Sei sulla pagina 1di 7

International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

RESEARCH ARTICLE OPEN ACCESS

Condenser Manufacturing System Performance Analysis


Dr. k. Santhi Sree
Jawaharlal Nehru Technological University - Hyderabad

ABSTRACT
The current examination work an endeavor has been made to display the presentation of a condenser fabricating
arrangement of a HVAC plant utilizing Markov demonstrating strategy and furthermore needs the upkeep fix
exercises based on investigation. The framework includes with six sub-frameworks in particular Core Building
Machine (CBM),Fluxing and Brazing machines(FM), Air Leak Testing Machine (ALT),Tungsten Inert Gas Welding
(TIG), Helium Leak Testing Machine(HLT),Foam Pasting Machine(FPM).The different Chapman-Kolmogorov
differential equationshas been determined based on state progress diagram.A diverse blend of fix and
disappointment paces of all subsystems speaks to the accessibility networks. The plot of fix and disappointment
paces of different subsystems with the accessibility stage achieved in accessibility frameworks assesses the
presentation, all things considered. The fix rate chooses the support principle worry of various subsystems of
condenser fabricating frameworks.
Keywords:

I. INTRODUCTION
[41-46]. The administration toward grasps the
The associations are changed reliably by methods for accidents of changes in the fix or disappointment
the movement in the present energetic world. For charges of the parts in a structure are brought about
creation units, the weak chances and various issues, by dependability of the system and since quite a
political, monetary and inventive impacts dynamic while ago run availability model. By extending the
conditions with different changes [1-11]. With higher limit of the framework or giving satisfactory
coefficients in their methodology between the abundance parts obtains with high dependability and
creations ventures present parcel of assembling the extension in the eccentricism of the plan [50-58].
dangers. The work creation and the facilitate
relationship with human life from one perspective II. RELATED WORKS
compensation of moving, further, have aspiring the
business to storm up one of the vital enterprises in Chu et al. [43] presented Multi-Criteria Decision
each region [12-32]. In view of period of time of ease Making (MCDM) with FMEA technique for the
of use, the novel moving developments for extra upgrade of decreasing, examining and choosing
methodology and discernibility of materials are disappointments in ventures. A couple of pros
significant one. This is current undertakings referred to restrictions of FMEA in the set of
examples by the expectation to build up the creation experiences area in any cases. Sivaram et al. [44]
framework sensibility [33-38]. The material creation complained a misshaped Dempster–Shafer measure
has rose starting not on time strikingly. Particularly, toward sum the changed examination data through
the assembling cycle, expansion of farming creation remembering different pros' evaluation decisions,
areas and use of composts are expanding quickly. disappointment way and three introduction issues
The indispensable employment in the freely. The helpful application proposes an improved
accomplishment of any business are nature of understanding diagram. Under an assortment of
products expect, HR, cost and time boundaries. The premise of strange assessment data, this strategy is
business disappointments are provoked with wasteful worked to control the danger primary concern
or disappointments in all of these fields [39, 40]. assessment of the ineffective strategies of an airplane
turbine with rotor bleeding edges finally. This
The substance as of adjusting in abundance of crude procedure yielded better outcomes. Furthermore,
materials anticipating the point in the assembling Gochhayat et al. [45] Subbarayalu et al. [46] and
business that are caused with different risk factors Rosa et al. [47] differentiated the different sort
those dependable achieving basic things, which have exhibitions with transformative techniques.
unsalvageable financial repercussions and force The high significance is to address this issue by
clients' wellbeing for the material creation industry methods for growing urbanization and creating

ISSN: 2347-8578 www.ijcstjournal.org Page 19


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

people. From 60 to 110%, the dependable the execution. Figure 2 clarifies the associating TD of
necessity of a move in fabricate transcendently on the consolidated states emerge.
side of meat and dairy substances to growing
solicitation by Rosa et al. [47]. The lower In assembling condenser framework, the exhibition
employments of unrefined materials are provoked to displaying and accessibility investigation are the
limit the production misfortunes in the automated significant goal of this work. This framework has six
business. Espada et al. [48] explored material sub-frameworks in particular center structure, fluxing
regulation and improve the thing nature. Kumar et al. and brazing machine, air spill testing machine,
[49] acquainted consistent instrument of FMEA with inward hole testingand gathering machine, TIG
originators that broadly presented in enlarger modern welding, and helium spill testing machine. These
degrees. In material assembling industry is one of the subsystems are related in arrangement or
champion among the most basic usage measure. The corresponding with each other. For these six sub-
renowned and fundamental techniques among bosses structures, the use of mnemonicrule with the
as a result of its applications in various fields are arithmetical plan of the portrayal is shaped
turned by FEMA. subsequently expecting the exponential scattering of
FR and RR of sub-systems [59-60]. Chapman-
Kolmogorov differential conditions are gotten from
III. PROPOSED MODEL
the advancement sums up. As indicated by the
probabilistic strategy using Markov measure creates
The Markov cycle dependent on the technique is to
the logical model of get together region [61-68]. By
choose the accessibility of the system. Though their
using recreation demonstrating to choose the most
secure occasions are self-decisively scattered then the
good subsystems in the plant and the each sub-
unmistakable subcomponents framework with FR is
framework execution of the system is improved.
considered as steady. From the Transition Diagram
Figure 1 speaks to the stream chart of condenser get
(TD), differential conditions are viably acquired and
together area with its sub frameworks.
to decide the Markov cycle that are most outrageous

Figure 1: Progress chart of a get together of Condenser Manufacturing Process


In Markov model, the accessibility of the complex disappointments amount never expected
get together of the condenser framework is differentiations in vacation. The condenser using
demonstrated. The fundamental objective is to reproduction displaying with the creation framework
upgrade the RR and FR boundaries by limiting the sees the enhancing accessibility.
quantity of disappointments and expanding
accessibility [15]. In each disappointment the

ISSN: 2347-8578 www.ijcstjournal.org Page 20


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

IV. RESULT AND DISCUSSION readies the displaying for the condenser fabricating
measure. Each sub-framework, both FR and RR
The i5 processors and 4GB RAM with MATLAB impact the proposed framework and its approving
2016a stage handles the execution cycle of outcomes are talked about as follows. Table 1
mathematical demonstrating. While identified with clarifies the framework accessibility of each sub
progress outline, the differential conditions and framework.
probabilistic methodology with Markov measure
Table 1: System availability of Subsystem 6- FP m/c

RR System availability Constant parameters


FR
0.09 0.10 0.11 0.12 0.13 0.14 0.15 RR FR
0.008 0.8904 0.8847 0.8816 0.8758 0.8794 0.8623 0.8597
0.018 0.8821 0.8778 0.8759 0.8624 0.8732 0.8517 0.8454
0.028 0.8764 0.8689 0.8664 0.8571 0.8637 0.8489 0.8334
0.038 0.8635 0.8584 0.8567 0.8426 0.8546 0.8337 0.8261
0.048 0.8529 0.8499 0.8475 0.8357 0.8467 0.8245 0.8153
0.058 0.8493 0.8384 0.8351 0.8217 0.8337 0.8193 0.8027
0.068 0.8375 0.8291 0.8265 0.8131 0.8218 0.8023 0.7974

Table 1portrays the after effect of framework contains stable boundaries, for example, are 0.008,
accessibility which acted in mathematical displaying 0.017, 0.021, 0.20, 0.038, and 0.118, and the RR as
that is Markov model. The outcome shows that 0.65, 0.61, 0.20, 0.85, 0.12, and 0.42 in condenser
framework accessibility dependent on FR and RR, industrialized. While contrasted with existing
additionally, consistent boundaries of FR and RR are techniques, the markov cycle shows extraordinary
likewise added. The diminished measure of FR and accessibility.
RR improves the framework limit and usefulness,
this can upgrade the accessibility in condenser REFERENCES
producing. In table 1, the accessibility of center [1] Feng, Y., Yi, J. H., & Wang, G. G. (2019).
structure machine (I) is introduced; the framework Enhanced Moth Search Algorithm for the Set-
accessibility increments if the RR expanded yet the Union Knapsack Problems. IEEE Access, 7,
accessibility diminished when the FR is diminished. 173774-173785.
The steady boundaries are FR of subsystem 2, 3, 4, 5, [2] Sivaram, M., Batri, K., Amin Salih, M.,
6, 7, 8 and 9 are appeared in the table. Here, &Porkodi, V. (2019). Exploiting the Local
subsystem 5 and 8, 6 and 9 are equivalent. Optima in Genetic Algorithm using Tabu
Additionally, the consistent boundaries of RR are Search. Indian Journal of Science and
same with each subsystem. Technology, 12(1), 1-13.
[3] Venkatraman, S., &Surendiran, B. (2020).
V. CONCLUSION Adaptive hybrid intrusion detection system for
crowd sourced multimedia internet of things
This article proposed Markov model to break down systems. Multimedia Tools and
the condenser make framework in a HVAC plant and Applications, 79(5), 3993-4010.
its accessibility of complex get together, which was [4] Sujitha, B., Parvathy, V. S., Lydia, E. L., Rani,
executed on MATLAB programming. The Markov P., Polkowski, Z., & Shankar, K. (2020).
model executes the likelihood dispersion and Optimal deep learning based image
subsequently considering both exponential compression technique for data transmission
appropriation of subsystems, for example, RR and on industrial Internet of things
FR. In the assembling framework, the FR and RR of applications. Transactions on Emerging
CMS subsystems contain enormous framework Telecommunications Technologies, e3976.
accessibility impact. The subsystem 1 that most [5] Ezhilarasu, P., Krishnaraj, N., &Dhiyanesh, B.
extreme accessibility of 0.9923 limiting FR. The FR (2015). Arithmetic Coding for Lossless Data

ISSN: 2347-8578 www.ijcstjournal.org Page 21


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

Compression–A Review. International Journal function for the fixed-outline floorplanning


of Computer Science Trends and with soft blocks. Journal of Ambient
Technology, 3(3). Intelligence and Humanized Computing, 1-12.
[6] Porkodi, V., Singh, A. R., Sait, A. R. W., [15] Kumar, A., Ahuja, H., Singh, N. K., Gupta, D.,
Shankar, K., Yang, E., Seo, C., & Joshi, G. P. Khanna, A., & Rodrigues, J. J. (2018).
(2020). Resource Provisioning for Cyber– Supported matrix factorization using
Physical–Social System in Cloud-Fog-Edge distributed representations for personalised
Computing Using Optimal Flower Pollination recommendations on twitter. Computers &
Algorithm. IEEE Access, 8, 105311-105319. Electrical Engineering, 71, 569-577.
[7] Gao, D., Wang, G. G., &Pedrycz, W. (2020). [16] Sivaram, M., Porkodi, V., Mohammed, A. S.,
Solving fuzzy job-shop scheduling problem Manikandan, V., &Yuvaraj, N. (2019).
using DE algorithm improved by a selection Retransmission DBTMA protocol with fast
mechanism. IEEE Transactions on Fuzzy retransmission strategy to improve the
Systems. performance of MANETs. IEEE Access, 7,
[8] Sivaram, M., Mohammed, A. S., Yuvaraj, D., 85098-85109.
Porkodi, V., Manikandan, V., &Yuvaraj, N. [17] Venkatraman, S., & Kumar, P. A. R. (2019).
(2019, February). Advanced expert system Improving Adhoc wireless sensor networks
using particle swarm optimization based security using distributed automaton. Cluster
adaptive network based fuzzy inference Computing, 22(6), 14551-14557.
system to diagnose the physical constitution of [18] Lydia, E. L., Govindaswamy, P.,
human body. In International Conference on Lakshmanaprabu, S., &Ramya, D. (2018).
Emerging Technologies in Computer Document clustering based on text mining K-
Engineering (pp. 349-362). Springer, means algorithm using euclidean distance
Singapore. similarity. J. Adv. Res. Dyn. Control
[9] Jiménez, A. C., García-Díaz, V., González- Syst.(JARDCS), 10(2), 208-214.
Crespo, R., &Bolaños, S. (2018). [19] Ortin, F., Mendez, S., García‐Díaz, V., &
Decentralized Online Simultaneous Garcia, M. (2014). On the suitability of
Localization and Mapping for Multi-Agent dynamic languages for hot‐reprogramming a
Systems. Sensors, 18(8), 2612. robotics framework: a Python case
[10] Venkatraman, S., Surendiran, B., & Kumar, P. study. Software: Practice and
A. R. (2020). Spam e-mail classification for Experience, 44(1), 77-104.
the Internet of Things environment using [20] Krishnaraj, N., Ezhilarasu, P., & Gao, X. Z.
semantic similarity approach. The Journal of Hybrid Soft Computing Approach for
Supercomputing, 76(2), 756-776. Prediction of Cancer in Colon Using
[11] Lydia, E. L., Raj, J. S., PandiSelvam, R., Microarray Gene Data. Current Signal
Elhoseny, M., & Shankar, K. (2019). Transduction Therapy, 11(2).
Application of discrete transforms with [21] Le Nguyen, B., Lydia, E. L., Elhoseny, M.,
selective coefficients for blind image Pustokhina, I., Pustokhin, D. A., Selim, M. M.,
watermarking. Transactions on Emerging ... & Shankar, K. (2020). Privacy Preserving
Telecommunications Technologies, e3771. Blockchain Technique to Achieve Secure and
[12] Ezhilarasu, P., Prakash, J., Krishnaraj, N., Reliable Sharing of IoT Data. CMC-
Kumar, D. S., Babu, K. S., &Parthasarathy, C. COMPUTERS MATERIALS &
(2015). A Novel Approach to Design the CONTINUA, 65(1), 87-107.
Finite Automata to Accept the Palindrome [22] Chavhan, S., Gupta, D., Chandana, B. N.,
with the Three Input Characters. Indian Khanna, A., & Rodrigues, J. J. (2019). IoT-
Journal of Science and Technology, 8(28). based Context-Aware Intelligent Public
[13] Devaraj, A. F. S., Elhoseny, M., Transport System in a metropolitan area. IEEE
Dhanasekaran, S., Lydia, E. L., & Shankar, K. Internet of Things Journal.
(2020). Hybridization of firefly and Improved [23] Gu, Z. M., & Wang, G. G. (2020). Improving
Multi-Objective Particle Swarm Optimization NSGA-III algorithms with information
algorithm for energy efficient load balancing feedback models for large-scale many-
in Cloud Computing environments. Journal of objective optimization. Future Generation
Parallel and Distributed Computing. Computer Systems, 107, 49-69.
[14] Zou, D., Wang, G. G., Sangaiah, A. K., & [24] Porkodi, V., Khan, J., Mohammed, A. S.,
Kong, X. (2017). A memory-based simulated Bhuvana, J., & Sivaram, M. OPTIMIZED
annealing algorithm and a new auxiliary COOPERATIVE QOS ENHANCED

ISSN: 2347-8578 www.ijcstjournal.org Page 22


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

DISTRIBUTED MULTIPATH ROUTING [35] Sikkandar, M. Y., Alrasheadi, B. A., Prakash,


PROTOCOL. N. B., Hemalakshmi, G. R., Mohanarathinam,
[25] Geerthik, S., Venkatraman, S., & Gandhi, R. A., & Shankar, K. (2020). Deep learning based
(2016). AnswerRank: Identifying Right an automated skin lesion segmentation and
Answers in QA system. International Journal intelligent classification model. Journal of
of Electrical and Computer Engineering, 6(4), Ambient Intelligence and Humanized
1889. Computing, 1-11.
[26] Samad, A., Salima, R., Lydia, E. L., & [36] Zhang, Z., Wang, G. G., Zou, K., & Zhang, J.
Shankar, K. (2020). Definition and Features of (2014). A solution quality assessment method
Rural Marketing Strategies for Encourage for swarm intelligence optimization
Development in Rural Areas. TEST algorithms. The Scientific World
Engineering & Management, 82, 4983-4988. Journal, 2014.
[27] Palani, E., Nagappan, K., &Alhadidi, B. [37] Sivaram, Murugan et al. ‘Data Fusion Using
(2016). Segmentation and Texture Analysis for Tabu Crossover Genetic Algorithm in
Efficient Classification of Breast Tumors from Information Retrieval’. 1 Jan. 2020 : 1 – 10.
Sonograms. Current Signal Transduction [38] Khamparia, A., Pandey, B., Tiwari, S., Gupta,
Therapy, 11(2), 84-90. D., Khanna, A., & Rodrigues, J. J. (2020). An
[28] Rajagopal, A., Ramachandran, A., Shankar, integrated hybrid CNN–RNN model for visual
K., Khari, M., Jha, S., Lee, Y., & Joshi, G. P. description and generation of
(2020). Fine-tuned residual network-based captions. Circuits, Systems, and Signal
features with latent variable support vector Processing, 39(2), 776-788.
machine-based optimal scene classification [39] Geerthik, S., Gandhi, K. R., &Venkatraman, S.
model for unmanned aerial vehicles. IEEE (2016, December). Domain expert ranking for
Access, 8, 118396-118404. finding domain authoritative users on
[29] Mondragon, V. M., García-Díaz, V., Porcel, community question answering sites. In 2016
C., & Crespo, R. G. (2018). Adaptive contents IEEE International Conference on
for interactive TV guided by machine learning Computational Intelligence and Computing
based on predictive sentiment analysis of Research (ICCIC) (pp. 1-5). IEEE.
data. Soft Computing, 22(8), 2731-2752. [40] Muruganantham, A., Nguyen, P. T., Lydia, E.
[30] Feng, Y., Yu, X., & Wang, G. G. (2019). A L., Shankar, K., Hashim, W., &Maseleno, A.
Novel Monarch Butterfly Optimization with (2019). Big data analytics and intelligence: A
Global Position Updating Operator for Large- perspective for health care.
Scale 0-1 Knapsack [41] Ramkumar, V., &Krishnaraj, N. Weight Based
Problems. Mathematics, 7(11), 1056. LSA to Retrieve Information from Web Pages
[31] Mohammed, A. S., & Sivaram, P. (2018). Based On Document Score.
Securing the Sensor Networks Along With [42] Balakiruthiga, B., Deepalakshmi, P., Mohanty,
Secured Routing Protocols for Data Transfer S. N., Gupta, D., Kumar, P. P., & Shankar, K.
in Wireless Sensor Networks. (2020). Segment routing based energy aware
[32] Geerthik, S., Venkatraman, S., & Gandhi, K. routing for software defined data
R. (2016, February). Reward rank: A novel center. Cognitive Systems Research.
approach for positioning user answers in [43] Chu, H. C., Wang, G. G., & Deng, D. J.
community question answering system. (2016). The social networking investigation of
In 2016 International Conference on metadata of forensic artifacts of a typical
Information Communication and Embedded WeChat session under Windows. Security and
Systems (ICICES) (pp. 1-6). IEEE. Communication Networks, 9(18), 5698-5709.
[33] Sivaram, M., Lydia, E. L., Pustokhina, I. V., [44] Sivaram, M., Yuvaraj, D., Mohammed, A. S.,
Pustokhin, D. A., Elhoseny, M., Joshi, G. P., Manikandan, V., Porkodi, V., &Yuvaraj, N.
& Shankar, K. (2020). An optimal least square (2019). Improved Enhanced Dbtma with
support vector machine based earnings Contention-Aware Admission Control to
prediction of blockchain financial Improve the Network Performance in Manets.
products. IEEE Access, 8, 120321-120330. CMC-COMPUTERS MATERIALS &
[34] Ghantasala, G. P., &KrishnaRaj, N. Support CONTINUA, 60(2), 435-454.
Vector Machine Based Automatic [45] Gochhayat, S. P., Lal, C., Sharma, L., Sharma,
Mammogram Classification Using Hybrid D. P., Gupta, D., Saucedo, J. A. M., &Kose, U.
Optimization Algorithm. (2019). Reliable and secure data transfer in
IoT networks. Wireless Networks, 1-14.

ISSN: 2347-8578 www.ijcstjournal.org Page 23


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

[46] Subbarayalu, V., Surendiran, B., &Arun Raj of Science, Engineering and Computer
Kumar, P. (2019). Hybrid Network Intrusion Technology, 5(11), 390.
Detection System for Smart Environments [56] Sengar, S. S., Hariharan, U., &Rajkumar, K.
Based on Internet of Things. The Computer (2020, March). Multimodal Biometric
Journal, 62(12), 1822-1839. Authentication System using Deep Learning
[47] Rosa, A. T. R., Pustokhina, I. V., Lydia, E. L., Method. In 2020 International Conference on
Shankar, K., & Huda, M. (2019). Concept of Emerging Smart Computing and Informatics
electronic document management system (ESCI) (pp. 309-312). IEEE.
(EDMS) as an efficient tool for storing [57] Maseleno, A., Hashim, W., Perumal, E.,
document. Journal of Critical Reviews, 6(5), Ilayaraja, M., & Shankar, K. (2020). Access
85-90. control and classifier-based blockchain
[48] Espada, J. P., Diaz, V. G., Crespo, R. G., technology in e-healthcare applications.
Bustelo, B. C. P. G., &Lovelle, J. M. C. In Intelligent Data Security Solutions for e-
(2015). An intelligent Mobile Web Browser to Health Applications (pp. 151-167). Academic
adapt the mobile web as a function of the Press.
physical environment. IEEE Latin America [58] Li, J., Lei, H., Alavi, A. H., & Wang, G. G.
Transactions, 13(2), 503-509. (2020). Elephant Herding Optimization:
[49] Variants, K Hybrids, and
umar, R. S., Krishnaraj, N., &Keerthana, G. Applications. Mathematics, 8(9), 1415.
(2017). Assessment of Quality of Service in [59] Mohammed, A. S., Kareem, S. W., Al Azzawi,
Communication Network and Evaluating A. K., & Sivaram, M. (2018). Time series
Connectivity Among IP Networks. Asian prediction using SRE-NAR and SRE-
Journal of Applied Science and Technology ADALINE. Journal of Advanced Research in
(AJAST), 1(3), 319-322. Dynamical and Control Systems, Pages, 1716-
[50] Elhoseny, M., Rajan, R. S., Hammoudeh, M., 1726.
Shankar, K., &Aldabbas, O. (2020). Swarm [60] Shankar, K., Elhoseny, M., Chelvi, E. D.,
intelligence–based energy efficient clustering Lakshmanaprabu, S. K., & Wu, W. (2018). An
with multihop routing protocol for sustainable efficient optimal key based chaos function for
wireless sensor networks. International Journal medical image security. IEEE Access, 6,
of Distributed Sensor Networks, 16(9), 77145-77154.
1550147720949133. [61] Geerthik, S., Gandhi, R., &Venkatraman, S.
[51] Chu, H. C., Wang, G. G., & Park, J. H. (2015). (2006). CATEGORY BASED EXPERT
The digital fingerprinting analysis concerning RANKING: A NOVEL APPROACH FOR
google calendar under ubiquitous mobile EXPERT IDENTIFICATION IN
computing era. Symmetry, 7(2), 383-394. COMMUNITY QUESTION ANSWERING.
[52] Manikandan, V., Sivaram, M., Mohammed, A. [62] Laxmi, C. V., &Somasundaram, K. (2014).
S., &Porkodi, V. (2020). Nature Inspired Application Level Scheduling (AppLeS) in
Improved Firefly Algorithm for Node Grid with Quality of Service
Clustering in WSNs. CMC-COMPUTERS (QoS). International Journal of Grid
MATERIALS & CONTINUA, 64(2), 753- Computing & Applications, 5(2), 1.
776. [63] Kumar, R. S., Krishnaraj, N., &Keerthana, G.
[53] Kuppusamy, P., Venkatraman, S., Highly Energy Efficient and Scalable
Rishikeshan, C. A., & Reddy, Y. P. (2020). Distributed Clustering Procedure for Dense
Deep learning based energy efficient optimal Wireless Sensor Networks.
timetable rescheduling model for intelligent [64] Krishnaraj, N., Kumar, K. A., & Kumar, P. K.
metro transportation systems. Physical (2018). DESIGN OF ADAPTIVE
Communication, 101131. SCHEDULER TO IMPROVE
[54] Asih, E. S., Nguyen, P. T., Lydia, E. L., PERFORMANCE OF COMPUTATIONAL
Shankar, K., Hashim, W., &Maseleno, A. GRIDS. International Journal of Pure and
(2019). Mobile E-commerce website for Applied Mathematics, 119(18), 1741-1751.
technology-based buying selling [65] Shankar, K., & Eswaran, P. (2016, January). A
services. International Journal of Engineering new k out of n secret image sharing scheme in
and Advanced Technology, 8(6), 884-888. visual cryptography. In 2016 10th
[55] Lydia, E. L., &Swarup, M. B. (2015). Big data International Conference on Intelligent
analysis using hadoop components like flume, Systems and Control (ISCO) (pp. 1-6). IEEE.
mapreduce, pig and hive. International Journal

ISSN: 2347-8578 www.ijcstjournal.org Page 24


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

[66] Wei, C. L., & Wang, G. G. (2020). Hybrid


Annealing Krill Herd and Quantum-Behaved
Particle Swarm
Optimization. Mathematics, 8(9), 1403.
[67] Sivaram, M., Yuvaraj, D., Mohammed, A. S.,
&Porkodi, V. Estimating the Secret Message
in the Digital Image. International Journal of
Computer Applications, 975, 8887.
[68] Nieto, Y., Gacía-Díaz, V., Montenegro, C.,
González, C. C., & Crespo, R. G. (2019).
Usage of machine learning for strategic
decision making at higher educational
institutions. IEEE Access, 7, 75007-75017.

ISSN: 2347-8578 www.ijcstjournal.org Page 25

Potrebbero piacerti anche