Browse Items (2150 total)
Sort by:
-
On Some Graphs Whose Domination Number Is thePerfect Italian Domination Number
Perfect Italian Domination (PID) is a vertex labelling of a graph G by numbers from the set such that a vertex in G labelled 0 has a neighbourhood where the summation of the labels of the vertices in it is precisely 2. The summation of labels on the vertices of the graph which satisfy the PID labelling is known as its PID number, and is the minimum possible PID number of a graph G. We find some characterization of graphs for which . We also find a lower bound for |V(G)|, which satisfies the same. Further, we discuss the graphs that satisfies or . A realisation problem is used to prove that PID cannot be bounded by a scalar multiple of the Domination number. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
On some properties of partial dominating sets
A subset of the vertex set of a graph is a dominating set of the graph if that subset and all the adjacent vertices of that subset form the whole of the vertex set. In case, if a subset and all the adjacent vertices of that subset form part of the whole set, say, for 0 < p < 1, ptimes of the whole vertex set, we say it is a partial domination. In this paper, we explore some of the properties of partial dominating sets with respect to particular values of p. 2020 Author(s). -
On Statistical Tools in Finding Equitable Antimagic Labeling of Complete Graphs
Graph theory is a branch of mathematics that deals with representation of graphs with vertices and edges. Graph labeling is the assignment of integer labels to either vertices or edges. For a given graph G= (V, E), an edge-weighting is a function f:E(G)?{1,2,3,..,|E(G)|}. For a vertex v of G, let Wf(v) denotes the sum of edge-weights appearing on the edges incident at v under the edge-weighting f. A bijective edge-weighting f of G is said to be an equitable antimagic labeling (EAL) of G if |Wf(u) - Wf(v) | ? 1 for any pair of adjacent vertices u and v of G. A graph admitting an EAL is called an equitable antimagic graph (EAG). In this paper, the characterization of complete graphs Kn, for n? 6 is dealt using an algorithmic approach. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
On the k-Forcing Number of Some DS-Graphs
Amos et al. introduced the notion of k-forcing number as a generalization of Zero forcing number and is denoted by Fk(G) where k> 0 is any positive integer, the k -forcing number of a graph is the minimum cardinality among all k -forcing sets of a graph G. In this paper, many bounds for k -forcing number of degree splitting graph DS(G) for different graph classes are found. We evaluate the value of k -forcing number of degree splitting graph of some of the Cartesian product graph for different values of k. Also we observed that for Tur graph Tn , t, upper and lower bound is given by, Fk(Tn , t) ? Fk(DS(Tn , t) ) ? Fk(Tn , t) + 1. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
On the Laplacian energy of interval valued fuzzy graphs
Interval valued fuzzy Laplacian matrix (IVFLM) associated with an interval valued fuzzy graph (IVFG) is studied in this paper. We define spectrum, energy, Laplacian spectrum and Laplacian energy and obtain some bounds for energy and Laplacian energy. 2020 Author(s). -
On Two-Dimensional Approximate Pattern Matching Using Fuzzy Automata
Pattern matching has been extensively studied in the last few decades, owing to its great contribution in various fields such as search engines, computational biology, etc. Several real-life situations require patterns that allow ambiguity in specified positions. In this paper, one-dimensional and two-dimensional approximate pattern matching models have been constructed using fuzzy automata. The similarity function used in fuzzy automata enables the occurrence of all exact and similar one-dimensional and two-dimensional patterns. This kind of searching approximate patterns is not possible with regular search models. The time complexity of the proposed algorithm has also been analyzed. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
On-board Converter for Electric Vehicle Charging using LCLC Resonant Topology
Due to their high efficiency, high power density, and soft switching characteristics, LLC-based AC-DC resonant converters are a great choice for EV chargers. Adding a capacitor across the magnetizing inductance of the LLC resonant architecture (LCLC configuration) enhances efficiency and reduces the need for a larger series inductor. The output DC voltage of the converter is generally regulated using switching frequency control. However, the power factor of the converter varies significantly with the switching frequency. As a result, any fluctuations in load may cause the converter to operate at a lower power factor. This paper proposes a single-stage topology based on the LCLC resonant structure. Zero voltage switching (ZVS) of the IGBTs used in the converter is ensured by the LCLC resonant configuration. Converter have a power factor correction (PFC) stage on the front of the converter to achieve natural power factor correction. Since the PFC stage and the resonant stage are controlled by the same switches, the converter is smaller and less costly. Simulations in MATLAB/Simulink are used to validate the topology. 2023 IEEE. -
One Time Password-Based Two Channel Authentication MechanismUsing Blockchain
Using Fog Nodes, also known as IOT devices are increasing everyday with more and more home automation, industry automation, automobile automation, etc. Security threats for these devices are also increasing. One of the threats is impersonating one fog node, stealing data and taking control of the network which is also known as the Sybil attack. To provide security, most fog devices use one step or two step authentication and sometimes use encryption. With static passwords, there is a chance of compromise by password sharing and leaking. Some weak encryption algorithms used are also compromised. Data about fog nodes in the network is stored in a weak database and is tampered. OTP-based Two Channel Authentication Mechanism (OTPTAM) to authenticate the fog nodes with metadata stored in Blockchain Database and communicate using channels encrypted with Elliptical Ciphers can solve the majority of these problems. Metadata of the nodes like Bluetooth MAC address, network mac address, telephone number are all stored in the blockchain and the OTP is exchanged via these channels to ensure the authenticity of the fog nodes. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Online Education and English Language Learning Among Tribal Students of Kerala
Kerala, a South Indian state has tribal population in all her districts. About 1.5% of the total population of the state constitute tribal population. They depend upon natural environment and resources for their survival. Children from the same community usually depend on government funded schools for their education. Education for this deprived section during COVID 19 Pandemic was a massive exclusion and an uphill task. Digital divide and medium of communication (Standard Malayalam) were some of the critical concerns to knowledge acquisition among tribal children. This paper primarily focuses on the challenges of online education among tribal students with a clear emphasis on the English language acquisition. This study was conducted in four most tribal populated districts of the State, namely, Wayanad, Malappuram, Palakkad, and Idukki. This is a qualitative explorative study that explores the experiences of the tribal students' English language learning challenges from the teachers' perspective in these districts. The Electrochemical Society -
Online Health Information Behavior: A study based on PLS-SEM
In this digital era, internet provides a speedy, economical and convenient platform for seeking information on health. Moreover, the presence of audio visual resources for health and option to get expert opinion directly makes online health information seeking behaviour more adaptable among the health consumers. The major purpose of this study is to investigate the relationship between online health information seeking behaviour and the consequences of post-search. For doing the analysis, Smart PLS2 is used to execute structural equation modelling technique to understand the relationship between variables under study. The results of the study recommend that one's intention to search health information online is a significant predictor of post-search behavior in terms of altering health condition, visiting physician or sharing the same information with others. The present study gives a strong indication to the health care practitioners to understand the mechanism of desires and intentions of a healthcare consumer towards online health information seeking behavior. 2021 IEEE. -
Online Voting System Using Blockchain
One of the major areas in technical development is blockchain and bitcoin. These technologies have enabled many simulations in in-hostile applications that have major issues with security and integrity of data. To provide more relevance to the available cyberphysical systems in the dimension of security, the blockchain technology offers a major help. If the present scenario is considered, we have multiple day-to-day applications that have been simulated and require more security enhancement. For example, the E-voting systems are a trend and their security features have to be upgraded to authenticate both systems and processes. The present research paper focuses on the same application and aims to provide security upgradation by proposing a working model of e-voting systems. 2020, Springer Nature Singapore Pte Ltd. -
Oppositional Glowworm Swarm based Vector Quantization Technique for Image Compression in Fiber Optic Communication
In recent times, fiber optic communication networks have become commonly applied for commercial as well as military applications. Fiber optic networks have gained popularity owing to the high data rate. At the same time, the generation of huge quantity of data at a faster rate poses a major challenge in the storing and transmission process. To resolve this issue, data compression approaches have been presented to reduce the quantity of transmitted data and thereby minimizes bandwidth utilization and memory. Vector quantization (VQ) is a commonly employed image compression technique and Linde Buzo Gray (LBG) is used to construct an optimum codebook to compress images. With this motivation, this paper presents a new oppositional glowworm swarm optimization based LBG (OGSO-LBG) technique for image compression in fiber optic communication. The OGSO algorithm involves the integration of oppositional based learning (OBL) concept into the GSO algorithm to boost its convergence rate. The OGSO-LBG algorithm produces the codebook at a faster rate with minimal computation complexity. In order to highlight the enhanced compression performance of the OGSO-LBG technique, a series of experiments were carried out and the results are examined under different dimensions. 2021 IEEE -
Optical Character Recognition (OCR) based Vehicle's License Plate Recognition System Using Python and OpenCV
License Platform Detection is a computer technology that enables us to identify digital images on the platform automatically. Different operations are covered in this system, such as imaging, number pad locations, alphanumeric character truncation and OCR. The final objective of the system is to construct and create efficient image processing procedures and techniques to position a licensing platter on the Open Computer View Library picture. It was used and implemented the K-NN algorithm and python programming language. The technology can be used in different industries such as security, highway speed detection, lighting violations, manuscript documents, automatic charging system, etc. Auto plate recognition is an integrated technology which identifies the auto licence plate. Auto plate auto recognition. Multiple applications include complex safety systems, public spaces, parking and urban traffic control. Automatic Vehicle License Plate Recognition (AVLPR) has undesirable aspects because of many effects, such as light and speed. This work presents an alternative technique to leverage free software for the implementation of AVLPR systems including Python and the Open Computer Vision (openCV). 2021 IEEE. -
Optical Character Recognition system with Projection Profile based segmentation and Deep Learning Techniques
Optical character recognition is the solution to convert text from printed or scanned documents into editable data. This project is aimed at building a Optical character recognition system that recognizes digital text. A document is first detected using contour-based detection technique without altering the angle of the image and is segmented into lines, once the lines are segmented the words embedded in them are extracted. This segmentation is done using projection profiling method. Characters are then segmented words with vertical projection profiling from the extracted words. These characters are fed into an image recognition model for recognition. The recognition model is CNN based deep learning model. Modified VGG16 architecture is used here to extract maximum features from the images and then classify them. To train the model a dataset is created from a repository of digital character dataset. The dataset consists of images of 153 font variants. 2022 IEEE. -
Optimal allocation algorithm of marketing resources based on improved random forest
Random Forest algorithm is an ensemble learning algorithm that classifies data by combining multiple decision trees. It has a wide range of applications and is not easy to overfit. It has a wide range of applications in medicine, bioinformatics, management and other fields. By studying the Cobb-Douglas sales function, it is found that it can only analyze the static allocation of marketing resources, but cannot describe the dynamic changes. Enterprise marketing resource management runs through the enterprise management from beginning to end. The research on marketing resource management is helpful for enterprises to grasp and control the whole process of marketing resource management from the overall and overall level, and has important theoretical value and reality for enterprise marketing management activities. significance. In the vast majority of enterprises in our country, the size of advertising promotion expenses and the number of salesmen is often determined based on the experience and subjective assumptions of decision makers, so it is difficult to say that they are optimized. This paper starts with determining the optimal advertising budget and the number of salespeople, and conducts applied research on the optimal allocation of marketing resources. 2023 IEEE. -
Optimal Disassembly Sequence Generation Using Tool Information Matrix
Just as the assembly sequence plays an important role in the early part of the product, the disassembly sequence plays an important part in the final stage of the product. The disassembly sequence determines how efficiently the product can be recycled or it can be disassembled for maintenance purposes. In this study, the disassembly sequence is generated using the Tool Information Matrix (TIM) and the contact relations. In this study the feasible sequences are generated using the TIM and contact relations, afterward, the time required is considered as a fitness equation for generating the optimal disassembly sequence. The proposed methodology is applied to 10-part crankshaft assembly to test the performance in generating the optimal disassembly sequences. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Optimal location and parameters of GUPFC for transmission loss minimization using PSO algorithm
Transmission losses are one of the major losses faced by our power system. Reduction of transmission losses will benefit us by saving a large amount of power. The transmission losses can be reduced by placing FACTS devices in the power system. Among all the FACTS devices Unified Power Flow Controller (UPFC) and Generalized Unified Power Flow Controller (GUPFC) are the best. Incorporating the GUPFC in to the power system and placing it to the optimal location and setting its output to optimal values can reduce the transmission losses. This paper explains the way to locate the optimal location of GUPFC and finding the optimal setting using PSO algorithm to reduce the total transmission losses. Voltage variation is taken as the criteria for finding the location and PSO is used for finding the settings of GUPFC. This study is conducted on an IEEE 14-bus system using MATLAB software. 2017 IEEE. -
Optimal locations for PMUs maintaining observability in power systems
Population of Phasor Measurement Units (PMUs) in power systems are increasing day by day as PMUs measure the electrical quantities more accurately with time-stamping. The measurements done by PMU can be used for monitoring, controlling and for state estimation of the power system. Since the installation of PMUs demand high capital cost, their number and location to be chosen optimally is by minimizing investment without losing observability of the system. In this paper Integer Programming techniques used to solve Optimal Placement of PMU (OPP) problem. The OPP problem is solved for normal power system as well as for a few contingency conditions like one PMU outage, considering zero injection bus, outage of single line on various standard IEEE Bus Systems. The work is also trying to place PMUs under planned islanding in certain standard networks. 2016 IEEE. -
Optimal Management of Resources in Cloud Infrastructure through Energy Aware Collaborative Model
As the infrastructures of cloud computing provides paramount services to worldwide users, persistent applications are congregated using large scale data centres at the customer sides. For such wide platforms, virtualization technique has been incorporated for multiplexing the essential sources available. Due to the extensive application variations in the workloads, it is significant to handle the resource allocation methodologies of the virtual machines (VM) for assuring the Quality of Service (QoS) of cloud. On concentrating this, the paper proposed a Decentralized Energy-Aware Collaborative Model (DEACM) for effectively managing the data centres in cloud infrastructures. Initially, the optimal model for system management and power management are declared. Then, functions of workload vectors and data collection about workloads has been carried out for optimal selection of virtual machines to migrate for balancing loads efficiently. This can be further applied for Target-based VM Migration Algorithm for determining the migrating target for VM. Moreover, the algorithm involved in energy utilization with managed QoS. The developed DEACM is evaluated using CloudSim platform and the results are discussed. The results exemplify that the DEACM can balance the workload across variety of machines optimally and provide reduced energy consumption to the complete system efficiently. 2024 IEEE. -
Optimal Shortest Path Routing over Wireless Sensor Networks Using Constrained Genetic Firefly Optimization Algorithm
In Wireless Sensor Networks (WSNs), a large number of sensor nodes are placed over a specific area in any real-life application. The sensor node is small, with limited battery life, memory, and computing capacity. Due to the limited power of the battery, WSNs must expand the system life by minimizing the energy usage. In the existing system, the methods have limitations related to optimal shortest routing path, node energy consumption, network reconfiguration, and so on. In order to overcome these issues, aConstrained Genetic FireFly Optimization Algorithm (CGFFOA) is proposed. The CGFFOA algorithm is designed to select the best shortest path routing through the selection of Cluster Head (CH) nodes based on the better energy utilization, delay, and high throughput sensor nodes. It is used to optimize the routing path based on the energy, hop count, inter and intra cluster delay, and lifetime. The simulation findings therefore conclude that, with regard to reduced energy consumption, higher throughput, and lower end-to-end delay, the proposed CGFFOA algorithm is preferable to existing methods such as Particle Swarm Optimization (PSO) and Dynamic Source Routing (DSR). 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.