<<

International Journal of Innovative Technology and Exploring Engineering

ISSN : 2278 - 3075 Website: www.ijitee.org Volume-8 Issue-9S2, JULY 2019 Published by: Blue Eyes Intelligence Engineering and Sciences Publication

xploring En E gi d ne an e r y in g g lo o

n

h

c

e T

IjItEe

e

I

n v

i

t t

e

E a

X r v

P N n

o

L O a

O I n

T t

R A i

o

I V n

N O I

G N n

IN f

a

o

l l

J a o r n u

www.ijitee.org Exploring Innovation Editor-In-Chief Chair Dr. Shiv Kumar Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal (M.P.),

Associated Editor-In-Chief Chair Dr. Dinesh Varshney Professor, School of Physics, Devi Ahilya University, Indore (M.P.), India

Associated Editor-In-Chief Members Dr. Hai Shanker Hota Ph.D. (CSE), MCA, MSc (Mathematics) Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India

Dr. Gamal Abd El-Nasser Ahmed Mohamed Said Ph.D(CSE), MS(CSE), BSc(EE) Department of Computer and Information Technology , Port Training Institute, Arab Academy for Science ,Technology and Maritime Transport, Egypt

Dr. Mayank Singh PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu- Natal, Durban, South Africa.

Scientific Editors Prof. (Dr.) Hamid Saremi Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran

Dr. Moinuddin Sarker Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor) Stamford, USA.

Dr. Shanmugha Priya. Pon Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East Africa, Tanzania

Dr. Veronica Mc Gowan Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman, China.

Dr. Fadiya Samson Oluwaseun Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern Cyprus, Turkey.

Dr. Robert Brian Smith International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie Centre, North Ryde, New South Wales, Australia

Dr. Durgesh Mishra Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India

Executive Editor Chair Dr. Deepak Garg Professor & Head, Department Of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India

Executive Editor Members Dr. Vahid Nourani Professor, Faculty of Civil Engineering, University of Tabriz, Iran.

Dr. Saber Mohamed Abd-Allah Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.

Dr. Xiaoguang Yue Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.

Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology, Mansoura, Egypt.

Dr. Hugo A.F.A. Santos ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.

Dr. Sunandan Bhunia Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia (Bengal), India.

Dr. Awatif Mohammed Ali Elsiddieg Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan, Saudi Arabia.

Technical Program Committee Chair Dr. Mohd. Nazri Ismail Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.

Technical Program Committee Members Dr. Haw Su Cheng Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia (Cyberjaya), Malaysia.

Dr. Hasan. A. M Al Dabbas Chairperson, Vice Dean Faculty of Engineering, Department of Mechanical Engineering, Philadelphia University, Amman, Jordan.

Dr. Gabil Adilov Professor, Department of Mathematics, Akdeniz University, Konyaaltı/Antalya, Turkey.

Dr. Ch.V. Raghavendran Professor, Department of Computer Science & Engineering, Ideal College of Arts and Sciences Kakinada (Andhra Pradesh), India.

Dr. Thanhtrung Dang Associate Professor & Vice-Dean, Department of Vehicle and Energy Engineeering, HCMC University of Technology and Education, Hochiminh, Vietnam.

Dr. Wilson Udo Udofia Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.

Manager Chair Mr. Jitendra Kumar Sen Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India

Editorial Chair Dr. Sameh Ghanem Salem Zaghloul Department of Radar, Military Technical College, Cairo Governorate, Egypt.

Editorial Members Dr. Uma Shanker Professor, Department of Mathematics, Muzafferpur Institute of Technology, Muzafferpur(Bihar), India

Dr. Rama Shanker Professor & Head, Department of Statistics, Eritrea Institute of Technology, Asmara, Eritrea

Dr. Vinita Kumar Department of Physics, Dr. D. Ram D A V Public School, Danapur, Patna(Bihar), India

Dr. Brijesh Singh Senior Yoga Expert and Head, Department of Yoga, Samutakarsha Academy of Yoga, Music & Holistic Living, Prahladnagar, Ahmedabad (Gujarat), India.

S. Volume-8 Issue-9S2, July 2019, ISSN 2278-3075 (Online) Page No. No Published By: Blue Eyes Intelligence Engineering & Sciences Publication

Authors: Anusha Akula, Renuka Devi S.M Paper Title: Automatic Speed-Limit Sign Detection and Recognition for Advanced Driver Assistance Systems Abstract: In recent years, traffic accidents have become the major cause to injuries, deaths and property damages. One of the main reasons to such accidents is due to high speed of vehicles. In order to maintain proper speed limit and thus provide significant contribution to improve safety, we propose Speed Limit sign detection and recognition method which is one of the features of Advanced Driver Assistance System (ADAS). In this paper we propose two approaches, i.e., histogram oriented gradient feature with SVM classifier namely HOG-SVM and CNN based approach. In these approaches we first pre-process the image using red color enhancement method and then we detect the Region of Interest using Maximally Stable Extremal Regions (MSER). Later, we classify the image by using different classifiers. In the HOG-SVM method, we are using HOG for feature extraction and Support Vector Machine (SVM) classifier for classification. In the CNN approach, we are using Convolutional Neural Networks (CNN) both for feature extraction and classification. Performance analysis of SVM classifier and CNN classifier are first evaluated on simple German Traffic Sign Recognition Benchmark (GTSRB) dataset using 5 fold classification, we got accuracy 100% for SVM classifier and 98.5% for CNN classifier. Also Further evaluated on German Traffic Sign Detection and Recognition Benchmark datasets and the experimental results show detection accuracy upto 93.6% for SVM classifier and 85.8% for CNN classifier.

Keywords: Speed-limit sign, MSER, SVM, Histogram of Oriented Gradients, Convolutional Neural Network.

References: 1. R. Malik, J. Khurshid, and S. N. Ahmad, “Road sign detection and recognition using color segmentation, shape analysis and template matching,” IEEE International Conference on Machine Learning and Cybernetics, pp. 3556-3560, 2007. 2. W. Shadeed, D. Abu-Al-Nadi, and M. Mismar, “Road traffic sign detection in color images,” Proceedings of the IEEE International Conference on Electronics, Circuits and Systems, Vol. 2, pp. 890-893, 2003. 3. R. Biswas, H. Fleyeh and M. Mostakim, "Detection and classification of speed limit traffic signs," 2014 World Congress on Computer 1. Applications and Information Systems (WCCAIS), Hammamet, 2014, pp. 1-6. 4. YihiWu,Yulong Liu ,” Traffic sign Detection based on Convolutional Neural Networks”, Proceedings of IEEE International Joint 1-5 conference on Neural Networks,pp.747-753,2013 5. Y. Han, K. Virupakshappa and E. Oruklu, "Robust traffic sign recognition with feature extraction and k-NN classification methods," 2015 IEEE International Conference on Electro/Information Technology (EIT), Dekalb, IL, 2015, pp. 484-488. 6. Y. B. Damavandi and K. Mohammadi, "Speed limit traffic sign detection and recognition," IEEE Conference on Cybernetics and Intelligent Systems, 2004., Singapore, 2004, pp. 797-802. 7. Venkatesan, C., P. Karthigaikumar, and S. Satheeskumaran. "Mobile cloud computing for ECG telemonitoring and real-time coronary heart disease risk detection." Biomedical Signal Processing and Control 44 (2018): 138-145. 8. Navneet Dalal and Bill Triggs, ”Histograms of Oriented Gradients for Human Detection”, Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition,2005 9. Satheeskumaran, S., and M. Sabrigiriraj. "A new LMS based noise removal and DWT based R-peak detection in ECG signal for biotelemetry applications." National Academy Science Letters 37, no. 4 (2014): 341-349. 10. Jack Greenhalgh and Majid Mirmehdi ,”Real-Time Detection and Recognition of Road Traffic Signs”, IEEE Transcations on Intelligent Transport Systems, vol. 13, no. 4, 2012 11. Meng-yin fu, Yuan-shui huang,” A Survey of Traffic Sign Recognition”,IEEE International Conference on Wavelet Analysis and Pattern Recognition,2010 12. Fatin Zaklouta, Bogdan Stanciulescu, “Real-time traffic sign recognition in three stages”, Elsevier conference on Robotics and Autonomous Systems, 2012 13. A.dela Escalera, J.MaArmingol, M. Mata “Traffic sign recognition and analysis for intelligent vehicles”,Image Vis.Comput,, vol.21,no. 3,pp.247-258,Mar. 2003. 14. S. Ardianto, C. Chen and H. Hang, "Real-time traffic sign recognition using color segmentation and SVM," 2017 International Conference on Systems, Signals and Image Processing (IWSSIP), Poznan, 2017, pp. 1-5. 15. J. Stallkamp, M. Schlipsing, J. Salmen, and C. Igel, “The German Traffic Sign Recognition Benchmark: A multiclass classification competition,” The International Joint Conference on Neural Networks (IJCNN), pp. 1453-1460, 2011. 16. J. Stallkamp, M. Schlipsing, J. Salmen, and C. Igel, “Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition,” Neural Networks, Vol. 32, pp. 323-332, 2012. 17. Shustanov, Alexander & Yakimov, Pavel. (2017), “CNN Design for Real-Time Traffic Sign Recognition” Procedia Engineering”. 201. 718-725. 10.1016/j.proeng.2017.09.594. 18. S. Xu, D. Niu, B. Tao and G. Li, "Convolutional Neural Network Based Traffic Sign Recognition System," 2018 ,5th International Conference on Systems and Informatics (ICSAI), Nanjing, 2018, pp. 957-961. Authors: Burgoji Santhosh Kumar, Sudhir Kumar Sharma, K Haripal Reddy Paper Title: Real Time Rasperi Pi Facial Emotion Recognition using Pca Improved Abstract: Emotions are first-rate way of communicating information and on occasion it deliver extra records than words. These days, there has been large hobby in automatic popularity of human emotion because of its huge spread utility in protection, surveillance, advertising, commercial, and human –laptop interaction. To speak with a laptop in a natural way, it will likely be applicable to apply more herbal modes of human conversation primarily based on voice, gestures and facial expressions. In this paper, a holistic method to facial expression recognition is to propose which 2. captures the variant in facial functions in temporal domain and classifies the series of images in extraordinary feelings. The dimensionally of the Eigen area is reduced the use of fundamental aspect evaluation (PCA). Through projecting the 6-8 following face photographs into primary Eigen guidelines, the variation pattern of the acquired weight vector is modeled to categories it into exclusive feelings. As a result of the versions of expressions for exceptional humans and its intensity, someone particular approach for emotion popularity is followed. The use of the gray scale pix of the frontal face, the machine is able to classify 4 simple emotions which include happiness, disappointment, marvel, and disgust.

Keywords: Real time embedded design, facial face recognition, Dimensionability Reduction, Human computer Interface.

References: 1. Black, M. J. and Yacoob, Y. Tracking and recognizing rigid and non-rigid facial motions using local parametric model of image motion. In Proceedings of the International Conference on Computer Vision, pages 374–381. IEEE Computer Society, Cambridge, MA, 1995. 2. Boersma, P., Weenink, D., Praat Speech Processing Software, Institute of Phonetics Sciences of the University of Amsterdam. 3. Burges, C. A tutorial on support vector machines for pattern recognition. Dat Mining and Know. Disc., vol. 2(2), pp. 1–47, 1998. 4. Chen, L.S., Huang, T. S., Miyasato T., and Nakatsu R. Multimodal human emotion / expression recognition, in Proc. of Int. Conf. on Automatic Face and Gesture Recognition, (Nara, Japan), IEEE Computer Soc., April 1998 5. Chen, L.S., Huang, T.S. Emotional expressions in audiovisual human computer interaction. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on, Volume: 1, 30 July-2 Aug. 2000. Pages: 423 - 426 vol.1 6. A. De, A. Saha, and M. C. Pal, “A Human Facial Expression Recognition Model Based on Eigen Face Approach,” Procedia Comput. Sci., vol. 45, pp. 282–289, 2015. 7. A. Mehrabian, “Albert Mehrabian Communication Studies,” 2013. [Online]. Available: http://www.iojt- dc2013.org/~/media/Microsites/Files/IOJT/11042013-Albert-Mehrabian-Communication-Studies.ashx. [Accessed: 24-Jun- 2015]. 8. B. Kurt, V. V Nabiyev, and Y. Bekiroglu, “Yüz İfadelerinin Tanınması,” [Accessed: 01-Jun-2015] Authors: B. Hemalatha, Ajay Kumar Dadoria, Harishankar Srivastava Paper Title: Techniques for Sigma Delta ADC Design using CMOS Technology for CODEC Abstract: This paper presents the careful study of sigma-delta analog to digital convertor. The operations, characterizing parameters and totally different structures projected square measure conferred in basic type. the varied techniques and strategies for the design of a CMOS 3rd order Continuous Time (CT) Sigma Delta (SD) Modulator, where in to enhance the gain of the loop filter and to avoid the loading effect of the succeeding stage, facile differential pairs square measure enclosed between the passive RC integrators. then the ADC are optimized victimization Genetic Algorithms so as to realize the nice exchange between RC variations and loop stability.This makes SD-ADC more advantageous compared to conventional converters, that makes possible to use this SD-ADC in bio-medical applications.

Keywords: Sigma-delta ADC, passive RC integrators, optimization techniques, bio-medical applications, differential pairs.

References: 1. J. M. de la Rosa, “Sigma-delta modulators: Tutorial overview, design guide, and state-of-the-art survey,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 58, no. 1, pp. 1–21, Jan. 2011. 2. V. Srinivasan, V. Wang, P. Satarzadeh, B. Haroun, and M. Corsi, “A 20 mW 61 dB SNDR (60 MHz BW) 1b 3rd-order continuous-time delta-sigma modulator clocked at 6 GHz in 45 nm CMOS,” in IEEE Int. Solid-State Circuits Conf. (ISSCC) Dig. Tech. Papers, Feb. 2012, pp. 158–160. 3. S. Zeller, C. Muenker, R. Weigel, and T. Ussmueller, “A 0.039 mm2 inverter-based 1.82 mW 68.6 dB-SNDR 10 MHz-BW CT-ΣO-ADC in 65 nm CMOS using power- and area-efficient design techniques,” IEEEJ. Solid-State Circuits, vol. 49, no. 7, pp. 1548–1560, Jul. 2014. 4. K. Matsukawa et al., “A fifth-order continuous-time delta-sigma modu- lator with single-opamp resonator,” IEEE J. Solid- 3. State Circuits, vol. 45, no. 4, pp. 697–706, Apr. 2010. 5. T. Song, Z. Cao, and S. Yan, “A 2.7-mW 2-MHz continuous-time OΣ modulator with a hybrid active–passive loop filter,” IEEE J. Solid-State Circuits, vol. 43, no. 2, pp. 330–341, Feb. 2008. 9-13 6. J. L. A. de Melo, “A low power 1-MHz continuous-time OΣM using a passive loop filter designed with a genetic algorithm tool,” in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), May 2013, pp. 586–589. 7. F. Chen and B. Leung, “A 0.25-mW low-pass passive sigma-delta modulator with built-in mixer for a 10-MHz IF input,” IEEE J. Solid- State Circuits, vol. 6, no. 6, pp. 774–782, Jun. 1997. 8. J. L. A. de Melo, F. Querido, N. Paulino, and J. Goes, “A 0.4-V 410-nW opamp-less continuous-time ΔΣ modulator for biomedical applications,” in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), Jun. 2014, pp. 1340–1343. 9. A. Hussain, S.-W. Sin, C.-H. Chan, S.-P. Ben U, F. Maloberti, and R. P. Martins, “Active passive ΔΣ modulator for high- resolution and low-power applications,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 25, no. 1, pp. 364–374, Jan. 2017. 10. J. L. A. de Melo, J. Goes, and N. Paulino, “A 0.7 V 256 μW ΔΣ modulator with passive RC integrators achieving 76 dB DR in 2 MHz BW,” in Proc. IEEE Int. Symp. VLSI Circuits, Jun. 2015, pp. 290–291. 11. J. L. A. de Melo, B. Nowacki, N. Paulino, and J. Goes, “Design method- ology for sigma-delta modulators based on a genetic algorithm using hybrid cost functions,” in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), May 2012, pp. 301–304. 12. Joao L.A de Melo, NunoPaulino, Joao Goes, “Continuous time Delta Sigma Modulators based on Passive RC integrators” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 65, no. 11, Nov. 2018. 13. Susana Patón, Antonio Di Giandomenico, Luis Hernández, Member, IEEE, Andreas Wiesbauer, Member, IEEE, Thomas Pötscher, and Martin Clara “A 70-mW 300-MHz CMOS Continuous-Time ∆∑ADC With 15-MHz Bandwidth and 11 Bits of Resolution,”IEEE J. Solid- State Circuits, vol. 39, no. 7, Jul.2004. 14. Ivan John O’Connell, Member, IEEE, and Colin Lyden, Member, IEEE “A Novel Noise Efficient Feedback DAC Within a Switched Capacitor ∆∑ ADC“, IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 52, no. 1, Jan. 2005. 15. Gil-Cho Ahn, Student Member, IEEE, Dong-Young Chang, Member, IEEE, Matthew E. Brown, Member, IEEE, Naoto Ozaki, Hiroshi Youra, Ken Yamamura, Koichi Hamashita, Kaoru Takasuka, Member, IEEE, Gábor C. Temes, Life Fellow, IEEE, and Un-Ku Moon, Senior Member, IEEE “A 0.6-V 82-dB Delta-Sigma Audio ADC Using Switched-RC Integrators,” IEEE J. Solid- State Circuits, vol. 40, no. 12, Dec.2005. Authors: Sajjan Choudhuri 4. Paper Title: A Research on Trading of Sensex Stocks by using RSI Abstract: This study has the aim of doing advanced research on technical analysis by finding reliability of buy or sell 14-22 signals generated by the Relative Strength Index tool. In this study, the RSI tool is tested on Sensex components (30 stocks) for the last six months. The data set for this study had been the daily data, taken from NSE and BSE website. The study compares the return from RSI recommendations and simple buy and hold strategy returns. The study also aims at testing the RSI tool for its probability of generating false buy sell signals. The findings of this study clearly indicate that RSI can be a powerful tool in the markets over buy and hold strategy. The study also makes it clear that the probabilities of false signals are also limited.

Keywords: Relative Strength Index, RSI, Small Cap index, Technical Analysis, Stock Market Analysis

References: 1. Adrian Ţaran-Moroşan (2011), “The Relative Strength Index Revisited”, African Journal of Business Management ISSN 1993-8233 Vol. 5(14), pp. 5855-5862 2. C. Boobalan (2014) “TECHNICAL ANALYSIS IN SELECT STOCKS OF INDIAN COMPANIES” International Journal of Business and Administration Research Review, Vol.2, Issue.4, page 26-36 3. ChalothonChootong and Ohm Sornil (2012) Trading Signal Generation Using A Combination of Chart Patterns and Indicators, International Journal of Computer Science Issue Vol. 9, Issue 6, No 1, ISSN (Online): 1694-0814 4. Chitra.R (2011) Technical Analysis on Selected Stocks of Energy Sector, International Journal of Management and Business studies Vol. 1, Issue 1,page 42-46 5. Drew F. Knowle (2015) “MOMENTUM INVESTING & ASSET ALLOCATION A primer on relative strength investing and the evolution of modern portfolio theory and asset allocation policy” Evolving Alternative Investments, http://dx.doi.org/10.2139/ssrn.2670343 6. Dr.Bhargavi. R, Dr.SrinivasGumparthi and Anith.R (2017),” Relative Strength Index for Developing Effective Trading Strategies in Constructing Optimal Portfolio” International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 19 pp. 8926-8936 7. DušanIsakov and Marc Hollistein (1999)” Application of simple technical trading rules to Swiss stock prices: Is it profitable?”, Financial Markets and Portfolio Management, 1999, vol. 13 no 1, pp. 9-26. 8. HemalPandya (2013), “Technical Analysis for Selected Companies of Indian IT Sector,” International Journal of Advanced Research (2013), ISSN NO 2320-5407, Volume 1, Issue 4, 430-446 9. HitendraLachhwani andBhaveshKhodiyar (2013) “Profitability Of Techincal Analysis : A Study On S&P CNX Nifty” Quest-Journal of Management and Research, 3(2), 31-41 Vol. III, Issue II 10. Krishna Murthy Inumula (2017) “Application of Optimized Technical Indicators: MACD and RSI”, PARIPEX - INDIAN JOURNAL OF RESEARCH, ISSN - 2250-1991 Volume : 6 | Issue : 3 page 636-640 11. Lorenzo Newsome and Dr. Pamela A. Turner (2007) “Homemade Sector Hedge Funds: Can Investors Replicate the Returns Without Paying the Fees? “Journal of Investing, Winter2007” Electronic copy available at: http://dx.doi.org/10.2139/ssrn.923467 12. MohdNaved and PrabhatSrivasthava(2015),Profitability of Oscillators Used in Technical Analysis for Financial Market, Advances in Economics and Business Management (AEBM) Print ISSN: 2394-1545; Online ISSN: 2394-1553; Volume 2, Number 9; pp. 925-931 13. PanagiotisRousis and Spyros Papathanasiou (2018)” Is Technical Analysis Profitable on Athens Stock Exchange?” Mega Journal of Business Research Volume 2018, Article ID 61, 14. Pushpa BV, Sumithra C.G, MadhuriHegde (2017), “Investment Decision Making Using Technical Analysis: A Study on Select Stocks in Indian Stock Market”,IOSR Journal of Business and Management, ISSN: 2319-7668. Volume 19, Issue 9. Ver. VI, PP 24-33 15. Vimala.s, Saranya.P.B,Saranya.R (2014) “A Study on Analysis of Equity Share Price Behavior of the Selected Industries” GLOBAL RESEARCH ANALYSI, Volume : 3 | Issue : 4 | April 2014 • ISSN No 2277 – 8160, Page-202 16. Valarmathi A, Kowsalya P (2016) “A Study on the Technical Analysis of NSE Towards it Stocks with Reference to Indian Stock Market”, International Journal of Advances in Management and Economics, Vol.5| Issue 4|22-29 17. Wong, Wing Keung, MeherManzur, and Boon-KiatChew (2010) "How rewarding is technical analysis? Evidence from Singapore stock market "Applied Financial Economics13.7 Page 543-551 Authors: Shravankumar Nayak, D.R Joshi Paper Title: Wind – Hydro Coordination for Enhanced Worth of Wind Power and Potentials in Karnataka State of India Abstract: The augmented demand for the power across the globe has resulted in the growth of non-conventional sources of energy as an appendage to the conventional sources. The large scale grid connected wind power systems have become one of the better alternatives among renewable energy based power generation methods. However the intermittency of wind power is one of the major limitations in the effective harvesting of energy leading to its reduced worth. Several methods are proposed and implemented to overcome the issue of wind power intermittency. In this paper a coordinated approach between wind and dispatchable and geographically proximal hydro power station is proposed to enhance the value of wind power. A MATLAB SIMULINK model of a wind power station is developed. Three potential sites with the conducive operating conditions for the implementation of the proposed scheme have been considered for the analysis. The results obtained are correlated to the enhanced worth of wind power. 5. Index Terms: Groundwater Fluctuation, Hydrologic Parameter, Infiltration, Rainfall-Runoff. 23-29

References: 1. Ministry of New and Renewable Energy, Press Information Bureau Government of India 27- December-2017. 2. Karnataka Renewable Energy corporation Limited, Project allotted status available at http://kredlinfo.in/wind/Allotted_status.pdf 3. T.V. Ramachandra, B.V. Shruthi, ”Wind Energy Potential Mapping in Karnataka, India, using GIS,” Energy Conversion and Management, Volume 46, Issues 9–10, 2005, Pages 1561-1578, ISSN 0196-8904 4. Nayak Shravankumar, Joshi Diwakar, "Wind power dispatchability issues and enhancement methods-A review," IEEE International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp.1,7, 19-20 March 2015. 5. H Ibrahim,M Ghandour, M Dimitrova, A. Ilinca, J.Perron,”Integration of wind energy into electricity systems: Technical challenges and actual solutions”, Elsevier Energy Procedia 2011. 6. Li Jianlin, Liang Liang, Yangshuili, Hui Dong,” Study on Energy storage system smoothing wind power fluctuations”, International Conference on Power System Technology IEEE 2010 7. W Z Chen, Q B Lee, ”Energy storage sizing for dispatchability of wind form”, 11th International Conference on Environment and Electrical Engineering EEEIC, 2012 8. Sharavathy Pumped Storage Project(2000 MW), Prefeasibility report, April 2017 available at environmentclearance.nic.in/.../13_Jun_2017_150120447HIN21JHA Prefeasibility Report 9. Tyhly: A. Tuohy, M. OΓÇÖMalley, Pumped storage in systems with very high wind penetration, Energy Policy, Volume 39, Issue 4, 2011, Pages 1965-1974, ISSN 0301-4215. 10. Bahtiyar Dursun, Bora Alboyaci, The contribution of wind-hydro pumped storage systems in meeting Turkey's electric energy demand, Renewable and Sustainable Energy Reviews, Volume 14, Issue 7, 2010, Pages 1979-1988, ISSN 1364-0321 11. Shravankumar Nayak, D R Joshi, V R Sheelavant, Performance Analysis of Grid Connected Wind Turbine Generators on the Basis of Energy Harvesting - A Case Study, International Journal of Advanced Research Trends in Engineering and Technology (IJARTET) Vol. 4, Issue 6, June 2017 12. Water resource Information System, National Remote Sensing Centre (NRSC), Government of India, available at ://india-wris.nrsc.gov.in 13. V. Neimane,"Collaboration between Wind Power and Hydro power", Vattenfall Utveckling AB, Report No. U03:78, Stockholm, 2003. 14. The Power to Change: Solar and Wind Cost Reduction Potential to 2025 (Abu Dhabi: 2017), http://www.irena.org/DocumentDownloads/Publications/IRENA_Power_to_Change_2016.pdf. P. Vijayakumar, Saravanan G, Adithya Narayan, Deepak B, Ragul S, Tamilselvi, Rajashree. R, T. Authors: Poongkuzhali, Xiao-Zhi Gao Paper Title: Iot Based Smart Wallet Security and Fake Currency Detection System Abstract: The main objective is to create a security system for wallet based on RFID technology and also keep an account of how much money is coming inside and going out of the wallet which is done using tcs3200 colour sensor by which we can have an account of the amount of money spent and update the same on the mobile app. So, this project basically alerts the person if the wallet is missing from his/her pocket and also shares the location of the same and also gives the information of how much he/she has spent. The major components used in this paper include Raspberry PI, RFID Reader, RFID Tag, GPS Module, and TCS3200 Colour Sensor. Whenever the RFID card is placed near to the reader, the RFID reader obtains the UID (unique key) information about the card. The location of the wallet is obtained using the GPS Module. This detail is notified to user when the wallet is not connected. The status obtained by the RFID reader and the GPS module is collected by Raspberry PI. Using the PI’s WIFI, the details are posted onto the cloud. All the details posted onto the cloud are accessed via the APP and also through a website portal in case of any emergency

Keywords: RFID Technology, Cloud, Android App, WIFI, Raspberry Pi, Internet of Things, Wallet, Fake currency detection method.

References: 1. G. I. Ma, H. C. Lee, J. H. Yi, H. Ki, D. Choi and S. H. Jin, "Human verifiable authentication schemes geared to smart wallet applications," 2011 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, 2011, pp. 141-142. 6. 2. E. Sakalauskas, J. Muleravicius and I. Timofejeva, "Computational resources for mobile E-wallet system with observers," 2017 Electronics, Palanga, 2017, pp. 1-5.doi: 10.1109/ELECTRONICS.2017.7995226 3. M. Mohandes, "A smart card management and application system," 2010 IEEE International Conference on Progress in Informatics and 30-34 Computing, Shanghai, 2010, pp. 1220-1225. doi: 10.1109/PIC.2010.5687971 4. R. N. Akram, K. Markantonakis and K. Mayes, "Recovering from a Lost Digital Wallet," 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, Zhangjiajie, 2013, pp. 1615-1621.doi: 10.1109/HPCC.and.EUC.2013.227 5. T. S. Perry, "Electronic money: Toward a virtual wallet," in IEEE Spectrum, vol. 34, no. 2, pp. 18-19, Feb. 1997. doi: 10.1109/MSPEC.1997.570819 6. E. Yavuz, A. K. Koç, U. C. Çabuk and G. Dalk?l?ç, "Towards secure e-voting using ethereum blockchain," 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, 2018, pp. 1-7.doi: 10.1109/ISDFS.2018.8355340 7. S. R. Darade and G. R. Gidveer, "Automatic recognition of fake Indian currency note," 2016 International Conference on Electrical Power and Energy Systems (ICEPES), Bhopal, 2016, pp. 290-294. doi: 10.1109/ICEPES.2016.7915945 8. Upadhyaya, V. Shokeen and G. Srivastava, "Counterfeit Currency Detection Techniques," 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, 2018, pp. 394-398. 9. N. Rathee, A. Kadian, R. Sachdeva, V. Dalel and Y. Jaie, "Feature fusion for fake Indian currency detection," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 1265-1270. 10. S. Murthy, J. Kurumathur and B. R. Reddy, "Design and implementation of paper currency recognition with counterfeit detection," 2016 Online International Conference on Green Engineering and Technologies (IC-GET), , 2016, pp. 1-6. 11. M. S. Uddin, P. P. Das and M. S. A. Roney, "Image-based approach for the detection of counterfeit banknotes of Bangladesh," 2016 5th International Conference on Informatics, Electronics and Vision (ICIEV), Dhaka, 2016, pp. 1067-1072. 12. Firebase, http://firebase.com 13. Tommasini, Giorgio. "Wallet anti-theft device." U.S. Patent No. 4,780,704. 25 Oct. 1988. 14. https://developer.android.com/training/basics/firstapp/index.html 15. https://www.raspberrypi.org/ Authors: Padmavathi. U, Narendran Rajagopalan Paper Title: A Research on impact of Blockchain in Healthcare Abstract: Blockchain refers to a distributed ledger technology that represents an innovation in recording and sharing information without the need for a trusted third party. Blockchain technology offers new tools for security and privacy concerns. Marching towards digitization and analytics, this technology emerges as a promising solution for authentication and authorization issues. It sounds so amazing that this technology that originated with cryptocurrencies could not only 7. be applied in digital contracts, financial and public records, and property ownership but also in medicine, education, science and so on. The use case of this technology springs up in every possible direction. This article first analyses the 35-40 need for this breakthrough technology and explains how this technology works. This work presents a review on various types of blockchain, the consensus mechanisms used, their advantages and limitations. It provides an overview on the various use cases of this technology. This work mainly focuses on its application in Healthcare. The goal of this article is to analyze the usage of Blockchain technology in various fields of Healthcare such as Electronic Health Record, Health Insurance, Biomedical Research, Drug Supply, Medical Education, Remote Patient Monitoring, Interoperability, Location Sharing etc., It investigates the current research trends and finds the gaps and limitations of these approaches. Moreover, it proposes some enhancements to fill in the gaps in the present approach. This work also analyses the importance of Wearable Internet of Things (IoT) devices in HealthCare and the integration of these devices with Blockchain. Finally, this work concludes by comparing Blockchain 3.0 with previous versions.

Keywords: BlockChain, Healthcare, IoT, authorization, authentication, security,

References: 1. “Blockchain: Opportunities for health care | US.” [Online]. Available: https://www2.deloitte.com/us/en/pages/public- sector/articles/blockchain-opportunities-for-health-care.html. [Accessed: 05-Dec-2018]. 2. “Types of Blockchains & DLTs (Distributed Ledger Technologies).” [Online]. Available: https://blockchainhub.net/blockchains-and- distributed-ledger-technologies-in-general/. [Accessed: 03-Jan-2019]. 3. “Basic Primer: Blockchain Consensus Protocol - Blockgeeks.” [Online]. Available: https://blockgeeks.com/guides/blockchain-consensus/. [Accessed: 04-Jan-2019]. 4. W. J. Gordon and C. Catalini, “Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability,” Comput. Struct. Biotechnol. J., vol. 16, pp. 224–230, 2018. 5. X. Zheng, A. Vieira, S. L. Marcos, Y. Aladro, and J. Ordieres-Meré, “Activity-aware essential tremor evaluation using deep learning method based on acceleration data,” Park. Relat. Disord., 2018. 6. P. Zhang, J. White, D. C. Schmidt, G. Lenz, and S. T. Rosenbloom, “FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data,” Comput. Struct. Biotechnol. J., vol. 16, pp. 267–278, 2018. 7. I. Radanović and R. Likić, “Opportunities for Use of Blockchain Technology in Medicine,” Appl. Health Econ. Health Policy, 2018. 8. H. Wang and Y. Song, “Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain,” J. Med. Syst., vol. 42, no. 8, 2018. 9. H. Li, L. Zhu, M. Shen, F. Gao, X. Tao, and S. Liu, “Blockchain-Based Data Preservation System for Medical Data,” J. Med. Syst., vol. 42, no. 8, pp. 1–13, 2018. 10. K. Fan, S. Wang, Y. Ren, H. Li, and Y. Yang, “MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain,” J. Med. Syst., vol. 42, no. 8, pp. 1–11, 2018. 11. C. Esposito, A. De Santis, G. Tortora, H. Chang, and K. K. R. Choo, “Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?,” IEEE Cloud Comput., vol. 5, no. 1, pp. 31–37, 2018. 12. S. L. Cichosz, M. N. Stausholm, T. Kronborg, P. Vestergaard, and O. Hejlesen, “How to Use Blockchain for Diabetes Health Care Data and Access Management: An Operational Concept,” J. Diabetes Sci. Technol., p. 193229681879028, 2018. 13. Q. Xia, E. B. Sifah, K. O. Asamoah, J. Gao, X. Du, and M. Guizani, “MeDShare: Trust-Less Medical Data Sharing among Cloud Service Providers via Blockchain,” IEEE Access, vol. 5, no. c, pp. 14757–14767, 2017. 14. A.-S. Kleinaki, P. Mytis-Gkometh, G. Drosatos, P. S. Efraimidis, and E. Kaldoudi, “A Blockchain-Based Notarization Service for Biomedical Knowledge Retrieval,” Comput. Struct. Biotechnol. J., p. #pagerange#, 2018. 15. K. N. Griggs, O. Ossipova, C. P. Kohlios, A. N. Baccarini, E. A. Howson, and T. Hayajneh, “Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring,” J. Med. Syst., vol. 42, no. 7, pp. 1–7, 2018. 16. “Blockchain and the Pharmaceutical Supply Chain: Driving Security and Transparency | AWS Partner Network (APN) Blog.” [Online]. Available: https://aws.amazon.com/blogs/apn/blockchain-and-the-pharmaceutical-supply-chain-driving-security-and-transparency/. [Accessed: 05-Dec-2018]. 17. J. H. Tseng, Y. C. Liao, B. Chong, and S. W. Liao, “Governance on the drug supply chain via gcoin blockchain,” Int. J. Environ. Res. Public Health, vol. 15, no. 6, 2018. 18. T. Bocek, B. B. Rodrigues, T. Strasser, and B. Stiller, “Blockchains everywhere - a use-case of blockchains in the pharma supply-chain,” 2017 IFIP/IEEE Symp. Integr. Netw. Serv. Manag., pp. 772–777, 2017. 19. L. Zhou, L. Wang, and Y. Sun, “MIStore: a Blockchain-Based Medical Insurance Storage System,” J. Med. Syst., vol. 42, no. 8, 2018. 20. “What is internet of things (IoT)? - Definition from WhatIs.com.” [Online]. Available: https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT. [Accessed: 05-Dec-2018]. 21. “What is a Wearable Device? - Definition from Techopedia.” [Online]. Available: https://www.techopedia.com/definition/31206/wearable- device. [Accessed: 05-Dec-2018]. 22. “Five IoT Predictions For 2019.” [Online]. Available: https://www.forbes.com/sites/danielnewman/2018/07/31/five-iot-predictions-for- 2019/#2ef2a7896edd. [Accessed: 05-Dec-2018]. 23. C. Qu, M. Tao, and R. Yuan, “A Hypergraph-Based Blockchain Model and Application in Internet of Things-Enabled Smart Homes,” 2018. 24. A. Panarello, N. Tapas, G. Merlino, F. Longo, and A. Puliafito, Blockchain and iot integration: A systematic survey, vol. 18, no. 8. 2018. 25. A. J. GILL, J. A. STIRMAN, and C. E. GORDON, “Lactating adenoma of breast.,” Tex. State J. Med., vol. 49, no. 4, pp. 231–233, 1953

Authors: Jha Suchita, Joshi Sujata Paper Title: Role of Augmented Reality Applications for Smart City Planning Abstract: India is on the cusp of technology transformation resulting in adoption of technology. . In this context when we look into the technological advancements, there are various technological tools which are affecting us and one of them is Augmented Reality (AR). Especially in the context of smart city initiative of the Indian Government, upcoming technologies like AR play a vital role for development of the smart city infrastructure. Hence the objective of this study is to conceptualize a model for smart city infrastructure from perspective of 4 pillars of smart city planning viz: Mobility, Connectivity, Security and Sustainability. The paper adopts a narrative literature review based approach in order to arrive at a conceptual model on the basis of evaluation, and analysis of literature on the topic under investigation in this study. This study has implications for the academicians, practitioners and society at large as it adds to the academic literature on use technology in smart city infrastructure building and the urban planners and government officials can use this 8. technology to improve city services, infrastructure, environment and quality of life of the citizens. 41-46 Keywords: Augmented Reality, Smart city Planning, Smart Infrastructure, Sustainability, Connectivity, Mobility, Security.

References: 1. India.gov.in portal. “Smart Cities Mission. Building a smart India”. Available at https://www.india.gov.in/spotlight/smart-cities-mission- step-towards-smart-india Access on : 24thMay,2019 2. Euro monitor International, “Smart Cities: Empowering the Globe’s Urban Ecosystems” (June 2018). Available at www.euromonitor.com/smart-cities-empowering-the-globes-urban-ecosystems/report Accessed on: 27th May, 2019 3. Smart Cities Association. “Global smart cities market to reach a whopping $3.5 trillion by 2026” 2017[online].Available athttps://www.smartcitiesassociation.org/index.php/mediacorner/news/1-global-smart-cities-market-to-reach-a-whopping-3-5-trillion-by- 2026 access on : 20th May,2019 4. Pokric, B., Krco, S., & Pokric, M. “Augmented reality based smart city services using secure IoT infrastructure” (2014). [online] Proceedings - 2014 IEEE 28th International Conference on Advanced Information Networking and Applications Workshops, (pp. 803-808). IEEE WAINA 2014. Available at https://doi.org/10.1109/WAINA.2014.127Accessed on : 19th May,2019 5. Rashid, Zulqarnain, Seguí., Joan; Melià., Pous Rafael; Peig., Enric. “Using Augmented Reality and Internet of Things to improve accessibility of people with motor disabilities in the context of Smart Cities.” (2017). [online] Future Generation Computer Systems 76. Pp- 248-261 Available at 10.1016/j.future.2016.11.030. Accessed on : 10th May,2019 6. Ozcan, U., Arslan, A., Ilkyaz, M., & Karaarslan, E “An augmented reality application for smart campus urbanization: MSKU campus prototype.” (2017). ICSG 2017 - 5th International Istanbul Smart Grids and Cities Congress and Fair. Available at https://doi.org/10.1109/SGCF.2017.7947610 Accessed on : 27th May,2019 7. B.Pokric, S.Krco, D.Drajic, M. Pokric et al. “Augmented Reality enabled IoT services for environmental monitoring utilising serious gaming concept”. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, volume: 6, number: 1, pp. 37-55. (2015). 8. Karl, Rehrl., Elisabeth, Häusler., Sven, Leitinger., Daniel, Bell. “Pedestrian navigation with augmented reality, voice and digital map: final results from an in situ field study assessing performance and user experience.” Journal of Location Based Services. Volume 8, Issue 2, Pages: 75-96. (2014). 9. Francesca, Bertacchini., Eleonora, Bilotta., Manuela, Carini., Lorella, Gabriele., Pietro, Pantano., Assunta, Tavernise “Learning in the smart city: A virtual and augmented museum devoted to chaos theory” . (2012).. International Conference on Web-Based Learning. Pages: 261- 270. 10. Osamah Rabab’ah , Abrar Omar Alkhamisi, Amin Saif Ahmad “Measure Quality Augmented Reality Tourist Using in Mobile Technology.” International Journal of Engineering Research and Development Volume 10, Issue 5 (May 2014), PP.26-40. (2014). 11. Díaz H. Marjury; Barberán C. Karen; Martínez-M. Diana; López F. Gabriel “Offline mobile application for places identification with augmented reality” 2017).. Available at DOI: 10.1109/ICEDEG.2017.7962546. Accessed on : 20th May,2019 12. Roberto Pierdicca, Emanuele Frontoni, Primo Zingaretti, Eva Savina Malinverni, Andrea Galli, Ernesto Marcheggiani, Carlos Smaniotto Costa “Cyber archaeology: improved way findings for archaeological parks through mobile augmented reality” (2016).[online] International Conference on Augmented Reality, Virtual Reality and Computer Graphics. Pages 172-185 13. García-Crespo, Á., González-Carrasco, I., López-Cuadrado, J.L., Villanueva, D., González, Á. “CESARSC: Framework for creating cultural entertainment systems with augmented reality in smart cities.” (2016). Computer Science and Information Systems 13(2):395–425 Available at 10.2298/CSIS150620006G Accessed on : 16th May,2019 14. Brum, Manoela Rogofski., Rieder, Rafael. “Virtual reality applications for smart cities in health: A systematic review” .XVII Symposium on Virtual and Augmented Reality. Pages: 154-159. (2015). 15. Bovcon N., Vaupotič A., Klemenc B., Solina F. “Augmented Reality: A Case Study in the Domain of Fine Arts.” Lecture Notes in Computer Science, vol 7946. Springer, Berlin, Heidelberg. (2013). 16. Bellini, A. Luddi., C; Naldini.,S; Ghetti.,C., Bellini.,E., and Bergamin., “Once Upon a Time: A Proof of Concept Augmented Reality Collaborative Mobile Application to Discover City heritage” .International Conference on Signal-Image Technology & Internet-Based Systems, pp. 358–363. . (2013). 17. Lin, Cheng-Min & Lin, Tzu-Chi & Lin, Yu-Ching & Wang, Chao-Ming & Dow, Chyi-Ren. “Community Interaction and Marketing Using 3D Coloring Augmented Reality in Zhongxing New Village” (2018).15th International Symposium on Pervasive Systems. 272-276. Available at 10.1109/I-SPAN.2018.00052. DOI:10.1109/i-span.2018.00052Accessed on : 20th May, 2019 18. Al-Jabi Muhannad, Sammaneh Haya “Toward Mobile AR-Based Interactive Smart Parking System”. IEEE 16th International Conference on Smart City. Pages: 1243-1247., 2018 19. Ramos, F.; Trilles, S.; Torres-Sospedra, J.; Perales, F.J. “New Trends in Using Augmented Reality Apps for Smart City Contexts” (2018). [online]ISPRS Int. J. Geo-Inf. 7(12), 478. Available at https://doi.org/10.3390/ijgi7120478. Accessed on: 18th May,2019 20. Sharma. Santosh; Kaikini. Yash; Bhodia., Parth; Vaidya., Sonali “Markerless Augmented Reality based Interior Designing System” (2018). [online] International Conference on Smart City and Emerging Technology (ICSCET). Pages: 1-5. Available at 10.1109/ICSCET.2018.8537349 Accessed on : 4th May,2019 21. Demir Ömer Faruk, Karaarslan Enis ,”Augmented Reality Application for Smart Tourism” ,6th International Istanbul Smart Grids and Cities Congress and Fair (ICSG)2018..Available at DOI:10.1109/SGCF.2018.8408965 Accessed on : 14th May,2019 22. Smart Regions Initiative “The Pillars of Smart Cities.” (June 18, 2018). [online] Available at https://www.smartregions.org/blog/the-four- smart-city-pillars Accessed on : 29thapril,2019 23. Fink, Arlene. Conducting Research Literature Reviews: From the Internet to Paper. Fourth edition. Thousand Oaks, CA: SAGE, 2014. 24. Carnwell R, Daly W “Strategies for the construction of a critical review of the literature”. Nurse Educ Pract 1: 57–63. (2001) 25. Cronin, P., Ryan, F., Coughlan, M., “Undertaking a literature review: a step-by-step approach” British Journal of Nursing, 2008, Vol 17, No 1 (2008). 26. Beecroft C, Rees A, Booth A “Finding the evidence. In: Gerrish K, Lacey A, eds.” The Research Process in Nursing. 5th edn. Blackwell Publishing, Philadephia: 90–106. (2006) 27. Sachsenmeier, R. et al “Guide to Open Government chapter 3 - Smart Cities” 2015.[online] Available athttps://www.researchgate.net/profile/Piet_Kommers/publication/282219165_Guide_to_European_Open_Government_C/links/56084ed608 ae5e8e3f3a8a58/Guide-to-European-Open-Government-C.pdf Accessed on : 7th May,2019 28. Kounavis, C. D., Kasimati, A. E., & Zamani, E. D. “Enhancing the tourism experience through mobile augmented reality: Challenges and prospects.” International Journal of Engineering Business Management, 4, 10. (2012). 29. Curtin, C., “Augmented Reality to Improve Urban Mobility. CIO Review.” (2019) [Online] available at https://ar- vr.cioreview.com/cxoinsight/augmented-reality-to-improve-urban-mobility-nid-14344-cid-135.html Accessed on : 30th April,2019 30. Tison, J. D., Smolinski, Z. J., O'donnell, J. P., & Doorhy, B. F “U.S. Patent Application No. 13/426,065.” (2012). 31. Alton, Liz. “How augmented reality can deliver impactfulcommunications”10thOctober, 2017 [Online]. Available at https://blog.investisdigital.com/how-augmented-reality-can-deliver-impactful-communications Accessed on : 22nd May,2019 32. Finn, G. “Why Augmented Reality and Virtual Reality Will be Important for Your Business Entrepreneur” 12th September, 2017 [online] Available at https://www.entrepreneur.com/article/300071. Accessed on : 25th May, 2019 33. Fortem “Augmented Reality for Physical Security” 2016 [Online]. Available at http://fortem.com/augmented-reality-for-physical-security/ Access on : 19th May,2019 34. Apvrille, A. “U.S. Patent Application No. 10/178,130”., 2018 [Online] Available at https://patentimages.storage.googleapis.com/36/dc/ba/6b59bf39b80c55/US20180077200A1.pdf Accessed on : 25th May,2019 35. Zhu, W., Owen, C. B., Li, H., & Lee, J. H. “Personalized in-store e-commerce with the promopad: an augmented reality shopping assistant.” (2004). Electronic Journal for E-commerce Tools and Applications, 1(3). 36. Kameda, Y., Takemasa, T., & Ohta, Y. “Outdoor see-through vision utilizing surveillance cameras” (2004, November). In Proceedings of the 3rd IEEE/ACM International Symposium on Mixed and Augmented Reality pp. 151-160). Available at doi>10.1109/ISMAR.2004.45 accessed on : 21st May,2019 37. Curtin, G. “6 ways augmented reality can help governments see more clearly”, 13th Feb, 2017. [Online]World Economic Forum. Available at https://www.weforum.org/agenda/2017/02/augmented-reality-smart-government/ accessed on : 20th May,2019 38. Damiani, L., Demartini, M., Guizzi, G., Revetria, R., and Tonelli, F., “Augmented and virtual reality application in industrial system: A quantitative review towards the industry 4.0.”, IFAC PapersOnLine 51-11 (2018) 624–630, 2018 39. Segovia, D., Mendoza, M., Mendoza, E., and Gonzalez, E., “Augmented Reality as a Tool for Production and Quality Monitoring” (2015). [online] Procedia Computer Science. Volume 75, Pages Available at 291-300. https://doi.org/10.1016/j.procs.2015.12.250 Accessed on : 5th May,2019 40. Bulearca, M., & Tamarjan, D. “Augmented reality: A sustainable marketing tool” .Global business and management research: An international journal, 2(2), 237-252., (2010).

9. Authors: J. Rajaram Paper Title: Fuzzy Logic Based Voice Recognition as per Their Gender and Age Group Abstract: Human voice is the very important field in digital speech processing. In the coming technologies every system will be based on the human voice. The system will be locked and unlocked by human voice. In this research, we classify the voice ac-cording to their age groups. We can recognize the voice by calculating many various parameters such as pitch, power amplitude and THD and many more. There are many approaches through which we can recognize the gender’s voice such as Hidden Markov Model [HMM], Dynamic Time Warping [DTW] etc. This paper is basically depending on the voice perception system which helps in to differentiate the voice between the gender’s voice and also differentiate the voice depends on age gp to 12yrs children voice with the use of SVM and Gaussian membership function.

Keywords: voice recognition system, fuzzy logic, genetic algorithm, age based voice classification, Support Vector Machine(SVM), Gaussian Mixture Model(GMM)

References: 1. Iman Esmailia, Nader Jafarnia Dabanloosa, Mansour Valib "Automatic classification of speech dysfluencies in continuous speech based on similarity measures and morphological image processing tools", Elsevier Ltd., 2016. 2. Lokhande, Navnath S Nehe, Pratap S Vikhe, "Voice Activity Detection Algorithm for Speech Recognition Applications", International Conference in Computional Intelligence, 2011. 3. Arjuwan M. Abduljawad Al-Jawadi,"Speech Recogntion And Retrieving using Fuzzy Logic System", Technical College, Foundation Of Technical Engineering, Mosul, Iraq, 2009. 4. Bachu R.G., KopparthiS., Adapa B., Barkhana B.D., "Seperation Of Voiced and Unvoiced using Zero crossing rate and Energy of the Speech Signal",University Of BridgePort. 5. Atif Khan,Vikas Kumar, Santosh Kumar,"Speech Based Gender Identification Using FuzzyLogic", International Journal of 47-51 Innovative Research in Science,Engineering and Technology,2017. 6. Gayathri S, Mugundhan B, "Identification Of Age Using Voice Recognition", International Journal Of Advances in Electronics and Computer Science, ISSN: 2393-2835, Vol. 4, Issue-7, 2017. 7. Shivaji J Chaudhari, Ramesh M Kagalkar, "Methodology for Gender Identification, Classification and Recognition of Human Age", International Journal of Computer Applications (0975-8887), National Conference on Advances in Computing, 2015 8. Ahuja Pooja, Vyas JM, "A Development Overview Of Voice as a Steadfast Identification Technique", Journal of Forensic Research,ISSN: 2157-7145, Vol 6, Issue 3, 2015. 9. Syed Mostafa Mmirhassani, Alireza Zourmand, and Hua-Nong Ting, "Age estimation based on children's voice: A fuzzy- based decision fusion strategy", The Scientific World Journal, Vol 2014, Article ID 534064. 10. Venkatesan, C., P. Karthigaikumar, and S. Satheeskumaran. "Mobile cloud computing for ECG telemonitoring and real-time coronary heart disease risk detection." Biomedical Signal Processing and Control 44 (2018): 138-145. 11. Yong-Qian Ying, Peng-Yung Woo, "Speech Recognition Using Fuzzy Logic", IEEE, 1999 12. Sahidullah, Md.; Saha, Goutam (May 2012), "Design, analysis and experimental evaluation of block based transformation in MFCC computation for speaker recognition". Speech Communication 54 (4): 543-565. doi:10.1016/j.specom.2011.11.004. 13. X. Huang, A. Acero, H.W. Hon, Spoken Language Processing: A Guide to Theory, Algorithm, and System Development, Prentice Hall, New Jersey, 2000, October. 14. https://sciencedaily.com/terms/vocal_folds.htm 15. https://en.wikipedia.org/wiki/Vocal_cords 16. Kamil Aida-zade, Anar Xocayev, Samir Rustamov, "Speech recognition using Support Vector Machine", IEEE, 2016 17. Shivaji J. Chaudhari, Ramesh M. Kagalkar, "Automatic Speaker Age Estimation and Gender Dependent Emotion Recognition", International Journal of Computer Applications,(0975 - 8887), Volume 117 - No. 17, May 2015.

Authors: R.Ravindraiah, S.Chandra Mohan Reddy Evaluation of Conventional methods for the Detection of Lesions in Diabetic Retinopathy Images: A Paper Title: Research Abstract: Diabetes Mellitus (DM) is a sporadic ailment which arises with the vagaries in blood glucose levels. Prolonged history of DM will result in retinal vasculature impediments and leads to Diabetic Retinopathy (DR). The patho is characterized by leakage of blood, fat and protein based particles into the macula and instigates the vision problems. The reliability Conventional clinician’s screening methods is dependent on skilled professionals for diagnosis and screening. It costs to a great deal of time with manual labor and hence there is a great need to automate DR detection. Usage of image processing and machine learning approach to sense various retinopathy aberrations gained huge attraction in recent past. This paper reveals various DR detection and classification methods, including tools, implemented techniques and datasets used. It wishes to help researchers by giving brief literature review of merits and demerits of existing methods, so that it will help them to plan future developments. 10. Index Terms: Diabetes Mellitus (DM), Diabetic Retinopathy (DR), Retinal lesions 52-57 References: 1. The International Agency for the Prevention of Blindness (IAPB). Diabetic Retinopathy. [Online]. 2. Fong DS, Aiello L, Gardner TW, et al. Retinopathy in diabetes. Diabetes Care 2004; 27 Suppl 1: S84-87. 3. R.Ravindraiah and S.Chandra Mohan Reddy. An Automated Exudate detection in Diabetic Retinopathy fundus images using Multi Kernel Spatial Fuzzy C means clustering method, International Journal of Engineering and Technology (UAE), Vol 7 (1.8), pp 10-14, Feb 2018, ISSN: 2227-524X. 4. R.Ravindraiah and S.Chandra Mohan Reddy. Exudates detection in Diabetic Retinopathy images using Possibilistic C means clustering algorithm with induced spatial constraint, Advances in Intelligent Systems and Computing, Springer Nature Series, Singapore, pp 455-463, March 2018. 5. R.C.Gonzalez and R.E. Wood, “Digital image processing using Matlab”, Pearson Education Inc. and Dorling Kindersley Publishing Inc. 6. R.P. Phillips, J. Forrester and P. Sharp. Automated detection and quantification of retinal exudates, Graefe Archive for Clinical Experimental Ophthalmology, 231, pp 90-94, 1993. 7. G. G. Gardner, D. Keating, T. H. Williamson and A. T. Elliott. Automatic detection of diabetic retinopathy using an artificial neural network: a screening tool, Br J Ophthalmol 80 (1996) pp 940-944. 8. Ege B, Larsen O and Hejlesen O. Detection of abnormalities in retinal images using digital image analysis. 1999;8 pp 33–40. 9. H. Wang, W. Hsu, K. Goh and M. Lee. An effective approach to detect lesions in colour retinal images, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Vol. 2, pp. 181–187 2000. 10. C. Sinthanayothin, J.F. Boyce, T.H. Williamson and H.L. Cook. Automated Detection of Diabetic Retinopathy on Digital Fundus Image, International Journal of Diabetic Medicine, vol. 19, pp. 105-112, 2002. 11. T. Walter, J. C. Klein, P. Massin, and A. Erginay. A Contribution of Image Processing to the Diagnosis of Diabetic Retinopathy—Detection of Exudates in Color Fundus Images of the Human Retina, IEEE Trans. Med.Imag., Vol. 21, No. 10, pp. 1236-1243, 2002. 12. A. Osareh, M. Mirmehdi, B. T. Thomas and R. Markham, Classification and localisation of diabetic-related eye disease, in: Proceedings of the 7th European Conference on Computer Vision-Part IV, ECCV '02, 2002. 13. C. Sinthanayothin, V. Kongbunkiat, S. Phoojaruenchanachai and A. Singalavanija, Automated screening system for diabetic retinopathy: Image and Signal Processing and Analysis. Proceedings of the 3rd International Symposium on, Vol. 2, 2003, pp. 915 _ 920. 14. Osareh, M. Mirmehdi, B. Thomas and R. Markham, Automated identification of diabetic retinal exudates in digital colour images, Br J Ophthalmol 87 (2003) pp. 1220-1223. 15. C. I. Sanchez, R. Hornero, M. I. Lopez and J. Poza, Retinal image analysis to detect and quantify lesions associated with diabetic retinopathy, in: Engineering in Medicine and Biology Society, 26th Annual International Conference of the IEEE, Vol. 1, 2004, pp. 1624 _1627. 16. Usher D, Dumskyj M, Himaga M, Williamson TH, Nussey S and Boyce J, “Automated detection of diabetic retinopathy in digital retinal images:a tool for diabetic retinopathy screening, Diabet Med. 2004 Jan;21(1):84-90. 17. E. Grisan and A. Ruggeri. A hierarchical Bayesian classification for non-vascular lesions detection in fundus images, in IFMBE Proc, 2005, pp. 1727-1983. 18. X. Zhang and O. Chutatape. Top-down and bottom up strategies in lesion detection of background diabetic retinopathy, in IEEE Conference on Computer Vision and Pattern Recognition. Proceedings. IEEE, 2005, vol. 2, pp. 422-428. 19. Alan D Fleming, Sam Philip, Keith A Goatman, Graeme J Williams, John A Olson and Peter F Sharp, Automated detection of exudates for diabetic retinopathy screening. Physics In Medicine And Biology 52 (2007) 7385–7396 20. Meindert Niemeijer, Bram van Ginneken, Stephen R. Russell and Maria S. A. Suttorp-Schulten and Michael D. Abra`moff, Automated Detection and Differentiation of Drusen, Exudates, and Cotton-Wool Spots in Digital Color Fundus Photographs for Diabetic Retinopathy Diagnosis, IOVS, May 2007, Vol. 48, No. 5, pp 2260 - 2267 21. Giri Babu Kande, P.Venkata Subbaiah and T.Satya Savithri. Segmentation of Exudates and Optic Disc in Retinal Images, 6th Indian Conference on Computer Vision, Graphics & Image Processing, 2008 22. Sanchez C.I, Horneo R, Lopez M.I, Aboy M, Poza J and Abasolo D. A novel automatic image processing algorithm for detection of hard exudates based on retinal image analysis, Medical Engineering Physics, vol. 30, no. 3, pp 35, 2008 23. U. R. Acharya, K. C. Chua, E. Y. K. Ng, W. Yu and C. Chee, Application of higher order spectra for the identication of diabetes retinopathy stages, Journal of Medical Systems 32 (2008), pp 481-488. 24. Sopharak, et al. Automatic detection of diabetic retinopathy exudates from nondilated retinal images using mathematical morphology methods, Computerized medical imaging and graphics, vol. 32, pp. 720-727, 2008. 25. Sopharak, K. Thet Nwe, Y. A. Moe, M. N. Dailey and B. Uyyanonvara. Automatic exudate detection with a naïve bayes classifier. In International Conference on Embedded Systems and Intelligent Technology (ICESIT), pages 139–142, 2008. 26. J. Suthammanas, K. Viriyachot, P. Tuntipark, B. Uyyanonvara, K. Krairaksaand C. Duanggate, An automatic diabetic retinopathy tele screening system of thailand, in: Proceedings of the International Symposium on Biomedical Engineering (ISBME 2008), 2008, pp. 88_92. 27. U. R. Acharya, C. M. Lim, E. Y. K. Ng, C. Chee and T. Tamura, Computer-based detection of diabetes retinopathy stages using digital fundus images, Proceedings of the Institution of Mechanical Engineers, Part H: Journal of Engineering in Medicine 223 (5) (2009) 545_553. 28. A. Sopharak, B. Uyyanonvara, and S. Barman. Automatic Exudate Detection from Non-dilated Diabetic Retinopathy Retinal Images Using Fuzzy C-means Clustering, Sensors, pp. 2148-2161, 2009. 29. Maria Gracia, Clara 1. Sanchez, Maria 1. Lopez, Daniel Abcisolo, and Roberto Homero, Neural network based detection of hard exudates in retinal images, Computer Methods and Programs in Biomedicine, vol. 93, no. 1, pp. 9-19, 2009 30. M. García, C. Sánchez, J. Poza, M. López, and R. Hornero. Detection of Hard Exudates in Retinal Images Using a Radial Basis Function Classifier, Annals of Biomedical Engineering, vol. 37, pp. 1448-1463, 2009. 31. Sopharak, B. Uyyanonvara, and S. Barman, Automatic exudate detection for diabetic retinopathy screening, Science Asia, vol. 35, pp. 80-88, 2009. doi: 10.2306/scienceasia1513-1874.2009.35.080 32. C. I. Sánchez, M. García, A. Mayo, M. I. López, and R. Hornero. Retinal image analysis based on mixture models to detect hard exudates, Medical Image Analysis, vol. 13, pp. 650-658, 2009. 33. Alireza Osareh, Bita Shadgar, and Richard Markham, A Computational-Intelligence-Based Approach for Detection of Exudates in Diabetic Retinopathy Images, IEEE Transactions on Information Technology in Biomedicine, Vol. 13, No. 4, July 2009, Pp 535-545 34. Akara Sopharak, Bunyarit Uyyanonvara and Sarah Barman. Automatic Exudate Detection from Non-dilated Diabetic Retinopathy Retinal Images Using Fuzzy C-means Clustering, Sensors 2009, 9, pp 2148-2161; doi:10.3390/s90302148 35. D. Welfer, J.Scharcanski and D.R.Marinho. A coarse-to-fine strategy for automatically detecting exudates in color eye fundus images, Comput.Med. Imaging Graph. 34(3) (2010), pp 228–235. 36. Sopharak et.al.,A. Fine exudate detection using morphological reconstruction enhancement, Applied biomedical engineering, vol. 1, pp. 45-50, 2010. 37. B. Dupas, T.Walter, A.Erginay, R.Ordonez, N.Deb-Joardar, P.Gain, J.Klein, and Massin, Evaluation of automated fundus photograph analysis algorithms for detecting microaneurysms, haemorrhages and exudates, and of a computer- assisted diagnostic system for grading diabetic retinopathy, Diabetes Metab. 36 (2010)213–220. 38. C.Sanchez, M.Niemeijer, S.Schulten, M.Abramo and B.vanGinneken: Improving hard exudate detection in retinal images through a combination of local and contextual information, in: Proceedings of IEEE International Symposium on Biomedical Imaging, 2010,pp 5–8. 39. C. Agurto, V. Murray, E. Barriga, S. Murillo, M. Pattichis, H. Davis, S. Russell, M. Abramo and P. Soliz, Multiscale AM- FM methods for diabetic retinopathy lesion detection, Medical Imaging, IEEE Transactions on 29 (2) (2010) pp 502-512. 40. M. D. Abràmo, J. M. Reinhardt, S. R. Russell, J. C. Folk, V. B. Mahajan, M. Niemeijer and G. Quellec, Automated early detection of diabetic retinopathy, Ophthalmology 117 (6) (2010), pp 1147-1154. 41. C. Sinthanayothin et. al. Image analysis for automatic diagnosis of Diabetic Retinopathy, Journal of Medical Science, Vol. 35,No. 5, pp. 1491- 1501, Jan 2011 42. S. Kavitha, K. Duraiswamy, Kavitha, S and Duraiswamy, K. Automatic detection of hard and soft exudates in fundus images using color histogram thresholding, European Journal of Scientific Research. (2011), 48, pp 493-504. 43. M. U. Akram and S. A. Khan, Automated detection of dark and bright lesions in retinal images for early detection of diabetic retinopathy, J. Med. Syst., doi:10.1007/s10916-011- 9802-2, 2011 44. Rocha, T. Carvalho, H. F. Jelinek, S. Goldenstein, and J. Wainer. Points of interest and visual dictionaries for automatic retinal lesion detection, Biomedical Engineering, IEEE Transactions on, vol. 59, pp. 2244-2253, 2012. 45. S. Ali, D. Sidibé, K. M. Adal, L. Giancardo, E. Chaum and T. P. Karnowski, et al., Statistical atlas based exudate segmentation, Computerized Medical Imaging and Graphics, vol. 37, pp. 358-368, 7// 2013. 46. B.Harangi, I.Lazar and A.Hajdu, Automatic exudate detection using active contour model and region wise classification, in: 34th Annual International Conference of the IEEEE MBS, SanDiego, California USA, 2012, pp.5951–5954. 47. B.Harangi and A.Hajdu, Improving automatic exudate detection based on the fusion of the results of multiple active contours in: IEEE 10th International Symposium on Biomedical Imaging (ISBI), 2013, pp.45–48. 48. B Harangi and A. Hajdu , Automatic exudate detection by fusing multiple active contours and region wise classification, Computers in Biology and Medicine 54 (2014) 156–171 49. X. Zhang, G. Thibault, E. Decencière, B. Marcotegui, B. Laÿ, R. Danno, et al. Exudate detection in color retinal images for mass screening of diabetic retinopathy,Medical Image Analysis, vol. 18, pp. 1026-1043, 2014. 50. C. Pereira, L. Gonçalves, and M. Ferreira. Exudate segmentation in fundus images using an ant colony optimization approach, Information Sciences, vol. 296, pp. 14-24, 2015. 51. Jyoti Prakash Medhi N et.al. An effective fovea detection and automatic assessment of diabetic maculopathy in color fundus images”, Computers in Biology and Medicine 74 (2016) pp 30–44. 52. B. Harangi and A. Hajdu. Automatic exudate detection by fusing multiple active contours and region wise classification, Computers in Biology and Medicine 54 (2014) pp 156–171. 53. Elaheh Imani, Hamid-Reza Pourreza, A novel method for retinal exudate segmentation using signal separation algorithm, Computer Methods and Programs in Biomedicine http://dx.doi.org/doi: 10.1016/j.cmpb.2016.05.016 54. Shuang Yu, Di Xiao and Yogesan Kanagasingam, Exudate Detection for Diabetic Retinopathy With Convolutional Neural Networks, 2017 IEEE, pp 1744- 1747 55. Sudeshna Sil Kar and Santi P. Maity, Automatic Detection of Retinal Lesions for Screening of Diabetic Retinopathy, IEEE Transactions on Biomedical Engineering, 2018, pp 1-9. 56. Sudeshna Sil Kar and Santi P. Maity. Gradation of diabetic retinopathy on reconstructed image using compressed sensing, IET Journal of Image Processing, 2018, Vol. 12 Iss. 11, pp. 1956-1963. 57. Zhentao Gao , Jie Li, Jixiang Guo, Yuanyuan Chen, Zhang Yi and Jie zhong, Diagnosis of Diabetic Retinopathy Using Deep Neural Networks, IEEE Access, Vol 7, pp 3360–3370,2019. 58. J. Staal, M. D. Abramoff, M. Niemeijer, M. A. Viergever, and B. van Ginneken. Ridge-based vessel segmentation in color images of the retina, IEEE Trans. Med. Imag., vol. 23, no. 4, pp. 501–509, 2004. 59. D. Hoover, V. Kouznetsova, and M. Goldbaum. Locating blood vessels in retinal images by piecewise threshold probing of a matched filter response, IEEE Trans. Med. Imag, 19 (3), pp. 203–210, 2000. 60. T. Kauppi et al., DIARETDB0: Evaluation database and methodology for diabetic retinopathy algorithms, Lappeenranta Univ. Technol., Lappeenranta, Finland, Tech. Rep., 2006. 61. T. Kauppi, V. Kalesnykiene, J.-K. Kamarainen, L. Lensu, I. Sorri, and A. Raninen, DIARETDB1 diabetic retinopathy database and evaluation protocol, in Proc. 11th Conf. Med Image Understand. Anal., Aberystwyth, Wales, Jul. 2007, pp. 61– 65. 62. Retinopathy Online Challenge (ROC) Database (December 12, 2015), http://webeye.ophth.uiowa.edu/ROC/ 63. E. Decencière et al., Feedback on a publicly distributed image database: The messidor database, Image Anal. Stereology, vol. 33, no. 3, pp. 231–234, 2014. [Online]. 64. High Resolution Fundus (HRF) Image Database (December 12, 2015), https://www5.cs.fau.de/research/data/fundus-images/ 65. E. Decencière et al. TeleOphta: Machine learning and image processing methods for tele ophthalmology, IRBM, vol. 34, no. 2, pp. 196–203, 2013. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1959-0318(13)00023-7 66. Giancardo, L, Meriaudeau, F, Karnowski, T. P, Li, Y, Garg, S, Tobin, Jr, K. W and Chaum, E. 'Exudate-based diabetic macular edema detection in fundus images using publicly available datasets, Medical Image Analysis 16(1), 216—226, (2012). https://www.iasiss.org/ojs/IAS/article/view/1155 67. Diabetic Retinopathy Detection. Accessed: Sep. 1, 2017. [Online]. Available: https://www.kaggle.com/c/diabetic- retinopathy-detection/data 68. B. Al-Diri, A. Hunter, D. Steel, M. Habib, T. Hudaib, and S. Berry, REVIEW—A reference data set for retinal vessel profiles, in Proc. 30th Annu. Int. Conf. IEEE Eng. Med. Biol. Soc., Aug. 2008, pp. 2262–2265.

Authors: Masooda Modak, Ketan Ghotane, Siddhanth V, Nachiket Kelkar, Aravind Iyer, Prachi G Paper Title: Detection of Dyslexia using Eye Tracking Measures Abstract: Dyslexia is one of the most common and hidden learning disabilities found in people, especially in the young age.It particularly affects reading, where the impaired reader takes a longer time to read and grasp the concept than the non-impaired reader.This further leads to academic failures.So studies to detect such issues have been conducted considering various factors like the reading times, fixation times, number of saccades(sudden movements in the eye), of both the impaired and non-impaired subjects,and give the best possible results.Thus,we plan to use the same eye tracking technique supported with machine learning models to detect and classify the individuals with and without dyslexia.The 11. factors considered during the study are font-size, typeface, frequency of words(fixation times of non-impaired readers are more if frequency of encountered words is less) and age(people with learning disorders tend to enhance their reading 58-61 skills with age), etc.

Keywords: Dyslexia, eye tracking, eye movements, diagnosis, detection, prediction, machine learning, support vector machine.

References: 1. Nilsson Benfatto M, qvist Seimyr G, Ygge J, Pansell T, Rydberg A, Jacobson C (2016) Screening for Dyslexia Using Eye Tracking during Reading. PLoS ONE 11(12): e0165508. 2. Rubino CA, Minden HA (1973) Analysis of eye-movements in children with reading disability. Cortex 9: 217220. Pmid:4744366 3. Detecting Readers with Dyslexia with eye tracking measures;Published by Luz Rello and Miguel Ballesteros in 2015 ACM. 4. Use of Support Vector Machines for Texture Classification;Published by Kwang In Kim, Keechul Jung, Se Hyun Park, and Hang Joon Kim in 2002 IEEE. 5. Identifying Fixations and Saccades in Eye-Tracking Protocols; Published by Dario D. Salvucci and Joseph H. Goldberg in 2000 ACM. 6. Vosskhler, Adrian Nordmeier, Volkhard Kuchinke, Lars & Jacobs, Arthur. (2008). OGAMA (Open Gaze and Mouse Analyzer): Open-source software designed to analyze eye and mouse movements in slideshow study designs. Behavior research methods.40. 1150-62.10.3758/BRM.40.4.1150. 7. A Study of Eye Tracking Technology and its Applications; Published by Pramodini A. Pundem, Dr. Mukti E. Jadhav and Dr. Ramesh R. Manza in 2017 IEEE. 8. Human Eye Tracking and Related Issues : A Review; by Hari Singh and Dr. Jaswinder Singh, in the International Journal of Science and Research Publications, 2012. 9. Adubasim ICJ, Nganji JT (2017) Dyslexia-A Learning Difference. Autism Open Access 7:203. doi:10.4172/2165- 7890.1000203

Authors: Dipali Ramdasi, Rohini Mudhalwadkar Paper Title: Qualitative Detection of Nitro-Aromatic Explosives using Supervised Learning Access Abstract: Nitrobenzene and Nitrotoluene are potential explosives and pose a threat to mankind. As direct sensors for detection of these nitro-aromatic compounds are not available, an array of four gas sensors, sensing the aroma of explosives, along with a temperature and humidity sensor are exposed to varying concentrations of the explosives. An arduino based data acquisition system acquires the sensor arrays response and transmits it to a computer. Feature parameters of Area, Slope and Relative Response are extracted from the sensor response and are used to train and test for presence of explosives using supervised learning algorithms. After a comparative performance study of various such algorithms, the feedforward neural network with resilient backpropagation is employed for the detection of these explosives. The system is tested for 51 cases, where the explosive is mixed with air and not a pattern gas. The system correctly identified the presence of nitrotoluene and nitrobenzene with an accuracy of 94%. A user interface is developed for easy use of the system, which allows the user to set the training mode or testing mode of the system. This interface, pops up a message when it detects the presence of nitrobenzene or nitrotoluene before the explosion.

Keywords: Nitrobenzene, Nitrotoluene, Neural Network, Sensor Array

References: 1. Institute for Economics & Peace, 2018, November. “Global Terrorism Index 2018: Measuring the impact of terrorism”, Retrieved from http://visionofhumanity.org/app/uploads/2018/12/Global-Terrorism-Index-2018-1.pdf 2. Qingsong, Wang, Guo Song, and Sun Jinghua, “Nitrobenzene and aniline caused fire and explosion: A case study”, In IChemE Symposium Series, vol. 153. 2007 3. Koldunov, S. A., A. V. Anan’in, V. A. Garanin, and S. I. Torunov, “Detonation properties of diluted liquid explosives: A mixture of nitromethane with nitrobenzene”, Combustion, Explosion, and Shock Waves 48, no. 1, pp. 106-111, 2011 4. Bretherick, Leslie, “Bretherick's handbook of reactive chemical hazards”, Elsevier, 2016. 5. Mason, C. M., Van Dolah, R. W., & Ribovich, J. “Detonability of the System Nitrobenzene, Nitric Acid, and Water”, Journal of Chemical and Engineering Data, vol. 10, no. 2, 173-175, 1965 6. Meyer, R., Köhler, J., & Homburg, A. “Explosives”, John Wiley & Sons, 2016 12. 7. Vobecka Z., R. Blue, F. Vilela, P. J. Skabara, and D. Uttamchandani “Microelectrode sensor utilising nitro-sensitive polymers for application in explosives detection”, Micro & Nano Letters vol. 7, no. 9, pp. 962-964, 2012 8. Liu Yun, Lifei Wu, Liquan Sun, and Aiqin Luo, “Computational and experimental investigation of 4-nitrotoluene molecularly imprinted 62-67 polymers”, In Remote Sensing, Environment and Transportation Engineering (RSETE), 2011 International Conference on, pp. 8140-8143. IEEE, 2011 9. Harbeck Mika, Dilek D. Erbahar, Ilke Gürol and Emel Musluoğlu, “Chemical sensing of explosives in water”, In Instrumentation and Measurement Technology Conference (I2MTC), 2010 IEEE, pp. 111-115, IEEE, 2010 10. Sagar Mathure, Rohini Mudhalwadkar and Gaurav Sonar, “Metal oxide semiconductor based thin film sensor for nitro aromatic explosive detection”, In Convergence of Technology (I2CT), 2014 International Conference for, pp. 1-4. IEEE, 2014 11. Delpha Claude, Maryam Siadat and Martine Lumbreras, “Identification of Forane R134a in an air-conditioned atmosphere with a TGS sensor array”, IEEE Transactions on Instrumentation and Measurement vol. 50, no. 5, pp. 1370-1374, 2001 12. Osowski Stanislaw, Tran Haoi Linh and Kazimierz Brudzewski, “ Neuro-fuzzy TSK network for calibration of semiconductor sensor array for gas measurements”, IEEE Transactions on Instrumentation and Measurement vol. 53, no. 3, pp. 630-637, 2004 13. Venkatesan, C., P. Karthigaikumar, Anand Paul, S. Satheeskumaran, and R. Kumar. "ECG signal preprocessing and SVM classifier-based abnormality detection in remote healthcare applications." IEEE Access 6 (2018): 9767-9773. 14. King Tony L., Frank M. Horine, Kevin C. Daly and Brian H. Smith. “Explosives detection with hard-wired moths”, IEEE Transactions on Instrumentation and Measurement vol. 53, no. 4, pp. 1113-1118, 2004 15. Luo Bing, Qing-Hao Meng, Jia-Ying Wang and Ming Zeng, “A Flying Odor Compass to Autonomously Locate the Gas Source”, IEEE Transactions on Instrumentation and Measurement vol. 67, no. 1, pp. 137-149, 2018 16. Bermak Amine and Sofiane Brahim Belhouari, “Bayesian learning using Gaussian process for gas identification”, IEEE transactions on Instrumentation and Measurement vol. 55, no. 3, pp. 787-792, 2006 17. Zhang Lei and Fengchun Tian, “Performance study of multilayer perceptrons in a low-cost electronic nose”, IEEE Transactions on Instrumentation and Measurement vol. 63, no. 7, pp. 1670-1679, 2014 18. Khalaf Walaa, Calogero Pace, and Manlio Gaudioso, “Gas detection via machine learning”, Int. J. Comput. Electr. Autom. Control Inf. Eng 2, no. 1, pp. 61-65, 2008 19. Srivastava A.K., “Detection of volatile organic compounds (VOCs) using SnO2 gas-sensor array and artificial neural network”, Sensors and Actuators B: Chemical, vol. 96. no. 1. pp. 24-37, 2003 20. Olguín C., Laguarda-Miró, N., Pascual, L., García-Breijo, E., Martinez-Manez, R. and Soto, J., “An electronic nose for the detection of Sarin, Soman and Tabun mimics and interfering agents”, Sensors and Actuators B: Chemical, vol. 202, pp. 31-37, 2014 21. Chen Nianyi, “Support vector machine in chemistry”, World Scientific, 2004 22. Dipali Ramdasi, Rohini Mudhalwadkar, “Parameter-Controlled Gas Sensor System for Sensor Modeling”, In Progress in Advanced Computing and Intelligent Engineering, pp. 459-468, Springer, Singapore, 2018 23. Venkatesan, C., P. Karthigaikumar, and S. Satheeskumaran. "Mobile cloud computing for ECG telemonitoring and real-time coronary heart disease risk detection." Biomedical Signal Processing and Control 44 (2018): 138-145.Gurney Kevin, “ An introduction to neural networks”, CRC press, 2014 24. Yoon, H., Jun, S.C., Hyun, Y., Bae, G.O. and Lee, K.K., “A comparative study of artificial neural networks and support vector machines for predicting groundwater levels in a coastal aquifer”, Journal of Hydrology, vol. 396(1-2), pp. 128-138, 2011

Authors: N. Juber Rahman , P. Nithya Paper Title: The Inspection on Obstructive Sleep Apnea Severity Detection using a Deep Learning Access Abstract: As of late, crucial endeavors are created to research thoroughgoing sleep observant to anticipate sleep-related clutters. variable sleep organize grouping has attained unbelievable enthusiasm among specialists in well-being information science. A soft induction framework is received to assess the division of sleep organize. At that time, a starter sleep profundity is decided. Besides, a restricted state machine is made to tell apart the sleep stage changes. the excellence between our examination and alternative existing investigations is that, first, each the load sensors and also the pulse device area unit utilized; at that time, the soft induction and a restricted state machine area unit bestowed, that provide United States of America the next truth than the standard techniques to assess the sleep prepare. preventive sleep disorder (OSA) may be a typical sleep issue caused by abnormal reposeful. The seriousness of OSA will prompt various aspect effects, as an example, fulminant viscus death (SCD). Polysomnography (PSG) may be a very best quality level for OSA analysis. It records various sign from the patient's body for in any event one entire night and figures the Apnea- Hypopnea Index (AHI) that is that the amount of symptom or respiration occurrences each hour. This value is then accustomed prepare patients into OSA seriousness levels. The principle focal points of our projected technique incorporate easier data acquisition, prompt OSA seriousness recognition, and undefeated part extraction while not space learning from ability. Programmed sleep-organize arrangement models were worked with sturdy and explainable AI 13. techniques (support vector machine and call tree). 68-71 Keywords: Deep Brain Stimulation (DBS), Obstructive sleep apnea (OSA), Apnea-Hypopnea Index (AHI)

References: 1. Yuan, Y., Jia, K., Ma, F., Xun, G., Wang, Y., Su, L., & Zhang, A. (2018). variable Sleep Stage Classification Mistreatment Hybrid Self- Attentive Deep Learning Networks. 2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM). 2. Li, X., Cui, L., Tao, S., Chen, J., Zhang, X., & Zhang, G.-Q. (2018). HyCLASSS: A Hybrid Classifier for Automatic Sleep Stage grading. IEEE Journal of medical specialty and Health science, 22(2), 375–385. 3. Li, Y., Pan, W., Li, K., Jiang, Q., & Liu, G.-Z. (2018). slippy Trend Fuzzy Approximate Entropy as a completely unique Descriptor of vital sign Variability in impeding apnea. IEEE Journal of medical specialty and Health science, 1–1. 4. Phan, H., Andreotti, F., Cooray, N., Chen, O. Y., & De Vos, M. (2018). Joint Classification and Prediction CNN Framework for Automatic Sleep Stage Classification. IEEE Transactions on medical specialty Engineering, 1–1. 5. Ye, J. H., Lin, Y., Li, Z. W., Lee, J., Al-Ahmari, A., & Jin, M. (2018). A Non-invasive Sleep Analysis Approach supported a Fuzzy logical thinking System and a Finite State Machine. IEEE Access, 1–1. 6. Chen, Y., Gong, C., Hao, H., Guo, Y., Xu, S., Zhang, Y., … Li, L. (2019). Automatic Sleep Stage Classification supported Subthalamic native Field Potentials. IEEE Transactions on Neural Systems and Rehabilitation Engineering, 1–1. 7. Banluesombatkul, N., Rakthanmanon, T., & Wilaiprasitporn, T. (2018). Single Channel ECG for impeding apnea Severity Detection employing a Deep Learning Approach. TENCON 2018 - 2018 IEEE Region ten Conference.

Authors: Ponnana Ramprasad, Allu Manikanta An Experimental Research On Partial Replacement Of Coarse Aggregate with Recycled Aggregate and Fine Paper Title: Aggregate with Granite Powder Abstract: Now a days increase in population increases the demand of concrete for construction purpose and Aggregates are the important constituents in concrete.Re-use of demoliation waste avoids the problem of waste disposal and is also helpful in reducing the gap between demand and supply of fresh aggregates. This research deals with partial replacement of natural coarse aggregates (NCA) with recycled coarse aggregates (RCA) of age group 30 years and 35 years in different proportions like 20%, 30%, 40% . For this, M20 grade of concrete is adopted. Curing of specimens were done for 7days and 28 days to attain the maximum strengths. Partial replacement of fine aggregate with Granite powder at 5%, 10%, 15% were done to reduce the waste percentage as well to gain more strength. After casting the specimens of RCA with Granite powder replacement, curing was done and the specimens were tested for compressive and tensile strengths. Obtained results of compressive and tensile strengths of RCA concrete mix were compared with conventional concrete. In this direction, an experimental investigation of compressive and tensile strength was undertaken to use RCA as a partial replacement in concrete. It was observed that the concrete with recycled aggregates of 30years and 35years age group achieved maximum compressive strength of 29.03 N/mm2, 28.96 N/mm2 and tensile strength of 11.91 14. N/mm2, 10.34 N/mm2 were obtained at 40%replacement of RCA respectively. It is found that the compressive strength and Split tensile strength of RAC with copper slag was increased 8.20% and 2.90% when compared with the RAC. 72-77 Index Terms: compressive strength, granite powder, recycled coarse aggregate

References: 1. Mather, Bryant, “Laboratory tests of Portland slag cement” ACI journal, 54, no 3, September 1957, pp. 205-232. 2. Fulton, F. S., “The properties of PSC Containing milled granulated blast furnace slag,” monograph, Portland cement institute, Johannesburg, 1974, pp. 4-46. 3. Hogan, F.J. and meusel, J.W., ‘The elevation of durability and strength development of a ground granulated blast-furnace slag’, 457 cement, concrete, and aggregate 3 (1) (1981) 41-52. 4. KK Sagoe-crentsil, T Brown, AH Taylor “Performance of concrete made with commercially produced coarse recycled concrete aggregate” Cement and concrete research, 2001 – Elsevier. 5. PC Yong, DCL Teo “Utilization of recycled aggregate as coarse aggregate in concrete” journal of civil engineering and science. Performance of concrete made with commercially produced coarse recycled concrete aggregate. 6. Poon, CS and Chan D (2006) the use of recycled aggregate in concrete in Hong Kong. Journal of resource, conservation and recycling, 50 (2007). 7. SM Levy, P Helene “Durability of recycled aggregate concrete” cement and concrete research, 2004-Elsevier when this replacement was 20% or 50%, mainly for the recycled coarse and fine aggregate. 8. V Corinaldesi “Mechanical and elastic behavior of concretes made of recycled concrete” construction and building materials, 2010-Elsevier. 9. A Gokce, S Nagataki, T Saeki, M Hisada “Freezing and thawing resistance of air entrained concrete incorporating recycled coarse aggregate” cement and concrete research, 2004-Elsevier. 10. A Katz “Properties of concrete made with recycled from partially hydrated old concrete” cement and concrete, 2003-Elsevier. 11. MB de Oliveira, E Vazquez “the influence of retained moisture in aggregate from recycling on the properties of new hardened concrete” waste management, 1996-Elsevier. 12. G Fathifazi, AG Razaqpur, QB Isghor, A Abbas “Creep and drying shrinkage characteristics of concrete produced with coarse recycled concrete aggregate “ cement and concrete , 2011-Elsevier. 13. V Corinaldesi, G Moriconi “Influence of minerals ad6ditions on the performance of 100% recycled aggregate concrete” construction and building materials, 2009-Elsevier.

Authors: A. Krishnakumar, D. Saraswathi Paper Title: FLCH: Intuitionistic Fuzzy Logic based Cluster Head Selection in Wireless Sensor Networks Abstract: A large number of tiny sensor nodes are grouped together to form Wireless Sensor Network (WSN). In Industry and other areas using of sensors are increasing every day. Therefore, the energy utilization of sensor nodes becomes a vital problem due to non-rechargeable battery. To improve the vital resources, the energy efficient clustering models are to be improved. This paper presents a novel idea IFLCH: Intuitionistic Fuzzy Logic based Cluster Head Selection for WSNs for electing Cluster Head (CH) based on the energy efficiency parameters such as residual energy, distance between neighbors. The proposed scheme also elects Super CH (SCH) based on the above-mentioned parameters along with number of neighbors. The simulation results compared the proposed model with the existing schemes and it receives better performance by selecting efficient CH and SCH.

Keywords: Energy, Intuitionistic Fuzzy Logic, Sensor Nodes, Super Cluster Head (SCH), Number of Neighbors.

References: 1. Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless microsensor networks. In System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on (pp. 10-pp). IEEE. 2. Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for 15. wireless microsensor networks. IEEE Transactions on wireless communications, 1(4), 660-670. 3. Mann, P. S., & Singh, S. (2017). Improved metaheuristic based energy-efficient clustering protocol for wireless sensor networks. Engineering Applications of Artificial Intelligence, 57, 142-152. 78-83 4. Rahman, M. M., Miah, M. S., & Sharmin, D. (2017). Cognitive Improved LEACH (CogILEACH) Protocol for Wireless Sensor Network. Transactions on Networks and Communications, 4(6), 01. 5. KLA Yau, P Komisarczuk, PD Teal, in IEEE 34th Conference on Local Computer Networks. Cognitive radio-based wireless sensor networks: conceptual design and open issues, (2009), pp. 955–962. 6. Shokouhifar, M., & Jalali, A. (2017). Optimized sugeno fuzzy clustering algorithm for wireless sensor networks. Engineering Applications of Artificial Intelligence, 60, 16-25. 7. Nayak, P., & Devulapalli, A. (2016). A fuzzy logic-based clustering algorithm for wsn to extend the network lifetime. IEEE sensors journal, 16(1), 137-144. 8. Prabhu, B., Balakumar, N., & Antony, A. J. (2017). A Novel LEACH Based Protocol for Distributed Wireless Sensor Network. 9. Atanassov, K. T. (1986). Intuitionistic fuzzy sets. Fuzzy sets and Systems, 20(1), 87-96. 10. Mahapatra, G. S., & Roy, T. K. (2013). Intuitionistic fuzzy number and its arithmetic operation with application on system failure. Journal of uncertain systems, 7(2), 92-107. 11. Mamdani, E. H. (1976). Advances in the linguistic synthesis of fuzzy controllers. International Journal of Man-Machine Studies, 8(6), 669-678. 12. Wei, D., Jin, Y., Vural, S., Moessner, K., & Tafazolli, R. (2011). An energy-efficient clustering solution for wireless sensor networks. IEEE transactions on wireless communications, 10(11), 3973-3983. 13. Singh, B., & Lobiyal, D. K. (2012). An energy–efficient adaptive clustering algorithm with load balancing for wireless sensor network. International Journal of Sensor Networks, 12(1), 37-52. Authors: T.Sumathi Uma Maheswari, M.Tirumala Devi Paper Title: Research on Stress-Strength Model under Random Repeated Cycles Abstract: The system leads to fail when the impact of repeated stresses. In some situations there is uncertainty about the stress and the strength random variables at any instant of time and also about the behaviour of the random variables with respect to time and/or cycles. The repeated cycles may occur in known or unknown timings. The terms random fixed and random independent are used to describe these uncertainties. The survival function as the probability of survival of a system beyond any given time has been derived for the impact of repeated stresses and when the number of cycles occur in poisson distribution and geometric distribution when stress and strength follow random independent and also random fixed which follow weibull distribution with different parameters.

16. References: 1. K C Kapur and L R Lamberson, 1977, Reliability in Engineering Design, John Wiley and Sons Inc New York. 84-87 2. 2. S N N Pandit, A C N Raghavachar and B Kesava Rao, 1988, Survival function under strength attenuation in cascade reliability, IAPQR Transactions, vol 13, No.2. 3. 3. A C N Raghavachar, B Kesava Rao and N Ch Pattabiramacharyulu, 1983, Survival function under stress attenuation in cascade reliability, OPSEARCH, vol 20, no 4, 190-207. 4. 4. Serkan Erilmaz, 2013, On stress-strength reliability with a time-dependent strength, Journal of Quality and Reliability Engineering. 5. 5. K C Siju and M Kumar, 2016, Reliability analysis of time dependent stress-strength model with random cycle times, Perspectives in Science, 8, 654-657. 6. 6. K C Siju and M Kumar, 2017, Reliability computation of a dynamic stress-strength model with random cycle times, International Journal of Pure and Applied Mathematics, v0l.117, no.12, 309-316

17. Authors: S.Nithya Roopa Paper Title: Research on Face Expression Recognition Abstract: Face Expression Recognition (FER) has become main area of interest due to its wide applications. Automatic Facial expression recognition has drawn the attention of researchers as it has many applications. Facial Expression Recognition gives important information about emotions of a human being. Many feature selection methods have been developed for identification of expressions from still images and real time videos. This work gives a detailed review of research works done in the field of facial expression identification and various methodologies implemented for facial expression recognition.

Keywords: Emotion recognition; automatic emotion recognition; deep learning; image recognition; speech technology; signal processing; References: 1. Tuark MA, Peintland AP. feeling recognition mistreatment eigenfaces. In: laptop Vision and Pattern Recognition. Proceedings,IEEE laptop Society Conference on. IEEE; 1991, p. 586-91. 2. M. El Ayiadi, M. S. Kaamel, and F. Kaerray, “Survey on feeling recognition: options, classification schemes, and information,” Pattern Recognit., vol. 44, no. 3, pp. 572–587, 2011. 3. Y. Leicun, Y. Beingeo, and G. Henton, “Deep learning,” Nature, vol. 521, no. 7553, pp. 436–444, 2015. 4. J. Schmedhuber, “Deep Learning in convolutional neural networks: an summary,” Neural Networks, vol. 61, pp. 85–117, 2015. 5. J. Nagiam, A. Khoesla, M. Kaim, J. Naim, H. Leei, and A. Y. Nig, “Multimodal Aeriel Deep Learning,” Proc. 28th Int. Conf. Mach. Learn., pp. 689–696, 2011. 6. F. Deipl and T. Voigt, “Automatic feeling recognition from Expression,” 2010. 7. . Lugovec, I. Dinder, and M. Hoervat, “Approaches and applications of feeling recognition,” 2016 thirty ninth Int. Conv. Inf. Commun. Technol. Electron. Microelectron. MIPRO 2016 - Proc., no. November 2017, pp. 1278–1283, 2016. 8. B. Schuller, G. Rigoll, and M. Lang, “Emotion recognition combining Physical options and linguistic info during a hybrid support vector machine - belief specification,” Acoust. Speech, Signal method., vol. 1, pp. 577–580, 2004. 9. C. Bussieo ett ail., “IEMOCAP: Interactive emotional dynamic motion capture information,” Laing. Resoer. Evail., vol. 42, no. 4, pp. 335– 359, 2008. 10. J. H. Haensen, S. E. Boiu-Ghaizale, R. Sarikaaya, and B. Pelliom, “Getting Started with SUSAS: A Speech underneath Simulated and Actual Stress information,” Eurospeech, pp. 1743–46, 1997. 11. K.Meisser; J.Mataes; J.Keittler;K., “XM2VTSDB: The Extended M2VTS information.” 12. I. Sneiddon, M. Mc.Rorrie, G. MicKeown, and J. Hanratty, “The iatrogenic natural feeling information for detection,” IEEE Trans. Affect. Comput., vol. 3, no. 1, pp. 32–41, 2012. 13. M. Slaeney, “BabyEars: A recognition system for emotive vocalizations,” Speech Commun., vol. 39, no. 3–4, pp. 367–384, 2003. 14. K. D. Gairett et al., “Correlates within the Comprehension of Emotional Prosody,” no. February, p. 19104, 2002. 88-91 15. E. Douglaas-cowiee, R. Coweie, and M. Schröoder, “A New feeling Database: concerns, Sources and Scope,” In, pp. 39–44, 2000. 16. D.Erickson, “Expressive: Production, perception and application to synthesis,” Acoust. Sci. Technol., vol. 26, no. 4, pp. 317–325, 2005. 17. S. McGilloway, R. Cowie, E. Douglas-Cowie, S. Gielen, M. Westerdijk, and S. Stroeve, “Approaching automatic recognition of feeling from Voice: A rough benchmark,” Proc. ISCA Work. Speech Emot., pp. 207–212, 2000. 18. T. S. Polzein and A. Waeibel, “Emotion-Sensitive Human-Computer Interfaces,” ISCA Tutor. Res. Work. Speech Emot., 2000. 19. C. aeronaut and A. Rudnicky, “The Carnegie altruist soul Corpus,” Proc. Int. Conf. Spok. Lang. Process., no. August, pp. 341–344, 2002. 20. U. Shrawankar and V. M. Thakare, “Techniques for Feature Extraction In Speech Recognition System : A Comparative Study,” 2013. 21. Z. Fang and Z. Guoliang, “Comparison of various I m p l e m e n t a t i o n s of M F C C,” vol. 16, no. 6, pp. 2–3, 2001. 22. I. Miporas and T. Ganchiev, “Comparison of speech options on the speech recognition task,” J. Comput. …, vol. 3, no. 8, pp. 608–616, 2007. 23. D. O’Shaugihnessy, “Linear prophetical cryptography.,” IEEE Potentials, vol. 7, no. 1, pp. 29–32, 1988. 24. J. Dae Wiu and B. F. Lein, “Speaker identification supported the frame linear prophetical cryptography spectrum technique,” professional Syst. Appl., vol. 36, no. 4, pp. 8056–8063, 2009. 25. C. K. Rusehforth, “Emotion Detection mistreatment Linear prophetical cryptography,” IEEE Trans. Acoust., vol. 25, no. 5, pp. 361–367, 1977. 26. S. Suiny, D. P. Shaw., and K. P. Jacab, “Feature Extraction ways supported linear prophetical cryptography and riffle Packet Decomposition,” 2012 Int. Conf. Adv. Comput. Commun., pp. 27–30, 2012. 27. H. Hermensky and L. A. Coex, “Linear prophetical (PLP) Analysis-Resynthesis Technique,” vol. 87, no. 303, pp. 5–6, 2013. 28. H. Hermensky, “Perceptual linear prophetical (PLP) analysis,” J. Acoust. Soc. Am., vol. 87, no. 4, pp. 1738–1752, 1990. 29. C. Kurien and K. Balekrishnan, “Linear prophetical cepstral constant isolated digit recognition,” Commun. Comput. Inf. Sci., vol. 204 CCIS, pp. 534–541, 2011. 30. V. Sugendhi, “Spectral Analysis in Speech process Techniques,” vol. 3, no. 1, pp. 74–76, 2013. 31. T. Seehapich and S. Woengthanavasu, “Emotion Recognition mistreatment Support Vector Machines,” 2013 fifth Int. Conf. Knowl. good Technol., pp. 86–91, 2013. 32. Y.-L. L. Y.-L. Lein and G. W. G. Weei, “Speech feeling recognition supported HMM and SVM,” 2005 Int. Conf. Mach. Learn. Cybern., vol. 8, no. August, pp. 18–21, 2005. 33. S. Laetif, R. Rena, S. Youinis, J. Qaadir, and J. Eipps, “Cross Corpus Speech feeling Classification- an efficient Transfer Learning Technique,” 2018. 34. Y. Huiang, M. Hiu, X. Yeu, and T. Waing, “Pattern Recognition,” vol. 663, pp. 721–729, 2016. 35. J. Gidion, S. Khorraem, Z. Aladeneh, D. Dimitridis, and E. M. Provest, “Neural networks for transfer learning in feeling recognition,” Proc. Annu. Conf. Int. Speech Commun. Assoc. INTERSPEECH, vol. 2017–Augus, pp. 1098–1102, 2017. 36. A. Balekrishnan and A. Reige, “Recognizing Emotions from Speech mistreatment Deep Neural Networks,” 2017. 37. J. Chaing and S. Scheireir, “Learning representations of emotional speech with deep convolutional generative adversarial networks,” ICASSP, IEEE Int. Conf. Acoust. Speech Signal method. - Proc., pp. 2746–2750, 2017.

Authors: Sathya D , Jagadeesan D, Sriram R Paper Title: Car Analyzer Abstract: As children, we would all be able to identify with having affectionate recollections of going from vendor to business with our folks, bouncing all through the secondary lounges of various vehicles, trying out all the distinctive highlights. While test drives haven't fallen by the wayside, the cutting edge 2017 vehicle customer will just visit a normal of 2 businesses on their adventure to purchasing their ideal new vehicle. 18. The vehicle purchasing venture has profoundly changed because of the advanced blast over the past couple years. Individuals are investing less energy in business showrooms and additional time looking into and working out the ideal 92-94 vehicle. With the monstrous measure of data accessible on each model, it's imperative to draw in potential sellers to give the correct substance, at the ideal time.

References: 1. Pudaruth,S. 2014. “Predicting the Price of Used Cars Using Machine Learning Techniques”, International Journal of information & Computation Technology, 4 (7), pp.753-764 2. Kuiper, S. 2008. “Introduction to Multiple Regression: How Much Is Your Car Worth?”, Journal of Statistics Education, 16 (3). 3. Limsombunchai, V. 2004. House price prediction: Hedonic price model vs. artificial neural network. In New Zealand Agricultural and Resource Economics Society Conference, New Zealand, pp. 25-26. 4. Bourassa, S.C., Cantoni, E. and Hoesli, 5. M. 2007. “Spatial dependence, housing submarkets, and house price prediction”, The Journal of Real Estate Finance and Economics, 35(2), pp.143-160. 6. Nau, R. 2014. Notes on linear regression analysis, Lecture handouts, Duke University, Furqa School of Business, 26 Nov 2014.

Authors: Prateek Vikram, Salman Abdul Moiz, G R Anil Paper Title: Multiversion Concurrency Control with the Precedence Graph Generation Algorithm Abstract: Simultaneous access of a shared record by multiple transactions leads to conflicts while writing. Such scenario generates the problems like lost update, dirty read, non-repeatable read etc . In such a case, transaction need to be rolled back to get the system into a consistent state. To handle these conflicts Multiversion Concurrency control (MVCC) is used. MVCC has the ability to avoid the read-write conflicts by performing the read operations using the older version when the write request is in progress. When the multiple write operation concurrently executes then the transaction is aborted or rolled back. To address the problem of rollbacks, a methodology using the Precedence Graph generation based algorithm to reschedule the sequence of the transaction is proposed. In the proposed methodology whenever there is a system failure or network failure the transaction need not be started again, rather it is partially rolled back. The proposed methodology is executed and compared with the other MVCC approached on same set of transactions defined on shared and non shared data items. It is observed that the proposed methodology achieves better execution time as compared to the methods available in the literature.

Index Terms: Concurrency control, Database, Multiversion timestamp protocol, Precedence graph generation, Partial rollback.

References: 1. Wang Yujun, LI Junke The Solution to the Roll Back Problem in Multi version Concurrency Control Timestamp Protocol International Conference on Computer Science and Network Technology,pp 2803- 2806,IEEE 2011 2. Wu, Y., Arulraj, J., Lin, J., Xian, R. and Pavlo, A., 2017. An empirical evaluation of in memory multiversion concurrency control. Proceedings of the VLDB Endowment, 10(7), pp.781-792. 3. Kaloian, Manassiev, MadalinMihailescu, Cristiana Amza Exploiting Distributed Version Concurrency in a Transactional Memory Cluster pp 198- 208, New York, ACM 2006 19. 4. MohammadSadoghi,MustafaCanim,BishwaranjanBha ttacharjee,Fabian Nagel, Kenneth A. Ross Reducing Database Locking Contention Through Multiversion Concurrency pp 1331-1342, Proceedings of the VLDB Endowment, Vol. 7, No. 13, 40th International Conference on Very Large Data Bases, September 1st 5th 2014, Hangzhou, China. 95-100 5. Juchang Lee, Hyungyu Shin, Chang Gyoo Park Hybrid Garbage Collection for Multiversion Concurrency Control in SAP HANApp 1307- 1318, SIGMOD, ACM. June 26-July 01, 2016, San Francisco, CA, USA. 6. Joao A. Silva, Joao M. Lourenco and Herve Paulino Boosting Locality in Multi version Partial Data Replication pp 1311-1314, SAC15, ACM, April 1317, 2015, Salamanca, Spain. 7. Eran Chinthaka Withana, Beth Plale, Roger Barga, Nelson Araujo Versioning for Workflow Evolution, pp 756-765, HPDC'10, ACM, June 2025, 2010, Chicago, Illinois, USA. 8. Nirmit Desai and Frank Mueller Scalable Distributed Concurrency Services for Hierarchical Locking Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS03) IEEE, 2003 9. David Lomet, Alan Fekete, Rui Wang, Peter Ward Multiversion Concurrency via Timestamp Range Conflict Management pp 714-725, IEEE 28th International Conference on Data Engineering,2012 10. Caius Brindescu, Mihai Codoban, Sergii Shmarkatiuk, Danny Dig How Do Centralized and Distributed Version Control Systems Impact Software Changes?pp 322-333, ICSE 14, ACM, June,2014 11. JustinLevandoski,DavidLomet,SudiptaSengupta,R yanStutsman,and Rui Wang "Multiversion Range Concurrency Control in Deuteronomy"pp 2146-2157, Proceedings of the VLDB Endowment, Vol. 8, No. 13, 42nd International Conference on Very Large Data Bases, September 5th September 9th 2016, New Delhi, India. 12. Moiz, Salman Abdul, and Lakshmi Rajamani. "Concurrency control strategy to reduce frequent rollbacks in mobile environments." 2009 International Conference on Computational Science and Engineering. Vol. 2. IEEE, 2009. 13. Moiz, Salman Abdul, et al. "Concurrency control in mobile environments: Issues & challenges." International Journal of Database Management Systems 3.4 (2011): 147. 14. Moiz, Salman Abdul, and Lakshmi Rajamani. "An Analytical Approach for Guaranteeing Concurrency in Mobile Environments." World Congress on Engineering and Computer Science. Vol. 1. 2010. 15. Moiz, Salman Abdul, and Lakshmi Rajamani. "Single lock manager approach for achieving concurrency control in mobile environments." International Conference on High Performance Computing. Springer, Berlin, Heidelberg, 2007. 16. Moiz, Salman Abdul, and Mohammed Khaja Nizamuddin. "Concurrency control without locking in mobile environments." 2008 First International Conference on Emerging Trends in Engineering and Technology. IEEE, 2008. 17. Moiz, Salman Abdul, and Dr Lakshmi Rajamani. "An algorithmic approach for achieving concurrency in mobile environment." 1st National Conference on Computing for Nation Development, INDIACom. 2007.

Authors: S.Ramlal, Pravesh Jha Strength Behaviour of M25 Grade Concrete Mixed with Two Natural Fibers in Both Curing and Without Paper Title: Curing Condition Abstract: The mixture of cement, fine aggregate coarse aggregate and water are the constituents of concrete of the building materials which can spread or poured into the moulds and forms a stone like mass on hardening. In this project an attempt is made to add natural fibers in the concrete and compare the compressive strengths of concrete. Coir, jute, can 20. be utilized in concrete and effect of such fibers on properties of concrete can be analyzed. Concrete containing fibers increase the service life and have a positive effect on social life and social economy. Concrete is strong in Compression 101-104 as aggregate efficiently carries the compression load. Concrete is strong in compression but weak in tension, hence by adding these fibers we can also increase its tensile strength. It has been accepted that addition of small closely spaced and uniformly distributed fibers to concrete would act as a crack arrester and would significantly improve its static and dynamic properties. The study also focuses on the comparative study among fiber added concrete with the structural strength of conventional concrete. In this project, the strength behavior of concrete mixed with natural like coir and jute fibers of fiber cement ratio 0.5%, 1.0%, and 1.5% is compared with the compressive strength of conventional concrete of grade M25 is subjected to curing and without curing condition. The strength behavior of different fibers concrete will be compared.

Keywords--- Compressive Strength, Conventional Concrete, Different Fibers, Fiber Cement Ratio.

References: 1. Dhandhania VA and Sawant S “Research article open access coir fiber reinforced concrete.” 2. Kavitha Saijala “A review on natural fibers in the concrete.” 3. Sajedur Rahman and A K Azad “Investigation on mechanical strength of jute fiber reinforced concrete (JFRC) compared to plain concrete.” 4. SumitChakraborty, Sarada Prasad Kundu, Aprana Roy and S.B. Majumder “Improvement of the mechanical properties of jute reinforced cement mortar.” 5. VikasSrivastav, P K Mehta and Satyendra Nath “Natural fibers in cement and concrete matrices.” 6. Rai, Amit, and Y. P. Joshi. "Applications and properties of fibre reinforced concrete." Int. J. Eng. Res. Appl 4.5 (2014): 123-131. 7. 6SAANDEEPANI VAJJE, et.al, (DR.N.R.KRISHNA MURTHY) studied characteristic strength of concrete using natural fibers: (2013) 8. 5RUSHI PATEL, PROF. V.R.PATEL et.al., studied that behavior of jute fiber in concrete (2009) 9. fiber composites for constructive parts in aerospace, automobiles and other areas.” (2005) Authors: Pantas H. Silaban, Arsen Pasaribu, Andri D. K. SIlalahi Paper Title: The Influence of Human Aspect of Accommodation and Destination on Tourist Satisfaction Abstract: Tourism industry becomes a productive economic sector in the world. Nowdays, tourism industry in every country vary and is potentially to developed, especially in Indonesia. North Sumatera is one of the priority provinces for tourism development in Indonesia. One of the most popular tourism destinations in North Sumatera is Samosir Island Lake Toba. This research aims to analysis the influence of accommodation and destination in North Sumatera Tourism Industry. The population of this study is local tourist and international tourists visiting Tourist Destination in North Sumatera. Sample of this study is 250 respondents. Data analysis was used by software of Amos 22 with Structural Equation Modeling (SEM). The results of study prove that accommodation and destination have positively and significantly effeted to tourist satisfaction, the communication and hospitality of human aspect in providing services to the tourist are more concerned to improve. In terms of developing human aspect of accommodation and destination in North Sumatera, tourism industry needs to be focussed on two aspects, namely: hospitality and communication skill. Proposed idea in improving the human aspect of the tourism industry is enchanging the creation of hybrid tourits satisfaction.

Keywords: Communication, Hospitality, Hybrid Tourist Satisfaction

References: 1. Bennett, David and Higgins, M., 1989. Quality Means More than Smiles, ABA Banking Journal. 2(2). pp.234-245. 2. Berry, Leonard L., and Parasuraman, A., 1991, Marketing Services: Competing Through Quality. New York The Free Press. 21. 3. Choi, T. Y., & Chu, R. 2001. Determinats of Hotel Guests Satisfaction and Repeat Patronage in The Hong Kong Hotel Industry. International Journal of Hospitality Management, 20(3). pp.277–297. 4. Cronin, J., Brady, M., & Hult, T. (2000). Assessing the effects of quality, value, and customer satisfaction on consumer behavioral intentions 105-108 in service environments. Journal of Retailing, 76(2). pp.193-218. 5. Gursoy, Mccleary, and Lepsito (2007). Propensity to Complain: Effects of Personality and Beharvioral Factors. Journal of Hospitality & Tourism Research. 6. Howcroft,J.B., 1991, Customer Satisfaction in Retail Banking.: The Service Industries Journal”. 1(1). pp.12-24. 7. Hultman, Skarmeas, Oghazi, & Beheshti, (2015). Achieving Tourist Loyalty Through Destination Personality, Satisfaction and Identification. Journal of Business Research. 68 (11) 2227 - 2231 8. Parasuraman, A. Zeithaml, V. Berry L. (1985) A conceptual model of service quality and its implications for future research. Journal of Marketing, 49(4). pp.41 – 50. 9. Petrick, J. F. 2002. Experience use history as a segmentation tool to examine golf travelers‟ satisfaction, perceived value and repurchase intentions. Journal of Vacation Marketing, 8(4). pp.332–342. 10. Petrick, J. F. 2004. The roles of quality, value, and satisfaction in predicting cruise passengers‟ behavioural intentions. Journal of Travel Research, 42(1). pp.397–407. 11. Oliver, R., 1981. Measurement and evaluation of satisfaction processes in retail settings. Journal of Retailing, 57(3). Pp. 25–48. 12. Oviedo -,García, Vega & Reyes, 2014. Travel Motivation and Tourist satisfaction With Wildlife Tourism Experiences in Gonarezhou and Matusadona National Parks, Zimbabwe. Journal of Outdoor Recreation and Tourism. Vol. 20, 2017. Pp. 1 – 18 13. Sadeh, Asgari, Mousavi, & Sadeh, 2012. Factors Affecting Tourist satisfaction and Its Concequances. Journal of Basic and Applied Scientific Research. 2 (2) 1157 – 1560 14. Tarmizi, H.B.,Daulay, M and Muda, I. 2016. The influence of population growth, economic growth and construction cost index on the local revenue of tax on acquisition of land and building after the implementation of law no. 28 of 2009. International Journal of Economic Research. 13(5). pp. 2285-2295. 15. Tornow, Walter W., and Wiley, Jack W., 1991. Service Quality and Management Practices: A look at Employe Attitudes, Customer Satisfaction, and Bottom-Line Consequences. Human Resource Planning. 16. Victor T. C. Middleton, Alan Fyall, Michael Morgan, Ashok Ranchhod (2009) Marketing in Travel and Tourism. Elsevier Ltd. 17. Wood, Susan B., 1991. Using Service to Outprform the Competition, New Jersey. Bank Marketing. Authors: Bibhu Kaibalya manik Paper Title: Revisit to Policy Formulation for Climate-Smart Agriculture in India Abstract: Potential influence of water stress, climate change, erosion of fertility, unorganized agro-financing practices in agricultural-yields espoused with incongruity in regulating and developing the credible distribution mechanism for the resilience of computable equilibrium in the supply chain have warranted the continuing negative economic implications 22. relating to agricultural production-patterns as well as ensuring food security of the country. An authoritative introspection for the sustainability of agro-economic policy in consistence with the increasing population becomes the cry of the hour 109-116 of the country. Sensitivity-variance of different crops to warming though confines the scopes and preferences of territoriality of productivity however, the complexity of impact of climate-change on agricultural productivity necessitates the appraisal and interrelations of physical, economic and social factors as well changing ecological imbalances. The attempt to bring structural reforms in the farming practices in weather variability context in the country requires financial support for the marginal and small-scale farmers as farming practices are predominantly adapted to local climates. The global character of atmospheric circulation and the impact of ecological and climate-changes encourage combined use of climate, crop, and economic models for sustaining growth of supply chain to market. In addition, the increasing deterioration of agricultural production due to the eventuality of climate-change and eventual ecological imbalance considerably would affect the trade balance of the country for the legislative mandate of food security. To transform the progressive move of LPG (Liberalization, Privatization and Globalization) into secured and sustainable agro-economy to save our planet from the ravages of climate change, a comprehensive schematic approach involves configuration of legal and policy tools containing thereof: a) ‘spillover costs’ of agricultural productivity due to increased ecological and climate changes; b) coherent assessment of the modalities of agriculture to harmonize the present-day water-stressed; c) coherent financing mechanism for the farmers, in particular the small-scale and marginal ones who are not only being affected disproportionately rather the changes warrant them to be displaced internally. The present discussion reviews two prime factors: viz; a) Effects of Climate-Change upon agro-economy of the country; and b) Attenuation of Agro-financing measures in the regulatory mechanism for regulating and developing the vibrant supply chain to the market.

Keywords: Climate change, Agro-economy, Supply chain, Sustainable, LPG

References: 1. Loan-waiving strategy has been adapted by some newly elected State governments, for example, Madhya Pradesh, Rajasthan, Chattisgarh, resulting in escalation of NPAs to the tune of 1.47 lakh crores of March 31, 2018. Available at https://www.indiatoday.in/india/story/farm- loan-waiver-congress-bank-npas-rajasthanmadhya-pradesh-chhattisgarh-farm-crisis-1414414-2018-12-21 (last visited on Feb. 8, 2019 at 10:12 A.M.) 2. For example State of Odisha is categorized into ten agro-climatic zones based on soil structure, humidity, elevation, topography, vegetation, rainfall, etc. 3. ‘Market demand’ denotes the demand of the farmers, in particular financing for availing of the technologically advanced instruments, chemical fertilizers, pesticides, etc. for increasing the productivity. 4. ‘Right to pollute’ denotes the negative right of the Manufacturers emitting pollutants to environment, affecting indirectly the farmers’ better yielding opportunities of agricultural produce. 5. Reflects of carbon costs in material prices for the carbon emissions – the key objective of European Union in Emission Trading System 6. The National Project on Organic Farming schematized in the 10th Five-Year Planning and still continuing as pilot project. 7. Kisan Call Center 8. The SMS portal for the farmers 9. Monitoring system of Monthly Progress Report 10. National e-market platform 11. Item 14, State List, Constitution of India. 12. This is because due to the spread of the costs of carbon credit or carbon-border tax would be distributed in transaction costs for preserving the potential profits while diminution of potential values of agricultural produces due to unorganized and frayed market structure. 13. Foreign Direct Investments by Parle Agro Pvt. Ltd. in launching Frooti Fizz; Zephyr Peacock Private Equity Fund (US) investment in Utkal Tubers India Pvt. Ltd for producing high-quality mini-tubers in a tissue culture laboratory to multiply them in its own development farms through contract farming 14. National Action Plan on Climate Change (2008), Government of India 15. Id., ¶ 4.7 at 9. It has been resolved to develop a) crop variants compatible to extreme thermal and variable moisture resistant; b) alternative cropping patterns; c) devising alternative agricultural practices, etc. 16. The National Action Plan on Climate Change (2008) has clarified the objectives of implementation through appropriate institutional mechanism, public-private partnerships and civil society action however implementation mechanism has emphatically been institutionalized through related Ministries throughout the 11th and 12th Five-year Plan. 17. Report on Price Policy for Kharif Crops The Marketing Season 2017 – 18, Ministry of Agriculture and Farmers Welfare, Govt. of India, ¶ 1.19, at 33. Available at https://cacp.dacnet.nic.in/ViewReports.aspx?Input=2&PageId=39&KeyId=598 (last visited on Feb. 09, 2019 at 15:40 hr.) 18. Methane – the most effective contributor to climate change and agriculture is considered to be the primary source of methane emissions. Factors like livestock management, management of animal waste, rice cultivation, and crop residue burning, decomposing livestock manure, agro-industrial wastewater, etc. and scientists concluded that using anaerobic digestive technology methane can be captured. 19. Investment of Private Funds with efficient normative rigidity in agro-sector may relieve the financial burden of the State. 20. Green Revolution though increased food production however it perpetuated food insecurity because the wealthy farmers could afford the agrochemicals, fertilizers etc. needed to produce high yields. Again eco-friendly high-end technologically advanced instruments are products of multinational biotechnology corporations. 21. Supra, 12 22. UN Climate Change Conference, Bonn, November, 2017 23. Ivica Petrikova, (2013) “Bolstering food security through agricultural policies: cross-country evidence”, International Journal of Development Issues, Vol. 12 Issue: 2, at 92-109 24. Budgetary allocation to the tune of US$ 28.1 billion for micro-irrigation; AGRI-UDAAN for mentoring start-ups to connect with potential investors; Short-term crop loans up to 3 lakh; PMSKY (Pradhan MantriKrishi Sinchai Yojana) for development of irrigation sources; Scheme for Agro-Marine Processing and Development of Agro-Processing Clusters, etc. 25. Available at https://tradingeconomics.com/india/government-debt-to-gdp (last visited on Dec. 9, 2017 at 15:53 hours) 26. Source: FAO Statistical Pocketbook World food and agriculture, 2015: ISBN 978-92-5-108802-9 © FAO, 2015 available at www.fao.org/publications (last visited on Dec. 09, 2017 at 13:40 hrs) 27. Changing food habits may lead the demand curve upwards. Again increasing food import affects the fiscal policy as well. 28. Cooperative societies - organizations are full of geo-political rivalries and corruption and multiple layers of intermediaries for the creation of a National Market for agricultural commodities. 29. Regulated Markets – the forum that incentivize the individual (including unorganized markets) to pool the excess produce for wholesale assembling. 30. Agricultural Produce Market Committee Act, 2003 31. Minimum Support Price is an insurance mechanism to agricultural producers announced by Government of India as against sharp fall in farm prices during the production years. This has been introduced on the recommendation of the Commission for Agricultural Costs and Prices to protect the producer and farmers. 32. Sec. 31, SARFAESI Act, 2002. In absence of statutory protection of recovery of agricultural loan private participation in agricultural sector of the country would always be considered a challenge, though investment in agricultural sector efficiently and effectively could reduce poverty and promote food security. 33. This would be helpful to customize the amount before advancing the loan amount – one step to assess the risk and risk-mitigating measures. 34. The definition of ‘Family’ has been elaborated in the Land Reforms Act of every State hence calculation of loan amount and crop- insurance coverage could be ascertained accordingly. 35. For example, credit commitments of INR. 10 Lakh Crores announced in the year 2016for farm sector for helping agro-produce to get better prices and to make agro-sector as a growth driver. 36. The legal mandate as provided under section 27 of the Insurance Act, 1938 37. As practiced in Kenya. 38. As adopted in Tanzania 39. Calvin Miller, Linda Jones, AGRICULTURAL VALUE CHAIN FINANCE: TOOLS AND LESSONS, 2010, FAO and Practical Action, ISBN 978 1 85339 702 8 (Pb) Authors: Firas Saleh Omari, Norhidayah Azman, Roesnita Ismail Relationships Between Human Attributes and Sources of Information for Seeking Halal Food Information: Paper Title: A Pilot Research on Kuala Lumpur, Malaysia Abstract: This paper aims at investigating the impacts between information sources used and human attributes, namely: Attitude, Habit and Awareness of Individual in seeking for information about halal food products effectively among Malaysian Muslim consumers in Kuala Lumpur. This study was conducted to address the following research questions: 1) Are there any relationships between the use of different information sources and Attitude that might positively relate to the perception of wholesomeness, leading to effective seeking for halal food information?; 2) Are there any relationships between the use of different information sources and Habit that might positively relate to the perception of wholesomeness, leading to effective searching for halal food information?; and 3) Are there any relationships between the use of different information sources and Awareness of individuals that might positively relate to the perception of wholesomeness, leading to effective searching for halal food information? A pilot study was conducted in Kuala Lumpur, Malaysia, with a sample size of 50 respondents. Most of the respondents were young Malaysian Muslims between the ages of 18 and 24 years old. The data was gathered through a five-point Likert scale and was analysed quantitatively using SPSS. The findings of this study suggest that linking between information sources used by consumers, and the above-mentioned human attributes will ensure the perception of wholesomeness of halal food. In other words, when the consumer’s attitude, habit and awareness towards halal food are high, the consumer will use credible and trusted information sources, and hence reach an effective searching process for halal food information. Accordingly, this study provides insights into how Malaysian Muslim consumers seek information for halal food.

Index Terms: Effective information seeking, Halal food, Human attributes, Information sources. 23. References: 1. D. Ismoyowati, “Halal Food Marketing: A Case Study on Consumer Behavior of Chicken-Based Processed Food Consumption in Central 117-122 Part of Java, Indonesia,” Agriculture and Agricultural Science Procedia, vol.3, pp. 169-172, 2015. 2. Z. M. Janis, “Halal Food- Production, Preparation, Handling and Storage- General Guidelines,” Malaysian Standard MS 1500 & Quality News, pp. 2-3, 2004. 3. H. A. Talib, K. A. M. Ali, and K. R. Jamaluddin, “Quality Assurance in Halal Food Manufacturing in Malaysia: A Preliminary Study,” In the Proceedings of the International Conference on Mechanical & Manufacturing Engineering, pp. 1-5, 2008. 4. N. M. N. Muhammad, F. M. Isa, and B. C. Kifli, “Positioning Malaysia as Halal-Hub: Integration Role of Supply Chain Strategy and Halal Assurance System,” Asian Social Science, vol. 5 (7), pp. 44-52, 2009. 5. J. Leckie Gloria, E. Karen, Pettigrew, Christian and Sylvain, “Modelling the Information Seeking of Professionals: A General Model Derived from Research on Engineers, Health Care Professionals and Lawyers,” Library Quarterly vol. 66(2), pp. 161-193, 1996. 6. L. Freund, “Contextualizing the Information Seeking Behavior of Software Engineers,” Journal of Association for Information Science and Technology, vol. 66(8), pp. 1594-1605, 2015. 7. T. D. Wilson, “Models in Information Behavior Research,” Journal of Documentation, vol. 55(3), pp. 249-270, 1999a. 8. G. Marchionini, “Information Seeking in Electronic Environments,” New York: Cambridge University Press, 1995. 9. I. Ajzen, “From Intention to Action: A Theory of Planned Behavior in J. Kuhl, and J. Beckman,” (Eds), Action Control: From Cognition to Behavior, Springer New York, NY, 1985. 10. I. Ajzen, “The Theory of Planned Behavior,” Organizational Behavior and Human Decision Processes vol. 50, pp. 179-211, 1991. 11. S. Z. Yusoff and N. A. Adzharuddin, “Factor of Awareness in Searching and Sharing of Halal Food Product Among Muslim Families in Malaysia,” SHS Web Conferences 33, 00075 i- COME 16, 2017. 12. A. Abdul Khalek, S. Hayaati, S. I. Hairunnisa, and M. Ibrahim, “A Study on The Factors Influencing Young Muslims’ Behavioral Intention in Consuming Halal Food in Malaysia,” Shariah Journal, vol. 23, pp. 79-102, 2015. 13. M. Borzooei and M. Asgari, “The Halal Brand Personality and its Effect on Purchase Intention,” Interdisciplinary Journal of Contemporary Research in Business, vol. 5(3), 481-491, 2013. 14. K. Bonne, I. Vermeir, F. Bergeaud-Blackler, and W. Verbeke, “Determinants of halal meat consumption in France,” British Food Journal, vol. 109(5), pp. 367-386, 2007. Authors: Veronika Trivia Lestari, Jeanne Ellyawati Effect of E-Service Quality on Repurchase Intention: Testing the Role of E-Satisfaction as Mediator Paper Title: Variable Abstract: Recent developments in information and communication technology have contributed to tremendous economic efficiency. Companies that can take advantage of the sophistication of information and communication technology can operate more efficiently. Firm efficiency will tend to lower product prices and faster delivery time. It is expected to increase consumer satisfaction and repurchase intention. This study investigates the influence of e-service quality on repurchase intention with satisfaction as mediating variable. E-service quality was measured by five variables, namely ease of use, website design, security, personalization, and responsiveness. Good service quality tends to satisfy consumers and leads to repurchase intentions. To collect data, this study used survey design with purposive sampling 24. method. The sample in this study are respondents who have experience in purchasing airline e-tickets for domestic flights within last year. To collect data, we distributed structured questionnaires to 263 respondents. To verify hypothesis, this study used descriptive statistics and hierarchical regression analysis. The results showed that e-satisfaction partially 123-127 mediate the influence of ease of use, website design, responsiveness, and personalization on repurchase intentions. While e-satisfaction proved fully mediates the influence of security guarantees on repurchase intention.

Index Terms: e-satisfaction, e-service quality, online shopping, repurchase intention..

References: 1. R. E. Anderson and S. S. Srinivasan, “E-satisfaction and E-Loyalty: A Contigency Framework,” Psychology and Marketing, 20(2), pp. 123- 138, 2003 2. R. Archana and M. V. Subha, “A Study On Service Quality and Passenger Satisfaction On Indian Airlines,” International Journal of Multidisciplinary Research, 2 (2), pp. 50-63, 2012 3. S. Aren, M. Guzel, E. Kabadayi, and L. Alpkan, “Factors Affecting Repurchase Intention to Shop at the Same Website,” Social and Behavioral Sciences, 99(1), pp. 536-544, 2013. 4. APJII (Asosiasi Penyedia Jasa Internet Indonesia), “Penetrasi dan Perilaku Pengguna Internet Indonesia Survey 2018,” APJII, downloaded from https://.apjii.or.id, 6 May 2019 5. A. Azam, F. Qiang., and M. I. Abdullah, “E-satisfaction in Business to Consumer Electronic Commerce,” The Business and Management Review, 13(1), pp. 18-26, 2012. 6. R. M. Baron, and D. A. Kenny, “The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations,” Journal of Personality and Social Psychology, 51(6), pp. 1173-1182, 1986. 7. S. C. Chang, P. Y. Chou, and L. W. Chien, ” Evaluation Of Satisfaction And Repurchase Intention In Online Food Group-Buying, Using Taiwan As An Example,” British Food Journal, 116(1), pp.44-61, 2014. 8. D. R. Cooper and P. Schindler, “Business Research Methods,” 10th ed., Singapore: McGraw-Hill, 2008 9. J. Ellyawati, “Double Deviation Investigation of Perceived Service Recovery Justice: A Study On The Indonesian Airline Industry,” Journal of Applied Business Research, Vol. 33(6), pp 1263-1272, 2017. 10. O. C. Ferrel and M. O. Hartline, “Marketing Strategy, Text and Cases,” 6th ed., Mason, USA: South Western Cengage Learning, 2014. 11. J. F. Hair Jr., W. C. Black, B. J. Babin, R. E. Anderson, and R. J. Tatham, “Multivariate Data Analysis,” 7th ed., Pearson Education Limited: Edinburgh Gate, 2014. 12. P. K. Hellier, G. M. Geursen, R. A. Carr, and J. A. Rickard, “Customer Repurchase Intention: A General Structural Equation Model,” European Journal of Marketing, 37(11), pp. 1762-1800, 2003. 13. P. Kotler, and G. Armstrong, “Principles of Marketing,” 17th ed., Harlow, UK: Pearson Education Limited, 2018. 14. T.C. Lau, C. L. Kwek, and H. P. Tan, “Airline e-Ticketing Service: How e-Service Quality and Cusomer Satisfaction Impacted Purchase Intention,” International Business Management, 5(4), pp. 200-208, 2011. 15. G. Lee, and H. Lin, “Customer Perceptions of E-Service Quality In Online Shopping,” International Journal of Retail and Distribution Management, 33(2), pp. 161-176, 2005. 16. Y. Lu, Y. Lu, and B. Wang, “Effects of Dissatisfaction on Customer Repurchase Decisions In E-Commerce-An Emotion-Based Perspective,” Journal of Electronic Commerce Research, 13(3), pp. 224-225, 2012. 17. A. Parasuraman, V. A. Zeithaml, and A. Malhotra, “E-S-QUAL: A Multiple –Item Scale for Assesing Electronic Service Quality,” Journal of Service Research, 7(10), pp. 1-21, 2005. 18. D. Ribbink, A. C. R. Van Riel, V. Liljander, and S. Streukens, “Comfort Your Online Customer: Quality, Trust, and Loyalty On The Internet,” Managing Service Quality, 14(6), pp. 446-456, 2004. 19. J. Santos, “E-Service Quality: A Model Of Virtual Service Quality Dimensions,” Management Service Quality, 13(3), pp. 233-46, 2003. 20. U. Sekaran, and R. Bougie, “Research Methods for Business,” 6th Edition. United Kingdom: John Wiley & Son Ltd, 2013. 21. T. Shih, “Comparative Analysis of Marketing Strategies For Manufacturers And Retailers Brands,” International Journal of Electric Business Management, 8(1) pp. 56- 67, 2010. 22. C. Wen, V. R. Prybutok, and C. Xu, “An Integrated Model For Customer Online Repurchase Intention,” The Journal of Computer Information Systems, 52 (1), pp.14-23, 2011. 23. Windi and J. Ellyawati, “Trust, Antecedent and Consequence in Online Shopping Context: Testing The Role of E-WOM as Moderating Effect,” International Journal of Management and Applied Science, 24. Vol. 1 (5): 41-45, June 2015. X. Zhao, J. G. Lynch JR, and Q Chen, “Reconsidering Baron and Kenny: Myths and Thruths about Mediation Analysis,” Journal of Consumer Research, 37(1), pp. 197-206, 2010. 25. www.kompas.com, 2014 (downloaded on 14 March 2019) Authors: Olga Em Paper Title: Improving the Restructuring of Distressed Assets Through Securitization on Emerging Markets Abstract: This article reveals the concept of asset securitization as one of the mechanisms for improving the business through the transfer of selected, homogeneous assets to a special financial purpose vehicle. The definitions of the types of mechanisms for restructuring and improving enterprises in Kazakhstan are given. It is concluded that the asset securitization mechanism can be successfully applied in a rapidly changing business environment, and can also be used widely enough for companies to attract an additional long-term funding source.

Keywords--- securitization, risk management, capital markets, stock market, bond issue, restructuring, credit risk, special 25. purpose vehicle 128-130 References: 1. Law of the Republic of Kazakhstan dated July 02, 2003 No. 461-II (With amendments and additions as of February 27, 2017), Almaty 2003 “On the Securities Market” 2. Law of the Republic of Kazakhstan dated May 13, 2003 No. 415-II (With amendments and additions as of February 27, 2017). Almaty 2003 "On Joint-Stock Companies" 3. Law of the Republic of Kazakhstan “On Rehabilitation and Bankruptcy” (with amendments and additions as of 07/02/2018) 4. Law of the Republic of Kazakhstan dated February 20, 2006 No. 126. (with amendments and additions as of February 27, 2017) “On project financing and securitization” 5. Kase.kz 6. Nationalbank.kz Authors: Rene D. Laguna A Web-based Application for Residential and Non-Residential Centers and Institutions of DSWD Paper Title: (Department of Social Welfare and Development) Region III Records Management and Incident Reporting Abstract: The study aims to develop a web-based application for Residential and Non-Residential Centers and Institutions of DSWD Region III to manage their records and automate the reporting of incidents. Moreover, it also enables citizens to report incidents concerning drug dependents, abandoned or neglected and abused individuals to appropriate centers or institutions. The application has three user access level for efficient and secure managing and sending different types of reports. In the initial data collected, the results show that centers and institutions have many 26. different reports that are being generated. Organizing these reports and searching through them is always a challenge. Concerned citizens reports the incidents they have encountered but experience problems in doing it such as to whom it 131-135 should be reported and the way it should be reported. Evaluation was done by end users in terms of its functional requirements and by the IT experts in terms of the technical aspect in particularly about performance and security. Based from the evaluation, the web-based application has provided the functionalities needed in managing the records of different centers and institutions and regional office. This could help them in handling these records efficiently. Moreover, incidents reported by concerned citizens has been sent to appropriate centers and institutions thereby helping to ease the incident reporting process. As for the recommendation, web-based application would be more usable as mobile web application. Reports generated should be more dynamic. Add more features to maintain the security and confidentiality of the information of reported incidents.

Keywords--- Centers and Institutions, Incident Reporting, Records Management, Web-based Application

References: 1. Slaugther, A. (2017). 3 responsibilities every government has towards its citizens. [online] World Economic Forum. Available at: https://www.weforum.org/agenda/2017/02/government-responsibility-to-citizens-anne-marie-slaughter/ [Accessed 10 Mar. 2019]. 2. Opengovpartnership.org. (2016). Public Service Delivery | Open Government Partnership. [online] Available at: https://www.opengovpartnership.org/theme/public-service-delivery [Accessed 14 Apr. 2019]. 3. Dudley, E., Lin, D., Mancini, M. and Ng, J. (2018). Implementing a citizen-centric approach to delivering government services. [online] McKinsey & Company. Available at: https://www.mckinsey.com/industries/public-sector/our-insights/implementing-a-citizen-centric- approach-to-delivering-government-services [Accessed 9 Apr. 2019]. 4. Dswd.gov.ph. (2015). Organizational Structure | Department of Social Welfare and Development. [online] Available at: https://www.dswd.gov.ph/organizational-structure/ [Accessed 19 Jan. 2019]. 5. Dswd.gov.ph. (2015). Residential and Non-Residential Facilities | Department of Social Welfare and Development. [online] Available at: https://www.dswd.gov.ph/programs/residential-and-non-residential-facilities/ [Accessed 19 Jan. 2019]. 6. Marketing, S. (2017). DSWD urges public to report child abuse | Department of Social Welfare and Development. [online] Dswd.gov.ph. Available at: https://www.dswd.gov.ph/dswd-urges-public-to-report-child-abuse/ [Accessed 7 Dec. 2018]. 7. Bjur, S. (2018). Improving Government Efficiency with Smarter Service Provision. [online] Lp.qmatic.com. Available at: http://lp.qmatic.com/blog/improving-government-efficiency-with-smarter-service-provision [Accessed 11 May 2019]. 8. Ocampo, F. (2017). How will the Philippines' ICT industry change in 2017 and beyond? - Open Access BPO. [online] Open Access BPO. Available at: https://www.openaccessbpo.com/blog/how-will-the-philippines-ict-industry-change-in-2017-and-beyond/ [Accessed 14 Dec. 2018]. 9. Verzozain, F. (2012). Promoting records management in government. [online] Slideshare.net. Available at: https://www.slideshare.net/verzosaf/promoting-records-management-in-government [Accessed 14 Dec. 2018]. 10. Lamont Ph.D., J. (2012). Three hot issues in records management. [online] Kmworld.com. Available at: http://www.kmworld.com/Articles/Editorial/Features/Three-hot-issues-in-records-management-82032.aspx [Accessed 14 Dec. 2018]. 11. Magno, F. and Serafica, R. (n.d.). Information Technology for Good Governance. 1st ed. [ebook] pp.2-3. Available at: http://unpan1.un.org/intradoc/groups/public/documents/apcity/unpan002708.pdf [Accessed 28 Dec. 2018]. 12. Hazan, J. (2016). Incident reporting and a culture of safety. Clinical Risk, [online] 22(5-6), pp.83-87. Available at: https://journals.sagepub.com/doi/abs/10.1177/1356262216682893 [Accessed 10 May 2019]. Authors: VC Shushant Parashar, Shalini Saxena, Meenakshi Local Government Institutions and Environment Management in South Asia: A Research on India and Paper Title: Bhutan Abstract: The need for environmental conservation is recognized globally. This paper makes an attempt to assess the role of Local Government Institutions in the protection of environment in India and Bhutan. Among different levels of environmental administration in India and Bhutan, the most effective is the presence of local government institutions for the efficient utilization and management of natural resources. This paper discusses relevant policies and practices promoted by these institutions for preserving and protecting environment. At the local government level, there are several mechanisms and agencies through which information regarding public welfare and environment conservation can be communicated to the villagers. These can be used to create the much-needed awareness about the protection of the ecology and the environment. This paper examines how the response to environment management can be strengthened with the better involvement of the institutions and the role of these institutions in some specific contexts of environment management and protection.

Key Words: Local Government Institutions, Environment, Security, Ecology, Climate change, India, Bhutan, South Asia.

27. References: 1. https://www.un.org/sustainabledevelopment/climate-change-2/ Accessed on 30.04.19. 2. For details see Report of the Task Force on Panchayati Raj Institutions, Planning Commission, New Delhi, 2001. 136-141 3. A. K. Mishra (et. all), Role of the Panchayati Raj in Rural Development(An Analytical Study of Uttar Pradesh), Management Insight, Vol. 7, No. 1, 2011, p. 47 4. K. Sivaramakrishnan, Environment, Law, and Democracy in India, The Journal of Asian Studies, Vol. 70, No. 4, 2011, pp. 905-928 5. Gram Panchayat and Drinking Water: Elementary Resource Material for Elected Representatives and Functionaries of Gram Panchayats, Ministry of Panchayati Raj, 2014, available at http://www.panchayat.gov.in/documents/10198/456811/ water%20-%2028_08.pdf 6. Water Resources in Gram Panchayats: Active Panchayat Book- VI, Ministry of Panchayati Raj, 2017, available at http://www.panchayat.gov.in/documents/10198/3171935/Water%20-%20English%20- %20Inside.pdf 7. J V Sharma and Priyanka Kohli, Forest Governance and Implementation of REDD+ in India, The Energy and Resources Institute, available at http://www.moef.nic.in/sites/default/files/redd-bk1.pdf 8. ibid 9. Panchayati Raj: Funds Release to Rural Local Bodies, Government of , available at http://www.tnrd.gov.in/fundsrelease.htm 10. Guidelines by Ministry of Panchayati Raj, available at http://pesadarpan.gov.in/en_US/rules 11. Royal Government of Bhutan. (2009). The Local Government Act of Bhutan, 2009. Royal Government of Bhutan. Thimphu. 12. Royal Government of Bhutan. (2014). The Local Government (Amendment) Act of Bhutan, 2014. Royal Government of Bhutan. Thimphu. 13. Royal Government of Bhutan. (2009). The Local Government Act of Bhutan, 2009. Royal Government of Bhutan. Thimphu. 14. Royal Government of Bhutan. (2014). The Local Government (Amendment) Act of Bhutan, 2014. Royal Government of Bhutan. Thimphu. 15. Royal Government of Bhutan. (2014). The Local Government (Amendment) Act of Bhutan, 2014. Royal Government of Bhutan. Thimphu. 16. Royal Government of Bhutan. (2014). The Local Government (Amendment) Act of Bhutan, 2014. Royal Government of Bhutan. Thimphu. 17. (1998). The Middle Path: National Environment Strategy for Bhutan. Keen Publishing 18. Royal Government of Bhutan. (2014). The Local Government (Amendment) Act of Bhutan 2014. Royal Government of Bhutan. Authors: Rogatianus Maryatmo, Jeanne Ellyawati Paper Title: Moral Hazard on Public Health Insurance: Evidence from BPJS in Indonesia 28. Abstract: In early 2014 State Health Insurance program was launched by Indonesian Government. The program is called Badan Penyelenggara Jaminan Sosial (BPJS). The mission of the BPJS is that in the end of 2019 all Indonesian 142-145 People are already covered by the State Health Insurance. This research is aimed to investigate that moral hazard is inevitable from the public health insurance. Using convenience method, 1011 data were collected. There are 893 member of BPJS, and there are 117 were not member of BPJS yet. One is datum missing. Cross-Tabulation and Chi-Square are employed to test the availability of moral hazard. It is found out that moral hazard is inevitable in the health insurance of BPJS. They are who are already member of BPJS tend to visit doctor frequently than that they are who are not member yet. They are whose premium are paid out of pocket tend to visit doctor more frequently than that they are whose premium is partly or totally paid by other parties.

Keywords: health insurance, moral hazard, effect lemon, cherry picking theory, Cross Tabulation, Chi-Squares

References: 1. A. Finkelstein, and M.G.,Katleen, “Mutliple, Dimension of Private Information, Evidence From Long Term Insurance Market,” The American Economic Review, Vol 96, No 4, pp 938- 958, September 2006. 2. B. R. Binger, and E. Hoffman, “Microeconomics With Calculus,” Scott, Foresman and Company, London, pp 505, 1988 3. M. J. Brownea, and R. T. Zhou, “Lemons or Cherries? Asymmetric Information in the German Private Long-term Care Insurance Market,” The Geneva Papers, 2014, 39, pp 603–624, 2014. 4. Y. G. Eisenhouer., “Severity of Illness and the Welfare Effects of Moral Hazard,” International Journal of Health Care Finance and Economics, Vol. 6, DOI 10.1007/s10754-006-9006-3, pp 290-299, 2006. 5. M. Gaynor, K. Ho, and R. J. Town, “The Industrial Organization of Health Care Martket,” Journal of Economic Literature, 53 (2), pp 235- 284, 2015. http//:dx.doi.org/10.1257/JEL, 53.2.235 6. D. N. Gujarati. and D. C. Porter, “Basic Econometrics,” 5th Eddition, McGraw-Hill, 2009 7. B. Hackmann, J.T. Martin,, A. E. Kowalski, “Health Reform, Health Insurance, and Selection: Estimating Selection into Health Insurance Using the Massachusetts Health Reform,” American Economic Review, Paper and Proceeding, 102 (3), pp 498-501, 2012. 8. A. Hoffman, and M. Browne, “One-sided commitment in Dynamic Insurance Contracts: Evidence from Private Health Insurance in Germany,” Journal Risk Uncertain, 46, pp 81-112, 22 January 2013. 9. A.H. Jingwei,, “Introducing Voluntary Private Health Insurance in Mixed Medical Economy: Are Hongkong Citizen Willing to Subscribe?,” The BMC Health Service Research, 17: 603, pp 1-10, 2017. DOI, 10.1186/s12913-017-2559- 10. D.A. Lind,, W. G. Marshal, S. A. Wathen, “Statistical Techniques in Business and Economics,” 16th Ed., Mc-Graw Hill, 2015. 11. L. R. Mendoza, “Which Moral Hazard ? Health Care Reform Under The Affordable Care Act of 2010,” Journal of Health Organization and Management, Vol 30, No 4, 2016, pp 510-529, 2016. @ Emerald Group Publishing Limited 1477-7266: DOI 10.1108/JHOM-03-2015-0054 12. S. O. Olayiwola., and B. L.O. Kazeem, “Count Data Modelling of Health Insurance and Health Care Utilization in Nigeria,” Journal of Economics and Management, Vol. 35 (1) pp 106-123, 2019. ISSN 1732-1948 13. C. Pardo , and W. Schott, “Public Versus Private : Evidence On Health Insurance Selection,” International Journal of Health Care Finance Economics, 12, pp 39-61, 2012. DOI, 10-1007/s10754-012-9105-2, 2012 (47) 14. H. S. Seog,., “Moral Hazard and Health Insurance When Treatment is Preventive,” The Journal of Risk and Insurance, Vol. 79, No. 4, pp 1017-1038, 2012. DOI: 10.1111/j.1539-6975.2011.01459.x 15. J. L. Wang, C. F. Chung, and L. Y. Tzeng, “An Empirical Analysis of The Effect of Increasing Deductible of Moral Hazard,” Journal of Risk and Insurance, Vol 75. No. 3, pp 511-566, 2008. 16. Y. Wang, Y. Linsen, and P. Wenjie, “Life Insurance Contribution, Insurance Development, and Economic Growth in China,” International Journal of Business and Economic Development, Vol 5, No 2, pp 45-58, 2017. 17. Y. Zhiqiang, “Testing For Moral Hazard in reinsurance Market”, Managerial Finance, Vol. 39, No.8, 2013. Authors: Serkan Dincer Paper Title: Are Data Collection Tools for TPACK Suitable? Abstract: Despite a lot of studies existing in the literature about TPACK, it is still not obvious how to do TPACK measurement. However, when the studies investigating measurements are reviewed, it is seen that measurements are considered in informational aspect, and applications are held in only TK aspect or limited in TPC and TCK components. In this study, it is aimed to examine the differences and relationships between measurement instruments by focusing on TPACK measurements. Another goal of the study is to give an insight on how TPACK measurements should be realized. In the research, 213 teachers from different fields working in Turkey have participated and study is designed in Descriptive Survey Model. Three different tools were used in order to collect data. The results showed a meaningful relationship between individuals’ statements tools, but no meaningful relationship between individuals’ statements and performance tools. As a result of the study, many measurement instruments which measure participants’ TPACK measurements have been concluded that they do not actually measure TPACK. Apart from that, it has been found out that the teachers have difficulty in providing technology integration in education and the most important reason of this situation is that the teachers cannot manage to put technological knowledge content into practice.

Index Terms—Data collection, technology integration in education, technology literacy, TPACK.

29. References: 1. Britten, J. S., & Cassady, J. C. (2005). The Technology Integration Assessment Instrument. Computers in the Schools, 22(3–4), 49–61. https://doi.org/10.1300/J025v22n03_05 146-147 2. Mishra, P., & Koehler, M. j. (2006). Technological pedagogical content knowledge: A new framework for teacher knowledge. Teachers College Record, 108(6), 1017–1054. 3. Voogt, J., Fisser, P., Pareja Roblin, N., Tondeur, J., & van Braak, J. (2013). Technological pedagogical content knowledge - A review of the literature. Journal of Computer Assisted Learning, 29(2), 109–121. https://doi.org/10.1111/j.1365-2729.2012.00487.x 4. Akyuz, D. (2018). Measuring technological pedagogical content knowledge (TPACK) through performance assessment. Computers & Education, 125, 212–225. https://doi.org/10.1016/j.compedu.2018.06.012 5. Dinçer, S. (2016). Assessing the computer literacy of university graduates. In C. Li Kam & E. Tsang (Eds.), Proceedings of the Third International Conference on Open and Flexible Education (pp. 294–303). Hong Kong: The Open University of Hong Kong. 6. Kabakci Yurdakul, I., Odabasi, H. F., Kilicer, K., Coklar, A. N., Birinci, G., & Kurt, A. A. (2012). The development, validity and reliability of TPACK-deep: A technological pedagogical content knowledge scale. Computers and Education, 58(3), 964–977. https://doi.org/10.1016/j.compedu.2011.10.012 7. Schmidt, D. A., Baran, E., Thompson, A. D., Mishra, P., Koehler, M. J., & Shin, T. S. (2009). Technological Pedagogical Content Knowledge (TPACK). Journal of Research on Technology in Education, 42(2), 123–149. https://doi.org/10.1080/15391523.2009.10782544 8. Dinçer, S. (2018). Are preservice teachers really literate enough to integrate technology in their classroom practice? Determining the technology literacy level of preservice teachers. Education and Information Technologies, 23(6), 2699–2718. https://doi.org/10.1007/s10639-018-9737-z 9. Georgina, D. A., & Olson, M. R. (2008). Integration of technology in higher education: A review of faculty self-perceptions. Internet and Higher Education, 11(1), 1–8. https://doi.org/10.1016/j. iheduc.2007.11.002. 10. Leu, D. J., O’byrne, W. I., Zawilinski, L., McVerry, J. G., & Everett-Cacopardo, H. (2009). Comments on Greenhow, Robelia, and Hughes: Expanding the new literacies conversation. Educational Researcher, 38(4), 264–269. https://doi.org/10.3102/0013189X09336676. 11. Lim, C. P., Chai, C. S., & Churchill, D. (2011). A framework for developing pre-service teachers’ compe- tencies in using technologies to enhance teaching and learning. Educational Media International, 48(2), 69–83. https://doi.org/10.1080/09523987.2011.576512. Authors: Shivangi Mayur, Nidhi Chaudhary Paper Title: Enhanced Weighted Round Robin Load Balancing Algorithm in Cloud Computing Abstract: The cloud/utility computing model requires a dynamic task assignment to cloud sites with the goal that the performance and demand handling is done as effectively as would be prudent. Efficient load balancing and proper allocation of resources are vital systems to improve the execution of different services and make legitimate usage of existing assets in the cloud computing atmosphere. Consequently, the cloud-based infrastructure has numerous kinds of load concerns such as CPU load, server load, memory drain, network load, etc. Thus, an appropriate load balancing system helps in realizing failures, reducing backlog problems, adaptability, proper resource distribution, expanding dependability and client fulfillment and so forth in distributed environment. This thesis reviewed various popular load balancing algorithms. Modified round robin algorithms are popularly employed by various giant companies for scheduling issues and load balancing. An enhanced weighted round robin algorithm is discussed in this paper concentrating on efficient load balancing and effective task scheduling and resource management.

Key terms: Cloud computing, Load balancing algorithms, Resource allocation, Task scheduling.

References: 30. 1. Al nuaimi, klaithem, nader mohamed, mariam al nuaimi, and jameela al-jaroodi, 2012. "a survey of load balancing in cloud computing: challenges and algorithms." in 2012 second symposium on network cloud computing and applications, pp. 137-142. 148-151 2. Baroncelli, fabio, barbara martini, and piero castoldi, 2010. "network virtualization for cloud computing." annals of telecommunications- annales des télécommunications, 65.11-12, pp. 713-721. 3. Ghomi, einollah jafarnejad, amir masoud rahmani, and nooruldeen nasih qader, 2017. "load-balancing algorithms in cloud computing: a survey." journal of network and computer applications 88, pp. 50-71. 4. Gursharan singh, sunny behal, monal taneja, 2015, “advanced memory reusing mechanism for virtual machines in cloud computing”, 3rd international conference on recent trends in computing 2015 (icrtc-2015), procedia computer science 57, pp. 91 – 103. 5. Hu j, gu j, sun g, zhao t. 2010, “a scheduling strategy on load balancing of virtual machine resources in cloud computing environment.” In 2010 3rd international symposium on parallel architectures, algorithms and programming, pp. 89-96. 6. Krishna pv. 2013, “honey bee behavior inspired load balancing of tasks in cloud computing environments.” Applied soft computing. 1;13(5): pp. 2292-303. 7. Lehrig sebastian, hendrik eikerling, and steffen becker. 2015, "scalability, elasticity, and efficiency in cloud computing: a systematic literature review of definitions and metrics." in proceedings of the 11th international acm sigsoft conference on quality of software architectures. Pp. 83-92. 8. Rahman m, iqbal s, gao j. 2014, “load balancer as a service in cloud computing.” In 2014 ieee 8th international symposium on service oriented system engineering. Pp. 204-211. 9. Singh priyanka, palak baaga, and saurabh gupta. 2016, "assorted load balancing algorithms in cloud computing: a survey." international journal of computer applications. Vol. 143, no. 7, pp. 34-40. 10. Zalavadiya k, vaghela d, 2016. “honey bee behavior load balancing of tasks in cloud computing.” International journal of computer applications. 139(1), pp. 16-9. Authors: Amarnath J L, Pritam Gajakumar Shah Paper Title: M3HP: An Efficient Secured Data Transmission using the Human Generation Solution Abstract: One of the most important and essential tasks in all kinds of online information transmission system is security. In recent days mutual authentication and authorization are used for secured communication and data transmission. Most of the public and private networks are insecure networks. Various existing researchers proposed various secured protocols using various key cryptographic methods, whereas the computational, time and cost, complexity is more and utilize more memory space. Hence, the existing security protocols cannot be used as fast and efficient internet-based applications. To overcome the above-said issues, this paper proposed a Multi-Stage Multi-Model Human Password (MMMHP-M3HP) generation framework to provide a highly secured data transmission in online applications. The M3HP framework generates a human password is by combining various data models like numerical, alphabets, alpha-numerical and images for authorizing the end users in various stages of the applications. This is so-called Multi-stage and Multi-Model security. Each time user enters into the application, the password is regenerated and cross verified to increase the security level.

Index Terms— Human Password Generation, Security in Cloud, Data security, Multi-level security, Authentication, Authorization 31. References: 152-158 1. D. Florencio and C. Herley. A large-scale study of web password habits. In Proceedings of the 16th international conference on World Wide Web, pages 657-666. ACM, 2007. 2. I.A.D. Center. Consumer password worst practices. Imperva (White Paper), 2010. 3. H. Kruger, T. Steyn, B. Medlin, and L. Drevin, “An empirical assessment of factors impeding effective password management”, Journal of Information Privacy and Security, 4(4):45-59, 2008. 4. J. Bonneau, “The science of guessing: analyzing an anonymized corpus of 70 million ”, In Security and Privacy (SP), 2012 IEEE Symposium on, pages 538-552. 5. Cert incident note in-98.03: Password cracking activity. http://www.cert.org/incident_notes/IN-98.03.html, July 1998. Retrieved 8/16/2011. 6. I.A.D. Center. Consumer password worst practices. Imperva (White Paper), 2010. 7. Sam. Biddle. leaks 90,000 military email accounts in the latest antisec attack. http://gizmodo.com/5820049/anonymous-leaks- 90000-military-email-accounts-in-latest-antisec-attack, July 2011. Retrieved 8/16/2011. 8. Nato site hacked. http://www.theregister.co.uk/2011/06/24/nato_hack_attack/, June-2011. Retrieved 8/16/2011. 9. Abe. Singer. No plaintext passwords. ; login: THE MAGAZINE OF USENIX & SAGE, 26(7), November 2001. Retrieved 8/16/2011. 10. Zappos customer accounts breached. http://www.usatoday.com/tech/news/story/ 2012-01-16/mark-smith-Zappos--tips/52593484/1, January 2012. Retrieved 5/22/2012. 11. Oh man, what a day! an update on our security breach. http://blogs.atlassian.com/news/ 2010/04/oh_man_what_a_day_an_update_on_our_security_breach.html, April 2010. Retrieved 8/18/2011. 12. Apple security blunder exposes lion login passwords in clear text. http://www.zdnet.com/ blog/security/apple-security-blunder-exposes-lion- login-passwords-in-clear-text/ 11963, May 2012. Retrieved 5/22/2012. 13. Update on play station network/Qriocity services. http://blog.us.playstation.com/2011/ 04/22/update-on-play station-network-Qriocity- services/, April 2011. Retrieved 5/22/2012. 14. An update on linked to member passwords compromised. http://blog.linkedin.com/2012/ 06/06/linkedin-member-passwords-compromised/, June 2012. Retrieved 9/27/2012. 15. The data breach at ieee.org: 100k plaintext passwords. http://ieeelog.com/, September 2012. Retrieved 9/27/2012. 16. Important customer security announcement. http://blogs.adobe.com/conversations/ 2013/10/important-customer-security- announcement.html, October 2013. Retrieved 2/10/2014. 17. Jeremiah Blocki, Manuel Blum, and Anupam Datta. Naturally rehearsing passwords. In Kazue Sako and Palash Sarkar, editors, Advances in Cryptology - ASIACRYPT 2013, volume 8270 of Lecture Notes in Computer Science, pages 361{380. Springer Berlin Heidelberg, 2013. 18. Manuel Blum and Santosh Vempala. Publishable humanly usable secure password creation schemas. Proc. of HCOMP, 2015. 19. Anees Ara, Mznah Al-Rodhaan, Yuan Tian and Abdullah Al-Dhelaan, (2016), “A Secure Privacy-Preserving Data Aggregation Scheme based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems”, IEEE, Translations and content mining, Vol. 5, No. 1, PP. 12601 – 12617. 20. J. A. Akinyele et al., (2013), “Charm: A framework for rapidly prototyping cryptosystems,” Journal of Cryptography Engineering, vol. 3, no. 2, pp. 111–128. 21. M. Bellare, B. Waters, and S. Yilek, “Identity-based encryption secure against selective opening attack,” in Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, Springer, Heidelberg, 2011, pp. 235-252. 22. Adi Shamir, “Identity-based Cryptosystems and Signature Schemes”, Adv. in Cryptology, CRYPTO’84, vol. 196, LNCS, New York, USA, Springer Berlin, 1985, pp. 47-53. 23. Dan Boneh and Matt Franklin, “Identity-Based Encryption from the Weil Pairing,” CRYPTO’01. Int. Cryptology Conf. on Advances in Cryptology, London, UK, August 19-23, Springer, Vol. 2139, 2001, pp. 213-229. 24. R Canetti, S Halevi, and J Katz, “A forward-secure public-key encryption scheme,” EUROCRYPT'03. Int. conf. in TACT, Springer, 2003, pp. 255-271. 25. Jongkil Kim, Willy Susilo, Man Ho Au, and Jennifer Seberry, "Adaptively Secure Identity-Based Broadcast Encryption With a Constant- Sized Ciphertext", IEEE Transactions On Information Forensics And Security, vol. 10, no. 3, Mar. 2015. 26. Nie TY, Song C, Zhi X. Performance Evaluation of DES and Blowfish Algorithms, 2010 International Conference on Biomedical Engineering and Computer Science, ICBECS, Wuhan. 2010; 1−4. 27. Arora R, Parashar A. Secure user data in cloud computing using encryption algorithms, International Journal of Engineering Research and Applications. 2013 Jul-Aug; 3(4):1922−26. 28. Boneh D, DiCrescenzo G, Persona G, Ostrovsky R. Public key encryption with a keyword search. In Advances in Cryptology- Eurocrypt, Springer-Verlag: Berlin Heidelberg. 2004; 506-22. 29. Blessed Prince P, Krishnamoorthy K, Anandaraj R, Jeno Lovesome SP. RSA-DABE: A Novel Approach for Secure Health Data Sharing in Ubiquitous Computing Environment. Indian Journal of Science and Technology. 2015 Aug; 8(17): 1−9. Authors: Mukesh Rawat, Suryoday Smann Paper Title: Implementation and Evaluation of User Activity System as a Web Service Abstract: Web service is a service which allows different systems to connect with each other via World Wide Web (www). It uses technology like Http (Hyper Text Markup Language). It was originally designed for human to machine communication, but now used for machine to machine communication. We have to develop an application that is platform independent and can be availed by anyone from anywhere, it would be only possible if it is platform independent that is there is no restriction of the language which is to be used for running the application as it will be using web services to fetch the data and showing the desired results and we would be showing the comparison between the Standalone and the web based services. Developing file service as web services have many benefits such as interoperability, low cost of communication, supports remote procedure calls, supports document exchange etc. In this thesis file services efficiency measured with the help of performance criteria non as F-measure. 32. References: 1. Louridas, P. “SOAP and Web Services Software”, IEEE Volume: 23, Issue: 6 Digital Object Identifier: 10.1109/MS.2006.172 Publication 159-165 Year: 2006, Page(s): 62 – 67. 2. B. Medjahed, A. Bouguettaya, and A. Elmagarmid, “Composing Web Services on the Semantic Web,” J. Very Large Databases, vol. 12, no. 4, Nov. 2003, pp. 333–351. 3. David Booth, W3C Fellow (2013, March) Web Services Architecture. [Online]. www.w3.org. 4. P. Hamill, "Unit Testing Web Services," Dr. Dobb's Journal, vol. 33, pp. 53-58, 2008. 5. S. Sakr, “XML compression techniques: A survey and comparison,” Computer and System Science, vol. 75, no. 5, pp. 303–322, Aug. 2009. 6. S. Heinzl, M. Mathes and B.M. Freisleben, “A Web service communication policy for describing nonstandard application requirements,” in Proc. Int. Sym. Applications and the Internet 2008, pp. 40–47. 7. F. Curbera et al., “Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI,” IEEE Internet Computing, vol. 6, no. 2, 2002, pp. 86–93. 8. Benslimane, D.; Dustdar, S.; Sheth, A. (2008). "Services Mashups: The New Generation of Web Applications". IEEE Internet Computing. 10 (5): 13–15. www.w3.org/TR/ws-arch. 9. W3C Note, Web Services Description Language (WSDL) 1.1, 15 March 2001, http://www.w3.org/TR/2001/NOTE-wsdl-20010315. Authors: R.Sridevi, S.Selvi Paper Title: Progressing Biometric Security Concern with Blowfish Algorithm Abstract: The world today is completely secured with most recent advancements. Consequently the security is still a huge issue. Biometric provides high security with more precision which recognizes the individual dependent on their physiological qualities of a person by utilizing their biometrics. It aims that the biometric will build security, dependability and agreeableness in the most recent innovation of PC framework. The mainstream MIPS based cryptography processor is utilized for equipment and programming items and guidelines require cryptography keys length for higher security level. Merging biometric with MIPS cryptography processor is as a possible arrangement. We utilize 33. new way to deal with Network security utilizing MIPS constructed crypto processor situated in light of contactless palm vein biometric framework. This methodology considers NOC limitations and its topology. It gives greater security with 166-171 less key length and there is no compelling reason to store any private key anyplace. Blow fish algorithm is more secure to analyze other symmetric key calculations, and deliver best outcome for less handling time and adjusts to build the key size of blowfish calculation.

Keywords: Security, Cryptography, Biometrics, MIPS and Blowfish algorithm.

References: 1. Jain, A., Hong, L., and Pankanti, S. (2000). Biometric identification. Communications of the ACM, 43(2):90-98. 2. Kanth, B. and Giridhar, B. (2010). Gene expression based acute leukemia cancer classifi- cation: A neuro-fuzzy approach. International Journal of Biometrics and Bioinformatics (IJBB), 4(4):136. 3. Anil K. Jain, Ajay Kumar, "Biometrics of Next Generation:An Overview to Appear in Second Generation Biometrics", Springer, 2010 4. U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain. Biometric cryptosystems: issues and challenges. Proceedings of the IEEE, 92(6):948{960, June 2004 5. Wang, Xing-Yuan, Sheng-Xian Gu, and Ying-Qian Zhang. "Novel image encryption algorithm based on cycle shift and chaotic system." Optics and Lasers in Engineering Vol.6, No.8,pp. 126-134,2015 6. Mehreen Ansar, "Biometric Encryption in Cloud Computing: A Systematic Review", IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.8, August 2018 7. R. ArunPrakash, "Biometric Encoding and Biometric Authentication (beba) Protocol for Secure Cloud in M-Commerce Environment", Appl. Math. Inf. Sci. 12, No. 1, 255-263 (2018) 8. Tonimir Kišasondi, "Improving Computer Authentication Systems With Biometric Technologies" Croatian Society for Information and Communication Technology, 2006. 166-171 9. Ostovari, Pouya, Jie Wu, and Abdallah Khreishah. "Network coding techniques for wireless and sensor networks." (2013). 10. Y. Sun, T. La Porta, and P. Kermani, "A flexible privacy enhanced location-based services system framework and practice," IEEE Trans. Mobile Comput., vol. 8, no. 3, pp. 304-321, Mar. 2009. 11. M.Pitchaiah, Philemon Daniel, Praveen, "Implementation of Advanced Encryption Standard Algorithm", International Journal of Scientific & Engineering Research (IJSER), Vol.3, No.3, ISSN 2229-5518, 2012. 12. Ritu Pahal and Vikas Kumar, "Efficient Implementation of AES" ,International Journal of Advanced Research in Computer Science and Software Engineering,Vol.3,No.7,ISSN 2277 128X,2013 13. Jasmeet Singh, Harmandeep Singh, "Design and Development of a Rapid AES based Encryption Framework",International Journal of Engineering Research & Technology(IJERT),Vol.3,No.10,ISSN:2278-0181,2014. 14. Lawrence E. Bassham,"The Advanced Encryption Standard Algorithm Validation Suite", National Institute of Standards and Technology Information Technology Laboratory Computer Security Division, Vol.14, No.06, pp.789-981, 2002. 15. MilindMathur, "Comparison between DES, 3DES, RC2, RC6, BLOWFISH and AES", National Informatics Center Network NICNET, Vol. 1, No.3, pp. 143-148, 2013. 16. C. Nandini and B. Shylaja, "Efficient Cryptographic key Generation from Fingerprint using Symmetric Hash Functions", International Journal of Research and Reviews in Computer Science (IJRRCS), Vol. 2, No. 4, August 2011.

Authors: Aparna Chauhan, Ankur Garg Paper Title: Identification of Models-Decision Tree and Random Forest Classifier using Rattle on Diabetes Disease Abstract: Diabetes is the disease which is growing now a days in human body and there are a number of patient who are suffering by this diabetes in the world. The data related to medical area is very huge which is related to the many disease. So the first thing is that we have to choose a mining tool which give best result for the given databases. Because, this medical data is statistical and most of the researchers using this type of data. Data mining tool is used for the extracting better result in accuracy for the diabetes data base. By the data mining techniques the medical expert and researchers analyze the result and provide the best treatment for this disease. In this paper we are using diabetes data and apply it on the Rattle, an open source tool of data mining and perform two classification methods decision tree and random forest tree for classify the data and show that which classification algorithm is best for diabetes dataset.

Keywords--- Data mining, Diabetes, Rattle tool, Decision Tree, Random Forest Tree.

34. References: 1. S.Vijiyarani S.Sudha,“ Disease Prediction in Data Mining Technique”– A Survey,International Journal of Computer Applications & 172-176 Information Technology Vol. II, Issue I, January 2013 (ISSN: 2278-7720) 2. Prof.Sumathy, Prof.Mythili, Dr.Praveen Kumar, Jishnujit T M, K Ranjith Kumar, “Diagnosis of Diabetes Mellitus based on Risk Factors”, International Journal of Computer Applications, Vol.10, Issue No.4, November.2010 3. Ioannis Kavakiotis, Olga Tsave, Athanasios Salifoglou, Nicos Maglaveras, Ioannis Vlahavas, Ioanna Chouvarda,” Machine Learning and Data Mining Methods in Diabetes Research”, Computational and Structural Biotechnology Journal 15 (8 January 2017) 104–116 4. Miss. N. Vijayalakshmi, Miss. T. Jenifer, “An Analysis of Risk Factors For Diabetes Using Data Mining Approach”, IJCSMC, Vol. 6, Issue. 7, July 2017, pg.166 – 172 5. S.Selvakumar, K.Senthamarai Kannan, S.GothaiNachiyar,” Prediction of Diabetes Diagnosis Using Classification Based Data Mining Techniques”, International Journal of Statistics and Systems ISSN 0973-2675 Volume 12, Number 2 (2017), pp. 183-188. 6. P.Yasodha, M. Kannan, “Analysis of a Population of Diabetic Patients Databases in WEKA Tool”. International Journal of Scientific & Engineering Research, Volume 2, Issue 5, May-2011 ISSN 2229-5518 Analysis of a Population of Diabetic Patients Databases in WEKA Tool. 7. Jiawei Han and Micheline Kamber. Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers, 2nd edition, 2006. 8. Assal, J. P., and L. Groop. "Definition, diagnosis and classification of diabetes mellitus and its complications." World Health Organization (1999): 1-65. 9. Koh, Hian Chye, and Gerald Tan. "Data mining applications in healthcare."Journal of healthcare information management 19.2 (2011): 65. Authors: Ankur Mittal, Abhilash, R.P. Mahapatra Paper Title: Evaluation of Parallel System using Process Algebra Abstract: In this paper we discuss method for efficiency testing of a concurrent processes execution system. We use the concept of process algebra, it is an algebraic technique for the study of execution of parallel processes. Mathematical language is use for building models of computing system which make records about the execution of the procedure. We use PEPA tool, TAPA tool for making model. These tools provide formal explanation of computing system models. The execution related data about the system will be use to check the execution efficiency of the procedure. Here we use 35. concept of markov chain analysis for execution of the concurrent processes.

177-182 Key words: Process Algebra, PEPA, TAPA, Parallel System

References: 1. Bergstra, j. A. And klop, j. W. (1983a), "A Procedure calculi for the OperationalSemantics of Static Data Flow Networks," Report IW222/83, Mathernatisch Centrum,Amsterdam. 2. J. Hillston. PEPA - Performance Enhanced Process Algebra. Technical report, Dept. of Computer Science, University of Edinburgh, March 1993. 3. J. Hillston. A Compositional Approach to Performance Modelling. PhD thesis, Department of Computer Science, University of Edinburgh, 1994. to appear. 4. R. Milner. Communication and Concurrency. Prentice-Hall, 1989. 5. Bradley, J., Dingle, N., Gilmore, S., Knottenbelt, W.: Derivation of passage-time densities in PEPA models using IPC: The Imperial PEPA Compiler. In: Kotsis, G. (ed.) Proceedings of the 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems, University of Central Florida, pp. 344–351.IEEE Computer Society Press, Los Alamitos (2003). 6. Robin Milner. 1980. A Calculus of Communicating Systems. Lecture Notes in Computer Science, Vol. 92. Springer. 7. Abhilash, Ram Chakka, Rama Krishna Challa, "Numerical Performance Evaluation of Heterogeneous Multi-Server Models With Breakdowns and FCFS, LCFS-PR, LCFS-NPR Repair Strategies", Advance Computing Conference (IACC), Volume :, pp. 566-570, 2013, 2013-02-22 Authors: Shikha Golyan, Rohit Aggarwal Paper Title: An Efficient Type 4 Clone Detection Technique for Software Testing Abstract: Software testing is a procedure which is utilized to distinguish the bugs and reveal it. Software testing is a procedure and control moreover. It is not quite the same as programming improvement. It ought to be viewed as that is a piece of programming improvement. Clone testing is one of the sorts of testing. It is utilized to check the guile in the product. While build up any product for sparing time and exertion, programming designer. Reorder program code over and over. So if any bug found in one module is duplicated in each duplicate. There are numerous duplicates of code present and no record of such duplicates is available. This will make hard to fix such bugs and upkeep of existing programming. Code clone is one of the components making programming upkeep increasingly troublesome. There are various kinds of clones present, Type 1, Type 2, Type 3, Type 4. The current calculation has identified clone in Type 3 as it were. In the proposed work we will improve algorithm which will probably identify clone in TYPE 4 too. This expands the presentation of the framework.

Keywords: Algorithm, code clone, clone testing, software testing

36. References: 1. Sandeep Kaur, Geetika Chatley and Bhavneesh Sohaal, "Software Clone Detection:A Review", 2016, International Journal of Control 183-187 Theory and Applications 2. Swati Sharma, Priyanka Mehta, "A Literature Survey on Software Clone Testing", International Journal of Science, Engineering and Technology Research (IJSETR) Volume 5, Issue 4, April 2016 3. Manpreet Kaur and Rupinder Singh, "A Review of Software Testing Techniques", 2014, International Journal of Electronic and Electrical Engineering 4. Brent van Bladel, Serge Demeyer, "A Novel Approach for Detecting Type-IV Clones in Test Code", 2019 IEEE 13th International Workshop on Software Clones (IWSC) 5. Swati Sharma, Priyanka Mehta, "To Enhance Type 4 Clone Detection in Clone Testing", (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (2), 2016, 967-971 6. Rowyda Mohammad, AbdEl-Aziz, Amal Elsayed, Aboutabl, Mostafa-Sami Mostafa, "Clone Detection Using DIFF Algorithm for Aspect Mining", International Journal of Advanced Computer Science and Applications, Vol. 3, No.8, 2012 7. Mohd. Ehmer Khan, "Different Forms of Software Testing Techniques for Finding Errors", IJCSI, International Journal of Computer Science, Issues, 7, 2010 8. Salwa K.Abd-El-Hafiz, "Code Cloning: The Analysis, Detection and Removal", International Journal of Computer Applications, Volume 20- No.7, April 2013 9. C. K. Roy, "Detection and Analysis of Near-Miss Software Clones",Ph.D. Thesis, Queen'sSchool of Computing, Queens University, 2009- 08-31. 10. Jovanovic Irena, "Software testing methods and techniques", 2002. Authors: Mayuri Goel, Vimal Kumar Paper Title: Data Acquisition From Mobile Phone using Mobiledit Abstract: Mobile forensic is a subsidiary of digital forensic that is flourishing constantly. As per current scenario, mobile phones not only mean traditional mobile phones that were developed and used in late 1990s but also include smart phones that offer an array of functionality. Mobile phones developed in 1990s also known as feature phones provided limited functionality such as calling and messaging as they were subjected to provide communication facility. But at present, mobile phones are used not only for communication but also for executing face to face interactions, shopping using various applications, trading and internet surfing, etc thus making mobile more feature-variant and making them smart. Since, mobile phone market is constantly rising because of increased and improved features; usage of mobile phones in criminal activities or illegal activities has also increased. The scene can be re-created by identifying the series of actions that has taken place when crime was committed by using compatible mobile forensic tools. Current attack could not be prevented, but the investigator can attain all crucial evidences present on the crime scene in order to reduce similar kind of attacks in future. The capturing and recording of crime scene, collecting and analyzing the evidence and finding the culprit and reason of committing crime is the art of mobile forensics. In this paper, we are going 37. to discuss the implementation of proposed framework by using tool MOBILedit.

Keywords: mobile phones, mobile forensic, smart phones 188-191

References: 1. Aziz, N. A., Mokhti, F., & Nozri, M. N. M. "Mobile Device Forensics: Extracting and Analysing Data from an Android-Based Smartphone." In Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec), (pp. 123-128). IEEE (2015). 2. Osho, O., & Ohida, S. O. "Comparative evaluation of mobile forensic tools." IJ Inf. Technol. Comput. Sci, 74-83, (2016). 3. Kubi, A. K., Saleem, S., & Popov, O. "Evaluation of some tools for extracting e-evidence from mobile devices." In 5th International Conference on Application of Information and Communication Technologies (AICT), (pp. 1-6). IEEE (2011). 4. Daware, S., Dahake, S., & Thakare, V. M. "Mobile forensics: Overview of digital forensic, computer forensics vs. mobile forensics and tools." International Journal of Computer Applications (2012). 5. Murphy, Cynthia A. "Developing process for mobile device forensics." Accessed on 11 (2009). 6. Alhassan, M. M., & Adjei-Quaye, A. "Computer & Cyber Forensics: A Case Study of Ghana." American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS), 28(1), 167-176 (2017). 7. Lohiya, R., John, P., & Shah, P. "Survey on mobile forensics." International Journal of Computer Applications, 118(16) (2015). 8. Zareen, A., & Baig, S. "Mobile Phone Forensics Challenges. Analysis and Tools Classification." Fifth (2010). 9. Lutes, K. D., & Mislan, R. P. "Challenges in mobile phone forensics." In Proceeding of the 5th International Conference on Cybernetics and Information Technologies, Systems and Applications (CITSA) (2008). 10. Tassone, C., Martini, B., Choo, K. K. R., & Slay, J. "Mobile device forensics: A snapshot." Trends and Issues in Crime and Criminal Justice, (460), 1 (2013). 11. Raghav, S., & Saxena, A. K.. Mobile forensics: "Guidelines and challenges in data preservation and acquisition." In Student Conference on Research and Development (SCOReD), IEEE (pp. 5-8) (2009). 12. Wazid, M., Katal, A., Goudar, R. H., & Rao, S. " trends, digital forensic tools and challenges: A survey." In 2013 IEEE Conference on Information & Communication Technologies (pp. 138-144). IEEE (2013). 13. Ahmed, R., & Dharaskar, R. V. "Mobile forensics: an overview, tools, future trends and challenges from law enforcement perspective." In 6th international conference on e-governance, iceg, emerging technologies in e-government, m-government (pp. 312-23) (2008). Authors: Vaishali Malik, Pradeep Pant Paper Title: Manufacturing Defect Detection in Ceiling Fans using Image processing Abstract: During manufacturing process of ceiling fans there may be possibility that any step of manufacturing process can be skipped or improper completion due to malfunctioning of the system. In manufacturing process of fans, the outer plate, stator, rotor, axle and other parts are manufactured and assembled. If the winding machine is not working properly and improper windings is done and no-one can acknowledge that winding machine is not working properly then the whole batch should be designed with defect and this will surely create negative impact on the production process of the industry. So this proposed work will overcome this problem. This paper guides to detect whether the windings are proper or not and detection is carried out by taking picture of armature-windings. If there is any problem in the windings then our system will generate an alert so that other armatures can be protected from failures. Manual results are not so accurate all the time but in manufacturing process we need high accuracy. For this skilled labor is required and for skilled labor we have to pay more, this automated system reduce the need of skilled labor. If fan manufacturing industries use this image processing system then this will be very helpful in increasing production of fans within the completion time with more accuracy.

Keywords: Defect, Detection, Fan, Image, Manufacturing, Rotor. 38. References: 1. E.N. Malamas, E.G.M. Petrakis, M. Zervakis, L. Petit, J.D. Legat, A survey on industrial vision systems, applications and tools, Image and 192-195 Vision Computing 21, 2003, 171–188. 2. M.A.Coulthard, "Image Processing for Automatic Surface Defect Detection," Surface Inspection Ltd, UK, pp. 192-196. 3. Rafael C. Gonzalez and Richard E. Woods, third edition, Pearson Education International. "Digital Image Processing". 4. VineetSaini, RajnishGarg, IOSR Journal of Electronics and Communication Engineering, Volume 1, May-June 2012, ISSN: 2278-2834. "A Comparative Analysis on Edge Detection Techniques Used in Image Processing 5. R. C. Gonzalez, R. E. Woods, "Digital Image Processing", PearsonEducation (Singapore), Pte. Ltd., Indian Branch, 482 F.I.E. Patparganj,2005-2006. 6. Puyin Liu, Hongxing Li, "Fuzzy Neural Network Theory andApplication". World Scientific, 2004. 7. H. Elbehiery, A. Hefnawy, and M. Elewa, "Surface Defects DetectionUsing Image Processing and MorphologicalTechniques", Proceedings of World Academy of Science, Engineeringand Technology, vol 5, pp 158-160, April 2005, ISSN 1307-6884. 8. Se Ho Choi, Jong Pil Yun, BoyeulSeo, Young Su Park, Sang Woo Kim,"Real-Time Defects Detection Algorithm for High-Speed Steel Bar inCoil", Proceedings of World Academy of Science, Engineering andTechnology, Volume 21, January 2007, ISSN 1307-6884. 9. Mohamed Roushdi, "Comparative Study of Edge Detection AlgorithmsApplying on the Grayscale Noisy Image Using Morphological Filter",GVIP Journal, Volume 6, Issue 4, December, 2006. 10. Kumar, Tarun, and Karun Verma. "A Theory Based on Conversion of RGB image to Gray image." International Journal of Computer Applications 7.2 (2010): 7-10. 11. Min, Yongzhi, et al. "Real time detection system for rail surface defects based on machine vision." EURASIP Journal on Image and Video Processing 2018.1 (2018):3. 12. Nakano, Kanako, et al. "Detection of object in digital image." U.S. Patent Application No. 10/027,878. Authors: Shaifali Chauhan, Ankur Garg Paper Title: Predictive Research for Mental Health Disease Abstract: Many people are suffering from some kind of mental illness and this number is increasing day by day. Despite major revolutions in medical science exact identification of factor that leading to mental illness is still unknown to the world. Due to its ambiguous nature, mental state of person is a major focus on research these days. With the emergence of smart phones, PCs, internet of things. The amount of data human kind produce everyday is huge and only accelerating. These data are stored in a semi structured way and used to get meaningful relationships and trends in data. Data mining techniques can be efficiently used on this data to find hidden patterns between different attributes of data. This paper describes the prototype to use data mining technique namely Random forests classification to determine person’s mental state based on attributes such as age, gender, life style, education, Occupation, personal income, vision, sleep, mobility, hypertension, diabetes. The system will predict whether a patient is suffering from mental illness or not. 39. KEYWORDS: Data mining, Random Forest, Decision tree, Knowledge Discovery. 196-199

References: 1. Lopez AD, Murray CCJL{1998): The Global Burden of Disease,1990-2020, Nature Medicine vol 4,pp 1241-1243 2. The World Health Organization(2011a). political Declaration of the High-level Meeting of the General Assembly on the Prevention and Control of Non-Communicable Diseases. 66th Session of the United Nations General Assembly, New York:WHO 3. Jiawei Han and Micheline Kamber. Data Mining : Concepts and Techniques. Morgan Kaufmann Publishers, 2nd edition,2006 4. Niel Liberman. Decision Tress and Random Forests. Towards data science.com 5. Deswal BS, Pawar A. An Epidemiological Study of Mental Disorders at Pune, Maharashtra. Indian J Community Med. 2012;37(2):116-21. 6. G. Holmes; A. Donkin and I.H. Witten (1994). "Weka: A machine learning workbench". Proc Second Australia and New Zealand Conference on Intelligent Information Systems, Brisbane, Australia.URL:http://www.cs.waikato.ac.nz/~ml/publications/1994/Holmes- ANZIIS-WEKA.pdf. Retrieved 2007-06-25. 7. http://datamining.togaware.com/survivor/Loading_Data.html. 8. Graham J Williams, Rattle: A Data Mining GUI for R, The R Journal Vol. 1/2, December 2009, ISSN 2073-4859 Authors: Ramesh Dadi ,Sallauddin MD, Syed Nawaz Pasha, A. Harshavardhan, P.Kumarawamy 40. Paper Title: Adapting Best Path for Mobile Robot By Predicting Obstacle Size Abstract: In this paper we are proposing an approach to find obstacle size to reduce the searching area for path planning for mobile robot. With this approach, the vehicle is able to reduce searching area compare to other algorithms. This is main problem normally all the algorithms were concentrate how to optimal path but without reducing searching area it’s not possible .The approach we use in our model consists of various kinds of obstacles such as motor cycles, pedestrians, animals, etc. The presence of and the appropriate path is planned according to the dimensions of the obstacle as different obstacles have different dimensions.

Keywords: Optimal path, varying obstacle, dynamic environment.

References: 1. A NOVEL APPROACH TO PATH PLANNING OF ROBOTS BY ETECTING DYNAMIC OBSTACLES. Syed Nawaz Pasha, D. Ramesh & G Roopa 200-202 2. D. W. Payton, J. K. Rosenblatt and D. M. Keirsey, “Grid-based mapping for autonomous mobile robot,” Robotics and Autonomous Systems, vol. 11, no. 1, pp. 13–21, 1993. 3. A metaheuristic approach to solve Dynamic Vehicle Routing Problem in continuous search space.by Michaª Okulewicza,_, Jacek Ma«dziuka 4. A. Stevens and P. Coupe, “Distortions in Judged Spatial Relations,” Cognitive Psychology,10(4), 1978, pp. 526–550. 5. Hart P. E., Nilsson N. J., Raphael B., A Formal Basis for the Heuristic Determination of Minimum Cost Paths, IEEE Transactions on Systems Science and Cybernetics SSC4 (2):pp. 100–107, 1968. 6. C.-K. Yap, “Algorithmic motion planning,” in Advances in Robotics vol. 1: Algorithmic and Geometric Aspects of Robotics, J. T. Schwartz and C.-K. Yap, Eds. Hillsdale, New Jersey: Lawrence Erlbaum, 1987 7. A. Stentz, “The Focussed D* Algorithm for Real-Time Replanning”, Proceedings of International Joint Conference on Artificial Intelligence, 1995, pp. 1213–1221. 8. Biologically Inspired Visual Odometry Based on the Computational Model of Grid Cells for Mobile Robots Huimin Lu 2016 IEEE. 9. Robotic Motion Planning in Unknown Dynamic Environments: Existing Approaches and Challenges2015¬¬¬¬ IEEE International Symposium on Robotics and Intelligent Sensors (IEEE IRIS20I5 Authors: HemaLatha Goli, Ch. Aparna Performance Research on different Machine Learning Algorithms for Detection of Sleepy Spindles from Paper Title: EEG signals Abstract: Now a days spindles caused by drowsiness and it has become a very serious issue to accidents. A constant and long driving makes the human brain to a transient state between sleepy and awake. In this BCI plays a major role, where the captured signals from brain neurons are transferred to a computer device. In this paper, I considered the data which are collected from single Electroencephalography (EEG) using Brain Computer Interface (BCI) from the electrodes C3-A1 and C4-A1.Generally these sleepy spindles are present in the theta waves, whose are slower and high amplitude when compared to Alpha and Beta waves and the frequency in ranges from 4 – 8 Hz. The aim of this paper to analyse the accuracy of different machine learning algorithms to identify the spindles.

Key Words: - Electroencephalography (EEG), Brain Computer Interface (BCI), Wavelet Transform, Fast Fourier Transform (FFT), Support Vector Machines (SVM), Neural Networks (NN), Random Forest (RF), Gaussian Naïve Bayes (GNB), K-nearest neighbour (K-NN).

References: 1. J. P. Varghese, “Analysis of EEG Signals For EEG-based Brain-Computer Interface,” School of Innovation, Design and Technology, Malardalen University, Vasteras, Sweden,2009 2. P. Anderer, S. Roberts, A. Schlogl, G. Gruber, G. Klosch, W. Herrmann, P. Rappelsberger, O. Filz, M.J. Barbanoj, G. Dorffner, B. Saletu, Artefact processing in computerized analysis of sleep EEG – a review, Neuropsychobiology 40 (1999) 150–157. 3. E. Walls-Esquivel, M.F. Vecchierini, C. Heberle, F. Wallois, Electroencephalography (EEG) recording techniques and artefact detection in early premature babies, Clin. Neurophysiol. 37 (2007) 299–309. 4. D.P. Brunner, R.C. Vasko, C.S. Detka, J.P. Monahan, C.F. Reynolds, D.J. Kupfer, Muscle artefacts in the sleep EEG: automated detection and effect on all-night EEG power spectra, J. Sleep Res. 5 (1996) 155–164. 41. 5. L. Cohen, Time–Frequency Analysis, Prentice-Hall, New Jersey, 1995. 6. D. Balakrishnan, S. Puthusserypady, Multilayer perceptron’s for the classification of brain computer interface data, in: Bioengineering 203-208 Conference, 2005. Proceedings of the IEEE 31st Annual Northeast, 2005, pp. 118–119. 7. C.M. Bishop, Neural Networks for Pattern Recognition, Oxford University Press, Inc., 1995. 8. [8]S.Haykin, Neural Networks: A Comprehensive Foundation, Prentice Hall PTR, 1994. 9. T.M. Mitchell, Machine learning and data mining, Commun. ACM 42 (1999) 30–36 10. S.P. Cho, H.S. Choi, H.K. Lee, K.J. Lee, Detection of EEG arousals in patients with respiratory sleep disorder, in: S.I. Kim, T.S. Suh (Eds.), World Congress on Medical Physics and Biomedical Engineering 2006, vol. 14, Pts 1–6, SpringerVerlag, Berlin, 2007, pp. 1131– 1134. 11. T. J. Sullivan, S. R. Deiss, J. Tzyy-Ping and G. Cauwenberghs, “A Brain-Machine Interface Using Dry-Contact, Low-Noise EEG Sensors,” IEEE International Symposium on Circuits and Systems, Seattle, 18-21 May 2008, pp. 1986-1989. [Citation Time(s):1] 12. M.Murali, Varun Pathak, Manish Sen, “Driver Drowsiness Detection Using Brain Computer Interface”, Volume 118 No. 20 2018, 945- 949, ISSN: 1314-3395. 13. A. Garces Correa and E. Laciar Leber, “An automatic detector of drowsiness based on spectral analysis and wavelet decomposition of eeg records,” in Engineering in Medicine and Biology Society (EMBC), 2010 Annual International Conference of the IEEE. IEEE, 2010, pp. 1405–1408. 14. G. Correa, L. Orosco, and E. Laciar, “Automatic detection of drowsiness in eeg records based on multimodal analysis,” Medical engineering & physics, vol. 36, no. 2, pp. 244–249, 2014. 15. S. Yu, P. Li, H. Lin, E. Rohani, G. Choi, B. Shao, and Q. Wang, “Support vector machine based detection of drowsiness using minimum eeg features,” in Social Computing (SocialCom), 2013 International Conferenceon. IEEE, 2013, pp. 827–835. 16. AzimEskandarian, Ali Mortazavi, ”Evaluation of a Smart Algorithm for Commercial Vehicle Driver Drowsiness Detection”, in IEEE Intelligent Vehicles Symposium Istanbul, Turkey, June 13-15, 2007. 17. Antoine Picot, Sylvie Char bonnier and Alice Caplier, “On-Line Automatic Detection of DriverDrowsiness Using a Single electroencephalographic Channel”, in 30th Annual International IEEE EMBSConference Vancouver, British Columbia, Canada, August20-24, 2008. 18. Pai-Yuan Tsai; Weichih Hu; Kuo, T.B.J.; Liang-Yu Shyu; “A portableDevice for Real Time Drowsiness Detection Using Novel Active DryElectrode System” Engineering in Medicine and Biology Society,2009. EMBC 2009. Annual International Conference of the IEEE2009, Page(s): 3775 – 3778 42. Authors: A.Vijayakumar, S. Naveen Kumar, P. Abhinayasai Tejareddy Paper Title: Utilization of Waste Materials for the Strengthening of Pavement Subgrade-A Research Abstract: From a long period in road construction soil is used as subgrade, sub-base, and base material. While constructing a road in the weak soil areas or subgrade has poor strength, in such cases the improvement of soil is necessary. The improvement of the soil is thru by swapping by the stronger soil or stabilization with the waste material. Dispose of these waste materials is essential as these are causing hazardous effects on the environment. With the same intention, the literature review is undertaken on the utilization of waste materials for the stabilization of soils and their performance is discussed. The waste material is one of the best solutions to the improvement of submerged properties in an economical manner. This review paper presents a brief exposure to the stabilization of soil with waste material like agriculture waste, constructional waste, and industrial waste materials.

Index Terms: Hazardous,Stabilization,Subgradelayers,WasteMaterials.

References: 1. Mehmet saltan, yucel kavlak, and f.selcan ertem (2011), “utilization of pumice waste for clayey subgrade of pavements,” american society of civil engineering, pp.1617-1623. 2. Chayan gupta, and ravi kumar sharma (2014), “influence of micro silica fume on subgrade characteristics of expansive soil,” international journal of civil engineering & research, pp. 77-82 3. Prakash chavan, and dr.m.s. Nagakumar (2014), “studies on stabilization by using bagasse ash,” international journal of scientific research engineering & technology, pp 89-94. 4. Magdi m.e. Zumrawi (2015), “stabilization of pavement subgrade by using fly ash activated by cement,” american journal of civil engineering and architecture, pp 218-224. 5. Manju suthar, and praveen aggarwal (2015), “clayey subgrade stabilization with lime and recron fiber,” journal of the indian roads congress, pp 104-109. 6. Altug saygili (2015), “use of waste marble dust for stabilization of clayey soil,” material science, pp 601-606. 7. Nishantha bandara, ph.d., p.e., m.asce; tarik habib binoy: haithem s. Aboujrad, and juliana sato (2015), “pavement subgrade stabilization using recycled materials,” air field and highway pavements, asce, pp 605-616. 209-212 8. mr.n.v. Gajera, and mr.k.r. Thanki (2015), “stabilization analysis of black cotton soil by using groundnut shell ash,” international journal for innovative research in science & technology, pp 158-162. 9. Rathan raj r, banupriya s, and dharani r (2016), “stabilization of soil using rice husk ash,” international journal of computational engineering research, pp 43-50. 10. E. Ravi, r.udhayasakthi, and t.senthil vadivel (2016), “enhancing the clay soil characteristics using copper slag stabilization,” journal of advances in chemistry, pp 5725-5729. 11. Parveen kumar, dr. Rajesh goel, and vishal yadav (2017), “stabilization of soil using crumb rubber,” international journal of advance research in science and engineering, pp 38-47. 12. Hussien aldeeky, and al hattamleh (2017), “experimental study on the utilization of fine steel slag on stabilizing high plastic subgrade soil,” advance in civil engineering, hindawi. 13. Ruqayah al-khafaji, hassnen m jafer, anmar dulaimi, and w.atherton, zahraaswaida (2017), “soft soil stabilization using ground granulated blast furnace slag,g” the 3rd buid doctoral research conference 2017, at british university in dubai. 14. Dr.j.rajamurugadoss, k.saranya, and a.ram prasanth (2017), “soil stabilisation using rubber waste and cement (standard proctor test and cbr)”, international journal of civil engineering and technology, pp 630-639. 15. Nirmala r, and shanmuga priya m (2017), “feasibility study on enhancing the properties of subgrade material using waste glass,” international journal of chemical sciences. 16. Divya patle, mamta burike, sayli d. Madavi, and suvarna raut (2017), “soil stabilization using plastic waste,” international journal of research in science & engineering, pp 58-68 17. Sooraj p. Sudhakaran; anil kumar sharma, ph.d., a.m.asce., and sreevalsa kolathayar, ph.d. (2018), “soil stabilization using bottom ash and areca fiber: experimental investigations and reliability analysis”, asce. 18. Sharmila k c, supriya c l, madhu k.m, chetan k m, and ashish dubayb (2018), “stabilization of black cotton soil by using cashew nut shell ash & lime,” international journal of scientific development and research, pp 225-229. 19. Tao zhang, ph.d., guojun lai, ph.d.; and songyu liu, ph.d. (2018), “application of lignin-stabilized silty soil in highway subgrade: a macroscale laboratory study”, asce. 20. Amruta lage, pradeep kumawat, and karishma sayyad (2018), “a review paper on expansive soil stabilization by using bagasseah and risehuskash,” international journal of advance research in science and engineering, pp 264-270. Authors: Joshi Sujata, Parashar Mukul, Kaur Hasandeep Paper Title: Role of Smart Communication Technologies for Smart Retailing Abstract: The Indian retail industry is growing by leaps and bounds and currently ranks amongst the top 5 destinations for retail investment globally. Retailing is one of the pillars of the Indian economy. About 10% of India’s GDP comes from the retail industry. With the advent of digital transformation in the Indian economy and adoption of smart city initiatives, there is a need for the retail sector to shift from the traditional retailing to smart retailing. Smart technologies like Artificial Intelligence and Internet of Things are being used globally in the retail sector. But India is still lagging behind in this initiative. In academic literature, very few studies have focussed on the role of technologies in smart retailing. So the objective of this paper is to understand the role of smart technologies like AI and IOT and its impact on the retail sector. The study adopts the case study approach wherein various use cases from the retail sector have been 43. analysed with respect to adoption of AI and IoT technologies and its benefit for smarter retailing. Potential technologies for smart retailing in the area of AI and IOT which can be applied in India have also been discussed. The study will be useful to the practitioners in the field of AI and IoT technologies to create customized solutions for the retail sector; to 213-218 the academicians as it adds to the literature on adoption of technology in retail sector; and the society at large will be benefitted as customers will get better delivery, better service and better customer experience.

Key Words:— AI, IoT, Digitization, Smart Communication, Smart Retailing.

References: 1. A.V. Kapoor and P. Khanna, "Analysis of Global Retail Industry: An Overview of Changing Trends" International Journal of Research in IT and Management, Vol 6, Issue 12, December-2016, pp 73-78, 2016. Available online at http://euroasiapub.org (Accessed on 13th May 2019) 2. Beecham Research, "The Future of Retail through the Internet of Things," 2016. [Online] Available: https://www.intel.com/content/dam/www/public/us/en/documents/white-papers/future-retail-through-iot-paper.pdf (Accessed on 13th May 2019) 3. Delloite, "2019 Media & Entertainment Industry Outlook," 2018. [Online]. Available: https://www2.deloitte.com/us/en/pages/technology- media-and-telecommunications/articles/media-and-entertainment-industry-outlook-trends.html (Accessed on 13th May 2019) 4. S.G. Tzafestas, "Synergy of IoT and AI in Modern Society: The Robotics and Automation Case," Robotics and Automation Engineering Journal, Volume 3, Issue 5, September 2018. Available: file:///C:/Users/HP- PC/Downloads/Synergy_of_IoT_and_AI_in_Modern_Society%20(3).pdf (Accessed on 13th May 2019) 5. Retail Trends, "Global Retail Trends 2018”, [Online]. Available: https://assets.kpmg/content/dam/kpmg/xx/pdf/2018/03/global-retail- trends-2018.pdf (Accessed on 13th May 2019) 6. A T Kearney Report, “China’s Smart Retailing Pays Off," [Online]. Available: https://www.atkearney.com/documents/20152/1332492/Chinas+Smart+Retailing+Pays+Off.pdf/c16fafc1-6a37-60aa-3ac2-25dd63dc5fac (Accessed on 13th May 2019) 7. Lei Zhao, and Lefei Li," Analysis of Operational Benefits of Unmanned Retail Business Form based on DEA Method”. Advances in Economics, Business and Management Research, volume 68, pp 109-113, 2018. [Online]. Available: file:///C:/Users/HP- PC/Downloads/SSMI123%20(1).pdf. (Accessed on 13th May 2019) 8. C. Wietfeld, J. Schmutzler, & C. Hägerling, “A Smart Communication Infrastructure for Future Energy System Applications”. Future Internet Symposium 2009 - International Workshop on the Future Internet of Things and Services - Embedded Web Services for Pervasive Devices. [Online]. Available: file:///C:/Users/HP-PC/Downloads/A_Smart_Communication_Infrastructure_for_Future_En.pdf (Accessed on 13th May 2019) 9. J. Lloret, A. Canovas, S. Sendra, and L.Parra, “A Smart Communication Architecture for Ambient Assisted Living. Communications Magazine”, IEEE. 53. 26-33. 10.1109/MCOM.2015.7010512. S. C. Lloret, "A Smart Communication Architecture for Ambient Assisted Living," January 2015. [Online]. Available: file:///C:/Users/HP-PC/Downloads/AsmartcommunicationarchitectureforAALv6.pdf (Accessed on 13th May 2019) 10. B. Cooperland, “Artificial intelligence", May 2019. [Online]. Available: https://www.britannica.com/technology/artificial-intelligence (Accessed on 13th May 2019) 11. M. Rouse,“Internet of things (IoT)”, March 2019. [Online]. Available: https://internetofthingsagenda.techtarget.com/definition/Internet-of- Things-IoT (Accessed on 13th May 2019) 12. A. Meola, "What is the Internet of Things (IoT)? Meaning & Definition,"May 2018 [Online]. Available: https://www.businessinsider.com/internet-of-things-definition?IR=T (Accessed on 13th May 2019) 13. Drago Pupavac, "DYNAMIC PRICING: THE FUTURE OF RETAIL BUSINESS," 16th International Scientific Conference Business Logistics in Modern Management, pp 119-128, October 2016. [Online]. Available: http://blmm-conference.com/wp- content/uploads/blimm1608.pdf (Accessed on 13th May 2019) 14. Meenakshi Nadimpalli, Artificial Intelligence – Consumers and Industry Impact”. International Journal of Economics & Management Sciences. 06. 10.4172/2162-6359.1000429. January [Online]. Available: file:///C:/Users/HP-PC/Downloads/Artificial_Intelligence_- _Consumers_and_Industry_I.pdf (Accessed on 13th May 2019) 15. Michael Azoff, " 2017 Trends to Watch: Artificial Intelligence”. [Online]. Available: https://ovum.informa.com/~/media/Informa-Shop- Window/TMT/Files/Whitepapers/2017-trends-to-watch-in-AI.pdf (Accessed on 13th May 2019) 16. R. Masoero, S. Buono, L.Malatesta, “Internet of Things: The Next Big Opportunity for Media Companies” 2017. [Online]. Available: https://www.accenture.com/t20180529T062413Z__w__/us-en/_acnmedia/PDF-50/Accenture-IoT4-POV-Updated.pdf (Accessed on 13th May 2019) 17. Jonathan Gregory, "The Internet of Things: Revolutionizing the Retail Industry" 2015. [Online]. Available: https://www.accenture.com/_acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Global/PDF/Dualpub_14/Accenture-The- Internet-Of-Things.pdf (Accessed on 13th May 2019) 18. A. Birla and G. Uniyal. "The smart store of the future-powered by faster, cheaper and efficient IT" 2018. [Online]. Available: https://www.infosys.com/industries/retail/white-papers/Documents/stores-digitally-mobile-wireless.pdf (Accessed on 13th May 2019) 19. B. Mohapatra and V. Krishnan, “Customer experience for retail Industry," 2018. [Online]. Available: https://www.infosys.com/Oracle/white-papers/Documents/customer-experience-retail-industry.pdf (Accessed on 13th May 2019) 20. Atos, "The Future of In-store shopping," 2013. [Online]. Available: https://atos.net/wp-content/uploads/2017/10/01122013- AscentWhitePaper-FutureInStoreShopping.pdf (Accessed on 13th May 2019) 21. Pradeep Pavaluru, “From Shopping Cart to SMART Kart”," 2017. [Online]. Available: https://www.evry.com/globalassets/india/what-we- do/retail--logistics/smart-kart---white-paper/smart-kart---white-paper.pdf (Accessed on 13th May 2019) 22. Amazon Go, 2017. [Online]. Available: https://www.amazon.com/b?node=16008589011 (Accessed on 13th May 2019) 23. A. Polacco and K. Backes, “THE AMAZON GO CONCEPT: IMPLICATIONS, APPLICATIONS, AND SUSTAINABILITY 2017. [Online]. Available: http://wdsinet.org/Annual_Meetings/2017_Proceedings/CR%20PDF/cr215.pdf (Accessed on 13th May 2019) 24. Blake Ives, Kathy Cossick, and Dennis Adams, “Amazon Go: Disrupting retail?" 2019. Journal of Information Technology Teaching Cases 2019, Vol. 9(1) 2–12, https://doi.org/10.1177/2043886918819092 (Accessed on 13th May 2019) 25. Knowledge@Wharton,"Will Amazon Go Capture the Holy Grail of Retail," 2018. [Online]. Available: https://knowledge.wharton.upenn.edu/article/amazon-go-game-changer/ (Accessed on 13th May 2019) 26. N. Wingfield, "Inside Amazon Go, a Store of the Future," January 2018. [Online]. Available: https://www.nytimes.com/2018/01/21/technology/inside-amazon-go-a-store-of-the-future.html (Accessed on 13th May 2019) 27. M. Agrawal [Online]. “The State of Retail: It’s Time for Change”, Available: https://www.getzippin.com/hubfs/Future%20of%20Retail_Zippin.pdf 28. Technology, “JD.COM AND INTEL LAUNCHNEW RESEARCH LAB FOR SMART RETAIL”, 2017. [Online]. Available: https://jdcorporateblog.com/jd-com-and-intel-launch-new-research-lab-for-smart-retail/ (Accessed on 13th May 2019) 29. V. Verma, "Watasale, India’s first autonomous retail store, opens in Kochi, gets funding offer from Japan," September 2018. [Online]. Available: https://indianexpress.com/article/technology/tech-news-technology/watasale--first-autonomous-retail-store-opens-in- kochi-gets-funding-offer-from-japan-5341884/ (Accessed on 13th May 2019) 30. D. Tom and S. Karun, “App, swipe, go: This cashier-free store shows future of India," September 2018. [Online]. Available: https://timesofindia.indiatimes.com/india/app-swipe-go-this-cashier-free-store-shows-future-of-indian-retail/articleshow/65747132.cms (Accessed on 13th May 2019) 31. A. Menon, "Is Kochi’s Watasale store the future of retail?” September 2018. [Online]. Available: https://www.thehindu.com/sci- tech/technology/is-kochis-watasale-store-the-future-of-retail/article24862249.ece (Accessed on 13th May 2019) 32. Zebra, "German Supermarket Chain Modernises Its Systems with Zebra Technologies," 2015. [Online]. Available: https://www.zebra.com/content/dam/zebra/success-stories/en-us/pdfs/feneberg-en-us.pdf. (Accessed on 13th May 2019) 33. M.Thomas, "NO CHECKOUT LINES, PERSONALIZED SHELVING AND THE IOT RETAIL REVOLUTION," April 2019. [Online]. Available: https://builtin.com/internet-things/iot-in-retail-tech-applications (Accessed on 13th May 2019) 34. Hershey, “TRANSFORMING THE CANDY AISLE EXPERIENCE”, 2018. [Online]. Available: https://www.thehersheycompany.com/en_us/blog/transforming-the-candy-aisle-experience.html (Accessed on 13th May 2019) 35. D.Grewala, an L.Roggeveena, J. Nordfält , “The Future of Retailing”, Journal of Retailing Volume 93, Issue 1, Pages 1-6, March 2017, [Online]. Available: https://doi.org/10.1016/j.jretai.2016.12.008 (Accessed on 13th May 2019) Anvar Ishanovich Adylkhodzhaev, Makhamataliev Irkin Muminovich, Kadyrov Ilkhom Abdullaevich, Authors: 44. Shaumarov Said Sanatovich, Ruzmetov Fazliddin Sharifboevich To the Question of the Influence of the Intensity of Active Centers on the Surface of Mineral Fillers on the Paper Title: Properties of Fine-Grained Concrete Abstract: The paper presents the results of experimental research on the evaluation of the possibility of using the indicators of surface activity of dispersed minerals as a criterion for determining the most effective way of their application in cement concrete. The obtained results allow to recommend to use such fillers as: quartz sand, barchan sand, wastes of electro smelting production for filling of cement concretes by the method "filling of cement in concrete": gliege, basalt, wastes of copper smelting production, fly ash of thermal power stations, zeolite-containing rocks for filling of cement concretes by the method "filling of cement in concrete".

Index Terms:— high quality concrete, mineral filler, active centers, strength, mathematical model, cement filling, filling of sand, gliege, zeolite, ash, sand.

References: 1. Schmidt M. Jahre Entwicklung bei Zement, Zusatsmittel und Beton. Ceitzum Baustoffe und Materialprüfung. Schriftenreihe Baustoffe. Geburgstag von Prof. Dr. Jng. Peter Schiesse. Heft 2. 2003, p. 189 198. 2. Kleingelhöfer P. Neue Betonverflissiger auf Basis Policarboxilat. 13. 1997 Jbasil Weimar, Bd. 1, p. 491 495. 3. Frank D., Friedemann K., Schmidt D. Optimisierung der Mischung sowie Verifizirung der Eigenschaften Saueresistente Hochleistungbetone. // Betonwerk+Fertigteil-Technik. 2003.№ 3. p. 30-38. 219-222 4. Richard P., Cheurezy M. Composition of Reactive Powder Concrete. Skientific Division Bougies. // Cement and Concrete Research, Vol. 25. No. 7, 1995. - pp. 1501 1511. 5. Usherov-Marshak A.V. Modern concrete and its technologies / Coll. "Concrete and reinforced concrete". St. Petersburg, Izd. "Slavutich", 2009, p.20-24. 6. Aitchin P.-C., Neville A. High- Performance Concrete Demystified. Coner. Intern. 1993, Vol. 15, №1, p.21-26. 7. Edvard G., Nawy P. Fundaments of High Performance Concrete. Sec. ed. Willy. 2001. - – 302p. 8. 8.Adylkhodzhaev A.I. Fundaments of High Performance Concrete A.I.Adilkhodzhaev, V.I.Solomatov.-Tashkent, Izd-in FAN RUz.1993.- 214p. 9. 9.Vysotsky S.A. Mineral additives for concrete / S.A.Vysotsky//Beton and reinforced concrete, 1994. -№2 -p.7-10. 10. 10.Tahirov, M.K. About the nature of the interphase interactions of the polycarboxylate superplasticizer and basalt filler (in Russian) / M.K.Tahirov, V.M.Tsoi/// Resource-saving technologies in construction. Intercollection of scientific articles, issue 4, Tashkent, Tashkent, Tashkent, 2009.-p.3-12. 11. 11.Tsoi, V.M. Methodological bases of the optimal design of the compositions and management of the physicochemical properties of the multi-component high-quality concretes // Abstract of the doctoral dissertation on technical sciences (DSc) // Tashkent, TASI, 2017.- 36p. 12. 12.Nechiporenko, A.P. Donor-acceptor surface properties of the solid oxides and chalcogenides. Doctoral diss., L., 1995, -523p. 13. Adylkhodzhaev A.I., Makhamataliev I.M., Tsoi V.M., Shaumarov S.S. Forecasting of the effectiveness of mineral fillers in cement composites // Scientific and Technical Bulletin of Bryansk State University, Bryansk, 2019, №1.-p.105-112. Sulaymanov Sunnatulla Sulaymonovich, Mudarisova Rayxon Hodjaevna, Narziev Shovkiddin Murtazaevich, Authors: Valieva Zaynab Omonbaevna, Tursunova Nigora Anvarovna Paper Title: Methods of Forecasting and Occurrence of Traumatic Damages i Sport Abstract: The article analyzes the main causes of injuries sustained by athletes as a result of unsuccessful sports events, outdated sports equipment and equipment, as well as non-compliance with sports rules. In addition, the conclusions from the research results on the research topic are summarized.

Keywords: Trauma in sports, sports, head and face injuries, elbow joint, knee joint, rules, methods of prediction, safety, innovation

45. References: 1. The Decree of the President of the Republic of Uzbekistan from February 7, 2016 N UP-4947 "On Strategy of Action for Further 223-225 Development of the Republic of Uzbekistan" // "Khalq Suzi" newspaper 8 February 2017 (6722). 2. Law of the Republic of Uzbekistan "On Physical Training and Sports" (new edition) // Bulletin of the Chambers of the Oliy Majlis of the Republic of Uzbekistan, 2005, No. 9 3. The Law of the Republic of Uzbekistan "On the State Youth Policy" was passed by the Legislative Chamber of August 12, 2016, approved by the Senate on August 24, 2016. 4. Bashkirov V.F. Injury and incidence of the musculoskeletal system in athletes jumpers / Bashkirov V.F., Grachev V.M. // Theory and practice of physical culture. - 1983. - № 2. - p. 47-49. 5. 5.Plotnikov S.G., Maryanovsky A.A. Prediction of injury in athletics with regard to motor asymmetry // Theory and practice of physical culture. - 2009. - № 10. 6. 6.ISO/IEC 31010:2009 "Risk management – Risk assessment techniques". Authors: Iskandarov Zafar, Saidkhujaeva Nafisa, Irmuxamedova Ludmila Paper Title: Dried Melon Production Line Abstract: The article discusses the principle of building a technological line for the production of dried melon, based on a number of developed and approved technical means: machines for cleaning the melon from the peel, a unit for cutting melons into ring slices, a chamber-chain drying unit and other flexible technological systems providing an integrated approach and continuity of production. Presents some results of experimental studies showing the effectiveness of the proposed production process line melting melon. 46. Index Terms:— melon, bark, clearing, mechanization, cutting, part, dried, disk knifes, packing, container. 226-228

References: 1. Z.Iskandarov, G.Abdieva, N.Saidkhujaeva, M.Karimullaeva. Machine for cutting melons on ring-sheeds. International Journal of Advanced Research in Science, Engineering and Technology Vol. 6, Issue 4, April 2019 ISSN: 2350-0328. 2. Z.Iskandarov, G.Abdieva, N.Saidkhujaeva, M.Karimullaeva, M.Matyakubov. Experimental investigation of the thermophysical characteristics of the melatic meat. Actual problems of modern science, education and trainining. 2019-II. ISSN 2181-9750. 3. Целевая оценка плодов дыни (Методика) Текст. /В.В. Коринец, Т.А. Санникова, В.Н. Самодуров. Астрахань: ООО «Типография «Нова», 2006. - 27 с. 4. Магомедов Р.К. Научно-практические основы транспортирования и хранения скоропортящихся овощей Текст. / Р.К. Магомедов. М.: ФГНУ «Росинформагротех», 2009. - 200 с. 5. Z.Iskandarov and other. № FAP01240 “Chamber chain drying unit for agricultural products” 6. N.Saidkhujaeva. “Механизированный очиститель плодов дыни от кожуры”. «Итоги и перспективы развития агропромышленного комплекса» материалы международной научно-практической конференции. с. Соленое Займище.– 2018. – 655 с. Sadullayev Nasillo Nematovich, Safarov Alisher Bekmurodovich, Nematov Shuhrat Nasilloyevich, Mamedov Authors: Rasul Akif-ogli Research on Facilities of Power Supply of Small Power Capability Consumers of Bukhara Region by using Paper Title: Wind and Solar Energy Abstract: This article analyzes the climatic features of the Bukhara region – the southern-eastern part of Uzbekistan. The wind and solar potential of the region and the prospects of its utilization were evaluated. In recent years, wind and solar energy has been analyzed worldwide. The potential for the use of solar radiation in the region was analyzed. Accordingly, when the solar photovoltaic batteries in the region are used (coefficient of efficiency-18%), the technical potential of the region is 41 TWh/year. Wind speeds and wind energy potential data were collected over eight years (2011-2018) and were calculated using the monthly wind speed data measured every 30 minutes at a height of 10m. During the estimation of wind energy potential we were used two parameters Weibull and Rayleigh distribution functions. The density power and energy values of the wind flow at various heights were evaluated using the extrapolation method. In accordance with that, on height of 10m it makes 41.19 W/m2 and 361.48 kWh/m2, on height of 50m 117.23 W/m2 1026.96 kWh/m2, and on height of 100m 192.76 W/m2, 1688.59 kWh/m2. The wind energy gross, technical and economic potential of the region has been evaluated. In addition, the potential and prospects of using hybrid (wind and solar) power stations for the supply of uninterrupted and reliable power supply to consumers in the region were analyzed.

Index Terms:— solar energy potential, wind energy potential, Weibull distribution function, Rayleigh distribution function, wind direction (wind rose), extrapolation method, hybrid (wind and solar) power station.

References: 1. https://www.airvisual.com/world-air-quality-ranking 2. B. Eshchanov, M. Stultjes, R. Eshchanov, S. Salaev. “Potential of Renewable Energy Sources in Uzbekistan”, Journal of Knowledge Management, Economics and Information Technology, 1 (2011), pp.1-17 3. N. Sadullayev, A. Safarov, Sh. Nematov. “Analysis of wind energy potential in using Weibull distribution in Bukhara region Uzbekistan”, 47. IJARSET, 1 (2019) pp.7846-7853 4. S.V. Kiseleva, Yu.G. Kolomiets, O.S. Popel, "Assessment of solar energy resources in Central Asia”, Applied Solar Energy, V-51, I-3, pp.214-218, 2015 229-236 5. R.A. Zakhidov, M.V. Kremkov, “The wind power potential of Uzbekistan”, Applied Solar Energy, V-51, I-4, pp. 336-337, 2015 6. J.N Touafio, S. Melenguiza, S.A Oumarou, Y. Kazet, “Statistical analysis and elaboration of the wind potential map of the city of Bangui (Central African Republic)”, Renewable Energy Focus, 29 (2019), pp.1-13 7. B. Eshchanov, A. Abylkasymova, F. Aminjonov, D. Maldokanov, I. Overland, R. Vakulchuk. “Wind Power Potential of the Central Asian Countries”, Central Asia Regional Review 17 (2019) pp.1-7 8. B.N Prashanth, R. Pramod, G.B Veeresh Kumar, “Design and Development of Hybrid Wind and Solar Energy System for Power Generation”, Materials today: proceedings, 5(2018), pp. 11415-11422 9. C. Ozay, M. Soner. “Statistical analysis of wind speed using two-parametr Weibull distribution in Alacati region”, Energy conversion and management, 12 (2016) pp. 49-54 10. T. Ouarda, Ch. Charron, “On the mixture of wind speed distribution in a Nordic region”, Energy Conversion and Management, 174 (2018) pp.33-44 11. P. Vais, “Two and three-parametr Weibull distribution in available wind power analysis”, Renewable Energy, 103 (2017) pp.15-29. 12. S. Ahmed, H. Mahammed. “A Statistical Analysis of Wind Power Density Based on the Weibull and Ralyeigh models of "Penjwen Region" Sulaimani/ Iraq. Jordan Journal of Mechanical and Industrial Engineering. 6 (2012) 135-140. 13. G. Johnson, “Wind Energy Systems”, 2006. pp. 2-16…2-43 14. D. Hui Ko, Sh. Taek Jeong, Y. Chil Kim. “Assesment of wind energy for small-scale wind power in Chuuk State, [26] Micronesia”, Renewable and Sustainable Energy Reviews, 52 (2015) pp. 613-622 15. M. El-Sharkawi. “Wind energy an introduction”. 2016. pp. 43-57 16. A. Celik, “A statistical analysis of wind power density based on the Weibull and Rayleigh models at the southern region of Turkey”, Renewable energy, 29 (2004) pp. 593-604 17. M. Soulouknga, S. Doka, N. Revanna, N. Djongyang, T. Kofane. “ Analysis of wind speed data and wind energy 18. potential in Faya-Largeau, Chad, using Weibull distribution”, Renewable energy, 121 (2018) pp.1-8. 19. P. Chaurasiya., S. Ahmed, W. Varudkar, “Stady of different parametrs estimation metods of Weibull distribution to determine wind power density using ground based Dopller SODAR instrument”, Alexandra Engineering Journal, 80 (2017) pp. 34-40 20. B. Berlin, “Modeling the Weibull shape parameter to improve estimates of the annual wind energy potential in Sweden”. 2018. pp. 19-20 21. V. Elistratov, A. Ramadan,“Energy potential assessment of solar and wind resources in Syria”, Journal of Applied Engineering Science, 16 (2018) pp. 208-216 Bobokulov Akbar Nosirovich, Erkaev Aktam Ulashevich, Kucharov Bakhrom Khayrievich, Toirov Zakir Authors: Kalandarovich Paper Title: Research on the Carbonization Process of Potassium Chloride Solutions in the Presence of Diethylamine Abstract: BACKGROUND: Currently in the country there is no production of potassium carbonates, which, as a rule, they are purchased in the CIS countries. At the same time, there has explored sufficient reserves of potassium- containing raw materials, which, according to technological, economic and, most importantly, rational utilization levels, 48. will provide an opportunity to get their own potassium carbonate to ensure internal and external consumption markets. In this regard, the development of a method of producing potash based on local raw materials is currently actual. RESULTS: The process of obtaining potassium bicarbonate by the amine method has been studied for the first time. 237-241 The optimal process parameters were established: ΔP = 2 atm, duration - 45 min. CONCLUSION: The study found that the resulting potassium bicarbonate precipitates quickly from the suspension and is easily filtered, which allows us to recommend the use of existing standard thickeners and filtering plants with a minimum working surface.

Keyword– potassium bicarbonate, potassium chloride, amine, carbonization, method.

References: 1. G.Tukhtaeva., M.Yulchiev., E. Baimuratova., A. Erkayev., A.N. Bobokulov., Development of production of potash by conversion of potassium chloride with ammonium salts.// Technical and socio-economic sciences important issues in the field Republic of Uzbekistan -1 volume, Tashkent - 2013 pages. 26-27. 2. A.U. Erkayev., Z.K.Toirov., A.N. Bobokulov. , S.Azlarov., D. Bayraeva. The study of the process of obtaining potassium carbonate. // Proceedings of the 9th International Scientific Conference "Mining and Metallurgical Complex: Achievements, Problems and Modern Development Prospects" Navoi - 2016 - 433 p. 3. A.N. Bobokulov., A.U. Erkayev., Z.K.Toirov., Kucharov B.Kh. The study of the separation of potassium bicarbonate from carbonated suspensions. // Modern problems and prospects of chemistry and chemical-metallurgical production, republican scientific and technical conference. Navoi-2018 31-32 st. 4. Wasag T. Otrzymywanie potazu metoda aminowa z zastosowaniem dwuetyloaminy / [T. Wasag, T. Wasag, U. Siewielec, G. Poleszczuk] // Przemysl chemiczny. - 1974. - № 2. - p. 94 - 97. 5. Wasag T. Zastoswanie amin do produkcji weglanow alkalicznych / T. Wasag, T. Wasag, G. Poleszczuk // Chemik. - 1976. - Vol. 29, No. 9. - P. 293 - 297. 6. Kovilis S.S. The technique of measuring the density of liquids and solids. - M., Standard, 1969. - 70s. 7. Krasheninnikov S.A. et al. Obtaining soda and potash from the sylvinites of the Karluk field. // Him.prom-st .- 1984.- № 2. p.-p.93. 8. Doebelin, N., & Kleeberg, R. (2015). Profex: a graphical user interface for the Rietveld refinement program BGMN. Journal of applied crystallography, 48 (5), 1573-1580. 9. Panzhiev O.Kh., Toirov ZK, Bozorov ON, Bobokulov A.N., Chemical Technology of Inorganic Substances // Textbook. Tashkent - 2018. - 187s. 10. A.N. Bobokulov., A.U. Erkayev., Z.K.Toirov. Study of the process of obtaining potassium bicarbonate using diethylamine. // UNIVERSUM: Chemistry and Biology, No. 10, Moscow-2017. 11. 11.A.Arkayev., A.N. Bobokulov Potassium ammonium chloride-suv systeming scoring 20,40,60 va 800C dan and isothermal diagram of “agranish”. // “Umidli Kimyoglarar-2015” - technics anzhumanining maholar tўplami -2tom, Tashkent 2015 nd. 31-32 bet 12. A.N. Bobokulov., A.U. Erkayev., Z.K.Toirov., Kucharov B.Kh. Investigation of the process of carbonization of potassium chloride solutions in the presence of diethylamine. // Modern problems and prospects of chemistry and chemical-metallurgical production, republican scientific and technical conference. Navoi-2018 38-39 st. Authors: K.Viswanathan, S.Poongavanam Paper Title: A Research on Logistics Business Abstract: In the competitive universal market, the burden on establishments to select a innovative means to generate a value to the customer and supply it to them develops tougher and tougher. The growing necessity for all the companies to participate with each other in respect of their products in a international market, with regard to their cost, quality and services offered, has increased the need to develop a effective logistic systems which is more efficient than others. Consequently, in the previous two years, logistics has occupied a marvelous moved from an operating function to the business function level. There has been a rising appreciation that current logistics administration during the firm and supply chain can significantly assist in the area of price saving and facility enhancement.

Keywords: Low cost, Government initiatives, Workforce & Research.

49. References: 1. Aldin, (2003), “Electronic commerce, marketing channels and logistics platforms – wholesalers perspective”, European Journal of 242-243 Operational Research, Vol. 144, pp. 270-9. 2. Chiu,(1995), “The integrated logistics management system: a framework and case study”, International Journal of Physical Distribution & Logistics Management, Vol. 25 No. 6, pp. 4-22. 3. Korpela, J. (1999), “A customer oriented approach to warehouse network evaluation and design”, International Journal of Production Research, Vol. 59, pp. 135-46. 4. Lieb, R.C., (1993), “Third-party logistics services: a comparison of experienced American and European manufacturers”, International Journal of Physical Distribution & Logistics Management, Vol. 23 No. 6, pp. 35-4 5. Rao, B. (1999), “The Internet and the revolution in distribution: a cross-industry examination”, Technology in Society, Vol. 21, pp. 287- 306. 6. Srinivasan, R., Poongavanam, S., (2017) A study on coastal container services operation in India, International Journal of Mechanical Engineering and Technology, 8 (11), pp.1103-1110. 7. Srinivasan, R., Poongavanam, S., Divyaranjini, R.(2017). Construction product movement in NTC - A case study analysis, International Journal of civil Engineering and Technology, 9 (9), pp.942- 946. Authors: R.Srinivasan, S.Poongavanam, R.Vettriselvan, J.Rengamani, Fabian Andrew James Paper Title: A Research on Shipping Lines in Global Market Abstract: The Shipping Lines, NVOCC, MTO’s is a company that organizes shipments for individuals or other corporations and might too turn as a shipper. A forwarder is frequently not energetic as a shipper and turns merely as a manager, in other words as a third-party (non-asset-based) logistics provider that dispatches shipments via asset-based carriers and that books or otherwise arranges space for these shipments. The research study is about the factors influencing customer’s choice of Shipping Lines Middle East Sector. So the researcher here used different descriptive methods like interview method, survey method and observation method to know the various impacts and expectation of 50. the customers towards the customer’s choice towards the shipping lines to Middle East Countries from Chennai.

244-246 Keywords: Freight forwarders, Shipping lines, Middle east& Ports.

References: 1. K.F. Yuen, J.M. Lim (2016). Barriers to the implementation of strategic corporate social responsibility in shipping, The Asian Journal of Shipping and Logistics, 32 (1), pp. 49-57 2. K.F. Yuen, X. Wang, Y.D. Wong, Q. Zhou (2017).Antecedents and outcomes of sustainable shipping practices: The integration of stakeholder and behavioural theories, Transportation Research Part E: Logistics and Transportation Review, 108, pp. 18-35 3. Park, C. (2016). “2020 Ship fuel regulation, shipping, shipbuilding business. 4. Lee, S. (2015). “DSME to launch the world's first LNG carrier container ship”.. 5. Srinivasan, R., Poongavanam, S., Vettriselvan, R., Rengamani, J., James, F.A.(2019). Network optimization for distribution of south based OEM’s passenger vehicles to other zones of India with reduced lead-time, International Journal of Innovative Technology and Exploring Engineering. 6. Srinivasan, R., Poongavanam, S., Divyaranjini, R.(2018) Wind turbine generator components-A study on transportation , International Journal of Mechanical Engineering and Technology. 7. Vettriselvan R., Ruben Anto., & Jesu Rajan FSA (2018), Rural lighting for energy conservations and sustainable development, International Journal of Mechanical Engineering and Technology, 9(7):604-611. 8. Vettriselvan R., Sathya M., & Velmurugan T. (2018), Productivity and Profitability Mechanical Engineering Entrepreneurs: Business Perspective, International Journal of Mechanical Engineering and Technology, 9(8): 758–765. S.Ranjith , Anand.V. Shivapur, P. Shiva Keshava Kumar, Chandrashekarayya.G. Hiremath, Santhosh Authors: Dhungana Paper Title: Water Quality Evaluation in Term of WQI River Tungabhadra, Karnataka, India. Abstract: The study reports the Weighted Arithmetic Water Quality Index (WQIa) value obtained for River Tungabhadra, a major tributary of Krishna River basin. A WQIa delivers a unique rating that gives whole water quality at a specific stretch and period depending upon some water quality constraints. The principle point of a WQIa is to give complex water quality insights into data that is clear and useable by the community. Some of most critical water quality parameters such as pH, Total dissolved solids (TDS), Total alkalinity, dissolved oxygen (DO), Biochemical oxygen demand (BOD), Total hardness (TH), calcium (Ca), magnesium (Mg), and electrical conductivity (EC) were Used for evaluating the WQIa. The WQIa esteems for the Tungabhadra River oscillate from 40 to 156. The estimations of WQIa exhibited that the stream water was free of any impurities at the examining sites aside from 2-3 months where its qualities were under good condtion. On every occasion there are anthropogenic influence viz industrial effluent, agricultural runoff and domestic sewage which is directly discharge into stream water gets contaminated to some level and hence of WQI declines. It is opinioned that WQIa can be used as a device in relating the water-quality of different sources. It delivers the community a over-all awareness of the thinkable glitches with water in a specific stretch. The WQI are among the best approaches to convey the data on water-quality pattern to the public community or to the water quality policy-makers and which is help full to drive suitable mitigative measure.

Keywords: water-quality parameter, weighted arithmetic water quality index (WQI), Tungabhadra River.

References: 1. Akkaraboyina M, Raju B (2012) A Comparative Study of Water Quality Indices of River Godavari. Int J Eng Res Dev 2(3):29–34. 2. Avvanavar SM, Shrihari S (2008) Evaluation of water quality index for drinking purposes for river Netravathi. Environ Monit Assess 143:279–290. 3. Bhargava DS (1983) Use of a water quality index for river classification and zoning of the Ganga River. Environ Pollut (Ser B) 6:51–67. 4. Bhargava DS, Saxena BS, Dewakar A (1998) A study of geopollutants in the Godavary river basin in India, Asian Environment. IOS Press, Amsterdam, pp 36–59. 5. Bharti N, Katyal D (2011) Water quality indices used for surface water vulnerability assessment. Int J Environ Sci 2(1):154–173. 6. Brown RM, McClelland NI, Deininger RA, Tozer RG (1970) Water quality index—do we dare? Water Sew Works 117(10):339–343. 7. Brown RM, McClelland NI, Deininger RA, O’Connor MF (1972) A water quality index—crashing the psychological barrier. In: Indicators of environmental quality Burden FR, Mc Kelvie I, Forstner U, Guenther A (2002) Environmental monitoring handbook. Mc graw-Hill Handbooks, New York, pp 3.1–3.21. 51. 8. CPCB, ADSORBS/3 1978–1979) Scheme for zoning and classification of Indian Rivers: estuaries and coastal waters. CPCB website: www.CPCB.nic.in 247-253 9. Dalkey NC (1968) DELPHI. The Rand Corporation, Santa Monica Dalkey NC, Helmer O (1963) An experimental application of the Delphi method to the use of experts. Manag Sci 9(3):458–467. 10. De AK (2003) Environmental chemistry, 5th edn. New Age International Publisher, New Delhi, pp 190, 215, 242–244 Dee N, Baker J, Drobny N, Duke K, Whitman I, Fahringer D (1973). 11. An environmental evaluation system for water resource planning. Water Resour Res 9(3):523–535 DEQ (2003) The Oregon Department of Environmental Quality. 12. Dinius SH (1987) Design of an index of water quality. WaterRes Bull23(5):833–843 13. Dojlido J, Raniszewski J, Woyciechowska J (1994) Water quality index-application for river in Vistula River Basin in Poland. Water Sci Technol 30(10):57–64 14. Dwivedi S, Tiwari IC, Bhargava DS (1997) Water quality of the riverGanga at Varanasi. Inst Eng Kolkata 78:1–4 15. Helmer O, Rescher N (1959) On the epistemology of the inexact science. Manag Sci 6:25–53 16. Horton RK (1965) An index number system for rating ater quality. J Water Pollut Control Fed 37(3):300–306 17. Indian Standard Specification for Drinking Water (1983) IS-10500- 1983. Indian Standards Institution, New Delhi, Gr 6 18. Jayaprakash RI (1988), A study of the environmental biology of Netravathi river system. Thesis (Ph.D.) Mangalore University, pp 1–7, 9– 14, 16–20, 25–27, 30–32, 106–107,113–114. 19. Khan F, Husain T, Lumb A (2003) Water quality evaluation and trend analysis in selected watersheds of the atlantic region of Canada. Environ Monit Assess 88(1):221–248. 20. Landwehr JM, Deininger RA (1976) A comparison of several waterquality indices. J Water Pollut Control Fed 48(5):954–958. 21. Leo ML, Dekkar M (2000) Hand book of water analysis (1–25,115–117, 143, 175, 223–226, 261, 273, 767). 22. Marcel Dekker, New York Lumb A, Halliwell D, Sharma T (2006) Application of CCME water quality index to monitor water quality: a case of the Mackenzie River basin, Canada. Environ Monit Assess 113:411–429. 23. McClelland NI (1974) Water quality index application in the Kansas River Basin. EPA-907/9-74-001. US EPA Region VII. Kansas City, MO Metcalf, Eddy (eds) (1972) Wastewater engineering: collection, treatment and disposal. McGraw Hill, New York, p 740. 24. Ott WR (1978) Environmental indices: theory and practice. Ann Arbor Science Publishers, Ann ArborSawyer CN, Mc Carthy PL, Parkin GF (1994) Chemistry for environmental engineering, 4th edn. Mc Graw-Hill International Edition, New York, pp 365–577 25. Smith RA, Alexander RB, Wolman MG (1987a), Analysis and interpretation of water-quality trends in major U.S. rivers, 1974–81. U.S. Geological Survey Water-Supply Paper 2307. 26. Smith RA, Alexander RB, Wolman MG (1987b) Water-quality trends in the Nation’s rivers. Science 235:1607–1615. 27. Sobhani N (2003) The review on water quality index methods and their applications on Zoning of Karoon River. Thesis (M.Sc), Environmental Faculty, Science and Industry University. 28. Sebastian J, Yamakanamardi SM (2013) Assessment of water quality index of Cauvery and Kapila Rivers and at their confluence. Int J Lakes Rivers 6(1):59–67. 29. Tiwari TN, Mishra M (1985) A preliminary assignment of water quality index to major rivers. Ind J Environ Protect 5:276. 30. Train RE (1979) Quality Criteria for Water. U.S. Environmental Protection Agency, Washington, DC, pp 16, 17, 109. 31. Tyagi S, Sharma B, Singh P, Dobhal R (2013) Water quality assessment in terms of water quality index. Am J Water Resour1(3):34–38 US EPA (2009). Environmental impact and benefits assessment for final effluent guidelines and standards for the construction and development category. Office of Water, Washington, DC. EPA- 821-R-09-012. 32. Walsh P, Wheeler W (2012) Water quality index aggregation and cost benefit analysis. U.S. Environmental Protection Agency, Working Paper, 12-05. 33. Walski TM, Parker FL (1974) Consumer’s water quality index. J Environ Eng ASCE 100:593–61. Authors: C. Manoharan, R.Vettriselvan, R.Divyaranjani Paper Title: A Research on Future Aspirations of Adolescents Abstract: Education is a process of preparation for future life (John Dewy). This study tries to find out the future aspiration for adolescents in the study area. Aspiration is an individual inner cry to reach the high line in life. It is an attitude of burning fire within us that will help to climbs up. As such, factors that influence of high aspirations become important to identify.

Keywords: adolescents, aspirations female

References: 52. 1. Hendry Garret 2007 statistics in psychology and education, New Delhi, Paragon International Publications. 2. Angal, M., S.K. 2009 educational Psychology New Delhi. Tandon publication. Ludhiana. 254-256 3. George Morrissey, creating your future personal strategic planning for professionals. 4. http:Psycnet.apa.org/journals 5. http:www.eric ed.gov/ 6. Lakshmi, K., & Ramachandran, S. (2017). A study of physical activity in children and adolescents. Research Journal of Pharmacy and Technology, 10(10), 3605-3606. 7. Satyanarayana, N. V., & Madhavan, B. (2016). Participant perceptions of the influence of spiritual and human values education on their behaviour, character and leadership potential- A qualitative research study. Purushartha, 9(1), 43-51. 8. Vettriselvan, R., Antony Jesu Rajan, F. S. A., & Arunkumar, N. (2018). Child labour in unorganized mechanical engineering industries of Tamil Nadu: A situation analysis. International Journal of Mechanical Engineering and Technology, 9(10), 809-819. 9. Vettriselvan, R., & Ruben Anto, M. (2018). Pathetic health status and working condition of zambian women. Indian Journal of Public Health Research and Development, 9(9), 259-264. Authors: Vinod H. Patil, Shruti Oza, Vishal Sharma, Asritha siripurapu, Tejaswini Patil Paper Title: A Testbed Design of Spectrum Management in Cognitive Radio Network using NI USRP and LabVIEW Abstract: Cognitive radio automatically detects the available channel in the wireless communication and has an adaptive radio technology network. It also changes the transmission parameters to run concurrently for more smooth communication. CR network allows the user to utilize the band in an opportunistic manner because it has different characteristics like capabilities and re-configurability. In this article, it shown the methodology, on how the primary user and the secondary user should communicate to provide error free communication. And also the framework on how to overcome the unique challenges occurred in the spectrum management like interference avoidance, QoS awareness and seamless communication. We also discussed about spectrum mobility, spectrum sharing, spectrum decision, and also spectrum sensing which are the characteristics of spectrum management.

Index Terms— Cognitive Radio (CR), Quality of Service (QoS), Primary User (PU), Secondary User (SU).

References: 53. 1. FCC, ET Docket No 03-322 Notice of Proposed Rule Making and Order, Dec 2003. 2. I. F. Akyildiz et al., “NeXt Generation/ Dynamic Spectrum Access/Cognitive Radio Wireless Networks: A Survey,” Comp. Networks J., 257-262 vol. 50, Sept. 2006, pp. 2127–59. 3. S. Haykin, “Cognitive Radio: Brain Empowered Wireless Communications,” IEEE JSAC, vol. 23, no. 2, Feb. 2005, pp. 201–20. 4. F. K. Jondral, “Software-Defined Radio — Basic and Evolution to Cognitive Radio,” EURASIP J. Wireless Commun. and Networking, 2005. 5. I. F. Akyildiz, W.-Y. Lee, and K. Chowdhury, “CRAHNs: Cognitive Radio Ad Hoc Networks,” Ad Hoc Net. J., vol. 7, no. 5, July 2009. 6. O. Ileri, D. Samardzija, and N. B. Mandayam, “Demand Responsive Pricing and Competitive Spectrum Allocation via Spectrum Server,” Proc. IEEE DySPAN 2005, Nov. 2005, pp. 194–202. 7. M. Oner and F. Jondral, “On the Extraction of the Channel Allocation Information in Spectrum Pooling Systems,” IEEE JSAC, vol. 25, no. 3, Apr. 2007, pp. 558–65. 8. S. M. Mishra, A. Sahai, and R. W. Brodersen, “Cooperative Sensing among Cognitive Radios,” Proc. IEEE ICC 2006, vol. 4, June 2006, pp. 1658–63. 9. B. Wild and K. Ramchandran, “Detecting Primary Receivers for Cognitive Radio Applications,” Proc. IEEE DySPAN 2005, Nov. 2005, pp. 124–30. 10. S. Krishnamurthy et al., “Control Channel Based MACLayer Configuration, Routing and Situation Awareness for Cognitive Radio Networks,” Proc. IEEE MILCOM 2005, Oct. 2005, pp. 455–60. Authors: Aditya Biswas, D. Malathi Paper Title: Fault Diagnosis of Transmission Line using Feed Forward Neural Network Abstract: The implementation of neural network for the fault diagnosis is to improve the dependability of the proposed scheme by providing a more accurate, faster diagnosis relaying scheme as compared with the conventional relaying schemes. It is important to improve the relaying schemes regarding the shortcoming of the system and increase 54. the dependability of the system by using the proposed relaying scheme. It also provide more accurate, faster relaying scheme. It also gives selective schemes as compared to conventional system. The techniques for survey employed some 263-268 methods for the collection of data which involved a literature review of journals, from review on books, newspaper, magazines as well as field work, additional data was collected from researchers who are working in this field. To achieve optimum result we have to improve following things: (i) Training time, (ii) Selection of training vector, (iii) Upgrading of trained neural nets and integration of technologies. AI with its promise of adaptive training and generalization deserves scope. As a result we obtain a system which is more reliable, more accurate, and faster, has more dependability as well as it will selective according to the proposed relaying scheme as compare to the conventional relaying scheme. This system helps us to reduce the shortcoming like major faults which we faced in the complex system of transmission lines which will helps in reducing human effort, saves cost for maintaining the transmission system.

Keywords: Transmission Line, Faults, Artificial Intelligence, Multilayer Feed Forward Neural Network, Backpropagation, Genetic Algorithm

References: 1. Tony B. Nguyen, Student Member, IEEE, and M. A. Pai, Fellow, IEEE, “Dynamic Security-Constrained Rescheduling of Power Systems Using Trajectory Sensitivities”, IEEE Transactions on Power Systems, Vol. 18, No. 2, pp. 848-854, May 2003. 2. T. S. Sidhu, Fellow, IEEE, L. Mital, and Mohindar S. Sachdev, Life Fellow, IEEE, “A Comprehensive Analysis of an Artificial Neural- Network-Based Fault Direction Discriminator”, IEEE Transactions On Power Delivery, Vol. 19, No. 3, Pp.1042-1048, July 2004 3. Ênio C. Segatto and Denis V. Coury, Member, IEEE, “A Differential Relay for Transformer Using Intelligent tools”, IEEE Transactions On Power Systems, Vol. 21, No. 3, Pp.1154-1162, August 2006 4. Monika Gupta, Smriti Srivastava, and J.R.P Gupta, “Power System Frequency Estimation Using Neural Network and Genetic Algorithm”, Joint International Conference on Power System Technology and IEEE Power India Conference, New Delhi, India, 12-15 Oct. 2008 5. J. Upendar, C.P. Gupta, G.K. Singh, G. Ramakrishna, “PSO and ANN-based fault classification for protective relaying”, IET Gener. Transm. Distrib., Vol. 4, Iss. 10, pp. 1197–1212, 2010 6. Mohammad Mohatram, Peeyush Tewari and Shahjahan, “Application of Artificial Neural Network in electric power industry”, International Journal of Electrical Engineering, Volume 4, Number 2, pp.161-171, 2011 7. Mohamed M Ismail and M A. Moustafa Hassan, “Distance Relay Protection for Short and Long Transmission line”, Intemational Conference on Modelling, Identification & Control (ICMIC), Cairo, Egypt, 31stAug.- 2ndSept. 2013 8. Ahmed Sabri Salman Altaie and Johnson Asumadu, “Fault Detection and Classification for Compensating Network Using Combination Relay And ANN”, IEEE International Conference on Electro/Information Technology (EIT), Dekalb, IL, USA, 21-23 May 2015 9. Ebha Koley, Sunil K. Shukla, Subhojit Ghosh, Dusmanta K. Mohanta, “Protection scheme fpr power transmission line based on SVM and ANN considering the presence of non-linear loads”, IET Gener. Transm. Distrib. Vol. 11 Iss. 9, pp. 2333-2341, 2017 10. Ahmad Abdullah, Member, IEEE, “Ultrafast Transmission Line Fault Detection Using a DWT-Based ANN”, IEEE Transactions On Industry Applications, Vol. 54, No. 2, March/April 2018 Authors: Saleh Moumine Abdi , M.Bina Celine Dorathy How Organizational and Trainee Characteristics Influence the Training Program of Employees in Djibouti Paper Title: Port Abstract: The present paper aims to examine how the organizational and trainee characteristics influence the effectiveness of a training program in Djibouti Port. To prove this, quantitative analysis was carried out with the help of a questionnaire. The survey was given to port employees and gets their opinion about the effectiveness of the training program in their port. The survey was framed from the perspective of independent and dependent variables chosen from the literature. Further for collecting the sample the random sampling method was adopted. All aspects of training and organizational characteristic variables were utilized. Data analysis involved like correlation and regression, chi-square test with the help of SPSS 21 version. Confidentiality was maintained throughout the research. Study findings observed that there is a positive impact of organization and trainee related factors that impact the training effectiveness. Further, it is noticed that the current level of training and development programs in Djibouti Port Trust was effective. Overall from the study found it is concluded that the training and development need in the ports and explore whether the needs differ between the ports.

Keywords: Organizational and Trainee Characteristics, Djibouti Port, Training Program Effectiveness

References: 1. Accenture. (2004). Accenture and SAP: a winning combination to improve performance through business intelligence. Retrieved from https://www.accenture.com/jp-ja/~/media/Accenture/Conversion-Assets/DotCom/Documents/Local/ja-jp/PDF_1/Accenture-SAP-BI- Brochure-2007.pdf 2. Ahmad, K. Z., & Bakar, R. A. (2003). The association between training and organizational commitment among white-collar workers in 55. Malaysia. International Journal of Training and Development, 7(3), 166–185. https://doi.org/10.1111/1468-2419.00179 3. Al-Emadi, M. A. S., & Marquardt, M. J. (2007). Relationship between employees’ beliefs regarding training benefits and employees’ organizational commitment in a petroleum company in the State of Qatar. International Journal of Training and Development, 11(1), 49– 269-277 70. https://doi.org/10.1111/j.1468-2419.2007.00269.x 4. Aziz, S. F. A., & Ahmad, S. (2011). Stimulating training motivation using the right training characteristic. Industrial and Commercial Training, 43(1), 53–61. https://doi.org/10.1108/00197851111098171 5. Baines, T. S., Asch, R., Hadfield, L., Mason, J. P., Fletcher, S., & Kay, J. M. (2005). Towards a theoretical framework for human performance modelling within manufacturing systems design. Simulation Modelling Practice and Theory, 13(6), 486–504. https://doi.org/10.1016/j.simpat.2005.01.003 6. Baldwin, T. T., Magjuka, R. J., & Loher, B. T. (1991). The perils of participation: effects of choice of training on trainee motivation and learning. Personnel Psychology, 44(1), 51–65. https://doi.org/10.1111/j.1744-6570.1991.tb00690.x 7. Bandura, A. (1991). Social cognitive theory of self-regulation. Organizational Behavior and Human Decision Processes, 50(2), 248–287. https://doi.org/10.1016/0749-5978(91)90022-L 8. Bartlett, K. R. (2001). The relationship between training and organizational commitment: A study in the health care field. Human Resource Development Quarterly, 12(4), 335. https://doi.org/10.1002/hrdq.1001 9. Beyer, J. M. (1990). The twin dilemmas of commitment and coherence posed by high technology. In L. Gomez-Mejia & M. W. Lawlers (Eds.), Organizational issues in high technologymanagement (pp. 19–36). Greenwich: JAI. 10. Bulut, C., & Culha, O. (2010). The effects of organizational training on organizational commitment. International Journal of Training and Development, 14(4), 309–322. https://doi.org/10.1111/j.1468-2419.2010.00360.x 11. Chlomoudis, C. I., & Pallis, A. A. (1999). The Need for a New Philosophy of Port Management and Organisation: Effective Responses to Contemporary Challenges. European Research Studies Journal, 2(4), 91. Retrieved from https://www.researchgate.net/publication/46542671_The_Need_for_a_New_Philosophy_of_Port_Management_and_Organisation_Effecti ve_Responses_to_Contemporary_Challenges 12. Chun, J. S., Shin, Y., Choi, J. N., & Kim, M. S. (2013). How Does Corporate Ethics Contribute to Firm Financial Performance? Journal of Management, 39(4), 853–877. https://doi.org/10.1177/0149206311419662 13. Colquitt, J. A., LePine, J. A., & Noe, R. A. (2000). Toward an integrative theory of training motivation: A meta-analytic path analysis of 20 years of research. Journal of Applied Psychology, 85(5), 678–707. Retrieved from https://media.terry.uga.edu/socrates/publications/2013/06/ColquittLePineNoe2000.pdf 14. Costa, G., & Gianecchini, M. (2013). Human resources. People, relationships and value (3rd ed.). Rome, Italy: McGraw-Hill Education. Retrieved from https://www.amazon.it/Risorse-umane-Persone-relazioni-valore/dp/8838667802 15. Farndale, E., Hope‐Hailey, V., & Kelliher, C. (2011). High commitment performance management: the roles of justice and trust. Personnel Review, 40(1), 5–23. https://doi.org/10.1108/00483481111095492 16. Ford, J. K., Quiñones, M. A., Sego, D. J., & Sorra, J. S. (2006). FACTORS AFFECTING THE OPPORTUNITY TO PERFORM TRAINED TASKS ON THE JOB. Personnel Psychology, 45(3), 511–527. https://doi.org/10.1111/j.1744-6570.1992.tb00858.x 17. Garrow, V. (2004). Training and Development and the Psychological Contract. Training Journal, 1(1), 8–10. 18. Gist, M. E., Stevens, C. K., & Bavetta, A. G. (2006). Effects of self-efficacy and post-training intervention on the acquisition and maintenance of complex interpersonal skills. Personnel Psychology, 44(4), 837–861. https://doi.org/10.1111/j.1744-6570.1991.tb00701.x 19. Hamid, M. (2015). Does Foreign Direct Investment (FDI) Accelerate Economic Growth in Djibouti? Retrieved August 16, 2018, from https://www.geopolitica.info/djibouti/ 20. Ircha, M. C., & Garey, D. (1992). Labour/management relations in North American ports. Maritime Policy & Management, 19(2), 139– 156. https://doi.org/10.1080/03088839200000021 21. Klein, H. J., & Weaver, N. A. (2000). The effectiveness of an organizational-level orientation training program in the socialization of new hires. Personnel Psychology, 53(1), 47–66. https://doi.org/10.1111/j.1744-6570.2000.tb00193.x 22. Kumar, S. A. (2014). An Empirical Study: Relationship between Employee Motivation, Satisfaction and Organizational Commitment. Int. J. Manag. Bus. Res, 4(2), 81–93. Retrieved from http://ijmbr.srbiau.ac.ir/article_2488_3f0147882bca72599d1178ae5b49296f.pdf 23. Kurosawa, M., Ohtake, F., & Ariga, K. (2005). Productivity, Training, and Human Resource Management Practices - Disentangling Complex Interactions using a Survey of Japanese Manufacturing Firms. Retrieved from http://www.computer-services.e.u- tokyo.ac.jp/p/seido/output/Ariga/ariga005.pdf 24. Lam, T., & Qiu Zhang, H. (2003). Job satisfaction and organizational commitment in the Hong Kong fast food industry. International Journal of Contemporary Hospitality Management, 15(4), 214–220. https://doi.org/10.1108/09596110310475667 25. Lang, D. L. (1992). Organizational culture and commitment. Human Resource Development Quarterly, 3(2), 191–196. https://doi.org/10.1002/hrdq.3920030211 26. Locke, E. A., & Latham, G. P. (2002). Building a practically useful theory of goal setting and task motivation: A 35-year odyssey. American Psychologist, 57(9), 705–717. https://doi.org/10.1037//0003-066X.57.9. 27. Mathieu, J. E., & Martineau, J. . (1997). Individual and Situational Influences in Training Motivation. In J. K. Ford, S. W. . Kozlowski, K. Kraiger, E. Salas, & M. . Geachout (Eds.), Improving Training Effectiveness in Organizations (pp. 193–222). New Jersey, United States: Erlbaum. 28. Mathieu, J. E., Tannenbaum, S. I., & Salas, E. (1992). INFLUENCES OF INDIVIDUAL AND SITUATIONAL CHARACTERISTICS ON MEASURES OF TRAINING EFFECTIVENESS. Academy of Management Journal, 35(4), 828–847. https://doi.org/10.2307/256317 29. Meredith, A. ., & Benton, J. M. (2005). Mastering Learning Management. 30. Meyer, J. P., & Allen, N. J. (1991). A three-component conceptualization of organizational commitment. Human Resource Management Review, 1(1), 61–89. https://doi.org/10.1016/1053-4822(91)90011-Z 31. Mullins, L. J. (2016). Management and Organisational Behaviour (11th ed.). New York City, New York, United States: Pearson Education Limited. Retrieved from https://books.google.co.in/books/about/Management_and_Organisational_Behaviour.html?id=B1LdtwEACAAJ&source=kp_book_descrip tion&redir_esc=y 32. Reiners, T., & Fuchs, V. (2011). Requirements for effective professional IT-training: a case study. In Global Learn Asia Pacific (pp. 891– 899). New York City, New York, United States: EdITLib. Retrieved from https://www.researchgate.net/publication/230854753_Requirements_for_Effective_Professional_IT-Training_A_Case_Study 33. Sahinidis, A. G., & Bouris, J. (2008). Employee perceived training effectiveness relationship to employee attitudes. Journal of European Industrial Training, 32(1), 63–76. https://doi.org/10.1108/03090590810846575 34. Saks, A. M., & Burke, L. A. (2012). An investigation into the relationship between training evaluation and the transfer of training. International Journal of Training and Development, 16(2), 118–127. https://doi.org/10.1111/j.1468-2419.2011.00397.x 35. Salas, E., & Cannon-Bowers, J. A. (2001). The Science of Training: A Decade of Progress. Annual Review of Psychology, 52(1), 471– 499. https://doi.org/10.1146/annurev.psych.52.1.471 36. Schuler, R. S., & MacMillan, I. C. (1984). Gaining competitive advantage through human resource management practices. Human Resource Management, 23(3), 241–255. https://doi.org/10.1002/hrm.3930230304 37. Seyler, D. L., Holton III, E. F., Bates, R. A., Burnett, M. F., & Carvalho, M. A. (1998). Factors Affecting Motivation to Transfer Training. International Journal of Training and Development, 2(1), 16. https://doi.org/10.1111/1468-2419.00031 38. Stajkovic, A. D., & Luthans, F. (1998). Self-efficacy and work-related performance: A meta-analysis. Psychological Bulletin, 124(2), 240– 261. https://doi.org/10.1037//0033-2909.124.2.240 39. Stevens, C. K., & Gist, M. E. (1997). Effects of self-efficacy and goal-orientation training on negotiation skill maintenance: what are the mechanisms? Personnel Psychology, 50(4), 955–978. https://doi.org/10.1111/j.1744-6570.1997.tb01490.x 40. Switzer, K. C., Nagy, M. S., & Mullins, M. E. (2005). The Influence of Training Reputation, Managerial Support, and Self-Efficacy on Pre-Training Motivation and Perceived Training Transfer. Applied H.R.M. Research, 10(1), 21–34. Retrieved from https://pdfs.semanticscholar.org/1e8a/259e73302c6d9f599f6c8e1084e981bc023e.pdf 41. Tan, J. A., Hall, R. J., & Boyce, C. (2003). The role of employee reactions in predicting training effectiveness. Human Resource Development Quarterly, 14(4), 397–411. https://doi.org/10.1002/hrdq.1076 42. Tannenbaum, S. I. (1997). Enhancing continuous learning: Diagnostic findings from multiple companies. Human Resource Management, 36(4), 437–452. https://doi.org/10.1002/(SICI)1099-050X(199724)36:4<437::AID-HRM7>3.0.CO;2-W 43. Tannenbaum, S. I., Mathieu, J. E., Salas, E., & Cannon-Bowers, J. A. (1991). Meeting trainees’ expectations: The influence of training fulfillment on the development of commitment, self-efficacy, and motivation. Journal of Applied Psychology, 76(6), 759–769. https://doi.org/10.1037//0021-9010.76.6.759 44. Tannenbaum, S. I., & Yukl, G. (1992). Training and Development in Work Organizations. Annual Review of Psychology, 43(1), 399–441. https://doi.org/10.1146/annurev.ps.43.020192.002151 45. Tharenou, P., Saks, A. M., & Moore, C. (2007). A review and critique of research on training and organizational-level outcomes. Human Resource Management Review, 17(3), 251–273. https://doi.org/10.1016/j.hrmr.2007.07.004 46. Timmermans, A. A. A., Spooren, A. I. F., Kingma, H., & Seelen, H. A. M. (2010). Influence of Task-Oriented Training Content on Skilled Arm-Hand Performance in Stroke: A Systematic Review. Neurorehabilitation and Neural Repair, 24(9), 858–870. https://doi.org/10.1177/1545968310368963 47. Tracey, J. B., Tannenbaum, S. I., & Kavanagh, M. J. (1995). Applying trained skills on the job: The importance of the work environment. Journal of Applied Psychology, 80(2), 239–252. Retrieved from https://scholarship.sha.cornell.edu/cgi/viewcontent.cgi?article=1886&context=articles 48. Umesh, U. (2014). A Study of the Importance of Training and Development of Personnel of Cochin Port Trust, Kerala, India. Rev. Integr. Bus. Econ. Res, 4(1), 245–252. Retrieved from http://sibresearch.org/uploads/2/7/9/9/2799227/riber_h14-181_245-252.pdf 49. UNCTAD. (2012). World Investment Report: Towards a new generation of investment policies. New York City, New York, United States. Retrieved from http://unctad.org/en/PublicationsLibrary/wir2012_embargoed_en.pdf 50. Wen, M. L.-Y., & Lin, D. Y. (2014). Trainees’ characteristics in training transfer: The relationship among self-efficacy, motivation to learn, motivation to transfer and training transfer. International Journal of Human Resource Studies, 4(1), 114. https://doi.org/10.5296/ijhrs.v4i1.5128 51. Yang, H., Sanders, K., & Bumatay, C. P. (2012). Linking perceptions of training with organizational commitment: The moderating role of self-construals. European Journal of Work and Organizational Psychology, 21(1), 125–149. https://doi.org/10.1080/1359432X.2010.546948 52. Yi, M. Y., & Davis, F. D. (2003). Developing and Validating an Observational Learning Model of Computer Software Training and Skill Acquisition. Information Systems Research, 14(2), 146–169. https://doi.org/10.1287/isre.14.2.146.16016 53. Zaitouni, M., Sawalha, N. N., & Sharif, A. (2011). The Impact of Human Resource Management Practices on Organizational Commitment in the Banking Sector in Kuwait. International Journal of Business and Management, 6(6). https://doi.org/10.5539/ijbm.v6n6p108 54. Zhong Liu, A., & Seddon, P. B. (2009). Understanding how project critical success factors affect organizational benefits from enterprise systems. Business Process Management Journal, 15(5), 716–743. https://doi.org/10.1108/14637150910987928 Authors: M. Bina Celine Dorathy Paper Title: Port Integration for Enhancing Competitive Advantage Abstract: With its long coastline and strategic location, India is supposed to be in a dominant position in maritime transportation. But due to poor infrastructure and policy framework, the country extensively depends on other maritime nations such as Singapore and Colombo for transshipment. This increases the cost of exports and imports thereby placing India at a disadvantage in the global market. In response to this alarming situation, the government has taken a major initiative to promote three transshipment ports with world class facilities in the southern part of India. It is expected that these ports would compete with other transshipment ports, particularly with Colombo, and bring the transshipped cargo back to India. This paper makes an attempt to assess the competitive environment that is likely to emerge when all the three ports become operational and suggest a suitable strategy for them to enhance their competitiveness in the new environment.

References: 56. 1. P.Manoj, 2016, Can India’s container transhipment hubs take on Colombo?, retrieved from https://www.livemint.com › Politics › 2. Nidhi Jamwal,2017, Does South India Need Three Trans-Shipment Ports to Compete With Colombo? retrieved from 278-280 https://thewire.in/economy/south-india-trans-shipment-ports-e nayam 3. Ibid 4. Mohamed El Kalla, Damir Zec, Alen Jugović 2017, Container ports competition in light of contemporary liner shipping market dynamics, Multidisciplinary Scientific Journal of Maritime Research 5. Ibid 6. Ibid 7. Socio –economic impact of displacement- a study of Vallarpadam container terminal, Kochi, Chapter 4, p. 116 retrieved from shodhganga.inflibnet.ac.in/bitstream/10603/42080/17/17_chapter4.pdf 8. Project No 5 Colombo Port Expansion Project Under Public Private Partnership (PPP) Basis Retrieved from https://india.trade.gov.pl/pl/f/view/fobject_id:429171 9. Zhang Hongpei 2017, The port integration period, Global Times, retrieved from www.globaltimes.cn/content/1071407.shtml 10. Ibid 11. Retrieved from Maritime and Port Authority of Singapore website https://www.mpa.gov.sg/web/portal/home/about-mpa 12. Retrieved from Sri Lanka Ports Authority website www.slpa.lk Authors: Jyoti Mor1, Naresh Kumar, Dinesh Rai Paper Title: Research on Mechanism and Challenges in Meta Search Engines Abstract: A Meta Search Engine (MSE) produces results gathered from other search engine (SE) on a given query. In brief MSEs have single interface corresponding to multiple searches. MSE employs their own algorithm to display search results. This paper reviews existing Meta Search Engines like Yippy, eTools.ch, Carrot2, qksearch and iBoogie commonly used for searching. This paper surveys and analysed the working of different result merging algorithms. Current research reviews MSE based on different approaches like clustering technique. Few MSEs are employing Neural networks for searching. Further it also discusses problem in existing MSEs.

Keywords: Search Engine, Meta Search Engine, Web page, Clustering.

References: 1. Kumar N., Nath R., “A Meta Search Engine Approach for Organizing Web Search Results using Ranking and Clustering”, International Journal of Computer (IJC), ISSN 2307-4531. 2. Portmann E., “Weblog Extraction with Fuzzy Classification Methods,” in Second International Conference on the Applications of Digital Information and Web Technologies, pp. 411-416, ISSN: 978-1-4244-4457-1, 2009. DOI:10.1109/ICADIWT.2009.5273930. 57. 3. Akritidis L., Katsaros D. and Bozanis P., “Effective Ranking Fusion Methods for Personalized Meta Search Engines", DOI: 10.1109/PCI.2008.31. 4. Raghuvashi K.P., “Empirical Study on the Meta- Search Engine Optimization Technique Based on Keyword: A Review” in “IBMRD's 281-284 Journal of Management and Research, Print ISSN: 2277-7830, Online ISSN: 2348-5922, Volume-3, Issue-2, September 2014 pp 51-56 5. Vijaya P., Raju G., Ray S.K., “S-MSE: Asemantic Meta search engine using semantic similarity and reputation measure” in “Journal of Theoretical and Applied Information Technology” 2014/03/01 222- 230 6. Joojadeh A. R. and Hassanpour H., “ MMSE: Design & Implementation of a Medical Meta Search Engine” ,in International Journal of Machine Learning and Computing, Vol. 2, No. 4, August 2012, pp 453-457 7. Alloui T., Boussebough I., Chaoui A., Nouar A. Z. and Chettah M. C., “Usearch: A Meta Search Engine based on a New Result Merging Strategy”, In 7th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management (IC3K), 2015 URL: http://ieeexplore.ieee.org/document/7526966/. 8. Patel B., Shah D. and Patel J., “Fuzzy logic implementation for ranking of search results in meta-search engine”, at Patel et al., International Journal of Advanced Engineering Research and Studies, E-ISSN2249–8974, Int. J. Adv. Engg. Res. Studies/III/IV/July- Sept., 2014. 9. Manral J., Hossain M. A., “An Innovative Approach for online Meta Search Engine Optimization”, In 6th Conference on Software, Knowledge, Information Management and Applications, Chengdu, China, URL:https://arxiv.org/abs/1509.08396, September 9-11 2012. 10. The yippy website [Online]. Available: http://www.yippy.com/ , Last Accessed 23 January 2018 at 21:29(IST). 11. The carrot2 website [Online]. Available: http://search.carrot2.org/stable/search , Last Accessed 21 January 2018 at 22:17(IST). 12. The iboogie website [Online]. Available: http://www.iboogie.com/ , Last Accessed 22 January 2018 at 19:12(IST). 13. The opentext website [Online]. Available: http://www.opentext.com/ , Last Accessed 23 January 2018 at 21:18(IST). 14. The qksearch website [Online]. Available: http://qksearch.com/ , Last Accessed 23 January 2018 at 21:16(IST). 15. The etools website [Online]. Available: https://www.etools.ch/ , Last Accessed 23 January 2018 at 21:21(IST). 16. Ball S. and Nath R., “To Evaluate the Performance of Meta Search Engines: A Comparative Study,” Journal of Technology and Engineering Sciences, vol.1, issue1, pp.70-78, 2009. 17. Kumar N., Nath R. and Kherwa P., “An Automated Framework based on Three Level Scoring Method to Choose Best Search Engine in a Particular,” International Journal Of Computer Applications, vol. 83, issue 14, pp. 42-48, ISSN 0975 – 8887, 2013. 18. Poomagal S. and Hamsapriya T.,” K-means for Search Results clustering using URL and Tag contents,” International Conference on Process Automation, Control and Computing, pp. 1-7, ISSN: 978-1-61284-764-1, 2011. DOI:10.1109/PACC.2011.5978906. 19. Bijuraj L.V., “Clustering and its Applications,” In Proceedings of National Conference on New Horizons in IT NCNHIT, pp. 169-172, ISBN: 978-93-82338-79-6, 2013. 20. Kadir N. A., Lokman A. M. and A. Ahmad, “Dominant User Context (DUC) Filtering Framework for Web Personalized Search,” In IEEE Symposium on Wireless Technology and Applications, pp. 280-285, ISSN: 978-1-4673-2210-2, 2012. DOI: 10.1109/ISWTA.2012.6373862. 21. Juasiripukdee P., Wiyartanti L. and Kim L.,” Clustering Search Results of Non-text User Generated Content,” In: Digital Information Management, Fifth International Conference, pp. 95-100, ISSN: 978-1-4244-7571-1,2010. DOI: 10.1109/ICDIM.2010.5663293. 22. Tsai C.W.,Huang K., Chiang M. C., and Yang C. S., “A Fast Tree-Based Search Algorithm for Cluster Search Engine,” In: Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA, pp. 1603-1608, ISSN: 978-1-4244- 2794-9, 2009. DOI: 10.1109/ICSMC.2009.5346100. 23. Li H. J. and Wang J. K.,” Precise Image Retrieval on the Web with a Clustering and Results Optimization,” In International Conference on Wavelet Analysis and Pattern Recognition, Beijing, Vol. 1, pp.188-193, ISSN: 1-4244-1066-5, 2007. DOI:10.1109/ICWAPR.2007.4420661. 24. Campos R., Dias G. and Nunes C., “WISE: Hierarchical Soft Clustering of Web Page Search Results based on Web Content Mining Techniques,”, In Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence, pp. 301-304, ISSN: 0-7695- 2747-7, 2006. DOI: 10.1109/WI.2006.201. 25. Vijaya P., Raju G., Ray Santosh Kumar, “S-MSE: Asemantic Meta Search Engine Using Semantic Similarity and Reputation Measure”, Journal of Theoretical and Applied Information Technology, 20th February 2014. Vol. 60 No.2, ISSN: 1992-8645. 26. Haveliwala T. H., Gionis A., Indyk P. , “Scalable Techniques for Clustering the Web”, In: Proceeding of Web DB Workshop 2000, http://wwwstanford.edu/~taherh/papers/scalable. Authors: Ishita Mouri Rahman Paper Title: Linkage Between Traditional Architectural Elements Representing Regionalism and Achieving Salutogenesis Abstract: Cultural inferences are lost in the context of city, which can be reestablished with conscious design decisions by the architect and conscious house dwellers. Delving into those regionally established architectural elements found in Bangladesh or in the South East Asian climate, connections are found which are crucial to achieve the modern green building. Traditional architecture addresses sustainability. Salutogenesis is an approach coined by Aaron Antonovsky focusing on factors that support human health and well-being. This study draws the linkages between traditional architectural practices and achieving salutogenesis.

Keywords: Green building, regionalism, salutogenesis, traditional architecture

References: 58. 1. Amer,M.B.K.B. (2016, September 7) “Courtyards, Influence of the Indian Traditional Architectural Element on Community Interactions” Retrieved from https://www.gounesco.com/courtyards-influence-of-the-indian-traditional-architectural-element-on-community- 285-289 interactions/ 2. Golembiewski, Jan A. (2012) Salutogenic design: The neurological basis of health-promoting environments. World Health Design: Architecture, Culture, Technology, 5(3), pp. 62-69. 3. Heimburg,D.V. ( 2010) “Public Health and Health Promotion: A Salutogenic Approach” Master Degree In Health Science, Norwegian University Of Science And Technology, Ntnu. 4. Jadhav,R. (2007,June) “Green Architecture in India: Combining Modern Technology with Traditional Methods” Retrieved from https://unchronicle.un.org/article/green-architecture-india-combining-modern-technology-traditional-methods 5. Lucas,R.M. et all, (2014,December 1) “Vitamin D and Immunity Retrieved” from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4251419/ 6. Mowla, Qazi A. “An Appraisal of Architecture in Dhaka with Reference to its Thermal Performance”. In Regionalism in Architecture, edited by Robert Powell. Singapore: Concept Media/Aga Khan Award for Architecture, 1985. 7. Sinha,A.& Gupta,R. & Kutnar,A. “Sustainable Development and Green Buildings” Retrieved from file:///C:/Users/dh/Downloads/Drv_Ind_Vol_64_1_Sinha%20(1).pdf Authors: Ravikanth Sivangi, Devineni Sri Phani Kishore Paper Title: Adaptive Compressive Sensing-Based Channel Estimation for 5G Massive MIMO Systems Abstract: massive numerous statistics notable yield (MIMO) is a key innovation in a long way off correspondences to get records paces of more than one instances. vast MIMO framework has pretty big variety of reception apparatuses at the base station (BS) worked for overhauling severa clients simultaneously. it is a promising innovation for acknowledgment of immoderate-throughput far off interchanges. titanic MIMO misuses the excessive degree of spatial opportunity with the purpose that it considerably improves the channel limit and power proficiency of the MIMO framework. The massive MIMO frameworks are comprehensively stated as a full-size putting in innovation for fifth era (5G) wireless correspondence frameworks. but, in massive MIMO frameworks, a careful assurance of the channel 59. nation information (CSI)is needed for motivation in the back of feasible sign discovery, asset distribution and beamforming and so forth. those frameworks having an large range of reception apparatuses at the base Stations, clients 290-294 want to gauge channels which can be associated with severa portions of transmit recieving wires. due to this, pilot overhead seems to be excessive. on this way, acknowledgment of the right channel state statistics with a base pilot overhead can be a tough issue. Reenactment outcomes finished demonstrates that the proposed calculation can swiftly and precisely determine huge MIMO channel of the difficult to understand channel sparsity and with excessive computational productiveness whilst contrasted and distinct beyond calculations.

Keywords: 5G; substantial MIMO; compressive detecting; sparsity flexible; a channel estimation

References: 1. Khan, I.; Zafar, M.; Jan, M.; Lloret, J.; Basheri, M.; Singh, D. Ghostly and energy efficient Low-Overhead Uplink and Downlink Channel Estimation for 5G big MIMO structures. Entropy 2018 2. Khan, I.; Singh, D. proficient Compressive Sensing based Sarse Channel Estimation for 5G big MIMO structures. AEUE Int. J. Electron. Commun. 2018, 89, 181–a hundred ninety. 3. Kulsoom, F.; Vizziello, A.; Chaudhry, H.N.; Savazzi, P. Pilot decrease techniques for inadequate direct estimation in big MIMO frameworks. In complaints of the 2018 fourteenth Annual conference on wi-fi On-request network structures and services (WONS), Isola, France, 6–8 February 2018; pp. 111–116. 4. Liu, L.; Huang, C.; Chi, Y.; Yuen, C.; Guan, Y.L.; Li, Y. Scanty Vector healing: Bernoulli-Gaussian Message Passing. In court cases of the 2017 IEEE global Communications convention, Singapore, 4–eight December 2017; pp. 1–6. 5. Huang, C.; Liu, L.; Yuen, C.; solar, S. A LSE and Sparse Message Passing-based totally Channel Estimation for mmWave MIMO systems. In lawsuits of the 2016 IEEE worldwide Communications convention,Washington, DC, united states of america, four–eight December 2016; pp. 1–6. 6. Li, J.; Yuen, C.; Li, D.; Zhang, H.;Wu, X. On half of and half Pilot for Channel Estimation in large MIMO Uplink. 2018. handy at the net: https://arxiv.Org/abs/1608.02112 (were given to on 2 March 2018). 7. Gao, Z.; Dai, L.; Mi, D.; Wang, Z.; Imran, M.A.; Shakir, M.Z. MmWave huge MIMO-primarily based completely far flung backhaul for the 5G extraordinarily-thick set up. IEEE Wirel. Commun. 2015, 22, 13–21. 8. W. Xu, T. Shen, Y. Tian, and Y. Wang, "Compressive channel estimation misusing rectangular sparsity in multi-consumer substantial MIMO frameworks," in lawsuits of the 2017 IEEE wi-fi Communications and Networking convention,WCNC '17, IEEE,2017. 9. Z. Zhou, X. Chen, and D. Guo, "Scanty channel estimation for immense MIMO with 1-piece enter consistent with length," in court casesof the IEEE wireless Communications and Networking convention, WCNC '17, 2017. 10. E. Bjornson and B. Ottersten, "A shape for making equipped based estimation in subjectively linked Rician MIMO channels with Rician aggravation," IEEE Transactions on sign Processing, 2010. 11. X. Mama, F. Yang, S. Liu, and J. Melody, "getting ready succession plan and improvement for prepared compressive sensin based totally direct estimation in vast MIMO frameworks," in proceedings of the GlobecomWork (GC '16), 2016. Authors: T. Jayalakshmi, R.Priya, M.Harish Cytotoxic and Gene Expression Research on Kras Gene in Lung Cancer Cell Line of A549 Treated with Paper Title: Tinospora Coridifolia Extract Abstract: There has been global resurgence of interest in herbal drugs in the recent past. Though herbal medicines are effective in the treatment of various ailments very often these drugs are unscientifically exploited or improperly used. Therefore, these herbal drugs deserve detailed studies in the light of modern medicine. In spite of synthetic drugs, herbal drugs have their place in therapy. Their effectiveness, low-cost and comparative freedom from serious toxic effects makes these medicines not only popular but also an acceptable mode of treating diseases even in modern times. Medicinal plants are those plants that are used in treating and preventing specific and human has been using herbs for generations around the world, due to charm needed to cure the disease, many people have come to the conclusion that even chemical drugs their answers may already be sick of these medications may be harmful for health them in the future. Still, the use of plants as a source of medicine is very much important for human beings. Identify medicinal and how to use them is so important.

Keywords: Degeneration, Drugs, macromolecules, toxicity.

References: 60. 1. Defining Cancer". National Cancer Institute. Retrieved 10 June 2014. 2. "Cancer - Signs and symptoms". NHS Choices. Retrieved 10 June 2014. 3. Horn, L; Pao W; Johnson DH (2012). "Chapter 89". In Longo, DL; Kasper, DL; Jameson, JL; Fauci, AS; Hauser, SL; Loscalzo, J. 295-297 Harrison's Principles of Internal Medicine (18th ed.). McGraw-Hill. ISBN0-07-174889-X. 4. "Lung Carcinoma: Tumors of the Lungs". Merck Manual Professional Edition, Online edition. Retrieved15 August 2007. 5. Thun MJ, Hannan LM, Adams-Campbell LL, et al. (September 2008). "Lung cancer occurrence in never-smokers: an analysis of 13 cohorts and 22 cancer registry studies". 6. Alberg AJ, Samet JM (2010). "Chapter 46".Murray& Nadel's Textbook of Respiratory Medicine (5th ed.). Saunders Elsevier. 7. O'Reilly, KM; Mclaughlin AM; Beckett WS; Sime PJ (March 2007). Disease”. American Family Physician 75 (5): 683–688. 8. Carmona, RH (27 June 2006). "The Health Consequences of Involuntary Exposure to Tobacco Smoke: A Report of the Surgeon General". U.S. Department of Health and Human Services. Secondhand smoke exposure causes disease and premature death in children and adults who do not smoke. Retrieved 2014-06-16 9. "Tobacco Smoke and Involuntary Smoking" (PDF).IARC Monographs on the Evaluation of Carcinogenic Risks to Humans (WHO International Agency for Research on Cancer) 83. 2004. There is sufficient evidence that involuntary smoking (exposure to secondhand or 'environmental' tobacco smoke) causes lung cancer in humans. ... Involuntary smoking (exposure to secondhand or 'environmental' tobacco smoke) is carcinogenic to humans (Group 1). 10. Lu C, Onn A, Vaporciyan AA, et al. (2010). "78: Cancer of the Lung". Holland-Frei Cancer Medicine (8th ed.). People's Medical Publishing House. 11. Working Group Collaborated with IAP and IASLC. Tumours of the lung. In: Travis WD, Brambilla E, Mueller-Hermelink HK, Harris CC, Eds. Tumours of the lung, pleura, thymus and heart. World Health Organization Classification of Tumours. Pathology & Genetics. Lyon, IARC Press, 2004, 9-124. Authors: Jayalakshmi.T, A.Manikandan, K.N.Vardhan Paper Title: Prediction and Calculation of Physiochemical Properties using Structural Bioinformatics and Asap Tools Abstract: Amino acids are little bio-particles with different properties. The capacity to ascertain the physiochemical properties of proteins is pivotal in many research regions, for example, tranquilize plan, protein displaying and basic bioinformatics. The physiochemical properties of the protein decides its collaboration with different atoms and 61. subsequently its capacity. Foreseeing the physiochemical properties of protein and translating its capacity is of extraordinary significance in the field of medication and life science. The point of this work is to create python based 298-300 programming with graphical UI for anticipating the physiochemical and antigenic properties of protein. Thus the instrument was named as ASAP-Analysis of protein succession and antigenicity expectation. ASAP predicts the antigenicity of the protein succession from its amino corrosive arrangement, in light of Chou Fasman turns and antigenic file. ASAP computes different physiochemical properties that is required for invitro tests. ASAP utilizes standardization esteems that expansion the affectability of the apparatus.

Keywords: Amino acids, antigenicity, normalization and Protein modeling.

References: 1. Alix. “Predictive estimation of protein linear epitopes by using the program PEOPLE”. Vaccine, 18:311–4, 1999. 2. Argos, P., Rossmann, M.G., Grau, U.M., Zuber, H., Frand, G., & Tratschin, J.D. (1979) Biochemistry 18, 5698-5703 3. Atassi, M. Z. & Lee, C. L. (1978) Biochemistry 171, 429-434. 4. Atassi, M. Z. (1975) Immunochemistry 12, 423438. 5. Atsushi Ikai(1980).., “Thermostability and Aliphatic Index of Globular proteins”.., Biochem. 88, 1895-1898 (1980) 6. B. Peters, J. Sidney, P. Bourne, H. Bui, S. Buus, G. Doh, W. Fleri, M. Kronenberg, R. Kubo, O. Lund, et al. “The Immune Epitope Database and Analysis Resource: From Vision to Blueprint”. PLoS Biology, 3:e91, 2005. 7. Bachmair.A., Finley,D. and Varshavsky.A. (1986) Science, 234, 179-186. 8. Baranyi L, Campbell W, Ohshima K, Fujimoto S, Boros M, Okada H. “The antisense homology box. a new motif within proteins that encodes biologically active peptides”. Nat. Med 1995, 1, pp. 894901. 9. Barlow,D.J., Edwards, M.S., and Thornton,J.M., 1986 “Continuous and discontinuous protein antigenic determinants’. Nature, Vol 322, pp747-748. 10. Berchanski A, Shapira B, Eisenstein M. “Hydrophobic complementarity in protein protein docking”. Proteins 2004, 56, pp. 130142. 11. Chen. J, H. Liu, J. Yang, and K. Chou.” Prediction of linear B-cell epitopes using amino acid pair antigenicity scale”. Amino Acids, 33:423–428, 2007. 12. Chou PY, Fasman GD. 1974. “Conformational parameters for amino acids in helical, &sheet and random coil regions calculated from proteins”. Eiochemistry 13:211-223. 13. Clements JD, Martin RE. “Identification of novel membrane proteins by searching for patterns in hydropathy profiles”. Eur. J. Biochem 2002, 269, pp. 21012107. 14. Creighton.T.E. (1988) BioEssays, 8, 57-63. 15. Curr ..,”Design of synthetic peptides for diagnostics”, Protein Pept Sci, 4(4):253-260, 2003. 16. D. Flower. “Immunoinformatics: “Predicting immunogenicity in silico”. Quantum distributor, 1st edition, 2007. Authors: A. Manikandan, T. Jayalakshmi, P.B. Ramesh Babu Design of Drug Molecule Based Structure for Smad 3 Protein and Its Insilico Research of Leukemia Utilizing Paper Title: Bioinformatics Software Abstract: The Research work on rational drug molecules design for Smad3,the conclusion is that out of all the inhibitors chosen for the docking , PTHrP emerged to be the best inhibitor for the protein Smad3.The precise reason for it was its docking energy which was the lowest (docked energy =-29.73), among all other inhibitors used. Hence the conclusion is that Smad3 is the best inhibitor, for Smad3. Hence the task was completed successfully. There are many reasons and factors responsible for induction of cancer. Leukemia is a type of cancer in blood or bone marrow and is characterized by an irregular proliferation of white blood cells.

References: 1. Greer J., Erickson J.W., Baldwin J.J. and Varney M.D. (1994). Application of the three-dimensional structures of protein target molecules in structure-based drug design. J Med Chem 37 (8): 1035 - 1054. 2. Gubernator K, Böhm HJ (1998). Structure-Based Ligand Design, Methods and Principles in Medicinal Chemistry. Weinheim: Wiley-VCH. 3. I.D. Kuntz, "Structure-based Strategies for Drug Design and Discovery," Science, 257:1078-1082, 1992. 4. P. Charifson and I.D. Kuntz, "Recent Successes and Continuing Limitations in Computer-Aided Drug Design," in: Practical Application of Computer-Aided Drug Design, P. Charifson, ed., pp. 1-37, Marcel-Dekker, New York, 1997. 5. Griffith, J. et al. The structural basis for autoinhibition of FLT3 by the juxtamembrane domain. Molecular Cell 13, 169-178 (January 30, 2004). 6. Dessen P, Knuutila S, Huret JL Chromosome 1. Atlas Genet Cytogenet Oncol Haematol. 2002.URL: http://AtlasGeneticsOncology.org/Indexbychrom/idxa_1.html 7. The relation between the divergence of sequence and structure in proteins. Chothia, C., Lesk, A.M., EMBO J., 5 (1986) 823-836. 8. Sander, C., Schneider Database of homology-derived protein structures and the structural meaning of sequence alignment, R., PROTEINS, 9 (1991) 56-68. 9. Swindells, M.B., Thornton, J.M., Modelling by homology. Curr.Op.Struct.Biol, 1 (1991) 219-223. 62. 10. Hilbert, M., B G., Jaenicke, R., Structural relationships of homologous proteins as a fundamental principle in homology modeling. PROTEINS, (1993), 17, 138-151. 301-306 11. Lesk, A.M., Chothia, C., J.Mol.Biol.,How different amino acid sequences determine similar protein structures: the structure and evolutionary dynamics of the globins. (1980) 136, 225-270. 12. Kabsch, W., Sander, C., On the use of sequence homologies to predict protein structure: identical pentapeptides can have completely different conformations. PNAS, (1984) 81, 1075-1078. 13. Plastocyanin and Azurin. Chothia, C., Lesk, .M., Evolution of proteins formed by b-sheets. J.Mol.Biol, (1982) 160, 309-323. 14. Bajorath, J., Stenkamp, R., Aruffo, A.Knowledge-based model building of proteins: concepts and examples., Prot.Sci, (1993) 2, 1798- 1810. 15. Lesk, A.M., Boswell, .R., Homology modelling: inferences from tables of aligned sequences. Cur.Op.Struc.Biol. (1992) 2, 242-247. 16. Havel, T.F., Snow, M.E., A new method for building protein conformations from sequence alignments with omologues of known structure. J.Mol.Biol., (1991) 217, 1-7. 17. Reid, L.S., Thornton, J.M.,Rebuilding flavodoxin from Ca coordinates: a test study. PROTEINS, (1989) 5, 170-182. 18. Greer, J.Comparative modeling of homologous proteins., Meth.Enzym., (1991) 202, 239-252. 19. Sudarsanam, S., March, C.J., Srinivasan, S.,Homology modeling of divergent proteins. J.Mol.Biol., (1994) 241, 143-149. 20. Lee, R.H.,Protein model building using structural homology. Nature, (1992) 356, 543-544. 21. Sali, A., Blundell, T.L., Comparative modelling by satisfaction of spatial restraints. (1993) 234, 779-815. 22. Summers, N.L., Karplus, M.,Modelling of globular proteins. A distance based search procedure for the construction of insertion regions and non-pro mutations. J.Mol.Biol, (1990) 216,991-1016. 23. Schiffer, C.A., Caldwell, J.W., Kollmann, P.A., Stroud, R.M.,Prediction of homologous protein structures based on conformational searches and energetics. PROTEINS, (1990) 8, 30-43. 24. Swindells, M.B., Thornton, J.M.,Modelling by homology. Curr,Op.Struc.Biol., (1991) 1, 19-223. 25. Moult, J., Pedersen, J.T., Judson, R., Fidelis, K., A large-scale experiment to assess protein structure prediction methods. PROTEINS, (1995) 23, 2-4. 26. Mosimann, S., Meleshko, R., James, N.G.A critical assessment of comparative molecular modeling of tertiary structures of proteins., PROTEINS, (1995) 23, 301-317. 27. Harrison, R.W., Chatterjee, D., Weber, I.T.,Analysis of six protein structures predicted by comparative modelling techniques. Proteins, (1995) 23, 463 Authors: R.Kishore Kanna, N.Subhalakhsmi, V.Gomathy, R.Vasuki Paper Title: Monitoring and Search of Coma Patients using Variable Motion Sensor System Abstract: It is vital to consistently screen the oblivious/extreme lethargies patients to comprehend their wellbeing condition. The primary objectives of the proposed is to achieve two things. 1) Monitoring and cautioning the restorative individual is the basic part, when the incapacitated additions cognizance utilizing movement recognition framework. 2) Continuous observing and assessment of basic signs of the patient, for example, Pulse rate and warmth and alarm the specialist at whatever point consideration is required. Wearable Motion sensor framework can be utilized to screen different body developments such and hand development as visual perception flicker development to find the cognizant condition of an individual. This framework will all around likely be exceptionally useful in helping the specialist about the wellbeing state of the other than cognizant patient and cautioning the doctor at whatever point care is required. The proposed framework will help your specialist by providing an alert about the wellbeing state of the patient, when the spot of basic signs reported.

Keywords: Attention, Alerting, Coma patient, Monitoring, Motion detection, Physical movement, Vital signal.

References: 1. International Journal of Scientific & Engineering Research Volume 2, Issue 6, June- 2011 ISSN 2229-5518. 2. Malika, Charu Rana, “AnIndoor Wireless Zigbee based Patient Monitoring system for Hospitals”, International Journal of Engineering Sciences Research-IJESR, Vol 04, Issue 02; March-April 2013 3. K. Navya, Dr. M. B. R. Murthy,“A Zigbee Based Patient Health Monitoring System”,Int. Journal of Engineering Research and Applications, www.ijera.com, Vol. 3, Issue 5, pp.483-486, Sep- Oct 2013. 4. Amruta Chopade, Prof. Nitin Raut, “RemotePatients Health Monitoring by Using Zigbee Protocol”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume4, Issue 8, August 2014. 5. Xi Chen, “Human Motion Analysis with WearableInertial Sensors”, University of Tennessee,Knoxville, 8-2013. 6. Khalifa AlSharqi, Abdelrahim Abdelbari, Ali Abou- 7. Elnour, and Mohammed Tarique, “Zigbee based wearable remote healthcare montoring system for elderly patients”International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 3, June 2014. 8. AmrutaNagarkar, M.N.Kakatkar, “Zigbee based wireless patient monitoring”,International Journal of Science, Engineering and TechnologyResearch(IJSETR),Volume 2, Issue 2, February 2013. 9. Paula Pascoal-Faria, Miguel Patrício, Adriana Leal, Francisco Caramelo, António Freire, CristinaJanuario, Miguel Castelo-Branco, “Understanding Tremor in Rapid Upper Limb Movements Using 3DAccelerometers Data”, Neuroscience & Medicine, 2014,5, 205-213 Published Online December 2014 in SciRes. 10. Sharmila S., Jeyanthi Rebecca L., Das M.P.,Production of Biodiesel from Chaetomorpha antennina and Gracilaria corticata,Journal of Chemical and Pharmaceutical Research,V-4,I-11,PP-4870-4874,Y-2012 11. Aarthi C., Ramesh Babu P.B.,Anti-cancer activity of Phyllanthus reticulatus on colon cancer cell line, International Journal of Civil 63. Engineering and Technology,V-8,I-1,PP-943-947,Y-2017 12. Sharmila S., Jeyanthi Rebecca L., Das M.P., Saduzzaman M.,Isolation and partial purification of protease from plant leaves, Journal of 307-310 Chemical and Pharmaceutical Research,V-4,I-8,PP-3808-3812,Y-2012 13. Jayalakshmi T., Krishnamoorthy P., Ramesh Babu P.B., Vidhya B.,Production, purification and Biochemical characterization of alkaline Fibrinolytic enzyme from Bacillus subtilisstrain-GBRC1,Journal of Chemical and Pharmaceutical Research,V-4,I-12,PP-5027-5031,Y- 2012 14. Jeyanthi Rebecca L., Susithra G., Sharmila S., Das M.P.,Isolation and screening of chitinase producing Serratia marcescens from soil,Journal of Chemical and Pharmaceutical Research,V-5,I-2,PP-192-195,Y-2013 15. Aarthi C., Ramesh Babu P.B.,Antimicrobial and antioxidant activity of phyllanthus niruri,International Journal of Pharmacy and Technology,V-8,I-2,PP-14701-14707,Y-2016 16. Anbuselvi S., Jeyanthi Rebecca L., Sathish Kumar M., Senthilvelan T.,GC-MS study of phytochemicals in black gram using two different organic manures,Journal of Chemical and Pharmaceutical Research,V-4,I-2,PP-1246-1250,Y-2012 17. Soniyapriyadharishni A.K., Ramesh Babu P.B.,Data mining strategies for identification of HNF4A MODY gene using gene prioritize tool,Journal of Chemical and Pharmaceutical Research,V-6,I-3,PP-1126-1133,Y-2014 18. Sharmila S., Jeyanthi Rebecca L., Naveen Chandran P., Kowsalya E., Dutta H., Ray S., Kripanand N.R.,Extraction of biofuel from seaweed and analyse its engine performance,International Journal of Pharmacy and Technology,V-7,I-2,PP-8870-8875,Y-2015 19. Sharmila S., Jeyanthi Rebecca L., Saduzzaman M.,Biodegradation of domestic effluent using different solvent extracts of Murraya koenigii,Journal of Chemical and Pharmaceutical Research,V-5,I-2,PP-279-282,Y-2013 20. Jeyanthi Rebecca L., Sharmila S., Das M.P., Seshiah C.,Extraction and purification of carotenoids from vegetables,Journal of Chemical and Pharmaceutical Research,V-6,I-4,PP-594-598,Y-2014 21. Krishnamoorthy P., Praveen Kumar P.K., Ramesh Babu P.B.,Community based evaluation of phenylthiocarbamide (PTC) sensitivity and Dermatoglyphics as a genetic marker in Tamilnadu, India,International Journal of Pharmacy and Technology,V-5,I-3,PP-5705-5712,Y- 2013 22. Sharmila S., Jeyanthi Rebecca L.,GC-MS Analysis of esters of fatty acid present in biodiesel produced from Cladophora vagabunda,Journal of Chemical and Pharmaceutical Research,V-4,I-11,PP-4883-4887,Y-2012 23. Sinha S., Rajasulochana P., Ramesh Babu P.B., Krishnamoorthy P.,Comparative modelling of shikimate kinase (M Tb) and molecular docking studies of its known inhibitors,Research Journal of Pharmaceutical, Biological and Chemical Sciences,V-4,I-3,PP-715-720,Y- 2013 24. Jeyanthi Rebecca L., Dhanalakshmi V., Sharmila S.,Effect of the extract of Ulva sp on pathogenic microorganisms,Journal of Chemical and Pharmaceutical Research,V-4,I-11,PP-4875-4878,Y-2012 25. Sharmila S., Jeyanthi Rebecca J.,A comparative study on the degradation of leather industry effluent by Marine algae,International Journal of Pharmaceutical Sciences Review and Research,V-25,I-2,PP-46-50,Y-2014 26. Ramesh Babu P.B., Krishnamoorthy P., Gayathri G.,Identification of drug target site on citrate synthase of food pathogen - Campylobacter jejuni,Research Journal of Pharmaceutical, Biological and Chemical Sciences,V-4,I-1,PP-618-623,Y-2013 27. Sharmila S., Rebecca Jeyanthi L., Saduzzaman M.,Biodegradation of tannery effluent using Prosopis juliflora,International Journal of ChemTech Research,V-5,I-5,PP-2186-2192,Y-2013 28. Kumar S., Das M.P., Jeyanthi Rebecca L., Sharmila S.,Isolation and identification of LDPE degrading fungi from municipal solid waste,Journal of Chemical and Pharmaceutical Research,V-5,I-3,PP-78-81,Y-2013 29. Das M.P., Jeyanthi Rebecca L., Sharmila S., Anu, Banerjee A., Kumar D.,Identification and optimization of cultural conditions for chitinase production by Bacillus amyloliquefaciens SM3,Journal of Chemical and Pharmaceutical Research,V-4,I-11,PP-4816-4821,Y- 2012 30. Ramesh Babu P.B., Krishnamoorthy P., Rekha R.,Develoment of comprehensive online database model for genes responsible for asthma,Research Journal of Pharmaceutical, Biological and Chemical Sciences,V-4,I-1,PP-865-871,Y-2013 31. Devi M., Jeyanthi Rebecca L., Sumathy S.,Bactericidal activity of the lactic acid bacteria Lactobacillus delbreukii,Journal of Chemical and Pharmaceutical Research,V-5,I-2,PP-176-180,Y-2013 32. Ramesh Babu P.B., Miller T.L., Chidekel A., Shaffer T.H.,Clara cell protein mediates secretion of proteins, IL-8 and IL-6 in human airway epithelial cell line Calu-3 exposed to hyperoxia,Journal of Chemical and Pharmaceutical Research,V-4,I-6,PP-3164-3170,Y-2012 33. Bhuvaneswari B., Hari R., Vasuki R., Suguna,Antioxidant and antihepatotoxic activities of ethanolic extract of Solanum torvum,Asian Journal of Pharmaceutical and Clinical Research,V-5,I-SUPPL. 3,PP-147-150,Y-2012 34. Abraham Samuel F., Mohan V., Jeyanthi Rebecca L.,Physicochemical and heavy metal analysis of sugar mill effluent,Journal of Chemical and Pharmaceutical Research,V-6,I-4,PP-585-587,Y-2014 35. Narayani P.C., Anbu J., Vasuki R., Hari R.,Invitro and invivo anti-arthritic activity of combined ethanolic extracts of Calotropis gigantea and Cardiospermum halicacabum in Wistar rats,Journal of Natural Remedies,V-14,I-1,PP-58-66,Y-2014 36. Paul Das M., Jeyanthi Rebecca L., Sharmila S., Anu, Banerjee A., Kumar D.,Identification and optimization of cultural conditions for chitinase production by Bacillus amyloliquefaciens SM3,Journal of Chemical and Pharmaceutical Research,V-4,I-12,PP-4969-4974,Y- 2012 37. Vasuki R., Hari R., Pandian S., Arumugam G.,Hepatoprotective action of ethanolic extracts of eclipta alba and piper longum linn and their combination on CCL 4 induced hepatotoxicity in rats,International Journal of Pharmacy and Pharmaceutical Sciences,V-4,I-SUPPL.1,PP- 455-459,Y-2012 38. Saduzaman M., Sharmila S., Jeyanthi Rebecca L.,Efficacy of leaf extract of Moringa oleifera in treating domestic effluent,Journal of Chemical and Pharmaceutical Research,V-5,I-2,PP-139-143,Y-2013 39. Senthil Kumar K., Vasuki R., Priya R.,Green synthesis, pegylation of silver nano herbal complexand study of its anti-mutagenicity activity,International Journal of Pharmacy and Technology,V-8,I-2,PP-12130-12143,Y-2016 40. Srivastava S., Seethalakshmi I., Jeyanthi Rebecca L.,Antimicrobial and antioxidant properties of cissus quandrangularis,Journal of Chemical and Pharmaceutical Research,V-5,I-5,PP-131-134,Y-2013 41. Gireeshan M.G., Vasuki R., Krishnakumar T.,High power production from elephant’s urine,International Journal of Pharmacy and Technology,V-6,I-2,PP-6714-6718,Y-2014 42. Jeyanthi Rebecca L., Dhanalakshmi V., Sharmila S., Das M.P.,In vitro antimicrobial activity of Gracilaria SP and Enteromorpha SP,Research Journal of Pharmaceutical, Biological and Chemical Sciences V-4,I-1,PP-693-697,Y-2013 43. Jeyanthi Rebecca L., Dhanalakshmi V., Thomas T.,A comparison between the effects of three algal extracts against pathogenic bacteria,Journal of Chemical and Pharmaceutical Research,V-4,I-11,PP-4859-4863,Y-2012 Authors: S. John Justin Thangaraj, Rengarajan A, Selvanayaki S Paper Title: Comprehensive Learning on Characteristics, Applications, Issues and Limitations of Manets Abstract: This paper is aimed at giving an insight view over the research domains across various levels of Mobile Ad- hoc Networks. A mobile ad-hoc sensor network follows a broader sequence of operational scenarios, unlike typical sensor networks that communicate with the centralized controller. Hence they demand a less complicated setup favorably. Mobile ad-hoc sensors are otherwise known as hybrid ad-hoc networks that consist of some sensors spreads in a geographical area. All individual sensors are capable of mobile communication and have some level of intelligence to process signals and to transmit information. Mobile ad-hoc sensor networks are very constructive in different circumstances. These networks advance the operational efficiency of individual civilian applications. Mobile ad-hoc sensor network becomes highly adaptable so that it can be deployed in almost all environments .The evolution of research in MANET has been started from routing of packets, error free routing, reliable route to stable and secure path of communication in present days. Recent researchers may have much opening in the space of security over the data transmission in the MANET.

References: 1. Bamis, A., Boukerche, A., Chatzigiannakis, I. and Nikoletseas, S., “A mobility aware protocol synthesis for efficient routing in ad hoc mobile networks”, Computer Networks, Vol. 52, No. 1, pp. 130-154, 2008. 2. Chakeres, I.D. and Perkins, C.E., “Dynamic MANET on-demand routing protocol”, IETF Internet Draft, draft-ietf-manet-dymo-12.txt, 2008. 3. Garcia-Luna-Aceves, J.J. and Madruga, E.L., “The core assisted mesh protocol”, IEEE Journal on selected Areas in Communications, Vol. 17, No. 8, pp. 1380-1394, 1999. 4. Gerla, M., Chen, L.J., Lee, Y.Z., Zhou, B., Chen, J., Yang, G. and Das, S., “Dealing with node mobility in ad hoc wireless network”, 64. Formal Methods for Mobile Computing, Springer Berlin Heidelberg, pp. 69-106, 2005. 5. Hong, X., Xu, K. and Gerla, M., “Scalable routing protocols for mobile ad hoc networks”, IEEE network, Vol. 16, No.4, pp. 11-21, 2002. 6. Johnson, D., Hu, Y.C. and Maltz, D., “The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4”, No. RFC 4728, 311-314 2007. 7. Jubin, J. and Tornow, J.D., “The DARPA packet radio network protocols”, Proceedings of the IEEE, Vol. 75, No. 1, pp. 21-32,1987. 8. Kammann, J., Angermann, M. and Lami, B., “A New Mobility Model Based on Maps”, Proceedings of the 58th IEEE Semiannual Vehicular Technology Conference, Orlanda, USA, 2003. 9. Lu, J.L. and Valois, F., “On the data dissemination in WSNs”, Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMOB, pp. 58-58, 2007. 10. Murthy, S. and Garcia-Luna-Aceves, J.J.,“An efficient routing protocol for wireless networks”, Mobile Networks and Applications, Vol. 1, No. 2, pp. 183-197, 1996. 11. Perkins, C.E. and Royer, E.M., “Ad-hoc on-demand distance vector routing”, Mobile Computing Systems and Applications, Proceedings, 2nd IEEE Workshop, pp.90-100, 1999. 12. Rodoplu, V. and Meng, T.H., “Minimum energy mobile wireless networks”, IEEE Journal on selected areas in communications, Vol. 17, No. 8, pp. 1333-1344, 1999. 13. Seah, W.K., Lee, F.W., Mock, K.W. and Kwek, M.Q., “Mobility modelling of rush hour traffic for multi-hop routing in mobile wireless networks”, Vehicular Technology Conference, VTC-Fall, IEEE, pp. 1-5, 2006. 14. Sholander, P., Tracey, O. and Paul, C., “Wireless routing protocol for ad-hoc networks”, U.S. Patent No. 7,177,295, 2007. 15. Souihli, O., Frikha, M. and Hamouda, M.B., “Load-balancing in MANET shortest-path routing protocols”, Ad Hoc Networks, Vol. 7, No. 2, pp. 431-442, 2009. 16. Sun, J.Z. and Sauvola, J., “Mobility and mobility management: a conceptual framework”, Proceeding of 10th IEEE International Conference on Networks, 2002. 17. Thangaraj, S. John Justin and Rengarajan, A. “Unreliable Node Detection by Elliptical Curve Diffie-Hellman Algorithm in MANET”, Indian Journal of Science and Technology, Vol. 9, No. 19, pp. 1-6, 2016. 18. Toh, C.K., “Associativity-based routing for ad hoc mobile networks”, Wireless personal communications, Vol. 4, No. 2, pp. 103-139, 1997. 19. Xiaochuan, X., Gang, W., Keping, W., Gang, W. and Shilou, J., “Link reliability based hybrid routing for tactical mobile ad hoc network”, Journal of Systems Engineering and Electronics, Vol. 19, No. 2, pp. 259-267, 2008. 20. Ye, F., Luo, H., Cheng, J., Lu, S. and Zhang, L.,“A two-tier data dissemination model for large-scale wireless sensor networks”, Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, pp. 148-159,2002. Authors: K.Kavitha, M.Punithavalli Paper Title: A Research on Privacy Preserving for Data I Storage in Cloud Center Abstract: A cloud computing is an important aspect for transmitting data through internet. Cloud providers provide data through the data centers to the cloud users for the purpose of compute, storage, and network resource demands throughout the world. User of the cloud can utilize the economical advance for data sharing between group members with low maintenance cost. In the meantime, it should provide security assurance for the sharing data files as a result of they are outsourced. unfortunately, due to the regular modification of the membership, distribution of data whereas offering privacy-preserving remains to be a difficult issue, significantly for an un-trusted cloud because of the collusion harass. Moreover, several schemes were projected, the protection of key allocation is predicated on the protected communication passage, however, to own such passage could be a robust assumption and is hard for observe. In this paper we provide numerous approaches for the secure data storage within the cloud.

Keywords: Cloud Computing, Data Storage, Security, Data center and Survey

References: 1. D.Kiran Kumar, “Review on Virtualization for Cloud Computing”. 2. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. “A View of Cloud computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr.2010. 3. Wei-Fu Hsien, “A Survey of Public Auditing for Secure Data Storage in Cloud Computing”, Vol.18, No.1, PP.133-142, Jan. 2016 4. I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. U. Khan, “The rise of big data on cloud computing: Review and 65. open research issues,” Information Systems, vol. 47, no. 6, pp. 98–115, 2015. 5. C.Wang, S.S.M.Chow, Q.Wang, K.Ren and W.J. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage,” http://eprint.iacr.org/2009/579.pdf. 315-320 6. Vijaya Kumar C, Dr. G.A. Ramachandra, "Thrusting Energy Efficiency for Data center in Cloud Computing Using Resource Allocation Techniques". 7. Weiwei Fang, et al "Cost-aware Workload Dispatching and Server Provisioning for Distributed Cloud Data Centers", Vol.6, No.5 (2013). 8. Mr. T.Sivakumar and D.Sathish, “Energy Management & Cost Optimization in IDC Using Load Balancing in Cloud” 9. Ankita Ajay Jadhav, “Anti Collusion Data Sharing Schema for Centralized Group in Cloud” 10. G.Mercy Vimala, “A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud” 11. C. Wang, Q. Wang, K. Ren and W. Lou, “Privacypreserving public auditing for data storage security in cloud computing”, IEEE INFOCOM 2010, IEEE, 2010. 12. M. Stonebraker, R. Devine, M. Kornacker, W.Litwin, A. Pfeffer, A. Sah, and C. Staelin,Proc.Third M.A. Shah, R. Swaminathan, and M. Baker.”Privacy-Preserving Audit and Extraction of Digital Contents”, Cryptology ePrint Archive 13. A. R. Navajothi and S.J.A. Fenelon, “An efficient, dynamic, privacy preserving public auditing method on untrusted cloud storage”, In proceedings of ICICES2014,IEEE, 2014. 14. Rajat Saxena and Somnath Dey, 2016. “Cloud Audit: A Data Integrity Verification Approach for Cloud Computing”, Procedia Computer Science, Vol. 89, pp. 142-151. 15. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” in Proc. Netw. 16. Distrib. Syst. Security Symp., 2005, pp. 29–43. 17. C. Wang, Q. Wang, K. Ren, and W. Lou, “Towards secure and dependable storage services in cloud computing,” Service Computing, IEEE Transactions on, vol. 5, no. 2, pp. 220–232, May 2012. 18. Jiawei Yuan and Shucheng Yu, 2015. “Public integrity auditing for dynamic data sharing with multiuser modification”, IEEE Transactions on Information Forensics and Security, Vol. 10, No. 8, pp. 1717-1726 19. C. Erway, A. Kupcu, C. Papamanthou and R.Tamassia, ”Dynamic Provable Data Possession”, Proc. ACM Conf. Computer and Comm. Security (CCS 09), pp. 213-222, 2009. Authors: R.Priya, E.Sugitha, Vasundra Paper Title: A Access in Treatment of Type Ii Diabetes using Combinational Herbal Compounds Abstract: Diabetes is the common disorder found in case of metabolic disfunction leads to high blood glucose level in our body. Type two polygenic diseases are that the most typical type of polygenic disease. If we have type 2 diabetes our body does not use insulin properly. This is called insulin resistance. At first, our pancreas makes extra insulin to make up for it. But, over time it's not able to carry on and cannot create enough internal secretion to stay your blood sugar at traditional levels. In order to cure Type II diabetes we have identified the gene responsible for the insulin resistance gene from the genomic information resource database. The gene is further analysed and docked with the four herbal components and checked its minimum energy value for further studies. This will be the combination drug and using Nano medicine which will be the target drug delivery towards the target gene which stimulates the activity of the insulin resistant gene. Since its targets towards the gene it will be considered as the gene therapy and new combinatorial medicine, here Bioinformatics, combinatorial chemistry, pharmacology, Nano medicine play a vital role in treatment of 66. diabetes. Type II diabetes is the high risk of day to day life, so considering these facts the gene responsible for diabetes is 321-324 identified and diagnosis of DNA is done used molecular techniques and mutated gene is identified for further treatment. In this project suitable drug targets is identified and targeted towards the type II diabetes.

Keywords: Type 2 Diabetes, Insulin Secretions, Target drug delivery.

References: 1. Treatment of colorectal cancer using Nanotechnology.R.Priya, Dr.R.Vasugi, IJPT| Sep-2015 | Vol.7 | Issue No.2 | 8977-898. 2. Green synthesis of Silver Nano particle by Semecarpus anacardium, plumbago zeylanica and curcuma longa Extracts and characterization of silver Nanoparticle. K.Senthilkumar, Dr.R.Vasuki, R.Priya, Jul- Aug, 2016, RJPBCS/7(4) Page no.502. 3. Green synthesis PEGlyation of silver NanoHerbal complex and study of its antimutagenicity 4. Activity. K.Senthilkumar, Dr.R.Vasuki, R.Priya, IJPT /jun-2016/vol.8/Issue No.12/12130/12143. 5. Finding the High specific target gene among cry1Ac & cry2Ab in resistance to Pesticide. R.Priya, Rashmi Das, Dr.P.B.Ramesh babu, July- Aug, 2016, RJPBCS, 7(4), page No. 3070. 6. Molecular Mechanics, Drug Designing and Docking studies on mutated Gene CASP9 - Caspase 9, apoptosis – related cysteine peptidase) in Colorectal cancer in Human using Cheminformatics software and tools. R.Priya, DR. R. Vasuki and Senthilkumar.K, IJNTPS, vol 4/Number 4/AUG/2014. Authors: S.Anbuselvi, L.Jeyanthi Rebecca Paper Title: Production of Industrial Organic Acid From Cassava using Fungi Abstract: Citric acid ,an industrial organic acid produced by Aspergillusniger from Manihotesculenta peel with different carbon and nitrogen sources. Glucose enriched medium showed maximum yield of citric acid. Ammonium chloride and ammonium persulphate reduced the formation of citric acid. The highamount of citric acid was observed in ammonium dihydrogen phosphate enriched source. The optimum yield of organic acid from cassava pulpin the presence of fungi was found in 20 days of fermentation with pH3and room temperature.

References: 1. Ali HK, Daud M Z, and AL Azzuair(2011),Economic benefit from the optimization of citric acid production from rice straw, Turk. J.Eng.Sci,35,1-13 2. Haq,H,Ashraf S, Ali,WA, Butt K,Shafig S ,QadeerMA,and J Iqbal(2001), Effect of mineral nutrients on biosynthesis of citric acid fromAspergillusniger using sucrose salt media, Pak.J.Bot,,33,535-540. 67. 3. Pandey(2003) ,Solid state fermentation, Biochemical Engineering Journal,13,81-84. 4. Ikram –ul-H, Ali S, Qadeer MA, and J Iqbal(2004),Citric acid production by selected mutant of Aspergillusniger from cane molasses , Bio.Res.Tech,,93,125-130. 325-326 5. Pandey A, Soccol CR, Rodriguez-Leon JA and P Nigam(2001), Production of organic acids by solid state fermentation-SSF in biotechnology, Fundamentals and Applications,Asia Tech Publishers,New Delhi, 113-126. 6. Balamurugan T and S.Anbuselvi(2013)“Physicochemical constituents of Cassava pulp and waste” Journal of Chemical and Pharmaceutical Research, 5(2):258-260.US 7. MuradA,ElHoli, Khalaf and AL Delaimy, Citric acid production from whey sugars, Afri.J. Bio.Tech.,2003, 2(10),356-359. 8. Parado FC, Vanderberghe LPS and CR Soccol ,Citric acid production by SSF on a semi pilot scale using different percentage of treated cassava bagasse, Braz.J. Chem.Eng,2005,22(4),356-360. 9. Walid A, Lotfy, Khaled N, GhanemEhab R, EL Helow, Citric acid production by novel from Aspergillusniger isolate induced mutagenesis and cost reduction studies,98,2007,98,3464-3469. 10. Husseiny FA, Younis NA and SS Farag, Selection of Aspergillusniger isolates growing on different carbon sources by products for citric acid production,J.Am.Sci,2010,1222-1229. 11. Arts E, Kubicek CP and Rohr M, Regulation of phosphofructokinase fromAspergillusniger ,J,Gen.Micro,1987,133,1195-1200 12. Xie and West ,Citric acid production byAspergillusniger from a treated ethanol fermented product using solid state fermentation, Lett.Appl.Micro.,2009,48,634-644. Authors: R. Kishore Kanna, S.Geetha, T.Manoj Prasath, F.Emerson Solomon Paper Title: Research on Diabetes by Respiration Patterns Access Abstract: Diabetes is a standout amongst the most widely recognized illness that influences numerous people. Diabetes can be alluded to as an interminable malady portrayed by abnormal amounts of sugar (glucose) in the blood. Customarily diabetes is recognized by taking blood tests, however this strategy is difficult. Henceforth by planning an Electronic nose diabetes can be recognized with just breathed out breath tests dependent on biomarkers content. In this paper a minimal effort, non-intrusive framework for distinguishing diabetes is proposed. For this reason, number of breath tests were gathered from typical and diabetic patients to distinguish the biomarker content in breath. E-Nose is utilized to identify the diabetes utilizing unpredictable natural mixes from inhale tests. E-Nose is planned utilizing Arduino MEGA 2560 and gas sensors inserted in Nose cover. In the wake of gathering simple sign from the gas sensor, simple sign is changed over into computerized values for highlight extraction and determination. In highlight extraction fitting qualities were chosen. At that point preparing is finished utilizing ANN and qualities are tried for exactness. The outcomes can be seen in PC[1]. 68. Keywords: ENOSE, BIOMAKERS, DIABETES,ARDUINO, RESPIRATION. 327-329

References: 1. Rogers PH, Benkstein KD, Semancik S. Machine learning applied to chemical analysis: Sensing multiple biomarkers in simulated breath using a temperature-pulsed electronic-nose. Analytical chemistry. 2012 Nov 6;84(22):9774-81. 2. Saraoğlu HM, Selvi AO, Ebeoğlu MA, Taşaltin C. Electronic nose system based on quartz crystal microbalance sensor for blood glucose and HbA1c levels from exhaled breath odor. IEEE Sensors Journal. 2013 Nov;13(11):4229-35. 3. Fens N, Van der Schee MP, Brinkman P, Sterk PJ. Exhaled breath analysis by electronic nose in airways disease. Established issues and key questions. Clinical & Experimental Allergy. 2013 Jul;43(7):705-15. 4. Sarno R, Wijaya DR. Detection of diabetes from gas analysis of human breath using e-Nose. In2017 11th International Conference on Information & Communication Technology and System (ICTS) 2017 Oct 31 (pp. 241-246). IEEE. 5. Castro M, Kumar B, Feller JF, Haddi Z, Amari A, Bouchikhi BE. Novel e-nose for the discrimination of volatile organic biomarkers with an array of carbon nanotubes (CNT) conductive polymer nanocomposites (CPC) sensors. Sensors and Actuators B: Chemical. 2011 Nov 28;159(1):213-9. 6. Saraoglu HM, Kocan M. Determination of blood glucose level-based breath analysis by a quartz crystal microbalance sensor array. IEEE Sensors Journal. 2009 Dec 11;10(1):104-9. Authors: T.Manoj Prasath, Prasath Alias Surendhar, R.Kishore Kanna, Vasukidevi Ramachandran Paper Title: Sensor Based Rehabilitation Tool for Epilepsy Patients Abstract: Epilepsy is a neurological issue set apart by abrupt intermittent scenes of tactile unsettling influence, loss of 69. cognizance, or seizures, related with unusual electrical movement in the mind. Seizures can impact any procedures in the directions of our mind, there is a transient perplexity, memory misfortune and lost awareness. Epilepsy has no 330-331 recognizable reason in about portion of those with the condition, the condition might be followed to different variables head injury, mind wounds, hereditary impact. Such injuries have ended up being not kidding and lethal much of the time, to maintain a strategic distance from such full of feeling mishaps, the reason for this undertaking is to propose a (model) gadget which will estimate the physiological changes in the human body before the repetitive scenes of seizures will be checked. The patient will be advised preceding the loss of cognizance and tangible unsettling influence. The gadget will detect the limit estimation of the customized physiological parameter, on the increase of this edge a caution or a notice will be gotten from the gadget, this will guarantee a conceivable recovery to a patient. Preventive measures to a patient can be taken to verify any unexpected incidental injury.

Keywords- Seizures; Sensor; Thresholdvalue; Rehabilitation.

References: 1. O'donoghue MF, Goodridge DM, Redhead K, Sander JW, Duncan JS. Assessing the psychosocial consequences of epilepsy: a community- based study. Br J Gen Pract. 1999 Mar 1;49(440):211-4. 2. Fairgrieve SD, Jackson M, Jonas P, Walshaw D, White K, Montgomery TL, Burn J, Lynch SA. Population based, prospective study of the care of women with epilepsy in pregnancy. Bmj. 2000 Sep 16;321(7262):674-5. 3. Nicoletti A, Sofia V, Biondi R, Fermo SL, Reggio E, Patti F, Reggio A. Epilepsy and multiple sclerosis in Sicily: a population‐based study. Epilepsia. 2003 Nov;44(11):1445-8. 4. Winkler AS, Kerschbaumsteiner K, Stelzhammer B, Meindl M, Kaaya J, Schmutzhard E. Prevalence, incidence, and clinical characteristics of epilepsy—A community‐based door‐to‐door study in northern Tanzania. Epilepsia. 2009 Oct;50(10):2310-3. 5. Chang YT, Chen PC, Tsai IJ, Sung FC, Chin ZN, Kuo HT, Tsai CH, Chou IC. Bidirectional relation between schizophrenia and epilepsy: a population‐based retrospective cohort study. Epilepsia. 2011 Nov;52(11):2036-42. 6. Oka E, Ohtsuka Y, Yoshinaga H, Murakami N, Kobayashi K, Ogino T. Prevalence of childhood epilepsy and distribution of epileptic syndromes: a population‐based survey in Okayama, Japan. Epilepsia. 2006 Mar;47(3):626-30. 7. Qin P, Xu H, Laursen TM, Vestergaard M, Mortensen PB. Risk for schizophrenia and schizophrenia-like psychosis among patients with epilepsy: population based cohort study. Bmj. 2005 Jun 30;331(7507):23. 8. Berg AT, Langfitt JT, Testa FM, Levy SR, DiMario F, Westerveld M, Kulas J. Global cognitive function in children with epilepsy: a community‐based study. Epilepsia. 2008 Apr;49(4):608-14. 9. Koponen A, Seppälä U, Eriksson K, Nieminen P, Uutela A, Sillanpää M, Hyvärinen L, Kälviäinen R. Social Functioning and Psychological Well‐Being of 347 Young Adults with Epilepsy Only—Population‐Based, Controlled Study from Finland. Epilepsia. 2007 May;48(5):907-12. 10. Lim LL, Foldvary N, Mascha E, Lee J. Acetazolamide in women with catamenial epilepsy. Epilepsia. 2001 Jun;42(6):746-9 Authors: F.Emerson Solomon, R.Kishore Kanna, Vasukidevi Ramachandran, S.Geetha Paper Title: Technical Access in Blood Glucose Detection using ANN Abstract: Early re-affirmation of patients builds the expense of human services and it exceptionally impacts the notoriety of the clinic. Discovering readmission in essential stage, enables the clinics to give extraordinary consideration for those patients, and after that can lessen the rate of readmission. In this work build up another model utilizing profound learning. It is the correlation technique between AI and profound learning. Typically, Logistic relapse is utilized for all sort of expectation. Be that as it may, as per this information fake neural system model in profound learning give promising outcome than strategic relapse.

Keywords: Artificial neural network, Multilayer perception, Logistic Regression 70. References: 1. Ramesh, S., Caytiles, R. D., &Iyengar, N. C. S. (2017). A Deep Learning Approach to Identify Diabetes. ADV SCI Technology Letter, 332-335 145,44-49 2. Safavian, S. R., &Landgrebe, D. (1991). A survey of decision tree classifier methodology. IEEE transactions on systems, man, and cybernetics, 21(3),660-674. 3. Chan, J. C. W., &Paelinckx, D. (2008). Evaluation of Random Forest and Adaboost tree-based ensemble classification and spectral band selection for ecotopemapping using airborne hyperspectral imagery. REMOTE SENS ENVIRON, 112(6),2999-3011. 4. Pearce, J., & Ferrier, S. (2000). Evaluating the predictive performance of habitat models developed using logistic regression. ECOL MODEL, 133(3),225-245. 5. Mogensen, C. E., & Christensen, C. K. (1984). Predicting diabetic nephropathy in insulin-dependent patients. NEW ENGL J MED, 311(2),89-93. 6. Kansagara, D., Englander, H., Salanitro, A., Kagen, D., Theobald, C., Freeman, M., &Kripalani, S. (2011). Risk prediction models for hospital readmission: a systematic review. Jama, 306(15),1688-1698. Authors: T.Manoj Prasath, R.Kishore Kanna, R.Vasuki Paper Title: Development in Nimbus Mattress Abstract: The Nimbus proficient framework is a definitive weight redistribution sleeping cushion in the Nimbus run ,offering propelled dynamic treatment and all out patient administration though couldn't care less situations. Exchanging weight surfaces have been appeared to diminish the episodes of weight bruises contrasted and standard emergency clinic bedding and weight decreasing surfaces. This has been created by new therapeutic gadget directions and is demonstrated for the treatment of patients with all evaluations of weight bruises and for counteractive action in patients who are at extremely high danger of creating weight injuries. A propelled sleeping cushion supplanting framework with 71. exchanging weight redistribution. The radiance framework consolidates programmed alterations of cell weights.

Keywords: Bedding , Regulator Air Cells ,Pressure Redistribution.. 336-337

References: 1. DiBenedetto RJ, Nguyen AV. Weight Redistribution: an appreciated resurgence and a request for alert. Chest 2008; 111:1482– 3. 2. Keith RL, Pierson DJ. Entanglements of air cells. Abedside approach. Clin Chest Med 2009;17:439– 51. 3. Herlich A. Complexities from verifying the troublesome aviation route. Int Anesthesiol Clan 2009;35:13– 30.. 4. Jokic R, Zintel T, Sridhar G, Gallagher CG, Fitzpatrick MF. nimbuss bedding reactions to head way and leg way in relatives of patients with the weight hypoventilation disorder. Thorax 2009; 55: 940-5. 5. Teichtahl H. The heftiness hypoventilation disorder returned to. Chest 2010;120:336-9. 72. Authors: R.Kishore Kanna, Prasath Alias Surendher, T.Manoj Prasath, F.Emerson Solomon Paper Title: Technical Research on Skin Deficiencies using Medical Image Processing Applications Abstract: Dermatology is a noteworthy field of prescription which manages the investigation and treatment of skin issue. Regardless of being normal, deciding a specific skin issue is hard for ordinary individuals and requires expansive learning and skill in the region. Some skin malady may cause serious medical issues while others blur away in days normally. Henceforth, acknowledgment of skin rashes and other issue at the most punctual is pivotal. This venture concerns the advancement of a portable application to identify the sort of skin issue. The application works by accepting pictures of influenced skin as client input and predicts the sort of confusion. The application utilizes a blend of picture preparing, neural systems, and AI to process, learn and anticipate skin issue with more prominent precision.

Keywords: Machine Learning, Neural networks, Skin diseases, Android development.

References: 1. Md. Ashiqur Rahman, Nova Ahmed and RahatYasir,Dermatological Disease Detection using Image Processing and Artificial Neural Network”8th International Conference on Electrical and Computer Engineering, Dhaka, Bangladesh, December 2014, pp. 687-690. 338-339 2. Adnan Firoze, Hong Yan, M. Ashraful Amin, M. GolamKibria, and M. ShamsulArifin, ''Dermatological Disease Diagnosis using Colour- skin Images'', Proceedings of the 2012 International Conference on Machine Learning and Cybernetics Xian, July, 2012, pp.1675-1680. 3. Adriana Albuand Delia-Maria Filimon,“ Skin Diseases Diagnosis Using Artificial Neural Networks’’,9th IEEE International Symposium on Applied Computational Intelligence and Informatics, Timisoara, Romania, May 2014, pp. 187-191. 4. Shervan F. E, Mohammad S, Farshad T, An Innovative Skin Detection Approach Using Color Based Image Retrieval Technique, Int. J. Multimed. Its Appl. 4 (2012) 9. doi:10.5121/ijma.2012.4305. 5. Muhammad Z. A, Asghar Mj, Sheikh S, Shakeel A, Diagnosis of Skin Diseases using Online Expert System, International Journal of Computer Science and Information Security, June 2011 6. Damilola A. O, Olidayo O. O, Soloman A. O, Automating skin disease diagnosis using image classification, Published in Proceedings of the World Congress on Engineering and Computer Science 2013 Vol II WCECS 2013, 23-25 October, 2013, San Francisco, USA 7. Teck T. T, Li Z, Ming J, , An intelligent decision support system for skin cancer detection from dermoscopic images in 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) 8. Florence T,Ernest M, Fred N. K, An image-based diagnosis of virus and bacterial skin infections, International Conference on Computing and ICT Research,2011 Authors: M.Padma Lalitha, Pasala Gopi, K.Omkar Paper Title: A PV Module Integrated Converter for Enhanced Perfomance in Standalone and DC Microgrid Applications Abstract: The aim of these design toward plot and execute greatest power point following (MPPT) that makes utilize of a fluffy rationale control algorithm. Fluffy rationale, via using dealing with nonlinearities, gives a regular controller used for this form of utilization. The technique likewise income by the heuristic way to deal with the problem that beats the intricacy in demonstrating nonlinear frameworks. Therefore as to perform this objective, MPPT model comprising of a PV module, a DC-DC converter, and a fluffy rationale controller become created. Examination of buck, converter as well as buck-support converter attributes changed into done within an effort on the way to distinguish the most appropriate topology. An incorporated copy of the PV module along with the distinguished converter became reproduced also the effects worn to determine the grasp studying predicted near devise also music the fluffy rationale regulator. The regulator changed into veiled the same as an ongoing control application and the MPPT finished via a dc- dc converter constrained by means of a microcontroller. These results in progressed productiveness in favor of the hobby of a photovoltaic strength framework considering battery may be accurately charged and applied in the course of times of low sunlight based radiation. The better productiveness is relied upon to set off essential value funding funds over the long haul. The well known price is saved low through choosing segments that take into account executing the capacities requiring little to no effort. Reenactment outcomes demonstrate the high estimation of the element coordinated converter for DC unbiased and microgrid packages. A 400 W model changed into completed by 0.14 Euro/W. Testing established efficiencies over 95% thinking about every misfortunes from have an effect on trade, fuzzy logic MPPT, and estimation and manage hardware.

Keywords: Boost converter, fuzzy logic most extreme power point following (DMPPT), microgrid, and module 73. coordinated converter (MIC), photovoltaics (PV), control analyzer, control quality, sun based irradiance, exchanging recurrence tweak (SFM). 340-346

References: 1. Karami, N; Moubayed, N; Outbib, R. General review and classification of different MPPT Techniques. Renew. Sustain. Energy Rev. 2017, 68, 1–18. 2. Mohapatra, A.; Nayak, B.; Das, P.; Mohanty, K.B. A review on MPPT techniques of PV system under partial shading condition. Renew. Sustain. Energy Rev. 2017, 80, 854–867. 3. Bianconi, E.; Calvente, J.; Giral, R.; Mamarelis, E.; Petrone, G.; Ramos, C.A.; Spagnuolo, G.; Vitelli, M. Perturb and Observe MPPT algorithm with a current controller based on the sliding mode. Int. J. Electr. Power 2013, 44, 346–356. 4. Chen, M.; Ma, S.; Wu, J.; Huang, L. Analysis of MPPT Failure and Development of an Augmented Nonlinear Controller for MPPT of Photovoltaic Systems under Partial Shading Conditions. Appl. Sci. 2017, 7, 95. 5. Kwan, T.H.; Wu, X. High performance P&O based lock-on mechanism MPPT algorithm with smooth tracking. Sol. Energy 2017, 155, 816–828. 6. Alik, R.; Jusoh, A. Modified Perturb and Observe (P&O) with checking algorithm under various solar irradiation. Sol. Energy 2017, 148, 128–139. 7. Bounechba, H.; Bouzid, A.; Snani, A.; Lashab, A. Real time simulation of MPPT algorithms for PV energy system. Int. J. Electr. Power 2016, 83, 67–78. 8. Huang, Y.P.; Hsu, S.Y. A performance evaluation model of a high concentration photovoltaic module with a fractional open circuit voltage-based maximum power point tracking algorithm. Comput. Electr. Eng. 2016, 51, 331–342. 9. Cortajarena, J.A.; Barambones, O.; Alkorta, P.; De Marcos, J. Sliding mode control of grid-tied single-phase inverter in a photovoltaic MPPT application. Sol. Energy 2017, 155, 793–804. 10. Tobón, A.; Peláez-Restrepo, J.; Villegas-Ceballos, J.P.; Serna-Garcés, S.I.; Herrera, J.; Ibeas, A. Maximum Power Point Tracking of Photovoltaic Panels by Using Improved Pattern Search Methods. Energies 2017, 10, 1316. 11. Loukriz, A.; Haddadi, M.; Messalti, S. Simulation and experimental design of a new advanced variable step size Incremental Conductance MPPT algorithm for PV systems. ISA Trans. 2016, 62, 30–38. 12. Mellit, A.; Rezzouk, H.; Messai, A.; Medjahed, B. FPGA-based real time implementation of MPPT-controller for photovoltaic systems. Renew. Energy 2011, 36, 1652–1661 13. 13. Ramalu, T.; Mohd Radzi, M.A.; Mohd Zainuri, M.A.A.; Abdul Wahab, N.I.; Abdul Rahman, R.Z. A Photovoltaic-Based SEPIC Converter with Dual-Fuzzy Maximum Power Point Tracking for Optimal Buck and Boost Operations. Energies 2016, 9, 604 14. Hassan, S.Z.; Li, H.; Kamal, T.; Arifo˘glu, U.; Mumtaz, S.; Khan, L. Neuro-Fuzzy Wavelet Based Adaptive MPPT Algorithm for Photovoltaic Systems. Energies 2017, 10, 394. 15. Nabipour, M.; Razaz, M.; Seifossadat, S.; Mortazavi, S. A new MPPT scheme based on a novel fuzzy approach. Renew. Sustain. Energy Rev. 2017, 74, 1147–1169. 16. Bendib, B.; Krim, F.; Belmili, H.; Almi, M.F.; Boulouma, S. Advanced Fuzzy MPPT Controller for a Stand-alone PV System. Energy Procedia 2014, 50, 383–392. 17. Belaidi, R.; Haddouche, A.; Fathi, M.; Larafi, M.M.; Kaci, G.M. Performance of grid-connected PV system based on SAPF for power quality improvement. In Proceedings of the International Renewable and Sustainable Energy Conference (IRSEC), Marrakech, Morocco, 14–17 November 2016; pp. 1–4. 18. Chekired, F.; Larbes, C.; Rekioua, D.; Haddad, F. Implementation of a MPPT fuzzy controller for photovoltaic systems on FPGA circuit. Energy Procedia 2011, 6, 541–549 Authors: Giri Prasad.A, PoonamUpadhyay, M Suryakalavathi, Meghana.P Paper Title: Assessment of SF6 and N2 Gas Mixtures as a Dielectric Medium in a Gas Insulated Busduct Abstract: SF6 gas is used as a dielectric medium in Gas Insulated Systems; it has an excellent dielectric strength and high arc quenching property. Despite of having these properties SF6 gas has high GWP, thus it is required to reduce the usage of the gas. In this paper SF6 and N2 gas mixtures were used as an alternate to the SF6 gas. The movement of free moving metallic particles present in a GIB has been analyzed for both the pure SF6 gas and by using various percentages of N2 gas and SF6 gas as an insulating medium.

Keywords: GIS, GWP, gas mixture, metallic particle.

References: 1. CIGRE guide for SF6 gas mixtures 74. 2. L.G.Christophorou, J.K.Olthoff, R.J.Van Brunt, “SF6/N2 mixtures, basic and HV Insulation properties”, IEEE Transactions, Dielectrics and Electrical Insulation 2 (5), October 1995, pp 952-1002. 3. Xingwen Li, Hu Zhao, Anthony Bruce Murphy“SF6-alternative gases for application in gas-insulated switchgear”,J. Phys. D: Appl. Phys. 347-350 51 (2018) 153001 4. Adriana Romero, Levente Rácz, Attila Mátrai, TamásBokor, Richárd Cselkó, “A Review of Sulfur-hexafluoride Reduction byDielectric Coatings and Alternative Gases”. 5. Sayed A.Ward, “Assessment of optimum SF6-Air, SF6-N2, SF6-Co2 According to particle contamination sensitivity”, IEEE conference on Electrical Insulation and Dielectric Phenomenon 1999, pp.415-418. 6. Poonam Upadhyay, J. Amarnath, Pravin Upadhyay “Movement of Metallic Particle in Coated and Uncoated SF6/N2 Gas Mixture GIB” , 2008 IEEE Region 10 Colloquium and the Third ICIIS, Kharagpur, India. 7. Sylvio Kosse, Paul Gregor Nikolic, Guenter Kachelriess,“Holistic evaluation of the performance of today’s SF6 alternatives proposals”, CIRED, Open Access Proc. J., 2017, Vol. 2017, Iss. 1, pp. 210–213 8. Anis.H and K.D.Srivastava, 1989, “Breakdown characteristic of dielectric coated electrodes in SF6 gas with particle contamination”, sixth Intl symposium on HVE, New Orleans, LA, USA, paper No.32-06. 9. Swarnalatha.Nattava, J.Amaranath, “Random Movement of particle trajectories in a gas insulated bus duct” in International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Iss 12, Dec 2013 Authors: Intayos, Hutsayaporn, Netpradit, Napawan, Samutachak, Bhubate Paper Title: Causal Model of Customer Intention to using Anti-Aging Business in Thailand Abstract: This conceptual paper explores the causal relationships among the components of the customer relationship management and proposes a causal model using the theory of planned behavior. The context of investigation is the anti- aging business which is expected to be growing in response to the increasing trend of aging society in Thailand. The data collection is design for the online platform, disseminating the questionnaire through social media. The total sample is 500. The causal relationship will be investigated using structural equation model.

Keywords: Anti-aging business, customer intention, customer relationship management, theory of planned behavior.

References: 1. P. Pramote. (April 2013). Population aging and health: a case study of Thailand. The RGJ-PhD Congress XIV 5th April 2013. IPSR Publication No.416: Mahidol University, [Online]. pp. 15. Available: http://www.ipsr.mahidol.ac.th/ipsrbeta/FileUpload/PDF/Report-File- 418.pdf. 75. 2. M. Wannarak. (Sep 2016). Social Care System for Elderly, [Online]. pp. 1-2. Available: http://kb.hsri.or.th/dspace/handle/11228/4424 19 Sep 2016. 3. Foundation of Thai Gerontology Research and Development Institute. (2017). Bangkok: Amarin Printing & Publishing Public Company 351-354 Limited, [Online]. pp. 25-26. Available: https://www.m-society.go.th/article_attach/16057/19114.pdf. 4. A. Payne and P. Frow. (October 2005). A strategic Framework for Customer Relationship Management. Journal of Marketing, [Online]. 69(4). pp. 167-176. Available: http://www.jstor.org/stable/30166559. 5. I. Ajzen. (1991). The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, [Online]. 50. pp. 179–211. Available: https://www.sciencedirect.com/science/article/pii/074959789190020T. 6. S.-M. Tseng and P.-H. Wu. (2014). The impact of customer knowledge and customer relationship management on service quality. International Journal of Quality and Service Sciences, [Online]. 6(1). pp. 77-96. Available: https://www.emeraldinsight.com/doi/abs/10.1108/IJQSS-08-2012-0014. 7. D. Peppers, M. Rogers and B. Dorf (February 1999). Is your company ready for one-to-one marketing. Harvard Business Review, [Online]. 77(1). pp. 151-160. Available: https://hbr.org/1999/01/is-your-company-ready-for-one-to-one-marketing. 8. L. Ryals and S. Knox. (2001). Cross-functional issues in the implementation of relationship marketing through customer relationship management. European Management Journal, [Online]. 19(5). pp. 534-542. Available: https://www.sciencedirect.com/science/article/pii/S0263237301000676. 9. C. Padmavathy, M.S. Balaji, and V.J. Sivakumar. (2012). Measuring effectiveness of customer relationship management in Indian retail banks. International Journal of Bank Marketing, [Online]. 30(4), pp. 246-266. Available: https://www.emeraldinsight.com/doi/pdfplus/10.1108/02652321211236888. 10. A. Parvatiyar and J.N. Sheth. (2001). Customer relationship management: emerging practice, process, and discipline. Journal of Economic and Social Research, [Online]. 32(2). pp. 1-34. Available: https://pdfs.semanticscholar.org/8bab/ae9ebc06722bcad209981f1b0a5600983526.pdf. 11. A. J. Silk. “Shortcut to Study the Harvard MBA Marketing [What is Marketing?]” (Tangchakanananon, P. and Makasiranon, W. Translator). Bangkok : expernetbooks. (2010). 12. W. Suharitdamrong, “Customer relationship management”, Industrial Technology Review., Vol. 108, pp. 150-153, 2003. 13. K. Madison, “Assessing customers relationship orientation for increasing effectiveness of firms marketing function,” Doctoral dissertation, University of Phoenix, 2014. 14. C.-L. Chen, “Conceptualising Customer Relationship Management and Its Impact on Customer Lifetime Value in the Taiwanese Banking Sector.” Doctor of Philosophy, De Montfort University, 2012. 15. S. A. B. M. A. Darzi. (2016). Customer relationship management: an approach to competitive advantage in the banking sector by exploring the mediational role of loyalty. International Journal of Bank Marketing, [Online]. 34(3), pp. 388-410. Available: http://www.emeraldinsight.com/doi/pdfplus/10.1108/IJBM-11-2014-0160. 16. J. Sansook, “Strategic Customer Relationship Management Capabilities and Market Performance: An Empirical Study of Private Hospitals in Thailand.” Doctor of Philosophy, Mahasarakham University, 2010. 17. J. S. Chen and R. K. H. Ching. (2004). An empirical study of the relationship of IT intensity and organizational absorptive capability on CRM performance. Journal of Global Information Management, [Online]. 12(1), pp.1-17. Available: https://pdfs.semanticscholar.org/c710/b7d106db0f77b7f3592eac05acec8cd32feb.pdf. 18. Z. Soltania and N. J. Navimipourb. (2016). Customer relationship management mechanisms: A systematic review of the state of the art literature and recommendations for future research. Computers in Human Behavior, 61, pp.667-688. Available: https://www.sciencedirect.com/science/article/pii/S0747563216301704. 19. A. Al-Swidi, S. M. R. Huque, M. H. Hafeez, and M. N. M. Sharif. (2014). The role of subjective norms in theory of planned behavior in the context of organic food consumption. British Food Journal, [Online]. 116(10), pp.1561-1580. Available: https://www.emeraldinsight.com/doi/pdfplus/10.1108/BFJ-05-2013-0105. 20. A. Arvola, M. Vassallo, M. Dean, P. Lampila, A. Saba, L. Lahteenmaki and R. Shepherd. (2008). Predicting intentions to purchase organic food: The role of affective and moral attitudes in the Theory of Planned Behaviour. Appetite, [Online]. 50, pp. 443–454. Available: https://www.sciencedirect.com/science/article/pii/S0195666307003728. 21. S. S. Alam and N. M. Sayuti. (2011). Applying the Theory of Planned Behavior (TPB) in halal food purchasing. International Journal of Commerce and Management, [Online]. 21(1), pp. 8-20, Available: http://www.emeraldinsight.com/doi/pdfplus/10.1108/10569211111111676. 22. A. R.-D. Liang. (2014). Enthusiastically consuming organic food: An analysis of the online organic food purchasing behaviors of consumers with different food-related lifestyles. Internet Research, [Online]. 24(5), pp. 587-607. Available: http://www.emeraldinsight.com/doi/pdfplus/10.1108/IntR-03-2013-0050. 23. M. Donahue, “Theory of Planned Behavior Analysis and Organic Food Consumption of American Consumers.” Doctoral dissertation, Walden University. 2017. 24. M. R. Jalilvand and N. Samiei. (2012). The impact of electronic word of mouth on a tourism destination choice: Testing the theory of planned behavior (TPB). Internet Research, [Online]. 22(5), pp. 591-612. Available: https://www.emeraldinsight.com/doi/pdfplus/10.1108/10662241211271563. [2017, December 9]. 25. S. G. Reddy, V. K. York and L. A. Brannon. (2010). Travel for treatment: students' perspective on medical tourism. International Journal of Tourism Research, [Online]. 12, pp. 510-522. Available: https://onlinelibrary.wiley.com/doi/pdf/10.1002/jtr.769. 26. A. L. Comrey and H. B. Lee, A first Course in Factor Analysis. Hillsdale, New Jersey: Erlbaum, 1992, pp. 133 27. Population and Housing Census in Thailand. Important demographic indicators table. [Online]. Available: http://popcensus.nso.go.th/quick_stat.php?yr=2543&rg=1. 28. T.J. Gaiserc and A. E. Schreiner, Research Standards and Ethical Consideration. In A Guide to Conducting Online Research. SAGE Publications Asia-Pacific Pte Ltd, Singapore, 2009, pp. 25-35. 29. B. K. Kaye and T. J. Johnson. Research Methodology: Taming the Cyber Frontier Techniques for Improving Online Surveys. Social Science Computer Review, 1999, 17(3), pp. 323-337. Authors: R. Puviarasi, A. Greeshma Paper Title: Design and Implementation of Modernised Dental Chair using Voice Recognition Control Circuit Abstract: Generally, in hospitals the dental chair can be operated forward/backward or upward/downward according to the treatment for the patients which is operated by human. Sometimes the chair will not function properly due to piston rust and over weighted patient and the dentist may have pain in the legs due to continuous operation of the chair. To overcome these issues, planning to design a voice recognition dental chair for the doctors in hospitals. This project describes the design of a smart, motorized, voice controlled dental chair. The voice command is given by the dentist/human, sensor recognizes the voice and sends the command to the Arduino. This voice command is converted to string and it is responsible for movement of chair. The intelligent dental chair is designed in such a way that it can be controlled easily by the doctor and has an advantage is the low cost design. This system was designed and developed to avoid wasting the energy and time of the doctor.

Index Terms — Voice recognition, Arduino, Bluetooth module, ultra-sonic sensor, Pressure gauge, Pneumatic Cylinder, Solenoid Valve, Relay. 76. References: 355-357 1. Smart Electronic Wheelchair Using Arduino and Bluetooth Module. Deepak Kumar Lodhi, PrakshiVats, Addala Varun, Prashant Solanki, Ritakshi Gupta, Manoj Kumar Pandey, Rajat Butola, IJCSMC, Vol. 5, Issue. 5, May 2016. 2. Design of Voice Controlled Smart Wheelchair. Ali A. Abed (MIEEE), International Journal of Computer Applications, December2015. 3. Voice Controlled Wheelchair using Arduino. Apsana.S, Renjitha G Nair, IARJSET, August 2016. 4. Voice Controlled WheelChair Using Arduino. Kharka Bahadur Rai, Jeetendra Thakur, Nirmal Rai, IJSTM, June 2015. 5. Voice Controlled Wheelchair Using AVR, Prof. D.S. Nikam, Joshi Gauri, Shinde Mohini, Tajanpure Mohini, Wani Monika, IJMTER, 2014. 6. Voice based Wheelchair for Physically Challenged. Ravi Teja Ch. V, P. Shekar, S. Hari Prasad Reddy, S. Roja, Y. Bhargavi, IJNIET, March 2015. 7. Designing and Modeling of Voice Controlled Wheel Chair Incorporated with Home Automation. Anoop.K. J, Inbaezhilan, Satish raj, Ramaseenivasan, CholaPandian, IJAREEIE, April 2014. 8. Voice Operated Wheelchair for physically challenged People., Smita U. Upase, A. K. Joshi, IJASET, August 2016. 9. Voice controlled Autonomous Wheelchair. Krishna Pal Tiwari, Mr Kranti Kumar Dewangan, IJSR, April 2015. 10. Design and Development of Smart Wheelchair using Voice Recognition and Head Gesture Control System. Srishti1, Prateeksha Jain, Shalu, Swati Singh, IJAREEIE, May 2015. 11. Voice controlled intelligent wheel chair. Takeshi saitoh, conference paper, October 2014. 12. Wheel chair using Voice Recognition Systems for Paraplegics. Angel Mercy.T, Jeshua Linu. J, IJARET, April - June 2017. 13. Low cost Self-Assistive Voice controlled Technology for Disabled People. R. Puviarasi, Mritha Ramalingam, Elanchezhian Chinnavan, IJMER, Jul.-Aug. 2013. 14. Touchpad and Voice Command Based Wheelchair 1Dipanjali P. Panchal, 2Priya B. Parmar, 3Nidhi S. Ganasva, 2017 IJEDR. 15. A Voice Controlled Wheel Chair Prototype for a Medically Challenged. Rahul Agarwal1, Akram Siddiqui2, Kuvendra Singh3, Arjun Solanki4, Lavit Gautam5, IJETT April 2016. 16. Voice Operated Wheel Chair. Jayesh K. Kokate1, A. M. Agarkar2, IJRET Feb 2014. Authors: P.Haritha, R.Puviarasi Identification of Malicious Nodes & Paths to Reduce Packet Loss in Mobile ADHOC Network with NS2 Paper Title: Simulator Abstract: System security assumes a vital job in this MANET and the customary method for ensuring the systems through firewalls and encryption programming is never again powerful and adequate. So as to give extra security to the MANET, interruption location components ought to be included. In this paper, particular affirmation is utilized for distinguishing vindictive hubs in the specially appointed system. NS2 is utilized to recreate and assess the proposed plan and look at it against the AACK. The acquired outcomes demonstrate that the specific affirmation conspire outflanks AACK as far as system bundle conveyance proportion and directing overhead. Portable Ad-hoc Network is an impermanent system made out of versatile hubs, associated by remote connections, without settled infrastructure. This 77. paper proposes a novel component considered specific affirmation for taking care of issues that emerge with Adaptive Acknowledgment (AACK). Points of interest in this paper are security is expanded and can enhance the execution of the 358-360 system.

Keywords: AODV, MANET, Malicious node, Security.

References: 1. A. Abdullah Al-khatib and A. Waleedz Hammood, Mobile and Defending Systems: Comparison Study, 6th vol. International Journal of Electronics and Information Engineering, 2017. 2. Lin Zhang, Xiao Song, Yunjie Wu, Theory, Methodology, Tools and Applications for Modeling and Simulation of Complex Systems, Springer, 2016. Authors: V.Janani R. Puviarasi Mritha Ramalingam, S.R.Boselin Prabhu Paper Title: Research and Design Voice Control Camera using Raspberry PI Abstract: Today we are building a valuable venture in which we can control the LED lights utilizing our voice through Smart Phone. In this undertaking, we will send voice directions from Smart Phone to Raspberry Pi utilizing Bluetooth Module and Raspberry Pi will get that transmitted flag remotely and will perform separate assignment over the equipment. We can supplant the LEDs with the AC home machines utilizing transfers and can fabricate a Voice Controlled Home Automation Project. This paper basically worried about the programmed voice control of light or some other home machines. It is utilized to spare the electric power and human vitality. This task is made with assistance of Raspberry Pi 3 and Relay driver circuit. The different machines are associated with the transfer circuit and the mouthpiece associated with Raspberry Pi 3. After fruitful acknowledgment of voice direction the Raspberry Pi 3 drives the comparing machines. Voice acknowledgment is created by utilizing Google API's.

78. Keywords: IOT, motor drive, raspberry pi, camera, bylnk app, power supply 361-363 References: 1. Victor, H. (2014) Android's Google Play Beats App Store with over 1 Million Apps, Now Officially Largest. 2. Llamas, R., et al. (2015) Smartphone OS Market Share, 2015 Q2. IDC Report August 2015. http://www.idc.com/prodserv/smartphone-os- market-share.jsp 3. Warren, C. (2014) Android 4.1.1 Devices Are Vulnerable to Heartbleed. 4. Chauhan, J.G. and Modi, P.S. (2015) A Novel Approach to Real Time Health Monitoring System. Journal of Multidisciplinary Research Studies, 1, 78-80. 5. Wu, L.F. and Du, X.J. (2014) Security Threats to Mobile Multimedia Applications: Camera-Based Attacks on Mobile Phones. IEEE Communications Magazine, 81, 80-87. 6. Park, J.-K. and Choi, S.-Y. (2015) Studying Security Weaknesses of Android System. International Journal of Securityand Its Applications, 9, 7-12. 7. Hidayatul Nur Binti Hasim, Mritha Ramalingam, Ferda Ernawan, Puviarasi .R, “Developing fish feeder system using Raspberry Pi”. 3rd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB17) Authors: R. Puviarasi, M. Mageshwaran, Mritha Ramalingam, S.R.Boselin Prabhu Paper Title: An Experimental Research on GPS Based Boundary Intruding Boat Monitoring System Abstract: Boundary detection and alert system is a straightforward and effective idea, which utilizes Internet of Things technology. By utilizing this framework border monitoring is 100% protected and secure. It naturally alarms the intruder when the vehicle goes over the specific range in borders. This is finished by a sensor called Global positioning system (GPS). It detects the current position of the vehicle and switch on the caution framework naturally. In this anticipate, no need of manual operations like on time and off time setting. GPS and IoT are the fundamental segments of 79. the task. The resistances of the alert system changes as per the distance between the current position of the vehicle and the border get decreased or increased. 364-367

Index Terms: GPS, IoT, networking, c programing

References: 1. Balaji, V., Vivekanadan, M., Anaga Suba Raja, S.: Location based system using gps-fishermen sms alert system. In: NCET, 4. 2319-8753, 152–157 (2015) 2. Mahesh, S., Karthik Eshwar E.: Design of maritime boundary identification system and fishermen patrol system. In: IEEE, 3. 916-1503, 1- 4 (2014) 3. Yuvaraj, E., Arunvijay, D.: Design of border alert system for fishermen using gps. In: IJSRT, 2. 2321-2543, 67-70 (2014) 4. Manoharan, N.: Indias Maritime Neighborhood: Issues and Option - Sri Lankan Case. In: IJECT, 6. 2121-2653, 1-5 (2014) 5. Montgomery, D.R.: International Fisheries Enforcement Management Using Wide Swath SAR. In: JHATD, 21. 503-951, 105-112 (2011) 6. Ranjith, S., Shreyas, Pradeep Kumar, K., Karthik, R.: Automatic Border Alert System for Fishermen using GPS and GSM Techniques. In: Indonesian Journal of Electrical Engineering and Computer Science, Vol. 7, pp. 84 – 89 (2017) 7. Sivaramaganesh, M., Ramya, M., Gowtham, V., Bharathi, T., Jeevitha, G.: Implementation of Maritime Border Alert System. In: International journal of innovative research in electrical, electronics, instrumentation and control engineering, Vol. 2 (2014) 8. Reynolds, J.C., Denaro, R.P., Kalafus, R.M.: GPS-based vessel position monitoring and display system. In: IEEE Aerospace and Electronic Systems Magazine (1990). Authors: Damodar Magdum, Maloji Suman Paper Title: System for Identifying and Correcting Invalid Words in the Devanagari Script for Text to Speech Engine Abstract: The Text To Speech (TTS) system takes text as an input and generates speech as an output. If input text is incorrect then overall quality of speech output may degrade. The main aim of the proposed system is to provide correct input text to the TTS. The system takes Unicode word as an input, identifies invalid word and corrects it by inserting, deleting or updating characters of the word. In this system, the State Machine is used to identify and correct invalid word in the Devanagari script which in turn is based on rules. Rules are developed for converting character to input symbol. Actions and States are identified for State Machine. Finally, the state transition table is developed for validation and correction of word. Using this system, incorrect words of the Devanagari script can be corrected to valid words (word contains all the valid Devanagari syllables) based on Devanagari script grammar. Since, all Devanagari characters are not present in Hindi language; this system will correct these non-Hindi characters to Hindi.

Keywords: Text to Speech, Unicode words, State Machine, State transition table, Devanagari Script.

References: 80. 1. BIS.INDIAN SCRIPT CODE FOR INFORMATION INTERCHANGE (ISCII), 1991. 2. Bhalerao R,Satput P, Mechnism for identifying invalid syllables in devnagari script, United States Patent Application Publication,2011 368-373 3. Text to Speech Testing Strategy Version 2.1, Technology Development for Indian Languages Programme(Govt of India), 2004. 4. Bisht R,“A Survey of Applications of Finite Automata in Natural Language Processing,” International Journal on Emerging Technologies, 2017, 62-64. 5. Rahul S, Soma P,“A rule based approach for automatic clause boundary detection and classification in Hindi,”2014. 6. Omkar K,“Modern Hindi Grammar. Indian Institute of Language Studies,” 2009. 7. Script Grammer for Hindi Language Technology Development for Indian Languages (TDIL) Programme, Goverment of India, 2019. 8. Anil Kumar S,“A computational phonetic model for Indian language scripts. In Constraints on Spelling Changes,” Fifth International Workshop on Writing Systems, 2006. 9. Anand R,Tanuja S, Sathish P, Santhosh Y, Mohit B, Kishore.P, Alan B,“Text Processing for Text-to-Speech Systems in Indian Languages,” Proceedings of 6th ISCA Speech Synthesis Workshop SSW6, Bonn, Germany, 2007. 10. https://en.wikipedia.org/wiki/Speech_synthesis 11. https://www.cdac.in/index.aspx?id=mlc_gist_speechtech, 2019 12. http://www.unicode.org/charts/PDF/U0900.pdf, 2019. 13. https://en.wikipedia.org/wiki/Turing_machine 14. https://en.wikipedia.org/wiki/Finite-state_machine 15. https://techwelkin.com/tools/character-map/ Authors: Smile Manuel J, Anatha Narayanan V, Sethumadhavan M Paper Title: LoPT : LoRa Penetration Testing Tool Abstract: The advent of Wireless technologies and IOT are currently ruling the modern world. Everything is going to become Things in future. As the technology progresses , the security of those technologies must also progress with an steady rate. Security tools which will help us to analyze these advanced security enhancements and protocols implemented. In this study , we are going to implement new security tool which concentrates on penetration testing of one such IOT protocol. This tool concentrates on the protocol named LoRa used for wireless long range communication in IOT. The proposed tool will explore all the possible attacks on LoRa protocol which we will see about in detail in the upcoming sections. LoPT is a new penetration testing tool which will work on LoRa (Long Range),a wireless standard used for long range low power communication on IOT devices primarily. This newly bloomed flower performs an effective domination on the field of IOT. Currently there is no existing penetration testing tool for LoRa. Though LoRa has its inbuilt security , there are major vulnerabilities which can be explored . This tool is built primarily on the concept of There’s no such thing as 100 81. Keywords: LoRa , Pentest Tool for LoRa , LoRa Attack tool, LoRa vulnerabilities explorer. 374-379

References: 1. A. O¨ st, “Evaluating lora and wifi jamming,” 2018. 2. T. C. Do¨nmez and E. Nigussie, “Security of lorawan v1. 1 in back- ward compatibility scenarios,” Procedia computer science, vol. 134, pp. 51–58, 2018. 3. R. Miller, “Lora the explorer–attacking and defending lora systems,” in Information Security Conference–SyScan360, 2016. 4. X. Yang, “Lorawan: Vulnerability analysis and practical exploitation,” Delft University of Technology, 2017. 5. J. Puthenkovilakam, “Malicious attack detection and prevention in ad hoc network based on real time operating system environment,” 6. E. Aras, G. S. Ramachandran, P. Lawrence, and D. Hughes, “Ex- ploring the security vulnerabilities of lora,” in 2017 3rd IEEE In- ternational Conference on Cybernetics (CYBCONF), pp. 1–6, IEEE, 2017. 7. I. Butun, N. Pereira, and M. Gidlund, “Analysis of lorawan v1. 1 security,” in Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects, p. 5, ACM, 2018. 8. E. Aras, N. Small, G. S. Ramachandran, S. Delbruel, W. Joosen, and D. Hughes, “Selective jamming of lorawan using commodity hardware,” in Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 363–372, ACM, 2017. 9. A. M. Nambiar, A. Vijayan, and A. Nandakumar, “Wireless intrusion detection based on different clustering approaches,” in Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, p. 42, ACM, 2010. 10. S. M. Danish, A. Nasir, H. K. Qureshi, A. B. Ashfaq, S. Mumtaz, and J. Rodriguez, “Network intrusion detection system for jamming attack in lorawan join procedure,” in 2018 IEEE International Conference on Communications (ICC), pp. 1–6, IEEE, 2018. Authors: Anshul Vyas, Leena Nadkar, Seema Shah Paper Title: Critical Connection of Blockchain Development Platforms Abstract: Blockchain has gained immense popularity with success of . Blockchain is no longer just limited to financial sector but it has expanded its horizons far beyond it. Today innumerous Blockchain Applications are being developed and so have Blockchain Development Platforms advanced. Blockchain still being a naive technology there is excellent scope for further research in Blockchain. With these advancements, new Blockchain Development Platforms are being introduced and existing ones are rapidly modifying its features. This paper aims at comparing existing popular Blockchain Development platforms in detail with help of certain parameters to provide an aide to Blockchain Developers to choose an appropriate platform for Blockchain Development.

Index Terms: Blockchain, Development Platforms, Blockchain as a service, Corda, Ethereum, Hyperledger,Multichain, Quorum

References: 1. Satoshi Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System”,2008 2. Chinmay Saraf and Siddharth Sabadra, “Blockchain Platforms : A Compendium”, International Conference on Innovative Research and Development, IEEE, May 2018 3. M.Macdonald, L. Liu- Thorrold and R.Julien, “The Blockchain : A Comparison of Platforms and Their Uses Beyond Bitcoin”, 2017 4. Ben Wald and Bill Brock, “The innovator’s guide to picking the right Blockchain”, VERY, 2017 5. Tong Wu,Xiubo Liang, "Exploration and Practice of Inter Banking Application based on Blockchain",IEEE 12th International conference on Computer Science & Education, August 2017 82. 6. Maxim Amelchenko, Shlomi Dole, and Ben Gurion, "Blockchain Abbreviation implemented by message passing & shared memory", IEEE, 2017 7. Masashi Sato and Shin’ichiro Matsuo, “Long-term public blockchain: Resilience against compromise of Underlying Cryptography”,2nd 380-385 IEEE European Symposium on Security and Privacy Workshops, EuroS and PW., 2017 8. Suporn Pongnumukul et.al., “Performance Analysis of Private Blockchain Platforms in Varying Workloads”, 2017 26th International Conference on Computer Communications and Networks, ICCCN., 2017 9. Ingo Weber et.al., “On Availability of Blockchain-Based Systems”, Proceedings of the IEEE Symposium on Reliable Distributed Systems.,2017 10. Harish Sukhwani et.al., “Performance Modelling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric)”,Proceedings of the IEEE Symposium on Reliable Distributed Systems.,2017 11. Ashiq Anjum, Manu Sporny and Alan Sill, “Blockchain Standards for Compliance and Trust”,IEEE Cloud Computing., August 2017,vol. 4, pp. 84-90. 12. 12. Ning Zhou, Menghan Wu and Jianxin Zhou, “Volunteer Service Time Record System Based on Blockchain Technology ”,Proceedings of 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference, IAEAC, 2017 13. Henry Kim and Marek Laskowski, “A Perspective on Blockchain Smart Contracts”, Computer Communication and Networks (ICCCN), 2017 26th International Conference.,September 2017 14. 14. Haneffa Muchlis Gazali et.al., “Re-inventing PTPTN Study Loan With Blockchain and Smart Contracts”,Information Technology (ICIT), 2017 8th International Conference, October 2017 15. Heng Hou, “The Application of Blockchain Technology in E-government in China”,Computer Communication and Networks (ICCCN), 2017 26th International Conference, September 2017 16. Darra L.Hofman, “Legally Speaking: Smart Contracts, Archival Bonds, and Linked Data in the Blockchain”, Computer Communication and Networks (ICCCN), 2017 26th International Conference, August 2017 17. Imran Bashir, Mastering Blockchain, Packt, March 2017 18. Narayan Prusty, Building Blockchain Projects, Packt, April 2017 19. Deepak K.Tosh et.al., “Consensus Protocols for Blockchain based Data Provenance: Challenges & Opportunities”, Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), 2017 IEEE 8th Annual., January 2018,pp. 469-474. 20. Muhamed Turkanovic et.al, “EduCTX : A blockchain based higher education credit platform”, IEEE, 2017 Authors: Deivanai Gurusamy, Tucha Kedir Elemo Paper Title: Direct-Cloud, Multi-Cloud, and Connected-Cloud – Terminologies Make a Move in Cloud Computing Abstract: Cloud computing is constantly evolving with innovations. So, the cloud service providers are investing big in finding solutions for the challenges confronted by the business organizations in the ever-changing technological world. However, still, there is a little reluctance among the organizations to ultimately adopt the public cloud because the mission-critical applications and the mission-critical data require high-level security and availability which are questionable in the equally growing hacking technology. The 's comfort zone is Internet, and the Internet is the primary medium for communication between enterprises and cloud service providers. So, the cloud service providers come up with a solution called Direct-Cloud which bypasses the internet and establishes a private connection between the enterprise and cloud service provider. The primary objective of this paper is to familiarize the terminology direct- cloud as it makes a massive move in Cloud Computing. So, this paper presents a study that describes direct-cloud, its 83. architecture, benefits, the comparison between different direct-cloud solutions and the guidelines to choose a suitable direct-cloud solution. Also, the terminologies Multi-Cloud and Connected-Cloud are gaining attention among the 386-393 enterprises to meet the growing needs of the business. Hence the paper further explores the direct-cloud deployment in the multi-cloud and connected-cloud environment.

Keywords: Direct-Cloud, Multi-Cloud, Connected- Cloud, Private Connection, Cloud Service Provider, Public Cloud, Private Cloud

References: 1. Gururaj R, Mohsin I, Farrukh A K, A Comprehensive Survey on Security in Cloud Computing, Procedia Computer Science, Elsevier, 2017, 465–472. 2. Velumadhava R, Selvaman K, Data Security Challenges and its Solutions in Cloud Computing, International Conference on Intelligent Computing, Communication & Convergence, Procedia Computer Science, Elsevier, 2015 204 – 209. 3. Direct Cloud Access, https://www.cisco.com/c/en/us/td/ docs/ios-xml/ios/pfrv3/configuration/xe-16-8/pfrv3-xe-16-8-book/pfrv3-dca.pdf. 4. Gartner, A Better way to Reach the Cloud, https://www.gartner.com/imagesrv/media-products/pdf/GTT/gtt-communications-1- 3LUAOET.pdf, issue 1, 2016. 5. Get Started with IBM Cloud Direct Link, https://www.ibm.com/cloud/direct-link, last updated: 2019/02/26. 6. AWS Direct Connect, https://aws.amazon.com/ directconnect, last accessed 2019/03/10 7. AWS Direct Connect, https://docs.aws.amazon.com/aws-technical- content/latest/aws-vpc-connectivity-options/aws-direct-connect- network-to-amazon.html, last accessed 2019/03/10 8. Google Cloud Hybrid Connectivity, https://cloud.google.com/hybrid-connectivity/ Last updated: 2019/02/26. 9. ExpressRoute, https://docs.microsoft.com/en-us/azure/ expressroute/expressroute-routing, 2019, last accessed 2019/03/10. 10. Dedicated Cloud Access, https://www.colt.net/product/ dedicated-cloud-access, 2018, last accessed 2019/03/10. 11. Effortless direct-to-cloud backup and recovery for the overstretched IT team and distributed workforce, Arcserve UDP Cloud Direct, arcserve.com, White Paper. 12. Mission-Critical Applications in the Cloud, the 5 Things Every Enterprise must consider, www.xteritycloud.ie/ Xterity_Enterprise_CloudEbook.pdf. 13. Xterity Cloud Drives Competitive Advantage, Expands Services, and Reduces OPEX for Irish Financial Service Company, www.xteritycloud.ie/Xterity-Cloud-Services-ICE-Cube-Case-Study-v01112015.pdf. 14. Xterity Cloud Services ensures global education Fitness Company’s uptime, access, availability, (2015) www.xteritycloud.ie/ Xterity- Cloud-Services-Fitpro-Case-Study-v01112015.pdf. 15. Wholesale Managed Dedicated Compute Cloud Services, (2016), www.xteritycloud.ie/Wholesale-Managed-Dedicated-Compute /Datasheet_01_28_16.pdf. 16. Making the Transition from MSP to CSP, www.xteritycloud.ie/ MSP-to-CSP_ebook.pdf. 17. Making the Transition from MSP to CSP with Wholesale Clouds, www.xteritycloud.ie/ MSP_VAR_to_CSP_Wholesale.pdf. 18. Direct Cloud Connect, https://corporate.viewqwest.com/ products/direct-cloud-connect.html, last accessed 2019/03/10. 19. Digital transformation is key, and it all gets unlocked in the cloud, https://www.clouddirect.net/why-move-to-cloud, last accessed 2019/03/10. 20. Zenlayer, Cloud Direct Connect: What is it, and why is it important? https://www.zenlayer.com/cloud-direct-connect, July 31, 2017, last accessed 2019/03/15. 21. The Aspera Direct-to-Cloud transport, https://asperasoft.com/cloud/direct-to-cloud-technology, last accessed 2019/03/10. 22. Cloud Computing, http://www.directnetworksinc.com/cloud/cloud-computing, last accessed 2019/03/10. 23. Friction-Free Connectivity Services supporting your Cloud computing, https://www.epsilontel.com/solutions/direct-cloud-connect, 2019. 24. Connect to the cloud, https://www.alaskacommunications.com/Business/Products/Data-Networking/Direct-Cloud-Service. 25. Connect to the Cloud from your device, https://www.kyoceradocumentsolutions.co.uk/index/document_solutions/mobile_cloud/Cloud_Direct.html. 26. Michael Desorcie, Direct to Cloud: Getting Started, https://kb.datto.com/hc/en-us/articles/360001005506-Direct-to-Cloud-Getting-Started, last updated: 2019/02/21. 27. Cloud computing, From Wikipedia, the free encyclopedia, last accessed 2019/03/10. 28. Google Cloud Connect, From Wikipedia, the free encyclopedia, last accessed 2019/03/10. 29. Multi-Cloud, From Wikipedia, the free encyclopedia, last edited on 18 February 2019. 30. What-is-multi-cloud, https://www.sdxcentral.com/cloud/multi-cloud/definitions/what-is-multi-cloud 31. Access the benefits of AWS cloud solutions through a private connection, https://www.flexential.com/ connectivity/cloud-connect- through-aws-direct-connect, last accessed 2019/03/10. 32. Kevinoid, Direct cloud-to-cloud copy? https://forum.rclone.org/t/direct-cloud-to-cloud-copy/7219, Oct. 2018, last accessed 2019/02/20. 33. Six future trends involving cloud, https://channeldailynews.com/blog/6-future-trends-involving-cloud, last accessed 2019/03/10. 34. Why Cloud Direct? https://www.clouddirect.net/ company/why-cloud-direct, last accessed 2019/03/10 35. Hybrid Cloud Trends in 2019, https://www.wowrack.com/ blog/hybrid-cloud-trends-2019, last accessed 2019/03/10. 36. Cinia cMatrix - Direct connection to public cloud services, https://www.cinia.fi/en/services/connectivity-services/direct-public-cloud- connection.html, last accessed 2019/03/10. 37. Vangie Beal, Cloud Computing explained https://www.webopedia.com/quick_ref/cloud_computing.asp, updated June 2014. 38. Robust Cloud Infrastructure within a Flexible Architecture, https://www.cloudconnect.net/infrastructure, last accessed 2019/03/10. 39. Cloud Connect, https://www.interxion.com/products/ interconnection/cloud-connect, last accessed 2019/03/10. 40. Cloud Connect, https://www.is.co.za/solution/cloud-connect, last accessed 2019/03/10. 41. Cloud Connect, https://ssetelecoms.com/products/cloud-connect, last accessed 2019/03/10. 42. Interview: Thoughts on the Connected Cloud, http://prodea.com/2018/05/24/interview-thoughts-connected-cloud-%E2%80%8E/, 2018/05/24. 43. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf. 44. Debra Prentice, Market Development DirectorPros&Cons of Public, Private, or Hybrid Cloud, https://www.arrowsolutionsgroup.com/blog/pros-cons-public-private-hybrid-cloud, last accessed 2019/03/10. 45. https://azure.microsoft.com/en-us/overview/what-are-private-public-hybrid-clouds, last accessed 2019/03/10 46. https://www.cisco.com/c/en/us/solutions/cloud/hybrid-cloud/cloud-adoption-rates.html, last accessed 2019/03/10. 47. Mohammed Majeed, Cloud Adoption is Accelerating – Where Do You Stand? https://blog.externetworks.com/cloud-adoption-is- accelerating-where-do-you-stand, last accessed 2019/03/10. 48. Achieving Business Agility in Hybrid Cloud with AWS Direct Connect, https://aws.amazon.com/blogs/apn/ achieving-business-agility-in- hybrid-cloud–with-aws-direct-connect, last updated 2019/02/20. 49. www.digitimes.com/news/a20190327PD200.html, last accessed 2019/03/10. 50. Elaina Arce, Multi-Cloud, Hybrid Cloud, and Cloud Spend – Statistics on Cloud Computing, https://www.business2community.com/cloud-computing/multi-cloud-hybrid-cloud-and-cloud-spend-statistics-on-cloud-computing- 02121233, last accessed 2019/03/10. 51. Veritis, Cloud Technology Market Performance 2018: Public and Multi-Clouds Take Lead, https://www.veritis.com/blog/cloud- technology-market-performance-2018-public-and-multi-clouds-take-lead/, last accessed 2019/03/10. 52. William B. Norton, Console, Chief Scientist, https://www.caida.org/workshops/wie/1612/slides/wie1612_wnorton.pdf, White Paper, 2016. 53. Larry Dignan, Top cloud providers 2019, https://www.zdnet.com/article/top-cloud-providers-2019-aws-microsoft-azure-google-cloud- ibm-makes-hybrid-move-salesforce-dominates-saas, last accessed 2019/03/10. 54. Paul Hertzfeldt, Cloud Direct Link: Built for Enterprise Cloud,https://www.ibm.com/blogs/bluemix/2018/07/digital-realty-ibm-cloud- direct-link-expand-network. 55. Alison DeNisco Rayome, Why 86% of enterprises employ a multi-cloud strategy and how it impacts business, https://www.techrepublic.com/article/why-86-of-enterprises-employ-a-multi-cloud-strategy-and-how-it-impacts-business/ 56. Chaitanya Atreya, Forbes Councils, A Closer Look At Hybrid-Cloud And Multi-Cloud Approaches, https://www.forbes.com/sites/forbestechcouncil/2018/11/26/a-closer-look-at-hybrid-cloud-and-multi-cloud-approaches/#3055c3125841, last accessed 2019/03/10. Authors: K. Karthik, R.Mayildurai, S. Karthikeyan A Research on Pre-Monsoon and Post-Monsoon Physico-Chemical Parameters of Groundwater of Paper Title: Velliangadu Village, Coimbatore, Tamilnadu, India 84. Abstract: Groundwater quality plays an important role in conservation of water resources not only for the present generation but also for the future generation. Each and every harvest season witness excessive use of pesticides and 394-396 fertilizers in the agricultural fields. During a monsoon season these potential hazards leaches into the soil and mixes with the groundwater. This paper aimed at studying the Physico – chemical parameters of pre- and post-monsoon groundwater quality of Velliangadu Village of Coimbatore district in the state of Tamil Nadu to reveal the water quality parameters before and after a monsoon season. The Physico-chemical parameters considered for drinking water like pH, electrical conductivity, total dissolved solids, total alkalinity, total hardness, dissolved oxygen, chlorides etc. were analysed for pre-monsoon and post-monsoon groundwater samples collected from different areas and compared.

Keywords: Post monsoon, pre monsoon, Velliangadu, Water quality

References: 1. Kondraju, T. T.; Rajan, K. S, ISPRS Ann. Photogramm. Remote Sens. Spatial Inf. Sci., 2019, IV-3/W1, 17-23. 2. Yadav, S.; Rao, S. Environmental Biotechnology For Soil and Wastewater Implications on Ecosystems. Springer, Singapore 2019 3. Rao, K.N.; Latha, P.S., Arab J Geosci 2019, 12, 267. 4. Sachin, M.; Dhanesh, T.; Anurag, O.; Ashwani Kumar A., Groundwater for Sustainable Development 2019, 100230 5. https://www.google.com/maps 6. APHA, Standard methods for the examination of water and waste water, American Public Health Association, Washington, 1989 7. W.H.O, Guidelines for drinking water quality, Vol.1, Recommendations WHO,Geneva, 1984. 8. IS: 10500 : 2012, Indian standard drinking water – specification (Second revision). Bureau of Indian Standards (BIS), New Delhi, India. 2015 9. ICMR. Manual standards of quality of drinking water supplies. 1975. Authors: R.Varadaraju, J.Srinivasan Paper Title: Optimisation of Process Parameters in Kenaf/Polypropylene Composites in Connection Moulding Abstract: Renewable natural fibres like kenaf can be used to produce composites as replacement to plastic boards in household and industrial applications. The objective of this study is to optimise the process parameters for compression moulding of kenaf polypropylene composite to get maximum tensile, flexural and impact strength values for three different blend ratios. Three levels of temperature (160oC, 180oC and 200 oC), compression pressure (7, 9 and 11 Mpa) and time of application (10,20 and 30 min ) for producing kenaf/ polypropylene blend ratios of 50:50, 65:35 and 80:20 have been used. The samples were produced through carding for web formation, needle punching for non woven making and finally in compression moulding machine for boards making. All the composite boards were analysed for tensile, flexural and impact strength. The tensile and flexural strengths have positive correlations with time and temperature and contact pressure in all the blend ratios kenaf / polypropylene. The impact strength has positive correlation with time, temperature whereas it has negative correlation with contact pressure in all the blend ratios. The highest tensile strength and flexural strength is achieved with 65:35 kenaf / polypropylene blend at 200 o C temperature, 11Mpa pressure and 10 minutes duration in compression moulding machine. The highest Impact strength is achieved with 80:20 blends at 180 o C, 7 Mpa pressure and 30 minutes duration. The tensile and flexural strength is the highest at the blend ratio of 65:35 whereas the Impact strength increases with the increase kenaf content up to 80%.

Keywords: tensile strength, flexural strength, impact strength, temperature, pressure, time, natural fibre.

References: 1. AK Mohanty, MA Khan, S Sahoo, G Hinrichsen, “Effect of chemical modification on the performance of biodegradable jute yarn-Biopol composites,”Journal of Material Science, vol.35 (10), pp.2589–2595, 2000 2. Y Cao, Y Wu, “Evaluation of statistical strength of bamboo fibre and mechanical properties of fibre reinforced green composites,”Journal of Central South University of Technology, vol.15:564–567, 2008 3. BH Lee, HJ Kim, WR Yu, “Fabrication of long and discontinuous natural fiber reinforced polypropylene bio composites and their mechanical properties,”Fibers Polymers, vol.10 (1):83–90, 2009 4. X Li, LG Tabil, S Panigrahi, “Chemical treatments of natural fiber for use in natural fiber-reinforced composites: a review,”Journal of 85. Polymer and the Environment, vol.15 (1):25–33, 2007 5. G Mehta, AK Mohanty, K Thayer, M Misra, LT Drzal, “Novel bio composites sheet molding compounds for low cost housing panel 397-403 applications,”Journal of Polymer and the Environment, vol.13 (2):169–75, 2005 6. GM Zakriya, G Ramakrishnan, “Insulation and mechanical properties of jute and hollow conjugated polyester reinforced nonwoven composite,”Energy and Buildings vol.158, pp.1544-1552,2018 7. A Mustafa, MF Bin Abdollah, FF Shuhimi, N Ismail, H Amiruddin, N Umehara, “Selection and verification of kenaf fibres as an alternative friction material using Weighted Decision Matrix method,”Material Design, vol.67:577–82, 2015 8. G Zakriya, G.M., Ramakrishnan, “Jute fiber reinforced polymeric composites in moulded furniture making,”Journal of Advanced Research in Dynamical and Control Systems vol. 9(16),pp1272-1278,2018 9. GM Zakriya, G Ramakrishnan, “Jute and hollow conjugated polyester composites for outdoor & indoor insulation applications,”Journal of Natural Fibers, vol, 12(3), pp.1-14 2017 10. N Reddy, QR Jiang, YQ Yang, “Biocompatible natural silk fibers from Argema mittrei,”Journal of Bio based Materials and Bio energy, vol.6 (5), pp.558–63, 2012 11. M Zhan, RP Wool, “Mechanical properties of chicken feather fibers,”Polymer Composites, vol.32 (6), pp.937–44, 2011 12. B Madsen, H Lilholt, “Physical and mechanical properties of unidirectional plant fibre composites – an evaluation of the influence of porosity,”Composites Science and Technology, vol.63 (9), pp.1265–1272, 2003 13. FL Matthews, RD, “Rawlings. Composite materials: engineering and science,”Cambridge, England: Wood head publishing,1999. 14. Nando GB, Gupta BR, “Short fibre-thermoplastic elastomer composites,”In: DeSK, White JR, editors. Short fibre-polymer composites, Cambridge, England: Wood head publishing, pp. 84–115, 1996 15. PA Sreekumar, K Joseph, G Unnikrishnan, S Thomas, “A comparative study on mechanical properties of sisal-leaf fibre-reinforced polyester composites prepared by resin transfer and compression moulding techniques,”Composites Science and Technology, vol.67 (3–4), pp.453–61, 2007 16. LU Devi, SS Bhagawan, S.Thomas, “Mechanical properties of pineapple leaf fiber-reinforced polyester composites,”Journal of Applied Polymer Science, vol.64 (9), pp.1739–1748, 1997 17. J Holbery, D Houston, “Natural-fiber-reinforced polymer composites in automotive applications,”Journal of the Minerals, Metals and Materials Society, vol.58(11), pp.80–86,2006 18. J Summerscales, NPJ Dissanayake, AS Virk, W. A Hall, “ Review of bast fibres and their composites,”Part 1 – fibres as reinforcements, Composites Part A, vol.41 (10), pp.1329–1335, 2010 19. P Chen, C Lu, Q Yu, Y Gao, J Li, X Li, “ Influence of fiber wettability on the interfacial adhesion of continuous fiber-reinforced PPESK composite,” Journal of Applied Polymer Science, vol.102 (3), pp.2544–2551, 2006 20. XF Wu, YA.Dzenis, “Droplet on a fiber: geometrical shape and contact angle.Acta Mechanica,” 185(3–4), pp.215–25, 2006 21. AR Sanadi, DF Caulfield, Jacobson RE, “Agro-fiber thermoplastic composites,”In: Paper and composites from agro-based resources. Boca Raton, FL: CRC press, pp. 377–401, 1997 22. P Heidi, M Bo, J Roberts, N Kalle, “The influence of bio composite processing and composition on natural fiber length, dispersion and orientation,”Journal of Material Science and Engineering- A, vol.1 (2), pp.190–198, 2011 23. IB Amor, H Rekik, H Kaddami, M Raihane, M Arous, A.Kallel, Effect of Palm tree fiber orientation on electrical properties of palm tree fiber-reinforced polyester composites,”Journal of Composites Materials, vol.44 (13), pp.1553–68, 2010 24. PJ Herrera-Franco, A Valadez-Gonzalez, “A study of the mechanical properties of short natural-fiber reinforced composites,”Composites Part B, vol.36 (8), pp.597–608, 2005 25. DA Norman, RE Robertson, “The effect of fiber orientation on the toughening of short fiber-reinforced polymers,”Journal of Applied Polymer Science, vol.90 (10), pp.2740–2751, 2003 26. B Baghaei, M Skrifvars, M Salehi, T Bashir, M Rissanen,P Nousiainen, “Novel aligned hemp fibre reinforcement for structural bio composites: porosity, water absorption, mechanical performances and visco elastic behaviour,”Composites Part A, vol.61), pp.1–12, 2014 27. M-P Ho, H Wang, J-H Lee, C-K Ho, K-T Lau, J Leng, et al, “Critical factors on manufacturing processes of natural fibre composites,”Composites Part B, vol.43 (8), pp.3549–3562, 2012 28. E Bodros, I Pillin, N Montrelay, C Baley, “Could biopolymers reinforced by randomly scattered flax fibre be used in structural applications? ,” Composite Science and Technology, vol.67 (3), pp.462–470, 2007 29. L Jiang, G Hinrichsen, “Flax and cotton fiber reinforced biodegradable polyester amide composites, 1 – manufacture of composites and characterization of their mechanical properties,” Angewandte Makromolekulare Chemie, vol.268, pp.13–17,1999 30. K Van de Velde, P Kiekens, “Effect of material and process parameters on the mechanical properties of unidirectional and multidirectional flax/polypropylene composites,”Composite Structures, vol.62 (3–4), pp.443–448, 2003 31. A Hao, H Zhao, JY Chen, “ Kenaf/polypropylene nonwoven composites: the influence of manufacturing conditions on mechanical, thermal, and acoustical performance,”Composites Part B,vol. 54, pp.44-51,2013 Authors: S. Vallikala, V. Geetha., V. Jalaja Jayalakshmi Research on The Impact of Childhood Coping Strategies in Academics and Adolescence Lives of Students Paper Title: using Data Mining Abstract: The role of a counsellor in educational institutions revolves mostly around academic and behavioural issues. The aim of this study is to identify common sources of stress among adolescence students and to determine the impact of coping strategies practised by the students in academics and life in general. The association between adolescent life, geographical location, stress sources, and coping strategies is explored in this work. Diverse factors contribute to stress, agitation and academic performanceamong students. The major factors that were considered for this study are regional and familial backgrounds of the students, their gender, residential status, communication skills, the five childhood coping strategies and their influence in the campus life. Counselling sessions were conducted for the students and the empirical data is classified using data mining techniques to analyze the factors that contribute to the behavioural aspects of the students.

Keywords: Academic, Behavioural, Adolescent, Coping strategies, Counselling, Data Mining

References: 1. Vallikala, S,Vijilesh, V,Priyadarshini, R, “Establishing Counselling Services in Academic Institutions: An Experiential 86. Sketch”,International Journal of Pure and Applied Mathematics, Volume 119, No. 17, 2018, 2253-2261. 2. Nikita Gorad, IshaniZalte, Aishwarya, Nandi and DeepaliNayak, “Career Counselling using DataMining”, International Journal of 404-408 Innovative Research in Computer and Communication Engineering, Volume 5, Issue 4, April 2017. 3. Elakia, Gayathri, Aarthi, Naren J, “Application of Data Mining in Educational Database for Predicting Behavioural Patterns of the Students”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4649-4652. 4. Compas BE, Connor- Smith JK, Saltzman H , Thomsen AH, Wadsworth ME (2001),“Coping with stress during childhood and adolescence problems, progress, and potential in theory and research”, Psychol Bull 127: 87-127. 5. Ebata AT, Moos RH (1991),“Coping and adjustment in distressed and healthy adolescents”, Appl Dev Psychol 12: 33-54. 6. Seiffge – Krenke I (2013),“Stress, coping, and relationships in adolescence”, Psychology Press. 7. Spirito, A., Stark, L.J., Grace, N., Stamoulis, D (1991), “Common problems in coping strategies reported in childhood and early adolescence”. J. Youth Adolescence 20: 531-534. 8. WF Cornell, “Life script theory: A critical review from a developmental perspective”, Transactional Analysis Journal,1988, Taylor& Francis. 9. Zimmer- Gemback, MJ and Skinner, EA, (2011) “The development of coping across childhood and adolescence: An integrative review and critique of research”, International Journal of Behavioral Development, 35(1), 1–17. 10. Fields, L and Prinz, RJ, “Coping and adjustment during childhood and adolescence”, Clinical Psychology Review, Volume 17, Issue 8, December 1997, Pages 937-976. 11. Cummings, E. M., Greene, A. L., and Karraker, K. H. (1991). “Life-span developmental psychology: Perspectives on stress and coping”, Hillsdale, NJ, US: Lawrence Erlbaum Associates, Inc. 12. Hargaden, H, Sills, C, (2002) “Transactional Analysis: A relational perspective”, Brunner – Routledge, UK.

Authors: Ramkumar A, Akhil Krishna U, Madhan M S, Prajit K K Paper Title: Control of Nao Robot Arm using Myo Armband Abstract: Life becomes less complex, resourceful and very educative thanks to the use of smart devices like the Myo armband and Nao robots. This work discusses about the use of Myo Armband which is a wireless device for interacting with other devices such as computer, robots. It uses myographic sensor signals to control the robot. This involves developing a digital control interface to control the robot with the help of Myo Gesture Control Armband System. A PC loaded with OS acts as a control unit. It interfaces the inputs of the Myo band to control the Nao robot, thereby we can control the movement of the Nao robot by using its interactions. In this case we use Nao, an educational robot. PyoConnect is a Linux alternative to MyoConnect a scripting software for programming the Myo band in Windows. 87. The Pyoconnect software is used to connect the Myo with the Ubuntu operating system. NAOqi is a programming framework used to program the NAO. By importing the NAOqi module in the python script we can access the different 409-413 functions of the Nao robot. Nao robot which supports network communication protocols are Ethernet and Wi-Fi. The interface between Nao and Myo is achieved through IP (Internet Protocol). Based on the hand gestures recorded by Myo armband, the Nao Robot Arm’s can be controlled.

Index Terms: NAO, MYO, NAOqi, Pyoconnect, Myoconnect, Linux, PythonScript, Ethernet Protocol.

References: 1. A. Doswald, “Using biosignals to control the Nao robot by,” no. January, 2013. 2. A. Ganiev and K. Lee, “Study on Virtual Control of a Robotic Arm via a Myo Armband for the Self- Manipulation of a Hand Amputee,” vol. 11, no. 2, pp. 775–782, 2016. 3. C. Lagrand, M. Van Der Meer, and A. Visser, “Ros Nao Tutorial Simulation & Real robots,” 2016. 4. G. D. Morais, L. C. Neves, A. A. Masiero, and M. C. F. Castro, “Application of Myo Armband System to Control a Robot Interface,” vol. 4, no. Biostec, pp. 227–231, 2016. 5. P. U. Murillo, “Individual Robotic Arms Manipulator Control Employing Electromyographic Signals Acquired by Myo Armbands,” vol. 11, no. 23, pp. 11241–11249, 2016. 6. P. Sarjana and M. Ii, “ROBOTIC SYSTEM DESIGN CONTROL BY USING ARMBAND SENSOR “.This Report Is Submitted In Fulfillment Of Requirement For The Bachelor Degree of Electronic Engineering (Computer Engineering) Faculty of Electronic And Computer Engineering University Technical Malaysia Malacca June 2015 ii,” no. June, 2015. 7. “An SSVEP based BCI to control a humanoid robot by using portable EEG device.”published in Engineering in Medicine and Biology Society,2013 . 8. “Using Myo to control Robots: 5 Examples” by Gadget Junkie – April 16. 9. A. Robotics, “Using nao : Introdution to interactive humanoid robots.” 20 10. Application of Myo Armband System to Control a Robot InterfaceGabriel Doretto Morais, Leonardo C. Neves, Andrey A. Masiero and Maria Claudia F. Castro Centro Universit´ario da FEI, Av. Humberto Alencar Castelo Branco 3972, S˜ao Bernardo do Campo, Brazil 11. Simultaneous Control and Human Feedback in the Training of a Robotic Agent with Actor-Critic Reinforcement Learning Kory Mathewson and Patrick M. Pilarski ,Departments of Computing Science and Medicine,University of Alberta, Edmonton, Alberta, Canada,[korym, pilarski] @ ualberta.ca 12. Controlling a Robot Using a Wearable Device (MYO), 1Mithileysh Sathiyanarayanan, Tobias Mulling, Bushra Nazir,School of Computing, Engineering and Mathematics,University of Brighton, United Kingdom 13. Premalatha J, Shanthi Vengadeshwari R, Veerendha A, “Optimization of transmission tower using Genetic Algorithm”, International Journal of Civil Engineering and Technology Volume 8, Issue 9, September 2017, pp. 654–662. 14. Shivappriya S N, Dhivyapraba R, Kalaiselvi A, Alagumeenakshi M, “Telemedicine Approach for Patient Monitoring System using IOT”, Research Journal of Engineering and Technology, 8(3): July-September

Authors: Bhaskar S, David Anson V Paper Title: A Research on Failure Mode and Effect Inquiry on Tea Leaves Processing - Leaf Shredder Machine Abstract: India is a large exporter of tea leaves and has industries involving in Tea Leaves processing. There are generally three stages in the processing of tea leaves and many machines are involved that cater to various process to convert the raw tea leaves to usable products. In the first stage there is a machine titled Leaf Shredder that is critical in the process as the entire process is a product based and a breakdown of this machine in particular affects the entire process from that point. This study focuses on the failure modes of the Leaf Shredder machine and its effect. The Total Quality Management (TQM) tool - Failure Mode and Effect Analysis (FMEA) is used in this study. The critical functional components of the Leaf Shredder are five in number. Through the study, data has been collected and the Risk Priority Number has been calculated. Based on the Risk Priority Number value it is seen that the Cutting Knife, Main Shaft and the Bearing are the components that are having a tendency to fail. The Reason of failure was analyzed. From the analysis it is seen that the main cause of failure is due to improper maintenance of the components and unbalancing of the cutting knife weight. A well thought of plan of action to maintain the Tea Leaf Shredder will bring down the failure rate and improve the reliability of the product layout.

Keywords: Leaf Shredder Machine, Failure Mode and Effect Analysis, Product Layout, Risk Priority Number, 88. Reliability. 414-416 References: 1. Xi-Ping Zhu et all ”A Quantitative Comprehensive Safety Evaluation Method for Centrifugal Compressors Using FMEA-fuzzy Operations” in 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA), 2013. 2. Hui Zhang et all “Advantage Analysis of FMEA Technique Based on EDA Simulation” 3. Hongzhe Shi et all “FMEA-Based Control Mechanism for Embedded Control Software” International Conference of Information Technology, Computer Engineering and Management Sciences, 2011. 4. Vivek A. Deshpande “Cause-and-Effect Diagram for a Teaching Learning Process (CEDTLP) – A Case Study” Industrial Engineering Journal, Volume-1 & Issue No. 2, August 2008, pp 41-42. 5. Sibel OZILGEN “Failure Mode and Effect Analysis (FMEA) for confectionery manufacturing in developing countries: Turkish delight production as a case study” http://dx.doi.org/10.1590/S0101-20612012005000083 - Ciênc. Tecnol. Aliment., Campinas, 32(3): 505-514, jul.-set. 2012. 6. Tejaskumar S. Parsana et al “A Case Study: A Process FMEA Tool to Enhance Quality and Efficiency of Manufacturing Industry” - Bonfring International Journal of Industrial Engineering and Management Science, Vol. 4, No. 3, August 2014 7. Shivani Sharma “A Case Study Of Risks Prioritization Using Fmea Method” - International Journal of Scientific and Research Publications, Volume 3, Issue 10, October 2013 8. RohitRavasahebShinde “Failure Mode Effect Analysis-Case Study for Bush Manufacturing process” - International Journal of Scientific Engineering and Applied Science (IJSEAS) - Volume-1, Issue-4, July 2015.

Authors: S.Ramanathan, S.Prabhu, R. S. Mohankumar, T.Suresh Paper Title: Research on Effects of Obstacles on Heat Transfer and Fluid Flow in Backward Facing Step Flow Abstract: An extensive research has been done on heat transfer and pressure drop characteristics in micro-channel using liquid water. A baffle has been introduced downstream the sudden expansion zone to enhance the rate of heat transfer. The height and the location of the baffle were varied for the Reynolds number range 50≤ Re ≤ 200, which is a laminar flow. Two-dimensional flow domain with non-staggered grid arrangement was taken and the two-dimensional mass, 89. momentum and energy equation was solved using finite volume method in ANSYS 16.2. This study reports that the presence of baffle in the micro-channel increased the rate of heat transfer. The skin friction coefficient has been 417-421 calculated and the parameters influencing the heat transfer augmentation have been optimized.

Key words — Heat transfer, Micro channels, Laminar flow, Skin friction coefficient

References: 1. A. S. Kherbeet, H. A. Mohammed, K. M. Munisamy, and B. H. Salman, “The effect of step height of microscale backward-facing step on mixed convection nanofluid flow and heat transfer characteristics,” Int. J. Heat Mass Transf., vol. 68, pp. 554–566, 2014. 2. H. E. Ahmed, A. S. Kherbeet, M. I. Ahmed, and B. H. Salman, “Heat transfer enhancement of micro-scale backward-facing step channel by using turbulators,” Int. J. Heat Mass Transf., vol. 126, pp. 963–973, 2018. 3. Q. Zhang and L. B. Wang, “Numerical study of heat transfer enhancement by rectangular winglet vortex generator pair in a channel,” Adv. Mech. Eng., vol. 8, no. 5, pp. 1–11, 2016. 4. S. Chakrabrti, S. Rao, and D. K. Mandal, “Numerical Simulation of the Performance of a Sudden Expansion With Fence Viewed as a Diffuser in Low Reynolds Number Regime,” J. Eng. Gas Turbines Power, vol. 132, no. 11, p. 114502, 2010. 5. H. H. Choi, V. T. Nguyen, and J. Nguyen, “Numerical Investigation of Backward Facing Step Flow over Various Step Angles,” Procedia Eng., vol. 154, no. 1983, pp. 420–425, 2016. 6. M. Thiruvengadam, B. F. Armaly, and J. A. Drallmeier, “Three dimensional mixed convection in plane symmetric-sudden expansion: Symmetric flow regime,” Int. J. Heat Mass Transf., vol. 52, no. 3–4, pp. 899–907, 2009. 7. R. Jayakumar, J. S. J, S. Prabhu, A. P. Arun, P. Karthi, and S. Ramanathan, "Numerical Heat Transfer Analysis in a Micro-Channel with a Baffle" “International conference on Automotive systems, Agricultural Equipments and Manufacturing (ICAAM 2017) ICAAM 2017 – Conference Proceedings,” no. Icaam, 2017. 8. P. Louda, J. Příhoda, K. Kozel, and P. Sváček, “Numerical simulation of flows over 2D and 3D backward-facing inclined steps,” Int. J. Heat Fluid Flow, vol. 43, pp. 268–276, 2013. 9. K. Sugawara, H. Yoshikawa, and T. Ota, “LES of Turbulent Separated Flow and Heat Transfer in a Symmetric Expansion Plane Channel,” J. Fluids Eng., vol. 127, no. 5, p. 865, 2005.

Authors: Devan P D, V.R. Muruganantham Paper Title: Determination of Natural Frequencies of Spur Gear in Portal Axle Gearbox Abstract: Portal axle is introduced to avoid damage of the vehicle bottom portion while it is running on off-road condition by providing additional ground clearance to the vehicle. Since the ground clearance is achieved through gear train arrangement, the operating frequency of the gear shouldn’t match with its natural frequency. This work aims to predict the natural frequencies and modes shapes of the gear train with three types of gear arrangements. The effect of natural frequency also studied with three different gear materials such as steel, CI and Al alloy. Gear trains are modeled in Solidworks 2017 and analyzed in well-known FEM software ANSYS workbench 16.0. First six natural frequencies and corresponding mode shapes are also obtained. FEM results are compared with operating frequency of the gear.

Keywords: ANSYS Workbench, FEM, Portal axle, Spur Gear, Modal Analysis

References: 1. Ooi J, Wang X, Tan C, Ho JH, Lim YP. Modal and stress analysis of gear train design in portal axle using finite element modeling and simulation. Journal of Mechanical Science and Technology. 2012 Feb 1;26(2):575-89. 90. 2. Mbarek A, Hammami A, Del Rincon AF, Chaari F, Rueda FV, Haddar M. Effect of load and meshing stiffness variation on modal properties of planetary gear. Applied Acoustics. 2017 Aug 18. 3. Saxena A, Chouksey M, Parey A. Effect of mesh stiffness of healthy and cracked gear tooth on modal and frequency response characteristics of 422-426 geared rotor system. Mechanism and Machine Theory. 2017 Jan 1;107:261-73. 4. Yesilyurt I, Gu F, Ball AD. Gear tooth stiffness reduction measurement using modal analysis and its use in wear fault severity assessment of spur gears. NDT & E International. 2003 Jul 1;36(5):357-72. 5. Weis P, Kučera Ľ, Pecháč P, Močilan M. Modal Analysis of Gearbox Housing with Applied Load. Procedia engineering. 2017 Jan 1;192:953-8. 6. Kumar A, Patil PP. Modal Analysis of Heavy Vehicle Truck Transmission Gearbox Housing Made From DifferentMaterials. Journal of Engineering Science and Technology. 2016 Feb 1;11(2):252-66. 7. Niu S. Modal Analysis of Cylindrical Gear Based on Finite Element Model. system.;2(1):3. 8. Vernekar K, Kumar H, Gangadharan KV. Gear fault detection using vibration analysis and continuous wavelet transform. Procedia Materials Science. 2014 Sep;5:1846-52. 9. Jaiswal A, Zakiuddin KS, Shukla VV. Fault Diagnosis of Gear by Vibration Analysis. International Journal of Latest Trends in Engineering and Technology (IJLTET). 2013 Sep;3(1):26-32. 10. Diwakar G, Satyanarayana MR, Kumar PR. Detection of Gear fault using vibration analysis. International Journal of Emerging Technology and Advanced Engineering, ISSN. 2012 Sep:2250-459. 11. Shahapurkar SS, Pansare HS, Dhebe PP, Wagh CS, Desale A. Detection of Fault in Gearbox System Using Vibration Analysis Method. 12. Devan PD, Senthilkumar KM, Arun KK. Investigation on Static Stress Analysis of Portal Axle Gearbox. International Journal of Applied Engineering Research. 2018;13(7):5244-50.

Authors: Karikalan R, Sreeharan B N, Akilan S, Rallish Rahuman Khan J Paper Title: Productivity Improvement using Lean Concept in Automotive Welding Fixture Manufacturing Industry Abstract: In today's global marketplace, especially the Own Equipment’s Manufacturer (OEM), manufacturing automotive components must be more competitive to compete with competitors, where production cost is an important concern. To increase the productivity and to decrease the production cost, lean thinking can be applied which in turn enables the company to survive in today’s competitive world and to have competitive edge. In one of the Automotive Welding Fixture Manufacturing industry, which manufactures Body in White (BIW), some of the problems were identified which reduces the productivity and increases the production cost. Even though trial and error methods based on the experience were used to address the above-mentioned problems, a systematic lean thinking if applied will produce more effective results. In this aspect, some of the lean tools viz. 4M, bin system and KANBAN system were applied in 91. this work to eliminate / reduce the implications of these problems. By implementing these lean concepts, the welding fixture manufacturing company saves around 33 hours approximately per week which inturn produces a profit of around 427-431 Rs. 20,960/- per week.

Keywords: Lean thinking, productivity improvement, welding fixtures, KANBAN, Bin system, 4M.

References: 1. S. Alphonse and G. A. Williamson, "Novel radar signal models using nonlinear frequency modulation," 2014 22nd European Signal Processing Conference (EUSIPCO), Lisbon, 2014, pp. 1024-1028. 2. F.E. Nathanson, J.P. Reilly, and M.N. Cohen, Radar Design Principles: Signal Processing and the Environment, SciTech Publishing, Inc., 2006 3. J. Saeedi and K. Faez, “Synthetic aperture radar imaging using non-linear frequency modulation signal, “ in IEEE Transactions on Aerospace and Electronic Systems, vol.52, no.1, pp.99-110, February 2016. 4. T. Collins and P. Atkins, “Non-linear frequency modulation chirps for active sonar, “in IEEE proceedings Radar, Sonar and Navigation, vol.146, no.6, pp.312-316, Dec 1999. 5. S. Boukeffa, Y. Jiang and T. Jiang, “Side-lobe reduction with non-linear frequency modulated waveforms,” in Proc. Of the IEEE CSPA Conference, pp.399-403, 2011. 6. I. C. Vizitiu, F. Enache and F. Popescu, "Sidelobe reduction in pulse-compression radar using the stationary phase technique: An extended comparative study," 2014 International Conference on Optimization of Electrical and Electronic Equipment (OPTIM), Bran, 2014, pp. 898- 901. 7. I. Vizitiu, L. Anton, F. Popescu and G. Iubu, "The synthesis of some NLFM laws using the stationary phase principle," 2012 10th International Symposium on Electronics and Telecommunications, Timisoara, 2012, pp. 377-380. 8. Y.K.Chan, M.Y.Chua and V.C.KOO, “Side-lobe reduction using simple two and tri-stage non-linear frequency modulation (NLFM),” Progress in Electromagnetic Research, Vol.98, 33-52, 2009. Aza Badurdeen, Lean Manufacturing Basics, 2007 9. Carr M, Jeffrey. (2005). Value stream mapping of a rubber products manufacturer. 10. Cheng Wong, Yu & Yew Wong, Kuan & Ali, Anwar. (2009). A Study on Lean Manufacturing Implementation in the Malaysian Electrical and Electronics Industry. European Journal of Scientific Research. 38(4). 11. Hudli Mohd Rameez, K. H. Inamdar – Areas of Lean Manufacturing for Productivity Improvement in a Manufacturing Unit, World Academy of Science, Engineering and Technology 45(2010) 12. Jones, D.T., Womack, J.P., and Roos, D. (1991) The machine that changed the world: The story of lean production, Harper Perennial, New York. 13. Kazuhiro Yamashita (2004) Implementation Of Lean Manufacturing Process To Xyz Company In Minneapolis Area 14. Madhubala Rauniyar (2007) Value Stream Mapping at XYZ Company 15. Narasimhan, R., Swink, M., & Kim, S.W. (2006). Disentangling leanness and agility: An empirical Investigation. Journal of Operations Management, 24, pp. 440-457. 16. Taleghani M (2010), “Key factors for implementing the lean manufacturing system,” Science (80-.)., vol. 6, no. 7, pp. 287–291. 17. Tice J, Ahouse L, and Larson T, “Lean production and EMSs: Aligning environmental management with business priorities,” Environ. Qual. Manag., vol. 15, no. 2, pp. 1–12, 2005. 18. William Dettmer, H. (2008). Beyond Lean Manufacturing: Combining Lean and the Theory of Constraints for Higher Performance. Authors: Sumathi.V.P, Vidyasagr V, Vanitha.V Paper Title: Asynchronous Learning of Personal Assistant from User Histories Stored in Cloud Abstract: A personal assistant always provides us with a daily schedule, remembers all the events and intimates us at right time. Most of the times, our routine jobs are forgotten and user may get to know new information about our most obsessed things later only. Not everyone could afford a personal assistant to help with the daily activities or help the executive in remembering him/her about the activities. Due to heavy industrious works, a human mind naturally tend lose its integrity to forget most important tasks which may lead in missing flight timings or losing a relationship or even millions of amount. People most of the time tend to know the newer updates or information about the things they have been searching for only when they go looking for it again or when they see in others post. The proposed personal assistant system called Naturally Artificial Sanguine and Tangled Youngster (N.A.S.T.Y) does not violate any of the privacy issues and helps the user to remember their search topics and mobile applications usage statistics. The system has asynchronous method run continuously in the cloud server and finds the user’s recent favourites and activities and stores that in separate PostgreSQL database table. To find the activities and favourites of the user, an android application is developed using Android Studio which gathers the usage statistics of the user’s phone. The user wants to search any content over the web the proposed system helps to do it efficiently. The summarized text is shown as output in user mobile phone.

Index Terms: Named Entity Recognition, Personal Assistant, Machine Learning, Searching Assistant, Pattern Recognition

92. References: 1. Bayu Setiaji and Ferry Wahyu Wibowo, “Chatbot Using a Knowledge in Database: Human-to-Machine Conversation Modeling”, 7th 432-437 International Conference on Intelligent Systems, Modelling and Simulation, pp 72-77, 2016. 2. Casteleiro M.A., Tsarkov D., Parsia B., Sattler U., “Using Semantic Web Technologies to Underpin the SNOMED CT Query Language”, In: Bramer M., Petridis M. (eds) Artificial Intelligence XXXIV. SGAI 2017. Lecture Notes in Computer Science, vol 10630. Springer, Cham 3. Chen, Yan & Zhang, Yan-Qing, “A personalized query suggestion agent based on query-concept bipartite graphs and Concept Relation Trees”, International Journal of Advanced Intelligence Paradigms, 1(4), 2009. 4. Karolina Owczarzak, Ferdinand de Haan, George Krupka, Don Hindle, “Words you don’t know: Evaluation of lexicon-based decompounding with unknown handling” , Proceedings of the First Workshop on Computational Approaches to Compound Analysis, pages 63–71, Dublin, Ireland, August 24 2014. 5. Ameya vichare, Ankur Gyani, Yashika Shirkhande, Nilesh Rathod, “ A chatbot system demonstrating Intelligent Behavious using NLP”, in IJARCET Vol 4 Issue 10 , October 2015. 6. Chaitrali S. Kulkarni, Amruta U. Bhavsar. Savita R. Pingale, Prof. Satish S. Kumbhar, “ BANK CHAT BOT – An Intelligent Assistant System Using NLP and Machine Learning”, IRJET, Volume 4 Issue 05, May 2017 7. Abdul-Kader, Sameera A., and J. C. Woods. "Survey on chatbot design techniques in speech conversation systems." International Journal of Advanced Computer Science and Applications 6, no. 7 (2015). 8. Luka Bradesko, Dunja Maldenic “ A Survey of Chatbot System through a Loebner Prize Competition” International Conference January 2012. 9. Peter F. Brown, Peter V. deSouza, Robert L. Mercer, Vincent J. Della Pietra, Jenifer C. Lai “ Class-Based n-gram Models of Natural Language” in IBM T.J Watson Research Center in Association for Computational Linguistics 1992. 10. Hindle, Donald, and Mats Rooth. "Structural ambiguity and lexical relations." Computational linguistics 19, no. 1 (1993). 11. Marti A. Hearst, Xerox Palo Alto Research Center, “ Automatic Acquisition of Hyponyms from Large Text Corpora” in ACTI~S DE COLING-92, NANTES, 23-28 1992 12. James Clarke, Mirella Lapata “Modelling Compression with Discourse Constraints” in 2007 Association for Computational Linguistics. Authors: D.Sathya, S.Sangeetha Paper Title: Http Rule Base Intrusion Detection and Prevention System Abstract: The objective of HTTP Rule Base Intrusion Detection and Prevention System (IDPS) is to provide security 93. for one of the application layer protocols namely HTTP (Hyper-Text Transfer Protocol). Such an HTTP based Intrusion Detection System (IDS) detects header attacks and attacks in payload (includes HTML and scripting). Misuse detection 438-441 uses signature based approach where predefined patterns are defined. The input text or pattern is compared with the predefined signatures to detect malicious activity. Furthermore new types of attacks are continuously created. The new attacks created by attacker are also detected by these IDS, only if attacks are in the form of signatures. Signatures are defined either in a single-line or by complex script languages and are used in rule base to detect attacks. These signatures and rules have to be updated periodically as the attacks are continuously changing its nature of attacks.

Key terms: IDS, HTTP, Rule Base.

References: 1. T.Abbes,A. Bouhoula and M. Rusinowitch (2004), ‘Protocol Analysis in Intrusion Detection Using Decision Tree’, In the Proceedings of International Conference on Information Technology, Coding and Computing (ITCC’ 04), IEEE. 2. E. Amoroso and R.Kwapniewski, (1998) ‘ A Selection Criteria for Intrusion Detection Systems’, Proc. 14th Ann. Computer Security Applications Conf, IEEE Computer Soc. Press, Los Alamitos, Calif, pp. 280-288. 3. Andrew S. Tanenbaum, ‘Computer Networks’, 2nd Edition, Prentice Hall of India. 4. A.Anitha and V. Vaidehi ‘Content based Application Level Intrusion Detection System’. 5. D.E. Denning, (1987) ‘An Intrusion Detection Model’, IEEE Trans. Software Eng., Vol. SE-13, No. 2, pp. 222-232. 6. R. Durst et al,(1999) ‘Testing and Evaluating Computer Intrusion Detection Systems’, Comm. ACM, Vol. 42, No.7, pp.53-61. 7. John McHugh, Alan Christie and Julia Allen (2000), ‘Defending Yourself: The Role Intrusion Detection Systems’, IEEE SOFTWARE pp. 42-51. 8. Karen Scarfone and Peter Mell, ‘Guide to Intrusion Detection and Prevention Systems(IDPS)’. 9. C.Krugel and T.Toth (2003), ‘Using decision trees to improve signature-based Intrusion Detection’ in the proceedings of the 6th International Workshop on the recent advanced in Intrusion Detection(RAID’2003), LNCS v.2820, pages 173-191. 10. J. Mogul, R. Fielding, J. Gettys, H. Frystyk, L. Masinter, P. Leach and T. Bemers-Lee June 1999.RFC2616: Hypertext Transfer Protocol - HTTP/1.1. 11. Nick Ierace, Cesar Urrutia and Richard Bassett ‘Intrusion Prevention Systems’. 12. S. Northcutt,(1999) ‘Network Intrusion Detection’, New Riders, Indianapolis. 13. V. Paxson, (1998) ‘Bro: A System for Detecting Network Intruders in Real-Time’, Computer Networks (Amsterdam, Netherlands: 1999), vol. 31, no. 23-24, pp. 2435– 2463. 14. M.V.Ramana Murthy, P.Ram Kumar, E.Devender Rao, A C Sharma, S.Rajender and S.Rambabu, ‘ Performance of the Network Intrusion Detection Systems’, IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.10. 15. M. Roesch, (2003) ‘Snort: the Open Source Network Intrusion Detection System’, Development Paper at www.snort.org. 16. Duraisamy Sathya, Pugalendhi Ganesh Kumar, “Secured remote health monitoring system”, Healthcare Technology Letters, pp. 1–5. 17. Sathya.D, Krishneswari.K, "Cross Layer Intrusion Detection System for Wireless Sensor Networks”,Journal of Scientific and Industrial Research, Vol.75, pp.213-220, 2016. Authors: R. Kannan, K. Sankar, K. Venkatesh, P. Sathyabalan Paper Title: A Research on Niw Alloy Coatings on Mild Steel through Electrodeposition Method Abstract: In order to enhance the structural and mechanical properties of mild steel, NiW nanocrystalline thin layer has been coated on the surface of mild steel through electroplating technique at bath temperature of 40 C over the deposition time of 45 minutes. The nanocrystalline NiW alloy coatings were deposited on mild steel at constant current density of 1 A/dm2. The structural and chemical characterizations of the NiW alloy coated mild steel were performed by scanning electron microscopy (SEM) and X-ray diffraction pattern (XRD). The micro hardness value of the coated mild steel was determined by using Vickers Hardness test. The effect of NiW on wear behavior of mild steel was analyzed using Pin-on- disc apparatus. The mechanical properties of mild steel such as hardness, roughness and wear resistance have been enhanced in an appreciable manner. This is primarily due to the NiW alloy coatings on mild steel. The variations in structural and mechanical properties of NiW coated mild steel were also studied.

Keywords: Mild steel, NiW, hardness, roughness and wear.

References: 1. A.P.I Popoola, O.S.I Fayomi and O.M Popoola. Int. J. Electrochem. Sci., 7 (2012) 4898 – 4917. 2. Mahmud Abdulmalik Abdulrahaman et al 2017 Adv. Nat. Sci: Nanosci. Nanotechnol. 8 015016. 3. Kulka M, Mikolajczak D, Makulu N, Dziarski P and Miklaszewski A 2016 Surf. Coat. Tech. 291 293. 94. 4. E. Selva kumar, S. Venkateshwaran, R. Kannan, M. Selvambikai & A. S. Pradeep " An Electrode Position Of Tungsten Coatings On The Mild Steel: Structural And Its Wear Behaviour." International Journal of Mechanical and Production Engineering Research and Development, 8, no. 7 (2018): 1012-1018. 442-445 5. Venkateshwaran S., Selvakumar E., Senthamil selvan P., Selvambikai M., Kannan R., Pradeep A.S. (2019) Corrosion and Magnetic Characterization of Electroplated NiFe and NiFeW Soft Magnetic Thin Films for MEMS Applications. In: Lakshminarayanan A., Idapalapati S., Vasudevan M. (eds) Advances in Materials and Metallurgy. Lecture Notes in Mechanical Engineering. Springer, Singapore. 6. R Kannan et al 2018 Mater. Res. Express 5 046414. 7. Kannan R, Ganesan S, Selvakumari TM (2012) Synthesis and characterization of nanocrystallineNiFeWS thin films in diammonium citrate bath. Digest J Nanomater Biostruct 7(3):1039–1050. 8. R Kannan, S Ganesan, TM Selvakumari " Structural and magnetic properties of electrodeposited Ni-Fe-WS thin films." Optoelectron Adv Mat, 6, no. 3-4, (2012): 383- 388. 9. O.S. Fayomi, V.R. Tau, A.P.I. Popoola, B.M. Durodola, O.O. Ajayi, C.A. Loto, and O.A. Inegbenebor,. J. of Mat. and Env. Sci., 3, (2011) 271. 10. B.K. Prasad, and O.P. Modi, Trans. of Nonfer. Mat. Sci. China, 19: (2008) 277. 11. Qin, Liyuan, Jiying Xu, Jianshe Lian, Zhonghao Jiang, and Qing Jiang. "A novel electrodeposited nanostructured Ni coating with grain size gradient distribution." Surface and Coatings Technology 203, no. 1-2 (2008): 142-147. 12. SadanandaRashmiLijuEliasAmparChitharanjan Hegde. " Multilayered Zn-Ni alloy coatings for better corrosion protection of mild steel" Engineering Science and Technology, an International Journal Volume 20, Issue 3, June 2017, Pages 1227-1232. 13. Kato, Koji. "Wear in relation to friction-a review." Wear 241, no. 2 (2000): 151-157. 14. rasad, D.S., Ebenezer, N.S. & Shoba, C. Trans Indian Inst Met (2017) 70: 2601. https://doi.org/10.1007/s12666-017-1121-y 15. C.S.Ramesh and S.K.Seshadri" Tribological characteristics of nickel based composite coatings, Wear Volume 255, Issues 7–12, August– September 2003, Pages 893-902. https://doi.org/10.1016/S0043-1648(03)00080-2 16. M. Surender, B. Basu and R. Balasubramaniam. " Wear characterization of electrodeposited Ni–WC composite coatings." Tribology International Volume 37, Issue 9, September 2004, Pages 743-749. Authors: S. Govindaraj, Krishna Mohanta.S, C.Rukkumani Paper Title: Enhances the Capacity of Load Adjusting by Improved Load Balancing Methodology in P2P Network 95. Abstract: To upgrades the limit of load modifying by working up a novel enhanced load adjusting philosophy in 446-453 heterogeneous P2P network with suitable load assignment and load reallocation process. We moreover propose another new adjusting procedure called two load adjusting strategy for peer to peer networks to make the best load designation assurance when a novel partner arrives. The new load adjusting method is also prepared to achieve the load reallocation immovably through framework running time, if congested peer arrives. In load altering estimation, no virtual servers are used. Subsequently, preparing overhead is diminished in light of restrictive meta-data preservation. Besides load adjusting additionally centers around controlling the framework action. The idea behind model is to investigate the impact of peer heterogeneity and to adjust the load dissemination in P2P frameworks

Index Terms: load adjusting, peer to peer, TLBMP

References: 1. Li. X, and Wu. J, “Improve Searching by Reinforcement Learning in Unstructured P2Ps,” in 2004 Proc.26th Conf.Distributed Computing Systems ,pp. 75 2. Ananth Rao, Karthik Lakshminarayanan, Sonesh Surana, Richard Karp, and Ion Stoica, “Load Balancing in Structured P2P Systems,” in Proc. IPTPS, Feb. 2003. 3. Suresh, K.C., Prakash, S, Priya, AE & Kathirvel, A 2015, ‘Primary path reservation using enhanced slot assignment in TDMA for session admission’, The Scientific World Journal, Article: ID 405974. 4. John Byers, Jeffrey Considine, and Michael Mitzenmacher, “Simple Load Balancing for Distributed Hash Tables,” in Proc. IPTPS, Feb. 2003. 5. Frank Dabek, Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica, “Wide-area Cooperative Storage with CFS,” in Proc. ACM SOSP, Banff, Canada, 2001. 6. David Karger, Eric Lehman, Tom Leighton, Matthew Levine, Daniel Lewin, and Rina Panigrahy, “Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web,” in Proc. ACM STOC, May 1997. 7. M. Adler, Eran Halperin, R. M. Karp, and V. Vazirani, “A stochastic process on the hypercube with applications to peerto-peer networks,” in Proc. STOC, 2003. 8. Palani1 U., Amuthavalli G., Chethan Prakash V. and Suresh K.C. “Energy-based Localization of IWSN in Biotechnology Industrial Applications” Res. J. Biotech ,Vol. (Special Issue II) August (2017) 9. Aberer, K., Datta, A., Hauswirth, M.: The Quest for Balancing Peer Load in Structured Peer-to-Peer Systems. Technical report, EPFL, Swiss (2003) 10. Ganesan, P., Bawa, M., Garcia-Molina, H.: Online balancing of range-partitioned data with applications to peer-to-peer systems. Technical report, Stanford U. (2004) 11. Crainiceanu, A., Linga, P., Machanavajjhala, A., Gehrke, J., Shanmugasundaram, J.: P-Ring: An index structure for peer-to-peer systems. Technical Report TR2004- 1946, Cornell University, NY (2004) 12. Aspnes, J., Kirsch, J., Krishnamurthy, A.: Load balancing and locality in rangequeriable data structures. In: PODC ’04: Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing, New York, NY, USA, ACM Press (2004) 115–124 13. Karger, D.R., Ruhl, M.: Simple efficient load balancing algorithms for peer-topeer systems. In: SPAA ’04: Proceedings of the sixteenth annual ACM symposium on Parallelism in algorithms and architectures, New York, NY, USA, ACM Press (2004) 36–43 14. Theoni Pitoura, Nikos Ntarmos, P.T.: Replication, load balancing and efficient range query processing in DHTs. In: Proceedings of the International Conference on Extending Database Technology (EDBT), Munich, Germany. (2006) 15. Navimipour, N. J., & Milani, F. S. (2015). A comprehensive study of the resource discovery techniques in Peer-to-Peer networks. Peer-to- Peer Networking and Applications, 8(3), 474–492. 16. Desai, T., & Prajapati, J. (2013). A survey of various load balancing techniques and challenges in cloud computing. International Journal of Scientific & Technology Research, 2(11), 158–161 17. Hussain, H., Malik, S. U. R., Hameed, A., Khan, S. U., Bickler, G., Min-Allah, N., Kolodziej, J. (2013). A survey on resource allocation in high performance distributed computing systems. Parallel Computing, 39(11), 709–736 18. Suresh K.C., Haripriya K. and Kruthika S.R."Cooperative Multipath Admission Control Protocol: A Load Balanced Multipath Admission Policy", Research Journal of Biotechnology, Vol. (Special Issue II), August (2017) 19. Suresh K.C, Ashok S, Vishanth.S and Sriram.S “A Machine Learning Approach For Providing Location Aware Services In Mobile Ad Hoc Networks”, International Journal of Pure and Applied Mathematics, Volume 117 No. 21,pp.937-941, 2017 Authors: Madan Kumar L., Vadiraj Rao N.R., Chandana Prasad B.G., Rajani A. Paper Title: Implementation of Techniques and its Management on Constructional Activities Abstract: Precast construction is a time effective technique which consumes less time than cast-in-situ technique for execution. Savings of time in construction would compensate the overall profit for the owner. Precast technology achieves better concrete quality control with less wastage of materials. In this paper, G+3 commercial multi-storied building is planned and compared with the precast construction and cast-in-situ construction for cost analysis using Payback Period Method and Net Present Value Method. Scheduling is done using Primavera. Primavera (P6) turn out to be competent tool in monitoring, scheduling, controlling and updating the project at any stage of construction process. Through payback period it is able to deduce that, the initial investment can be recovered approximately one month before the cast-in-situ method when we are employing precast approach. Also, considering investment criteria i.e. Net present value method shows that, a higher profit is obtained towards the investment in precast than in cast-in-situ method. Hence, precast construction method proves to be profitable when compared to conventional method of construction.

96. Keywords: Cast-in-situ, Net Present Value Method, Payback Period Method, Precast, Primavera.

454-458 References: 1. F.T. Andrew and P. Sachin, “Project Monitoring and Control using Primavera - Project Planning Monitoring & Control”, International Journal of Innovative Science Engineering and Technology, Vol. 2, No. 3, (2013), pp.762-771. 2. L. Akash, and D. Venkateswarlu, “Design, Cost & Time analysis of Precast & RCC building”, International Research Journal of Engi- neering and Technology, Vol.03, No. 06, (2016), pp. 343-350. 3. Vongai Maroyi, Capital Budgeting Practices: A South African Per- spective, Master’s Thesis, Wageningen University, Department of Social Sciences, Management Studies Group, (2011). 4. A. A. Shaikh, K.J. Geetha and R. Ramya, “Time and Cost Analysis under Project Planner Software”, Department of Civil Engineering, Shivajirao S. Jondhle College of Engineering and Technology, Asangaon, (2013). 5. P. Prajjwal, D. Sagar, B. Madan, T. Amit Kumar Tomar, “Study on Prefabricated Modular and Steel Structures”, SSRG International Journal of Civil Engineering, Vol.3, No. 5, (2016), pp. 7-14 6. P. Bindurani, A. Meher Prasad, A. K. Senugupta, “Analysis of Pre- cast Multi store Building - A Case Study”, International Journal of Innovative Research in Science, Engineering and Technology Vol. 2, No. 1, (2013), pp.294-302. 7. L. Jaillon and C.S. Poon, “Advantages and Limitations of Precast Concrete Construction in High-rise Buildings: Hong Kong Case Study”, CIB World Building Congress, (2007), pp. 2504-2514. 8. IS 456: 2000, Indian Standard plain and reinforced concrete- code of practice (4th revision), April 2007. 9. SP: 16- 1980, Design Aids for Reinforced Concrete to IS: 456-1978, Mar 1999. 10. SP: 34(S&T)- 1987, Hand Book on Concrete Reinforcement and Detailing, Mar 1999. 11. IS: 875- 1978, part 1 and part 2, Code of practice for Design Load. 12. Unnikrishna Pillai and Devdas Menon, Reinforced Concrete Design, 3rd Edition, Mcgraw Hill Publication. 13. N. Krishna Raju, Reinforced Concrete Design, 2nd Edition, CBS Publications. 14. H.J. Shah, Reinforced Concrete Vol-1 and Vol-2, 8th Edition, 2009 and 6th, Edition 2012, Charotar Publication Authors: S.Venkatesan, M.Raji, G.Jayalalitha Paper Title: Medium Domination Number in Linear Polyacene Abstract: Let G(V,E) be a finite, connected graph. The set of vertices and edges of G are denoted by V=V(G) and E=E(G) respectively. In such a Molecular graph, vertices represent atoms and edges represent bonds. In this paper, it obtains Medium Domination Number in the Molecular Graph of Organic Compounds and proves by induction method.

Keywords: Dominating set, Medium Domination Number, Internally Disjoint Path, Molecular Graph. AMS Subject Classification: 05C69.

References: 97. 1. S.Arumugam , Invitation to Graph Theory, Scitech Publications(India) Pvt Limited, ISBN 139788187328469, 2014. 2. Duygu Vargorn and Pinar Dundar, The Medium Domination Number Of a Graph, International Journal of Pure and Applied Mathematics, 459-461 Vol.70 No.3,297-306,(2011). 3. M. Ramachandran and N. Parvathi, The Medium Domination Number Of a Jahangir Graph J m,n, Indian Journal of Science and Technology, Vol.8(5),400-406,(2015). 4. S.Vijayalakshmi, M.Raji and G.Jayalalitha , Degree based in Molecular Graph of Organic compounds on Domination, Journal of Advanced Research in Dynamical and Control Systems, Vol.10, 06-special issue, 962-966,(2018). 5. G.Jayalalitha, M.Raji, S.Senthil, Hosoya Polynomial and Wiener Index of Molecular Graph of Naphthalene Based On Domination, International Journal of Scientific Research and Review, Vol.8,Issue 1, 1238-1241,(2019). 6. Nisreen Bukhary, Domination in Benzenoids. Virginia Commonwealth University,VCU Scholars Compass, 2010. 7. Sandi Klavzar, Ivan Gutman , A Comparison of the Schultz Topological Index with the Wiener Index, Journal for Chemical Information and Computer Sciences, 36, 1001-1003,(1996). 8. Nenad Trinajstic,Chemical Graph Theory,Second Edition,CRC Press,1983. Authors: P.Rajakumari, K. Ameenal Bibi Paper Title: On (1,2)- Blast Domination Number for Some Total Graphs Abstract: The hub of this article is a search on the behavior of the (1,2) Blast domination number for total graphs of some particular graphs.

Keywords: Connected domination number, Comb graph, (1,2) domination number, Helm graph, Total graph of a graph and, Wheel graph.

References: 1. Akbar, M.M., Panayappan, S. & Vernold Vivin, J., Tulgeity of Line, Middle and Total graph of Wheel Families, International J.Math.Combin. Vol 3(2010), 98-107. 2. Chartrand, G & Lesniak, L., Graphs and Digraphs, Chapman and Hall, CRC, 4th edition, 2005. 98. 3. Haray, F., Graph Theory, Addison Wesley Reading Mass (1972). 4. Haynes,T.W., Hedetniemi, S.T. & Slater, P.J., Fundamentals of domination in graphs, Marcel Dekker Inc. New York, U.S.A. (1998). 462-466 5. Mahadevan, G., Ahila, A., Selvam Avadayappan, Blast Domination Number for central and total graph of star, Global Journal of Pure and Applied Mathematics ,ISSN 0973-1768 Volume 13, No.2(2017). 6. Mahadevan, G., Ahila, A., Selvam Avadayappan, Blast Domination Number for ϑ-Obrazom ,Int. Journal of Pure and Applied Mathematics ,Volume 118 No.4, 111-117(2018). 7. Murugesan, N and Deepa, S., Nair, (1,2)- Domination in Graphs, J.Math.Comput. Sci., Vol.2, 2012, No.4, 774-783. 8. Paulraj Joseph , J., Angel Jebitha, M.K., Chithra Devi, P.& Sudhana, G. Triple connected graphs, Indian Journal of Mathematics and Mathematical Sciences, Vol.8, No.1(2012),61–75. 9. Sampathkumar, E. & Walikar, H.B., The Connected Domination Number of a graph, J.Math.Phy.Sci.,13(6) (1979),607-613. 10. Steve Hedetniemi & Sandee Hedetniemi, (1,2) - Domination in Graphs. 11. Vernold Vivin, J., Harmonious Coloring of Total Graphs, n-Leaf, Central graphs and Circumdetic Graphs, Ph.D Thesis,Bharathiyar University,(2007). 12. Vernold Vivin, J., Venkatachalam, M., On b-chromatic number of sunletgraph and wheel graph families, Journal of the Egyptian Mathematical Society (2015) 23, 215-218. Authors: T.Ravichandran, Krishna Mohanta, C.Nalini Paper Title: Feature Specific Optimal Random Forest Algorithm for Enhancing Classification Accuracy Abstract: creature an ensemble method, Random Forest create numerous DTs as base classifiers and invoke larger part voting to consolidate the results of the base trees. In this exploration work an endeavor is made to improve execution of Random Forest classifiers as far as correctness and time required for erudition and classification. we first present another variety of Optimal irregular Forest reliant on a direct classifier, by then build up a group classifier subject to the blend of a brisk neural Network (NN), vector-utilitarian association arrange and Optimal arbitrary Forests. Arbitrary Vector have a rich close structure game plan with incredibly short preparing time. The observational assessment and consequences of 99. tests finished in this investigation work lead to reasonable learning and arrangement using RF.

References: 467-470 1. Zhang & Suganthan, “Benchmarking ensemble classifiers with novel co-trained kernal ridge regression & random vector functional link ensembles,” IEEE Computational Intelligence Magazine, vol. 12, no. 4, pp. 61–72, 2017. 2. Criminisi,, Shotton, Konukoglu , “Decision forests: A unified framework for classification, regression, density estimation, manifold learning & semi-supervised learning,” , Foundations and Trends in Computer Graphics and Vision, vol. 7, no. 2–3, pp. 81–227, 2012. 3. Menze, Kelm, Splitthoff, Koethe, & Hamprecht, “On Optimal random forests,” Joint European Conference on Machine Learning & Knowledge Discovery in Databases. Springer, pp. 453–469, 2011 4. Zhang & Moulin, “Robust visual tracking using oblique random forests,” IEEE International Conference on Computer Vision & Pattern Recognition. IEEE, 2017. 5. Dehuri & Cho, “A comprehensive survey on functional link neural networks & an adaptive pso–bp learning for cflnn,” Neural Computing & Applications, vol. 19, no. 2, pp. 187–205, 2010. 6. Zhang & Suganthan, “A comprehensive evaluation of random vector functional link networks,” Information sciences, vol. 367, pp. 1094– 1105, 2016. 7. Katuwal, Suganthan, & Zhang, “An ensemble of decision trees with random vector functional link networks for multi-class classification,” Applied Soft Computing, 2017. 8. Breiman, “Bagging predictors,” Machine learning, vol. 24, no. 2, pp. 123–140, 1996. 9. Zhang & Suganthan, “Optimal random Forest ensemble via multisurface proximal support vector machine,” IEEE Transactions on Cybernetics, vol. 45, no. 10, pp. 2165–2176, 2015. 10. Zhang & Jiao, “Decision tree support vector machine,” International Journal on Artificial Intelligence Tools, vol. 16, no. 01, pp. 1–15, 2007. 11. Lemmond, & Hanley, “An extended study of the discriminant random forest,” in Data Mining. Springer, pp. 123–146, 2010. 12. Truong, “Fast growing & interpretable oblique trees via logistic regression models,” Ph.D. dissertation, University of Oxford, 2009. 13. Ren, Suganthan, Srikanth, & Amaratunga, “Random vector functional link network for short-term electricity load demand forecasting,” Information Sciences, vol. 367, pp. 1078–1093, 2016. 14. Richmond, Kainmueller, Yang, Myers, & Rother, “Relating cascaded random forests to deep convolutional neural networks for semantic segmentation,”, 2015. 15. Kontschieder, Fiterau, Criminisi, & Rota Bulo, “Deep neural decision forests,” in Proceedings of the IEEE International Conference on Computer Vision, pp. 1467–1475., 2015 16. Rota Bulo & Kontschieder, “Neural decision forests for semantic image labelling,” in Proceedings of the IEEE Conference on Computer Vision & Pattern Recognition, pp. 81–88., 2014 17. Murthy, Singh, Chen, Manmatha, & Comaniciu, “Deep decision network for multi-class image classification,” in Computer Vision & Pattern Recognition (CVPR), IEEE Conference on. IEEE, pp. 2240–2248., 2016 18. Busa-Fekete, R., Benbouzid, D., & Kegl, B. Fast classification using sparse decision dags. In Proceedings of the 29th International Conference on Machine Learning, pp. 951–958, 2012. 19. Chapelle, O, Chang, Y, & Liu, T (eds.). Proceedings of the Yahoo! Learning to Rank Challenge, held at ICML 2010, Haifa, Israel, June 25, 2010. Authors: Kajal Mukhopadhyay, P. Fermi Hilbert Inbaraj, J. Joseph Prince Efficiency Improvement of CZTSe Solar Cell with Ag Doped Zno/Cds Buffer Layer, using Scaps Simulation Paper Title: Programme Abstract: Compound semiconductor CZTSe is a popular absorber layer for thin film solar cells. Instead of single semiconductor buffer layer, a hybrid buffer layer is used with CZTSe absorber layer. To reduce further usage of toxic materials(CdS) and simultaneously to increase the solar cell efficiency, Ag doped buffer layer was proposed and a numerical studies were performed using SCAPS 1-D simulation programme. Also the thickness and the carrier density of the different layers in the solar cell were optimized to achieve the above goals. After the simulation process, the toxic materials usage was reduced by 62% and the efficiency was increased from 12.24% to 12.69%.

Index Terms: CZTSe, Ag doping, Buffer layer, SCAPS, Efficiency

References: 1. Chetan Sink Solanki, Solar Photovoltaivic- Fundamentals,Technologies and applications, second editions, PHI, ISBN no. 978-81-203-4386- 3. 2. Kajal Mukhopadhyay, P. Fermi Hilbert Inbaraj and J. Joseph Prince .Thickness optimization of CdS/ZnO buffer layer in CZTSe thin film solar cells using SCAP simulation program. Material Research and Innovation. http://doi.org/10.1080/14328917.2018.1475907. 3. O. K. Simya et al: “A comparative study on the performance of kesterite based thin film solar cell using Scaps simulation program”: superlattices and microstructures 82(2015) pp248-261. 4. Fenglin Xiang et. al. : “Characterization of Ag doped ZnO thin film synthesized by sol gel method and its using in thin film solar cell”, Optik 124(2013) 4876-4879. 5. Hosseini et.al : “Effect of Ag doping on structural, optical and photo catalytic properties of ZnO nanoparticles”: Cond-mat.mtrl-sci arXIV: 1508.000382V, 2015. 6. M.Karyaoui, A. Mmhamdi, H.Kaouach, A. Labidi, A. Boukhachem, K.Boubaker, M. Amlouk, R. Chtourou., Some physical investigation on silver- doped ZnO sprayed thin films, Material science in semiconductor processing, 30(2015) pp-255-262. 7. Mangesh Lenjwar et.al. : “Enhanced performance of Ag doped ZnO and pure ZnO thin film DSSCs prepared by solgel spin coating” , Inorganic and nonmetal chemistry 2017 vol 47 , no.7, 1090-1096 100. 8. M.A. Khalid and H.A.Jassem, “Electrical and optical properties of polycystalline Ag-doped CdS thin films”, Acta Physica Hungarica, 73(1) pp 29-34,1993 9. H. Katagiri, K.Jimbo, W.S.Maw,K. Oishi, M. Yamazaki, H. Araki,A.Takeuchi, Development of CZTS based thin film solar cell, Thin Solid 471-476 films, vol 517,issue 7, 2009,pp 2455-2460. 10. Shubam Chandel, Ajan P.R, Annie Joseph V, V P N Nampoori, P Radhakrishnan, “A study of CdS and Ag doped CdS prepared through CBD technique”, International conference on fiber optics and photonics, optical society of India 2012. 11. Sergio R. Ferra-Gonzalez et al, “Optical and structural properties of CdS thin films grown by chemical bath deposition doped with Ag by ion exchange”, Optik 125(2014) 1533-1536. 12. Anant H. Jahagirdar, Ankur A. Kadam and eelkanth G. Dhere.” Role of i-ZnO in optimizing open circuit voltage of CIGS2 and CIGS thin film solar cell”, Proceedings of the Conference Record of the 4th IEEE World Conferenceon Photovoltaic Energy Conversion, 2006, pp.557–559. 13. Marc Burgelman, Koen Decock, Alex Niemegeers, Johan Verschraegen, Stefaan Degrave -SCAPS manual. Version: 17 February 2016 14. M. Burgelman, P. Nollet, S. Degrave, “Modelling polycrystalline semiconductor solar cells”, thin solid film, 361-362(2000) pp. 527-532 15. Abdelbaki Cherouana, Rebiha Labbani: “Study of CZTS and CZTSSe solar cell for buffer layer selection”: Applied Surface Science, 4 May 2017 16. Springer handbook of electronic and photonic materials, ISBN 0387-26059-5. 17. Sudipto Saha et al, “Performance of CZTSSe Solar cell with various Mole fractions of Sullfur for different buffer layers”, 4th ICDRET, Jan- 2016. 18. Atul Kumar and Ajay D. Thakur, “Analysis of SnS2 buffer layer and SnS back surface layer based CZTS solar cells using SCAPS”, Research gate publications/283043296, Oct-2015. 19. Darvish Zadesh P, Sohrabpoor H, Gorji NE. Numerical device simulation of carbonnanotube contacted CZTS solar cells. Opt Quant Electron. Oct 2016; 48-480. 20. Sudipto Saha, Ramiraj C.Shahidul Hassan, “ Improvement of the Output Performance of CZTS Thin Film Solar Cell” 2nd International Conference on Electrical, Computer & Telecommunication Engineering (ICECTE),2016,Dec,Rajshai. 21. Mohammad Sijanur Rahaman Robin and Md. Mizanur Rahaman: “A Comparative Performance Analysis of CdS and In2S3 Buffer Layer in CIGS Solar Cell”: IEEE Xplore: 16 March 2017, ISBN Information: Electronic ISBN: 978-1-5090-5785-6 22. Abu Shama Mohammad Miraz, Md. Mortuza Faruk and Muhammad Asad Rahman. “Numerical Analysis of Deep Level Defects in Cu2ZnSnS4 (CZTS) Thin Film Solar Cells “: 2015 3rd International Conference on Green Energy and Technology (ICGET) 23. Y. Sanchez et al. “ Advanced hybrid buffer layers for CZTS solar cells”, Conference paper: 978-1-5090-2724-8/16/ ©2016 IEEE ,pp 1511- 1515 24. T. Minemoto et al. “Theoretical analysis of the effect of conduction band offset of window /CIS layer on performance of solar cell using device simulation”, Solar energy materials and solar cells, 67(2001) 83-88. 25. Rafee Mahbub et al, “ Simulation of CZTS thin film solar cell for different buffer layer for high efficiency performance”, SAJET, vol2, no 52(2016), 1-10. 26. Omar A.M. Abdelraouf, Nagesh K Allam: “Nanostructuring for enhanced absorption and carrier collection in CZTS based solar cells: coupled optical and electrical tunneling”: Optical materials 54(2016) pp 84-88. 27. Hong Zhang, Shuying Cheng, Jinling Yu, Haifang Zhou, Hongjie Jia: “Prospects of Zn(O,S) as an alternative buffer layer for Cu2ZnSnS4 thin-film solar cells from numerical simulation” : Micro & Nano Letters, 2016, Vol.1, Iss.7,pp 386-390. Authors: Shriram Marathe, Mithanthaya I R., Sahithya S. Shetty Paper Title: Research on Eco-friendly Alkali Activated Concrete Incorporating Industrial Wastes Abstract: In the present scenario, the production of green and sustainable concrete has become a must to substitute the ordinary Portland cement (OPC) concrete. It is an eminent fact that the manufacture of OPC requires burning of its raw materials which lead to a huge amount of carbon dioxide liberation; thus it requires a large amount of energy dissipation. The concrete produced using alkali activation has become renowned methods to replace the conventional OPC, which gives an answer to find a way to produce environmentally friendly concrete. In the current study, the alkaline activator used to activate the binder was sodium hydroxide solution dispersed in liquid sodium silicate. The utilization of industrial dissipate materials such as GGBS, fly ash, and waste glass powder was used as the binding ingredients, and stone crusher dust was used as fine aggregates. The experimental investigation showed that a quality concrete can be easily produced using alkali activation of industrial wastes satisfying its strength requirements. The statistical models developed shown that there is a significant relationship between various cube and cylinder strengths. Thus alkali-activated concrete(AAC) can effectively reduce the environmental hazards associated with OPC concrete, which also provides an effective way of utilizing major industrial by-products.

Keywords: Sustainable Concrete; Alkali-activation; Compressive Strength; Glass powder; Statistical Model.

References: 101. 1. B. Singh, G. Ishwarya, M. Gupta, and S. K. Bhattacharyya, “Geopolymer concrete : A review of some recent developments,” Construction Building Material, vol. 85, pp. 78–90, 2015. 2. E. Gartner, “Industrially interesting approaches to ‘“ low-CO 2 cements” vol. 34, no. January 2004, pp. 1489–1498, 2010. 477-482 3. Y. Ding, J. Dai, and C. Shi, “Mechanical properties of alkali-activated concrete : A state-of-the-art review,” Construction Building Material, vol. 127, pp. 68–79, 2016. 4. G. M. S. Islam, M. H. Rahman, and N. Kazi, “Waste glass powder as partial replacement of cement for sustainable concrete practice,” International Journal of Sustainable Built Environment, vol. 6, no. 1, pp. 37–44, 2017. 5. G. Vijayakumar, M. H. Vishaliny, and D. Govindarajulu, “Studies on Glass Powder as Partial Replacement of Cement in Concrete Production,” vol. 3, no. 2, pp. 153–157, 2013. 6. S. Marathe, I. R. Mithanthaya, and S. Shetty, Strength behaviour of masonry blocks produced using green concrete, Sustainable Construction and Building Materials. Lecture Notes in Civil Engineering, vol 25. pp 33-40. Springer, Singapore. 2019. 7. H. Du and K. H. Tan, “Waste Glass Powder as Cement Replacement in Concrete Waste Glass Powder as Cement Replacement in Concrete,” Journal of Advanced Concrete Technology, vol. 12, pp. 468–477, 2015. 8. I. R. Mithanthaya, S. Marathe, N. B. S. Rao, and V. Bhat, “Influence of superplasticizer on the properties of geopolymer concrete using industrial wastes,” Material Today: Proeedings, vol. 4, no. 9, pp. 9803–9806, 2017. 9. R. Ilangovana, N. Mahendrana, and K. Nagamanib, “Strength and durability properties of concrete containing quarry rock dust as fine aggregate,” vol. 3, no. 5, pp. 20–26, 2008. 10. M. A. Joe, A. M. Rajesh, P. Brightson, and M. P. Anand, “Experimental Investigation on The Effect Of M-Sand In High Performance Concrete,” no. 12, pp. 46–51, 2013. 11. S. L. Chauhan and R. A. Bondre, “Partial Replacement of Sand by Quarry Dust in Concrete,” vol. 5, no. 7, pp. 5–8, 2015. 12. Beauro of Indian Standards, IS:383-1970-Specification For coarse and fine aggregates from natural sources for concrete. 1970. 13. Beauro of Indian Standards, Concrete Mix Proportioning Guidelines (First Revision). 2009. 14. B. M. Mithun, M. C. Narasimhan, N. Palankar, and A. U. Ravishankar, “Flexural Fatigue performance of Alkali Activated Slag Concrete mixes incorporating Copper Slag as Fine Aggregate,” vol. 10, no. 1, pp. 7–18, 2015. 15. Beauro of Indian Standards, “IS-456-2000-Plain-Reinf-Concrete” 2000. 16. Beauro of Indian Standards, IS 516-1959:Indian Standard Methods of Tests- for Strength of Concrete. 1959. Authors: Ashish Raina, Dhiraj Pathak, Varinder Singh Rana, Gaurav Bathla Paper Title: Consumption Patterns for Ready to Eat Foods Items in Phagwara District of Punjab (India) Abstract: The purpose of this study was to examine consumption patterns for ready to eat foods in Phagwara district of Punjab. The study also focused to read food related lifestyle and behaviour of people towards ready to eat food products available in the markets. Defined objectives of the study were fulfilled by collecting primary data in the form of questionnaires, interviews and observations. Primary data was collected from 184 respondents with the help of 18 close ended questions. Data was subjected to statistical tools to gauze the use of ready to eat foods in specified locations. The study concluded that a major segment of ready to eat food products consumers buy these products at discounts from the super markets in the area and another rapidly consuming segment of ready to eat food products prefer these products as a part of convenience in the lifestyle. Further the results from the descriptive statistics showed the rating by the previous 102. consumers is the most influencing factor in deciding the type and brand of ready to use food product. In order to check the impact of gender on the decision of choosing ready to eat products, data filled by the respondents was referred to independent sample t test. Results from the t test described a difference in the gender while using ratings in consumption 483-486 patterns. The results of the study can be used to develop a proper ready to eat food product market in rural and remote locations of the targeted area.

Keywords: Ready to eat food, Phagwara, food lifestyle and food patterns.

References: 1. Banumathy, S.and Hemameena, M., (2015), Analysis of brand preference of soft drinks in global environment, Indian Journal of Marketing, Vol.36, Issue 6, 12-16 2. Brown, K., Mcllveen, H., and Strugnell, C, (2000), Nutritional awareness and food preferences of young consumers in Northern Ireland, Nutrition and food Science,Vol.30, Issue 4, 230-235. 3. Foret (2006),Behaviour and decision making of Czech consumers when buying beverages, Agricultural Economy, Issue 7, 341–346. 4. Hans, C.M. and Trijp, P,(1996), Why switch Product category level exploitation for true variety seeking behaviour, American Journal of Marketing Research,32(3):105-116. 5. http://www.census2011.co.in/data/town/800158-phagwara-punjab.html 6. Rees, A. M, (1992), ‘Factors influencing consumer choice’, Journal of the Society of Dairy Technology, Vol.45, Issue 4, 112-116. 7. Renuka Hirekenchanagoudar (2008),Consumer behaviour towards ready -to -eat food products, MBA Thesis, University of Agricultural Sciences, Dharwad, 3-87. 8. Srinivasan, N. and Elangovan, D., (2000), Consumer perception towards processed fruits and vegetable products, Indian Journal of Marketing, 30(11):22-25. 9. Venkateshwaralu, Kishore Kumar. M, Rajanath. K, (1987) ‘A Behavioural analysis on consumer decision making’, Indian Journal of Marketing, Issue 4, 3-9. 10. White, G.K. and Manning, B.J, (2001), Convenience, price, product: motivators for online specialty food consumers, Journal of Food Products Marketing, 7(1): 53-65. Authors: Sivamalar.C, Nalanth.N, Dhanalakshmi.K Paper Title: Behaviour of Self Compacting Concrete Columns with Recycled Brick Aggregates Abstract: Recycled brick aggregates are preferable alternatives to natural aggregates for minimizing exploitation of natural resources. In this investigation, experimental and analytical works are performed to investigate the behaviour of SCC columns constructed using partial replacement of natural aggregates by RBA and reinforced with steel fibres. The parameters considered for this study is proportion of RBA in SCC mixture and the amount of fibres used. The results of this study reveal that the use of RBA in the place of natural aggregates slightly reduces the strength properties, but this reduction compensated by adding mineral admixtures and steel fibres. The analytical results agreed with the experimental results for SCC columns behaviour.

Index Terms: Recycled Brick Aggregates, Self-Compacting Concrete, mineral admixtures, strength properties.

References: 1. Wenzhong Zhu, John C. Gibbs, Peter J.M. Bartos, Uniformity of in situ properties of self-compacting concrete in full-scale structural 103. elements, Cement and Concrete Composites, Volume 23, Issue 1, 2001, Pages 57-64, ISSN 0958-9465, https://doi.org/10.1016/S0958- 9465(00)00053-6. 2. Zhi-wu Yu, Fa-xing Ding, C.S. Cai, Experimental behavior of circular concrete-filled steel tube stub columns, Journal of Constructional 487-491 Steel Research, Volume 63, Issue 2, 2007, Pages 165-174, ISSN 0143-974X, https://doi.org/10.1016/j.jcsr.2006.03.009. 3. Shen, W., Liu, Y., Yan, B., Wang, J., He, P., Zhou, C., Huo, X., Zheng, W., Xu, G., 612 Ding, Q., 2017. Cement industry of China: Driving force, environment impact and 613 sustainable development. Rene. Sust. Ener. Revi. 75, 618-628 4. Ge, Z., Wang, Y., Sun, R., Wu, X., Guan, Y., 2015. Influence of ground waste clay brick on properties of fresh and hardened concrete. Constr. Build. Mater. 98, 128- 555 136 5. Debeib, F., Kenai, S., 2008. The use of coarse and fine crushed bricks as aggregate in Concrete. Constr. Build. Mater. 22 (5), 886-893 6. Padmini, A. K., Ramamurthy, K., Mathews, M.S., 2002. Relative moisture movement through recycled aggregate concrete. Mag. Concr. Res. 54(5), 377-384. 7. Vieira, T., Alves, A., Brito, J.D., Correia, J.R., Silva, R.V., 2016. Durability-related performance of concrete containing fine recycled aggregates from crushed bricks and sanitary ware. Mater. Des. 90, 767-776. 8. Gomes, M., Brito, J.D., 2009. Structural concrete with incorporation of coarse recycled concrete and ceramic aggregates: durability performance. Mater. Struct. 42(5), 558 663-675. 9. Hassan M, Ahmed E, Benmokrane B. Punching-shear strength of normal and highstrength two-way concrete slabs reinforced with GFRP bars. J Compos Construction 2013;17(6):04013003 10. Kristiawan SA, Nugroho AP. Creep behaviour of self-compacting concrete incorporating high volume fly ash and its effect on the long-term deflection of reinforced concrete beam. Procedia Eng 2017;171:715–24. Authors: Crispine Shiny, D. David Wilson Paper Title: Life and Personality of Queen Esther and Rani Lakshmibai: A Research Abstract: Tommy Tenney in the book, Hadassah The girl who became Queen Esther describes about the life history of Queen Esther and her struggle to win over the cruel plot of Haman. Shahana Dasgupta in her book, Rani Lakshmibai the Indian heroine describes Rani Lakshmibai as a freedom fighter for Jhansi against the British rule. The Queen of Persia, Esther reigned over 127 provinces starting from Ethiopia to India. She is a brave woman who took a stand for Jews in a crucial time. Through her fasting and spiritual warfare she could able won the favour of King Xerxes. Because of her leading nature the Jews killed the Agagites. Lakshmibai, The Rani of Jhansi was the queen of the Maratha-ruled princely state of Jhansi in India. She was one of the leading personality of the Indian rebellion of 1857, and a symbol of resistance to British rule in India. The name of Rani Lakshmibai in Indian History is synonymous with heroism and courage. In extremely adverse circumstance she staunchly refused to give in to the demands of the formidable opponents, the Britishers; fought them bravely with only a handful of allies and finally sacrificed her life in the battlefield. Esther and Lakshmibai’s biography is similar in many ways like the change of namebefore marriage and after marriage. 104. Hadassah as Esther and Manu as Lakshmibai. Both of them lost their mother in the childhood and raise up by their father. In the case of Esther she was brought up by Mordecai While Lakshmibai was brought up by Moropant. Esther fought for 492-495 Jews to live in Persia and Lakshmibai fought for Marathas to live in Jhansi. This paper intends to do a comparative study on Queen Esther of Persia and Rani Lakshmibhai of Jhansi in India. The paper also portrays how both the women took a strong decision to save their tribe or people from the enemies.

References: 1. Tenny, Tommy and Olsen Andrew Mark. Hadassah:One Night with the King. USA: Bethany house, 2004. Print. 2. ---, Hadassah: The girl who became Queen Esther. USA: Bethany house, 2005. Print. 3. ---, The Hadassah Covenant. USA: Bethany house, 2005. Print. 4. ---, Finding favor with the King. USA: Bethany house, 2003. Print. 5. Anderson, Hugh. Historians of Israel. London: Lutter worth press, 1970. Print. 6. Bassnett, Susan. Comparative Literature a critical Introduction. USA: Blackwell, 1993. Print. 7. Berg, S.B. The book of Esther. Missoula, Mont. Scholars Press, 1979. Print. 8. Dasgupta, Shahana. Rani Lakshmibhai The Indian heroine. India: Rupa Co, 2002. Print. 9. Clines, David J.A. The Esther Scroll. England: JSOT Press, 1984. Print. 10. Collins. The Collins Atlast of World History. Switzerland: British Library Cataloguing Publication, 1987. Print. 11. Cooley, Thomas. Back to the Lake. USA: Norton company, 2012. Print. 12. Dorothy, Charles V. The Books of Esther. England: Sheffield Academic Press, 1997. Print. 13. Dalley, Stephanie. Esther’s Revenge at Susa, USA: Oxford University press, 2007. Print. 14. Dawson, Alma and Connie Van fleet. African American Literature. Chennai: Mutivista Global ltd, 2005. Print. 15. Friedman, Elliott Richard. Who Wrote the Bible. New York: Summit books, 1978. Print. 16. Gabel, B. John., Wheeler and Charles B. The Bible as Literature An Introduction. New 17. York: Oxford University Press, 1986. Print. 18. Howard, M and David Jr. An Indroduction to the Old Testament Historical Books. Chicago: Moody, 1993. Print. 19. Handa, Sushil. Fifth veda entrepreneurs. Larger than life,Rani Laxshmibai. Web. 20 Sept. 2018. 20. Kay. Allison. Literary and Empirical Reading of the Books of Esther. New York: Peter Lang Publishing, 2002. Print. 21. Keller, Werner. The Bible as History. London: Hodder and Stoughton, 1961. Print. 22. Kent, Foster Charles. Israel’s Historical and Biographical Narratives. New York: Charles Scribner’s Sons, 1914. Print. 23. Lambton, Ann. K. S. and Bernard Lewis. The Cambridge History of Islam. London: Cambridge University press. 1970. Print. 24. Levenson, Jon D. Esther A Commentary. London: SCM press Ltd, 1997. Print. 25. Lavanya, S. Critical Perspective on Postcolonial Literature.NewDelhi: Sanbun Publishers, 2016. Print. 26. Lyles, Ron. Bible Book Study Commentary, Ezra Nehemiah, Esther. Tennessee: Sunday school board, 1995. Print. 27. “Learn.culturalindia.net” rani-lakshmibai, Web. 26 Nov. 2018. 28. Media Text Books. Lesson-15.pdf, Rani Laxshmibai. Web. 20 Sept. 2018. 29. Merrill, Eugene. An historical survey of the old testament. New Jersey: The craig press, 1966. Print. 30. “Mallick, David. “An Introduction to the Book of Esther”. 14 June. 2004. Web. 26 Nov. 2018. 31. Moore, Carey. A Esther. Ab7b. Garden city, N.Y: Double day, 1971. Print. 32. Miles, Jack. GOD a Biography. New York: Vintage house, 1995. Print. 33. Paton, Lewis. Bayles Critical and Exegetical Commentary on the Book of Esther. Morrison and gibis ltd, 1964. Print. 34. Rajaram, Kalpana. Facets of Indian Culture. India: Spectrum books P ltd, 2015. Print. 35. “Ranilakshmibai”dailyhunt.in, Newspaper Web. 25. Oct. 2018. 36. “Rani-lakshmibai” Newsworldindia.in, Web. 25. Oct. 2018. 37. Robinson, H. Wheeler. The Old Testament. London: Hodder and Stoughton, 1949. Print. 38. Schuster, Ignatius. Illustrated Bible History. India: St. Paul Publications, 1963. Print. 39. Sharma, A.P. 20 Great women of India. NewDelhi: Prashant Publications, 2000. Print. 40. Swain, James Edgar. A History of World Civilization. India: Eurasia Publishing house, 1984. 41. “Tommy Tenney.” Wikipedia, The Free Encyclopedia. Wikipedia, The Free Encyclopedia, 4 Jul. 2018. Web. 15 Aug. 2018. 42. “The Editors of Encyclopaedia Britannica” Lakshmibai Encyclopedia Britannica, inc. Web. 26. Nov. 2018. 43. “Thefamouspeople.com” rani-lakshmibai, Web. 26 Nov. 2018. 44. “Thequint.com explainers” Rani-Lakshmibai, life history. Web. 26 Nov. 2018. 45. The story of Rani-lakshmibai, tbsplanet.com. Web. 26 Nov. 2018. 46. Thoburn, Stanley. Old Testament Introduction. India: The Christian Literature society, 1961. Print. 47. Trask, R.L. Language and Linguistic. New York: Routledge, 2005. Print. 48. Wells, H.G. History of the World. India: Atlantic Publisher and Distributor, 1994. Print. 49. Wirth, Hana - Nesher and Michael P. Kramer.Jewish American Literature. UK: Cambridge university press, 2003. Print. 50. Woodruff, Stephen B. Esther. Philadelphia: Mason Crest Publishers, 2009. Print. 51. Vincent, Daniel. “Biblical Folklore”. Concept publishing company. New Delhi: 2007. Print Authors: E.Thinakaran, PD.Arumairaj Paper Title: Research on Numerical Modelling in Lake Dynamics Abstract: Lakes are natural water bodies, where flow from single or various rivers is impounded by a natural impediment. Lake water environmental problem has severe effect on human health and the socio-economic sustainable development. So, it’s very important to find the more effective way of controlling the water pollution. Dynamics of lakes is the vast topic, which includes important concepts such as circulation of lakes, pollutant transport and interaction between lakes and hydrology. The hydrological dynamics of lake has been influenced by land cover modification, climate change, and increase in population and development activities within the catchment. Due to less velocity, lake impounds water for some time, and a significant characteristic of a lake is its retention time. Wind is the prevalent force in driving the circulation and in developing turbulent mixing in the lakes. Vertical mixing is caused by this turbulence. During circulation, summer and winter has different wind patterns. Strong wind would cause storm surge, which results in increased, mixing and transport in the surface water systems. Air temperature influence surface waters through heat flux and evaporation exchange between the air and the water. The Coriolis force is certain in large lakes due to earth rotation. Precipitation, tributaries inflow, runoffs, etc are lake water inputs. During numerical simulation of lakes, generally Boussinesq approximation and hydrostatic approximation are considered due to actual density distribution variations in water depth concepts respectively. It is essential to calibrate and verify the model before predictive applications anywhere. A simple numerical hydrodynamic model of a lake includes wind stress, bottom friction, Coriolis 105. force, inflow, outflow, and the bottom topography of the lake. The hydrodynamic model has to be tested for stability, , and sensitivity to parameters such as wind shear, wind direction, and vertical eddy viscosity effects. In this 496-498 paper, the numerical simulation of lake dynamics has been discussed in detail.

Keywords - Numerical simulation, Lake Dynamics, Circulation of Lakes, Model: Calibration & Verification.

References: 1. Andreadakis A, Noutsopoulos C and Gavalaki G, “Assessment of the Water Quality of Lake Plastira through Mathematical modelling for alternative management scenarios”, Global Nest Journal, 2003, Vol. 5, Issue. 2, pp 99-105. 2. Bai H, Chen Y, Wang D, Zou R, Zhang H, Ye R, Ma W and Sun Y, “Developing an EFDC and Numerical Source-Apportionment Model for Nitrogen and Phosphorus Contribution Analysis in a Lake Basin”, Water, 2018, Vol. 10, Issue. 1315, DOI: 10.3390/w10101315. 3. Cheng RT, Powel TM and Dillon TM, “Numerical models of wind-driven circulation in lakes”, Applied Mathematical Modelling, 1976, Vol 1, pp 141 – 159. 4. Beletsky D and Schwab DJ, “Modeling circulation and thermal structure in Lake Michigan: Annual cycle and interannual variability, Journal of Geophysical Research, 2001, Vol. 106, pp 19,745–19,771. 5. Beletsky D, Schwab DJ, Roebber PJ,McCormick MJ, Miller GS and Saylor JH, “Modeling wind-driven circulation during the March 1998 sediment resuspension event in Lake Michigan”, Journal of Geophysical Research, 2003, Vol. 108, DOI:10.1029/2001JC001159. 6. Beletsky D, Saylor JH, and Schwab DJ,”Mean Circulation in the Great Lakes”, Journal of Great Lakes Research, 1999, Vol. 25, Issue. 1, pp 78-93. 7. BHATERIA R AND JAIN D, “WATER QUALITY ASSESSMENT OF LAKE WATER: A REVIEW”, SUSTAINABLE WATER RESOURCES MANAGEMENT, 2016, VOL. 2, ISSUE. 2, PP 161 – 173. 8. Ferhat M, Bensaada S and Bouziane M T, ”Discretization in space for an atmospheric pollution model with finite difference method application in region South Algeria”, Journal of Ecosystem & Ecography, 2014, Vol. 4, Issue. 3, DOI: 10.4172/2157-7625.S1.018. 9. Ibrahim KA and McCorquodale JA, “Finite element circulation model for Lake st. Clair”, Journal of Great Lakes Research, 1985, Vol. 11, Issue, 3, pp 208-222. 10. Jing Z and Kang L, “High-order scheme for the source-sink term in a one-dimensional water temperature model”, Plos One, 2017, Vol. 12, Issue. 3, DOI:10.1371/journal.pone.0173236. 11. Johari H, Rusli N and Yahya Z,” Finite Difference Formulation for Prediction of Water Pollution, IOP Conference Series: Materials Science and Engineering, 2017, Volume 318, conference 1, DOI: 10.1088/1757-899X/318/1/012005. 12. Houghton JT, Ding Y, Griggs DJ, Noguer M, Vander Linden PJ and Xiaosu D, “Climate Change 2001: The Scientific Basis Contribution of Working Group I to the Third Assessment Report of the Intergovernmental Panel on Climate Change (IPCC)”, 2001, Cambridge University Press, Cambridge. 13. Lawrence SP, Hogeboom K and Le Core HL, “A three-dimensional general circulation model of the surface layers of Lake Baikal”, Hydrobiologia, 2002, Vol. 487, pp 95–110. 14. Leon LF and Escalante M, “Flow and pollutant transport in Lake Chapala, Mexico”, Transactions on Ecology and the Environment, 1993, Vol. 2, pp 279 – 286. 15. Li Q, Zhang Q and NAN HY, “Study on Numerical Simulation Model of Lake Water Quality”, International Conference on Environment, Climate Change and Sustainable Development (ECCSD 2016), Beijing, China, 2016, May 28-29, ISBN: 978-1-60595-358-8. 16. Mooij WM, lsmann SH, De Senerpont Domis LN, Nolet BA, Bodelier PLE, Boers PCM, Pires LMD, Gons HJ, Ibelings BW, Noordhuis R, Portielje R, Wolfstein K and Lammens EHRR, “The impact of climate change on lakes in the Netherlands: a review, Aquatic Ecology, 2005, Vol. 39, pp 381–400, DOI 10.1007/s10452-005-9008-0. 17. Pal M, Roy MB and Roy PK, “Wind Induced Lake Circulation Model Application in the Lake Rudrasagar, Tripura (India)”, European Journal of Advances in Engineering and Technology, 2017, Vol. 4, Issue. 5, pp 404-409. 18. Pardo SR, Natti PL, Romeiro NML and Cirilo ER, “A modeling of the carbon-nitrogen cycle transport at Igapó I Lake - Londrina, Paraná, Brazil”, Acta Scientiarum. Technology, 2012, Vol. 34, Issue. 2, pp 217-226. 19. Podsetchine V, Huttula T and Savijärvi H, “A three dimensional-circulation model of Lake Tanganyika”, Hydrobiologia, 1999, Vol. 407, pp 25–35. 20. Rahaman MM and Andallah LS, “Simulation of Water Pollution by Finite Difference Method”, International Journal of Research in Information Technology, 2014, Vol. 2, Issue, 1,pp 17-24. 21. Romeiro NML, Mangili FB, Costanzi RN, Cirilo ER and Natti PL, “Numerical simulation of BOD5 dynamics in Igapó I lake, Londrina, Paraná, Brazil: Experimental measurement and mathematical modelling”, Semina: Exact and Technological Sciences, 2017, Vol. 38, Issue. 2, DOI: 10.5433/1679-0375.2017v38n2p50. 22. Smith GD, "Numerical Solution of Partial Differential Equations: Finite Difference Methods", Oxford University Press, 3rd. Edition, 337 p., 1985. 23. Sun X, Xie L, Semazzi FHM, and Bin Liu, “A Numerical Investigation of the Precipitation over Lake Victoria Basin Using a Coupled Atmosphere-Lake Limited-Area Model”, Advances in Meteorology, 2014, Vol.2014, http://dx.doi.org/10.1155/2014/960924 Authors: Shashikant, Prince Arulraj G Paper Title: A Research Article on “Geopolymer Concrete” Abstract: Concrete is used more than any other man-made material in the world, in fact it is the second most consumed substance in the world after water. The production of concrete is the reason for the emission of 5% of total global 푪푶ퟐ emission. This is high time to think for an alternative to cement since the production of cement is the main reason for 푪푶ퟐemission. There are considerable attempts which have taken place in order to replace cement other materials. One of those is Geo-Polymer Concrete (GPC), which is successful enough to fully replace the cement but with certain limitations. These limitations are making it unpopular among the practicing engineers. Hence, an attempt has been made to consolidate the research works carried out by the researchers in the area of geopolymer concrete. The limitations of geopolymer concrete are also presented.

Keywords: Geopolymer concrete, 푪푶ퟐemission, greenhouse gases

References: 1. Ukesh Praveen P and Srinivasan K (2017) “Self-Compacting Geopolymer Concrete-A Review”, IOP Conf. Ser.: Mater. Sci. Eng. 263 032024: Materials Science and Engineering 2. Manimaran E and Mohankumar G (2017) “Influence Of Sodium Hydroxide Concentration on the Strengthof Fly ash Based GPC”, International Journal of Engineering Sciences & ResearchTechnology 3. Patankar S.V, Ghugal Y.Mand Jamkar S.S, “Effect of Concentration of Sodium Hydroxide and Degree of Heat Curing on Fly ash Based Geopolymer Mortar,” Indian journal of materials science, vol. 2014, pp. 1–6, 2014. 4. Deepa Balakrishnan S, Thomas John V and Job Thomas(2013) “Properties of Fly ash Based Geo-Polymer Concrete”,American Journal of 106. Engineering Research (AJER) e-ISSN: 2320-0847 p-ISSN: 2320-0936 Volume-2 pp-21-25. 5. Satpute Manesh B, Wakchaure Madhukar R and Patankar Subhash V (2012) “Effect of Duration and Temperature of Curing on Compressive Strength of Geopolymer Concrete”, International Journal of Engineering and Innovative Technology (IJEIT) Volume 1, Issue 499-502 5, May 2012 6. B. V. Rangan (2008), Fly Ash Based Geopolymer Concrete, Research Report GC 4 Engineering Faculty, Curtin University of Technology, Perth, Australia 7. Sandeep L.Hake, Dr R. M. Damgir and Dr S.V. Patankar, “State of Art- Investigation of Method of Curing on Geopolymer Concrete,” IOSR Journal of Mechanical and Civil engineering (IOSR-JMCE) e-ISSN: 2278-1684,p-ISSN: 2320-334X, Volume 12, Issue 3 Ver. II (May. - Jun. 2015), PP 40-44 8. Zhang H.Y, Kodur V, Wu B,Yan J, and Yuan Z. S, “Effect of Temperature on Bond Characteristics of Geopolymer Concrete,” Construction and Building Materials, vol. 163, pp. 277–285, Feb. 2018 9. Phoo-ngernkham T, Hanjitsuwan S, Damrongwiriyanupap N, and Chindaprasirt P, “Effect of Sodium Hydroxide and Sodium Silicate Solutions on Strengths of Alkali Activated High Calcium Fly ash Containing Portland Cement,” KSCE Journal of Civil Engineering, vol. 21, no. 6, pp. 2202–2210, Oct. 2016. 10. Oyebisi S, Ede A, Ofuyatan O, Alayande T, Mark G, Jolayemi J and Ayegbo S, “Effects of 12 Molar Concentration of Sodium Hydroxide on the Compressive Strength of Geopolymer Concrete,” IOP Conference Series: Materials Science and Engineering, vol. 413, p. 012066, Sep. 2018. 11. Lăzărescu A, Szilagyi H, Loani A, and Baeră C,“Parameters Affecting the Mechanical Properties of Fly Ash-Based Geopolymer Binders – Experimental Results,” IOP Conference Series: Materials Science and Engineering, vol. 374, p. 012035, Jun. 2018. 12. Adam A. A, Amiri N.H, Suarnita I.W, and Rupang N, “The Effect of Lime Addition on the Setting Time and Strength of Ambient Cured Fly Ash Based Geopolymer Binder,” MATEC Web of Conferences, vol. 47, p. 01015, 2016. 13. Ma C.K, Awang A.Z, and Omar W, “Structural and Material Performance of Geopolymer Concrete: A Review,” Construction and Building Materials, vol. 186, pp. 90–102, Oct. 2018. 14. Albitar M,Mohamed Ali M.S, Visintin P, and Drechsler M, “Durability Evaluation of Geopolymer and Conventional Concretes,” Construction and Building Materials, vol. 136, pp. 374–385, Apr. 2017 15. Al-Majidi M.H, Lampropoulos A, Cundy A, and Meikle S, “Development of Geopolymer Mortar Under Ambient Temperature for in Situ Applications,” Construction and Building Materials, vol. 120, pp. 198–211, Sep. 2016. 16. Mehta A and Siddique R, “Properties of Low-Calcium Fly Ash Based Geopolymer Concrete Incorporating OPC as Partial Replacement of Fly Ash,” Construction and Building Materials, vol. 150, pp. 792–807, Sep. 2017 17. Askarian M, Tao Z, Adam G and Samali B, “Mechanical Properties of Ambient Cured One-Part Hybrid OPC-Geopolymer Concrete,” Construction and Building Materials, vol. 186, pp. 330–337, Oct. 2018. 18. Salas D.A, Ramirez A.D,Ulloa N, Baykara H, and Boero A J, “Life cycle assessment of geopolymer concrete,” Construction and Building Materials, vol. 190, pp. 170–177, Nov. 2018 19. Ferdous M.W,Kayali O and Khennane A (2013) “A Detailed Procedure Of Mix Design for Fly Ash Based Geopolymer Concrete”, Fourth Asia-Pacific Conference on FRP in Structures. 20. Sudhakarreddy K, Angadi S, Sivakondareddy B, Chandrasekharreddy T, and Malagavelli V, “Flexural Behaviour of Cement Added Geopolymer Concrete,” IOP Conference Series: Materials Science and Engineering, vol. 431, p. 092003, Nov. 2018. Authors: G.K Rajini, V.Harikrishnan, Jasmin Pemeena Priyadarisini M, S.Balaji Paper Title: A Research on Different Filtering Techniques and Neural Networks Methods for Denoising Speech Abstract: This paper intends to provide the best suited noise removal technique for de-noising and retrieving clean speech from a noisy speech signal. The aim is to use different de-noising techniques and compare their performance and arrive at a conclusion regarding which one of them is best suited for enhancing voice signals. The analysis is done by evaluating the performance of different denoising techniques for different types of speech samples. This evaluation is done by adding random noise to speech signal then applying denoising techniques to get denoised speech signal. A parallelism is drawn between original signal and denoised signal through evaluation parameters such as SNR and PSNR. The denoising methods are broadly classified as ‘The Filtering Methods’ and ‘The Neural Network Methods’. Under filtering methods four different denoising methods have been used. The four different denoising methods are – Adaptive Filter based on LMS Algorithm, Weiner Filter, Chebyshev Filter and Kalman Filter. Under neural network methods we use three different denoising methods ‘ADALINE’ and two deep learning methods with ‘Fully Connected’ and ‘Fully Convolutional’ neural networks. The performance estimation is done based on variation of evaluation parameters (SNR and PSNR values) for different denoising techniques.

Keywords: Speech denoising techniques, SNR and PSNR evaluation, Filtering techniques, Neural Networks techniques

References: 1. Rodriguez, J. E. F. F. R. E. Y. J., Lim, J., & Singer, E. (1987, April). Adaptive noise reduction in aircraft communication systems. In ICASSP'87. IEEE International Conference on Acoustics, Speech, and Signal Processing (Vol. 12, pp. 169-172). IEEE. 2. Kumari, M., Talukdar, N., & Ali, I. (2016, November). A new gender detection algorithm considering the non-stationarity of speech signal. In 2016 2nd International Conference on Communication Control and Intelligent Systems (CCIS) (pp. 141-146). IEEE. 3. Liu, S., Jin, Y., Yu, H., & Yang, L. (2015, September). Study on the acoustic characteristics of speech and physiological development of vocal organs for two-year-old children. In 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC) (pp. 576-579). IEEE. 4. Wang, H., Lu, Z., Zhao, H., & Feng, H. (2015, September). Application of Parallel Computing in Robust Optimization Design Using MATLAB. In 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC) (pp. 1228-1231). IEEE. 5. Li, C., & Andersen, S. V. (2004, November). Integrating Kalman filtering and multi-pulse coding for speech enhancement with a non- stationary model of the speech signal. In Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004. (Vol. 2, pp. 2300-2304). IEEE. 6. Fujimoto, M., & Ariki, Y. (2000). Noisy speech recognition using noise reduction method based on Kalman filter. In 2000 IEEE 107. International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No. 00CH37100) (Vol. 3, pp. 1727-1730). IEEE. 7. Xia, Y., & Wei, Q. (2016, July). An effective Kalman filtering method for enhancing speech in the presence of colored noise. In 2016 International Conference on Audio, Language and Image Processing (ICALIP) (pp. 469-474). IEEE. 503-511 8. Kim, K., Chung, Y., Park, C., Son, Y., & Yoon, J. (2007, December). Speech quality enhancement based on sinusoidal model using chebyshev filter. In Future generation communication and networking (fgcn 2007) (Vol. 1, pp. 323-327). IEEE. 9. Shahid, M. B., Abbasi, M. A., & Muazzam, M. (2015, December). Detection of noise in high pass IIR digital filters. In 2015 International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM) (pp. 1-5). IEEE. 10. Mendiratta, A., & Jha, D. (2014, January). Adaptive noise cancelling for audio signals using least mean square algorithm. In International Conference on Electronics, Communication and Instrumentation (ICECI) (pp. 1-4). IEEE. 11. Gupta, P., Patidar, M., & Nema, P. (2015, September). Performance analysis of speech enhancement using LMS, NLMS and UNANR algorithms. In 2015 International Conference on Computer, Communication and Control (IC4)(pp. 1-5). IEEE. 12. Jingfang, W. (2011, August). Noisy speech in real time iterative Wiener filter. In 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC) (pp. 2102-2105). IEEE. 13. Plapous, C., Marro, C., & Scalart, P. (2006). Improved signal-to-noise ratio estimation for speech enhancement. IEEE Transactions on Audio, Speech, and Language Processing, 14(6), 2098-2108. 14. Fah, L. B., Hussain, A., & Samad, S. A. (2000). Speech enhancement by noise cancellation using neural network. In 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No. 00CH37119) (Vol. 1, pp. 39-42). IEEE. 15. Darken, C., Chang, J., & Moody, J. (1992, August). Learning rate schedules for faster stochastic gradient search. In Neural Networks for Signal Processing II Proceedings of the 1992 IEEE Workshop (pp. 3-12). IEEE. 16. Liu, D., Smaragdis, P., & Kim, M. (2014). Experiments on deep learning for speech denoising. In Fifteenth Annual Conference of the International Speech Communication Association. 17. Alom, M. Z., Taha, T. M., Yakopcic, C., Westberg, S., Sidike, P., Nasrin, M. S., ... & Asari, V. K. (2019). A State-of-the-Art Survey on Deep Learning Theory and Architectures. Electronics, 8(3), 292. 18. Erseven, M., & Bolat, B. (2018, May). Regression-based speech enhancement by convolutional neural network. In 2018 26th Signal Processing and Communications Applications Conference (SIU) (pp. 1-4). IEEE. 19. Park, S. R., & Lee, J. (2016). A fully convolutional neural network for speech enhancement. arXiv preprint arXiv:1609.07132. 20. Gopichand, G., & Saravanaguru, R. A. K. (2016). A Generic Review on Effective Intrusion Detection in Ad hoc Networks. International Journal of Electrical & Computer Engineering (2088-8708), 6(4). 21. G. Gopichand, R.A.K. Saravanaguru, K. Ramesh Babu, Fully secured intrusion detection system for sensing attacks in MANET, Journal of Advanced Research in Dynamical and Control Systems, vol. 10, no. 4 Special Issue, pp. 810-816, 2018 22. Gopichand G, Saravanaguru RA.K., Collaborative Packet Dropping Intrusion Detection in MANETs, Recent Patents on Computer Science (2019) 12: 1. https://doi.org/10.2174/2213275912666190618163426 23. Gopichand G., Sankeerth K.S., Parlapalli A, Evaluation of recommendation systems using trust aware metrics, International Journal of Recent Technology and Engineering, Volume-7, Issue-6S4, April 2019 24. Gopichand G, Vishal Lella, Sai Manikanta Avula, Enhancing Performance of Map Reduce Workflow through H2HADOOP: CJBT, International Journal of Recent Technology and Engineering, Volume-7, Issue-6S4, April 2019 25. Gopichand G, Sailaja G, N. VenkataVinod Kumar, T. Samatha, Digital Signature Verification Using Artificial Neural Networks, International Journal of Recent Technology and Engineering, Volume-7 Issue-5S2, January 2019 26. Gopichand G, Ra.K.Saravanaguru, .K.Ramesh Babu, Usage of AODV and AOMDV Protocols in Perceiving Black hole Attacks in a MANET, International Journal of Pharmacy & Technology,Volume 8, Issue 4,December 2016 27. Mehta M., Rajesh Mamilla, Sunithavenugopal, Gopichand G, Growth and development of start-ups in India - A study with respect to mechanical and production engineering, International Journal of Mechanical and Production Engineering Research and Development, Volume : 8-2, April 2019 28. Jitesh Shaw, P. M. Durai Raj Vincent, Senthilnathan Palaniappan, ∗, Arun Kumar Sangaiah, Gopichand G, Intelligent Phishing Detection System Using Feature Analysis, Journal of Computational and Theoretical Nanoscience Vol. 15, 2533–2538, 2018 29. Senthilnathan Palaniappan,Saiprasad Palli, Gopichand G, Sirajudeen Ameerjohn, Siva Shanmugam Gopal, Enhanced Handwritten Number Detection Using Kernel Discriminant Analysis (KDA), Journal of Computational and Theoretical Nanoscience Vol. 15, 2539–2543, 2018 30. H R Swathi, Shah Sohini, Surbhi, Gopichand G, Image compression using singular value decomposition, IOP Conference Series: Materials Science and Engineering 263(4). 31. Santhi H, Gopichand G, Gayathri P, Automated Smart Parking System using IoT, Journal of Advanced Research in Dynamical & Control Systems, Vol. 10, 09-Special Issue, 2018 32. P Gayathri, Mayank Agarwal, H Santhi, Gopichand G, Bone Breakage Identification Using Image Processing Techniques, Journal of Advanced Research in Dynamical & Control Systems, Vol. 10, 09-Special Issue, 2018 Authors: Bishwajeet Pandey, Keshav Kumar, Shabeer Ahmad, Amit K Pandit, Deepa Singh, D M Akbar Hussain Paper Title: Leakage Power Consumption of Address Register Interfacing with Different Families of FPGA Abstract: In this paper, we are designing an address register which is sensitive towards rising in voltage. We analysed the power variation of address register on Xilinx 14.1 ISE Design Suite and the code of address register is written in Verilog hardware description language. In this paper, we have used two FPGA of two different families, one is of Virtex family which is Virtex 6 and the other is of Spartan family which is Spartan 6, to study the power consumption of address register. We have observed the different on chips power which are consumed by address register by varying the voltage from 0.75V to 2V for Virtex 6 FPGA and 0.75V to 3V for Spartan 6 FPGA and we observed that when we lower the voltage, lower will be the power consumption. At 2V, Virtex 6 FPGA stops working and the interface of address register with FPGA burns out. For Spartan 6 FPGA, the same happens at 3V voltage.

Keywords – Power variation, Xilinx, Verilog, Voltage Scaling, FPGA. 108. References: 1. Cause and Soultion of Global Energy Crisis, www.conserve-energy-future.com/causes-and-solution-to-the-global-energy-crisis.php, Last 512-514 Accessed on 5th May 2019 2. Definition of Address Register, www.definitions.net/definition/memory+address+register, Last Accessed on 5th May 2019 3. Kabin, D. Kreiser, Z. Dyka, and P. Langendoerfer. "FPGA Implementation of ECC: Low-Cost Countermeasure against Horizontal Bus and Address-Bit SCA." In 2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig), pp. 1-7. IEEE, 2018. 4. W. Tang, and L.Yip. "Hardware implementation of genetic algorithms using FPGA." In The 2004 47th Midwest Symposium on Circuits and Systems, 2004. MWSCAS'04., vol. 1, pp. I-549. IEEE, 2004. 5. M. Chmiel, J. Mocha, E. Hrynkiewicz, and A. Milik. "Central processing units for PLC implementation in Virtex-4 FPGA." IFAC Proceedings Volumes 44, no. 1 (2011): 7860-7865. 6. B. Pandey, and R. Kumar. "Low voltage DCI based low power VLSI circuit implementation on FPGA." In 2013 IEEE Conference on Information & Communication Technologies, pp. 128-131. IEEE, 2013.. 7. B. Pandey, J. Yadav, Y. K. Singh, R. Kumar, and S. Patel. "Energy efficient design and implementation of ALU on 40nm FPGA." In 2013 International Conference on Energy Efficient Technologies for Sustainability, pp. 45-50. IEEE, 2013. 8. E.B. Kavun, and T. Yalcin. "RAM-based ultra-lightweight FPGA implementation of PRESENT." In 2011 International Conference on Reconfigurable Computing and FPGAs, pp. 280-285. IEEE, 2011. Authors: Joseph M. De Guia, Madhavi Deveraj Paper Title: Methods and Trends in Information Retrieval in Big Data Genomic Research Abstract: This paper described information retrieval (IR) and the common methods of finding, extracting, and mining information in genomic research through text mining, and natural language processing (NLP). There was a surge of genomic information from the different literature and the production of genome datasets that catapulted the development of several tools for analyzing and presenting new found knowledge in the biomedical and genome research. This paper presented the recent research trends, survey, reviews, experiments, and concepts in information retrieval applied to text, images and object features in big data genomic research. The method used is exploratory survey research in IR uses in genomic research that presents the concepts, methods, evaluation results and next steps described by the key researchers.

Keywords: Information retrieval, text mining, natural language processing, big data, genome, genomic research.

References: 1. Salton G. (1989). Automatic Text Processing: the transformation, analysis, and retrieval of information by computer. Addison-Wesley; Reading, MA. 109. 2. Van Rijsbergen CJ. (1979). Information Retrieval. Butterworths; London, UK. 3. Baeza-Yates R., Ribeiro-Neto B. (1999). Modern Information Retrieval. Addison-Wesley Longman; Harlow, UK. 515-523 4. Witten IH., Moffat, A., Bell, TC. (1999). Managing Gigabytes. Morgan Kaufman; San Francisco, CA. 5. Sanderson, M., Croft, WB. (2012). The History of Information Retrieval Research. Proceedings of the IEEE, vol. 100, no. Special Centennial Issue, pp. 1444-1451. http://doi.org/10.1109/JPROC.2012.2189916 6. NIST. US Commerce Department. Text Retrieval Conference (TREC). Accessed on June 15, 2018 from https://trec.nist.gov/ 7. Liang, R.Z., Shi, L., Wang, H., Meng, J., Wang, J.J.Y., Sun, Q. and Gu, Y. (2016). Optimizing top precision 8. performance measure of content-based image retrieval by learning similarity function. In Pattern Recognition (ICPR) 23rd International Conference, pp. 2954-2958. 9. Wang, H., Li, Z., Li, Y., Gupta, B.B. and Choi, C. (2018). Visual saliency guided complex image retrieval. Pattern Recognition Letters. 10. Wang, J., Wang, H., Zhou, Y. and McDonald, N. (2015), October. Multiple kernel multivariate performance learning using cutting plane algorithm. In Systems, man, and cybernetics (SMC), 2015 IEEE international conference, pp. 1870-1875. 11. [Wang, H. and Wang, J. (2014). An effective image representation method using kernel classification. In 2014 IEEE 26th international conference on tools with artificial intelligence (ICTAI), pp. 853-858. 12. Reinsel, D., Gantz, J., Rydning, J. (2017). Data Age 2025: The Evolution of Data to Life-Critical Don’t Focus on Big Data; Focus on the Data that’s Big. IDC White Paper by Seagate. Accessed on Sep 2018 from https://www.seagate.com/www-content/our- story/trends/files/Seagate-WP-DataAge2025-March-2017.pdf 13. Statista, The Statistics Portal (2018). Volume of data/information created worldwide from 2005 to 2025 (in zetabytes) Accessed on Sep. 2018 from https://www.statista.com/statistics/871513/worldwide-data-created/ 14. National Human Genome Research Institute (2016). An Overview of the Human Genome Project. Accessed on June 15, 2018 from https://www.genome.gov/12011238/an-overview-of-the-human-genome-project/ 15. Stewart, B., Wild, C. (2014). World Cancer Report. International Agency for Research on Cancer. WHO Press. Retrieved on June 15, 2018 from http://publications.iarc.fr/Non-Series-Publications/World-Cancer-Reports/World-Cancer-Report-2014 16. Omics International (n.d.). Cancer Genomics. Journal of Clinical and Medical Genomics. Accessed on June 15, 2018 from https://www.omicsonline.org/scholarly/cancer-genomics-journals-articles-ppts-list.php Authors: Pierre Eduard Hertzog, Arthur James Swart Paper Title: Pigeon Presence on PV Modules ARE Largely Random Events Abstract: The presence of pigeons on PV modules can negatively affect the output power of a solar renewable energy system. The body of the pigeon itself (and especially the tail) may cause short periods of shading of individual cells, leading to the formation of hotspots. Bird excreta left by the pigeon may cause longer periods of shading, leading to an extended reduction in output power. Some type of intervention may be required to repel pigeons from PV modules, in order to try and maintain the overall efficiency and sustainability of a system. The purpose of this paper is to evaluate the reduction in output power of a pico-solar system in order to determine if a possible pattern, or routine, exists with regard to the presence of pigeons. A 10 W pico-solar system was installed in a semi-arid region of South Africa that is home to the feral pigeon (Columba livia). A pigeon detection technique was developed and applied over a period of 13 months to determine when and for how long these pigeons rest on top of a PV module (these are referred to as events). Although these events are primarily random in nature, results do indicate that feral pigeon presence is lowest on a Wednesday during the week and in the summer periods of January to March during a calendar year. They tend to spend, on average, 118 seconds perched on top a PV module, where their tail and droppings cause the most significant impact in terms of interrupting the direct beam radiation from the sun for an individual cell. It is recommended to use these results in formulating an appropriate intervention that may be used as a scare tactic to repel feral pigeons away from PV modules.

Keywords: Arduino; LabVIEW; semi-arid; power reduction; renewable energy;

References: 1. Oxford Dictionary. (2019, 10 June). Available: http://www.oxforddictionaries.com/ 2. A. J. Swart and P. E. Hertzog, "Varying percentages of full uniform shading of a PV module in a controlled environment yields linear power reduction," Journal of Energy in Southern Africa, vol. 27, pp. 28-38, 2016. 3. D. Cuciureanu, C. Nituca, G. Chiriac, and D. Sticea, "Analysis of the photovoltaic panels currently in use in different locations," presented at the Electrical and Power Engineering (EPE) International Conference, Iasi, Romania, 2016. 4. S. A. Stringham, E. E. Mulroy, J. Xing, D. Record, M. W. Guernsey, J. T. Aldenhoven, et al., "Divergence, convergence, and the ancestry of feral populations in the domestic rock pigeon," Current Biology, vol. 22, pp. 302-308, 2012. 5. G. Gavris, "Current situation and problems of management of pest birds in the cities of Ukraine," Julius-Kühn-Archiv, vol. 432, p. 128, 2011. 6. S. Singh, J. Singh, A. Kaur, J. Kaur, A. P. Vig, and S. A. Bhat, "Nutrient recovery from pigeon dropping by using exotic earthworm Eisenia 110. fetida," Sustainable Chemistry and Pharmacy, vol. 12, p. 100126, 2019/06/01/ 2019. 7. G. Montoya Tena, R. Hernández C, and J. I. Montoya T, "Failures in outdoor insulation caused by bird excrement," Electric Power Systems 524-529 Research, vol. 80, pp. 716-722, 2010/06/01/ 2010. 8. P. E. Hertzog and A. J. Swart, "Detecting the presence of pigeons on PV modules in a pico-solar system " presented at the AFRICON 2017, The Avenue, Victoria and Alfred Waterfront, Cape Town, South Africa. ISBN: 978-1-5386-2774-7, 2017. 9. A. Larsen and P. Lindquist, "Forecasting mismatch losses: An empirical study investigating module level inverter-and string inverter systems," BSc, School of Industrial Engineering and Management, Energy Technology, 2014. 10. K. A. Kim and P. T. Krein, "Hot spotting and second breakdown effects on reverse IV characteristics for mono-crystalline Si photovoltaics," in Energy Conversion Congress and Exposition (ECCE), 2013 IEEE, 2013, pp. 1007-1014. 11. E. Harris, E. de Crom, J. Labuschagne, and A. Wilson, "Visual deterrents and physical barriers as non-lethal pigeon control on University of South Africa’s Muckleneuk campus," SpringerPlus, vol. 5, p. 1884, 2016. 12. P. D. S. Le Roux, "Aspekte van die biologie van tuinduiwe (Columba livia) in die Bloemfonteinse stadsgebied," MSc, Faculty of Nature and Agricultural Sciences, University of the Free State, 2007. 13. AFRICA outlook. (2019, 10 June). Bloemfontein: Lord of the Cities. Available: https://www.africaoutlookmag.com/news/bloemfontein- lord-of-the-cities 14. O. Kok and A. Kok, "Flight intensities of rock pigeons (Columba guinea) and sunflower damage," Suid-Afrikaanse Tydskrif vir Natuurwetenskap en Tegnologie, vol. 9, pp. 77-81, 1990. 15. D. H. Spennemann and M. J. Watson, "Dietary habits of urban pigeons (Columba livia) and implications of excreta pH–a review," European Journal of Ecology, vol. 3, pp. 27-41, 2017. 16. S. Magnino, D. Haag-Wackernagel, I. Geigenfeind, S. Helmecke, A. Dovč, E. Prukner-Radovčić, et al., "Chlamydial infections in feral pigeons in Europe: Review of data and focus on public health implications," Veterinary Microbiology, vol. 135, pp. 54-67, 2009/03/16/ 2009. 17. J. C. Senar, T. Montalvo, J. Pascual, and V. Peracho, "Reducing the availability of food to control feral pigeons: changes in population size and composition," Pest management science, vol. 73, pp. 313-317, 2017. 18. C. News. (2017, 10 June). Calgary hospital deploys falcons to chase off pesky pigeons. Available: https://www.cbc.ca/news/canada/calgary/hospital-falcons-hunting-pigeons-1.4198194 19. B. C. Strik, "Growing blueberries in your home garden," Growing Small Fruits, pp. 1-7, 2008. 20. C. Elliott and E. Bright, "Review of the bird pest problem and bird scaring in south west Nigeria," 2007. 21. A. J. Swart and P. E. Hertzog, "LED’s as viable power loads for experimental purposes relating to PV modules in pico-solar systems," presented at the ICETAS 2017, AMA International University Bahrain, Bahrain, 2017. 22. A. J. Swart and P. E. Hertzog, "Regularly calibrating an energy monitoring system ensures accuracy," Proceedings in Energy, GCESD2018, 2nd Global Conference on Energy and Sustainable Development, vol. 5, pp. 37-45, 18-20 December 2018 2019. 23. C. Handke and C. Herzog, "Experimental Methods in Media Research," in The Palgrave Handbook of Methods for Media Policy Research, H. Van den Bulck, M. Puppis, K. Donders, and L. Van Audenhove, Eds., ed Basingstoke: Palgrave Macmillan, 2017. 24. R. Kahramanoglu, "Analysis of Changes in the Affective Characteristics and Communicational Skills of 25. Prospective Teachers: Longitudinal Study," International Journal of Progressive Education, vol. 14, pp. 177-199, 2018. Authors: Keshav Kumar, Shabeer Ahmad, Bishwajeet Pandey, Amit K Pandit, Deepa Singh, D M Akbar Hussain Paper Title: Power Efficient Frequency Scaled and Thermal-Aware Control Unit Design on FPGA 111. Abstract: These works describe the implementation of a control unit which is an important part of Central Processing Unit (CPU) with the Field Programmable Gate Array (FPGA). In this work a frequency scaled and thermal aware 530-533 energy-efficient control unit is designed with the help of 28 nanometer (nm) technology based FPGA. Frequency varies from 100MHz to 5GHz and the rise in frequency also gives rise in power consumption of control unit with FPGA. The thermal properties of FPGA also increase with increment in frequency. This whole experiment is done on Xilinx 14.1 ISE Design Suit and it is observed that lower the frequency, lower will be the power consumption of FPGA.

Keyword: FPGA, Control Unit, Frequency, Thermal Properties.

References: 1. Roy, SD & Reddy, SRV 2014, 'Signal strength ratio based vertical handoff decision algorithms in integrated heterogeneous networks', Wireless personal communications, vol. 77, no. 4, pp. 2565-2585. 2. Lee, DW, Gil, GT & Kim, DH 2010, ‘A cost-based adaptive handover hysteresis scheme to minimize the handover failure rate in 3GPP LTE system’, EURASIP Journal on Wireless Communications And Networking, 2010:750173. 3. Peng, Y, Zhang, Y, Kou, G & Shi, Y 2012, ‘A multicriteria decision making approach for estimating the number of clusters in a data set’, PLoS One, vol. 7 no. 7, p. 41713. 4. Rathi, R, Khanduja, D & Sharma 2016, ‘Efficiency of fuzzy MADM approach in Six Sigma analysis phase in automotive sector’, Journal of Industrial Engineering International, vol. 12, no. 3, pp. 377–387. 5. Miyim, AM, Ismai, LM & Nordin, R 2014, ‘Vertical handover solutions over LTE-advanced wireless networks: An Overview’, Wireless Personal Communications, vol. 77, no. 4, pp. 3051–3079. 6. Lee, DW, Gil, GT & Kim, DH 2010, ‘A cost-based adaptive handover hysteresis scheme to minimize the handover failure rate in 3GPP LTE system’, EURASIP Journal on Wireless Communications And Networking, 2010:750173. 7. Mehra, L & Gupta, MK 2013, ‘Fuzzy neural networks in vertical handover technology for next generation in wireless networks’, International Journal of Advanced Research in Computer Science, vol. 4, no. 3, pp. 145-150. 8. Mohanty, S & Akyildiz, IF 2006, ‘A (Cross-Layer , no. Layer 2 + 3 ) handoff management protocol for next-generation wireless systems’, IEEE Transactions on Mobile Computing, vol. 5, no. 10, pp. 1347–1360. 9. Jingjing Wang, Deepak Jagtap, Nael Abu-Ghazaleh and Dmitry Ponomarev’ Parallel Discrete Event Simulation for Multi-Core Systems: Analysis and Optimization” IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 6, June 2014 10. Mahamod. Ismail, Mohamad. Shanudin and Raed. Saqour ” Discrete-event Simulation Modeling tool for Routing Process in GPSR Ad Hoc Network Routing Protocol” Proceedings IEEE International Conference on Telecommunications, 2007 Vereecken, Willem, Ward Van Heddeghem, Didier Colle, Mario Pickavet, and Piet Demeester. "Overall ICT footprint and green communication technologies." In 2010 4th International Symposium on Communications, Control and Signal Processing (ISCCSP), pp. 1-6. IEEE, 2010. 11. https://www.igi-global.com/dictionary/key-issues-and-research-directions-in-green-wireless-networking/43606 (17/06/2019). 12. https://www.computerhope.com/jargon/c/contunit.htm (19/6/16). 13. https://www.geeksforgeeks.org/computer-organization-control-unit-and-design/ (19/6/16). 14. Majzoobi, Mehrdad, Farinaz Koushanfar, and Srinivas Devadas. "FPGA-based true random number generation using circuit metastability with adaptive feedback control." In International Workshop on Cryptographic Hardware and Embedded Systems, pp. 17-32. Springer, Berlin, Heidelberg, 2011. 15. E. Koutroulis, K. Kalaitzakis, and V. Tzitzilonis. "Development of an FPGA-based system for real-time simulation of photovoltaic modules." Microelectronics journal 40, no. 7 (2009): 1094-1102. 16. Pandey, Bishwajeet, and Manisha Pattanaik. "Clock gating aware low power ALU design and implementation on FPGA." International Journal of Future Computer and Communication2, no. 5 (2013): 461. 17. Pandey, Bishwajeet, and Manisha Pattanaik. "Low power VLSI circuit design with efficient HDL coding." In 2013 International Conference on Communication Systems and Network Technologies, pp. 698-700. IEEE, 2013. 18. Bansal, Meenakshi, Neha Bansal, Rishita Saini, Bishwajeet Pandey, Lakshay Kalra, and DM Akbar Hussain. "SSTL I/O Standard based environment friendly energyl efficient ROM design on FPGA." In 3rd International Symposium on Environmental Friendly Energies and Applications (EFEA), pp. 1-6. IEEE, 2014. Authors: Tetouani Samir, Chouar Abdelsamad, Soulhi Aziz, Elalami Jamila Paper Title: Big Data Research on the Green Internet of Things in New Smart-Logistics Abstract: Recent advances in information and communication technologies (ICT) have contributed to the evolution of the supply chain and logistics sector. Indeed, the analysis of massive data (Big Data) coming from smart-products makes it possible to extract enormous values for the decision-making of strategic choice: commercial or technical. But this also causes research problems because of the speed of data transmission, the huge volume, and the non- homogeneous types of data. This work provides an overview of the analysis of Big-Data (BD) from the Green Internet of Things (Green-IoT) in new Smart-Logistics. This article begins with a discussion of the needs and challenges of the Green Internet of Things (Green-IoT) and Big Data (BD) analysis in logistics. Then, major data analysis technologies are examined and discussed. In addition, this article also describes future directions in this promising area.

References: 1. WANG, G. et al. Big data analytics in logistics and supply chain management: Certain investigations for research and applications. International Journal of Production Economics, 2016. DOI: https://doi.org/10.1016/j.ijpe.2016.03.014. 2. THOBEN, K.-D.; WIESNER, S.; WUEST, T. "Industrie 4.0" and Smart Manufacturing - A Review of Research Issues and Application Examples. International Journal of Automation Technology, v. 11, n. 1, p. 4-16, 2017. DOI: https://doi.org/10.20965/ijat.2017.p0004. 3. LU, Y.; PAPAGIANNIDIS, S.; ALAMANOS, E. Internet of Things: A systematic review of the business literature from the user and 112. organisational perspectives. Technological Forecasting and Social Change, v. 136, p. 285-297. 2018. DOI: https://doi.org/10.1016/j.techfore.2018.01.022. 534-537 4. DREES, J. Logistics 4.0 - tailored solutions for the future. International Press Workshop. 5. GUBBI, J. et al. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, v. 29, n. 7, p. 1645-1660, 2013. DOI: https://doi.org/10.1016/j.future.2013.01.010. 6. KIM, S.; KIM, S. A multi-criteria approach toward discovering killer IoT application in Korea. Technological Forecasting and Social Change, v. 102, p. 143-155, 2016. DOI:https://doi.org/10.1051/matecconf/201713400027. 7. GOLDSBY, T. J.; ZINN, W. Technology Innovation and New Business Models: can logistics and supply chain research accelerate the evolution? Journal of Business Logistics. v. 37, n. 2, p. 80-86. 2016. 8. LU, Y. Industry 4.0: A survey on technologies, applications and open research issues. Journal of Industrial Information Integration, v. 6, p. 1-10. 2017. DOI: https://doi.org/10.1016/j.jii.2017.04.005. 9. UCKELMANN, D.; HARRISON, M.; MICHAHELLES, F. Architecting the Internet of Things. Architecting the Internet of Things. s. n., p. 1-24. DOI: https://doi.org/10.1007/978-3-642-19157-2. 10. Zhu, C., Leung, V. C., Shu, L., & Ngai, E. C. H. (2015). Green internet of things for smart world. IEEE Access: Practical Innovations, Open Solutions, 3, 2151-2162. doi:10.1109/ACCESS.2015.2497312 11. Albreem, M. A., El-Saleh, A. A., Isa, M., Salah, W., Jusoh, M., Azizan, M. M., & Ali, A. (2017). Green internet of things (IoT): An overview. In: Smart Instrumentation, Measurement and Application (ICSIMA), 2017 IEEE 4th International Conference on. IEEE, 2017. p. 1-6. 12. MAJEED, M. A. A.; RUPASINGHE, T. D. Internet of things (IoT) embedded future supply chains for industry 4.0: an assessment from an ERP-based fashion apparel and footwear industry. International Journal of Supply Chain Management, v. 6, n. 1, p. 25-40, 2017. 13. ZANELLA, A et al. Internet of Things for Smart Cities. IEEE Internet of Things Journal, v. 1, n. 1, p. 22-32, 2014. DOI: https://doi.org/10.1109/JIOT.2014.2306328. 14. MACAULAY, J.; BUCKALEW, L.; CHUNG, G. Internet of Things in Logistics. DHL Trend Research, v. 1, n. 1, p. 1-27, 2015. 15. TU, M. An exploratory study of Internet of Things (IoT) adoption intention in logistics and supply chain management - a mixed research approach. The International Journal of Logistics Management, s.n. p. 1-10, 2018. DOI: https://doi.org/10.1108/IJLM-11-2016-0274. 16. ROSSMANN, B. et al. The future and social impact of Big Data Analytics in Supply Chain Management: Results from a Delphi study. Technological Forecasting and Social Change, v. 130, p. 135-149. 2017. DOI: https://doi.org/10.1016/j.techfore.2017.10.005. 17. TIWARI, S.; WEE, H. M.; DARYANTO, Y. Big data analytics in supply chain management between 2010 and 2016: Insights to industries. Computers and Industrial Engineering, v. 115, p. 319-330, 2018. DOI: https://doi.org/10.1016/j.cie.2017.11.017. 18. ZHONG, R. Y. et al. Big Data for supply chain management in the service and manufacturing sectors: Challenges, opportunities, and future perspectives. Computers & Industrial Engineering, v. 101, p. 572-591, 2016. DOI: https://doi.org/10.1016/j.cie.2016.07.013. 19. WALLER, M. A.; FAWCETT, S. E. Print a maker movement supply chain: How invention and entrepreneurship will disrupt supply chain design. Journal of Business Logistics, 2014. DOI: https://doi.org/10.1111/jbl.12045. 20. RICHEY, R. G. et al. A global exploration of Big Data in the supply chain. International Journal of Physical Distribution & Logistics Management, v. 46, n. 8, p. 710-739, 2016. DOI: https://doi.org/10.1108/IJPDLM-05-2016-0134. 21. ZHU, S. et al. How supply chain analytics enables operational supply chain transparency: An organizational information processing theory perspective. International Journal of Physical Distribution & Logistics Management, v. 48, n. 1, p. 47-68, 2018. DOI: https://doi.org/10.1108/IJPDLM-11-2017-0341. 22. WANG, K. Logistics 4.0 Solution New Challenges and Opportunities. Proceedings of the 6th International Workshop of Advanced Manufacturing and Automation. 2016. DOI: https://doi.org/10.2991/iwama-16.2016.13. 23. VASSAKIS, K.; PETRAKIS, E.; KOPANAKIS, I. Big Data Analytics: Applications, Prospects and Challenges. Mobile Big Data. v. 10, p. 3-20,2018. DOI: https://doi.org/ https://doi.org/10.1007/978-3-319-67925-9_1. 24. ZHONG, R. Y. et al. Big Data for supply chain management in the service and manufacturing sectors: Challenges, opportunities, and future perspectives. Computers & Industrial Engineering, v. 101, p. 572-591, 2016. DOI: https://doi.org/10.1016/j.cie.2016.07.013. 25. WANG, G. et al. Big data analytics in logistics and supply chain management: Certain investigations for research and applications. International Journal of Production Economics, 2016. DOI: https://doi.org/10.1016/j.ijpe.2016.03.014. 26. LAMBERT, D. M. The Development of an Inventory Costing Methodology: a study of the costs associated with holding inventory. The Ohio State University Press, 1975. 27. HOFMANN, E. Big data and supply chain decisions: the impact of volume, variety and velocity properties on the bullwhip effect. International Journal of Production Research, v. 55, n. 17, p. 5108-5126. 2017. DOI: https://doi.org/10.1080/00207543.2015.1061222.

Authors: Neriza V. Bustillo, Thelma D. Palaoag, Joseph Kristian Reyes Paper Title: An Architectural Model on Employment Opportunities as Aftercare Program Abstract: The aftercare program of a drug rehabilitation center is a continuing treatment receive by ex-drug abusers immediately after being discharged from a residential rehabilitation center. This program caters services that help in the development of skills of ex-drug abusers as they move out from the facility of the rehabilitation center for them earn for living. The rehabilitation centers offer opportunities for employment as they allow other agencies to offer job and training and seminar services for ex-drug abusers. In the implementation of the job opportunities as an aftercare program, the selection of ex-drug abuser who is ready to work, ready to be trained, and ready for a further referral is a crucial decision. To this end, an architectural model that can match ex-drug users profile and relevant jobs, training, and referrals were needed. The developed architecture will serve as their basis for a decision support system development.

Keywords: architectural model; employment opportunities; ex-drug abusers.

References: 1. National Institute On Drug Abuse (2014), Treatment Approaches For Drug Addiction, Available at 113. http://www.drugabuse.gov/ publications/ drugfacts /treatment-approaches-drugaddiction 2. Makinano, M. (2018), Rethinking PH drug policy: Points for considerations, Manila Times, Available at: 538-541 https://www.pressreader.com/ 3. Carcamo, D. (2015), PDEA: 92% of Metro Manila barangays drug-affected, The Philippine Star. https://www.philstar.com/nation/2015/02/19/1425462/p dea-92-metro-manila-barangays -drug-affected 4. Raymundo, P.T. (2017) PNP resumes Tokhang to look into 1.18 M drug surrenderees. Retrieved from 5. http://www.canadian inquirer.net/2017/03/11/pnp-resumes-tokhang-to-look-into-1-18-m-drug-surrenderees/ 6. Palatino, M. (2017), Duterte’s ‘War on illicit drugs’ in the Philippines: By the numbers. The Diplomat. 7. Retrieved from http://thediplomat.com/2017/01/ dutertes -war-on-illicitdrugs-in-the-philippines-by-the- numbers/ 8. Fedotov, Y. (2018) World Drug Report, United Nations Publication, Sales No. E.18.XI.9 ISBN: 978-92-1- 9. 148304-8, eISBN: 978-92-1-045058-4, Available at: 10. https://www.unodc.org/ wdr2018/prelaunch/ WDR18_Booklet_4_YOUTH.pdf 11. World Drug Report (2017), World Drug Report 2017: 29.5 million people globally suffer from drug use 12. disorders, opioids the most harmful, Available at https://www.unodc.org/unodc/en/press/releases /2017/June/world-drug-report-2017_-29-5-million-people-globally-suffer-from-drug-use-disorders-- opioids- the-most-harmful.html Authors: Joe Marie D. Dormido, Thelma D. Palaoag Paper Title: A Design Architecture for Developing Agricultural Product Forecasting System Application for Farmers Abstract: One-third of the labor force in the Philippines is engaged in farming. Farmers played an important role in providing every family with the fresh food needed daily for our health. Helping farmers build a stronger network to 114. market their products eventually created sustainability within the agricultural sector. The establishing of agricultural forecasting mobile application shall serve both the farmers and traders better in making sure that the harvested crops 542-547 earned profits. The developed architecture design shall be adopted for agricultural forecasting applications. The study examined the factors considered in the development of a mobile application assistant to the agricultural sector. The use of different statistical tools helped in providing in-depth analysis which resulted in a more accepted designed for the farmers. The results show, that having identified some common problems in providing online services shall likewise solve certain issues and offer solutions to the best practices in the forecasting of agricultural production. It indicated that having a mobile agricultural forecasting application solved the issues in the waste production of farm products. The application shall help the farmers checked the level of crop demand in the market and navigate the place in which the demand is high in farm production in the participated trading post. This became beneficial to both farmers and the government in strengthening the agricultural sector, which is far behind from other developing countries.

Index Terms: agricultural product, agricultural sector, forecasting, mobile application.

References: 1. K. Ash, “Further agricultural reforms in the Philippines would help reduce poverty and improve food security,” [online] Available at: https://www.oecd.org/agriculture/further-agricultural-reforms-in-the-philippines-would-help-reduce-poverty-and-improve-food- security.htm [Accessed 18 Feb. 2019]. 2. Fee.org. (2019). The Farm Problem and Government Farm Programs, E.C. Pasour. [online] Available at: https://fee.org/articles/the-farm- problem-and-government-farm-programs/ [Accessed 21 Feb. 2019]. 3. Trobe, Helen La. "Farmers' markets: consuming local rural produce." International journal of consumer studies 25, no. 3 (2001): 181-192. 4. Zhang, Wensheng, Hongfu Chen, and Mingsheng Wang. "A forecast model of agricultural and livestock products price." In International Conference on Computer and Computing Technologies in Agriculture, pp. 40-48. Springer, Berlin, Heidelberg, 2009. 5. Guzman, S. S. (2018, June 17). Agriculture is dying in the Philippines. Retrieved from https://www.philstar.com/opinion/2018/06/18/1825542/agriculture-dying-philippines [Accessed 21 Feb. 2019]. 6. [6] Gelb, Ehud M. "Adoption of IT by farmers-Does reality reflect the potential benefit." In Proceedings Second European Conference EFITA, pp. 433-441. 1999. 7. Thysen, Iver. "Agriculture in the information society." Journal of agricultural engineering research 76, no. 3 (2000): 297-303. 8. Ascough II, James C., Dana L. Hoag, W. Marshall Frasier, and Gregory S. McMaster. "Computer use in agriculture: an analysis of Great Plains producers." Computers and electronics in agriculture 23, no. 3 (1999): 189-204. 9. Allen, P. Geoffrey. "Economic forecasting in agriculture." International Journal of Forecasting 10, no. 1 (1994): 81-135. 10. Wyche, Susan, and Charles Steinfield. "Why don't farmers use cell phones to access market prices? Technology affordances and barriers to market information services adoption in rural Kenya." Information Technology for Development 22, no. 2 (2016): 320-333. 11. Warren, Martyn. "Farmers online: drivers and impediments in adoption of Internet in UK agricultural businesses." Journal of Small Business and Enterprise Development 11, no. 3 (2004): 371-381. 12. Esa. (n.d.). Agricultural forecasting. Retrieved from https://www.esa.int/Our_Activities/Observing_the_Earth/Benefiting_Our_Economy/Agricultural_forecasting [Accessed 5 Jun. 2019]. 13. McCue, C. (2014). Data mining and predictive analysis: Intelligence gathering and crime analysis. Butterworth-Heinemann. 14. Virginia Braun & Victoria Clarke, Using thematic analysis in psychology, in Qualitative Research in Psychology, Volume 3(2), 2006. 15. Bhattacherjee, A. Social Science Research: Principles, Methods, and Practices; Global Text Project: Athens,Georgia, 2012. Authors: Jane M. Fernandez, Thelma D. Palaoag, Josephine Dela Cruz Paper Title: An Assessment of the Mobile Games Utilization and It’s Effect to One’s Computational Thinking Skills Abstract: Transformation of knowledge can be obtained anytime anywhere but where and how you learn make all the difference. The increased number of different online games attract young people that can turn to addiction or cause dropout or sometimes makes them inspired. On the other hand, computational thinking skills are vital skills for the students in order to reduce the skills gap between education and the workplace. Computational thinking skills shall help the students become problem solver and innovator, when students have the capacity to determine what to extract from a system or problem in order to create a solution they are forced to think differently about the most important elements of what they are working with and remove irrelevant factors. The main purpose of this study is to assess the computational thinking among students on the mobile games utilization. The researcher employed quantitative data analysis and documentary analysis was used to measure the effect of mobile games utilization using Scholastic Abilities Test for Adults(SATA).The result of the study have average effect to enhance computational thinking. It also reveals that mobile games utilization such as collaboration actions provide incentives to engage with learning.

Keywords— computational thinking skills, mobile games, mobile games utilization

References: 1. Anderson, Janna and Lee Rainie. (2012,February 29).Main findings: Teens, technology, and human potential in 202 115. 2. Boyle, E., Connolly, T. M., & Hainey, T. (2011). The Role of Psychology in Understanding the Impact of Gomputer games. Entertainment Computing, 2(2), 69-74. 548-552 3. Castillo J. & Dumrique D. (2018).Online Gaming: Impact on the Academic Performance and Social Behavior of the Students in Polytechnic University of the Philippines Laboratory High School 4. Goldstein, Jeffrey, (2012) “Play in Children’s Development, Health and Well-Being”, Toy Industries of Europe. 5. Hatice Durak Yildiz, Fatma Gizem Karaoglan Yilmaz, Ramazan Yilmaz Bartin University, Turkey ,Examining the Relationship between Digital Game Preferences an Computational hinking S, Contremporary educational technology, 2017, 8(3), 359 369killsHarris, C. (2009). 6. Huitt, W. (1998). Critical thinking: An overview. Educational Psychology Interactive. Valdosta, GA: Valdosta State University. Retrieved from http://www.edpsycinteractive.org/topics/cogsys/critthnk.html [Revision of paper presented at the Critical Thinking Conference sponsored by Gordon College, Barnesville, GA, March, 1993. 7. J. M. Wing,“Computational thinking,” Commun. ACM, vol.49, no. 3, pp. 33–35, 2006. 8. J. M. Garrido,Introduction to Computational Modeling Using C and Open-Source Tools. CRC Press, 2014. 9. ISTE (2015). CT Leadership toolkit. Retrieved on 19 January 2017 10. Kuss, Daria J. and MD.Griffiths.(2012).Adolescent Online 11. MacKenty, B. (2006). All Play and Retrieved frohttps://owl.english.purdue.edu/pwl/resource/560/07 Journal,52,46 48. 12. Morelli, R., De Lanerolle, T., Lake, P., Limardo, N., Tamotsu, E.,&Uche, C. (2011).Can android app inventor bring computational thinking to k-12. In Proc. 42nd ACM Technical Symposium On Computer Science Education (SIGCSE'11) 13. Sadi, S., Şekerci, A. R., Kurban, B., Topu, F. B.,Demirel, T., Tosun, C.,Demirci, T., & Göktaş, Y. (2008). Effective technology use in teacher education: the views of faculty members and preservice teachers.International Journal of Informatics Technologies, 1(3), 4349. 14. Syvanen, A., Beale, R., Sharples, M., Ahonen, M., & Lonsdale, P. (2005). Supporting pervasive learning environments: adaptability and context awareness in mobile learning. In Procedings of the IEEE International workshop on wireless and mobile technologies in education (WMTE’05) (pp. 251–253). 15. Schofield, D. (2014). A virtual education: Guidelines for using games technology. Journal of Information Technology Education: Innovations in Practice, 13, 25-43. Retrieved 16. Valerie Barr and Chris Stephenson. 2011.Bringing computational thinking to K-12: What is involveand what is the role of the Computer science education community? ACM Inroads 2, 1, 48-5 17. Wing, J. M. (2008).Computational thinking. Communications of the ACM, 49(3), 33-35 18. Yadar, A., Mayfield, C., Zhou, N., Hambrusch, S.,and Korb, J. T. 2014. Computational thinking in elementary and secondary teacher education. ACM Trans. Comput. Educ. 14, 1, Article 5 (March 2014) 19. Roschelle, J. (2003). Unlocking the learning value of wireless mobile devices. Journal of Computer Assisted Learning, 19(3), 260–27 20. Güney, C., & Çelik, R. N. (2009). Spatial informatics and spatial governance. 12. Turkey Scientific and Technical Mapping Conference, 11-15 May 2009,Ankara. 21. Korkmaz, Ö., Çakır, R., Özden, M. Y., Oluk, A., & Sarıoğlu, S. (2015). Investigation of individuals’ computational thinking skills in terms of different variables. Ondokuz Mayis University Journal of Faculty of Education, 34(2), 68-87. 22. Green CS, Li R, Bavelier D. Perceptual learning during action video game playing. Topics in Cognitive Science. 2010;2:202–216 23. Jake A. Qualls and Linda B. Sherrell. 2010. Why computational thinking should be integrated into the curriculum. J. Comput. Sci. Colleges 25, 66–71. 24. , H., & Erden, O. (2004). A research about primary school students level who takes advantage from information technology. The Turkish Online Journal of Educational Technology, 3(1), 120- 130. 25. Mete Akcaoglu. Learning problem-solving through making games at the game design and learning summer program. Association for Educational Communications and Technology 2014. 26. Scott Douglas McDonald. Enhanced Critical Thinking Skills Through Problem-Solving Games in Secondary Schools. RMIT University, HCMC, Vietnam 2017 Authors: Vijayakumar Sajjan, Pramod Sharma Paper Title: Research on an Iot Based Air Pollution Monitoring System Abstract: Humankind, moving to a period centered upon improvement has overlooked the significance of supportability and has been the real guilty party behind the rising Pollution levels in the world's air among all other living life forms. The Pollution levels at certain spots have come to such high degrees that they have begun hurting our very own It will being. An IoT based Air Pollution observing framework incorporates a MQ Series sensor interfaced to a Node MCU outfitted with an ESP8266 WLAN connector to send the sensor perusing to a Thing Speak cloud. Further extent of this work incorporates an appropriate AI model to foresee the air Pollution level and an anticipating model, which is fundamentally a subset of prescient displaying. As age of poisonous gases from ventures, vehicles and different sources is immensely expanding step by step, it winds up hard to control the dangerous gases from dirtying the unadulterated air. In this paper a practical air Pollution observing framework is proposed. This framework can be utilized for observing Pollutions in demeanor of specific territory and to discover the air peculiarity or property examination. The obligated framework will concentrate on the checking of air poisons concentrate with the assistance of mix of Internet of things with wireless sensor systems. The investigation of air quality should be possible by figuring air 116. quality index (AQI). 553-558 Index Terms — MCU, WLAN, AQI Etc.

References: 1. D.Yaswanth, Dr Syed Umar,-" A Study on Pollution Monitoring system inWireless Sensor Networks",-D.Yaswanth et al | IJCSET |September 2013 | Vol 3, Issue 9, 324-328. 2. Anil H. Sonune, S.M.Hambarde,-" Monitoring and Controlling of Air Pollution Using Intelligent Control System",- International Journal of Scientific Engineering and Technology ISSN: 2277-1581,Volume No.4 Issue No5, pp: 310-313. 3. Martinez, K., Hart, J. K., Ong, R., "Environmental SensorNetworks," IEEE Computer, Vol. 37, No. 8, pp. 50-56. 4. Nikheel A. Chourasia, Surekha P. Washimkar," ZigBeeBased Wireless Air Pollution Monitoring" InternationalConference on Computing and Control Engineering(ICCCE 2012), 12 & 13 April, 2012 5. R. Rajagopalan and P.K. Varshney, "Data-AggregationTechniques in Sensor Networks: A Survey," IEEECommunication Surveys and Tutorials, Vol. 8 (4), pp.48-63, December 2006. 6. Mainwaring, A., Polastre, J., Szewczyk, R., Culler, D.,Anderson, J. "Wireless Sensor Networks for HabitatMonitoring," ACM International Workshop on WirelessSensor Networks and Applications, EUA. Authors: Ravikanth.M, D.Vasumathi Paper Title: An Adaptive Multiple Databases for Rough Set Based Record Deduplication Abstract: Theoretical. Records duplication is the circumstance wherein unequivocal record is accessible with it's constantly number of copies in the database. To see the records that address a close guaranteed substance, record planning methodology is associated. Today, this is the most signi cant and testing task. The closeness of duplicates in the database will absurdly realize more querry dealing with time and solicitation of extra control resources, etc. To avoid these issues and results, records deduplication strategy is performed. In this paper, a Rough set based instrument is proposed which e ciently plays out the records planning strategy. These datasets are set up through our records deduplication handling model. Close to the end, algo-rithm produces the dataset gathering, contains exceptional record sections. A short time later, in this paper, investigate results are shown, which are 117. per-formed for standard datasets and execution is poor down 559-567 Keywords: Duplicate detection, Record linkage, Data deduplication, Data in-tegration, Records matching, Rough sets.

References:

1. M. Wheatley, "Activity Clean Data", CIO Asia Magazine, http:==www.cio-asia.com, Aug 2004. 2. N. Koudas, S. Sarawagi, and D. Srivastava, "Record Linkage: Similarity Measures and Algorithms", Proc. ACM SIGMOD International Conference on Management of Data, pp. 802-803, 2006. 3. I. Bhattacharya and L. Getoor, "Iterative Record Linkage for Cleaning and Inte-gration", Proc. ninth ACM SIGMOD Workshop Research Issues in Data Mining and Knowledge Discovery, pp. 11-18, 2004. 4. I.P. Fellegi and A.B. Sunter, "A Theory for Record Linkage", J. Am. Measurable Association, vol. 66, no. 1, pp. 1183-1210, 1969. 5. R. Chime and F. Dravis, "Would you say you is Data Dirty? also, Does that Matter?", Accenture Whiter Paper, http:==www.accenture.com, 2006. 6. Pawlak, Z. (1982). Harsh sets. Global Journal of Computer and Information Sciences, 11(5), 341356. 7. S. Lawrence, C.L. Giles, and K.D. Bollacker, "Self-governing Citation Matching", Proc. Third Int'l Conf. Self-sufficient Agents, pp. 392- 393, 1999. 8. S. Lawrence, L. Giles, and K. Bollacker, "Advanced Libraries and Autonomous Cita-tion Indexing", Computer, vol. 32, no. 6, pp. 67-71, June 1999. 9. Kuo-Si Huang, Chang-Biau Yang, and Kuo-Tsung Tseng, "Quick Algorithms for Finding the Common Subsequence of Multiple Sequences", National Science Coun-cil of the Republic of China, NSC-90-2213-E-110-015. 10. H. Galhardas, D. Florescu, D. Shasha, E. Simon, and C. Saita. Decisive information cleaning: Language, model and calculations. In Proc. of the 27th Int'l Conference on Very Large Databases (VLDB), pages 307{316, Rome,Italy, 2001. 11. L. Gravano, Panagiotis, and H. V. Jagadish. Inexact string participates in a database (nearly) for nothing. In Proc. of the 27th Int'l Conference on Very Large Databases (VLDB), Rome,Italy, 2001. 12. M. A. Hernandez and S. J. Stolfo. Genuine information is grimy: Data purifying and the union/cleanse issue. Information Mining and Knowledge Discovery, 2(1):9{37, 1998. 13. J. Hylton. Recognizing and consolidating related bibliographic records. Ace's proposition, MIT, 1996. 14. V. S. Iyengar, C. Apte, and T. Zhang. Dynamic getting the hang of utilizing versatile resampling. In R. Ramakrishnan, S. Stolfo, R. Bayardo, and I. Parsa, editors, Proceedinmgs of the sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-00), pages 91{98, N. Y., Aug. 20{23 2000. ACM Press. 15. R. Kohavi, D. Sommer_eld, and J. Dougherty. Information mining utilizing MLC++: An AI library in C++. In Tools with Arti_cial Intelligence, pages 234{245. IEEE Computer Society Press, accessible from http://www.sgi.com/tech/mlc/, 1996. 16. S. Lawrence, C. L. Giles, and K. Bollacker. Advanced libraries and independent reference ordering. IEEE Computer, 32(6):67{71, 1999. 17. R. Liere and P. Tadepalli. Dynamic learning with boards for content arrangement. In Proceedings of AAAI-97, fourteenth Conference of the American Association for Arti_cial Intelligence, pages 591{596, Providence, US, 1997. AAAI Press, Menlo Park, US. 18. A. McCallum, K. Nigam, J. Reed, J. Rennie, and K. Seymore. Cora: Computer science research paper web index. http://cora.whizbang.com/, 2000. 19. A. McCallum, K. Nigam, and L. H. Ungar. E_cient grouping of high-dimensional informational collections with application to reference coordinating. In Knowledge Discovery and Data Mining, pages 169{178, 2000. 20. A. K. McCallum and K. Nigam. Utilizing EM in pool-based dynamic learning for content classi_cation. In J. W. Shavlik, editorial manager, Proceedings of ICML-98, fifteenth International Conference on Machine Learning, pages 350{358, Madison, US, 1998. Morgan Kaufmann Publishers, San Francisco, US. 21. T. Mitchell. AI. McGraw-Hill, 1997. 22. A. E. Monge and C. P. Elkan. The _eld coordinating issue: Algorithms and applications. In Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96), 1996. 23. G. Navarro. A guided visit to inexact string coordinating. ACM Computing Surveys, 33(1):31{88, 2001. 24. J. R. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufman, 1993. programming accessible from http:/www.cse.unsw.edu.au/~quinlan/c4.5r8.tar.gz. 25. V. Raman and J. M. Hellerstein. Potters wheel: An intelligent information cleaning framework. In Proc. of the 27th Int'l Conference on Very Large Databases (VLDB), pages 307{316, Rome,Italy, 2001. 26. S. Sarawagi, editorial manager. IEEE Data Engineering uncommon issue on Data Cleaning. http://www.research. microsoft.com/look into/db/debull/A00dec/issue. htm, December 2000. 27. G. Schohn and D. Cohn. Toning it down would be best: Active learning with help vector machines. In Proc. seventeenth International Conf. on Machine Learning, pages 839{ 846. Morgan Kaufmann, San Francisco, CA, 2000. 28. H. S. Seung, M. Opper, and H. Sompolinsky. Question by board. In Computational Learing Theory, pages 287{294, 1992. 29. S. Toney. Cleanup and deduplication of a global bibliographic database. Data Technology and libraries, 11(1):19 { 28, 1992. 30. S. Tong and D. Koller. Bolster vector machine dynamic learning with applications to content classi_cation. Diary of Machine Learning Research, 2:45{66, Nov. 2001. 31. W. E. Winkler. Coordinating and record linkage. In B. G. C. et al, proofreader, Business Survey Methods, pages 355{384. New York: J. Wiley, 1995. accessible from http://www.census.gov/. 32. W. E. Winkler. The condition of record linkage and flow inquire about issues. RR99/04, http://www.census.gov/srd/papers/pdf/rr99- 04.pdf, 1999. 33. B. Zadrozny and C. Elkan. Learning and settling on choices when expenses and probabilities are both obscure. In Proceedings of the Seventh International Conference on Knowledge Discovery and Data Mining (KDD), 2001. 34. T. Zhang and F. J. Oles. A likelihood investigation on the estimation of unlabeled information for classi_cation issues. In Proc. seventeenth International Conf. on Machine Learning, pages 1191{1198. Morgan Kaufmann, San Francisco, CA, 2000. Authors: M.V.Vijaya Saradhi, Kalli Srinivasa Nageswara Prasad Paper Title: Predictive Analytics for Obstructive Sleep Apnea Detection Abstract: many of the research studies that have focused on the issue of sleep apnea conditions among the people, emphasize the fact that the numbers are rising in significant numbers year on year. Profoundly, identifying symptoms in the patients is very important to ascertain the possible impact of sleep apnea in patients. The researchers in earlier studies have focused on the conditions of systematical physical examination over the patients who are prone to physical examination for head and neck aches, has relative impact of the osa conditions and also on some scoring-based models using the machine learning solutions. The scope of a new model could be about identification of the features in two stage model. The first stage could be about understanding the lifestyle and psychological conditions of the patient data and accordingly choose the metrics and the model of osa detection tool that can be used for analysis. If such comprehensive approach can be developed, it can be effective process for developing a sustainable solution. 118.

Keywords: obstructive sleep apnea, ahi index, machine learning, contemporary information system. 568-573

References: 1. Mencar, Corrado, et al. "Application of machine learning to predict obstructive sleep apnea syndrome severity." Health informatics journal (2019): 1460458218824725. 2. Bozkurt, Selen, Asli Bostanci, and Murat Turhan. "Can Statistical Machine Learning Algorithms Help for Classification of Obstructive Sleep Apnea Severity to Optimal Utilization of Polysomno graphy Resources?" Methods of information in medicine 56.04 (2017): 308- 318. 3. Stretch, Robert, et al. "0465 Performance of Revised Machine Learning Models for Prediction of Non-Diagnostic Home Sleep Apnea Tests." Sleep 42. Supplement_1 (2019): A187-A187. 4. Musman, Silvio, et al. "Evaluation of a prediction model for sleep apnea in patients submitted to polysomnography." Journal Brasileiro de Pneumologia 37.1 (2011): 75-84. 5. Myers, Kathryn A., Marko Mrkobrada, and David L. Simel. "Does this patient have obstructive sleep apnea? The Rational Clinical Examination systematic review." Jama 310.7 (2013): 731-741. 6. Zou, Jianyin, et al. "An effective model for screening obstructive sleep apnea: a large-scale diagnostic study." PloS one 8.12 (2013): e80704. 7. Zonato, Adriane I., et al. "Association of systematic head and neck physical examination with severity of obstructive sleep apnea— Hypopnea syndrome." The Laryngoscope 113.6 (2003): 973-980. 8. Farney, Robert J., et al. "The STOP-Bang equivalent model and prediction of severity of obstructive sleep apnea: relation to polysomnographic measurements of the apnea/hypopnea index." Journal of Clinical Sleep Medicine 7.05 (2011): 459-465. 9. Takegami, Misa, et al. "Simple four-variable screening tool for identification of patients with sleep-disordered breathing." Sleep 32.7 (2009): 939-948. 10. Secretariat, Medical Advisory. "Polysomnography in patients with obstructive sleep apnea: an evidence-based analysis." Ontario health technology assessment series 6.13 (2006): 1. 11. Chai-Coetzer, Ching Li, et al. "A simplified model of screening questionnaire and home monitoring for obstructive sleep apnoea in primary care." Thorax 66.3 (2011): 213-219. 12. Duarte, Ricardo LM, et al. "Simplifying the screening of obstructive sleep apnea with a 2-item model, No-Apnea: a cross-sectional study." Journal of Clinical Sleep Medicine 14.07 (2018): 1097-1107. 13. Sharma, Manish, Mitesh Raval, and U. Rajendra Acharya. "A new approach to identify obstructive sleep apnea using an optimal orthogonal wavelet filter bank with ECG signals." Informatics in Medicine Unlocked (2019): 100170. 14. Li, Kunyang, et al. "A method to detect sleep apnea based on deep neural network and hidden markov model using single-lead ECG signal." Neurocomputing 294 (2018): 94-101. 15. Almazaydeh, Laiali, Khaled Elleithy, and Miad Faezipour. "Detection of obstructive sleep apnea through ECG signal features." 2012 IEEE International Conference on Electro/Information Technology. IEEE, 2012. 16. Bhattacharjee, Arnab, et al. "Sleep Apnea Detection Based on Rician Modeling of Feature Variation in Multiband EEG Signal." IEEE journal of biomedical and health informatics 23.3 (2018): 1066-1074. 17. Silva, Graciela E., et al. "Identification of patients with sleep disordered breathing: comparing the four-variable screening tool, STOP, STOP-Bang, and Epworth Sleepiness Scales." Journal of Clinical Sleep Medicine 7.05 (2011): 467-472. 18. Huang, W., et al. "0495 Prediction of Obstructive Sleep Apnea Using Machine Learning Technique." Sleep 41 (2018): A186. 19. Pomprapa, A., et al. "Classification of Obstructive Sleep Apnea Using Machine Learning." D102. Improving Identification, Adherence, and Outcomes In Sleep Disordered Breathing. American Thoracic Society, 2018. A7449-A7449. 20. https://healthitanalytics.com/news/deep-learning-tool-matches-human-experts-at-sleep-test-scoring. 21. Chu, Kuo-Chung, Hsin-Jou Huang, and Yu-Shu Huang. "Machine learning approach for distinction of ADHD and OSA." 2016 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM). IEEE, 2016. 22. Urtnasan, Erdenebayar, et al. "Optimal classifier for detection of obstructive sleep apnea using a heartbeat signal." International Journal of Fuzzy Logic and Intelligent Systems 17.2 (2017): 76-81. 23. Mencar, Corrado, et al. "Application of machine learning to predict obstructive sleep apnea syndrome severity." Health informatics journal (2019): 1460458218824725 Authors: K.Harsha Vardhan, K.Harsh Vardhan, B.Sarada Paper Title: Treatment of Industrial Wastewater by using Amberlite XAD-1180 in A Fluidized-Bed Reactor Abstract: The main objective of the work is to reduce COD levels of industrial effluents Using Amberlite XAD-1180 in a fluidization reactor. The experiment runs at the flowrates in the range 2 to 8 LPM. The parameters like flow-rate, time & dosage of XAD have been studied and their effect of COD reduction is analysed, for this experiment COD analysis was done for industrial wastewater which is taken from near by industry. The COD reduction increases with increasing flow rate and adsorbent dosage. The maximum percentage COD reduction is found to be 91.56 %. Maximum adsorption occurs at the flow rate of 8 LPM and with 20 gm of XAD adsorbent.

Keywords: adsorption, Amberlite XAD - 1180, fluidization bed unit.

References: 1. Jeris et al., 1977; waste treatment process; us patent 4,009,098. 2. Yoon Chan Choi, Dong Seog Kim, Tae Joo Park, 3Kyung Kee Park and Seung Koo Song, 1995; Wastewater treatment in a pilot scale 119. inverse fluidized-bed biofilm reactor; Biotechnology techniques, volume 9, issue 1, page 35-40. 3. DF.Walker, and EP.Austin.1981. Theuseofplastic,porous biomass supports in a pseudo-fluidised bed for effluent treatment, 272–284. 10th United States–Japan Conference on Sewage Treatment and North Atlantic. 574-576 4. W.Sokoł, and MR. Halfani. 1999. Hydrodynamics of a gas-liquidsolid fluidised bed bioreactor with a low density biomass support. Biochemical Engineering Journal 3:185–192 5. M.Rajasimman, C.Karthikeyan, 2007; Aerobic digestion of starch wastewater in a fluidized bed bioreactor with low density biomass support; volume 143, issues 1-2, pages 82-86. 6. Da-wen Gao, Qi Hu, Chen Yao, Nan-Qi Ren, 2014; Treatment of domestic wastewater by an integrated anaerobic fluidize-bed membrane bioreactor under moderate to low temperature conditions, Bioresource technology, volume 159, pages 193-198. 7. S.Sen, GN.Demirer, 2003; anaerobic treatment of real textile wastewater with a fluidized-bed reactor, Water research, volume 37, issue 8, pages 1868-1878. 8. Prof. Dr. Ir. Sef. Heijnen, Arnold Mulder, Rene Weltevrede, Pam H. Hols, HansL. J. M . Van Leeuwen, 1990; Large scale aerobic/anaerobic treatment of complex industrial wastewater using immobilized biomass in fluidized-bed and air lift suspension reacter. Chemical engineering technology, volume 13, issue 1, pages 202-208. 9. W.Sokol, (2001). Operating Parameters for a gas-liquid-solid fluidized bed bioreactor with a low-density biomass support. Biochemical Engineering Journal 8:203-212 10. MM Bello, AAA Raman, Bello, M.Purushothaman, 2017. Applications of fluidized bed reactors in wastewater treatment – A review of the major design and operational parameters. Journal of Cleaner Production, Volume 141, pages 1492-1514. Authors: Kiran Gowda C, S Usha, Er. C J Jagadeesha Paper Title: A Research: Hyperspectral Image Processing Techniques Abstract: Hyperspectral image contains more information which are gathered from numerous narrow wavebands 120. from one or more regions, and large amount of data are huddled. An basic problems in hyperspectral image processing are dimension reduction, target detection, target identification, and target classification. In this document, we reviewed 577-581 the latest activities of target classification, most frequently used techniques for dimension reduction, target detection. Hyperspectral image processing is a complicated process which rely on mixed agents. Here we also recognized and reviewed problems faced by some methods and to overcome the problems, current techniques are discussed and highlighted good methods. To improving correctness, genuine classification techniques and Detection Techniques analysis are recommended.

Keywords: Dimensionality Reduction(DR); Hyperspectral Image(HSI); Independent Component Analysis(ICA); Principal Component Analysis(PCA); Projection Pursuit(PP); Target Detection(TD);

References: 1. N.Poojary, Puttaswamy.MR, H D'Souza & G.Hemanth Kumar, Automatic TD in HSIP: A review of algorithms, 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 978-1-4673-7682-2/15 2015 IEEE. 2. Zhang Liangpei and DU Bo, Recent advances in HSIP, Geo-spatial Information Science, Vol. 15, No. 3, September 2012, 143–156. 3. ZHENG Mao, ZAN Decai, ZHANG Wenxi, TD Algorithm in Hyperspectral Imagery Based on FastICA, 978-1-4244-5848-6/2010 IEEE. 4. D.Manolakis, D.Marden, and Gary A. Shaw, HSIP for Automatic TD Applications, VOLUME 14, NUMBER 1, 2003 LINCOLN LABORATORY JOURNAL. 5. K.C.Tiwari, M.K.Arora, D.Singh, An assessment of ICA for detection of military targets from HSI’s, International Journal of Applied Earth Observation and Geoinformation, Volume 13, Issue 5, October 2011, Pages 730-740. 6. Qian Du, Ivica Kopriva, & Harold Szu, ICA for HSRS imagery classification, Optical Engineering 45_1_, 017008 _January 2006_ , © 2006 SPIE. 7. D. Manolakis, R. Lockwood, T. Cooley and J. Jacobson, Is There a Best HS Detection Algorithm?, Proc. of SPIE Vol. 7334, 733402. 8. N.Rani , VR.Mandla, T.Singh, Evaluation of atmospheric corrections on HS data with special reference to mineral mapping, Geoscience Frontiers(Elsevier) 8 (2017) 797e808. 9. Hongtao Du, DR using Parallel ICA in HSI Analysis, A Thesis Presented for the Master of Science Department of Electrical and Computer Engineering, The University of Tennessee, Knoxville, May 2003. 10. Kaewpijit.S, Moigne.JL., and El-Ghazawi T, Automatic reduction of HSIery using wavelet spectral analysis, IEEE Transactions on Geoscience and Remote Sensing, 41:863-871, 2003. 11. SE Yuksel & A Karakaya, Fusion of TD Algorithms in HSI’s, International Journal of Intelligent Systems and Applications in Engineering, Advanced Technology and Science ISSN:2147-67992147-6799. 12. A C Velasco, CAV García, & HA Fuentes, A comparative study of TD algorithms in HSI applied to agricultural crops in Colombia, Tecnura • p-ISSN: 0123-921X • e-ISSN: 2248-7638 • Vol. 20 No. 49 • July - September 2016 • pp. 86-99. 13. G-Sreekala, Bajwa and SS. Kulkarni, HS Data Mining, HSRS Vegetation, A Huete, TS Prasad & JG Lyon, , CRC Press 2011, Print ISBN: 978-1-4398-4537-0. 14. S-S Chiang, C-I Chang,and IW. Ginsberg, Unsupervised TD in HSI’s Using PP, IEEE Transactions on Geo-science and Remote Sensing, vol. 39, NO. 7, July 2001. 15. JA. Malpica, JG. Rejas, MC. Alonso, A PP algorithm for anomaly detection in HSI, Elsevier Pattern-Recognition 41 (2008) 3313 -- 3327, ISSN: 0031-3203. 16. A Agarwal, T El-Ghazawi, H El-Askary, and J Le-Moigne, Efficient Hierarchical-PCA DR for HSI, 2007 IEEE International Symposium on Signal Processing and Information Technology, 978-1 -4244-1 835-0/07, pp 353-356. 17. Deepa. P & K. Thilagavathi, Feature Extraction of HSI Using PCA and Folded-PCA, IEEE Sponsored 2nd International Conference On Electronics And Communication System (icecs 2015), 978-1- 4788-7225 -8/15. 18. Robila, S. A., & Varshney, P. K. TD in HSI’s based on ICA. In AeroSense 2002 (pp.173-182). International Society for Optics and Photonics. 19. RJ Johnson, Improved feature extraction, feature selection, and identification techniques that create a fast unsupervised HS TD algorithm, Thesis, Approved For Public Release; Distribution Unlimited, March 2008. 20. Shaw, GA., and Burke, H.-h. K. Spectral imaging for remote sensing. Lincoln Laboratory Journal 14, 1 (2003), 3-28. 21. Y Cohen, Y August, Dan G. Blumberg, and Stanley R. Rotman, , Evaluating Subpixel TD Algorithms in HSI,. Hindawi Publishing Corporation Journal of Electrical and Computer Engineering, doi:10.1155/2012/103286. 22. Herve Abdi and Lynne J. Williams , Principal component analysis, 2010 John Wiley & Sons, Inc. WIREs Comp Stat 2010 2 433–459. 23. Miguel A. Veganzones & M Graña, Hybrid Computational Methods for HSI Analysis, E. Corchado et al. (Eds.): HAIS 2012, Part II, LNCS 7209, pp. 424– 435, 2012. 24. Ozan ARSLAN, Ozer AKY UREK & S_inasi KAYA, A comparative analysis of classi_cation methods for hyperspectral images generated with conventional dimension reduction methods, Turk J Elec Eng & Comp Sci (2017) 25: 58-72. 25. Xin Qin Nian Yongjian Li Xiu* Wan Jianwei Su Linghua**, Dimensionality Reduction for Hyperspectral Imagery Based on FastICA, JOURNAL OF ELECTRONICS (CHINA), Vol.26 No.6 ,November 2009. Authors: K Rajesh, Ganesh D.B Assessment of Ethanol as Fuel Additive to Diesel-Biodiesel Blends on Combustion and Performance Paper Title: Characteristics in CI Engine Abstract: Biodiesel is one of the most promising and technically viable partial replacements to the petroleum diesel. Many research works were carried out on diesel -biodiesel blends focusing on the performance and emission aspects of the CI engine. Diesel biodiesel blends encounter with operational problems like higher viscosity, higher surface tension and less intensity atomization of the burning mixing. These set back in the diesel-biodiesel can be overcome by the addition of the ethanol to the diesel -biodiesel mixture. An attempt has been made to use higher concentration of ethanol by using Karanja biodiesel as medium of mixing with diesel. In this paper discussion has been made on the effect on the performance and combustion aspects of CI engine operating on the Diesel-biodiesel-ethanol blends

Key words: IC engine; Ethanol; Bio diesel; combustion; performance 121. References: 582-587 1. Statistical Review of World Energy. London: British Petroleum Co, 2017. 2. Statistical Review of World Energy. London: British Petroleum Co, 2018. 3. Janaun, Jidon, and Naoko Ellis. "Perspectives on biodiesel as a sustainable fuel." Renewable and Sustainable Energy Reviews 14.4 (2010): 1312-1320. 4. Shahir, S. A., et al. "Feasibility of diesel–biodiesel–ethanol/bioethanol blend as existing CI engine fuel: An assessment of properties, material compatibility, safety and combustion." Renewable and Sustainable Energy Reviews 32 (2014): 379-395. 5. Prasad, G. and Gupta, A., "Role of Nano Additive Blended Karanja Biodiesel Emulsion Fuel on Performance and Emission Characteristics of Diesel Engine," SAE Technical Paper 2016-28-0165, 2016, doi:10.4271/2016-28-0165. 6. Kumar, Chandan, MK Gajendra Babu, and Lalit M. Das. Experimental Investigations on a Karanja Oil Methyl Ester Fueled DI Diesel Engine. No. 2006-01-0238. SAE Technical Paper, 2006. 7. Xue, Jinlin, Tony E. Grift, and Alan C. Hansen. "Effect of biodiesel on engine performances and emissions." Renewable and Sustainable energy reviews 15.2 (2011): 1098-1116. 8. Hulwan, DattatrayBapu, and Satishchandra V. Joshi. "Performance, emission and combustion characteristic of a multicylinder DI diesel engine running on diesel–ethanol–biodiesel blends of high ethanol content." Applied Energy88.12 (2011): 5042-5055 9. Hardenberg, H. and Schaefer, A., "The Use of Ethanol as a Fuel for Compression Ignition Engines," SAE Technical Paper 811211, 1981 10. Weidmann, K. and Menrad, H., "Fleet Test, Performance and Emissions of Diesel Engines Using Different Alcohol-Diesel Fuel Blends," SAE Technical Paper 841331, 1984 11. Hansen, Alan C., Qin Zhang, and Peter WL Lyne. "Ethanol–diesel fuel blends––a review." Bioresource technology 96.3 (2005): 277-285. 12. Hulwan, Dattatray Bapu, and Satishchandra V. Joshi. "Performance, emission and combustion characteristic of a multicylinder DI diesel engine running on diesel–ethanol–biodiesel blends of high ethanol content." Applied Energy88.12 (2011): 5042-5055. 13. Krishna, Sachin Muralee, et al. "Performance and emission assessment of optimally blended biodiesel-diesel-ethanol in diesel engine generator." Applied Thermal Engineering 155 (2019): 525-533. 14. Pradelle, Florian, et al. "Performance and combustion characteristics of a compression ignition engine running on diesel-biodiesel-ethanol (DBE) blends–Potential as diesel fuel substitute on an Euro III engine." Renewable energy 136 (2019): 586-598. Authors: Satish Kumar Satti1, Suganya Devi K, Prasenjit Dhar, P Srinivasan An Efficient Noise Separation Technique for Removal of Gaussian and Mixed Noises in Monochrome and Paper Title: Color Images Abstract: Images are often affected by different kinds of noise while acquiring, storing and transmitting it. Even the datasets gathered by the various image acquiring devices would be contaminated by noise. Hence, there is a need for noise reduction in the image, often called Image De-noising and thereby it becomes the significant concerns and fundamental step in the area of image processing. During image de-noising, the big challenge before the researchers is removing noise from the original image in such a way that most significant properties like edges, lines, etc., of the image, should be preserved. There were various published algorithms and techniques to de-noise the image and every single approach has its own limitations, benefits, and assumptions. This paper reviews the noise models and presents a comparative analysis of various de-noising filters that works for color images with single and mixed noises. It also suggests the best filter for color that involve in producing a high-quality color image. The metrics like PSNR, Entropy, SSIM, MSE, FSIM, and EPI are considered as image quality assessment metrics.

Keywords: De-noising• Edge preserving filtering • Spatial Domain Filters • Transform Domain Filters • Non Local Means • DnCNN • Gaussian noise • Mixed Noise • PSNR • MSE • EPI • FSIM • SSIM.

References: 1. R. C. Gonzalez, Richard e. woods, Digital image processing 2 (2002) 550-570. 2. H. Guo, J. E. Odegard, M. Lang, R. A. Gopinath, I. W. Selesnick, C. S. Bur-rus, Wavelet based speckle reduction with application to sar based atd/r, in: Proceedings of 1st International Conference on Image Processing, volume 1, IEEE, 1994, pp. 75-79. 3. R. D. Nowak, Wavelet-based rician noise removal for magnetic resonance imag-ing, IEEE Transactions on Image Processing 8 (1999) 1408-1419. 4. E. W. Weisstein, Rayleigh distribution, sigma 13 (2004) 14. 5. C. Pal, A. Chakrabarti, R. Ghosh, A brief survey of recent edgepreserv-ing smoothing algorithms on digital images, arXiv preprint arXiv:1503.07297 (2015). 6. P. Jain, V. Tyagi, A survey of edge-preserving image denoising methods, In-formation Systems Frontiers 18 (2016) 159-170. 7. P. Jain, V. Tyagi, Spatial and frequency domain lters for restoration of noisy images, IETE Journal of Education 54 (2013) 108-116. 8. I. Pitas, A. N. Venetsanopoulos, Nonlinear digital lters: principles and appli-cations, volume 84, Springer Science Business Media, 2013. 122. 9. D. Yang, J. Sun, Bm3d-net: A convolutional neural network for transform-domain collaborative ltering, IEEE Signal Processing Letters 25 (2017) 55-59. 588-601 10. L. Liu, C. P. Chen, Y. Zhou, X. You, A new weighted mean lter with a two-phase detector for removing impulse noise, Information Sciences 315 (2015) 1-16. 11. C. Kandemir, C. Kalyoncu, O. Toygar, A weighted mean lter with spatial-bias elimination for impulse noise removal, Digital Signal Processing 46 (2015) 164-174. 12. D. Marr, E. Hildreth, Theory of edge detection, Proceedings of the Royal So-ciety of London. Series B. Biological Sciences 207 (1980) 187-217. 13. V. Chaudhary, V. Kumar, Fusion of multi-exposure images using recursive and gaussian lter, Multidimensional Systems and Signal Processing (2019) 1-16. 14. G. Deng, L. Cahill, An adaptive gaussian lter for noise reduction and edge detection, in: 1993 IEEE Conference Record Nuclear Science Symposium and Medical Imaging Conference, IEEE, 1993, pp. 1615-1619. 15. A. Makandar, B. Halalli, Breast cancer image enhancement using median lter and clahe, International Journal of Scienti c Engineering Research 6 (2015). 16. J. Zhang, An e cient median lter based method for removing randomvalued impulse noise, Digital Signal Processing 20 (2010) 1010{1018. 17. J. Chen, X. Kang, Y. Liu, Z. J. Wang, Median ltering forensics based on convo-lutional neural networks, IEEE Signal Processing Letters 22 (2015) 1849-1853. 18. P. Perona, J. Malik, Scale-space and edge detection using anisotropic di u-sion, IEEE Transactions on pattern analysis and machine intelligence 12 (1990) 629-639. 19. J. Xu, Y. Jia, Z. Shi, K. Pang, An improved anisotropic di usion lter with semi-adaptive threshold for edge preservation, Signal Processing 119 (2016) 80-91. 20. S. Tebini, H. Seddik, E. B. Braiek, An advanced and adaptive mathematical function for an e cient anisotropic image ltering, Computers Mathematics with Applications 72 (2016) 1369-1385. 21. C. Tomasi, R. Manduchi, Bilateral ltering for gray and color images., in: Iccv, volume 98, 1998. 22. J. Zhang, G. Lin, L. Wu, C. Wang, Y. Cheng, Wavelet and fast bilateral lter based de-speckling method for medical ultrasound images, Biomedical Signal Processing and Control 18 (2015) 1-10. 23. K. V. Thakur, O. H. Damodare, A. M. Sapkal, Poisson noise reducing bilateral lter, Procedia Computer Science 79 (2016) 861-865. 24. A. Buades, B. Coll, J.-M. Morel, A non-local algorithm for image denoising, in: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), volume 2, IEEE, 2005, pp. 60-65. 25. P. Sudeep, P. Palanisamy, J. Rajan, H. Baradaran, L. Saba, A. Gupta, J. S. Suri, Speckle reduction in medical ultrasound images using an unbiased non-local means method, Biomedical Signal Processing and Control 28 (2016) 1-8. 26. G. Wang, Y. Liu, W. Xiong, Y. Li, An improved non-local means lter for color image denoising, Optik 173 (2018) 157-173. 27. D. L. Donoho, J. M. Johnstone, Ideal spatial adaptation by wavelet shrinkage, biometrika 81 (1994) 425-455. 28. T. Blu, F. Luisier, The sure-let approach to image denoising, IEEE Transac-tions on Image Processing 16 (2007) 2778-2786. 29. X. Zhang, The sure-let approach using hybrid thresholding function for image denoising, Computers Electrical Engineering 70 (2018) 334- 348. 30. X. Zhang, Improved interscale-based sure-let approach to image denoising, Pro-cedia Computer Science 107 (2017) 819-823. 31. S. G. Chang, B. Yu, M. Vetterli, Adaptive wavelet thresholding for image denoising and compression, IEEE transactions on image processing 9 (2000) 1532-1546. 32. A. Achim, P. Tsakalides, A. Bezerianos, Sar image denoising via bayesian wavelet shrinkage based on heavy-tailed modeling, IEEE Transactions on Geo-science and Remote Sensing 41 (2003) 1773-1784. 33. I. Z. Nishu, M. F. Tanjim, A. Badrudduza, M. Al Mamun, A new image de-speckling method by srad lter and wavelet transform using bayesian threshold, in: 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), IEEE, 2019, pp. 1-6. 34. Y. Zhao, Y. Li, X. Dong, B. Yang, Low-frequency noise suppression method based on improved dncnn in desert seismic data, IEEE Geoscience and Remote Sensing Letters (2018). 35. K. Zhang, W. Zuo, Y. Chen, D. Meng, L. Zhang, Beyond a gaussian denoiser: Residual learning of deep cnn for image denoising, IEEE Transactions on Image Processing 26 (2017) 3142-3155. 36. H. R. Shahdoosti, Z. Rahemi, Edge-preserving image denoising using a deep convolutional neural network, Signal Processing 159 (2019) 20

Authors: V.Ananthalakshmi,Y.Rama Mohan, G.Sateesh, T.Bramhananda Reddy, A.Pradeep Kumar Yadav Paper Title: Estimation of Power Spectral Density in SVPWM based Induction Motor Drives Abstract: This paper is readied the product programming of the SVPWM and half of breed PWM basically based DTC of recognition engine manipulate for assessing the strength Spectral Density (PSD) and the overall consonant mutilation (THD) of the road flows. The PWM set of guidelines utilizes three beautiful PWM methodologies like traditional SVPWM, AZPWM3 and combination PWM for the evaluation of the vitality spectra and consonant spectra. In quality spectra appraisal the extents of the power accrued at express frequencies and inside the consonant spectra the problem band sizes at one among a type replacing frequencies are taken into consideration for the assessment. To confirm the PWM calculations, numerical activity is performed making use of MATLAB/simulink Telugu ( ) is one of the తెలుగు Dravidian languages which is morphologically rich. As in the other languages it too contains polysemous words which have different meanings in different contexts. There are several language models exist to solve the word sense disambiguation problem with respect to each language like English, Chinese, Hindi and Kannada etc. The proposed method gives a solution for the word sense disambiguation problem with the help of n-gram technique which has given 123. good results in many other languages. The methodology mentioned in this paper finds the co-occurrence words of target polysemous word and we call them as n-grams. A Telugu corpus sent as input for training phase to find n-gram joint 602-605 probabilities. By considering these joint probabilities the target polysemous word will be assigned a correct sense in testing phase. We evaluate the proposed method on some polysemous Telugu nouns and verbs. The methodology proposed gives the F-measure 0.94 when tested on Telugu corpus collected from CIIL, various news papers and story books.The present methodology can give better results with increase in size of training corpus and in future we plan to evaluate it on all words not only nouns and verbs.

Keywords: HPWM, Power Spectral Density, Total Harmonic Distortion.

References: 1. Ogasawara, H.Ayano, and H.Akagi, "A functioning circuit for abrogation of regular – mode voltage produced via a PWM inverter," IEEETrans. power Electron., vol. 13, no.five,pp. 835-841, Sep. 1998. 2. Dr. V.Anantha Lakshmi, Dr. G.Satheesh, Dr. T.Bramhananda Reddy, M.Nayeemuddin, "SVPWM primarily based calculations for lower of commonplace Mode Voltage in Induction Motor Drives",worldwide journal of applied Engineering studies, Vol.12, No.1, August 2017. Authors: K.E.Sreenivasa Murthy, R.Sudheer Babu, Shaik Saheb Basha Paper Title: Joint Deblurring and Denoising of Hyperspectral Images with PCA and Totalvariation Abstract: Human imaginative and prescient is an excellent imaging shape that can capture and disentangle mild imperativeness beginning from one-of-a-kind assets regardless of the way that it's miles constrained to observable mild. There arevarious programs, as an instance, face acknowledgment, restorative imaging, agribusiness, geology,surveillance, and so on that advantages via imaging a few companies of the electromagnetic spectrumoutside the noticeable range. The hyperspectral imaging strategies are able ofcapturing many agencies of the electromagnetic range and in this way, can be consideredas the speculation of shading imaging. on this paper, we commonly have a tendency to spark off a totally explicit plan for hyper-ghastly (HS) photo deblurring with overwhelming attitude appraisal (PCA) and everyday variety (tv). we have a penchant to introductory decorrelate the HS images and separate the insights content material material from the clamor with the manual of utilizing manner that of PCA. At that factor, 124. we generally will in popular observe the tv approach to conjointly denoise and deblur the principle transcendent components (pc frameworks). After, commotion within the ultimate primary additives is smothered the utilization of a 606-609 clean delicate thresholding point, for device execution. initial outcomes on reproduced and authentic HS photos location unit specifically encouraging.

Keywords — multi-define picture excellent-dreams, de-noising, electromagnetic range, complete variety.

References:

1. Yusuke Monno, Masayuki Tanaka, and Masatoshi Okutomi. Multispectral Demosaicking the use of Adaptive Kernel Upsampling. In IEEE Int. Conf. image manner., pages 3157–3160, 2011. ISBN 9781457713033. 2. Yusuke Monno, Masayuki Tanaka, and Masatoshi Okutomi. Multispectral Demosaicking using Guided filter. In IS&T/SPIE Electron. Imaging, extent 8299, pages 82990o— - 82990o, jan 2012. 3. FumihitoYasuma, TomooMitsunaga, Daisuke Iso, and Shree ok Nayar. Summed up diverse Pixel camera: Postcapture control of resolution, Dynamic range, and Spectrum. IEEE Trans. image technique., 19(9):2241–53, sep 2010. ISSN 1941-0042. doi: 10.1109/TIP.2010.2046811. 4. Miroslav Kubat, Robert C Holte, and Stan Matwin. AI for the place of oil slicks in satellite tv for pc radar photos. Mach. research., 30(2- 3):195–215, 1998. 5. Ira Leifer,William J Lehr, Debra Simecek-Beatty, Eliza Bradley, Roger Clark, and Others. high-quality in magnificence satellite tv for pc and airborne marine oil slick faraway detecting: application to the BP Deepwater Horizon oil slick. remote Sens. Environ., 124:185–209, 2012. 6. SajadFarokhi, Usman Ullah Sheik, Jan Flusser, and Bo Yang. close infrared face acknowledgment using Zernike minutes and Hermite portions. Inf. Sci., 316:234— - 245, 2015. 7. Jiayi Ma, Ji Zhao, Yong Ma, and Jinwen Tian. Non-unbending unmistakable and infrared face enlistment through regularized Gaussian fields popular. example Recognit., 48(3):772–784, 2015. 8. Haitao Zhao and Shaoyuan sun. Scanty tensor placing based multispectral face acknowledgment. instance Recognit., 133:427–436, 2014. 9. Juliane Bendig, Kang Yu, Helge Aasen, Andreas Bolten, Simon Bennertz, JaninBroscheit,Martin L Gnyp, and Georg Bareth. CombiningUAV-based totally plant variety from harvest floor fashions, apparent, and near infrared flowers records for biomass staring at in grain. Int. J. Appl. Earth Obs. Geoinf., 39:79–87, 2015. 10. Bingfang Wu, Jihua Meng, Qiangzi Li, Nana Yan, Xin Du, and Miao Zhang. faraway detecting primarily based international harvest checking: encounters with China's CropWatch framework. Int. J. Digit. Earth, 7(2):113— - 137, 2014. Authors: M.Rama Prasad Reddy, T.Sudhakar Babu, A.Suresh Kumar,U.Chaitanya Paper Title: Research on Harmonics and Ripple Content in Vector Control Schemes for Induction Motor Abstract: on this paper 3 considered one in every of a type vicinity based totally vector manage plans are enlisted for the assessment of the track and swell substance texture inside the engine flows and reliable kingdom torque waveforms. the interest in those vector oversee plans is, the reference flows are produced is as on the subject of ordinary vector control and selection of the voltage vectors is as almost about coordinate torque oversee. So the ones vector manipulate plans be part of the requirements of both conventional vector oversee and direct torque manage. the ones plans are confirmed within the MATLAB/Simulink scenario and the consequences are as concept approximately amongst them.

Keywords: FOC, DTC, Induction engine, exchanging table, vector manage

References: 1. F. Blaschke, "the rule of area course as related to the new transvector close circle manipulate framework for pivoting area machines," 125. Siemens assessment, 1972, pp 217-220. 2. Isao Takahashi, Toshihiko Noguchi, "another fast reaction and excessive-effectiveness control method of an attractiveness engine", IEEE Trans Ind Appl, Vol.IA-22, No.5, pp. 820-827, Sep/Oct, 1986. 610-615 3. U. V Patil, H. M. Suryawanshi, M. M. Renge, "Execution correlation of DTC and FOC recognition engine drive in five stage diode clasped inverter", IEEE-global convention On Advances In Engineering, technology And management (ICAESM - 2012),yr: 2012,page s: 227 - 230. 4. WahibaKhemiri ; Anis Sakly ; M. FaouziMimouni,"performance correlation for misfortune development methods of FOC attractiveness engine drive", 2015 IEEE twelfth global Multi-convention on structures, signals and devices (SSD15), yr: 2015, page s: 1 - 6. 5. Tao Wu ; Yi-Lin Chi ; Yu Guo ; Chao Xu,"Simulation of FOC Vector control of Induction Motor primarily based on LabVIEW", 2009 global conference on information Engineering and computer technology, 12 months: 2009, web page s: 1 - 3. 6. Qidi Tang ; Xinglai Ge ; Yong-Chao Liu,"overall performance examination of various SVM-based field-situated manage plans for eight- switch 3-degree inverter-reinforced enlistment engine drives", 2016 IEEE eighth international energy Electronics and movement manipulate convention (IPEMC-ECCE Asia), year: 2016, page s: 3374 - 3378. 7. T. Banerjee ; J. N. Bera ; S. Chowdhuri ; G. Sarkar,"A comparable investigation between various tweaks approaches utilized in area organized manage recognition engine power", 2016 2d worldwide convention on manage, Instrumentation, energy and communique (CIEC), 12 months: 2016, web page s: 358 - 362. 8. M.Rama Prasad Reddy, T. Brahmananda Reddy, Member, IEEE, B. Brahmaiah, " A circle of relatives of research Tables for Novel Vector controlled Induction Motor Drives" Acta Authors: Rajesh Kumar Prakhya, K.Shashidhar Reddy, Ch. Lokeshawar Reddy Paper Title: Estimating Degradation Factorby Performance Ratio of Rooftop Solar PV Plant Abstract: This paper diagnostically appraises the debasement thing of the lattice tied housetop daylight based Photovoltaic plant. The impact of rot and plant via and large execution are assessed and dissected for 20kWp sun photograph Voltaic plant appointed on EEE Block housetop in CVR college of Engineering. The debasement appraisal is done bodily from the plant insights separated from internet-interface for the year 2015 and 2016. As an critical boost in this assessment, the plant's standard typically speakme execution percentage is decided for the two revolutionary years. within the later strengthen the quantity change in the plant standard usually speaking execution Ratio's are decided. This appraisal widely recognized that corruption of the plant regular by means of and huge execution is high in mid 12 months resulting from prolonged surrounding temperature. The debasement is resolved to be over the pinnacle in may additionally moreover and less in February. The notion procedures in this type of by means of and huge in preferred execution are broke down. inside the wake of considering the results, it is prescribed that plant must be saved 126. up and inspected at intermittent spans for ventured ahead sizeable execution. 616-621 Keywords: Degradation thing, Grid-tied SPV Plant, Panel corruption, , overall performance Ratio (PR),overall performance Metrics, sun insolation, system performance.

References: 1. Razykov TM, Ferekides CS, Morel D, Stefanakos E, Ullal HS, Upadhyaya HM. solar oriented photovoltaic power: present day status and destiny prospects. Sol strength 2011; eighty five: 1580;1608. 2. Ali Hajiah, T.k., k. Sopian, M. Sebzali1, performance of community related photovoltaic framework in locations in Kuwait, 2013, Kuwait Institute for scientific research (KISR): Kuwait. worldwide journal of Photoenergy volume (2012), Article identity 178175, p. 20. 3. S. Elhodeiby, H. M. B. Metwally, and M. A. Farahat, "Execution evaluation of 3.6 kW Rooftop Grid linked Photovoltaic system in Egypt," in lawsuits of global convention on electricity structures and technologies (ICEST 2011), Cairo, Egypt, 2011, pp. 151-157. 4. S. Singh, R. Kumar and V. Vijay, "Execution exam of 58 kW community related rooftop top sun based PV framework," electricity India global convention (PIICON), 2014 sixth IEEE, Delhi, 2014, pp. 1-6. 5. Yan S, Lai-Cheong C, Lianjie S, Kwok-Leung T. continuous expectation models for yield electricity and talent of matrix associated solar orientated photovoltaic frameworks. Appl Energ 2012; 93: 319;326. 6. Al-Sabounchi AM, Yalyali SA, Al-Thani HA. shape and execution assessment of a photovoltaic matrix associated framework in sweltering weather conditions. repair strength 2013; fifty three: seventy one;seventy eight. 7. Records sheet of REFUlog Inverters 8. Statistics sheet of Kohima strength Pvt Ltd. 9. Whitepaper on PR as opposed to CUF given by means of CHROSIS Sustainable solutions. 10. Padmavathi okay, Daniel SA. Execution exam of a 3 MWp lattice related sunlight based photovoltaic energy plant in India. vitality Sustainable Dev 2013;17:615–25. 11. B.S.Kumar, ok.Sudhakar, performance of assessment of 10MW lattice associated Photovoltaic energy plant in India, energy reports 1(2015) 184-192. 12. Shukla, A.okay., Sudhakar, ok., Baredar, P., 2016a. duplicate and execution examination of 110 kWp lattice associated photovoltaic framework for non-public structure in India: A relative investigation of different PV innovation. vitality Rep. 2, eighty two–88. 13. Shukla, A.okay., Sudhakar, okay., Baredar, P., 2016b. structure, undertaking and monetary examination of impartial rooftop top sunlight based PV framework in India. Sol. energy 136, 437–449 14. Kamal Attari, Ali El Yaakoubi,Adel Asselman Comparative overall performance investigation among photo-voltaic structures from two awesome urban regions, tenth global assembly interdisciplinary in Engineering, Proceedia Engineering 181(2017) 810-817. Elsevier, reachable on www.sciencedirect.com 15. P.Rajesh Kumar, D.Koteswara Raju, Rajib Kumar Kar "Execution Metrics of Grid connected sun PV Plant on Roof pinnacle of CVR university of Engineering-A Case examine" journal of green Engineering Vol. 7, 99-128 - July 2017. 16. "Effect of Ambient temperature on execution of Grid-linked inverter delivered in thailand", komonpan, familiar diary of photograph energy,extent 2014, hindawi distributing. 17. Position of execution measurements to differentiate the Gaps in sun oriented strength age, P.Rajesh Kumar ,fourth global accumulating on electric vitality frameworks ICEES 2018 Feb 2018 Authors: Mohammad Nishat Akhtar, Elmi Abu Bakar, Abdul Aabid, Sher Afghan Khan Paper Title: Numerical Simulations of a CD Nozzle and the Influence of the Duct Length Abstract: A numerical method is used to observe the effect of microjets control on wall pressure spreading in sudden expansion two-dimensional planar duct. In order to find the microjet effectiveness 2-jets of 1 mm diameter orifice located precisely at 900 of intervals along a pitch-circle-distance (PCD) of 1.3 times the exit diameter of the nozzle in the base were employed to control actively. At the present study, the Mach number was used to calibrate the entry to duct was 2.2, and the area ratio of 2.56. The focus in this study and investigate the influence of length-to-diameter ratio (L/D) of a suddenly expanded duct and its effect on the development of the flow field. Hence, to achieve this, the duct length has been varied from 2 to 10. Nozzles are producing such Mach numbers the experiments were performed operating at nozzle pressure ratio (NPR) 3, 5, 7, 9, and 11. The convergent-divergent nozzle geometry has been studied using the K-ε standard wall function turbulence model and independently check with the ANSYS software.

Keywords— Nozzle, Area ratio, Nozzle pressure ratio, Microjet, Flow Control, ANSYS simulation, CFD.

References: 1. M. Badrinarayanan, J. R. Aeronaut. Soc., 65, 475–482, (1961). 2. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 19, 119–126, (2002). 3. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 21, 233–254, (2004). 4. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 21, 255–278, (2004). 5. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 22, 163–183, (2005). 127. 6. S. A. Khan and E. Rathakrishnan, Aircr. Eng. Aerosp. Technol. An Int. J., 78, 293–309, (2006). 7. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 23, 233–258, (2006). 622-630 8. S. A. Khan and E. Rathakrishnan, J. Aerosp. Eng. Inst. Eng. India, 87, 3–11, (2006). 9. M. A. A. Baig, F. Al-Mufadi, S. A. Khan, and E. Rathakrishnan, Int. J. Turbo Jet Engines, 28, 59–69, (2015). 10. S. Rehman and S. A. Khan, Aircr. Eng. Aerosp. Technol., 80, 158–164, (2008). 11. M. A. A. Baig, F. Al-Mufadi, S. A. Khan, and E. Rathakrishnan, Int. J. Turbo Jet Engines, 28, 59–69, (2011). 12. M. Ahmed and A. L. I. Baig, Int. J. Eng. Sci. Technol., 4, 1892–1902, (2012). 13. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 21, 255–278, (2008). 14. S. Ashfaq, S. A. Khan, and E. Rathakrishnan, Int. Rev. Mech. Eng., 8, 1–10, (2014). 15. Z. I. Chaudhary, V. B. Shinde, M. Bashir, and S. A. Khan, Int. J. Energy, Environ. Econ., 24, 59–66, (2016). 16. M. A. A. Baig, S. A. Khan, C. Ahmed Saleel, and E. Rathakrishnan, ARPN J. Eng. Appl. Sci., 7, 992–1002, (2012). 17. F. A. G. M, M. A. Ullah, and S. A. Khan, ARPN J. Eng. Appl. Sci., 11, 10041–10047, (2016). 18. A. Ali, A. Neely, J. Young, B. Blake, and J. Y. Lim, “Numerical Simulation of Fluidic Modulation of Nozzle Thrust,” in 17th Australasian Fluid Mechanics Conference, 2010, no. December, pp. 5–8. 19. K. M. Pandey and V. Kumar, Int. J. Chem. Eng. Appl., 1, 302–308, (2010). 20. G. M. Kumar, D. X. Fernando, and R. M. Kumar, Adv. Aerosp. Sci. Appl., 3, 119–124, (2013). 21. B.-A. Belega and T. D. Nguyen, “Analysis of Flow In Convergent-Divergent Rocket Engine Nozzle Using Computational Fluid Dynamics,” in International Conference of Science Paper AFASES, 2015, p. 6. 22. O. Kostic, Z. Stefanovic, and I. Kostic, FME Trans., 43, 107–113, (2015). 23. K. A. Pathan, P. S. Dabeer, and S. A. Khan, “CFD Analysis of Effect of Mach number, Area Ratio, and Nozzle Pressure Ratio on Velocity for Suddenly Expanded Flows,” in 2nd International Conference for Convergence in Technology (I2CT), 2017, pp. 1104–1110. 24. K. A. Pathan, “CFD Analysis of Effect of Area Ratio on Suddenly Expanded Flows,” in 2nd International Conference for Convergence in Technology (I2CT), 2017, pp. 1192–1198. 25. K. A. Pathan, P. S. Dabeer, and S. A. Khan, Int. Rev. Aerosp. Eng., 11, 162–169, (2018). 26. K. A. Pathan, P. S. Dabeer, and S. A. Khan, J. Appl. Fluid Mech., vol. 12, no. 4, pp. 1127–1135, (2019). 27. K. A. Pathan, P. S. Dabeer, and S. A. Khan, “CFD Analysis of Effect of Flow and Geometry Parameters on Thrust Force Created by Flow from Nozzle,” in 2nd International Conference for Convergence in Technology (I2CT), 2017, pp. 1121–1125. 28. K. Ahmed, P. S. Dabeer, and S. Afghan, Case Stud. Therm. Eng., 12, 696–700, (2018). 29. A. G. M. Fharukh, A. A. Alrobaian, A. Aabid, and S. A. Khan, Int. J. Mech. Prod. Eng. Res. Dev., 8, 373–382, (2018). 30. A. Khan, A. Aabid, and S. A. Khan, Int. J. Eng. Technol., 7, 232–235, (2018). 31. S. A. Khan and A. Aabid, Int. J. Mech. Prod. Eng. Res. Dev., 8, 1147–1158, (2018). 32. S. A. Khan, A. Aabid, and C. A. Saleel, Int. J. Mech. Mechatronics Eng. IJMME-IJENS, 19, 70–82, (2019). 33. S. A. Khan, A. Aabid, F. A. G. M, A. A. Al-Robaian, and A. S. Alsagri, CFD Lett., 11, 61–71, (2019). 34. A. Aabid, N. M. Mazlan, M. A. Ismail, N. Akhtar, and S. A. Khan, Int. J. Eng. Adv. Technol., 8, 457–462, (2019). 35. S. A. Khan, A. Aabid, and A. S. C, Int. J. Mech. Mechatronics Eng. IJMME-IJENS, 19, 170–177, (2019). 36. S. A. Khan, A. Aabid, I. Mokashi, A. A. Al-Robaian, and A. S. Alsagri, CFD Lett., 11, 80–97, (2019). 37. M. F. M. Sajali, A. Aabid, S. A. Khan, F. A. G. M, and E. Sulaeman, CFD Lett., 11, 37–49, (2019). 38. S. A. Khan, M. Asadullah, and J. Sadiq, Int. J. Mech. Mechatronics Eng., 8, 69–74, (2018). 39. S. A. Khan and M. Asadullah, Int. J. Mech. Prod. Eng. Res. Dev., 8, 39–44, (2018). 40. M. Asadullah, S. A. Khan, W. Asrar, and E. Sulaeman, “Int. J. Mech. Eng. Robot. Res., 7, 428–432, (2018). 41. M. Asadullah, S. A. Khan, W. Asrar, and E. Sulaeman, “Passive control of base pressure with the static cylinder at supersonic flow,” in IOP Publishing House, IOP Conf. Series: Materials Science and Engineering, 2018, pp. 1–10. 42. M. Asadullah, S. A. Khan, W. Asrar, and E. Sulaeman, “Active control of base pressure with the counter-clockwise rotating cylinder at Mach 2,” 2017 4th IEEE Int. Conf. Eng. Technol. Appl. Sci., vol. 8, no. 6, pp. 1–6, 2017. Authors: Mohammad Nishat Akhtar, Elmi Abu Bakar, Abdul Aabid, Sher Afghan Khan Paper Title: Control of CD Nozzle Flow using Microjets at Mach 2.1 Abstract: This paper reports the outcome of the wind tunnel investigation performed to study the effectiveness of the control jets to regulate the base pressure in an abruptly expanded circular pipe. Tiny jets four in a number, of 1 mm orifice diameter located at ninety degrees in cross shape along a pitch circle diameter (PCD) of 1.3 as a control mechanism were employed. The Mach numbers and the area ratio of the study were 2.1, and 4.84. The length-to- diameter (L/D) ratio of the duct tested was varied from 10 to 1. Nature of the flow in the duct, as well as static wall pressure distribution in the suddenly enlarged duct, was recorded. The main aim of this study was to assess the influence of the active control in the form of tiny jets on the flow field as well as the nature of the flow, and also the development of the flow in the duct. The results obtained in this study show that the flow field, as well as the wall pressure distribution, is not adversely influenced by the tiny jets. The minimum duct length seems to be 2D for NPR's in the range five and above. However, for all the level of expansion of the present study, the minimum duct length needed for the flow to remain attached seems to be 3D.

Keywords: Nozzle, Area ratio, Nozzle pressure ratio, Microjet, Flow Control.

References: 1. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 19, 119–126, (2002). 2. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 20, 63–82, (2003). 3. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 21, 233–254, (2004). 4. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 21, 255–278, (2004). 5. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 22, 163–183, (2005). 128. 6. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 23, 233–257, (2006). 7. S. A. Khan and E. Rathakrishnan, Aircr. Eng. Aerosp. Technol. An Int. J., 78, 293–309, (2006). 631-635 8. S. Rehman and S. A. Khan, Aircr. Eng. Aerosp. Technol., 80, 158–164, (2008). 9. A. Ali, A. Neely, J. Young, B. Blake, and J. Y. Lim, “Numerical Simulation of Fluidic Modulation of Nozzle Thrust,” in 17th Australasian Fluid Mechanics Conference, 2010, no. December, pp. 5–8. 10. A. Schwarz, J. Janicka, F. Bake, and N. Kings, Combustion Noise. (2009). 11. O. J. Shariatzadeh, A. Abrishamkar, and A. J. Jafari, J. Clean Energy Technol., 3, 220–225, (2015). 12. S. A. Khan and A. Aabid, Int. J. Mech. Prod. Eng. Res. Dev., 8, 1147–1158, (2018). 13. A. Aabid, N. M. Mazlan, M. A. Ismail, N. Akhtar, and S. A. Khan, Int. J. Eng. Adv. Technol., 8, 457–462, (2019). 14. S. A. Khan, A. Aabid, and C. A. Saleel, Int. J. Mech. Mechatronics Eng. IJMME-IJENS, 19, 70–82, (2019). 15. A. Khan, A. Aabid, and S. A. Khan, Int. J. Eng. Technol., 7, 232–235, (2018). 16. A. G. M. Fharukh, A. A. Alrobaian, A. Aabid, and S. A. Khan, Int. J. Mech. Prod. Eng. Res. Dev., 8, 373–382, (2018). 17. K. A. Pathan, S. A. Khan, and P. S. Dabeer, “CFD Analysis of Effect of Area Ratio on Suddenly Expanded Flows,” in 2nd International Conference for Convergence in Technology (I2CT) CFD, 2017, pp. 1192–1198. 18. K. A. Pathan, S. A. Khan, and P. S. Dabeer, “CFD Analysis of Effect of Flow and Geometry Parameters on Thrust Force Created by Flow from Nozzle,” in 2nd International Conference for Convergence in Technology (I2CT) CFD, 2017, pp. 1121–1125. 19. K. A. Pathan, P. S. Dabeer, and S. A. Khan, Int. Rev. Aerosp. Eng., 11, 162-169, (2018). 20. K. A. Pathan, S. A. Khan, and P. S. Dabeer, “CFD Analysis of Effect of Mach number , Area Ratio and Nozzle Pressure Ratio on Velocity for Suddenly Expanded Flows,” in 2nd International Conference for Convergence in Technology (I2CT) CFD, 2017, pp. 1104–1110. 21. K. Ahmed, P. S. Dabeer, and S. Afghan, Case Stud. Therm. Eng., 12, 696–700, (2018). 22. K. A. Pathan, “CFD Analysis of Effect of Area Ratio on Suddenly Expanded Flows,” in 2nd International Conference for Convergence in Technology (I2CT), 2017, pp. 1–7. 23. S. A. Khan, A. Aabid, F. A. G. M, A. A. Al-Robaian, and A. S. Alsagri, CFD Lett., 11, 61–71, (2019). 24. S. A. Khan, A. Aabid, and A. S. C, Int. J. Mech. Mechatronics Eng. IJMME-IJENS, 19, 170–177, (2019). 25. S. A. Khan, A. Aabid, I. Mokashi, A. A. Al-Robaian, and A. S. Alsagri, CFD Lett., 11, 80–97, (2019). 26. M. F. M. Sajali, A. Aabid, S. A. Khan, F. A. G. M, and E. Sulaeman, CFD Lett., 11, 37–49, (2019). Authors: Mohammad Nishat Akhtar, Elmi Abu Bakar, Abdul Aabid, Sher Afghan Khan Paper Title: Effects of Micro jets on the Flow Field of the Duct with Sudden Expansion 129. Abstract: This paper presents the results of an experimental investigation to study the effectiveness of the control jets to control base pressure in rapidly expanded circular tubes. Four tiny jets of 1 mm orifice diameter located at ninety 636-640 degrees interval in cross shape along a pitch circle diameter of 1.3. The Mach number, the L/D ratio, and the area ratio of the study were 2.8, from 1 to 10, and 4.84, respectively. The nature of the flow field, the development of the flow in the duct, as well as the static wall pressure distribution in the duct was measured and discussed. The results indicate that the tiny jets can be used as an active dynamic controller for the base pressure. The wall pressure distribution is not adversely influenced by the small jets. From the present investigation, it is evident that for a given Mach number and nozzle pressure ratio one can identify the minimum duct L/D needed for the flow remained attached with the wall of the duct. The trend for the duct length L = 5D seems to show different results, due to the influence of back pressure and the peak pressure values are also less than that those were for higher L/D ratios, especially in respect of L/D = 5. Further, the flow field has smoothened in the duct, and wall pressure values with and without micro jets are identical. This trend continues until L/D = 4, then later for lower L/Ds like L/D = 3, the flow seems to be attached at higher NPRs. But for lower NPRs the flow is not attached.

Keywords: Nozzle, Area ratio, Nozzle pressure ratio, Microjet, Flow Control.

References: 1. R. K. Singh, M. R. Ahmed, M. A. Zullah, and Y. H. Lee, Renew. Energy, 42, 66–76, (2012). 2. M. A. A. Baig, F. Al-Mufadi, S. A. Khan, and E. Rathakrishnan, Int. J. Turbo Jet Engines, 28, 59–69, (2011). 3. S. A. Khan and E. Rathakrishnan, Aircr. Eng. Aerosp. Technol. An Int. J., 78, 293–309, (2006). 4. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 23, 233–257, (2006). 5. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 22, 163–183, (2005). 6. S. Rehman and S. A. Khan, Aircr. Eng. Aerosp. Technol., 80, 158–164, (2008). 7. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 21, 255–278, (2004). 8. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 20, 63–82, (2003). 9. S. A. Khan and E. Rathakrishnan, Int. J. Turbo Jet Engines, 19, 119–126, (2002). 10. F. A. G. M, M. A. Ullah, and S. A. Khan, ARPN J. Eng. Appl. Sci., 11, 10041–10047, (2016). 11. S. Ashfaq, S. A. Khan, and E. Rathakrishnan, Int. Rev. Mech. Eng., 8, 1–10, (2014). 12. S. A. Khan and E. Rathakrishnan, J. Aerosp. Eng. Inst. Eng. India, 87, 3–11, (2006). 13. Z. I. Chaudhary, V. B. Shinde, M. Bashir, and S. A. Khan, Int. J. Energy, Environ. Econ., 24, 59–66, (2016). 14. M. A. A. Baig, S. A. Khan, C. Ahmed Saleel, and E. Rathakrishnan, ARPN J. Eng. Appl. Sci., 7, 992–1002, (2012). 15. J. D. Quadros, S. A. Khan, and A. J. Antony, J. Appl. Fluid Mech., (2016). 16. J. D. Quadros, S. A. Khan, A. J. Antony, and J. S. Vas, Int. J. Energy, Environ. Econ., 23, 1–11, (2016). 17. J. D. Quadros, S. A. Khan, and A. J. Antony, Int. J. Recent Res. Asp. 4, 53–58, (2017). 18. J. D. Quadros, S. A. Khan, and A. J. Antony, J. Appl. Math. Comput. Mech., 17, 59–72, (2018). 19. S. A. Khan, M. Asadullah, and J. Sadhiq, Int. J. Mech. Mechatronics Eng., 8, 69–74, (2018). 20. S. A. Khan and M. Asadullah, Int. J. Mech. Prod. Eng. Res. Dev., 8, 39–44, (2018). 21. M. Asadullah, S. A. Khan, W. Asrar, and E. Sulaeman, “Int. J. Mech. Eng. Robot. Res., 7, 428–432, (2018). 22. M. Asadullah, S. A. Khan, W. Asrar, and E. Sulaeman, “Passive control of base pressure with the static cylinder at supersonic flow,” in IOP Publishing House, IOP Conf. Series: Materials Science and Engineering, 2018, pp. 1–10. 23. M. Asadullah, S. A. Khan, W. Asrar, and E. Sulaeman, “Active control of base pressure with the counter-clockwise rotating cylinder at Mach 2,” 2017 4th IEEE Int. Conf. Eng. Technol. Appl. Sci., vol. 8, no. 6, pp. 1–6, 2017. 24. ANSYS Inc, “ANSYS FLUENT 18.0: Theory Guidance,” Canonsburg PA, 2017. 25. A. G. M. Fharukh, A. A. Alrobaian, A. Aabid, and S. A. Khan, Int. J. Mech. Prod. Eng. Res. Dev., 8, 373–382, (2018). 26. A. Khan, A. Aabid, and S. A. Khan, Int. J. Eng. Technol., 7, 232–235, (2018). 27. S. A. Khan and A. Aabid, Int. J. Mech. Prod. Eng. Res. Dev., 8, 1147–1158, (2018). 28. S. A. Khan, A. Aabid, F. A. G. M, A. A. Al-Robaian, and A. S. Alsagri, CFD Lett., 11, 61–71, (2019). 29. A. Aabid, N. M. Mazlan, M. A. Ismail, N. Akhtar, and S. A. Khan, Int. J. Eng. Adv. Technol., 8, 457–462, (2019). 30. S. A. Khan, A. Aabid, and C. A. Saleel, Int. J. Mech. Mechatronics Eng. IJMME-IJENS, 19, 70–82, (2019). 31. K. A. Pathan, P. S. Dabeer, and S. A. Khan, “CFD Analysis of Effect of Mach number, Area Ratio, and Nozzle Pressure Ratio on Velocity for Suddenly Expanded Flows,” in 2nd International Conference for Convergence in Technology (I2CT), 2017, pp. 1104–1110. 32. K. A. Pathan, “CFD Analysis of Effect of Area Ratio on Suddenly Expanded Flows,” in 2nd International Conference for Convergence in Technology (I2CT), 2017, pp. 1192–1198. 33. K. A. Pathan, P. S. Dabeer, and S. A. Khan, “CFD Analysis of Effect of Flow and Geometry Parameters on Thrust Force Created by Flow from Nozzle,” in 2nd International Conference for Convergence in Technology (I2CT), 2017, pp. 1121–1125. 34. K. Ahmed, P. S. Dabeer, and S. Afghan, Case Stud. Therm. Eng., 12, 696–700, (2018). 35. S. A. Khan, A. Aabid, and A. S. C, Int. J. Mech. Mechatronics Eng. IJMME-IJENS, 19, 170–177, (2019). 36. S. A. Khan, A. Aabid, I. Mokashi, A. A. Al-Robaian, and A. S. Alsagri, CFD Lett., 11, 80–97, (2019). 37. M. F. M. Sajali, A. Aabid, S. A. Khan, F. A. G. M, and E. Sulaeman, CFD Lett., 11, 37–49, (2019). Authors: K Satya Sai Trimurty Naidu, M V Seshagiri Rao, V Srinivasa Reddy Paper Title: Microstructural Characterization of Calcite Mineral Precipitation in Bacteria Incorporated Concrete Abstract: Metabolic activity of alkali-philic calcite (CaCO3) mineral precipitating bacteria when introduced into concrete heals the cracks and improves the microstructure of the concrete. This process of bio-mineralization by mineral producing bacteria can be characterized and quantified by using microstructure characterization techniques. The present paper is focused on characterizing the mineral precipitation in concrete by Sporosarcina pasteurii as calcite using SEM, XRD and TGA nano-characterization procedures to validate that cracks and pores in bacteria incorporated concrete were closed with the mineral precipitates produced due to urealotic activity of bacteria by hydrolyzing the urea based nutrients. 130. Keywords: bacterial concrete, Bacillus subtilis, SEM, XRD, TGA 641-643

References: 1. S K Ramchandran, V Ramakrishnan, and S S Bang (2001), “Remediation of Concrete using Microorganisms” ACI Mat. Jour., Vol. 98, 3-9 2. L Zhong, M R Islam (1995) “A New Microbial Process and its Impact on Fracture Remediation”, Proc. Of 70th Annual Tech. Conf. and Exhibition of the Soc. of Petroleum Engineers, Dallas, Texas, 22-25 3. P Ghosh, S Mandal, B D Chattopadhyay, and S Pal (2004), “Use of microorganisms to improve the strength of Cement-Sand Mortar”. Proc. of Int. Conf. on Adv. in Conc. and Const., 983- 988 4. H M Jonkers, A Thijssen, Gerard M, Oguzhan C and Erik S (2010), “Application of bacteria as self-healing agent for the development of sustainable Concrete”. Ecological engineering, Vol. 36( Issue 2), 230-235 5. S Fischer, J K S Galinat., and S S Bang (1999), Microbiological precipitation of CaCO3, Soil Biology and Biochemistry, 31. Authors: K.S.B. Prasad, K. Gayatri Identification and Prioritize Improvement of Accident-Prone Locations Between Srikakulam to Chilakapalem Paper Title: Junction- A Research Abstract: The factual investigation of accident is yielded out occasionally at grave areas or street extend which will touch base at appropriate measures to viably diminish accident rates. It is the measure (or gauges) of the number and seriousness of accidents. Thinking about the significance of point, distinguishing the reasons for street accidents has turned into the principle plan to decrease the harm brought about by automobiles collisions. So, study was carried to know how to reduce accidents by reducing the accident causing problems on NH16 from Srikakulam to Chilakapalem statistically to improve the accident locations based on priority wise.

131. References: 1. Tormo, Maria Teresa; Sanmartin, Jaime and Pace “Update and improvement of the traffic accident data collection procedures in Spain: The METRAS method of sequencing accident events” 644-646 2. Farzaneh Moradkhani1, Somayya Ebrahimkhani 2, Bahram Sadeghi Begham3 “Road Accident Data Analysis: A Data Mining Approach” 3. Sanjay kumar singh and Ashish Mishra “Road accident data analysis” 4. Gongzhu Hu Liling Li “Analysis of road traffic fatal accidents using data mining techniques” 5. Janstrup, Kira Hyldekær; Kaplan, Sigal; Prato, Carlo Giacomo” Statistical modelling of the frequency and severity of road accidents” 6. Luca Studer 1, Valeria Paglino 1,*, Paolo Gandini 1” Analysis of the Relationship between Road Accidents and Psychophysical State of Drivers through Wearable Devices”

Authors: Asim Goswami, Soumya Roy Paper Title: Ultimate Capacity of Vertical Pile Subjected to Combination of Vertical and Lateral Load Abstract: Pile under general condition is subjected to combination of vertical and lateral loads In the analytical approaches to predict the load-displacement responses of a pile under central inclined load, it is assumed that the lateral displacement of the pile head is independent by the vertical load factor of the inclined load. Similarly, while estimating the ultimate resistance it is considered that the vertical load factor of the inclined load does not influence the ultimate lateral resistance of the pile during determination of ultimate load carrying capacity of vertical pile. In the present work, an empirical relation has been developed to predict the ultimate load carrying capacity of vertical piles subjected to combination of both vertical and lateral load in cohesion less soil. Effect of lateral load on vertical load deflection behavior of vertical piles when axial loads are present are discussed through several experimental results obtained from tests on model piles. Ultimate capacity is found to be a continuous function of ultimate lateral load, ultimate vertical load capacity and tangent of angle of resultant load made with vertical axis of pile.

Keywords: Pile foundation; Ultimate vertical capacity; Lateral load on vertical pile;

References: 1. Amde, A.M., Chini, S.A. & Mafi, M. 1997. Model study of H-piles subjected to combinedloading. Geotechnical and Geological Engineering, Vol. 15, pp. 343-355. 2. Broms, B.B. 1965. Discussion to paper by Y. Yoshimi., Journal of Soil Mechanics and Foundation Engineering Division, ASCE, Vol. 91, No.4, pp 199-205. 3. Chattopadhyay, B.C. &Pise, P.J., 1986. Ultimate Resistance of Vertical Piles to Oblique Pulling Loads, Proc. 1st East Asian Conference on Structural Engineering and Construction, Bangkok,pp 1632-1641. 4. Das, B.M., Seeley,G.R.& Raghu, D. 1976. Uplift Capacity of Model Piles under Oblique Loads. Journal of the Geotechnical Engineering Division, ASCE, Vol. 102, No. (9), pp. 1009-1013. 132. 5. Ramanathan, T.S. &Aiyer, P.G., 1970. Pull out Resistance of Piles in Sand, Journal of Indian National Society of Soil Mechanics and Foundation Engineering, Vol. 9. No. 2, pp 189-202.Poulos, H. G., and Davis, E. H., 1980. Pile Foundation Analysis and Design, John 647-652 Wiley, New York. 6. Burland and Lord (1970), “Depth Correction Factor for Settlement of a Deep Foundation” Journal of Soil Mech. & Foundation Division ASCE, Vol. 86, Pp. 57-61. 7. Matlock, H. and Reese, L. C., (1970), “Generalized solutions for laterally loaded piles”, Journal of Soil Mech. & Foundation Division ASCE, Vol. 86, Pp. 63-91. 8. H. G., and Davis, E. H., 1980. Pile Foundation Analysis and Design, John Wiley, NewYork 9. Vesic A.B (1961), “Beams on Elastic subgrade and Winkler’s Hypothesis” , Proc. 5th Int. Conf. Soil mechanics and foundation engineering , paris 10. Brrezantav, V.G (1961), “ Load bearing capacity and deformation of piled foundation” , Proc. 5th ICSMEF, 2, Paris 11. Roy, S., Chattopadhyay, B.C., & Sahu, R.B., 2012. Load Deformation Characteristics of Circular Raft-Pile Combination Subjected to Oblique Loadings, Proc. Indian Geotechnical Conference, Delhi, India, Vol. 1, pp 532-535. 12. Roy, S., Chattopadhyay, B.C., &Sahu, R.B., 2013. Pile Behaviour under Inclined Compressive Load- A Model Study, EJGE, Vol. 18, pp 2187-2205. 13. Sastry, V.V.R.N. & Meyerhof, G.G. 1990. Behaviour of flexible piles under inclined loads. Canadian geotechnical Journal, 27(1), pp. 19- 28. 14. Yoshimi, Y. 1964. Piles in Cohesion less Soil subject to Oblique Pull. Journal of the Soil Mechanics and Foundations Division, ASCE, 90(6), pp. 11-24. 15. Fleming, W. G. K., Weltman, A. J., Randolph, M. F. & Elson, W.K., (1985). Pilling Engineering, Survey University Press, Glasgow and London. 16. Ismael, N.F. 1989. Field Tests on Bored Piles Subject to axial and Oblique Pull. Journal of Geotechnical Engineering, Vol. 115, No. 11, pp. 1588-1598. 17. Terzaghi et all (1996) “evaluation of coefficient of subgrade reaction” Institute of engineers, London, Vol. 5, No 4. 18. Broms, B.B. 1964. Discussion to paper by Y. Yoshimi., Journal of Soil Mechanics and Foundation Engineering Division, ASCE, Vol. 21, No.3, pp 126-157. 19. Meyerhof, G.G (1976), “Bearing capacity and settlements of pile foundation”, Journal of the geotechnical engineering Division, ASCE, Vol. 102, No. GT3 20. K. J. Bentley and M. H. E. Naggar, “Numerical analysis of kinematic response of single piles,” Canadian Geotechnical Journal, vol. 37, no. 6, pp. 1368–1382, 2000. Authors: Shemitha P.A, Julia Punitha Malar Dhas Paper Title: Trusted Detection of Ransom ware using Machine Learning Algorithms Abstract: Nowadays, the Computer Networks and the internet are increased. Lots of information is accessed and allowed to the users to share the information to the Internet. One of the major issues with internet was different types of attack. is a one kind of attack or it is malicious software that threatens to publish the victim's data. A variety of threats is the main target for the effective network security and avoids them from spreading or entering to the networks the network security on computer essential for computer networks. Ransom ware is a critical threat in network security since each day the raising of ransomware gets abundant. The major problem by the researchers is the prediction of ransomware. This paper planned to carry out a review on the different method to detect ransomware. Ransomware detection is very much helpful on minimizing the workload of analyst and for determining the variation in hidden Ransomware samples. Using machine learning algorithms Ransomware detected efficiently and trustfully.

References: 1. AaronZimba,ZhaoshunWang,HongsongChen," Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems", ICT Express, vol.4, no.1, pp.14-18, March 2018 2. S. Homayoun, A. Dehghantanha, M. Ahmadzadeh, S. Hashemi and R. Khayami, "Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence," IEEE Transactions on Emerging Topics in Computing, 26 September 2017. 3. DanielMorato, EduardoBerrueta, EduardoMagaña, MikelIzal," Ransomware early detection by the analysis of file sharing traffic", Journal of Network and Computer Applications, vol.124, pp.14-32, 15 December 2018 4. HanqiZhang, XiXiao, FrancescoMercaldo, ShiguangNi, FabioMartinelli, Arun KumarSangaiah," Classification of ransomware families with machine learning based on N-gram of opcodes", Future Generation Computer Systems, vol.90, pp.211-221, January 2019 133. 5. D. Min et al., "Amoeba: An Autonomous Backup and Recovery SSD for Ransomware Attack Defense," in IEEE Computer Architecture Letters, vol. 17, no. 2, pp. 245-248, 1 July-Dec. 2018. 6. L. J. García Villalba, A. L. Sandoval Orozco, A. López Vivar, E. A. Armas Vega and T. Kim, "Ransomware Automatic Data Acquisition 653-656 Tool," in IEEE Access, vol. 6, pp. 55043-55052, 2018. 7. Alfredo Cuzzocrea, Fabio Martinelli, Francesco Mercaldo, Giorgio Mario Grasso," Experimenting and assessing machine learning tools for detecting and analyzing malicious behaviors in complex environments", Journal of Reliable Intelligent Environments, vol.4, no.4, pp 225– 245, December 2018 8. Aniello Cimitile, Francesco Mercaldo,Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio," Talos: no more ransomware victims with formal methods", International Journal of Information Security, vol.17, no.6, pp 719–738, November 2018 9. ZhaoDongmei, LiuJinxing," Study on network security situation awareness based on particle swarm optimization algorithm", Computers & Industrial Engineering, vol.125, pp.764-775, November 2018 10. JianfengGuan, ZhijunWei, IlsunYou," GRBC-based Network Security Functions placement scheme in SDS for 5G security", Journal of Network and Computer Applications, vol.114, pp.48-56, 15 July 2018 11. AbdussalamSalama, RezaSaatchi," Probabilistic classification of quality of service in wireless computer networks", ICT Express, Available online 5 October 2018 12. NicolaAccettura, GiovanniNeglia, Luigi AlfredoGrieco," The Capture-Recapture approach for population estimation in computer networks", Computer Networks, vol.89, pp.107-122, 4 October 2015 13. StearnsBroadhead," The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments", Computer Law & Security Review, vol.34, no.6, pp.1180-1196, December 2018 14. LucaTosoni," Rethinking Privacy in the Council of Europe's Convention on Cybercrime", Computer Law & Security Review, vol.34, no.6, pp.1197-1214, December 2018 15. KrzysztofCabaj, MarcinGregorczyk, WojciechMazurczyk," Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics", Computers & Electrical Engineering, vol.66, pp.353-368, February 2018 16. Jane Y.ZhaoMD, MS, Evan G.KesslerMD, JihnheeYuPhD, KabirJalalPhD, Clairice A.CooperMD, FACS, Jeffrey J.BrewerMD, FACS, Steven D.SchwaitzbergMD, MA, FACS, Weidun AlanGuoMD, PhD, FACS," Impact of Trauma Hospital Ransomware Attack on Surgical Residency Training", Journal of Surgical Research, vol.232, pp.389-397, December 2018 Authors: R.Sundar, Stephen Arputharaj Operating System using CAN Bus on Different Process Circulated Technology with High Speed Prime Marine Paper Title: Engine Abstract: The objective of this work is marine main diesel engine with four stroke and normal speed operating system depend on circulated dealing out and failure tolerant Control area topology control arrangement correspondence innovation was exhibited. It incorporates various units like motor control unit, demonstrating board unit, motor wellbeing unit, primary motor interface, engine control unit computerized representative unit and dispersed preparing unit. Framework information can be traded by double repetitive CAN organize. The appropriated handling unit is free in material science totally; it contains less units effect even if few units broke down. The correspondence of framework cell is composed by set of rules correspondence convention of CAN, which individual parameter analyze . The Unit has capacity of individual -protection when misfortune influence, and local unit decide to stop the point its abnormal in speed insufficient of air it interact the local unit and high priority interface and control the engine are advantageous and 134. amicable.

657-659 References: 1. Cassez, F., Jard, C., Rozoy, B. and Ryan, M.D. eds., 2003. Modeling and Verification of Parallel Processes: 4th Summer School, MOVEP 2000, Nantes, France, June 19-23, 2000. Revised Tutorial Lectures (Vol. 2067). Springer. 2. Merz, S. and Cassez, F., 2001. Modeling and Verification of Parallel Processes. Springer-Verlag, LNCS, 2067, pp.3-38. 3. Dou, W.C., Xi, X.P. and Cai, S.J., 2002. Distributed Processing Oriented Workflow Modeling. COMPUTER INTEGRATED MANUFACTURING SYSTEMS-BEIJING-, 8(7), pp.533-537. 4. Fang, S.X. and Li, Q., 2006. Design and Application of a CAN Higher Layer Protocol with Master-Slave Mode (J). Measurement & Control Technology, 25(08), pp.47-49. 5. Tang, X.J., Li, H.M., Jin, H.B., Yu, F.P., Peng, H.P. and Zhou, T.B., 2003. Development of Remote Control System for Middle Speed Marine Diesel Engine (J). Journal of Wuhan University of Technology, 27(05), pp.625-628. 6. Zhang, G.C., 2008. Development of Simulator on Digital Speed Regulator for Marine Main Engine (J). Ship & Ocean Engineering, 37(05), pp.50-54. 7. Zhang, G.C. and Ren, G., 2008. Research and Realization of PID+ Digital Speed Regulator for Main Engine (J). Navigation of China, 31(02), pp.117-121. 8. Meng, J. and Ma, J., 2009. Controlling Technology and Clutch Model of Twin-engine Incorporation (J). Ship Engineering, 31, pp.58-62. 9. Zheng, W.M. and Huang, Y.X., 2000. The Design and Analysis on Speed Feedback Link of Main Engine Remote Control System (J). Journal of Jimei University (Natural Science), 5(4), pp.7-10. 10. Jinchu, H.U., 2002. The design of Large Power Monitoring System Based on Distributed Process [J]. Computing Technology and Automation, 3, p.019. 11. Vettriselvan R., Ruben Anto., & Jesu Rajan FSA (2018), Rural lighting for energy conservations and sustainable development, International Journal of Mechanical Engineering and Technology, 9(7):604-611. 12. Vettriselvan R., & Ruben Anto., (2018) Pathetic Health Status and Working Condition of Zambian Women, Indian Journal of Public Health Research & Development, 9(9):259-264. 13. Vettriselvan R., Sathya M., & Velmurugan T. (2018), Productivity and Profitability Mechanical Engineering Entrepreneurs: Business Perspective, International Journal of Mechanical Engineering and Technology, 9(8): 758–765. Authors: B Nandish, K P Muthanna, M B Kaveriappa, P S Biddappa Paper Title: Neodymium Magnetic Shock Absorber for Two Wheelers Automobiles Abstract: This paper presents a research work on magnetic suspension system of two wheelers Automobiles, which are usually depending on spring type, Hydraulic and Pneumatic suspension systems. In this proposed magnetic suspension system, two permanent magnets made of Neodymium material are placed inside the shock absorber cylinder such that both facing same pole. So they produce a repulsive magnetic flux force, when they come closer due to shocking load. This repulsive magnetic flux force is used as shock absorbing media and provides damping force. Proposed suspension system proves to be more efficient over other type of suspension systems, absorb more number of shocks with high accuracy, has no leakage problem unlike in Hydraulic and Pneumatic system. So all these beneficial qualities make the magnetic suspension system to work efficiently with less maintenance cost and hence the Automobile. 135. References: 1. John C Dixon, “ The shock absorber handbook ”, SAE International, SAE Order No 176, 1999. 660-662 2. Suvriti Dhawan and Ravi Nandu, “ Magnetic Suspension in Automobiles”, Journal of Aeronautical and Automotive Engineering, Print ISSN: 2393-8579, Online ISSN: 2393-8587; Vol. 1, No.1, pp. 20-21, September 2014. 3. S Gopinath , R J Golden Renjith, J Dineshkumar, “Design and fabrication of magnetic shockabsorber” , International journal of Engineering and Technology, Vol.3, No.2, pp.208-211, 2014. 4. V V Borole, K K Chaudhari, “A Review on Magnetic Shock Absorber”, E-ISSN: 2348-0831, Vol.2, Issue 3, pp.104-109, Mar-Apr 2015. 5. Shende Vignesh , Nimbalkar Hrishikesh , Pawar Sanjay , Thorat Vijay , Raut P S , “Magnetic suspension System for Two-Wheeler”, International Journal of Recent Research in Civil and Mechanical Engineering, Vol. 2, Issue 2, pp. 141-146, October 2015 – March 2016. 6. Kale A B,Tamhane S V,Totre A S,Wayal P S, Patait S B, “Magnetic Shock Absorber”, International Journal of Advance Engineering and Research Development Technophilia, Vol.5, Special Issue 04, Feb.-2018. 7. Aniket Bharambe, “ Magnetic Suspension for Motorcycles” , International Journal of Science and Research , Vol.5 ,Issue 9, Sep 2016. 8. S Duym, R Stiens, and K Reybrouck , “Evaluation of shock absorber models” ,Vehicle System Dynamics , Vol. 27, no.2, pp.109 ,1997. Authors: M Eswar Kumar Yadav, P R Kishore, A S Kumar, A S Swetha Sri Paper Title: Influence of Sisal Fibers on the Properties of Rammed Earth Abstract: The use of rammed earth has been increasing widely during recent years in many countries as an alternative material for building houses due to its valuable characteristics such as affordability, environment friendly, comfort, strength and durability. This thesis presents the result of an experimental study to evaluate the compressive strength and bond strength properties of untreated, treated bamboo splints and steel reinforced cement stabilized rammed earth blocks. To overcome the deficiencies of blocks, sisal fibers are added to improve the performance of CSRE blocks. Fibers are secondary reinforced materials and acts as crack arresters which improves the strength of cement stabilized rammed earth blocks. In this experimental study, red soil is mixed by adding four different percentages (5%, 10%, 15%, and 20%) of OPC and sisal fiber with 0.2%, 0.4%, 0.6%, 0.8%, and 1.0% by weight of soil respectively. The bamboo splints were treated by soaking them in chemical solution of boric acid, Copper -Sulphate and Potassium Di-chromate (1.5:3:4).The resin-based adhesive with coarse sand will be applied to the top of bamboo splints. After 28days of curing period the cubes were tested for compressive strength, pull-out test is done for a series of CSRE blocks in which Bamboo splints and steel bars are embedded to find out its bond strength.

Index Terms: Rammed Earth, Cement Stabilised Rammed Earth (CSRE), Sisal Fiber, Compressive Strength, Bond 136. Strength. 663-667 References: 1. Abrishami, H. H., and D. Mitchell. 1996. “Analysis of Bond Stress Distributions in Pull-out Specimens.” Journal of Structural Engineering 122 (3): 255–261. Berge, B. 2009. 2. Ghavami, K. 2005. “Bamboo As Reinforcement in Structural Concrete Elements.” Cement and Concrete Composites 27 (6): 637–649. 3. Ghavami k, Hombeeck RV, Application of bamboo as a construction material: Part 1-Mechanical properties and water repellent treatment of bamboo, Part II-Bamboo reinforced concrete beams. In: Proc of Latin American Symp ON Rational Organization of Building Applied to Low Cost Housing. CIB, Sao Paulo, Brazil, 1981. P. 49-66. 4. Ghavami K. Application of Bamboo as a low-cost construction material. In: Proc of Int Bamboo Workshop, choin, India, 1988. P, 270-9. 5. Janssen JA. Bamboo in building structures, PhD thesis, Endio-ven University of Technology, Holland, 1981. 6. Morel JCmMeshah A, Oggerto M, Walker P. Building Houses with Local Materials: Means to drastically reduce the environmental impact of construction, Building and Environment 2001:36:119-26 7. Janssen JA. The importance of bamboo as a building material. Bamboos current research. In: Proc of the Int Bamboo Workshop, Kerala Forest Research Institute—India & IDRC—Canada, 1988 .p.235-41. 8. Dunkelberg K et al. Bamboo as a building material. Bamboo-IL31, Institute for light weight Structures, University of Stuttgart, 1985. P. 1- 431. 9. Walker, P.J.., and S.Dobson. 2001. “Pullout Test on Deformed and Plain Rebars in cement-stabilized Rammed Earth” Journal of Materials in civil engineering 13(4):291-297. 10. Yankelevsky, D.Z.1985 “Bond Action between Concrete and a Deformed Bar- A New Model...” Journal of American Concrete Institute 82(2): 154-161 Authors: Japneet Kaur, Harmeet Singh Paper Title: Intrusion Detection Techniques for Secure Communication in Different Wireless Networks Abstract: Technological advancement in the design of wireless communication have propelled an active interest in the field of Wireless Networks, Wireless Sensor Networks (WSNs), and Mobile Adhoc Networks (MANETs). Now days the speed and privacy are more reason of concern than the performance. The attacks can occur and there is always a chance that it will be a success. One of the major problems with Wireless Network security is that, all types of attacks are not known, and new ones emerge constantly [6]. Moreover, there is also a range of attacks that can be launched in the different mode, and thus making it more difficult for the Intrusion Detection System (IDS) to detect them. Therefore, main approach in network security is to detect and remove malicious intrusions. In this paper three different techniques have been proposed for securing Wireless LAN, WSNs and MANETs.

Keywords: Wireless Networks, Wireless LAN, WSNs, MANETs, Intrusion, IDS.

References: 137. 1. Rupinder Singh, Jatinder Singh, and Ravinder Singh published “WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks” I.K.G. Punjab Technical University, Kapurthala, Punjab, India Received 30 August 2016; Revised 23 October 2016; 668-671 Accepted 2 November 2016 2. http://citeseerx.ist.psu.edu/viewdoc/download?doi =10.1.1.84.1595&rep=rep1&type=pdf 3. By George Coulouris, Jean Dollimore and Tim KindbergAddison-Wesley, ©Pearson Education 2001 Distributed Systems: Concepts and Design https://www.academia.edu/23740987/Chapter_1_Exercise_Solutions 2000 4. Rupinder Singh, Dr. Jatinder Singh & Dr. Ravinder Singh FUZZY BASED ADVANCED HYBRID INTRUSION DETECTION SYSTEM TO DETECT MALICIOUS NODES IN WIRELESS SENSOR NETWORKS” PUBLISHED IN 2016 HTTPS://WWW.SCRIBD.COM/DOCUMENT/357451353/3548607 5. Opinder Singh , Dr. Jatinder Singh & Dr. Ravinder Singh, DHHP: A Hybrid Technique for Protecting Mobile Adhoc Networks from Selective Packet Drop Attack International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 7 (2017), pp. 1743 -1763 © Research India Publications http://www.ripublication.com 6. Manish Kumar,Dr. M. Hanumanthappa, Dr. T. V. Suresh Kumar “Intrusion Detection Systems Challenges for Wireless Network” International Journal of Engineering Research and Applications (IJERA) ISSN: 22489622 www.ijera.com Vol. 2, Issue 1, Jan - Feb 2012, pp.274-280 7. [Kaur, Ravneet.” Advances in Intrusion Detection System for WLAN” Advances in Internet of Things,2011 8. Opinder Singh,Jatinder Singh, Ravinder Singh, “An Intelligent Intrusion Detection and Prevention System for Safeguard Mobile Adhoc Networks against Malicious Nodes”, Indian Journal of Science & Technology 2017 Authors: Shrinivas S. Metan, Abhishek R. Kshirsagar, Govind N. Samleti, Vinayak K Patki Paper Title: Anti-Glare Headlamp a Safe Option for Better Vision to the Rider Abstract: As per the Ministry of Road Transport and Highways report 2018, every day around 410 road fatalities in India, which is one of the highest road crash fatalities in the world. Evaluations show that an average of 1% of nighttime fatal crash lists glare as a major contributor factor. On the multilane highway, vehicle with high glared headlamp light disturbs the approaching motorist eyes due to which the vision of the motorist gets indistinct for a few seconds causing accidents on the road. In the present work, a novel concept of an anti-glare headlamp is proposed to avoid the temporary blindness of the motorist due to momentary high glares from approaching vehicles. The anti-glare film reduces glare and halos around headlamp light at night and eliminates unattractive reflections on the eyes. A successful attempt is made to analyze the visibility of objects in a scene by inspecting contrast reduction caused by the illuminance contribution. Our visualization of scenes with the cover-up veiling illuminance gives a good indication of the visual problems that might occur, but the images are not exactly what people perceive when observing the scene in reality. In the present study, after number of samples, it has found that that the mixture of yellow and green color film combination on halogen bulb headlamp will give a good vision to the rider as well as glare-free effect to the approaching motorist. Visualizations with the proposed method can still improve the understanding of human vision so that visual aspects can be taken into account in design and quality assurance of head lamp.

138. Keywords: Headlamp, Motorist, Glare, Visibility 672-678 References: 1. John D Bullough, Kate Sweater Hikcox, N Narendran, “A Method for Estimating Discomfort Glare from Exterior Lightning Systems”, Lightning Research Center, Rensselaer Polytechnic Institute, USA, Volume 9, pp. 1-4, April 2011. 2. J. D. Bullough, N. P. Skinner, R. M. Pysar, L. C. Radetsky, A. M. Smith and M. S. Rea, “Nighttime Glare and Driving.” National Highway Traffic Safety Administration, Washington, DC, Report No.DOT HS 811 043, September 2008. 3. Robert Tamburo, Eriko Nurvitadhi, Abhishek Chugh, Mei Chen, Antony Rowe, Tikeo Kanade, Srinivasa G Narasimhan, “Programmable Automotive Headlights”, Computer Vision- ECCV 2014 Lecture Notes in Computer Science, Volume 8692, Springer, Cham, pp.750-765, January 2014. 4. Oliver Wang, Martin Fuchs, Christian Fuchs, James Davis, Hans-Peter Seidel, Hendrik P. A. Lensch, “A context-aware light source”, Computational Photography (ICCP), 2010 IEEE International Conference, IEEE, pp1-8, March 2010. 5. John Van Derlofske, John D. Bullough, Peping DEE, Jie Chen, Yukio Akashi. “Headlamp parameters and Glare”,SAE Technical paper, pp 1-11, March 2004. 6. John D Bullough and John Van Derlofske, “Headlamp Illumination and Glare: An Approach to Predicting Peripheral Visibility”, SAE Technical Paper, pp 22-34, March 2004. 7. Yukio Akashi and Mark Rea, “The effect of oncoming headlight glare on peripheral detection under a mesopic light level”, The National Academies of Sciences, Engineering and Medicine, Washington, DC, Reference Book, pp. 9-22, January 2001. 8. Balk, Stacy, Tyrrell, Richard, “The accuracy of driver judgment of the effects of headlight glare: are we really blinded by the light?”, International Conference at Olympic Valley- Lake Tahoe CA, pp. 510-517, October 2017. 9. “Nighttime Glare and Driving Performance, Report to Congress”, (2007) National Highway Traffic Safety Administration, pp 25-39, February 2007. 10. Riccardo Bianchin, “Light sources for exhibition design part-1”, Inexhibit photos, Inexhibit, Bianchini and Lusiardi associated architects, pp 32-45, September 2018. 11. International Light Technology “Tungsten halogen lamps and Gas filled lamps”, Inexhibit photos, Inexhibit, Bianchini and Lusiardi associated architects, pp 21-33, 2018. 12. Roger H. Hemion, “The Effect of Headlight Glare on Vehicle Control and Detection of Highway Vision Targets”, Report No.AR-640, 01, 1, pp 45-74, May 1968. 13. Stephanie A Whetsel Borzendowski , Ashley A. Stafford Sewall, Patrick J. Rosopa, Richard A. Tyrrell. “Drivers' judgments of the effect of headlight glare on their ability to see pedestrians at night”, National Safety Council and Elsevier Ltd, Volume 53, pp. 31-37, June 2015 14. John D Bullough, Nicholas P. Skinner, Yukio Akashi, and John Van Derlofske, “Investigation of Safety-Based Advanced Forward- Lighting Concepts to Reduce Glare”, Lighting Research Center, Rensselaer Polytechnic Institute, USA, Report No. DOT HS 811 033, 01, pp43-56, September 2007 15. Van Derlofske, J., Chen, J., Bullough, J., and Akashi, Y. "Headlight Glare Exposure and Recovery," SAE 2005 World Congress & Exhibition, Technical Paper 2005-01-1573, April 2005. Authors: N. Saritakumar Adarsh V Srinivasan Elfreda Albert S. Subha Rani Paper Title: Performance Evaluation of Pox Controller for Software Defined Networks Abstract: In traditional network the coupling of data plane and control plane makes the data forwarding, processing and managing of the network hard and complex. Here each switch takes its own decision, makes the network logically decentralized. To overcome the limitations in traditional network the Engineers developed a new model network known as Software Defined Network (SDN). This network the control plane is decoupled from the data plane making it less complex. It moreover has a logically centralized approach unlike the existing network. This separation enables the network control to be directly programmable and the architecture to be abstracted for applications and network services. SDN platform provides advantages like programmability, task virtualization and easy management of the network. However, it faces new challenges towards scalability and performances. It is a must to understand and analyze the performances of SDN for implementation and deployment in live network environments. SDN working with POX is studied. This paper analyses the working of POX controller and evaluates the performance metrics of POX controller for SDN environment. The emulation is done using the Emulation software.

Keywords: Traditional Network; SDN; Mininet; Emulator; Firewall; OpenFlow Protocol 139.

References: 679-684 1. Diego Kreutz, Fernando M. V. Ramos, Paulo Verissimo, Christian Esteve Rothenberg, Siamak Azodolmolky, and Steve Uhlig, “ Software Defined Networking : A Comprehensive Survey,” 2014, in Proceedings of the second workshop on Hot topics in software defined networks 2. Faris Keti, Shavan Askar,” Emulation of Software Defined Networks Using MiniNet in Different Simulation Environments”, 2015, 6th International Conference on intelligent Systems, Modelling and Simulation, pp 9-2,2016 3. Fei Hu, Qii Hao and Ke Bao, “A Survey on Software Defined Network and OpenFlow: From Concept to Implementation” in IEEE Communication surveys & Tutorials,vol.16,No.4,Fourth Quarter 2014 4. Rogerio Leao Santos de Oliveria, Christiane Maire Schweitzer, Ailton Akira Shinoda, Ligia Rodrigues Prete,” Using mininet emulation and prototyping Software Defined networks”, 2014, IEEE Colombian Conference on Communication and Computing(COLCOM), pp 4- 6,2014 5. The Openflow Switch, openflowswitch.org. 6. S.Avallone, S.Guadagno, D.Emma and A.Pescape,“ D-ITG Distributed Internet Traffic Generator,” 2014, Proceedings of the First international conference on Quantitative Evaluation of Systems (QEST’04). 7. Saleh Asadollahi, Bhargavi Goswami and Mohammed Sameer,” Ryu Controller’s Scalability Experiment on Software Defined Networks”, 2016, 7th International Conference on intelligent Systems, Modelling and Simulation, pp 9-2,2017 8. Semaliansky R.L, “SDN for Network Security”, 2014 IEEE International Conference. Authors: K.M.Ashifa Paper Title: Impact of Hydrocarbon Extraction in Neduvasal: A Psycho- Social Assessment Abstract: Hydrocarbon extraction clean extraction method that leaves little or no hydrocarbon residue when properly utilized. At the end of the hydrocarbon extraction process, the resulting extract is clean and contains very high levels of cannabinoids and terpenes. The present study dealt with the critical analysis of the Environment Impact Assessment as if the report has given the explanation on the diverse effects of environment and precise mitigation process of the project in Neduvasal. Secondly the study dealt with the socio demography profile of the people in Neduvasl and its village system. The study is thirdly also dealing with the psycho socio impacts of the village people in Neduvasal as how far they have understood the project. The study has also analyzed the causes of the protest executed by the people movement. The study is also trying to suggest by intervention strategy that the hydrocarbon extraction project must find some other alternate ways of doing it and also it is people’s responsibility of reducing oil usage in whatever the way it is possible for example, trying to use mostly the public vehicles.

140. Keywords: Hydrocarben, Environment, extraction

685-687 References: 1. Ayyanathan, K. (2017). Kizhakku Pathippagam. Hydrocarbon Abaayam: Iyarkaikum Manithakula thukkumedhiraana Pera zhivu thittam, 09-36.Cited on https:// www .myhy drolife. com /definition /1333/hydro carbon -extraction 2. Bentley, R.W (2002).Global oil & gas depletion: an overview Energy Policy. 30(3),189-20. 3. Chidinma.G.E.,(2012). Importance of Hydrocarbon, retrieved from https: //www. scribd.com/document/158218908/Importance-of- Hydrocarbon 4. http://environmentclearance.nic.in/writereaddata/EIA/040920145PFGJ5JBAnnexureFinalEIAREPORTWB-ONN-2005-3.pdf 5. http://shodhganga.inflibnet.ac.in/bitstream/10603/6279/11/11_chapter%202.pdf 6. http://www.thehindu.com/news/national/tamil nadu/hydrocarbon-project-a-threat-pwf/article17384512.ece 7. https://en.wikipedia.org/wiki/Hydrocarbon 8. https://energy.economictimes.indiatimes.com/news/oil-and-gas/protests-against-hydrocarbon-project-in-kerala-gathers-momentum/ 9. https://terpenesandtesting.com/bho-extractions/ 10. https://thewire.in/environment/neduvasal-protest-oil-gas 11. https://timesofindia.indiatimes.com/...scholar...hydrocarbon-project 12. https://www.cannainsider.com/reviews/marijuana-glossary/hydrocarbon-extractio 13. https://www.coloradopotguide.com › Marijuana Glossary › Hydrocarbon Extraction 14. https://www.marijuanaventure.com/an-education-in-extraction/ 15. https://www.myhydrolife.com/definition/1333/hydrocarbon-extraction 16. https://www.myhydrolife.com/definition/1333/hydrocarbon-extraction 17. https://www.quora.com/What-is-this-hydrocarbon-project-about-Why-should-it-be-ba. 18. https://www.quora.com/What-is-this-hydrocarbon-project-about-Why-should-it-be-banned 19. https://www.scribd.com/document/158218908/Importance-of-Hydrocarbon 20. Nityanand J ( March, 2017) All You Need to Know About the Neduvasal Protests Against Hydrocarbon Extraction, The Wire retrieved from https://thewire.in/environm ent / neduvasal-protest-oil-gas 21. Priyanka.S (2017)Neduvasal Hydrocarbon Project Controversy: Everything you need to know retrieved from https:// www.clearias .com/neduvasal-hydrocarbon-project 22. The Hindu (March 01, 2017)Tamil Nadu will benefit from hydrocarbon project: Centre. 23. The New Indian Express (27th February 2017) Neduvasal hydrocarbon project agitation fuels more protests in Pudukottai 24. Venkteshwaran. T.V., Karunakaran. C.E., Sedhuraman.,Rajan. P.K. (2017). Science Publications. Hydrocarbon in the light of Science. 5- 35. Authors: R.Mahender Reddy, K Nishanth Rao, S V S Prasad Paper Title: Traffic Congestion Monitoring and Management by using IOT Abstract: In this day and age, congested driving conditions during surge periods are one type of the real apprehensions. During flood days, emergency vehicles are trucks slow down out in jams. Along these positions, the emergency automobiles are not equipped to complete their objectives on time, it will leads into lost human lives. In this paper proposed to avoid such type of issues, in this paper presented on a self-ruling 2-level framework which will help in the recognizable proof of crisis vehicles or some other wanted vehicle. Here designed the IOT based structure, it will monitor and managing the traffic situation continuously.

Keywords: Ardunio controller, sensors, RFID, IOT Module.

References: 1. An Automated Game Theoretic Approach for Cooperative Road Traffic Management in Disaster, Samya Muhuri, Debasree Das, IEEE International Symposium on Nano electronic and Information Systems, 2017 141. 2. A Review of IoT devices for Traffic Management System, N. B. Soni, Jaideep Saraswat, Proceedings of the International Conference on Intelligent Sustainable Systems (ICISS 2017). 688-689 3. Research on Collaborative Strategic Air Traffic Flow Management Based on BDI Agent, Wu Xiping, Yang Hongyu,Yang Bo, Yu Jing, 13th International Conference on Embedded Software and Systems,2016. 4. A Novel Assistive On-ramp Merging Control System for Dense Traffic Management, Weihai Chen, Zheng Zhao, IEEE, 2017 5. Nu Transport Improved Intelligent System for Reliable Traffic Control Management by Adapting Internet of Things, Ramkumar Eswaraprasad , Linesh Raja,IEEE,2017 6. L. Da Xu, W. He, and S. Li, “Internet of things in industries: A survey,” IEEE Transactions on industrial informatics, vol. 10, no. 4, pp. 2233– 2243, 2014. 7. Z. Ning, X. Hu, Z. Chen, M. Zhou, B. Hu, J. Cheng, and M. S.Obaidat, “A cooperative quality-aware service access system for social Internet of vehicles,” IEEE Internet of Things Journal, Doi: 10.1109/JIOT.2017.2764259, 2017. 8. J. He, Y. Ni, L. Cai, J. Pan, and C. Chen, “Optimal drop box deployment algorithm for data dissemination in vehicular networks,” IEEE Transactions on Mobile Computing, vol. 17, no. 3, pp. 632–645, 2018. 9. C. Zhu, L. Shu, V. C. M. Leung, S. Guo, Y. Zhang, and L. T. Yang, “Secure multimedia big data in trust-assisted sensor-cloud for smart city,” IEEE Communications Magazine, vol. 55, no. 12, pp. 24–30, 2017. 10. W. Li, C. Zhu, V. C. M. Leung, L. T. Yang, and Y. Ma, “Performance comparison of cognitive radio sensor networks for industrial IoT with different deployment patterns,” IEEE Systems Journal, vol. 11, no. 3, pp. 1456–1466, 2017 Authors: B. Mounika, B. Sridhar, S.V.S.Prasad Paper Title: PCI Matrix Based Image Reconstruction from Compressively Sensed Data Abstract: This paper propounds a joint system wherever in raise to a higher position-based, distinguishable, picture coordinated wavelets are measurable from squeezeingly seen pictures and are utilized for the remaking of indistinguishable. Coordinated swell is just outlined if full picture is advertised. Conjointly contrasted and the quality wavelets as scarifying bases, coordinated swell may surrender higher remaking closes in compressive detecting (CS) application. Since in metallic component application, we have squeezeingly seen pictures as opposed to full pictures, existing methods for arranging coordinated swells can't be utilized. In this way, we tend to propose a joint structure that evaluations coordinated wavelets from squeezeingly saw pictures and conjointly remakes full pictures. 3 Indispensable commitments. Initial, a lifting-based, picture coordinated severable swell is implied from compressively seen pictures and is furthermore wont to remake indistinguishable. Second, a simple detecting lattice is utilized to test data at sub-NY Quist rate such detecting and remaking time is decreased essentially. Third, a substitution staggered L-Pyramid swell decay procedure is accommodated severable swell execution on pictures those outcomes in enhanced remaking 142. execution. Contrasted and the CS-based recreation misuse typical swells with Gaussian detecting network and with existing swell decay system, the arranged approach gives snappier and higher picture reproduction in metallic component 690-694 application.

Keywords: Compressive sensing, matched wavelet, lifting, wavelet decomposition.

References: 1. E. J. Candès, J. Romberg, and T. Tao, “Robust uncertainty principles: actual signal reconstruction from extremely incomplete frequency data,” IEEE Trans. Inf. Theory, vol. 52, no. 2, pp. 489–509, Feb. 2006. 2. D. L. Donoho, “Compressed sensing,” IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1289–1306, Apr. 2006. 3. A. Gupta, S. D. Joshi, and S. Prasad, “A new methodology of estimating riffle with desired options from a given signal,” Signal method., vol. 85, no. 1, pp. 147–161, Jan. 2005. 4. A. Gupta, S. D. Joshi, and S. Prasad, “A new approach for estimation of statistically matched riffle,” IEEE Trans. Signal method., vol. 53, no. 5, pp. 1778–1793, May 2005. 5. N. Ansari and A. Gupta, “Signal-matched riffle style via lifting mistreatment optimisation techniques,” in Proc. IEEE Int. Conf. Digit. Signal method. (DSP), Jul. 2015, pp. 863–867. 6. J. O. Chapa and R. M. Rao, “Algorithms for planning wavelets to match a mere signal,” IEEE Trans. Signal method., vol. 48, no. 12, pp. 3395– 3406, Dec. 2000. 7. R. L. Claypoole, R. G. Baraniuk, and R. D. Nowak, “Adaptive riffle transforms via lifting,” in Proc. IEEE Int. Conf. Acoust., Speech Signal method., vol. 3. May 1998, pp. 1513–1516. 8. G. Piella, B. Pesquet-Popescu, and H. J. A. M. Heijmans, “Gradientdriven update lifting for accommodative wavelets,” Signal method., Image Commun., vol. 20, nos. 9–10, pp. 813–831, Oct./Nov. 2005. 9. H. J. A. M. Heijmans, B. Pesquet-Popescu, and G. Piella, “Building nonredundant accommodative wavelets by update lifting,” CWI, Amsterdam, European nation, Res. Rep. PNA-R0212, 2002. 10. W. Sweldens, “The lifting scheme: A custom-design construction of biorthogonal wavelets,” Appl. Comput. Harmon. Anal., vol. 3, no. 2, pp. 186–200, Apr. 1996. 11. W. Dong, G. Shi, and J. Xu, “Signal-adapted directional lifting theme for compression,” in Proc. IEEE Int. Symp. Circuits Syst., May 2008, pp. 1392–1395. 12. G. Quellec, M. Lamard, G. Cazuguel, B. Cochener, and C. Roux, “Adaptive nonseparable riffle rework via lifting and its application to content-based image retrieval,” IEEE Trans. Image method., vol. 19, no. 1, pp. 25–35, Jan. 2010. Authors: S.Shilpa, Ch.Umashankar, S V S Prasad Paper Title: Design of Watchdog Timer for Real Time Applications Abstract: The Embedded system is employ in safety and critical application, which is greater reliability. The watchdog timers are used in automatic systems to handle the operation time for secure the timer failure. Majority of the watchdog timers used an additional circuit to adjust their timeout position and it will provide limited services in terms of working. This paper presents the architecture of a watchdog timer and also gives the design structure, it will working in safety and critical conditions. The operations are general and it can be used to monitor the working of any processor in real-time application. This paper discussed the implementation of the proposed timer in a FPGA. This will helps to design easily in different applications, it will gives reduces the overall system cost. The watchdog timers is to detect and give response very effectively and also gives the responses of faults by analyzing the simulations.

Index Terms: watchdog timer, computer, clock

References: 1. S. N. Chau, L. Alkalai, A. T. Tai, and J. B. Burt, “Design of a fault tolerant COTS-based bus architecture,” IEEE Transactions on Reliability, 143. vol. 48, no. 4, pp. 351–359, Dec. 1999. 2. V. B. Prasad, “Fault tolerant digital systems,” IEEE Potentials, vol. 8, no. 1, pp. 17–21, Feb. 1989. 3. J. Beningo, “A review of watchdog architectures and their application to Cubesats,” Apr. 2010. 695-697 4. A. Mahmood and E. J. McCluskey, “Concurrent error detection using watchdog processors - a survey,” IEEE Transactions on Computers, vol. 37, no. 2, pp. 160–174, Feb. 1988. 5. B. Straka, “Implementing a microcontroller watchdog with a field programmable gate array (FPGA),” Apr. 2013. 6. J. Ganssle, “Great watchdogs,” V-1.2, The Ganssle Group, updated January 2004, 2004. 7. E. Schlaepfer, “Comparison of internal and external watchdog timers application note,” Maxim Integrated Products, 2008. 8. P. Garcia, K. Compton, M. Schulte, E. Blem, and W. Fu, “An overview of reconfigurable hardware in embedded systems,” EURASIP Journalon Embedded Systems, vol. 2006, no. 1, pp. 13–13, Jan. 2006. 9. G. C. Giaconia, A. Di Stefano, and G. Capponi, “FPGA-based concurrent watchdog for real-time control systems,” Electronics Letters, vol. 39, no. 10, pp. 769–770, Jun. 2003. 10. A. M. El-Attar and G. Fahmy, “An improved watchdog timer to enhance imaging system reliability in the presence of soft errors,” in Signal Processing and Information Technology, 2007 IEEE InternationalSymposium on. IEEE, Dec. 2007, pp. 1100–1104. 11. M. Pohronsk´a and T. Krajˇcoviˇc, “FPGA implementation of multiple hardware watchdog timers for enhancing real-time systems security,” in EUROCON-International Conference on Computer as a Tool (EUROCON),2011 IEEE. IEEE, Apr. 2011, pp. 1–4. 12. H. Guzman-Miranda, L. Sterpone, M. Violante, M. A. Aguirre, and M. Gutierrez-Rizo, “Coping with the obsolescence of safety- or missioncritical embedded systems using fpgas,” IEEE Transactions on IndustrialElectronics, vol. 58, no. 3, pp. 814–821, 2011. 13. H. Amer and A. Sobeih, “Increasing the reliability of the Motorola MC68HC11 in the presence of temporary failures,” in ElectrotechnicalConference, 2002. MELECON 2002.11th Mediterranean. IEEE, May 2002, pp. 231–234. Authors: SK. Wasim Akram, M.Varalakshmi, J.Sudeepthi Streaming Big Data Analytics- Current Status, Challenges and Connection of unbounded data Processing Paper Title: platforms Abstract: A strategy of examining immense dimensions of structured, un-structured, Semi-Structured data sets is referred as Big data Analytics. Streaming Big Data refers to data generated continuously from number of data sources like Internet-of-Things (IoT) devices, mobile applications, Embedded Sensors, web clicks and many more are needed to be store, processed and analyzed in a tiny interval of time in order to extract meaningful insights and take proper decisions in a timely fashion as the necessity arises. However analyzing streaming big data (continuous flow or unbounded data) is a very challenging problem. Continuous data streams have become essential prerequisite for numerous industrial and scientific applications, the current existing technology Hadoop-MapReduce is not appropriate for stream processing of big data. This paper discusses the challenges and benefits of streaming big data along with its architecture, and focuses on different open source streaming processing platforms that are existed to process the huge data at a high speed. 144. Keywords: Structured, Unstructured, Semi-structured, Big Data, streaming data, IoT, hadoop, MapReduce 698-700 References: 1. Debating big data: A literature review on realizing value from big data” by wendy Arianne Gunther, Mohammad H. Rezazade, Journal of Strategic Information Systems, no-26, 2017. 2. “Big data analysis on youtube using Hadoop and Mapreduce” by soma hota, IJCERT, Vol-5, Issue-4, 2018. 3. Real-time Data Stream Processing Challenges and Perspectives” by OUNACER Soumaya, TALHAOUI Mohamed Amine, ARDCHIR Soufiane , DAIF Abder rahmane and AZOUAZI Mohamed, in IJCSI, volume 14, Issue 5, September 2017. 4. “Analysis of media Datasets using Hadoop MapReduce”Usha.G.R,Aishwarya S, Kavitha, IJSDR, Vol-2, Issue-6, June 2017. 5. K. LEBOEUF, “2016 Update_ What Happens in One Internet Minute_ - Excelacom, Inc.” [Online].Available: http://www.excelacom.com/resources/blog/2016-updatewhat-happens-in-one-internet-minute. 6. “A SURVEY ON STREAM PROCESSING AND STREAMING ANALYTICS FOR REAL - TIME BIG DATA” by B. Srivani, Dr. N. Sandhya and S. Renu Deepti in IJLTET –ICRACSC, 2016. 7. “Survey paper on Big data and Hadoop” by Varsha B.Bobade in IRJET, vol-3, issue-1, Jan-2016. 8. Predective analysis Concepts in Big Data-A survey” by S. Banumathi, A.Aloysius, in IJARCS, Vol-8,No-8, sep-oct-2017. 9. “Big data Analytics: Challenges and Solutions Using Hadoop, Map Reduce and Big Table”, IJCST, Vol-4, issue 1, Feb 2016. 10. “Technologies to handle Big Data: A survey” by sabia and Love Arora in ICCCS, 2014. 11. “A review paper on big data and Hadoop” by Harshawardhan S.Bhosale, Devendra P. Gadekar, IJSRP,Vol 4, Issue 10, Oct 2014. 12. Umapavankumar.K, Dr.B.Lakshmareddy ,” Various Computing models in Hadoop eco system along with the perspective of analytics using R and Machine learning” Vol. 14 CIC 2016 Special Issue International Journal of Computer Science and information security: 13. (IJCSIS)https://sites.google.com/site/ijcsis/ ISSN 1947-5500. 14. www.cloudera.com 15. “Comparative analysis of Big data Technologies” by Rachit Singhal, Mehak jain, Shilpa Gupta, IJAER, Vol-13, No-6, 2018 Authors: Sai Jyothi Bolla, S. Jyothi, Y. Rajesh Paper Title: Prioritized Property-Value based Data Modelling for Big Data Abstract: In the present era, as technology is emerging widely data storage is also increasing its volume or space of storage enormously; which is the current buzz defined as Big Data. Existing Big Data modelling includes mostly in handling structured data but no defined approach was designed for modelling Big Data which includes structured, semi- structured and unstructured data. Among the existing challenges on Big Data, the most imperative challenge is modelling Big Data. This paper proposes a generic modelling approach for modelling Big Data. The effectiveness of this innovative approach is sensed by modelling oncology data using MongoDB. This modelling facilitates ease analytics and is independent of context.

Index Terms: Big Data, Data Analytics, Data Modelling, MongoDB

References: 1. . IBM, 2012. What is Big Data ? Bringing Big Data to the enterprise. [Online] http://www-01.ibm.com/software/data/bigdata/ 2. Furner, J. (2003). Little Book, Big Book: Before and After Little Science, Big Science: A Review Article, Part I. Journal of Librarianship and Information Science 35 (2): 115–125. doi:10.1177/0961000603352006. Retrieved 2014-02-09. 3. Weiss, R., Zgorski, L. J. (2012). Obama Administration Unveils “BIG DATA” Initiative: Announces $200 Million In New R&D Investments. [Online] http://www.whitehouse.gov/sites/default/files/microsites/ostp/big_data_press_release.pdf 145. 4. Villars, R. L., Olofson, C. W. and Eastwood, M. (2011). Big Data: What it is and why you should care. IDC White Paper. Framingham, MA: IDC. 5. Robert, H. (2012). It’s time for a new definition of Big Data. MIKE2.0: The open source standard for Information Management. [Online] 701-705 http://mike2.openmethodology.org/ 6. Watters, A. (2010). The Age of Exabytes: Tools and Approaches for Managing Big Data (Website/Slideshare). Hewlett-Packard Development Company. 7. Carino, F., and Sterling, W. M. (1998). Method and apparatus for extending existing database management system for new data types. U.S. Patent No. 5,794,250. 8. Schadt, E. E., Linderman, M. D., Sorenson, J., Lee, L. & Nolan, G. P. (2010). Computational solutions to large-scale data management and analysis. Nature Rev. Genet. 11, 647–657. 9. Bell, G., Hey, T., Szalay,A. (2009). Beyond the data deluge, Science 323 (5919), 1297–1298. 10. Hilbert, M., López, P. (2011). The world’s technological capacity to store, communicate, and compute information, Science 332 (6025), 60– 65. 11. Leavitt, N. (2010). Will NoSQL databases live up to their promise?. Computer, 43(2), 12-1 12. André Ribeiro, Afonso Silva, Alberto Rodrigues da Silva, “Data Modeling and Data Analytics: A Survey from a Big Data Perspective”, Journal of Software Engineering and Applications, 2015, 8, 617-634 Published Online December 2015 in SciRes. http://www.scirp.org/journal/jsea http://dx.doi.org/10.4236/jsea.2015.812058 13. 14. Idrees, S.M., Alam, M.A. & Agarwal, P. Int. j. inf. tecnol. (2018). https://doi.org/10.1007/s41870-018-0185-1 15. Karla Saur, Tudor Dumitras ̧ and Michael Hicks, “Evolving NoSQL Databases Without Downtime”, arXiv:1506.08800v3 [cs.DB] 25 Apr 2016. 16. 15.https://pdfs.semanticscholar.org/773e/9e98d42f395864baecf6e87a9c7ded1f36e6.pdf 17. Baloch, Z., Shaikh, F.K. & Unar, M.A. Int. j. inf. tecnol. (2018) 10: 241. https://doi.org/10.1007/s41870-018-0116-1 Xodjimuhamedova Shokhida Ibragimovna, Tolipova Dilfuza Nabievna, Tashkhodzheva Gulnoza Authors: Saydamhodzhaevna, Akramova Nargiza Ahrorovna, Shafkarov Fakhriddin Xudayberdiyevich, Bobonarova Kamola O`kamjon qizi Paper Title: Home Finance - The Source of Improving Wellness of the Population Abstract: For a qualitative analysis of the state of modern society and financial relations prevailing in the financial system of our country, it is especially important to study issues related to attracting public finances to the state economy. The long process of developing commodity-money relations has radically changed the content of finance. If earlier in these relations the main and fundamental role was played by the monarchs, the state, as the owners of all property, then in the XX century. The main owners of valuables, including enterprises and firms, are citizens, and the state represented by public authorities acts as an intermediary and a consumer of redistributed wealth. Confirming this thesis, P. Drucker expressed that the main impetus of progress now comes not from the social structure, 146. but from an individual, and the present time requires every person to take effective actions to transform not only society, but above all himself [1 ]. 706-708 References: 1. Drucker, P. Management: Tasks? Responsibilities. Oxford: Blackwell. 1994. P. 102f. 2. 2. Hojon Jeffery. Economic Theory and Institutions: The Manifesto of Modern Institutional Economic Theory / Trans. from English M .: Delo, 2003. p. 113. 3. 3. Fetisov V. D. Finance and credit: Textbook. / V.D. Fetisov, T.V. Fetisov. - 2nd ed., Pererab. and add. M .: UNITIDANA, 2006. P. 157. 4. 4. Slepov V. А., Ekshembiyev R. S. Personal Finance // Finance and Credit. 2007. No. 40 (280). S. 2. 5. 5. Finance: Textbook / Ed. S.I. Lushin, V.A. Slepova.- 2nd ed., Pererab. and add. M .: Economist, 2003. p. 461. 6. 6. Kozlowski P. Principles of ethical economy. - SPb .: School of Economics, 1999. p. 240. 7. 7. Galbraith J. New Industrial Society. M .: Progress, 1996. P. 159-160. 8. 8. Martsinkevich V.I. Economics of Man. Training allowance / Martsinkevich V. I., Sobolev I. V. Moscow: Aspect Press, 1995. P. 151. Authors: Zokirova Mashhura, Fayzieva Dilrabo, Zokirov Sodikjon 147. Paper Title: Dynamics of Microorganisms' Producent Separation in Nutritional Environment Abstract: This article is devoted to the production of fructose syrups in the fermentative method, as the object of research 709-711 is the inulin topinambur plant. The chemical composition of "Mo'jiza" and "Fayz-Baraka" types of topinambur which grown in Uzbekistan has been studied compared comparatively. Aspergillus oryzae fungus and Saccharomyces cerevisiae yeast are selected as the produtentyan of Inulinase enzyme. For these microorganisms, nutrient enzymes have been prepared to enrich the topinambur extract and topinambur extract with minerals. Microorganisms have been innoculised in these nutritional environments and found activity that biomass, fructose, protein content, as well as inulinase and protease enzymes were found every day.

Keywords: inulin, fructose, Aspergillus oryzae, Saccharomyces сerevisiae, fructose syrop, enzyme, biomass.

References: 1. Thai Ha D. Characterization of inulin hydrolyzing enzyme(s) in commercial glucoamylases and application in acid production from Jerusalem artichoke tubers (Jat) / Thai Ha Dao, Jian Zhang, Jie Bao // Bioresource technology. - 2013. - Vol.148. - P. 157-162. 2. Dzhanikulova U.B., Akhmedova Z.R. Enzymatic method of producing fructose syrup for the food industry // Uzbek Biological Journal. – Tashkent, 2006. -№1. –P. 132-135. 3. Nazarenko, M.N., Barkhatova, M.A. Kozhukhova, R.A. Drozdov Investigation of the process of fermentation of inulin in the production of fructose-glucose syrup // Polythematic network electronic scientific journal of the Kuban State Agrarian institute - Krasnodar, 2014. - №04 (098). Authors: A.Sivasangari, S.Poonguzhali, Immanuel Rajkumar, Maheshwari Paper Title: Face Photo Recognition using Sketch Image for Security System Abstract: Because of expanding requests in application regions, for example, validation of law requirement, video reconnaissance, banking and access to security frameworks, programmed face acknowledgment has pulled in extraordinary consideration as of late. The acknowledgment of the face has ended up being one of the present essential applications. It is utilized fundamentally for computerized amusement, security and authorization. Face acknowledgment can be for the entire or fractional face, the entire face for the entire face identification and explicit highlights for the incomplete face discovery. The examination in most criminal cases relies upon the portrayals attracted by the observers ' depiction. The programmed recovery of photographs from the police mug-shot database that coordinate this depiction can conceivably diminish the quantity of suspects. Fundamentally, this procedure relies upon the onlooker and precision of the sketch craftsman's memory of the face to catch those subtleties. It can help scientists viably find or diminish potential suspects. By and large, be that as it may, a speculate's photograph picture isn't accessible and the best substitute is frequently a sketch drawing dependent on an observer's memory. We present another photograph recuperation framework utilizing face draws by changing a photograph picture into a sketch, fundamentally lessening the distinction among photograph and sketch, enabling the two to coordinate successfully.

Keywords: Deep convolution Neural Network, Sketch Image and Data Augmentation.

References: 1. B. Klare, Z. Li, and A. K. Jain, “Matching forensic sketches to mug shot photos,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 3, pp. 148. 639– 646, Mar. 2011. 2. B. Klare and A. K. Jain, “Heterogeneous face recognition using kernel prototype similarities,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 35, no. 6, pp. 1410–1422, Jun. 2013. 712-715 3. S. Ouyang, T. M. Hospedales, Y. Z. Song, and X. Li, “ForgetMeNot: memory-aware forensic facial sketch matching,” in Proc. Int. Conf. Com- put. Vis. Pattern Recognit., Jun. 2016, pp. 5571–5579. 4. C. Galea and R. A. Farrugia, “Face photo-sketch recognition using lo-cal and global texture descriptors,” in Proc. Eur. Signal Process. Conf., Budapest, Hungary, Aug. 2016, pp. 2240–2244. 5. C. Galea and R. A. Farrugia, “A large-scale software-generated face com-posite sketch database,” in Proc. Int. Conf. Biometrics Special Interest Group, Sep. 2016, pp. 1–5. 6. W. Zhang, X. Wang, and X. Tang, “Coupled information-theoretic encod-ing for face photo-sketch recognition,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2011, pp. 513–520. 7. Y. Taigman, M. Yang, M. Ranzato, and L. Wolf, “DeepFace: closing the gap to human-level performance in face verification,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2014, pp. 1701–1708. 8. F. Schroff, D. Kalenichenko, and J. Philbin, “FaceNet: A unified embed-ding for face recognition and clustering,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2015, pp. 815–823. 9. Infanta Amirtha Mary, N., Dharshini, J., Sivasangari, A.,” Crime reporting integration of crime & complaint reporting and effective data sharing with multi user access “,Vol.8,pp. 11916-11924. 10. Dr.R.Subhashini, E.Nagarajan and Niveditha.P.R, "Detection of an Incognitos Intruder in Industries and Semantic Mapping Of Emotions", International Journal Of Applied Engineering Research, ISSN-0973-4562, VOLUME 9, Number 20, 2014. 11. Sethuraman, R., Vaitheeswaran, E. “Student monitoring using opencv” International Journal of Applied Engineering Research Volume 9, Number 20 (2014) pp. 7411-7418 12. Saravanan, M, Sukanya, S, Image based password authentication system for banks, International Conference on Information Communication and Embedded Systems, ICICES 2017. 13. Harikrishnan Natarajan, Ajitha P,”An adaptive approach for Dynamic Resource Allocation in Cloud service”, International Journal of Control theory and applications, vol 9(10), PP.4871-4878, 2016. 14. Sai, M.Y., Prasad, R.V.C., Niveditha, P.R., (...), Vigneshwari, S., Gowri, S., Low cost automated facial recognition system , Proceedings of the 2017 2nd IEEE International Conference on Electrical, Computer and Communication Technologies, ICECCT 2017. Authors: A.Vidya, D.Shanthi, P.Gokulakrishnan, K.Manivannan Paper Title: Lehality Prediction of Highly Disproportionate Data of ICU Deceased using Extreme Learning Machine Abstract: Big data in mortality prediction is rationed with enormous amount of dataset of patients admitted in ICU for the healthcare providers to clarify and interpret about the status of the patients. However, it is difficult to process these large 149. datasets for which big data is used. Mortality prediction of patients admitted in ICU faces many challenges such as imbalance distribution, high dimensionality etc. This paper focuses on overcoming the challenges that arise during the 716-719 prediction of mortality of ICU patients through pre-processing, feature selection, feature extraction, and classification have been developed. The performance of classifiers has been affected by the high dimensional and unbalanced data of patients. Therefore, a classifier called Extreme Learning Machine has been used for a generalized performance of the classification. In order to predict the rate of mortality for the patients admitted in the ICU by solving the challenges using various methods and tools. For this work, the dataset is collected from a rural hospital that provides medical services in the particular locality. To evaluate the performance of the proposed model, various algorithms have been used and the obtained results are compared. The proposed approach is implemented and experimented in MATLAB software. Various statistical reports are obtained as results and verified. From the results and comparison, it is noticed that the proposed method outperforms than other approaches.

Keywords: Mortality prediction, Extreme Learning Machine, MATLAB.

References: 1. L Silva et al., Predicting In- Hospital Mortality of ICU Patients: The PhysioNet ? Computing in Cardiology Challenge 2012 - IEEE, 2012 2. Yun Chen et al Heterogeneous Postsurgical Data Analytics for Predictive Modelling of Mortality Risks in Intensive Care Units “IEEE . 2014 3. Kuang Fangjun et al .A novel SVM by combining kemel principal component analysis and improved chaotic particle swara optimization for intrusion detection- Springer , 2084 4. Yangyang Ding et al., Mortality prediction for ICU patients using just-in-time leaning and extreme learning machine-IFEE. 2016 5. Diego Gachet et al Distributed Big Data Techniques for Health Sensor Information Processing.2016 6. G-B. Huang, H. Zhou, X. Ding, and R. Zhang, Extreme learning machine for regression and multiclass classification. IEEE, 2012. 7. Nikbtesh Lakhmani, Big data and healthcare analytics, (2017). 8. Fang Ruogu, et al., Computational beaith informatics in the big data age: a survey, (2016) 9. Beaytee Ali, Wei Liu, Paul Kennedy, A cost- sensitive leaming strategy for feature extraction from imbalanced data. International Conference on Neural Information Processing, Springer Internationa! Publishing, 2016. 10. Jiankang Liu, Mortality prediction based on imbalanced high dimensional ICU big data. Elseiver.2018. Authors: N.Sangeetha A.Kathirvel, P.Indira Priya, R.Latha Paper Title: Quantification of Epicardial and Thoracic Adipose Tissue using WOA Optimized CNN Abstract: Cardiac fat depots are associated with the heart diseases. Epicardial fat and thoracic fat plays the major role in the development of cardiovascular disease. The increased thickness of the epicardial and thoracic fat leads to several diseases such as metabolic syndrome, coronary atherosclerosis, etc. It is necessary to quantify the epicardial adipose tissue and thoracic adipose tissue. There are different imaging and assessing techniques for epicardial and thoracic adipose tissue quantification. These tissues can be quantified automatically or manually from the CT and MRI cardiac scans. The quantification of the epicardial fat and thoracic fat requires segmentation of these fats by various segmentation methods and then they are quantified. This project proposes the fully automatic segmentation and quantification of the epicardial and thoracic adipose tissues from the cardiac CT scan images using the krill herd optimization algorithm and fuzzy c-means segmentation algorithm. The whale optimization algorithm performs the feature selection process. The fuzzy c-means algorithm is used for the segmentation process by means of clustering which segments the epicardial fat and paracardial adipose tissue(EAT &PAT) from the input image. The segmented epicardial and paracardial fat region are then used for the quantification process which provides the epicardial and thoracic fat volume. The thoracic fat is the combination of the epicardial and paracardial fat. This proposed system is implemented by using the MATLAB code. The proposed system is simple, fully automatic and produces accurate results.

Index Terms: Fuzzy K-means algorithm; Epicardial Adipose Tissue (EAT); Paracardial Adipose Tissue (PAT);

References: 1. Foss EJ, Genetic basis of proteome variation in yeast: Nature Genet. 39,2007, 1369–1375. 2. Das, J., Paul Das, M., Velusamy, P., "Sesbaniagrandiflora leaf extract mediated green synthesis of antibacterial silver nanoparticles against selected human pathogens", SpectrochimicaActa - Part A: Molecular and Biomolecular Spectroscopy, v-104, pp-265-270, 2013. 3. Shell M, New developments in bread making: Food Manufacture,7,1997, 72, 21-22 4. Vijayaraghavan, K., Nalini, S.P.K., Prakash, N.U., Madhankumar, D., "Biomimetic synthesis of silver nanoparticles by aqueous extract of Syzygiumaromaticum", Materials Letters, v-75, pp-33-35, 2012. 150. 5. IyayiEA.and D.M. Losel, Protein Enrichment of cassava By- Products through Solid State Fermentation by Fungi: The Journal of Food Technology in Africa,6(4),2001, 116-118 . 720-724 6. Caroline, M.L., Sankar, R., Indirani, R.M., Vasudevan, S., "Growth, optical, thermal and dielectric studies of an amino acid organic nonlinear optical material: l-Alanine", Materials Chemistry and Physics, v-114, i-1, pp-490-494, 2009. 7. Humphrey, AE, Product outlook and technical feasibility of SCP,1975,1–3. Cambridge, Massachusetts, MIT Press 8. Vijayaraghavan, K., Nalini, S.P.K., Prakash, N.U., Madhankumar, D., "One step green synthesis of silver nano/microparticles using extracts of Trachyspermumammi and Papaversomniferum", Colloids and Surfaces B: Biointerfaces, v-94, pp-114-117, 2012. 9. Khaerlyaled, .GhanemM, Abdelmonem EL,.Refai and Magda EL. Gazaerly , Some fermentation parameters influencing Single Cell Protein production by Saccharomyces uvarum: Agricultural Wastes, 15,1987, 113-1206 10. Prabhakar, J., Senthilkumar, M., Priya, M.S., Mahalakshmi, K., Sehgal, P.K., Sukumaran, V.G., "Evaluation of Antimicrobial Efficacy of Herbal Alternatives (Triphala and Green Tea Polyphenols), MTAD, and 5% Sodium Hypochlorite against Enterococcus faecalis Biofilm Formed on Tooth Substrate: An In Vitro Study", Journal of Endodontics, v-36, i-1, pp-83-86, 2010. 11. Kreger-van Rij The Yeasts a taxanomic study:.Ameterdam; Elsevier Science,1984,247. 12. Khanaa, V., Thooyamani, K.P., Udayakumar, R., "Cognitive radio based network for ISM band real time embedded system", Middle - East Journal of Scientific Research, v-16, i-12, pp-1798-1800, 2013. 13. Mandels M, Hantz L. and Nystrom J. 1974. Enzymic hydrolysis of waste cellulose: Biotech. and Bioeng,16, 1974, 1471– 1484. 14. Khanaa, V., Mohanta, K., Saravanan, T., "Comparative study of uwb communications over fiber using direct and external modulations", Indian Journal of Science and Technology, v-6, i-SUPPL.6, pp-4845-4847, 2013. 15. Pujol, F and Susan B,Production of single cell protein from plantain skin: European Journal of applied microbiology and biotechnology 18,1983,361-368. 16. Kumaravel, A., Pradeepa, R., "Efficient molecule reduction for drug design by intelligent search methods", International Journal of Pharma and Bio Sciences, v-4, i-2, pp-B1023-B1029, 2013. 17. Ranganna.S, Manual of Analysis of fruit and vegetable products:1997, New Delhi 18. Harish, B.N., Menezes, G.A., "Antimicrobial resistance in typhoidal salmonellae", Indian Journal of Medical Microbiology, v-29, i-3, pp-223- 229, 2011. 19. Lowry,OH,Rosebrough,N J, Farr AL and Randall RJ,Protein estimation: J.Biol.Chem,1951,93 – 195. 20. Caroline, M.L., Vasudevan, S., "Growth and characterization of an organic nonlinear optical material: l-alanine alaninium nitrate", Materials Letters, v-62, i-15, pp-2245-2248, 2008. 21. JE Hodge and BT Hofreiter., Carbohydrate analysis:Methods in Carbohydrate chemistry,1962, New York. 22. Kumar Giri, R., Saikia, M., "Multipath routing for admission control and load balancing in wireless mesh networks", International Review on Computers and Software, v-8, i-3, pp-779-785, 2013. 23. Dunlap CE, Production of singlecell protein from insoluble agricultural wastes by mesophiles in SCPII:1975 , Cambridge, Massachusetts, MIT Press,244-268. 24. Kumaravel, A., Udhayakumarapandian, D., "Consruction of meta classifiers for apple scab infections", International Journal of Pharma and Bio Sciences, v-4, i-4, pp-B1207-B1213, 2013. 25. BhaskarMitra, .Vishnu das D, Rahul Nair R and Lijinragavan , Biochemical studies on growth of single cell protein with yeast extract supplement under varied biotic and abiotic factors: Asian J of Food and Agro Industry , 5(4),2012,:234-250. 26. Kumarave, A., Udayakumar, R., "Web portal visits patterns predicted by intuitionistic fuzzy approach", Indian Journal of Science and Technology, v-6, i-SUPPL5, pp-4549-4553, 2013. 27. S.Anbuselvi,SurabhiMahalanobis and ManasJha , Optimization of singlecell protein using Green gramhusk and Bengal gram husk by yeast” International Journal of Pharm. Sci.Rev Research 2013, 28(1) 35; pp188-190. 28. Poongothai, S., Ilavarasan, R., Karrunakaran, C.M., "Simultaneous and accurate determination of vitamins B1, B6, B12 and alpha-lipoic acid in multivitamin capsule by reverse-phase high performance liquid chromatographic method", International Journal of Pharmacy and Pharmaceutical Sciences, v-2, i-SUPPL. 4, pp-133-139, 2010. 29. AmitkumarMondal,SamadritaSengupta,JayatiBhowal and DK Bhattacharya, Utilization of fruit wastes producing single cell protein:Interl.J. Sci.,Environ.Technol.,1(5);2012,430-438. 30. Anbuselvi, S., Chellaram, C., Jonesh, S., Jayanthi, L., Edward, J.K.P., "Bioactive potential of coral associated gastropod, Trochus tentorium of Gulf of Mannar, Southeastern India", Journal of Medical Sciences, v-9, i-5, pp-240-244, 2009.

Authors: B.Karthika, N.UmaMaheswari, R.Venkatesh Paper Title: A Research of Traffic Prediction using Deep Learning Techniques Abstract: Traffic data is very important in designing a smart city. Now –a day’smany intelligent transport systems use modern technologies to predict traffic flow, to minimize accidents on road, to predict speed of a vehicle and etc. The traffic flow prediction is an appealing study field. Many techniques of data mining are employed to forecast traffic. Deep learning techniques can be used with technological progress to prevent information from real time. Deep algorithms are discussed to forecast real-world traffic data. When traffic data becomes big data, some techniques to improve the accuracy of trafficprediction are also discussed.

Keywords: Deep learning, Neural network, Traffic flow prediction, Convolutional Neural Network (CNN), Recurrent Neural Network (RNN), Stacked Autoencoder (SAE).

References: 1. Lemkens N, Vermeire K, Brokx JP, Fransen E, Van Camp G, Van De Heyning PH. Interpretation of pure-tone thresholds in sensorineural hearing loss (SNHL): A review of measurements variability and age-specific references. Acta Otorhinolaryngol Belg 2002; 56 (4): 341-52. 2. Reiss M, Reiss G. Differential diagnosis of unilateral hearing loss. Praxis 2000 Feb 3; 89 (6) : 241-47. 3. Mahillon V, Saussez S, Gerard JM, Chantrain G, Thill MP. Diagnostic management of unilateral sensorineural hearing loss in adults. Rev Med Brux 2003 Feb; 24(1): 15-19. 4. Ruth RA, Lambert PR, Ferraro JA. Electrocochleography: Methods and clinical applications. Am J Otol 1998; 9; 1. 5. Lajtman Z, Borciae V, Markov D, Popoviae J, Vincelj J, Krpan D. Clinical interpretation of brainstem evoked response audiometry abnormalities in cochlear pathology. Acta Med Croatica 1999; 53 (3): 119-23. 6. Shargorodsky J, Curhan SG, Curhan GC, Eavy, R. “Change in prevalene of hearing loss in US adolescents”, Journal of the American Medical Association, 304, 772-778, (2010). 7. Cone BK, Wake M, Tobin S, Poulakis Z, Rickards FW. “Slight-mild sensorineural hearing loss in children: Audiometric, clinical, and risk factor profiles”, Ear & hearing, 31, 202-212,(2010). 8. LePrell CG, Hensley BN, Cmpbell KCM, Hall JW, Guire K. “Evidence of hearing loss in a ‘normally-hearing’ college-student population”, International Journal of Audiology, 50, S2-S31, (2011). 9. Names J. “Teen hearing loss study goes viral, experts uncover the facts”’ The Hearing Journal, 64, 19-24, (2011). 10. Brande V. “The teen hearing loss ‘state of emergency”’, editorial in The Hearing Journal, 64: 4, (2011). 11. Schlauch RS. “Noise-induced hearing loss in teenagers”, Acoustics Today, 14-18, (2013). 12. ISO 1999: 2013 Acoustics – Estimation of noise-induced hearing loss, International Organisation for Standardisation, Geneva, 2013. 151. 13. Carter L, Williams W, Black D & Bundy A. “The leisure-noise dilemma: hearing loss or hearsay? What does the literature tell us?”, Ear & Hearing, 35, 491-505, (2014). 725-728 14. Fisher M, Williams W. “Reduced conditions on ambient noise levels for in-situ audiometric testing”’ Technical Note, Acoustics Australia, 41, 232-233, (2013). 15. Williams W, Carter L, Seeto M. “Hearing thresholds for a population of 11 to 35 year old Australian females and males”, 53, 289-293, (2014). 16. Schlauch RS, Carney E. “The challenge of detecting minimal hearing loss in audiometric surveys”, American Journal of Audiology, 21, 106- 119, (2012). 17. Carter L, Williams W, Seeto M. “Otoacoustic emission findings of an Australian cross-sectional hearing study”, International Journal of Audiology, in press, (2015). 18. ISO 7029: 2000 Acoustics – Statistical distribution of hearing thresholds as a function of age, International Organisation for Standardisation, second edition, Geneva, 2000. 19. Kumar AU, Ameenudin S, Sangamanath AV. “Temporal and speech processing skills in normal hearing individuals exposed to occupational noise”, Noise & Health, 14, 100-105, (2012). 20. Terk AR, Kveton JF. Clinical evaluation of hearing loss 174-82. 21. Noel PE, Ramsey MJ, Amedee RG. Otoacoustic emissions: An emerging diagnostic tool. J La State Med Soc Apr 1995; 147 (4) : 125-30. 22. Lejeune JM, Charachon R. New immunobiological tests in the investigation of Meniere’s disease and sensorineural hearing loss. Acta Otolaryngol 1992; 112 (2) : 174-79. 23. American Academy of Pediarics. Year 2000 position statement Principles and guidelines for early hearing detection. Pediatrics 2000; 106: 798-817. 24. Berlin CI, Morlet T, Hood LJ. Auditory neuropathy/dyssynchrony: Diagnosis and management. Pediatr Clin North Am 2003; 331-40. 25. Schuknecht B, Graetz K. Radiologic assessment of maxillofacial, mandibular, and skull base trauma. Eur Radiol 2005 Mar; 15 (3): 560-68. 26. Sharmila S., Jeyanthi Rebecca L., Das M.P.,Production of Biodiesel from Chaetomorpha antennina and Gracilaria corticata,Journal of Chemical and Pharmaceutical Research,V-4,I-11,PP-4870-4874,Y-2012 27. Aarthi C., Ramesh Babu P.B.,Anti-cancer activity of Phyllanthus reticulatus on colon cancer cell line, International Journal of Civil Engineering and Technology,V-8,I-1,PP-943-947,Y-2017 28. Sharmila S., Jeyanthi Rebecca L., Das M.P., Saduzzaman M.,Isolation and partial purification of protease from plant leaves,Journal of Chemical and Pharmaceutical Research,V-4,I-8,PP-3808-3812,Y-2012 29. Jayalakshmi T., Krishnamoorthy P., Ramesh Babu P.B., Vidhya B.,Production, purification and Biochemical characterization of alkaline Fibrinolytic enzyme from Bacillus subtilisstrain-GBRC1,Journal of Chemical and Pharmaceutical Research,V-4,I-12,PP-5027-5031,Y-2012 30. Jeyanthi Rebecca L., Susithra G., Sharmila S., Das M.P.,Isolation and screening of chitinase producing Serratia marcescens from soil,Journal of Chemical and Pharmaceutical Research,V-5,I-2,PP-192-195,Y-2013 31. Aarthi C., Ramesh Babu P.B.,Antimicrobial and antioxidant activity of phyllanthus niruri,International Journal of Pharmacy and Technology,V-8,I-2,PP-14701-14707,Y-2016 32. Anbuselvi S., Jeyanthi Rebecca L., Sathish Kumar M., Senthilvelan T.,GC-MS study of phytochemicals in black gram using two different organic manures,Journal of Chemical and Pharmaceutical Research,V-4,I-2,PP-1246-1250,Y-2012 33. Soniyapriyadharishni A.K., Ramesh Babu P.B.,Data mining strategies for identification of HNF4A MODY gene using gene prioritize tool,Journal of Chemical and Pharmaceutical Research,V-6,I-3,PP-1126-1133,Y-2014 34. Sharmila S., Jeyanthi Rebecca L., Naveen Chandran P., Kowsalya E., Dutta H., Ray S., Kripanand N.R.,Extraction of biofuel from seaweed and analyse its engine performance,International Journal of Pharmacy and Technology,V-7,I-2,PP-8870-8875,Y-2015 35. Sharmila S., Jeyanthi Rebecca L., Saduzzaman M.,Biodegradation of domestic effluent using different solvent extracts of Murraya koenigii,Journal of Chemical and Pharmaceutical Research,V-5,I-2,PP-279-282,Y-2013 36. Jeyanthi Rebecca L., Sharmila S., Das M.P., Seshiah C.,Extraction and purification of carotenoids from vegetables,Journal of Chemical and Pharmaceutical Research,V-6,I-4,PP-594-598,Y-2014 37. Krishnamoorthy P., Praveen Kumar P.K., Ramesh Babu P.B.,Community based evaluation of phenylthiocarbamide (PTC) sensitivity and Dermatoglyphics as a genetic marker in Tamilnadu, India,International Journal of Pharmacy and Technology,V-5,I-3,PP-5705-5712,Y-2013 38. Sharmila S., Jeyanthi Rebecca L.,GC-MS Analysis of esters of fatty acid present in biodiesel produced from Cladophora vagabunda,Journal of Chemical and Pharmaceutical Research,V-4,I-11,PP-4883-4887,Y-2012 39. Sinha S., Rajasulochana P., Ramesh Babu P.B., Krishnamoorthy P.,Comparative modelling of shikimate kinase (M Tb) and molecular docking studies of its known inhibitors,Research Journal of Pharmaceutical, Biological and Chemical Sciences,V-4,I-3,PP-715-720,Y-2013 40. Jeyanthi Rebecca L., Dhanalakshmi V., Sharmila S.,Effect of the extract of Ulva sp on pathogenic microorganisms,Journal of Chemical and Pharmaceutical Research,V-4,I-11,PP-4875-4878,Y-2012 Authors: T.Keerthika, K. Premalatha A Hybrid Fish – Bee Optimization Algorithm for Heart Disease Prediction using Multiple Kernel SVM Paper Title: Classifier Abstract: The patient’s heart disease status is obtained by using a heart disease detection model. That is used for the medical experts. In order to predict the heart disease, the existing technique use optimal classifier. Even though the existing technique achieved the better result, it has some disadvantages. In order to improve those drawbacks, the suggested technique utilizes the effective method for heart disease prediction. At first the input information is preprocessed and then the preprocessed result is forwarded to the feature selection process. For the feature selection process a proficient feature selection is used over the high dimensional medical data. Hybrid Fish Bee optimization algorithm (HFSBEE) is utilized. Thus, the proposed algorithm parallelizes the two algorithms such that the local behavior of artificial bee colony algorithm and global search of fish swarm optimization are effectively used to find the optimal solution. Classification process is performed by the transformation of medical dataset to the Multi kernel support vector machine (MKSVM). The process of our proposed technique is calculated based on the accuracy, sensitivity, specificity, precision, recall and F-measure. Here, for test analysis, the some datasets used i.e. Cleveland, Hungarian and Switzerland etc., that are given based on the UCI machine learning repository. The experimental outcome show that our presented technique is went better than the accuracy of 97.68%. This is for the Cleveland dataset when related with existing hybrid kernel support vector machine (HKSVM) method achieved 96.03% and optimal rough fuzzy classifier obtained 62.25%. The implementation of the proposed method is done by MATLAB platform.

Keywords: Artificial bee colony algorithm, Fish swarm optimization, Multi kernel support vector machine, Optimal rough fuzzy, Cleveland, Hungarian and Switzerland.

References: 1. Taneja, Abhishek. "Heart disease prediction system using data mining techniques", Oriental Journal of Computer science and technology 6, no. 4 (2013): 457-466. 2. Negi, Smita I., and Vijay Nambi. "The role of carotid intimal thickness and plaque imaging in risk stratification for coronary heart disease", Current atherosclerosis reports 14, no. 2 (2012): 115-123. 3. Kim, Jae-Kwon, Jong-Sik Lee, Dong-Kyun Park, Yong-Soo Lim, Young-Ho Lee, and Eun-Young Jung. "Adaptive mining prediction model for content recommendation to coronary heart disease patients", Cluster computing 17, no. 3 (2014): 881-891. 152. 4. Srinivas, K., G. Raghavendra Rao, and A. Govardhan. "Rough-Fuzzy classifier: A system to predict the heart disease by blending two different set theories." Arabian Journal for Science and Engineering 39, no. 4 (2014): 2857-2868. 5. Hsieh, Nan-Chen, Lun-Ping Hung, Chun-Che Shih, Huan-Chao Keh, and Chien-Hui Chan. "Intelligent postoperative morbidity prediction of 729-737 heart disease using artificial intelligence techniques." Journal of medical systems 36, no. 3 (2012): 1809-1820. 6. Kang, Yuan-Yuan, Yan Li, and Ji-Guang Wang. "Ambulatory blood pressure monitoring in the prediction and prevention of coronary heart disease." Current hypertension reports 15, no. 3 (2013): 167-174. 7. Hafez, Mona, Sohier Yahia, Waleed Eldars, Heba Eldegla, Mohamed Matter, Gehan Attia, and Samia Hawas. "Prediction of residual valvular lesions in rheumatic heart disease: role of adhesion molecules." Pediatric cardiology 34, no. 3 (2013): 583-590. 8. Jian-ling, Sun, Zhao Ying, Gao Yu-lian, Xiong Li-juan, Guo Ji-hong, and Li Xiao-ying. "Coronary heart disease diagnosis bases on the change of different parts in treadmill exercise test ECG." Cell biochemistry and biophysics 67, no. 3 (2013): 969-975. 9. S.M Uma and E.Kirubakaran, " Intelligent Heart Diseases Prediction System Using A New Hybrid Metaheuristic Algorithm," International Journal of Engineering Research & Technology (IJERT), Vol. 1 Issue 8, pp. 1-7, October - 2012. 10. S.Vijayarani and S.Sudha, " Comparative Analysis of Classification Function Techniques for Heart Disease Prediction,"International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 3, pp. 1-7, May 2013. 11. Van der Velde, A. Rogier, Wouter C. Meijers, and Rudolf A. de Boer. "Biomarkers for risk prediction in acute decompensated heart failure." Current heart failure reports 11, no. 3 (2014): 246-259. 12. Vogt, Winnie. "Evaluation and optimisation of current milrinone prescribing for the treatment and prevention of low cardiac output syndrome in paediatric patients after open heart surgery using a physiology-based pharmacokinetic drug–disease model." Clinical pharmacokinetics 53, no. 1 (2014): 51-72. 13. Moos, Shira I., Jaap Stoker, Gajenthiran Nagan, Roderick S. de Weijert, David NH van Vemde, and Shandra Bipat. "Prediction of presence of kidney disease in a general patient population undergoing intravenous iodinated contrast enhanced computed tomography." European radiology 24, no. 6 (2014): 1266-1275. 14. Rasool, Muhammad Fawad, Feras Khalil, and Stephanie Läer. "A Physiologically Based Pharmacokinetic Drug–Disease Model to Predict Carvedilol Exposure in Adult and Paediatric Heart Failure Patients by Incorporating Pathophysiological Changes in Hepatic and Renal Blood Flows." Clinical pharmacokinetics 54, no. 9 (2015): 943-962. 15. T. Revathi and S. Jeevitha, " Comparative Study on Heart Disease Prediction System Using Data Mining Techniques," International Journal of Science and Research (IJSR), vol. 6, no. 14, pp.1-7, 2013. 16. Ritika Chadha and Shubhankar Mayank, “ Prediction of heart disease using data mining techniques," Research Article, vol.10, no.16, pp.1-6, 2016. 17. C.Sowmiya and P. Sumitra, "Comparative Study of Predicting Heart Disease By Means Of Data Mining," International Journal Of Engineering And Computer Science, Volume 5, Issue 12, Page No. 19580-19582, Dec. 2016. 18. Ashok Kumar Dwivedi, " Performance evaluation of different machine learning techniques for prediction of heart disease," original Article, vol. 10, no.1, pp. 1-9, 2016. 19. Saba Bashir, Usman Qamar and Farhan Hassan Khan, " BagMOOV: A novel ensemble for heart disease prediction bootstrap aggregation with multi-objective optimized voting," Technical paper, no.10, vol.6, pp. 1-19, 2015. 20. Mirpouya Mirmozaffari, Alireza Alinezhad and Azadeh Gilanpour, " Heart Disease Prediction with Data Mining Clustering Algorithms," International Journal of Computing, Communications & Instrumentation Engneering, vol.4, issuse.1, pp.1-5, 2017. 21. Sina Kianoush, Mahmoud Al Rifai, Miguel Cainzos-Achirica1,Priya Umapathi, Garth Graham, Roger S. Blumenthal, Khurram Nasir and Michael J. Blaha, " An Update on the Utility of Coronary Artery Calcium Scoring for Coronary Heart Disease and Cardiovascular Disease Risk Prediction," Research Article, vol.18, no.13, pp.1-11, 2016. 22. J. Henriques, P. Carvalho, S. Paredes, T. Rocha, J. Habetha, M. Antunes and J. Morais," Prediction of heart failure decomposition events by trend analysis of telemonitoring data," vol.10, no.15, pp.2168-2194, 2015. 23. T. Keerthika and K. Premalatha, "Heart Disease Prediction System Using Optimal Rough-Fuzzy Classifier Based on ABC", Asian Journal of Information Technology, Vol.15, No.3, pp. 481-492, 2016. Authors: S.Jambulingam, D.M. Mary Synthia Regis Prabha ANN Based Improved Regenerative Braking System on PV/Battery Powered Electric Vehicles with Single Paper Title: Stage Interaction Converter Abstract: Hybrid features batteriesand photovoltaic (PV) module located on the roof of electric Vehicles (EV) can be effectively used by a single stage interaction converter (SSIC). SSIC is introduced for directing the energy flow amid the PV panel, battery and BLDC machine.In this paper a novel braking system is used for charing electrical vehicles using solar battery system (PV) integrated with BLDC motor. It is called as RBS (Regenerative Braking System). During the RB process, generator function is provided by BLDC motor. In order to boost the BLDC-Back-EMF, a suitable switching algorithm is used. By boosting the inverter and SSIC converter the DC-Link voltage reference is reduced to charge the battery. It increases the efficiency of the RB system. In this paper Aritifical Neural Network is used to provide a smooth and reliable brake with distributed force. This proposed BLDC-Back-EMF is experimented in MATLAB Simulink software and the results are verified. Speed, Breaking-Force, torque and front-RB force, rear-meachnical-RB force and other voltage, power are verified.

References: 1. V. Sirisha and D. Somasekhar, “Design and development of Agriculture System Based on IoT,” 2019. 2. K. Lakhwani, H. Gianey, N. Agarwal, and S. Gupta, “Development of IoT for Smart Agriculture a Review,” Springer, Singapore, 2019, pp. 425–432. 153. 3. J. De Baerdemaeker, “Precision agriculture technology and robotics for good agricultural practices,” IFAC Proc. Elsevier, 2013. 4. M. Levin, A. D.- IFAC-PapersOnLine, and U. 2016, “Design of a Task-Based Modular Re-Configurable Agricultural Robot,” IFAC- PapersOnLine, vol. 49, no. Issue 16, p. Pages 184-189, 2016. 738-747 5. J. Xue, L. Zhang, T. G.-C. and E. in Agriculture, and U. 2012, “Variable field-of-view machine vision based row guidance of an agricultural robot,” Comput. Electron. Agric., vol. Volume 84, p. Pages 85-91, 2012. 6. K. Tamaki, Y. Nagasaka, K. Nishiwaki, … M. S.-I. P., and U. 2013, “A robot system for paddy field farming in Japan,” IFAC Proc. Vol., vol. 46, no. Issue 18, p. Pages 143-147, 2013. 7. T. Kamata, A. Roshanianfard, N. N.- IFAC-PapersOnLine, and U. 2018, “Heavy-weight Crop Harvesting Robot-Controlling Algorithm,” IFAC-PapersOnLine, vol. 51, no. Issue 17, p. Pages 244-249, 2018. 8. K. Hansen, F. Garcia-Ruiz, … W. K.-I. P., and U. 2013, “An autonomous robotic system for mapping weeds in fields,” IFAC Proc. Vol., vol. Volume 46, no. Issue 10, p. Pages 217-224, 2013. 9. N. Noguchi, O. B. J.-I. P. Volumes, and U. 2011, “Robot farming system using multiple robot tractors in Japan agriculture,” IFAC Proc. Vol., vol. Volume 44, no. Issue 1, p. Pages 633-637, 2011. 10. R. Tabile, E. Godoy, … R. P.-I. P., and U. 2010, “Design of the mechatronic architecture of an agricultural mobile robot,” IFAC Proc., vol. Volume 43, no. Issue 18, p. Pages 717-724, 2010. 11. J. Zhang et al., “Field phenotyping robot design and validation for the crop breeding,” IFAC-PapersOnLine, vol. Volume 49, no. Issue 16, p. Pages 281-286, 2016. 12. S. Potts, P. Neumann, … B. V.-S. of the total, and U. 2018, “Robotic bees for crop pollination: Why drones cannot replace biodiversity,” Sci. Total Environ. , vol. Volume 642, p. Pages 665-667, 2018. 13. K. Sneha, R. Kamath, M. Balachandra, and S. Prabhu, “New Gossiping Protocol for Routing Data in Sensor Networks for Precision Agriculture,” Springer, Singapore, 2019, pp. 139–152. 14. L. Kamelia, M. A. Ramdhani, A. Faroqi, and V. Rifadiapriyana, “Implementation of Automation System for Humidity Monitoring and Irrigation System,” IOP Conf. Ser. Mater. Sci. Eng., vol. 288, no. 1, p. 012092, Jan. 2018. Authors: Thendral. S, R. Subhashini, V. Madhan Karky Paper Title: Interestingness Calculation for Cricket Summary Generation Abstract: This paper analyses the way how to make cricket summary automation more efficient. Thus, from the score card details, by adding various interestingness factors to make the summary more interesting to the user is the solution. That can be achieved by considered both the history of the teams and the current match details and analyzed by the system.

Index Terms: Machine learning; cricket summary automation; artificial intelligence; Natural Language Generation, Natural Language Programing.

154. References: 1. Alice Oh and Howard Shrobe, “Generating baseball summaries from multiple perspectives by reordering content,” in Proc. the 5th International Natural Language Generation Conference, 2008, pp. 173-176. 748-749 2. Jacques Robin and Kathleen McKeown, “Empirically Designing and Evaluating a New Revision-Based Model for Summary Generation,” Department of Computer Science, Columbia University, 1996, vol. 85, pp.135-179. 3. Thendral, Subhashni and Madhan Karky, "Seithiyalan – An iPhone Application for Cricket Summary Generation in Tamil", International Journal of Recent Technology and Engineering (IJRTE), Volume-7, Issue-5C, February 2019. 4. Vigneshwari, S., Mary Posonia, A., Gowri, S. ” An efficient framework for document retrieval in relationship strengthened personalized ontologies “,Advances in Intelligent Systems and Computing, ISBN: 978-981-13-0513-9,pp 735-742 5. P.Ajitha, Dr G Gunasekaran,”Emotion Classification in web document using fuzzy inference system”,Global Journal of pure and applied Mathematics, ISSN:0973-1768,Vol.12 No.1.2016 PP 83-93. 6. Sudha B, Jabez J., “ Secured and optimal retrieval of data in cloud through computational techniques ”, , ARPN Journal of Engineering and Applied Sciences, VOL. 11, NO. 13, JULY 2016 Authors: Mercy Paul Selvan, Nagubadi. Navadurga, Nimmagadda. Lakshmi Prasanna Paper Title: An Efficient Model for Predicting Student Dropout using Data Mining and Machine Learning Techniques 155. Abstract: Education could be a important resource that has to lean to all or any kids. one in all the largest assets of the longer term generation cloud is alleged because the education that's given to the youngsters. Most of the youngsters aren't 750-752 ready to continue their education because of many reasons. The prediction of student dropout plays a very important role in characteristic the scholars World Health Organization are on the sting of being a dropout from their education. whereas predicting this, we will simply try and solve their issues and create them continue their education. during this paper, we've planned a model for predicting the scholars can get born out or not mistreatment many machine learning techniques. we have a tendency to create use of decision trees that make a call mistreatment many factors. the choice of the prediction involves crucial wherever many knowledge attributes are used for prediction like correlations, similarity measures, frequent patterns, and associations rule mining. The planned work is evaluated mistreatment numerous parameters and is well-tried to figure expeditiously in predicting the dropout students compared with alternative.

Keywords — Education, Classification, Accuracy, Decision Trees, Prediction, Dropout, Machine Learning

References: 1. Rahman, M. M., Bhattacharya, P., & Desai, B. C. (2007). A framework for medical image retrieval using machine learning and statistical similarity matching techniques with relevance feedback. IEEE Transactions on Information Technology in Biomedicine, 11(1), 58-69. 2. Morales, M., Tapia, L., Pearce, R., Rodriguez, S., & Amato, N. M. (2004). A machine learning approach for feature-sensitive motion planning. In Algorithmic Foundations of Robotics VI(pp. 361-376). Springer, Berlin, Heidelberg. 3. Ireland, G., Volpi, M., & Petropoulos, G. P. (2015). Examining the capability of supervised machine learning classifiers in extracting flooded areas from Landsat TM imagery: a case study from a Mediterranean flood. Remote sensing, 7(3), 3372-3399. 4. Huang, C., Davis, L. S., & Townshend, J. R. G. (2002). An assessment of support vector machines for land cover classification. International Journal of remote sensing, 23(4), 725-749. 5. Kotsiantis, S. B., Zaharakis, I., &Pintelas, P. (2007). Supervised machine learning: A review of classification techniques. Emerging artificial intelligence applications in computer engineering, 160, 3-24. 6. Cheriyadat, A. M. (2014). Unsupervised feature learning for aerial scene classification. IEEE Transactions on Geoscience and Remote Sensing, 52(1), 439-451. 7. Bauer, S., Nolte, L. P., & Reyes, M. (2011, September). Fully automatic segmentation of brain tumor images using support vector machine classification in combination with hierarchical conditional random field regularization. In the International Conference on Medical Image Computing and Computer-Assisted Intervention (pp. 354-361). Springer, Berlin, Heidelberg. 8. Liu, K., Tong, M., Xie, S., & Zeng, Z. (2014, August). Fusing decision trees based on genetic programming for classification of microarray datasets. In International Conference on Intelligent Computing (pp. 126-134). Springer, Cham. 9. Dumitru, D. (2009). Prediction of recurrent events in breast cancer using the Naive Bayesian classification. Annals of the University of Craiova-Mathematics and Computer Science Series, 36(2), 92-96. 10. Chou, Y. H., Tiu, C. M., Hung, G. S., Wu, S. C., Chang, T. Y., & Chiang, H. K. (2001). Stepwise logistic regression analysis of tumor contour features for breast ultrasound diagnosis. Ultrasound in medicine & biology, 27(11), 1493-1498. 11. Sarhan, A. M. (2009). Cancer classification based on microarray gene expression data using DCT and ANN. Journal of Theoretical & Applied Information Technology, 6(2). 12. Steven K. Rogers, Dennis W. Ruck, Matthew Kabrisky, Artificial Neural Networks for early detection and diagnosis of cancer, Elsevier Scientific Publishers, pp. 79-83, 1994. 13. Md. BadrulAlamMiah, Mohammad Abu Yousuf, Detection of Lung Cancer from CT Image Using Image Processing and Neural Network, IEEE, In Proceedings of 2nd Int'l Conference on Electrical Engineering and Information & Communication Technology, 2015. 14. Alaa el-Halees (2009) Mining Students Data to Analyze e-Learning Behavior: A Case Study. 15. Bharadwaj B.K. and Pal S. "Mining Educational Data to Analyze Students? Performance", International Journal of Advance Computer Science and Applications (IJACSA), Vol. 2, No. 6, pp. 63-69. 16. Gladence, L. Mary, M. Karthi, and V. Maria Anu. "A statistical comparison of logistic regression and different Bayes classification methods for machine learning." ARPN Journal of Engineering and Applied Sciences 10, no. 14 (2015): 5947-5953. 17. Fadzilah S. and Abdoulha M. (2009), "Uncovering Hidden Information Within University's Student Enrollment Data Using Data Mining", In Proceedings of the Third Asia International Conference on Modelling & Simulation Conference, IEEE computer society. 18. L.MaryGladence,Karthi,M.,Ravi, T "A novel technique for Multi-class ordinal regression-APDC" IndianJournal of Science and Technology Vol.9/ No.10/March 2016/1-5 19. Ramasubramanian, P. Iyakutti, K. and Thangavelu, P. (2009) "Enhanced Data Mining Analysis in Higher Educational System Using Rough Set Theory", African Journal of Mathematics and Computer Science Research Vol. 2(9), pp. 184-188. 20. Kulkarni R V, Patil S H, Subhashini R "An overview of learning in data streams with label scarcity, " Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016, 2017 21. Sapphire Paul J, Brumancia E, and Monisha GS., Comparison of Effort Estimation Techniques Using Decision Table with Regression Analysis., Research Journal of Pharmaceutical, Biological and Chemical Sciences, Vol 7/ Issue 4/July-2016.

Authors: Abduvakhabova Dilnoza, Nurmaxamatovna Paper Title: The Effects of Verbal and Non-Verbal Cues in Multimedia Abstract: This article represents the effects of verbal and non-verbal cues in multimedia and how they impact the audience. Social presence and various factors affecting it are also highlighted in this article. CCS Concepts Information system→ Verbal and non-verbal communication- Computational linguistics → Multimedia learning

IndexTerms: Verbal cues, Non-verbal cues, Social Presence, Multimedia.

References: 1. Abdumanapovna, S. (2018). The Role of Stylistic Synonyms in Language and Culture. In Academy Journal, No 8(10), 2018: Academy Journal. Retrieved from: http://scopuseu.com/scopus/index.php/academy/ index 156. 2. Ames, C. (1986). Effective motivation: The contribution of the learning environment. In R. S. Feldman (Ed.), The Social Psychology of Education (pp. 235-256). Cambridge: Cambridge University Press. 753-756 3. Arnold, G. B. (1990). The teacher and nonverbal communication. The Political Science Teacher, 3(3), 1, 3-4. 4. Bancroft, W. J. (1995). Research in nonverbal communication and its relationship to pedagogy and suggestopedia. ERIC. 5. Borsook, T. K., & Higginbotham-Wheat, N. (1992, February 5-9, 1992). A psychology of hypermedia; A conceptual framework for R & D. Paper presented at the Annual Meeting of the Association for Educational Communications and Technology, Washington, DC. 6. Boverie, P., Nagel, L., McGee, M., & Garcia, S. (1997, April 16-19). Learning styles, emotional intelligence and social presence as predictors of distance education student satisfaction. Paper presented at the National Conference on College Teaching and Learning, Jacksonville, FL. 7. Brooks, C. I., Church, M. A., & Fraser, L. (1986). Effects of duration of eye contact on judgments of personality characteristics. Journal of Social Psychology, 126(1), 71-78. 8. Brown, C. F., & Keller, P. W. (1979). Monologue to dialog. New York: Holt, Rinehart, and Winston 9. Dunning, G. B. (1971). Research in nonverbal communication. Theory into Practice, 10, 250- 258 10. Kraft, R. N. (1987). Rules and strategies for visual narratives. Perceptual and Motor Skills, 64, 3-14. 11. McIsaac, M. S., & Gunawardena, C. (1996). Distance education. In D. H. Jonassen (Ed.), Handbook of Research for Educational Communications and Technology (pp. 403-437). New York: Simon & Schuster Macmillan 12. Mehrabian, A. (1969). Some referents and measures of nonverbal behavior. Behavioral Research Methods and Instruments, 1(6), 203-207. 13. Najjar, L. J. (1998). Principles of educational multimedia user interface design. Human Factors, 40(2), 311-324 14. Poole, B. J. (1995). Education for an Information Age: Teaching in the Computerized Classroom. Madison: Brown & Benchmark. 15. Ricker, A., & Hartsell, T. (1998). Choosing and using video clips for classroom presentations. The Texas Technology Connection; Pre-Convention Issue, 26-30. 16. Verhagen, P. W. (1993). Formal features as a design factor of video segments in interactive video programmes. Computer Education, 21(1/2), 123-132. 17. Wetzel, C. D., Radtke, P. H., & Stern, H. W. (1994). Instructional effectiveness of video media. New Jersey: Lawrence Erlbaum Associates. Authors: S.P. Godlin Jasil, K. Sai Preeti, Shaik Arifa Banu Paper Title: Research on Road Traffic Fatal Accidents using Data Mining Techniques Abstract: Road safety plays a major role in our day-to-day life and also transportation system, due to its priority, it has become the major concern for everyone. In order to increase the road safety, traffic rules are included in education, clear and careful predictive analysis and study is done on factors effecting fatal accidents. We apply predictive analysis, statistical analysis and some algorithms related to data mining which includes FARS such as Apriori algorithm, associative rule techniques are used. These methods help in encountering the road fatal accidents that cause due to mentioned factors. These factors may include climatic and surface conditions and also drunken drivers or may be condition of vehicles also. Clusters are formed using simple k-means clustering algorithms. Finally road safety driving rules are made based on the factors effecting, clusters formed and predictive analysis and prior information.

References: 1. Prajakta S.Kasbe, Apeksha V sakhare,” Review on road accidents data analysis using data minig techniques”, 2017 IEEE International 157. conference on innovations in information embedded and communication systems (ICIIECS). 2. E.Suganya, S. Vijaya Rani “ANALYSIS OF ROAD ACCIDENTS IN INDIA USING DATA MINING CLASSIFICATION ALGORITHMS” 2017 IEEE International Conference on inventive computing and informatics (ICICI). 757-760 3. Liling Li, Sharad Shrestha, Gongzhu Hu, “Analysis of Road Traffic Fatal Accidents Using Data Mining Techniques”, 2017 IEEE 15th International Conference on Software Engineering Research Management and Applications (SERA). 4. Alyssa Ditcharoen, Bunna Chhour, Tunyarat Traikunwaranon, “Road Traffic Accidents Severity Factors”, 2018 5th International Conference on Bussiness and Industrial Research (ICBIR). 5. Abhirup Das, abhisek Ray , Abhishek ghosh, “Vehicle accident prevent cum location monitoring system”, 2017 8TH Annual Industrial Automatation on Electromechanical Engineering Conference (IEMECON). 6. Ms. Godlin Jasil S. P, Shaik Asif Moinuddin, Shaik Baba Ibrahim, M. Sakthivel and B. Sakthi Arjun, “Home Security Alert System Using Moving Object Detection In Video Surveillance System”, ARPN Journal of Engineering and Applied Sciences, Vol. 11, No. 15, August 2016 7. Subhashini, R., Jeevitha, J.K., Samhitha, B.K., “Application of data mining techniques to examine quality of water”, International Journal of Innovative Technology and Exploring Engineering, 2019. 8. Sethuraman, R., Sathish, E. “Intelligent transport planning system using GIS” International Journal of Applied Engineering Research 01/2015; 10(3):5887-5892. 547. 9. Ashmitha, R., Jeberson Retna Raj, R., Chennai city explorer an android application for locating services for everyday essentials, International Journal of Pharmacy and Technology, 2016 Authors: L.K. Joshila Grace Paper Title: Student Future Prediction System Under Filtering Mechanism Abstract: Information is progressively being utilized to improve regular day to day existence less demanding and. Applications, for example, holding up time estimation, traffic expectation, and stopping look are genuine instances of how information from various sources can be utilized to encourage our day by day life.In this period of computerization, instruction has additionally patched up itself and isn't constrained to old address strategy. The ordinary mission is on to discover better approaches to make it increasingly successful and effective for understudies. These days, loads of information is gathered in instructive databases, yet it remains unutilized. So as to get required advantages from such major information, amazing assets are required. Information mining is a developing integral asset for investigation and forecast. In this investigation, we consider an under-used information source: college ID cards. Such cards are utilized on numerous grounds to buy nourishment, enable access to various territories, and even gauge participation in classes. In this article, we use information from our college to investigate use of the college wellness focus and fabricate an indicator for future visit volume. The work makes a few commitments: it exhibits the extravagance of the information source, demonstrates how the 158. information can be utilized to improve understudy administrations, finds fascinating patterns and conduct, and fills in as a contextual analysis outlining the whole information science process. One objective of this article is to show the information 761-765 science process. As far as information accumulation, two arrangements of information—timestamp information from card swipes at the Student Recreation Centre (SRC) and client profile information—were gathered from our Management of University. The gathered information was cleaned and further prepared. At that point, exploratory information investigation was performed to find fascinating examples. General understudy practice patterns were found from the timestamp dataset. These incorporate yearly/month to month/every day frequencies of understudy visits to the SRC and pinnacle hours amid multi day.

Key Words: Student Recreation Centre (SRC), Identity Card (ID), Data Mining

References: 1. PoojaThakar Assistant Professor VIPS, GGSIPU Delhi, India Anil Mehta, Ph.D Professor University of Rajasthan Jaipur, India Manisha, Ph.D Associate Professor Banasthali University Jaipur, India “Performance Analysis and Prediction in Educational Data Mining: A Research Travelogue”, International Journal of Computer Applications, Volume 110 – No. 15, January 2015. Pp. 60-68. 2. Ankita A Nichat, Dr.Anjali B Raut M.E Student, Department of Computer Science & Engineering, HVPM’s College of Engineering & Technology, Amravati, India HOD, Department of Computer Science & Engineering, HVPM’s College of Engineering & Technology, Amravati, India “Predicting and Analysis of Student Performance Using Decision Tree Technique”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, Issue 4, April 2017. Pp. 7319-7328. 3. EdinOsmanbegović *, MirzaSuljić ** “Data Mining Approach For Predicting Student Performance”, – Journal of Economics and Business, Vol. X, Issue 1, May 2012. Pp. 3-12. 4. Dr.RSenthil Kumar1 , Jithin Kumar.K.P2 1,2Department of Computer Science, Amrita School of Arts and Sciences, Amrita VishwaVidyapeetham, Mysuru Campus Mysuru, India “Analysis Of Student Performance Based on Classification And Mapreduce Approach In Bigdata”, International Journal of Pure and Applied Mathematics, Volume 118 No. 14 2018, 141-148. 5. C. Romero *, S. Ventura Department of Computer Sciences, University of Cordoba, Cordoba, Spain “Educational data mining: A survey from 1995 to 2005”, Expert Systems with Applications 33 (2007) 135–146. 6. Jonathan A. DeCastro1, Liang Tang1, Kenneth A. Loparo 2, Kai Goebel3, George Vachtsevanos4,1Impact Technologies, LLC, Rochester, NY 14623, USA {jonathan.decastro; liang.tang}@impact-tek.com2, Case Western Reserve University, Cleveland, OH 44106, USA [email protected] 3NASA Ames Research Center, MS 269-4, Moffett Field, CA 94035, USA [email protected] 4Georgia Institute of Technology, Atlanta, GA 30332, USA [email protected] “Exact Nonlinear Filtering and Prediction in Process Model-Based Prognostics”, Annual Conference of the Prognostics and Health Management Society, 2009. 1 - 9. 7. Amirah Mohamed Shahiria,∗ , WahidahHusaina , Nur’aini Abdul Rashida , aSchool of Computer Sciences UniversitiSainsMalayisa 11800 USM, Penang, Malaysia “A Review on Predicting Student’s Performance using Data Mining Techniques”, The Third Information Systems International Conference, Procedia Computer Science 72 ( 2015 ) 414 – 422. 8. Rory P. Bunker a , FadiThabtah b,⇑ a Auckland University of Technology, Auckland, New Zealand b Applied Business, Nelson Marlborough Institute of Technology, Auckland, New Zealand “A machine learning framework for sport result prediction”, Applied Computing and Informatics (2017). 1 – 7. 9. *Elaf Abu Amrieh1, Thair Hamtini2 and Ibrahim Aljarah31,2,3Computer Information Systems Department 1,2,3The University of Jordan [email protected], [email protected], [email protected] .jo “Mining Educational Data to Predict Student’s academic Performance using Ensemble Methods”, International Journal of Database Theory and Application Vol.9, No.8 (2016). Pp. 119-136. 10. HosseinNourkhizMahjoub, Amin Tahmasbi-Sarvestani, HadiKazemi, Yaser P. Fallah “A Learning-based Framework for Two-Dimensional Vehicle Maneuver Prediction Over V2V Networks”, 2017 IEEE Cyber Science and Technology Congress (IEEE CyberSciTech). 11. Yunshu Du, Assefaw H. Gebremedhin, and Matthew E. Taylor “Analysis of University Fitness Center Data Uncovers Interesting Patterns, Enables Prediction”, IEEE Transactions on Knowledge and Data Engineering. 1-12. 12. R.Subhashini and V. Jawahar Senthil Kumar, “A Framework for Efficient Information Retrieval using NLP Techniques “, Proceedings of the International Conferences on Advances in Communication Network and Computing, CNC 2011, CCIS 142, pp. 391–393, 2011, Springer- Verlag Berlin Heidelberg 2011,ACEEE, Bangalore. 13. R.Subhashini and V. Jawahar Senthil Kumar, “Shallow NLP Techniques for Noun Phrase Extraction”, Presented in the International Conference on Trendz in Information Sciences & Computing (TISC - 2010) in association with Cognizant Technology Solutions and IEEE from 17th to 19th of December, 2010, Sathyabama University, Chennai. 14. Saravanan, M.,Jyothi, V.L.,” Enhancement of stress management skills of college students using classification method “Journal of Pharmaceutical Sciences and Research, vol 8(10), 2016 ,pp 1250- 1252. 15. P. Ajitha, Dr. G. Gunasekaran.,”Semantic Based Intuitive Topic Search Engine”., International Review of Computers and Software, Praise Worthy Prize, PP 1964-1970,Vol.9, No.12 Nov 2014. Authors: Joshila Grace L.K, Godlin Jasil. S.P Paper Title: Research on Image Connection using Neural Networks Abstract: Image compression assumes a critical job in correspondence application, to expel the repetition from the Image information so that it permits a similar Image reproduction at the beneficiary end. Likewise, the neural system has turned out to be valuable in Image compression in light of their parallel engineering and adaptability. This Survey paper covers neural system based on Image compression technique. Image compression plays out a vital part in correspondence application, to decrease the excess of pixels from the Image, communicate cast and the transmission cost of Image information so that it permits a similar Image rebuilding at the beneficiary end. Image compression based on back engendering neural system and this is accomplished by separating the quantity of pixels of a Image and select one neural system for each square as per its multifaceted nature esteem. Back proliferation calculation is utilized to diminish the union time and enhance the execution of high compression proportion of Image. Additionally, neural system's parallel engineering and adaptability made it to progressively helpful in Image compression. In this study paper, we intentional different systems and will realize how neural systems are acclimatized in Image compression.

Keywords: Artificial neural network, Image compression.

References: 1. Sadashivappa1 , Mahesh Jayakar1. K.V.S Anand Babu2 Dr. Srinivas K3, ”Color Image Compression using SPIHT Algorithm”, International 159. Journal of Computer Applications (0975 – 8887) Volume 16– No.7, February 2011 2. Prachi Tripathim,” Image Compression Enhacement using Bipolar Coding with LM Algorithm in Artificial Neural Network”, International Journal of Scientific and Research Publications, Volume 2, Issue 8, August 2012 1 ISSN 2250-3153 766-769 3. M. Venkata Subbarao, Noorbasha Sayedu Khasim, Jagadeesh Thati, “Hybrid Image Compression using DWT and Neural Networks” nternational Journal of Advanced Science and Technology Vol. 53, April, 2013 4. R. VANAJA1 , N. LAKSHMI PRABA2 , DR. N. STALIN3, Efficient Architecture for SPIHT Algorithm in Image Compression, International Journal of Advanced Research in Computer Science Engineering and Information Technology Volume: 1 Issue: 1 06-Jun-2013,ISSN_NO: 2321-3337 5. Mohammadali Shafieian, Farnoosh Negahban, Mohammad Rahmanian, Various Novel Wavelet – Based Image Compression Algorithms Using a Neural Network as a Predictor ournal of Basic and Applied Research International 3(6):280-287 • June 2013 6. http://en.wikipedia.org/wiki/Neuralnetwork. 7. R. C. Gonzalez and R. E. Woods, “Digital Image Processing”, Reading. MA: Addison Wesley, 2004. 8. A. Rahman, Chowdhury Mofizur Rahman, “A New Approach for Compressing Color Images using Neural Network”, Proceedings of International Conference on Computational Intelligence for Modeling,Control and Automation – CIMCA 2003 ,Vienna, Austria, 2003. 9. R. C. Gonzalez, R. E. Woods and S. L. Eddins, “Digital Image Processing Using MATLAB,” Pearson Edition, Dorling Kindersley, London, 2003. 10. J.-X. Mi and D.-S. Huang, “Image Compression Using Principal Component Analysis Neural Network,” 8th IEEE International Conference on Control, Automation, Robotics and Vision, Kunming, 6-9 December 2004, pp. 698-701. 11. S.-T. Bow, B. T. Bow and S. T. Bow, “Pattern Recognition and Image Processing,” Revised and Expanded, 2nd Edition, CRC Press, Boca Raton, 2002. 12. M. Nixon and A. Aguado, “Feature Extraction & Image Processing,” 2nd Edition, Academic Press, Cambridge, 2008, pp. 385-398. 13. S. N. Sivanandam, S. Sumathi and S. N. Deepa, “Introduction to Neural Network Using MATLAB 6.0,” 2nd Edition, Tata Mc-Graw Hill Publication, Boston, 2008. 14. A. Laha, N. R. Pal and B. Chanda, “Design of Vector Quantizer for Image Compression Using Self Organizing Feature Map and Surface Fitting,” IEEE Transactions on Image Processing, Vol. 13, No. 10, October 2004, pp. 1291- 1303. doi:10.1109/TIP.2004.833107 15. G. Qiu, T. J. Terrell and M. R. Varley, “Improved Image Compression Using Back Propagation Networks,” In: P. J. G. Lisbao and M. J. Taylor, Eds., Proceeding of the Workshop on Neural Network Applications and Tools, IEEE Computer Society Press, Washington DC, 1994, pp. 73-81. 16. A. Laha, N. R. Pal and B. Chanda, “Design of Vector Quantizer for Image Compression Using Self Organizing Feature Map and Surface Fitting,” IEEE Transactions on Image Processing, Vol. 13, No. 10, October 2004, pp. 1291- 1303. doi:10.1109/TIP.2004.833107 17. V. Singh, I. Gupta and H. O. Gupta, “ANN Based Estimator for Distillation Using Levenberg-Marquardt Approach,” Engineering Applications of Artificial Intelli- gence, Vol. 20, No. 2, 2007, pp. 249-259. doi:10.1016/j.engappai.2006.06.017 18. M. I. A. Lourakis, “A Brief Description of the Levenberg- Marquardt Algorithm Implemented by Levmar,” Founda- tion of Research and Technology, Vol. 4, 2005, pp. 1- 6. 19. G.M.Padmaja,P.Nirpuma “Analysis of various image compression techniques” APRN journal of science and technology VOL.2, NO.4,May 2012 20. Richa Goyal “A review of various image compression techniques” International journal of advanced research and software engineering Volume 4 issue 7, July 2014 21. Dr.R.Subhashini and Milani.V, "IMPLEMENTING GEOGRAPHICAL INFORMATION SYSTEM TO PROVIDE EVIDENT SUPPORRT FOR CRIME ANALYSIS", International Conference on Intelligent Computing, Communication & Convergence(ICCC-2014), Bhubaneswar, Odisha on 27th-28th December, 2014. 22. Saravanan, M, Sukanya, S, Image based password authentication system for banks, International Conference on Information Communication and Embedded Systems, ICICES 2017, 2017 Authors: S.P. Godlin Jasil, Pradeep Chand .N, M.Venkatesh Social Recommendation Reseach for Building Optimization and Appropriate Social System using Individual Paper Title: Relationship Networks Abstract: Recommender frameworks are utilized to help clients in settling on decisions from different choices. Objective is to comprehend clients' inclinations and makes recommendations on suitable activities. A social recommender framework attempts to improve the exactness of traditional recommender frameworks by having the social trust between clients in interpersonal organizations into record. The Collaborative Filtering is utilized for the suggestion framework, to give the compelling recommendation to the individual client dependent on the surveys. The thing based is a type of coordinated effort framework dependent on the likeness between things determined utilizing individuals' evaluating of those things. The suggestion may contrast from client to client upon the information thickness for every client's thing rating and relationship system and it additionally develop after some time. The social recommender framework keeps up a controlled size of close/stable relationship organize for every client and endeavors to improve the exactness of regular recommender framework by taking the social intrigue and social trust between clients in informal community into record. . This examination proposes an way to deal with multifaceted nature of adding social connection systems to recommender frameworks. Our technique initially creates an individual relationship organize (IRN) for every client and thing by building up a novel fitting calculation of relationship systems to control the relationship spread and contracting. We at that point meld lattice factorization with social regularization and the area show utilizing IRN's to produce suggestions. Our methodology is very broad, and can likewise be connected to the thing relationship organize by exchanging the jobs of clients and things. Trials on different datasets with various sizes, levels of sparsity, and types of relationships demonstrate that our methodology can improve prescient precision and addition a superior versatility contrasted and best in class social recommendation strategies.

References: 1. X. Yang, H. Steck, and Y. Liu, “Circle-based recommendation in online social networks,” in Proc. 18th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2012, pp. 1267–1275. 2. X. Yang, Y. Guo, Y. Liu, and H. Steck, “A survey of collaborative filtering based social recommender systems,” Comput.Commun., vol. 41, pp. 1–10, 2014. 160. 3. J. Tang, X. Hu, and H. Liu, “Social recommendation: A review,” Social Netw. Anal.Mining, vol. 3, no. 4, pp. 1113–1133, 2013. 4. Y.-M. Li, C.-T.Wu, and C.-Y. Lai, “A social recommender mechanism for e-commerce: Combining similarity, trust, and relationship,” Decision Support Syst., vol. 55, no. 3, pp. 740–752, 2013. 5. H. Ma, H. Yang, M. R. Lyu, and I. King, “SoRec: Social recommendation using probabilistic matrix factorization,” in Proc.17th ACM Conf. 770-774 Inf. Knowl. Manage., 2008, pp. 931–940. 6. H. Ma, I. King, and M. R. Lyu, “Learning to recommend with social trust ensemble,” in Proc. 32nd Int. ACM SIGIR Conf. Res. Develop. Inf. Retrieval, 2009, pp. 203–210. 7. H. Ma, D. Zhou, C. Liu, M. R. Lyu, and I. King, “Recommender systems with social regularization,” in Proc. 4th ACM Int. Conf. Web Search Data Mining, 2011, pp. 287–296. 8. M. Jamali and M. Ester, “TrustWalker: A random walk model for combining trust-based and item-based recommendation,” in Proc. 15th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2009, pp. 397–406. 9. M. Jamali and M. Ester, “A matrix factorization technique with trust propagation for recommendation in social networks,” in Proc. 4th ACM Conf. Recommender Syst., 2010, pp. 135–142. 10. Q. Yuan, L. Chen, and S. Zhao, “Factorization versus regularization: Fusing heterogeneous social relationships in top-N recommendation,” in Proc. 5th ACMConf. Recommender Syst., 2011, pp. 245–252. 11. J. Noel, et al., “New objective functions for social collaborative filtering,” in Proc. 21st Int. Conf. World Wide Web, 2012, pp. 859–868. 12. C. C. Chen, Y.-H.Wan, M.-C.Chung, and Y.-C. Sun, “An effective recommendation method for cold start new users using trust and distrust networks,” Inf. Sci., vol. 224, pp. 19–36, 2013. 13. C. Chen, X. Zheng, Y. Wang, F. Hong, and Z. Lin, “Context-aware collaborative topic regression with social matrix factorization for recommender systems,” in Proc. 28th AAAI Conf. Artif. Intell., 2014, pp. 9–15. 14. G. Guo, J. Zhang, and N. Yorke-Smith, “TrustSVD: Collaborative filtering with both the explicit and implicit influence of user trust and of item ratings,” in Proc. 29th AAAI Conf. Artif. Intell., 2015, pp. 123–129. 15. H. Liu, Z. Hu, A. Mian, H. Tian, and X. Zhu, “A new user similarity model to improve the accuracy of collaborative filtering,” Knowl.-Based Syst., vol. 56, pp. 156–166, 2014. 16. A.Mnih and R. Salakhutdinov, “Probabilistic matrix factorization,” in Proc. Advances Neural Inf. Process. Syst., 2007, pp. 1257–1264. 17. Y. Koren, R. Bell, and C. Volinsky, “Matrix factorization techniques for recommender systems,” Comput., vol. 42, no. 8, pp. 30– 37, 2009. 18. K. Menon and C. Elkan, “A log-linear model with latent features for dyadic prediction,” in Proc. 10th Int. Conf. Data Mining, 2010, pp. 364– 373. 19. J. Xin, Z. Wang, L. Qu, and G. Wang, “Elastic extreme learning machine for big data classification,” Neuro computing, vol. 149, pp. 464–471, 2015. 20. S.-R. Yan, X.-L.Zheng, Y. Wang, W. W. Song, and W.-Y. Zhang, “A graph-based comprehensive reputation model: Exploiting the social context of opinions to enhance trust in social commerce,” Inf. Sci., vol. 318, pp. 51–72, 2015. 21. S.P. Godlin Jasil , M. Deepa(2014). Efficient Utilization of Cloud Infrastructure by Handling Heterogeneous Workloads. International Journal of Applied Engineering Research. Volume 9, Number 23 (2014) pp. 13655-13666. 22. Sethuraman, R., Krishna Chaitanya Reddy, V., Gautham Veer, M., Subhashini, R., “Identifying trends in facebook usage: A visual approach”, International Journal of Recent Technology and Engineering, 2019. 23. P. Ajitha, Dr. G. Gunasekaran.,” Effective Feature Extraction For Document Clustering To Enhance Search Engine Using Xml”, Journal of Theoretical and Applied Information Technology, Little Lion Scientific ,PP 20-26,10th October 2014. Vol. 68 No.1. EISSN 18173195 ISSN 19928645. 24. T.R.Sowmiya,S.Revathy, Survey on Big Data Threats in Online Social Media, Proceedings of the 2018 IEEE International Conference on Communication and Signal Processing, ICCSP 2018. 25. Vijeya Kaveri, V.,Maheswari, V, A model based resource recommender system on social tagging data, International Journal of Science and Technology, Vol 9(25), July 2016.

Authors: B.Sathyabama, Y.Bevish Jinila Paper Title: Attacks in Wirelesssensor Networks - A Research Abstract: Remote sensor frameworks are unequivocal adhoc frameworks. It is depicted through confined figuring energy imperativeness restrictions. The survey provides an examination encryption type of framework. Display what is value of, remote transducer frameworks. Also givesan once-over of ambushes, which can be found in these particular frameworks, and vulnerabilities. Conclusion wise look at about various courses of action made by standard analysts confirm remote transducer frameworks.

Keywords: remotetransducer arrange, encryption, strikes, weakness, encryption frameworks

References: 1. Kim S, Pakzad S, Culler DE, Demmel J, Fenves G, Glaser S, Turon M. Distant transducer frameworks for essential prosperity checking. SenSys, Campbell AT, Hat P, Heidemann JS (eds. ), ACM, 2006; 427–428. 2. Welsh M. Passing over a transducer orchestrate on a new working wellspring of liquid magma. USENIX Yearly Specific Meeting, General Monitor, USENIX, 2006. 3. Breads cook CR, Armijo E, Belka S, Benhabib Meters, Bhargava V, Burkhart And, Minassians Promotion, Dervisoglu Gary the tool man, Gutnik L, Haick MEGA BYTES, et al.. Remote transducer frameworks for home regenerative administrations AINA Workshops (2), IEEE PC Society, a few years ago; 832–837 4. Thierry AS, Francois SJ, sobreGentili Emmanuelle, Bernadette Chemical. Using remote control transducer create for crazy flame region. a under the radar event strategy of standard looking at device. Condition Personalities plus Mediterranean sea Region 06\ ISEIMA '06 First globally Symposium upon, 2006 5. Malan D, Fulford-Jones T, Welsh M, Moulton S. Codeblue: An from the wristband transducer sort away framework for emergency restorative believed. Overall Workshop upon Wearable and Implantable Entire body Transducer Systems 2004 161. 6. Carman DW, Krus PLAYSTATION, Matt BJ. Essentials plus techniques for spread transducer orchestrate security. Particular Report 00-010, NAI Labratories, System Companions, Inc., Glenwood, MD, 2k. [7] Akyildiz IF, Tu W, Sankarasubramaniam Y, Cayirci E. Handheld remote 775-783 control transducer types out: the survey. Comput.Netw. 2002; 38(4): 393–422, doi: http://dx.doi.org/10.1016/S1389-1286(01)00302-4. 7. Al-Karaki JN, Kamal STRYGE. Coordinating methods in remote control transducer orchestrates: a study. IEEE Handheld remote control Comm., volume. 11, 2005; 6–28. 8. Crossbow development incorporation. mpr/mib client's manual. http://www.xbow.com/Backing/Support_pdf_files/MPRMIB/Series_Users_Manual.pdf 2010. [10] Zigbee organization. http://www.zigbee.org/2010. 9. Wooden A, Stankovic J. Repudiation of businesses in transducer frameworks. IEEE PC Oct 2002;. 10. Parno B, Perrig A, Gligor VD. Distribute acknowledgment related to center stage replication assaults in transducer frameworks. IEEE Symposium upon Security plus Protection, IEEE PC Community, 2005; 49–63. [13] Wang X, Gu W, Schosek K, Chellappan S, Xuan D. Transducer straighten away plan under bodily assaults. ICCNMC, Address Information within Software building, volume. 3619, Lu X, Zhao Watts (eds. ), Springer, 2006; 23–32. 11. Hartung C, Balasalle M, Ryan R. Center stage manage transducer masterminds: The specific necessity for secure methods. Specific Report CUCS-988-04, Division society building, University associated with Colorado at Rock, 2005; 12. Karlof Chemical, Wagner D. Safe leading in remote transducer frames: strikes and countermeasures. Remarkably named Systems the 12 months 2003; 1(2-3): 293–315 13. SandeepSaurav Singh, Con. BevishJinila, ” Transducer Node Failure Recognition making usage of Check Stage Recovery Algorithm”, Fifth Worldwide conference on recent styles in Information Technology (ICRTIT), 8-9th April 2016, IEEE. 14. Sam Mathews, Y. BevishJinila (2014), “An effective strategy for pseudonym generation and changing scheme with privacy preservation for VANET”, International Conference on Electronics and Communication Systems (ICECS) 2014, ISBN –978-1-4799-2321-2, pp. 1-6, IEEE 15. Y. BevishJinila, K. Komathy (2013), ” A privacy preserving authentication framework for safety messages in vanet”, 4th International Conference on Sustainable Energy and Intelligent System (SEISCON 2013), December 12-14, 2013, pp. 456-461, IET. 16. Sivasangari, A., Bhowal, S., Subhashini, R., Secure encryption in wireless body sensor networks, Advances in Intelligent Systems and Computing, 2019. 17. J.S.Vimali, Mekala Harinath Reddy, A Survey on Various Routing Protocols, International Conference on Human Computer Intreactions ICHCI ’16. Authors: L.Mary Gladence, Vakula C.K , Mercy Paul Selvan, T.Y.S.Samhita Paper Title: A Research on Application of Human-Robot Interaction using Artifical Intelligence Abstract: This work presents an online robot instructing with common human – robot connection. Normal human-PC association is a critical interface to acknowledge benevolent joint effort of canny robot and human. The greater part of the correspondence between people is done through discourse and signal, and the connection among discourse and motion is regular and natural. Robot educating by methods for discourse acknowledgment [12] is another route for instructing and playback, which utilizes the common discernment channels of individuals. This paper centers around a training technique dependent on the common human-PC communication. The task is to teach the Robot to compose by giving three unique 162. information sources like Voice order, Camera based Video info or utilizing MEMS equipment interface utilizing Zigbee. Voice direction can be perceived utilizing Android application. Motion will perceived utilizing framework camera, 784-787 utilizing PCA calculation framework will order the pictures. MEMS sensor is wired equipment hardware which will contain the quantity of likelihood blend to order the robot. Motions are segregated by applying a most extreme data model, with highlights separated utilizing principal component analysis (PCA). The proposed interface could be stretched out to the genuine modern scene. By utilizing signal and discourse, administrators can control the robot without complex tasks. The outcomes show that the online robot instructing framework can effectively show robot controllers.

Keywords: Gesture, human-robot interaction, PCA, natural speech understanding, online robot teaching.

References: 1. B. Gates. (2007, Jan.). “A robot in every home,” Sci. Amer. [Online].Available: http://www.sciam.Com/article.cfm? Id=a-robot-in-every-home 2. T. W. Fong, I. Nourbakhsh, and K. Dautenhahn, “A survey of sociallyinteractive robots,” Robot. Auton. Syst., vol. 42, pp. 143–166, 2003. 3. C. L. Nehaniv and K. Dautenhahn, Eds., Imitation and Social Learning inRobots, Humans, and Animals: Behavioral, Social and CommunicativeDimensions. Cambridge, U.K.: Cambridge Univ. Press, 2004. 4. A. Billard, S. Calinon, R. Dillmann, and S. Schaal, “Survey: Robot programmingby demonstration,” Handbook of Robotics.NewYork: Springer,2008, ch. 59. 5. A. L. Thomas and C. Breazeal, “Teachable robots: Understanding humanteaching behavior to build more effective robot learners,” Artif. Intel. J.,vol. 172, pp. 716–737, 2008. 6. A. Thomas and C. Breazeal, “Robot learning via socially guided exploration,”in Proc. IEEE 6th Int. Conf. Dev. Learn., Jul. 2007, pp. 82–87. 7. S. Calinon, F. Guenter, and A. Billard, “On learning, representing, andgeneralizing a task in a humanoid robot,” IEEE Trans. Syst., Man, Cybern.B, Cybern. vol. 37, no. 2, pp. 286–298, Apr. 2007. 8. P. Miller, Theories of Developmental Psychology, 4th ed. New York:Worth, 2001. 9. L.Mary Gladence,Karthi,M.,Ravi, T “A novel technique for Multi-class ordinal regression-APDC” IndianJournal of Science and Technology Vol.9/ No.10/March 2016/1-5 10. M. Tomasello, M. Carpenter, J. Call, T. Behne, and H. Moll, “Understandingand sharing intentions: The origins of cultural cognition,” Behav.Brain Sci., vol. 28, no. 5, pp. 675–690, 2005. 11. F. Kaplan and V. Hanker. (2004). the challenges of joint attention. Proc.4th. Int. Workshop Epigenetic Robotics [Online]. pp. 67–74. Available:http://cogprints.org/4067/ 12. L. Steels and F. Kaplan, “Aibo’s first words: The social learning of languageand meaning,” Evol. Commun., vol. 4, no. 1, pp. 3–32, 2000. 13. K. Dautenhahn and J. Saunders. (2011). New Frontiers in Human-Robot Interaction (Advances in Interaction Studies Series). Amsterdam,The Netherlands: John Benjamin’s. [Online]. Available: http://books.google.fr/books?id=_FlP3ZBhq6oC 14. P.-Y. Oudeyer. (2011). “Developmental robotics,” in Encyclopedia of theSciences of Learning (Springer Reference Series), N. Seel, Ed. New York:Springer-Verlag [Online]. Available: http://hal.inria.fr/hal-00652123 15. K. Ishii, S. Zhao, M. Inami, T. Igarashi, and M. Imai, “Designing lasergesture interface for robot control,” in Proc. 12th IFIP Conf. Human– Comput. Interact., 2009, pp. 479–492. 16. P. Rouanet, P.-Y. Oudeyer, and D. Filliat, “An integrated system for teachingnew visually grounded words to a robot for non-expert users using amobile device,” in Proc. IEEE-RAS Int. Conf. Humanoid Robots, 2009,pp. 391–398. 17. P. Rouanet, P. Oudeyer, and D. Filliat, “Using mediator objects to easilyand robustly teach visual objects to a robot,” in Proc. ACM SIGGRAPHPosters, 2010. 18. Gladence, L. Mary, Hari Haran Sivakumar, Gobinath Venkatesan, and S. Shanmuga Priya. "Home and office automation system using human activity recognition." In 2017 International Conference on Communication and Signal Processing (ICCSP), pp. 0758-0762. IEEE, 2017 19. P. Rouanet, F. Danieau, and P.-Y. Oudeyer, “A robotic game to evaluateinterfaces used to show and teach visual objects to a robot in real worldcondition,” in Proc. 6th Int. Conf. Human-Robot Interact., 2011, pp. 313–320. 20. Gladence, L. Mary, M. Karthi, and V. Maria Anu. "A statistical comparison of logistic regression and different Bayes classification methods for machine learning." ARPN Journal of Engineering and Applied Sciences 10, no. 14 (2015): 5947-5953. 21. M. Kamal Narayanan, M. Karthik, K.Priya and R.M.Gomathi, Data Security Using Third Party Authority in Cloud Computing, International Conference on communication and Signal Processing (ICCSP), PP 1182-1185,Apr 2017. 22. R. Abirami, S. Henitha, P. Saravanan, Fingertip Tracking Android Application for Hand Gesture Recognition, International Journal of Pharmacy and Technology, Vol. 8, No. 2, pp. 12028-12036, 2016 Authors: Abhisek Sethy, Prashanta Kumar Patra Paper Title: Off-line Odia Handwritten Character Recognition: an Axis Constellation Model Based Research Abstract: Handwritten Character Recognition is most challenging area of research, in which for various aspects a little enhancement can be always achieved. It is due to the irregularity of writing and shapes of different class user’s orientation affects the recognition rate. In this paper we have taken the complexity of Odia handwritten character recognition and successfully resolve with Principal Component Analysis (PCA). Here we had adopted a model in which the importance of symmetric axis chords in recognition of unconstrained handwritten characters is established. This symmetric axis chords are drawn along both row-wise and column-wise among the points one end to other. In addition to we have calculated the statistical feature as Euclidian distance, Hamilton distance which drawn from the midpoint of the symmetric chord to nearest pixel of the character. Apart from it we have also reported the angular values from the centroid of the image to the character pixel. This empirical model also harnessed the PCA over the feature set and perform the dimension reduction to the feature set which later termed as the key feature set. A certain series of experiment was carried on for the proper implementation of proposed technique, henceforth we have taken the standard Handwritten Database from various research institutes. Lastly on simulation analysis Radial Basis Function Neural Network (RBFNN) has been reported as to achieve high recognition rate through Gaussian kernel and a comparison among them has also reported here with.

Index Terms: Optical Character Recognition; Principal Component Analysis (PCA);Radial Basics Function, Neural 163. Network(NN);Euclidian Distance; Hamilton Distance. 788-793 References: 1. J. Mantas, An overview of character recognition methodologies, Pattern recognition 19, no. 6 (1986) 425-430. 2. V.K. Govindan, and A. P. Shivaprasad. Character recognition—a review.Pattern recognition 23, no. 7 (1990) 671-683. 3. R. Plamondon and S. N. Srihari, On-Line and Off-line Handwritten Recognition: A Comprehensive Survey, IEEE Trans on PAMI, vol. 22, (2000)62-84. 4. U. Pal and B. B. Chaudhuri, Indian script character recognition: a survey, Pattern Recognition, vol. 37 (2004) 1887-1899. 5. B. B. Chaudhuri, U. Pal, and Mandar Mitra, Automatic recognition of printed Oriya script., Sadhana 27, no. 1 (2002) 23-34. 6. W.K. Pratt , Digital image processing john wiley & sons. Inc., New York. 1991. 7. Arica, Nafiz, and Fatos T. Yarman-Vural, An overview of character recognition focused on off-line handwriting.IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 31, no. 2 (2001)216-233. 8. K.S. Dash, N. B. Puhan, and G. Panda, Odia character recognition: a directional review.Artificial Intelligence Review 48, no. 4 (2017): 473- 497. 9. P. K. Patra,M. Nayak M, and S. K. Nayak and N.K Gobbak, Probabilistic neural network for pattern classification, InProceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No. 02CH37290) (2002) 2, pp. 1200-1205. 10. U. Pal,T. Wakabayashi, and F. Kimura, A system for off-line Oriya handwritten character recognition using curvature feature. In 10th international conference on information technology (ICIT 2007) (pp. 227-229). IEEE. 11. B. B. Chaudhuri, U. Pal, and M. Mitra, Automatic recognition of printed Oriya script. Sadhana 27.1 (2002): 23-34. 12. D. Padhiand D. Senapati, Zone centroid distance and standard deviation based feature matrix for odia handwritten character recognition. InProceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 649-658). Springer, Berlin, Heidelberg. 13. Mitra, Chandana, and Arun K. Pujari., Directional decomposition for odia character recognition, In Mining Intelligence and Knowledge Exploration, pp. 270-278. Springer, Cham, 2013. 14. Pujari, Arun K., C. Mitra, and S Mishra. ,A new parallel thinning algorithm with stroke correction for odia characters, In Advanced Computing, Networking and Informatics-Volume 1, pp. 413-419. Springer, Cham, 2014. 15. M. Nayak and A. K. Nayak., Odia characters recognition by training tesseract OCR engine, International Journal of Computer Applications 975 (2013): 8887. 16. A. Sethy, P.K. Patra, and D. R. Nayak., Off-line Odia Handwritten Character Recognition: A Hybrid Approach, In Computational Signal Processing and Analysis, pp. 247-257. Springer, Singapore, 2018. 17. K. S. Dash, N. B. Puhan, and G. Panda., BESAC: Binary External Symmetry Axis Constellation for unconstrained handwritten character recognition., Pattern Recognition Letters 83 (2016)413-422. 18. R. K. Mohapatra,B.Majhiand S. K. Jena., Classification of handwritten Odia basic character using Stockwell transform, International Journal of Applied Pattern Recognition 2.3 (2015)235-254. 19. T. K. Mishra, B. Majhi, P. K. Sa and S. Panda, Model Based Odia Numeral Recognition using Fuzzy Aggregated Features, Front. Comput.Sci. Springer, (2014) 916–922. 20. D. R. Nayak, R. Dash, and B. Majhi., Brain MR image classification using two-dimensional discrete wavelet transform and AdaBoost with random forests, Neurocomputing 177 (2016)188-197. 21. D. Singh D,J.P. Saini and D. S Chauhan, Hindi character recognition using RBF neural network and directional group feature extraction technique, In2015 International Conference on Cognitive Computing and Information Processing (CCIP) 2015 Mar 3 (pp. 1-4). IEEE. 22. Er, Meng Joo, Shiqian Wu, Juwei Lu, and Hock Lye Toh. ,Face recognition with radial basis function (RBF) neural networks., IEEE transactions on neural networks 13, no. 3 (2002)697-710. 23. P. Ajitha, Dr. G. Gunasekaran.,” Effective Feature Extraction For Document Clustering To Enhance Search Engine Using Xml”, Journal of Theoretical and Applied Information Technology, Little Lion Scientific ,PP 20-26,10th October 2014. Vol. 68 No.1. EISSN 18173195 ISSN 19928645. 24. Dr.R.Subhashini and Niveditha.P.R, "ANALYZING AND DETECTING EMPLOYEE'S EMOTION FOR AMELIORATION OF ORGANIZATIONS", International Conference on Intelligent Computing, Communication & Convergence(ICCC-2014), Bhubaneswar, Odisha on 27th-28th December, 2014. Authors: K.Gayathri, N.Uma Maheswari, G.Mariammal Paper Title: A Critique on Heart Diseases Predictive Analytics using Big Data Algorithms Abstract: A large volume of both structured and unstructured information is managed by the emerging technology big data. This information is complicated to practice using set records and software techniques. An elite solution is brought in all technologies by using them competently. To improve the prediction of heart diseases earlier and bring more intellectual decisions the big data is potential in healthcare organization. In the present world condition the doctors and experts available are very intricate to forecast the heart diseases. The heart attack has become a remarkable cause of the endless demise worldwide. Heart attack is essential to predict it at an earlier stage to standby the existence of individuals and it is the main source of demise. The primary purpose is to predict the risk level of a person using Big Data algorithms for the cardiac disease. Big Data is primarily designed to provide a national scheme for physicians and patients to login and view Cloud information. Hadoop Map Reduce programming is used to maintain the hospital details. The machine learning algorithms is used to view the precise condition of the patient in its graphical demonstration. Using cloud platform for accessing globally exploitation any browsers in any a part of the globe this application are often enforced.

Keywords: Big Data, Health Care, Diagnosis, Big Data Analytics, Hadoop, cloud platform, machine learning, Map reducing Algorithm

References: 1. R. Velmani and B. Kaarthick, “An Efficient Cluster-Tree Based Data Collection Scheme for Large Mobile Wireless Sensor Networks”, IEEE Sensors Journal, vol. 15, no. 4, pp. 2377 – 2390, 2015. 2. Yun-Sheng Yen, Yi-Kung Chan, Han-Chieh Cha and Jong Hyuk Park, “A genetic algorithm for energy-efficient based multicast routing on MANETs”, Computer Communications, vol. 31, no. 4, pp. 2632–2641, 2008. 164. 3. Chia-Cheng Hu, “Bandwidth-satisfied multicast trees in large-scale ad-hoc networks”, Wireless Networks, vol. 16, no. 3, pp. 829-849, 2010. 4. Shiow-Fen Hwang, Yi-Yu Su, Kun-Hsien Lu and Chyi-Ren Dow, “A Cluster-Based Approach for Efficient Multi-Source Multicasting in MANETs”, Wireless Personal Communication, vol. 57, no. 2, pp. 255–275, 2011. 794-798 5. Moonseong Kim, Hyunseung Choo and Matt W.Mutka, “On QoS multicast routing algorithms using k-minimum Steiner trees”, Information Sciences, vol. 238, pp. 190–204, 2013. 6. Xu Li, Tianjiaot Li, Yingt Li and Van Tang, “Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs”, China Communications, vol. 11, no. 2, pp. 90-99, 2014. 7. Vincenzo Maniscalco, Silvana Greco Polito and Antonio Intagliata, “Binary and m-ary encoding in applications of tree-based genetic algorithms for QoS routing”, Soft Computing, vol. 18, no. 9, pp. 1705-1714, 2014. 8. N. C. Wang, “Power-aware dual-tree-based multicast routing protocol for mobile ad hoc networks”, IET Communication, vol. 6, no. 7, pp. 724–732, 2012. 9. Ajay Kumar Yadav and Sachin Tripathi, “QMRPRNS: Design of QoS multicast routing protocol using reliable node selection scheme for MANETs”, Peer-to-Peer Networking and Application, pp. 1-13, 2016. 10. Kong Sun and Chen Zeng qiang, “Tree-based differential evolution algorithm for QoS multicast routing”, The Journal of China Universities of Posts and Telecommunications, vol. 18, no. 4, pp. 76–81, 2011. 11. Hu Wang, Xiangxu Meng, Shuai Li and Hong Xu, “A tree-based particle swarm optimization for multicast routing”, Computer Networks, vol. 54, no. 15, pp. 775-786, 2010. 12. I-Ta Lee, Guann-Long Chiou and Shun-Ren Yang, “A cooperative multicast routing protocol for mobile ad hoc networks”, Computer Networks, vol. 55, no. 10, pp. 407-424, 2011. 13. Rajashekhar Biradar, Sunilkumar Manvi and Mylara Reddy, “Link stability based multicast routing scheme in MANET”, Computer Networks, vol. 54, no. 7, pp. 1183-1196, 2010. 14. Rajashekhar C. Biradar and Sunilkumar S. Manvi, “Review of multicast routing mechanisms in mobile ad hoc networks”, Journal of Network and Computer Applications, vol. 35, no. 1, pp. 221-239, 2012. 15. Ahmed Younes, “Multicast routing with bandwidth and delay constraints based on genetic algorithms”, Egyptian Informatics Journal, vol. 12, no. 2, pp. 107-114, 2011. 16. Kumar Viswanath, Katia Obraczka and Gene Tsudik, “Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs”, IEEE Transactions on Mobile Computing, vol. 5, no. 1, pp. 28-42, 2006. 17. Sung Ju Lee, William Su and Mario Gerla, “On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks”, Mobile Networks and Applications, vol. 7, no. 6, pp. 441–453, 2002. 18. Mohammad M. Qabajeh, Aisha H. Abdalla, Othman Khalifa and Liana K. Qabajeh, “A Tree-based QoS Multicast Routing Protocol for MANETs”, In proceedings of IEEE 4th International Conference on Mechatronics (ICOM), pp. 17-19, 2011. 19. Chang Yeong Oh, Jongho Park and Jihyoung Ahn, “Tree-based Multicast Protocol using Multi-point Relays for Mobile Ad Hoc Networks”, In proceedings of IEEE 2011 Third International Conference on Ubiquitous and Future Networks (ICUFN), pp. 174-178, 2011. 20. Hasan Abdulwahid, Bin Dai, Benxiong Huang and Zijing Chen, “Scheduled-Links Multicast Routing Protocol in MANETs”, Journal of Network and Computer Applications, vol. 63, pp. 56-67, 2015. 21. Mohammad Reza Effat Parvar, Mehdi EffatParvar, and Mahmoud Fathy, “Improvement of on Demand Multicast Routing Protocol in Ad Hoc Networks to Achieve Good Scalability and Reliability”, Lecture Notes in Computer Science, vol. 5073, pp. 446–457, 2008. 22. Xin-She Yang, Suash Deb, "Engineering Optimisation by Cuckoo Search", Int. J. Mathematical Modelling and Numerical Optimisation, Vol. 1, No.4, pp. 330-343, 2010. 23. Satish Chander, P. Vijaya, Praveen Dhyani, “Fractional Lion Algorithm – An Optimization Algorithm for Data Clustering”, Journal of Computer Science, Vol. 12, no. 7, pp. 323-340, 2016. 24. Mamatha Balachandra, K. V. Prema, Krishnamoorthy Makkithay, " Multiconstrained and multipath QoS aware routing protocol for MANETs", Wireless Networks, Vol. 20, no. 8, pp. 2395-2408, November 2014. 25. P Yadhav, “Dimensionality Reduction of Weighted Word Affinity Graph using Firefly Optimization”, International Journal of Engineering Research & Technology, Vol. 3, no. 10, pp. 1324-1327, 2014 Authors: Sonia Jenifer Rayen, R.Subhashini Paper Title: Mammogram Image Retrieval using Ipso Optimized Anfis Classifier Abstract: Content-based image retrieval (CBIR) is an research area over the past years that has attracted research. In various medical applications like mammogram analysis CBIR techniques helps the medical team to get similar set of images from a large medical records to help in diagnosis of a disease. This paper proposes an efficient Content-Based Mammogram Image Retrieval method by using an Optimized Classifier. Initially, the input dataset is preprocessed, in which noise removal and contrast enhancement are done. Next, pectoral muscles of the mammogram images are removed using Single Sided Edge Marking (SSEM). Now, feature extraction is done, in which GLCM features, Gabor features and the Local Pattern with Binary features are being removed. The features that are being removed are classified into three classes namely benign, malignant and normal. An optimized classifier named as Adaptive Neuro Fuzzy Inference System (ANFIS), which is optimized by using the Improved Particle Swarm Optimization (IPSO) technique, is used for classification purpose. Finally, similarity is assessed between the trained feature distance vectors and the feature distance vectors of the input query image. Similarity assessment is done using Euclidean Distance metric and the image that has the lowest distance compared with the query is retrieved. The experimental results are obtained for the proposed system and they are compared with the existing techniques.

Keywords: Mammogram, Particle Swarm Optimization, Euclidean Distance, Gabor features, Image Retrieval and Adaptive Neuro Fuzzy Inference System.

References: 1. Kanchan Lata Kashyap, Manish Kumar Bajpai, and Pritee Khanna, "An efficient algorithm for mass detection and shape analysis of different masses present in digital mammograms", Multimedia Tools and Applications, Vol. 77, No. 8, pp. 9249-9269, 2018. 2. Vibhav Prakash Singh, Ashim Gupta, Shubham Singh, and Rajeev Srivastava, "An efficient content based image retrieval for normal and abnormal mammograms", In Electrical Computer and Electronics (UPCON), 2015 IEEE UP Section Conference on, IEEE, pp. 1-6, 2015. 3. Lazaros Tsochatzidis, Konstantinos Zagoris, Nikolaos Arikidis, Anna Karahaliou, Lena Costaridou, and Ioannis Pratikakis, "Computer-aided diagnosis of mammographic masses based on a supervised content-based image retrieval approach", Pattern Recognition, vol. 71, pp. 106-117, 2017. 4. Sami Dhahbi, Walid Barhoumi, and Ezzeddine Zagrouba, "Content-Based Mammogram Retrieval Using Mixed Kernel PCA and Curvelet 165. Transform", In International Conference on Advanced Concepts for Intelligent Vision Systems. Springer, Cham, pp. 582-590, 2016. 5. Marcos Vinicius Naves Bedo, Davi Pereira dos Santos, Marcelo Ponciano-Silva, Paulo Mazzoncini de Azevedo-Marques, and Caetano Traina, 799-804 "Endowing a content-based medical image retrieval system with perceptual similarity using ensemble strategy", Journal of Digital Imaging, vol. 29, no. 1, pp. 22-37, 2016. 6. Fradj Ben Lamine, Karim Kalti, and Lotfi Ben Romdhane, "A content-based digital mammography retrieval using inexact graph matching", In Image Processing, Applications and Systems Conference (IPAS), 2014 First International, IEEE, pp. 1-4, 2014. 7. Shobha Jose, and D. Abraham Chandy, "Content based mammogram retrieval using biorthogonal wavelet filters in DDSM database", In Green Computing Communication and Electrical Engineering (ICGCCEE), 2014 International Conference on, IEEE, pp. 1-6, 2014. 8. Devang Kulshreshtha, Vibhav Prakash Singh, Ayush Shrivastava, Arpit Chaudhary, and Rajeev Srivastava, "Content-based mammogram retrieval using k-means clustering and local binary pattern", In Image, Vision and Computing (ICIVC), 2017 2nd International Conference on, IEEE, pp. 634-638, 2017. 9. Thenkalvi Boomilingam, and Murugavalli Subramaniam, "An efficient retrieval using edge GLCM and association rule mining guided IPSO based artificial neural network", Multimedia Tools and Applications, vol. 76, no. 20, pp. 21729-21747, 2017. 10. Vaidehi, K., and T. S. Subashini, "Automatic classification and retrieval of mammographic tissue density using texture features", In Intelligent Systems and Control (ISCO), 2015 IEEE 9th International Conference on, IEEE, pp. 1-6, 2015. 11. Juan Wang, and Yongyi Yang, "Feature saliency analysis for perceptual similarity of clustered microcalcifications", In ICIP, pp. 775-778, 2015. 12. Abraham Chandy, D., A. Hepzibah Christinal, Alwyn John Theodore, and S. Easter Selvan, "Neighbourhood search feature selection method for content-based mammogram retrieval", Medical & Biological Engineering & Computing, vol. 55, no. 3, pp. 493-505, 2017. 13. Ramzi Chaieb, and Karim Kalti, "Feature subset selection for classification of malignant and benign breast masses in digital mammography", Pattern Analysis and Applications, pp. 1-27, 2018. 14. Menglin Jiang, Shaoting Zhang, Hongsheng Li, and Dimitris N. Metaxas, "Computer-aided diagnosis of mammographic masses using scalable image retrieval", IEEE Transactions on Biomedical Engineering, vol. 62, no. 2, pp. 783-792, 2015. 15. Liliana Losurdo, Annarita Fanizzi, Teresa MA Basile, Roberto Bellotti, Ubaldo Bottigli, Rosalba Dentamaro, Vittorio Didonna et al, "A Combined Approach of Multiscale Texture Analysis and Interest Point/Corner Detectors for Microcalcifications Diagnosis", In International Conference on Bioinformatics and Biomedical Engineering, Springer, Cham, pp. 302-313, 2018. 16. Vibhav Prakash Singh, and Rajeev Srivastava, "Automated and effective content-based mammogram retrieval using wavelet based CS-LBP feature and self-organizing map", Biocybernetics and Biomedical Engineering, Vol. 38, No. 1, pp. 90-105, 2018. 17. Mugahed A. Al-antari, Mohammed A. Al-masni, Sung-Un Park, JunHyeok Park, Mohamed K. Metwally, Yasser M. Kadah, Seung-Moo Han, and Tae-Seong Kim, "An automatic computer-aided diagnosis system for breast cancer in digital mammograms via deep belief network", Journal of Medical and Biological Engineering, Vol. 38, No. 3, pp. 443-456, 2018. 18. Syed Jamal Safdar Gardezi, Ibrahima Faye, Jose M. Sanchez Bornot, Nidal Kamel, and Mohammad Hussain, "Mammogram classification using dynamic time warping", Multimedia Tools and Applications, Vol. 77, No. 3, pp. 3941-3962, 2018. 19. Birmohan Singh, and Manpreet Kaur, "An approach for classification of malignant and benign microcalcification clusters", S?dhan?, Vol. 43, No. 3, pp. 39, 2018. 20. Ardalan Ghasemzadeh, Saeed Sarbazi Azad, and Elham Esmaeili, "Breast cancer detection based on Gabor-wavelet transform and machine learning methods", International Journal of Machine Learning and Cybernetics, pp. 1-10, 2018. 21. Chisako Muramatsu, "Overview on subjective similarity of images for content-based medical image retrieval", Radiological Physics and Technology, Vol. 11, No. 2, pp. 109-124, 2018. 22. Saravanan, M, Sukanya, S, Image based password authentication system for banks, International Conference on Information Communication and Embedded Systems, ICICES 2017,2017 23. Rajesh Kannan, Dr.Meera Gandhi (2012), "Dynamic key exchange method for image encryption", International Journal of Computer Application, issue 2, vol. 1, pp. 99-105, February 2012. 24. Nirmalrani, V., Saravanan, P., Sakthivel, P., An extended XACML model to secure biological web services using access control policies, Research Journal of Pharmaceutical, Biological and Chemical Sciences, 2016. Authors: S.Brilly Sangeetha, S.J. Jereesha Mary, S.Sebastin Antony Joe Paper Title: Breaking Down of 51% Double Spend Attack (DSA) in Blockchain Technology Abstract: Today the emerging trend and innovative technology is block chain technology. The actual question is how to manage this. The basic concept behind this is mining. Block chain is equal to governance. It is basic type of governance. It governs a book called ledger which contains information. Here we focus on double spend attack in block chain. The attackers has a space to block the new transactions from gaining access to acknowledgements. They make half payments between some or all users. It is even possible to reverse transactions when using the network or holding the complete control of the network thus spending the coins twice which means double spend coins. This attack always exist as a thread and users are panic about their transactions being used by a corrupted miner. The solution for this malicious mining is 166. Proof of Work (PoW) which is proved to be not sufficiently decentralized or secure. So here we are focusing on Proof of Stake (PoS) concept which is a response to the treat of centralization. 805-808

Keywords: Blockchain Technology, Double spend, Governance, Mining, Transactions

References: 1. https://www.investopedia.com/terms/1/51-attack.asp 2. https://www.fxempire.com/education/article/51-attack-explained-the-attack-on-a-blockchain-513887 3. https://www.upgrad.com/blog/51-attack-in-blockchain-technology-explained/ Authors: S.Kamala Kannan Paper Title: Flexural Behaviour of HYFRC Beam Reinforced with GFRP Rebar Abstract: This paper offers the experimental have a take a look at at the flexural behaviour of HYFRC beams bolstered with glass fiber bolstered polymer (GFRP) rebar and in comparison with everyday metal reinforcement beams. Three beams reinforced with GFRP rebar and three beams of traditional concrete metal strengthened with absolutely six beams have been casted and tested under two points loading. The partner specimens were casted along with beam and tested for concrete homes. Steel and glass fibres are used toimprove the concrete assets. From checking out, load carrying capability, load-deflection traits, crack sample, crack width, concrete traces throughout move phase and failure mode have been mentioned stiffness, ductility and power dissipation potential had been additionally calculated. The average ultimate load wearing potential of GFRP rebar and normal steel reinforcement beam is one hundred twenty five.8KN and ninety seven.5KN respectively. The most deflection cited at their closing load inside the GFRP rebar and regular metal reinforcement beam is 27. Three mm and sixteen. 3 mm respectively. It changed into also found that after load elimination, deflected GFRP beam regain its authentic function and crack width also reduced. In metal beam, metallic rebar were yielded, after load elimination, no deflection regain and crack width reduction have been observed.

Index Terms: GFRP, Hybrid fibre, flexural testing, stiffness, ductility and energy dissipation capacity.

References: 1. Mr.RanjithKumar.R ,Ms.Vennila.A,” Experimental Investigation on Hybrid Fibre Reinforced Concrete”, International Journal of Emerging 167. Trends in Engineering and Development, Vol.2 (March 2013),PP(39-45). 2. Selina ruby G., Geethanjali C., Jaisonvarghese, P. Muthupriya,” Influence of Hybrid Fiber on Reinforced Concrete”, International Journal of 809-818 Advanced Structures and Geotechnical Engineering, Vol. 03, Jan 2014,PP(40-43). 3. Kavita S Kene, Vikrant S Vairagade and SatishSathawane, Bonfring , “Experimental Study on Behavior of Steel and Glass Fiber Reinforced Concrete Composites”, International Journal of Industrial Engineering and Management Science, Vol. 2, No. 4, December 2012,PP(1-4). 4. P. Sangeetha, “Study On The Compression And Impact Strength Of Gfrc With Combination Of Admixtures”, Journal of Engineering Research and Studies, , Vol.2 (JUNE 201),PP(36-40). 5. Wakchaure M. R., Rajebhosale S. H., Satpute M. B., Kandekar S. B, “Comparison Of Compressive Strength And Flexural Shear Strength For Hybrid Fibre Reinforced Concrete With The Controlled Concrete”, International Journal of Engineering and Technical Research,Volume-02, September 2014,PP(172-175). 6. G. Suguna B.E, Mrs.S.Parthiban M.E, “Experimental and Investigation of Hybrid Fiber Reinforced Concrete” International Journal of Innovative Science, Engineering & Technology, Vol. 3, May 2016, PP(409-414). 7. R.H. Mohankar, M.D. Pidurkar, P.V Thakre, S.S. Pakhare, “Hybrid Fibre Reinforced Concrete,” International Journal of Science, Engineering and Technology Research , Volume 5, January 2016,(1-4). 8. V. MadhuKiran, Brijbhushan S, Dr.Prakash K B, “A Comparative Study On Mechanical Properties Of Hybrid Fiber Reinforced Concrete With Controlled Concrete”, International Research Journal of Engineering and Technology ,Vol: 02 ,Sep-2015,PP(402-407). 9. G B. Maranan, A C. Manalo, W Karunasena, B Benmokrane, D Lutze “Flexural behaviour of glass fibre reinforced polymer bars subjected to elevated temperature”,23rd Australasian Conference on the Mechanics of Structures and Materials, vol. I, 9 Dec(20014), pp. 187-192 10. Austin Beau Connor “Experimental investigation on the shear characteristics of gfrp reinforcement systems embedded in concrete” Electronic Theses and Dissertations,(2014),pp-1 to 81. 11. Shahul Mohammed, S.Natarajan “Experimental study on flexural behaviour of rc beams strengthened with g.f.r.p” International Journal For Research In Emerging Science And Technology, volume-3, jun-2016 ,pp- 1 to 7. 12. Pappula Ravi Kumar,E.BalakoteswarRao “Flexural behaviour of rc beam retrofitted with gfrp”, International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal , Volume No: 2, September 2015 13. Ali S. Shanour, Ali S. Shanour, Maher A. Adam , Mohamed Said “Experimental investigation of concrete beams reinforced with gfrp bars” International Journal Of Civil Engineering And Technology, Volume 5, November (2014), Pp- 279 to 282. 14. Ramadass S & Job Thomas “Flexure-shear analysis of concrete beam reinforced with gfrp bar”, The 5th International Conference on FRP Composites in Civil Engineering, September 2010,pp-1 to 5. 15. S. Marvel Dharma, S. YaminiRoja “Review on behaviour on glass fibre reinforced polymer RC members”, International Conference on Explorations and Innovations in Engineering & Technology (2016), pp-21 to 23. 16. Shrikant M. Harl, “Review on the performance of glass fiber reinforced concrete”, International Journal of Civil Engineering Research,Volume 5, (2014), pp. 281-284 Authors: K.Nagendra Babu, P.Sudheer Kumar, D.Yamuna Paper Title: A Research on Development of a Fixed Solar Dryer with a Practical Research Abstract: Solar energy heating apparatus to dry food and other crops that can enhance the quality of the product while reducing the wasted product. Drying is an eminent way to preserve the food and solar energy food drying is an approximate food preservation mechanism for a sustainable real world. This fixed solar dryer has the capacity of 15 kg which is used for the preservation, drying of grapes, potatoes, onions, mango pulp, chilies, green leafy vegetables, jack fruit pulp, green pepper, herbal medicines, ginger etc., more than 50 kinds have been dried using this solar dryer at various AKRUTI’S. Drying will generally refers to the removal of moisture content by evaporation rather than by pressure or other physical parameters. Our country is blessed with ample of solar energy round the year. The principle of this dryer is that, hot air is lighter than the cool air and its raises up the altitude. While raising this warm air comes in contact with food slices and 168. draws the moisture from it. The repeated cycle of this process makes it a low cost, very healthy, long term investment. Generally the sun’s power of heat is used to dry up the moisture content of the fruits or vegetables. 820-824

References: 1. Design and Construction of Solar Dryer for Drying Agricultural Products. Prof. Pravin M. Gupta1, Amit S. Das2, Ranjit C. Barai3, Sagar C. Pusadkar4, Vishal G. Pawar5. 1Assistant Professor,Dept. of Mechanical Engineering, J.D.C.O.E.M, Nagpur. 2345Students, Dept. of Mechanical Engineering, J.D.C.O.E.M, Nagpur 2. A review paper on Solar Dryer 1*UmeshToshniwal and 2 S.R Karale 1* Student,4thSemester,M-Tech,Heat Power Engineering,2 Professor Mechanical Engineering Department, G.H Raisoni College of Engineering, Nagpur-440016,INDIA 3. Thermal Efficiency of Natural Convection Solar Dryer N Seetapong1,* S Chulok1, and P Khoonphunnarai1 1 Department of Physics and General Science, Faculty of Science and Technology, Songkhla Rajabhat University, 90000, Thailand Authors: M.Selvi R.Balakrishna Paper Title: An Enhanced Performance Measurement in Spread Abstract: A SPREAD programme is anticipated to enhance the safe data supply and delivery in a MANET. The main aim of SPREAD is to divide a message into many parts by secret sharing and sends them via various autonomous paths to the end point. This paper focuses and highlights the spread design and its performance metrics. SPREAD is considered to be more protected and also possess comparatively high amount of reliability because of presence of redundancy without compromising safety. Simulation outcomes validate the feasibility of the SPREAD method and display the efficiency and performance metrics.

169. Keywords: SPREAD, MANET, redundancy , reliability and feasibility. 825-827 References: 1. Navdeep Kaur, Amandeep Kaur,” Study of Mobile Ad-hoc Network”, International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 8-12 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) 2. M. Frodigh, P. Johansson, and P. Larsson,“Wireless ad hoc networking: the art of networking without a, Network,” Ericsson Review, No.4, 2000. 3. Marco Conti, Body, Personal and Local Ad Hoc Wireless Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 1), CRC Press LLC, 2003. 4. Basagni, S., Conti, M., Giordano S., and Stojmenovic, I. (Eds.) “Ad Hoc Networking” IEEE Press Wiley, New York, 2003. 5. Sadiya Mirza, Sana Zeba Bakshi,”INTRODUCTION TO MANET”, InternationalResearch Journal of Engineering and Technology(IRJET) e- ISSN: 2395-0056 Volume: 05 Issue: 1 |Jan-2018 www.irjet.net p-ISSN: 2395-0072 Authors: Ch.Gangadhar, Md. Habibulla Spectral Efficiency Enhancement Through Wavelet Transform Filter Bank for Future Mobile Paper Title: Communications Abstract: In the 5th generation of wireless communications for multiple apps, such as sports, video etc, the large transmission rate of information is the main requirement. To satisfy the high information rates, bandwidth can be increased by using greater frequency bands that is not feasible owing to the restricted frequency spectrum accessibility and the limitation placed on accessible spectrums by Standard. A further way is to effectively use the existing spectrum. OFDM overrides all multiplexing methods in the last century because with Cyclic Prefix (CP) and enhanced Bit Error Rates (BER) the system improves inter-symbolic interference (ISI). It offers low sensitivity owing to the intercarrier orthogonality to 170. time synchronization. Bandwidth is lost by CP, in addition to all of these benefits. The lack of orthogonality between pilots that interfere (ICI) is also due to the multipath fading. Discrete Wavelet Transform is used to extract a bandwidth and 828-829 spectral efficiency improvement and remove CP in turn. Transforming Wavelet (WT) is less sensitive to multipath distortion., so that ICI improves.. We present FBMC's unifying structure, discussion and efficiency assessment in this paper.

References: 1. Stridh, R, P. Karlsson, B. Ottersten,"Spatial Characterisation of Measured Indoor Radio MIMO channels at 5 GHz",Proceedings ofNordiskt Radio Symposium / PCC Workshop, 2001. 2. Li, Ye G., J.H. Wintrs, and N.R. Solenberer, "Signal detection for MIMO-OFDM wireless communications", Proceedings ofICC 2001, Vol. 10, pp. 3077-3081,2001. 3. Smulders, P., M. Jevrosimovic, M. Herben , S. Savov, E. Martijn,"State of the art channel models",B4 Deliverable, TUE_WP2_PUB_Oi_vi, TU/e, Eindhoven, April 2002 . 4. H. G. G¨ockler and H. Eyssele, “Study of on-board digital FDMdemultiplexing for mobile SCPC satellite communications (part I and II),” Eur. Trans. Telecommun., vol. 3, pp. 7–30, Jan. 1992. 5. I. Djokovic and P. P. Vaidyanathan, “Results on biorthogonal filter banks,”Applicat. Comput. Harmonic Anal., vol. 1, no. 4, pp. 329–343, Sept. 1994. 6. H. G. G¨ockler and M. N. Abdulazim, “Tree-structured MIMO FIR filterbanks for flexible frequency reallocation,” in Proc. Int. Symp. Image Signal Processing Anal., Istanbul, Turkey, Sept. 2007. Authors: Kruthiventy Bhargavi, D. Veeraiah Paper Title: Dynamic and Advanced Security for Data Storage in Distributed Environment Abstract: With the fast improvement of innovation and computer technology, cloud-based services administrations have form into an extremely rich research area. CB administrations give customers which accommodation, yet additionally bring different issues. In this manner, the learning of access control plan to ensure clients' confinement in cloud condition is critical. In this paper, we present an entrance control framework with advantage division dependent on security insurance. we partition the clients into individual area (PSD) and open space (PUD) sensibly. In the PSD, we put (R/W) get to authorizations for clients separately. The total key encryption (KAE) is abused to execute the read access consent that improves get to effectiveness. A high level of patient protection is all the while ensured by abusing a Firm dependent on improved characteristics (IABS) that can decide the clients compose get to. For PUD clients, encryption dependent on progressive properties (HABE) is connected to evade single-purpose of disappointment issues and confounded key circulation. The aftereffect of the activity and task tests demonstrates that the PS-ACS plan can accomplish security insurance in cloud-based administrations.

Index Terms: Access Control, Data sharing, Security assurance, CB Services.

171. References: 1. YU SH, WANG C, REN K, “Achieving Secure, Scalable, and Fine-Grained Data Access Controlin Cloud Computing”, Proceedings of IEEE Conference on Information Communications 2010,pp. 1-9, 2010. 830-833 2. BETHENCOURT J, SAHAI A, WATERS B, “Ciphertext-Policy Attribute-based Encryption”, IEEESymposium on Security and Privacy, vol. 2008,no. 4, pp. 321-334, 2007. 3. ATTRAPADUNG N, IMAI H, “Conjunctive Broadcastand Attribute-Based Encryption”, Proceedingsof Pairing-based Cryptography - Pairing2009, vol. 5671, pp. 248-265, 2009. 4. ATTRAPADUNG N, IMAI H, “Attribute-Based EncryptionSupporting Direct/Indirect RevocationModes”, Proceedings of Cryptography and Coding2009, pp. 278-300, 2009. 5. HUR J, NOH D K, “Attribute-based Access Control with Efficient Revocation in Data utsourcingSystems”, IEEE Transactions on Parallel andDistributed Systems, vol. 22, no. 7, pp. 1214-1221, 2011. 6. LEWKO A, WATERS B, “Decentralizing Attribute-based Encryption”, Proceedings of Advancesin Cryptology-UROCRYPT 2011 - 30thAnnual International Conference on the Theoryand Applications of Cryptgraphic Techniques,pp. 568-588, 2011. 7. LI M, YU SH, ZHENG Y, “Scalable and SecureSharing of Personal Health Records in CloudComputing Using Attribute-based Encryption”,IEEE Transactions on Parallel and DistributedSystem, vol. 24, no. 1, pp. 131-143, 2013. 8. XIE X, MA H, LI J, et al, “New Ciphertext-PolicyAttribute-based Access Control with EfficientRevocation”, Proceedings of Information andCommunication Technology 2013, pp. 373-382,2013. 9. LIANG K, MAN H A, SUSILO W, et al, “AnAdaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for CloudData Sharing”, Information Security Practice andExperience, pp. 448-461, 2014. 10. CHU C K, CHOW S S M, TZENG W G, “Key-AggregateCryptosystem for Scalable Data Sharingin Cloud Storage”, IEEE Transactions on Paralleland Distributed Systems, vol. 25, no. 2, pp. 468-477, 2014 Authors: Rajeswari Nakka, G.V.S.N.R.V.Prasad, R.Kiran Kumar Paper Title: A Novel Similarity Measure to Identify Effective Similar Users in Recommender Systems Abstract: In recent years there is a drastic increase in information over the internet. Users get confused to find out best product on the internet of one’s interest. Here the recommender system helps to filter the information and gives relevant recommendations to users so that the user community can find the item(s) of their interest from huge collection of available data. But filtering information from the users reviews given for various items seems to be a challenging task for recommending the user interested things. In general similarities between the users are considered for recommendations in collaborative filtering techniques. This paper describes a new collaborative filtering technique called Adaptive Similarity Measure Model [ASMM] to identify similarity between users for the selection of unseen items. Out of all the available items most similarities would be sorted out by ASMM for recommendation which varies from user to user.

Keywords: Collaborative Filtering, CB-Filtering, ASMM and Recommendation Systems. 172. References: 834-840 1. B. Shumeet, R. Seth, D. Sivakumar, Y. Jing, J. Yagnik, S. Kumar, D. Ravichandran, M. Aly, Video suggestion and discovery for YouTube: taking random walks through the view graph, in: International Conference on World Wide Web, 2008, pp. 895–904. 2. E. Brynjolfsson, Y.J. Hu, M.D. Smith, Consumer surplus in the digital economy: estimating the value of increased product variety at online booksellers, Manage. Sci. 49 (11) (2003) 1580–1596. 3. J.S. Breese, D. Heckerman, C. Kadie, Empirical analysis of predictive algorithms for collaborative filtering, in: Proceedings of the Fourteenth Conference on Uncertainty in Artificial Intelligence, 1998, pp. 43–52. 4. F. Cacheda, V. Carneiro, D. Fernández, V. Formoso, Comparison of collaborative filtering algorithms: limitations of current techniques and proposals for scalable, high-performance recommender system, ACM Trans. Web 5 (1) (2011) 5. M.J. Pazzani, D. Billsus, Content-based recommendation systems, The Adap. Web (2007) 325–341. 6. H. Junming, C. Xueqi, G. Jiafeng, S. Huawei, Y. Kun, Social recommendation with interpersonal influence, ECAI 10 (2010) 601–606. 7. L. Jie, S. Qusai, X. Yisi, L. Qing and Z. Guangquan. BizSeeker: a hybrid semantic recommendation system for personalized government-to- business e-services, Internet Res. 20(3) (2010) 342–365. 8. Xiaoyuan Su and Taghi M. Khoshgoftaar, A Survey of Collaborative Filtering Techniques, Advances in Artificial Intelligence Volume 2009 (2009), Article ID 421425. 9. G. Karypis, “Evaluation of item-based top-N recommendation algorithms,” in Proceedings of the International Conference on Information and Knowledge Management (CIKM '01), pp. 247–254, Atlanta, Ga, USA, November 2001. 10. M. Deshpande and G. Karypis, “Item-based top-N recommendation algorithms,” ACM Transactions on Information Systems, vol. 22, no. 1, pp. 143–177, 2004. 11. N. Zheng, L. Qiudan, L. Shengcai, Z. Leiming, Which photo groups should I choose? A comparative study of recommendation algorithms in Flickr, J. Inform. Sci. 36 (6) (2010) 732–750. 12. M. Ye, P. Yin, W.C. Lee, Location recommendation for location-based social networks, in: Proceedings of the SIGSPATIAL International Conference on Advance in Geographic Information Systems, 2010, pp. 458–461. Authors: Majmaa Huda Khalid Hameed, Sheshin E.P Paper Title: Researching CdZnS/ZnS (GT) Quantum Dots in Cathodoluminescent Mode Abstract: Application field of UV light sources is getting larger at the last decades. Among the most widespread are high and medium pressure vacuum lamps. But there currently is a trend of moving away from using mercury both in household applications and manufacturing. This creates a necessity to conduct research and development for UV sources made and operating without Hg. Cathodoluminescent UV sources are in this category. One of the possible ways to create a viable UV anode phosphor is using quantum dots with needed spectral characteristics.

173. Keywords: UV light, light sources, quantum dots, cathodoluminescence, field effect emission, CdZnS/ZnS 841-843 References: 1. Levshin V.L. et al. Researching cathodoluminescence of ZnS and some other phosphors // Works of P.N. Lebedev’s Institute of Physics. 1963. #23. P. 64–135. 2. Klimov V.I., ed. Nanocrystal Quantum Dots (2nd Ed.). // CRC Press, 2010 3. Ozol D.I. Preliminary study of cathode ray tube phosphors on the basis of nanocrystal quantum dots // 29th International Vacuum Nanoelectronics Conference (IVNC), 2016, Vancouver, BC, 2016, pp. 1-2. 4. Dezhurov S.V. et al. Synthesizing highly stable colloid quantum dots CDTESE/CDS/CDANS/ZNS, exhibiting fluorescence in 650-750 nm range // Russian nanotechnology, 2016, #5-6 pp. 69-74 Authors: B.Neeraja, Arti Chandani, N.Tarun Sastry, J.Saravanan Paper Title: Energy Saving for GO Green Environment Abstract: Green environment is not only planting of trees . It need not always be to create or invent something new for having a green surroundings and neighborhood. It can also be to measure to be taken to save our neighborhood from pollution. Many of us do not know the impact of using halogen lamps, neon lamps and other high voltage generating lighting system on our environment. These bulbs not only generate more heat in the surroundings where they are used but also consume high electricity. These lights when discarded will produce gases which are more harmful for the environment. They pollute the air by producing argon gas which will cause health issues like cancer, skin diseases. In the present day of nuclear families people are using more electricity and burn more lamps to have lighting in their homes. To give more clarity they are using artificial lighting to make their homes bright. This problem never arouse in the earlier period as the homes constructed were naturally built in such a way more air circulation was there and more ventilation. Homes in earlier days had backyards and more open space for good air circulation and natural lighting. But in the present few decades the culture of cluster homes apartments, multiplex complexes have become more common as people from rural areas are shifting towards urban cities. To accommodate these migrated families it has become a must to go for multiplex complexes and apartments. This is 174. generating more pollution in the environment. In earlier days we never heard the terms of global warming, pollution control measures, Go green concepts. All these concepts have evolved in the last few decades. One of the reason is during increase in number of apartments, nuclear families. In places where one joint family was using a single lamp to complete their day 844-846 to day activities are now replaced by 2 or 3 families using one light each in each house. So instead of one light we are using 3 or 4 lamps and generating more heat and pollution in our environment. The present study is an attempt to find out the alternative solution of using LED/LCD, iCaTS lamps on the energy saving and cost saving and environment friendly electric usage system

Keywords: Domestic Lighting, Residential Complexes, Residential Associations, & Electricity Consumption

References: 1. Lighting Brochure’s and Price list of Various Lamps manufacturing companies in India. 2. iCaTS Brochure. 3. U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy - LED Frequently Asked Questions. 4. U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy - Establishing LED Equivalency. 5. U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy - Energy Efficiency of LEDs. 6. U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy - Lifetime and Reliability. 7. Venture’s Efficient Lighting Systems Technical Brief – Lifetime and Reliability comparisons. Authors: N.Sharath Babu, G.Sreenivasa Raju, Amrita Sajja Paper Title: Research on Two stage and Folded Cascode Bulk Driven OTA in 0.18um CMOS Process Abstract: This paper presence a comparative analysis of two stage and folded cascode bulk driven operational trans conductance amplifier (OTA) topologies for biomedical applications are presented. A two stage bulk driven OTA and Folded cascoded OTA operated with a 1Vpower supply. Bulk-driven PMOS-transistors as an input differential opamp 175. provides high input common-mode range (CMR). To achieve low power consumption all transistors must be operated in sub threshold region. The test results are carried out in standard gpdk180nm CMOS technologies. 847-850

Keywords: OTA, Bulk Driven, CMR, CMOS, Folded Cascode.

References: 1. N. Tang, W. Hong, J. Kim, Y. Yang and D. Heo, "A Sub-1-V Bulk-Driven Opamp With an Effective Transconductance-Stabilizing Technique," in IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 62, no. 11, pp. 1018-1022, Nov. 2015. 2. S. Chatterjee, Y. Tsividis and P. Kinget, "0.5-V analog circuit techniques and their application in OTA and filter design," in IEEE Journal of Solid-State Circuits, vol. 40, no. 12, pp. 2373-2387, Dec. 2005. 3. J. M. Carrillo, G. Torelli, R. Perez-Aloe Valverde and J. F. Duque-Carrillo, "1-V Rail-to-Rail CMOS OpAmp With Improved Bulk-Driven Input Stage," in IEEE Journal of Solid-State Circuits, vol. 42, no. 3,pp.508-517,March2007. 4. E. Kargaran, M. Sawan, K. Mafinezhad and H. Nabovati, "Design of 0.4V, 386nW OTA using DTMOS technique for biomedical applications," 2012 IEEE 55th International Midwest Symposium on Circuits and Systems (MWSCAS), Boise, ID, 2012, pp. 270-273. 5. T. Lehmann and M. Cassia, "1-V power supply CMOS cascode amplifier," in IEEE Journal of Solid-State Circuits, vol. 36, no. 7, pp. 1082- 1086, Jul 2001. 6. Troy Stockstad, Hirokazu Yoshizawa, “A 0.9V, 0.5pA Rail-to-Rail CMOS Operational Amplifier” IEEE 2001 custom integrated circuits conference, IEEE, pp 467-470. 2001 7. K. Lasanen, E. Raisanen-Ruotsalainen, and J. Kostamovaara, “A 1-V 5uW CMOS-opamp with bulk-driven input transistors,” in 43rd IEEE Midwest Symp. Circuits and Systems, 2000, pp. 1038–1041. 8. E. Vittoz and J. Fellrath, "CMOS analog integrated circuits based on weak inversion operations," in IEEE Journal of Solid-State Circuits, vol. 12, no. 3, pp. 224-231, Jun 1977. 9. J.Pan and W.J.Tompkins ,”A Real- Time QRS Detection Algorithm”, IEEE Transactions On Biomedical Engineering, vol.-32, no. 3, pp. 230- 236, March 1985 10. Valtino X. Afonso,” ECG QRS Detection” in Biomedical Digital Signal Processing 11. Arash Ahmadpour and Pooya Torkzadeh “An Enhanced Bulk-Driven Folded-Cascode Amplifier in 0.18 µm CMOS Technology” Circuits and Systems, vol. 3, no. 2, pp. 187-191, March 2012. 12. G. Raikos and S. Vlassis, “Low- voltage bulk-driven input stage with improved transconductance,” Int. J. Circuit Theory Appl., vol. 39, no. 3, pp. 327–339, Mar. 2011. 13. M. De Matteis, A. Donno, S. Marinaci, S. D'Amico and A. Baschirotto, "A 0.9V 3rd-order single-OPAMP analog filter in 28nm CMOS-bulk," 2017 7th IEEE International Workshop on Advances in Sensors and Interfaces (IWASI), Vieste, 2017, pp. 155-158. Authors: Pankaew Tantirattanakulchai, Nuchanad Hounnaklang, Naowarat Kanchanakhan A Cross-Sectional Research on Factors Associated with Depression Among Transgender Women in Bangkok, Paper Title: Thailand Abstract: Depression is becoming a major mental health problem globally. Thailand is known as the accepting society for transgender but the available study on transgender women dealing with depression is scarce. This study aims to describe the prevalence of depression among Thai transgender women in Bangkok and to explore the associated factors. A cross- sectional study was conducted among 108 Thai transgender women in Bangkok, Thailand from January 2019 to April 2019. Data were collected through self-administered. Depression was assessed by using The Center for Epidemiological Studies-Depression Scale (CES-D). Multivariate regression analysis was conducted to explore the associated factors of depression. The prevalence of depression among transgender women in this study was 54.6%. Factors associated with depression in the crude analysis were: sex reassignment surgery (OR=2.45, 95%CI=0.96-6.24), illness history (OR=1.79, 95%CI=0.72-4.50). In multivariate logistic regression analysis, depression was significantly associated with drinking alcohol >1 time/month in the past 12months (adjusted OR=0.33, 95%CI=0.12-0.91). Transgender tend to experience higher rates of mental health issues than the general population. This study suggested that alcohol drinking was only significantly associated with depression in Thai transgender women. For further study, we need to find other associations with depression in transgender community.

Keywords: transgender women, depression, alcohol drinking, illness history, sex reassignment surgery

References: 1. Sari L Reisnerr, T.P., JoAnne Keatley,Mauro Cabral,Tampose Mothopeng,Emilia Dunham,Claire E Holland,Ryan Max,Stefan D Baral, Global health burden and needs of transgender populations: a review. Lancet, 2016. 338(10042): p. 412-436. 2. Winter, S., Thai Transgenders in Focus: Their Beliefs About Attitudes Towards and Origins of Transgender. International Journal of Transgenderism, 2006. 9(2): p. 47-62. 176. 3. World Health Organization, The world halth report 2001: Mental Health : now understanding,now hope. 2001. 4. World Health Organization, depression and other common mental disorders. WHO, 2017. 5. Puri, B., Hall A., Ho R, Psychosexual medicine. Handbook of Revision Notes in Psychiatry, Third Edition, 2014: p. 384. 851-856 6. Cochran SD, M.V., Sullivan JG, Prevalence of mental disorders, psychological distress, and mental health services use among lesbian, gay, and bisexual adults in the United States. Journal of Consulting and Clinical Psychology., 2003. 71(1): p. 53-61. 7. Wallien MS, S.H., Cohen-Kettenis PT., Psychiatric coorbidity among children with gender identity disorder. Journal of the American Academy of Child & Adolescent Psychiatry, 2007. 46(1): p. 1307-14. 8. Bockting WO, M.M., Swinburne Romine RE, Hamilton A, Coleman E, Stigma, Mental Health, and Resilience in an Online Sample of the US Transgender Population. American Journal of Public Health, 2013. 103(5): p. 943–951. 9. Budge, S.L., Adelson, J. L., & Howard, K. A. S, Anxiety and depression in transgender individuals: The roles of transition status, loss, social support, and coping. Journal of Consulting and Clinical Psychology, 2013. 81(3): p. 545-557. 10. NIMH, Depression. Posted on the web at: https://www.nimh.nih.gov/health/topics/depression/index.shtml, 2018. 11. M.Isabella Bisschop, D.M.W.K., Dorly J.H Deeg, Aartjan T.F Beekman, Willem van Tilburg, The longitudinal relation between chronic diseases and depression in older persons in the community: the Longitudinal Aging Study Amsterdam. Journal of Clinical Epidemiology, 2004. 57(2): p. 187-194. 12. Daskalopoulou M, G.J., Walters K, Osborn DP, Batty GD, Stogiannis D, et al., Depression as a risk factor for the initial presentation of twelve cardiac, cerebrovascular, and peripheral arterial diseases: Data Linkage Study of 1.9 Million Women and Men. . PLoS One, 2016. 11(4). 13. Katon W, L.E., Kroenke K, The association of depression and anxiety with medical symptom burden in patients with chronic medical illness. Gen Hosp Psychiatry, 2007. 29(2): p. 147-155. 14. Carol Choo, J.D., Insu Song, Roger Ho, Cluster analysis reveals risk factors for repeated suicide attempts in a multi-ethnic Asian population. Asian Journal of Psychiatry, 2014. 8: p. 38-42. 15. World Health Organization, suicide. 2018. 16. Factor RJ, R.E., A study of transgender adults and their non-transgender siblings on demographic characteristics, social support, and experiences of violence. Journal of LGBT Health Research, 2007. 3(3): p. 11-30. 17. Yang X, W.L., Gu Y, Song W, Hao C, Zhou J, Zhang Q, Zhao Q., A cross-sectional study of associations between casual partner, friend discrimination, social support and anxiety symptoms among Chinese transgender women. Journal of Affective Disorders 2016. 203: p. 22-29. 18. Sarah M. Peitzmeier, F.Y., Rob Stephenson, Andrea L. Wirtz,Altanchimeg Delegchoimbol, Myagmardorj Dorjgotov, Stefan Baral, Sexual Violence against Men Who Have Sex with Men and Transgender Women in Mongolia: A Mixed-Methods Study of Scope and Consequences. PLoS ONE 2015. 10(10). 19. Radloff, L.S., The CES-D Scale: A Self-Report Depression Scale for Research in the General Population. Applied Psyhological measureent, 1997. 1(3): p. 385-401. 20. Mulrow CD, W.J.J., Gerety MB, Ramirez G, Montiel OM, Kerber C., Case-finding instruments for depression in primary care settings. Ann Intern Med, 1995. 122(12): p. 913-21. 21. C, B.-B., The psychological benefits of moderate alcohol consumption: a review of the literature. Drug Alcohol Depend, 1985. 15: p. 305–322. 22. Peele S, B.A., Exploring the psychological benefits associated with moderate alcohol use: a necessary corrective to assessments of drinking outcomes? Drug Alcohol Depend, 2000. 60: p. 221–247. 23. Boden JM, F.D., Alcohol and depression. Addiction, 2011. 106(5): p. 906–914. 24. Christoffer Skogen J, H.S., Henderson M, et al. A, Anxiety and depression among abstainers and low-level alcohol consumers.The Nord- Trøndelag Health Study. Addiction, 2009. 104(9): p. 1519 - 1529. 25. Sandhya Ramrakha, C.P., Melanie L. Bell, Nigel Dickson, et al, The Relationship Between Multiple Sex Partners and Anxiety, Depression, and Substance Dependence Disorders: A Cohort Study Arch Sex Behav, 2013. 42(5): p. 863–872. 26. Gómez-Gil E, Z.-E.L., Esteva I, Guillamon A, Godás T, Cruz Almaraz M, Halperin I, Salamero M., Hormone-treated transsexuals report less social distress, anxiety and depression. Psychoneuroendocrinology, 2012. 37(5): p. 662-70. Authors: Shakthy Thewi Pillai Paper Title: PRE-Screening for Elder Abuse in Sanglah General Hospital, Denpasar, Bali Abstract: Objectives : To identify clinically elderly individuals with elevated risk of being abused based on risk factors and potential forensic markers present. Methods : The design was a cross-sectional analysis of de-identified data taken from the medical database of Sanglah General Hospital, Denpasar. Participants were individuals aged 60 and above with specific ICD-10 coding indicating potential correlates of abuse reported in Sanglah General Hospital over a 6 year period (N = 898). Measured were participant characteristics include demographic characteristics, management and method of payment. The presence of four risk factors and seven potential forensic markers identified using ICD-10 codes were taken and summed. Analytic statistics was used for analysis. Results : Approximately two-thirds of participants were between ages 60-74, 51% were male, 87% received out-patient treatment and 85% used state insurance. 13% had multiple potential correlates of abuse. Five elders were coded with history of assault, with a further 5 coded for abuse. In logistic regression, four predictors, cognitive impairment, functional dependency, fracture and multiple injuries were identified. However only multiple injuries (P=0.008) was significantly associated with multiple risk factors and potential forensic markers of elder abuse. 177. Conclusion : Given the ability of forensic markers to identify elder abuse strongly, it is important to further screen elderly patients who present with multiple injuries. More research is needed to further identify forensic markers of elder abuse 863-866 valid within the Indonesian clinical context.

Keywords: elder abuse; elder mistreatment; neglect; forensic marker

References: 1. United Nations. Population Ageing and Development 2012. New York: United Nations; 2012. 2. World Health Organization. Elder Abuse. [Internet]; 2016 [Accessed 21 Jul. 2016] Available from: http://www.who.int/ageing/projects/elder_abuse/en/ 3. Departemen Kesehatan. 2013. Indeks Pembangunan Kesehatan Masyarakat. Jakarta: Badan Litbangkes, Depkes RI, 2013 4. Gironda, M., Nguyen, A. and Mosqueda, L.. Is This Broken Bone Because of Abuse? Characteristics and Comorbid Diagnoses in Older Adults with Fractures. Journal of the American Geriatrics Society; 2016. 5. Organization, W.. Global Status Report on Violence Prevention. Geneva: World Health Organization; 2014. p.51 6. Johannesen, M. and LoGiudice, D.. Elder Abuse: A Systematic Review of Risk Factors in Community-Dwelling Elders. Age And Ageing; 2013. 42(3), pp.292-298. 7. Gibbs, L.. Understanding the Medical Markers of Elder Abuse and Neglect. Clinics in Geriatric Medicine; 2014. 30(4), pp.687-712. Authors: M.Suganya, R.Sabitha, J.Aruna Jasmine Paper Title: Deep Learning Technique for Brain Tumor Detection using Medical Image Fusion Abstract: Brain Tumor detection using Medical image fusion plays an important role in medical field .Using Fusion technique, The medical image can be enhanced to detect the tumor. It is a mechanism of combining various images of same scene into a single fused image to reduce uncertainty and redundancy, also extracting vital information from the source images. The applications used here to detect Brain Tumor are DBN and CNN techniques. This paper emerges a new process of fusing the images to produce efficient and reliable result for detecting the cancerous tissue and early detection of Brain Tumor.

Keywords: MRI Image, PET Image, Image Fusion, DBN Network, CNN

References: 178. 1. Sérgio Pereira*, Adriano Pinto, Victor Alves, and Carlos A. Silva. “Brain Tumor Segmentation Using Convolutional Neural Networks in MRI Images” IEEE Transaction on medical imaging, May 2017. vol35, No 5 867-870 2. Rohit Kempanna, Atyali Shivchandra R Khot.“Enchancement in detection of brain tumor using fusion” IEEE transaction on AECCT, 2017, Vol.3. 3. V. Tsagaris, V. Anastassopoulos, and G. Lampropoulos, “Fusion ofhyperspectral data using segmented PCT for enhanced color representation”, IEEE Trans. Geosci. Remote Sens., 2005, vol. 43, No. 10, pp.2365–2375. 4. T. Zaveri, and M. Zaveri, “A Novel Region Based Multimodality Image Fusion Method”, Journal of Pattern Recognition Research, 2011, vol. 2, pp.140–153. 5. A. Rana, and S. Arora, “Comparative Analysis of Medical ImageFusion. International Journal of Computer Applications,” 2013, vol. 73, no. 9,pp.10–13,. DOI: 10.5120/12768-9371. 6. G. Bhatnagar, Q. M. J. Wu, and Z. Liu, “Directive Contrast Based Multimodal Medical Image Fusion in NSCT Domain. IEEE Transactions on Multimedia, 2013, vol. 15, no. 5, pp. 1014–1024, DOI:10.1109/TMM.2013.2244870. 7. R. J. Sapkal, and S. M. Kulkarni, “Image Fusion based on WaveletTransform for Medical Application,” International Journal ofEngineering Research and Applications,2012, vol. 2, no. 5, pp. 624-627. 8. Pinki Jain, and Anu Aggarwal, “Text Fusion in Medical Images usingFuzzy Logic based Matrix Scanning Algorithm,”2012, International Journalof Scientific and Research Publications, vol. 2, no. 6, pp. 1-6. 9. H. Rabbani, R. Nezafat, and S. Gazor, “Wavelet-domain medical image denoising using bivariate Laplacian mixture model,” IEEE Transactionson Biomedical Engineering, 2009, vol. 56,no. 12,pp. 2826–2837.DOI:10.1109/TBME.2009.2028876. Authors: V. Ajay Varma, T. Ramesh Krishna, Mercy Paul Selvan Paper Title: Competitor Identification by Use The Sentiment Classification Based on the User Research Abstract: Online shopping's have achieved an immense growth. All like to do it as there is no need to physically to the shop and we have a wide range of collections available in the online sites from which we can actually buy the product. The customers usually tend to purchase a product that has a good customer review and has the highest rating. Numerous reviews are given for a single product and the most of the important reviews are not organized well which makes it disappear from the other reviews. Numerous researchers have worked on structuring the reviews for various purposes. In this work we propose a sentimental analysis of customer reviews for various hotel items. All the items are reviewed by the customers and the proposed work makes an analysis of the reviews obtained for a particular item in all the available shops. This analysis is helpful injudging the most likely consumed food by the customers around and can get to know the competiveness of the product being delivered to the customers. Machine Learning techniques and Natural language Processing (NLP) are used for the proposed work and is observed to produce an efficient result.

Keywords: Product Rating, Consumer review, Sentiment Classifier, Natural Language Processing Extraction, Classification,Recognition, Prediction

References: 1. N. Godbole, M. Srinivasaiah, and S. Skiena,(2007),"Large-scale sentiment analysis for news and blogs," in International Conference on Weblogs andSocial Media (ICWSM), pp. 219-222. 2. N. Jakob and I. Gurevych, "Extracting opinion targets ina single- and cross-domain setting with conditionalrandom fields," presented at the Proceedings of the 2010Conference on Empirical Methods in Natural LanguageProcessing, Cambridge, Massachusetts 3. Jingbo Zhu, Huizhen Wang, Muhua Zhu," Aspect-Based Opinion Polling from CustomerReviews," IEEE transactions on Affective Computing, vol. 2, no. 1,January 2011,pp.37-49. 4. Kamala, V. R., and L. MaryGladence. "An optimal approach for social data analysis in Big Data." In 2015 International Conference on 179. Computation of Power, Energy, Information and Communication (ICCPEIC), pp. 0205-0208. IEEE, 2015 5. Kang Liu, LihengXu and Jun Zhao," Co-extractingOpinion Targets and Opinion Words from OnlineReviews Based on the world alignement 871-874 model. 6. Bing Liu, "Sentiment Analysis and Opinion Mining,Morgan & Claypool Publishers,"2012,pp.7-140. 7. Jingbo Zhu, Huizhen Wang, Muhua Zhu," Aspect-BasedOpinion Polling from Customer Reviews," IEEEtransactions on Affective Computing, vol. 2, no.1,January 2011,pp.37-49 8. Jingbo Zhu, Huizhen Wang, Muhua Zhu," Aspect-Based Opinion Polling from Customer Reviews," IEEE transactions on Affective Computing, vol. 2, no. 1,January 2011,pp.37-49. 9. Kang Liu, LihengXu and Jun Zhao," Co-extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model ,"Journal of Latex class file, Vol. 6, no. 1, January 2007,pp.1-14. 10. Mani, I., Maybury, M.T. (eds.)," Advances in Automatic Text Summarization,".MIT Press (1999). 11. Ohana.B., Tierney.B, "Sentiment classification of reviews using SentiWordNet," 9th. IT&T Conference, Dublin Institute ofTechnology, Dublin, Ireland, 22nd.- 23rd. October, 2009. 12. B.Pang,L.Lee,andS.Vaithyanathan," Thumbs up? Sentiment classification using machine learning techniques,"inProc EMNLP, Philadelphia, PA, USA, 2002, pp. 79-86. 13. Richa Sharma, Shweta Nigam, Rekha Jain," Polarity detection at sentence level,". International journal of computer applications(0975 - 8887), Volume 86 - No 11. 14. Yang, Y," An evaluation of statistical approaches to text categorization. Journal of Information Retrieval ,Vol.1,Issue(1-2),1999pp. 69-90. YuanbinWu, Qi Zhang, Xuanjing Huang, LideWu ," Phrase Dependency Parsing for Opinion Mining," Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing, pp.1533- 1541. 15. Gladence, L. Mary, M. Karthi, and V. Maria Anu. "A statistical comparison of logistic regression and different Bayes classification methods for machine learning." ARPN Journal of Engineering and Applied Sciences 10, no. 14 (2015): 5947-5953. 16. Anu, V. Maria, GS Anandha Mala, and K. Mathi. "Comparison of RFID data processing using dimensionality reduction techniques." In 2014 International Conference on Control, Instrumentation, Communication andComputational Technologies (ICCICCT), pp. 265-268. IEEE, 2014. 17. Dr.R.Subhashini and Akila G, "Valence arousal similarity based recommendation services ", IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2015. 18. Dr J.Jabez, "User based efficient video recommendation system", International conference on intelligent data communication technologies and Internet of Things (ICICI 2018).