@iitism.ac.in
Mathematics
Indian Institute of Technology (Indian School of Mines) Dhanbad
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Sangeeta Kumari and Ranjit Kumar Upadhyay
Elsevier BV
S. Anitha Kumari and C. Priya
IOP Publishing
Fault Detection and Isolation (FDI) is gaining interest as a means to increase the reliability and availability of efficient systems. Measuring sensors used for data acquisition are more prone to failures. The main objective of this paper is to provide model based FDI for current sensor fault closed-loop controlled Doubly Fed Induction Generator (DFIG) model connected to power grid. The sensor fault was detected and isolated by two methods including Unknown Input Observer (UIO) on reduced order DFIG model and fuzzy logic. The results show improvement in computational speed during online monitoring when the fault isolation is performed on reduced order models.
Sangeeta Kumari, Pavan Kumar Mishra, and Veena Anand
Springer Science and Business Media LLC
Mandeep Singh, Sangeeta Kumari, and Sonu
IOP Publishing
Sangeeta Kumari and Ranjit Kumar Upadhyay
Springer Science and Business Media LLC
Sangeeta Kumari, Pavan Kumar Mishra, and Veena Anand
Springer Singapore
Sangeeta Kumari, Pavan Kumar Mishra, and Veena Anand
Springer Singapore
Sandip Saha, Gautam Gangopadhyay, Sangeeta Kumari, and Ranjit Kumar Upadhyay
Springer Science and Business Media LLC
In this paper, an attempt has been made to understand the parametric excitation of a periodic orbit of nonlinear oscillator which can be a limit cycle, center or a slowly decaying center-type oscillation. For this a delay model is considered with nonlinear feedback oscillator defined in terms of Lienard oscillator description which can give rise to any one of the periodic orbits stated above. We have characterized the resonance and antiresonance behaviour for arbitrary nonlinear system from their stability and bifurcation analyses in reference to the standard delayed van der Pol system. An approximate analytical solution using Krylov–Bogoliubov (K–B) averaging method is utilised to recognize the sub-harmonic resonance and antiresonance, and average energy consumption per cycle. Direction of Hopf bifurcation and stability of the periodic solution bifurcating from the trivial fixed point are carried out using normal form and center manifold theory. The parametric excitation is also thoroughly investigated via bifurcation analysis to find the role of the control parameters like time delay, damping and nonlinear terms.
Heena Sharma and Sangeeta Kumari
ASME International
Abstract In the present paper, we consider the governing equation for generalized thermoelastic media under the effect of magnetic fleld, rotation, initial stress, and two-temperature parameter for Rayleigh wave in half-space. The secular equation of Rayleigh wave is also deduced using surface wave solution, which also satisfy the radiation condition for thermally insulated/isothermal surface. The velocity and amplitude attenuation factor of Rayleigh wave is also computed for a particular material. The effect of two-temperature, rotation, and initial stress parameters on velocity of propagation and amplitude attenuation factor is shown graphically.
Sangeeta Kumari, Pavan Kumar Mishra, and Veena Anand
Springer Science and Business Media LLC
In underwater wireless sensor networks, routing play a vital role in selecting an optimal path for packet forwarding. In routing scheme, most of the existing work is suffering from both load balancing and void node issue. This is due to the environmental interference, overloaded data, energy depletion, random deployment and mobility of the nodes. However, it causes loss of packet, high energy depletion and bad network quality. We have resolved this issue by implementing load balancing and void healing routing using cuckoo search optimization ( CSO ) scheme. In this scheme, first we placed the parent node and identify their child node within the transmission range in each level of the network. Then, we applied load balancing with priority based packet forwarding to maintain the uneven distribution of the load and reduces the end-to-end delay. Next, void healing routing with CSO scheme is addressed to recover the convex and concave void issue in the network. A novel multi-objective fitness function is also formulated for selecting the optimal number of nodes. In packet routing, each child node is responsible for receiving the packets from their neighbor nodes and transferred to the parent node. After receiving the packets at parent node, autonomous underwater vehicle is used for collecting the relevant packets from each parent node through minimum travelling time and send towards the base station. The performance evaluation of proposed scheme shows better network quality, packet delivery ratio, less energy consumption and delay over the existing solutions.
Sangeeta Kumari, Pavan Kumar Mishra, and Veena Anand
Springer Science and Business Media LLC
Fault resilient routing is a typical issue for underwater wireless sensor networks ( $$ UWSNs $$ UWSNs ) due to contact of underwater creatures, mobility of nodes and natural disaster. In the existing studies, most of the researchers introduced routing scheme for routing the packets towards the base station through a cluster head. However, these schemes use static or mobile nodes for deployment, but nodes move from its original position to another position and get stuck in a particular region due to ocean current, natural disaster and environmental interference. Therefore, this leads to high energy depletion, link failure, disjoint path and overloaded data. To resolve this issue, we have proposed fault resilient routing based on moth flame optimization ( $$ MFO $$ MFO ) scheme for transferring the packets towards the base station through autonomous underwater vehicles ( $$ AUVs $$ AUVs ). In this scheme, $$ AUVs $$ AUVs is used instead of cluster head to avoid the reclustering, overloading problem and it also feasible for large scale networks. There may be a disjoint path issue, so we have deployed additional mobile nodes with the help of $$ AUVs $$ AUVs within the network. Further, a novel fitness function is integrated with the $$ MFO $$ MFO scheme to overcome the link failure problem. The proposed scheme is applied to select the best forwarding node for transmitting the packets towards the nearest $$ AUVs $$ AUVs using multi-hop acoustic links. In $$ UWSNs $$ UWSNs , $$ AUVs $$ AUVs is placed to move the packets towards the $$ BS $$ BS from lower level to upper level. Performance evaluation of proposed scheme shows better result in terms of fault resilient, residual energy, network lifetime, packet delivery ratio and convergence rate than the existing scheme under the different network scenario.
M. Singh and S. Kumari
Union of Researchers of Macedonia
S. Sharma, S. Kumari, and M. Singh
Union of Researchers of Macedonia
Sangeeta Kumari and Shailendra Singh
Springer Singapore
Cloud computing is an Internet-based approach that delivers on-demand processing resources and information to the users in a shared mode. At the serving end, there is a prerequisite of proper scheduling and load adjusting to deal with the enormous measure of data. Our algorithm aims to distribute the equal load on each server in the cloud network and additionally enhances the asset usage. With the proposed approach, the honey bee inspired load adjusting (HBI-LA) method has been used for balancing the load of the virtual machine and schedule the task with respect of their priorities. Because of over-burdening of the task on a machine, there may be a chance of CPU crash. To overcome this problem, aging is applied to gradually enhance the priority of those jobs having longer waiting time as compared to the predefined time. At last, we compared our proposed work with the existing HBB-LB in terms of CPU time, execution time and waiting time. The examination of these three parameters demonstrates that the proposed algorithm requires less CPU time, less execution time and less waiting time than existing algorithm, hence it shows better performance and less energy consumption than the existing one.
Zizhen Zhang, Sangeeta Kumari, and Ranjit Kumar Upadhyay
Springer Science and Business Media LLC
Abstract We propose an e-epidemic time-delay Susceptible-Latent-Breaking out-Susceptible ($SLBS$ S L B S ) model to study delay dynamics appearing due to antivirus software, which takes time to clean the viruses from latent and breaking-out computers. We perform nonlinear stability analysis, Hopf bifurcation analysis, and its direction and stability. Numerical simulation results (time series analysis and bifurcation diagram) give useful insights for delay dynamics. We investigate the effect of the control parameters like rate of infection of all the classes and cure rates on the model system. Our results suggest that time delay is responsible for destabilizing the system dynamics. For smooth functionality of a computer system, our results suggest the minimum use of removable storage devices like smart phones, optical discs, memory cards, external hard disk, digital cameras, and so on and use of effective antivirus softwares.
Ranjit Kumar Upadhyay and Sangeeta Kumari
Elsevier BV
Abstract An attempt has been made to understand the transmission dynamics of malicious signals in wireless sensor networks. An energy efficient e-epidemic model with data packet transmission delay has been considered. Linear stability analysis is performed for all the equilibrium points, whose characteristic equations involve the time delay. Global stability and Hopf bifurcation analyses are carried out for the endemic equilibrium point of the delay system. Attention has been paid to the direction of Hopf bifurcation and the stability of the resulting periodic solutions. Numerical study exhibits double Hopf bifurcation dynamics and it causes stability switching i.e., instability to stability and back to instability or the reverse transition of the solution of the considered system. Finally, numerical simulations provide useful observations for different delays and they show an interesting bifurcation scenario. The impact of the control parameters β and τ on the system dynamics have been investigated. Our results suggest that the data packet delay and discrete delay are responsible for the stability switching and the occurrence of chaotic dynamics respectively. The presence of chaotic dynamics indicates fragile security system of the network. Looking into the simulation results, we have indicated the most effective control measures to control the propagation of malicious signals.
Sangeeta Kumari, Prerna Singh, and Ranjit Kumar Upadhyay
Elsevier BV
Abstract An attempt has been made to understand the virus dynamics of a distributed attack in a targeted network adopting firewall security coefficient and treatment rate. A mathematical model is proposed with two sub-frameworks of attacking and targeted class, which further reduces to non-dimensional model system and investigated along with the analysis of virus propagation control measures. Existence and stability of equilibrium points have been discussed. Using central manifold theory, it has been observed that as R0 passes through unity, transcritical bifurcation occurs. In this work, the firewall security is taken as a media coverage factor and detected that it helps to diminish the virus propagation to some extent. The concept of optimal control theory is introduced as an another measure for controlling the virus proliferation. Numerical experiments are accomplished to justify the analytical findings. Finally, a sensitivity analysis is performed that offer insights into the criticality of parameters in determining the virus dispersion in networks. The inclusion of firewall security eradicates the malicious node propagation in a computer network by lowering the infection level although doesn’t affect the value of R0.
Sangeeta Kumari, Bharti, and Baljeet Singh
ASME International
Ranjit Kumar Upadhyay, Ashok Kumar Pal, Sangeeta Kumari, and Parimita Roy
Springer Science and Business Media LLC
The control of highly contagious diseases is very important today. In this paper, we proposed an SEIR model with Crowley–Martin-type incidence rate and Holling type II and III treatment rates. Dynamics of the spread of infection and its control are performed for both the cases of treatment functions. We have performed the stability and bifurcation analyses of the model system. The sensitivity analysis of all the parameters with respect to the basic reproduction number has been performed. Furthermore, we discussed the optimal control strategy using Pontryagin’s maximum principle and determined the effect of control parameter u on the model dynamics. Moreover, we validate the theoretical results using numerical simulations. Between both the treatment functions, we observe that the implementation of Holling type II treatment is most effective to prevent the spread of diseases. Thus, we conclude that the pervasive effect of treatment not only reduces the basic reproduction number as the control parameter u increases with nonlinear treatment, h(I) but also controls the spread of disease infection among the population.
Shilpi Kumari, Rahul Jain, Ujjwal Kumar, Inderjeet Yadav, Nitin Ranjan, Kanchan Kumari, Ram Kumar Kesharwani, Sachin Kumar, Srikanta Pal, Surjya K. Pal,et al.
Springer Science and Business Media LLC
The manuscript reports on detection of defect that arises during friction stir welding using continuous wavelet transform (CWT) on force signal. The vertical force during welding undergoes sudden change due to presence of defects. These localized defects are detected accurately with the help of continuous wavelet transform scalogram (CWT coefficients’ gray scale image). Statistical feature of variance is used on scale of 1 of transformed signal to localize the defects. The experiments of welding are conducted on the work piece of AA 1100 with varying tool rotational speed (1000, 2000, 3000 rpm) and transverse velocity (50, 75 and 125 mm/min). The manuscript also presents the comparison of results obtained using discrete wavelet transform and CWT of force signals and shows better localization and determination of degree of defect are possible through CWT analysis.
Sangeeta Kumari and Govind P. Gupta
Springer Singapore
In a Wireless Sensor Networks, localization techniques are needed to identify the exact position of an event. In this paper, we proposed Fuzzy Inference System (FIS) based target localization algorithm in a three-dimensional wireless sensor networks. In the proposed scheme, distance between anchor and target nodes are calculated by adding correction factor with hop size of an anchor node. The concept of fuzzy logic-based edge weight calculation is introduced to improve the localization accuracy. Simulation result shows that proposed scheme achieves less localization error and better accuracy as compared with existing localization technique.
Sangeeta Kumari and Govind P. Gupta
Springer International Publishing
In underwater wireless sensor networks (UWSNs), mobile node deployment for maximum target coverage is a challenging issue. To solve this issue, we have proposed cuckoo search optimization (CSO) based mobile node (MN) deployment scheme to obtain the optimal coverage ratio in the network. In this scheme, detection probability of MN is used to detect the target point. CSO-based mobile node deployment scheme is applied to find set of best location for the deployment of the MN to obtain maximum target coverage in the network. Performance of the proposed scheme is evaluated and compared with the existing fruit fly-based scheme by varying different parameters such as sensing range, and number of MN. Simulation results confirm the performance of the proposed scheme in terms of coverage ratio and convergence rate.