Pub Date : 2022-12-16DOI: 10.31645/jisrc.22.20.2.6
R. Iqbal, Rashid Hussain, Sheeraz Arif, A. Siddiqui, Shamim Akhtar
Software-defined networking (SDN) is an emerging technology as a new paradigm for network architecture. It is a revolutionizing technology that facilitates effective management and programmability in a network. With the surge in popularity of SDN, security measures to protect enterprise networks getting more important. In SDN, security methods like firewalls must deal with unpredictable network environments. A firewall is an important part of network security. It can restrict network data traffic flows according to predefined rules. This research paper analyzes the performance of SDN-based firewalls implemented on different layers of the network. Mininet simulation tool is used to create a topology using POX controller and open flow switch. Evaluate data flow by implementing a firewall and without a firewall using transmission control protocol (TCP) and user datagram protocol (UDP). To evaluate the performance of the proposed firewall, some network parameters like bandwidth, roundtrip time, jitter, and packet loss must be analyzed. The outcome proved whether the performance has improved the firewall is implemented or not. In the future, by using the Mininet simulation tool with other external controllers like RYU, Floodlight, NOX, etc., analyze the above-mentioned parameters and make firewall rules for the application layer.
{"title":"Towards Secure Implementations Of SDN Based Firewall","authors":"R. Iqbal, Rashid Hussain, Sheeraz Arif, A. Siddiqui, Shamim Akhtar","doi":"10.31645/jisrc.22.20.2.6","DOIUrl":"https://doi.org/10.31645/jisrc.22.20.2.6","url":null,"abstract":"Software-defined networking (SDN) is an emerging technology as a new paradigm for network architecture. It is a revolutionizing technology that facilitates effective management and programmability in a network. With the surge in popularity of SDN, security measures to protect enterprise networks getting more important. In SDN, security methods like firewalls must deal with unpredictable network environments. A firewall is an important part of network security. It can restrict network data traffic flows according to predefined rules. This research paper analyzes the performance of SDN-based firewalls implemented on different layers of the network. Mininet simulation tool is used to create a topology using POX controller and open flow switch. Evaluate data flow by implementing a firewall and without a firewall using transmission control protocol (TCP) and user datagram protocol (UDP). To evaluate the performance of the proposed firewall, some network parameters like bandwidth, roundtrip time, jitter, and packet loss must be analyzed. The outcome proved whether the performance has improved the firewall is implemented or not. In the future, by using the Mininet simulation tool with other external controllers like RYU, Floodlight, NOX, etc., analyze the above-mentioned parameters and make firewall rules for the application layer.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121636241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-16DOI: 10.31645/jisrc.22.20.2.4
M. Tanweer, M. H. Tanveer, Asif A Mayo, Qurat-ul Ain, Jawwad Ahmed
Facial expression plays an important role in conveying the non-verbal cues of any person. Recognizing the facial expression is reffered to as the identification of emotional state. In this research, a real-time detection of emotions has been performed by training the model into different data sets and then emotional state of a person is displayed. The aim of the project is to recognize human emotions in real-time which are based on their facial expressions. Human sentiments play an important role in every one’s life which has increased the interaction between human and machine and has taken the focus of scientist to fill this gap between Human Machine Interaction (HMI). Tremendous work has been done in recognizing emotions using facial expression but little work is done on recognizing eight emotions in real-time. For this purpose, a real-time system to judge eight emotions using facial expression hsa been designed. Further, the performance of the proposed method is evaluated by using trained database using Convolution Neural Network (CNN) and Support vector machines (SVM). Experimental results and prototype show the accuracy of detected emotions in realtime. We contributed our part to recognize human emotions in Real-time and increased the accuracy for CNN algorithm. A comparative study has also been done in which SVM and CNN are compared for emotion recognition in real-time. The study is concluded which results in recognition of eight universal emotions; neutral, happy, sad, anger, disturbed, fear, surprised, nervous in real time by the proposed system.
{"title":"Real-Time Intelligent Facial Expression Recognition System","authors":"M. Tanweer, M. H. Tanveer, Asif A Mayo, Qurat-ul Ain, Jawwad Ahmed","doi":"10.31645/jisrc.22.20.2.4","DOIUrl":"https://doi.org/10.31645/jisrc.22.20.2.4","url":null,"abstract":"Facial expression plays an important role in conveying the non-verbal cues of any person. Recognizing the facial expression is reffered to as the identification of emotional state. In this research, a real-time detection of emotions has been performed by training the model into different data sets and then emotional state of a person is displayed. The aim of the project is to recognize human emotions in real-time which are based on their facial expressions. Human sentiments play an important role in every one’s life which has increased the interaction between human and machine and has taken the focus of scientist to fill this gap between Human Machine Interaction (HMI). Tremendous work has been done in recognizing emotions using facial expression but little work is done on recognizing eight emotions in real-time. For this purpose, a real-time system to judge eight emotions using facial expression hsa been designed. Further, the performance of the proposed method is evaluated by using trained database using Convolution Neural Network (CNN) and Support vector machines (SVM). Experimental results and prototype show the accuracy of detected emotions in realtime. We contributed our part to recognize human emotions in Real-time and increased the accuracy for CNN algorithm. A comparative study has also been done in which SVM and CNN are compared for emotion recognition in real-time. The study is concluded which results in recognition of eight universal emotions; neutral, happy, sad, anger, disturbed, fear, surprised, nervous in real time by the proposed system.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131263463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-16DOI: 10.31645/jisrc.22.20.2.10
Muhammad Muzammil Ghayas, Sana Hussain, Ahmad Hussain, N. Islam
This study explores the critical success factors of ERP implementation in the manufacturing sector of Karachi. Data were collected from 252 such employees of the manufacturing sector of Karachi who have been using ERP solutions for the time duration of at least one year. Exploratory Factor Analysis and Multiple Regression Analysis were used. The results of the factor analysis indicate the presence of four factors. Three of these factors, namely Data Quality (DQ), System Quality (SQ), and Consultant Support (CS) were the critical success factors, whereas, the fourth was the dependent variable i.e. successful ERP Implementation or ERP Success. Once the factors were extracted, the reliability was tested, and then the CFA was used to test the convergent and discriminant validity of the instrument. Multiple Regression Analysis was then applied to determine the impact of each factor on successful ERP Implementation or ERP Success. It was found that the Data Quality (DQ), System Quality (SQ) and Consultant Support (CS) have a significant impact on Successful ERP Implementation (henceforth known as ERP Success). Therefore, it is recommended that while implementing the ERP systems, firms must ensure that data accuracy while they are entering the data or providing the data to the vendor/consultant. It is also recommended that the firms must be mindful of the system quality and the consultancy services (software support services) provided by the ERP vendor.
{"title":"Critical Success Factors of ERP Implementation: Evidence from Manufacturing Sector of Karachi","authors":"Muhammad Muzammil Ghayas, Sana Hussain, Ahmad Hussain, N. Islam","doi":"10.31645/jisrc.22.20.2.10","DOIUrl":"https://doi.org/10.31645/jisrc.22.20.2.10","url":null,"abstract":"This study explores the critical success factors of ERP implementation in the manufacturing sector of Karachi. Data were collected from 252 such employees of the manufacturing sector of Karachi who have been using ERP solutions for the time duration of at least one year. Exploratory Factor Analysis and Multiple Regression Analysis were used. The results of the factor analysis indicate the presence of four factors. Three of these factors, namely Data Quality (DQ), System Quality (SQ), and Consultant Support (CS) were the critical success factors, whereas, the fourth was the dependent variable i.e. successful ERP Implementation or ERP Success. Once the factors were extracted, the reliability was tested, and then the CFA was used to test the convergent and discriminant validity of the instrument. Multiple Regression Analysis was then applied to determine the impact of each factor on successful ERP Implementation or ERP Success. It was found that the Data Quality (DQ), System Quality (SQ) and Consultant Support (CS) have a significant impact on Successful ERP Implementation (henceforth known as ERP Success). Therefore, it is recommended that while implementing the ERP systems, firms must ensure that data accuracy while they are entering the data or providing the data to the vendor/consultant. It is also recommended that the firms must be mindful of the system quality and the consultancy services (software support services) provided by the ERP vendor.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130777935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-16DOI: 10.31645/jisrc.22.20.2.5
H. Ahmed, Capt. Dr. Sajjad Haider Zaidi, Dr. Farhan Khan
Motors are the main part of the drivetrain of electric vehicles (EVs) as they transfer the power of batteries to the axle and tires. Therefore, the performance of batteries is a great concern as loss of energy, or lower torque/speed can cause a negative impact on the performance of EVs. In this regard, this study aimed to study different motors that are used in EVs. These motors include DC motors (brushed and brushless), permanent magnet motor motors(BLDCs), switched reluctance motors (SRMs), induction motors(IMs), and outer rotor motors. This study has performed a rigorous review of past literature to examine different factors (speed, torque, efficiency, flux linkage) that affect the performance of motors in EVs. The results of the study have found that SRMs are the most efficient and reliable motors for use in EVs as they can perform in different conditions and offer benefits of low cost and high efficiency. The study has noted the performance rating of SRM to be the highest (87), while BLDCs, PMSMs, and IMs, showed a performance rating of 75, 85, and 82 out of 100. However, more research is needed in this area to enhance the performance of the motors through the development of a novel motor design to enhance efficiency and reduce cost.
{"title":"A Comparative Study On Different Motors Used In Electric Vehicles","authors":"H. Ahmed, Capt. Dr. Sajjad Haider Zaidi, Dr. Farhan Khan","doi":"10.31645/jisrc.22.20.2.5","DOIUrl":"https://doi.org/10.31645/jisrc.22.20.2.5","url":null,"abstract":"Motors are the main part of the drivetrain of electric vehicles (EVs) as they transfer the power of batteries to the axle and tires. Therefore, the performance of batteries is a great concern as loss of energy, or lower torque/speed can cause a negative impact on the performance of EVs. In this regard, this study aimed to study different motors that are used in EVs. These motors include DC motors (brushed and brushless), permanent magnet motor motors(BLDCs), switched reluctance motors (SRMs), induction motors(IMs), and outer rotor motors. This study has performed a rigorous review of past literature to examine different factors (speed, torque, efficiency, flux linkage) that affect the performance of motors in EVs. The results of the study have found that SRMs are the most efficient and reliable motors for use in EVs as they can perform in different conditions and offer benefits of low cost and high efficiency. The study has noted the performance rating of SRM to be the highest (87), while BLDCs, PMSMs, and IMs, showed a performance rating of 75, 85, and 82 out of 100. However, more research is needed in this area to enhance the performance of the motors through the development of a novel motor design to enhance efficiency and reduce cost.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122296814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-16DOI: 10.31645/jisrc.22.20.2.3
S. Rehman, Jawwad Ahmad, Anwaar Manzar, M. Moinuddin
Based on the orthogonal multiple access (OMA) paradigm, multiple access techniques are now used in wireless networks. The capacity of OMA for orthogonal resources, which is already constrained, will be exceeded in the coming years by the demand for a significant number of users and efficient spectrum usage. Non-orthogonal multiple access (NOMA) is being considered for the next 5G and beyond releases. NOMA can offer high connection, low latency, and excellent spectral efficiency because several users can be handled in the same resource block at once. This work presents a thorough literature evaluation of the MIMO-NOMA and identifies several research gaps. Additionally, using Monte Carlo simulations, For the MIMO-NOMA heterogeneous network, simulation was performed to analyze the outage probability and ergodic capacity. The MIMO-NOMA HetNets system's performance is further evaluated using various SNR levels, number of clusters, user counts per cluster, and antenna count ratios.
{"title":"Outage Probability And Ergodic Capacity Analysis Of MIMO-NOMA Heterogeneous Network For 5G System","authors":"S. Rehman, Jawwad Ahmad, Anwaar Manzar, M. Moinuddin","doi":"10.31645/jisrc.22.20.2.3","DOIUrl":"https://doi.org/10.31645/jisrc.22.20.2.3","url":null,"abstract":"Based on the orthogonal multiple access (OMA) paradigm, multiple access techniques are now used in wireless networks. The capacity of OMA for orthogonal resources, which is already constrained, will be exceeded in the coming years by the demand for a significant number of users and efficient spectrum usage. Non-orthogonal multiple access (NOMA) is being considered for the next 5G and beyond releases. NOMA can offer high connection, low latency, and excellent spectral efficiency because several users can be handled in the same resource block at once. This work presents a thorough literature evaluation of the MIMO-NOMA and identifies several research gaps. Additionally, using Monte Carlo simulations, For the MIMO-NOMA heterogeneous network, simulation was performed to analyze the outage probability and ergodic capacity. The MIMO-NOMA HetNets system's performance is further evaluated using various SNR levels, number of clusters, user counts per cluster, and antenna count ratios.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126337053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-16DOI: 10.31645/jisrc.22.20.2.2
Huma Jamshed, Ansha Zahid, Rizwan Ul Hassan, Ahmad Hussain, N. Islam
Trustworthy smart contracts is usually challenging due to the multifaceted semantics of essential domain-specific languages and their testability. A vulnerability in smart contracts possibly comprises numerous code-security and may allow an attacker to gain control of a system resulting in financial tribulations. Therefore, it is very essential to design safe and secure smart contracts in blockchain’s immutable environment by applying numerous techniques for assessing flaws before deployment. Application programmers building smart contracts must test their code for vulnerabilities. Security and privacy is top in the list. The objective of this research is to explore: 1) the emerging landscape of smart contracts, 2) identifies the vulnerabilities faced by the developers and 3) What tools are available to address these issues? Our study showed: 1) comprehensive realistic studies in the smart contract security are at present lagging as related to primary studies. 2) 73% of contracts implemented in Solidity had security vulnerabilities. 3) Poor programming technique and 4) Slack programming activity.
{"title":"Survey On Vulnerabilities In Blockchain’s Smart Contracts","authors":"Huma Jamshed, Ansha Zahid, Rizwan Ul Hassan, Ahmad Hussain, N. Islam","doi":"10.31645/jisrc.22.20.2.2","DOIUrl":"https://doi.org/10.31645/jisrc.22.20.2.2","url":null,"abstract":"Trustworthy smart contracts is usually challenging due to the multifaceted semantics of essential domain-specific languages and their testability. A vulnerability in smart contracts possibly comprises numerous code-security and may allow an attacker to gain control of a system resulting in financial tribulations. Therefore, it is very essential to design safe and secure smart contracts in blockchain’s immutable environment by applying numerous techniques for assessing flaws before deployment. Application programmers building smart contracts must test their code for vulnerabilities. Security and privacy is top in the list. The objective of this research is to explore: 1) the emerging landscape of smart contracts, 2) identifies the vulnerabilities faced by the developers and 3) What tools are available to address these issues? Our study showed: 1) comprehensive realistic studies in the smart contract security are at present lagging as related to primary studies. 2) 73% of contracts implemented in Solidity had security vulnerabilities. 3) Poor programming technique and 4) Slack programming activity.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128168830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-16DOI: 10.31645/jisrc.22.20.2.1
Tahira Tariq, Faiza Javaid, Syed Rizwan, Muhammad Zubair, Benish Fayyaz
Blockchain technology presents a promising future for protecting personal data. However, it does pose challenges concerning data security and risk that need to be overcome. This research focuses on investigating these challenges posed by blockchain technology and providing feasible solutions that regulators can take into account when drafting regulations on personal data protection guidelines. The security and privacy-related challenges derived from its progressive maturity, complexity, lack of standardization, and diversity of protocols are superimposed on the demands of a vibrant, competitive environment. It is difficult to align it with the GDPR concerning privacy. There is an urgent need to develop multidisciplinary teams that must ensure its participation from the beginning of the legal/regulatory area, cybersecurity, and company information systems.
{"title":"Challenges In Security And Privacy Posed By Blockchain Technology","authors":"Tahira Tariq, Faiza Javaid, Syed Rizwan, Muhammad Zubair, Benish Fayyaz","doi":"10.31645/jisrc.22.20.2.1","DOIUrl":"https://doi.org/10.31645/jisrc.22.20.2.1","url":null,"abstract":"Blockchain technology presents a promising future for protecting personal data. However, it does pose challenges concerning data security and risk that need to be overcome. This research focuses on investigating these challenges posed by blockchain technology and providing feasible solutions that regulators can take into account when drafting regulations on personal data protection guidelines. The security and privacy-related challenges derived from its progressive maturity, complexity, lack of standardization, and diversity of protocols are superimposed on the demands of a vibrant, competitive environment. It is difficult to align it with the GDPR concerning privacy. There is an urgent need to develop multidisciplinary teams that must ensure its participation from the beginning of the legal/regulatory area, cybersecurity, and company information systems.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128412468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-16DOI: 10.31645/jisrc.22.20.2.7
Fahad Hussain Mirani, Pardeep Kumar, M. S. Memon, M. N. Bhatti, Wanod Kumar
Mobile Ad hoc Networks (MANET) are a collection of mobiles and smart devices that communicate using wireless links. These types of networks are growing at the best speed and being used at a large scale than before ever because of their high availability and mobility. As the usage scale of MANET devices has been increasing, the challenges have also increased for example the proper delivery of data or information to every mobile node. Traditionally, transmission control protocol(TCP) is used for delivery but it does not fit in all scenarios due to some of its limitations such as network congestion and quick recovery in case of link failure. In this, a comparative analysis of TCP is performed with the stream control transmission protocol (SCTP) and a TCP variant called TCP VEGAS. A number of ad hoc Scenarios are proposed with varying numbers of mobile nodes,i.e 11,21, and 31. The results obtained indicate that SCTP outperforms TCP and VEGAS in throughput. The packet lifetime while using SCTP is also small i.e 0.19 seconds. The link utilization of SCTP is better than TCP and VEGAS. However, TCP increases its link utilization than VEGAS for the nodes in MANET of large delay.
{"title":"Comparative Analysis of TCP, TCP-Vegas, and SCTP in Mobile Ad-Hoc Networks","authors":"Fahad Hussain Mirani, Pardeep Kumar, M. S. Memon, M. N. Bhatti, Wanod Kumar","doi":"10.31645/jisrc.22.20.2.7","DOIUrl":"https://doi.org/10.31645/jisrc.22.20.2.7","url":null,"abstract":"Mobile Ad hoc Networks (MANET) are a collection of mobiles and smart devices that communicate using wireless links. These types of networks are growing at the best speed and being used at a large scale than before ever because of their high availability and mobility. As the usage scale of MANET devices has been increasing, the challenges have also increased for example the proper delivery of data or information to every mobile node. Traditionally, transmission control protocol(TCP) is used for delivery but it does not fit in all scenarios due to some of its limitations such as network congestion and quick recovery in case of link failure. In this, a comparative analysis of TCP is performed with the stream control transmission protocol (SCTP) and a TCP variant called TCP VEGAS. A number of ad hoc Scenarios are proposed with varying numbers of mobile nodes,i.e 11,21, and 31. The results obtained indicate that SCTP outperforms TCP and VEGAS in throughput. The packet lifetime while using SCTP is also small i.e 0.19 seconds. The link utilization of SCTP is better than TCP and VEGAS. However, TCP increases its link utilization than VEGAS for the nodes in MANET of large delay.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131726271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-16DOI: 10.31645/jisrc.22.20.2.9
Sulaman Ahmad Naz, M. Tanweer, Azhar Dilshad, M. Sikander
The Job Allocation/Assignment Problem has been a pivot of research for numerous well-known researchers around the world. However, as this problem is considered to be NP-complete, it is still not possible to find a deterministic number of steps that solve the said problem within a polynomial time. In this paradigm, the research community is focused to develop and design algorithms that produce results with minimum computational steps. As a result, without any doubt, there is a great opportunity to examine the effectiveness of previously developed algorithms and compare them with solutions developed by other research scientists. In this paper, we have proposed a new variant of the standard Genetic Algorithm (GA) referred to as the Genetic Algorithm with Mutated-Crossover (GAMC) to solve this problem, implement it and analyze the results. The key point in this approach is to present the idea of Mutated-Crossover to avoid infeasible children generated by the crossover used in standard GA that has provided optimal results with lesser computational steps.
{"title":"Person-Job Allocation Optimization using Genetic Algorithm with Mutated-Crossover (GAMC)","authors":"Sulaman Ahmad Naz, M. Tanweer, Azhar Dilshad, M. Sikander","doi":"10.31645/jisrc.22.20.2.9","DOIUrl":"https://doi.org/10.31645/jisrc.22.20.2.9","url":null,"abstract":"The Job Allocation/Assignment Problem has been a pivot of research for numerous well-known researchers around the world. However, as this problem is considered to be NP-complete, it is still not possible to find a deterministic number of steps that solve the said problem within a polynomial time. In this paradigm, the research community is focused to develop and design algorithms that produce results with minimum computational steps. As a result, without any doubt, there is a great opportunity to examine the effectiveness of previously developed algorithms and compare them with solutions developed by other research scientists. In this paper, we have proposed a new variant of the standard Genetic Algorithm (GA) referred to as the Genetic Algorithm with Mutated-Crossover (GAMC) to solve this problem, implement it and analyze the results. The key point in this approach is to present the idea of Mutated-Crossover to avoid infeasible children generated by the crossover used in standard GA that has provided optimal results with lesser computational steps.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121623618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-16DOI: 10.31645/jisrc.22.20.2.8
Irfan Majeed, M. Noor, M. Memon, Beenish Naveed, M. Shoukat, M. Humayoun
The purpose of this study is to describe the outbreak of a novel coronavirus (COVID-19) and review the computational model, which was based on non-linear ordinary differential equations. The main idea developed was to describe the formulation, integration, and application of mathematical models by using data from China, Austria, Poland, and France. The Logistic Model and its solution Sigmoid Curve, and the SIR Model were used for the determination. After taking the measured data, the total number of cases was predicted, and it was found that the results were obtained in good approximation to the measured results. To predict the number of deaths over time, generalized models were developed in response to COVID-19.
{"title":"A Review of COVID-19 dissemination and its applications through Mathematical Model","authors":"Irfan Majeed, M. Noor, M. Memon, Beenish Naveed, M. Shoukat, M. Humayoun","doi":"10.31645/jisrc.22.20.2.8","DOIUrl":"https://doi.org/10.31645/jisrc.22.20.2.8","url":null,"abstract":"The purpose of this study is to describe the outbreak of a novel coronavirus (COVID-19) and review the computational model, which was based on non-linear ordinary differential equations. The main idea developed was to describe the formulation, integration, and application of mathematical models by using data from China, Austria, Poland, and France. The Logistic Model and its solution Sigmoid Curve, and the SIR Model were used for the determination. After taking the measured data, the total number of cases was predicted, and it was found that the results were obtained in good approximation to the measured results. To predict the number of deaths over time, generalized models were developed in response to COVID-19.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128952706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}