+ All Categories
Home > Documents > International Journal of Recent Technology and Engineering · 7. Open PHACTS: semantic...

International Journal of Recent Technology and Engineering · 7. Open PHACTS: semantic...

Date post: 20-Feb-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
52
ISSN : 2277 - 3878 Website: www.ijrte.org Technology and Engineering Technology and Engineering International Journal of Recent International Journal of Recent Volume-7 Issue-5, JANUARY 2019 Volume-7 Issue-5, JANUARY 2019 Published by: Blue Eyes Intelligence Engineering and Sciences Publication Published by: Blue Eyes Intelligence Engineering and Sciences Publication n E d a n g i y n g e o e l r o i n n g h c e T t n e c e R I n f t o e l r n a n a t r i u o o n J l a Ijrte Ijrte Exploring Innovation www.ijrte.org E X P L O R I N G I N N O V A T ION
Transcript
  • ISSN : 2277 - 3878Website: www.ijrte.org

    Technology and EngineeringTechnology and EngineeringInternational Journal of Recent International Journal of Recent

    Volume-7 Issue-5, JANUARY 2019Volume-7 Issue-5, JANUARY 2019

    Published by: Blue Eyes Intelligence Engineering and Sciences Publication

    Published by: Blue Eyes Intelligence Engineering and Sciences Publication

    n E d a n g i y n g e o e l r o i n n g h c e T t n e c e R I n f t o e l r na n at r i u o o n J l a

    IjrteIjrte

    Exploring Innovation

    www.ijrte.org

    EXPLORING INNO

    VATI

    ON

  • Editor-In-Chief Chair Dr. Shiv Kumar

    Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE

    Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal

    (M.P.), India

    Associated Editor-In-Chief Chair Dr. Dinesh Varshney

    Professor, School of Physics, Devi Ahilya University, Indore (M.P.), India

    Associated Editor-In-Chief Members Dr. Hai Shanker Hota

    Ph.D. (CSE), MCA, MSc (Mathematics)

    Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India

    Dr. Gamal Abd El-Nasser Ahmed Mohamed Said

    Ph.D(CSE), MS(CSE), BSc(EE)

    Department of Computer and Information Technology, Port Training Institute, Arab Academy for Science, Technology and Maritime

    Transport, Egypt

    Dr. Mayank Singh

    PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT

    Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu-

    Natal, Durban, South Africa.

    Scientific Editors Prof. (Dr.) Hamid Saremi

    Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran.

    Dr. Moinuddin Sarker

    Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor)

    Stamford, USA.

    Dr. Shanmugha Priya. Pon

    Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East

    Africa, Tanzania

    Dr. Veronica Mc Gowan

    Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman,

    China.

    Dr. Fadiya Samson Oluwaseun

    Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern

    Cyprus, Turkey.

    Dr. Robert Brian Smith

    International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie

    Centre, North Ryde, New South Wales, Australia

    Dr. Durgesh Mishra

    Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India

    Executive Editor Chair Dr. Deepak Garg

    Professor & Head, Department of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India

    Executive Editor Members Dr. Vahid Nourani

    Professor, Faculty of Civil Engineering, University of Tabriz, Iran.

    Dr. Saber Mohamed Abd-Allah

    Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.

    Dr. Xiaoguang Yue

    Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.

  • Dr. Labib Francis Gergis Rofaiel

    Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,

    Mansoura, Egypt.

    Dr. Hugo A.F.A. Santos

    ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.

    Dr. Sunandan Bhunia

    Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia

    (Bengal), India.

    Dr. Awatif Mohammed Ali Elsiddieg

    Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,

    Saudi Arabia.

    Technical Program Committee Chair Dr. Mohd. Nazri Ismail

    Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.

    Technical Program Committee Members Dr. Haw Su Cheng

    Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia (Cyberjaya), Malaysia.

    Dr. Hasan. A. M Al Dabbas

    Chairperson, Vice Dean Faculty of Engineering, Department of Mechanical Engineering, Philadelphia University, Amman, Jordan.

    Dr. Gabil Adilov

    Professor, Department of Mathematics, Akdeniz University, Konyaaltı/Antalya, Turkey.

    Dr. Ch.V. Raghavendran

    Professor, Department of Computer Science & Engineering, Ideal College of Arts and Sciences Kakinada (Andhra Pradesh), India.

    Dr. Thanhtrung Dang

    Associate Professor & Vice-Dean, Department of Vehicle and Energy Engineeering, HCMC University of Technology and Education,

    Hochiminh, Vietnam.

    Dr. Wilson Udo Udofia

    Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.

    Convener Chair Mr. Jitendra Kumar Sen

    Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India

    Editorial Chair Dr. Sameh Ghanem Salem Zaghloul

    Department of Radar, Military Technical College, Cairo Governorate, Egypt.

    Editorial Members Dr. K. Priya

    Professor & Head, Department of Commerce, Vivekanandha College of Arts & Sciences for Women (Autonomous, Elayampalayam,

    Namakkal (Tamil Nadu), India.

    Dr. Pushpender Sarao

    Professor, Department of Computer Science & Engineering, Hyderabad Institute of Technology and Management, Hyderabad

    (Telangana), India.

    Dr. Nitasha Soni

    Assistant Professor, Department of Computer Science, Manav Rachna International Institute of Research and Studies, Faridabad

    (Haryana), India.

    Dr. Siva Reddy Sheri

    Associate Professor, Department of Mathematics, School of Technology Hyderabad Campus, GITAM University, Visakhapatnam

    (Andhra Pradesh), India.

    Dr. Nihar Ranjan Panda

    Associate Professor, Department of Electronics and Communication Engineering, Sanketika Vidya Parishad Engineering College,

    Visakhapatnam (Andhra Pradesh), India.

  • S. No

    Volume-7 Issue-5, January 2019, ISSN: 2277-3878 (Online) Published By: Blue Eyes Intelligence Engineering & Sciences Publication

    Page

    No.

    1.

    Authors: Chirag Madan, Aayushi Sinha, Kamlesh Sharma

    Paper Title: Success of Blockchain and Bitcoin

    Abstract: Block chain technology in today’s time changing the world of transactions and documentations. Mainly it gives a transparency to the numerous fields like electronic voting, cost analysis of product manufacturing,

    paying employees, cloud storage and smart contracts (the economist). Or we can say that these applications are the

    major pillors of a country which can be handled very efficiently with the help of blockchain technology. This paper

    explains the role of blockchain in bitcoin and will give the applications of blockchain In the field of transactions,

    governance, productions and documentation. The use of blockchain will reduce the use of third party and third party

    databases. The paper will give the relation of bitcoin and blockchain technology for improving the political aspects

    of country and reducing the dominating behaviour of the powerful persons and frauds in various fields by giving

    the transparency.

    Keywords: Transactions; Governance; Productions Component; Blockchain.

    References: 1. Pilkington, M ,Blockchain technology: principles and applications. Browser Download This Paper, 2015.

    2. Atzori, M ,Blockchain technology and decentralized governance: Is the state still necessary?,2015.

    3. https://www.finextra.com/blogposting/13068/5-ways-blockchain-will- transform-financial-services

    4. Yli-Huumo, J., Ko, D., Choi, S., Park, S., & Smolander, K. (2016). Where is current research on blockchain technology?—a systematic

    review. PloS one, 11(10), e0163477.

    5. Mattila, J. (2016). The blockchain phenomenon–the disruptive potential of distributed consensus architectures (No. 38). The Research

    Institute of the Finnish Economy.

    6. Ekblaw, A., Azaria, A., Halamka, J. D., & Lippman, A. (2016, August). A Case Study for Blockchain in Healthcare:“MedRec” prototype

    for electronic health records and medical research data. In Proceedings of IEEE open & big data conference (Vol. 13, p. 13).

    1-7

    2.

    Authors: Dipesh Jain, Vivek Kumar, Darpan Khanduja, Kamlesh Sharma, Ritika Bateja

    Paper Title: A Detailed study of Big Data in Healthcare: Case study of Brenda and IBM Watson

    Abstract: Big data analytics will revolutionize the health care sector. It provides us the power to assemble, handle, analyze, and understand massive amount of different, organized and unorganized data generated by the

    health care sector regularly. Consultants have known the requirement for analytics to enhance the standard of health

    care and improve care coordination for patients. It will improve operational efficiencies, facilitate predict and

    arrange responses to malady epidemics, improve the standard of observance of clinical trials, and optimize health

    care defrayment in the least levels from patients to hospital systems to governments. This paper, provides a

    summary of massive knowledge, relevancy of it in health care, a number of the add progress and a future outlook on

    however huge data analytics will improve overall quality in health care systems.

    Keywords: Big Data Analytics, Assemble, Handle, Analyze, and Understand Massive Amount of Different,

    References: 1. http://www.nature.com/nature/journal/v498/n 7453/full/498255a.html 2. Brenda software information is taken from https://en.wikipedia.org/wiki/BRENDA 3. http://www.futurescience.com/doi/full/10.415 5/fmc-2016-0264 4. http://www.intelligentpharma.com/blog.php?i d=65 5. All images are taken from http://www.google.co.in 6. Data-driven medicinal chemistry in the era of big data by Scott J. Lusher , Ross McGuire , Rene´ C. van Schaik , C. David Nicholson and

    Jacob de Vlieg

    7. Open PHACTS: semantic interoperability for drug discovery by Antony J. Williams, Lee Harland, Paul Groth, Stephen Pettifer, Christine Chichester, Egon L. Willighagen ,volume 17, 2012

    8. The Journal of Antibiotics: Where we are now and where we are heading by Jason Berdy, 2012 Japan Antibiotics Research Association 9. Role of open chemical data in aiding drug discovery and design by Anna Gaulton and John P Overington , 2010 10. IBM Watson https://www-01.ibm.com/common/ssi/cgi- bin/ssialias?htmlfid=HLW03045USEN& 11. Uses of big data https://www.sas.com/en_us/insights/analytics/bi g-data-analytics.html

    8-12

    3.

    Authors: Saher Manaseer, Oroba M. Al-Nahar, Abdallah S. Hyassat

    Paper Title: Network Traffic Modeling, Case Study: The University of Jordan

    Abstract: Network traffic modelling is the process of describing the dynamic behavior of network by random processes. The issue that it is hard to fully predict the demand on any network from service provider point of

    view, so it is important to find an accurate traffic model to maintain the quality of service. This paper focus on

    analyzing the internet traffic in the University of Jordan network as a case study. The reading and monitoring of

    the traffic was done with appreciated support from the service provider (JU Net Co.).

    Keywords: Network traffic, Traffic model Quality of Service (QoS), Internet Service Provider (ISP), Markov Traffic Models, Poisson Traffic Model, Long-tail traffic models.

    References: 1. Lee, H., Jeon, D. (2015). A Mobile Ad-Hoc network multipath routing protocol based on biological attractor selection for disaster

    recovery communication, The Korean Institute of Communications Information Sciences. ICT Express 1 (2015) 86–89. 2. https://doi.org/10.1016/j.icte.2015.10.001 3. Manaseer, S., Alawneh, A. (2017). A New Mobility Model for Ad Hoc Networks in Disaster Recovery Areas. International

    13-16

  • Association of Online Engineering. V. 13, No.3. 4. Chen, T. (2007). Network Traffic Modeling. Hossein Bidgoli (ed.), Wiley. 5. S. Floyd and V. Jacobson, Link-sharing and resource management models for packet networks, IEEE Trans. Networking, vol. 3, 1995. 6. S. Keshav. (1997). An engineering approach to computer networking: ATM networks, the Internet, and the telephone network.

    Addison-Wesley Longman Publishing Co.

    7. SB .A. Mohammed, S.M Sani, D.D. DAJAB. (2013). Network Traffic Analysis: A Case Study of ABU Network. Computer engineering and intelligent systems journal, Vol 4, No 4, 2013.

    8. Thompson, K., Miller, G., and Wilder, R. (1997). Wide-area Internet traffic patterns and characteristics. IEEE Network, 11. 9. Flickenger, R.; Belcher, M.; Canessa, E.; Zennaro, M. How To Accelerate Your Internet: A practical guide to Bandwidth Management

    and Optimisation using Open Source Software. (2006) ISBN 0-9778093-1-5. Accessed in May/2018. 10. Chandrasekaran, B. (2009). “Survey of Network Traffic Models”. Technical report accessed in May/2018, available online: <

    http://www.cse.wustl.edu/~jain/cse567-06/traffic_models3.htm >.

    4.

    Authors: Sivaram Rajeyyagari, Gopatoti Anand Babu, Mohebbanaaz, G. Bhavana

    Paper Title: Analysis of Image Segmentation of Magnetic Reso-nance Image in the Presence of Inhomongeneties

    Abstract: The present work proposes the Image processing plays a vital role in medical diagnosis system. Out of various processing tools, image segmentation is very crucial in identifying the exact reason of disease. Image

    segmentation clusters the pixels into silent image regions i.e. regions corresponding to individual surfaces,

    objects or any part of objects. Various algorithms have been proposed for image segmentation. We have analyzed

    the various systems that have been developed to medical diagnosis analysis. Reviewing of these frameworks will

    be dependent upon level set strategies from claiming segmenting pictures. The theme, merits, faults from

    claiming Different frameworks will be talked about in this paper. Dependent upon that, another framework need

    been suggested to segmenting those MRI picture utilizing variety level situated calculation without

    reinitialisation for MRI image. Those framework could be used both to recreated and also genuine im-ages.

    Keywords: MRI, Segmentation Level set, Image Processing

    References: 1. G. Aubert and P. Kornprobst, Mathematical Problems in Image Processing: Partial Differential Equations and the Calculus of

    Variations. New York: Springer-Verlag, 2002.

    2. V. Caselles, F. Catte, T. Coll, and F. Dibos, “A geometric model for active contours in image processing,” Numer. Math., vol. 66, no. 1, pp. 1–31, Dec. 1993.

    3. V. Caselles, R. Kimmel, and G. Sapiro, “Geodesic active contours,” Int. J. Comput. Vis., vol. 22, no. 1, pp. 61–79, Feb. 1997. 4. T. Chan and L. Vese, “Active contours without edges,” IEEE Trans. Image. Process, vol. 10, no. 2, pp. 266–277, Feb. 2001. 5. D. Cremers, “A multiphase levelset framework for variational motion segmentation,” in Proc. Scale Space Meth. Comput. Vis., Isle of

    Skye, U.K., Jun. 2003, pp. 599–614.

    6. Bhavana Godavarthi , M Lakshmi Raviteja, Paparao Nalajala,” Pressure Monitoring by capturing IR Image,” International Journal of Emerging Trends in Engineering Research, Vol. No.4, Issue IV, pp.32-35, Jan 2016. ISSN: 2347 - 3983, (Impact Factor: 0.987)

    7. S. Kichenassamy, A. Kumar, P. Olver, A. Tannenbaum, and A. Yezzi, “Gradient flows and geometric active contour models,” in Proc. 5th Int. Conf. Comput. Vis., 1995, pp. 810–815.

    8. R. Kimmel, A. Amir, and A. Bruckstein, “Finding shortest paths on surfaces using level set propagation,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 17, no. 6, pp. 635–640, Jun. 1995.

    9. C. Li, R. Huang, Z. Ding, C. Gatenby, D. Metaxas, and J. Gore, “A variational level set approach to segmentation and bias correction of medical images with intensity inhomogeneity,” in Proc. Med. Image Comput. Comput. Aided Intervention, 2008, vol. LNCS 5242, pp. 1083–1091, Part II.

    10. C. Li, C. Kao, J. C. Gore, and Z. Ding, “Minimization of region-scalable fitting energy for image segmentation,” IEEE Trans. Image Process., vol. 17, no. 10, pp. 1940–1949, Oct. 2008.

    11. C. Li, C. Xu, C. Gui, and M. D. Fox, “Distance regularized level set evolution and its application to image segmentation,” IEEE Trans. Image Process., vol. 19, no. 12, pp. 3243–3254, Dec. 2010.

    12. R. Malladi, J. A. Sethian, and B. C. Vemuri, “Shape modeling with front propagation: A level set approach,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 17, no. 2, pp. 158–175, Feb. 1995.

    13. D. Mumford and J. Shah, “Optimal approximations by piecewise smooth functions and associated variational problems,” Commun. Pure Appl. Math., vol. 42, no. 5, pp. 577–685, 1989.

    14. S. Osher and J. Sethian, “Fronts propagating with curvature-dependent speed: Algorithms based on Hamilton-Jacobi formulations,” J. Comp. Phys., vol. 79, no. 1, pp. 12–49, Nov. 1988.

    15. N. Paragios and R. Deriche, “Geodesic active contours and level sets for detection and tracking of moving objects,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 22, no. 3, pp. 266–280, Mar. 2000.

    16. N. Paragios and R. Deriche, “Geodesic active regions and level set methods for supervised texture segmentation,” Int. J. Comput. Vis., vol. 46, no. 3, pp. 223–247, Feb. 2002.

    17. R. Ronfard, “Region-based strategies for active contour models,” Int. J. Comput. Vis., vol. 13, no. 2, pp. 229–251, Oct. 1994. 18. C. Samson, L. Blanc-Feraud, G. Aubert, and J. Zerubia, “A variational model for image classification and restoration,” IEEE Trans.

    Pattern Anal. Mach. Intell., vol. 22, no. 5, pp. 460–472, May 2000.

    19. An efficient algorithm for image compression" paper published in IJCIET journal with V-8,I-8, Aug-2017. 2."An efficient motion estimation multiple reference frames algorithm" paper published in IJMET journal with V-8, I-8, Aug, 2017

    20. P.Bachan,Samit Kumar Ghosh, Shelesh Krishna Saraswat, "Comparative Error Rate Analysis of Cooperative Spectrum Sensing in Non-Fading and Fading Environment”, IEEE International Conference on Communication Control and Intelligent Systems, GLA University.

    Mathura.Pages:124-127, ISBN: 978-1-4673-7540-5, DOI: 10.1109/CCIntelS.2015.7437891, 2015. (IEEE Xplore)

    17-21

    5.

    Authors: Abdullah S. Alotaibi

    Paper Title: Automation and Refuge of Fault Tolerance Approaches using Cloud Computing Platform

    Abstract: This research paper proposes the Cloud computing platforms would spread very quickly the standout amongst the principle aspects of cloud computing will be the Part under a number layers. Starting with

    specialized fault tolerance a large portion cloud computing platforms misuse virtualization, this intimates that

    they need a part under 3 layers such as hosts, virtual machines and requisitions. Starting with an organization

    purpose from claiming view, they need aid part under 2 layers: the cloud supplier who manages those facilitating

    focal point and the client who manages as much provision in the cloud. This structuring for cloud makes it

    challenging to actualize all the viable management arrangements. This paper concentrates for deficiency

    tolerance over cloud Computing platforms for more that's only the tip of the iceberg decisively once autonomic

    22-24

    https://dl.acm.org/author_page.cfm?id=81331496270&coll=DL&dl=ACM&trk=0https://www.cse.wustl.edu/~jain/cse567-06/traffic_models3.htm

  • repair shed in the event that about faults. It examines the meanings from claiming this Part in the usage about

    issue tolerance. Clinched alongside The majority for current approaches, faults line tolerance will be only took

    care of toward the supplier alternately that customer, which prompts fractional or wasteful results. Solutions,

    which include a coordinated effort the middle of the supplier and the client, need aid substantially guaranteeing.

    We show this talk for analyses the place elite Also community oriented deficiency tolerance results are actualized

    to an autonomic cloud foundation that we prototyped.

    Keywords: Cloud Computing, Fault Tolerance, Faulty Node, Proactive Technique.

    References: 1. Jangjaimon. Design and Implementation of Effective Check pointing for Multithreaded Applications on Future Clouds. IEEE-Cloud

    Computing, 2013. 2. Jiajun Cao, Matthieu Simonin. Checkpointing as a Service in Heterogeneous Cloud Environments. HAL Archives-2014. 3. D. Ghoshal and L. Ramakrishnan, “Frieda: Flexible robust intelligent elastic data managementin cloud environments,” in High

    Performance Computing, Networking, Storage andAnalysis (SCC), 2012 SC Companion:. IEEE, 2012, pp. 1096–1105. 4. Singh. D, Singh, J., "High Availability of Clouds: Failover Strategies for Cloud Computing Using Integrated Checkpointing Algorithms"

    IEEE-CSNT, 2012.

    5. Jangjaimon, "Design and Implementation of Effective Checkpointing for Multithreaded Applications on Future Clouds", IEEE-Cloud Computing (CLOUD), 2013

    6. D. Ghoshal and L. Ramakrishnan, “Frieda: Flexible robust intelligent elastic data managementin cloud environments,” in High Performance Computing, Networking, Storage andAnalysis (SCC), 2012 SC Companion:. IEEE, 2012, pp. 1096–1105.

    7. S. Di, Y. Robert, F. Vivien, D. Kondo, C.-L. Wang, and F. Cappello, “Optimization of cloudtask processing with checkpoint-restart mechanism,” in Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, ser.

    SC’13. New York, NY, USA: ACM, 2013, pp. 64:1–64:12.

    6.

    Authors: Mohammad Rashid Hussain, Mohammed Qayyum, Mohammad Equebal Hussain

    Paper Title: Statistical Approach to Analyze Student Learning Outcomes

    Abstract: to improve students’ learning outcomes (SLO’s), it requires efforts on many aspects, out of which effective learning techniques helps and motivate students to achieve their learning goals. Learning conditions

    depends on prior knowledge, learning environments and the nature of the area in which the techniques are

    implemented. There are certain rubrics which have been decided to measure SLO’s. To achieve the target, it is

    important to meet the introduced methodology in all respect of Course Learning Outcomes(CLO’s) in National

    Qualification Framework (NQF) Domains of Learning and Alignment with Assessment Methods and Teaching

    Strategies: Knowledge, Cognitive Skills, Interpersonal Skills & Responsibility, Communication, Information

    Technology, Numerical and Psycho-motor.

    Keywords: National Qualification Framework (NQF), Course Learning Outcomes (CLO’s), Students Learning outcomes (SLO’s).

    References: 1. NILOA (The National Institute for Learning Outcomes Assessment, 2015). Measuring Quality in Higher Education: An Inventory of

    Instruments, Tools and Resources. 2015-12-12.

    2. Jianxin Zhang, Research on the Assessment of Student Learning Outcomes, 2017 Council for Higher Education Accreditation/CHEA International Quality Group.

    3. Dr. Jennifer E. R. “Methods for Assessing Student Learning Outcomes,” Coordinator of Academic Assessment Office of Institutional Research, Planning, and Assessment Northern Virginia Community College 2008.

    4. Yusuf A. Al-Turki, Anwar L. Bilgrami, “A case study of key performance indicators in scienctific research in a middle eastern university, International journal of latest research in science and technology. Volume 4, issue 6: Page No.21-28, Nov-Dec 2015

    5. Dick M. Carpenter II Æ Lindy Crawford Æ Ron Walden, “Testing the efficacy of team teaching” Springer Science+Business Media B.V. 2007, Learning Environ Res (2007) 10:53–65 DOI 10.1007/s10984-007-9019.

    6. Tomasz NIEDOBA* , Paulina PIĘTA, “Application of Anova in mineral Processing” Mining Science, vol. 23, 2016, 43−54, ISSN 2084-4735

    7. Kwaku F. Darkwah, Richard Tawiah1 , Maxwell Adu-Gyamfi, “Two-way ANOVA for the Study of Revenue Mobilization Inequalities” Lithuanian Statistical Association, Statistics Lithuania Lietuvos statistikų sąjunga, Lietuvos statistikos departamentas ISSN 2029-7262, 2015, vol. 54, No 1, pp. 45–51 2015, 54 t., Nr. 1, 45–51 p,

    8. Jean Ashby,” Comparing student success between developmental math courses offered online, blended, and face-to-face” Volume 10, Number 3, Winter 2011 ISSN: 1541-4914, Journal of Interactive Online Learning

    9. Ramona Lile, Camelia Bran CESC 2013, “The assessment of learning outcomes”, Procedia - Social and Behavioral Sciences 163 ( 2014 ) 125 – 131. Published by Elsevier Ltd.

    10. Berger, J. B., & Milem, J. F. (1999). The role of student involvement and perceptions of integration in a causal model of student persistence. Research in Higher Education, 40, 641–664.

    11. Sylvia Encheva, Evaluation of Learning Outcomes, ICWL 2010: Advances in Web-Based Learning – ICWL 2010 pp 72-80. SpringerLink

    25-33

    7.

    Authors: Mohammad Rashid Hussain, Mohammed Qayyum, Mohammad Equebal Hussain

    Paper Title: Effect of Seven Steps Approach on Simplex Method to Optimize the Mathematical Manipulation

    Abstract: the Simplex method is the most popular and successful method for solving linear programs. The objective function of linear programming problem (LPP) involves in the maximization and minimization problem

    with the set of linear equalities and inequalities constraints. There are different methods to solve LPP, such as

    simplex, dual-simplex, Big-M and two phase method. In this paper, an approach is presented to solve LPP with

    new seven steps process by choosing “key element rule” which is still widely used and remains important in

    practice. We propose a new technique i.e. seven step process in LPP for the simplex, dual-simplex, Big-M and two

    phase methods to get the solution with complexity reduction. The complexity reduction is done by eliminating the

    number of elementary row transformation operation in simplex tableau of identity matrix. By the proposed

    technique elementary transformation of operation has completely avoided and we can achieve the results in

    considerable duration.

    34-43

  • Keywords: Linear programming problem (LPP), Key element (KE), Key column (KC), Key row (KR), Profit per unit (PPU), Random variables (RV), Linear Gaussian Random variables (LGRV), standard deviation (SD),

    Probability Density Function (PDF)

    References: 1. T. Kitahara and S. Mizuno: A Bound for the Number of Different Basic Solutions Generated by the Simplex Method, Technical Report,

    October 15, 2010, to appear in Mathematical Programming (available online at http://www.springerlink.com/content/103081/)

    2. T. Kitahara and S. Mizuno: An Upper Bound for the Number of Different Solutions Generated by the Primal Simplex Method with Any Selection Rule of Entering Variables.

    3. T. Kitahara and S. Mizuno: New Evaluation of Computational Amount of the Simplex Method (Japanese), Technical Report No. 2011-8, August, 2011.

    4. Divya K.Nadar : Some Applications of Simplex Method, International Journal of Engineering Research and Reviews ISSN 2348-697X (Online) Vol. 4, Issue 1, pp: (60-63), Month: January - March 2016, Available at: www.researchpublish.com

    5. Dr. R.G. Kedia: A New Variant of Simplex Method, Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 73-75.

    6. Barry Cipra: The Best of the 20th Century: Editors Name Top 10 Algorithms SIAM News, Volume 33, Number 4, page 1, 2000. 7. Benichou, M., J. M. Gauthier, G. Hentges, G. Ribi`ere. 1977. The efficient solution of large scale linear programming problems. Some

    algorithmic techniques and computational results. Math. Programming 13 280–322. 8. Achterberg, T. 2009. SCIP: solving constraint integer programs. Math. Programming Computation, 1 (1) 1–41. 9. Bartels, R. H., G. H. Golub. 1969. The simplex method of linear programming using LU decomposition. Communications of the

    Association for Computing Machinery 12 266–268. 10. Harris, P. J. J. 1974. Pivot selection methods of the devex LP code. Math. Programming 5 1–28. 11. Hoffman, A., A. Mannos, D. Sokolowsky, D. Wiegmann. 1953. Computational experience in solving linear prog. SIAM J.11–33. 12. Karmarkar, N. 1984. A new polynomial-time algorithm for linear programming, Combinatorica 4 373–395. 13. Van Roy, T. J., L. A., Wolsey. 1987. Solving mixed integer programming problems with automatic reformulation. Operations Research 35

    (1) 45– 57.

    14. Mihai Banciu: Dual Simplex, School of Management Bucknell Univ. Lewisburg, PA 17837 [email protected] Jan 2010. 15. Dimitris Bertsimas and John Tsitsiklis. Introduction to Linear Optimization. Athena Scientific, Belmont, MA, 1st edition, 1997. 16. George B. Dantzig. Maximization of a linear function of variables subject to linear inequalities. In T. C. Koopmans, editor, Activity

    Analysis of Production and Allocation, pages 359–373. John Wiley and Sons, Inc., New York, NY, 1951. 17. V. Klee and G. J. Minty. How good is the simplex algorithm? In O. Shisha, editor, Inequalities - III, pages 159–175. Academic Press, New

    York, NY, 1972.

    18. William S. Jewell: A Primal-Dual Multi-Commodity Flow Algorithm, Operations Research Center University of California, Berkeley, September 1966, ORC 66-24

    19. Beale, E.M.L., "An Alternative Method for Linear Programming," Proo. Cambridge Philos. Soc. 50 (l954), 513-523. 20. Charnes, A., Cooper, W.W., and Farr, D. and Staff, "Linear Programming and Profit Preference Scheduling for a Manufacturing Firm,"

    Jour. Oper. Res. Soc. Amer., _1, no. 3 (1953), 114-129.

    21. Dautzig, G.B., "Maximizing of a Linear Function of Variables Subject to Linear Inequalities," Chapter XXI of Activity Analysis of Production and Allocation, edited by Koopmans, T-C, Wiley, N.Y., 1951.

    22. Dantzig, G.B., "Computational Algorithm of the Simplex Method", the RAND Corporation, Paper 394, 10 April 1953. (RM-1266, Part Xll, 26 October, 1953)

    23. Ford, L.R., and Fulkerson, D.R., "A Simple Algorithm for Finding Maximal Netv.-ork Flows and an Application to the Hitchcock Problem," The RAND Corporation, Paper 743, 26 Sept. 1955j RIJ-1604, 29 Dec. 1956.

    24. Ford, L.R., and Fulkerson, D.R., "A Primal Dual Algorithm for the Capacitated Hitchcock Problem," The RAITO Corporation, RI.i-1798 Part XXXIV, 25 Sept. 1956. (Naval Res. Legist. Quarto, 4, no. 1 (l957), 47-54, RAND Conference on Computational Aspects of Linear

    Programming, 30-31 Aug. 1956.)

    25. Goldman, A. J., and Tucker, A.W. , "Theory of Linear programming," Paper 4 in Linear Inequalities and Related Systems, Princeton Univ. Press, Princeton, 1956, 53-98.

    26. S.Mittal,APande, LWang, PKumar (2011) Design Exploration and Implementation ofSimplex Algorithm over Reconfigurable Computing Platforms In: IEEE International Conference on Digital Convergence 204-209

    27. Cui, T. Ho, T. Tellambura, C. Linear Programming Detection and Decoding for MIMO Systems IEEE International Symposium on Information Theory, pp. 1783-1787, July 2006.

    28. Majumdar, A. FPGA Implementation of Integer Linear Programming Accelerator International Conference on Systemics, Cybernetics and Informatics, (ICSCI), Jan 2006.

    29. R.G. Bland, D. Goldfarb, and M.J. Todd, “The ellipsoid method: a survey,” Operations Research 29, 1039-1091 (1981 30. Karmarkar, N. A new polynomial-time algorithm for linear programming Combinatorica 4, 373−395 (1984) 31. Borgwardt, K. H. Some distribution independent results about the asymptotic order of the average number of pivot steps in the simplex

    method Mathematics of Operations Research, vol.7, no.3, pp.441-462, 1982.

    8.

    Authors: Mohd Mursleen, Ankur Singh Bist, Jaydeep Kishore

    Paper Title: A Support Vector Machine Water Wave Optimization Algorithm Based Prediction Model for

    Metamorphic Malware Detection

    Abstract: In this paper, we proposed a novel method based on coupling of SVM (Support Vector Machine) and WWO (Water Wave Optimization) for detection of metamorphic malware. The working of SVM model depends

    upon the proper selection of SVM parameters. Malware signatures have been taken from G2, MWOR, MPCGEN

    and NGVCK (Next Generation Virus Creation Kit).Benign signatures have been taken from Gygwin, GCC, TASM,

    MingW and Clang .ClustalW and T-Coffee are used for signature alignment during primary pairwise alignment and

    secondary multiple alignment in order to avoid the problem of variable length of code. In this study WWO has been

    employed for determining the parameters of SVM. The performance of SVM-WWO method has been compared

    with LAD Tree, Naive Bayes, SVM and ANN(Artificial Neural Network). Furthermore, The results obtained show

    that the newly proposed approach provides significant accuracy. Satisfactory experimental results show the

    efficiency of proposed method for metamorphic malware detection. Further, it has been recommended that this

    method can be used to facilitate commercial antivirus engines.

    Keywords: metamorphic malware detection, support vector machine (SVM), water wave optimization (WWO).

    References: 1. U. Bayer, A. Moser, C. Kruegel and E. Kirda, " Dynamic Analysis of Malicious Codes," Journal of Computer Virology and Hacking

    44-50

    http://www.springerlink.com/content/103081/http://www.me.titech.ac.jp/technicalreport/h23/2011-8.pdfhttp://www.researchpublish.com/javascript:visitAuthor(%22A_Pande%22)javascript:visitAuthor(%22L_Wang%22)javascript:visitAuthor(%22P_Kumar%22)

  • Techniques, vol. 2, no.1, pp. 67-77, 2006. 2. F. Cohen, "Computer Viruses: Theory and Experiments." Computers & Security," vol. 6, no. 1, pp. 22-35, 1985. 3. K. Fu, and J. Blum, "Controlling for Cybersecurity Risks of Medical Device Software," Communications of the ACM," vol. 56, no. 10,

    pp.35-37, 2013. 4. Z. Zhou, Q. Zhu and M. Zhou," On The Time Complexity of Computer Viruses," IEEE Transaction of Information Theory," vol. 51, no. 8,

    pp. 2962-2966, 2005.

    5. L. Bilge and T. Dumitras, " Before We Knew it: An Empirical Study of Zero-Day Attacks in The Real World,"In: Proceedings of The ACM Conference on Computer and Communication Security," pp. 833-844, 2012.

    6. B. Bilar," Opcodes are Predictor for Malware," IJESDF, vol. 1, no. 2, pp. 156-168, 2007. 7. P. Szor," The Art of Computer Virus Research and Defense,"Pearson Education, 2005. 8. A. S. Bist, "Detection of Metamorphic Viruses: A Survey,"In Advances in Computing, Communications and Informatics (ICACCI,

    International Conference on, pp. 1559-1565, 2014.

    9. V. P. Nair, H. Jain, Y. K. Golecha, M. S.Gaur, & V. Laxmi, " MEDUSA: MEtamorphic Malware Dynamic Analysis Using Signature from API," In Proceedings of the 3rd International Conference on Security of Information and Networks, pp. 263-269.

    10. C. Annachhatre, T. H. Austin, and M. Stamp, "Hidden Markov models for malware classification," Journal of Computer Virology and Hacking Techniques, vol. 11, no. 2, pp.59-73, 2015.

    11. W. Wong, and M. Stamp, "Hunting for metamorphic engines," Journal in Computer Virology, vol. 2, no. 3 , pp. 211-229, 2006. 12. S. Srinivasan, "SSCT Score for Malware Detection," SJSU Master Thesis, pp. 10-40, 2015. 13. D. Rajeswaran, "Function Call Graph Score for Malware Detection." SJSU Master Thesis, pp. 11-47, 2015. 14. R. K. Jidigam, T. H. Austin & M. Stamp, "Singular value decomposition and metamorphic detection," Journal of Computer Virology and

    Hacking Techniques, vol. 11, no. 4, pp. 203-216, 2015.

    15. U. Narra, F. D. Troia, V. A. Corrado, T.H. Austin, and M. Stamp, "Clustering versus SVM for malware detection," Journal of Computer Virology and Hacking Techniques, pp.1-12. 2015.

    16. M. Mangesh, T. H. Austin, and M. Stamp. "Hunting for Metamorphic JavaScript malware," Journal of Computer Virology and Hacking Techniques , vol. 11, no. 2, pp. 89-102, 2015.

    17. D. Sayali, Y. Park, and M. Stamp. "Eigenvalue analysis for metamorphic detection," Journal of computer virology and hacking techniques, vol. 10, no. 1 , pp. 53-65, 2014.

    18. S. Gayathri, R. M. Low, and M. Stamp, "Simple substitution distance and metamorphic detection," Journal of Computer Virology and Hacking Techniques, vol. 9, no. 3 , pp. 159-170, 2013.

    19. B. Donabelle, R. M. Low, and M. Stamp. "Structural entropy and metamorphic malware," Journal of computer virology and hacking techniques, vol. 9, no. 4 , pp. 179-192, 2013.

    20. D. Sayali, Y. Park, and M. Stamp. "Eigenvalue analysis for metamorphic detection," Journal of computer virology and hacking techniques 10, no. 1, pp. 53-65, 2014.

    21. R. Neha, R. M. Low, and M. Stamp. "Opcode graph similarity and metamorphic detection," Journal in Computer Virology , vol. 8, no. 1-2 , pp. 37-52, 2012.

    22. S. Ronak. "METAMORPHIC VIRUSES BUFFER OVER." PhD diss., San Jose State University, 2010. 23. D. P., Mila, R. Giacobazzi, A. Lakhotia, and I. Mastroeni, "Abstract symbolic automata: mixed syntactic/semantic similarity analysis of

    executables," In ACM SIGPLAN Notices, vol. 50, no. 1, pp. 329-341, 2015.

    24. A. Lakhotia, A. Walenstein, C. Miles, and A. Singh, "VILO: a rapid learning nearest-neighbor classifier for malware triage," Journal of Computer Virology and Hacking Techniques , vol. 9, no. 3, pp.109-123, 2013.

    25. A. Shahid, R. Nigel Horspool, and I. Traore, "MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection," In Proceedings of the 6th International Conference on Security of Information and Networks, pp. 233-240, 2013.

    26. F. Parvez, V. Laxmi, M. S. Gaur, and P. Vinod, "Mining control flow graph as API call-grams to detect portable executable malware," In Proceedings of the Fifth International Conference on Security of Information and Networks, pp. 130-137, 2012.

    27. F. Ivan, A. Erwin, and A. S. Nugroho. "Analysis of machine learning techniques used in behavior-based malware detection," In Advances in Computing, Control and Telecommunication Technologies (ACT), Second International Conference on, pp. 201-203, 2010.

    28. P. V. Shijo, and A. Salim. "Integrated static and dynamic analysis for malware detection, " Procedia Computer Science , vol. 46. pp. 804-811, 2015.

    29. R. Neha, R. M. Low, and M. Stamp. "Opcode graph similarity and metamorphic detection," Journal in Computer Virology, vol. 8, no. 1, pp.37-52, 2012.

    30. T. H. Annie, and M. Stamp. "Chi-squared distance and metamorphic virus detection," Journal of Computer Virology and Hacking Techniques , vol. 9, no. 1 ,pp. 1-14, 2013.

    31. R. Hardikkumar, and M. Stamp "Hunting for Pirated Software Using Metamorphic Analysis." Information Security Journal: A Global Perspective, vol. 23, no. 3 ,pp. 68-85, 204.

    32. Y. J. Zheng, "Water wave optimization: a new nature-inspired metaheuristic. Computers & Operations Research", 55, 1-11,2015. 33. S. M. Sridhara, & M. Stamp, (2013). "Metamorphic worm that carries its own morphing engine". Journal of Computer Virology and

    Hacking Techniques, 9(2), 49-58. 34. NGVCK. VX Heavens, Retrieved from: http://vxheaven.org/vx.php?id=tn02 35. MPCGEN. VX Heavens, Retrieved from: http://vxheaven.org/vx.php?id=tn02 36. G2. VX Heavens. Retrieved from:

    http://download.adamas.ai/dlbase/Stuff/VX%20Heavens%20Library/static/vdat/creatrs1.htm

    37. Clang. Retrieved from http://clang.llvm.org/. 38. Cygwin. Retrieved from: http://www.cygwin.com/ 39. GCC. Retrieved from http://gcc.gnu.org/. 40. MinGW. Taken from: http://www.mingw.org/. 41. TASM. Retrieved from: 42. http://trimtab.ca/2010/tech/tasm-5-intel-8086-turbo-assemblerdownload 43. O. Kisi , & K. S. Parmar, "Application of least square support vector machine and multivariate adaptive regression spline models in long

    term prediction of river water pollution". Journal of Hydrology, 534, 104-112. 44. J. C. Mojumder, J. C. Ong, W. T. Chong, & S. Shamshirband, "Application of support vector machine for prediction of electrical and

    thermal performance in PV/T system". Energy and Buildings, 111, 267-277. 2016.

    45. W. D. Fisher, T. K. Camp & V. V. Krzhizhanovskaya, "Crack detection in earth dam and levee passive seismic data using support vector machines". Procedia Computer Science, 80, 577-586.2016.

    46. S. Ch, S. K. Sohani, D. Kumar, A. Malik, B. R. Chahar, A. K.Nema, ... & R. C. Dhiman, "A support vector machine-firefly algorithm based forecasting model to determine malaria transmission". Neurocomputing, 129, 279-288.2014.

    47. S. Huda, J. Abawajy, M. Alazab, M. Abdollalihian, R. Islam, & J. Yearwood, "Hybrids of support vector machine wrapper and filter based framework for malware detection". Future Generation Computer Systems, 55, 376-390.2016.

    48. J. Sahs, & L. Khan,"A machine learning approach to android malware detection". In Intelligence and security informatics conference (eisic), 2012 european (pp. 141-147). IEEE. 2012.

    49. A. D. Schmidt, R. Bye, H. G. Schmidt, J. Clausen , O. Kiraz, K. A. Yuksel, ... & S. Albayrak, "Static analysis of executables for collaborative malware detection on android". In Communications, ICC'09. IEEE International Conference on (pp. 1-5). IEEE.2009.

    50. Q. K. A. Mirza, I. Awan, & M. Younas, "CloudIntell: An intelligent malware detection system" Future Generation Computer Systems.2017. 51. S. Peddabachigari, A. Abraham, C. Grosan, & J. Thomas, "Modeling intrusion detection system using hybrid intelligent systems" Journal of

    network and computer applications, 30(1), 114-132.2007. 52. R. J. Vidmar. (1992, August). On the use of atmospheric plasmas as electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online]. 21(3). pp.

  • 876—880.Available:http://www.halcyon.com/pub/journals/21ps03-vidmar

    9.

    Authors: C.Ravichandran, C.Kalaiselvan

    Paper Title: A Structural Patch Decomposition Approach for MME- Image Fusion Technique using Video

    Abstract: Removal of shadows from one image could be a difficult drawback. Manufacturing a high-quality shadow-free image that is indistinguishable from a replica of a real shadow-free scene is even tougher Shadows in

    pictures area unit generally full of many phenomena within the scene, as well as physical phenomena like lighting

    conditions, kind and behavior of shadowy surfaces, occluding objects, etc. Additionally, shadow regions might

    endure post acquisition, image process transformations, e.g., distinction sweetening, which can introduce noticeable

    artifacts within the shadow-free pictures. We dispute that the assumptions introduced in most studies arise from the

    quality of the matter of shadow removal from one image and limit the category of shadow pictures which might be

    handled by employing a Modified Multi-exposure image fusion (MMEF) technique. Experimental results showing

    definitively the capabilities of our algorithmic rule are given. The difference is that HDR reconstruction works in

    the radiance domain where the value is linear w.r.t. the exposure, while MMEF works in the intensity based

    domain. Compared with object motion, camera motion is relatively easy to tackle via either setting a tripod or

    employing some registration techniques.

    Keywords: Index Terms - SPD-MMEF, Image fusion, Ghost Removal Algorithm, Pixel - level based image Fusion. Image enhancement..

    References: 1. Kede Ma, Hui Li, Hongwei Yong &Zhou Wang (2017) ‘Robust Multi-Exposure Image Fusion: A Structural Patch Decomposition

    Approach’IEEE Transactions On Image Processing, Vol. 26, No. 5,pp.2519-2532.

    2. K. Ma and Z. Wang, “Multi-exposure image fusion: A patch-wise approach,” in Proc. IEEE Int. Conf. Imag. Process., Sep. 2015, 3. pp. 1717–1721. 4. S. B. Kang, M. S. Winder, and R. Szeliski, “High dynamic range video,” ACM Trans. Graph., vol. 22, no. 3, pp. 319–325, 2009. 5. Gu, B. Li, W. Wong, J. Zhu, M. and Wang, M. (2012) ‘Gradient field Multi-exposure images fusion for high dynamic range image

    Visualization’,J.Vis.Comm.image vol. 23, no. 4, pp. 604–610. 6. 5. Hu, J. Gallo, O. and Pulli, K.(2012) ‘Exposure stacks of live scenes with Cameras’, in Proc. Eur. Conf. Compute. Vis., 2012, pp.

    499– 512.

    7. Hu, J. Gallo, O. Pulli, K. and Sun, X. (2013) ‘HDR deghosting How 8. to deal with saturation?’, in Proc. IEEE Conf. Compute. Vis. Pattern Recognit. pp. 1163–1170. 9. Lee, J-Y. Matsushita, Y. Shi, B. Kweon, I. S. (2013) Mach 10. Radiometric calibration by rank minimization’, IEEE Trans. Pattern Anal. In tell. vol. 35, no. 1, pp. 144–156. 11. 8. Li, S. Kang, X. and Hu, J. (2013) ‘Image fusion with guided filtering’, 12. IEEE Trans. Image Process, vol. 22, no. 7, pp. 2864–2875. 13. 9. Zitová, B. and Flusser, J. (2003) ‘Image registration methods: A 14. survey’, Image Vis. Compute., vol. 21, pp. 977–1000. 15. 10. Li, S. and Kang, X. (2012) ‘Fast multi- exposure image fusion with 16. median Filter and recursive filter’, IEEE Trans. Consume. Electron. vol. 58, no. 2, pp. 626–632. 17. 11. Lowe, D. G. (2004) ‘Distinctive image features from scale-invariant 18. key points’ Int. J.Comp,Vis. vol. 60, no.2,pp.91-110. 19. 12. Ma, K. and Wang, Z. (2015) ‘Multi-Exposure image fusion: 20. Apatch-wise Approach’, in .Proc. IEEE Int. Conf. Image. Process, pp.1717–1721. 21. 13. Ma, K. Zeng, K. and Wang, Z. (2015) ‘Objective quality assessment 22. for Color to-gray image conversion’, IEEE Trans.Image Pro.vol.11,pp 3345-3356. 23. 14. Ma, K. Yeganeh, H. Zeng, K. and Wang, Z.(2015) ‘High dynamic 24. Range image compression by optimizing tone mapped image quality Index’, IEEE Trans. Image Process. vol. 24, no. 10, pp. 3086–3097. 25. 15. Mertens, T. Kautz, J. and Van Reeth, F. (2009) ‘Exposure fusion: A 26. Simple and practical alternative to high dynamic range photography’, Compute. Graph. Forum, vol. 28, no. 1, pp. 161–171 27. 16. Raman, S. and Chaudhuri, S. (2009) ‘Bilateral filter based 28. ompositing For variable exposure photography’, in Proc. Euro graphics, pp. 1–4. 29. 17. Sen, P. Kalantari, N. K. Yaesoubi, M. Goldman, D. B. & Shechtman, 30. E (2012)‘Robust patch-based HDR reconstruction of Dynamic scenes’, ACM Trans. Graph., vol. 31, no. 6, pp. 203-213 31. 18. Wang, Z. Bovik, A. C. Sheikh, H. R. and Simon cell, E. Pi, (2004) 32. ‘Image quality assessment: From error visibility to structural milarity’, IEEE Trans. Image Process. vol. 13, no. 4, pp. 600–612. 33. 19. A. A. Goshtasby, “Fusion of multi-exposure images,” Image Vis. 34. Comput.,vol. 23, no.6 pp. 611–618, Jun. 2005. 35. 20. S. Li, X. Kang, and J. Hu,(2013) “Image Fusion with guided 36. filtering,” IEEE Trans. Image.Proc.,vol. 22, no. 7, pp. 37. 2864–2875. 38. 21. Enfuse HDR webpage. [Online]. Available: 39. http://www.photographerstoolbox. com/products/lrenfuse.php, 2016. 40. 22. J. Wang, S. Wang, K. and Z. Wang,(2017) “Perceptual depth quality 41. in distorted stereoscopic images,” IEEE Trans. Image Process., vol. 26, no. 3, pp. 1202–1215

    51-59

    10.

    Authors: Motilal Lakavat, Pankaj Kumar Sharma, Mukesh Saxena, Parag Diwan

    Paper Title: Effect of Electroless Ni-P Coatings Containing Nano Additives on Surface Topography of

    Magnesium Alloy

    Abstract: In order to improve the wear and corrosion behavior for the alloys, coating is found as the most suitable method. Mg base alloys have a wide range of industrial application. These alloys shows a high specific

    strength but poor wear and corrosion resistance. An ordinary coating of Cu, Ni & Zn etc. provide a physical barrier

    against the wear rate and corrosion attack of magnesium substrate. In the present investigation, Ni-P plating was

    done on AZ91 composite by immersing samples into Nickel sulphate bath in presence of surfactants. The

    mechanism of Ni-P deposits was studied by using SEM. Ni-P coating was coated uniformly in the presence of

    surfactants. Effect of surfactant and Effect of Nano-additives Al2O3, ZnO, and SiO with different quantities were

    studied. 0.5 g/l Nano Al2O3 additive enhanced the deposition of Ni-P on AZ91 magnesium composite and the same

    60-66

  • results have been observed in case of SiO addition. Influence of ZnO was also observed. So is very clear that Ni-P

    coating is very effective to reduce the corrosion and increase the wear behaviour if it is used along with Nano

    additive and the surfactants.

    Keywords: Coating, Nano-additives, Scanning Electron Microscope, surfactants.

    References: 1. A. Yamashita, Z. Horita, and T. G. Langdon, "Improving the mechanical properties of magnesium and a magnesium alloy through severe

    plastic deformation," Materials Science and Engineering: A, vol. 300, pp. 142-147, 2001.

    2. A. Singh and S. P. Harimkar, "Laser surface engineering of magnesium alloys: a review," Jom, vol. 64, pp. 716-733, 2012. 3. W. Kasprzak, F. Czerwinski, M. Niewczas, and D. Chen, "Correlating hardness retention and phase transformations of Al and Mg cast

    alloys for aerospace applications," Journal of Materials Engineering and Performance, vol. 24, pp. 1365-1378, 2015.

    4. L. Cisar, Y. Yoshida, S. Kamado, Y. Kojima, and F. Watanabe, "Development of High Strength and Ductile Magnesium Alloys for Automobile Applications," Materials Science Forum, vol. 419-422, pp. 249-254, 2003.

    5. J. Tan and M. Tan, "Dynamic continuous recrystallization characteristics in two stage deformation of Mg–3Al–1Zn alloy sheet," Materials Science and Engineering: A, vol. 339, pp. 124-132, 2003.

    6. P. J. Blau and M. Walukas, "Sliding friction and wear of magnesium alloy AZ91D produced by two different methods," Tribology International, vol. 33, pp. 573-579, 2000.

    7. J. K. Pancrecious, S. B. Ulaeto, R. Ramya, T. P. D. Rajan, and B. C. Pai, "Metallic composite coatings by electroless technique – a critical review," International Materials Reviews, pp. 1-25, 2018.

    8. S. Xu, S. Kamado, N. Matsumoto, T. Honma, and Y. Kojima, "Recrystallization mechanism of as-cast AZ91 magnesium alloy during hot compressive deformation," Materials Science and Engineering: A, vol. 527, pp. 52-60, 2009.

    9. Y.-h. Sun, R.-c. Wang, C.-q. Peng, Y. Feng, and M. Yang, "Corrosion behavior and surface treatment of superlight Mg–Li alloys," Transactions of Nonferrous Metals Society of China, vol. 27, pp. 1455-1475, 2017/07/01/ 2017.

    10. C. K. Lee, "Corrosion and wear-corrosion resistance properties of electroless Ni–P coatings on GFRP composite in wind turbine blades," Surface and Coatings Technology, vol. 202, pp. 4868-4874, 2008/06/25/ 2008.

    11. M. Sribalaji, P. Arunkumar, K. S. Babu, and A. K. Keshri, "Crystallization mechanism and corrosion property of electroless nickel phosphorus coating during intermediate temperature oxidation," Applied Surface Science, vol. 355, pp. 112-120, 2015/11/15/ 2015.

    12. A. Araghi and M. H. Paydar, "Wear and corrosion characteristics of electroless Ni–W–P–B4C and Ni–P–B4C coatings," Tribology - Materials, Surfaces & Interfaces, vol. 8, pp. 146-153, 2014/09/01 2014.

    13. T. Mimani and S. M. Mayanna, "The effect of microstructure on the corrosion behaviour of electroless Ni P alloys in acidic media," Surface and Coatings Technology, vol. 79, pp. 246-251, 1996/02/01/ 1996.

    14. X. L. Ge, D. Wei, C. J. Wang, B. Zeng, and Z. C. Chen, "A study on wear resistance of the Ni-P-SiC coating of Magnesium Alloy," in Applied Mechanics and Materials, 2011, pp. 1078-1083.

    15. Y. Choi, C. Lee, Y. Hwang, M. Park, J. Lee, C. Choi, et al., "Tribological behavior of copper nanoparticles as additives in oil," Current Applied Physics, vol. 9, pp. e124-e127, 2009/03/01/ 2009.

    16. M. Saeedi Heydari, H. R. Baharvandi, and S. R. Allahkaram, "Electroless nickel-boron coating on B4C-Nano TiB2 composite powders," International Journal of Refractory Metals and Hard Materials, vol. 76, pp. 58-71, 2018/11/01/ 2018.

    17. M. Gholizadeh-Gheshlaghi, D. Seifzadeh, P. Shoghi, and A. Habibi-Yangjeh, "Electroless Ni-P/nano-WO3 coating and its mechanical and corrosion protection properties," Journal of Alloys and Compounds, vol. 769, pp. 149-160, 2018/11/15/ 2018.

    18. L. Bonin, V. Vitry, and F. Delaunois, "The tin stabilization effect on the microstructure, corrosion and wear resistance of electroless NiB coatings," Surface and Coatings Technology, vol. 357, pp. 353-363, 2019/01/15/ 2019.

    11.

    Authors: Mahendra Vucha, K Jyothi, Kiran Kumari, R Karthik

    Paper Title: Cost Effective Autonomous Plant Watering Robot

    Abstract: This paper presents a solution to those who forget to water the indoor potted plants because of the busy schedule. It presents a system that is fully autonomous and cost-effective.This autonomous system consists of

    a mobile robot with RFID detector and a temperature-humidity sensor and uses wireless communication between

    the mobile robot and sensing module. Thisautonomous system is adaptive to any kind of weather condition and

    addresses the watering needs of the plants with the help of temperature-humidity sensor. The gardening robot used

    is portable and contains an RFID module, Controller, awater reservoir and a water pump. Without human

    intervention thisautonomousrobot can sense the watering need of a plantlocatesthe plant following a predefined

    path and then waters the plant.An RFID tag attached to the potted plant helps for identification. In addition this

    paper describes the implementation of the system in detail along with the complete circuitry. The paper is

    concluded with the analysis of water carrying capacity and time needed to water a set of potted plants.

    Keywords: Atmega16 micro controller, RFID reader, Mobile robot, RFID Tag, motor drivers, DC motors.

    References: 1. B.C. Wolverton, Anne Johnson, and Keith Bounds, “Interior Landscape Plants for Indoor Air Pollution Abatement: Final Report”,

    National Aeronautics and Space Administration ( NASA-TM-101768) Science and TechnologyLaboratory, Stennis Space Center, 1989.

    2. E.J. Van Henten, J. Hemming, B.A.J. Van Tuijl, J.G. Kornet, J. Meuleman, J. Bontsema and E.A. Van Os; “An Autonomous Robot for Harvesting Cucumbers in Greenhouses”; Autonomous Robots; Volume 13 Issue 3, November 2002.

    3. Kevin Sikorski, “Thesis- A Robotic PlantCare System”, University of Washington, Intel Research, 2003. 4. Ayumi Kawakami, Koji Tsukada, Keisuke Kambara and ItiroSiio, “Pot Pet: Pet-like Flowerpot Robot”, Tangible and Embedded

    Interaction 2011, Pages 263-264 ACM New York, NY, USA, 2011. 5. ConstantinosMarios Angelopoulos, Sotiris Nikoletseas, GeorgiosConstantinosTheofanopoulos, “A Smart System for Garden Watering

    using Wireless Sensor Networks”, MobiWac '11 Proceedings of the 9th ACM internationalsymposium on Mobility management and

    wireless access Pages 167-170 ACM New York, NY, USA, 2011. 6. T.C.Manjunath, Ph.D. ( IIT Bombay ) & Fellow IETE, Ashok Kusagur , Shruthi Sanjay, SarithaSindushree, C. Ardil, “Design,

    Development & Implementation of a Temperature Sensor using Zigbee Concepts”, InternationalJournal of Electrical and Computer

    Engineering 3:12 2008. 7. Rafael Muñoz-Carpena and Michael D. Dukes, “Automatic Irrigation Based on Soil Moisture for Vegetable Crops”, Applied

    Engineering in Agriculture (2005).

    67-69

    12.

    Authors: Santhosh B Panjagal, V.Harinath, G.N.Kodanda Ramaiah, R Karthik

    Paper Title: Design of Farmer Friendly Intelligent System to Monitor and Control the Parameters in Precision

    Agriculture

    Abstract: The principle objective of the proposed framework is to outline a convenient, versatile and low cost 70-73

  • farmer friendly intelligent system to accomplish efficient use of water supply and motor control. It senses on field

    data like climate temperature and soil moisture level, rainfall, with the assistance of sensors used in the system. And

    also check for 3-ϕ supply availability, no load condition of water pump, intruder detection (humans, animals etc.).

    farmer receives all the parameters data sensed on field, for further decision making about the need for watering.

    Also need for motor Turn ON/OFF based on sensing rain fall and the same will be sent to the farmer, who might be

    away from the field. If any intruder is detected alarm gets enabled and the same is notified to the farmer via SMS.

    In the proposed system “SMS on demand service” is provided to get the status of all parameters like water resource

    availability, soil’s moisture content, 3-ϕ power supply availability and the intruder detection. The system helps the

    farmer in switching the motor according to his need i.e., whether the water is required for the crop or not. A user

    friendly mobile application and normal SMS service will enable the farmer to monitor and control the land

    parameters from the remote place efficiently. Hence the proposed method shows satisfactory performance to

    measure and monitor the land parameters and moreover 3- ϕ supply availability based motor operation saves from

    motor failure.

    Keywords: Ultra-Low power MSP430, 3-Phase system, GSM, Sensors, Intruder detector, Motor etc..

    References: 1. Roy, Sanku Kumar, Arijit Roy, Sudip Misra,Narendra S. Raghuwanshi, and Mohammad S.Obaidat. "AID: A prototype for Agricultural

    Intrusion Detection using Wireless Sensor Network", 2015 IEEE International Conference on Communications (ICC), 2015.

    2. “Design of Remote Monitoring and Control System with Automatic Irrigation System using GSM-Bluetooth” International Journal of Computer Applications (0975 – 888) Volume 47– No.12, June 2012.

    3. Natural Capitalism Solutions, prepared for boulder country parks and open spaces by: “Sustainable Agriculture Literature Review”. March 2011.

    4. India Country Overview 2008". World Bank. 2008 5. S. Siebert et al. (2010), Groundwater use for irrigation – a global inventory, Hydrol. Earth Syst. Sci., 14, pp. 1863–1880. 6. Global map of irrigated areas: India FAO-United Nations and Bonn University, Germany (2013) 7. Agricultural irrigated land (% of total agricultural land) The World Bank (2013) 8. Bush, E. D. (2010). An overview of the estimation of kimberlite diamond deposits. Southern African Institute of Mining and Metallurgy:

    Diamonds—source to use 2010 (pp. 73–84). Johannesburg, S Africa: The Southern African Institute of Mining and Metallurgy.

    9. Castrignanò, A., Buttafuoco, G., Quarto, R., Parisi, D., Viscarra Rossel, R. A., Terribile, F., et al. (2018). A geostatistical sensor data fusion approach for delineating homogeneous management zones in precision agriculture. Catena, 167, 293–304.

    10. Castrignanò, A., Buttafuoco, G., Quarto, R., Vitti, C., Langella, G., Terribile, F., et al. (2017). A combined approach of sensor data fusion and multivariate geostatistics for delineation of homogeneous zones in an agricultural field. Sensors, 17(12), 2794.

    https://doi.org/10.3390/s17122794. 11. Castrignanò, A., Giugliarini, L., Risaliti, R., & Martinelli, N. (2000). Study of spatial relationships among some soil physico-chemical

    properties of a field in central Italy using multivariate geostatistics. Geoderma, 97(1–2), 39–60. https://doi.org/10.1016/S0016-

    7061(00)00025-2. 12. Corwin, D. L., & Lesch, S. M. (2010). Geostatistical applications for precision agriculture. In M. A. Oliver (Ed.), Geostatistical

    applications for precision agriculture (pp. 139–165). Berlin, Heidelberg, Germany: Springer. https://doi.org/10.1007/978-

    90-481-9133-8. 13. Gebbers, R., & Adamchuk, V. I. (2010). Precision agriculture and food security. Science, 327(5967), 828–831.

    https://doi.org/10.1126/science.1183899. 14. Mulla, D. J. (2017). Spatial variability in precision agriculture. In S. Shashi, H. Xiong, & X. Zhou (Eds.), Encyclopedia of GIS (pp. 2118–

    2125). Cham, Switzerland: Springer. https://doi.org/10.1007/978-3-319-23519-6_1652-1. 15. McBratney, A. B., Minasny, B., & Whelan, B. (2011). Defining proximal soil sensing. In V. I. Adamchuk & R. A. ViscarraRossel (Eds.),

    The second global workshop on proximal soil sensing (pp. 144–146). Montreal, Canada: McGill University.

    16. Mzuku, M., Khosla, R., Reich, R., Inman, D., Smith, F., & MacDonald, L. (2005). Spatial variability of measured soil properties across site-specific management zones. Soil Science Society of America Journal, 69(5), 1572–1579. https://doi.org/10.2136/sssaj2005.0062.

    17. R Karthik, Dharma Reddy Tetali, Susmitha Valli Gogula, G Manisha - Enhancement of Disciples Cognition levels using Bloom's Taxonomy in Data Mining, Journal of Advanced Research in Dynamical and Control Systems, Vol. 3S, pp. 1225-1237, (2018).

    1. 18. Design of low threshold Full Adder cell using CNTFET – P Chandrashekar, R Karthik, O Koteswara Sai Krishna, Ardhi Bhavana, International Journal of Applied Engineering Research, Vol 12, No 1, pp. 3411-3415, (2017).

    18. Samit Kumar Ghosh, P.B. Natarajan, Tapan Kumar Dey, J. Nagaraju, R. Karthik and T.S. Arulananth, “Energy Aware Multi-hop Routing Protocol for Internet of Things based Wireless Sensor Network”, Journal of Engineering and Applied Sciences, Vol. 12, pp. 5307-5311,

    (2017).

    13.

    Authors: T Ravinder, T Vijetha, P Chandra Shaker, Ch Neelima, R Karthik

    Paper Title: Design of 8T SRAM using FINFET Technology

    Abstract: Retrieving the data is the major aspect of concern in CMOS technology. At present lower power consumption is the primary objective. The lower power consumption the SRAM cells will be used in the near future

    extensively. The existing models do not give stability in reading operation because of which a correct logic decision

    at the output cannot be made. In this paper SRAM cell is designed using FinFET technology and is compared with

    existing CMOS 45nm technology, and a new SRAM cell structure is proposed which enhances the read stability

    and write stability with reduction in noise. The transient analysis is done for both CMOS 45nm and FinFET

    technology based SRAM cell. This proposed model is designed with 8 transistors where 6 transistors are used for

    data writing and another two are for data reading. The present design increases the read stability.

    Keywords: Read stability, 8T SRAM, CMOS, FinFET.

    References: 1. ParidhiAthe, S. Dasgupta “A Comparative Study of 6T, 8T and 9T Decanano SRAM cell”, 2009 IEEE Symposium on Industrial

    Electronics and Applications (ISIEA 2009), October 4-6, 2009, Kuala Lumpur, Malaysia.

    2. NahidRahman, B. P. Singh “Design and Verification of Low Power SRAM using 8T SRAM Cell Approach”, International Journal of Computer Applications (0975 – 8887) Volume 67– No.18, April 2013.

    3. E. Grossar, “Read Stability and Write-Ability Analysis of SRAM Cells for Nanometer Technologies”, IEEE Journal of Solid-State

    74-76

    https://doi.org/10.3390/s17122794https://doi.org/10.1007/978-90-481-9133-8https://doi.org/10.1007/978-90-481-9133-8https://doi.org/10.1126/science.1183899https://doi.org/10.1007/978-3-319-23519-6_1652-1https://doi.org/10.2136/sssaj2005.0062

  • Circuits, vol.41, no.11, pp. 2577-2588, Nov.2006. 4. Budhaditya Majumdar, Sumana Basu, “Low Power Single Bit line 6T SRAM Cell With High Read Stability”, IEEE 2011 International

    Conference on Recent Trends in Information Systems.

    5. K. Takeda et al., “A Read-Static-Noise-Margin- Free SRAM Cell for Low-VDD and High-Speed Applications,” IEEE Journal of Solid-State Circuits, vol.41, no.1 pp.113-121, Jan., 2006.

    6. S. Birlaeta., “Static Noise Margin Analysis of Various SRAM Topologies”, IACSIT, pp.304309, vol.3, No.3, June2011. 7. Aly, R. E.,Bayoumi, M. A., “Low-Power Cache Design Using 7T SRAM Cell ”, IEEE Transaction on Circuit and Systems II, April 2007,

    pp. 318-322.

    8. Sil, S. Ghosh and M. Bayoumi, “A novel 8T SRAM cell with improved read-SNM,” IEEE Northeast workshop on circuit and system, 2007, pp.1289-1292.

    9. K. Khare, N. Khare, V. Kulhade and P. Deshpande, “VLSI Design And Analysis Of Low Power 6T SRAM Cell Using Cadence Tool”, leSE, lohorBahru, Malaysia, 2008.

    10. Premalatha, “A Comparative Analysis of 6T, 7T, 8T and 9T SRAM Cells in 90nm Technology” 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).

    11. Kirti Bushan Bawa, “A Comparative Study of 6T, 8T and 9T SRAM Cell” Volume 3 Issue 6, June 2015.

    14.

    Authors: Yojna Arora, Dinesh Goyal

    Paper Title: Performance Comparison ofHive, Pig & Map Reduce overVariety of Big Data

    Abstract: Big Data refers to that huge amount of data which cannot be analyzed by using traditional analytics methods. With the increase of web content at a rapid rate, only analyzing data is not enough rather managing it with

    that great pace and efficiency is needed. A new framework Hadoop was implemented in order to perform parallel

    distributed computing. Hadoop is supported by various frameworks. In this paper, a performance comparison of

    Pig, Hive and Map Reduce over Big Data is analyzed.

    Keywords: Pig, Hive, Map Reduce, Hadoop, Big Data

    References: 1. Prof R A Fadnavis & Sannudhi Tabhane, "Big Data Processing using Hadoop", in IJCSIT, Vol I, 2015 2. Ashish Thusoo, Joydeep Sen Sarma, Namit Jain, Zheng Shao, Prasad Chakka, Ning Zhang, Suresh Antony, Hao Liu and Raghotham

    Murthy, “Hive – A Petabyte Scale Data warehouse using Hadoop”, IEEE, 2010 3. Alan F. Gates, Olga Natkovich, Shubham Chopra, Pradeep Kamath, “Building a high level data flow system on top of Map Reduce : the

    Pig Experience”, Proceedings of VLDB Endowment, Vol 2, Issue 2, August, 2009

    4. Jeffery Dean & Sanjay Ghemawat, “Map Reduce : Simplified Data Processing on Large Clusters”, 6th Symposium on Operating System Design and Implementation, Dec 2004

    5. E. Laxmi Lydia & Dr. M. Ben Swarup, “ Big Data analysis using Hadoop components like Flume, Map Reduce, Pig and Hive”, IJCSET, Vol 5, Issue 11, Nov 2015

    6. Bichitra Mandai, Ramesh Kumar Sahoo and Srinivas Sethi "Architecture of efficient word processing using Hadoop for Big Data Applications", in International Conference on Man and Machine Interfaccing",IEEE 2015

    7. Poonam Vashisht and Vishal Gupta, “Big Data Analytics Techniques: A survey” , in IEEE 2015

    77-81

    15.

    Authors: Pooja Singh, Nasib Singh Gill

    Paper Title: WCA-DGVC: A Weight Clustering Algorithm for Decentralized Group Key Management with

    Variable size Cluster

    Abstract: Wireless Ad hoc networks are experiencing a rapid increase in its applicability as well as in security threats. The wireless communication medium makes them highly prone to security attacks. Key management plays

    a vital role in secured communication. Power efficient and secure key management is one of its major requirements.

    Group key management is a promising approach for efficient cryptographic key management for MANETs. In this

    paper, we proposed a weight clustering algorithm for a decentralized group key management. The whole network is

    divided into smaller subgroups called clusters. The cluster is locally managed by the cluster head (CH). The CHs

    mutually manage the security key process. All nodes have equal opportunities to take part in CH selection. The CHs

    are selected by a weight clustering algorithm based on the computational power and the neighbor count of the node.

    The elected CH selects next CH from its neighbor by comparing their computational power, neighbor nodes and

    their distance from it. This eliminates the need of gateway nodes for inter-cluster communications. The size of the

    cluster is directly proportional to the weight of the cluster head that is the cluster head with high weight will

    manage the large cluster. Therefore the group key management activities are proportionally divided among the

    cluster heads according to their power. This eliminates the risk of frequent drowning of cluster heads. The

    performance of our algorithm is assessed through stimulation and compare with two popular weight clustering

    algorithms.

    Keywords: Cluster, Decentralized group key management, weight clustering algorithm, Wireless ad hoc ntwork.

    References: 1. Basagni, S., Conti, M., Giordano, S., Stojmenovic, I.: Mobile Ad Hoc Networking: Cutting Edge Directions, Second Edition, Chap-1,

    John Wiley and Sons (2013) 2. Zhang, Y., Lee, W.: Security in Mobile Ad-Hoc Networks. In: Ad Hoc Networks Techologies and Protocols, Springer (2005) 3. Rafaeli, S., Hutchison, D.: A survey of Key Management for Secure Group Communication, ACM Computing Surveys, pp. 309-329, Vol.

    35, No. 3, September (2003) 4. Kuroiwa, J.,Yamauchi,Y., Sun,W., Ito,M.: A self-stabilizing algorithm for stable clustering in mobile ad-hoc networks. IEEE (2011) 5. Tao, Y., Wang, J., Wang, Y. L., Sun, T.,: An enhanced maximum stability weighted clustering algorithm in ad hoc network. In: Proc. 4th

    Int. Conf. Wireless Commun. Netw. Mobile Comput. Pp. 1-4 (2008) 6. Anitha, V. S., Seastian, M. P.,: (k,r)-dominating set-based, weighted and adaptive clustering algorithms for mobile ad hoc networks, IET

    Commun., vol. 5, no. 13, pp. 1836-1853 (2011)

    7. Wang, X., Cheng, H., Huang, H.,: Constructing a MANET based on clusters. Wireless Pers. Commun., vol. 75, no. 2, pp. 1489-1510 (2014)

    8. Sathiamoorthy, J., Ramakrishnan, B.,: Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK MANETs. Wireless Netw., vol. 23, no. 2, pp. 371-385 (2017)

    9. Cai, M., Rui, L., Liu, D., Huang, H., Qiu, X.,: Group mobility based clustering algorithm for mobile ad hoc networks. In: proc. APNOMS, pp. 340-343, August (2015)

    82-87

  • 10. Maragatham, T., Karthik, S., Bhavadharini, R. M.,: TCACWCA: transmission and collusion aware clustering with enhanced weight clustering algorithm for mobile ad hoc networks, Cluster Computing, https://doi.org/10.1007/s10586-017-1574-0 (2018)

    11. Salma, B. U., Lawrence, A. A.,: Improved group key management region based cluster protocol in cloud. Cluster Computing. https://doi.org/10.1007/s10586-017-1455-6 (2017)

    12. Aftab, F., Zhang, Z., Ahmad, A.,: Self-Organization Based Clustering in MANETs Using Zone Based Group Mobility. IEEE Access https://doi.org/10.1109/ACCESS.2017.2778019 (2017)

    13. Farkas, K., Hossmann, T., Plattner, B., Ruf, L.,: NWC: node weight computation in MANETs. In: Int. Conf. on Computer Commun. And Netw, pp. 1059-1064 (2007

    16.

    Authors: Bakhtiar Affandy Othman, Aminaton Marto, Nor Zurairahetty Mohd Yunus, Tan Choy Soon, Faizal

    Pakir

    Paper Title: The Grading Effect of Coarse Sand on Consolidated Undrained Strength Behaviour of Sand Matrix

    Soils

    Abstract: In geotechnical engineering field, the behaviour of soil does rely much on the shear strength for design purpose. Previously, findings show that the change of grained size in soil will change the structure

    (microstructure) and behaviour of the soil; consequently, affected the strength. To date, limited study focused on

    the effect of grading on the behaviour of sand fine mixtures. This study aims to investigate the effect of coarse sand

    on undrained strength behaviour of sand matrix soils in comparison with clean sand. A series of test on

    reconstituted sand matrix soils had been carried out by conducting consolidated undrained (CU) triaxial test using

    GDS ELDYN® triaxial machine. Coarse sand (retain within 2.0 mm to 0.6 mm) was mixed with 0%, 10 %, 20%,

    30%, and 40% of fine particles (kaolin) independently by weight to prepare reconstituted samples. Triaxial samples

    of 50 mm diameter and 100 mm height were prepared using wet tamping technique (5% of moisture content) with

    targeted relative density at 15% (loose state). Each reconstituted sample was sheared at two effective confining

    pressures of 100 kPa and 200 kPa, respectively. Results show that the gradation contributed to the behaviour of the

    sand matrix soils. Increasing percentage of coarse sand in sand matrix soils exhibited higher effective friction angle.

    Similar trends were also observed on the angularity effect on undrained shear strength parameters.

    Keywords: Sand Matrix Soils, Coarse Sand, Consolidated Undrained, Cohesion, Friction Angles. .

    References: 1. H. Yokoi, 1968. Relationship between soil cohesion and shear strength. Soil Science and Plant Nutrition, Vol. 14, No. 3. 2. M.M. Rahman, S.R. Lo, 2008. Effect of Sand Gradation and Fines Type on Liquefaction Behaviour of Sand-finesMixture. Geotechnical

    Earthquake and Engineering and Soil Dynamics IV Congress 2008. Page 1-11.

    3. S.V. Dinesh, G. Mahesh Kumar, Muttana S. Balreddy, B.C. Swamy, 2011. Liquefaction Potential of Sabarmati-River Sand. ISET Journal of Earthquake Technology, Paper No. 516, Vol. 48, No. 2-4, June-Dec. 2011, pp. 61–71.

    4. V.T. Phan, D. Hsiao, P.T. Nguyen, 2016. Critical State Line and State Parameter of Sand-Fines Mixtures. Procedia Engineering 142 (2016) 299-306.

    5. R.J.N. Azeiteiro, P.A.L.F. Coelho, D.M.G. Taborda, J.C.D. Grazina. J., 2017. Critical State–Based Interpretation of the Monotonic Behavior of Hostun Sand. Geotech. Geoenviron. Eng., (2017), 143(5):04017004.

    6. N.D. Nik Norsyahariati, K.R. Hui, A.G.A. Juliana, 2016. The Effect of Soil Particle Arrangement on Shear Strength Behavior of Silty Sand. MATEC Web of Conferences 47, 03022.

    7. Marto, C.S. Tan, A.M. Makhtar, N.Z. Mohd Yunus, A. Amaluddin, 2013. Undrained Shear Strength of Sand With Plastic Fines Mixtures. Malaysian Journal of Civil Engineering 25(2) :189-199

    8. C.S. Tan, 2015. Effect of Fines Content and Plasticity on Liquefaction Susceptibility of Sand Matrix Soils. PhD Thesis, Universiti Teknologi Malaysia.

    9. R.W. Boulanger, M.W. Meyers, L.H. Mejia, I.M. Idriss, 1998. Behavior of a fine-grained soil during Loma Prieta earthquake. Canadian Geotechnical Journal, 35(1), 146-158.

    10. Batilas, P. Pelekis, V. Vlachakis, G. Athanasopoulos, 2013. International Journal of Geoengineering Case Histories, 2(4), 270-287. 11. R.P. Orense, T. Kiyota, S. Yamada, M. Cubrinovski, Y. Hosono, M. Okamura, S. Yasuda, 2011. Comparison of liquefaction features

    observed during the 2010 and 2011 Canterbury earthquakes. Seismological Research Letters, 82(6), 905-918.

    12. D. Fontana, S. Lugli, S.Marchetti Dori, R. Caputo, M. Stefani, 2015. Sedimentology and composition of sands injected during the seismic crisis ofMay 2012 (Emilia, Italy): clues for source layer identification and liquefaction regime. Sedimentary Geology 325 (2015) 158–167.

    13. D. Gautam, F. Santucci de Magistris, G. Fabbrocino, 2017. Soil liquefaction in Kathmandu valley due to 25 April 2015 Gorkha, Nepal earthquake. Soil Dynamics and Earthquake Engineering 97 (2017) 37–47

    14. B.A. Othman, A. Marto, 2018. Laboratory test on maximum and minimum void ratio of tropical sand matrix soils. IOP Conf. Ser.: Earth Environ. Sci. 140 012084

    15. Marto, C.S. Tan, A.M. Makhtar, N.J. Jusoh, 2016. Cyclic Behaviour of Johor Sand. International Journal of GEOMATE. Vol. 10, Issue 21, pp, 1891-1898

    16. J.A. Yamamuro, P.V. Lade, 1997. Static liquefaction of very loose sands. Can. Geotech. J. 34:905-917. 17. W. Chang, M. Hong, 2008. Effects of Clay Content on Liquefaction Characteristics of Gap-Graded Clayey Sands. SOILS AND

    FOUNDATIONS Vol. 48, No. 1, 101–114. 18. Y. Yilmaz, M. Mollamahmutoglu, V.Ozaydin, K.Kayabali, 2008. Experimental investigation of the effect of grading characteristics on the

    liquefaction resistance of various graded sands. Engineering Geology 100 (2008) 91-100.

    19. Juneja, M.E. Raghunandan, 2010. Effect of Sample Preparation on Strength of Sands. Indian Geotechnical Conference – 2010, GEOtrendz, 327-330.

    20. E. Ibraim, A. Diambra, D. Muir Wood, A.R. Russell, 2010. Static liquefaction of fibre reinforced sand under monotonic loading. Geotextiles and Geomembranes 28 (2010) 374–385.

    21. Y. Jafarian, R. Vakili, A. Sadeghi Abdollahi, 2013. Prediction of cyclic resistance ratio for silty sands and its applications in the simplified liquefaction analysis. Computers and Geotechnics 52 (2013) 54–62.

    22. Mohammadi, A. Qadimi, 2015. Characterizing the process of liquefaction initiation in Anzali shore sand through critical state soil mechanics. Soil Dynamics and Earthquake Engineering 77 (2015) 152–163.

    23. A.E. Takch, A. Sadrekarimi, H.E. Naggar, 2016. Cyclic resistance and liquefaction behavior of silt and sandy silt soils. Soil Dynamics and Earthquake Engineering 83 (2016) 98–109

    24. S. Rees, 2013.What is Triaxial Testing? Part 1of 3. Published on the GDS website w ww.gdsinstruments.com (2013). 25. K.H. Head, R.J. Epps, 2014. Manual of Soil Laboratory Testing, Volume 3 : Effective Stress Tests, ISBN 978-184995-054-1. 26. C.A. Bareither, T.B. Edil, C.H. Benson, D.M. Mickelson, 2008. Geological and Physical Factors Affecting the Friction Angle of

    Compacted Sands. Journal of Geotechnical and Geoenvironmental Engineering, Vol. 134, No. 10, October 1.

    27. BS 1377-2: 1990, 1990. Methods of test for soils for civil engineering purposes - Part 2: Classification tests. 28. BS1377-8: 1990, 1990. Methods of test for soils for civil engineering purposes – Part 8 : Shear strength tests (effective stress).

    88-92

    17. Authors: A. Mary OdilyaTeena M. Aaramuthan

    https://doi.org/10.1007/s10586-017-1574-0https://doi.org/10.1007/s10586-017-1455-6

  • Paper Title: An Uncertain Trust and Prediction Model in Federated Cloud using Machine Learning Approach

    Abstract: Federated Cloud Model referred as the interconnection of two or more providers with some guidelines prescribed in Service Level Agreement to address the uncertainty such as SLA Violation for the specific

    service. Most well-known models use the concept of either probability or fuzzy set theory in managing the Quality

    of Service (QoS) required by the Cloud user, application and tool. In this paper, Deep Learning is applied to predict

    the SLA Violation and manage the uncertainty. SLA violation is defined as the failure to meet the requirement

    prescribed for the user and application. In addition to that, banker’s algorithm is modified and used as prediction

    algorithm to find the possible safe state computation of the tasks and avoid wastage of resources in federated cloud.

    Random forest data mining technique is applied to rank the trust based provider and top provider may be considered

    for the service. The simulation results reveal that the proposed model helps to avoid uncertainty to about 78% and

    recognized that it is one of the most appropriate model needed in federated cloud architecture.

    Keywords: About four key words or phrases in alphabetical order, separated by commas.

    References:

    1. Rodrigo N. Calheiros, Rajiv Ranjan , Anton Beloglazov , César A. F. De Rose and RajkumarBuyya, “CloudSim: a toolkit for modelling and simulation of cloud computing environments and evaluation of resource provisioning algorithms”, 24 August 2010, https://doi.org/10.1002/spe.995.

    2. RajkumarBuyya ;Saurabh Kumar Garg ; Rodrigo N. Calheiros, ”SLA-oriented resource provisioning for cloud computing: Challenges, architecture, and solutions” in: 2011 IEEE International Conference on Cloud and Service Computing, 12-14 Dec. 2011

    3. 3.Saurabh Kumar Garg, Steve Versteeg and RajkumarBuyya,” SMICloud: A Framework for Comparing and Ranking Cloud Services” in 2011 Fourth IEEE International Conference on Utility and Cloud Computing, 5-8 Dec 2011.

    4. J. Udayakumar, M. Manikkam, and A. Arun, "Cloud-SLA: Service Level Agreement for Cloud Computing." 5. Mohammed, T. Dillon, E. Chang, SLA-based trust model for cloud computing, in: Proceedings of 2010 13th International Conference on

    Network-Based Information Systems (NBiS), 2010, pp. 321–324.

    6. Maheswari, R. Sanjana, S. Sowmiya, SudhirShenai& G. Prabhakaran, “An Efficient Cloud Security System Using Double Secret Key Decryption Process for Secure Cloud Environments”, International Journal of Advanced Scientific Research & Development (IJASRD), 3

    (1/II), pp. 134 – 139.

    7. Sudip Chakraborty, Krishnendu Roy, An SLA-based framework for estimating trustworthiness of a cloud, in: Proceedings of 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 937–942.

    8. D. Serrano, S. Bouchenak, Y. Kouki, T. Ledoux, J. Lejeune, J. Sopena, L. Arantes, and P. Sens, "Towards QoS-oriented SLA guarantees for online cloud services," in Cluster, Cloud and Grid Computing (CCGrid), 2013 13th IEEE/ACM International Symposium on, 2013, pp.

    50-57.

    9. L. Wu, S. K. Garg, and R. Buyya, "SLA-based resource allocation for software as a service provider (SaaS) in cloud computing environments," in Cluster, Cloud and Grid Computing (CCGrid), 2011 11th IEEE/ACM International Symposium on, 2011, pp. 195-204.

    10. Y. Xiaoyong, L. Ying, J. Tong, L. Tiancheng, and W. Zhonghai, "An Analysis on Availability Commitment and Penalty in Cloud SLA," in Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual, 2015, pp. 914-919.

    11. J. Abawajy, Determining service trustworthiness in inter-cloud computing environments, in: Proceedings of 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN), 2009, pp. 784–788.

    12. J. Abawajy, Establishing trust in hybrid cloud computing environments, in: Proceedings of 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2011, pp. 118–125.

    13. D. Bernstein, D. Vij, Inter-cloud security considerations, in: Proceedings of 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), 2010, pp.

    14. MukeshSinghal, Chandrasekhar Santosh, GeTingjian, Sandhu Ravi, Krishnan Ram, Ahn Gail-Joon, Bertino Elisa, Collaboration in multi cloud computing environments: framework and security issues, Computer 46 (2) (2013).

    15. F. Lu, H.Z. Wu, “Research of Trust Valuation and Decision-making Based on Cloud Model in Grid Environment,” Journal of System Simulation, Vol. 21, Jan. 2009, pp. 421 – 426.

    16. J.Y.J. Hsu, K.J. Lin, T.H. Chang, C.J. Ho, H.S. Huang, W.R. Jih, Parameter learning of personalized trust models in broker-based distributed trust management, Inform. Syst. Front. 8 (4) (2010) 321–333.

    17. K.J. Lin, H. Lu, T. Yu, C.E. Tai, A reputation and trust management broker framework for web applications, in: Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Service, 2005, pp. 262–269.

    93-97

    18.

    Authors: Muthunoori Naresh, P Munaswamy

    Paper Title: Smart Agriculture System using IoT Technology

    Abstract: In olden Days Farmers used to figure the ripeness of soil and influenced suspicions to develop which to kind of yield. They didn't think about the humidity, level of water and especially climate condition which terrible a

    farmer increasingly The Internet of things (IOT) is remodeling the agribusiness empowering the agriculturists

    through the extensive range of strategies, for example, accuracy as well as practical farming to deal with

    challenges in the field. IOT modernization helps in assembly information on circumstances like climate, dampness,

    temperature and fruitfulness of soil, Crop web based examination empowers discovery of wild plant, level of

    water, bug location, creature interruption in to the field, trim development, horticulture. IOT utilize farmers to get

    related with his residence from wherever and at whatever point. Remote sensor structures are utilized for watching

    the homestead conditions and tinier scale controllers are utilized to control and mechanize the home shapes. To see

    remotely the conditions as picture and video, remote cameras have been used. IOT development can diminish the

    cost and update the productivity of standard developing.

    Keywords: Soil moisture sensor, Water level sensor, Humidity sensor, Temperature sensor, IOT

    References: 1. k.lakshmisudha, swathi hegde, neha cole, shruti iyer, " good particularity most stationed cultivation spinning sensors", state-of-the-art

    weekly going from microcomputer applications (0975-8887), number 146-no.11, july 2011

    2. nikesh gondchawar, dr. r.complexion.kawitkar, "iot based agriculture", all-embracing almanac consisting of contemporary analysis smart

    minicomputer additionally conversation planning (ijarcce), vol.5, affair 6, june 2016. Overall Journal on Recent and Innovation Trends in

    98-102

  • Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 2 177 – 181

    3. M.K.Gayatri, J.Jayasakthi, Dr.G.S.Anandhamala, "Giving Smart Agriculture Solutions to Farmers for Better Yielding Using IoT", IEEE

    International Conference on Technological Innovations in ICT for Agriculture and Rural

    4. Lustiness. r. nandurkar, slant. r. thool, r. tumor. thool, "plan together with situation coming from rigor horticulture technique executing

    trans-missions sensor network", ieee world consultation toward telemechanics, regulate, intensity also wiring (aces), 2014. Development

    (TIAR 2015).

    5. Paparao Nalajala, D. Hemanth Kumar, P. Ramesh and Bhavana Godavarthi, 2017. Design and Implementation of Modern Automated

    Real Time Monitoring System for Agriculture using Internet of Things (IoT). Journal of Engineering and Applied Sciences, 12: 9389-

    9393.

    6. Joaquín Gutiérrez, Juan Francisco Villa-Medina, Alejandra Nieto-Garibay, and Miguel Ángel PortaGándara, "Computerized Irrigation

    System Using a Wireless Sensor Network and GPRS Module", IEEE Transactions on Instrumentation and Measurements, 0018-

    9456,2013

    7. Paparao Nalajala, P Sambasiva Ra


Recommended