Pub Date : 2023-04-01DOI: 10.33889/ijmems.2023.8.2.014
Sagnik Pal, R. Selvanambi, Preeti Malik, Marimuthu Karuppiah
In cryptography, Block ciphers use S-Boxes to perform substitution and permutation operations on a data block. S-Boxes provide non-linearity and confusion of bits to the cryptographic algorithms. In addition, secret keys are critical security aspects for encrypting and decrypting messages. The uncertainty and randomness of the secret key and S-boxes used in the algorithm determine the extent of security against any cryptanalysis attack. This paper proposes a new mechanism to dynamically generate a secret key and S-Box each time while sending and receiving the message. These dynamically generated S-Boxes and keys depend on mutually decided security parameters and message transfer history. Furthermore, a new counter-based mechanism is introduced in this paper. These enhancement techniques are applied to the serpent cipher algorithm, and a data transfer simulation is performed to validate the efficacy of the proposed method. We observe that the dynamically generated S-box follows the strict avalanche criteria. We further validate that the encrypted message shows higher sensitivity to the S-box and the secret key in enhanced serpent cipher than the original version. However, to validate our proposed method, we test and analyze the improvements in the Serpent Cipher Algorithm.
{"title":"A Chaotic System and Count Tracking Mechanism-based Dynamic S-Box and Secret Key Generation","authors":"Sagnik Pal, R. Selvanambi, Preeti Malik, Marimuthu Karuppiah","doi":"10.33889/ijmems.2023.8.2.014","DOIUrl":"https://doi.org/10.33889/ijmems.2023.8.2.014","url":null,"abstract":"In cryptography, Block ciphers use S-Boxes to perform substitution and permutation operations on a data block. S-Boxes provide non-linearity and confusion of bits to the cryptographic algorithms. In addition, secret keys are critical security aspects for encrypting and decrypting messages. The uncertainty and randomness of the secret key and S-boxes used in the algorithm determine the extent of security against any cryptanalysis attack. This paper proposes a new mechanism to dynamically generate a secret key and S-Box each time while sending and receiving the message. These dynamically generated S-Boxes and keys depend on mutually decided security parameters and message transfer history. Furthermore, a new counter-based mechanism is introduced in this paper. These enhancement techniques are applied to the serpent cipher algorithm, and a data transfer simulation is performed to validate the efficacy of the proposed method. We observe that the dynamically generated S-box follows the strict avalanche criteria. We further validate that the encrypted message shows higher sensitivity to the S-box and the secret key in enhanced serpent cipher than the original version. However, to validate our proposed method, we test and analyze the improvements in the Serpent Cipher Algorithm.","PeriodicalId":44185,"journal":{"name":"International Journal of Mathematical Engineering and Management Sciences","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43932536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-01DOI: 10.33889/ijmems.2023.8.2.017
Pushpa Rani, D. Verma, Gyander Ghangas
The aim of the present work is to model and analyze stresses around rounded rectangular inclusion enclosed with functionally graded material (FGM) layer. The inclusion has been considered in an infinite plate which is subjected to far-field tensile stress. The extended finite element method (XFEM) has been used to model the inclusion with non-conformal mesh. The level set functions of circular and rectangular shapes have been used to trace the inclusion boundary with mesh. The FGM has been considered as continuous varying mixture of inclusion and plate materials with power law function along normal direction to the inclusion interface. Young's modulus has been assumed to vary within FGM layer, whereas Poisson's ratio is kept constant. The stress distribution and stress concentration factor (SCF) have been analyzed for different geometrical and FGM parameters. It has been observed that XFEM with level set method efficiently model the difficult shape inclusions such as rounded rectangle. Applying the FGM layer smoothens the stress distribution around rounded rectangular inclusion and significantly reduces SCF. The position of maximum stress shifted from the inclusion interface toward the FGM layer interface. The least SCF has been noted with power law index n = 0.5 and FGM layer thickness t = r.
{"title":"Modeling and Stress Analysis of Rounded Rectangular Inclusion Enclosed by FGM Layer","authors":"Pushpa Rani, D. Verma, Gyander Ghangas","doi":"10.33889/ijmems.2023.8.2.017","DOIUrl":"https://doi.org/10.33889/ijmems.2023.8.2.017","url":null,"abstract":"The aim of the present work is to model and analyze stresses around rounded rectangular inclusion enclosed with functionally graded material (FGM) layer. The inclusion has been considered in an infinite plate which is subjected to far-field tensile stress. The extended finite element method (XFEM) has been used to model the inclusion with non-conformal mesh. The level set functions of circular and rectangular shapes have been used to trace the inclusion boundary with mesh. The FGM has been considered as continuous varying mixture of inclusion and plate materials with power law function along normal direction to the inclusion interface. Young's modulus has been assumed to vary within FGM layer, whereas Poisson's ratio is kept constant. The stress distribution and stress concentration factor (SCF) have been analyzed for different geometrical and FGM parameters. It has been observed that XFEM with level set method efficiently model the difficult shape inclusions such as rounded rectangle. Applying the FGM layer smoothens the stress distribution around rounded rectangular inclusion and significantly reduces SCF. The position of maximum stress shifted from the inclusion interface toward the FGM layer interface. The least SCF has been noted with power law index n = 0.5 and FGM layer thickness t = r.","PeriodicalId":44185,"journal":{"name":"International Journal of Mathematical Engineering and Management Sciences","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42345163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-01DOI: 10.33889/ijmems.2023.8.2.020
D. Rastogi, P. Johri, Varun Tiwari
Adults and children alike are at risk from brain tumors. Accurate and prompt detection, on the other hand, can save lives. This research focuses on the identification and localization of brain tumors. Many research has been available on the analysis and classification of brain tumors, but only a few have addressed the issue of feature engineering. To address the difficulties of manual diagnostics and traditional feature-engineering procedures, new methods are required. To reliably segment and identify brain tumors, an automated diagnostic method is required. While progress is being made, automated brain tumor diagnosis still confront hurdles such as low accuracy and a high rate of false-positive outcomes. Deep learning is used to analyse brain tumors in the model described in this work, which improves classification and segmentation. Using Inception-V3 and RESUNET, deep learning is pragmatic for tumor classification and segmentation. On the Inception V3 model, add one extra layer as a head for classifying. The outcomes of these procedures are compared to those of existing methods. The test accuracy of the Inception-V3 with extra classification layer model is 0.9996, while the loss value is 0.0025. The model tversky value for localization and detection is 0.9688, while the model accuracy is 0.9700.
{"title":"Brain Tumor Detection and Localization: An Inception V3 - Based Classification Followed By RESUNET-Based Segmentation Approach","authors":"D. Rastogi, P. Johri, Varun Tiwari","doi":"10.33889/ijmems.2023.8.2.020","DOIUrl":"https://doi.org/10.33889/ijmems.2023.8.2.020","url":null,"abstract":"Adults and children alike are at risk from brain tumors. Accurate and prompt detection, on the other hand, can save lives. This research focuses on the identification and localization of brain tumors. Many research has been available on the analysis and classification of brain tumors, but only a few have addressed the issue of feature engineering. To address the difficulties of manual diagnostics and traditional feature-engineering procedures, new methods are required. To reliably segment and identify brain tumors, an automated diagnostic method is required. While progress is being made, automated brain tumor diagnosis still confront hurdles such as low accuracy and a high rate of false-positive outcomes. Deep learning is used to analyse brain tumors in the model described in this work, which improves classification and segmentation. Using Inception-V3 and RESUNET, deep learning is pragmatic for tumor classification and segmentation. On the Inception V3 model, add one extra layer as a head for classifying. The outcomes of these procedures are compared to those of existing methods. The test accuracy of the Inception-V3 with extra classification layer model is 0.9996, while the loss value is 0.0025. The model tversky value for localization and detection is 0.9688, while the model accuracy is 0.9700.","PeriodicalId":44185,"journal":{"name":"International Journal of Mathematical Engineering and Management Sciences","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48430052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-01DOI: 10.33889/ijmems.2023.8.2.012
Saureng Kumar, S. Sharma, Ramendra Kumar
Pedestrian safety has become a critical consideration in developing society especially road traffic, an intelligent transportation need of the hour is the solution left. India tops the world with 11% of global road accidents. With this data, we have moved in the direction of computer vision applications for efficient and accurate pedestrian detection for intelligent transportation systems (ITS). The important application of this research is robot development, traffic management and control, unmanned vehicle driving (UVD), intelligent monitoring and surveillance system, and automatic pedestrian detection system. Much research has focused on pedestrian detection, but sustainable solution-driven research must still be required to overcome road accidents. We have proposed a wireless sensor network-based pedestrian detection system that classifies the real-time set of pedestrian activity and samples the reciprocally received signal strength (RSS) from the sensor node. We applied a histogram of oriented gradient (HOG) descriptor algorithm K-nearest neighbor, decision tree and linear support vector machine to measure the performance and prediction of the target. Also, these algorithms have performed a comparative analysis under different aspects. The linear support vector machine algorithm was trained with 481 samples. The performance achieves the accuracy of 98.90%and has accomplished superior results with a maximum precision of 0.99, recall of 0.98, and F-score of 0.95 with 2% error rate. The model’s prediction indicates that it can be used in the intelligent transportation system. Finally, the limitation and the challenges discussed to provide an outlook for future research direction to perform effective pedestrian detection.
{"title":"Wireless Sensor Network Based Real-Time Pedestrian Detection and Classification for Intelligent Transportation System","authors":"Saureng Kumar, S. Sharma, Ramendra Kumar","doi":"10.33889/ijmems.2023.8.2.012","DOIUrl":"https://doi.org/10.33889/ijmems.2023.8.2.012","url":null,"abstract":"Pedestrian safety has become a critical consideration in developing society especially road traffic, an intelligent transportation need of the hour is the solution left. India tops the world with 11% of global road accidents. With this data, we have moved in the direction of computer vision applications for efficient and accurate pedestrian detection for intelligent transportation systems (ITS). The important application of this research is robot development, traffic management and control, unmanned vehicle driving (UVD), intelligent monitoring and surveillance system, and automatic pedestrian detection system. Much research has focused on pedestrian detection, but sustainable solution-driven research must still be required to overcome road accidents. We have proposed a wireless sensor network-based pedestrian detection system that classifies the real-time set of pedestrian activity and samples the reciprocally received signal strength (RSS) from the sensor node. We applied a histogram of oriented gradient (HOG) descriptor algorithm K-nearest neighbor, decision tree and linear support vector machine to measure the performance and prediction of the target. Also, these algorithms have performed a comparative analysis under different aspects. The linear support vector machine algorithm was trained with 481 samples. The performance achieves the accuracy of 98.90%and has accomplished superior results with a maximum precision of 0.99, recall of 0.98, and F-score of 0.95 with 2% error rate. The model’s prediction indicates that it can be used in the intelligent transportation system. Finally, the limitation and the challenges discussed to provide an outlook for future research direction to perform effective pedestrian detection.","PeriodicalId":44185,"journal":{"name":"International Journal of Mathematical Engineering and Management Sciences","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41920741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-01DOI: 10.33889/ijmems.2023.8.2.016
Devendra Rawat, M. Gupta, Abhinav Sharma
Robotic manipulators are extremely nonlinear complex and, uncertain systems. They have multi-input multi-output (MIMO) dynamics, which makes controlling manipulators difficult. Robotic manipulators have wide applications in many industries like processes, medicine, and space. Effective control of these manipulators is extremely important to perform these industrial tasks. Researchers are working on the control of robotic manipulators using conventional and intelligent control methods. Conventional control methods are proportional integral and derivative (PID), Fractional order proportional integral and derivative (FOPID), sliding mode control (SMC), and optimal & robust control while intelligent control method includes Artificial Neural network (ANN), Fuzzy logic control (FLC) and metaheuristic optimization algorithms based control schemes. This paper presents the trajectory control of a robotic manipulator using a PID controller. Four different meta-heuristic algorithms namely Sooty tern optimization (STO), Spotted Hyena optimizer (SHO), Atom Search optimization (ASO), and Arithmetic Optimization algorithm (AOA) are used to optimize the gains of PID controller for trajectory control of a two-link robotic manipulator and a novel hybrid sooty tern and particle swarm optimization (STOPSO) has been designed. These optimization techniques are nature-inspired algorithms that give the optimal gain values while minimizing the performance indices. A performance index comprising Integral time absolute error (ITAE) having weights for both links has been considered to achieve the desired trajectory. These optimization techniques are stochastic in nature so statistical analysis and Freidman’s ranking test has been performed to evaluate the effectiveness of these algorithms. The proposed hybrid STOPSO provided a fitness value of 0.04541 and showed a standard deviation of 0.0002. A comparative study of these optimization techniques is presented and as a result, hybrid STOPSO provides the best results with minimum fitness value followed by STO, AOA, ASO, and SHO algorithms.
{"title":"Trajectory Control of Robotic Manipulator using Metaheuristic Algorithms","authors":"Devendra Rawat, M. Gupta, Abhinav Sharma","doi":"10.33889/ijmems.2023.8.2.016","DOIUrl":"https://doi.org/10.33889/ijmems.2023.8.2.016","url":null,"abstract":"Robotic manipulators are extremely nonlinear complex and, uncertain systems. They have multi-input multi-output (MIMO) dynamics, which makes controlling manipulators difficult. Robotic manipulators have wide applications in many industries like processes, medicine, and space. Effective control of these manipulators is extremely important to perform these industrial tasks. Researchers are working on the control of robotic manipulators using conventional and intelligent control methods. Conventional control methods are proportional integral and derivative (PID), Fractional order proportional integral and derivative (FOPID), sliding mode control (SMC), and optimal & robust control while intelligent control method includes Artificial Neural network (ANN), Fuzzy logic control (FLC) and metaheuristic optimization algorithms based control schemes. This paper presents the trajectory control of a robotic manipulator using a PID controller. Four different meta-heuristic algorithms namely Sooty tern optimization (STO), Spotted Hyena optimizer (SHO), Atom Search optimization (ASO), and Arithmetic Optimization algorithm (AOA) are used to optimize the gains of PID controller for trajectory control of a two-link robotic manipulator and a novel hybrid sooty tern and particle swarm optimization (STOPSO) has been designed. These optimization techniques are nature-inspired algorithms that give the optimal gain values while minimizing the performance indices. A performance index comprising Integral time absolute error (ITAE) having weights for both links has been considered to achieve the desired trajectory. These optimization techniques are stochastic in nature so statistical analysis and Freidman’s ranking test has been performed to evaluate the effectiveness of these algorithms. The proposed hybrid STOPSO provided a fitness value of 0.04541 and showed a standard deviation of 0.0002. A comparative study of these optimization techniques is presented and as a result, hybrid STOPSO provides the best results with minimum fitness value followed by STO, AOA, ASO, and SHO algorithms.","PeriodicalId":44185,"journal":{"name":"International Journal of Mathematical Engineering and Management Sciences","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47306149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-01DOI: 10.33889/ijmems.2023.8.2.011
Yong Yang, Yawen Zhu, Hongyan Dui
The phased-mission reliability of unmanned aerial vehicle (UAV) swarm refers to its capability to successfully complete the missions of each phase under specified conditions for a specified period. In order to study the reliability of phased-mission in UAV swarm, this paper firstly studies the reliability of a single UAV under fault coverage. Then, considering the mission characteristics of UAV swarm, the consecutive k-out-of-n system is studied to model and predict the reliability of UAV swarm phase mission. Some importance measures are introduced to analyze the influence of UAV in different positions on the reliability of the whole system. Finally, numerical examples of linear and circular UAV swarms are given to demonstrate and verify the correctness of the model. The reliability modeling established in this paper can predict the phased-mission reliability of UAV swarm scientifically.
{"title":"Phased-Mission Reliability and Importance Measure Analysis for Linear and Circular UAV Swarms","authors":"Yong Yang, Yawen Zhu, Hongyan Dui","doi":"10.33889/ijmems.2023.8.2.011","DOIUrl":"https://doi.org/10.33889/ijmems.2023.8.2.011","url":null,"abstract":"The phased-mission reliability of unmanned aerial vehicle (UAV) swarm refers to its capability to successfully complete the missions of each phase under specified conditions for a specified period. In order to study the reliability of phased-mission in UAV swarm, this paper firstly studies the reliability of a single UAV under fault coverage. Then, considering the mission characteristics of UAV swarm, the consecutive k-out-of-n system is studied to model and predict the reliability of UAV swarm phase mission. Some importance measures are introduced to analyze the influence of UAV in different positions on the reliability of the whole system. Finally, numerical examples of linear and circular UAV swarms are given to demonstrate and verify the correctness of the model. The reliability modeling established in this paper can predict the phased-mission reliability of UAV swarm scientifically.","PeriodicalId":44185,"journal":{"name":"International Journal of Mathematical Engineering and Management Sciences","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43756976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-01DOI: 10.33889/ijmems.2023.8.2.019
Rubina Mittal, Amna Obaid
The frequency of catastrophic natural disasters is rising, and much emphasis is being given to the Humanitarian Supply chain (HSC). The main goal of relief efforts is to get enough emergency supplies to the area hit by the disaster as quickly as possible. The decision of where to locate warehouses that will store relief supplies presents a significant obstacle for humanitarian relief organizations as they work to enhance their capacity for providing aid and their rescue plan. A non-optimal location could make the search and rescue efforts harder. More importantly, it has been seen that when these kinds of geographical sites are evaluated, social and environmental issues are not considered. This research paper aims to make humanitarian networks more accountable by determining the ideal warehouse site and considering both traditional and sustainable factors. A framework for selecting warehouses to keep relief goods was devised using the Multi-Criteria Decision Making (MCDM) approach. Best-Worst and TOPSIS (“Technique for Order Performance by Similarity to the Ideal Solution”) methods were used to rank the potential locations based on Cost, Logistics, Environmental, and Social Criteria. A research study has been done in the State of West Bengal (District Arambagh).
{"title":"Sustainable Warehouse Location Selection in Humanitarian Supply Chain: Multi-Criteria Decision-Making Approach","authors":"Rubina Mittal, Amna Obaid","doi":"10.33889/ijmems.2023.8.2.019","DOIUrl":"https://doi.org/10.33889/ijmems.2023.8.2.019","url":null,"abstract":"The frequency of catastrophic natural disasters is rising, and much emphasis is being given to the Humanitarian Supply chain (HSC). The main goal of relief efforts is to get enough emergency supplies to the area hit by the disaster as quickly as possible. The decision of where to locate warehouses that will store relief supplies presents a significant obstacle for humanitarian relief organizations as they work to enhance their capacity for providing aid and their rescue plan. A non-optimal location could make the search and rescue efforts harder. More importantly, it has been seen that when these kinds of geographical sites are evaluated, social and environmental issues are not considered. This research paper aims to make humanitarian networks more accountable by determining the ideal warehouse site and considering both traditional and sustainable factors. A framework for selecting warehouses to keep relief goods was devised using the Multi-Criteria Decision Making (MCDM) approach. Best-Worst and TOPSIS (“Technique for Order Performance by Similarity to the Ideal Solution”) methods were used to rank the potential locations based on Cost, Logistics, Environmental, and Social Criteria. A research study has been done in the State of West Bengal (District Arambagh).","PeriodicalId":44185,"journal":{"name":"International Journal of Mathematical Engineering and Management Sciences","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42923749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-01DOI: 10.33889/ijmems.2023.8.2.018
A. Verma, Ankur Choudhary, S. Tiwari
Software Industry is evolving at a very fast pace since last two decades. Many software developments, testing and test case generation approaches have evolved in last two decades to deliver quality products and services. Testing plays a vital role to ensure the quality and reliability of software products. In this paper authors attempted to conduct a systematic study of testing tools and techniques. Six most popular e-resources called IEEE, Springer, Association for Computing Machinery (ACM), Elsevier, Wiley and Google Scholar to download 738 manuscripts out of which 125 were selected to conduct the study. Out of 125 manuscripts selected, a good number approx. 79% are from reputed journals and around 21% are from good conference of repute. Testing tools discussed in this paper have broadly been divided into five different categories: open source, academic and research, commercial, academic and open source, and commercial & open source. The paper also discusses several benchmarked datasets viz. Evosuite 10, SF100 Corpus, Defects4J repository, Neo4j, JSON, Mocha JS, and Node JS to name a few. Aim of this paper is to make the researchers aware of the various test case generation tools and techniques introduced in the last 11 years with their salient features.
{"title":"Software Test Case Generation Tools and Techniques: A Review","authors":"A. Verma, Ankur Choudhary, S. Tiwari","doi":"10.33889/ijmems.2023.8.2.018","DOIUrl":"https://doi.org/10.33889/ijmems.2023.8.2.018","url":null,"abstract":"Software Industry is evolving at a very fast pace since last two decades. Many software developments, testing and test case generation approaches have evolved in last two decades to deliver quality products and services. Testing plays a vital role to ensure the quality and reliability of software products. In this paper authors attempted to conduct a systematic study of testing tools and techniques. Six most popular e-resources called IEEE, Springer, Association for Computing Machinery (ACM), Elsevier, Wiley and Google Scholar to download 738 manuscripts out of which 125 were selected to conduct the study. Out of 125 manuscripts selected, a good number approx. 79% are from reputed journals and around 21% are from good conference of repute. Testing tools discussed in this paper have broadly been divided into five different categories: open source, academic and research, commercial, academic and open source, and commercial & open source. The paper also discusses several benchmarked datasets viz. Evosuite 10, SF100 Corpus, Defects4J repository, Neo4j, JSON, Mocha JS, and Node JS to name a few. Aim of this paper is to make the researchers aware of the various test case generation tools and techniques introduced in the last 11 years with their salient features.","PeriodicalId":44185,"journal":{"name":"International Journal of Mathematical Engineering and Management Sciences","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41857958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-01DOI: 10.33889/ijmems.2023.8.1.006
Mukti Tomar, Sunitha Mandava, N. Hemalatha, Veeravalli Ramakoteswara Rao, R. Mandava
Controlling the manipulators in a precise manner is a challenging task. To overcome this difficulty around the world, many researchers have developed various control algorithms but are not providing optimal results. To obtain the optimal results in the current research the authors designed a proportional, integral, and derivative (PID) controller, fuzzy logic controller (FLC), and sliding mode controller (SMC) for a 2-DOF manipulator. The concept of forward and inverse kinematics was initially solved after assigning the D-H parameters for each joint. The purpose of forward or direct kinematics is to obtain the position and orientation of the end effector. Further, the concept of inverse kinematics is used to estimate the joint angles. Later on, the Lagrange-Euler formulation was used to calculate the dynamics of the 2-DOF manipulator, which is required to estimate the torque required for each joint of the robotics arm. The main goal of this research problem is to optimize the angular error between the two successive events. Finally, the developed algorithm is compared with the existing algorithms such as PID and Fuzzy logic controller.
{"title":"Design of PID, FLC and Sliding Mode Controller for 2-DOF Robotic Manipulator: A Comparative Study","authors":"Mukti Tomar, Sunitha Mandava, N. Hemalatha, Veeravalli Ramakoteswara Rao, R. Mandava","doi":"10.33889/ijmems.2023.8.1.006","DOIUrl":"https://doi.org/10.33889/ijmems.2023.8.1.006","url":null,"abstract":"Controlling the manipulators in a precise manner is a challenging task. To overcome this difficulty around the world, many researchers have developed various control algorithms but are not providing optimal results. To obtain the optimal results in the current research the authors designed a proportional, integral, and derivative (PID) controller, fuzzy logic controller (FLC), and sliding mode controller (SMC) for a 2-DOF manipulator. The concept of forward and inverse kinematics was initially solved after assigning the D-H parameters for each joint. The purpose of forward or direct kinematics is to obtain the position and orientation of the end effector. Further, the concept of inverse kinematics is used to estimate the joint angles. Later on, the Lagrange-Euler formulation was used to calculate the dynamics of the 2-DOF manipulator, which is required to estimate the torque required for each joint of the robotics arm. The main goal of this research problem is to optimize the angular error between the two successive events. Finally, the developed algorithm is compared with the existing algorithms such as PID and Fuzzy logic controller.","PeriodicalId":44185,"journal":{"name":"International Journal of Mathematical Engineering and Management Sciences","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47622754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-01DOI: 10.33889/ijmems.2023.8.1.004
L. Zakaria, Wahyu Megarani, Ahmad Faisol, A. Nuryaman, U. Muharramah
Fuzzy numbers have many applications in various mathematical models in both linear and nonlinear forms. In the form of a nonlinear system, fuzzy nonlinear equations can be constructed in the form of matrix equations. Unfortunately, the matrix equations used to solve the problem of dual fully fuzzy nonlinear systems are still relatively few found in the publication of research results. This article attempts to solve a dual fully fuzzy nonlinear equation system involving triangular fuzzy numbers using Broyden’s method. This article provides the pseudocode algorithm and the implementation of the algorithm into the MATLAB program for the iteration process to be carried out quickly and easily. The performance of the given algorithm is the fastest in finding system solutions and provides a minimum error value.
{"title":"Computational Mathematics: Solving Dual Fully Fuzzy Nonlinear Matrix Equations Numerically using Broyden’s Method","authors":"L. Zakaria, Wahyu Megarani, Ahmad Faisol, A. Nuryaman, U. Muharramah","doi":"10.33889/ijmems.2023.8.1.004","DOIUrl":"https://doi.org/10.33889/ijmems.2023.8.1.004","url":null,"abstract":"Fuzzy numbers have many applications in various mathematical models in both linear and nonlinear forms. In the form of a nonlinear system, fuzzy nonlinear equations can be constructed in the form of matrix equations. Unfortunately, the matrix equations used to solve the problem of dual fully fuzzy nonlinear systems are still relatively few found in the publication of research results. This article attempts to solve a dual fully fuzzy nonlinear equation system involving triangular fuzzy numbers using Broyden’s method. This article provides the pseudocode algorithm and the implementation of the algorithm into the MATLAB program for the iteration process to be carried out quickly and easily. The performance of the given algorithm is the fastest in finding system solutions and provides a minimum error value.","PeriodicalId":44185,"journal":{"name":"International Journal of Mathematical Engineering and Management Sciences","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44120762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}