<<

International Journal of Recent and Engineering

ISSN : 2277 - 3878 Website: www.ijrte.org Volume-8 Issue-2S6, JULY 2019 Published by: Blue Eyes Intelligence Engineering and Sciences Publication

n d E n y a g i n g e l o e o r i n n h g

c

e

T

t

n

e

c

Ijrt e

e

E

R

X I

N

P n

f

L O

I

O

t

T

R A o e

I V

N O

l

G N

r

IN

n

a

a

n

r

t

i

u

o

o n

J

a

l

www.ijrte.org Exploring Innovation Editor-In-Chief Chair Dr. Shiv Kumar Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), .

Associated Editor-In-Chief Chair Prof. MPS Chawla Member of IEEE, Professor-Incharge (head)-Library, Associate Professor in Electrical Engineering, G.S. Institute of Technology & Science Indore, Madhya Pradesh, India, Chairman, IEEE MP Sub-Section, India

Dr. Vinod Kumar Singh Associate Professor and Head, Department of Electrical Engineering, S.R.Group of Institutions, Jhansi (U.P.), India

Dr. Rachana Dubey Ph.D.(CSE), MTech(CSE), B.E(CSE) Professor & Head, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal (M.P.), India

Associated Editor-In-Chief Members Dr. Hai Shanker Hota Ph.D. (CSE), MCA, MSc (Mathematics) Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India

Dr. Gamal Abd El-Nasser Ahmed Mohamed Said Ph.D(CSE), MS(CSE), BSc(EE) Department of Computer and Information Technology , Port Training Institute, Arab Academy for Science ,Technology and Maritime Transport, Egypt

Dr. Mayank Singh PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu- Natal, Durban, South Africa.

Scientific Editors Prof. (Dr.) Hamid Saremi Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran

Dr. Moinuddin Sarker Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor) Stamford, USA.

Prof. (Dr.) Nishakant Ojha Principal Advisor (Information &Technology) His Excellency Ambassador Republic of Sudan& Head of Mission in New Delhi, India

Dr. Shanmugha Priya. Pon Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East Africa, Tanzania

Dr. Veronica Mc Gowan Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman, China.

Dr. Fadiya Samson Oluwaseun Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern Cyprus, Turkey.

Dr. Robert Brian Smith International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie Centre, North Ryde, New South Wales, Australia

Dr. Durgesh Mishra Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India

Special Issue Section Editor Mr. Siddth Kumar Founder and Managing Director, IFERP, Technoarete Groups, India

Mr. Rudra Bhanu Satpathy Founder and Managing Director, IFERP, Technoarete Groups, India

Dr. Mahdi Esmaeilzadeh Founder & Chairman, of Scientific Research Publishing House (SRPH), Mashhad, Iran

Executive Editor Chair Dr. Deepak Garg Professor & Head, Department Of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India

Executive Editor Members Dr. Vahid Nourani Professor, Faculty of Civil Engineering, University of Tabriz, Iran.

Dr. Saber Mohamed Abd-Allah Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.

Dr. Xiaoguang Yue Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.

Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital and Electronics, Misr Academy for Engineering and Technology, Mansoura, Egypt.

Dr. Hugo A.F.A. Santos ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.

Dr. Sunandan Bhunia Associate Professor & Head, Department of Electronics & Engineering, Haldia Institute of Technology, Haldia (Bengal), India.

Dr. Awatif Mohammed Ali Elsiddieg Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan, Saudi Arabia.

Technical Program Committee Chair Dr. Mohd. Nazri Ismail Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.

Technical Program Committee Members Dr. Haw Su Cheng Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia (Cyberjaya), Malaysia.

Dr. Hasan. A. M Al Dabbas Chairperson, Vice Dean Faculty of Engineering, Department of Mechanical Engineering, Philadelphia University, Amman, Jordan.

Dr. Gabil Adilov Professor, Department of Mathematics, Akdeniz University, Konyaaltı/Antalya, Turkey.

Dr.Ch.V. Raghavendran Professor, Department of Computer Science & Engineering, Ideal College of Arts and Sciences Kakinada (Andhra Pradesh), India.

Dr. Thanhtrung Dang Associate Professor & Vice-Dean, Department of and Energy Engineering, HCMC University of Technology and Education, Hochiminh, Vietnam.

Dr. Wilson Udo Udofia Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.

Manager Chair Mr. Jitendra Kumar Sen Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India

Editorial Chair Dr. Arun Murlidhar Ingle Director, Padmashree Dr. Vithalrao Vikhe Patil Foundation’s Institute of Business Management and Rural Development, Ahmednagar () India.

Editorial Members Dr. Wameedh Riyadh Abdul-Adheem Academic Lecturer, Almamoon University College/Engineering of Electrical Power Techniques, Baghdad, Iraq

Dr. T. Sheela Associate Professor, Department of Electronics and Communication Engineering, Vinayaka Mission’s Kirupananda Variyar Engineering College, Periyaseeragapadi (Tamil Nadu), India

Dr. Manavalan Ilakkuvan Veteran in Engineering Industry & Academics, Influence & Educator, Tamil University, Thanjavur, India

Dr. Shivanna S. Associate Professor, Department of Civil Engineering, Sir M.Visvesvaraya Institute of Technology, Bengaluru (Karnataka), India

Dr. H. Ravi Kumar Associate Professor, Department of Civil Engineering, Sir M.Visvesvaraya Institute of Technology, Bengaluru (Karnataka), India

Dr. Pratik Gite Assistant Professor, Department of Computer Science and Engineering, Institute of Engineering and Science (IES-IPS), Indore (M.P), India

Dr. S. Murugan Professor, Department of Computer Science and Engineering, Alagappa University, Karaikudi (Tamil Nadu), India

Dr. S. Brilly Sangeetha Associate Professor & Principal, Department of Computer Science and Engineering, IES College of Engineering, Thrissur (Kerala), India

Dr. P. Malyadri Professor, ICSSR Senior Fellow Centre for Economic and Social Studies (CESS) Begumpet, Hyderabad (Telangana), India

Dr. K. Prabha Assistant Professor, Department of English, Kongu Arts and Science College, Coimbatore (Tamil Nadu), India

Dr. Liladhar R. Rewatkar Assistant Professor, Department of Computer Science, Prerna College of Commerce, Nagpur (Maharashtra), India

Dr. Raja Praveen.N Assistant Professor, Department of Computer Science and Engineering, Jain University, Bengaluru (Karnataka), India

Dr. Issa Atoum Assistant Professor, Chairman of Software Engineering, Faculty of Information Technology, The World Islamic Sciences & Education University, Amman- Jordan

Dr. Balachander K Assistant Professor, Department of Electrical and Electronics Engineering, Karpagam Academy of Higher Education, Pollachi (Coimbatore), India

Dr. Sudhan M.B Associate Professor & HOD, Department of Electronics and Communication Engineering, Vins Christian College of Engineering, Anna University, (Tamilnadu), India

Dr. T. Velumani Assistant Professor, Department of Computer Science, Kongu Arts and Science College, Erode (Tamilnadu), India

Dr. Subramanya.G.Bhagwath Professor and Coordinator, Department of Computer Science & Engineering, Anjuman Institute of Technology & Management Bhatkal (Karnataka), India

Dr. Mohan P. Thakre Assistant Professor, Department of Electrical Engineering, K. K. Wagh Institute of Engineering Education & Research Hirabai Haridas Vidyanagari, Amrutdham, Panchavati, Nashik (Maharashtra), India

Dr. Umar Lawal Aliyu Lecturer, Department of Management, Texila American University Guyana USA.

Dr. K. Kannan Professor & Head, Department of IT, Adhiparasakthi College of Engineering, Kalavai, Vellore, (Tamilnadu), India Volume-8 Issue-2S6, July 2019, ISSN: 2278-3075 (Online) S. No Published By: Blue Eyes Intelligence Engineering & Sciences Publication Page No.

Authors: Miyang Cha

Paper Title: Efficient Diagnostic Process for Technical Vulnerability Abstract: With the development of IT came advances and expansions in major information and communications infrastructure, which have in turn resulted in studies being continuously conducted to analyze the administrative and physical vulnerabilities of the operating institutions. However, such institutions are exposed to the threat of cyber attacks because these studies often exclude technical aspects due to technological difficulty. Furthermore, web services limit their security checks to certain vendors and are therefore unable to identify the exact level of security in place. This paper demonstrates that these limitations, when performing a diagnostic test for technical vulnerability, can impact security levels. Therefore, this paper proposes a process that considers several environmental factors when checking for technical vulnerability in order to minimize the impact on security levels.

1. Keyword: technical vulnerability, security levels, environmental factors References: 1-5 1. Seon-Jin, Kim, Improvement in Vulnerability Diagnostic Items and Methods for Server Security: Graduate School of Information Science, Soongsil University; 2017. 28p 2. Korea Internet and Security Agency, 2016 Cyber Threat Trend Report; 2016.19p 3. Hyung-Soo, Lee, A Study on SCCN Technology to Enhance Web Service Security: Soongsil University, 2017.33p 4. I-news(2016.12.22.), Urgency of Social Infrastructure Security Management from:http://news.inews24.com/php/news_view.php?g_serial=997828&g_menu=020200 5. BSA, from:EUCybersecurity Dashboard; 2015 6. BSA, from:APACCybersecurity Dashboard; 2015 7. Tae-Ho, Kim, A Study on Improving Checklists for Infrastructure Vulnerability: Graduate School of Information and Communications, Konkuk University; 2016.42p. 8. Ministry of Public Administration and Security, Korea Internet and Security Agency, Detailed Guide for the Analysis and Assessment of Technical Vulnerabilities in Major Information and Communications Infrastructure; 2014. 63p. 9. From: https://news.netcraft.com/ 10. Young-Kyu, Lee, A Study on Improving Checklists for the Administrative and Physical Vulnerabilities in Major Information and Communications Infrastructure: Graduate School of Information and communications, Konkuk University; 2017. 68p Authors: Jung-Heui Oh, Boo-Gil Seok, Jai-Woo Oh, Kwang-Min Cho Effects of the Perception of Convergence in Sports Industry and Service Differentiation Strategies Paper Title: Grafting Augmented Reality on Viewing Intention Abstract: In a bid to contribute to the continuous growth of Korean Baseball Industry, this study aims to examine the effects of recognizing economic, cultural, international, social attributes of sport convergence industry and service differentiation strategies on viewing intention. Further, based on the findings of this study, applicable strategies for differentiating service of Korean Professional Baseball Industry and also strategic plans and basic data for securing competitive advantages are also provided. This study was conducted among 20-year- old men and women who visited stadium(Korea Professional Baseball Game) during September, 2016. The questionnaire was used and a total of 361 data were obtained. All the data were analyzed utilizing both SPSS and AMOS statistical programs. After coding, confirmatory factor analysis and reliability analysis were carried out. After that, path analysis was also carried out through analysis of correlation between each factor and structural equation model. First, the economic attribute recognition of sports convergence industry had positive effect on the recognition of service differentiation strategies. Second, cultural attribute recognition of sports convergence industry had not a significant effect on recognition of service differentiation strategy. Third, the recognition of international exchanges in sports convergence industry had positive effect on the recognition of service 2. differentiation strategies. Fourth, the recognition of social attributes in the sports convergence industry had not a significant effect on the recognition of service differentiation strategies. Fifth, the analysis of the effect of service differentiation strategy perception on the intention of watching sports showed that service differentiation 6-9 strategy perceptions had positive influence on audience intention. The subjects of this study were selected as adult men and women in their 20s who can easily accept new technology. However, since all age groups are participating in sports, it is necessary to study various age groups for the future type of sports industry.

Keyword: Perception of Convergence in Sports Industry (economic, cultural, international exchange, social), Service Differentiation Strategies, Augmented Reality (AR), Viewing Intention. References: 1. K. S. Kwon., T. Y. Oh., D. W. Kim., J. W. Oh. “Exploratory Analysis of Sport Industrial Convergence Trend” Korean Journal of Sport Science., 25 (2), 306-317, 2014. https://doi.org/10.24985/kjss.2014.25.2.306. 2. S. H. Lee. “Suggestions for Activation of Sport Convergence Enterprises” Journal of Digital Convergence., 13 (9), 505-513, 2015. https://doi.org/10.14400/JDC.2015.13.9.505. 3. Ministry of Culture, Sports and Tourism. Mid - to Long - Term Development Plan for Sports Industry. 2013. 4. J. H. Lee. “A Study on the Influence of Recognition for Casino Gaming on Attitude and Choice Behavior” The journal of tourism studies., 16, 265-284, 2004. 5. Lewis, E. St. Elmo. The Psychology of Selling and Advertising. New York: McGraw-Hill. 1898. 6. N. Hosono., S. Gotanda., H. Inoue., Y. Tomita. “ATM advertisement and financial preferences with sensory analysis” Human- Computer Interaction. HCI Applications and Services., 4553, 42-47, 2007. https://doi.org/10.1007/978-3-540-73111-5_5. 7. Article title. http://sports.mk.co.kr/view: 03/10/2012. 8. L. Jung., M. G. Kim., W. C. Shin., K. H. Lee. “Realization of Multi-User Tangible Non-Glasses Mixed Reality Space” Indian Journal of Science and Technology., 9(24), 2016.https://doi.org/10.17485/ijst/2016/v9i24/96161. 9. J. H. Kim., Y. M. Kim., M. G. Kim., E. J. Song. “Kidult Contents Development using Mobile Augmented Reality” Indian Journal of Science and Technology., 8(S9), 518-525, 2015. https://doi.org/10.17485/ijst/2015/v8iS9/68325 10. R. T. Azuma. “A survey of augmented reality” In Presence: Teleoperators and Virtual Environment., 6(4), 355-385, 1997. https://doi.org/10.1162/pres.1997.6.4.355. 11. L. T. Hu., P. M. Bentler. “Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives” Structural Equation Modeling., 6, 1-55, 1999. https://doi.org/10.1080/10705519909540118. 12. J. C. Nunnally. Psychometric theory(2nd ed.). New York: McGraw-Hill. 1978.

Authors: Seong-Ui Kim, Jung-Hyun Choi, Jum-Mi Park

Paper Title: Gambling Problem by Gambler Sub-Types among College Students in Korea Abstract: This study aims to investigate a seriousness of gambling problems by gambler sub-type among college students in Korea. Data were collected from 581 college students of , Gyeonggi-do, Chungcheong- do, and Gyeongsang-do area through the questionnaire and a total of 577 questionnaires were statistically processed excluding the questionnaires of missing answers. To analyze the gambling problems by gambler sub- types among college students, a cross-sectional research design was used in the study. Data were analyzed using Statistical Package for the Social Sciences. Among the 577 respondents of this study, 62.2% had gambling experience and especially 6.1% had illegal gambling experience. The prevalence rate of gambling addiction by the Canadian problem gambling index was 14.0% in this study. A significant statistical difference between gambler sub-types in gender, college grade, spending money, beginning of the first gambling, illegal gambling experience, route to start gambling, self-esteem, impulsivity, and irrational gambling belief was found in this study. The number of respondents who knew free counselling centers when there was a gambling problem was only 20 (3.5%), so it is quite required to carry out preventive education and to publicize free counselling centers for a gambling problem. In case that the respondents have a gambling problem, what they wanted to be supported most was psychotherapy and counseling, family counseling, hospital treatment, group therapy or Gamblers Anonymous meeting, and financial and legal consultation. It is required to continue further surveys on gambling among college students and to take a proper measure preventing a gambling problem.

Keyword: Gambling problem, Gambler sub-type, CPGI, College students, Korea. References: 1. J. Ferris and H. Wynne, The Canadian Problem Gambling Index: final report. Canadian Centre on Substance Abuse, 2001. http://www.ccgr.ca/en/projects/resources/CPGI-Final-Report-English.pdf 2. G. J. Smith and H, J, Wynne, Measuring Gambling and Problem Gambling in Alberta Using the Canadian Problem Gambling Index (CPGI): final report. Alberta Gaming Research Institute, 2002. http://dx.doi.org/10.11575/PRISM/9890 3. Gallup Korea Research Institute, A Survey on Actual State of Use in Gambling Industry: 2016. National Gambling Control Commission, 2016. http://dl.nanet.go.kr/SearchDetailView.do?cn=MONO1201642969&sysid=uci 3. 4. Z. Szczyrba, V. Mravčík, D. Fiedor, J. Černý, and I. Smolová, “Gambling in the Czech Republic,” Addiction, 110(7), 2015, pp. 1076-1081. https://doi.org/10.1111/add.12884 5. B. S. Kwon and Y.H. Kim, “A study of gambling addiction and its actual conditions among university students in Korea,” Mental Health and Social Work, 39, 2011, pp. 5-28. http://www.riss.kr.proxy.nsu.ac.kr:8010/link?id=A101148464 10-15 6. American Psychiatric Association, Diagnostic and Statistical Manual of Mental Disorders. Fourth Edition Text Revision (DSM-IV- TR), American Psychiatric Association Press, 2000. 7. H. P. Lee, J. G. Lee, H. W. Kim, T. W. Kim, Y. O. Han, and S. K. Lee, Pascal’s Betting, Temptation of Gambling - Understanding and Treatment of Gambling. Hakjisa, 2013. http://dl.nanet.go.kr/SearchDetailView.do?cn=MONO1201302176&sysid=uci 8. H. W. Kim, Why Do We Fall into Gambling. Soulmate, 2013. 9. Z. Steel and A. Blaszczynski, “Impulsivity, personality disorders and pathological gambling severity,” Addiction, 93(6), 1998, pp. 895-905. https://doi.org/10.1046/j.1360-0443.1998.93689511.x 10. R. Stinchfield, W. Hanson, and D. Olson, “Problem and pathological gambling among college students,” New Directions for Student Services, (113), 2006, pp. 63-72. https://doi.org/10.1002/ss.196 11. S. Lyubomirsky and H. S. Lepper, “A measure of subjective happiness: preliminary reliability and construct validation,” Social Indicators Research, 46(2), 1999, pp. 137-155. https://doi.org/10.1023/A:1006824100041 12. M. Rosenberg, Society and the Adolescent Self-image. Princeton University Press, 1965. 13. D. G. Kim and H. N. Ahn, “A validation study of NEO personality assessment system(NEO-PAS) for adolescents,” The Korea Journal of Youth Counseling, (1), 2006, pp. 77-91. http://www.riss.kr.proxy.nsu.ac.kr:8010/link?id=A102573769 14. S. J. Kwon, K. H. Kim, and J. O. Choi, “Awareness of adult gambling and predictors of gambling behavior in children,” Korean Journal of Health Psychology, 11(1), 2006, pp. 147-162. http://www.dbpia.co.kr/Article/NODE06368645 15. H. P. Lee, “The Relationship of Irrational Gambling Belief, Gambling Motive, and Risk Taking with Pathological Gambling,” Doctoral Thesis, Korea University, 2003. 16. T. A. Steenbergh, A. W. Meyers, R. K. May, and J. P. Whelan, “A self-report measure of gambler's maladaptive beliefs: Initial psychometric properties,” Journal of Addictive Behaviors, 16(2), 2002, pp. 143-149. 17. H. J. Shaffer, M. N. Hall, and B. Vander, “Estimating the prevalence of disordered gambling behavior in the and Canada: a research synthesis,” American Journal of Public Health, 89(9), 1999, pp. 1369-1376. DOI: 10.2105/AJPH.89.9.1369 18. A. Mubarak and P. Blanksby, “A study on problem and pathological gambling among university students in South Australia,” Journal of Higher Education Policy and Management, 35(5), 2013, pp. 471-482. https://doi.org/10.1080/1360080X.2013.775927 19. J. Huang, D. Jacobs, J. Derevensky, R. Gupta, and T. Paskus, “A national study on gambling among US college student-athletes,” Journal of American College Health, 56(2), 2007, pp. 93-99. https://doi.org/10.3200/JACH.56.2.93-100 20. E. W. Leppink, S. A. Redden, and J. E. Grant, “Impulsivity and gambling: a complex clinical association across three measures,” American Journal on Addictions, 25(2), 2016, pp. 138-144. https://doi.org/10.1111/ajad.12341 21. S. Singh, G. K. Mallaram, and S. Sarkar, “Pathological gambling: an overview,” Medical Journal of Dr. D.Y. Patil Vidyapeeth, 10(2), 2017, pp. 120-127. DOI: 10.4103/0975-2870.202105 22. D. Cunha, B. Sousa, and A. P. Relvas, “Risk factors for pathological gambling along a continuum of severity: Individual and relational variables,” Journal of Gambling Issues, (35), 2017, pp. 49-73. http://igi.camh.net/doi/pdf/10.4309/jgi.2017.35.3 23. W. Liu, G. P. Lee, A. Goldweber, H. Petras, C. L. Storr, N. S. Ialongo, and S. S. Martins, “Impulsivity trajectories and gambling in adolescence among urban male youth,” Addiction, 108(4), 2013, pp. 780-788. https://doi.org/10.1111/add.12049 24. S. J. Kwon, K. H. Kim, H. G. Seong, M. K. Rhee, and S. G. Kang, “Illegal internet gambling: problems, risk factors, and prevention strategies,” The Korean Journal of Health Psychology, 12(1), 2007, pp. 1-19. http://www.riss.kr.proxy.nsu.ac.kr:8010/link?id=A100631865 25. I. Lund, “Irrational beliefs revisited: exploring the role of gambling preferences in the development of misconceptions in gamblers,” Addiction Research and Theory, 19(1), 2011, pp. 40-46. https://doi.org/10.3109/16066359.2010.493979 Authors: Doo Hee Han

Paper Title: Complete Treatment of Food Waste using Vertical Carbonizer Abstract: Conventional food processor was used as compost or feed after solid-liquid separation by crushing and compression. However, feedstuffs became difficult due to the inability to prevent toxic substances, and composting was reluctant to use inappropriately and excessively salty. Therefore, using food waste as its own heat source in the drying process will reduce fuel costs and provide new food treatment methods. The food waste that is rich in fat and protein is distilled and dried, the solid material is used as livestock feed, and the condensate is completely recycled as an external carbon source of deodorant or sewage treatment plant. At this time, the excess solid component is pyrolyzed in a vertical type carburetor, and a combustible gas is produced and burned to be utilized as a heat source of the food drying apparatus. The pyrolysis temperature of the dried food waste for making flammable gas was maintained at 400 ° C and in this case, the harmful gas was below the environmental standard. By maintaining 1200 ° C during combustion, the risk of dioxin was eliminated. The vertical carbonization system can be used as a solid fuel additive, a black gray concrete additive, a soil additive and the like, while the hydrocarbon gas produced by pyrolyzing the solid structure effectively is used as a clean fuel to reduce the fuel cost. Condensate is used as an external carbon source for liquid fertilizers, deodorizers and sewage treatment. This device is not necessary when using incinerator waste heat. In a food waste disposal facility in an area without an incinerator, the fuel can be self-sufficient and effectively reduce fuel costs. 4. Keyword: recycling, organic waste, steam heating, food waste, animal food 16-21 References: 1. Doo Hee Han, Se-Jun Park, A Study on Compost of Food Waste by Salt Minimization, Journal of the Korea Academia - Industrial Cooperation Society, 2004, 5(2), 118-122. 2. Doo Hee Han, Development of Food Waste Fermentation System by Low Water-Ratio Salt Minimization, 2005, 6(2), 189-194. 3. Doo Hee Han, Recycling Apparatus of Organic Wastes by Direct Steam Heating, Proceedings of KAIS Spring Conference, 2007, 294-296. 4. Doo Hee Han, Development of Perfect Recycling Equipment for Sea Fish Waste , Journal of the Korea Academia - Industrial cooperation Society, 2010, 11(2), 614-619. 5. Doo Hee Han, Salt Reduction for Compositing of Food Waste, International Journal of Applied Engineering Research, 2014, 9(21), 9177-9184 6. Doo Hee Han, A Study on the Recycling of Lungfishes, Proceeding of The 2nd ICSMB2015. 7. Doo Hee Han, A Recycling Method of Rotten Fish Wastes, Indian Journal of Science and Technology, 2015, 8(22) 8. Emma Downing Wendy Carr, Food Waste, House of Commons Library, briefing paper number CBP07045, 10 June 2015. 9. Doo Hee Han, Liquid separator for livestock manure by dual raw separation equipment, Proceeding of ICCT2017, 2017. 10. Doo Hee Han, A Recycling Method of Food Waste by Drying and Fuelizing, Journal of Engineering and Applied Sciences, 2017, 12(14), 3599-3603 11. Byeong-Wook Min, Waste Materials Treating Process and Apparatus for Batch Type Drying and Vertical Type Carbonizing, Korean Patent No. 100845131, 2008. 12. Judy A Libra, Kyoung S Ro, Claudia Kammann, Axel Funke, Nicole D Berge, York Neubauer, Maria-Magdalena Titirici, ChristophFühner, Oliver Bens, Jürgen Kern, Karl-Heinz Emmerich1Hydrothermal carbonization of biomass residuals: a comparative review of the chemistry, processes and applications of wet and dry pyrolysis, Biofuels, 2011, 2(1), 89–124 Authors: Weon-Hee Moon, Ok-Hee Park Factors affecting English Language Learning Motivation of Korean Freshmen and their General Paper Title: Characteristics Abstract: Affective factors are crucial to acquire ESL (English as a second language) or EFL (English as a foreign language) learning. This study aims to investigate factors affecting to Korean university freshmen’s English learning motivation and their general characteristics such as gender, major and exposure to English. 379 freshmen at a regional university in Korea participated in the survey. They registered in a mandatory communicative English class managing by team-teaching with native speakers and Korean professors. The survey format was a descriptive and direct method, and composed with two parts, one is a check list asking for general characteristics and exposure to English, and the other is a 5Likert scale asking for participant’s interest, expectation, confidence, motivation, and anxiety. Motivation was used as a dependent variable, and the others 5. were used as affective factors for motivation. Collected data was analyzed with SPSS statistics. There was not statistical significance depending on gender in all affective factors. As for major, there showed statistical significance in confidence and anxiety factors (p<.05). Natural Science & Engineering (NSE) majoring students’ 22-26 confidence was highest, and that of Human and Social Sciences (HSS) and Art, Music & Physical education (AMP) majoring students was followed. As for anxiety, NSE students were lowest, HSS students and AMP students were followed. As for exposure to English, there showed statistical significance in interest, confidence, motivation, and anxiety factors (p<.05, p<.01). Students with learning experience with native speakers (NS) were higher interest, confidence, and motivation, and lower anxiety than students with none of exposure in English. Meanwhile, NS students showed lower interest and anxiety, and higher confidence than students with abroad experience. In relationship between affective factors, the most influential factor for learning motivation was confidence, expectation, and interest in order (p<.05).The results are expected to provide basic data necessary for establishing and developing an efficient and systematic communicative English education program.

Keyword: English learning motivation, Affective factors, Team-teaching, EFL learners, learning experience with native speakers. References: 1. S. Krashen, Principles and practice in second language acquisition. New York: Oxford University Press, 1982. 2. R. C. Gardner, W. Lambert, Attitude and motivation in second language learning. Rowley, Mass: Newsbury House, 1972. 3. Z. Dörnyei, E. Ushioda, Motivation, language identities, and the L2 self. Toronto: Multilingual Matters, 2009. 4. DH. Kang, “The gender role in L2 motivation of Korean university students,” Korea Journal of English Language and Linguistics, 15(2), June 2015, pp. 305-325. Available:http://www.dbpia.co.kr/Article/NODE06383367 5. OJ. Kim, SH. Park, “Analysis trends on intervention studies in English learning motivation: based on domestic journals published from 2008 to 2017,” Journal of Learner-Centered Curriculum and Instruction, 18(11), June 2018, pp. 635-663. Available:http://dx.doi.org/10.22251/jlcci.2018.18.11 6. MH. Shin, KH. Kim, “Factors affecting English learners’ learning motivation,” Journal of Digital Convergence, 10(9), May 2012, pp. 443-448. Available:http://www.riss.kr/link?id=A99540981 7. OH. Park, “A study on the effective general English program through team-teaching of native and Korean teachers,” The Journal of Foreign Studies, 31,March2015,pp. 41-70. Available:http://dx.doi.org/10.15755/jfs.2015.31.41 8. YS. Kim, “University students’ motivation, needs and expectations of general English education,” Journal of the Applied Linguistics Association of Korea, 11, June 1996, pp. 73-98. Available:http://www.riss.kr/link?id=A60147656 9. DS. Chong, HD. Kim, “A study for the development of a university level general English course,” English Teaching, 56(4), December 2001, pp. 265-292. Available: http://www.riss.kr/link?id=A104570495 10. TY. Kim, “Motivation and attitudes toward foreign language learning as socio-politically mediated constructs: the case of Korean high school students,” The Journal of Asia TEFL, 3(2), June 2006, pp. 165-192. Available:http://www.riss.kr/link?id=A60231751 11. HO. Kim, HK. Lee, “A study of students’ and teachers’ perceptions toward level-differentiated general English classes in the university,” English Teaching, 64(4), December2010, pp. 337-368. Available:http://www.riss.kr/link?id=A104570671 12. MH. Yoon, “A study on art theory education in the Art & Design College using English medium instruction (EMI),” Society for Art education of Korea, 34, March2009, pp. 1-39. Available:http://www.riss.kr/link?id=A100049515 13. YM. Lee, “A study on the effects and influences of study abroad program on English learning,” The Journal of Mirae English Language and Literature, 15(1), April 2010, pp. 139-155. Available:http://www.dbpia.co.kr/Article/NODE06686063 14. KH. Rha, “Correlational analysis between types of learning motivation of Korean EFL college students in the English camp and their English proficiency,” The Jungang Journal of English Language & Literature, 53(1), March 2011, pp. 159-177. Available:http://www.riss.kr/link?id=A82595622 Authors: Heejung Lee, Janghyun Kim, Ilhyun Bae A Research on the Mediating Role of Flow Experience between Involvement and Satisfaction-Focus Paper Title: on Leisure Satisfaction for University Students Abstract: This study examines how ‘flow experience’ plays role between leisure involvement and leisure satisfaction. We will focus on mediating role of ‘flow experience’ by using University student respondents. The study of results are as follows. First, situational/enduring involvement has a significant relationship with flow experience. Second, higher levels of flow experience lead to high levels of emotional /psychological /social satisfaction in leisure. Finally, we find the effects of situational/ enduring involvement on satisfaction were mediated by flow experience. The results of this study provide significant implication to various area.

Keyword: Situational Involvement, Enduring Involvement, Flow experience References: 1. Dumazedier, J., Leisure and the social system. In Concepts of leisure, J. F. Murphy ed. (1974), Englewood Cliffs, NJ, Prentice- Hall. 2. Kelly, J. R., Work and leisure: a Simplified paradigm. Journal of Leisure Research, 4.1 (1972), 50- 62.http://doi/org/10/1080/00222216.1972.11970057 3. Beard, J. G., and Ragheb, M. G., Measuring leisure satisfaction. Journal of leisure Research, 12.1 (1980), 20-33. 6. 4. Beard, J. G., and Ragheb, M. G., Measuring leisure attitude. Journal of leisure Research, 14.2 (1982), 155-168. http://doi.org/10.1080/00222216.1982.11969512 5. Iso-Ahola, S. E., Toward a Social psychological theory of tourism motivation: A rejoinder. Annals of Tourism Research, 9.2 (1982), 256-262.https://doi.org/10.1016/0160-7383(82)90049-4 27-30 6. Iso-Ahola, S. E., and Weissinger, E., Perceptions of boredom inleisure: Conceptualization, reliability and validity of the leisureboredom scale. Journal of Leisure Research, 22.1 (1990), 1-18.https://doi.org/10.1080/00222216.1990.11969811 7. Kepferer, J., and Laurent, G., Consumer involvement profiles: Anewpractical approach to consumer involvement. Journal of Advertising Research, 25.6 (1985), 48-56.https://EconPapers.repec.org/RePEc:hal:journl:hal-00786782 8. Zaichkowsky, J. L., Measuring the involvement construct. Journal of Consumer Research, 12.3 (1985), 341- 352.https://doi.org/10.1086/208520 9. McIntyre, N., and Pigram, J. J., Recreation specializationreexamined: The case of vehicle‐based campers. Leisure Sciences, 14.1 (1992), 3-15.https://doi.org/10.1080/01490409209513153 10. Cheng, T. M., and Tsaur, S. H., The relationship between serious leisure characteristics and recreation involvement: A case of study of Taiwan’s surfing activities. Leisure Studies, 31.1 (2012), 53-68.https://doi.org/10.1080/02614367.2011.568066 11. Kyle, G. T., and Chick, G. E., Enduring leisure involvement: The importance of personal relationships. Leisure Studies, 23.3 (2004), 243-266.https://doi.org/10.1080/0261436042000251996 12. Mactavish, J., and Schleien, S., Patterns of family recreation in families that include children with a developmental disability. Journal of Leisure Research, 29.1 (1997), 21-47.https://doi.org/10.1080/00222216.1997.11949781 13. Randall, E. T., and Bohnert, A. M., Organized activity involvement, depressive symptoms, and social adjustment in adolescents: Ethnicity and socioeconomic status as moderators. Journal of Youth and Adolescence, 38.9 (2009), 1187-1198. https://doi.org/10.1007/s10964-009-9417-9 14. Chen, Y. C., Li, R. H., and Chen, S. H., Relationships among adolescents’ leisure motivation, leisure involvement, and leisure satisfaction: a structural equation model. Social Indicator Research, 110.3 (2013), 1187-1199. https://doi.org/10.1007/s11205- 011-9979-2 15. Havitz, M. E., and Mannell, R. C., Enduring involvement, situational involvement, and flow in leisure and non-leisure activities. Journal of Leisure Research, 37.2 (2005), 152-177.https://doi.org/10.1080/00222216.2005.11950048 16. Havitz, M. E., and Dimanche, F., Leisure involvement revisited: Drive properties and paradoxes. Journal of Leisure Research, 31.2 (1999), 122-150. https://doi.org/10.1080/00222216.1999.11949854 17. Rothschild, M., Perspectives on involvement: Current problems and future directions. Advances in Consumer Research, 11 (1984), 216-217.http://acrwebsite.org/volumes/6245/volumes/v11/NA-11₩ 18. Richins, M. L., and Bloch, P. H., After the new wears off: The temporal context of product involvement. Journal of Consumer Research, 13 (1986), 280-185.https://doi.org/10.1086/209067 19. Csikszentmihalyi, M., Play and intrinsic rewards. Journal of Humanistic Psychology, 15.3 (1975), 41-63. 20. Nakamura, J., and Csikszentmihalyi, M., Flow theory and research. Handbook of positive psychology (2009), 195-206. 21. Engeser, S., and Rheinberg, F., Flow, performance and moderators of challenge-skill balance. Motivation and Emotion, 32.3 (2008), 158-172.10.1007/s11031-008-9102-4 22. Csikszentmihalyi, M., and Hunter, J., Happiness in everyday life: The uses of experience sampling. Journal of Happiness Studies, 4.2 (2003), 185-199. https://doi.org/10.1023/A:1024409732742 23. Wu, H. J., and Liang, R. D., The relationship between whit-water rafting experience formation and customer reaction: A flow theory perspective. Tourism management, 32.2 (2011), 317-325. https://doi.org/10.1016/j.tourman.2010.03.001 24. Heo, J., Lee, Y., McCormick, B. P., and Pedersen, P. M., Daily experience of serious leisure, flow and subjective well-being of older adults. Leisure Studies, 29.2 (2010), 207-225.https://doi.org/10.1080/02614360903434092 25. Jackson, S. A., Thomas, P., Marsh, H. W., and Smethurst, C.,Relationships between flow, self-concept, psychological skills andperformance. Journal of Applied Sport Psychology, 13 (2001), 129-153.https://doi.org/10.1080/104132001753149865 26. Jackson, S. A., and Marsh, H. W., Flow scale test manual (2002), St Lucia, Queensland: Fitness Information Technology Publishers. 27. Jackson, S. A., Martin, A. J., and Eklund, R. C., Long and Short measures of flow: The construct validity of the FSS-s, DFS-2 and new brief counterparts. Journal of Sport & Exercise Psychology, 30 (2008), 561-587.https://doi.org/10.1123/jsep.30.5.561 28. Jackson, S. A., Factor influencing the occurrence of flow state in elite athletes. Journal of Applied Sport Psychology, 7.2 (1995), 138-166.https://doi.org/10.1080/10413209508406962 Authors: Yoon-Ho Go, Jin-Keun Hong

Paper Title: Prediction of Stock Value using Pattern Matching Algorithm based on Deep Learning Abstract: In this paper we began with finding ways to predict stock value flows of stock using deep learning. The purpose of this paper is to analyze the patterns in stock value and to analyze the relationship from stock values by deep running to predict what patterns will happen next stock value. In this paper we made the data by dividing the stock value information of the time series for a certain period of time and the pattern of stock value by analyzing these data. It is configured the model to be used for deep learning and learned the patterned time series information using the created model. And then it is predicted the next pattern of stock value. This paper focused learning. It is used of a time-series stock value information to predict the rise and fall of stock value. This paper is about how to analyze and how to predict. On the other hand, we can expect trend of stock value with high probability by analyzing pattern of current chart and anticipating pattern to follow. This is about what the deep-learning machine will analyze and predict for what. If we analysis the patterns used in this paper more clearly and concisely, and if more learning is carried out, we will be able to make clearer predictions with no noise for future trends. As interest in stock forecasts and machine learning develops fast, performance is expected to improve day by day.

Keyword: stock analysis, prediction, pattern analysis, machine learning, deep learning. References: 1. J. F. Chen, W. L. Chen, C. P. Huang, S. H. Huang and A. P. Chen, “Financial Time-Series Data Analysis Using Deep Convolutional Neural Networks,” in 7th International Conference on Cloud Computing and Big Data (CCBD)2016, 7. https://doi.org/10.1109/CCBD.2016.027 2. R. Akita, A. Yoshihara, T. Matsubara and K. Uehara, “Deep learning for stock prediction using numerical and textual information,” in IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)2016, 31-35 https://doi.org/10.1109/ICIS. 2016.7550882 3. In-Jung Kim, “Deep Learning: New trend of Machine learning,” Information and Communication Magazine of Korea Institute of Communication and Information Sciences(Information and Communication), 31(11), pp. 52-57, 2016, https://www.dbpia.co.kr /Journal/ ArticleDetail/NODE02502238 4. Dong-Ha Shin, Kwang-Ho Choi, Chang-Boy Kim, “Deep Learning Model for Prediction Rate Improvement of Stock Price Using RNN and LSTM,” Journal of Korean Institute of Information, 15(10), pp. 9-16, 2017, http://doi.org/10.14801/jkiit.2017.15.10.9 5. Yoojeong Song, Jongwoo Lee, “A Design and Implementation of Deep Learning Model for Stock Prediction using TensorFlow,” in Proceeding of Korean Institute of Information Scientist and Engineers2017, https://www.dbpia.co.kr/Journal/ArticleDetail/NODE07207386 6. https://ko.wikipedia.org/wiki/deep_learning 7. https://www.tensorflow.org. 8. https://tensorflowkorea.gitbooks.io/tensorflow-kr/content 9. K. Khare, O. Darekar, P. Gupta and V. Z. Attar, “Short term stock price prediction using deep learning,” in 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)2017, https://doi.org/10.1109/ RTEICT. 2017. 8256643 10. M. R. Vargas, B. S. L. P. de Lima and A. G. Evsukoff, “Deep learning for stock market prediction from financial news articles,” in IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA)2017. https://doi.org/ 10.1109/CIVEMSA.2017.7995302D 11. S. Selvin, R. Vinayakumar, E. A. Gopalakrishnan, V. K. Menon and K. P. Soman, “Stock price prediction using LSTM, RNN and CNN-sliding window model,” in International Conference on Advances in Computing, Communications and Informatics (ICACCI)2017, https://doi.org/ 10.1109/ICACCI.2017.8126078 12. Ji-Hoon Lee, “Stock price prediction model using deep learning,” MA Thesis, Soongsil University, 2017, https://www.riss.kr/search/detail /DetailView.do?p_mat_type=be54d9b8bc7cdb09&control_no=80c3f1a991ea239bffe0bdc3ef48d419 13. Dae-Sup Song, “Predicting KOSPI index fluctuations with ensemble and deep learning,” MA Thesis, Dankook University, 2016, Republic of Korea.http://www.riss.kr/search/detail/DetailView.do?p_mat_type=be54d9b8bc7cdb09&control_no=8d69978961c2f30affe0bdc3 ef48d419 14. Dongyoung Kim, et al., “A Comparative Study between Stock Price Prediction Models Using Sentiment Analysis and Machine Learning Based on SNS and News Articles,” Journal of Korea Information Technology Services, 13(3), pp. 221-233, 2014. https://www.riss.kr/search /detail/ Detail View.do?p_mat_type= be5 4d9b8bc7cdb09&control_no=fd5085ba8853d3aaffe0bdc3ef48d419 15. Ding, X., Zhang, Y., Liu, T., & Duan, J., “Deep learning for event-driven stock prediction,” In IJCAI 2015. Authors: Min-Wook Choi

Paper Title: Meaning and Future of Emotion-based Marketing Communication in New Marketing Era Abstract: The objective of this study is to scrutinize the meaning and future of emotion based marketing communication in new marketing era. First, this study examined the concept and relation of marketing, brand and emotion. Then, extracted emotion related marketing concept in new marketing era. And it proposed application direction of emotion to marketing communication in the future. In new marketing era, the application of emotion to marketing communication will increase. What is important is the direction of application of emotion to marketing communication. The important directions of application are as below. First direction is collaboration. For effective application of emotion to marketing communication, the collaboration with other field is necessary. Second direction for effective application of emotion to marketing communication is creativity. Like advertising, the creativity is important in the use of emotion in marketing communication. The third application direction of emotion to marketing communication is long term perspective. The goal of emotional marketing or emotional communication is not short term sales increase. They should be viewed as a variety of efforts to engage with consumers rather than immediate results or effects. The forth application direction of emotion to marketing communication is relevance with brand. Even though emotional marketing or emotional communication is fun, touching, and creative, if it has no relation with brand, desired goal cannot be accomplished. In the situation where it is difficult to differentiate brand from others by quality of products, marketing communication using emotion will become a major means of brand differentiation.

Keyword: Contents marketing, Emotion, New marketing communication, Storytelling marketing References: 1. Y. H. Bae, “The case study on the emotional marketing of : Focused on broadcasting advertising,” Korean Review of Corporation Management, vol. 3, no. 1, 2013, pp. 25–41. 2. S. U. Nam and B. R. Park, “A study on the strategy of content marketing using YouTube,” Design Convergence Study, vol. 16, no. 2, 2017, pp. 63–81. 3. S. G. Moon, “A study on the emotional approach as brand communication,” Journal of Korea Design Forum, vol. 23, 2009, pp. 8. 57–66. 4. J. Pulizzi, “The rise of storytelling as the new marketing” Publishing Research Quarterly, vol. 28, no. 2. 2012, pp. 116– 123. 36-41 5. Curata, 2014 Content marketing tactics planner: Creation, curation & syndication, 2014. 6. IAB, Content marketing primer, 2013a. 7. B. Clay, M. “Newlands, Content marketing strategies for professionals: How to use content marketing, communicate with impact, generate sales, and get found by search engines.,” North Charleston, CreateSpace Independent Publishing Platform, 2014. 8. B. W. Wojdynski and N. J. Evans, “Going native: Effects of disclosure position and language on the recognition and evaluation of online native advertising,” Journal of Advertising, vol. 45, no. 2, 2016, pp157-168. http://dx.doi.org/10.1080/00913367.2015.1115380 9. G. Y. Lee and J. H. Jung, “A study on the types of communication design in digital native advertising,” Journal of Brand Design Association of Korea, vol. 15, no. 2, 2017, pp31-42. http://doi.org/10.18852/bdak.2017.15.2.31 10. J. Son and I. Kang, “The Effect of Native Advertising Credibility on Social Media Advertising Effectiveness,” The e-Business Studies, vol. 18, no. 3, 2017, pp21-37. http://doi.org/10.20462/TeBS.2017.06.18.3.21 11. IAB, The native advertising playbook, 2013b. 12. IPG Media Lab & Sharethrough, Exploring the Effectiveness of Native Ads. 2013. http://www.iab.net/media/file/Sharethrough- IPG-Infograpic-11x17-CMYK_nobleeds.pdf 13. Y. S. Kim and H. M. Choi, “Consumer-brand relationship quality formation of potential consumers for an automotive brand: Effectiveness of native advertising,” Journal of the Korea Contents Association, vol. 17, no. 2, 2017, pp656-677. . http://doi.org/10.5392/JKCA.2017.17.02.656 14. IPG Media Lab, Exploring the Effectiveness of Branded Content, 2013. https://www.ipglab.com/wp- content/uploads/2013/10/Effectiveness-of-Bra 15. R, Lieb, J. Szymanski, and S. Etlinger, Defining and mapping the native advertising landscape, 2013. https://www.americanpressinstitute.org/wp-content/uploads/2013/10/report-defining-mapping-native-advertising-landscape- rebecca-lieb.pdf. 16. D. G. Taylor, J. E. Levin, and D, Strutton “Friends, fans, and followers: Do ads work on social networks? How gender and age shape receptivity,” Journal of Advertising Research, vol. 51, no. 1, 2011, pp258-275. http://dx.doi.org/10.2501/JAR-51-1-258- 275 17. J. Berger and K. L. Milkman, “What makes online content viral?,” Journal of Marketing Research, vol. 49, no. 2, 2012, pp192- 205. http://dx.doi.org/10.1509/jmr.10.0353 18. S. An, H. Lee, and H, Park, “Impacts of Emotional Appeals by Social Media Native Ads: Psychological Arousal and Advertising Effects,” Journal of Broadcasting and Telecommunications Research, vol. 95, 2011, pp112-145. 19. S. Kim, “A Study on the usefulness of storytelling marketing in brand space” Journal of Korea Design Forum, vol. 23, 57-66, 2009. 20. M. H. Lee and J. M. Lee, “Online Storytelling Marketing” Business Management Research, vol. 4, no. 2, 77-103, 2011. Authors: Jai-woo Oh, Jin-Kyu Kang Implementation of Disaster Evacuation Guidance System using Beacon Technology for Elderly Care Paper Title: 9. Facilities Abstract: This study aims to design a system that, in case of a disaster at an elderly care facility, provides the optimum evacuation paths via user devices using their location information. A system for situation control 42-47 and safe evacuation was developed with the following components: an information collection system developed using BLE beacon technology to detect disasters and collect location information; a control system that uses a situation monitoring program incorporated with real-time positioning technology and an evacuation guidance program with the application of A* algorithm; and a terminal system composed of an app for providing evacuation paths to terminal devices. This study was conducted on a method of generating and providing the optimum evacuation paths, based on the disaster location and the user-inputted location information obtained via IoT technology, with the aim of minimizing casualties and fatalities in the event of a disaster at a 24-hour resident facility occupied by seniors with mental and/or physical impairments. For this purpose, evacuation guidance systems at elderly care facilities were analyzed, an experiment was conducted using disaster detection sensors and beacon technology for determining user locations, and diverse algorithms for determining the best evacuation paths were compared to identify and apply the most appropriate algorithm. Afterwards, a simulation was conducted, and the results showed that it was possible to locate the disaster or fire occurring at an elderly care and determine the status of users inside the facility. Also, it was found that the evacuation guidance program could analyze the optimum evacuation paths for users from their current locations and provide such information via the terminal devices in possession of individual users. The system can provide disaster information and evacuation paths as well as the locations of evacuees with mobility difficulties to enable swift rescue operations, thereby minimizing casualties and fatalities.

Keyword: BLE beacon, elderly care facilities, indoor positioning technology, evacuation guidance system References: 1. H. S. Oh., D. J. Kim., S. R. Chang, “Design of HSE Management System in a Shipyard using object-oriented Component- Based Development Method”, Journal of the Korean Society of Marine Environment & Safety, vol. 19(1), 2013, pp. 71-77. 2. Y. W. Kim., D. H. Kim., H. Y. Kwak., H. D. Park, “A Study of Fire Shunt Guidance Based on Wireless Sensor Networks”, Korea Multimedia Society, vol. 11(11), 2008, pp. 1547-1554. 3. Filippoupolitis., G. Loukas., S. Timotheou., N. Dimakis., E. Gelenbe, “Emergency response systems for disaster management in buildings”, The Information Systems and Technology Panel Symposium, 2009, pp. 1-14. 4. L. Chu., J. W. Shih, “A Real-time Fire Evacuation System with Cloud Computing”, Journal of Convergence Information Technology, vol. 7(7), 2012, pp. 208-215. 5. J. Chae., S.C. Woo., G.B. Go, “A Study on the Fire Organization of the Effectiveness Life Safety Services”, Fire Science and engineering, vol. 27(4), 2013, pp. 47-53. 6. S. J. Kim, “The study for the functional change of elderly care facilities according to the introduction of a long term care system for older people”, Ph.D Thesis, University of Seoul, 2005. 7. S. H. Park, “A Study on the Development of Integrated Type Fire Alarm Control Panel for Ubiquitous Environment”, Journal of Korea Institute of Fire Science and Engineering, vol. 24(1), 2010, pp. 24-30. 8. J. H. Kim., S. G. Noh, “Development of Performance Index for Ubiquitous Building Fire Safety System”, Journal of Korea Institute of Fire Science and Engineering, vol. 23(3), 2009, pp. 23-30. 9. M. O. Yun., C. h. Song., T. W. Kim., Y. S. Choi., Y. L. Choi, “Real-time Fire Evacuation Guidance System Employing Ubiquitous Techniques: Efficient Exiting System Using RFID”, Journal of Korea Institute of Fire Science and Engineering, vol. 21(4), 2007, pp. 115-122. 10. Chae., Y. S. Song, “A Study on the Revitalization Ubiquitous Information Technology for the Disaster Management”, Journal of Korea Institute of Fire Science and Engineering, vol. 23(6), 2009, pp. 24-31. 11. G. Hwang., J. W. Baek, “A Study on Implementation of ZigBee Module for the home Networking”, Journal of Korean Society of Computer and Information, vol. 13(2), 2008, pp. 203-210. 12. Min, “Design and Implementation of System for Control of Surveillance Camera with the Zigbee protocol” Masters dissertation Ajou University, Gyeonggido Korea, 2006. 13. Zhou Jianjun, Wang Xiaofang, Wang Xiu, Zou Wei,Cai Jichen, “Greenhouse Monitoring and Control System Based on Zigbee”, Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering(ICCSEE 2013), 2013, pp. 2361-2364. 14. S. J. Park, M. I. Gi, J, Y, Kim, “A Study on the trend of LBS technology and market” Electronics and Telecommunications Research Institute, 2015. 15. J. Chae., S. C. Woo, “A Study of the Fire-Safety Improvement Plan for Elderly Care Facilities”, Crisisonomy, vol. 7(2), 2011, pp. 57-74. 16. H. K. Kim, D. E. Ko, “A Study on the Conceptual Design of Quay Process Monitoring System”, Journal of the Korea Academia-Industrial cooperation Society, vol. 19(10), 2016, pp. 426-431. 17. M. S. Son, “A Study on the Operation of Welfare Facilities for Elderly and the Degree of Service Satisfaction: Focusing on the Residential and Health Care Facilities in Dae-Gu City”, Doctoral dissertation, Kyung Hee University, Seoul Korea , 2006. 18. H. Ok., J. H. Ahn., S. H. Kang., B. I. Moon, “A combined heuristic algorithm for preference-based shortest path search”, Journal of The Institute of Electronics Engineers of Korea, vol. 47(8), 2010, pp. 74-84. 19. M. B. Kang., Y. I. Joo, “Intelligent evacuation systems for accidents aboard a ship”, Journal of the Korean Society of Marine Engineering, vol. 40(9), 2016, pp. 824-829. http://www.riss.kr/link?id=A102396464 Authors: Julak Lee

Paper Title: Child Pornography Websites on the Darknet Abstract: Cybercrime has been moving to the darknet which provides privacy and anonymity to users. Despite international efforts to eradicate child pornography, websites to distribute lurid materials are found to be resilient. Due to the significance of the criminality, law enforcement authorities have taken covert measures to 10. dismantle the leadership of these websites, focusing on arresting the organizers and core members. In this paper, two cases involving child pornography websites were examined to disclose how these websites were structured and managed as well as investigation strategies and tactics employed by investigation agencies. Some 48-54 similarities were identified during pre-arrest and after-arrest stages for an investigation goal and evidence verification, respectively. However, during a deanonymisation stage the two agencies used different investigation strategies to approach and arrest the target criminals. It is very likely that darknet websites will be managed in diverse manners, or that more anonymity and encryption will make pornography circulation structure invisible and unreachable. In this study, it was argued that perfect anonymity is not provided to the darknet users and that investigation agencies should make technical and social engineering efforts to deanonymise identities of criminals.

Keyword: Child Pornography, Darknet, Criminal Investigation, Cryptocurrency, Management Style. References: 1. Farrell P, Inside the darknet: where Australians buy and sell illegal goods. The Guardian, 4 July, 2017. Retrieved from https://www.theguardian.com/technology/2017/jul/04/inside-the-darknet-where-australians-buy-and-sell-illegal-goods 2. Jeong S, First arrest of the organizer of a darknet website. Korea Times, 1 May, 2018. Retrieved from http://www.hankookilbo.com/v/1be67abbf8b84905aecc0d83445ff199 3. Ko J, Arrested the organizer of a child pornography website on the darknet, a hot bed for cybercrimes. Asia Economy, 2 May, 2018. Retrieved from http://www.asiae.co.kr/news/view.htm?idxno=2018050215543463052 4. Dolliver DS, Kenney JL. “Characteristics of drug vendors on the Tor network: a cryptomarket comparison” Victims & Offenders. 11(4), 600-620, 2016. 5. Moore D, Rid T. “Cryptopolitik and the Darknet” Survival. 58(1), 7-38, 2016. 6. Buxton J, Bingham T. “The rise and challenge of dark net drug markets” Global Drug Policy Observatory 7, 1-24, 2015. 7. Owen G, Savage N. “The tor dark net” Global Commission on Internet Governance. 20, 1-9, 2015. 8. Chertoff M, Simon T. “The impact of the dark web on internet governance and cyber security”. Global Commission on Internet Governance. 6, 1-8, 2015. 9. Holm E. “The Darknet: A New Passageway to Identity Theft” International Journal of Information Security and Cybercrime. 6(1), 41-50, 2017. 10. Owen G, Savage N. “Empirical analysis of Tor hidden services” IET Information Security. 10(3), 113-118, 2016. 11. FBI. ‘Playpen’ Creator Sentenced to 30 Years. 2017. (Press release) Retrieved from https://www.fbi.gov/news/stories/playpen- creator-sentenced-to-30-years 12. Quayle E, Taylor M. “Child pornography and the Internet: Perpetuating a cycle of abuse” Deviant Behavior, 23(4), 331-361, 2002. 13. Maras MH. “Inside Darknet: the takedown of Silk Road: Marie-Helen Maras reports on the unexplored underworld of cyberspace” Criminal Justice Matters. 98(1), 22-23, 2014. 14. Spitters M, Verbruggen S, Van Staalduinen M. “Towards a comprehensive insight into the thematic organization of the tor hidden services” In Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint. 220-223, 2014. 15. Henri V. “The Dark Web: Some Thoughts for an Educated Debate” Canadian Journal of Law and Technology. 15(1), 85-98, 2017. 16. Weimann G. “Terrorist migration to the dark web” Perspectives on Terrorism 10(3), 40-44, 2016. 17. Oh HJ, Won DH, Kim C, Park, SH, Kim Y. “Design and implementation of crawling algorithm to collect deep web information for web archiving” Data and Applications. 52(2), 266-277, 2018. 18. Byrne JM, Kimball KA. Inside the Darknet: Techno-crime and criminal opportunity. In: Moriarty, L.J. ed. Criminal justice technology in the 21st century, 3rd ed. Illinois: Charles C Thomas. 206-232, 2017. 19. Watson KD. “The Tor Network: A Global Inquiry into the Legal Status of Anonymity Networks” Wash. U. Global Stud. L. Rev. 11, 715, 2012. 20. Department of Justice US. Attorney General Jeff Sessions Delivers Remarks at Press Conference Announcing AlphaBay Takedown. 2017. (Press release) Retrieved from https://www.justice.gov/opa/speech/attorney-general-jeff-sessions-delivers- remarks-press-conference-announcing-alphabay 21. Baraniuk C. AlphaBay and Hansa dark web markets shut down. 2017. Retrieved from http://www.bbc.co.uk/news/technology- 40670010 22. Popper N. AlphaBay, Biggest Online Drug Bazaar, Goes Dark, and Questions Swirl. New York Times, 6 July, 2017. Retrieved from https://www.nytimes.com/2017/07/06/business/dealbook/alphabay-online-drug-bazaar-goes-dark.html 23. Seto MC, Eke AW. “The criminal histories and later offending of child pornography offenders” Sexual abuse: a journal of research and treatment. 17(2), 201-210, 2005. 24. Lee J. Arrested the organizer of a child pornography website on the darknet, the first case in Korea. Herald Economy, 1 May, 2018. Retrieved from http://news.heraldcorp.com/view.php?ud=20180501000416 25. Taylor M. The nature and dimensions of child pornography on the Internet. Combating Child Pornography on the Internet, Vienna. 1999. 26. Wall D. Cybercrime: The transformation of crime in the information age (Vol. 4). Cambridge: Polity; 2007. 27. Knaus C. Australian police sting brings down pedophile forum on dark web. The Guardian, 7 October, 2017. Retrieved from https://www.theguardian.com/society/2017/ oct/07/australian-police-sting-brings-down-paedophile-forum-on-dark-web 28. Wortley R K, Smallbone S. Child pornography on the internet. Washington, DC: US Department of Justice, Office of Community Oriented Policing Services; 2006. 29. Van Buskirk J, Roxburgh A, Bruno R, Naicker S, Lenton S, Sutherland R, Whittaker E, Sindicich N, Matthews A, Butler K, Burns L. “Characterising dark net marketplace purchasers in a sample of regular psychostimulant users” International Journal of Drug Policy. 35, 32-37, 2016. 30. VG. Breaking the darknet: why the police share abuse pics to save children. 7 October, 2017. Retrieved from https://www.vg.no/spesial/2017/undercover-darkweb/?lang=en 31. National Police Agency. First arrest of a child pornography website organizer on the darknet. (Press release) 2018. 32. Şen S. “Organizational Solution Recommendations to the Problem of Child Pornography on the Internet”. Journal of Learning and Teaching in Digital Age. 3(1), 45-56, 2018. Authors: Migyung Cho

Paper Title: Classification of Glandular Cells using a Pre-trained Convolutional Neural Network Abstract: Tissues can be divided into glandular structures (cells) and non-glandular when we magnify them with a . To classify the two types, we performed experiments using convolutional neural network. We cropped regions of glandular cells and non-glandular in 10 x magnification images. The size of cropped 11. images was between 80 and 100 pixels in width and height. We prepared 932 glandular cells and 1000 non- glandular for the train and test. Of these, 1468 were used for learning and 532 were used for testing. We trained and tested the dataset using a slightly modified pre-trained VGG16. The inside of glandular cells consists of 55-59 nucleus, lumen and cytoplasm. Normal glandular cells and abnormal glandular cells that we call tubular adenoma have different texture features. But both types of glandular cells have distinct boundaries and specific shapes. In the case of cancer, as the nucleus grows excessively, the boundaries of the glandular cells become unclear and disappear. We trained three types of glandular cells, which is normal, tubular adenoma, and cancer. Experimental results using the pre-trained VGG16 classification showed a high classification accuracy of 99.44%. Only three non-glandular out of the 532 test data were misclassified into glandular cells. The classification method presented in the paper can be used to eliminate false positives that produced by an automatic segmentation system for the pathology image. The performance of the segmentation can be improved by eliminating segmented objects that are false positives.

Keyword: Classification, convolution neural network, glandular cells, pathology image, segmentation References: 1. Adnan Q., Syed M. Anwar, Muhammad M., Muhammad A., Majdi A., “Medical Image Analysis using Convolutional Neural Networks: A Review. Journal of medical systems,” 2018, 42(11), pp. 226. 2. Geert Litjens, Thijs Kooi, Babak Ehteshami Bejnordi, Arnaud Arindra Adiyoso Setio, Francesco Ciompi. Mohsen Ghafoorian, Jeroen A.W.M. van der Laak, Bram van Ginneken, Clara I. S´anchez, “A survey on deep learning in medical image analysis. Medical Image Analysis,” 2017, 42, pp.0-88. 3. Wollmann T, Rohr K, “Automatic breast cancer grading in lymph nodes using a deep neural network,” 2017, ArXiv170707565 Cs. 4. Ruqayya Awan et al. “Glandular Morphometrics for Objective Grading of Colorectal Adenocarcinoma Histology Images,” Scientific reports. 2017, 7(1), pp. 16852. 5. K. Sirinukunwattana, J. P. Pluim, H. Chen, X. Qi, P.-A. Heng, Y. B. Guo, L. Y. Wang, B. J. Matuszewski, E. Bruni, U. Sanchez, et al., “Gland segmentation in colon histology images: The GlaS Challenge Contest,” Medical Image Analysis. 2017, 35, pp. 489-502. 6. H. Chen, X. Qi, L. Yu, P. Heng. “Dcan: Deep contouraware networks for accurate gland segmentation,” Proc. of the IEEE conference on Computer Vision and Pattern Recognition 2016. 2016, pp. 2487-2496. 7. Migyung cho, Hyekyung Lee, Hwan Gue Cho, “An Automatic Segmentation Algorithm for Colonic Glandular Lesions,” Journal of KIISE, 2018, 45(6), pp.554-563. 8. Kayalibay B, Jensen G and van der Smagt P. “CNN-based segmentation of medical imaging data,” 2017, arXiv:1701.03056. 9. Kainz P, Pfeiffer M, Urschler M. “Segmentation and classification of colon glands with deep convolutional neural networks and total variation regularization,” 2017, https://doi.org/10.7717/peerj.3874. 10. C. Gunduz-Demir, M. Kandemir, A. Tosun, C. Sokmensuer. “Automatic segmentation of colon glands using object-graphs,” Medical Image Analysis. 2010, 14(1), pp. 1–12. 11. K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” International Conference on Machine Learning 2015. Authors: Joon-Ho Cho

Paper Title: Slide Development of Remote Control Camera with Bluetooth Communication Abstract: In this paper, we developed a slide imaging system that compensates for tremor when shooting using a camera. It uses a microprocessor to control the stepping motor, and can control slideshows with smartphone apps. We also developed an object tracking method, which is an image processing technique, to automatically capture human motion. It is not easy to obtain a clear image by camera shake when photographing an object with a camera. Some products have recently added camera shake correction function, but products added with such functions are often expensive in price. For these reasons, video equipment sliders are also used by video shooting experts and the general public. However, the conventional products have troublesomeness that people have to move directly. Electric sliders created to solve such inconveniences need to be attached to rails and controlled with buttons, if a motion controller is added. In this thesis, we developed the electric slider that operates with the button using Bluetooth telecommunication of the smartphone so that the position and speed of the slider can be controlled, and in order to reduce the blur, the stepping motor Control.

12. Keyword: Bluetooth, ,PID controller, Camera slider ,Stepping motor, Telecommunication References: 60-64 1. Y. Toyoda, Image stabilizer, U.S. Patent 6064827, 2000. 2. M. Yamamoto, Y. Yoko, and S. Haga, Image stabilization apparatus, U.S. Patent 7164531, 2007. 3. K. Washisu, Image stabilization device, U.S. Patent 5245378, 1993. 4. H. Hanselmann, “ Implementation of digital controllers-A Survey”, Automatica, vol. 1,no. 23, 1987, pp. 7-32. 5. Digital Control Applications with the TMS320 Family, Texas Instruments, 1991. 6. K. Ogata, Discrete-Time Control Systems 2/e, Prentice Hall, 1994. pp.205. 7. K.J.Astrom and T.Hagglund, “ Automatic tuning of simple regulators with specifications on phase and amplitude margins”, Automatica, vol. 5, no.20, 1984, pp.645-651. 8. W.K.Ho, C.C.Hang, W.Wojsznis, and Q.H.Tao, “Frequency domain approach to self-tuning PID control”, Contr.Eng. Practice, vol. 6, no. 4, 1996, pp. 807-813. 9. W.K.Ho, O.P.Gan, E.B.Tay, and E.L.Ang, “Performance and gain and phase margins of well-known PID tuning formulas”, IEEE Trans. Contr. Syst. Technol., vol. 4, 1996, pp. 473-477. 10. M.Zhuang and D.P.Atherton, “Automatic tuning of optimum PID controllers”, Proc. Inst. Elect. Eng., vo. 3, no.140, 1993,pp 216- 224. 11. K.J.Astrom, Automatic tuning of PID regulators, Instrument Soc. Amer., 1998,pp.115 12. K.Y.Kong, S.C.Goh, C.Y.Ng, H.K.Loo, K.L.Ng, W.L. Cheong, and S.E.Ng, Feasibility report on frequency domain adaptive controller, Singapore, 1995. pp. 238 Authors: Mihee Han

Paper Title: On the Relationship between Adolescents' Dependence on Mobile Phones and their Career Identity

13. Abstract: This study intends to identify the relationship between Korean adolescents' dependence on mobile phones and their career identity. The research subjects for this study consisted of a group of 2,091 high school seniors, the 6th year survey of then-7th graders as of 2010 in Korean Children & Youth Panel Survey. 65-69 These students are from all over Korea. A set of analysis methods were used to analyze the relationship between the two factors: descriptive statistics, frequency analysis, correlation analysis and regression analysis. It was found from analyzing the collected data that there existed a negative correlation between adolescents' dependence on using mobile phones and their career identity and that the former had a significant effect on the latter. Thus, it might be concluded that students with a higher dependence on mobile phones have a lower degree of career identity. Excessive emphasis on admission to colleges might cause lack of education of career identity.

Keyword: adolescents, dependence on mobile phones, career identity, correlation, education. References: 1. P. H. Jung , C. R. Nho, K. S. Lee, H. S. Min, J.D.Song, “Mediating Effects of Depression and Aggression on the Association between Child Abuse and Neglect and Cell Phone Addiction -Gender Comparison” Journal of the Korean society of child welfare., Sep; 47, 93-123, 2014. 2. H.L Yang, Y.J Yoon, B.Y Jung, Emery Clifton R, “The Effects of Parental Abuse and Aggression on Mobile Phone Dependency - Focused on the Moderated Mediation Effect of Youth Activity” Journal of the Korea Institute of Youth Facility and Environment., Jul; 14(2), 5-15. 2016. 3. Y.A Kim, “The influence of experience activity of youth on career identity” Studies on Korean Youth Activity., Jul, 4(1), 21-41. 2018. 4. Y.S. Sung , “Mobile Phone Dependency and Social Delinquency among Korean Adolescents” Studies on Korean Youth., Dec; 17(2): 291-321, 2006. 5. D.H. Kim , H.C. Yang, “The effects of ecological factors on the trajectory of cellular phone dependency during the middle school years” Studies on Korean Youth., Aug; 25(3), 169-197, 2014. 6. J.Y. Lee, I.J. Chung, Y.D. Jang, Y.H. Ju , “The Effect of Mobile-phone Dependency on School Adjustment: Focusing on the Moderating Effect of Self-Esteem and Gender Difference” Journal of Youth Welfare., Sep; 17(3), 1-15, 2015. 7. K.M. Kim, H.J. Lee, “Analysis of current Mobile Service Application and Mobile Service Design Strategies in Ubiquitous smart space” Journal of Digital Design., Jan; 9(1), 413-422, 2009. 8. Tiedeman, D. V. & O'Hara, R. P, Career development: choice and adjustment., NY: College Entrance Examination Board, 1963. 9. Holland, J. L. Making Vocational Choices: A Theory of Vocational Personalities and Work Environments. Englewood Cliffs, NJ : Prentice-Hall, 1985. 10. I.S. Shin , Y.O. Jang , “The effects of career exploration programs using career portfolio and teacher-directed on the career maturity and career identity in middle school students” Korean Home Economics Education Association., Mar; 24(1), 85-104, 2012. 11. E.J. Park, Y.R. Lee, S.H. Lee, “The Effects of Adolescents" Social Capital on Their Career Identification by Parents Income Strata : Focusing. Korean Journal of Youth Studies., May; 3(5), 237-263, 2016. Authors: Young Sun Kim

Paper Title: Shape Proposal and Electric Field Distribution of Horizontal Lightning Conductor Abstract: Horizontal lightning conductor is installed horizontally on the top or side of the building. It uses specific materials and wires or rods of minimum thickness. In the horizontal conductor system, a horizontal conductor is laid on top of the building to be protected and absorbs the lightning through it. And the lightning current is safely discharged to the earth through the conductor connecting this to the ground. The starting point of the discharge current of the lightning strikes depends on the sectional shape of the horizontal conductor. In this paper, a new shape is proposed through electric field analysis in order to find the optimum shape that can lower the discharge start voltage according to the sectional shape of the horizontal conductor. Two - dimensional electrostatic field analysis was carried out for the electric field analysis, and the maximum electric field was analyzed at the upper part of the horizontal conductor for comparative analysis. This study is considered to be helpful in designing or constructing horizontal conductors.

Keyword: Corona discharge, Electric field distribution, Electrostatic field, Horizontal lightning conductor. 14. References: 1. Ogawa T. Lightning currents. Handbook of atmospheric electrodynamics, Volume I: CRC Press; 2017. p. 93-136. 2. International Electrotechnical C. Protection of structures against lightning-Part 1 : General principles. IEC 61024-1; 1990. 70-74 3. Lee, Ralph H., “Lightning protection of buildings,” IEEE Transactions on industry applications, 3, 236-240, 1979. 4. Mackerras, D., M. Darveniza, A. C. Liew, “Review of claimed enhanced lightning protection of buildings by early streamer emission air terminals,” IEE Proceedings-Science, Measurement and Technology, 144(1), 1-10, 1997. 5. Rakov, Vladimir A., “Lightning discharge and fundamentals of lightning protection,” Journal of Lightning Research, 4(1), 3-11, 2012. 6. Kip AF., “Positive-point-to-plane discharge in air at atmospheric pressure,” Physical Review, 54(2), 139-146, 1938. 7. Hernandez, Jesus C., Pedro G. Vidal, and Francisco Jurado, “Lightning and surge protection in photovoltaic installations,” IEEE Transactions on power delivery, 23(4), 1961-1971, 2008. 8. Tausanovic M, Ignjatovic M, Cvetic J, Mijajlovic N, Pavlovic D, Heidler F., “Electric field close to lightning channel in the presence of current reflections from the ground,” Mediterranean Conference on Power Generation, Transmission, Distribution and Energy Conversion 2016, 2016. 9. Petersen D, Bailey M, Hallett J, Beasley W., “Laboratory investigation of corona initiation by ice crystals and its importance to lightning,” Quarterly Journal of the Royal Meteorological Society, 141(689), 1283-1293, 2015. 10. Vogel S, Holbøll J., “Discharge characteristics in inhomogeneous fields under air flow,” 25th Nordic Insulation Symposium on Materials. Components and Diagnostics, 2017. 11. Stephan KD, Krajcik R, Martin RJ., “Fluorescence caused by ionizing radiation from ball lightning: Observation and quantitative analysis,” Journal of Atmospheric and Solar-Terrestrial Physics. 148, 32-38, 2016. Authors: Seungmin Jung, Minhan Yoon, Jaewan Suh

Paper Title: Optimal Frequency Regulation V2G Control with DOD of EV Battery 15. Abstract: As the proportion of electric increases, interest in Vehicle to Grid (V2G) service is increasing. Many studies are underway to use V2G for peak shaving and frequency regulation in power system. 75-78 However, V2G can shorten battery cycle life for electric vehicle (EV) which is the most variable part in EV. Hence battery cycle life should be considered in V2G service. As well as the number of discharges, depth of discharge (DOD) also highly affects battery cycle life. High depth of discharge reduces the cycle life of the EV battery exponentially. However, conventional droop control, which has been used for frequency regulation, controls the active power linearly without regard to the DOD. This paper proposes an optimal frequency regulation V2G control which considers the DOD of EV. Proposed method uniformly distributes the discharge for V2G. Therefore battery cycle life is preserved and inconvenience of EV owner from discharge is reduced. The case study result demonstrates the advantages of the proposed method over the conventional droop method. Battery cycle life of entire EV is preserved and energy consumption under V2G is uniformly distributed.

Keyword: Cycle life of battery, Droop control, Electric vehicle, Frequency regulation, Vehicle to Grid References: 1. "Global EV Outlook 2018," International Energy Agency (IEA)2018. https://doi.org/10.1787/9789264302365-en 2. "Electric Vehicle Sales Forecast and the Charging Infrastructure Required Through 2030," Institute for Electric Innovation (IEI)2018. 3. J. A. P. Lopes, F. J. Soares, and P. M. R. Almeida, "Integration of electric vehicles in the electric power system," Proceedings of the IEEE, vol. 99, no. 1, pp. 168-183, 2011. https://doi.org/10.1109/JPROC.2010.2066250 4. Silva and C. J. E. Kieny, Germany: RWE Deutschland AG, "Impacts of EV on power systems and minimal control solutions to mitigate these," 2011. 5. J. C. Gómez and M. M. Morcos, "Impact of EV battery chargers on the power quality of distribution systems," IEEE Transactions on Power Delivery, vol. 18, no. 3, pp. 975-981, 2003. https://doi.org/10.1109/tpwrd.2003.813873 6. J. Taylor, A. Maitra, M. Alexander, D. Brooks, and M. Duvall, "Evaluations of plug-in electric vehicle distribution system impacts," in IEEE PES General Meeting, 2010, pp. 1-6: IEEE. 7. C. Dharmakeerthi, N. Mithulananthan, and T. Saha, "Impact of electric vehicle fast charging on power system voltage stability," International Journal of Electrical Power Energy Systems, vol. 57, pp. 241-249, 2014. https://doi.org/10.1016/j.ijepes.2013.12.005 8. G. Putrus, P. Suwanapingkarl, D. Johnston, E. Bentley, and M. Narayana, "Impact of electric vehicles on power distribution networks," in 2009 IEEE Vehicle Power and Propulsion Conference, 2009, pp. 827-831: IEEE. 9. C. Guille and G. Gross, "A conceptual framework for the vehicle-to-grid (V2G) implementation," Energy policy, vol. 37, no. 11, pp. 4379-4390, 2009. https://doi.org/10.1016/j.enpol.2009.05.053 10. Z. Wang and S. Wang, "Grid power peak shaving and valley filling using vehicle-to-grid systems," IEEE Transactions on power delivery, vol. 28, no. 3, pp. 1822-1829, 2013. https://doi.org/10.1109/tpwrd.2013.2264497 11. J. Y. Yong, V. K. Ramachandaramurthy, K. M. Tan, and N. Mithulananthan, "A review on the state-of-the-art technologies of electric vehicle, its impacts and prospects," Renewable Sustainable Energy Reviews, vol. 49, pp. 365-385, 2015. https://doi.org/10.1016/j.rser.2015.04.130 12. E. L. Karfopoulos and N. D. Hatziargyriou, "Distributed coordination of electric vehicles providing V2G services," IEEE Transactions on Power Systems, vol. 31, no. 1, pp. 329-338, 2016. https://doi.org/10.1109/tpwrs.2015.2395723 13. Y. Saber and G. K. Venayagamoorthy, "Optimization of vehicle-to-grid scheduling in constrained parking lots," in 2009 IEEE Power & Energy Society General Meeting, 2009, pp. 1-8: IEEE. 14. M. Aziz, T. Oda, T. Mitani, Y. Watanabe, and T. Kashiwagi, "Utilization of electric vehicles and their used batteries for peak-load shifting," Energies, vol. 8, no. 5, pp. 3720-3738, 2015. https://doi.org/10.3390/en8053720 15. Duggal and B. Venkatesh, "Short-Term Scheduling of Thermal Generators and Battery Storage With Depth of Discharge-Based Cost Model," IEEE Transactions on Power Systems, vol. 30, no. 4, pp. 2110-2118, 2015. https://doi.org/10.1109/tpwrs.2014.2352333 16. T. Guena and P. Leblanc, "How depth of discharge affects the cycle life of lithium-metal-polymer batteries," in INTELEC 06- Twenty-Eighth International Telecommunications Energy Conference, 2006, pp. 1-8: IEEE. 17. C. Peng, J. Zou, L. Lian, and L. J. A. e. Li, "An optimal dispatching strategy for V2G aggregator participating in supplementary frequency regulation considering EV driving demand and aggregator’s benefits," Applied energy, vol. 190, pp. 591-599, 2017. https://doi.org/10.1016/j.apenergy.2016.12.065 18. W. Kempton et al., "A test of vehicle-to-grid (V2G) for energy storage and frequency regulation in the PJM system," Results from an Industry-University Research Partnership, vol. 32, 2008. 19. P. Kundur, N. J. Balu, and M. G. Lauby, Power system stability and control. McGraw-hill New York, 1994. 20. B. M. Weedy, B. J. Cory, N. Jenkins, J. B. Ekanayake, and G. Strbac, Electric power systems. John Wiley & Sons, 2012. 21. C. D. White and K. M. Zhang, "Using vehicle-to-grid technology for frequency regulation and peak-load reduction," Journal of Power Sources, vol. 196, no. 8, pp. 3972-3980, 2011. https://doi.org/10.1016/j.jpowsour.2010.11.010 Authors: Dennis Agyemanh Nana Gookyi, Kwangki Ryoo

Paper Title: The Hardware Design and Implementation of a Key Exchange Protocol for Low-cost IoT Devices Abstract: The General Data Protection Regulation (GDPR) which was enforced in May 2018 clearly stated that the protection of data by organizations is a mandatory task. Protecting or securing data on data collecting and sensing devices used in the Internet-of-Things (IoT) platform is a challenge for the fact that the devices are resource-constrained in terms of operation frequency, hardware area, computational complexity, and power consumption. The first step to securing data on low-cost IoT devices is to generate keys for subsequent encryption and authentication. This paper, therefore, proposes and implements a lightweight key exchange protocol with the capability of authenticating the generated key without the need for public-key cryptography. 16. The protocol is meant to be simple and make use of minimal hardware resources. It uses components such as the pseudorandom number and bit generators, dot product, XOR gates, shift registers and basic logic gates making it 79-85 very resource-efficient. The hardware architecture of the protocol was implemented using Verilog Hardware Description Language (HDL) and synthesized using Xilinx ISE 14.7 software which includes XPower Analyzer for power estimation. The protocol was tested on a Field Programmable Gate Array (FPGA) board with a synthesizable Reduced Instruction Set Computer Five (RISC-V) processor core. The synthesis and simulation results which include area, maximum frequency, latency, and power consumption show that the protocol is suitable for IoT low-cost devices as compared to standard public-key primitives.

Keyword: Hardware Design, IoT, Key Exchange Protocol, Low-cost Devices, RISC-V, Synthesizable Processor. References: 1. The European Parliament and the Council of the European Union, “Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation),” Official Journal of the European Union, vol. 59, Apr. 2016, pp. 1–88. 2. J. Guth, U. Breitenbucher, M. Falkenthal, P. Fremantle, O. Kopp, F. Leymann, and L. Reinfurt, A Detailed Analysis of IoT Platform Architectures: Concepts, Similarities, and Differences. Internet of Everything (Technology, Communication, and Computing), Singapore: Springer, 2018, ch. 4. 3. L. Adleman, A. Shamir, and R. Rivest, “A Method for Obtaining Digital Signatures and Public-key Cryptosystems,” Communication of the ACM, vol. 21, Feb. 1978, pp. 120–126. 4. W. Diffie and M. Hellman, “New Directions in Cryptography,” Communication of the ACM, vol. 22, Nov. 1976, pp. 642–643. 5. J. S. Coron, A. Gouget, P. Paillier, and K. Villegas, A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications. Financial Cryptography and Data Security, Berlin: Springer, 2010, ch. 11. 6. Shamir, “RSA for Paranoids,” CryptoBytes (The Technical Newsletter of RSA Laboratories), vol. 1, Aug. 1995, pp. 1–16. 7. National Institute of Standards and Technology, “Advanced Encryption Standard (AES),” Federal Information Processing Standards, vol. 197, Nov. 2001, pp. 1–51. 8. J. E. Juan, L. Jon, L. Janire, and R. D. G. Jonathan, “A Lightweight Authenticated Key Exchange for Class 0 Devices,” International Journal of Distributed Sensor Networks, vol. 12, May. 2016, pp. 1–5. 9. J. P. Aumasson and D. J. Bernstein, “A Fast Short-Input PRF,” Lecture Notes in Computer Science, vol. 7668, May. 2012, pp. 489–508. 10. K. K. Ahmad, Session-HB: Improving the Security of HB+ with a Session Key Exchange. Innovation and Interdisciplinary Solutions for Underserved Areas, International: Springer, 2018, ch. 1. 11. J. Ari and A. W. Stephen, “Authenticating Pervasive Devices with Human Protocols,” Lecture Notes in Computer Science, vol. 3621, May. 2005, pp. 293–308. 12. P. L. Pedro, C. H. C. Julio, M. E. T. Juan, and R. Arturo, “Advances in Ultralightweight Cryptography for Low-cost RFID Tags,” Lecture Notes in Computer Science, vol. 5379, May. 2008, pp. 56–68. 13. Waterman, Y. Lee, D. A. Patterson, and K. Asanovic, “The RISC-V Instruction Set Manual, Volume I: User-Level ISA, Version 2.1,” University of California at Berkeley/Department of Electrical Engineering and Computer Science Technical Reports, vol. 2016, Sep. 2016, pp. 1–133. 14. S. Yosra, O. Alexis, Z. Djamal, and L. Maryline, “Lightweight Collaborative Key Establishment Scheme for the ,” Computer Networks, vol. 64, Feb. 2014, pp. 273–295. 15. J. H. Nicholas and B. Manuel, “Secure Human Identification Protocols” Lecture Notes in Computer Science,” Lecture Notes in Computer Science, vol. 2248, May. 2001, pp. 52–66. 16. D. A. N. Gookyi and K. K. Ryoo, “Hardware Design and Analysis of HB Type Lightweight Authentication Protocol for Pervasive Devices,” Journal of Pure and Applied Mathematics, vol. 118, Feb. 2018, pp. 1927–1946. 17. Rafael, C. G. Candido, S. Juan, and Z. Antonio, “Algorithms for Lightweight Key Exchange,” Sensors, vol. 17, Feb. 2017, pp. 1– 14. 18. R. N. Boateng and K. K. Ryoo, “ASIC Design of Low Area RSA Crypto-core Based on Montgomery Multiplier,” International Journal of Engineering and Technology, vol. 7, Mar. 2018, pp. 278–283. 19. G. P. Byung and W. S. Kyung, “A Hardware Implementation of Public-key Cryptographic Processor for 233-bit Elliptic Curve Over Binary Field,” IDEC Journal of Integrated Circuits and Systems, vol. 4, Jul. 2018, pp. 1–6. 20. F. Armknecht, M. Hamann, and V. Mikhalev, “Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts,” Lecture Notes in Computer Science, vol. 8651, May. 2015, pp. 1–18. 21. Blum, A. Kalai, and H. Wasserman, “Noise-tolerant Learning, the Parity Problem, and the Statistical Query Model,” Journal of the ACM, vol. 50, Nov. 2003, pp. 506–519. 22. K. Mohamed, W. Hau, and P. Arul, “Design and Implementation of a Private and Public Key Crypto Processor for Next- Generation IT Security Applications,” Malaysian Journal of Computer Science, vol. 19, Nov. 2006, pp. 26–45. 23. S. Anissa, Z. Medien, and M. Chiraz, “Design and Implementation of Low Area/Power Elliptic Curve Digital Signature Hardware Core,” Electronics, vol. 19, Mar. 2017, pp. 1–23. 24. Wolf. (2019, Aug 05). PicoRV32 – A Size-Optimized RISC-V CPU [Online]. Available: https://github.com/cliffordwolf/picorv32. Authors: Guard Kanda, Kwangki Ryoo High-Throughput Low-Area Hardware Design of Authenticated Encryption with Associated Data Paper Title: Cryptosystem that Uses Cha Cha20 and Poly1305 Abstract: In this paper, the hardware design of a low area and a high throughput ChaCha20-Poly1305 that performs the dual authentication-encryption function for a secured communication within hardware devices is presented. Cryptographic algorithms- ChaCha20 stream cipher and Poly1305, enhance security margins and achieve higher performance measures on a wide range of software platforms and has proven superior to its counterpart, the AES, in the software domain. This relatively new stream cipher is compared to the benchmark AES, has recently been standardized but their implementations in hardware have had very little to not very desirable results particularly in terms of area. For this reason, it is therefore an active field to make such algorithms hardware friendly. This research presents a compact, low-area and high throughput chacha20- Poly1305 Authenticated Encryption with Associated Data (AEAD) design. The core architecture consists of the 17. ChaCha20-Poly1305 algorithm. The simplified quarter round designed in the proposed architecture uses the addition, rotation and exclusive-or algorithms operators (gates). This proposed architecture provides an 86-94 improvement in the operating frequency and area. The architecture was modeled and simulated with Verilog HDL and Modelsim tools for functional and timing correctness. The hardware architecture designed was synthesized with Xilinx’s Synthesis Tool (XST) and Synopsis’ Design Compiler (DC) using the 0.18µm CMOS standard Cell library. The resulting hardware area in terms of gate equivalent is approximately 11KGE for chacha20 and 21KGE for Poly1305. The design operates at maximum frequency of 420 MHz and 870 MHz for the ChaCha20 and Poly1305 respectively. The proposed design presented in this paper additionally functions at a throughput of approximately 8 Gbps for ChaCha20 with an overall efficiency of 2.35 Kbps/GE when ChaCha20 and Poly1305 are combined into the AEAD_ChaCha20_Poly1305 authenticated encryption core.

Keyword: ChaCha20, Poly1305, Stream Ciphers, ASIC, FPGA References: 1. M. Jackob, “History of Encryption” SANS Institute Information Security Reading Room, Maryland, USA, Available: https://www.sans.org/reading-room/whitepapers/vpns/history-encryption-730 2. M. A. Alomari, K. Samsudin, A. R. Ramli, “A Study on Encryption Algorithms and Modes for Disk Encryption,” in International Conference on Signal Processing Systems. Singapore, May. 2009, pp. 793-797, 3. D. DeLong, “How the NSA pinpoints a mobile device”, Washington Post, Sept. 2006. Available: https://www.documentcloud.org/documents/888710-gsm-classification-guide-20-sept-2006.html 4. “The eSTREAM Project”, Sept. 2008. Available from: https://www.documentcloud.org/documents/888710-gsm-classification- guide-20-sept-2006.html 5. “ECRYPT - European Network of Excellence in Cryptography”. Available from: http://www.ecrypt.eu.org/ecrypt1 6. S. Babbage, C. De Cannìere, A. Canteaut, C. Cid, C. Paar, G. Henri, T. Johansson, M. Parker, B. Preneel, V. Rijmen, M. Robshaw, H. Wu, “eSTREAM Short Report on the End of the Second Phase”, Mar. 2012. Available from: http://www.ecrypt.eu.org/stream/PhaseIIreport.pdf 7. D. J. Bernstein, “Chacha, a variant of salsa20”, Illinois, Jan. 2008. Available from: http://cr.yp.to/chacha.html 8. D. J. Bernstein, “The Salsa20 family of steam ciphers” in Robshaw, M., Billet, O. (Eds.), New Stream Cipher Design: the eSTREAM Finalist. LNCS, 4986(0302-9743): Jul. 2008, pp. 84-97, https://doi.org/10.1007/978-3-540-68351-3_8 9. Y. Nir, A. Langley “ChaCha20 and Poly1305 for IETF Protocols” IETF RFC 7539, May. 2015. Available: https://tools.ietf.org/html/rfc7539 10. D. J. Bernstein, “The Poly1305-AES message-authentication code” In Gilbert H., Handschuh H. (Eds): Proceedings of Fast Software Encryption, 3557, Feb. 2005, pp. 32-49, Available: https://doi.org/10.1007/11502760_3 11. D. J. Bernstein, T. Lange, P. Schwabe, “The security impact of a New Cryptographic Library” In Hevia A., Neven G. (Eds): Progress in Cryptology – LATINCRYPT, 7533, Oct. 2012, pp. 159-178, Available: https://doi.org/10.1007/978-3-642-33481- 8_9 12. E. Bursztein, “Speeding up and strengthening HTTPS connections for Chrome on Android”, Apr. 2014. Available from: https://security.googleblog.com/2014/04/speeding-up-and-strengthening-https.html 13. J. Deschamps, J. L. Imana, G. Sutter, Hardware Implementation of Finite-Field Arithmetic, McGraw Hill, 2009. 14. A. Freire, P. Karlton, P. Kocher. “The Secure Sockets Layer (SSL) Protocol Version 3.0”, IETF RFC 6101,2011. Available from: https://tools.ietf.org/html/rfc6101/. 15. B. Mihir, N. Chanathip, “Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm”, Journal of Cryptology, 21(4), Jul. 2008, pp.469-491, Available: https://doi.org/10.1007/s00145-008-9026-x 16. H. Mahdizadeh, M. Masoumi, “Novel Architecture for Efficient FPGA Implementation of Elliptic Curve Cryptographic Processor Over GF (2163)”, In: IEEE Transaction on Very Large-Scale Integration (VLSI) Systems, 21(12), 2013. pp. 2330- 2333, Available: https://doi.org/10.1109/TVLSI.2012.2230410 17. L. Henzen, F. Carbognani, N. Felber, W. Fichtner, “VLSI Hardware Evaluation of the Stream Ciphers Salsa20 and ChaCha, and the Compression Function Rumba”, 2nd International Conference on Signals, Circuits and Systems, Dec. 2008, pp.1-5. https://doi.org/10.1109/ICSCS.2008.4746906 18. G. Kanda, K. Ryoo, “Securing Ubiquitous Hardware Devices with Elliptic Curve Integrated Encryption Scheme”, Journal of Advanced Research in Dynamical and Control Systems, 10(14-SI), Dec. 2018, pp. 314-324. Authors: Hongkyun Jung, Kwangki Ryoo

Paper Title: A Low-Cost Complexity Intra Prediction Hardware Architecture for HEVC Decoder Abstract: High Efficiency Video Coding (HEVC) adopts new techniques to reduce bit-rate by 50% over a previous video compression standard. The number of intra prediction modes in HEVC is 35 modes and increased compared with the compression. Therefore, hardware architecture with equation and a fast filter coefficient generation algorithm is proposed for low complexity intra prediction hardware. The proposed architecture performs a smoothing filter, interpolation filter, generation of predicted pixels with only Common Operation Unit (COU). Various equations in intra prediction for smoothing filter of reference samples, calculating the average of the reference samples, generating predicted pixels and filtering predicted pixels is modified to one common equation. The common operation unit using a common equation in intra prediction hardware architecture reduces hardware area and the number of computational operators to perform various equations. COU uses 2 multipliers, 9 adders, 3 shifters and generates 1 predicted sample in planar mode and 2 predicted samples in the other mode. Also, COU generates 2 filtered reference samples in filtering operation of reference samples and the average of 4x4 PU in DC mode. The fast filter coefficient generation algorithm reduces processing time by using only Look-Up Table (LUT) and adders, instead of multiplying operation and 18. the number of computational operators. The number of gates of the architecture is 45.6k. The number of gates in the proposed intra prediction hardware is 36.7% less than previous architecture. 95-100

Keyword: HEVC, Intra Prediction, Common Operation Unit, Fast Filter Coefficient Generation, Hardware Architecture. References: 1. G. J. Sullivan, J. R. Ohm, W. J. Han, and T. Wiegand, “Overview of the High Efficiency Video Coding (HEVC) Standard,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, Dec. 2012, pp. 1649–1668. 2. D. Zhou, S. Wang, H. Sun, J. Zhou, Y. Zhao, J. Zhou, S. Zhang, S. Kimura, T. Yoshimura, and S. Goto, “An 8K H.265/HEVC Video Decoder Chip with a New System Pipeline Design,” IEEE Journal of Solid-State Circuits, vol. 52, Jan. 2017, pp. 113–126. 3. T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra, “Overview of the H.264/AVC Video Coding Standard,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, Jul. 2003, pp. 560–576. 4. M. Tikekar, C. T. Huang, C. Juvekar, V. Sze, and A. P. Chandrakasan, “A 249-Mpixel/s HEVC Video-Decoder Chip for 4K Ultra-HD Applications,” IEEE Journal of Solid-State Circuits, vol. 49, Jan. 2014, pp. 61–72. 5. J. Lainema, F. Bossen, W. J. Han, J. M. Min, and K. Ugur, “Intra Coding of the HEVC Standard,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, Dec. 2012, pp. 1792–1801. 6. F. Li, G. Shi, and F. Wu, “An efficient VLSI architecture for 4×4 intra prediction in the High Efficiency Video Coding (HEVC) standard,” 18th IEEE International Conference on Image Processing, Brussels, Belgium, Sep. 2011. 7. P. T. Chiang, Y. C. Ting, H. K. Chen, S. Y. Jou, I. W. Chen, and H. C. Fang, “A QFHD 30-frames/s HEVC Decoder Design,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 26, Apr. 2016, pp. 724–735. 8. M. Abeydeera, M. Karunaratne, G. Karunaratne, K. D. Silva, and A. Pasqual, “4K Real-Time HEVC Decoder on an FPGA,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 26, Jan. 2016, pp. 236–249. 9. J. Zhou, D. Zhou, H. Sun, and S. Goto, “VLSI architecture of HEVC intra prediction for 8K UHDTV applications,” IEEE International Conference on Image Processing, Paris, France, Oct. 2014. 10. C. T. Huang, M. Tikekar, and A. P. Chandrakasan, “Memory-Hierarchical and Mode-Adaptive HEVC Intra Prediction Architecture for Quad Full HD Video Decoding,” IEEE Transactions on Very Large Scale Integration Systems, vol. 22, Jul. 2014, pp. 1515–1525. 11. HM 7.1 Reference Software, Available: http://hevc.kw.bbc.co.uk/trac/browser/tags/HM-10.0 Authors: EunHwa Kim

Paper Title: Qualification of Cluster Header and Cluster Member in Wireless Sensor Networks Abstract: Many researches have been proposed for efficiency of data transmission from sensor nodes to sink node for energy efficiency in wireless sensor networks. Among them, cluster-based methods have been preferred In this study, we used the angle formed with the sink node and the distance of the cluster members to calculate the probability of cluster head. Each sensor node sends measurement values to header candidates, and the header candidate node measures the probability value of the header with the value received from its candidate member nodes. To construct the cluster members, the data transfer direction is considered. We consider angle, distance, and direction as cluster header possibility value. Experimental results show that data transmission is proceeding in the direction of going to the sink node. We calculated and displayed the header possibility value of the neighbor nodes of the sensor node and confirmed the candidates of the cluster header for data transfer as the value. In this study, residual energy amount of each sensor node is not considered. In the next study, we calculate the value considering the residual energy amount of the node when measuring the header possibility value of the cluster.

Keyword: Wireless Sensor Networks, Clustering, Cluster Head, Cluster Member, Energy Efficiency References: 1. G. Anastasi, M. Conti, M. Francesco and A. Passarella, “Energy Conservation in Wireless Sensor Networks: A survey”, Ad Hoc Networks, vol.7, no. 3, 2009 May, pp. 537-568. Available: https://doi.org/10.1016/j.adhoc.2008.06.003 2. Beom-Su Kim, HoSung Park, KyongHoon Kim, Daniel Godfrey and Ki-Il Kim, “A Survey on Real-Time Communications in Wireless Sensor Networks”, Wireless Communications and Mobile Computing, 2017 October, pp. 1-14. Available: https://doi.org/10.1155/2017/1864847 3. Kemal Akkaya and Mohamed Younis, “A survey on routing protocols for wireless sensor networks”, Ad Hoc Networks, vol.3, 19. no. 3, 2005 May, pp. 325–349. Available: https://doi.org/10.1016/j.adhoc.2003.09.010 4. A.A. Abbasi and M. Younis, “A survey on clustering algorithms for wireless sensor networks”, Computer Communications 30, vol.30, no. 14, 2007 October, pp. 2826–2841. Available: https://doi.org/10.1016/j.comcom.2007.05.024 101-105 5. Santar Pal Singh and S.C. Sharma, “A Survey on Cluster Based Routing Protocols in Wireless Sensor Networks”, in International Conference on Advanced Computing Technologies and Applications, vol. 45, 2015, pp. 687–695. Available: https://doi.org/10.1016/j.procs.2015.03.133 6. Asim Zeb1, A. K. M. Muzahidul Islam1, Mahdi Zareei1, Ishtiak Al Mamoon2, Nafees Mansoor3 and Sabariah Baharun1, “Clustering Analysis in Wireless Sensor Networks: The Ambit of Performance Metrics and Schemes Taxonomy”, International Journal of Distributed Sensor Networks, vol. 12, no. 7, 2016 July, pp. 1-24. Available: https://doi.org/10.1177/155014774979142 7. S. Pal Singh and S.C. Sharma, ”A Survey on Cluster Based Routing Protocols in Wireless Sensor Networks”, in International Conference on Advanced Computing Technologies and Applications(ICACTA), vol. 45, 2015, pp. 685-695. Available: https://doi.org/10.1016/j.procs.2015.03.133 8. W. B. Heinzelman, A. Chandrakasan and H. Balakrishanan, ”An application-specific protocol architecture for wireless microsensor networks”, IEEE Transactions on Wireless Communication, vol. 1, no. 4, 2002 October, pp. 660–670. Available: https://doi.org/10.1109/TWC.2002.804190 9. O. Younis and S. Fahmy, “HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks”, IEEE Transactions on Mobile Computing, vol. 3, no. 4, 2004, pp. 366-379. Available: https://doi.org/10.1109/TMC.2004.41 10. S. Lindsey and C. Raghavendra, “Pegasis: Power-efficient gathering in sensor information systems”, in Proceedings of IEEE Aerospace Conference, vol. 3, 2002 March, pp. 1125–1130. Available: https://doi.org/10.1109/AERO.2002.1035242 11. Y.Xu, J. Heidemann and D.Estrin, “Geography-informed Energy Conservation for Ad Hoc Routing “, in Proceeding of the 7th annual international conference on Mobile computing and networking, 2001, pp. 70-84. Available: https://doi.org/10.1145/381677.381685 12. H. O. Tan and I. Korpeoglu, “Power efficient data gathering and aggregation in wireless sensor networks”, SIGMOD Record, vol. 32, no. 4, 2003 December, pp. 66–71. Available: https://doi.org/10.1145/959060.959072 13. Zhao Han, Jie Wu, Jie Zhang, Liefeng Liu and Kaiyun Tian, “A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network”, IEEE Transactions on Nuclear Science, vol. 61, no. 2, 2014 April, pp. 732-740. Available: https://doi.org/10.1109/TNS.2014.2309351 14. EunHwa Kim, “Cluster Formation with Forwarding Direction at Multi-hop Clustering Model in a Wireless Sensor Networks”, Advanced Science Letters, vol. 23, no. 10, 2017 October, pp. 10293-10297. Available: https://doi.org/10.1166/asl.2017.10438 15. EunHwa Kim, “Cluster Head Selection Elements in a Wireless Sensor Networks”, in International Conference on Next Generation Computer and Information Technology (NGCIT2018), 2018 August. Authors: Won-Jong, Kim, Su-Jeong, Pyeon, Ha-Young, Song, Sang-Soo, Lee

Paper Title: Properties of Lightweight Matrix according to Different Types of Alkali Stimulants Abstract: Recently, lightweight wall systems have been used mainly due to the appearance of flexible 20 buildings, but EPS, which is flammable, is the main material. The damage caused by toxic gas in fire is recognized as a problem. NaOH, KOH and Ca(OH)2 were used as alkali stimulants and the properties of the matrix were evaluated 106-111 according to the addition ratio of alkali stimulants. The addition of an alkali stimulant increases the pH and increases the alkali activity of the blast furnace slag, thereby changing the performance of the matrix. When NaOH and KOH are used as alkali stimulants, the density of the cured product is low and the incidence of the internal void of the cured product is high. When Ca(OH)2 is used as an alkali stimulant, it shows the best performance when measuring pH, setting time, and strength. This seems to be due to the ionization degree of the (OH) group. However, the incidence of voids was the lowest. When NaOH and KOH are used as alkali stimulants, the density of the cured product is low and the incidence of the internal void of the cured product is high. When Ca(OH)2 is used as an alkali stimulant, it shows the best performance when measuring pH, setting time, and strength. This seems to be due to the ionization degree of the (OH) group. However, the incidence of voids was the lowest.

Keyword: Lightweight matrix, Alkali stimulants, pH, Setting time, Strength, Density, Porosity References: 1. Sandwich panels and fire hazards, 2018. Retrieved from http://blog.daum.net/belief 137/17433708. 2. So, T,S. A Basic Study on Development of Legal Requirement for Fire Proofing of External Composite Panel and Joints. Masters dissertation. Tongmyong University, Busan, Korea. 2014. 3. Lee, K.P. Non-cement Eco-friendly Lightweight Composite Panel Properties of Utilizing the Waste Resources. Masters dissertation. Hanbat University, Daejeon, Korea. 2012. 4. Kim, Y.M. Foaming Properties of Lightweight Matrix using Paper Ash based on Blast Furnace Slag. Masters dissertation. Hanbat University, Daejeon, Korea. 2015. 5. Lee, S.S. Study on the Strength and Flowing Properties of Cementless Type Eco-friendly Inorganic Composites by Using Alkali Accelerator. Journal of the Architectural Institute of Korea Structure & Construction, 26(5), 67-74. 2019. http://www.dbpia.co.kr/Journal/ArticleDetail/NODE01445079#. 6. Park, S.K., Kim, Y.M., & Lee, S.S. Characteristic of Non Cement Matrix using Alkali Accelerator and Paper Ash. The Korea Institute For Structural Maintenance and Inspection, 13(10), 344-345. 2013. http://db.koreascholar.com/Article?code=2 92365. 7. Kim, Y.S., Moon, D.Y., & Lee, D.W. An Experimental Study on Alkali-Silica Reaction of Alkali-Activated Ground Granulated Blast Furnace Slag Mortars. Journal of the korea institute of building construction, 11(4), 345-325. 2011. http://www.riss.kr/link?id=A82659252. 8. Lee, S.H., & Lee, S.S. Density and Strength Properties of Non-Portland Cement Lightweight Matrix according to Mixing Ratio of Alkali Activator. Journal of the Construction and Environment Research Institute, 10(1), 185-192. 2015. https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002022147. 9. Kim, W.J., Lee, S.H., & Lee, S.S. The Density and Strength Properties According to the Mixing Time of the Lightweight Composites using the Paper Ash. Korea concrete institute, 15(5), 657-658. 2015. http://www.dbpia.co.kr/Journal/ArticleDetail/ NODE06358692. 10. Kim, H.T. Evaluation on the Application Properties of Lightweight Composite Panel Using Low Melting Modified Sulfur (Doctoral dissertation). Hanbat University, Daejeon, Korea. 2018. Authors: Sang-Soo, Lee, Dae-Yeon, Kim

Paper Title: Properties of Matrix using Diatomite Based on Blast Furnace Slag Abstract: we have experimented to reduce fine dust which is a problem in the world. Fine dust is known to cause various diseases in the human body. Diatomite with adsorption characteristics was used to reduce fine dust, which is a source of indoor air pollution. As a binder, blast furnace slag and a circulating fluidized bed combustion boiler fly ash were used to replace cement. The assessment items are flexural strength, compressive strength, flow ability, density, water absorption, fine dust concentration. As the replacement ratio of diatomite increases, the density decreases and the water absorption tends to increase. It is considered that this is due to the porous property of diatomite. Flowability decreased with increasing diatomite replacement ratio. As the replacement ratio of diatomite increased, the amount of air content to increase. As the replacement ratio of diatomite increased, the adsorption performance per minute of fine dust increased. This is because the amount of fine dust adsorbed per specific surface area increased as the replacement ratio of diatomite having porous properties increased. If additional experiments are done and used for finishing materials, it will contribute to the improvement of indoor air quality.

Keyword: Fine dust, Diatomite, Circulating fluidized bed combustion boiler fly ash, Blast furnace slag, 21. Adsorption, Indoor air quality References: 112-116 1. H. W. Park, Y. M. Jo “Regulation Standard of Fine Particles and Control Techniques of Emission Sources” Journal of Korean Society for Atmospheric Environment. 29(4), 486-503, 2013. http://dx.doi.org/10.5572/KOSAE.2013.29.4.486 2. K Straif, A Cohen, J Samet, Air Pollution and Cancer IARC Scientific publication No. 161, 2017. 3. D. Y. Kim, E. A . Jin, “The effects of air pollution (fine dust) on happiness and its monetary value” Journal of Korea Planning Association, 53(4), 205-219, 2018. https://doi.org/10.17208/jkpa.2018.08.53.4.205 4. H. R. Anderson, “Air pollution and mortality: A history” Atmospheric environment. 43(1), 142-152, 2009. https://doi.org/10.1016/j.atmosenv.2008.09.026 5. E. J. Park. “Health Risk Assessment of Fine Particles and Their Hazardous Chemicals” Ph.D Thesis, Dongduk womens university, 2008. 6. J. I. Choe, Y. S. Lee, “A Study on the Impact of PM2.5 Emissions on Respiratory Diseases” Journal of Environmental Policy and Administration.23(4) 155-172, 2015. http://dx.doi.org/10.15301/jepa.2015.23.4.155 7. K. H. Ha, M. N. Suh, D. Y. Kang, H. C. Kim, DC. Shin, CS. Kim, “Ambient Particulate Matter and the Risk of Deaths from Cardiovascular and Cerebrovascular Disease” Clinical Hypertension. 17(2), 74-83, 2011. http://dx.doi.org/10.5646/jksh.2011.17.2.74 8. J. M. Back, S. W. Yee, B. H. Lee, D. H. Kang, M. S. Yeo, K. W. Kim, “A Study on the relationship between the indoor and outdoor particulate matter concentration by infiltration in the winter” Journal of the architectural institute of korea planning & design. 31(9), 137-144, 2015. http://dx.doi.org/10.5659/JAIK_PD.2015.31.9.137 9. S. M. O, “Properties of Eco-Friendly Mortar using Adsorbent to reduce Harmful Gas” master’s thesis, Hanbat National University, 2016. 10. K. H. Kim “Properties of radon-reducing cement matrix using adsorbents” master’s thesis, Hanbat National University, 2018. Authors: Sung-Jin Jeoung, Bong-Hyun Kim Design of Real-time Safety Accident Prevention Solution for Socially Vulnerable using Object Paper Title: Recognition and Tracking Technology Abstract: All countries around the world want to create a safe society and a safe nation. However, crime targeting the socially vulnerable groups continues to increase. This is because the vulnerable groups have physical and physical weaknesses. Therefore, in order to pursue a safe society, it is necessary to protect the socially vulnerable. In this paper, we utilize the latest trend, drones, to protect against vulnerable groups. That is, we designed a real-time accident prevention solution for the elderly, the disabled, children and women using the drones. Drones' autonomous flight technology, obstacle detection technology, collision avoidance technology, wireless communication linkage technology, and real time image transmission technology. Through this, we have studied to enable safe activities in the blind spot of CCTV. In this paper, we have identified the problem of crime prevention system using existing CCTV system. To solve this problem, we have developed a safety accident prevention solution using drones. To this end, we designed the drones to enable real-time tracking by applying autonomous flight technology, obstacle avoidance technique, and object tracking technology. In addition, wireless communication between the object and the drone was applied to prevent flight deviation. And, it is designed to link emergency notification service through real-time video transmission during flight.

Keyword: Safety prevention system, Real-time safety, Drone, Obstacle avoidance, Object tracking, Object recognition. References: 1. N. J. Park, M. R. Kim, “Implementation of load management application system using smart grid privacy policy in energy management service environment,” Clust. Comput., Vol. 17, No. 3, 2014, pp. 653–664. 2. M. Aguado, E. Jacob, J. Matias, C. Conde, Berbineau M, “Deploying CCTV as an Ethenet service over the WiMAX mobile network in the public transport scenario,” Proceedings of IEEE International Conference on Communications Workshops, 2009. 22. 3. Beyan, Cigdem, A. Temizel, “Adaptive mean-shift for automated multi object tracking,” IET Comput. Vis., Vol. 6, No. 1, 2012, pp. 1–12. 4. Y. S. Park, “A Study on the Criminal Victim Compensation Program in Korea,” Correctional welfare research, Vol. 25, 2012, pp. 117-122 117-141. 5. C. Harris, P. Jones, D. Hillier, D. Turner, “CCTV surveillance systems in town and city centre management,” Property Management, Vol. 16, No. 3, 1998, pp. 160–165. 6. H. Kim, “Current Situation and Countermeasures of Purchasing Sex from Children or Juveniles,” Korean Journal of Criminology, Vol. 29, No. 3, 2007, pp. 67-90. 7. S. Rusitschka, K. Eger, C. Gerdes, “Smart grid data cloud: A model for utilizing cloud computing in the smart grid domain,” First IEEE International Conference on Smart Grid Communications (SmartGridComm), Vol. 1, No. 1, 2010, pp. 483–488. 8. Dario Floreano, J. Robert, “Wood. Science, technology and the future of small autonomous drones,” Nature, Vol. 521, 2015, pp. 460-466. 9. H. Lim, J. M. Park, D. W. Lee, H. J. Kim, “Build your own quadrotor: Open-source projects on unmanned aerial vehicles,” IEEE & Automation Mag., Vol. 19, No. 3, 2012, pp. 33-45. 10. Vijay Kumar, Nathan Michael, “Opportunities and challenges with autonomous micro aerial vehicles,” The International Journal of Robotics Research, Vol. 31, No. 11, 2012, pp. 1279-1291. 11. Y. Wang, e. K. Teoh, D. Shen, “Lane detection and tracking using B-Snake,” Image and Vision Computing, Vol. 22, No. 4, 2004, pp. 269-280. 12. Kimberly McGuire, Guido de Croon, Christophe De Wagter, Karl Tuyls, Hilbert Kappen, “Efficient Optical Flow and Stereo Vision for Velocity Estimation and Obstacle Avoidance on an Autonomous Pocket Drone,” IEEE Robotics and Automation Letters, Vol. 2, No. 2, 2017, pp. 1070-1076. 13. H. Hirschmuller, “Stereo processing by semiglobal matching and mutual information,” IEEE Trans. Pattern Anal. Mach. Intell., Vol. 30, No. 2, 2008, pp. 328-341. 14. C. De Wagter, S. Tijmons, B. Remes, G. de Croon, “Autonomous flight of a 20-gram flapping wing MAV with a 4-gram onboard stereo vision system,” Proc. IEEE Int. Conf. Robot. Autom., 2014, pp. 4982-4987. 15. S. Tijmons, G. de Croon, B. Remes, C. De Wagter, M. Mulder, “Obstacle avoidance strategy using onboard stereo vision on a flapping wing MAV,” arXiv:1604.00833, 2016. 16. Peng Yao, Honglun Wang, Zikang Su, “Cooperative path planning with applications to target tracking and obstacle avoidance for multi-UAVs,” Aerospace Science and Technology, Vol. 54, 2016, pp. 10-22. 17. Peng Yao, Honglun Wang, Zikang Su, “Real-time path planning of unmanned aerial vehicle for target tracking and obstacle avoidance in complex dynamic environment,” Aerospace Science and Technology, Vol. 47, 2015, pp. 269-279. Authors: Heonyong Jung

Paper Title: The Nonlinear Interaction of Real Estates and Economic Growth in China Abstract: This paper provides a model for verifying the effects of real estate, because real estate industry has a fairly important position in the Chinese economy. This paper uses the nonlinear optimized techniques to estimate EGARCH(1,1)-GED model. Due to autocorrelation, kurtosis and volatility clustering, this paper adopt the EGARCH(1,1)-GED model. This paper uses monthly data of gross domestic products, housing prices, interest rates, exchange rates, consumer prices and stock price index, and the analysis period is 18 years from 23. January 2000 to December 2017, The empirical findings are as follows. First, the rise in housing prices increases both the return and volatility of GDP growth of China. The empirical findings that changes in housing prices have a greater impact on GDP growth of China than changes in interest rates are consistent to prior studies. 123-126 Second, we found that changes in new housing prices have a relatively greater impact on economic growth than changes in existing housing prices. This empirical result is a new one that has not been found in previous studies. Third, changes in real interest rates have a relatively greater impact on GDP growth in China than changes in normal interest rates. Fourth, in contrast to the significant impact of Beijing’s housing prices on economic growth, the housing prices in Hong Kong has shown insignificant impact on GDP growth in China. According to these findings, real estate development has an effect in the GDP growth of China. In light of the empirical results, China’s policy authorities should monitor the price trends of the new housing prices and make efficient management accordingly.

Keyword: EGARCH Model, Nonlinear Interaction, Real Estates, Volatility. References: 1. Y. Gao, C. Zhang, and L. Zhang, “Comparison of GARCH models based on different distributions,” J. Computers, vol. 7, Aug. 2012, pp. 1967–1973. 2. C. Liu, and W. Xiong, “China’s real estate market,” NBER Working Paper, Nov. 2018, pp. 1-34. 3. L. Hong, “The dynamic relationship between real estate investment and economic growth: Evidence from prefecture city panel data in China,” IERI Procedia, vol. 7, 2014, pp. 2-7. 4. H. Liu, Y. W. Park, and S. Zheng, “The interaction between housing investment and economic growth in China,” International Real Estate Review, vol. 5, Feb. 2002, pp. 40-60. 5. J. Zhang, J. Wang, and A. Zhu, “The relationship between real estate investment and economic growth in China: a threshold effect,” Ann Reg. Sci., vol. 48, Feb. 2012, pp. 123-134. 6. Y. Kong, J. L. Glascock, and Lu-Andrews, “An investigation into real estate investment and economic growth in China: a dynamic panel data approach,” Sustainability, vol. 8, Jan. 2016, pp. 1-18. 7. Y. He, “Analysis of influencing factors to economic in Sichuan province based on Lasso,” Stat Sci. App., vol. 4, Dec 2016, pp. 231-236. 8. J. Li, J. Ji, H. Guo, and L. Chen, “Research on the influence of real estate development on private investment: a case study of China,” Sustainability, vol. 10, Jul. 2018, pp. 1-17. 9. C. Pu, and J. Zhao, “Analysis of the relationship between the real estate fluctuations and economic growth fluctuations,” Adv. Eco Bus Mag Res., Oct. 2018, pp. 490-497. 10. D. B. Nelson, “Conditional heteroscedasticity in asset returns: a new approach,” Econometrica, vol. 59, Mar. 1991, pp. 347-370. 11. P. R. Hansen, and A. Lunde, “A forecast comparison of volatility models: does anything beat a GARCH(1,1)? ,” J App Eco., vol. 20, Mar. 2005, pp. 873-889. 12. T. Bollerslev, “Generalized autoregressive conditional heteroscedasticity,” J. Econ., vol. 31, Apr. 1986, pp. 307-327. Authors: Kim Ki-Hyuk, Do Sung-Lok, Lee Donghoon

Paper Title: Development of the Conceptual Model for Estimating Apartment Sales Price Abstract: In this study, factors affecting the apartment sales rate were selected through review of existing literature and expert advice. Then, the weight of each influence factor was calculated through the survey. In addition, causal maps of each factor on the prevalence rate were drawn to understand the influence relationship of each influential factor. Finally, this study proposes a new apartment sale price calculation method that correctly applies the weights of the influential factors. First, the influencing factors were classified according to apartment size, residential environment, surrounding environment, apartment characteristics, and social environment at the time of purchase. According to the survey results, the main-factors that have the greatest impact on the apartment sale rate are analyzed as surroundings environment, and the main-factor that have the least impact are analyzed as apartment size. Finally, this study proposes a method of estimating the apartment price in the order of 'evaluating each factor, standardization of score using formula, standardized score summation, and determine sale price'. It is important to set the sensitivity of each factor.

Keyword: apartment, sale price, sale ratio, simulation, feasibility study 24. References: 1. O. H. Kwon, J. H. Jung, “An analysis of construction firms’ feasibility study,” Construction&Economy Research 127-132 Institute of Korea, Seoul, 2004, 103 p. 2. B. H. Kwak, “Consistency Check of Pairwise Comparison in Analytic Hierarchy Process:Using the Duplex Outranking Method,” Hanyang University, Seoul, 2007, 35p. 3. H. S. Park, “A Feasible Sale Price Assessment Model of Apartment Housing Units Considering Market Price and Buying Power,” Kyunghee University, Seoul, 2015, 129p. 4. J. K. Park, Y. K. Cho, S. Y. Lee, “PSM based Price Estimating for Local Mixed-Use Apartment Development,” Korea Institute of Construction Engineering and Management, 2014, pp.86-pp.94 5. S. M. Koo, M. W. Jung, “A Basic Study on the Current State and Problems of Feasibility Study:Focused on the Evaluation Criteria of the Existing Relative Researches,” The Architectural Institute of Korea, 2007, pp.79-pp.88 6. H. J. Park, “A Study on the Changes of Real Estate Policies and the Market Response Using Casual Maps,” Chung-Ang University, Seoul, 2018, 92p. 7. T. K. Ha, S. I. Kim, K. H. Kim, “A Quantitative Housing Project Feasibility Test Model Considering Market Factors,” Gyeonggi Research Institute, 2014, pp.5-pp.26 8. C. M. Jung, O. H. Kwon, “A Study on Affecting Price of Apartments and Feasibility by Floor Area Ratio:Focused on Gyeonggi- do Newtown Project Area,” Architectural Institute of Korea, 2009, pp.137-pp.144 9. C. M. Park, “Comparative Analysis of Attributes in Determining Housing Price between the Initial Listed Price and Sale Price in Seoul,” Chung-Ang University, Seoul, 2008, 55p. 10. C. M. Jung, H. J. Hwang, O. H. Kwon, “Housing Environment and Quality According to the Floor Area Ratio,” Gyeonggi Research Institute, Soowon-si, 2009, 106p. Authors: Seonguk Hong, Seunghun Kim, Hyeyoung Kim, Chanwoo Park

Paper Title: Standards for the Diagnosis of Concrete Structures using the Non-destructive Test in South Korea Abstract: As there is a lack of studies on the standards related to safety diagnosis methods for concrete 25. structures and current status of diagnosis standards using the nondestructive test in developed nations, this study aims to compare concrete structure diagnosis standards specifically based on the nondestructive test, identify problems, and propose a direction for improvement. To compare and analyze the domestic and overseas safety 133-138 diagnosis standards for concrete structures, identify problems in the concrete structure diagnosis standards of Korea, and propose directions for improvement.

Keyword: Concrete structure, Diagnosis, Non-destructive test, Standards References: 1. H. Y. Kim, S. U. Hong. “Status of Diagnosis Standards of Concrete Structures Using Nondestructive Test Methods” in Conference Proceeding of Korea Institute for Structural Maintenance and Inspection. Autumn, 2016, pp. 43-44. Available: http://db.korea scholar.com/ article.aspx? code=317070 2. J. A. Cho, G. J. Go, C. S. Lee. “Improvement to Problem of Building safety inspection and precise safety diagnostics” in Korea Institute of Construction Management. vol.10, 2015, pp. 122-126. 3. J. B. Lee. “Problem Analysis and Improvements Based on Case Studies on Report of Detailed Building Inspections” Master’s Thesis. Chung-Ang University, 2014. 4. B. T. Jeong. “Problem Analysis and Improvements Based on Case Studies on Report of Detailed Building Inspections” Master’s Thesis, Chung-Ang University, 2013. 5. M. S. Kim. “Improvement of Reliability in The Evaluation of structural Safety Check for Buildings” Master’s Thesis, Incheon University, 2012. 6. S. Y. Hwang. “A Study on the Improvement of Safety Diagnosis in Reinforced Concrete Structures” Master’s Thesis, Dongguk University, 2009. 7. C. H. Son, S. W. Hong, Y. S. Ahn. “Application of Safety Diagnosis in Small and Medium Scale Remodeling Construction” Journal of Regional Association of Architectural Institute of Korea, vol.9 (1), 2007, pp. 171-178. 8. Y. J. Kim. “A Comparative Legal Study on Construction Safety Legislation in United States of America” Korea Legislation Research Institute. 2015, pp. 1-95. 9. Y. H. Kim. “Nondestructive Testing of Concrete Structure” in Journal of the Korean society for nondestructive testing, vol.20 (4), 2000, pp. 329-341. Available: http://www.dbpia.co.kr/Article/NODE02211109. 10. Y. H. Kim. “A Comparative Legal Study on Construction Safety Legislation in United Kingdom” in Korea Legislation Research Institute, 2015, pp. 1-154. 11. H. B. Kim. “A Study for the Newest Tendency Seizing and Development Object of Nondestructive Inspection and Smart Technology in Concrete Structures” in Daejeon University. 12. H. J. Kim. “A Study on the Problems and Improvement of Building Maintenance and Management Inspection Manual” Master’s Thesis. Seoul National University of Science and Technology, 2015. 13. C. J. Na. “A Comparative Legal Study on Construction Safety Legislation in Japan” in Korea Legislation Research Institute, 2015, pp. 1-82. 14. H. J. Yoon. “A Study on Building Maintenance Institutionalization by Comparing with the Foreign Countries' Cases” in Journal of the Korean Society of Civil Engineers, vol.31 (6D), 2011, pp. 857-865. 15. H. J. Yoon. “A Study on the Improvement of Building Maintenance System - Focusing on Comparison with Japanese Case” in Journal of the Korean Society of Civil Engineers, vol.35 (3), 2015, pp. 737-745. Available: DOI: http://dx.doi.org/10.12652/Ksce.2015.35.3.0737. 16. J. Y. Jeon. “Systematization of domestic building maintenance field and Direction for Advancement” in Construction engineering and management, vol. 8 (5), 2007, pp. 19-21. 17. ASTM C 1383-15. “Standard test method for measuring the P-wave speed and the thickness of concrete plates using the impact echo method” in American Society for Testing and Materials, 2015. Avail -able: DOI: 10.1520/C1383-15. https://www.astm.org /Standards/C 1383.htm. 18. ACI 228.2R-13. “Nondestructive test methods for evaluation of concrete in structures” in American Concrete Institute Committee 228, 2013. Available: https://www.concrete.org/Portals/0/Files/PDF/Previews/ 228 213.pdf. 19. ASTM C 597-16. “Standard test method for pulse velocity through concrete” in American Society for Testing and Materials, 2016. Available: DOI: 10.1520/C0597-16. https://www.astm.org/ Standards Authors: Kim Minkyeong Effects of Smartphone Addiction Prevention Program on Smartphone Addiction Tendency and Self- Paper Title: Control of Children using Local Children's Centers Abstract: The current research takes those children using local children’s centers as subjects of research, and aims to identify the effect of preventive education programs for smartphone addiction on their addiction and self-control. SPSS version 22.0 for Windows was used for data analysis to develop kinder teacher treatment play therapy for kindergarten children. Among nonparametric statistical methods, the Mann-Whitney U Test and the Wilcoxon Singed-Rank Test were conducted. The results of this study are summarized as follows. The analysis of the subjects' smartphone addiction found that the educational program did produce a significant difference. Second, it was also found in the examination of the preventive educational program on the subjects’ self-control that a significant increase was obtained in all the 6 factors of thoughtfulness, task tolerance, resistance against temptations, emotional control, friend-related control and teacher-related control. This study shows that it is expected that further researches would follow with a group of lower-class elementary students and ordinary children to come a more generalized conclusion. 26. Keyword: Smartphone Addiction Tendency, Self-Control, Local Children's Center 139-142 References: 1. R. D. Conger, J. A. McCarty, R. K. Yang, B. B. Lahey, J. P. Kropp, “Perception of child, child-rearing values, and emotional distress as mediating links between environmental stressors and observed maternal behavior” Child development, 2234-2247, 1984. 2. M. R. Gottfredson, T. Hirschi, A general theory of crime: Stanford University Press, 1990. 3. M. J. Shanahan, A. Davey, J. Brooks, “Dynamic models of poverty and psychosocial adjustment through childhood” Journal of Human Resources, 36, 500-519, 1998. 4. N. J. Salkind, C. F. Nelson, “A note on the developmental nature of reflection–impulsivity” Developmental psychology, 16(3), 237-238, 1980. 5. K. T. Oh, J. E. Lee, “Samart life revolution and smartphone addiction” Internet and Information Security, 3(4), 21-43, 2012. 6. P. C. Kendall, L. E. Wilcox, “Self-control in children: Development of a rating scale” Journal of consulting and clinical psychology, 47(6), 1020-1029, 1979. 7. National Information Association. Development of smartphone addiction, 1997. 8. C. B. Kopp, “Antecedents of self-regulation: A developmental perspective” Developmental psychology, 18(2), 199-214, 1982. 9. Mischel HN, Mischel W. “The development of children's knowledge of self-control strategies” Child development. 1983; 603- 619. 10. D. L. Newman, A. Caspi, T. E. MoffittTE, P. A. Silva, “Antecedents of adult interpersonal functioning: Effects of individual differences in age 3 temperament” Developmental psychology, 33(2), 206-217, 1997. 11. G. R. Patterson, “Performance models for antisocial boys” American psychologist. 41(4), 432-444, 1986. Authors: Kee Joo Kim, Tae-Kook Kim

Paper Title: Big Data Accumulation of L-Shape Extruded Alloys for Interior Parts for High-Speed Trains Abstract: L-Shape extruded alloys were manufactured by adopting aluminum alloy as the candidate lightweight alloy to be used for interior and exterior materials of high-speed trains. The cast product was extruded using the air slip (AS) casting method and the direct casting (DC) method. The product was again heat- treated with T5 or T6 tempering. According to literature research, the candidate alloys were selected as 6063, 6N01, 6061, 6060, 6005 and 5083 alloys. These alloys were extruded after casting and heat-treated and their properties such as the hardness, microstructure and tensile properties were evaluated. The hardness, microstructure and tensile properties of the selected 6063, 6N01, 6061, 6005 and 5083 aluminum alloys in the present study are similar to those of external materials made by Alcan, Canada. Mechanical properties of the extruded materials were comparable to those of external materials (manufactured by Canada, Alcan). The hardness, microstructure, and extrusion characteristics of AA6063, AA6N01, AA6061, AA6005, AA6060 and AA5083 alloys selected in the present study through literature review are similar to those of external materials (Canada, Alcan). By performing extrusion, under the conditions of high-speed railway, the process conditions for manufacturing extruded materials with complicated shape to meet the requirements of vibration resistance and airtightness have been established. Therefore, it was proved to be sufficient as the interior and exterior materials of high-speed train.

27. Keyword: Extrusion, Interior Parts, High-Speed Trains, Casting, Aluminum Alloys, Tensile References: 1. M K. J. Kim & S. T. Won, “Cast and Characterization of Light-Weight Aluminum Alloys for Interior & Exterior Parts of 143-148 High Speed Train” Transaction of KSMT. 20(1). 12–17, 2018. 2. K. Vasudevan. & R. D. Doherty; Academic press, “Aluminum Alloys-Contemporary Research and Applications” Treatise on Materials Science and Technology. 31, 1989. 3. W.-K. Kim. S.-T. Won. B.-C. Goo, “A Study on Mechanical Characteristics of the Friction Stir Welded A6005-T5 Extrusion” Int. J. of Precision Eng. And Manufacturing. 11(6). 931–936, 2010. https://doi.org/10.1007/s12541-010-0113-1 4. K. J. Kim, “Characterization of Cast Alloys for Interior & Exterior Parts of High Speed Train” Transaction of KSME A. 42(7). 637–642, 2018. 5. Combe, E., Guilmeau, E., Savary, E., Marinel, S., Cloots, R., Funahashi, R., & Boschini, F, “Microwave sintering of Ge- doped In2O3 thermoelectric ceramics prepared by slip casting process” Journal of the European Ceramic Society, 35(1), 145-151, 2015. https://doi.org/10.1016/j.jeurceramsoc.2014.08.012 6. Ortiz, A. L., Candelario, V. M., Moreno, R., & Guiberteau, F, “Near-net shape manufacture of B4C–Co and ZrC–Co composites by slip casting and pressureless sintering” Journal of the European Ceramic Society, 37(15), 4577-4584, 2017. https://doi.org/10.1016/j.jeurceramsoc.2017.07.024 7. Pelegrini, L., Junior, L. E. V., Neto, J. B. R., & Hotza, D, “Direct coagulation casting of nano-8YSZ powder suspensions using nano-MgO as coagulating agent” Ceramics International, 43(1), 316-323, 2017. https://doi.org/10.1016/j.ceramint.2016.09.158 8. Mortensen, D., Henriksen, B. R., M’Hamdi, M., & Fjær, H. G, ”Coupled modelling of air-gap formation and surface exudation during extrusion ingot DC-casting. In Essential Readings in Light Metals” (pp. 812-818). Springer, Cham, 2016. 9. K. J. Kim & S. T. Won, “Characterization of Aluminum 6xxx Series Extruded Alloys for Interior & Exterior Parts of High Speed Train” Transaction of KSMT. As submitted, 2018. 10. Xin, R., Wang, M., Liu, Z., Chen, X., Huang, G., & Liu, Q, “Evaluation of Textural Effect on the Rollability of AZ31 Alloys by Wedge‐Shaped Sample Design” Advanced Engineering Materials, 19(7), 1700035, 2017. https://doi.org/10.1002/adem.2017000 Authors: Young-Joon Ko, Chang-Ki Hong, Soo-Chul Hwang, Kwan-Hee Han

Paper Title: Development of Motor Brake System for Explosion-Proof Elevator Abstract: Recently, we are using explosion-proof elevators not only in industrial areas where there is a risk of gas leakage, but also in poor atmospheric conditions. Therefore, there is an increasing need for development an explosion-proof elevator with more safety. Therefore, this study developed an electric motor brake with high possibility of arc in the elevator parts as an explosion - proof type. For this purpose, we analyzed patented technology of elevator and patent of explosion proof technology. Based on the results, we developed an electric motor brake for an explosion-proof elevator. The technology also focuses on improving the housing and 28. solenoid of the brakes and shows improved explosion protection compared to conventional brakes. As a result of analyzing the patent of the explosion proof technology, it was analyzed that the frame proof enclosure of the brake of the explosion type elevator is effective. The housing of the electromagnetic brake for the explosion- 149-153 proof elevator was analyzed to be the most preferable structure with the explosion proof structure. Based on the above analysis, this paper defined the locking mechanism of the brakes and design the stable structure of the brakes. In this study, the optimum structure of the electromagnetic brake for the explosion proof elevator was found to be the explosion proof structure, and the existing elevator explosion proof technology focused only on the structure of the switch was extended to improve the explosion proofing function by improving the housing.

Keyword: brake housing, explosion-proof elevator, explosion-proof brake, pressure-resistant explosion-proof

structure References: 1. Korean Agency for Technology and Standards, KS C IEC 60079-10-1, Seoul, Republic of Korea, Nov. 2012. 2. NOVONOUS, Global Elevator Market: Forecasts for 2016 and 2020, Karnataka: NOVONOUS, May. 2016. 3. Moll Oliver, “Shriker Lane, Demag Cranes & Components GmbH. Chain Hoist Having a Slip Clutch,” Korea patent KR 1020120129866, Nov. 28, 2012. 4. Nihei Hideki, Nakada Takanori, Arahori Noboru, Nagase Hiroshi, HITACHI. Elevator, “Unit,” Japan patent JP 1223898, Sep. 5, 2000. 5. Kimura Yasuki, Toya Mitsutoshi, Urakawa Hidehiko, Tada Junichi. MITSUBISHI ELECTRIC, “Hoist for Elevator,” European Union patent EP 02325983, May. 25, 2011. 6. Hubbard James L., Venturini Marco, Tenti Davide. OTIS ELEVATOR, “for Elevator System Cooling of The Machine,” China patent CN 105531912, Apr. 27, 2016 7. Ogawa Goji, MITSUBISHI ELECTRIC, “Brake Device for Hoist for Elevator,” Korea patent KS 1013613670000, Feb. 4, 2014. 8. Tatsuya Matsumoto, Tetsuji Ono, Hiroaki Endo, HITACH, “Traction Machine for Elevator & Installation Method of Traction Machine for Elevator,” Japan patent JP 28130152, Jul. 16, 2016. 9. Yoshikawa Masayoshi, MITSUBISHI ELECTRIC, “Machine Roomless Elevator,” Japan patent JP 04963153, Apr. 12, 2012. 10. Moll Oliver, Shriker Lane, MITSUBISHI ELECTRIC, “Disk Brake for Elevator Traction Machine & Method of Dust Removal,” Japan patent JP 25144585, Jul. 25, 2013. 11. Lubomir Janovsky., Elevator Mechanical Design Third Edition, U.S: Elevator World Inc., 1999. 12. Korean Agency for Technology and Standards, KS C IEC 60079-0, Seoul, Republic of Korea, May. 2017. 13. Korean Agency for Technology and Standards, KS C IEC 60079-1, Seoul, Republic of Korea, Jan. 2019. Authors: Dong-Seung Baek, Kyung-Bum Lim

Paper Title: Fire Safety Evaluation of Urban Buildings Abstract: As buildings have been getting taller and incorporating more intelligent designs due to industry development and population growth, property damage and the numbers of casualties resulting from fires are increasing, which requires safety evaluations that involve engineering analysis methods. This study analyzes the use of safety measures against fire hazards, by conducting fire simulations to calculate the visibility range and radiant/convective heat in CO/CO2/smoke, and by performing evacuation simulations to analyze the ASET(Available Safety Egress Time)/RSET(Required Safety Egress Time). From the results of the fire/evacuation simulations, it is possible to estimate the impacts that fire hazards (e.g. toxic gases and temperatures) can have on the occupants’ safety, to examine the feasibility of the evacuation/fireproof equipment in buildings for unspecified individuals, and to establish an optimized evacuation plan to minimize damage or loss of life. It is expected that fire simulations will enable the following activities: risk impact evaluation analyses, laboratory safety inspections, establishment of safety assessments for construction works, and future continuous research studies linked to super high-rise buildings.

Keyword: Fire safety, Safety evaluation, Evacuation safety assessment, Fire simulation, FDS. References: 1. Roh Jae Seong, Ryou Hong Sun, Park Won Hee, Jang Yong Jun, “CFD simulation and assessment of life safety in a subway train fire” TUNNELLING AND UNDERGROUND SPACE TECHNOLOGY, Vol. 24, No. 4, 2008, pp. 447-453. 29. 2. D'Orazio Marco, Longhi Sauro, Olivetti Paolo, Bernardini Gabriele, “Design and experimental evaluation of an interactive system for pre-movement time reduction in case of fire” Automation In Construction, Vol. 52, 2015, pp. 16-28. 3. Cheng-Chun Lin, Liangzhu (Leon) Wang, “ smoke transport during compartment fires using a data assimilation model” Journal of Fire Sciences, Vol. 33, No. 1, 2014, pp. 3-21. 154-157 4. S. Sudheer, D. Saumil, S.V. Prabhu, “Physical experiments and Fire Dynamics Simulator simulations on gasoline pool fires” Journal of Fire Sciences, Vol. 31, No. 4, 2013, pp. 309-329. 5. Michael Spearpoint, “Transfer of Architectural Data from the IFC Building Product Model to a Fire Simulation Software Tool” Journal of Fire Protection Engineering, Vol. 17, No. 4, 2007, pp. 271-292. 6. Wolfram Jahn, “Using suppression and detection devices to steer CFD fire forecast simulations” Fire Safety Journal, Vol. 91, 2017, pp. 284-290. 7. Lei Niu, Yiquan Song, “A simulation model fusing space and agent for indoor dynamic fire evacuation analysis, SIMULATION, Vol. 92, No. 3, 2016, pp. 215-232. 8. Chu Guanquan, Sun Jinhua, “The Effect of Pre-movement Time and Occupant Density on Evacuation Time” Journal of Fire Sciences, Vol. 24, No. 3, 2006, pp. 237-259. 9. L. T. Wong, “Hazard of Thermal Radiation from a Hot Smoke Layer in Enclosures to an Evacuee” Journal of Fire Sciences, Vol. 23, No. 2, 2005, pp. 139-156. 10. Tzu-Sheng Shen, “Building Egress Analysis” Journal of Fire Sciences, Vol. 24, No. 1, 2006, pp. 7-25. 11. M.J. Spearpoint, “Comparative Verification Exercises on a Probabilistic Network Model for Building Evacuation” Journal of Fire Sciences, Vol. 27, No. 5, 2009, pp. 409-430. 12. Michael Spearpoint, “The Effect of Pre-evacuation on Evacuation Times in the Simulex Model” Journal of Fire Protection Engineering, Vol. 14, No. 1, 2004, pp. 33-53. 13. Erica D. Kuligowski, James A. Milke, “A Performance-based Egress Analysis of a Hotel Building using Two Models” Journal of Fire Protection Engineering, Vol. 15, No. 4, 2005, pp. 287-305. 14. Filiz Ozel, “Simulation modeling of human behavior in buildings” SIMULATION, Vol. 58, No. 6, 1992, pp. 377-384. 15. Chung Kee-Chiang, Wu Yu-Lieh, Tung Hsien-Sheng, “Fire Model Analysis and Experimental Validation on Smoke Compartments” Journal of Fire Sciences, Vol. 21, No. 3, 2003, pp. 203-226. 16. Mei Ling Chu, Paolo Parigi, Kincho H Law, Jean-Claude Latombe, “Simulating individual, group, and crowd behaviors in building egress” SIMULATION, Vol. 91, No. 9, 2015, pp. 825-845. Authors: Dong-Geol Choi

30. Paper Title: Image based Road Surface Classification Method using CNN Abstract: Road detection and road surface classification in autonomous driving are the most basic and important issues. In this paper, we propose a data augmentation method for road surface classification using 158-162 image information. We design an optimal network that can classify the type of road surface from the input image information and propose a data increase technique that can efficiently judge by using limited data to improve learning performance. To verify the proposed methods, many running images were used on the Internet. Experimental vehicle was developed and applied to verify the developed networks and it shows that they operate accurately in real time.

Keyword: road surface classification, CNN (Convolutional Neural Net), data augmentation, ResNet References: 1. K. Alex, I. Sutskever, G. E. Hinton, “Imagenet classification with deep convolutional neural networks.” Advances in neural information processing systems. 2012. Jan: 1097-1105. 2. H. Kaiming, Z. Xiangyu, R. Shaoqing, S. Jian, “Deep residual learning for image recognition.” Proceedings of the IEEE conference on computer vision and pattern recognition. 2016. Jun: 770-778. 3. D. Jia, D. Wei, S. Richard, L. Li-Jia, L. Kai, F. Li., “Imagenet: A large-scale hierarchical image database.” 2009 IEEE conference on computer vision and pattern recognition. Ieee, 2009. June: 248-255 4. L. Tsung-Yi, M. Michael, B. Serge H. James, P. Pietro, R. Deva, D. Piotr, Z. C Lawrence, “Microsoft coco: Common objects in context.” European conference on computer vision. Springer, Cham, 2014. Sep: 740-755. 5. Stanislaw, A. Aishwarya, L. Jiasen, M. Margaret, B. Dhruv, L. Zitnick, C., P. Devi, “Vqa: Visual question answering.” Proceedings of the IEEE international conference on computer vision. 2015. May: 2425-2433 6. Google Cloud Vision [Internet]. [place unknown]; [updated 2019 Fab 14; cited 2019 March 15]. Available from: https://cloud.google.com/vision/ 7. papago [Internet]. [place unknown]; [updated 2019 Jan 01; cited 2019 March 15]. Available from: https://papago.naver.com/ 8. Roverguide [Internet]. [place unknown]; [updated 2011 Dec 18; cited 2019 March 15]. Available from: http://www.roverguide.com/12999/compare-three-selectable-terrain-management-systems/ 9. ROS.org [Internet]. [place unknown]; [updated 2017 July 25; cited 2019 March 15]. Available from: http://wiki.ros.org/kinetic/Installation/Ubuntu 10. Official Live Stream & Video Channel of the WRC [Internet]. [place unknown]; [updated 2019 March 10; cited 2019 March 15]. Available from: http://www.wrcplus.com 11. FIA World Rally Championship [Internet]. [place unknown]; [updated 2019 March 2; cited 2019 March 15]. Available from: https://www.youtube.com/user/wrc/videos?app=desktop 12. Forrest N., H. Song, M. Matthew W., A. Khalid, D. William J., K. Kurt, “SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and< 0.5 MB model size.” arXiv preprint arXiv:1602.07360. 2016. 13. S. Karen, A. Zisserman, “Very deep convolutional networks for large-scale image recognition.” arXiv preprint arXiv:1409.1556. 2014. Authors: Dong-Geol Choi

Paper Title: Image based Road Surface Classification Method using CNN Abstract: Road detection and road surface classification in autonomous driving are the most basic and important issues. In this paper, we propose a data augmentation method for road surface classification using image information. We design an optimal network that can classify the type of road surface from the input image information and propose a data increase technique that can efficiently judge by using limited data to improve learning performance. To verify the proposed methods, many running images were used on the Internet. Experimental vehicle was developed and applied to verify the developed networks and it shows that they operate accurately in real time. Keyword: road surface classification, CNN (Convolutional Neural Net), data augmentation, ResNet

References: 26. K. Alex, I. Sutskever, G. E. Hinton, “Imagenet classification with deep convolutional neural networks.” Advances in neural information processing systems. 2012. Jan: 1097-1105. 30. 27. H. Kaiming, Z. Xiangyu, R. Shaoqing, S. Jian, “Deep residual learning for image recognition.” Proceedings of the IEEE conference on computer vision and pattern recognition. 2016. Jun: 770-778. 28. D. Jia, D. Wei, S. Richard, L. Li-Jia, L. Kai, F. Li., “Imagenet: A large-scale hierarchical image database.” 2009 IEEE conference on computer vision and pattern recognition. Ieee, 2009. June: 248-255 158-162 29. L. Tsung-Yi, M. Michael, B. Serge H. James, P. Pietro, R. Deva, D. Piotr, Z. C Lawrence, “Microsoft coco: Common objects in context.” European conference on computer vision. Springer, Cham, 2014. Sep: 740-755. 30. A. Stanislaw, A. Aishwarya, L. Jiasen, M. Margaret, B. Dhruv, L. Zitnick, C., P. Devi, “Vqa: Visual question answering.” Proceedings of the IEEE international conference on computer vision. 2015. May: 2425-2433 31. Google Cloud Vision [Internet]. [place unknown]; [updated 2019 Fab 14; cited 2019 March 15]. Available from: https://cloud.google.com/vision/ 32. papago [Internet]. [place unknown]; [updated 2019 Jan 01; cited 2019 March 15]. Available from: https://papago.naver.com/ 33. Roverguide [Internet]. [place unknown]; [updated 2011 Dec 18; cited 2019 March 15]. Available from: http://www.roverguide.com/12999/compare-three-selectable-terrain-management-systems/ 34. ROS.org [Internet]. [place unknown]; [updated 2017 July 25; cited 2019 March 15]. Available from: http://wiki.ros.org/kinetic/Installation/Ubuntu 35. Official Live Stream & Video Channel of the WRC [Internet]. [place unknown]; [updated 2019 March 10; cited 2019 March 15]. Available from: http://www.wrcplus.com 36. FIA World Rally Championship [Internet]. [place unknown]; [updated 2019 March 2; cited 2019 March 15]. Available from: https://www.youtube.com/user/wrc/videos?app=desktop 37. I. Forrest N., H. Song, M. Matthew W., A. Khalid, D. William J., K. Kurt, “SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and< 0.5 MB model size.” arXiv preprint arXiv:1602.07360. 2016. 38. S. Karen, A. Zisserman, “Very deep convolutional networks for large-scale image recognition.” arXiv preprint arXiv:1409.1556. 2014. Authors: Young-Gee Min, Eon-Gon Kim 31. Paper Title: Design of Platform for Service Optimization in Cloud System Environment Abstract: One of the major characteristics of our society in the field of information and communication is its efforts to cope with the rapidly changing IT environment. This is probably because firms are closely related to the survival of the company. As a solution to this problem, researches on cloud computing services are being actively conducted. As cloud computing services have emerged in the marketplace, concepts related to IT assets are changing from being owned to using services. Reflecting this trend, many related companies are providing cloud services. Therefore, in this paper, we design an optimized platform for efficient application of server in cloud system environment. To do this, we designed a system to study various system connections based on the cloud computing service environment and implement an optimized service platform. In this paper, we have implemented optimization and virtualization research in a cloud system environment to design a platform for optimized cloud services. In addition, we designed the optimal platform by studying methodologies such as optimization service environment implementation, compatibility and analysis.

Keyword: Cloud system, Cloud service, Cloud server environment, Service optimization, System modeling.

References: 1. K. Sidhu, S. Kinger, “Analysis of load balancing techniques in cloud computing,” International Journal of Computers and Technology, 4(2), 2013, pp.737-741. DOI : 10.1.1.799.8142&rep 163-167 2. J. M. Bohli, N. Gruschka, M. Jensen, L. L. Iacono, N. Marnau, “Security and Privacy-Enhancing Multi Cloud Architectures,” IEEE Transaction on Dependable and Secure Computing, 10(4), 2013, pp.212-224. DOI: 10.1109/TDSC.2013.6 3. Hayes, “Cloud computing,” Communications of the ACM, 51(7), 2008, pp.9-11. DOI : 10.1145/1364782.1364786 4. R. Rajeshkannan, M. Aramudhan, “Comparative study of Load Balancing Algorithms in cloud computing environment,” Indian Journal of Science and Technology, 9(20), 2016, pp.1-7. DOI: 10.1109/ICECDS.2017.8389549 5. N. Yager, A. Amin, “Fingerprint verification based on minutiae features: a review,” Pattern Anal Appl., 7(1), 2004, pp.94-113. https://doi.org/10.1007/s10044-003-0201-2 6. H. Shen, G. Liu, “An efficient and trustworthy resource sharing platform for collaborative cloud computing,” IEEE Transactions on Parallel and Distributed Systems, 25(4), 2014, pp.862–875 7. M. U. Bokhari, M. Alam, F. Hasan, “Performance analysis of dynamic load balancing algorithm for multiprocessor interconnection network,” Perspectives in Science (PICS), 8, 2016, pp.564-566. https://doi.org/10.1016/j.pisc.2016.06.021 8. A. Rassan, H. A. Shaher, “Securing Mobile Cloud Using Finger Print Authentication,” International Journal of Network Security & Its Applications (IJNSA), 5(6), 2013, pp.41-53. 9. Zhu, H. Nicanfar, V. C. Leung, L. T. Yang, “An authenticated trust and reputation calculation and management system for cloud and sensor networks integration,” IEEE Transactions on Information Forensics and Security, 10(1), 2015, pp.118–131. 10. M. Li, “An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition,” Computer & Security, 23, 2004, pp.549-558. DOI : 10.1016/j.cose.2004.04.005 11. J. Mirkovic, J. Martin, T. Reiher, “A taxonomy of DDoS attacks and DDoS defense mechanisms,” ACM SIGCOMM Computer Communication Review, 34(2), 2004, pp.39-53. DOI : 10.1145/997150.997156 12. F. Cohen, “Simulating cyber attacks, defences, and consequences,” Computer & Security, 18, 1999, pp.479-518. Authors: Joo-Eun Lee Status of Foodservice Sanitary Management in Family Child Care Center and Effect of Paper Title: Management Support Abstract: This study intended to examine the status of the foodservice sanitary management in 185 family child care centers and evaluate the effect after receiving the service of Center for Children's Foodservices Management (CCFM). The compliance rate of the personal sanitary management area was 55.7% showing low out of 6 foodservice sanitary areas and in the detailed item, using the dishcloth, glove and apron separately for cooking and cleaning was 19.5%, wearing sanitary apron and gloves when distributing food was 46.5% and adequate temperature management of refrigerator and freezer was 54.1% showing low compliance rate. After the first and second sanitary management supports of CCFM, the significant improvement was found in 21 items out of total 27 items (p<0.05,p<0.01, p<0.001), and the total score was increased from 69.70 point significantly to 80.63 points after the first sanitary education and to 84.98 points after the second education (out of full score of 100 points).Particularly, judging by that while there were the items that have been improved rapidly after the first visit, there were the items that were improved significantly after receiving the second support than the first support, it needs the continuous sanitary education. Many family child care centers have yet to receive support from the CCFM. Therefore, more child care centers should receive the support of the CCFM constantly. 32.

Keyword: CCFM, Family Child Care Centers, Foodservice, Sanitation 168-174

References: 1. Ministry of Health and Welfare in Korea. 2016. Child Care Statistics. Available: http://www.kcpi.or.kr/site/hp3/contents/data_n/reference04_1.jsp. 2. K.S. Kwon, J.Y. Park, “A Study of the directors’ discourse on the home based child care facilities management” J Korea Early Childhood Educ., 19(3), 1-27, 2012. Available: http://riss.kr/search/detail/DetailView.do?p_mat_type=1a0202e37d52c72d&control_no=9e89de805edba885ffe0bdc3ef48d419#redir ect. 3. N. Lu, M.E. Samuels, L. Shi, S.L. Baker, S.H. Glover, J.M. Sanders, “Child day care risks of common infectious diseases revisited” Child Care Health Dev., 30(4), 361-368, 2004. Available: https://doi.org/10.1111/j.1365-2214.2004.00411.x 4. R. Enserink, R. Ypma, G.A. Donker, H.A. Smit, W. van Pelt, “Infectious disease burden related to child day care in the Netherlands” Pediatr. Infect. Dis. J., 32(8), 334-340, 2013. Available: https://www.ncbi.nlm.nih.gov/pubmed/23584578 5. D.M. Staskel, M.E. Briley, L.H. Field, S.S. Barth, “Microbial evaluation of foodservice surfaces in Texas child-care centers” J Am. Diet. Assoc., 107(5), 854-859, 2007. Available: https://doi.org/10.1016/j.jada.2007.02.013 6. C.M. Cosby, C. Costello, W. Morris, B. Haughton, M. Devereaux, F. Harte, “Microbiological analysis of food contact surfaces in child care centers” Appl. Environ. Microbiol., 74(22), 6918-6922, 2008. Available: https://doi.org/ 10.1128/AEM.00547-08 7. Y. Li, L.A. Jaykus, S. Cates, K. Wohlgenant, X. Chen, A.M. Fraser, “Hygienic conditions in child-care facilities in North Carolina and South Carolina: an integrated microbial and observational study” Am J Infect. Control, 42(7),781-786, 2014. Available: https://doi.org/10.1016/j.ajic.2014.03.009 8. The Korea Food and Drug Administration. Guideline for Center for Children’ Foodservice Management. Ministry of Food and Drug Safety. Cheongju, Korea. pp.42-111, 2016. Available: https://ccfsm.foodnara.go.kr/home/?menuno=164. 9. Ministry of Food and Drug Safety. Press release of MHW,“Our kids' meals are safe: 11 to 15 times higher than the social benefit investment promotion Center for Children's Support Center”. Available: http://www.nifds.go.kr/brd/m_21/view.do?seq=7797&srchFr=&srchTo=&srchWord=&srchTp=&itm_seq_1=0&itm_seq_2=0&mult i_itm_seq=0&company_cd=&company_nm=&page=87 10. Center for Children’ Foodservice Management. Homepage of Center for Children’ Foodservice Management. Available: https://ccfsm.foodnara.go.kr. 11. Ministry of Food and Drug Safety. Press Release of MHW, “The number of children benefiting from the 17th year of establishment of the CCFSM will increase”. Available: http://www.mfds.go.kr/brd/m_99/view.do?seq=35281&srchFr=&srchTo=&srchWord=%EC%96%B4%EB%A6%B0%EC%9D%B4 %EA%B8%89%EC%8B%9D%EA%B4%80%EB%A6%AC%EC%A7%80%EC%9B%90%EC%84%BC%ED%84%B0&srchTp=0 &itm_seq_1=0&itm_seq_2=0&multi_itm_seq=0&company_cd=&company_nm=&page=1. 12. J.E. Lee, “Administrators' Experience of Using Service Provided by Center for Children's Foodservice Management among Home- based Child Care Centers in Seoul” J Korean Diet. Assoc., 23(3), 240-262, 2017. Available: https://doi.org/10.14373/JKDA.2017.23.3.240. 13. J.H. Lee, “An Investigation of factors that influence hygiene practices at a small day care center” J Food Prot., 81(1), 158-164, 2018. Available: https://doi.org/10.4315/0362-028X.JFP-17-163 14. J.E. Lee, “A study on the food hygiene knowledge, attitude, and practice of the home day care center directors and teachers” J Eng. App. Sci., 12 (2,SI), 6173-6179, 2017. Available: http://medwelljournals.com/abstract/?doi=jeasci.2017.6173.6179. 15. J.M. Soon, R. Baines, P. Seaman, “Meta-analysis of food safety training on hand hygiene knowledge and attitudes among food handlers” J Food Prot., 75(4), 793-804. 2012. Available: https://doi.org/10.4315/0362-028X.JFP-11-502 16. J.E. Lee, “An investigation of self-evaluated performance on food service management among directors and teachers of home day care centers” J Eng. App. Sci., 12(7,SI), 8100-8106, 2017. Available: http://medwelljournals.com/abstract/?doi=jeasci.2017.8100.8106 17. S.E. Benjamin Neelon, M.E. Briley, “Position of the American Dietetic Association: Benchmarks for Nutrition in Child Care” J Am Diet. Assoc., 111(4), 607-615, 2011. Available: https://doi.org/ 10.1016/j.jada.2011.02.016. 18. J. Reynolds, L. Rajagopal, “Childcare food handling employees’ perceived barriers and motivators to follow food safety practices” Early Childhood Educ. J., 46(5), 477-485, 2018. Available: https://doi.org/ 10.1007/s10643-017-0885-3 19. L.K. Bell, G.A. Hendrie, J. Hartley, R.K. Golley, “Impact of a nutrition award scheme on the food and nutrient intakes of 2- to 4- year-olds attending long day care” Public Health Nutr., 18(14), 2634-2642, 2015. Available: https://doi.org/10.1017/S1368980014003127 Authors: Seok-Woo Jang, Sung-Youn Cho

Paper Title: A Method of Scene Boundary Detection for Indexing Video Data Efficiently Abstract: In a cell animation, a background scene is presented with one cell. When animation scenes are changed, a relatively large scene change occurs because their backgrounds are also changed. Unlike a camera- based real movie, a cell animation is made in the way of manual drawing. For this reason, such animation does not use many colors. In order to apply the characteristics of animations as most as possible and detect a scene change of a cell animation effectively, this study proposes a new scene change detection technique with the stepwise use of the color and block-based histograms. The proposed algorithm receives continuous animation images as input, changes the RGB color space into the HSI color space, executes the difference operation of color values of the two images, and thereby primarily determines whether the neighboring images are scene change candidates. If they are judged to be scene change candidates, the color histogram for each sub-region is made, and then a weight value is applied to finally determine whether a scene change occurs. To compare the proposed scene change detection method with conventional scene change detection methods, the block-based scene change detection method and the histogram-based scene change detection method as conventional ones were implemented. In this study, to qualitatively evaluate the performance of the proposed method of detecting scene boundaries, the accuracy measure was defined. The two conventional algorithms are not complicated relatively and are widely used to extract a scene change. The experiment of this study reveals that the proposed method more accurately detects an animation scene change than other conventional methods. The proposed 33. animation scene boundary detection method is expected to be applied usefully to the fields of digital video data indexing and retrieval, dynamic motion analysis, and other related areas. 175-179 Keyword: Efficient indexing, Dynamic image, Color space, Histogram, Weighting factor.

References: 1. Y. Yang, L. Shen, H. Yang, P. An, “A content-based rate control algorithm for screen content video coding,” J. Vis. Comm. Image Represent., vol. 60, 2019, pp. 328-338. 2. J. Guna, G. Gersak, I. Humar, J. Song, M. Pogacnik, “Influence of video content type on users’ virtual reality sickness perception and physiological response,” Future Gener. Comp. Sy., vol. 91, 2019, pp. 263-276. 3. S. Wazarkar, B. N. Keshavamurthy, “A survey on image data analysis through clustering techniques for real world applications,” J. Vis. Comm. Image Represent., vol. 55, 2018, pp. 596-626. 4. G. Horsman, “Reconstructing streamed video content: a case study on YouTube and Facebook Live stream content in the Chrome web browser cache,” Digit. Invest., vol. 26, 2018, pp. s30-s37. 5. Z. A. Sohi, S. A. Torabi, “Integrated home video content procurement and distribution planning under uncertainty,” Comput. Ind. Eng., vol. 106, 2017, pp. 329-337. 6. F. C. Izzo, A. Carrieri, G. Bartolozzi, H. V. Keulen, M. Picollo, “Elucidating the composition and the state of conservation of nitrocellulose-based animation cells by means of non-invasive and micro-destructive techniques,” J. Cult. Herit., vol. 35, 2019, pp. 254-262. 7. Z. Liu, L. Zhou, H. Leung, H. P. H. Shum, “High-quality compatible triangulations and their application in interactive animation,” Comput. Graph., vol. 76, 2018, pp. 60-72. 8. W. F. Koning, “Teaching 3D computer animation to illustrators: the instructor as translator and technical director,” IEEE Comput. Graph., vol. 32, 2012, pp. 81-83. 9. R. Dadashi, H. R. Kanan, “AVCD-FRA: A novel solution to automatic video cut detection using fuzzy-rule-based approach,” Comput. Vis. Image Understand., vol. 117, 2013, pp. 807-817. 10. M. Ramalingam, N. A. M Isa, “A data-hiding technique using scene-change detection for video steganography,” Comput. Electr. Eng., vol. 54, 2016, pp. 423-434. 11. K. D. Seo, S. J. Park, S. H. Jung, “Wipe scene-change detector based on visual rhythm spectrum,” IEEE T. Consum. Electr., vol. 55, 2009, pp. 831-838. 12. C. W. Su, H. Y. M. Liao, H. R. Tyan, K. C. Fan, L. H. Chen, “A motion-tolerant dissolve detection algorithm,” IEEE T. Multimedia, vol. 7, 2005, pp. 1106-1113. 13. M. S. Lee, Y. M. Yang, S. W. Lee, “Automatic video parsing using shot boundary detection and camera operation analysis,” Pattern Recogn., vol. 34, 2001, pp. 711-719. 14. C. C. Lo, S. J. Wang, “A histogram-based moment-preserving clustering algorithm for video segmentation,” Pattern Recogn. Lett., vol. 24, 2003, pp. 2209-2218. 15. H. J. Zhang, A. Kankanhalli, S. W. Smoliar, “Automatic partitioning of full-motion video,” Multimed. Syst., vol. 1, 1993, pp. 110- 28. 16. T. Y. Liu, K. T. Lo, X. D. Zhang, J. Feng, “A new cut detection algorithm with constant false-alarm ratio for video segmentation,” J. Vis. Comm. Image Represent., vol. 15, 2004, pp. 132-144. 17. C. A. Dhawale, S. Jain, “Motion compensated video shot detection using multiple feature experts,” ICGST International Journal on Graphics, Vision, and Image Processing, vol. 8, 2009, pp. 1-11. 18. Z. Lu, X. Jiang, A. Kot, “Color space construction by optimizing luminance and chrominance components for face recognition,” Pattern Recogn., vol. 83, 2018, pp. 456-468. 19. N. Alamgir, K. Nguyen, V. Chandran, W. Boles, “Combining multi-channel color space with local binary co-occurrence feature descriptors for accurate smoke detection from surveillance videos,” Fire Saf. J., vol. 102, 2018, pp. 1-10. 20. D. Hiyama, T. Shimobaba, T. Kakue, T. Ito, “Acceleration of color computer-generated hologram from RGB-D images using color space conversion,” Optic. Comm., vol. 340, 2015, pp. 121-125. 21. K. Muhammad, M. Sajjad, I. Mehmood, S. Rho, S. W. Baik, “Image steganography using uncorrelated color space and its application for security of visual contents in online social networks,” Future Gener. Comp. Sy., vol. 86, 2018, pp. 951-960. 22. N. Alamgir, K. Nguyen, V. Chandran, W. Boles, “Combining multi-channel color space with local binary co-occurrence feature descriptors for accurate smoke detection from surveillance videos,” Fire Saf. J., vol. 102, 2018, pp. 1-10. 23. H. Zhao, Q. Li, H. Feng, “Multi-focus color image fusion in the HSI space using the sum-modified-laplacian and a coarse edge map,” Image Vis. Comput., vol. 26, 2018, pp. 1285-1295. 24. M. N. Zakaria, N. A. A. Wahab, N. Maamor, B. Jalaei, A. A. A. Dzulkarnain, “Auditory brainstem response (ABR) findings in males and females with comparable head sizes at supra-threshold and threshold levels,” Neurology, Psychiatry and Brain Research. Vol. 32, 2019, pp. 4-7. 25. Y. Yang, X. Wang, Z. Xu, “The multiplicative consistency threshold of intuitionistic fuzzy preference relation,” Inform. Sci., vol. 477, 2019, pp. 349-368. 26. D. Zhang, Z. Xia, “Weighted-averaging estimator for possible threshold in segmented linear regression model,” J. Stat. Plann. Infer., vol. 200, 2019, pp. 102-118 27. P. Liu, J. M. Guo, K. Chamnongthai, H. Prasetyo, “Fusion of color histogram and LBP-based features for texture image retrieval and classification,” Inform. Sci., vol. 390, 2017, pp. 95-111. 28. J. Pradhan, S. Kumar, A. K. Pal, H. Banka, “A hierarchical CBIR framework using adaptive tetrolet transform and novel histograms from color and shape features,” Digit. Signal Process., vol. 82, 2018, pp. 258-281. 29. S. Borjigin, P. K. Sahoo, “Color image segmentation based on multi-level Tsallis-Havrda-Charvat entropy and 2D histogram using PSO algorithms,” Pattern Recogn., vol. 92, 2019, pp. 107-118. 30. C. Y. Wong, G. Jiang, M. A. Rahman, S. Liu, T. Wu, “Histogram equalization and optimal profile compression based approach for colour image enhancement,” J. Vis. Comm. Image Represent., vol. 38, 2016, pp. 802-813. 31. W. Lin, Y. Wang, Y. Zhuang, S. Zhang, “Evaluate the number of clusters in finite mixture models with the penalized histogram difference criterion,” J. Process Contr., vol. 23, 2013, pp. 1052-1062. 32. S. Dubuisson, “Tree-structured image difference for fast histogram and distance between histograms computation,” Pattern Recogn. Lett., vol. 32, 2011, pp. 411-422. 33. D. B. L. Bong, B. E. Khoo, “Blind image blur assessment by using valid reblur range and histogram shape difference,” Signal Process. Image Comm., vol. 29, 2014, pp. 699-710. 34. C. Zhu, C. Mei, R. Zhou, “Weight-based label-unknown multi-view data set generation approach,” Inform. Process. Lett., vol. 146, 2019, pp. 1-12. 35. G. Beliakov, D. Gomez, S. James, J. Montero, J. T. Rodriguez, “Approaches to learning strictly-stable weights for data with missing values,” Fuzzy Set. Syst., vol. 25, 2017, pp. 97-113. 36. R. Burduk. “Classifier fusion with interval-valued weights,” Pattern Recogn. Lett., vol. 34, 2013, pp. 1623-1629 Authors: Yoon-Su Jeong, Dong-Ryool Kim, Seung-Soo Shin

Paper Title: An Efficient Patient Information Transmission and Receiving Scheme using Cloud H-IoT System Abstract: The medical environment, combined with IT technology, is changing the paradigm for medical services from treatment to prevention. In particular infrastructure technologies such as big data and internet of things are being used in conjunction with the cloud as ICT convergence digital healthcare technology is applied to hospital medical systems. In particular, as medical services are used with IT devices, the quality of medical services is increasingly improving to make them easier for users to access. Medical institutions seeking to incorporate IoT services into cloud health care environment services are trying to reduce hospital operating costs and improve service quality, but have not yet been fully supported. In this paper, a patient information collection 34. model from H-IoT(Hospital IoT)_system, which has established a cloud environment, is proposed. The proposed model prevents third parties from illegally eavesdropping and interfering with patients' biometric information through IoT devices attached to the patient's body at hospitals in cloud environments that have established H-IoT 180-184 systems. In the proposed model, patients are now eligible for medical service by installing an IoT device, and medical staff can analyze patient disease information so that patients who visit the hospital can collect and receive treatment for diseases related to their eating habits. The disease information analyzed in the proposed model minimizes hospital work to facilitate the treatment and management of prescriptions according to the degree of disease in patients. On average, the time required for medical staff to collect and analyze IoT patient information was 7.8 percent lower than previous techniques. The results of 11.1% improvement in server efficiency for processing IoT patient information were obtained. The IoT medical information transmitted from IoT devices was 16.3% lower than the traditional technology, using diffusion band technology.The medical environment, combined with IT technology, is changing the paradigm for medical services from treatment to prevention. In particular infrastructure technologies such as big data and internet of things are being used in conjunction with the cloud as ICT convergence digital healthcare technology is applied to hospital medical systems. In particular, as medical services are used with IT devices, the quality of medical services is increasingly improving to make them easier for users to access. Medical institutions seeking to incorporate IoT services into cloud health care environment services are trying to reduce hospital operating costs and improve service quality, but have not yet been fully supported. In this paper, a patient information collection model from H-IoT(Hospital IoT)_system, which has established a cloud environment, is proposed. The proposed model prevents third parties from illegally eavesdropping and interfering with patients' biometric information through IoT devices attached to the patient's body at hospitals in cloud environments that have established H-IoT systems. In the proposed model, patients are now eligible for medical service by installing an IoT device, and medical staff can analyze patient disease information so that patients who visit the hospital can collect and receive treatment for diseases related to their eating habits. The disease information analyzed in the proposed model minimizes hospital work to facilitate the treatment and management of prescriptions according to the degree of disease in patients. On average, the time required for medical staff to collect and analyze IoT patient information was 7.8 percent lower than previous techniques. The results of 11.1% improvement in server efficiency for processing IoT patient information were obtained. The IoT medical information transmitted from IoT devices was 16.3% lower than the traditional technology, using diffusion band technology.

Keyword: H-IoT, Cloud service, User privacy, Information analysis, eavesdropping, Biometric information.

References: 1. G. O. Young, “Synthetic structure of industrial (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64. 2. W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135. 3. H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4. 4. B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished. 5. E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be published. 6. J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum Electron., submitted for publication. 7. C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995. 8. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and substrate interfaces(Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics Japan, 1982, 9. T. H. Park. and B. N. Noh, “Survey and Prospective on Privacy Protection Methods on Cloud Platform Environment,” Korea Institute Of Information Security And Cryptology, vol. 27, no. 5, Oct. 2017, pp. 1149-1155. 10. Y. S. Jeong, “An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP,” Journal of Digital Convergence, vol. 13, no. 4, Apr. 2015, pp. 227-233. 11. Y. S. Jeong, “An Efficient IoT Healthcare Service Management Model of Location Tracking Sensor,” Journal of Digital Convergence, vol. 14, no. 3, Mar. 2016, pp. 261-267. 12. Y. S. Jeong, “Measuring and Analyzing WiMAX Security adopt to Wireless Environment of U-Healthcare,” Journal of Digital Convergence, vol. 11, no. 3, Mar 2016, pp.279-284. 13. Singh, and K. Chatterjee, “Cloud security issues and challenges: A survey,” Journal of Network and Computer Applications, vol. 79, no. 1, Feb. 2017, pp. 88-115. 14. H. Bao, and R. Lu, “A new differentially private data aggregation with fault tolerance for smart grid communications,” IEEE Internet of Things Journal, vol. 2, no. 3, Mar. 2015, pp. 248–258. 15. J. Qian, F. Qiu, F. Wu, N. Ruan, G. Chen, and S. Tang, “Privacy-Preserving Selective Aggregation of Online User Behavior Data,” IEEE Transactions on Computers, vol. 66, no. 2, Jul. 2017, pp. 326–338. 16. X. Cui, P. Zhu, X. Yang, K. Li, and C. Ji, “Optimized big data K-means clustering using MapReduce,” Journal of Supercomputing, vol. 70, no. 3, Dec. 2014, pp. 1249-1259. 17. W. Zhao, H. Ma, and Q. He, “Parallel k-means clustering based on mapreduce,” Proceedings of the 1st International Conference on Cloud Computing, Dec, 2009, pp 674-679. 18. B. Bahmani, B. Moseley, A. Vattani, R. Kumar, and S. Vassivitskii, “Scalable k-means++,” Proceedings of the VLDB Endowment, vol. 5, no. 7, Mar. 2012, pp. 622-633. 19. X. Cai, F. Nie, and H. Huang, “Multi-view k-means clustering on big data,” Proceedings of the Twenty-Third international joint conference on , AAAI Press., Aug. 2013, pp. 2598-2604. 20. H. Karau, A. Konwinski, P. Wendell, and M. Zaharia, “Learning Spark: Lightning-Fast Big Data Analysis,” O’Reilly Media, Inc., Jan. 2015, pp. 1-276. 21. Y. H. Kim, K. S. Shim, M. S. Kim, and J. S. Lee, “DBCURE-MR: an efficient density-based clustering algorithm for large data using MapReduce,” Journal of Information Systems, vol. 42, Jun. 2014, pp. 15-35. 22. X. Cui, J. S. Charles, T. Potok, “GPU enhanced parallel computing for large scale data clustering,” Journal of Future Generation Computer Systems, vol. 29, no. 7, Sep. 2013, pp. 1736-1741. 23. G. Andrade, G. Ramos, D. Madeira, R. Sachetto, R. Ferreira, and L. Rocha “G-dbscan: A gpu accelerated algorithm for density based clustering,” Journal of Procedia Computer Science, vol. 18, Dec. 2013, pp. 369-378 Authors: Jae-Woong Park, Jae-Ung Cho An Analytic Verification on Fracture Behavior of Adhesion Exfoliation with Out-plane Shear Mode Paper Title: due to Tapered Angles of 6°and 8° at TDCB Made of Unidirectional Laminated CFRP Abstract: Because of environmental issues, the regulations on gas emission from fossil fuels become 35. stricter. Some investigations are being carried out actively to change the fossil fuel power into electrical power. Researches on the reduction of weight in the transportation machine is also executed. Weight reduction is one of the methods of reducing the gas emission and increasing the range of electrically powered . The 185-189 method of weight reduction includes the development of light weight material and light weight structure design method. FRP is the most representative light weight material. Among various FRP materials, (CFRP) has the highest specific strength. Light weight structure design method includes the method of designing the structure by converting the bonding method with bolts and rivets to adhesion method with the use of adhesives. In order to pursue the research on the adhesive structure design method, the research on adhesion exfoliation by using CZM needs to be carried out. There are the researches with various methods in accordance with the style of adhesion exfoliation load and material designs. In this study, the adhesion exfoliation on the tearing fracture of tapered double cantilever beam configuration was applied to the research. Research model was composed by applying the gradient angles of 6° and 8° to TDCB. The model with the gradient angle of 8° has less fracture due to adhesion than that of 8°. The basic data on structural design of adhesion structure were provided by comparatively analyzing the research models. This research was carried out by using finite element analysis method in this study. Finite element analysis method has the advantage of reducing the cost and time taken for experiments in researches. Therefore, the finite element analysis program, ANSYS, was used in this study.

Keyword: Adhesive method, Finite element analysis, FRP(fiber reinforced plastic), TDCB(tapered double cantilever beam), Woven CFRP(carbon fiber reinforced plastic) References: 1. B. R. K. Blackman, H. Hadavinia, A. J. Kinloch, M. Paraschi,J. G. Williams.(2003) “The Calculation of Adhesive Fracture Energies in Mode I: Revisiting the Tapered Double Cantilever Beam (TDCB) Test,” Eng. Frac. Mech., 70(2), pp. 233-248.Available: https://www.sciencedirect.com/science/article/pii/S0013794402000310 2. M. De Giorgi, A. Carofalo, V. Dattoma, R. Nobile, F. Palano.(2010) “Aluminum Foams Structural Modelling,” Comp.Struc., 88(1- 2), pp. 25-35.Available: https://www.sciencedirect.com/science/article/pii/S0045794909001746 3. Q. Shi, J. Liu, W. Liu, F. Wang, Y. Wang. (2019)“Barker-coded modulation laser thermography for CFRP laminates delamination detection,”Infra. Phys.& Tech., 98, pp. 55-61.Available: https://www.sciencedirect.com/science/article/pii/S1350449518308867 4. C. V. Opelt, G. M. Candido, M. C. Rezende.(2018) “Fractographic study of damage mechanisms in fiber reinforced polymer composites submitted to uniaxial compression,”Eng. Fail. Anal., 92, pp. 520-527. Available: https://www.sciencedirect.com/science/article/pii/S1350630717313596 5. J. S. Binoj, J. S. Bibin. (2019)“Failure analysis of discarded Agave tequilana fiber polymer composites,”Eng. Fail. Anal., 95, pp. 379-391.Available: https://www.sciencedirect.com/science/article/pii/S1350630718300335 6. M. Mohamed, S. Anandan, Z. Huo, V. Birman, J. Volz, K. Chandrashekhara. (2015) “Manufacturing and characterization of polyurethane based sandwich composite structures,” Comp. Struc., 123, pp. 169-179. Available: https://www.sciencedirect.com/science/article/pii/S0263822314007089 7. C. Li, L. Ke, J. He, Z. Chen, Y. Jiao. (2019)“Effects of mechanical properties of adhesive and CFRP on the bond behavior in CFRP- strengthened steel structures,”Composite Structures, 211, pp. 163-174. Available: https://www.sciencedirect.com/science/article/pii/S026382231833023X 8. K. B. Katnam, A. J. Comer, W. F. Stanley, M. Buggy, T. M. Young. (2012) “Investigating tensile behaviour of toughened epoxy paste adhesives using circumferentially notched cylindrical bulk specimens,” Int. J. of Adhesion & Adhesives, 37, pp.3-10. Available: https://www.sciencedirect.com/science/article/pii/S0143749612000085 9. C. Schmandt, S. Marzi.(2018) “Effect of crack opening velocity and adhesive layer thickness on the fracture behaviour of hyperelastic adhesive joints subjected to mode I loading.”Int. J. of Adhesion and Adhesives, 83, pp. 9-14. Available: https://www.sciencedirect.com/science/article/pii/S0143749618300678 10. M. Imanaka, K. Ishii, K. Hara, T. Ikeda, Y. Kouno. (2018)“Fatigue crack propagation rate of CFRP/aluminum adhesively bonded DCB joints with acrylic and epoxy adhesives,”Int. J. of Adhesion and Adhesives, 85, pp. 149-156. Available: https://www.sciencedirect.com/science/article/pii/S0143749618301544 11. S. Marzi, A. Biel, U. Stigh. (2011)“On experimental methods to investigate the effect of layer thickness on the fracture behavior of adhesively bonded joints,”Int. J.of Adhesion and Adhesives, 31(8), pp. 840-850. Available: https://www.sciencedirect.com/science/article/pii/S0143749611001229 Authors: Lim, Jong-Sik, Yang, Chun-Ho

Paper Title: Relationship between Ethics and Self-management Behaviors in the High School Student Athletes Abstract: This study was conducted to investigate the relationship between ethics and self-management behaviors in high school student athletes. To do so, the survey was performed on 189 high school athletes that were registered in the Korean Olympic Committee in 2018. The surveyed data was processed using SPSS 21.0 statistical program with frequency, explorative factor, reliability test, correlation and multiple regression analysis. The conclusions of the study were as follows: First, positive correlations were found in respect to opponent, manners/consideration and sense of responsibility on every sub-factor of self-management behavior upon the correlation results between ethics and self-management behavior on the athletes. Positive correlations were found to cause negative psychology, judge’s decision and social norms on mentality, life, unique behavior, exercise and interpersonal relationship controls. Additionally, positive correlations were found in consideration for peers and relationship with seniors on unique behavior, exercise and body controls. Second, causing negative 36. psychology, judge’s decision and social norm showed positive influences on mentality control. Respect to Opponent’s respect and judge’s decision showed positive influences on life control. Respect to opponent and consideration for peers showed positive influences on unique behavior and exercise controls. Causing negative 190-195 psychology and respect to opponent showed positive influences on interpersonal relationship control. On the other hand, respect to opponent, consideration for peers and relationship with seniors showed positive influences on body control. In conclusion, it is suggested that ethics of the high school student athletes have a positive correlation with self-management behavior as well as partial influences.

Keyword: Self-Management, Behavior, Consciousness, Sportmanship References: 1. D.H. Lee, “Exploring Desirable Direction of School Athletic Teams as an Educational Setting”. Journal of Korean Society for the Study of Physical Education.17(1), 1-16, 2012. 2. S.K. Kim, “A Study on the Human Rights of Student Sports Player and the Guaranteeing of their Rights to Education”. The Korean Association of Sports Law. 12(1), 11-36, 2009. 3. S.J. Park,“A Program Development and Application on Educating Sport Ethics”. Korean journal of physical education. 55(1), 37-47, 2016. 4. S.S. Beak, J.J. Park,“Exploring the Sportsmanship Internalization Process and Affecting Factors in Middle School Physical Education”. Korean Journal of Sport Pedagogy. 19(3), 85-110, 2012. 5. S.I. Chae, J.H. Kim, S.K. Han, H.K. Lee, H.S. Jang,“The Ethicality of Athletes and Alternative”. Journal of Korean Society for Sport Anthropology. 7(2), 73-93, 2012. 6. S.H. Kwon, H.S. Jeon, K.C. Lee,“Conceptual Structure of In-sung for Korean Athletes and Development of In-sung Scale”. Korean Society of Sport Psychology. 25(1), 115-128, 2014. 7. D.I. Han, J.W. Kim, O.R. Kwon,“Values of Oriental Ethics for Sports Leaders in Approach of Virtue Ethics: A literature review research”. Philosophy of Movement. 25(2), 1-15, 2017. 8. S.Y. Beak, B.D. Park,“The Study on the Ethical Sensitivity and the Consciousness of the Vocational Ethics for the Prospective Adapted Sport Instructors”. Journal of Adapted Physical Activity & Exercise. 24(4), 23-33, 2016. 9. B.J. Kim,“Measuring Self-Management Practices in Korean Athletes”. Korean Journal of Sport Science. 14(4), 125-140, 2003. 10. B.S. Kim, D.H. Lee, H.S. Ryu,“Relationship between Self-Management Behavior and Sports Confidence of University Soccer Athletes”. Journal of coaching development. 14(3), 34-41, 2012. 11. C.I. Mun,“The Influences of Self-Management and Psychological Skills on Concentration among Elite Shooting Athletes”. Journal of coaching development. 13(2), 47-57, 2011. 12. J.H. Kim, D.H. Woo,“Relationship of own management conduct which follows in Youth soccer player parents motion support conduct and social maturity morality”. Korean Journal of sociology of sport. 21(3), 593-607, 2008. 13. K.S. Kim,“A Study on the Effects of the Consciousness of Human Rights in Senior People on Their Attitude towards Social Participation and the Mediation of Self-Efficacy”Master, Mokpo National University, 2013. 14. J.B. Seo, S.I. Kim,“The Influence of Sports Elites on Athletic Identity and Athletics Outcomes of Elite Athletes. Korean Sport Society”. 16(3), 727-736, 2018. 15. S.K. Lee, “The Relationship between Self-management and Sport Burn-out on Fencers”. Korean Sport Society. 9(3), 129-137, 2011. 16. S.O. Park, J.K. Kim,“A Study on the Violation of Human Rights and Efficient Measures of Student Athletes. Korean Sport Society”. 12(2), 33-44, 2014. 17. N.S. Song, J.H. Lee,“Performance Role Task for Increase of Sport Human Rights in School Athlete Coach”. Authors: Han, Kyung-Seok, Yang, Chun-Ho

Paper Title: Relationship between Leisure Immersion and Life Satisfaction of Marine Leisure Sports Enthusiasts Abstract: The purpose of this study was to investigate the relationship between leisure immersion and life satisfaction. The main group considered for this study was marine leisure sports enthusiasts. To conduct this study, a survey in the form of a questionnaire was used. The survey targeted 256 marine leisure sports enthusiasts in 2018. For analysis of the data obtained, SPSS 12.0 statistical program was used. From the use of the software, frequency analysis, exploratory factor analysis, reliability test, correlation analysis, and multiple regression analysis were conducted. This enabled the following findings to be reached. Firstly, results obtained from the study pointed that the leisure lifestyle of marine leisure sports enthusiasts has a positive correlation with leisure immersion and life satisfaction. Secondly, among the leisure lifestyle, family-oriented, rational planning, and work-oriented all had a positive influence on the behavioral immersion, and the sensory pursuit, relationship-oriented, and leisure helplessness all had a positive influence on cognitive immersion. Third, among the leisure lifestyle, family-oriented, relationship-oriented, rational planning, and work-oriented all had a positive influence on the physical activity satisfaction, and family-oriented, sensory pursuit, relationship- oriented, and work-oriented all had a positive influence on rest activity satisfaction, and the family-oriented, rational planning, and leisure helplessness all had a positive influence on social activity satisfaction. In conclusion, it was observed that the leisure lifestyle of marine leisure sports enthusiasts has a positive correlation with leisure immersion and life satisfaction. It was also observed that the leisure lifestyle has a partial influence on leisure immersion, behavioral immersion and cognitive immersion affecting the leisure lifestyle were incompatible with each other. In addition, the leisure lifestyles had a partial impact on life satisfaction, where among them, the leisure lifestyle of family-oriented, relationship-oriented, and work-oriented all had an 37. influence on the life satisfaction. 196-201 Keyword: Marine, Characteristics, Leisure, Lifestyle Satisfaction. References: 1. M.G. Kang, W.S. Kim, “Residents` expectations, social trust and consciousness according to the Marina Development as the Marine Leisure Sports Facilities”. Korean society for the sociology of sport. 26(3), 53-77, 2013. 2. B.H. Lee, S.S. Kim, “The Relationships between Satisfaction with Participation and the Repurchase Intention according to Lifestyle Characteristics of Sports Center Participants”. Korea sport society. 11(1), 131-143, 2013. 3. K.S. Lee, “Study on the urban housing corresponding to the lifestyle”. Master, Hanyang University, 2012. 4. S.S. Oh, J.S. Kim, W.S. Choi, “The Study of Constraints on the Level of Leisure Participation and Life Satisfaction”. Korean Journal of Sports Science. 20(1), 285-295, 2011. 5. H.C. Joo, S.H. Kim, “The Relationship Among Leisure Life Style, Leisure Satisfaction and Life Satisfaction of College Students”. Korea Society for Wellness. 8(4), 57-72, 2013. 6. J.Y. Lee, “The Relationships among Leisure Perception, Leisure-related Social Support and Health of Leisure Activity Participants”. Journal of Korean Sociology of Sport. 11(1), 227-244, 1999. 7. Y.M. Chung, “A Study on Casual Relationships among Participation Motivation, Sports Commitment and Leisure Satisfaction”. Korean Journal of Physical Education. 40(1), 749-760, 2001. 8. K.B. Kim, “Influence of perceived leisure constraint and leisure satisfaction on the leisure immersion of high school students”. Master, Pusan National University, 2003. 9. M.J. Ji, “Analysis on Relationship among Leisure Constraint, Flow Experience, Lifestyle type”. Journal of Sport and Leisure Studies. 30, 973-984, 2007. 10. Y.R. Kim, “Effects of Lifestyle on Leisure Flow and Satisfaction of University Students”. Master, Dankook University, 2011. 11. Y.J. Ko, “The Difference of participation Motives and Satisfaction of Sports participation of the aged According to the Types of Lifestyles”. Journal of Korean Society of Sport Policy. 12, 1-13, 2008. 12. S.H. Kim, “Influence of Life Satisfaction on the Sports Participation according to Life-style of University Students”. Master, Kookmin University, 2006. 13. S.N. Woo, “The Development Study of The Leisure Life Style Scale.” Journal of Leisure Studies. 7(1), 1-26, 2009. 14. Y.M. Sohn, S.S. Oh, S.N. Woo, “The Study on the Criterion-related Validity of the Leisure Life Style Scale”. Journal of leisure and recreation studies. 34(2), 111-124, 2010. 15. K.S. Lee, K.J. Kim, “The Influence of Participation Motivation and Life Styles on Leisure Satisfaction, Leisure Flow and Self- Esteem of College Student”. Journal of leisure and recreation studies. 34(2), 59-70,2010 . 16. T.K. Scanlan, P.J. Carpenter, M. Lobel, “Simons JP, Keeler B, Schmidt GW. A model of sport commitment, paper present at the annual meeting of the north American society for the psychology of sport and physical activity”. Houston, TX, 1990. 17. B.W. Ahn, S.H. Hwang, “Relationship Between Leisure Competence, Flow, Leisure Satisfaction, and Self-Efficacy in Leisure Sports Participants”. Journal of Leisure Studies. 9(3), 1-19, 2012. 18. Y.S. Yoon, “The effect of leisure flow experience of Paragliding participants on Leisure identity and Life satisfaction”. Journal of leisure and recreation studies. 34(2), 195-204, 2010. 19. H.H. Kim, C.W. Lee, H.S. Jeon, “The relationship between serious Leisure and Leisure flow of Han river water Leisure participants. Journal of leisure and recreation studies”. 35(4), 113-125, 2012. 20. M.G. Raghed, J.C. Beard, “Measuring leisure Satisfaction. Journal of Leisure Research”. 1,576-587, 1980. 21. S.R. Ha, “The Relationships among Leisure Motivation, Leisure Attitude, and College Life Satisfaction in Korean College Students. Journal of leisure and recreation studies”. 37(4), 15-32, 2013. 22. B.W. Jang, S.W. Lee, J.B. Kim, H.H. Lee, S.J. Oh, B.I. Yun, H.N. Yun, J.Y. Dong, T.Y. Jang, D.S. Han, “Analysis of Cause and Effect for Participants` Life Satisfaction in Winter Leisure Sports. Korean Society of Sport Psychology”. 19(2), 215-231, 2008. 23. T.Y. Moon, “The Effects of the Type of Involvement in Marine Sport Tourism on Flow Experience and Life Satisfaction”. Korea sport research. 17(2), 809-816, 2006. 24. K. J. Lee, S.S. Kim, “The Relationship among Life Style, Absorption Experience and Life Satisfaction of MTB Tournament Participants. Korean Sport Society”. 8(2), 253-262, 2010. 25. Y.T. Kim, S.H. Song, “The Relationship between Lifestyle Type, Sport Commitment and Leisure Identity according to Soccer Activity Participations of Individual Character. Journal of Korean Society for the Study of Physical Education, 16(4), 99-117, 2011. 26. J.W. Lee, “The relationship between participation motivation, flow, affective Loyalty and customers` behavioral intention of fitness club in university”. Journal of leisure and recreation studies. 32(1), 25-36, 2008. 27. W.H. Lee, Y.S. Jung, S.B. Kong, W.K. Kim, “The Influence of Participation motivation and flow experience on Life satisfaction for tennis club members”. Journal of leisure and recreation studies. 33(1), 17-27, 2009. 28. B.H. Kang, H.S. Kim, “The Causal Relationship Model among Life style , participation of Sport for all, and School Satisfaction of the Universities”. Korean Journal of Physical Education. 39(4), 1001-1013, 2000. 29. T.Y. Moon, “The Effects of Leisure Flow Experience of Participants in Health Yoga Program on Leisure Satisfaction and Life Satisfaction”. Journal of Sport and Leisure Studies. 30, 895-912, 2007. 30. H.S.Sin, S.I. Oh, “The Relationship of Participation Satisfaction, Leisure Flow and Life Satisfaction according to Participation in Life Dance”. Journal of Sport and Leisure Studies. 30, 951-962, 2007. Authors: Ham, Do-Woong, Han, Kyung-Seok Relationship between Physical Self-Concept and Social Personality Development of Adolescents Paper Title: Participating in Marine Sports Activities Abstract: The purpose of this study was to investigate the relationship between the physical self-concept and social personality development of adolescents participating in marine sports activities. The purpose of this study was to investigate the relationship between the physical self-concept and social personality development of adolescents participating in marine sports activities. The purpose of this study was to investigate the relationship between the physical self-concept and social personality development of adolescents participating in marine sports activities. In conclusion, it was seen that physical self-concept of adolescents participating in marine sports activities had a partial influence on the adolescent’s social personality development. Conclusively, it can be seen that physical self-concept of adolescents participating in marine sports activities can positively help the development of the adolescent’s social personality. As it is the case that most of the curricula and school education of Korea is focused on athletics, it is the case that an adolescent could be seen to be deprived of wide learning opportunities if the youth is prohibited or unable to live with access to being in nature. Raising the interest in marine sports for adolescents who will play the leading role in the future of marine nations, and will be a determining factor in improving the physical self-concept of youths through marine sports activities, which can also help the social personality development of the youths as they mature to adulthood. The basic data for achieving this information was provided through this study and the data from the study confirms the results.

38. Keyword: Marine Sports, Adolescents, Social Character, Opportunities, Self-Concept. 202-207

References: 1. I.K. Park, “Effects of Exercises and Electronic Games on Self-Esteem and Aggression in Middle School Students”. Journal of coaching development. 19(4), 3-14, 2017. 2. B.J. Lee, An introduction to sports sociology. Donghwa publisher; 1998. 3. J.S. Lim, C.H. Yang, “Relationship between Sports Confidence and Class Satisfaction according to Adolescents’ Participation in Marine Sports”. Journal of the Korea Convergence Society. 6(4), 169-176, 2015. 4. B.J. Kim, “Development and Validation of the Korean Version of the Physical Self-Description Questionnaire(PSDQ)”. Korean Society of Sport Psychology. 12(2), 69-90, 2001. 5. J.Y. Shim, Y.S. Yook, “The Effects of Dance Sports on Physical Profile and Self-Concept among Obese Middle Aged Women”. Korean Society of Sport Psychology. 19(2), 251-271, 2008. 6. Y.H. Park, “A Study on the Effects of the Progress of physical Self-Consciousness of Ball Sports Program”. Journal of coaching development. 9(2), 309-316, 2007. 7. K.S. Han, “The physical self-conception that dance-sport influences elementary school students. Korean Society of Leisure Sport”. 8, 153-170, 2004. 8. S.H. Huh, S.M. Park, “A study for development of the integrated humanity scale for children”. The Journal of Child Education. 24(4), 89-103, 2015. 9. J.W. Yoon, E.J. Kim, “Validation study of Adolescent Sociality Scale”. The Korean Psychological Association. 2006(1), 658-659, 2006. 10. M.S. Ko, E.C. Kwak, “Relationship between Sex, Sport Character, Empathy and Pro-social Behavior among Elementary School Student who experienced School Sport Club”. The Korean Journal of the Elementary Physical Education. 21(3), 17-33, 2015. 11. H.I. Kwon, S.H. Woo, Y.J. Kang, “The Effect of Intensive After-school New-sports Program on Middle School Students' Personality Development”. Korean Journal of physical education. 53(2), 215-226, 2014. 12. S.H. Lee, “Effects of Participation Motivation and Attitudes Toward Sports on Development of Sociability Among Middle Schoolers Participating in After-school Sports Activities”. Korean Journal of physical education. 49(6), 103-113, 2010. 13. S.J. Seo, C.S. Lee, “A Study on Relationship between Participation in Dance Sports and Interpersonal Relation and Development of Sociality”. Journal of Korean Society for the Study of Physical Education. 13(2), 21-42, 2008. 14. M.B. Choi, H.B. Lee, “The Relationship between Physical Self-Concept and Personality and Manners in Judo Youth”. Journal of Korean Society for Sport Anthropology. 12(2), 15-38, 2017. 15. S.S. Kim, “The effect of Taekwondo practice for the body concept and social abilities”. Master, Korea national sport University, 2008. 16. K.W. Kim, “Effects of Physical Exercise on Physical Self-Concept”. Korean Society of Sport psychology. 14(1), 1-12, 2003. 17. M.S. Oh, “The Effect of Elementary Student's Taekwondo Training on their Personality Education, Physical Self-concept and Adjustment to School Life”. Master, Kyunghee University, 2006. 18. J. Lee, S.K. Yoo, Y.O. Lee, “Exploring Instructional Methods for the Integration of Subject Education and Character Education”. The Korean Journal of Educational Methodology Studies. 26(3), 463-487, 2014. 19. B.B. Hwang, “An Influence on Physical Self-Conception, Character Development and Life Attitude of Elementary School Student’s Taekwondo Training”. Korean Journal of Sports Science. 25(1), 221-238, 2016. 20. H.M. Kang, “The Influence of Social Ability in School Life Attitude According to Physical Self-Concept of Taekwondo Trainee”. Master, Kyunghee University, 2014. Authors: Do, Jea-Hyun, Jo, Yeong-Gwon, Lim, Jong-Sik, Yang, Chun-Ho The Motivation of Physical Education Class in Liberals Arts Participation, Sports Personality, and Paper Title: Development of Sociality in the University Students Abstract: To investigate the correlation in motivation of participation, sports personality, and development of sociality in the university students who went through general physical education, and to provide the basic data to enhance the general physical education, qualitatively. Population was set with the university students who went through the general physical education, and 340 copies of the final data were analyzed with SPSS 21.0 statistical program. Frequency analysis, correlation analysis, and multiple regression analysis were performed with the following conclusions. Motivation of participation in the university students who went through the general physical education showed the positive relationship with pleasure and technical development in sincerity of sports personality. In addition, motivation of participation showed positive relationship with pleasure, technical development, and health/physical strength in sociability of sociality development. Also, autonomy showed positive relationship with pleasure, technical development, sociality, and health/physical fitness, and activity showed the positive relationship with pleasure, sociality, and health/physical strength..

Keyword: Sports Character, Social, Health, Development, Motivation, Physical Fitness

References: 1. S.I. Kim, H.S. Lee, H.J. Kim, M.H. Seo, “Flow and Development Strategies of Liberal Education at University”. Korean Journal of General Education. 7(1),11-39, 2013. 2. S.Y. Kwon, M.H. Kwon, S.H. Hwang, H.B. Kim, “Perception of College Students about the Sports Activities”. Journal of Korean Society of Sport Policy. 13(3), 107-120, 2015. 3. J.A. You, “Critique on Educational & Competitive Power of Physical Education as Liberal Education in Korea Higher Education”. Korean journal of physical education. 52(6), 205-216, 2013. 4. B.J. Lim, E.H. Koh, Y.L. Chung, “Sport Participation in Korea: Growth and Changes”. Korean journal of physical education. 39(1), 39. 222-232, 2000. 5. M.S. Ko, E.C. Kwak, “Relationship between Sex, Sport Character, Empathy and Pro-social Behavior among Elementary School Student who experienced School Sport Club”. The Korean Journal of the Elementary Physical Education. 21(3),17-33, 2015. 6. S.W. Choi, B.J. Oh, N.S. Back, “The Effect of Taekwondo Training Satisfaction of Middle and High School Students on Personality 208-214 Development and School Life Adaptation”. The Korea Journal of Sport. 15(4), 83-92, 2017. 7. H.J. Ryu, E.K. Park, “A Study on Environmental Designs for a Safe Campus from Crimes- Based on the Collegian's Perceptions of on-campus Crimes and Fear of Crimes”. The Architectural Institute of Korea. 26(8), 97-106, 2010. 8. B.R. Kang, S.R. Lee, “The Direction of Character Education in College: focused on the current character education programs in domestic and foreign universities”. Journal of Women’s Studies. 28, 69-102, 2013. 9. H.S. Kim, “Exploring students' creativity-core competencies in higher education curriculum from professors' perspectives”. The Journal of creativity education. 13(3), 145-163, 2013. 10. H.J. Ji, “An Inquiry into the Awareness on the Liberal and Character Education among College Students”. Korean Journal of General Education. 7(5), 433-466, 2013. 11. H.M. Jo, S.M. Jeon, “Revised Physical Education National Curriculum`s Compositional Direction”. The Journal of Korea elementary education. 21(3), 31-44, 2011. 12. S.H. Han, H.Y. Jeong, M.J. Lee, S.H. Kim, J.S. Jeon, I.S. Park. Understanding of pedagogy. Yangseowon Publishing Company. 2013. 13. The Legislative Office[Internet]. Personality education promotion act, http://www.moleg.go.kr/ (website), 2015. 14. C.Y. Jang, “The Structural Relationship of Perceived Social Psychological Climate on Sport Character among College Students Participating in Exercise”. Korean Society of Sport Psychology. 28(2), 1-11, 2017. 15. J.Y. Lee, J.H. Kim, “The Effects of Physical Activity According to Participation Degrees on Development of Sociability among Middle School Student. Korea sport research..15(4), 1011-1027, 2004. 16. Leonard. A sociological perspective of sport Minneapolis, MN: Burgess Reading, MA: Addison-institute. 1980. 17. B.J. Lim, Sports sociology introduction. Rainbow-books Publishing Company. 2010.. 18. J.H. Dong, K.H. Lee, K.J. Park, “The Analysis of Emotion, Sociality and Life Attitude of Elementary School Students Training for Taekwondo”. Journal of coaching development. 11(4), 119-127, 2009. 19. E.J. Cha, Y.J. Kim, “Analysis of the Differences in Personalities of Adolescent Participating in School Sports Clubs”. Korean journal of physical education. 53(1), 25-34, 2014. 20. I.R. Cho, J.W. Lee, K.A. Hyung, “The relationship among the exercise-fun factors, physical self-concept and well-being-oriented behavior of taekwondo club participation in university”. Korean Journal of Sports Science. 24(1), 2015, 153-164. 21. S.W. Yoon, S.T. Kang, “The Effect of the Class Satisfaction on Exercise Commitment and the Exercise Adherence Intention for the Participants in the Golf for General Education at a University”. Journal of Golf Studies. 8(2), 2014, 99-112. 22. R.J. Vallernad, R. Bissonnette, “Intrinsic extrinsic and motivational style as predictors of behavior: A Prospective study”. Journal of Personality and Social Psychology. 60, 599-620, 1992. 23. Y.G. Jung, “An Exploratory Factor Analysis of Sport Participation Motivation”. Korean Society of Sport Psychology. 9(1), 113-131, 1998. 24. S.Y. Kim, K.S. Lee, “Structural Relationships between Achievement Goal Orientations of a Student Taking Cultural Physical Education Class, and Commitment to Exercise, Class Satisfaction and Recommendation Intention”. Journal of Sport and Leisure Studies.47(1), 45-56, 2012. 25. J.J. Park, “Can sports build Character? The theoretical, empirical grounds and tasks of character education through sports”. The Journal of Curriculum Studies. 29(3), 173-202, 2011. 26. J.H. Kim, “The Effects of Physical Activity according to Participation Availability on Development of Sociability among Middle School Student. Korea sport research”. 16(6), 799-813, 2005. 27. J.S Chae, “The Effect on the Social Development of the University Students' Participation in Sports”. Journal of Korean Society of Sport Policy. 12, 45-56, 2008. 28. S.B. Lee, K.K. Kim, “A Study on Sports Participation, Creativity, Personality and Characteristics”. Korean Society for Holistic Convergence Education. 19(4), 159-172, 2015. 29. H.I. Kwon, S.H. Woo, Y.J. Kang, “The Effect of Intensive After-school New sports Program on Middle School Students' Personality Development”. Korean journal of physical education. 53(2), 215-226, 2014. 30. H.M. Jun, C.H. Lee, S.B. Na, “Relationship between Type and Level of Sports Activity Participation and Creative Personality”. Korean Journal of Sports Science. 22(6), 669-680, 2013. 31. J.W. Kim, “Efficacy Analysis of Developed Course for Promoting Character Education with Women's University Students”. Journal of Digital Convergence. 13(11), 481-491, 2015. 32. Korean Educational Research Association. Personality education. Moonumsa Publishing Company. 1998. 33. P. Arnold, Sport, ethics and education. Bloomsbury Publishing. 1997. 34. H.J. Lee, M.S. Hong, “The Influence of Middle School Students Participation in Dance Class during Sport Club Activity on Dance Awareness, Physical Education Enjoyment, and Exercise Adherence”. Official Journal of Korean Society of Dance Science. 32(1), 31-45, 2015. 35. S.H. Lee, “Effects of Participation Motivation and Attitudes Toward Sports on Development of Sociability Among Middle Schoolers Participating in After-school Sports Activities”. Korean journal of physical education. 49(6), 103-113, 2010. Authors: Sam-Jin Jeong

Paper Title: Design and Implement of Pets Management System using Mobile Phone Abstract: Products for companion animal management system using smart phone are rapidly expanding as the pet animal industry grows globally. In this paper, we tried to broaden the application by integrating various contents about companion animals. We aim to apply various contents related to companion animals such as information management, schedule, health care, QR code, SNS, shopping, and location information service to the application. As a result of this research, we found that the new synergy effect was achieved through the integration between the contents, and the application field of the contents was widened due to the increased connectivity. In this study, we have developed a synergy effect through the integration of various contents by adding various contents related to companion animals and studied the necessary parts to expand the application field by increasing the interaction and connection between functions. Improvements and differentiations include comprehensive content management and comprehensive information management and sharing through QR CODE SYSTEM. As a result of the production and execution of this PET-IN, the interactions between the respective contents smoothly complemented the disadvantages and the advantage was maximized. In addition, by creating synergy effect of new effects, various functions can be applied more than other applications, and it is wider and more efficient in function. The user's feedback is reflected, and more content is added to further expand the function and efficient linkage can lead to the user's use of the application and the high effect of the function linkage can lead to the satisfaction of the user. This implies that comprehensive content composition is required for companion applications and may be important data for composing contents of companion animal applications in the future.

40. Keyword: Pets Management System, QR Code, Companion Animal Application, Mobile Application 215-218

References: 1. J. Y. Lee, “A Study for the Acceptance Factors of the Introduction of a Smart IoT Technology for Well-being Companion Animal,” PhD Thesis, Yeonsei University, Seoul KOREA: 2019. Available: https://www.riss.kr/link?id=T15003100 2. M. Y. Huh, “A Study on Measures to Enhance Consumer-Orientation in Companion Animals Market,” in Korea Policy Analysis, vol.16 no.14, 2006, pp. 1-96. Available: https://www.riss.kr/link?id=A102969237 3. Yonhap News [Internet]. About 10 million people live with pets, 2014. [online]. Available: https://www.yonhapnews.co.kr/bulletin/2014/09/29/0200000000AKR20140929161900030.HTML?input=1179m (website) 4. J. Y. Kim, W. K. Kang, Y. S. Kim, H. W. Kim, S. Y. Park, I. H. Baik, et al., “Review on the problems related with companion animals in Korea,” in Journal of Korean Association of Animal Assisted Psychotherapy, vol.7 no.1, 2018, pp.31-7. Available: http://db.koreascholar.com/article.aspx?code=354703 5. C. K. Baik, C. H. Shin, B. Y. Kim, “Critical Factors Affecting Successful Client Satisfaction Management of Companion Animal Hospital,” Journal of Veterinary Clinics, vol.29 no.1, 2012, pp.49-57. Available: https://www.riss.kr/link?id=A101253453 6. Y. J. Jo, M. O. Kim, J. H. Son, H. Y. Woo, J. H. Kim, J. S Lee, “Analysis of Companion animal industry market and Trend for Companion Animal cloth,” Journal of Korean Association of Human Ecology, 2017, pp.133-134. Available: https://www.dbpia.co.kr/Publisher/IPRD00011341 7. H. Y. Lee, M. S. Cho, “A study on the figurative art expression reflected on the relationship with the animal companion and the inner self,” Cartoon & Animation Studies, no.42, 2016, pp.293-313. Available: https://www.riss.kr/link?id=A102056013. 8. E. J. Jung, Y. S. Kim, Choi JW, “The Analysis of a Diet for the Human Being and the Companion Animal using Big Data in 2016,” Clinical Nutrition Research, vol.6 no.4, 2017, pp.256-266. Available: http://www.riss.kr/link?id=A104222482 9. H. R. Kang, “A Study on Multi-Object Control Method Using Smartphone Bluetooth Communication and the Methodologies of Convergence Research,” Journal of digital Convergence, vol.13 no.7, 2015, pp.341-347. Available: https://www.earticle.net/article.aspx?sn=250999 10. J. M. Park, J. K. Park, “Technological Tendency for 2D Image Code and Its Recognition on Mobile Phone,” Journal of Communications and Networks, vol.36 no.6,2011, pp.663-673. https://www.dbpia.co.kr/journal/articleDetail?nodeId=NODE01648872&language=ko_KR 11. Fischer M, D. Rybitskiy, G. Strauss, A. Dietz, C. R. Dressler, “QR-Code Based Patient Tracking: a Cost-effective Option to Improve Patient Safety,” LARYNGORHINOOTOLOGIE, vol.92 no.3, 2013, pp.170-175. Available: https://doi.org/10.1055/s-0032-1329970 12. C. Y. Lee, J. S. Yang, D. H. Kim, “Ubiquitous Service Model for Information Convergence of Jeju Island Culture, Tourism, Sport and Traffic,” Journal of the institute of internet, broadcasting and communication, vol.8 no.4, 2008, pp.97-104. Available: https://www.earticle.net/Article/A78324 Authors: Massuline Antonio D. Ligaya, Estrella F. Fajardo, Joung-Hyun Ham, Seungjin Lee The Difference in English Proficiency Between Tourism and Engineering Students of Two Asian Paper Title: Universities Abstract: This study was conducted to evaluate and compare the level of English proficiency of Tourism and Engineering students in two Asian universities and to examinee how certain factors affect their proficiency in the language. The descriptive technique was applied in this study. Statistical analyses were done using mean, one-way analysis of variance (ANOVA), Turkey’s HSD and correlation coefficient. The correlation performed between English proficiency of the respondents and the other variables yielded different results prompting different decisions on hypothesis 1. Hypothesis 2 is rejected. There exists a significant difference between the English proficiency of Tourism and Engineering students. Engineering students of university A have mean scores in English proficiency significantly different or higher than Tourism students of university A and the Engineering and Tourism students of university B.

Keyword: Attitude Towards English, English Proficiency, Motivation Towards English commas. References: 1. H.L. Blake, S. Mcleod, S. Verdon, F. Fuller, “The relationship between English proficiency and participation in higher education, employment and income” Int J Speech Lang Pathol., 20(3), 202-215, 2018.https://doi:10.1080/1754907.2016.1229031 2. S.H. Ting, E. Marzuki, K.M. Chuah, J. Misieng, C.Jerome, “Employers’ views on the importance of English proficiency and communication skill for employability in Malaysia Indonesian Journal of Applied Linguis- tic, 7(2), 315-327, 2017. https://doi:dx.doi.org/10.17509/ijal.v7i2.8132. 3. Y. Zhen, “The effects of English proficiency on earnings of U.S. foreign-born Migrants: Does Gender matter?” Journal of 41. Finance and Economics, 1(1), 2013. https://doi:10.12735/jfe.vlilp27 4. Tam, K.W., Page, L., “Effects of language proficiency on labor, social and health outcomes of immigrants in Australia” Economic, Analysis & Policy 2016,https://dx.doi.org/10.1016/j.eap.2016.08.003 5. M.K. Bobanovic, J. Grzinic, “The importance of English language skills in tourism sector: A comparative study of 219-224 students/employees perceptions in Croatia” Almatourism–Journal of Tourism, Culture and Territorial Development., 2 (4), 1-14, 2013. https://doi:10.6092/isnn2036-5195/2476 6. N. Prachanant, “Needs analysis on English language use in tourism industry.” Procedia – Social and Behavioral Sciences, 66 117- 125, 2012. https://doi:10.1016/j.sbpro.2012.11.253 7. S. Younis, M. Abdel Latif, “English language preparation of tourism and hospitality undergraduates in Egypt: Does it meet their future workplace requirements?” The Journal of Hospitality Leisure Sport and Tourism, 11(2), 93-100.2012. https://doi.org/10.1016/j.jhlste.2012.05.001 8. A. Clement, T. Murugavel, “English for employability: A case study of the English language training need analysis for engineering stu- dents in India” English Language Teaching 8(2), 2015. https://doi:10.5 539/elt.v8n2p116 9. P. Sureeyatanapas, A. Boonma, S. Talangkum, “English proficiency requirements for engineering graduates at private organizations in Thai- land” KKU Engineering Journal, 43(S1) 35-39, 2016.https://doi:10.4 456/kkuenj.2016.64 10. P. Spence, G.Z. Liu, “Engineering English and the high-tech industry: A case study of an English needs analysis of process integration engi- neers at a semiconductor manufacturing company in Taiwan.” English for Specific Purposes, 32 (3), 97-109, 2013.https.//doi.org/10.1016/j.e sp. 2012.11.003 11. E. Fajardo, “Language Attitude, Motivation, Learning and Thinking Styles As Correlates of Grammar Proficiency of College Students” Master’s thesis]. Bulacan State University, 2011. 12. R. Miller, Beyond Anova, Basics of Applied Statistics, Chapman & Hall/CRC: 1998. 13. Z.S. Ibrahim, M.A. Hassali, F. Saleem, H. Aljadhey, “Perceptions and barriers towards English language proficiency among pharmacy under- graduates at Universiti Sains, Malaysia” Pharmacy Education 13 (1), 151-156, 2013.https://doi:10.1016/j.sapharm.2014.07.098 14. C. Magno, “Korean Students’ Language Learning Strategies and Years of Studying English as Predictors of Proficiency in English” Teaching English to Speakers of Languages Journal, 2 (1): 39-61, 2008.https://doi. org/10.1111/j.1944- 9720.1997.tb02343.x Authors: Chang Seek Lee, Ji Young Park The Effects of Job Stress and Hope on the Happiness of Office Workers: The Moderated Mediation Paper Title: Model of Growth Mindset Abstract: The study was to verify the moderated mediation effect of growth mindset on the relationship between stress and happiness through hope for 338 office workers in Korea. SPSS Win. 21.0 were used to analyze the reliability, descriptive statistics, and correlation analysis in this study. The moderated mediation effect of growth mindset was analyzed by applying SPSS PROCESS macro Model 7. To verify the moderated mediation effect, the bootstrap analysis was set to 5,000 iterations, and the 42. confidence interval was set to 95%. Research findings are as follows. First, job stress had negative correlation with hopes, growth mindset and happiness. Happiness had positive correlation with hopes and growth mindset. Second, the growth mindset 225-230 moderated the relationship between job stress and happiness via the hope of office workers, which verified the conditional indirect effect of job stress on happiness. These results will help increase office worker’s happiness through hope and growth mindset.

Keyword: Job stress, Hope, Happiness, Growth mindset, Moderated mediation model

References: 1. D. C. Shin, D. M. Johnson. “Avowed happiness as an overall assessment of the quality of life.” Social Indicators Research, 5(1-4), 475-492, 1978. 2. E. Diener. “Subjective well-being.” Psychological Bulletin, 95(3), 542-575, 1984. 3. R. Veenhoven. “Is happiness relative?” Social Indicators Research, 24(1), 1-34, 1991. 4. D. L. Rogers. “Sociometric analysis of interorganizational relations: application of theory and measurement.” Rural Sociology, 39(4), 487, 1974. 5. S. M. Jex. Stress and job performance: Theory, research, and implications for managerial practice. Thousand Oaks: Sage Publications Ltd, 1998. 6. G. Blau. “An empirical investigation of job stress, social support, service length, and job strain.” Organizational Behavior and Human Performance, 27(2), 279-302,1981. 7. K. J. Harris, M. James, R. Boonthanom. “Perceptions of organizational politics and cooperation as moderators of the relationship between job strains and intent to turnover.” Journal of Managerial Issues, 17(1), 26-42, 2005. 8. E. Demerouti, A. B. Bakker, J. De Jonge, P. P. Janssen, W. B. Schaufeli. “Burnout and engagement at work as a function of demands and control.” Scandinavian Journal of Work, Environment & Health, 27(4), 279-286, 2001. 9. S. M. Jex, P. D. Bliese, S. Buzzell, J. Primeau. “The impact of self-efficacy on stressor–strain relations: coping style as an explanatory mechanism.” Journal of Applied Psychology, 86(3), 401-409, 2001. 10. C. L. Cooper, J. Marshall. “Occupational sources of stress: a review of the literature relating to coronary heart disease and mental ill health.” Journal of Occupational Psychology, 49(1), 11-28, 1976. 11. N. Gupta, T. A. Beehr. “Job stress and employee behaviors.” Organizational behavior and human performance, 23(3), 373-387, 1979. 12. R. S. Schuler. “Definition and conceptualization of stress in organizations.” Organizational Behavior and Human Performance, 25(2), 184-215, 1980. DOI:10.1016/0030-5073(80)90063-X 13. D. F. Parker, T. A. DeCotiis. “Organizational determinants of job stress.” Organizational Behavior and Human Performance, 32(2), 160-177, 1983. DOI:10.1016/0030-5073(83)90145-9 14. O. N. Joo, S. Y. Moon. “The mediation effect of mental health on the relationship between job stress and happiness of social workers in mental health facilities.” Mental Health and Social Work, 42(1), 114-143, 2014. 15. S. K. Lee, M. H. Lee, K. E. Kim. “Effects of early childhood teachers' job stress on happiness and organizational commitment.” Journal of Children's Literature and Education, 15(4), 661-680, 2014. 16. Y. H. Kwon. “The effects of organizational climate and self-esteem on teachers' job stress in corporate-sponsored child care centers.” The Journal of Korea Open Association for Early Childhood Education, 15(5), 437-455, 2010. 17. E. H. Jang. “The effect of the job stress of local government employees on the job involvement: with focus on the moderating effect of the subjective well-being and the family strengths.” Master's Thesis, Yonsei University, 2012. 18. E. S. Lee, K. N. Lee. “Influence of emotional intelligence on happiness in infant and toddler teachers: mediating effect of job stress and teacher efficacy.” Korean Journal of Childcare and Education, 11(2), 221-238, 2015. 19. K. Menninger. “The academic lecture: Hope.” American Journal of Psychiatry, 116(6), 481-491, 1959. 20. E. Stotland. The psychology of hope. Jossey-Bass, 1969. 21. C. R. Snyder, Forsyth, R. Donelson. Handbook of social and clinical psychology: the health perspective. New York: Pergamon Press, 1991. 22. C. R. Snyder, C. Harris, J. R. Anderson, S. A. Holleran, L. M. Irving, S. T. Sigmon, et al. “The will and the ways: development and validation of an individual-differences measure of hope.” Journal of Personality and Social Psychology, 60(4), 570-655, 1991. 23. C. R. Snyder. “Hope theory: rainbows in the mind.” Psychological Inquiry, 13(4), 249-275, 2002. 24. C. R. Snyder. The psychology of hope: you can get there from here. New York: Free press, 1994. 25. C. R. Snyder. “The past and possible of hope.” Journal of Social and Clinical Psychology. 19(1), 11-28, 2000. 26. C. R. Snyder, L. Kelvin. Hope theory. In C. R. Snyder, J. S. Lopez (Eds.), Handbook of positive psychology, 2002. 27. V. H. Adams, C. R. Snyder, K. L. Rand, E. A. King, D. R. Sigmon, K. M. Pulvers. Hope in the workplace. Handbook of Workplace Spirituality and Organizational Performance, 2002. 28. D. Ong, L. M. Edwards, C. S. Bergeman. “Hope as a source of resilience in later adulthood.” Personality and Individual Differences, 41(7), 1263-1273, 2006. 29. S. Lee, J. Y. Park. “The effects of acculturative and family-related stress on the well-being of immigrant women in korea: the mediating effect of hope.” Indian Journal of Science and Technology, 9(26), 1-7, 2016. 30. J. Y. Park, C. S. Lee. “Mediating effect of hope between stress coping and psychological wellbeing of women immigrants.” Journal of Digital Convergence, 11(1), 405-412, 2013. 31. C. S. Lee, S. U. Park, Y. K. Hwang. “The structural relationship between mother’s parenting stress and child’s well-being: the mediating effects of mother’s growth mindset and hope.” Indian Journal of Science and Technology, 9(36), 1-6, 2016. 32. H. S. Shorey, C. R. Snyder, X. Yang, M. R. Lewin. “The role of hope as a mediator in recollected parenting, adult attachment, and mental health.” Journal of Social and Clinical Psychology, 22(6), 685-715, 2003. 33. C. S. Dweck. Mindset: The new psychology of success. Random House Digital, Inc., 2008. 34. C. S. Dweck. “Caution-Praise can be dangerous.” American Educator, 23(1), 4-9, 1999. 35. Hochanadel, D. Finamore. “Fixed and growth mindset in education and how grit helps students persist in the face of adversity.” Journal of International Education Research, 11(1), 47-50, 2015. 36. S. Dweck, C. Y. Chiu, Y. Y. Hong. “Implicit theories and their role in judgments and reactions: a word from two perspectives.” Psychological Inquiry, 6(4), 267-285, 1995. 37. S. Dweck, A. Master. Self-theories and motivation: students' beliefs about intelligence. In K. R. Wentzel, A. Wigfield. (Eds.), Handbook of Motivation at School. Routledge, 2009. 38. J. Crum, P. Salovey, S. Achor. “Rethinking stress: The role of mindsets in determining the stress response.” Journal of Personality and Social Psychology, 104(4), 716, 2013. 39. S. Lee. “Authentic leadership and organizational effectiveness: the roles of hope, grit, and growth mindset.” International Journal of Pure and Applied Mathematics, 118(19), 383-401, 2018. 40. S. Lee, M. N. Jung, G. H. Lee. “The moderated effect of growth mindset on the relationship between authentic leadership and organizational effectiveness.” International Journal of Pure and Applied Mathematics, 118(19), 415-426, 2018. 41. Y. K. Hwang, C. S. Lee. “Relationship between Stress and Happiness in Middle School Students: dual mediation effect of growth mindset and self-esteem.” Medico-Legal Update, 18(1), 248-253, 2018. 42. Samsung. Economic Research Institute. Samsung Economics, 2010. 43. H. Lee. “The experience of stress among Korean employees working in a large conglomerate.” Master's Thesis, Inha University, 2013. 44. M. S. Ha, Y. S. Kwon. “A study of antecedents and consequences of job stress in the Korean public sector.” The Korean Journal of Public Administration, 11(3), 214-245, 2002. 45. Y. H. Choi, H. K. Lee, D. G. Lee. “Validation of the Korean version of Snyder`s dispositional hope scale.” Korean Journal of Social and Personality Psychology, 22(2), 1-16, 2008. 46. S. Lyubomirsky, H. S. Lepper. “A measure of subjective happiness: preliminary reliability and construct validation.” Social Indicators Research, 46(2), 137-155, 1999. 47. J. W. Shin. “Effect of working women's work/family conflict, emotional intelligence, and emotional labor on happiness.” Master's Thesis, Chung Buk University, 2012. 48. F. Hayes. Introduction to mediation, moderation, and conditional process analysis: a regression based approach. New York: The Guilford Press, 2018 Authors: Chang Soo Han, Yen yoo You A Research on the Effects of Partnership between Consultant and Client in Accordance with Paper Title: Differentiation of Innovative Organizational Culture on the Consulting Performance Abstract: This study aimed to verify the moderating effects of innovative organizational culture for customers’ change on the effects of partnership between consultant and client on the consulting performance. This study performed an empirical research through a survey targeting the companies that had received consulting for once or more. Based on the LIKERT 5-Point Scale, the survey items included five demographic questions, six questions about partnership between consultant and client as an independent variable, six questions about consulting performance as a dependent variable, and four questions about innovative organizational culture as a moderating variable. Using the SPSS 23.0 for the empirical analysis, the factor analysis was not conducted as there was just one independent variable. The moderating effects were verified through the reliability analysis, correlation analysis, and regression analysis. As there was just one independent variable, the factor analysis was not performed. In the results of reliability analysis, the Cronbach Alpha values were all 0.6 or more. In the results of correlation analysis, the correlations between partnership and consulting performance(0.529), partnership and innovative organizational culture(0.328), and innovative organizational culture and consulting performance(0.656) were a bit high in the significance probability as 0.000. In the results of reliability analysis and correlation analysis, there were no problems with the measuring tools. In the results of regression analysis, the partnership had significant effects on the consulting performance. In the results of analyzing the moderating effects, the R2 value was increased and the significance probability was under 0.05, so that the moderating effects of innovative organizational culture were verified. Even though the partnership has effects on the consulting performance, if there is no organizational will to change, it could have negative effects on the consulting performance. In the future, there should be more researches on methods to strengthen the partnership and also design and 43. development of measuring tools for new competencies of consultants as an element of partnership. Keyword: Business consulting, Business consultant, Partnership, Consulting performance, Innovative organizational culture, Inquiry Consulting Model 231-234

References: 1. Iansiti, M., Levien, R. “Strategy as Ecology”, Havard Business Review. 2004 March; pp.68-78. 2. Baek, Sang woon. “An Improvement of the Business Performance through the Relationship Analysis between Intellectual Property Management Consulting Service Quality and Intellectual Property Management Activity in SMEs.” Ph.D Thesis , The Graduate School of Kunkuk University;2006 3. Thomas Armbruster. ECONOMICS and SOCIOLOGY of MANAGEMENT CONSULTING;2006.. 4. Williams, A. P. O. and S. Woodward. The Competitive Consultant-A Clientoriented Approach for achieving Superior Performance. The Macmillan Press Ltd, UK. 1994 5. Moon Jun, Kim. “A Study on the Effect of Business Consultant Competency on Organizational Performance : Focused on the Moderating Effect of CEO Characteristics and Organizational Support.”, Ph.D Thesis, Graduate School of Kongju National University; 2015. 6. Ann K. Brooks & Kathy Edwards. Consulting Uncertainty The Power of Inquiry. Routledge, 2014. 7. Quinn, R. E. & Kimberly, J.R. , planning and perseverance: Guidelines for Managerial Practice. In Kimberly, J. R., & Quinn, R. E.(Eds.), Managing Organizational Transitions Homewood Richard. 1984; 295-313 8. Quinn, R. E & M. R. McGrath. “The Transformation of Organizational Cultures: A Competing Values Perspective,” in P. J. Frost et al.(Eds.), Organizational Culture, Beverly Hills. 1985; Sage Publications Ltd. 9. Han CS & Yoo YY, Hong JW, Yoon KJ. A study on the impact of consulting service quality on non-financial Business performance -Focusing on the moderating effect of innovative organizational culture-, International Journal of Pure and Applied Mathematics Volume 118 No.19 , p675-686. 2018. 10. So-Chun Kim, “The Effects of the Partnership Characteristics of the Social SCM on the Social Business and outcome of the SCM”, Ph.D Thesis, The Graduate School of Venture Hoseo University; 2014 11. Hyun su Yoo, “A study on the Effect of Capability of Consultant on the Consulting Results and Intention for Repurchase”, Master Thesis, Graduate School of Knowledge Service Consulting Hansung University; 2015. 12. Chang Su Ryu, “The Impacts of Partnership between DAPA and Defense Industry on SCM Performance”, Ph.D Thesis, Graduate School, Hansung University; 2012 Authors: Chang Seek Lee, Su Hyun Park The Effect of Negative Evaluation and Self-esteem on the Presentation Anxiety of Adolescents: The Paper Title: Moderated Mediation Effect of Growth Mindset Abstract: The purpose of this study was to provide policy and educational suggestions for solving the presentation anxiety of middle school students, by analyzing the moderated mediation effect of growth mindset on the relationship between negative evaluation and presentation anxiety through self-esteem. The study utilized the SPSS PC + Win. 23 and SPSS PROCESS macro 3.1. The main statistical technique used in the study was to 44. utilize a frequency analysis, reliability analysis, correlation analysis, and moderated mediation effect analysis. In this case, the effect analysis verification utilized a bootstrap method, with 5,000 samples of sub-trap and a 95% confidence interval. First, it is noted that the higher the negative evaluation, the higher the anxiety of 235-240 presentation, and the higher the self-esteem, the lower the anxiety of presentation. Second, the growth mindset moderated the path between a negative evaluation, self-esteem, and anxiety in the participants. Based on the results of this study, suggestions for recommended future research were suggested.

Keyword: Negative Evaluation , Self-esteem, Presentation Anxiety, Growth Mindset, Moderated Mediation Effect.

References: 1. G. L. Paul, D. T. Shannon. “Treatment of anxiety through systematic desensitization in therapy groups.” Journal of Abnormal Psychology, 71(2), 124-135, 1966. 2. P. K. Wilbur. Stand up, Speak up, or Shut up: A practical guide to public speaking. New York: Dembner Books, 1981. 3. T. D. Borkovec, G. T. O' 'Brin. Methodological and target issues in analogue therapy outcome research. In H. E. Eisler, P. Miler. (Eds.). Progress in behavior modification. New York: Academic Press, 1976. 4. W. J. Fremouw, J. L. Breitenstein. Speech anxiety. In H. Leitenberg. (Ed.), Handbook of social and evaluation anxiety. N. Y.: Plenum Press, 1990. 5. S. Knappe, K. Beesdo-Baum, L. Fehm, M. B. Stein, R. Lieb, Wittchen Hu. “Social fear and social phobia types among community youth: Differential clinical features and vulnerability factors.” Journal of Psychiatric Research, 45(10), 111-120, 2011. 6. J. Ayres, S. M. Raftis. “The impact of evaluation and preparation time on high public speaking anxious speakers' thoughts, behavior, and state communication apprehension.” Southern Journal of Communication, 57(4), 323-327, 1992. 7. B. H. Spitzberg, W. R. Cupach. Interpersonal skills, In M. L. Knapp, J. A. Daly. (Eds.) Handbooks of interpersonal communication. Thousand Oaks, CA: sage, 2002. 8. M. Marks, M. Gelder. “Differences of onset in varieties of phobia.” American Journal of Psychiatry. 123, 218-221, 1996. 9. D. M. Clark, A. Wells. A cognitive model of social phobia, In R. G. Heimberg, M. R. Leibowitz, D. A. Hope, & F. R. Schneier (Eds.). Social phobia diagnosis, assessment, & treatment. New York: Guilford press, 1995. 10. N. L. Kocovski, N. S. Endler. “Social anxiety, self-regulation, and fear of negative evaluation.” European Journal of Personality, 14, 347-358, 2000. 11. D. M. Clark, A. Wells. A cognitive model of social phobia In Heimberg RG, Liebowitz MR. Hope. In Schneier FR. (Eds.), Social phobia: Diagnosis, assessment, and treatment. New York: Guilford press, 1995. 12. R. M. Rapee, R. G. Heimbeg. “A cognitive behavioral model of anxiety in social phobia.” Behavior research and therapy, 35(8), 741-756, 1997. 13. C. R. Hirsch, D. M. Clark. “Information processing in social phobia: a critical review.” Clinical psychology review, 24, 799-825, 2004. 14. S. Coopersmith. “The antecedents of self-esteem.” San Francisco, Ca: W. H, 1967. 15. S. Harter. The construction of the self: Developmental and sociocultural foundations (2nd ed.). New York: Guilford press, 2012. 16. J. S. Eccles, R. W. Roeser. Schools, academic motivation, and stage-environment fit. In R. M. Lerner & L. Steinberg (Eds.). The handbook of adolescent psychology: Vol. I. Individual bases of adolescent development. New York: Wiley, 2009. 17. B. A. Farber. Crisis in education Stress and burnout in the American teacher. San Francisco: Jossey Bass, 1991. 18. S. Leone, J. Gumaer. “Group assertiveness training of shy children.” Journal of the School Counselor, 27(2), 34-141, 1979. 19. M. Rosenberg. Society and the adolescent self-image. New York: Basic books, Inc., 1979. 20. C. S. Dweck. Self-theories: Their role in motivation, personality and development. Philadelphia: Taylor and Francis/Psychology press, 1991. 21. C. S. Dweck. “Mindsets and human nature: Promoting change in the middle east, the schoolyard, the racial divide, and willpower.” American Psychologist, 67(8), 614-622, 2012. DOI: 10.1037/a0029783. 22. L. Blackwell, K. Trzesniewski, C. S. Dweck. “Implicit theories of intelligence predict achievement across an adolescent transition: A longitudinal study and intervention.” Child development, 78, 246-263, 2007. 23. Y. K. Hwang, C. S. Lee. “Victimization of adolescents by parental abuse and school violence: A moderated mediation model of self- esteem and growth mindset.” International Journal of Pure and Applied Mathematics, 118(19), 1439-1452, 2018. 24. Y. K. Hwang, C. S. Lee. “Relationship between stress and happiness in middle school students: Dual mediation effect of growth mindset and self-esteem.” Medico-Legal Update, 18(1):, 248-253, 2018. DOI • 10.5958/0974-1283.2018.00096.8 25. C. S. Lee. “Authentic leadership and organizational effectiveness: The roles of hope, grit, and growth mindset.” International Journal of Pure and Applied Mathematics, 118(19), 1439-1452, 2018. 26. Y. K. Hwang, C. S. Lee. “Relationship between stress and happiness in middle school students: Dual mediation effect of growth mindset and self-esteem.” Medico-Legal Update, 18(1), 248-253, 2018. DOI • 10.5958/0974-1283.2018.00096.8 27. Y. K. Hwang, C. S. Lee. “Victimization of adolescents by parental abuse and school violence: A moderated mediation model of self- esteem and growth mindset.” International Journal of Pure and Applied Mathematics, 118(19), 1439-1452, 2018. 28. D. Watson, R. Friend. “Measurement of social-evaluative anxiety. Journal of Consulting and Clinical Psychology.” 33(4), 448-457, 1969. 29. J. Y. Lee, C. H. Choi. “A study of the reliability and the validity of the Korean versions of social phobia scales (K-SAD, K-FNE).” Korean Journal of Clinical Psychology, 16(2), 251-264, 1997. 30. M. Rosenberg. Self-concept from middle childhood through adolescence. In Suls J. and Greenwald AG (Eds). Psychological perspectives on the self, 1968. 31. D. C. Molden, C. S. Dweck. “Finding meaning in psychology: A lay theories approach to self-regulation, social perception, and social development.” 61(3), 192–203, 2006. DOI: 10.1037/0003-066X.61.3.192 32. Y. K. Hwang, C. S. Lee. “The moderating effect of growth mindset on the relationship between academic grades and self-esteem.” Journal of Engineering and Applied Sciences, 13(4), 3848-3852, 2018. 33. T. Y. Yoo. “Influence of self-expression program on interpersonal anxiety and anxiety of children in elementary school and lower secondary school” Master's Thesis, Chungbuk National University, 2001. 34. J. L. Deffenbacher, W. A. Zwemer, M. A. Whisman, R. A. Hill, R. D. Sloan. “Irrational beliefs and anxiety L. Deffenbacher, anxiety.” Cognitive therapy and research, 10(3), 281-292, 1986. 35. F. Hayes. Introduction to mediation, moderation, and conditional process analysis: A regression based approach. New York: The Guilford Press, 2018. 36. Y. K. Hwang, C. S. Lee. “Victimization of adolescents by parental abuse and school violence: A moderated mediation model of self- esteem and growth mindset.” International Journal of Pure and Applied Mathematics, 118(19), 1439-1452, 2018. Authors: Sei-Youen Oh

Paper Title: Cyberbullying Response System on SNS Abstract: The system is designed to search for cyberbullying-related data and to respond by phase to the cyberbullying on the basis of the data authenticity. In particular, each analyzed data is used for D/B for follow- 45. up cyberbullying data authenticity identification and is stored in D/B for follow-up cyberbullying response, therefore preliminary cyberbullying crime signs will rapidly detect and ultimately, its consequent crime damage will be minimized. 241-244 In terms of data collection and analysis, the proposed model collects cyberbullying data widely present in various forms, while the previous only collects limited data on . To complement another limitation of the previous, not being able to analyze video, image and freeform letters, the proposal utilizes SNA to analyze bullying data in freeform letter, image and abstract vocabulary. Furthermore, the existing model does not have DB for follow-up utilities, the proposed model applied a DB for follow-ups for more effective operations of cyberbullying data authenticity identification and response module. Cyberbullying crime response method has also been enhanced in its effectiveness, by enabling phased countermeasures, and storing and analyzing the processed result from response module, to respond to future cyberbullying. Consequently, the proposed model is designed to minimize probable victimized damages by improving effectiveness of rapid and accurate phased measures – via data collection and analysis module, expert system, knowledge-based database, D/B1 for follow- up cyberbullying data authenticity identification, crime response module and D/B2 for follow-up cyberbullying response. The proposed Cyberbullying Response System on SNS enabled an enlarged volume and variety of SNS data collection, compared to the previous model, utilized SNA for analysis, enhanced preliminary prediction accuracy to future cyberbullying and allowed more rapid and adequate phased crime response against it – thus, crime damage from cyberbullying is expected to be minimized.

Keyword: Cyberbullying, SNS, Cyberbullying Response System, Social Network Analysis, Victims.

References: 1. http://www.sjbnews.com/news/articleView.html?idxno=623166. 2. K. L. Mason, “Cyberbulling: A preliminary assessment for school personnel”, Psychology in the Schools, 45(4), 2008, pp. 323- 348. https://doi.org/10.1002/pits.20301. 3. J. W. Patchin, S. Hinduja, “ Assessing Concerns and issuse about the meditation of technology cyberbullying”, Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 2(2), 2008, pp. 1-12. https://cyberpsychology.eu/article/view/4214/3256. 4. J. W. Patchin, S. Hinduja, “ Bullies move beyond the schoolyard: A preliminary look at cyberbullying”, Journal of Youth Violence & Juvenile Justice, 4(2), 2006, pp.148-169. https://doi.org/ 10.1177/1541204006286288. 5. P. K. Smith, J. Mahdavi, M. Carvalho, S. Fisher, S. Russell, N. Tippett, “Cyberbullying: its nature and impact in secondary school pupils”, Journal of Child Psychol Psychiatry, 49(4), 2008, pp.376-385. https://doi.org/ 10.1111/j.1469- 7610.2007.01846.x. 6. R. Slonje, Smith, .P. K. Frisen, A. “The nature of cyberbullying and strategies for prevention”, Journal of computer in human behavior, 29, 2003, pp. 26-32. https://doi.org/10.1016/j.chb.2012.05.024. 7. D. Olweus, Sweden. In Smith, P. K, Morita, Y, Junger-Tas, J, D. Olweus, r. R. Catalano, P. Slee, (1999) (Eds), The Nature of School Bullying: A Cross-National Perspective. London & New York: Routledge; 7–27, 1999a. 8. Ika Yunida Anggraini, Sucipto Sucipto, Rini Indriati, “Cyberbullying Detection Modelling at Twitter Social Networking”, Journal of Informatika, 6(2), 2018, pp. 113-118. https://doi.org/ 10.30595/juita.v6i2.3350 9. S. Y. Choi, “A study of the review of research on cyberbullying and Its responding strategy”, Journal of Communications of the Korean Association of Computer Education, 17(6), 2014, pp. 35-48. http://www.earticle.net/Public/Detail/1/1388/2657?code=1230577. 10. Y. O. Cho, “The Impact of Cyber Bullying Victim Experience and the Influence of Mediating Effect of Depression on Delinquent Behaviors”, Journal of Korean journal of youth studies, 20(10), 2013, pp. 117-142. http://www.riss.kr/search/detail/DetailView.do. 11. National Information Society Agency, A Survey on the actual cyberbullying in 2017, 2017. 12. Korea Communication Commission, Nation Information Society Agency. A Cyberbullying Survey in 2018. NIA, 2018. 13. C. H, Liew, D. V. Kasturi, “Cyberbullying Detection System on Twitter”, International Journal of Information System and Engineering, 1(1), 2005, pp. 1-11. https://doi.org/10.24924/ijise/2015.04/v3.iss1/36.47 Authors: Yeong-Keun Lee, Koo-Rack Park, Dong-Hyun-Kim

Paper Title: Implementation of Smart Pot System using USB Plug-in Sensor Abstract: Since the IoT based technologies were applied to various areas, people’s living has been more convenient and efficient. In present society, the number of one-person households is on the constant rise, and the industrial advancement causes their psychological alienation more. In the circumstance, a variety of methods to recover their psychological stability try to be found. More people regain their mental stability in the way of raising plants. Therefore, this study proposes the smart pot system using a USB plug-in sensor. In this study was implemented the smart pot system that is able to check a plant’s status on the basis of accurate data, such as plant growth information and environmental information, at any times and any places, to control and maintain the environment of growth, to monitor environmental information by setting and collecting automatically such data as temperature, humidity, solar radiation quantity, CO2, and growth conditions, to detect abnormal situations through human body monitoring and fire monitoring of indoor conditions, and to prevent dangerous circumstances. In the market, there are already home pot products to which IoT technology is applied. However, 46. most of the smart pots fail to take into account species of plants and are recommended to be used for particular plants only. The proposed system is the USB plug-in based smart pot system capable of monitoring and 245-250 controlling plant growth, supporting human relationship, and implementing user-customized functions by easily expanding sensors which are able to notice indoor emergency and disaster situations in everyday life. It also can add the function of meeting an emotional need by changing a LED color when people come close to their pet plants. The proposed system is expected to help many people growing plants easily realize plant growing conditions and indoor situations and improve their psychological stability.

Keyword: IOT, Smart Flower Pot, Temperature, Humidity, Automatic Watering, Plug-in.

References: 1. Atzori, Luigi, Antonio Iera, and Giacomo Morabito, “The internet of things: A survey,” Computer networks, vol. 54, no. 15, 2010, pp. 2787-2805. https://doi.org/10.1016/j.comnet.2010.05.010 2. Kawakami, A., Tsukada, K., Kambara, K., & Siio, I., “Potpet: pet-like flowerpot robot,” in Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction. ACM New York, 2011, pp. 263-264. https://doi.org/10.1145/1935701.1935755 3. , Plant-Loving Millennials at Home and at Work, https://www.nytimes.com/2018/03/09/realestate/plant- loving-millennials-at-home-and-at-work.html 4. Chen Y, Shi Y L, Wang Z Y, Huang L., “Connectivity of wireless sensor networks for plant growth in greenhouse,” International Journal of Agricultural and Biological Engineering, vol. 9, no. 1, 2016, pp. 89-98. https://doi.org/10.3965/j.ijabe.201606901.1314 5. Shukla S, Yu C Y, Hardin J D, Jaber F H., “Wireless data acquisition and control systems for agricultural water management projects,” Horttechnology, vol. 16, no. 4, 2006, pp. 595-604. https://doi.org/10.21273/HORTTECH.16.4.0595 6. Feng Z G, Lam J, Yang G H., “Optimal partitioning method for stability analysis of continuous/discrete delay systems,” International Journal of Robust & Nonlinear Control, vol. 25, no. 4, 2013, pp. 559–574. https://doi.org/10.1002/rnc.3106 7. Nagaraja, H., Aswani, R., & Malik, M., “Plant watering autonomous mobile robot,” IAES International Journal of Robotics and Automation, vol. 1, no. 3, 2012, pp. 152-162. https://doi.org/10.11591/ijra.v1i3.1305 8. Li, F., Ning, T., Shi, L., & Pang, G., “System Design of the Remote Controlled Intelligent Flowerpo,t” in 3rd Workshop on Advanced Research and Technology in Industry (WARTIA 2017), Atlantis Press, vol. 148, 2017, pp. 310-313. https://doi.org/10.2991/wartia-17.2017.58 9. Zhang, X., Liu, D., Fan, C., Du, J., Meng, F., & Fang, J., “A novel and smart automatic light-seeking flowerpot for monitoring flower growth environment,” International Journal of Agricultural and Biological Engineering, vol. 11, no. 2, 2018, pp. 184-189. https://doi.org/10.25165/j.ijabe.20181102.2786 10. Estrada-Martinez, P. E., & Garcia-Macias, J. A., “Semantic Interactions in the Internet of Things,” International Journal Ad Hoc and Ubiquitous Computing, vol. 9, no. 3/4, 2013, pp. 1-10. https://doi.org/10.1504/IJAHUC.2013.055464 11. Aravind, R., & Sasipriya, S., “A survey on Hydroponic methods of smart farming and its effectiveness in reducing pesticide usage,” International Journal of Pure and Applied Mathematics, vol. 119, no. 12, 2018, pp. 1503-1509. 12. Saini, S., Kumari, P., Yadav, P., Bansal, P., & Ruhil, N., “Smart farming pot,” in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), IEEE, 2016, pp. 3247-3250. 13. Chieochan, O., Saokaew, A., & Boonchieng, E., “IOT for smart farm: A case study of the Lingzhi mushroom farm at Maejo University,” in 2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE), IEEE, 2017, pp. 1-6. Authors: Jae-Yong Lee, Hae-Ri Park, Cheong-Hwan Lim The Levels of Inner Compatibility According to Over-Engagement of HCI among Korean and Paper Title: Chinese University Students Abstract: The objective of this study was to determine whether organizational-level change from interaction with other systems HCI or inner compatibility might be a general characteristic of Northeast Asian college students. Results of 853 adult internet addiction diagnoses (K scale) were recategorized into perceptual, emotional consciousness, subjective consciousness, and cognitive awareness based on integrated information theory for college students in Korea and China. They were then compared to determine changes at organizational levels caused by HCI based on frequency analysis, descriptive statistics, mean difference (t-test), and reliability analysis. Especially, in case of self-awareness, it was confirmed that Korean students were more integrated into feeling of self-awareness irrespective of any physical or social situations than Chinese students. This signifies that HCI over-engagement can affect each layer of the human state of consciousness. Results of this study also imply that HCI dysfunction should be interpreted in terms of over-engagement. This study also confirms that various levels of consciousness are influenced differently. In particular, changes at organizational level of consciousness appeared in both countries. Thus, this could be a general characteristic of Northeast Asian University students. HCI over-engagement affects three levels of consciousness differently. Change at organizational level of consciousness was found to be a general characteristic of college students in Northeast Asia. 47. Keyword: HCI, inner compatibility, consciousness level.

251-254 References: 1. M. M. Skoric, L. L. C. Toe, R. L. Neo, “Children and Video Games: Addiction, Engagement, and Scholastic Achievement” CyberPsychology & Behavior [Internet], 12(5), 567–72, 2009. 2. G. C. Patton, C. A. Olsson, V. Skirbekk, R. Saffery, M. E. Wlodek, P. S. Azzopardi, M. Stonawski, B. Rasmussen, E. Spry, K. Francis, et al., “Adolescence and the next generation” Nature [Internet], 554, 458–66, 2018. 3. R. E. Dahl, N. B. Allen, L. Wilbrecht, A. B. Suleiman, “Importance of investing in adolescence from a developmental science perspective” Nature [Intenet], 554, 441–50, 2018. 4. C. Seife, Decoding the Universe: How the New Science of Information Is Explaining Everything in the Cosmos, from Our Brains to Black Holes, Penguin Books, 2007. 5. E. T. Jaynes, “Information Theory and Statistical Mechanics” Physical Review Journals [Internet], 106(4), 620–30, 1957. 6. N. J. Cerf, C. Adami, “Negative Entropy and Information in Quantum Mechanics” Physical Review Letters [Internet], 79(26), 5194– 7, 1997. 7. E. R. John, “A Theory of Consciousness” Current Directions in Psychological Science [Internet], 12(6), 244–50, 2003. 8. J. R. Battista, “The Science of consciousness” The Stream of Consciousness, 55–87, 1978. 9. G. Tononi, M. Boly, M. Massimini, C. Koch, “Integrated information theory: from consciousness to its physical substrate” Nature Reviews Neuroscience, 17, 450–461, 2016. 10. J. Lee, H. Park, C. Lim, “An Analysis of Introvert and Extrovert Problems according to the Patterns of Internet Addiction in University Students” IJPHRD, 9(8), 933–8, 2018. 11. H. Park, C. Lim, J. Lee, “A Study of a Diagnosis and Examination Questionnaire for Forming Inner Compatibility Indicators” IJPHRD, 9(9), 1193–200, 2018. Authors: Su Sun Park The Recognition of College Students in the Social Welfare Major in the Direction of Multicultural Paper Title: Family Support Policy in Korea 48. Abstract: The purpose of this study is to investigate the future development of multicultural family support center through the integrated research methodology of quantitative and qualitative analysis that integrates the data analysis of the statistics office of the multicultural family policy and the interview of the 255-258 college student of the social welfare major. We will produce data that can contribute to the improvement of multicultural family policy and service delivery system And Focus Group Interview (FGI) was conducted in order to be a basis for policy direction based on the awareness of multicultural family support for students of social welfare major. The social welfare major students attending FGI were composed of 3 female students, 3 male students and 4th grade students, who completed courses related to multicultural family support program at Cheongju S University. The direction of the multicultural family support policy recognized by college students in social welfare is to include the concept of multiculturalism within the range of various families and define the meaning of multiculturalism as a multicultural family. In order to do so, social recognition needs to be changed in a way that recognizes diversity. The role of the delivery system for supporting multicultural families, including the Multicultural Family Support Center, should be divided into urban, rural, and urban and rural complexes based on the region. It is necessary to focus on supporting multicultural families in the early stages of multicultural family formation. And that it is necessary to support various services to a wide range of subjects. Within the first three years after marriage, intensive family integration education will help understanding cultural differences and marriage, and above all, Korean language one and two levels of intensive education are needed to prevent problems caused by language differences

Keyword: College Students, Direction of Multicultural Family Support Policy, Focus Group Interview (FGI), Multicultural families, Social Welfare Major

References: 1. Korean Institute for Healthy Family. Status of multicultural family support center for 2013. 2. Y.G, Kim, H.M Choi., G.H Kim., S.M, Sung, “Study on change of multicultural family and social countermeasure”. Korea institute for health and social affairs. 2012. 3. Statistics on multicultural families in 2018, Ministry of Gender Equality and Family, 2018. 4. L, Jang, “Perceived policy and legal rights of multicultural children: from the stance of native Korean peers”, Multiculture and Peace, 12(1), 2018, pp.31-58, 5. S.M, Kim, “The Retrospective Consideration for ‘Korean’ Multicultural Policy and Practice”, Social studies education, 50(4), 2011, pp.171-188, 6. J.Y. Kim, C.G. Kang, E.C. Lee, “Closed Korea: Perceptions and policies on multi-culture in Korea”, Issue Brief, 4(2), 2014, pp. 1- 16. 7. K.S. Jung, S.M. Lee, S.H. Kim, S.I. Park. A study on the attitudes related to national identity and immigrations in Koreans, IOM Immigration Policy Institute. 2010. 8. Y.G. Chae. “Reanalysis for changing process of multicultural society”, Press and Society,17(2), 2009, 49-86. 9. J.K. Kang, “A research of the multicultural education on the perception of multi-culture in the university students”, Multicultural Contents Research, 12, 2008, pp53-77. 10. National Legal Information Center. 2019. Available from: http://www.law.go.kr/lsInfoP.do?lsiSeq=199550&efYd=20180613#0000(website) 11. Ministry of Public Administration and Security. Foreign residents status survey. 2016 Authors: Yun-Jeong Kim, Sang-Jin Lee The Issues of the Evaluation System of Korean Long-term Care Facilities and Measures for Paper Title: Improvement Abstract: The objective of this study was to conduct a FGI with the administrative directors of nursing homes that will be subject to evaluation in 2018 and the external evaluators, to identify issues with the current evaluation system and measures for improvement. An analysis of the FGI led to 15 sub-themes and 4 essential themes is as follows. The four essential themes were “distrust in the evaluation system,” “evaluation indexes that make want to give up on the evaluation,” “lack of preparation for on-site evaluation” and “lack of evaluation indexes to measure service quality.” As an improvement measure, First, a third-party evaluation system or a multi-layered evaluation system can be adopted to provide an objective review. Second, a multi-layered evaluation system will also help shift the evaluation away from a focus on document systems towards securing better quality in services for the elderly residents living at these types of facilities.

Keyword: Evaluation system, Evaluation indexes, FGI, Colaiszzi method, Third-party evaluation system, Multi-layered evaluation system.

49. References: 1. NHIS, 2018 Long-term care institution periodic evaluation plan, NHIS, 2018. http://www.nhis.or.kr/bbs7/boards/B0039/25313 2. Y. S. Lee, D. Jaegal, J. H. Kim, H. R. Kim, G. H. Sim, K. S. Yun and H. S. Park, Government performance management and 259-264 evaluation system: focused on case of major developed countries Deayoung Press, Seoul Korea, 2016. pp. 247 3. H. S. Choi, E. Y. Seo, C. S. Lee, J. M. Won, A study on development of eh evaluation criteria for elderly care facilities, Journal of the Korea Real Estate Analysts Association, vol. 18, no. 4, 2012, pp. 131-147. 4. Y. K. Lee and J. S. Kim, The Perspectives Analysis of Evaluation Indicators for Social Welfare Facilities, Korean Public Management Review, vol. 25, no. 1, 2011, pp. 33-56. 5. H. J. Kwon, The New-institutionalism perspective for long-term care service evaluation system, Korean Journal of Social Welfare, vol. 66, no. 2, 2014, pp. 5-29 6. W. D. Sun, Results and implications of long-term care facilities for the elderly, Health•Welfare Issue & Focus, vol. 260, 2014, pp. 1-8. 7. D. S. Lee, Regular evaluation and analysis of elderly care facilities, Social Enterprise & Policy Studies, Vol. 5, no. 1, 2015, pp. 53-102. 8. T. S. Jun and K. H. Jun. A Study perception on the importance and applicability of the evaluation indexes of long-term care institution employees, Korean Journal of Care Management, vol. 8, 2013, pp. 43-73. 9. M. M. Choi, J. G. Lim, S. K. Kim and K. S. Kim, What did social workers experience and what do they want for the evaluation system of social welfare facilities? Journal of Korean Social Administration, vol. 17, no. 3, 2015, pp. 1-26. 10. M. J. Lee, A Study on measurement issues of the quality of long-term care services for older adults, Social Welfare Policy, vol. 38, no. 1, 2011, pp. 141-166. 11. J. K. Kim, Institutional evaluation of long-term care insurance for the elderly-focused on supplier perspective, Journal of Social Welfare Management, vol. 3, no. 2, 2016, pp. 277-290. 12. P. Colaizzi, Psychological research as the phenomenologist views it. Existential Phenomenological Alternatives for Psychology, 1978, pp. 48-71. Authors: Yun-Jeong Kim, Shuhu Chen

Paper Title: Differences in the Perception of Birth Policies by the Middle aged and the Elderly in China Abstract: Because of the drastic changes in China’s birth policies, it is anticipated that the middle-aged and the elderly would view the policy of ‘one household, two children’ differently. As such, this study seeks to identify such a difference between the middle-aged and the elderly. There were 320 sets of data for the elderly generation and 305 for the middle-aged generation used for the final analysis. The study shows that, unlike the elderly generation, the middle-aged group has a negative perception towards the ‘one household, two children’ policy. Second, for the elderly generation of China, there was a significant difference in their perception towards the ‘one household, two children’ policy and ‘preferred gender of children’ depending on what the gender of the respondent’s child was. The elderly with only daughters had a rather negative perception towards the policy, and their preferred gender for children was also ‘sons’. Third, middle aged people with daughters had a more positive perception towards the policy.

Keyword: Birth policy, One household two children, Generation gap, Preferred gender of children, Fertility

50. References: 1. Y.H. Jia, “Talking about the problems and countermeasures of population aging under the family planning policy,” The Farmers Consultant, vol. 65, no. 06, 2017, pp.160-165. 2. Z.Y. Tang, “On the heated discussion of population problems in China in 1957,” Journal of Anhui University, vol. 253, no.5, 2005, 265-269 pp.112-116. 3. X.H. Ma, and C. Sun, “The population fertility policy in 60 years of China,” Social Sciences of Beijing, vol. 653, no. 4, 2011, pp. 46-47. 4. X. X. Liu, “Problems of providing for the childless and widowed elders in aging times and the improvement methods in assisting systems,” Shanghai Urban Management, vol. 67, no. 6, 2014, pp. 12-13. 5. China National Bureau of Statistics, Statistical communique on national economic and social development in 2017, China National Bureau of Statistics, 2018. 6. S. P. Li, “Analysis of the "Second Child Policy" in the current social situation,” The Farmers Consultant, vol. 322, no. 15, 2018, pp. 260-261 7. S. H. He, “The change of farmers' concept of birth,” Population and Development, vol. 431, no. 4, 2011, pp. 96-99. 8. W. Chen, and Y.Y. Duan, “Recent levels and trends of fertility in China,” Population Research, vol. 45, no. 5, 2019, pp. 3-4. 9. Z. G. Guo, “The main features of the low fertility process in China: enlightenment from the results of the national 1% population sampling survey in 2015,” Chinese Journal of Population Science, vol. 87, no.8, 2017, pp. 2-3. 10. Z. W. Chen, “Analysis on trend of fertility in China by age-period-cohort model,” Journal of Zhengzhou University, vol. 63, no. 5, 2018, pp. 299-300. 11. G. Z. Wang, “China’s population forecast methods and future population policies,” FINANCIAL MINDS, vol. 25, no. 9, 2018, 112- 113. 12. J. Xu, “Research on Chinese fertility concept: review and prospect,” Population and Development, vol. 96, no. 6, 2018, pp. 78-83. Authors: Seung Ryol Maeng

Paper Title: Educational Effects of SW Coding Notes on Computational Thinking Abstract: Computational thinking is a fundamental skill to be used by everyone in the 4th industrial revolution age and it is a hot issue of the education field in the world. Usually, SW coding means the whole process to make a computer program. Since a program has logical structure and its development process requires subsidiary abilities which analyze a problem and devise the stepwise procedure, SW coding has been understood to be a good method for computational thinking(CT). In this paper, we propose a way to teach CT by using coding notes and analyze its educational effects on CT. To find the educational effects of SW coding notes, logical reasoning ability before and after SW coding education was measured through questionnaire survey and compared by statistical methods. We sampled 51 students and divided them two groups; one for computer science major(38) and the other for computer science non-major(13). They are asked to answer three categories of questions such as problem understanding, data analysis, and problem solving. An d then by the paired t-test along with normality and homoscedasticity of two 51. groups, the change of student’s CT ability before and after taking SW coding education was statistically tested at a significant level of 95%. According to our experiments, p-values of the paired t-test for problem understanding, data analysis, and 270-274 problem solving are 0.176, 0.134, and 0.470, respectively and alternative hypotheses are accepted. It implies that student’s logical reasoning ability can be improved and their academic achievement is also relatively great by using SW coding notes. Although there are similar results for educational effects of SW coding, our work is different from them in terms of using new education tool named as SW coding notes.

Keyword: Computational Thinking, Logical Reasoning, Data-oriented Problem Solving, Computing-oriented Problem Solving, Algorithm.

References: 1. Jeannette M. Wing, “Computational thinking”, CACM, Mar. 2006, 33-35. 2. Sung Yul Kim and Jong Yun Lee, “Development of a curriculum for the cultivating the creative gifted and talented children of informatics”, J. of Korean Association of Computer Education, 17(3), 2014. 3, 25-39. 3. Jung Sook Sung and Hyeoncheol Kim, “Analysis on the international comparison of computer education in school”, J. of Korean Ass. of Computer Education, 17(3), 2014.3, 25-39 4. Tae-Hun Kim and Jong-Hoon Kim, “The effects of Kodu programming learning on logical thinking and learning interest of elementary students”, J. of Korean Ass. of Computer Education, 16(3), 2013. 5, 13-22. 5. Sung Yul Kim and Jong Hun Lee, “Education of algorithms using the Raptor programming education tool”, J. of Korean Ass. Of Computer Education, 18(6), 2015. 11, 23-31. 6. Sugee Kim and Chul Hyun Lee, “ The thre-years comparative study of effects of STEAM education education programs based on physical computing”, J. of Korean Ass. Of Computer Education, 19(1), 2016. 1, 11-18. 7. Seung Ryol Maeng, “Awareness of Korean university students on computational thinking”, Proc. Oof ISER, International Conf. at Vienna, 2018. 8, 16-18. 8. Seung Ryol Maeng, Computational Thinking Workbook, KNU Press, 2017. 3. 9. Soon Hee Kang, Jeon Won Noh, and Jong Yoon Park, “A comparative analysis of the GALT fuul version and short version used in the science education researches”, J. of Korea Science Education, 18(3), 1998. 9, 399-413. 10. Il Kyu Yoon, Jong Hye Kim, and Won Gyu Lee, “Operational definition of components of logical thinking in problem-solving process on informatics subject”, J. of Korean Ass. Of Computer Education, 13(2), 2010. 3, 1-14. 11. Ministry of Education, Tutorials on SW Education for Training the Primary-Middle School Teacher, TM2016-39, 2016P Authors: In Kim, Woong-Soo Kim, Seong-Chan Bae The Influence of Service Usefulness of Community Children's Centers of Problem Solving Abilities Paper Title: Mediated by Self-Esteem for Low-Income Families Abstract: The purpose of this research was to examine the level of community child center help service influence to children in low-income with regards to their problem solving ability and to measure the relationship of its effect to the child’s self-esteem. This research used a nationwide surveyed data of community child center surveyed by Panel Study on Korean Children and was analyzed using a structural modeling. The survey was conducted in 2016 from July to August, survey questionnaires were sent to different community child center nationwide, the subjects were elementary 4th graders, and survey garnered 662 respondents. All this analysis were done using SPSS ver.21 and AMOS ver.21 program. The research results were the following. First, it shows that the higher the level of community child center help service to children in low-income the child’s problem solving ability goes high. Second, as the community child center help service increases the child’s self-esteem increases as well. Third, it shows that as self-esteem increases the problem solving ability goes high. Fourth, it also shows that the relationship of the effect between community child center help service to child in low-income and problem solving ability were statistically significant both total and indirect effect. Furthermore, it shows that relationship of community child center help service to child in low-income and problem solving ability has a mediating effect to child self-esteem. Base on this result, we propose that a better convergence of intervention and practical strategy must be impost to continue the betterment of child in low-income’s problem solving abilities.

Keyword: children in low-income, community child center, problem solving ability, self-esteem, child welfare.

52. References: 1. Kim WS, “A Study on Children’s Rights and Happiness for Building Child Friendly Cities: Comparative study between elementary and middle school students,” Journal of Digital Convergence, 15(2), pp. 485-491, Feb. 2017. DOI:10.14400/JDC.2017.15.2.485. 2. Park RG, Kang WS, “Emotional and Behavioral character of low-Income class Children,” Korean Journal of Child 275-279 Psychotherapy[Internet], 1(1), 1-23, Mar. 2006. [cited 2018 Sep 15]; Available: http://scholar.dkyobobook.co.kr/searchDetail.laf?barcode=4050025262125#. 3. Moon AR, Lee YH, “Development Plan of the Education Welfare Policy for Children and Adolescents of Low Income Group,” Journal of Digital Convergence, 16(3), pp. 333-344, Mar. 2018. DOI:10.14400/JDC.2018.16.3.333. 4. Headquarters for Community Child Center. [Image on internet]. 2016 [updated 2016 Dec 31; cited 2018 Sep 15]. Available: https://www.icareinfo.go.kr/intro/center/centerAboutus.do?menuNo=2004300(website) . 5. Kim SH, Yim HR, Chung IJ, “The Effects of Satisfaction with the Service from Community Child Centers on Children’s School Adjustment Mediated by Study Habit and Peer Attachment,” Journal of School Social Work[Internet], 37, pp. 119-146, Mar. 2017[cited 2018 Sep 16];. Available :http://kiss.kstudy.com/ thesis/thesis-view.asp?key=3572005. 6. Lee ES, Lee SY, Hong SH, “The Effects of Community Child-Center Service on School Adjustment Change Trajectory: Using Second-Order Latent Growth Model” Korean Journal of Social Welfare Research, 50, pp. 59-85, Sep. 2016, DOI:10.17997/SWRY.50.1.3. 7. Kim HS, Seo Y, “The Effect of the Support of the Community Child Center on Children's Happiness: The analysis on multi-groups of mediating effects of self-esteem and resilience of children with a single parent and children with two parents,” Journal of Youth Welfare, 19(4), pp. 1-24. Dec. 2017, DOI:10.19034/KAYW.2017.19.4.01 8. Han AR, “The Influence of Parents’ Neglect and Abuse, Service Usefulness of Community Children Center on Adolescents’ Life Satisfaction in Low Income Family: Mediating Effect of Self-resilience,” Korean Journal of Youth Studies, 24(7), pp. 29-54. Jul. 2017 DOI:10.21509/KJYS. 2017.07.24.7.29 9. Jung JY, H EG, “The Effect of Social Support and Problem solving Ability of Low-Income Divorced Family`s Children on Problem Behavior,” Korean Journal of Human Ecology[Internet], 16(3), pp. 491-504, Jun. 2007[cited 2018 Sep 16]. Available: http://www.dbpia.co.kr/Journal/ArticleDetail/NODE02346238 10. Lee JS, Han HS, “The effect of personality trait and psychological family environment on social problem-solving abilities for middle school student: The mediating effect of self-esteem and peer relationship skills,” Korean Journal of Child Psychotherapy[Internet], 11(3), pp.1-23, Dec. 2016[cited 2018 Sep 20];. Available: http://scholar.dkyobobook.co.kr/searchDetail.laf?barcode=4050025263205 11. Koruklu N. Personality and social problem-solving, “The mediating role of self-esteem. Educational Sciences,” Theory & Practice, 15(2), pp. 481-487, Nov. 2015. DOI: 10.12738/estp.2015. 2.2601. 12. Rosenberg M, Society and the adolescent self-image, Princeton University Press. 1965. Authors: Chang-Seek Lee, Mi-Hyang Choi The Double Mediating Effect of Start-Up Motive and Start-Up Spirit between Start-Up Opportunity Paper Title: 53. Awareness and Expected Outcome af a Start-Up Abstract: The purpose of this study was to investigate the double mediating effect of start-up motive and 280-284 start-up spirit between start-up opportunity awareness and expected outcome of a start-up. The subjects of this study were 251 employees living in Seoul, Daejeon, Chungnam, and Chungbuk in Korea. The collected data were analyzed using SPSS PC+ and PROCESS macro. Correlation analysis, reliability analysis, descriptive statistics, and mediation effect analysis were applied for data analysis. First, start-up opportunity awareness was positively correlated with start-up motive, start-up spirit, and the expected outcome of a start-up. Second, the start-up motive mediated the relationship between start-up opportunity awareness and the expected outcome of a start-up. Third, the start-up spirit mediated the relationship between start-up opportunity awareness and the expected outcome of a start-up. Fourth, start-up motive and start-up spirit both mediated the relationship between start-up opportunity awareness and the expected outcome of a start-up. Finally, based on the results of this study, the ways to overcome the low level of start-up spirit and the early closing rate of start-up were discussed.

Keyword: Start-up opportunity awareness, Start-up motive, Start-up spirit, Expected outcome of a start-up, Double mediating effect

References: 1. K. Schwab. The Fourth Industrial Revolution. United States: Crown Business, 2016. 2. J. G. Na, J. D. Kim. “The critical review on the 4th industrial revolution: In the perspective of the institutional thought of lewis mumford” Journal of social science, 56(2), 389-419, 2017. DOI :10.22418/JSS.2017.12.56.2.389 3. D. K. Won, S. P. Lee. “Artificial intelligence and implications of the fourth industrial revolution” Industrial Engineering Magazine, 23(2), 13-22, 2016. 4. P. F. Drucker. Innovation and entrepreneurship: practice and principles. New York: Harper and Row, 1985. 5. J. B. Barne. “Firm resources and sustained competitive advantage” Journal of Management, 17(1), 99-120, 1991. 6. S. M. C. Dollinge. “Identity styles and the five-factor model of personality” Journal of Research in Personality, 29(4), 475-479, 1995. 7. Y. J. Cho. “A comparative study on the influence of personal characteristics and social environment on the intention of entrepreneurship in Korea, China, Japan, Hong Kong university students knee” Ph.D Thesis, Hoseo University, 2016. http://www.riss.kr.libmeta.knou.ac.kr:8010/link?id=T14298778 8. J. S. Ryu, M. J. Son, J. Park, D. U. Eom, C. Y. Lee. “University education innovation plan for expanding youth employment” Issue Paper. Samsung Economic Research Institute, 132(3), 1-86, 2010. http://www.seri.org/db/dbReptV.html?menu=db01&pubkey=db20100827001 9. J. K. Hong. “The effects of individual characteristics, social capital, foundation policy environment of founder on entrepreneurial intention: Focusing on start-up spirit and value orientation” Ph.D Thesis, Seoul Venture University, 2016. http://www.riss.kr.libmeta.knou.ac.kr:8010/link?id=T14291298 10. N. G. Park, M. S. Kim, J. W. Ko. “The effect of the government’s entrepreneurial support policy on start-up spirit and entrepreneurial intention” Asia-Pacific Journal of Business Venturing and Entrepreneurship, 10(6), 89-98, 2015. 11. S. H. Oh, K. S. Ha. “Effects on Entrepreneurial Intention by Start-up Environment and Self-efficacy Mediated by Fear of Business Failure” Journal of Digital Convergence, 11(8), 143-157, 2013. https://www.earticle.net/Article/A202595 12. Small Venture Business Department [Internet]. Seoul: Survey on the status of start-up companies;[cited 2018 April 13]. https://www.mss.go.kr 13. Y. G. Suh, S. K. Kim. “Policy Study on Korean Retail Micro Business” Journal of channel and retailing, 17(5), 39-57, 2012. http://www.riss.kr.libmeta.knou.ac.kr:8010/link?id=A99682935 14. J. Y. Kim, Y. L. Lee. “An analysis of the impact of entrepreneurial activities in Pusan on regional economic growth and reduction of unemployment rate” Asia-Pacific Journal of Business Venturing and Entrepreneurship, 11(6), 111-122, 2016. http://www.riss.kr.libmeta.knou.ac.kr:8010/link?id=A103200356 15. D. Y. Chung, Y. H. Chae. “The effect of employability on the entrepreneurial intention: focus on double mediation role of self- leadership and self-efficacy” Korean Journal of Business Administration, 29(3), 467-488, 2016. 16. J. H. Bang, S. M. Park, J. K. Shin. “Exploratory study on perceived critical sucess factors for young entrepreneurs in the early startup stage” Asia-Pacific Journal of Business Venturing and Entrepreneurship, 9(5), 247-254, 2014. http://www.riss.kr.libmeta.knou.ac.kr:8010/link?id=A101195008 17. S. T. Kim. “The effect of the psychological characteristics on the entrepreneurial intention among chinese college students: on the moderating effect of social supports” Master's Thesis, Soongsil University, 2014. http://www.riss.kr.libmeta.knou.ac.kr:8010/link?id=T13369117 18. H. S. Howard, F. M. Daniel, A. T. Jeffry. “Venture capital in transition: A Monte-Carlo simulation of changes in investment patterns” Journal of Business Venturing, 2(2), 103-121, 1987. 19. S. L. Han, M. S. Lee. “Effects of salesperson`s compensation orientation on emotional labor, emotional exhaustion and adaptive selling behavior” Journal of Korean Marketing Association, 31(2), 73-92, 2016. DOI :10.15830/kmr.2016.31.2.73 20. H. M. Kim. “Study of influencing effects of one-person ’s start-up spirit to the recognition of business establishment opportunity and business establishment will: study about regulating effects of sns uti” Master's Thesis, Jung-Ang University, 2013. http://www.riss.kr.libmeta.knou.ac.kr:8010/link?id=T13257269 21. M. C. Choi. “A Study about the effects of youth business support on entrepreneurial opportunities perception and entrepreneurial intention for university students majoring in food service” Master's Thesis, Daegu Catholic University, 2014. http://www.riss.kr.libmeta.knou.ac.kr:8010/link?id=T13534549 22. S. H. Oh. “A comparative study of the influence of start-up environments on young adults and seniors' entrepreneurial intention: Focusing the mediating role of start-up spirit” Ph.D Thesis, Hoseo University, 2013. http://www.riss.kr.libmeta.knou.ac.kr:8010/link?id=T13424765 23. I M. Yoon. “Study on the effects of youth entrepreneurs' entrepreneurial motivation on entrepreneurial performance: focusing on undergraduates” Master's Thesis, Jung-ang University, 2017. http://www.riss.kr.libmeta.knou.ac.kr:8010/link?id=T14428515 24. S. B. Kang. “Report on corporation performance influenced by entrepreneur’s motive, entrepreneurship, and advanced preparation” Master's Thesis, Jung-ang University, 2012. http://www.riss.kr.libmeta.knou.ac.kr:8010/link?id=T12684182 25. K. S. Han. “An empirical study on the nascent start-up motivations and growth intentions” Ph.D Thesis, Seongsil University, 2012. http://www.riss.kr.libmeta.knou.ac.kr:8010/link?id=T12858817 26. S. G. Ahn. “Effects of entrepreneurship education and institutional support on entrepreneurial self-efficacy and entrepreneurial intention” Ph.D Thesis, Jung-ang University, 2016. http://www.riss.kr.libmeta.knou.ac.kr:8010/link?id=T14021580 27. S. S. Kim. “A study on effect of social support on baby boomer’s entrepreneurial opportunity competence: Focusing on mediating effect of entrepreneurial self-efficacy. asia-pacific journal of business venturing and start-up spirit” Ph.D Thesis, Hoseo University, 2018. http://www.riss.kr.libmeta.knou.ac.kr:8010/link?id=T14687511 28. W. J. Kim. “Effects of start-up spirit and strategic orientation on the firm performance: Moderated mediation effect of digital literacy and learning orientation” Ph.D Thesis, Jung-ang University, 2016. http://www.riss.kr.libmeta.knou.ac.kr:8010/link?id=T14170677 54. Authors: Chang-Seek Lee, Ha-Young Jang The Effects of the Local Culture Status and an Individual Cultural Capacity on Cultural Paper Title: Participation: Moderated Mediation Effect of Growth Mindset Abstract: This study was done to investigate the moderating effect of growth mindset on the mediating effect of individual cultural capacity on relationship between local culture status and cultural participation. The subjects of this study were 229 employees of 25 workplaces in Daejeon, 2 metropolitan cities and the Chungnam province. The collected data were analyzed using correlation analysis, frequency analysis, and moderating mediation effect by SPSS and SPSS PROCESS macro. The main results are as follows. Local culture status, cultural capacity and cultural participation showed a significant positive correlation. However, growth mindset showed an otherwise negative correlation with local culture status, and did not show a significant correlation with cultural participation. Second, local culture status had a statistically significant effect on cultural capacity, and cultural capacity had a statistically significant effect on cultural participation. Therefore, the indirect effect of cultural capacity was verified. Third, the effect of moderated mediation on a path from local culture status to cultural participation via cultural capacity, was considered to be significant in low and middle groups of growth mindset. Based on the results of this study, we discussed policy measures to encourage active participation of local residents.

Keyword: Local culture status, Cultural capacity, Cultural participation, Growth mindset, Moderated mediation effect

References: 1. S. H. Hong, J. Y. Lee, "A study on institutional improvement for effective operation of Korea's free economic zone" International Commerce and Information Review, 13(2), 235-258, 2011. DOI: 10.15798/kaici.13.2.201106.235. 2. E. Y. Nam, J. Y. Yee, M. H. Kim, "Do leisure activities make people happier?: The role of social capital and social leisure" Korean Journal of Sociology, 46(5), 1-33, 2012. 3. S. J. Lee, "A comparison of the performance of international and domestic mergers and acquisitions: from the perspective of the classic and social constructivist concept of culture" Master's Thesis, Hankuk University, 2012. Available from: 285-289 http://www.riss.kr/index.do. 4. S. Y. You, "The Application of action learning in multicultural education to improve cultural competence: focusing on the learners' experiences revealed in the reflection papers" Global Studies Education, 10(1), 25-52, 2018. DOI: 10.19037/agse.10.1.02. 5. C. S. Dweck, Mindset the new psychology of success, Random House Inc, 2006. 6. L.S. Blackwell, K. H. Trzesniewski, C. S. Dweck, "Implicit theories of intelligence predict achievement across an adolescent transition: a longitudinal study and an intervention" Child Development, 78(1), 246-263, 2007. DOI: 10.1111/j.1467- 8624.2007.00995.x. 7. Y. Hong, C. Chiu, C. S. Dweck, D. M. S. Lin, W. Wan, "Implicit theories, attributions, and coping: A meaning system approach" Journal of Personality and Social Psychology, 77(3), 588-599, 1999. DOI: 10.1037/0022-3514.77.3.588. 8. C. M. Mueller, C. S. Dweck, "Praise for intelligence can undermine children's motivation and performance" Journal of Personality and Social Psychology, 75(1), 33-52, 1998. DOI: 10.1037/0022-3514.75.1.33. 9. S. L. Fitzgerald, C. Fitzgerald, "Universal design in education" The European Proceedings of Social & Behavioral Sciences, 389- 399, 2016. DOI: 10.15405/epsbs.2017.05.02.48. 10. H. S. Lim, "Developing the framework for evaluating regional cultural industry clusters" Korean Society and Public Administration, 15(2), 305-324, 2004. 11. H. Y. Moon, "A study to effects of the type of old people's leisure activities on the life satisfaction" Master's Thesis, Daegu University, 2000. Available from: http://www.riss.kr/index.do 12. C. A. Jang, "A Study on the influence of aged people's culture and arts activities on life satisfaction" Master's Thesis, Catholic University, 2013. Available from: http://www.riss.kr/index.do 13. J. H. Jeon, M. K. Jung, "Analysis of the effect of cultural competitiveness and creativity on urban economy" Journal of Local Government Studies, 25(2), 159-189, 2013. 14. H. S. Jeong, Y. S. Kim, "The effects of college promotion on positive image formation, competitive advantage perception, and college entry intention" Journal of Marketing Management Research, 7(3), 127-154, 2002. 15. C. S. Lee, E. K. You, H. Y. Jang, "A study on the variables affecting self-directed learning of workers: focusing on hope and growth mindset" Journal of Digital Convergence, 16(9), 29-37, 2018. DOI: 10.14400/JDC.2018.16.9.029. 16. F. Hayes AF. Introduction to mediation, moderation, and conditional process analysis: A regression based approach, The Guilford Press, 2018. Authors: Am-suk Oh Designing Smart Supplier Chain Management Model under Big Data and Internet of Things Paper Title: Environment Abstract: Recently, the business paradigm has shifted to the direction of strengthening consumer-oriented process interconnections and thus demand diversity and volatility have increased. The automation, autonomy, and connectivity of the entire supply chain are emphasized on the basis of the fourth industry technology such as Internet of things and artificial intelligence. In this paper, we propose a smart Supply Chain Management model that accommodates current high technological issues and business requirements under 4th industrial revolution era. The proposed web based SCM consists of automatic ordering/purchasing system, artificial intelligence 55. based appropriate inventory computation system based on Monte Carlo simulation, and detachable IoT based inventory management system. The system is expected to be a sophisticated and intelligent smart SCM solution that adheres to logistics standards for visibility, safety and efficiency. 290-294

Keyword: SCM, Big Data, Internet of Things, Automatic Ordering / Purchasing System, Automatic Inventory Management

References: 1. R. K. Oliver, M. D. Webber, "Supply-chain management: logistics catches up with strategy," Outlook, 1982. 2. R. Ganeshan, T. P. Harrison, "An introduction to supply chain management, in Supply Chain Management, Version 1." Available: http://silmaril.smeal.psu.edu/misc/supply_chain_ intro.html. 3. G. Dellino, T. Laudadio, R. Mari, N. Masronardi and C. Meloni, "A reliable decision support system for fresh food supply chain management", International Journal of Production Research, Feb. 2018, PP. 1458-1485. 4. P. M. Reyes, W. J. Worthington and J. D. Collins, "Knowledge management enterprise and RFID systems: Adoption to supply chain performance," Management Research Review, Jan. 2015, pp. 44-66. 5. Chang, Y. Ping, "A Wep-Based System for Supply Chain Collaboration to Enhance Agility and Flexibility." In Handbook of Research on the Evolution of IT and the Rise of E_Society, IGI Global, 2019, pp. 108-123. 6. X. Wang, S. M. Disney, "The bullwhip effect: Progress, trends and directions." European Journal of Operational Research, May 2016, pp. 691-701. 7. P. Taticch, P. Garengo, S. S. Nudurupati, F. Tonelli and R. Pasqualino, "A review of decision-support tools and performance measurement and sustainable supply chain management." International Journal of Production Research, Nov. 2015, pp. 6473-6494. 8. A. Touboulic and H. Walker, "Theories in sustainable supply chain management: a structured literature review." International Journal of Physical Distribution & Logistics Management, Mar. 2015, pp. 16-42. 9. C. Danila, G. Stegaru, A. M. Stanescu and C. Serbanescu, "Web-service based architecture to support SCM context-awareness and interoperability." Journal of Intelligent Manufacturing, Feb. 2016, pp. 73-82. 10. P. Kamalendu., "Supply Chain Coordination Based on Web Service." In Supply Chain Management in the Big Data Era, IGI Global, 2017, pp. 137-170. 11. T. de Vass, H. Shee and S. J. Miah , "The effect of 'Internet of Things' on supply chain integration and performance: An organisational capability perspective." Australasian Journal of Information Systems, Jun. 2018, pp. 22-31. Authors: Do-Yeon Kim, Sung-Won Kang, Seong-Taek Park

Paper Title: Bi-LSTM Sentiment Classifier for Climate Change Issues in South Korea Abstract: A sentiment analysis using SNS data can confirm various people’s thoughts. Thus an analysis using SNS can predict social problems and more accurately identify the complex causes of the problem. In addition, big data technology can identify SNS information that is generated in real time, allowing a wide range of people’s opinions to be understood without losing time. It can supplement traditional opinion surveys. The incumbent government mainly uses SNS to promote its policies. However, measures are needed to actively reflect SNS in the process of carrying out the policy. Therefore this paper developed a sentiment classifier that can identify public feelings on SNS about climate change. To that end, based on a dictionary formulated on the theme of climate change, we collected climate change SNS data for learning and tagged seven sentiments. Using training data, the sentiment classifier models were developed using machine learning models. The analysis showed that the Bi-LSTM model had the best performance than shallow models. It showed the highest accuracy (85.10%) in the seven sentiments classified, outperforming traditional machine learning (Naive Bayes and SVM) by approximately 34.53%p, and 7.14%p respectively. These findings substantiate the applicability of the proposed Bi-LSTM-based sentiment classifier to the analysis of sentiments relevant to diverse climate change issues.

56. Keyword: Climate Change, Machine Learning, Bi-LSTM, CNN, Sentiment Classifier 295-299 References: 1. K. H. Cheong, D. G. Lee, H. S. Ha, “Exploring Factors that Influence Trust in Local Government in South Korea”The Korean Association for Public Administration, 45(4), 2011, pp.181-202. 2. V. A. Chanley, “Trust in Government in the Aftermath of 9/11: Determinants and Consequences. Political psychology”, 23(3), 2002, pp. 469-483. 3. T. M. Song, J Song, J. Y. An, L. L. Hayman, J. M.Woo,“Psychological and social factors affecting Internet searches on suicide in Korea: a big data analysis of Google search trends”, Yonsei medical journal,55(1), 2014, pp.254-263. 4. Y. Xiao, K. Cho,“Efficient character-level document classification by combining convolution and recurrent layers”, arXiv preprint arXiv:1602.00367, 2016. 5. M. Cliché,“BB_twtr at SemEval-2017 Task 4: Twitter Sentiment Analysis with CNNs and LSTMs”arXiv preprint arXiv:1704.06125, 2017. 6. K. Kowsari, D. E. Brown, M. Heidarysafa, K. J. Meimandi, M. S. Gerber, L. E. Barnes,“Hdltex: Hierarchical deep learning for text classification” In Machine Learning and Applications (ICMLA), 2017 16th IEEE International Conference. 2017, pp. 364-371. 7. X. Zhang, J. Zhao,Y. LeCun,“Character-level convolutional networks for text classification”. In Advances in neural information processing systems. 2015, pp.649-657. 8. B. Pang, L. Lee, S. Vaithyanathan, “Thumbs up?: sentiment classification using machine learning techniques”, In Proceedings of the ACL-02 conference on Empirical methods in natural language processing-Volume 10. Association for Computational Linguistics. , 2002, pp.79-86. 9. Y. Wang, M. Huang, L. Zhao,“Attention-based lstm for aspect-level sentiment classification”, In Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing.2016, pp. 606-615. 10. P. M. Sosa,“Twitter Sentiment Analysis using combined LSTM-CNN Models”, academia.edu, 2017. Authors: Hye-Kyoung Lee, Young-Hyun Song The Cultural Role and Legal Challenges in the Fourth Industrial Revolution and Artificial Paper Title: Intelligence Era Abstract: Today is the age of the 4th industrial revolution and the AI by the development of the science and the technology. In such change of age, the culture and law should find new measures and roles to respond to such changes. This study presumes that the meaning of culture expands to diverse concepts in the society. In the 57. analysis of social phenomenon, the consensus of social members and the practice including the cultural ideology are important. Therefore, the interdisciplinary considerations beyond the science or law will be proposed. In the age of 4th industrial revolution, the data and the idea will be the source of core competition, and the law should 300-304 support them. However, the social system exemplified with the law promotes the development of the science and the technology but paradoxically, it includes more strict regulation. In the modern society where the technology is being developed and new inventions appear everyday, the culture and the law should be developed to fit to the age. In the age of 4th industrial revolution and AI, the crisis and the opportunity come simultaneously not only to the society but also to its members. To respond to that, the role of science culture, which is in the center of soft power, should be emphasized.

Keyword: The 4th industrial revolution, Culture and Law, Artificial intelligence(AI), Cultural phenomenon, Legal task

References: 1. https://www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-it-means-and-how-to-respond 2. https://www.blackrock.com/corporate/en-at/literature/whitepaper/viewpoint-digital-investment-advice-september-2016.pdf; Byoung- Tak Zhang, Artificial Intelligence and Human Life, THE 4th WORLD HUMANITIES FORUM THE HUMANITIES OF HOPE, Pamphlet, 2016. http://worldhumanitiesforum.com/eng/previous/program.php?idx=7&partCode=P1505708933 3. https://www.aib.edu.au/blog/innovate/fourth-industrial-revolution-future-of-work/; htps://www.samsungsdi.com/column/technology/detail/55162.html?listType=gallery; https://www.economist.com/special- report/2012/04/21/a-third-industrial-revolution 4. https://www.foreignaffairs.com/articles/2015-12-12/fourth-industrial-revolution 5. https://en.wikipedia.org/wiki/Terminator_Genisys; https://en.wikipedia.org/wiki/Blade_Runner_2049 6. N. S. Timasheff, What is “Sociology of Law”?. American Journal of Sociology. 1937; 43(2): 225-35. 7. J. Ellul, The Technological Society. New York: Alfred A. Knopf Inc.; 1964. 8. W. J. Kohler, A. Colbert-Taylo, Current Law and Potential Legal Issues Pertaining to Automated, Autonomous and Connected. Santa Clara High Technology Law Journal. 2015 Jan; 31(1): 99-138. http://digitalcommons.law.scu.edu/chtlj/vol31/iss1/3 9. W. N. Price, II. Artificial Intelligence in Health Care: Applications and Legal Issues. The SciTech Lawyer. 2017; 14(1): 10-13. https://repository.law.umich.edu/cgi/viewcontent.cgi?article=2932&context=articles 10. https://moderndiplomacy.eu/2018/04/24/the-ethical-and-legal-issues-of-artificial-intelligence/ 11. https://ec.europa.eu/digital-single-market/en/news/should-robots-pay-taxe 12. https://www.bbva.com/en/what-is-regulatory-sandbox/ 13. R. Surujnath, Off The Chain! A Guide to Blockchain Derivatives Markets and the Implications on Systemic Risk. Fordham Journal of Corporate and Financial Law. 2017; 22(2): p.263. https://ir.lawnet.fordham.edu/jcfl/vol22/iss2/3 14. D. Ghosal, B. K. Poon, K. Kong, P2P contracts: a framework for resource and service exchange. Future Generation Computer Systems. 2005 Mar; 21(3): 333-47. 15. M. Negnevitsky, Artificial Intelligence: A Guide to Intelligent Systems. Harlow: Addison Wesley, 2011, ch. 2. Authors: Chang-Seek Lee, Hye-Jeong Gu Effects of Stress and Hope on Happiness of Workers: The Moderating Mediation Model of Growth Paper Title: Mindset Abstract: The purpose of this study was to analyze the moderated mediation effects of growth mindset on the effects of stress and hope on the happiness of the employees, and to find ways to improve the happiness from the stress of the workers. SPSS PC + Win. 23 and SPSS MACRO process 3.1. were used for the completion of the data analysis. The main statistical techniques were noted as frequency analysis, reliability analysis, correlation analysis, and moderated mediation effect analysis. In this case, the effect analysis verification used bootstrap, with 5,000 samples of sub-trap and 95% confidence interval. The resulting research findings are as follows. First, Stress has negative correlation with growth mindset, hope and happiness. It is noted that growth mindset has a positive correlation with hope and happiness. Second, the moderated mediation effect of growth mindset on the pass from stress to hope and to happiness was verified. These results will contribute to reducing stress and improving happiness of employees who suffered from job stress by applying the growth mindset to them.

Keyword: Stress, Hope, Growth mindest, Happiness, Moderated mediation effect

References: 1. H. J. Choi. A study on the constituents of worker's happiness: Focusing on development of measurement tools [master's thesis]. [Seoul]: Ewha Women University; 2016. Available from: http://www.riss.kr/search/detail/DetailView.do?p_mat_type=be54d9b8bc7cdb09&control_no=271e2d869a6cb935ffe0bdc3ef48d419 58. 2. R. Crisp (Ed.). Aristotle: Nicomachean Ethics. Cambridge: Cambridge University Press; 2014. 3. S. R. Baumgardner, M. K. Crothers. Positive psychology. New Jersey: Pearson Education; 2009. 4. D. J. Disabato, F .R. Goodman, T. B. Kashdan, J. L. Short, A. Jarden. Different types of well-being? A cross-cultural examination 305-310 of hedonic and eudaimonic well-being. Psychological Assessment. 2016 May;28(5):471-482. 5. D. H. Lee. Worker stress analysis: Focused on large enterprises [master's thesis]. [Incheon]: Inha University; 2013. Available from: http://www.riss.kr/search/detail/DetailView.do?p_mat_type=be54d9b8bc7cdb09&control_no=c0c4012a99cadeefffe0bdc3ef48d419 6. J. G. Kim. The effect of high school students' social support and stress on internet addiction [master's thesis]. [Daejeon]: Daejeon University; 2005. Available from: http://www.riss.kr.libmeta.knou.ac.kr:8010/link?id=T9873422 7. W. B. Cannon. Bodily changes in pain, hunger, fear, and rage, ed2. Boston, CH Branford. 1953;39(2):20-36. 8. E. H. Erikson. Inner and outer space: Reflections on womanhood. Daedalus. 1964;93(2):582-606. 9. E. Stotland. The psychology of hope. San Francisco: Jossey-Bass Behavioral Science Series; 1969. 10. S. Breznitz. The effect of hope on coping with stress. In Dynamics of Stress Boston: Spring; 1986. 11. M. L. Nowotny. Assessment of hope in patients with cancer: Development of an instrument. In Oncology Nursing Forum. 1989 Jan; 16(1):57-61. 12. J. R. Averill, G. Catlin, K. K. Chon. Rules of hope. New York: Springer Science & Business Media; 1990. 13. C. R. Snyder, C. Harris, J. R. Anderson, S. A. Holleran, L. M. Irving, S. T. Sigmon, et al. The will and the ways: Development and validation of an individual-differences measure of hope. Journal of Personality and Social Psychology. 1991 Apr; 60(4):570-85. 14. C. R. Snyder. The psychology of hope: You can get there from here. New York: Free Press; 1994. 15. C. R. Snyder, S. C. Sympson, S. T. Michael, J. Cheavens. Optimism and hope constructs: Variants on a positive expectancy theme. Optimism and Pessimism: Implications for Theory, Research, and Pactice. Washington DC: American Psychological Association; 2001. 16. D. C. Molden, C. S. Dweck. Finding "Meaning" in psychology: A lay theories approach to self-regulation, social perception, and social development. American Psychologist. 2006;61(3):192-203. 17. S. K. Lee. A study on relationship between growth mindset, fixed mindset and grit of young adults: the mediating effects of resilience [master's dissertation]. [Seoul]: Ewha Woman’s University; 2016. Available from: http://www.riss.kr/search/detail/DetailView.do?p_mat_type=be54d9b8bc7cdb09&control_no=207d683906938408ffe0bdc3ef48d41 18. C. S. Dweck. Mindset: The new psychology of success. New York: Ballantine Books; 2006. 19. C. S. Dweck, C. Chiu, Y. Hong. Implicit theories and their role in judgments and reactions: A world from two perspectives. Psychological Inquiry. 1995;6(4):267-285. 20. J. S. Hyun, C. J. Park. Learnimg effects of divide-and-combine principles and state models on contradiction problem solving and growth mindest. Knowledge Management Rwview. 2013;14(4):19-46. DOI:10.15813/kmr.2013.14.4.002. Available from: http://www.riss.kr/search/detail/DetailView.do?p_mat_type=1a0202e37d52c72d&control_no=1407b00a138766dcffe0bdc3ef48d419 21. S. J. Lee, T. S. Shin. The effects of mindsets on academic self-efficacy of high school students mediated by grit: Multi-group analysis according to whether the students gave up on mathematics or not. Asian Journal of Education. 2018 Mar;19(1):59-87. Available from: http://www.riss.kr/search/detail/DetailView.do?p_mat_type=1a0202e37d52c72d&control_no=2b4cf030e7d607374884a65323211ff0 22. C. S. Lee. The roles of hope and growth mindset in the relationship between mothers’ parenting stress and children’s well-being. Indian Journal of Science and Technology. 2016 Dec; 9(47):1-5. .DOI:10.17485. 23. C. S. Lee, Y. K. Hwang. A study on the variables influencing the academic procrastination of adolescents in rural areas. International Journal of Applied Engineering Research (IJAER). 2015 Oct;10(79):158-161. 24. J. Y. Park, C. S. Lee. Mediating effect of hope on the relationship between cultural adaptation stress and psychological welfare of female married immigrants. Digital Policy Research. 2012 Nov;10(11):665-672. 25. D. F. Parker, T. A. DeCotiis. Organizational determinants of job stress. Organizational Behavior and Human Performance. 1983 Oct;32(2):160-177. Available from: https://doi.org/10.1016/0030-5073(83)90145-9 26. H. K. Lee, D. G. Lee, Y. H. Choi. Validation of the Korean version of Snyder`s dispositional hope scale. Korean Journal of Social and Personality Psychology. 2008 Feb;22(2):1-16. 27. C. S. Dweck. Mindset: The new psychology of success. Random House. 2006. 28. S. Lyubomirsky, H. S. Lepper. A measure of subjective happiness: preliminary reliability and construct validation. Social indicators research. 1999 Nov; 46(2):137-55. DOI: 10.1023/A:1006824100041. 29. M. R. Kim. The effect of stress on happiness: Moderating effect of gratitude and hope [master's dissertation]. [Daegu]: Daegu Catholic University; 2014. Available from: http://www.riss.kr/search/detail/DetailView.do?p_mat_type=be54d9b8bc7cdb09&control_no=e6ae997a0c5cfbbbffe0bdc3ef48d419 30. C. R. Snyder, J. Cheavens, S. C. Sympson. Hope: An individual motive for social commerce. Group Dynamics: Theory, Research, and Practice. 1997; 1(2):7-118. 31. J. Hayes. The theory and practice of change management. Palgrave. London; 2018. 32. J. Y. Song. The Relationship between job stress and psychological exhaustion of the first counselor: Moderating effects of hope [master's thesis]. [Bucheon]: Catholic University; 2013. Available from: http://www.riss.kr/search/detail/DetailView.do?p_mat_type=be54d9b8bc7cdb09&control_no=2393083f079ee9c5ffe0bdc3ef48d419 33. C. R. Snyder, K. M. Pulvers. Dr. Seuss, the coping machine, and “Oh, the Places You’ll Go.” In C. R. Snyder (Ed.), Coping with stress: Effective people and processes. Oxford: Oxford University Press; 2001. 34. C. S. Lee. Authentic leadership and organizational effectiveness: the roles of hope, grit, and growth mindset. International Journal of Pure and Applied Mathematics. 2018 Jan; 118(19):1439-1452. 35. Y. K. Hwang, C. S. Lee. Victimization of adolescents by parental abuse and school violence: A moderated mediation model of self- esteem and growth mindset. International Journal of Pure and Applied Mathematics. 2018 Feb;118(19):383-401. Authors: Seok-Woo Jang, Sang-Hong Lee

Paper Title: Extraction of Character Regions through Machine Learning and Filtering Abstract: Characters in images are able to provide main information of the image. Therefore, it is important to analyze various kinds of image data and accurately extract the characters in images. This study proposes a new method of excluding background regions and accurately detecting character regions from input images with the uses of MCT features and Adaboost algorithm. The proposed method first extracts candidate character regions from input images with the uses of MCT features and Adaboost algorithm. It then excludes non- character regions and detects real character regions from the extracted candidate regions with the use of geometrical features. In the experiment of this study, the proposed method more robustly detected character regions from various input color images than a conventional method. For performance comparison, this study compared the method based on existing texture analysis and the proposed method. In this study, to qualitatively evaluate the performance of the proposed method of extracting license plate regions, the accuracy measure was defined. The measure is used to show the ratio of the accurately extracted character regions to all character regions of an image. The conventional method using the frequency factor-based texture information had many errors of character region detection, since it failed to execute binarization of background and character regions properly. On contrary, the proposed method made use of MCT features and Adaboost algorithm, effectively filtered candidate regions with the use of geometrical features, so that it detected character regions more 59. accurately. The proposed character detection method is expected to be usefully applied to the fields of pattern recognition and image processing, such as store sign recognition and license plate recognition. 311-315

Keyword: Filtering, Machine learning, Character data, Feature acquisition, Candidate region.

References: 1. A M. Aladwani, “Compatible quality of social media content: conceptualization, measurement, and affordances,” Int. J. Inform. Manage., 37(6), 2017, pp. 576-582. 2. S. Wazarkar, B. N. Keshavamurthy, “A survey on image data analysis through clustering techniques for real world applications,” J. Vis. Comm. Image Represent., vol. 55, 2018, pp. 596-626. 3. C. Qin, X. Qian, W. Hong, X. Zhang, “An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer,” Inform. Sci., vol. 487, 2019, pp. 176-192. 4. Q. Zhang, Y. Shang, Y. Wang, Y. Liu, N. Wang, Z. Gui, G. Yang, “Denoising for low-dose CT image by discriminative weighted nuclear norm minimization,” IEEE Access, vol. 6, 2018, pp. 46179-46193. 5. V. Opbroek, M. A. Ikram, M. W. Vernooij, M. D. Bruijne, “Transfer learning improves supervised image segmentation across imaging protocols,” IEEE Trans. Med. Imag., vol. 34, no. 5, 2015, pp. 1018-1030, 6. K. Fu, J. Li, J. Jin, C. Zhang, “Image-text surgery: efficient concept learning in image captioning by generating pseudopairs,” IEEE T. Neur. Net. Lear., vol. 29, no. 12, 2018, pp. 5910-5921. 7. D. NguyenVan, S. Lu, S. Tian, N. Ouarti, M. Mokhtari, “A pooling based scene text proposal technique for scene text reading in the wild,” Pattern Recogn., vol. 87, 2019, pp. 118-129. 8. G. J. Ansari, J. H. Shah, M. Yasmin, M. Sharif, S. L. Fernandes, “A novel machine learning approach for scene text extraction,” Future Gener. Comp. Sy., vol. 87, 2018, pp. 328-340. 9. Onan, S. Korukoglu, H. Bulut, “Ensemble of keyword extraction methods and classifiers in text classification,” Expert Syst. Appl., vol. 57, 2016, pp. 232-247. 10. M. R. Asif, Q. Chun, S. Hussain, M. S. Fareed, S. Khan, “Multinational vehicle license plate detection in complex backgrounds,” J. Vis. Comm. Image Represent., vol. 46, 2017, pp. 176-186. 11. X. Qian, G. Liu, H. Wang, R. Su, “Text detection, localization, and tracking in compressed video,” Signal Process. Image Comm., vol. 22, no. 9, 2007, pp. 752-768. 12. W. Kim, C. Kim, “A new approach for overlay text detection and extraction from complex video scene,” IEEE T. Image Process., vol. 18, no. 2, 2009, pp. 401-411. 13. H. Lee, S. Chen, S. Wang, “Extraction and recognition of license plates of motorcycles and vehicles,” in 17th IEEE International Conference on Pattern Recognition. Cambridge, UK, 2004, pp. 356-359. 14. K. Deb, K. Jo, “HSI color-based vehicle license plate detection,” in International Conference on Control, Automation and Systems, Seoul, South Korea, 2008, pp. 687-691. 15. L. Bai, J. Liang, C. Dang, F. Cao, “A novel attribute weighting algorithm for clustering high-dimensional categorical data,” Pattern Recogn., vol. 44, no. 12, 2011, pp. 2843-2861. 16. Y. G. Lee, Z. Tang, J. N. Hwang, “Online-learning-based human tracking across non-overlapping cameras,” IEEE T. Circ. Syst. Vid., vol. 28, no. 10, 2018, pp. 2870-2883. 17. X. Chang, L. Jiao, F. Liu, F. Xin, “Multicontourlet-based adaptive fusion of infrared and visible remote sensing images,” IEEE Geosci. Remote S., vol. 7, no. 3, 2010, pp. 549-553. 18. B. Sun, S. Chen, J. Wang, H. Chen, “A robust multi-class AdaBoost algorithm for mislabeled noisy data,” Know.-Based Syst., vol. 102, 2016, pp. 87-102. 19. C. Gao, P. Li, Y. Zhang, J. Liu, L. Wang, “People counting based on head detection combining Adaboost and CNN in crowded surveillance environment,” Neurocomputing, vol. 208, 2016, pp. 108-116. 20. H. Dogan, O. Akay, “Using AdaBoost classifiers in a hierarchical framework for classifying surface images of marble slabs,” Expert Syst. Appl., vol. 37, no. 12, 2017, pp. 8814-8821. 21. T. Wang, Z. Qin, Z. Jin, S. Zhang, “Handling over-fitting in test cost-sensitive decision tree learning by feature selection, smoothing and pruning,” J. Syst. Software, vol. 83, no. 7, 2010, pp. 1137-1147. 22. Fernandes, A. Utkin, J. Eiras-Dias, J. Silvestre, P. Melo-Pinto, “Assessment of grapevine variety discrimination using stem hyperspectral data and AdaBoost of random weight neural networks,” Appl. Soft Comput., vol. 72, 2018, pp. 140-155. 23. H. Cai, Z. Yang, X. Cao, W. Xia, X. Xu, “New iterative triclass thresholding technique in image segmentation,” IEEE T. Image Process., vol. 23, no. 3, 2014, pp. 1038-1046.

24. X. C. Yuan, L. S. Wu, Q. Peng, “An improved Otsu method using the weighted object variance for defect detection,” Appl. Surf. Sci., vol. 349, 2015, pp. 472-484. 25. M. A. Talab, Z. Huang, F. Xi, L. HaiMing, “Detection crack in image using Otsu method and multiple filtering in image processing techniques,” Optik, vol. 127, no. 3, 2016, pp. 1030-1033. 26. L. He, X. Zhao, Y. Chao, K. Suzuki, “Configuration-transition-based connected-component labeling,” IEEE T. Image Process., vol. 23, no. 2, 2014, pp. 943-951. 27. L. Ma, X. P. Zhang, J. Si, G. P. Abousleman, “Bidirectional labeling and registration scheme for gray scale image segmentation,” IEEE T. Image Process., vol. 14, no. 12, 2005, pp. 2073-2081. 28. L. He, Y. Chao, K. Suzuki, “Two efficient label-equivalence-based connected-component labeling algorithms for 3-D binary images,” IEEE T. Image Process., vol. 20, no. 8, 2011, pp. 2122-2134. 29. G. V. Pedrosa, C. A. Z. Barcelos, “Anisotropic diffusion for effective shape corner point detection,” Pattern Recogn. Lett., vol. 31, no. 12, 2010, pp. 1658-1664. 30. P. Sathiya, P. Anandhakumar, “Probabilistic collision estimation for tracked vehicles based on corner point self-activation approach,” Comput. Electr. Eng., vol. 74, 2019, pp. 557-568. 31. O. Haggui, C. Tadonki, L. Lacassagne, F. Sayadi, B. Ouni, “Harris corner detection on a NUMA manycore,” Future Gener. Comp. Sy., vol. 88, 2018, pp. 442-452. 32. S. K. Lam, G. Jiang, M. Wu, B. Cao, “Area-time efficient streaming architecture for FAST and BRIEF detector,” IEEE T. Circuits- II: Express Briefs, vol. 66, no. 2, 2019, pp. 282-286. 33. Y. Xing, D. Zhang, J. Zhao, M. Sun, W. Jia, “Robust fast corner detector based on filled circle and outer ring mask,” IET Image Processing, vol. 10, no. 4, 2016, pp. 314-324. 34. M. Awrangjeb, G. Lu, C. S. Fraser, “Performance comparisons of contour-based corner detectors,” IEEE T. Image Process., vol. 21, no. 9, 2012, pp. 4167-4179. 35. S. K. Lam, T. C. Lim, M. Wu, B. Cao, B. A. Jasani, “Area-time efficient FAST corner detector using data-path transposition,” IEEE T. Circuits-II: Express Briefs, vol. 65, no. 9, 2018, pp. 1224-1228. Authors: Kim, Ki-Hong, Lee, Il-Suk, Jung, Song-Young,Yang, Chun-Ho Effects of Intensity Method on MEF of Biceps Brachii and Number of Repetition during Barbell Paper Title: Curl Exercise Abstract: The purpose of this study was to investigate the number of repetitions and the MEF of the Biceps brachii for the 3 sets of maximal repetitive barbell curls with 3intensity. The subjects which were selected as men in their 20s who had more than 2 years of resistance exercise experience. The subjects also conducted a bar- cull experiment at each 7-day interval with a randoml assignment (50%1RM, 70%1RM, 90%1RM). In every one of the sets, the number of repetitions and the MEF of the Biceps brachii were measured. The measured two-way ANOVA was used, and the statistical significance was noted at the result of a = .05. The higher the intensity condition, the fewer the number of repetitions performed by the subject. The decrease of the number of repetitions was larger with a lower intensity condition. The lower the intensity, the higher the level of muscle 60. fatigue was noted in the subject. In conclusion, it seems that the maximum repetitive exercise is seen to increase the muscle fatigue as the intensity is lower in those instances. Therefore, it is necessary to write a program considering the degree of muscle fatigue at low intensity in resistance exercise for the best results during an 316-321 exercise program.

Keyword: Repetition, MEF, Muscle fatigue, Barbell Curl, Resistance training.

References: 1. K.H. Kim, W.Y. Park, J.S. Kim, “The Effect of Changing Intensity Between Sets on Agonist Muscle Activity, iEMG, MEF, CK After Bench Press”. The Korean Journal of Physical Education. 51(2), 379-387, 2012. 2. W.J. Kraemer, N.A. Ratamess, “Physiology of resistance training: current issues”. Orthopaedic Physical Therapy Clinics of North America. 9(4), 467-514, 2000. 3. T.O. Bompa, C. Buzzichelli, Periodization-: theory and methodology of training. Human Kinetics, 2018. 4. G.G. Haff, N.T. Triplett, Essentials of strength training and conditioning 4th edition. Human kinetics, 2015. 5. W.J. Kraemer, N.A. Ratamess, “Fundamentals of resistance training: progression and exercise prescription”. Med Sci Sports Exerc. 36(4), 674-88, 2004. 6. M. Izquierdo, J.J. Gonza´lez-Badillo, K. Ha¨kkinen, et al, “Effect of loading on unintentional lifting velocity declines during single sets of repetitions to failure during upper and lower extremity muscle actions”. Int J Sports Med. 27(9), 718–24, 2006. 7. N. Madsen, T. McLaughlin, “Kinematic factors influencing performance and injury risk in the bench press exercise”. Medicine and science in sports and exercise. 16(4), 376-381, 1984. 8. T. Lawton, J. Cronin, E. Drinkwater, R. Lindsell, D. Pyne, “The effect of continuous repetition training and intra-set rest training on bench press strength and power”. J Sports Med Phys Fitness. 44(4), 361-367, 2004. 9. A.D. Walshe, G.J. Wilson, G.J. Ettema, “Stretch-shorten cycle compared with isometric preload: contributions to enhanced muscular performance”. Journal of Applied Physiology. 84(1), 97-106, 1998. 10. R.A. Conwit, D. Stashuk, H. Suzuki, N. Lynch, M. Schrager, et al, “Fatigue effects on motor unit activity during submaximal contractions”. Archives of physical medicine and rehabilitation. 81(9), 1211-1216, 2000. 11. J. Elliott, B.A. Callingham, D.F. Sharman, “The influence of amine metabolizing enzymes on the pharmacology of tyramine in the isolated perfused mesenteric arterial bed of the rat”. British journal of pharmacology. 98(2), 515-522, 1989. 12. R. Van Den Tillaar, G. Ettema, “The sticking period in a maximum bench press”. Journal of sports sciences. 28(5), 529-535, 2010. 13. R.M. Enoka, D.G. Stuart, “Neurobiology of muscle fatigue”. J Appl Physiol. 72(5), 1631–48, 1992. 14. C. Williams, S. Ratel, Human muscle fatigue. Routledge, 2009. 15. D.A. Jones, “Changes in the force–velocity relationship of fatigued muscle: implications for power production and possible causes”. J Physiol. 588(16), 2977–86, 2010. 16. L. Sanchez-Medina, J.J. González-Badillo, “Velocity loss as an indicator of neuromuscular fatigue during resistance training. Medicine and science in sports and exercise”. 43(9), 1725-1734, 2011. 17. N.A. Evans, Bodybuilding anatomy. Human Kinetics, 2018. 18. P.A. Davidson, M. Pink, J. Perry, et al, “Functional anatomy of the flexor pronator muscle group in relation to the medial collateral ligament of the elbow”. The American journal of sports medicine. 23(2), 245-250, 1995. 19. G.W. Woods, H.S. Tullos, “Elbow instability and medial epicondyle fractures”. The American journal of sports medicine. 5(1), 23- 30, 1977. 20. S.K. Lim, “Review of ulnr collateral ligament injuries and prevention in baseball players”. Journal of coaching development. 9(3), 65-80, 2007. 21. J.M. Willardson, L.N. Burdett, “The effect of rest interval length on bench press performance with heavy vs. light loads”. J Strength Cond Res. 20, 396-399, 2006. 22. J.T. Viitasalo, P.W. Komi, “Interrelationships of EMG signal characteristics at different levels of muscle tension and during fatigue”. ElectromyogrClinNeurophysiol. 18(3–4), 167–78, 1987. 23. P.V. Komi, M. Kaneko, O. Aura, “EMG activity off the leg extensor muscles with special reference to mechanical efficiency in concentric and eccentric exercise”. International Journal of Sports Medicine suppl. 1, 22-9, 1987. 24. T. Moritani, A. Nagata, M. Muro, “Intramuscular and surface electromyogram changes during muscle fatigue”. J. Appl. Phyiol. 60(4), 1179-1185, 1986. 25. P.V. Komi, P. Tesch, “EMG frequency spectrum, muscle structure, and fatigue during dynamic contractions in man. Eur”. J. Appl. Physiol. 42, 41-50, 1979. 26. H.A. DeVries, “Efficiency of electrical activity as a physiological measure of the functional state of muscle tissue”. Amer J phys Med. 47(1), 10–22, 1986. 27. T.I. Arabadzhiev, V.G. Dimitrov, N.A. Dimitrova, et al, “Interpretation of EMG integral or RMS and estimates of neuromuscular efficiency can be misleading in fatiguing contraction”. Journal of Electromyography and Kinesiology. 20(2), 223-232, 2010. 28. P. Konrad, The abc of emg. A practical introduction to kinesiological electromyography, Noraxon; 2005. 29. K. Hakkinen, M. Kallinen, M. Izquierdo, K. Jokelainen, H. Lassila, E. Malkia, et al, “Changes in agonist-antagonist EMG, muscle CSA, and force during strength training in middle-aged and older people”. J Appl Physiol. 84, 1341–1349, 1998. 30. B. Carolan, E. Cafarelli, “Adaptations in coactivation after isometric resistance training”. J Appl Physiol. 73, 911–917, 1992. 31. E. Hultman, H. Sjoholm, Biochemical causes of fatigue. Human muscle power, 1986. 32. S. McMahon, D. Jenkins, “Factors affecting the rate of phosphocreatine resynthesis following intense exercise”. Sports Med. 32, 761–784, 2002. Authors: Shinhong Min, Soonyoung Yun

Paper Title: Effect of Prior Learning Method on Nursing Students' Practical Capacity Abstract: We looked at how the practical capacity of nursing students was affected by the application of the Prior Learning Method in the fundamentals of nursing practice course. In order to compare practical capacity, self-efficacy, self-directed learning ability, and learning satisfaction were set as variables and results were calculated using SPSS 18.0. Comparing results after applying the Prior Learning Method to only the experimental group by classifying it as a group of experimental and control group, the results showed that self- efficacy in the experimental group was increased and learning satisfaction was high. There was a meaningful result of applying the Priority Learning Method to the demanding practical class, gaining satisfaction, and increasing confidence. It is necessary to verify it through repeated research and develop it into a better teaching method.

61. Keyword: Learning satisfaction, Self-directed learning ability, Self-efficacy 322-325 References: 39. S. H. Yang, J. H. Won, H. J. Baek, H. S. Jo, J. H. Gang, J. I. Lee, et al., Fundamentals of Nursing, Hyeonmunsa, 2018. 40. K. A. Song, H. S. Park, Y. H. Hong, K. I. Lee, S. K. Jeong, B. H. Jo, et al., Fundamentals of Nursing Intervention & Skills, Sumunsa; 2017. 41. K. S. Han, J. Y. Cho, “A study on the experience of fundamental nursing practice”, Journal of Korean Academy of Nursing, Vol.29(2), 1999, pp.293-303. 42. E. J. Yeun, “Effectiveness of Video-Record Method on Fundamental Nursing Skill Education - Focused on Intramuscular Injection Practice”, The Journal of Korean academic society of nursing education, Vol. 5(1), 1999, pp.86-96. 43. H. Y. Jeong, S. Kang, “The Influence of Recognition of Importance and Self-Directed Learning Ability on Confidence in Performance of Basic Nursing Skills among Nursing Students”, Journal of digital convergence, Vol. 16(6), 2018, pp. 241-250. https://www.earticle.net /Article/A332831 44. C. Barret, F. Myrick, “Job satisfaction in preceptorship and its effect on the clinical performance of the preceptee”, Journal of Advanced Nursing, Vol. 27, 1998, pp. 364-371. 45. R. S. Vealey, “Conceptualization of sport-confidence and competitive orientation: Preliminary investigation and instrument development”, Journal of Sport Psychology, Vol. 8, 1986, pp. 221-246. 46. M. Y. Jo, “Effects of Core Fundamental Nursing Skills Education on Self-efficacy, Clinical Competence and Practice Satisfaction in Nursing Students”, J Korean Acad Fundam Nurs, Vol. 21(3), 2014, pp. 292-301. 47. H. W. Jeon, “Interpretation of the meaning of self-directed learning”, Research of Learner-Centered Curriculum and Instruction, Vol. 12(1), 2012, pp. 373-392. http://www.kalci.org/html /?pmode=searchh 48. Y. A. Kim, Y. H. Kim, “Factors Influencing Self-Directed Learning Ability in Beginning Nursing Students”, Asia-pacific Journal of Multimedia Service Convergent with Art, Humanities and Sociology, Vol. 6(9), 2016, pp. 459-471. http://www.ndsl.kr/ndsl/search/detail/articlearticleSearchResultDetail.do?cn=ART002146890 49. Y. H. Kim, “Effects of utilizing animation prior to fundamental nursing practice on learning motivation and self-directedness in student nurses”, The Korean Journal of Fundamentals of Nursing, Vol. 17(2), 2010, pp. 240-248. 50. M. R. Song, E. M. Kim, S. J. Yu, “Analysis on the Competency of Nursing Students' Basic Nursing Skills”, The Korea Contents Society, Vol. 12(6), 2012, pp. 390-401. 51. S. O. Kim, S. H. Cho, “Learning Effectiveness according to the Practical Teaching Method, Self Confidence and Degree of Knowledge Achievement of Aseptic Technique by Nursing Students”, The Korean Journal of Fundamentals of Nursing, Vol. 6(1), 1999, pp.7-17. 52. E. J. Shin, “A Study Related to Self-Efficacy, Satisfaction with Practice and Fundamentals of Nursing Practicum” The Korean Journal of Fundamentals of Nursing, Vol. 15(3), 2008, pp. 380-386. 53. B. H. Cho, M. H. Ko, S. Y. Kim, “Effectiveness of Web Based Learning on Competence, Knowledge, and Confidence in Foley- Catheter Management in Basic Nursing Education”, The Korean Journal of Fundamentals of Nursing, Vol. 11(3), 2004, pp. 248- 255. 54. M. Sherer, J. Maddux, B. Mercandante, S. Prentice-Dunn, B. Jacobs, “The Self-Efficacy Scale: Construction and Validation”, Psychological Reports, Vol. 51, 1982, pp. 663-671. 55. S. J. Lee, A Study on the Development of Life-Skills: Communication, Problem Solving, and Self-Directed Learning. Seoul, Korean Educational development Institute, 2003. M. S. Yu, “Development of standardized patient managed instruction for fundamentals of nursing course”, unpublished, 2001. (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given. Authors: Shinhong Min

Paper Title: Pair-Work Teaching Method and Its Outcome Abstract: The Pair-work teaching method was applied to college students attending nursing departments and was conducted to assess its effectiveness after applying the Pair-work teaching method to the subject of medical terminology that is taught as a basic subject of their majors. The application effect of the Pair-work teaching method was compared with and analyzed whether there was a difference in learning attitude, interest, learning effect, etc. between the experimental group applying the Pair-work and the non-applicable control group. It is analyzed using the SPSS/WIN 18.0 program. Learning attitudes and interests increased only in the experiment group that applied the pair-work. Learning effects were also found to differ from non-pair-work comparators, which were statistically different. This showed that learning medical terms using a pair-work has a positive effect on the learning attitude, interest and learning effects of the target students.Since there have been positive effects in the experiment group that applied the pair-work, it is necessary to study it repeatedly whether teaching methods using the pair-work are developed and applied in other subjects to improve learning outcome. Keyword: Academic interest, Attitude of learning, Learning effect 62.

References: 326-329 1. J. H. Bae, “(A) study on the development of problem based learning module for nursing clinical practice” Master's thesis, Busan National University; 2005. 2. M. A. Park, “Nurses and Nursing Students' Recognition of Good Instruction” Master's thesis, Ewha Womans University, 2018. 3. M. Long, P. A. Porter, “Group Work, Interlanguage Talk, and Second Language Acquisition” TESOL Quarterly, 19(2), 1985, pp. 207-228. 4. Y. S. Jang, “Effects of Pair/Group Work on English Vocabulary Acquisition” Journal of The Korea Contents Society, 15(7), 2015, pp. 629-642, 5. B. K. Lee, “Development of a Medical Terminology Learning App for Smart Education” Journal of Digital Contents Society, 18(1), 2017, pp. 25-33. 6. K. S. Shin, M. K. Jo, “The Knowledge, Need, and Usage of Medical Terminology in Clinical Nursing Practice” Journal of Korean Society of Biological Nursing Science, 16(4), 2014, pp. 276-283. 7. M. H. Jeong, “A Web-based Contents Design for Teaching-Learning Medical Terminology and Its Effects” Master's thesis, Woosuk University, 2007. 8. S. Y. Hwang, “Effects of Problem-based Learning on the Knowledge Achievement, Critical Thinking Ability, Attitude and Motivation toward Learning of Nursing Students” Ph.D Thesis, Chonnam National University, 2003. 9. J. E. Lee, “Effect of paired work in English reading class” Master's thesis, Ajou University, 2007. 10. H. K. Kim, “Enhancing Self-directed Learning Ability in English Using Web sites” Ph.D Thesis, Woosuk University, 2003 Authors: Sei-Youen Oh, Aeri Lee

Paper Title: Authentication and Access Control Methods for Secured Smart Home IoT Service Environment Abstract: The development of the Internet of Things has increased the interconnections between things, and the IoT has been applied not only to our everyday life but also to various industrial fields. A variety of services are being developed for many people to use for the IoT environment. More focus is also being put on the smart 63. home service market which applies the IoT to the residential space - an area close to an area close to their everyday life among the IoT services. Though the smart home service market is growing and being used in a variety of fields, security threats exist - such as data fabrication and falsification, illegal authentication and 330-335 privacy violation. When the device data of the smart home becomes exposed to the security threats, there is also a risk of a secondary damage due to the nature of the smart home environment. Therefore, this paper proposes figuring out related security threats and requirements for a safe access to the smart home system in the IoT environment, as well as safe authentication and access control methods. It is expected that the analysis of the stability and efficiency of the proposed methods will be used as the base research on the security in the rapidly- growing smart home service environment.

Keyword: Authentication, IoT device, IoT Services, Internet of things

References: 1. K.Nikos, P.Eleni, P. Andreas. “Survey in smart grid and smart home security Issues, challenges and countermeasures”, IEEE Communications Surveys & Tutorials, Vol.16, No.4,2014,pp.1933-1954 2. DOI: https://doi.org/10.1109/comst.2014.2320093 3. Dae-Hwi Lee and Im-Yeong Lee. “A Study on Enhanced 3PAKE Scheme against Password Guessing Attack in Smart Home Environment”, Journal of the Korea Institute of Information Security & Cryptology,Vol.26,No.6, 2016, pp.471-481. 4. http://www.ndsl.kr/ndsl/commons/util/ndslOriginalView.do?cn=JAKO201606557486772&dbt=JAKO&koi=KISTI1.1003%2FJN L.JAKO201606557486772 5. Ho-seok Ryu and Jin Kwak, “Group Key Management Method for Secure Device in Smart Home Environment”, Journal of the Korea Institute of Information Security & Cryptology, 25(2), 2015, pp.479-487. 6. http://www.ndsl.kr/ndsl/commons/util/ndslOriginalView.do?cn=JAKO201514751644742&dbt=JAKO&koi=KISTI1.1003%2FJN L.JAKO201514751644742 7. D.Hussein, E. Bertin, V. Frey. “A Community-Driven Access Control Approach in Distributed IoT Environments”, IEEE Communications Magazine, Vol.55,No.3, 2017, pp.146-153. 8. DOI: 10.1109/MCOM.2017.1600611CM 9. J.Nin, J. Herranz,” Privacy-Aware Access Control in Social Networks: Issues and Solutions. Privacy and Anonymity in Information Management Systems”, Springer London, 2010, pp.181-195. DOI:10.1007/978-1-84996-238-4_9 10. S. Gusmeroli, S. Piccione, D. Rotondi, “A capability-based security approach to manage access control in the Internet of Things. Mathematical and Computer Modelling”,Vol.58,No.5-6, 2013,pp.1189-1205 11. DOI : 10.1016/j.mcm.2013.02.006 12. Yoon, Seokung; Park, Haeryong; Yoo, Hyeong Seon, “Security issues on smarthome in IoT environment. Computer science and its applications”, Springer, Berlin, Heidelberg, 2015,pp.691-696. 13. DOI: https://doi.org/10.1007/978-3-662-45402-2_97 14. Sivaraman, Vijay, Et Al, “Network-level security and privacy control for smart-home IoT devices”, In: Wireless and Mobile Computing, Networking and Communications (WiMob), 2015 IEEE 11th International Conference on. IEEE, 2015, pp.163-167. 15. DOI: https://doi.org/10.1109/wimob.2015.7347956 16. Ting Jiang, Ming Yang, Yi Zhang, “Research and implementation of M2M smart home and security system”, Security And Communication Networks., 8(16), 2015, pp.2704-2711. 17. DOI 10.1002/sec.569 18. Shen Jian, Wang Chen, Li Tong, Chen Xiaofeng, Huang Xinyi, Zhan Zhi-Hui, “Secure data uploading scheme for a smart home system”, Information Sciences, 453, 2018,pp.186-197. 19. DOI ; 10.1016/j.ins.2018.04.048 Authors: Hyo-Seong Ji, Sung-Yuk Kim, Key-Sun Kim, Yong-Du Jun

Paper Title: The Effect of Automotive Seat Cushion Stiffness Distribution on the Subjective Comfort Abstract: When body pressures are concentrated, sense of fatigue is increased. To confirm this, correlation analysis between the difference in stiffness of seat and comfort using multiple linear regression analysis has been conducted. For the selected three types of seats which are small-, mid-, and large-size seats, respectively, static tests were con-ducted to measure the distribution of the subject's body pressure on the cushion, through which local stiffness distribution were derived. Also, a subjective comfort evaluation was conducted, and analyzed. According to the present analysis results, the correlation coefficients between stiff-ness of hip area and comfort of hip area were observed to be 0.713 and 0.789, respectively, indicating a strong positive correlation. Thus, the comfort of seat perceived by the driver could be seen to have the largest linear correlation with the stiffness of hip area. Selection of variables for the multiple linear regression analysis was implemented by a backward removal method. Differences of stiffness by areas were selected as independent variables, and subjective comfort evaluation results were selected as dependent variables. According to multiple regression analysis, the comfort of the cushion increased when the left and right balance of the stiffness distribution was maintained even if the body pressure distribution of the hip area was concentrated on one side. According to the analysis results, the stiffness of hip area could be seen to have the greatest linear relationship with the overall satisfaction 64. of comfort, in which comfort is planned to be confirmed by actual production of seats.

336-341 Keyword: Comfort, Correlation analysis, Seat, Static Characteristics, Subjective evaluation, Multiple linear regression

References: 1. Jun YD, Cho Evan, Park SH. Comfort Evaluation of a Coccyx Seating Mat Based on Body Pressure Measurements: International Information Institute (Tokyo). Iss. 5B, 3657-3666, May 2017. 2. Kim SY, An JR, Kim KS. A Study on the Stiffness Characteristics according to the Body Pressure on the Seat Cushion for Vehicle: Indian Journal of Science and Technology. December 2016. DOI: http://dx.doi.org/10.17485/ijst%2F2016%2Fv9i46%2F107186 3. Jun YD, Park BH, Seo KS, Kim TH, Chae MJ. Objective Evaluation of Hold Feeling for Passenger Car Seats: SAE 2015 Noise and Vibration Conference and Exhibition. SAE Technical Paper 2015-01-2271, 2015. DOI : https://doi.org/10.4271/2015-01- 2271 4. Kim KS, Lim TY. A Study on Flow Characteristics as a Function of Fan Shape of Agitators for Foaming of Seat Pad: American Scientific Publishers. Advanced Science Letters. Number 11, November 2016, pp. 3400-3403(4). DOI: https://doi.org/10.1166/asl.2016.7939 5. Lee JB, Ahn JR , Choi DS, Kim KS. A Study on Automotive Seat Cushions having Multi-hardness Distribution for the Elderly: Indian Journal of Science and Technology. November 2016. DOI: http://dx.doi.org/10.17485/ijst%2F2016%2Fv9i43%2F105006 6. M. Grujicic, B. Pandurangan, G. Arakere, W.C. Bell, T. He, X. Xie. Seat-cushion and soft-tissue material modeling and a finite element investigation of the seating comfort for passenger-vehicle occupants: Materials & Design. Pages 4273-4285, 2009. DOI: https://doi.org/10.1016/j.matdes.2009.04.028. 7. Kazushige Ebe, Michael J. Griffin. Factors affecting static seat cushion comfort: ERGONOMICS. vol. 44, NO. 10, 901-921, 2001. DOI: https://doi.org/10.1080/00140130110064685 8. C. Tang, W. Chan, C. Tsui, Finite Element Analysis of Contact Pressures between Seat Cushion and Human Buttock-Thigh Tissue: Engineering. Vol. 2, No. 9, 2010, pp. 720-726. DOI: 10.4236/eng.2010.29093. 9. SAE J2896_201201 Motor vehicle seat comfort performance measures. SAE J2896; 2012. p. 1–35. 10. M Kolich, SM . Ergonomics modelling and evaluation of automobile seat comfort: Ergonomics. Pages 841-863, 2004. DOI: https://doi.org/10.1080/0014013042000193273 11. M. Kolich, P.L. White. Reliability and validity of a long term survey for automobile seat comfort: International Journal of Vehicle Design. February 2004. DOI: https://doi.org/10.1504/IJVD.2004.003899 12. Baba Md. Deros, Dian Darina Indah Daruis, Mohd Jailani Mohd Nor. Evaluation of Car Seat Using Reliable and Valid Authors: Byeongtae Ahn

Paper Title: Construction of System to Support Intelligent Coffee Shop using IoT Abstract: Recently, the development of smart devices linked to the network and the diffusion of the Internet have increased the user convenience. This system maximizes the efficiency by combining the uncomfortable points in the existing cafe with the internet technology. In particular, smartphone orders can be ordered including kiosk orders, and beacon-based users can be automatically recognized. And we have developed a system that enables users to create customized orders by grasping user location information using geofences. Finally, this paper also provides weather, temperature, time and user-based recommendation services based on Big Data. In particular, it supports intelligent decision making system through big data analysis. Therefore, Real-time reservations and orders using smart phones are supported from outside. In this paper, a Smart Café system is constructed with smart devices and Internet devices being shared and cooperatively controlled, thereby reducing labor costs and enhancing user convenience.

Keyword: IoT, Smart Device, Beacon, Kiosk, Geofence, Big Data

References: 65. 1. Agah Tugrul Korucu, Ayse Alkan. Procedia-Social and Behavioral Sciences. 2017 jun;15:1925-1930.(Differences between m- learning (mobile learning) and e-learning, basic terminology and usage of m-learning in education) 2. Leonardo A. Amaral, Fabiano P. Hessel, Eduardo A. Bezerra, Jerônimo C. Corrêa, Oliver B. Longhi, Thiago F. O. Dias. Journal of Network and Computer Applications. 2017 May;34(3):972- 979(eCloudRFID - A mobile software framework architecture for 342-346 pervasive RFID-based applications) 3. Tsung-Han Chang, Shu-Chen Hsu, Tien-Chin Wang. Applied Mathematical Modeling. 2016 Mar;37(5):2605-2622(A proposed model for measuring the aggregative risk degree of implementing an RFID digital campus system with the consistent fuzzy preference relations) 4. Chih-Ming Chen. Expert Systems with Applications. 2010 Sep;37(9):6651-6662. (Intelligent location-based mobile news service system with automatic news summarization) 5. Agah Tugrul Korucu, Ayse Alkan. Procedia-Social and Behavioral Sciences. 2011 Dec;15:1925-1930.(Differences between m- learning (mobile learning) and e-learning, basic terminology and usage of m-learning in education) 6. M. C. Chan, Y. Ding, K. H. Chai. Management of Innovation and Technology. 2008 Sep; 934-939. (The collective effects of product and service quality on customer satisfaction-An empirical study on iPod and iTunes) 7. Sasan adibi. Telematics and Informatics. 2017 Nov;27(4): 377-393. (A remote interactive non-repudiation multimedia-based m- learning system) 8. H. S. Lee, S. H. Lee. Journal of digital Convergence. 2017 May;14(5):1-10(Impact on Internalization of Management Strategy in Public Organization) 9. D. S. Lee. Journal of the Korea Convergence Society. 2017 Feb;8(2):15-20. (Design of Compact Data Integration and Convergence Device Using Esp8266 Module) 10. J. C. Lee. Journal of the Korea convergence Society. 2017 Feb;8(2):27-33. (A Classification Algorithm using Extended Representation) 11. J. Kim. Journal of Korean Institute of Information Technology. 2015 Oct;13(10):31-36. (Computer Vision Based Lamp Control System by using Raspberry-Pi) Authors: Ho Namgung, Kwang-Il Kim, Keon Myung Lee Algorithm Design of Navigation Intention Message Transmission for Collision Avoidance of Paper Title: Maritime Autonomous Surface Vehicle Abstract: For safe navigation of ship at sea, it is essential to provide navigation intention message to target ship for collision avoidance. Therefore it must be considered for the MASS to transmit navigation intention message to the target ship after making a decision of method for collision avoidance in the encountering situation. This paper presents an algorithm of navigation intention message transmission through the MASS, which is able to evaluate the risk of collision and apply international regulations for collision avoidance. The Fuzzy inference system is used to assess the risk of collision. In case that the risk of collision exceeds the pre- 66. designated threshold, the navigation intention message is transmitted from the MASS to the target ship. Before the collision situation occurs, the target ship is possible to be aware of the navigation intention from the MASS. 347-351 Proposed the algorithm contributes to providing systematic information exchange between the MASS and the target ship.

Keyword: Maritime Autonomous Surface Ship (MASS), Fuzzy Inference System (FIS), Collision Risk (CR), Navigation Intention Message

References: 1. Ørnulf Jan Rødseth, Åsmund Tjora, and Pål Baltzersen, MUNIN Deliverable D4.5: Architecture specification, available at http://www.unmanned-ship.org, MRTK, MUNIN-FP7 GA-No.314286, Aug. 2013. 2. Smith, IMO MSC, “The IMO regulatory framework and its application to Marine Autonomous Systems,” MSC 95/INF.20, Apr. 2015. 3. European Defence Agency Research and Technology, Best Practice Guide for Unmanned Maritime Systems Handling, Operations, Design and Regulations, SARUMS 2015, July 2015. 4. ITU-R, "Working document toward a preliminary draft new report ITU-R M.[MAR-UMS]," WP5B13-53-R1, Sept. 2015. 5. IMO MSC, “Maritime Autonomous Surface Ships Proposal for a regulatory scoping exercise,” MSC 98/20/2, Feb. 2017. 6. Jacoby Larson, Michael Bruch, and John Ebken. Autonomous navigation and obstacle avoidance for unmanned surface vehicles. Technical report, SPACE AND NAVALWARFARE SYSTEMS CENTER SAN DIEGO CA, 2006. 7. Giuseppe Casalino, Alessio Turetta, and Enrico Simetti. A three-layered architecture for real time path planning and obstacle avoidance for surveillance usvs operating in harbour fields. In Oceans 2009-Europe, pages 1–8. IEEE, 2009. 8. Sable Campbell, Wasif Naeem, and George W Irwin. A review on improving the autonomy of unmanned surface vehicles through intelligent collision avoidance manoeuvres. Annual Reviews in Control, 36(2):267–283, 2012. 9. Jongho Shin, Dong Jun Kwak, and Young-il Lee. Adaptive path following control for an unmanned surface vessel using an identified dynamic model. IEEE/ASME Transactions on Mechatronics, 2017. 10. Zbigniew, P. “Decision making in autonomous shipping – challenges,” Autonomous Ship technology Symposium, June, 2018. 11. NK Class, Guidelines for Concept Design of Automated Operation/Autonomous Operation of ships (Provisional Version), May, 2018. 12. Kim, K.I.; Lee, K.M. Ship Encounter Risk Evaluation for Coastal Areas with Holistic Maritime Traffic Data Analysis, Adv. Sci. Lett. 2017, 23, 9565–9569. 13. Kim, K. I.; Jeong, J. S.; Lee, B. G. Study on the analysis of near-miss ship collisions using logistic regression. Journal of advanced computational intelligence and intelligent informatics 2017, 21 (3), 467-473. 14. Hasegawa, K. et al.(1989), “Ship Auto-navigation Fuzzy Expert System (SAFES)," Journal of the Society of Naval Architecture of Japan, Vol.166. 15. Hasegawa K. “Automatic Collision Avoidance System for Ships using Fuzzy Control”, In: Proceedings of the 8th Ship Control System Symposium. 1987. 16. Lee HJ, Rhee KP. “Development of collision avoidance system by using expert system and search algorithm,” International Shipbuilding Progress 2001;48(3):197–212. 17. IMO. Convention on the international regulations for preventing collisions at sea, 1972. 18. Y.S, Lee, J.M. Park, and Y.J. Lee, “A Study on the Initial Action of Navigators to Avoid Risk of Collision at Sea,” Journal of Korean Navigation and Port Research, Vol.38, No.4, 2014. Available from: http://www.glonav.org/journal/article.php?code=13061Cockcroft, A. N. and Lameijer, J. N. F., A Guide to the Collision Avoidance 19. Rules, 6th edition, Elsevier, 2001. Authors: Jin-wan Park, Keon Myung Lee, Kwang-il Kim Automatic Identification System based Fishing Trajectory Data Preprocessing Method using Map Paper Title: Reduce Abstract: Many countries use vessel monitoring system (VMS) data to monitor their fishery activities. However, VMS data is limited in terms of distinguishing operations involving illegal fishing gear. Recently introduced automatic identification system (AIS) data is advantageous for tracking fishing ship behaviors.AIS data include various types of information about a ship, such as its state of navigation and its broadcast rate on the radio channel. We interpolate AIS trajectory data with a regular time interval and extract the ship velocity and course change data for fishing ship gear classification. To simplify and condense the data, the course change index (CCI) and ship speed index (SSI) are applied to the ship velocity and course data. The proposed mapper combines CCIs and SSIs into key words, while the proposed reducer collects fishing ship gear type values that are of the same key.By using the proposed key-value dataset from the MapReduce procedure, we can classify fishing gear type. We evaluated the performance of the proposed model by using a test dataset. The results showed that the proposed model achieved 76.2% accuracy in the classification of fishing ship trajectories against the test dataset.

Keyword: Automatic Identification System, Course Change Index, Fishing Activity, Fishing Gear Classification, MapReduce, Vessel Monitoring System

67. References: 1. B. Fagan,Fish on Friday: feasting, fasting, and the discovery of the New World, Basic Books, 2008. 352- 2. K. Cochrane, C. Young, D. Soto, T. Bahri,“Climate change implications for fisheries and aquaculture,”FAO Fisheries and aquaculture technical paper 530, 2009. 356 3. S. R. Yoo,J. Y. Jeong, J. C. Jeong, “A Study on Spatiotemporal Distribution of Offshore Trap for the Maritime Safety”Ocean Policy Research, vol.32, no.1, 2017, pp.143-161. 4. R. Deng, C. Dichmont, D. Milton, M. Haywood, D. Vance, N. Hall,D. Die, “Can vessel monitoring system data also be used to study trawling intensity and population depletion? The example of Australia’s northern prawn fishery.”Canadian Journal of Fisheries and Aquatic Sciences., vol.62, no.3, 2005, pp.611-622.https://doi.org/10.1139/f04-219 5. C. M. Mills, S. E. Townsend, S. Jennings, P. D. Eastwood, C. A. Houghton. “Estimating high resolution trawl fishing effort from satellite-based vessel monitoring system data.” ICES Journal of Marine Science.,64(2), 248-255, 2007. 6. M. I. Marzuki,“VMS data analyses and modeling for the monitoring and surveillance of Indonesian fisheries”, Doctoral dissertation, Ecolenationalesupérieure Mines-TélécomAtlantique, 2007. 7. M. I. Marzuki, P. Gaspar, R. Garello, V. Kerbaol, R. Fablet,“Fishing Gear Identification From Vessel-Monitoring-System-Based Fishing Vessel Trajectories.”IEEE Journal of Oceanic Engineering,vol.43, no.3,2018, pp. 689-699. 8. G. J. Piet, F. J. Quirijns, L. Robinson, S. P. R. Greenstreet,“Potential pressure indicators for fishing, and their data requirements.” ICES Journal of Marine Science.,vol. 64, no.1, 2007, pp.110–121. 9. J. S. Kim,“Vessel Target Prediction Method and Dead Reckoning Position Based on SVR Seaway Model.”International Journal of Fuzzy Logic and Intelligent Systems.,vol.17, no.4, 2017, pp.279-288. 10. K. I. Kim, K. M. Lee, “Dynamic Programming-Based Vessel Speed Adjustment for Energy Saving and Emission Reduction.”Energies., vol.11, no.5, 1273, 2018. 11. International Maritime Organization (IMO),Guidelines for the Onboard Operational Use of Shipborne Automatic Identification Systems (AIS), 2002. 12. K. I. Kim, K. M. Lee, “Deep learning-based caution area traffic prediction with automatic identification system sensor data.”Sensors.,vol.18, no.9: 3172, 2018. 13. J. Dean, S. Ghemawat. “MapReduce: simplified data processing on large clusters.”, Communications of the ACM.,vol.51, no.1, 2008, pp.107-113. Authors: Boney A. Labinghisa, Dong Myung Lee

Paper Title: Implementation of Hybrid Indoor Positioning System based on Wi-Fi and PDR in Smartphone Abstract: This paper proposed thehybridindoor positioning system in smartphone for positioning accuracy by fusion of wireless-fidelity (Wi-Fi) signals and inertial sensors from pedestrian dead reckoning (PDR) in smartphone. The proposed system uses Wi-Fi as the source of received signal strength indicator (RSSI) for fingerprint and smartphones sensor data from PDR. RSSI signals are used to determine the initial position and reduce error accumulation of PDR while smartphone sensor data are used to estimate user trajectory. Extended Kalman Filter (EKF) is the fusion algorithm used for its similarity with Kalman Filter (KF) but with advantages of processing non-linear progressions. An estimated 49 steps were detected which is identical to the 50 steps taken in the experiment while showing a trajectory similar to the actual route taken by the mobile user. A benefit of using built-in smartphone sensors is its cost-effectiveness and availability that does not require additional hardware. In addition, a nonlinear EKF is used to enhance the positioning accuracy in the proposed system. Further studies will be made in the potential of indoor positioning algorithm including the effect of noise interference on sensors and RSSI and the accumulated errors resulting from walking.

Keyword: Extended Kalman Filter, Fingerprinting, Indoor Positioning, PDR, Smartphone Sensors,Wi-Fi, RSSI

References: 1. ZA. Deng, G. Wang, D. Qin, Z. Na, Y. Cui, J. Chen, “Continuous Indoor Positioning Fusing WiFi, Smartphone Sensors and Landmarks,” Sensors, 16(9), pp.1427, Sep. 2016.DOI: 10.3390/s16091427. 2. ZA. Deng, Y. Hu, J. Yu, Z. Na, “Extended Kalman filter for real time indoor localization by fusing WiFi and smartphone inertial sensors,” Micromachines, 6(4), pp.523-543, 2015. doi:10.3390/mi6040523. 3. Ling-Feng Shi. et al., “A Fusion Algorithm of Indoor Positioning Based on PDR and RSS Fingerprint,” IEEE Sensors Journal, vol.18, Issue23, pp.9691-9698, 2018. DOI: 10.1109/JSEN.2018.2873052. 4. Li. Zengke, Liu. Chunyan, Gao. Jingxiang, Li. Xin, “An Improved WiFi/PDR Integrated System Using an Adaptive and Robust 68. Filter for Indoor Localization,” Int. J. Geo-Information, 5(12):224, pp.224-231, 2016. DOI: 10.3390/ijgi5120224. 5. Axel Barrau, “Non-linear state error based extended Kalman filters with applications to navigation,” Doctoral dissertation, Mines Paristech, Dec. 2015. 6. P. Bahl and V. Padmanabhan, “RADAR: an in-building RF-based user location and tracking system,” in Proc. INFOCOM’00: 357-361 Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Tel Aviv, Israel, vol.2, pp.775–784, 2000. DOI: 10.1109/INFCOM.2000.832252. 7. S. Sen et al., “Precise Indoor Localization Using PHY Layer Information,” Proc. 10th ACM Workshop. Hot Topics in Networks, Article no.18, Nov. 2011. DOI: 10.1145/2070562.2070580. 8. M.H. Afzal, V. Renaudin,G. Lachapelle,“Assessment of indoor magnetic field anomalies using multiple magnetometers,” In Proceedings of the 23rd International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS 2010), Portland, OR, USA, pp.21–24,Jan. 2010. 9. Y. Kim,Y. Chon,H. Cha,“Smartphone-based collaborative and autonomous radio fingerprinting,” IEEE Trans. Syst. Man and Cybern. C Appl. Rev.,vol.42, Issue 1, pp.112–122, Dec. 2010. DOI: 10.1109/TSMCC.2010.2093516. 10. H. Wang,S. Sen, A. Elgohary,M. Farid,M. Youssef,R. R. Choudhury,“No need to war-drive: unsupervised indoor localization,” In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys’12), Low Wood Bay, Lake District, UK, pp.197–210, Jun. 2012. DOI: 0.1145/2307636.2307655. 11. LH. Chen, EH. Wu, MH. Jin, GH. Chen,“Intelligent fusion of Wi-Fi and inertial sensor-based positioning systems for indoor pedestrian navigation,”IEEE Sensors Journal, vol.14, Issue 11, pp.4034-4042, Nov. 2014. DOI: 10.1109/JSEN.2014.2330573. 12. Z. Tian, Y. Jin, M. Zhou, Z. Wu, Z. Li,“Wi-Fi/MARG integration for indoor pedestrian localization,” Sensors, 16(12), Dec. 2016. DOI: 10.3390/s16122100. 13. Boney A. Labinghisa and Dong Myung Lee, “Hybrid Indoor Positioning System using Wi-Fi and PDR in Smartphone,” Proceedings of 2019 International Research Conference on Innovation, Technology and Sustainability (IRCITS). vol.6, no.1, pp.508-509, Jan. 2019. 14. SJ. Julier and JK. Uhlmann, “New extension of the Kalman filter to nonlinear systems,” In Signal processing, sensor fusion, and target recognition, International Society for Optics and Photonics. pp.182-194, Jul. 1997. https://doi.org/10.1117/12.280797. 15. Eric A. Wan and Rudolph Van Der Merwe, “The unscented Kalman filter for nonlinear estimation,” In Proceedings of the IEEE 2000 Adaptive Systems for Signal Processing, Communications, and Control Symposium, pp.153–158, Oct. 2000. DOI: 10.1109/ASSPCC.2000.882463. 16. Tim Bailey, Juan Nieto, Jose Guivant, Michael Stevens, and Eduardo Nebot,“Consistency of the ekf-slam algorithm,” 2006 EEE/RSJ International Conference on Intelligent Robots and Systems, pp.3562–3568, Oct. 2006. DOI: 10.1109/IROS.2006.281644. 17. Olivier Cappé, Simon J Godsill, and Eric Moulines, “An overview of existing methods and recent advances in sequential monte carlo,” Proceedings of the IEEE, vol.95, Issue 5, pp.899–924, Jul. 2007. DOI: 10.1109/JPROC.2007.893250. 18. A. Sakai, D. Ingram, J. Dinius, K. Chawla, A. Raffin, A. Paques, “PythonRobotics: a Python code collection of robotics algorithms,”Sep. 2018. Authors: Dong-Heui Choi

Paper Title: Impact of Internet of Things (IoT)’s Service Quality on the Hotel Customer Satisfaction Abstract: The objective of this study is to use service based on Internet of Things identifying whether service 69. quality based on Internet of Things perceived by customers significantly influence on customer satisfaction and provide implications on them. For this, survey was used to collect data for practical analysis. Survey was conducted for 47 days from September 3 to October 19, 2018. Total 250 copies were distributed, and 238 of 362-366 them were collected. Among them, after excluding 22 copies with imperfect responses, 216 copies were used for practical analysis. It affects customer satisfaction in the order of firmness, reliability, empathy, usability, and responsiveness. At the same time, the confidence in the system of Internet of Things and the question of the system were the most important factors in the satisfaction of the hotel staff. This was how this study was differentiated from other researches dealing with customer satisfaction in the field of hotel. This was because it was necessary to accurately resolve the unfamiliarity and maladjustment of customers' Internet-based services as they are still in the beginning phase as they are able to understand customers by accurately communicating information about services based on the Internet. Efforts shall also be made by employees to accurately notifying the results from inquiries.

Keyword: Internet of Things (IoT), Service Quality, Customer Satisfaction

References: 1. J. H. Lee, S. H. Cho, “Study of Relation Between Consumers’ Advertisement Attitude and Need for Cognition for IoT- Implemented Advertisement” Journal of Digital Contents Society. 16(1), 165-172, 2015. https://doi.org/10.9728/dcs.2015.16.1.165. 2. D. Wang, S. Park, D. R. Fesenmaier, “The role of smart phones in mediating the touristic experience” Journal of Travel Research. 51(4), 371–387. 2013. https://doi.org/10.1177/0047287511426341. 3. D. H. Sin, J. Y. Jeong, S. H. Kang, “Internet of Things Trends and prospects” Korea Society for Internet Information. 14(2), 32- 46. 2012. http://210.101.116.16/kiss61/download_viewer.asp 4. C. E. Parck, “A Study on effects of distribution changes on Internet of Things” Korea Logistics Review. 24(3), 151-174. 2014. http://scholar.dkyobobook.co.kr.eproxy.sejong.ac.kr/searchDownload.laf?barcode=4010023843076&artId=10121105&gb=pdf&r ePdf=pdf 5. W. S. Jeong, S. H. Kim, K. S. Min, “An Analysis of the Economic Effects for the IoT Industry” Journal of Internet Computing and Services. 15(5), 119-128. 2013. https://doi.org/10.7472/jksii.2013.14.10.119. 6. H. Y. Cha, D. S. You, “Study on the audience effect of advertisements of IoT products across different levels of sensory innovativeness” Journal of Digital Convergence. 16(5), 145-152. 2018. https://doi.org/10.14400/JDC.2018.16.5.145. 7. M. K. Jung, S. Y Kwon, “A Study on Internet of Things based on Semantic for Library” Journal of Korean Library and Information Science Society. 45(2), 235-260. 2014. https://liss.jams.or.kr/po/volisse/sjPubsArtiPopView.kci?soceId=INS000000015&artiId=SJ0000001043&sereId=SER000000001 &submCnt=1 8. W. H. Kim, “Research on the Satisfaction degree with Tourism Informations for Smartphone users and revisitation intention : Forcusing on the tourist attractions in Gangneung” Journal of Hotel & Resort. 13(3), 411-433. 2014. http://www.earticle.net.ssl.eproxy.sejong.ac.kr/Article/A244331 9. S. J. Han, “The Effects of Self-Efficacy, Satisfaction and Reuse Intention on Adoption of Internet of Things - Based on Culture Tourism Information Service Users' Evaluation” Journal of Hotel & Resort. 15(1), 91-112. 2019. http://www.earticle.net.ssl.eproxy.sejong.ac.kr/Article/A263542 10. V. A. Zeithaml, A. Parasuraman, A. Malhotra, “Service quality delivery through web sites: A critical review of extant knowledge” Academy of Marketing Science Journal. 30(4), 362-375. 2002. https://link.springer.com/article/10.1177/009207002236911 11. N. Kano, “Service Quality (Servqual) and its Effect on Customer Satisfaction in Retailing Introduction -Measures of Service Quality” European Journal of Social Sciences. 16(2), 239-251. 2010. https://www.researchgate.net/publication/267989820_Service_Quality_Servqual_and_its_Effect_on_Customer_Satisfaction_in_ Retailing_Introduction_-Measures_of_Service_Quality. 12. N. Tsang, H. L. Qu, “Service quality in China’s hotel industry: A perspective from tourists and hotel managers” International Journal of Contemporary Hospitality Management. 12(5), 316-326. 2000. https://doi.org/10.1108/09596110010339706. 13. J. Kandampully, D. Suhartanto, “Customer loyalty in the hotel industry: The role of customer satisfaction and image” International Journal of Contemporary Hospitality Management. 12(6), 346-351. 2000. https://doi.org/10.1108/09596110010342559. 14. H. Min, H. Min, “Benchmarking the quality of hotel services: managerial perspectives” International Journal of Quality & Reliability Management, 14(6), 582-597. 1997. https://doi.org/10.1108/02656719710186209 15. T. D. Juwaheer, D. L. Ross, “A study of hotel guest perceptions in Mauritius” International Journal of Contemporary Hospitality Management. 15(2), 105–115. 2003. https://doi.org/10.1108/09596110310462959 16. K. O. Huh, “Evaluation of consumer life by consumers' purchase behavior style” Korean Family Resource Management Association. 9(1), 95-111. 2005. http://www.earticle.net.ssl.eproxy.sejong.ac.kr/Article/A19160 17. H. L. Jo, M. K. Kim, “An Effect of Service Quality on Customer Satisfaction and Loyalty in the Case of Mid-Price Hotel: Application of Quality Classification Based on Kano Model” Korean Journal of Tourism Research. 32(6), 335-353. 2017. https://doi.org/10.21719/IJTMS.32.6.17 18. G. A. , C. Suprenant, “An investigation into determinants of customer satisfaction” Journal of Marketing Research. 19(4), 491-504. 1982. https://doi.org/10.1177/002224378201900410 19. R. A. Spreng, R. D. Mackoy, “An empirical examination of a model of perceived quality and satisfaction” Journal of Marketing. 72(2), 201-214. 1996. https://doi.org/10.1016/S0022-4359(96)90014-7 20. J. Bloemer, K. D. Ruyter, M. Wetzels, “Linking perceived service quality and service loyalty: a multi‐dimensional perspective” European Journal of Marketing. 33(11/12), 1082-1106. 1999. https://doi.org/10.1108/03090569910292285 Authors: Tae-Hwan Kim, Seung-Gyun Yoo How it effects the Influence of Customer Satisfaction and Customer Loyalty of Internet-based TV Paper Title: Home Shopping Service Quality Abstract: The purpose of this study is, to find out how it effects the consumers’ purchase satisfaction according to the quality of broadcasting service of TV home shopping and at the same time to understand whether the image of the home shopping channels that the customers have causes any control effect. To do this, a questionnaire was designed through a preliminary survey and based on the questionnaire, 440 samples were 70. extracted by conducting in the form of online survey with the help of a professional company. The extracted sample was verified the content validity and composition validity by analyzing the factor analysis and reliability analysis through SPSS. In addition, to test the hypotheses, a multiple regression analysis and a hierarchical 367-375 regression analysis were performed. It is necessary to plan a strategy to improve the image of the customers’ service sector through the provision of trust-based services in order to increase customer loyalty based on the achievement of the control variable of this paper, and in case the safety-related services is provided, an effective customer loyalty can be increased by establishing measures to enhance the customer's qualitative evaluation. In order to increase customer loyalty based on the results of the analysis of moderating variables in this study, a strategy to improve the customer’s image about the service sector through providing services focused on trust should be established, and in providing services related to safety, it is judged that effective promotion of customer loyalty will be achieved by establishing a plan to increase the customer’s qualitative evaluation.

Keyword: TV home shopping, Broadcasting sales service, Purchase satisfaction, Customer loyalty, Household items, Kitchen utensils

References: 1. R. C. Lewis, B. H. Booms, “The Marketing Aspects of Service Quality,” in L. Berry, G. Shostack∙G Upah(Eds.). Emerging Perspectives on Services Marketing. Chicago IL: American Marketing; 1983. 2. Christian Gronroos, “A Service Quality Model and Its Marketing Implications,” European Journal of Marketing, 18(4), 1984. 3. Parasuraman, V. A. Zeithaml, L. L. Berry, “SERVQUAL: A Multiple-Item Scale for Measuring Consumer Perception of Service Quality,” Journal of Retaining, 64(1), 12-40, 1988. 4. Parasuraman, V. A. Zeithaml, L. L. Berry, “A Conceptual Model of Service Quality and Its Implications for Future Research,” Journal of Marketing, 49(4), 41-50, 1985. 5. P. A. Dabholkar, D. Land Thorpe, J. O. Rentz, “A Measure of Service Quality for Retail Stores: Scale Development and Validation,” Journal of the Academy of Marketing Science, 24(1), 3-16, 1996. 6. J. F. Engel, R. D. Blackwell, Consumer Behavior, New York: Dryden Press, 1982. 7. Churchill Jr. Gilbert, Surprenant Carol, “An Investigation into the Determinants of Customer Satisfaction,” Special Issue on Causal Modeling. Journal of Marketing Research, 19(4), 491-504, 1982. 8. N. Kang, S. S. Moon, “A Study on Mediating Effect of Customer Satisfaction and Attitudinal Loyalty between the Brand Image and Behavioral loyalty in Coffee Shops: Focusing on Capital Area and Non-Capital Area,” The Korean Journal of Culinary Research, 20(1), 205-219, 2014. 9. J. B. Shim, “Influence of the Quality, Satisfaction and Brand Loyalty to Core Product on Purchasing Intention and Expected- Discounting Rates for Bundle Products: Focused on Telecommunications-Broadcasting Bundle,” Journal of the Korea Contents Association, 10(12), 243-253, 2010. 10. Y. D. Cho, “The Effects of Coffee Shop Choice Attributes on Customer Satisfaction and Customer Loyalty,” Tourism Study, 28(5), 305-323, 2013. 11. R. L. Oliver, “A Cognitive Model of the Antecedents and Consequences of Satisfaction Decisions,” Journal of Marketing Research, 46-49, 1980. Authors: Soo-Ho Choi, Jeong-Il Choi

Paper Title: The Volatility of Export Amount & the Number of Exports of Korea's Major Exporting Countries Abstract: The purpose of this study is to predict future directions and trends in the number of exports, export amount, the number of imports and import amount of major exporting countries in Korea. Major exporting countries selected China, the United States, Vietnam, Hong Kong, Japan and Taiwan as export orders. The data required for this study was collected from the trade statistics of the Korea Customs Service. The analysis period for major exporting countries is 225 months from January 2000 to September 2018, using monthly and annual data. Monthly data were model, index and numerical analysis using Excel, e-views and SPSS. In the growth rate analysis, Vietnam showed 780% the number of exports, 3,000% exports amount, 2,400% the number of imports and 6,200% imports amount. For the past 19 years, Vietnam has shown the highest growth rate compared to other countries. The correlation between the number of exports, export amount, the number of imports and import amount showed that the value of export amount and import amount was as high as 0.960. In the monthly regression analysis of exports, China, USA, Hong Kong, Japan and Taiwan were statistically significant at t- statistic and p-value (≤ 0.01) except for Vietnam. Analysis results, this study shows that Vietnam, Hong Kong and Taiwan have relatively higher growth and volatility than the US and Japan in the past export market. Southeast Asian markets including Vietnam, Hong Kong and Taiwan are emerging as new export markets. In addition, Korea needs more attention to Asian markets including India, Singapore, Thailand, Malaysia and Philippines. It is necessary to diversify the export market and the import market because the export amount and 71. the import amount are increasing in proportion to each other. This paper will help diversify Korea's major exporting and importing countries in the future. 376-381

Keyword: the number of Exports, Export Amount, the number of Imports, Import Amount, Volatility

References: 1. Choi M. S. China's Export to World and Korea's Export to China: ARDL Bound Testing Approach, Journal of international trade and insurance, 2017;18(1): 277-296. 2. Choi E. H. The Relationship between Korean Direct Investment and Exports to China: Focused on the Investment of Korean Firms to Shaanxi Province, The Northeast Asian Economic Journal, 2017; 29(3): 59-86. 3. Yoo G. H. A Study on the Logistics Strategy for Expansion Export of Cross Border Trade to China, The international commerce & law review, 2017; 74:81-103. 4. Kang S. G. An Analysis of Korea's Agricultural Product Competitiveness in China, E-trade review, 2016, 14(2): 151-173. 5. Kim W. J. The Effect of Korea's FDI to China on Korea's Exports to United States, The Northeast Asian Economic Journal, 2017, 29(4): 1-19. 6. Kim J. Y. Analyzing Export Competitiveness of Korea's Major Automobile Parts to U.S Market due to KORUS FTA, Journal of international trade & commerce, 2017;13(6): 371-384. 7. Cha K. S & Kim Y. S. The Effects of an Increase in the Federal Funds Rate on the Exports of Korean Manufacturing Industry, International Economic Journal, 2018, 22(4): 87-120. 8. Shim J. H. An Analysis of Comparative Advantage and Intra-Industry Trade in Korean Export Industry in Respect to Korea-U.S. FTA, Journal of International Commerce and Information, 2017; 19(4): 175-197. 9. Kim C. B. et al. The Effect of Foreign Direct Investment on Export Inducement and Trade Complementary in Vietnam Market, The e-business studies, 2017;18(6): 215-228. 10. Choi D. O. et al. Pattern Analysis of Korea's Exports to Vietnam by Sea and Air, The Korean international commerce review, 2015;30(4): 247-262. 11. Lee, J. H. (2012), Analysis of Determinants of Export Competitiveness in Vietnam Market of Korean Companies, Korea trade review, 37(4), 139-160. 12. Lee S. Y. & Lee J. G. Sustainable Supply Chain Management and Performance of Global Supply Chain: An Empirical Study on Vietnamese Export-oriented Suppliers, Korean journal of business administration, 2015; 28(2): 453-468. 13. Lee Y. H, Korean pig seems competitive: Hong Kong and Macao Consumers 70% "Purchasing", JoongAng Daily Economic General, 2018.03.20. https://news.joins.com/article /22457021 14. Jung B. N. Nonghyup Expands Pork Export to Hong Kong Market, Yunhap News, 2017.05.12. http://www.yonhapnews.co.kr/bulletin/2017/05/12/ 15. Ministry of Agriculture, Food and Rural Affairs. (2018), Domestic chicken, eggs, Hong Kong export resumed!!, MAFRA Press Releases, 2018.7.30. http://www.mafra.go.kr/mafra/293/subview.do?enc= 16. Oh T. H. A Study on the Changes in the Japanese Import Market and Korea's Exports to Japan: Focusing on the Cases Concerning Apparel Industry Creature, Korea-Japan Economic Journal, 2017;75: 189-210. 17. Kwon Y. U, Nam G. D. A Study on the Changes of the Competition Structure of the Japanese Electronics & Electrical Products Market and the Korean Enterprises' Strategies of Export to Japan, Journal of international trade & commerce, 2013;9(1): 71-99. 18. Kwon Y. U, Nam G. D. An Empirical Study on the Changes of the Competition Structure of the Japanese Market and the Korean Enterprises’ Strategies of Export to Japan, Journal of customs and trade, 2013;14(3): 207-225. UCI: http://uci.or.kr/G704- 001591.2013.14.3.010 19. Jung H. S & Im D. H. A Study on the Changes of Export Competitive Advantage Pattern of Global ICT Industry: Focusing on Korea, China and Japan, Korea-Japan Economic Journal, 2018; 79: 67-91. 20. Lim C. R. et al. Effect of the GAP Certification on Taiwanese Consumers' Preferences, Korean journal of agricultural management and policy, 2011; 38(2): 239-254. 21. Choi S. I. Best to produce the best pear: C. K. Lee, CEO, exporting pear to Taiwan, Palm & Market Magazine, 2017; 19: 32-33. http://www.farmnmarket.com/news/article.html?no=2787 22. Jung H. C. Kimchi export, As of September this year, it increased by 8.5%, and diversified markets such as USA and Taiwan increased exports: Kimchi Export Status and Tasks, Food Journal, 2016;232: 34-36. 23. KOMMA. Japan and the United States continued to decline and Taiwan increased exports, Machine Tool, 2016;288: 26-27. 24. Korea International Trade Association. Expected to expand IT products export to ITA II : Exports to China, ASEAN, and Taiwan are expected to expand to include optical and medical devices, KITA Press Releases, 2016.05.03. Authors: Taek-Won Kim, Tae-Hwan Kim The Spatial Agglomeration of Korean Logistics and Its Influence on the Growth of the Logistics Paper Title: Industry Abstract: This study is to identify the spatial concentrations of logistics businesses per region, to find out how this spatial variable affects the growth of the logistics industry and the regional economy, and based on the findings, to suggest political implications for the nation and local governments regarding the logistics industry. The implications of this study are as follows. First, despite the fact that the National Logistics Master Plan (2016-2025) was established at a national level to build and operate the logistics bases and networks and to strengthen the logistics clusters, there have been few studies on what effects the spatial concentration of logistics businesses has on production activities of the logistics industry. Considering the current situation, the results of this study will serve as a theoretical basis for supporting the policies on logistics clusters. As a result of estimation from a panel data model as in the logistics industry growth model (Model 1), the location quotient (LQ) and the concentration type dummy variables were found to be statistically significant, and the classification and concentration of logistics businesses according to their spatial characteristics was found to contribute to the growth of the logistics industry. 72. Keyword: Logistics Industry, Growth of Logistics Industry, Gross Regional Domestic Product 382-388 References: 1. M. Porter, “The Economic Performance of Regions” Regional Studies. 37(6-7), 549-578, 2010. 2. A. J. Scott, Regions and the World Economy: The Coming Shape of Global Production, Competition, and Political Order. Oxford: Oxford University Press, 1-159, 1998. 3. P. Krugman, “Increasing Returns and Economic Geography” Journal of Political Economy. 99(3), 483-499, 1991. 4. C. Baer, T. Brow, “Location Quotients: a Tool for Comparing Regional Industry Compositions” Indian’s Workforce and Economy. 7(3), 1-3, 2006. 5. JPMorgan Chase & Co. (2017) (https://www.jpmorganchase.com/corporate/Corporate-Responsibility/helping-metro-areas.htm). 6. Y. S. Roh, “Regional Economic Effect of Food Manufacturers: Spatial Concentration, Employment Growth, value-added,” Ph.D. Thesis, Seoul National University, 2015. 7. J. V. Henderson, A. Kuncoro, M. Turner, “Industrial development in cities” Journal of Political Economy. 103(5), 1067-1090, 1995. 8. U. Kambhampati, P. McCann, “Regional Performance and Characteristics of Indian Manufacturing Industry” Regional Studies. 41(3), 281-294, 2007. 9. H. Y. Lee, Economic Geography. Bobmunsa, 2011. 10. P. Miller, R. Botham, H. Gibson, R. Martin, B. Moore, Business Clusters in the UK–A First Assessment. Report for the Department of Trade and Industry by a Consortium Led by Trends Business Research, Great Britain, 2001. Authors: Youngseok Lee, Jungwon Cho

Paper Title: Toward Developing a Real-World Computational Thinking Test Tool from Existing Models Abstract: Various researches are always being carried out to measure the effectiveness of software education. 73. We analyzed previously developed computational thinking tools and studied their practical application and verification methods. Using this information, we developed a 20-item questionnaire to categorize the tools by the abilities they measured: analysis, design, implementation, and reasoning. We surveyed college freshman and 389-393 204 students in computer programming subjects in liberal arts and then conducted an exploratory factor analysis to analyze the validity and reliability of our questionnaire test tool. Our test showed that previously used computational testing tools lacked the ability to measure problem-solving processes based on computational thinking. To solve this problem, we revised the questionnaire items to consider the problem-solving process based on computational thinking and proposed a tool that can check the computational thinking through the material of real life using the students’ empirical knowledge. The statistical analysis was as follows: analysis ability (reliability α = .895); design ability (reliability α = .727); implementation ability (reliability α = .745), and reasoning ability (reliability α = .833). To measure computing errors, you need a testing tool that can address real-world problems. We aimed to develop a research tool for measuring computational thinking based on the case of applying and revising existing test tools.

Keyword: Computational Thinking, Testing Tools, Exploratory Factors Analysis, Software Education.

References: 1. Grover S, Pea R, “Computational thinking in K–12: A review of the state of the field” Educational researcher, 42(1), 38-43, 2013. https://doi.org/10.3102/0013189X12463051 2. Wing JM, “Computational thinking” Communications of the ACM, 49(3), 33-35, 2006. 3. Grover, Shuchi. “Systems of Assessments for deeper learning of computational thinking in K-12” In Proceedings of the 2015 annual meeting of the American educational research association (pp. 15-20), 2015. 4. Zhong B, Wang Q, Chen J, Li Y., “An exploration of three-dimensional integrated assessment for computational thinking” Journal of Educational Computing Research, 53(4), 562-590, 2016. http://dx.doi.org/10.1177/0735633115608444 5. Relkin E. “Assessing Young Children's Computational Thinking Abilities,” PhD Thesis, Tufts University, 2018. 6. Romero M, Lepage A, Lille B., “Computational thinking development through creative programming in higher education” International Journal of Educational Technology in Higher Education, 14(1), 42, 2017. https://doi.org/10.1186/s41239-017-0080z 7. González MR, “Computational thinking test: Design guidelines and content validation” In Proceedings of EDULEARN15 conference 2015 (pp. 2436-2444), 2015. 8. Brennan K, Resnick M., “New frameworks for studying and assessing the development of computational thinking” In Proceedings of the 2012 annual meeting of the American Educational Research Association, Vancouver, Canada 2012 Apr 13 (Vol. 1, p. 25), 2012. 9. Youngseok Lee, Jungwon Cho, “Factor Analysis of Computational Thinking for Software Education Based on Problem-Solving Learning” International Journal of Pure and Applied Mathematics, 120(6), 4953-4967, 2018. https://acadpubl.eu/hub/2018-120- 6/4/359.pdf 10. Kwon J, Kim J., “A Study on the Design and Effect of Computational Thinking and Software Education” Thinking, 2(3), 4, 2018. http://doi.org/10.3837/tiis.2018.08.028 11. Kim, J. A., & Ko, D. Y., “Survey of On-Line & Block Programming Language-Scratch: On Perspective of Educational Achievements” In Advances in Computer Science and Ubiquitous Computing (pp. 35-40). Springer, Singapore, 2017. https://doi.org/10.1007/978-981-10-7605-3_6 12. Czerkawski, B. C., & Lyman, E. W., “Exploring issues about computational thinking in higher education” TechTrends, 59(2), 57- 65, 2015. https://doi.org/10.1007/s11528-015-0840-3 13. Chen G, Shen J, Barth-Cohen L, Jiang S, Huang X, Eltoukhy M., “Assessing elementary students’ computational thinking in everyday reasoning and robotics programming” Computers & Education, 109, 162-175, 2017. https://doi.org/10.1016/j.compedu.2017.03.001 14. Kline RB, Principles and practice of structural equation modeling, Guilford publications, 2015. Authors: Seung-Yeob Yu Strategy for the Production of Smartphone Reward Applications Applying the Technology Paper Title: Acceptance Model Abstract: This study was conducted to propose a smartphone reward application production strategy. The covariance structure analysis was used for the hypothesis test of this study. The results of the hypothesis testing are as follows. First, the financial benefits and psychological satisfaction benefits of smartphone reward applications have a statistically significant influence on perceived ease-of-use. In contrast, information acquisition benefits had a significantly negative impact on perceived ease-of-use. Second, psychological satisfaction and extra time utilization benefit of smartphone reward application exert a significant effect on perceived usefulness. Third, the perceived ease-of-use of smartphone reward applications has a significant effect on perceived usefulness. Fourth, perceived usefulness of smartphone reward application has a significant effect on persistent intention to use. With the results of this study, we propose useful guidelines for making smartphone reward applications.

74. Keyword: Smartphone, Smartphone application Benefit factor, Technology Acceptance Model

References: 394-399 1. Han PK, Park JS, Jun BH, Kang MG., “A Study on the Factors of Mobile Applications Adoption” The Korea IT & Service Association, 9(3), 2010, pp. 65-82. 2. Jung BY., “Trends and Implications of Mobile Content and Application Change in Mobile Environment” Broadcasting communication policy, 22(18), 2010, pp. 37-64. 3. Davis FD., “Perceived usefulness, perceived ease of use, and user acceptance of information technology” MIS quarterly. Sep(1), 1989, pp. 319-40. https://www.jstor.org/stable/249008 4. Fishbein M, Ajzen I., Belief, attitude, intention, and behavior: An introduction to theory and research, 1997. 5. Roser MC., Enabling drug adherence through closed loop monitoring & communication. United States patent application US 11/698,642. 2007 Jul 26. Fiske ST, Taylor SE. Social cognition. Mcgraw-Hill Book Company; 1991. 6. Carlos Martins Rodrigues Pinho J, Soares AM., “Examining the technology acceptance model in the adoption of social networks” Journal of Research in Interactive Marketing, Jun(7), 2011, pp. 116-129. https://doi.org/10.1108/17505931111187767 7. Featherman MS, Pavlou PA., “Predicting e-services adoption: a perceived risk facets perspective” International journal of human- computer studies, 59(4), 2003, pp. 451-474. https://doi.org/10.1016/s1071-5819(03)00111-3 8. Kamarulzaman Y., “Adoption of travel e-shopping in the UK. International” Journal of Retail & Distribution Management, 35(9), 2007, pp. 703-719. https://doi.org/10.1108/09590550710773255 9. Cheong JH, Park MC, “Mobile internet acceptance in Korea” Internet research, 15(2), 2005, pp. 125-140. 10. Hong S, Thong JY., Tam KY., “Understanding continued information technology usage behavior: A comparison of three models in the context of mobile internet” Decision support systems, 42(3), 2006, pp. 1819-1834. https://doi.org/10.1016/j.dss.2006.03.009 11. Lu J, Yao JE, Yu CS., “Personal innovativeness, social influences and adoption of wireless Internet services via mobile technology” The Journal of Strategic Information Systems, 14(3), 2005, pp. 245-268. https://doi.org/10.1016/j.jsis.2005.07.003 12. Nysveen H, Pedersen PE, Thorbjørnsen H.,” Intentions to use mobile services: Antecedents and cross-service comparisons” Journal of the academy of marketing science, 33(3), 2005, pp. 330-346. https://doi.org/10.1177/0092070305276149 13. Verkasalo H, López-Nicolás C, Molina-Castillo FJ, Bouwman H., “ Analysis of users and non-users of smartphone applications” Telematics and Informatics, 27(3), 2010, pp. 242-255. https://doi.org/10.1016/j.tele.2009.11.001 14. Kim SY, Lee SH, Hyung HS., “A Study of the Factors Affecting Adoption of a Smartphone” Entrue Journal of Information, 10(1), 2011, pp. 29-39. 15. Kim SG., “Influences of user environments and intrinsic features of smart phone on the perceived usability and receptivity,” Ph.D Thesis, University of HongIk, 2009. 16. Park IG, Shin DH., “Using the Uses and Gratifications Theory to Understand the Usage and the Gratifications of Smartphone” The Korea Regional Communication Research Association, 10(4), 2010, pp. 192-225. 17. Wu JH, Wang SC., “What drives mobile commerce?: An empirical evaluation of the revised technology acceptance model” Information & management, 42(5), 2005, pp. 719-729. 18. Wu JH, Wang SC, Lin LM., “Mobile computing acceptance factors in the healthcare industry: A structural equation model” International journal of medical informatics, 76(1), 2007, pp. 66-77. https://doi.org/10.1016/j.ijmedinf.2006.06.006 19. Youm DS, Yu SY., “A Casual Structure Analysis of Intention for Continuous Use of Smart Phone Reward Application based on Technology Acceptance Model(TAM)” International Journal of Advancement in Computing Technology, 5(13), 2013, pp. 323- 329. 20. Yu SY, Kim JH., “Use of motivations, benefits and loss factors effect on recommendation of reward application” Korean Journal of Consumer and Advertising Psychology,15(2), 2014, pp. 279-306. https://doi.org/10.21074/kjlcap.2014.15.2.279 Authors: Seong-Hoon Lee, Hyun-Soo Jin

Paper Title: Smart Technology and Industry Trends in Fourth Industrial Revolution Abstract: In this paper, we have been studying the technology trends closely approaching us and the smart machine, which is a representative example of the forth industrial revolution. The key content in technology trends is artificial intelligence. Artificial intelligence technology is being used as a core technology of the 4th industrial revolution. In autonomous vehicles, which are representative industries, artificial intelligence-based unmanned vehicles are emerging, and on the other side, and various voice recognition based products are emerging. In this paper, we have studied the latest technical factors of autonomous automobile and speech recognition based industry, which is a representative industry of the 4th industrial revolution.

Keyword: Smart machine, Machine intelligence, IoT, Fourth revolution.

References: 75. 1. D. H. Kim, Smart Technology, LG CNS, 2010. 2. H. S. Lee, Possibility of Future Industry, Smart Technology, LG CNS, 2010. 3. H. B. Jang, Current Status and Prospect of Smart Technology, LG CNS, 2011. 400-404 4. Gartner, The Top Ten Strategic technology Trends in 2017, 2016. Available from: https://www.gartner.com/doc/3471559/top-- strategic-technology-trends. 5. Gartner, The Top Ten Strategic technology Trends in 2018, 2017. Available from: https://www.gartner.com/smarterwithgartner/gartner-top-10-strategic-technology-trends-for-2018 6. M. Andrew, Automotive Industry Trends: IoT Connected Smart Cars & Vehicles, UK Business Insider, 2017. 7. Auto Connected Car News, Definition of Connected Car-What is the Connected Car? Defined, AUTO Connected Car, 2014. Available from: http://www.autoconnectedcar.cpm/definition-of-connected-car-what-is-the-connected-car-defined/ 8. S. E. Baeck, “The Outlook of Software at the era of Autonomous Driving”, Entrue Journal of Information Technology, 16(1), 7- 33, 2017. 9. V. Zwas, Speech Recognition Technology, Encyclopedia Britannica Online, Britannica.com, 2016. Available from: https://www.britannica.com/technollogy/speech-recognition 10. G. Chaim, Apple announces HomePod Speaker to take on Sonos, The Verge, 2017. 11. M. B. Hoy, Alexa, Siri, Cortana, and More: An Introduction to Voice Assistants, Medical Reference Services Quarterly, 37(1), 81-88, 2017. https://doi.org/10.1080/02763869.2018.1404391 12. B. Eileen, Google Home vs Amazon Alexa: Which one is Smarter?, 2017. Available from: https://www.zdnet.com/article/google- home-versus-amazon-alexa-which-one-is-smarter/. Authors: Yujin Jung, Won-chi Jung, Sangik Oh, Donghyeok Lee, Namje Park

Paper Title: AES-GCTR Mode-based Efficient Hybrid Encryption Scheme in Cloud-CCTV Service Environment Abstract: In the environment of Cloud-CCTV surveillance, encryption of images for the protection of privacy is essential. Yet, the existing encryption method has overhead regarding the management of mass data and streaming processing. As encrypted vectors are created and applied in a bucket unit in the proposed method, it has more efficient performance in the process of encryption and decoding compared to AES-CTR mode, and it 76. makes an analysis attack difficult according to the randomness of a bucket size. In this paper, AES-GCTR mode that has improved the existing AES-CTR operation mode was suggested. In this process, encryption of CCTV image data is required. Yet, overhead of encryption itself exists in quality, so an efficient encryption method 405-408 proper for mass data is necessary. The proposed method can make encryption and decoding performance more efficient, and is expected to be easily applied to the image surveillance system based on CCTVs that demands high capacity processing and real-time streaming.

Keyword: CCTV, Encryption, Surveillance, CTR Mode, Advanced Encryption Standard

References: 1. H. Hacigümüş, B. R. Iyer, C. Li, and S. Mehrotra, “Executing SQL over encrypted data in the databaseservice-provider model”, In Proc. ACM SIGMOD Conf. June 2002. DOI : 10.1145/564691.564717 2. Youjin Song, Donghyeok Lee, and et al. "Design of Fast Encryption/Decryption Mechanism for Query in DAS(Database As a Service) Model", Proceedings of the 28th Korea Information Processing Society Fall Conference, 14(2), 3. S. Aramvith, S. Pumrin, T. Chalidabhongse, and S.Siddhichai, "Video Processing and Analysis for Surveillance Applications", in Proc. Int. Symp.Intelligent Signal Processing and Communication Systems pp.607-610, 2009. DOI : 10.1109/ISPACS.2009.5383765 4. Environment", LNCS, Advanced Web and Network Technologies and Applications, 2016, Vol.3842, pp.741-748. https://doi.org/10.1007/11610496_100 5. H. M. Moon and S. B. Pan, "A New Human Identification Method for Intelligent Video Surveillance System", in Proc. IEEE Int. Conf. Computer Communications and Networks, Switzerland, Aug. 2010. DOI : 10.1109/ICCCN.2010.5560021 6. Park, J., Shin, S., Kang, N., “Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things”, J. Korea Inf. Commun. Soc., 2013, 38, pp.707–714. DOI : 10.7840/kics.2013.38B.9.707 7. Hae-Min Moon, Sung-Bum Pan, "The Analysis of De-identification for Privacy Protection in Intelligent Video Surveillance System", Journal of Korean Institute of Information Technology 9(7), pp.189-200, 2011.7. 8. Park N, Bang H-C, “Mobile middleware platform for secure vessel traffic system in IoT service environment”, Security Communication Network, 2016, 9(6), pp.500–512. https://doi.org/10.1002/sec.1108 9. H. M. Moon, C. H. Seo, Y. W. Chung, and S. B.Pan, "Privacy Protection Technology in Video Surveillance System", in Proc. Int. Conf. Embedded and Multimedia Computing, pp. 160-165, Dec. 2009. DOI : 10.1109/EM-COM.2009.5402973 10. Lee D, Park N, “Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance”, J Supercomput, 2016, 73(3), pp.1103–1118. https://doi.org/10.1007/s11227-016-1841-5 11. Park N, Hu H, Jin Q, “Security and privacy mechanisms for sensor middleware and application in internet of things (IoT)”, Int J Distrib Sens Netw, 2016. https://doi.org/10.1155/2016/2965438 12. Do-Kim Gwon Woo, Han Jong Wook, “Proceedings of Symposium of the Korean Institute of communications and Information Sciences”, pp. 1623-1624, 2009. 13. Park N, Kang N, “Mutual authentication scheme in secure internet of things technology for comfortable lifestyle”, Sensors, 2016, 16(1), pp.1–16. https://doi.org/10.3390/s16010020 14. Yeonghae Ko, Namje Park, “A Study of IT Centered Smart Grid's STEAM Curriculum and Class for 3rd and 4th Graders in Elementary School”, Journal of the korean association of information education, 2013, Vol.17 No.2 pp.167-175. 15. Jaewan Shin, Shin Dong Kyoo, Shin Dong Il, "Design of Brain-Computer Interface System for User Intention Recognition", Proceedings of Symposium of the Korean Institute of communications and Information Sciences, 2013.6, pp. 790-791 16. Park N, Kim M, “Implementation of load management application system using smart grid privacy policy in energy management service environment”, Clust Comput, 2014, 17(3), pp.653–664. https://doi.org/10.1007/s10586-014-0367-y 17. Chang Gi Kim, Jeong Min Seo, "An Design and Implementation of Navigation System for Visually Impaired Persons Based on Smart Mobile Devices", JOURNAL OF THE KOREA CONTENTS ASSOCIATION, 2015, 15(1), pp.24-30. DOI : 10.5392/JKCA.2015.15.01.024 18. Park N, “Implementation of inter-VTS data exchange format protocol based on mobile platform for next-generation vessel traffic service system”, Int Inf Inst (Tokyo) Inf, 2014, 17(10A), pp.4847–4856. 19. Dong-Eun Kim, Kwee-Bo Sim, "A Study on the Relation between EEG and Strength for Artificial Hand Control", Proceedings of Symposium of the Korean Institute of Intelligent Systems, 2013.10, pp.121-122. 20. Park N, Park J, Kim H, “Inter-authentication and session key sharing procedure for secure M2M/IoT environment”, Int Inf Inst (Tokyo) Inf, 2015, 18(1), pp.261–266. 21. Dong-Eun Kim, Je-Hun Yu, Kwee-Bo Sim, "EEG Feature Classification for Precise Motion Control of Artificial Hand", Journal of Korean Institute of Intelligent Systems 25(1), pp.29-34, 2015.02. DOI : 10.5391/JKIIS.2015.25.1.029 22. Park N, “Implementation of inter-VTS data exchange format protocol based on mobile platform for next-generation vessel traffic service system”, Int Inf Inst (Tokyo) Inf, 2014, 17(10A), pp.4847–4856. 23. Luo, Ying, Shuiming Ye, and S. Cheung Sen-ching, "Anonymous subject identification in privacy-aware video surveillance", Multimedia and Expo (ICME), 2010 IEEE International Conference on. IEEE, 2010. DOI : 10.1109/ICME.2010.5583561 24. Park N, “Implementation of terminal middleware platform for mobile RFID computing”, Int J Ad Hoc Ubiquitous Comput, 8(4), pp.205–219, 2011, DOI : 10.1504/IJAHUC.2011.043583. 25. Lee Hyun Ju, Shin Dong Il, Shin Dong Kyoo, "A Study on the system design for analysis of EEG signals", Proceedings of Symposium of the Korean Institute of communications and Information Sciences, 2014, pp.610-611 26. Park N, “Performance analysis for VTS-based data exchange protocol in e-navigation environment.”, Int J Multimed Ubiquitous Eng, 11(1), pp.337–344 2016. DOI : 10.14257/ijmue.2016.11.1.32 27. Yong-Hee Lee, Chun-Ho Choi, "Pattern classification of the synchronized EEG records by an auditory stimulus for human- computer interface", Journal of the Korea Institute of Information and Communication Engineering, 12(12), pp. 2349-2356, 2008. 28. Joongheon Kim, Yeong Jong Mo, Woojoo Lee, DaeHun Nyang, "Dynamic Security-Level Maximization for Stabilized Parallel Deep Learning Architectures in Surveillance Applications", Privacy-Aware Computing (PAC), 2017 IEEE Symposium on. IEEE, 2017. DOI :10.1109/PAC.2017.22 29. Namje Park, Donghyeok Lee, “Electronic identity information hiding methods using a secret sharing scheme in multimedia- centric internet of things environment”, Personal and Ubiquitous Computing, pp.1-8, Mar. 2017. DOI : 101007/s00779-017- 1017-1 30. Jinsu Kim, Namje Park, Geonwoo Kim, Seunghun Jin, "CCTV Video Processing Metadata Security Scheme Using Character Order Preserving-Transformation in the Emerging Multimedia", Electronics,8(4), pp.412-427, 2019. doi:10.3390/e Authors: Yong Joo Lee, Keon Myung Lee

Paper Title: Blockchain-based Multi-Purpose Authentication Method for Anonymity and Privacy Abstract: Various applications using smart contract, a leading application technology of blockchain, are being rapidly introduced to the industrial sector. As a result, services in various fields are actively being developed. Currently, most of the services are offered on a variety of platforms, not blockchain-based. If these services are 77. linked to prepaid features that provide anonymity in smart contracts, a more diverse service scenario could be created. In this paper, we propose scenarios that provide certification for various purposes based on smart contracts. It provides a scenario that provides the privacy of the contract signed by the customer while retaining 409-414 the anonymity provided by blockchain. Smart contracts register keys that do not give a clue to guess the encoding keys and deliver hash functions of the child keys that change each time with authentication parameters.In addition, the master seed that can generate these authentication parameters is designed to be kept only by the user and the service provider to be able to verify them. It is proposed by considering both a single service provider transaction and a smart contract authentication model that is shared with a large number of service providers. To generate these child keys, we proposed a mechanism to use the method of generation of child keys based on the Elastic Curve Cryptography public-key method. Various attack scenarios were analyzed to complement the scenario and the efficiency of the proposed mechanism was analyzed. In addition, differences and excellence were compared by organizing scenarios that had the same purpose as scenarios in the relevant study.

Keyword: Blockchain, Authentication, Role-based Access Control, Anonymity, Privacy.

References: 1. NOVO, Oscar. Blockchain meets IoT: An architecture for scalable access management in IoT. IEEE Internet of Things Journal, 2018, 5.2: 1184-1195. 2. OUADDAH, Aafaf; ABOU ELKALAM, Anas; AIT OUAHMAN, Abdellah. FairAccess: a new Blockchain‐based access control framework for the Internet of Things. Security and Communication Networks, 2016, 9.18: 5943-5964. 3. LEE, Jong-Hyouk. BIDaaS: Blockchain based ID as a service. IEEE Access, 2018, 6: 2274-2278. 4. CHRISTIDIS, Konstantinos; DEVETSIKIOTIS, Michael. Blockchains and smart contracts for the internet of things. Ieee Access, 2016, 4: 2292-2303. 5. HAMMI, Mohamed Tahar, et al. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. Computers & Security, 2018, 78: 126-142. 6. KISHIGAMI, Junichi, et al. The blockchain-based digital content distribution system. In: 2015 IEEE Fifth International Conference on Big Data and Cloud Computing. IEEE, 2015. p. 187-190. 7. CRUZ, Jason Paul; KAJI, Yuichi; YANAI, Naoto. RBAC-SC: Role-based access control using smart contract. IEEE Access, 2018, 6: 12240-12251. 8. OUADDAH, Aafaf; ELKALAM, AnasAbou; OUAHMAN, AbdellahAit. Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Europe and MENA Cooperation Advances in Information and Communication Technologies. Springer, Cham, 2017. p. 523-533. 9. HANKERSON, Darrel; HERNANDEZ, Julio López; MENEZES, Alfred. Software implementation of elliptic curve cryptography over binary fields. In: International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, 2000. p. 1-24. 10. GURA, Nils, et al. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: International workshop on cryptographic hardware and embedded systems. Springer, Berlin, Heidelberg, 2004. p. 119-132. 11. BOS, Joppe W., et al. Elliptic curve cryptography in practice. In: International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2014. p. 157-175. 12. GUTOSKI, Gus; STEBILA, Douglas. Hierarchical deterministic Bitcoin wallets that tolerate key leakage. In: International Conference on FinancialCryptography and Data Security. Springer, Berlin, Heidelberg, 2015. p. 497-50 Authors: Seunghyung Lee, Sungho Sim

Paper Title: Duplicated Code Slicing Technique for System Optimization Abstract: These days, the systems have been bigger upon integrations with multiple functions of hardware and software. To optimize these bigger systems, slicing technique is required to extract the duplicated codes. In this study, system dependent graph was used for slicing of duplicated codes. System dependent graph is generated upon analysis of extracted control relationship from system codes and data dependence. Duplicated control and data relations are extracted upon analysis of generated system dependent graph. Using control and data relations, which is a suggestive slicing technique, duplicated codes can be generated. Slicing technique using system dependent graph can be applied to the extraction of duplicated cross cutting modules in all programming methods regardless of the environment of structure/object-oriented program. By the suggestive method, code blocks duplicated. In the system can be sliced and system code optimization can be contributed by eliminating unnecessary codes from slicing.

Keyword: Control Dependence Relation, Duplicated Code Slicing, System Optimization, Data Dependence Relation, Source Code. 78. References: 1. L. Aversano, M. Cerulo, MD. Penta, “How clones are maintained: An empirical study,” In Proceedings of the 11th European Conference on Software Maintenance and Reenfineering, 2007, pp. 81-90, https://doi.org/ 10.1109/CSMR.2007.26 415-419 2. Misael Mongiovì, Giuseppe Pappalardo. Emiliano Tramontanab, “Specifying and identifying widely used crosscutting concerns,” Knowledge-Based Systems, Vol. 126, 2017, pp. 20-32. https://doi.org/10.1016/j.knosys.2017.04.003 3. M. Marin, L. Moonen, A. Van Deursen, “An integrated crosscutting concern migration strategy and its application to JHotDraw,” Seventh IEEE International Working Conference on Source Code Analysis and Manipulation, 2007, pp. 101-110. https://doi.org/10.1109/SCAM.2007.25 4. D. Binkley, S. Danicic, T. Gyimothy, M. Harman, A. Kiss, B. Korel, “A formalization of the relationship between forms of program slicing,” Science of Computer Programming, Vol. 62, No. 3, 2006, pp. 228-252. https://doi.org/10.1016/j.scico.2006.04.007 5. Shailendra Narayan, Leena, “Study of current program slicing techniques,” 5th International Conference-Confluence The Next Generation Information Technology Summit, 2014, pp. 810-814. https://doi.org/10.1109/ CONFLUENCE.2014.6949332 6. DamianoZanardini, “The semantics of abstract program slicing,” In: Proceedings of the IEEE International Working Conference of Source Code Analysis and Manipulation, 2008, pp. 89-98. https://doi.org/ 10.1109/SCAM.2008.19 7. Alaknanda Chandra, Abhishek Singhal, Abhay Bansal, “A study of program slicing techniques for software development approaches,” International Conference on Next Generation Computing Technologies, 2015, pp. 622-627. https://doi.org/10.1109/NGCT.2015.7375196 8. Durga Prasad MadhusmitaSahu, Rajeev Kumar, Rajib Mall, “Dynamic Slicing of Aspect-Oriented Programs,” In Proc of Informatica, Vol. 32, No. 3, 2008, pp. 261-274. 9. D.W. Binkley, M. Harman, “A surver of empirical results on program slicing,” Advance in Computers, Vol. 65, 2004, pp. 105- 178. 10. H. Subramaniam, H. Zulzalil, MA. Jabar, S. Hassan, “Feasibility Study of Aspect Mining at Requirement Level,” Indian Journal of Science and Technology, Vol. 7, No. 5, 2016, pp. 17-23. 11. G. Shu, B. Sun, TA. Henderson, A. Podgurski, “JavaPDG: Anew platform for program dependence analysis,” In: Software testing, verification and validation (ICST), IEEE sixth international conference on IEEE, 2013, pp. 408-415. https://doi.org/10.1109/ICST.2013.57 12. S. Sukumaran, A. Sreenivas, R. Metta, “The dependence condition graph: Precise conditions for dependence between program points,” Computer Language, Systems & Structure, Vol. 36, No. 1, 2010, pp. 96-121. https://doi.org/10.1016/j.cl.2009.04.001 13. J. Krinke, “Mining control flow graphs for crosscutting concerns,” Proceedings of Working Conference on Reverse Engineering, 2006, pp. 334-342. https://doi.org/10.1109/WCRE.2006.37 14. M. Mongiov`I, G. Giannone, A. Fornaia, G. Pappalardo, E.Tramontana, “Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications,” The Journal of the Korea Xontents Association, 2015, pp. 1573- 1579. https://doi.org/10.1145/2695664.2695887 15. MP. Robillard, GC. Murphy, “Concern graphs: finding and describinf concerns using structural program dependencies,” Proceedings of International Conference on Sofware Engineering (ICSE), 2002, pp. 406-416. https://doi.org/10.1145/581339.581390 16. R. Halder, A. Cortesi, “Abstract program slicing on dependence condition graphs,” Science of Computer Programming, Vol. 78, No. 9, 2013, pp. 1240-1263. https://doi.org/10.1016/j.scico.2012.05.007 Authors: Byeongtae Ahn

Paper Title: Construction of Simulation for Adsorption Process Visualization Abstract: Recently, with the development of biotechnology, much interest has been focused on chromatographic adsorption processes for separation of biomolecules such as proteins, which are important. The efficiency of the adsorption process was improved by visualizing the data by simulation. The system visualized numerical results according to adsorption process modeling easily and efficiently. It is possible to predict the expected result even if the numerical data is inputted without going through the conventional experiment. The purification process of biological and chemical processes may involve several stages of chromatographic separation processes. The system visualizes the results of the simulation according to the adsorption process modeling or makes it appear as a curve graph. Therefore, in this paper, we design and implement a simulation system for adsorption process modeling. The currently developed simulation visualization system is a visualization of the result values that are driven by the existing engine, so future work will enable the engine to operate in the system itself.

Keyword: Adsorption, Imulation, Modeling, Optimization, Visualization

79. References: 1. Alain Berthod, Mahmoud Hassoun. Journal of Chromatography A. 2006 May;1116(1):143-148.(Using the liquid nature of the stationary phase in countercurrent chromatography: IV. The cocurrent CCC method) 420-423 2. Xiaohai Han, Xiaolin Wei, Uwe Schnell, Klaus R.G. Hein. Combustion and Flame. Feb 2003;132(3):374-386.(Detailed modeling of hybrid reburn/SNCR processes for NOX reduction in coal-fired furnaces) 3. Martin Martinov, Dimiter Hadjiev, Serafim Vlaev. Process Biochemistry. July 2010;45(7): 1023-1029.(Gas–liquid dispersion in a fibrous fixed bed biofilm reactor at growth and non-growth conditions) 4. S.S. Daood, M.T. Javed, B.M. Gibbs, W. Nimmo. Fuel. Mar 2013;105:283-292.(NOx control in coal combustion by combining biomass co-firing, oxygen enrichment and SNCR) 5. Muhammad Ayoub, Muhammad Faisal Irfan, Kyung-Seun Yoo. Energy Conversion and Management. Sep 2011;52(10): 3083- 3088.(Surfactants as additives for NOx reduction during SNCR process with urea solution as reducing agent) 6. Jan Kloppenborg Møller, Henrik Madsen, Jacob Carstensen. Ecological Modelling. June 2011;222(11):1793-1799.(Parameter estimation in a simple stochastic differential equation for phytoplankton modelling) 7. M. Villegas, F. Augustin, A. Gilg, A. Hmaidi, U. Wever. Mathematics and Computers in Simulation. Jan 2012;82(5):805- 817.(Application of the Polynomial Chaos Expansion to the simulation of chemical reactors with uncertainties) 8. Jake L. Rafferty, J. Ilja Siepmann, Mark R. Schure. Journal of Chromatography A. April 2011;1218(16):2203-2213.(Mobile phase effects in reversed-phase liquid chromatography: A comparison of acetonitrile/water and methanol/water solvents as studied by molecular simulation) 9. Melissa A. Holstein, Wai Keen Chung, Siddharth Parimal, Alexander S. Freed, Blanca Barquera, Scott A. McCallum, Steven M. Cramer. Journal of Chromatography A. Mar 2012;1229:113-120.(Probing multimodal ligand binding regions on ubiquitin using nuclear magnetic resonance, chromatography, and molecular dynamics simulations) 10. Chen Wang, Jingming Hou, David Miller, Iain Brown and Yang Jiang. International Journal of Disaster Risk Reduction. April 2019;35:150-165.(The role of integrated simulation and 3D visualization) Authors: Abduvakhabova Dilnoza Nurmaxamatovna The Concept of Emotionally-Colored Vocabulary and the Main Aspects of its Inter-Language Paper Title: Transmission Abstract: This article represents one of the most important and relevant problems of translation theory and practice today - the transfer of emotionally-colored vocabulary.

Keyword: emotion, perception, evaluative connotations, adequacy, equivalence, expressive. 80.

References: 1. Abduvahobova D.N. Intercultural communication and problems of teaching English to students-nonlinguists. Foreign languages 424-430 in Uzbekistan-scientific methodological electronic journal, N 1(20)/2018.135-139p. 2. Babenko L. G. Linguistic analysis of a work of art. - Ekaterinburg: Ural publishing house, University, 2000. – 534p. 3. 3.Bavdinov P.P. Cultural connotation and parish units / P.P. Bavdinov. // Bulletin of the KazNU. A series of philological. - 2005 - №8. - with. 177-180. 4. Bagdasarova N.A. Lexical Expression of Emotions in the Context of Different Cultures: Thesis Abstract, Moscow, 2004. - 22 p. 5. Barkhudarov, L.S. Language and translation. - M .: International Relations, 1975.-240 p. 6. 6.Buyanova L.Yu., Nechay Yu.P. Emotiveness and emotiogenicity of language: mechanisms of explication and conceptualization: monograph. - Krasnodar: Kuban State. University, 2006.-277 p. 7. 7.Dodonov B.I. Emotion as a value. - M .: Politizdat, 1978 - 272 p. Dridze TM, 8. Leontiev A.A. The semantic perception of speech messages (in terms of mass communication) - Moscow: Nauka, 1976. - 263 p. 9. Komissarov, V.N. Theory of Translation (linguistic aspects). - M .: Higher School, 1990. - 253 p. 10. 10.Latyshev L.K. Translation rate (equivalence and ways to achieve it) Text. / L.K. Latyshev. - M .: International relations, 1981.-284 p. 11. Shakhovsky, V.I., Categorization of Emotions in the Lexical-Semantic System of the Language, Voronezh: Voronezh Publishing House. Un 1987, 192 p. 12. 12.Razinkina N.M. The style of English scientific speech. - M .: Science, 1972. - 168 p. 13. 13.Piotrovskaya L.A. Emotive statements as an object of linguistic research (on the material of Russian and Czech languages): Monograph. - SPb .: Publishing house of S.-Petersburg. University, 1994. - 146 p. 14. Kinzel A.B. Psycholinguistic study of the emotional-semantic dominant as a text-forming factor. - Barnaul: Publishing house Alt. University, 2000. - 152 p. 15. A.A.Smirnov"Translation" Literary Encyclopedia, 1996, 155-159p. Authors: Zakhidova Shirin Rating system Establishment Conditions in the Higher Educational Institutions and its Tendencies of Paper Title: Development in the Republic of Uzbekistan Abstract: The article highlights the measures taken to improve the quality of higher education, which is one of the key drivers of economic development, and of Uzbekistan's higher education institutions to enter the global top 500 universities.

Keyword: Higher education system, rating, quality of education, universities, world universities, educational export, scientific potential.

References: 81. 1. .Akhunova G.N Marketing activities in the educational services market and its improvement: dissertation for the degree of Doctor of Science - T .: 2004. - 45 p. 2. A. Vakhabov, E. Imamov. Higher education in Central Asia. The challenges of modernization. - M., 2007 .-- 214 p. 431-434 3. Alimdjanov H.G. The National Program for Personnel Training of the Republic of Uzbekistan and the issues of its financial support: Written to earn a degree… dis. abstract - T. 2004. - 23 p. 4. Zapolskaya V.V. Non-productive sphere in the USSR / V.V. Zapolskaya - Voronezh: Voronezh State University, 1996. - P.50–55 5. Kalmetov B.D. Educational complex in a market economy. - Toshkent: Adolat, 2003 .-- 499 p. 6. Noskov V.A. High school in the system of social reproduction. Abstract. Dis. on soch uch. Ph.D. Kostroma - 2003.38 s. 7. Saidov M.Kh. Economics, investments and marketing of higher education. –T. Moliya, 2002 .-- 332 p. 8. Umarov I., Rezhapov H.Kh. “International ratings and the rating system of Uzbekistan” / Materials of the international scientific- practical conference on the topic “Actual issues of modern science and education” Issue No. 14. Volume 1. Kirov 2015. Page 432-437. 9. Kurbonov Sh.E., Seytkhalilov E.A. National model and training program - achievement and result of independence of Uzbekistan. - T .: Marifat – Madadkor 2003 .-- 656 p. 10. State Inspection on Education Quality Control under the Cabinet of Ministers of the Republic of Uzbekistan 11. 11. Data from the State Inspectorate for Educational Quality Control under the Cabinet of Ministers of the Republic of Uzbekistan Rakhimova Gulsanam Ashirbekovna, Abdunazarova Iroda Melikuzi kizi, Eraliyeva Barchinoy Authors: Anvarkul kizi, Ashurova Shakhnoza Almasovna, Kakharova Nafisa Ikramovna Paper Title: Literary Translation and Stylistic Figures Abstract: This article discusses the need for more detailed analysis of linguistics and translational linguistics in the process of literary translation, usage of some other specific linguistic research methods, including the use of content analysis and analysis of situations, in which comparable two different units have different values and meanings. The works of the Uzbek and French poets and writers, have scientifically proved these methods, which serve to fulfill each other, in particular, the works The relevance of the essay and the content of the translation texts requires equivalence to be recognized as a fundamental requirement of the translation. The idea of a complete translation of the work is just a dream of the reader and the interpreter. Sometimes it is not widely accepted that the translation of the work, which is well-deserved by the general public as well as the experts of this field, is complete. Unfortunately, asacademician A.A. Shcherba points out, "You can only understand what your language is like when you compare your language to other languages," and there are it can be seen that both 82. languages have the ability to use them and to use them efficiently.of R. Parfi and the French writers Le Clezio and F. Moriacprovide a thorough and objective assessment of translations.It also analyzes what is described on the literary work as a means of visualization and emotionality, not as a defining feature of the poetic language, 435-438 but as a means of “expressive means and stylistic devices” which serves to uncover emotions and descriptiveness. The relevance of the essay and the content of the translation texts requires equivalence to be recognized as a fundamental requirement of the translation. The idea of a complete translation of the work is just a dream of the reader and the interpreter. Sometimes it is not widely accepted that the translation of the work, which is well-deserved by the general public as well as the experts of this field, is complete. Unfortunately, asacademician A.A. Shcherba points out, "You can only understand what your language is like when you compare your language to other languages," and there are it can be seen that both languages have the ability to use them and to use them efficiently.

Keyword: Moriacprovide,emotionality,Shcherb,languages,

References: 1. Axmanova O.S., ZadornovaV.Ya. Teoriya I praktikaperevoda v sveteucheniya o funkcionalnyxstilyaxrechi. — V kn.: Lingvisticheskie problem perevoda: S6. statej. M., 1980. 2. Budagov R.A. Chtotakoelingvisticheskayapoetika? — Filol. Nauki, № 3, 1980. 3. Esenin. Problemytvorchestva: Sb. statej/sost. P. F. Yushin. M., 1978. 4. Gyubbenet I. V. K problem ponimaniyaliteraturno-xudozhestvennogoteksta (naanglijskommateriale). M., 1981. 5. Fajzullaeva R. N. Nacionalnyjkoloritixudozhestvennyjperevod. T., «Fan», 1979. 118 s. 6. François Mauriac. Le nœud de vipères - Paris, 1989. 7. Fyodorov A. V. Osnovy obshhej teorii perevoda (lingvisticheskie problemy). M:vyssh.shkola.,1983.303 s. 8. Komissarov V. N. Teoriyaperevoda (lingvisticheskieaspekty). M., Vyssh.shk.,1990. 250 s. 9. Lyubimov N. M. Perevod iskusstvo. M., 1977. 80 s. 10. Le Clezio. Mondo - Paris, 1990. 11. Popovich A. Problemyxudozhestvennogoperevoda. M., Vyssh.shkola 1980. 199 s. 12. ReckerYa. I. Teoriyaperevodaiperevodcheskayapraktika. M., Mezhd.otnosheniya, 1974. 214 s. 13. SodiqovS. Suzsan’atijozibasi. - Т., 1996. 14. Vinogradov V.V. O teoriixudozhestvennoyrechi. M., 1971(Bibliotekafilologa). 15. Vinogradov V.S. Leksicheskievoprosyperevodaxudozhestvennoyprozy. M., 1978. 16. Vladimirova N. Nekotoryevoprosyxudozhestvennogoperevoda s russkogonauzbekskijyazyk. t., «Fan», 1957 . 17. Vlaxov S., Florin S. Neperevodimoe v perevode. M., «Mezhdunarodnyeotnosheniya», 1980. 352 str. 18. www.list@ king.ru by Andrej Chemodanov, Danila Dubshin, Vladimir Simonov. Authors: Ulugmurodova Nodira Berdimurodovna

Paper Title: Econometric Analysis of the Development of Economic Entities in the Sphere of Small Business Abstract: In this article the factors that affect the development of small business entities in the region's economy and determination the relationship between them through correlation-regression analysis as well as directions of development of social and labor relations in the enterprises of the industry are identified.

Keyword: the relationship enterprises identified. 83. References: 1. Abdullayev Yo., General Theory of Statistics, T. Fan, P.240, 1993. 439-443 2. Abdullaev A.M., Djamalov M.S. Econometrics-2. Textbook for Higher education - T., P. 612, 2011. 3. Magnus Ya.R., Katyshev P.K., Peresetskiy A.A., Econometrics, Textbook. - M., P.499, 2005. 4. Ivanova M.A., Economic statistics, Textbook, M., INFRA, P.210, 2000. 5. Andrew F., Siegel, Statistics - practical business, 4th edition, Moscow: Williams Publishing House, P.389-450, 2002. 6. Decree of the President of the Republic of Uzbekistan, “On the strategy for further development of the Republic of Uzbekistan”, on February 7, 2017, PD-4947, Appendix1, paragraph 3.4. 7. Annual Statistical collection of the Republic of Uzbekistan. Statistical collection for 2007-2016. Authors: Ruzmatova Gulnoz Mirakhrarovna

Paper Title: Eastern Melodies in the Text of Plato Abstract: The article attempts to cover Platonic philosophical views, the theory of knowledge, the teachings of the state and the society, and the Oriental motives in the formation of human relationships. In the works of Plato, the myths about the life of the human soul in the Hereafter are interpreted in different ways. It was pointed out that the issue of eternal spirituality was of great importance in the works of Plato. Our goal is to rely on sources, to analyze social-philosophical, moral views of Plato and his ideas about man. It was revealed that Plato was influenced by ancient Myths, the Upanishads, when creating his own dialogues.

Keyword: the teachings,interpreted, Upanishads

84. References: 1. Karimov I.A. I believe in the strong will of our wise people // Fidokor. June 8, 2000. 2. Sheynman-Topshine S.Ya. Plato i vediyskaya philosophy. - M.: Nauka, 1978. Dialogue "Alkiviad I". 444-447 3. Arology Socrat. 40c.- 41a. 4. Plato. Sochienia. - T. 1-3. - M .: Mysl, 1968-1972. 5. This name is considered a Jewish name, which is described by Luke in the Bible by Joseph as a carpenter, while Clauston Alexander was compared to Pamfilian Erani Zardus; but in any case, the Asian man is talking about. 6. Thomson Dj. Issledovaniya po istorii drevnegrecheskogo obshchestva. Doistoricheskiy Aegean mir. - M., 1958; 7. I'm sorry. Aeschylos und Athen. - Berlin, 1957. 8. Chattopadx'yaya D Lokayata darshana. - M .: Mysl, 1961. 9. Losev A.F. (commentary on "Menon" // v. Knap: Plato, Sochienia, T. 1. - M .: Mysl, 1968. 10. "Brixadaran-uplighter", IV, 3, 3; 11. "Floating", II, 12, 18, 22; 12. "Completion-rising", II, 1, 13. "Mundaka-upanish", II, 2; 14. "Shvetashvatara- rising", III. 15. Strunila M. Do you have hyperbole? // Technique. - 1984. - No. 10. Authors: Roopa J, Rahul N, Pragna G S, Geetha K S, B S Satyanarayana, Govinda Raju M 85. Paper Title: Bio Potential Signal Conditioning using MATLAB on Electromyography Signals Abstract: In today's world of medicine, technology plays a major role in creating solutions. Conventionally expensive equipment has been used for diagnosis involving bio signals. Such treatment is not available to most people. Most existing bio signal conditioning devices are very specific to their application, and others that are diverse require a large number of different sensors and are more expensive and cumbersome to use. There is a need for a signal conditioning circuit that is adaptable, employs digital processing and can be used to measure any of the different bio signals generated by our body with minimal modification. Use of MATLAB can greatly help researchers to analyse bio signals by giving them huge flexibility. MATLAB also has the added advantage of being able to be used on nearly all computing devices. Raw bio signal data has been captured and MATLAB has been used to mimic the various filters required to remove different types of noises that exist in a typical electromyography signal.

Keyword: Diagnosis, Signal Conditioning, Digital Processing, MATLAB, Electromyography.

448-452 References: 1. J. W. Clark Jr., “The Origin of Biopotentials” in J. G Webster, “Medical Instrumentation”, 4th ed, John Wiley and Sons, New York, pp. 126-87, 2010 2. C. Steele, “Applications of EMG in Clinical and Sports Medicine”, InTech, Croatia, December 2011. 3. C. Heckman and R. M. Enoka, “Physiology of the motor neuron and the motor unit”, pp. 119-147, 2004 4. M.B.I.Reaz, M.S Hussain, F. Mohd-Yasin, “Techniques of EMG signal analysis: Detection, processing, classification and Applications”, 2006 5. H.W.Tam, J.G. Webster, “Minimizing electrode motion artifact by skin abrasion”, IEEE Trans. Biomed. Eng., 1977 6. M. R. Neuman, “Biopotential Electrodes”, in J. G Webster, “Medical Instrumentation”: 4th ed, John Wiley and Sons, New York, pp. 189-240, 2010 7. G. J. Janz, D. J. G. Ives, “Silver, Silver Chloride Electrodes”, 1968 8. Y. Blanc, U. Dimanico, “Electrode Placement in Surface Electromyography (sEMG) “Minimal Crosstalk Area” (MCA)”, 2010 9. X. Zhang, Y. Wang, R.P.S. Han, “Wavelet transform theory and its application in EMG signal processing”, Yantai, China, September 2010. Authors: Darshana A Naik, Brunda C J

Paper Title: Patent Mining to Predict Class using Decision Tree and Naïve Bayes Algorithm Abstract: The number of patents that are being filed across the world is increasing day by day. With the increase in patents being filed the process of segregating the patents based on their class becomes even more difficult. There is no prior work that has been done to increase the efficiency of this process, therefore patent mining is done. There are a set of features that are extracted from the dataset that is previously present. The features that are being extracted will vary for each document and based on the feature that is extracted the following steps are carried out. After the feature extraction is done there are two steps that need to be carried out, namely: Classification and prediction. For this purpose, decision tree algorithm is used which makes use of the most prominent feature and classification is done using those features. Therefore, for classification a hierarchical decision tree algorithm is used along with the probability of patent conversion. Based on the classification that is done a model will be created and whenever a new entity is brought it is compared with the model file that was created using the available datasets and is predicted as a particular class. Thus, both classification of existing dataset and the prediction for any new dataset based on previous inputs can be achieved thereby facilitating the patent mining process.

86. Keyword: Classification; Prediction; Decision Tree; Naïve Bayes; Patent Mining; Feature Exracction; Attributes. 453-457

References: 1. Marko Velic ; Toni Grzinic ; Ivan Padavic ,” Wisdom of Crowds Algorithm for Stock Market Predictions” Information Technology Interfaces, 27 June 2013. 2. Gu Chengjian ; Huang Lucheng,” The study on CNT-FED for emerging technology forecasting by using patent Management Map”, International Symposium on Information Engineering and Electronic Commerce,2009. 3. Zhenbao Liu ; Zhen Jia ; Chi-Man Vong ; Junwei Han ; Chenggang Yan ; Michael Pecht,” A Patent Analysis of Prognostics and Health Management (PHM) Innovations for Electrical Systems”,IEEE,2018. 4. Hongshu Chen ; Guangquan Zhang ; Jie Lu,” A Time-series-based Technology Intelligence Framework by Trend Prediction Functionality”,IEEE International Conference on Systems, Man, and Cybernetics,2013. 5. Hayley Beltz ; Raoul R. Wadhwa ; Peter Erdi,” From ranking and clustering of evolving networks to patent citation analysis”,IEEE,2017. 6. Xiang Ji ; Xinjian Gu ; Feng Dai ; Jixi Chen ; Chengyi Le,” Patent Collaborative Filtering Recommendation Approach Based on Patent Similarity”,Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD),2011. 7. Xin Jin ; Scott Spangler ; Ying Chen ; Keke Cai ; Rui Ma ; Li Zhang ; Xian Wu ; Jiawei Han,” Patent Maintenance Recommendation with Patent Information Network Model”, IEEE International Conference on Data Minin

87. Authors: V Kavitha, M Chenna Krishna Reddy, S Harisingh Naik Rayleigh-Benard-Marangoni Ferro Convection with Concentration and Temperature Dependent Paper Title: Viscosity Abstract: The inception of Rayleigh-Benard-Marangoni (RBM) Ferro convection with concentration and temperature dependent viscosity is investigated theoretically and the resultant is further enhanced numerically using Galerkin method. We observed that the effect of Rayleigh number together with internal heating suppressed the onset of RBM Ferro convection. The nonlinear nature of magnetic fluid parameter has no impact on the onset of Ferro convection. The latent values found numerically by Galerkin weighted Residual technique and regular perturbation technique are found to be alike, indicating the fact that the obtained solutions are near exact in nature. The result of the BC’s for lower and upper free rigid boundary at temperature dependent surface tension forces are found to be immaculately insulate to temperature perturbation.

Keyword: Rayleigh-Benard-Marangoni Ferro convection, Galerkin Method, Regular perturbation technique, internal heating.

References: 1. R.A. Pearson, on convection cells induced by surface tension, J.Fluid Mech.4 91958), pp. 489. 2. L Rayleigh, on convection currents in a horizontal layer of fluid when the higher temperature is on the other side, Phil.Mag.32 (1916), pp. 529. 3. C.E Nanjundappa, and I.S. Shivakumara, Effect of velocity and temperature boundary conditions on convective instability in a ferrofluid layer, ASME J. Heat transf.130 (2008), 1045021-1045025. 458-461 4. C.E Nanjundappa, I.S. Shivakumara, and K.Srikumar, Effect of MFDviscosity on the onset of ferromagnetic fluids layer heated from below and cooled from above with constant heat flux, Meas.Sci.Rev.9(3) (2009), 77-78. 5. I.S. Shivakumara, J.Lee and C.E Nanjundappa, Onset of thermogravitational convection in a ferrofluid layer with temperature dependent viscosity, ASME J. Heat transf.134 (2012), 0125011-0125017. 6. I.S. Shivakumara, N.Rudraiah and C.E Nanjundappa, Effect of non-uniform basic temperature gradient on Rayleigh-Benard- Marangoni convection in ferrofluids, J.Magn.Magn.Mater.248, 379-395. 7. I.S. Shivakumara and C.E Nanjundappa, Marangoni ferroconvection with different initial temperature gradients, J.Energy Heat Mass Transf.28, 45-61. 8. C.E Nanjundappa, I.S. Shivakumara, and R. Arunkumar, Benard-Marangoni ferroconvection with magnetic field dependent viscosity, J.Magn.Magn.Mater.322, 2256-2263. 9. C.E Nanjundappa, I.S. Shivakumara, and R. Arunkumar, Onset of Marangoni-Benard ferro-convection with temperature dependent viscosity, Microgravity Sci.Technol.25(2013), 103-112. 10. C.E Nanjundappa, I.S. Shivakumara, and B.Savitha, Onset of Benard-Marangoni ferroconvection with a convective surface boundary condition: The effects of cubic temperature profile and MFD viscosity, International Communications in Heat and Mass Transfer, 51, 39-44. 11. C.E Nanjundappa, H.N.Prakash, I.S. Shivakumara and Jinho Lee, Effect of temperature dependent viscosity on the onset of Benard-Marangoni ferroconvection, International Communications in Heat and Mass Transfer, 51, 25-30. 12. C.E Nanjundappa, I.S. Shivakumara and Jinho Lee, Effect of Coriolis force on Benard-Marangoni convection in a rotating ferrofluid layer with MFD viscosity, Micrgavity Sci.Technol, Vol27, 27-37. Authors: D Anil Kumar, Sisira Kumar Kapat, Susanta Kumar Das, Satya Narayan Tripathy

Paper Title: Classification of Spyware Affected files using Data Mining Techniques Abstract: Spyware is a malicious computer program which collects or gathers information about a person or organization and sends them to third party without the user’s knowledge and explicit consent. Spyware is a sinister malware which is mainly connected to spying activity. There are various types of spyware. So there is a need to study the Spyware. This chapter concerns with the study and classification of Spyware. The mathematical term and figures are provided as in where needed, to support the description. The experiment conducted in the chapter shows reliable accuracy and error rate in the classification. This can be used in the malware detection system.

Keyword: Spyware, Malware, Data Mining, Classification, API, Network Security. 88.

References: 462-466 1. Arini Balakrishnan, Chloe Schulze. (2005) Code Obfuscation Literature Survey. Retrieved from, http://pages.cs.wisc.edu/~arinib/writeup.pdf 2. Brian VanNess, Joanne C. Weaver. (Accessed on 30th July 2018) What Types of Spyware are Out There?. Retrieved from http://www.toptenreviews.com/software/articles/types-of-spyware/ 3. CERT-UK (2014) Code obfuscation. retrieved from www.cert.gov.uk ISTR (March 2018). Internet Security Threat Report, volume 23. Retrieved fromhttps://www.symantec.com/content/dam/symantec/docs/reports/istr-23-2018-en.pdf 4. Karishma Pandey, Madhura Naik, Junaid Qamar , Mahendra Patil. (March 2015) Spyware Detection Using Data Mining. International Journal for Research in Applied Science & Engineering Technology (IJRASET), 3(III), pp 488-492 5. Kinam Park, Youngrok Song, Yun-Gyung Cheong (2018) Classification of Attack Types for Intrusion Detection Systems using a Machine Learning Algorithm. IEEE Fourth International Conference on Big Data Computing Service and Applications. DOI 10.1109/BigDataService.2018.00050, pp 282-286 6. McAfee® Proven SecurityTM. (September 2005) white paper on Potentially Unwanted Programs Spyware and Adware. Retrieved from www.mcafee.com 7. McAfee (march-2018) McAfee Labs Threats Report, Retrieved from https://www.mcafee.com/enterprise/en us/assets/reports/rp- quarterly-threats-mar-2018.pdf 8. Mr. B. Dwarakanath, Mr. A. Suthakar. (2012) Prediction and Detection of Malware Using Association Rules. International Journal of Power Control Signal and Computation (IJPCSC), 3(1), pp 45-50 9. Parisa Bahraminikoo, Mehdi Samiei yeganeh, G.Praveen Babu. (2012) Utilization Data Mining to Detect Spyware. IOSR Journal of Computer Engineering (IOSRJCE), 4(3), PP 01-04 10. Stefan Saroiu, Steven D. Gribble, Henry M. Levy. (2004) Measurement and Analysis of Spyware in a University Environment. Proceedings of the first Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA. 11. Mitsuhiro Hatada, Tatsuya Mori. (2017) Detecting and Classifying Android PUAs by similarity of DNS queries. IEEE 41st Annual Computer Software and Applications Conference, DOI 10.1109/COMPSAC.2017.103, pp-590-595 12. Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, Thomas Ristenpart. (2018) The Spyware Used in Intimate Partner Violence. IEEE Symposium on Security and Privacy, DOI 10.1109/SP.2018.00061, pp 441-458 Authors: Sneha V.V, Ismayil Siyad C, S.Tamilselvan

Paper Title: Multilayer Perceptron Scheme for Beamforming And Channel Estimation of Massive MIMO Abstract: Massive MIMO being one of the core enabler of 5G network, estimation of channel characteristics in such network plays a vital role. Also the channel is most affected by the phase information rather than the amplitude information. Thus phase estimation plays a very important role in order to ensure error free transmission especially in the case of rapidly changing channels like in massive MIMO. When an accurate transmit beamforming technique is employed to this scheme, it results in maximum user data separation thereby improving the directivity of the signal. The proposed scheme works on two multilayer perceptron (MLP) mechanism model, one for beamforming and other for channel estimation. First MLP model takes the transmitted signal that is passing through the channel to generate the beamforming vectors and these beamforming vectors after prediction are then multiplied with the channel coefficients to enable beamforming. The transmit beamformed signal after passing through the channel and applying appropriate noise, will be received in different directions and these training samples are then given to the second MLP model to predict DOA of the received signal which in turn estimate the channel of massive MIMO. In our proposed scheme, as both beamforming and channel estimation are handled by deep neural network, along with achieving very much better accuracy, mean square error (MSE) and bit error rate (BER) performance, it reduces the number of epochs required for training which results in an efficient learning scheme that is capable of predicting real time rapidly varying channel of massive MIMO.

Keyword: MIMO, 5G Communication, Deep learning, Channel estimation, DOA Estimation,Beamforming. 89.

References: 467-471 1. Neumann, David, Michael Joham, and Wolfgang Utschick. ”Channel estimation in massive MIMO systems.” arXiv preprint arXiv:1503.08691 (2015). 2. Zaib, Alam, et al. ”Distributed channel estimation and pilot contamination analysis for massive MIMO-OFDM systems.” IEEE Transactions on Communications 64.11 (2016): 4607-4621. 3. Bogale, Tadilo Endeshaw, Long Bao Le, and Xianbin Wang. ”Hybrid analog-digital channel estimation and beamforming: Training-throughput tradeoff.” IEEE Transactions on Communications 63.12 (2015): 5235- 5249. 4. Gao, Zhen, et al. ”Spatially common sparsity based adaptive channel estimation and feedback for FDD massive MIMO.”IEEE Transactionson Signal Processing 63.23 (2015): 6169-6183. 5. Weber, Raymond J., and Yikun Huang. ”Analysis for Capon and MUSIC DOA estimation algorithms.” 2009 IEEE Antennas and Propagation Society International Symposium. IEEE, 2009. 6. Dheringe, N. A., and B. N. Bansode. ”Performance evaluation and analysis of direction of arrival estimation using MUSIC, TLS ESPRIT and Pro ESPRIT algorithms.” Perform. Eval 4.6 (2015): 4948-4958. 7. Yang, Kai-Yu, Jwo-Yuh Wu, and Wen-Hsuan Li. ”A low-complexity direction-of-arrival estimation algorithm for full-dimension massive MIMO systems.” 2014 IEEE International Conference on Communication Systems. IEEE, 2014. 8. Mao, Qian, Fei Hu, and Qi Hao. ”Deep learning for intelligent wireless networks: A comprehensive survey.” IEEE Communications Surveys and Tutorials 20.4 (2018): 2595-2621. 9. Huang, Hongji, et al. ”Deep learning for super-resolution channel estimation and DOA estimation based massive MIMO system.” IEEE Transactions on Vehicular Technology 67.9 (2018): 8549-8560. 10. Zhou, Yuanjian, and Xiaohui Yang. ”A novel adaptive beamforming algorithm for smart antenna system.” 2016 12th International Conference on Computational Intelligence and Security (CIS). IEEE, 2016. 11. Bogale, Tadilo Endeshaw, and Long Bao Le. ”Beamforming for multiuser massive MIMO systems: Digital versus hybrid analog- digital.” 2014 IEEE Global Communications Conference. IEEE, 2014. Authors: Joshi Shubangi Milind, Arunkumar G., T.C.Manjunath

Paper Title: Controllers using Discrete Sliding Mode Control for 1 & 2-link FMs with Output Samples Abstract: The main highlight of this paper being, the design & development of Controllers using Discrete 90. Sliding Mode Control for 1 & 2-link FMs with output samples is being presented for controlling a 2-link FRM considering 2 DOF in 3 Dimensional Euclidean space along with the simulation results. A 2-link FRM with 2- DOF is being considered and the base motor is attached to the single flexible link & the other link is fixed to the 472-481 extreme end of the 1st link to which the shoulder motor is connected and the entire set-up is a single structure one and 2 motors are being used for actuation purposes & is being controlled / regulated using the developed sliding mode controller, i.e., the dual links are rotating with respect to the base, further the link-2 is rotating with respect to the shoulder axes & the joint axes of the two are parallel and perpendicular w.r.t. the robot work surface. Hence, the entire system can be called as a planar mechanism, i.e., the 2 links are moving parallel to the plane of the work surface (x – y plane). There are 2 joints, viz., base joint & the shoulder joint along with the end-effector being the tip of the 2-link manipulator. The small errors that occurs in the control signal u is due to the changes during the set-point. Simulink model is being developed in the Simulink-Matlab environment & after running the model, the simulation results observed, the obtained results shows the efficacy of the methodology developed.

Keyword: Robots, Flexible, Manipulators, 3D, Planar, Motor, Sliding Mode Control, Simulink, Matlab, Simulation, Run time, Results.

References: 1. K. Desoye, P. Kopacek and P. Lugner, “Modelling of Flexible Robots – An Introduction”, 2nd IFAC Symposium on Robot Control 1988 (SYROCO’88), Karlsruhe, Federal Republic of Germany, Elsevier’s IFAC Proceedings, Vol. 21, Issue 16, Oct. 1988, pp. 21-28, 5-7 October 1988. 2. Troch, Kopacek, “Control concepts and algorithms for flexible robots - An expository survey”, Symposium on Robot Control (1988), 2nd IFAC Symposium on Robot Control 1988 (Syroco ’88), IFAC Symposia Series 1989, Selected Papers from the 2nd IFAC Symposium, IFAC Federal Republic of Germany, Karlsruhe, Volume 21, Issue 16, pp. 21-26 & 29-34, 5–7 Oct. 1988. 3. Peng K.C. and Liou F.W., “A Survey of the Experimental Studies on Flexible Mechanisms”, Flexible Mechanism, Dynamics, and Robot Trajectories, DE-VoI.24, ASME 21st Biennial Mechanisms Conference, Chicago, IL, pp.161-168, September 16-19, 1990. 4. Book W.J. & Kwon, D.S., “Contact Control for Advanced Applications of Light Weight Arms”, Journal of Intelligent and Robotic Systems, Vol. 6, No.1, August 1992, pp. 121-137. 5. Cannon R.H. Jr. and Schmitz E., “Initial Experiments on the End-Point Control of a Flexible One-Link Robot”, The International Journal of Robotics Research, Vol. 3, No. 3, pp. 62-75, Fall Oct. 1984. 6. Benosman and Vey G., “Control of flexible manipulators: A survey”, Journal of Robotica, Vol. 2004, Cambridge University Press New York, NY, USA, pp. 533-545, 2004. 7. Thomas Looke, M. Bayoumi, Mohd. Umar Farooq, “Simulation of computed torque controllers for flexible manipulators”, 34th Midwest Symposium on Circuits and Systems, Monterey, CA, USA, 14-17 May 1992. 8. Singh S.N. and Schy A.A., “Elastic Robot Control : Nonlinear Inversion arid Linear Stabilization”, IEEE Transactions on Aerospace and Electronic Systems, Vol. 22, No.. 4, pp. 340-348, 1986. 9. Inna Sharf, “Active Damping of a Large Flexible Manipulator with a Short-Reach Robot”, Journal of Dynamic Systems Measurement and Control, Vol. 118, No. 4, pp. 3329 – 3333, DOI: 10.1109/ACC.1995.532220, American Control Conference, Proceedings of the Vol. 5, July 1995. 10. Menq C.H., J.S. Chen, “Dynamic modelling and payload-adaptive control of a flexible manipulator”, IEEE International Conference on Robotics and Automation, Philadelphia, Print ISBN: 0-8186-0852-8, INSPEC Accession Number: 3228004, USA, pp. 488-493, 24-29 Apr. 1988. 11. Korolov V.V., Y.H. Chen, “Robust control of a flexible manipulator”, IEEE International Conference on Robotics and Automation, Philadelphia, Print ISBN: 0-8186-0852-8, DOI: 10.1109/ROBOT.1988.12040, pp. 159-164, 24-29 April 1988. 12. S.P. Bhat & D. K. Miu, “Precise Point-to-Point Positioning Control of Flexible Structures”, Journal of Dynamic Systems Measurement and Control, Vol. 114, No. 3, pp. 416-421, Sep 01, 1992. 13. Jinjun Shan, Dong Sun, James K. Mills, S.K.Tso, “A PZT actuator control of a single-link flexible manipulator based on linear velocity feedback and actuator placement”, Journal of Mechatronics, Vol. 14, No. 4, pp. 381-401, DOI: -7, May 2004. 14. Chen Y.P., Yeung K.S., “Regulation of a one-link flexible robot arm using sliding-mode technique”, Int. Jr. of Control, Vol. 49, No. 6, pp. 1965-1978, 1989. 15. P. Kotnik, S. Yurkovich, and U. Ozguner, “Acceleration feedback control for a flexible manipulator arm,” J. Robot. Syst., Vol. 5, No. 3, pp. 181–196, 1988. 16. Bayo E., “Computed Torque for the Position Control of Open-Chain Flexible Robots”, Proc. of the 1988 IEEE International Conference on Robotics and Automation, Philadelphia, PA, USA, pp. 316-321, Apr. 24-29, 1988. 17. J.M. Skowronski, “Algorithms for adaptive control of two-arm flexible manipulators under uncertainty”, IEEE Transactions on Aerospace and Electronic Systems, DOI: 10.1109/7.9684, Vol. 24, No. 5, pp. 562 – 570, Oct. 1988. 18. Xi Wang, Asok Ray, Peter Lee and Jinbo Fu, “Optimal control of robot behaviour using language measure”, Int. J. Vehicle Autonomous Systems, Vol. 2, Nos. 3/4, pp. 147-167, 2004. 19. Ahmet S. Yigit, “On the Stability of PD Control for a Two-Link Rigid-Flexible Manipulator”, Jour. of Dyn. Sys., Meas. & Control, doi:10.1115/1.2899212, Vol. 116, No. 2, pp. 208 – 215, Jun 01, 1994. 20. Yao-Wen Tsai and Van Van Huynh, “Output Feedback and Single-Phase Sliding Mode Control for Complex Interconnected Systems”, Hindawi’s Jour. of Mathematical Problems in Engineering, Research Article (16 pages), Article ID 946385, Volume 2015, 2015. 21. B. Bandyopadhyay, V. Thakar, C. M. Saaj and S. Janardhanan, “Algorithm for Computing Sliding Mode Control and Switching Surface from Output Samples”, The 8th Workshop on Variable Structure Systems – VSS2004, Vilanova I La Geltru, Spain, 6-9- 2004 to 8-9-2004. 22. C. M. Saaj, B. Bandyopadhyay, and H. Unbehauen, “A new algorithm for discrete-time sliding mode control using fast output sampling feedback,” IEEE Transactions on Industrial Electronics, vol. 49, no. 3, pp. 518–523, June 2002. 23. B. Bandyopadhyay and C. M. Saaj, “Discrete sliding mode control by non- dynamic multirate output feedback,” Proceedings of seventh international workshop on variable structure systems, 2002, pp. 145-151. 24. V. L. Syrmos, P. Abdalla, P. Dorato, and K. Grigoriadis, “Static output feedback: A survey,” Automatica, vol. 33, no. 2, pp. 125– 137, 1997. 25. A. Bartoszewicz, “Remarks on discrete-time variable structure systems,” IEEE Transactions on Industrial Electronics, vol. 43, no. 1, pp. 235–238, 1996. Authors: Suma K.V, V.Simran Parveen, Sucheta, Kavya Jadav M, Sanjana M

Paper Title: Women Security System using IoT

Abstract: In today’s world, women have to undergo among various difficult situations and have to prove themselves every time in all critical conditions. Here, we are focusing on a scenario where, a woman is walking alone in lonely places faces the attack either from front or back during day time or night. Hence we have designed a system having a quick responding mechanism to help out the women in trouble. The proposed system is more like a safety system in case of emergency. This type of an idea plays a crucial role towards ensuring women safety automatically in the fastest way possible. Smart wearable devices can be used to screen physical signs of panic and anxiety through the wearer's heart rate and other mechanism to trigger responses like alarming nearby people and emergency contacts. Such smart security solutions for women using IoT can ensure quick responses to emergencies and prevent potentially shocking experiences for women. Keyword: Smart Sling bag, IoT, woman security, alert message, registered mobile number.

91. References: 1. Kalpana Seelam, K. Prasanti, “A Novel Approach to Provide Protection for Women by using Smart Security Device” in Proceedings of the Second International Conference on Inventive Systems and Control (ICISC), IEEE, 2018, pp. 351-357. 482-485 2. Shika Elizabeth Sam, Suma K. V, “Wearable Biomedical Device using Telemedicare and Telereporter”, in International Confrence on Wearable Technologies (ICOWT’17), June 26-27, 2017. 3. A Helen, M. Fathima Fathila, R. Rijwana, Kalaiselvi .V.K.G, “A Smart Watch for Women Security based on IoT concept ‘Watch Me’ ”, in Second International Conference on Computing and Communications Technologies (ICCCT’17), IEEE, 2017, pp. 190-194. 4. Mohamad Zikriya, Parmeshwar M. G, Shanmukayya R. Math, Shraddha Tankasali, Dr. Jayashree D Mallapur, “Smart Gadget for Women Safety using IoT (Internet of Things)”, in International Journal of Engineering Research & Technology (IJERT), 2018, Volume 6, Issue 13, pp: 1-5. 5. Prof. R. A. Jain, Aditya Patil, Prasenjeet Nikam, “Women’s safety using IOT”, in International Research Journal of Engineering and Technology (IRJET), 2017, Volume 05, Issue 05, pp: 2336-2338. 6. B. Umadevi, Dr. Eshwaran, Dr. Manoharan, “Women Security Solution using IoT” in International Journal of Pure and Applied Mathematics (IJPAM), 2018, Volume 119, No.10, pp: 1871-1874. 7. Shirly Edward A, Vijayakumari S. G, Bhuvaneswari M. S, "GSM Based Women's Safety Device", in International Journal of and Applied Mathematical (IJPAM), 2018, Volume 119, No.15, pp: 915-920. 8. Jesudoss, Y. Nikhila, T. Sahithi Reddy, "Smart Solution For Women Safety Using Iot", in International Journal of Pune and Applied Mathematical (IJPAM), 2018, Volume 119, No.12, pp: 43-49. 9. Prof. Kshitija V. Shingare, Miss. Ashwini P. Thaware, "A Safety Device for Women's Security Using GSM/GPS", in International Journal on Research and Innovation Trends in Computing and Communication (IJRICC), 2017, Volume 5, Issue 4, pp: 05-07. 10. Piyush Kumar Verma, Arpit Sharma, Dhruv Varshney, Manish Zadoo, "Women Safety Device with GPS, GSM and Health Monitoring System", in International Research Journal of Engineering and Technology (IRJET), 2018, Volume 5, Issue 03, pp: 941-943. Authors: Nagaraj M. Lutimath, Arathi B N,Shona M

Paper Title: Prediction of Heart Disease using SVM

Abstract: Support Vector Machine (SVM) is an important classification method in data mining. It is a supervised classification technique. It finds a hyperplane for classification of the target classes. The heart disease consists set of disorders affecting the heart. It includes blood vessel problems such as irregular heart beat issues, weak heart muscles, congenital heart defects, cardio vascular disease and coronary artery disease. Coronary heart disorder is a familiar type of heart disease. It reduces the blood flow to the heart leading to a heart attack. In this paper the UCI machine learning repository data set consisting of patients suffering from heart disease is 92. analyzed using support vector machines. The classification accuracy of the patients suffering from heart disease is predicted. Implementation is done using R language. 486-489 Keyword: Support Vector Machines, UCI machine learning repository data set, Data Mining, R Studio.

References: 1. Moloud Abdar,”Using Decision Trees in Data Mining for Predicting Factors Influencing of Heart Disease”, Carpathian Journal of Electronic and Computer Engineering 8/2 , 2015,pp. 31-36. 2. Jyoti, S., U. Ansari and D. Sharma, Sunita Soni, “Intelligent and Effective Heart Disease Prediction System using Weighted Associative Classifiers”, .International Journal on Computer Science and Engineering (IJCSE),3: 23852392, 2011, pp. 2385- 2392. 3. Rupali, M and R.Patil, “Heart Disease Prediction System using Naive Bayes and Jelinek-mercer smoothing”,.International Journal of Advanced Research in Computer and Communication Engineering, May 2014. Vol. 3, Issue 5,pp. 6787-6789. 4. Ali Mirza Mahmood1, 2* Mrithyumjaya Rao Kuppa, “Early detection of clinical parameters in heart disease by improved decision tree algorithm”, Second Vaagdevi International Conference on Information Technology for Real World Problems, 2010, pp. 2429. 5. František Babič, Jaroslav Olejár, Zuzana Vantová, Ján Paralič, “Predictive and Descriptive Analysis for Heart Disease Diagnosis”, Proceedings of the Federated Conference on Computer Science and Information Systems, Prague, 2017, ISSN 2300- 5963 ACSIS, Vol. 11,, DOI: 10.15439/2017F219, pp. 155–163. 6. R. El-Bialy, M. A. Salamay, O. H. Karam, and M. E. Khalifa, "Feature Analysis of Coronary Artery Heart Disease Data Sets", Procedia Computer Science, ICCMIT 2015, vol. 65, pp. 459–468, doi: 10.1016/j.procs.2015.09.132. 7. L. Verma, S. Srivastaa, and P.C. Negi, "A Hybrid Data Mining Model to Predict Coronary Artery Disease Cases Using Non- Invasive Clinical Data", Journal of Medical Systems, vol. 40, no. 178, 2016, doi: 10.1007/s10916-016-0536-z. 8. R. Alizadehsani, J. Habibi, M. J. Hosseini, H. Mashayekhi, R. Boghrati, A. Ghandeharioun, B. Bahadorian, and Z. A. Sani, "A data mining approach for diagnosis of coronary artery disease", Computer Methods and Programs in Biomedicine, vol. 111, no. 1, 2013, pp. 52-61, doi: 10.1016/j.cmpb.2013.03.0. 9. Ch. Yadav, S. Lade, and M. Suman, "Predictive Analysis for the Diagnosis of Coronary Artery Disease using Association Rule Mining", International Journal of Computer Applications, vol. 87, no. 4, 2014, pp. 9-13. 10. František Babič, Jaroslav Olejár, Zuzana Vantová, Ján Paralič, “Predictive and Descriptive Analysis for Heart Disease Diagnosis”, Proceedings of the Federated Conference on Computer Science and Information Systems, Prague, 2017, ISSN 2300- 5963 ACSIS, Vol. 11,, DOI: 10.15439/2017F219, pp. 155–163.t. Authors: Akhileshwari K G, Supriya Salian

Paper Title: IoT Device and Service Discovery Framework

Abstract: Internet of Things (IoT) is a unique domain which works on various aspects, which is blanketed, interconnected and thereby enables the humans to interact with the web services and creates a smarter world. There is severe problem in the unified way for discovering IoT devices and services in the present existing infrastructure. The current device centric approach is not in consistent with the growing network. There is no standard method which allows the user to find IoT devices and services in a single framework. Users looking for services will not be aware of potential services available to satisfy their needs. The proposed concept uses unified service discovery broker based architecture using web services. Broker based architecture allows the different providers to register their devices and services at one place and based on the user query, matchching of suitable device and appropriate service will be done and the service data corresponding to the specific query of the user will be provided by using semantic search. Hence, the user can find in a single framework the registered devices and services separately which will be bound together to process the IoT device data stored on cloud. In future, IoT applications would be deployed in several domains like , smart cities, intelligent transport and e-health. Complex service request made by the user can also be resolved using service composition to get the final result. Keyword: IoT; broker based architecture; semantic search; device discovery, service discovery, web service. 93.

References: 1. V. Sharma and R. Tiwari, “A review paper on IOT and its smart applications”, International Journal of Science, Engineering and 490-496 Technology Research, pp.472-476, Feb 2016. 2. S. R. Islam, D. Kwak, M. H. Kabir, M. Hossain and K. S. Kwak, “The Internet of Things for Health Care: A Comprehensive Survey”, IEEE Access,3, pp. 678-708, 2015. 3. Dong, Hai, F. K. Hussain, and E. Chang. "A survey in semantic search technologies." 2008 2nd IEEE international conference on digital ecosystems and technologies, pp. 403-408, Feb 2008. 4. M. Thiyagarajan and C. Raveendra, “Role of Web Service in Internet of Things”, 3rd International Conference on Applied and Theoritical Computing and Communication Technology, pp. 268-270, Dec 2017. 5. E. Wang and R. Chow, “What can I do here? IoT service discovery in smart cities”, IEEE International Conference on Pervasive Computing and Communication Workshops, pp. 1-6, Mar 2016. 6. M. Aziez, S. Benharzallah and H. Bennoui, ”Service Discovery for the Internet of Things: Comparison Study of the Approaches”, 4th International Conference on Control, Decision and Information Technologies, pp. 0599-0604, Apr 2017. 7. S. K. Datta, C. Bonnet, A. Gyrard and R. P. F. Da Costa, “Applying Internet of things for Personalized Healthcare In Smart Homes”, 24th Wireless and Optical Communication Conference, pp. 164-169, Oct 2015. 8. S. B. Fredj, M. Boussard, D. Kofman and L. Noirie, “Efficient semantic-based IoT Service Discovery Mechanism for Dynamic Environments”, IEEE 25th International Symposium on Personal, Indoor and Mobile Radio Communications, pp.2088-2092, Sep 2014. 9. D. Georgakopoulos, P. R. Jayaraman, M. Zhang and R. Ranjan, “Discovery-Driven Service Oriented Iot Architecture”, IEEE Conference on Collaboration and Internet Computing, pp. 142-149, Oct 2015. 10. D. A. D’Mello, V. S. Ananthanarayana and S. Salian, “A Review of Dynamic Web Service Composition Techniques”, International Conference on Computer Science and Information Technology, pp. 85-97, Jan 2011. 11. S. Chirila, C. Lemnaru and M. Dinsoreanu, “Semantic-based IoT device discovery and recommendation mechanism”, International Conference on Intelligent Computer Communication and Processing, pp. 111-116, Sep 2016. 12. F. Khodadadi, A. V. Dastjerdi and R. Buyya, “Simurgh: A Framework for Effective Discovery, Programming, and Integration of Services Exposed in loT”, International Conference on Recent Advances in Internet of Things, pp. 1-6, Apr 2015. 13. M. Aziez, S. Benharzallah and H Bennoui, “An Ontology based Context Model for the Discovery of IoT Services in the Internet of Things”, International Conference on Mathematics and information Technology, pp. 209-213, Dec 2017. 14. H. Moeini, I. L. Yen and F. Bastani, “Routing in IoT Network for Dynamic Service Discovery”, 23rd International Conference on Parallel and Distributed Systems, pp. 360-367, Dec 2017. 15. J. Kim and J.W. Lee, “OpenIoT: An Open Service Framework for the Internet of Things”, IEEE world forum on internet of things, pp. 89-93, Mar 2014. 16. Pandiarajan, Sudhakar, and V. M. Yazhmozhi. "Semantic Search Engine Using Natural Language Processing." Advanced Computer and Communication Engineering Technology. Springer, Cham, pp. 561-571, 2015. 17. Ma, Chao, M. Song, K. Xu, X. Zhang, "Web Service discovery research and implementation based on semantic search engine." 2010 IEEE 2nd Symposium on Web Society. IEEE, pp. 672-677, Aug 2010. 18. El-gayar, M. M., N. Mekky, and A. Atwan. "Efficient proposed framework for semantic search engine using new semantic ranking algorithm." International Journal of Advanced Computer Science and Applications 6.8, Aug 2015. Authors: Kavitha B N, K Srinivasa Rao, Nagabhushana C S

Paper Title: Some Degree-based Connectivity Indices of Tadpole Graph

Abstract: Zagreb indices (thought this paper we denote ZbI) a well-known concept introduced in 1972 by I.Gutman and N.Trinajstic denoted asM_1 (G)mathematically to study chemical compounds at molecular level. The first two hyper-ZbI of G denoted HM_1 (G) and HM_2 (G) are well established. In this paper we determine the first ZbI and second ZbI and their polynomial for the Tadpole graph. Keyword: Hyper-Zagreb indices, Tadpole graph.

References: 1. B. Chaluvaraju, H.S. Boregowda and S.A. Diwakar, Zagreb indices and their polynomials of certain classes of windmill graphs, submitted. 2. B. Zhou and N. Trinajstic, On a novel connectivity index, J. Math. Chem.46(2009)1252-1270. 3. E. Estrada, L. Torres, L. Rodriguez and I. Gutman, An atom-bond connectivity index: Modelling the enthalphy of formation of alkanes, Indian J. Chem. 37A (1998)849-855. 4. G.H Fath-Tabar, Zagreb polynomial and Pi Indices of some Nano Structures, Digest Journal of Nanomaterials and Biostructures, 4(1)(2009), 189-191. 5. G.H. Fath-Tabar, old and new Zagreb indices of graphs, MATCH communications in Mathematical and Computer chemistry, 94. 65(2011), 79-84. 6. G.H. Shirdel, H. Rezapour and A.M.Sayadi, The hyper-Zagreb index of graph operations, Iran J.Math Chem.4(2)(2013), 213-220. 497-501 7. M. Randic, On characterization of molecular branching, J. Am. Chem. Soc.,97(1975) 6609-6615. 8. M.R.Farahani, Computing the hyper-Zagreb index of hexagonal nanotubes, J. Chem.Mat.Res. 2(1)(2015)16-18. 9. M.R. Farahani, M.R. Rajesh Kanna and R. Pradeep Kumar, on the hyper-Zagerb indices of some nanostructurs, Asain Academic Research J. Multidisciplinary, 3(1)(2007),1-58. 10. M.R. Farahani, M.R. Rajesh Kanna and R. Pradeep Kumar, on the hyper-Zagerb indices of some nanostructurs, Asain Academic Research J. Multidisciplinary, 3(1)(2016),115-123. 11. J.A.Gallian, Dynamic Survey DS6: Graph Labeling, Electronic J.Combin,DS6(2007),1-58, Jan 3,2007. 12. W. Gao, M.K Jamil, M. R. Farahani, The hyper-Zagreb index and some graph operations, J. Appl. Math. Comput.(2016)1-13. 13. I Gutman, Degree-based topological indices, Croat. Chem. Acta.86(2013), 351-361. 14. I.Gutman K.C. Das, The first Zagreb indices 30 years after, MATCH Commun.Math.Compu. Chem. 50(2004), 83-92. 15. I.Gutman, V.R. Kulli, B. Chaluvaraju and H.S. Boregowda, On Banhatti and Zagreb Indices. J.Int. Math. Virtual Insst.7(2017), 53-67. 16. I.Gutman and N.Trinajstic, Graph Theory and molecular obtains, Total π-electron energy of alternant hydrocarbons, Chem.Phys.Lett.17(1972),535-538. 17. V.R.Kulli, College Graph Theory, Vishwa International Publications, Gulbarga, India(2012). 18. V.R.Kulli, B. Chaluvaraju and H. S. Boregowda, Some degree based connectivity indices of Kulli cycle windmill graph, South Assain J.Maths6(6), 263-268. 19. V.R.Kulli, B. Chaluvaraju and H.S. Boregowda, computation of connectivity indices of Kulli path windmill graph, TWMS J. Appl. Eng.Math., to appear(2017). 20. R.Todeschini, V.Consonni Molecular Dercriptors for Chemoinformatics, Wiley-VCH, Weinheim(2009). Authors: Mithun H R, Suchitra M

Paper Title: An Efficient Neural Network Model for the Identification of Stress using Electrocardiogram

Abstract: People are facing numerous pressures in their daily routine in the latest society. Stress has traditionally has been described as action from a calm state to an emotional state in order to preserve the integrity of organism. Stress observation is very important for mental wellbeing and early identification of stress 95. related disorders. Stress is to learn the body response in stressful state, whenever the body reaction is activated that means the heart rate and blood pressure will raise and several hormones enter our bloodshed. These 502-507 hormones and bodily changes may increases our performances to a particular extent. Everyone's response to stress is discreet, and not all stress is bad. Someone may discover a significant condition of pressure to be enjoyable, while others may find it stressful. However, individuals also have different stress symptoms. stress area can also recognize using frequency and excitation of a speech signal, Since the biomedical signals are consistently related to central nervous system, therefore physiological parameters are the best way to understand the human emotions.The present work is focused on stress identification from Electrocardiogram using ECG physiologic net database, then entire environment of ECG signal characteristics i.e. mean heart rate variability (HRV), standard deviation of all R-R interval (SDNN), square root mean of the sum of the square difference between R-R interval (RMSSD) and number of consecutive R-R interval variations greater than 50ms (NN50), these features are extracted using Pan-Tompkins algorithm, then it is trained and validated to machine learning using back-propagation algorithm in neural network model. With the help of these features (mean HRV, SDNN, RMSSD and NN50), the study can be analyzed whether a person is under stress or not. Thus how the suggested technique provides the subjective information which helps the doctor to find out whether the person is under stress or not. Keyword: Human emotions, Physiological signals, Pan-Tompkins algorithm and Neural Network.

References: 1. Jennifer A Healey and Rosalind W Picard. Detecting stress during real-world driving tasks using 2. physiological sensors. Intelligent Transportation Systems, IEEE Transactions on, 6(2):156–166, 2005. H SELYE. The stress of life. New York: McGraw-Hill, 1956. 3. Tarani Chandola, Eric Brunner, and Michael Marmot. Chronic stress at work and the metabolic syndrome: prospective study. Bmj, 332(7540):521–525, 2017. 4. Andreas Riener, Alois Ferscha, and Mohamed Aly. Heart on the road: Hrv analysis for monitoringa driver’s affective state. In Proceedings of the 1st International Conference on Automotive User Interfaces and Interactive Vehicular Applications, pages 99– 106. ACM, 2009, 5. David F Dinges, Robert L Rider, Jillian Dorrian, Eleanor L McGlinchey, Naomi L Rogers, Ziga Cizman, Siome K Goldenstein, Christian Vogler, Sundara Venkataraman, and Dimitris N Metaxas. Optical computer recognition of facial expressions associated with stress induced by performance demands. Aviation, space, and environmental medicine, 76(6):B172–B182, 2015. 6. Leon JM Rothkrantz, Pascal Wiggers, Jan-Willem A van Wees, and Robert J van Vark. Voice stressanalysis. In International conference on text, speech and dialogue, pages 449–456.Springer,2014. 7. Akane Sano and Rosalind W. Picard ”Stress Recognition using Wearable Sensors and Mobile Phones” 2013 IEEE DOI 10.1109/ACII.2013.117. 8. Rifat Shahriyar1, Md. Faizul Bari2, Gourab Kundu3, Sheikh Iqbal Ahamed4, and Md. Mostofa”Intelligent Mobile Health Monitoring System (IMHMS)” International Journal of Control and Automation Vol.2, No.3, September 2009. 9. Jongyoon Choi and Ricardo Gutierrez-Osuna” Using Heart Rate Monitors to Detect Mental Stress ” 2009 IEEE Body Sensor Networks, DOI 10.1109/P3644.12. 10. Sankhadip Saha, Papri Nag, Mrityunjay Kr. Ray ”A Complete Virtual Instrument for Measuring and Analyzing Human Stress in Real Time ”2014 IEEE International Conference on Control, Instrumentation, Energy Communication(CIEC). [11] Jongyoon Choi, Been Ahmed, Ricardo GutierrezOsuna Development and Evaluation of an Ambulatory Stress Monitor Based on Wearable Sensors IEEE Transactions On Information Technology In Biomedicine, Vol. 16, No. 2, March 2012. 11. L. Clifton, D.A. Clifton, Marco A. F. Pimentel, J. Peter, Predictive monitoring of mobile patients by combining clinical observations with data from wearable sensors IEEE journal of biomedical and health informatics, vol. 18, no. 3, may 2014. 12. Subhas Chandra Mukhopadhyay, Fellow Wearable Sensors for Human Activity Monitoring: A Review IEEE Sensors Journal,Vol.15,No.3,March2015. 13. B. Cinaz, B. Arnrich, R. La Marca, G. Tröster Monitoring of mental workload levels during an everyday life office-work scenario Personal Ubiquitous Comput., 17 (2) (2013), pp. 229-239, 14. S. Mika, G. Ratsch, J. Weston, B. Scholkopf, K. Mullers, Fisher discriminant analysis with kernels, in: Neural Networks for Signal Processing IX: Proceedings of the 1999 IEEE Signal Processing Society Workshop (Cat. No. 98TH8468), 15. J. Wijsman, B. Grundlehner, H. Liu, J. Penders, H. Hermens Wearable physiological sensors reflect mental stress state in office- like situations 2013 Humaine Association Conference on Affective Computing and Intelligent Interaction, IEEE(2013),pp. 600605 16. K. Palanisamy, M. Murugappan, S. YaacobMultiple physiological signal-based human stress identification using non-linear classifiers Electron. Electr. Eng., 19 (7) (2013), pp. 80-85 17. P. Melillo, M. Bracale, L. PecchiaNonlinear heart rate variability features for real-life stress detection. Case study: students under stress due to university examination Authors: Amrutha H, Rupesh K C

Paper Title: ABB 800xA applications in Process Control of a Stirred Reactor

Abstract: The ABB industrial extended automation system 800xA gives us to access and organize all plant information in a single application. The compact control builder is required to control a stirred reactor with the

96. ability to process several liquid raw materials. This paper provides a functional design specification for designing an industrial stirred reactor and programming the AC 800M controller. The 800xA system gives a 508-511 reliable, secure and control environment with all the built-in security features. The control process of the stirred reactor is simulated using ABB 800xA simulation software. Keyword: Control builder, Stirred reactor, AC 800M controller, 800xA system.

References: 1. [1 Introduction to system 800xA-3BUS095072 2. [2] System 800xA operations & engineering workplace configuration-3BSE030322 3. [3] System 800xA control AC 800M configuration- BSE035980 4. [4] Smith, R.M (2005) Chemical Process: Design and Integration, John Wiley & Sons, chichester. 5. [5] Houfar , F: Salah shoor, K. (2008). Adaptive control of CSTR using Feedback Linearization Based on Grey – Box Modeling , proceeding of FEEE International confe. 6. [6] Adaptive control systems : techniques and applications by V.V. chalam : 34 –98 7. [7] Srinivas Palanki , Soimitri Kolavennu , (2003). Simulation of control of CSTR process int. J. Engng Ed. Vol. 19 No 3, PP 398] Authors: Sujatha Kumari B A, Chiranth N L, Pooja P

Paper Title: Android Chat Application Development using AWS

Abstract: Online chatting is a kind of communication that is done over the Internet, which uses an online chat application to it. The online chatting offers the users to experience real-time conversation with the people who are located geographically in a different location that is it offers real-time transmission of messages from one person to other. Chat messages are usually short so that the other participant responds to them quickly. Thereby, it makes the users of the online chatting app, feel the chat like a real-time conversation. The online chat application allows the user to address the single message to an individual receiver or multiple receivers that is by using the point to point communication and multicast communication techniques. All these parameters must be considered while designing a chat application along with these parameters the other important parameter that should be considered is the security. There is a growing need for providing security for the mobile chat applications, with a large user number it is very important for a chap application to provide all security for the data they store and transmit for better resistance to cyber-attacks. So to provide the security all the messages that are being transmitted and the data stored in the database must be encrypted. For the storage of the user's details and their data, the AWS (Amazon Web service) is used. AWS is a cloud platform that provides several IT 97. infrastructure like database, SQL, virtualization and many more. It allows storing data from the online

application and maintains all the user's detail which helps in for the registration and login of the user to the 512-517 online chat application. Keyword: cyber-attacks; AWS; cloud; SQL; virtualization.

References: 1. Android studio developer link, https://developer.android.com/studio/features 2. Amazon web service providers, https://aws.amazon.com/about-aws/ 3. L.T. Duffy, DoD collaboration and chat systems: Current status and way ahead, in: Proceedings of the International Conference on Semantic Computing, IEEE Computer Society, 2008, pp. 573–576. 4. Paczkowski, J.: WhatsApp: Bigger Than Twitter. Online. All Things D (April 2013), http://allthingsd.com/20130416/whatsapp- bigger-than-twitte/ 5. E.N. Forsyth, C.H. Martell, Lexical and discourse analysis of online chat dialog, in: Proceedings of the International Conference on Semantic Computing, IEEE Computer Society, 2007, pp. 19–26 6. reenwald, G.: English NSA Collecting Phone Record of Millions of Verizon Customers Daily. Online. The Guardian (June 2013), http://www.theguardian.com/ world/2013/jun/06/nsa-phone-records-verizon-court-order 7. Purnomosidi, B. (2013). Pengembangan Aplikasi Cloud Computing Menggunakan Node.js. 8. Rahmadini, A. (2013). Pembangunan Sistem Informasi Pengelolaan Inventaris Barang Divisi Pustekin Berbasis Web. Bandung: Politeknik Telkom. 9. Sidik, B. (2011). JavaScipt. Bandung: Informatika. 10. Kiessling, Manuel. 2012. The Node Beginner Book. lulu.com, United Stated. 11. Mardan, Azat. 2012. Practical Node.js: Building Real-World Scalable Web Apps. Appress. 12. Teixeira, Pedro. 2012. Professional Node.js: Building Javascript Based Scalable Software Kindle Edition. Wrox. Authors: Siddhartha Marupati, Murali Krishna Thupurani, Gade Dayakar

Paper Title: Muntingia Calabura: Potential Source of Pharmacologically Active Substances

98. Abstract: Plants are generally measured as origin of natural drugs and are extensively used in herbal formulations. Muntingia calabura (Muntingeaceae) is indigenous to Central America and Southern Mexico It is 518-521 abundantly disseminated throughout Asian countries especially in India. The present research was done on the isolation, pharmacological study of the isolated compounds derived from root heart wood and bark of the root of Muntingia calabura. For this study, six compounds were taken into account and later it was divided into two categories as flavonoids and chalcones. The isolated compounds were further screened for their attributed pharmacological traits. All the compounds screened noticed to possess significant medicinal properties. Keyword: Anti-oxidant, anti-inflammatory, anti-microbial, flavonoids, chalcones.

References: 1. Balandrin, N. F., Kinghorn, A. D., Farnsworth, N. R. in Human Medicinal Agents from Plants Kinghorn, A. D., Balandrin, M. F., Eds., ACS Symposium Series 534, 1993, pp. 2-12. 2. Buss A.D., B. Cox and R. D. Waigh, in Burger’s Medicinal Chemistry and Drug Discovery, Sixth Edition, Volume 1: Drug Discovery, ed. D. J. Abraham, Wiley, Hoboken, New Jersey, 2003, pp 847–900. 3. Tickle I, A. Sharff, M. Vinkovic, J. Yon and H. Jhoti, High-throughput protein crystallography and drug discovery Chem. Soc.Rev., 2004, 33, 558–565. 4. Muchmore SW and P. J. Hajduk, Crystallography, NMR and virtual screening tools for drug discovery, Curr. Opin. Drug Discovery Dev.,2003, 6, 544–549. 5. Zakaria ZA, Mohd Nor Hazalin NA, Mohd Zaid SNH, Abdul Ghani M, Hassasn MH, Gopalan HK, ulaiman MR (2007) Antinociceptive, anti-inflammatory and antipyretic effects of Muntingia calabura aqueous extract in animal models, J. Nat Med 61: 443-448. 6. Raman B.V. Raman, A. Sai Ramkishore, M. Uma Maheshwari and T.M. Radhakrishnan, Anti-bacterial activities of some folk medicinal plants of Eastern Ghats, J. Pure and Applied Microbiology., (3), 187-194, 2009., A. Sai Ramkishore, M. Uma Maheshwari and T.M. Radhakrishnan, Anti-bacterial activities of some folk medicinal plants of Eastern Ghats, J. Pure and Applied Microbiology., (3), 187-194, 2009. 7. Magaldi, S., Mata-Essayag, S., Capiles, C.H.D., Perez, C., Colella, M., Olaizola, C., Ontiveros, Y (2004). Well diffusion for antifungal susceptibility testing. Int. J. Infectious Diseases, 8: 39-45. 8. [8] Satoh K. Serum lipid peroxide in cerebrovascular disorders determined by a new colorimetric method, Clinica Chimica Acta., (90), 37-43, 1978. 9. Bouchet, Laurence Barrier and Bernard Fauconneau, Radical scavenging activity and antioxidant properties of tannins from Guiera senegalensis (Combretaceae), Phytotherapy Research., (12), 159–162, 1998. 10. Blois M.S. Antioxidant determinations by the use of a stable free radical, Nature, (29), 1199-1200, 1958. 11. Pellegrini R. Re, N., A. Proteggente, A. Pannala, M. Yang and C. Rice-Evans, Antioxidant activity applying an improved ABTS radical cation decolorization assay, Free Radical Biology and Medicine., (26), 1231-1237, 1999. 12. Sangita Chandra, Priyanka Chatterjee, Protapaditya Dey, Sanjib Bhattacharya, Evaluation of in vitro anti-inflammatory activity of coffee against the denaturation of protein, Asian Pacific Journal of Tropical Biomedicine, 2, 2012, 178-180. 13. Koehn FE, Carter GT . The evolving role of natural products in drug discovery. Nat Rev Drug Discov . 2005 ; 4 : 206 - 220 . 14. Balunas MJ , Kinghorn AD . Drug discovery from medicinal plants. Life Sci . 2005 ; 78 : 431 - 441 . 15. Jih-Jung Chen, Ru-Wei Lin, Chang-Yih Duh, Hung-Yi Huang, Ih-Sheng Chen (2004). Flavones and Cytotoxic Constituents from the Stem Bark of Muntingia calabura, Journal of the Chinese Chemical Society, 51, 665-670 16. Javed intekhab, Mohammad aslam (2009) Isolation of a flavonoid from the roots of Citrus sinensis, Malaysian journal of pharmaceutical sciences, vol. 7, no. 1, 1–8. 17. Donatus Ebere Okwu, Nneka Ukanwa (2010) Isolation and characterization of flavonoids chalcones and anthocynidines from bridelia ferruginea benth, Der Chemica Sinica, 1 (2): 21-28. Authors: P.Nirupama, E. Madhusudhana Reddy Development of Novel Classifying System to Identify the Right Sense of Audio Conversation in Paper Title: Social Networks using Deep Convolution Neural Network Abstract: Social media has paved a new way for communication and interacting with others. The use of social media differs according to the socio-cultural, demographic and psychological aspects of individuals. People chat, share ideas and visual material, and feel that they satisfy their needs of belonging along with the groups they have joined. Social networks is not only a area of freedom where persons express themselves openly or furtively, but also an area where several ways of violence emerge or even a means used for some aspects of violence.. The present research throws light on a few of the regular and trendy methods of abuse and risks faced by the users of social media. Develop a system to identify abusing audio file by an individual on a people/ group based on 99. common language, race, sexual preferences, religion, or nationality. We examine a new model from machine learning, namely deep machine learning by probing design configurations of deep Convolutional Neural 522-525 Networks (CNN) and the impact of different hyper-parameter settings in identifying the negative aspects in social media. Deep CNN automatically generate powerful features by hierarchical learning strategies from massive amounts of training data with a minimum of human interaction or expert process knowledge. An application of the proposed method demonstrates excellent results with low false alarm rates for Twitter data. Keyword: The present research throws light on a few of the regular and trendy methods of abuse and risks faced by the users of social media. References: 1. Abdel-Hamid O, Mohamed A R, Jiang H, et al. Applying Convolutional Neural Networks con cepts to hybrid NN-HMM model for speech recognition[C]// Acoustics, Speech and Signal Proces sing (ICASSP), 2012 IEEE International Conference on. IEEE, 2012:4277 - 4280. 2. P.Nirupama, E. Madhusudhana Reddy, “Constrained k-Means with Dictionary Synonyms to Detect Abusing Messages in Social Network” International Journal of Pure and Applied Mathematics, ISSN: 1311-8080 (printed version), [Impact Factor: 7.19]; ISSN: 1314-3395 (on-line version), Volume 118 No. 17 2018, pp: 723-733. 3. P.Bhaskar, E.Madhusudhana Reddy, "Able Machine Learning Method for classifying Disease-Treatment Semantic Relations from Bio-Medical Sentences", International Journal of Recent Research Aspects (ISSN: 2349 – 7688) [Impact Factor: 2.08], Vol. 5 Issue. 1, March 2018, PP 223-226. 4. Kereliuk C, Sturm BL, Larsen J (2015) Deep learning and music adversaries. IEEE Trans Multimed 17(11):2059–2071. 5. Umberson, D., Crosnoe, R., & Reczek, C. (2010). Social relationships and health behaviors across the life course. Annual Review of Sociology, 36, 139–157. 6. Umberson, D. & Montez, J. (2010). Social relationships and health: A flashpoint for health policy. Journal of Health and Social Behavior, 51(Suppl), S54-S66. 7. Utz, S. & Beukeboom , C.J. (2011). The role of social network sites in romantic relationships:effects on jealousy and relationship happiness. Journal of Computer-Mediated Communication, 16, 511–27. 8. Waite, L. (1995). Does marriage matter? Demography, 32, 483– 508. Authors: Kavuluru Venugopal, Abhilasha Ambatipudi Huge Dam and Power Construction Projects A Threat to Natural Environment, Alternatives-The Paper Title: Role of Human Resource Development (HRD) Abstract: The contribution of HRD to any industry for its growth and success cannot be overstated and hence same is the case with construction sector. Simultaneously the role of HRD in regulating pollutants of huge construction projects impacting environment and biodiversity is laudable. If advices and services of HRD are rightly adopted the negative impact on the same can be minimized. In this paper it is emphasized for setting up of alternatives to huge and mammoth construction projects as well as dam hydropower projects for green. Therefore, river environment can be saved for future generations. The involvement of HRD in this area is inseparable. Thus, it has been suggested to policy makers and concerned governments to go for environment friendly designs with the help of HRD for alignment of various departments and better implementation. Keyword: HRD, environment, construction projects, alternatives.

References: 1. Evolution of HRD: by Fredrick H. Harbison, Human Resources as the wealth of nations (New York Oxford University Press, 1973) p3 100. 2. Environmental Impacts in the Construction of Dams: by subhojit paul, H.Bhasker singh, Raj deep Habarika- B.Tech in civil engineering, Godavari Institute of Engineering and Technology. AP India (www.ijrd.com volume 2 issue 11 Nov 2013 ISSN: 2278-0211) 526-529 3. Adoption of Environmental Practices on Construction Sites. De Montfort University Leicester-UK by Natasha IIse Rothbucher Thomas; Costa-Depatment of Construction University Federal Bahia-Salador-BA-Brazil (online article) 4. Construction and Environment by Eng. Rehan Ahmed, Head, waste disposable unit, Environmental control Directorate, Public Commission for the Protection of Marine Resources; Environment and Wildlife, Kingdom of Bahrain. 5. Alternatives to Dams: The Free Flow Kinetic Hydropower Systems: source online, Hydrate life-May 15 2012, by Lynn Henning. 6. Beyond Dams: Options and Alternatives: A Report by American Rivers, International Rivers Network;by Elizibeth Brink of International Rivers Network and Serena Mc Clain and Steve Rothert of American Rivers Date May 1 2004. www.americanrivers.org and www.irn.org 7. Human Resource Development (Text and Cases) by Dr Ram Kumar Balyan and Suman Balyan. Himalaya Publishing House, India 8. The Environmental Impacts of Construction Projects and the Next Steps Forward for the Industry—web source article; e sub – construction software; ported on January 13, 2017 by Tayler. 9. HRM in the Construction of a Sustainable Development Projects: towards successful completion by I. Othman; A. Idrus and M.Napiah, Department of civil engineering, Universiti Teknologi Petronas Perak, Malaysia. WIT Transactions on Ecology and The Environment volume.162, copyright 2012 WIT press. Www.witpress.com. ISSN 1743-3541 (online) doi.10.2495/EID 120161. 10. There are Alternatives to Dams; but we are not talking about them: experts by Subhojit Goswami – Down to Earth-online article December 07.2017. 11. Mockery of Environment Public Hearing of Polavaram Project in Andhra Pradesh-a web based article, Prepared by Anti- Palavaram Joint Front. 12. Report on National HRD Needs of the Kingdom of Bhutan, (HRD in Construction sector, seventh chapter) By The Royal Government of Bhutan, November 2010 Authors: Jagadeesh Kumar Ega, Ambala Nageswara Rao, Kavitha Siddoju, Boggavarapu Jyothi Screening and Evaluation of Multi Drug Resistance Activity of Various 1,2,4-Triazoles Derivatives Paper Title: through in Vitro Anti Tubercular 101. Abstract: Isoniazid (Isonicotinic acid hydrazide, INH) has been significantly used to treat Mycobacterium tuberculosis. Introduction of drugs like INH, Rifmapicin, Pyrazinamide and Streptomycin resulted in rapid 530-534 decline in TB cases worldwide. Several factors lead to the emergence of resistant strains of Mycobacterium tuberculosis. HIV infection also contributed to the escalating burden of tuberculosis. In the present examination 1,2,4-triazole subordinates were planned, incorporated and exposed to in vitro antitubercular screening against Mycobacterium tuberculosis H37Rv.Lipophilicity (log P) of the compounds were also determined to establish a correlation ship between physicochemical properties and antitubercular activity. Mtb CYP121 and CYP125 are considered to be potential targets for drug design. Binding study of azoles with these enzymes have also been reported. However, enough reports are not available on Mtb CYP-ligand binding requirements to improve the MIC of Azole based antitubercular agents. Hence we conducted the docking study of our synthesized triazoles against both Mtb CYP 121 and CYP125 to establish a correlationship between antitubercular activity and receptor binding interactions. In this paper we discuss about the molecular docking studies of the synthesized mercapto and benzthio 1,2,4-triazole compounds 13-18 with different enzyme target which we have employed. Keyword: 1,2,4-triazoles , Mycobacterium tuberculosis, GOLD, GLIDE CYP121 and CYP125.

References: 1. Bouzard D, Dicesare P, Essiz M, Jacquet J P, Ledoussal B, Remuzon P, Kessler R E & Fung Tome J, J Med Chem, Volume 35, (1992), pp.518. 2. Roma G, Braccio M D, Grossi G, Mattioli F & Ghia M, Eur J Med Chem, Volume 35, (2000) , pp.1021. 3. Gorecki D K J & Hawes E M, J Med Chem, Volume 20, (1977) , pp.124. 4. Sriram D, Senthilkumar P, Dinakaran M, Yogeeswari P & Nagaraja V, J Med Chem, Volume 50,(2007) , pp.6232. 5. Massari S, Daelemans D, Barreca M L, Knezevich A, Sabatini S, Cecchetti V, Marcello A, Pannecouque C & Tabarrini O, J Med Chem, Volume 53, (2010) , pp.641. 6. Badawneh M, Ferrarini P L, Calderone V, & Testai L, J Med Chem, Volume 36, (2001) , pp.925. 7. Marco-Contelles J, Leon R, Rios R, Guglietta A, & Villarroya M, J Med Chem, Volume 49,(2006), pp.7610. 8. Tsuzuki Y, Tomita K, Sato Y, Kashimoto S & Chiba K, Bioorg Med Chem Lett, Volume 14,(2004), pp.3189. 9. Xia Song M, Zheng C J, Deng X Q, Sun L P, Wu Y, Hong L, Li Y J, Liu Y, Wei, Z Y, Jin M J & Piao H R, Eur J Med Chem, Volume 60, (2013), pp.376. 10. Barbuceanu S F, Almajan G L, Saramet I, Draghici C, Tarcomnicu A I & Bancescu G, Eur J Med Chem, Volume 44, (2009), pp.4752. 11. Gurupadaswamy H D, Girish V, Kavitha C V & Khanum S A, Eur J Med Chem, Volume 63, (2013), 536. 12. Sharma P K, Chandak N,Kumar P, Sharma C & Aneja K R, Eur J Med Chem, Volume 46, (2011), pp.1425. 13. Al-Omary F A M, Hassan G S, El-Messery S M & El-Subbagh H I, Eur J Med Chem, Volume 47, (2012), pp.65. 14. Mahran A M, Ragab S Sh, Hashem A I, Ali M M & Nada A A, Eur J Med Chem, Volume 90, (2015), 568. 15. Indian Pharmacopoeia, Microbiological assay and test, ed. Vol. II,(1996), A-100. 16. T.J Mosmann. J Immunol Meth. (1983), Volume 65, pp. 55-63. 17. Virender Singh & Ravi Shankar, Bioorganic Chemistry, Volume 71, (2017), pp.30-54. 18. Rafi Haider , European Journal of Medicinal Chemistry, Volume 125, (2017), 143-189. 19. Mikhail A Prezent & Igor V Zavarzin, Mendeleev Communications, Volume 27, Number 2, (2017), pp.169-171. 20. Jagadeesh .E , Pradeep Kumar. Ch, International Journal of Modern Trends in Engineering and Research . Volume 4, Number 11, (2017), pp. 40-45. 21. Jagadeesh kumar.E , Kumara Swamy.J , Kavitha .S, International Journal of Modern Trends in Engineering and Research . Volume 04, Number 11, (2017), pp. 215-217.iciently testing technical. Authors: Boggavarapu Jyothia, Suryadevara Kalpanab, Nannapaneni Madhavi

Paper Title: Biological Activity of Phenothiazine Sulfonamides

Abstract: Background: Antibacterial activities in “dimethylsulfoxide (DMSO)” were executed by the broth dilution method utilizing nutrient agar. By using the agar cup bioassay method antifungal activities were calculated with “Clotrimazole” as the standard. The novel compounds 1a-j have been evaluated in vitro for their antibacterial activity by “Gram-positive bacteria namely Bacillus subtilis, Bacillus sphaericus and Staphylococcus aureus and three Gram-negative bacteria Pseudomonas aeruginosa”, “Klebsiella aerogenes and 102. Chromobacterium violaceum”. All ten compounds were analysed for their antifungal activity against five test “organisms Aspergillus niger, Chrysosporium tropicum, Rhizopus oryzae, Fusarium moniliforme and Curvularia 535-537 lunata”. Among the isolated compounds 1d and 1e evinced dynamic Movement towards both gram certain What's more gram negative microscopic organisms. Mixes 1d Also 1f uncovered useful antifungal action. All the secluded compounds were scrutinized for their antibacterial and antifungal activities and most of the compounds manifested remarkable anti bacterial and anti fungal activity. Keyword: phenothiazine, sulfonamide, antibacterial, antifungal activity.

References: 1. Venkataraman, k. “The chemistruofsynthetic dyes”, Vol. II, pp. 791. Academic Press, inc., Newyork 1952. 2. Findlagy,G. M.: “Recent advances in Chemotherapy”, 3rd edition, vol. I, pp. 124. Theblakiston Company, Philadelphia, 1950. 3. Halpern, B. N.: “Compt. Rend. Soc. Biol”. 140, 363, 1946. 4. Halpern, B. K., and Ducrot, R.: Compt. Rend. Soc. Biol. 140, 1946, pp 361. 5. Vanderbrook, M. J., Olson, k. J., Richmon&di, R., and Iuizenema, H.: J. Pharmacol. Exptl. Therap. 1948, 94, 19i. 6. Burger, A.: Medicinal chemistry, vol. I, 1951, pp. 456. Interscience Publishers, inc., NewYork . 7. Friend, D. G., and Cummins, j. f.: J. Am. Med. Assoc. 163, 1953,pp481. 8. Murphy, C. M.,Rainer, H., and Smith, N. L.: Anal. Chem. 42, 1950, pp2479. 9. (a) Schmidt, M.; Teitge, M.; Castillo M. E.; Brandt, T.; Dobner. B.; Langner, A. Arch. Pharm. (Weinheim) 2008, 341, pp 624. (b) Bissi, A.; Meli, M.; Gobbi, S.; Rampa, A.; Tolomeo, M.; Dusonchet, L. Bioorg. Med. Chem., 16, 2008, pp 6474. 10. Gabriela P. Sarmiento,a Graciela Y. Moltrasio,a and Albertina G. Moglionib*“An alternative synthetic route to the neuroleptic compound Pipothiazine”. ARKIVOC (vii), 2009, pp33-41. 11. A. Alsughayer, A.Z.A. Elassar, S. Mustafa, F. Al Sagheer, “Synthesis, structure analysis and antibacterial activity of new potent sulfonamide derivatives.”J. Biomater. Nanobiotechnol. 2, 2011,pp143. 12. F. Zani, P. Vicini, “Antimicrobial activity of some 1, 2-benzisothiazoles having a benzenesulfonamide moiety.” Arch. Pharm. 331, 1998, pp 219–223. 13. Ö. Güzel, A. Innocenti, A. Scozzafava, A. Salman, C.T. Supuran, Carbonic anhydrase inhibitors. “Phenacetyl-, pyridylacetyl-and thienylacetyl-substituted aromatic sulfonamides act as potent and selective isoform VII inhibitors”. Bioorg. Med. Chem. Lett. 19, 2009, pp 3170–3173. 14. Scozzafava, T. Owa, A. Mastrolorenzo, C.T. Supuran, “Anticancer and antiviral sulfonamides”. Curr. Med. Chem. 10, 2003, pp 925–953. 15. T.H. Maren, “Relations between structure and biological activity of sulfonamides”. Annu. Rev. Pharmacol. Toxicol. 16, 1976, pp 309–327. 16. N.S. El-Sayed, E.R. El-Bendary, S.M. El-Ashry, M.M. El-Kerdawy, “Synthesis and antitumor activity of new sulfonamide derivatives of thiadiazolo [3, 2-a] pyrimidines”. Eur. J. Med. Chem. 46, 2011,pp 3714–3720. 17. A.K. Tiwari, A.K. Mishra, A. Bajpai, P. Mishra, R.K. Sharma, V.K. Pandey, V.K. Singh, “Synthesis and pharmacological study of novel pyrido-quinazolone analogues as anti-fungal, antibacterial, and anticancer agents”. Bioorg. Med. Chem. Lett. 16, 2006, pp 4581–4585. 18. S. Yotphan, L. Sumunnee, D. Beukeaw, C. Buathongjan, V. Reutrakul, “Iodine-catalyzed expeditious synthesis of sulfonamides from sulfonyl hydrazides and amines”. Org. Biomol.Chem. 14, 2016, pp 590–597. 19. National Committee for clinical Laboratorystandards(NCCLS)standard for dilution antimicrobial susceptibility tests for bacteria, which grows aerobically; Nat.Comm.clini Lab stands, Ltd, Villanova, 1982, pp242-286. 20. E. Margery Linday, “Practical Introduction to Microbiology E. & F.N. Spon Ltd.” London, 1962, pp 177. Authors: Sunil B. Kapadia1, Venu V. Madhav

Paper Title: NPAs in Indian Scheduled Commercial Banks: Origination and Impact on Economy

Abstract: Mounting non-performing assets (NPAs) in the Indian banking sector has been drawing the attention of policymakers, economists, academicians, and other stakeholders. More particularly, during the last ten years, the rise in NPAs of banks has sent the alarming bell both to the Reserve Bank of India and the Government. Per a few studies, one of the root cause for the huge and gigantic rise in NPAs is the 2008 global financial crisis besides lending to Priority sector. The necessity of provisions and high funding costs has also caused an increase in NPAs while bringing down the profitability of banks. Hence, the consequent impact of NPA includes poor recycling of funds due to the weak deployment of credit which potentially could thwart the financial soundness of the credit system. Higher NPAs not only shakes the confidence of investors, depositors, lenders, etc., but also imperil liquidity, solvency position, profitability, capital adequacy ratio, and so on.A few measures that are required for management of NPAs like the establishment of monitoring department, reformulation of banks’ 103. credit appraisal techniques, among others. The paper examines the trends of NPAs and the factors responsible for mounting NPAs in the banking sector from non-identical aspects. The use of secondary sources of data from 538-541 authentic websites of RBI, Finance Ministry, and Banks has been made. Keyword: Non-performing assets, Credit appraisal, Priority sector lending, 2008 global financial crisis

References: 1. Poongavanam, (2011). “NPAs: Issues, Causes and Remedial Solution.” AJMR 2. Prasad and D. Veena, (2011). “NPAs reduction strategies for Commercial Banks in India.” IJMBS 3. M. Rao & A. Patel, (Mar-2015). “A study on NPAs management in banks.” JMS, Vol. 5 No.1 4. P T Kumar (2013). “A comparative study of old private banks and foreign banks.” 5. Ernst & Young, (2002). “Non-Performing Loan Report.” New York 6. Shyam Bhati, (Dec-2006). “Trust between Branch Managers and Loans Officers of Indian banks.” IRBRP, Vol. 2, No. 4 7. Siraj K.K. and P. Sudarsanan Pillai, (2012). “A study on the performance of NPAs of Indian banking during post millennium period.” IJBM 8. Ramu, N., (2009). “Dimensions of NPAs in Urban Co-op Banks in Tamilnadu.” GBR, Sage Publications 9. Parul Khanna, (Apr-Jun, 2012). “Managing NPAs in Commercial Banks.” Gian Jyoti E-Journal Vol. 1, Issue 3 10. Vivek R. Singh, (Mar-2016). “A study of NPAs of Commercial Banks and its recovery in India.” Annual Research Journal of SCMS, Pune. Vol.4 11. Ms. Asha Singh, (Sep-2013). “Performance of NPAs in Indian Commercial Banks.” IJMFSMR, Vol. 2, No. 9 12. Dr. Sushama Yadav, (Jan-2014). “NPAs: Rising trends and Preventive measures in Indian banking sector.” IJARCMS Vol. 2, Issue-1 13. Samir & D. Kamra (Jun-2013). “A comparative analysis of NPAs of selected commercial banks in India.” IJM Vol. 3, No. 1 14. S. Das & A. Dutta (Nov-2014). “A study on NPAs of public sector banks in India.” IOSR-JBM Vol. 16, Issue 11 15. RBI Bulletin, 1999 16. RBI published data for 2015-16 17. Financial Stability Report, RBI (Dec-15 & Dec-17) 18. Handbook of Statistics on the Indian Economy, RBI (2017-18) 19. Published annual reports of select PSBs and Private Banks (2016-17 and 2017-187) CRISIL Report, Aug-2017 Authors: P.Ratnaraju, V.V.Madhav

Paper Title: Perception and Satisfaction toward Mutual Fund Investors in Andhra Pradesh

Abstract: The present study has been emphasized on the investor’s attitude towards mutual fund investments in Andhra Pradesh. The study has categorized the investors in small and large based on the investment criteria. The primary data has been collected and examined with the help of statistical tool of discriminant analysis. The study result stated that the past performance, liquidity and brand equity are the key factors which are playing the vital role in selection of mutual fund schemes for the investments. The investors’ expectations have been analyses and the result reveals that the stable portfolio with returns performance. This paper is useful to the stake holders of

104. mutual fund industry such as asset management companies, investors, regulators and fund managers. Keyword: Asset management company, Attitude, Expectations, Investors, Mutual funds and Past 542-544

References: 1. Ronay and Kim (2006), A study on investment preference in mutual fund at Namakkal City, International Journal of Humanities and Social Science Research, ISSN: 2455-2070 Volume 2; Issue 2; February 2006; Page No. 33-36 2. Subhash Chander and Jaspal Singh (2006), Performance Evaluation of Mutual Funds: A Study of Selected Diversified Equity Mutual Funds in India, International Conference on Business, Law and Corporate Social Responsibility (ICBLCSR'14) Phuket (Thailand). Sorescu and Subrahmanyam (2006), Liquidity Risk and Mutual Fund Performance, Journal of Financial Economics 98(1), 54–71. 3. Bodla and Garg (2007), Performance of Equity Schemes of Mutual Funds in India: An Analysis Across Fund Characteristics, https://www.researchgate.net 4. Hanumantha Rao and Vijay Kr. Mishra, (2007), Performance of Private Mutual Funds in India (Comparison of AUM between Mutual Fund Industry and Private Mutual Funds), International Journal on Arts, Management and Humanities, 3(1):1-4 (2014), ISSN No. (Online): 2319–5231. Authors: Uroosa Shafi, Sugandha Sharma Ovarian Cancer Detection in MRI Images using Feature Space and Classification Method (ABC- Paper Title: CNN) Abstract: The most common disease has an adverse effect on women is ovarian cancer. The female generative organ that is placed in the pelvis is similar to the size of the almond. The production of eggs for the reproduction is the part of the ovaries. Ovarian cancer mainly started from the ovaries, ovaries are the reproductive glands that mainly found in the women. The main aim of this paper is detection of the ovarian cancer and is done in stage wise manner. At every stage the cancer images are trained and cancer is detected using ABC- Convolutional Neural Network. The quality of the MRI cancer images are enhanced and selected in accordance to the performance parameters which are accuracy, error rate and processing time. The images are selected by 105. extracting the features to increase the accuracy rate and reduce the cost and the time of the processing. The MRI cancer images are used for detection, classification and extraction algorithms. The selection of the extracted 545-551 features of the medical images is done through the optimized ABC algorithm. After the extracting features in medicinal images using kernel PCA method. The selected features removes zero values and then optimized the feature vector .The classification process based on the convolutional neural network for training and testing the cancer images in each stage also detecting the quality of the cancer images. The method is evaluated using performance parameter which is signaling to noise ratio. The dataset is created by collecting the medical images from skims (sher-i-kashmir institute of Medical sciences) and Hospital Kashmir. The number of cancer images used 250. There is two kind of images used. Individual is normal image means without or cancer free images the 2nd one are malignant cancer images. Complete number of images used 250 which have 50 medical images of each dataset (Normal, Stage I, Stage II, Stage II and Stage III). The dataset pictures usually include the MRI scan image of PELVIS. The detection and selection of the images through MRI cancer images is in stage wise approach. The quality of the cancer images is improved with peak signal to noise ratio. The evaluated parameters used to increase the accuracy rate and decrease the time of processing. Keyword: Ovarian cancer, Extracting features, Convolutional Neural Network, Detection and Classification.

References: 1. Vine, M. F., Calingaert, B., Berchuck, A., &Schildkraut, J. M. ,”Characterization of prediagnostic symptoms among primary epithelial ovarian cancer cases and controls”, Gynecologic oncology, 90(1), 2003, 75-82. 2. 2. Nawgaje, D. D., & Kanphade, R. D. ,”Hardware Implementation of Genetic Algorithm for Ovarian Cancer Image Segmentation”, Proceedings of the International Journal of Soft Computing and Engineering (IJSCE), 2(6), 2012, 304-306. 3. 3. Smith, L. H., Morris, C. R., Yasmeen, S., Parikh‐Patel, A., Cress, R. D., & Romano, P. S. ,”Ovarian cancer: can we make the clinical diagnosis earlier?. Cancer”,, 104(7), 2005, 1398-1407. 4. 4. Goff, B. A., Mandel, L. S., Melancon, C. H., &Muntz, H. G. ,”Frequency of symptoms of ovarian cancer in women presenting to primary care clinics”, Jama, 291(22), 2004, 2705-2712. 5. 5. Cokkinides, V., Albano, J., Samuels, A., Ward, M. E., &Thum, J. M. ,”American cancer society: Cancer facts and figures”, Atlanta: American Cancer Society, 22(1),2005, pp. 123-189. 6. 6. Jemal, A., Tiwari, R. C., Murray, T., Ghafoor, A., Samuels, A., Ward, E., ...&Thun, M. J. ,”Cancer statistics, 2004. CA: a cancer journal for clinicians,” 54(1), 2004 8-29. 7. 7. Biesecker, B. B., Boehnke, M., Calzone, K., Markel, D. S., Garber, J. E., Collins, F. S., & Weber, B. L. ,”Genetic counseling for families with inherited susceptibility to breast and ovarian cancer”. Jama, 269(15),1993,1970-1974. 8. 8. Richards, C. S., Ward, P. A., Roa, B. B., Friedman, L. C., Boyd, A. A., Kuenzli, G., ... &Plon, S. E. . Screening for 185delAG in the Ashkenazim. American journal of human genetics, 60(5), 1997, 1085. 9. 9. Bernhardt, B. A., Geller, G., Strauss, M., Helzlsouer, K. J., Stefanek, M., Wilcox, P. M., &Holtzman, N. A.,” Toward a model informed consent process for BRCA1 testing: a qualitative assessment of women's attitudes”, Journal of Genetic Counseling, 6(2), 1997, 207-222. 10. 10. Lerman, C., Narod, S., Schulman, K., Hughes, C., Gomez-Caminero, A., Bonney, G., ...&Fulmore, C.,” BRCA1 testing in families with hereditary breast-ovarian cancer: a prospective study of patient decision making and outcomes”,. Jama, 275(24), 1996, 1885-1892. 11. 11. Struewing, J. P., Abeliovich, D., Peretz, T., Avishai, N., Kaback, M. M., Collins, F. S., & Brody, L. C.,” The carrier frequency of the BRCA1 185delAG mutation is approximately 1 percent in Ashkenazi Jewish individuals”, Nature genetics, 11(2), 1995, 198. 12. 12. Lerman, C., Daly, M., Masny, A., &Balshem, A, “Attitudes about genetic testing for breast-ovarian cancer susceptibility. Journal of clinical oncology”, 12(4),1994, 843-850. 13. 13. Croyle, R. T., Smith, K. R., Botkin, J. R., Baty, B., & Nash, J. ,”Psychological responses to BRCA1 mutation testing: preliminary findings”,. Health psychology, 16(1), 1997, 63. 14. 14. Lerman, C., Kerner, J., Gomez-Caminero, A., Hughes, C., Reed, M. M., Biesecker, B., &Benkendorf, J. L. ,”Controlled trial of pretest education approaches to enhance informed decision-making for BRCA1 gene testing”, Journal of the National Cancer Institute, 89(2), 1997 148-157. 15. 15. Colditz, G. A., Sellers, T. A., &Trapido, E.. “Epidemiology—identifying the causes and preventability of cancer?”,. Nature Reviews Cancer, 6(1), 2006 75. 16. 16. Durfy, S. J., Bowen, D. J., McTiernan, A., Sporleder, J., & Burke, W. ,” Attitudes and interest in genetic testing for breast and ovarian cancer susceptibility in diverse groups of women in western Washington. Cancer Epidemiology and Prevention Biomarkers”,, 8(suppl 1), 1999, 369-375. 17. 17.Vasavi, G., &Jyothi, S. ,” Classification and detection of ovarian cysts in ultrasound images”,In 2017 International Conference on Trends in Electronics and Informatics (ICEI), 2017, (pp. 783-787).IEEE. 18. 18. Yang, J., Kasberg, W. C., Celo, A., Liang, Z., Quispe, K., & Stack, M. S. ,”Post-translational modification of the membrane type 1 matrix metalloproteinase (MT1-MMP) cytoplasmic tail impacts ovarian cancer multicellular aggregate dynamics”, Journal of Biological Chemistry, 292(32), 201713111-13121. 19. 19. Schorge, J. O., Modesitt, S. C., Coleman, R. L., Cohn, D. E., Kauff, N. D., Duska, L. R., & Herzog, T. J. ,” SGO White Paper on ovarian cancer: etiology, screening and surveillance”,Gynecologic oncology, 119(1), 2010, 7-17. 20. 20. Elkhadir, Z., Chougdali, K., &Benattou, M. ,”Intrusion detection system using pca and kernel pca methods”,In Proceedings of the Mediterranean Conference on Information & Communication Technologies 2015, (pp. 489-497).Springer, Cham. 21. 21. Bansal, J. C., Sharma, H., &Jadon, S. S,”Artificial bee colony algorithm: a survey”, International Journal of Advanced Intelligence Paradigms, 5(1-2),2013, 123-159. Authors: Zeeshan Alam, S.K.Sriwas, Atul Kumar Dwivedi, Yatharth Shankar Misra

Paper Title: The Effect of Different Dielectric Constant on Same Microstrip Patch Antenna Design

Abstract: This paper demonstrate the effect of textile material (Jeans) on U.W.B. we all familiar with the information that U.W.B is in between 3.1 to 10.6 GHz, That is assigned by the society of F.C.C (Federal

106. Communication Commission) in 2002.The convoluted design present in this paper, It has designing frequency of 2.4 GHz & we have used IE3D software for simulation. The bandwidth, gain, directivity & efficiency of textile 552-555 antenna are 109%, 6.69dBi, 6.7dBi, 99.6% respectively and bandwidth, gain, directivity, efficiency of reference antenna are 103%, 7.21dBi, 7.28dBi, 99.5% respectively. Here we are deploying line feed method technique for simulation. Keyword: T and Square shaped; IE3D Software, satellite communication; Mobile communication, RADAR communication, U.W.B (Ultra Wide Band).

References: 1. N. Hojjat, F. G. Kharakhili , M. Fardis, G. Dadashzadeh and A. Ahmadi, “Circular Slot With A Novel Circular Microstrip Open Ended Microstrip Feed For Uwb Applications”, Progress In Electromagnetics Research, PIER 68, 161–167,2007 2. B. J. Kwaha, O. N Inyang& P. Amalu, “The Circular Microstrip Patch Antenna – Design And Implementation”,IJRRAS 8 (1) July 2011 3. W. Mazhar; , M. A. Tarar, F. A. Tahir, Shan Ullah, and F. A. Bhatti, “Compact Microstrip Patch Antenna for Ultra-wideband Applications”, PIERS Proceedings, Stockholm, Sweden, Aug. 12{15, 2013 4. M. Z. M. Nor, S. K. A. Rahim, M. I. Sabran, P. J. Soh, G. A. E. Vandenbosch, “Dual-Band, Switched-Beam,Reconfigurable Antenna for WLAN Applications”, IEEE Antennas And Wireless Propagation Letters, Vol. 12,2013. 5. M. Abedian, S. K. A. Rahim, Sh. Danesh, M. Khalily, and S. M. Noghabaei,” Ultrawideband Dielectric Resonator Antenna With WLAN Band Rejection at 5.8 GHz”, IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS, VOL. 12,2013. Authors: Nithin.S.S, L.Padma Suresh

Paper Title: Video Coding of Various Decomposition with Encoding Techniques

Abstract: In a period of past ten years, Compression or coding of video has been elaborated as a vital role in the part of total communication. Multi resolutions techniques play a vital part in the coding of image and video. Wavelet and curve let transform are one of the popular and efficient technique in video coding. In my paper, I am operate to implement various coding based methods with (EWT)empirical wavelet transform, different wavelets ,curvelets with various encoding techniques. They are video coding with EWT and H.264(VEWH), video coding with EWT and LZW(VEWL), video coding with EWT and Huffman with SPIHT(VEWHS), video coding with mexican hat wavelet transform and SPIHT(VMWS), video coding with dual tree wavelet and SPIHT(VDTS), video coding with 3D dual tree wavelet transform and SPIHT(V3DTS), video coding with 107. curvelet transform and SPIHT(VCTS) and video coding with dual tree complex wavelet fractional transform and modified SPIHT(VDTCWFS). Next we implement these methods with the assist of matlab 2014 and 2015, and 556-560 then analyze these techniques by using PSNR and compression ratio. Keyword:(EWT) Empirical wavelet transforms, H.264, VEWH, LZW, VEWL, SPIHT, VEWHS, VMWS, VDTS, V3DTS, VCTS, VDTCWFS, PSNR.

References: 1. Mr.Nithin.s.s, Dr.L.Padma Suresh , N.SubashDaubechies, , 1998, “Wavelet based Video Compression Using Various Encoding Techniques: A Relative Study”, International Journal of Engineering & Technology, 7 (3.24) (2018) 501-504 2. [2].Gonzalez R. C., Woods R. E., Digital Image Processing, Second Edition, ISBN: 0-20-118075-8 3. [3]. Xiang, T., Qu, J., & Xiao, (2014). Joint SPIHT compression and selective encryption. Applied Soft Computing, 21, 159-170. 4. [4]. S.P.Raja, Dr.A. suruliandi,"Analysis Of efficient wavelet based Image Compression Techniques, "Second International Conference on Compression Using Communication networking Technology, 5. [5]. D.Taubman and M.W.Marcelin,"JPEG 2000 Image Compression Fundamentals Standards and practice", Dordrecht the Netherlands: Kluwer. Authors: Kavitha Rani Mari, Suriyavathana Mthukrishnan, Punithavathi Manogaran, Anandhi Eswaran

Paper Title: Antiurolithiatic Activity of Pisonia Alba Leaves in Experimental Animal Model (Albino Rats)

Abstract: Pisoniaalbais a medicinal plant used widely has a broad variety of pharmacological uses. The current research explored the acute toxicity of an ethanol sample of Pisoniaalba (Family: Nyctaginaceae) Ethanol Leaves Extract Pisoniaalba(ELPA) and Pisoniaalba(ALPA) Aqueous Leaves Extract at a dose of 1000mg / kg and comparison of urinary amount and electrolyte amount as parameters of evaluation. On the other side, 108. urolithiasis caused by ethylene glycol (0.75% v / v in drinking water for 28 days) was used for the same ELPA and ALPA with an initial dose of 250 mg / kg in male rats for antiurolithiatic impact. As a conventional 561-566 comparison drug, cystone (250 mg / kg, p.o.) was used amount of different urolithiatic parameters in the biological samples i.e (urine, serum and kidney homogenate) and renal function were used as criteria for evaluating the antiurolithiatic impact of ELPA and ALPA after 28days of therapy span results indicated that, in a model similar to that of furosemide, the ELPA and ALPA (250mg / kg) elevate blood quantity and urinary excretion of electrolytes. ELPA and ALPA reduced the excretion and deposition of multiple urolithiatic parameters in ethylene glycol-induced urolithiatic model relative to urolithiatic command in a pattern similar to cystone control. Supplementation with ELPA and ALPA also avoids renal function deficiency. According to our studies, ELPA supports stronger anti-urolithic exercise. Keyword: Pisoniaalba, urolithiasis, ELPA, ALPA, cystone.

References: 1. Banakar et al., 2004 M.C. Banakar, S.K. Paramasivan, M.B. Chattopadhyay, S. Datta, P. Chakraborty, M. Chatterjee, K. Kannan, E. Thyagarajan, 25-dihydroxyvitamin D3 prevents DNA damage and restores antioxidant enzymes in rat hepatocarcinogenesis induced by diethylnitrosamine and promoted by phenobarbitolWorld J. Gastroenterol. 10 (9) (2004), pp.1268–1275. 2. Bello , I. Bello, A.S. Bakkouri, Y.M. Tabana, B. Al-, M.A. Al-Mansoub, R. Mahmud, M.Z. Asmawi, Acute and sub-acute toxicity evaluation of the methanolic extract of Alstoniascholaris stem bark, Med. Sci. 3. Bhatt and Paul, 2008 P. Bhatt, P. Paul, Analysis of urinary stone constituents using powder X-raydiffraction and FT-IR, J .Chem. Sci. 120 (2) (2008), pp.267-273. 4. Butterweck, and Khan, 2009 V. Butterweck, S.R. Khan, Herbal medicines in the management of urolithiasis: alternative or complementary, Planta.Med, 75 (2009), pp.1095-1103. 5. Calixto et al., 1998 J.B. Calixto, A.R. Santos, V. CechinelFilho, R.A. Yunes, A review of the plants of the genus Phyllanthus: their chemistry, pharmacology, and therapeutic potential, Med. Res. Rev. 18 (1998), pp.225-258 6. Dhanasekar and Sorimuthu, 2005 S. Dhanasekar, S. Sorimuthu, Beneficial effects of Momordicacharantia seeds in the treatment of STZ-induced diabetes in experimental rats, Biol. Pharm. Bull.28 (2005), pp.978-83. 7. Divakar et al., 2010 K. Divakar, A.T. Pawar, S.B. Chandrasekhar, S.B. Dighe, G. Divakar, Protective effect of the hydro- alcoholic extract of Rubiacordifolia roots against ethylene glycol induced urolithiasis in rats, Food.Chem.Toxicol, 48 (2010), pp.1013-1018. 8. Evan, 201 A.P. Evan, Physiopathology and etiology of stone formation in the kidney and the urinary tract, Pediatr.Nephrol. 25 (2010), pp. 831-841. HT, 1996 H.T. Authors: Punithavathi Manogaran, Suriyavathana Muthukrishnan, Kavitha Rani Mari, Anandhi Eswaran Green synthesis of Ag-Nps using Chrysopogon Zizanioide and Ocimum Sanctum Extract and its Paper Title: Antibacterial Activity Abstract: For ecological synthesis of Ag-Nps, aqueous form of Chrysopogon zizanioid (S1), Ocimum sanctum (S2) and combined specimens (S3) is used as a reduction agent.The nanoparticles were synthesized and explained utilizing X-ray diffraction (XRD), FTIR and UV-vis, analysis. XRD model and Scanning Electron Microscopy (SEM) described the crystallinity of the Ag-Nps. Bi-molecules accountable for capping are a variety of Ag-Nps has been introduced by the FTIR spectral analysis. UV-vis spectrum explored the feature of Ag-Nps synthetic. The Ag nanoparticles were using of a regular size of 7-15 nm and often spherical exact by XRD pattern. Synthesized Ag-Nps anti-bacterial action was assessed using diffusion technique with aqueous Chrysopogon zizanioid (S1), Ocimum sanctum (S2), and combined specimens (S3).The S3 sample Ag-Nps prominently reserved bacterial proliferation against multi-drug susceptible to the total pathogens used in this research.Thus, Ag-Nps shows a wide variety of reduced concentration antibacterial activity, which may be an excellent natural therapy choice in the future. Keyword: Chrysopogon zizanioide, Ag-Nps, Ocimum sanctum, XRD, SEM, FTIR. 109.

References: 567-571 1. Dos Santos, C.A., Seckler, M.M., Ingle, A.P., Gupta, I., Galdiero, S., Galdiero, M., Gade, A., and Rai, M., J. Pharm. Sci., 2014, vol. 103, pp. 1931– 1944. 2. Narayanan, K.B., and Sakthivel, N.,Adv. Colloid Interface Sci., 2010, vol. 156, pp. 1–13. 3. Raveendran, P., Fu, J., and Wallen, S.L., Green Chem., 2006, vol. 8, pp.34-38. 4. Armendariz, V., Gardea-Torresdey, J.L., Jose Yacaman, M., Gonzalez, J., Herrera, I., and Parsons, J.G., 2002. 5. Song, J.Y., and Kim, B.S., Bioprocess Biosyst Eng., 2008, vol. 32, pp. 79-84. 6. Liz-Marzan, L.M., and Lado-Tourino, I., Langmuir., 1996 , vol. 123, pp. 585-3589. 7. Esumi, K., Tano, T., Torigoe, K., and Meguro, K., J Chem Mater., 1990, vol. 2,pp. 564-567. 8. Pileni, M.P., Pure Appl Chem., 2000, vol. 72, pp. 53-65. 9. Sun, Y.P., Atorngitjawat, P., and Meziani, M.J., Langmuir., 2001,vol. 17, pp. 5707-5710. 10. Henglein, A., J Phys Chem B., 1993, vol. 97, pp.5457-5471. 11. Henglein, A., J Chem Mater., 1998, vol. 10, pp. 444-446. 12. Henglein, A., Langmuir., 2001, vol. 17, pp. 2329-2333. 13. Klaus, T., Joerger, R., Olsson, E., and Granqvist, C.G., J Proc Natl Acad Sci USA., 1999, vol. 96, pp.13611-13614. 14. Nair, B., and Pradeep, T., Cryst Growth Des., 2002, vol. 2, pp.293-298. 15. Willner, I., Baron, and R., Willner, B., J Adv Mater., 2006, vol. 18, pp.1109-1120. 16. Ankamwar, B., Gharge, M., and Sur, U.K., Adv. Sci. Eng. Med., 2015, vol. 7, pp. 480-484.Spectrosc., 2015, vol. 134, pp.310–5. 17. Ulug, B., HalukTurkdemir, M., Cicek, A., and Mete, A., Spectrochim Part A. Mol Biomol Spectrosc., 2015, vol.135, pp.153–61. 18. Jacob, J., Mukherjee, T., and Kapoor, S., Mater. Sci. Eng. C., 2012, vol. 32, pp.1827–1834. 19. Gopal Suresh, Poosali Hariharan Gunasekar, Dhanasegaran Kokila, Durai Prabhu, Devadoss Dinesh, Nagaiya Ravichandran, Balasubramanian Ramesh, and Arunagirinathan Koodalingam , Ganesan Vijaiyan Siva. Spectrochim. Acta, Part A., 2014, vol. 127, pp.61–66. 20. Kasthuri, J., Veerapandian, S., and Rajendiran, N., Colloids Surf. B., 2009, vol. 68 ,pp.55–60. 21. Oves, M., Aslam, M., Rauf, M.A., Qayyum, S., Qari, H.A., Khan, M.S., and Alam, M.Z., Mater. Sci. Eng. C., 2018, vol. 89, pp. 429–443 Authors: S.Sridevi, S.Chandramohan

Paper Title: An Interrogation on Newsjacking in Content Marketing

Abstract: Newsjacking is the workmanship and study of infusing your thoughts into a breaking news story so you and your thoughts get took note. Newsjacking alludes to the act of gaining by the fame of a news story to intensify your deals and promoting achievement. Fundamentally, news is breaking each second in this insane universe of our own, and there's a time when advertisers have a one of a kind chance to ride the fame wave of a breaking story to profit their business somehow or another. Presently, the ubiquity subsides before long - maybe in hours, for the most part in days, in case you're fortunate, in weeks - however the effect of catching the story right on time to profit your business is huge ... particularly contrasted with the exertion you needed to put in to get in on the activity. 110. Keyword: Fundamentally, news is breaking each second in this insane universe of our own, and there's a time when advertisers 572-575

References: 1. Birkner, C. (2012). The ABCs of Affiliate Marketing, in: Coreconcepts, Marketing News Bockhorni, Markus, (n.d.), Customer Journey optimieren - Touchpoint-Analyse im Multichannel-Marketing; URL: http:// www.onlinemarketing-praxis.de/web- controlling/customer-journey-optimieren-touchpoint-analyse-im-multichannel-marketing. 2. Codourey, M. (2013). The Public Handshake, the Pushed Gossip and the Healthcare Marketing, Economics and Sociology, Vol. 6, No 2, pp. 11-27. DOI: 10.14254/2071-789X.2013/6-2/2. 3. Constantinides, E. (2002). The 4S web-marketing mix model. Electronic Commerce Research and Applications, 1(1), 57- 76. 4. Gopal, R. D., Tripathi, A. K., & Walter, Z. D. (2006). Economics of first-contact email advertising. Decision Support Systems, 42(3), 1366-1382. 5. Herget, J., Petrů, Z., Abrhám, J. (2015), City branding and its economic impacts on tourism, Economics and Sociology, Vol. 8, No 1, pp. 119-126. DOI: 10.14254/2071- 789X.2015/8-1/9. 6. Kozinets, R. V. (2002). The field behind the screen: using netnography for marketing research in online communities. Journal of marketing research, 39(1), 61-72 Authors: A.Banushri1, R.A.Karthika

Paper Title: Complications in Infrastructure as a Service Layer of Cloud and its Solution Abstract: Cloud computing shows a vibrant role in existing scenario and the enactment of infrastructure as a service is perilous because of its discrepancy in the area. The cloud users have increased hastily, and the accessibility of resources for the users are less. Infrastructure as a service (IaaS) mentions the particulars of infrastructure like physical computing resources such as stowage, compute, and networking services. IaaS- cloud providers underwrite these resources based on their necessity from their vast content of resources presents any where all over the universe. Observing of these resources continually is precarious. For monitoring the availability of resources and notifying to the users about the resources is one of the challenges taken in Iaas layer is Service Level Agreement (SLA) and provided with a solution. The foremost objective of the scheduling algorithms in a cloud environment is to exploit the resources proficiently while balancing the load between resources, to get the least possible execution time. Hence, rank based task scheduling algorithm is proposed to utilize the resources efficiently and perform high performance. A simulation result gives the Quality of Service 111. (QoS) Parameters such as length (size), CPU, throughput, and bandwidth.

Keyword: SLA, QoS, CPU, IaaS, Resources, rank-based task scheduling algorithm. 576-580 References: 1. Belbergui, C., Elkamoun, N., & Hilal, R. (2017, October). Cloud computing: Overview and risk identification based on classification by type. In Cloud Computing Technologies and Applications (Cloud Tech), 2017 3rd International Conference of(pp. 1-8). IEEE. 2. Ma, D., & Kauffman, R. J. (2014). Competition between software-as-a-service vendors. IEEE Transactions on Engineering Management, 61(4), 717-729. 3. Calero, J. M. A., & Aguado, J. G. (2015). MonPaaS: an adaptive monitoring platformas a service for cloud computing infrastructures and services. IEEE Transactions on Services Computing, 8(1), 65-78. 4. Luo, F., Zhao, J., Dong, Z. Y., Chen, Y., Xu, Y., Zhang, X., & Wong, K. P. (2016). Cloud-based information infrastructure for next- generation power grid: Conception, architecture, and applications. IEEE Transactions on Smart Grid, 7(4), 1896-1912. 5. Yin, X., Chen, X., Chen, L., Shao, G., Li, H., & Tao, S. (2018). Research of Security as a Service for VMs in IaaS Platform ( May 2018). IEEE Access. 6. Joshi, B. K., Shrivastava, M. K., & Joshi, B. (2016). Security threats and their mitigation in infrastructure as a service. Perspectives in Science, 8, 462-464. 7. Jaiswal, P. R., & Rohankar, A. W. (2014). Infrastructure as a service: security issues in cloud computing. International Journal of Computer Science and Mobile Computing, 3(3), 707-711. 8. Iranpour, E., & Sharifian, S. (2018). A distributed load balancing and admission control algorithm based on Fuzzy type-2 and Game theory for large-scale SaaS cloud architectures. Future Generation Computer Systems, 86, 81-98. 9. Zhan, J., Fan, X., Cai, L., Gao, Y., & Zhuang, J. (2018). TPTVer: A trusted third party based trusted verifier for multi-layered outsourced big data system in cloud environment. China Communications, 15(2), 122-137. 10. Hussain, S. A., Fatima, M., Saeed, A., Raza, I., & Shahzad, R. K. (2017). Multilevel classification of security concerns in cloud computing. Applied Computing and Informatics, 13(1), 57-65. 11. Ardagna, C. A., Asal, R., Damiani, E., Dimitrakos, T., El Ioini, N., & Pahl, C. (2018). Certification-Based Cloud Adaptation. IEEE Transactions on Services Computing. 12. Soltanian, A., Belqasmi, F., Yangui, S., Salahuddin, M. A., Glitho, R., & Elbiaze, H. (2018). A Cloud-Based Architecture for Multimedia Conferencing Service Provisioning. IEEE Access, 6, 9792-9806. 13. Ali, H., Moawad, R., & Hosni, A. A. F. (2016). A cloud interoperability broker (CIB) for data migration in SaaS. Future Computing and Informatics Journal, 1(1-2), 27-34. 14. Vázquez-Poletti, J. L., Moreno-Vozmediano, R., Han, R., Wang, W., & Llorente, I. M. (2017). SaaS enabled admission control for MCMC simulation in cloud computing infrastructures. Computer Physics Communications, 211, 88-97. 15. Iqbal, S., Kiah, M. L. M., Anuar, N. B., Daghighi, B., Wahab, A. W. A., & Khan, S. (2016). Service delivery models of cloud computing: security issues and open challenges. Security and Communication Networks, 9(17), 4726-4750. 16. S.B.Dash, H.Saini, T.C.Pand, A. Mishra. (2014). Service Level Agreement Assurance in CloudComputing: A Trust Issue. International Journal of Computer Science and Information Technologies, 5 (3), 2899-2906. 17. Vincent Chimaobi Emeakaroha. (2012). Managing Cloud Service Provisioning and SLAEnforcement via Holistic Monitoring Techniques. A thesis submitted in Informatics, 1-159. 18. Amit Agarwal, Saloni Jain. (2014). Efficient Optimal Algorithm of Task Scheduling in Cloud Computing Environment. International Journal of Computer Trends and Technology. 9(7), 344-349. 19. Rajesh Verma. (2013). Comparative Based Study of Scheduling Algorithms for Resource Management in Cloud Computing Environment. International Journal of Scientific Research in Computer Science and Engineering. 2(1), 17-23. 20. Hilda Lawrance and Salaja Silas. (2013). Efficient Qos Based Resource SchedulingUsing PAPRIKA Method for CloudComputing. International Journal of Engineering Science and Technology. 5(3), 648-643 Authors: Sreeja P, L.Padmasuresh, P.Muthukumar

Paper Title: Fpga Based Random Pulse Width Modulation for Three Phase VSI Abstract: One of the inexpensive notions in present day power electronics control equipment is the objective of random pulse width modulation (RPWM) for control of semiconductor based power converters, accelerated by the progressively increasing anxiety with or regulations regarding electromagnetic fields, vibrations produced due to magnetic field and the induction of acoustic noise. The disperse or spread of acoustic noise spectra is obtained on induction motor by a differentcosimulation of RPWM generation for three phase inverter drive. This pattern is randomized by selecting the triangle randomly among the two triangles. The 8-bit linear shift register is used as feedback for arbitration selection. To generate the pulses sine reference wave is compared with east bit of the register output decide the winning triangle. The outcomes of cosimulation are presented for both RPWM and SPWM and compared Fundamental, Harmonic Spread Factor, Total Harmonic Distortion for various modulation index. Furthermore, Xilinx XC3S500E FPGA processor synthesis results are provided. The experimental validation of SPWM and RPWM are presented at the end and compared.

Keyword: Random pulse width modulation, Total harmonic distortion, Field programmable gate array, 112. Harmonic spread factor.

References: 581-589 56. Mahesh A Patel, Ankit R Patel, Dhaval R Vyas, Ketul M Patel, “Use of PWM Techniques for Power Quality Improvement”, International Journal of Recent Trends in Engineering, Vol. 1, No. 4. pp. 99-102. 2009. 57. MuthukumarParamasivan, Melba Mary Paulraj, SankaragomathiBalasubramanian, “Assorted carrier-variable frequency-random PWM scheme for voltage source inverter”, IET Power Electronics, vol. 10,No. 14, pp. 1993 – 2001.August 2017. 58. Seung-Wook Hyun, Seok-Jin Hong, Jung-Hyo Lee, Chun-Bok Lee, and Chung-Yuen Won, “A Method to Compensate the Distorted Space Vectors in the Unbalanced Neutral Point Voltage of 3-level NPC PWM Inverters”, Journal of Power Electronics, Vol. 16, No. 2, pp. 455-463 , 2016. 59. Ki-Seon Kim, Young-Gook Jung and Young-cheol Lim, “A New Hybrid Random PWM Scheme”, IEEE Transactions on Power Electronics, Vol. 24. No. 1, 192-200. 2009. 60. Nandhakumar R, Jeevananthan S, Inverted Sine Carrier Pulse Width Modulation for Fundamental Fortification in DC-AC Converters. Serbian Journal of Electrical Engineering, Vol. 4, No. 2, pp. 171-187. 2007. 61. Young-cheol Lim, Seog-Oh Wi, Jong-Nam Kim , Young-Gook Jung, “A Pseudo random Carrier Modulation Scheme”. IEEE Transactions on Power Electronics, Vol. 25, No. 4, pp. 797-805. 2010 62. Boopathi R, Muthukumar P, Melba Mary P , Jeevananthan S, “Investigations on Harmonic Spreading Effects of SVPWM Switching Patterns in VSI fed AC Drives”. IEEE International Conference on Advances in Engineering, Science and Management (ICAESM): pp. 651-656. 2012. 63. Valantina Stephen, L. Padma Suresh and P. Muthukumar, “Field programmable gate array based RF-THI pulse width modulation control for three phase Inverter using matlabmodelsimcosimulation”, American Journal of Applied Sciences, Vol. 9, No. 11, pp. 1802- 1812, 2012. Authors: G. Indhumathi, M. Babu, J. Gayathri

113. Paper Title: Performance of Indian Mutual Fund Schemes Abstract: Risk, diversification, features of investment avenues, and tax benefit are the factors considered by the investors in their decision making. The convenience of investing in small proportions and tax benefits 590-592 attracts the investors towards mutual fund investments. The studies prove that market timing ability of fund managers drives the mutual fund scheme performance. This assessment of the above factors would help to the investors in their choice of mutual funds. 36 Indian Mutual Funds Schemes were assessed using the Sharpe, Treynor, Jensen’s measure from January to June 2019. L&T Liquid Fund –Direct (Growth), L&T Low Duration Fund-Growth and Edelweiss Large Cap Fund - Direct (Growth) performed well.

Keyword: Jensen Ratio, Mutual Funds, Risk and Return, Sharpe and Treynor Ratios References: 1. Avadani V A, Security Analysis and Portfolio Management. Mumbai: Himalaya Publishing House, 1998. 2. Bhole L M, Mutual Funds, Financial Institutions & Markets. New Delhi: Tata McGraw Hills publishing Limited, 1999. 3. Chandra, Prasanna, Investment Analysis and Portfolio Management, 2nd Edition, New Delhi: Tata McGraw-hill Publishing Company limited, 2005. 4. Sadhak H, Mutual Funds in India – Marketing strategies & Investment practices. New Delhi: Sage Publication, 1997. 5. Bhagyasree.N and Kishori B, “Performance evaluation of Mutual Funds Schemes in India”. International Journal for Innovative Research in Science & Technology, vol.2, Issue 11, 2016, pp. 812-816. 6. Chitra.V and Hemalatha T, “Risk & return analysis of performance of Mutual Fund Schemes in India”. International Journal of Applied Research, 2018, pp. 279-283. 7. Goyal M M, “Performance evaluation of top ten Mutual Fund in India”. Indian Journal of Commerce & Management Studies, vol. VI, Issue 1, 2015, PP 51-55. 8. Ravikumar R, “Analysis of the risk and return relationship of Equity based Mutual Fund in India”. International Journal of Advancements in Research & Technology, vol.2, Issue 8, 2013, pp. 289-295. 9. Ratish Gupta and Shruti Maheshwari, “An empirical study on performance of diversified Equity Mutual Funds with special reference to large cap and mid cap funds”. AIMA Journal of Management & Research, vol. 11, Issue 3/4, 2017, pp. 01-11. 10. Sathis P and Sakthi Srinivasan K, “Performance evaluation of selected open ended Mutual Fund Schemes in India: An empirical study”. Global Management Review, vol. 10, Issue 3, 2016, pp. 93-105. 11. Sridevi O V A M, “Performance analysis of Mutual Funds-A study on selected mid cap and small cap funds”. International Journal of Business and Management Invention, vol.7, Issue 7, 2018, pp. 06-12. 12. www.amfiindia.com 13. www.nseindia.com Authors: S. Vidhya, V. Kalaivani

Paper Title: Assured and Coherent Sharing of Healthcare Data in Cloud using Cryptography Abstract: The Healthcare information system (HIS) is a compendious system which is developed with a help of various healthcare employees. This information system helps to manage the entire working system of a hospital in paperless environment. Here all the data’s related to a patient’s are stored in a single database. It offers various benefits to a hospital, but fails to provide the better privateness and security to the data's stored in healthcare database. Various cryptography algorithms are used by the users to share the health information in cloud, which provides secured data sharing. But still, data breeches is the main problem in cloud. This paper proposes a framework for secure sharing of healthcare data in cloud.

Keyword: Database, Cloud, Healthcare information system, Paperless environment, Security. References: 1. Balaraman, P., and Kosalram, K, Ehospital Management & Hospital Information Systems Changing Trends, International Journal Information Engineering and Electronic Business. 2. Xiaokui Shu, Danfeng Yao, Member, IEEE, and Elisa Bertino, Fellow, IEEE, Privacy-Preserving Detection of Sensitive Data Exposure, IEEE Transactions on Information Forensics and Security. 3. Computer Science and Telecommunications Board, Networking Health: Prescriptions for the Internet,2000. 4. M. Cashen, P. Dykes and B. Gerber. 2004, EHealth Technology and Internet Resources:Barriers for Vulnerable Populations, Journal of Cardiovascular NursingVol. 19, No. 3, pp 209– 214 © 2004 Lippincott Williams & Wilkins, Inc. 5. Wei, X. (2011). Hospital Information System Management and Security Maintenance, Computing and Intelligent Systems 114. Communications in Computer and Information Science. 6. Ajit Appari and M. Eric Johnson, Information security and privacy in healthcare: current state of research, Int. J. Internet and Enterprise Management. 593-596 7. Biomedical informatics Ltd, Hospital Information Systems, Retrieved from http://www.biohealthmatics.com/techn ologies/intsys.aspx on July 14, 2011. 8. Health Privacy Project at www.healthprivacy.org/info-urlnocat2304info- url nocat.html. 9. D. Masys, D. Baker, A. Butros , K.E. Cowles, Giving patients access to their medical records via the internet: the PCASSO experience, Journal of American Medical Informatics Association. 10. T. Greenhalgh, S. Hinder, K. Stramer, T. B ratan, J. RussellAdoption, non-adoption, and abandonment of a personal electronic health record: case study of HealthSpace BMJ. 11. www.sciencedirect.com/topics/medicine- and-dentistry/protected-health-information 12. Prajakta Pawar, Sushopti Gawade, Heuristic Walkthrough Usability Evaluation of Electronic Health Record with a Proposed Security Architecture International Journal of Innovative Research in Computer Science & Technology. 13. www.groups.csail.mit.edu/medg/courses/6 872/96/notes/sheldon.html 14. O. Osunmuyiwa and A. H. Ulusoy, Wireless security in mobile health, Telemedicine and e-health. 15. Maslin Masrom, Ailar Rahimly, Overview of Data Security Issues In Hospital Information System, Pacific Asia Journal of the Association for Information Systems. 16. S. Kahn and V. Sheshadri, Medical Record Privacy and Security in a Digital Environment, IT Professional. 17. Y.A. AL-nassar, A.M. Mohd and O. S. Wan. 2011. Overcoming challenges to use Electronic Medical Records System (EMRs) in Jordan Hospitals, IJCSNS International Journal of Computer Science and Network Security. 18. "HealthInsurance Reform:Security Standards,"HHS, Washington, 2003 http://www.cms.hhs.gov/SecurityStandard/Do wnloads/securityfinalrule.pdf,. 19. Bundesamt für Sicherheit in der Informationstechnik, "IT-Grundschutz- Kataloge," BSI, Köln, 2005. 20. David Houlding, MSc, CISSP: Health Information at Risk: Successful Strategies for Healthcare Security and Privacy : Healthcare IT Program Of ce Intel Corporation, white paper 2011. 21. Hajrahimi, N., Dehaghani, S. M. H., and Sheikhtaheri, A, Health Information security: A Case Study of Tree Selected Medical Centers, Acta Informatica Medica. 22. Anderson, J. G. Clearing the way for physicians’ use of clinical information systems. Communications of the ACM. 23. G. Arash and Z. Shukur, Security Challenges and Success Factors of Electronic Healthcare System, University Kebangsaan Malaysia. 24. Eystein Mathisen, Security Challenges and Solutions in Cloud Computing, in: International Conference on Digital Ecosystems and Technologies. 25. T. Greenhalgh, S. Hinder, K. Stramer, T. B ratan, J. RussellAdoption, non-adoption, and abandonment of a personal electronic health record: case study of HealthSpace BMJ. Authors: Nguyen Bang Nong Multi-Dimensional Poverty in Vietnam: New Evidence from Jarai People in the Central Highlands, Paper Title: Vietnam Abstract: Ethnic minorities in Vietnam account for only 14% of the total population of Vietnam, but the proportion of poverty accounts for more than 52% of all poor households in the country. Based on an empirical research, the paper focuses on a specific ethnic minority group, Jarai people. Research results have shown that multidimensional poverty is not easily implemented in the context of changes in natural and social environments. Therefore, multi-dimensional poverty is both theoretical and scientific challenges, and creates obstacles to policy implementation in order to achieve efficiency in Vietnam’s commitment to implementing the Millennium Development Goals (MDG) of the United Nations.

Keyword: Vietnam, Central Highlands, Jarai people, ethnic minorities, multidimensional poverty. References: 1. Baulch, B., Truong, C. T. K., Haughton, D., & Haughton, J. (2002), Ethnic minority development in Vietnam: A socio-economic perspective, Working Paper 2836, Washington, D.C.: World Bank. 2. Bui, A. T., Nguyen, C. V. & Pham, T. H. (2017). Poverty among ethnic minorities: The transition process, inequality and economic growth. Applied Economics, 49, 3114-3128. 3. Committee for Ethnic Minority Affairs (2016). Results of survey of socio-economic status of 53 ethnic minorities in 2015. [Online] 115. Available: http://cema.gov.vn/ket-qua-dieu-tra-thuc-trang-kt-xh-53-dan-toc-thieu-so-nam-2015.htm (July 10, 2017) 4. Dournes, J. (2018). Potao: A Theory about power of the Jarai people in Indochina (Vietnamese translation). Hanoi: World Publishing House. 597-602 5. Ia Glai Commune People’s Committee (2011-2018). Reports on the implementation status of annual socio-economic indicators. Gia Lai province. 6. Haughton, J. (2001). Introduction: Extraordinary changes. In: D. Haughton, J. Haughton, & P. Nguyen (Eds.), Living standards during an economic boom: The case of Vietnam (pp. 9-32). Hanoi: Statistics Publishing House. 7. Nooteboom, G. (2015). Forgotten People: Poverty, Risk and Social Security in Indonesia: The case of the Madurese. Boston: BRILL. 8. Nong, B. N. (2017). The Livelihood transformation of Gia-rai people in Ia Glai commune, Chu Se district, Gia Lai province since the Renovation (1986) up to Present. Anthropology Review, 6, 61-67. 9. Nong, B. N. (2018). Jarai people. In: T. X. Vuong (ed.), Ethnic minorities in Vietnam (4th volume) (pp. 239-306). Hanoi: National Political Publishing House. 10. Pimhidzai, O. (2018). Climbing the ladder: Poverty reduction and shared prosperity in Vietnam. Washington, D.C.: World Bank. 11. Prime Minister of Vietnam (2018). Vietnam’s voluntary on the implementation of the sustainable development goals. Hanoi. 12. Prime Minister of Vietnam (2015). Decision No.59/2015/QD-TTG about promulgating multidimensional poverty levels applicable during 2016-2020. Hanoi. 13. Phung, D. T., Nguyen, C. V., Nguyen, C. T., Nguyen, T. Nh. & Ta, Th. Kh. V. (2016). Ethnic minorities and sustainable development goals: Who will be left behind? Hanoi: Mekong Development Research Institute. 14. Socialist Republic of Vietnam (2002). Comprehensive strategy for growth and poverty reduction. Hanoi: Authority of Publication, Printing and Distribution. 15. Van de Walle, D., & Gunewardena, D. (2001). Sources of ethnic inequality in Vietnam. Journal of Development Economics, 65, 177-207. Authors: Priyanka Nirwan, Gurpreet Singh

Paper Title: Segmentation and Identification of Bilingual Offline Handwritten Scripts (Devanagari and Roman) Abstract: Hand written text acknowledgment field has been considered as one of the hardest issues in the digital word. The multifaceted nature dimension of this exploration zone is high due to the reasons like diverse method for writing pursued by the clients, auxiliary independences, age elements of people and so on. This paper shows a novel procedure for the recognition of handwritten scripts, for example division of words and characters. In this paper, we have used two different scripts :”Devanagari” and “Roman” scripts. For which three Convolution Neural Networks(CNN) models are applied on different types of classification: one for language classification for which we have achieved 98% accuracy, second one for Devanagari character classification for 116. which we have achieved 89% and third one for Roman character classification for which have achieved 97% respectively. 603-607 Keyword: Convolution Neural Network;Character segmentation;CharacterIdentification;Deeplearning;Handwritten text recognition; Devanagari script;Roman script. References: 1. S. Srivastava, J. Priyadarshini, S. Gopal, and S. Gupta, Optical Character Recognition on Bank Cheques Using 2D Convolution Neural Network. Springer Singapore, 2019. 2. A. Choudhary, R. Rishi, and S. Ahlawat, “New character segmentation approach for off-line cursive handwritten words,” Procedia Comput. Sci., vol. 17, pp. 88–95, 2013. 3. U. Pal and B. B. Chaudhuri, “Indian script character recognition : a survey,” vol. 37, pp. 1887–1899, 2004. 4. S. B. Dhok, “Multilingual Character Segmentation and Recognition Schemes for Indian Document Images,” IEEE Access, vol. 6, no. ii, pp. 10603–10617, 2018. 5. A. A. M. Al-saffar, H. Tao, and M. A. Talab, “Review of Deep Convolution Neural Network in Image Classification,” pp. 26–31, 2017. 6. P. Nirwan, “A Survey Of Segmentation Of Characters In Handwritten Devanagari Script,” vol. 5, no. 8, pp. 710–712, 2018. 7. P. Sharma and M. K. Sachan, “A Technique for Character Segmentation in Middle zone of Handwritten Hindi words using Hybrid Approach,” no. July, pp. 1–10, 2017. 8. A. Priya, S. Mishra, S. Raj, S. Mandal, and S. Datta, “Online and offline character recognition: A survey,” in International Conference on Communication and Signal Processing, ICCSP 2016, 2016, pp. 967–970. 9. D. Q. G. X. Hh et al., “Dense Prediction for Text Line Segmentation in Handwritten Document Images,” Icip, 2016. 10. J. Wu, Y. Yu, C. Huang, and K. Yu, “Deep multiple instance learning for image classification and auto-annotation,” Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., vol. 07–12–June, pp. 3460–3469, 2015. 11. “Deep Convolutional Neural Networks for Sentiment Analysis of Short Texts,” pp. 69–78, 2014. 12. T. Bluche, H. Ney, and C. Kermorvant, “TANDEM HMM WITH CONVOLUTIONAL NEURAL NETWORK FOR HANDWRITTEN WORD RECOGNITION CNRS , Spoken Language Processing Group c RWTH Aachen University , Human Language Technology and Pattern Recognition b LIMSI a A2iA,” pp. 2390–2394, 2013. 13. H. Ney and C. Kermorvant, “Feature extraction with convolutional neural networks for handwritten word recognition,” 2013. 14. G. Singh and M. Sachan, “Multi-layer perceptron (MLP) neural network technique for offline handwritten Gurmukhi character recognition,” in 2014 IEEE International Conference on Computational Intelligence and Computing Research, IEEE ICCIC 2014, 2015, pp. 1–5. 15. M. Kumar, M. K. Jindal, and R. K. Sharma, “Segmentation of Isolated and Touching Characters in Offline Handwritten Gurmukhi Script Recognition,” Int. J. Inf. Technol. Comput. Sci., vol. 6, no. 2, pp. 58–63, 2014. 16. T. B. Laboratories and U. De Montrhal, “Word-Level Training of a Handritten Word Recognizer Based on Convolutional Neural Networks,” pp. 88–92, 1994. 17. V. Kumar and P. K. Sengar, “Segmentation of Printed Text in Devanagari Script and Gurmukhi Script,” Int. J. Comput. Appl., vol. 3, no. 8, pp. 24–29, 2010. 18. M. S. Nehra, N. Nain, and M. Ahmed, “Benchmarking of text segmentation in devnagari handwritten document,” in 2016 IEEE 7th Power India International Conference, PIICON 2016, 2017, pp. 0–3. Authors: M.Babu, J. Gayathri, G.Indhumathi, C. Hariharan Demonetisation Announcement and Price Movement of Indian Paper Title: Sectoral Indices Abstract: The information about changes in economic policies in a country may influence its stock market. The demonetisation has its impact on various segments of the economy. Thus the study aims to analyse the price movement of Indian sectoral indices around the demonetisation announcements. The daily price returns were tested using GARCH (1, 1) Model and it found that low volatility was found in the post announcement period compared to the pre-announcement period. Thus the present study confirmed that Indian sectoral indices were influenced by the demonetization announcement. Therefore, investors should be aware of economic events while investing in the stock market.

Keyword: Demonetisation, Price Movement, Sectoral Indices, Stock Market Volatility. References: 1. Balaji, K. C., & Balaji, K. (2017). A study on demonetization and its impact on cashless transactions. International Journal of Advanced Scientific Research & Development, 4(3), 58-64. 2. Davies R B & Studnicka Z, The heterogeneous impact of Brexit: Early indications from the FTSE. European Economic Review, 110, 2018, pp.1-17. 3. Fernholz R T, Mitchener K J & Weidenmier M, Pulling up the tarnished anchor: The end of silver as a global unit of account. Journal of International Money and Finance, 74, 2017, pp.209-228. 4. Gupta R, Goods and Service Tax-A Positive Reform in Indian Taxation System. International Journal of Management Research and 117. Reviews, 7(6), 2017, pp.674. Iyengar, M., Iyengar, N., & Sampat, H. (2017). Impact of US election results on Indian stock market: An event study approach. International Journal of Applied Research, 3(5), 9-13. 608-611 5. Kumar V, GST-A boon or a bane for India. International journal for innovative research in multidisciplinary field, 2(9), 2017, pp.315-319. 6. Kim, K., Mithas, S., & Kimbrough, M. (2017). Information Technology Investments and Firm Risk Across Industries: Evidence from the Bond Market. MIS Quarterly, 41(4), 1347-1367. 7. Lourdunathan F & Xavier P, A study on implementation of goods and services tax (GST) in India: Prospectus and challenges. International Journal of Applied Research, 3(1), 2017, pp.626-629. 8. Srinivasan, P., & Kalaivani, M. (2013). DETERMINANTS OF FOREIGN INSTITUTIONAL INVESTMENT IN INDIA: AN EMPIRICAL ANALYSIS. Journal of Academic Research in Economics, 5(3). 9. Singh P, Sawhney R S &Kahlon K S, Sentiment analysis of demonetization of 500 & 1000 rupee banknotes by Indian government. ICT Express, 4(3), 2018, pp.124-129. 10. Singh, V. (2017). An Analysis of the Demonetization Effect on Sectorial Indices in India. International Journal of Engineering Technology, Management and Applied Sciences, 5(4), 378-382. 11. Tschoegl A E, The international diffusion of an innovation: The spread of decimal currency. The Journal of Socio-Economics, 39(1), 2010, pp.100-109. 12. Umaru, H., Aguda Niyi, A., & Davies, N. O. (2018). The Effects of Exchange Rate Volatility on Economic Growth of West African English-Speaking Countries. International Journal of Academic Research in Accounting, Finance and Management Sciences, 8(4), 131-143. 13. Wagner A F, Zeckhauser R J & Ziegler A, Company stock price reactions to the 2016 election shock: Trump, taxes, and trade. Journal of Financial Economics, 2018. 14. Wang G J &Xie C, Tail dependence structure of the foreign exchange market: A network view. Expert Systems with Applications, 46, 2016, pp.164-179. 15. Wu S B, Wirthensohn M G, Hunt P, Gibson J P & Sedgley M, High resolution melting analysis of almond SNPs derived from ESTs. Theoretical and Applied Genetics, 118(1), 2008, pp.1-14. Authors: A.Monilakshmane, B.Rajeswari 118. Paper Title: Factors Influence the Choice of Mobile Apps for Transactions among Youngsters Abstract: The recent upward trend in adoption and usage of technology-enabled financial services (e- finance), reached the next level of doing financial transactions through mobile apps in large numbers. In this study, the researcher is focusing on the influence of differences in users’ demographic attributes on their frequency of usage of e-finance mobile apps. Primary data collected from 400 respondents were analysed using one way ANOVA, cross tabulation, independent sample t-test in SPSS. The findings revealed that usage differences in gender, income and education qualification of users, mainly youngsters influence their choice of apps and number of transactions they perform, while age and occupation differences fail to make significant changes. This result contributes to the existing researches by proving/disproving its findings and to service providers to design their service offerings accordingly.

Keyword: e-finance, e-wallet, technology adoption, mobile apps References: 1. Chung, J.E., Park, N., Wang, H., Fulk, J. and McLaughlin, M. (2010), Age differences in perceptions of online community participation among non-users: an extension of the technology acceptance model, Computers in Human Behavior, Vol. 26 No. 6, pp. 1674-1684. 2. Gefen, D., & Straub, D. (1997). Gender differences in the perception and use of email: An extension to the technology acceptance model. MIS Quarterly, 21(4), 389–400. 3. Lam, J.C. and Lee, M.K. (2006), Digital inclusiveness – longitudinal study of internet adoption by older adults, Journal of Management Information Systems, Vol. 22 No. 4, pp. 177-206. 4. Lee, M. C. (2009). Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and 612-617 perceived benefit. Electronic Commerce Research and Applications, 8(3), 130–141. 5. Harris, M., Cox, K.C., Musgrove, C.F., Ernstberger, K.W., (2016), Consumer preferences for banking technologies by age groups, International Journal of Bank Marketing, Vol. 34 Iss 4, pp. 587 – 602. 6. Morris, M.G. and Venkatesh, V. (2000), Age differences in technology adoption decisions: implications for a changing workforce, Personnel Psychology, Vol. 53 No. 2, pp. 375-403. 7. Mu, F., Climent-climent, S., & Liébana-cabanillas, F. (2017). Determinants of intention to use the mobile banking apps : An extension of the classic TAM model. Spanish Journal of Marketing – ESIC (2017) 21, 25-38. 8. Oliveira, T., Faria, M., Thomas, M. A., & Popovi, A. (2014). Extending the understanding of mobile banking adoption: When UTAUT meets TTF and ITM. International Journal of Information Management, 34(5), 689–703. 9. McKeown, T., Anderson, M., (2016). UTAUT: capturing differences in undergraduate versus postgraduate learning? , Education + Training, Vol. 58 Iss 9 pp. 945 – 965. 10. Shin D.H., (2009). Towards an understanding of the consumer acceptance of mobile wallet, Computers in Human Behavior, Vol.25, pp. 1343–1354. 11. Teo, T.S.H., (2001). Demographic and motivation variables associated with Internet usage activities. Internet Research: Electronic Networking Applications and Policy, Volume 11, Number 2, pp. 125-137. 12. Variyar, M. (2018, January 19). Demonetisation impact? E-payments make up 60% of Amazon India’s business. Retrieved February 05, 2018, from https://economictimes.indiatimes.com/small-biz/startups/newsbuzz/demonetisation-impact-e-payments-make-up-60- of-amazon--business/articleshow/62563623.cms 13. Wang, Y. S., Wang, Y. M., Lin, H. H., & Tang, T. I. (2003). Determinants of user acceptance of Internet banking: An empirical study. International Journal of Service Industry Management, 14(5), 501–519. 14. Yu, C.S. (2012). Factors Affecting Individuals to Adopt Mobile Banking: Empirical Evidence from the UTAUT Model. Journal of Electronic Commerce Research, 13, 104–121. Authors: S. Prasad, A. Paul Williams.

Paper Title: Data: The New Currency of The Digital World and the Race among Nations to Protect Data Abstract: This article focuses on the significance of the data with the advancements in the technology and its consequent implications on various sectors. With nations around the world and especially India concentrating on digitalizing all the aspects of life, it is important to secure the data that will be created because of its digitalization. India's flagship program DIGITAL INDIA makes it evident how important is digitalizing for the welfare of the nation. The article has described the importance of data analyzing in maximizing the efficiency, profitability, the productivity of companies and also how it helps the Government with good Governance by reducing the leakages in subsidy transfer, identifying the beneficiaries of the welfare schemes, etc. Another aspect regarding climate modelling and weather prediction, which was made possible because of the availability 119. of the data also has been described. Finally, how countries are trying to safeguard the domestically generated data in the form of regulations such as the General Data Protection Regime of the European Union are also discussed. Eventually, it also proposes how the various stakeholders should come in together and resolve the 618-620 differences among them for the greater good of the people around the globe.

Keyword: Industrial revolution 4.0, Data analytics and prediction, Sustainable Development, GDPR. References: 1. https://www.thequint.com/news/india/key-highlights-from-srikrishna-committee-report-on data-protection last accessed on 15/05/2019. 2. https://economictimes.indiatimes.com/news/politics-and-nation/justice-bn-srikrishna-committee-submits-report-on-data-protection- herere-the-highlights/articleshow/65164663.cms last accessed on 13/05/2019.. 3. https://www.ncdc.noaa.gov/data-access/model-data/model-datasets last accessed on 13/05/2019. Authors: Aswathy.R, K.S Chandrasekar

Paper Title: Online Marketing of Baby Care Products in India 120. Abstract: India has emerged as one of the most preferred destinations for the manufacturers and marketers of baby care products. The growing population in the 0-4 year category provides tremendous opportunities to the 621-624 baby care product marketers worldwide. The favourable changes happened in the demographic and lifestyle aspects of Indian consumers have largely supported the rapid growth witnessed in the industry. With the advancements in modern technology and internet retailing, customers are able to make their purchases around the clock, without facing the constraints of time and place. Penetration of internet even to the rural India and the increased internet user base has widened the scope of online marketing of baby care products. Customers who buy products for babies are often found to be keen in searching sufficient information about the products before they take a decision with respect to their purchase. Online marketers have enabled the customers in searching, comparing and selecting the best suitable product for their babies at their convenience. Understanding the strength, weakness, opportunities and threats will help the marketers to achieve sustainable competitive advantage through effective strategy implementation.

Keyword: Baby care industry, SWOT Analysis, Online marketing. References: 1. Aswathy, R., & Chandrasekar, K. (2019). Baby and child specific product markets in the Asia Pacific region: A comparison between India and China. In M. Soundarapandian, Opportunities and challenges in the contemporary management practices (pp. 25-31). Tamilnadu: Maya publishers. 2. Bindhu, H., & Prasad, D. (2017). Indian baby care market: an overview. International Journal of Economic and Business Review, 53-58. 3. Mishra, H. G., & Singh, A. (2011). Variables discriminating consumption pattern of baby care products in adults of jammu region. International conference on economics and finance research (pp. 345-347). Singapore: iacsit press. 4. Pinakapani, p., & chandana, k. S. (2019). Swot analysis of online baby care product. International journal of research in engineering, science and management , 163-165. 5. Suginraj, m. (2017). Growth of online marketing in india- a study. International journal of research in management & business studies, 9-14. 6. Https://www.atkearney.com/strategy-and-top-line-transformation/article?/a/digital-marketing-time-to-grow-up 7. Https://www.business-standard.com/article/management/online-shopping-to-boost-baby-care-segment-114110200597_1.html 8. Https://www2.deloitte.com/content/dam/deloitte/in/documents/consumer-business/in-consumer-rls-2019-noexp.pdf 9. HYPERLINK "http://www.euromonitor.com/baby-and-child-specific-products-in-asia-pacific/report" Http://www.euromonitor.com/baby-and-child-specific-products-in-asia-pacific/report 10. Http://www.euromonitor.com/baby-and-child-specific-products-in-india/report 11. Http://www.euromonitor.com/baby-and-child-specific-products-in-china/report 12. https://www.rai.net.in/E-Mailers/Knowledge-Report-RLS-2018/Decoding-Value-Creation-in-Retail-RAI-BCG.pdf Authors: KC Narayana, M. Ganesan Dean, J. Pavithra

Paper Title: An Impact of Investment of E Commerce in India Abstract: The Ecommerce has been the vibrant industry as of today. Through the innovation of internet e commerce has gained a rapid momentum in 10 years period of time. The Ecommerce market in India has transformed the path of the business to a second phase from offline business to online business. The ecommerce industry in India is expected to grow US$ 200 billion by 2026 which is a massive growth due to rapid usage of internet and smartphones. The digital India campaign is expected to flourish rapidly through the ecommerce industry. The investment of ecommerce has been captured through the big giants Flipkart and Amazon The market size of the flipkart after acquired by the giant Walmart 121. The study focuses on the foreign investment in ecommerce The study will be able to identify on the performance of ecommerce industry. The study shall assess the various models which elevated the growth of the 625-628 industry.

Keyword: Ecommerce, , FDI Policy, Business to Customer, Customer to Customer, Customer to Business References: 1. Care Ratings , Ecommerce Industry – update and outlook Feb 2019. 2. Ecommerce – National Policy Framework 3. MMK Sharma, Evolution of Ecommerce in India, ISID Discussion notes 4. IVCA Associations Ecommerce and consumer internet sector – India Trend book 2019. Authors: Kasinathan Karmugilan, B. Rajeswari

Paper Title: Going Green- The Road ahead for Green Challenges in India Abstract: The paper aims to understand how people respond to the recent changes that are made due to environmental depletion. Green products are an outcome of the demand made by consumers and various government regulations over the manufacturers to maintain a sustainable environment. The knowledge of a consumer is highly important in identifying an actual green product over a presumed one. 122. Purpose: To measure their level of perception and knowledge about a green product among various age groups and occupational categories. Methodology: Structural equation modeling (SEM) is used to study the relationship of green product perception 629-633 and green product knowledge over green purchase intention. Garrett ranking was used to measure the reasons of purchase. Findings: Green product perception has more impact over green purchase intention than green product knowledge. Necessity and cost of the product were the main reasons for purchasing a product. Implications: The green product perception was more influential in green purchase intention. Hence these factors may be taken for consideration in improving the product quality meeting the perception of consumers about the product. Keeping a regular check over the product’s quality may also improve the sales of the product.

Keyword: Green products, consumers, knowledge and perception.

References: 1. Cohen, M. R. (1973). Environmental information versus environmental attitudes. The Journal of Environmental Education, 5(2), 5-8. 2. Hendee, J. C. (1972). No, to attitudes to evaluate environmental education. Journal of Environmental Education, 3(3), 65-1972. 3. UNESCO (1977), “The international workshop on environmental education–finalreport”, :http://unesdoc.unesco.org/images/0002/000276/027608eb. 4. Keller, G.M., 1987. Industry and the environment: toward a new philosophy. Vital Speeches, 54(5), pp.154-157. 5. Kotler, Philip and Gerald Zaltman (1971). Social Marketing: An Approach to Planned Social Change, Journal of Marketing, Vol. No.35, (July), pp 3 – 12. 6. Ken Peattie, Linda Peters, (1997) "The marketing mix in the third age of computing", Marketing Intelligence & Planning, Vol. 15 Iss: 3, pp.142 – 150. 7. Bohlen, G.M., Diamantopoulos, A. and Schlegelmilch, B.B., 1993. Consumer perceptions of the environmental impact of an industrial service. Marketing Intelligence & Planning, 11(1), pp.37-48. 8. Elkington, J. 1994. Toward the Sustainable Corpor-ation: Win-Win-Win Business Strategies for Sustain-able Development,California Management Review,36(2): 90,100. 9. Polonsky, Michael Jay. 1994a. "Green Marketing Regulation in the US and Australia: The Australian Checklist." Greener Management International 5: 44-53. 10. Azzone, Giovanni and Raffaella Manzini. 1994. "Measuring Strategic Environmental Performance." Business Strategy and the Environment 3 (1): 1-14. 11. Menon, A. and Menon, A., 1997. Enviropreneurial marketing strategy: the emergence of corporate environmentalism as market strategy. The Journal of Marketing, pp.51-67. 12. Schlegelmilch, B.B., Bohlen, G.M. and Diamantopoulos, A., 1996. The link between green purchasing decisions and measures of environmental consciousness. European journal of marketing, 30(5), pp.35-55. 13. Peattie, K., 1999. Trappings versus substance in the greening of marketing planning. Journal of Strategic Marketing, 7(2), pp.131- 148. 14. Laroche, M., Tomiuk, M.A., Bergeron, J. and Barbaro‐Forleo, G., 2002. Cultural differences in environmental knowledge, attitudes, and behaviours of Canadian consumers. Canadian Journal of Administrative Sciences/Revue Canadienne des Sciences de l'Administration, 19(3), pp.267-282. 15. D'Souza, C., Taghian, M. and Lamb, P., 2006. An empirical study on the influence of environmental labels on consumers. Corporate communications: an international journal, 11(2), pp.162-173 16. Fischer, G., Shah, M., Tubiello, F.N. and Van Velhuizen, H., 2005. Socio-economic and climate change impacts on agriculture: an integrated assessment, 1990–2080. 17. Loureiro, M.L. and Lotade, J., 2005. Do fair trade and eco-labels in coffee wake up the consumer conscience? Ecological economics, 53(1), pp.129-138. 18. Sudhir Sachdev (2011) “Eco-friendly products and consumer perception”. International Journal of Multidisciplinary Research. Vol 1. Iss 5. 19. Daugbjerg, C., Smed, S., Andersen, L.M. and Schvartzman, Y., 2014. Improving eco-labelling as an environmental policy instrument: knowledge, trust and organic consumption. Journal of Environmental Policy & Planning, 16(4), pp.559-575. 20. Meyer, C., Kreft, H., Guralnick, R. and Jetz, W., 2015. Global priorities for an effective information basis of biodiversity distributions. Nature Communications, 6. 21. Gutierrez, A.M.J.A. and Seva, R.R., 2016. Affective Responses in the Purchase of Consumer Eco Products. DLSU Business & Economics Review, 25(2). 22. Alba, J. W., & Hutchinson, J. W. (1987). Dimensions of consumer expertise. Journal of consumer research, 13(4), 411-454. 23. Vining, J., & Ebreo, A. (1990). What makes a recycler? A comparison of recyclers and nonrecyclers. Environment and behavior, 22(1), 55-73. 24. Chan, R. Y. (2001). Determinants of Chinese consumers' green purchase behavior. Psychology & marketing, 18(4), 389-413 25. Katona, G., & Strümpel, B. (1978). A new economic era. North Holland. Authors: Jamshida KV, B. Rajeswari The impact of C2C Communication and Shared Information on Buying Decision: “A Buyer's Paper Title: Perspective" Abstract: C2C e-commerce has been gradually more utilized by consumers to buy and sell goods prominently nowadays. With this increase in usage a need for detailed studies regarding C2C e-commerce has been created. The information shared among the buyers of C2C ecommerce plays a vital role in consumer's purchase behavior along with other factors. The present study aims to find out the impact of shared information and communication among C2C online consumers on making purchase decisions. Based on 290 effective respondents, the TAM model is used to find out the respondent’s online purchase intention is influenced by shared communication along with perceived risk, and trust of the model. SPSS 25 is used to find the regression analysis and correlation analysis to study the impact and influence of the above mentioned variables. The 123. findings show that there is a significant relationship between the electronic word of mouth and purchase intention of consumers which is created through perceived ease of use, and perceived trust. The C2C online models are a successful platform for the users who interested to buy second hand or refurbished products 634-637 through ecommerce. The study helps to find out whether there is any trustful or risk free purchase is possible if the consumers communicate about the product or services that offered.

Keyword: C2C online purchase, Technology Acceptance model, shared information and communication, purchase intention. References: 1. Sekulovska, M. (2012) Business Models for E-Insurance and Conditions in Republic of Macedonia. Procedia—Social and Behavioral Sciences, 44, 163-168. http://dx.doi.org/10.1016/j.sbspro.2012.05.016 2. Liao, C.C., To, P.-L. and Shih, M.-L. (2006) Website Practices: A Comparison between the Top 1000 Companies 3. Hong, D., Ping, Y., & Jun, J. (2016). Telematics and Informatics Understanding the influence of C2C communication on purchase decision in online communities from a perspective of information adoption model. TELEMATICS AND INFORMATICS, 33(1), 8–16. http://doi.org/10.1016/j.tele.2015.06.001 4. Taherdoost, H. (2018). Development of an adoption model to assess user acceptance of e-service technology: E-Servive Technology Acceptance Model. Behaviour and Information Technology, 37(2),doi:10.1080/0144929x.2018.1427793 5. Ayeh JK. (2015). Travellers’ acceptance of consumer-generated media: An integrated model of technology acceptance and source credibility theories. Computers in Human Behavior. 48:173-180. DOI:https://doi.org/10.1016/j.chb.2014.12.0 49. 6. Fishbein M. (1976). A theory of reasoned action: Some applications and implications. Nebraska Symposium on Motivation. 27:65-116 7. Cunha LK, Mandapaka PV, Krajewski WF, Mantilla R, Bradley AA. (2012). Impact of radar rainfall error structure on estimated flood magnitude across scales: An investigation based on a parsimonious distributed hydrological model. Water Resources Research. 48(10):1-22. DOI:https://doi.org/10.1029/2012WR 8. Lucas Jr. HC, Swanson EB, Zmud RW. (2008). Implementation, innovation, and related themes over the years in information systems research. Journal of the Associate for Information Systems. 8(4):2016210 9. Zeithaml V. (1998). Consumer perceptions of price, quality and value: A means-end model and synthesis of evidence. Journal of Marketing. 52(3):2-22 10. Davis FD. (1998). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly. 13(3):319-340 11. Lopez M, Sicilia M .(2014). Determinants of EWOM influence: the role of consumers’ internet experience. Journal of Theoretical and Applied Electronic Commerce Research. 9(1):28-43 12. Shah SSH, Aziz J, Jaffari A, Waris S, Ejaz W, Fatima M, Sherazi SK. (2012). The impact of brands on consumer purchase intentions. Asian Journal of Business Management. 4(2):105-110 13. Fu, S., Yan, Q., and Feng, G. C. (2018). Who will attract you? Similarity effect among users on online purchase intention of movie tickets in the social shopping context. International Journal of Information Management. 40:88-102 14. Agag G., El-Masry AA (2016). Understanding consumer intention to participate in online travel community and effects on consumer intention to purchase travel online and WOM: An integration of innovation diffusion theory and TAM with trust. Computers in human behavior, 60, 97-111. doi:10.1016/j.chb.2016.02.038 15. Lien CH, Cao Y (2014). Examining WeChat users’ motivations, trust, attitudes, and positive word of mouth: Evidence from China. Computers in human behavior. 41:104-111 16. Davis FD, Bagozzi RP, Warshaw PR (1992). Extrinsic and intrinsic motivation to use computers in the workplace. Journal of Applied social psychology. 22(14):1081-1159 17. Liu X, Wei KK (2003). An empirical study of product differences in consumers’ ecommerce adoption behavior. Electronic Commerce Research and Applications. 2(3):229-239 18. Bearden WO, Etzel MJ. (1982). Reference group influence on product and brand purchase decisions. Journal of Consumer Research. 9(2):183-194 19. Lohse GL, Spiller P. (1998). Electronic shopping: Designing online stores with effective customer interfaces has a critical influence on traffic and sales. Communications of the ACM, 41(7):81–88 20. Yoon, S. (2002). The antecedents and consequences of trust in online purchase decisions. Journal of Interactive Marketing,16(2), 47-63.doi:10.1002/dir.1000 Authors: Lakshmi Rawat

Paper Title: Investors Perceptions & Corporate Announcements for Mumbai & Hyderabad Abstract: Markets and investor perceptions on the movements of the markets, with specific reference to the equity stock prices of Nifty 50 Index, are being investigated through the present paper. Most of the theories assert the assumption of rational investor and behavioral attributes of investors in the process of price prediction. Through the present paper, an inquiry is made on the relationship between the investor perceptions about the importance or impact of various corporate announcements on the equity stock prices through the primary data. Mumbai has been perceived to be the Mecca of stock investors. Hence the sample have been selected from two different locations Mumbai and Hyderabad to compare and comprehend on the investor perceptions.

Keyword: Corporate announcements, Investor perceptions, Retail investor, Stock prices. References: 1. Ball, R., Brown, P., & Finn, F. J. (1977). Share capitalization changes, information, and the Australian equity market. Australian Journal of Finance, 105-117. Bhattacharya, S. (1979). Imperfect Information, Dividend Policy, and ‘The Bird in Hand Fallacy”. The Bell Journal of Economics, 259-270. 2. Black, F. (1976). The Dividend Puzzle. Journal of Portfolio Management, 5-8. 124. 3. Easterbrook. (1984). Two Agency-Cost Explanations of Dividends. The American Economic Review, 650-659. Elton, E., & Gruber, M. (1970). Marginal stockholder tax rates and the clientele effect. Review of Economics and Statistics, 68-74. 4. Fama, E. (1965). The Behavior of Stock Market Prices. 638-647 5. Journal of Business, 34-105. 6. Graham, & Dodd. (1951). Security Analysis. New York: McGraw-Hill Book Company. 7. Groves, F. (2008). Corporate Actions A Concise Guide. 8. Hampshire, Britain: Harriman House Ltd. 9. Harsha, J., & Kerav, P. (2012). Investors Behavior of Equity Investment: an empirical study of individual investors. GFJMR, 1-33. 10. Jain, D., & Mandot, N. (2012). Impact of Demographic Factors on Investment Decision of Investors in Rajasthan. Journal of Arts, Science and Commerce, 81-92.

11. Kalay, A. (1982). The ex-dividend day behavior of stock prices: A re-examination of the clientele effect. 12. Journal of Finance, 1059-1070. 13. Lintner, J. (1964). Optimal Dividends and Corporate Growth Under Uncertainity. The Quarterly Journal of Economics, 49-95. 14. Loderer, C., & Zimmermann, H. (1988). Stock Offerings in a different institutional setting: The swiss case. Journal of Banking and Finance, 353-378. 15. Lovric, Lovric, K. M., & Spronk, J. (2008). A Conceptual Model of Investor Behaviour. r. Malhotra, M., Thenmozhi, M., & Kumar, A. (2013). Evidence on changes in time varying volatility around bonus and rights issue announcements. International Journal of Emerging Markets. 16. Mittal, M., & Vyas, R. K. (2008). Persnality Type and Investment Choice: An Empirical Study. The ICFAI University Journal of Behavioral Finance, 6-22.

17. Muhammad, A., & Baig, H. H. (2010). The reaction of Stock Prices to Dividend Announcements and Market Efficiency in . The Lahore Journal of Economics, 103-125. 18. Nelson. (1965). Price Effects in Rights Offerings. 19. Journal of Finance, 650-657. 20. Osei, K. (1998). Analysis of Factors Affecting the Development of an Emerging Capital Market: The Case of the Ghana Stock Market. African Economic Research Consortium Research, 76. 21. Pandey, I. M. (2015). Financial Management. New Delhi: Vikas Publications. 22. Pawar, I. (2013). Investment Pattern and Behaviour of Investors in Indian Capital Markets. Sumedh: Journal of Management, 1-21. 23. Peterson, R. (1971). Bonus Issues, Share Issues, Share Splits and Rights Issues. The Chartered Secretary, 198-207. 24. Shanmugasundaram, V., & Balakrishnan, V. (2009). Behavioral Biases of Investors in Capital Markets. South Asian Journal of Socio-Political Studies, 99-102. Sharma, M., & Gupta, S. (2011). Role of Subjective Norm in Investment Decision Making of Casual Investors. Indian Journal of Finance, 39-46. 25. Suresh, & Naidu. (2016). An empirical study on announcement effect of the right issue on share price volatility and liquidity and its impact on market wealth creation of informed investors in Bangalore with special reference to CNX nifty stocks of NSE. Retrieved from http://zenithresearch.org.in/. 26. White, & Lusztig. (1980). The price effects of rights offerings. 27. Journal of finance and quantitative analysis, 25-40. Authors: C.Kathiravan, P.Mahalakshmi, V.Palanisamy

Paper Title: Online Impulse Buying Behavior of Consumer Triggered by Digital Marketing Abstract: Online marketing is bitten by bit getting to be prominent in creating nations like India. The online advertising has developed as another goal which pulls in a great many customers consistently. "Impulse buy" or "impulse buying depict any buy which a consumer makes, however, has not arranged ahead of time (Baumeister, 2002; Stern, 1962). The components that influence the consumer online buying have been uncovered through quantitative research by breaking down information gathered through an internet-based poll overview. This comprised of 90 consumers who were buying online. This examination additionally talks about the administrative issues, recommendations and suggestions for the future analysts. The understanding of buying behaviour of online customers as far as their impulsive conduct would be useful for the advertisers and academicians. The main aim of this paper is to take a gander at the components which striving for online shopping and to build up a comprehension of the variables affecting the online shopping by the consumers.

Keyword: Impulsive buying, consumer behaviour, online marketing. References: 125. 1. Azim, A. Effect of dynamic environment, customers’ tendency towards promotion and new experiences on impulse buying. Management and Administrative Sciences Review, Vol. 2(3), 281-292,(2013). 2. Cox, K, “The Responsiveness of Food Sales to Shelf Space Changes in Supermarkets”, Journal of Marketing Research, Vol. 1, May, 648-653 pp. 63–67(1964). 3. Dittemar, H., Beattie, J., and Friese, S,“ObjectsDecision Considerations and self-image in men’s and Women’s impulse purchases”, Actapsychologia, 93, pp.187–206(1996). 4. John D. “Self-image- is it in the bay? A qualitative Comparison between ‘ordinary’ and ‘excessive’ consumers”, Journal of Economic Psychology, 21, pp. 109–142, (2000) 5. Falahat, M., Osman, M. &Migin, M.W. Born Global Firms in Developing Economies: The Case of Malaysia. Australian Journal of Basic and Applied Sciences, 7(4), 586-594,(2013). 6. Kang Lo S., Chou Y., Teng Ch. Source effect of advertised reference price influences on transaction value in online shopping environments. Electronic Commerce Res,Vol. 13, p. 411–421, 2013. 7. Kathiravan, C., & Deepak, R. K.. Public Cognizance on Cause Assortment in Cause Affiliated Campaigns. International Journal of Marketing, Financial Services & Management Research, 2(9), (2013). 8. Muruganantham, G., &Bhakat, R. S. A review of impulse buying behavior. International Journal of Marketing Studies, Vol. 5(3), 150-160, (2013). 9. Newman, S. and Lloyd Jones, T., Airport and travel terminal retailing: Strategies, Trends and market dynamics. Ravenfox publishing, London,(1999). 10. Tol, B. v. Electronic commerce and technology. Ottawa: Statistics Canada, (2003). 11. Tol, B. v. Electronic commerce and technology. Retrieved August 24, 2004, 12. Zhang, X., Prybutok, V. R., &Strutton, D..Modeling influences on impulse purchasing behaviors during online marketing transactions. Journal of Marketing Theory and Practice, 1(15), 79–89, (2007). doi:10.2753/MTP1069-6679150106 Authors: AV.Karthick, M.Ayisha Millath, R.Rajesh Karthik, M.Faisal

Paper Title: Influence of Social Marketing on Rain Water Harvesting Practices for Water Recycling System Abstract: Water is a limited natural resource for nourishing human life. Drinking water scarcity is one of the globally facing emerging issues. Harvesting is one among the major solution for this problem. There are three different ways of harvesting techniques like rainwater, ground water and flood water. Human health is 126. intrinsically linked to the environment and water resources. Increasing water demand affecting more than majority of people throughout the world every year and are considered as a most critical risk to human sustainability. In the recent years social marketing is applied for general issues that are facing by public. This 654-661 paper mainly focuses on the level of knowledge on water recycling. The study area is Sivagangai district. The sample size is 518 based on proportionate random sampling method. From this analysis they identified female are more aware on water harvesting.

Keyword: awareness, harvesting, health, limited, recycling, resources. References: 1. Alyssa M. Mayeda, Amanda D. Boyd, Travis B. Paveglio & Courtney G. Flint (2018) Media Representations of Water Issues as Health Risks, Environmental Communication, DOI: 10.1080/17524032.2018.1513054. 2. Andrea Ghermandi, Michael Sinclair (2019) Passive crowd sourcing of social media in environmental research: A systematic map, Global Environmental Change. DOI: 10.1016/j.gloenvcha.2019.02.003. 3. Ashleigh M. Day, Sydney O Shay-Wallace, Matthew W. Seeger & Shawn P. McElmurry (2019) Informational Sources, Social Media Use, and Race in the Flint, Michigan, Water Crisis, Communication Studies, DOI: 10.1080/10510974.2019.1567566. 4. AV.Karthick, Dr.M.Ayisha Millath (2019) Management of Digital Libraries for Active Learning Environment: Trends and Challenges, Library Philosophy and Practice (e-journal). 5. AV.Karthick, Dr. M.Ayisha Millath (2018) Suggestive water treatment and conservation techniques among the Sivagnagai Civilan, International Journal of Advance and Innovative Research. 6. AV.Karthick, Dr. M.Ayisha Millath, S.Thowseaf (2018) Elucidating Water supply, demand and contamination in Tamilnadu, Shanlax International Journal of management. 7. AV.Karthick, Dr. M.Ayisha Millath, S.Thowseaf (2018) Water Recharge Realization and Cognizance habit among the Rural People, ICACSE, NIT Trichy. 8. Cayce Myers (2014) Social media as the new water cooler: Implications for PRpractitioners concerning the NLRB’s stance on social media and workers’ rights,Public Relations Review. DOI: 10.1016/j.pubrev.2014.03.006. 9. Daniel Goodwin, Marie Raffin, Paul Jeffrey & Heather M. Smith (2017) Evaluating media framing and public reactions in the context of a water reuse proposal, International Journal of Water Resources Development, DOI: 10.1080/07900627.2017.1347085. 10. Deepak Chhabra, Kathy Andereck, Keiko Yamanoi, Dan Plunkett (2011) Gender Equity and Social Marketing: An Analysis of tourism advertisements, Journal of Travel & Tourism Marketing. DOI: 10.1080/10548408.2011.545739. 11. Ifigeneia Koutiva, Patricia Gerakopoulou, Christos Makropoulos & Christoforos Vernardakis (2016): Exploration of domestic water demand attitudes using qualitative and quantitative social research methods, Urban Water Journal, DOI: 10.1080/1573062X.2015.1135968. 12. J.J. Harou, P. Garrone, A. E. Rizzoli, A. Maziotis, A. Castelletti, P. Fraternalid, J. Novak, R. Wissmann Alves, P.A. Ceschi (2014) Smart Metering, Water Pricing and Social Media to Stimulate Residential Water Efficiency: Opportunities for the SmartH2O Project, 16th Conference on Water Distribution System Analysis, WDSA. DOI: 10.1016/j.proeng.2014.11.222. 13. Jamie N Smith (2018) ? Nonprofit Constituent Engagement Through Social Media, Journal of Nonprofit & Public Sector Marketing, DOI: 10.1080/10495142.2018.1452821. 14. Kevin Gatt (2016) Social network analysis as a tool for improved water governance in Malta, International Journal Society Systems Science. DOI: 10.1504/IJSSS.2016.077013. 15. Liping Yan, Phil McManus & Elizabeth Duncan (2019) Ethnicity and media: a study of English and non-English language print media coverage of water issues in Sydney, Local Environment, DOI: 10.1080/13549839.2019.1588868. 16. Lloyd James S Baiyegunhi (2015) Determinants of rainwater harvesting technology (RWHT) adoption for home gardening in Msinga, KwaZulu-Natal, South Africa, Water SA. DOI: 10.4314/wsa.v4lil.6. 17. M. Rae Moors (2019) What is Flint? Place, storytelling, and social media narrativereclamation during the Flint water crisis, Information, Communication & Society, DOI: 10.1080/1369118X.2019.1577477. 18. Margaret Alston and Kerri Whittenbury (2014) Social impacts of reduced water availability in Australia’s Murray Darling Basin: adaptation or maladaptation, International Journal of Water. DOI: 10.1504/IJW.2014.057777. 19. Margaret O. Wilder, Ismael Aguilar-Barajas, Nicolas Pineda-Pablos, Robert G. Varady, Sharon B. Megdal, Jamie McEvoy, Robert Merideth, Adriana A. ZunigaTeran & Christopher A. Scott (2016) Desalination and water security in the US–Mexico border region: assessing the social, environmental and political impacts, Water International, DOI: 10.1080/02508060.2016.1166416. 20. Middle East Water Commission (1995) Observations Regarding Water Sharing and Management: An Intensive Analysis of the Jordan River Basin with Reference to Long-distance Transfers, International Journal of Water Resources Development, DOI: 10.1080/07900629550042083. 21. Raechel Johns (2014) Community change: Water management through the use of social media, the case of Australia’s Murray- Darling Basin, Public Relations Review. DOI: 10.1016/j.pubrev.2014.09.002. 22. Robert Case & Lea Caragata (2009) The Emergence of a New Social Movement:Social Networks and Collective Action on Water Issues in Guelph, Ontario, Community Development, DOI: 10.1080/15575330903091738. 23. S. E. Wolfe & David B. Brooks (2016) Mortality awareness and water decisions: a social psychological analysis of supply- management, demand-management and soft-path paradigms, Water International, DOI: 10.1080/02508060.2016.1248093. 24. Sridhar Vedachalam, Bruce V. Lewenstein, Kelly A. DeStefano, Shira D. Polan & Susan J. Riha (2015) Media discourse on ageing water infrastructure, Urban Water Journal, DOI: 10.1080/1573062X.2015.1036087. 25. Tortajada C & Pobre K (2011) The Singapore - Malaysia water relationship: an analysis of the media perspectives, Hydrological Science Journal. DOI: 10.1080/02626667.2011.579074. 26. Uta Wehn, Kevin Collins, Kim Anema, Laura Basco-Carrera & Alix Lerebours (2017) Stakeholder engagement in water governance as social learning: lessons from practice, Water International, DOI: 10.1080/02508060.2018.1403083. 27. W.D. Evans, S.K. Pattanayak, S. Young, J. Buszin, S. Rai, Jasmine Wallace Bihm (2014) Social marketing of water and sanitation products: A systematic review of peer-reviewed literature, Social Science & Medicine. DOI: 10.1016/j.socscimed.2014.03.011. 28. Wang Xifeng, Zhou Zuhao, Yang Guiyu & Jia Yangwen (2012) Development of Social-natural Dualistic Water Cycle Model and Dynamic Assessment of Water Resources in Hun River Basin in China, HKIE Transactions. DOI: 10.1080/1023697X.2012.10668256. 29. Yan Chen, John R. Parkins & Kate Sherren (2019) Leveraging Social Media to Understand Younger People’s Perceptions and Use of Hydroelectric Energy Landscapes, Society & Natural Resources, DOI: 10.1080/08941920.2019.1587128. Authors: N. Thamaraiselvan, G. R. Jayadevan, K. S. Chandrasekar

Paper Title: Digital Food Delivery Apps Revolutionizing Food Products Marketing in India Abstract: Food delivery aided through digital apps has emerged as one of the fast-growing developments in the e-commerce space. The advent of digital tools has bestowed a different outlook on the food industry. Consumers today have the privilege to choose from a variety of cuisines, anywhere, anytime from a range of 127. food providers listed in the e-commerce space. Added attractions like no minimum order value and the multitude of payment options like net banking, digital wallets, and cash on delivery all have increased the consumer convenience. Shrinking urban-rural divide with easy access to smartphones has hastened the growth and 662-665 acceptance of online food delivery systems. Companies have remodelled their business strategies on a modern day digital platform to keep pace with the customer’s changing needs and preferences. In this paper, we particularly examine the growth and relevance of digital apps in the food delivery systems run by the food providers particularly fast food companies in India and a few strategies which could be adopted by them for sustainable business in the days to come.

Keyword: Digital Apps, e-Commerce, Food Products Marketing, Consumer Choice References: 1. Bajaj, K. & Mehendale, S. (2016). Food - Delivery Start-Ups: In Search of the Core. Prabandhan: Indian Journal of Management, Volume 9, Issue 10. 2. Bhargava, A., Jadhav, N., Joshi, A., Oke, P., & Lahane, S. R. (2013). Digital ordering system for Restaurant using Android. International Journal of Scientific and Research Publications, Volume 3, Issue 4. 3. Gera, M., Nawander, N., Tharwani, N. & Bhatia, P. (2018). Operations research in food delivery. International Journal of Advance Research and Development, Volume 3, Issue 10, Pages 73-78. 4. Hannu, S., Lasse, M. & Yrjölä, M. (2014). From selling to supporting – Leveraging mobile services in the context of food retailing. Journal of Retailing and Consumer Services, Volume 21, Issue 1, Pages 26-36. 5. Kanteti, V. (2018). Innovative strategies of startup firms in India - A study on online food delivery companies in India. International Research Journal of Management Science & Technology, Volume 9, Issue 3, Pages 17-23. 6. Kapoor, A. P. & Vij, M. (2018). Technology at the dinner table: Ordering food online through mobile apps. Journal of Retailing and Consumer Services, Volume 43, Pages 342–351. 7. Kashyap, K. (2017, June 26). The Food Delivery Apps That Are Competing To Gain Market Share in India. Retrieved from https://www.forbes.com/sites/krnkashyap/2017/06/26/the-food-delivery-apps-that-are-competing-to-gain-market-share-in- india/#56bc21ad1993 (accessed on May 29, 2019). 8. Kharas, Homi. 2017. The unprecedented expansion of the global middle class: An update. © Brookings, India. http://hdl.handle.net/11540/7251. 9. Kimes, S. E. (2011). Customer perceptions of electronic food ordering. Cornell Hospitality Report, Volume11, Issue 10, Pages 6-15 https://scholarship.sha.cornell.edu/cgi/viewcontent.cgi?article=1069&context=chrpubs. 10. Mckinsey. (2016, November). Retrieved from https://www.mckinsey.com/industries/high-tech/our-insights/the-changing-market- for-food-delivery (accessed on May 29, 2019). 11. Raman, P. (2018): Zomato: a shining armor in the food tech sector, Journal of Information Technology Case and Application Research, DOI: 10.1080/15228053.2018.1552396. 12. https://economictimes.indiatimes.com/markets/stocks/news/indias-consumption-story-why-you-just-cant-ignore-this- opportunity/articleshow/66346111.cms?from=mdr (accessed on June 2, 2019). 13. https://economictimes.indiatimes.com/small-biz/startups/newsbuzz/swiggy-zomato-in-top-gear-as-ride-hailing-companies-slow- down/articleshow/69405510.cms (accessed on June 2, 2019). Authors: G. Jeyanthan, G. Ilankumaran Circular Economy – Key for the Change of Natural Resource from Scarce to Paper Title: Abundance Abstract: As per world economic forum and UN's world population prospects, every year, the world's population is getting increased by 83 million more people, with this increasing population the usage of some of the available abundant natural resource has increased which may lead to scarcity of these resources. The world was using a traditional economic model based on a 'take-make-consume-throw away' approach of resources, it relays on cheap and easily available resources and starts producing goods, uses it and finally destroys it or dump it as a huge waste. So the world has to shift the gear to circular and sharing economy models. On a small scale, many companies are already working on the problems of resource usage efficiency by developing new technologies, such as those underlying the so-called sharing economy. Car sharing, and bike sharing for example. The circular economy is the process of not buying the goods but using the services and performance of the goods than owning it. This is the model where the manufacturers or the retailers are the owners of the goods and products used by us. The maintenance and repairs will be handled by the manufacturer which is also a part of the deal. In the recent years, the circular economy has gained a greater momentum in all parts of the world like corporate, governments, non-profit organizations and industry associations. The Circular economy will act as an innovative national level developmental strategy with a long-term vision for the future of a well-sustained world by increasing the abundance of the available natural resources. Yet the circular economy has a setback in its model; it also needs certain resource and energy for the process of recycling which is comparatively less. The major question will be whether the energy required for recycling is always lower than reproducing the product 128. itself. 666-671 Keyword: 'take-make-consume-throw away'corporate, governments, non-profit organizations and industry association References:

1. https://www.weforum.org/agenda/2017/07/11-facts-about-world-population-you-might-not-know/

2. http://eprints.lse.ac.uk/18905/1/Scarce%20or%20abundant(lsero).pdf

3. file:///C:/Users/ADMIN/Downloads/9783319677521-c2.pdf

4. https://link.springer.com/article/10.1023/A:1008389422019

5. http://eprints.lse.ac.uk/cgi/stats/report/eprint

6. https://www.youtube.com/watch?v=Cd_isKtGaf8

7. http://www.economywatch.com/features/A-Linear-Economys-Environmental-and-Social-Consequences0911.html

8. https://www.nytimes.com/2018/01/11/world/china-recyclables-ban.html

9. https://www.navigantresearch.com/blog/2018-a-year-for-action-and-implementation-for-circular-economy

10. http://www.switchtogreen.eu/wordpress/wp-content/uploads/wp-post-to-pdf-enhanced-cache/1/circular-economy-strategy.pdf 11. http://entreprenorskapsforum.se/wp-content/uploads/2015/12/CircularEconomy_webb.pdf

12. https://www.omicsonline.org/open-access/key-challenges-for-transformations-towards-a-circular-economy--thestatus-quo-in-

germany-2252-5211-1000262.php?aid=85297

13. https://www.supplychainquarterly.com/news/20171019-the-challenges-of-implementing-a-circular-economy/

14. https://www.reedsmith.com/en/perspectives/2016/05/the-implications-of-the-transition-to-a-circular-e

15. http://ec.europa.eu/environment/circular-economy/index_en.htm Authors: M. Faisal, S. Chandramohan, M. Ayisha Millath, AV.Karthick

Paper Title: Influence of Fashion Behavior on Store Choice among the Arts College Students in Sivganga District Abstract: This article presents the impact of fashion trends for teenagers and its influence on store choice. The study was conducted with 300 teenagers of age between “18-25”. Survey method with structured questionnaire is used to collect the data. Convenience sampling techniques were adopted and the data were collected from Sivaganga district of Tamil Nadu. The study resulted that, fashion related views and expectation varies with respect to area of Residence, Age, Family Income, Size of the family, and Frequency of purchase. Also, the most influencing sources for purchase is found to be comforted, moreover, it is also found that the influencing source also varies with respect to area of Residence, Age, Family Income, Size of the family, and frequency of purchase.

Keyword: expectations, fashion, sources, store choice, views. References: 1. Bellenger, D. N. (1977). Shopping center patronage motives. . Journal of Retailing , (52)3, 29-38. 2. Darden, W. R. (1980). A patronage model of consumer behavior. In R. W. Stampfl & E. Hirschman (Eds.), Competitive structure in retail markets: The department store perspective. Chicago: American Marketing Association , (pp. 43-52). 3. Darden, W. R. (1987). Socialization effects of retail work experience on shopping orientations. Academy of Marketing , 15 52-63. 4. Hawkins, D. I. (1989). Consumer behavior (4th ed.). . Homewood, IL: Irwin. 129. 5. Lumpkin, J. R. (1985). Shopping orientation segmentation of the elderly consumer. Journal of the Academy of Marketing Science , 13 272-289. 6. Lumpkin, J. R. (1985). Shopping orientation segmentation of the elderly consumer. . Journal of the Academy of Marketing Science , 672-676 13 272-289. 7. Pessemier, E. A. (1980). Store image and positioning. Journal of Retailing , (51)6, 94-106. 8. Wells, W. D. (1967). Life cycle concept in marketing research. Journal of Marketing Research , 3(4), 355-363. 9. Margaret Bruce, Lucy Daly, (2006) "Buyer behaviour for fast fashion", Journal of Fashion Marketing and Management: An International Journal, Vol. 10 Issue: 3, pp.329-344. 10. Martin Evans, (1989) "Consumer Behaviour towards Fashion", European Journal of Marketing, Vol. 23 Issue: 7, pp.7-16. 11. Constanza Bianchi & Grete Birtwistle (2010) Sell, give away, or donate: an exploratory study of fashion clothing disposal behaviour in two countries, The International Review of Retail, Distribution and Consumer Research, 20:3, 353-368. 12. Richard Michon, Hong Yu, Donna Smith, Jean‐Charles Chebat, (2008) "The influence of mall environment on female fashion shoppers' value and behaviour", Journal of Fashion Marketing and Management: An International Journal, Vol. 12 Issue: 4, pp.456- 468. 13. Helen McCormick, Charlotte Livett, (2012) "Analysing the influence of the presentation of fashion garments on young consumers’ online behaviour", Journal of Fashion Marketing and Management: An International Journal, Vol. 16 Issue: 1, pp.21-41. 14. Alana M James, Lizette Reitsma & Mersha Aftab (2019) Bridging the doublegap in circularity. Addressing the intention-behaviour disparity in fashion, The Design Journal, pp. 901-914. 15. Lewis, C., Kerr, G. & Burgess, L. (2019). Positioning a destination as fashionable: The destination fashion conditioning framework. Tourism Management: research, policies, practice, 72 209-219. 16. Ju Yeun Jang, Eunsoo Baek, Ho Jung Choo, (2018) "Managing the visual environment of a fashion store: Effects of visual complexity and order on sensation-seeking consumers", International Journal of Retail & Distribution Management, Vol. 46 Issue: 2, pp.210-226. 17. Emel Yarimoglu and Gul Binboga (2018). Understanding sustainable consumption in an emerging country: The antecedents and consequences of the ecologically conscious consumer behavior model, Business Strategy and the Environment, 28, 4, (642-651) Authors: R. Rajkumar, Lj. Chaarlas

Paper Title: Quantifying the Level of Awareness on Brand Extension using Index as the Tool Abstract: Marketing Management, one of the major functions of the business, facilitates the strongest affiliation of business to the customer through the delivery of what the customer likes, wants, demands and cherish. The brand delivers a clear message about its product and the company, confirms the credibility, motivates the consumer, builds up and concretes the loyalty. Brand Extension has been a commonly accepted marketing strategy used to break the entry barriers between product categories through the carryover of a brand’s 130. reputation. It is important, hence, to study how strong the brands which have already extended have, in reality, grown by studying the level of awareness among the consumers. Hence, there arises a need to understand the reach of brand extension based on the brand awareness of the market under the title, “Quantifying the Level of 677-687 Awareness on Brand Extension using Index as the Tool”. A renowned/successful brand helps an organization to launch products in new categories more easily. Reduction of the risk perceived by customers, reduction in the promotional expenditure and reduction of the cost of developing a new brand are the benefits of Brand Extension. The reach of Brand Extension has been found to be satisfactory and the level of awareness on Foreign Brands. Brand Extension should be used to improve the CSR capability of the company besides being to enhance the marketing and the profitability of the company.

Keyword: Brand Extension, Brand Awareness, Brand Awareness Index, Foreign Brands, Electronic Brands. References: 1. Pitta Dennis A and Katsanis Lea Prevel (1995), Understanding Brand Equity for Successful Brand Extension, Journal of Consumer Marketing, Vol. 12(4), pp.51-64. 2. Aaker D.A. and Keller K.L. (1990), Consumer Evaluations of Brand Extensions, Journal of Marketing, Vol. 54(1), pp. 27-41. 3. Tauber E.M. (1981), Brand Franchise Extension: New Product Benefits from Existing Brand Names, Business Horizons, Vol. 24(2), pp. 36-41. 4. Tariq Jalees and Dr. Tahir Ali, How do consumers evaluate brand-extensions a five-factor approach, Market forces, July-2008, pp. 09-17. 5. Buday, T. (Fall 1989). Capitalization on Brand Extensions. The Journal of Consumer Marketing 6(4), 27. 6. Styles, T.A. a.c. (1997). Brand development versus new product development: toward a process model of extension decisions Journal of Product & brand Management, 6(4), 222-234. 7. Building Brand Value by M.G. Parameswaran (first edition 2006), Tata McGraw Hill Publication Company Limited, New Delhi; pp: 241, 243. 8. Building Brands in the Indian Market (1st Edition), “Familiarity Breeds Profits-Brand Extension strategies in India” 2008 by N. Thamaraiselvan; Anurag Jain for excel Books, New Delhi; Pp. 230-231. 9. Building Brands in the Indian Market (1st Edition), “Creeping Extensions” 2008 by S. Sakthivel Rani, Anil C, A. Seethalakshmi; Anurag Jain for excel Books, New Delhi; Pp. 260 – 263. 10. Babu John Mariadoss, Raj Echambadi, Mark J. Arnold & Vishal Bindroo (2010), An examination of the effects of perceived difficulty of manufacturing the extension product on brand extension attitudes, Journal of Academy of Marketing Science, No. 38, pp.704-719. 11. Vicki Lane and Robert Jacobson (1997), The Reciprocal Impact of Brand Leveraging: Feedback Effects from Brand Extension Evaluation to Brand Evaluation, Marketing Letters, Vol. 8, No.3, pp.261–271. 12. Devon Del Vecchio and Daniel C. Smith (2005), Brand-Extension Price Premiums: The Effects of Perceived Fit and Extension Product Category Risk, Journal of Academy of Marketing Science, Vol. 33, No. 2, pp.184-196. 13. Wilfried R. Vanhonacker (2007), Brand Extension Naming Strategies: An Exploratory Study of the Impact of Brand Traits, Marketing Letters, Vol. 18, pp.61–72. 14. Valerie A. Taylor and William O. Bearden (2002), The Effects of Price on Brand Extension Evaluations: The Moderating Role of Extension Similarity, Journal of Academy of Marketing Science, Vol. 30, No. 2, pp.131-140. 15. Fu Guoqun and Ding Jiali (2002), Ownership effects in consumers’ brand extension evaluations, Front Business Research China, Vol. 1, No. 2, pp. 193-210. 16. Nathalie Dens and Patrick De Pelsmacker (2010), Advertising for extensions: Moderating effects of extension type, advertising strategy, and product category involvement on extension evaluation, Marketing Letters, Vol. 21, pp.175–189. 17. Michael S. Mccarthy, Timothy B. Heath and Sandra J. Milberg (2001), New Brands versus Brand Extensions, Attitudes versus Choice: Experimental Evidence for Theory and Practice, Marketing Letters, Vol. 12, No. 1, pp.75-90. 18. Duncan B. Milloy (2007), The Effect of Favorable Usage Experience with a Core Brand on Core Brand Extension Perception and Purchase Intention, A Dissertation Presented to the Faculty of the College of Business Administration of Touro University International, pp. 1-136. 19. Swaminathan, V.F., R.J. and Reddy, (2001), The Impact of Brand Extension Introduction on Choice, Journal of Marketing, 65 (October), pp. 1-15. 20. Catherine W.M. Yeung and Robert S. Wyer JR. (2005), Does Loving a Brand Mean Loving Its Products? The Role of Brand- Elicited Affect in Brand Extension Evaluations, Journal of Marketing Research, Vol. XLII, pp. 495-506. 21. Franziska Volckner and Henrik Sattler (2006), Drivers of Brand Extension Success, Journal of Marketing, Vol. 70, pp. 18–34. 22. Alokparna Basu Monga Deborah Roedder John (2007), Cultural Differences in Brand Extension Evaluation: The Influence of Analytic versus Holistic Thinking, Journal of Consumer Research, Vol. 33, pp.529–536. 23. Henrik Sattler, Franziska Völckner, Claudia Riediger, Christian M. Ringle, The Impact of Brand Extension Success Drivers on Brand Extension Price Premiums, Forthcoming IJRM, Vol. 27, pp. 1-37. 24. Deborah Roedder John, Barbara Loken, and Christopher Joiner (1998), The negative impact of extensions: Can flagship products be diluted?, Journal of Marketing, Vol. 62, Pp.19-32. 25. Jose M. Pina, Eva Martinez, Leslie de Chernatony and Susan Drury, (2006) “The effect of service brand extension on corporate image: An empirical model”, European Journal of Marketing, Vol. 40 Issue: 1/2, Pp. 174-197. Authors: Shetty Deepa Thangam Geeta, SP. Mathiraj, M.Thivya Bharath

Paper Title: Impact of GST on MSMEs Abstract: MSME play a vital in the economical progress of the Countries, so the implementation of GST has had an immense outcome on the continued existence in the market. Some enterprises found it helpful however majority visage problem in adopting it. For existing enterprises, GST simplified the tax structure, unified the market thus improved among all operational efficiencies of MSME, to this point the unorganized MSMEs were growing quick than the organized ones as a result of the minimization, with GST in effect, it has made the taxation system transparent thus making the entities liable for tax payment. This paper brought out issues and challenges experienced by MSME Entrepreneur. In order to find out the impact on various aspect 131. such as applying of GST, created the registration for taxation and High Compliance burden by using Cluster Random Sampling Technique in which 158 MSME Entrepreneur were selected in Sivaganga District in Tamil Nadu for the study. The statistical tools used for the analysis is one-way ANOVA. ANOVA is used to identify 688-694 the significance of the difference in the levels of impact of GST among MSMEs. It was concluded that the impact of GST on the Indian MSME sector can go both positive and negative ways.

Keyword: GST, Issued faced, Levels of Impact, MSME. JEL Classification: L26, G18, H20, Z13 References: 1. G.Venkateswarlu, M. J. (2018). Impact of GST on Micro, Small and Medium Enterprises (MSMEs). International Journal of Engineering and Management Research, 8(2), 91-95. 2. Shetty Deepa Thangam Geeta, Mathiraj.SP & Saroja Devi (2019) “Students Responsiveness on the Implementation of GST In Commerce Stream”, in Journal of and Innovative Research (JETIR) UGC Approved Journal Vol.6, Issue 2, ISSN-2349-5162, pp-537-540, January 2019. 3. Shetty Deepa Thangam Geeta, Mathiraj.SP, Saroja Devi, N. Nagalakshmi & M. Vinoth (2019) “Performance & Consequences of GST on Micro, Small & Medium Entrepreneurs”, in International Journal of Research and Analytical Reviews (IJRAR) UGC Approved Journal no- 43602 Vol.6, Issue 1, ISSN-2348-1269, pp-26-37, February 2019 4. Singh, A. N. (2018, February). A Comprehensive Analysis of Goods and Services Tax (GST) in India. Indian Journal of Finance, 12(2). doi: 10.17010/ijf/2018/v12i2/121377. 5. Statistical Hand Book of Sivagangai ,2017 https://cdn.s3waas.gov.in/s31a5b1e4daae265b790965a275b53ae50/uploads/2018/06/2018062188.pdf 6. Singh, S. S. (2018, November). GST in India : Performance of Companies After One - Year of Roll Out. INdian Journal of Finance, 12(11). doi:http://dx.doi.org/10.17010/ijf%2F2018%2Fv12i11%2F138197 7. G.Venkateswarlu, M. J. (2018). Impact of GST on Micro, Small and Medium Enterprises (MSMEs). International Journal of Engineering and Management Research, 8(2), 91-95. 8. http://conference.nrjp.co.in/index.php/GST/article/download/228/231/ 9. .https://cdn.s3waas.gov.in/s31a5b1e4daae265b790965a275b53ae50/uploads/2018/06/2018062188.pdf 10. http://conference.nrjp.co.in/index.php/GST/article/download/241/243/ 11. https://acadpubl.eu/hub/2018-119-17/2/194.pdf 12. Vhttp://www.indianjournaloffinance.co.in/index.php/IJF/article/view/121377 13. http://dx.doi.org/10.17010/ijf%252F2018%252Fv12i11%252F138197 14. http://www.pibm.in/pdf/PIBM%20-%20A%20Journal%20of%20Management%20-%20Volume%203.pdf 15. http://gstinindia.in/Impact_of_GST_on_MSME.aspx 16. http://indianresearchjournals.com/pdf/IJMFSMR/2018/August/1.pdf 17. http://www.iosrjournals.org/iosr-jbm/papers/Vol20-issue7/Version-1/J2007018183.pdf 18. http://www.smecorp.gov.my/images/pdf/1Q_2016_SMEs_Survey_English_WEB.pdf 19. http://iosrjournals.org/iosr-jbm/papers/Vol20-issue7/Version-1/J2007018183.pdf Authors: E.Saraladevi, S. Chandramohan, M. Ayisha Millath

Paper Title: Online Shopping Behavior Pattern among School Children Abstract: Online Shopping has become an important aspect among parents and childrens’ routine life. Shopping everything that wee desire, sitting in one place is easy now, due to the advancement in technologies. Online shopping among adults is common, but in this paper, we highlight childrens’ online shopping behavior. Here the researcher attempts to understand childrens’ awareness of online shopping, preferences applications, motivating and encouraging factors towards online shopping. This paper reports on recent research, which was undertaken among school-going childrens’ at Tamilnadu. A structured questionnaire was developed and distributed among a sample of 380 school children, among which 32.4% were male children and 67.6% were female children. Social media plays a vital role in childrens’ behavior patterns. The next generation of children will be more addicted to Online Shopping, since this is a recent survey, which will enable us to find exactly the factors which are responsible for triggering them to shop online. Recent advancements in online shopping technologies have provided children, to use this unique opportunity to learn and teach parents as well. Upon exploration from the data collected, childrens’ preferences and choices towards the online shopping has been 132. identified.

Keyword: Awareness, Online Shopping, Preferences, School Children. 695-699 References: 1. George Wilson, K. W. (2004). The influence of children on parental purchases during supermarket shopping. International Journal of Consumer Studies, 329-336. 2. Gilly, M. W. (2001). Shopping Online for Freedom,Control, and Fun. California Management Review Reprint Series, 43. 3. Jason E. Leug, N. P. (2006). Tennagers' use of alternative shopping channels: A Consumer Socialization Perspective. Journal of Retailing, 137-153. 4. Kelly, L. (2017, May 25). How Many People Shop Online? [Infographic]. Retrieved from Tinuiti: https://www.cpcstrategy.com/blog/2017/05/ecommerce-statistics-infographic/ 5. Narges Delafrooz, L. H. (2009). Factors affecting students’ attitude toward online shopping. African Journal of Business Management, 200-209. Retrieved from http://www.academicjournals.org/AJBM 6. Sramova, B. (2017, November 21). Children’s Consumer Behavior. doi:10.5772/intechopen.69190 7. Thaichon, P. (2017). Consumer socialization process: The role of age in childrens’ online shopping behavior. Journal of Retailing and Consumer Services, 38-47. doi:http://dx.doi.org/10.1016/j.jretconser.2016.09.007 8. Wen Gong, R. L. (2013). Factors influencing consumers’ online shopping in China. Journal of Asia Business Studies, 214-230. doi:https://doi.org/10.1108/JABS-02-2013-000 9. Zhaocai Jiang, X. Z. (2017). Self-control predicts attentional bias assessed by online shopping-related Stroop in high online shopping addiction tendency college students. 14-21. doi:doi:10.1016/j.comppsych.2017.02.007 Authors: P.Nivetha, S.Sudhamathi

Paper Title: Marketing Trends using Latest Technology Abstract: Marketing deals with examing besides maintenance of the deal of return. It is the business mechanism of organizing deal and achieve the needs of clients. It is one of the best phase of company leadership along with the concern on the needs of the clients.Because of cost effectiveness and broader range, online 133. marketing is considered as one of the effective marketing strategies in business. Over a period of timeseveral online marketing techniques have been changed. Result of changing in digital trends, marketers ought to be aware of the modifications to adapt with the trending technologies and to remain ahead in the market. These will 700-703 guide them gain a competitive edge and comes out with a new methods to improve their businesses, attain leads and improve the relationship with their vital clients. Artificial intelligence and machine learning are developing aspect of numerous sectors, including marketing. Artificial Intelligence (AI) Marketing Applications offers techniques to connect performance as well as science data. Screening and analyzing huge data was once tough to achievablebut it iseasy to achieve now. This paper sheds light on the survey of AIA's possibilities for human as well as its importance in this field. This paper explores AIA as an individual contributor in the world's digital marketing.

Keyword: Online Marketing,Marketing 6.0, Digital Marketing, Trends in marketing, Artificial Intelligence Applications, AIA, Intelligent Agents. References: 1. Russell, Stuart J ? ??. Artificial Intelligence: A ModernApproach. 2nd. Upper Saddle River, New Jersey, PrenticeHall, 2003 2. Philip Kotler, HermawanKartajaya, Marketing 3.0: From Products to Customers to the Human Spirit, 2010 3. Philip Kotler, HermawanKartajaya, Marketing 4.0: Moving from Traditional to Digital, 2016 4. A. K. Kirtis and F. Karahan, “To Be or Not to Be in Social Media Arenaas the Most Cost-Efficient Marketing Strategy after the GlobalRecession,” Procedia - Social and Behavioral Sciences, vol. 24, pp.260–268, 2011. 5. Sridevi and Senthil Kumar, “EmergingTrends in Online Marketing”, in ICTACTJournal on Management Studies, February2015, Vol.01, p 34-38. 6. Anitha, “Consumer Preference towards Online Retailing”, in ICTACT Journal onmanagement studies, May 2015, Vol.01,Issue 02, p 74-80 7. Philip Kotler, "Marketing Management",11th Edition. Prentice Hall: New Delhi,2003. 8. Roman G. Hiebing and Scott W. Cooper,"The Successful Marketing Plan". TataMcGraw-Hill Publishing CompanyLimited: New Delhi, 2007. Authors: NPA and Its Impact on Asset Quality- Bankers’ Perception

Paper Title: Salini R Chandran, K. Alamelu Abstract: NPA is a burning issue in the Indian Banking Sector. So the main purpose of the paper is to identify the trends in the NPA and to examine bankers’ perception on reasons for NPA and to suggest measures for minimizing NPA. The study is based on both primary data and secondary data. Secondary data is collected for a period of 16 years from 2002 to 2017. Percentages, growth rates, mean, standard deviation, Z-test and chi- square tests are the major tools of analysis. The study has found that over the years there is tremendous growth in the NPA of banks. The major reason for this was wilful default from the part of borrowers and siphoning of funds for other purposes. The significant contribution of the study will be pragmatic suggestions on improving asset quality of banks in India. It will throw new insights on effective credit management by banks.

Keyword: Credit Growth, Doubtful, NPA, Substandard, Wilful Defaulters, References: 1. Brown J. D. (2001) Using Surveys in language Programs, 1st Edition Cambridge University Press P. 176. 2. Carmines, E.G.and Zeller, R.A. (1979), “Reliability and Validity Assessment”, Sage Publications, USA, p. 11-12. 3. Chakrabarty, K.C. (2012), Supporting Explosive Growth: Effective Linkages between the Banking Sector and Real Sector, 8th Annual Banking Summit ASSOCHAM, New Delhi, Online: http://www.rbi.org.in/scripts/BS_SpeechesView.aspx?Id=754 4. Chilukuri, S. S., Srinivas, R. K., and Madhav, V. V. (2016). An Empirical Analysis on Asset Quality of Indian Banking Industry - Nonperforming Assets to Advances. Journal of Accounting &Marketing. 5. Chipalkatti, N and Rishi, M (2007), Do Indian Bank understate their bad loans , The Journal of Developing Areas, Volume 40, Number 2, Spring 2007, pp. 75-91 6. Connaway, L.S. and Powell, R.R. (2010), “Basic Research Method for Librarians”, Library of Congress Cataloging-in-Publication 134. Data, p.63 7. Dukes, K. A. (2005), Cronbach's Alpha. Encyclopedia of Biostatistics, John Wiley and Sons Limited, USA 8. Funk, R.,Ives, M. and Dennis, M. (2007),“Reliability – Calculating Cronbach Alpha”, LI Analysis Training Centre,[Online], URL: http://www.chestnut.org/LI/downloads/training_memos/Alpha.pdf. 704-713 9. Joppe, M. (2000), The Research Process.,[Online], URL: http://www.ryerson.ca/~mjoppe/rp.htm. 10. Khan, M.Y (2004), Financial Services, Third Edition, Tata McGraw Hill ,Publications, p.16.32 11. Kumar, R. (2010), Increased Importance of Credit Appraisal Process in Today's Banking Landscape,Tejas@IIMB, [Online], URL; http://tejas-iimb.org/interviews/15.php, Date Accessed: 15th January 2012. 12. Nitin Arora, Nidhi Grover Arora, Kritika Kanwar, (2018) "Non-performing assets and technical efficiency of Indian banks: a meta-frontier analysis", Benchmarking: An International Journal, Vol. 25 Issue: 7, pp.2105-2125, https://doi.org/10.1108/BIJ- 03-2017-0040 13. Nunnaly, J. (1978). Psychometric theory, New York: McGraw-Hill. 14. Panigrahi, K. (2018). NPA MANAGEMENT-A BANKERS'PERSPECTIVE IN RURAL ODISHA. Srusti Management Review, 11(1), 47-51. 15. Prasad, V.B. and Veena, D. (2011), NPAs Reduction Strategies for Commercial Banks in India, International Journal of Management & Business Studies, Vol. 1, Issue 3, pp. 47-53. 16. Ronald Ravinesh Kumar, Peter Josef Stauvermann, Arvind Patel, Selvin Sanil Prasad, (2018) "Determinants of non- performing loans in banking sector in small developing island states: A study of Fiji", Accounting Research Journal, Vol. 31 Issue: 2, pp.192-213, https://doi.org/10.1108/ARJ-06-2015-0077 17. Sinha (2011), Rise in NPAs, slippages need to be urgently addressed, BANCON 2011 [Online], URL:http://www.thehindu.com/news/states/tamilnadu/article2605920.ece?css=print 18. Siraj, K.K. and Pillai, P.S. (2011), Asset Quality and Profitability of Indian Scheduled Commercial Banks During Global financial crisis, International Research Journal of Finance and Economics, Issue 80, 2011. 19. Siraj, KK and Pillai, PS (2011), Asset Quality and Profitability of Indian Scheduled Commercial Banks During Global financial crisis, International Research Journal of Finance and Economics, Issue 80, 2011. 20. Straub, D., Boudreau, M.C., and Gefen, D. (2004), Validation Guidelines for IS Positivist Research, Communications of the Association for Information systems, 13, pp.380-427 21. Swamy, V (2012), Impact of Macroeconomic and Endogenous factors on Non Performing Bank Assets, The International Journal of Banking and Finance, Volume 9 (Number 1) 2012: pages 27-47 22. Uppal, RK (2009), Priority sector advances: Trends, issues and strategies,Journal of Accounting and Taxation Vol.1 (5), pp. 079- 089. Authors: M.Ramapriya, S. Sudhamathi

Paper Title: Factors Influencing Effectiveness of Online Advertisement towards Consumer Purchase Decision Abstract: Today’s Commercial scenario is occupied by online advertisement. Success of a virtual advertisement remains main guiding feature aimed at consumption activities. Recent business people are spending supplementary cost as well as extra time for online commercial. Day by Day technology is getting advanced, people be getting addicted more towards internet, they be in a situation to spent most time in Accessible watching favourites, in instead particular interval tend to see frequent advertisements, explore time in advertisements unknowingly. The clients get attracted in the directions same, without knowledge which fashionable turn changes ofbuydecision. World Wide Web is standard trailer platforms worn by regulars. Total socialmedia usingwiredposteras an important presentation tool aimed to pick up their industry near increase sales. This paper reports on recent enquiry undertaken all over Tamilnadu per a sample size of 150 respondents. A investigation scrutiny was developed situate on the literature study,the question sheet were analysed quantitatively using reliability analysis. The collected data were analysed using Descriptive Analysis, 135. Correlation, Regression as statistical tools. 714-717 Keyword: Online advertisement, effectiveness, media consumer, purchase decision. References: 1. Anusha. (2016). effectiveness of online advertising. International journal of research granthaalayah, 14-21. 2. Deshwal, p. (2016). online advertisement and its impact on consumers behaviour. international journal of applied research, 2(2), 200-204. 3. Jannette Hanekon, C. S. (2002). Traditional and online advertising: An explanation. Communication, 28(1), 49-59. 4. 4.Osama harfoushi, B. A. (2013). impact of internet advertisement and its features on E-commerce Retail sales : Evidence from Europe. Journal of software Engineering and Applications, 564-570. 5. 5.Priyakalyanasundaram. (2017). a study on effect of internet advertising on consumer behaviour with special refernce to coimbatore. international journal of marketing and technology, 7(6). 6. 6.Priyanka, s. (2012). A STUDY ON IMPACT OF ONLINE ADVERTISING ON CONSUMER. International journal of engineering and management sciences, 3(4), 461- 465. 7. 7.Sac, R. (n.d.). Assessment of advertising effectiveness: A scale validation Exercise. IX. 8. 8.Wadhawan, s. (2016). An empirical study of the factors influenicg the effectiveness of online advertisement. IOSR Journal of computer Engineering, 83-93. Authors: Dhanya S Nair, M. Ayisha Millath Identifying Family-Work Conflict among employees of The Travancore Cements Limited, Paper Title: Kottayam, Kerala Abstract: Work- Family Interface is a bidirectional term which explains mainly two domains: Work- Family Conflict and Work- Family Enrichment. Work-family Enrichment speaks about the bidirectional positive relationship of work and family. Work-family Conflict explains the negative bidirectional relationship of work and family. Many researchers are increasingly paying interest in Work-family interface as it can affect job satisfaction as well as life satisfaction. This paper investigates about the Family-work conflict among employees of The Travancore Cements Ltd., Kottayam, Kerala. The study was conducted among 81 employees of the organization. The finding of the study was that the employees are affected by Family-work conflict irrespective of their gender, education qualification, number of working hours per week, work experience, monthly income, marital status, number of school going children and partner’s profession. In case of the number of children of employees, a significant difference is seen with regard to the variable ‘family-related strain’.

Keyword: Demographic variables, Family-work conflict scale, Family-related Strain, Number of children. References: 1. Beutell, J. H. (1985). Sources of Conflict Between Work and Family Roles. Academy of management review , 76-88. 136. 2. Crouter, A. C. (1984). Spillover from Family to Work: The Neglected Side of the Work-Family Interface. Human Relations , 425- 442. 3. Dawn S. Carlson, J. G. (2009). The relationship of schedule flexibility and outcomes via the work-family interface. Journal of 718-726 managerial psychology , 330-355. 4. Dr. R. Prabhakara Raya, G. D. (2013). A study on Work-Life Balance in Working Women. International Journal of Commerce, Business and Management . 5. DS Nair, Dr. M. Ayisha Millath (2018). An Analytical study on the influence of Gender on the reasons for opting flexible working Hours among Faculties of Engineering colleges in Trivandrum District of Kerala. Zenith International Journal of multidisciplinary research , 195-200. 6. Helen Russell, P. J. (2009). The Impact of Flexible Working Arrangements on Work-Life Conflict and Work Pressure in Ireland. Gender, Work & Organisation , 73-97. 7. Kelliher, L. M. (2011). FlexibleWorking and Performance: A Systematic Review of the Evidence for a Business Case. International Journal of Management Reviews , 452-474. 8. Luo Lu, S.-F. K.-T.-P. (2008). Work/Family Demands, Work Flexibility, Work/Family Conflict, and Their Consequences at Work:A National Probability Sample in Taiwan. International Journal of stress management , 1-21. 9. Mauno, U. K. (1998). Antecedents and outcomes of Work family Conflict among married women and men in Finland. Human Relations . 10. 10.Mina Beigi, M. S. (2018). Flexible work arrangements and work-family conflict: A metasynthesis of qualitative studies among academics. Human resource Development review . 11. Paul E. Spector, C. L. (2004). A Cross-national Comparative Study Of Work-Family Stressors, Working hours, And Well-being: China And Latin America VERSUS The Anglo World. Personnel Psychology , 119-142 12. R.A Hamid, U. U. (2015). The effect of work-family conflict and work-family enrichment on the affective organizational committment among faculty clerical staff in UTM Skudai. Journal of Advanced Research in social and behavioural Sciences , 43-59. 13. 13.Rankine, G. M. (2006). The incidence and impact of flexible working arrangements in smaller businesses. Employee Relations , 138-161. 14. 14.Rich, R. G. (2002). Profiles of Attribution of Importance to Life Roles and Their Implications for the Work–Family Conflict . Journal of counselling psychology , 212-220. 15. Sara Tement, C. K. (2010). Towards the Assessment of the work -family Interface : Validation ofthe slovenian versions of work- family conflict and work-family enrichment scales. Horizons of psychology , 53-74. 16. Sarika Jain, D. S. (2015). Role of demographic variables in Work-Family Enrichment: A study of sales employees in India. International Journal of Business and Management . 17. 17.Shelton, L. M. (2006). Female Entrepreneurs, Work–Family Conflict, and Venture Performance: New Insights into the Work– Family Interface. Journal of Small Business Management , 285-297. 18. 18.Sonja Drobnic, P. P. (2017). Work-family Enrichment and Gender Inequalities in Eight European Countries. International Journal of Human Resource Management . 19. 19.Surena Sabil, S. M. (2011). Working hours, Work-family Conflict and Work -family Enrichment among Professional Women. International Conference on Social science and humanity. Singapore. 20. Sweet, P. M. (2004). From ‘work–family’ to ‘flexible careers’. Community, Work & Family , 209-226. Authors: S. Aishwarya, M. Ayisha Millath

Paper Title: Effectiveness of Online Marketing and Hedonism among University Students in Singapore Abstract: Online marketing, also known as internet marketing, includes using interactive, virtual spaces to promote and sell products and services. Indeed, new synchronous, internet-based and mobile based communication techniques had helped restructure significant financial industries including marketing. Being cost-effective, flexible and quick and enjoying a global reach that is unprecedented, internet marketing has brought incredible benefits to various companies. This efficient, fresh technique, however, also includes its particular disadvantages, such as absence of personal contact, safety and privacy, etc. that should be taken into consideration. The present study concentrates on the effectiveness of Online marketing on purchasing behavior and hedonism among the students who are undergoing university studies. It reveals the interconnection between the purchasing behavior and hedonism among the students who came from different demographic factors and it shows the frequency of purchasing online and factors that lead to hedonism.

Keyword: Online marketing, Purchasing behavior, hedonism, university students, Internet. 137. References: 1. Andrews. (2014). Social Media Marketing: Internet Marketing Cheat Sheets. Volume 3, ebook Edition. 2. Brown. (2009). A complete guide to affiliate marketing on the web: how to use and profit from Affiliate marketing programs. 727-734 publishing group, Int. 3. Burret. (2008). MARKET ONLINE. B&T MAGAZINE, 44-45. 4. Chaffey et al (2007). Top 10 emarkeitng strategies of today and tomorrow . Top 10 emarketing strategies. 5. Chaffy. (2000). Internet marketing strategy, implementation and pracitce. prentice hall. 6. Duguay, A. (2012). Dimensions Of Source Credibility In The Case Of User-Generated Advertisements. 7. Ferguson. (2008). Discovering careers for your future. Computers, second edition. Ferguson Publishing Company. 8. Ha, L. (2012). online advertising research in advertising journals : A review. journal of current isssues & research in advertising, 30: 31-48. 9. Kotler, P. e. (2010). Marketing for hospitality and tourism. New Jersey: Pearson prentice hall. 10. M.AyishaMillath, S.Aishwarya (Alagappa institute of management, Alagappa university), K.Malik Ali (2017). Desirable Features And Problems Encountered By Students of Distance Education Mode. International Journal of Current Advanced Research, 06(09), 5845-5850. 11. Niall. (2000). The email marketing dialogue. cambridge M.A: Forrester. 12. Read. (2010). impact of spam advertisement through email: a study to assess the influence of the anti-spam on the email marketing. Afr.J.Bus.Manage, 2362-2367. 13. Strokes. (2009). e-Marketing: The Essential Guide to Online Marketing. second editoin quirk emarketing pty ltd. 14. T, B. (2008). Market online. B & T magazine, 58 (2682), 44-45. 15. Wreden. (1999). Mapping the frontiers on email marketing. harvard management communication letter. Authors: V. Sithartha Sankar

Paper Title: Online Advertising and Its Effective Methods Abstract: The Paper is focused on how the online advertising is the most efficient tools for the advertisers and to impress the end users. It has more benefits compare to other media like Text media and Print Media. In Internet era have so many online advertising methods to advertise the products through search engines, Social network, mail marketing and video advertising etc.

138. Keyword: Online advertising, Social marketing, Email Marketing, Benefits. 735-737

References: 1. https://marketbusinessnews.com/financial-glossary/online-advertising-definition-meaning/ 2. https://postcron.com/en/blog/internet-advertising/ 3. https://shodhganga.inflibnet.ac.in/handle/10603/2411 4. https://www.internetworldstats.com/stats.htm 5. http://www.dypatil.edu/schools/management 6. https://www.digitalvidya.com/blog/growth-of-digital-marketing-industry-in-india/

139. Authors: G. Latha, B. Karthikeyan, V. Sitharthasankar Paper Title: Online Marketing: Problems and Prospects as Perceived by Customers Abstract: Changes are taking place in all fields at an accelerated rate. Anyone who is accepting these changes and adopting them are benefitting out of these changes. There are people who could not take up these changes and they follow the steps that have been followed traditionally. In the case of marketing, there are two main categories namely offline marketing and online marketing. Offline marketing involves marketing of goods and services which doesn’t involve the use of internet. On the other hand, online marketing involves the use of internet for marketing of goods and services to customers. The emergence of computers and internet has made dramatic changes in all fields especially in marketing and advertising. The wide use of smart phones and internet access in these phones help companies reach customers easily. On the other side, customers access the products and services necessary for them at their finger tips. Online marketing has reached customers in the nook and corner of the country. It would be interesting to study the perception of customers towards online marketing. This paper analyses the problems and prospects of online marketing as perceived by the customers. Majority of 738-740 the respondents utilize and opine that online marketing is beneficial to them in many ways. But they also record some of the hardships faced by them in online marketing. Upgrading of services provided by online marketing and minimizing the challenges faced by it will help to develop online marketing to greater heights.

Keyword: Online Marketing, Problems, Prospects, Customer Perception. References: 1. https://en.wikipedia.org/wiki/Digital_marketing 2. https://webstrategies.com/digital-marketing-7-different-types/ 3. https://www.optimizely.com/optimization-glossary/online-marketing/

Authors: Aravindaraj K, P. Rajan Chinna, Kalidhasan. M, Srinivasan. K

Paper Title: A Contemporary on Indian Government Initiatives and Challenges of Warehouse Industry Abstract: Over the last six decades, Indian Logistics Sector has evolved a tremendous growth towards Indian economy ranges from the distribution management to integrated logistics management to supply chain management to e- logistics. According to the Economic Survey 2018 report stated that the Indian logistics Sector is likely to touch USD 215 billion in 2020. According to Logistics Performance Index 2018, India slipped at 44th position from 35th position in 2016 out of 154 countries. This is due to the implementation of GST on July 1, 2017. Since many sectors in India are unorganized and fragmented sector. The impact of GST has been affected Indian economy during the initial period. But in coming years, there will be a tremendous growth and recently, the Government of India during union budget 2019 is now planned and focuses on 5trillion economy by 2024. Warehouse Sector is an integral part of the logistics sector and Indian Warehouse Market was ranked as fifth largest market in the Global Logistics Market. In this paper, we try to highlight the current scenario of warehouse market sector and also we try to deliver the current status of investment and infrastructure facilities in warehouse market in India. From a practical point of view, this paper points out the major challenges faced in warehouse sector market in India during recent years. Keyword: Logistics, Warehouse, SAMPADA, FTWZ and Multi-Modal Logistics Park References: 1. Abhishek Roy (2017). Warehousing in India: The Smart Way. The Warehouse Handbook. 2. Anchal Gupta, Pradeep Suri and Rajesh Kumar Singh (2018). Analysis of Challenges Faced by Indian Logistics Service Providers. Journal of Operations and Supply Chain Management. DOI: 10.31387/oscm0350215. 140. 3. CARE Ratings (2018). Overview of the India Warehousing Industry. 4. Central Warehousing Corporation (2019). CWC at glance. Retrieved from http://cewacor.nic.in/index.php 5. IBEF (2018). Warehousing Industry may grow at 13-15% in medium term: Report. Retrieved from 741-744 https://www.ibef.org/news/warehousing-industry-may-grow-at-1315-in-medium-term-report 6. Knight Frank (2018). India Warehousing Market Report -2018. 7. Make in India (2018). Government Initiatives. Retrieved from http://www.makeinindia.com/five-things-to-know 8. Ministry of Commerce and Industry, Directorate General of Foreign Trade, Foreign Trade Policy 2015-2020. Report of Free Trade and Warehousing Zone. Retrieved from http://dgftcom.nic.in/exim/2000/policy/chap-7A.htm 9. Ministry of Commerce and Industry, India Services, Transport and Logistics Services. Retrieved from https://www.indiaservices.in/transport 10. Ministry of Finance (2018). Economic Survey Report 2018 – 19. Retrieved from https://www.indiabudget.gov.in/economicsurvey/ 11. Ministry of Food Processing Industries, Government of India. Pradan Mantri Kisan SAMPADA Yojana. Retrieved from http://mofpi.nic.in/Schemes/pradhan-mantri-kisan-sampada-yojana 12. NITI Aayog (2018). Goods on the Move: Efficiency and Sustainability in Indian Logistics. 13. Press Information Bureau, Ministry of Commerce and Industry, Government of India (2018). Investment in Logistics to Touch USD 500 Billion by 2025: Suresh Prabhu. Retrieved from http://pib.nic.in/PressReleaseIframePage.aspx?PRID=1540616 14. Press Information Bureau, Ministry of Finance, Government of India (2017). Logistics Sector granted Infrastructure Status. Retrieved from http://pib.nic.in/newsite/PrintRelease.aspx?relid=173674 15. Rengamani. J and Venkatraman V (2015). Study on the developments of Industrial Warehousing in India. International Journal of Production Technology and Management. Volume 6, Issue 2, ISSN: 0976-6383. 16. Report Buyer (2017). Booming Warehouse Sector in India Outlook 2020. Report Id: 4613860. 17. Sathish K. Kapoor and Purva Kansal (2016). Basics of Distribution Management: A Logistical Approach. PHI learning private limited, Delhi. 18. Sneha Vishnu More (2016). The study of Efficiency and Effectiveness of Warehouse Management in the context of Supply Chain Management. International Journal of Engineering Technology, Management and Applied Sciences. Volume 4, Issue 8, ISSN 2349-4476. Authors: K.Chandrasekar, Karthick R Customer Satisfaction towards Online Car Insurance at South Tamilnadu a Special Reference with Paper Title: Madurai and Sivaganga District Abstract : This paper aims to find customer satisfaction towards online car insurance at south Tamilnadu, especially Madurai and Sivaganga district. According to the various literature reviews, the researcher has found the factors of the study such as trust, service-quality and risk. All the three factors have different variables. In the study used in primary data through questionnaire method, 115 sample size have been collected for analysis of research study. The results evince a strong correlation between trust and service-quality, and positive correlation between trust and risk. All the three factors are considered as a strong impact of online customer satisfaction.

Keyword: Online Customer Satisfaction, Car Insurance Satisfaction, Online Insurance Satisfaction. References: 1. Al-Nasser, M. Et al. (2014). Relationship Amonrelationship among E-service Quality, Culture,, Attitude, Trust, Risk of Online Shopping. Journal of Social Sciences, 10(3), 123-142. Doi:doi:10.3844/jsssp.2014.123.142. 2. Carlson, Jamie & O'Cass, Aron. (2011). Developing a framework for understanding e-service quality, its antecedents, consequences, and mediators. Managing Service Quality, 21(3), 264 – 286. 3. Chinomona, R.(2014). The Influence of E-Service Quality on Customer Perceived Value, Customer Satisfaction and Loyalty in South Africa . Mediterranean Journal of Social Sciences, 5(9), 331-341. 4. Dost, M. K. (2015). Online Shopping Trends and Its Effects on Consumer Buying Behaviour: A Case Study of Young Generation of 141. Pakistan. NG-Journal of Social Development, VOL. 5, No. 1, October 2015 , 1-22. 5. Shuchi Singhal, Shashi Shekhawat (2014), An Empirical Study of Customer Satisfaction in Online Shopping Experience of Tourism Products in India, International Journal of Scientific Engineering and Research (IJSER) www.ijser.in ISSN (Online): 2347-3878. 745-749 6. Liljander, Veronica & van Riel, Allard & Pura, Minna. (2002), Customer satisfaction with e-services: The case of an online recruitment portal. 10.1007/978-3-8349-4418-4_17. 7. Lucio Cappelli, Roberta Guglielmetti, Giovanni Mattia, Roberto Merli and Maria Francesca Renzi, (2011),"Testing a customer satisfaction model for online services", International Journal of Quality and Service Sciences, Vol. 3 Iss 1 pp. 69 – 92. 8. M. Rajeswari (2015), A Study on the Customer Satisfaction towards Online Shopping in Chennai City, International Journal of Sales & Marketing Management Research and Development (IJSMMRD), ISSN(P): 2249-6939; ISSN(E): 2249-8044, Vol. 5, Issue 1, Feb 2015, 1-10 9. Moshref Javadi, M. H., Dolatabadi, H. R., Nourbakhsh, M., Poursaeedi, A., & Asadollahi, A.R. (2012). An Analysis of Factors Affecting on Online Shopping Behavior of Consumers. International Journal of Marketing Studies. Vol. 4(5), pp. 81-98. 10. parmita saha, yanni zhao (2005), relationship between online services quality and customer satisfation - a sstudy in internet banking, Lulea university of technology,2005:083 SHU - ISSN: 1404-5508 -ISRN: LTU - SHU-EX--05/083—SE 11. Rashed Al Karim(2013), Customer Satisfaction in Online Shopping: a study into the reasons for motivations and inhibitions, IOSR Journal of Business and Management (IOSR-JBM), e-ISSN: 2278-487X, p-ISSN: 2319-7668. Volume 11, Issue 6 (Jul. - Aug. 2013), PP 13-20 12. Sevim, N. (2014). Consumer Trust Impact on Online Shopping Intent. Journal of Internet Applications and Management , 19-28. 13. Taweerat Jiradilok, Settapong Malisuwan, Navneet Madan, and Jesada Sivaraks (2014), The Impact of Customer Satisfaction on Online Purchasing: A Case Study Analysis in Thailand, Journal of Economics, Business and Management, Vol. 2, No. 1, February 2014. 14. Yousif, A.S. H (2015). E-Service Quality: A Multi-Dimension Perspective. International Journal of Economicsm Commerce and Management, 3(11), 873-888. 15. Yue-Yang Chen, Hui-Ling Huang, Ying-Chen Chen (2011), A Quality-Centred View of Customer e-Satisfaction and e-Loyalty in Online Shopping, Advances in information Sciences and Service Sciences(AISS), Volume3, Number9, October 2011, doi : 10.4156/AISS.vol3.issue9.12 16. Zainal N.A.A and Bahrom N.A.M (2018), A Framework Based Customer Satisfaction Factors Towards Online Shopping, Research Hub Volume 4 Issue 3 (2018) Issn: 2180-006 Authors: B. Vimala, K. Alamelu

Paper Title: Financial Inclusion of Fisher Folk in Ramanathapuram District Abstract: The purpose of this study is to measure the extent of financial inclusion of fisher folk in terms of access and usage. This paper has used primary data. For collecting primary data, a well-structured Interview Schedule has been prepared and administered among the respondents. The sample group consists of 120 sample respondents. The paper uses Paired Sample t Test. 77 per cent of the sample respondents are aware of the different products and services rendered by the banks while 46 per cent of them use the known banking products and services. Comparatively the awareness is more for the traditional products while the same is less for the modern products. The result of the Paired Sample Test reveals that P value is less than 0.05 in awareness and 142. service of usage in financial inclusion of fisher folk. The present paper attempts to find the awareness and usage of financial services of banks by the fisher folks, who avail financial support mostly from the informal sources of finance. By measuring the gap between the awareness and usage of financial services by the fisher folk, the 750-755 paper may throw useful clues to the policy makers for undertaking segmented initiatives for furthering financial inclusion.

Keyword: Indian Fisheries, Financial Inclusion, Awareness, Usage. References: 1. Ludwig, D., Hilborn, R. and Walters, C. (1993). Uncertainty, resource exploitation, and conservation: lessons from history. Science 260, pp. 17-18. 2. NFDB [National Fisheries Development Board], (2017). NFDB home page [online].available:nfdb.gov.inland-indian- fisheries.htm[24 March 2017]. 3. Pitcher, T. J., Hart, P. J. B., and Pauly, eds. (1998). Reinventing Fisheries Management. Chapman & Hall, London. Pp. 435. 4. Rangarajan, C. (2014). Dr. C Rangarajan Committee on Poverty presented its report to Union Government. Ministry of Finance, Government of India. 5. Vimala, B., and Alamelu, K. (2018). Financial literacy, perceived risk attitudes and investment intentions among women. PARIPEX – Indian Journal of Research. 7(11), pp. 55-57. 6. Walters, and Parma, A (1996). Fixed exploitation rate strategies for coping with the effects of climate change. Can. J. Fish. Aquat. Science 53, pp. 148-158. 7. Wilen, J. E., Smith, M. D., Lockwood, D., and Botsford, L. W (2002). Avoiding Surprises: Incorporating Fisherman Behavior into Management Models. Bulletin of Marine Science. 70(2), pp. 553-575. Authors: S.Sridhar, V.M .Ponniah

Paper Title: Role Model a Tool towards Cross Training in Improving Team Performance Abstract: Manufacturing (Globally and in India) is saturating and there are no breakthrough innovations and hence sales is under pressure. While we wait for innovation new products to take over, the manufacturing is focusing for competitiveness and optimize the resources. TPM (Total Productive Maintenance) is an important tool to bring the change, the tool ensures that by total participation and by effective implementation of TPM concepts Resource optimization can be achieved. There are 34641 Companies in the world and 3692 in India who have been certified by JIPM (Japan Institute of planned maintenance) for effective use of TPM and achieving the change in the form of results.7 plants has been certified in Hindustan Coca-Cola Beverages Pvt Ltd. These companies are building High performance teams to move TPM to next levels. The challenge is labour flexibility and hence Labour flexibility is important issue in the design and development of “High performance teams “. TPM has many training tools and focuses more on relay training, Cross training builds on relay training. Hindustan Coca-Cola beverages pvt ltd has used the cross training in 2 plants and in 4 lines. A group of 15 operators were formed as Shilpakar ( Architect ),they were positive , influencing others and some of them were individualistic and not team player, some of them were also union leaders. This team was rejuvenated with their self-esteem, and with right attitudes, Team work, Sincerity and discipline which was 143. hidden got exposed and blossomed. One of the executive (coach ) lead the activities with behavioural training programs - they were then rewarded with the leadership appreciation, this followed with Multi Skilling and bought team- work , self-respect and 756-764 trust within the team. The team also had social side of family trekking and Training the Street vendor in FSSAI (Food safety & authorities of India) requirements. This team then was adequately recognised, rewarded and had achieved special status in the plant. Looking at this team, next set of operators had aspirations and were readily agreed to learn from this role model team. The role model team could train 4 more groups. Executives were mentors and reviewed the progress and review the progress of the new team. Once done they were recognised and appreciated.

Keyword: Role Model, Relay training, Heuristic, Transformational leadership, Team working, High Performance teams, Happy and satisfaction leading to motivation. References: 1. Abshiek, Rajbir, Harwinder, Total Productive Maintenance, Research gate, 2014. 2. Kathleen, Roger & Kristy, The impact of Total Productive maintenance on measuring performance, Elsevier, 1999. 3. Van Mielro H, Self managing team work and psychological well being, Technische Universiteit Eindhoven, 2003. 4. Jannes Slomp and Eric, Cross – training and team performance, Taylor and Franics, 2002. 5. Steve, Work Groups and Teams in organisation, Cornell university, ILR School, 2001. 6. Marks, Sabella,Burke, and Zaccro, The impact of cross training on team effectiveness, 2002. 7. Kenneth & David, Work team and effectiveness, Research gate, 1990. 8. Shelly, Transformational leadership and team performance, Research gate, 2004. Authors: Sanjeev K. Sharma, Pooja Chopra*

Paper Title: Predicting Factors Influencing Online Purchase Behavior among Indian Youth Abstract: To keep pace with the growing magnitude of the online retail platform in the Indian subcontinent, it has become crucial for e- retailers and marketers to decipher the key antecedents of customers’ purchase intention amongst the young Indian online customer. This study attempts to frame a conceptual model for finding the key determinants for online purchase intentions based on the data collected from 238 participants 144. using the structured questionnaire method. Structured Equation Model was used on data collected to test hypothesizes of study. The study highlights that eWOM was the major contributing factor for Indian youth while shopping online This paper contributes to highlighting the importance of these factors and help e-marketers 765-772 develop more customer specific marketing strategies to enhance the purchase intentions.

Keyword: Marketing Strategies, Online Customer, Purchase Intentions References: 1. Simon Kemp, Digital in 2018: World’s Internet users pas the 4 billion Mark 2018. https://wearesocial.com/blog/2018/01/global- digital-report-2018

2. IAMAI and Kantar IMRB Report, mobile internet report 2017. https://cms.iamai.in/Content/ResearchPapers/2b08cce4-e571- 4cfe-9f8b-86435a12ed17.pdf 3. GSM Association, A new regulatory framework for the digital ecosystem, 2016. https://www.gsma.com/publicpolicy/wpcontent/uploads/2016/09/GSMA2016_Report_NewRegulatoryFrameworkForTheDigital Ecosystem_English.pdfik 4. Ernst And Young Report, Rebirth of e-commerce of India (2013). https://www.ey.com/Publication/vwLUAssets/Rebirth_of_e- Commerce_in_India/$FILE/EY_RE-BIRTH_OF_ECOMMERCE.pdf 5. KPMG FICCI Report The-Future-now-streaming, 2016. https://home.kpmg/content/dam/kpmg/pdf/2016/04/The-Future-now- streaming.pdf 6. IBEF, E-Commerce Report, 2018. https://www.ibef.org/download/Ecommerce-Report-Jan-2018.pdf 7. IBM Kalaari Report. Imagining Trillion Dollar Digital India, 2018. . https://kstart.in/wp-content/uploads/2018/04/Imagining- Trillion-Dollar-Digital-India-IBM-Kalaari-Research-Report-April-2018.pdf. 8. PWC Report 2015. e-commerce in India Accelerating Growth. https://www.pwc.in/assets/pdfs/publications/2015/ecommerce-in- india-accelerating-growth.pdf 9. R. Sachitanand and G Seetharaman. ET Bureau| Updated: May 20, 2018 Amazon vs Google: A race to capture India's consumer space https://economictimes.indiatimes.com/tech/internet/amazon-vs-google-a-battle-to-capture-the-indian-ecommerce- space/articleshow/64238190.cms 10. R.Bailay , C. Chakravarty Reliance Industries to enroll 1.5 lakh vendors for its ecommerce venture. 2015. https://economictimes.indiatimes.com/industry/services/retail/reliance-industries-to-enroll-1-5-lakh-vendors-for-its-ecommerce- venture/articleshow/49445234.cms 11. B. Hong, “Understanding the consumer's online merchant selection process: The roles of product involvement, perceived risk, and trust expectation” International Journal of Information Management, 35(3), 322-336, 2015. https://doi.org/10.1016/j.ijinfomgt.2015.01.003 12. M. S Featherman,.P.A. Pavlou, “Predicting e-services adoption: a perceived risk facets perspective” International journal of human-computer studies, 59(4), 451-474, 2003. https://doi.org/10.1016/S1071-5819(03)00111-3 13. J.M. Alcántara-Pilar, S. Del Barrio-García,L. Porcu, E. Crespo-Almendros, “ Motivational duality in online consumer behaviour: Website usability and flow state as moderating factors” International Journal of Business and Economics, 14(1), 79–104, 2015 14. K.S.Lee, S.J. Tan, “E-tailing versus physical retailing: a theoretical model and empirical test of consumer choice”, Journal of Business Research, 56(11), 877-85 , 2003. https://doi.org/10.1016/S0148-2963(01)00274-0 15. C.H. Chen, G.S. Mort, “Consumers' technology adoption behaviour: an alternative model. The Marketing Review, 7(4), 355- 368,2007. https://doi.org/10.1362/146934707X251119 16. D.Gefen, D, P.A. Pavlou, “The boundaries of trust and risk: The quadratic moderating role of institutional structures” Information Systems Research, 23(3-part-2), 940-959, 2012. https://doi.org/10.1287/isre.1110.0395 17. S.San-Martín, C.Camarero, “ How Can E-Vendors Create Trust in B2C and C2C Contexts?. In Mobile Commerce: Concepts, Methodologies, Tools, and Applications” 1390-1412. IGI Global, 2018. https://doi.org/10.4018/978-1-5225-2599-8.ch066 18. Q. Yang, C. Pang, L. Liu, D.C. Yen, J.M. Tarn, “Exploring consumer perceived risk and trust for online payments: An empirical study in China’s younger generation”. Computers in Human Behavior, 50, 9-24, 2015.https://doi.org/10.1016/j.chb.2015.03.058. 19. H.R.Marriott, D.W. Michael, "Exploring consumers perceived risk and trust for mobile shopping: A theoretical framework and empirical study." Journal of Retailing and Consumer Services 42, 133-146, 2018. https://doi.org/10.1016/j.jretconser.2018.01.017 19 20. N.M.Suki, N.M. Suki, “Modeling the determinants of consumers' attitudes toward online group buying: Do risks and trusts matters?.” Journal of Retailing and Consumer Services, 36, 180-188, 2017.https://doi.org/10.1016/j.jretconser.2017.02.002. 21. D.Biswas, A.Biswas, “The diagnostic role of signals in the context of perceived risks in online shopping: do signals matter more on the web?”, Journal of Interactive Marketing, 18 (3),30-45., 2004.https://doi.org/10.1002/dir.20010. 22. J.Mou, D.H. Shin, J.F. Cohen, “Trust and risk in consumer acceptance of e-services. Electronic Commerce Research, 17(2), 255- 288, 2014. https://doi.org/10.1007/s10660-015-9205-4. 23. N.Arora, M. Rahul, “The role of perceived risk in influencing online shopping attitude among women in India.” International Journal of Public Sector Performance Management, 4(1), 98-113, 2018.https://doi.org/10.1504/IJPSPM.2018.088697. 24. P.Oghazi, S.Karlsson, D.Hellström, K. Hjort, “ Online purchase return policy leniency and purchase decision: Mediating role of consumer trust.” Journal of Retailing and Consumer Services, 41, 190-20,.2018. https://doi.org/10.1016/j.jretconser.2017.12.007. ”s perception of return policy fairness and purchase intention ׳s return policy, consumer ׳Z.Pei,A. Paswan, R. Yan, “ E-tailer .25 Journal of Retailing and Consumer Services, 21(3), 249-257, 2014. https://doi.org/10.1016/j.jretconser.2014.01.004 26. N. Janakiraman, H.A. Syrdal, R. Freling, “The effect of return policy leniency on consumer purchase and return decisions: a meta-analytic review. J. Retail. 92 (2), 226–235,2016. https://doi.org/10.1016/j.jretai.2015.11.002 27. B. Bower, J.G. Maxham III, “Return shipping policies of online retailers: normative assumptions and the long-term consequences of fee and free returns.”Journal of Marketing, 76(5), 110-124, 2012. https://doi.org/10.1509/jm.10.0419 28. N.Y.Jung, Y.K. Seock, "Effect of service recovery on customers’ perceived justice, satisfaction, and word-of-mouth intentions on online shopping websites. Journal of Retailing and Consumer Services, 37, 23-30, 2017.https://doi.org/10.1016/j.jretconser.2017.01.012 29. J.A.Petersen, V. Kumar, “Are product returns a necessary evil? Antecedents and consequences” Journal of Marketing, 73(3), 35- 51,2009. https://doi.org/10.1509/jmkg.73.3.035 30. S.Rao, K.B. Lee, K. B., B.Connelly, D.Iyengar, “Return time leniency in online retail: a signaling theory perspective on buying outcomes. Decision Sciences, 49(2), 275-305, 2018. https://doi.org/10.1111/deci.1227 31. S.E. Griffis, S. Rao, T.J. Goldsby, T. T. Niranjan, “The customer consequences of returns in online retailing: An empirical analysis” Journal of Operations Management, 30(4), 282-294,2012. https://doi.org/10.1016/j.jom.2012.02.002 32. G. Walsh, D, Brylla, “Do product returns hurt relational outcomes? some evidence from online retailing” Electronic Markets, 27(4), 329-339, 2017. https://doi.org/10.1007/s12525-016-0240-3 33. J.Zhang, H. Li, R. Yan, C. Johnston, “ Examining the signaling effect of e-tailers’ return policies. Journal of Computer Information Systems, 57(3), 191-200., 2017. https://doi.org/10.1080/08874417.2016.1183989 34. S. Teng, K.W. Khong, A.Y.L. Chong, B. Lin, “Examining the impacts of electronic word-of-mouth message on consumers’ attitude. Journal of Computer Information Systems, 57(3), 238-251, 2017. https://doi.org/10.1080/08874417.2016.1184012 35. M. Lee ,S. Rodgers, M. Kim, ’Effects of valence and extremity of eWOM on attitude toward the brand and website. Journal of Current Issues & Research in Advertising, 31(2), 1-11, 2009.. https://doi.org/10.1080/10641734.2009.10505262 36. L.V. Casalo, C. Flavian, M. Guinaliu, Y. Ekinci, “Do online hotel rating schemes influence booking behaviors?”, International Journal of Hospitality Management, 49,28-36, 2015. https://doi.org/10.1016/j.ijhm.2015.05.005 37. B. Coker, A. Nagpal, “Building-up versus paring-down: consumer responses to recommendations when customizing”, Journal of Retailing, 89 .(2), 190-206,2013. https://doi.org/10.1016/j.jretai.2012.11.002 38. Y.Wang, C.Yu, “ Social interaction-based consumer decision-making model in social commerce: The role of word of mouth and observational learning. International Journal of Information Management, 37(3), 179-189, 2017. https://doi.org/10.1016/j.ijinfomgt.2015.11.005 39. H.Luo, W. Huang, C, Chen, K. Xie, Y. Fan, “An Empirical Study on the Impact of Negative Online Word-of-Mouth on Consumer's Purchase Intention. In 2018 15th International Conference on Service Systems and Service Management (ICSSSM) (pp. 1-6). IEEE.2018. https://doi.org/10.1109/icsssm.2018.8465093 40. N. Hill, J. Alexander, The handbook of customer satisfaction and loyalty measurement. Routledge, 2017 41. S.C. Chu, Y. Kim. “Determinants of Consumer Engagement in Electronic Word-of-Mouth (eWOM) in Social Networking Sites.” International Journal of Advertising 30 (1), 47–75, 2011. https://doi.org/10.2501/IJA-30-1-047-075 42. Erkan, C. Evans, “Social media or shopping websites? The influence of eWOM on consumers’ online purchase intentions” Journal of Marketing Communications, 24(6), 617-632, 2018. https://doi.org/10.1080/13527266.2016.1184706 43. Krishnamurthy, S.R. Kumar, “Electronic word-of-mouth and the brand image: Exploring the moderating role of involvement through a consumer expectations lens” Journal of Retailing and Consumer Services, 43, 149-156, 2018. https://doi.org/10.1016/j.jretconser.2018.03.010 44. Z.A. Bulut, A.N. Karabulut, “Examining the role of two aspects of eWOM in online repurchase intention: An integrated trust– loyalty perspective” Journal of Consumer Behaviour, 17(4), 407-417,2018. https://doi.org/10.1002/cb.1721 45. H.J. Jeong, D.M. Koo, “Combined effects of valence and attributes of e-WOM on consumer judgment for message and product: The moderating effect of brand community type. Internet Research, 25(1), 2-29, 2015. https://doi.org/10.1108/IntR-09-2013-0199 46. G. Moran, L. Muzellec, E. Nolan, “Consumer moments of truth in the digital context: How “search” and “e-word of mouth” can fuel consumer decision making” Journal of Advertising Research, 54(2), 200-204., 2014. https://doi.org/10.2501/JAR-54-2-200- 204 47. J. Hernández-Méndez, L. Francisco Muñoz, F. Juan Sánchez, "The influence of e-word-of-mouth on travel decision-making: consumer profiles." Current issues in tourism 18(11), 1001-1021, 2015. https://doi.org/10.1080/13683500.2013.802764 48. E. Pantano, C.V. Priporas, “The effect of mobile retailing on consumers' purchasing experiences: A dynamic perspective” Computers in Human Behavior,61, 548e555, 2016. https://doi.org/10.1016/j.chb.2016.03.071 49. G. McLean,A. Wilson, “Evolving the online customer experience… is there a role for online customer support? Computers in Human Behavior, 60, 602e610, 2016. https://doi.org/10.1016/j.chb.2016.02.084 50. B. Rishi, A.H.M.A,Khasawneh, “Determinants of online purchase intention: a study of Emirati consumers. International Journal of Islamic Marketing and Branding, 2(3), 200-214, 2017. https://doi.org/10.1504/IJIMB.2017.087967 51. V. Seckler, “Survey says web apparel buys doubled’, Women Wear Daily,12[2], 2000. 52. E.E.Izogo, & C. Jayawardhena, “ Online shopping experience in an emerging e-retailing market. Journal of Research in Interactive Marketing, 12(2), 193-214,2018. https://doi.org/10.1108/JRIM-02-2017-0015 53. P.K. Kannan, H.A. Li, “Digital marketing: a framework, review and research agenda”. International Journal of Research in Marketing 34 (1), 22–45, 2017. https://doi.org/10.1016/j.ijresmar.2016.11.006 54. C. Wu,H-L. Chen, “Counting your customers: Compounding customer’s in-store decisions, interpurchase time and repurchasing behavior” European Journal of Operational Research, 127(1), 109-119. 2000. https://doi.org/10.1016/S0377-2217(99)00326-4 55. C.M. Chiu, T.G.W. Eric, F. Yu‐Hui, H. Hsin‐Yi, "Understanding customers' repeat purchase intentions in B2C e‐commerce: the roles of utilitarian value, hedonic value and perceived risk." Information Systems Journal 24,(1) 85-114. 2014. https://doi.org/10.1111/j.1365-2575.2012.00407.x 56. C,S. Patro,. "Predicting Consumers' Acceptance of Online Shopping on the Internet: An Empirical Study." International Journal of Cyber Behavior, Psychology and Learning (IJCBPL) 8 (1), 33-60, 2018. https://doi.org/10.4018/IJCBPL.2018010103. 57. Ajzen, “The theory of planned behavior.” Organizational behavior and human decision processes, 50(2), 179-211, 1991. https://doi.org/10.1016/0749-5978(91)90020-T 58. N. Hajli, X. Lin, ‘Consumer adoption of social commerce. In International Conference on HCI in Business , 279-287, Springer, Cham, 2015. https://doi.org/10.1007/978-3-319-20895-4_26. 59. P.A. Pavlou, “Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model”. International journal of electronic commerce, 7(3), 101-134, 2003. https://doi.org/10.1080/10864415.2003.11044275 60. G.A. Churchill , T.J. Brown. Basic marketing research, (5th ed), Ohio: South-Western. 2004 61. D.R. Cooper, & P.S. Schindler, Marketing Research. New York: McGraw-Hill/Irwin.2006 62. A Strong Reliable Internet Connection A Strong Reliable Internet Connectionhttps://www.morganstanley.com/ideas/india- millennials-makeover-disruption-growth 63. Department of Higher Education, Chandigarh, http://rusa.nic.in/download/365/shep/5355/chandigarh-shep.pdf 64. D.W. Gerbing, J.C. Anderson, “An updated paradigm for scale development incorporating unidimensionality and its assessment” Journal of marketing research, 25(2), 186-192, 1988. https://doi.org/10.1177/002224378802500207 65. J. Kim, C.W. Mueller, Factor Analysis: Statistical Methods and Practical Issues, Sage Publications, Beverly Hills, Cat 1982. 66. J.F. Hair, R.E.Anderson, R.L. Tatham, & W.C.Black, “ Multivariate data analysis. Englewood Cliff. New Jersey, USA, 5(3), 207-2019, 1998. 67. A.Aron, & E. Aron,”Statistics for psychology” (2 ed.). Upper Saddle River, NJ: Prentice Hall. 1999. 68. P.R. Hinton, I. McMurray, & C. Brownlow, SPSS explain , New York: Routledge, 2004. 69. I.Goyette, R. Line ,B. Jasmin, M,François, "e‐WOM Scale: word‐of‐mouth measurement scale for e‐services context" Canadian Journal of Administrative Sciences/Revue Canadienne des Sciences de l'Administration, 27(1), 5- 23,2010.https://doi.org/10.1002/cjas.129 70. E. Brunelle, L. Josée, "Testing media richness theory to explain consumers' intentions of buying online." In Proceedings of the 10th international conference on Electronic commerce, 31. ACM, 2008. https://doi.org/10.1145/1409540.1409582 71. L. Gao, A.W. Kerem , B. Xuesong, "Understanding consumers’ continuance intention towards mobile purchase: A theoretical framework and empirical study–A case of China" Computers in Human Behavior 53, 249-262. 2015.https://doi.org/10.1016/j.chb.2015.07.014 72. G.R.Dowling, “Perceived risk: The concept and its measurement. Psychology & Marketing” 3 (3), 193-210, 1986. https://doi.org/ 10.1002/mar.4220030307 73. P.L.Hsieh, "Perceived opportunism (PO) in e-return service encounters" Managing Service Quality: An International Journal 23, ( 2) 96-110, 2013.https://doi.org/10.1108/09604521311303390 74. B,M. Byrne, Structural equation modeling with AMOS: Basic concepts, applications, and programming. Routledge, 2016. https://doi.org/10.4324/9781315757421 75. T.H. Thurau, K. P. Gwinner, G.Walsh,, & D.D. Gremler, “ Electronic word-of-mouth via consumer-opinion platforms: What motivates consumers to articulate themselves on the internet? Journal of Interactive Marketing, 18(1), 38e52, 2004.https://doi.org/10.1002/dir.10073 76. N. Huete-Alcocer, “A literature review of word of mouth and electronic word of mouth: Implications for consumer behaviour” Frontiers in psychology, 8, 1256, 2017. https://doi.org/10.3389/fpsyg.2017.01256 77. S.K. Ariffin, T. Mohan, Y.N. Goh, “ Influence of consumers’ perceived risk on consumers’ online purchase intention. Journal of Research in Interactive Marketing, 12(3), 309-327, 2018. https://doi.org/10.1108/JRIM-11-2017-0100 78. S. Teng, K. Wei Khong, W, Wei Goh, & A. Yee Loong Chong, “Examining the antecedents of persuasive eWOM messages in social media. Online Information Review, 38(6), 746-768, 2014. https://doi.org/10.1108/OIR-04-2014-0089 79. M. D., Clemes, C. Gan, & J. Zhang, “An empirical analysis of online shopping adoption in Beijing, China” Journal of Retailing and Consumer Services, 21(3), 364-375, 2014. https://doi.org/10.1016/j.jretconser.2013.08.003S. 80. J.M.T.Heinze, P. Fischer, "Ladders to m-commerce resistance: A qualitative means-end approach." Computers in Human Behavior, 73,362-374, 2017. https://doi.org/10.1016/j.chb.2017.03.059 81. Bilgihan, J. Kandampully, T.Zhang. "Towards a unified customer experience in online shopping environments: Antecedents and outcomes." International Journal of Quality and Service Sciences, 8(1), 102-119. 2016. https://doi.org/10.1108/IJQSS-07-2015- 0054 82. E.K.Clemons, J. Wilson, C. Matt, T. Hess, F.Ren, F.Jin, N.S. Koh. "Global differences in online shopping behavior: Understanding factors leading to trust." Journal of Management Information Systems 33 (4), 1117-1148, 2016. https://doi.org/10.1080/07421222.2016.1267531 83. Bilgihan, "Gen Y customer loyalty in online shopping: An integrated model of trust, user experience and branding." Computers in Human Behavior, 61, 103-113, 2016. https://doi.org/10.1016/j.chb.2016.03.014 84. A.H. Eagly, S. Chaiken, “The impact of attitude on behavior in The Psychology of Attitudes”, Orlando, FL: Harcourt Brace & Co, 1993. 85. S.Shim & M.F. Drake, “Consumer intention to utilize electronic shopping”, Journal of Direct Marketing, 4 (2) , 22-33, 1990. https://doi.org/10.1002/dir.4000040305 86. K. C Ling, L. T. Chai, & T. H. Piew, “The effects of shopping orientations, online trust and prior online purchase experience toward customers’ online purchase intention” International Business Research, 3(3), 63, 2010. https://doi.org/10.1002/dir.4000040305 Authors: Mohamed Ragab Mahmoud Farghaly, Yewguan Soo, Kim Chuan Lim, Feng Duan Bluetooth Low Energy (BLE) Beacon Single and Multi-Channel Scanning Delay Evaluation for Paper Title: Improved Home Automation User Experiences Abstract: The demand of improving home automation system to control the home appliance in conveniently and efficiently leads to be more concerned about what the user daily activities the way they want to control their home appliances. Since the BLE has the ability to advertise data without the need to be connected to a master (known as BLE beacon). Measuring the best response for best user experience for ESP32 beacon scanner to be used for light control is studied by make the advertisement happen at single and multi-channel and using an ESP32 as scanner with different scanning paraments (ESP32-80 and ESP32-20). The result showed that not only the number of packets on ESP32-80 and ESP32-20 increase, but also it achieve a time response that less than 100ms with 59.47% and 49.93% of received packets for ESP32-80 and ESP32-20 respectively. Advertising on single channel will not only reduce the response time (21% and 14.73% of first packet received on ESP32-80 and ESP32-20 respectively at time that less than 100ms) but also reduce the number of packets received on the ESP32-80 and ESP32-20. It is also shows the ability of using ESP32 as a beacon scanner for home automation system.

Keyword: home automation, BLE, beacon, user experiences. References: 1. C. Gomez and J. Paradells, “Survey of home automation networks,” no. June, pp. 92–101, 2010. 2. V. S. Gunge and P. S. Yalagi, “Smart Home Automation: A Literature Review,” Int. J. Comput. Appl., no. Rtdm, pp. 975–8887, 2016. 3. B. L. Risteska Stojkoska and K. V. Trivodaliev, “A review of Internet of Things for smart home: Challenges and solutions,” J. Clean. Prod., vol. 140, pp. 1454–1464, 2017. 145. 4. K. J. Singh and D. S. Kapoor, “Create Your Own Internet of Things,” Ieee Consum. Electron. Mag., no. April, pp. 57–68, 2017. 5. A.Maier, A. Sharp, and Y. Vagapov, “Comparative analysis and practical implementation of the ESP32 microcontroller module for the internet of things,” 2017 Internet Technol. Appl. ITA 2017 - Proc. 7th Int. Conf., pp. 143–148, 2017. 773-778 6. R. Faragher, R. Faragher, and R. Harle, “An Analysis of the Accuracy of Bluetooth Low Energy for Indoor Positioning Applications,” in 2014 27th International Technical Meeting of The Satellite Division of the Institute of Navigation, 2014. 7. Y. W. Lin and C. Y. Lin, “An interactive real-time locating system based on bluetooth low-energy beacon network,” Sensors (Switzerland), vol. 18, no. 5, 2018. 8. M. Moody, “Analysis of Promising Beacon Technology for Consumers,” Elon J. Undergrad. Res. Commun., vol. 6, no. 1, pp. 59– 68, 2015. 9. S. Noguchi, M. Niibori, E. Zhou, and M. Kamada, “Student attendance management system with bluetooth low energy beacon and android devices,” in Proceedings - 2015 18th International Conference on Network-Based Information Systems, NBiS 2015, 2015. 10. N. Newman, “Apple iBeacon technology briefing,” J. Direct, Data Digit. Mark. Pract., 2014. 11. Bluetooth Special Interest Group, “Specification of the Bluetooth System Covered Core Package Version 4.2,” History, no. April, p. 2272, 2014. 12. Bluetooth Special Interest Group, “Specification of the Bluetooth System Wireless connections made easy- v4.0,” vol. 0, no. June, 2010. 13. Kuor-Hsin Chang, “Bluetooth: a viable solution for IoT? [Industry Perspectives],” IEEE Wirel. Commun., vol. 21, no. 6, pp. 6–7, Dec. 2014. 14. M. Altinkaya, “Beacon Vendors,” no. March. 2017. 15. S. Jasek, “Gattacking bluetooth smart devices,” SecuRing, 2016. 16. I. Insights and U. Cases, “The complete Beacon Industry Report: Industry Insights and Use Cases.” 17. GSMA, “A Guide to Bluetooth Beacons,” no. September, 2014. 18. K. Townsend, C. Cufi, and R. Davidson, Getting Started with Bluetooth Low Energy: Tools and Techniques for Low-Power Networking. 2014. 19. A. Liendo, D. Morche, R. Guizzetti, and F. Rousseau, “Efficient Bluetooth Low Energy Operation for Low Duty Cycle Applications,” IEEE Int. Conf. Commun., vol. 2018–May, 2018. 20. J. Tosi, F. Taffoni, M. Santacatterina, R. Sannino, and D. Formica, “Performance Evaluation of Bluetooth Low Energy: A Systematic Review,” Sensors, vol. 17, no. 12, p. 2898, 2017. 21. K. Cho et al., “Analysis of latency performance of bluetooth low energy (BLE) networks,” Sensors (Switzerland), vol. 15, no. 1, pp. 59–78, 2015. Authors: M.A.M Fuad, F.N. Zohedi, M.R.A. Ghani, R. Ghazali, T.A. Izzuddin

Paper Title: Combining of Transfer Learning with Faster-RCNN For Aedes Aegyti Larvae Detection Abstract: The dengue epidemiology episode has become one of the global phenomena especially the rain forest countries including Malaysia. Environmental management, the used of chemical and biological 146. environment are control strategies that has been proposed and practiced by World Health Organization. However, based on statistic al of dengue cases, there is still no concrete solution in curbing this problem especially at non-accessible places. This paper proposed a study on detection Aedes Aegypti larvae in water 779-782 storage tank by combining transfer learning with Faster-RCNN. The purpose of the study is to acquire train and validation losses along with detection performance metrics. The experimental results disclose that the probability detection has scored 97.01% while false alarm has scored 5.97%. Those significant value has depicted that the trained model has high detection accuracies.

Keyword: Aedes Aegypti larvae detection, Transfer learning, water storage tank. References: 1. DEPARTMENT OF STATISTICS MALAYSIA, “PRESS RELEASE CURRENT POPULATION ESTIMATES , MALAYSIA, 2016-2017,” 2017. [Online]. Available: https://www.dosm.gov.my/v1/index.php?r=column/cthemeByCat&cat= 155&bul_id=a1d1UTFZazd5ajJiRWFHNDduOXFFQT09&menu_id=L0pheU43NWJwRWVSZklWdzQ4TlhUUT09. 2. B. Kay, “Dengue vector surveillance and control.,” Curr. Opin. Infect. Dis., vol. 12, no. 5, pp. 48–59, 1999. 3. S. N. R. Saleeza, Y. Norma-Rashid, and M. S. Azirun, “Mosquitoes Larval Breeding Habitat in Urban and Suburban Areas , Peninsular Malaysia,” World Acad. Sci. Eng. Technol., vol. 58, no. 10, pp. 569–573, 2011. 4. H. M. Aburas, B. G. Cetiner, and M. Sari, “Dengue confirmed-cases prediction: A neural network model,” Expert Syst. Appl., vol. 37, no. 6, pp. 4256–4260, 2010. 5. B. G. Cetiner, M. Sari, and H. M. Aburas, “Recognition of Dengue Disease Patterns Using Artificial,” no. May 2014, pp. 13–16, 2009. 6. F. Ibrahim, M. N. Taib, W. A. B. W. Abas, C. C. Guan, and S. Sulaiman, “A novel dengue fever (DF) and dengue haemorrhagic fever (DHF) analysis using artificial neural network (ANN),” Comput. Methods Programs Biomed., vol. 79, no. 3, pp. 273–281, 2005. 7. Moore, “Artificial neural network trained to identify mosquitos in flight,” J. Insect Behav., vol. 4, no. 3, pp. 391–395, 1991. 8. Krizhevsky, I. Sutskever, and H. Geoffrey E., “ImageNet Classification with Deep Convolutional Neural Networks,” Adv. Neural Inf. Process. Syst. 25, pp. 1–9, 2012. 9. P. Sermanet, D. Eigen, X. Zhang, M. Mathieu, R. Fergus, and Y. LeCun, “OverFeat: Integrated Recognition, Localization and Detection using Convolutional Networks,” 2013. 10. R. Girshick, J. Donahue, T. Darrell, and J. Malik, “Rich feature hierarchies for accurate object detection and semantic segmentation,” Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., pp. 580–587, 2014. 11. Redmon, S. Divvala, R. Girshick, and A. Farhadi, “You Only Look Once: Unified, Real-Time Object Detection,” arxiv, 2015. 12. W. Liu et al., “SSD : Single Shot MultiBox Detector,” in European conference on computer vision, 2016, pp. 21–37. 13. Y. Bengio, “Deep Learning of Representations for Unsupervised and Transfer Learning,” JMLR Work. Conf. Proc., vol. 7, pp. 1–20, 2011. 14. S. Ren, K. He, R. Girshick, and J. Sun, “Faster R-CNN : Towards Real-Time Object Detection with Region Proposal Networks,” in Advances in neural information processing systems, 2015, pp. 91–99. 15. Ian Goodfellow, Yoshua Bengio, and Aaron Courville, Deep Learning. 2016. 16. K. Kishida, “Property of average precision and its generalization: An examination of evaluation indicator for information retrieval experiments,” NII Tech. Reports, vol. 2005, no. 14, pp. 1–19, 2005. 17. Y. Wang, C. Wang, H. Zhang, C. Zhang, and Q. Fu, “Combininng Single Shot Multibox Detector with Transfer Learning for Ship Detection using Chinese Gaofen-3 Images,” in Progress in Electromagnetics Research Symposium, 2017, pp. 712–716. Authors: K. E. Kaharudin, Ameer F. Roslan, F. Salehuddin, Z. A. F. M. Napiah, A. S. M. Zain Design Consideration and Impact of Gate Length Variation on Junctionless Strained Double Gate Paper Title: MOSFET Abstract: Aggressive scaling of Metal-oxide-semiconductor Field Effect Transistors (MOSFET) have been conducted over the past several decades and now is becoming more intricate due to its scaling limit and short channel effects (SCE). To overcome this adversity, a lot of new transistor structures have been proposed, including multi gate structure, high-k/metal gate stack, strained channel, fully-depleted body and junctionless configuration. This paper describes a comprehensive 2-D simulation design of a proposed transistor that employs all the aforementioned structures, named as Junctionless Strained Double Gate MOSFETs (JLSDGM). Variation in critical design parameter such as gate length (Lg) is considered and its impact on the output properties is comprehensively investigated. The results shows that the variation in gate length (Lg) does contributes a significant impact on the drain current (ID), on-current (ION), off-current (IOFF), ION/IOFF ratio, subthreshold swing (SS) and transconductance (gm). The JLSDGM device with the least investigated gate length (4nm) still provides remarkable device properties in which both ION and gm(max) are measured at 1680 µA/µm and 2.79 mS/µm respectively.

Keyword: Gate length, on-current, off-current, subthreshold swing, transconductance. References: 1. Y. C. Yeo, P. Ranade, T. J. King, and C. Hu, “Effects of high-k gate dielectric materials on metal and silicon gate workfunctions,” IEEE Electron Device Letters, 147. vol. 23, no. 6, pp. 342–344, 2002. 2. R. Chau, J. Brask, S. Datta, G. Dewey, M. Doczy, B. Doyle, J. Kavalieros, B. Jin, M. Metz, A. Majumdar, and M. Radosavljevic, “Application of high-k gate dielectrics and metal gate electrodes to enable silicon and non-silicon logic ,” Microelectronic Engineering, vol. 80, pp. 1–6, 2005. 783-791 3. R. Chau, S. Datta, M. Doczy, B. Doyle, J. Kavalieros, and M. Metz, “High-k/metal-gate stack and its MOSFET characteristics,” IEEE Electron Device Letters, vol. 25, no. 6, pp. 408–410, 2004. 4. T. Ando, “Ultimate Scaling of High-κ Gate Dielectrics: Higher-κ or Interfacial Layer Scavenging?,” Materials, vol. 5, pp. 478–500, 2012. 5. N. M. Idris, A. Brown, J. Watling, and A. Asenov, “Simulation Study of Workfunction Variability in MOSFETs with Polycrystalline Metal Gates,” Ultimate Integration on Silicon, no. March, pp. 165–168, 2010. 6. S.-H. Chen, W.-S. Liao, H.-C. Yang, S.-J. Wang, Y.-G. Liaw, H. Wang, H. Gu, and M.-C. Wang, “High-performance III-V MOSFET with nano-stacked high-k gate dielectric and 3D fin-shaped structure,” Nanoscale Research Letters, vol. 7. p. 431, 2012. 7. I. Ferain, C. A. Colinge, and J. Colinge, “Multigate Transistors as the Future of Classical Metal-oxide-semiconductor Field-effect Transistors,” Nature, vol. 479, pp. 310–316, 2011. 8. J. E. Suseno and R. Ismail, “Design of Double Gate Vertical MOSFET using Silicon On Insulator ( SOI ) Technology,” International Journal of Nano Devices, Sensors and Systems (IJ-Nano), vol. 1, no. 1, pp. 34–38, 2012. 9. K. Boucart and A. M. Ionescu, “Double-Gate Tunnel FET With High-K Gate Dielectric,” IEEE Transactions on Electron Devices, vol. 54, no. 7, pp. 4–12, 2008. 10. K. E. Kaharudin, A. H. Hamidon, and F. Salehuddin, “Implementation of Taguchi Modeling for Higher Drive Current (ION) in Vertical DG-MOSFET Device,” Journal of Telecommunication, Electronic and Computer Engineering, vol. 6, no. 2, pp. 11–18, 2014. 11. D. Hisamoto, W. Lee, J. Kedzierski, H. Takeuchi, K. Asano, C. Kuo, E. Anderson, T. King, J. Bokor, and C. Hu, “FinFET — A Self-Aligned Double-Gate MOSFET,” IEEE Transactions on Electron Devices, vol. 47, no. 12, pp. 2320–2325, 2000. 12. M. A. Riyadi, J. E. Suseno, and R. Ismail, “The Future of Non-planar Nanoelectronics MOSFET Devices: A Review,” Journal of Applied Sciences, vol. 10, no. 18, pp. 2137–2146, 2010. 13. M. Masahara, Y. Liu, S. Hosokawa, T. Matsukawa, K. Ishii, H. Tanoue, K. Sakamoto, T. Sekigawa, H. Yamauchi, S. Kanemaru, and E. Suzuki, “Ultrathin Channel Vertical DG MOSFET Fabricated by Using Ion-Bombardment-Retarded Etching,” IEEE Transactions on Electron Devices, vol. 51, no. 12, pp. 2078– 2085, Dec. 2004. 14. K. P. Pradhan, S. K. Mohapatra, P. K. Agarwal, P. K. Sahu, D. K. Behera, and J. Mishra, “Symmetric DG-MOSFET With Gate and Channel Engineering : A 2- D Simulation Study,” Microelectronics and Solid State Electronics, vol. 2, no. 1, pp. 1–9, 2013. 15. J.-P. Colinge, “Multiple-gate SOI MOSFETs,” Solid-State Electronics, vol. 48, no. 6, pp. 897–905, Jun. 2004. 16. Nader Shehata, Abdel-Rahman Gaber, Ahmed Naguib, Ayman E. Selmy, Hossam Hassan, Ibrahim Shoeer, Omar Ahmadien, and Rewan Nabeel, “3D Multi- gate Transistors: Concept, Operation, and Fabrication,” Jounal of Electrical Engineering, vol. 3, pp. 1–14, 2015. 17. S. Saurabh, M. J. Kumar, and S. Member, “Novel Attributes of a Dual Material Gate Nanoscale Tunnel Field Effect Transistor,” IEEE Transactions on Electron Devices, vol. 58, no. February, pp. 404–410, 2011. 18. V. P. Trivedi, S. Member, and J. G. Fossum, “Scaling Fully Depleted SOI CMOS,” IEEE Transactions on Electron Devices, vol. 50, no. 10, pp. 2095–2103, 2003. 19. K. E. Kaharudin, F. Salehuddin, A. S. M. Zain, M. N. I. A. Aziz, and I. Ahmad, “Application of Taguchi Method with the Interaction Test for Lower DIBL in WSix/TiO2 Channel Vertical Double Gate NMOS,” ARPN Journal of Engineering and Applied Sciences, vol. 11, no. 11, pp. 7093–7103, 2016. 20. B. Vandana, “Study of Floating Body Effect in SOI Technology,” International Journal of Modern Engineering Research (IJMER), vol. 3, no. June, pp. 1817– 1824, 2013. 21. M. M. A. Hakim, L. Tan, A. Abuelgasim, K. Mallik, S. Connor, A. Bousquet, C. H. De Groot, S. Member, S. Hall, and P. Ashburn, “Self-Aligned Silicidation of Surround Gate Vertical MOSFETs for Low Cost RF Applications,” IEEE Transactions on Electron Devices, vol. 57, no. 12, pp. 3318–3326, 2010. 22. S. Dubey, P. K. Tiwari, and S. Jit, “On-current modeling of short-channel double-gate (DG) MOSFETs with a vertical Gaussian-like doping profile,” Journal of Semiconductors, vol. 34, no. 5, p. 054001, May 2013. 23. A. S. M. Zain, “Scaling and Variability in UltraThin Body Silicon on Insulator (UTB SOI) MOSFETs,” University of Glasgow, 2013. 24. P. Choudhary and T. Kapoor, “Performance Based Comparative Analysis of MOS Structures at 32nm and 20nm Node,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, no. 3, pp. 137–141, 2015. 25. A. Chaudhry and M. J. Kumar, “Controlling Short-channel Effects in Deep Submicron SOI MOSFETs for Improved Reliability : A Review,” IEEE Transaction on Device and Materials Reliability, vol. 4, no. March, pp. 99–109, 2004. 26. P. Olejarz, K. Park, S. MacNaughton, M. R. Dokmeci, and S. Sonkusale, “0.5 µW Sub-Threshold Operational Transconductance Amplifiers Using 0.15 µm Fully Depleted Silicon-on-Insulator (FDSOI) Process,” Journal of Low Power Electronics and Applications, vol. 2, pp. 155–167, 2012. 27. M. N. I. A. Aziz, F. Salehuddin, A. S. M. Zain, and K. . Kaharudin, “Study of Electrical Characteristic for 50 nm and 10 nm SOI Body Thickness in MOSFET Device,” Jurnal Teknologi, vol. 77, no. 21, pp. 109–115, 2015. 28. R. Chau, S. Datta, M. Doczy, B. Doyle, B. Jin, J. Kavalieros, A. Majumdar, M. Metz, and M. Radosavljevic, “Benchmarking Nanotechnology for Logic Transistor Applications,” IEEE Transactions on Nanotechnology, vol. 4, no. 2, pp. 153–158, 2005. 29. S. Saurabh and M. J. Kumar, “Impact of Strain on Drain Current and Threshold Voltage of Nanoscale Double Gate Tunnel Field Effect Transistor: Theoretical Investigation and Analysis,” Japanese Journal of Applied Physics, vol. 48, no. 6, p. 064503, Jun. 2009. 30. H. W. Kim, B.-G. Park, J. H. Kim, and S. W. Kim, “Vertical type double gate tunnelling FETs with thin tunnel barrier,” Electronics Letters, vol. 51, no. 9, pp. 718– 720, 2015. 31. H. Valinajad, R. Hosseini, M. E. Akbari, A. Branch, and K. Branch, “Electrical Characteristics of Strained Double Gate,” International Journal of Recent Research and Applied Studies, vol. 13, no. November, pp. 436–442, 2012. 32. L. Chang, S. Member, K. J. Yang, Y. Yeo, I. Polishchuk, T. King, S. Member, and C. Hu, “Direct-Tunneling Gate Leakage Current in Double-Gate and Ultrathin Body MOSFETs,” IEEE Transactions on Electron Devices, vol. 49, no. 12, pp. 2288–2295, 2002. 33. T. K. Maiti, “An Explicit Surface-Potential Based Biaxial Strained-Si n-MOSFET Model for Circuit Simulation,” Engineering, vol. 02, pp. 879–887, 2010. 34. K. Chandrasekaran, X. Zhou, S. Member, S. Ben Chiah, W. Shangguan, G. H. See, L. K. Bera, N. Balasubramanian, S. C. Rustagi, and S. Ge, “Effect of Substrate Doping on the Capacitance – Voltage Characteristics of,” IEEE Electron Device Letters, vol. 27, no. 1, pp. 62–64, 2006. 35. M. W. Akram, B. Ghosh, P. Bal, and P. Mondal, “P-type double gate junctionless tunnel field effect transistor,” Journal of Semiconductors, vol. 35, no. 1, p. 014002, 2014. 36. Y. Chen, M. Mohamed, M. Jo, U. Ravaioli, and R. Xu, “Junctionless MOSFETs with laterally graded-doping channel for analog/RF applications,” Journal of Computational Electronics, vol. 12, no. 4, pp. 757–764, 2013. 37. M. Wu, X. Jin, H.-I. Kwon, R. Chuai, X. Liu, and J.-H. Lee, “The Optimal Design of Junctionless Transistors with Double-Gate Structure for reducing the Effect of Band-to-Band Tunneling,” JSTS:Journal of Semiconductor Technology and Science, vol. 13, no. 3, pp. 245–251, Jun. 2013. 38. A. K. Gupta, A. Kumar, and A. K. Jaiswal, “To Study and Characterisation of N N + N Nanowire Transistor ( Junctionless ) using 2D ATLAS Simulator,” International Journal of Current Engineering and Technology, vol. 4, no. 3, pp. 2203–2206, 2014. 39. R. T. Doria, M. A. Pavanello, R. D. Trevisoli, M. De Souza, C. W. Lee, I. Ferain, N. D. Akhavan, R. Yan, P. Razavi, R. Yu, A. Kranti, and J. P. Colinge, “Junctionless multiple-gate transistors for analog applications,” IEEE Transactions on Electron Devices, vol. 58, no. 8, pp. 2511–2519, 2011. 40. J. P. Colinge, A. Kranti, R. Yan, I. Ferain, D. Akhavan, P. Razavi, C. W. Lee, R. Yu, and C. A. Colinge, “A Simulation Comparison between Junctionless and Inversion-Mode MuGFETs.,” ECS Transactions, vol. 35, no. 5, pp. 63–73, 2011. 41. J. P. Colinge, C. W. Lee, A. Afzalian, N. D. Akhavan, R. Yan, I. Ferain, P. Razavi, B. O’Neill, A. Blake, M. White, A. M. Kelleher, B. McCarthy, and R. Murphy, “Nanowire transistors without junctions,” Nature Nanotechnology, vol. 5, no. 3, pp. 225–229, 2010. 42. A. K. and R. Y. J. P. Colinge, C. W. Lee, N. Dehdashti Akhavan, R. Yan, I. Ferain, P. Razavi, Semiconductor-On-Insulator Materials for Nanoelectronics Applications, no. March 2015. Springer, 2011. 43. A. Kamath, X. Chen, N. Shen, X. Li, N. Singh, G. Q. Lo, and D.-L. Kwong, “Junctionless CMOS Transistors with Independent DoubleGates,” International Journal of Information and Electronics Engineering, vol. 3, no. 1, pp. 13–15, 2013. 44. Z. Hong, A. Bodkhe, and S. Tzeng, “Method for Forming A Low Resistivity Tungsten Silicide Layer for Metal Gate Stack Applications,” 2014. 45. K. E. Kaharudin, F. Salehuddin, N. Soin, A. S. M. Zain, M. N. I. A. Aziz, and I. Ahmad, “Electrical Characterization of Different High-k Dielectrics with Tungsten Silicide in Vertical Double Gate NMOS Structure,” ARPN Journal of Engineering and Applied Sciences, vol. 11, no. 21, pp. 12328–12335, 2016. 46. Silvaco, “Silvaco ATLAS manual Device Simulation Software,” 2006. 47. K. E. Kaharudin, F. Salehuddin, A. S. M. Zain, and M. N. I. A. Aziz, “Optimization of Process Parameter Variations on Leakage Current in Silicon-on-insulator Vertical Double Gate Mosfet Device,” Journal of Mechanical Engineering and Sciences (JMES), vol. 9, no. December, pp. 1614–1627, 2015. 48. F. A. Rezali, M. Mazhar, N. Aida, F. Othman, and S. W. Muhamad, “Performance and device design based on geometry and process considerations for 14 / 16 - nm FinFETs stress engineering,” IEEE Transactions on Electron Devices, vol. 63, no. 3, pp. 974–981, 2016. 49. S. Sharma, P. Rahul, P. Aditya, and K. P. Vijendra, “An Analysis of Device Characteristics of Strained N-Channel MOSFET,” SSRG International Journal of Electronics and Communication Engineering, vol. 3, no. 8, pp. 87–90, 2016. 50. K. P. Pradhan, S. K. Mohapatra, P. K. Sahu, and S. Parija, “Impact of Strain on Fully Depleted Strained Gate Stack Double Gate MOSFET : A Simulation Study Schematic structure of FD-S-GS-Double Gate N-MOSFET,” ECTI Transactions on Electrical Engineering, ELectronics and Communications, vol. 13, no. 2, pp. 54–57, 2015. 51. V. Pathak and G. Saini, “A Graded Channel Dual-Material Gate Junctionless MOSFET for Analog Applications,” Procedia Computer Science, vol. 125, pp. 825–831, 2018. 52. K. E. Kaharudin, F. Salehuddin, and A. S. M. Zain, “Optimization of Electrical Properties in TiO2 / WSix-based Vertical DG-MOSFET using Taguchi-based GRA with ANN,” Journal of Telecommunication, Electronic and Computer Engineering, vol. 10, no. 1, pp. 69–76, 2018. 53. K. E. Kaharudin, F. Salehuddin, A. S. M. Zain, and M. N. I. A. Aziz, “Comparison of Taguchi Method and Central Composite Design for Optimizing Process Parameters in Vertical Double Gate MOSFET,” ARPN Journal of Engineering and Applied Sciences, vol. 12, no. 19, pp. 5578–5590, 2017. 54. K. E. Kaharudin, F. Salehuddin, A. S. . Zain, and M. N. I. . Aziz, “Application of Taguchi-based Grey Fuzzy Logic for Simultaneous Optimization in TiO2/WSix- based Vertical double-gate MOSFET,” Journal of Telecommunication, Electronic and Computer Engineering, vol. 9, no. 2–13, pp. 23–28, 2017. 55. K. E. Kaharudin, F. Salehuddin, A. S. M. Zain, M. N. I. A. Aziz, Z. Manap, N. A. A. Salam, and W. H. M. Saad, “Multi-response optimization in vertical double gate PMOS device using Taguchi method and grey relational analysis,” in IEEE International Conference on Semiconductor Electronics (ICSE), 2016, pp. 64–68. 56. K. E. Kaharudin, F. Salehuddin, A. S. M. Zain, and M. N. I. A. Aziz, “Impact of Different Dose , Energy and Tilt Angle in Source / Drain Implantation for Vertical Double Gate PMOS Device,” Journal of Telecommunication, Electronic and Computer Engineering, vol. 8, no. 5, pp. 23–28, 2016. 57. R. Norani, “A Dynamic Simulation on Single Gate Junctionless Field Effect Transistor Based on Genetic Algorithm,” Advances in Computer Science: an International Journal, vol. 3, no. 5, pp. 140–145, 2014. 58. H. Ramakrishnan, “Variability: Analysis and Impact on Circuit Response,” 2009. Authors: Wei Ping Chen, Swee Leong Kok Design of Power Conditioning Circuit for Thermal Energy Harvester in Powering a Wireless Sensor Paper Title: Node Abstract: Wireless Sensor Network (WSN) comprises of huge quantity of miniature sensor nodes (SNs) with certain limitation of computer resources which capable for sensing, gathering, data processing and wireless communication. Since most of the SNs are powered by traditional batteries, it can be inconvenient due to their limited lifespan. In this paper, a thermoelectric generator (TEG) is used as thermal energy harvester with the intention to extend the SN lifespan. Since the output voltage generated by this TEG is insufficient to power up the node, a DC-DC step-up converter circuit based on MAX757 is designed to step up the output voltage produced from TEG up to 3V. The SN required an average power which is about 25mW in the active mode and 60µW when it is in sleeping mode. This node can transmit data whenever there is at least a temperature gradient of 15℃ between the hot and cold surface of TEG.

Keyword: DC-DC step up converter, Thermoelectric generator, Thermal energy harvesting, Wireless Sensor Network (WSN). References: 1. Garg, R. K. and M. Pandey, "Review of Energy Harvesting Techniques for Wireless Sensor Nodes", Communications on Applied Electronics, vol. 5, no. 7, pp. 1-4, 2016. 2. O.A. Mohammad, “Applied Energy: An Introduction. Thermoelectric and Thermionic Energy Conversion”, pp.360-262, 2013. 148. 3. C. Law, H. Wahid and P. L. Leow, "A charge pump-based power conditioning circuit for low powered thermoelectric generator (TEG)", 2015 10th Asian Control Conference (ASCC), 2015. 4. M. Abdulqader, A. Mohammad, M. Baker, S. Hani and I. Mohammed, "A multi-input, multi-output power management unit using dickson charge pump for energy harvesting applications", 2016 IEEE 59th International Midwest Symposium on Circuits and 792-796 Systems (MWSCAS), 2016. 5. J. Lopera, H. Rodriguez, J. Pereira, A. de Castro and J. Vigil, "Wireless sensors supplied by energy harvesting thermoelectric generators", 2016 IEEE Industry Applications Society Annual Meeting, 2016. 6. K. Rajeh and B. Kiran, "Development of prototype for waste heat energy recovery from thermoelectric system at Godrej vikhroli plant - IEEE Conference Publication", Ieeexplore.ieee.org, 2018. [Online]. Available: http://ieeexplore.ieee.org/document/7029943/. 7. "Thermoelectric effect - New World Encyclopedia", Newworldencyclopedia.org, 2017. Available: http://www.newworldencyclopedia.org/entry/Thermoelectric_effect. 8. M. Kishi, H. Nemoto, T. Hamao, M. Yamamoto, S. Sudou, M. Mandai and S. Yamamoto, "Micro thermoelectric modules and their application to wristwatches as an energy source", Eighteenth International Conference on Thermoelectrics. Proceedings, ICT'99 (Cat. No.99TH8407). 9. Ibragimov, H. Pleteit, C. Pille and W. Lang, "A Thermoelectric Energy Harvester Directly Embedded Into Casted Aluminum", IEEE Electron Device Letters, vol. 33, no. 2, pp. 233-235, 2012. 10. Prijic, L. Vracar, D. Vuckovic, D. Milic and Z. Prijic, "Thermal Energy Harvesting Wireless Sensor Node in Aluminum Core PCB Technology", IEEE Sensors Journal, vol. 15, no. 1, pp. 337-345, 2015. 11. S. Dalola, V. Ferrari, M. Guizzetti, D. Marioli, E. Sardini, M. Serpelloni and A. Taroni, "Autonomous Sensor System With Power Harvesting for Telemetric Temperature Measurements of Pipes", IEEE Transactions on Instrumentation and Measurement, vol. 58, no. 5, pp. 1471-1478, 2009. 12. Abdal-Kadhim and K. Leong, "Application of thermal energy harvesting from low-level heat sources in powering up WSN node", 2017 2nd International Conference on Frontiers of Sensors Technologies (ICFST), 2017. 13. R. Hazli, A. H. Hamidon, M. Y. Azdiana, A. A. Latiff, H. H. M. Yusof and W. H. M. Saad, "Design of DC-DC Boost Converter with Thermoelectric Power Source", International Journal of Advance Research in Electrical, Electronics and Instrumentation Engineering, vol. 2, no. 9, pp. 4170-4177, 2013. Authors: Ali Mohammed Abdal-Kadhim, Kok Swee Leong Development of an Energy-Aware Algorithm for Low Power Wireless Sensor Node Powered by Dual Paper Title: Energy Harvesting Sources Abstract: A novel self-powered wireless sensor node is proposed and prototyped to overcome the ambient energy lacking in the dual energy harvesting sources by including a secondary energy storage. Moreover, an energy-aware Event-Priority-Driven Dissemination (EPDD) management algorithm has been developed and implemented to control the WSN integrity and reducing the sensor node power consumption as well. EPDD was developed to manage the sensor node operation and to make the sink station able to detect a missing wireless node within the network, which will guarantee the nodes integrity detection. The evaluations revealed that the EPDD shows a good performance in reducing the node power consumption compared to the data push algorithm, whereby, EPDD node was operating 4 hours more than the data push node on the same power source. Regarding the WSN integrity, the EPDD algorithm outpaced the event trigger algorithm, whereby, the EPDD 149. was easily able to detect a node down within the WSN at the contrary of the event trigger.

797-802 Keyword: Wireless Sensor Network, Dual energy harvesting sources, EPDD algorithm, Node down detection, WSN integrity. References: 1. M. Abdal-kadhim, S. L. Kok, and N. B. Mohamad, “Application of piezoelectric energy harvesting in powering radio frequency (RF) module”, Journal of Telecommunication, Electronic and Computer Engineering, vol. 8, no. 4, pp. 77-79, 2016. 2. S. Ayesha, A. Mehebub, R. M. Tapas, and M. Dipankar, “A pyroelectric generator as a 250 self-powered temperature sensor for sustainable thermal energy harvesting from waste heat and human body heat”, Applied Energy, vol. 221, pp. 299–307, 2018. 3. J. C. Hsieh and T. H. Tsai, “An AC-DC Wind Energy Harvesting Circuit with Extended Input-Voltage Range and 95% Tracking Efficiency”, IEEE International Symposium on Circuits and Systems (ISCAS), Florence, Italy, 2018, pp. 1-4. 4. R. A. Kjellby, M. Hamid, and B. B. Lozano, “Self-Powered IoT Device for Indoor Applications”, 31st International Conference on VLSI Design (VLSID), Pune, India, 2018, pp. 455-456. 5. M. Baranov, et al., “Feasibility of RF energy harvesting for wireless gas sensor nodes”, Sensors and Actuators A: Physical, vol. 275, pp. 37-43, 2018. 6. P. Maharjan, M. Salauddin, H. Cho, and J. Y. Park, “An indoor power line based magnetic field energy harvester for self- powered wireless sensors in smart home applications”, Applied Energy, vol. 232, pp. 398-408, 2018. 7. J. Qian, and X. Jing, “Wind-driven hybridized triboelectric- electromagnetic nanogenerator and solar cell as a sustainable power unit for self-powered natural disaster monitoring sensor networks”, Nano Energy, vol. 52, pp. 78-87, 2018. 8. H. U. Yildiz, V. C. Gungor, and B. Tavli, “A Hybrid Energy Harvesting Framework for Energy Efficiency in Wireless Sensor Networks Based Smart Grid Applications”, 17th Annual Mediterranean Ad Hoc Networking Workshop, Capri, Italy, 2018, pp. 1- 6. 9. F. Deng, X. Yue, X. Fan, S. Guan, Y. Xu, and J. Chen, “Multisource Energy Harvesting System for a Wireless Sensor Network Node in the Field Environment”, IEEE Internet of Things Journal, (Early Access), DOI 10.1109/JIOT.2018.2865431, 2018. 10. M. Y. Aalsalem, et al., “Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges”, Journal of Network and Computer Applications, (Early Access), DOI: 10.1016/j.jnca.2018.04.004, 2018. 11. Dong, S. Li, M. Li, Q. He, D. Xu, X. Li, “Self-Powered Event-Triggered Wireless Sensor Network for Monitoring Sabotage Activities”, IEEE Sensors, Orlando, USA, 2016, pp. 1-3. 12. L. J. Klein, M. Ramachandran, T. Kessel, D. Nair, N. Hinds, H. F. Hamann, N. E. Sosa, “Wireless sensor networks for fugitive methane emissions monitoring in oil and gas industry”, IEEE International Congress on Internet of Things, San Francisco, CA, USA, 2018, pp.41-48. 13. Roberts, R. Brooks, P. Shipway, “Internal combustion engine cold-start efficiency: A review of the problem, causes and potential solutions”, Energy Conversion and Management, vol. 82, pp. 327-350, 2014. 14. R. Mudasar, M. Kim, “Experimental study of power generation utilizing human excreta”, Energy Conversion and Management, vol. 147, pp. 86-99, 2017. 15. Spirjakin, A. M. Baranov, A. Somov, V. Sleptsov, “Investigation of heating profiles and optimization of power consumption of gas sensors for wireless sensor networks”, Sensors and Actuators A: Physical, vol. 247, pp. 247-253, 2016. 16. R. Liu, M. Wei, H. Yang, “Cold start control strategy for a two-stroke spark ignition diesel-fuelled engine with air-assisted direct injection”, Applied Thermal Engineering, vol. 108, pp. 414-426, 2016. 17. R. Cipollone, D. Battista, M. Mauriello, “Effects of oil warm up acceleration on the fuel consumption of reciprocating internal combustion engines”, 70th Conference of the ATI Engineering Association, Roma, 2015, pp. 1-8. 18. T. D. Tan, L. M. Ha, and N. T. Anh, “A Real-time Vibration Monitoring for Vehicle Based on 3-DOF MEMS Accelerometer”, Proceedings of International Conference on Computational Intelligence and Vehicular System (CIVS2010), Cau Giay,Ha Noi,Viet Nam, 2010, pp. 1-5. 19. S. W. Hanly. (2016). Shock & Vibration Testing Overview [Online]. Available https://info.mide.com/data-loggers/shock- vibration-testing- overview-ebook. 20. M. Abdal-kadhim, S. L. Kok, and N. B. Mohamad, “Application of Thermal Energy Harvesting in Powering WSN Node with Event-Priority-Driven Dissemination Algorithm for IoT Applications”, Journal of Engineering Science and Technology, vol. 13, no. 8, pp. 2569-2586, 2018. 21. G. V. Merrett, "Energy-and Information-Managed Wireless Sensor Networks: Modelling and simulation", Ph.D. dissertation, School of electronic and computer science, University of Southampton, October 2008. 22. W. Khan, J. I. Bangash, A. Ahmed, A. H. Abdullah, “QDVGDD: Query-Driven Virtual Grid based Data Dissemination for wireless sensor networks using single mobile sink”, Wireless Networks, pp. 1-13. DOI.org/10.1007/s11276-017-1552-8, 2017. 23. I. Saleh, K. M. Abo-Al-Ez, A. A. Abdullah, “A Multi-Aware Query Driven (MAQD) routing protocol for mobile wireless sensor networks based on neuro-fuzzy inference”, Journal of Network and Computer Applications, vol. 88, pp. 72-98, 2017. 24. Potsch, A. Berger, A. Springer, “Efficient Analysis of Power Consumption Behaviour of Embedded Wireless IoT Systems”, IEEE International Instrumentation and Measurement Technology Conference (I2MTC), Turin, Italy, 2017, pp. 1-6. Authors: Nurulidayu Binti Sainuddin, Ali Mohammed Abdal-Kadhim, Kok Swee Leong

Paper Title: Development of Wireless Sensor Node Addressing and Data Packet Collision Avoidance Scheme Abstract: Wireless sensor network (WSN) consists of autonomous sensor devices that are spatially distributed in a wide area. Wireless sensor network is built up from a large number of sensor nodes that are assigned to a specific tasks and most probably is monitoring and reporting tasks. However, since the network might be expanded to hundreds, thousands or even millions of sensor nodes, there will be a high chance for the data from different wireless sensor nodes to collide with one another. Therefore, a proper node addressing scheme is needed to synchronize the data packages transmissions to the sink station. In this paper, a seven bytes addressing string scheme is proposed to encapsulate the node data and assist the sink station in identifying the data packages sources. The addressing string will be created in the wireless sensor node which it contains the node ID, package ID and the node data as well. The package ID is included to detect collided packages within the network. The data packages collision is avoided by allowing the sensor node to access the RF channel and transmit the data at a random time. The experimental results reviled that the proposed scheme was successfully addressed the wireless sensor node and make node identification at the sink station easy. 150. Keyword: Wireless Sensor Network (WSN), Sensor node addressing, collision avoidance, data package, Radio frequency. 803-807 References: 1. G. Shanthi, M. Sundarambal, “FSO–PSO based multihop clustering in WSN for efficient Medical Building Management System”, Cluster Computing, DOI.org/10.1007/s10586-017-1569-x, 2018. 2. G.Venkatesh, P.Chandramouli, “An IOT Based Environmental Radiation Monitoring Through Wireless Sensors Network”, Helix, vol. 8, no. 1, pp. 2753- 2756, 2018. 3. M.Y. Aalsalem, W.Z. Khan, W. Gharibi, M.K. Khan, Q. Arshad, “Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges”, Journal of Network and Computer Applications, vol. 113, pp. 87–97, 2018. 4. M. M. Ibrahiem and S. Ramakrishnan, Wireless Sensor Networks from Theory to Applications. Taylor & Francis Group, 2014. 5. J. Gubbia, R. Buyyab, S. Marusic, M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions”, Future Generation Computer Systems, vol. 29, pp. 1645–1660, 2013. 6. C.W. Hung, and W.T. Hsu, “Power Consumption and Calculation Requirement Analysis of AES for WSN IoT”, Sensors, vol. 18, no. 1675, pp. 1-11, 2018. 7. S. Ali, T. A. Balushi, Z. Nadir, O.K. Hussain, “WSN Security Mechanisms for CPS”, Cyber Security for Cyber Physical Systems, vol 768, pp. 65-87, 2018. 8. K. S. Yıldırım, R. Carli, L. Schenato, “Adaptive Proportional–Integral Clock Synchronization in Wireless Sensor Networks”, IEEE Transactions on Control Systems Technology, vol. 26, no. 2, pp. 610 – 623, 2018. 9. Cytron Technologies, “RF-UART-433-1KM 433MHz RF Transceiver Module(UART)1km”, datasheet, vol. 1.1, 2014. 10. B. Abid, H. Seba, and S. M’bengue, Collision Free Communication for Energy Saving in Wireless Sensor Networks. InTech 2012. 11. P. Dandare, V. Chole, “Detection of Collision Attacks and Comparison of Efficiency in Wireless Sensor Network”, International Journal of Engineering and Computer Science, vol. 5, no.5, pp. 16400-16406, 2016. 12. H. Zhao, J. Wei, N. Sarkar, and S. Huang, “E-MAC: An Evolutionary solution for collision avoidance in wireless ad hoc networks”, Journal of Network and Computer Applications, vol. 65, pp. 1-24, 2016. 13. C. Lei, H. Bie, G. Fang, E. Gaura, J. Brusey, X. Zhang and E. Dutkiewicz, “A Low Collision and High Throughput Data Collection Mechanism for Large-Scale Super Dense Wireless Sensor Networks”, Sensors, vol. 16, no. 1108, pp. 1-16, 2016. 14. P. K. Sahoo, J.P. Sheu, “Design and Analysis of Collision Free MAC for Wireless Sensor Networks With Or Without Data Retransmission”, Journal of Network and Computer Applications, vol. 80, no. 15, pp. 10-21, 2017. 15. P. Srivalli, N. Nagakumari, G. Anupama, V. Srujana, “Avoidance of Collision and Overhearing in Wireless Sensor Networks”, International Journal of Computer Science and Information Technologies, vol. 2, no. 5, pp. 2300-2303, 2011. 16. M.S. Kumaran, “Survey on Reliable Transmission in Wireless Sensor Networks”, International Journal of Computer & Mathematical Sciences, vol. 7, no. 3, pp. 143-145, 2018. 17. M. Abdal-Kadhim, and S.W. Kok, “Application of thermal energy harvesting in powering WSN node with event priority-driven dissemination algorithm for IoT applications”, Journal of Engineering Science and Technology, vol. 13, no. 8, pp. 2569 – 2586, 2018. Authors: Yap June Wai, Zulkalnain bin Mohd Yussof, Sani Irwan bin Md Salim

Paper Title: Hardware Implementation and Quantization of Tiny-Yolo-v2 using OpenCL Abstract: The trend of increasingly model size in Deep Neural Network (DNN) algorithms boost the performance of visual recognition tasks. These gains in performance have come at a cost of increase in computational complexity and memory bandwidth. Recent studies have explored the fixed-point implementation of DNN algorithms such as AlexNet and VGG on Field Programmable Gate Array (FPGA) to facilitate the potential of deployment on embedded system. However, there are still lacking research on DNN object detection algorithms on FPGA. Consequently, we propose the implementation of Tiny-Yolo-v2 on Cyclone V PCIe FPGA board using the High-Level Synthesis Tool: Intel FPGA Software Development Kit (SDK) for OpenCL. In this work, a systematic approach is proposed to convert the floating point Tiny-Yolo-v2 algorithms into 8-bit fixed- point. Our experiments show that the 8-bit fixed-point Tiny-Yolo-v2 have significantly reduce the hardware consumption with only 0.3% loss in accuracy. Finally, our implementation achieves peak performance of 31.34 Giga Operation per Second (GOPS) and comparable performance density of 0.28GOPs/DSP to prior works under 120MHz working frequency.

Keyword: DNN, FPGA, Tiny-Yolo-v2, Quantization. References: 1. Krizhevsky, I. Sutskever and GE. Hinton, “Imagenet classification with deep convolutional neural networks”, Advances In Neural Information Processing Systems, 2012, pp. 1097-1105. 2. Zeiler, Matthew D., and Rob Fergus, "Visualizing and understanding convolutional networks" In European conference on computer vision, Springer, Cham, 2014, pp. 818-833. 3. K. Simonyan, and A.Zisserman, “Very deep convolutional networks for large-scale image recognition”, arXiv preprint arXiv:1409.1556, 2014. 4. G. Hinton, D. Li, Y. Dong, George E. Dahl, et al. "Deep neural networks for acoustic modeling in speech recognition: The shared views 151. of four research groups." IEEE Signal processing magazine 29, no. 6, 2012, pp. 82-97. 808- 5. D. Li, Geoffrey Hinton, and Brian Kingsbury. "New types of deep neural network learning for speech recognition and related applications: An overview." In Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference, IEEE, 2013, 813 pp. 8599-8603. 6. Graves, M. Abdel-rahman, and H. Geoffrey. "Speech recognition with deep recurrent neural networks." In Acoustics, speech and signal processing (icassp), 2013 ieee international conference, IEEE, 2013, pp. 6645-6649. 7. S. Ren, K. He, R. Girshick, and J. Sun, “Faster r-cnn: Towards real-time object detection with region proposal networks”, Advances In Neural Information Processing systems, 2015, pp. 91-99. 8. J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, “You only look once: Unified, real-time object detection”, Proceedings of IEEE Conference on Computer Vision and Pattern recognition, 2016, pp. 779- 788. 9. J. Redmon, and Farhadi, “A. YOLO9000: better, faster, stronger”, arXiv, 2017. 10. Hubara, Itay, Matthieu Courbariaux, Daniel Soudry, Ran El-Yaniv, and Yoshua Bengio. "Quantized neural networks: Training neural networks with low precision weights and activations." The Journal of Machine Learning Research 18, no. 1 (2017): 6869-6898. 11. N. Suda, V. Chandra, G. Dasika, A. Mohanty, Y. Ma, S. Vrudhula, J.S. Seo, and Y. Cao, “Throughput-optimized OpenCL-based FPGA accelerator for large-scale convolutional neural networks,” in ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2016, pp. 16-25. 12. J. Zhang, and J. Li, “Improving the performance of OpenCL-based fpga accelerator for convolutional neural network”, Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2017, pp. 25-34. 13. Lin, Darryl, Sachin Talathi, and Sreekanth Annapureddy. "Fixed point quantization of deep convolutional networks." In International Conference on Machine Learning, pp. 2849-2858. 2016. 14. M. Everingham, L. Van Gool, C.K. Williams, J. Winn and A. Zisserman, “The pascal visual object classes (voc) challenge”, International journal of computer vision, 2010, 88(2), pp.303-338. 15. T.Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan, P. Dollár, and C.L. Zitnick, “Microsoft coco: Common objects in context”, European conference on computer vision, Springer, 2017, pp. 740-755. 16. J. Ma, L. Chen, Gao, “Hardware Implementation and Optimization of Tiny-YOLO Network”, International Forum on Digital TV and Wireless Multimedia Communications, Springer, Singapore, 2017, pp. 224-234. 17. J.W. Yap, Z.M. Yussof, S.I. Salim, K.C. Lim, “Fixed Point Implementation of Tiny-Yolo-v2 using OpenCL on FPGA”, International Journal of Advanced Computer Science and Applications, 9(10), 2018, pp. 506-512. 18. FPGA SDK for OpenCL Programming Guide., Intel, 2017, pp. 70-80. 19. FPGA SDK for OpenCL Best Practice Guide, Intel, 2017, pp. 17-20. RidzaAzri Ramlee, Eric Law Chee Yong, Siva Kumar Subramaniam,AsemKhmag, Ahmad Authors: 152. ShukriFazil Rahman Paper Title: Home Switching using IoT System via Telegram and Web User Interface Abstract: Nowadays, the Internet of Things (IoT) becomes ubiquitous in engineering field and is perceived as paradigms for applications such as a home automation system where data can be exchanged and shared easily across the Internet. This project focuses on the implementation of the home automation system with Telegram using Wireless-Fidelity (Wi-Fi) network access on any smart-phone and laptop devices. It is highly beneficial for elderly, physically-challenged people and travellers to control home appliances effortlessly. This system aims to solve the limitation faced by the technology used in the existing home automation system such as Bluetooth - distance issue, Global Standard for Mobile Communication (GSM) – cost issue and Zigbee – power and bandwidth constraint. In fact, this system provides an interactive graphical user interface (GUI) on both web and Telegram platform where data can be interchanged and synchronized between both GUI in which sensor’s readings and status of home appliances can be monitored and manipulated consistently. The analytical findings based on temperature sensor’s accuracy and system latency showed that the performance of the system is viable, and the system proved to be more prominent than other home automation systems.

Keyword: Telegram, DHT 22, Home Automation system, database, IoT. References: 1. M. A. E.-L. Mowad, A. Fathy, and A. Hafez, “Smart Home Automated Control System Using Android Application and Microcontroller,” Int. J. Sci. \& Eng. Res., vol. 5, no. 5, pp. 935–939, 2014. 2. S. Kumar and S. R. Lee, “Android based smart home system with control via Bluetooth and internet connectivity,” Proc. Int. Symp. Consum. Electron. ISCE, no. 2011, 2014. 3. C. L. Hsu, S. Y. Yang, and W. Bin Wu, “Constructing intelligent home-security system design with combining phone-net and bluetooth 814- mechanism,” Proc. 2009 Int. Conf. Mach. Learn. Cybern., vol. 6, no. July, pp. 3316–3323, 2009. 819 4. R. Teymourzadeh, S. A. Ahmed, K. W. Chan, and M. V. Hoong, “Smart GSM based home automation system,” Proc. - 2013 IEEE Conf. Syst. Process Control. ICSPC 2013, no. December, pp. 306–309, 2013. 5. R. Acker and M. Massoth, “Secure ubiquitous house and facility control solution,” 5th Int. Conf. Internet Web Appl. Serv. ICIW 2010, pp. 262–267, 2010. 6. M. H. A. Wahab, N. Abdullah, A. Johari, and Herdawatie Abdul Kadir, “GSM Based Electrical Control System for Smart Home Application,” J. Converg. Inf. Technol., vol. 5, no. 1, pp. 33–39, 2010. 7. M. Soliman, T. Abiodun, T. Hamouda, J. Zhou, and C. H. Lung, “Smart home: Integrating internet of things with web services and cloud computing,” Proc. Int. Conf. Cloud Comput. Technol. Sci. CloudCom, vol. 2, pp. 317–320, 2013. 8. I. Alam, S. Khusro, and M. Naeem, “A review of smart TV: Past, present, and future,” ICOSST 2017 - 2017 Int. Conf. Open Source Syst. Technol. Proc., vol. 2018–Janua, no. 6, pp. 35–41, 2018. 9. D. Yan and Z. Dan, “ZigBee-based Smart Home system design,” ICACTE 2010 - 2010 3rd Int. Conf. Adv. Comput. Theory Eng. Proc., vol. 2, pp. 650–653, 2010. 10. D.-M. Han and J.-H. Lim, “Design and Implementation of Smart Home Energy Management Systems based on Zigbee,” IEEE Trans. Consum. Electron. 56(3), pp. 1417–1425, 2011. 11. R.A. Ramlee, “Mobile Phone Controlling Home Appliances,” J. Telecommun. Electron. Comput. Eng., vol. 5, no. 1, pp. 37–46, 2013. 12. R. A. Ramlee et al., “Bluetooth Remote Home Automation System Using Android Application,” Int. J. Enginering Sci., vol. 2, no. 1, pp. 149–153, 2013. 13. V. Sivaraman, H. H. Gharakheili, A. Vishwanath, R. Boreli, and O. Mehani, “Network-Level Security and Privacy Control for Smart- Home IoT Devices,” no. October, 2015. 14. R. K. Kodali, V. Jain, S. Bose, and L. Boppana, “IoT Based Smart Security and Home Automation System,” pp. 1286–1289, 2016. 15. J. C. De Oliveira, D. H. Santos, and M. P. Neto, “Chatting with Arduino platform through Telegram Bot,” Proc. Int. Symp. Consum. Electron. ISCE, pp. 131–132, 2016. 16. ESP8266 Datasheet, “ESP8266EX Datasheet,” Espr. Syst. Datasheet, pp. 1–31, 2015. 17. T. Liu and B. Manager, “Aosong Electronics Co ., Ltd Aosong Electronics Co ., Ltd,” vol. 22, pp. 1–10. 18. “PHP 5 Form Handling.” [Online]. Available: https://www.w3schools.com/php/php_forms.asp. [Accessed: 12-May-2018]. 19. “jQuery AJAX Methods.” [Online]. Available: https://www.w3schools.com/jquery/jquery_ref_ajax.asp. [Accessed: 05-Nov-2018]. Authors: Maisarah Abu, Siti Adlina Md Ali, Siti Normi Zabri

Paper Title: Improvement of Inset Fed Microstrip Antenna’s Pefromances with Types of at 28 GHz Abstract: This paper presents improvement of insert feed microstrip antenna with types of types of metamaterials. The antenna and the metamatrials were printed on a thin substrate, Rogers RT5880 with 0.254 mm thickness. Two types of metamaterials were introduced; Artificial Magnetic Conductor (AMC) and Frequency Selective Surface (FSS). The metamaterials were placed on the bottom of the antenna with no gap. Four cases were analyzed; antenna alone, antenna with AMC, antenna with FSS and antenna with multi-layer of FSS-AMC. Performances of the antenna were evaluated in terms of return loss, useful bandwidth and realized gain. The resonating frequency was shifted but still operate well at 28 GHz. Improvements in useful bandwidth from antenna alone and as it worked with all types of metamaterials. The realized gain was effectively improved from 1.76 dB 153. up to 6.16 dB for the fourth cases. The design of insert feed microstrip antenna with types of thin metamaterials 820- can be applied as a flexible applications in advanced sensors. 825

Keyword: insert feed microstrip antenna, metamaterias, amc, fss, and gain.

References: 1. P. P. Punia, et al., “Inset Fed Rectangular Microstrip Patch Antenna for UHF Radio Frequency Identification,” International Journal of Engineering Research & Technology (IJERT), Vol. 4 (8), pp. 428-430, 2015. 2. N. T. Selvi, et al., “An Inset-Fed Rectangular Microstrip Patch Antenna with Multiple Split Ring Resonator Loading for WLAN and RF-ID Applications,” Progress in Electromagnetics Research, Vol. 81, pp. 41-52, 2018. 3. V. Samarthay, et al., "Designing and Optimization of Inset Fed Rectangular Microstrip Patch Antenna (RMPA) for Varying Inset Gap and Inset Length," International Journal of Electronic and Electrical Engineering, Vol. 7 (9), pp. 1007-1013, 2014. 4. J. Singh, et al., “Inset Feed Microstrip Patch Antenna,” International Journal of Computer Science and Mobile Computing, vol. 5(2), pp.324–329, 2016. 5. S. Mokha, et al., “Design of Flexible Micrstrip Patch Antenna of 2.4 GHz Operation Frequency using HFSS,” International Research Journal of Engineering and Technology (IRJET), Vol. 3 (15), pp. 638–644, 2016. 6. J. Kurian, et al., “Flexible microstrip patch antenna using rubber substrate for WBAN applications, Wetness and Specific Absorption Rate Measurements,” 2014 International Conference on Contemporary Computing and Informatics (IC3I), 2014. 7. E. Sidhu, et al., “Flexible microstrip patch antenna designs for Bluetooth, IMT, WLAN and WiMAX applications,” 2017 Progress in Electromagnetics Research Symposium - Spring (PIERS), 2017. 8. R. Lakshmanan, et al., “Flexible Ultra Wide Band Antenna for WBAN Applications,” International Journal of Applied Engineering Research. Vol. 24, 2016. 9. A. Kumar, et al., “Design Analysis of Different Types of Feed to Microstrip Patch Antenna,” ICONIC Research and Engineering Journals, Vol. 1 (6), pp. 7-11, 2017. 10. A. Arora, et al., "Comparative study of different Feeding Techniques for Rectangular Microstrip Patch Antenna," International Journal Of Innovative Research in Electrical, Electronics, Instrumentation And Control Engineering, Vol. 3 (15), pp. 32–35, 2015. 11. D. M. Pozar, Microwave Engineering, Boston, MA, USA: Artech House, 1998. 12. V. Midasala et al., “Microstrip Patch Antenna Array Design to Improve Better Gains,” International Conference on Computational Modeling and Security (CMS 2016), pp. 401–409, 2016. 13. S. Datto, et al., “Optimized Microstrip Patch Antenna (MPA) Array Design to Enhance Gain for S-Band Application,” IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE), Vol. 12 (3), pp.74–78, 2017. 14. K. L. Nani, et al., “1×4 Rectangular Patch Array Operating at 10GHz using Corporate Feeding Technique,” International Journal of RF and Microwave Computer Aided Engineering, vol. 5 (2), pp.845–848, 2017. 15. S. Peddakrishna, et al., “Performance Improvement of Slotted Elliptical Patch Antenna using FSS Superstrate,” International Journal of Applied Engineering Research. 2018. 16. A. S. Mekki, et al., “Gain Enhancement of a Microstrip Patch Antenna Using a Reflecting Layer,” International Journal of Antennas and Propagation, 2014. 17. S. Karkari, et al., "Enhancing Return Loss of Rectangular Microstrip Antenna Using AMC," International Research Journal of Engineering and Technology (IRJET), Vol. 2 (4), pp. 1045-1048, 2015. 18. V. Ekke, et al., “Gain Enhancement of Microstrip Patch Antenna Array with AMC Structure Using Multilayer PCB Technology,” International Conference on Smart Trends for Information Technology and Computer Communications, pp. 632-639, 2016. 19. A. Chatterjee, et al., “Gain Enhancement of a Wide Slot Antenna Using a Second-Order Bandpass Frequency Selective Surface,” Radio Engineering, Vol. 24 (2), pp. 455-461, 2015. 20. A. Ghish, et al., “Design f Triple Band Slot-Patch Antenna with Improved Gain using Triple Band Artificial Magnetic Conductor,” Authors: A. Razzaq, H. Zainuddin, F. Hanaffi, Y.Ying, Radhi M. Chyad, HA Razak

Paper Title: Transformer Oil Ageing Detection using Mach–Zender Interferometry Configuration as a Sensor Abstract: Paper In this paper, the fabrication and characterisation of an optical fibre sensor for transformer oil ageing detection are presented. Bare fibre is used in the Mach–Zender interferometry (MZI) configuration as a sensing arm. Hydrofluoric acid (30%) and a power meter are used in sensor fabrication. The MZI sensor is affected by the changes of the refractive index (RI) of the transformer oil. The sensor operates according to different output power levels at the receiving end of the optical sensor. Results agree with the AC breakdown voltage test and oil absorption spectrum test. This work contributes to the improvement of transformer oil monitoring systems by ensuring the availability of oil information and protecting such systems from damage.

Keyword: Transformer oil, Ageing measurement, Mach–Zender interferometry, Bare fibre, Chemical etching

References: 1. G M. Kohtoh, G. Ueta, S. Okabe, and T. Amimoto, “Transformer insulating oil characteristic changes observed using accelerated degradation in consideration of field transformer conditions,” IEEE Transactions on Dielectrics and Electrical Insulation, vol. 17, no. 3, pp. 808–818, 2010. 2. M. A. Salam, Q. M. Rahman, F. Wen, S. P. Ang, and W. Voon, “Causes of transformer failures and diagnostic methods – A review,” Renewable and Sustainable Energy Reviews, vol. 82. pp. 1442–1456, 2018. 154. 3. M. Wang, A. J. Vandermaar, and K. D. Srivastava, “Review of condition assessment of power transformers in service,” IEEE Electrical insulation magazine, vol. 18, no. 6, pp. 12–25, 2002. 826- 4. M. Bagheri, M. S. Naderi, T. Blackburn, and B. T. Phung, “Dean-Stark vs FDS and KFT methods in moisture content recognition of 831 transformers,” In Power and Energy (PECon), 2012 IEEE International Conference, no. December, pp. 712–717, 2012. 5. I. Hurezeanu, C. I. Nicola, D. Sacerdotianu, M. Nicola, A. M. Aciu, and M. C. Nitu, “Temperature control and monitoring system for power transformer windings using fiber optic sensors,” Fundamentals of Electrical Engineering (ISFEE), 2016 International Symposium on. IEEE, 2016., pp. 1–4, 2016. 6. S. Ab Ghani, N. A. Muhamad, I. S. Chairul, and N. Jamri, “A study of moisture effects on the breakdown voltage and spectral characteristics of mineral and palm oil-based insulation oils,” ARPN J. Eng. Appl. Sci., vol. 11, no. 8, pp. 5012–5020, 2016. 7. A. B. Lobo Ribeiro, N. F. Eira, J. M. Sousa, P. T. Guerreiro, and J. R. Salcedo, “Multipoint fiber-optic hot-spot sensing network integrated into high power transformer for continuous monitoring,” IEEE Sensors Journal, vol. 8, no. 7, pp. 1264–1267, 2008. 8. S. Karmakar, N. K. Roy, and P. Kumbhakar, “Effect of ageing in transformer oil using UV-visible spectrophotometeric technique,” Journal of Optics, vol. 40, no. 2, pp. 33–38, 2011. 9. P. Zubiate, J. M. Corres, C. R. Zamarreno, I. R. Matias, and F. J. Arregui, “Fabrication of Optical Fiber Sensors for Measuring Ageing Transformer Oil in Wavelength,” IEEE Sensors Journal, vol. 16, no. 12, pp. 4798–4802, 2016. 10. L. Z. Maria, Letizia , Nunzio Cennamo, “Optical chemical sensor for oil-filled power transformer Nunzio,” Photonics Technologies, 2014 Fotonica AEIT Italian Conference, vol. 12, pp. 1–3, 2014. 11. N. A. Bakar and A. Abu-Siada, “A new method to detect dissolved gases in transformer oil using NIR-IR spectroscopy,” IEEE Transactions on Dielectrics and Electrical Insulation, vol. 24, no. 1, pp. 409–419, 2017. 12. N. Abu Bakar, A. Abu-Siada, N. Das, and S. Islam, “Effect of Conducting Materials on UV-Vis Spectral Response Characteristics,” Universal Journal of Electrical and Electronic Engineering, vol. 1, no. 3, pp. 81–86, 2013. 13. S. Laskar and S. Bordoloi, “Monitoring of Moisture in Transformer Oil Using Optical Fiber as Sensor,” Journal of photonics, vol. 2013, pp. 1–7, 2013. 14. D. K. Mahanta and S. Laskar, “Water quantity based quality measurement of transformer oil using polymer optical fiber as sensor,” IEEE Sensors Journal, vol. 1748, no. c, 2017. 15. B. Sarkar, D. K. Mishra, C. Koley, N. K. Roy, and P. Biswas, “Intensity Modulated Fiber Bragg Grating Sensor for Detection of Partial Discharges inside High Voltage Apparatus,” IEEE Sensors Journal, no. c, pp. 1–8, 2016. 16. J. Harris, P. Lu, H. Larocque, L. Chen, and X. Bao, “In-fiber Mach-Zehnder interferometric refractive index sensors with guided and leaky modes,” Sensors and Actuators B: Chemical, vol. 206, pp. 246–251, 2015. 17. B. H. Lee et al., “Interferometric fiber optic sensors,” Sensors, vol. 12, no. 3, pp. 2467–2486, 2012. 18. H. Wang et al., “Simultaneous measurement of refractive index and temperature based on asymmetric structures modal interference,” Optics Communications, vol. 364, pp. 191–194, 2016. 19. Y. Sun et al., “Dual-parameters optical fiber sensor with enhanced resolution using twisted MMF based on SMS structure,” IEEE Sensors Journal, vol. 17, no. 10, pp. 3045–3051, 2017. 20. A. A. Jasim et al., “Refractive index and strain sensing using inline Mach-Zehnder interferometer comprising perfluorinated graded- index plastic optical fiber,” Sensors and Actuators A: Physical, vol. 219, pp. 94–99, 2014. 21. C. X. Teng, F. Da Yu, N. Jing, and J. Zheng, “The influence of temperature to a refractive index sensor based on a macro-bending tapered plastic optical fiber,” Optical Fiber Technology, vol. 31, pp. 32–35, 2016. 22. R. T. Ghahrizjani, H. Sadeghi, and A. Mazaheri, “A Novel Method for onLine Monitoring Engine Oil Quality Based on Tapered Optical Fiber Sensor,” IEEE Sensors Journal, vol. 16, no. 10, pp. 3551–3555, 2016. 23. S. Tenbohlen and M. Koch, “Aging Performance and Moisture Solubility of Vegetable Oils for Power Transformers,” IEEE Transactions on Power Delivery, vol. 25, no. 2, pp. 825–830, 2010. 24. M. M. Emara, D. E. A. Mansour, and A. M. Azmy, “Dielectric properties of aged mineral oil filled with TiO2 nanoparticles,” Electric Power and Energy Conversion Systems (EPECS), 2015 4th International Conference, pp. 15–19, 2015. 25. A. M. Alshehawy and D. A. Mansour, “Impact of Thermal Aging of Transformer Oil on UV-Vis Optical Spectrum and Dielectric Properties,” Power Systems Conference (MEPCON), 2016 Eighteenth International Middle East. IEEE, pp. 860–865, 2016. 26. ASTM D1816-03, “Standard Test Method for Dielectric Breakdown Voltage of Insulating Liquids Using VDE Electrodes ,” pp. 1–5, 2014. Authors: Lavanya.P, Sangeetha.A, Santhana Krishnan

Paper Title: Intrusion Detection using Machine Learning Abstract: System savage technicians work to keep administrations accessible every time by dealing with gatecrasher assaults. Interruption Recognition System (IRS) is one of the possible components that is used to detect and order any anomalous activities. In this manner, the IRS must be dependably fully informed regarding the most recent gatecrasher assaults marks to save privacy, trustworthiness, and accessibility of administrations. The fast of IRS is an imperative problem. This examination work represents how the Knowledge Disclosure and Data Mining (or Knowledge Discovery in Databases) The CART and RBFN have been picked for this investigation. It has been demonstrated that the CART classifier has accomplished the most elevated exactness rate for distinguishing and arranging all KDD dataset assaults, which are of sort DOS, R2C, C2R, and Test.

Keyword: Classification and Regression Trees, Interruption Recognition system Knowledge Discovery in Database, Radical basis Function network. References: 1. Nicolas Papernot, Patrick McDaniel, Arunesh Sinha, and Michael Wellman,“SoK: Towards the Science of Security and Privacy in Machine Learning”Published in arxiv,Nov 2016.https://pdfs.semanticscholar.org/ebab/687cd1be7d25392c11f89fce6a63bef7219d.pdf 155. 2. Marco Barreno · Blaine Nelson · Anthony D. Joseph ·J.D. Tygar,”The security of machine learning”published in springer link,april 2006. DOI 10.1007/s10994-010-5188-5 832- 3. wang hua,MA cuiqin,ZHOU Lijuan,” A Brief Review of Machine Learning and its Application ”, published in IEEE,2009 DOI: 10.1109/ICIECS.2009.5362936 837 4. Yohei Okada∗, Shingo Ata∗, Nobuyuki Nakamura†, Yoshihiro Nakahira†, and Ikuo Oka∗”Comparisons of Machine Learning Algorithms for Application Identification of Encrypted Traffic”,published in International conference on machine learning and application. DOI: 10.1109/ICMLA.2011.162 5. Ronald L. Rivest “Cryptography and Machine Learning”,published in springer,2015 https://link.springer.com/book/10.1007%2F978-3- 319-94147-9 6. Mouhammad Alkasassbeh, Mohammad Almseidin, Machine Learning Methods for Network Intrusion Detection, published in IEEEpublications,2016 https://www.researchgate.net/publication/327550168_Machine_Learning_Methods_for_Network_Intrusion_Detection 7. Suad Mohammed Othman1*, Fadl Mutaher Ba‑Alwi1, Nabeel T. Alsohybe1 and Amal Y. Al‑Hashida,Intrusion detection model using machine learning algorithm on Big Data environment,published in open access research,2017https://doi.org/10.1186/s40537-018-0145- 4 8. Hang Xu and Frank Mueller, Mithun Acharya and Alok Kucheria, Machine Learning Enhanced Real-Time Intrusion Detection Using Timing Information,published in IEEE ,2012. https://arcb.csc.ncsu.edu/~mueller/ftp/pub/mueller/papers/trec4cps18.pdf 9. Nutan Farah Haq, Musharrat Rafni, Abdur Rahman Onik, Faisal Muhammad Shah, Md. Avishek Khan Hridoy, Application of Machine Learning Approaches in Intrusion Detection System: A Survey,published in International Journal of Advanced Research in Artificial Intelligence, Vol. 4, No.3, 2015, https://thesai.org/Downloads/IJARAI/Volume4No3/Paper_2- Application_of_Machine_Learning_Approaches_in_Intrusion_Detection_System.pdf 10. Anna L. Buczak, Erhan Guven[mach intrusion detection system] proposed a detail survey called “A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection”,published in IEEE explorer,2014 DOI: 10.1109/COMST.2015.2494502 Authors: R. Vinodha, R. Parvathi

Paper Title: Election Result Prediction using Spatial Statistical Method Abstract: Since 17th Century, Modern representative democracy in all forms is being made possible by having a formal way of collecting people's overall opinion on who is to be chosen as their representative. Election 156. is a most important event in any democratic country. Confronting on predicting the winning person/party in the election is the biggest challenge here. In this paper, a study of spatial statistics method to predict the election result 838- using the exploratory data analysis is carried out by applying spatial statistical methods. The paper presents, prediction of the election result with respect to the income level of the citizen and also a comparison of results 843 obtained from the different statistical methods.

Keyword: Geogaphic Information System, Residual Auto-Correlation, Spatial Regression, Spatial Statistical Methods

References: 64. A. Anselin, “Local indicators of spatial association LISA”, Geogr Anal 27: 97 – 115, 1995. 65. L. Anselin, A.K. Bera, R. Florax, M.J. Yoon, “Simple diagnostic tests for spatial dependence”, Reg Sci Urban Econ 26: 77 –104, 1996. 66. M. I. Bakker, M. Hatta, A. Kwenang, M.P. Van, W.R. Faber, P.R. Klatser, L. Oskan, “Risk factors for developing leprosy a population- based cohort study in Indonesia”, Lepr Rev 77: 48 – 61, 2006. 67. J.S.Cramer, “Efficient grouping, regression and correlation in Engel curve analysis”, J am Stat Assoc, 59, 233–250, 1964. 68. N.A.C. Cressie, Statistics for Spatial Data, rev. Ed. New York: John Wiley & Sons, Wiley Ser Prob Stat, 1993. 69. N. Cressie, S.N Lahiri, “Asymptotics for REML estimation of spatial covariance parameters”, J Stat Plan Infer 50, 327–341, 1996. 70. M.C De Souza Dias, G.H Dias, M.L Nobre, “The use of Geographical Information System (GIS) to improve active leprosy case finding campaigns in the municipality of Mossoró”, Rio Grande do Norte State, Brazil, Lepr Rev 78: 261 – 269, 2007. 71. G. Firebaugh, “A rule for inferring individual-level relationships from aggregate data”, Am Sociol Rev 43, 557–572, 1978. 72. E. Fischer, D. Pahan, S. Chowdhury, J. Richardus, “The spatial distribution of leprosy cases during 15 years of a leprosy control program in Bangladesh: An observational study”, BMC Infect Dis 8: 126, 2008. 73. A.S. Fotheringham, “Scale-independent spatial analysis”, Taylor & Francis, pp.221-228,1989. 74. M. Goodchild and S. Gopal (Eds.), The Accuracy of Spatial Data Bases‖, pp. 221–228, London: Taylor & Francis, 1989. 75. J. Goncalves Barreto, D. Bisanzio, et.al, “Spatial Analysis Spotlighting Early Childhood Leprosy Transmission in a Hyperendemic Municipality of the Brazilian Amazon Region”, PLOS Neglect Trop D, Volume 8, Issue 2, 2014. 76. D. Gujarati D, “Basic Econometrics”, Fourth edition. New York: McGraw-Hill, Economet J, 2014. 77. L. Huang, M. Kulldorff, D. Gregorio, “A spatial scan statistic for survival data”, Biometrics 63: 109 –118, 2007. 78. M. Kulldorff, N. Nagarwalla, “Spatial disease clusters: detection and inference”, Stat Med 14: 799 – 810, 1995. 79. P.A. Longley, M. F Goodchild, D.J. Maguire, D.W. Rhind, “Geographic Information Systems and Science”, Int J Remote Sens, pp.560, 2011. 80. A. Odoi, S.W. Martin, P. Michel. J. Holt, D. Middleton, et al, ”Geographical and temporal distribution of human giardiasis in Ontario, Canada”, Int J Health Geogr 2: 5, 2003. 81. Harmanjit Singh, Gurdev Singh, Nitin Bhatia, "Election Results Prediction System based on Fuzzy Logic", Int J Comput Appl, Volume 53-No.9, 2012. 82. S.J. Prais, J. Aitchison, “The grouping of observations in regression analysis”, Revue de I‘Institut International de Statistique, 1–22, 1954. 83. J. Queiroz, G. Dias, M. Nobre, M. De Sousa Dias, S. Arau´jo, et al, “Geographic information systems and applied spatial statistics are efficient tools to study Hansen‘s disease (leprosy) and to determine areas of greater risk of disease”, Am J Trop Med Hyg 82: 306–314, 2010. 84. S. Richardson, C. Guihenneuc, V. Lasserre, “Spatial linear models with autocorrelated error structure”, J R Stat Soc, The Statistician, 41, 539–557, 1992. 85. W. Tobler, “Frame independent spatial analysis”, In M. Goodchild and S. Gopal, The Accuracy of Spatial Data Bases, pp. 115–122. London: Taylor & Francis, 1989. 86. L.A. Waller, C.A. Gotway, “Applied Spatial Statistics for Public Health Data”, Wiley Ser Prob Stat, 520p, 2004. Authors: Maria Navin J R, Sridevi N, Pankaja R Data Analysis and Classification of mHealth Shimmer2 Sensor Data sets for Human Physical Paper Title: Activities Recognition Abstract: Human physical activity recognition is one of the important attributes for well being of human health and activity recogni-tion field. A physical signal with respect to time based directed toward recognizes human activity events is projected, in the view of this work usage wearable accelerometer sens-ing devices were implanted taking place the human body lo-cation on the upper body Chest Sensor (CS), Left Ankle Sen-sor (LAS) and Right Lower Arms Sensor (RLAS). Accelerome-ter feature extracted based acceleration signals with respect to time, physical appearance of the accelerometer x, y, and z dimension values reported/recorded using shimmer2 weara-ble sensor device is recommended at the categorization of the 10 different users was performed 12 different types human activities, including vigorous and moderate activities. User ages between 24 to 29 years and human body weight (HBW) are 53 to 83 Kg=m2. Results were on view a large validity per-formance precision and recall were getting 95 for each human activities. The whole classifiers accuracy results for all combi- nation of the feature set of all sensors is 98%. The considered work could be used to observe the human body motion of different body location of users and to perform data analysis and classification.

157. Keyword: Data Analysis, Activity Recognition, Wearable Sensor, Physical Activity, Classification 844- 848 References: 1. Banos, O., Garcia, R., Holgado-Terriza, J.A., Damas, M., Pomares, H., Rojas, I., Saez, A., Villalonga, C.: mhealthdroid: a novel framework for agile development of mobile health applications. In: International Workshop on Ambient AssistedLiving, Springer (2014) 91-98. 2. McAdams, E.T., Gehin, C., Noury, N., Ramon, C., Nocua, R., Massot, B., Oliveira, A., Dittmar, A., Nugent, C.D., Laughlin, J.: Biomedical sensors for ambient assisted living. In: Advances in Biomedical Sensing, Measurements, Instrumentation and Systems. Springer (2010) 240{262. 3. Kwapisz, J.R., Weiss, G.M., Moore, S.A.: Activity recognition using cell phone accelerometers. ACM SigKDD Explorations Newsletter 12(2) (2011) 74-82. 4. Cleland, I., Kikhia, B., Nugent, C., Boytsov, A., Hallberg, J., Synnes, K., McClean, S., Finlay, D.: Optimal placement of accelerometers for the detection of everyday activities. Sensors 13(7) (2013) 9183-9200. 5. Yogesh, K., et al.: Instance based human physical activity (hpa) recognition using shimmer2 wearable sensor data sets. In: Advances in Computing, Communications and Informatics (ICACCI), 2017 International Conference on, IEEE (2017) 995-999. 6. Arif, M., Kattan, A., Physical activities monitoring using wearable acceleration sensors attached to the body. PloS one 10(7) (2015) e0130851. 7. Eduardo Casilari , José-Antonio Santoyo-Ramón and José-Manuel Cano-García., Analysis of Public Datasets for Wearable Fall Detection Systems Sensors 2017, 17, 1513; doi:10. 3390/s17071513. 8. Daniela Micucci, Marco Mobilio and Paolo Napoleno,. UniMiB SHAR: A Dataset for Human Activity Recognition Using Acceleration Data from Smart phones Appl. Sci. 2017, 7, 1101; doi:10.3390/app 7101101. 9. Doreswamy, Yog sh K., Group Based Human Physical Activity Classification (Gbhac) Using Shimmer2 Wearable Sensor Data Sets IJLTET, Special Issue SACAIM 2017, pp. 006-012. Authors: Sridevi N, Kulkarni Varsha, Maria Navin J R

Paper Title: Machine Learning Algorithms: Diagnosing Breast Cancer Abstract: Breast Cancer has become one of the common diseases not only in women but also in few men. According to research, the demise rate of females has increased mainly because of Breast Cancer tumor. One out of every eight women and one out of every thousand men are diagnosed with breast cancer. Breast cancer tumors are mainly classified into two types: Benign tumor which is a non-cancerous tumor and other one is malignant tumor which is a cancerous tumor. In order to know which type of tumor a patient has; the accurate and early diagnosis is a very crucial step. Machine Learning (ML) algorithms have been used to develop and train the model for classification of the type of tumor. For accurate and better classification several classification algorithms in ML have been trained and tested on the dataset that was collected. Already algorithms like Naïve Bayes, Random 158. Forest, K-Nearest Neighbor and SVM showed better accuracy for classification of tumor. When we implemented Multilayer Perceptron (MLP) algorithm it gave us the best accuracy levels among all both during training as well as testing .i.e. 97%. So, the exact classification using this model will help the doctors to diagnose the type of tumor 849- in patients quickly and accurately. 851

Keyword: Benign, Malignant, Naïve Bayes, Random Forest, K-Nearest Neighbor, SVM, MLP, Accuracy. References: 1. Rafaqat Alam Khan, Taseer Suleman, Muhammad SajidbFarooq, Muhammad Hassan Rafiq and Muhammad Arslan Tariq. “Data Mining Algorithms for Classification of Diagonostic Cancer Using Genetic Optimization Algorithms”,2017, Vol 17 No.12,December 2017. 2. Dana Bazazeh and Raed Shubair. “Compartive Study of Machine Learning Algorithms for Breast Cancer Detectio and Diagonsis”,2016.978-1-15090-5306-3/ 2016. 3. Python Machine Learning – Sebastian Rashka & Vahid Mirjalili. Authors: Supriya L P, Chinchu M S

Paper Title: Malayalam Error Sentence Detection using Deep Learning with RNN-LSTM Abstract: Malayalam is a difficult Indian language and not easy for foreigners. Even as a mother tongue, you should spend more time learning as a child. In Malayalam, the use of the wrong word in a sentence may change the whole meaning and purpose. Many errors occur during the writing process. It is very difficult to find errors in the Malayalam language, and no one can remove those errors without their linguistic knowledge In this paper, we have proposed the structure of repetitive neural networks using long short-term memory (RNN-LSSTM) to detect Malayalam sentence errors. 159.

852- Keyword: Deep Learning, Natural Language Processing, RNN, RNN-LSTM 855

References: 1. Nivedita S. Bhirud, R.P. Bhavsar and B.V. Pawar“A SURVEY OF GRAMMAR CHECKERS FOR NATURAL LANGUAGES.” 2. Daniel Naber. “A Rule-Based Style And Grammar Checker”. Diplomarbeit. Technische Fakultät Bielefeld, 2003. 3. Tesfaye, Debela. “A Rule-Based Afan Oromo Grammar Checker”. Jimma Institute of Technology. Ethiopia: Vol. 2, No. 8, 2011. 4. Kinoshita, Jorge; Nascimento, Laнs do; Dantas ,Carlos Eduardo. ”CoGrOO: a Brazilian Portuguese Grammar Checker based on the CETENFOLHA Corpus”. Universidade da Sгo Paulo (USP), Escola Politйcnica. 2003. 5. LR Medsker and LC Jain. 2001. RECURRENT NEURAL NETWORKS. Authors: Aishwariyashindhe S, Sathyapriya J, Vijayalakshmi.P.S, Sudha

Paper Title: Factors Influencing Employee Absenteeism in IT Companies at Trichy Abstract: Employees are not present in work and so the work suffers. The researcher focuses to sort the motives for employee’s absenteeism in an organization. It is the key problem faced by more or less all the employers nowadays. Absenteeism of employees from job results in backlogs, pile of labour and therefore work delays. The objective of the paper is to identify the predominant factor influencing employee absenteeism and to measure the impact of factors influencing employee absenteeism on employee productivity. Descriptive research 160. design is used for this reseacrh. Data was collected from 150 employees using Convenience sampling technique from the employees of IT companies at Trichy. The data were analyzed using descriptive statistics to identify the 856- predominant factor influencing employee absenteeism and multiple regression to measure the impact of factors influencing employee absenteeism on employee productivity. From the analysis, it was found that stress at the 859 workplace is the predominant factor highly influencing employee absenteeism. It was also found that improper time management is highly influencing employee absenteeism factor on employee productivity.

Keyword: Employee absenteeism, Employee productivity, IT companies, Multiple regression.

References: 1. Cote and Bruce.”Downsizing with competitive outsourcing: its impact on absenteeism in the public sector”, VIESOJI POLITIKA IR ADMINISTRAVIMAS, 2004. 2. Jussi vahtera, Mika kivimaki, et al., “Organizational downsizing, sickness absence, and mortality: a 10-towns prospective cohort study”. BMJ (online), 2004. 3. Tai tang and Hua Chang, “Impact of role ambiguity and role conflict on employee creativity”, African Journal of business management (4) 6 869-881, 2010. 4. Vijaya Bhaskar Reddy, Vez, and et al., “A study on training need assessment in TASA foods private limited, Chittoor,” International Journal of researchers students and academician (IFRSA) 2(5)275-280, 2012. 5. Vijaya and Sheela, “A study on worker absence in Sundaram brake linings ltd., Chennai,” AMET International journal of management 68-74, 2012. 6. Revathi Arunachalamurthy, “A study on absenteeism among the employees working in the manufacturing unit in Coimbatore,” International Journal of science and engineering research (2) 12, 2014. 7. Tiwari,” Impact of absenteeism and labor turnover on organizational performance at ITI, Nani, Allahabad, India,” Abhinav publication 3(10) 9-15, 2014. 8. Don – Solomon Amakiri and Godday Raymond Luke, “Job style and worker absenteeism: A case study of some government parastatals in Nigeria,” International Journal of secondary education, (3) 6-1, 67-71, 2015. 9. Silpa, “A study on symptoms and preventions of employee absenteeism, International journal of scientific and research publications 5(6), 2015. 10. Shikka Verma and Chaubey, “Identifying the factors leading to workplace absenteeism and its effects on occupational stress and job satisfaction: An empirical study”, International Journal of organizational behavior and management perspectives (5) 2 2340-2345, 2016. Authors: Esther Zionia.A, Sathyapriya.J

Paper Title: Employee Engagement as a Rhizome for Talent Retention Abstract: In this modernized era, every country competes with one another in their economic growth. In the phase of developing economic growth, IT/ITES Sector plays a major role. In a country every organization battle with one another to acquire talented employees and retain them. Retaining talented employees become a threat to every organization. Employee engagement is a unique approach to obtain the result of retaining talented employees. In order to be in the number one position, every organization needs support from talented employees who help in brightening the organization. Nowadays unsatisfied talented employees are ready to migrate from one organization to another organization where all the organization is ready to acquire them. This research paper, therefore, identifies the role of employee engagement in Talent Retention at organizations and identifies the relationship between employee engagement and talent retention. To find out the impact of employee engagement on talent retention, Multiple Regression were used and to identify the major programs/activities furnish by employers to retain a talented employee with particular reference to Coimbatore using descriptive survey research design. The research hypothesis was tested using Statistical tools such as Correlation, Multiple Regression, and Weighted Mean Average. 116 respondents were analyzed using a Systematic Random sampling method. The findings revealed that there is a relationship between employee engagement and talent retention. Once employee engagement is good there is a chance of retaining talented employees. Some of the top programs or activities are offered by employers to retain their talented employees are Social Activities, Celebrations, Flexible work schedule, Career planning discussion, Community Outreach program, Team Building Activities, Communication Activities, Orientation Program and Learning & Skill Enhancement program Hence it is proved that organizational climates drive the talented employees to remain in the organization.

161. Keyword: Correlation, Employee Engagement, Multiple Regression, Talent Retention 860-

References: 864 1. Buckingham, M., & Coffman, C. “First, break all the rules”. New York: Simon & Schuster, 1999. 2. Childs, Julian.H & Stoeber, Joachim. “Self Oriented, Other-Oriented and Socially Prescribed Perfectionism in Employees: Relationships with Burnout and Engagement”. Journal of Workplace Behavioral Health. Vol. 25(4). Pg: 269-281, 2010. 3. Harter, J.K., Schmidt, F.L. and Hayes, T.L. “Business-unit-level relationship between employee satisfaction, employee engagement, and business outcomes: a meta-analysis”. Journal of Applied Psychology, 87. Pg: 268-79, 2012 4. Jyotsna. “Talent management strategy of employee engagement in Indian ITES employees: key to retention”. International Journal.Volume:16. Pg:234-345. 2007 5. Konrad, A. M. “Engaging employees through high involvement work practices”. Ivey Business Journal Online. Pg: 1-6, 2006. 6. Knippenberg,B.V et al., Process Orientation versus Outcome-Orientation during Organizational Change: The Role of Organizational Identification. Journal of Organizational. Vol. 27. Pg.: 685-704, 2006. 7. Lockwood, N. R. “Leveraging employee engagement for competitive advantage: HR’s strategic role”. SHRM Research Quarterly, 2007. 8. Mamta & R.Baldev. “Study of Employee Engagement and its Predictors in an Indian Sector”. Journal of Service Marketing. Vol. 25(7). Pg: 201, 2011. 9. Otken, A.B & Erben, G.S. “Investigating the Relationship Between Organizational Identification and Work Engagement and the Role of Supervisor Support”. Journal of Economics & Administrative Sciences. Vol. 12(2). Pg:93-118, 2010. 10. Preeti Thakur. “A Research Paper on the Effect of Employee Engagement on Job Satisfaction in IT Sector”. Journal of Business Managament & Social Sciences Research. Volume 3(5). ISSN:2319-5614, 2014. 11. Robinson, D. Perryman S., and Hayday, S. “The Drivers of Employee Engagement”. Institute for Employment Studies, 2004. 12. Sanford, B. Building a highly engaged workforce: How great managers inspire virtuoso performance. The Gallup Management Journal, 2003. 13. Seigts, G. H., & Crim, D. “What engages employees the most or, the ten c’s of employee engagement”. Ivey Business Journal, 2006. 14. Suhasini and Kalpana.k. “A Study on Factors Affecting Employee Engagement in Indian IT Industry”. International Journal of Pure and Applied Mathematics. Vol 118(24). ISSN:1314 – 3395, 2018. 15. Tarique, I., & Schuler, R. S. “Global talent management: Literature review, integrative framework, and suggestions for further research”. Journal of World Business, 45. Pg: 122-133. doi:10.1016/j.jwb.2009.09.019, 2010. 16. , B & Renugadevi, V. “Employee Engagement Practices in Indian BPO Industries-An Empirical Investigation”. Interdisciplinary Journal of Contemporary Research in Business. Vol.2( 10). Pg: 134-141, 2011. 17. Victor et al., “The effective design of work under total quality management”. Organization Science.Vol-11. Pg: 1, 2000.

Authors: Thamilvanan G, Thavasumani S Job Satisfaction and Occupational Stress on Medical Representatives in Trichy and Tanjore Districts Paper Title: of Tamil Nadu Abstract: Key objective of the study is to analyse interrelation among Job satisfaction and Occupational Stress of Medical representatives in Trichy and Tanjore districts of Tamilnadu. The variables of the analysed by this study are Dependent variable- Job Satisfaction, Independent variable - Occupational Stress and Attributable variable -Year of Experience and co-workers. Medical representatives play a major role in profits and awareness for the concern industry in a short duration to achieve a target of corporate nevertheless to grieved with more physical and mental stress. Occupational stress index was given to assess the stress levels and job satisfaction scale were given to assess the satisfaction level. The correlation analysis revealed the important negative correlation amongst job satisfaction and occupational stress. This indicates that occupational stress basically dependent on job satisfaction. Henceforth, this study proposes to frame the parameters of human resource strategy by the organisation or industry on job satisfaction of medical representatives will help to reduce their occupational stress.

Keyword: job satisfaction, Medical Representative, Occupational Stress, Stress.

References: 1. Ahsan, N, “A study og job stress on job satisfaction among university staff in malaysia empirical study”, European journal of social science , volume 8, Number 1, 2009. 2. Akthak, G, “An Overview on Indian pharmaceutical Industry”, IORS journal humanities and Social science , 2015. 3. Alireza, K. A., “Sress and job satisfaction among Air Force Military Pilots”, Journal of Social Science , 159-163. 4. Anbhuti Monga, V. M., “Organizational culture,Stress and Commitment:A study of Pharmaceutical managers in Himachal pradesh”, Open Access Journal 5, 2013. 5. Antoniou, A.S.G., Davidson, M.J., & Cooper, C.L., “Occupational stress, job satisfaction and health state in male and female junior hospital doctors in Greece”, Journal of Managerial Psychology, 18(6),2003, pp. 592- 621 6. Arafat, S, “A study on Job Statisfaction among Medical Representatives in Bangaladesh. Australion Journal of Business and Management , 05, No.2, 2015. 7. Banks, M.H., Clegg, C.W., Jackson, P.R., Kemp, N.J., Stafford, E.M. and Wall, T.D., “The use of the General Health Questionnaire as an indicator of mental health in occupational studies”, Journal of Occupational Psychology, 53, 1980, pp. 187-194 8. Barling, J, “Employment, Stress, and Family Functioning”, New York: Wiley, 1990. 162. 9. Baruch, Y., and Hind, P, “Perpetual motion in organisations: Effective management and the impact of the new psychological contracts on "Survivor Syndrome", European Journal of Work and Organisational Psychology, 8 (2), 1999, pp.295-306. 10. Bass, Barnard M, and Barret, Gerald V. Man, Work and Organisations: Introduction to Industrial and Organisational Psychology, Allyn 865- and Bacon, Boston, 1972. 868 11. Beaton, R., Murphy, S., and Pike, K, “Symptoms of stress in male and female firefighters/paramedics. In Proceedings of the National Institute of Occupational Safety and Health Conference - Stress in the 90s: A Changing Workforce in a Changing Workplace”, Washington: NIOSH, 1992. 12. Beck, A, “Cognitive Approaches to Stress”, Principles and Practices of Stress Management, 1984, 91-110. New York: Guilford Press 13. Beer, M., Eisenstat, R. A., and Spector, B, “The Critical Path for Corporate Renewal”, Harvard: Harvard Business School Press, 1990. 14. Beer, M., Spector, B., Lawrence, P., Mills, D.Q., and Walton, E, Human Resource Management: A General Manager's Perspective - Text and cases. New York The Free Press, 1985. 15. Belous, R, “The shift towards contingent workers”, Monthly Labour Review, 112(3), 1998, pp.7-12. 16. Berliner, W and M C Larney, Managemnet Practice and Training, Homewood. 1974. 17. Berridge, J., Cooper, C.L., and Highley-Marchington, C, Employee assistance programs and workplace counselling. New York: Wiley, 1997 18. Beugre, C. D, “Perceived Injustice and Workplace Aggression: The Role of Cognition – Philadelphia”, Kent State University, 1999. 19. Biersner, R., “Developing an occupational stress standard: Rule-making pitfalls. In L. Murphy and J Hurrell and S. Sauter and G. Keita (Eds.). Job Stress Interventions”, Washington, DC: American Psychological Association, 1995. 20. Black, James, M., Positive Disciplien, American Management Association, 1970. 21. Breznitz, S. and Goldberger, L., “Stress research at a crossroads. In L. Goldbergerand S. Breznitz, (Eds.). Handbook of stress: Theoretical and clinical aspects, (2nd Ed), (pp.3-6). New York: The Free Press, 1993. 22. Brief, A.P., Burke, M.J., George, J.M., Robinson, B.S., and Webster, J., “Should negative affectivity remain an unmeasured variable in the study of job stress?”, Journal of Applied Psychology, 73, 1982, pp. 193-199. 23. British Insitute of Management, Job Evaluation: A Practical Guide for Managers, 1970. 24. Brown, G.W, “Life event and affective disorder: Replications”, Psychosomatic Medicine, 55, 1993, 248-259. 25. Browne, J.H, “Benchmarking HRM practices in health work organizations”, American Business Review, 18 (2), 2000, pp. 50-61. 26. Bruce, W.M, “Problem Employee Management: Proactive Strategies for Human Resource Managers”, New York: Quorum Books, 1990. 27. Bull, H, “Stress - fact or fiction: The assessment and management of Workers' Compensation claims for stress: A Commonwealth perspective” Proceedings of the National Institute of Occupational Safety and Health Conference - Stress in the 90s: A Changing Workforce in a Changing Workplace. Washington: NIOSH, 1996. 28. Cameron, K., and Smart, J, “Maintaining effectiveness amid downsizing and decline in institutions of higher education”, Research in Higher Education, 39, 1998, pp. 65-86. 29. Cartwright, S., Cooper, C.L., and Murphy, L, Diagnosing a healthy organisation: A proactive approach to stress in the workplace. In L Murphy and J. Hurrell and S. Sauter and G Keita (Eds.), Job Stress Interventions. Washington, DC: American Psychological Association, 1995. 30. Cascio, W.F, Wither industrial and organisational psychology in a changing world? American Psychologist, 50, 1995, pp. 928-939. 31. Cavanaugh, M.A., and Roehling, M.V., and Boswell, W.R., and Boudreau, J.W, An Investigation of 'Challenge' and 'Hinderance' Related Stress Among Managers. Ithaca: School of Industrial and Labour Relations, 1999. 163. Authors: M.John Paul, S. Muthumani Paper Title: Relationship Management is a Pattern of Screening Core Values in Indian Banking System Abstract: In the historical backdrop of Indian financial framework, the most recent decade has transformed into the distinctive bearing towards innovative headway and current platform with the assistance of data innovation that manage the whole universal and assuming as a job of expert in any sort of field that is help us to complete the task simple and adaptable. Presently multi periods everything the enterprises predominantly the business of finance endures and achieving the way of accomplishment by receiving improved innovations and programming to contend the investors in their field. The present knowledge innovation has turned into different direction in every trade as savvy and quick available worry with greatness on the task. Nobody could get the better outcome beyond its assistance of innovation at the industry of bank primarily on Management of customer relationship. Utilization of apparatuses and methods like Management of customer relationship, had somewhat developed at every segment in banks and they expanded any desire for speculators, clients and government which is fundamentally used to augment the budgetary soundness. This examination is essentially center the technique for banking exchange in the wake of executing the CRM idea and how it's influencing development of budgetary soundness of a bank in India.

Keyword: Indian Banking system, Relationship management, Customer Loyalty and core values.

869- References: 1. Dr.M.Siva Subramanian, Challenges of Changes in Indian banking system, Dec 2009, Vol.26 No.2, pp.73-77, National Journal, ISSN 872 0971-8508. 2. Dr.Thangavelu, “A Report on modern practices in banks”, Vol: 3, Issue: 15, May 2010 pp.152-159,, National Journal. 3. Dr. S. S. Rau, A Study on awareness and adaptability of Economic Value Added concept in Indian Banking Sector, Feb 2010, Vol. 4, No. 2, National Journal, ISSN: 0973-8711, pp.16-23. 4. Dr. S. Muthumani, CRM in financial service in industry, 2010, SNS journal of marketing,. 5. Mrs. T R Kalailakshmi, Impression of marketing mix on relationship marketing practices , Vol. 2, No.2, pp.43-47, 2011, National Journal. 6. Ms.Meenakumari, A study on marketing problems faced by Self Help Groups in promoting Handicraft and Handloom products, 1/29/July-Dec2012, National Journal. 7. Ganesh, Corporate social responsibility in indian automobile industry, Vol- 2 (6) april 2012, National 8. .Mr.Govindarajan, Corporate economic value added analysis on Public sector under taking : a case study On neyveli lignite corporation limited, Vol 2 Issue 9 March 2013, National Journal. 9. Ms.Rani J.,A Study on Consumers Possession, Purchase and usage of Washing Machines in Chennai, Accepted yet to publish. National Journal. 10. Mrs.A.Chemmalr, The Role of Total Quality Management in maximizing the quality of CRM in Indian retail market – A study. Vol: 2, Issue: 1, March 2015, AIJBSR, ISSN NO: 0975-749X.pp.112-120. GLOBAL IMPCAT FACTOR: 0.277. 11. . IDC (2004) worldwide customer relationship management applications market expected to surpass $11 billion by 2008, according to IDC. IDC. Retrieved 3 August, 2004, from http://www.idcresearch.com/getdoc.jsp?containerId=pr2004_07_26_122025. 12. Day, G. S., 1994. The capabilities of market-driven organizations. Journal of Marketing, 58 (4), 37-52 Authors: Kamal Mistry, Prathamesh Churi

Paper Title: Development of Innovative Course Outcomes : using S.M.A.R.T. Goals Abstract: Build layer of OBEE architecture forms an innovative way to towards development of course outcomes from lesson outcomes [4]. The process of development of course outcomes is crucial and time- consuming without appropriate guidance and support. This paper, therefore, provides guidelines /rules towards the development of outcomes according to the OBEE architecture. The paper also suggests a sample Course outcomes taking one engineering course as a case study. The phenomenon of making course outcome is based on a SMART approach. The process also suggests that we should involve industry domain experts and Alumni students which give a proper academic and practically oriented shape to the documented course outcomes. As a result, the entire OBEE process becomes smoother and functional in the entire semester. The above research is validated by implementing the revised methodology in the course Data Structures and Algorithms (DSA). The research outperforms the in results by Course Outcome attainment analysis. Keyword: Course Outcomes, CO, OBEE, SMART References: 164. 1. Alfie Kohn, "It’s Not What We Teach; It’s What They Learn", Website: http://www.alfiekohn.org/article/teach-learn/ , Last Accessed: January 16, 2017 873- 2. Pears, "Assuring the Quality of Engineering Education," 2015 International Conference on Learning and Teaching in Computing and Engineering, Taipei, 2015, pp. 108-111. 879 3. Huitt, William. "Bloom et al.'s taxonomy of the cognitive domain." Educational psychology interactive 22 (2004). 4. Churi, P., Mistry, K., Dhruv, A., & Wagh, S. (2016, December). Alchemizing Education System by Developing 5 Layered Outcome Based Engineering Education (OBEE) Model. In 2016 IEEE 4th International Conference on MOOCs, Innovation, and Technology in Education (MITE) (pp. 338-345). IEEE.. 5. SMART targets in project management, website: http://www.contentextra.com/eet/files/topicguides/topic-guide34.2smart-targets-in- project-management.pdf , Last accessed: August 14, 2016 6. Abidin, I. Z., Anuar, A., & Shuaib, N. H. (2009). Assessing the attainment of course outcomes (CO) for an engineering course. In International Conference of Teaching and Learning (ICTL 2009) INTI University College, Malaysia. 7. Farnier, M., Volpe, M., Massaad, R., Davies, M. J., & Allen, C. (2005). Effect of co-administering ezetimibe with on-going simvastatin treatment on LDL-C goal attainment in hypercholesterolemic patients with coronary heart disease. International journal of cardiology, 102(2), 327-332. 8. Harp, G. D., Miller, J. M., & Berne, B. J. (1968). Attainment of statistical equilibrium in excited nuclei. Physical Review, 165(4), 1166. 9. Enderlin, K. J. (1993). Student achievement, attitudes, and thinking skill attainment in an integrated science/agriculture course. 10. Krathwohl, D. R. (2002). A revision of Bloom's taxonomy: An overview. Theory into practice, 41(4), 212-218. 11. Churches, A. (2008). Bloom's taxonomy blooms digitally. Tech & Learning, 1, 1-6. 12. Stone, S. L., & Qualters, D. M. (1998). Course-based assessment: implementing outcome assessment in medical education. Academic medicine: journal of the Association of American Medical Colleges, 73(4), 397-401. 13. Spady, W. G. (1994). Outcome-Based Education: Critical Issues and Answers. American Association of School Administrators, 1801 North Moore Street, Arlington, VA 22209 (Stock No. 21-00488; $18.95 plus postage). 14. Harden, R. M. (1999). AMEE Guide No. 14: Outcome-based education: Part 1-An introduction to outcome-based education. Medical Teacher, 21(1), 7-14. 15. Felder, R. M., & Brent, R. (2003). Designing and teaching courses to satisfy the ABET engineering criteria. Journal of Engineering Education, 92(1), 7-25. 16. Diamond, R. M. (2011). Designing and assessing courses and curricula: A practical guide. John Wiley & Sons. 17. Qualters, D. M., Sheahan, T. C., Mason, E. J., Navick, D. S., & Dixon, M. (2008). Improving Learning in First‐Year Engineering Courses through Interdisciplinary Collaborative Assessment. Journal of Engineering Education, 97(1), 37-45. 18. Davis, D., Beyerlein, S., Thompson, P., Gentili, K., & McKenzie, L. (2003, June). How universal are capstone design course outcomes?. In Proc. 2003 Am. Soc. Eng. Educ. Ann. Conf. & Exposition (pp. 22-25). Washington^ EDC DC: American Society for Engineering Education. 19. Gültekin, M. (2005). The Effect of Project Based Learning on Learning Outcomes in the 5th Grade Social Studies Course in Primary Education. Educational Sciences: Theory & Practice, 5(2). 20. Drew, S. (1998). Students' perceptions of their learning outcomes. Teaching in Higher Education, 3(2), 197-217. 21. Eaton, J. S. (2006). An overview of US accreditation. Council for Higher Education Accreditation. 22. Ng, K. B., Leung, G. K., Johnston, J. M., & Cowling, B. J. (2013). Factors affecting the implementation of accreditation programs and the impact of the accreditation process on quality improvement in hospitals: a SWOT analysis. Hong Kong Medical Journal. 23. Patil, A., & Codner, G. (2007). Accreditation of engineering education: review, observations, and proposal for global accreditation. European journal of engineering education, 32(6), 639-651. 24. Jantzen, R. H. (2000). AACSB mission-linked standards: Effects on the accreditation process. Journal of Education for Business, 75(6), 343-347. Authors: Arvinda kushwaha, Mohd Amjad

Paper Title: Enhancement of the QoS Parameter of LEACH Protocol using Modified K -Means Algorithm Abstract: Wireless Sensor Network (WSN) is a collection of battery operated sensors deployed in the monitoring area. A massive quantity of energy of the nodes is used in the internal and external communications. There is a need of energy saving mechanism for effective and efficient communication. In this paper, we propose a new Modified-LEACH (MD-LEACH) protocol for enhancing the Quality of Services (QoS) parameters. This hierarchical routing protocol (MD-LEACH) is inspired by the k-means clustering technique to consolidate sensor networks into clusters and acquire an enhanced QoS parameter. The k-means algorithm efforts to improve the clustering procedure of LEACH protocol using Euclidean distance and prolong the lifespan of the sensor network. This algorithm forms the optimized clusters by a distance of cluster head from cluster nodes and energy of the nodes for designated the cluster heads. To evaluate the performance of the proposed approach, we used NS-2 simulator, and consider the QoS parameter, namely: packet delivery ratio, energy consumption, bandwidth, and throughput. The simulations results show that the MD-LEACH algorithm outperforms then the LEACH protocol by optimizing all QoS parameters and improved network performance.

Keyword: cluster head-means algorithm, LEACH, MD-LEACH, QoS, and WSN. References: 1. Heinzelman, W.R., Chandrakasan, A., & Balakrishnan, H., (2000). Energy-Efficient Communication Protocol for Wireless Microsensor Networks. Proceedings of the 33rd Hawaii International Conference on System Sciences, pp. . 2. Sonagara, D., & Badheka, S., (2014). Comparison of Basic Clustering Algorithms. International Journal of Computer Science and Mobile Computing, 3(10), 58-61. 165. 3. Mechta, D., Harous, S., Alem, I., Khebbab, D., (2014). LEACH-CKM: Low Energy Adaptive Clustering Hierarchy protocol with K- means and MTE," Proc.Int. Conf. INNOVATIONS, pp. 99-103. 880- 4. Rabiaa, Elkamel, Baccar Noura, and Cherif Adnene. "Improvements in LEACH based on K-means and Gauss algorithms," Procedia Computer Science, vol.73, pp 460-467, 2015 885 5. Park, G. Y., Kim, H., Jeong, H. W. and Youn, H.Y. (2013). A Novel Cluster Head Selection Method based on K-Means Algorithm for Energy Efficient Wireless Sensor Network. 27th International Conference on Advanced Information Networking and Applications Workshops, pp. 910-915. 6. Kaur, P., & Bhardwaj, V. (2015). K-Means based General Self-Organized Tree-Based Energy Balancing Routing Protocol for Wireless Sensor Networks. International Journal of Computer Science and Information Technologies (IJCSIT), 6(4), 3457-3464. 7. Park, G. Y., Kim, H., Jeong, H. W. & Youn, H.Y. (2013). A Novel Cluster Head Selection Method based on K-Means Algorithm for Energy Efficient Wireless Sensor Network. 27th International Conference on Advanced Information Networking and Applications Workshops, pp. 910-915. 8. Park, G.Y., Kim, H., Jeong, H.W., & Youn, Y.H., (2013). A Novel Cluster Head Selection Method based on K-Means Algorithm for Energy Efficient Wireless Sensor Network. 27th International Conference on Advanced Information Networking and Applications Workshops, pp. 910-915. 9. Bholowalia, P., & Kumar, A., (2014). EBK-Means: A Clustering Technique based on Elbow Method and K-Means in WSN International Journal of Computer Applications. 105(9), pp. 17-24. 10. Echoukairi, H., Bouragba,K., & Ouzzif, M., (2015). Evaluation and Comparative Study Routing of Wireless Sensor Networks Hierarchical Protocols. Proceedings of the WCCS’15, pp. 235-339. 11. Heinzelman, W., Chandrakasan, A., & Balakrishnan, H., (2002). Application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), pp. 660-670. 12. Singh, S., Chand, S., & Kumar, B., (2017). Multilevel heterogeneous network model for wireless sensor networks. Telecommunication Systems, 64(2), 259-277. 13. ZHANG, Lili et SOONG, Boon-Hee. Energy efficiency analysis of channel-aware geographic-informed forwarding (CAGIF) for wireless sensor networks. IEEE Transactions on Wireless Communications, vol. 7, no 6, p. 2033-2038, 2008. 14. Heinzelman, W. B., (2000). Application-Specific Protocol Architectures for Wireless Networks, Microsystems Technology Laboratories, Massachusetts Institute of Technology, Cambridge, MA, USA. 15. Loscri, V., Morabito, G., & Marano, S., (2005). A two-level hierarchy for low-energy adaptive clustering hierarchy (TL-LEACH),” in VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, pp.1809–1813. 16. Singh, S., Chand, S., & Kumar, B., (2016). Energy efficient clustering protocol using fuzzy logic for heterogeneous WSNs. Wireless Personal Communications, 86 (2), 451-475. 17. Mehmood, A., Lloret, J., Noman, M., and Song, H., (2015). Improvement of the wireless sensor network lifetime using LEACH with vice-cluster head. Adhoc & Sensor Wireless Networks, 28(1), 1–17. 18. Chen, J., Li, Z., & Kuo, Y. H., (2013). A centralized balance clustering routing protocol for a wireless sensor network," Wireless Personal Communications, 72(1), pp. 623–634. 19. Pachlor R., & Shrimankar, D., (2017). EEHCCP: an energy-efficient hybrid clustering communication protocol for a wireless sensor network. in 9th EAI International Conference on Ad Hoc Networks, Niagara Falls, Canada, 36-41. 20. Chand, S., Singh, S. & Kumar, B., (2014) Heterogeneous HEED Protocol for Wireless Sensor Networks. Wireless Pers Commun 77(13): 2117-2139. 21. Ye, M., Li, C., Chen, G., & Wu, J. (2005). EECS: an energy efficient clustering scheme in wireless sensor networks. in PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, pp. 535–540. 22. Singh, S., Chauhan, A.K., Raghav, S., Tyagi, V., & Johari, S., (2011) Heterogeneous protocols for increasing lifetime of wireless sensor networks. Journal of Global Research in Computer Science, 2(4), 172-176. 23. Singh, S., (2017). Energy efficient multilevel network model for heterogeneous WSNs. Engineering Science and Technology, an International Journal, 20(1), 105-115. 24. Singh, S., Chand, S., & Kumar, B., (2013). 3-Tier heterogeneous network model for increasing lifetime in three dimensional WSNs. International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, pp. 238-247. 25. Singh, S., & Sharma, AK., (2013). Distributed Algorithms for Maximizing Lifetime of WSNs with Heterogeneity and Adjustable Sensing Range for Different Deployment Strategies. International Journal of Information Technology and Computer Science, 5, 101- 108. Authors: Vijay Yadav, VibhashYadav, Raghuraj Singh

Paper Title: Automated Estimation of Predictive Object Points Metric Values for Object-Oriented code Abstract: If we are to improve the OO software quality we develop, we must measure our designs by well- defined standards. Possible problems in our system designs can be detected during the development process. If we are to estimate and manage our efforts, we must measure our progress effectively. An object-oriented coding scheme is, in some ways, incompatible with ancient metrics. To measure the size of software system, a variety of techniques for code development estimation exist like SLOC and Function Point, SLOC, as a metric has a number of drawbacks one is SLOC, is not consistent across languages, applications, or developing environments, however, it cannot applied on object-oriented code. The efforts required to develop the code is being calculated using the Predictive Object Point (POP) metric. This counting technique is supported by the Function Point Technique. This paper address the way of effort calculation for object oriented code using POP. To measure the POP accurately, an automated tool has been developed and designed. The results of the tools has also been discussed in the paper.

Keyword: Code Estimation Technique, Software Tools, System Metric Tools, Object-Oriented Metrics, Predictive Object Point Metric, Automation, and improvement.

References: 1. Alain Abran, Software Metrics and Software Meterology, IEEE Computer Society: A John Wiley & Sons, INC., Publications, 2010. 2. A. Abran and J. P. Jacquet, "From Software Metrics to Software Measurement Methods: A Process Model", 3rd Int. Standard Symposium and Forum on Software Engineering Standards (ISESS'97), Walnut Creek, USA, 1997. 3. Arlene F. Minkiewicz.(1997), "Object-Oriented Metrics" Software Development. Wiley Computer Publishing, pp. 43-50. Available: 166. http://www.sdmagazine.com. 4. Arelen F. Minkiewicz, "Measuring Object-Oriented Software with Predictive Object Points", Project Control for Software Quality, A. C. 886- Rob Kusters, Fred Heemstra and Erik van Veenendaal, Ed.: Shaker Publishing, 1999. 5. B Boehm, C Abts, and S Chulani, ”Software Development Cost Estimation Approaches - A Survey, Technical Report USC -CSE-2000- 891 505”, University of Southern California - Center for Software Engineering, USA., 2000. 6. C. Ravindranath Pandian, "Software Metrics: A Guide to Planning, Analysis, and application". Auerbach Publications A CRC Press Company, Boca Raton London New York Washington, D.C, 2005. 7. Dr. Rakesh Kumar and Gurvinder Kaur, "Article: Comparing Complexity in Accordance with Object-Oriented Metrics". International Journal of Computer Applications, vol.15(8), pp. 42–45, Feb. 2011 8. Goodman. P., (2004).Software Metrics: Best Practices for Successful IT Management, Rothstein Associates Inc., Publisher, Available: www.rothstein.com. 9. Haugh. M, E. W Olsen, and Bergman. L,“Software Process Improvement: Metrics Measurement and Process Modelling”,Springer, vol. 4, New York, pp. 159-170, 2001. 10. Mark Lorenz.,"Object-Oriented Software Development: A Practical Guide" ., ISBN 0-13-1726928-5.,Prentice Hall Ptr Upper Saddle River, New Jersey 07458, 1993, 227 p. 11. Mark Lorenz and Jeff Kidd.,"Object-Oriented Software Metrics: A Practical Guide" ., ISBN 0-13-179292-X., Prentice Hall Englewood Cliffs, New Jersey 07632.,1994, 146 p. 12. M. Xenos and D. Stavrinoudis and K. Zikouli and D. Christodoulakis.,"Object-oriented metrics – a survey",Proceedings of the FESMA 2000, Federation of European Software Measurement Associations, Madrid, Spain, 2000. 13. Shubha Jain, Vijay Yadav, and Prof. Raghuraj Singh, "OO Estimation Through Automation of Predictive Objective Points Sizing Metric"., International Journal Of Computer Engineering and Technology (IJCET), vol. 4, (Issue 3), pp. 410-418, May- June. 2013. 14. Shubha Jain, Vijay Yadav, Prof. Raghuraj Singh., "A Simplified Formulation of Predictive Object Points(POP) Sizing Metric For OO Measurement". IACC 2014 4th IEEE International Advance Computing Conference, Part Number CFP1439F-CDR ISBN 978-1-4799- 2571-1, IEEE Computer Society, Gurgaon, India,Feb 21st-22nd, 2014. 15. Shyam R., Chidamber and Chris F. Kemerer,. "A Metrics Suite for Object-Oriented Design". IEEE Transactions On Software Engineering, vol. 20, No. 6,pp. 476-493, June. 1994. 16. T. R Judge, A. Williams, “OO Estimation – an Investigation of the Predictive Object Points (POP) Sizing Metric in an Industrial Setting”. Parallax Solutions Ltd, Coventry, UK.,2001. 17. Vijay Yadav, Dr. Vibhash Yadav, Prof. Raghuraj Singh., “Introducing New OOMetric For Simplification In Predictive Object Points (POP) Estimation Process In OO Environment”., International Journal Of Engineering Sciences & Research Technology (IJESRT), ISSN: 2277-9655 vol. 5 (Issue 1), , pp: (716-723),Jan. 2016 Impact Factor: 3.785, 18. Vijay Yadav, Dr. Vibhash Yadav, Prof. Raghuraj Singh.,(2016). “Identifying The Relationship Between Original And Refined POP Metric For OO Software”., International Journal Of Research Fellow For Engineering (IJRFE), ISSN: 2320-7396 vol. 4 (Issue 11), pp. 39- 46,Nov-2016 Available:www.ijrfe.com. 19. Vijay Yadav, Dr. Vibhash Yadav, Prof. Raghuraj Singh.,“An Automated Software Cost and Schedule Measurement Tool for OO System using Predictive Object Point Sizing Metrics”., International Journal Of Emerging Technologies & Innovative Research (IJETIR),ISSN: 2349-5162,UGC Approved, Impact Factor:5.87, Published in vol. 5 (Issue 2) , February-2018, pp. 1106-1111, Nov. 2016,Available: www.jetir.org. . 20. Vu Nguyen," Improved Size and Effort Estimation Models For Software Maintenance", Ph.D. Dissertation, University Of Southern California, 2010. Authors: Deepshikha Aggarwal

Paper Title: Mobile Technology Adoption by Indian Consumers Abstract: Mobile technology has penetrated into all sectors of business and personal communication. The mobile devices are not limited to communication but play a vital role as an emerging model for business. The companies are utilizing the mobile services to sell goods and services to the consumers. Facilities like mwallets have made the mobile commerce more successful. The aim of this paper is to understand the behavior of consumers with respect to mobile shopping and study the factors influencing the consumers while choosing mobile shopping. The study has been conducted for the shoppers in India. The data is collected with the help of a questionnaire designed keeping in mind the perspective of Indian consumers. The data analysis has been done using various statistical tools and results have been derived on how the various factors influence the behavioral intention of users to adopt mobile shopping. The technology acceptance model (TAM) has been used in the study as it is a popular approach to understand the user acceptance of technology. We have used the traditional factors of perceived usefulness, perceived ease of use and behavioral intention to use mobile shopping. We have also identifies and used certain external factors which may influence the user intention to choose mobile shopping. These are perceived enjoyment, perceived quality of service, technical skills of the user and privacy & security.

Keyword: Mobile shopping, Technology Acceptance Model (TAM), Mobile consumer behavior, mobile shopping intention, Data analysis. References: 1. N. Aharony, "Librarians’ attitudes towards mobile services," 2013. 2. Deloitte, "Global mobile consumer survey 2016: Trends from around the world," 2016. 167. 3. R. J.-h. Wang, "How mobile shopping affects customer purchase behavior," Journal of Retailing, 2015. 4. K. H. Y. K. Yang, "Mobile Shopping Motivation: An Application of Multiple Discriminant Analysis," International Journal of Retail 892- and Distribution Management, p. 778–789, 2012. 5. B. Tariq, "Exploring factors influencing the adoption of mobile commerce," Journal of Internet Banking and Commerce, 2007. 899 6. F. V. C. H. Davis, "Adoption and use of internet technologies and e-business solutions by Canadian micro-enterprises," in Annual Conference of the International Association for Management of Technology, Vienna, 2005. 7. A. B. J. R. A. Holmes, "Mobile shopping behaviour: Insights into attitudes, shopping process involvement and location," International Journal of Retail & Distribution Management, pp. 25-39, 2014. 8. S. N. B. R. W. M. H. Fagan, "An empirical investigation into the relationship between computer self-efficacy, anxiety, experience, support and usage," Journal of Computer Information Systems, pp. 95-104, 2003. 9. K. Yang, "Determinants of US Consumer Mobile Shopping Services," Journal, p. 262–270, 2010. 10. G. M. A. C. K. O. S. A. T. Wei, "What drives Malaysian m-commerce adoption? An empirical analysis," Industrial Management & Data Systems, pp. 370-388, 2009. 11. M. K. L. A. P. Brinker, "The Dawn of Mobile Influence – Discovering the Value of Mobile in Retail," Deloitte Digital, 2014. 12. V. A. V. C. H. P. N. Shankar, "Mobile Marketing in the Retailing Environment: Current Insights," Journal of Interactive Marketing, 2010. 13. R. B. P. W. F. Davis, "Extrinsic and intrinsic motivation to use computers in the workplace," Journal of Applied Social Psychology, pp. 1111- 1132, 1992. 14. A. M. T. Z. M. V. Vaggelis Saprikis, "Mobile Shopping Consumers' Behavior: An Exploratory Study and Review," Journal of theoretical and applied electronic commerce research, 2018. 15. V. J. Y. T. X. X. Venkatesh, "Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology," MIS Quarterly, p. 156–178, 2012. 16. V. Y. H. Eraay Celik, "Extending the Technology Acceptance Model for adoption of E-Shopping by Consumers in Turkey," Journal of Electronic Commerce Research, 2011. 17. W. Al-Ghaith, "Applying The Technology Acceptance Model To Understand Social Networking Sites (Sns) Usage: Impact Of Perceived Social Capital," International Journal of Computer Science & Information Technology (IJCSIT) , 2015. 18. D. Davis, "Perceived usefulness, perceived ease of use and user acceptance of information technology," MIS Quarterly, pp. 319-340, 1989. 19. Stephanie, 11 May 2016. [Online]. Available: https://www.statisticshowto.datasciencecentral.com/kaiser-meyer-olkin/. Authors: Shubham Aggarwal, Anubhav Bose, Ritu Gupta

Paper Title: Digitalization of Street Hawker and Vendor Services Abstract: Since the marketplace is far from the residential colonies, people prefer to buy goods from street 168. hawkers and local vendors due to easy availability. However due to absence of any proper system, there are problems faced by the customers, hawkers as well as the general public. There are several problems that are caused 900- by Street hawkers and vendors in terms of traffic jams and occupying public spaces such as footpaths, pavements, 905 etc. Improper way of disposing food waste and garbage by hawkers is another issue. They cause congestion on the roads. However, the vendors and hawkers also face a lot of problems and are harassed by the customers and the city authorities such as The Municipal Corporation, Police, etc. which leads to exploitation and extortion. They also have a right to earn their livelihood in a respectable manner. In order to resolve this problem, we intend to develop an android application ‘Vendiz’ which will lead to a proper digital system and interaction between customers and the street hawkers and vendors and help the customers to navigate through the available items at different vendors via the application.

Keyword: street hawkers, vendors, customers, digitalization, application.

References: 1. Sharit K. Bhowmik and Debdulal Saha, “Street Vending in Ten Cities in India” For National Association of Street Vendors of India, Delhi, June 2012 2. M. Suresh, George J., “Study of the Lighting Sources of Street Vendors in Kerala and Their Willingness to Switch to Solar Lanterns.” 3. Prof. Dr. Arvind Chaudhari “Changing paradox of street vendors and vendor zones in India”, Volume 5, Issue 12, December (2014), pp. 90-98, International journal of management. 4. S.K.Bhowmik, “Street Vendors in Asia: A review,” Economic and political weekly, 2005. 5. R N Sharma “Politics of urban space”. 6. Holzer, A. & J. Ondrus. "Mobile application market: A developer’s perspective." Telematics and Informatics, 2011, 28: 22-31. 7. Tuomas Tanskanen, Anne-Marie Tuikka, Sami Hyrynsalmi, Kai K. Kimppa, “The Potential Development Impact of Mobile Application Vendors in Developing Countries”. 2015 IEEE International Symposium on Technology in Society (ISTAS) 8. Sharit K. Bhowmik., “Urban Responses to Street Trading: India”, Hawkers in the Urban Informal Sector: A study of street vendors in six cities, National Alliance of Street Vendors of India. 9. B. Balasubramanian, Dr. R. Srinivasan, Dr.S. Vaidhyasubramaniam,” Women in Informal Sector: A case of Women Street Vendors in Thanjavur, Tamil Nadu”, 2012 (ICMIEE). 10. Nasibu Mramba, Professor Erkki Sutinen, Dr. Michael Haule, Dr. Peter Msami” Survey of mobile phone usage patterns among street vendors in dar es salaam city-Tanzania”, ISSN 2304-0777, Vol.28 No.1, International Journal of Information Technology and Business Management 11. Nasibu Mramba, Mikko Apiola, Erkki Sutinen, Michael Haule, Tina Klomsri, and Peter "Empowering Street Vendors through Technology: An Explorative Study in Dar es Salaam, Tanzania". 12. Keerthana S. and Suresh M. “Drivers Influencing Lean Practices in Street Food Vending Process”, 978-1-5090-0612-0/16/$31.00 ©2016IEEE. Authors: Deepti Sharma, Amisha Gupta

Paper Title: Regression Examination of Factors Influencing the Chatbots usage in Banking Industry of India Abstract: This research investigate the factors influencing the usage of chatbot in banking industry of India. The author used regression analysis to determine and understand the factors influencing the acceptance, usage and adoption of chatbots in banking industry. Data is collected through Primary survey. 100 people were targeted, out of which 72 responded. Once the data is collected in order to check the reliability and validity of data Cronbach Alpha test is performed. The study concludes a significant impact of accessibility on adoption of chatbots. As part of the conclusion author made some suggestions and recommendations discussing the implementation of chatbots in the banking industry of India.

Keyword: attitude, chatbots, regression, cronbach alpha test, statistical analysis, descriptive analysis.

169. References: 1. Accenture, At Your Service: Embracing the Disruptive Power of Chatbots, Dublin: Accenture, 2017. 906- 2. S A. kader, J Woods, Survey on Chatbot Design Techniques in Speech Conversation Systems, IJACSA International Journal of 908 Advanced Computer Science and Applications, 6, 72-•80, 2015. 3. Peter Brandtzaeg, &AsbjørnFølstad, Why people use chatbots, 2017. 4. BI Intelligence, 80% of businesses want chatbots by 2020, 2016. 5. Debecker, Discovering the Types of Chat Bots, 2017. 6. E Candela, Consumers’ perception and attitude towards chatbots’ adoption. A focus on the Italian market, 2018. 7. E. Kurilchik, Chat bots as a digital marketing tool, 2017. 8. Gartner, Making Live Chat a Must-Have Engagement Channel, 2017. 9. Oracle, Can Virtual Experiences Replace Reality? Redwood Shores: Oracle Corporation, 2016. 10. B. Shawar, & E. Atwell, Chatbots: are They really useful? LDV Forum, 22, 29-•49, 2007. 11. International Journal of Civil Engineering and Technology (IJCIET), Volume 10, Issue 04, April 2019, pp. 1270-1281, Article ID: IJCIET_10_04_ 12. R. Richad, V. Vivensius, S. Sfenrianto and Emil R. Kaburuan, Analysis of factors influencing millennial’s technology acceptance of Chabot in the banking industry in Indonesia, 2018 13. Mike Train , Chabot’s Have Taken Over Banking, So Now What?, 14. Bob Legture ,Prediction,Personatics , 2019 Authors: Shomitro Kumar Ghosh, Md. Toheen Bhuiyan, Md. Ismail Jabiullah

Paper Title: A Steganographic Apps-based Patient’s Information Encryption-Decryption Abstract: A steganographic apps-based patient’s information communication system has been designed, developed and implemented in Java programming language that can hide patient confidential data in an image. The 170. Playfair cipher encryption-decryption technique with a set of keywords has been used in this transaction system. For this, the patient’s information is first encrypted with the Playfair encryption technique and produces the cipher 909- text that are embedded with an image in a hidden format and then the image is sent to the destination. In the 912 receiving end, the encrypted hidden information is extracted and retrieve the information by using the reverse process. The process has been applied on several patient’s information and steganographic images and found the results successfully. This proposed steganographic process is a higher layer of security methods in the communications and can be applied where high security is needed.

Keyword: Steganography, Playfair Cipher, Image Steganography, Secret Communication.

References: 1. Masoud Hariri, Ronak Karimi and Mehdi Nosrati, "An introduction to steganography methods", World Applied Programming, Vol. 1, No. 3, 2011, pp. 191-195. 2. Neil F. Johnson and Sushil Jajodia, "Exploring steganography: Seeing the Unseen", Computer, Vol. 31, No. 2, 1998, pp. 26-34. 3. Mrs. Nitya Khare and Dr. S. Veena Dhari, “A Survey on Playfair Cipher Encryption Technique” IJSRD-International Journal for Scientific Research & Amp; Development, Vol. 5, No.10, 2017, pp. 568-569. 4. Abbas Cheddad, Joan Condell and Paul Mc Kevitt, "Digital image steganography: Survey and Analysis of Current Methods", Signal Processing, Vol. 90, 2010, pp. 727-752. 5. Softonic. (2015) Xiao Steganography. {Online}. Available: https://xiao-steganography.en.softonic.com/ 6. Moudhi M. Aljamea, Costas S. Iliopulos and M. Samiruzzaman, “Detection of URL in Image Steganography”, Proceedings of the International Conference on Internet of things and Cloud Computing, 2016. 7. Ravindra Babu K, S. Uday Kumar, A. Vinay Babu, I.V.N.S Aditya and P. Komuraiah, “An Extension to Traditional Playfair Cryptographic Method”, International Journal of Computer Applications, Vol. 17, No. 5, 2011, pp. 34-36. 8. Safwat Hamad, “A Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data”, International Journal of Electrical and Computer Engineering, Vol. 4, No. 1, 2014, pp. 93-100. 9. Daphney Jerly Dsouza, Girish S, “A method of data hiding in QR code using image steganography”, International Journal of Advance Research, Ideas and Innovations in Technology, Vol. 4, 2018, pp. 1111-1113. 10. Subhajit Bhattacharyya, Nisarga Chand and Subham Chakraborty, “A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Steps”, International Journal of Advanced Research in Computer Engineering & Technology, Vol. 3, 2014, pp. 307-312. 11. Kalyan Das and Debanjan Choudhury, “An Ameliorate Image Steganography Method using LSB Technique & Pseudo Random Numbers”, Journal for Research, Vol. 4, 2018, pp. 1-6. 12. Dr S Hemalath, Androse and E Sharmili, “An Efficient Method For Text And File Encryption For Secure Data Transmission Through Audio Steganography”, International Journal of Trend in Scientific Research and Development, 2018, pp. 25-31. 13. Sandeep.y, K.A.Naveen Kumar and G.Reddy Gangadri, “A Novel Modified Play-Fair Image Steganography by Using 9 by 4 Matrixes”, International Journal of Scientific & Engineering Research, Vol. 8, 2017, pp. 2008-2015. 14. Salman A. Khan, “Design and Analysis of Playfair Ciphers with Different Matrix Sizes”, International Journal of Computing and Network Technology, No. 3, 2015, pp. 117-122. 15. Sahil Lotlikar, Ashish Gupta, Jayesh Thorat and Sandhya Kadam, “Image Steganography and Cryptography Using Three Level Password Securit”, International Journal for Research in Applied Science & Engineering Technology, Vol. 5, 2017, pp. 1370-1374. 16. Alaa Kadhim Farhan, Rasha Subhi Ali and Sura Mazin Ali, “Secure Location Map and Encryption Key Based on Intelligence Search Algorithm in Encryption and Steganography to Data Protection”, International Journal of Mechanical Engineering and Technology, Vol. 10, 2019, pp. 8-24. 17. Arun R, Nithin Ravi S and Thiruppathi K, “Intra Block and Inter Block Neighboring Joint Density Based Approach for JPEG Steganalysis”, International Journal on Soft Computing, Vol. 3, No. 2, 2012. 18. Khaled Aedh Alaseri and Adnan Abdul-Aziz Gutub, “Merging Secret Sharing within Arabic Text Steganography for Practical Retrieval”, IJRDO - Journal of Computer Science and Engineering, Vol. 4, 2018, pp. 1-17. 19. Md. Ahnaf Tahmid Shakil and Md. Rabiul Islam, “An Efficient Modification to Playfair Cipher”, ULAB Journal of Science and Engineering, Vol. 5, No. 1, 2014, pp. 26-30. Authors: Harwinder Kaur, Gurleen Kaur

Paper Title: Voting Based Classification Method for Diabetes Prediction Abstract: This research work is based on the diabetes prediction analysis. The prediction analysis technique has the three steps which are dataset input, feature extraction and classification. In this previous system, the Support Vector Machine and naïve bayes are applied for the diabetes prediction. In this research work, voting based method is applied for the diabetes prediction. The voting based method is the ensemble based which is applied for the diabetes prediction method. In the voting method, three classifiers are applied which are Support Vector Machine, naïve bayes and decision tree classifier. The existing and proposed methods are implemented in python and results in terms of accuracy, precision-recall and execution time. It is analyzed that voting based method give high performance as compared to other classifiers.

Keyword: Voting based method, Support Vector Machine, Naïve bayes, decision tree, diabetes prediction.. 171. References: 1. Alexis Marcano-Cede˜no, Diego Andina, “Data mining for the diagnosis of type 2 diabetes”, IEEE, Vol. 11, issue 3, pp. 9-19, 2016. 913- 2. B. M. Patil, R. C. Joshi, Durga Toshniwal, “Association rule for classification of type -2 diabetic patients”, 2010 Second International Conference on Machine Learning and Computing, Vol. 8, issue 3, pp. 7- 23, 2010. 918 3. Prova Biswas1,2, Ashoke Sutradhar3, Pallab Datta, “Estimation of parameters for plasma glucose regulation in type-2 diabetics in presence of meal”, IET Syst. Biol., 2018, Vol. 12 Iss. 1, pp. 18-25, 2018. 4. MS.Tejashri n. Giri, prof. S.r.todamal, “data mining approach for diagnosing type 2 diabetes”, international journal of science, engineering and technology, vol. 2 issue 8, 2014. 5. P. Suresh Kumar and V. Umatejaswi, “ Diagnosing Diabetes using Data Mining Techniques”, International Journal of Scientific and Research Publications, Volume 7, Issue 6, June 2017. 6. M. Sharma, G. Singh, R. Singh, “Stark Assessment of Lifestyle Based Human Disorders Using Data Mining Based Learning Techniques”, Elsevier, vol. 5, pp. 202- 222, 2017. 7. Han Wu, Shengqi Yang, Zhangqin Huang, Jian He, Xiaoyi Wang, “Type 2 diabetes mellitus prediction model based on data mining”, ScienceDirect, Vol. 11, issue 3, pp. 12-23, 2018. 8. Yan Luo, Charles Ling, Ph.D., Jody Schuurman, Robert Petrella, MD, “GlucoGuide: An Intelligent Type-2 Diabetes Solution Using Data Mining and Mobile Computing”, 2014 IEEE International Conference on Data Mining, Vol. 9, issue 8, pp. 12-23, 2014. 9. Abdelghani Bellaachia and Erhan Guven (2010), “Predicting Breast Cancer Survivability Using Data Mining Techniques”, Washington DC 20052, vol. 6, 2010, pp. 234-239. 10. Oyelade, O. J, Oladipupo, O. O and Obagbuwa, I. C (2010), “Application of k-Means Clustering algorithm for prediction of Students’ Academic Performance” Authors: Mugdha Sharma, Chirag Pupreja, Akash Arora

Paper Title: Design and Implementation of University Network Abstract: Information technology is being used at numerous places fulfilling various purposes. Doing work at one place by professors and sharing it at another place either to faculty members and students becomes quite difficult. As doing tasks on one PC, a professor might have to visit different classes and labs due to various reasons. Similarly a student working on a project might have to access a particular project document in multiple labs and classes. Head of Department has to visit various rooms and classes in a particular day. It would be very tedious job to carry laptop everywhere. There might be a situation when a user wants to share a particular data with more than 1 user. There can also be a situation when a particular message/ information need to be shared with the entire university. So this research work proposes a novel approach to communicate among various users that are present at different sites at the same time where at university premises network system is being proposed which would help departments to share information among faculty members and students Proposed approach takes the help of sharing common network domain by DNS and applies heterogeneous BUS topology model to explore various concepts like topology design, creating dynamic host configuration protocol, sub net masking, DNS and VLAN within a single network with the help of Cisco Packet Tracer to make the network more secured and cost effective. 172.

919- Keyword: Cisco Packet Tracer (CPT), Dynamic Host Configuration Protocol (DHCP), Domain name System (DNS), Virtual LAN (VLAN), Personal Computer (PC). 925 References: 1. Tim Reardon, Planning, Designing and operating local area networks, DISAM Journal, Summer, 1997. 2. www.wikipedia.org/wiki/computer_networks, Retrieved 10th October, 2016. 3. www.wikipedia.org/wiki/local_area_network, Retrieved 10th October, 2016. 4. W. Buchanan, ―Correlation between academic and skills-based tests in computer networks,‖ Br. J. Educ. Technol., vol. 37, no. 1, pp. 69– 78, 2006. 5. K. Adesemowo and M. Gerber, ―E-skilling on fundamental ICT networking concepts — Overcoming the resource constraints at a South African University,‖ in Proc. e-Skills for Knowledge Production and Innovation Conference, pp. 1–16, 2014. 6. J. Expósito, V. Trujillo, and E. Gamess, ―Using visual educational tools for the teaching and learning of EIGRP,‖ in Proc. the World Congress on Engineering and Computer Science, vol. I, pp. 169–174, 2010. 7. J. Janitor, F. Jakab, and K. Kniewald, ―Visual learning tools for teaching/learning computer networks: Cisco networking academy and packet tracer,‖ in Proc. 2010 Sixth International Conference on Networking and Services, pp. 351–355, 2010. 8. International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970) Volume-4 Number-3 Issue-16 September-2014 ―Plan, Design and Simulation of University Network‖. 9. International Journal of Mechanical & Mechatronics Engineering IJMME-IJENS Vol:12 No:06 ―University Optical Fibre Network Access Optimisation: A Case Study‖ Authors: Kalpana, Manjula Shanbhog

Paper Title: Load Balancing in Cloud Computing with Enhanced Genetic Algorithm Abstract: Cloud computing has a decentralized architecture in which virtual machine migration is one of the major challenges which affects the network performance. To balance the network load, various techniques are designed for the virtual machine migration. In the previous research work, genetic algorithm was proposed for Virtual Machine (VM) migration which can balance the network load. The genetic algorithm is complex in nature which increases the execution time. In this research work, genetic algorithm is improved for VM migration which reduces the execution time and also space and bandwidth utilization.

Keyword: Genetic Algorithm, Virtual Machine migration, Bandwidth utilization.

References: 1. Srinivas.J, K. Venkata Subba Reddy, Dr. A. Moiz Qyser, “Cloud Computing Basics”, International journal of advanced research in 173. computer and communication engineering , 2012, pp. 343-347. 2. Soumya Ray and Ajanta De Sarkar, “Execution Analysis of Load Balancing Algorithm in Cloud computing Environment”, International Journal on Cloud Computing: Services and Architecture (IJCCSA), October 2012, Vol.2, No.5. 926- 3. HU Baofang, SUN Xiuli, LI Ying, SUN Hongfeng, “An Improved Adaptive Genetic Algorithm in Cloud Computing”, 13th 930 International Conference on Parallel and Distributed Computing, Applications and Technologies, 2012. 4. Tushar Desai, Jignesh Prajapati, “A Survey of Various Load Balancing Techniques and Challenges in Cloud Computing”, International Journal of Scientific & Technology Research, November 2013, Volume 2, Issue 11. 5. Punithasurya K, Esther Daniel, Dr. N. A. Vasanthi, “A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2013, Volume 2, Issue 3, March 2013, pp 942-946. 6. Vimmi Pandey, “Securing the Cloud Environment Using OTP”, International Journal of Scientific Research in Computer Science and Engineering, 2013, vol-1, Issue-4. 7. Sanjoli Singla, Jasmeet Singh, “Cloud Data Security using Authentication and Encryption Technique”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) , July 2013 Volume 2, Issue 7, pp 2232-2235. 8. Sheetal Karki, Anshika Goyal, “Performance Evaluation of Check Pointing and Threshold Algorithm for Load Balancing in Cloud Computing”, International Journal of Computer Sciences and Engineering, Vol.-6, Issue-5, May 2018, pp 2347-2693. 9. Sukhpreet Kaur, Dr. Jyotsna Sengupta, “Load Balancing using Improved Genetic Algorithm(IGA) in Cloud Computing”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 6, Issue 8, August 2017, pp 2278-1323. 10. Wang Bei, LI Jun, “Load Balancing Task Scheduling based on Multi-Population Genetic Algorithm in Cloud Computing”, 2016, Proceedings of the 35th Chinese Control Conference 11. Mahalingam, Nandhalakshmi Nithya, “Efficient Load Balancing in Cloud Computing Using Weighted Throttled Algorithm”, International Journal of Innovative Research in Computer and Communication Engineering, 2015,vol.3, 5409 – 5415. 12. Keke Gai, Meikang Qiu, Hui Zhao, “Cost-Aware Multimedia Data Allocation for Heterogeneous Memory Using Genetic Algorithm in Cloud Computing”, IEEE Transactions on Cloud Computing, 2015. 13. Mr. Mayur S. Pilavare, Mr. Amish Desai, “A Novel Approach Towards Improving Performance of Load Balancing Using Genetic Algorithm in Cloud Computing”, IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems, ICIIECS’15, 2015. Authors: Sakshi Sharma, Maninder Pal Singh, Baljeet Kaur Nagra

Paper Title: CDCT: CT Scan Images based on Mechanism for Lung Cancer Detection Abstract: Image classification is one of the major issues of image pre-processing approach. To resolve this issue a large number of classification approaches has been developed. In this work, a novel SVM-FA (support vector machine optimized with firefly approach) classifier is developed for detecting the lung cancer on the basis of the CT images. Lung cancer is considered one of the most critical and vital. Thus the early analysis of such kind of disease is required. For this purpose, the study implements the image pre-processing (filtration and segmentation) techniques to the input CT scan images. Then the SVM classifier, optimized with firefly approach is applied to the pre-processed data. The target of the work is to enhance the accuracy in the final prediction or output. For evaluating the proficiency level of the proposed SVM-FA approach, a comparison analysis is also performed in this work. The comparison is done among proposed work, traditional work and SVM classifier. On the basis of the obtained facts and figures, the proposed work is found to be effective and efficient in terms of the accuracy (96%) and specificity (83.333%) respectively.

Keyword: Medical image pre-processing, SVM classifier, Firefly optimization, Lung cancer.

References: 1. Asuntha, A., Banu, P. A., Ainthaviarasi, K., Kumar, B. S., & Srinivasan, A. (2017). Feature extraction to detect Bone Cancer Using Image Processing. Research Journal of Pharmaceutical Biological and Chemical Sciences, 8(3), 434-442. 2. Non-Small Cell Lung Cancer, Available at: http://www.katemacintyrefoundation.org/pdf/non-small-cell.pdf, Adapted from National Cancer Institute (NCI) and Patients Livingith Cancer (PLWC), 2007, (accessed July 2011). 3. Tarawneh, M., Nimri, O., Arqoub, K., & Zaghal, M. (2007). Cancer incidence in Jordan. Jordan National Cancer Registry. 4. Lung Cancer Database, Available at: https://eddie.via.cornell.edu/cgibin/datac/signon.cgi, (accessed July 2011). 5. Al-Tarawneh, M. S. (2012). Lung cancer detection using image processing techniques. Leonardo Electronic Journal of Practices and Technologies, 11(21), 147-58. 6. Chaudhary, A., & Singh, S. S. (2012, September). Lung cancer detection on CT images by using image processing. In 2012 International Conference on Computing Sciences (pp. 142-146). IEEE. 174. 7. Hadavi, N., Nordin, M. J., & Shojaeipour, A. (2014, June). Lung cancer diagnosis using CT-scan images based on cellular learning automata. In 2014 International Conference on Computer and Information Sciences (ICCOINS) (pp. 1-5). IEEE. 8. Aggarwal, T., Furqan, A., & Kalra, K. (2015, August). Feature extraction and LDA based classification of lung nodules in chest CT 931- scan images. In 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1189- 1193). IEEE. 935 9. Thai, L. H., Hai, T. S., & Thuy, N. T. (2012). Image classification using support vector machine and artificial neural network. International Journal of Information Technology and Computer Science (IJITCS), 4(5), 32-38. 10. Makaju, S., Prasad, P. W. C., Alsadoon, A., Singh, A. K., & Elchouemi, A. (2018). Lung cancer detection using CT scan images. Procedia Computer Science, 125, 107-114. 11. Mesleh, A. M. (2017). Lung Cancer Detection Using Multi-Layer Neural Networks with Independent Component Analysis: A Comparative Study of Training Algorithms. Jordan Journal of Biological Sciences, 10(4). 12. Jin, X. Y., Zhang, Y. C., & Jin, Q. L. (2016, December). Pulmonary nodule detection based on CT images using convolution neural network. In 2016 9th International Symposium on Computational Intelligence and Design (ISCID) (Vol. 1, pp. 202-204). IEEE. 13. Dwivedi, M. S. A., Borse, M. R., & Yametkar, M. A. M. (2014). Lung Cancer detection and Classification by using Machine Learning & Multinomial Bayesian. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), 9(1), 69-75. 14. Baswade, A. M., Joshi, K. D., & Nalwade, P. S. (2012). A Comparative Study Of K-Means and Weighted K-Means for Clustering. International Journal of Engineering Research & Technology, 1(10). 15. Khobragade, S., Tiwari, A., Patil, C. Y., & Narke, V. (2016, July). Automatic detection of major lung diseases using Chest Radiographs and classification by feed-forward artificial neural network. In 2016 IEEE 1st International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES) (pp. 1-5). IEEE. 16. Sevani, A., Modi, H., Patel, S., & Patel, H. (2018). Implementation of Image Processing Techniques for Identifying Different Stages of Lung Cancer. International Journal of Applied Engineering Research, 13(8), 6493-6499. 17. Ignatious, S., Joseph, R., John, J., & Prahladan, A. (2010). Computer Aided Lung Cancer Detection and Tumor Staging in CT image using Image Processing. International Journal of Computer Applications, 975, 8887. 18. Tariq, A., Akram, M. U., & Javed, M. Y. (2013, April). Lung nodule detection in CT images using neuro fuzzy classifier. In 2013 Fourth International Workshop on Computational Intelligence in Medical Imaging (CIMI) (pp. 49-53). IEEE. 19. Vas, M., & Dessai, A. (2017, August). Lung cancer detection system using lung CT image processing. In 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA) (pp. 1-5). IEEE. 20. Miah, M. B. A., & Yousuf, M. A. (2015, May). Detection of lung cancer from CT image using image processing and neural network. In 2015 International conference on electrical engineering and information communication technology (ICEEICT) (pp. 1-6). ieee. 21. Anifah, L., Harimurti, R., Permatasari, Z., Rusimamto, P. W., & Muhamad, A. R. (2017, October). Cancer lungs detection on CT scan image using artificial neural network backpropagation based gray level coocurrence matrices feature. In 2017 International Conference on Advanced Computer Science and Information Systems (ICACSIS) (pp. 327-332). IEEE. 22. Than, J. C., Saba, L., Noor, N. M., Rijal, O. M., Kassim, R. M., Yunus, A., ... & Suri, J. S. (2017). Lung disease stratification using amalgamation of Riesz and Gabor transforms in machine learning framework. Computers in biology and medicine, 89, 197-211. Authors: Arif Ali Wani, Bansi Lal Raina

Paper Title: Discovery of Knowledge by using Data Warehousing as well as ETL Processing 175. Abstract: Testing is very essential in Data warehouse systems for decision making because the accuracy, 936- validation and correctness of data depends on it. By looking to the characteristics and complexity of iData iwarehouse, iin ithis ipaper, iwe ihave itried ito ishow the scope of automated testing in assuring ibest data 945 iwarehouse isolutions. Firstly, we developed a data set generator for creating synthetic but near to real data; then in isynthesized idata, with ithe help of hand icoded Extraction, Transformation and Loading (ETL) routine, anomalies are classified. For the quality assurance of data for a Data warehouse and to give the idea of how important the iExtraction, iTransformation iand iLoading iis, some very important test cases were identified. After that, to ensure the quality of data, the procedures of automated testing iwere iembedded iin ihand icoded iETL iroutine. Statistical analysis was done and it revealed a big enhancement in the quality of data with the procedures of automated testing. It enhances the fact that automated testing gives promising results in the data warehouse quality. For effective and easy maintenance of distributed data, a novel architecture was proposed. Although the desired result of this research is achieved successfully and the objectives are promising, but still there's a need to validate the results with the real life environment, as this research was done in simulated environment, which may not always give the desired results in real life environment. Hence, the overall potential of the proposed architecture can be seen until it is deployed to manage the real data which is distributed globally.

Keyword: iData iQuality, iData iwarehousing, iETL iand iTesting.

References: 1. S. Chaudhuri, “,” no. March 1997, 1998. 2. N. Rahman, “Refreshing Data Warehouses with Near Real-Time Updates,” J. Comput. Inf. Syst., vol. 4417, no. Spring, p. 70, 2007. 3. D. Calvanese, G. De Giacomo, M. Lenzerini, D. Nardi, and R. Rosati, “Foundations of D ata W arehouse Q uality,” no. 22469, pp. 2– 13, 1998. 4. S. Bruno, Nicolas; Chaudhuri and N. Bruno, “Flexible Database Generators,” Vldb, pp. 1097–1107, 2005. 5. A. Wani, B. L. Raina, “Issues and handy Solutions addressed at everystage in real time data warehousing , i . e . ETL ( extraction , transformation & loading ). - Literature Review. 6. A. Wani, A. Khan, A. Jamal, and P. K. Gupta, “Cost Efficient Media Cloud Storage and Systematic Risks Involved in the Cloud Computing,” no. 9, pp. 2466–2469, 2019. 7. List, R. M. Bruckner, K. Machaczek, and J. Schiefer, “A Comparison of Data Warehouse Development Methodologies Case Study of the Process Warehouse,” pp. 203–215, 2010. 8. G. Swetha, D. Karunanithi, and K. A. Lakshmi, “Data Integration Models for Operational Data Warehousing,” vol. 3, no. 2, pp. 508– 516, 2014. 9. R. J. Santos and J. Bernardino, “Real-time data warehouse loading methodology,” p. 49, 2008. 10. A. Wani and B. L. Raina, “Data in Data Warehouse and its Qualities Issues,” no. 9, pp. 1753–1756, 2019. 11. R. J. Davenport, “ETL vs ELT,” no. June, 2008. 12. K. Kakish and T. A. Kraft, “ETL Evolution for Real-Time Data Warehousing,” Proc. Conf. Inf. Syst. Appl. Res., p. 12, 2012. 13. A. Wani, U. Chandra, P. Bansi, and L. Raina, “Security Challenge in Big Data for Behaviour Analytics,” vol. 5, no. 7, pp. 578–581, 2018. 14. D. Agrawal, “The reality of real-time business intelligence,” Lect. Notes Bus. Inf. Process., vol. 27 LNBIP, pp. 75–88, 2009. Authors: VandanaBhasin

Paper Title: Secure Index on Distributed Data: UML Extension for Wireless Sensor Networks Abstract: The research on wireless sensor network has evolved with applications being developed in several domains. However, applications designed for wireless sensor network are attributed with programming which occurs at lower levels of abstractions of the operating system. The application designer has to be aware of both the domain of the application and its corresponding hardware platform. This creates a strong coupling between the implemented code and hardware platform. Hence all applications are designed for specific platforms and become difficult to maintain, modify and reuse. Our proposal creates UML models for a WSN application to formalize it according to a development life cycle. Secure Index on Distributed data (SIDD) is an application that addresses two issues of data distribution and security. The UML model helps to harmonize the domains of security and application. Hence the paper focusses on converging the designing process into a formal development mode using UML representations.

Keyword: Distributed data,Security, UML Modelling, Wireless sensor network. 176. References: 946- 1. Bhasin, Vandana, P. C. Saxena, and C. P. Katti. (2018, July)"Creating a secure index for distributed data on the sensor network." International Journal of Sensor Networks 27.3: 180-199. 952 2. Parakh, Abhishek, and SubhashKak. "Online data storage using implicit security." Information Sciences 179.19 (2009): 3323-3331. 3. Losilla, F., Vicente-Chicote, C., Álvarez, B., Iborra, A., & Sánchez, P. (2007, September). Wireless sensor network application development: An architecture-centric mde approach. In European Conference on Software Architecture (pp. 179-194). Springer, Berlin, HeidelbergW.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135. 4. Mozumdar, M. M. R., Gregoretti, F., Lavagno, L., Vanzago, L., &Olivieri, S. (2008, June). A framework for modeling, simulation and automatic code generation of sensor network application. In 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (pp. 515-522). 5. Selic, B. (2002, March). Complete High-Performance Code Generation from UML Models. In Proceedings of Embedded System Conference. San Francisco, CA, USA. 6. Rumbaugh, J. J. (1998). The Unified Modelling Language Reference Manual. Redwood City, CA, USA: Addison Wesley Longman Publishing Co 7. Uke, N. J., &Thool, R. C. (2015). Objects tracking in video: A object–oriented approach using Unified Modeling Language. International Journal of Computational Vision and Robotics, 5(2), 202-216. 8. Infantino, I., Cossentino, M., &Chella, A. (2002, June). An Agent Based Multilevel architecture for Robotics Vision Systems. In IC- AI (pp. 386-390). 9. Gavrilescu, M., Magureanu, G., Pescaru, D., &Jian, I. (2012, November). Towards UML software models for Cyber Physical System applications. In 2012 20th Telecommunications Forum (TELFOR) (pp. 1701-1704). IEEE. 10. Jacoub, J. K., Liscano, R., Bradbury, J. S., & Fisher, J. (2013). UML Modelling of Design Patterns for Wireless Sensor Networks. In SENSORNETS (pp. 89-93). 11. Fuchs, G., & German, R. (2010, May). UML2 activity diagram based programming of wireless sensor networks. In Proceedings of the 2010 ICSE Workshop on Software Engineering for Sensor Network Applications (pp. 8-13). ACM. 12. Hong, Sunghyuck, Sunho Lim, and Jaeki Song. "Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey." KSII Transactions on Internet & Information Systems 5.4 (2011). 13. Pawar, P. M., Nielsen, R. H., Prasad, N. R., Ohmori, S., & Prasad, R. (2012). Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach. Journal of Cyber Security and Mobility, 1(1), 65-82. 14. Rodrigues, T., Dantas, P., Pires, P. F., Pirmez, L., Batista, T., Miceli, C., &Zomaya, A. (2011, October). Model-driven development of wireless sensor network applications. In 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing (pp. 11-18). IEEE. 15. Uke, S., &Thool, R. (2016). UML based modeling for data aggregation in secured wireless sensor network. Procedia Computer Science, 78, 706-713. 16. Specification, OMG Available. "Omg unified modeling language (omguml), superstructure, v2. 1.2." Object Management Group 70 (2007). 17. Jacobson, Ivar. Object-oriented software engineering: a use case driven approach. Pearson Education India, 1993. 18. Phillips, C., Kemp, E., &Kek, S. M. (2001). Extending UML use case modelling to support graphical user interface design. In Proceedings 2001 Australian Software Engineering Conference (pp. 48-57). IEEE. 19. Berardi, Daniela, Diego Calvanese, and Giuseppe De Giacomo. "Reasoning on UML class diagrams." Artificial intelligence 168.1-2 (2005): 70-118. 20. Schmidt, Holger, and Jan Jürjens. UMLsec4UML2-adopting UMLsec to support UML2. TU, Department of Computer Science, 2011. Authors: Narayanan Srinivasan, S. R.Balasundaram

Paper Title: Challenges in using a Standard Speech Recognition Engine in Small Vocabulary Domain Abstract: This paper discusses the challenges and proposes recommendations on using a standard speech recognition engine for a small vocabulary Air Traffic Controller Pilot communication domain. With the given challenges in transcribing the Air Traffic Communication due to the inherent radio issues in cockpit and the con- troller room, gathering the corpus for training the speech recognition model is another important problem. Taking advantage of the maturity of today’s speech recognition systems for the standard English words used in the communication, this paper focusses on the challenges in decoding the domain specific named entity words used in the communication. Keyword: air traffic speech,contextual speech recognition, named entity recognition, non-trained speech,

References: 1. Van Nhan Nguyen, HaraldHolone “Possibilities, Challenges and the State of the Art of Automatic Speech Recognition in Air Traffic Control” in International Journal of Com-puter, Electrical, Automation, Control and Information Engineering Vol:9, No:8, 2015 2. Van Nhan Nguyen and HaraldHolone “N-best List Re-ranking Using Syntactic Score: A Solution for Improving Speech Recognition Accuracy in Air Traffic Control” in 2016 16th International Conference on Control, Automation and Systems (ICCAS 2016) 3. Van Nhan Nguyen and HaraldHolone “N-best List Re-ranking Using Semantic Relat-edness and Syntactic Score: An Approach for Improving Speech Recognition Accuracy in Air Traffic Control” in 016 16th International Conference on Control, Automation and Systems (ICCAS 2016) 4. Rima Shah, Dheeraj Kumar Singh “Analysis and Comparative Study on Phonetic Matching Techniques in International Journal of Computer Applications” (0975 – 8887) Volume 87 – No.9, February 2014 5. VimalP. Parmar, CK Kumbharana “Study Existing Various Phonetic Algorithms and De-signing and Development of a working model for the New Developed Algorithm and Comparison by implementing it with Existing Algorithm” in International Journal of Computer Applications (0975 – 8887) Volume 98– No.19, July 2014 177. 6. George E. Dahl, Dong Yu, Li Dengand Alex Acero “Context-Dependent Pre-Trained Deep Neural Networks for Large-Vocabulary Speech Recognition” in IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 20, NO. 1, JANUARY 2012 953- 7. Shuo Chen, Hunter Kopald, Dr. Ronald S. Chong, Dr. Yuan-Jun Wei, Zachary Levonian “Read Back Error Detection using Automatic 958 Speech Recognition” in Twelfth USA/Europe Air Traffic Management Research and Development Seminar (ATM2017) 8. Claudiu, MihaiGeacăr “REDUCING PILOT / ATC COMMUNICATION ERRORS USING VOICE RECOGNITION” IN 27TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES (ICAS 2010) 9. Mira Pavlinović, Damir Boras, and IvanaFrancetić “First Steps in Designing Air Traffic Control Communication Language Technology System - Compiling Spoken Corpus of Radiotelephony Communication” in INTERNATIONAL JOURNAL OF COMPUTERS AND COMMUNICATIONS Issue 3, Volume 7, 2013 10. Oliver Ohneiser, HartmutHelmke, HeikoEhr, HejarGürlük, Michael Hössl, Thorsten Mühlhausen “Air Traffic Controller Support by Speech Recognition” in Proceedings of the 5th International Conference on Applied Human Factors and Ergonomics AHFE 2014, Kraków, Poland 19-23 July 2014 11. VatsalaMathapati, AnjaneyKoujalagi, Naveen Kumar C “Sphinx 4 Speech Recognition in ATC” in International Journal of Advanced Engineering Research and Science (IJAERS) Vol-3, Issue-4 , April- 2016] 12. YoheiFusayasu, Katsuyuki Tanaka, Tetsuya Takiguchi, YasuoAriki “Word-Error Cor-rection of Continuous Speech Recognition Based on Normalized Relevance Distance” in Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelli-gence (IJCAI 2015) 13. Youssef Bassil, Mohammad Alwani “Post-Editing Error Correction Algorithm for Speech Recognition using Bing Spelling Suggestion” in (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No.2, 2012 14. N USHA RANI∗ and P N GIRIJA “Error analysis to improve the speech recognition ac-curacy on Telugu language” Sa¯dhana¯ Vol. 37, Part 6, December 2012, pp. 747–761.c Indian Academy of Sciences 15. Youssef Bassil, Paul Semaan “ASR Context-Sensitive Error Correction Based on Microsoft N-Gram Dataset in JOURNAL OF COMPUTING”, VOLUME 4, ISSUE 1, JANUARY 2012, ISSN 2151-9617 16. MinwooJeong, Sangkeun Jung, Gary Geunbae Lee “Speech Recognition Error Correction Using Maximum Entropy Language Model” in Department of Computer Science and Engineering, Pohang University of Science & Technology (POSTECH), San 31, Hyoja-Dong, Pohang, 790-784, Republic of Korea 17. KonradHofbauer, Stefan Petrik, Horst Hering “The ATCOSIM Corpus of Non-Prompted Clean Air Traffic Control Speech” 18. “Enhanced Speech Tracking of Air Traffic Control Communications”, Technical University of Crete 19. José Manuel Cordero, Manuel Dorado, José Miguel de Pablo “Automated Speech Recognition in ATC Environment” in ATACCS’2012 | RESEARCH PAPERS 20. Woo KyeongSeong, Ji Hun Park, and Hong Kook Kim “Dysarthric Speech Recognition Error Correction Using Weighted Finite State Transducers Based on Context–Dependent Pronunciation Variation” 21. Anna Schmidty, Youssef Oualily, Oliver Ohneiserz, Matthias Kleinertz, Marc Schuldery, ArifKhany, HartmutHelmkez, Dietrich Klakowy “CONTEXT-BASED RECOGNITION NETWORK ADAPTATION FOR IMPROVING ON-LINE ASR IN AIR TRAFFIC CONTROL” 22. Youssef Oualil, Dietrich Klakow, GyorgySzaszak, Ajay Srinivasamurthy, HartmutHelmke, PetrMotlicek “A CONTEXT-AWARE SPEECH RECOGNITION AND UNDERSTANDING SYSTEM FOR AIR TRAFFIC CONTROL DOMAIN” 23. Youssef Oualil, Marc Schulder, HartmutHelmke, Anna Schmidt, Dietrich Klakow “Re-al-Time Integration of Dynamic Context Information for Improving Automatic Speech Recognition” 24. Youssef Oualil, Marc Schulder, HartmutHelmke, Anna Schmidt, Dietrich Klakow “Re-al-Time Integration of Dynamic Context Information for Improving Automatic Speech Recognition” Authors: Neha Yadav, Vibhash Yadav, Prashant Kumar Mishra

Paper Title: Software Matrices Selection for a SDLC Based Software Reliability Prediction Model Abstract: Software reliability is one of the essential factors of quality in software engineering like other quality attributes as functionality, usability, maintainability, performance, serviceability, documentation etc. From last few years, several software reliability models have been developed. There is lack of relevant literature which focuses on processes related to SDLC. A SDLC based structure for measurement of reliability has been proposed. Identified software reliability measures which are majorly take place in all levels of early software development phase of SDLC. Considering all measures for reliability estimation will be costly and time taking. So measures are identified which are taking place at each development phase and have high synthetic weight according to selecting criteria based on expert judgment and multi criteria decision making technique. Based on the grading, top ranked measures like completeness, error distribution, fault density etc are identified. Use of recommended metrics will make software reliability estimation more effective and reliable.

Keyword: multi criteria decision making, reliability measurement, reliability metrics, reliability techniques, selecting criteria

References: 1. Amara Dalila, Ben Latifa, Arfa Rabai. “towards a New Framework of Software Reliability Measurement Based on Software Metrics”, Procedia Computer Science 109 C , 2017, 725–730. 2. IEEE Std 982.2. “IEEE Guide for the Use of IEEE Standard Dictionary of Measures to Produce Reliable Software”, IEEE, 1988.vol. 50, no. 1, pp. 43-56. 3. Farooq SU, Quadri SMK., Ahmad N. “Metrics models and measurements in software reliability”, IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI), Slovakia, 2012, p. 441–449. 178. 4. Farooq S.U, Quadri S.M.K. “Evaluating Effectiveness of Software Testing Techniques with Emphasis on Enhancing Software Reliability”. Journal of Emerging Trends in Computing and Information Sciences, VOL. 2, NO. 12, 2011. 959- 5. Garg R. K., Sharma Kapil, Nagpal C. K, Garg Rakesh,Garg Rajpal,kumar Rajive and Sandhya. “Ranking of software engineering metrics by fuzzy-based matrix methodology”, Published online in Wiley Online Library (wileyonlinelibrary.com),2011. 963 6. Gall C.S., Lukins S., Etzkorn L.H., Gholston S., Farrington Ph.A., Utley D.R., Fortune J. and Virani S. “Semantic software metrics computed from natural language design specifications”, IET Software, 2008, p. 17–26. 7. ISO/IEC CD 25010.”Systems and software engineering Systems and software Quality Requirements and Evaluation (SQuaRE)”, System and software quality models, 2011. 8. ISO/IEC 9126-1, ‘Information Technology-Software quality characteristics and metrics- Part 1’, Quality Model. 9. Jatain A., Mehta Y. “Metrics and models for software reliability: a systematic review”. International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), India; 2014, p. 210–214. 10. Kumar, K. S., Misra, R. B.”An enhanced model for early software reliability prediction using software engineering metrics”, In Proceedings of 2nd International Conference on Secure System Integration and Reliability Improvement, 2008 ,pp. 177–178. 11. Lyu M.R.”Software reliability engineering: a roadmap”. 29th International Conference on Software Engineering, Future of Software Engineering. Minneapolis, 2007,p. 153–170. 12. Li Haifeng, Lu Minyan and Li Qiuying “Software Reliability Metrics Selecting Method Based on Analytic Hierarchy Process” Proceedings of the Sixth International Conference on Quality Software (QSIC'06),2006. 13. Mansour YI, Mustafa SH. “Assessing internal software quality attributes of the object oriented and service-oriented software development paradigms: a comparative study”, Journal of Software Engineering and Applications, (pp. 244–252), 2011. 14. Fenton, James Bieman. “Software Metrics: A Rigorous and Practical Approach”, Third Edition, CRC press., 2014. 15. Rosenberg L., Hammer T., and Shaw J. “Software metrics and reliability’. (ISSRE 1998 Best Paper), 9th International Symposium on Software Reliability”. Germany 1988, p. 1–8. 16. Saini N, Kharwar S, Agrawal A. “A Study of significant software metrics”.International Journal of Engineering Inventions, 2014, 1-7. 17. Stein C, Etzkorn LH., Cox G, Farrington Ph.A, Gholston S, Utley DR., Fortune J. “A new suite of metrics for object-oriented software’. Proceedings of the 1st International Workshop on Software Audits and Metrics,”Portugal, 2004, p. 49–58. 18. Smidts C. and Li M. “Software Engineering Measures for Predicting Software Reliability in Safety Critical Digital Systems”, Technical Report, NUREG/GR-0019, Univ. of Maryland, Washington D.C, 2000. 19. Shi Ying & Li Ming, Steven Arndt, Carol Smidts. “Metric-based software reliability prediction approach and its application’ Springer Science+Business Media New York (outside the USA), 2016. 20. Saravana K., Kumar, Mishra R.B”‘An Enhanced Model for Early Software Reliability Prediction using Software Engineering Metrics”,The Second International Conference on Secure System Integration and Reliability Improvement, IEEE,2016. Authors: Ritu Singhal, Archana Singhal, Varun Sharma, Saachi

Paper Title: E-Cloud: A Solution towards E-Waste Management for Educational Institutions Abstract: In the era of rapidly advancing frontiers of science and technical innovations over the recent years, 179. the generations of electronic items have remarkably increased. Due to the globalization and the upgradations, electronic waste (e-waste) is growing at a compound annual growth rate of about 30% in the country. The issue has 964- raised an alarming situation in the form of several health and environmental hazards like land, water and air 972 pollution, depletion of non-renewable resources and loss of precious elements. Increasing levels of CO2 emissions in the environment has severely affected the geographic conditions as well. The proposed work includes an e- waste survey carried out under the auspices of Indraprastha College for Women, University of Delhi to gather information for spreading awareness about e-waste generation and its disposal. The present study on e-waste disposal and recycling includes both quantitative and qualitative approaches, along with a series of compiled results. The findings in the survey regarding the health hazards, environmental impacts, and existing disposal practices would be helpful not only to the country but will also be beneficial at the global level. To get an insight regarding the issue, a pilot survey was conducted prior to launching the final one. The variations in the responses of the pilot survey and suggestions by the corresponding respondents were of immense help in creating an improved version of the final survey. Based on the survey analysis, the authors have further proposed a cloud based model for the educational organizations for e-waste reduction for the effective and efficient utilization of resources. The proposed solution would be a mile stone in contribution towards the reduction of carbon footprint and e-waste generation at the global level.

Keyword: E-cloud, Electronic waste, E-waste management, E-resource, Cloud Computing, Green Computing, Virtualization

References: 1. https://www.statista.com/statistics/499891/projection-ewaste-generation-worldwide/ 2. https://www.slideshare.net/ErnestoEmpig/technologies-for-sustainable-ewaste-management-solutions 3. https://www.thehindu.com/sci-tech/energy-and-environment/what-about-e-waste/article24193081.ece 4. https://meity.gov.in/content/awareness-programme-environmental-hazards-electronic-waste 5. M. Sikdar, S. Vaniya, “The New Millennium and Emerging Concerns”, International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1, ISSN 2250-3153. 6. https://www.myjoyonline.com/lifestyle/2017/march-16th/csir-pokes-action-against-burning-of-e-waste-at-agbogbloshie.php 7. Kiddee, Peeranart, R. Naidu, and M. H. Wong. "Electronic waste management approaches: An overview" Waste management 33.5 (2013): 1237-1250. 8. F. Veglio, I. Birloaga and I. D. Michelis, “An innovative approach for e-waste issues solving”, International Journal of Waste Resources, 8th World Congress and Expo on Recycling,Berlin, Germany,June 2018 , E-ISSN: 2252-5211 9. T.V. Ramachandra., K. Saira Varghese, “Environmentally sound options for e-waste management”, Energy and Wetlands Group, Center for Ecological Sciences, Indian Institute of Science, Bangalore. Published by: Envis Journal of Human Settlements, March 2004. 10. Monika, J. Kishore, “E-Waste Management: As a Challenge to Public Health in India”, IJCM, Volume 35. 11. S. Anwar, M. Ghaffar, F. Razzaq, B. Bibi, “E-waste reduction via virtualization in Green Computing”, ASRJETS, ISSN: 2313-4402. 12. R. Singhal, A. Singhal, M. Bhatnagar, and N. Malhotra. "Design of an Audio Repository for Blind and Visually Impaired: A Case Study." In Advanced Computing and Communication Technologies, pp. 77-85. Springer, Singapore, 2019. 13. R. Singhal, A. Singhal, Sonia. “Towards a generic E-Cloud architecture for universities”, IJWA 8.2 (2016), 36-43. 14. M.D. J. Uddin, (Environment) “E-Waste Management”, IOSR Journal of Mechanical and Civil Engineering (IOSRJMCE), ISSN: 2278-1684 Volume 2. 15. https://en.wikipedia.org/wiki/Electronic_waste Authors: Mohd. Tajammul, Rafat Parveen

Paper Title: Algorithm for Document Integrity Testing Pre Upload and Post Download from Cloud Storage Abstract: This era is of business and marketing, those who have no proper equipments, they can also proceed in this field. This is just because of cloud computing. Many organizations are still in ambivalence whether to adopt cloud computing or not. The biggest barrier before them is security of their sensitive data. This research paper is an attempt to encourage such organizations or individuals who are still thinking to adopt this fruitful as well as cheap and best service. In this paper we have proposed an integrity testing algorithm which tests whole documents at character level before uploading to cloud storage and after downloading from cloud storage. The idea of the algorithm resembles to the idea of ‘error detection and correction’. For more clearance of the idea refer future scope.

Keyword: Integrity, Cloud Computing, Error Detection and Correction, character level testing. References: 1. L. Wei et al., “Security and privacy for storage and computation in cloud computing,”Information Sciences, vol. 258, 2014, pp. 371– 180. 386. 2. Z. Deng, K. Li, K. Li, and J. Zhou, “A multi-user searchable encryption scheme with keyword authorization in a cloud storage,” Future Generation of Computer System., vol. 72, pp. 208–218, 2017. 973- 3. H. Rasheed, “Data and infrastructure security auditing in cloud computing environments,” International Journal of Information 979 Management, vol. 34, no. 3, 2014, pp. 364–368. 4. L. T. Yang, G. Huang, J. Feng, and L. Xu, “Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing,” Information. Sciences (NY)., vol. 387, 2017, pp. 254–265. 5. D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” SIAM Journal Computer, vol. 32, no. 3, 2003, pp. 586– 615. 6. Azougaghe, Z. Kartit, M. Hedabou, M. Belkasmi, and M. El Marraki, “An efficient algorithm for data security in Cloud storage,” 15th Int. Conf. Intelligent System. Design Application,2015, pp. 421–427. 7. Mohd. Tajammul, RafatParveen and Mohd. Shahnawaz. “Cloud Computing Security Issues and Methods to Resolve: Review”, Journal of Basic and Applied Engineering Research, vol. 5, Issue 7; October-December, 2018, pp. 545-550. 8. S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer. Applications, vol. 34, no. 1, 2011, pp. 1–11. 9. D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Future Generation of Computer System, vol. 28, no. 3, 2012, pp. 583–592. 10. M. N. Manas, C. K. Nagalakshmi, and G. Shobha, “Cloud Computing Security Issues And Methods to Overcome,” International Journal of Advanced Research in Computer Communication. Eng., vol. 3, no. 4, 2014, pp. 6306–6310. 11. M. Armbrust et al., “ A view of Cloud Computing,” Communication of ACM, vol. 53, no. 4, 2010, pp. 50–58. 12. M. M. Potey, C. A. Dhote, and D. H. Sharma, “Homomorphic Encryption for Security of Cloud Data,” Procedia Computer Science, vol. 79, 2016, pp. 175–181. 13. P. R. Kumar, P. H. Raj, and P. Jelciana, “Exploring Data Security Issues and Solutions in Cloud Computing,” Procedia Computer Science, vol. 125, no. 2009, 2018, pp. 691–697. 14. Chuang and S. Li, “An effective privacy protection scheme for cloud computing,” ICACT, 13th International Conference,2011, pp. 260–265. 15. Q. Wang, S. Member, C. Wang, S. Member, and K. Ren, “Enabling Public Auditability and Data Dynamic in Cloud Computing,” IEEE Trans. Parallel and Distributed System, vol. 22, no. 5, 2012, pp. 847–859. 16. M. Tajammul, “Comparative Study of Big Ten Information Security Management System Standards”, International Journal of Engineering Research in Computer Science and Engineering, vol. 5, Issue 2, 2018, pp. 5-14. 17. M. Tajammul, “Comparative Analysis of Big Ten ISMS Standards and Their Effect On CloudComputing”,978-1-5386-0627- 8/17/$31.00c 2017 IEEE 18. Tim Mather, SubraKumaraswamy, and S. L, Cloud Privacy and Security. O’REILLY, 2009, pp. 336. 19. Dan C. Marinescu, Cloud Computing Theory and Practices. Elsevier, 2018, pp. 588 20. Dijiang Huang and Huijun Wu, Mobile and Cloud Computing, Elsevier, 2018, pp. 336 21. Naga Malleswari TYJ , Vadivu G , “Adaptive deduplication of virtual machine images using AKKA stream to accelerate live migration process in cloud environment”, Journal of Cloud ComputingAdvances, Systems and Applications, 2019, pp. 6- 12.https://doi.org/10.1186/s13677-019-0125-z. Authors: Mahendra Pd. Sharma

Paper Title: Performance Examination of Black Hole and Gray Hole Attacks in MANETs Abstract: Security is a very difficult issue for ad hoc ad networks. The first step is to developa good security solution to understand the current attack method.The presence of malicious nodeswill affect the functionality and network integrity. In the Black hole attack, malicious nodes will lower the package instead of moving forward. Thus, Black hole attacks reduce networkperformance. Utimetly as a black hole this paper analysis over other attacks individually or inintegrated manner. It is quite easy to verify the behaviors of black hole attack on individual basis.But in case of gray hole attack it is too much difficut to analysis the nature and behaviors of the network. The quality of tarnsmision is unpredictable and the overall performance get badlyaffcted with the such kind of attack. These attacks is the basic of the earlier known attack butwhen it come in pair or more than its behaviorss is very hard to detected on the basis of thepresent knwledge. In this paper we analyse blackhole and Grayhole attack s that executed underthe NS2 plateform run on the linux operating system. The analysis formwithsome set of nodesand whole excution focused on three parameters i.e E2E, PDR and Throughput.

Keyword: AODV-Adhoc On demand Distance Vector,DoS- Deniel of Services,MANET- Mobile Adhoc Network,E2E-End to End,PDR-Packets Delivery Response, WLANs- Wireless Local area Networks 181. References: 980- 1. Abusalah, L., Khokhar, A. A., & Guizani, M. (2008). A survey of secure mobile ad hoc routing protocols. IEEE Communications 982 Surveys and Tutorials, 10(1-4), 78-93. 2. Akyildiz, I. F., & Wang, X. (2005). A survey on wireless mesh networks. IEEE Communications magazine, 43(9), S23-S30. 3. Alem, Y. F., & Xuan, Z. C. (2010, May). Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection. In Future Computer and Communication (ICFCC), 2010 2nd International Conference on (Vol. 3, pp. V3-672). IEEE. 4. Alheeti, K. M. A., Gruebler, A., & McDonald-Maier, K. D. (2015, January). An intrusion detection system against malicious attacks on the communication network of driverless cars. In Consumer Communications and Networking Conference (CCNC), 2015 12th Annual IEEE (pp. 916-921). 5. Al-Kahtani, M. S. (2012, December). Survey on security attacks in Vehicular Ad hoc Networks (VANETs). In Signal Processing and Communication Systems (ICSPCS), 2012 6th International Conference on (pp. 1-9). IEEE. 6. Alotaibi, E., & Mukherjee, B. (2012). A survey on routing algorithms for wireless ad-hoc and mesh networks. Computer networks, 56(2), 940-965. 7. Alotaibi, E., & Mukherjee, B. (2012). A survey on routing algorithms for wireless ad-hoc and mesh networks. Computer networks, 56(2), 940-965. 8. Bai, F., Sadagopan, N., & Helmy, A. (2003, March). IMPORTANT: A framework to systematically analyze the Impact of Mobility on Performance of Rou-Ting protocols for Adhoc Networks. In INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications. IEEE societies (Vol. 2, pp. 825-835). IEEE. 9. Barbera, M., Lombardo, A., Panarello, C., & Schembra, G. (2007, June). Active Window Management: an efficient gateway mechanism for TCP traffic control. In Communications, 2007. ICC'07. IEEE International Conference on (pp. 6141-6148). IEEE. 10. Bellofiore, S., Foutz, J., Govindarajula, R., Bahçeci, I., Balanis, C. A., Spanias, A. S.,& Duman, T. M. (2002). Smart antenna system analysis, integration and performance for mobile ad-hoc networks (MANETs). IEEE Transactions on Antennas and Propagation, 50(5), 571-581. Authors: Kareena, Raj Kumar

Paper Title: A Consumer Behavior Prediction Method for E-Commerce Application Abstract: The consumer behavior analysis is the technique which is applied to analyze consumer behavior. The customer behavior analysis has the three steps which are pre-processing, feature extraction and classification for prediction. In the previous work, Naïve Bayes was applied for the consumer behavior analysis. In this work, 182. hybrid classifier is designed for the customer behavior analysis using Decision Tree and KNN. The proposed method is implemented in anaconda python and results are compared with the previously used Naïve Bayes method, for this analysis consumer reviews from Amazon website are used. 983- 988 Keyword: Consumer behavior, Decision Tree, KNN, Naïve Bayes.

References: 1. W. Seo, et al., "Product opportunity identification based on internal capabilities using text mining and association rule mining," Technological Forecasting and Social Change, vol. 105, pp. 94- 104, 2016. 2. W. Joshi and S. Sharma, "Customer knowledge development: antecedents and impact on new product performance," Journal of Marketing, vol. 68, pp. 47-59, 2004. 3. K. Goffin and C. New, "Customer support and new product development-An exploratory study," International Journal of Operations & Production Management, vol. 21, pp. 275-301, 2001. 4. S. Tuarob and C. S. Tucker, "Quantifying product favorability and extracting notable product features using large scale social media data," Journal of Computing and Information Science in Engineering, vol. 15, p. 031003, 2015. 5. M. M. Mostafa, "More than words: Social networks’ text mining for consumer brand sentiments," Expert Systems with Applications, vol. 40, pp. 4241-4251, 2013. 6. Gemma A. Calvert, Michael J. Brammer, “Predicting Consumer Behavior: Using Novel Mind-Reading Approaches”, IEEE Pulse, 2012, Volume: 3, Issue: 3, Pages: 38 – 41. 7. A.C.M. Fong, Baoyao Zhou, Siu Hui, Jie Tang, Guan Hong, “Generation of Personalized Ontology Based on Consumer Emotion and Behavior Analysis”, IEEE Transactions on Affective Computing, 2012, Volume: 3, Issue: 2, Page s: 152 – 164. 8. X. G. Luo, C. K. Kwong, J. F. Tang, F. Q. Sun, “QFD-Based Product Planning With Consumer Choice Analysis”, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2015, Volume: 45, Issue: 3, Pages: 454 – 461. 9. Lianju Ning, Haoyu Wang, Xin Feng, Junping Du, “The Browsing Pattern and Review Model of Online Consumers Based on Large Data Analysis”, Chinese Journal of Electronics, 2015, Volume: 24, Issue: 1, Pages: 58 – 64. 10. Jungwoo Shin, Manseok Jo, Jongsu Lee, Daeho Lee, “Strategic Management of Cloud Computing Services: Focusing on Consumer Adoption Behavior”, IEEE Transactions on Engineering Management, 2014, Volume: 61 , Issue: 3, Pages: 419 – 427. 11. Ru Jia, Ru Li, Meiju Yu, Shanshan Wang, “E-commerce Purchase Prediction Approach By User Behavior Data”, 2017, International Conference on Computer, Information and Telecommunication Systems (CITS). 12. Yusheng Zhou and Shuiqing Yang, “Roles of Review Numerical and Textual Characteristics on Review Helpfulness Across Three Different Types of Reviews”, IEEE Access, 2019, Volume: 7, Pages: 27769 – 27780. 13. Ting Bai, Wanye Xin Zhao, Yulan He, Jian-Yun Nie Ji-Rong Wen, “Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites”, IEEE Transactions on Knowledge and Data Engineering, 2018, Volume: 30, Issue: 12, Pages: 2271 – 2284. 14. Namuk Ko, Byeongki Jeong, Sungchul Choi and Janghyeok Yoon, “Identifying Product Opportunities Using Social Media Mining: Application of Topic Modeling and Chance Discovery Theory”, IEEE Access, 2018, Volume: 6, Pages: 1680 – 1693. 15. Yuanlin Chen, Yueting Chai, Yi Liu, and Yang Xu, “Analysis of Review Helpfulness Based on Consumer Perspective”, Tsinghua Science and Technology, 2015, Volume: 20, Issue: 3, Page s: 293 – 305. 16. Hernandez Sergio, Pedro Alvarez, Javier Fabra and Joaquın Ezpeleta, “Analysis of users’ behaviour in structured e-commerce websites”, IEEE Access, 2017, Volume: 5, Pages: 11941 – 11958. 17. J. Tuladhar, A. Gupta, S. Shrestha, U. Bania and K. Bhargavi, "Predictive Analysis of E-Commerce Products", Intelligent Computing and Information and Communication, pp. 279-289, 2018. 18. N. Midha and V. Singh, "Classification of E-commerce Products Using RepTree and K-means Hybrid Approach", Advances in Intelligent Systems and Computing, pp. 265-273, 2017. 19. C. Troussas, A. Krouska and M. Virvou, "Trends on Sentiment Analysis over Social Networks: Pre-processing Ramifications, Stand- Alone Classifiers and Ensemble Averaging", Machine Learning Paradigms, pp. 161-186, 2018. 20. R. Ireland and A. Liu, "Application of data analytics for product design: Sentiment analysis of online product reviews", CIRP Journal of Manufacturing Science and Technology, vol. 23, pp. 128-144, 2018. 21. K. Srujan, S. Nikhil, H. Raghav Rao, K. Karthik, B. Harish and H. Keerthi Kumar, "Classification of Amazon Book Reviews Based on Sentiment Analysis", Advances in Intelligent Systems and Computing, pp. 401-411, 2018. 22. R. Jagdale, V. Shirsat and S. Deshmukh, "Sentiment Analysis on Product Reviews Using Machine Learning Techniques", Cognitive Informatics and Soft Computing, pp. 639-647, 2018. 23. R. McCarthy, M. McCarthy, W. Ceccucci and L. Halawi, "Introduction to Predictive Analytics", Applying Predictive Analytics, pp. 1- 25, 2019. Authors: Supreet Kaur, Seemu Sharma, Seema Bawa

Paper Title: Smart Indoor Air Quality Monitoring System Abstract: Internet of Thing or IoT in its simplest form means “Connect the Unconnected”. It makes our surroundings smarter and reactive as IoT enabled systems are capable of taking actions without human intervention. It has entered in almost all areas of life and has applications in various domains. Environment monitoring is one such domain. The air we breathe today is a mixture of harmful pollutants in high concentration. Not only outdoors, even indoors are not safe. This paper presents various IoT enabled Indoor Air Quality monitoring systems. It discusses what is indoor pollution, how it is degrading our health and how IoT is helping us to remain safe in indoors. It also stresses on the questions why indoor air pollution is to be addressed. Keyword: Indoor Air Quality Monitoring System, Pollutant Classification, IoT, Wireless Sensor Network. References: 1. S. Madakam, R. Ramaswamy, and S. Tripathi, “Jcc_2015052516013923,” J. Comput. Commun., no. May, pp. 164–173, 2015. 2. H. Arasteh, V. Hosseinnezhad, and A. Concepts, “Iot-based Smart Cities : a Survey,” 2016 IEEE 16th Int. Conf. Environ. Electr. Eng., 183. pp. 1–6, 2016. 3. D. Hanes et al., IoT Fundamentals : Networking Technologies , Protocols , and Use Cases for the Internet of Things, no. 3491. 2013. 4. “IoT applications|Top 10 uses of Internet of Things- DataFlair,” DataFlair, 2018. [Online]. Available: https://data- 989- flair.training/blogs/iot-applications/. [Accessed: 06-May-2019]. 996 5. S. Sharma, S. Bawa, and H. Lomash, “Approaches in Cultural Computing : A Survey and Inference from Social Computing with Dynamics of Mind,” Wirel. Pers. Commun., vol. 103, no. 4, pp. 2693–2713, 2018. 6. V Muralikrishna, V. Manickam, and E. Management, “Learn more about Environmental Pollution Introduction Societal Responsibility and Economic Viability Particulate Matter and Its Size Fraction- ation,” 2017. 7. H. N. Saha et al., “Pollution Control using Internet of Things ( IoT ),” pp. 65–68, 2017. 8. J. Esquiagola, M. Manini, A. Aikawa, L. Yoshioka, and M. Zuffo, “Monitoring Indoor Air Quality by using IoT Technology,” 2018 IEEE XXV Int. Conf. Electron. Electr. Eng. Comput., pp. 1–4, 2018. 9. “WHO Global Ambient Air Quality Database,” World Health Organization, 2019. [Online]. Available: https://www.who.int/airpollution/data/cities/en/. [Accessed: 27-Apr-2019]. 10. S. Madaan, “What are Different Types of Pollution?,” Earth Eclipse. [Online]. Available: https://www.eartheclipse.com/pollution/different-types-of-pollution.html. [Accessed: 26-Apr-2019]. 11. M. Mayntz, “Types of Pollution | LoveToKnow,” LoveToKnow. [Online]. Available: https://greenliving.lovetoknow.com/Types_of_Pollution. [Accessed: 01-May-2019]. 12. “Radiation and Pollution| Environment Pollution Centre,” Environment Pollution Centre, 2017. [Online]. Available: https://www.environmentalpollutioncenters.org/radiation/. [Accessed: 01-May-2019]. 13. C. Xiaojun, L. Xianpeng, and X. Peng, “IOT-based air pollution monitoring and forecasting system,” 2015 Int. Conf. Comput. Comput. Sci. ICCCS 2015, pp. 257–260, 2015. 14. H. Xie and F. Ma, “Prediction of Indoor Air Quality Using Artificial Neural Networks,” 2009 Fifth Int. Conf. Nat. Comput., vol. 2, pp. 414–418, 2009. 15. M. A. Alshamsi, Y. Anwar, M. M. Almulla, M. M. Aldahoori, N. Hamad, and M. Awad, “Monitoring Pollution : Applying IoT to Create a Smart Environment,” pp. 0–3, 2017. 16. M. F. Y. A. M. Pillai, “Monitoring of volatile organic compounds in different schools : a determinant of the indoor air quality,” Int. J. Environ. Sci. Technol., no. 0123456789, 2018. 17. D. Devakumar et al., “Biomass fuel use and the exposure of children to particulate air pollution in southern Nepal,” Environ. Int., vol. 66, pp. 79–87, 2014. 18. P. Liu et al., “A Low-Cost Intelligent Mobile Indoor Environment Monitoring System,” no. Icmemtc, pp. 226–230, 2016. 19. R. Plessis, A. Kumar, G. P. Hancke, and B. J. Silva, “A wireless system for indoor air quality monitoring,” IECON 2016 - 42nd Annu. Conf. IEEE Ind. Electron. Soc., pp. 5409–5414, 2016. 20. Y. Han, N. Zhu, N. Lu, J. Chen, and Y. Ding, “The Sources and Health Impacts of Indoor Air Pollution,” 2010 4th Int. Conf. Bioinforma. Biomed. Eng., pp. 1–4, 2010. 21. P. Spachos and D. Hatzinakos, “Real-Time Indoor Carbon Dioxide Monitoring,” IEEE Sens. J., vol. 16, no. 2, pp. 506–514, 2016. 22. “Natural Resources Department.” [Online]. Available: http://csktnrd.org/ep/indoor-air-pollution. [Accessed: 06-May-2019]. 23. X. Li and N. Zhu, “Indoor Air Pollution Control and Cognition Situation Investigation in University,” pp. 1307–1309, 2011. 24. Y. Chen and S. Shrestha, “Source Classification of Indoor Air Pollutants using Principal Component Analysis for Smart Home Monitoring Applications,” 2018 IEEE Int. Conf. Electro/Information Technol., pp. 129–133, 2018. 25. P. V. S. S. Vamsi, A. Garg, A. Anand, and D. R. Gupta, “IOT based Air Pollution Monitoring System,” vol. 8, no. 4, pp. 100–103, 2018. 26. D. Y. C. Leung, “Outdoor-indoor air pollution in urban environment : challenges and opportunity INDOOR AIR POLLUTANTS,” vol. 2, no. January, pp. 1–7, 2015. 27. B. H. Sudantha and P. M. Karunaratne, “IoT Enabled Proactive Indoor Air Quality Monitoring System for Sustainable Health Management,” pp. 216–221, 2017. 28. M. Tuomikoski, S. Ihme, A. Huttunen, M. Korkalainen, and S. Yrjänä, “Indoor air quality sensing indicators.” 29. “Air pollution and sperm quality: Breathing in toxic air may worsen semen quality,” Times Now Digital, 2019. [Online]. Available: https://www.timesnownews.com/amp/health/article/air-pollution-and-sperm-quality-breathing-in-toxic-air-may-worsen-the-semen- quality/389219. [Accessed: 30-Apr-2019]. 30. Rueben, “Researchers Now Have Even More Proof That Air Pollution Can Cause Dementia,” Mother Jones, 2019. [Online]. Available: https://www.motherjones.com/environment/2019/05/researchers-now-have-even-more-proof-that-air-pollution-can-cause-dementia/. [Accessed: 06-May-2019]. 31. X. Zhang, X. Chen, and X. Zhang, “The impact of exposure to air pollution on cognitive performance,” no. August, 2018. i. K. Patel and P. Biren, “Internet of Things ( IoT ): A Literature Review,” vol. 4, no. 05, pp. 1001–1003, 2016. 32. D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Ad Hoc Networks Internet of things : Vision , applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012. 33. K. K. Khedo, R. Perseedoss, and A. Mungur, “Kavi K. Khedo 1 , Rajiv Perseedoss 2 and Avinash Mungur 3,” pp. 31–45, 2010. 34. S. Singh, “Business Opportunities & Reference Architecture for E-commerce,” 2015 Int. Conf. Green Comput. Internet Things, pp. 1577–1581, 2020. 35. P. Srivatsa and A. Pandhare, “Indoor Air Quality : IoT Solution,” no. March, pp. 218–220, 2016. 36. D. Lohani and D. Acharya, “and Ventilation Rate,” 2016. 37. P. K. Sharma, T. De, and S. Saha, “IoT based indoor environment data modelling and prediction,” 2018 10th Int. Conf. Commun. Syst. Networks, COMSNETS 2018, vol. 2018–Janua, pp. 537–539, 2018. 38. G. Marques and R. Pitarma, “An Indoor Monitoring System for Ambient Assisted Living Based on Internet of Things Architecture,” 2016. 39. H. E. Fathallah, V. Lecuire, E. Rondeau, and S. Le Calvé, “An IoT-based Scheme for Real Time Indoor Personal Exposure Assessment,” pp. 2–3, 2016. 40. S. M. Saad, A. Rahman, M. Saad, A. Muhamad, Y. Kamarudin, and A. Zakaria, “Indoor Air Quality Monitoring System using Wireless Sensor Network ( WSN ) with Web Interface,” 2013 Int. Conf. Electr. Electron. Syst. Eng., pp. 60–64, 2013. 41. P. Asthana, “IoT Enabled Real Time Bolt based Indoor Air Quality Monitoring System,” 2018 Int. Conf. Comput. Charact. Tech. Eng. Sci., pp. 36–39, 2018. 42. G. Parmar, S. Lakhani, and M. K. Chattopadhyay, “An IoT based low cost air pollution monitoring system,” 2017 Int. Conf. Recent Innov. Signal Process. Embed. Syst., pp. 524–528, 2017. 43. Kumar, A. Kumar, and A. Singh, “Energy Efficient and Low Cost Air Quality Sensor for Smart Buildings,” 2017 3rd Int. Conf. Comput. Intell. Commun. Technol., pp. 1–4, 2017. 44. R. Pitarma, F. Caetano, and A. Monitoring, “Monitoring Indoor Air Quality to Improve Occupational Health,” no. January, 2016. 45. X. Yang, L. Yang, and J. Zhang, “A WiFi-enabled Indoor Air Quality Monitoring and Control System : the Design and Control Experiments,” 2017 13th IEEE Int. Conf. Control Autom., pp. 927–932, 2017. 46. B. Fang, Q. Xu, T. Park, and M. Zhang, “AirSense : An Intelligent Home-based Sensing System for Indoor Air Quality Analytics,” pp. 109–119, 2016. 47. S. M. Saad et al., “Classifying Sources Influencing Indoor Air Quality (IAQ) Using Artificial Neural Network (ANN),” pp. 11665– 11684, 2015. 48. D. U. Urku and H. Agrawal, “Smart Real-Time Indoor Air Quality Sensing System and Analytics,” vol. 10, no. 6, pp. 1484–1495, 2019. 49. S. Zhi, “Intelligent Controlling of Indoor Air Quality based on Remote Monitoring Platform by Considering Building Environment,” no. Icsai, pp. 627–631, 2017. 50. U. Engagement, “Zone Based Indoor Mobile Air Pollution Monitoring,” pp. 749–752, 2013. 51. Peng, “Implementation of Indoor VOC Air Pollution Monitoring System with Sensor Network,” 2013 Seventh Int. Conf. Complex, Intelligent, Softw. Intensive Syst., pp. 639–643, 2013. 52. W. Zhang, S. Qin, and Z. Chen, “Analysis on the Construction and Application of Health Classrooms in Information Environment,” pp. 131–135. Authors: Sejal P Dalal, Khyati Vaidya Seismic Performance and Cost Comparison of Concentrically Braced Frames Designed By Paper Title: Performance-Based Plastic Design and Force-Based Design Method Abstract: Comparative study of 5, 10 and 15 storied steel Concentrically Braced Frames (CBF) designed by 184. Performance Based Plastic Design (PBPD) method and Force Based Design (FBD) method is presented here. The parameters selected for comparison of the frames are (a) Lateral load distribution (b) Design sections of members 997- (c) Seismic performance and (d) Cost. It is observed that the lateral load's distribution in case of PBPD frames is 1001 found more factual. The column sections of PBPD frames are heavier, and brace sections are lighter compared to FBD frames given the fact that PBPD is designed for higher ductility factor. The PBPD method gives a better seismic performance by achieving the predetermined failure mechanism and avoiding total collapse. Taller structures offer cost-effectiveness for PBPD method.

Keyword: Performance-Based Plastic Design method Force Based Design Method Concentrically Braced Frames Seismic PerformancePerformance Point

References: 1. S.C. Goel, S.H. Chao, Performance based Plastic Design: Earthquake Resistant Steel Structures, first ed., International Code Council, Illinois, 2008. 2. S.C. Goel, W.C. Liao, S.H. Chao, M.R. Bayat, “Performance Based Plastic Design (PBPD) Method for Earthquake Resistant Structures: An Overview” Journal of the Structural Design of Tall and Special Buildings 19, 115-137, and 2010. https://doi.org/10.1002/tal.547. 3. S.H. Chao, M.R.Bayat, S.C. Goel, “Performance Based Plastic Design of Steel Concentric Braced Frames for enhanced confidence level” in 2008 The 14th World Conference on Earthquake Engineering, Beijing, China, 2008. 4. S.H. Chao, S.C. Goel, “A seismic design method for Steel Concentric Braced Frames for Enhanced Performance”, in 2006 , Proceedings of fourth International Conference on Earthquake Engineering, Taipei, Taiwan, 2006. 5. S. P. Dalal, D. Patolia, P. Dalal, “Performance Based Plastic Design of Concentric Braced Frame attuned with Indian Standard Code and its Seismic Performance Evaluation”, J. Materials and Engineering Structures 2 (2015) 168-179. 6. IS 1893:2002, Indian Standard Criteria for Earthquake Resistant Design of Structures. 7. S.H. Chao, S.C. Goel, S.S. Lee, “A Seismic Design Lateral Force Distribution Based On Inelastic State Of Structures”, Earthquake Spectra 23-3 (2007) 547–569, DOI: 10.1193/1.2753549. 8. S.P. Dalal, P.D. Dalal, A.K.Desai, “Effect of increasing Ductility factors on the Performance of a Steel Moment Resisting Frame designed by the Performance Based Plastic Designed method attuned with Indian code of Practice”, Procedia Engineering, 173 (2017) 1862-1869. https://doi.org/10.1016/j.proeng.2016.12.238. 9. IS 800:2007, Indian Standard General Construction in Steel, Code of Practice, Bureau of Indian Standards, New Delhi, India. 10. S.P. Dalal, S.A.Vasanwala, A.K. Desai, “Comparison of Elastic Design and performance Based Plastic Design Method based on the Inelastic Response Analysis using SAP 2000”, International Journal of Computer Applications 45-9 (2012) 1-13. DOI: 10.5120/6805- 9144. 11. ATC 40, Applied Technology Council, Seismic Evaluation and retrofitting of Concrete Buildings, 1(1996) Authors: Joiceswarnalatha R, V. Murali Krishna

Paper Title: Emotional Intelligence and Its Impact on the Organizational Performance-using SEM Abstract: There are drastic advancements in the technology. This is having an impact on the world wide organizations which is stressing them to perform better to with stand the competition. In India, one of the largest contributing sectors for the Indian economy is IT sector. Employees are the biggest assets for the organizations to perform well. We can see the number of IT companies cropping up and number of IT companies winding off. We can also see many employees hopping from one organization to other and also few of them being terminated by the organization itself. This study aims to study the employees’ capacity to know about themselves, others and their contributions to the organization. This study main intention is to know impact of emotional intelligence levels of the employees from IT sector on their organizational performance levels. The IT professionals of sample size 463 from Hyderabad, Telangana is chosen. Structural equation modeling is used for building the model. It was observed that there was constructive significant impact of emotional intelligence levels of employees on their organizational performance.

Keyword: Emotional intelligence, employee engagement, job satisfaction, organizational performance, organization commitment, quality of work life, relationship management, stress, self management, self awareness, social awareness

185. References: 1. Aghdasi, S., Kiamanesh, A. R., & Ebrahim, A. N. (2011). Emotional intelligence and organizational commitment: Testing the 1002- mediatory role of occupational stress and job satisfaction. Procedia - Social and Behavioral Sciences, 29(October 2016), 1965–1976. 1012 https://doi.org/10.1016/j.sbspro.2011.11. 447 2. Lahore, D., Report, S., Intelligence, E., Scale, J. S., Intentions, T., & Scale, P. (2016). European Journal of Social Sciences Studies Emotional Intelligence As A Predictor Of, (716). 3. Ntwari, A., & Kule, W. J. (2016). The International Journal of Business & Management Role of Strategic Human Resource Management Practices on the Performance of Financial Institutions in Rwanda : Case Study of Bank of Kigali, 4(4), 511–520. 4. International, T., & Of, J. (2015). The International Journal of Business & Management The Impact of Employee Engagement in Improving Organizational Performance Abstract: The International Journal Of Business & Management, 3(2), 111–114. 5. Sarangi, S., & Vats, A. (2015). Role of Emotional Intelligence on Employee Engagement: A Study among Indian Professionals. International Journal of Business and Management, 10(6), 224–234. https://doi.org/10.5539/ijbm.v10n6p224 6. Mwangi, D. C. I. (2014). Emotional Intelligence Influence on Employee Engagement Sustainability in Kenyan Public Universities. International Journal of Academic Research in Public Policy and Governance, 1(1), 75–92. https://doi.org/10.6007/ijarppg/v1-i1/920 7. Gul, Z. (2015). Impact of Employee Commitment on Organizational Performance. FWU Journal of Social Sciences, Winter 2015, 9(2), 117–124. 8. Berberoglu, A., & Secim, H. (2015). Organizational Commitment and Perceived Organizational Performance Among Health Care Professionals : Empirical Evidence From A Private Hospital in Northern Cyprus. Journal of Economics and Behavioral Studies, 7(1), 64–71. 9. Shafiq, M., & Rana, R. A. (2016). Relationship of Emotional Intelligence to Organizational Commitment of College Teachers in Pakistan. Eurasian Journal of Educational Research, 16(62), 1–14. https://doi.org/10.14689/ejer.2016.62.1 10. Patiraj and Bhanu (2015). Commerce Management The Role of Emotional Intelligence in Organizational Commitment : a Study of Banking Sector Prof . Patiraj Kumari Bhanu Priya Professor , Department of Management Studies ) Kanya Gurukul Campus , Dehradun Research Scholar , Department , (11), 59–62. 11. Bakotić, D. (2016). Relationship between job satisfaction and organisational performance. Economic Research-Ekonomska Istraživanja, 29(1), 118–130. https://doi.org/10.1080/1331677X.2016.1163946 12. Shmailan, A. (2016). The Relationship between Job Satisfaction, Job Performance and Employee Engagement: An Explorative Study. Issues in Business Management and Economics, 4 (1)(January), 1–8. https://doi.org/10.15739/IBME.16. 001 13. Prasad, K., Vaidya, R., & Kumar, V. A. (2016). An empirical study on the causes of occupational stress and its effect on performance at the workplace of supermarkets in hyderabad. Innovative Journal of Business and Management, (July), 89–93. https://doi.org/10.15520/ijbm.vol5.iss5.55.pp94-101 14. Sathya Priya, V. B. (2016). A Study on Job Stress and its Impact on Employees. International Journal of Management, 7(2), 247– 254. 15. Sharma, R., & Kumar, P. (2016). Emotional Intelligence and Stress Coping Styles: A Study of Doctors of Private Hospitals in and Around Chandigarh. IRA-International Journal of Management & Social Sciences (ISSN 2455-2267), 3(3). doi:http://dx.doi.org/10.21013/jmss.v3.n3.p24 16. Sharma, R., & Sharma, K. (2014). The Relationship Between Emotional Intelligence and Occupational Stress : A Study on BPO SEGMENT IN INDIA. Journal of Strategic Human Resource Management, 3(3), 19–25. 17. Quadros, A. R. A. (2015). Employee Perception on Organizational Performance : A Structural Equation Modeling Approach. The International Journal of Business & Management, 3(5), 252–257. Retrieved from www.theijbm.com 18. Jaiswal, A. (2014). Quality Of Work Life. Journal of Business Management & Social Sciences Research, 3(2), 83–87. 19. Manhas, C. (2013). Relating Emotional Intelligence , Quality of Work Life and Job Satisfaction : A Study among Corporate Employees, 2(April), 107–121. 20. Farahbakhsh, S. (2012). The role of emotional intelligence in increasing quality of work life in school principals, 46, 31–35. https://doi.org/10.1016/j.sbspro.2012.05.062 21. Karolis, K. (2016). The impact of the manager’s emotional intelligence on organisational performance. Management Theory and Studies for Rural Business and Infrastructure Development, 38(1), 58–69. https://doi.org/10.15544/mts.2016.6 22. Intelligence, E., Performance, O., Associate, P., & Services, A. (2014). Emotional Intelligence Self – awareness Self – management Social awareness Relationship management Employee Performance, 3(12), 1–8. 23. Papathanasiou, S., & Siati, M. (2014). Emotional Intelligence and Job Satisfaction in Greek Banking Sector. Research in Applied Economics, 6(1), 225. https://doi.org/10.5296/rae.v6i1.5050 24. Masrek, M. N., Akmal, M., Osman, F., Khamis, Y., & Paiman, M. J. (2014). The Relationship Between Emotional Intelligence and Job Satisfaction : The Case of Malaysian Information Technology Professionals. International Journal of Multidisciplinary and Current Research, 2(Nov/Dec), 1106–1111.