Archive

An Efficient Camera Identification Technique using Krawtchouk Moment Invariants

Authors:

Megha Borole, Prof. S. R. Kolhe

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00004

Abstract:

In late years, camera identification methods have drawn attention in the area of digital forensics. To detect the source camera through which the picture is caught, Photo-Response Non uniformity (PRNU) noise is utilized as a camera, impression, as it is a particular component that recognizes pictures taken from the comparable cameras. This paper introduces a camera identification technique which is based on Krawtchouk Moment invariant features. The Photo Response Non-Uniformity (PRNU) noise is a type of sensor finger impression, which permits to extraordinarily distinguish the camera that took an image. It is estimated from the denoised images using a denoised filter. Then estimate the Krawtchouk Moment invariants from the PRNU noise pattern. The Krawtchouk Moments are invariant to scaling, translation, rotation, and shear. These invariants are fed to Fuzzy Min-Max Neural Network with Compensatory Neuron (FMCN) and by performing ten-fold cross-validation technique, verification is made out. The experimental results show that the proposed technique achieves an average accuracy of 93.3% for first experiment and 98.3% for the second experiment.

Keywords:

Camera identification,photo response non-uniformity (PRNU),Krawtchouk moments,fuzzy min-max neural networkwith compensatory neuron (FMCN),

Refference:

I.Alessandro Piva, “Review Article an Overview on Image Forensics”, Hindawi Publishing Corporation ISRN Signal Processing, Volume 2013, Article ID 496701, http://dx.doi.org/10.1155/2013/496701 (2013).

II.A. Tuama, F. CombyandM. Chaumont, “Camera model identification based machine learning approach with high order statistics features”, 24th European Signal Processing Conference (EUSIPCO), Budapest, 2016, pp. 1183-1187.

III.Anass El affar, Khalid Ferdous, AbdeljabbarCherkaoui, Hakim El fadiliand Hassan Qjidaal, “Krawtchouk Moment Feature Extraction for Neural Arabic Handwritten Words Recognition”, IJCSNS International Journal of Computer Science and Network Security, Vol.9 No.1. 2009.

IV.Abhijeet V. Nandedkar, Prabir K. Biswas, “A Fuzzy Min-Max Neural Network Classifier with Compensatory Neuron Architecture”, IEEE Transactions On Neural Networks, Vol. 18. No. 1, 2007.

V.F. Meng, X. Kong and X. You, A new feature-based method for source camera identification, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 207–218, 2008.

VI.F. Razzazi and A. Seyedabadi, “A robust feature for single image camera identification using local binary patterns,” 2014 IEEE International Symposium on SignalProcessing and Information Technology (ISSPIT), Noida, 2014, pp. 000462-000467.

VII.G. Xu, Y. Q. Shi, “Camera model identification using local binary patterns”, Proc. IEEE Int Conference on Multimedia and Expo (ICME), pp. 392-397, 2012.

VIII.I. Amerini, R. Caldelli, P. Crescenzi, A. Del Mastio, A. Marino, “Blind Image Clustering Based on the Normalized Cuts Criterion for Camera Identification”, Image Communication, ELSEVIER, pp. 1 -13, 2014.

IX.J. Lukas, J. FridrichandM. Goljan, “Digital camera identification from sensor pattern noise,” in IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 205-214, June 2006.

X.K.R. Akshatha, A.K. Karunakar, H. Anitha, U. Raghavendra, Dinesh Shetty, “Digital camera identification using PRNU: A feature basedapproach”, Digital Investigation, Journal, Elsevier, 19 (2016).

XI.M. C. Stamm, M. Wu and K. J. R. Liu, “Information Forensics: An Overview of the First Decade”, in IEEE Access, vol. 1, pp. 167-200, 2013.

XII.M. Kharrazi, H.T. Sencar, N. Memon, “Blind source camera identification”, IEEE International Conference on Image Processing ICIP ’04., vol. 1, pp. 709-712, 2004.

XIII.M. KivancMihcak, I. Kozintsev and K. Ramchandran, “Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising,” 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258), Phoenix, AZ, 1999, pp. 3253-3256 vol.6.

XIV.O. Celiktutan, B. Sankur, I. Avcibas, “Blind identification of source cell-phone model”, IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 553-566, 2008.

XV.P. T. Yap, P. Raveendran and S. H. Ong, “Krawtchouk moments as a new set of discrete orthogonal moments for image reconstruction”, In Neural Networks, 2002. IJCNN’02. Proceedings of the 2002 International Joint Conference on (Vol. 1, pp. 908-912). IEEE, 2002.

XVI.P. T. Yap, R. Paramesran and S. H. Ong, “Image analysis by Krawtchouk moments”, Image Processing, IEEE Transactions on, 12(11), 1367-1377, 2003.

XVII.S. Bayram, H.T. Sencar, N. Memon, “Improvements on source camera model identification based on cfainterpolation”, Advances in Digital Forensics II IFIP International Conference on Digital Forensics, pp. 289-299, 2006.

XVIII.S. Saito, Y. Tomioka and H. Kitazawa, “A Theoretical Framework for Estimating False Acceptance Rate of PRNU-Based Camera Identification,” in IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2026-2035, Sept. 2017.

XIX.T. Filler, J. Fridrich, M. Goljan, “Using sensor pattern noise for camera model identification”, Proc. FCIP 15th IEEE International Conference on Image Processing, pp. 1296-1299, 2008.

XX.TechnischeUniversität Dresden, Dresden, Germany. Dresden Image Database, accessed on May 1, 2015. [Online]. Available: http://forensics.inf.tu-dresden.de/ddimgdb.

XXI.X. Kang, Y. Li, Z. Qu and J. Huang, “Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise”, in IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 393-402, April 2012.

XXII.Y. Sutcu, S. Bayram, H. T. Sencar and N. Memon, “Improvements on Sensor Noise Based Source Camera Identification,” 2007 IEEE International Conference on Multimedia and Expo, Beijing, 2007, pp. 24-27.

XXIII.Yoichi Tomioka, Yuya Ito, and Hitoshi Kitazawa, “Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise”, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 12, December 2013.

View Download

Influence of Lime on Low Plastic Clay Soil Used as Subgrade

Authors:

Adnan Asad, ArshadHussain, Abdul Farhan, Adeel Ahmed Bhatti, Mehr-E-Munir

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00005

Abstract:

Weak clayey soil can cause premature failure in subgrade so their removal or proper treatment is necessary for the efficiency of structure. Soil stabilization is an excellent choice and economical in many circumstances for treatment and proper behavior of weak subgrade soil as recommended by many researchers. Lime is the oldest and well known additive for stabilization of many type of soils. This paper presents geotechnical investigation of low plastic clay soil being used as subgrade stabilized with lime. The low plastic clayey subgrade soil was stabilized with different percentages of lime and results show that soil can be satisfactorily stabilized with the addition of 6% lime. The Atterberg’s limit, compaction characteristics and strength tests including unconfined compressive strength (UCS) and California bearing ratio (CBR) tests were performed. Results indicate that addition of lime reduce plasticity index. An increase in OMC was observed with the decrease in maximum dry density (MDD). CBR and unconfined compressive strength of soil (qu)values improved significantly with the addition of lime.

Keywords:

Soil Stabilization,Lime,Subgrade Stabilization,Low Plastic Clay,

Refference:

I.Al-Rawas, A. A., Hago, A. W., & Al-Sarmi, H. (2005). Effect of lime, cement and Sarooj (artificial pozzolan) on the swelling potential of an expansive soil from Oman.Building and Environment,40(5), 681-687.

II.Eisazadeh, A., Kassim, K. A., & Nur, H. (2012). Solid-state NMR and FTIR studies of lime stabilized montmorillonitic and lateritic clays.Applied Clay Science,67, 5-10.

III.Ghobadi, M. H., Abdilor, Y., & Babazadeh, R. (2014). Stabilization of clay soils usinglime and effect of pH variations on shear strength parameters.Bulletin of Engineering Geology and the Environment,73(2), 611-619.

IV.Harichane, K., Ghrici, M., Kenai, S., & Grine, K. (2011). Use of natural pozzolana and lime for stabilization of cohesive soils.Geotechnical and geological engineering,29(5), 759-769.

V.Ingles, O. G., & Metcalf, J. B. (1972).Soil stabilization principles and practice(Vol. 11, No. Textbook).

VI.Little, D. N., Thompson, M. R., Terrell, R. L., Epps, J. A., & Barenberg, E. J. (1987).Soil stabilization for roadways and airfields. LITTLE (DALLAS N) AND ASSOCIATES BRYAN TX.

VII.Murthy, V. N. S. (2002).Geotechnical engineering: principles and practices of soil mechanics and foundation engineering. CRC press.

VIII. Muhmed, A., & Wanatowski, D. (2013). Effect of Lime Stabilisation on the Strength and Microstructure of Clay IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) ISSN: 2320-334X.Volume6, Issue3.

IX.Osinubi, K. J., Bafyau, V., & Eberemu, A. O. (2009). Bagasse ash stabilization of lateritic soil. InAppropriate Technologies for Environmental Protection in the Developing World(pp. 271-280). Springer, Dordrecht.

X.Rogers, C. D. F., Glendinning, S., & Roff, T. E. J. (1997, October). Lime modification of clay soils for construction expediency. InProceedings of the Institution of Civil Engineers: Geotechnical Engineering(Vol. 125, No. 4).

XI.Tuncer, E. R., & Basma, A. A. (1991). Strength and stress-strain characteristics of a lime-treated cohesive soil.Transportation Research Record, (1295).

View Download

Analysis of Effect of Ground Granulated Blast Furnace Slag (GGBFS) on the Mechanical Properties of Concrete using Destructive and Non-destructive Tests

Authors:

Tarun Yadav, Jatin Singh, Sandeep Panchal, Md. Mohsin Khan, Shilpa Pal

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00006

Abstract:

Ground granulated furnace slag is a waste material which is rich in Calcium. Aim of this study is to observe the effect of mixing of ground granulated blast furnace slag as a replacement of cement in concrete. The study is conducted on M-30 grade concrete. The cement is replaced partially by the ground granulated blast furnace slag to obtain a cost-effective mix. The concrete mixes are prepared by replacing the cement by 15%, 30%, 45%, 60% and 75 % ground granulated blast furnace slag. The tests are performed to know the compressive strength, flexural strength and workability of concrete. Non-destructive tests like rebound hammer test and ultrasonic pulse velocity tests are also performed to understand the post hardening characteristics of the concrete. It is found that the replacement of cement GGBFS reduces the initial strength of concrete but increases the ultimate strength if mixed in optimum amount. The optimum percentage of ground granulated furnace slag in M-30 concrete is found to be 45%. The workability increases as the amount of GGBFS is increased in the mix. The post hardening tests show the better performance of concrete at 30% and 45% mixing of GGBFS in concrete.

Keywords:

GGBFS,waste management,concrete,flexural strength,compression strength ,

Refference:

I.A. Islam, U.H. Alengaram, M.Z. Jumaat, I.I. Bashar, “The Development of Compressive Strength of Ground Granulated Blast Furnace Slag-Palm Oil Fuel Ash-Fly Ash Based Geo-polymer Mortar”, Materials and Design, Vol. 56, pp. 833-841, April 2014.

II.A.Venkatakrishnaiah, G.Sakthviel, “Bulk Utilization of Fly-ash in Self-compacting Concrete”, KSCE Journal of Civil Engineering, Vol. 19, No.7, pp. 2116-2120, November 2015.

III.F. Hogan, J. Meusel, “Evaluation for Durability and Strength Development of a Ground Granulated Blast Furnace Slag,” Cement, Concrete and Aggregates, Vol. 3, No. 1, pp. 40-52, 1981.

IV.H. Sethi, P.P. Bansal, R. Sharma, “Effectof Addition of GGBS and Glass Powder on the Properties of Geo-polymer Concrete”, Iranian Journal of Science and Technology, Transactions of Civil Engineering, pp. 1-11, November 2018.

V.H. Wang, J. Wang, X. Sun, W. Jin, “Improving Performance of Recycled Aggregate Concrete with Superfine Pozzolanic Powders”, Journal of Central South University, Vol. 20, No. 12, pp. 3715-3722, December 2013

VI.L. Black, P. Purnell, J. Hill, “Current Themes in Cement Research”, Advances in Ceramics, Vol. 109, No. 5, pp. 253-259, 2010.

VII.M.R. Antonyamaladhas, S. Chachithanantham, A. Ramaswamy, “Performance and Behaviour of Ground Granulated Blast Furnace Slag Imparted to Geopolymer Concrete Structural Elements and Analyzed with ANSYS”, Advances in Material Science and Engineering, Vol. 2016, pp. 1-9, August 2016.

VIII.M.Arizoumandi, S.A.Volz, “Effect of Fly Ash Replacement Level on the Fracture Behavior of Concrete”, Frontiers of Structural and Civil Engineering, Vol. 7, No. 4, pp. 411-418,December 2003.

IX.M. Elchalakani, T. Aly, E. Abu-Aisheh, “Sustainable concrete with high volume GGBFS to build Masdar City in the UAE”, Case Studies in Construction Materials, Vol. 1, pp. 10-24, December 2013.

X.O.Kayali,“Effect of High Volume Fly Ash on Mechanical Properties of Fiber Reinforced Concrete”, Materials and Structures, Vol. 37, No. 5, pp. 318-327, June 2004.

XI.O.M. Omar, G. D. AbdElhameed, M. A Sherif, H.A. Mohamadien, “Influence of limestone waste as partial replacement material for sand and marble powder in concrete properties”, HRBC Journal,Vol. 8, No. 3, pp. 193-203, December 2003.

XII.R. Siddique, D. Kaur, “Properties of Concrete Containing Ground Granulated Blast Furnace Slag (GGBFS) at Elevated Temperatures”, Journal of Advanced Research, Vol. 3, No. 1, pp. 45-51, January 2012.

XIII.S.A. Zareei, F.Ameri, F. Dorostkar, M. Ahmadi, “Rice Husk Ash as a Partial Replacement of Cement in High Strength Concrete containing Micro Silica: Evaluating Durability and Mechanical Properties”, Case Studies in Construction Materials, Vol. 7, pp. 73-81, December 2017.

XIV.S.P. Dunuweera, R.M.G. Rajapakse, “Cement Types, Composition, Uses and Advantages of Nano-cement, Environmental Impact on Cement Production, and Possible Solutions”, Advances in Material Science and Engineering, Vol. 2018, pp. 1-13, April 2018.

XV.S.V. Deo, “Parametric Study of Glass Fiber Reinforced Concrete”, Advances in Structural Engineering, In: Matsagar V. (eds), Springer, New Delhi, pp. 1909-1916, December 2004.

View Download

A Modification of the Generalized Kudryashov Method for the System of Some Nonlinear Evolution Equations

Authors:

H. M. Shahadat Ali, M. A.Habib, M. Mamun Miah, M. Ali Akbar

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00007

Abstract:

In this study, a comparatively new technique named the generalized Kudryashov method (gKM) has been effectively implemented to explore the exact traveling wave solutions to some nonlinear evolution equations (NLEEs) in the field of nonlinear science and engineering. The effectiveness of the new functional method has been demonstrated by investigating single as well as coupled equations with arbitrary parameters explicitly the coupled Higgs field equation, the Benney-Luke equation, and the Drinfel'd-Sokolov-Wilson (DSW) equation. As a matter of fact, the solution attained in this article thrust into the abundant wave solutions which includes kink, singular kink, periodic and solitary wave solutions. Moreover, the characteristics of these analytic solutions are interpreted depicting some 2D and 3D graph by using computer symbolic programming Wolfram Mathematica. The computational work ascertained that the employed method is sturdy, simple, precise, and wider applicable. Also, the prominent competence of this current method ensures that practically capable to reducing the size of the computational task and can be solved several nonlinear types of new complex higher order partial differential equations that originating in applied mathematics, computational physics and engineering.

Keywords:

Thegeneralized Kudryashov method,Coupled Higgs field equation,Benney-Luke equation,DSW equation, Traveling wave solution,Solitary wave solution,Exact solution,

Refference:

I.A. Bekir,A. Boz, “Applications of the He’s exp function method for nonlinear evolution equations”, Comput. Math. Appl., Vol.: 58, Issue: 11-12, pp.: 2286-2293, 2009.

II.A.H. Arnous, M. Mirzazadeh, M. Eslami,”Exact solution of the Drinfel’d Sokolov Wilson equation using Backlund transformation of Riccati equation and trial function approach”,Prama. J. Phys. Vol.: 86, Issue: 6,pp.: 1153-1160, 2016.

III.A. H. Arnous, M. Mirzazadeh, M. Eslami,”The Backlund transformation method of Riccati equation applied to Coupled Higgs field and Hamiltonian amplitude equations”,Comput. Methods Diff. Equat.,Vol.: 2, Issue: 4,pp.: 216-226, 2014.

IV.A. J. M. Jawad, M. D. Petkovic, A. Biswas,”Modified simple equation method for nonlinear evolution equations”, Appl. Math. Comput., Vol.: 217, Issue: 2,pp.: 869-877, 2010.

V.A. M. Wazwaz, “The extended tanh method for abundant solitary wave solutions of nonlinear wave equations”,Appl. Math. Comput., Vol.:187, Issue: 2,pp.: 1131-1142, 2007.

VI.D. Kumar, A. R. Seadawy, A. K. Joardar,”Modified Kudryashov method via new exact solution for some conformable fractional differential equations arising in mathematical biology”,Chin. J. Phys.,Vol.: 56, Isssue:1,pp.:75-85, 2018.

VII.D. Lu, D. Kang, B. Hong,”New exact solutions of the Drinfel’d SokolovWilson equation”,J. Informa. Comput. Sci., Vol.:18, pp.: 5955-5962, 2013.

VIII.E. Aksoy, M. Kaplan, A. Bekir,”Exponential rational function method for space-time fractional differential equations”,Waves Rand. Compl. Media, Vol.: 26, pp.: 142-151, 2016.

IX.E. Babolian, A. Azizi, J. saeidian,”Some notes on using the homotopy perturbation method for solving time-dependent differential equations”, Math. Comput. Model., Vol.; 50, Issue: 1-2, pp.: 213-224, 2009.

X.E. Fan,”Extended tanh method and its applications to nonlinear equation”. Phys. Lett. A, Vol.: 277, Issue: 4-5,pp.: 212-218, 2000.

XI.E. Fan, J. Zhang,”Applications of the Jacobi elliptic function method to special-type nonlinear equations”,Phys. Lett. A, Vol.:305, Issue: 6, pp.: 383-392, 2002

XII.E. M. E. Zayed,A. G. A. Nowehy,”The solitary wave ansatz method for finding the exact bright and dark soliton solutions of two nonlinear Schrodinger equations”,J. Assn. Arab Univ. Basic Appl. Sci., Vol.: 24, Issue:1, pp.:184-190, 2017.

XIII.F. Mahmud,M. Samsuzzoha, M. A. Akbar, “The generalized Kudryashov method to obtain exact traveling wave solutions of the PHI-four equation and the Fishers equation”,Res. Phys., Vol.: 7, pp.: 4296-4302, 2017.

XIV.G. Allah,R. Musa, Elzaki, M. Tarig, “Application of new homotopy perturbation method for solving partial differential equations”, J. Comput. Theor. Nanosci., Vol.: 15, Issue: 2, pp.: 500-508, 2018.

XV.H. Mao,Q. P. Liu, “Backlund-Darboux transformation and discretizations of 𝑁=2, 𝑎=−2supersymmetric KdV equation”,Phys. Lett. A, Vol.:382, Issue: 5, pp.: 253-258, 2018.

XVI.H. Naher,F. A. Abdullah, M. A. Akbar, “The exp function method for the new exact solution of the nonlinear partial differential equations”, Int. J. Phys. Sci., Vol.: 6, Issue: 29,pp.:6706-6716, 2011.

XVII.H. Triki,A. Yildirim, T. Hayat, O. M. Aldossary, A. Biswas, “Shockwave solution of Benney-Luke equation”,Romanian J. Phys., Vol.: 57, Issue: 7-8, pp.: 1029-1034, 2012.

XVIII.I. Hasim,”Adomian decomposition method for solving BVPs for fourth-order integrodifferential equations”,J. Comput. Appl. Math., Vol.: 193, Issue: 2,pp.:658-664, 2006.

XIX.J. H.He, “Homotopy perturbation technique”,Comput. Methods Appl. Mech. Eng., Vol.:178, Issue: 3-4,pp.:257-262, 1999.

XX.K. A. Gepreel, T. A. Nofal, A. A. Alasmari,”Exact solutions for nonlinear integro-partial differential equations using the generalized Kudryashov method”,J. Egypt. Math. Soc., Vol.: 25, pp.: 438-444, 2017.

XXI.K. Khan, M. A. Akbar, N. H. M. Ali,”The modified simple equation for exact and solitary wave solution of nonlinear evolution equation: the GZK-BBM equation and right-handed non-commutative Burgers equations”,ISRN Math. Phys., pp: 5, Article ID 146704, 2013.

XXII.K. R. Raslan,”The application of He’s exp function method for mKdV and Burgers equations with variable coefficients”,Int. J. Nonlinear Sci., Vol.: 7, Issue: 2, pp.: 174-181, 2009.

XXIII.L. Xu,”He’s parameter expanding methods for strongly nonlinear oscillators”,J. Comput. Appl. Math., Vol.: 207, Issue: 1, pp.: 148-154, 2007.

XXIV.M. A. Akbar, N. H. M. Ali,”The improved F-expansion method with the Riccati equation and its applications in mathematical physics”,Cogent Math. Vol.: 4, ID.: 1282577, 2017

XXV.M. A. Khater, A. R. Seadawy, D. Lu,”Dispersive solitary wave solutions of new coupled Konno-Ono,Higgs field and Maccari equations and their applications”,J. King Saud Univ. Sci., Vol.: 30, pp.: 417-423, 2018.

XXVI.M. Kaplan, A. Bekir, A. Akbulut, E. Aksoy,”The modified simple equation method for nonlinear fractional differential equations”,Romanian J. Phys., Vol.: 60, Issue: 9-10,pp.:1374-1383, 2015.

XXVII.M. K. Elboree,”The Jacobi elliptic function method and its application for two-component BKP hierarchy equations”,Comput. Math. Appl., Vol.: 62, Issue: 12,pp.: 4402-4414, 2011.

XXVIII.M. Koparan, M. Kaplan, A. Bekir, O. Guner,”A novel generalized Kudryashov method for exact solutions of nonlinear evolution equations”,AIP Con. Proc., Vol.: 1798, Issue: 1, 2017.

XXIX.M. M. Kabir, A. Khajeh, E. Aghdam, A. Y. Koma,”Modified Kudryashov method for finding exact solitarywave solutions of higher order nonlinear equations”,Math. Methods Appl. Sci., Vol.: 34, Issue: 2, pp.: 213-219, 2011.

XXX.M. S. Islam, K. Khan, M. A. Akbar,”Application of the improved F-expansion method with Riccati equation to find the exact solution of the nonlinear evolution equations”,J. Egypt. Math. Soc.,Vol.:25, pp.: 13-18, 2017.

XXXI.N. Ahmed, S. Bibi, U. Khan, S. T. Mohyud-din,”A new modification in the exponential rational function method for nonlinear fractional differential equations”,Eur. Phy. J. Plus, Vol.: 133, Issue: 45, 2018.

XXXII.N. Taghizadeh, M. Mirzazadeh,”The first integral method to some complex nonlinear partial differential equations”,J. Comput. Appl. Math., Vol.: 235,pp.:4871-4877, 2011.

XXXIII.O. A. Taiwo,”A parameter expansion method for two-point nonlinear singularly perturbed boundary value problems”,Int. J. Comput. Math., Vol.:55, Issue: 3-4, pp.: 189-196, 1995.

XXXIV.S. H. Dong,”The ansatz method for analyzing Schrodinger’s equation with three anharmonic potentials in D dimensions”,J. Genetic Counse., Vol.: 15, Issue: 4, pp.: 385-395, 2002.

XXXV.S. Kumar, K. Sing, R. K. Gupta,”Coupled Higgs field equations and Hamiltonian amplitude equation: Lie classical approach and (𝐺′/𝐺)-expansion method”,Prama. J. Phys., Vol.: 79, Issue: 1, pp.: 41-60, 2012.

XXXVI.S. Kutluay, A. Esen,”Exp function method for solving the general improved KdV equation”,Int. J. Nonlinear Sci. Numer. Simul., Vol.: 10, Issue: 6, pp.: 717-725, 2009

XXXVII.S. Sirisubtawee, S. koonprasert,”Exact traveling wave solution of certain nonlinearpartial differential equations using the (𝐺′𝐺2)-expansion method”,Advan. Math. Phys., Article ID 7628651, pp.:15, 2018.

XXXVIII.X. J. Yang, H. M. Srivastava, J. H. He, D. Baleanu,”Cantor-type cylindrical co-ordinate method for differential equations with local fractional derivatives”,Phys. Lett. A, Vol.: 377, Issue: 28-30, pp.: 1696-1700, 2013.

XXXIX.Y. C. Hon, E. G. Fan, “A series of the exact solution for coupled Higgs field equations and coupled Schrodinger-Boussinesq equations”, Nonlinear Anal., Theory Methods Appl., Vol.: 71, Issue: 7-8, pp.: 3501-3508, 2009.

XL.Z. Islam,M. M. Hossain, M. A. W. Seikh, “Exact traveling wave solution to Benney-Luke equation”,J. Bangladesh Math. Soc., Vol.: 37, pp.:1-14, 2017.

View Download

Towards Risk Adjusted Performance Appraisal of Indian Mutual Funds

Authors:

Atanu Das

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00008

Abstract:

This paper is based on the study of mutual funds in India which is understood to be one of the most vibrant in the money market. This paper analyses a set of representative schemes from heterogeneous group of different fund houses. There are well established criteria to judge their performance absolutely and also in relative terms. This paper deals with the analysis of risk-returns parameters of different mutual fund schemes and the relation between the risk preference of the investors and the risk adjusted performance (RAP) measure based on real time data. Various tests are applied to evaluate the performance of mutual funds based on well established measures and those tests have been used to rank the funds accordingly. Some hypotheses are constructed and tested to find out whether there are significant differences in their absolute and RAP. The paper also proposed an easy and practical path to solve an optimal portfolio problem containing the various mutual fund schemes. The analysis is carried out with the help of William Sharpe’s single index model and result could of use to substantial investors who are choosing an optimum portfolio of various mutual funds.

Keywords:

Mutual fund,Risk adjusted performance,Sharp index,Optimal portfolio,

Refference:

I.A. Shah, S. Thomas, M. Gorham, India‟s Financial Market: An Insider‟s Guide, How the Markets Work, Academic Publishers, 2008.

II.B. Roy and S. S. Deb, “Conditional Alpha and Performance Persistence for Indian Mutual Funds: Empirical Evidence”, ICFAI Journal of Applied Finance, pp. 30-48, January, 2004.

III.E.Thanou,“Mutual Fund Evaluation During Up and Down Market Conditions: The Case of Greek Equity Mutual Funds”, International Research Journal of Finance and Economics, Vol.:13, pp. 84-93, 2008.

IV.G. Elton, G. Brown, “Modern portfolio theory and investment analysis”, 7th edition, John Wiley & Sons, Inc, 2007.

V.J. A. Haslem, Mutual funds: risk and performance analysis for decision making. John Wiley & Sons, 2009.

VI.J. D. Jobson, and B. Korkie, “Performance Hypothesis Testing with the Sharpe and Treynor Measures”, Journal of Finance, 36, 888-908, 1981.

VII.K. Daniel, M. Grinblatt, S. Titman and R. Wermers, “Measuring mutual fund performance with characteristic-based benchmarks”, Journalof Finance 52, 1035–1058, 1997.

VIII.L. Chan, H. Chen and J. Lakonishok, “On Mutual Fund Investment Styles”, The Review of Financial Studies, Vol.: 15, Issue: 5, pp. 1407-1437, 2002.

IX.M. C.Jensen, “The performance of mutual funds in the period 1945–1964”, The Journal of finance, Vol.: 23, Issue: 2, pp. 389-416, 1968.

X.M. Jayadev, “Mutual Fund Performance: An Analysis of Monthly Returns”, Finance India, Vol.: X, No.: 1, pp. 73–84, 1996

XI.N. D.Rao, “Investment Styles and Performance of Equity Mutual Funds in India”, available at SSRN http://ssrn.com/abstract=922595, 2006.

XII.P. K. Muthappan and E. Damodharan, “Risk-Adjusted Performance of Indian Mutual Funds Schemes”,Finance India,Vol.: 20, Issue: 3, 2006.

XIII.R. Bahadur, P. S. Koirala, “Application of Markowitz and Sharpe Models in Nepalese Stock Market”, The Journal of Nepalese Business Studies, Vol.: III, No.: 1, 2006.

XIV.S. D. Groot, and A. Plantinga, Risk-Adjusted Performance Measures and Implied Risk-Attitudes”, available at http://ssrn.com/abstract=289193, Nov 2001.

XV.S. H. Thomas and A. P. Ralph, “Equity Mutual Fund Historical Performance Ratings as Predictors of Future Performance”, Journal of Financial and Strategic Decisions, Vol.: 9, No.: 1, 1996.

XVI.S. Lee, and S. Stevenson, “Testing the Statistical Significance of Sector and Regional Diversification. Journal of Property Investment, and Finance, Vol.: 23, Issue: 5, pp. 394–411, 2005.

XVII.S. Sankaran, Indian Mutual Funds Handbook , A Guide For Industry Professionals And Intelligent Investors, 2nd ed., Vision Books, 2008.

XVIII.W. F. Sharpe, “The Sharpe Ratio”, Journal of Portfolio Management, Vol.: 21, 1994.

XIX.W. Sharpe, G. J. Alexander, J. W. Bailey, Investment, PHI (2006).

XX.Y. Ali, “Simplifying the Portfolio Optimization Process via Single Index Model”, available http://www.iems.northwestern.edu/docs/undergraduate/honors/Ali.pdf, 2008.

View Download

An Enhanced Data Access Control and Privacy Preserving Mechanism in Cloud Using Uncrackable Cipher Dynamic Double Encryption Standard

Authors:

P. Jhansi Rani, Dr. M. Akkalakshmi

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00009

Abstract:

Cloud computing is the evolving paradigm that provides the services in which cloud consumers can remotely save their data into the cloud and access the on-demand high-quality applications. In the existing technique explained an Extendable Access Control System procedure supposed that the authority is the trusted party, but in many cases, they may perform an illegal action which causes the data loss. The proposed work encrypted the data through Uncrackable Cipher Dynamic Double Encryption Standard (UCDDES). Generally, the UCDDES contains the key length of 32, 40 and 48. To randomly select the key length reduced the data security issues. After dynamically selecting the key length the data governor sent the key request to the authority. Then based on the obtained key length the data governor generated the partial secret key. It is further used to decrypt the data and stored in the cloud storage. The results improve the security of cloud and access control. It reduces the issue of unauthorized user/ hackers accessing data. It increases the cloud security and prevents from dictionary attacks, brute force attacks, collision attacks, and so on.

Keywords:

Cloud computing,data security issues,UCDDES based data encryption,cloud network security,

Refference:

I.Cui, H., Deng, R. H., & Li, Y. (2018). Attribute-based cloud storage with secure provenance over encrypted data.Future Generation Computer Systems,79, 461-472.

II.Di Vimercati, S. D. C., Foresti, S., Jajodia, S., Paraboschi, S., &Samarati, P. (2007, November). A data outsourcing architecturecombining cryptography and access control. InProceedings of the 2007 ACM workshop on Computer security architecture(pp. 63-69). ACM.

III.Divya, S. V., Shaji, R. S., &Venkadesh, P. (2018). An Efficient Data Storage and Forwarding Mechanism Using Fragmentation-Replication and DADR Protocol for Enhancing the Security in Cloud. Journal of Computational and Theoretical Nanoscience,15(1), 111-120.

IV.Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006, October). Attribute-based encryptionfor fine-grained access control of encrypted data. InProceedings of the 13th ACM conference on Computer and communications security(pp. 89-98). Acm.

V.Hur, J. (2013). Improving security and efficiency in attribute-based data sharing.IEEE transactions on knowledge and data engineering,25(10), 2271-2282.

VI.Iyapparaja, M., Navaneethan, C., Meenatchi, S., Kumar, P. J., &Suganya, P. (2017). A Privacy-Preserving Secure Access Control Mechanism in Cloud.

VII.Kumar, K., & Lu, Y. H. (2010). Cloud computing for mobile users: Can offloading computation save energy?.Computer,43(4), 51-56.

VIII.Mell, Peter, and Tim Grance. “The NIST definition of cloud computing.” (2011).

IX.Ning, J., Cao, Z., Dong, X., Liang, K., Wei, L., & Choo, K. K. R. (2018). CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage.IEEE Transactions on Services Computing.

X.Patil, P., Narayankar, P., Narayan, D. G., &Meena, S. M. (2016). A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA, andBlowfish.Procedia Computer Science,78, 617-624.

XI.Qiu, M., Gai, K., Thuraisingham, B., Tao, L., &Zhao, H. (2018). Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financialindustry.Future Generation Computer Systems,80, 421-429.

XII.Sahai, A., & Waters, B. (2005, May). Fuzzy identity-based encryption. InAnnual International Conference on the Theory and Applications of Cryptographic Techniques(pp. 457-473). Springer, Berlin, Heidelberg.

XIII.Shiraz, M., Sookhak, M., Gani, A., & Shah, S. A. A. (2015). A study on the critical analysis of computational offloading frameworks for mobile cloud computing.Journal of Network and Computer Applications,47, 47-60.

XIV.Sookhak, M., Akhunzada, A., Gani, A., Khurram Khan, M., &Anuar, N. B. (2014). Towards dynamic remote data auditing in computational clouds.The Scientific World Journal,2014.

XV.Sookhak, M., Gani, A., Khan, M. K., &Buyya, R. (2017). Dynamic remote data auditing for securing big data storage in cloud computing.Information Sciences,380, 101-116.

XVI.Sookhak, M., Gani, A., Talebian, H., Akhunzada, A., Khan, S. U., Buyya, R., &Zomaya, A. Y. (2015). Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues.ACM Computing Surveys (CSUR),47(4), 65.

XVII.Sookhak, M., Talebian, H., Ahmed, E., Gani, A., & Khan, M. K. (2014). A review on remote data auditing in single cloud server: Taxonomy and open issues.Journal of Network and Computer Applications,43, 121-141.

XVIII.Sookhak, M., Yu, F. R., Khan, M. K., Xiang, Y., &Buyya, R. (2017). Attribute-based data access control in mobile cloud computing: Taxonomy and open issues.Future Generation Computer Systems,72, 273-287.

XIX.Srinivasan, S., & Raja, K. (2018). An Advanced Dynamic Authentic Security Method for Cloud Computing. InCyber Security: Proceedings of CSI 2015(pp. 143-152).Springer Singapore.

XX.Tang, H., Sun, Q. T., Yang, X., & Long, K. (2018). A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense.IEEE Access,6, 26059-26068.

XXI.Wang, C., Ren, K., Lou, W., & Li, J. (2010). Toward publicly auditable secure cloud data storage services.IEEE Network,24(4).

XXII.Whaiduzzaman, M., Sookhak, M., Gani, A., &Buyya, R. (2014). A survey on vehicular cloud computing.Journal of Network and Computer Applications,40, 325-344.

XXIII.Yuan, D., Song, X., Xu, Q., Zhao, M., Wei, X., Wang, H., & Jiang, H. (2018). An ORAM-based privacy-preservingdata sharing scheme for cloud storage.Journal of information security and applications,39, 1-9.

XXIV.Zhou, Z., & Huang, D. (2012, October). Efficient and secure data storage operations for mobile cloud computing. InProceedings of the 8th International Conference on Network and Service Management(pp. 37-45). International Federation for Information Processing.

XXV.Zuo, C., Shao, J., Liu, J. K., Wei, G.,& Ling, Y. (2018). Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage.IEEE Transactions on Information Forensics and Security,13(1), 186-196.

View Download

Demystifying Deep Learning Frameworks- A Comparative Analysis

Authors:

Divyanshu Sinha, JP Pandey, Bhavesh Chauhan

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00010

Abstract:

Deep learning is a rapidly growing field of machine learning which finds the application of its methods to provide solutions to numerous problems related to computer vision, speech recognition, natural language processing, and others. This paper gives a comparative analysis of the five deep learning tools on the grounds of training time and accuracy. Evaluation includes classifying digits from the MNIST data set making use of a fully connected neural network architecture (FCNN). Here we have selected five frameworks— Torch ,Deeplearning4j, TensorFlow, Caffe & Theano (with Keras), to evaluate their performance and accuracy. In order to enhance the comparison of the frameworks, the standard MNIST data set of handwritten digits was chosen for the classification task. When working with the data set, our goal was to identify the digits (0–9) using a fully connected neural network architecture. All computations were executed on a GPU. The key metrics addressed were training speed, classification speed, and accuracy.

Keywords:

Deep Learning, Feedforward MLP,Keras,Tensorflow,Theano,Caffe,Deeplearning4j,Torch,

Refference:

I.Anuj Dutt, AashiDutt. “Handwritten Digit Recognition Using Deep Learning. ” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 6, Issue 7, July 2017.

II.Alexander K. Seewald, “On the Brittleness of Handwritten Digit Recognition Models,”ISRN Machine Vision, vol. 2012, Article ID 834127, 2012.

III.Li DengMicrosoft Research, Redmond, Washington USA. ” The MNIST Database of Handwritten Digit Images for Machine Learning Research [Best of the Web]” IEEE Signal Processing Magazine(Volume: 29,Issue: 6, Nov. 2012).

IV.Muhammad Ramzan, Shahid Mehmood Awan,Hikmat Ullah Khan , Waseem Akhtar, Ammara Zamir,Mahwish Ilyas. “A Survey on using Neural Network based Algorithms for Hand Written Digit.” International Journal of Advanced Computer Science and Applications, Vol. 9, No. 9, 2018.

V.Subhransu Maji and Jitendra Malik EECS Department University of California, Berkeley Technical Report No. UCB/EECS-2009-159 November 25, 2009http://www2.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-159.pdf

View Download

STATE ESTIMATION AND POWER LOSS MINIMIZATIONOF PESCO GRIDUSING NEWTON RAPHSON AND PARTICLE SWARM OPTIMIZATION

Authors:

Akhtar Khan, Azazullah Khan, Muhammad Aamir Aman, Fazal Wahab Karam

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00011

Abstract:

This study is targeted for reducing the power losses for a branch of Peshawar Electric Supply Company (PESCO), a small electric power grid in Pakistan, starting from Shahibagh and ending at Hayatabad substation. This study evaluates the current configuration of the transmission network, and then by using Particle Swarm Optimization, the best possible configuration that will ensure maximum throughput and minimum transmission and distribution losses is determined. The study is verified using Newton Raphson Method. Newton Raphson method is used to find the state of the mentioned network and then after the new configuration is proposed, the state estimation is done again to evaluate various parameters of the network and confirm its feasibility. The reconfiguration resulted from the PSO and NR methods have shown electric power losses minimization of the selected grid with 15.021%, amounting to a total of 0.3MW power loss minimization.

Keywords:

Power systems, Power system measurements, Power grids,Power system planning,Power transmission,

Refference:

I.Cui-Ru Wang et al., “A modified particle swarm optimization algorithm and its application in optimal power flow problem,” in 2005 International Conference on Machine Learning and Cybernetics, 2005, vol. 5, no. August, p. 2885–2889 Vol. 5.

II.F. R. Zaro and M. A. Abido, “Multi-objective particle swarm optimization for optimal power flow in a deregulated environment of power systems,” 2011 11th International Conference on Intelligent Systems Design and Applications. IEEE, 2011.

III.H. Yoshida, K. Kawata, Y. Fukuyama, S. Takayama, and Y. Nakanishi, “A particle swarm optimization for reactive power and voltage control considering voltage security assessment,” IEEE Trans. Power Syst., vol.15, no. 4, pp. 1232–1239, 2000.

IV.I. M. Malik and D. Srinivasan, “Optimum power flow using flexible genetic algorithm model in practical power systems,” 2010 Conference Proceedings IPEC. IEEE, 2010.

V.J. A. J. A. Momoh, S. X. X. Guo, E. C. C. Ogbuobiri, andR. Adapa, “the Quadratic Interior Point Method Solving Power System Optimization Problems,” IEEE Trans. Power Syst., vol. 9, no. 3, pp. 1327–1336, 1994.

VI.L. L. Lai et al., “Particle Swarm Optimization for Economic Dispatch of Units with Non-Smooth Input-Output Characteristic Functions,” Proceedings of the 13th International Conference on, Intelligent Systems Application to Power Systems. IEEE.

VII.M. A. Abido, “Multiobjective Particle Swarm Optimization for OptimalPower Flow Problem,” in 12th International Middle-East Power System Conference, 2008. MEPCON 2008., 2008, pp. 392–396.

VIII.Muhammad Aamir Aman, 2Muhammad Zulqarnain Abbasi, 3Akhtar Khan, 4Waleed Jan, 5Mehr-e-Munir.Department of Electrical Engineering, IQRA National University, Peshawar, Pakistan. Power Generator Automation, Monitoring and Protection System. J.Mech.Cont.& Math. Sci., Vol. -13, No. -4, September-October (2018) Pages 122 –133.

IX.Muhammad Aamir Aman, 2Muhammad Zulqarnain Abbasi, 3Hamza Umar Afridi, 4KhushalMuhammad, 5Mehr-e-Munir.. Department of Electrical Engineering, IQRA National University, Peshawar, Pakistan. Prevailing Pakistan’s Energy Crises. J.Mech.Cont.& Math. Sci., Vol. -13, No. -4, September-October (2018) Pages 147-154.

X.N.P. Padhy, M. A. Abdel-Moamen, and B. J. Praveen Kumar, “Optimal location and initial parameter settings of multiple TCSCs for reactive power planning using genetic algorithms,” IEEE Power Eng. Soc. Gen. Meet. 2004., vol. 2, pp. 1110–1114, 2004.

XI.Weibing Liu, Min Li, and Xianjia Wang, “An improved particle swarm optimization algorithm for optimal power flow,” 2009 IEEE 6th International Power Electronics and Motion Control Conference. IEEE, pp. 2448–2450, 2009.

View Download

Summarization of 3D-Printing Technology in Processing & Development of Medical Implants

Authors:

Ganzi Suresh, M. Harinatha Reddy, Gurram Narendra Santosh Kumar, S. Balasubramanyam

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00012

Abstract:

3D-printing technology is otherwise called added substance assembling or fast prototyping, is an advanced manufacturing technique which builds 3D parts directly in layer by layer from the computer aided plan model in raster way with minimal wastage of material. Rather than in conventional manufacturing process where material is removed by the hard tool to bring the 3D component in desired model, 3D printing is completely contrast to it where material is added in sequence parts are built in layer by layer, it doesn’t require any post processing as in conventional process. 3D printed parts are more performing under different loading conditions and easy to build and repair parts any stage of design cycle. Due its flexibility of manufacturing, it shows its applications in auto ancillaries, aerospace and medical filed. 3D printing technology showing it influencing in making medical implants. Manufacturing of medical implants in conventional process is very expensive. As these implants vary patient to patient, and it is difficult to make tailor made implants in conventional manufacturing processes. Hence 3D printing technology can overcome this issue with minimal cost for making tailor made implants for individual patients

Keywords:

Additive manufacturing,bio-materials,medical implants,

Refference:

I.C. Nastase-Dan, P. Doru Dumitru, G. Gheorghe Ion, and P. Sanda, “Innovative technology through selective laser sintering in mechatronics, biomedical engineering and industry,” Incas Bull., vol. 3, no. 1, pp. 31–37, 2011.

II.D. T. R. S. G. Pham, “A Comparsion of RP Technologies.pdf.

III.D. V Mahindru, P. Mahendru, V. Mahindru, and P. Mahendru, “Review of Rapid Prototyping-Technology for the Future,” Glob. J. Comput. Sci. Technol. Graph. {&} Vis., vol. 13, no. 4, pp. 27–38, 2013.

IV.F. P. W. Melchels, J. Feijen, and D. W. Grijpma, “A review on stereolithography and its applications in biomedical engineering,” Biomaterials, vol. 31, no. 24, pp. 6121–6130, 2010.

V.G. Suresh and K. L. Narayana, “3D Printing: Breakthroughs in Research and Practice,” in 3D Printing, IGI Global, 2016, pp. 1–21.

VI.G. Suresh and K. L. Narayana, “A Review on Fabricating Procedures in Rapid Prototyping,” Int. J. Manuf. Mater. Mech. Eng., vol. 6, no. 2, 2016.

VII.G. Suresh, K. L. Narayana, and M. K. Mallik, “A Review on Development of Medical Implants by Rapid PrototypingTechnology,” Int. J. Pure Appl. Math., vol. 117, no. 21, pp. 257–276, 2017.

VIII.Ganzi Suresh, K L Narayana and M. Kedar Mallik., “Bio-Compatible Processing of LENSTM Deposited Co-Cr-W alloy for Medical Applications”. International Journal of Engineering and Technology (UAE). 7 (2.20) (2018) 362-366. DOI:10.14419/ijet.v7i2.20.16734.

IX.Ganzi Suresh, K L Narayana, M. Kedar Mallik, V. Srinivas and G. Jagan Reddy., “Processing & Characterization of LENSTM Deposited Co-Cr-W Alloy for Bio-Medical Applications”. International Journal of Pharmaceutical Research (IJPR) Volume 10, Issue-1, 2018, 276-285.

X.Ganzi Suresh, K L Narayana, M. Kedar Mallik, V. Srinivas, G. Jagan Reddy and I.Gurappa.,“Electro Chemical Corrosion Behavior of LENSTM Deposited Co-Cr-W Alloy for Bio-Medical Applications”. International Journal of Mechanical and Production Engineering Research and Development (IJMPERD) Special Issue, Jun 2018, 41-5.

XI.Hangobo Lan, “Web-based rapid prototyping and manufacturing systems: A review,” vol. 60, pp. 643–656, 2009.

XII.I.Palčič, M. Balažic, M. Milfelner, and B. Buchmeister, “Potential of laser engineered net shaping (LENS) technology,” Mater. Manuf. Process., vol. 24, no. 7–8, pp. 750–753, 2009.

XIII.Kumar, G. N. S. and A. Srinath. 2018. “An Ergonomical conditions of Pedestrians on Accelerating Moving Walkway: A People Mover System.” International Journal of Mechanical and Production Engineering Research and Development 8 (Special Issue 7): 1376-1381. www.scopus.com.

XIV.Kumar, Gurram Narendra Santosh, and A. Srinath. “Exploration of Accelerating Moving Walkway for Futuristic Transport System in Congested and Traffical Areas.” (2018): 616-624.

XV.L. Villalpando, H.Eiliat, and R. J. Urbanic, “An optimization approach for components built by fused deposition modeling with parametric internal structures,” Procedia CIRP, vol. 17, pp. 800–805, 2014.

XVII.M. E. W. M. Johnson, M. Rowell, B. Deason, “BENCHMARKING EVALUATION OF AN OPEN SOURCE FUSED DEPOSITION,” pp. 197–211, 1997.

XVIII.M. L. Griffith et al., “Free Form Fabrication of Metallic Components Using Laser Engineered Net Shaping (LENS),” Proc. 7th Solid Free. Fabr. Symp., pp. 125–132, 1996.

XIX.M. Montero, S. Roundy, and D. Odell, “Material characterization of fused deposition modeling (FDM) ABS by designed experiments,” Proc. Rapid Prototyp. Manuf. Conf., pp. 1–21, 2001.

XX.P. B. Klosterman D, Chartoff R, Graves G, Osborne N, “Interfacial characteristics of composites fabricated by laminated object manufacturing,” Compos Part A, vol. 29A, p. 1165–74., 1998.

XXI.P. Chennakesava and Y. S. Narayan, “Fused Deposition Modeling -Insights,” Int. Conf. Adv. Des. Manuf., pp. 1345–1350, 2014.

XXII.P. Rochus, J. Plesseria, M. Van Elsen, J. Kruth, R. Carrus, and T. Dormal, “New applications of rapid prototyping and rapid manufacturing ( RP / RM ) technologies for space instrumentation,” vol. 61, pp. 352–359, 2007.

XXIII.Q. Wei et al., “Selective laser melting of stainless-steel/nano-hydroxyapatite composites for medical applications: Microstructure, element distribution, crack and mechanical properties,” J. Mater. Process. Technol., vol. 222, pp. 444–453, 2015.

XXIV.Rama ChandraManohar, K et al. Modeling and Analysis of Kaplan Turbine Blade Using CFD.International Journal of Engineering & Technology, [S.l.], v. 7, n. 3.12, p. 1086-1089, july 2018. ISSN 2227-524X. Available at: https://www.sciencepubco.com/index.php/ijet/article/view/17766>. Date accessed: 05 jan. 2019. doi:http://dx.doi.org/10.14419/ijet.v7i3.12.17766.

XXV.Sk.Hasane Ahammad,V.Rajesh, “Image Processing based segmentation for spinal cord in MRI”,Indian Journal of Public Health Research and Development 9(6), pp.317-323XVI.M. Domingo-espin, I. Engineering, and U. Ramon, “A methodology to choose the best building direction for Fused Deposition Modeling end-use parts.

View Download

A Cross Layer Protocol to Improve Energy Efficiency and QoSin MANET

Authors:

U. Srilakshmi, Dr.Bandla Srinivasrao

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00013

Abstract:

Limitations of Wireless nodes are the battery power and storage capacity, while plotting a MANET, these are to be considered. By improvising battery life, the energy used by nodes shall be increased such that network is operational. To move data packets efficiently the network, MANET uses smallest Hop Count routing protocol. Most power is used by data transmission process. Key challenges in Ad Hoc networks are the recurring changes in network topology. Network topology changes happen due to motility and finite battery power of the mobile devices. Mostly links are not available in the network as depletion of power source may cause early unavailability of nodes. This paper discusses about the protocol that incorporates link failure prediction at network layer and Power Control Protocol at MAC layer to improve network performance. Performance enhancement in regards to total power transmission, energy regulation and consumption per node along with throughput of our proposed cross layer routing protocol is shown by simulation results when compared to AODV.

Keywords:

MANET,MAC Protocol,Cross layer,AODV,RDSR, LBP-AOMSV,LP-PCP,

Refference:

I.Abdule.S.M etHassan.S, “Divert Failure Route Protocol Based on AODV”, In Network Applications Protocols and Services (NETAPPS), 2010 Second International Conference on. IEEE, 2010.

II.Aman Kumar and Rahul Hans, ”Performance Analysis of DSDV, I-DSDV, OLSR, ZRP Proactive Routing Protocol in Mobile Ad Hoc Networks in IPv6”, International Journal of Advanced Science and Technology Vol.77,pp.25-36, 2015. III.Chakrabarti. S and Mishra. A, “Quality of service challenges for wireless mobile Ad hoc networks”, Wiley J. Wireless Communication and Mobile Computing, vol. 4, n°12, p. 29-153, 2004.

IV.Chang.R and Leu.J, “Long-lived path routing with received signal strength for ad hoc networks”, In Wireless Pervasive Computing, 1stInternational Symposium on. IEEE, 2006.

V.Crawley .E, Nair R., Rajagopalan. B and Sandick. H, “A Framework for QoS-based Routing in the Internet IETF RFC2386”, 2002.

VI.Frank Aune, “Cross-Layer Tutorial”,NTNU 2014.

VII.F. Sophia Pearlin and G. Rekha,“ Performance Comparison of AODV, DSDV and DSR Protocols in Mobile Networks using NS-2”, Indian Journal of Science and Technology, Vol 9(8), February 2016.

VIII.Hwang.YetVarshney.P, “An adaptive QoS routing protocol with dispersity for ad-hoc networks”, chez System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on.IEEE,2003.

IX.John Novatnack , Lloyd Greenwald and Harpreet Arora, “Evaluating ad hoc routing protocols with respect to quality of service”, Wireless And Mobile Computing, Networking And Communications, Volume 3, pp. 205-212,Aug.2005.

X.L. Qin and T. Kunz, “Proactive Route Maintenance in DSR”, SIGMOBILE Mob. Comput. Commun. Rev., Vol. 6, No. 3, pp. 79–89, 2002.

XI.M. Al-Shurman, S.-M.Yoo, and S. Park, “A Performance Simulation for Route Maintenance in Wireless Ad Hoc Networks”, in ACM-SE 42:Proceedings of the 42nd annual Southeast regional conference, New York, USA: ACM, pp. 25–30, 2004.

XII.Mamoun Hussein Mamoun, “Location Aided Hybrid Routing Algorithm for MANET,” Int. Journal of Engineering& Technology IJET/IJENS, Vol. 11, No. 01, pp. 51-57, Feb. 2011.

XIII.Mamoun Hussein Mamoun,”A Proposed Route Selection Technique in DSR Routing Protocol for MANET”, International Journal of Engineering & Technology IJET-IJENS, Vol. 11, No. 02, April 2011.

XIV.MerlindaDrini and Tarek Saadawi, ”Modeling Wireless Channel for Ad-Hoc Network Routing Protocol”, ISCC MarakechMarocco, pp. 549-555, July 2008.

XV.M. F. Sjaugi, M. Othman, and M. F. A. Rasid,“A New Distance Based Route Maintenance Strategy for Dynamic Source Routing Protocol”, Journal of Computer Science, Vol. 4, No. 3, pp. 172–180, 2008.

XVI.M. Tsai, N. Wisitpongphan, and O.K. Tonguz, “Link-Quality Aware AODV Protocol”, in Proc. IEEE International Symposium on Wireless Pervasive Computing (ISWPC) 2006, Phuket, Thailand, January 2006.

XVII.Perkins.C, Belding.E ,Royer and Das.S, “Ad hoc on-demand distance vector routing”, RFC 3561, IETF, 2003.

XVIII.P. Srinivasan and K. Kamalkkannan, “Signal Strength And Energy Aware Reliable Route Discovery in Manet”, International Journal of Communication Network Security, Vol. 1, Issue 4, 2012.

XIX.QoS Forum, July 1999. [On line]. Available: http://www.qosforum.com.

XX.RjabHajlaoui, Sami Touil and Wissemachour,” O-DSR: Optimized DSR Routing Protocol For Mobile Ad Hoc Network”, International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 4, August 2015.

XXI.RAJESHKUMAR, P.SIVAKUMAR, ”Comparative Study of AODV, DSDV and DSR Routing Protocols in MANET Using NetworkSimulator-2”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 12, December 2013.

XXII.Rajeshwar Singh, Dharmendra K Singh and Lalan Kumar,” Performance Evaluation of DSR and DSDV Routing Protocols for Wireless Ad Hoc Networks”, Int. J. Advanced Networking and Applications 732 Volume: 02, Issue: 04, pp. 732-737 2011.

XXIII.Ravneetkaur, Dr.Neeraj Sharma, “Dynamic node recovery in MANET for high recovery probability”, International Journal of Computer Networks and Applications (IJCNA), Vol 2, Issue 4, July -August 2015.

XXIV.Rohan Gupta, Harbhajan Singh and Gurpreet Singh,” Performance Evaluation of Routing Protocols for Mobile AdhocNetworks ”, Indian Journal of Science and Technology, Vol 10, No. 31, August 2017.

XXV.Rupinder Kaur, Paramdeep Singh et al, ” Performance Enhancement of AODV with Distributed-DSR Routing Protocol in Manet”, Indian Journal of Science and Technology, Vol. 8, No. 28, October 2015.

XXVI.Sarma.N and Nandi.S, “Route stability based QoS routing in mobile AdHoc networks”, Wireless Personal Communications , vol. 54, n° 11,pp. 203-224, 2010.

XXVII.S. Wu, S. Ni, Y. Tseng, and J. Sheu, “Route Maintenance in a Wireless Mobile Ad Hoc Network”, 33rd Hawaii International Conference onSystem Sciences, Maui, 2000.

XXVIII.VivekSoi,and Dr. B.S. Dhaliwal,“ Performance comparison of DSR and AODV Routing Protocol in Mobile Ad hoc Networks”, International Journal of Computational Intelligence Research Volume 13, No. 7, pp. 1605-1616, 2017.

XXIX.Y. Ramesh, Usha Ch. andJagadishGurrala,” CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET”, International Journal of Engineering Research and Development, Vol. 2, Issue 9, PP. 17-27, (August 2012).

XXX.ZekiBilgin, Bilal Khan, “A Dynamic Route Optimization Mechanism for AODV in MANETs”, Journal of Computer Science, 2014.

View Download