Dr. Sangeeta Kumari

@iitism.ac.in

Mathematics
Indian Institute of Technology (Indian School of Mines) Dhanbad



              

https://researchid.co/sangeeta
47

Scopus Publications

278

Scholar Citations

8

Scholar h-index

8

Scholar i10-index

Scopus Publications


  • Current Sensor Fault Detection and Isolation in Doubly Fed Induction Generator
    S. Anitha Kumari and C. Priya

    IOP Publishing
    Fault Detection and Isolation (FDI) is gaining interest as a means to increase the reliability and availability of efficient systems. Measuring sensors used for data acquisition are more prone to failures. The main objective of this paper is to provide model based FDI for current sensor fault closed-loop controlled Doubly Fed Induction Generator (DFIG) model connected to power grid. The sensor fault was detected and isolated by two methods including Unknown Input Observer (UIO) on reduced order DFIG model and fuzzy logic. The results show improvement in computational speed during online monitoring when the fault isolation is performed on reduced order models.

  • Fault-resilient localization using fuzzy logic and NSGA II-based metaheuristic scheme for UWSNs
    Sangeeta Kumari, Pavan Kumar Mishra, and Veena Anand

    Springer Science and Business Media LLC


  • Exploring the Dynamics of a Malware Propagation Model and Its Control Strategy
    Sangeeta Kumari and Ranjit Kumar Upadhyay

    Springer Science and Business Media LLC




  • Parametric Excitation and Hopf Bifurcation Analysis of a Time Delayed Nonlinear Feedback Oscillator
    Sandip Saha, Gautam Gangopadhyay, Sangeeta Kumari, and Ranjit Kumar Upadhyay

    Springer Science and Business Media LLC
    In this paper, an attempt has been made to understand the parametric excitation of a periodic orbit of nonlinear oscillator which can be a limit cycle, center or a slowly decaying center-type oscillation. For this a delay model is considered with nonlinear feedback oscillator defined in terms of Lienard oscillator description which can give rise to any one of the periodic orbits stated above. We have characterized the resonance and antiresonance behaviour for arbitrary nonlinear system from their stability and bifurcation analyses in reference to the standard delayed van der Pol system. An approximate analytical solution using Krylov–Bogoliubov (K–B) averaging method is utilised to recognize the sub-harmonic resonance and antiresonance, and average energy consumption per cycle. Direction of Hopf bifurcation and stability of the periodic solution bifurcating from the trivial fixed point are carried out using normal form and center manifold theory. The parametric excitation is also thoroughly investigated via bifurcation analysis to find the role of the control parameters like time delay, damping and nonlinear terms.

  • Effects of Two-Temperature, Rotation, Initial Stressed Magnetic Field on Rayleigh Wave in Half-Plane
    Heena Sharma and Sangeeta Kumari

    ASME International
    Abstract In the present paper, we consider the governing equation for generalized thermoelastic media under the effect of magnetic fleld, rotation, initial stress, and two-temperature parameter for Rayleigh wave in half-space. The secular equation of Rayleigh wave is also deduced using surface wave solution, which also satisfy the radiation condition for thermally insulated/isothermal surface. The velocity and amplitude attenuation factor of Rayleigh wave is also computed for a particular material. The effect of two-temperature, rotation, and initial stress parameters on velocity of propagation and amplitude attenuation factor is shown graphically.

  • Integrated Load Balancing and Void Healing Routing with Cuckoo Search Optimization Scheme for Underwater Wireless Sensor Networks
    Sangeeta Kumari, Pavan Kumar Mishra, and Veena Anand

    Springer Science and Business Media LLC
    In underwater wireless sensor networks, routing play a vital role in selecting an optimal path for packet forwarding. In routing scheme, most of the existing work is suffering from both load balancing and void node issue. This is due to the environmental interference, overloaded data, energy depletion, random deployment and mobility of the nodes. However, it causes loss of packet, high energy depletion and bad network quality. We have resolved this issue by implementing load balancing and void healing routing using cuckoo search optimization ( CSO ) scheme. In this scheme, first we placed the parent node and identify their child node within the transmission range in each level of the network. Then, we applied load balancing with priority based packet forwarding to maintain the uneven distribution of the load and reduces the end-to-end delay. Next, void healing routing with CSO scheme is addressed to recover the convex and concave void issue in the network. A novel multi-objective fitness function is also formulated for selecting the optimal number of nodes. In packet routing, each child node is responsible for receiving the packets from their neighbor nodes and transferred to the parent node. After receiving the packets at parent node, autonomous underwater vehicle is used for collecting the relevant packets from each parent node through minimum travelling time and send towards the base station. The performance evaluation of proposed scheme shows better network quality, packet delivery ratio, less energy consumption and delay over the existing solutions.

  • Fault resilient routing based on moth flame optimization scheme for underwater wireless sensor networks
    Sangeeta Kumari, Pavan Kumar Mishra, and Veena Anand

    Springer Science and Business Media LLC
    Fault resilient routing is a typical issue for underwater wireless sensor networks ( $$ UWSNs $$ UWSNs ) due to contact of underwater creatures, mobility of nodes and natural disaster. In the existing studies, most of the researchers introduced routing scheme for routing the packets towards the base station through a cluster head. However, these schemes use static or mobile nodes for deployment, but nodes move from its original position to another position and get stuck in a particular region due to ocean current, natural disaster and environmental interference. Therefore, this leads to high energy depletion, link failure, disjoint path and overloaded data. To resolve this issue, we have proposed fault resilient routing based on moth flame optimization ( $$ MFO $$ MFO ) scheme for transferring the packets towards the base station through autonomous underwater vehicles ( $$ AUVs $$ AUVs ). In this scheme, $$ AUVs $$ AUVs is used instead of cluster head to avoid the reclustering, overloading problem and it also feasible for large scale networks. There may be a disjoint path issue, so we have deployed additional mobile nodes with the help of $$ AUVs $$ AUVs within the network. Further, a novel fitness function is integrated with the $$ MFO $$ MFO scheme to overcome the link failure problem. The proposed scheme is applied to select the best forwarding node for transmitting the packets towards the nearest $$ AUVs $$ AUVs using multi-hop acoustic links. In $$ UWSNs $$ UWSNs , $$ AUVs $$ AUVs is placed to move the packets towards the $$ BS $$ BS from lower level to upper level. Performance evaluation of proposed scheme shows better result in terms of fault resilient, residual energy, network lifetime, packet delivery ratio and convergence rate than the existing scheme under the different network scenario.

  • Developments in theory of thermo elasticity
    M. Singh and S. Kumari

    Union of Researchers of Macedonia

  • Rayleigh wave propagation in two-temperature dual phase lag model with impedance boundary conditions
    S. Sharma, S. Kumari, and M. Singh

    Union of Researchers of Macedonia

  • An Efficient Honey Bee Approach for Load Adjusting in Cloud Environment
    Sangeeta Kumari and Shailendra Singh

    Springer Singapore
    Cloud computing is an Internet-based approach that delivers on-demand processing resources and information to the users in a shared mode. At the serving end, there is a prerequisite of proper scheduling and load adjusting to deal with the enormous measure of data. Our algorithm aims to distribute the equal load on each server in the cloud network and additionally enhances the asset usage. With the proposed approach, the honey bee inspired load adjusting (HBI-LA) method has been used for balancing the load of the virtual machine and schedule the task with respect of their priorities. Because of over-burdening of the task on a machine, there may be a chance of CPU crash. To overcome this problem, aging is applied to gradually enhance the priority of those jobs having longer waiting time as compared to the predefined time. At last, we compared our proposed work with the existing HBB-LB in terms of CPU time, execution time and waiting time. The examination of these three parameters demonstrates that the proposed algorithm requires less CPU time, less execution time and less waiting time than existing algorithm, hence it shows better performance and less energy consumption than the existing one.

  • A delayed e-epidemic SLBS model for computer virus
    Zizhen Zhang, Sangeeta Kumari, and Ranjit Kumar Upadhyay

    Springer Science and Business Media LLC
    Abstract We propose an e-epidemic time-delay Susceptible-Latent-Breaking out-Susceptible ($SLBS$ S L B S ) model to study delay dynamics appearing due to antivirus software, which takes time to clean the viruses from latent and breaking-out computers. We perform nonlinear stability analysis, Hopf bifurcation analysis, and its direction and stability. Numerical simulation results (time series analysis and bifurcation diagram) give useful insights for delay dynamics. We investigate the effect of the control parameters like rate of infection of all the classes and cure rates on the model system. Our results suggest that time delay is responsible for destabilizing the system dynamics. For smooth functionality of a computer system, our results suggest the minimum use of removable storage devices like smart phones, optical discs, memory cards, external hard disk, digital cameras, and so on and use of effective antivirus softwares.

  • Discrete and data packet delays as determinants of switching stability in wireless sensor networks
    Ranjit Kumar Upadhyay and Sangeeta Kumari

    Elsevier BV
    Abstract An attempt has been made to understand the transmission dynamics of malicious signals in wireless sensor networks. An energy efficient e-epidemic model with data packet transmission delay has been considered. Linear stability analysis is performed for all the equilibrium points, whose characteristic equations involve the time delay. Global stability and Hopf bifurcation analyses are carried out for the endemic equilibrium point of the delay system. Attention has been paid to the direction of Hopf bifurcation and the stability of the resulting periodic solutions. Numerical study exhibits double Hopf bifurcation dynamics and it causes stability switching i.e., instability to stability and back to instability or the reverse transition of the solution of the considered system. Finally, numerical simulations provide useful observations for different delays and they show an interesting bifurcation scenario. The impact of the control parameters β and τ on the system dynamics have been investigated. Our results suggest that the data packet delay and discrete delay are responsible for the stability switching and the occurrence of chaotic dynamics respectively. The presence of chaotic dynamics indicates fragile security system of the network. Looking into the simulation results, we have indicated the most effective control measures to control the propagation of malicious signals.

  • Virus dynamics of a distributed attack on a targeted network: Effect of firewall and optimal control
    Sangeeta Kumari, Prerna Singh, and Ranjit Kumar Upadhyay

    Elsevier BV
    Abstract An attempt has been made to understand the virus dynamics of a distributed attack in a targeted network adopting firewall security coefficient and treatment rate. A mathematical model is proposed with two sub-frameworks of attacking and targeted class, which further reduces to non-dimensional model system and investigated along with the analysis of virus propagation control measures. Existence and stability of equilibrium points have been discussed. Using central manifold theory, it has been observed that as R0 passes through unity, transcritical bifurcation occurs. In this work, the firewall security is taken as a media coverage factor and detected that it helps to diminish the virus propagation to some extent. The concept of optimal control theory is introduced as an another measure for controlling the virus proliferation. Numerical experiments are accomplished to justify the analytical findings. Finally, a sensitivity analysis is performed that offer insights into the criticality of parameters in determining the virus dispersion in networks. The inclusion of firewall security eradicates the malicious node propagation in a computer network by lowering the infection level although doesn’t affect the value of R0.


  • Dynamics of an SEIR epidemic model with nonlinear incidence and treatment rates
    Ranjit Kumar Upadhyay, Ashok Kumar Pal, Sangeeta Kumari, and Parimita Roy

    Springer Science and Business Media LLC
    The control of highly contagious diseases is very important today. In this paper, we proposed an SEIR model with Crowley–Martin-type incidence rate and Holling type II and III treatment rates. Dynamics of the spread of infection and its control are performed for both the cases of treatment functions. We have performed the stability and bifurcation analyses of the model system. The sensitivity analysis of all the parameters with respect to the basic reproduction number has been performed. Furthermore, we discussed the optimal control strategy using Pontryagin’s maximum principle and determined the effect of control parameter u on the model dynamics. Moreover, we validate the theoretical results using numerical simulations. Between both the treatment functions, we observe that the implementation of Holling type II treatment is most effective to prevent the spread of diseases. Thus, we conclude that the pervasive effect of treatment not only reduces the basic reproduction number as the control parameter u increases with nonlinear treatment, h(I) but also controls the spread of disease infection among the population.

  • Defect identification in friction stir welding using continuous wavelet transform
    Shilpi Kumari, Rahul Jain, Ujjwal Kumar, Inderjeet Yadav, Nitin Ranjan, Kanchan Kumari, Ram Kumar Kesharwani, Sachin Kumar, Srikanta Pal, Surjya K. Pal,et al.

    Springer Science and Business Media LLC
    The manuscript reports on detection of defect that arises during friction stir welding using continuous wavelet transform (CWT) on force signal. The vertical force during welding undergoes sudden change due to presence of defects. These localized defects are detected accurately with the help of continuous wavelet transform scalogram (CWT coefficients’ gray scale image). Statistical feature of variance is used on scale of 1 of transformed signal to localize the defects. The experiments of welding are conducted on the work piece of AA 1100 with varying tool rotational speed (1000, 2000, 3000 rpm) and transverse velocity (50, 75 and 125 mm/min). The manuscript also presents the comparison of results obtained using discrete wavelet transform and CWT of force signals and shows better localization and determination of degree of defect are possible through CWT analysis.

  • Target Localization Algorithm in a Three-Dimensional Wireless Sensor Networks
    Sangeeta Kumari and Govind P. Gupta

    Springer Singapore
    In a Wireless Sensor Networks, localization techniques are needed to identify the exact position of an event. In this paper, we proposed Fuzzy Inference System (FIS) based target localization algorithm in a three-dimensional wireless sensor networks. In the proposed scheme, distance between anchor and target nodes are calculated by adding correction factor with hop size of an anchor node. The concept of fuzzy logic-based edge weight calculation is introduced to improve the localization accuracy. Simulation result shows that proposed scheme achieves less localization error and better accuracy as compared with existing localization technique.

  • Cuckoo Search Optimization Based Mobile Node Deployment Scheme for Target Coverage Problem in Underwater Wireless Sensor Networks
    Sangeeta Kumari and Govind P. Gupta

    Springer International Publishing
    In underwater wireless sensor networks (UWSNs), mobile node deployment for maximum target coverage is a challenging issue. To solve this issue, we have proposed cuckoo search optimization (CSO) based mobile node (MN) deployment scheme to obtain the optimal coverage ratio in the network. In this scheme, detection probability of MN is used to detect the target point. CSO-based mobile node deployment scheme is applied to find set of best location for the deployment of the MN to obtain maximum target coverage in the network. Performance of the proposed scheme is evaluated and compared with the existing fruit fly-based scheme by varying different parameters such as sensing range, and number of MN. Simulation results confirm the performance of the proposed scheme in terms of coverage ratio and convergence rate.

  • Rotational effect on rayleigh waves in transversely isotropic medium with two temperature in three phase lag model


  • Effect of magnetic field, two-temperature, dual phase lag and initial stress on the rayleigh wave propagation


RECENT SCHOLAR PUBLICATIONS

  • Exploring the dynamics of a malware propagation model and its control strategy
    S Kumari, RK Upadhyay
    Wireless Personal Communications 121 (3), 1945-1978 2021

  • Exploring the behavior of malware propagation on mobile wireless sensor networks: Stability and control analysis
    S Kumari, RK Upadhyay
    Mathematics and Computers in Simulation 190, 246-269 2021

  • Parametric excitation and Hopf bifurcation analysis of a time delayed nonlinear feedback oscillator
    S Saha, G Gangopadhyay, S Kumari, RK Upadhyay
    International Journal of Applied and Computational Mathematics 6, 1-21 2020

  • Exploring the delayed and optimally controlled dynamics of malicious objects in computer network
    S Kumari, RK Upadhyay
    Understanding Cyber Threats and Attacks, 1-258 2020

  • A delayed e-epidemic SLBS model for computer virus
    Z Zhang, S Kumari, RK Upadhyay
    Advances in Difference Equations 414 (doi.org/10.1186/s13662-019-2341-8), 24 2019

  • Dynamics of an SEIR epidemic model with nonlinear incidence and treatment rates
    RK Upadhyay, AK Pal, S Kumari, P Roy
    Nonlinear Dynamics 96, 2351–2368 2019

  • Discrete and data packet delays as determinants of switching stability in wireless sensor networks
    RK Upadhyay, S Kumari
    Applied Mathematical Modelling 72, 513-536 2019

  • Virus dynamics of a distributed attack on a targeted network: Effect of firewall and optimal control
    Sangeeta Kumari, Prerna Singh, Ranjit Kumar Upadhyay
    Communications in Nonlinear Science and Numerical Simulation 73, 74-91 2019

  • Delay dynamics of worm propagation model with non-linear incidence rates in wireless sensor network
    Z Zhang, Y Chu, S Kumari, RK Upadhyay
    Zhejiang University (Science Edition) 46 (2), 168-199 2019

  • Global Stability of Worm Propagation Model with Nonlinear Incidence Rate in Computer Network
    RK Upadhyay, S Kumari
    International Journal of Network Security 20 (3), 515-526 2018

  • Detecting malicious chaotic signals in wireless sensor network
    RK Upadhyay, S Kumari
    Physica A: Statistical Mechanics and its Applications 492, 1129-1152 2018

  • Salton Sea: An Ecosystem in Crisis
    RK Upadhyay, S Kumari, S Kumari, V Rai
    International Journal of Biomathematics 11 (9), 1850114 (30 pages) 2018

  • Bifurcation analysis of an e-epidemic model in wireless sensor network
    RK Upadhyay, S Kumari
    International Journal of Computer Mathematics 95 (9), 1775-1805 2018

  • Modeling the virus dynamics in computer network with SVEIR model and nonlinear incident rate
    RK Upadhyay, S Kumari, AK Misra
    Journal of Applied Mathematics and Computing 54, 485-509 2017

MOST CITED SCHOLAR PUBLICATIONS

  • Modeling the virus dynamics in computer network with SVEIR model and nonlinear incident rate
    RK Upadhyay, S Kumari, AK Misra
    Journal of Applied Mathematics and Computing 54, 485-509 2017
    Citations: 75

  • Dynamics of an SEIR epidemic model with nonlinear incidence and treatment rates
    RK Upadhyay, AK Pal, S Kumari, P Roy
    Nonlinear Dynamics 96, 2351–2368 2019
    Citations: 71

  • Bifurcation analysis of an e-epidemic model in wireless sensor network
    RK Upadhyay, S Kumari
    International Journal of Computer Mathematics 95 (9), 1775-1805 2018
    Citations: 34

  • Exploring the behavior of malware propagation on mobile wireless sensor networks: Stability and control analysis
    S Kumari, RK Upadhyay
    Mathematics and Computers in Simulation 190, 246-269 2021
    Citations: 24

  • A delayed e-epidemic SLBS model for computer virus
    Z Zhang, S Kumari, RK Upadhyay
    Advances in Difference Equations 414 (doi.org/10.1186/s13662-019-2341-8), 24 2019
    Citations: 15

  • Discrete and data packet delays as determinants of switching stability in wireless sensor networks
    RK Upadhyay, S Kumari
    Applied Mathematical Modelling 72, 513-536 2019
    Citations: 15

  • Virus dynamics of a distributed attack on a targeted network: Effect of firewall and optimal control
    Sangeeta Kumari, Prerna Singh, Ranjit Kumar Upadhyay
    Communications in Nonlinear Science and Numerical Simulation 73, 74-91 2019
    Citations: 14

  • Detecting malicious chaotic signals in wireless sensor network
    RK Upadhyay, S Kumari
    Physica A: Statistical Mechanics and its Applications 492, 1129-1152 2018
    Citations: 14

  • Global Stability of Worm Propagation Model with Nonlinear Incidence Rate in Computer Network
    RK Upadhyay, S Kumari
    International Journal of Network Security 20 (3), 515-526 2018
    Citations: 5

  • Salton Sea: An Ecosystem in Crisis
    RK Upadhyay, S Kumari, S Kumari, V Rai
    International Journal of Biomathematics 11 (9), 1850114 (30 pages) 2018
    Citations: 5

  • Exploring the dynamics of a malware propagation model and its control strategy
    S Kumari, RK Upadhyay
    Wireless Personal Communications 121 (3), 1945-1978 2021
    Citations: 4

  • Parametric excitation and Hopf bifurcation analysis of a time delayed nonlinear feedback oscillator
    S Saha, G Gangopadhyay, S Kumari, RK Upadhyay
    International Journal of Applied and Computational Mathematics 6, 1-21 2020
    Citations: 1

  • Delay dynamics of worm propagation model with non-linear incidence rates in wireless sensor network
    Z Zhang, Y Chu, S Kumari, RK Upadhyay
    Zhejiang University (Science Edition) 46 (2), 168-199 2019
    Citations: 1