S.No.

Volume 1, Issue 3, December 2013 (Title of Paper )

Page No.
1.

Requirements Elicitation Techniques: Comparative Study

Authors: Omar Isam Al Mrayat, Norita Md Norwawi, Nurlida Basir

Abstract- — Over the years, software development failures is really a burning issue, might be ascribed to quite a number of attributes, of which, no-compliance of users requirements and using the non suitable technique to elicit user requirements are considered foremost. In order to address this issue and to facilitate system designers, this study had filtered and compared user requirements elicitation technique, based on principles of requirements engineering. This comparative study facilitates developers to build systems based on success stories, making use of a optimistic perspective for achieving a foreseeable future. This paper is aimed at enhancing processes of choosing a suitable technique to elicit user requirements; this is crucial to determine the requirements of the user, as it enables much better software development and does not waste resources unnecessarily. Basically, this study will complement the present approaches, by representing a optimistic and potential factor for every single method in requirements engineering, which results in much better user needs, and identifies novel and distinctive specifications.

Keywords- Requirements Engineering, Requirements Elicitation Techniques, Conversational methods, Observational methods, Analytic methods, Synthetic methods.

References-

Nelson, R. R. 2007. “IT project management: Infamous failures, classic mistakes, and best practices”. MIS Quarterly Executive. 6(2), 67-78.

[2] Wiegers, K. E. 2006. “More about software requirements: Thorny issues and practical advice”. Microsoft Press: Redmond Washington.

[3] McGovern, F. 2007. “Getting requirements right in the analysis phase”. Compuware White Paper.

[4] Zowghi, D., & Coulin, C. 2005. “2 Requirements Elicitation : A Survey of Techniques, Approaches , and Tools”.

[5] IEEE SWEBOK, R. 2004. "Software Engineering Body of Knowledge."

[6] Boehm, B. & Papaccio, P.1988. “Understanding and Controlling Software Costs”. IEEE Transactions on Software Engineering. SE-4, 10.

[7] McConnell, S. 2001. “From the Editor - An Ounce of Prevention”. IEEE Software. 18, 3.

[8] Romero & Mariona. 2010. “Sure: secure and usable requirements engineering”.Retrieved fromhttp://dl.acm.org/citation.cfm?id=1925 644.

[9] Wiegers, K.2003: “Software Requirements”. Microsoft Press.

[10] Pamela Zave. 1997. “Classification of research efforts in requirements engineering”. ACM Comput. Surv. 29(4):315–321.

[11] Raimundas Matulevicius. 2005. “Process Support for Requirements Engineering A Requirements Engineering Tool Evaluation Approach”. PhD thesis, NTNU. Doctoral theses at NTNU. 142.

[12] Sommerville and Sawyer. 1997. “Requirements Engineering”. A Good Practice. John Wiley and Sons.

[13] Software Test & Evaluation Panel (STEP). 1991. “Requirements Definition Implementation Team: Operational Requirements for Automated Capabilities”. Draft Pamphlet (Draft PAM).

[14] Loucopoulos, P., and Champion. 1989. “R.E.M.: Knowledge-Based Support for Requirements Engineering”. Information and Software Technology.

[15] Davis, A. 1990. “Software Requirements: Analysis and Specification”. Prentice Hall.

[16] Dorfman, M. 1990. “Tutorial: System and Software Requirements Engineering”. IEEE Computer Society Press.

[17] Nuseibeh, B. and Easterbrook, S. 2000. “Requirements engineering”. a roadmap. in Proceedings of the Conference on The Future of Software Engineering, (Limerick, Ireland), ACM Press. 35 - 46.

[18] Goguen, J. & Linden, C. 1993. “Techniques for Requirements Elicitation”. 1st IEEE International Symposium on Requirements Engineering (RE'93), San Diego, USA, 4-6th January. pp. 152-164. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=324822.

[19] Loucopoulos, P., and Karakostas. 1995. “V. System Requirements Engineering McGraw-Hill”. Inc., New York, NY.

[20] Kotonya, G., and Sommerville, I. 1998. “Requirements Engineering”. Processes and Techniques John Wiley & Sons. New York, NY.

[21] Escalona, M., & Koch, N. 2004. “Requirements engineering for web applications-a comparative study”. Journal of Web Engineering. 2(3), 193–212. Retrieved from http://citeseerx.ist.psu.edu /viewdoc/download?doi=10.1.1.153.5974&rep=rep1&type=pdf.

[22] IEEE SWEBOK, R. 2004. "Software Engineering Body of Knowledge."

[23] Browne, G. J., & Ramesh, V. 2002. “Improving information requirements determination: a cognitive perspective”. Information & Management. 39(8), 625–645. doi:10.1016/S0378-7206(02)00014-9.

[24] Vessey, I., and Conger, S. 1994. "Requirements Specification: Learning Object, Process, and Data Methodologies". Communications of the ACM. (37:5), pp 102-113.

[25] Wallace, D.R., and Ippolito, L.M. 1997. "Verifying and Validating Software Requirements Specifications". in: Software Requirements Engineering, R.H. Thayer and M. Dorfman (eds.), IEEE Computer Society Press. Los Alamitos. CA. pp. 389-404.

[26] Whitney, D. 1998. "Let’s change the subject and change our organization: an appreciative inquiry approach to organization change". Career Development International (3:7), pp 314-319.

[27] Guinan, P., Bostrom, R.P. 1986. “Development of computer based information system: A communications framework”. SIGMIS Database. 17(3), 3-16.

[28] Browne, G. J., & Ramesh, V. 2002. “Improving information requirements determination: a cognitive perspective”. Information & Management. 39(8), 625–645. doi:10.1016/S0378-7206(02)00014-9.

[29] Hickey AM, Davis AM. 2004. “A unified model of requirements elicitation”. J Manage Inf Syst 20(4):65.

[30] Farzan R, DiMicco JM, Millen DR, Dugan C, Geyer W, Brownholtz EA. 2008. “Results from deploying a participation incentive mechanism within the enterprise”.

[31] Zhang, Z. 2007. “Effective Requirements Development-A Comparison of Requirements Elicitation techniques”. Tampere, Finland, INSPIRE, 225–240. Retrieved from http://pdf.aminer.org/000/359/901/requirements_elicitation_with_ind irect_knowledge_elicitation_techniques_comparison_of_three.pdf.

[32] Avison, D.E. and Fitzgerald, G. (eds.). 1995. “Information Systems Development: Methodologies, Techniques and Tools”. McGraw-Hill Book Company.

[33] Goguen, J. & Linden, C. 1993. “Techniques for Requirements Elicitation”. 1st IEEE International Symposium on Requirements Engineering (RE'93), San Diego, USA, 4-6th January. pp. 152-164. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=324822.

[34] Leffingwell, D. and Widrig, D. 2003. “Managing Software Requirements - A User Case Approach”. 2nd Ed. Addison-Wesley.

[35] Zowghi, D., & Coulin, C. 2005. “2 Requirements Elicitation : A Survey of Techniques, Approaches , and Tools”.

[36] Tsumaki, T., & Tamai, T. 2005. “A framework for matching requirements engineering techniques to project characteristics and situation changes”. … of Situational Requirements Engineering …, 44–58. Retrieved from http://cui.unige.ch/dbresearch/SREP05/Papers/04.pdf.

[37] Chauncey e. Wilson. 2006. “Brainstorming Pitfalls and Best Practices”. ACM. vol 13,issue 5.,pages 50-63. http://delivery.acm.org/10.1145/1160000/1151342/p50-wilson. pdf?key1=1151342&key2=0909760121&coll=ACM&dl=ACM&CF ID=67531224&CFTOKEN=54899420.

[38] Linn Gustafson. 2008. “Requirements Engineering Verification validation”. University West, Course slides.

[39] Maiden, N. &Rugg, G. 1996. ACRE: “Selecting Methods for Requirement Acquisition”. IEEE, Software Engineering Journal. 11(3):183-19247.

[40] Christel, M.G. and Kang, K.C. 1992. “Issues in requirements elicitation Technical report”. CMU/SEI-92-TR-12 ESC-TR-92-012. Carnegie Mellon University. Pittsburgh, PA,80.

[41] Stephen Viler & Ian Sommerville. 1999. “Social analysis in the requirements engineering process: From ethnography to method”. IEEE. pages 6-13. http://ieeexplore.ieee.org/iel5/6303/ 16860/00777980. pdf?tp=&arnumber =777980&isnumber=16860.

[42] Viller, S. and Sommerville, I. 2000. “Social analysis in the requirements engineering process: from ethnography to method”. in Proceedings of the 4th International Symposium on Requirements Engineering. (RE'99), (Limerick, Ireland, 1999), IEEE CS press.

[43] Myers, M.D. 1999. “Investigating information systems with ethnographic research”. Communications of the AIS, 2.

[44] Hutchings, A.F. and Knox, S.T. 1995. “Creating products: Customer demand”. Comm. ACM. 38 (5). 72-80.

[45] Cybulski, J.L. and Reed, K. 2000. “Requirements Classification and Reuse: Crossing Domain Boundaries”. in Conference on Software Reuse. ICSR'2000, (Vienna and Austria), 190-210.

[46] Knethen, A.v., Paech, B., Kiedaisch, F. and Houdek, F. 2002. “Systematic requirements recycling through abstraction and traceability”. in IEEE Joint International Conference on Requirements Engineering.

[47] Woo, H.G. and Robinson, W.N. 2002. “Reuse of scenario specifications using an automated relational learner: a lightweight approach”. in IEEE Joint International Conference on Requirements Engineering. 173 - 180.

[48] Rugg, G., Eva, M., Mahmood, A., Rehman, N., Andrews, S. and Davies, S. 2002. “Eliciting information about organizational culture via laddering”. Information Systems Journal, 12 (3).215-229.

[49] Rugg, G. and McGeorge, P. 1999. “The concept sorting techniques”. The Encyclopedia of Library and Information Science. 65(28). 43 - 71.

[50] Byrd, T.A., Cossick, K.L. and Zmud, R.W. 1992. “A Synthesis of Research on Requirements Analysis and Knowledge Acquisition Techniques”. MIS Quarterly. 16 (1). 117 - 138.

[51] Wright, G. and Ayton, P. 1987. “Eliciting and modeling expert knowledge”. Decision Support Systems. 3 (4). 13-26.

[52] Hawgood, J., Land, F. and Mumford, E. 1978. “A participative approach to forward planning and system change”. In Proceedings of the 2nd Conference of the European Cooperation in Informatics. (Venice, Italy, 1978), 39 -81.

[53] Stuart Anderson Massimo Felici. 2001. “Requirements engineering questionnaire”. http://homepages.inf.ed.ac.uk/mfelici/doc/questionnaire.pdf.

[54] Coughlan, J., & Macredie, R. 2002. “Effective communication in requirements elicitation: a comparison of methodologies”. Requirements Engineering. 7(2), 47–60. doi:10.1007/s007660200004.

[55] Charles F. Manski1 and Francesca Molinari. 2008. “Skip Sequencing:A Decision Problem In Questionnaire Design”. Northwestern University and Cornell University. vol 2, pages 264-285. http://arxiv.org/PS_cache/arxiv/pdf/0803/0803.3875v1.pdf.

[56] Holtzblatt, K. and Beyer, H. 1993. “Making customer-centered design work for teams”. Comm. ACM. 36 (10). 93 - 103.

[57] Cooperrider, D.L. & Srivastva, S. 1987. “Appreciative inquiry in organizational life”. In Woodman, R. W. & Pasmore, W.A. (eds) Research In Organizational Change And Development. Vol. 1 (129- 169). Stamford, CT: JAI Press.

[58] Cooperrider, D.L. & Whitney, D. 2001. “A positive revolution in change. In Cooperrider”. D. L. Sorenson, P., Whitney, D. & Yeager, T. (eds.) Appreciative Inquiry: An Emerging Direction for Organization Development (9-29). Champaign, IL: Stipes.

[59] Barrett, F.J. & Fry, R.E. 2005. “Appreciative Inquiry: A Positive Approach to Building Cooperative Capacity”. Chagrin Falls, OH: Taos Institute.

[60] Whitney, D. & Trosten-Bloom, A. 2003. “The Power of Appreciative Inquiry”. San Francisco: Berrett-Koehler.

1-10
2.

Application of Traffic Management Plan a Sustainable Solution of Traffic Congestions in Pabna City, Bangladesh

Authors: Ashish Kumer Saha, Md. Rashedul Haque, Tahmina Tasnim Nahar, Md. Motiur Rahman

Abstract- Pabna, one of the rising cities in Bangladesh, as a result the population in Pabna increasing day by day along with the traffic congestion. Traffic management plan is one of the best policies to solving the traffic congestion in developing countries like Bangladesh. Development of new transportation system involve huge amount of money and time. Most of the cases the invested money is irreversible. The developing country like Bangladesh the best approach is traffic management. The traffic management plan has the scope of improvement of the existing road network and system and plan proposal for new development.

Keywords- Traffic Management, Congestions, Traffic volume, Sustainable, Geometric survey, Road side interview survey.

References- [1] Sing G.C (1996), “Highway Engineering”, Standard Publishers Distribution, Delhi, India.

[2] Khanna S.K. & JOSTO C.E.G (2001), “Highway Engineering”, Nem Chand & Bros, Roorkee, India.

[3] Kadiyali L.R. (1997), “Traffic Engineering & Transportation Planning”, Khanna Publishers, Nai Sarak, Delhi, India.

[4] Gupta B.L (2003), “Roads Railway Bridges Tunnels And HarbourDoc Engineering”, Standard Publishers Distributers, Delhi, India.

[5] Ashish Kumer Saha & Md. Abdus Sobhan, “Features & Facilities at C&B Road Intersection: A Case Study”, IJASETR Research Paper ISSN: 1839-7239, August, 2012.

[6] M. Mostakim and S. Islam, “Traffic Management Plan of Pabna Municipality” Unpublished research work, Department of Geography, Environment & Urban Planing, 2013.

[7] Mahmood, M., Bashar, M.A. & Akhter, S. 2009. Traffic Management System and Travel Demand Management (TDM) Strate-gies:Suggestions for Urban Cities in Bangladesh. Asian Journal of Management and Humanity Sciences, Vol. 4, No. 2-3, pp. 161-178.

[8] Mahmood, M., Bashar, M.A. & Akhter, S. 2009. Traffic Management System and Travel Demand Management (TDM) Strate-gies:Suggestions for Urban Cities in Bangladesh. Asian Journal of Management and Humanity Sciences, Vol. 4, No. 2-3, pp. 161-178.

[9] Comparison of Three UnconventionalArterial Intersection Designs: Continuous Flow Intersection, Parallel Flow Intersection, and Upstream Signalized Crossoverby Seonyeong Cheong, SaedRahwanji, and Gang-Len Chang, (June 3, 2008)

11-15
3.

Modelling Starting Regime Work of the Induction Generators of Wind Turbine and Small Hydroplaning

Authors: R.I. Mustafayev, L. H. Hasanova, M. M. Musayev

Abstract- Reactive power compensation of asynchronous generators wind power and small hydroelectric power stations increases the reliability of connecting them to the so-called "weak" power grids of power systems. The methods of reactive power compensation for asynchronous generators of various designs.

Keywords- asynchronous generator, wind-power plants, small hydro power, active power, reactive power.

References-

[1] Lejnyuk G.D., Nikitorovich A.V., Nghoma Jean-Peter. Compensation of asynchronous generators reactive power at small hydroelectric power plants. Scientific works of Vinnitca national technical university. Energetics and electrotechnology, 2008, No 2, p. 1-7.

[2] Zlatkovskiy A.P. Electrical equipment of country electrical facilities. M. Gosizdatselkhoz, 1953, 446 p.

[3] Elspes Power Qualitu Solutions. Wind Energy: Reactive Power Compensation Systems, www.elspec.ltd.com.

[4] Wind Energy 2006 Katalog 2006 BWE – Service GmbH.

[5] Mustafayev R.I., Hasanova L.H. Modeling and study of quasisteady-state operation of wind turbines with asynchronous generators with frequency control, Elektrichestvo, 2009, No.6, p. 36- 41.

[6] Mustafayev R.I., Hasanova L.H. Modeling of dynamic and steady state modes of operation of wind turbines with double fed induction machine. Elektrotechnics, 2008, No.9, p. 11-15.

16-23
4.

Diagnosis Through Secured eHealth Expert System

Authors: K. Vijaya Lakshmi, M.Padmavathamma

Abstract- Expert systems are computer applications that combine computer equipment, software, and specialized information to imitate expert human reasoning and advice. eHealth is the single-most important revolution in healthcare since the advent of modern medicine, vaccines, or even public health measures. We are concentrating on to develop secured eHealthExpert System through which various chronic diseases like HIV/AIDS, Diabetes’s (Type-II,GDM) and Breast cancer are diagnosed , provide security to the Electronic Patient Record(EPR) as well as online services such as teleconsultation (second medical opinion), eprescription, e-referral, telemonitoring and telecare.

Keywords- E-Health, Expert systems, knowledge representation, Diagnosis, E-Health data exchange

References-

[1] http://en.wikipedia.org/wiki/Health_services research

[2] http://en.wikipedia.org/wiki/EHealth

[3] http://www.openclinical.org/e-Health.html

[4] http://www.ehow.com/about_5845467_expert-used- health-careadministration.html#ixzz2mLooe4yf

[5] http://www.referenceforbusiness.com/encyclopedia/Ent-Fac/ExpertSystems.html

[6] Liebowitz, Jay, ed. The Handbook of Applied Expert Systems. Boca Raton, FL: CRC Press LLC, 1998.

[7] Turban, Efraim, and Jay E. Aronson. Decision Support Systems and Intelligent Systems. Upper Saddle River, NJ: Prentice Hall, 1998.

24-26
5.

Binary Morphology with Image Compression and Cryptography

Authors: Ponshankar B, Swaranambigai.R

Abstract - Binary Image processing is extremely useful in various areas, such as object recognition, tracking, motion detection, machine intelligence, image analysis, understanding video processing, computer vision, and identification and authentication systems. Binary image processing (BIP) has been commonly implemented using processors such as CPU or DSP. However, it is inefficient and difficult to use such processors for binary image processing. High-speed implementation of binary image processing operations can be efficiently realized by using chips specialized for binary image processing. Mathematical morphology (MM) is a nonlinear image processing framework used to manipulate or analyze the shape of functions or objects. Mathematical morphology(MM) is set theory-based methods of image analysis and plays an important role in many digital image processing algorithms and applications, e.g., noise filtering, object extraction, analysis or pattern recognition. The methods, originally developed for binary images, were soon extended and now apply to many different image representations. Real-time image processing systems have constraints on speed or hardware resources. In addition, in embedded or mobile applications, this system consumes low power and low memory. The cryptography involves efficient algorithms related to encryption and decryption.

Keywords - Binary image processing (BIP), Mathematical morphology (MM), RSA algorithm, structuring elements, encryption and decryption

References-

[1] Bin Zhang, Kuizhi Mei and Nanning Zheng, “Reconfigurable Processor for Binary Image Processing”, in IEEE transactions on circuits and systems for video technology, vol. 23, no. 5, may 2013.

[2] P. Dokladal, H. Hedberg, and V. Owall, “Binary morphology with spatially variant structuring elements algorithm and architecture,” IEEE Trans. Image Process., vol. 18, no. 3, pp. 562–572, Mar. 2009.

[3] Hugo Hedberg, Fredrik Kristensen, Viktor Öwall, “Low-Complexity Binary Morphology Architectures With Flat Rectangular Structuring Elements,” in IEEE transactions on circuits and systems—i: regular papers, vol. 55, no. 8, september 2008.

[4] Huijuan Yang and Alex C. Kot, “Image authentication with tampering localization by embedding cryptographic signature and block identifier,” in IEEE signal processing letters, vol. 13, no. 12, december 2006.

[5] Min Wu, and Bede Liu, “Data Hiding in Binary Image for Authentication and Annotation”, in IEEE Transactions On Multimedia, Vol. 6, No. 4, August 2004.

[6] E. C. Pedrino, O. Morandin, Jr., and V. O. Roda, “Intelligent FPGA based system for shape recognition,” in Proc. 7th Southern Conf. Programmable Logic, 2011, pp. 197–202.

[7] E. C. Pedrino, J. H. Saito, and V. O. Roda, “Architecture for binary mathematical morphology reconfigurable by genetic programming,” in Proc. 6th Southern Programmable Logic Conf., 2010, pp. 93–98.

[8] E. N. Malamas, A. G. Malamos, and T. A. Varvarigou, “Fast implementation of binary morphological operations on hardwareefficient systolic architectures,” J. VLSI Signal Process., vol. 25, no. 1, pp. 79–93, 2000.

[9] S. Chien and L. Chen, “Reconfigurable morphological image processing accelerator for video object segmentation,” J. Signal Process. Syst., vol. 62, no. 1, pp. 77–96, 2011.

[10] N. Bouaynaya, M. Charif-Chefchaouni, and D. Schonfeld, “Spatiallyvariant morphological restoration and skeleton representation,” IEEE Trans. Image Process., vol. 15, pp. 3579– 3591, 2006.

27-32
6.

Optimization of Surface Roughness using Response Surface Methodology for EN31 Tool Steel EDM Machining

Authors: Singaram Lakshmanan, Prakash Chinnakutti, Mahesh Kumar Namballa

The present work demonstrates the optimization process of surface roughness of electrical discharge machining (EDM) by using Response Surface Methodology (RSM). The work piece material was EN31 tool steel. The pulse on time, pulse off time, pulse current and voltage were the control parameters of EDM. RSM method was used to design the experiment using rotatable central composite design as this is the most widely used experimental design for modeling a second–order response surface. The surface roughness parameters like, root mean square (Rq), skewness (Rsk), kurtosis (Rku) and mean line peak spacing (RSm) are considered for modeling. The process has been successfully modeled using response surface methodology (RSM) and model adequacy checking is also carried out. The secondorder response models have been validated with analysis of variance.

Keywords —Electrical Discharge Machining, Response Surface Methodology, Surface Roughness, Response equations.

References-

[1] Marafona J.D., Jo A.A. (2009), “Influence of workpiece hardness on EDM performance”, International Journal of Machine Tools & Manufacture, Vol. 49, pp. 744–748.

[2] Spedding, T.A. and Wang, Z. Q., (1997), “Parametric optimization and surface characterization of wire electrical discharge machining process”, Precision Engineering, Vol. 20, pp.5-15.

[3] Zhang, J.H., Lee, T.C. and Lau, W.S., (1997), “Study on the electrodischarge machining of a hot pressed aluminum oxide based ceramic”, Journal of Materials Processing Technology, Vol. 63, pp.908-912.

[4] Tsai, K.M. and Wang, P.J., (2001), “Predictions on surface finish in electrical discharge machining based upon neural network models”, International Journal of Machine Tools and Manufacture, Vol. 41, pp.1385–1403.

[5] Lee, K.Y., Kang, M.C., Jeong, Y.H., Lee, D.W. and Kim, J.S., (2001), “Simulation of surface roughness and profile in high-speed end milling”, Journal of Materials Processing Technology, Vol.113, pp.410-4125.

[6] Routara B. C., Bandyopadhyay A., Sahoo P., (2007), “Use of desirability function approach for optimization of multiple performance characteristics of the surface roughness parameters in CNC turning” Proceedings of the International Conference on Mechanical Engineering, 29- 31 December 2007, Dhaka, Bangladesh.

[7] Minitab User Manual Release 13.2, (2001), Making data analysis easier. MINITAB Inc, State College, PA, USA.

33-37
7.

Design and Analysis of Axle Arm for ARJUN MBT Track Tensioner

Authors: G. Maheedhara Reddy, N. Ananda Kumar, E. Balaji

Abstract- This project focus on design and developing armored fighting vehicles such as ARJUN MBT, Mk-1, Mk-2, BLT-72 etc at CVRDE, Avadi. The ARJUN MBT Mk-2 is a state-of-art weapon system having superior fire power, invincible armor protection and excellent mobility. The ARJUN MBT Mk-2 is fitted with advanced Running Gears (RG) and suspension systems. Inline with the latest configurationally requirement of RG systems and to cater for higher loading conditions, a suitable track tensioner has been under development. The axle arm is one of the critical members in the actuator mechanism working under principle of slider crank mechanism, has been designed and developed as a forged integral piece. Being is a new development; a rigorous stress analysis has been taken up as scope of this particular project work. The design of integral axle arm will be evaluated both analytical and FEA methods, in addition to estimation of fatigue life.

Keywords- Tractive force; Resultant force; FEA; Fatigue life.

References-

[1] The strategist, K. Subrahmanyam, has been the leading exponent of this view. See Subrahmanyam, Defense and Development (Calcutta: Minerva, 1972).

[2] For two important recent studies see D. D. Khanna and P. N. Mehrotra, Defense Versus Development: A Case Study of India (New Delhi: Indus Publishing House, 1993);

[3] Kanti Bajpai and Varun Sahni, “Secure and Solvent: Thinking About an Affordable Defense for India,” Paper for Rajiv Gandhi Institute for Contemporary Studies, New Delhi, 1994, RGICS (11).

[4] Emile Benoit, Defense and Economic Growth in Developing Countries (Lexington, Mass.: Lexington Books, 1973).

[5] Riccardo Faini, Patricia Arnez, and Lance Taylor, “Defense Spending, Economic Structure and Growth,” Economic Development and Cultural Change, 32 (3) (April 1984): 487–498.

[6] Deger Saadet and Ron Smith, “Military Expenditure and Growth in Less Developed Countries,” Journal of Conflict Resolution 27 (2) (June 1983): 335–353.

[7] Nicole Ball, Security and Economy in the Third World (Princeton, N.J.: Princeton University Press, 1988).

[8] Nicole Ball, “Defense and Development: A Critique of the Benoit Study,” Economic Development and Cultural Change, 31 (April 1983): 507–24.

[9] Lt. General Matthew Thomas (ret.), “An Analysis of Threat Perception and Strategy for India,” Indian Defense Review, January 1990, pp. 61–64.

38-44
8.

Planning of UPFC for the Power System Transient Analysis

Authors: G Kalidas Babu, S Rajesh Kumar, A Santosh Kumar

Abstract- Improvement in semiconductor technologies gave a new concept of Flexible AC Transmission system (FACTS) which brought radical changes in the power system operation, control and also for controlling power and enhancing the usable capacity of existing transmission lines by controlling both active and reactive powers. The Unified Power Flow Controller (UPFC) is devised for the real time control and dynamic compensation of ac transmission systems providing multifunctional flexibility required to solve many of problems facing the power delivery industry. The aim of this paper is to model UPFC and its control circuit using SIMULINK and to analyze the control circuit for effective power flow control using three different control schemes – phase angle control, cross coupling control and generalized control. After modelling UPFC, a single machine connected to a transmission line along with UPFC has been considered to study its performance. In brief, it is the study of Unified Power Flow Controller and its role in damping power oscillations and power swings to improve system performance.

Keywords- FACTS, UPFC, Semiconductor Technologies

References-

[1] Hideaki Fujita, Yasuhiro Watanabe and Hirofumi Akagi, “Control and Analysis of a Unified Power Flaw Controller”, 1992.

[2] N.G. Hingorani, “Flexible ac Transmission Systems”, IEEE International Conference on AC & DC Power Transmission London, Sept, 1991

[3] L. Gyugyi, “The Unified Power Flow Controller: A New Approach to Transmission and Control”, IEEE Trans. on Power Delivery, April 1995, pp.1085-1096.

[4] K.R.Padiyar, “Power System Dynamics- Stability and Control”, Interline Publishing Pvt. Ltd., Bangalore.

[5] H. Mehta, R.K. Johnson, D.R. Torgerson, L. Gyugyi, C.D. Schauder, “Flexible ac Transmission System EPRI workshop”, May 1992, pp.1-12.

[6] L. Gyugyi, C. D. Schauder, K. K. Sen, “Static Synchronous Series Compensator A Solid-state Approach to the Series Compensation of Transmission Lines,” IEEE Pans. on Power Delivery, V01.12, No.1, pp.406-413, 1997

 

45-53
9.

Satellite Imagery Applications of Urban Road Inventory, Traffic Flow Attributes, and Road Capacity Assessment

Authors: W. Uddin, A. Ahmed, M.S. Ali

Abstract- Road inventory and traffic volume demand maps are the most important elements of a working traffic management system. In some countries these up-to-date road inventory data are not available and 24-hour traffic counts are not frequently collected due to lack of funds or difficult to access remote places. The authors discuss a geospatial methodology using 0.6m high resolution satellite imagery that was successfully implemented for creating road network planimetrics for road inventory, traffic flow attributes, and traffic volume demand maps. The capacity analysis results show that the analyzed urban road sections were mostly at level-of-service C, D, or E. The traffic demand volume data can be used to calculate congestion costs and recommend traffic management priorities.

Keywords- Capacity, geospatial analysis, inventory, road, satellite imagery, traffic flow, volume.

References- [1] Uddin, W. 2007 Assessment of Transportation Related Safety and Public Health Impacts Using Remote Sensing and Geospatial Analysis Technologies. In Proceedings, 7th Malaysian Road Conference, Kuala Lumpur, Malaysia, July 17-19, 2007, 1-16.

[2] World Health Organization. 2004 World report on road traffic injury prevention. http://www.who.int/world-healthday/2004/infomaterials/ world_report/en/summary_en_rev.pdf Accessed on April 20, 2007.

[3] The National Academies. 2010 Development of an ITS-Based Traffic Management Model for Metropolitan Areas of Pakistan with Karachi as a Pilot Study. Washington DC, USA. http://sites.national academies.org/PGA/dsc/pakistan/PGA_052872 Accessed on July 2, 2012.

[4] Ahmed, A. 2009 Geospatial Analysis of Satellite Imagery for Mapping Road Inventory and Traffic Flow Attributes. M.S. Thesis, University of Mississippi, USA.

[5] Qureshi, A.I. and Huapu, L. 2007 “Urban Transport and Sustainable Transport Strategies: A Case Study of Karachi, Pakistan.” Tsinghua Science and Technology, v. 12. n. 3 (June 2007), 309-317.

[6] Hudson, W.R., Hass, R., and Uddin, W. 1997 Infrastructure Management. McGraw-Hill, New York.

[7] Al-Turk, E. and Uddin, W. 1999 “Infrastructure Inventory and Condition Assessment Using Airborne Laser Terrain Mapping and Digital Photography.” In Transportation Research Record 1690, Journal of Transportation Research Board, National Research Council, Washington DC, USA, 121-125.

[8] Uddin, W. 2011 “Transportation Management: LiDAR, Satellite Imagery Expedite Infrastructure Planning.” Earth Imaging Journal, (January/February 2011), 24-27.

[9] Uddin, W. 2009 Development of an ITS-based Traffic Management Model for Metropolitan Area of Pakistan with Karachi as a Pilot Study. USAID Project, Annual Report Year 3. Narrative Report to the National Academy of Sciences (NAS). Washington DC, USA.

[10] McCord, M.R., Yang, Y., Jiang, Z., Coifman, B., and Goel, P.K. 2003 “Estimating AADT from Satellite Imagery and Air Photos: Empirical Results.” In Transportation Research Record 1855, Transportation Research Board, National Research Council, Washington DC, USA, 136-142.

[11] Leitloff, J., Hinz, S., and Stilla, U. 2007 “Inferring Traffic Activity from Optical Satellite Images.” International Archives of Photogrammetry, Remote Sensing and Spatial Information Sciences. Technische Universität München, Arcisstrasse 21, 80333 München, Germany, 89-93.

[12] TRB. 2000 Highway Capacity Manual 2000. Transportation Research Board (TRB), The National Academies, Washington DC, USA.

54-60
10.

Investigation of Neotectonics along Hazara Kashmir Syntaxis through Remote Sensing and GIS Analysis

Authors: Syed Amer Mahmood, Hafsah Batool, Zahra Waheed, Aqeela Mobeen Akhtar, Amer Masood

Abstract- The fatal earthquake of October 8, 2005 occured in Pakistani Himalayas and specifically within the Hazara Kashmir Syntaxis (HKS). The HKS is an active tectonic structure formed as a result of India-Eurasia collision. The unrelenting competition between tectonics, climate and erosional factors has created a very distinctive topography and thrust geometries in HKS. The aim is to constrain neotectonics and related active surface deformation based on semi-automated Digital Elevation Model derived morphometric parameters. The Shuttle Radar Topography Mission DEM with a spatial resolution of 90 m has been engaged for the generation of Hack gradient, steepness, concavity and relative uplift rate maps for the geomorphological analysis. The other surface dynamic indices such as drainage density, lineament density along with their rose diagrams were also generated automatically. A detailed stream profile analysis, lineament and drainage density, relative relief (incision map) revealed that the results obtained for the relative uplift rates and other geomorphic indices are consistent with the neotectonic activity along HKS. The relative uplift rates are higher in the NNE (2.35 mm/yr.) as compared to lower (0.01 mm/yr.) in the SSW part of study area. The steepness index and Hack gradients show more steepened regions and steep slopes NNE of HKS than SSW that is indicative of neotectonic activity. These results suggest tectonic control over the drainage network and the topography in the study area. The geomorphic indices and relative uplift rate maps also shows that the NNE is more deformed and uplifted region than the SSW. The inhomogeneous spatial distribution of variable relative uplift rates is a clear indication of complexity and severity of surface deformation in the HKS.

Keywords- SRTM DEM, drainage network, neotectonics, Hazara Kashmir Syntaxis and Relative uplift rates.

References-

[1] Kirby, E., Whipple, K.X., Tang, W., Chen, Z., 2003. Distribution of active rock uplift along the eastern margin of the Tibetan Plateau: Inferences from bedrock channel longitudinal profiles. Journal of Geophysical Research, 108(B4), 2217, doi:10.1029/2001JB000861.

[2] Merritts, D.J., 1996, The Mendocino triple junction: active faults, episodic coastal emergence, and rapid uplift: journal of geophysical research, v.101, pp.6051-6070.

[3] Sklar. L.S., and Dietritch, W.E., 2001, sediments and rocks strength control on river incision into bedrock geology, v.29(12), 1087-1090.

[4] Burbank, D. W., Blythe, A. E., Putkonen, J., Pratt-Sitaula, B., Gabet, E., Oskin, M. Barros, A., and Ojha, T. P., 2003, Decoupling of erosion and precipitation in the Himalayas: Nature, v. 426, p. 652-655.

[5] Wobus, C., Whipple, K., Kirby, E., Snyder, N., Johnson, J., Spyropolou, K., Crosby, B., Sheehan, D, Tectonics from topography: Procedures, promise and pitfalls. In: Willett, S.D., Hovius, N., Brandon, M.T., and Fisher, D.M., eds., Tectonics, Climate and Landscape Evolution, Geological Society of America Special Paper 398, 55-74 (2006).

[6] Tahirkheli, T., Khan, M. A. & Mian, I., 1993. The Warsak basic rocks: Initial rift-stage continental tholeiites of permo-Triassic “Panjal” affinity. Geol. Bull. Univ. Peshawar, 26: 17-33

[7] Mohadjer, S., R. Bendic, S. Ischuk, S. Kuzikov, A. Kostuk, U. Saydullaev, S. Lodi, D.M. Kakar, A. Wasy, M.A. Khan, P. Molnar, R. Bilham and A.V. Zubovich. Partitioning of IndiaEurasia convergence in the Pamir-Hindu Kush from GPS measurements, Geophysical Research Letters, 37(LO4305): 1-6 (2010).

[8] Khan, M. A., Bendick, R., Bhat, M. I., Bilham, R., Kakar, D. M, Khan, F. S., Lodi, S. H., Qazi, M. S., Singh, B., Szeliga, W., Wahab, A., 2008. Preliminary geodetic constraints on plate boundary deformation on the western edge of the Indian plate from TriGGnet (Tri-University GPS Geodesy Network). Journal of Himalayan Earth Sciences, 41, 71-87.

[9] Mahmood, S. A. and R. Gloguen. Analysing spatial autocorrelation for hypsometric integral To discriminate neotectonics and lithologies using DEMs and GIS, GIScience and remote sensing,.48(4), 541-565 (2011).

[10] Wadia, D.N. (1931): The Syntaxis of the North-West Himalaya, its Rocks, Tectonics and Orogeny. Rec. G. S. I. 65 (2), 189— 220, Calcutta.

[11] Bossart, P., D. Dietrich, A. Greco, R. Ottiger, and J. G. Ramsay, The tectonic structure of the Hazara-Kashmir syntaxis, southern Himalayas, Pakistan, Tectonics, 7, 273 – 297 (1988).

[12] Hack, J.T., 1973. Stream-profiles analysis and stream-gradient index. Journal of Research of the U.S. Geological 589 Survey 1, 421-429.

[13] Keller, E.A. and N. Pinter. Active tectonics: Earthquakes, Uplift and Landscapes. Prentice Hall, New Jersey, Prentice Hall, ISBN 0023632615, 9780023632617, (1996).

[14] Howard, A.D., Seidl, M.A., Dietrich, W.E., 1994. Modeling fluvial erosion on regional to continental scales. 604 Journal of Geophysical Research, 99(B7), 13,971-13,986.

[15] Snyder, N., Whipple, K., Tucker, G., Merritts, D., 2000. Landscape response to tectonic forcing: digital elevation 667 model analysis of stream profiles in the Mendocino triple junction region, Northern California. Bulletin of the 668 Geological Society of America, 112(8), 1250-1263.

[16] Whipple, K.X., Tucker, G.E., 1999. Dynamics of the streampower river incision model: Implications for height 677 limits of mountain ranges, landscape response timescales, and research needs. Journal of Geophysical Research,678 104(B8), 17,661- 17,674.

[17] Wadia, D. N. (1934): The Cambrian Trias Sequence of NorthWest Kashmir(Parts of Muzaffarabad and Baramula Districts). — Rec. G. S. I. 68 (2) 121—176, Calcutta

61-67