Volume 4, Issue 7, July 2015 (Title of Paper )

Page No.

Engaging the Anomalous Self of Individuals with Autism through Digital Doppelgangers: Transcendence from Self to i-Self

Authors: Noel Kok Hwee Chia, Meng Ee Wong

Abstract— The aim of this paper is fivefold: firstly, it provides a brief introduction to the latest criteria that have been used to define autism spectrum disorder (ASD); secondly, it examines the concept of Self that constitutes one of the dominant aspects of human experience, which, in turn, expresses an individual’s unique existence and hence, an object of the individual’s own reflective consciousness; thirdly, it explores the altered Self known as i-Self that can be represented by virtual icons such as mii, avatar and digital doppelganger within the context of the virtual world; fourthly, it also briefly examines the anomalous Self of an individual with ASD; and lastly, it illustrates how the transformational transition (also known as transcendence) of the digital Self from Self to i-Self can be attained by using an eclectic framework that is based on the underpinnings of social learning, information richness and self-perception theories placed within the authors’ proposed interactive model of psychosocial-physical-internet Selves. This paper attempts to explain how the avatar image-based virtual reality technology (AIbVRT) approach can help engage the anomalous Self of individuals with ASD through self-referential encoding and protean shaping processes and their resultant effects.

Keywords — Autism Spectrum Disorder, Avatar, Digital Doppelganger, Human User-Avatar Interaction, Self, Virtual Reality Technology

[1] American Psychiatric Association (2013). Diagnostic and statistical manual of mental disorders, 5th edition (DSM-5). Washington, DC: The Author.

[2] Chia, N.K.H. (2012). Autism enigma: The need to include savant and crypto-savant in the current definition. Academic Research International, 2(2), 234-240.

[3] The Straits Times (2012). US may narrow definition of autism: Fewer people would be diagnosed with disorder under proposed changes. The Straits Times, January 21, A12.

[4] Frith, U. (1989). Autism: explaining the enigma. Oxford, UK: Blackwell.

[5] Xue, M. (2001). Cytokinesis: Pieces of the autism puzzle. Paper presented at the Jonty Foundation Conference: Integrating Autism Research. Retrieved from

[6] Boccuto, L., et al. (2013). Prevalence of SHANK3 variants in patients with different subtypes of autism spectrum disorders. European Journal of Human Genetics, 21(3), 310-316.

[7] Rosenfeld, J.A., et al. (2010). Copy number variations associated with autism spectrum disorders contribute to a spectrum of neurodevelopmental disorders. Genetic Medicine, 12, 694-702.

[8] Schaefer, G.B., et al. (2010). Array comparative genomic hybridization findings in a cohort referred for an autism evaluation. Journal of Child Neurology, 25(12), 1498-1503.

[9] Eggertson, L. (2010). Lancet retracts 12-year-old article linking autism to MMR vaccines. Canadian Medical Association Journal, 182(4), 199-200.

[10] Pauc, R., & Norris, C. (2005). Is that my child? The brain food plan. London: Virgin Books.

[11] Frith, U., & Happe, F. (1999). Theory of mind and selfconsciousness: What is it like to be autistic? Mind and Language, 14(1), 1-22.

[12] Happe, F. (2003). Theory of mind and the self. Annals of the New York Academy of Sciences, 1001, 134-144.

[13] Jemel, B., et al. (2006). Impaired face processing in autism: Fact or artefact? Journal of Autism and Developmental Disorders, 36(1), 91- 106.

[14] Lind, S.E., & Bowler, D.M. (2009). Delayed self-recognition in children with autism spectrum disorder. Journal of Autism and developmental Disorders, 39(4), 643-650.

[15] Schultz, R.T., et al. (2000). Abnormal ventral temporal cortical activity during face discrimination among individuals with autism and Asperger syndrome. Archives of General Psychiatry, 57(4), 331–340.

[16] Oxford University Press (2015). Oxford advanced learner’s dictionary. Retrieved from http://www.oxforddictionaries.com/definition/english/self

[17] James, W. (1983). The principles of psychology. Cambridge, MA: Harvard University Press.

[18] Neisser, U. (1995). Criterion for an ecological self. In P. Rochat (Ed.), The self in infancy: Theory and research (pp.17-34). Amsterdam, The Netherlands: Elsevier.

[19] Chia, N.K.H. (2013, Spring). From philosophical self and psychological self to doppelganger self. Unlimited Human! 30-33.

[20] Jeannerod, M. (2003). The mechanism of self-recognition in humans. Behavioural Brain Research, 142, 1-15.

[21] James, W. (1891). The principles of psychology: Vol.1. Cambridge, MA: Harvard University Press.


Partial Zero Emission in Automobile Exhaust Application - Driving Toward a Clean & Green Future

Authors: Mylaudy Dr. S. Rajadurai, Sundaravadivelu M, Prakash K, Gowtham Arumugam, Suraj Sukumaran

Abstract- An aftertreatment system is developed to achieve partial zero emission using a cold start zeolite-based hydrocarbon (HC) trap in combination with the conventional three-way catalytic converter. The feasibility of the system is demonstrated in a 10 horse power (hp) gasoline engine. An approximately 93% reduction in cold start hydrocarbon emissions is achieved by the system. The “Flow Swing Over Valve” technology is implemented to route the exhaust gas to the hydrocarbon trap during cold start operation till the engine reaches stoichiometry. To divert exhaust flow, butterfly valves are placed in front of each reactor. The ability of ZSM-5 zeolite to absorb a wide range of HC molecules in the cold exhaust gas was discussed with HC desorption and activation of catalyst. Various experimental tests are conducted, and the results show a conformal reduction in HC and other exhaust gases. The combination system is operating with targeted back pressure. The potential benefits of using this technology to meet ULEV/SULEV standards are highlighted in this paper along with the challenges related to execution.

Keywords- Hydrocarbon, Cold Start, ZSM-5 Zeolite, Catalyst, Valve Technology, Stoichiometry.


[1] Steven D. Burch, Matthew A. Keyser, Chris P. Colucci, Thomas F. Potter, David K. Benson. Applications and Benefits of Catalytic Converter. Presented at SAE fuels and lubricants meeting (Dearborn MI), May 7, 1996 SAE Technical Paper 961134

[2] H-s Kim, K Min, C-L Myung and S Park. A Combined Experimental and Computational Approach to Improve Catalyst Flow Uniformity and Light -Off Behaviour

[3] Pannag R Sanketi, J. Carlos Zavala, J. K. Hedrick, M. Wilcutts, T. Kaga . A Simplified Catalytic Converter Model for Automotive Cold start Applications with Adaptive Parameter Fitting. In the 8th International Symposium on Advanced Vehicle Control, August 20-24, 2006, Taipei, Taiwan Paper No. AVEC060229

[4] Cécile Favre, Saïd Zidat. Emission Systems Optimization to Meet Future European Legislation. In SAE World Congress Detroit, Michigan March 8-11, 2004 SAE Technical Paper 2004-01-0138

[5] Ming Chen, Joe Aleixo, Shazam Williams & Thierry Leprince.CFD Modelling of 3-Way Catalytic Converters with Detailed Catalytic Surface Reaction Mechanism. SAE Technical Paper 2004-01-0148

[6] Nishizawa k, Momoshima, S,Koga M, and Tsuchida H,. Development of New Technologies Targeting Zero Emissions For Gasoline Engines, SAE Technical Paper 2001-01-0890

[7] Martyn V.Twigg. Automotive Exhaust Emission Control, Platinum Metals Rev,2003, 47,157-162

[8] Niraj Sharma, Anil Singh, Rajni Dhyani , Shweta Gaur. Emission Reduction From MRTS Projects. Atmospheric Pollution Research 721- 728.


Methods to Avoid Material Sensitization During Welding for Developing Corrosion Resistant Exhaust System

Authors: Mylaudy Dr. S. Rajadurai, Naveen. S, Afnas. M, Arun. T, Nirmal Kumar, Surendhar. S

Abstract—Manufacturing technology, as a process, revolves around material and material management. The choice of material based on its applications and the necessity of the performance plays as the major clause for manufacturing technology. Material selection itself has many constrains of which corrosion resistance, weld ability are critical in choice of material to suit needs. There are many factors to be considered during choice of material for welding like base material service temperature, compatibility to filler material, shielding gas, weld parameter compatibility - voltage, current and temperature, after weld treatment and cooling methodology etc. These parameters when not chosen to optimum suit, will lead to corrosion or material fracture. One such corrosion to be avoided is inter-granular corrosion near weld zone commonly termed as sensitization. Sensitization is the phenomenon during which carbides rich in chromium (M23C6 – 65% Cr) are formed along the grain boundaries during welding. Selection of base material, filler material, welding conditions and after weld treatment remains a prime clause to avoid this phenomenon. At conditions there will be restrictions to use materials that are prone to such corrosion and at such times after weld treatment are essential to avoid inter-granular corrosion (Sensitization). This paper explains the iterations carried out on 20 different welded samples prepared by result of DOE method. Experimentations are conducted to check the combinations that are susceptible to inter-granular corrosion near heat affected zones after welding. Paper also discusses about the after treatment methods that shall avoid sensitization.


[1] Du Toiy M, Van Rooyen G T, Smith D, IIW Doc IX-2213-06, IIW Doc IX-H-640-06, “An Overview of the Heat Affected Zone Sensitization and Stress Corrosion Cracking Behavior of 12% Chromium type 1.4003 Ferritic Stainless Steel”

[2] MohdWarikhAbd Rashid, mironGakim, ZulkifliMohdRosli and MohdAsyadiAzam, University Teknikal Malaysia Melaka(UTeM), “9465-9477, Formation of Cr23C6 during the Sensitization of AISI 304 Stainless Steel and its Effect to Pitting Corrosion”, published in International Journal of Electrochemical Science in 2012. www.electrochemsci.org

[3] Katharine B. Small, Regional Metallurgist, David A. Englehart, Metallurgist II, (2008), “Guide to Etching Specialty Alloys” Advanced Materials and Processes, www.cartech.com.

[4] Erika Weck and Elisabeth Leistner, “ Metallographic Instructions for Color Etching by Immersion, Part II: Behra Color Etchants and their Variants”, Struers.

[5] J. E. Garside, “ Process and Physical Metallurgy”, 2nd Edition 1967.

[6] K. Geels, “ Metallographic and Meterialographic Specimen Preparation”, ASTM, 2007.

[7] G. Petzow, “ Metallographic Etching”, 2nd Edition, ASM, Metals Park Ohio, 1999.

[8] N. S. Tsai and T. W. Eagar, “ The Size of the Sensitization Zone in 304 Stainless Steel Welds”, published in Materials for Energy Systems, 1984 American Society for Materials, Volume 6, No. 1, 1984.

[9] M. O. H. Amuda and Mridha, “305793 - An Overview of Sensitization Dynamics in Ferritic Steel Welds”, Advanced Material and Surface Engineering research unit. 2011 Copyright: International Journal of Corrosion, Volume 2011(2011), open article under Creative Commons Attribution License. http://dx.doi.org/10.1155/2015/305793.

[10] Toyota Engineering Standard – TSG2360G – Criteria for sensitization on welding part of ferritic stainless steel, Class C1, Established July 2012

[11] Toyota Engineering Standard – TSG2353G – Test method for oxalic acid etching for stainless steel, Class C1, Established October 2007


Use of Fly Ash Aggregates in Concrete and its Applications in Structures

Author: Prafull Vijay

Abstract-Two different batches of Lightweight aggregates one with using super plasticizer and another without using super plasticizer were manufactured using cold bonded technique. Based on the test results of their physical and mechanical properties, aggregates with super plasticizer were selected. Using the aggregates prepared from superplasticizer different type of concrete specimens were produced where the proportions of natural aggregates of different sizes differs in each specimen. Concrete specimens prepared from natural aggregates tested and compared with those lightweight aggregate concrete. Based on the test results of the physical and mechanical properties of the concrete cubes, specimens having the compressive strength almost same as that of natural aggregates specimens were chosen. This will ease the burden on depleting natural resources and at the same time it will also address some of environmental problems such as disposing industrial waste which are being used here in construction.

Keywords- Fly ash aggregates, light weight concrete, cold bonded technique, compressive strength, specimens.


[1] Priyadharshini.P, Mohan Ganesh.G, Santhi.A.S, 2011, Experimental study on Cold Bonded Fly Ash Aggregates, 2, ISSN 0976 – 4399

[2] Manas Ranjan Senapati. 2011. Fly ash from thermal power plantswaste management and overview. Current science.100-20: 1791-94.

[3] Mehta P. K. and Monteiro P.J.M. 2006. Concrete - Microstructure, Properties, and Materials. The Indian Concrete Institute, Chennai, India.

[4] Niyazi Ugur Kockal, Turan Ozturan, 2011, Durability of lightweight concretes with lightweight fly ash aggregates, Construction and Building Materials, 25, pp 1430–1438.

[5] G.C. Mays, R.A. Barnes, The performance of lightweight aggregate concrete structures in service, The Structural Engineer 69 (20) (1991) 351–361.

[6] M. Berra, G. Ferrara, Normal weight and total-lightweight high strength concretes: A comparative experimental study, in: Proc. of High-Strength Concrete 2d Int. Symp., ACI, SP-121, 1990, pp. 701– 733.

[7] BIS 2386 (Part III) - 1963, Indian Standard Methods of Test for Aggregates for Concrete Part Iii Specific Gravity, Density, Voids, Absorption and Bulking, (Reaffirmed 2002)

[8] BIS 10262 (2009) - Guidelines for concrete mix design proportioning

[9] BIS 2386 (Part IV) - 1963, Indian Standard Methods of Test for Aggregates for Concrete Part IV Mechanical Properties, (Reaffirmed 2002)


Solution to Intrinsic Issues of M2M in Cloud

Authors: Rahul M, Rashmi K, Rashmi N, Sowmya C L, Vinod Kumar K P

Abstract- Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans. Machine-toMachine (M2M) communication is a novel communication technology which has witnessed an unprecedented growth. M2M encompasses numerous market sectors: Security, Automotive, Buildings, Smart energy, Homes, Healthcare, Industry, Infrastructure, Transportation and Retail. The M2M industry refers to them as vertical markets because the applications were created as silo solutions that stand apart from enterprise environments. The vertical silo model is not an efficient way to communicate and it's also a barrier to further development. It's inefficient because the same wheel is reinvented for different applications, even when they are for the same sector. And it's a barrier because business processes like CRM[14] and ERP[14] employ a horizontal model, which has a common system architecture that enables component sharing. It's clear that the vertical silo model as described above map to the flat architecture of enterprise environments, nor can it provide cloud-centric M2M services. There are a number of intrinsic issues. This paper has 3 different solution for the above problem from 3 different vendors. All three vendors have not only embraced the concept, but they have also taken it forward in interesting and innovative ways.

Keywords- M2M, CMR, ERP, vertical silo,Cloud


[1] M2M Security Threat and Security Mechanism Research, Xiao Nie, Xiaobing Zhai, 3rd International Conference on Computer Science and Network Technology, 2013.

[2] M2M Communications in 3GPP LTE/LTE-A Networks: Architectures, Service Requirements, Challenges, and Applications, Fayezeh Ghavimi, Hsiao-Hwa Chen, Ieee Communication Surveys & Tutorials, 2015.

[3] A Cellular-Centric Service Architecture For Machine-To-Machine (M2m) Communications, Anthony Lo, Yee Wei Law, Martin Jacobsson, IEEE Wireless Communications, October 2013.

[4] M2M Service Platforms: Survey, Issues, and Enabling Technologies, Jaewoo Kim, Jaiyong Lee, Jaeho Kim, and Jaeseok Yun, Ieee Communications Surveys & Tutorials, 2014.

[5] System Architecture Challenges in the Home M2M Network, Michael Starsinic,IEEE, 2010.

[6] A Robust M2M Gateway for Effective Integration of Capillary and 3GPP Networks, Shubhranshu Singh, Kuei-Li Huang.

[7] Remote Subscription Management of M2M Terminals in 4G Cellular Wireless Networks, Isam Abdalla, Subbarayan Venkatesan, First IEEE International Workshop on Global Trends in SMART Cities, 2012.

[8] Mobility management in the HIP-based M2Moverlay network, Amine DHRAIEF, Mohamed Amine GHORBALI, Tarek BOUALI, Abdelfettah BELGHITH, Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2013.

[9] Design and Implementation of M2M-HLA Adaptor for Integration of ETSI M2M Platform and IEEE HLA-based Simulation System

[10] http://www.nojitter.com/feature/231001226/m2m-in-the-cloud-hasit-arrived

[11] http://www.iotevolutionworld.com/m2m/articles/170701-m2m-ahybrid-cloud.htm

[12] http://m2m.gemalto.com/application-enablement/m2m-cloudplatform.html [13] http://www.thingworx.com/thingworx-acquires-palantiri-systems

[14] http://www.webopedia.com/DidYouKnow/Hardware_Software/thedifference-between-crm-and-erp.html

[15] https://en.wikipedia.org/wiki/Internet_of_Things

[16] http://www.etsi.org/news-events

[17] https://www.nema.org/news/Pages/NEMA-Publishes-ANSI-C12-9- 2014-Standard-for-Test-Switches-and-Plugs-for-Transformer-RatedMeters.aspx

[18] http://whatis.techtarget.com/definition/OPEX-operationalexpenditure

[19] http://www.investopedia.com/terms/c/capitalexpenditure.asp

[20] http://www.gemalto.com/m2m/application-enablement-platform

[21] http://www.viewbiquity.com/Content/Shared/News/vci.pdf


Improvement in Performance of Visual Cryptography by Dividing in Matrix

Authors: Navdeep, Jitender Yadav

Abstract- Cryptography is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., cipher text). Decryption is the reverse, in other words, moving from the unintelligible cipher text back to plaintext. A cipher is a pair of algorithms that create the encryption and the reversing decryption. On a similar front like this, we have Visual Cryptography which deals with the protection and hiding of information which is based on the videos.

Keyword-- Encryption, Visual cryptography,


[1] Moni Naor and Adi Shamir “Visual cryptography” EUROCRYPT, pages 1{12, 1994.

[2] Luiz Velho and Jonas de Miranda Gomes “Digital halftoning with space lling curves” Computer Graphics, 25(4):81{90, July 1991.

[3] Chang-Chou Lin andWen-Hsiang Tsai “Visual cryptography for gray-level images by dithering techniques” Pattern Recognition Letters, 24:349{358, 2003.

[4] Young-Chang Hou “Visual cryptography for color images” Pattern Recognition, 36:1619{1629, August 2002.

[5] Der-Chyuan Lou, Hong-Hao Chen, Hsien-Chu Wu, and ChweiShyong Tsai “A novel authenticable color visual secret sharing scheme using non-expanded meaningful shares” Displays, 32:118{134, February 2011.

[6] C-C Chang, W-L Tai, and C-C Lin. Hiding a secret colour image in two colour images. The Imaging Science Journal, 53:229{240, May 2005.


Analysis of Object Oriented Software by Using Software Modularization Matrix

Authors: Anup, Mahesh Kumar

Abstract: - Software metrics deals with the measurement of the software product and the process by which it is developed. These measurements of the software process and product are studied and developed for use in modeling the software development process. These metrics and models are then used to estimate/predict product costs and schedules and to measure productivity and product quality. Following are the few metrics that are used to measure the software quality: Quality Metrics, Complexity Metrics, and Alstead’s Product Metric. The goal of software metrics is identification and measurement of the essential parameters that affect software development. Good metrics should facilitate the development of models that are capable of predicting process or product parameters. Thus ideal metrics should be: Simple, Objective, valid, Robust. The challenge for software engineer is to be able to interpret metric data on an on-going basis, so that continuous improvement can be made to maximize the quality potential within a limited project budget. So we improve quality measurement metric of software using modularization concept.

Keyword- HP Load Runner, Modularization Matrix


[1] G. Eason, B. Noble, and I. N. Sneddon, ―On certain integrals of Lips Software Metrics SEI Curriculum Module‖, SEI-CM-12-1.1, December 1988

[2] Tu Honglei1, Sun Wei1, Zhang Yanan1, ―The Research on Software Metrics and Software Complexity Metrics‖, International Forum on Computer Science-Technology and Applications, 2009

[3] http://www.pearsonhighered.com/samplechapter/0201729156.pdf.

[4] Burdman, J. 1999. Collaborative Web Development: Strategies and Best Practices for Web Teams. USA: Addison-Wesley

[5] Gerrard, P. (2000a). Risk-Based E-Business Testing: Part 1 – Risks and Test Strategy. Retrieved June 15, 2001, from the World Wide Web: http://www.evolutif.co.uk/articles/EBTestingPart1.pdf

[6] Crispin, L. (2001). Stranger in a Strange Land: Bringing QA to a Web Startup. Retrieved June 15, 2001, from the World Wide Web: http://www.stickyminds.com/docs_index/XUS247559file1.doc

[7] Miller, E. 2000. Website Testing Retrieved October 21, 2002 from the World Wide Web: http://www.soft.com/eValid/Technology/White.Papers/website.testin g.html.