Accident Reporting and Notification System For Incidents Involving Motor Vehicles

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND

COMPUTER SCIENCES
https://cajmtcs.centralasianstudies.org

Volume: 03 Issue: 08 | August 2022 ISSN: 2660-5309

ACCIDENT REPORTING AND NOTIFICATION SYSTEM FOR


INCIDENTS INVOLVING MOTOR VEHICLES
Dr. C. R. Rathish
Associate Professor, Department of Computer Engineering, New Horizon College of Engineering, Bengaluru, India
[email protected]

Dr. Sivaramakrishnan S
Department of Electronics and Communication Engineering, Dayananda Sagar University, India
[email protected]

Abstract ARTICLEINFO
An innovative GPS vehicle tracking system with a GSM
Article history:
module for remote vehicle locking. Its purpose is to protect Received 6 Jun 2022
car owners from intruders and theft. When an intruder tries to Revised form 5 Jul 2022
Accepted 3 Aug 2022
get into your car, the system analyses the data from the
sensors and sends a notification to you via GSM. It uses
Ключевые слова: Motor Vehicles,
Global Positioning System technology to transmit the vehicle's Vibration Sensor, System Perform,
coordinates. An Arduino controller is used for vehicle control. Notification System, Accident
The motor's speed is reduced over time, and it eventually Reporting.
stops. A large variety of control features can be created using
the same set of control principles described in the paper. To
detect an accident, a vibration sensor is utilised as a detecting
device. The CPU is always keeping an eye on the vibration
sensor's output; if the sensor detects a voltage increase
beyond a certain threshold, the processing is halted and the
processor learns that an accident has occurred.

© 2019 Hosting by Central Asian Studies. All rights reserved.


---------------------------------------------------------------------***---------------------------------------------------------------------
Introduction:
Rapid progress in the automotive industry has resulted in an increase in traffic accidents and other dangers.
There is a serious threat to human life [1]. The lack of adequate emergency services in our country allows
this predicament to persist. Many people die every year in accidents in the United States [2-3]. As a result of
casualties or a failure to properly brief the rescue squad. In order to address this problem and minimise any
human suffering caused by it, we have proposed an effective remedy [4]. According to our idea, the system's
layout allows us to spot incidents in an extremely short amount of time and send vital information, including
precise locations, the time of the incident, and the direction the vehicle was travelling, to the nearest
emergency facility in a matter of seconds. Rapid notification is made to the emergency response team
(ambulance) and the cell phone number on file [5-11]. Invaluable human lives are being preserved thanks to
this real-time programme. The GPS module will relay the incident's precise coordinates to the GSM module,

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 1


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

which will then transmit the data [12]. The basic concept is to use a vehicle's real-time GPS position to
pinpoint its exact location, which will then be relayed to a GSM network via a web page service [13-17].
The GPS system monitors the whereabouts of a car using satellite technology [18]. The global positioning
system (GPS) module is a standard component of most tracking systems [19-25]. A GSM module, a GPS
module, a microprocessor, a relay circuit, and a liquid crystal display make up the framework of the vehicle
tracking system's basic design [26]. The motor's speed is slowed down over time [27-34]. The latitude and
longitude of the user's current position are also transmitted to the user's mobile device [35]. To see the
vehicle's location on Google Maps, just enter these coordinates [36]. This system is tailored to the needs of
those in the transportation and land development industries, giving users instant access to useful data
including their trucks' current location, speed, and estimated time of arrival [37-44].
There are a number of published articles on the topic of the improvement of GPS and GSM modem-based
vehicle tracking systems [45]. This article presents a differential GPS technique that can provide near real-
time PPP service. GPS measurement error sources are estimated [46-51]. The notion of focus of expansion
(FOE) is introduced, and its role in the evolution of real-time visual tracking systems for use in automotive
safety applications is explained [52-66]. An inexpensive real-time tracking system is described, one that can
pinpoint the exact location of the tracked vehicle [67-75]. To facilitate vehicle tracking, we also implement
licence plate recognition. As a result of the great interest in reliable vehicle tracking systems, scientists have
proposed a variety of new techniques for making such systems more precise. Developments in both the
hardware and software of the Global Positioning System and the Global System for Mobile Communications
are discussed. In order to implement the proposed GPS/GSM based System, a mobile unit and a controlling
station are required [76-81]. All system components, including the mobile unit, the control stations, and the
interfaces and connections between them, are operational. These findings are consistent with global
positioning system tools [82-91].
A car tracking system is an electronic device that can be installed in a vehicle and used to follow its
whereabouts, either by the vehicle's owner or a third party. In this study, we present a GPS and GSM-based
system for tracking vehicles [92-99]. This embedded system can pinpoint the location of any vehicle using
Global Positioning System and the Global System for Mobile Communication (GSM) [100]. This setup can
monitor a moving Vehicle and provide status changes on demand. In Face Detection System utilised to
recognise the face of the driver, and compare with the predefined face [101-111]. While the owner was
sound asleep at night, his car was stolen. Then, the Face Detection System captures images using a single,
unobtrusive webcam installed inconspicuously someplace in the vehicle [112-115]. To do this, the Face
Detection System compared the new data with the existing database of faces. If the photos don't match, then
the information sent to the owner through MMS [116-127]. The owners can identify the burglar by viewing
photographs stored on their phones and tracking his or her location using GPS. The place of the automobile
and its speed displayed to the owner through SMS [128]. The owner can recognise the thief photographs as
well as the site of the car and may quickly find out the hijackers image. In our regular lives, this system
worked [129].
By adapting the preexisting modules, this system guaranteed the safety and security of the car's interior,
which relied on the embedded system [130]. Toxic gases like carbon monoxide (CO), liquefied petroleum
gas (LPG), and alcohol can be detected and their levels within the vehicle can be monitored using this
technology, with the resulting data serving as an alarm in potentially hazardous conditions [131-141]. All it
takes is a GSM phone and a few keystrokes to send a text message to the right recipient. If an IR sensor
detects a stationary barrier in the vehicle's path, the engine is shut off and the vehicle comes to a halt.
Collisions between moving cars and immobile objects can be avoided in this way. The proposed monitoring
system utilises the resources of the cloud [142-151]. The fuel level, the driver's health, and the vehicle speed
are all things that may be tracked with the use of these sensors. Information is sent from the GSM-enabled
smartphone to a remote server in the cloud [152-161]. Each car has a GPS antenna so they can find their way
there. Alcohol sensors are fitted to keep track of whether or not drivers are impaired. Highway accidents can
be greatly reduced with the help of the proposed technology [162].

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 2


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

Remote monitoring using short message service (SMS) and general system mobile communication (GSM)
was introduced in [163]. Hardware and software are created in accordance with the system's overall design.
In this work, the GSM network is used to carry the remote control signal. Two components make up this: the
centralised control room and the outpost monitoring equipment [164-171]. Computers and a GSM
connection module make up the monitoring centres. The centralised software monitoring facility, and the
off-site monitoring station, were both developed in Visual Basic [172-181]. This proof-of-concept
demonstrates that the system can monitor and manage data transmissions between the control room and the
outpost [182-195].
For the purpose of improving road safety, Kai-Tai Song and Chih-Chieh Yang have developed a real-time
visual tracking system [196]. This research developed a novel feature-based vehicle-tracking algorithm that
can automatically recognise and track a number of vehicles or motorcycles in front of the tracking vehicle
[197-201]. Based on the focus of expansion (FOE) and view analysis, the developed system can distinguish
between the foreground and background motion of an image and provide a real-time collision warning.
Based on a CMOS image sensor and NMOS embedded CPU architecture, the suggested technique is very
low power. The designed stand-alone visual tracking system validated in real road tests [202-210]. The
findings revealed details on collision warning in a city artery travelling at night and during the day at speeds
of around 60 km/h. The GPS and GSM networks' hardware and software were created in. In order to
implement the proposed GPS/GSM based System, a mobile unit and a controlling station are required. All
system components, including the mobile unit, the control stations, and the interfaces and connections
between them, are operational. These findings are consistent with global positioning system tools [211-215].
A car tracking system is an electronic device that can be installed in a vehicle and used to monitor its
whereabouts, either by the vehicle's owner or by a third party. A GPS and GSM-based vehicle tracking
system was proposed in this paper [216-220]. Through the use of GPS and the Global System for Mobile
Communication, this embedded-based system can locate and track down any car (GSM). This design will
keep an eye on a moving Vehicle and give you updates whenever you want [221-225]. By adapting the
preexisting modules, this system guaranteed the safety and security of the car's interior, which relied on the
embedded system. Toxic gases like carbon monoxide (CO), liquefied petroleum gas (LPG), and alcohol can
be detected and their levels within the vehicle can be monitored using this technology, with the resulting
data serving as an alarm in potentially hazardous conditions [226].
Existing System
While the ultrasonic system's distance data is used in the current setup, the speed of the vehicles is not
required [227-228]. Accidents on the roads are becoming common as a result of technological
advancements, leading to substantial loss of life and property due to a lack of adequate emergency services.
In order to get around this shortcoming, the author suggests using the proposed system.
Proposed System
Our project relies on accident detection and tracking to function. Activation and system initialization have
been completed. Nothing alerts the rescue squad if the car is operating normally. When an accident occurs,
the car suddenly reverses course and begins vibrating at extremely high speeds. When something is wrong
with a car, the vibration detector will pick it up. The accident warning information, including the location of
the accident and the status of any injured parties, is transmitted to the appropriate authorities and family
members via text message and phone call after the controller receives data from the sensors. Using Internet
of Things (IoT) technology, it can help people get in touch with the closest hospital and get the care they
need.
Architecture Design
Our project relies on accident detection and tracking to function. Activation and system initialization have
been completed. Nothing alerts the rescue squad if the car is operating normally. When an accident occurs,
the car suddenly reverses course and begins vibrating at extremely high speeds. When something is wrong
with a car, the vibration detector will pick it up. The accident warning information, including the location of

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 3


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

the accident and the status of any injured parties, is transmitted to the appropriate authorities and family
members via text message and phone call after the controller receives data from the sensors. Using Internet
of Things (IoT) technology, it can help people get in touch with the closest hospital and get the care they
need (figure 1).

Figure 1: Architecture Design of AVR MCU - AT328P


The ATmega328P chip can be used as a drop-in replacement for the arduino board in both the Arduino Uno
and the Arduino nano. For starters, you'll need to flash the chip with the Arduino bootloader (or purchase a
chip already loaded with the bootloader, such as the ATMega328P-PU). This programmable IC includes a
bootloader that allows it to communicate with the Arduino Uno board. Once the IC has had the Arduino
programme burned into it, it may be used in place of the Arduino board in a given project; all that's needed
in addition to the IC is a Crystal oscillator and any other components specified by the given project. The
table below details the pinout of the ATmega328P chip, which is compatible with the Arduino Uno. The
AVR employs a harvard architecture, which features dedicated programme and data memory and buses for
increased performance and parallelism. With a single level of pipelining, the instructions stored in the
programme memory are processed. The next instruction is pre-fetched from the programme memory while
the current one is being executed. When applied to computing, this idea allows for instructions to be carried
out during each tick of the clock.
Reprogrammable flash memory is used for the system's programme storage. Unit for Monitoring and
Interrupting Operations General-Purpose Registers, 32 bits by 8 bits Communications Link for ALU This 8-
bit Data SRAM Unit of SPI Instruction Registration Procedure Decoder Timer with a Dogwatch Function
Comparator, Analog EEPROM Communication Ports Module d'interfaces d'entrées et sorties Directives for
Taking Charge There are two types of addresses: direct and indirect. IO Module 2 IO Module 1 Counter
Software ROM (Read Only Memory) Flash. One clock cycle is all it takes to access the 32 to 8-bit general
purpose working registers in the fast-access register file. This paves the way for arithmetic logic unit (ALU)
operations that take place in a single cycle. During a single clock cycle, an ALU transfers data from the
register file to the operational circuit, performs the operation, and returns the result to the register file.
Address computations can be performed quickly and accurately thanks to the fact that six of the 32 registers
can be used as pointers to three 16-bit indirect address registers for the data space. One of these address
pointers can be utilised as the address pointer for look up tables in the flash programme memory. The X-, Y-
, and Z- registers, each with 16 bits of storage, are the newly introduced functional registers. Calculations
and logical operations between registers or between a constant and a register are supported by the ALU. The
ALU is not limited to performing multi-register operations, though. The outcome of an arithmetic operation
is recorded in the status register upon the completion of the operation (figure 2).

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 4


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

Figure 2: Arithmetic operation


Conditional and unconditional jump and call instructions, which can directly target the entire address space,
are responsible for the execution of the programme. Single 16-bit word format is used for the vast majority
of AVR instructions. Each address in the program's memory map corresponds to a 16- or 32-bit command.
There are two distinct parts to the storage space for software in the flash memory: the boot programme and
the application programme. Separate lock bits prevent unauthorised changes to either segment. There must
be a boot programme section in which the SPM instruction that writes to the application flash memory area
resides. The stack is used to temporarily save the programme counter (PC) and the return address during
interruptions and calls to subroutines. Since the stack is implemented in the general data SRAM, its
maximum size is constrained only by the available and used SRAM space. The reset routine of every user
programme must initialise the SP (before subroutines or interrupts are executed). From the input/output (I/O)
domain, you can read and write to the stack pointer (SP). AVR's five addressing modes make it simple to
reach the data SRAM. All memory maps in the AVR design are linear and standardised. Temporary data,
local variables, and return addresses from interrupted or called subroutines are all stored on the stack. When
implemented, a stack would naturally expand from more recent to older memory locations. The top of the
stack is always indicated by the stack pointer register. To access the stack section in data SRAM, where both
the subroutine and interrupt stacks are kept, use the stack pointer.
The status register of a versatile interrupt module contains an extra global interrupt enabling bit in addition
to the control registers in the I/O address space. Every single interrupt has its own unique entry in the
interrupt vector database. Interrupts are prioritised based on their interrupt vector position. It is more
important to have a lower interrupt vector address. There are 64 addresses in the I/O memory space that are
dedicated to CPU peripherals such control registers, SPI, and other I/O operations. Direct access to the I/O
memory is possible, alternatively it can be viewed as the data space positions immediately following the
register file, from 0x20 to 0x5F. The ATmega328P features a larger I/O range in SRAM, from 0x60 to 0xFF,
accessible exclusively through the use of the ST/STS/STD and LD/LDS/LDD instructions. Both a USB
cable and an external power supply are acceptable for powering the Arduino Uno. The system intelligently
chooses the power supply. Both an AC-to-DC adapter (wall-wart) and batteries can supply external (non-
USB) power. Adapter connection is achieved by inserting a 2.1mm center-positive connector into the power
jack on the circuit board. Connecting a battery's leads to the POWER connector's Gnd and Vin pin headers.
The board can use an external power supply between 6 and 20 volts. However, the board may become
unstable if the 5V pin is provided with less than 7V. Above 12V, the voltage regulator runs the risk of
overheating and frying the board. Seven to twelve volts is the sweet spot. The power pins are as follows:
 Arduino's VIN value indicates the voltage at which the board is powered by an external supply (as
opposed to 5 volts from the USB connection or other regulated power source). This pin can be used to
either supply power or, if using a power jack, to draw power.
 It uses a 5V regulated power supply to run the microcontroller and other components. This can be
supplied by VIN, via an on-board regulator, or by USB or another regulated 5V source.
 The on-board regulator creates a 3.3-volt power supply. The maximum allowed current is 50 mA.
 Pins that connect to the ground are labelled GND.

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 5


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

 Sleep modes allow the programme to power down the MCU's unused subsystems when not in use.
 The AVR's several sleep modes let developers adjust power usage as needed. The Brown-out Detector
(BOD) keeps an eye on the voltage from the power source even when the device is sleeping.
Memory
There is 32 KB of flash memory on the Atmega328 for storing code (0.5 KB of which is utilised for the boot
loader), 2 KB of static random-access memory (SRAM), and 1 KB of erasable programmable read-only
memory (EEPROM) (which can be read and written with the EEPROM library). It is structured as a distinct
data space, with access restricted to single bytes. The EEPROM can withstand at least a hundred thousand
cycles of writing and erasing without failing. The peripherals and input/output (I/O) ports for the
ATmega48P/88P/168P/328P are located in the I/O area. The LD/LDS/LDD and ST/STS/STD instructions
allow access to all I/O locations, allowing for the transfer of data between the 32 general purpose working
registers and the I/O space. The SBI and CBI instructions allow direct bit access to the I/O Registers from
0x00 to 0x1F. Values of individual bits in these registers can be examined with the use of the SBIS and
SBIC instructions. Please read the manual for further information. The IN and OUT I/O commands require
the use of the I/O addresses between 0x00 and 0x3F (figure 3).

Figure 3: Circuit Diagram of Power Supply Design – Arduino UNO


General Purpose Input and Output
The Uno's 14 digital pins can be configured in a variety of ways, including as inputs or outputs, with the use
of the pin Mode (), digital Write (), and digital Read () commands. They require 5 volts to function properly.
There is a 20-50 KOhm pull-up resistor built into each pin that is normally unplugged to allow for a
maximum of 40 mA of input or output current. Additionaly, several pins serve specific purposes:
 Serial 0 (TX) and 1 (RX) (TX). Functions as a TTL serial data receiver and transmitter. The
ATmega8U2 USB-to-TTL Serial chip's relevant pins are wired here.
 Both External Interruptions 2 and 3 occurred outside the system. An interrupt can be set off by a low
value, a rising or falling edge, or a change in value for each of these pins. For more information, see to
the attach Interrupt () method.
 Specifically, PWM 3, 5, 6, 9, 10, and 11. Create 8-bit pulse-width-modulated (PWM) output using the
analogue Write() method.
 The tenth, eleventh, twelfth, and thirteenth syllables in the standard format for SPIs are: (SCK).
Although the underlying hardware facilitates SPI communication, support for it is not yet built into the
Arduino programming language.
 LED 13. Connected to digital pin 13, an LED is part of the device's standard configuration. The LED
will be illuminated when the pin's value is HIGH, and it will be turned off when the value drops to
LOW.

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 6


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

 There are 6 analogue inputs on the Uno, each with 10 bits of resolution (i.e. 1024 different values). The
default measuring range is from ground to 5 volts, however the AREF pin and the analogue Reference()
function allow for the upper limit to be adjusted. Some of the pins also have particular purposes.
 The proteins I2C4 (SDA) and 5 (SCL). The Wire library was added to provide I2C (TWI)
communication.
 Analog inputs have their own reference voltage. Referencing with an analogue (). The microcontroller
can be reset by making this line LOW. In most cases, shields that cover the on-board reset button will
benefit from having one of their own. For more information on how Atmega328 ports relate to Arduino
pins, check out this handy table.
Power Supply
There are 6 analogue inputs on the Uno, each with 10 bits of resolution (i.e. 1024 different values). The
default measuring range is from ground to 5 volts, however the AREF pin and the analogue Reference()
function allow for the upper limit to be adjusted. Some of the pins also have particular purposes. The
proteins I2C4 (SDA) and 5 (SCL). The Wire library was added to provide I2C (TWI) communication. The
voltage at the analogue input serves as its own reference. Using a Comparative Example (). In order to reset
the microcontroller, you must get this line to the LOW state. Most shields will benefit from include their
own reset button in addition to the on-board button they are designed to protect. This helpful table shows the
connections between the ports on the Atmega328 and the pins on the Arduino.
Block Diagram

Figure 4: Circuit Diagram


At first, a small step down transformer is utilised to convert the 230V AC power supply to the safer 12V AC.
A rectifier takes the sinusoidal AC voltage produced by the transformer and transforms it into DC voltage
with periodic pulses. A filter circuit receives this output and smooths out the ac noise while letting the dc
current through. 12V DC research voltage is regulated using a 7812. The 7805 regulator is used to change
the DC voltage into a stable 5V (figure 4).
Vibration Sensor
The amount of vibration is used in conjunction with the module's potentiometer, vibration sensor, and
LM393 comparator chip to generate a tunable digital output. The sensitivity can be fine-tuned by turning the
potentiometer in either direction. When activated, the module sends out a high logic level (VCC), and when
not, it sends out a low logic level (GND). An on-board LED light also activates in response to a signal being
sent to the module.
Working
The company's latest motion sensor module, the sw-420, is a normally closed type vibration sensor with a
clean signal, nice waveform, and robust driving ability that operates at 3.3V to 5V with a current draw of
more than 15MA.
Form of output: digital switch output (0 and 1) The bolt hole is permanent, making assembly a breeze.
Product on vibration switch is closed on state, the output terminal output low level, the green light is lit

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 7


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

product vibration, the vibration switch instantaneously disconnect, output the output high level, the green
light is not bright output can be directly connected to microcontroller, through single chip microcontroller to
detect the high and low level, thus to detect whether there is a vibration. Similar to the generally open type
vibration sensor module, this one can operate a relay module if a vibration is detected for an extended length
of time.
LCD Display
Hobbyists employ a wide variety of display devices. Among the many types of displays they use, LCD
screens are among the most cutting-edge. You'll find it to be the simplest and most trustworthy output device
after you've mastered the UI. Furthermore, not every time any debugger can be utilised for micro controller
based project. LCD screens can be used to verify the outputs in this way. When an accident happens, the
GPS module in the car sends the precise coordinates (in latitude and longitude) of where the car is to the
satellite. Therefore, the data is sent to an Arduino Uno. When processing is complete, data is sent to the
LCD and GSM modem (figure 5).

Figure 5: LCD Display


Hobbyists employ a wide variety of display devices. Among the many types of displays they use, LCD
screens are among the most cutting-edge. You'll find it to be the simplest and most trustworthy output device
after you've mastered the UI. Furthermore, not every time any debugger can be utilised for micro controller-
based project. LCD screens can be used to verify the outputs in this way. When an accident happens, the
GPS module in the car sends the precise coordinates (in latitude and longitude) of where the car is to the
satellite. Therefore, the data is sent to an Arduino Uno. When processing is complete, data is sent to the
LCD and GSM modem (figure 6).

Figure 6: Flow chart of interfacing LCD display


Both dynamic random access memory (DDRAM) and static random access memory (CGRAM) are used in
LCD displays. Data Display Random Access Memory (DDRAM) stores information on which ASCII

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 8


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

character will be shown at a given location. On an LCD screen, each distinct coordinate is represented by
one byte of dynamic random-access memory (DDRAM). The data is read from the DDRAM and displayed
on the LCD screen via the LCD controller. Users of CGRAM can create their own unique glyphs. That's
why the first 16 ASCII characters of an address are always set aside for user access. Once CGRAM is
configured to show characters, users can easily show their own characters on the LCD screen.
GPS Module
The NEO-6MV2 serves as a navigational GPS (Global Positioning System) module. The module's sole
purpose is to verify its geographic location and relay that information in the form of longitude and latitude
coordinates. It's a member of the same family of standalone GPS receivers that also includes the u-blox 6
positioning engine, which is known for its superior accuracy and speed. Small (16 mm x 12.2 mm x 2.4
mm), lightweight, and inexpensive, these receivers provide multiple connection choices. NEO-6 modules are
perfect for low-cost, space-constrained, battery-operated mobile devices thanks to their compact design,
plentiful power, and versatile memory. Its cutting-edge engineering ensures that NEO-6MV2 can
successfully navigate in any environment. To avoid receiving an error message, the baud rate between the
controller and the module must be set once the circuitry is complete. After establishing the baud rate, serial
data can be retrieved from the module without any more intervention. Users can manipulate these values,
which are simply longitudes and latitudes, as they see fit. The module's raw values can be difficult to read
without some sort of decimal calculation, which can be easily implemented in code.
GSM Module
TTL Output (for Arduino, 8051, and other microcontrollers) and RS232 Output (to interface directly with a
PC) are just two examples of the types of output available on a GSM Module, which is essentially a GSM
Modem (like SIM 900) connected to a PCB (personal computer). There will be pins or provisions on the
board for connecting a microphone and a speaker, as well as for extracting +5V or other values of power and
ground connections. Modules may have different types of provisions. A wide selection of GSM modems and
GSM modules are available on the market. The best GSM module to use with Arduino is one that has TTL
Output provisions, as this will allow us to connect the GSM modem or module to Arduino and send and
receive SMS messages. We use SIM900 GSM Module. In other words, the 900MHz band is supported for
communication by the module. Those of us who hail from India will know that the 900Mhz band is the most
popular among local mobile network providers. You need to make sure your mobile phone is compatible
with the local network if you're visiting from another country. The 850Mhz band is widely used by
American mobile networks (the band is either 850Mhz or 1900Mhz). The 1900 Mhz band is the most
common in Canada. For more information on GSM frequency bands around the world, see this article on
Wikipedia.
GSM modules are manufactured by a variety of companies, so it's important to verify the power
requirements of each individual module. A variety of specifications for the input power supply are used.
Remember to double-check the power needs of your GSM modules. An input of 12 volts is needed for our
GSM module in this guide. We use a 12V,1A DC power supply to power it. Input voltage for some GSM
modules is 15 volts, while I've seen others that only need 5 volts. Their quality varies depending on the
manufacturer. In the event you have a 5V module, you can connect it directly to the 5V out on your Arduino.
To make a GSM module, a specific GSM modem is soldered onto a PCB, and from there, features like
RS232 outputs, TTL outputs, mic and speaker interfacing provisions, etc. are added. The SIM 900 GSM
modem, made by SIM Com, is currently the most widely used modem. They produce GSM modems in the
850 MHz, 300 MHz, and other frequency bands. Verify the presence of TTL output pins in the module; only
if these are present will you be able to send data from the GSM module directly to the Arduino. Instead, you
must use a MAX232 IC to convert the RS-232 data to TTL before feeding it to an Arduino. The vast
majority of GSM modules on the market today feature TTL output pins. Just make sure you're getting the
correct one (figure 7).

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 9


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

Figure 7: Connection Diagram


Using the UART or RS232 Interface, you can talk to this module like you see above. With the help of the
UART interface, information can be transmitted to and received from the module. The module requires a
regular +4.0V power source, which is what it usually gets. It requires +4.5V regulated electricity to function,
and anything greater than that could potentially destroy the module. Also, the maximum current that may be
supplied by the power supply must be 2A. The connection between the two devices using the UART
protocol is made in the manner depicted in the picture. You need just connect the module's RXD to the
Arduino's TXD, and the Arduino's TXD to the module's RXD. There must be a connection between the
controller's ground and the module's ground for the voltage to be properly referenced. Here, the microphone
is plugged into the AUDIO IN jack, and sound is emitted through the speaker jack. Last but not least, a
functional GSM SIM card must be inserted into the module. When the module is powered on, the
NETLIGHT LED will blink at regular intervals to indicate a stable connection.
Once all of the wires have been connected, the microcontroller will require a programme written so that it
can communicate with the module. The controller-to-module data exchange sequence is extremely complex,
thus we will be making use of libraries designed specifically for modules. Websites provide access to
controller and module libraries for download. The use of these libraries facilitates simple interaction. The
libraries can be downloaded and then called from within the programmes. After the header file is included,
the controller can be instructed to send or receive data with just a few lines of code. Data is transmitted from
the controller to the module via the UART Interface, with the protocol being defined in the controller's
corresponding library. Through the cellular network, the module transmits the information to another GSM
user. Data received from the cellular network (or another GSM user) will be sent to the controller via UART
serial communication if the module is functioning properly.
Result
The sensor on the board is connected to the hardware via an interface. The microprocessor, LCD, GSM/GPS
module, and sensors are all part of the hardware. An embedded SIM card facilitates two-way communication
with the medical centre and loved ones at home. Below is the output indicating the information will be sent
via GSM and GPS module. It's what chooses the tone and who to call (figure 8).

Figure 8: Alert System for Vehicle Accident

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 10


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

Conclusion
The suggested system makes use of the Internet of Things to detect and alert authorities to car accidents, as
well as to monitor vehicles via GPS modem. In this project we have created IOT based car accident
detection and tracking system using GPS modem. Consequently, IoT has the potential to dramatically alter
the way systems interact and respond in a wide range of contexts, including traffic management. This
strategy is the best and most practical option to improve the emergency care given to people injured in car
crashes. An instant response can be made in the event of an accident with the aid of this technology by
sending a message to the appropriate parties. In the event of an accident, the occupants of the car will be
protected from harm by the airbag system, which can communicate with this device to prevent them from
colliding with the dashboard, the steering wheel, or the window. Connecting a camera to the controller
module and taking a picture of the scene of the accident would also be a useful improvement, since it would
facilitate tracking.
References
1. M.Aloqaily,B.Kantarci, and H.T. Mouftah,”vehicular clouds:state of the art,challenges and future
direction,”in proc.IEEE Jordan Conf,Appl Elect. Eng.Comput.Technol.(AEECT),Nov 2015
2. R.I.Meneguette,peer-to peer protocol for allocated resource in vehicular cloud based on V2V
communication, in proc. Wirless communication network.conf.(WCNC),San Francisco,CA,USA, May
2017.
3. W.Zhan, c.Liu, C-Y Chan, and M.Tomizuka, “A non-conservatively defentive strategy for urban
autonomous driving,”in proc. IEEE 19th Int. Conf.Intell.Transp-Syst.(ITSC),Rio de Janeiro,Brazil,
Nov.2016.
4. M. Raja and G. G. Lakshmi Priya, “Using virtual reality and augmented reality with ICT tools for
enhancing quality in the changing academic environment in COVID-19 pandemic: An empirical study,”
in Technologies, Artificial Intelligence and the Future of Learning Post-COVID-19, Cham: Springer
International Publishing, 2022, pp. 467–482.
5. M. Raja and G. G. L. Priya, “An analysis of Virtual Reality usage through a descriptive research
analysis on school students‟ experiences: A study from India,” Int. j. early child. spec. educ., vol. 13,
no. 2, pp. 990–1005, 2021.
6. M. Raja, K. Srinivasan, and S. Syed-Abdul, “Preoperative virtual reality based intelligent approach for
minimizing patient anxiety levels,” in 2019 IEEE International Conference on Consumer Electronics -
Taiwan (ICCE-TW), 2019.
7. M. Raja and G. G. L. Priya, “Conceptual origins, technological advancements, and impacts of using
Virtual Reality technology in education,” Webology, vol. 18, no. 2, pp. 116–134, 2021.
8. M. Raja and Lakshmi Priya GG, “Factors Affecting the Intention to Use Virtual Reality in Education,”
Psychology and Education, vol. 57, no. 9, pp. 2014–2022, 2020.
9. R Subramani and C Vijayalakshmi, "Design and Analysis of Lagrangian Decomposition Model,"
Global Journal of Pure and Applied Mathematics, Vol. 11, No. 4, pp. 1859-1871, October 2015.
10. R Subramani and C Vijayalakshmi, "Implementation of Optimal Scheduling Model for Power Flow
System," International Journal of Computer Aided Engineering and Technology, Vol. 11, No.2, pp.
151-162, March 2019.
11. R Subramani and C Vijayalakshmi, "Augmented Lagrangian Algorithm for Hydrothermal Scheduling,"
EAI Endorsed Transactions on Energy Web, Vol. 5, No. 18, June 2018. DOI: 10.4108/eai.12-6-
2018.154815
12. Subramani R and Vijayalakshmi C, "A Review on Advanced Optimization Techniques," ARPN Journal
of Engineering and Applied Sciences, Vol. 11, No.19, pp. 11675-11683, October 2016.

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 11


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

13. R Subramani and C Vijayalakshmi, "Design and Analysis of Lagrangian Algorithm for Power Flow
System using Renewable Energy Resources," Indonesian Journal of Electrical Engineering and
Computer Science, Vol. 7, No.8, pp. 348-355, August 2017.
14. Subramani, R., Vijayalakhsmi, C. (2016). Design of Lagrangian Decomposition Model for Energy
Management Using SCADA System. In: Proc. of the 3rd International Symposium on Big Data and
Cloud Computing Challenges. Smart Innovation, Systems and Technologies, vol 49, pp. 353-361.
15. R Subramani and C Vijayalakshmi, (2022), “Augmented Lagrangian Model to Analyze the Synergies of
Electric Urban Transport System Optimal Inventory Systems and Energy Distributions in Smart Cities”,
In Smart Building Digitalization, 1st ed, pp.189-202, CRC Press, eBook ISBN: 9781003240853.
16. S. T. Chavali, C. T. Kandavalli, S. T M and S. R, "Grammar Detection for Sentiment Analysis through
Improved Viterbi Algorithm," 2022 International Conference on Advances in Computing,
Communication and Applied Informatics (ACCAI), 2022, pp. 1-6.
17. A. Virigineni, M. Tanuj, A. Mani and S. R, "Stock Forecasting using HMM and SVR," 2022
International Conference on Communication, Computing and Internet of Things (IC3IoT), 2022, pp. 1-
7.
18. S. S. Teja Gontumukkala, Y. S. Varun Godavarthi, B. R. Ravi Teja Gonugunta and S. R, "Kalman Filter
and Proportional Navigation Based Missile Guidance System," 2022 8th International Conference on
Advanced Computing and Communication Systems (ICACCS), 2022, pp. 1731-1736.
19. A. H. N. S. Chandana Sarvani, B. Sai Bharath, P. R. Vijaya Bharathi Reddy and S. R, "AI-Driven
Medical Imaging Analysis for COVID-19 Detection," 2022 International Conference on Electronics and
Renewable Systems (ICEARS), 2022, pp. 1799-1804.
20. N. V. Sai Prakash Nagulapati, S. R. Venati, V. Chandran and S. R, "Pedestrian Detection and Tracking
Through Kalman Filtering," 2022 International Conference on Emerging Smart Computing and
Informatics (ESCI), 2022, pp. 1-6.
21. Y. L. Prasanna, Y. Tarakaram, Y. Mounika and R. Subramani, "Comparison of Different Lossy Image
Compression Techniques," 2021 International Conference on Innovative Computing, Intelligent
Communication and Smart Electrical Systems (ICSES), 2021, pp. 1-7.
22. B. Murugadoss, S. N. R. Karna, J. S. Kode and R. Subramani, "Blind Digital Image Watermarking
using Henon Chaotic Map and Elliptic Curve Cryptography in Discrete Wavelets with Singular Value
Decomposition," 2021 International Symposium of Asian Control Association on Intelligent Robotics
and Industrial Automation (IRIA), 2021, pp. 203-208.
23. W.M. Hameed and N.A. Ali,” Enhancing imputation techniques performance utilizing uncertainty
aware predictors and adversarial learning,” Periodicals of Engineering and Natural Sciences (PEN), vol.
10(3), pp.350-367, Jun 2022.
24. W. M. Hameed, “The Role of Crossover on Optimization of a Function Problem Using Genetic
Algorithms,” International Journal of Computer Science and Mobile Computing, vol.5 (7), pp. 425-429,
jul.2016.
25. W. M. Hameed, A. B. Kanbar, J. A. Zarnan,” Fast Algorithms To Find The Shortest Path Using
Matrices,” International Journal Of Scientific & Technology Research, vol. 7 (8),pp.159-161, Aug.
2018.
26. W. M. Hameed, A. B. Kanbar,” A comparative study of crossover operators for genetic algorithms to
solve travelling salesman problem,” International Journal of Research–Granthaalayah, vol.5 (2),
pp.284-291, Feb. 2017.
27. W. M. Hameed, A. B. Kanbar, “Using GA for evolving weights in neural networks,” Applied Computer
Science, vol. 15 (3), pp.21-33. Sep.2019.

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 12


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

28. J. A. Zarnan, W. M. Hameed, ”A comparison study between two approaches for solution of Urysohn
integral equation by using statistical method,” Int. J. Adv. Appl. Math. and Mech., vol.5 (4) , pp.65-68,
2018.
29. J. A. Zarnan, W. M. Hameed , “On The Numerical Eigenvalues of a Spring-Mass System,”
International Journal of Computer Science and Mobile Computing, vol. 5(8), pp.51-54, Aug.2016.
30. J. A. Zarnan, W. M. Hameed , A. B .Kanbar, “A novel Approach for Solution of a Love‟s Integral
Equation Using Chebyshev Polynomials,” Int. Adv. Appl. Math. And Mech., 7(3), 96-101, March 2020.
31. Niteesh Kumar Upadhyay and Mahak Rathee , "Protection Of Cultural Property Under International
Humanitarian Law: Emerging Trends” Brazilian Journal of International Law Volume 17, No.3 ,
pp.390-409.
32. Upadhyay N.K. Bride Trafficking in India: Aspects, Causes and Potential Solutions. BRICS Law
Journal. 2021;8(3):67-92.
33. iteesh Kumar Upadhyay, Mahak Rathee (2022). Cyber Security in the Age of Covid-19: A Timeline
and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. Medicine, Law & Society,
15(1), 89-106.
34. Niteesh Kumar Upadhyay, "New Methods of Teaching Law Problems & Perspectives "Proceedings of
IYSW, (2020), vol. 9, pp 376-396.
35. Niteesh Kumar Upadyay, Mahak Rathee, An Analysis of Corporate Social Responsibility in India
Withspecial Reference to Covid-19 Situation, Revista do Curso de Direito da Universidade Candido
Mendes, Vol. 1 no. 1, 2021, p. 42-61.
36. Rashid, R. F., Çalta, M., & Başusta, A. (2018). Length-Weight Relationship of Common Carp
(Cyprinus carpio L., 1758) from Taqtaq Region of Little Zab River, Northern Iraq. Turkish Journal of
Science and Technology, 13(2), 69-72.
37. Pala, G., Caglar, M., Faruq, R., & Selamoglu, Z. (2021). Chlorophyta algae of Keban Dam Lake
Gülüşkür region with aquaculture criteria in Elazıg, Turkey. Iranian Journal of Aquatic Animal Health,
7(1), 32-46.
38. Rashid, R. F., & Basusta, N. (2021). Evaluation and comparison of different calcified structures for the
ageing of cyprinid fish leuciscus vorax (heckel, 1843) from karakaya dam lake, turkey. Fresenius
environmental bulletin, 30(1), 550-559.
39. Kumar, Dhurjati .Rajeswara , Lanke, Govinda Rajulu, “Survey Of Cloud Computing and Its
Development And Problem Solving,” International Journal of Innovative Research Explorer(ijire), vol.
6, no. 11, p. 8, 2018.
40. Govinda rajulu Lanke and T.Bhuvaneswari, “Giving Intelligence to SMEs Business,” International
Journal of Business Intelligent, vol. 04, no. 02, p. 5, 2015.
41. Lanke, Govinda Rajulu, “The Certainty of Bi System For SME,” IJCSERD, vol. 1, no. 1, p. 4, 2014.
42. Lanke, Govinda Rajulu, “Strategic objectives modeling architecture for Real-Time Business
Intelligence (BI),” International Journal of Scientific and Technology Research, vol. 2, no. 6, p. 4, 2013.
43. Lanke, Govinda Rajulu. (2013), “Adaptation of Saas In B Usiness I Ntelligence For SME,” IJOAR .org,
vol. 1, no.3, p.14, 2013.
44. Lanke, Govinda Rajulu, “The Inevitability of BI systems for SME,” International Conference On
Emerging Trends In Science, Engineering And Technology, vol. 1, no. 3, p. 14, 2012.
45. Deo, G. S., Mishra, A., Jalaluddin, Z. M., & Mahamuni, C. V. (2020, September). Predictive analysis of
resource usage data in academic libraries using the vader sentiment algorithm. In 2020 12th
International Conference on Computational Intelligence and Communication Networks (CICN) (pp.

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 13


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

221-228). IEEE.
46. Deo, G. S., Totlani, J. A., Mamidi, K. E., & Mahamuni, C. V. (2020, May). Performance Analysis of
BiMOS Differential Pair with Active Load, Wilson and Widlar Current Mirrors, and Diode Connected
Topology. In 2020 4th International Conference on Intelligent Computing and Control Systems
(ICICCS) (pp. 99-104). IEEE.
47. Deo, G., Totlani, J., & Mahamuni, C. (2022, April). Detection of COVID-19 and Prediction of
Pneumonia from Chest X-Rays using Deep Learning. In 2022 IEEE 11th International Conference on
Communication Systems and Network Technologies (CSNT) (pp. 232-238). IEEE.
48. Goud, C. S., Das, S., Kumar, R., Mahamuni, C. V., & Khedkar, S. (2020, July). Wireless Sensor
Network (WSN) Model for Shrimp Culture Monitoring using Open Source IoT. In 2020 Second
International Conference on Inventive Research in Computing Applications, (pp. 764-767). IEEE.
49. Jose, J. M., Jose, J. V., & Vijaykumar Mahamuni, C. (2020). Multi-Biosensor based Wireless Body
Area Networks (WBAN) for Critical Health Monitoring of Patients in Mental Health Care Centers: An
Interdisciplinary Study. International Journal of Research in Engineering, Science and Management, 3.
50. Mahamuni, C. V. (2015). Metamaterial based Electromagnetic Cloaking: A Survey. International
Journal of Advance Foundation and Research in Science and Engineering (IJAFRSE), 2(5), 15-20.
51. Mahamuni, C. V. (2016, December). A military surveillance system based on wireless sensor networks
with extended coverage life. In 2016 International conference on global trends in signal processing,
information computing and communication (ICGTSPICC) (pp. 375-381). IEEE.
52. Mahamuni, C. V. (2016, December). Performance enhancement of microstrip patch antenna using
metamaterial cover. In 2016 International Conference on Global Trends in Signal Processing,
Information Computing and Communication (ICGTSPICC) (pp. 382-388). IEEE.
53. Mahamuni, C. V. (2020). Space-Time Adaptive Processing (STAP) Techniques for Mitigation of
Jammer Interference and Clutter Suppression in Airborne Radar Systems: A MATLAB
Implementation-Based Study. IUP Journal of Telecommunications, 12(4), 31-45.
54. Mahamuni, C. V., & Jalauddin, Z. M. (2021, December). Intrusion Monitoring in Military Surveillance
Applications using Wireless Sensor Networks (WSNs) with Deep Learning for Multiple Object
Detection and Tracking. In 2021 International Conference on Control, Automation, Power and Signal
Processing (CAPS) (pp. 1-6). IEEE.
55. Mahamuni, C. V., & Reddy, K. T. (2016). A Robust Coverage based on Optimal Backoff Sleep Time in
Wireless Sensor Networks. ME Dissertation (Supervisor: Prof (Dr) KTV Reddy), Dept. of Electronics
and Telecommunication Engineering, FCRIT-Vashi, University of Mumbai.
56. Mahamuni, C. V., & Reddy, K. T. V. (2017). Optimal Node Scheduling based on Randomized Sleep
Assignment and Active Node Failure for Energy-Efficient Coverage of WSNs. Networking and
Communication Engineering, 9(3), 72-80.
57. Mahamuni, C. V., Reddy, K. T. V., & Patnaik, N. (2016, November). Optimal backoff sleep time based
protocol for prolonged network life with blacklisting of failure-prone nodes in wireless sensor networks.
In 2016 Online International Conference on Green Engineering and Technologies (IC-GET) (pp. 1-6).
IEEE.
58. Allugunti VR Reddy CKK , Elango NM (2021). Prediction of Diabetes Using Internet of Things (IoT)
and Decision Trees: SLDPS, Intelligent Data Engineering and Analytics, 2021
59. Allugunti V.R (2022). A machine learning model for skin disease classification using convolution
neural network. International Journal of Computing, Programming and Database Management 3(1),
141-147.
60. Allugunti V.R (2022). Breast cancer detection based on thermographic images using machine learning

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 14


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

and deep learning algorithms. International Journal of Engineering in Computer Science 4(1), 49-56.
61. Allugunti, V., M, E. & Reddy, C. K. (2019). Diabetes kaggle dataset adequacy scrutiny using factor
exploration and correlation. International Journal of Recent Technology and Engineering, 8(1
SpecialIssue4):1105–1110.
62. Allugunti,V.R., Kishor Kumar Reddy, C., Elango, N.M., Anisha, P.R. (2021). Prediction of Diabetes
Using Internet of Things (IoT) and Decision Trees: SLDPS. In: Satapathy, S., Zhang, YD., Bhateja, V.,
Majhi, R. (eds) Intelligent Data Engineering and Analytics. Advances in Intelligent Systems and
Computing, vol 1177. Springer, Singapore. https://doi.org/10.1007/978-981-15-5679-1_43
63. D.Jayaramaiah, A.Prasanth, A.Viswanatha Reddy, Dr.Anirban Basu, 2012, Multi Agent Management
System for Next Generation Mobile Networks. [MAMS for NGMN], International Journal Of
Engineering Research & Technology, Volume 01, Issue 07 (September 2012)
64. Dang, N., Khanna, A., Allugunti, V.R. (2021). TS-GAN with Policy Gradient for Text Summarization.
In: Khanna, A., Gupta, D., Pólkowski, Z., Bhattacharyya, S., Castillo, O. (eds) Data Analytics and
Management. Lecture Notes on Data Engineering and Communications Technologies, vol 54. Springer,
Singapore. https://doi.org/10.1007/978-981-15-8335-3_64
65. Jha, R. et al. (2021). Voice-Based Gender Identification Using qPSO Neural Network. In: Khanna, A.,
Gupta, D., Pólkowski, Z., Bhattacharyya, S., Castillo, O. (eds) Data Analytics and Management.
Lecture Notes on Data Engineering and Communications Technologies, vol 54. Springer, Singapore.
https://doi.org/10.1007/978-981-15-8335-3_66
66. Kishan B M, Dr. D. Jayaramaiah. A Survey on Optimized QOS Provisioning for NGMN//. International
Journal of Innovative Research in Computer and Communication Engineering. Vol. 3, Issue 4, April
2015.-p.p 2908 – 2915.
67. Mahamuni, C., Reddy, D. K., & Patnaik, M. N. (2015, October). Dielectric Response of Rectangular
Planar Antenna and Characterization of Metamaterial Superstrates As Low Loss Dielectric for
Improved Radiation: A Study. In Proceedings of THINKQUEST 2nd International Conference on"
Contours of Digital Technology"(ICCDT-2015) (pp. 46-52).
68. Mahamuni, C., Reddy, K. T. V., & Patnaik, N. (2015). An Energy Efficient Performance in Wireless
Sensor Networks: A Literature Survey. Research Chronicler, A Multidisciplinary Research Journal,
3(7), 39-54.
69. Mahamuni, C., Reddy, K. T. V., & Patnaik, N. (2015). Study of Metamaterials as an Emerging
Technology in Microwave and Millimeterwave Wireless Communication. Research Chronicler
International Multidisciplinary Research Journal (RCIMRJ), 3(VII), 20-25.
70. Mahamuni, C., Reddy, K. T. V., & Patnaik, N. (2015, December). A Graphene Monolayer-based
Plasmonic Patch Antenna for Microwave and Millimeterwave Wireless Communication. In Proceedings
of 11th International Conference on Microwaves Antennas & Remote Sensing ICMARS-2015, Jodhpur,
INDIA (pp. 190-193).
71. Mahamuni, C., Reddy, K. T. V., & Patnaik, N. A Literary Study of Coverage and Connectivity in
Wireless Sensor Networks for Optimal Performance. International Journal of Engineering and
Management (IJERM), 2, 28-31.
72. Mahamuni, C., Reddy, K. T. V., & Patnaik, N. A Relative Study and Analysis of Various Energy
Efficiency Schemes in Wireless Sensor Networks. International Journal of Advanced Research in
Electrical, Electronics and Instrumentation Engineering (IJAREEIE), 4, 7919-7923.
73. Mishra, A., Jalaluddin, Z. M., & Mahamuni, C. V. (2022, April). Air Quality Analysis and Smog
Detection in Smart Cities for Safer Transport using Machine Learning (ML) Regression Models. In
2022 IEEE 11th International Conference on Communication Systems and Network Technologies
(CSNT) (pp. 200-206). IEEE.

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 15


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

74. N. Verma, S. Patil, B. Sinha and Vikram Kulkarni, "Object Detection for COVID Rules Response and
Crowd Analysis," 2021 Innovations in Power and Advanced Computing Technologies (i-PACT), 2021,
pp. 1-6.
75. Prof. D. Jayaramaiah,A. Viswanatha Reddy,Srikishan. D. Agent based User Interface Design for
Mobile Cloud Computing Environment (AUID) , International Journal of Engineering Innovations and
Research, Volume 1 Issue 3, May 2012
76. Reddy DAB A. Viswanatha, Jayaramaiah D., Prasanth A. (2012). Multi Agent Management System for
Next Generation Mobile Networks [MAMS for NGMN], International Journal of Engineering Research
& Technology (IJERT), Vol.1
77. Reddy, V., Allugunti, , M, E. & Reddy, C. K. (2019). Internet of things based early detection of
diabetes using machine learning algorithms: Dpa. International Journal of Innovative Technology and
Exploring Engineering, 8(10):1443–1447.
78. S. Kumar, and S. Mookiah, " Contemporary Scenario of Small Scale Industries in Tirunelveli District,"
Journal of Xi'an University of Architecture & Technology, vol. XII, no. II, p. 1155, 2020.
79. S. Kumar, and Suriya Hamid, " Neuro Robotic Learning Methodology: Successful Experiences through
Robotics at the Initial, Primary and Secondary Level," International Journal of Pharmaceutical
Research, vol. 13, no. 2, p. 4135, 2021.
80. S. Kumar, and Suriya Hamid, " The Role of Cultural Organizations, Leadership Services, Job
Satisfaction towards Organizational Citizenship Behavior: A Path Analysis Study in Private Primary
Schools," International Journal of Pharmaceutical Research, vol. 13, no. 2, p. 4120, 2021.
81. Suriya Hamid, and S. Kumar, " Desicision Making Capability On Personal Life Along With Work
Among Service Sector Women," International Journal of Pharmaceutical Research, vol. 13, no. 2, p.
4114, 2021.
82. V. Chaudhary, Z. Dalwai and Vikram Kulkarni, "Intelligent Distraction and Drowsiness Detection
System for Automobiles," 2021 International Conference on Intelligent Technologies (CONIT), 2021,
pp. 1-4, doi: 10.1109/CONIT51480.2021.9498562.
83. V. Reddy Allugunti and N. Elango, "Development of a Generic Secure Framework for Universal
Device Interactions in IoT of Fifth Generation Networks," 2018 Second World Conference on Smart
Trends in Systems, Security and Sustainability (WorldS4), 2018, pp. 238-245, doi:
10.1109/WorldS4.2018.8611592.
84. V. Reddy Allugunti and N. Elango, "Development of a Generic Secure Framework for Universal
Device Interactions in IoT of Fifth Generation Networks," 2018 Second World Conference on Smart
Trends in Systems, Security and Sustainability (WorldS4),2018,pp.238-245.
85. Vikram K, Sarat Kumar Sahoo, K. V. L. Narayana, “A Survey on Interference Avoiding Methods for
Wireless Sensor Networks working in the 2.4GHz Frequency Band”, Vol. 13, Number 3, Pg No: 59 –
81, July-2020, Journal of Engineering Science and Technology Review,
86. Waleed, ZongguoMa, FazliWahid, & S.Kumar, " Measuring the Perception of Chinese Residents in
Response to Influence of COVID-19 on Tourism Industry in China," Linguistica Antverpiensia, no. 02,
p. 2182, 2021.
87. Yuvaraj. P, Vikram K, K. Venkata Lakshmi Narayana, A Review on state of art variants of LEACH
protocol for Wireless Sensor Networks, Sensors & Transducers Journal, ISSN 1726-5479, U.K. vol.
186, Issue 3, pp.25-32, March 2015.
88. T. Akila, A. Vadivukarasi, M. Swathi, A. Ramya, B. Poorani, and S.Kumar, " Search for Identity in
Edward Albee‟s Who‟s Afraid of Virginia Woolf?," Journal of Positive School Psychology, vol. 06 no.
04, p. 9272, 2022.

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 16


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

89. S. Kumar, and U. Varsha, " Economic and Health Impact of Migrant Workers during Covid-19 Period
in Musiri Block at Tiruchirappalli District," International Journal of Early Childhood Special Education
(INT-JECS), vol. 14, no. 3, p. 9650, 2022.
90. S. Kumar, " A Study on the Impact of Covid – 19 Lockdown in Manapparai Steel Industry," Turkish
Online Journal of Qualitative Inquiry (TOJQI), vol. 12, no. 4, p. 1329, 2021.
91. S. Kumar, " The Impact Of Gaja Cyclone On Paddy And Rural Infrastructure In Thettanviduthi Village,
(Pudukkottai District) Tamil Nadu, India," Journal of Elementary Education Online, vol. 20, no. 6, p.
2867, 2021.
92. Parvathi K, Santhi T, Makeswari M, Nirmaladevi V, Rathinam R. Ricinus Communis Activated
Charcoal Preparation, Characterization and Application for Methyl Red Adsorptive Removal. Orient J
Chem 2022;38(1), Pg. 110-117.
93. Rathinam R, Brindha T, Petchiammal M, Mohamed Ibrahim A, Photo-Electrocatalytic Degradation Of
Aqueous Rhodamine B Dye Using Titanium Electrodes Coated With RuO2/IrO2/TaO2, Indian Journal
of Environmental protection, 41(12), pp.1365-1371, 2021.
94. Umadevi M, Rathinam R, Brindha T, Dheenadhayalan S, Pattabhi S, Application of Electro- Chemical
Oxidation for the Treatment of Reactive Red 195 using Graphite Electrode, Asian Journal of Biological
and Life Sciences, 2022,10 (3), 620-625.
95. Brindha T, Rathinam R, Dheenadhayalan S, Sivakumar R. Nanocomposite Coatings in Corrosion
Protection Applications: An Overview . Orient J Chem 2021;37(5), Pg.1062-1067.
96. J. Żywiołek, J. Rosak-Szyrocka, M. A. Khan, and A. Sharif, “Trust in Renewable Energy as Part of
Energy-Saving Knowledge,” Energies, vol. 15, no. 4, p. 1566, 2022, doi: 10.3390/en15041566.
97. J. Żywiołek, J. Rosak-Szyrocka, and B. Jereb, “Barriers to Knowledge Sharing in the Field of
Information Security,” Management Systems in Production Engineering, vol. 29, no. 2, pp. 114–119,
2021, doi: 10.2478/mspe-2021-0015.
98. S. Tiwari, J. Rosak-Szyrocka, and J. Żywiołek, “Internet of Things as a Sustainable Energy
Management Solution at Tourism Destinations in India,” Energies, vol. 15, no. 7, p. 2433, 2022, doi:
10.3390/en15072433.
99. J. Rosak-Szyrocka, J. Żywiołek, and M. Mrowiec, “Analysis of Customer Satisfaction with the Quality
of Energy Market Services in Poland,” Energies, vol. 15, no. 10, p. 3622, 2022, doi:
10.3390/en15103622.
100. J. Rosak-Szyrocka, J. Zywiolek, A. Zaborski, S. Chowdhury, and Y.-C. Hu, “Digitalization of higher
education around the Globe during covid-19,” IEEE Access, p. 1, 2022, doi:
10.1109/access.2022.3178711.
101. Ravi Kumar Gupta, “A Study on Occupational Health Hazards among Construction Workers in India”,
International Journal of Enterprise Network Management. Vol. 12, No. 4, pp. 325-339, 2021.
102. Ravi Kumar Gupta, “Adoption of Mobile Wallet Services: An Empirical Analysis”, Int. J. of
Intellectual Property Management, 2022, DOI: 10.1504/IJIPM.2021.10035526
103. Ravi Kumar Gupta, “Utilization of Digital Network Learning and Healthcare for Verbal Assessment
and Counselling During Post COVID-19 Period”, Technologies, Artificial Intelligence and the Future of
Learning Post-COVID-19. Springer Nature, Switzerland, pp. 117-134, 2022.
104. P. Bhadola, B. Kunakhonnuruk, A. Kongbangkerd, and Y. M. Gupta, "Analysis of microenvironment
data using low-cost portable data logger based on a microcontroller," ECS Transactions, vol. 107, no. 1,
p. 15099, 2022.
105. Y. M. Gupta, K. Buddhachat, S. Peyachoknagul, and S. Homchan, "Novel DNA barcode sequence

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 17


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

discovery from transcriptome of Acheta domesticus: a partial mitochondrial DNA," in Materials


Science Forum, 2019, vol. 967: Trans Tech Publ, pp. 59-64.
106. Y. M. Gupta, K. Buddhachat, S. Peyachoknagul, and S. Homchan, "Collection of Mitochondrial tRNA
Sequences and Anticodon Identification for Acheta domesticus," in Materials Science Forum, 2019, vol.
967: Trans Tech Publ, pp. 65-70.
107. Y. M. Gupta and S. HOMCHAN, "Insect detection using a machine learning model," Nusantara
Bioscience, vol. 13, no. 1, 2021.
108. S. Homchan, P. Bhadola, and Y. M. Gupta, "Statistical Analysis of Simple Sequence Repeats in
Genome Sequence: A Case of Acheta Domesticus (Orthoptera: Gryllidae)," ECS Transactions, vol. 107,
no. 1, p. 14799, 2022.
109. Eliwa, M. M. The effect of some different types of learning within training programs in terms of self-
determination theory of motivation on developing self-Academic identity and academic buoyancy and
decreasing of mind wandering among university students in Egypt. Journal of Education -Sohag
University, 92(92), 1–29, 2021.
110. Eliwa, M. M; Al Badri, A.H. Long and Short-Term Impact of Problem-Based and Example-Based
STEM Learning on the Improvement of Cognitive Load among Egyptian and Omani Learners. Journal
of Scientific Research in Education (JSRE)- Ain Shams University, 22(3), 713-742, 2021.
111. Eliwa, M. M. The Effectiveness of Digital Transformation of Learning on Students' Learning
Experience, Students' Engagement and Perceived Intellectual Competence: A Mixed-Method Approach.
Journal of Educational and Psychological Sciences- Fayoum University,15(3), 848-890, 2021.
112. Eliwa, M. M; Alshoukary, H. A. (2022). Modeling Causal Relationships between Academic
Adjustment, Academic Striving and Future Expectations on Psychological Resilience and Cognitive
Modifiability among Elementary School Students. Journal of the Faculty of Education Beni-Suef
University(JFE), 19(116), 655-694.
113. SS Priscila, M Hemalatha, “Improving the performance of entropy ensembles of neural networks
(EENNS) on classification of heart disease prediction”, Int J Pure Appl Math 117 (7), 371-386, 2017.
114. S Silvia Priscila, M Hemalatha, “ Diagnosisof heart disease with particle bee-neural network”
Biomedical Research, Special Issue, pp. S40-S46, 2018.
115. S Silvia Priscila, M Hemalatha, “ Heart Disease Prediction Using Integer-Coded Genetic Algorithm
(ICGA) Based Particle Clonal Neural Network (ICGA-PCNN)”, Bonfring International Journal of
Industrial Engineering and Management Science 8 (2), 15-19, 2018.
116. Jalil, N.A., P Prapinit, M Melan, AB Mustaffa (2019). Adoption of Business Intelligence-
Technological, Individual and Supply Chain Efficiency. Proceedings of the 2019 International
Conference on Machine Learning, Big Data and Business Intelligence. Year: 2019, Volume: 1, Pages:
67-73.
117. Jalil, N.A., Hwang, H.J. (2019). Technological-centric business intelligence: Critical success factors.
International Journal of Innovation, Creativity and Change, Volume 5, Issue 2, August, 2019, Pages
1499 to 1516.
118. Nasir Abdul Jalil and Koay Kian Yeik. 2019. Systems, Design and Technologies Anxieties Towards
Use of Self-service Checkout. In Proceedings of the 2019 3rd International Conference on Education
and E-Learning (ICEEL 2019). Association for Computing Machinery, New York, NY, USA, 122–127.
119. B. Singh, N. A. Jalil, D. K. Sharma, S. R, K. Kumar and D. Jebakumar immanuel, "Computational
systems overview and Random Process with Theoretical analysis," 2021 7th International Conference
on Advanced Computing and Communication Systems (ICACCS), 2021, pp. 1999-2005.
120. Roy Setiawan, Luigi Pio Leonardo Cavaliere, KartikeyKoti, Gabriel Ayodeji Ogunmola, N. A. Jalil, M.

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 18


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

Kalyan Chakravarthi, S. Suman Rajest, R. Regin, Sonia Singh, "The Artificial Intelligence and
Inventory Effect on Banking Industrial Performance"Turkish Online Journal of Qualitative Inquiry
(TOJQI). Volume 12, Issue 6, July, 2021: 8100-8125.
121. Roespinoedji, D., Juniati, S., Hasan, H., Jalil, N.A., Shamsudin, M.F., 2019. Experimenting the long-
haul association between components of consuming renewable energy: ARDL method with special
reference to Malaysia. Int. J. Energy Econ. Policy 9, 453–460.
122. D. K. Sharma, N. A. Jalil, V. K. Nassa, S. R. Vadyala, L. S. Senthamil and T. N, "Deep learning
Applications to classify Cross-Topic Natural Language Texts Based on Their Argumentative Form,"
2021 2nd International Conference on Smart Electronics and Communication (ICOSEC), 2021, pp.
1580-1586.
123. D. K. Sharma, N. A. Jalil, R. Regin, S. S. Rajest, R. K. Tummala and T. N, "Predicting Network
Congestion with Machine Learning," 2021 2nd International Conference on Smart Electronics and
Communication (ICOSEC), 2021, pp. 1574-1579.
124. Nasir Abdul Jalil and Mikkay Wong Ei Leen. 2021. Learning Analytics in Higher Education: The
Student Expectations of Learning Analytics. In 2021 5th International Conference on Education and E-
Learning (ICEEL 2021). Association for Computing Machinery, New York, NY, USA, 249–254.
125. Fazle Rabbi, Nasir Abdul Jalil , S. Suman Rajest , R. Regin, “ An Approximation For Monitoring The
Efficiency Of Cooperative Across Diverse Network Aspects”, Webology, Volume 17, No 2, 2020,
Pages: 1234-1247.
126. Farouk, A., Alahmadi, A., Ghose, S., & Mashatan, A. (2020). Blockchain platform for industrial
healthcare: Vision and future opportunities. Computer Communications, 154, 223-235.
127. Zhu, F., Zhang, C., Zheng, Z., & Farouk, A. (2021). Practical Network Coding Technologies and
Softwarization in Wireless Networks. IEEE Internet of Things Journal, 8(7), 5211-5218.
128. Adil, M., Song, H., Ali, J., Jan, M. A., Attique, M., Abbas, S., & Farouk, A. (2021). EnhancedAODV:
A Robust Three Phase Priority-based Traffic Load Balancing Scheme for Internet of Things. IEEE
Internet of Things Journal.
129. Adil, M., Jan, M. A., Mastorakis, S., Song, H., Jadoon, M. M., Abbas, S., & Farouk, A. (2021). Hash-
MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber-Physical Systems. IEEE Internet
of Things Journal.
130. Adil, M., Ali, J., Attique, M., Jadoon, M. M., Abbas, S., Alotaibi, S. R., ... & Farouk, A. (2021). Three
Byte-Based Mutual Authentication Scheme for Autonomous Internet of Vehicles. IEEE Transactions on
Intelligent Transportation Systems.
131. Adil, M., Khan, M. K., Jamjoom, M., & Farouk, A. (2021). MHADBOR: AI-enabled Administrative
Distance based Opportunistic Load Balancing Scheme for an Agriculture Internet of Things Network.
IEEE Micro.
132. Mendonça, R. V., Silva, J. C., Rosa, R. L., Saadi, M., Rodriguez, D. Z., & Farouk, A. (2021). A
lightweight intelligent intrusion detection system for industrial internet of things using deep learning
algorithm. Expert Systems, e12917.
133. Adil, M., Attique, M., Khan, M. M., Ali, J., Farouk, A., & Song, H. (2022). HOPCTP: A Robust
Channel Categorization Data Preservation Scheme for Industrial Healthcare Internet of Things. IEEE
Transactions on Industrial Informatics.
134. Adil, M., Khan, M. K., Jadoon, M. M., Attique, M., Song, H., & Farouk, A. (2022). An AI-enabled
Hybrid lightweight Authentication Scheme for Intelligent IoMT based Cyber-Physical Systems. IEEE
Transactions on Network Science and Engineering.
135. Aoudni, Y., Donald, C., Farouk, A., Sahay, K. B., Babu, D. V., Tripathi, V., & Dhabliya, D. (2022).

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 19


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

Cloud security based attack detection using transductive learning integrated with Hidden Markov
Model. Pattern Recognition Letters, 157, 16-26
136. Naseri, M., Heidari, S., Baghfalaki, M., Gheibi, R., Batle, J., Farouk, A., & Habibi, A. (2017). A new
secure quantum watermarking scheme. Optik, 139, 77-86.
137. Abdolmaleky, M., Naseri, M., Batle, J., Farouk, A., & Gong, L. H. (2017). Red-Green-Blue multi-
channel quantum representation of digital images. Optik, 128, 121-132.
138. Farouk, A., Batle, J., Elhoseny, M., Naseri, M., Lone, M., Fedorov, A., ... & Abdel-Aty, M. (2018).
Robust general N user authentication scheme in a centralized quantum communication network via
generalized GHZ states. Frontiers of Physics, 13(2), 1-18.
139. Farouk, A., Zakaria, M., Megahed, A., & Omara, F. A. (2015). A generalized architecture of quantum
secure direct communication for N disjointed users with authentication. Scientific reports, 5(1), 1-17.
140. Naseri, M., Raji, M. A., Hantehzadeh, M. R., Farouk, A., Boochani, A., & Solaymani, S. (2015). A
scheme for secure quantum communication network with authentication using GHZ-like states and
cluster states controlled teleportation. Quantum Information Processing, 14(11), 4279-4295.
141. Metwaly, A. F., Rashad, M. Z., Omara, F. A., & Megahed, A. A. (2014). Architecture of multicast
centralized key management scheme using quantum key distribution and classical symmetric
encryption. The European Physical Journal Special Topics, 223(8), 1711-1728.
142. Abulkasim, H., Farouk, A., Alsuqaih, H., Hamdan, W., Hamad, S., & Ghose, S. (2018). Improving the
security of quantum key agreement protocols with single photon in both polarization and spatial-mode
degrees of freedom. Quantum Information Processing, 17(11), 1-11.
143. Abulkasim, H., Farouk, A., Hamad, S., Mashatan, A., & Ghose, S. (2019). Secure dynamic multiparty
quantum private comparison. Scientific reports, 9(1), 1-16.
144. Zhou, N. R., Liang, X. R., Zhou, Z. H., & Farouk, A. (2016). Relay selection scheme for amplify‐and‐
forward cooperative communication system with artificial noise. Security and Communication
Networks, 9(11), 1398-1404.
145. Abulkasim, H., Alsuqaih, H. N., Hamdan, W. F., Hamad, S., Farouk, A., Mashatan, A., & Ghose, S.
(2019). Improved dynamic multi-party quantum private comparison for next-generation mobile
network. IEEE Access, 7, 17917-17926.
146. Naseri, M., Abdolmaleky, M., Parandin, F., Fatahi, N., Farouk, A., & Nazari, R. (2018). A new
quantum gray-scale image encoding scheme. Communications in Theoretical Physics, 69(2), 215.
147. Naseri, M., Abdolmaleky, M., Laref, A., Parandin, F., Celik, T., Farouk, A., ... & Jalalian, H. (2018). A
new cryptography algorithm for quantum images. Optik, 171, 947-959.
148. Heidari, S., Abutalib, M. M., Alkhambashi, M., Farouk, A., & Naseri, M. (2019). A new general model
for quantum image histogram (QIH). Quantum Information Processing, 18(6), 1-20.
149. AlAjmi, Mohamed F., Shakir Khan, and Abdulkadir Alaydarous. "Data Protection Control and
Learning Conducted Via Electronic Media IE Internet." International Journal of Advanced Computer
Science and Applications 5.11 (2014).
150. Khan, Shakir, Mohammed AlAjmi, and Arun Sharma. "Safety Measures Investigation in Moodle
LMS." Special Issue of International Journal of Computer Applications (2012).
151. Shakir Khan and Mohammed Alshara, “Fuzzy Data Mining Utilization to Classify Kids with Autism”,
IJCSNS International Journal of Computer Science and Network, Vol. 19 No. 2, pp. 147-154, 2018
http://search.ijcsns.org/07_book/html/201902/201902018.html
152. Shakir Khan and Mohammed Alshara, “Arabic Evaluations‟ Development in Information Retrieval”,
International Journal of Advanced and Applied Sciences, 6(12) 2019, Pages: 92-98.

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 20


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

https://doi.org/10.21833/ijaas.2019.12.011
153. Khan, Shakir, and Mohammed Ali Alshara. "Adopting Open Source Software for Integrated Library
System and Digital Library Automation." International Journal of Computer Science and Network
Security 20.9 (2020): 158-165.
154. Aakanksha Singhal and D.K. Sharma, “Seven Divergence Measures by CDF of fitting in Exponential
and Normal Distributions of COVID-19 Data”, Turkish Journal of Physiotherapy and Rehabilitation,
Vol.32(3), pp. 1212 - 1222, 2021.
155. D.K. Sharma and Haldhar Sharma, “A Study of Trend Growth Rate of Confirmed cases, Death cases
and Recovery cases in view of Covid-19 of Top Five States of India”, Solid State Technology,
Vol.64(2), pp. 4526-4541, 2021.
156. D.K. Sharma, “Information Measure Computation and its Impact in MI COCO Dataset”, IEEE
Conference Proceedings, 7th International Conference on Advanced Computing and Communication
Systems (ICACCS), Vol.1, pp. 2011-2014, 2021.
157. Aakanksha Singhal and D.K. Sharma, “Keyword extraction using Renyi entropy: a statistical and
domain independent method”, IEEE Conference Proceedings, 7th International Conference on
Advanced Computing and Communication Systems (ICACCS), Vol.1, pp. 1970-1975, 2021.
158. Aakanksha Singhal and D.K. Sharma, “Generalization of F-Divergence Measures for Probability
Distributions with Associated Utilities”, Solid State Technology, Vol.64(2), pp. 5525-5531, 2021.
159. Aakanksha Singhal and D.K. Sharma, “A Study of before and after Lockdown Situation of 10 Countries
through Visualization of Data along With Entropy Analysis of Top Three Countries”, International
Journal of Future Generation Communication and Networking, Vol.14(1), pp. 496-525, 2021.
160. Aakanksha Singhal and D.K. Sharma, “Generalized „Useful‟ Rényi & Tsallis Information Measures,
Some Discussions with Application to Rainfall Data", International Journal of Grid and Distributed
Computing, Vol. 13(2), pp. 681-688, 2020.
161. Reetu Kumari and D. K. Sharma, “Generalized `Useful non-symmetric divergence measures and
Inequalities", Journal of Mathematical Inequalities, Vol. 13(2), pp. 451-466, 2019.
162. D.S. Hooda and D.K. Sharma, “On Characterization of Joint and Conditional Exponential Survival
Entropies", International Journal of Statistics and Reliability Engineering, Vol. 6(1), pp. 29-36, 2019.
163. Reetu Kumari and D. K. Sharma, “Generalized `Useful' AG and `Useful' JS-Divergence Measures and
their Bounds", International Journal of Engineering, Science and Mathematics, Vol. 7 (1), pp. 441-450,
2018.
164. D.S. Hooda, Reetu Kumari and D. K. Sharma, “Intuitionistic Fuzzy Soft Set Theory and Its Application
in Medical Diagnosis”, International Journal of Statistics in Medical Research, Vol. 7, pp. 70-76, 2018.
165. D.K. Sharma and Sonali Saxena, “Generalized Coding Theorem with Different Source Coding
Schemes”, International Journal on Recent and Innovation Trends in Computing and Communication,
Vol. 5(6), pp. 253 – 257, 2017.
166. A.K. Gupta, Y. K. Chauhan, and T Maity, “Experimental investigations and comparison of various
MPPT techniques for photovoltaic system,” Sādhanā, Vol. 43, no. 8, pp.1-15, 2018.
167. A.K. Gupta, “Sun Irradiance Trappers for Solar PV Module to Operate on Maximum Power: An
Experimental Study,” Turkish Journal of Computer and Mathematics Education, Vol. 12, no.5,
pp.1112-1121, 2021.
168. A.K. Gupta, Y.K Chauhan, and T Maity and R Nanda, “Study of Solar PV Panel Under Partial Vacuum
Conditions: A Step Towards Performance Improvement,” IETE Journal of Research, pp.1-8, 2020.
169. A.K. Gupta, Y.K Chauhan, and T Maity, “A new gamma scaling maximum power point tracking

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 21


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

method for solar photovoltaic panel Feeding energy storage system,” IETE Journal of Research, vol.67,
no.1, pp.1-21, 2018.
170. A. K. Gupta et al., "Effect of Various Incremental Conductance MPPT Methods on the Charging of
Battery Load Feed by Solar Panel," in IEEE Access, vol. 9, pp. 90977-90988, 2021.
171. U. Zulfiqar, S. Mohy-Ul-Din, A. Abu-Rumman, A. E. M. Al-Shraah, And I. Ahmed, “Insurance-
Growth Nexus: Aggregation and Disaggregation,” The Journal of Asian Finance, Economics and
Business, vol. 7, no. 12, pp. 665–675, Dec. 2020.
172. Al-Shqairat, Z. I., Al Shraah, A. E. M., Abu-Rumman, A., “The role of critical success factors of
knowledge stations in the development of local communities in Jordan: A managerial perspective,”
Journal of management Information and Decision Sciences, vol. 23, no.5, pp. 510-526, Dec. 2020.
173. Abu-Rumman, Ayman. "Transformational leadership and human capital within the disruptive business
environment of academia." World Journal on Educational Technology: Current Issues 13, no. 2 (2021):
178-187.
174. Almomani, Reham Zuhier Qasim, Lina Hamdan Mahmoud Al-Abbadi, Amani Rajab Abed Alhaleem
Abu Rumman, Ayman Abu-Rumman, and Khaled Banyhamdan. "Organizational Memory, Knowledge
Management, Marketing Innovation and Cost of Quality: Empirical Effects from Construction Industry
in Jordan." Academy of Entrepreneurship Journal 25, no. 3 (2019): 1528-2686.
175. Alshawabkeh, Rawan, Amani Abu Rumman, Lina Al-Abbadi, and Ayman Abu-Rumman. "The
intervening role of ambidexterity in the knowledge management project success connection." Problems
and Perspectives in Management 18, no. 3 (2020): 56.
176. Abu-Rumman, Ayman. "Gaining competitive advantage through intellectual capital and knowledge
management: an exploration of inhibitors and enablers in Jordanian Universities." Problems and
Perspectives in Management 16, no. 3 (2018): 259-268.
177. Abu-Rumman, A. Al Shraah, F. Al-Madi, T. Alfalah, “Entrepreneurial networks, entrepreneurial
orientation, and performance of small and medium enterprises: are dynamic capabilities the missing
link?” Journal of Innovation and Entrepreneurship. Vol 10 Issue 29, pp 1-16. Jul 2021.
178. A.Al Shraah, A. Abu-Rumman, F. Al Madi, F.A. Alhammad, A.A. AlJboor, “The impact of quality
management practices on knowledge management processes: a study of a social security corporation in
Jordan” The TQM Journal. Apr 2021. DOI: https://doi.org/10.1108/TQM-08-2020-0183
179. Abu-Rumman, A. Al Shraah, F. Al-Madi, T. Alfalah, "The impact of quality framework application on
patients‟ satisfaction", International Journal of Human Rights in Healthcare, Vol.. Jun2021. DOI:
https://doi.org/10.1108/IJHRH-01-2021-0006.
180. Zafar, S.Z., Zhilin, Q., Malik, H., Abu-Rumman, A., Al Shraah, A., Al-Madi, F. and Alfalah, T.F.
(2021), "Spatial spillover effects of technological innovation on total factor energy efficiency: taking
government environment regulations into account for three continents", Business Process Management
Journal, Vol. 27 No. 6, pp. 1874-1891.
181. Rupapara, V., Narra, M., Gonda, N. K., & Thipparthy, K. (2020). Relevant Data Node Extraction: A
Web Data Extraction Method for Non Contagious Data. 2020 5th International Conference on
Communication and Electronics Systems (ICCES), 500–505.
182. Ishaq, A., Sadiq, S., Umer, M., Ullah, S., Mirjalili, S., Rupapara, V., & Nappi, M. (2021). Improving
the Prediction of Heart Failure Patients‟ Survival Using SMOTE and Effective Data Mining
Techniques. IEEE Access, 9, 39707–39716.
183. Rustam, F., Khalid, M., Aslam, W., Rupapara, V., Mehmood, A., & Choi, G. S. (2021). A performance
comparison of supervised machine learning models for Covid-19 tweets sentiment analysis. PLOS
ONE, 16(2), e0245909.

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 22


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

184. Yousaf, A., Umer, M., Sadiq, S., Ullah, S., Mirjalili, S., Rupapara, V., & Nappi, M. (2021b). Emotion
Recognition by Textual Tweets Classification Using Voting Classifier (LR-SGD). IEEE Access, 9,
6286–6295.
185. Sadiq, S., Umer, M., Ullah, S., Mirjalili, S., Rupapara, V., & NAPPI, M. (2021). Discrepancy detection
between actual user reviews and numeric ratings of Google App store using deep learning. Expert
Systems with Applications, 115111.
186. Rupapara, V., Narra, M., Gonda, N. K., Thipparthy, K., & Gandhi, S. (2020). Auto-Encoders for
Content-based Image Retrieval with its Implementation Using Handwritten Dataset. 2020 5th
International Conference on Communication and Electronics Systems (ICCES), 289–294.
https://doi.org/10.1109/icces48766.2020.9138007
187. D.S. Hooda, Keerti Upadhyay and D.K. Sharma, “On Parametric Generalization of „Useful‟ R- norm
Information Measure” British Journal of Mathematics & Computer Science, Vol. 8(1), pp. 1-15, 2015.
188. D.S. Hooda, Keerti Upadhyay and D.K. Sharma, “A Generalized Measure of „Useful R-norm
Information”, International Journal of Engineering Mathematics and Computer Sciences, Vol 3(5),
pp.1-11, 2014.
189. D.S. Hooda, Keerti Upadhyay and D.K. Sharma, “Bounds on Cost Measures in terms of „Useful‟ R-
norm Information Measures” Direct Research Journal of Engineering and Information Technology,
Vol.2 (2), pp.11-17, 2014.
190. D.S. Hooda and D.K. Sharma, “Lower and Upper Bounds Inequality of a Generalized „Useful‟ Mean
Code Length” GAMS Journal of Mathematics and Mathematical Biosciences, Vol. 4(1), pp.62-69,
2013.
191. D.S. Hooda, Keerti Upadhyay and D.K. Sharma, „Useful‟ R-Norm Information Measure and its
Properties” IOSR Journal of Electronics and Communication Engineering, Vol. 8, pp. 52-57, 2013.
192. D.S. Hooda, Sonali Saxena and D.K. Sharma, “A Generalized R-Norm Entropy and Coding Theorem”
International Journal of Mathematical Sciences and Engineering Applications, Vol.5(2), pp.385-393,
2011.
193. D.S. Hooda and D.K. Sharma, “Bounds on Two Generalized Cost Measures” Journal of Combinatorics,
Information & System Sciences, Vol. 35(3-4), pp. 513-530, 2010.
194. D.K. Sharma and D.S. Hooda, “Generalized Measures of „Useful‟ Relative Information and
Inequalities” Journal of Engineering, Management & Pharmaceutical Sciences, Vol.1(1), pp.15-21,
2010.
195. D.S. Hooda and D.K. Sharma (2010) “Exponential Survival Entropies and Their Properties” Advances
in Mathematical Sciences and Applications, Vol. 20, pp. 265-279, 2010.
196. D.S. Hooda and D.K. Sharma, “Generalized „Useful‟ Information Generating Functions” Journal of
Appl. Math. and Informatics, Vol. 27( 3-4), pp. 591-601, 2009.
197. D.S. Hooda and D.K. Sharma, “Non-additive Generalized Measures of „Useful‟ Inaccuracy” Journal of
Rajasthan Academy of Physical Sciences, Vol. 7(3), pp.359-368, 2008.
198. D.S. Hooda and D.K. Sharma, Generalized R-Norm information Measures-Journal of Appl. Math,
Statistics & informatics (JAMSI), Vol. 4 No.2 , 153-168, 2008.
199. Dilip Kumar Sharma, “Some Generalized Information Measures: Their characterization and
Applications”, Lambert Academic Publishing, Germany, 2010. ISBN: 978-3838386041.
200. Jerusha Angelene Christabel G, Suman Rajest S, “A Short Review on Fragmented Narration in Select
Works of Sarnath Banerjee”, American Journal of Social and Humanitarian Research, Vol. 3 No. 4, pp.
12-31, (2022).

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 23


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

201. Rajest, D. S. S., & G, J. A. C. (2022). A Brief on Past and Present a Tug of War in the Select Works of
Kurt Vonnegut. Central Asian Journal of Literature, Philosophy And Culture, 3(4), 59-79.
https://doi.org/10.17605/OSF.IO/52KAM
202. G, J. A. C., & Rajest, D. S. (2022). Fragmented Narration in Corridor‟s Thematic, Language and
Imagery. Central Asian Journal Of Arts And Design, 3(4), 15-37.
203. Steffi. R, D.K. Sharma, S. Suman Rajest, R. Regin, A. J. Obaid, and G. Jerusha Angelene Christabel,
“Perceptron in Supervised, Semi-Supervised, Unsupervised Learning and Artificial Neural Network”,
CAJOTAS, vol. 3, no. 5, pp. 176-199, May 2022.
204. A, V. V. ., T, S. ., S, S. N. ., & Rajest, D. S. S. . (2022). IoT-Based Automated Oxygen Pumping
System for Acute Asthma Patients. European Journal of Life Safety and Stability (2660-9630), 19 (7),
8-34.
205. K.B. Adanov, S. Suman Rajest, Mustagaliyeva Gulnara, Khairzhanova Akhmaral (2019), “A Short
View on the Backdrop of American‟s Literature”. Journal of Advanced Research in Dynamical and
Control Systems, Vol. 11, No. 12, pp. 182-192.
206. D Datta, S Mishra, SS Rajest, (2020) “Quantification of tolerance limits of engineering system using
uncertainty modeling for sustainable energy” International Journal of Intelligent Networks, Vol.1, 2020,
pp.1-8, https://doi.org/10.1016/j.ijin.2020.05.006
207. Leo Willyanto Santoso, Bhopendra Singh, S. Suman Rajest, R. Regin, Karrar Hameed Kadhim (2021),
“A Genetic Programming Approach to Binary Classification Problem” EAI Endorsed Transactions on
Energy, Vol.8, no. 31, pp. 1-8. DOI: 10.4108/eai.13-7-2018.165523
208. K.K.D. Ramesh, G. Kiran Kumar, K. Swapna, Debabrata Datta, and S. Suman Rajest, “A Review of
Medical Image Segmentation Algorithms”, EAI Endorsed Transactions on Pervasive Health and
Technology, 2021, doi: 10.4108/eai.12-4-2021.169184
209. R. Regin, S. Suman Rajest and Bhopendra Singh, “Fault Detection in Wireless Sensor Network Based
on Deep Learning Algorithms”, EAI Endorsed Transactions on Scalable Information Systems, 2021,
https://eudl.eu/doi/10.4108/eai.3-5-2021.169578
210. Gupta J., Singla M.K., Nijhawan P., Ganguli S., Rajest S.S. (2020) An IoT-Based Controller
Realization for PV System Monitoring and Control. In: Haldorai A., Ramu A., Khan S. (eds) Business
Intelligence for Enterprise Internet of Things. EAI/Springer Innovations in Communication and
Computing. Springer, Cham
211. Sharma M., Singla M.K., Nijhawan P., Ganguli S., Rajest S.S. (2020) An Application of IoT to Develop
Concept of Smart Remote Monitoring System. In: Haldorai A., Ramu A., Khan S. (eds) Business
Intelligence for Enterprise Internet of Things. EAI/Springer Innovations in Communication and
Computing. Springer, Cham
212. Ganguli S., Kaur G., Sarkar P., Rajest S.S. (2020) An Algorithmic Approach to System Identification in
the Delta Domain Using FAdFPA Algorithm. In: Haldorai A., Ramu A., Khan S. (eds) Business
Intelligence for Enterprise Internet of Things. EAI/Springer Innovations in Communication and
Computing. Springer, Cham
213. Ibrahim, K., Obaid, A. (2021). Fraud usage detection in internet users based on log data. International
Journal of Nonlinear Analysis and Applications, 12(2), 2179-2188. doi: 10.22075/ijnaa.2021.5367
214. Sharma, G., Kumar, J., Sharma, S., Singh, G., Singh, J., Sharma, A., Obaid, A. J. (2021). Performance
of diesel engine having waste heat recovery system fixed on stainless steel made exhaust gas pipe.
Materials Today: Proceedings.
215. Abdulreda, A., Obaid, A. (2022). A landscape view of deepfake techniques and detection methods.
International Journal of Nonlinear Analysis and Applications, 13(1), 745-755.

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 24


CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES Vol: 03 Issue: 08 | Aug 2022

216. Abdulbaqi, A., Younis, M., Younus, Y., Obaid, A. (2022). A hybrid technique for EEG signals
evaluation and classification as a step towards to neurological and cerebral disorders diagnosis.
International Journal of Nonlinear Analysis and Applications, 13(1), 773-781.
217. S. Kamal, D. Rahman and D. Singh, "Covid-19 Related Factors Associated with Antenatal Care in
Rural Bangladesh: A qualitative study", Asia Pacific Journal of Health Management, vol. 17, no. 1,
2022.
218. S. Joghee, A. Dubey and S. Singh, "Investigation of green marketing practices of UAE hypermarkets",
International Journal of Enterprise Network Management, vol. 12, no. 4, p. 367, 2021.
219. S. Singh, S. Mondal, L. Singh, K. Sahoo and S. Das, "An Empirical Evidence Study of Consumer
Perception and Socioeconomic Profiles for Digital Stores in Vietnam", Sustainability, vol. 12, no. 5, p.
1716, 2020.
220. Desfiandi, S. Suman Rajest, P. S. Venkateswaran, M. Palani Kumar and S. Singh, "Company
Credibility: A Tool To Trigger Positive Csr Image In The Cause-Brand Alliance Context In Indonesia",
Humanities & Social Sciences Reviews, vol. 7, no. 6, pp. 320-331, 2019.
221. Singh, V. Shukla and S. Singh, "An Empirical Study of Shift from SMS to Chat-App among University
Student", International Journal of Recent Technology and Engineering, vol. 7, no. 64, pp. 1-6, 2019.
222. S. Singh and S. Agarwal, "Analyzing the Medical and Non-Medical Aspects of Medical Consultation in
the City of Visakhapatnam", World Family Medicine Journal/Middle East Journal of Family Medicine,
vol. 13, no. 3, pp. 12-19, 2015.
223. S. Agarwal and S. Singh, "Customer Progression and Perception about Premium Men's Apparel Brands:
A Case of Indian Male Professionals", Middle East Journal of Business, vol. 10, no. 1, pp. 50-56, 2015.
224. Singh, S. (2022). Process improvement approach to transform online business education in the post-
COVID world. Journal of Learning for Development, 9(2), 363-369.
225. Shahzad, F., Abid, F., Obaid, A., Kumar Rai, B., Ashraf, M., Abdulbaqi, A. (2021). Forward stepwise
logistic regression approach for determinants of hepatitis B & C among Hiv/Aids patients. International
Journal of Nonlinear Analysis and Applications, 12(Special Issue), 1367-1396.
226. Agarwal, P., Idrees, S. M., & Obaid, A. J. (2021). Blockchain and IoT Technology in Transformation of
Education Sector. International Journal of Online and Biomedical Engineering (iJOE), 17(12), pp. 4–18.
227. Akbar, A., Agarwal, P., Obaid, A. (2022). Recommendation engines-neural embedding to graph-based:
Techniques and evaluations. International Journal of Nonlinear Analysis and Applications, 13(1), 2411-
2423.
228. Shahab S., Agarwal P., Mufti T., Obaid A.J. (2022) SIoT (Social Internet of Things): A Review. In:
Fong S., Dey N., Joshi A. (eds) ICT Analysis and Applications. Lecture Notes in Networks and
Systems, vol 314. Springer, Singapore. https://doi.org/10.1007/978-981-16-5655-2_28

© 2022, CAJMTCS | CENTRAL ASIAN STUDIES www.centralasianstudies.org ISSN: 2660-5309 | 25

You might also like