ANN) designs. ANN engineering was designed to use BPN (back propagation calculation) alone, and BPN was consolidated with waveform transform (WNN), so it ought to perceive and order all the above working conditions and blames. The reenactment results got demonstrates that the new calculation precisely gives high working affectability to inside issues and stays stable for other working states of the power transformer. From that it was gathered that the consolidated WNN gives increasingly precise outcomes and it has fast reaction and expanded capacity to separate even low-level deficiency signals from other working conditions. 14. Keyword: Power transformers, bruises, artificial neural networks, wavelets. 79-94 References: 1. T. Shanti, A.S. "IEJJ Trans04 03 PP1105-1115 2. Myong-Chul Shin, Member, IEEE, Chul-won Park, and Jong-hyung Kim, "Fuzzy logic-based relays for large power transformer protection" IEEE Trans.Power Del, Vol.18, No.3, July 0.2003 3. X.Lin, J.Huang, L.Zeng and Z.Q. Bo, "Analysis of electromagnetic transient and moderation based on second protection of second HHHH power transformer," IEEE Trans. Power Del., Vol.25, No. 4, pp. 2299–2307, Oct.2010.. 4. M. Jamali, M. Mirzi and S. Ashargoulmian, "Current calculation and analysis of transformers based on transformers and operating conditions," ISSN 1392-1215 Electronics and Electrical Engineering. 5. Monseff, H., and Lotiford, S.. "Internal fault current detection based on wavelet changes in power transformers," Electric Power Systems Research, Vol. 77 pp. 1637–1645, 2007. 6. Morvez, Z., Vishwakarma, D.N., and Singh, S.P. "ANN-based protection scheme for power transformers," Electric Machines and Power Systems, vol.28, No.9, pp.875- 884, 2000. 7. Bastard, P., Munier, M., and Regal, H.. "Neural Network-Based Algorithms for Power Transformer Differential Relays," Proceeding Industrial Electric Engineering, Volume 162, Number 4, pp. 3-7- 342,. 1995. 8. J. Ma., Z. Wang, q. Yang, and Y. Liu, "Identification of transformer pressure based on generalized grille curve," IEEE Transactions on Power Distribution, Vol. 26, no. 2, pp. 588– 595, 2011. 9. Segatto, E. C., and Corey, D. V. "A differential relay using power transformer for intelligent tools," IEE Transactions on Power Delivery, vol. 21, no. 3, August 2006. 10. Morvez, Z., Vishwakarma, D. N., and Singh, S. P. Radial basis function (RBF) neural network for protection of "Power Transformers and Systems, Vol." 29, pp. 307–320, 2001. 11. "Inrce current tutor session" Ramis Grigis, IEEE Standards Committee, 15 October 2001, Olando, Florida.. 15. Authors: V.Sathiya Suntharam, Sheo Kumar, Chandu Ravi Kumar

Paper Title: Research Method of Data Deduplication Backup System

Abstract: In this paper, we've got studied cutting-edge-day backup systems and used a singular technique 95-99 which facilitates in decreasing the fragmentation trouble. The winning backup tool have lumps of every backup which is probably bodily scattered, which ends up in a very demanding fragmentation trouble. Fragmentation offers upward thrust to 2 kinds of fragmented containers which is probably sparse and out-of- order boxes. Sparse container exacerbates the device simple ordinary overall performance on both restore and rubbish series. Out-of-order packing containers talk to the ones containers which can be accessed commonly at some point of a repair. As a way to lessen the fragmentation trouble we use the antiquity acquainted set of guidelines and stockpile aware filter out. Those help in figuring out the sparse further to the out of order discipline.

Keyword: Fragmentation, Sparse, deduplication, containers, chunks References: 1. C. Dubnicki, L. Gryz, L. Heldt, M. Kaczmarczyk, W. Kilian, P. Strzelczak, J. Szczepkowski, C. Ungureanu, and M. Wel- nicki. HYDRAstor: a Scalable Secondary garage. In rapid’09: courtroom docket times of the seventh USENIX convention on file and storage technology, pages 197–210, Berkeley, CA, the usa, 2009. USENIX affiliation. 2. T. Asaro and H. Biggar. Records De-duplication and Disk-to- Disk Backup systems: Technical and business enterprise corporation Considera- tions, 2007. The enterprise company approach institution. 3. “Restoring deduped records in deduplication systems,”http://searchdatabackup.Techtarget.Com/characteristic/Restoringdedupeddata-in-deduplication-structures, 2010. 4. A. Muthitacharoen, B. Chen, and D. Mazires. A low- bandwidth network report machine. In In court cases of the 18th ACM Symposium on working systems requirements (SOSP ’01, pages 174–187, big apple, the massive apple, u.S., 2001. ACM. 5. H. Biggar. Experiencing data De-Duplication: improving overall performance and reducing capability requirements, 2007. The business company technique organization. 6. F. C. Botelho, P. Shilane, N. Garg, and W. Hsu, “reminiscence inexperienced sanitization of a deduplicated garage device,” in Proc. USENIX fast, 2013. 7. M. Lillibridge, ok. Eshghi, D. Bhagwat, V. Deolalikar, G. Trezise, and P. Camble, “Sparse indexing: huge scale, inline deduplication the usage of sampling and locality,” in Proc. USENIX speedy, 2009. 8. D. Meister and A. Brinkmann, “dedupv1: improving deduplication throughput using strong united states of america drives (SSD),” in Proc. IEEE MSST, 2010. 9. W.C Preston, Backup & recuperation. O’Reilly Media, Inc., 2006. 10. F. Guo and P. Efstathopoulos, “constructing a immoderate common regular average performance deduplication tool,” in Proc. USENIX ATC, 2011. 11. X. Lin, G. Lu, F. Douglis, P. Shilane, and G. Wallace , “ Migratory compression: Coarse-grained information reordering to beautify compressibility ,” in proc USENIX speedy , 2012. 12. F. Guo and P. Efstathopoulos, “building a highperformance deduplication machine ,” in Proc. USENIX ACT, 2011. 13. S. Quinlan and S. Dorward. Venti: a contemporary. Technique to archival storage. In speedy’02: proceedings of the convention on record and garage generation, pages 89–one 0 one, Berkeley, CA, america, 2002. USENIX affiliation. 14. [14] F. C. Botelho, P. Shilane, N. Garg, and W. Hsu, “memory efficient sanitization of a deduplicated storage system,” in Proc. USENIX speedy, 2013. [15] M. Lillibridge, ok. Eshghi, D. Bhagwat, V. Deolalikar, G. Trezise, and P. Camble, “Sparse indexing: massive scale, inline deduplication the use of sampling and locality,” in Proc. USENIX rapid, 2009. [16] D. Meister and A. Brinkmann, “dedupv1: improving deduplication throughput using robust u . S . A . Drives (SSD),” in Proc. IEEE MSST, 2010. 15. M. Kaczmarczyk, M. Barczynski, W. Kilian, and C. Dubnicki, “lowering effect of information fragmentation because of in-line deduplication,”in Proc. ACM SYSTOR, 2012. Authors: V.Sathiya Suntharam, Ravi Kumar Chandu, S.Anitha

Paper Title: Resolution of Multi-Party Security Clashes in Social Networking Abstract: Topics shared through Social Media may also additionally furthermore impact a couple of customer's protection — e.G., images that depict numerous customers, feedback that kingdom numerous clients, sports activities in which numerous clients are invited, and masses of others. The nonappearance of multi- amassing insurance commercial enterprise agency assist in present day-day massive Social Media establishments makes customers not organized to correctly control to whom those items are clearly shared or now not. Computational gadgets that could merge the assurance tendencies of diverse clients proper into a lone tool for and problem can deal with this trouble. The ones strategies want to recall how customers would possibly sincerely go to a comprehension spherical a reaction for the dispute with a selected remaining objective to recommend exercising plans that can be palatable via maximum of the clients stricken by the factor to be shared. Modern-day strategies are both unreasonably bringing up or really preserve in thoughts adjusted strategies for conglomerating safety inclinations. Here we endorse the precept computational device to decide conflicts for multi-celebration safety organisation in Social Media that could follow large situations via displaying the concessions that clients make to perform a response for the disputes. We moreover gift involves fruition of a patron take a look at in which our proposed framework defeated unique present techniques to the quantity how generally each technique facilitated customers direct.

Keyword: Interactive multimedia, privacy, Social networking, Conflicts, Social media, Multi-celebration 16. protection References: 1. A. Besmer and H. Richter Lipford, “shifting beyond untagging: photo privacy in a tagged global,” in ACM CHI, 2010, pp. 1563– 100-104 1572. 2. okay. Thomas, C. Grier, and D. M. Nicol, “unfriendly: Multi-party privacy risks in social networks,” in privateness improving technology. Springer, 2010, pp. 236–252. [3] A. Lampinen, V. Lehtinen, A. Lehmuskallio, and S. Tamminen 3. facebook NewsRoom, “one thousand million- key metrics,” http://newsroom.Fb.Com/down load-media/4227, Retr. 26/06/2013. 4. A. Squicciarini, M. Shehab, and F. Percent, “Collective privacy manipulate in social networks,” in WWW. ACM, 2009, pp. 521– 530. 5. net.Org, “A interest on performance,” http://net.Org/efficiencypaper, Retr. 09/2014. 6. P. Wisniewski, H. Lipford, and D. Wilson, “fighting for my location: Coping mechanisms for sns boundary law,” in Proc. CHI. ACM, 2012, pp. 609–618. 7. H. Hu, G. Ahn, and J. Jorgensen, “Multiparty get right of entry to manipulate for online social networks: model and mechanisms,” IEEE TKDE, 2013. 8. A. Lampinen, V. Lehtinen, A. Lehmuskallio, and S. Tamminen, “We’re in it collectively: interpersonal manage of disclosure in social network offerings,” in Proc. CHI. ACM, 2011, pp. 3217– 3226. 9. P. Fong, “dating-primarily based definitely really genuinely get access to manipulate: protection model and coverage language,” in Procs. ACM CODASPY. ACM, 2011, pp. 191–202. 10. M. Sleeper, R. Balebako, S. Das, A. L. McConahy, J. Wiese, and L. F. Cranor, “The publish that wasn’t: exploring self- censorship on fb,” in complaints of the 2013 convention on pc supported cooperative artwork. ACM, 2013, pp. 793–802. 11. J. M. Such, Natalia Criado “ Resolving Multi-celebration privateness Conflicts in Social Media’’ 12. J. M. Such, A. Espinosa, A. Garcia-Fornes, and C. Sierra, “Self disclosure desire making based completely mostly on intimacy and privacy,” statistics Sciences, vol. 211, pp. Ninety three–111, 2012. 13. J. M. Such, A. Espinosa, and A. Garc´ıa-Fornes, “A survey of privacy in multi-agent structures,” The information Engineering assessment, vol. 29, no. 03, pp. 314–344, 2014. 14. [14] G. Danezis, “Inferring privateness guidelines for social networking offerings,” in proceedings of the second ACM workshop on safety and artificial intelligence. ACM, 2009, pp. 5–10 Authors: M.Laxmaiah, Teja, M.Narendra

Paper Title: An Effective Data Access Method for Public Cloud Data Storage Abstract: These days attribute-based encryption has been gotten as a promising strategy to give versatile and secure data to oversee the conveyed storage in the cloud registering environment. In the attribute-based encryption plan, the single property pro should execute the customer legitimacy check and mystery key flow, and thusly, its outcomes. Customers may be stuck in the believing that at a stretch get their mystery keys and choose to get the required data from Cloud. So as to maintain a strategic distance from the single-point execution bottleneck, we are proposing multi-master access control plan which will assess the issue such way that it gives increasingly successful access control on cloud data to the clients.

Keyword: Cloud Storage, Central Authority, Attribute Authority, Data Security References: 1. 1.Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Empowering customized look over Outsourced information with productivity change," IEEE Transactions on Parallel& Distributed Systems, vol.127, no.9, pp.2546– 2559, (2016). 2. Z. Fu, X. Sun, S. Ji, and G. Xie, "Towards productive substance mindful inquiry over scrambled outsourced information in the cloud," in Proceedings of 2016 IEEE Conference on Computer Communications (INFOCOM 2016). IEEE, pp. 1– 9, (2016). 3. 3.K. Xue and P. Hong, "A dynamic secure gathering sharing system out in the open distributed computing," IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 459– 470,( 2014). 4. 4 Y. Wu, Z. Wei, and H. Deng, "Ascribe based access to adaptable media in cloud-helped content sharing", IEEE Transactions on 17. Multimedia, vol. 15, no. 4, pp. 778– 788, (2013). 5. 5.J. Hur, "Enhancing security and proficiency in attribute-based information sharing," IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 10, pp. 2271– 2282, (2013). 105-109 6. 6 J. Hur and D. K.Noh, "Quality-based access control with proficient repudiation in information outsourcing frameworks," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214– 1221, (2011). 7. 7 J.Hong, K.Xue, W.Li, andY.Xue, "TAFC: Time and characteristic variables consolidated access control on time touchy information in broad daylight cloud," in Proceedings of 2015IEEE Global Communications Conference (GLOBECOM2015). IEEE, pp. 1– 6, (2015) 8. 8 Y. Xue, J. Hong, W. Li, K. Xue, and P. Hong, "LABAC: An area mindful property-based access control conspire for distributed storage," in Proceedings of 2016 IEEE Global Communications Conference (GLOBECOM 2016). IEEE, pp. 1– 6, (2016). 9. 9 A. Lewko and B. Waters, "Decentralizing property based encryption”, in Advances in Cryptology– EUROCRYPT2011. Springer, pp. 568– 588, (2011). 10. 10 K. Yang, X. Jia, K. Ren, and B. Zhang, "DAC-MACS: Effective information get to control for multi-expert distributed storage frameworks," in Proceedings of 2013 IEEE Conference on Computer Communications (INFOCOM 2013). IEEE, pp. 2895– 2903, (2013) 11. 11 J. Chen and H. Mama, "Effective decentralized attribute based get to control for distributed storage with client denial," in Proceedings of 2014 IEEE International Conference on Communication (ICC2014), pp. 3782– 3787. 12. 12 M. Pursue and S. S. Chow, "Enhancing protection and security in multi-expert trait based encryption," in Proceedings of the sixteenth ACM meeting on Computer and Communications Security (CCS 2009). ACM, pp. 121– 130,(2009). 13. 13 M.Lippert, E.G. Karatsiolis, A. Wiesmaier, and J. A. Buchmann, "Registry based enrollment in broad daylight key foundations." in Proceedings of the Fourth International Workshop for Applied PKI(IWAP2005), pp.17– 32,(2005) 14. 14 W. Li, K.Xue, Y.Xue, and J. Hong, "TMACS: A vigorous and evident edge multi-expert access control framework in broad daylight distributed storage," IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 5, pp. 1484– 1496, 2016. 15. Kaiping Xue, Jianan Hong, Yingjie Xue, David S.L. Wei, Nenghai Yu, Peilin Hong, "CABE: A New Comparable Attribute- Based Encryption Construction with 0-Encoding and 1-Encoding", Computers IEEE Transactions on, vol. 66, no. 9, pp. 1491- 1503, 2017. 18. Authors: M. Nagageetha, Nagaraja Kumar Pateti

Paper Title: Machine Learning Applications on Agricultural

Abstract: The focal point of this investigation is the structure and advancement of viable undertakings, 110-122 running from yield collect and estimating to absent or wrong sensors information remaking, abusing and contrasting different machine learning procedures with recommend toward which heading to use endeavors and speculations. To deal with a blended data and information originating from genuine datasets that gather a sensor and physical qualities. As beneficial organizations, open or private, huge or little need expanding productivity with costs decrease, finding suitable approaches to misuse information that are ceaselessly recorded and influenced accessible to can be the correct decision to accomplish these objectives. Agrarian field is just clearly obstinate to the advanced innovation and the "shrewd homestead" demonstrate is progressively across the board by misusing the Internet of Things (IoT) worldview connected toward ecological moreover verifiable data from side to side time-arrangement. The outcomes demonstrate how there are sufficient edges for development while supporting solicitations and necessities originating from organizations that desire to utilize a practical and enhanced horticulture mechanical business, putting in innovation, as well as in the information also in talented labor force compulsory to remove the greatest from it.

Keyword: machine education; sensors; IoT; elegant ranch; farming; information examination References: 1. Censimento Della Agricoltura. Available online: http://censimentoagricoltura.istat.it (accessed on 3 May 2018). 2. Classificazione Delle Attività Agricole. Available online: http://www.codiciateco.it/coltivazioni-agricole- e- produzione-di- prodotti-animali--caccia-e-servizi-connessi/A-01 (accessed on 15 August 2018). 3. Sundmaeker, H.; Verdouw, C.; Wolfert, S.; PrezFreire, L. Internet of Food and Farm 2020. In Digitising the Industry—Internet of Things Connecting Physical, Digital and Virtual Worlds; River Publishers: Gistrup, Denmark, 2016; Volume 2. 4. Wolfert, S.; Ge, L.; Verdouw, C.; Bogaardt, M.-J. Big data in smart farming a review. Agric. Syst. 2017,153, 69–80. [CrossRef] 5. Biradarand, H.B.; Shabadi, L. Review on IoT based multidisciplinary models for smart farming. In Proceedings of the 2nd IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT), , India, 19–20 May 2017; pp. 1923–1926. 6. Ramya, R.; Sandhya, C.; Shwetha, R. Smart farming systems using sensors. In Proceedings of the 2017 IEEE Technological Innovations in ICT for Agriculture and Rural Development (TIAR), , India, 7–8 April 2017; pp. 218–222. 7. Yoon, C.; Huh, M.; Kang, S.G.; Park, J.; Lee, C. Implement smart farm with IoT technology. In Proceedings of the 20th International Conference on Advanced Communication Technology (ICACT), Chuncheon-si Gangwon- do, Korea, 11–14 February 2018; pp. 749–752. 8. Arkeman, Y.; Utomo, H.A.; Wibawa, D.S. Design of web-based information system with green house gas analysis for palm oil biodiesel agroindustry. In Proceedings of the 3rd International Conference on Adaptive and Intelligent Agroindustry (ICAIA), Bogor, Indonesia, 3–4 August 2015; pp. 238–244. 9. Amanda, E.C.R.; Seminar, K.B.; Syukur, M.; Noguchi, R. Development of expert system for selecting tomato (Solanum lycopersicum L.) varieties. In Proceedings of the 3rd International Conference on Adaptive and Intelligent Agroindustry (ICAIA), Bogor, Indonesia, 3–4 August 2015; pp. 278–283. 10. Nurulhaq, N.Z.; Sitanggang, I.S. Sequential pattern mining on hotspot data in Riau province using the prefixspan algorithm. In Proceedings of the 3rd International Conference on Adaptive and Intelligent Agroindustry (ICAIA), Bogor, Indonesia, 3–4 August 2015; pp. 257–260. 11. Murphy, F.E.; Popovici, E.; Whelan, P.; Magno, M. Development of an heterogeneous wireless sensor network for instrumentation and analysis of beehives. In Proceedings of the 2015 IEEE International Instrumentation and Measurement Technology Conference (I2MTC), Pisa, Italy, 11–14 May 2015; pp. 346–351. 12. Saha, A.K.; Saha, J.; Ray, R.; Sircar, S.; Dutta, S.; Chattopadhyay, S.P.; Saha, H.N. Iot-based drone for improvement of crop quality in agricultural field. In Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 8–10 January 2018; pp. 612– 615. 13. Monsanto. Available online: https://monsanto.com/ (accessed on 3 May 2018). 14. Farmlink. Available online: https://farmlink.net/ (accessed on 3 May 2018). 15. Farmlogs. Available online: https://farmlogs.com/ (accessed on 3 May 2018). 16. Lesser, A. Big Data and Big Agriculture; Gigaom Research: San Francisco, CA, USA, 2014. 17. Patil, S.S.; Thorat, S.A. Early detection of grapes diseases using machine learning and IoT. In Proceedings of the 2nd International Conference on Cognitive Computing and Information Processing (CCIP), Mysore, India, 12–13 August 2016; pp. 1–5. 18. Truong, T.; Dinh, A.; Wahid, K. An IoT environmental data collection system for fungal detection in crop fields. In Proceedings of the IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), Windsor, ON, Canada, 30 April–3 May 2017; pp. 1–4. 19. Sarangdhar, A.A.; Pawar, V.R. Machine learning regression technique for cotton leaf disease detection and controlling using IoT. In Proceedings of the 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, 20–22 April 2017; Volume 2, pp. 449–454. 20. Satamraju, K.P.; Shaik, K.; Vellanki, N. Rural bridge: A novel system for smart and co-operative farming using IoT architecture. In Proceedings of the 2017 International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT), Aligarh, India, 24–26 November 2017; pp. 22–26 21. Kaishi, S.K. Big data analysis medical, agriculture, in the environmental field. Seibutsu-kogaku Kaishi 2014, 92, 92–93. 22. Istat—National Institute of Statistics/CC-BY-SA-3.0. Available online: dati.istat.it/ (accessed on 3 May 2018). 23. CNR—National Research Council/CC-BY-SA-3.0. Available online: http://data.cnr.it/site/data (accessed on 3 May 2018). 24. Industrial IoT Sensors Dataset. Unpublished data 2018.Junior, S.L.D.; Cecatto, J.R.; Fernandes, M.M.; Ribeiro, M.X. SeMiner: A Flexible Sequence Miner Method to Forecast Solar Time Series. Information 2018, 9, 8. [CrossRef] 25. Ma, L.; Gu, X.; Wang, B. Correction of Outliers in Temperature Time Series Based on Sliding Window Prediction in Meteorological Sensor Network. Information 2017, 8, 60. Authors: Mohd. Shahbaz Khan, Nagageetha, M.Gurunadha Babu

Paper Title: Bluetooth Control Cleaning Robot using Arduino Abstract: Main determination of this research is to style the work automatic, scrubbing is a very tough job it requires lot of patience and lot of persons to clean and in cleaning a person may damage his/her healthiness, cleaning is more time taking work. To do the work easily we have developed the robot & it is designed in such a way that it can clean house, offices, apartments, cellars ,and even streets as well. The person who is standing far gone of the cleaning area is monitoring the robot . This design include of DC motors, servo motor brushes, tub, scrub, LED light, battery, water pump, Arduino and Bluetooth for wireless communication ,mobile phone . 19. Keyword: mobile phone ,Android applications, Bluetooth model, DC motor ,servo motor , LM293D 123-125 References: 1. Jens-Steffen Gutmann , Kristen Culp , Mario E. Munich and Paolo Pirjanian. The Social Impact of a Systematic Floor Cleaner . In IEEE international workshop on advance robotics and its social impacts , Technische University munchen, Germany May 21- 23,2012. 2. J Frolizzi C.Disalvo. Service robots in the domestic environment: A study of Roomba vacuum in the home”. In int. conference on human robot interaction HRI, PAGE 258-265 March 2006. 3. H.Asada and J.-J E. Slotin, robot analysis and control, a wiley-interscience publication, 1986, pp. 29-49. 4. Karthick. T. Ravi Kumar. A, Selvakumar. L, Viknesh. T “Simple Autonomous Cleaner Robot” International journal of Science, Engineering & Technology Research (IJSER), Vol.4. Issue 5 May 2015 5. Uman Khalid, Haseeb Haider, Tahseen Amin Khan Qasuria “ Smart Floor Cleaning Robot (CLEAR)” in IEEE standard 2015. 6. Naman Aggrawal, Piyusha Chaudhari, Akshay Mahalkar “Review Paper Based on Cleaning Robot”, vol.3 No.5 May 2016. 7. Marneet Kaur, Preeti abrol “Development of floor cleaner robot (Automatic and manual)”, July 2014 20. Authors: D Khalandar Basha, T Venkateswarlu

Paper Title: Image Restoration by Linear Regression for Gaussian Noise Removal from Natural Images

Abstract: Image restoration improves the features information of degraded or corrupted image. The 126-130 degradation of image because of addition of noise when acquiring the image. Many algorithms are developed by many researches. In this paper image is corrupted by Gaussian noise to generate degraded image. The image is restored from this degraded image by supervised learning based algorithm. Few images are considered for training the dictionary with each element of size 9x9. The degraded image is considered patch by patch for restoring the patch from the trained set of images by support vector machine. The quality assessment of the image done by comparing the quality matrices like mean square error, root mean square error, peak signal to noise ratio, structural similarity index measure and feature similarity index measure. In this paper the images are considered are cameraman, house, Lena, Barbara and Parrot.

Keyword: Image restoration, Dictionary Learning, About six key words separated by commas (Minimum 4 key words) References: 1 Bouhamidi, Abderrahman, Rentsen Enkhbat, and Khalide Jbilou. "Conditional gradient Tikhonov method for a convex optimization problem in image restoration." Journal of Computational and Applied Mathematics 255 (2014): 580-592. 2 Dharmarajan, R., and K. Kannan. "A hypergraph-based algorithm for image restoration from salt and pepper noise." AEU- International Journal of Electronics and Communications 64.12 (2010): 1114-1122. 3 Paul, Grégory, Janick Cardinale, and Ivo F. Sbalzarini. "Coupling image restoration and segmentation: a generalized linear model/Bregman perspective." International journal of computer vision 104.1 (2013): 69-93. 4 Chang, Herng-Hua, Cheng-Yuan Li, and Audrey Haihong Gallogly. "Brain MR Image Restoration Using an Automatic Trilateral Filter With GPU-Based Acceleration." IEEE Transactions on Biomedical Engineering 65.2 (2018): 400-413. 5 K. Dabov, A. Foi, V. Kat kovnik, and K. Egiazarian, “Image denoising by sparse 3D transform-domain collaborative filtering,” IEEE Trans. on Image Process., vol. 16, no. 8, pp. 2080–2095, Aug. 2007. 6 Y. Chen, K. Liu, “Image Denoising Games,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 23, no. 10, pp. 1704–1716, Oct. 2013. 7 J. Dai, O. Au, L. Fang, C. Pang, F. Zou and J. Li, “Multichannel nonlocal means fusion for color image denoising,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 23, no. 11, pp. 1873–1886, Nov. 2013. 8 L. Rudin, S. Osher, and E. Fatemi, “Nonlinear total variation based noise removal algorithms,” Phys. D, Nonlinear Phenomena, vol. 60, nos. 1–4, pp. 259–268, Nov. 1992. 9 A. Chambolle, “An algorithm for total variation minimization and applications,” J. Math. Imag. Vis., vol. 20, nos. 1–2, pp. 89–97, Jan./Mar. 2004. 10 35V. Vapnik, The Nature of statistical learning Theory, Springer, New York, 1995 11 36V. Vapnik, Statistical learning Theory, Wiley, Springer, New York, 1998 12 Sánchez, A.S., Nieto, P.G., Fernández, P.R., del Coz Díaz, J.J. and Iglesias-Rodríguez, F.J., 2011. 13 Application of an SVM-based regression model to the air quality study at local scale in the Avilés urban area (Spain). Mathematical and Computer Modelling, 54(5-6), pp.1453-1466. 14 Wu, Jianxin, and Hao Yang. "Linear regression-based efficient SVM learning for large-scale classification." IEEE transactions on neural networks and learning systems 26.10 (2015): 2357-2369. 21. Authors: Praveen Kumar.G, S K Mohan Rao, B.V.Swathi Improved Privacy Protecting in Distributed Grid Data Resource using Multiplicative Perturbation Paper Title: Based on Frequent Decision Classifier Abstract: The enormous amount of data process in distributed grid resource holds sensitive information 131-139 on centralized access. The common privacy standard needs advancement to protect the sensitive data in various sectors like sharing, legal privacy and policies to access the data. The privacy standards depend the Distributed Data Mining (DDM) approaches like Association Rule Mining algorithms (ARM), clustering, and classification methods to preserve the data from unauthorized access. But the security standards have lacked privacy- preserving rules due to high dimensionality problems of data access leads more time complexity. To overcome the problem, to propose a Multiplicative Perturbation Swapping method based on Frequent Decision Classifier (MPS-FDC). This method is adaptive to data publishing secrecy to hold the privacy standards better than association rule prediction. This optimization resolves the forecasting leakages based on Persuasive Privacy Preserving Data Mining (P2PDM) to secure the data. Which this technique initially does the sanitization to reduce the dimensionality to remove un-variant the outliers. The data perturbation keeps the original data to modify using supportive noise delimiters with state matrix distortion (SMD). So the original data keep safe without effect from the outliers. The frequent rule prediction decides to classify the recurrentdata from unauthorized access to disclosing crypto- privacy policy. The proposed system improves the privacy standard compared to the ARM specification rules.

Keyword: privacy-preserving, data mining, perturbation, swapping, forecasting, sanitization, decision classifiers. References: 1. H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, ‘‘on the privacy-preserving properties of random data perturbation techniques,'' in Proc. 3rd IEEE Int. Conf. Data Mining, Nov. 2003, pp. 99–106. 2. Stanley, R. M. O. and R. Z Osmar, "Towards Standardization in Privacy Preserving Data Mining," Published in Proceedings of 3rd Workshop on Data Mining Standards, WDMS' 2004, USA, p.7-17. 3. E. Bertino and I. N. Fovino, ‘‘Information driven evaluation of data hiding algorithms,’’ in Proc. Int. Conf. Data Warehousing Knowl. Discovery, 2005, pp. 418–427. 4. Helger Lipmaa,” Cryptographic Techniques in PrivacyPreserving Data Mining," University College London, Estonian Tutorial 2007 5. C. C. Aggarwal and P. S. Yu, ‘‘A general survey of privacy-preserving data mining models and algorithms,’’ in Privacy- Preserving Data Mining. New York, NY, USA: Springer, 2008, pp. 11–52. 6. B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, ‘‘Privacy-preserving data publishing: A survey of recent developments,’’ ACM Comput. Surveys., vol. 42. no. 4, pp. 14:1–14:53, 2010. 7. Yaping L, Chen M, Li Q, Zhang W. Enabling Multilevel Trust in Privacy Preserving Data Mining. IEEE Transactions on Knowledge and Data Engineering. 2012, September; 24(9), 1598 – 1612 8. Shikha Sharma & Pooja Jain, "A Novel Data Mining Approach for Information Hiding," International Journal of Computers and Distributed Systems, Vol. No.1, Issue 3, October 2012 9. C.V.Nithya and A.Jeyasree, "Privacy-Preserving Using Direct and Indirect Discrimination Rule Method," Vivekanandha College of Technology for WomenNamakkal India, International Journal of Advanced Research in Computer Science and Software Engineering, vol.3 issue 12,2013. Authors: Azhar Talha Syed, Suresh Merugu

Paper Title: Augmented Reality on Sudoku Puzzle using Computer Vision and Deep Learning Abstract: Many people try solving Sudoku puzzles everyday. These puzzles are usually found in newspapers, magazines and so on. Whenever a person is unable to solve a puzzle or is running short on time to solve the puzzle, it will be very convenient to show the solved puzzle as an augmented reality. Objectives: In this paper, we propose an optimal way of recognizing a Sudoku puzzle using computer vision and Deep Learning, and solve the puzzle using constraint programming and backtracking algorithm to display the solved puzzle as augmented reality. Also, a comparative performance analysis with the previous work is provided with this paper. Methods: In order to implement augmented reality on to the Sudoku puzzle, image classification itself won’t be sufficient as the solved puzzle has to be shown on top of the area of the unsolved puzzle in the original image. So puzzle detection has to be performed and for doing so we used CNN and Object Localization algorithms. After the detection we stored the values detected in each 9x9 cells and ran a constraint programming and backtracking algorithm to solve the puzzle and finally filled the detected empty cells with correct values of the solved puzzle. Applications/Improvements: Usually the Sudoku puzzles that we find in newspapers and magazines are surrounded by a lot of noise such as text (characters) irrelevant to the puzzle and borders of the newspaper which could be similar to a Sudoku puzzle structure. In this paper we emphasise on how to handle such disturbances and improve the performance.

Keyword: Object Localization, Sudoku, CNN, Augmented Reality, Computer Vision References: 1. Andrew Ng. Lecture on “Object Localization” in the course “Convolutional Neural Networks”. [Online]. Avail- able:https://www.youtube.com/watch?v=GSwYGkTfOKk. 2. J. R. R. Uijlings, K. E. A. van de Sande,T. Gevers, A. W. M. Smeul- ders.”Selective Search for Object Recognition” in international journal of Computer Vision, September 2013, Volume 104, Issue 2, pp 154–171. 3. Joseph Redmon, Santosh Divvala, Ross Girshick, Ali Farhadi. “You Only Look Once: Unified, Real-Time Object Detection” in The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016, pp. 779-788. 4. Shaoqing Ren, Kaiming He, Ross Girshick, Jian Sun. “Faster R-CNN: Towards Real-Time Object Detection with Region 22. Proposal Networks” in Advances in Neural Information Processing Systems 28 (NIPS 2015). 5. Alex Krizhevsky, Ilya Sutskever, Geoffrey E. Hinton. “ImageNet Classification with Deep Convolutional Neural Networks” in Advances in neural information processing systems 25(2). [Online]. Available: https://papers.nips.cc/paper/4824-imagenet- 140-145 classification-with-deep- convolutional-neural-networks.pdf. 6. The MNIST Dataset. By Yann LeCun, Corinna Cortes and Christopher J.C. Burges. [Online]. Available: http://yann.lecun.com/ exdb/mnist/. 7. Michael Nielsen, in his book Neural Networks and Deep learning - Chapter 3 - Overfitting and Regularization 8. Kaiming He, Xiangyu Zhang, Shaoqing Ren, Jian Sun. in “Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification” The IEEE International Conference on Computer Vision (ICCV), 2015, pp. 1026-1034. 9. Helmut Simonis. “Sudoku as constraint problem” paper presented at the Eleventh International Conference on Principles and Practice of Constraint Programming. 10. Rhollor. ”Sudokusolver”. GitHub. Rhollor. Retrieved 8 December 2016. 11. Andrew Ng. Lecture on “Object Detection” in the course “Convolutional Neural Networks”. [Online]. Available: https://www.youtube.com/watch?v=5e5pjeojznk 12. Pramod J Simha, Suraj K v, and Tejas Ahobala, “Recognition of numbers and position using image processing techniques for solving Sudoku Puzzles” in IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM - 2012) 13. Snigdha Kamal, Simarpreet Singh Chawla, Nidhi Goel proposed, “De- tection of Sudoku Puzzle using Image Processing and Solving by Back- tracking, Simulated Annealing and Genetic Algorithms: A Comparative Analysis” in 2015 Third International Conference on Image Information Processing (ICIIP). 14. A. Van Horn, ”Extraction of sudoku puzzles using the hough trans- form”, University of Kansas, Department of Electrical Engineering and Computer Science, Tech. Rep., 2012. 15. Baptiste Wicht and Jean Hennebert, “Mixed handwritten and printed digit recognition in Sudoku with Convolutional Deep Belief Network” in 2015 13th International Conference on Document Analysis and Recognition (ICDAR). 16. Merugu S., Reddy M.C.S., Goyal E., Piplani L. (2019) Text Message Classification Using Supervised Machine Learning Algorithms. In: Kumar A., Mozar S. (eds) ICCCE 2018. Lecture Notes in Electrical Engineering, ISSN 1876-1100, Vol. 500. Springer, Singapore. 17. Yadav B.C., Merugu S., Jain K. (2019) Error Assessment of Fundamental Matrix Parameters. In: Kumar A., Mozar S. (eds) ICCCE 2018. Lecture Notes in Electrical Engineering, ISSN 1876-1100, Vol. 500. Springer, Singapore. 18. Sharma S.K., Jain K., Suresh M. (2019) Quantitative Evaluation of Panorama Softwares. In: Kumar A., Mozar S. (eds) ICCCE 2018. Lecture Notes in Electrical Engineering ISSN 1876-1100, Vol. 500. Springer, Singapore. 19. Suresh Merugu and Kamal Jain, “Colorimetry-based edge preservation approach for color image enhancement,” Journal of Applied Remote Sensing, (SPIE) 20. Suresh Merugu, Kamal Jain, 2015, “Semantic Driven Automated Image Processing using the Concept of Colorimetry”, Second International Symposium on Computer Vision and the Internet (VisionNet’15), Procedia Computer Science 58 (2015) 453 – 460 23. Authors: Gajula Lakshminarayana, Moparthy Gurunadha Babu, Anupama A. Deshpande

Paper Title: Design a High Speed Multiplier using Two Phase PPA Abstract: Basically, multiplier is an efficient superconductor logic which performs various switching 146-149 operation. Here different types of adders are analysed using different methodologies. In this paper we introduced a multiplier using proposed PPA. It uses parallel prefix adders in their reduction phase and it is an effective system for faster results and optimised. The entire operation of proposed system depends upon three stages they are multiplier partial product generation, reduction stages and parallel prefix adder which is discussed in below sections. The delay gets reduced by achieving low logical depth in the system. So the Proposed system reduces the delay. From the proposed system we can observe that there is a reduction in delay and complexity. Compared to ripple carry adder and carry save adder, proposed system gives better results.

Keyword: PPA, VLSI, DSP, Partial Product Generation (PPG). References: 1 Paldurai.K, Dr.K.Hariharan, “FPGA Implementation of Delay Optimized Single Precision Floating point Multiplier,” Proceedings of International Conference on Advanced Computing and Communication Systems ,Coimbatore, January 2015. 2 Josmin Thomas,R. Pushpangadan, Jinesh.S Comparative Study of Performance Vedic Multiplier on The Basis of Adders Used”Proceedings of International Conference on Electrical and Computer Engineering, Bangladesh ,vol.2,pp.325-328, Dec 2015. 3 Bhavesh Sharma,Amit Bakshi,”Comparison of 24X24 Bit Multipliers for Various Performance Parameters”, Proceedings of International Conference on Advent Trends in Engineering, Science and Technology, Maharashtra, pp.146-149, Mar 2015. 4 Y. Srinivasa Rao, M. Kamaraju, D V S Ramanjaneyulu, “An FPGA Implementation of High Speed and Area Efficient Double- Precision Floating Point Multiplier Using Urdhva Tiryagbhyam Technique” ,Proceedings of International Conference on Power, Control, Communication and Computational Technologies for Sustainable Growth , Kurnool ,pp.271-276, Dec 2015. 5 Dr.Uma B V, Harsha R Kamath, Mohith S, Sreekar V, Shravan Bhagirath, “Area and Time Optimized Realization of 16 Point FFT and IFFT Blocks by using IEEE 754 Single Precision Complex Floating Point Adder and Multiplier”, Proceedings of International Conference on Soft Computing Techniques and Implementations,Faridabad,pp.99-104,Oct 2015. 6 Neelima Koppala1, Rohit Sreerama, PaidiSatish,”Performance Comparison of Fast Multipliers Implemented on Variable Precision Floating Point Multiplication Algorithm”, International Journal of Computer Applications in Engineering Sciences, vol.2, pp-55-59,2012. 7 Kanhe, S. Das, and A. Singh, “Design and implementation of floating point multiplier based on vedic multiplication technique,” Proceedings of International Conference on Communication, Information Computing Technology, Mumbai, pp.1–4., Oct 2012. 8 A.M.Mehta, C. Bidhul, S. Joseph, and P. Jayakrishnan, “Implementation of single precision floating point multiplier using karatsuba algorithm,” Proceedings of International Conference on Green Computing, Communication and Conservation of Energy, pp.254–256, Dec 2013. 9 Sushma.S Mahakalkar, Sanjay L.Haridas,”Design of High Performance IEEE 754 Floating Point Multiplier using Vedic mathematics‟, Proceedings of International conference on computational Intelligence and Communication Networks”, Brazil, pp.985-988, 2014 10 =VinodBuddhe,PrasannaPalsodkar,PrachiPalsodakar, ”Design and Verification of Dadda Algorithm Based Binary Floating Point Multiplier”, Proceedings of International Conference on Communication and Signal Processing, Chennai, Apr 2014. 24. Authors: M.Gurunadhababu, G.Archanadevi, Mahendra P. Sharma

Paper Title: Secure and Efficient Routing Protocol (E-ARAN) for Ad-Hoc Network

Abstract: The working scope of Ad-hoc system will spread in coming future because of dynamic nature. 150-153 Be that as it may, there will be the danger of spreading incorrectly directing data, bundle dropping and particular sending in the system which further prompts exceptional sort of assaults [1]. Existing validated directing conventions for Ad-hoc system neglects to identify and guard against such sort of assaults in the portable impromptu system. In this manner, if pernicious hub hack the bundles and make the changes , deliberately drop control or information parcels, the present determination of existing steering conventions can't identify or protect against such verified egotistical nodes. This shortcoming in ARAN detail will bring about the aggravation of the impromptu system and the misuse of the system data transfer capacity. In this examination paper, an answer is proposed to represent this sort of assaults.

Keyword: AHN-Ad-hoc arrange, ARAN-Authenticated Routing Protocol for Ad-hoc Network, TTP-Trusted Third Party, RDP-Route Discovery Packet, REP-Route Reply Packets References: 1 R. Hauser, A. Przygienda and G. Tsudik, "diminishing the tempo of protection in afwiwireless united states of america coordinating", In Symposium on community and assigned structures nicely-being (NDSS ‟90 seven), San Diego, California, internet Society, pp 90 3–99, February 1997. 2 A. Kush, "safety factors in ad hoc Routing" , computer Society of India Communications, Vol. three No 2 hassle eleven, pp 29- 33, March 2018. 3 A. Kush, "protection And ubiquity Schemes In advert-Hoc Networks Routing" international diary of records time and gaining knowledge of control, diploma 2, No. 1, pp 185-189, June 2009. 4 T. Karygiannis and L. Owens, "a ways off network protection", NIST one of a kind virtual e-book, pp 800-848, November 2002. 5 Yonguang Zhang and Wenke Lee, "Interference ubiquity in an extended way flung specifically unique systems", In 6th international amassing on cell Computing and Networking (MOBICOM‟00), pp 275–283, August 2000. 6 A. Kush, C. Hwang and P. Gupta, "tried Routing Scheme for Adhoc Networks" global mag of pc hypothesis and Engineering (IJCTE), amount three, pp 1793-1799, might also moreover moreover likewise 2009. 7 P. Papadimitratos and Z. J. Haas, "loosened up guidance for convenient uniquely unique systems", SCS verbal alternate Networks and distributed systems Modeling and Simulation gathering (CNDS 2002), January 2002. 8 PanagiotisPapadimitratos and Zygmunt J. Haas, "comfy message transmission in adaptable uniquely particular frameworks", Elsevier diary of Adhoc orchestrate, specially appointed Networks 1, pp 193–209, 2003. 9 Fei Hu and Neeraj okay. Sharma, "protection examinations in off the cuff sensor systems" Elsevier magazine of ad hoc Networks, impromptu Networks 3, pp 69–89, 2005. 10 B. Dahill, B. N. Levine, E. Royer and C. Shields, "A protected coordinating meeting for off the cuff structures", Technical archive UM-CS-2001-037, college of Massachusetts, part of laptop generation, August 2001. 11 Y. C. Hu, A. Perrig and D. B. Johnson, "Ariadne: A secured on-call for course show for basically determined on frameworks", Technical record TR01-383, Rice college, December 2001. 12 A. Perrig, R. Canetti, D. track and D. Tygar, "talented and loosened up inventory acclaim for multicast", In people organization and apportioned framework protection Symposium (NDSS‟01), February 2001. 13 D. B. Johnson et al., "The dynamic stock steerage assembly for adaptable especially determined on systems (DSR)", internet Draft, MANET operating social occasion, February 2002. 14 R. Perlman, "Lack tolerant supply of direction realities", In pc Networks, No. 7, pp 395–405. 15 Animesh Kr Trivedi1, Rishi Kapoor1, Rajan Arora1, Sudip Sanyal1 and SugataSanyal , " RISM - notoriety based sincerely Intrusion Detection machine for transportable Adhoc Networks" to be had from wi-filiationwireless prowi-file.Iiita.Ac.In/aktrivedi_b03/rism.Pdf. 16 Sameh R. Zakhary and Milena Radenkovic ,"Reputationbased wellbeing accumulating for MANETs in substantially flexible branch slanted situations" in international accumulating on wireless On-name for gadget structures and administrations (WONS), PP. 161 – 167, Feb. 2010. [17]. Ns2 - www.Isi.Edu/nsnam/ns/ns-instructional workout/academic exercising 02. Authors: E John Alex, A. Phani Kumar

Paper Title: Fredkin Gates Based Testable Reversible Shift Registers Abstract: in this paper, we recommend the connection of testable skip registers counting on conformist purpose passages. The proposed detour registers trouble to coordinate protection gateways can play out the flow registers located out in antique fashion entries to the quantity testability. Any reduction lower once more to convey down some unique time circuit situation to those slight method of thinking doors is probably preferred for normal unidirectional stuck-at deficiencies making use of awesome take a look at vectors. those are all of the 1s, and all of the 0s. The systems of vectors testable skip registers are common. The significance of the proposed sketches exists within the way that it offers the relationship of reversible genuinely testable circle registers for any clung in charge via manner of techniques for method for mind boggling test vectors, there with the useful asset of getting out the critical for an series course get valid of get segment to inner reminiscence cells. The execution of ace slave turn-tumbles and twofold detail started out turn-bungles moreover characterised within the paper.

Keyword: Reversible approach for thinking, Conservative reputation quo, Fredkin entryway References: 1 J. Ren and V. proper sufficient. Semenov, "development with huge and intelligibly reversible superconducting propelled circuits," IEEE Trans. Appl. extremely good lead., vol. 21, no. three, pp. 780–786, Jun. 2011. 2 S.F. Murphy, M. Ottavi, M. real, and E. DeBenedictis, "at the affiliation of reversible QDCA structures," Sandia countrywide Laboratories, Albuquerque, NM, Tech. Rep. SAND2006-5990, 2006. 3 H. Thapliyal and N. Ranganathan, "Reversible cause primarily based in reality absolutely clearly all the whilst 25. testable snares for nuclear QCA," IEEE Trans. Nanotechnol., vol. 9, no. 1, pp. Sixty – 69, Jan. 2010. 4 P. Tougaw and C. Credited, "affordable gadgets completed utilizing quantum portable automata," J. Appl. Phys., vol. seventy five, no. three, pp. 1818–1825, Nov.1994. 154-163 5 P. Tougaw and C. Credited, "unique behavior of quantum mobile automata," J. Appl. Phys., vol. 80, no. 8, pp. 4722–4736, Oct. 1996. 6 M. B. Tahoori, J. Huang, M. Momenzadeh, and F. Lombardi, "situating out of quantum mobile automata," IEEE Trans. Nanotechnol., vol. three, no. four, pp. 432–442, Dec. 2004. 7 G. Swaminathan, J. Aylor, and B. Johnson, "Synchronous giving a shot of VLSI circuits the usage of preservationist motive," in Proc. Int. Conf. Comput. Plan, Cambridge, MA, Sep. 1990, pp. 60–sixty five. 8 E. Fredkin and T. Toffoli, "slight cause," Int. J. Theor. Phys., vol. 21, nos. 3–4, pp. 219–253, 1982. 9 P. Kartschoke, "usage issues in moderate purpose structures," M.S. idea, Dept. Electr. Eng., Univ.Virginia, Charlottesville, 1992. 10 G. Swaminathan, "Concurrent screw up distinguishing proof systems the usage of stability," M.S. speculation, Dept. Electr. Eng., Univ. 11 Virginia, Charlottesville, 1989. [11] H. Thapliyal, M. B. Srinivas, and M. Zwolinski, "A start in the reversible rationalization general of sequential circuits," in Proc. Int. Conf. Armed strain Aerosp. Programming machine software application. reason gadgets, Washington, DC, Sep. 2005, pp. 1–5. 12 S. Mahammad and as it must be sufficient. Veezhinathan, "growing at the net testable circuits using reversible goal," IEEE Trans. Instrum. Meas., vol. fifty nine, no. 1, pp. One 0 one–109, Jan. 2010. 13 H. Thapliyal and N. Ranganathan, "Plan of reversible modern Circuits propelling quantum fee, deferment and refuse yields," ACM J. Emerg. Technol. Comput. Syst., vol. 6, no. four, pp. 14:1–14:35, Dec. 2010. 14 M. Hasan, A. Islam, and A. Chowdhury, "shape and test of on the internet Testability of reversible modern circuits," in Proc. Int. Conf. Comput. Inf. Technol., Dec. 2009, pp. one hundred and 80–185. 15 M. Pedram, Q. Wu, and X. Wu, "all of-a-kind plan for twofold attitude actuated flip-flops," in Proc. Asia South Pacific design Autom. Conf., 1998, pp. 417-421.

26. Authors: N. Neelima, K Niranjan Reddy, A Shivaprasad, D.Prasanth Varma

Paper Title: TMQI and Structural Fidelity for Tone Mapped Images

Abstract: The use of HDR imaging is sharpening off as frequently as doable clearly identified in a few 164-169 domain names and cutoff of the cutting-edge-day-day modernized digital digicam devices are making HDR photographs. With the guide of a whole way most through a long way of the presentation gadgets financially open are not dealt with to show HDR photos. Any greater, HDR pix need to be tone mapped to show them on because of this available LDR appears. in this paper, 5 specific tone mapping operators(TMO, for example, Gamma update, Reinhard, Raman, drago, Ashikhmin are related to HDR image to make LDR photographs that can be hooked up on modified over grandstand off gadgets. The reason excellent parameters, as an example, PSNR, mPSNR, Structural consistency, Tone Mapped first elegance Index (TMQI) are reviewed and for each approach, dating of the consequences is finished.

Keyword: HDR, LDR, TMO, TMQI, Structural confirmation References: 1. Hojatollah Yeganeh, Zhou Wang, "purpose awesome evaluation of Tone-Mapped photographs, "IEEE trades on photograph overseeing, Vol.,22, No. 2, pp:657-667, Febrauary 2013. 2. F Drago, W L Martens, k Myszkowski and HP Seidal, "Perceptual appraisal of tone mapping overseers", in proc. SIGGGRAPH conf. Layouts Appl.,2003. 3. Francesco Banterle, Alessandro Artusi, Kurt Debattista, Alan Chalmers, "Impelled radical Dynamic range Imaging:concept and practice", An o.adequate. Peters Ltd., 2011 4. E.Reinhard, M Stark, P Shirley and J Ferwerda, "Photographic tone multiplication for unrivaled images", Proc. 29th Annu. Conf. Comput. Graph. Interface. Tech.,Vol.21, pp.267-276, 2002. 5. F.Drago, exact enough Myszkowski, T Annen and N chiba, "adaptable logarithmic mapping for demonstrating exorbitant multifaceted nature scenes", Comput. define. amassing, Vol. 22, no. three, pp.419-426,2003. 6. Shanmuganathan Raman, subhasis Chaudhuri,"Bilateral get out basically based totally absolutely Compositing for Variable presentation snap shots",Eurographics 2009 7. Mohd Fazil Ahmed, Dr. Arshiaazam," photograph terrific assessment the usage of Tone Mapped pix", ISSN 2319-8885 Vol.04,hassle.11, can also moreover furthermore moreover 2015, Pages:2021-2025. Authors: Ushike Sudhakar Reddy, K.Uma Pavan Kumar, B.Priyanka Various Recommender Systems and Their usage in the Domains of Mobile Based and Online Paper Title: Applications Abstract: The activities of the users are surrounded by online shopping, online content fetching and online payment of the various bills. The important point is in case of the online shopping with Amazon, Flipkart and many other online shopping sites provides some sort of intelligent assistance to the user. Based on the past history, based on the user profile. Such kind of the applications were named as recommender systems. The most common categories of recommender systems involves, the collaborative filtering, content-based filtering, multi-criteria recommender systems, risk-aware recommender systems, mobile recommender systems and Hybrid recommender systems. The current work dealing with the process followed by the recommender systems along with various key factors embedded in the usage. The suggestions given by the application to the user depends on user profile, and content searched by the user and the collaboration of other products with the current product. The work focus on the implementation algorithms existing in the process of recommender systems, the above listed categories of recommender systems follow certain key mechanisms depending on the user query. The work also deals with the performance aspects of the recommender systems in case of accuracy and reproducibility in recommender system research. Especially the mobile recommender systems there are certain limitations of region and accuracy of the results. Overall the outcome of the work is to describe the importance of the recommender systems and the internal mechanism followed by various recommender systems.

27. Keyword: Recommender System, User Profiling, Collaborative Filtering, Mobile recommender system, Intelligent assistance. 170-172 References: 1. Martín, S.S.; López-Catalán, B.; Ramón-Jerónimo, M.A. Factors determining firms’ perceived performance of mobile commerce. Ind. Manag. Data Syst. 2012, 112, 946–963. 2. Guo, Y.; Wang, M.X.; Li, X. Application of an improved Apriori algorithm in a mobile e-commerce recommendation system. Ind. Manag. Data Syst. 2017, 117, 287–303. 3. Ansari, A.; Essegaier, S.; Kohli, R. Internet recommendation systems. J. Market. Res. 2000, 37, 363–375. 4. Bodapati, A.V. Recommendation systems with purchase data. J. Market. Res. 2008, 45, 77–93. 5. Jiang, Y.C.; Shang, J.; Liu, Y.Z. Maximizing customer satisfaction through an online recommendation system: A novel associative classification model. Decis. Support Syst. 2010, 48, 470–479. 6. Zhao, Y.S.; Liu, Y.P.; Zeng, Q.A. A weight-based item recommendation approach for electronic commerce systems. Electron. Commer. Res. 2015, 19, 1–22. 7. Zenebe, A.; Norcio, A.F. Representation, similarity measures and aggregation methods using fuzzy sets for content-based recommender systems. Fuzzy Sets Syst. 2009, 160, 76–94. 8. Lin, Z.J. An empirical investigation of user and system recommendations in e-commerce. Decis. Support Syst. 2014, 68, 111– 124. 9. Herlocker, J.L.; Konstan, J.A.; Loren, J.; Terveen, G.; Riedl, T. Collaborative filtering recommender systems. ACM Trans. Inf. Syst. 2004, 22, 5–53. 10. Liu, Y.Z.; Jiang, Y.C.; Liu, X.; Yang, S.L. CSMC: A combination strategy for multi-class classification based on multiple association rules. Knowl.-Based Syst. 2008, 21, 786–793. 11. Cho, Y.H.; Kim, J.K.; Kim, S.H. A personalized recommender system based on web usage mining and decision tree induction. Expert Syst. Appl. 2002, 23, 329–342. 12. Rak, R.; Kurgan, L.; Reformat, M. A tree-projection-based algorithm for multi-label recurrent-item associative-classification rule generation. Data Knowl. Eng. 2008, 64, 171–197. 28. Authors: G Srikanth, Bhanu Murthy Bhaskar Low Power Sub Threshold QDI Kogge Stone Adder using Sense Amplifier Lector based Half Buffer Paper Title: Cell Templates Abstract: Nowadays power consumption has the highest priority in designing high-performance electronics 173-179 systems. The main purpose of this paper is to present a 16-bitKogge-Stone Adder where the low control operation is attained by the decrease of exchanging action. In this paper, we propose a method called Sense amplifier Lector based Half-Buffer (SALHB) by exemplifying Sense Amplifier Half Buffer (SAHB) with LECTOR algorithm to lessen leakage current in circuit structure. A 16-piece Kogge Stone Adder (KSA) is structured and actualized utilizing an asynchronous Quasi-Delay-Insensitive cell configuration approach known as the SALHB algorithm. Generally, SAHB is an asynchronous QDI configuration approach which applies 4- phase signaling protocol and sub-edge operation to obtain low control dissipation and rapid of operation. Additionally, LECTOR algorithm is applied to SAHB configuration approach through which leakage current can be decreased further to a great degree. A portion of the asynchronous QDI cell templates are Pre-charged Half- buffer(PCHB) and Autonomous signal validity Half-buffer(ASVHB), as both the templates, use completion detector circuits which lead to high power dissipation and large area overhead. SAHB design surpasses these drawbacks. But, SAHB has more leakage current. Hence, SALHB method was proposed to overcome the problem of high leakage current. In this paper, the performance of KSA is analyzed in terms of power, delay, energy, rise time, fall time, settle time, duty cyle, throughput and slew rate.

Keyword: Asynchronous, QDI, PVT, low power, SAHB, KSA, PCHB, ASVHB, LECTOR References: 1. Bhattacharjee, P., Nath, B., & Majumder, A. (2018). LECTOR Based Clock Gating for Low Power Multi-Stage Flip Flop Applications. arXiv preprint arXiv:1805.07409.. 2. Chandrakasan, A. P. and Brodersen, R. W. (1995), “Minimizing power consumption in digital CMOS circuits,” Proc. IEEE, vol. 83, pp.498–523. 3. Gu, R. X. and Elmasry, M. I. (1999), “Power dissipation analysis and optimization for deep submicron CMOS digital circuits,” IEEE J. Solid-State Circuits, vol. 31, pp. 707–713. 4. Chong, K.S., Weng-Geng Ho, Lin, T., Gwee, B.H., and Chang, J.S. (2017), “Sense Amplifier Half-Buffer (SAHB): A Low- Power High-Performance Asynchronous Logic QDI Cell Template”, IEEE Transactions on VLSI Systems. 5. Narender, H. And Nagarajan, R.(2004),” LECTOR: A technique for leakage reduction in CMOS circuits”, IEEE Transactions on VLSI systems, Vol.12, No.2. 6. M. C. Johnson, D. Somasekhar, L. Y. Chiou, and K. Roy, "Leakage control with efficient use of transistor stacks in single threshold CMOS, "IEEE Trans. VLSI Syst., vol. 10, pp. 1–5, Feb. 2002. 7. S. Narendra, S. Borkar, V. De, D. Antoniadis, and A. P. Chandrakasan, “Scaling of stack effect and its application for leakage reduction,” Proc. IEEE ISLPLED, pp. 195–200, Aug. 2001. 8. Manisha, B. S., & Rudraswamy, S. B. (2018). VLSI Implementation of CMOS Full Adders with Low Leakage Power. 9. Chi-Chuan Chuang, Yi-Hsiang Lai1, and Jie-Hong R. Jiang(2014 ), "Synthesis of PCHB-WCHB Hybrid Quasi-Delay Insensitive Circuits” Department of Electrical Engineering, National Taiwan University, Taipei, 10617, Taiwan Computer Science Laboratory, Russia San Francisco, CA, USA. 10. Weng-Geng Ho, Chong, K.S., Bah-Hwee Gwee, Joseph Sylvester Chang(2014) ”Low power sub-threshold asynchronous quasi- delay-insensitive 32-bit arithmetic and logic unit based on autonomous signal-validity half-buffer” IET Circuits Devices system, Volume 9, Issue 4, pp.309-318, ISSN 1751-858X. 11. Manjunatha Naik. V, Poornima. N (2015),” Performance Analysis of Parallel Prefix Adder, International Journal of Electrical, Electronics and Data Communication”, ISSN: 2320-2084, Volume-3, Issue-7. 12. Rajnish Dubey, Jitendra Jain (2015),” An Efficient Processing by using Kogge-Stone High-Speed Addition Technique", International Journal of Computer Applications (0975 – 8887) Volume 131 – No.1. 13. Stone, H. S., and Kogge .P.M. (1973), “A parallel algorithm for the efficient solution of a general class of recurrence equations,” IEEE Transactions on Computers. 14. Athira, T.S, Divya.R, Karthik.M, Manikandan.A (2017), “Design of Kogge-Stone for Fast Addition”, International Journal of Industrial Electronics and Electrical Engineering, Volume-5, Issue-4, ISSN: 2347-6982. 15. Chen, Y.K. and Pai, Y.T. and (2004)," The Fastest Carry Lookahead Adder", Proceedings of the Second IEEE International Workshop on Electronic Design, Test and Applications, ISBN: 0-7695-2081-2.

Authors: Dahlan Abdul Ghani, Muhammad Naim Bin Supian, Luqman Zulhilmi Bin Abdul ‘Alim

Paper Title: The Research of 3D Modeling between Visual & Creativity Abstract: The 3-Dimensional method are grown rapidly and the technology to generate an animation in 3D also having a series of evolved rapidly where Western animation industries pioneered this animation method. 3D animation become a method to producing an animation. In creative multimedia industries, Character modeling are the most important step to make an animation. Character modelling are in Pre-Production process which the animator and the character designers will modeling the character in 3-Dimensional method. This paper will discuss about the method are using in 3D modeling and parts of the whole process of modeling in 3D. This paper also will discuss about the pipeline of modeling a character in 3D. The whole process into 3D modeling, UV mapping, and model texturing. Modeling the human from the basic shape until form a human shape and form. This paper also will discuss about the development of 3D modeling in Malaysia refers to the famous animation film in Malaysia. 29.

Keyword: 3-Dimensional,UV Mapping,Model Texturing, pipeline, Pre-Production 180-186 References: 1 Bailey, S. (April 15, 2013). Building and Using a Character in 3D Space . 19. 2 Bane, A. (2012). 3D Animation Essentials. Indianapolis, Indiana: John Wiley & Sons. 3 Faryna Mohd Khalis, N. M. (2016). The Sense fo Local Identity Characteristic in . 12. 4 Isa, S. S. (2012). Development Issues for the Creative Economy In Malaysia. 203. 5 Ishak, M. A. (2014). Understanding Malaysian Animation Characteristic : A Structurlist -Semotic Analysis On Malaysian Animation Series . 14. 6 Monsta (Director). (2016). Disebalik Tabir : Boboiboy The Movie [Motion Picture]. 7 Plata, B. M. (2013). 3D Modeling Optimization for Multimedia Production . 47. 8 Vaughan, W. (2012). Digital Modeling . Berkeley, CA: Pearson Education. 9 Weh-Cheih Chang, W.-M. J. (2015). Streamlined Workflow for 3D Modeling with Animated Characters. 7. 10 Wise R, S. J. (2000). Multimedia : A Critical Introduction. London: Tay-lor & Francis Group . 11 Xi-Dao LUAN, Y.-X. X.-D. (2008). Research and Develpment od 3D Modeling. 5. Authors: Dahlan Abdul Ghani, Rafiqi Izani Faiz bin Redzuan 30. Paper Title: Virus Combat: Promoting Awareness on Viruses Through Video Game Abstract: Technology nowadays are vastly growing and by that the number of virus are also increasing each day. There were 60,000 known viruses, Trojans, worms, and variations and today there are well over 100,000 known computer viruses. In addition, studies and researches show that a computer connected to the Internet may experience an attack every 39 seconds. The purpose of this research is promote the importance of computer viruses using computer game platform. In Malaysia, there are still less effort of using new media on preventing computer virus and Malaysian society are still lacking of knowledge and awareness on how to avoid their computer from getting occurrence or harmed by virus. Furthermore, this research will also assess the efficiency of the 3D game prototype among selected respondents.

Keyword: technology; computer virus; video game; program; Internet. References: 1. Dwan, B. (2000). The Computer Virus - From there to here. In B. Dwan, Computer Fraud and Security (pp. 13-16). 2. Fox, B. (2005). Game Interface. Boston: Thomson Course Technology PTR. 3. Jigyasa sengar, Harshita chawla. (2017). Research Paper On Computer Virus :A Survey. GADL Journal of Inventions in Computer Science and Communication Technology (JICSCT), 1-4. 187-190 4. Kai Peterson. (2009). The Waterfall Model in Large-Scale Development. Sweden. Retrieved from http://www.diva-portal.org/smash/get/diva2:835760/FULLTEXT02.pdf 5. Melissa virus creator jailed. (2002, May 2). Retrieved from news.bbc.co.uk: http://news.bbc.co.uk/2/hi/americas/1963371.stm 6. Quintans, D. (2013, January 22). Game UI By Example: A Crash Course in the Good and the Bad. Retrieved from gamedevelopment.tutplus.com: https://gamedevelopment.tutsplus.com/tutorials/game-ui-by-example-a-crash-course-in-the-good- and-the-bad--gamedev-3943 7. Rouse, R. (2005). Game Design: Theory & Practice. Plano: Wordware Publishing, Inc. 8. Ruppe, D. (2002). "'Love Bug' Travels the Globe". Retrieved from abcnews.go.com: http://abcnews.go.com/1/sections/world/Daily 9. News/Lovebug000503_world.html 10. Schell, J. (2008). The Art of Game Design: A Book of Lenses. Burlington: Elsevier Inc. 11. Stenger, R. (2001, July 31). Net braces for stronger 'Code Red' attack. Retrieved from edition.cnn.com: http://edition.cnn.com/2001/TECH/internet/07/30/code.red/ 12. Turunen, J. (2017). The Good, The Bad and The Unpleasant - A Study of Graphical User Interface in Video Games. Tampere: Tampere University of Technology. 13. 12. Youssef Bassil. (2012)." A Simulation Model for the Waterfall Software Development Life " Lebanon: International Journal of Engineering & Technology (iJET). Authors: Dahlan Bin Abdul Ghani , Muhammad Farhan Abd Jalil, Luqman Zulhilmi Bin Abdul ‘Alim

Paper Title: Slipped Disc: Developing M-Health Apps to Promote Awareness among Malaysian Society Abstract: starting late, back torment is brisk transforming right into a disease wherein there's no obstruction. In Malaysia, basically 60% and eighty% of humans will experience low back torment ultimately of their lives. A slipped circle generally called a prolapsed or herniated plate, occurs while one of the circles that take a seat between the bones of the backbone (the vertebrae) is hurt and pushes on the nerves. the reason at the back of this investigation is to raise the nature with slipped hover among Malaysian way of life due to the nonattendance of prologue to the overall population approximately the hazard of herniated plate or broadly speaking referred to as as slipped circle might also reason a real case that relate to this sickness. To acquire the objective of this assessment, we have went with an association to develop a mobile cellphone application which it's miles a savvy and straightforward software. We believe that this research will supply a foremost information approximately slipped hover diseases by means of giving an statistics on oneself idea measures in like manner assist them to realize it into their education.

Keyword: slipped circle, prolapsed, herniated plate, beneficial, care, cell telephone, android utility.a References: 1 Age well. (c2012). The star online. Recovered three March, 2016, from http://www.thestar.com.my/way of lifestyles/well 31. being/2012/08/19/painintheback/4. In-content material reference: (Age well, c2012) 2 Balagué F, Mannion AF, Pellisé F and Cedras-chi C. Non-explicit low lower back torment. Lancet 2012; 379: 482-491 3 Pavlov, Paul An., and David W. Stewart. (2000)," Measuring the results and Effectiveness of Interactive marketing: A research 191-197 agenda" magazine of Interactive advertising, Vol (eleven). p.98-102 4 Holzer, An., and Ondrus, J. (2009, April). patterns in flexible application advancement. In international conference on cell wireless Middleware, running systems, and applications (pp. fifty five-64). Springer Berlin Heidelberg 5 Darrell M.West (2013, October). enhancing fitness Care thru cell medical devices and Sensors, center for technology improvements at Brookings, p.1-thirteen 6 Lawrence J.N. blended media records and getting to know. (1996). Diary of instructional Multimedia and Hypermedia (1996) five (2), 129-a hundred and fifty 7 Gagne, R.M., bet, W.W., Golas, okay.G. and Keller, J.M. (2005). requirements of instructional structure. Toronto, ON: Thomson Wadsworth 8 Nawi, A., Hamzah, M. I., Ren, C. C., and Tamuri, A. H. (2015). Reception of portable innovation for showing readiness in improving displaying nature of educators. prevalent magazine of education, eight(2), 113-124. 9 John W. Creswell, Vicki L. Plano Clark. making plans and carrying out combined strategies studies (2010,June) SAGE publications, Inc; second model 10 Steven J McGriff. (2000). instructional system layout (ISD): using ADDIE model. instructional structures, college of education, Penn nation college. 11 Mirzai H, Tekin I, Yaman O, et al. The aftereffects of nucleoplasty in sufferers with lumbar herniated plate: an imminent scientific investigation of 52 continuous patients. spine J. 2007 Jan-Feb. 7(1):88-ninety two; conversation 92-three 12 Teleno.Boston group, (2012). on line resource : http://www.telenor.com/morethan/wp-content material/transfers/2016/06/THE- SOCIO-financial-effect-OF-cellular-health-%E2%80p.c93-MALAYSIA-THAILAND-.pdf 13 Strasser R. (2003). Rustic health around the world: demanding situations and answers. circle of relatives practice; Vol. 20: P.457- 463 Authors: Dahlan Bin Abdul Ghani, Nur Athirah Bt. Ahmad Azizi, Luqman Zulhilmi Bin Abdul ‘Alim

Paper Title: Isao Takahata : Inspiring Visual Styles of Japanese Film & Anime Aesthetics Abstract: The Tale of Princess Kaguya is an adaptation from The Tale of the Bamboo Cutter, a classical Japanese folktale, directed by Isao Takahata in Studio Ghibli productions. Isao Takahata is a director who has long been overlook by his longtime colleague and Studio Ghibli co-founder Hayao Miyazaki. The purpose of research about cinematography techniques or style of Isao Takahata animated film in The Tale of Princess Kaguya. The Princess Kaguya animated film is like an old Japanese painting that is similar to traditional sumi-e. The focus of this research will look into several aspects such as impressionistic style and the character design in Princess Kaguya animated film. Impressionistic art is an art style when an artist looks into situation or things with a short glimpse and paint it back using bright and vibrant colors. Most of the pictures are outdoor scenes. The concept character of Princess Kaguya created with amazing work of art using hand-drawn animation to new heights of fluidness.

Keyword: cinematography, Princess Kaguya, Studio Ghibli, Isao Takahata, impressionistic style, character design. References: 1. Akimoto, D. (n.d.). Peace education through the animated film “Grave of the Fireflies”. Retrieved from www.apu.ac.jp/rcaps/uploads/fckeditor/publications/.../RJAPS33_4_Akimoto.pdf 2. Anders, C. J. (2014, 10 20). Don't Deprive Yourself Of Seeing The Beauty Of Princess Kaguya. Retrieved 10 20, 2014, from Gizmado : http://io9.gizmodo.com/dont-deprive-yourself-of-seeing-the-beauty-of-princess-1648552243 3. Azriel. (2013, December 9). Johan Galtung’s six dimensions of violence. Retrieved December 9, 2013, from All My Neighbors: http://allmyneighbors.org/2013/12/09/johan-galtungs-six-dimensions-of-violence/ 4. Beal, V. (n.d.). Cel Animation. Retrieved from Webopedia:http://www.webopedia.com/TERM/C/cel_animation.html 5. Belton, N. (2016, April 22). The Tale of Princess Kaguya. Retrieved April 22, 2016, from characterdesignreferences: https://characterdesignreferences.com/movie-reviews-1/the-tale-of-princess-kaguya 6. Benbrigade. (2014, October 27). The Tale of the Princess Kaguya (2014). Retrieved October 27, 2014, from Benbrigade's Blog: https://benbrigade.wordpress.com/2014/10/27/the-tale-of-the-princess-kaguya-2014/ 7. chuck-526. (2015, January 24). Reviews & Ratings for The Tale of Princess Kaguya. Retrieved January 24, 2015, from IMDb Website: http://www.imdb.com/title/tt2576852/reviews 32. 8. Eric, L. (2015, October 4). The Tale of Princess Kaguya. Retrieved October 4, 2015, from Studio Ghibli Wiki: http://studio- ghibli.wikia.com/wiki/The_Tale_of_Princess_Kaguya 9. F., Y. (2015, February 22). The Tale of the Princess Kaguya. Retrieved February 22, 2015, from animecinematography: http://animecinematography.blogspot.my/2015/02/the-tale-of-princess-kaguya.html 198-209 10. Friesen, J. (2014, September 29). Reviews & Ratings for The Tale of Princess Kaguya. Retrieved September 29, 2014, from IMDb Website: http://www.imdb.com/title/tt2576852/reviews 11. Ghibli, S. (2005-2017). History of Studio Ghibli. Retrieved 2005-2017, from STUDIO GHIBLI Inc.: http://www.ghibli.jp/history/ 12. Haecke, P.-J. V. (2014, August). The Tale of Princess Kaguya (review). Retrieved from psychocinematography: https://psychocinematography.wordpress.com/movies/the-tale-of-princess-kaguya/the-tale-of-princess-kaguya-review/ 13. Jane, C. (2014, 10 20). Don't Deprive Yourself Of Seeing The Beauty Of Princess Kaguya. Retrieved 10 20, 2014, from Gizmodo: http://io9.gizmodo.com/dont-deprive-yourself-of-seeing-the-beauty-of-princess-1648552243 14. Kendall, P. (2013, November 26). Kaguya Hime no Monogatari: The other side of Studio Ghibli 【 Review 】 . Retrieved November 26, 2013, from RocketNews24: http://en.rocketnews24.com/2013/11/26/kaguya-hime-no-monogatari-the-other-side- of-studio-ghibli-%E3%80%90review%E3%80%91/ 15. Kermode, M. (2015, March 22). The Tale of the Princess Kaguya – 'a beautiful historical fantasia'. Retrieved March 22, 2015, from theguardian: https://www.theguardian.com/film/2015/mar/22/tale-of-princess-kaguya-review-kermode 16. Kneipp, J. (2017, March 24). The Endless Visual Beauty of ‘The Tale of the Princess Kaguya’. Retrieved March 24, 2017, from Vision Times: http://www.visiontimes.com/2017/03/24/the-endless-visual-beauty-of-the-tale-of-the-princess-kaguya.html 17. labelleequipe25. (2013, December 5). Reviews & Ratings for The Tale of Princess . Retrieved December 5, 2013, from IMDb Website: http://www.imdb.com/title/tt2576852/reviews 18. Lambie, R. (2015, March 17). Isao Takahata interview: The Tale Of The Princess Kaguya. Retrieved March 17, 2015, from http://www.denofgeek.com/us/movies/studio-ghibli/244690/isao-takahata-interview-the-tale-of-the-princess-kaguya 19. Lollipop, K. (2015, April 1). Kaguya outfits. Retrieved April 1, 2015, from Studio Ghibli Wiki: http://studio-ghibli.wikia.com/wiki/Kaguya?action=edit§ion=1 20. Norshahila. (2013, December 4). A Proposed Model for Animation of Malay Folktales for Children. Retrieved December 4, 2013, from http://is.its.ac.id/pubs/oajis/index.php/home/detail/1222/A-Proposed-Model-for-Animation-of-Malay-Folktales-for- Children 21. Rebrn. (n.d.). Walt Disney's "creative flowchart" he gave to his employees. Retrieved from Rebrn: http://rebrn.com/re/walt- disneys-creative-flowchart-he-gave-to-his-employees-1000419/ 22. Sanders, A.-L. (2016, September 30). 2D Animation. Retrieved September 30, 2016, from http://animation.about.com/od/glossaryofterms/g/2danim_def.htm 23. Santoli, E. A. (2015, January 15). Hayao Miyazaki's Drawing and Watercolor Technique. Retrieved January 15, 2015, from Fanboys Anonymous: http://www.fanboysanonymous.com/2015/01/hayao-miyazakis-drawing-and-watercolor.html 24. Yonghow. (2014, February 2). The Art Of Kaguyahime Book Review. Retrieved February 2, 2014, from halcyonrealms: http://cdn.halcyonrealms.com/animation/the-art-of-kaguyahime-book-review/ 25. Zobras. (2014, December 10). Reviews & Ratings for The Tale of Princess Kaguya. Retrieved December 10, 2014, from IMDb Website: http://www.imdb.com/title/tt2576852/reviews 33. Authors: Dahlan Abdul Ghani, Nor Masliza Binti Md Azahar

Paper Title: Fusion Art Style of Malaysian & Japanese Anime

Abstract: Japanese development fusion and fashion commonly depicted by way of excellent delineations, 210-218 fiery characters and fantastical subject matters. in any case, the Malaysian movement continues to be new in this industry and nevertheless has nonappearance of attempt in conveying quality vivacity from normal to pc empowered. eastern are commonly requested via goal measurement, including children's, kids, youngsters and a various volume of types targeting an person collecting of observers. The cause of the research to discover about the similar characteristics appears at between Malaysian improvement and japanese movement. This paper will examine on more than one views which relates towards the socially various effect of Malaysian and eastern anime, for instance, individual plan and cultural.

Keyword: Japanese Animation, Malaysian Animation, character design, cross-cultural References: 1 Alexander Nghiem Frasier. (2007). A competition of social orders: social complexities internal. A contention of social orders: social complexities interior. 2 Ekström, H. (2013). By using what method Can a person's individual be Conveyed Visually, through form. Through way of what way Can a man or woman's personality be Conveyed Visually, via shape . 3 Faryna Mohd Khalis . (2017). Social Inspirations inside the route of Malaysian Animation man or woman design . Social Inspirations toward Malaysian Animation man or woman format . 4 Ghani, D. B. (2015). Upin and Ipin: promoting Malaysian way of life regards via motion. Upin and Ipin: selling Malaysian way of life regards via movement, 241-258. 5 H, E. (2013). In what restrict Can someone's person be Conveyed Visually, even though form. In what way Can a character's person be Conveyed Visually, although shape. 6 Ishak, o. (2014). Knowledge Malaysian Animation tendencies. Semiotic evaluation on Malaysian Animation series. 7 Ishak, M. A. (2011). Information way of existence thru Animation. Know-how way of existence through Animation, 13 no 2, 1-9. 8 Rianti Hidayat . (2012). Find out a significance interior individual plot: Stylized man or woman layout useful resource technique using format . 9 Samantha Nicole Inëz Chambers* . (2012). Anime: From Cult Following to popular culture Phenomenon . Anime: From Cult Following to popular lifestyle Phenomenon. 10 Schodt's, F. ((1983). The world of eastern Comics (Osamu Tezuka's Phoenix, Reiji Matsumoto's Ghost Warrior, Riyoko Ikeda's The Rose of Versailles, and Keiji Nakazawa's Barefoot Gen. Ed.). Eastern, eastern . 11 SNI, c. (2012). From Cult Following culture Phenomena. Elon magazine of Resrach in Communications. 34. Authors: Dahlan Abdul Ghani, Nur Adila Binti Muhd Affendy

Paper Title: Mental Health: Promoting Awareness Through 3D Animated Short Film

Abstract: Having a mental health problem quite upsetting, confusing and scary at first. The scares often 219-229 be filled with negative thoughts that can be unrealistic way to happen just like been shown on the media. Mental health is a common human experience, but by having the mental illness is something that needs the treatment. Some of people living in current times causing depression, anxiety and many others of mental health problems. Some young working adults struggle with emotional and physical issues as they leave university, before or maybe in working world. The aim of the research is to study about the mental health issues among the animators or artists in creative industry and it will be focus on the visualising the issues arise in animation in certain medium which is in 3D (3-Dimensional) animation. With this research, we hoped that it will increase the knowledge to people about mental illness that been faced by the animators and can create the awareness regarding mental health issues through the animation.

Keyword: mental illness, 3D animation, awareness, mental health, depression, animators, pixar, body movement, colour. References: 1. Almeida, E. (2015). How Animation Is Starting A New Conversation On Mental Illness. toddysseyonline. 2. Amidi, A. (2007, 20 8). More about the death of Paul Boyd. Cartoon Brew. 3. Animator, B. (1970, January 1). My Medicated Cartoon Life. Retrieved August 10, 2018, from mymedicatedlife: http://mymedicatedlife.blogspot.com/ 4. Baumane, S. (2014, September 3). Signe Baumane Boldly Animates Family Depression in 'Rocks in My Pockets'. (M. Silverstein, Interviewer) 5. Caldera, A Beautifully Surreal Animated Film About Mental Illness. (2013, April 10). Retrieved August 10, 2018, from Laughing Squid: https://laughingsquid.com/caldera-a-beautifully-surreal-animated-film-about-mental-illness/ 6. Everett, L. (2018, January 25). Morbid? No - Coco is the Latest Children's Film with a Crucial Life Lesson. The Guardian. 7. Fandom. (2018). Pixar Wiki | Coco Rivera. Retrieved from Fandom: http://pixar.wikia.com/wiki/Coco_Rivera 8. Fraynt, B. (2018, July 7). 4 Pixar Movies That Can Start a Conversation About Mental Health. Retrieved from Fandom: http://fandom.wikia.com/articles/4-pixar-movies-that-can-start-a-conversation-about-mental-health 9. Healy, J. P. (2016, June 6). Color in "Inside Out" - How Color is used in the film. Odyssey. 10. josheds. (2015, April 10). RESEARCH | COLOUR. Retrieved from JOSH.EDS | VIS.COMM: https://josheds.wordpress.com/2015/04/10/research-colour/ 11. Mental health facts and statistics. (2017, April). Retrieved August 17, 2018, from Mind for better mental health: https://www.mind.org.uk/information-support/types-of-mental-health-problems/statistics-and-facts-about-mental-health/how- common-are-mental-health-problems/#.W3a0Is4zapp 12. Miclau, K. (September 11, 2017). De-stigmatizing Mental Illness Early: Role of Childhood Animations. SMHR - Students in Mental Health Research. 13. Moore, K. S. (2015). 5 Difficult Concepts Made Easier by Disney's "Inside Out". Psychology Today. 14. Nall, R. (2018, January 12). What is Parkinsonism? Medical News Today. 15. Nott, L. (2013, September 18). Overlapping Effects of Mental Disorders and Movement Disorders. Elements Behavioral Health. 16. Paul_Boyd_Animator. (n.d.). Retrieved August 17, 2018, from Wikipedia: https://en.wikipedia.org/wiki/Paul_Boyd_(animator) 17. Pedersen, T. (2016, October 9). Body Movements May Give Clues To Personality, Mental Health. Psych Central. 18. Rapold, N. (2014). Depression, a Persistent Demon, Stalks One Family for Generations. The New York Times, C6. 19. Redman, R. (2018, January 19). 15 ways to improve your character animation. Retrieved from Creative Bloq: https://www.creativebloq.com/audiovisual/improve-character-animation-41411447 20. Roberts, K. (2015, June 19). Why 'Inside Out' will start an important conversation about mental health. Hello Giggles. 21. Rodgers, B. (2015, June 21). Pixar's Use of Color is Incredible. Nerdist. 22. Sami. (2016, February 9). Finding Nemo - Communicating using non-human characters with human/animal stereotypes. Retrieved from Research Project : http://samitaylorad6000.blogspot.com/2015/11/finding-nemo.html 23. Signe Baumane. (n.d.). Retrieved August 15, 2018, from Wikipedia: https://en.wikipedia.org/wiki/Signe_Baumane 24. Smith, L. (2013, December 20). Psychological Disorder Characters - Mike from Monsters Inc. Retrieved from Preze: https://prezi.com/hquzuegvz5um/psychological-disorder-characters/ 25. Studio, P., & Docter, P. (Directors). (2001). Monsters Inc. [Motion Picture]. 26. Studio, P., & Docter, P. (Directors). (2015). Inside Out [Motion Picture]. 27. Studio, P., & Unkrich, L. E. (Directors). (2017). Coco [Motion Picture]. 28. Studio, P., Unkrich, L. E., & Stanton, A. (Directors). (2003). Finding Nemo [Motion Picture]. 29. Team, T. S. (2016, April 10). Body Language and Its Use in Animation. Retrieved from The Silent Protagonist - "Silence speaks louder than words.": https://thesilentprotagblog.wordpress.com/2016/04/10/body-language-and-its-use-in-animation/ 30. Wargo, E. (2005, 30 8). Animated Expressions. APS - Association for Psychological Science. 31. Widdowson, A. (2016, August 12). When The Art Of Animation Meets Mental Illness. (P. Karagianni, Interviewer) 32. Wishart, S. (2018). Why Does Animation Work So Well For Healthcare Stories? Humans Rights News, Views & Info. Authors: Muhammad Nurakram Bin Mohammed Ghazali, Dahlan Abdul Ghani

Paper Title: The Important of Great Storytelling in Malaysia Animation Industries Abstract: Malaysian animation industry have successfully become one of the main media in promoting Malaysian culture especially to local people. The combination of Malaysia unique traditional and modern culture in animation seems to become one of the key factors. One of Malaysia local animation studios known as Les Copaque is the closest model that we can see to use our unique culture in their animation series called Upin Dan Ipin. However, unique culture and animation without proper storytelling will lead to nothing. Therefore, this research is to study on how important is storytelling in creating a good animation that can make an impact to a viewer and memorizing how great the story is.

Keyword: Storytelling, traditional and modern culture, Upin dan Ipin, Les Copaque, key, memorizing. References: 1. Anne, P. (n.d.). "Webster's New Twentieth Century Dictionary". 2. Retrieved from The Science of Story Structure (& The Art of Story Telling). 2. Barany, B. (2014, August 8). Writer's Fun Zone. Retrieved from Story is King and Trust the Process, says Pixar: http://writersfunzone.com/blog/2014/08/08/story-is-king-and-trust-the-process-says-pixar/ 3. Cambrage Dictionary. (2018). Retrieved from https://dictionary.cambridge.org/dictionary/english/iteration 35. 4. Catmull, E. (2014). Creativity, Inc . . New York: Random House. ceros. (2016). Lessons in Story Design from Pixar’s Creative Team. 5. Coveney, N. (2017, November 29). Forbes. Retrieved from https://www.forbes.com/sites/forbescoachescouncil/2017/11/29/how- 230-235 to-harness-the-power-of-collaboration/#45a6cce63d65 6. Fatimah Shukri. (2016). RUANG, MASA DAN SEBAB AKIBAT DALAM NARATIF FILEM. Jurnal Melayu, 238. 7. G.Peter, B. (2016, March 21). Medium. Retrieved from 6 Rules of Great Storytelling (As Told by Pixar): https://medium.com/@Brian_G_Peters/6-rules-of-great-storytelling-as-told-by-pixar-fcc6ae225f50 8. Hashim, A. H. (2015, January 24). Punca siri animasi hilang. (U. online, Interviewer) 9. Ismail, I. (2018, August). Malaysia's father of animation talks about his passion, state of animation industry. Retrieved from New Straits Times: https://www.nst.com.my/lifestyle/bots/2017/08/273598/malaysias-father-animation-talks-about-his-passion-state- animation 10. James, S. (2011, March 7). Writer's Digest. Retrieved from 3 Secrets to Great Storytelling: http://www.writersdigest.com/writing- articles/by-writing-goal/write-first-chapter-get-started/3-secrets-to-great-storytelling 11. Johari, F. (2015, June 30). Says.com. Retrieved from http://says.com/my/seismik/belanja-rm4-juta-kutipan-hanya-rm37-ribu-apa- dah-jadi-dengan-filem-oh-lala 12. Miller, E. (2011). Theories of Story and Storytelling. 1. 13. Muthalib, H. (Director). (1980). Hikayat Sang Kancil [Motion Picture]. 14. Muthalib, H. (2017, August 28). Malaysia's father of animation talks about his passion, state of animation industry. (I. Ismail, Interviewer) 15. Razak, N. (Director). (2018). Upin dan Ipin [Motion Picture]. 16. Rose, A. (n.d.). Principle of animation. 17. Sallehudin, D. A. (Director). (2015). Oh! La La [Motion Picture]. 18. Surtees, N. (2016). Pixar's lessons in Design Thinking. ticktockcrocodail. (2010). Principles of Animation. 19. Yasin, M. U. (Director). (2018). Ejen Ali [Motion Picture]. 36. Authors: Dahlan Abd Ghani, Syed Hassan Bin Syed Omar

Paper Title: Body Language: Symbiosis Between Art, Culture and Animated World

Abstract: Inside the world from movies, it’s very important to apply the body language of each part of 236-241 characters. The purpose of this research is to study the important and ways of robotic body language in animated film. This research also will focus on the important of mood and body language related to movement in Malaysia’s animated series which is can make a way to look in deep of visual storytelling, art of acting and others technical sequences that involve when making an Animated Short Film. Thus, from this research a prototype short animated film known as “SpiDay” will be produce by using 3D animation media technique.

Keyword: robotic, animated short films, animation, body language, mood, acting, 3D. References: 1. (Williams, 2001) 2. http://www.thisdayindisneyhistory.com/NineOldMen.html 3. (Newsweek, October 21, 1999) 4. http://www.apa.org/science/about/psa/2011/05/facial-expressions.aspx 5. (LoBrutto, 1994) 6. https://en.wikipedia.org/wiki/Filmmaking 7. (Mediafreaks, 2003) 8. http://media-freaks.com/the-process-of-3d-animation/ 9. (Jacob, 2010) 10. http://www.speakingofanimation.com/2010/05/body-language-research/ 11. (Williams, 2001) 12. Body language kin Anderson from nine old man 13. (Williams, 2001) 14. http://www.floobynooby.com/pdfs/The_Animators_Survival_Kit.pdf 15. (Adbot, 2013) 16. https://en.wikipedia.org/wiki/Show,_don%27t_tell 17. (Sajan, 1988) 18. http://www.viz.tamu.edu/courses/tutorials/sajan/ Authors: Dahlan Abdul Ghani, Asyraf Zaki bin Mohd Sobri

Paper Title: Character Archetypes: Aesthetic Values in Character Design in Malaysia `s Animated Films Abstract: Animation defined as a process which giving inanimate object or images appear to be moved. Today, the technology has advanced to another level which animators using computer-generated imagery (CGI) to animate. The aim of this research is to introduce to people about the aesthetics value in character design. In animated film, it must be a character to roll as something that can successfully give the message, feeling, and mood in a situation. So, the character must have the aesthetic value through strong physical appearance based on his or her colour patterns, body language, and shapes to express them. For example, in Malaysia we have many iconic characters in animated series that succeed in portraying the aesthetics value based on what they wanted to deliver like Upin Ipin, Boboi Boi, Keluang Man and Anak-anak sidek. However, not all viewers see the difference. Thus, by making this research, it will guide them to be more intuitive and can differentiate among characters in any movies.

Keyword: Character design, aesthetic value, animation, (CGI). References: 1. Aragonés, S. (2018 ). sergioaragones (homepage). Retrieved from sergioaragones: https://sergioaragones.com/ask-sergio/ 2. Aragones, S. (n.d.). Character Design Quotes. Retrieved from azquotes: https://www.azquotes.com/quotes/topics/character- design.html 3. Bancroft, T. (2016, February 29). Blog. Retrieved from Taught by A Pro: http://taughtbyapro.com/what-is-character-design/ 37. 4. Burgerman, J. (2017, September 07). topics. Retrieved from creativebloq: https://www.creativebloq.com/character-design/tips- 5132643 5. Curtis, G. (2007). The Spider-man Chronicles. San Francisco . 242-245 6. Design, B. (2013-2015). Pychological Character Design. Retrieved from BRITMA DESIGN: http://www.britmadesign.com/services/aesthetic-character-design/ 7. Fonseca, J. A. (September 2015). Character Body Expression. 8. Harris, W. (2013, January 18). creativebloq. Retrieved from creativebloq: https://www.creativebloq.com/animation/top-40- character-design-tips-part-2-human-based-characters-1132742 9. How Colour Communicates Meaning. (2009). Retrieved from treehouse: https://blog.teamtreehouse.com/how-colour- communicates-meaning 10. Iveta. (2018). GraphicMama Home. Retrieved from GraphicMama : https://graphicmama.com/blog/flat-design-character- inspirational-examples/ 11. Meir, D. A. (2015). animationarena. Retrieved from animationarena: http://www.animationarena.com/acting-and-animation.html 12. Naifeh, T. (n.d.). Brainy quotes. Retrieved from Brainy quotes: https://www.brainyquote.com/quotes/ted_naifeh_696449 13. Nieminen, M. (2017). Pychology in Character Design. 14. Oatley, C. (2018). Good Character Design Goes Deep. Retrieved from ChrisOatley: https://chrisoatley.com/character-design- goes-deep/ 15. Quesada, J. (2010). In J. Quesada, The Marvel Art of Joe Quesada (p. 15). 16. Sandu, B. (2017). Character Design: Tips On How To Design A Character. Retrieved from designyourway: https://www.designyourway.net/blog/graphic-design/character-design/ 17. Syafiq, M. A. (2015, 12 20). Animasi Upin dan Ipin : Menyemai Semangat Perpaduan di Malaysia. Retrieved from class of x: http://apaituilmu.blogspot.com/2015/12/animasi-upin-dan-ipin-menyemai-semangat.html 18. Wei, K. S. (2014, August 4 ). Psychology of Game Characters Design. Retrieved from Prezi: https://prezi.com/djdjludkjlrt/psychology-of-game-characters-design/ 19. WEILAND, K. (2011, FEBRUARY 20). 5 Ways to Write Character Thoughts Worth More Than a Penny. Retrieved from helping writers become authors: https://www.helpingwritersbecomeauthors.com/5-ways-to-write-character-thoughts/. 38. Authors: Jeyaletchumi P, Hekambaram M, Azhar A, Param J.S.P.S, Ghani,A.A.S, Harliani R, Rafidah I

Paper Title: Safety of Frozen Shrimp Imported through Entry Points in Selangor, Malaysia

Abstract: The presence of antibiotic residues in food raises significant public health concerns as it may result 246-248 in increased antimicrobial resistance in human pathogens. Recently the United States of America issued an import alert on shrimp from Peninsular Malaysia after detecting illegal and unsafe levels of drug residues in thirty two percent of samples tested over a one-year period. As local investigations at aquaculture farms could not detect drug residues at farm level, transshipment of imported prawns was suspected. The Food Safety and Quality Department of the Selangor State Health Department, Port Klang Health Office, Selangor Food Safety and Quality Laboratory and National Public Health Laboratory conducted a study to assess the safety of imported shrimps through sampling at entry points through which frozen prawns are actively imported. Analysis of nitrofuran, chloramphenicol, malachite green and crystal-violet were carried out through Liquid Chromatography Mass Spectrometry at two Laboratories on one hundred and forty seven samples taken over a four month period but none were found to contain drug residues. The results which indicate a total absence of drug residues in frozen shrimp from the region are reassuring but somewhat surprising and suggest the use of analytical methods with a higher sensitivity.

Keyword: entry points, safety, Selangor, shrimp. References: 1. www. seafoodnews.com. Refusal of Malaysian Shrimp due to Harmful and Illegal Drugs 2. http://www.foodsafetynews.com: Barriers go up against shrimp and prawns from Malaysia. 3. https://www.accessdata.fda.gov .USFDA Import Refusal Report 4. www.shrimpalliance.com. FDA Refusal of Shrimp Entry Lines Contaminated by Banned Antibiotics. 5. https://www.consumer.org.my: Government must stop use of antibiotics in our shrimp 6. Food Safety and Quality Laboratory, Ministry of Health Malaysia, “In-house Method :Determination of Amphenicols in Animal Tissue by Ultra Performance Liquid Chromatography Tandem Mass Spectrometry” , 2013. 7. Antoinetta,G.,Gordon,K., John H, Lynne C.C., Paul,B., “Determination of Chlorampehicol using acquity UPLC and Quattro Premier Xe in ES Negative Ion Mode MSMS”, Applicatin Note.Waters Corporation, 2013 8. Hancock,P. , “Confirmatory Method for the determination of chloramphenicol, thiamphenicol and florfenicol in honey” , Application Notes; Waters Corporation, Atlas Park,2013. 9. Nollet,L.M.L.; Toldora.F., “Handbook of Muscle Food Analysis”, pp.233-244,Boca Raton Press,2009 10. Food Safety and Quality Laboratory, Ministry of Health Malaysia. “In-house Method : Determination Of Nitrofuran Metabolite Residues in Meat and Meat Products and Fish and Fish products by Liquid Chromatography Tandem Mass Spectrometry” ,2013. 11. Leitner, A., Zollner,P. and Lidner,W. “Determination of the metabolites of nitrofuran antibiotics in animal tissues by High Performance Liquid Chromatography-tandem mass spectrometry” Journal of Chromatography A 939,no.1:49-58, 2001 12. Food Safety and Quality Laboratory, Ministry of Health Malaysia. “In-house Method : Determination of Triphenylmethane Dyes by Solvent Extraction in Fish & Fish products by Liquid Chromatography Tandem Mass Spectrometry” , 2014. 39. Authors: Mohamed Ismail Mujahid Hilal The Effects of Services Marketing Mix Elements on Brand Equity and Customer Response of Paper Title: Tourists Hotels in the East Coast of Sri Lanka Abstract: The purpose of the study was to examine the effect of the elements of extended service marketing 249-259 mix of the east coast hotels in Sri Lanka on the creation of the brand equity and how that brand equity plays a mediating role in customers’ response. The study was quantitative in nature. Survey methodology was adopted. 163 tourists arriving in Sri Lanka who stayed in the hotels in the East Coast of Sri Lanka were surveyed. The questionnaire was used to collect the data. Smart PLS 3 was used to analyze the data. Findings suggest that people, process, physical evidence and marketing communication elements have an effect on the brand equity and in turn positively influence the customer response towards the hotel. Findings also suggest that brand equity of these hotels is partially mediating between extended marketing mix elements and customer response to the hotels. However, marketing communication is not significantly contributing to brand equity. Hoteliers in the region can focus on the people, process and physical evidence to improve their hotel performance as it also contributes to the customer responses towards hotels.

Keyword: Service marketing mix, people, process, physical evidence, brand equity, customer response References: 1 Abril, C., Canovas, B.R. (2012), Marketing Mix Effects on Private Labels Brand Equity, European Journal of Management and Business Economics, Vol. 25, pp. 168-175. 2 Abu‐ELSamen A.A, Akroush M.N, Al‐Khawaldeh F.M, Al‐Shibly M.S, (2011), Towards an Integrated Model of Customer Service Skills and Customer Loyalty: The Mediating Role of Customer Satisfaction, International Journal of Commerce and Management, Vol. 21, No. 4, pp.349-380. 3 Aghaei, M., Vahedi., Kahreh M.S., and Pirooz, M. (2014), An Examination of the Relationship between Services Marketing Mix and Brand Equity Dimensions, Procedia – Social and Behavioural Sciences, Vol. 109, pp. 865-869 4 Albrecht C.M, Hattula S, Bornemann T, Hoyer W.D, (2016), Customer Response to Interactional Service Experience: The Role of Interaction Environment, Journal of Service Management, Vol. 27, No. 5, pp.704-729. 5 Ali, F., Hussain, K. and Omar, R. (2016), Diagnosing Customer Experience, Emotions and Satisfaction in Malaysian Resort Hotels, European Journal of Tourism Research, Vol. 12, pp. 25-40. 6 Ali, F., Omar, R. and Amin, M. (2013), An examination of the Relationships between Physical Environment, Perceived Value, Image and Behavioural Intentions: A SEM Approach towards Malaysian Resort Hotels, Journal of Hotel and Tourism Management, Vol. 27, No. 2, pp. 9-26. 7 Andreassen T.W, Kristensson P, Olsen L.L, Parasuraman A, McColl-Kennedy J.R., Edvardsson B, Colurcio M, (2016), Linking Service Design to Value Creation and Service Research, Journal of Service Management, Vol. 27, No. 1, pp.21-29. 8 Baron, R.M., and Kenny, D.A. (1986), The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic and Statistical Consideration, Journal of Personality and Social Psychology, Vol. 51, No. 6, pp. 1173-1182. 9 Beltagui A, Candi M, (2018), Revisiting Service Quality through the Lens of Experience Centric Services, International Journal of Operations & Production Management, Vol. 38, No. 3, pp.915-932. 10 Berman, B. and Evans, J.R. (2001), Retail Management: A Strategic Approach, 12th ed., Pearson International Edition. 11 Bitner, M., Ostrom, A., Morgan, F. (2008), Service Blueprinting: A Practical Technique for Service Innovation, California Management Review, Vol. 50 No. 3, pp. 66-94. 12 Bravo R, Martinez E, Pina J.M, (2019), Effects of Service Experience on Customer Responses to a Hotel Chain, International Journal of Contemporary Hospitality Management, Vol. 31, No. 1, pp.389-405. 13 Bruhn, M., Schoenmueller, V. and Schafer, D.B. (2012), Are Social Media Replacing Traditional Media in terms of Brand Equity Creation?, Management Research Review, Vol. 35 No. 9, pp. 770-790. 14 Buil I., Martinez, E., Chernatony., L.D. (2013), The Influence of Brand Equity on Consumer Responses, Journal of Consumer Marketing, Vol. 30, No. 1, pp. 62-74 15 Caruana. A., Calleya P., (1998), The Effect of Internal Marketing on Organizational Commitment among Retail Bank Managers, International Journal of Bank Marketing, Vol. 16, No. 3, pp.108-116 16 Choudhury K., (2013), Service Quality and Customers’ Purchase Intentions: An Empirical Study of the Indian Banking Sector, International Journal of Bank Marketing, Vol. 31, No.7, pp.529-543 17 Contiero E, Ponsignon F, Smart P.A, Vinelli A, (2016), Contingencies and Characteristics of Service Recovery System Design: Insights from Retail Banking, International Journal of Operations & Production Management, Vol. 36, No. 11, pp.1644-1667 18 Cretu, A. E., & Brodie, R. J. (2007). The Influence of Brand Image and Company Reputation where Manufacturers Market to Small Firms: A Customer Value Perspective, Industrial Marketing Management, Vol. 36, No. 2, pp. 230–240. 19 Erdem, T., Swait, J., and Valenzuela, A. (2006), Brands as Signals: A Cross-Country Validation Study, Journal of Marketing, Vol. 70, No. 1, pp. 34–49. 20 Hanaysha J.R, (2018), An Examination of the Factors Affecting Consumer’s Purchase Decision in the Malaysian Retail Market, PSU Research Review, Vol. 2, No. 1, pp.7-23 21 Hair, J.F., Hult, G.T.M., Ringle, C.M., Sarstedt, M., (2013), A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). Sage, Thousand Oaks 22 Hernandez M.I.S., Miranda F.J, (2011), Linking Internal Market Orientation and New Service Performance, European Journal of Innovation Management, Vol. 14, No.2, pp.207-226. 23 Horng J.S., Liu C.H., Tsai C.Y. (2012), Understanding the Impact of Culinary Brand Equity and Destination Familiarity on Travel Intentions, Tourism Management, Vol. 33, pp. 815-824. 24 Huang R., Sarigollu E., (2012), How Brand Awareness Relates to Market Outcome, Brand Equity and the Marketing Mix, Journal of Business Research, Vol. 65, No. 1, pp. 92-99. 25 Hu H, Jasper C.R, (2006), Social Cues in the Store Environment and their Impact on Store Image, International Journal of Retail & Distribution Management, Vol. 34, No. 1, pp.25-48. 26 Jones T, Fox G.L, S.F, Fabrigar L.R, (2010), Service Customer Commitment and Response, Journal of Services Marketing, Vol. 24, No. 1, pp.16-28. 27 Keller, K. L. (1993). Conceptualizing, Measuring, and Managing Customer-Based Brand Equity, Journal of Marketing, Vol. 57, No. 1, pp. 1–22. 28 Keller, K.L. (2013), Strategic brand management: building, measuring, and managing brand equity, (4th ed.), Pearson, England 29 Kimpakorn N., Tocquer G, (2010), Service Brand Equity and Employee Brand Commitment, Journal of Services Marketing, Vol. 24, No. 5, pp.378-388. 30 Kostopoulos G, Gounaris S, Boukis A, (2012), Service Blueprinting Effectiveness: Drivers of Success, Managing Service Quality: An International Journal, Vol. 22, No. 6, pp.580-591 31 Larsen P, Tonge R, Lewis A, (2007), Strategic Planning and Design in the Service Sector, Management Decision, Vol. 45, No. 2, pp.180-195. 32 Leung, D., Law, R., van Hoof, H. and Buhalis, D. (2013), Social Media in Tourism and Hospitality: A Literature Review, Journal of Travel & Tourism Marketing, Vol. 30 No. 1/2, pp. 3-22. 33 Liu M.T, Wong I.A, Tseng T.H, Chang A.W., Phau I. (2017), Applying Consumer Based Brand Equity in Luxury Hotel Branding, Journal of Business Research, 81, pp. 192-202 34 Llodra-Riera, I., Martínez-Ruiz, M.P., Jiménez-Zarco, A.I. and Izquierdo-Yusta, A. (2015), A Multidimensional Analysis of the Information Sources Construct and Its Relevance for Destination Image Formation, Tourism Management, Vol. 48, pp. 319-328. 35 Lu, A.C.C., Gursoy, D., Lu, C.Y. (2015), Authenticity Perceptions, Brand Equity and Brand Choice Intention: The Case of Ethnic Restaurants, International Journal of Hospitality Management, Vol. 50, pp. 36-45. 36 Mager, B. (2004), Service Design – A Review, Prima Print, Koeln. 37 Magi, A.W. (2003), Share of Wallet in Retailing: the Effects of Customer Satisfaction, Loyalty Cards and Shopper Characteristics, Journal of Retailing, Vol. 79 No. 2, pp. 97-106. 38 Mahmood, R. and Khan, S.M. (2014), Impact of Service Marketing Mixes on Customer Perception: A Study on Eastern Bank Limited, Bangladesh, European Journal of Business and Management, Vol. 6 No. 34, pp. 164-167. 39 Mattila A.S, Wirtz J (2008), The Role of Store Environmental Stimulation and Social Factors on Impulse Purchasing, Journal of Services Marketing, Vol. 22, No. 7, pp.562-567. 40 Mohan G, Sivakumaran B, Sharma P, (2013), Impact of Store Environment on Impulse Buying Behavior, European Journal of Marketing, Vol. 47, No. 10, pp.1711-1732. 41 Moro S, Rita P, (2018), Brand Strategies in Social Media in Hospitality and Tourism, International Journal of Contemporary Hospitality Management, Vol. 30, No.1, pp.343-364. 42 Mukharjee, S., Shivani, S. (2016), Marketing Mix Influence on Service Brand Equity and Its Dimensions, Vision, Vol. 20, No. 1, pp. 9-23. 43 Oh, J., Fiorito, S.S., Cho, H. and Hofacker, C.F. (2008), Effects of Design Factors on Store Image and Expectation of Merchandise Quality in Web-based Stores, Journal of Retailing and Consumer Services, Vol. 15, No. 4, pp. 237-249. 44 Papasolomou. I, Vrontis, D., (2006), Building Corporate Branding through Internal Marketing: The Case of the UK Retail Bank Industry, Journal of Product & Brand Management, Vol. 15, No.1, pp.37-47. 45 Rajh, E. (2005), The Effect of Marketing Mix Elements on Brand Equity, Economic Trends and Economic Policy, No. 102, pp. 30-59. 46 Ramanathan U, Subramanian N, Parrott G, (2017), Role of Social Media in Retail Network Operations and Marketing to Enhance Customer Satisfaction, International Journal of Operations & Production Management, Vol. 37, No.1, pp.105-123 47 Rauch D.A, Collins M.D, Nale R.D, Barr P.B, (2015), Measuring Service Quality in Mid-Scale Hotels, International Journal of Contemporary Hospitality Management, Vol. 27, No. 1, pp.87-106 48 Sachdeva I, Goel S, (2015), Retail Store Environment and Customer Experience: A Paradigm, Journal of Fashion Marketing and Management, Vol. 19, 3, pp.290-298 49 Schivinski B, Dabrowski D, (2015), The Impact of Brand Communication on Brand Equity through Facebook, Journal of Research in Interactive Marketing, Vol. 9, No.1, pp.31-53. 50 Seo, E.J. and Park, J.W. (2018), A Study on the Effects of Social Media Marketing Activities on Brand Equity and Customer Response in the Airline Industry, Journal of Air Transport Management, Vol. 66, pp. 36-41. 51 Sheu C, McHaney R, Babbar S, (2003), Service Process Design Flexibility and Customer Waiting Time, International Journal of Operations & Production Management, Vol. 23, No. 8, pp.901-917 52 Sigala, M. (2011), eCRM 2.0 Applications and Trends: the Use and Perceptions of Greek Tourism Firms of Social Networks and Intelligence, Computers in Human Behavior, Vol. 27, pp. 655-661. 53 Sivadas E., Prewitt, J.L.B, (2000), An Examination of the Relationship between Service Quality, Customer Satisfaction, and Store Loyalty, International Journal of Retail & Distribution Management, Vol. 28, No. 2, pp.73-82. 54 Smith J, Anderson S, Fox G, (2017), A Quality System’s Impact on the Service Experience, International Journal of Operations & Production Management, Vol. 37, No. 12, pp.1817-1839. 55 Stojanovic I, Andreu L, Curras-Perez R, (2018), Effects of the Intensity of Use of Social Media on Brand Equity: An Empirical Study in a Tourist Destination, European Journal of Management and Business Economics, Vol. 27, No. 1, pp.83-100. 56 Sum C.Y, Hui C.L, (2009), Salespersons' Service Quality and Customer Loyalty in Fashion Chain Stores: A Study in Hong Kong Retail Stores, Journal of Fashion Marketing and Management: An International Journal, Vol. 13, No. 1, pp.98-108. 57 Tsiros, M., Mittal, V. and Ross, W.T. Jr. (2004), The Role of Attributions in Customer Satisfaction: a Reexamination, Journal of Consumer Research, Vol. 31, No. 2, pp. 476-483. 58 Wirtz J, Mattila A.S, Tan R.L.P, (2007), The Role of Arousal Congruency in Influencing Consumers' Satisfaction Evaluations and In‐store Behaviors, International Journal of Service Industry Management, Vol. 18, No. 1, pp.6-24. 59 Wirtz., J. and Lovelock., C. (2016), Services Marketing, (8th ed.), Pearson, USA 60 Wong A, Sohal A, (2003), Service Quality and Customer Loyalty Perspectives on Two Levels of Retail Relationships, Journal of Services Marketing, Vol. 17, No. 5, pp.495-513. 61 Xie K.L, Zhang Z, Zhang Z, Singh A, Lee S.K, (2016), Effects of Managerial Response on Consumer eWOM and Hotel Performance: Evidence from TripAdvisor, International Journal of Contemporary Hospitality Management, Vol. 28, No. 9, pp.2013-2034 62 Yang H, Coates N, (2010), Internal Marketing: Service Quality in Leisure Services, Marketing Intelligence & Planning, Vol. 28, No. 6, pp.754-769. 63 Yoo B, Donthu N (2001), Developing and Validating a Multidimensional Consumer-Based Brand Equity Scale, Journal of Business Research, Vol. 52, pp. 1 -14. 64 Yoo, B., Donthu, N., & Lee, S. (2000), An Examination of Selected Marketing Mix Elements and Brand Equity, Journal of the Academy of Marketing Science, Vol. 28, No. 2, pp. 195–211. 65 Zolfagharian M, Hasan F, Iyer P, (2018), Customer Response to Service Encounter Linguistics, Journal of Services Marketing, Vol. 32, No. 5, pp.530-546. 40. Authors: A.Hemalatha, Selvabrunda

Paper Title: Mobile Malware Detection using Anomaly Based Machine Learning Classifier Techniques

Abstract: Mobile phones are a significant component of people's life and are progressively engaged in 260-267 these technologies. Increasing customer numbers encourages the hackers to make malware. In addition, the security of sensitive data is regarded lightly on mobile devices. Based on current approaches, recent malware changes fast and thus become more difficult to detect. In this paper an alternative solution to detect malware using anomaly-based classifier is proposed. Among the variety of machine learning classifiers to classify the latest Android malwares, a novel mixed kernel function incorporated with improved support vector machine is proposed. In processing the categories selected are general information, data content, time and connection information among various network functions. The experimentation is performed on MalGenome dataset. Upon implementation of proposed mixed kernel SVM method, the obtained results of performance achieved 96.89% of accuracy, which is more effective compared with existing models.

Keyword: Machine Learning, Malware detection, Mixed kernel function, Support vector machine References: 1. Amos, B., Turner, H., & White, J. (2013, July). Applying machine learning classifiers to dynamic android malware detection at scale. In 2013 9th international wireless communications and mobile computing conference (IWCMC) (pp. 1666-1671). IEEE. 2. Android (2013) Android 4.2, Jelly Bean. http://www.android.com/about/jelly-bean/. 3. Anuar, N. B., Sallehudin, H., Gani, A., & Zakaria, O. (2008). Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree. Malaysian journal of computer science, 21(2), 101-115. 4. Anubis (2013) Anubis: analyzing unknown binaries. http://anubis.iseclab.org/. 5. Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K., & Siemens, C. E. R. T. (2014, February). Drebin: Effective and explainable detection of android malware in your pocket. In Ndss (Vol. 14, pp. 23-26). 6. Arstechnica (2013) More Bad News for android: new malicious apps found in google play. http://arstechnica.com/security/2013/ 04/more-bad news-for-android-new-malicious-apps-found-in-go ogle-play/. 7. Bradley, A. P. (1997). The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern recognition, 30(7), 1145-1159. 8. Breiman, L. (2001). Random forests. Machine learning, 45(1), 5-32. 9. Burguera, I., Zurutuza, U., &Nadjm-Tehrani, S. (2011, October). Crowdroid: behavior-based malware detection system for android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (pp. 15-26). ACM 10. Curiac, D. I., &Volosencu, C. (2012). Ensemble based sensing anomaly detection in wireless sensor networks. Expert Systems with Applications, 39(10), 9087-9096. 11. Dini, G., Martinelli, F., Saracino, A., &Sgandurra, D. (2012, October). MADAM: a multi-level anomaly detector for android malware. In International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (pp. 240-253). Springer, Berlin, Heidelberg. 12. Egele, M., Scholte, T., Kirda, E., &Kruegel, C. (2012). A survey on automated dynamic malware-analysis techniques and tools. ACM computing surveys (CSUR), 44(2), 6. 13. Eskandari, M., & Hashemi, S. (2012). A graph mining approach for detecting unknown malwares. Journal of Visual Languages & Computing, 23(3), 154-162. 14. Felt, A. P., Finifter, M., Chin, E., Hanna, S., & Wagner, D. (2011, October). A survey of mobile malware in the wild. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (pp. 3-14). ACM. 15. F-Secure (2013) Android accounted for 79% of all mobile malware in 2012, 96% in Q4 alone. http://techcrunch.com/2013/03/07/ f-secure-android-accounted-for-79-of-all-mobile-malware-in-201296-in-q4-alone/. Accessed 1st June 2013 16. Gogoi, P., Bhattacharyya, D. K., Borah, B., &Kalita, J. K. (2013). MLH-IDS: a multi-level hybrid intrusion detection method. The Computer Journal, 57(4), 602-623. 17. Huang, C. Y., Tsai, Y. T., & Hsu, C. H. (2013). Performance evaluation on permission-based detection for android malware. In Advances in Intelligent Systems and Applications-Volume 2 (pp. 111-120). Springer, Berlin, Heidelberg. 18. Ibrahim, L., Salah, M., Rahman, A. A. E., Zeidan, A., &Ragb, M. (2013). Crucial role of CD4+ CD 25+ FOXP3+ T regulatory cell, interferon-γ and interleukin-16 in malignant and tuberculous pleural effusions. Immunological investigations, 42(2), 122- 136. 19. Liang, S., Keep, A. W., Might, M., Lyde, S., Gilray, T., Aldous, P., & Van Horn, D. (2013, November). Sound and precise malware analysis for android via pushdown reachability and entry-point saturation. In Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices (pp. 21-32). ACM. 20. Wyatt, T. (2010). Security alert: Geinimi, sophisticated new android trojan found in wild. Online] December,2010. 21. Patel, A., Taghavi, M., Bakhtiyari, K., &JúNior, J. C. (2013). An intrusion detection and prevention system in cloud computing: A systematic review. Journal of network and computer applications, 36(1), 25-41. 22. Play G (2013) Shop android apps. https://play.google.com/store?hl=en. 23. Project MG (2013) Android malware genome project. http://www.malgenomeproject.org/. 24. SandDroid (2013) SandDroid-an APK analysis sandbox. http://sanddroid.xjtu.edu.cn/. 25. Sangkatsanee, P., Wattanapongsakorn, N., &Charnsripinyo, C. (2011). Practical real-time intrusion detection using machine learning approaches. Computer Communications, 34(18), 2227-2235. 26. Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Nieves, J., Bringas, P. G., & Álvarez Marañón, G. (2013). MAMA: manifest analysis for malware detection in android. Cybernetics and Systems, 44(6-7), 469-488. 27. Sarma, B. P., Li, N., Gates, C., Potharaju, R., Nita-Rotaru, C., & Molloy, I. (2012, June). Android permissions: a perspective combining risks and benefits. In Proceedings of the 17th ACM symposium on Access Control Models and Technologies (pp. 13- 22). ACM. 28. Selvaraj, D., & Ganapathi, P. (2014). Packet payload monitoring for Internet worm content detection using deterministic finite automaton with delayed dictionary compression. Journal of Computer Networks and Communications, 2014. 29. Su, X., Chuah, M., & Tan, G. (2012, December). Smartphone dual defense protection framework: Detecting malicious applications in android markets. In 2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN) (pp. 153- 160). IEEE. 30. Divya, S., & Padmavathi, G. (2014). A novel method for detection of internet worm malcodes using principal component analysis and multiclass support vector machine. International Journal of Security and Its Applications, 8(5), 391-402. 31. Survey G (2013) Our mobile planet: global smartphone user. 32. Symantec (2013) Android ransomware predictions hold true. 33. Midhunchakkaravarthy, D. D. (2016). An Efficient And Secure Detection Of Internet Worm Using Propagation Model. International Journal Of Innovations In Scientific And Engineering Research, 3(1), 8-15. 34. Teufl, P., Ferk, M., Fitzek, A., Hein, D., Kraxberger, S., &Orthacker, C. (2016). Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play). Security and communication networks, 9(5), 389-419. 35. tshark (2013) tshark-the wireshark network analyzer. 36. Verwoerd, T., & Hunt, R. (2002). Intrusion detection techniques and approaches. Computer communications, 25(15), 1356-1365. 37. Divya, S. (2013). A survey on various security threats and classification of malware attacks, vulnerabilities and detection techniques. International Journal of Computer Science & Applications (TIJCSA), 2(04). 38. Zhou, Y., & Jiang, X. (2012, May). Dissecting android malware: Characterization and evolution. In 2012 IEEE symposium on security and privacy (pp. 95-109). IEEE. 39. Yerima, S. Y., Sezer, S., McWilliams, G., &Muttik, I. (2013, March). A new android malware detection approach using bayesian classification. In 2013 IEEE 27th international conference on advanced information networking and applications (AINA) (pp. 121-128). IEEE. 40. Zhao, M., Zhang, T., Ge, F., & Yuan, Z. (2012). RobotDroid: a lightweight malware detection framework on smartphones. Journal of Networks, 7(4), 715. 41. Zheng, M., Sun, M., & Lui, J. C. (2013, July). Droid analytics: a signature based analytic system to collect, extract, analyze and associate android malware. In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 163-171). IEEE. Authors: Senthil. J, M.Muthukannan, S H Robin Sham

Paper Title: Prediction of Climate Risk Management in Infrastructure Projects Abstract: Risk Management in Construction Project is playing important role to achieve successes of the Project. Risk is in everywhere and every project particularly in construction has innumerable risks occurring before construction and during construction period. Most of the risks are repeatedly occurring but the impact & probability of risk is varying. However, the climate risk may lead to impact the Time, Cost and losing an opportunity Cost of the project. This study is to create a model for risk data collection, risk analysis, risk interpretation with the combination of project schedule and cost, India climate is varying from states to states especially the annual number of raining days different from 10 to 130 days throughout India and its impact the construction schedule 3% to 36% on average, Temperature is verifying for winter (0C to 25C) and summer (25C to 50C) is also impact the productivity of project this will reflected in the Project Cost 1% to 10% on average. The History of Climate we can identify the Climate Risk, Environment Risk, impact the time and Cost. However, this paper is measuring and handling risks to help for upcoming construction projects.

41. Keyword: Risk Management, Climate, Time, Cost.

References: 268-272 1. Richard Clough, Construction Contracting, Wiley- Interscience, New Mexico, 1972. 2. Journal of Civil Engineering Research 2014, 4(2A): 31-36 “A Review on Critical Risk Factors in the Life Cycle of Construction Projects” 3. IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) ISSN: 2278-1684, PP: 59-65 Risk Management in Construction Industry Mr. Satish K. Kamane1, Mr. Sandip A. Mahadik2 1,2(Asst. Prof Civil Engineering Dept. Ats Sbgi Miraj) 4. International Journal of Innovative Research in Science, Engineering and Technology Vol. 4, Issue 10, October 2015 Risk Management in Construction Industry - A Case Study A. Suchith Reddy 1 Master of Science in Construction Management, Sheffield Hallam University, UK, 20101 Assistant Professor, Department of Civil Engineering, KITS College, Warangal, Telangana, India 1 5. Operational Research in Sustainable Development and Civil Engineering - meeting of EURO working group and 15th German- Lithuanian-Polish colloquium (ORSDCE 2015) Risk analysis in construction project - chosen methods. Agnieszka Dziadosza Mariusz Rejmentb a Institute of Structural Engineering, Poznan University of Technology, Piotrowo 5, 60-965 Poznan, Poland b Institute of Building Engineering , Wroclaw University of Technology, Wybrzeze Wyspianskiego 27, 50-370 Wroclaw, Poland 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 A STUDY OF VARIOUS FACTORS AFFECTING RISK MANAGEMENT TECHNIQUES IN CONSTRUCTION PROJECT: A CASE STUDY OF INDIA Shuaibu Saminu1, Raj Prasad2, V. Thamilarasu3 1PG Student, Department of Civil Engineering, SRM University, Chennai, India 2Assistant Professor, Department of Civil Engineering, SRM University, Chennai, India 3Professor, Department of Civil Engineering, SRM University, Chennai, India 42. Authors: K.Vidhya, S.B.Inayath Ahamed

Paper Title: The Relationship of Interest Rate, Exchange Rate, GDP and FDI with Respect to Chinese Economy

Abstract: Economic growth can be described as the boom in purchasing power of a country in offering the 273-277 economic goals of its population. China is the major emerging market in Asia. Late 1970's China has gone through major economic reform, which leads them to the fastest developing country in the world. In this article, the Analyzer attempted to become aware of the impact of FDI, Real Interest Rate, Exchange rates and Gross Domestic Product (GDP) with respect to each other. Chinese GDP is greater than 10% over 30 years constantly. The researcher attempted to find the scope of the future boom of China and the global economic system, taken into consideration the current financial slowdown of China, the new economic interdependence between China and its trading partners created a variety of problems and so raised many issues that require further study the future of Chinese economy, also studied the china’s success story by comparing FDI, real interest rate, exchange rates and Gross Domestic Product for different developing countries to drive their economies by means of following Chinese model. Keyword: FDI, Interest rates, Exchange rates GDP References: 1. Naughton, B. (2007). The Chinese economy: Transitions and growth. MIT press. 2. Naughton, B. (2007). Transitions and Growth. Cambridge: Massachusetts Institute Of Technology Press, 20007, 528. 3. Huang, Y. (2008). Capitalism with Chinese characteristics: Entrepreneurship and the state. Cambridge University Press. 4. Li, J. (2007). Development and Tax Policy: Case Study of China. 5. J.Peter Leo Deepak, R.Amudha “Impact of Forex Swap Among BRICS:Post Global Financial Crisis, Jour of Adv Research in Dynamical & Control System,07-Special Issue,July 2017”Special Issue on Management studies. 6. Demurger, S. (2001). Infrastructure development and economic growth: an explanation for regional disparities in China?. Journal of Comparative Economics, 29(1), 95-117. 7. Barnett, A. D. (1981). China's economy in global perspective (p. 522). Washington, DC: Brookings Institution. 8. Chai, J. C. (1998). China: Transition to a Market Economy. OUP Catalogue. 9. www.worldbank.org 10. www.pbc.gov.cn Authors: Shamshimah Samsuddin, Noriszura Ismail Estimating Markov Transition Probabilities Between Health States in the Social Security Malaysia Paper Title: (SOCSO) Dataset Abstract: Occupational injury represents a considerable part of injury burden to the society as it may affect workers in their most productive years. The objective of this paper is to estimate the Markov transition probabilities of a worker’s health states over time using the Counting Method (CM) and the Proportional Odds Model (POM), focusing on disability among the Social Security Organization (SOCSO) contributors in Malaysia. Four health states namely active/work (A), temporary disability (T), permanent disability (P) and death (D) are considered, where the transition probabilities are estimated at yearly intervals based on age, gender, year and disability category.

Keyword: Occupational injury, Markov transition probabilities, Counting Method, Proportional Odds Model References: 1. Abreu, Mery Natali Silva, Siqueira, Arminda Lucia, & Caiaffa, Waleska Teixeira, 2009. Ordinal logistic regression in epidemiological studies. Revista de Saude publica, 43(1), 183-194. 2. Cole, Bernard F, Bonetti, Marco, Zaslavsky, Alan M, & Gelber, Richard D., 2005. A multistate Markov chain model for longitudinal, categorical quality‐of‐life data subject to non‐ignorable missingness. Statistics in Medicine, 24(15), 2317-2334. 3. Craig, Bruce A, & Sendi, Peter P., 2002. Estimation of the transition matrix of a discrete‐time Markov chain. Health economics, 11(1), 33-42. 4. De Jong, Piet, & Heller, Gillian Z., 2008. Generalized linear models for insurance data (Vol. 10): Cambridge University Press Cambridge. 5. Diehr, Paula, & Patrick, Donald L., 2001. Probabilities of transition among health states for older adults. Quality of Life 43. Research, 10(5), 431-442. 6. Diehr, Paula, Patrick, Donald L, Bild, Diane E, Burke, Gregory L, & Williamson, Jeff D., 1998. Predicting future years of healthy life for older adults. Journal of clinical epidemiology, 51(4), 343-353. 7. Fleming, Thomas R, & Harrington, David P., 1978. Estimation for discrete time nonhomogeneous Markov chains. Stochastic 278-282 Processes and their Applications, 7(2), 131-139. 8. Jung, Juergen., 2006. Estimating Markov transition probabilities between health states in the HRS dataset. Indiana University. 9. Lievre, Agnes, Brouard, Nicolas, & Heathcote, Christopher., 2003. The estimation of health expectancies from cross-longitudinal surveys. Mathematical population studies, 10(4), 211-248. 10. McCullagh, Peter., 1980. Regression models for ordinal data. Journal of the royal statistical society. Series B (Methodological), 109-142. 11. Park, Wonjun, & Moon, Il., 2007. A discrete multi states model for the biological production of hydrogen by phototrophic microalga. Biochemical engineering journal, 36(1), 19-27. 12. Rickayzen, Ben D., and Duncan EP Walsh., 2002. A Multi-state Model of Disability for the United Kingdom: Implication for Future Need for Long-term Care for the Elderly British Actuarial Journal, 8(2), 341-393. 13. Samsuddin, Shamshimah, & Ismail, Noriszura., 2015. Isu Hilang Upaya Dikalangan Pencarum PERKESO di Malaysia. Malaysia Labour Review, 11(No. 2), 85-94. 14. Samsuddin, Shamshimah, & Ismail, Noriszura., 2016. Multi-state Markov model for disability: A case of Malaysia Social Security (SOCSO). Paper presented at the INNOVATIONS THROUGH MATHEMATICAL AND STATISTICAL RESEARCH: Proceedings of the 2nd International Conference on Mathematical Sciences and Statistics (ICMSS2016). 15. Samsuddin, Shamshimah, & Ismail, Noriszura., 2017. Transition probabilities of health states for workers in Malaysia using a Markov chain model. Paper presented at the AIP Conference Proceedings. 16. Taylor, Howard M, & Karlin, Samuel., 1998. An introduction to stochastic modeling: Academic press. 17. Uhlendorff, Arne., 2006. From no pay to low pay and back again? A multi-state model of low pay dynamics. 18. van de Kassteele, Jan, Hoogenveen, RT, Engelfriet, PM, Van Baal, PHM, & Boshuizen, HC., 2012. Estimating net transition probabilities from cross‐sectional data with application to risk factors in chronic disease modeling. Statistics in medicine, 31(6), 533-543. 19. Willekens, Frans J, Shah, I, Shah, JM, & Ramachandran, P., 1982. Multi-state analysis of marital status life tables: theory and application. Population Studies, 36(1), 129-144. 44. Authors: Hadi Prasetyo Utomo, Abdul Talib Bon, Mokhamad Hendayun SAMR as a Framework for Modeling of Academic Information System in Higher Education Paper Title: Institution toward Education 3.0 Abstract: The implementation of Education 3.0 in educational institutions, mainly in higher education 283-287 institutions (HEIs) has been growing from day to day. The implementation of Education 3.0 has brought the institution towards better education. But on the other hand, the implementation also gives new problems to the institution. The problems are increased administrative processes, insufficient mobility access, and unavailability of access for parents and industry. The problems can be solved by using ICT tools that have been used in many educational institutions called academic information system (AIS). AIS can be used as a way out to overcome the problems mentioned above. To be used in support the Education 3.0, AIS must be transformed in accordance with the needs of Education 3.0. In the process of transforming an information system, a model is needed as a guide. This paper will discuss three models namely model-driven architecture (MDA), service-oriented architecture (SOA) and substitution-augmentation-modification-redefinition (SAMR) to find out which model best suits the characteristics of Education 3.0. At the end of the discussion, it can be concluded that SAMR is best suited to Education 3.0 characteristics.

Keyword: SAMR, Modeling, AIS, HEI, Education 3.0 References: 1. Alyoubi, B. A., Arif, M. J. 2014. A Comparative Study between the Academic Information System of King Abdulaziz University and other Saudi Arabia Universities. Life Science Journal, 11(7). 261-275. 2. Becker, J., R. Knackstedt and J. Pöppelbuß, 2009. Developing maturity models for IT management. Business & Information Systems Engineering, 1(3), 213-222. 3. Box, D., J. d. Vadoss and K. Horrocks, 2005. Chapter 1: Service Oriented Architecture (SOA). https://msdn.microsoft.com/en-us/ library/bb833022.aspx 4. Gerstein, J., 2014. Moving from education 1.0 through education 2.0 towards education 3.0. Educational Technology Faculty Publications and Presentations. Department of Educational Technology. BSU. 5. Gutierrez, F. M., 2006. Faculty best practices using blended learning in e-learning and face-to-face instruction. International Journal on E-Learning, 5, 313–337. 6. Hockly, N., 2013. Digital technologies in low-resource ELT contexts technology for the language teacher. ELT journal, cct063. 7. Indrayani, E., 2013. Management of Academic Information System (AIS) at Higher Education in The City Of Bandung. Procedia-Social and Behavioral Sciences, 103, 628-636. 8. Jude, L. T., M. A. Kajura and M. P. Birevu, 2014. Adoption of the SAMR Model to Asses ICT Pedagogical Adoption: A Case of Makerere University. International Journal of e-Education, e-Business, e-Management and e-Learning, 4(2), 106. 9. Keats, D. and J. P. Schmidt, 2007. The genesis and emergence of Education 3.0 in higher education and its potential for Africa. First Monday, 12(3). 10. Lengel, J. G., 2013. Education 3.0: Seven steps to better schools. New York: Teachers College Press. 11. Light, D., 2012. Principals for Web 2.0 Success: 10 Ways to Build Vibrant Learning Communities with the Read/Write Web. Learning & Leading with Technology, 39(8), 18-20. 12. 12. Mayadas, A. F. and A. G. Picciano, 2007. Blended learning and localness: The means and the end. Journal of Asynchronous Learning Networks, 11, 3–7. 13. Mokhtar, S. A., S. M. S. Anuar and S. Puteh, 2014. Information system model for the measurement of learning outcome attainment. In Engineering Technology and Technopreneuship (ICE2T), 2014 4th International Conference on (pp. 37-40). IEEE. 14. Moore, J. L., C. D. Deane and K. Galyen, 2011. e-Learning, online learning, and distance learning environments: Are they the same?. The Internet and Higher Education, 14(2), 129-135. 15. Moravec, J., 2008. Moving beyond Education 2.0. Education Futures. https://educationfutures.com/blog/2008/02/moving- beyond-education-20/. 16. OMG, 2001. Model-Driven Architecture. http://www.omg.org/mda/. 17. OpenGroup, 2005. Service-Oriented Architecture.http://www.opengroup.org/soa/source-book/soa/index.htm 18. Puentedura, R., 2010. SAMR and TPCK: Intro to advanced practice. http://hippasus.com/resources/sweden2010/ SAMR_TPCK_IntroToAdvancedPractice.pdf 19. Rahmat, R. A. A. O. and K. Osman, 2012. From Traditional to Self-Regulated Learners: UKM Journey Towards Education 3.0. Procedia-Social and Behavioral Sciences, 59, 2-8. 20. Romrell, D., L. C. Kidder and E. Wood, 2014. The SAMR Model as a Framework for Evaluating mLearning. Journal of Asynchronous Learning Networks, 18(2), n2. 21. Solar, M., J. Sabattin and V. Parada, 2013. A Maturity Model for Assessing the Use of ICT in School Education. Educational Technology & Society, 16(1), 206-218. 22. Stevenson, M., P. Cevenini, I. Temple, R. Halkett and R. Patton, 2011. Transforming Education, Transforming Lives: A Path Toward Next Generation Learning. The Cisco Connected Insight Series. https://www.cisco.com/web/learning/le21/le34/downloads/689/educause/whitepaper.pdfThomas, A. M., H. Shah, P. Moore, P. Rayson, A. J. Wilcox, K. Osman and H. V. Pham, 2012. E-Education 3.0: Challenges and Opportunities for the Future of iCampuses. In Complex, Intelligent and Software Intensive Systems (CISIS), 2012 Sixth International Conference on (pp. 953- 958). IEEE. 23. Utami, E. and S. Raharjo, 2014. Database Security Model in the Academic Information System. International Journal of Security and Its Applications, 8(3), 163-174. 24. Utomo, H. P., A. T. Bon and M. Hendayun, 2016. Modeling of Academic Information System in Higher Education Institution toward Education 3.0: A Literature Review. Proceeding of the 2016 International Conference on Engineering Design and Analysis (ICEDA 2016), Langkawi, Malaysia. 25. Utomo, H. P., A. T. Bon and M. Hendayun, 2017. Academic Information System Support in the Era of Education 3.0 J. of Phys.: IOP Conf. Ser.: Mater. Sci. Eng. 226 26. Utomo, W. H. and T. Wellem, 2013. Modeling of Business Process Management of Academic Affair Information System. International Journal of Computer Applications, 64(16). 27. Vaughan, R., 2008. Conceptual Framework. Bournemouth University. UK. http://assets.bournemouth.ac.uk/news-archive/services-management/news_events_conferences/PPTs/r_vaughan.ppt 45. Authors: Muhammad Azri Othman, Mohamad Minhat, Zamberi Jamaludin

Paper Title: A Framework of Next Generation Adaptive CNC Controller

Abstract: Modern manufacturing industries have increasingly demanded to bring comprehensive input data 288-293 described using high-level languages such as STEP-NC, rather than outdated G&M codes into computer numerical control machine tool levels. In current dynamic shop floor environments, predefined numerical control (NC) command generated in early stages is regularly found unusable or unsuitable for the dedicated resources, causing useless efforts used up in the initial process planning and NC code generation. This research aims to propose a new structure of an adaptive CNC controller by taking the advantages of well-known IEC61499 and STEP-NC standards. For realising adaptive CNC controller capability, integration of the native process planning decision-making function into CNC controller will be established. The activities such as cutting tool selection, machining parameter determination and toolpath generation will be issued automatically by the controller itself that subject to available online machine resources. The generic STEP-NC file is employed as data input and arranged accordingly in the IEC 61499 function block software editor. The system is developed in the JAVA environment by using proposed language.

Keyword: Adaptive Controller; STEP-NC; IEC61499 Function Block; CNC References: 1. Elias, D. M., Y. Yusof, and M. Minhat, 2012. Design and Machining Control via Interoperable Function Blocks and STEP-NC Data Model. International Conference on Flexible Automation and Intelligent Manufacturing, 239–244. 2. Han, Z., P. Hu, D. Han, and H. Fu, 2012. A framework of STEP-NC manufacturing system integrating CAD, CAPP, CAM and CNC. 16th International Conference on Fluid Dynamic and Mechanical and Electrical Control Engineering, FDMECE 2012, November 10, 2012 - November 11, 2012, 233, 365–368. 3. Ji, W., L. Wang, A. Haghighi, M. Givehchi, and X. Liu, 2016. A reachability based approach for machining feature sequencing. Journal of Manufacturing Systems, 40, 96–104. 4. Liu, R., C. Zhang, and S.T. Newman, 2006. A framework and data processing for interfacing CNC with AP238. International Journal of Computer Integrated Manufacturing, 19(6), 516–522. 5. Minhat, M. 2009. Development of a STEP-NC Controller. PhD Thesis, University of Auckland. 6. Minhat, M., V. Vyatkin, X. Xu, S. Wong, and Z. Al-Bayaa, 2009. A novel open CNC architecture based on STEP-NC data model and IEC 61499 function blocks. Robotics and Computer-Integrated Manufacturing, 25(3), 560–569. 7. Peng, T., X. Xu, and L. Wang, 2014. A novel energy demand modelling approach for CNC machining based on function blocks. Journal of Manufacturing Systems, 33(1), 196–208. 8. Qiu, X. L., L. Ding, and Y. Xing, 2006. Feature-based Process Planning using STEP-NC. International Technology and Innovation Conference 2006, (70102010), 1790–1795. 9. Ridwan, F., and X. Xu, 2013. Advanced CNC system with in-process feed-rate optimisation. Robotics and Computer-Integrated Manufacturing, 29(3), 12–20. 10. Wang, L., 2015. An overview of function block enabled adaptive process planning for machining. Journal of Manufacturing Systems, 35, 10–25. 11. Wang, L., H.-Y. Feng and N. Cai, 2003. Architecture design for distributed process planning. Journal of Manufacturing Systems, 22(2), 99–115. 12. Xu, X. W., and S.T. Newman, 2006. Making CNC machine tools more open, interoperable and intelligent—a review of the technologies. Computers in Industry, 57(2), 141–152. 13. Xu, X. W., Wang, L., and Y. Rong, 2006. STEP-NC and function blocks for interoperable manufacturing. IEEE Transactions on Automation Science and Engineering, 3(3), 297–308. 14. Zhang, X., A. Nassehi, M. Safaieh, and S.T. Newman, 2013. Process comprehension for shopfloor manufacturing knowledge reuse. International Journal of Production Research, 51(23/24), 7405–7419. 46. Authors: Irdayu Ibrahim, Noraida Abdul Ghani, Norazura Ahmad, Nurulhuda Ramli

Paper Title: Z-number CCR using Trapezoidal Fuzzy Numbers

Abstract: Data envelopment analysis (DEA) is a powerful tool for measuring efficiency of multiple inputs 294-298 and outputs of a set of decision making units (DMUs). There are several models in DEA such as the Banker, Charnes and Cooper (BCC) model, Andersen and Peterson (AP) model and many more. The data used are normally crisps but in real life, data are usually vague or imprecise such as in real problems that are characterized by linguistic information given by experts. In such cases, the Z-number has been used as it takes into account expert’s reliability on the information given. Currently, the triangular membership function is used in the Z-number CCR model. However, in linguistic assessment the trapezoidal membership function is better suited to capture the vagueness of the assessment. The Z-number CCR model using the trapezoidal membership function for inputs and outputs of a set of DMUs is proposed in this paper. In the present study, the Z-number CCR using trapezoidal membership function is converted into a linear programming model and a crisp linear programming model is obtained by employing α-cut approach,. A numerical example on portfolio selection in Information Systems/Information Technology (IS/IT) is presented to demonstrate the proposed method and to find the best portfolio by ranking them according to their efficiency score.

Keyword: Z-number, Data envelopment analysis (DEA), fuzzy data envelopment analysis (FDEA), reliability References: 1. Adler, N., Friedman, L., & Sinuany-Stern, Z. (2002). Review of ranking methods in the data envelopment analysis context. European Journal of Operational Research, 140(2), 249–265. 2217(02)00068-1 2. Azadeh, A., & Kokabi, R. (2016). Advanced Engineering Informatics Z-number DEA : A new possibilistic DEA in the context of Z-numbers, 30, 604–617. 3. Banker, R. D., Charnes, A., & Cooper, W. W. (1984). Some models for estimating technical and scale inefficiency in data envelopment analysis.pdf. Management Science, (30), 1078–1092. 4. Bardhan, I., Bagchi, S., Sougstad, R. (2004). Prioritizing a portfolio of information technology investment projects, 5. Journal Management Information System, 21 (2), 33–60. 6. Charnes, A., Cooper, W. W., & Rhodes, E. (1978). Measuring the efficiency of decision making units. European Journal of Operational Research, 2(6), 429–444. (78) 90138-8. 7. Chen, C.T., Cheng, H.L. (2009). A comprehensive model for selecting information system project under fuzzy 8. environment, International Journal Project Management, 27, 389–399. 9. Cooper, R.G., Edgett, S.J., Kleinshmidt, E.J. (1997). Portfolio Management for New Products, McMasterUniversity, Hamilton, ON. 10. Danila, N. (1989). Strategic evaluation and selection of R&D projects, R&D Management, 19, 47–62. 11. Eilat. H., Golany, B.,Shtub, A. (2006). Constructing and evaluating balanced portfolios of R&D projects with interactions: a DEA based methodology, European Journal Operations Research, 172, 1018–1039. 12. Farrell, M. J. (1957). The Measurement of Productive Efficiency Author ( s ): M . J . Farrell Source : Journal of the Royal Statistical Society . Series A ( General ), Vol . 120 , No . 3 ( 1957 ), Published by : Wiley for the Royal Statistical Society Stable URL : http://www.js, 120(3), 253–290. 13. Ghapanchi, A.H., Tavana, M., Khakbaz, M.H., Low, G. (2012). A methodology for selecting portfolios of projects 14. with interactions and under uncertainty, International Journal Project Management, 30, 791–893. 15. Herrera, F. (2000). Linguistic decision analysis : steps for solving decision problems under linguistic information, 115, 67–82. 16. Huang, C.C., Chu, P.Y., Chiang, Y.H. (2008). A fuzzy AHP application in government sponsored R&D project selection, Omega, 36(6), 1038–1052. 17. Letworasirikul, S., Fang , S.C., Joines, J.A., Nuttle, H.L.W. (2003). Fuzzy data envelopment analysis (DEA): 18. a possibility approach, Fuzzy Sets System, 139(2), 379–394. 19. Letworasirikul, S., Fang, S.C., Joines, J.A., Nuttle, H.L.W. (2003). Fuzzy data envelopment analysis (fuzzy DEA): a 20. 20. credibility approach, in: J.L. Verdegay (Ed.), Fuzzy Sets Based Heuristics for Optimization, Physica Verlag, 141– 158. 21. Letworasirikul, S., Fang, S.C., Nuttle, H.L.W., Joines, J.A. (2003). Fuzzy BCC model fordata envelopment analysis, 22. Fuzzy Optimization Decision Making, 2(4), 337–358. 23. Saaty, S. ., Memariani, A., & Jahanshahloo, G. R. (2002). Efficiency Analysis and Ranking of DMUs with Fuzzy Data, (1992), 255–267 24. Schmidt, R.L. (1993). A model for R&D project selection with combined benefit, outcome and resource 25. interactions, IEEE Trans. Eng. Manage, 40, 403–410. 26. Sueyoshi, T. (2000). Stochastic DEA for restructure strategy: an application to a Japanese petroleum company, 27. Omega, 28, 385–398. 28. Zadeh, L. A. (2011). A Note on Z -numbers. Information Sciences, 181, 2923–2932. 47. Authors: P.Pavan Kumar, L.Suneel, Nagaraja Kumar Pateti, A.M.Srinivasacharyulu

Paper Title: Adaptive Steganography using 3D Color Texture Feature

Abstract: Human vision framework is commonly an emotional recognition which differs according to 299-302 people. Intricacy of a picture assumes huge job while verifying information in to it. In this paper another steganography approach is introduced which uses joined 3D Color Texture Feature (CTF) to distinguish complex districts of picture for information stowing away so visual assault to identify shrouded message turns out to be very testing. Recurrence area is utilized to shroud the information in these chose complex areas by means of Discrete Cosine Transform (DCT). These sorts of zones are initially boisterous and separating additional data is difficult. Each picture has diverse multifaceted nature levels and spatial districts, and since information covering up is legitimately reliant on it, so the steganography framework ends up versatile. The outcome demonstrates that proposed versatile strategy gives secure message stowing away while keeping up subtlety quality and high implanting limit. Last spread pictures keeps up PSNR estimation of over 50. Inserting limit is around multiple times higher in contrast with comparative calculation which uses Gray Level Co-event Matrices (GLCM) highlight to recognize complex districts of pictures for information covering up.

Keyword: versatile steganography, unpredictability examination, shading surface element, CTF, GLCM surface, DCT References: 1. Ridhima Grover, D K Chauhan, Dinesh KumarYadav, Suraj Kamya, “Adaptive Steganography via Image Complexity Analysis using 3D Color Texture Feature” 3rd IEEE International Conference on Innovative Applications of Computational Intelligence on Power, Energy and Controls with their on Humanity (CIPECH 2018), KIET Ghaziabad. 2. M. Ulker and B. Arslan, "A novel secure model: Image steganography with logistic map and secret key," 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, 2018, pp. 1-5. 3. D. R. I. M. Setiadi, H. A. Santoso, E. H. Rachmawanto and C. A. Sari, "An improved message capacity and security using divide and modulus function in spatial domain steganography," 2018 International Conference on Information and Communications Technology (ICOIACT), Yogyakarta, 2018, pp. 186-190. 4. Y. P. Astuti, D. R. I. M. Setiadi, E. H. Rachmawanto and C. A. Sari, "Simple and secure image steganography using LSB and triple XOR operation on MSB," 2018 International Conference on Information and Communications Technology (ICOIACT), Yogyakarta, 2018, pp. 191-195. 5. P. Johri, A. Mishra, S. Das and A. Kumar, "Survey on steganography methods (text, image, audio, video, protocol and network steganography)," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 2906-2909. 6. G. L. Smitha and E. Baburaj, "A survey on image steganography based on block-based edge adaptive based on Least Significant Bit Matched Revisited (LSBMR) algorithm," 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, 2016, pp. 132-139. 7. G. Sreenath et al., "Texture based secure data transmission," 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, 2017, pp. 38-42. 8. C. Zheng, M. Shen, X. M. Li and X. Zhang, "Texture adaptive steganography via Convolutional Neural Networks," 2017 3rd IEEE International Conference on Computer and Communications (ICCC), Chengdu, 2017, pp. 1416-1420. 9. D. R. Herrera-Moro, R. Rodriguez-Colin and C. Feregrino-Uribe, "Adaptive Steganography based on textures," 17th International Conference on Electronics, Communications and Computers (CONIELECOMP'07), Cholula, Puebla, 2007, pp. 34-34. 10. P. Joseph and S. Vishnukumar, "A study on steganographic techniques," 2015 Global Conference on Communication Technologies (GCCT), Thuckalay, 2015, pp. 206-210. 11. J. Bhadra, M. K. Banga and M. V. Murthy, "Securing data using elliptic curve cryptography and least significant bit steganography," 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon), Bangalore, 2017, pp. 1460-1466. 12. M. Douglas K. Bailey M. Leeney K. Curran "An overview of steganography techniques applied to the protection of biometric data" Multimedia Tools and Applications pp. 1-41 2017. 13. M. Saidi, H. Hermassi, R. Rhouma and S. Belghith, "LSB-hamming based chaotic steganography (LH-Steg)," 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), Cambridge, 2017, pp. 29-34. 14. P. Khanzadi, B. Majidi & E. Akhtarkavan , “A Novel Metric for Digital Image Quality Assessment using Entropy-Based Image Complexit”, IEEE 4th International Conference on Knowledge-Based Engineering and Innovation (KBEI), Dec. 22QG, 2017. 15. M. Liu, K. Gu, G. Zhai and P. Le Callet, "Visual saliency detection via image complexity feature," 2016 IEEE International Conference on Image Processing (ICIP), Phoenix, AZ, 2016, pp. 2777-2781. S. Yang, et al., “Objective Image Quality Assessment based on Image Complexity and Color Similarity”, 2013 Fourth World Congress on Software Engineering. 16. M. Chacon, et al., “A Fuzzy Approach on Image Complexity Measure”, Computación y Sistemas Vol. 10 No. 3, 2007, pp 268- 284. 17. H. Yu and S. Winkler, “Image Complexity And Spatial Information”, 2013 Fifth International Workshop on Quality of Multimedia Experience (QoMEX) 18. M. Benco, R. Hudec, P. Kamencay, M. Zachariasova and S. Matuska, “An Advanced Approach to Extraction of Color Texture Features Based on GLCM”, International Journal of Advanced Robotic Systems,pp.1-8, 2014. 19. Mario I., Chacon M., Ama D. and Corral S., “Image Complexity Measure: a Human Criterion Free Approach”, NAFIPS 2005 - 2005 Annual Meeting of the North American Fuzzy Information Processing Society. 20. Matthieu Perreira da Silva, Vincent Courboulay, Pascal Estraillier. “ Image Complexity Measure Based On Visual Attention”. IEEE International Conference on Image Processing -ICIP, Sep 2011, Bruxelles, Belgium. pp.3281-3284, 2011 21. X. Song, S. Wang and X. Niu, "An Integer DCT and Affine Transformation Based Image Steganography Method," 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Piraeus, 2012, pp. 102-105. 22. A. Girdhar and V. Kumar, "Comprehensive survey of 3D image steganography techniques," in IET Image Processing, vol. 12, no. 1, pp. 1-10, 1 2018. 23. Haralick R M, Shanmugam K, Dinstein Its 'Hak Textural features for image classification, Systems, Man and Cybernetics, IEEE Transactions, vol. SMC-3, no. 6, pp. 610-621, 1973. Authors: R.S.N.Sharma

Paper Title: A Research on Nonperforming Assets of Banks in India Abstract: Accepting deposits and lending loans is the primary function of banks. They lend loans on certain terms and conditions. Some of the granted loans may be continuously, periodically and systematically repaid by the borrowers as per the agreed terms and conditions but may not be repaid in time and there may be time lag in repayment. Sometimes the time lag may become longer and irrecoverable. The loan granted by the bank is asset to the bank as it is receivable amount to bank. If the loan is being systematically repaid by the borrower, it is performing asset, otherwise if it is not being paid regularly and properly it is said to be non performing asset. If payments of interest and/ or principal are in default for more than 90 days period, generally it is considered as non-performing asset. Nonperforming assets are burden to banks. They adversely affect the performance of banks and sometimes increasing non-performing assets may lead to closure of business also. These should be regularly reviewed, monitored, analysed and ultimately controlled for the smooth running of 48. bank. For this a systematic regulatory mechanism must be employed and ensured its perfect execution. In this paper an attempt has been made to make study on Non-Performing assets of banks in various sectors in India by 303-308 using percentages, Indexed values. The study is completely based on secondary data collected from handbook of statistics of Reserve Bank of India. The collected data is tabulated, analysed and conclusions are drawn.

Keyword: Non-Performing Asset, Performing-Asset, Indexed values References: 1. RBI –Handbook of statistics on Indian Economy 2. RBI – Annual reports 3. Arunkumar (2018): Banking Industry and Non-Performing Assets 4. R.K.Guptha& Himansu Guptha (2017): Credit Appraisal and Analysis of financial Statements 5. Dr Rajkumar Mittal & Ms Deeksha Suneja (2017) : The problem of rising NPAs in Banking sector in India 6. Vivekrajbahadur Singh (2016): A study on NPAs of Commercial banks and its recovery in India 7. Harishikes Bhattacharya (2011): Banking strategy, Credit Appraisal and lending decisions. 49. Authors: C.Jenifa Latha, Ramanarayan Sankriti, M.Chandra sekhar Smart Automation Technique to Collect Dry and Wet Waste using IOT Module: to Achieve our Paper Title: ‘SBM’ Mission Abstract: The global waste production in now a days is increasing at a rapid rate, it is predicated that it 309-314 will give rise to 28 billion tonnes per year by 2051, one-third of the whole global Asian continent is majorly contributed by India and china. The Main objective of the proposed method is to achieve clean India mission abbreviated as SBM. To make our urban and rural areas surrounding to be clean without any dry and wet waste. So our proposed method is designed to collect dry and wet Waste using IOT and embedded system Technology. The government has provided two dustbins in every place to dump the waste, one for dry waste and other for wet waste. The sensors node is kept inside the dustbins. When it becomes full it sends the signal to the Transmitter node. After Receiving the signal from sensor node, it updates details area and location in the common cloud IOT database. Then it sends the information to particular Location vehicle Driver to collect the waste.in the vehicle it has separate provision to collect dry and wet wate using conveyor belt and h-bridge motor driver circuit. After collecting the waste it updates the information to the common cloud database system. node

Keyword: SBM, IOT, Transmitter node References: 1 S.Sakai, S.E.Sawell, A.J.Chandler, ‟World Trends in Municipal Solid Waste Management ‟, Environmental Preservation Centre, Vol 16, page 341, 1996,Kyoto University, Japan. 2 Yamazaki, H. NakaneG and A. Tanaka, “Basic Analysis of a Metal Detector,” IEEE Instr. and Meas., vol.51, no. 4, pp. 810–814, August 2002. 3 Carullo.A, ParvisM,‟An Ultrasonic Sensor for Distance Measurement in Automotive applications, in: IEEE sensors journal,vol1 n 2,page no 143. 4 International Journal of Industrial Electronics and Electrical Engineering, ISSN: 2347- 6982 Volume-3, Issue-5, May-2015. 5 GeE 2008 : Indo Italian conference Green and Environment March 20-21, MAEER's MIT College of Engineering, Pune. 6 Municipal Solid Waste Management in Emerging Mega Cities: A case study of Pune City Indo Italian conference, 2012. 7 Bharadwaj B, M Kumudha, Gowri Chandra N, Chaithra G,”Automation Of Smart Waste Management Using IOT To Support Swachh Bharat Abhiyan” –A Practical Approach, Vol 5,Issue 10, October 2017 IEEE. 8 Parkash, Prabu V,” IOT Based Waste Management for Smart City”, 15680/IJIRCCE. 2016. 9 Palaghat Yaswanth Sai, “IOT Smart Garbage Monitoring System in Cities-An Effective Way to Promote Smart City”, 2016, IJARCSSE 10 Abhimanyu Singh, Pankhuri Aggarwal, Rahul Arora, “ IOT based Waste Collection System using Infrared Sensors”, 2016 IEEE. Authors: V. Lobo, R.Prabhu, Polu Bal Kumar Reddy

Paper Title: A Smart Shopping System for Visually Impaired Abstract: Recently researches and many developments were going in the field of automation and embedded systems to develop and reduce the work of the manpower in industry as well as in public domain areas like Railway station (automatic ticket collection), Metro bus (online reservation), Flight (Auto Pilot mode) etc. To develop more Automation in and to help the blind people, old age and handicapped person we proposed a technique named as automatic trolley carrier navigation and the billing system. This method can be implemented in all shopping malls, big clothing shop, house hold appliances shops etc. It avoids the people to stand in a big queue and automatic billing can be done. Moreover it helps blind people, old age people, Handicapped Persons in the shopping malls make them to purchase in shopping malls by informing about the location of the product, quantity, price and automatic billing etc. The arrangement of the trolley consists of the robotic structure and servo motor which makes the trolley tonavigate and tell way of location of the product availability and price based on the user input. Theuser gives the command through the Bluetooth. Then the keypad passes the customer product information to the Micro-controller then the trolley moves automatically. The use of RFID reader is to scan theEPIC tag ID of allproducts to Identifythe name, price, Quantity of the products. Depending on the RF signal from the RFID -reader, it passes the information to the micro -controller and from that it identify the product and display the name , Quantity , price of the each product in the LCD display. The ultrasonic sensor is used to detect the any obstacles as well as the object.

50. Keyword: RFID, Ultra sonic sensor, DC servo motor and Bluetooth.

References: 315-318 1. Dr. P. MuthuKannan,AnupriyaAsthana, “Automatic Retail System Using RFID”, Volume 1, Issue 5, October 2013, International Journal of Advance Research in Computer Science and ManagementStudies. 2. Zeeshan Ali, ReenaSonkusare, “RFID Based Smart Shopping and Billing”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 12, December 2013 3. Raju Kumar, K. Gopalakrishna, K. Ramesha, “Intelligent Shopping Cart”, International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 4, July 2013. 4. SatishKamble, SachinMeshram, Rahul Thokal, RoshanGakre, “Developing a Multitasking Shopping Trolley Based On RFID Technology”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-6, January 2014 5. VarshaJalkote , Alay Patel, VijayaGawande, Manish sBharadia, Gitanjali R. Shinde, Aaradhana A Deshmukh “Futuristic Trolley for Intelligent Billing with Amalgamation of RFID and BLUETOOTH ”, International Journal of Computer Applications (0975 – 8887) International Conference on Recent Trends in engineering & Technology - 2013(ICRTET'2013) 6. J.S.Awati, S.B.Awati, “Smart Trolley in Mega Mall”, International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459, Volume 2, Issue 3, March 2012) 7. Dr.K.V.K.K.Prasad, “Embedded/Real time operating systems”,. Dreamtech Publications 2010 Edition. 8. Mingyan Li, , Rainer Falk paper on “multi-domain access control using asymmetric key based tag reader mutual authentication”, Dreamtech Publications 2012 Edition. 9. http://www.rfidjournal.com 10. http://en.wikipedia.org/wiki/Bluetooth 11. D.V.S Chandra Babu, “wireless intelligent billing trolley for supermarket”, International Journal of Advanced Research in Technology, vol.3, issue 1, Aug. 2012. 12. KamranAhasan,Paul Kingston IEEE paper on “rfidapplications:an introductory and exploratory study”. 13. Mingyan Li, RadhaPoovendran, Rainer Falk paper on “multi-domain access control using asymmetric key based tag reader mutual authentication. 51. Authors: R. Srivel, Ramanarayan Sankriti, P.Nandha Kumar

Paper Title: Transforming Lead-Free Fuel: Filter less Filtration Process by using Ultrasonic Waves

Abstract: The main objective of the study is focused on removing the impurities in fuel substances. In the 319-322 filtration process, sound waves are passed, as the longitudinal wave is also called as a compression wave. Ultrasonic signals are created with the help of transformer and that feeds into the transducer. When the output of the transducer is passed to the liquid medium it collides with dust particles and pushes the dust particles downwards. The subsequent ultrasonic waves retain the impurities in the bottom. Then the pure material is obtained in the upper part and the impurities in the bottom are removed by opening the lower part. The proposed method of ultrasonic filter will filter the dust particles in the liquid using polystyrene microscope and frequency sweep techniques, it generates the constant longitudinal ultrasonic waves in horizontal direction of a glass tube having large radius. This method makes the dust particles to settle down at the bottom and pure liquid will be present at the top layer.

Keyword: Filtration, transducer, micro-particle, ultrasonic waves References: 1. Arokiaraj, D., 2015. A Study on Environmental Responsibility of the Stakeholders of Auto Industry in Chennai (Doctoral dissertation).http://dspace.pondiuni.edu.in/xmlui/bitstream/handle/1/2040/T5889.pdf?sequence=1 2. Arokiaraj, D., & Banumathi, M. A Study on the Environmental Concern of the Passenger Car User in Chennai. http://irjbm.org/irjbm2013/April2015/Paper8.pdf 3. David, A., & Banumathi, M. (2014). A Study on Eco–Driving Behaviour of Passenger Car Users In Chennai.http://www.theinternationaljournal.org/ojs/index.php?journal=tij&page=article&op=view&path%5B%5D=2757 4. D. Arokiaraj (2012), “Major global issues encountered in automobile advertisement”, International Conference on Synchronizing Management Theories and Business Practices: Challenges ahead 27th & 29th July 2012 ISBN: 978-93-82338-10-9 pp. 199-203. 5. D. Arokiaraj, (2011), “The Green Market: The Way to Save the World”, Business Strategies, ISBN: 978-81-920303-6-4, pp. 41- 44. 6. N.R. Harris, M. Hill, S. Beeby, Y. Shen, N.M. White, J.J. Hawkes, and W .T. Coakley, a silicon microfluidic ultrasonic separator, sensors, and Actuators B, 95(2003) 425-435. 7. P. Pratheepkumar, J. Josephine Sharmila & D. Arokiaraj, (2017) “Towards Mobile Opportunistic in Cloud Computing” Indian Journal of Scientific Research (IJSR), Issue02 vol. 17, ISSN: 0976-2876 (Print) ISSN: 2250-0138(Online), 536 – 540. https://www.ijsr.in/article-description.php?id=b2hLd0trRmcyS3BHQ0dwME90Q3VsQT09 8. A. Nilsson, F. Petersson, H. Jonsson and T. Laurell, Acoustic control of suspended particles in microfluidic chips, Lab Chip, 4(2) (2004) 131-135. 9. Y.S. Lee and J. H. Kwon, A smart device for particle separation in water using ultrasonic standing waves, Water science, and technology: water supply, 6(1) (2006) 173-183. 10. Srivel, D. Arokiaraj & Mohammed Imaduddin, 2018 “Controlling & Calibrating Vehicle-Related Issues Using RFID Technology” International Journal of Mechanical and Production Engineering Research and Development (IJMPERD), ISSN (P): 2249-6890; ISSN (E): 2249-8001, Vol. 8, Issue 2, pp. 1125-1132, DOI: 10.24247/ijmperdapr2018130. http://www.tjprc.org/publishpapers/2-67-1521714530-130.IJMPERDAPR2018130.pdf 11. M. Evander, A. Lenshof, T. Laurell and J. Nilsson, Acoustophoresis in watched glass chips, Anal. Chem, 80 (13) (2008) 5178- 5185. 12. B. Lipkens, M. Costolo and E. Rietman, The effect of frequency sweeping and fluid flow on particle trajectories in ultrasonic standing waves, IEEE Sensors Journal, 8(6) 9 2008, 667-677. Authors: U.Muthaiah, S.Markkandeyan, Y.Seetha

Paper Title: Classification Models and Hybrid Feature Selection Method to Improve Crop Performance Abstract: In this paper classification models and hybrid feature selection methods are implanted on benchmark dataset on the Mango and Maize. Particle Swarm Optimization–Support Vector Machine (PSO- SVM) classification algorithm for the selection of important features from the Mango and Maize datasets to analysis and also compare with the novel classification techniques. Various experiments conducted on these datasets, provide more generated rules and high selection of features using PSO-SVM algorithm and Fuzzy Decision Tree. The proposed method yield high accuracy output as compared to the existing methods with minimum Error Rate and Maximum Positive Rate.

Keyword: Classification, Feature selection, PSO-SVM, Decision Tree References: 1. Shang, L; Zhou, Z; Liu, X. Particle Swarm Optimization- based feature selection n sentiment classification.I Soft Computing 2016, 20, 3821-3834. [CrossRef] 2. Feature selection. Available online :(accessed on 2 Januaryi2017) https://en.wikipedia.org/wiki/Feature_selection 3 .Mehreen Naz, Kashif Zafar, and Ayesha khan. Ensemble Based classification of Sentiments using forest Optimiza tion algorithm, 21 May 2019. 3. Drew, J. Operating In a Change Environment NEAR/Drought Reform, Retrieved from (2010). 52.

4. IJ. Yang and V. Honavar, “Feature subset selection using a I genetic algorithm,” IEEE Intelligent Systems 323-326 TheirApplications,vol.13,no.3,pp.44-49, March/April 1998 5. D. E. Goldberg, Genetic Algorithms n Search, Optimization, and Machine Learning, Reading Menlo Park: Addison- Wesley, vol. 412, 1989. 6. Geraldin B. Dela Cruz, Bobby D. Gerardo, and Bartolome T. I Tanguilig, “Agricultural Crops Classification Models Based on PCA-GA Implementation n Data Mining” International Journal of Modeling and Optimization, Vol. 4, No. 5, October 2014. 7. A. Raoranne and R. V. Kulkarni, “Data Mining: An effective tool for estimation n the agricultural sector,” International Journal of Emerging Trends and Technology n Computer Science, vol. 1, no. 2, pp. 75- 79, July-August 2012 8. S.Veenadhari, Dr. Bharat Misra, Dr. CD Singh, “Data mining Techniques for Predicting Crop Productivity –A review article”, International Journal of Computer Science and technology, march 2011 9. Dr. D. Ashok Kumar, N. Kannathasan, “A Survey on Data Mining and Pattern Recognition Techniques for Soil Data Mining” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011. 10. S Usmin, M Arockia Irudayaraja, U Muthaiah. Dynamic placement of virtualized resources for data centers in cloud, International Conference on Information Communication and Embedded Systems (ICICES2014), 2014/2/27, 1-7, IEEE. 11. U Muthaiah, DRS CHITRA. Dynamic Bin Packing for Resource Allocation in the Cloud data center, 2016/3, Volume 1,issue 3, IJORAT. 12. Muthaiah U, Dr.S.Chitra. Predictive Analytics Tiling Methodology Based Data Mining On Farming Crops In Tamilnadu, ISSN: 0976-2876 (Print),ISSN: 2250-0138(Online)Indian J.Sci.Res. 17(2): 89-92, 2018. 13. P Priya, U Muthaiah, M Balamurugan, Predicting yield of the crop using machine learning algorithm, INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY,2018,Volume 7, issue 4,1-7, 53. Authors: Vishnupriya. D, Samudhra Rajakumar. C

Paper Title: Relationship Between Group Process Variables and Group Performance in the IT Sector

Abstract: Different types of group process variables- trust, group cohesion, group social interactions and 0-0 group potency are analysed for its relationship with group performance in Information Technology (IT) sector. The group includes 250 members working in 50 self-managed groups for 45 days period. Two independent variables- task completion and work efficiency are considered for assessing group performance. A set of hypothesis is predicted to analyse the relation of the variables with the performance. It is found that the selected group process variables are related to each of the group process variables. Among the four group process variables studied, group potency is proved to be the highest potential variable for an effective group performance.

Keyword: group performance, group potency, group cohesion, leadership, task completion, self-efficacy References: 1. Barrick, M. R., Stewart, G. L., Neubert, M. J., & Mount, M. K. (1998). Relating member ability and personality to work-team processes and team effectiveness. Journal of Applied Psychology, 83, 377-391. 2. Guzzo, R. A., & Salas, E. (1995). Team effectiveness and decision making in organizations. San Francisco: Jossey-Bass. 3. Gibson, C. B., Randel, A. E., &Earley, P. C. (2000). Understanding group efficacy: An empirical test ofmultiple assessment methods. Group&Organization Management, 21, 67-97. 4. Liden, R. C.,Wayne, S. J.,&Sparrowe, R.T. (2000).Anexamination ofthe mediating role of psychological empowerment on the relations between the job, interpersonal relations, and work outcomes. Journal ofApplied Psychology, 85, 407-416. 5. Seers, A. (1989). Team-member exchange quality: A new construct for role-making research. Organizational Behavior and Human Decision Processes, 43, 118-135. 6. Jordan, M., Field, H., Armenakis, A. (2002). The relationship of group process variables and team performance: A team level analysis in a field setting. Small Group Research, 33(1), 121-150. 7. Bharadwaj, A. S. (2000). A resource-based perspective on information technology capability and firm performance: An empirical investigation. MIS Quarterly, 24(1), 169–196. 8. Cepeda-Carrion, G., Cegarra-Navarro, J. G., & Jimenez-Jimenez, D. (2012). The effect of absorptive capacity on innovativeness: Context and information systems capability as catalysts. British Journal of Management, 23(1), 110–129. 9. Chen, Y.-C., & Wu, J. H. (2011). IT management capability and its impact on the performance of a CIO. Information & Management, 48(4-5), 145–156. 10. Feeny, D. F., & Willcocks, L. P. (1998). Core IS capabilities for exploiting information technology. Sloan Management Review, 39, 9–21. 11. Mithas, S., Ramasubbu, N., &Sambamurthy, V. (2011). How information management capability influences firm performance. MIS Quarterly, 35(1), 237–256. 12. Ravichandran, T., &Lertwongsatien, C. (2005). Effect of information systems resources and capabilities on firm performance: A resource-based perspective. Journal of Management Information Systems, 21(4), 237–276. 13. Tippins, M. J., &Sohi, R. S. (2003). IT competency and firm performance: Is organizational learning a missing link? Strategic Management Journal, 24(8), 745–761. 14. Wang, Y., Shi, S., Nevo, S., Li, S., & Chen, Y. (2015). The interaction effect of IT assets and IT management on firm performance: A systems perspective. International Journal of Information Management, 35(5), 580–593. 15. Aydiner, AS., Tatoglu, E., Bayraktar, E., Zaim, S. (2019). Information system capabilities and firm performance: Opening the black box through decision-making performance and business-process performance, Int. J. Inf. Manage., 47, 168–182. 16. Rezvani, A., Khosravi, P. (2019). Emotional intelligence: The key to mitigating stress and fostering trust among software developers working on information system projects. International Journal of Information Management, 48, 139-150. 17. Blascovich, J. (2008). Challenge, threat, and health. In J. Y. Shah, & W. L. Gardner (Eds.). Handbook of Motivation Science (pp. 481–493). New York, NY: US: The Guilford Press. 18. Banumathi and Samudhra Rajakumar (2015) “Relationship between Corporate Enterpreneurship and Emotional Intelligence”, Indian Journal of Applied Researc, Vol.5 , and Issue :9.p 6201-6205 19. Banumathi and Samudhra Rajakumar (2015) “The Role of Middle Level managers and Enterpreneurship”, International Journal of Arts , Humanities and Management studies, Volume 01, No.9, pp-21-26 20. Banumathi and Samudhra Rajakumar (2016) “ Factors influencing work discretion ‘ of corporate entrepreneurship: An empirical study, Asian Journal of Multidimensinal Research (AJMR) Volume :5 , Issue :2 21. Cook, J., & Wall, T. (1980). New work attitude measures of trust, organizational com- mitment and personal need non-fulfilment. Journal of Occupational Psychology, 53, 39–52. 22. Costa, A. C., & Anderson, N. (2011). Measuring trust in teams: Development and vali- dation of a multifaceted measure of formative and reflective indicators of team trust. European Journal of Work and Organizational Psychology, 20(1), 119–154. 23. Cruz, S., da Silva, F. Q., &Capretz, L. F. (2015). Forty years of research on personality in software engineering: A mapping study. Computers in Human Behavior, 46,94–113. 24. Khosravi, P., Rezvani, A., & Ahmad, M. N. (2013). Does Organizational Identification Lead to Information System Success? World Applied Sciences Journal, 21(3), 402–408. 25. Ozer, M., & Vogel, D. (2015). Contextualized relationship between knowledge sharing and performance in software development. Journal of Management Information Systems, 32(2), 134–161. 26. Windeler, J. B., Maruping, L., &Venkatesh, V. (2017). Technical systems development risk factors: The role of empowering leadership in lowering developers’ stress. Information Systems Research, 28(4), 775–796. 27. Rezvani, A., Khosravi, P., &Ashkanasy, N. M. (2018). Examining the interdependencies among emotional intelligence, trust, and performance in infrastructure projects: A multilevel study. International Journal of Project Management, 36(8), 1034–1046. 28. Lin, CW., Lin, CS., Huang, P., Wang, Y. (2014). How group efficacy mediates the relationship between group affect and identification. Journal of Business research, 67, 1388-1394. 54. Authors: A. Sandhya Rani, Budampati. V. S. Sowmya

Paper Title: Consumer Preference and Satisfaction with Reference to Women Apparels at Max Store

Abstract: The trend of fashion apparels is growing rapidly. Women consumers are spending more across 333-336 products and are obsessive about trendy apparels. The study focuses to examine the consumer preference and satisfaction with reference to women apparel at Max store. Primary data is obtained from survey questionnaire using convenience sampling method. Hypothesis is framed to analyse if there is a significant influence of age and income on consumer preference and satisfaction towards women apparels at max store at A S Rao Nagar. Primary data is collected from 150 respondents using convenience sampling. Chi square test is used to analyze the data. Results have indicated that there is no significant influence of age and income on consumer preference and satisfaction.

Keyword: Age, Consumer Preference, Consumer Satisfaction, Income References: 1 Vidya B panicker, “A brand experience study on the apparel buying behaviour of women consumers in Mumbai”, International Journal of Commerce and Management Research, vol. 3, pp. 10-15, 2017. 2 S.Poonagodi. M, “Apparel choice and buying behaviour of college girls”, Intercontinental Journal of Marketing Research Review, vol. 5, pp. 8-14, 2017. 3 Tanvi Gupta. J. (2017.vol 13). “Assessment of Demographic impact on female psychographics”, KIIT Journal of Management, vol. 13, pp. 1-16, 2017 55. Authors: C C Manju, M.Victor Jose

Paper Title: A Research on Automation Diagonsis of Pattern Recognition in Stained HEP-2 Cells

Abstract: Diagnosis of autoimmune diseases can be achieved via Indirect Immunofluorescence (IIF) 337-345 images using human epithelial (HEp-2) cell as substrate in laboratory. The automation of this diagnosis method is still challenging because of using various liquids to fix the HEp-2 cells in the slides. Due to various fixation methods, nuclear morphology of cell suffers high variability. This survey reviews all the difficulties in the analysis and recognition of pattern recognition and surveys various image processing techniques which leads to the automation diagnosis. This work consist of advantages and disadvantages of various procedures. Eventually, comparison of their corresponding results are presented. I assure that this initial work may attract many medical image processing researchers to enter into this field.

Keyword: autoimmune diagnostic; antinuclear antibodies; Pattern Recognition; HEp-2 cells. References: 1 M. I. Razzak, S. Naz, and A. Zaib, "Deep Learning for Medical Image Processing: Overview, Challenges and the Future," in Classification in BioApps, ed: Springer, 2018, pp. 323-350. 2 A. Wiliem, Y. Wong, C. Sanderson, P. Hobson, S. Chen, and B. C. Lovell, "Classification of human epithelial type 2 cell indirect immunofluoresence images via codebook based descriptors," in Applications of Computer Vision (WACV), 2013 IEEE Workshop on, 2013, pp. 95-102. 3 V. Snell, W. Christmas, and J. Kittler, "HEp-2 fluorescence pattern classification," Pattern Recognition, vol. 47, pp. 2338-2347, 2014. 4 E. A. Cooper, "A normalized contrast‐encoding model exhibits bright/dark asymmetries similar to early visual neurons," Physiological reports, vol. 4, p. e12746, 2016. 5 M. Schwarzfischer, C. Marr, J. Krumsiek, P. Hoppe, T. , and F. Theis, "Efficient fluorescence image normalization for time lapse movies," Proc. Microscopic Image Analysis with Applications in Biology, vol. 5, 2011. 6 A.-D. Khamael, J. Banks, I. Tomeo-Reyes, and V. Chandran, "Automatic segmentation of HEp-2 cell Fluorescence microscope images using level set method via geometric active contours," in Pattern Recognition (ICPR), 2016 23rd International Conference on, 2016, pp. 81-83. 7 X. Zhou, Y. Li, and L. Shen, "A novel adaptive local thresholding approach for segmentation of HEp-2 cell images," in Signal and Image Processing (ICSIP), IEEE International Conference on, 2016, pp. 174-178. 8 Y.-L. Huang, C.-W. Chung, T.-Y. Hsieh, and Y.-L. Jao, "Outline detection for the HEp-2 cell in indirect immunofluorescence images using watershed segmentation," in Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC'08. IEEE International Conference on, 2008, pp. 423-427. 9 V. S. Prasath, Y. M. Kassim, Z. A. Oraibi, J.-B. Guiriec, A. Hafiane, G. Seetharaman, et al., "HEp-2 cell classification and segmentation using motif texture patterns and spatial features with random forests," in Pattern Recognition (ICPR), 2016 23rd International Conference on, 2016, pp. 90-95. 10 I. Nigam, S. Agrawal, R. Singh, and M. Vatsa, "Revisiting HEp-2 Cell Image Classification," IEEE Access, vol. 3, pp. 3102- 3113, 2015. 11 R. Xu, Y. Sun, Z. Yang, B. Song, and X. Hu, "The classification of HEp-2 cell patterns using fractal descriptor," IEEE transactions on nanobioscience, vol. 14, pp. 513-520, 2015. 12 D. Hahm and U. Anderer, "Establishment of HEp‐2 cell preparation for automated analysis of ANA fluorescence pattern," Cytometry Part A, vol. 69, pp. 178-181, 2006. 13 L. F. Rodrigues, M. C. Naldi, and J. F. Mari, "Exploiting Convolutional Neural Networks and preprocessing techniques for HEp- 2 cell classification in immunofluorescence images," in Graphics, Patterns and Images (SIBGRAPI), 2017 30th SIBGRAPI Conference on, 2017, pp. 170-177. 14 M. Merone and P. Soda, "On using active contour to segment HEp-2 cells," in Computer-Based Medical Systems (CBMS), 2016 IEEE 29th International Symposium on, 2016, pp. 118-123. 15 N. A. M. Rosdi, Z. May, I. Faye, and M. Nasir, "Hep-2 cell feature extraction using wavelet and independent component analysis," in Industrial Electronics & Applications (ISIEA), 2014 IEEE Symposium on, 2014, pp. 36-41. 16 S. Roy and P. Maji, "A modified rough-fuzzy clustering algorithm with spatial information for hep-2 cell image segmentation," in Bioinformatics and Biomedicine (BIBM), 2016 IEEE International Conference on, 2016, pp. 383-388. 17 P. Foggia, G. Percannella, A. Saggese, and M. Vento, "Pattern recognition in stained hep-2 cells: Where are we now?," Pattern Recognition, vol. 47, pp. 2305-2314, 2014. 18 S. Tonti, S. Di Cataldo, A. Bottino, and E. Ficarra, "An automated approach to the segmentation of HEp-2 cells for the indirect immunofluorescence ANA test," Computerized Medical Imaging and Graphics, vol. 40, pp. 62-69, 2015. 19 A. B. L. Larsen, J. S. Vestergaard, and R. Larsen, "HEp-2 cell classification using shape index histograms with donut-shaped spatial pooling," IEEE transactions on medical imaging, vol. 33, pp. 1573-1580, 2014. 20 X.-H. Han, J. Wang, G. Xu, and Y.-W. Chen, "High-order statistics of microtexton for hep-2 staining pattern classification," IEEE Transactions on Biomedical Engineering, vol. 61, pp. 2223-2234, 2014. 21 G. Schaefer and N. P. Doshi, "Effective classification of HEp-2 cells using fuzzy texture descriptors," in Fuzzy Systems (FUZZ- IEEE), 2016 IEEE International Conference on, 2016, pp. 1248-1252. 22 X. Qi, G. Zhao, C.-G. Li, J. Guo, and M. Pietikäinen, "HEp-2 Cell Classification via Combining Multiresolution Co-Occurrence Texture and Large Region Shape Information," IEEE journal of biomedical and health informatics, vol. 21, pp. 429-440, 2017. 23 S. Monajemi, S. Ensafi, S. Lu, A. A. Kassim, C. L. Tan, S. Sanei, et al., "Classification of HEp-2 cells using distributed dictionary learning," in Signal Processing Conference (EUSIPCO), 2016 24th European, 2016, pp. 1163-1167. 24 H. Lei, T. Han, W. Huang, J. Y. Kuo, Z. Yu, X. He, et al., "Cross-Modal Transfer Learning for HEp-2 Cell Classification Based on Deep Residual Network," in 2017 IEEE International Symposium on Multimedia (ISM), 2017, pp. 465-468. 25 J. Liu, B. Xu, L. Shen, J. Garibaldi, and G. Qiu, "HEp-2 cell classification based on a Deep Autoencoding-Classification convolutional neural network," in Biomedical Imaging (ISBI 2017), 2017 IEEE 14th International Symposium on, 2017, pp. 1019-1023. 26 H. Cai and L. Cui, "MultiGranular: An effective Service Composition Infrastructure for Multi-tenant Service Composition," International Journal of Multimedia and Ubiquitous Engineering, vol. 9, pp. 171-182, 2014. 27 B. Divya, K. Subramaniam, and H. Nanjundaswamy, "HEp-2 cell classification using binary decision tree approach," in Biomedical Engineering and Sciences (IECBES), 2016 IEEE EMBS Conference on, 2016, pp. 507-512. 28 V. Gupta, K. Gupta, A. Bhavsar, and A. K. Sao, "Hierarchical classification of HEp-2 cell images using class-specific features," in Visual Information Processing (EUVIP), 2016 6th European Workshop on, 2016, pp. 1-6. 29 P. Foggia, G. Percannella, P. Soda, and M. Vento, "Benchmarking HEp-2 cells classification methods," IEEE transactions on medical imaging, vol. 32, pp. 1878-1889, 2013. 30 A. Wiliem, C. Sanderson, Y. Wong, P. Hobson, R. F. Minchin, and B. C. Lovell, "Automatic classification of human epithelial type 2 cell indirect immunofluorescence images using cell pyramid matching," Pattern Recognition, vol. 47, pp. 2315-2324, 2014. 31 R. Nosaka and K. Fukui, "HEp-2 cell classification using rotation invariant co-occurrence among local binary patterns," Pattern Recognition, vol. 47, pp. 2428-2436, 2014. 32 L. Shen, J. Lin, S. Wu, and S. Yu, "HEp-2 image classification using intensity order pooling based features and bag of words," Pattern Recognition, vol. 47, pp. 2419-2427, 2014. 56. Authors: J Amar Pratap Singh, Anoop S

Paper Title: Intensive Energy Aware Mobile Computational Offloading using Machine Learning Strategies

Abstract: In the modern-world each and everyone needs a Smartphone to achieve their communication 346-354 needs globally as well as an acceptable fact is mobile devices plays a vital role in individual's life. Smartphones now-a-days are fully consumer-oriented, in which it contains a huge-variety of applications to provide service to its users. This case leads more computational power to the mobile devices as-well-as the processing ability of such devices are expected to be highly concentrated. The usage of multiple applications in simultaneous manner over mobile phones causes several issues to users such as poor-battery-lifetime, speed-issues, mobile-heating and so on. In this system, a novel' and intelligent approach is proposed to solve the issues rising due to the computational abilities of mobile offloading as well as empirically proves the advantages of mobile offloading with remote servers. The term offloading explores a hidden meaning of remote accessibility, in which the mobile devices can process the storage mechanisms and computational-needs are in outside of the mobile device, so that the processing overhead of the mobile devices are highly reduced. This combination of Mobile Devices and Remote Server Manipulation is generally called as Mobile-Cloud-Computing. The term cloud refers the remote server, all the computational needs are performed over there and the resulting summaries are portrayed over the mobile devices within fraction of seconds.The accessing nature of cloud services usually follows an important strategy called Mobile-Crowdsensing, in which it also plays a major role in Cloud-Service Selection procedures. In which the Mobile-Crowdsensing effectively sense the crowd ratio of mobile-devices and share the resources of cloud to their requirements as-well-as the Mobile-Crowdsensing also analyze and predict the application processes of general-interest. The advancement of Machine learning strategies gives hand to this nature of handling such difficult process like remote data handling and processing. This paper explores a new machine learning based approach called, Intensive Energy-aware Mobile Computational Offloading Model (IEMCOM), which concentrates more on mobile offloading issues such as huge-data transfers, complex-mobile application processing-scenarios, network-interruptions and so on. A final outcome empirically proves the integration of mobile and cloud computing results good battery-lifetime, enhanced offloading-process and security as well.

Keyword: Offloading,Mobile-Cloud-Computing, Machine Learning, Cloud Offloading, BigData, Context- Model, IEMCOM References: 1 S. Ickin, K. Wac, M. Fiedler, L. Janowski, J. Hong, and A. K. Dey, “Factors influencing’ quality-of-experience of-commonly used’ mobile-applications,” IEEE Commun. Mag., vol. 50, no. 4, pp. 48–56, Apr. 2012. 2 E. Cuervo, et al., “MAUI: Making smartphones last longer with code offload,” in Proc. ACM Int. Conf. Mobile Syst. Appl. Serv., Jun. 2010, pp. 49–62. 3 S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang, “ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading,” in Proc. Annu. IEEE Int. Conf. Comput. Commun.,Mar. 2012, pp. 945–953. 4 B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, “CloneCloud: Elastic execution between mobile device and cloud,” in Proc. Annu. Conf. Comput. Syst., Apr. 2011, pp. 301–314. 5 M. S. Gordon, D. A. Jamshidi, S. Mahlke, Z. M. Mao, and X. Chen, “Comet: Code offload by migrating execution transparently,” in Proc. USENIX Conf. Operating Syst. Des. Implementation, Oct. 2012, pp. 93–106. 6 C. Shi, K. Habak, P. Pandurangan, M. Ammar, M. Naik, and E. Zegura, “COSMOS: Computation offloading as a service for mobile devices,” in Proc. ACM Int. Symp. Mobile Ad Hoc Netw. Comput, Aug. 2014, pp. 287–296. 7 A. Saarinen,M. Siekkinen, Y. Xiao, J. K. Nurminen,M. Kemppainen, and P.Hui, “SmartDiet: Offloading popular apps to save energy,” in Proc. ACM Conf. Appl. Technol. Archit. Protocols Comput. Commun., Aug. 2012, pp. 297–298. 8 H. Flores, et al.,“Social-aware hybrid mobile offloading,” Pervasive Mobile Comput., vol. 36, pp. 25–43, 2017. 9 [9] M. Conti and M. Kumar, “Opportunities in opportunistic computing,” IEEE Comput., vol. 43, no. 1, pp. 42–50, Jan. 2010. 10 E. Peltonen, E. Lagerspetz, P. Nurmi, and S. Tarkoma, “Energy modeling of system settings: A crowdsourced approach,” in Proc. Int. Conf. Pervasive Comput. Commun., Mar. 2015, pp. 37–45. 11 K. Akherfi, M. Gerndt, and H. Harroud, "Mobile cloud computing for computation offloading: Issues and challenges," Applied computing and informatics, vol. 14, pp. 1-16, 2018. 12 H. Qian and D. Andresen, "Jade: Reducing energy consumption of android app," International Journal of Networked and Distributed Computing, vol. 3, pp. 150-158, 2015. 13 F. Xia, F. Ding, J. Li, X. Kong, L. T. Yang, and J. Ma, "Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing," Information Systems Frontiers, vol. 16, pp. 95-111, 2014. 14 X. Lin, Y. Wang, Q. Xie, and M. Pedram, "Energy and performance-aware task scheduling in a mobile cloud computing environment," in 2014 IEEE 7th international conference on cloud computing, 2014, pp. 192-199. 15 M. R. Rahimi, J. Ren, C. H. Liu, A. V. Vasilakos, and N. Venkatasubramanian, "Mobile cloud computing: A survey, state of art and future directions," Mobile Networks and Applications, vol. 19, pp. 133-143, 2014. 16 H. Nevalainen, L. Kautto, and V. Te'o, Methods for Isolation and Cultivation of Filamentous Fungi vol. 1096, 2014. 17 K. Gai, M. Qiu, H. Zhao, L. Tao, and Z. Zong, "Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing," Journal of Network and Computer Applications, vol. 59, pp. 46-54, 2016. 18 S. Deng, L. Huang, J. Taheri, and A. Y. Zomaya, "Computation offloading for service workflow in mobile cloud computing," IEEE transactions on parallel and distributed systems, vol. 26, pp. 3317-3329, 2014. 19 B. Zhou, A. V. Dastjerdi, R. N. Calheiros, S. N. Srirama, and R. Buyya, "A context sensitive offloading scheme for mobile cloud computing service," in 2015 IEEE 8th International Conference on Cloud Computing, 2015, pp. 869-876. 20 B. Zhou, A. V. Dastjerdi, R. N. Calheiros, S. N. Srirama, and R. Buyya, "mCloud: A context-aware offloading framework for heterogeneous mobile cloud," IEEE Transactions on Services Computing, vol. 10, pp. 797-810, 2015. 21 S. Deng, L. Huang, J. Taheri, and A. Y. Zomaya, "Computation offloading for service workflow in mobile cloud computing," IEEE transactions on parallel and distributed systems, vol. 26, pp. 3317-3329, 2014. 22 J. L. D. Neto, S.-Y. Yu, D. F. Macedo, M. S. Nogueira, R. Langar, and S. Secci, "ULOOF: A user level online offloading framework for mobile edge computing," IEEE Transactions on Mobile Computing, vol. 17, pp. 2660-2674, 2018. 23 M. Alkhalaileh, R. N. Calheiros, Q. V. Nguyen, and B. Javadi, "Dynamic Resource Allocation in Hybrid Mobile Cloud Computing for Data-Intensive Applications," in International Conference on Green, Pervasive, and Cloud Computing, 2019, pp. 176-191. 24 F. Gu, J. Niu, Z. Qi, and M. Atiquzzaman, "Partitioning and offloading in smart mobile devices for mobile cloud computing: State of the art and future directions," Journal of Network and Computer Applications, 2018. 25 I. Elgendy, W. Zhang, C. Liu, and C.-H. Hsu, "An efficient and secured framework for mobile cloud computing," IEEE Transactions on Cloud Computing, 2018. 26 S. Jošilo and G. Dán, "Selfish decentralized computation offloading for mobile cloud computing in dense wireless networks," IEEE Transactions on Mobile Computing, vol. 18, pp. 207-220, 2019. 27 Y. Wang, R. Chen, and D.-C. Wang, "A survey of mobile cloud computing applications: Perspectives and challenges," Wireless Personal Communications, vol. 80, pp. 1607-1623, 2015. 28 C. You, K. Huang, and H. Chae, "Energy efficient mobile cloud computing powered by wireless energy transfer," IEEE Journal on Selected Areas in Communications, vol. 34, pp. 1757-1771, 2016. 29 He Li ; Kaoru Ota ; Mianxiong Dong ; Minyi Guo, "Mobile Crowdsensing in Software Defined Opportunistic Networks," IEEE Communications Magazine, Volume: 55 , Issue: 6 , June 2017. 30 [30] Francesco Restuccia, Nirnay Ghosh, Shameek Bhattacharjee, Sajal K. Das, Tommaso Melodia, "Quality of Information in Mobile Crowdsensing: Survey and Research Challenges,", ACM Transactions on Sensor Networks (TOSN), Volume 13 Issue 4, December 2017. 31 Z. Kuang, S. Guo, J. Liu, and Y. Yang, "A quick-response framework for multi-user computation offloading in mobile cloud computing," Future Generation Computer Systems, vol. 81, pp. 166-176, 2018. 32 J. L. D. Neto, S.-Y. Yu, D. F. Macedo, M. S. Nogueira, R. Langar, and S. Secci, "ULOOF: A user level online offloading framework for mobile edge computing," IEEE Transactions on Mobile Computing, vol. 17, pp. 2660-2674, 2018. 33 M. Alkhalaileh, R. N. Calheiros, Q. V. Nguyen, and B. Javadi, "Dynamic Resource Allocation in Hybrid Mobile Cloud Computing for Data-Intensive Applications," in International Conference on Green, Pervasive, and Cloud Computing, 2019, pp. 176-191. 57. Authors: K. Rajkumar, M. K. Jeyakumar Optimized Fuzzy based Malicious Node Detection on Routing and Certificate Authority based Paper Title: Secure Communication in Wireless Ad-HOC Network Abstract: The general behavior of Mobile AdHoc Networks (MANETs) is different in certain stages due 355-361 to its mode of operations and maintenance as well as factors such as Node-Energy level, manipulation energy, randomly movable nature and the topology-changes. These type of dynamicity causes or needs over concentration and needs more security with routing-stability. For eliminating these issues and improve the security, a new methodology called Fuzzy Secured Node Selection Routing (FSNSR) is defined, which provides the Trusted-Network-Service and better performance with energy efficiency in security and dynamicity perspectives. This algorithm FSNSR provides high-reliability and dynamicity to nodes, which can move frequently without any security causes and attain more robustness during performance. The selection of next node selection and forwarding is purely based on the link-stability and next-neighbor availability, which is ensured by means of the parental node by sending route-request and getting response for the request. Once the neighbor provides the response properly for the raised request the node will be treated as a next successful neighbor, otherwise the node will be considered as a malicious node and which cannot be considered for next process further. The survey results further to guarantee regarding the network robustness, dynamicity, good packet delivery ratio, goodput and secure-routing over MANET with the help of Fuzzy Secured Node Selection Routing.

Keyword: Energy Efficiency, Fuzzy Secured Node Selection Routing, FSNSR, Goodput, Mobile AdHoc Network, MANET, Malicious, Secure Routing. References: 1 Chlamtac I, Conti M, Liu JJN (2003) Mobile ad hoc networking: imperatives and challenges. Ad Hoc Netw 1(1):13–64 2 Murthy CSR, Manoj BS (2004) Ad hoc wireless networks: architectures and protocols. Prentice Hall 3 Perkins CE (2001) Ad hoc networking: an introduction. Ad hoc networking, pp 20–22 4 Cho JH, Swami A, Chen IR (2011) A survey on trust management for mobile ad hoc networks. IEEE Commun Surv Tutorials 13(4): 562–583 5 Azzedin F, Ridha A, Rizvi A (2007) Fuzzy trust for peer-to-peer based systems. World academy of science. Eng Technol 21:123– 127 6 Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In: Proceedings of second IEEE workshop on mobile computing systems and applications (WMCSA’99), New Orleans, pp 90–100 7 Basu P, Khan N, Little TDC (2001) A mobility based metric for clustering in Mobile ad hoc networks. In IEEE Workshop on Wireless Networks and Mobile Computing, 413–418 8 SuW, Lee SJ, GerlaM(2001) Mobility prediction and routing in ad hoc wireless networks. Int J Netw Manag 11(1):3–30 9 Li X, Jia Z, Zhang P, Zhang R, Wang H (2010) Trust-based ondemandmultipath routing inmobile ad hoc networks. IET Inf Secur 4(4):212–232 10 Chiang CC, Wu HK, Liu W, Gerla M (1997) Routing in clustered multihop, mobile wireless networks with fading channel, In IEEE Singapore international conference on networks, SICON’97, April 16–17, 1997, Singapore, pp. 197–211 11 Kumar K, Singh V (2014) Power consumption based simulation model for mobile ad-hoc network. Wirel Pers Commun 77:1437–1448 12 Haddadou N, Rachedi A, Ghamri-Doudane Y (2015) A job market signaling scheme for incentive and trust management in vehicular ad hoc networks. IEEE Trans Veh Technol 64(8):3657–3674 13 Rafsanjani MK, Fatemidokht H (2015) FBeeAdHoc: a secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs. AEU Int J Electron Commun 69(11):1613–1621 14 Vijayakumar P, Azees M, Kannan A, Jegatha Deborah L (2015) Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans Intell Transp Syst 17(4):1015–1028 15 Saloua C, Salim C (2016) Dynamic fuzzy logic and reinforcement learning for adaptive energy efficient routing in mobile ad-hoc networks. Appl Soft Comput 38:321–328 16 Logambigai R, Kannan A (2016) Fuzzy logic based unequal clustering for wireless sensor networks. Wirel Netw 22(3):945–957 17 Ghaffari A (2017) Real-time routing algorithm for mobile ad hoc networks using reinforcement learning and heuristic algorithms. Wirel Netw 23:1613–1621 18 Ahmed S, Al-Rubeaai S, Tepe K (2017) Novel trust framework for vehicular networks. IEEE Trans Veh Technol 66(10):9498– 9511 19 Muthurajkumar S, Ganapathy S, Vijayalakshmi M, Kannan A (2017) An intelligent secured and energy efficient routing algorithm for MANETs. Wirel Pers Commun 96(2):1753–1769 20 Hai DT, Le Vinh T (2017) Novel fuzzy clustering scheme for 3D wireless sensor networks. Appl Soft Comput 54:141–149 21 Marti S, Giuli T, Lai K, Baker M (2000) Mitigating routing misbehavior in Mobile ad hoc networks. Proceedings of Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255–265 22 Pappadimitratos P, Haas ZJ (2006) Secure data communication in Mobile ad hoc networks. IEEE J Sel Areas Commun 24(2):343–356 23 Govindan K, Mohapatra P (2011) Trust computations and trust dynamics in mobile ad hoc networks: a survey. IEEE Commun Surv Tutorials 99:1–20 24 Esch J (2010)A survey of trust and reputation management systems in wireless communications. Proc IEEE 98(10):1755–1772 25 Momani M, Challa S (2010) Survey of trust models in different network domains. Int J Ad Hoc Sensor Ubiquitous Comput 1(3): 1–19 26 Ramana KS, Chari A, Kasiviswanth N (2010) A survey on trust management for mobile adhoc networks. Int J Netw Secur Appl 13(4):562–583 27 Abusalah LA (2008) Khokhar, Guizani, M.: survey of secure Mobile ad hoc routing protocols. IEEE Commun Surv Tutorials 19(4):78–93 28 Moe MEG, Helvik BE, Knapskog SJ (2008) TSR: trust-based secure MANET routing using HMMs. Proceedings of ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp83–90 29 Luo J, Liu X, Fan M (2009) A trust model based on fuzzy recommendation for mobile ad-hoc networks. Comput Netw 53(14): 2396–2407 30 Kulothungan K, Angel Arul Jothi J, Kannan A (2011) An adaptive fault tolerant routing protocol with error reporting scheme for wireless sensor networks. Eur J Sci Res 16(1):19–32 31 Ren J, Zhang Y, Zhang K, Shen XS (2014) Exploiting channelaware reputation system against selective forwarding attacks in WSNs. In Proceedings of IEEE GLOBECOM, pp. 330–335 32 Ren J, Zhang Y, Zhang K, Shen X (2016) Adaptive and channelaware detection of selective forwarding attacks in wireless sensor networks. IEEE Trans Wirel Commun 15(5):3718–3731 33 Ren J, Zhang Y, Zhang K, Shen XS (2015) SACRM: social aware crowdsourcing with reputation management in mobile sensing. Comput Commun 65:55–65 34 Bao F, Chen R, Chang M, Cho JH (2012) Hierarchical trust management for wireless sensor networks and its applications to 35 trustbased routing and intrusion detection. IEEE Trans Netw Serv Manage 9(2):169–183 36 Li R, Li J, Liu P, Chen H (2007) An objective trust management framework for mobile ad hoc networks. Proceedings of IEEE vehicular technology conference, pp. 55–60 37 Jerusha S, Kulothungan K, Kannan A (2012) Location aware cluster based routing in wireless sensor networks. International Journal of Computer & Communication Technology 3(5):1–6 38 Zhang DG (2015) Extended AODV routing method based on distributed minimum transmission (DMT) for WSN. Int J Electron Commun 69(1):371–381 39 Zhang DG, Li G, Zheng K (2014) An energy-balanced routing method based on forward-aware factor for wireless sensor network. IEEE Trans Ind Inf 10(1):766–773 40 Zhang DG, Zheng K, Zhang T (2015) A novel multicast routing method with minimum transmission for WSN of cloud computing service. Soft Comput 19(7):1817–1827 41 Zhang D, Wang X, Song X (2015) New clustering routing method based on PECE for WSN. EURASIP J Wirel Commun Netw 2015(162):1–13 42 Zhang DG, Zhu YN (2012) A new constructing approach for a weighted topology of wireless sensor networks based on localworld theory for the internet of things (IOT). Comput Math Appl 64(5):1044–1055 43 Liu S, Zhang T (2017) Novel unequal clustering routing protocol considering energy balancing based on Network Partition & Distance for Mobile education. J Netw Comput Appl 88(15): 1–9 44 Zhang DG, Niu HL, Liu S (2017) Novel PEECR-based clustering routing approach. Soft Comput 21(24):7313–7323 45 Zhang DG, Ge H, Zhang T (2018) New multi-hop clustering algorithm for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 7:1–14 46 Zhang T, Dong Y (2018) Novel optimized link state routing protocol based on quantum genetic strategy for Mobile learning. J Netw Comput Appl 122(15):37–49 47 Liu S, Liu XH (2018) Novel dynamic source routing protocol (DSR) based on genetic algorithm-bacterial foraging optimization (GA-BFO). Int J Commun Syst 13(8):1–15 58. Authors: R.Preetha, S. Vinila Jinny

Paper Title: A Research on Breast Cancer Prediction using Data Mining Techniques Abstract: Early detection and diagnosis of breast cancer plays a significant role in the welfare of women. The 362-370 mortality rate due to breast cancer is on an all-time high. Factors such as food habits, environmental pollution, hectic lifestyle and genetics are commonly attributed to breast cancer. In order to detect and diagnose such types of cancer, intelligent systems are implemented. Automated diagnosis gets impacted by prediction accuracy when compared with surgical biopsy. Bioinformatics mining has emerged as the area of research that involves analyzing both data mining and Bioinformatics. In order to statistically find significant associations on a breast cancer data set, the result is conceivable. Using a larger data set results in discovering the correlations between a bigger set of gene. The algorithm has to be improved to perceive the interactions with low marginal. This research field affords most intelligent and reliable data mining models in breast cancer prediction and decision making. This survey reviews various data mining algorithms on large breast cancer biological datasets. The merits and demerits of various procedures and comparison of their corresponding results are presented in this work. Keyword: Diagnosis, Breast cancer, Data mining models. References: 1. T. Srinivasan, A. Chandrasekhar, J. Seshadri, and J. Siddharth, "Knowledge discovery in clinical databases with neural network evidence combination," in Intelligent Sensing and Information Processing, 2005. Proceedings of 2005 International Conference on, 2005, pp. 512-517. 2. T. Weber, K. Blin, S. Duddela, D. Krug, H. U. Kim, R. Bruccoleri, et al., "antiSMASH 3.0—a comprehensive resource for the genome mining of biosynthetic gene clusters," Nucleic acids research, vol. 43, pp. W237-W243, 2015. 3. J. Ji, A. Zhang, C. Liu, X. Quan, and Z. Liu, "Survey: Functional module detection from protein-protein interaction networks," IEEE Transactions on Knowledge and Data Engineering, vol. 26, pp. 261-277, 2014. 4. J. D. Watson, R. A. Laskowski, and J. M. Thornton, "Predicting protein function from sequence and structural data," Current opinion in structural biology, vol. 15, pp. 275-284, 2005. 5. M. Deng, K. Zhang, S. Mehta, T. Chen, and F. Sun, "Prediction of protein function using protein–protein interaction data," Journal of computational biology, vol. 10, pp. 947-960, 2003. 6. J. Soni, U. Ansari, D. Sharma, and S. Soni, "Predictive data mining for medical diagnosis: An overview of heart disease prediction," International Journal of Computer Applications, vol. 17, pp. 43-48, 2011. 7. M.-J. Huang, M.-Y. Chen, and S.-C. Lee, "Integrating data mining with case-based reasoning for chronic diseases prognosis and diagnosis," Expert systems with applications, vol. 32, pp. 856-867, 2007. 8. M. G. Tsipouras, T. P. Exarchos, D. I. Fotiadis, A. P. Kotsia, K. V. Vakalis, K. K. Naka, et al., "Automated diagnosis of coronary artery disease based on data mining and fuzzy modeling," IEEE Transactions on Information Technology in Biomedicine, vol. 12, pp. 447-458, 2008. 9. J. Xu and Y. Li, "Discovering disease-genes by topological features in human protein–protein interaction network," Bioinformatics, vol. 22, pp. 2800-2805, 2006. 10. B. Stapley, L. A. Kelley, and M. J. Sternberg, "Predicting the sub-cellular location of proteins from text using support vector machines," in Biocomputing 2002, ed: World Scientific, 2001, pp. 374-385. 11. L. Kujtan, K. F. Kennedy, S. Manthravadi, J. R. Davis, and J. Subramanian, "MINI01. 09: Outcomes of Early Stage Large Cell Neuroendocrine Lung Carcinoma (LCNELC): A National Cancer Database (NCDB) Analysis: Topic: Medical Oncology," Journal of Thoracic Oncology, vol. 11, pp. S261-S262, 2016. 12. N. Howlader, A. Noone, and M. Krapcho, "Surveillance, Epidemiology, and End Results (SEER) Program. SEER Cancer Statistics Review, 1975-2012 (updated August 20, 2015). National Cancer Institute, Bethesda, MD, based on November 2014 SEER data submission, posted to the SEER web site, April 2015," ed, 2016. 13. E. Parker and A. Folsom, "Intentional weight loss and incidence of obesity-related cancers: the Iowa Women's Health Study," International journal of obesity, vol. 27, p. 1447, 2003. 14. L. Wasserman, S. Flatt, L. Natarajan, G. Laughlin, M. Matusalem, S. Faerber, et al., "Correlates of obesity in postmenopausal women with breast cancer: comparison of genetic, demographic, disease-related, life history and dietary factors," International journal of obesity, vol. 28, p. 49, 2004. 15. C. Friedenreich, "Review of anthropometric factors and breast cancer risk," European Journal of Cancer Prevention, vol. 10, pp. 15-32, 2001. 16. C. Kullberg, J. Selander, M. Albin, S. Borgquist, J. Manjer, and P. Gustavsson, "Female white-collar workers remain at higher risk of breast cancer after adjustments for individual risk factors related to reproduction and lifestyle," Occup Environ Med, pp. oemed-2016-104043, 2017. 17. K. McPherson, C. Steel, and J. Dixon, "ABC of breast diseases: breast cancer—epidemiology, risk factors, and genetics," BMJ: British Medical Journal, vol. 321, p. 624, 2000. 18. B. B. Kamdar, A. I. Tergas, F. J. Mateen, N. H. Bhayani, and J. Oh, "Night-shift work and risk of breast cancer: a systematic review and meta-analysis," Breast cancer research and treatment, vol. 138, pp. 291-301, 2013. 19. T. Åkerstedt, A. Knutsson, J. Narusyte, P. Svedberg, G. Kecklund, and K. Alexanderson, "Night work and breast cancer in women: a Swedish cohort study," BMJ open, vol. 5, p. e008127, 2015. 20. C. Cybulski, J. Carrot-Zhang, W. Kluźniak, B. Rivera, A. Kashyap, D. Wokołorczyk, et al., "Germline RECQL mutations are associated with breast cancer susceptibility," Nature genetics, vol. 47, p. 643, 2015. 21. B. C. Majoor, A. M. Boyce, J. V. Bovée, V. T. Smit, M. T. Collins, A. M. Cleton‐Jansen, et al., "Increased risk of breast cancer at a young age in women with fibrous dysplasia," Journal of Bone and Mineral Research, vol. 33, pp. 84-90, 2018. 22. D. G. Evans, S. Astley, P. Stavrinos, E. Harkness, L. S. Donnelly, S. Dawe, et al., "Improvement in risk prediction, early detection and prevention of breast cancer in the NHS Breast Screening Programme and family history clinics: a dual cohort study," 2016. 23. M. Kamińska, T. Ciszewski, K. Łopacka-Szatan, P. Miotła, and E. Starosławska, "Breast cancer risk factors," Przeglad menopauzalny= Menopause review, vol. 14, p. 196, 2015. 24. A. E. M. Reed, J. R. Kutasovic, S. R. Lakhani, and P. T. Simpson, "Invasive lobular carcinoma of the breast: morphology, biomarkers and’omics," Breast cancer research, vol. 17, p. 12, 2015. 25. H. Harris, L. Titus, D. Cramer, and K. Terry, "Long and irregular menstrual cycles, polycystic ovary syndrome, and ovarian cancer risk in a population‐based case‐control study," International journal of cancer, vol. 140, pp. 285-291, 2017. 26. R. Laforest, S. E. Lapi, R. Oyama, R. Bose, A. Tabchy, B. V. Marquez-Nostra, et al., "[89 Zr] Trastuzumab: Evaluation of Radiation Dosimetry, Safety, and Optimal Imaging Parameters in Women with HER2-Positive Breast Cancer," Molecular Imaging and Biology, vol. 18, pp. 952-959, 2016. 27. C. S. Moskowitz, J. F. Chou, S. L. Wolden, J. L. Bernstein, J. Malhotra, D. Novetsky Friedman, et al., "Breast cancer after chest radiation therapy for childhood cancer," Journal of Clinical oncology, vol. 32, pp. 2217-2223, 2014. 28. R. Troisi, E. E. Hatch, L. Titus, W. Strohsnitter, M. H. Gail, D. Huo, et al., "Prenatal diethylstilbestrol exposure and cancer risk in women," Environmental and molecular mutagenesis, 2017. 29. E. F. Need, L. A. Selth, A. P. Trotta, D. A. Leach, L. Giorgio, M. A. O’Loughlin, et al., "The unique transcriptional response produced by concurrent estrogen and progesterone treatment in breast cancer cells results in upregulation of growth factor pathways and switching from a Luminal A to a Basal-like subtype," BMC cancer, vol. 15, p. 791, 2015. 30. R. M. Tamimi, D. Spiegelman, S. A. Smith-Warner, M. Wang, M. Pazaris, W. C. Willett, et al., "Population attributable risk of modifiable and nonmodifiable breast cancer risk factors in postmenopausal breast cancer," American journal of epidemiology, vol. 184, pp. 884-893, 2016. 31. K. A. Hirko, W. Y. Chen, W. C. Willett, B. A. Rosner, S. E. Hankinson, A. H. Beck, et al., "Alcohol consumption and risk of breast cancer by molecular subtype: Prospective analysis of the nurses' health study after 26 years of follow‐up," International journal of cancer, vol. 138, pp. 1094-1101, 2016. 32. K. Williams, P. A. Idowu, J. A. Balogun, and A. I. Oluwaranti, "Breast cancer risk prediction using data mining classification techniques," Transactions on Networks and Communications, vol. 3, p. 01, 2015. 33. S. Jauhari and S. Rizvi, "Mining gene expression data focusing cancer therapeutics: a digest," IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), vol. 11, pp. 533-547, 2014. 34. Y.-B. Kang, P. D. Haghigh, and F. Burstein, "TaxoFinder: a graph-based approach for taxonomy learning," IEEE Transactions on Knowledge and Data Engineering, vol. 28, pp. 524-536, 2016. 35. A. I. Pritom, M. A. R. Munshi, S. A. Sabab, and S. Shihab, "Predicting breast cancer recurrence using effective classification and feature selection technique," in Computer and Information Technology (ICCIT), 2016 19th International Conference on, 2016, pp. 310-314. 36. T. H. A. Soliman, R. Mohamed, and A. A. Sewissy, "A hybrid Analytical Hierarchical Process and Deep Neural Networks approach for classifying breast cancer," in Computer Engineering & Systems (ICCES), 2016 11th International Conference on, 2016, pp. 212-219. 37. M. U. Salma, "PSO based fast K-means algorithm for feature selection from high dimensional medical data set," in Intelligent Systems and Control (ISCO), 2016 10th International Conference on, 2016, pp. 1-6. 38. A. Boutorh and A. Guessoum, "Classication of SNPs for breast cancer diagnosis using neural-network-based association rules," in Programming and Systems (ISPS), 2015 12th International Symposium on, 2015, pp. 1-9. 39. Y. Chen, L. Ling, and Q. Huang, "Classification of breast tumors in ultrasound using biclustering mining and neural network," in Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), International Congress on, 2016, pp. 1787- 1791. 40. S. Jhajharia, H. K. Varshney, S. Verma, and R. Kumar, "A neural network based breast cancer prognosis model with PCA processed features," in Advances in Computing, Communications and Informatics (ICACCI), 2016 International Conference on, 2016, pp. 1896-1901. 41. D. Kaushik and K. Kaur, "Application of Data Mining for high accuracy prediction of breast tissue biopsy results," in Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC), 2016 Third International Conference on, 2016, pp. 40-45. 42. R. Nagpal and R. Shrivas, "Cancer Classification Using Elitism PSO Based Lezy IBK on Gene Expression Data," Journal of Scientific and Technical Advancements, vol. 1, pp. 19-23, 2015. 43. Y.-T. Cheng, Y.-F. Lin, K.-H. Chiang, and V. S. Tseng, "Mining Sequential Risk Patterns From Large-Scale Clinical Databases for Early Assessment of Chronic Diseases: A Case Study on Chronic Obstructive Pulmonary Disease," IEEE journal of biomedical and health informatics, vol. 21, pp. 303-311, 2017. 44. P. P. Dhakate, K. Rajeswari, and D. Abin, "An ensemble approach for cancerious dataset analysis using feature selection," in Communication Technologies (GCCT), 2015 Global Conference on, 2015, pp. 479-482. 45. G. I. Salama, M. Abdelhalim, and M. A.-e. Zeid, "Experimental comparison of classifiers for breast cancer diagnosis," in Computer Engineering & Systems (ICCES), 2012 Seventh International Conference on, 2012, pp. 180-185. 46. M. Nilashi, O. Ibrahim, H. Ahmadi, and L. Shahmoradi, "A knowledge-based system for breast cancer classification using fuzzy logic method," Telematics and Informatics, vol. 34, pp. 133-144, 2017. 47. A. Onan, "A fuzzy-rough nearest neighbor classifier combined with consistency-based subset evaluation and instance selection for automated diagnosis of breast cancer," Expert Systems with Applications, vol. 42, pp. 6844-6852, 2015. 48. E. Aličković and A. Subasi, "Breast cancer diagnosis using GA feature selection and Rotation Forest," Neural Computing and Applications, vol. 28, pp. 753-763, 2017. 49. T. Christopher and B. Jamera, "A study on mining lung cancer data for increasing or decreasing disease prediction value by using ant colony optimization techniques," in Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications, 2015. 50. C. Nguyen, Y. Wang, and H. N. Nguyen, "Random forest classifier combined with feature selection for breast cancer diagnosis and prognostic," Journal of Biomedical Science and Engineering, vol. 6, p. 551, 2013. 51. D. Tomar and S. Agarwal, "Hybrid feature selection based weighted least squares twin support vector machine approach for diagnosing breast cancer, hepatitis, and diabetes," Advances in Artificial Neural Systems, vol. 2015, p. 1, 2015. 52. B. Zheng, S. W. Yoon, and S. S. Lam, "Breast cancer diagnosis based on feature extraction using a hybrid of K-means and support vector machine algorithms," Expert Systems with Applications, vol. 41, pp. 1476-1482, 2014. 59. Authors: V.Tamilselvan, S.Siva Subramanian

Paper Title: Modular Fusion Solid State Pulsed Power Generator with Reduced Ripple Content

Abstract: a main objective of to the project is the Modular fusion solid state pulsed power generator with 371-376 ripple content. Recently, a pulsed power structures have determined substantial packages. On behalf of to the reason, using a pulsed strength turbines that similarly to responding to a dreams of to the individual. This assignment proposes the converter that's the aggregate of to the Marx topologies besides sturdy state voltage multipliers to in a conjunction with remarks loop controller. It is the capable of to the generating excessive voltage pulses with diverse amplitudes at distinctivefrequencies to in which is the modular besides flexible. A resonant circuit used to in a this shape can reduce a strain on switching element besides growth an out-put to the voltage even as presenting the 0 modern-day switching on the behalf the a whole bridge converter. A controller is the operated with voltage oriented feedback structure controlling a duty ratio of to the power electronic devices. A Proposed Voltage Oriented Control method on the behalf the pulsed generator to reduce a switching loss besides to improve a performance. A system simulation has been done using Matlab/Simulink software. PI controller has been designed along with Pulse Width Modulation scheme to control a system.

Keyword: Pulsed power generator, PI controller, Ripples. References: 1. S. Beebe, “Mechanisms of Nanosecond Pulsed Electric Field (NsPEF)- induced cell death in cells and tumors”, J. Nanomedicine Research, Vol.2, No.1, pp. 00016, 2015. 2. [2] B. Yu, S. Muenster, A.H. Blaesi, D.B. Bloch and W.M. Zapol, “Producing nitric oxide by pulsed electrical discharge in air for a portable inhalation therapy”, Sci. Translational Medicine, Vol.7, No. 294, pp.107-117, 2015. 3. S. Jiang, Y. Wen and K. Liu, “Investigation of pulsed dielectric barrier discharge system on water treatment by liquid droplets in air”, IEEE Trans. Dielectr. Electr. Insul,Vol.22, No.4, pp.1866-71, 2015 4. N. Koutahzadeh, M.R. Esfahani and P.E. Arce, “Removal of acid black 1 from water by the pulsed corona discharge advanced oxidation method”, J. Water Proc. Eng., Vol. 10, pp.1-8, 2016 5. R. Streubel, G. Bendt and B. Gökce, “Pilot-scale synthesis of metal nanoparticles by high-speed pulsed laser ablation in liquids”, Nanotechnology, Vol. 27, No. 20, pp.205602, 2016 6. W. Jiang, K. Yatsui, K. Takayama, M. Akemoto, E. Nakamura, N. Shimizu, A. Tokuchi, S. Rukin, V. Tarasenko, and A. Panchenko, “Compact solid-state switched pulsed power and its applications”, Proc.IEEE, Vol. 92, pp. 1180-1196, 2004. 7. T. Sakamoto, A. Nami, M. Akiyama, and H. Akiyama, “A repetitive solid state Marx-type pulsed power generator using multistage switch-capacitor cells”, IEEE Trans. Plasma Sci., Vol. 40, pp. 2316-2321, 2012. 8. L. Redondo, “A DC Voltage-Multiplier Circuit Working as a High- Voltage Pulse Generator”, IEEE Trans. Plasma Sci.,Vol.38, pp.2725- 2729, 2010. 9. J. S. Won, D. H. Kim, C. G. Ro, K. S. Lee, K. S. Kim, and H. W. Lee, “Characteristics of the Forward type high voltage pulse power supply for a lamp type ozonizer”, Proc. Power Convers. Conf., Osaka, Japan, Vol.1,pp.100–103, 2002 10. C. Wang and Q. H. Zhang, “EMI and its elimination in an integrated high voltage (12 kV) pulse generator”, 26th Annual Conf. of the IEEE In Indust. Electronic Society, Vol.2, pp. 1044–1049, 2002. 11. X. Tian, X. Wang, B. Tang, P. K. Chu, P. K. Ko, and Y. C. Cheng, “Special modulator for a high frequency, low-voltage plasma immersion ion implantation”, Rev. Sci. Instrum., Vol.70, No. 3, pp. 1824–1828,1999. 12. F. Wang, A. Kuthi, C. Jiang, Q. Zhou, and M. Gundersen, “Flyback resonant charger for a high repetition rate pseudospark pulse generator”, Power Modulator Conf. Sympos., pp. 85–88, 2004. 13. M. Giesselman and T. Heeren, “Rapid capacitor charger”, Proc. Power Modulator Conf. Symp., pp. 146–149, 2002. 14. S.H. Kim, M. Ehsani and C.S. Kim, “High-voltage power supply using series-connected full-bridge PWM converter for a pulsed power applications”, IEEE Trans. Dielectr. Electr. Insul, Vol. 22, No. 4, pp. 1937-44, 2015. 15. M. Rezanejad, A. Sheikholeslami, J. Adabi, “ Modular switched capacitor voltage multiplier topology for a pulsed power supply” , IEEE Trans. Dielectr. Electr. Insul, Vol. 21, No. 2, pp.635-43, 2014. 16. M. Acharya and P. Shrivastava, “Design and development of a prototype 25 kV, 10 A long pulse Marx modulator for a high power klystron” , Rev. Sci. Instrum., Vol. 87, No. 2, pp.025114, 2016. 17. Y. Shen, W. Wang, Y. Liu, L. Xia, H. Zhang, H. Pan, J. Zhu, J. Shi, L. Zhang, J. Deng, “A compact 300 kV solid-state high- voltage nanosecond generator for a dielectric wall accelerator”, Rev. Sci. Instrum., Vol. 86, No. 5, pp.055110, 2015. 18. P.K. Srivastava, S.K. Singh, A.K. Sanyasi, L.M, Awasthi and S.K. Mattoo, “A 5 kA pulsed power supply for a inductive and plasma loads in large volume plasma device”, Rev. Sci. Instrum., Vol.87, No.7, pp.073501, 2016. 19. A.A. Elserougi, A.M. Massoud and S. Ahmed, “A Modular High-Voltage Pulse-Generator with Sequential Charging for a Water Treatment Applications”. IEEE Trans. Indust. Electronics, Vol. 63, No. 12, pp. 7898-7907, 2016. 20. T. Adachi, T. Arai, K. W. Leo, K. Takayama, and A. Tokuchi, “A solidstate Marx generator driven Einzel lens chopper ”, Rev. Sci. Instrum., Vol. 82, p.083305, 2011. 21. J. Biela, D. Aggeler, D. Bortis, and J. W. Kolar, “Balancing circuit for a a 5-Kv/50-Ns pulsed-power switch based on Sic-Jfet super cascode”, IEEE Trans. Plasma Sci., Vol.40, pp.2554-2560, 2012. Authors: A. Clement Raj, Ararso Taye Waktola An Efficient Upgradation of STATCOM to PV-STATCOM and Result Estimation using Paper Title: SIMULINK Abstract: Power generation is a much discussed topic in research works recently. Power production from different renewable source were the most processed topic. There are large number of solar farms which produce heavy electricity throughout the world but the overall efficiency of those solar farms remain unutilized especially in morning and evening when the sunlight is at its minimum the power production is too low. The series of Photovoltaic Cells (PV) are responsible for power production which are connected with the grid. The solar power output is D.C which can be transformed into A.C by inverter injection in the production line. STATCOM is proposed system which is a device is coming from the sub categorization of FACTS. STATCOM is concentrated on voltage source transformer. It operates in accordance as rectifier and inverter is used to increase power transmission limits. It also has the feature of damping control. The overall gist of the system is we propose a PV-STATCOM control concept. We use MATLAB 2013a to develop a Simulink simulation of PV-STATCOM system. It will be a solar inverter which is voltage controlled and it has overall inverter properties too.

Keyword: FACTS, STATCOM, PV-STATCOM, MATLAB References: 1. L. F. Casey, C. Schauder, J. Cleary, and M. Ropp, “Advanced inverters facilitate high penetration of renewable generation on medium voltage feeders - impact and benefits for the utility,” in Innovative Technologies for an Efficient and Reliable Electricity Supply (CITRES), 2010 IEEE Conference on, Sept 2010, pp. 86–93. 2. R. K. Varma, S. A. Rahman, V. Atodaria, S. Mohan, and T. Vanderheide, “Technique for fast detection of short circuit current in pv distributed generator,” IEEE Power and Energy Technology Systems Journal, vol. 3, no. 4, pp. 155–165, Dec 2016. 3. B. Mather, “NREL/SCE high-penetration PV integration project: Reporton field demonstration of advanced inverter functionality 60. in Fontana,CA,” National Renewable Energy Laboratory (NREL), Golden, CO.Tech. Rep., 2014, Report NREL/TP-5D00-62483. 4. Yazdani and R. Iravani, Voltage-sourced converters in power systems: modeling, control, and applications. John Wiley & Sons, 2010. [24] A. Yazdani, A. R. D. Fazio, H. Ghoddami, M. Russo, M. Kazerani, J. Jatskevich, K. Strunz, S. Leva, and J. A. Martinez, “Modeling guidelines and a benchmark for power system simulation studies of three-phase single-stage photovoltaic 377-382 systems,” IEEE Transactions on Power Delivery, vol. 26, no. 2, pp. 1247–1264, April 2011. 5. M. Liserre, F. Blaabjerg, and S. Hansen, “Design and control of an lclfilter-based three-phase active rectifier,” IEEE Transactions on Industry Applications, vol. 41, no. 5, pp. 1281–1291, Sept 2005. [26] W. Leonhard, Control of electrical drives. Springer Science & Business Media, 2001. 6. R. K. Varma, V. Khadkikar, and S. A. Rahman, “Utilization of distributed generator inverters as STATCOM,” Sep. 15 2010, PCT Patent application PCT/CA2010/001419. 7. E. M. Siavashi, “Smart PV inverter control for distribution systems,” in Electronic Thesis and Dissertation Repository. 3065. https://ir.lib.uwo.ca/etd/3065, 2015. 8. R. K. Varma, S. A. Rahman, A. C. Mahendra, R. Seethapathy, and T. Vanderheide, “Novel nighttime application of PV solar farms as STATCOM (PV-STATCOM),” in 2012 IEEE Power and Energy Society General Meeting, July 2012, pp. 1–8. 9. EPRI, “Common functions for smart inverters, version 3,” Palo Alto, CA, Feb 2014. 10. R.K. Varma, V. Khadkikar, and R. Seethapathy, “Nighttime application of PV solar farm as STATCOM to regulate grid voltage,” IEEE Transactions on Energy Conversion, vol. 24, no. 4, pp. 983–985, Dec 2009. 11. R. K. Varma, “Multivariable modulator controller for power generation facility,” filed on December 2014, PCT Application (PCT/CA2014/051174). 12. Benot Bletterie, Serdar Kadam, Roman Bolgaryn, and Antony Zegers. Voltage Control with PV Inverters in Low Voltage Networks—In Depth Analysis of Different Concepts and Parameterization Criteria. IEEE TRANSACTIONS ON POWER SYSTEMS, 32(1), 2017. doi: 10.1109/TPWRS.2016.2554099. 13. R. K. Varma, S. A. Rahman, and T. Vanderheide, “New control of PV solar farm as STATCOM (PV-STATCOM) for increasing grid power transmission limits during night and day,” IEEE Transactions on Power Delivery, vol. 30, no. 2, pp. 755–763, April 2015. 14. Dinavahi, R. Iravani, and R. Bonert, “Design of a real-time digital simulator for a d-statcom system,” IEEE Transactions on Industrial Electronics, vol. 51, no. 5, pp. 1001–1008, Oct 2004. 15. K. Turitsyn, P. Sulc, S. Backhaus, and M. Chertkov, “Options for control of reactive power by distributed photovoltaic generators,” Proceedings of the IEEE, vol. 99, no. 6, pp. 1063–1073, June 2011. 16. T. Stetz, F. Marten, and M. Braun, “Improved low voltage grid integration of photovoltaic systems in Germany,” in 2013 IEEE Power Energy Society General Meeting, July 2013, pp. 1–1 Authors: T.S. Uma Rani, Easwaramoorthy Rangaswamy, N. Panchanatham 61. Paper Title: Customers’ Perception and the Role of Demographic Characteristics in Online Bank Marketing Strategies Abstract: Purpose - the essential purpose of this study is to research the customers’ perception and therefore the role of demographic characteristics in on-line bank promoting methods. It helps the bankers as a parameter to boost the character and closeness of relationship between bank promoting methods and therefore the demographic factors particularly, bank customers’ standing within the family, gender, age, academic qualification, occupation and monthly financial gain. And to predict the character and closeness of relationship between current perception concerning bank promoting methods and their current position concerning paying of housing loan, important stage of documentation, most frequented bank, variety of account with the bank, variety of coping with the bank, the other checking account, bank with most no. of ATM dealingss and frequent usage of on-line banking transaction. Design/methodology/approach - Descriptive study was conducted to search out out the extent of relationship that prevails between demographic characteristics and bank promoting methods. 493 questionnaires were collected supported convenient sampling. This study includes each the first and secondary knowledge. Primary knowledge was through the planned form with direct, open-ended and closed-ended multiple alternative queries containing demographic variables and bank promoting methods. The man of science has framed the form supported varied reviews, personal interview with bank managers. Secondary knowledge of the study were gathered from magazines, journal books, through on-line, banking sources, past researches and reviews Findings - Through multiple correlation analysis, the study reveals that there exist a big relationship between the demographic variables, namely, bank customers standing within the family, gender, age, academic qualification, occupation, monthly financial gain, legal status, religion, current residence, standing of current residence, stick with the family associate degreed bank customers possessing an own house and their perception towards bank promoting methods. and therefore the results showed that there's a big relationship between client perception towards the bank promoting methods and most often used bank, variety of account within the bank, variety of coping with the bank, most most popular ATM, and frequency of visit to the location. This study is additionally valuable to different investigators for coming study.

383-389 Keyword: Bank marketing strategies, customers’ perception, Demographic Characteristics, customer satisfaction References: 1. Aaker, David. A. (2008). Strategic Market Management. New York :John Wiley 2. Beckett, A., Hewer. O., & Howcroft, B. (2000). An exposition of consumer behavoiur in the financial service industry. The International Journal of Bank Marketing, 18(1), 15. 3. Denis Yannacopoulos, Panagiotis Manolitzas, Nikolaos Matsatsinis and Evangelos Grigoroudis (2014), “Customer Satisfaction and the Role of Demographic Characteristics in Online Banking”, Evaluating Websites and Web Services: Interdisciplinary Perspectives on User Satisfaction, Publisher: IGI Global, pp.138-154. 4. Engel, J.F., Blackwell, R.D., and Miniard, P.W. (1995): Consumer Behaviour. Hinsdale, IL: Dryden Press. 5. Ganesan-Lim, C., Russell-Bennett, R., & Dagger, T. (2008). The impact of service contact type and demographic characteristics on service quality perceptions. Journal of Services Marketing, 22(7). doi:10.1108/0887604081090967 6. Kirti Dutta., Anil Dutta. (2009). Customer expectation and perceptions across the Indian Banking industry and the resultant financial implications. Journal of Services Research. 9(1), 31-49. 7. Mayer., and Buckley. (1970). An Examination of the Pathways through Which Social Class Impacts Health Outcomes. Academy of Marketing Science Review. 8. Mittal, V & Kamakura, W. A. (2001). Satisfaction, repurchase intent and repurchase behaviour: Investigating the moderating effect of customer characteristics. JMR, Journal of Marketing Research, 38(1), 131–142. doi:10.1509/jmkr.38.1.131.1883 9. Nelson P, Richmond W (2007). Internet Banking: Gold Mine or Money Pit? Academy of Banking Studies Journal 6: 1-25. 10. Perrier., Pierse Filiatrault., and Line Richard. (1992). Relationship Marketing and Commercial Banking: A Critical Analysis. The International Journal of Bank Marketing, 10(7), 5. 11. Reidenbach, R.E. (1995). Value-Driven Bank: Strategies for Total Market Satisfaction. Irwin Professional, U.K. 12. Sudha Dhawan. (2009). An insight into factors influencing bank selection decisions of Indian customers. Institute of Productivity & management, 13, pp. 21-31. 13. Suganthi., Balachander., and balachandran. (2001). Internet Banking Patronage: An Empirical Investigation of Malaysia. Journal of Internet Banking and Commerce, 6(1). 14. Uma Rani, T.S., Dr. Panchanatham, N. (2011). Impact of Marketing Strategies in Enhancing the customer perception towards Banks. International Journal of Retailing and Marketing, 173-179. 15. Vinh Sum Chau, liqing W.L.C., Nagai. (2010). The youth market for internet banking services perceptions, attitude and behaviour. Journals of services marketing, 24(1). 62. Authors: E. Raghunandana Sai, Ch. V. Ramana Murthy Influence of Critical Parameters on Temperature and Velocity for Convective Flow of a Viscous Paper Title: Fluid Through Porous Medium Abstract: We keep in mind a unfastened convective improvement of an impressible and electrically directing 390-394 thick liquid along a boundless non-fundamental diploma plate thru a permeable medium. The effect of simple parameters on the go with the flow field has been analyzed for this example. it's miles visible that, for everyday estimations of Porosity due to the truth the Prandtl range builds, the temperature likewise increments. similarly, it's far taken into consideration that to be the time expands, the temperature moreover increments. however the abovementioned, due to the fact the time propels and the Grashof huge variety is constant, the rate increments. on the begin, for a decrease estimation of t, the rate profiles are direct and from that trouble the profiles aren't unreasonably right away.

Keyword: Prandtl range builds,abovementioned,Grashof huge References: 1. Brinkman H.C, A computation of thick electricity stretched out through way of streaming liquid in a thick swarm of particles. Appl.Sci.Res,A(1) Pp27-34.(1947). 2. HasimotoH,Boundary layer improvement on a degree plate with suction or infusion. J.Phys.Soc.Japan.12,Pp 68- 72 (1957). 3. Bermen A.S , Laminar flow in a channel with permeable dividers, J.Appl.Phys;24,1232-1235,(1953). 4. Sellars J.R., Laminar movement in channels with permeable dividers at high suction Reynolds range, J.ApplPhys;26,Pp489-490, (1953). 5. five) Mori Y, on consolidated loose and confined convective laminar MHD pass and heat pass in channels with transverse attractive area, worldwide upgrades I heat transfer,ASME paper no.124,Pp 1031-1037(1961). 6. Macey R.I., strain circulate designs in a chamber with reabsorbing partitions,Bull.Math.Bio phys,25(1). (1963). 7. England W.G. furthermore, Emery A.F.: Thermal radiation outcomes for the laminar free convectionrestriction Layer of a maintaining gas. J.heatswitch,Vol.ninetyone,Pp 37-44.(1969). 8. Soundalgekar V.M. furthermore, Thakur H.S.(1993): Radiation effects with the expectation of complimentary convection movement beyond a semi endless vertical plate. displaying dimension and manage, Vol.B51,Pp 31-48 9. Mansutti D,Pontrelli G and Rajagopalokay.R, Normal progressions of non-Newtonian liquids beyond a permeable plate with suction or infusion. Int .J.Num. approach's fluids,17,Pp 927-941. (1993). 10. Sattar M.A, unfastened convection and mass trade course thru a permeable medium past an by no means-ending vertical permeable plate with time subordinate temperature and interest.Ind.J.herbal and Appl.Math.23.,Pp 759-766,(1994). 11. Das U.N.,Deka R.desirable & Soundalgekar V.M.: Radiation effects on flow past an impulsive started vertical infinite plate. J.Theoritical Mechanics, Vol.1.Pp 11- 115,(1996). 12. Choudary R and Das A, Magneto-hydrodynamic restriction layer streams of non-Newtonian liquid past a level plate. Ind.J.PureAppl.Math.31(eleven),Pp 1429-1441(2000). 13. Das S.S,Sahoo S. K. and Dash G.C, Numerical solution of mass transfer effects on unsteady flow past An accelerated vertical porous plate with suction. Bulletin of Malysie.Math.Sci.Soc.29(1),Pp 33-42 (2006). 14. Ramana Reddy G.V. &, Ramana Murthy Ch.V, Mixed Convective Convective MHD Flow and Mass transfer past an accelerated infinite vertical porous plate. Mathematics Applied in science and Technology, Vol 1, No. 1, Pp 65 - 71 (2009) Ahmad Syahrin Bin Shahriman, Shaharil bin Mad Saad, Zair Asrar Bin Ahmad, Mohamed Bin Authors: Hussein, Mohd Azuwan Bin Mat Dzahir, Mohd Azwarie Bin Mat Dzahir Paper Title: An Architecture Improvement of Electronic Braille Quran Based on Raspberry Pi Abstract: An electronic braille (eBraille) Quran is a braille display that is use to aid the visually impaired and blind Muslims in their journey of understanding and appreciating the Quran in a much more convenient way. It is an invention of University of Technology Malaysia (UTM) since 2009 for the blind people to recite Quran through the Braille system. However, current architecture of eBraille Quran comprises of too many modular components, numerous microcontrollers and complexly designed. Another vital issue is that its architecture still uses old technologies where the firmware updating or data correction process cannot be done remotely. This makes it hard to maintain, repair, costly and time consuming. This study proposed an enhancement of current architecture with the latest technology of single board computer named Raspberry Pi 3B+. The architecture is first designed according to the existing features of the eBraille Quran. Then, a prototype circuit is developed and fabricated for testing purposes of the proposed architecture. Once the circuit is fabricated, an experiment is conducted to test on how well the new architecture manages the intended functionalities, controlling input and output of braille cells, the performance of start-up time and battery consumption. The result shows that the proposed architecture using Raspberry Pi manages to carry out all the proposed functionalities of eBraille Quran. The start-up time is also within tolerable level with only 1 second slower than the current architecture. Battery consumption on the other hand shows that using Raspberry Pi reduces the battery consumption by 1.2% per hour.

63. Keyword: Braille System, Raspberry Pi, Single-Board Computer, eBraille Al-Quran, Architecture. References: 395-399 1. M. Hussein et al., “Increasing Braille Literacy : Voice-Assisted Electronic Braille Books ( eBraille eBook ) for the Visually Impaired 2 Overview of Assistive Devices in Braille Education,” Adv. Comput. Technol. Educ., pp. 72–77, 2017. 2. S. Mad Saad, M. Z. Md Zain, M. Hussein, M. S. Yaacob, A. R. Musa, and M. Y. Abdullah, “A system architecture of electronic Braille panel for reciting Al-Quran,” in Proceedings - 2nd International Conference on Computational Intelligence, Modelling and Simulation, CIMSim 2010, 2010, pp. 427–430. 3. S. M. Saad et al., “Development of piezoelectric braille cell control system using microcontroller unit (MCU),” WSEAS Trans. Circuits Syst., vol. 9, no. 6, 2010. 4. UTM, “What is eBraille,” Weebly, 2014. . 5. M. Marmor, I. Alonso, and J. Jime, “Biography of Louis Braille and Invention of the Braille Alphabet,” vol. 54, no. 1, 2009. 6. Y. Bar-cohen, “Electroactive polymers for refreshable Braille displays,” pp. 5–7, 2009. 7. G. Frediani, J. Busfield, and F. Carpi, “Enabling portable multiple-line refreshable Braille displays with electroactive elastomers,” Med. Eng. Phys., vol. 60, pp. 86–93, 2018. 8. D. Kendrick, “Freedom Scientific Focusing On Braille Part 2: A Review of the Focus Blue 40 Braille Display,” pp. 2–3, 2014. 9. A. Russomanno, S. O’Modhrain, R. B. Gillespie, and M. W. M. Rodger, “Refreshing refreshable braille displays,” IEEE Trans. Haptics, vol. 8, no. 3, pp. 287–297, 2015. 10. H. Nguyen, T. Thi, K. Loan, B. D. Mao, and E. Huh, “Low Cost Real-Time System Monitoring Using Raspberry Pi,” 2015 Seventh Int. Conf. Ubiquitous Futur. Networks, pp. 857–859, 2015. 11. N. Kamal and P. Ghosal, “Three Tier Architecture for IoT Driven Health Monitoring System Using Raspberry Pi,” 2018 IEEE Int. Symp. Smart Electron. Syst. (Formerly iNiS), pp. 167–170, 2018. 12. “Raspberry Pi 3 Model B.” [Online]. Available: https://www.raspberrypi.org/products/raspberry-pi-3-model-b/. 13. “Meet the Beagles: Open Source Computing.” [Online]. Available: http://beagleboard.org/. 14. “UDOO X86 II.” [Online]. Available: https://www.udoo.org/udoo-x86/. 15. “BPI-W2.” [Online]. Available: http://www.banana-pi.org/w2.html. 64. Authors: Debjani Sarkar, Pallavi Shettigar, HY Prahlad Effect of Diet Counseling on Anthropometric Indices and Dietary Intake of the Head and Neck Paper Title: Cancer Patients Undergoing Chemo-Radiotherapy Abstract: Malnutrition is common in patients with head and neck cancer due to cancer cachexia, anti-cancer 400-405 therapies, impairment in food intake due to the tumor etc. This study aims at studying the effect of diet counseling intervention on dietary intake and anthropometric indices. Experimental design with only one experimental group was conducted on 14 head and neck cancer patients who were admitted for chemo- radiotherapy. Detailed assessment of anthropometry and diet was done in the before, during and after the diet counseling intervention of 7 weeks. There was mean weight improvement of 2 kg (p<0.001) during the intervention period that can be attributed to a significant increase in the dietary intake of energy (p=0.034), protein (p=0.011), calcium (p<0.001), zinc (p=0.041), vitamin C (p=0.046) and vitamin A (p=0.019). However there was no statistically significant improvement in the mid-upper arm circumference (MUAC). This increase may be a sign of improvement of nutritional status as normally cancer patients tend to show a decrease in MUAC. This indicates the success of the diet counseling intervention. An even greater improvement in these parameters can be achieved if intervention is provided before the initiation of chemoradiotherapy and has to be continued even after the therapy is complete.

Keyword: Head and neck cancer, malnutrition, diet counseling, changes in anthropometric indices, changes in dietary intake. References: 1. Cancer Research UK) Cancer Research UK. (n.d.). Retrieved from http://www.cancerresearchuk.org/cancer-info/cancerstats/types/oral/incidence/uk-oral-cancer-incidence-statistics: http://www.cancerresearchuk.org/cancer-info/cancerstats/types/oral/incidence/uk-oral-cancer-incidence-statistics 2. (National Cancer Institute, 2012) National Cancer Institute. (2012, January 2). Retrieved from http://www.cancer.gov/cancertopics/factsheet/Sites-Types/head-and-neck: http://www.cancer.gov/cancertopics/factsheet/Sites- Types/head-and-neck 3. (Agostino Paccagnella, 2010) Agostino Paccagnella, M. M.-R. (2010). Early intervention improves treatment tolerance and outcomes in head and neck cancer undergoing concurrent chemoradiothera. 4. (Harriët Jager-Wittenaar & Pieter U. Dijkstra & Arjan Vissink & Rob P. van Oort, 2010) Harriët Jager-Wittenaar & Pieter U. Dijkstra & Arjan Vissink & Rob P. van Oort, B. F. (2010). Malnutrition in patients treated for oral or oropharyngeal cancer— prevalence and relationship with oral symptoms: an explorative study. 1675-1683. 5. (Roodenburg, 2010) Roodenburg, H. J.-W. (2010). Malnutrition in patients treated for oral or oropharyngeal cancer—prevalence and relationship with oral symptoms: an explorative study. 1675-1683. 6. (Ji-Yeon Kim, 2011) Ji-Yeon Kim, G. A.-A.-Y.-M.-H.-J.-H. (2011). Development and validation of nutrition screening tool for hospitalized cancer patients. Clinical Nutrition , 724-729. 7. (J.Bauer, 2002) J.Bauer, S. (2002). Use of Scored Patient Subjective Global Assessment(PG-SGA) as a nutrition assessment tool in patients with cancer. European Jaounal of Nutrition . 8. (Manon G. A. van den Berg, Comparison of the effect of individual dietary counselling and of standard nutritional care on weight loss in patients with head and neck cancer undergoing radiotherapy, 2010). Manon G. A. van den Berg, E. L.-C.-L. (2010). Comparison of the effect of individual dietary counselling and of standard nutritional care on weight loss in patients with head and neck cancer undergoing radiotherapy. British Journal of Nutrition , 872-877. 9. (Manon G. A. van den Berg, Comparison of the effect of individual dietary counselling and of standard nutritional care on weight loss in patients with head and neck cancer undergoing radiotherapy, 2010) Manon G. A. van den Berg, E. L.-C.-L. (2010). Comparison of the effect of individual dietary counselling and of standard nutritional care on weight loss in patients with head and neck cancer undergoing radiotherapy. British Journal of Nutrition , 872-877. 10. (Michele, 2009) Michele, A. P.-R. (2009). Early nutritional intervention improves treatment tolerance and outcomes in head and neck cancer patients undergoing concurrent chemoradiotherapy. Support Care Cancer , 837-845. 11. (M. C. Gonçalves Dias, 2005) M. C. Gonçalves Dias, M. d. (2005). Nutritional intervention improves the caloric and proteic ingestion of head and neck cancer patients under radiotherapy. Nutricion Hospitalaria , 320-325. 12. (McCarthy D, 1999) McCarthy D, W. D. (1999). The effect of supplementation on food intake in patients undergoing radiotherapy. Oncol Nurs Forum , 897-900. 13. (M.Dicato, 2010) M.Dicato, L. M. (2010). Anemia in Cancer. Annals of Oncology , 68. 65. Authors: Ikhlass Sydnaoui, Roslli Bin Noor Mohamed, Mariyana Aida Binti Ab.Kadir

Paper Title: The Effects of Seasonal Thermal Loads at Expansion Joints Locations in Arabic Area Buildings

Abstract: Concrete buildings are subjected to fluctuation in seasonal temperature loads between summer 406-412 and winter in the Arabic area. The long-term effects on buildings of such temperatures, along with the frequent fluctuation in the seasonal temperatures impose overall structural deformation, displacements, and alteration of stresses in concrete elements. The thermally induced deformations affect the serviceability conditions of buildings with time. Concrete creep and shrinkage will increase the cracks widths and the imposed stresses too. To eliminate this phenomenon effects, expansion joints should be provided. However, as per the buildings functions and trend to develop unique buildings by designers, joint-less buildings are usually the preferred option. When using this option, the structural engineer has to consider the effects of thermal loads changes in the design. Clear rules and standards must be provided to define the maximum joints spacing’s allowed length in addition to thermal study procedures. Different approaches are provided by researchers, each methodology provide different value for required joints spacing considering different aspects in design. In this paper I shall try to present three methods with comparison study for considered aspects and gaps for each method analysis to propose the most appropriate methodology as a tool helps engineers in calculating the maximum allowed spacing between expansion joints.

Keyword: fluctuation, long-term; expansion joints; thermally References: 1. ACI Committee 209R. 1997. Prediction of creep, shrinkage, and temperature effects in concrete structures. 1-31. 2. Bazant, Z.1997. Prediction of concrete creep and shrinkage: past, present and future. Nuclear engineering and design, Vol203: 27- 38. 3. ACI Committee 224.3R. 2001. Joints in concrete construction. 1-43. 4. Zhao, C.,Yu,G.and Zhu,B. 2014. Analysis on mechanical characteristics of important components in our long frame structure under over all cooling, , Vol123: 770-774. 5. Pfeiffer, M., and Darwin, D.1987. Joint design for reinforced concrete buildings, Structural engineering and engineering material, SM report NO.20:1-73. 6. SCSE Committee, 2000. Expansion joints in buildings 1974, Technical report No 65: 1-43. 7. Liu, K. and Dang, Y.2013. Deformation of overlong isolated buildings caused by thermal and concrete shrinkage. Mathematical problems in engineering, ID 139159:7p. 8. Badrah, M.,and Jadid,N. 2013. Investigation of developed thermal forces in long concrete frame structuresbenthamscience.net. Open civil engineering journal: Vole 7:210-217. 9. Chiyun, Z., Yu, G. and Zhu, B.2014. Analysis on Mechanical Characteristics of Important Components in Overlong Frame Structure under Overall Cooling Temperature. Advanced material research, vole 1020:270-274. 10. Aboumoussa, W., and Iskandar, M. Thermal movement in concrete: case study of multi- storey underground car park. Materials in civil engineering, 2012. 109- M07: 63-70. 11. DAILY TEMPERTURE, https://weatherspark.com/history. 12. Comite Euro-INTERNATIONAL DU BETON. CEB-FIP MODEL CODE 1990, 1990 : 1-461. 13. ACI Committee 318. 2014. Buildings code requirements for structural concrete. 1-479. Authors: Bhuvaneshwari C Melinamath

Paper Title: Named Entity Recognition using Conditional Random Field for Kannada Language Abstract: Named Entity Recognition (NER) is a significant errand in Natural Language Processing (NLP) applications like Information Extraction, Question Answering and so on. In this paper, factual way to deal with perceive Kannada named substances like individual name, area name, association name, number, estimation and time is proposed. We have achieved higher accuracy in CRF approach than the in HMM approach. The accuracy of classification is more accurate in CRF approach due to flexibility of adding more features unlike joint probability alone as in HMM. In HMM it is not practical to represent multiple overlapping features and long term dependencies. CRF ++ Tool Kit is used for experimentation. The consequences of acknowledgment are empowering and the approach has the exactness around 86%.

Keyword: CRF, HMM, NER, NLP. 66. References: 1. Bick, Eckhard. "A Named Entity Recognizer for Danish". Proc. Conference on Language Resource and Evaluation 2004, pp. 413-416 305-308. 2. Michael Fleischman. "Automated sub categorization of named entities". Proc. Conference of the European Chapter of Association for Computational Linguistic, pp. 25-30, 2001. 3. Yungwei Ding Hsinhsi Chen and Shihchung tsai. "Named entity extraction for information retrieval". Proc. of HLT-NAACL, pp 8-15, 2003. 4. Ekbal and S. Bandyopadhyay ".Named entity recognition in Bengali: A Conditional random field". Proc. ICON, pp. 123-128, 2008. 5. Bhuvaneshwari C Melinamath (2011). "A robust Morphological analyzer to capture Kannada noun Morphology", Proc. IEEE, International Conference on Future Information Technology (ICFIT). Singapore, 2011. 6. Mukund Sangalikar, Shilpi Srivatsava and D.C. Kothari. "Named entity recognition System for Hindi language". International journal of Computational Linguistics Volume (2), pp. 10-23, 2011. 7. Bhuvaneshwari C Melina math. "Rule Based Methodology for recognition of Kannada named entities," International journal of Latest trends in Engineering and technology (IJLTET). ISSN: 2278-621X. Vol. 3 Issue 4 March 2014. 8. Kashif Riaz, Proc. of " Named Entities Workshop", Uppsala, Sweden., pp. 126-135, Association for Computational Linguistics ACL, 16 July 2010 2010. 67. Authors: Rodiel C. Ferrer A Research on the Moderating Effect of Company Demographics on the Relationship between Paper Title: Business Combination and Current Ratio using Structural Equation Model: A Test of Agency and Transaction Theories Abstract: Globalization of economic activities created opportunities and threats for companies of different 417-424 industries to be constantly evolving to compete with local and global competitors. For firms in emerging economies to be ahead of the pack, mergers and acquisitions are the way to go. M&As allow companies to expand faster as it assist them penetrate new markets and cross-sell into different customer bases, improve access to capital, and provide greater advantages over its competitors. With the noticeable relevance of business combination activities, this study aimed to determine whether company demographics strengthens or weakens the relationship between business combination and current ratio. Structural Model Equation (SEM) approach was used to analyze the data derived from 25 publicly listed companies in the Philippines over a 15-year horizon, 2000 - 2015. Findings suggest that there are direct relationships between business combination and current ratio as well as company demographics and current ratio. Also, the moderation of company demographics was proved to have a significant effect on the existing relationship of the independent and dependent variables. Agency and transaction cost theories supported the given results.

Keyword: Business Combination, Current Ratio, Company Demographics, Agency Theory, Transaction Cost Theory References: 1 Akinbuli, S. (2013). The Effects of Mergers and Acquisition on Corporate Growth and Profitability: Evidence from Nigeria. Global Journal Of Business Research, 7(1). 2 Ali, M., Kihoro, J., Mukulu, E., & Nzulwa, J. (2016). Moderating Effect of Firm Size on the Relationship between Functional Integration and Firm Performance. International Journal of Academic Research in Business and Social Sciences, 6(9). 3 Aniefor, S., & Omoye, A. (2016). Mergers and Acquisitions: The Trend in Business Environment in Nigeria. Accounting and Finance Research, 5(2). 4 Anuar, M., Khan, F., Khan, S., & Malik, M. (2014). Mergers and Acquisitions: A Conceptual Review. International Journal of Accounting and Financial Reporting, 4(2). Retrieved from: Doi:10.5296/ ijafr.v4i2.662 5 Ashfaq, K., Usman, M., Hanif, Z. and Yousaf, T. (2014). Investigating the Impact of Merger & Acquisition on Post Merger Financial Performance (Relative & Absolute) of Companies (Evidence from Non-Financial Sector of Pakistan). International Journal of Academic Research in Business and Social Sciences, 4(11). 6 Basit, A., Hamza, S., & Yanan, E. (2016). Impact of Merger and Acquisitions on Firms Financial Performance: A study on United States of America. International Journal of Accounting & Business Management, 4(2). Available at: http://www.ftms.edu.my/journals/pdf/IJABM/Nov2016/159-169.pdf [Accessed 15 Nov. 2018]. 7 Bianconi, M., Tan, C., Wang, Y., & Yoshino, J. (2014). Mergers and Acquisitions and the Valuation of Firms. Journal Of Economic Literature. 8 Birjandi, H. (2015). The study effect agency theory and signaling theory on the level of voluntary disclosure of listed companies in Tehran Stock Exchange. Research Journal Of Finance And Accounting, 6(1), 174-183. 9 Chiadamrong, N. & Sinthupundaja, J. (2015). Investigation of Thai manufacturing public firms’ characteristics and financial strategies towards financial performance improvement. Journal of Economics, Business and Management, 3(3), 331-337. Retrieved from: http://www.joebm.com/papers/205-A00012.pdf 10 Camerlynck, J., Ooghe, H. and Langhe, T. (2005). Pre-Acquisition Profile of Privately Held Companies Involved in Take-Overs: An Empirical Study. Small Business Economics, 24(2), pp.169-186. 11 Degutis, A. and Novickyte, L. (2014). The Efficient Market Hypothesis: A Critical Review of Literature and Methodology. EKONOMIKA, 93(2), pp.7-23. 12 De Langhe, T., Ooghe, H. and Camerlynck, J. (2001). Are Acquisitions Worthwhile? An Empirical Study of the Post Acquisition Performance of Privately Held Belgian Companies Involved in Take-overs. SSRN Electronic Journal. 13 Dickinson, V., Wangerin, D., & Wild, J. (2016). Accounting Rules and Post-Acquisition Profitability in Business Combinations. Accounting Horizons, 30(4), 427-447. doi: 10.2308/acch-51504 14 Drever, M., & Hutchinson, P. (2007). Industry differences in the determinants of the liquidity of Australian small and medium sized enterprises. Small Enterprise Research, 15(1), 60-76. doi: 10.5172/ser.15.1.60 15 Erdogan EM, Erdogan M (2014). Effect of Acquisition Activity on the Financial Indicators of Companies: An Application in BIST. International Journal of Business and Sosial Research (IJBSR). 4(7):17-22. 16 Erel, I., Liao, R. and Weisbach, M. (2012). Determinants of Cross-Border Mergers and i. Acquisitions. The Journal of Finance, 67(3), pp.1045-1082. 17 Ferrer, R. and Ferrer, G. (2011). LIQUIDITIY AND FINANCIAL LEVERAGE RATIOS: THEIR IMPACT ON COMPLIANCE WITH INTERNATIONAL FINANCIAL REPORTING STANDARDS (IFRS). Academy of Accounting and Financial Studies Journal, [online] 15(1), pp.135-150. Available at: https://search.proquest.com/openview/cf10b8671be3ccbf4fdb74f0204ff99d/1? pq-origsite=gscholar&cbl=29414 [Accessed 27 Aug. 2019]. 18 Ferrer, R. (2012). AN EMPIRICAL INVESTIGATION OF THE IMPACT OF MERGER AND ACQUISITION ON THE FIRMS' ACTIVITY RATIOS. Journal of International Management Studies, [online] 12(2), pp.68-73. Available at: https://web.a.ebscohost.com/abstract? direct=true&profile=ehost&scope=site&authtype=crawler&jrnl=19306105&AN=76384964&h=P48vcYg2VjLjTrmzA4ESjlK8Y mhs884XuIu3hMcJ%2bjDqC83eaTLttCrO53YypEyRe5MhGyOyu5EAVWE9H0hz9g%3d %3d&crl=c&resultNs=AdminWebAuth&resultLocal=ErrCrlNotAuth&crlhashurl=login.aspx%3fdirect%3dtrue%26profile %3dehost%26scope%3dsite%26authtype%3dcrawler%26jrnl%3d19306105%26AN%3d76384964 [Accessed 25 Aug. 2019]. 19 Ferrer, R. and Tang, A. (2012). The Impact of Merger and Acquisition, Financial Ratios on Stock Price among the Industrial Firms in the Philippines. De La Salle University Manila. 20 GÜNAY BENDAŞ, F. (2015). The Effects of Acquisitions on Firm Value, Evidence from Turkey. Doğuş Üniversitesi Dergisi, 1(16), pp.79-90. 21 Gaharan, C. (2015). Reporting standards for bargain purchase option: Is the objective i. achieved? Journal of Accounting and Finance, 15(8), 62-68. 22 Harvey, S. (2015). The Role of Mergers and Acquisitions in Firm Performance: A Ghanaian Case Study. Journal Of Applied Business And Economics, 17(1), 66-77. 23 Hooper, Daire & Coughlan, Joseph & R. Mullen, Michael. (2007). Structural Equation Modeling: Guidelines for Determining Model Fit. The Electronic Journal of Business Research Methods. 6. 24 Jensen, M. and Meckling, W. (1976). Theory of the firm: Managerial behavior, agency costs, and ownership structure. Journal of Financial Economics, 3(4), 305-360. Retrieved from https://doi.org/10.016/0304-405X(76)90026-X 25 Jensen, M.C., 2001, Value maximization, stakeholder theory, and the corporate objective function, European Financial Management 7, 297-317. 26 Johnson, G., Scholes, K. and Whittington, R. (2011). Exploring corporate strategy. Harlow [etc.]: Pearson Education. 27 Kenton, W. & Hayes, A. (2019). Liquidity Ratio Definition. Retrieved from: https://www.investopedia.com/terms/l/liquidityratios.asp 28 Khodamipour, A., Golestani, S. and Khorram, M. (2013). The relationship between liquidity and the company size with company value in companies listed on the Tehran Stock Exchange. European Online Journal of Natural and Social Sciences, [online] 2(3), pp.1210-1217. Available at: http://european-science.com/eojnss [Accessed 25 Aug. 2019]. 29 Kotsogiannis, C. (2008). Mergers and Acquisitions: Benefits For Acquiring and Target Firms. SSRN Electronic Journal. 30 Kumar, S. and Bansal, L. (2008), "The impact of mergers and acquisitions on corporate performance India", Management Decision, Vol. 46 No. 10, pp. 1531-1543. https://doi.org/10.1108/00251740810920029 31 Laiho, T. (2011). Agency theory and ownership structure-Estimating the effect of ownership structure on firm performance. Retrieved from: http://epub.lib.aalto.fi/en/ethesis/pdf/12497/hse_ethesis_12497.pdf 32 Leepsa, N. M. & Mishra, C. (2012). Post Merger Financial Performance: A Study with Reference to Select Manufacturing Companies in India. International Research Journal of Finance and Economics. 83. 33 Mailanyi, P. (2014). Effect of Merger and Acquisition on the Financial Performance of Oil Companies in Kenya. Kenya: University of Nairobi. 34 Marete, D.(2015). The relationship between firm size and financial leverage of firms listed at Nairobi securities exchange. The Degree of Master of Business Administration, School of Business, Universıty of Nairobi. Kenya. Retrieved from: https://pdfs.semanticscholar.org/3ce4/86dfe4a5f87629e05a31d776239892ab0321.pdf 35 Namazi, M., & Namazi, N. (2016). Conceptual Analysis of Moderator and Mediator Variables in Business Research. Procedia Economics And Finance, 36, 540-554. doi: 10.1016/s2212-5671(16)30064-8 36 Odalo, S., Achoki, G. and Njuguna, A. (2016). Relating Company Size and Financial Performance in Agricultural Firms Listed in the Nairobi Securities Exchange in Kenya. International Journal of Economics and Finance, 8(9), p.34. 37 Ooghe, H., Van Laere, E., & De Langhe, T. (2006). Are acquisitions worthwhile? An empirical study of the post- acquisition performance of privately held Belgian companies. Small Business Economics, 27, 223-243valuation. Journal of Accounting and Public Policy, 25, 409–434. 38 Rahmawati, A., Moeljadi, M., Djumahir, D. and Sumiati, S. (2018). How Do Agency Theory, Stewardship Theory and Intellectual Capital as a Solution for Agency Conflict?. Journal of Management Research, 10(2), p.94. 39 Renneboog, L. and Vansteenkiste, C. (2019). Failure and success in mergers and acquisitions. Journal of Corporate Finance, 58, pp.650-699. 40 Shah, Burhan Ali and Khan, Niaz, Impacts of Mergers and Acquisitions on Acquirer Banks’ Performance, Australasian Accounting, Business and Finance Journal, 11(3), 2017, 30-54. doi:10.14453/aabfj.v11i3.4 41 Shergill, G. and Sarkaria, M. (1999). Impact of Industry Type and Firm Characteristics on Firm-level Financial Performance— Evidence from Indian Industry. The Journal of Entrepreneurship, 8(1), pp.25-44. 42 The Post-Merger Performance: Evidence From Italy. (2012). Chinese Business Review, 11(11). 43 Vekariya, D. (2011). Impact Of Pre-Merger And Post Merger On Financial Performance (With Reference To Private Sector Banks). Indian Journal of Applied Research, 1(5), pp.6-8. 44 Zhang, W., Wang, K., Li, L., Chen, Y. and Wang, X. (2018). The impact of firms' mergers and acquisitions on their performance in emerging economies. Technological Forecasting and Social Change, 135, pp.208-216. 45 Ţiţan, A. (2015). The Efficient Market Hypothesis: Review of Specialized Literature and Empirical Research. Procedia Economics and Finance, 32, pp.442-449. Authors: Rajesh Maharudra Patil

Paper Title: Design and Development of Safety Features in Stationary & Mobile Robots in the Industrial Sector Abstract: In this survey article, a short audit of the well-being highlights in the field of mechanical autonomies, i.e., with respect to the world of robotics is introduced alongside some structural ideas.

Keyword: Robot, Safety, Design, Speed, Barricades References: 1. Craig J, Introduction to Robotics : Mechanics, Dynamics & Control, Addison Wessely, USA, 1986. 2. Robert, J. Schilling, Fundamentals of Robotics - Analysis and Control, PHI, New Delhi. 3. Klafter, Thomas and Negin, Robotic Engineering, PHI, New Delhi. 4. Fu, Gonzalez and Lee, Robotics: Control, Sensing, Vision and Intelligence, McGraw Hill. 5. Groover, Weiss, Nagel and Odrey, Industrial Robotics, McGraw Hill. 6. Ranky, P. G., C. Y. Ho, Robot Modeling, Control & Applications, IFS Publishers, Springer, UK. 7. Crane, Joseph Duffy, Kinematic Analysis of Robotic Manipulators, Cambridge Press, UK. 8. Manjunath, T.C., (2005), Fundamentals of Robotics, Fourth edn., Nandu Publishers, Mumbai. 9. Manjunath, T.C., (2005), Fast Track to Robotics, Second edn., Nandu Publishers, Mumbai. 10. William Burns and Janet Evans, (2000), Practical Robotics - Systems, Interfacing, Applications, Reston Publishing Co. 11. http://www.wikipedia.org 12. Michael Dipperstein, Run Length Encoding (RLE) Discussion and Implementation. 13. Flusser, J.; Suk, T.; Saic, S., Recognition of blurred images by the method of moments, Image Processing, IEEE Transactions. 14. Bob Bailey, Moments in Image Processing, Nov. 2002. 15. Phillip Coiffette, (1995), Robotics Series, Volume I to VIII, Kogan Page, London, UK. 16. William Burns and Janet Evans, (2000), Practical Robotics - Systems, Interfacing, Applications, Reston Publishing Co. 17. Yoshikawa T., (1984), “Analysis and Control of Robot Manipulators with Redundancy”, Proc. First Int. Symp. on Robotics Research, Cambridge, MIT Press, pp. 735-748. 18. Whitney DE., (1972), “The Mathematics of Coordinated Control of Prosthetic Arms and Manipulators”, Trans. ASM J. Dynamic Systems, Measurements and Control, Vol. 122, pp. 303-309. 68. 19. Lovass Nagy V, R.J. Schilling, (1987), “Control of Kinematically Redundant Robots Using {1}-inverses”, IEEE Trans. Syst. Man, Cybernetics, Vol. SMC-17 (No. 4), pp. 644-649. 20. Lovass Nagy V., R J Miller and D L Powers, (1978), “An Introduction to the Application of the Simplest Matrix-Generalized 425-431 Inverse in Systems Science”, IEEE Trans. Circuits and Systems, Vol. CAS-25 (No. 9), pp. 776. 21. [1] World Robotics – Industrial Robots: Statistics, Market Analysis, Forecasts, Case Studies and Profitability of Robot Investment, International Federation of Robotics, Frankfurt am Main, 2011. 22. ISO/TC 184/SC 2 “Robots and robotic devices”; working group WG3 “Industrial safety” is one of five active working groups in this subcommittee. See committee web site: 23. http://www.iso.org/iso/iso_technical_committee.html?commid=54138 24. ISO 10218 “Robots and robotic devices – Safety requirements for industrial robots”, with parts 1 (“Robots”) and 2 (“Robot systems and integration”), ISO Copyright Office, Geneva, 2011. 25. M. Hägele, W. Schaaf, and E. Helms, “Robot assistants at manual workplaces: Effective co-operation and safety aspects,” In: International Symposium on 26. Robotics ISR 2002 / CD-ROM: Proceedings. October 7-11, 2002, Stockholm, Sweden. Stockholm, 2002. 27. A. De Santis, B. Siciliano, A. De Luca, and A. Bicchi, “Atlas of physical human-robot interaction,” Mechanism and Machine Theory, Vol. 43, No. 3, March 2008, p. 253-270. 28. J. Krüger, T. K. Lien, and A. Verl, “Cooperation of human and machines in assembly lines,” in: CIRP Annals Manufacturing Technology. 58 (2009), No. 2, pp. 628-646. 29. R. D. Schraft, M. Hägele, and A. Breckweg, “Man and robot without separating systems,” In: World of Automation and Metalworking. Frankfurt/M.: VDMA Verlag, 2006, p. 4-5. 30. ISO/TS 15066 “Robots and robotic devices – Industrial safety requirements – Collaborative industrial robots”; ongoing standardization project in draft stage and not publicly available at this time. 31. S. Haddadin, A. Albu-Schäffer, and G. Hirzinger, “Soft-Tissue Injury in Robotics,” IEEE / Robotics and Automation Society, 2010 IEEE International Conference on Robotics and Automation, Anchorage, Alaska USA, 2010, on DOI - 10.1109/ROBOT.2010.5509854, p. 3426-3433. 32. O. Ogorodnikova, “How Safe the Human-Robot Coexistence Is? Theoretical Presentation,” Acta Polytechnica Hungarica, Vol. 6, No.4, p. 51-74 (2009). 33. S. Oberer, R. D. Schraft, “Robot-dummy crash tests for robot safety assessment,” IEEE / Robotics and Automation Society: 2007 IEEE International Conference on Robotics and Automation, Rome, Italy, 2007, p. 2934-2939. 34. BG/BGIA Risk Assessment Recommendations according to Machinery Directive – Design of Workplaces with Collaborative Robots, Ed. BGIA – Institute for Occupational Safety and Health of the 35. German Social Accident Insurance, U 001/2009e October 2009 edition, revised February 2011. 69. Authors: R. P. Ram Kumar, Sanjeeva Polepaka, Lazarus S F, Dasari Vamsi Krishna

Paper Title: An Insight on Machine Learning Algorithms and its Applications

Abstract: Machine Learning (ML) furnishes the ability of insights on automatic recognizing patterns and 432-436 determining the prediction models for the structured and unstructured data even in the absence of explicit programming instructions. Today, the impact of Artificial Intelligence (AI) has grown up to several heights, ranging from Life sciences to the Management techniques. The integration of ML led to reduce or eliminate the errors in the prediction, classification and simulation models. The objective of the paper is to represent the ML objectives, explore the various ML techniques and algorithms with its applications in the various fields.

Keyword: Machine learning, Supervised learning, Unsupervised learning, Semi-supervised learning, Reinforcement learning, References: 1. A Tour of The Most Popular Machine Learning Algorithms, https://machinelearningmastery.com/a-tour-of-machine-learning- algorithms/ 2. Supervised Learning, http://whatis.techtarget.com/definition/supervised-learning 3. Supervised V Unsupervised Machine Learning -- What's The Difference?, https://www.forbes.com/sites/bernardmarr/2017/03/16/ supervised-v-unsupervised-machine-learning-whats-the-difference/#66901d12485d 4. Peter Dayan, "Unsupervised Learning", The MIT Encyclopedia of the Cognitive Sciences, Wilson, RA & Keil, F, Editors, pp. 1- 7, 1999. 5. Top 10 Machine Learning Algorithms, https://www.dezyre.com/article/top-10-machine-learning-algorithms/202 6. Understanding Semi-supervised Learning, https://medium.com/@jrodthoughts/underst anding-semi-supervised-learning- a6437c070c87 7. Xin-She Yang, Su Fong Chien, and Tiew On Ting, “Computational Intelligence and Metaheuristic Algorithms with Applications”, The Scientific World Journal, Vol. 2014, pp. 1-4, 2014. 8. Introduction to Natural Language Processing (NLP): What is NLP?, https://blog.algorithmia .com/ introduction-natural-language- processing-nlp/ 9. What are some interesting possible applications of machine learning? https://www.quora.com/What-are-some-interesting- possible-applications-of-machine-learning 10. What are some real-world examples of applications of machine learning in the field? https://www.quora.com/What-are-some- real-world-examples-of-applications-of-machine-learning-in-the-field 11. The Top 10 AI And Machine Learning Use Cases Everyone Should Know About, https://www.forbes.com/sites/bernardmarr/2016/09/30/what-are-the-top-10-use-cases-for-machine-learning-and-ai/ 12. Bo Pang, Lillian Lee, Shivakumar Vaithyanathan, “Thumbs up? Sentiment Classification using Machine Learning Techniques”, Association for Computational Linguistics, Proceedings of the 2002 Conference on Empirical Methods in Natural Language Processing (EMNLP 2002), pp. 79-86, 2002. 13. Chaudhar , S. Kolhe, Rajkamal, “Machine Learning Techniques for Mobile Devices: A Review”, International Journal of Engineering Research and Applications, Vol. 3, Issue 6, pp.913-917, Nov-Dec 2013. 14. Introduction to Data Mining and Machine Learning Techniques- Iza Moise, Evangelos Pournaras, Dirk Helbing, Lecture Notes, 2018. 15. Anish Talwar, Yogesh Kumar, “Machine Learning: An artificial intelligence methodology”, International Journal Of Engineering And Computer Science, Vol. 2, No. 12, pp. 3400-3404, Dec.2013. 16. Gartner, Preparing and Architecting for Machine Learning, Technical Professional Advice, Analyst(s): Carlton E. Sapp, 2017, https://www.gartner.com/binaries/content /assets/events/keywords/catalyst/catus8/preparing_and_architecting_for_machine_ learn ing.pdf 17. Machine Learning: What it is and Why it Matters, https://www.simplilearn.com/what-is-machine-learning-and-why-it-matters- article 18. Jason Brownlee, Master Machine Learning Algorithms: Discover how they work and implement them from Scratch, 2016, http:// MachineLearningMastery.com 19. Gavin H.: Mastering Machine Learning with scikit-learn, Packt Publishing, (2014) 20. Swamynathan, M.: Mastering Machine Learning with Python in Six Steps: A Practical Implementation Guide to Predictive Data Analytics Using Python, Apress (2017) 21. Muller, A.: Introduction to Machine Learning with Python: A Guide for Data Scientists, Shroff O'Reilly, 1st edition (2016) 22. Data Types in Statistics, https://towardsdatascience.com/data-types-in-statistics-347e152e8bee 23. Supervised vs. Unsupervised Learning, https://towardsdatascience.com/supervised-vs-unsupervised-learning-14f68e32ea8d 70. Authors: D.Muruganandam, J.Jayapriya, B.Ramesh, S.Suraj

Paper Title: Forming Interrogation of Rolling Process using Rollers

Abstract: In this article to be created three dimensional model of reinforced plastic using finite element 437-441 analysis (FEA) to simulated slab rolling between rollers by wide thickness in work piece is analyzed. The behaviour of materials while rolling roller at the time of pass, finite element deform3d program employed and developed 3D model of the heat developed rolling process. The influences of different process parameters namely speed of the roller, thickness of the slab, thickness reduction & heat transfer coefficient are taken an account. The stress, strain & strain rate, the temperature distribution in the roll and the slab, are developed throughout a steady-state analysis of the process involved. From the simulation process, the machining possibilities are obtained

Keyword: 3D model, finite element analysis (FEA) References: 1. A. R. Shahani, Saeed Setayeshi, S. A. Nodamaie, M. A. Asadi, 2009, Journal of materials processing technology, Prediction of influence parameters on the hot rolling process using finite element method and neural network, Vol. 209, Issue. 4, pp. 1920- 1935. 2. Chunhui Luo, Ulf Ståhlberg, 2001, Journal of Materials Processing Technology, Deformation of inclusions during hot rolling of steels, Vol. 114, issue. 1, pp. 87-97. 3. Z. Y Jiang, A. K Tieu, 2001, Journal of Materials Processing Technology, A simulation of three-dimensional metal rolling processes by rigid-plastic finite element method, Vol. 112, Issue. 1, pp. 144-151. 4. Zone-Ching Lin, Chi-Chih Shen, 2001, Journal of Materials Processing Technology , A coupled finite element method for a three-dimensional analysis of the flat rolling of aluminum with different reductions, Vol. 110, Issue. 1, pp. 10-18. 5. Shangwu Xiong, Xianghua Liu, Wang Guodong, Zhang Qiang, 2000, Journal of Materials Processing Technology , Three- dimensional finite element simulation of the vertical-horizontal rolling process in the width reduction of slab, Vol. 101, Issue. 1, pp. 146-151. 6. Minting Wang, Xuetong Li, Fengshan Du, Yangzeng Zheng, 2004, Materials Science and Engineering: A, Hot deformation of austenite and prediction of microstructure evolution of cross-wedge rolling, Vol. 379, Issue. 1-2, pp. 133-140. 7. Cheng-Gang Sun, Jong-Seog Lee, Jung-Hyeung Lee, Sang-Moo Hwang, 2005, ISIJ International, Mechanism of Edge Seam Defects of Stainless Steel Generated during Hot Plate Rolling, Vol. 46, Issue. 1, pp. 93-99. 71. Authors: Roland Getaruelas Competencies, Skills and Training Needs of Hospitality Firm Employees in Oman towards Paper Title: Promotion: An Inquiry Abstract: The aim of this study is to find out the necessary competencies, skills and trainings that 442-447 hospitality employees must have in order for them to accelerate in advance into key position. This is to measure the capabilities of the employee on how they should perform and what are the expected output when they are promoted in to middle post. It is empirical that when you hold a middle position you must be equipped by couple of skills and upgrade it from time to time by attending trainings and seminars, so that the knowledge and information are attune and innovative. Findings revealed in this study that trainings and development, attitude, education as well as previous working experience in the same industry were all rated as important, it can make an individual to be more qualified, competent and effective to hold position in the hospitality industry.

Keyword: Leader, Competency, Skills, Managerial Position, Training needs, key Position, Hospitality Industry. References: 1. Boyatzis, R. (1982). The Competent Manager: A Model for Effective Performance. New York: John Wiley & Sons. 2. Bueno, C. and Tubbs, S. (2004). Identifying Global Leadership Competencies: An Exploratory Study. Journal of American Academy of Business, 5(12), pp. 80-87. 3. Carretta, A. (1992). Career and Succession Planning. In Mitrani, A., Dalziel, M., and Fitt, D. Competency Based Human Resource Management. HayGroup, 1992. 4. Christine Adhiambo Odhiambo. “Social Media as a Tool of Marketing and Creating Brand Awareness: Case Study Research”. A thesis presented to Department of Business Administration, Vaasan Ammattikorkeakoulu University of Applied Sciences. Vaasa, Finland, 2012. 5. Dubrin, A. Leadership: Research Findings, Practice, and Skills, Published:Cengage Learning, Inc. Florence, USA, 2016. 6. Georgios Tsimonis Sergios Dimitriadis. “Brand strategies in social media", Marketing Intelligence & Planning, Vol. 32 Issue 3, 2014, pp. 328 – 344 7. Gould-Williams, J. “The Importance of HR Practices and Workplace Trust in Achieving Superior Performance: A Study of Public-Sector Organizations”. International Journal of Human Resource Management, 2003, pp. 28-54. 8. H B Tritama and R E Tarigan. “The Effect of Social Media to the Brand Awareness of a Product of a Company”, CommIT Journal, vol. 10, no. 1, 2016, pp. 9–14. 9. Icha Oyza, Agwu M. Edwin, “Effectiveness of Social Media Networks as a Strategic Tool for Organizational Marketing Management”. J Internet Bank Commerce S2:006, 2015. 10. Jacob, Ronal L. Structured On-The-Job Training. Berrett-Koehler Publishers, 2003. 11. Kay, C., & Moncarz, I. “Knowledge, skills, and abilities for lodging management success”. Cornell Hotel and Restaurant Administration Quarterly, vol. 45 no. 3, 2004, pp. 285-298. Retrieved September 2004 from ProQuest database. 12. Leech, N., Barrett, K., & Morgan, G. SPSS for intermediate statistics: Use and interpretation, 2nd edition. Mahwah, New Jersey: Lawrence Erlbaum Associates Publishers, 2005. 13. Liaman, A. (2014). Competencies and Qualification of Staff and Management in Hospitality Establishment: Dissertation, Institute of Hospitality Management in Prague. 14. Manoj Timilsina. Impacts of Social Media Restaurant business: A case Study Based on Oulu Region, 2017. https://www.theseus.fi/bitstream/handle/10024/128861/Timilsina_Manoj. 15. McCourt, W. & Derek, E. Global Human Resource Management: Managing People in Developing and Transitional Countries. Cheltenham, UK: Edward Elgar, 2003. 16. Mohammad Reza Nemat Gorgani. “The Impact of Social Network Media on Brand Equity in SMEs”. European Journal of Sustainable Development, vo. 5, no. 3, 2016, pp. 239-244. 17. Nian Chen (2014), Effect of Competency at Work on Job Satisfaction and Organizational Commitment in the Restaurant Industry, Researchgate, : https://www.researchgate.net/publication/313401141, 18. Quinn, P., Faerman, S., Thompson, M., & McGrath, M. Becoming a master manager: A competency framework, (3 rd. ed.). Hoboken, NJ: John Wiley and Sons Inc, 2003. 19. Rao, T.V. Human Resource Development – Concept and Background, Human Resources Development: Experiences, Interventions and Strategies, New Delhi: Sage Publications, 2000. 20. 19) Rodrigues, L. L. R., & Chincholkar, A. M. “Benchmarking the HR Practices of an Engineering Institute with Public Sector Industry for Performance Enhancement”. International Journal of Training and Development, vol. 9:1, 2005, pp. 6-20. 21. Orser, B. Management competencies and SME performance criteria: A pilot study. Industry Canada, 2003. Retrieved September 22, 2004 from http://strategis.ic.gc.ca/epic/internet/insbrprppe.nsf/en/rd00854e.html. 22. Miranda, Pablo. (1999). The Level of Technical Skills and Management Competency Demanded by the Hospitality Industry as Perceived by Hospitality Recruiters. Dissertation, University of Wisconsin_Stout. 23. Paquette, Holly. “Social Media as a Marketing Tool: A Literature Review”, Major Papers by Master of Science Students. Paper 2, 2012. http://digitalcommons.uri.edu/tmd_major_papers/2. 24. Purcell Kate, (1993), Equal opportunities in the hospitality: custom and credentials, International Journal of Hospitality Management, Vol. 12, (2). 25. Roxanne Debono. “The effectiveness of Social Media Marketing as a Branding tool for hoteliers”. A thesis presented to Institute for Tourism, Travel & Culture.University of Malta, Msida, Malta, 2013. 26. Sandwith, P. “A hierarchy of management training requirements: The competency domain model”. Public Personnel Management, vol. 22 no. 1, 1993, pp. 43-62. Retrieved March 2006 from EBSCO database. Tas, R. (1983). Competencies important for hotel manager trainees. University Microfilms International, (8414189). 27. Shalaka Ayarekar. “Impact and Effectiveness of Social Media Advertising on Young Working Women’s Buying Behaviour With Reference to Consumer Electronics” - A Study of Selected Cities in Maharashtra and Gujarat. A dissertation presented to Department of Business Management, D. Y. PATIL UNIVERSITY, Mumbai, India. 28. Stein, Joshua.”The Relationship Between Social Media Use and Consumer Brand Engagement”, Journal of Undergraduate Research at Minnesota State University, Mankato: Vol. 12, Article 11, 2012. 29. Thoene, Whitney Sue. “The Impact of Social Networking Sites on College Students' Consumption Patterns”, Theses, Dissertations and Capstones. Paper 245, 2012. 30. Tina Vukasovič. “Building successful Brand by Using Social Networking Media”. Journal of Media and Communication Studies. Vol. 5 no. 6, 2013, pp. 56-63, July, 2013. 31. United Nations Industrial Development Organization. (2002). UNIDO Competencies. http://www.unido.org. 32. Weil, A., &Woodall, J. “HRD in France: the corporate perspective”. Journal of European Industrial Training, vol. 29, no. 7, 2005, pp. 529–540. 33. Wessels, W., (2017). Key competencies and characteristics of accommodation managers. SA Journal of Human Resource Management, 15, 1-11. doi: https://doi.org/10.4102/sajhrm.v15i0.887. 34. Woodruffe, C. What is Meant by Competency? In: Sparrow, P.R., Boam, R., Eds. Designing and Achieving Competency. McGraw-Hill International.UK, 1992. Authors: K. Saravananathan, T. Velmurugan

Paper Title: Quality Based Analysis of Clustering Algorithms using Diabetes Data for the Prediction of Disease Abstract: Clustering is the popular fundamental investigative performance analysis technique commonly used in various applications. The majority of the clustering techniques proved their effectiveness in finding lot of solutions for a variety of datasets. With the aim of test its performance and its clustering qualities are easy to implement by partition based clustering algorithms. The clustering algorithms k-Means and k-Medoids are used to analyze the diabetic datasets and to predict the diseases in this research work. Around 15000 diabetic patient’s consequential final bio-chemistry prescription are taken for the diabetes identification. With number of times executed the run time of the algorithms are compared from the different clusters. Based on their performance the first-rate algorithm in each class was found out.. The best suitable algorithm is suggested for the prediction of diabetes data in this work.

Keyword: Cluster analysis, k-Means clustering, Diabetes Data analysis, , k-Medoids clustering. References: 1. S. Deelers, and S. Auwatanamongkol, “Enhancing k-Means Algorithm with Initial Cluster Centers Derived from Data Partitioning along the Data Axis with the Highest Variance”, International Journal of Physical and Mathematical Sciences, Vol. 1 (11), 2007, pp. 518 – 523. 2. P.Padmaja, Srikanth Vikkurty, NiloferInaz Siddiqui, Praveen Dasari, Bikkina Ambica, V.B.V.E. Venkata Rao, Mastan Vali Shaik, and V.J.P. Raju Rudraraju, “Characteristic Evaluation Of Diabetes Data Using Clustering Techniques”, International Journal of Computer Science and Network Security, Vol.8 (11),2008, pp. 244 – 251. 3. T. Velmurugan and T. Santhanam, “Computational Complexity between k-Means and k-Medoids Clustering Algorithms for 72. Normal and Uniform Distributions of Data Points”, Journal of Computer Science, Vol. 6 (3), 2010, pp. 363 – 368. 4. T. Velmurugan and T. Santhanam, “A Survey of Partition based Clustering Algorithms in Data Mining: An Experimental Approach”, Information Technology Journal, Vol. 10 (3), 2011, pp. 478 – 484. 448-452 5. Dr. T. Velmurugan, “Performance Comparison between k-Means and Fuzzy C-Means Algorithms using Arbitrary Data Points”, Wulfenia Journal, Vol. 19 (8), 2012, pp. 234 – 241. 6. Mahendra Tiwari and Randhir Singh, “Comparative Investigation of k-Means and k-Medoid Algorithm on Iris Data”, International Journal of Engineering Research and Development, Vol. 4 (8), 2012, pp. 69 – 72. 7. M. Kothainayaki and P. Thangaraj, “Clustering and Classifying Diabetic Data Sets Using k-Means Algorithm”, Journal of Applied Information Science, Vol. 1 (1), 2013, pp. 23 – 27. 8. Abhishek Patel and Purnima Singh, “New Approach for k-Means and k-Medoids Algorithm”, International Journal of Computer Applications Technology and Research, Vol. 2 (1), 2013, pp. 1 – 5. 9. Sheshasayee A, Sharmila P., “Comparative study of Fuzzy C-Means and k-Means algorithm for requirements cluster¬ing”, Indian Journal of Science and Technology, Vol. 7 (6), 2014, pp. 853–857. 10. Dr. T. Karthikeyan and K. Vembandadsamy, “An Analytical Study on Early Diagnosis and Classification of Diabetes Mellitus”, International Journal of Computer Application, Vol. 5 (5), 2015, pp. 96 – 104. 11. R. Nithya, P. Manikandan, Dr. D. Ramyachitra, “Analysis of clustering technique for the diabetes dataset using the training set parameter”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4 (9), 2015, pp. 166 – 169. 12. Preeti Arora, Dr. Deepali, and Shipra Varshney, “Analysis of k-Means and k-Medoids Algorithm for Big Data”, International Conference on Information Security & Privacy, 2015, pp. 507 – 512. 13. Abdullah M. Iliyasu, Chastine Fatichah, Khaled A. Abuhasel, “Evidence Accumulation Clustering with Possibilitic Fuzzy C- Means base clustering approach to disease diagnosis”, Automatika, Vol. 57 (1), 2016, pp. 822 – 835. 14. Usha G Biradar and Deepa S Mugali, “Clustering Algorithms on Diabetes Data: Comparative Case Study”, International Journal of Advanced Research in Computer Science, Vol. 8 (5), 2017, pp, 550-552. 15. Divya Sharma, Anand Sharma, and Vibhakar Mansotra, “A Literature Survey on Data Mining Techniques to Predict Lifestyle Diseases”, International Journal for Research in Applied Science & Engineering Technology, Vol. 5 (4), 2017, pp. 1575 – 1581. 16. Kalpit, G. Soni, and Dr. Atul Patel, “Comparative Analysis of k-Means and k-Medoids Algorithm on IRIS Data”, International Journal of Computational Intelligence Research, Vol. 13 (5), 2017, pp. 899-906. 73. Authors: T.Sita Ramaiah, N.Akbar Jan, Radha Mohan Chebolu, Thangaraja Arumugam, A.K. Subramani

Paper Title: Corporate Governance and Firm Performance in India: An Empirical Research

Abstract: The point of the exploration is to look at the relationship among corporate administration and 453-460 firm execution. In this examination study board information of S&P BSE-100 listed organizations from 2011- 2018 and LSDV board information model, 2SLS model are utilized as instruments for investigation of the information. Where Market to Book worth and Tobin Q are taken as the needy variable while size of the board, freedom with the board; compensation given for the board, advertiser shareholding are considered as autonomous factors. The result of the examination uncovers that great corporate administration practices actualized by organizations are decidedly identified with money related execution. The finding of the examination uncovers that littler sheets are probably going to be progressively proficient in observing execution (Fuerst and Kang 2000; Loderer and Peyer 2002). The present examination affirms that there is a negative relationship among board freedom and execution of the firm and higher level of outside executives negatively affect firm execution (Yermack, 1996; Klein, 1998). Keyword: Corporate Governance, Firm Performance, Board Independence, Panel data analysis References: 1. Aghion, P., Caroli, E. and Garcia-Penalosa, C. (1999) ‘Inequality and economic growth: the perspective of the new growth theories’, Journal of Economic Literature, Vol. 37, No. 4, pp.1615–1660. 2. Aggarwal, Reena and Erel, Isil and Stulz, Rene M. and Williamson, Rohan G. (2007) ‘Do U.S. Firms Have the Best Corporate Governance? A Cross-Country Examination of the Relation between Corporate Governance and Shareholder Wealth’, Fisher College of Business Working Paper No. 2006-03-006; ECGI - Finance Working Paper No. 145/2007; Charles A. Dice Center Working Paper No. 2006-25. 3. Anderson, R.C. and Reeb, D.M. (2003). ‘Founding-Family Ownership and Firm Performance: Evidence from the S&P 500’, Journal of Finance, Vol. 58, pp.1301–1328. 4. Balezentis, A. and Balkiene, K. (2014) ‘Innovation policy measurement: analysis of Lithuania’s case’, Economic Research- Ekonomska Istraživanja, Vol. 27, No. 1, 1–14. 5. Bekiris, F.V. (2013). ‘Ownership structure and board structure: are corporate governance mechanisms interrelated?’, Corporate Governance: The international journal of business in society, Vol. 13, No. 4, pp. 352-364. 6. Claessens, S. (2006). Corporate governance and development. The World bank research observer, Vol. 21, No. 1, pp. 91-122. 7. Davis, J.H., Schoorman, F.D., and Donaldson, L. (1997) ‘Toward a Stewardship Theory of Management’ The Academy of Management Review, Vol. 22, No. (1), pp.20- 47. 8. Davidson, W.N. (2003) ‘Agency cost, ownership structure and corporate governance mechanisms’, Journal of Banking and Finance, Vol. 27, pp.793-816. Authors: Sadu Venkata Naresh, P. V. Naganjaneyulu, P. Nageswara Rao

Paper Title: Linear and Non-Linear Companding Transformation Reducing PAPR in OFDM Signals Abstract: An important disadvantage of Orthogonal Frequency Division Multiplexing (OFDM) signals is high peak-to-average power ratio (PAPR), causing genuine debasement popular execution when a nonlinear power amplifier (PA) is utilized. A notable technique to diminish power ratio deprived of confinements on framework parameters is Companding Transform (CT), for example, the sum of subcarriers, outline organization, and gathering type. Another nonlinear companding change, the utilization of hyperbolic transfer sigmoid function capacity is proposed for PAPR decrease in this paper. The proposed methodology extends the little flag and packs the pinnacle flag in the time zone at the same time without changing the average power. Results dependent on MATLAB demonstrate that the proposed methodology increases additional pinnacle decrease and improves the BER (bit error ratio)execution.

Keyword: Companding transform(CT), non-linear, hyperbolic tangent sigmoid transfer function, OFDM, 74. peak-to-average power ratio(PAPR). References: 1 S. Muller, R. Bauml, R. Fischer, and J. Huber, “OFDM with reduced height-to-common power ratio via multiple sign 461-463 representation”, Annals of Telecommunications, vol. Fifty three, pp. Fifty eight–67, February 1997. 2 L. J. Cimini Jr. And N. R. Sollenberger, “Peak-to-common electricity ratio reduction of an OFDM sign the use of partial transmit sequences”, IEEE Commun. Lett., vol. 4, no. Three, pp. 86–88, March 2000. 3 L. Wang and Y. Cao, “Improved SLM for PAPR Reduction in OFDM Systems”, International Workshop on Intelligent Systems and Applications, pp. 1-four, May 2009. 4 J.Armstrong,“Peak-to-averagereductionforOFDMbyrepeatedclip- ping and frequency domain filtering,” IEE Electron. Lett., vol. 38,pp. 246–247, May2002. 5 X. Li and L. J. Cimini, Jr., “Effects of clipping and filtering at the in keeping with- formance of OFDM,” IEEE Commun. Lett., vol. 2, no. Five, pp. 131–133, May 1998. 6 X. Wang et al., “Reduction of top-to-average strength ratio of OFDM system the usage of a companding method,” IEEE Trans. Broadcast., vol. Forty five, no. Three, pp. 303–307, Sep. 1999. 7 S. A. Aburakhia, E. F. Badran, and D. A. E. Mohamed, “A assessment between signal clipping and -law companding schemes for the re- duction of peak-to-average strength ratio of OFDM indicators,” in Proc. 1st Int. Conf. On Digital Commun. & Computer Applications DCCA2007, Irbid, Jordan, Mar. 2007, pp. 423–431. 8 S. C. Thompson, J. G. Proakis, and J. R. Zeidler, “The effectiveness of signal clipping for PAPR and total degradation reduction in OFDM systems,” in Proc. Of the IEEE Global Telecommun. Conf., St. Louis, Dec. 2005, vol. Five, pp. 2807–2811. 75. Authors: Awari Mahesh Babu

Paper Title: Finding Clog Models for the Urban Traffic Blocking & Assessment of Corridors

Abstract: Urban travel blockage is one of the serious issues which are affecting travelling time. This 464-467 impact is on economical ability of transportable, non-element of condition, psychosomatic stresses and a movement irregularity on movement. There is a need to indentify clog models for the remarkable impact boil down in peak hour gridlock. The blockage standards can be followed the characteristic located on street with hustle. The clog is created with the overhead conveyed with inconsistent factors and show the way to the fate. These aspects are revealed that they are because of impact of certain trademark impact from elements of land use, street symmetrical, and commute and street organize attributes. This research is encircled on with the staggered distressing variables. GPS information, GIS support tactic is proposed in the assessment for information and a clog model is related to discover clog factors. The current paper compacts with the deliberate the blockage criterions, and clog produced factors for the Dilsukhnagar zone (Gaddianaram region) Hyderabad, Telangana State, INDIA using Principal Component Analysis (PCA) and regression analysis.

Keyword: Clog model; traffic; PCA; land use; blockage; aGIS and aGPS. References: 1. Dr Awari Mahesh Babu, Study of Metropolitan Transportation in Major Cities in India Advances in Computational Sciences and Technology ISSN 0973-6107 Vol 10, No 4 (2017) 2. Chu, N. H., & Nguyen, V. D. (2018). The Multi-Response Optimization of Machining Parameters in the Ultrasonic Assisted Deep-Hole Drilling Using Grey-Based Taguchi Method. Int. J. Mech. Prod. Eng. Res. Dev, 8, 417-426. 3. Jolliffe I.T, “Principala Component analysisa”, second edition 4. Jonathon Shlens, “A Tutoriala on PCA”, Center for Neural Science, New York University, CA 5. Taufik, A., Okamoto, S., & Lee, J. H. (2015). Multi-Rotor Drone to Fly Autonomously along a River Using a Single-Lens Camera and Image Processing. International Journal of Mechanical Engineering, 4(6), 39-49. 6. Ack Malczeski, 1998, “GIS and Multi-criteria assessment study”, Edition 1. 7. Zabbar, M. A. B., & Ahmed, C. N. (2016). Design & Implementation of an Unmanned Ground Vehicle (UGV) Surveillance Robot. International Journal of Electrical and Electronics Engineering (IJEEE), 5(6), 2278-9944. 8. Bruno Santos, 24-02-2009, “A aMulti-objective Approacha to Long-term Inter urban Multi-levela Road ”, Journal of Transportation Engineering. 9. DAS, S. P., Bhatt, D., & Path, S. (2017). Transformation Of Urban Transportation-Strategic Perspective A Case Of Uber Technologies, Inc. International, Journal of Research in Business Management, 5(3), 69-78. 10. Albert John Mallinckrodta, 8-8 2009 ,“VCI, a regional volume/cim of urban congestiona”, ASCE journal of Transportation Engineering, 11. Tanveer, S. (2016). Application of Graph Theory in Representing and Modelling Traffic Control Problems. International Journal of Mathematics and Computer Applications Research (IJMCAR) ISSN (P), 2249-6955. 12. A.Garib, A.E.Radwan and H.Al-Deek,” Estimatinga magnitudea and Duration of indent delays ”.SCE 76. Authors: Pankaj S. Ardak, Atul B. Borade To Examine the Effect of Inventory Dependent Demand and Time Dependent Holding Cost on Paper Title: Inventory Abstract: Inventory models are effectively used as control tool in most of the inventory control tools. The 468-471 current study deals with the inventory production model for non momentary deteriorating items. To developed the mathematical model holding cost is considered as time and demand dependent. The items does not start to deteriorate as soon as it enters into the stock. During stock buildup time demand is assumed to be inventory dependent. Optimum solution has been find out by using differential calculus. Results indicate that total inventory has a major influence of inventory consumption parameter.

Keyword: EPQ, holding cost , Inventory and time dependent consumption rate. References: 1. Ardak P. S. Borade A. B.( 2017), ‘An EPQ Model with time dependent holding cost and varying deterioration rate’,International Journal of Mechanical Engineering and Technology, Volume 8, Issue 8,August 2017, pp 958-966 2. Ardak P.S. Borade A.B., Reneta S.B.(2017), ‘An EPQ Model For Deteriorating Items with mix demand pattern’, International Journal of Mechanical Engineering and Technology, Volume 8, Issue 6, June 2017, pp. 59–69 . 3. Ardak P. S., Borade A.B, ‘An EPQ Model with Varying Rate of Deterioration and Mixed Demand Pattern.’, International Journal of Mechanical and Production Engineering Research and Development,Vol. 7, Issue 5, Dec 2017, 423-432 4. DEEPA, N., INDUMATHI, V., & BALAJI, P. INVENTORY MANAGEMENT PRACTICES FOLLOWED IN COCONUT OIL MILLS IN WESTERN TAMIL NADU. 5. Jinn ,T.T., Liang,Y. O., Mei, C. C., (2005) A EOQ model for deteriorating items with power form stock dependent demand, Information and Management science, 16, Number 1 pp 1-16. 6. Behrouz ,A. N., Babak, A. EPQ model with depreciation cost and process quality cost as continuous functions of time. International Journal of Industrial Engineering 5, (8) , 77-89,2009. 7. DavidW. Pentico, Matthew J. Drake, Carl Toews, The deterministic EPQ with partial backordering:Anewapproach, International journal of Management Sciences, Omega 37 ,624 – 636,2009. 8. Ravichandran, N. A Study On Inventory Management With Reference To Leading Automobile Industry. International Journal of Management, Information Technology and Engineering, 15. 9. Rosenblatt, M., and Lee,H.L., (1986),Economic Production Cycles with Imperfect Production Processes , IJE Transaction,.pp 48- 55. 10. Jinn,T. T., Liang, Y.O., Chun,T.C., (2005) , Deterministic economic production quantity models with time varying demand and cost, Applied Mathematical Modeling, 26,pp 987-1003. Elsevier. 11. Chung,H,C.,(2009) , The modified economic manufacturing quantity model for product with quality loss function, Tamkang Journal of Science and Engineering, 12, Number 2,pp 109-112 12. Kaur, M. (2017). Inventory and Working Capital Management: An Empirical Analysis of Indian Textile Companies. IMPACT: International Journal of Research in Business Management (IMPACT: IJRBM) ISSN (P), 2347-4572. 13. Yuanshyi,P.C., (2003), Determining the optimal lot size for the finite production model with random defective rate, the rework process and backlogging, Engineering Optimization, 35, Number 4, pp 427-437.Taylor & Francis. 14. Mishra, S.S., Singh, P.K.,(2011) , A Computational approach to EOQ model with power form stock dependent demand and cubic deterioration, American journal of operation research, 1,Number1,pp 5-13. 15. Shetty, P. K., & Kamath, R. C. (2018). A study of inventory management at manufacturing Industries in rural india. International Journal of Mechanical and Production Engineering Research and Development, 9(1), 73-80. 16. Nita, H.S., Amisha,R.P.,(2011) , Integrated inventory models with two level credit policy and a price negotiation scenario for price sensitive stock dependent demand, International journal of industrial engineering computations, 2, pp 657-670. Growing Science. 17. Gede, A. W., Hui, M. W. Production Inventory Models for Deteriorating Items with Stochastic Machine Unavailability Time, Lost Sales and Price Dependent Demand.” Jurnal Teknik Industri, 12, (2), 61-68,2010. 18. Khedlekar,U.K., A disruption production model with exponential demand”. International Journal of Industrial Engineering Computations ,3 , 607–616,2012. 19. Thakkar, B., & Parikh, P. AN INVENTORY ON DIVERSITY AND DISTRIBUTION PATTERN OF HYMENOPTERAN INSECTS IN GUJARAT, INDIA. 20. Kuo,L.H. An EPQ model with set up cost and process quality as function of capital expenditure”. Applied Mathematical Modelling,31,10 -17,2007. 21. Jui-Jung Liao, Kuo-Nan Huang, Deterministic inventory model for deteriorating items with trade credit financing and capacity constraints, Computers & Industrial Engineering, vol. 59, pp. 611-618, 2010. 22. YASSA, R. I., & IKATRINASARI, Z. F. DETERMINATION OF MULTI-ITEM INVENTORY MODEL WITH LIMITATIONS OF WAREHOUSE CAPACITY AND UNIT DISCOUNT IN LEADING GARMENT INDUSTRY IN INDONESIA. 23. Yu-Chung Tsao, Managing multi-echelon multi-item channels with trade allowances under credit period, Int. J. Production Economics, vol. 127, pp. 226-237, 2010. 24. Jie, M., Yong, W.Z., Gui, Q.L., Sheng, D.W. An EPQ model for deteriorating items with inventory level dependent demand and permissible delay in payments”. International Journal of Systems Science, 43(6), 1039-1053,2012 Authors: Ch.Baby Rani, J. Venkata Brahman, K. Sharath Babu Computational Solution of Two- Point Boundary Value Problem by Quadrature method in terms Paper Title: of Liouville-Green Transformation Abstract: In this research paper we are selected a two-pointedge value problem ofsingular perturbation with Dirichlet type of margin conditions. The selected differential equation is transformedinto to the required form by using a Liouville –Green transformation. Then the computational process has been implemented for solving thetwo-pointborder line value problem ofsingular perturbation with either right or left end frontier layer in the specific interval [0,1]. The transformation reduces the mathematical complexity with some assumptions and applied numerical integration method to get the computations for different choices of the perturbation parameter,which is very near to zero. In the present research problem, we have observed the uniform convergence in the computational solution in the regular region and some chaotic behavior near the periphery layer region. We are implemented this method for several linear differential equations and observed that the numerically obtained resultsare validated with literature.

Keyword: Singular Perturbation, Perturbation parameter, Quadrature,state line narrowregion, Liouville-Green Transform, numerical solution.

77. References: 1. Prandtl, L., U ber fl u ssigkeit-bewegungbeiKleinerReibung, Verh. III. Int. Math Kongresses, Tuebner, Leipzig, 1905, 484-491 2. Usmonov, B. O. T. I. R., Rakhimov, Q., & Akhmedov, A. (2018). Analysis of numerical solutions of a hereditary deformable system. International Journal of Mechanical and Production Engineering Research and Development 8, 403-408. 472-475 3. A. M. Il’in (1969), ‘A difference scheme for a differential equation with a Small Parameter multiplying the highest derivative’, Mat. Zametki6,237– 248. 4. Rasheed, W., Ahmed, S., & Ghyadh, N. (2016). Investigation Potential Flow About Curved Wing Using Panel Method. International Journal of Mechanical and Production Engineering Research and Development (IJMPERD) ISSN (P), 2249-6890. 5. L.E. El’sgol’ts, S.B. Norkin, Introduction to the Theory and Application of Differential Equations with deviating Arguments, Academic Press, New York, 1973. 6. Bhar, S. (2015). Encryption Key Generation by Using Modified Hand-Geometry Based Cryptosystem to Secure SMS in Android. 7. C.M. Bender, S.A.Orszag, Advanced Mathematical Methods for Scientists and Engineers, McGraw-Hill, New York, 1978. 8. Aboodh, K. S., Farah, R. A., Almardy, I. A., & Osman, A. K. (2018). Solving delay differential equations by Aboodh transformation method. International Journal of Applied Mathematics & Statistical Sciences, 7(2), 55-64. 9. R.E.O’Malley, Introduction to Singular Perturbations, Academic Press, New York, 1974. Soliman, M. A., Abdel-All, N. H., Hussein, R. A., & El-Nini, W. M. (2016). Generalized Algorithm to the Extraction of Height Ridges in Riemannian Geometry. Int. J. Manage. Infor. Technol. Eng, 4(2), 23-36. 10. P.W. Hemker, J.J.H Miller (Eds), Numerical Analysis of Singular Perturbation Problems, Academic Press, New York, 1979. 11. J. Kevorkian, J.D. Cole, Perturbation Methods in Applied Mathematics, Springer, New York, 1981. 12. Nurdin, W. B., & Juarlin, E. (2018). Application of Eular Method to Complete Differential Equation in Magnetic Medicine Simulation. 13. A. H. Nayfeh, Problems in Perturbation, Wiley, New York, 1985. 14. Sethi, R. K., & GOEL, A. (2015). Dispersion Compensation in Optical Communication Systems by employing 16-QAM Modulation using OFDM. IMPACT: International Journal of Research in Engineering & Technology, 3(2), 47-64. 15. R.E.O’Malley, Singular Perturbation Methods for Ordinary Differential Equations, Springer, New York, 1991. 78. Authors: Sanjeev Ratna Singh BJP Vs Opposition Parties on Twitter: Social Media Strategies for Political Mobilisation During Paper Title: 2018 Karnataka and Telangana Assembly Elections Abstract: BJP’s 2014 Lok Sabha win under Narendra Modi was a watershed moment for politicians and 476-484 social media users alike as it would change the very nature of political dissemination and its consumption. The extensive use of platforms like Twitter, Facebook etc. is reported to have played a crucial role in shaping the minds of first-time voters in favour of BJP. The post-2014 scenario in the country witnessed all main political parties embracing social media and gave it equal importance as compared to traditional tools of communication like newspapers, radio and TV. Twitter has now become one of the favourite tools of politicians for disseminating and interacting with social media users and creating a favourable impression among new and young voters. Though BJP is still the biggest political force on social media in India, the change in digital strategies of other political parties like Congress and Rahul Gandhi also reflected in their rising Twitter engagement levels since 2017. Congress and other regional parties had to rework their strategy and take on BJP’s aggressive political campaigns on digital platforms. The study is aimed to document how some regional parties and prominent leaders in south India transformed themselves as an attractive voting proposition among the electorate during the 2018 assembly elections. This paper analyses comparative Twitter data of BJP, Congress, their top state leadership in Karnataka and Telangana along with leaders of regional parties like HD Kumaraswamy of the Janata Dal (Secular) and KT Rama Rao of the Telangana Rashtriya Samithi (TRS) during the 2018 Karnataka and Telangana assembly elections. It also includes an exhaustive analysis of official Twitter handles of Prime Minister Narendra Modi and Congress leader Rahul Gandhi on metrics like number of tweets, likes, replies with overall volume and engagement during the election campaigns. The paper aims to present a new understanding of how Twitter is being used as a tool for communication by political parties. Keyword: Twitter, political communication, data mining, Congress, BJP, Telangana Rashtriya Samithi. References: 1. IANS, ‘Narendra Modi as 'youth icon': BJP taps into social media to drum up support’, 05.08.2013, India Today, https://www.indiatoday.in/india/north/story/narendra-modi-as-youth-icon-bjp-taps-into-social-media-172828-2013-08-05 2. Sanjeev Ratna Singh, 'NARENDRA MODI VS RAHUL GANDHI ON TWITTER: A COMPARISON OF SOCIAL MEDIA STRATEGIES FOR POLITICAL MOBILISATION (2017-19)', Volume - 10, issue – 5 May 2019, International Research Journal of Management Sociology & Humanities. 3. Ravi Sharma, ‘Karanataka goes through a political upheaval as the Janata Dal (Secular) faction led by party supremo H.D. Deve Gowda's son H.D. Kumaraswamy withdraws support to the coalition government and partners with the Bharatiya Janata Party to form an alternative government.’ Volume 23 - Issue 02, Jan. 28 - Feb. 10, 2006, The Frontline, https://frontline.thehindu.com/static/html/fl2302/stories/20060210005502100.htm 4. M Gautham Machaiah, ‘Karnataka polls 2018: Kannadiga pride set to be pivotal factor in outcome’, 31.03.2018, Moneycontrol.com, https://www.moneycontrol.com/news/politics/karnataka-polls-2018-kannadiga-pride-set-to-be-pivotal-factor- in-outcome-2540063.html 5. Yunus Y. Lasania, ‘Telangana CM KCR dissolves assembly, to go for early elections’, 06.09.2018, LiveMint, https://www.livemint.com/Politics/ve5G5jKFF0Hg4vAe4d43BM/Citing-political-fragility-KCR-dissolves-Telangana- assembly.html 6. Ch. Sushil Rao, ‘TRS gets social media troops battle-ready’, 08.07.2018, , https://timesofindia.indiatimes.com/ city/hyderabad/trs-gets-social-media-troops-battle-ready/articleshow/64903953.cms 7. PTI, ‘India has the cheapest mobile data in world: Study’, 06.03.2019, The Economic Times, https://economictimes.indiatimes.com/tech/internet/india-has-the-cheapest-mobile-data-in-world-study/articleshow/ 68285820.cms?from=mdr 8. Nandita Mathur, ‘India's internet base crosses 500 million mark, driven by Rural India’, 11.03.2019, Live Mint, https://www.livemint.com/industry/telecom/internet-users-exceed-500-million-rural-india-driving-growth-report- 1552300847307.html 9. J. Clement, ‘Leading countries based on number of Twitter users as of July 2019 (in millions)’, 09.08.2019, Statista.com, https:// www.statista.com/statistics/242606/number-of-active-twitter-users-in-selected-countries/ 10. PTI, ‘Congress gets lesser seats in Karnataka though vote share nearly 2 percentage points higher than BJP’, 15.05.2018, The Economic Times, https://economictimes.indiatimes.com/news/politics-and-nation/congress-gets-lesser-seats-in-karnataka-though- vote-share-nearly-2-percentage-points-higher-than-bjp/articleshow/64180347.cms?from=mdr 79. Authors: Purna Prasad Sharma, Shad Ahmad Khan, Prabha Thoudam Financial Inclusion, Awareness, and Understanding of Financial Products among People Selected Paper Title: Gewogs (Blocks) of Bhutan Abstract: The financial products that are being offered by the banks in the contemporary era are significant 485-494 to enhance the primary objective of the banks that is, ‘Financial Inclusion’ (FI). However, due to umpteen reasons, the banks in many countries have failed streamlining the poor and the majority of the rural folk. Bhutan is not an exception as it is in a landlocked country. The Survey finding (2013) depicted a smaller share of Bhutanese involvement in the formal financial system (48%) whereas larger percentage of them involved in informal financial system. Further, the present Governor of Royal Monetary Authority (The central bank of the country), Dasho Penjor in his discussion on the review of His Majesty’s address on 109th National day Celebration in Trongsa stated that the majority of the rural folks are unable to avail banking services extended by the formal institutions. Besides, financial services can be availed by mass only when banks and other financial institutions run some awareness programmes. There are a few literature on FI in Bhutan in general; however literature on the awareness and understanding of financial products of the people are minimal in the country. The present study, therefore, investigates the scenario of FI along with awareness and understanding of financial products of commercial banks among Bhutanese in four Gewogs (Blocks) of the country that is, Bongo, Chapcha, Darla and Samphelling. The structured questionnaire was designed and primary data from 378 respondents were collected. Further, various articles and papers published in survey findings, magazines, and journal articles are used as secondary data sources of the study. The collected data have been tabulated, analysed, and interpreted with the help of Descriptive statistics, Independent t-test and Analyses of Variance (ANOVA).

Keyword: Financial inclusion, financial products, awareness, understanding Bhutan. References: 1. Agarwal, P. & Garg, S. (2014). Financial inclusion in India–a review of initiatives and achievements. Journal of Business and Management (IOSR-JBM), 16. 2. Ahmad, A., Kashif-ur-Rehman, Iqbal, S. & Safwan, N. (2010). An empirical investigation of Islamic banking in Pakistan based on perception of service quality. African Journal of Business Management, 4(6), 1185-1193. 3. Beck, T., Levine, R., & Levkov, A. (2007a). Bank regulation and income distribution: Evidence from branch deregulation. Brown University and the Watson Institute for International Studies. 4. Beck, T., Levine, R., & Levkov, A. (2007b). Big bad banks? The impact of US branch deregulation on income distribution (No. w13299). National Bureau of Economic Research. 5. Dang, N. & Kumar, P. (2013). Current situation of financial inclusion in India and its future visions. International Journal of Management and Social Sciences Research, 2(8), 155. Retrieved from http://www.irjcjournals.org/ijmssr/Aug2013/23.pdf. 6. Divya, K. (2013). A study on impact of financial inclusion with reference to daily wage earner: Journal of Business Management and Social Science Research. 2 (6), 85-92. 7. Dorji, T. (2017). Access to credit was found to be disproportionate among dzongkhags. Kuensel, Retrieved from http://www.kuenselonline.com/central-bank-calls-for- enhanced-financial-inclusion/. 8. Dusuki, A.W.& Abdullah, N.I.(2007).Why do Malaysian customers patronise Islamic banks?”, International Journal of Bank Marketing. 25 (3), 142-160. 9. Eze, U.C., Santhapparaj, A.J. & Arumugam, K. (2011). Customers perception on Islamic retail banking: a comparative analysis between the urban and rural regions of Malaysia. International Journal of Business and Managemen.6 (1), 187-198. 10. Fada, K.A. & Wabekwa, B. (2012). People’s perception towards Islamic banking: a field work study in Gombe local government area, Nigeria. International Journal of Business, Humanities and Technology. 2 (7), 121-131. 11. Guntupalli, P. S. (2016). Exploring the impacts of Pradhan Mantri Jan-Dhan Yojana- PMJDY in urban areas, w.r.t. Mumbai . IOSR Journal of Economics and Finance (IOSR-JEF), 82-86. 12. Haque, A. (2004). Mobile commerce: customer perception and it’s prospect on business operation in Malaysia. The Journal of American Academy of Business, Cambridge, 257-262. 13. Haron, S., Ahmad, N. & Planisek, S.L. (1994). Bank patronage factors of Muslim and non-Muslim customers. International Journal of Bank Marketing, 12 (1), 32-40. 14. Ismail, H.B., Fateh, M. & Panni, A. K. (2008). Consumer perceptions on the consumerism issues and its influence on their purchasing behaviour: a view from Malaysian food industry. Journal of Legal, Ethical and Regulatory Issues, 11(1), 43-64. 15. Ivatury, G. (2006). Mobile phones for microfinance. World Bank, Washington, DC. https://openknowledge.worldbank.org/handle/10986/9621. 16. Kaur, H. & Singh, K.N. (2015). Pradhan Mantri Jan Dhan Yojana (PMJDY): A leap towards financial inclusion in India, International Journal of Emerging Research in Management and Technology.4(1), 25-29. 17. Khattak, N. A., Rehman, K. U. (2010). Customer satisfaction and awareness of Islamic banking system in Pakistan. African Journal of Business Management 4(5), 662-671. 18. Krejcie, R.V., & Morgan, D.W. (1970). Determining Sample Size for Research Activities. Educational and Psychological Measurement, 30, 607-610 19. Kumar, N. (2013). Financial inclusion and its determinants: evidence from India. Journal of Financial Economic Policy, 5(1), 4- 19. 20. Lateh, N., Ismail, S. & Ariffin, N. M. (2009). Customers’ perceptions on the objectives, characteristics and selection critercia of Islamic bank in Thailand. Gadjah Mada International Journal of Business, 11(2), 167-189. 21. Manzoor, A.K. & Amanaullah (2010), Consumer perception of Islamic banking in Pakistan. Labuan Bulletin of International Business & Finance.8, ISSN 1675-7262. Retrieved from www.myjurnal.my/public/issue-view.php?id4127&journal_id366. 22. Naser, K., Jamal, A. & Al-Khatib, L. (1999). Islamic banking: a study of customer satisfaction and preferences in Jordan. International Journal of Bank Marketing, 17 (3), 135-150. 23. Okumus, H. S. (2005). Interest-free banking in Turkey: a study of customer satisfaction and bank selection criteria. Journal of Economic Cooperation 26 (4), 51-86. 24. Patnaik, Satpathy & Supkar. (2015) Pradhan Mantri Jan Dhan Yojana-A new direction for mainstreaming the financially excluded, International Journal of Management, 6(2) 31-42. 25. Pavithran, K.B., & Raihanath, M.P.(2014). Role of commercial banks in the financial inclusion programme. Journal of business management & social sciences research (JBM&SSR). 3 (5). 26. Ramdhony, D. (2013). Islamic banking awareness attitudes and bank selection criteria. International Journal of Humanities and Applied Sciences (IJHAS), s. 29-35. 27. Rashid, M., Hassan, M. K. & Ahmad, A.U.F. (2012). Quality perception of the customers towards domestic Islamic banks in Bangladesh”, Journal of Islamic Economics, Banking and Finance. 5 (1), 109-131. 28. Rogers, E.M. (2003). Diffusion of Innovation., 5th ed., The Free Press, New York, NY. 29. Sarma, M. & Pais, J. (2011). Financial inclusion and development. Journal of international development, 23(5), 613-628. 30. Selvaraj. (2011). A study on customers' awareness and level of satisfaction with special reference to SBI of Erode district of Tamil Nadu”, JMIJMM, 1(2), 1-7. 31. Singh & Tandon. (2012). Financial inclusion in India- An analysis. International journal of marketing, financial services and management research, 1 (6), 41-54. 32. Waihenya, H. (2012). The effect of agent banking on financial inclusion in Kenya. (Unpublished Master‘s project). Kenya: University of Nairobi. Authors: Bibhu Prasad Sahoo, Karman Kaur

Paper Title: Nationalized Banks and Long Term Lending Behaviour to Agriculture Sector in India Abstract: Finance is needed by the agricultural sector for both production and consumption. Hence, finance in agriculture is as important as other inputs being used in agricultural sector . Here the attempt has been made to to examine the lending to the agriculture sector in long run with respect to nationalized banks. Secondary data has been used from various reports and descriptive statistics have been used.

Keyword: Finance, Agriculture, Nationalized banks, Statistics. 80. References: 1. Giechler T (1998) ,Investment and funding land scape, rural and agricultural finance, Deutsche gesells chaft for international zusammenarbeit Gmbh. 495-499 2. Golait Ramesh (2007) current issues in agriculture credit in India, Occasional paper,vol28,no-1,pp79-98. 3. Hartarska valentine & Nadolnyak Denis (2015) Agricultural credit and economic growth in rural areas, Agricultural finance review, vol75,pp-302-312. 4. Ram kumar R (2013) ,Bank credit to agriculture in India: Trends in the 1990 and 2000, The Marxist,XXIX3. 5. Mishra Ajit kumar & Mohapatra Upasana (2017) ,Agricultural finance in India-An over view, International journal of engineering sciences and research technology, pp-411-417 6. Mohan R(2004) Agriculturre credit in India: status, issues and future agenda, Economic and political weekly, pp-1013-1021. 7. Reddy suba (2005) ,Agricultural finance and management,Oxford & IBH publishing company private Ltd .New Delhi. 8. Shkodra Jehona(2018) Impact of agricultural finance in rural area- case study Kosov, Bulgarian journal of agricultural science. Pp-737-741. 9. Yadav sunil singh (2018) source of agricultural credit in Indian agricultural credits, Shodh Drisht ,Vol.8,No3,pp-161-166. 81. Authors: Namita Swain, Ajay Jain Impact of Public Intervention on Poor in Odisha: Special Focus on Pradhan Mantri Jan-Dhan Paper Title: Yojana Abstract: The establishment of Regional Rural Banks, cooperative societies, primary agricultural societies 500-504 and introduction of priority sector credit guidelines are some of the state led initiatives which predominantly played an important role to develop a better scenario for the upliftment of the poor and weaker people in the country associated with agricultural sector and other allied sectors. But over the years it has been suggested in various literatures that the core aim of this type of financial inclusion may not be able to uplift the livelihood of the poor to an appreciable extent. This present paper evaluates the effects of PMJDY (nation-wide financial inclusion scheme) in the state of Odisha, and the results are being normalized for four different district the detail of which is mentioned in the below given matter. Study is based on primary data and the number of samples is 200 i.e. 50 from each district. The results are evaluated using one way ANOVA.

Keyword: Financial Inclusion, PMJDY, Odisha. References: 1. Mr.S. I. Malligar and Mr. B. Bankapur (2016) “Performance of Pradhan Mantri Jan-Dhan Yojana”, Indian Journal of Applied Research January, 2016. 2. Guha, Santana (2015) “The role of Pradhan Mantri Jan Dhan Yojana in Financial Inclusion- An Evaluative Study”, GJRA-Global Journal for Research Analysis July, 2015. 3. Hussain, Ahmed (2015) “Pradhan Mantri Jan Dhan Yojana: The most intensive Financial Inclusion scheme in India, International Journal of Core Engineering and Management (IJCEM). 4. Bhatia, S., & Singh, S. (2015). FINANCIAL INCLUSION – A PATH TO SUSTAINABLE GROWTH. International Journal of Science Technology & Management , 388-397. 5. Dasgupta, A., & Anklesaria, E. (2015). Pradhan Mantri Jan Dhan Yojana. KPMG report. 6. Patel, A. (2015). Pradhan Mantri Jan DhanYojana : Need for a Strategic Action Plan . Pacific Business Review International , 110-112. 7. Verma, y. (2016). Pradhan Mantri Jan Dhan Yojana (PMJDY): A Step towards Eradicating Financial Untouchability. Indian Journal of Finance. 8. Mr.S. I. Malligar and Mr. B. Bankapur (2016) “Performance of Pradhan Mantri Jan-Dhan Yojana”, Indian Journal of Applied Research January, 2016. 9. Harpreet Kaur and Kawal Nain Singh (2015) “Pradhan Mantri Jan Dhan Yojana (PMJDY): A Leap towards Financial Inclusion in India”, International Journal of Emerging Research in management and Technology. 10. Mr.S. I. Malligar and Mr. B. Bankapur (2016) “Performance of Pradhan Mantri Jan-Dhan Yojana”, Indian Journal of Applied Research January, 2016. 11. Harpreet Kaur and Kawal Nain Singh (2015) “Pradhan Mantri Jan Dhan Yojana (PMJDY): A Leap towards Financial Inclusion in India”, International Journal of Emerging Research in management and Technology. 12. Rajanikanta Khuntia (2014) “Pradhan Mantri Jan Dhan Yojana (PMJDY): A New Drive towards Financial Inclusion in India”, International Journal of Business Economics and Management Research. 13. Mr. Santana Guha (2015) “The role of Pradhan Mantri Jan Dhan Yojana in Financial Inclusion- An Evaluative Study”, GJRA- Global Journal for Research Analysis July, 2015. 14. Ahmed Hussain (2015) “Pradhan Mantri Jan Dhan Yojana: The most intensive Financial Inclusion scheme in India, International Journal of Core Engineering and Management (IJCEM). 15. Shri Lakshmi and D. Mamatha and Dr. Ponniah V. M. (2014) “A study on Pradhan Mantri Jan Dhan Yojana-with reference to Nationalized bank (Bank of Baroda)”, SAMZODHANA- Journal of Management Research. 16. Dr. Vinit Kumar, and Dolly Singh (2015) “PMJDY: A Conceptual Analysis and Inclusive Financing”, International Journal of Innovative Social Science and Humanities Research. 17. Hardeepika Singh Ahluwalia, Kulbir Kaur Bhatti,(2016) Financial Inclusion: A Comparative Study of Initiatives Taken by Indian Government Pre and Post 1991, The International Journal Of Business & Management (ISSN 2321–8916), Vol 4 Issue 6. 18. Harpreet Kaur &Kawal Nain Singh (2015), "Pradhan Mantri Jan DhanYojana (PMJDY): A Leap towards Financial Inclusion in India", International Journal of Emerging Research in Management &Technology, Vol. 4 (1), pp. 25-29. 19. John d. Villasenor, Darrell m. West, and Robin j. Lewis (2015) ,“Financial and digital inclusion : measuring progress on digital access and usage”, The Brooking Report 20. Poonam, Archna Chaudhry,(2016) Financial Inclusion in India: A State Level Study, SSRG International Journal of Economics and Management Studies (SSRG-IJEMS) – volume3 issue3, pp 67-68. 21. Suresh A, Dr. M. Srinivasa Narayana, Dr. P. Vijay Kumar, (2016) A Study on Financial Inclusion Initiatives and Challenges in India With Reference to PMJDY, IRA-International Journal of Management & Social Sciences ISSN 2455-2267; Vol.03, Issue 03. 22. Dr. P. Sugunalakshmi and A. Rathina Maheswari, (2016), Consumer Durable Industry in India – Present Trend, Challenges and Future Prospects. International Journal of Management, 7(2), 2016, pp. 449-453. 23. Monica Gupta and Dr. Kavita Aggarwal, (2016), Prospects of Small Scale Industry In Punjab. International Journal of Management, 7(7), 2016, pp. 226–231. 82. Authors: Mitu Mandal, Rajesh Kumar Shastri

Paper Title: Transforming Classroom Learning through Artificial Intelligence

Abstract: Artificial Intelligence (AI) is designing machines which can act like human beings. The machines 505-508 are designed in such a way that can perform all functions which a human being can perform. The machines are characterized by all cognitive and affective functions possessed by human beings. AI finds extensive application in diverse fields and education is not an exception. With the rapid advancement of Information and Communication Technology (ICT), AI based tools can be adopted in education system. The present paper explores and explicates the application of AI based tools in education particularly focusing on teaching, learning, pedagogy and learning assessment.

Keyword: Artificial Intelligence, Pedagogy, Learning, Teaching, Data Mining. References: 1. Friedman,,T. L. (2005). The world is flat: A brief history of the twenty-first century. New York: Farrar, Straus and Giroux. 2. Feldman,J., Monteserin,A., Amandi, A. (2014). Detecting students’ perception style by using games Computers & Education 71 (2014) 14–22. 3. Kolekar, S., Sanjeevi, S., & Bormane, D. (Dec 2010). Learning style recognition using artificial neural network for adaptive user interface in e-learning. In Computational intelligence and computing research (ICCIC), 2010 IEEE International conference on (pp. 1–5). 4. Villaverde, J., Godoy, D., & Amandi, A. (2006). Learning styles’ recognition in e-learning environments with feed-forward neural networks. Journal of Computer Assisted Learning, 22(3), 197–206. 5. García, P., Amandi, A., Schiaffino, S. N., & Campo, M. R. (2007). Evaluating Bayesian networks’ precision for detecting students’ learning styles. Computers & Education, 49(3),794–808. 6. García, P., Schiaffino, S. N., & Amandi, A. (2008). An enhanced Bayesian model to detect students learning styles in web-based courses. Journal of Computer Assisted Learning, 24(4), 305–315. 7. Cha, H. J., Kim, Y. S., Park, S. H., Yoon, T. B., Jung, Y. M., & Lee, J. H. (2006, June). Learning styles diagnosis based on user interface behaviors for the customization of learning interfaces in an intelligent tutoring system. In International Conference on Intelligent Tutoring Systems (pp. 513-524). Springer, Berlin, Heidelberg.. 8. Crockett, K., Latham, A., Mclean, D., Bandar, Z., & O’Shea, J. (2011). On predicting learning styles in conversational intelligent tutoring systems using fuzzy classification trees. In IEEE International conference on fuzzy systems (pp. 2481–2488). 9. Özpolat, E., & Akar, G. B. (2009). Automatic detection of learning styles for an e-learning system. Computers & Education, 53(2), 355–367. 10. Chang, Y.-C., Kao, W.-Y., Chu, C.-P., & Chiu, C.-H. (2009). A learning style classification mechanism for e-learning. Computers & Education, 53(2), 273–285. 11. Yannibelli, V., Godoy, D., & Amandi, A. (2006). A genetic algorithm approach to recognise students’ learning styles. Interactive Learning Environments, 14(1), 55–78 12. Graf, S., & Kinshuk. (2010). Using cognitive traits for improving the detection of learning styles. In Proceedings of the 2010 Workshops on database and expert systems applications. DEXA ’10 (pp. 74–78). Washington, DC, USA: IEEE Computer Society. 13. Graf, S., Kinshuk, & Liu, T.-C. (2009). Supporting teachers in identifying students’ learning styles in learning management systems: an automatic student modelling approach. Educational Technology and Society, 12(4), 3–14. 14. Kolb, D. A., Boyatzis, R. E., & Mainemelis, C. (2001). Experiential learning theory: Previous research and new directions. Perspectives on thinking, learning, and cognitive styles, 1(8), 227-247 15. Tobias, S., Fletcher, J. D., & Wind, A. P. (2014). Game-based learning. In In Handbook of research on educational communications and technology (pp. 485–503). New York: Springer 16. Sitzmann, T. (2011). A Meta-analytic examination of the instructional effectiveness of computer-based simulation games. Personnel Psychology, 64(2), 489–528 17. Timms, M.J. (2016). Letting Artificial Intelligence in Education Out of the Box: Educational Cobots and Smart Classrooms. International Journal Artificial Intelligence Education 26:701–712. 18. Green, S.A, Billinghurst, M., Chen X.C. and Chase, J.G. (2008). Human-Robot Collaboration: A Literature Review and Augmented Reality Approach in Design. International Journal of Advanced Robotic Systems, Vol. 5, No. 1 ISSN 1729-806, pp. 1–18. 19. Krach, S., Hegel, F., Wrede, B., Sagerer, G., Binkofski, F., and Kircher, T. (2008). Can Machines Think? Interaction and Perspective Taking with Robots investigated via fMRI. PloS ONE 3 (7), 2579. 20. Kiesler, S., Powers, A., Fussell, S.R., and Torrey, C. (2008). Anthropomorphic interactions with a robot and robot-like agent. Social Cognition, Vol. 26, No. 2, 2008, pp. 169–181. 21. Oshima, J., Oshima, R., & Miyake, N. (2012). Collaborative reading Comprehension with communication robots as learning partners. International conference of the learning sciences, July 2012, Sydney, Australia. Volume 2. Short Papers. 22. Kennedy, J., Baxter, P., and Belpaeme, T. (2015). Comparing robot embodiments in a guided discovery learning interaction with children. International Journal of Social Robotics, 7(2), 293–308. 23. Oshima, J., Oshima, R., & Miyake, N. (2012). Collaborative reading Comprehension with communication robots as learning partners. International conference of the learning sciences, July 2012, Sydney, Australia. Volume 2. Short Papers 24. Heffernan, N. T. & Heffernan, C. L. (2014). The ASSISTments ecosystem: Building a platform that brings scientists and teachers together for minimally invasive research on human learning and teaching. International Journal of Artificial Intelligence in Education, 24(4), 470–497 25. Kotsiantis,S., Pierrakeas,C. and Pintelas, P. (2004). Predicting students’ performance in distance learning using machine learning techniques. Applied Artificial Intelligence, 18:411. 26. Borkar, S., & Rajeswari, K. (2013). Predicting Students Academic Performance Using Education Data Mining. International Journal of Computer Science and Mobile Computing. Vol. 2, Issue. 7, July 2013, pg.273 – 279. 83. Authors: M.J.Abinash, V. Vasudevan

Paper Title: Energy Efficient Resource Allocation using Improved BSP Technique in Cloud Environment

Abstract: Cloud computing allows the user to access their resources from data center. The energy consumed 509-511 by each resources will leads to low performance in the data center. The existing work deals with heuristic resource allocation which concentrates only on bottleneck resources. This research work proposes BSP algorithm to allocate the data center resources efficiently in terms of dynamic information and energy consumption. BSP is a placement technique which provides high quality placement for resources based on optimization process. The agent provide authentication to each user to ensure the privacy of the system. The overall resource allocation is achieved by BPS technique by performing continuous deployment and ongoing optimization. Continuously deployment is efficiently allocating the resources based on demand risk score. If any virtual machine in the cloud environment is overloaded, the ongoing optimization technique is applied to migrate the resources from overloaded VM to idle VM. The benefit of our improved BSP technique with the comparison of the results of the existing system is shown in performance analysis.

Keyword: Cloud data center, Backward Speculative Placement (BSP), resource allocation, resource prediction. References: 1. N. Bobroff, A. Kochut, and K. Beaty (2007). Dynamic placement of virtual machines for managing sla violations. In Integrated Network Management, ’07. IM ’07. 10th IFIP/IEEE InternationalSymposium on, pages 119–128. 2. D. Breitgand and A. Epstein(2011). Sla-aware placement of multi virtual machine elastic services in compute clouds. In Integrated Network Management (IM), ’11 IFIP/IEEE International Symposium on, pages 161–168. 3. Ming Chen, Hui Zhang, Ya-Yunn Su, Xiaorui Wang, Guofei Jiang, and Kenji Yoshihira(2011). Effective vm sizing in virtualized data centers. In Integrated Network Management, IM’11, pages 594–601. 4. Christopher Clark, Keir Fraser, Steven Hand, Jacob Gorm Hansen, Eric Jul, Christian Limpach, Ian Pratt, and Andrew Warfield (2005). Live migration of virtual machines. In Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation, NSDI’05, pages 273–286, Berkeley, CA, USA. USENIX. 5. Zhenhuan Gong and Xiaohui Gu (2010). Pac: Pattern-driven application consolidation for efficient cloud computing. In Modeling, Analysis Simulation of Computer and Telecommunication Systems (MASCOTS), 2010 IEEE International Symposium on, pages 24–33. 6. D. Jayasinghe, C. Pu, T. Eilam, M. Steinder, I. Whalley, and E. Snible (2011). Improving performance and availability of services hosted on iaas clouds with structural constraint-aware virtual machine placement. In Services Computing (SCC), 2011,IEEE International Conference on, pages 72–79. 7. M. Korupolu, A. Singh, and B. Bamba (2009). Coupled placement in modern data centers. In Parallel Distributed Processing, ’09. IPDPS ’09. International Symposium on, pages 1–12. 8. Wubin Li, Johan Tordsson, and Erik Elmroth(2011). Virtual machine placement for predictable and time-constrained peak load. In In Proceedings of the 8th International Workshop on Economics of Grids, Clouds, Systems, and Services, LNCS. Springer- Verlag. 9. Xiaoqiao Meng, Canturk Isci, Jeffrey Kephart, Li Zhang, Eric Bouillet, and Dimitrios Pendarakis (2010). Efficient resource provisioning in compute clouds via vm multiplexing. In Proceeding of the 7th international conference on Autonomic computing, pages 11–20, New York, NY, USA. 10. Xiaoqiao Meng, V. Pappas, and Li Zhang (2010). Improving the scalability of data center networks with traffic-aware virtual machine placement. In INFOCOM, ’10 Proceedings IEEE, pages 1–9. 11. Saranya.S, Murugan.B.S (2014). Intelligent Scheduling System for Dynamic Resource Allocation in Cloud Computing. In International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014) IJARCST All Rights Reserved 284 Vol. 2 Issue Special 1 Jan-March . Authors: A. Malarvizhi, S. Ravichandran

Paper Title: A Hybrid Clustering Data Mining Technique (HCDMT) for Predicting SLE Abstract: SLE is an auto immune and complex disease. Predicting Systemic Lupus Erythematosus (SLE) is significantly challenging due to its high level of heterogeneity in symptoms. There is a limitation on the tools used for predicting SLE accurately. This paper proposes a machine learning approach to predict the disease from SLE data set and classify patients in whom the disease is active. The data purified and selected for classification improves the accuracy of the proposed method called HCDMT (Hybrid Clustering Data Mining Technique), an amalgamation of CART and k-Means, was evaluated on SLE data. It was found to predict above 95% of SLE cases.

Keyword: SLE, Clustering, Mining, Machine Learning. References: 1. Lugar,P. L., Love, C., Grammer, A. C., Dave, S. S. & Lipsky, P. E. Molecular characterization of circulating plasma cells in patients with systemic lupus erythematosus. PLoS One 7, e44362, https://doi.org/10.1371/journal.pone.0044362 (2012) 2. Karrar, S. & Cunninghame Graham, D. S. Abnormal B-cell development in systemic lupus erythematosus: what the genetics tell us. Arthritis Rheumatol. 70, 496–507 (2018). 3. Vaughn, S. E. et al. Lupus risk variants in the PXK locus alter B-cell receptor internalization. Front. Genet. 5, 450, https://doi.org/ 10.3389/fgene.2014.00450 (2015). 4. Bengtsson, A. A. & Rönnblom, L. Role of interferons in SLE. Best Pract. Res. Clin. Rheumatol. 31, 415–428 (2017). 5. Catalina, M. D., Bachali, P., Geraci, N. S., Grammer, A. C. & Lipsky, P. E. Gene expression analysis delineates the potential roles of multiple interferons in systemic lupus erythematosus. Communications Biology 2(1) (2019). 6. Labonte, A. C. et al. Identification of alterations in macrophage activation associated with disease activity in systemic lupus erythematosus. PLOS ONE 13(12), e0208132 (2018). 7. Hacbarth, E. & Kajdacsy-Balla, A. Low density neutrophils in patients with systemic lupus erythematosus, rheumatoid arthritis, and acute rheumatic fever. Arhritis Rheum. 29, 1334–1342 (1986). 8. Wright,T H.T L.,T Makki,T F.T A.,T Moots,T R.T J.T &T Edwards,T S.T W.T Low-densityT granulocytes:T functionallyT distinct,T immatureT neutrophilsT inT rheumatoidT arthritisT withT alteredT propertiesT andT defectiveT TNFT signaling.T J.T 84. Leukoc.T Biol.T 101,T 599–611T (2017). 9. Scapini,T P.,T Marini,T O.,T Tecchio,T C.T &T Cassatella,T M.T A.T HumanT neutrophilsT inT theT sagaT ofT cellularT heterogeneity:T insightsT andT openT questions.T Immunol.T Rev.T 273,T 48–60T (2016). 512-515 10. Kegerreis,T B.T J.T etT al.T GenomicT IdentificationT ofT Low-DensityT GranulocytesT andT AnalysisT ofT TheirT RoleT inT theT PathogenesisT ofT SystemicT LupusT Erythematosus.T TheT JournalT ofT ImmunologyT 202(11),T 3309–3317T (2019). 11. Villanueva,T E.T etT al.T NettingT neutrophilsT inducedT endothelialT damage,T infiltrateT tissues,T andT exposeT immunostimulatoryT moleculesT inT systemicT lupusT erythematosus.T J.T Immunol.T 187,T 538–552T (2011). 12. Lood,T C.T etT al.T NeutrophilT extracellularT trapsT enrichedT inT oxidizedT mitochondrialT DNAT areT interferogenicT andT contributeT toT lupus-likeT disease.T Nat.T Med.T 22,T 146–153T (2016). 13. Denny,T M.T F.T etT al.T AT distinctT subsetT ofT proinflammatoryT neutrophilsT isolatedT fromT patientsT withT systemicT lupusT erythematosusT inducesT vascularT damageT andT synthesizesT typeT IT IFNs.T J.T Immunol.T 184,T 3284–3297T (2010). 14. Jourde-Chiche,T N.T etT al.T ModularT transcriptionalT repertoireT analysesT identifyT aT bloodT neutrophilT signatureT asT aT candidateT biomarkerT forT lupusT nephritis.T RheumatologyT (Oxford)T 56,T 477–487T (2017). 15. Carlucci,T P.T M.T etT al.T NeutrophilT subsetsT andT theirT geneT signatureT associateT withT vascularT inflammationT andT coronaryT atherosclerosisT inT lupus.T JCIT InsightT 3,T e99276,T https://doi.org/10.1172/jci.insight.99276T (2018). 16. Wolf, B. J. et al. Development of biomarker models to predict outcomes in lupus nephritis. Arthritis Rheum. 68, 1955–1963 (2016). 17. Almlöf, J. C. et al. Novel risk genes for systemic lupus erythematosus predicted by random forest classification. Sci. Rep. 7, 6236, https://doi.org/10.1038/s41598-017-06516-1 (2017). 18. Srinivas, “Novel approach for heart prediction verdict using data mining technique”, International Journal of Computer Science and Engineering. 2010. 19. Vikas chaurasia, Saurab pal, “Early prediction of heart diseases using data mining techniques”, 2013 Vol 1, No 0799-3757 20. Armañanzas, R., Calvo, B., Iñaki, I., López-Hoyos, M., Martínez-Taboada, V., Ucar, E., …& Zubiaga, A. (2009, May 9). Microarray analysis of autoimmune diseases by machine learning procedures. IEEE Transactions on Information Technology in Biomedicine, 13(3), 341-350. 21. Ravenell, R., Kamen, D., Fleury, T. J., Spence, D., Hollis, B. W., Janech, M. G., …& Almeida, J. S. (2012). Premature Atherosclerosis Is Associated With Hypovitaminosis D and Angiotensin-Converting Enzyme Inhibitor Non-use in Lupus Patients. The American Journal of the Medical Sciences, 268-273. 22. http://statweb.stanford.edu/~olshen/ 23. Manimaran R. and Vanitha M, “An Efficient Study on Usage of Data Mining Techniques for Predicting Diabetes”, International Journal of Advanced Research Trends in Engineering and Technology (IJARTET) Vol.3 (20), pp.268-272 ISSN: 2394-3785, 2016. 85. Authors: Vipin Jain, Vivek D. Singh, Khushboo An Experimental Evaluation on the awareness of “Pradhan Mantri Jan Aryogya Yojna - Paper Title: Ayushmaan Bharat” (PMJAY-AB) Scheme among residents of Moradabad, Uttar Pradesh Abstract: Background: One of the most ambitious health insurance programme of the world was launched in 516-534 September 2018 i.e. Pradhan Mantri Jan Arogya Yojana (PMJAY) popularly known as Ayushmaan Bharat. The programme aims to help the 100 million poor families of India to get the benefits of medical services for their health and take the treatment of disease which they cannot afford. This gives a chance to Shri Narendera Modi’s government to transform the health care sector of India. This paper discuss about the awareness of PMJAY-AB programme among the residents of Moradabad, Uttar Pradesh. Material & Methods: It empirical study done on the residents of Moradabad region in Uttar Pradesh by Around 150 samples were collected in which 130 samples were found correct, as they were completely filled and used as a data for analysis. This topic was taken for study to assess people awareness regarding government schemes in health care sector which is associated with hospital and health care management by applying Chi-Square Test, Analysis of Variance (ANOVA) and Pearson’s Correlation Test. The period of study was of 4 months i.e. from February 2019 to May 2019. The cluster convenient sampling method was chosen for the study. For the collection of data the Moradabad was divided into three parts:- 1. MDA- near Vivekanand Hospital, 2. Majhola, Mansarover & Budhi Vihar – near Sai Hospital and 3. Pakbara – near TMU Hospital Results & Conclusion: The study concludes that the demographic factors have some relationship, effect and correlation on PMJAY – AB awareness at Moradabad. These demographic factors gender, age, marital status, religions, education qualification, occupations & income status were tested with resident’s awareness status of PMJAY-AB by conducting descriptive analysis, chi-square test (Relationship), analysis of variance & post hoc (Effect) and correlation (Association). RELATIONSHIP: It is hereby concluded from the results obtained by applying chi-square test (cross tabulation) that except demographic variable Age groups no other variable has a significant relationship with the resident’s awareness of PMJAY - AB at Moradabad. EFFECT: It is hereby concluded from the results obtained by conducting ANOVA that age groups, education level and income-socio- economic level play role in effecting the resident’s awareness regarding PMJAY- AB at Moradabad. It is also concluded that very old people (above 60 yrs) have highest awareness of PMJAY- AB and young generation (20-30 yrs) have the lowest awareness regarding this government scheme. Further residents between age bands 31-60 yrs have moderate awareness in the Moradabad City. When it comes to education level awareness about PMJAY- AB scheme is least among under graduates and there is no difference between the Awareness of PMJAY- AB among graduates and post graduates in Moradabad. Other demographic variable does not have any effect on awareness of this government scheme in Moradabad. ASSOCIATION: It is hereby concluded from the results obtained after applying Pearson_Correlation(r) test that except age groups no other variable (education qualification and income) make any association with awareness level of PMJAY- AB scheme at Moradabad.

Keyword: Pradhan Mantri Jan Arogya Yajna (PMJAY), Ayushmaan Bharat (AB), Health Insurance, Health Care Sector, Universal Health Care (UHC) References: 1. Bhattacharjya, A. S., & Sapra, P. K. (2008). Health insurance in China and India: Segmented roles for public and private financing. Health Affairs. 2. David Mark, D., Radermacher, R., & Koren, R. (2007). Willingness to pay for health insurance among rural and poor persons: Field evidence from seven micro health insurance units in India. Health Policy, 82(1), 12–27. 3. Devadasan, N.,Criel, B., Van Damme, W., Lefevre, P., Manoharan, S., & Van der Stuyft, P. (2011). Community health insurance schemes & patient satisfaction--evidence from India. The Indian Journal of Medical Research, 133, 40–49. 4. Health in India, Social Consumption: Education NSS 71st Round (January2014-June 2014) http://mospi.nic.in/sites/default/files/publication_reports/nss_rep574.pdf 5. Devadasan, N., Criel, B., Van Damme, W.,Manoharan, S., Sarma, P. S., & Van Der Stuyft, P. (2010). Community health insurance in Gudalur, India, increases access to hospital care. Health Policy and Planning, 25(2), 145–154. 6. Devadasan, N., Ranson, K., Damme, W. Van, & Criel, B. (2004). Community Health Insurance in India: An Overview. Economic and Political Weekly, 39(28), 3179–3183. doi:10.2307/4415264 7. Devadasan, N., Ranson, K., Van Damme, W., Acharya, A., & Criel, B. (2006). The landscape of community health insurance in India: An overview based on 10 case studies. Health Policy, 78(2-3), 224–234 8. Ito, S., & Kono, H. (2010). Why is the take-up of micro insurance so low? Evidence from a health insurance scheme in India. Developing Economies, 48(1), 74–101. 86. Authors: Arpana Mahajan, Sanjay Chaudhary

Paper Title: Deep Network for Content and Context Based Image Retrieval System

Abstract: The brisk improvement in sight and sound and imaging advancement, the amounts of pictures 535-538 moved and shared on the web have extended. It prompts to develop the particularly reasonable picture recovery system to satisfy human needs. The substance setting and contain picture recovery structure which recovers the picture subject to the likeness of the huge highlights, for instance, names which are unquestionably not satisfactory to depict the customer's low-level insight for pictures. In this exploration paper lessening this semantic issue of picture recovery is a difficult errand. Presumably the most critical considerations in picture recovery are watchwords, terms or thoughts. Here separated picture highlights from a pre-prepared profound system (RESNET), and utilize that highlights to prepare profound learning classifier. Remaining profound systems make include extraction most effortless and quickest approach to use than some other profound system strategy. In this exploration paper, we portray Image recovery utilizing proposed lingering profound systems.

Keyword: Context, Contain, Image retrieval; Residual; Layers, deep network References: 1. ElAlami, M.E."A new matching strategy for content based image retrieval system." Applied Soft Computing 14 (2014): 407-418. 2. V. Franzoni, A. Milani, S. Pallottelli, C. H. C. Leung and Yuanxi Li, "Context-based image semantic similarity," in proc. IEEE twelveth international conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2015, pp. 1280-1284. 3. Valentina Franzoni, Clement H.C. Leung, Yuanxi Li,Paolo Mengoni and Alfredo Milani,” Set Similarity Measures for Images Based on Collective Knowledge,” in proc. Springer ICCSA,2015,pp.408-417 4. Mohsen Sardari Zarchi, Amirhasan Monadjemi and Kamal Jamshidi, ” A concept- based model for image retrieval systems,” in Elsevier Computers & Electrical Engineering, vol. 46 , pp. 303-313, 2015 5. N. Goel and P. Sehgal, "Weighted semantic fusion of text and content for image retrieval," in proc. IEEE International Conference Advances in Computing, Communications and Informatics (ICACCI), 2013 , pp. 681-687. 6. L. Wu, X. Hua, N. Yu, W. Ma, and S. Li, ‘‘Flickr distance: A relationship measure for visual concepts,’’ in IEEE Trans. Pattern Anal. Mach. Intell., vol. 34, pp. 863– 875, 2012. 7. G. A. Miller, “Wordnet: a lexical database for english”, in ACM Communications of the, 38(11):39–41, 1995. 8. A. Budanitsky and G. Hirst, “Semantic Distance in Wordnet: An Experimental, Application-Oriented Evaluation of Five Measures,” Proc. WordNet and Other Lexical Resources, 2001 9. Oliva and A. Torralba. Modeling the shape of the scene: a holistic representation of the spatial envelope. Int. Journal of Computer Vision., 42, 2001. 10. X. Li, T. Uricchio, L. Ballan, M. Bertini, C. Snoek, and A. Del Bimbo, “Socializing the semantic gap: A comparative survey on image tag assignment, refinement and retrieval,” in ACM Computing Surveys, 2016, in press. 11. Finlayson and Mark Alan “Java Libraries for Accessing the Princeton Wordnet: Comparison and Evaluation” in Proceedings of the 7th International Global WordNet Conference, 2014, pp. 78-85 . 12. Ted Pedersen, WordNet::Similarity.[Online] 13. R. Girshick. Fast R-CNN. In ICCV, 2015. 14. K. He and J. Sun. Convolutional neural networks at constrained time cost. In CVPR, 2015. 15. G. Mont´ufar, R. Pascanu, K. Cho, and Y. Bengio. On the number of linear regions of deep neural networks. In NIPS, 2014. 16. R. K. Srivastava, K. Greff, and J. Schmidhuber. Training very deep networks. 1507.06228, 2015. 17. M. D. Zeiler and R. Fergus. Visualizing and understanding convolutional neural networks. In ECCV, 2014. 18. Internet: https://en.wikipedia.org/wiki/Semantic_gap, Apr. 2016. 19. MATLAB and Statistics Toolbox Release 2013a, The MathWorks, Inc., Natick, Massachusetts, United States

87. Authors: Deler Singh, Gurvinder Kaur

Paper Title: Familiarizing Students with Peer Assessment and Feedback Methods

Abstract: The paper examines the effectiveness of peer review and feedback during professional 539-542 presentations in improving the participation and interpersonal communication skills of students. Existing research shows that such activities induce lifelong learning in students. The study has been conducted amongst the students from first year engineering programme who represented different engineering streams. The twin objectives of the study were to examine and reinforce learning in feedback skills. The objectives of peer assessment were introduced to the students. Rubrics for the assignment were explained to them thoroughly. The peer review was followed by an oral feedback by the students. The paper concludes with the discussion on challenges to peer assessment and ways to overcome these challenges.

Keyword: Lifelong learning, assessment, skill development, collaborative learning, higher education, professional development, self-assessment. References: 1. Bloxham, S. and Boyd, P. (2007). Developing effective assessment in higher education: A practical guide. Berkshire: Open University Press. 2. Boud, D. & Prosser, M. (1980). Sharing responsibility: Staff-student cooperation in learning. British Journal of Educational Technology, 11, 24–35. 3. Boud, D. (1989). The role of self-assessment in student grading. Assessment and Evaluation in Higher Education, 14, 20-30. 4. Boud, D. (1990). Assessment and the promotion of academic values. Studies in Higher Education, 15(1), 101– 111. 5. Boud, D. (1995). Enhancing learning through self-assessment. London: Kogan Page. 6. Brindley, C. & Scoffield, S. (1998). Peer assessment in undergraduate programmes. Teaching in Higher Education, 3, 79-89. 7. Brown, S., Rust, C. & Gibbs, G. (1994). Strategies for diversifying assessment in higher education. Oxford: Oxford Centre for Staff Development. 8. Earl, S. E. (1986). Staff and peer assessment - measuring an individual's contribution to group performance. Assessment and Evaluation in Higher Education, 11(1), 60-69. 9. Falchikov, N. (1986). Product comparisons and process benefits of collaborative peer group and self-assessments. Assessment and Evaluation in Higher Education, 11(2), 146-166. 10. Falchikov, N. (1988). Self and peer assessment of a group project designed to promote the skills of capability. Programmed Learning and Educational Technology, 25, 327-339. 11. Goldfinch, J. & Falchikov, N. (2000). Student peer assessment in higher education: A meta analysis comparing peer and teacher marks. Review of Educational Research, 70 (3), 287-322. 12. Hendrickson, J., Brady, M. & Algozinne, B. (1987). Peer-mediated testing: The effects of an alternative testing procedure in higher education. Educational and Psychological Research, 7, 91-102. 13. Hanrahan, S.J. & Isaacs, G. (2001). Assessing self and peer-assessment: The students' views. Higher Education Research & Development, 20(1), 53-70. 14. Heron, J. (1981). Assessment revisited. In: D. Boud (Ed.), Developing student autonomy in learning (pp. 77-90). London: Kogan Page. 15. Hughes, I. & Large, B. (1993). Staff and peer-group assessment of oral communication skills. Studies in Higher Education, 18, 379-385. 16. Kaufman, J.H. & Schunn, C.D. (2011). Students’ perceptions about peer assessment for writing: Their origin and impact on revision work. Instructional Science, 39(3), 387-406. 17. Knight, P. & Page, A. (2007). The assessment of ‘wicked’ competences: A report to the Practice based Professional 18. Learning Centre. Retrieved from http://www.open.ac.uk/opencetl/sites/www.open.ac.uk.opencetl/files/files/ecms /web-content/knight-and-page-(2007)-The-assessment-of-wicked-competences.pdf 19. Kollar, I. & Fischer, F. (2010). Peer assessment as collaborative learning: A cognitive perspective. Learning and Instruction, 20(4), 344-348. 20. Kwan, K. & Leung, R. (1996). Tutor versus peer group assessment of student performance in a simulation training exercise. Assessment and Evaluation in Higher Education, 21, 3, 205-214. 21. Lejk, M., Wyvill, M. & Farrow, S. (1999). Group assessment in systems analysis and design: A comparison of the performance of streamed and mixed-ability groups. Assessment and Evaluation in Higher Education, 24, 5-14. 22. Magin, D. & Churches, A. (1989). Using self and peer assessment in teaching design. In: Proceedings of the 89th World Conference on Engineering Education for Advancing Technology, Institution of Engineers (pp. 640-644). Australia. 23. Mockford, C. (1994). The use of peer group review in the assessment of project work in higher education. Mentoring and Tutoring, 2, 45-52. 24. Nicol, D.J. & Macfarlane‐Dick, D. (2006). Formative assessment and self‐regulated learning: A model and seven principles of good feedback practice. Studies in Higher Education, 31(2), 199-218. 25. Nortcliffe, A.L., Featherstone, S., Garrick, R. & Swift, G. (2003). Supplemental instruction a higher level learning? In: W. Aung, M. Hoffmann, R. W. King, W. J. Ng & L. M. S. Ruiz(Eds.). Engineering education and research: A chronicle of worldwide innovations (pp.30).Arlington, VA: iNEER. 26. Oldfield, K. & Macalpine, M. (1995). Peer and self-assessment at tertiary level- an experiential report. Assessment and Evaluation in Higher Education, 20, 125-132. 27. Patton, C. (2012). Some kind of weird, evil experiment: Student perceptions of peer assessment. Assessment & Evaluation in Higher Education, 37(6), 719-731. 28. Pond, K., Ul-Haq, R. & Wade, W. (1995). Peer review: A precursor to peer assessment. Innovations in Education and Training International, 32, 314-323. 29. Sher, W. (2004). Peer assessment in the design & construction of a reinforced concrete Lintel. Centre for Education in the Built Environment Transactions, 1(2) 37-55. 30. Stefani, L. (1994). Peer, self and tutor assessment: Relative reliabilities. Studies in Higher Education, 19, 69-75. 31. Swanson, D., Case, S. & Van Der Vleuten, C. (1991). Strategies for student assessment. In: D. Boud & G. Feletti (Eds). The Challenge of Problem Based Learning. London: Kogan Page. 32. Topping, K.J. (1998). Peer assessment between students in colleges and universities. Review of Educational Research, 68(3), 249- 276. 33. Topping, K. J. (2010). Methodological quandaries in studying process and outcomes in peer-assessment. Learning and Instruction, 20(4), 339-343. 34. Vickerman, P. (2009). Student perspectives on formative peer assessment: An attempt to deepen learning?. Assessment & Evaluation in Higher Education, 34(2), 221-230. 35. Williams, E. (1992). Student attitudes towards approaches to learning and assessment. Assessment and Evaluation in Higher Education, I7 (1), 45-58. Authors: Kamala Priya B, B Udaya Lakshmi, A Hari Krishna

Paper Title: Numerical Simulation o Shell and Tube Heat Exchanger using Ansys Fluent Abstract: From the current situation, the Heat Exchangers uses extreme commonly are tube and Shell heat exchangers. The most usual uses of Shell and tube heat exchangers are electricity creation, cooling system of hydraulic fluid, oil in motors, transmissions, and hydraulic power packs. Shell and tube heat exchangers are made of the casing using a bunch of tubes with inside. The desirable outcome of the paper is to figure out the speed of heat transport using hot water as the hot liquid. The target of this paper is to mimic a tube and shell heat exchanger and also to assess blood flow and temperatures from the tubes and shell by employing applications tool Ansys. The simulation is composed of modeling and meshing cross section of tube and shell heat exchanger utilizing computational fluid dynamics (CFD).

Keyword: Shell and tube heat exchanger, Catia, Ansys CFD Fluent, Temperature. References: 88. 1. KamalaPriya B, “Effect of Operational Temperatures in Efficiency of Shell and Tube Heat Exchanger” ISSN 2229-5518. 2. Sawant, S., More, S. E., & Dange, H. Design, Development and Performance Analysis of Anticorrosive Heat Exchanger. 3. Dr. M Sakthivel, “FLUENT ANALYSIS OF SHELL AND TUBEHEAT EXCHANGER USING NANOFLUIDS”, ISSN Online: 543-545 0976-6359. 4. Owaid, A. I., Tariq, M., Issa, H., Sabeeh, H., & Ali, M. The Heat Losses Experimentally in the Evacuated Tubes Solar Collector System in Baghdad-Iraq Climate. 5. 5.Vindhya,asiniPrasad,Dubey,RajRajatVerma,PiyushShankerVerma,A.K.Srivastava,” Steady State Thermal Analysis of Shell and Tube Heat Exchanger to demonstrate the Heat Transfer capabilities of various Thermal Materials using Ansys” ISSN:0975- 5861. 6. Elhabib, O., Ayad, M., Elmasry, A., & Omar, A. A. Heat Treatment of Wear Particles of Automotive Engines to Determine their Materials from Temper Colours. 7. 7.Vindhya VasiniPrasad, Dubey, RajRajatVerma, PiyushShankerVerma, A.K.Srivastava,” Performance Analysis of Shell and Tube Heat Exchanger under the effect of varied Operating Conditions”, E-ISSN:2273-1634. 8. Jakkula, S. U. B. O. D. H., & Sharma, G. S. (2014). Analysis of a Cross Flow Heat Exchanger Using Optimization Techniques. International Journal of Applied Engineering Research and Development (IJAERD), 4(6), 1-10. 9. KuldeepSingh ,” An overview of Shell and Tube Heat Exchangers “, p-ISSN:2349-6002 . 10. Kumar, R., Pedgopu, V., Kumar, A. N. I. L., Thakur, R. O. B. I. N., & Pundir, A. N. I. L. (2013). CFD based analysis heat transfer and friction characteristics of broken multiple rib roughened solar air heater duct. Int J Mech Prod Eng Res Dev, 3, 165- 172. 11. Mahrous, A. (2013). Thermal performance of PCM based heat sinks. Int J Mech Eng, 2(4). 89. Authors: K. RamaPrasasd ,Ch. BabyRani

Paper Title: Diffussion of Thermo Effects on Unsteady Flow through Porous Medium

Abstract: The intention of this research is to research the impact of thermo physiological parameters at the 546-550 porous medium. The hallway present, heat radiation and source absorption effects have been into account. The expressions for the speed, temperature, and also the immersion field are derived by employing perturbation technique. Keyword: Radiation absorption, Heat source, Iinclined porous plate, Heat transfer References: 1. G.Dharmaiah, M. Veera Krishna, “Finite Difference Analysis on MHD Free Convection Flow Through A Porous Medium Along A Vertical Wall”, Asian Journal of Current Engineering and Maths 2: 4 July – August (2013) p.p.273 – 280. 2. M. Veera Krishna and G. Dharmaiah, “MHD Flow of a Rivlin-Ericson Fluid through a Porous Medium in a Parallel Plate Channel under externally applied boundary acceleration”, International Journal of Engineering Inventions, e-ISSN: 2278-7461, p- ISSN: 2319-6491, Volume 2, Issue 9 (May 2013) PP: 34-40. 3. M. Veera Krishna and G. Dharmaiah, “hall effects on MHD pulsatile flow through a porous medium in a flexible channel”, International Journal of Advances in Engineering & Technology, Sept. 2013.©IJAET ISSN: 22311963,vol-6,issue no:2,pp:1552- 1563. 4. M. veerakrishna and G. DHARMAIAH, “heat transfer on unsteady MHDcouette flow of a bingham fluid through a porous medium in a parallel plate channel with uniform suction and injection under the effect of inclined magnetic field and taking hall currents”, IJAMA : Vol. 5, No. 2, December 2013, pp. 147-163 @ Global Research Publications 5. DharmaiahGurram, VedavathiNallapati, K.S.Balamurugan, “Effccts Of Radiation, Chemical Reaction And Soret On Unsteady Mhd Free Convective Flow Over A Vertical Porous Plate”, IJSIMR,Vol 3, special issue 5, Nov 2015, pp 93-101. 6. J.L.Ramprasad, K.S.Balamurugan, DharmaiahGurram, “Unsteady Mhd Convective Heat And Mass Transfer Flow Past An Inclined Moving Surface With Heat Absorption”, JP Journal of Heat and Mass Transfer, Vol XIII, Issue-1,Nov 2016,pp 33-51. 7. Charan Kumar Gandeta, DharmaiahGurram,K.S.Balamurugan,VedavathiNallapati, “Chemical Reaction AndSoret Effects On CassonMhd Fluid Over A Vertical Plate”, Int. J. Chem.Sci.: 14(1), 2016, 213-221.ISSN 0972-768X. 8. VedavatiNallapati, DharmaiahGurram, K.S.Balamurugan, Charan Kumar Gandeta “Chemical Reaction, Radiation And Dufour Effects On Casson Magneto Hydro Dynamics Fluid Flow Over A Vertical Plate With Heat Source /Sink”, Global Journal Of Pure And Applied Mathematics, ISSN 0973-1768,Vol XII, No.1,2016,pp 191-200. 9. Ch.BabyRani,DharmaiahGurram,K.S.Balamurugan,Sk.Mohiddin Shaw, “Synthetic Response And Radiation Impacts On Unsteady MHD Free Convective Flow Over A Vertical Permeable Plate”, Int. J. Chem.Sci.: 14(4), 2016, 2051-2065,ISSN 0972- 76 10. K.S.Balamurugan, DharmaiahGurram, S.V.K.Varma, V.C.C.Raju, “MHD Free Convective Flow Past a Semi-Infinite Vertical Permeable Moving Plate with Heat Absorption”, International Journal of Engineering & Scientific Research, ISSN: 2347-6532, Vol IV, Issue 8, August 2016, p.p.46-58. 11. M.Venkateswarlu, D. Venkatalakshmi, G.Dharmaiah, “Influence Of Slip Condition On RadiativeMhd Flow Of A Viscous Fluid In Parallel Porous Plate Channel In Presence Of Heat Absorption And Chemical Reaction”, J.KSIAM, vol-20, No-4, 2016, p.p:333-354. 12. G.Dharmaiah, “An Unsteady Magneto Hydro Dynamic Heat Transfer Flow In A Rotating Parallel Plate Channel Through A Porous Medium With Radiation Effect”, Innovare Journal Of Engineering & Technology,vol-5(1),2017,p.p:34-37. 13. G.Dharmaiah, UdayKumarY, N.Vedavathi, “Magneto Hydro Dynamics Convective Flow Past A Vertical Porous Surface In Slip- Flow Regime”, IJTAM(RIP Publications), ISSN: 0973-6085, vol-12(1), pp:71-81,2017. 14. G.Dharmaiah, K.S.Balamurugan, V.C.C.Raju, N.Vedavathi, “effect of chemical reaction on mhdcasson fluid flow past an inclined surface with radiation”, SKIT Journal, ISSN: 2278-2508, vol-7(1), pp:53-59. 15. Ch.BabyRani, K.Ramaprasad, K.S.Balamurugan, DharmaiahGurram, “MHD Transient Free Convection Aligned Magnetic and Chemically Reactive Flow past a Porous Inclined Plate with Radiation and Temperature Gradient Dependent Heat Source in Slip Flow Regime”, IOSR Journal of Mathematics (IOSR-JM) e-ISSN: 2278-5728, p-ISSN: 2319-765X. Volume 13, Issue 4 Ver. I (Jul. – Aug. 2017), PP 34-45. 16. DharmaiahGurram, Prakash.J, K.S.Balamurugan, N.Vedavathi, “The Effect Of Chemical Reaction On Heat And Mass Transfer Mhd Flow Ag, Tio2 And Cu Water Nano Fluids Over A Semi Infinite Surface”, Global Journal Of Pure And Applied Mathematics, ISSN 0973-1768,Vol XIII, No.9,2017,pp 6609-6632. 17. K.S. Balamurugan, J.L. Ramaprasad, DharmaiahGurram and V.C.C. Raju, “Influence of Radiation Absorption, Viscous and Joules dissipation on MHD free Convection Chemically Reactive and Radiative Flow in a Moving Inclined Porous Plate with Temperature Dependent Heat Source”, International Refereed Journal of Engineering and Science (IRJES), ISSN : 2319-183X, Volume 5, Issue 12 (December 2016), PP.20-31. 18. Ch.Baby Rani, Sk. Mohiddin Shaw, G.Dharmaiah, “Influence Of Radiation On Heat And Mass Transfer In MHD Fluid Flow Over An Infinite Vertical Porous Surface With Chemical Reaction”, International Journal of Mathematics and its Applications, ISSN:2345-1557, Vol:5, Issuse 4-E, 2017, 731-740. 19. DharmaiahGurram, K.S.Balamurugan, M. Venkateswarulu, “Analysis Of Heat And Mass Transfer On Mhd Flow Of Nanofluid Over A Semi Infinite Moving Surface With Diffusion Thermo”, SKIT Journal, volume-7, Issuse-2, 2017, ISSN: 2278-2508, 79- 86. 90. Authors: Lokendra Kumar Tiwari, Saurabh Mishra, Shefalika Ghosh Samaddar

Paper Title: Recovering Evidentiary E-mail for Non-Repudiation Forensics

Abstract: Computer Forensic, the upcoming branch of forensic science where acquiring, preserving, 551-557 retrieving and presenting content processed electronically and stored digitally, is used for legal evidence in computer related crimes or any other unethical practice involving manipulation of digital content. Such digital content can take many forms which are manifested by different file formats and digital artifacts”. This paper concentrates on acquisition of deleted e-mail from mailbox of web servers satisfying two tier, three tier and n- tier technology. A detailed survey of several possibilities are included for non-repudiation forensic. A case study of a particular file type using suitable forensic tool is cited as a proof of concept towards this claimed inference to provide digital evidence in case of non-repudiation by sender and/or by receiver. This is simply conducted by using Encase a proprietary Digital forensic tools. The whole process is captured in step by step fashion to have a better understanding of the mechanism used. Recovery of files/emails have certain kinds of legal hurdles, the paper have addressed them as well. This paper contributes to the extend the recovered email can used as a ready digital evidence in any court of law.

Keyword: E-mail recovery, DBX file recovery, EnCase, Outlook Express mail recovery. References: 1. https://en.wikipedia.org/wiki/Computer_forensics accessed on 01 August 2019 2. Asha Joseph , K. John Singh, “Review of Digital Forensic Models and A Proposal For Operating System Level Enhancements” International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, November 2016 3. https://articles.forensicfocus.com/, accessed on 11 September 2019 4. https://www.ontrack.com/uk/, accessed on 11 September 2009 5. https://www.cru-inc.com/industries/forensics/, accessed on 12 September 2019 6. Linux “dd” : www.redhat.com, accessed on 17 September 2019 7. http://www.x-ways.net/winhex/forensics.html, accessed on 11 September 2019 8. SafeBack :www.forensics-intl.com, accessed on 19 September 2019 9. http://www.digitalintelligence.com/software/guidancesoftware/encase/, accessed on 19 September 2019 10. SnapBack DatArrest :https://www.forensicmag.com/article/2006/08/software-imaginganalysis-tools-part-1, accessed on 19 September 2019 11. http://www.kb.cert.org/vuls/ accessed on 12-3-2019 12. http://cve.mitre.org/ accessed on 12-8-2019. 13. http://nvd.nist.gov/ accessed on 12-8-2019. 14. http://www.securityfocus.com/vulnerabilities accessed on 12-7-2019 15. http://www.webresourcesdepot.com/9-free-and-open-source-bug-tracking-softwares/ accessed on 12-7-2019. 16. https://blog.osvdb.org/ accessed on 12-8-2019. 17. http://projects.webappsec.org/Threat-Classification-Previous-Versions accessed on 12-7-2019. 18. http://xml.coverpages.org/appSecurity.html accessed on 12-7-2019. 19. http://www.w3.org/TR/xkms2/ accessed on 12-7-2019. 20. http://docs.oasis-open.org/ws-sx/ws-trust/200512/ws-trust-1.3-os.html accessed on 12-8-2019. 21. http://www.xrml.org/ accessed on 12-3-2010. 22. http://www.cdac.in/HTML/press/2q05/spot487.asp accessed on 12-7-2019 23. https://www.digitalforensics.com/ accessed on 12-7-2019