International Journal of Soft Computing and Engineering(TM)
Exploring Innovation| ISSN:2231-2307(Online)| Reg. No.:61903/BPL/CE/2011| Published by BEIESP| Impact Factor: 3.76
Home
Articles
Conferences
Editors
Scopes
Author Guidelines
Publication Fee
Privacy Policy
Associated Journals
Frequently Asked Questions
Contact Us
Volume-6 Issue-3: Published on July 05, 2016
05
Volume-6 Issue-3: Published on July 05, 2016

Download Abstract Book 

S. No

Volume-6 Issue-3, July 2016, ISSN: 2231-2307 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Abdisalam Issa-Salwe, Khurram Mustafa

Paper Title:

Security Assurance Through Strategic Information Systems Planning

Abstract:  Strategic Information Systems Planning (SISP) and pertinent Information Security Policy (ISP) in organisations are largely inevitable in the contemporary business systems. Embedding information security policy within the organisation’s strategic information system planning is essential for the effectiveness of using information systems in modern systems in a secure environment. A survey of relevant literature on SISP and ISP in organisations’ processes reveals a close relationship between them and draws attention to how contradictions within this relationship may threaten as well. We explore the importance of embedding the ISP process within the SISP, and how these two issues are vital to organisations. It is further established the inevitable complementary role of these to ensure the effectiveness of contemporary information systems. The strategic planning information system makes certain that new systems are deployed in a way that maintains the strategic objectives of an organisation while the security policy provides a framework for verifying that systems are shaped and managed in a secure manner. Embedding ISP in SISP appears to increase progressively the security capability of an organisation, and hence, the deliverables from the SISP process may be more effective, efficient and hencefsystems came with huge complexities  beneficial to the organisation. Although organisations may face security glitches throughout the application and operational phase, they must try hard such an inevitable embedding to avoid certain catastrophic risks, assure business continuity and enhance overall productivity. Finally, a cyber sensitive audit and control based ISP Components-based framework is proposed for embedding ISP into SISP, right from instantiation

Keywords:
Strategic Information Systems Strategy, Information Systems (IS), Information Technology (IT), Information Security Policy, Contemporary Business, Security Risk, Business Continuity Planning (BCP).


References:

1.       Issa-Salwe, M. Ahmed, K Aloufi and M. Kabir, “Strategic Information Systems Alignment: Alignment of IS/IT with Business Strategy”, Journal of Information Processing Systems, Vol.6, No.1, pp….March 2010.
2.       Altameem , A. I. Aldrees and N. A. Alsaeed. 2014, “Strategic Information Systems Planning (SISP)”, Proceedings of the World Congress on Engineering and Computer Science, San Francisco, USA,  22-24 October, 2014,

3.       R.D. Austin and C.A. Darby, “. The Myth of Secure Computing”, Harvard Business Review, Vol….121–126, June 2003

4.       BERR (Enterprise and Regulatory Reform). 2008. Security Breaches Survey 2008, UK Department of Business.

5.       Beynon-Davies P. Business Information Systems. 2013. Palgrave/Macmillan, Houndmills, Basingstoke. 2nd edition.

6.       Bhatnagar, A. (2006). Strategic Information Systems Planning: Alignment of 'IS/IT' Planning and Business Planning. Unpublished thesis submitted in partial fulfillment of the degree of Master of Computing, Unitec Institute of Technology, New Zealand.

7.       Brian Fergerson. 2012.  Key Stages of Strategic Information System Planning (SISP) Methods and Alignment to Strategic Management Planning Concepts, ERP and Virtualization Services Columbia Forest Products, Applied Information Management Program, University of Oregon.

8.       Neil F. Doherty and Heather Fulford (November 2005): Aligning the information security policy with the strategic information systems plan. Computers & Security, Vol 25, Issue 1, 55–63. February 2006.

9.       Garg A., J. Curtis and H. Halper. 2003. Quantifying the Financial Impact of Information Security Breaches, Information Management and Computer Security 11 (2), 74–83.

10.    Höne Karin and J. H. P. Eloff. 2002.  Information Security Policy — What Do International Information Security Standards Say? Computers & Security, Volume 21, Issue 5, 1, 402-409.

11.    ISO/IEC 17799. 2005. ISO. Information technology -- Security techniques -- Code of practice for information security management. International Standards Organisation.

12.    John Lindström and Ann Hägerfors. 2009. A Model For Explaining Strategic IT and Information Security To Senior Management, International Journal of Public Information Systems. Vol 5:1. 17-29.
13.    Kajava J., Varonen R., Anttila J., Savola R., and Röning J. Senior Executives Commitment to Information Security – from Motivation to Responsibility, Proceedings of the International Conference on Computational Intelligence and Security, IEEE. 2006.
14.    King, W. and Teo, T. S. H. (1997) Integration between business planning and information systems planning: Validating a stage hypothesis. Decision Sciences, 28:2, pp. 279-308.

15.    Kolkowska E. Value Sensitive Approach to IS security – a socio-organisational perspective, Proceedings of the Eleventh Americas Conference on Information Systems. 2005.

16.    Lederer, A. L., & Sethi, V. Key prescriptions for strategic information systems planning. Management Information Systems, 35-60. 1996.

17.    Lindström John and Ann Hägerfors. A Model For Explaining Strategic IT and Information Security to Senior Management, Luleå University of Technology, Sweden, International Journal of Public Information Systems, Vol 1.2009.

18.    Luftman, J. N. Competing in the information Age Align in the Sand (2nd ed.). New York: Oxford University Press. 2003.

19.    Md Hafiz Selamat, Adam Suhaimi, Husnayati Hussin. January 2006. “Integrating Strategic Information Security with Strategic Information Systems Planning”. National ICT Conference 2006 (UiTM), Kangar.

20.    Newkirk, H., and Lederer, A. The Effectiveness of Strategic Information Systems Planning for Technical Resources, Personnel Resources, and Data Security in Environments of Heterogeneity and Hostility. The Journal of Computer Information Systems, 47 (3), 34-44. 2007.

21.    Jens Bartenschlager. 2011. Implementing IT Strategy: Laying a Foundation. Informatik. Management Research Centre Frankfurt School of Finance & Management.
22.    PWC, 2013 Information Security Breaches Survey: Technical Report. Department for Business, Innovation & Skills (BIS).
23.    Rogerson, S. & Fidler, C. 1994. Strategic Information Systems Planning: Its Adoption and Use, Information Management and Computer Security, (2),1-7.

24.    Sabherwal, R., & Chan, Y. E. (2001). Alignment between business and IS strategies: A study of prospectors, analysers, and defenders. Information Systems Research, 12(1), 11-33.

25.    Siponen, Mikko, Designing Secure Information Systems and Software: Critical Evaluation of the Existing Approaches and a New Paradigm. Academic Dissertation. University of Oulu. 2002

26.    Vincent LeVeque. 2006. Information Security – A Strategic Approach, John Wiley & Sons, pp. 3-20, 149-152.

27.    Ward,  J. & Griffith, P. Strategic Planning For Information Systems (2nd Edition). John Wiley & Son, London. 2000.

28.    Ward J. and J. Peppard, Strategic Planning for Information Systems, John Wiley & Sons, Chichester. 2002.

29.    Wylder J. 2004. Strategic Information Security, Auerbach/CRC Press LLC, pp1-16, 139-153.

30.    PWC, 2015 Information Security Breaches Survey: Technical Report, HM Government, UK.


1-6

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Gekonge Dorcas Arama, Kamaara Mary

Paper Title:

Factors Influencing Implementation of Sustainable CSR Practices in the Energy Sector in Kenya: Case of Kenya Electricity Generating Company

Abstract:   In the last decade, the issue of sustainability has become very critical the world over for governments and business alike. This has seen an increased uptake of CSR activities by many organizations in the areas of environmental, social and economics as marked by increased expenditure in implementation of CSR programs in an effort to contribute to the sustainability agenda. However, most of the CSR programs adopted by organizations are not sustainable as they have weak integration to corporate strategies are faced by lack of project sustainability, financial sustainability, weak structures and systems and low visibility. Moreover, the companies also face threats from communities, complex regulatory framework and there being a mismatch between community needs and corporate objectives as most of the CSR projects are dictated by boardroom decisions. If a business is to have a deliberate positive and consistent impact on society, then its purpose and values should be shared by all those who may influence and be influenced, affect or get affected by its actions. This study therefore aimed at providing a predictive mechanism of the various influences of implementation of sustainable CSR practices in organizations through a case study approach of KenGen one of the key players in the energy sector of Kenya.  The findings of this study is that interventions to reduce the restraining effect of negative influences such as internal inhibitors that sap out the power of positive forces  on implementation of sustainable CSR practices. The paper therefore proposes management intervention measures such as development of measurement metrics that will help track performance and prioritization of CSR programs based on need and impact assessment to ensure improved livelihood of target beneficiaries.

Keywords:
 Corporate Social Responsibility, sustainable CSR practices, Sustainability


References:

1.        Ambec, S., & Lanoie, P. (2008).  Does it pay to be green?  A systematic overview.  Academy of Management Perspectives, 22, 4, 45-62.
2.        Ayele, T.H.(2003). An Investigation Into the Practices of Social Responsibility Among Polythene Manufacturers In Kenya. Academy of Management Review
3.        Babbie, E. (2008). The Basic of Social Research  (4th ed.). California: Thomson Wadsworth Publishing Company: Belmont C.A.
4.        Babbie,E. (2004). The Practice of Social Research. Wadsworth Publishing Company: Belmont C.A.

5.        Bain, J. S. 2010. Social Responsible Investing. New York: Wiley.

6.        Baker, T.L. (1994), Doing Social Research (2nd Ed.), New York: McGraw-Hill Inc.being and why no one saw it coming. New York: Penguin

7.        Blackburn, W. R. (2007).  The sustainability handbook: The complete management guide to achieving social, economic, and environmental responsibility.  London: Earthscan

8.        Bull, N,L. (2006). Motivations for an organization within a developing country to report social responsibility information: evidence from Bangladesh. Accounting,Auditing 7 Accountability Journal, Vol 21(6)
9.        Burke,L. & Logsdon,M. (2006). A Strategic Posture Toward Corporate Social Responsibility. California Management Revie
10.     Burnes, B. 1996. No such thing as…a “one best way” to manage organizational change.Management Decision, 34 (10):11–18.

11.     Byrne, B. M. (2001). Structural equation modeling with AMOS:- Basic concepts, applications, and programming.  Mahwah, NJ: Lawrence Erlbaum.

12.     Campbell,V. (2010). Is it Quality Improves ethics or Ethics Improves Quality.Academy of Management Review

13.     Carroll & Budchholtz, (2012). The Pyramid of Corporate Social Responsibility: Toward the moral management of organizational stakeholders.Business Horizons Vol 34.

14.     Carroll A. B. & Shabana K. M. (2010). The Business Case for Corporate Social Responsibility: A Review of Concepts, Research and Practice. International Journal of Management Reviews .

15.     Carroll, A. B. (1991). The Pyramid of Corporate Social Responsibility: Toward the Moral Management of Organizational Stakeholders. Business Horizons, 34: 39–48.

16.     Cavico,F. & Mujtaba,B. (2012). Social Responsibility, Corporate Constituency Statutes, and the Social Benefit Corporation. International Journal of Management and Administrative Sciences,1(7).

17.     Clarkson, M. B. 1995. A Stakeholder Framework for Analyzing and Evaluating Corporate  Social Performance. Academy of Management Review. 20 (1): 92-117

18.     Cohen, A. J. (2006).  Capital markets at the crossroads: Sustainable investing, environmental focus.  Prepared for the Clinton Global Initiative Annual Meeting, September.

19.     Cornell,S. & Shapiro,A. (2007).Corporate Social Performance Revisited. Academy of Management Review 16(4).
20.     Covin,A. & Miles, J.(2007). Strategic Management Concepts and Case. (12th ed.). New York. McGraw-Hill.
21.     Creswell, J. W. (2003). Research design: Qualitative, quantitative, and mixed methods approaches(2nd ed.). Thousand Oaks, CA: Sage.

22.     Cronbach, L.J., (1951). Coefficient Alpha and the Internal Structure of Tests: Psychometrika, 6(3),297-334

23.     Deegan, C., Rankin,M. &  Tobin,J. (2002). An examination of the Corporate Social and Environmental Disclosures of BHP . A test of Legitimacy Theory. Accounting, Auditing and Accountability journal, Vol 15

24.     DiMaggio, J.& Powell,W. (1983). The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields, American Sociological Review.48.

25.     Esty, D. C., & Winston, A. S. (2006).  Green to gold: How smart companies use environmental strategy to innovate, create value, and build competitive advantage.  New York: Reed Elsevier.

26.     European Commisson (2002). Corporate Social Responsibility- A business Contribution to Sustainable Development, Office for Official Publications of the European Communities, Luxermbourg.

27.     Fox, A. (2007). Corporate Social Responsibility Pays Off. HR Magazine

28.     Galan, J. 2006). Corporate social responsibility and strategic management. Journal of     Management Studies 43 (7), 1629-1641.

29.     Galbreath ,P.(2010). The Question of organizational consciousness: Can Organizations have values, virtues and visions? Journal of Business Ethics. 29(3)

30.     Gall, M. D., Gall, J. P., & Borg, W. R., (2007) Educational Research: An introduction. Boston: Pearson Education.

31.     Giampalmi ,D. (2013). Attitudes about Corporate Social Responsibility: Business student predicitors. Journal of Business Ethics. Vol 91(2).

32.     Gichana D.B.O (2004). A Survey of Corporate Social Resonsibility Practices by Kenyan Companies: Acase of Companies listed in the Nairobi Securities Exchnage.
33.     Goldman Sachs Group (2007).  GS sustain.  New York: Goldman Sachs Global Research.
34.     Goldman Sachs Group. (2007).  GS sustain.  New York: Goldman Sachs Global Research.
35.     Gray, R., et al. (1996). Accounting and accountability-changes and challenges in corporate social and environmental reporting. Prentice Hall,London.
36.     Harish, N. (2012). Corporate Social Responsibility in indian Companies. International Journal of Management, IT and Engineering, Vol.2, Issue5.

37.     Harrington, E. et.al  (2004).Sensemaking in organizations. Sage.

38.     Hawken, P. (2007).  Blessed unrest: How the largest movement in the world came into

39.     Heemskerk, L. (2012). How responsible is responsible business? An analysis of the drivers and effects of the responsible business practices of Dutch enterprises operational in Kenyan agribusiness. Master’sThesis, University Utrecht.

40.     Herrmann, Kristina K. (2004). Corporate Social Responsibility and Sustainable Development: the European Union Initiative as a Case Study. Indiana Journal of Global Legal Studies Vol. 11: Iss. 2, Article 6. Retrieved from: http://www.repository.law.indiana.edu/ijgls/vol11/iss2/6  on 6December, 2015

41.     Ho, C. (2005).  Corporate governance and corporate competitiveness: An international analysis, corporate governance:  An International Review. Published PhD thesis HongKong Polytechnic University dissertations. 13(1), 211-253.

42.     Jamali ,D. & Mishak, R. (2007).The case for strategic corporate social repsonisbility in developing countries. Business and Society Review. Vol 112 (1).

43.     Jones, I., Pollitt, M., and D. Bek (2010). Multinationals in their communities: A social capitalapproach to corporate citizenship projects, University of Cambridge Working Paper 337,accessible from http://www.cbr.cam.ac.uk/pdf/WP337.pdf
44.     Jones, K.(2010).  Democratizing the Corporation, Humanism in Business. Cambridge: Cambridge University Press
45.     Kenya Electricity Generating Company Limited Annual Report & Financial Statements (2014) 

46.     Kenya Electricity Generating Company Limited, retrieved on 12th September 2015 from http://www.kengen.co.ke/index.php?page=press&subpage=releases

47.     Kiraison, H. (2015). Developing Stakeholder  Partnerships in Community Oriented Projects.

48.     Kothari, C. R. (2004). Research Methodology. New Delhi: New Age International.

49.     KPMG (2012). Kenya –Country Profile, KPMG Services Proprietary Limited, South Africa 2012 Retrieved  from: http://www.kpmg.com/Africa/en/KPMG-in-Africa/Documents/Kenya.pdf  on November 20th 2015

50.     Kumar, S.A. & Suresh, N. (2009). Operations management. New Delhi: New Age International. ISBN (13) : 978-81-224-2883-4

51.     Kumar,P.(2010). Corporate Social Responsibility-Public Sensitivity.Proficient.

52.     Kwalanda, R.(2007). Corporate Social Responisbility at Safaricom Ltd. Unpublished MBA Project, University of Nairobi.

53.     Lopez, M., Garcia, A., & Rodriguez, L. (2012). Sustainable development and corporate performance: A study based on the Dow Jones Sustainability Index. Journal of Business Ethics, 75, 285–300.

54.     MacWillaims, G. & Siegel,N. (2001). Researching Corporate Social Responsibility: An agenda for the 21st Century. Journal of Business Ethics (7).Management.

55.     McWilliams, A., & Siegel, D. (2001). Corporate social responsibility: A theory of the firm perspective. Academy of Management Review, 26(1), 117–127.

56.     Meyer,W. & Rowan, B.  (1977). Institutionalized organizations: Formal structure as myth and ceremony. American journal of sociology 83: 340–363

57.     Millon,D. (2011). Two Models of Corporate Social Responsibility. Wake Forest Law Review, Vol.46.

58.     Mugenda, M. & Mugenda, A. (2003).Research Methods: Quantitative and Qualitative Approaches (2ndEd.). Nairobi, Kenya: Acts Publishers.

59.     Mugenda, O.M  & Mugenda, A.G. (1999): Research Methods; Quantitative and Qualitative Approaches. Nairobi: Acts Press

60.     Muthuri, J. N. & Gilbert, V. (2011). An Institutional Analysis of Corporate Social Responsibility in Kenya. Journal of Business Ethics, vol. 98.

61.     Muthuri,J. (2005). Corporate Giving: How much is enough?  ; A theory of the Firm Perspective. Academy of Management Review,26.

62.     Ominde, J. (2006). The Link Between Corporate Social Respnsibility & Corporate Strategy among Companies listed in the NSE

63.     Omoro,N. & Okiro,K. (2014). Investing in Corporate Social Responsibility and Sustained Gorwth in Kenya Commercial Banks. Journal of Emerging Issues in Economics, Finance and Banking.

64.     Porter, M. & Kramer, M.R. (2002). Strategy and Society : The link between competitive advantage Corporate Social Responsibility. Harvard Business Review,84 (12)

65.     Pruzan ,B & Miller, L.(2006). A Survey of managers’ perceptions of corporate ethics and social responsibility and actions that may affect companies’ success.Journal of business Ethics. Vol 82 (3)

66.     Richard,S.  (2008). Institutions and Organizations: Ideas and Interests. Los Angeles, CA: Sage Publications.

67.     Roome,M.& Bergin, S. (2006). Corporate Social Responsibility Communication: Stakeholder information, response and involvement strategies. Business Ethics: A European Review, 5.

68.     Sagebien, J. & M. Whellams (2010). CSR and Development: Seeing the Forest for the Trees. Canadian Journal of Development Studies, vol. 31(3).

69.     Saleemi, N.A (2009). Statistics Simplified. Nairobi: N.A Saleemi

70.     Savitz, A., with Weber, K. (2006). The Triple Bottom Line. San Francisco: Jossey-Bass. 

71.     Savitz, A., with Weber, K. (2006). The Triple Bottom Line. San Francisco: Jossey-Bass.

72.     Schmidpeter René, Weidinger Christina & Fischler Franz (2014). The Evolution of CSR from Compliance to Sustainable Entrepreneurship: Business Success through Sustainability, Springer Berlin Heidelberg.

73.     Seidman, I. (2006). Interviewing as qualitative research: A guide for researchers in education and the social sciences, Third Edition.New York: Teachers College Press.

74.     Sekaran, U. (2003). Research method for business: A skill building approach

75.     Steurer, R., Langer, M.E., Konrad, A., Martinuzzi, A. (2005). „Corporations, stakeholders and sustainable development: a theoretical exploration of business-society relations”, Journal of Business Ethics, 61, pp. 263-281

76.     Suchman, M.C. (1995). Managing Legitimacy: Strategic and Institutional Approaches. Academy of Management Journal, Vol 20.

77.     Teijlingen van, E., Rennie, A.M., Hundley, V., & Graham, W. (2001). The importance of conducting and reporting pilot studies: The example of the Scottish Births Survey, Journal of Advanced Nursing 34: 289-295.

78.     UN (2012). The  Johansberg GSDR On Sustainability: Highlights and the way forward.

79.     UN (2015). The Global Sustainability Report: Transforming our World Voigt Christina (2009). Sustainable Development as a Principle of International Law: Resolving Conflicts Between Climate Measures and WTO Law, BRILL.

80.     WBCSD (2001). Corporate Scocial Responsibility: Making Good Business Snse. Retrieved from www.sbcsd.org on November, 10th, 2015.

81.     Willard, M. &Hitchcock, D., (2006). The Business Guide to Sustainability: Practical Strategies and Tools for Organizations. London: Earthscan.

82.     Wirtenberg, J., Harmon, J., Russell, W. G., & Fairfield, K. (2007).  HR’s role in building a sustainable enterprise. Human Resource Planning, 30 (1), 10–20.

83.     Wirtenberg, J., Harmon, J., Russell, W. G., & Fairfield, K. (2007). HR’s role in building a sustainable enterprise. Human Resource Planning, 30(1), 10–20.

84.     Zadek, S. (2002).  "Balancing Performance, Ethics, and Accountability", Journal of Business Ethics, 17(13): 1421-41.


7-22

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Dhiman Biswas, Nilesh Mukherjee, Partha Pratim Sarkar

Paper Title:

Design of Compact Frequency Selective Surface (FSS) by Loading Slits and Slots

Abstract:    This paper deals with the theoretical investigation on a reduced sized Frequency Selective Surface (FSS). The FSS is designed by loading slit and slot into square patch. It has been observed, how the variation of the dimension of the slot and slit results in shifting of resonant frequency . Compared to conventional square patch FSS the designed FSS can provide reduction in resonant frequency resulting in size reduction up to 87% corresponding to resonant frequency of 2.44 GHz..Theoretical investigations have been done by Ansoft Designer® software.

Keywords:
   Frequency Selective Surface, Size Reduction, slot. slit


References:

1.     N.D. Agrawal and W.A. imbraile,”Design of a Dichroic Cassegrain Sub Reflector” IEEE Trans, AP- 27(4), pp. 466-473(1979)
2.     Sung, G.H. –h, Sowerby, K.W. Neve, M.J.Williamson A.G, “A Frequency selective wall for Interface Reduction In Wireless Indoor Environments” Antennas and
Propagation Magazine, IEEE, Vol 48, Issue 5, pp 29-37 (Oct 2006).

3.     A Novel Dual-Band Frequency Selective Surface (FSS)Xiao-Dong Hu 1, Xi- Lang Zhou 1, Lin- Sheng Wu1, Liang Zhou1, and Wen-Yan Yin 2,1 Center for Microwave and RFTechnologies, Shanghai Jiao Tong University, Shanghai 200240, CHINA2 Center for Optics and EM Research, State Key Lab of MOI, Zhejiang University, Hangzhou 310058, CHINA

4.     R.Ray, A.Ray, S.Sarkar, D.Sarkar, P.P.sarkar, Reduction of Resonant Frequencies of Frequency Selective Surface by Introducing Different Types of Slots, IJCA Special Issue on “2nd National Conference Computing, Communication and Sensor Network” CCSN,2011

5.     PhD Thesis of P.P.Sarkar, Some Studies on FSS,Jadavpur University 2002.

23-25

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Sakshi Sharma, Jang Bahadur Singh

Paper Title:

Optimal Number of Distributed Generators in Power System Network

Abstract:     The distribution generator (DG) may be defined as the small-scale power generation technology that provides electricity closer to customers. The positive impacts of DG are: voltage support, power loss reduction, support of ancillary services and improved reliability. The investigation is done to study the impact of multi-DGs on power losses using the line loss reduction index (LLRI). The study has been carried out on IEEE 14 bus system using Newton Raphson (NR) method for load flow analysis. The investigation is carried out with the insertion of DG at different locations and the minima point was found. The experiment was performed with different sizes of DGs in medium ranges. The analysis of the results show that simply by increasing the number of DGs in the system to reduce the losses is not beneficial all the time. Beside the optimal location and size of DG for the loss reduction in distribution system, number of DG is also a vital factor. In this work, it is concluded that the optimal number of DGs is very important parameter to reduce the losses. The study gives the optimal number of DGs that could be installed in the distribution system to have minimum line losses.

Keywords:
    Line loss reduction index, line loss reduction index, Multi-DGs, Newton Raphson.


References:

1.     F. Gonzalez-Longatt and C. Fortoul. “Review of Distributed Generation Concept: Attempt of Unification,” International Conference on Renewable Energies and Power Quality, España, pp. 16-18. 2005.
2.     F. Sarabia, “Impact of distributed generation on distribution system,” PhD dissertation, Aalborg University, 2011.

3.     T. Ackermann, G. Andersson , and L. So¨der , “Distributed generation: a definition,” Electric Power Systems Research vol. 57, pp. 195, 2000.

4.     S. Gopiya Naik, D. K. Khatod, and M. P. Sharma, “Optimal Allocation of Distributed Generation in Distribution System for Loss Reduction,” IACSIT Coimbatore Conferences, vol. 28, pp. 42, 2012.

5.     S. Kansal, B.B.R. Sai, B. Tyagi, and V. Kumar, “Optimal placement of distributed generation in distribution networks,” International Journal of Engineering, Science and Technology, vol. 3, pp. 47-55, 2011.

6.     F.  G. Longatt, “Impacto de la Generación Distribuida en el Comportamiento de los Sistemas de Potencia,” Universidad Central de Venezuela 2008.

7.     Dharamjit, and D.K.Tanti, “Load Flow Analysis on IEEE 30 bus System,” International Journal of Scientific and Research Publications, vol. 2, 2012.

8.     H. B. Chowdhury, “Load-flow analysis in power systems,” Handbook of Electric Power Calculations 2004.

9.     Dr. Gleb V. Tcheslavski, “Power-Flow studies,” Fundamentals of Power Engineering, 2009.

10.  M. Ilyas, S. M. Tanweer, and A. Rahman, “Optimal Placement of Distributed Generation on Radial Distribution System for Loss Minimization & Improvement of Voltage Profile,” International Journal of Modern Engineering Research, vol. 3, pp-2296-2312, 2013.

11.  Available online: Electrical Power Lab, “Load Flow Analysis”.

12.  M. H. Yaa’kob, “Power Compensation by Distributed Generation,” PhD disertation, Universitiy Malaysia Pahang, 2010.
13.  N. Rugthaicharoencheep and S. Auchariyamet, “Technical and Economic Impacts of Distributed Generation on Distribution System,” World Academy of Science, Engineering and Technology, vol. 64, pp. 288, 2012.
14.  Paul M. Sotkiewicz, and Ing. Jesús Mario Vignolo,“Distributed Generation,” 2008.

15.  P. Paliwal and N.P. Patidar, “Distributed Generator Placement for Loss Reduction and Improvement in Reliability,” World Academy of Science, Engineering and Technology, vol. 45, pp. 803, 2010.

16.  Waseem, “Impacts of Distributed Generation on the Residential Distribution Network Operation,” PhD dissertation, Virginia Polytechnic Institute and State University, 2008.

17.  James O’Donnell, “Voltage Management of Networks with Distributed Generation,” The University of Edinburgh, 2008.


26-30

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

S.L. Badjate, Zoonubiya Khan Ali,  R.V Kshirsagar

Paper Title:

Energy Management of Hybrid Vehicle using Artificial Intelligence for Optimal Fuel Efficiency

Abstract:      In general, hybrid systems can be commanded by splitting the required power between the electric machine and ICE to meet the specific needs like fuel consumption, efficiency, performance, and emissions. This power splitting scenario, which is the key point of hybridization, is in fact the control strategy or energy management of the hybrid automobile. Performance of the system, therefore, depends on the control strategy which needs to be robust (independent from uncertainties and always be stable) and reliable. Moreover, in order to improve the system, the control strategy should be adaptive to track the demand changes from the driver or drive cycle for optimization purposes. In order to fulfill these conditions, there is a need to develop an efficient control strategy, which can split power based on demands of the driver and driving conditions. Hence, for optimal energy management of PHEV, interpretation of driver command and driving situation is most important. In view of this, a fuzzy logic based strategy for interpretation of driver command is proposed in this paper.

Keywords:
 Hybrid vehicles, fuzzy logic, driver command, parallel hybrid vehicles.


References:

1.     Ehsani, M., Gao, Y., Gay, E.S.,  Emadi, A., (2005), Modern Electric, Hybrid Electric, and Fuel Cell Vehicles, CRC PRESS, Boca Raton London, New York, ISBN 0-8493-3154-4
2.     M.F.Sabri,K.A.Danapalasingam , M.F.Rahmat, “A review on hybrid electric vehicles architecture and energy management strategies” RenewableandSustainableEnergyReviews53(2016)1433–1442,(2016)

3.     Huang X , Tan Y, HeX. An intelligent multi feature statistica lapproach for the discrimination of driving conditions of a hybrid electric vehicle.IEEE Trans Intell Transp Syst 2011;12:453–65.

4.     Murphey Y,Park J,Kiliaris L. Intelligent hybrid vehicle power control—part II: online intelligent energy management. Veh Technol IEEE Trans 2013; 62:69–79.

5.     Di Cairano S,Liang W,Kolmanovsky IV,KuangML, Phillips AM. Power smoothing energy management and its application to a series hybrid power train. IEEETransControlSystTechnol2013;21:2091–103.

6.     Cairano S,Di,BernardiniD,BemporadA,KolmanovskyIV.Stochastic MPC with learning for driver- predictive vehicle control and its application to the energy management. ControlSystTechnolIEEETrans2014;22:1018–31.

7.     Zhang Y, Liu H,Guo Q. Varying – domain optimal management strategy for parallel hybrid electric vehicles. IEEE Trans Veh Technol 2014;63:603–16.

8.     Zhang Y, Liu H-P. Fuzzy multi-objective control strategy for parallel hybrid electric vehicle. IET Electr Syst Transp 2012;2:39.

9.     Borhan H,VahidiA,Phillips AM, Kuang ML,Kolmanovsky IV, Cairano SDi. MPC-based energy management of a power-split hybrid electric vehicle. Control SystTechnolIEEETrans2012;20:593–603.

10.  Samanta CK  Panigrahi SP, Panigrahi BK, ,Padhy SK. Hybrids warm intelligence methods for energy management in hybrid electric vehicles.IETE lectr Syst Transp 2013;3:22–9.

11.  Van KeulenT,Gillot J,de Jager B,Steinbuch M. “Solution for state constrained optimal control problems applied to power split control for hybrid vehicles”. Automatica2013;50: 187–92

12.  Powell, B. K.,  Bailey, K. E., and Cikanek, S. R.(1998), Dynamic modeling and control of hybrid electric vehicle powertrain systems, IEEE Conference. Syst. Mag., pp. 17–33, Oct. 1998.

13.  Rahman, Z., Butler, K. L. and Ehsani, M., (1999),Designing parallel hybrid electric vehicles using V-ELPS 2.01,    Proc. American Control  Conference, San Diego, CA, June 1999, pp. 2693–2697.

31-36

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

I. A. Kamani C Samarasinghe, S. R. Kodituwakku, Y. P. R. D. Yapa

Paper Title:

Impact of Data Mining on Telecommunication Company Revenues

Abstract: Rapid advancement of the technology has made the telecommunication sector very competitive. In order to keep up with the competition, telecommunication operators have to identify the exact needs of the customers and offer services in-line with customer needs. The aim of this research is to investigate the applicability of data mining in identifying customer needs and how it can be adapted to increase the revenue of telecommunication companies. The objectives of this study include an  investigation  into the relationship between data mining practices and customer behavior patterns, relationship between customer needs and products or services, relationship between new product design initiatives and revenue increases of the companies, the impact of data mining on the revenue of telecommunications companies, and the development of a data mining framework to improve the overall Average Revenue Per User (ARPU) levels in the industry in addition to the designing of a Business Intelligence (BI) tool to enhance decision making processes for improving the overall ARPU levels of the industry. Firstly, the conceptual model is developed based on the feedback of a sample of employees who hold positions in the telecommunications sector. This model has four main variables; data mining, customer behavior, product and increased revenue.  Secondly, a preliminary study was carried out to test the variables and to find out how data mining can be applied to identify customer needs and how companies can benefit from using data mining techniques in their businesses. Next, a Data Mining framework was developed to make sure that the expected results could be received from the data mining exercise in place.  Finally, a Business Intelligence tool was developed to validate the data mining framework. The preliminary study revealed a clear relationship between the variables of the conceptual framework. Furthermore, it was evident that data mining could lead to better business decisions, apart from the other key benefits of using it, such as timely delivery of services and an increase in customer satisfaction which may affect the revenue of the company. The post survey validation from the target users (managers of telecom companies) indicated that the proposed BI tool is capable of retrieving much needed information for business decisions, which would lead to increased revenues of the companies. The long term results are likely to be positive in this context and it is also evident that the role of data mining can be expanded by the companies and that this practice could eventually lead to companies providing markets with the exact requirements.

Keywords:
 Business Intelligence, data mining, revenues, telecommunication


References:

1.     Segura, A., Castro, C., Domínguez, V., Campos, P.G., and Prieto, M., (2011) "Using data mining techniques for exploring learning object repositories", Electronic Library, the, Vol. 29 Iss: 2, pp.162 – 180
2.     Pendharkar, P.C., and Rodger, J.A., (2000) "Data mining using client/server systems", Journal of Systems and Information Technology, Vol. 4 Iss: 2, pp.72 – 82

3.     Data mining using SAS/EM: A Case Study Approach,SAS,Institute Inc.2003.4

4.     Jiawei Han and Micheline Kamber Data Mining Concepts and Techniques BeiJing Higher Education Press, 2001:279-299.

5.     Elder J F & Abbott D W, A Comparison of Leading Data Mining Tools, KDD-98.

6.     Jiawei Han, Michelin Kamber;Fan Ming, Meng Xiaofeng(interpret),Data Mining: Concepts and Technologies [M] ,Beijing Machinery Industry Press,2001,8

7.     Ren Mingshu, Study on Web Mining and Electronic Commerce, Shandong University of Science and Technology.2002.

8.     Larson, B (2006) Delivering Business Intelligence with Microsoft SQL Server 2005, McGraw-Hill/Osborne

9.     Inmon W.H., (1993) Building the Data Warehouse, A Wiley QED publication, John Wiley and Sons, Inc. New York 123-133

10.  Liu, S.S., and Chen, J., (2009) "Using data mining to segment healthcare markets from patients' preference perspectives", International Journal of Health Care Quality Assurance, Vol. 22 Iss: 2, pp.117 – 134

11.  McAdams, A., Camp, J., and Divakaruni, S., (2000) "The evolution of US telecommunications infrastructure", info, Vol. 2 Iss: 2, pp.107 – 110

12.  Lee, Y., Yen, S., and Hsieh, M., (2005) "A lattice-based framework for interactively and incrementally mining web traversal patterns", International Journal of Web Information Systems, Vol. 1 Iss: 4, pp.197 – 208

13.  Simpson, S., (2010) "Governing information infrastructures and services in telecommunications", Aslib Proceedings, Vol. 62 Iss: 1,                                            pp.46 – 56

14.  Sacripanti, A.M., (1999) "Liberalizing telecommunications in Italy: the role of the regulator", info, Vol. 1 Iss: 5, pp.449 – 453

15.  Premalatha, S., and Baskar, N., (2012) "Implementation of supervised statistical data mining algorithm for single machine scheduling", Journal of Advances in Management Research, Vol. 9 Iss: 2, pp.170 – 177


37-41

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Mahmudun Nabi Chowdhury, Ju-Ri Kim

Paper Title:

Mechanical and Metallurgical Effect on Tubular Shape by Laser Forming

Abstract: Mechanical properties of indirect hot stamping tubes are tailored by laser assisted partial rapid heating. A spiral heated region is generated on a rotating hot stamping steel tube by applying linearly moving laser. A microstructural analysis confirms that martensite phase transformation is occurred in the spiral heated region, thus inducing inhomogeneous microstructures along the length. Mechanical tests show that the mechanical performance of the indirect hot stamping tube can be tailored by properly selecting process parameters of the laser assisted heating. A microstructural analysis confirms that the laser locally induces a martensitic phase transformation in the heated region and results in inhomogeneous microstructures along the length of the tube

Keywords:
 indirect hot stamping, laser assisted heating, mechanical property.


References:

1.        Karbasian, H., Tekkaya, A., 2010. A review on hot stamping. Journal of Materials Processing Technology 210, 2103
2.        Zhu, B., Zhang, Y., Li J., Wang, H., Ye, Z., 2011. Simulatio of hot stamping and phase transition of automotive high strength steel. Materials Research Innovations 15, 426

3.        Lu G, Yu T. Energy absorption of structures and materials. Cambridge: Woodhead Publishing; 2003.

4.        Nia AA, Hamedani JH. Comparative and deformations of thin walled tubes with various section geometries. Thin Wall Struct 2010

5.        Vesenjak M, Krstulovic ´-Opara L, Ren Z, Öchsner A, Domazet Z ˇ. Experimental study of open-cell cellular structures wit material. Exp Mech 2009; 49:501

6.        Belova IV, Veyhl C, Fiedler T, Murch GE. Analysis of anisotropic behaviour of thermal conductivity in cellular metals. Scripta Mater 2011; 65:436–9.

7.        DAUSINGER F. Beam-matter interaction in laser surface modification [C]// Proceedings of LAMP’92. 1992; 697

8.        WOO H G, CHO H S. Estimation of hardened flayer dimensions in laser hardening process with variations of coatings thickness [J]. Surface and Coating Technology, 1998, 102; 205

9.        BENDOGNI V, CANTELLO M, CERRU W, CRUCIANI D, FESTA R, MOR G, NENCI F. Laser and electron beam in surface hardening of turbine blades [C]// Proceedings of LAMP’87. 1987: 567

10.     READY J F. LIA handbook of laser material processing [M]. Laser Institute of America, 2001: 223-262.

11.     CHEN T L, GUAN Y H, WANG H G, ZHANG J T. A study on austenite transformation during laser heating [J]. Journal of Material Process Technology, 1997, 63: 546

12.     Standard Test Methods for Flexural properties of Unreinforced and Reinforced Plastics and Electrical Insulating materials; Designation: D 790-02.

13.     Marion Merklien, Wolfgang Böhm material properties of aluminum by local laser heat treatment. Physics Procedia 39 (2012) 232-239.

14.     S. K. Hajra Choudhury, A. K. HajraChoudhury, N. Roy, “Elements of Workshop Technology,” Volume – I, Media Promoters and Publishers Pvt. Ltd. 2001.

15.     G. E. Dieter, “Mechanical Metallurgy,” SI Metric Edition, McGraw Hill, Singapore, 1988.

16.     American Society for Metals. Committee on Induction Hardening,“Induction Hardening and Tempering,” Metals Park, Ohio, American Society for Metals, 1964.

17.     American Society for Metals. Committee on Induction Hardening, “Metals Handbook: Forging and Casting,” Metals Park, Ohio,American Society for Metals, 8th Edition, Volume 5,1977.

18.     S. Zinn, S. L. Semiatin, “Elements of Induction Heating: Design,Control, and application,” ASM International, 1988.

19.     K. Z. Shepelyakovskii, N.M. Fonshtein, V.P. Devyatkin, A. N. Mirza, B. K. Ushakov and B. O. Bernshtein, “Strength Characteristics of High-Carbon Steel with Controlled Hardenability After Bulk-Surface Hardening,” Volume 18, Number 5, New York , Metal Science and Heat Treatment, May, 1976, pp. 439-442.

20.     K. Z. Shepelyakovskii, “Heat Treatment of Steel with Induction Heating,” Volume 19, Number 10, New York, Metal Science and Heat Treatment, October, 1977, pp. 909-916.

42-49

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Geetanjali, Shashank Sahu

Paper Title:

Similarity of Articles using Hierarchical Clustering

Abstract:  RSS technology is to find similarity in the articles to provide better services to user. The research is going on to find out semantic similarity in articles to reduce same type of articles read by user. Objective of RSS is to deliver content which is latest and consist of most relevant information to the user. Here, the research focus is to find out the suitable distance method that can be use to check similarity in the articles. Hierarchical clustering is one of the best methods to cluster the articles which are similar on some parameter various methods are used in HC (hierarchical clustering). Which method is best suitable to find the semantic similarity, similarity is the focus area of this paper. We have collected various articles from many news channel websites for a category (terrorist) by observing the articles. Thirty keywords are selected for the implementation for the proposed technique and comparison. We perform similarity checking on various numbers of articles like 18, 16, 12, 10, 9, and 6.  After calculating the distance the cityblock distance method gives the best result. For this research work article from last one decade (2003-2013) has been selected.

Keywords:
 Really Simple Syndication (RSS), Hierarchical Clustering.


References:

1.        Den Ma, “Use of RSS feeds to push online content to users”, Published in Elsevier Journal of Decision Support Systems, Volume 54, Issue 1, December 2012, pp 740–749, doi: 10.1016/j.dss.2012.09.002.
2.        Just van den Broecke, “Pushlets” Published in IEEE Transactions of Web Technology, Vol. 22, no. 5, may 2011.

3.        Isabel delaTorre-Dıez, Saul Alvaro-Munoz, MiguelLo pez-Coronado, Joel Rodrigues, “Development and performance evaluation of a new RSS tool for a Web-based system: RSS_PROYECT”, Published in Elsevier Journal of Network and Computer Applications, Volume 36, Issue 1, January 2013, pp 255–261, doi:
10.1016/j.jnca.2012.06.004.

4.        Lijing Zhang, “Research on Web-based Real-time Monitoring System on    SVG and Comet”, Published in International Journal Vol.10, No.5, September 2012, pp 1142~1146, doi: 10.11591/telkomnika.v10i5.1347.

5.        Manfred Hauswirth and Mehdi Jazayeri, “A Component and Communication Model for Push Systems”, Published in International Journal of Web Engineering and Technology, September 6-10, 1999.

6.        Fekade Getahun Taddesse, Joe Tekli, Richard  Chbeir, Marco Viviani & Kokou Yetongnon, “Semantic-based Merging of RSS Items”,  Published   in Springer Journal of  World Wide Web March 2010, Volume 13, Issue 1-2, pp 169-207,  doi: 10.1007/s11280-009-0074-4.

7.        Fekade Getahun, Richard Chbeir, “RSS query algebra: Towards a better  news        management”,  Published  in   Elsevier  Journal  of   Information Sciences Volume 237, 10 July 2013, pp 313–342, doi: 10.1016/j.ins.2013.02.025.

8.        Wang Lei, Wang Tongsen & Yang Ronghua, “ Data Compression Algorithm based on Hierarchical Cluster Model for Sensor Networks”,  Published in International Conference of Future Generation Communication and Networking, 2008,  Volume:2, pp 319-323, doi: 10.1109/FGCN.2008.96.

9.        Markus M. Breunig, Hans-Peter Kriegel, Jörg Sander, “Fast Hierarchical Clustering Based on Compressed Data and OPTICS”, Published in Proc. 4th European Conf. on Principles and Practice of Knowledge Discovery in Databases (PKDD 2000), Lyon, France, Volume 1910, 2000, pp 232-242 doi: 10.1007/3-540-45372-5_23.

10.     I-Ching Hsu, “Personalized web feeds based on ontology technologies”, Published in Springer Journal of Information Systems Frontiers, July 2013, Volume 15, Issue 3, pp 465-479, doi:  10.1007/s10796-011-9337-6.

11.     Petros Belimpasakis  & Anne Saaranen, “Sharing with people: a system for user-centric content sharing”, Published in Springer Journal of Multimedia Systems, November 2010, Volume 16, Issue 6, pp 399-421, doi: 10.1007/s00530-010-0200-2.

12.     Wen Hu & Qing he Pan, “Data clustering and analyzing techniques using    hierarchical clustering method”, Published in Springer Multimed Tools Applications, July 2013, doi: 10.1007/s11042-013-1611-9.

13.     John Garofalakis, Vassilios Stefanis, “Using RSS feeds for effective mobile web browsing”, published in Springer Journal of  Universal Access in the Information Society, November 2007, Volume 6, Issue 3, pp 249-257, doi: 10.1007/s10209-007-0086-8.

14.     Chen Wu, Elizabeth Chang, “Aligning with the Web: an atom-based architecture for Web services discovery”, published in Springer Journal 24 May 2007, doi: 10.1007/s11761-007-0008-x.

15.     Saha, S, Sajjanhar, A., Shang Gao, Dew, R., Ying Zhao, "Delivering Categorized News Items Using RSS Feeds and Web Services", Published in International Conference of Computer and Information Technology (CIT), July 2010, pp 698-702, doi: 10.1109/CIT.2010.136.

16.     Preechaveerakul, L, Kaewnopparat, W, "A Novel Approach: Secure Information Notifying System Using RSS Technology ", Published in International Conference of Future Networks, March 2009, pp 95-99, doi: 10.1109/ICFN.2009.35.

17.     Segaran T, O’Brien MT (2007), “Programming Collective Intelligence, O’Reilly Media, Sebastopol”


50-54

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Vrushaly K. Shinglot, Monika R. Tiwari, Shardav U. Bhatt, Narendra J. Shrimali

Paper Title:

Application of Soft Computing Techniques to Predict Reservoir Water Level

Abstract:   In this work, the reservoir water level has been predicted using one of the soft computing techniques named Artificial Neural Network. The reservoir water level is influenced by many parameters. Among which the most influencing parameters have been considered here: amount of rainfall, temperature and evaporation. For this analysis, the reservoir made on Shetrunji River  Dam in Dhari, Amreli district, Gujarat, India has been chosen as it was overflown seven times in last ten years. This shows the importance of water level prediction at this particular reservoir. The Neural Network is trained using the past data collected and further used to predict water level for the unknown data. The approach of the multiple regression is also shown for its comparison with the Soft computing approach. Computations and experimental works were done by programming in software MATLAB. Such modeling is useful for planning and decision making of opening gates for reservoir operation particularly during monsoon and water scarcity.

Keywords:
   Soft Computing, Artificial Neural Network, Regression, Back Propagation Algorithm, Reservoir water level Prediction


References:

1.     . N. Gujarati, “Forecasting reservoir water level & release decision by Artificial Neural Network – A caseStudy of  Shetrunji reservoir”, Gujarat Technological University, M. E. Thesis, , 2012.
2.     S. Haykin, “Neural Networks and Learning Machines”, Third Edition, PHI Leaning Pvt. Ltd., 2012.
3.     J. M. Zurada, “Introduction to Artificial Neural Systems”, First Edition, Jaico Publishing House, 2004
4.     D. E. Rumelhart, J. L. McClelland, The PDP Research Group, “Parallel Distributed Processing: explorations in the microstructure of cognition”, vol. 1, MIT Press,1986.

5.     G. Cybenko, “Approximation by superpositions of a sigmoidal function”, Mathematics of Control, Signals and Systems 2, 1989.

6.     M. H. Beale, M. T. Hagan, H. B. Demuth,“Neural Network Toolbox: Users Guide”,TheMathworks Inc., 2015.


55-59

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Bhagyashri Sarda, Bhagyashri Kapre

Paper Title:

Contemporary Approach for Graphical Password using CAPTCHA

Abstract:    Cyber security is an important issue to implement. Different types of user authentication methods are used to achieve this goal. It helps to avoid misuse or illegal use of highly sensitive and confidential data. Text and graphical passwords are mainly used for authentication functioning. But due to various pitfalls, they are erroneous for data security. Text passwords are un assured for reasons and graphical are tight secured in comparison but are sensitive to shoulder surfing attacks. Hence by using graphical password system and CAPTCHA technology a new security primitive is proposed. We call it as CAPTCHA as gRaphical Password (CaRP). CaRP is a combination of both a CAPTCHA and a graphical password scheme. In this paper we conduct a encyclopedic analysis of existing CaRP techniques namely ClickText, ClickAnimal and AnimalGrid. We discuss the advantages and disadvantages of each method and point out research direction in this area. We also try to answer “Are CaRP as secured as graphical passwords and text based passwords?” and “Is CaRP protective to relay attack?

Keywords:
    Captcha, CaRP, dictionary attack, password, graphical password. 


References:

1.        Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, and Ning Xu, “CAPTCHA as Graphical Passwords—A New Security Primitive Based on Hard AI Problems”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 6, JUNE 2014.
2.        R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Comput. Surveys, vol. 44, no. 4, 2012.HP Tipping Point

3.        HP TippingPoint DVLabs, Vienna, Austria. (2010). Top Cyber Security Risks Report, SANS Institute and Qualys Research Labs [Online].

4.        B. Pinkas and T. Sander, “Securing passwords against dictionary attacks,” in Proc. ACM CCS, 2002, pp. 161–170.

5.        P. C. van Oorschot and S. Stubblebine, “On countering online dictionary attacks with login histories and humans-in-the-loop,” ACM Trans. Inf. Syst. Security, vol. 9, no. 3, pp. 235–258, 2006.

6.        M. Alsaleh, M. Mannan, and P. C. van Oorschot, “Revisiting defenses against large-scale online password guessing attacks,” IEEE Trans. Dependable Secure Comput., vol. 9, no. 1, pp. 128–141, Jan./Feb. 2012.  

7.        L. von Ahn, M. Blum, N. J. Hopper, and J. Langford, “CAPTCHA: Using hard AI problems for security,” in Proc. Eurocrypt, 2003, pp.
294–311.  
8.        K. Chellapilla, K. Larson, P. Simard, and M. Czerwinski, “Building segmentation based human-friendly human interaction proofs,” in Proc. 2nd Int. Workshop Human Interaction Proofs, 2005, pp. 1–10.

9.        R. Lin, S.-Y. Huang, G. B. Bell, and Y.-K. Lee, “A new CAPTCHA interface design for mobile devices,” in Proc. 12th Austral. User Inter. Conf., 2011, pp. 3–8.

10.     M. Motoyama, K. Levchenko, C. Kanich, D. McCoy, G. M. Voelker, and S. Savage, “Re: CAPTCHAs—Understanding CAPTCHA-Solving Services in an Economic Context,” in Proc. USENIX Security, 2010, pp. 435–452.

11.     S. Kim, X. Cao, H. Zhang, and D. Tan, “Enabling concurrent dual views on common LCD screens,” in Proc. ACM Annu. Conf. Human Factors Comput. Syst., 2012, pp. 2175–2184.  

60-63

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Hamdy Mohamed Soliman, S.M.EL. Hakim

Paper Title:

Modified PI Controller to Improve the Performance Characteristics of the PMSM

Abstract:    Classical vector control for the permanent magnet synchronous motor (PMSM) is depending upon the mathematical model and hence any problem in the machine parameters or AC drives will deteriorate the performance of the drive system over all.  So this paper suggested using four PI current controllers to improve the performance characteristics of the drive system. Three of them is used in the bang-bang control of inverter by rate of one for each phase and the other PI current controller is used to improving the q-  axis current component at sudden applies or removes the load. this reflects the performance over all and improve it. The MATLAB Simulink is used to simulating the drive system. The proposed model of the vector control is compared to classical vector control to show the improvement occurs in the performance characteristics of the system with proposal method. The proposed cases are simulated through the MATLAB program and are operated in the laboratory. The laboratory results agreed with the simulating results that have been obtained

Keywords:
 Bang-bang inverter control, PI control, PMSM, vector control.


References:

1.     Goed, I. da Silva and P. Jose, A. Serni, “A hybrid controller for the speed control of a permanent magnet synchronous motor drive,” Control Engineering Practice, Vol. 16, Issue 3, pp. 260-270, March, 2008.
2.     C. Mademlis and N. Margaris, "Loss minimization in vector-controlled interior permanent-magnet synchronous motor drives", Industrial Electronics, IEEE Transactions on, vol. 49, pp. 1344-1347, 2002.

3.     Jian-Xin, S. K. Panda, P. Ya-Jun, L. Tong Heng, and b. H. Lam, "a modular control scheme for pmsm speed control with pulsating torque minimization", Industrial Electronics, IEEE Transactions on, vol. 51, pp. 526-536, 2004.

4.     Jinggang zhang, Zhiyuan Liu and Run Pei, “Two-Degree-of-Freedom internal model control for AC servo system (Periodical style),” Transactions of China Electrotechnical Society, vol. 17, no. 4, pp. 45-48, 2002.

5.     Shengxian Zhuang, Xuening Li and Zhaoji Li, “ The application in the speed regulating of asynchronous machine vector frequency changing based on adaptive internal model control (Periodical style),” Journal of University of Electronic Science and Technology of China, vol. 28,no.5, pp.502-504, 1999.

6.     P. L. Jansen and R. D. Lorentz, "Transducerless position and velocity estimation in induction and salient AC machines", IEEE Trans. Ind. Applicat., vol. 31, pp. 240–247, Mar./Apr. 1995.

7.     P. L. Jansen, R. D. Lorenz, and D. W. Novotny, "Observer-based direct field orientation: Analysis and comparison of alternative methods",” IEEE Trans. Ind. Applicat., vol. 30, pp. 945–953, July/Aug. 1994.

8.     M. P. Kazmierkowski, and L. Malesani, "Current control techniques for three-phase voltage-source PWM converters: a survey", IEEE Trans. Ind. Electron., vol. 45, no. 5, October, 1998, pp. 691-703.

9.     B. k. Bose, "An adaptive hysteresis-band current control technique of a voltage - fed PWM inverter for machine drive system", IEEE Trans., on Ind. Appl., Vol.IA-37,
pp.402-408, 1990

10.  Hamdy Mohamed soliman and S. M. EL. Hakim," Improved Hysteresis Current Controller to Drive Permanent Magnet Synchronous Motors Through the Field Oriented Control", International Journal of Soft Computing and Engineering , Vol. 2, No. 4, September 2012, pp. 40-46.

64-72

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html