Muthukrishan S E N T H I L K U M A R PSG CT | PSG college of Technology (original) (raw)

Papers by Muthukrishan S E N T H I L K U M A R PSG CT

Research paper thumbnail of Strategic access in a Green IoT(Internet of Things) system with an unreliable server

Performance Evaluation, 2022

The present research aims to study the strategic behaviour of users in an Internet of Things(IoT)... more The present research aims to study the strategic behaviour of users in an Internet of Things(IoT) system that is impeded by an unreliable server. In the system, an IoT device is equipped with an energy harvesting unit. The IoT system under study is employed as a Markovian retrial queueing system that is used in a single server, subject to active failures. The failed server is repaired immediately, while the user who was served before the system's breakdown event waits in the server until the server is repaired. The generating function approach is used to identify important system performance metrics. Moreover, queueing theory concepts are incorporated into game theory for the analysis of the users' strategies. The users in the IoT system, act to maximize their expected benefit without being perturbed by other users in the system and determine their equilibrium joining strategies. Furthermore, taking into account social welfare factors, the IoT device acts as a social planner, and as a consequence, socially optimal joining strategies are also analysed. Finally, the analytical findings are validated with numerical examples.

Research paper thumbnail of On the Age of Status Updates in Unreliable Multi-Source M/G/1 Queueing Systems

IEEE Communications Letters , 2023

The timeliness of status message delivery in communications networks is subjective to time-varyin... more The timeliness of status message delivery in communications networks is subjective to time-varying wireless channel transmissions. In this paper, we investigate the age of information (AoI)ofeachsourceinamulti-sourceM/G/1queueingupdatesystem with active server failures. In particular, we adopt the method of supplementary variables to derive a closed-form expression for the average AoI in terms of system parameters, where the server repair time follows a general distribution and the service time of packets generated by independent sources is a general random variable. Numerical results are provided to validate the effectiveness of the proposed packet serving policy under different parametric settings.

Research paper thumbnail of Performance analysis of a single server retrial queue with working vacation

Research paper thumbnail of Dynamics of Trachoma Epidemic in Human Contact Network with Seasonally Varying Infectious Medium

Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 2021

Research paper thumbnail of On the Retrial-Queuing Model for Strategic Access and Equilibrium-Joining Strategies of Cognitive Users in Cognitive-Radio Networks with Energy Harvesting

Energies, 2021

This article studies the strategic access of single-server retrial queue with two types of custom... more This article studies the strategic access of single-server retrial queue with two types of customers, where priority is given according to their category. On the basis of this concept, a cognitive-radio network was developed as retrial queue with energy harvesting. Cognitive radio allows for a secondary user to opportunistically access the idle spectrum of a primary user (PU). Upon arrival of a primary user, the service given to the secondary user by the cognitive radio is interrupted, and the PU band is available for the primary user. After completion of service for the primary user, the PU band is again available to secondary users. Performance metrics are derived to study the equilibrium strategies of secondary users. A Stackelberg game was formulated and Nash equilibrium was derived for the noncooperative strategy of the secondary user. Game-theory concepts are incorporated with queuing theory ideas to obtain the net benefit for the noncooperative strategy and social benefit for...

Research paper thumbnail of Optimal Control of Malware Spreading Model with Tracing and Patching in Wireless Sensor Networks

Wireless Personal Communications, 2020

Wireless sensor networks (WSNs), which emerge from an unattended environment monitoring, are depl... more Wireless sensor networks (WSNs), which emerge from an unattended environment monitoring, are deployed for monitoring purposes in different environments. But, WSNs suffer from vulnerable malware to propagate via exploiting message exchange among the sensor nodes. To draw attention to this issue, this paper investigates an optimal control strategy to reduce the spread of malware in wireless sensor networks. A node-based epidemic model Susceptible-Infected-Traced-Patched-Susceptible is analyzed. The optimal control strategies are analytically investigated. The proposed optimal strategy achieves a low level of infections at a low cost. Finally, numerical illustrations are presented to show the spread of malware through infected nodes which can be effectively suppressed by adopting the suitable optimal control strategy.

Research paper thumbnail of Strategic access in a Green IoT(Internet of Things) system with an unreliable server

Research paper thumbnail of Optimal control of alcoholism spreading through awareness over multiplex network

International Journal of Biomathematics, 2021

This paper proposes the SISRS epidemic model to represent alcohol addiction among people. The spr... more This paper proposes the SISRS epidemic model to represent alcohol addiction among people. The spreading of alcohol addiction is controlled by creating awareness among the people and also by treating them to overcome it. Multiplex network is used to study the dynamics of addiction. Alcoholism spreads over the physical contact layer and follows the SISRS process whereas human awareness spreads over the virtual contact layer and follows the UAU process. Based on the Microscopic Markov Chain Approach competing dynamics of spreading of alcohol addiction and human awareness diffusion are studied. Necessary conditions for the existence of an alcohol-free population are found. An optimal control problem using a suitable cost index is formulated to reduce the alcohol addicts and the optimal control strategy using Pontryagin’s Minimum Principle is determined. Numerical results are developed to find the effect of various parameters and to analyze the effects of different control strategies. Th...

Research paper thumbnail of Analysis of Single Server Retrial Queue with Batch Arrivals, Two Phases of Heterogeneous Service and Multiple Vacations with N–Policy

orstw.org.tw

⎯We consider a single server retrial queue with batch arrivals, two phases of heterogeneous servi... more ⎯We consider a single server retrial queue with batch arrivals, two phases of heterogeneous service and multiple vacations with N-policy. The primary arrivals find the server busy or doing secondary job (vacation) will join orbit (group of repeated calls). If the number of repeated calls in orbit is less than N, the server does the secondary job repeatedly until the retrial group size reaches N. At the secondary job completion epoch, if the orbit size is at least N, then server remains in the system to render service either for primary calls or for repeated calls. For the proposed model, we carry out steady state system size distribution of number of customers in retrial group. We discuss its application of the proposed model to the analysis of a communication protocol like SMTP (Simple Mail Transfer Protocol), TCP/IP (Transmission Control Protocol/Internet Protocol) and etc.

Research paper thumbnail of Age of Information in Multi-Source Updating Systems: An M/G/1 Vacation Queueing Model

ICC 2023 - IEEE International Conference on Communications

Research paper thumbnail of A Comparative Analysis of Object Point Method with Use Case Method in Software Effort Estimation

The important work in software development process is to develop projects within estimated time a... more The important work in software development process is to develop projects within estimated time and cost. As accuracy and effort plays a vital role for software development system. Several techniques are available for effort estimation. Now it is a big question, which method is worth for the estimation. Approach: The Question then became how to enable the estimation using several techniques. In this paper we perform the performance study of object point method and use case method to make an intelligent application for the purpose of effort estimation. On the basis of the following parameters in terms of SLOC, complexity, productive rate the performance study of these methods is accomplished. Conclusion: This study discussed all the points above, identity open problems and future research directions in the field of software effort estimation.

Research paper thumbnail of An enhanced size based tool for effort estimation incorporating quality factors in the software development life cycle

Research paper thumbnail of Co-Evolution of Viral Processes and Structural Stability in Signed Social Networks

IEEE Transactions on Knowledge and Data Engineering

Prediction and control of spreading processes in social networks (SNs) are closely tied to the un... more Prediction and control of spreading processes in social networks (SNs) are closely tied to the underlying connectivity patterns. Contrary to most existing efforts that exclusively focus on positive social user interactions, the impact of contagion processes on the temporal evolution of signed SNs (SSNs) with distinctive friendly (positive) and hostile (negative) relationships yet, remains largely unexplored. In this paper, we study the interplay between social link polarity and propagation of viral phenomena coupled with user alertness. In particular, we propose a novel energy model built on Heider's balance theory that relates the stochastic susceptible-alertinfected-susceptible epidemic dynamical model with the structural balance of SSNs to substantiate the trade-off between social tension and epidemic spread. Moreover, the role of hostile social links in the formation of disjoint friendly clusters of alerted and infected users is analyzed. Using three real-world SSN datasets, we further present a time-efficient algorithm to expedite the energy computation in our Monte-Carlo simulation method and show compelling insights on the effectiveness and rationality of user awareness and initial network settings in reaching structurally balanced local and global network energy states.

Research paper thumbnail of Optimal control of a rumor model with group propagation over complex networks

International Journal of Modern Physics C

Rumor is an unauthenticated statement that gives significant changes in the social life of the pe... more Rumor is an unauthenticated statement that gives significant changes in the social life of the people, financial markets (stocks and trades), etc. By incorporating the dissemination of rumor through groups in social, mobile networks and by considering the people’s cognitive factor (hesitate and forget), a new model on the rumor spreading process is presented in this paper. The spreading dynamics of rumor in homogeneous and heterogeneous networks is analyzed by using mean-field theory. The reproduction number is obtained by using the next-generation matrix. The global stability of the rumor-free equilibrium for the homogeneous and heterogeneous model is proved elaborately. An optimal control problem is developed to minimize the hesitators and infected persons and the existence of optimality is shown using Pontryagin’s Minimum Principle. The hesitating and forgetting mechanism has a great impact on the model and is similar to the real-life. Further, the control parameters work superio...

Research paper thumbnail of Mathematical model of a dynamic transmission of novel coronavirus (COVID-19) pandemic in the World

Journal of Statistics and Management Systems

Research paper thumbnail of Transient analysis of a resource-limited recovery policy for epidemics: A retrial queueing approach

2016 IEEE 37th Sarnoff Symposium, 2016

Knowledge on the dynamics of standard epidemic models and their variants over complex networks ha... more Knowledge on the dynamics of standard epidemic models and their variants over complex networks has been wellestablished primarily in the stationary regime, with relatively little light shed on their transient behavior. In this paper, we analyze the transient characteristics of the classical susceptibleinfected (SI) process with a recovery policy modeled as a statedependent retrial queueing system in which arriving infected nodes, upon finding all the limited number of recovery units busy, join a virtual buffer and try persistently for service in order to regain susceptibility. In particular, we formulate the stochastic SI epidemic model with added retrial phenomenon as a finite continuous-time Markov chain (CTMC) and derive the Laplace transforms of the underlying transient state probability distributions and corresponding moments for a closed population of size N driven by homogeneous and heterogeneous contacts. Our numerical results reveal the strong influence of infection heterogeneity and retrial frequency on the transient behavior of the model for various performance measures.

Research paper thumbnail of Preemptive Resume Priority Call Center Model with Two Classes of MAP Arrivals

Applied mathematical sciences, 2013

We investigate the ruin probability when the surplus process is governed by a generalized perturb... more We investigate the ruin probability when the surplus process is governed by a generalized perturbed risk model with a Markov-switching compensator. We suppose that the jump component of the perturbed risk model is specified by a completely random measure process with the compensator switching over time according to the states of an economy described by a continuous-time hidden Markov chain model. Accordingly, we assume that the force of interest, the rate of premium and the

Research paper thumbnail of Dynamics of Multi-Strain Malware Epidemics over Duty-Cycled Wireless Sensor Networks

2021 International Balkan Conference on Communications and Networking (BalkanCom), 2021

Insights on the salient features of malicious software spreading over large-scale wireless sensor... more Insights on the salient features of malicious software spreading over large-scale wireless sensor networks (WSNs) in low-power Internet of Things (IoT) are not only essential to project, but also mitigate the persistent rise in cyber threats. While the analytical findings on single malware spreading dynamics are well-established, the interplay among multiple malware strains with heterogeneous infection rates in power-limited WSNs yet remain unexplored. Inspired by compartmental modeling in epidemiology, we present the mean-field approximation for a novel stochastic epidemic model of two mutually exclusive malware strains spreading over WSNs with sleep/awake modes of energy consumption. Referred as the susceptible-infected by strain 1 or by strain 2-susceptible with duty cycles (SI1I2SD), we then derive the basic reproduction number to characterize the sufficient conditions for the existence and stability of the infection-free and endemic equilibrium states. Simulation results show the predictive capability of the proposed model for energy-efficient WSNs evolving as random geometric graphs against uniformly connected networks.

Research paper thumbnail of Heterogeneous Projection of Disruptive Malware Prevalence in Mobile Social Networks

IEEE Communications Letters, 2020

Segregating the latency phase from the actual disruptive phase of certain mobile malware grades o... more Segregating the latency phase from the actual disruptive phase of certain mobile malware grades offers more opportunities to effectively mitigate the viral spread in its early stages. Inspired by epidemiology, in this letter, a stochastic propagation model that accounts for infection latency of disruptive malware in both personal and spatial social links between constituent mobile network user pairs is proposed. To elucidate the true impact of unique user attributes on the virulence of the proposed spreading process, heterogeneity in transition rates is also considered in an approximated mean-field epidemic network model. Furthermore, derivations for the system equilibrium and stability analysis are provided. Simulation results showcase the viability of our model in contrasting between latent and disruptive infection stages with respect to a homogeneous population-level benchmark model.

Research paper thumbnail of Correction to: Performance analysis of an unreliable M/G/1 retrial queue with two-way communication

Operational Research, 2018

In the original publication, the funding information has been published incorrectly. The correct ... more In the original publication, the funding information has been published incorrectly. The correct funding information should read "This research was a part of the project titled "Development of an automated fishcounter system and measurement of underwater farming-fish", funded by the Ministry of Oceans and Fisheries, Korea.

Research paper thumbnail of Strategic access in a Green IoT(Internet of Things) system with an unreliable server

Performance Evaluation, 2022

The present research aims to study the strategic behaviour of users in an Internet of Things(IoT)... more The present research aims to study the strategic behaviour of users in an Internet of Things(IoT) system that is impeded by an unreliable server. In the system, an IoT device is equipped with an energy harvesting unit. The IoT system under study is employed as a Markovian retrial queueing system that is used in a single server, subject to active failures. The failed server is repaired immediately, while the user who was served before the system's breakdown event waits in the server until the server is repaired. The generating function approach is used to identify important system performance metrics. Moreover, queueing theory concepts are incorporated into game theory for the analysis of the users' strategies. The users in the IoT system, act to maximize their expected benefit without being perturbed by other users in the system and determine their equilibrium joining strategies. Furthermore, taking into account social welfare factors, the IoT device acts as a social planner, and as a consequence, socially optimal joining strategies are also analysed. Finally, the analytical findings are validated with numerical examples.

Research paper thumbnail of On the Age of Status Updates in Unreliable Multi-Source M/G/1 Queueing Systems

IEEE Communications Letters , 2023

The timeliness of status message delivery in communications networks is subjective to time-varyin... more The timeliness of status message delivery in communications networks is subjective to time-varying wireless channel transmissions. In this paper, we investigate the age of information (AoI)ofeachsourceinamulti-sourceM/G/1queueingupdatesystem with active server failures. In particular, we adopt the method of supplementary variables to derive a closed-form expression for the average AoI in terms of system parameters, where the server repair time follows a general distribution and the service time of packets generated by independent sources is a general random variable. Numerical results are provided to validate the effectiveness of the proposed packet serving policy under different parametric settings.

Research paper thumbnail of Performance analysis of a single server retrial queue with working vacation

Research paper thumbnail of Dynamics of Trachoma Epidemic in Human Contact Network with Seasonally Varying Infectious Medium

Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 2021

Research paper thumbnail of On the Retrial-Queuing Model for Strategic Access and Equilibrium-Joining Strategies of Cognitive Users in Cognitive-Radio Networks with Energy Harvesting

Energies, 2021

This article studies the strategic access of single-server retrial queue with two types of custom... more This article studies the strategic access of single-server retrial queue with two types of customers, where priority is given according to their category. On the basis of this concept, a cognitive-radio network was developed as retrial queue with energy harvesting. Cognitive radio allows for a secondary user to opportunistically access the idle spectrum of a primary user (PU). Upon arrival of a primary user, the service given to the secondary user by the cognitive radio is interrupted, and the PU band is available for the primary user. After completion of service for the primary user, the PU band is again available to secondary users. Performance metrics are derived to study the equilibrium strategies of secondary users. A Stackelberg game was formulated and Nash equilibrium was derived for the noncooperative strategy of the secondary user. Game-theory concepts are incorporated with queuing theory ideas to obtain the net benefit for the noncooperative strategy and social benefit for...

Research paper thumbnail of Optimal Control of Malware Spreading Model with Tracing and Patching in Wireless Sensor Networks

Wireless Personal Communications, 2020

Wireless sensor networks (WSNs), which emerge from an unattended environment monitoring, are depl... more Wireless sensor networks (WSNs), which emerge from an unattended environment monitoring, are deployed for monitoring purposes in different environments. But, WSNs suffer from vulnerable malware to propagate via exploiting message exchange among the sensor nodes. To draw attention to this issue, this paper investigates an optimal control strategy to reduce the spread of malware in wireless sensor networks. A node-based epidemic model Susceptible-Infected-Traced-Patched-Susceptible is analyzed. The optimal control strategies are analytically investigated. The proposed optimal strategy achieves a low level of infections at a low cost. Finally, numerical illustrations are presented to show the spread of malware through infected nodes which can be effectively suppressed by adopting the suitable optimal control strategy.

Research paper thumbnail of Strategic access in a Green IoT(Internet of Things) system with an unreliable server

Research paper thumbnail of Optimal control of alcoholism spreading through awareness over multiplex network

International Journal of Biomathematics, 2021

This paper proposes the SISRS epidemic model to represent alcohol addiction among people. The spr... more This paper proposes the SISRS epidemic model to represent alcohol addiction among people. The spreading of alcohol addiction is controlled by creating awareness among the people and also by treating them to overcome it. Multiplex network is used to study the dynamics of addiction. Alcoholism spreads over the physical contact layer and follows the SISRS process whereas human awareness spreads over the virtual contact layer and follows the UAU process. Based on the Microscopic Markov Chain Approach competing dynamics of spreading of alcohol addiction and human awareness diffusion are studied. Necessary conditions for the existence of an alcohol-free population are found. An optimal control problem using a suitable cost index is formulated to reduce the alcohol addicts and the optimal control strategy using Pontryagin’s Minimum Principle is determined. Numerical results are developed to find the effect of various parameters and to analyze the effects of different control strategies. Th...

Research paper thumbnail of Analysis of Single Server Retrial Queue with Batch Arrivals, Two Phases of Heterogeneous Service and Multiple Vacations with N–Policy

orstw.org.tw

⎯We consider a single server retrial queue with batch arrivals, two phases of heterogeneous servi... more ⎯We consider a single server retrial queue with batch arrivals, two phases of heterogeneous service and multiple vacations with N-policy. The primary arrivals find the server busy or doing secondary job (vacation) will join orbit (group of repeated calls). If the number of repeated calls in orbit is less than N, the server does the secondary job repeatedly until the retrial group size reaches N. At the secondary job completion epoch, if the orbit size is at least N, then server remains in the system to render service either for primary calls or for repeated calls. For the proposed model, we carry out steady state system size distribution of number of customers in retrial group. We discuss its application of the proposed model to the analysis of a communication protocol like SMTP (Simple Mail Transfer Protocol), TCP/IP (Transmission Control Protocol/Internet Protocol) and etc.

Research paper thumbnail of Age of Information in Multi-Source Updating Systems: An M/G/1 Vacation Queueing Model

ICC 2023 - IEEE International Conference on Communications

Research paper thumbnail of A Comparative Analysis of Object Point Method with Use Case Method in Software Effort Estimation

The important work in software development process is to develop projects within estimated time a... more The important work in software development process is to develop projects within estimated time and cost. As accuracy and effort plays a vital role for software development system. Several techniques are available for effort estimation. Now it is a big question, which method is worth for the estimation. Approach: The Question then became how to enable the estimation using several techniques. In this paper we perform the performance study of object point method and use case method to make an intelligent application for the purpose of effort estimation. On the basis of the following parameters in terms of SLOC, complexity, productive rate the performance study of these methods is accomplished. Conclusion: This study discussed all the points above, identity open problems and future research directions in the field of software effort estimation.

Research paper thumbnail of An enhanced size based tool for effort estimation incorporating quality factors in the software development life cycle

Research paper thumbnail of Co-Evolution of Viral Processes and Structural Stability in Signed Social Networks

IEEE Transactions on Knowledge and Data Engineering

Prediction and control of spreading processes in social networks (SNs) are closely tied to the un... more Prediction and control of spreading processes in social networks (SNs) are closely tied to the underlying connectivity patterns. Contrary to most existing efforts that exclusively focus on positive social user interactions, the impact of contagion processes on the temporal evolution of signed SNs (SSNs) with distinctive friendly (positive) and hostile (negative) relationships yet, remains largely unexplored. In this paper, we study the interplay between social link polarity and propagation of viral phenomena coupled with user alertness. In particular, we propose a novel energy model built on Heider's balance theory that relates the stochastic susceptible-alertinfected-susceptible epidemic dynamical model with the structural balance of SSNs to substantiate the trade-off between social tension and epidemic spread. Moreover, the role of hostile social links in the formation of disjoint friendly clusters of alerted and infected users is analyzed. Using three real-world SSN datasets, we further present a time-efficient algorithm to expedite the energy computation in our Monte-Carlo simulation method and show compelling insights on the effectiveness and rationality of user awareness and initial network settings in reaching structurally balanced local and global network energy states.

Research paper thumbnail of Optimal control of a rumor model with group propagation over complex networks

International Journal of Modern Physics C

Rumor is an unauthenticated statement that gives significant changes in the social life of the pe... more Rumor is an unauthenticated statement that gives significant changes in the social life of the people, financial markets (stocks and trades), etc. By incorporating the dissemination of rumor through groups in social, mobile networks and by considering the people’s cognitive factor (hesitate and forget), a new model on the rumor spreading process is presented in this paper. The spreading dynamics of rumor in homogeneous and heterogeneous networks is analyzed by using mean-field theory. The reproduction number is obtained by using the next-generation matrix. The global stability of the rumor-free equilibrium for the homogeneous and heterogeneous model is proved elaborately. An optimal control problem is developed to minimize the hesitators and infected persons and the existence of optimality is shown using Pontryagin’s Minimum Principle. The hesitating and forgetting mechanism has a great impact on the model and is similar to the real-life. Further, the control parameters work superio...

Research paper thumbnail of Mathematical model of a dynamic transmission of novel coronavirus (COVID-19) pandemic in the World

Journal of Statistics and Management Systems

Research paper thumbnail of Transient analysis of a resource-limited recovery policy for epidemics: A retrial queueing approach

2016 IEEE 37th Sarnoff Symposium, 2016

Knowledge on the dynamics of standard epidemic models and their variants over complex networks ha... more Knowledge on the dynamics of standard epidemic models and their variants over complex networks has been wellestablished primarily in the stationary regime, with relatively little light shed on their transient behavior. In this paper, we analyze the transient characteristics of the classical susceptibleinfected (SI) process with a recovery policy modeled as a statedependent retrial queueing system in which arriving infected nodes, upon finding all the limited number of recovery units busy, join a virtual buffer and try persistently for service in order to regain susceptibility. In particular, we formulate the stochastic SI epidemic model with added retrial phenomenon as a finite continuous-time Markov chain (CTMC) and derive the Laplace transforms of the underlying transient state probability distributions and corresponding moments for a closed population of size N driven by homogeneous and heterogeneous contacts. Our numerical results reveal the strong influence of infection heterogeneity and retrial frequency on the transient behavior of the model for various performance measures.

Research paper thumbnail of Preemptive Resume Priority Call Center Model with Two Classes of MAP Arrivals

Applied mathematical sciences, 2013

We investigate the ruin probability when the surplus process is governed by a generalized perturb... more We investigate the ruin probability when the surplus process is governed by a generalized perturbed risk model with a Markov-switching compensator. We suppose that the jump component of the perturbed risk model is specified by a completely random measure process with the compensator switching over time according to the states of an economy described by a continuous-time hidden Markov chain model. Accordingly, we assume that the force of interest, the rate of premium and the

Research paper thumbnail of Dynamics of Multi-Strain Malware Epidemics over Duty-Cycled Wireless Sensor Networks

2021 International Balkan Conference on Communications and Networking (BalkanCom), 2021

Insights on the salient features of malicious software spreading over large-scale wireless sensor... more Insights on the salient features of malicious software spreading over large-scale wireless sensor networks (WSNs) in low-power Internet of Things (IoT) are not only essential to project, but also mitigate the persistent rise in cyber threats. While the analytical findings on single malware spreading dynamics are well-established, the interplay among multiple malware strains with heterogeneous infection rates in power-limited WSNs yet remain unexplored. Inspired by compartmental modeling in epidemiology, we present the mean-field approximation for a novel stochastic epidemic model of two mutually exclusive malware strains spreading over WSNs with sleep/awake modes of energy consumption. Referred as the susceptible-infected by strain 1 or by strain 2-susceptible with duty cycles (SI1I2SD), we then derive the basic reproduction number to characterize the sufficient conditions for the existence and stability of the infection-free and endemic equilibrium states. Simulation results show the predictive capability of the proposed model for energy-efficient WSNs evolving as random geometric graphs against uniformly connected networks.

Research paper thumbnail of Heterogeneous Projection of Disruptive Malware Prevalence in Mobile Social Networks

IEEE Communications Letters, 2020

Segregating the latency phase from the actual disruptive phase of certain mobile malware grades o... more Segregating the latency phase from the actual disruptive phase of certain mobile malware grades offers more opportunities to effectively mitigate the viral spread in its early stages. Inspired by epidemiology, in this letter, a stochastic propagation model that accounts for infection latency of disruptive malware in both personal and spatial social links between constituent mobile network user pairs is proposed. To elucidate the true impact of unique user attributes on the virulence of the proposed spreading process, heterogeneity in transition rates is also considered in an approximated mean-field epidemic network model. Furthermore, derivations for the system equilibrium and stability analysis are provided. Simulation results showcase the viability of our model in contrasting between latent and disruptive infection stages with respect to a homogeneous population-level benchmark model.

Research paper thumbnail of Correction to: Performance analysis of an unreliable M/G/1 retrial queue with two-way communication

Operational Research, 2018

In the original publication, the funding information has been published incorrectly. The correct ... more In the original publication, the funding information has been published incorrectly. The correct funding information should read "This research was a part of the project titled "Development of an automated fishcounter system and measurement of underwater farming-fish", funded by the Ministry of Oceans and Fisheries, Korea.

Research paper thumbnail of Advances in Intelligent Systems and Computing Volume 412 Series editor

The series "Advances in Intelligent Systems and Computing" contains publications on theory, appli... more The series "Advances in Intelligent Systems and Computing" contains publications on theory, applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all disciplines such as engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent systems and computing. The publications within "Advances in Intelligent Systems and Computing" are primarily textbooks and proceedings of important conferences, symposia and congresses. They cover significant recent developments in the field, both of a foundational and applicable character. An important characteristic feature of the series is the short publication time and worldwide distribution. This permits a rapid and broad dissemination of research results.