<?xml version='1.0' encoding='UTF-8'?><rss version='2.0'><channel><title>Volume 3 Number 12 (December 2016)</title>
		<link>http://ijaers.com/</link>
		<description>Open Access international Journal to publish research paper</description>
		<language>en-us</language>
		<date>December 2016</date><item>
		<title>A Communication System Architecture Based on Sharing Information to Integrate Components of Distributed Multi-Agent Systems within an IT GRC Platform</title>
		<description>To build complete and complex distributed platform, researchers are used to applying standards that facilitate sharing information as well as distributed service-oriented architectures that provide reuse and interoperability by means of component integration. These concepts lead us to a communication system that will allow us to implement tools that give full support to the management of IT GRC processes, taking advantage of the synergy effect created by the integration of the different components. Thus, throughout this article we analyze the proposals from the most relevant consortia concerned with communication system standards. This analysis will demonstrate that the use of standardized middleware technologies can limit the reuse and interoperability. Then, we will show a proposal which tries to solve this shortfall, using a blackboard-based architecture for integrating and communicating heterogeneous distributed components within an IT GRC platform.</description>
		<link>http://ijaers.com/detail/a-communication-system-architecture-based-on-sharing-information-to-integrate-components-of-distributed-multi-agent-systems-within-an-it-grc-platform-2/</link>
		<author>S. Elhasnaoui, L. Moussaid, H. Medromi, A. Sayouti</author>
		<pdflink>http://ijaers.com/uploads/issue_files/1 IJAERS-NOV-2016-17-A Communication System Architecture Based on Sharing Information to Integrate Components of Distributed Multi-Agent Systems within an IT GRC Platform.pdf</pdflink>
                
		</item><item>
		<title>GIS based Traffic Accident Analysis System</title>
		<description>In Malaysia, every year over thousands human beings die and tens of thousands are injured in road accidents. This paper focused on the goal of developing tools and methodologies to reduce accidents, and to make roadway safer, through the ability to better interpret accident records and to provide more information for individuals to evaluate accidents. It founds that the customization of GIS application for Traffic accidents analysis could be performed using Map Object and visual basic 6.0. This integration produced expert system provides wide range functions in low cost programming.</description>
		<link>http://ijaers.com/detail/gis-based-traffic-accident-analysis-system-2/</link>
		<author>Ranya Fadlalla Abdalla Elsheikh</author>
		<pdflink>http://ijaers.com/uploads/issue_files/2 IJAERS-NOV-2016-53-GIS based Traffic Accident Analysis System.pdf</pdflink>
                
		</item><item>
		<title>Rapid Prototyping Assistance to Medical Science</title>
		<description>This article focuses on overview of Rapid prototyping application in Medical Science. Study covers briefing about rapid prototyping along with the medical model preparation and various techniques used in Rapid prototyping. This article covers medical application of rapid prototyping in field of prosthetics and implantation, simulating and planning surgery, tissue engineering, developing medical devices and instrumentation, anthropology, forensic and medical teaching aids. The findings of article are based on case studies and article beneficial to application engineers and medical practitioners.</description>
		<link>http://ijaers.com/detail/rapid-prototyping-assistance-to-medical-science-2/</link>
		<author>Sidharth Kasturi, Amol Nayakappa Patil, Parashuram Nandi, Nagaraj Raikar</author>
		<pdflink>http://ijaers.com/uploads/issue_files/3 IJAERS-DEC-2016-3-Rapid Prototyping Assistance to Medical Science.pdf</pdflink>
                
		</item><item>
		<title>A Modified Method for Tuning PID Controller for Buck-Boost Converter</title>
		<description>This paper presents a design and simulation of simplified method for designing a proportional &amp;ndash; integral&amp;ndash;derivative(PID)controller operating in continuous conduction mode for the Buck-Boost converter ,this method provides good voltage regulation and is suitable for Buck-Boost Dc-Dc converter, it is exposed to significant variations which may take this system away from nominal conditions caused by the line change and parameters variation at the input .Simulation results shows that this PID controller provides good voltage regulation and is suitable for the Buck-Boost purposes. The obtained results prove the robustness of proposed Controller against variation of the input voltage ,load resistance and the referent voltage of the studied converter.</description>
		<link>http://ijaers.com/detail/a-modified-method-for-tuning-pid-controller-for-buck-boost-converter-2/</link>
		<author>Muhanad D. Almawlawe, Marko Kovandzic</author>
		<pdflink>http://ijaers.com/uploads/issue_files/4 IJAERS-NOV-2016-7-A Modified Method for Tuning PID Controller for Buck-Boost Converter.pdf</pdflink>
                
		</item><item>
		<title>Attribute-Based Data Access Policy & Key Escrowing Problem: A Review Paper</title>
		<description>Cloud storage is the best &amp;amp; efficient way to handle our data remotely. However, since data owners and users are usually outside the trusted domain of cloud service providers the data security and access control is the important factor at the time of sensitive data stored in the cloud. Moreover, now days there are different mechanisms are available for data sharing &amp;amp; preserving privacy of data owner &amp;amp; user. Key Escrow is the one of the major issue now a day. We can&amp;rsquo;t keep full trust over the key authority center because they may be misuse there privileges. This is unsuitable for information sharing situations. In this paper we studied the existing technique for sharing the data from data owner to data user.</description>
		<link>http://ijaers.com/detail/attribute-based-data-access-policy-key-escrowing-problem-a-review-paper-2/</link>
		<author>Mr. Sourabha Vijaykumar Pashte, Prof.Mr. Chetan J. Awati</author>
		<pdflink>http://ijaers.com/uploads/issue_files/5 IJAERS-NOV-2016-57-Attribute-Based Data Access Policy & Key Escrowing Problem_ A Review Paper.pdf</pdflink>
                
		</item><item>
		<title>A Review Paper on Data Hiding in Encrypted Image by Reversible Image Transformation</title>
		<description>Presently, a new reversible image transformation technique is proposed, this technique not only enhances the quality of the encrypted image but also it can restore the secret image in lossless manner. Furthermore, is delegate data to the cloud. Therefore, the cloud can easily add additional data into the encrypted image by any RDH methods. It is very crucial to secure data and allow the cloud server to manage the data at the meantime. Under such demands, proposes a method of Reversible Data Hiding in Encrypted Image based on Reversible Image Transformation. Other from all existing encryption methods, RIT based method allow user to transmute the data of original image into another target image with the same size. Which secure the original image, the transmuted image which appears like the target image which is used as the encrypted image, and the transmutation can be done between the micro blocks with small size, which enhance the quality of the encrypted image.</description>
		<link>http://ijaers.com/detail/a-review-paper-on-data-hiding-in-encrypted-image-by-reversible-image-transformation-2/</link>
		<author>Mr. Abhijeet Tanaji Khot, Mr. Chetan J. Awati</author>
		<pdflink>http://ijaers.com/uploads/issue_files/6 IJAERS-NOV-2016-56-A Review Paper on Data Hiding in Encrypted Image by Reversible Image Transformation.pdf</pdflink>
                
		</item><item>
		<title>Sierpienski fractal Slotted Hexagonal Microstrip Patch Antenna Using transmission feeding technique</title>
		<description>There are various types of microstrip antenna that can be used for number of applications in wireless communication. In this paper, the design of Sierpienski fractal Slotted Hexagonal Microstrip Patch Antenna with FR4 glass epoxy substrate having dielectric constant, Er of 4.4, and thickness 1.6mm has been presented. It is instigated using stripline feeding. These antennas are compact, conformal to both the surfaces- planar&amp;amp; non-planar, simple, inexpensive, rugged, compatible with MMIC designs. Microstrip antenna is made up of a very thin metallic strip (patch) i.e, placed over a small fraction of a wavelength above a ground plane. The simulated results indicate that the antenna is suitable for RADAR (all types), GPS carriers, WLANs, Wimax, Satellite communication, navigation. The design is simulated using IE3D software and result is obtained in terms of smith chart, VSWR, return loss.</description>
		<link>http://ijaers.com/detail/sierpienski-fractal-slotted-hexagonal-microstrip-patch-antenna-using-transmission-feeding-technique-2/</link>
		<author>Meenu Chaudhary, Ira Joshi</author>
		<pdflink>http://ijaers.com/uploads/issue_files/7 IJAERS-NOV-2016-50-Sierpienski fractal Slotted Hexagonal Microstrip Patch Antenna Using transmission feeding technique.pdf</pdflink>
                
		</item><item>
		<title>Syphilis- The Great Imitator</title>
		<description>Syphilis is an infectious disease with Treponema Pallidum being its causative agent. When not treated it can pass through 4 stages: primary, secondary, latent and tertiary. Syphilis has a broad spectrum of skin and mucosal manifestations and can imitate many other skin disease, hence the name &amp;ldquo;The great Imitator&amp;rdquo;. The number of patients infected with syphilis has declined dramatically after penicillin invention. Albania has not had a significant number of cases but eruptions has been seen time after time. Herein, we describe 5 cases of suspected syphilis presented at our clinic.</description>
		<link>http://ijaers.com/detail/syphilis-the-great-imitator-2/</link>
		<author>Etleva Jorgaqi, Ermira Vasili, Entela Shkodrani</author>
		<pdflink>http://ijaers.com/uploads/issue_files/8 IJAERS-NOV-2016-31-Syphilis- The Great Imitator.pdf</pdflink>
                
		</item><item>
		<title>Modeling of a Torch and Calculations of Heat Transfer in Furnaces, Fire Boxes, Combustion Chambers. Part I. Calculations of Radiation from Solids and Gas Volumes by the Laws of Radiation from Solid Bodies</title>
		<description>Through the 20th century scientists, researches made many attempts to solve important complex scientific problem. The solution to the problem was to derive analytical expressions, formulas for calculating heat radiation from gas volumes, torches on heating surfaces. However, the formulas were not derived in the 20 th century. At the beginning of the 21st century the author of this article disclosed the laws for heat radiation from cylinder gas volumes. On the basis of the scientific disclosure the problem was solved, analytical equations for calculating heat transfer in torch furnaces, steam boiler boxes, combustion chambers of gas-turbine installations were obtained. To assess the scientific disclosure and its present and future roles, the analysis of methods for calculating heat transfer in furnaces, fire boxes, combustion chambers was performed.</description>
		<link>http://ijaers.com/detail/modeling-of-a-torch-and-calculations-of-heat-transfer-in-furnaces-fire-boxes-combustion-chambers-part-i-calculations-of-radiation-from-solids-and-gas-volumes-by-the-laws-of-radiation-from-solid-bodies-2/</link>
		<author>Prof. Dr. A. N. Makarov </author>
		<pdflink>http://ijaers.com/uploads/issue_files/9 IJAERS-NOV-2016-45-Modeling of a Torch and Calculations of Heat Transfer in Furnaces, Fire Boxes, Combustion Chambers.pdf</pdflink>
                
		</item><item>
		<title>Modeling of a Torch and Calculations of Heat Transfer in Furnaces, Fire Boxes, Combustion Chambers Part II. Calculations of Radiation from Gas Volumes by the Laws of Radiation from Cylinder Gas Volumes</title>
		<description>On the basis of scientific discovery the major scientific problem is solved, analytical expressions, formulas for calculation heat radiation from gas volumes, torches on the heating surfaces are obtained. The example of calculation of radiation fluxes from torch on the heating surface is given. Scientific discovery allows designers from many countries worldwide to create new and improved the operating torch heating furnaces, steam boiler boxes, combustion chambers of gas-turbine installations of power stations.</description>
		<link>http://ijaers.com/detail/modeling-of-a-torch-and-calculations-of-heat-transfer-in-furnaces-fire-boxes-combustion-chambers-part-ii-calculations-of-radiation-from-gas-volumes-by-the-laws-of-radiation-from-cylinder-gas-volumes-2/</link>
		<author>Prof. Dr. A. N. Makarov </author>
		<pdflink>http://ijaers.com/uploads/issue_files/10 IJAERS-NOV-2016-46-Modeling of a Torch and Calculations of Heat Transfer in Furnaces, Fire Boxes, Combustion Chambers.pdf</pdflink>
                
		</item><item>
		<title>A Review on Multilevel wrApper Verification System with maintenance Model Enhancement</title>
		<description>The online data sources have prompted to an expanded utilization of wrappers for extract data from Web sources. We present a unique idea, to explain the expressed problems and formally demonstrate its accuracy. Conventional research techniques have concentrated on snappy and effective era of wrappers; the advancement of devices for wrapper support has gotten less consideration and no arrangement to self upkeep. This empowers us to learn wrappers in a totally unsupervised way from consequently and inexpensively preparing information, e.g., utilizing word references and standard expressions. This turns into a research issue since Web sources frequently change progressively in ways that keep the wrappers from removing data accurately. We will probably help programming engineers develop wrapping operators that translate questions written in abnormal state organized language. Work introduces a proficient idea for auxiliary data about information from positive cases alone. Framework utilizes this data for wrapper upkeep applications: utilizing wrapper check and enlistment component planning a support show. The wrapper verification framework identifies when a wrapper is not extricating right information, for the most part on the grounds that the Web source has changed its organization. Sites are constantly advancing, upgrading and basic changes happen with no cautioning, which for the most part results in wrappers working mistakenly. Tragically, wrappers may flop in the undertaking of separating information from a Web page, if its structure changes, once in a while even marginally, in this way requiring the abusing of new procedures to be naturally held to adjust the wrapper to the new structure of the page, in the event of disappointment.</description>
		<link>http://ijaers.com/detail/a-review-on-multilevel-wrapper-verification-system-with-maintenance-model-enhancement-2/</link>
		<author>Mr. Nigonda M. Patil, Mr. H. P. Khandagale</author>
		<pdflink>http://ijaers.com/uploads/issue_files/11 IJAERS-DEC-2016-1-A Review on Multilevel wrApper Verification System with maintenance Model Enhancement.pdf</pdflink>
                
		</item><item>
		<title>Study on Forward Chaining and Reverse Chaining in Expert System</title>
		<description>Expert systems are part of a general category of computer applications known as intelligence. Expert system are designed to solve complex problems. Expert Systems is a branch of AI designed to work within a particular domain. To solve expert-level problems, expert systems will need efficient access to a substantial domain knowledge base, and a reasoning mechanism to apply the knowledge to the problems they are given. Usually they will also need to be able to explain, to the users who rely on them, how they have reached their decisions. As an expert is a person who can solve a problem with the domain knowledge. This research paper introduces introduction, parts, application of expert system. and difference between forward chaining and Backward chaining and Exactly meaning of Chaining. ETL tools uses functionality to extract, transform and load data from one system into another system, but our expert advises they&#039;re not optimal for application-to-application communication. In artificial intelligence, an expert system is a computer system that emulates the decision-making ability of a human expert. The AI technology has become really advanced and its only matter of time when the machines will be able to learn almost anything. The machine learning algorithms are already very smart, however the Processing power has been a challenge in last decade .Now with the big data and distributed computing revolution this problem has become easy to solve. Many programmers and developers can start programming their own robots and other gadgets on their own. Artificial intelligence is a science and technology based on disciplines such as Computer Science, Biology, Psychology, Linguistics, Mathematics, and Engineering. A major thrust of AI is in the development of computer functions associated with human intelligence, such as reasoning, learning, and problem solving.</description>
		<link>http://ijaers.com/detail/study-on-forward-chaining-and-reverse-chaining-in-expert-system-2/</link>
		<author>Ashwini  Rupnawar, Ashwini  Jagdale ,Samiksha  Navsupe</author>
		<pdflink>http://ijaers.com/uploads/issue_files/12 IJAERS-DEC-2016-4-Study on Forward Chaining and Reverse Chaining in Expert System.pdf</pdflink>
                
		</item><item>
		<title>Significance of  Software Testing Methods - Case Driven</title>
		<description>Software Testing is a process of any software development which is used to measure the quality of developed software final product. It finds all errors, bugs and flaws in the developed software final product. In this paper we present software testing techniques for detecting the errors which are described by static testing and dynamic testing.</description>
		<link>http://ijaers.com/detail/significance-of-software-testing-methods-case-driven-2/</link>
		<author>Dr. B V Ramana Murthy, Dr. V Padmakar</author>
		<pdflink>http://ijaers.com/uploads/issue_files/13 IJAERS-DEC-2016-2-Significance of  Software Testing Methods - Case Driven.pdf</pdflink>
                
		</item><item>
		<title>A Review on Aluminium Shot Making Machine and its Application</title>
		<description>This paper represents a overview of aluminium shot and aluminium shot making process. It contains a review of development of aluminium shot making machine. This includes a description of the operational principal and performance characteristics of aluminium shot machine and the application of aluminium shot. The design explain below has minimum cost and less space required.</description>
		<link>http://ijaers.com/detail/a-review-on-aluminium-shot-making-machine-and-its-application-2/</link>
		<author> Aditya. R. Zure, Prof. S. N. Hublikar</author>
		<pdflink>http://ijaers.com/uploads/issue_files/14 IJAERS-NOV-2016-48-A Review on Aluminium Shot Making Machine and its Application.pdf</pdflink>
                
		</item><item>
		<title>Investigation of Bending Behaviour of Polymer Matrix Composite with Jute Fibers as Reinforcement</title>
		<description>The polymer matrix composites with natural fibers have been in use with various industries such as automotive, aerospace, construction and others for different applications. In pursuit to gaining popularity, a natural fiber reinforced polymer composite (NFRPC) with polyester as matrix and jute fabric as a reinforcement along with alumina as particulate material has been synthesized to investigate its mechanical properties. In the present study, the bending behaviour of the composite material has been investigated to know the effectiveness under different load conditions. The study evaluates the effectiveness of natural fiber materials as reinforcement, as they are available in abundant, biodegradable and cost effective. The specimens are prepared using three laminates of size 310 x 310 x 4 mm, produced by hand layup process. Three specific compositions A, B and C with 18%, 22% and 26% by weight of jute fabric along with 8% of alumina and rest of the weight fraction constituted of polyester resin respectively were used to prepare the laminates. The water jet cutting process was employed to cut the specimens as per the ASTM standard dimensions from the laminates. There were 3 specimens for each of the compositions prepared. The specimens were subjected to mechanical characterization tests of tension and compression using Universal Testing Machine (UTM). The specimens exhibited reduced bending strength as the increase in weight percentage of jute fabric and thus denotes good bending strength at 18% and drastic reduction at 24% and 26% of jute fabric reinforcements.</description>
		<link>http://ijaers.com/detail/investigation-of-bending-behaviour-of-polymer-matrix-composite-with-jute-fibers-as-reinforcement-2/</link>
		<author>Dr. Chandrashekhar Bendigeri, Jwalesh H.N.</author>
		<pdflink>http://ijaers.com/uploads/issue_files/15 IJAERS-DEC-2016-9-Investigation of Bending Behaviour of Polymer Matrix Composite with Jute Fibers as Reinforcement.pdf</pdflink>
                
		</item><item>
		<title>Design of Low Power and Area Efficient Carry Select Adder (CSLA) using Verilog Language</title>
		<description>Carry select method has deemed to be a good compromise between cost and performance in carry propagation adder design. However conventional carry select adder (CSLA) is still area consuming due to the dual ripple carry adder structure. The excessive area overhead makes conventional carry select adder (CSLA) relatively unattractive but this has been the circumvented by the use of add-one circuit. In this an area efficient modified CSLA scheme based on a new first zero detection logic is proposed. The gate count in 32-bit modified CSLA can be greatly reduced, design proposed in this paper has been developed using VERILOG language and synthesized in XILINX13.2 version.</description>
		<link>http://ijaers.com/detail/design-of-low-power-and-area-efficient-carry-select-adder-csla-using-verilog-language-2/</link>
		<author>Guguloth Sreekanth, Kethavath Jail Singh, Neelapala Sai Sruthi</author>
		<pdflink>http://ijaers.com/uploads/issue_files/16 IJAERS-DEC-2016-13-Design of Low Power and Area Efficient Carry Select Adder (CSLA) using Verilog Language.pdf</pdflink>
                
		</item><item>
		<title>Solar Air Heater Performance enhancement using Perforated Plates: An Experimental Study</title>
		<description>In present study solar air heater duct performance is enhanced using perforated plate structure in it. In this study, simple rectangular array design is investigated experimentally and compared with simple solar air heater duct. Design is installed in two parallel installation combinations. Experimental setup has been fabricated to investigate the effects. Effect on Heat transfer has been investigated for 4 different mass flow rates. Arrangement has been tested for Mass Flow Rates of 0.05, 0.065, 0.08 and 0.095(all in kg/s) It was found that due to Presence of Perforated Plates, heat transfer enhanced up to 3.3 times in comparison to smooth ducts.</description>
		<link>http://ijaers.com/detail/solar-air-heater-performance-enhancement-using-perforated-plates-an-experimental-study-2/</link>
		<author>Abhishek Raj, Jitendra Kumar, Harimohan Sharma</author>
		<pdflink>http://ijaers.com/uploads/issue_files/17 IJAERS-DEC-2016-15-Solar Air Heater Performance enhancement using Perforated Plates_ An Experimental Study.pdf</pdflink>
                
		</item><item>
		<title>Enhancement of Heat Transfer in Shell and Tube Heat Exchanger using Different Porous Medium: A CFD-based Study</title>
		<description>The present study is to investigate the heat transfer enhancement in a cylindrical heat exchanger using porous media. The heat exchanger is modelled by a cylindrical cavity (Shell) with inlet and outlet thermally insulated ports and five tubes which contain hot water and cold water flows in shell. The effect of porosity on heat transfer enhancement is studied at different mass flow rate 0.15, 0.2, 0.25 and 0.30 Kg/sec. The study about effect of porosity on heat transfer enhancement is done by both experimentally and CFD based and the results are compared with simple heat exchanger. In present study, two different types of porous materials are used and Porosity is taken as 80%. The effect of varying mass flow rate on outlet temperature, heat transfer coefficient, Reynolds number and Nusselt number has been investigated.</description>
		<link>http://ijaers.com/detail/enhancement-of-heat-transfer-in-shell-and-tube-heat-exchanger-using-different-porous-medium-a-cfd-based-study-2/</link>
		<author>Rajeev Lochan, Hari Mohan Sharma</author>
		<pdflink>http://ijaers.com/uploads/issue_files/18 IJAERS-DEC-2016-11-Enhancement of Heat Transfer in Shell and Tube Heat Exchanger using Different Porous Medium A CFD-based Study.pdf</pdflink>
                
		</item><item>
		<title>Behaviour of Pile Adjacent to Excavation in Layered Soil</title>
		<description>Construction of deep basement structure is common thing in urban cities, as land available for construction is limited. As this excavation carried out near the existing building, the major challenge is to minimize the damage to existing building or underground utilities. As pile foundation were used for high rise building, there is concern with lateral ground movement resulting from soil excavation, may adversely affect the nearby pile foundation. This paper aims at investigating the effect of excavation induced movements on the lateral deflection of pile situated near the excavation in multilayered soil.</description>
		<link>http://ijaers.com/detail/behaviour-of-pile-adjacent-to-excavation-in-layered-soil-2/</link>
		<author>Dr. A.I.Dhatrak, S.D.Kulkarni</author>
		<pdflink>http://ijaers.com/uploads/issue_files/19 IJAERS-DEC-2016-5-Behaviour of Pile Adjacent to Excavation in Layered Soil.pdf</pdflink>
                
		</item><item>
		<title>Pedagogical Scenarization for Virtual Environments for Training: Towards Genericity, Coherence and Adaptivity</title>
		<description>With the appearance of new computer technologies, having access to information, learning a language, a job, or a skill, etc, is become possible and easier at any time, and at any place. Virtual Environments for Training (VET) is one of those technologies. VETs are based on virtual reality technique to put learners in training situations that emulate real situations. VETs have proven to be advantageous to put learners into varied training situations to acquire knowledge and competencies, especially when these situations are very dangerous, unrealizable, or expensive in reality. To exploit an EVT&amp;rsquo;s potentials and control the behavior of it users, the trainer create a pedagogical scenario. A pedagogical scenario must let the possibility to the learner to build his own path, at the same time maintaining the coherence of learning. We present in this paper a new approach, which aims at adapting the pedagogical scenario to learner&amp;rsquo;s needs, and focuses on maintaining the learning coherence.</description>
		<link>http://ijaers.com/detail/pedagogical-scenarization-for-virtual-environments-for-training-towards-genericity-coherence-and-adaptivity-2/</link>
		<author>Mohamed Fahim, Abdeslam Jakimi, Lahcen El Bermi</author>
		<pdflink>http://ijaers.com/uploads/issue_files/20 IJAERS-DEC-2016-8-Pedagogical Scenarization for Virtual Environments for Training_ Towards Genericity, Coherence and Adaptivity.pdf</pdflink>
                
		</item><item>
		<title>An Improving Performance of Data Mining Using Intelligent Agent System Methods</title>
		<description>Our objective of this paper is how we can utilize intelligent techniques in data mining to take decisions which we can use very much in Data Analytics, Credit Card fraud detection and other applications. The author describes that we can develop intelligent software which combines intelligent techniques and data mining and provides solutions for business analysis. Nowadays, Intelligent Agents are widely used in Data Mining because of their flexibility, modularity and general applicability to a wide range of problems. Technological developments in distributed computing, robotics and the emergence of object-orientation have given rise to such technologies to model distributed problem solving. Techniques such as pattern recognition, machine learning, and neural networks have received much attention. Other techniques in Intelligent Agents such as knowledge acquisition, knowledge representation, and search, are relevant to the various process steps in DM. The aim of intelligence is to discover mechanisms of adaptation in a changing environment with utilisation of intelligence, for instance in the ability to exclude unlikely solutions. Intelligence methods have extensive application in different fields such as software, medicine, games and transportation. This paper deals with interdisciplinary issues &amp;ndash; interconnection of intelligence and data mining. The main goal of this paper is to point out the intelligence techniques that can be utilised in data mining application and to provide an overview of research undertaken in this field.</description>
		<link>http://ijaers.com/detail/an-improving-performance-of-data-mining-using-intelligent-agent-system-methods-2/</link>
		<author>Dr. M. Kumarasamy</author>
		<pdflink>http://ijaers.com/uploads/issue_files/21 IJAERS-DEC-2016-26-An Improving Performance of Data Mining Using Intelligent Agent System Methods.pdf</pdflink>
                
		</item><item>
		<title>Friction Stir Welding Of Magnesium Alloys - A Review</title>
		<description>The modern technologies are gaining more and more importance in almost every field and Manufacturing industry not an exception. More and more research has been going on related to welding techniques [1]. Friction stir welding is one of the latest welding techniques that have found a major part in automotive sector. Magnesium alloy one of the major raw material used in these industries due to its light weight, good thermal conductivity, excellent specific strength and stiffness, exceptional dimensional stability, high damping capacity, and high recycle ability [2]. Magnesium alloys can be divided into cast magnesium alloys and wrought magnesium ones in terms of difference in processing [3]. Main commercial magnesium alloys include the AZ series (Mg-Al-Zl), AM series (Mg-Al-Mn), AE series (Mg-Al-RE), EZ series (Mg-RE-Zn), ZK series (Mg-Zn&amp;mdash;Zr), and WE series (Mg-RE-Zr)[4]. It is thi property which entices automobile manufacturers to replace denser materials, not only steels, cast irons and copper base alloys but even aluminium alloys by magnesium based alloys. Statistically, more than 90% of the magnesium alloy structural components are produced by casting process, especially by various die-casting processes. .Magnesium has a density two-thirds that of aluminium and only slightly higher than of fibre-reinforced plastics and possesses excellent mechanical and physical properties. Compared to using alternative materials, using Mg alloys results in a 22% to 70% weight reduction. Recent developments in coating and alloying of Mg improved the creep and corrosion resistance properties of magnesium alloys for elevated temperatures and corrosive environments. The introduction of this paper gives a detailed review about Friction Stir Welding of Mg alloys. This review work may be a ready reference for subsequent researchers.</description>
		<link>http://ijaers.com/detail/friction-stir-welding-of-magnesium-alloys-a-review-2/</link>
		<author>Vuppula Prasanna, Dr. A. Seshu Kumar,Dr. P. Ramesh Babu</author>
		<pdflink>http://ijaers.com/uploads/issue_files/22 IJAERS-DEC-2016-14-Friction Stir Welding Of Magnesium Alloys -A Review.pdf</pdflink>
                
		</item><item>
		<title>Use of Waste Plastic in Concrete Mixture as Aggregate Replacement</title>
		<description>One of the environmental issues in most regions of Iran is the large number of bottles made from poly-ethylene terephthalate (PET) deposited in domestic wastes and landfills. Due to the high volume of these bottles, more than 1 million m3 landfill spaces are needed for disposal every year. The purpose of this experimental study was to investigate the possibility of using PET waste in asphalt concrete mixes as aggregate replacement (Plastiphalt) to reduce the environmental effects of PET disposal. Concrete is the most widely used man made construction material in the w and its second only to water as the most utilized substance in the planet. Seeking aggregates for concrete and to dispose of the waste from various commodities is the present concern. Today sustainability has got top priority in construction industry. In the present study the recycled plastics were used to prepare the coarse aggregates thereby providing a sustainable option to deal with the plastic waste There are many recycling plants across the world, but as plastics are recycled they lose their strength with the number of recycling. So these plastics will end up as earth fill. In this circumstance instead of recycling it repeatedly, if it is utilized to prepare aggregates for concrete, it will be a boon to the construction industry. Most of the failures in concrete structures occur due to the failure of concrete by crushing of aggregates. Plastic aggregate which have low crushing values will not be crushed as easily as the stone aggregates. These aggregates are also lighter in weight compared to stone aggregates. Since a complete substitution for Conventional Aggregate was not found feasible, a partial substitution with various percentage of plastic aggregate was done. Both volumetric and grade substitution was employed in this investigation.</description>
		<link>http://ijaers.com/detail/use-of-waste-plastic-in-concrete-mixture-as-aggregate-replacement-2/</link>
		<author>Patil Pramod Sambhaji</author>
		<pdflink>http://ijaers.com/uploads/issue_files/23 IJAERS-DEC-2016-20-Use of Waste Plastic in Concrete Mixture as Aggregate Replacement.pdf</pdflink>
                
		</item><item>
		<title>Synthesis, Spectroscopic characterization and invitro bacterial evaluation of  Ni(II) complexes of new tridentate aroylhydrazone ligands</title>
		<description>Nickel(II) complexes of four new aroylhydrazones,N-(2-hydroxy-1-naphthaldehyde)- N&#039; -(4-nitrobenzoyl)hydrazone(H2L1), N-(2-hydroxy-4-methoxybenzaldehyde)-N&#039;-(2-furoyl) hydrazone (H2L2), N-(2-hydroxyacetophenone)-N&#039; -(2-theonyl) hydrazone (H2L3) and N-(2-hydroxy-5-methylacetophenone)- N&#039; -(3-toloyl) hydrazone (H2L4) have been synthesized. The structure of these complexes has been investigated using elemental analysis, magnetic susceptibility, molar conductance, thermogravimetric analysis and spectral (IR, electronic, NMR) measurements. IR spectra indicates that the ligand behave as dibasic tridentate ligand and coordinate to Ni(II) ion through ketonic oxygen, azomethine nitrogen and phenolic oxygen atom (except in H2L1 by naphtholicoxygen atom) by double deprotonation.TG curve show decomposition of the complexes with NiO being the final decomposition productconfirmed by X-ray data. The magnetic and spectral data suggest the octahedral geometry for all the Ni (II) complexes. Antibacterial activity of the ligand and their Ni(II) complexeswere studied against both Gram-positive (staphylococcus aureus) and Gram-negative (Escherichia coli, Klebssiella pneumoniae) bacteria using minimum inhibitoryconcentrations (MICs) method.</description>
		<link>http://ijaers.com/detail/synthesis-spectroscopic-characterization-and-invitro-bacterial-evaluation-of-ni-ii-complexes-of-new-tridentate-aroylhydrazone-ligands-2/</link>
		<author>Pramod Kumar Singh, Kamalika  Banerjee, Sangeeta Singla</author>
		<pdflink>http://ijaers.com/uploads/issue_files/24 IJAERS-DEC-2016-17-Synthesis, Spectroscopic characterization and invitro bacterial evaluation of  Ni(II) complexes of new tridentate aroylhydrazone ligands.pdf</pdflink>
                
		</item><item>
		<title>Cloud Computing: Platform and Applications</title>
		<description>Cloud computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data and information rather than a local server or a personal computer. Cloud computing is a better way to run your business. Instead of running your apps yourself, they run on a shared data center. The actual term &quot;cloud&quot; borrows from telephony in that telecommunications companies, who until the 1990s primarily offered dedicated point-to-point data circuits, began offering &amp;ldquo;VIRTUAL PRIVATE NETWORK (VPN)&amp;rdquo; services with comparable quality of service but at a much lower cost. The cloud symbol was used to denote the demarcation point between that which was the responsibility of the provider from that of the user. Cloud computing extends this boundary to cover servers as well as the network infrastructure. Cost is claimed to be greatly reduced and capital expenditure is converted to operational expenditure. Device and location independence enable users to access systems using a web browser regardless of their location or what device they are using. It&amp;rsquo;s a new era Technology which is famous in Different areas like Business, Education, medical research etc. In this paper we are introducing some applications of cloud Computing such as email,virtual application access,e-learning,backup of online data,with the areas where we can implement these application., we are also focused on real time appliactios of cloud computing. In this paper we focused on different service models of cloud computing such as SAAS,PAAS,IAAS.In Infrastrure as services we have explained private,public, hybrid,distributed,community cloud.</description>
		<link>http://ijaers.com/detail/cloud-computing-platform-and-applications-2/</link>
		<author>Priti Jadhav, Poonam Lohangade, Sujata Jangam, Tejashri Chavan</author>
		<pdflink>http://ijaers.com/uploads/issue_files/25 IJAERS-DEC-2016-25-Cloud Computing_ Platform and Applications.pdf</pdflink>
                
		</item><item>
		<title>Review of Fixed Channel Assignment in Mobile Communication Systems</title>
		<description>The radio spectrum is limited. But there is a rapid advancement in mobile communication system. Therefore we should pay attention towards effective methods for proper management of existing radio spectrum. The number of channels available is not at all sufficient to meet the needs of the populated users. Thus the core point here is that we need to employ quite effective channel allocation schemes. In this paper, we have prearranged the comprehensive information about fixed channel allocation in cellular mobile network by reviewing some of the earlier studies. We have also given our opinions, comments as well as all possible advantages and disadvantages of all the reviewed articles.</description>
		<link>http://ijaers.com/detail/review-of-fixed-channel-assignment-in-mobile-communication-systems-2/</link>
		<author>Mohamed Abdelghader Morsi, Dr.Amin Babkir A.Alnabi, Dr.Ashraf Gasim Alsid, Khalid Qasem Mohamed Alborahy</author>
		<pdflink>http://ijaers.com/uploads/issue_files/26 IJAERS-NOV-2016-23-Review of Fixed Channel Assignment in Mobile Communication Systems.pdf</pdflink>
                
		</item><item>
		<title>Determination of Nearshore Sandbar Crest Depth Using Neural Network Approach</title>
		<description>For the coastal structure designs, nearshore sandbars are crucial since they are affected highly from various parameters like beach slope, the height and period of the wave and the properties of the material forming the bed. In this study, it was investigated the sediment movements in nearshore by using various bar crest depths and a physical model. Erosion profile output is used for determination of the bar crest depths. Linear and non-linear regression methods are used for obtaining the non-dimensional equations with the experimental data. These equations are then compared with the ones found in the literature. Transportation of on-off shore sediments is affected by bar crest depth which has been examined with the materials forming the beach by using various diameter of the medium as d50=0.25, 0.32, 0.45, 0.62 and 0.80 mm. In order to estimate nearshore sandbar crest depth, we have developed an approach by using neural network (ANN). For proposing the efficiency of the study, ANN and multi-nonlinear regression models are compared with each other.</description>
		<link>http://ijaers.com/detail/determination-of-nearshore-sandbar-crest-depth-using-neural-network-approach-2/</link>
		<author>Mustafa Demirci, Fatih Unes,  M.Sami Akoz</author>
		<pdflink>http://ijaers.com/uploads/issue_files/27 IJAERS-DEC-2016-21-Determination of Nearshore Sandbar Crest Depth Using Neural Network Approach.pdf</pdflink>
                
		</item><item>
		<title>Intelligent IT Governance Platform: Strategic level</title>
		<description>The objective of this work is the implementation of a new IT governance platform adaptable to any type of Information system architecture and any kind of business. The proposed platform is intelligent and independent to understand the business needs continuously changing, is distributed to involve all stakeholders and heterogeneous components, and scalable to accumulate the know-how of the company&#039;s IT Governance through a learning asset.</description>
		<link>http://ijaers.com/detail/intelligent-it-governance-platform-strategic-level-2/</link>
		<author>M. Chergui, A.Chakir, A. Sayouti, H. Medromi</author>
		<pdflink>http://ijaers.com/uploads/issue_files/28 IJAERS-DEC-2016-30-Intelligent IT Governance Platform_ Strategic level.pdf</pdflink>
                
		</item><item>
		<title>IOT future in Edge Computing</title>
		<description>With the advent of Internet of Things (IoT) and data convergence using rich cloud services, data computing has been pushed to new horizons. However, much of the data generated at the edge of the network leading to the requirement of high response time. A new computing paradigm, edge computing, processing the data at the edge of the network is the need of the time. In this paper, we discuss the IoT architecture, predominant application protocols, definition of edge computing and its research opportunities.</description>
		<link>http://ijaers.com/detail/iot-future-in-edge-computing-2/</link>
		<author>Vandana C.P, Dr. Ajeet A. Chikkamannur</author>
		<pdflink>http://ijaers.com/uploads/issue_files/29 IJAERS-DEC-2016-23-IOT future in Edge Computing.pdf</pdflink>
                
		</item><item>
		<title>A Unique Approach for Planar Parallel Robotic Arms</title>
		<description>In the design of mechanism, a decision must first be taken regarding the type of mechanism to be employed. The number of links and connections required to give the desired degree of freedom must then be determined. Finally, the required dimensions needed to bring about a particular motion must be deduced. In the present study the main focus is to select a mechanism for parallel robotic arms. However there are a number of mechanisms available which can be used as robot hands. In the selection of mechanism for robotic hands, rigidity and grasping power are the main important considerations. In the present paper, a unique numerical method is used to measure the parallelism between the object and the ground link. This can be used to compare the robotic hands for rigidity and grasp.</description>
		<link>http://ijaers.com/detail/a-unique-approach-for-planar-parallel-robotic-arms-2/</link>
		<author>Rajneesh Kumar Rai, Sunil Punjabi</author>
		<pdflink>http://ijaers.com/uploads/issue_files/30 IJAERS-DEC-2016-32-A Unique Approach for Planar Parallel Robotic Arms.pdf</pdflink>
                
		</item><item>
		<title>A  Study on Performance Testing Based on Web Application</title>
		<description>Performance testing can be done by speed of a computer, network, software program, device or web application. It can be used to measuring the response time, throughput and resource utilization of the server by the system functions. The number of users hitting the application will be large and the site might not behave as it does for a single user the user might experience various issues while it was concurrently used the user could be face the various issues like internal server error, timed out error, application crash and slowness of the application. For example : when there was a big sale announced for snapdeal. The number of users hitting the application on that particular day is huge 100% higher than the usual users. Performance testing was the solution that could have prevented them from this situation. If they had planned for a proactive performance testing with the anticipated load they could have avoided this failure on their big day sale.</description>
		<link>http://ijaers.com/detail/a-study-on-performance-testing-based-on-web-application-2/</link>
		<author>R. Priyanka, Dr. M. Kannan</author>
		<pdflink>http://ijaers.com/uploads/issue_files/31 IJAERS-DEC-2016-40-A  Study on Performance Testing Based on Web Application.pdf</pdflink>
                
		</item><item>
		<title>Vertical Handover for Heterogeneous Wireless Networks of Packet Loss Using NS-2</title>
		<description>In a heterogeneous wireless networks, the main challenge is continual connection among the different networks like Wi-Fi, WIMAX, WLAN, WPAN, Internet, Intranet etc. The main theme of this research is to observe the conditions based on which vertical handoff should be performed. Multi Attribute Decision Making (MADM) helps to select the best network from the available Visible Network (VTs) for sequential connection by the terminal of mobile. VHDS (Vertical Handover Decision Schemes) used two types, Trusted-Distributed Vertical Handover Decision Scheme (T-DVHD) and Distributed Handover Decision Scheme (DVHD). The Centralized Vertical Handover Decision Scheme is the advanced Scheme of DVHD and the T-DVHD is the extended work of DVHD. Here we individually evaluate the internet, intranet and Wi-Fi network performance before performing the handover process. The network performance is evaluated by the packet loss. MADM algorithms of SAW and TOPSIS where compared to reduce the processing, reduce the packet dropping ratio and also select the best network.</description>
		<link>http://ijaers.com/detail/vertical-handover-for-heterogeneous-wireless-networks-of-packet-loss-using-ns-2-2/</link>
		<author>S. Komathi, Dr. M. Kannan</author>
		<pdflink>http://ijaers.com/uploads/issue_files/32 IJAERS-DEC-2016-39-Vertical Handover for Heterogeneous Wireless Networks of Packet Loss Using NS-2.pdf</pdflink>
                
		</item><item>
		<title>Online Loss Minimization in Distribution System Incorporating SSSC with Particle Swarm Optimization</title>
		<description>The major power lost in power system is occurred in distribution system. Increase in power loss has bad economic effect due to the energy wasted. It harms the consumer due to the drop in voltage, in addition the increase in power loss lead to increase in gas emission from thermal generating plant, therefore many efforts are consumed for minimizing the power loss in power system. In this paper, the static synchronous series compensator (SSSC) is incorporated in radial distribution system with one of the efficient artificial intelligence known as particle swarm optimization (PSO) to find the best phase angle for the injected voltage in order to minimize the power loss. The PSO program is interfaced with the proposed power system and the information is exchanged every specified period. This gives the system optimization and monitored from time to time.</description>
		<link>http://ijaers.com/detail/online-loss-minimization-in-distribution-system-incorporating-sssc-with-particle-swarm-optimization-2/</link>
		<author>M.T. Alkhayyat, Dr. Sinan M. Bashi</author>
		<pdflink>http://ijaers.com/uploads/issue_files/33 IJAERS-OCT-2016-61-Online Loss Minimization in Distribution System Incorporating SSSC with Particle Swarm Optimization.pdf</pdflink>
                
		</item><item>
		<title>A Survey on the Project in title </title>
		<description>In this paper we present a survey of work that has been done in the project &amp;ldquo;Unsupervised Adaptive P300 BCI in the framework of chaotic theory and stochastic theory&amp;rdquo;we summarised the following papers, (Mohammed J Alhaddad &amp;amp; 2011), (Mohammed J. Alhaddad &amp;amp; Kamel M, 2012), (Mohammed J Alhaddad, Kamel, &amp;amp; Al-Otaibi, 2013), (Mohammed J Alhaddad, Kamel, &amp;amp; Bakheet, 2013), (Mohammed J Alhaddad, Kamel, &amp;amp; Al-Otaibi, 2014), (Mohammed J Alhaddad, Kamel, &amp;amp; Bakheet, 2014), (Mohammed J Alhaddad, Kamel, &amp;amp; Kadah, 2014), (Mohammed J Alhaddad, Kamel, Makary, Hargas, &amp;amp; Kadah, 2014), (Mohammed J Alhaddad, Mohammed, Kamel, &amp;amp; Hagras, 2015).We developed a new pre-processing method for denoising P300-based brain-computer interface data that allows better performance with lower number of channels and blocks. The new denoising technique is based on a modified version of the spectral subtraction denoising and works on each temporal signal channel independently thus offering seamless integration with existing pre-processing and allowing low channel counts to be used. We also developed a novel approach for brain-computer interface data that requires no prior training. The proposed approach is based on interval type-2 fuzzy logic based classifier which is able to handle the users&amp;rsquo; uncertainties to produce better prediction accuracies than other competing classifiers such as BLDA or RFLDA. In addition, the generated type-2 fuzzy classifier is learnt from data via genetic algorithms to produce a small number of rules with a rule length of only one antecedent to maximize the transparency and interpretability for the normal clinician. We also employ a feature selection system based on an ensemble neural networks recursive feature selection which is able to find the effective time instances within the effective sensors in relation to given P300 event. The basic principle of this new class of techniques is that the trial with true activation signal within each block has to be different from the rest of the trials within that block. Hence, a measure that is sensitive to this dissimilarity can be used to make a decision based on a single block without any prior training. The new methods were verified using various experiments which were performed on standard data sets and using real-data sets obtained from real subjects experiments performed in the BCI lab in King Abdulaziz University. The results were compared to the classification results of the same data using previous methods. Enhanced performance in different experiments as quantitatively assessed using classification block accuracy as well as bit rate estimates was confirmed. It will be shown that the produced type-2 fuzzy logic based classifier will learn simple rules which are easy to understand explaining the events in question. In addition, the produced type-2 fuzzy logic classifier will be able to give better accuracies when compared to BLDA or RFLDA on various human subjects on the standard and real-world data sets.</description>
		<link>http://ijaers.com/detail/a-survey-on-the-project-in-title-unsupervised-adaptive-p300-bci-in-the-framework-of-chaotic-theory-and-stochastic-theory/</link>
		<author>Mohammed J. Alhaddad</author>
		<pdflink>http://ijaers.com/uploads/issue_files/34 IJAERS-DEC-2016-49-A Survey on the Project in title Unsupervised Adaptive P300 BCI in the Framework of Chaotic Theory and Stochastic Theory.pdf</pdflink>
                
		</item><item>
		<title>Innovation of System Biological Approach in Computational Drug Discovery</title>
		<description>Computational methods like classification and network-based algorithms can be used to understand the mode of action and the efficacy of a given compound and to help elucidating the patho-physiology of a disease. In the pharmacological industry there has already been a shift from symptomatic oriented drugs that can relieve the symptoms but not the cause of the disease to pathology-based drugs whose targets are the genes and proteins involved in the etiology of the disease. Drugs targeting the affected pathway have thus the potential to become therapeutic. A network approach to drug design would examine the effect of drugs in the context of a network of relevant protein regulatory metabolic interactions resulting in the development of a drug that would hit multiple targets selected in such a way as to decrease network integrity and so completely disrupt the functioning of the network. The screening of a compound to quickly identify the proteins it interacts with gives us all the necessary tools to identify and repair the deregulated biological pathway causing the disease.</description>
		<link>http://ijaers.com/detail/innovation-of-system-biological-approach-in-computational-drug-discovery-2/</link>
		<author>Srinath Pandey, Ved Kumar Mishra, Swati Dwivedi, Shubhangi Dixit, Raghvendra Raman Mishra, Prashant Ankur Jain</author>
		<pdflink>http://ijaers.com/uploads/issue_files/35 IJAERS-DEC-2016-43-Innovation of System Biological Approach in Computational Drug Discovery.pdf</pdflink>
                
		</item><item>
		<title>An Evaluate of Pattern Identification Programs and Its Strategies</title>
		<description>At the moment existence, Pattern Recognition has turned into an essential idea from analyst perspective. It is utilized as a part of numerous applications like Speech acknowledgment, facade acknowledgment, Biometrics and numerous other moreover. This survey paper will clarify numerous applications and methodologies of the example acknowledgment. Primarily four sorts of methodologies measurable, layout, auxiliary and neural approach. Furthermore, promote factual approach order is likewise done.</description>
		<link>http://ijaers.com/detail/an-evaluate-of-pattern-identification-programs-and-its-strategies-2/</link>
		<author>K. Lakshminarasimha, P. Chandra Sekhar</author>
		<pdflink>http://ijaers.com/uploads/issue_files/36 IJAERS-DEC-2016-45-An Evaluate of Pattern Identification Programs and Its Strategies.pdf</pdflink>
                
		</item><item>
		<title>An Observational Study on Two Wheeler Buying Choice</title>
		<description>The end users in present day buying situation prefer to buy product or services which provide enduring benefits with add on services with affordable price. The growing number of brands and sub brands in every product or service category aim to address the requirement of end users and provide delighting outcome on their requirements. In this aspect, commutation is the form of essential service in the end users day to day consuming pattern which requires sophisticated travelling from one place to another place with convenient and comfortable journey. The travelling of every end user on their day to day practice may be personal and official. Based on the purpose and requirement either personal or official, end users demand speedy, timely and convenient journey. The changes in present day market situation, the introduction of add on feature in the product category and the role of technological advancement affect the buying decisions of the end users. The factors relevant to buying decision of two wheelers are continuously changes in terms of its influence and role. In order to study these aspects, data is collected from 192 respondents who prefer to buy their two wheeler in a particular company located in Kanchipuram through questionnaire and filter the important decision aspects; SPSS 20 was deployed and aims to identify the buying decision pattern among the end users through this study.</description>
		<link>http://ijaers.com/detail/an-observational-study-on-two-wheeler-buying-choice-2/</link>
		<author>Dr. M. Kannan, S. Suriyanarayanan</author>
		<pdflink>http://ijaers.com/uploads/issue_files/37 IJAERS-DEC-2016-44-An Observational Study on Two Wheeler Buying Choice.pdf</pdflink>
                
		</item><item>
		<title>Analysing the calibration curve of software Project work in Different stage Using Isotonic Regression Classifier</title>
		<description>In this research work focuses the Software estimation time has been an vital role everyone in software industry. Software effort and cost estimation plays an important role in software development, often determining the success or failure of contract negotiation and project execution based on the estimation plan. Predicting the success of software projects based upon information related to estimation task and actual task is deemed to be one of the vital activities in software engineering research. In this research work, isotonic regression classifier can be implemented for analyzing the estimation quality based on estimation value and actual value to achieve better result from the model based upon information related to Estimation task and actual task in IT project management.</description>
		<link>http://ijaers.com/detail/analysing-the-calibration-curve-of-software-project-work-in-different-stage-using-isotonic-regression-classifier-2/</link>
		<author>Dr. S.Veni, Aparna Srinivasan</author>
		<pdflink>http://ijaers.com/uploads/issue_files/38 IJAERS-DEC-2016-33-Analysing the calibration curve of software Project work in Different stage Using Isotonic Regression Classifier.pdf</pdflink>
                
		</item><item>
		<title>Conversion of Image processing data of pipeline analysis using Machine learning Algorithm </title>
		<description>In the field of image analysis and processing, the post section of having a data record plays a vital role. The research work carried out for analyzing a crack image in an oil pipeline titled &amp;ldquo;Image Analysis and processing using mathematical morphological operators and high frequency filter for pipeline crack measurement&amp;rdquo; had a difficult phase of saving the data for future study. To overcome this issue a technique to preserve the image data is handled with the concept of big data analysis. A pipeline scanned for quality maintenance sends numerous pictures, where the pixel data is converted to binary data and then these are calculated using the mathematical morphological operator based on erosion and corrosion of the images. These data are saved for further reference where the normal method of data saving using any hardware device was a big threat for loss of data and the cot to maintain the system is too high. To overcome this issue image data is been tried to save through the big data technique.</description>
		<link>http://ijaers.com/detail/conversion-of-image-processing-data-of-pipeline-analysis-using-machine-learning-algorithm-2/</link>
		<author>Dr. A. Prema Kirubakaran</author>
		<pdflink>http://ijaers.com/uploads/issue_files/39 IJAERS-DEC-2016-48-Conversion of Image processing data of pipeline analysis using Machine learning Algorithm.pdf</pdflink>
                
		</item><item>
		<title>Evapotranspiration Prediction Using M5T Data Mining Method</title>
		<description>Evapotranspiration (ET) estimation takes an important role in hydraulic designs and irrigation management. Even these imperative importance ET estimation methods are not clear and easily employable enough. This study focused on M5T data mining method to estimate ET due this method is in use for nonlinear physical cases. 1543 daily Solar Radiation (SR), Air Temperature (AT), Relative Humidity (RH) and Wind Speed (U) meteorological parameters are used to create a M5T model. 1153 daily data is used for training the model and 385 left data is used for testing model results. Data set is taken from St. Johns, Florida, USA weather station.The correlation coefficient (R) is calculated as 0.983 for the M5T. Model results are compared with Turc empirical formula and it is found that M5T data mining method has better performance than Turc empirical formula.</description>
		<link>http://ijaers.com/detail/evapotranspiration-prediction-using-m5t-data-mining-method-2/</link>
		<author>Yunus Ziya Kaya, Mustafa Mamak, Fatih Unes</author>
		<pdflink>http://ijaers.com/uploads/issue_files/40 IJAERS-DEC-2016-57-Evapotranspiration Prediction Using M5T Data Mining Method.pdf</pdflink>
                
		</item><item>
		<title>Privacy and Protection for Location Based Services</title>
		<description>An LBS (location based service) provides services such as finding the nearest location, favourite entertainment areas etc, to the users based on either their residing area or based on the input the give. The services provided by a location based service are typically based on a point of interest database. Therefore retrieval of the data from the database server takes place. The work proposed is a novel protocol for location based queries that has major performance improvements, which is performed based on two stages- firstly, the user determining his/her location privately and secondly, the server protecting its data from unauthorized users for which they have not paid. This protocol enables security for the user&amp;rsquo;s details as well as protects the server&amp;rsquo;s data. The user is protected because the server is unable to determine his/her location. In the same way, the server&amp;rsquo;s data is protected as a malicious user can only decrypt the part of data obtained to the user with the encryption key acquired in the previous phase, that is he/she cannot decrypt the remaining server data that they are not supposed to authorise. In other words, users can never get the data more than what they have paid for. A phase called oblivious transfer phase is present so as to ensure the privacy of the user and a phase called private information retrieval phase is carried out to protect server&amp;rsquo;s data.</description>
		<link>http://ijaers.com/detail/privacy-and-protection-for-location-based-services-2/</link>
		<author>Mrs. M. Lalitha, G. Sneha</author>
		<pdflink>http://ijaers.com/uploads/issue_files/41 IJAERS-DEC-2016-38-Privacy and Protection for Location Based Services.pdf</pdflink>
                
		</item><item>
		<title>Bond Graph Modeling and Control of Induction Motor used in Ladle Cranes</title>
		<description>Initially when power is supplied, induction motor runs at its rated speed with the recommended specifications and varying applications. Control of the motor&amp;rsquo;s speed with the improvement of the induction motor&amp;rsquo;s dynamic and steady state characteristics which are non-linear in nature, has been possible due to the advancement of electronics. The popularity of this motor has resulted into lot of research including the transient behavior of the motor. A methodology based on modeling capabilities along with control and its computer simulation has been proposed in this paper and is represented by dynamic modeling of three-phase four pole induction motor. When physical modeling of systems is necessary the bond graph approach is good, again it is also a good tool for combining different energy domains. Dependencies between different components can easily be found through the method of bond graph. This study was conducted on the basis of parameters collected from different ladle cranes motors of Durgapur Steel Plant in India.</description>
		<link>http://ijaers.com/detail/bond-graph-modeling-and-control-of-induction-motor-used-in-ladle-cranes-2/</link>
		<author>Abhijit Roy, Prof. Anup Kumar Saha</author>
		<pdflink>http://ijaers.com/uploads/issue_files/42 IJAERS-DEC-2016-36-Bond Graph Modeling and Control of Induction Motor used in Ladle Cranes.pdf</pdflink>
                
		</item><item>
		<title>Thermal and Structural Analysis of Gas Turbine Blade with Varying Geometry of Cooling Air Passage</title>
		<description>Cooling of gas turbine blades is of paramount importance in the present technological scenario. Gas turbine blades are subjected to very high temperatures, which are at times above the melting point of the blade material itself. An increase in the inlet temperature of fluid increases the efficiency of the turbine. Therein lies the necessity of cooling the blades to temperatures within the safe operating conditions. Many methods of cooling have been proposed which include internal and external cooling. In this paper, air cooling of stainless steel turbine blades has been investigated with the use of varying geometry of air passages. Model Geometries have been created using SolidWorks Software. The Effectiveness of the design has been analyzed using Finite Element Method software, ANSYS Workbench. Using the Steady State Thermal and Static Structural modules of ANSYS, the effect of varying the air passage geometry on thermal and structural behavior of the blade has been realized on the given model.</description>
		<link>http://ijaers.com/detail/thermal-and-structural-analysis-of-gas-turbine-blade-with-varying-geometry-of-cooling-air-passage-2/</link>
		<author>Saad Riaz, Shaik Rizwan Ahmed</author>
		<pdflink>http://ijaers.com/uploads/issue_files/43 IJAERS-DEC-2016-56-Thermal and Structural Analysis of Gas Turbine Blade with Varying Geometry of Cooling Air Passage.pdf</pdflink>
                
		</item><item>
		<title>Analysis of Different Routing Algorithm for 2D-Torus Topology NoC Architecture under Load Variation</title>
		<description>The recital of Network-on-Chip (NoC) depends on the underlying routing techniques. There are a lot of requirements that has to be met. Such performance metrics are minimum latency, least power and maximum throughput. This paper deals with XY route, PROM routing, FTXY routing and DyAD routing on 5x5 2D torus topology. The simulation is performed on nirgam NoC simulator version 2.1 for constant bit rate traffic condition. The simulation results reveals the dominance of XY, PROM, FTXY and DyAD algorithms depicting the minimum values of overall average latency per channel (in clock cycles per flit) as 0.409836 overall average latency per channel (in clock cycles per packet) as 6.2535, average throughput as 16.68, and total network power as 35.6768 mw, achieved for FTXY routing algorithm.</description>
		<link>http://ijaers.com/detail/analysis-of-different-routing-algorithm-for-2d-torus-topology-noc-architecture-under-load-variation-2/</link>
		<author>Bhupendra Kumar Soni, Dr.Girish Parmar</author>
		<pdflink>http://ijaers.com/uploads/issue_files/44 IJAERS-DEC-2016-58-Analysis of Different Routing Algorithm for 2D-Torus Topology NoC Architecture under Load Variation.pdf</pdflink>
                
		</item><item>
		<title>Utilization of Boron Waste Borogypsum with Silica Fume as a Supplementary Cementitious Material in Mortar</title>
		<description>In the current study, borogypsum and borogypsum with silica fume mixtures are added to cement clinker partially. Flexural tensile strength, compressive strength and water absorption tests are performed on mortar samples which contain borogypsum and silica fume and also high temperature effect on the mortars are investigated. As a result of the tests it is revealed that 5% addition of borogysum and borogypsum-silica fume mixtures to cement clinker are altered strength behaviors of the mortars.</description>
		<link>http://ijaers.com/detail/utilization-of-boron-waste-borogypsum-with-silica-fume-as-a-supplementary-cementitious-material-in-mortar-2/</link>
		<author>Murat Ozturk, Umur Korkut Sevim</author>
		<pdflink>http://ijaers.com/uploads/issue_files/45 IJAERS-DEC-2016-42-Utilization of Boron Waste Borogypsum with Silica Fume as a Supplementary Cementitious Material in Mortar.pdf</pdflink>
                
		</item><item>
		<title>Literature Survey of Security Enhancement in MANET Routing Protocols of WLANs</title>
		<description>A Mobile Ad-hoc Network (MANET) is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. One of the main issues in such networks is performance- in a dynamically changing topology; the nodes are expected to be power-aware due to the bandwidth constrained network. Another issue in such networks is security - since every node participates in the operation of the network equally, malicious nodes are difficult to detect. There are several applications of mobile ad hoc networks such as disaster recovery operations, battle field communications, etc. The most active research area under MANET routing protocol is security. MANETs have certain unique characteristics that make them vulnerable to several types of attacks. Since they are deployed an open environment where all nodes co-operate in forwarding the packets in the network, malicious nodes are difficult to detect.</description>
		<link>http://ijaers.com/detail/literature-survey-of-security-enhancement-in-manet-routing-protocols-of-wlans-2/</link>
		<author>Piyush Vyas, Neeraj Arora, Manish Purohit, Ajay Rupani</author>
		<pdflink>http://ijaers.com/uploads/issue_files/46 IJAERS-DEC-2016-61-Literature Survey of Security Enhancement in MANET Routing Protocols of WLANs.pdf</pdflink>
                
		</item><item>
		<title>Performance Analysis of Multiple Access Techniques for LTE system under Symbol Error Rate (SER) Calculation</title>
		<description>In the recent years, so many technologies in multiple access trends have influenced the field of Wireless Sensor Networks in significant ways. Various trends are readily available technology of ubiquitous wireless sensor networks as well as wireless communication networks and progress in the development of two multiple access techniques are compared in this scenario: the OFDMA and SC-FDMA. The OFDMA and SC-FDMA transceivers are modeled and simulated considering both the interleaved and localized subcarriers mapping schemes. WSNs have the potentiality to connect the physical world with the virtual world by forming a network of sensor nodes. To prolong the network&amp;lsquo;s hop in terms of single and two hop using both techniques should be used in the sensor nodes. The minimization of computing and storage platforms as well as the development of novel micro sensors and sensor materials with high reliability force encourages technology in research on WSN. In this paper, we will proposed the field of multipath routing in wireless sensor networks, and mainly focus on the technology of SER of WSNs.</description>
		<link>http://ijaers.com/detail/performance-analysis-of-multiple-access-techniques-for-lte-system-under-symbol-error-rate-ser-calculation-2/</link>
		<author>Piyush Vyas, Neeraj Arora, Manish Purohit, Ajay Rupani</author>
		<pdflink>http://ijaers.com/uploads/issue_files/47 IJAERS-DEC-2016-62-Performance Analysis of Multiple Access Techniques for LTE system under Symbol Error Rate (SER) Calculation.pdf</pdflink>
                
		</item><item>
		<title>Low Temperature Fatigue Crack Growth Test and Life Estimation of 7475-T7351 Al-ally by ANN</title>
		<description>In the present wok fatigue crack growth tests have been performed under interspersed mode-I overload on 7475-T7351 Al-alloy. The overloads with an overload ratio of 2 were given at 0ï‚°C, &amp;ndash;30ï‚°C, &amp;ndash;45ï‚°C, &amp;ndash;60ï‚°C, and &amp;ndash;75ï‚°C at a loading rate of 7 KN/min after the crack had grown to a/w ratio of 0.4. The crack growth tests have been continued in mode-I at a frequency of 5 Hz and load ratio (R) of 0.1 till fracture. From the fatigue tests it has been observed that the crack growth rate decreases and consequently fatigue life increases as the overload temperature decreases. The experimental data generated have been subsequently used to formulate the ANN model to predict the fatigue crack growth rates and the fatigue life of 7475-T7351 Al-alloy. It has been observed that the proposed model predicts the fatigue life with reasonable accuracy having + 0.919% deviation from experimental results.</description>
		<link>http://ijaers.com/detail/low-temperature-fatigue-crack-growth-test-and-life-estimation-of-7475-t7351-al-ally-by-ann-2/</link>
		<author>J. R. Mohanty</author>
		<pdflink>http://ijaers.com/uploads/issue_files/48 IJAERS-DEC-2016-52-Low Temperature Fatigue Crack Growth Test and Life Estimation of 7475-T7351 Al-ally by ANN.pdf</pdflink>
                
		</item><item>
		<title>Quality Enhancement of Low-Resolution Biomedical Images Using Multiwavelet Transform</title>
		<description>The recent increase in the wide use of digital imaging technologies in consumer and other areas (e.g., security and military) has brought with it a simultaneous demand for higher-resolution images. The demand for such high-resolution (HR) images can be met by algorithmic advances in resolution enhancement technology intended with hardware development. Such HR images not only give the viewer a more pleasing picture but also offer additional details that are important for subsequent analysis in many applications. Therefore, a resolution enhancement (high resolution) approach using computational, mathematical, and statistical techniques has received a great deal of attention recently. One promising approach is to use Image-processing techniques to obtain an HR image (or sequence) from low- resolution (LR) image. The High resolution images are frequently required in biomedical applications, because the HR images provide the accurate spatial and intensity information for correct diagnosis. In this paper multi-wavelet transform and interpolation method are use for image resolution enhancement.</description>
		<link>http://ijaers.com/detail/quality-enhancement-of-low-resolution-biomedical-images-using-multiwavelet-transform-2/</link>
		<author>Neha S. Deshmukh, Dr. Sanket B. Kasturiwala</author>
		<pdflink>http://ijaers.com/uploads/issue_files/49 IJAERS-DEC-2016-60-Quality Enhancement of Low-Resolution Biomedical Images Using Multiwavelet Transform.pdf</pdflink>
                
		</item><item>
		<title>Demonetisation: Impact on Indian Economy</title>
		<description>The demonetisation of high value currency denominations featuring Rs 500 and Rs 1,000 notes was a bold step by Indian government.Demonetization of currency means discontinuity of the said currency from circulation and replacing it with a new currency.It has deeply impacted Indian economy in various ways.But it has been widely acclaimed as positive decision taken for the benefit of the citizens.This paper traces the impact of this move on Indian economy.</description>
		<link>http://ijaers.com/detail/demonetisation-impact-on-indian-economy-2/</link>
		<author>Amol Deepak Nerkar</author>
		<pdflink>http://ijaers.com/uploads/issue_files/50 IJAERS-DEC-2016-67-Demonetisation- Impact on Indian Economy.pdf</pdflink>
                
		</item></channel>
</rss>