{"title":"ANOVA analysis of hydrogen-fuelled compression ignition engine for sustainable mobility","authors":"Govind Sharma, R. Kaushal","doi":"10.1109/ICCMSO58359.2022.00038","DOIUrl":"https://doi.org/10.1109/ICCMSO58359.2022.00038","url":null,"abstract":"Compression ignition engine plays a significant role in transportation because of their excellent performance and high thermal efficiency. Compression ignition engines recently received much criticism due to their harmful environmental emissions and high dependability on conventional fossil fuels. Hydrogen as fuel in CI engine can save its existence and bring back its popularity with minor modifications. It can also reduce emissions, which contribute to global warming and perform much more efficiently than diesel engines. In present work numerical investigation of the performance of the hydrogen-fuelled compression ignition engine has been done to find out the optimum compression ratio and engine load for maximum break thermal efficiency (BTHE). A range of compression ratio (CR) from 12 to 18 and engine loading from 0 to 12 kg are selected as the key parameters for ANOVA. The Quadratic model of the response surface method is considered for optimization. The optimized BTHE of hydrogen-fueled engine is observed as 29.62%, at the compression ratio of 14.2 and engine load of 10.2 kg. The optimized brake specific fuel consumption (BSFC) of hydrogen-fueled engine is observed as 0.262 kg/kW-hr, at the compression ratio of 14.2 and engine load of 5.4 kg.","PeriodicalId":209727,"journal":{"name":"2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121575555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Investigation of the Bibliometric Landscape of the Many Facets of Machine Learning From the Years 2000 to 2022","authors":"N. Sharma, Raman Chadha","doi":"10.1109/ICCMSO58359.2022.00020","DOIUrl":"https://doi.org/10.1109/ICCMSO58359.2022.00020","url":null,"abstract":"Machine Learning as an emerging and applicable learning plays a vital role in the world of Computer Science. MachineLearning has attracted much attention in the last decade. With the development of Machine Learning, huge researchers and publications opted for this as the path. This paper is about the bibliometric analysis that is deployed from the year 2000 to 2022. The main three fundamental factors that guide the progress of machine learning are Data, computing, and algorithmic advances. Mainly there are four different types of machine learning which accomplish Supervised ML, Unsupervised ML, Semi-Supervised ML, and Reinforcement Machine Learning which is used in different areas and applications. This paper is mainly focused on what are the major areas where machine learning has used and what are the minimal area where there is still a requirement of using Machine learning is to be used.","PeriodicalId":209727,"journal":{"name":"2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122983507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Note on Shrinkage Entropy Estimator for Mean of Exponential Distribution Considering Square Error Loss Function","authors":"Neetu Malik, Priyanka Sahni, Rajeev Kumar","doi":"10.1109/ICCMSO58359.2022.00056","DOIUrl":"https://doi.org/10.1109/ICCMSO58359.2022.00056","url":null,"abstract":"The aim of the paper is to develop and investigate a new shrinkage estimator of the entropy function for mean of exponential distribution. A progressive type II censored sample and two shrinkage factors are considered to develop the shrinkage entropy estimator. Using squared error loss function (SELF), the risk and the relative risk functions are obtained for the proposed estimator. In terms of risk functions under SELF, the proposed entropy estimator is shown to be better than the existing entropy estimators for the distribution.","PeriodicalId":209727,"journal":{"name":"2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125885001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ricky Rajora, Amit Kumar, Shivani Malhotra, Avinash Sharma
{"title":"Data security breaches and mitigating methods in the healthcare system: A review","authors":"Ricky Rajora, Amit Kumar, Shivani Malhotra, Avinash Sharma","doi":"10.1109/ICCMSO58359.2022.00070","DOIUrl":"https://doi.org/10.1109/ICCMSO58359.2022.00070","url":null,"abstract":"Since networks are used to carry a massive amount of daily data that is obtained from various activities. Cybersecurity is a crucial concern that is getting more significant as the world becomes more linked with the internet. Because of more connectivity with the internet increase the chances of crime in the cyber system is increased now. With each new day in healthcare industries that goes by, crime related to cyber systems continues to take various turns, so healthcare information protection is most important. Organizations are being put to the test by the newest and most inventive technologies in terms of how they protect their infrastructure and how they need cutting-edge services and information to do so. Despite the fact that there is no perfect solution, we should do all in our power to lessen cybercrime in order to ensure a future in which technology is secure. Before improper activity can be examined and remembered in order to prevent a recurrence, most security systems require vulnerabilities. Such a reactive approach to infrastructure protection, which includes our healthcare systems, is useless. The current cyber defense system as a result has a huge theoretical gap. In this work we reviewed about some mitigating method like Machine Learning, Block Chain, Deep Learning, HLE-SO hybrid etc. and work is proposed for cyber attacks observed in the healthcare system and which type of mitigating methods are used for overcome the possibility of attack in cyber system","PeriodicalId":209727,"journal":{"name":"2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132013089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combinatorial Optimization of Non-linear Multicommodity Network Flow Using Pseudo Quasi-Newton Method","authors":"Gautam Beniwal, Mohammad Rizwanullah","doi":"10.1109/ICCMSO58359.2022.00041","DOIUrl":"https://doi.org/10.1109/ICCMSO58359.2022.00041","url":null,"abstract":"This paper presents a new approach to solve the Nonlinear Multicommodity Network Flow Problem (NMNFP). We intend to use a multi-algorithm approach to resolve the Convex Multicommodity Network Flow Problem into Multicommodity Flow Quadratic Subproblems (MFQSPs) using the projected Jacobi approach. The proposed methodology combines the well-known Jacobi Method and innovative Dual Projected Pseudo-Quasi-Newton (DPPQN) approach to improve the computational efficiency of the DPPQN problem. A sparse-block-matrix methodology and finite iteration scale technique have been used in the comparative analysis of Frank-Wolfe with PARTAN and the DPPQN approach. We show the efficiency of the purpose algorithm with a numerical example.","PeriodicalId":209727,"journal":{"name":"2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133344867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence of Adam Optimizer with Sequential Convolutional Model for Detection of Tuberculosis","authors":"Kanwarpartap Singh Gill, Avinash Sharma, Vatsala Anand, Rupesh Gupta, Pratibha Deshmukh","doi":"10.1109/ICCMSO58359.2022.00072","DOIUrl":"https://doi.org/10.1109/ICCMSO58359.2022.00072","url":null,"abstract":"Tuberculosis could be a spreadable disease of the chest. Different TB control activities have been propelled by the World Health Organization in various countries. In order to analyze TB, specialists regularly recommend a chest X-ray (CXR), which is less costly and time-consuming than the current sputum tests and Tuberculosis Skin Tests (TST). Diverse analysts have carried out assignments using profound learning and exchange learning models for the location of tuberculosis. The precision of the current writing, be that as it may, is confined, and the method is cumbersome and time-consuming. Diagnosing tuberculosis could be a significant task that requires a high level of accuracy. Minor demonstrative mistakes can have disastrous impacts. The extreme objective of this study is to utilize deep learning methods to distinguish TB at the suitable time and to help in early treatment to help combat the rising number of diseases. Planning an independent framework that can give a speedy choice and essentially kill demonstrative mistakes is vital. Diverse layers, counting conv2d, maxpooling, flatten, and dense layers, are present within the proposed show. The model's accuracy score of 88% will help the therapeutic community in creating more successful techniques to combat this malady.","PeriodicalId":209727,"journal":{"name":"2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131039414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Colour Image Encryption Using Chaotic Trigonometric Map and DNA Coding","authors":"Renjith V. Ravi, S. Goyal, Sardar M N Islam","doi":"10.1109/ICCMSO58359.2022.00044","DOIUrl":"https://doi.org/10.1109/ICCMSO58359.2022.00044","url":null,"abstract":"The problem of information privacy has grown more significant in terms of data storage and communication in the 21st century due to the technological explosion during which information has become a highly important strategic resource. The idea of employing DNA cryptography has been highlighted as a potential technology that offers fresh hope for unbreakable algorithms since standard cryptosystems are becoming susceptible to assaults. Due to biological DNA's outstanding energy efficiency, enormous storage capacity, and extensive parallelism, a new branch of cryptography based on DNA computing is developing. There is still more study to be done since this discipline is still in its infancy. This work proposes a DNA encryption strategy based on cryptographic key generation techniques and chaotic diffusion operation.","PeriodicalId":209727,"journal":{"name":"2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124257449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation Platforms and Strategy for the Knowledge Discovery from the Data","authors":"Monika, Mohammad Shauib","doi":"10.1109/ICCMSO58359.2022.00043","DOIUrl":"https://doi.org/10.1109/ICCMSO58359.2022.00043","url":null,"abstract":"Information Management and Information Engineering are two important concepts in recent years. Knowledge Engineering is part of a system engineering program that addresses the needs of an uncertain process by emphasizing the acquisition of Information about a particular process and representing this information in an information-based system. The use of such technologies enhances and helps to analyze the various statements and feelings made by different services or institutions in order to better recognize the needs of the recipients, which can also be referred to as feedback from the recipient. The purpose of this paper is to discuss how and where to use these programs.","PeriodicalId":209727,"journal":{"name":"2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125784244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing Virtual Machine Migration Methodology","authors":"Gurpreet Singh Panesar, Raman Chadha","doi":"10.1109/ICCMSO58359.2022.00048","DOIUrl":"https://doi.org/10.1109/ICCMSO58359.2022.00048","url":null,"abstract":"In a traditional cloud-based datacentre, several physical machines (PM) host large numbers of virtual machines (VM), which in turn run a wide range of applications and services. VM load changes depending on the various programmes and traffic that users use, and occasionally this traffic may be too much for VMs to handle. Physical machines that host numerous VMs have a limited capacity, and if they become overloaded, their performance could suffer or they could stop functioning altogether. To take advantage of the resources' availability and balance the load, a VM machine that runs multiple apps on a severely loaded PM can be moved to a PM that isn't as busy. If VM migration occurs over a network link that is overloaded with user traffic in data centres where VMs are exposed to a lot of user traffic, it will cause a bottleneck if there isn't enough bandwidth on the link to support the VM migration. To guarantee the bandwidth required for VM migration, there is an obvious need for tools to restrict user traffic on both the source and destination PMs.","PeriodicalId":209727,"journal":{"name":"2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117018942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manvinder Sharma, A. Gupta, Joginder Singh, Rinkesh Mittal, Harjinder Singh, D. Pandey
{"title":"Effects of slot shape in performance of SIW based Leaky Wave Antenna","authors":"Manvinder Sharma, A. Gupta, Joginder Singh, Rinkesh Mittal, Harjinder Singh, D. Pandey","doi":"10.1109/ICCMSO58359.2022.00060","DOIUrl":"https://doi.org/10.1109/ICCMSO58359.2022.00060","url":null,"abstract":"The antenna is the foundation of a communication system, and as technology has advanced, the antenna has undergone significant innovation. An antenna is a smart device that may function as a transducer in addition to transmitting and receiving signals. The primary factor influencing the antenna's bandwidth is the slot's shape. It influences its electrical properties like polarization and gain. In this paper, experimental analysis is done for effect of shapes of slots on performance of antenna. The performance is compared in terms of gain, return loss and half power beam width (HPBW). For measuring the effect on antenna parameters, vertical semi-C, round C, horizontal semi-C and horizontal linear shaped slots are formed on upper metal surface. The horizontal linear slots performed better.","PeriodicalId":209727,"journal":{"name":"2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129901783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}