Journal Vol – 14 No -4, August 2019

Canonical Equations of Singular Mechanical Systems in Terms of Quasi-coordinates

Authors:

Zheng Mingliang

DOI NO:

https://doi.org/10.26782/jmcms.2019.08.00001

Abstract:

The constrained mechanical systems by quasi-coordinates are more universal than by generalized coordinates. In this paper, the motion equations of nonconservative singular mechanical systems by quasi-coordinates in phase space are studied. The regularization forms of Boltzmann-Hamel equations for general holonomic and nonholonomic singular mechanical systems are derived. The results show that the canonical equations expressed by quasi-coordinates and quasivelocities have a completely single structure, which do not depend on the constraints or not. The nonholonomic singular mechanical system is a natural extension of the general holonomic singular mechanical system.

Keywords:

Quasi coordinates,Singular mechanical systems,Canonical Equaitons,

Refference:

I. Dirac P. A. M., “Quantization of Singular systems”, Can J Math, vol.2, pp:122-129, 1950.
II. Dirac P. A. M., “Lecture on Quantum Mechanics”, Book, Yeshi-va, UniversityPress, pp:8-16, 1964.
III. Dong L. X., Liang J. H., “Lie Symmetries and Conserved Quantities of Nonholonomic SingularMechanical Systems in Terms of Quasicoordinates”, Jiangxi Science, vol.33, no.1, pp:61-65, 2015.
IV. Fasso F., Sansonetto N., “Conservation of ‘Moving’ Energy in Nonholonomic Systems with Affine Constraints and Integrability of Spheres on Rotating Surfaces”, Journal of Non-Linear Science, vol.26, no.2, pp:519-544 , 2016.
V. Fu J. L., Liu R. W., “Lie symmetries and conserved quantities of nonholonomic mechanical systems in quasi coordinates”, Journal of Mathematical Physics, vol.20, no.1, pp: 63-69, 2000.
VI. Jahromi A. F., Bhat R. B., Xie W. F., “Integrated ride and handling vehicle model using Lagrangian quasi-coordinates”, International Journal of Automotive Technolgy, vol.16, no.2, pp:239-251, 2015.
VII. Li A. M., “Canonical symmetry of nonholonomic constraint systems”, Journal of Wuhan Technical College of Communication, vol.15, no.3, pp:1-3, 2013.
VIII. Li Z. P., “Constrained Hamiltonian systems and their symmetry properties”, Book, Beijing University of Technology Press, pp:3-8, 1999.

IX. Li Z. P., Jiang J. H., “Symmetries in Constrained Canonical System”, Book, Science Press, pp:9-19, 2002.
X. Li Z. P., “Generalized Noether theorem of regular form of nonholonomic singular systems and its inverse theorem”, HuangHuai Journal, vol.3, no.1, pp:8-16, 1992.
XI. Li Z. P., “Noether theorem of regular form and its application”, Science Bulletin, vol.36, no12, pp:954-958, 1991.
XII. Li Z. P., “Classical and quantum symmetry properties of Constrained Systems”, Book, Beijing University of Technology Press, pp:32-46, 1993.
XIII. Luo S. K.,“Mei symmetries, Noether symmetries and Lie symmetries of Hamilton canonical equations of singular systems’, Acta phys Sinica, vol.53, no.1, pp: 5-11, 2004.
XIV. Mahmoudkhani S., “Dynamics of a mass-spring-beam with 0:1:1 internal resonance using the analytical and continuation method”, International Journal of Non-Linear Mechanics, vol.97, pp:48-67, 2017.
XV. Mei F. X., Zhu H. P., “Lie symmetries and conserved quantities of singular Lagrange systems”, Journal of Beijing Institute of Technology, vol.9, no.1, pp:11-14, 2000.
XVI. Mei F. X., “The application of Li Group and Lie algebra to the constrained mechanical system”, Book, Science Press, pp:126-137, 1999.
XVII. Mei F. X., “Analytical mechanics (2)”, Beijing Institute of Technology Press, Book, pp:145-162, 2013.
XVIII. Qiao Y. F., Zhao S. H., “Lie symmetric theorem and inverse theorem of generalized mechanical systems in quasi coordinates”, Acta phys Sinica, vol.50, no.1, pp:1-7, 2001.
XIX. Wang X. J., Zhao X. L., Fu J. L., “Noether symmetry of nonholonomic systems in quasi coordinates in phase space”, Journal of Henan Institute of Education, vol.13, no.2, pp:21-23, 2004.
XX. Xu Z. X., Mei F. X., “Unified symmetry of general holonomic systems under quasi coordinates”, Acta phys Sinica, vol.54, no.12, pp:5521-5524, 2005.
XXI. Zhang Y., Xue Y., “Lie symmetry constraint Hamilton systems with the second type of constraints”, Acta phys Sinica, vol.50, no.5, pp:816-819, 2001.

View Download

Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks

Authors:

Amir Moradibaad, Ramin Jalilian Mashhoud

DOI NO:

https://doi.org/10.26782/jmcms.2019.08.00002

Abstract:

In the world today computer networks have a very important position and most of the urban and national infrastructure as well as organizations are managed by computer networks, therefore, the security of these systems against the planned attacks is of great importance. Therefore, researchers have been trying to find these vulnerabilities so that after identifying ways to penetrate the system, they will provide system protection through preventive or countermeasures. SVM is considered as one of the major algorithms for intrusion detection. One of the major problems is the time of training and the need to improve its efficiency when it comes to work with large dimensions. In this research, we try to study a variety of malware and methods of intrusion detection, provide an efficient method for detecting attacks and utilizing dimension reduction. Thus, we will be able to detect attacks by carefully combining these two algorithms and pre-processes that are performed before the two on the input data. The main question raised in this study is how we can identify attacks on computer networks with the above-mentioned method. In anomalies diagnostic method, by identifying behavior as a normal behavior for the user, the host, or the whole system, any deviation from this behavior is considered as an abnormal behavior, which can be a potential occurrence of an attack. In this research, the network intrusion detection system is used by anomaly detection method that uses the SVM algorithm for classification and SVD to reduce the size. The various steps of the proposed method include pre-processing of the data set, feature selection, support vector machine, and evaluation. The NSL-KDD data set has been used to teach and test the proposed model. In this study, we inferred the intrusion detection using the SVM algorithm for classification and SVD for diminishing dimensions with no classification algorithm. And also the KNN algorithm has been compared in situations with and without diminishing dimensions and the results have shown that the proposed method has a better performance than comparable methods.

Keywords:

intrusion detection rate,computer networks,SVM,

Refference:

I. Alesh Kumar Sharma, Satyam Maheswari. Network Intrusion detection by using PCA via SMO-SVM. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE). Volume 1, Issue 10, 2012.
II. Anke Meyer-Baese and Volker Schmid. Feature Selection and Extraction, In Pattern Recognition and Signal Analysis in Medical Imaging (Second Edition), edited by Anke Meyer-Baese and Volker Schmid, Academic Press, Oxford, Pages 21-69, ISBN 9780124095458, 2014.
III. Azencott, Robert, et al. “Automatic clustering in large sets of time series.” Contributions to Partial Differential Equations and Applications. Springer, Cham, 65-75, 2019.

IV. Baghban, Alireza, et al. “Application of MLP-ANN as novel tool for estimation of effect of inhibitors on asphaltene precipitation reduction.” Petroleum Science and Technology.1-6, 2018.
V. Gao, Junbin, Qinfeng Shi, and Tibero S. Caetano. “ Dimensionality reduction via compressive sensing,” Pattern Recognition Letters 33.9,1163-1170, 2012.
VI. Gunupudi Rajesh Kumar, Nimmala Mangathayaru and Gugulothu Narsimha. A feature clustering based Dimensionality reduction for intrusion Detection (FCBDR). IADIS International Journal on Computer Science and Information Systems. 12(1), 26-44, 2017.
VII. H. Om and A. Kunda, “A Hybrid System For Reducing the False Alarm Rate of Anomaly Intrusion Detection System”, in International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, 2012.
VIII. Hekmati, R., Azencott, R., Zhang, W., Paldino, M. “Localization of Epileptic Seizure Focus by Computerized Analysis of fMRI Recordings”.arXiv, 2018.
IX. Hekmati, R., et al. “Machine Learning to Evaluate fMRI Recordings of Brain Activity in Epileptic Patients, 2015.
X. Hekmati, Rasoul. “On efficiency of non-monotone adaptive trust region and scaled trust region methods in solving nonlinear systems of equations.” Biquarterly Control and Optimization in applied Mathematics 1.1, 31-40, 2016.
XI. Hyunsoo Kim, Peg Howland and Haesun Park.Dimension Reduction in Text Classification with Support Vector Machines. The Journal of Machine Learning Research archive. Volume 6, 12/1/2005. Pages 37-53, 2005.
XII. I. Ahmad, M. Hussain, A. Alghamdi, A. Alelaiwi, “Enhancing SVM Performance In Intrusion Detection Using Optimal Feature Subset Selection Based on Genetic Principal Components”, Neural Computing and
Applications, vol. 24, no. 7-8, pp. 1671-1682, 2014.
XIII. J.Shen and S. Mousavi, ”Least sparsity of p-norm based optimization problems with p>1, ” arXiv preprint arXiv:1708.06055, 2017.
XIV. Li Y, Qiu R, Jing S. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid. PLoSONE 13(2), 66-79, 2018.
XV. Luxburg U. V., Bousquet O., “Distance–based classification with Lipschitz functions”, Journal of Machine Learning Research, Vol. 5, pp. 669-695, 2004.
XVI. M. Hasan, M. Nasser, B. Pal, “Support Vector Machine and Random Forest Modeling for Intrusion Detection System (IDS)”, Journal of Intelligent Learning Systems and Applications, vol. 6, no. 1, 2014.
XVII. M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A Detailed Analysis of the KDD CUP 99 Data Set,” in Proceeding of the 2009 IEEE symposium on computational Intelligence in security and defense application (CISDA), 2009.
XVIII. Mingyu Fan, Nannan Gu, Hong Qiao, Bo Zhang, Dimensionality reduction: An interpretation from manifold regularization perspective, Information Sciences, Volume 277, 1, 694-714, ISSN 0020-0255, 2014.

XIX. N. Revathy and R. Balasubramanian, “GA-SVM wrapper approach for gene ranking and classification using expressions of very few genes,” Journal of Theoretical and Applied Information Technology, vol. 40, no. 2, pp. 113–119, 2012.
XX. Najarian, M., et al. “Evolutionary Vertical Size Reduction: A Novel Approach for Big Data Computing”. International Journal of Mathematics and its Applications, 2018. XXI. NSL-KDD data set for network-based intrusion detection systems.” Available on: http://nsl.cs.unb.ca/NSL-KDD/, 2009.
XXII. R. Lippmann, J. Haines, D. Fried, J. Korba, and K. Das, “The 1999 DARPA off-line intrusion detection evaluation,” Computer Networks, 34, pp.579-595, 2000.
XXIII. R. Ravinder Reddy; Y Ramadevi ; K. V. N Sunitha. Effective discriminant function for intrusion detection using SVM. 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI). DOI: 10.1109/ICACCI.2016.7732199, 2016.
XXIV. S. Ahmadian, H Malki, AR Sadat , “Modeling Time of Use Pricing for Load Aggregators Using New Mathematical Programming with Equality Constraints”, 5th International Conference on Control, Decision, 2018.
XXV. S. J. Stolfo, W. Fan, A. Prodromidis, P. K. Chan, W. Lee, “Cost-sensitive modeling for fraud and intrusion detection: Results from the JAM project”, in Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, 2000.
XXVI. S. Maldonado, R. Weber, and J. Basak, “Simultaneous feature selection and classification using kernel-penalized support vector machines,” Information Sciences, vol. 181, no. 1, pp. 115–128, 2011.
XXVII. Sebastián Maldonado, Juan Pérez, Richard Weber, Martine Labbé, Feature selection for Support Vector Machines via Mixed Integer Linear Programming, Information Sciences, Volume 279, 20, Pages 163-175, 2014.
XXVIII. Vinodhini G., Chandrasekaran R.M. Sentiment Mining Using SVM-Based Hybrid Classification Model. In: Krishnan G., Anitha R., Lekshmi R., Kumar M., Bonato A., Graña M. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 246, 2014.
XXIX. Vinodhini G., Chandrasekaran R.M. Sentiment Mining Using SVM-Based Hybrid Classification Model. In: Krishnan G., Anitha R., Lekshmi R., Kumar M., Bonato A., Graña M. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 246. Springer, New Delhi, 2014.
XXX. Xintao Qiu, Dongmei Fu and Zhenduo Fu.An Efficient Dimensionality Reduction Approach for Small-sample Size and High-dimensional Data Modeling. journal of computers, vol. 9, no. 3, march, 2014.
XXXI. Zena M. Hira and Duncan F. Gillies (2015). A Review of Feature Se lection and Feature Extraction Methods Applied on Microarray Data. Advances in Bioinformatics, 2015.

View Download

An Efficient Statistical Feature Selection Based Classification

Authors:

K. Laxmi Narayanamma, R. V. Krishnaiah, P. Sammulal

DOI NO:

https://doi.org/10.26782/jmcms.2019.08.00003

Abstract:

Initial identification about pancreatic cancer (PC) will be a very challenging task due to particular symptoms of cancer happens only at an advanced phase & a dependable screening device to detect high danger patients. To know this challenge, a new method for decreasing the features might have been developed, tested & trained with the use of the health information of 800,114 defendants caught in the “national health interview survey (NHIS)”& Pancreatic, Colorectal, Lung, & “PLCO (ovarian cancer)” datasets, together risk of cancer might have been evaluated at a distinct level by including 18 characteristics under the recommended. The recognized “hybrid feature selection method” attained a true positive rate of 87.3 & 80.7% a true negative rate 0.86 & 0.85 for the training and testing associates, individually.

Keywords:

American Cancer Society (ACS),Machine learning (ML),Feature selection (FS),Feature extraction (FE),pancreatic cancer (PC),

Refference:

I. American Cancer Society (2017). Cancer Facts & Figures 2017. Atlanta, GA: American Cancer Society.
II. Arslan, A. A., Helzlsouer, K. J., Kooperberg, C., Shu, X.-O., Steplowski, E., Bueno-De-Mesquita, H. B., et al. (2010). Anthropometric measures, body mass index, and pancreatic cancer: a pooled analysis from the Pancreatic Cancer Cohort Consortium (PanScan). Arch. Intern. Med. 170, 791–802. doi:
10.1001/archinternmed.2010.6.
III. Association, A. D. (2014). Diagnosis and classification of diabetes mellitus. Diabetes Care. 37, S81–S90. doi: 10.2337/dc10-S062
IV. Bakpo, F., and Kabari, L. (2011). “Diagnosing skin diseases using an artificial neural network,” in Artificial Neural Networks-Methodological Advances and Biomedical Applications, ed K. Suzuki (InTech), 253–270.
V. Ben, Q., Xu, M., Ning, X., Liu, J., Hong, S., Huang, W., et al. (2011). Diabetes mellitus and risk of pancreatic cancer: a meta-analysis of cohort studies. Eur. J. Cancer. 47, 1928–1937. doi: 10.1016/j.ejca.2011.03.003
VI. Blewett, L. A., Rivera Drew, J. A., Griffin, R., King, M. L., and Williams, K.C. W. (2017). IPUMS Health Surveys: National Health Interview Survey, Version 6.2 [dataset]. Minneapolis, MN: University of Minnesota.
VII. Boursi, B., Finkelman, B., Giantonio, B. J., Haynes, K., Rustgi, A. K., Rhim, A. D., et al. (2017). A clinical prediction model to assess risk for pancreatic cancer among patients with new-onset diabetes. Gastroenterology. 152, 840 – 850.e843. doi: 10.1053/j.gastro.2016.11.046
VIII. Boursi, S. B., Finkelman, B., Giantonio, B. J., Haynes, K., Rustgi, A. K., Rhim, A., et al. (2018). A clinical prediction model to assess risk for pancreatic cancer among patients with pre-diabetes. J. Clin. Oncol. 36(15_Suppl.). doi: 10.1200/JCO.2018.36.15_suppl.e16226
IX. Iodice, S., Gandini, S., Maisonneuve, P., and Lowenfels, A. B. (2008). Tobacco and the risk of pancreatic cancer: a review and meta-analysis. Langenbecks Arch. Surg. 393, 535–545. doi: 10.1007/s00423-007-0266-2
X. Klein, A. P., Lindström, S., Mendelsohn, J. B., Steplowski, E., Arslan, A. A., Bueno-De-Mesquita, H. B., et al. (2013). An absolute risk model to identify individuals at elevated risk for pancreatic cancer in the general population. PLoS ONE. 8:e72311. doi: 10.1371/journal.pone.0072311.
XI. Lucenteforte, E., La Vecchia, C., Silverman, D., Petersen, G., Bracci, P., Ji, B. A., et al. (2011). Alcohol consumption and pancreatic cancer: a pooled analysis in the International Pancreatic Cancer Case–Control Consortium (PanC4). Ann. Oncol. 23, 374–382. doi: 10.1093/annonc/mdr120.
XII. Michaud, D. S., Vrieling, A., Jiao, L., Mendelsohn, J. B., Steplowski, E., Lynch, S. M., et al. (2010). Alcohol intake and pancreatic cancer: a pooled analysis from the pancreatic cancer cohort consortium (PanScan). Cancer Causes Control. 21, 1213–1225. doi: 10.1007/s10552-010-9548-z.
XIII. Poley, J. W., Kluijt, I., Gouma, D. J., Harinck, F., Wagner, A., Aalfs, C., et al. (2009). The yield of first-time endoscopic ultrasonography in screening individuals at a high risk of developing pancreatic cancer. Am. J. Gastroenterol. 104:2175–2181. doi: 10.1038/ajg.2009.276
XIV. Pannala, R., Basu, A., Petersen, G. M., and Chari, S. T. (2009). New-onset diabetes: a potential clue to the early diagnosis of pancreatic cancer. Lancet Oncol. 10, 88–95. doi: 10.1016/S1470-2045(08)70337-1
XV. Pannala, R., Leirness, J. B., Bamlet, W. R., Basu, A., Petersen, G. M., and Chari, S. T. (2008). Prevalence and clinical profile of pancreatic cancer– associated diabetes mellitus. Gastroenterology. 134, 981–987. doi:10.1053/j.gastro.2008.01.039

View Download

Finite Element Simulation of Thermal Behavior of Dry Friction Clutch System during the Slipping Period

Authors:

Jenan S. Sherza, Ihsan Y. Hussain, Oday I. Abdullah

DOI NO:

https://doi.org/10.26782/jmcms.2019.08.00004

Abstract:

Most of failures in the friction clutches occur due to the excessive heat generated due to friction between various parts, and this heat causes high temperatures leading to high thermal stresses. In the present research paper, numerical simulation had been developed using finite element method to simulate the thermal behavior of the dry friction clutch. Three-dimensional finite element model was made and analyzed using ANSYS/Workbench sofware18. The friction clutch system was firstly modeled mathematically and solved numerically to determine the transient thermal response of the clutch disc. The two fundamental methods of uniform wear and uniform pressure are assumed. The applied torque during the sliding period was constant. The temperature and heat generated were estimated for each clutch part (pressure plate, clutch disc and flywheel) using heat partition ratio. The assumptions that are inherent in the derivation of the governing equations are presented which followed up by the appropriate boundary conditions. The results show that the maximum temperature values for uniform pressure condition are greater than those for uniform wear condition. Also, the temperature value increased with time and approximately reaches the highest value at the middle of the sliding period when the applied torque is constant with time and then decreased to the final values at the end of slipping period.

Keywords:

Dry friction clutch,thermal analysis,3D FEM,

Refference:

I. Balázs Czél, Károly Váradi, Albert Albers, and Michael Mitariu, “Fe thermal analysis of aceramic clutch”, Journal of Tribology International, 42(5):714–723, 2009.
II. Belhocine, Ali, and Mostefa Bouchetara, “Thermomechanical modeling of dry contacts in automotive disc brake”, International Journal of Thermal Sciences 60:161-170, 2012.
III. Choon Yeol Lee, Il Sup Chung, and Young Suck Chai, “Finite element analysis of an automobile clutch system”, Journal Key Eng. Materials, 353-358:2707-2711, 2007.
IV. E. Mouffak, M. Bouchetara, “Transient thermal behavior of automotive dry clutch discs by using Ansys software”, ISSN 1392-1207. MECHANIKA, Vol. 22, No. 6, pp. 562−570 (2016).
V. Faramarz Talati , Salman Jalalifar, “Analysis of heat conduction in a disk brake system”, jornal of Heat Mass Transfer 45:1047–1059, 2009.
VI. Jenan S. Sherza, Ihsan Y. Hussain, Oday I. Abdullah. “Heat flux in friction clutch with time dependent torque and angular velocity”, International Conference on Advanced Science and Engineering (ICOASE), 2018.
VII. Oday I. Abdullah, J. Schlattmann, “Effect of band contact on the temperature distribution for dry friction clutch”, World Acad. Sci., Eng. and Technol., Int. Sci. Index 6.9 (2012): 150-160.
VIII. Oday I. Abdullah, Josef Schlattmann , “computation of surface temperatures and energy dissipation in dry friction clutch for varying torque with time”, International Journal of Automotive Technology, Vol.
15, No. 5, pp. 733−740 (2014).
IX. Oday I. Abdullah, Josef Schlattmann , “Thermal behavior of friction clutch disc based on uniform pressure and uniform wear assumptions”, Friction 4(3): 228–237 (2016).
X. Oday I. Abdullah, Josef Schlattmann , “Thermal behavior of friction clutch disc based on uniform pressure and uniform wear assumptions”, FME Transactions vol.46, pp.33–38 (2018).
XI. Yevtushenko, Kuciej A. A., M., and Yevtushenko O., “Three-element model of frictional heating during braking with contact thermal resistance and time-dependent pressure”, International Journal of Thermal Sciences, 50(6):1116-1124, 2011.
XII. Yogesh Emeerith, Dr. Rabindra Nath Barman, “Structural and Thermal Analysis of a Single Plate Dry Friction Clutch Using Finite Element Method (Fem)” IDL – International Digital Library Of Technology &
Research, volume 1, Issue 5, May (2017).

View Download

Solar Penetration Analysis Techniques for Photovoltaic Energy and Smart Grid Management

Authors:

Zahoor Ahmed, Junaid Zaffar, Rashid Aleem, Ehtasham-ul-Haq, Nurali Pyarali, Mehr E Munir

DOI NO:

https://doi.org/10.26782/jmcms.2019.08.00005

Abstract:

As the world thrives for power in order to strengthen its industrial demands and economy, traditional power sources are becoming more and more difficult to fulfill the rising demands. Renewable energy demand in the world whether third world countries or leading ones of the era, has seen a boost in recent decades. Photovoltaic and solar energy is an ongoing trend in power system designers, researchers and companies. As sun is the free source of energy, the world now a days achieves 30% of its total energy from it. Solar power is sporadic and is not constant, as solar source at the ground level is extremely reliant on clouds density, atmospheric conditions with other restrictions. These limitations become a challenging task for engineers and energy managers to focus the energy constraints and came up with managing plan in order to produce and manage energy efficiently in smart grids. This paper focuses on energy constraints of both solar resource and PV power alongside smart grid energy management.

Keywords:

Solar energy,PV cells, energy forecast,smart grid management,

Refference:

I. A. Sfetsos and A. H. Coonick, “Univariate and multivariate forecasting of
hourly solar radiation with artificial intelligence techniques,” Solar Energy,
vol. 68, no. 2, pp. 169–178, Feb. 2000.
II. B. Kumar Sahu, “A study on global solar PV energy developments and
policies with special focus on the top ten solar PV power producing
countries,” Renewable & Sustainable Energy Reviews, vol. 43, no. 0, pp.
621–634, Mar. 2015.
III. D. Yang, C. Gu, Z. Dong, P. Jirutitijaroen, N. Chen, and W. M. Walsh,
“Solar irradiance forecasting using spatial-temporal covariance structures
and time-forward kriging,” Renewable Energy, vol. 60, no. 0, pp. 235–245,
Dec. 2013.
IV. E. Geraldi, F. Romano, and E. Ricciardelli, “An advanced model for the
estimation of the surface solar irradiance under all atmospheric conditions
using MSG/SEVIRI data,” IEEE Transactions on Geoscience and Remote
Sensing, vol. 50, no. 8, pp. 2934–2953, Aug. 2012.
V. F. Bizzarri, M. Bongiorno, A. Brambilla, G. Gruosso, and G. S. Gajani,
“Model of photovoltaic power plants for performance analysis and
production forecast,” IEEE Transactions on Sustainable Energy, vol. 4, no.
2, pp. 278–285, Apr. 2013.
VI. F. Ueckerdt, R. Brecha, and G. Luderer, “Analyzing major challenges of
wind and solar variability in power systems,” Renewable Energy, vol. 81,
no. 0, pp. 1–10, Sep. 2015.
VII. H.-T. Yang, C.-M. Huang, Y.-C. Huang, and Y.-S. Pai, “A weather-based
hybrid method for 1-day ahead hourly forecasting of PV power output,”
IEEE Transactions on Sustainable Energy, vol. 5, no. 3, pp. 917–926, Jul.
2014.
VIII. IEA-PVPS, “Annual Report 2014 (AR2014),” May 2015.
IX. M. Hosenuzzaman, N. A. Rahim, J. Selvaraj, M. Hasanuzzaman, A. B. M.
A. Malek, and A. Nahar, “Global prospects, progress, policies, and
environmental impact of solar photovoltaic power generation,” Renewable
& Sustainable Energy Reviews, vol. 41, no. 0, pp. 284–297, Jan. 2015.

X. P. Bacher, H. Madsen, and H. A. Nielsen, “Online short-term solar power
forecasting,” Solar Energy, vol. 83, no. 10, pp. 1772–1783, Oct. 2009.
XI. R. G. Wandhare and V. Agarwal, “Reactive power capacity enhancement of
a PV-grid system to increase PV penetration level in smart grid scenario,”
IEEE Transactions on Smart Grid, vol. 5, no. 4, pp. 1845– 1854, Jul. 2014.
XII. R. Shah, N. Mithulananthan, R. C. Bansal, and V. K. Ramachandaramurthy,
“A review of key power system stability challenges for largescale PV
integration,” Renewable & Sustainable Energy Reviews, vol. 41, no. 0, pp.
1423–1436, Jan. 2015.
XIII. R. Perez, E. Lorenz, S. Pelland, M. Beauharnois, G. Van Knowe, K.
Hemker Jr, et al., “Comparison of numerical weather prediction solar
irradiance forecasts in the US, Canada and Europe,” Solar Energy, vol. 94,
no. 0, pp. 305–326, Aug. 2013.
XIV. R. Perez, S. Kivalov, J. Schlemmer, K. Hemker Jr, D. Renn´e, and T. E.
Hoff, “Validation of short and medium term operational solar radiation
forecasts in the US,” Solar Energy, vol. 84, no. 12, pp. 2161–2172, Dec.
2010.
XV. S. J. Steffel, P. R. Caroselli, A. M. Dinkel, J. Q. Liu, R. N. Sackey, and N.
R. Vadhar, “Integrating solar generation on the electric distribution grid,”
IEEE Transactions on Smart Grid, vol. 3, no. 2, pp. 878–886, Jun. 2012.
XVI. S. D. Campbell and F. X. Diebold, “Weather forecasting for weather
derivatives,” Journal of the American Statistical Association, vol. 100, no.
469, pp. 6–16, Mar. 2005.
XVII. S. I. Nanou, A. G. Papakonstantinou, and S. A. Papathanassiou, “A generic
model of two-stage grid-connected PV systems with primary frequency
response and inertia emulation,” Electric Power Systems Research, vol.
127, no. 0, pp. 186–196, Oct. 2015.
XVIII. S. Eftekharnejad, G. T. Heydt, and V. Vittal, “Optimal generation dispatch
with high penetration of photovoltaic generation,” IEEE Transactions on
Sustainable Energy, vol. 6, no. 3, pp. 1013–1020, Jul. 2015.
XIX. T. Sueyoshi and M. Goto, “Photovoltaic power stations in Germany and the
United States: A comparative study by data envelopment analysis?” Energy
Economics, vol. 42, no. 0, pp. 271–288, Mar. 2014.
XX. T. Esram and P. L. Chapman, “Comparison of photovoltaic array maximum
power point tracking techniques,” IEEE Transactions on Energy
Conversion, vol. 22, no. 2, pp. 439–449, 2007.
XXI. Z. Dong, D. Yang, T. Reindl, and W. M. Walsh, “Satellite image analysis
and a hybrid ESSS/ANN model to forecast solar irradiance in the tropics,”
Energy Conversion and Management, vol. 79, no. 0, pp. 66–73, Mar. 2014.
XXII. Z.-Y. Zhao, S.-Y. Zhang, B. Hubbard, and X. Yao, “The emergence of the
solar photovoltaic power industry in China,” Renewable & Sustainable
Energy Reviews, vol. 21, no. 0, pp. 229–236, May 2013.

View Download

α -ideals in a 0-distributive lattice

Authors:

R. M. Hafizur Rahman

DOI NO:

https://doi.org/10.26782/jmcms.2019.08.00006

Abstract:

In this paper we have studied the α -ideals in a 0-distributive lattice. We have described the α -ideals by two definition and proved that these are equivalent. We have given several characterizations. They have proved that a lattice L is disjunctive if and only if each ideal is an α -ideals. We have also included a prime separation theorem for α -ideals. At the end we have studied the α -ideals in a sectionally quasi-complemented lattice.

Keywords:

α -ideals,0-distributive lattice,separation theorem,quasicomplemented lattice,

Refference:

I. Ayub Ali, Noor, A. S. A. and Islam, A. K. M. S. Annulets in a
Distributive Nearlattice; Annals of Pure and Applied Mathematics, Vol.
3, No. 1, (2012), 91-96.
II. Ayub Ali, R. M. Hafizur Rahman and A. S. A. Noor; Prime Separation
Theorem for α – ideals in a 0-distributive Lattice; Journal of Pure and
Applied Science, Assam, India. 12(1) (2012), pp. 16-20.
III. Ayub Ali, R. M. Hafizur Rahman & A. S. A. Noor; On Semi prime n –
ideals in Lattices; Annals of Pure and Applied Mathematics. Vol. 2, No.-
1, Page: 10-17 (2012).
IV. Md. Ayub Ali, R. M. Hafizur Rahman, A. S. A. Noor & Jahanara Begum;
Some characterization of n -distributive lattices; Institute of Mechanics of
Continua and Mathematical Sciences, Township, Madhyamgram, Kolkata-
700129, Volume-7, Number-2, Page: 1045-1055 (2013).
V. Cornish, W. H., Annulets and α -ideals in a distributive lattice; J.
Aust. Math. Soc. 15(1) (1975), 70-77.
VI. Jaidur Rahman, A study on 0-distributive near lattice; Ph. D Thesis,
Khulna university of Engineering and Technology.
VII. Jayaram, C., Prime α α ideals in a 0-distributive lattice; Indian J.
Pure Appl. Math. 173 (1986), 331-337.
VIII. Pawar, Y. S and Thakare, N. K., 0-Distributive semilattice; Canad.
Math. Bull. Vol. 21(4) (1978), 469-475.
IX. Pawar, Y. S and Thakare, N. K., 0-Distributive semilattices; Canad.
Math. Bull. Vol. 21(4) (1978), 469-475.

X. R. M. Hafizur Rahman; Annulates in a 0-distributive lattice, Annals
of Pure and Applied Mathematics, Vol. 3, No. 1, (2012), 91-96.
XI. R. M. Hafizur Rahman, Md. Ayub Ali & A. S. A. Noor; On Semi prime
Ideals of a Lattice; Journal Mechanics of Continua and Mathematical
Sciences, Township, Madhyamgram, Kolkata-700129. Volume-7,
Number-2, Page: 1094-1102 (2013).
XII. Varlet, J. C., A generalization of the notion of pseudo-complementedness;
Bull. Soc. Sci. Liege, 37 (1968), 149-158.

View Download

Investigating the behavior of steel structures with honeycomb damper against blast and earthquake loads

Authors:

Navid Farrokhnia, Seyed Mojtaba Movahedifar

DOI NO:

https://doi.org/10.26782/jmcms.2019.08.00007

Abstract:

Earthquake is one of the most important natural phenomena and humans have always been trying to control its adverse effects. In the past century, the development of cities and the high investment in them and many financial and life losses caused by earthquake and, on the other hand, the ever-increasing advances in science and technology that allow for more accurate knowledge of the factors causing the earthquake and how to control it have made humans reduce its financial and life losses by making suitable and earthquake resistant structures. Today, due to the increasing growth of terrorist activities, the risk of structures facing blast loads has also increased. The occurrence of various terrorist incidents in relation to important structures around the world has caused that in recent years, blast loads become the focus of special attention. This article examines the connection of steel structures with honeycomb damper by applying blast and earthquake loads in Abaqus finite element software. Three frame models with 6, 9 and 13 floors have been considered for the study. For air blast, 10 Kg of TNT have been used. To apply earthquake records, seven pairs of accelerograms have been employed. By examining the results of numerical modeling in Abaqus finite element software, it can be observed that as a result of applying blast load, the damper could not react. But due to applying earthquake records, the damper’s behavior was very good so that at the beamcolumn joint, the highest amount of stress was created in the damper. Considering that applying the blast loading occurs in less than a few milliseconds and the structure does not have enough time to react to this load, blast load failure has been local and sectional.

Keywords:

Blast,honeycomb damper,Abaqus,moment frame,

Refference:

I. Benavent, C.A. A brace‐type seismic damper based on yielding the walls of
hollow structural sections. Engineering Structures; 32: 1113‐1122, 2010..
II. Bergman, D.M., Goel, S.C. Evaluation ofcyclic testing ofsteelplate device
foradded damping and stiffness. Report no. UMCE 87‐10; The University of
Michigan, Ann Arbor, MI., 1987.
III. Carleone, J. “Tactical Missile Warheads”, Volume 155, American Institute
of Aeronautics and Astronautics,1993.
IV. Chan, R.W.K., Albermani, F. Experimental study of steel slit damper for
passive energy dissipation. Engineering Structures; 30:1058–1066, 2008..
V. Design and implementation of steel structures. Tenth chapter of the National
Building Regulations, Iran Development Publishing, Tehran, 2013.
VI. Inoue, K., Kuwahara, S. Optimum strength ratio of hysteretic damper.
Earthquake Engineering and Structural Dynamics; 27:577–588, 1998.
VII. Johnson, G. And Cook, W. H., “Constitutive Model And Data For Metals
Subjected To Large Strains”, High Strain Rates And High Temperatures;
Proceedings Of The Seventh International Symposium On Ballistics; Pp. 541-
P547, 1983 .
VIII. Kasai, K., Ito, H., Ooki, Y., Hikino, T., Kajiwara, K., Motoyui, S., Ozaki, H.,
Ishii, M. Full‐scale shake table tests of 5‐story steel building with various
dampers. In: 7th International Conference on Urban Earthquake Engineering
(7CUEE) & 5th International Conference on Earthquake Engineering
(5ICEE), Japan, 2010.

IX. Kasai, K., Ooki, Y., Ishii, M., Ozaki, H., Ito, H., Motoyui, S., Hikino, T.,
Sato, E. Value‐added 5‐story steel frame and its components: Part 1‐
full‐sacale damper tests and analysis. In: 14th WCEE, China, 2008.
X. Kelly, J.M., Skinner, R.I., Heine, A.J. Mechanisms of energy absorption in
special devices for use in earthquake resistant structures. Bulletin of New
Zealand Society for Earthquake Engineering; 5(3):63–88, 1972..
XI. Koetakaa, Y., Chusilp, P., Zhang, Z., Ando, M., Suita, K., Inoue, K., Uno, N.
Mechanical property of beam‐to‐column moment connection with hysteretic
dampers for column weak axis. Engineering Structures; 27:109–117, 2005.
XII. Mazza, F., Vulcano, A. Displacement‐based seismic design procedure for
framed buildings with dissipative braces. (a) Part I: Theoretical formulation;
(b) Part II: Numerical results. In: Seismic Engineering International
Conference commemorating the 1908 Messina and Reggio Calabria
Earthquake (MERCEA08), Italy, 2008.
XIII. Oh, S.H., Kim, Y.J., Ryu, H.S. Seismic performance of steel structures with
slit dampers. Engineering Structures; 31:199‐208., 2009.
XIV. Ohgi, K., Nakata, Y., Ohuchi, H., Tsunkake, H. A Horizontal Loading Test of
Viaduct Structure Model Retrofitted by Arc Shaped Damper. Memoirs of the
Faculty ofEngineering, Osaka City; 50:45‐54, 2009.
XV. Permanent Committee for Revising Building Design Regulations against
Earthquake. Building Design Regulations against Earthquake – Standard 84 –
2800, Fourth Edition, Tehran: Building and Housing Research Center, 2013.
XVI. Shimabata, T., Nakata, Y., Ohuchi, H., Tsunkake, H., Shimada, I. “A study
on hysteretic characteristics of Arc‐Shaped damper.” Memoirs of the Faculty
of Engineering, Osaka City; 48: 17‐25, 2007.
XVII. Skinner, R.J., Kelly, J.M., Heine, A.J., Hysteresis dampers for
earthquake‐resistant structures. Earthquake Engineering and Structural
Dynamics; 3:287–296, 2016.
XVIII. Wittaker, A.S., Bertero, V.V., Thompson, C.L., Alonso, L.J. Seismic testing
of steel plate energy dissipation devices. Earthquake Spectra; 7(4):563–604,
1991.
XIX. Y Nakata, H Ohuchi, H Tsunkake. A study on application of hysteretic
damper to excisting rail way viaduct structure. Memoirs of the Faculty of
Engineering, Osaka City; 49:43‐49, 2008.

View Download

Comparison between Alcoholic and Control Subjects in EEG signals Using Classification Methods

Authors:

Shaymaa Adnan Abdulrahman

DOI NO:

https://doi.org/10.26782/jmcms.2019.08.00008

Abstract:

Alcoholism could be identified through analyzing electroencephalogram (EEG) signals. Yet, it is difficult to analyze with multi-channel EEG signal since it is frequently needing long time for execution and complex calculations. The presented paper proposed 13 optimal channel to feature extraction. Firstly, 1200 recordings of biomedical signals will be presented for extracting the sample entropy. Statistical analysis approach will be utilized for the purpose of choosing the best channels for identifying abnormalities in alcoholics. Secondly four classifiers are applied at the decision level, Naïve Bayes, SVM, Logistic Regression, KNN, the accuracy was 80.1%,92.5%, 73.7% and 90.3%Respectively, in this study the SVM classifier is more accuracy .

Keywords:

EEG signal,optimal channel,abnormalities in alcoholics,SVM classifier,

Refference:

I. Andreas H, Bernhard O, Christof S, Valdez AC, Schaar AK, Ziefle M,
Dehmer M (2013) On graph entropy measures for knowledge discovery
from publication network data. In: Cuzzocrea A, Kittl C, Simos DE,
Weippl E, Xu L (eds) Availability, reliability, and security in
information systems and HCI, pp 354–362. Springer, Berlin.
II. Abdulkader, S.N., Atia, A., Mostafa, M.S.M.: Brain computer
interfacing: applications andchallenges. Egypt. Inf. J. 16, 213–230
(2015).
III. Ahmadi N., Pei Y., Pechenizkiy M., Detection of Alcoholism based on
EEG Signals and Functional Brain Network Features Extraction , 2017
IEEE 30th International Symposium on Computer-Based Medical
Systems.
IV. Bache K, Lichman M (2013) UCI machine learning repository.
University of California, Irvine, School of Information and Computer.
http://archive.ics.uci.edu/ml.
V. Cempírek, M. – Šťastný, J. The optimization of the EEG-based biometric
classification. Applied Electronics. 2007, pp. 25-28.
VI. Dehmer M, Mowshowitz A (2011) A history of graph entropy
measures.Inf Sci 181(1):57–78.
VII. Dehmer M, Mowshowitz A (2011) A history of graph entropy measures.
Inf Sci 181(1):57–78.
VIII. Fattah S. A., Fatima K., and Shahnaz C., An Approach for Classifying
Alcoholic and Non- Alcoholic Persons Based on Time Domain Features
Extracted From EEG Signals, 2015 IEEE International WIE Conference
on Electrical and Computer Engineering.
IX. Gopika Gopan K, Neelam Sinhay and Dinesh Babu, Hybrid Features
based Classification of Alcoholic and Non-alcoholic EEG, International
Institute of Information Technology, 978-1-4799-9985-9/15/$31.00
©2015 IEEE.
X. Hofeld T, Burger V, Hinrichsen H, Hirth M, Tran-Gia P (2014) On the
computation of entropy production in stationary social networks. Soc
Netw Anal Min 4(1):1–19.
XI. Hyperparameter. https://en.wikipedia.org/wiki/Hyperparameter
XII. Luque B, Lacasa L, Ballesteros F, Luque J (2009) Horizontal visibility
graphs: exact results for random time series. Phys Rev E 80(4):046103.
XIII. Oscar-Berman M, Marinkovi K (2007) Alcohol: effects on
neurobehavioral functions and the brain. Neuropsychol Rev 17(3):239–
257.

XIV. Purnamasari P. D., Ratna A. A. P., Kusumoputro B., Relative Wavelet
Bispectrum Feature for Alcoholic EEG Signal Classification Using
Artificial Neural Network, 978-602-50431-1-6/17/$31.00 ©2017 IEEE.
XV. Rachman N.T., Tjandrasa H., Fatichah C., Alcoholism Classification
based on EEG Data using Independent Component Analysis (ICA),
Wavelet De-noising and Probabilistic Neural Network (PNN), 2016
International Seminar on Intelligent Technology and Its Application,
2016 IEEE.
XVI. Richman JS, Moorman JR (2000) Physiological time-seriesanalysis
using approximate entropy and sample entropy. Am J Physiol-Heart
Circulat Physiol 278(6):H2039–H2049.
XVII. Smit D. J. A. and Posthuma D., Boomsma D. I. and De Geus E. J. C.,
Heritability ofbackground EEG across the power spectrum
Psychophysiology Journal, vol. 42, 2005, pp.691-697.
XVIII. Shooshtari MA, Setarehdan SK Selection of optimal eeg channels
for classification of signals correlated with alcoholabusers In: Signal
Processing [ICSP].2010 IEEE 10th international Conference on .IEEE:
2010. P.1-4
XIX. Singh S. N., Godiyal A. K., Panigrahi B.K., Anand S., Source
Localization in Alcoholic and ControlSubjects to Estimate Cognitive
load using EEG Signal. IEEE International Conference on Computer,
Communication and Control (IC4-2015).
XX. Saddam M., Tjandrasa H., Navastara D. A., Classification of Alcoholic
EEG Using Wavelet Packet Decomposition, Principal
ComponentAnalysis, and Combination of Genetic Algorithm and Neural
Network, 2017 IEEE International Conference on Information &
Communication Technology and System.
XXI. Shannon CE (2001) A mathematical theory of communication. ACM
SIGMOBILE Mob Comput Commun Rev 5(1):3–55.
XXII. Zou Y, Miao D, Wang D (2010) Research on sample entropy of
alcoholic and normal people. Chin J Biomed Eng 29:939–942.
XXIII. Zhang XL, Begleiter H, Porjesz B, Litke A (1997) Electrophysiological
evidence of memory impairment in alcoholic patients. Biol Psychiatr
42(12):1157–1171
XXIV. Zhu G, Li Y, Wen P (2011) Evaluating functional connectivity in
alcoholics based on maximal weight matching. J Adv Computat Intell
Intell Inform 15(9):1221–1227

View Download

Synthesis and Characterization of PMMA Nanofibers for Filtration of Drinking Water

Authors:

Bilal Ahmad, Ameer Hamza, Sheeraz Ahmed, Zeeshan Najam, Atif Ishtiaq

DOI NO:

https://doi.org/10.26782/jmcms.2019.08.00009

Abstract:

Currently, hundreds of consumer products in cludelarge-scale nanoparticles; this enhances the possibility of such particles to be released into water and in result causesenvironmental and human health issues. In this research, asynthesis of PolyMethylMethAcrylate (PMMA) nano-membrane for the filtration of nanoparticles from natural water is demonstrated. Electrospinning technique is deployed for the synthesis of PMMA nanofibers. The synthesized nanofibers are further optimized by adding Di-Methyl Formamide (DMF) and acetone that provides elasticity and increases the exterior area of the nano-membranes. The resultant membrane is tendbal and instinctivelyrobust enough to resist filtration under high stress. The synthesized nanofibers are further analyzed and characterized by using spectroscopy (UV-Vis), Fourier Transform Infra-Red spectroscopy (FTIR) and Scanning Electron Microscope(SEM).The SEM, UV-vis and FTIR result shows the filtration rate of the fabricated membrane could capably exclude nanoparticles with different sizes (from 10 to 100 nm in diameter) from a feed solution.

Keywords:

Electrospinning,Fiber diameter,FTIR,SEM,Water filtration,

Refference:

I. A.Jena and K.Gupta (2005) “Pore volume of nanofiber nonwovens,”
International Nonwovens Journal, vol. 14, pp. 25–30.
II. Agarwal S, Greiner A, Wendorff JH (2013) Functional materials by
electrospinning of polymers. ProgPolymSci 38(6):963–99.
III. Brandrup, J.Immergut, E.H.; Grulke, E.A. Eds. (1999), Polymer Handbook,
4th ed., Wiley: New York, II,3.
IV. C.J.Luo, S. D.Stoyanov, E.Stride, E.Pelan, and M.Edirisinghe, (2012)
“Electrospinning versus fibre production methods: from specifics to
technological convergence,” Chemical Society Reviews, vol. 41, no. 13, pp.
4708–4735.
V. DhineshSugumaran and KhairilJuhanniAbd Karim (2018, April)* Removal
of copper (II) ion using chitosan-graft-poly(methyl methacrylate) as
adsorbent.
VI. D.Aussawasathien, C.Teerawattananon, and A.Vongachariya,(2008)
“Separation of micron to sub-micron particles from water: electrospun nylon-
6 nanofibrous membranes as pre-filters,” Journal of Membrane Science, vol.
315, no. 1-2, pp. 11–19.
VII. Deitzel JM, Kleinmeyer J, Hirvonen JK, BeckTNC.(2001) Controlled
deposition of electrospun poly(ethylene oxide) fibers. Polymer;42:8163–70

VIII. Feng L, Li S, Li H, Zhai J, Song Y, Jiang L, et al. (2002) SuperHydrophobic
Surface of Aligned Polyacrylonitrile Nanofibers. AngewChemInt
Ed;41(7):1221–3.
IX. Fong H, Reneker DH. Electrospinning and formation of nanofibers. In: Salem
DR, editor. Structure formation in polymeric fibers. Munich: Hanser; 2001. p.
225.
X. Hohman MM, Shin M, Rutledge G, Brenner MP (2001) Electrospinning and
electrically forced jets. I. Stability theory. Phys Fluids 13:2201.
XI. Huang Z-M, Zhang YZ, Kotaki M, Ramakrishna S (2003) A review on
polymer nanofibers by electrospinning and their applications in
nanocomposites. Compos SciTechnol 63(15): 2223–2253.
XII. J.Lin, B.Ding, J.Yang, J.Yu, and S.S.Al-Deyab, (2012) “Mechanical robust
and thermal tolerant nanofibrous membrane for nanoparticles removal from
aqueous solution,” Materials Letters, vol. 69, pp. 82–85.
XIII. K.Yoon, B. S.Hsiao, and B.Chu, (2008)) “Functional nanofibers for
environmental applications,” Journal of Materials Chemistry, vol. 18, no. 44,
pp. 5326–5334.
XIV. Liu GJ, Ding JF, Qiao LJ, Guo A, Dymov BP, Gleeson JT, et al. (1999)
Polystyrene-block-poly (2-cinnamoylethyl methacrylate) nanofibers-
Preparation, characterization, and liquid crystalline properties. Chem-A
European; 5:2740–9.
XV. LuLiuab,YinanWangab,StephenCraikc,WendellJamesc,ZengquanShuc,RavinNa
rainb,YangLiua, 1 September 2019, “Removal of Cryptosporidium surrogates
in drinking water direct filtration” Volume 181, Pages 499-505.
XVI. Ma PX, Zhang R. (1999) Synthetic nano-scale fibrous extracellular matrix. J
Biomed Mat Res; 46:60–72.
XVII. Martin CR. (1996) Membrane-based synthesis of nanomaterials. Chem
Mater; 8:1739–46.
XVIII. MatthiasMunza, SaschaE.Oswalda, RobinSchäfferlinga, Hermann-
JosefLensingb, (21 June 2019) “Temperature-dependent redox zonation,
nitrate removal and attenuation of organic micropollutants during bank
filtration”.
XIX. Mirko Faccini, Guadalupe Borja, Marcel Boerrigter, Diego Morillo Martín et
al. (2015) “Electrospun Carbon Nanofiber Membranes for Filtration of
Nanoparticles from Water” , Journal of Nanomaterials.
XX. NikiweKunjuzwa, LebeaNathnael Nthunya, Edward NdumisoNxumalo, Sabe
loDaltonMhlanga , (2019) “ The use of nanomaterials in the synthesis of
nanofiber membranes and their application in water treatment” Chapter
5, Pages 101-125.
XXI. Odian, G. (1981), Principles of Polymerization, 2nd ed., Wiley: New York,
196.

XXII. Persano L, Camposeo A, Tekmen C, Pisignano D (2013) Industrial upscaling
of electrospinning and applications of polymer nanofibers: a review.
Macromol Mater Eng 298(5):504–520.
XXIII. P. I. Dolez, N. Bodila, J. Lara, and G. Truchon, (2010) “Personal protective
equipment against nanoparticles,” International Journal of Nanotechnology,
vol. 7, no. 1, pp. 99–117.
XXIV. Piperno S, Lozzi L, Rastelli R, Passacantando M, Santucci S (2006) PMMA
nanofibers production by electrospinning. Appl Surf Sci 252(15):5583–5586.
XXV. Qian Y, Su Y, Li X, Wang H, He C (2010) Electrospinning of polymethyl
methacrylate nanofibres in different solvents. Iran Polym J 19(2):123.
XXVI. R. Brayner, (2008) “The toxicological impact of nanoparticles,” Nano Today,
vol. 3, no. 1-2, pp. 48–55.
XXVII. Reneker DH, Yarin AL (2008) Electrospinning jets and polymer nanofibers.
Polymer 49(10):2387–2425.
XXVIII. R.S.Barhate and S.Ramakrishna, (2007) “Nanofibrous filtering media:
filtration problems and solutions from tiny materials,” Journal of Membrane
Science, vol. 296, no. 1-2, pp. 1–8.
XXIX. SharafatAlia, IzazAliShaha, AzizAhmada, JavedNawabc, HaiouHuangab, (10
March 2019) “Ar/O2 plasma treatment of carbon nanotube membranes for
enhanced removal of zinc from water and wastewater: A dynamic sorptionfiltration
process”Volume 655, Pages 1270-1278.
XXX. Thompson C,ChaseG,Yarin A, Reneker D (2007) Effects of parameters on
nanofiber diameter determined from electrospinning model. Polymer
48(23):6913–6922.
XXXI. Vakili, M.Rafatullah, M.Salamatinia, B.Abdullah, A. Z., Ibrahim, M. H.,
Tan, K. B., Amouzgar, P. (2014). Application of chitosan and its derivatives
as adsorbents for dye removal from water and wastewater: a review.
Carbohydrate Polymer, 113, 115-130.
XXXII. V.L.Colvin, (2003) “The potential environmental impact of engineered
nanomaterials,” Nature Biotechnology, vol. 21, no. 10, pp. 1166–1170.
XXXIII. Whitesides GM, Grzybowski B. (2002) “ Self-assembly at all scales”.
Science;295:2418–21.
XXXIV. XiaohuiNia Wanli Chenga, SiqiHuanb, DongWanga, GuangpingHana, (15
February 2019) ” Electrospun cellulose nanocrystals/poly(methyl
methacrylate) composite nanofibers: Morphology, thermal and mechanical
properties” Volume 206, Pages 29-37.

View Download

How the Higgs Field Effects the Wave Propagation of Waves as Wavy Resembles a Sine Wave. Why Astronomical Particles have Relationship between Shape (Elliptical) and Orbit (Elliptical).

Authors:

Prasenjit Debnath

DOI NO:

https://doi.org/10.26782/jmcms.2019.08.00010

Abstract:

The space is filled with Higgs fields. As other fields like electric fields or magnetic fields, Higgs fields are of elliptical shape. Higgs fields are small individual fields represent a tiny part of space. Every adjacent Higgs Fields have opposite rotations, the repulsive force makes them to have unique identity for themselves which makes free space highly stable. Opposite rotation is the reason that any two Higgs fields do not mingle with each other to form larger field in free space, but under the influence of ordinary matter like Earth, Higgs fields change their orientations to be unidirectional to form a larger field called gravity. The larger the mass, the higher the number of Higgs fields to have unidirectional orientations. The force carrying particle Higgs Boson is responsible for Higgs field and the force carrying particle graviton is responsible for gravitational force. The unidirectional orientations of many small oval shaped Higgs Boson yields the graviton which has oval shape too. Thus, Higgs Boson and graviton are same force carrying particle acting differently at different situations. For example, stationary charge gives electric field where as moving charge gives magnetic field. The phenomenon of both is basically the same but looks different due to movement. Maxwell realized that the phenomenon of both is the same with the same force carrying particle but act differently at different situations. In this paper we will find, why wave propagations of waves are wavy. We will also find why the shape and orbit of astronomical objects are of similar pattern – elliptical or oval shape.

Keywords:

Astronomical Objects,Higgs Field,Graviton,Higgs Boson,Force Carrying Particle,

Refference:

I. Stephen Hawking, “The Beginning of Time”, A Lecture.
II. Roger Penrose, “Cycles of Time”, Vintage Books, London, pp. 50-56.
III. Stephen Hawking, “A Briefer History of Time”, Bantam Books, London, pp.
1-49.
IV. Stephen Hawking, “Black holes and Baby Universes and other essays”,
Bantam Press, London 2013, ISBN 978-0-553-40663-4
V. Stephen Hawking, “The Grand Design”, Bantam Books, London 2011
VI. Stephen Hawking, “A Brief History of Time”, Bantam Books, London 2011,
pp. 156-157. ISBN-978-0-553-10953-5
VII. Stephen Hawking, “The Universe in a Nutshell”, Bantam Press, London
2013, pp. 58-61, 63, 82-85, 90-94, 99, 196. ISBN 0-553-80202-X
VIII. Stephen Hawking, “A stubbornly persistent illusion-The essential
scientific works of Albert Einstein”, Running Press Book Publishers,
Philadelphia, London 2011.
IX. Stephen Hawking, “Stephen Hawking’s Universe: Strange Stuff Explained”,
PBS site on imaginary time.

View Download

The Constructive Implementation of New Applications of Fuzzy Languages and Fuzzy Automata Ƒ * – Pure Semi groups for Generating Theorems

Authors:

M. Suresh Babu, E. Keshava Reddy

DOI NO:

https://doi.org/10.26782/jmcms.2019.08.00011

Abstract:

Introducing the idea of Ƒ* - pure semi group and shows that a semi group ‘S ‘is regular and Ƒ* - pure iff ' S ′ is a semi lattice of groups. Also shows with the purpose of a semi group' S ′ be Ƒ* - pure iff S3 is a semi lattice of groups. Additionally, learning the group congruence’s as well as semi lattice congruence’s on such a semi group and give a number of properties of fuzzy congruence’s on Ƒ* - pure semi groups. A nonempty set X, a fuzzy subset of X is, by definition, an arbitrary mapping A: X → [0,1], where [0,1] is the usual interval of real numbers. The important concept of fuzzy automata set position onwards by Zadeh [I]. Has opened up keen insights and applications in a wide range of scientific fields. It offers tools and a new approach to model imprecision and uncertainty present in phenomena that do not have sharp boundaries. Since then, a series of research on fuzzy automata sets has come out expounding the importance of the concept and its applications to logic, set theory, algebra theory, real analysis, topology, etc. [III]. Fleck A. C. used the notion of a fuzzy subsets of a set to introduce the notion of fuzzy group of a group, Rosenfeld’s paper motivated the development of fuzzy algebras [X]. Following the formulation of fuzzy subgroups by Rosenfeld, Dib introduced the concept of a fuzzy automata space as a replacement for the concept of universal set in the ordinary case. Recently, some basic concepts of fuzzy algebras such as fuzzy homomorphism’s were introduced and discussed by using the new approach of fuzzy space and fuzzy automata groups introduced. In this paper we introduce concepts of fuzzy automata inverse semi groups and redefine fuzzy automata inverse sub-semi groups using the concept of fuzzy spaces introduced by K. A. Dib [II].

Keywords:

Ƒ* - pure semi groups,Sequences,Group fuzzy congruence’s,Lattice Groups and fuzzy sub groups,

Refference:

I. A. Ada, On the Non-deterministic communication complexity of Regular
Languages, Developments in Language theory. Springer Berlin
Heidelberg, 205-209, 2008.
II. A. H. Clifford and G. B. Preston the algebraic theory of semi groups
vol.1, American Math, Soc., Providence, RI, 1961.
III. A. K. Srivastava and W. Shukla, “ A Topology for Automata II” ,
Internat. Jour. Math.and Math.Sc.,9:425- 428, 1986.
IV. D. S. Malik, J. N. Moderson, M. K. Sen Submachine’s of fuzzy finite
state machine, Journal of fuzzy mathematics, 2 ( 1994 ), 781-792.
V. D. S. Malik, J. N. Moderson, Fuzzy discrete structures, Physica Verlag
Newyork, (2000).
VI. E. Lughofer and O. Buchtala, “Reliable all-pairs evolving fuzzy
classifiers, “IEEE T. Fuzzy Systems, vol.21, no.4, pp. 625-641, 2013.
VII. F. Meng and X. Chen, (2016). “A new method for a triangular fuzzy
compare wise judgment matrix process based on consistency analysis,”
International Journal of Fuzzy Systems, vol.309, PP. 119-1375,2015.
VIII. J. R. Gonzalez de Mendivil, J. R. Garitagoitia, ” Fuzzy languages with
infinite range accepted by fuzzy automata: Pumping lemma and
determinization procedure,” Fuzzy sets Syst., vol.249, pp.1-26, 2014.
IX. J. Wang, M. Yin. And W. Gu.” Fuzzy multi-set finite automata and their
languages, “Soft compute. vol.17. no.3, pp. 381-390, March-2013.
X. K. T. Atarassov, Instuitionistic fuzzy sets, Fuzzy sets and systems 20,
87 – 96,1986.
XI. K. T. Atanassov, New operations defined over the intuitionistic fuzzy
sets, fuzzy sets and systems 61 ,137 – 142, 1994.

XII. K. Peeva, “Finite L-fuzzy machines”, Fuzzy sets and systems, 141, 415-
437, 2004.
XIII. M. K. Muyeba and L. Han, “Fuzzy classification in web usage mining
using fuzzy quantifiers,” 2013 IEEE/ACM International Conference on
Advances in Social Networks Analysis and Mining (ASONAM), 2013.
XIV. M, Kudlek, V. Mitrana, Closure properties of Multiset Language
Families, Fundum Inforum, 49 , 193- 203, 2002.
XV. M. Kudlek, P. Totzke, G. Zetzche, Properties of Multiset Languge
classes defined by multiset push down automata, Fundum inform, 93 ,
235-244, 2009.
XVI. R. Fierimonte, M. Barbato, A. Rosato, and M. Panella, “Distributed
learning of random weights fuzzy neural networks,” Proc.of IEEE int.
Conf. on Fuzzy Systems-2016.
XVII. S. Shelke and S. Apte, “A Fuzzy based classification scheme for
unconstrained handwritten devanagari character recognition,” 2015.
International Conference on Communication, Information & Computing
Technology (ICCICT), 2015.
XVIII. X. P. Wang and W. J. Liu, Fuzzy regular subsemigroups in semi groups,
inform.sci.68:225-231 ,1983.
.XIX. X. Z. Zhao and Y. Q. Guo, Sturdy frames of type (2, 2) algebras and
their applications to semi rings, Fundamental Mathematicae ,69-
81,2003.
XX. Y. L. He, X. Z. Wang, and J. Z. Huang, “Fuzzy nonlinear regression
analysis using a random weight Network,” Information Sciences,
vol.364, pp. 222-240, 2016.
XXI. Y. M. Li, “Finite Automata theory with membership values in Lattices,
Information Sciences”, 176, 3232- 3255, 2006.

View Download

Impact of Jelly Fish Attackonthe Performance of DSR Routing Protocol in MANETs

Authors:

Muhammad Sajjad, Khalid Saeed, Tariq Hussain, ArbabWaseem Abbas, Irshad Khalil, Iqtidar Ali, Nida Gul

DOI NO:

https://doi.org/10.26782/jmcms.2019.08.00012

Abstract:

Mobile Ad-hoc Networks (MANETs) could be setup frequently without the need of pre-established infrastructure. The nodes in MANETs are free to move and they can join as well as leave the network. Due to the dynamic nature of nodes in MANETs, routing protocols in MANET are extremely vulnerable to different security attacks. Like other different security attacks, Jellyfish attack is one of the most dangerous attacks in MANETs environment and it degrades the overall performance. In such type of attack, the packets reached its destination but take more time and hence it is difficult to detect such attack. In this research paper, we have analyzed the performance of Dynamic Source Routing (DSR) routing protocol in the presence of Jellyfish attack. To evaluate the performance we have created different scenarios having various number of Jellyfish attacks in MANETs environment. From the simulation result, it has been observed that Jellyfish attack significantly degrades the performance of DSR protocol in terms of end to end delay, throughput and packet delivery ratio. Moreover it has also been observed that when the number of Jellyfish attacks increases in the network then the performance is further degraded. In this research OPNET Modeler 14.5 simulator has been used in order to assess the performance of Jellyfish attack in MANETs environment.

Keywords:

Mobile Ad-Hoc Networks,Dynamic Source Routing,Jellyfish Attack,Security Issues,

Refference:

I A. Kaur and D. T. P. Singh, “Securing MANET from jellyfish attack using
selective node participation approach,” International Journal of Engineering
and Technical Research (IJETR) ISSN, pp. 2321–0869.
II Al Dulaimi, L. A. K., R. B. Ahmad., N, Yaakob., S, N, W, Shamsuddin and
M, Elshaikh 2018. Behavioral and performance jellyfish attack. Indonesian
Journal of Electrical Engineering and Computer Science Vol. 13, No. 2,
February 2019, pp. 683~688,
III Cai, J. P. Yi. J.Chen. Z. Wang and N. Liu. 2010. An Adaptive Approach to
Detecting Black and Gray Hole Attacks in Ad Hoc Network . 24th IEEE
International Conference on Advanced Information Networking and
Applications; pp 775-780
IV Doss, S., Nayyar, A., Suseendran, G., Tanwar, S., Khanna, A., & Thong, P.
H. (2018). APD-JFAD: Accurate prevention and detection of Jelly Fish
attack in MANET. Ieee Access, 6, 56954-56965.
V Khirasariya H. 2001. Simulation study of jellyfish attack in MANET (mobile
ad hoc network) using Aodv Routing Protocol.Journal Of Information,
Knowledge And Research In Computer Engineering; Vol(2); pp 344-347
VI M. Abolhasan, T. Wysocki, and E. Dutkiewicz, “A review of routing
protocols for mobile ad hoc networks,” Ad hoc networks, vol. 2, no. 1, pp. 1–
22, 2004.
VII M.Kaur, M.Rani.and A. Nayyar. 2014. A Comprehensive Study of Jelly Fish
Attack in Mobile Ad hoc Networks. International Journal of Computer
Science and Mobile Computing; Vol(3): pp 199-203
VIII Mewara, H.S. and S. Porwal. 2010. Node Density and Traffic based
Modelling and Analysis of Routing Protocols for MANETs; pp 1-6
IX P. Misra, “Routing protocols for ad hoc mobile wireless networks,” Courses
Notes, available at http://www. cis. ohiostate. edu/˜ jain/cis788-99/adhoc
routing/index. html, 1999.
X R.V Boppana, and A. Mathur. 2005. Analysis of the Dynamic Source
Routing Protocol for Ad Hoc Networks. Workshop on Next Generation
Wireless Networks; pp 1-8.

View Download

Performance Evaluation of All-Optical OFDM System- Based Optical Frequency Comb Source

Authors:

Yousif Ibrahim Hammadi, TahreerSafa’a Mansour

DOI NO:

https://doi.org/10.26782/jmcms.2019.08.00013

Abstract:

In this paper, design and investigation of all-opticalorthogonal frequency division multiplexing (AO-OFMD) system using an optical frequency comb (OFC) source is presented. AnOFC source by cascading a frequency modulator (FM) and two intensity modulators is used as a multi-carrier’s generator to provide optically OFDM subcarriers. This OFC source can be provided a maximum comb lines number of 61 lines spaced by 25 GHz. The AO-OFDM scheme employed 31 and 51 comb lines can transmit a signal at a data rate of 1.55 and 2.55 Tbit/s, respectively. Numerical results are carried out using VPI transmission Maker® commercial software.

Keywords:

All-optical OFDM,Terabit per second (Tbit/s),Opticalfrequency comb source,Error vector magnitude (EVM),Eye diagram,

Refference:

I. A. Hammoodi, L. Audah, and M. A. Taher, “Green Coexistence f Waveform Candidates: A Review,” IEEE Access, vol. 7, pp. 10103-2019
II. II. A. Hraghi, M. E. Chaibi, M. Menif, and D. Erasme, “Demonstration of 16QAM-OFDM UDWDM transmission using a tunable optical flat comb source,” journal of lightwave technology, vol. 35, pp. 238-245, 2016
III. III. A. M. Jaradat, J. M. Hamamreh, and H. Arslan, “Modulation Options for OFDM-Based Waveforms: Classification, Comparison, and Future Directions,” IEEE Access, vol. 7, pp. 17263-17278, 2019
IV. F. Fresi, M. Imran, A. Malacarne, G. Meloni, V. Sorianello, E. Forestieri, et al., “Advances in optical technologies and techniques for high capacity ommunications,” Journal of Optical Communications and Networking, vol. 9, pp. C54-C64, 2017
V. I. Morohashi, T. Sakamoto, N. Sekine, A. Kasamatsu, and I. Hosako, “Ultrashort optical pulse source using Mach–Zehnder-modulator-based flat comb generator,” Nano Communication Networks, vol. 10, pp. 79-84, 2016
VI. J. He, F. Long, R. Deng, J. Shi, M. Dai, and L. Chen, “Flexible multiband OFDM ultra-wideband services based on optical frequency combs,”IEEE/OSA Journal of Optical Communications and Networking, vol. 9, pp. 393-400, 2017
VII. J. Morosi, J. Hoxha, P. Martelli, P. Parolari, G. Cincotti, S. Shimizu, et al., “25 Gbit/s per user coherent all-optical OFDM for Tbit/s-capable PONs,” Journal of Optical Communications and Networking, vol. 8, pp. 190-195, 2016
VIII. J. Thangaraj, “Generation of ultra-wide and flat optical frequency comb based on electro absorption modulator,” Optoelectronics Letters, vol. 14, pp. 185-188, 2018
IX. L. B. Du, J. Schröder, M. M. Morshed, B. Eggleton, and A. J. Lowery, “Optical inverse Fourier transform generated 11.2-Tbit/s no-guard-interval all-optical OFDM transmission,” in Optical Fiber Communication Conference, p. OW3B. 5., 2013
X. M. Imran, P. M. Anandarajah, A. Kaszubowska-Anandarajah, N. Sambo, and L. Potí, “A survey of optical carrier generation techniques for terabit capacity elastic optical networks,” IEEE Communications Surveys & Tutorials, vol. 20, pp. 211-263, 2018
XI. N.-P. Diamantopoulos, H. Nishi, W. Kobayashi, K. Takeda, T. Kakitsuka, and S. Matsuo, “On the Complexity Reduction of the Second-Order Volterra Nonlinear Equalizer for IM/DD Systems,” Journal of Lightwave Technology, vol. 37, pp. 1214-1224, 2019
XII. P. Guan, K. M. Røge, H. C. H. Mulvad, M. Galili, H. Hu, M. Lillieholm, et al., “All-optical ultra-high-speed OFDM to Nyquist-WDM conversion based on complete optical Fourier transformation,” Journal of Lightwave Technology, vol. 34, pp. 626-632, 2016
XIII. P. Martín-Mateos, A. Porro, and P. Acedo, “Fully Adaptable Electro-Optic Dual-Comb Generation,” IEEE Photonics Technology Letters, vol. 30, pp. 161-164, 2017
XIV. R. G. Hunsperger, Integrated optics vol. 4: Springer, 1995
XV. R. Mesleh and A.-O. Ayat, “Acousto-optical modulators for free space optical wireless communication systems,” Journal of Optical Communications and Networking, vol. 10, pp. 515-522, 2018
XVI. S. A. Srinivasan, M. Pantouvaki, S. Gupta, H. T. Chen, P. Verheyen, G. Lepage, et al., “56 Gb/s germanium waveguide electro-absorption modulator,” Journal of Lightwave Technology, vol. 34, pp. 419-424, 2015
XVII. S. I. Sohn and S. K. Han, “Linear optical modulation in a serially cascaded electro absorption modulator,” Microwave and Optical Technology Letters, vol. 27, pp. 447-450, 2000
XVIII. T. Kawanishi, “THz and Photonic Seamless Communications,” Journal of Lightwave Technology, 2019
XIX. T. Kishi, M. Nagatani, S. Kanazawa, W. Kobayashi, H. Yamazaki, M. Ida, et al., “56-Gb/s optical transmission performance of an InP HBT PAM4 driver compensating for nonlinearity of extinction curve of EAM,” Journal of Lightwave Technology, vol. 35, pp. 75-81, 2017
XX. V. Baryshev, V. Epikhin, I. Blinov, and S. Donchenko, “Acousto-optic modulators in Raman-Nath diffraction regime as phase modulators in modulation transfer spectroscopy,” in 2016 IEEE International Frequency Control Symposium (IFCS), pp. 1-4, 2016
XXI. V. J. Urick, K. J. Williams, and J. D. McKinney, Fundamentals of microwave photonics: John Wiley & Sons, 2015
XXII. Y. Kaymak, R. Rojas-Cessa, J. Feng, N. Ansari, M. Zhou, and T. Zhang, “A survey on acquisition, tracking, and pointing mechanisms for mobile free space optical communications,” IEEE Communications Surveys & Tutorials, vol. 20, pp. 1104-1123, 2018
XXIII. Y.-D. Lin, “Third Quarter 2018 IEEE Communications Surveys and Tutorials,” IEEE Communications Surveys & Tutorials, vol. 20, pp. 1607-1615, 2018

View Download

A Survey on Facial Recognition System

Authors:

Morooj K. Luiabi, Faisel Gh. Mohammed

DOI NO:

https://doi.org/10.26782/jmcms.2019.08.00014

Abstract:

Facial recognition stands for an imperative area of interest to serve various applications such as security, verification of bank identities, identification of wanted persons at airports, etc. Therefore, it is employed for real time application. Consequently, reliability stands for significant matter for security. Facial recognition system is deal with two different application scenarios, one of which is called "identification" and the other of which is called "verification" anew face can be classifying either "known" or "unknown", after comparing it with stored identified persons. The complete process of facial recognition system done in three phase, detection the face, extraction the features of the face and recognition to recognize this face. Various techniques are then required for these three phases. Also these techniques differ from different other surrounding factors for example, face orientation, expression, illumination and background. In this review also highpoints the most frequently databases that existing as a standard to be utilized for facial recognition investigations like, AR Database, ORL, FERET, and Yale Database.

Keywords:

Face detection,Features extraction,Face recognition,Face Database,

Refference:

12Abdulrahman, S.A. and B.M. Sabbar, Face Recognition Using
Eigen-Wavelet-Face Method.
II. 8.8Al-Arashi, W.H., H. Ibrahim, and S.A. Suandi, Optimizing principal
component analysis performance for face recognition using genetic
algorithm. Neurocomputing, 2014. 128: p. 415-420.
III. 17.17Al-Allaf, O.N., Review of face detection systems based artificial
neural networks algorithms. arXiv preprint arXiv:1404.1292, 2014.
IV. 13Abate, A.F., et al., 2D and 3D face recognition: A survey. Pattern
recognition letters, 2007. 28(14): p. 1885-1906.
V. 10. 10Barnouti, N.H., Face recognition using PCA-BPNN with DCT
implemented on Face94 and grimace databases. International Journal
of Computer Applications, 2016. 142(6): p. 8-13.
VI. 18.18Bukis, A., et al. Survey of face detection and recognition
methods. in Proceeding of International Conference on Electrical and
Control Technologies, Kaunas, Lithuania. 2011.
VII. 15.15Barnouti, N.H., et al., Face Detection and Recognition Using
Viola-Jones with PCA-LDA and Square Euclidean Distance.
International Journal of Advanced Computer Science and Applications
(IJACSA), 2016. 7(5): p. 371-377.
VIII. 23.23 Beham, M.P. and S.M.M. Roomi, A review of face recognition
methods. International Journal of Pattern Recognition and Artificial
Intelligence, 2013. 27(04): p. 1356005.

IX. 20.20 Dabhi, M.K. and B.K. Pancholi, Face detection system based on
viola-jones algorithm. International Journal of Science and Research
(IJSR), 2016. 5(4): p. 62-64.
X. 25.25 Drira, H., et al. Pose and expression-invariant 3d face
recognition using elastic radial curves. in British machine vision
conference. 2010.
XI. 24.24 De Carrera, P.F. and I. Marques, Face recognition algorithms.
Master’s thesis in Computer Science, Universidad Euskal Herriko,
2010.
XII. 21.21 Fathi, A., P. Alirezazadeh, and F. Abdali-Mohammadi, A new
Global-Gabor-Zernike feature descriptor and its application to face
recognition. Journal of Visual Communication and Image
Representation, 2016. 38: p. 65-72.
XIII. 1.1 Jain, A.K. and S.Z. Li, Handbook of face recognition. 2011:
Springer.
XIV. 7.7 Kadam, K.D., Face recognition using principal component
analysis with DCT. International Journal of Engineering Research and
General Science, ISSN, 2014: p. 2091-2730.
XV. 2.2 Lourde, M. and D. Khosla, Fingerprint Identification in Biometric
SecuritySystems. International Journal of Computer and Electrical
Engineering, 2010. 2(5): p. 852.
XVI. 3.3 Li, X., Face recognition method based on fuzzy 2dpca. Journal of
Electrical and Computer Engineering, 2014. 2014: p. 20.
XVII. 6.6 Miry, A.H., Face Recognition Based Principal Component
Analysis And Wavelet Sub bands. Journal of Engineering and
Sustainable Development, 2013. 17(5): p. 238-248.
XVIII. 16.1 6Muhammad Sharif, et al., Face Recognition: A Survey.
JOURNAL OFEngineering Science andTechnology Review, 2017: p.
166-177.
XIX. 14.14 Pandya, J.M., D. Rathod, and J.J. Jadav, A survey of face
recognition approach. International Journal of Engineering Research
and Applications (IJERA), 2013. 3(1): p. 632-635.
XX. 30.30 Phillips, P.J., et al., The FERET database and evaluation
procedure for face-recognition algorithms. Image and vision
computing, 1998. 16(5): p. 295-306.
XXI. 5.5 Prasad, M., et al., Face recognition using PCA and feed forward
neural networks. International journal of computer science and
telecommunications, 2011. 2(8): p. 79-82.
XXII. 9.9 Shah, H., R. Kher, and K. Patel. Face recognition using 2DPCA
and ANFIS classifier. in Proceedings of Fourth International
Conference on Soft Computing for Problem Solving. 2015. Springer.

XXIII. 26.26 Singh, A., S.K. Singh, and S. Tiwari, Comparison of face
recognition algorithms on dummy faces. The International Journal of
Multimedia & Its Applications, 2012. 4(4): p. 121.
XXIV. 29.29 Singh, Y., A Study on Facial Feature Extraction and Facial
Recognition Approaches. 2015.
XXV. 22.22 Singh, G. and I. Chhabra, Effective and fast face recognition
system using complementary OC-LBP and HOG feature descriptors
with SVM classifier. Journal of Information Technology Research
(JITR), 2018. 11(1): p. 91-110.
XXVI. 27.27 Solanki, K. and P. Pittalia, Review of face recognition
techniques. International Journal of Computer Applications, 2016.
133(12): p. 20-24.
XXVII. 11.11Sukhija, P., S. Behal, and P. Singh, Face recognition system
using genetic algorithm. Procedia Computer Science, 2016. 85: p. 410-
417.
XXVIII. 19.19 Zhang, C. and Z. Zhang, A survey of recent advances in face
detection. 2010.
XXIX. 28.28 Zhang, B., et al., Histogram of gabor phase patterns (hgpp): A
novel object representation approach for face recognition. IEEE
Transactions on Image processing, 2006. 16(1): p. 57-68.
XXX. 4.4 Zhou, C., et al., Face recognition based on PCA image
reconstruction and LDA. Optik, 2013. 124(22): p. 5599-5603.

View Download

Medical Image Fusion based on Hybrid Algorithms for Neuro cysticercosis and Neoplastic Disease Analysis

Authors:

B. Rajalingam, R. Priya, R. Bhavani

DOI NO:

https://doi.org/10.26782/jmcms.2019.08.00015

Abstract:

A Neuro cysticercosis is avoidable parasitic infection caused by larval cysts of the pork tapeworm. The larval cysts can affect different parts of the human organs causing a condition known as cysticercosis which can direct to seizures it is called neuro cysticercosis. A neoplasm is an abnormal growth of cells in the brain, also known as a tumor which causes growth of tumor triggered by DNA mutations within your cells. The neoplastic disease causes two types of tumor growth. The benign tumors usually grow which grow slowly and cannot spread to other tissues are called as noncancerous growth. The Malignant brain tumors grow quickly and spread to multiple tissues, organs are known as cancerous growth. In spite of huge progresses, still there is no single modality which can represent all aspects of the human body. In this paper a novel method has been proposed for Dual tree complex wavelet Transform (DTCWT) with Non-subsampled shearlet transform (NSST) hybrid fusion algorithm. The developed fusion algorithm is experienced on the pilot study datasets of patients affected with Neurocysticercosis and neoplastic diseases. The fused image conveys the superior description of the information than the source images. Experimental results are evaluated by the number of well-known performance evaluation metrics.

Keywords:

Multimodality medical image,Neoplastic,Neurocyticercosis,CT,MRI,SPECT,DTCWT and NSST,

Refference:

I. Deep Gupta,. Nonsubsampled shearlet domain fusion techniques for CT–MR
neurological images using improved biological inspired neural model.
Biocybernetics and Biomedical Engineering, 2017
II. Ebenezer Daniel, J. Anithaa, K.K Kamaleshwaran, Indu Rani,. Optimum
spectrum mask based medical image fusion using Gray Wolf Optimization.
Biomedical Signal Processing and Control, Elsevier, Vol. 34, pp. 36 – 43,
2017
III. Hamid Reza Shahdoosti, Adel Mehrabi,. Multimodal Image Fusion Using
Sparse Representation Classification in Tetrolet Domain. Digital Signal
Processing, Elsevier (2018)
IV. Heba M. El-Hoseny, El-Sayed M. El.Rabaie, Wael Abd Elrahman, Fathi E
Abd El-Samie,. Medical Image Fusion Techniques Based on Combined
Discrete Transform Domains. Port Said, Egypt, Arab Academy for Science,
Technology & Maritime Transport, IEEE, pp. 471-480, 2017
V. http://www.med.harvard.edu (Accessed 2017)
VI. https://radiopaedia.org (Accessed 2017)
VII. https://www.healthline.com/health/neoplastic-disease (Accessed 2018)
VIII. Jingming Xi, Yiming Chen, Aiyue Chen, Yicai Chen,. Medical Image Fusion
Based on Sparse Representation and PCNN in NSCT Domain.
Computational and Mathematical Methods in Medicine, Hindawi, 2018
IX. Rajalingam B, Priya R, Bhavani R.. Hybrid Multimodal Medical Image
Fusion Using Combination of Transform Techniques for Disease Analysis.
Procedia Computer Science, Elsevier, 152, pp. 150–157, 2019
X. Rajalingam B, Priya R, Bhavani R.. Multimodal Medical Image Fusion
Using Hybrid Fusion Techniques for Neoplastic and Alzhimers’s Disease
Analysis. Journal of Computational and Theoretical Nanoscience, Vol. 16,
pp. 1–12, 2019

XI. Rajalingam, R.Priya, R.Bhavani.. Hybrid Multimodal Medical Image
Fusion Algorithms for Astrocytoma Disease Analysis. Emerging
Technologies in Computer Engineering: Microservices in Big Data
Analytics, ICETCE 2019, Communications in Computer and Information
Science, Springer, Vol. 985, pp. 336–348, 2019
XII. Rajalingam., R. Priya.. Hybrid Multimodality Medical Image Fusion based
on Guided Image Filter with Pulse Coupled Neural Network. International
Journal of Scientific Research in Science, Engineering and Technology, 5(3),
pp. 86-100, 2018
XIII. Rajalingam., R.Priya., and R.Bhavani.. Comparative Analysis for Various
Traditional and Hybrid Multimodal Medical Image Fusion Techniques for
Clinical Treatment Analysis. Image Segmentation: A Guide to Image Mining,
ICSES Publisher, pp. 26-50, 2018
XIV. Rajalingam., R.Priya., and R.Bhavani.. Hybrid Multimodality Medical Image
Fusion Using Various Fusion Techniques with Quantitative and Qualitative
Analysis. Advanced Classification Techniques for Healthcare Analysis, IGI
Global Publisher, pp. 206-233, 2019
XV. Rajalingam., R.Priya., Review of Multimodality Medical Image Fusion Using
Combined Transform Techniques for Clinical Application. International
Journal of Scientific Research in Computer Science Applications and
Management Studies, 7(3), 2018
XVI. Rajalingam., R.Priya., A Novel approach for Multimodal Medical Image
Fusion using Hybrid Fusion Algorithms for Disease Analysis. International
Journal of Pure and Applied Mathematics, 117(15), pp. 599-619, 2017
XVII. Rajalingam., R.Priya., Combining Multi-Modality Medical Image Fusion
Based on Hybrid Intelligence for Disease Identification. International Journal
of Advanced Research Trends in Engineering and Technology, 5(12), pp.
862-870, 2018
XVIII. Rajalingam., R.Priya., Enhancement of Hybrid Multimodal Medical Image
Fusion Techniques for Clinical Disease Analysis. International Journal of
Computer Vision and Image Processing, 8(3), pp.17-40, 2018
XIX. Rajalingam., R.Priya., Hybrid Multimodality Medical Image Fusion
Technique for Feature Enhancement in Medical Diagnosis. International
Journal of Engineering Science Invention, 2, pp. 52-60, 2018
XX. Rajalingam., R.Priya., Multimodal Medical Image Fusion based on Deep
Learning Neural Network for Clinical Treatment Analysis. International
Journal of ChemTech Research, 11(06), pp. 160-176, 2018
XXI. Rajalingam., R.Priya., Multimodal Medical Image Fusion Using Various
Hybrid Fusion Techniques For clinical Treatment Analysis. Smart
Construction Research, 2(2), pp. 1-20, 2018
XXII. Rajalingam., R.Priya., Multimodality Medical Image Fusion Based on Hybrid
Fusion Techniques. International Journal of Engineering and Manufacturing
Science, 7(1), 2017

XXIII. Satishkumar S. Chavan, Abhishek Mahajan, Sanjay N. Talbar, Subhash
Desai, Meenakshi Thakur, Anil D’cruz,. Nonsubsampled rotated complex
wavelet transform (NSRCxWT) for medical image fusion related to clinical
aspects in neurocysticercosis. Computers in Biology and Medicine, Elsevier,
Vol. 81, pp. 64–78, 2017
XXIV. Sharma Dileepkumar Ramlal, Jainy Sachdeva, Chirag Kamal Ahuja, Niranjan
Khandelwal,. Multimodal medical image fusion using non-subsampled
shearlet transform and pulse coupled neural network incorporated with
morphological gradient. Signal, Image and Video Processing, Springer, 2018
XXV. Sreeja, S. Hariharan,. An improved feature based image fusion technique for
enhancement of liver lesions. Biocybernetics and Biomedical Engineering,
Elsevier, 2018
XXVI. Xiaojun Xua, Youren Wang, Shuai Chen,. Medical image fusions using
discrete fractional wavelet transform. Biomedical Signal Processing and
Control, Elsevier, Vol. 27, pp.103–111, 2016
XXVII. Xingbin Liu, Wenbo Mei, Huiqian Du,. Multi-modality medical image fusion
based on image decomposition framework and nonsubsampled shearlet
transform. Biomedical Signal Processing and Control, Elsevier, Vol. 40, pp.
343–350, 2018
XXVIII. Xingbin Liu, Wenbo Mei, Huiqian Du,. Structure tensor and nonsubsampled
shearlet transform based algorithm for CT and MRI image fusion.
Neurocomputing, Elsevier, 2017

View Download