Archive

LI-FI TECHNOLOGY UTILIZED IN LEVERAGED TO POWER IN AVIATION SYSTEM ENTERTAINMENT THROUGH WIRELESS COMMUNICATION

Authors:

Yerrolla Chanti, Bandi Bhaskar, Nagendar Yamsani

DOI NO:

https://doi.org/10.26782/jmcms.2020.06.00032

Abstract:

Li-Fi-light constancy is like Wi-Fi innovation and it is one of things to come remote correspondence advancements part. The principle capacity of this innovation is to transmit the information by means of light [IX]. This innovation is unspoiled for fast remote correspondence in a limited district, and it offers numerous advantages over Wi-Fi innovation, for example, high transfer speed, convenience, productivity, and wellbeing. As the light speed is prevalent thus the information correspondence speed is additionally quicker in the current framework [X]. Moreover, this innovation can be executed for quick information access for the PCs, and contraptions that will be transmitted during the pillar in a room [IX]. This paper propose Li-Fi innovation utilizing in flying to theater setup through remote correspondence by basically utilizing the divider/perusing sheep it's protected to state that this innovation region of use are wearisome

Keywords:

Aviation,Wall,Reading Lamps,VLC,Interminable,

Refference:

Angayarkanni S 1 , Arthi R 2 , Nancy S 3 , Sandhiya A 4 Assistant Professor1 , Student2, 3, 4, 5 Department Of Electrical And Electronics Engineering TejaaShakthi Institute Of Technology For Women” Underwater Communication Using Li-Fi Technology” Research Article Volume 8 Issue No.3 © 2018 IJESC.
II. Anurag Sarkar1, Prof. Shalabh Agarwal2 , Dr. Asoke Nath3, Department Of Computer Science St. Xavier’s College (Autonomous) Kolkata – India” Li-Fi Technology: Data Transmission Through Visible Light” International Journal Of Advance Research In Computer Science And Management Studies Volume 3, Issue 6, June 2015 Pg. 1-12.
III. Bura Vijay Kumar, YerrollaChanti, NagenderYamsani, SrinivasAluvala, BandiBhaskar “Design A Cost Optimum For 5g Mobile Cellular Network Footing On NFV And SDN”, International Journal Of Recent Technology And Engineering (IJRTE), ISSN: 2277-3878, Volume-8, Issue-2S3, July 2019
IV. Department Of Information Technology, Al Baha University, Al Baha, Kingdom Of Saudi Arabia (KSA) *Corresponding Author: Yusufperwej@Gmail.Com” The Next Generation Of Wireless Communication Using Li-Fi (Light Fidelity) Technology” Journal Of Computer Networks, 2017, Vol. 4, No. 1, 20-29 Available Online At Http://Pubs.Sciepub.Com/Jcn/4/1/3 ©Science And Education Publishing DOI:10.12691/Jcn-4-1-3.
V. Gowtham S U, Gokulamanikandan M, Pavithran P, Gopinath K Department Of CSE, Panimalar Institute Of Technology, Chennai, Tamilnadu, India” Interactive Voice & IOT Based Route Navigation System For Visually Impaired People Using Lifi” International Journal Of Scientific Research In Computer Science, Engineering And Information Technology © 2017 IJSRCSEIT | Volume 2 | Issue 2 | ISSN : 2456-3307.
VI. Hemachandran K1, Justus Rabi B2, SS Darly3 1Associate Professor, ECE, Visvesvaraya College Of Engineering & Technology, Hyderabad, Telungana, India” Elegant Billing System Using Light Fidelity Module” International Journal Of Electrical Electronics & Computer Science Engineering Volume 4, Issue 4 (August, 2017) | E-ISSN : 2348-2273 | P-ISSN : 2454-1222 Available Online At Www.Ijeecse.Com
VII. Khandal1, Sakshi Jain21,2Poornima College Of Engineering, Jaipur (Rajasthan)” Li-Fi (Light Fidelity): The Future Technology In Wireless communication” International Journal Of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 16 (2014), Pp.© International Research Publications Househttp://Www. Irphouse.Com
VIII. Praveen P., Rama B(2020). “An Optimized Clustering Method To Create Clusters Efficiently” Journal Of Mechanics Of Continua And Mathematical Sciences,ISSN (Online) : 2454 -7190 Vol.-15, No.-1, January (2020) pp 339-348 ISSN (Print) 0973-8975 ,https://doi.org/10.26782/jmcms.2020.01.00027.
IX. NagendarYamsani, Bura Vijay Kumar, SrinivasAluvala, Mahesh Dandugudum, G. Sunil Reddy, “An Improved Load Balancing In MANET Using On-Demand Multipath Routing Protocol” , International Journal Of Engineering &Technology, 7 (1.8) (2018) Pp.222-225.
X. P.Kumara Swamy, Dr. C. V. Guru Rao, Dr. V. Janaki, “Functioning Of Secure Key Authentication Scheme In” In International Journal Of Pure And Applied Mathemat, Volume 118, Issue 14, Page No(S) 27 – 32, MAR. 2018, [ISSN(Print):1314-3395]
XI. P. Koteswara Rao1, M.Prathibha 2, K. Sai Prasanna3 , I.Sowjanya4 1assistant Professor, Dept Of Ece,Andhra Loyola Institute Of Engineering And Technology “Intra Vehicular Communication Byusing Lifi For Pre-Empitive collision Avoidance” International Journal Of Emerging Trends & Technology In Computer Science (Ijettcs) Web Site: Www.Ijettcs.Org Email: Editor@Ijettcs.Org Volume 6, Issue 2, March – April 2017 Issn 2278-6856.
XII. Srinivas Aluvala, K. Raja Sekar,, Deepika Vodnala, “A Novel Technique For Node Authentication In Mobile Ad-Hoc Networks” In Elsevier – Perspectives In Science, Volume 8, Issue 1, Page No(S) 680 -682, SEP. 2016, [ISSN(Print):2213-0209],
XIII. Yerrolla Chanti, Dr. K. Seena Naik2, Rajesh Mothe3, Nagendar Yamsani4, Swathi Balija5” A Modified Elliptic Curve Cryptography Technique For Securing Wireless Sensor Networks” International Journal Of Engineering &Technology 2018.
XIV. Yerrolla Chanti, Kothanda Raman, K. Seenanaik, Dandugudum Mahesh, B.Bhaskar” An Enhanced On Bidirectional LI-FI Attocell Access Point Slicing And Virtualization Using Das2 Conspire” International Journal Of Recent Technology And Engineering (IJRTE) ISSN: 2277-3878, Volume-8, Issue-2S3, July 2019

View Download

PERIODIC SOLUTION OF THE NONLINEARJERK OSCILLATOR CONTAINING VELOCITY TIMES ACCELERATION-SQUARED: ANITERATION APPROACH

Authors:

B. M. IkramulHaque, Md. Zaidur Rahman, Md. Iqbal Hossain

DOI NO:

https://doi.org/10.26782/jmcms.2020.06.00033

Abstract:

Haque’s iteration approach has been applied to obtain analytical solution of the nonlinear jerk equation containing velocity times acceleration-squared. We have used truncated Fourier series by taking different numbers of harmonics for different iteration step. The obtained solutions give more accurate result than others and very nearer to the exact solution.

Keywords:

Jerk equation, nonlinear oscillator,Iteration Method,Truncated Fourier series,

Refference:

I. Alam, M.S., Haque, M.E. and Hossain M.B.,“A new analytical technique to find periodic solutions of nonlinear systems” Int. J. Nonlinear Mech., vol. 24, pp. 1035-1045, 2007.

II. Beléndez, A., Pascual, C., Ortuno, M., Beléndez, T. and Gallego, S., “Application of a modified He’s homotopy perturbation method to obtain higher-order approximations to a nonlinear oscillator with discontinuities” Nonlinear Anal. Real World Appl, vol.10 (2), pp. 601-610, 2009.
III. Gottlieb, H.P.W.,“Question #38. What is the simplest jerk function that gives chaos?” American Journal of Physics, vol.64, pp. 525, 1996.
IV. Gottlieb, H.P.W.,“Harmonic balance approach to periodic solutions of nonlinear jerk equation” J. Sound Vib., vol. 271, pp. 671-683, 2004.
V. Gottlieb, H.P.W.,“Harmonic balance approach to limit cycle for nonlinear jerk equation” J. Sound Vib., vol. 297, pp. 243-250, 2006.
VI. Hu, H.,“Perturbation method for periodic solutions of nonlinear jerk equations” Phys. Lett. A, vol. 372, pp. 4205-4209, 2008.
VII. Hu, H., Zheng, M.Y. and Guo, Y.J.,“Iteration calculations of periodic solutions to nonlinear jerk equations”Acta Mech., vol. 209, pp. 269-274, 2010.
VIII. Haque, B.M.I., Alam, M.S. and MajedurRahmam, M.,“Modified solutions of some oscillators by iteration procedure” J. Egyptian Math. Soci., vol. 21, pp. 68-73, 2013.
IX. Haque, B.M.I., A “New Approach of Iteration Method for Solving Some Nonlinear Jerk Equations” Global Journal of Science Frontier Research Mathematics and Decision Sciences, vol. 13, pp. 87-98, 2013.
X. Haque, B.M.I.,“A New Approach of Mickens’ Extended Iteration Method for Solving Some Nonlinear Jerk Equations” British journal of Mathematics & Computer Science, vol. 4, pp. 3146-3162, 2014.
XI. Haque, B.M.I.,BayezidBostami M., AyubHossain M.M., Hossain M.R. and Rahman M.M.,“Mickens Iteration Like Method for Approximate Solution of the Inverse Cubic Nonlinear Oscillator” British journal of Mathematics & Computer Science, vol. 13, pp. 1-9, 2015.
XII. Haque, B.M.I., AyubHossain M.M., BayezidBostami M. and Hossain M.R.,“Analytical Approximate Solutions to the Nonlinear Singular Oscillator: An Iteration Procedure” British journal of Mathematics & Computer Science, vol. 14, pp. 1-7, 2016.
XIII. Haque, B.M.I.,Asifuzzaman M. and KamrulHasam M.,“Improvement of analytical solution to the inverse truly nonlinear oscillator by extended iterative method” Communications in Computer and Information Science, vol. 655, pp. 412-421, 2017.
XIV. Haque, B.M.I., Selim Reza A.K.M. andMominurRahman M.,“On the Analytical Approximation of the Nonlinear Cubic Oscillator by an Iteration Method” Journal of Advances in Mathematics and Computer Science, vol. 33, pp. 1-9, 2019.
XV. Haque, B.M.I. and AyubHossain M.M.,“A Modified Solution of the Nonlinear Singular Oscillator by Extended Iteration Procedure” Journal of Advances in Mathematics and Computer Science, vol. 34, pp. 1-9, 2019.
XVI. Leung, A.Y.T. and Guo, Z.,“Residue harmonic balance approach to limit cycles of nonlinear jerk equations” Int. J. Nonlinear Mech., vol. 46, pp. 898-906, 2011.
XVII. Mickens, R.E.,“Comments on the method of harmonic balance” J. Sound Vib., vol. 94, pp. 456-460, 1984.
XVIII. Ma, X., Wei, L. and Guo, Z.,“He’s homotopy perturbation method to periodic solutions of nonlinear jerk equations” J. Sound Vib., vol. 314, pp. 217-227, 2008.
XIX. Mickens, R.E.,“Iteration Procedure for determining approximate solutions to nonlinear oscillator equation” J. Sound Vib., vol. 116, pp. 185-188, 1987.
XX. Nayfeh, A.H.,“Perturbation Method” John Wiley & Sons, New York, 1973.
XXI. Nayfeh, A.H. andMook, D.T.,“Nonlinear Oscillation” John Wiley & Sons, New York, 1979.
XXII. Ramos, J.I.,“Analytical and approximate solutions to autonomous, nonlinear, third order ordinary differential equations” Nonlinear Anal. Real., vol. 11, pp. 1613-1626, 2010.
XXIII. Ramos, J.I.,“Approximate methods based on order reduction for the periodic solutions of nonlinear third-order ordinary differential equations” Appl. Math. Comput., vol. 215, pp. 4304-4319, 2010.
XXIV. Ramos, J.I. and Garcia-Lopez,“A Volterra integral formulation for determining the periodic solutions of some autonomous, nonlinear, third-order ordinary differential equations” Appl. Math. Comput., vol. 216, pp. 2635-2644, 2010.
XXV. Schot, S.H.: Jerk,“The time rate of change of acceleration” American Journal of Physics, vol. 46, pp. 1090-1094, 1978.
XXVI. Wu, B.S., Lim, C.W. and Sun, W.P.,“Improved harmonic balance approach to periodic solutions of nonlinear jerk equations” Phys. Lett. A, vol. 354, pp. 95-100, 2006.
XXVII. Zheng, M.Y., Zhang, B.J., Zhang, N., Shao,X.X. and Sun, G.Y.,“Comparison of two iteration procedures for a class of nonlinear jerk equations”Acta Mech. vol. 224,pp. 231-239, 2013.

View Download

SECURING AND MANAGING ARMY CANTONMENT IN INDIA USING INTERNET OF THINGS

Authors:

Tarun Kumar, Pawan Kukreja, Dharmender Singh Kushwaha, Sanjeev Pippal

DOI NO:

https://doi.org/10.26782/jmcms.2020.06.00034

Abstract:

Internet of Things (IoT) is newfangled area of development that can lead to tremendous efficiency improvement in terms of expensive manpower saving, cost cutting, round the clock  availability and  modular structure to continuously improve processes and things. This paper proposes an application of the IoT in security and management of the army cantonment area. In the context of security, this paper proposes three kind of integrated applications. The Access control system ensures entry of the authorized vehicles using RFID and Automatic Number Plate Recognition techniques. Intrusion detection based on passive infrared, camera and thermal imaging is proposed at the next level. Gun fire detection in residential blocks of the army campus by using sound sensors ensures any intrusion, attack or any other undue situation. Apart from security, this paper also proposes intelligent use of water flow sensors for smart monitoring of underground drainage and water level sensors to reduce the wastage of water in tank overflow conditions. The proposed system is reliable, efficient in terms of accuracy, response time of the various modules, round the clock capability and economical in terms of operational and maintenance cost.

Keywords:

Vehicle detection,Automatic number plate detection,Radio frequency identification, Sensors,

Refference:

I. Cha, J.-R. and Kim, J.-H. Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system. Proc. IEEE CCNC, 2006, 768–772.
II. Ghayvat H., Mukhopadhyay S., Gui X., Suryadevara N. (2015). WSN-and IOT-based smart homes and their extension to smart buildings. Sensors. 4;15(5):10350-79.
III. http://indianexpress.com/article/india/india-news-india/pathankot-terror-attack-something-seriously-wrong-with-our-security-establishment-parliament-panel/.
IV. http://pascal.inrialpes.fr/data/human/ (2018)
V. http://www.firstpost.com/india/jammu-attack-by-entering-fortified-sunjuwan-army-camp-from-rear-afzal-guru-squad-exploited-security-lapse-4344775.html (2018)
VI. http://www.sengpielaudio.com/calculator-SoundAndDistance.htm (2018)
VII. Iamsa-at S and HorataP.. Handwritten Character Recognition Using Histograms Of Oriented Gradient Features in Deep Learning of Artificial Neural Network. In IEEE International Conference on IT Convergence and Security (ICITCS), pp. 1-5.
VIII. Krishnan, D., Muthaiah, R., Tapas, A., &Kannan, K. (2018). Evaluation of Local Feature Detectors for the Comparison of Thermal and Visual Low Altitude Aerial Images. Defence Science Journal, 68(5), 473-479. https://doi.org/10.14429/dsj.68.11233
IX. Kumar T. &Kushwaha, D. S. An Intelligent Reconnaissance Framework for Homeland Security. Def. Sci. J. 69, 4 (2019).doi: https://doi.org/10.14429/dsj.67.10286
X. Kumar, T., Gupta, S. &Kushwaha, D. S. An Efficient Approach for Automatic Number Plate Recognition for Low Resolution Images. in The fifth International Conference on Network, Communication and Computing (ICNCC) 2016 53–57.
XI. Maguire, Y. and Pappu, R. An optimal Q-algorithm for the ISO 18000-6C RFID protocol. IEEE transactions on automation science and engineering, 2009 6, 1, 16–24.
XII. Maisonneuve M. Ortiz et al.(2014). The cluster between Internet of Things and social networks: Review and research challenges, IEEE Internet Things J. , vol. 1, no. 3, pp. 206–215, Jun. 2014
XIII. Rao Y. R. Automatic smart parking system using Internet of Things (IOT). Int J EngTechnolSci Res. 2017 May;4(5).
XIV. Rathore M. M., Ahmad A., Paul A., Rho S. Urban planning and building smart cities based on the internet of things using big data analytics. Computer Networks. 2016 Jun 4;101:63-80.
XV. Singh, D. K. &Kushwaha, D. S. Automatic Intruder Combat System: A way to Smart Border Surveillance. Def. Sci. J. 67, 50 (2017).doi: https://doi.org/10.14429/dsj.67.10286
XVI. Verma, K., Kumar, A., &Ghosh, D. (2018). Robust Stabilised Visual Tracker for Vehicle Tracking. Defence Science Journal, 68(3), 307-315. https://doi.org/10.14429/dsj.68.12209
XVII. Wensheng S. and Chenmin J. A Novel Dynamic Frame Slotted ALOHA Algorithm for Anti-Collision in RFID Systems in Journal of Information and control, 2012, (2): 233-237.
XVIII. Yun M., Yuxin B. Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid. InAdvances in Energy Engineering (ICAEE), 2010 IEEE International Conference on Jun 19 (pp. 69-72).
XIX. Zanella A. et al. (2014). Internet of Things for smart cities, IEEE Internet Things J. , vol. 1, no. 1, pp. 22–32.

View Download

DUAL SINK BASED ROUTING SCHEME FOR RELIABLE DATA DELIVERY AND LOS COMMUNICATION IN WBANS

Authors:

Ilyas Khan, Majid Ashraf, Asif Nawaz, Rehan Ali Khan, M.Habib Ullah, Wisal Khan, Sheeraz Ahmed

DOI NO:

https://doi.org/10.26782/jmcms.2020.06.00035

Abstract:

The architecture of WBANs consists of small nodes which are fitted on the body of human or it may be implanted inside body to investigate and analyze and sense data like monitoring body temperature, blood pressure, heart rate and glucose level checking etc. For efficient design and development of WBANs, which ensure reliability and efficiency the knowledge of system and its components are necessary. WBANs must be capable to support lower energy, high data rate, reliability, Quality of Service (QoS) and minimum interference for the consideration of vast applications of WBANs. In WBANs there is a need of proactive management because it is related to more reliable communication. In this research work we are trying to provide a comprehensive review of state of the art routing protocols for WBANs. After the thorough analysis and investigation of different routing protocols, we conclude that there are many good schemes to overcome and resolve the issues of routing in WBANs. But still some of the issues need to be resolved. A new routing protocol for WBANs is developed called DSBAN. In this scheme we considered the performance metrics in terms of the already available schemes SIMPLE, and LAEEBA and see the effects in terms of energy efficiency, Networks lifetime and path-loss. The results show that the scheme DSBAN is significantly showing improved performance than the other two schemes under consideration. The reason is that the scheme considers those positive features of SIMPLE and LAEEBA which help us in the design of the new scheme.

Keywords:

WBAN,LoS communication,Routing protocol, Quality of Service,

Refference:

I Ahmed, S., et al. “LAEEBA: Link aware and energy efficient scheme for body area networks.” 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.IEEE, 2014.

II Akram, S., et al. “The-fame: Threshold based energy-efficient fatigue measurement for wireless body area sensor networks using multiple sinks.”Broadband and Wireless Computing, Communication and Applications (BWCCA), 2013 Eighth International Conference on. IEEE, 2013.

III Ansari, Hannan, Sachin Kumar Patel, and Sachida Nanda Barik. “Survey on Wireless Sensor Networks.” (2014).

IV Ari, Ado Adamou Abba, et al. “Concepts and evolution of research in the field of wireless sensor networks.” arXiv preprint arXiv:1502.03561 (2015)

V Bahanfar, Saeid, et al. “Reliable communication in wireless body area sensor network for health monitoring.” arXiv preprint arXiv: 1112.0393 (2011).

VI Braem, Bart, et al. “The need for cooperation and relaying in short-range high path loss sensor networks.” Sensor Technologies and Applications, 2007.SensorComm 2007.International Conference on.IEEE, 2007.

VII Braem, Bart, et al. “Improving reliability in multi-hop body sensor networks.”Sensor Technologies and Applications, 2008.SENSORCOMM’08.Second International Conference on.IEEE, 2008.

VIII Crosby, Garth V., et al. “Wireless body area networks for healthcare: a survey.” International Journal of Ad Hoc, Sensor & Ubiquitous Computing 3.3 (2012): 1.

IX Ehyaie, Aida, MassoudHashemi, and PejmanKhadivi. “Using relay network to increase life time in wireless body area sensor networks.”World of Wireless, Mobile and Multimedia Networks & Workshops, 2009.WoWMoM 2009.IEEE International Symposium on a. IEEE, 2009.

X Elias, Jocelyne, and Ahmed Mehaoua. “Energy-aware topology design for wireless body area networks.”2012 IEEE international conference on communications (ICC).IEEE, 2012.

XI Heinzelman, Wendi Rabiner, AnanthaChandrakasan, and HariBalakrishnan. “Energy-efficient communication protocol for wireless microsensor networks.”System sciences, 2000.Proceedings of the 33rd annual Hawaii international conference on.IEEE, 2000.Yick, Jennifer, Biswanath Mukherjee, and DipakGhosal. “Wireless sensor network survey.” Computer networks 52, no. 12 (2008): 2292-2330.

XII Javaid, Nadeem, et al. “Measuring fatigue of soldiers in wireless body area sensor networks.” Broadband and Wireless Computing, Communication and Applications (BWCCA), 2013 Eighth International Conference on. IEEE, 2013.

XIII Khan, Z. A., et al. “Effect of packet inter-arrival time on the energy consumption of beacon enabled MAC protocol for body area networks.”Procedia Computer Science 32 (2014): 579-586.
XIV Monsef, Ehsan, et al. “Managing Quality of Service in Wireless Body Area Networks using CoAP.” 2016 IEEE International Conference on Electro Information Technology (EIT).IEEE, 2016.

XV Nadeem, Adnan, et al. “Application specific study, analysis and classification of body area wireless sensor network applications.” Computer Networks 83 (2015): 363-380.

XVI Nadeem, Q., et al. “Simple: Stable increased-throughput multi-hop protocol for link efficiency in wireless body area networks.” Broadband and Wireless Computing, Communication and Applications (BWCCA), 2013 Eighth International Conference on. IEEE, 2013

XVII Ruprecht, David J. “Body Area Networks and Body Sensor Networks.”Wireless Network 17 (2011): 1-18.

XVIII Tauqir, Anum, et al. “Distance aware relaying energy-efficient: Dare to monitor patients in multi-hop body area sensor networks.” Broadband and Wireless Computing, Communication and Applications (BWCCA), 2013 Eighth International Conference on. IEEE, 2013.

XIX Tavli, Bulent, et al. “A survey of visual sensor network platforms.”Multimedia Tools and Applications 60.3 (2012): 689-726.

XX Wang, Pengyu, et al. “Survey on application of wireless sensor network in smart grid.” Procedia Computer Science 52 (2015): 1212-1217.Ansari, Hannan, Sachin Kumar Patel, and Sachida Nanda Barik. “Survey on Wireless Sensor Networks.” (2014).

XXI Yick, Jennifer, Biswanath Mukherjee, and DipakGhosal. “Wireless sensor network survey.” Computer networks 52.12 (2008): 2292-2330.

XXII Zhang, Mi, and Alexander A. Sawchuk. “Human daily activity recognition with sparse representation using wearable sensors.” IEEE journal of Biomedical and Health Informatics 17.3 (2013): 553-560.

XXIII Zhou, Gang, et al. “Bodyqos: Adaptive and radio-agnostic qos for body sensor networks.” INFOCOM 2008.The 27th Conference on Computer Communications.IEEE.IEEE, 2008.

View Download

COVID-19 IN INDIA AND SIR MODEL

Authors:

Asish Mitra

DOI NO:

https://doi.org/10.26782/jmcms.2020.07.00001

Abstract:

In the present numerical investigation, the epidemic patterns of Covid-19 in India is studied from a mathematical modeling perspective. The study is based on the simple SIR (Susceptible-Infectious-Recovered) deterministic compartmental model. It is analyzed fully and then calibrated against publicly available epidemiological data from late January until 10 July 2020 for interpreting the transmission dynamics of the novel coronavirus disease (COVID-19) in India. The purpose of this study is to give a tentative prediction of the epidemic peak and sizes in our country.

Keywords:

COVID-19,India,SIR Model,Parameter Estimation,Simulation,

Refference:

An Introduction to Mathematical Epidemiology by Maia Martcheva, Springer
II. An Introduction to Mathematical Modeling of Infectious Diseases, Michael Y. Li, Springer.
III. Effect of weather on COVID-19 spread in the US: A prediction model for India in 2020 S Gupta, G S Raghuwanshi , A Chanda, Science of the Total Environment, 728 (2020)
IV. https://data.humdata.org/dataset/novel-coronavirus-2019-ncov-cases.
V. Kermack WO, McKendrick AG. A contribution to the mathematical theory of
VI. Rajesh Ranjan, The Ohio State University, Predictions for COVID-19 outbreak in
VII. Solving applied mathematical problems with MATLAB / DingyuXue, Chapman & Hall/CRC.
VIII. United Nations. Department of Economic and Social Affairs; Population Dynamics https://population.un.org/wpp/Download/Standard/Population/ as on 20 May 2020.
IX. Ward, Alex (24 March 2020). “India’s coronavirus lockdown and its looming crisis, explained” (http s://www.vox.com/2020/3/24/21190868/coronavirus-india-modi-lockdown-kashmir).

View Download

MARKOV PROCESS AND DECISION ANALYSIS

Authors:

R. Sivaraman

DOI NO:

https://doi.org/10.26782/jmcms.2020.07.00002

Abstract:

The need of proper medical diagnosis and treatment has been need of the day to deal with various infections caused by viruses and micro-organisms. To prevent the spread of the disease we need proper scientific approach and methods in place. This paper suggests one such method using Markov Process technique, in particular deciding how many patients should be allocated to respective doctors in a hospital.

Keywords:

Markov Process,Markov Decision Process,Transition Probabilities, Transition Matrix, Diagonalization of a matrix,, Equilibrium Distribution ,

Refference:

I 49(10):1021–1025, 1998.

II Amanda A. Honeycutt, James P. Boyle, Kristine R. Broglio, Theodore J. Thompson, Thomas J. Hoerger, Linda S. Geiss, and K. M. Venkat Narayan, A dynamic Markov model for forecasting diabetes prevalence in the United States through 2050. Health Care Management

III Behavioral Sciences, pages 9242–9250, 2004.

IV Chih-Ming Liu, Kuo-Ming Wang, and Yuh-Yuan Guh. A Markov chain model for medical

V Distribution under treatment. Mathematical and Computer Modeling, 19(11):53–66, 1994.

VI For discrete-time longitudinal data on human mixed-species infections. In Some Mathematical

VII J. E. Cohen and B. Singer. Malaria in Nigeria: Contrained continuous-time Markov models

VIII L. Billard. Markov models and social analysis, International Encyclopedia of the Social and

IX Questions in Biology, pages 69–133. Providence: American Mathematical Society, 1979.

X Record analysis. The Journal of the Operational Research Society, 42(5):357–364, 1991.

XI S. I. McClean, B. McAlea, and P. H. Millard. Using a Markov reward model to estimate

XII Science, 6:155–164, 2003.

XIII Spend-down costs for a geriatric department. The Journal of the Operational Research Society,

XIV Y. W. Tan. First passage probability distributions in Markov models and the HIV incubation

View Download

[0,1] TRUNCATED LOMAX –INVERTED GAMMA DISTRIBUTION WITH PROPERTIES

Authors:

Jumana A. Altawil, Saba N. Al-Khafaji, Ahmed HadiHussain, Sameer Annon Abbas

DOI NO:

https://doi.org/10.26782/jmcms.2020.07.00003

Abstract:

We proposed  [0,1] truncated Lomax –Inverted Gamma ([0,1] TLIGD) distribution build on [0,1] truncated Lomax ([0,1] TLD) distribution. General expressions for the statistical properties are obtained, also The Shannon entropy , Relative entropy functions and  Stress- Strength model of the ([0,1] TLIGD)  are presented

Keywords:

[0,1] TLIGD,stress strength model, Shannon entropy and Relative entropy functions,

Refference:

I. Abid, Salah , K. Abdulrazak, Russul, “[0, 1] truncated fréchet-gamma and inverted gam-ma distributions”, International Journal of Scientific World , 2017.
II. Eugene, N., Lee, C., & Famoye, F.,“Beta-normal distribution and its applications. Communications in Statistics-Theory and methods”,vol. 31(4), pp: 497-512, 2002.
III. Gradshteyn, I. S., & Ryzhik, I. M., “Table of integrals, series, and products”: Academic press,2014.
IV. Gupta, A. K., & Nadarajah, S., “On the moments of the beta normal distribution.Communications in Statistics-Theory and methods”, vol. 33(1), pp: 1-13, 2005.
V. Jamjoom, A., & Al-Saiary, Z., “Computing the moments of order Statistics from independent nonidentically distributed exponentiated Frechet variables”. Journal of Probability and Statistics, 2012.
VI. Jones, M., “Families of distributions arising from distributions of order statistics”. Test, vol. 13(1),pp :1- 43,2004.
VII. Maria do Carmo, S. L., Cordeiro, G. M., & Ortega, E. M., “A new extension of the normal distribution. Journal of Data Science”, vol. 13(2), pp: 385-408,2014.

View Download

AADHAAR ENABLED ELECTRONIC VOTING MECHANISM

Authors:

Maisagalla Gopal, S. Umamaheshwar, Kommabatla Mahender

DOI NO:

https://doi.org/10.26782/jmcms.2020.07.00004

Abstract:

Aadhaar based identification systems are gaining momentum and it isused in several authentication mechanisms. In many democratic countries, the electoral system is still in its juvenile stage and operating in a manual mechanism which consumes huge resources for every voting. In this work, we propose a mechanism which uses Aadhaar based identification to enable a voter to vote. The connection between the voting machine and Aadhaar database is fully secured and encrypted. To avoid intentional hacking, the whole system is computerized and does not require human intervention.

Keywords:

Refference:

I. Ankita R Kasliwal, Jaya S. Gadekar, Manjiri A. Lavadkar, Pallavi K. Thorat and Prapti Deshmukh,“Aadhar Based Election Voting System”IOSR Journal of Computer Engineering, pp.18-21, 2017.
II. K. Dinakaran, P. Aravind Kumar, E. Bagavathi, M. Kathiresh Kumar, R. Madhankumar,“Smart Electronic Voting Machine Using Raspberry Pi”, International Journal of AdvancedResearch in Electrical, Electronics and Instrumentation Engineering, Vol. No. 8, pp. 829-834, March 2019.
III. Kolluru Venkata Nagendra, Palem Chandrakala, Palicherla Anusha, Dampuru Ramesh,“Implementing Aadhar Voting System in Elections Using Raspberry Pi”, InternationalJournal of Scientific Research and Review, Vol. No.7, pp. 500-507, 2018.
IV. Latha V. and Satheesh Thirumalal, “Aadhar Based Electronic Voting System andProviding Authentication on Internet of Things”, International Journal of Engineering andManufacturing Science, Vol. No. 8, pp.102-108, 2018.
V. Lingamallu Naga Srinivas and K. Srinivasa Rao, “Aadhaar Card Voting System”, Proceedings of International Conference on Computational Intelligence and Data Engineering, Vol. No. 9, pp. 159 -172, December 2018.
VI. N. N Nagamma, M. V. Lakshmaiah and T. Narmada, “Aadhar based Finger print EVMSystem”,International Journal of Electronics Engineering Research,Vol. No. 9, pp. 923-930,2017.
VII. R. Murali Prasad, Polaiah Bojja and Madhu Nakirekanti, “Aadhar based ElectronicVoting Machine using Arduino”, International Journal of Computer Applications, Vol. No.145, pp. 39-42, July 2016.
VIII. Rakesh S. Raj, Reshma, Madhushree and Bhargavi, “An Online Voting System Using Biometric Fingerprint and Aadhaar Card”, International Journal of Computing and Technology, Vol. No. 1, pp.87-92, May 2014.
IX. Sneha S.Lad, Pranav N.Tonape, Rohit S.Bhosale, Jayesh A.Shingole, Vinayak S.Kumar, “E-Voting and Presentee Muster Using Raspberry Pi 2 Modules”, International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering, Vol. No. 4, pp. 475-482, May 2016.
X. Syed Mahmud Hasan, Arafa Mohd Anis, Hamidur Rahman, Jennifer Sherry Alam, Sohel Islam Nabil and Md KhalilurRhaman, “Development of Electronic Voting Machine with the Inclusion of Near Field Communication ID cards and Biometric fingerprint identifier”,17th International Conference on Computer and Information Technology, pp. 383-387, 2014.
XI. Tabish Ansari, Brijesh Chaurasia, Niraj Kumar, Nilesh Yadav, SonaliSuryawanshi, “Online Voting System linked with Aadhaar Card”, International Journal of Advanced Research in Computer and Communication and Communication Engineering, Vol. No. 6, pp. 204-207, September 2017.

View Download

ESTIMATION TYPES OF FAILURE FOR THERMO-ELECTRIC UNIT BY USING ARTIFICIAL NEURAL NETWORK (ANN)

Authors:

Asmaa Jamal Awad, Ahmed Abdulrasool Ahmed, Osamah Abdallatif

DOI NO:

https://doi.org/10.26782/jmcms.2020.07.00005

Abstract:

Frequent failure in production systems is one of the most important problems facing maintenance planners. In this paper, the methodology for estimating failure in an electrical energy production system has been proposed.Consisting of a number of related sub-systems, respectively, failure of any one causes the rest to stop producing.Operating data were collected and the type of failure identified, which was classified into three types (mechanical failure, electrical failure, and control failure). The software (Matlab) was used in generating and training an artificial neural network (ANN) to estimate the type of failure, through the data collected for each sub-system of the unit under study, use 90% of the data for training, 5% for testing, and 5% for valuation. The target matrix was built and trained, with a mean square error (MSE) its(6.54 E-16), and regression (91%), and adopted to estimate the type of future failure for subsequent years(2019),conformance results were for the subsequent year between (82%-87%) for all the subsystems. Using the artificial neural network, failure types were estimated for another subsequent year (2020), the failure ratios were for subsystems for every ten days during the year of estimation, were (33%) for the generator, (22%) for the boiler, (31%) for the turbine, and (13%) for the condenser. High percentages, which can be reduced by taking advantage of the proposed methodology that gave an understanding of the type of failure, the time it occurred, and the location of the failure, by building an overlapping preventive maintenance plan whose application is approved in reducing the failuretimes of the unit under study.The proposed methodology can also be applied to all other systems of different production

Keywords:

Matlab software, Generator,Artificial Intelligent (AI),

Refference:

I. Devika Chhachhiya, Amita Sharma, Manish Gupta “Case Study on Classification of Glass Using Neural Network Tool in MATLAB” International Journal of Computer Applications, 0975 – 8887),(2014).
II. D. Bose, G. Ghosh, K. Mandal, S.P. Sau4 and S. Kunar “Measurement and Evaluation of Reliability, Availability and Maintainability of a Diesel Locomotive Engine” International Journal of Engineering Research and Technology, Volume 6, Number 4,pp. 515-534, 2003.

III. Emilia Sipos, Laura-Nicoleta Ivanciu”Failure Analysis and Prediction Using Neural Networks in the Chip Manufacturing Process “ResearchGate, DOI: 10.1109/ISSE.2017.8000931, May 2017

IV. Erdi Tosun, Ahmet C¸ alık”Failure load prediction of single lap adhesive joints using artificial neural networks”Alexandria Engineering Journal vol. 55, pp1341–1346,2016
V. Farhad Hooshyaripora, Ahmad Tahershamsib, and Kourosh Behzadian”Estimation of Peak Outflow in Dam Failure Using Neural Network Approach under Uncertainty Analysis” Pleiades Publishing, Vol. 42, No. 5, 2015
VI. Gustavo Scalabrini Sampaio, Arnaldo Rabello de Aguiar Vallim Filho,Leilton Santos da Silva and Leandro Augusto da Silva” Prediction of Motor Failure Time Using An Artificial Neural Network” Sensors, 19, 4342; doi:10.3390/s19194342, 2019
VII. Laurene V. Fausett, “Fundamentals of Neural Networks: Architecture, Algorithm, and Application”, Florida Institute of Technology, First Edition, December, 1993.
VIII. Mahdi Saghafi , Mohammad B. Ghofrani “Real-time estimation of break sizes during LOCA in nuclear power plants using NARX neural network” Nuclear Engineering and Technology doi.org/10.1016/j.net.2018.11.017
IX. M. Goya-Martinez, “The Emulation of Emotions in Artificial Intelligence,” Emotions, Technology, and Design. pp. 171–186, 2016
X. Walter, E.; Pronzato L., “Identification of Parametric Models from Experimental Data”, London, England: Springer-Verlag, 1997.

View Download

COPRAS BASED CLUSTERING STRATEGY TOWARD ENERGY-EFFICIENT IOT-CLOUD TRANSMISSION

Authors:

Arpita Biswas, Abhishek Majumdar, K. L. Baishnab

DOI NO:

https://doi.org/10.26782/jmcms.2020.07.00006

Abstract:

IoT is a globally accepted smart technology that has the ability to connect each and almost every physical devices through the network. It acts as a bridge between cloud environment and physical environment. It is mainly used to connect the hardware devices like sensors, actuators, storage, hardware, and software to acquire or exchange data. These devices collect the information from the physical world and convert this into useful information that can help in decision making. Since IoT connects everything to the network, so it may face the problem of a large amount of energy loss. In this respect, this paper mainly focuses on reducing the energy loss problem and designing of an energy efficient data transfer scenario between cloud and IoT devices. For this reason, a Complex Proportional Assessment (COPRAS) based clustering approach has been proposed in this work to select the cluster premier effectively and form the set of best clusters for maximizing the network lifetime. The proposed work deals with data transmission model between IoT and cloud that confirms the improvement in energy efficiency, network lifetime, and latency. Furthermore, the sensitivity analysis has also been carried out and satisfactory results has been obtained.

Keywords:

Cloud Computing, Clustering, MCDM, IoT,

Refference:

I. A. Majumdar, T. Debnath, S. K. Sood, K. L. Baishnab, “Kyasanur forest disease classification framework using novel extremal optimization tuned neural network in fog computing environment”, Journal of medical systems, Springer, vol. 42, no.10, pp.187, 2018.
II. A. Majumdar, A., Biswas, K. L. Baishnab, S. K. Sood, “DNA Based Cloud Storage Security Framework Using Fuzzy Decision Making Technique”, KSII Transactions on Internet & Information Systems, vol.13, no.7, pp. 3794-3820, 2019.
III. A. Majumdar, N. M. Laskar, A. Biswas, S. K. Sood, K. L. Baishnab, “Energy efficient e-healthcare framework using HWPSO-based clustering approach”, Journal of Intelligent & Fuzzy Systems, IOS Press, vol. 36, no. 5, pp. 3957-3969, 2019.
IV. A. Biswas, A. Majumdar, S. Nath, A. Dutta, K. L. Baishnab, “LRBC: a lightweight block cipher design for resource constrained IoT devices”, Journal of Ambient Intelligence and Humanized Computing, Springer pp.1-15, 2020.
V. A. V. Dhumane and R. S. Prasad, “Fractional Gravitational Grey Wolf Optimization to Multi-Path Data Transmission in IoT”, Wireless Personal Communications, Springer, vol. 102, no. 1, pp. 411-36, 2018.
VI. A. V. Dhumane, R. S. Prasad, and J. R. Prasad, “An optimal routing algorithm for internet of thing enabling technologies”, International Journal of Rough Sets and Data Analysis (IJRSDA), vol. 4, no. 3, pp. 1-16, 2017.
VII. A. Orsino, G. Araniti, L. Militano, J. Alonso-Zarate, A. Molinaro, A. Iera,. “Energy efficient IoT data collection in smart cities exploiting D2D communications”, Sensors, vol. 16, no. 6, p.836, 2016.
VIII. D. Wei, S. Kaplan, H.A. Chan, “Energy efficient clustering algorithms for wireless sensor networks”, In Communications Workshops, 2008. ICC Workshops’ 08. IEEE International Conference on, pp. 236-240, 2008.
IX. G. L. da Silva Fré, J. de Carvalho Silva, F.A. Reis, and L.D.P. Mendes, “Particle Swarm optimization implementation for minimal transmission power providing a fully-connected cluster for the internet of things,” in International Workshop on Telecommunications (IWT), pp. 1–7, 2015.
X. I. Yaqoob, E. Ahmed, I.A.T. Hashem, A.I.A. Ahmed, A. Gani, M. Imran, M. Guizani, “Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges”, IEEE wireless communications, vol. 24, no. 3, pp.10-16, 2017.
XI. J. H. Kwon, M. Cha, S. B. Lee, and E. J. Kim, “Variable-categorized clustering algorithm using fuzzy logic for Internet of things local networks”, Multimedia Tools and Applications, Springer, vol. 78, no.3, pp. 2963-82, 2019.
XII. J. A. Martins, A. Mazayev, N. Correia, G. Schütz, and A. Barradas, “GACN: Self-clustering genetic algorithm for constrained networks”, IEEE Communications Letters, vol. 21, no. 3, pp. 628-31, 2017.
XIII. J.M. Liang, J.J. Chen, H.H. Cheng, Y.C. Tseng, “An energy-efficient sleep scheduling with qos consideration in 3gpp lte-advanced networks for internet of things,” IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 3, no. 1, pp.13-22, 2013.
XIV. J. Tang, Z. Zhou, J. Niu, Q. Wang, “An energy efficient hierarchical clustering index tree for facilitating time-correlated region queries in the Internet of Things”, Journal of Network and Computer Applications, vol. 40, pp.1-11, 2014.
XV. L. Song, K. K. Chai, Y. Chen, J. Loo, S. Jimaa, and J. Schormans, “QPSO-based energy-aware clustering scheme in the capillary networks for Internet of Things systems”, in Wireless Communications and Networking Conference, IEEE, April 2016, pp. 1-6.
XVI. L. Song, K.K. Chai, Y. Chen, J. Schormans, J. Loo, A. Vinel, “QoS-Aware Energy-Efficient Cooperative Scheme for Cluster-Based IoT Systems”, IEEE Systems Journal, vol. 11, no. 3, pp.1447-1455, 2017.
XVII. M. P. K. Reddy and M. R. Babu, “Implementing self adaptiveness in whale optimization for cluster head section in Internet of Things”, Cluster Computing, Springer, pp. 1-12, 2018.
XVIII. M. P. K. Reddy and M. R. Babu, “Energy Efficient Cluster Head Selection for Internet of Things”, New Review of Information Networking, Taylor & Francis, vol. 22, no. 1, pp. 54-70, 2017.
XIX. M. P. K. Reddy and M. R. Babu, “An Evolutionary Secure Energy Efficient Routing Protocol in Internet of Things”, International Journal of Intelligent Engineering and Systems, vol. 10, no. 3, pp. 337-46, 2017.
XX. N. T. Van, T. T. Huynh, and B. An, “An energy efficient protocol based on fuzzy logic to extend network lifetime and increase transmission efficiency in wireless sensor networks”, Journal of Intelligent & Fuzzy Systems, IOS Press, vol. 35, no. 6, pp. 5845-5852, 2018.
XXI. N. Kaur, and S.K. Sood, “An Energy-Efficient Architecture for the Internet of Things (IoT)”, IEEE Systems Journal, vol.11, no.2, pp.796-805, 2017.
XXII. Ö.U. Akgül, B. Canberk, “Self-Organized Things (SoT): An energy efficient next generation network management,” Computer Communications, vol. 74, pp.52-62, 2016.
XXIII. S. K. Singh, M.P. Singh, D.K. Singh, “Energy-efficient homogeneous clustering algorithm for wireless sensor network”, International Journal of Wireless & Mobile Networks (IJWMN), vol. 2, no. 3, pp.49-61, 2010.
XXIV. S. Rani, R. Talwar, J. Malhotra, S.H. Ahmed, M. Sarkar, H. Song, “A novel scheme for an energy efficient Internet of Things based on wireless sensor networks”, Sensors, vol. 15, no. 11, pp.28603-28626, 2015.
XXV. S. D. Muruganathan, D. C. Ma, R. I. Bhasin, A. O. Fapojuwo, “A centralized energy-efficient routing protocol for wireless sensor networks”, IEEE Communications Magazine, vol. 43, no. 3, pp. S8-13, 2005.
XXVI. T. Ayesha, S. Sadaf, D. Sinha, and A. K. Das. “Secure Anti-Void Energy-Efficient Routing (SAVEER) Protocol for WSN-Based IoT Network”, In Advances in Computational Intelligence, pp. 129-142. Springer, Singapore, 2020.
XXVII. Z. Zhou, J. Tang, L.J. Zhang, K. Ning, Q. Wang, “EGF-tree: an energy-efficient index tree for facilitating multi-region query aggregation in the internet of things”, Personal and Ubiquitous computing, vol.18, no.4, pp.951-966, 2014.
XXVIII. A. Majumdar, T. Debnath, K. L. Baishnab, S. K. Sood, “An Energy Efficient e-Healthcare Framework Supported by HEO-µGA (Hybrid Extremal Optimization Tuned Micro-GeneticAlgorithm)”, Information System Frontiers, Springer, 2020, DoI: https://doi.org/10.1007/s10796020-10016-5.
XXIX. A. Majumdar, M. Sharma, “Enhanced information security using DNA cryptographic approach. International Journal of Innovative Technology and Exploring Engineering”, vol.4, no.2, pp. 72-76, 2020.

View Download