@Research Paper <#LINE#>Multi-objective optimization of cold rolling system with lubricants using grey relation method<#LINE#>Devesh @Shrivastava,S.K. @Ganguly,R. @Banchhor <#LINE#>1-7<#LINE#>1.ISCA-RJEngS-2017-014.pdf<#LINE#>Department of Mechanical Engineering, Bhilai Institute of Technology, Durg, CG, India@Department of Mechanical Engineering, Bhilai Institute of Technology, Durg, CG, India@Department of Mechanical Engineering, Bhilai Institute of Technology, Durg, CG, India<#LINE#>3/11/2016<#LINE#>20/4/2017<#LINE#>Cold Rolling may be defined as the reduction of cross- section area of the metal stock or general shaping of the metal product through the use of rotating rolls below recrystallization temperature. During the cold rolling in a rolling mill synthetic lubricants consisting of mineral oils, biodegradable oil with chemical additives are being used for lubrication to obtain quality rolled surface. The quality of rolled product in cold rolling is largely influenced by surface roughness and chemical wear of rolled surface. Several factors contribute to quality of rolled product among those, composition of lubricant, amount of lubricant and operating speed of roller are more significant. In this study the identified factors were analysed using design of experiment approach. Robust design factor values were estimated by grey relation method. The result indicates that the selected process parameters significantly affect the quality of rolled product. The results are further conformed by conducting confirmation experiments.<#LINE#>Cao Jian-guo, Xu Xiao-Zhao, Song Mu-Qing , Zhang Jie, Gong Gui-Liang and Zeng Wei (2011).@Preset model of bending force or 6-high reversing cold rolling mill based on genetic algorithm.@J. Cent. South Univ. Technol., 18(5), 1487-1492. doi: 10.1007/s11771−011−0864−6.@Yes$Guo R.M. (1998).@Development of a single-stage transport matrix method using the beam on elastic foundation theory.@19th south eastern conference on theoretical and applied mechanics, may 2-5,ft. Lauderdale, USA.@Yes$Malvezzi M. and Valigi M.C. (2006).@Influence of plastic deformation models in full film lubrication of strip rolling.@aitc-ait 2006, international conference on tribology , 20-22 september, parma, italy.@Yes$Shen Sen-Tsan, Wu Yi-Ming, Huang Chih-Ching and Huang Min-Zhang (2008).@Influence of rolling chemicals on temper rolling process and anti rust performance of cold rolled steels.@china technical report, 21, 45-51.@Yes$Saboonchi Ahmad and Aghili Sayyed Majid (2006).@The effect of header geometry on temperature distribution in cold rolling.@international journal of ISSN, 2(2), 24-29.@Yes$Wendt Peter, Frech Winfried and Leifgen Uta (2007).@Cold rolling defects, “stickers” and countermeasures.@heat processing, International magazine for industrial furnaces, heat treatment plant and equipments, ISSN 1611-616x, 2, 127-129.@Yes$Sukhdeve Vikas and Ganguly S.K. (2015).@Utility of Taguchi based grey relational analysis to optimize any process or system.@International journal of advanced engineering research and studies, 4(2), 242-250, issn2249–8974.@Yes$Sreenivasulu Reddy and Rao C.S. (2012).@Application of gray relational analysis for surface roughness and roundness error in drilling of Al 6061 alloy.@international journal of lean thinking, 3(2), 67-78.@Yes$Guo R.M. and Malik A. (2005).@Development of a new crown/shape control model for cluster mills.@iron and steel technology, 2(8), 31-40.@Yes$Malik A.S. and Grandhi R.V. (2005).@Reliability analysis of rolled strip exit profile considering random nature of critical rolling variables.@the iron & steel technology conference and the 3rd international congress on the science & technology of steelmaking.@Yes @Short Review Paper <#LINE#>Intrusion detection technique for medical cyber physical systems using behavior rule: a review<#LINE#>Pooja Vitthalrao @Ingle,S.N. @Kakarwal <#LINE#>8-10<#LINE#>2.ISCA-RJEngS-2017-013.pdf<#LINE#>Department of Computer Sci. & Engg., P.E.S College of Engineering, Aurangabad, India@Department of Computer Sci. & Engg., P.E.S College of Engineering, Aurangabad, India<#LINE#>8/11/2016<#LINE#>7/4/2017<#LINE#>In the intrusion detection technique for medical cyber physical systems using behavior rule, we find the intrusion in medical cyber physical system using the behavior of medical device current value. In the behavior rule technique for intrusion detection, medical devices are connected in cyber physical system in which the patient’s security and is of the most importance factor. In that, all medical device standard value i.e. normal behavior of device is stored. The technique to transform behavior rules to a state machine like patient current value is transfer in to machine and checked the patient current value and device normal behavior value. So that, a device that is observed for its behavior can easily. is checked against the state machine for deviation from its behavior specification. If the device behavior is against the behavior rule, in that case intrusion occurs.<#LINE#>Arney David, Plourde Jeff, Schrenker Rick, Mattegunta Pratyusha, Whitehead Susan F. and Goldman Julian M. (2014).@Design Pillars for Medical Cyber-Physical System Middleware.@124.@Yes$Sztipanovits Janos, Ying Susan, Cohen I., Corman D., Davis J., Khurana H., Mosterman P.J., Prasad V. and Stormo L. (2013).@Strategic R & D opportunities for 21st century cyber physical system.@Technical report, Technical Report for Steering Committee for Foundation in Innovation for Cyber-Physical Systems, 2.@Yes$Lu Tianbo, Zhao Jinyang, Zhao Lingling, Li Yang and Zhang Xiaoyan (2015).@Towards a Framework for Assuring Cyber Physical System Security.@International Journal of Security and Its Applications, 9(3), 25-40.@Yes$Bansal Bindiya and Singh Kulwinder (2015).@Rule Based Intrusion Detection System to Identify Attacking Behaviour and Severity of Attacks.@International Journal of Advanced Research in Computer Science and Software Engineering, 5(1), 718-724.@Yes$Park Kyungseo, Lin Yong, Metsis Vangelis, Le Zhengyi and Makedon Fillia (2010).@Abnormal Human Behavioral Pattern Detection in Assisted Living Environments.@Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments, 9.@Yes$Deber Herve (2000).@An introduction to intrusion-detection systems.@Proceedings of Connect.@Yes$Anand Amrita and Patel Brajesh (2012).@An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols.@2(8), 94-98.@Yes$Scarfone Karen and Mell Peter (2007).@Guide to Intrusion Detection and Prevention Systems (IDPS).@NIST, Special Publication 800-94.@Yes$Sandhu Usman Asghar, Haider Sajjad, Naseer Salman and Ateeb Obaid Ullah (2011).@A Survey of Intrusion Detection & Prevention Techniques.@IPCSIT , 16, 67.@Yes$Mukesh Krishnan M.B. and P. Sheik Abdul Khader (2013).@Trust Based Intrusion Detection System for Mobile Ad Hoc Network.@1, 107-108.@No$Uppuluri P. and Sekar R. (2001).@Experiences with Specification-based Intrusion Detection.@International Workshop on Recent Advances in Intrusion Detection, 172-189.@Yes$Kumar B.Santosh, Sekhara T.Chandra Phani Raju, Ratnakar M., Baba Sk. Dawood and Sudhakar N. (2013).@Intrusion Detection System- Types and Prevention.@4(1), 77-82.@Yes$Mitchell Robert and Chen Ray (2015).@Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems.@IEEE Transactions on Dependable and Secure Computing, 12(1), 16-30.@Yes$Jahan Jameela, Karre Shilpa and Farha Saleha (2015).@Detection of Intrusions by Using Behavior Rule Specification Based Technique for Providing Security to MCPSs.@2, 904-909.@No