Paper Type :: Research Paper
Title :: A Survey on Patient Flow Prediction via mutually-Correcting process
Country :: India
Authors :: B.Ramesh Kumar || Basmath.P
Page No. :: 01-06
:: XXXX
:: XXXX
:: XXXX

Over the past decade due to increasing the population Overcrowding in emergency care unit (CU) departments is a problem in many countries around the world, including the United States and Chile. This Emergency department (ED) overcrowding causes problems for indispensible for shortening the length of hospital stays, improving patient outcomes, allocating critical care resources, including increased waiting times. As crowding increases, the quality of care is reduced due to lack of adequate resources. Generally predicting the transition processes of patients (PFP) IS more difficult and crucial process, because predicting patient flow includes patients' duration time within each care unit and transition probability among different units, and including patient's underlying condition and clinical state, disease progression, and availability of care team and staff resources. So Data mining is an effective way to solve such problems in the medical service. This paper surveys various techniques and methods used to Patient Flow Prediction in the Medical care units.

 

Keywords: Patient flow, emergency care unit, mutually-correcting process, electronic health records, data mining.

[1]. Rind, A., Wang, T. D., Aigner, W., Miksch, S., Wongsuphasawat, K., Plaisant, C., & Shneiderman, B. (2013). Interactive information visualization to explore and query electronic health records. Foundations and Trends® in Human–Computer Interaction, 5(3), 207-298.

[2]. Ozkaynak, M., Flatley Brennan, P., Hanauer, D. A., Johnson, S., Aarts, J., Zheng, K., & Haque, S. N. (2013). Patient-centered care requires a patient-oriented workflow model. Journal of the American Medical Informatics Association, 20(e1), e14-e16.

[3]. Edward Choi,, Robert Chen, Le Song and Jimeng Sun (2013). Constructing Disease Network and Temporal Progression Model via Context-Sensitive Hawkes Process. Journal of the American Medical Informatics Association (2893).

[4]. Xin-li Zhang,Ting Zhu, Li Luo, Chang-zheng (2014). Forecasting Emergency Department Patient Flow Using Markov chain. Journal of the Medical Informatics Association (957975).

[5]. Papanicolas, I., & McGuire, A. (2011). Using a Vector Auto regression Framework to measure the quality of English NHS hospitals.

 

Paper Type :: Research Paper
Title :: An Interpolation Process on Weighted (0,1,2;0)- Interpolation on Laguerre Polynomial
Country :: India
Authors :: R. Srivastav || Geeta Vishwakarm𝑎
Page No. :: 07-13
:: XXXX
:: XXXX
:: XXXX

The aim of this pape r is to study a special kind of mixed type of interpolation on the zeros of Ln(k)(x) and Ln(k−1)(x) and on the interval [0,∞) with boundary (Hermite ) conditions gives a simultaneous approximation to a differentiable function and its derivative under what conditions . We have investigated the existence, uniqueness, explicit representation and estimation of interpolatory polynomial .

 

Keywords: lacunary interpolation , Pál - Type interpolation , Laguerre Polynomial.

[1]. Lénárd , M. : Pál type- interpolation and quadrature formulae on Laguerre abscissas, Mathematica Pannonica 15/2 (2004), 265-274
[2]. Lénárd, M., On weighted (0; 2)-type interpolation, Electron. Trans. Numer. Anal., 25 (2006), 206-223.
[3]. Lénárd, M., On weighted lacunary interpolation, Electron. Trans. Numer. Anal., 37 (2010), 113-122.
[4]. Mathur, P. and Datta S., On Pál -type weighted lacunary (0; 2; 0)- interpolation on infinite interval (-∞,+∞), Approx. Theor. Appl., 17 (4) (2001), 1-10.
[5]. Mathur, K.K.and Srivastava, R.: Pál –type Hermite interpolation on infinite interval, J.Math. Anal. and App. 192, 346-359 (1995)

 

Paper Type :: Research Paper
Title :: Impact of Shading on the Output Power of Photovoltaic Array
Country :: India
Authors :: Mohiuddin || Mr. Saif Ahmad || Mohd Tahseen
Page No. :: 14-17
:: XXXX
:: XXXX
:: XXXX

The photovoltaic systems are to make it energy efficient. Partial shading reduces the energy yield of photovoltaic systems and introduces multiple peaks in the P-V characteristics. The maximum power point trackers work in conjunction with the boost converter and track the global peak in the P-V characteristics. The boost converter used for maximum power point trackers is generally designed to operate with high efficiency at the maximum power point voltage of the array by assuming a single peak power point on the P-V characteristics. However, the efficiency of the boost converter varies with the input voltage, and the maximum power point of the load when the converter efficiency is considered is different from the maximum power point of the photovoltaic array..............

 

Keywords: Efficiency, MPPT, Self-Cleaning, Partial Shading, Temperature.

[1]. M. Asim, A. Tariq, and A. Sarwar, "SIMULATION AND ANALYSIS OF A DIRECTLY COUPLED SOLAR PV BASED WATER PUMPING SYSTEM," i-manager's Journal on Electrical Engineering, Vol. 2 l No. 3 l , , January - March 2009, pp. 72
[2]. M. Asim, A. Tariq, and M. Tariq, "Simulink based modeling, simulation and Performance Evaluation of an MPPT for maximum power generation on resistive load," 2nd International Conference on Environmental Science and Technology, pp. V2(397-401), 2011.
[3]. M. Asim, M. Tariq, M.A. Mallick, and I. Ashraf, "An Improved Constant Voltage Based MPPT Technique for PMDC Motor," International Journal of Power Electronics and Drive System (IJPEDS), vol. 7, no. 4, pp. 1330-1336, Dec. 2016.

[4]. M. Asim, M. Tariq, M. A. Mallick, I. Ashraf, S.Kumari and A.K. Bhoi, "Critical Evaluation of Offline MPPT Techniques of Solar PV for Stand-Alone Applications". In Advances in Smart Grid and Renewable Energy (pp. 13-21). Springer, Singapore (2018).

 

Paper Type :: Research Paper
Title :: Fuzzy Filters of a Partial Ordered Ternary Semigroup
Country :: India
Authors :: J.M.Pradeep || A. Gangadhara Rao || P.Ramyalatha || C.Srimannarayana
Page No. :: 18-24
:: XXXX
:: XXXX
:: XXXX

In this paper we introduced the concepts of fuzzy left filter ,fuzzy( rightlateral) filters of a poternarysemigroup and also the concepts of proper fuzzy filter,fuzzy left (right,lateral) filters of a po ternary semigroup generated by a fuzzy subset are also introduced.It is proved that the non empty intersection of two fuzzy left(right ,lateral) filters of poternarysemigroup is also a fuzzy left (right ,lateral) filter.

 

Keywords: fuzzy left filter ,fuzzy( right lateral), filtersproper fuzzy filter Completely semiprime, completely fuzzy prime, completely fuzzy semiprime,fuzzysemiprime.

[1]. Anjaneyulu A., Structure and ideal theory of semigroups – Thesis, ANU (1980).
[2]. Clifford A.H and Preston G.B., The algebraic theory of semigroupsvol – I (American Math. Society, Province (1961)).
[3]. Clifford A.H and Preston G.B., The algebraic theory of semigroupsvol – II (American Math. Society, Province (1967)).
[4]. G.Mohanraj, D.KrishnaSwamy,R.Hema, On fuzzy m-systems and n-systems of ordered semigroup, Annals of Fuzzy Mathematics and Informatics, Volume X, Number X,2013.
[5]. J.N.Mordeson, D.S.Malik, N.Kuroki, Fuzzy Semigroups, Springer-Verlag Berlin Heidelberg Gmbh, 2003(E.Book)

 

Paper Type :: Research Paper
Title :: Distance Divisor Signed Graphs
Country :: India
Authors :: K.V.Madhusudhan || S. Vijay
Page No. :: 34-40
:: XXXX
:: XXXX
:: XXXX

In this paper we introduced a new notion distance divisor signed graph of a signed graph and its properties are obtained. Also, we obtained the structural characterization of distance divisor signed graphs. Further, we presented some switching equivalent characterizations. 2010 Mathematics Subject Classification: 05C22

 

Keywords : Signed Graphs, Balance, Switching, Distance Divisor SignedGraph.

[1]. F. Harary, Graph Theory, Addison Wesley, Reading, Mass, (1972).
[2]. F. Harary, On the notion of balance of a sigraph, Michigan Math. J.,2(1953), 143-146.
[3]. I. N. Herstein, Topics in Algebra, Second Ed., John Wiley & Sons, 2003.
[4]. E. Sampathkumar, Point signed and line signed graphs, Nat. Acad. Sci.Letters, 7(3) (1984), 91-93.
[5]. T. Soza´nsky, Enueration of weak isomorphism classes of signed graphs, J.Graph Theory, 4(2)(1980), 127-144.

 

Paper Type :: Research Paper
Title :: Torque Ripple Minimization of Switched Reluctance Motor by Implementing Model Predictive Control Strategy with IGBT Switching Converter Technique
Country :: India
Authors :: S.Muruganantham || R.Ashokkumar
Page No. :: >28-35
:: XXXX
:: XXXX
:: XXXX

This paper presents effective control characteristics to improve the performance of a tremendous effectual machine entitled Switched reluctance motor. Some of the controllers give better performance to get premeditated value; out of these controllers Model Predictive controller exhibit a good control strategy on power electronics devices. In this model predictive controller technique is employed in switched reluctance motor with a perfect switching converter. The main drawback of Switched reluctance motor is torque ripple and acoustic noise which are caused due to non linearity in winding current and electromagnetic property. The advantage of MPC is that it allows the easy inclusion of system constraints, thus different control objectives can be flexibly taken in account in different applications...........

 

Keywords: Switched Reluctance Motor, Model Predictive Controller, IGBT, Torque ripple.

[1]. Jiefeng Hu and KaWai Eric Cheng. Predictive Control of Power Electronics Converters in Renewable Energy Systems, IEEE Trans Ind. Appl vol.10, 2015 pp515
[2]. Blaabjerg, F. Liserre, M , Ma, K. Power electronics converters for wind turbine systems. IEEE Trans.Ind. Appl. 48, 2012, pp708–719.
[3]. Patricio Cortes M.P, Kazmierkowski , Ralph M. Kennel,Daniel Quevedo, and Jose Rodriguez.Predictive Control in Power Electronics and Drives, IEEE trans on Ind Elec.10 , 2009, pp4312-4324.
[4]. P. Cortés, J. Rodríguez, D. E. Quevedo, and C. Silva. Predictive current control strategy with imposed load current spectrum, IEEE Trans. PowerElectron., vol. 23, no. 2, 2018 pp. 612–618.
[5]. A.Hajihosseinlu, A novel four layer Switched Reluctance Motor with high torque and ripple reduction, IEEE, 15th International Power Electronics and Motion Control Conference,2012.

 

Paper Type :: Research Paper
Title :: Comparison of Naïve Bayes and Least-Square Support Vector Machine classifier for prediction of Swine Flu
Country :: India
Authors :: Dr. Gurmanik Kaur || Er. Arwinder Kaur
Page No. :: 36-39
:: XXXX
:: XXXX
:: XXXX

Disease prediction has long been regarded as a critical topic. Artificial intelligence and machine learning techniques have already been developed to solve this type of medical care problem. Our research focuses on this aspect of medical diagnosis by learning pattern through the collected data for swine flu. This research has developed naïve bayes and least-square support vector machine (LS-SVM) classifier for predicting the presence or absence of swine flu. We have generated 96 symptoms sets after consulting with medical practitioners from various hospitals of Punjab, INDIA. Using LS-SVM, we have achieved better prediction accuracy (100%) as compared to naïve bayes model . This assessment presents the importance and advantages posed by LS-SVM model for prediction of biological variables.

 

Keywords: Swine flu, prediction, naïve bayes, least-square support vector machine.

[1]. W. A. Fischer, M. Gong, S. Bhagwanjee, and J. Sevransky, Global burden of Influenza: Contributions from Resource Limited and Low-Income Settings, Global Heart, 9(3), 2014, 325-336.
[2]. Emergency Medical Relief (EMR), Ministry of Health and Family Welfare, Government of India. Available from: http://mohfw.nic.in/index3.php?lang=1&level=0&deptid=115.
[3]. G. L. Dandagi, S. M. Byahatti, An insight into the swine-influenza A (H1N1) virus infection in humans, Lung India, 28(1), 2011, 34-38. [4]. T. N. Jilani, A. H. Siddiqui, H1N1 Influenza (Swine Flu) (Treasure Island, FL: StatPearls Publishing, 2018).
[5]. B. A. Thakkar, M. I. Hasan, M. A. Desai, Health care decision support system for swine flu prediction using naïve bayes classifier, Proc. IEEE International Conference on Advances in Recent Technologies in Communication and Computing, Kottayam, India, 2010, 101-105.

 

Paper Type :: Research Paper
Title :: Study, Analysis and Refinement in Throughput of Stream Ciphers for Data Security
Country :: India
Authors :: Mr. Praneet R shah || Dr. Sunil Chavan || Dr. Basavaraj Neelgir
Page No. :: 40-46
:: XXXX
:: XXXX
:: XXXX

Message privacy is the most significant feature of communication but particularly in wireless environment messages are highly insecure and encryption is must in such environment. Over a decades there has been momentous research going towards removing the attacks on different cryptographic algorithms. Aim of proposed research work is to study different stream cipher which includes ZUC, SNOW 3G and RC4 offering dependable security services in Long Term Evolution networks (LTE). The research work will also consider the performance analysis of stream ciphers based on the performance parameter such as weak keys, key vulnerability, risk, different attacks, simplicity, encryption speed, key/IV size, internal state space, performance, memory space, energy consumption. VHDL language is used to design the code and hardware implementation is done using XILINX's Virtex-5 FPGA.

 

Keywords: Long Term Evolution (LTE) , FPGA, SNOW 3G, RC4, ZUC.

[1]. Paris Kitsos, Nicolas Sklavos, and Athanassios N. Skodras, IEEE standard: "An FPGA Implementation of ZUC Stream Cipher". 2011 14th Euromicro Conference on Digital System Design. pp. 814-817.
[2]. Traboulsi, S.; Pohl, N.; Hausner, J.; Bilgic, A.; Frascolla, V., IEEE standard : "Power analysis and optimization of the ZUC stream cipher for LTE-Advanced mobile terminals". Circuits and Systems (LASCAS), 2012 IEEE Third Latin American Symposium.
[3]. Lingchen Zhang, Luning Xia, Zongbin Liu, Jiwu Jing and Yuan Ma, IEEE Standard: "Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA". 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. Pp. 436 -442.
[4]. Ghizlane Orhanou, Said El Hajji, Abdelmajid Lakbabi, Youssef BENTALEB, IEEE Standard: "Analytical Evaluation of the stream cipher ZUC". 2012.
[5]. Eyad Taqieddin*, Ola Abu-Rjei, Khaldoon Mhaidat, Raed Bani-Hani, Science Direct: "Efficient FPGA Implementation of the RC4 Stream Cipher using Block RAM and Pipelining". The 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2015).pp. 8-15.

 

Paper Type :: Research Paper
Title :: "Green Concrete" – A Review Study
Country :: India
Authors :: Dr. Pulkit Gupta || Ankit Laddha
Page No. :: 47-51
:: XXXX
:: XXXX
:: XXXX

Green Concrete is that type of concrete that is used to create the construction materials having a lesser effect on the environment. This version of concrete is made up from the mix of the industrial waste and inorganic polymer. The most commonly way to produce green concrete is by using the industrial waste products such as fly ash, blast furnace slag, and cement mixture. This means concrete that uses less energy in its production & produces less carbon dioxide than normal concrete is green concrete. It has many advantages such as reduction in shrinkage & creep, green Concrete uses local and recycled materials in concrete and the heat of hydration of green concrete is significantly lower than traditional concrete. The green concrete is used in the dam, bridges, buildings, columns, hut and much more...........

 

Keywords: Concrete, Green Concrete, Replacement materials.

[1]. Vardhan Nagarkar, Sanket Padalkar, Samruddhi Bhamre, Akshay Tupe 2017,"Experimental Study on Green Concrete ", International Journal for Research in Applied Science and Engineering Technology, U G students, Department of Civil Engineering, Anantrao Pawar College of Engineering and Research, Pune, India, Volume-5, Issue-4, April 2017. ISSN: 2322-9653.
[2]. Shailendra Tiwari et al 2015, "Development of Green Concrete and Assessment of its Strength Parameters", International Journal of Engineering and Technical Research, Volume - 3, Issue - 5, May 2015. ISSN: 2321 - 0869.
[3]. Karma Wang chuk et al 2013, " Green Concrete For Sustainable Construction ", International Journal of Research in Engineering and Technology, Civil Department, K L University, Andhra Pradesh, India, Volume - 2, Issue - 11, Nov - 2013. ISSN: 2321 - 7308.

 

Paper Type :: Research Paper
Title :: Steganography: A Comparative Survey Conducted on Digital Images
Country :: India
Authors :: Miftah Ul Uroos || Sukhvinder Kaur || Muheet Ahmed Butt
Page No. :: 52-61
:: XXXX
:: XXXX
:: XXXX

Steganography refers to the data hiding. The main purpose of image steganography is to hide the data behind images. It means that it encodes the text in the form of image. The steganography is done when the communication takes place between sender and receiver. It is used to send the sensitive information with high security [15]. Nowadays in data transfer over the network, the security is the main issue concerned with this. Before the growth of the steganography, security of the data was the main concern of research for the researchers around the globe. The steganography method mostly depends on robustness, capacity, undetectability, invisibility of cover image and secret image. More the protection is done on these attributes more clarity is seen in the results............

 

Keywords: Secret data, Encryption, Watermarking, LSB, DCT, DWT.

[1]. Ritija Kakade, Nikita Kasar, Shruti Kulkarni, Shubham Kumbalpuri, Sonali Patil, "Image Steganography and Data hiding in QR code", IRJET, Vol 04, 2017.
[2]. Marwan Ali Albahar, Olayemi Olawumi, Keijo Haataja, Pekka Toivanen, "A novel method for Bluetooth pairing using Steganography", IJITS, No. 1, Vol 09, 2017.
[3]. Sujarani Rajendran, Manivannan Doraipandian, "Chaotic Map Based Random Image Steganography using LSB Technique", IJNS, Vol 19, No.4, 2017.
[4]. Vijay Kumar Sharma, Dr. Devesh Kr Srivastava, Dr. Pratistha Mathur, "A Study of Steganography based data hiding techniques" , IJERMT,Vol 6, 2017.
[5]. Vandana Yadav, Sanjay Kumar Sharma, "A new approach for Image Steganography using Edge Detection Method for Hiding Text in Color Images using HSI Color Model", IJSRSET, Vol 03, 2017.

 

Paper Type :: Research Paper
Title :: Implementation of Directory based Cache Coherency Model to Analyze the Network Performance in Distributed Applications
Country :: India
Authors :: Subrahmanya B || Dr. V. Vijayakumar
Page No. :: 62-68
:: XXXX
:: XXXX
:: XXXX

Cache is a smaller static memory, that is used in the systems to store data as well as instructions which are immediately required by the CPU. Keeping the objective of High Performance Computation(HPC), cache modeling has undergone different phases in the field of computation. In case of Multiprocessor Systems, there will be multiple levels of cache memory with in each of the cores of the system. This design approach has lead towards a new problem called Cache Coherency Problem. This problem is basically on maintaining consistency among the cache and memory contents, while several processors are allowed to read and manipulate a given data item. Directory based Cache Coherency Protocol is one of the solution for this problem and has been widely used in case of Distributed Systems...........

 

Keywords: Distributed System, High Performance Computation, Coherency Problem, Computational, Multiprocessor Systems, In Throughput, Out Throughput, In Ou, In Out Throughput.

[1]. Subrahmanya B & Dr. V. Vijayakumar. (September 2018). Adaptive Directory based Cache Coherency Model to Optimize the Network Bandwidth in Distributed Applications. IOSR Journal of Engineering (IOSRJEN), vol. 08, Issue 9, pp. 41-46, ISSN (e) 2250-3021, ISSN (p): 2278-8719.
[2]. Shou-Chih Lo, Jhih-Sian Hu, Varsha A. Kshirsagar, Neighborhood-Based In-Network Caching for Information-Centric Networks. Int. J. Communications, Network and System Sciences, 2017, 10, 76-87
[3]. Sarah Tasneem 1 , Reda Ammar 2, Performance Study of a Distributed Web Server: An Analytical Approach. Journal of Software Engineering and Applications, 2012, 5, 855-863.
[4]. Rizik M. H. Al-Sayyed, Fawaz A. Al Zaghoul, Dima Suleiman, Mariam Itriq, Ismail Hababeh. New Approach for Database Fragmentation and Allocation to Improve the Distributed Database Management System Performance. Journal of Software Engineering and Applications, 2014, 7, 891-905

 

Paper Type :: Research Paper
Title :: Mathematical models of disease transmission of Chikungunya: a report
Country :: India
Authors :: Indu Ratti
Page No. > :: 69-71
:: XXXX
:: XXXX
:: XXXX

Chikungunya is an infection caused by the chikungunya virus (CHIKV). This virus is a member of the genus Alphavirus, and family Togaviridae. The virus is vectored by Aedes albopictus or Aedes aegypti mosquitoes and is a deadly disease. The disease is a reemerging arboviral which is epidemic in Africa and Asia. A massive outbreak happened on Reunion Island in 2006. Chikungunya was detected in the first outbreak in 1952 in Tanzania and has continued increasing until now in many tropical and sub-tropical countries. While the disease typically occurs in Africa and Asia, outbreaks have been reported in Europe and the Americas since the 2000s. The incubation pe- riod of the Chikungunya virus ranges from one to twelve days, and is most typically three to seven. The disease may be asymptomatic, but generally is not, as 72% to 97% of those infected will develop symptoms. Characteristic symptoms include

[1]. Yakob, L., & Clements, A. C. (2013). A mathematical model of chikun- gunya dynamics and control: the major epidemic on Runion Island. PloS one, 8(3), e57448.
[2]. Dumont, Y., Chiroleu, F., & Domerg, C. (2008). On a temporal model for the Chikungunya disease: modeling, theory and numerics. Mathe- matical biosciences, 213(1), 80-91.
[3]. Isea, R., & Lonngren, K. E. (2016). A preliminary mathematical model for the dynamic transmission of dengue, chikungunya and zika. arXiv preprint arXiv:1606.08233.
[4]. Moulay, D., Aziz-Alaoui, M. A., & Cadivel, M. (2011). The chikungunya disease: modeling, vector and transmission global dynamics. Mathemat- ical biosciences, 229(1), 50-63.
[5]. Dumont, Y., & Tchuenche, J. M. (2012). Mathematical studies on the sterile insect technique for the Chikungunya disease and Aedes albopic- tus. Journal of mathematical Biology, 65(5), 809-854.

 

Paper Type :: Research Paper
Title :: Automation of Vendor Skill Management Using Uipath
Country :: India
Authors :: Durgam V V S S Harsha Vardhan || M. Sitha Ram
Page No. :: 72-79
:: XXXX
:: XXXX
:: XXXX

With the rise of technology and robots, involvement of humans in the technology and other processes are slowly diminishing. Instead humans are being replaced by robots. This process is termed to be Automation. In general system, people are being recruited to do repetitive tasks in an organisation like, gathering data, sorting the data as per the needs of the organisation, short-listing the candidates, sending number of mails to various organisations and individuals etc. So, to perform these repetitive tasks the cost incurred by the organisation is also very high............

 

Keywords: IT automation, UIPATH, Robotics, Vendor skill management.

[1]. https://searchitoperations.techtarget.com/definition/IT-automation
[2]. https://internetofthingsagenda.techtarget.com/definition/robotic-process-automation
[3]. http://www.csi-india.org/downloads/pdf/CSIC%20June%202018.pdf
[4]. https://studio.uipath.com/
[5]. https://orchestrator.uipath.com/