{"title":"An Comparison of Different Cluster Head Selection Techniques for Wireless Sensor Network","authors":"E. Akila, Baby Deepa","doi":"10.52783/cana.v31.1073","DOIUrl":"https://doi.org/10.52783/cana.v31.1073","url":null,"abstract":"Wireless Sensor Network is based on the hierarchical cluster and hence the Cluster Heads (CHs) will consume some more energy owing to the additional overload for the receiving and the aggregating of data from that of their member sensor nodes and this transmits all the aggregated data to its Base Station (BS). So the proper selection of the CH has a vital role to play in conserving the energy of the sensor nodes for the purpose of prolonging the WSNs and their lifetime. Here in this work, a proposed Low Energy Adaptive Clustering Hierarchy (LEACH), the Genetic Algorithm (GA) and finally the Chemical Reaction Optimization (CRO) algorithm is considered. The LEACH is a popular clustering algorithm wherein the sensor nodes will elect themselves to be the CH having a certain probability. But the main disadvantage of this algorithm will be that it may choose a CH having low energy that will be able to die quickly and thereby degrades the network performance. So there is a large number of algorithms that are developed for improving the LEACH. These results have been compared with certain currently existing algorithms for being able to demonstrate the proposed algorithm and its superiority. ","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":"119 44","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141822256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ARRN: Leveraging Demographic Context for Improved Semantic Personalization in Hybrid Recommendation Systems","authors":"Harshali Bhuwad, Dr.Jagdish.W.Bakal","doi":"10.52783/cana.v31.1059","DOIUrl":"https://doi.org/10.52783/cana.v31.1059","url":null,"abstract":"This paper proposes a novel recommendation system model, the Attentive Recurrent Recommender Network (ARRN), that addresses the challenge of incorporating demographic information into recommendations. ARRN leverages user-item interaction data along with age information from the data set to deliver personalized recommendations specifically tailored to different age groups. The approach utilizes embedding techniques and semantic analysis to capture user preferences and behaviors associated with their age. An attention mechanism prioritizes relevant features based on user age groups, enabling ARRN to dynamically adapt recommendations for users with limited interaction history. The paper presents a comprehensive evaluation of ARRN’s performance compared to existing state-of-the-art recommendation algorithms. The results demonstrate that ARRN outperforms existing approaches, particularly for users with limited interaction history, by effectively mitigating the cold-start problem in age-sensitive product domains.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 20","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141824430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Fractional Calculus of Product of Special Functions","authors":"Karuna Laddha, Deepak Kumar Kabra, Seema Kabra","doi":"10.52783/cana.v31.1054","DOIUrl":"https://doi.org/10.52783/cana.v31.1054","url":null,"abstract":"Introduction: In this paper, we aim to establish a closed form for the Pathway fractional integral operator and Marichev-Saigo-Maeda fractional integral and differential operators involving the product of Special G function and Generalized Mittag – Leffler function. The obtained results are evaluated in terms of generalized Wright hyper geometric function. ","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 94","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141827468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fog Computing Simulators: A Comprehensive Research and Analytical Study","authors":"Rushikesh Rajendra Nikam, Dr. Dilip Motwani","doi":"10.52783/cana.v31.1057","DOIUrl":"https://doi.org/10.52783/cana.v31.1057","url":null,"abstract":"Fog computing, a novel paradigm for distributed computing, has found extensive applications in critical sectors like healthcare. This study is dedicated to setting up and evaluating network properties crucial for real-time decision-making systems. Specifically, it comprehensively and analytically assesses two leading fog computing simulators, YAFS and LEAF. By focusing on key performance metrics—memory usage, CPU consumption, and execution latency—the research aims to clearly delineate the capabilities and limitations of each simulator. Through meticulous comparative analysis, the study identifies which simulator offers superior efficiency and scalability in modelling complex fog computing environments within healthcare. Moreover, the paper aims to highlight both the strengths and weaknesses of YAFS and LEAF, providing foundational insights to inform the deployment of fog computing solutions in healthcare settings. This research not only examines the technical properties and performance of these simulators but also explores broader implications of adopting fog computing over traditional cloud architectures. Ultimately, the findings aim to serve as a valuable guide for researchers and practitioners in selecting the most suitable simulation tools, thereby facilitating the enhanced design and optimization of fog-based applications.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141826295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some Results of Data Encryption and Decryption using Euler’s Totient Function","authors":"Gobburi Rekha, V. Srinivas","doi":"10.52783/cana.v31.1063","DOIUrl":"https://doi.org/10.52783/cana.v31.1063","url":null,"abstract":"In this paper, we discuss about the Hill Cipher cryptosystem, the RSA public-key cryptosystem, developed by Rivest, Shamir, Adleman for text encoding and decoding. To encrypt and decrypt the message, we use the Euler Phi-function, congruences, and matrix multiplication. Further, we employ two keys for coding and decoding. \u0000Introduction: In present, computer networks, internet and mobile communications are important and inevitable part of our society and security of information from hackers is a big task. One of the most widely used applications for information security is Cryptography. Usually in Hill cipher there are two keys, of which one acts as encryption key and the other one acts as decryption key. In this paper we discuss about Hill Cipher using only one key for data encryption and data decryption. Further, we extend our result with dual encryption and decryption process which is explained by using the RSA public key cryptosystem and Hill Cipher and they together execute a powerful cryptosystem to secure the data. \u0000Objectives: The purpose of this paper is to obtain and compare the result of data encryption and data decryption using: \u0000 \u0000A matrix which is invertible. \u0000A matrix which is Involutory. \u0000An RSA cryptosystem which is applied for Hill Cipher where the matrix is Involutory. \u0000 \u0000Methods: Using Hill Cipher and thereafter Hill Cipher - RSA together we have encrypted and decrypted the data under modulo 255. \u0000Results: The text message is converted to coded message and then original message is retrieved by using the three different techniques. \u0000Conclusions: As the paper involves two stages of encryption and decryption where public key and private key which are unthinkable by the third parities, the security of information is highly appreciable.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141824656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Common Fixed Point Result in Menger Space","authors":"Ajay Kumar Chaudhary","doi":"10.52783/cana.v31.1065","DOIUrl":"https://doi.org/10.52783/cana.v31.1065","url":null,"abstract":"By using compatibility condition type (P) in probabilistic metric space, establish common fixed point results for four self-mappings with control function in [0,1]. The result of Chaudhary et. al [5] is a particular case of this new result and it extends and generalizes other similar results in the literature.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141824358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing Advertising and Pricing for Perishable Inventory with Freshness-Related Demand in a Hybrid Partial Prepayment and Trade Credit Supply Chain","authors":"T.Vanjikkodi","doi":"10.52783/cana.v31.1060","DOIUrl":"https://doi.org/10.52783/cana.v31.1060","url":null,"abstract":"This paper investigates an inventory model addressing non-instantaneous deteriorating items with expiration concerns, incorporating a hybrid payment approach. The demand factors of this study are price-sensitive demand, product freshness considerations, and advertising frequency impact, which are critical elements in contemporary supply chain challenges. The proposed model investigates multiple prepayments and delayed payments to bolster business operations during financial emergencies. This study aims to enhance business flexibility, and the model reflects real-world complexities by introducing a time-dependent holding cost and accounting for partial backlogged shortages. The establishment of convexity ensures efficient optimization and numerical examples clearly illustrate how the proposed strategies influence overall enterprise profitability. \u0000Furthermore, the utilization of MATLAB for graphical representation enhances result availability and understanding. Sensitivity analysis enriches decision-making by providing important managerial insights during the recovery phase. This research contributes a strong foundation for inventory optimization that can adapt to changing post-pandemic economic conditions.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 46","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141826691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Swathi, Sivakumar Depuru, M. Sakthivel, S. Sivanantham, K. Amala, Pavan Kumar
{"title":"A Hybrid Malware Detection System for Enhanced Cloud Security Utilizing Trust-Based Glow-Worm Swarm Optimization and Recurrent Deep Neural Networks","authors":"R. Swathi, Sivakumar Depuru, M. Sakthivel, S. Sivanantham, K. Amala, Pavan Kumar","doi":"10.52783/cana.v31.994","DOIUrl":"https://doi.org/10.52783/cana.v31.994","url":null,"abstract":"User credentials are vulnerable to exposure in demilitarized zones due to software vulnerabilities and hardware threats. This research aims to mitigate these risks by proposing a sophisticated trust-based malware detection (T-MALWARE DETECTION) method that can accurately classify data. The proposed system utilizes an enhanced Glow-Worm Swarm Optimization (IGWSO) technique to efficiently cluster datasets. To classify potential intrusions and assign trust levels to cloud data after clustering, a Recurrent Neural Network (RNN) approach is employed. The effectiveness of the Trust-oriented Malware Detection System (T-MALWARE DETECTIONS) is evaluated using metrics such as detection rate, precision, recall, and F-measure. This system is developed using Java and the CloudSimulator (CloudSim) tool, allowing for a thorough evaluation of its performance in comparison to contemporary state-of-the-art systems.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":"135 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141828614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decision–Making Problem for Triangular Hesitant Fuzzy Set","authors":"E. Fany Helena","doi":"10.52783/cana.v31.1036","DOIUrl":"https://doi.org/10.52783/cana.v31.1036","url":null,"abstract":"In this paper, we proposed two new algorithms to address the task of multicriteria decision-making problems in which the criteria weights which have been unidentified, and alternatives are provided by triangular fuzzy numbers' linguistic values. A decision-making problem with assessments has been proposed on the basis of expected values. The expected values for two algorithms are calculated with two different 'Ranking Functions'. The weights are obtained by calculating the variance and mean of expected values with the aid of the triangular hesitant fuzzy decision matrix. The all alternatives ranking order is determined, and the maximum one is the best that can be identified easily. Lastly, a representative example is provided regarding the health issues of a community.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141829069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Hybrid Work Models on Employee Well-being and Engagement","authors":"T. Saritha, Dr. P. Akthar","doi":"10.52783/cana.v31.1003","DOIUrl":"https://doi.org/10.52783/cana.v31.1003","url":null,"abstract":"This study investigates the impact of hybrid work models on employee well-being and engagement in modern organizational settings. Using a mixed-methods approach, the study examines the effects of hybrid work arrangements on various dimensions of employee well-being, including stress levels, work-life balance, and job satisfaction. Additionally, the study explores the relationship between hybrid work models and employee engagement, considering factors such as communication patterns, collaboration dynamics, and managerial support. The findings shed light on the implications of hybrid work for organizational practices and offer recommendations for optimizing employee well-being and engagement in hybrid work environments.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141829768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}