Awasthi K. Mathematical Modeling For Intelligent Systems 2022
Awasthi K. Mathematical Modeling For Intelligent Systems 2022
Intelligent Systems
Mathematical Modeling for Intelligent Systems: Theory, Methods, and Simulation aims
to provide a reference for the applications of mathematical modeling using intelligent tech-
niques in various unique industry problems in the era of Industry 4.0. Providing a thor-
ough introduction to the field of soft-computing techniques, this book covers every major
technique in artificial intelligence in a clear and practical style. It also highlights current
research and applications, addresses issues encountered in the development of applied sys-
tems, and describes a wide range of intelligent systems techniques, including neural net-
works, fuzzy logic, evolutionary strategy, and genetic algorithms. This book demonstrates
concepts through simulation examples and practical experimental results.
Key Features:
Edited by
Mukesh Kumar Awasthi
Babasaheb Bhimrao Ambedkar University, India
Ravi Tomar
University of Petroleum & Energy Studies, India
Maanak Gupta
Tennessee Tech University, USA
First edition published 2023
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
© 2023 selection and editorial matter Mukesh Kumar Awasthi, Ravi Tomar and Maanak Gupta; individual chapters,
the contributors
Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright
holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged
please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or
utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including
photocopying, microfilming, and recording, or in any information storage or retrieval system, without written
permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the
Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are
not available on CCC please contact [email protected]
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for
identification and explanation without intent to infringe.
DOI: 10.1201/9781003291916
Typeset in Palatino
by codeMantra
Contents
v
vi Contents
Index.............................................................................................................................................. 245
Preface
vii
viii Preface
acquiring memory dump for different memory acquisition tools. Further, Chapter 4 is dedi-
cated to discussing the need and applicability of the latest technologies like IoMT with
Blockchain-Based Intelligent and Secured System for Smart Healthcare. Chapter 5 com-
plements it by the implementation of an AI-Enabled Cloud-Based Intelligent System for
Telemedicine.
The expansion of The DEMATEL method under the uncertain linguistic situation with
heptagonal fuzzy numbers is given in Chapter 6, while the academic performance of techni-
cal and nontechnical persons is discussed in Chapter 7. Chapter 8 presents the fundamental
aspects of the modeling of a PIN solar cell. Chapter 9 proposes the solution of conformable
time-fractional nonlinear partial differential equations with proportional delay.
Chapters 10–15 are based on the fluid flows in various geometries. Chapter 10 is about
the convective instability in a Jeffrey fluid-soaked permeable layer and Chapter 11 presents
a numerical solution of the two-dimensional nonlinear Fisher–Kolmogorov–Petrovsky–
Piscounov reaction–diffusion equation. The impact of transient fluid flow on a vertical
plate in the laminar boundary layer with variable viscosity Prandtl number is given in
Chapter 12. Chapter 13 complements the flow of viscous fluid due to a rotating and stretch-
ing disk. Chapters 14 and 15 discuss the interfacial instability in cylindrical geometries.
We wish the readers a successful study of the material presented, leading to new inspira-
tion, a deepening understanding of the described concepts, and also fruitful applications
to the contemporary challenges of science and engineering.
ix
x Editors
xi
xii Contributors
CONTENTS
1.1 Introduction ............................................................................................................................1
1.2 Introduction to Embedded Computing Systems ..............................................................2
1.2.1 Usage of Sensors and Actuators in Embedded System ........................................ 3
1.2.2 Embedded Computing System: Reliability Analysis ...........................................5
1.3 Internet of Things: Introduction, Applications, and Trends ...........................................5
1.4 Applications of IoT .................................................................................................................6
1.4.1 Data Privacy, Adaptability, Sensibility, and Security ...........................................6
1.5 Introduction to Sensors .........................................................................................................7
1.5.1 Environmental Monitoring ......................................................................................8
1.5.2 Control Applications .................................................................................................8
1.5.3 Trends in Sensor Technology ...................................................................................9
1.5.4 Future Scope ............................................................................................................. 10
1.6 Artificial Intelligence and Internet of Things .................................................................. 10
1.6.1 Intro to Artificial Intelligence (AI) ........................................................................ 11
1.6.2 Convergence of AI and IoT ..................................................................................... 12
1.7 Conclusion ............................................................................................................................ 13
1.8 Summary............................................................................................................................... 13
References....................................................................................................................................... 14
1.1 Introduction
The Internet of Things (IoT) defines a network of embedded computing devices that are
linked together enabling communication and interaction within themselves and the exter-
nal environment. According to internet usage worldwide statistics (https://www.statista.
com/statistics/617136/digital-population-worldwide/) as of 2021, there were 4.95 billion
internet users estimated across the world. The growth in the use of the internet in the
past few years has been exponentially high, which has led to the development of IoT. The
unifying thread running through these various IoT visions is that “things” are expected
to become active participants in industries, data retrieval, and social processes (Hassan,
2018). IoT has a wide range of applications, including the digital transformation of indus-
tries, quality control, logistics, and supply chain optimization. Fitness wearables, smart
home applications, health care, and smart cities have all been made possible by the IoT. A
home automation system can be a great example as it portrays integration between devices
and interoperability of all functions resulting in gathering information and conveying it to
DOI: 10.1201/9781003291916-1 1
2 Mathematical Modeling for Intelligent Systems
FIGURE 1.1
IoT infrastructure.
the user as per requirement. RFID (Radio-Frequency Identification) systems can be used
to monitor objects in real-time; this enables mapping the real world into the virtual one
(Atzori et al., 2010). Figure 1.1 illustrates the complete infrastructure of an IoT environment
making it easier to understand how the IoT device and gateway are linked in an embedded
system. The data is stored in the cloud over a network in order to reduce response time and
fasten the data processing.
The sensors collect the data and send it to a control center where a decision is taken and
an associated command is sent to the actuator in its response. According to the total data
volume generation statistics, as of 2020, approximately 64.2 zettabytes (1 zettabyte = 1012
gigabytes) of data were created, consumed, and stored in that particular year, which is
increasing day by day at exponential rates. The introduction of artificial intelligence (AI)
and its subfields like machine learning (ML) and deep learning have paved the way for
extracting useful insights from big data. The convergence of IoT and AI has enabled the
viability of numerous real-life applications of IoT. AI proves to be helpful by avoiding
expensive and unplanned downtime, increasing operational efficiency, enhancing risk
management, and enabling new and improved products and services. According to the
forecast by Lee et al. (2009), with a compound annual growth rate (CAGR) of 30.8%, India’s
AI spending would rise from US$300.7 million in 2019 to US$880.5 million in 2023. This
shows that AI will help “all effective” IoT endeavors and data from deployments will have
“limited value” without it. The applications of AI incorporated with IoT include IoT data
mining platforms and tools, 5G-assisted IoT systems and applications, monitoring robots,
and self-driving cars. The convergence of AI and IoT enables the systems to be predictive,
prescriptive, and autonomous. AI can be applied to embedded systems. By making use of
AI-embedded systems, developers can look to deliver efficient solutions.
FIGURE 1.2
Composition of embedded systems.
• Application software: It performs the required functions and interacts with the user.
• The mediator device: It acts as a medium of communication between different
layers of the software part.
• An operating system: It frames rules for the required function to be performed.
• Firmware: It is a program written for certain hardware.
The hardware comprises memory, I/O (input/output) devices, memory buses, sensors,
actuators, and peripherals (cameras, printers, scanners, and keyboards). The applications
of embedded systems include embedded Linux, Android, and Windows-embedded com-
pact (Windows CE). It is also used in appliances such as washing machines, digital cam-
eras, televisions, and refrigerators. The increasing global demands for communication
devices and different electronics equipped with embedded systems are the fundamental
cause driving the growth of the market of embedded systems. The embedded systems
these days require less space and have low power consumption due to their small size.
FIGURE 1.3
Multimedia network in a battlefield.
video of the enemies. The nodes are interconnected over a wireless connection for data
compression, retrieval, and correlation. Sensors have their applications in real-life situa-
tions as well as in industries. They can be used in monitoring patients in medical applica-
tions; weighing scales; agriculture; and heating, ventilation, and air conditioning (HVAC)
technologies.
Actuators, on the other hand, are devices that enable movement and are responsible for
controlling the mechanism or a system. The actuators used in industries include electric
motors, hydraulic motors, and pneumatic control waves. Sensors are being embedded at
an exponential rate in almost every IoT device that is leading to a vast increase in their
usage. Sensors and actuators are essential in an embedded system. The embedded system
also contains a controller that generates control signals and manages the process that is
being controlled by making use of sensors and actuators (Sarishma et al., 2021). Table 1.1
gives a comprehensive overview of the characteristics of sensors and actuators.
TABLE 1.1
Sensors and Actuators
Sensors Actuators
Inputs and outputs They look at the input and initiate a They track the outputs of devices.
particular action.
Electrical signaling They use signaling to analyze the They measure the heat to determine the
environmental conditions to perform output.
a particular task.
Dependency They are dependent on each other. Actuators rely on sensors to do their job.
Conversion It converts physical attributes to It changes electrical signals to physical
electrical signals. action.
Location It is present at the input port. It is present at the output port.
Application They are used to measure temperature, They are used in operating dampers,
vibration, and pressure. valves, and couplings.
Embedded Systems and IoT Components 5
1.4 Applications of IoT
Today, IoT is one of the few technologies whose influence will extend across all businesses
and directly into our homes. IoT deployment has already begun in areas such as logistics,
energy monitoring, military, and industrial automation. Furthermore, IoT has an impact
on all parts of the technical stack in terms of hardware and software innovation. But there
are fields that are not able to make enough use of IoT standards for their development.
Industries like manufacturing, transportation, logistics, mining, and agriculture are the
physical industries (Section 1.4, Atzori et al., 2010). The mining industry also has a lot of
interest and opportunities. Another application area is agriculture where advanced tech-
nology through feedback and coordination with sensor technologies such as electrochemi-
cal sensors is used to determine the level of nutrients in the soil. Its usage has shown a 23%
reduction in the amount of fertilizer needed, 15% reduction in the amount of seed needed,
and overall yield has increased to 27% by the automation of industrial IoT. The advantages
of advanced tracking and precision agriculture are huge. Additional uses include loca-
tion sensing and sharing, environmental sensing, remote control, ad hoc networking, and
encrypted communication (Chen et al., 2014).
successful exchange of the data in the most efficient way, whereas privacy is the right of
individuals to have control of when and how their personal information is collected and
processed in the IoT environment. The Open Web Application Security Project (OWASP)
(https://owasp.org/www-project-internet-of-things/) has identified the most common
issues in IoT and demonstrated that many of these flaws are caused by a lack of under-
standing of well-known security applications such as encryption, authentication, access
control, and role-based access control. All of these applications are explained in Bertino
(2016). We can consider an example of location privacy. Most of the devices nowadays are
equipped with GPS (global positioning system) receivers or other sensors that allow deter-
mining the position of the device. However, different applications require various lev-
els of location accuracy, so the user can decide based on the collected information as to
whether to disclose the coordinates or not. Personal health indicators like heart rate and
no of steps taken, user whereabouts, payment credentials, calendar information, and con-
tacts in the smartphone are all examples of data acquired by IoT services. In addition, the
privacy impact assessment methodology of RFID serves as a prototype for a risk manage-
ment–based approach that can be used in IoT scenarios. At the design stage, data privacy,
security, and protection should be addressed. Meanwhile, IoT devices don’t always have
enough processing capacity to execute all of the necessary security layers and function-
alities (Anuj Kumar et al., 2012). Usually, IoT devices have the functions to preserve users’
privacy, access control and authentication, secure network protocols, cryptography, and
edge computing, which means computation and data storage on the local device. If the
data is transferred to the cloud, the techniques that can be applied to the datasets to avoid
users profiling and linkage include data analysis and summarization, digital forgetting,
and the concept of differential privacy. Some ways to protect data are to use trusted con-
nectivity, install trusted software, check privacy settings, and study the privacy policy that
details what the company is going to do with your data as one has the right to understand
what happens to the information and whether the company shares any personal data
with third parties. Still, there are loopholes in matters of data security because of which
data adaptability and sensibility are considered difficult to handle. Security and privacy
include challenges (Shukla, 2021) that need to be resolved for a secure digital future.
the voltage across it increases. A piezoelectric sensor is another type of active sensor. A
passive sensor is a resistance temperature detector, or “RTD.” It’s a gadget, the resistance
of which changes with change in temperature. An external supply or an excitation circuit
is required to take advantage of this change in resistance by causing a voltage change.
A strain gauge is an example of a passive sensor. Because the output of a sensor must be
conditioned or amplified, almost every sensor used in process control will be connected
to a transmitter.
1.5.1 Environmental Monitoring
Environmental monitoring is one of the most compelling industrial IoT applications driv-
ing operational transparency and efficiency. Across a variety of industries such as manu-
facturing, mining, oil and gas, and agriculture, monitoring and managing environmental
conditions such as air quality, water quality, and atmospheric hazards is critical to prevent
adverse conditions that may impact production process, product quality equipment, and
worker’s safety. However, the accessibility of environmental data requires the sensor net-
work enabled by robust, scalable, and cost-effective connectivity. Low-power wide-area
networks (LPWAN) are an excellent alternative for linking environmental sensor net-
works because they provide the wide coverage and indoor penetration required to cover
large regions and reach previously unreachable locales. Compared to industrial alterna-
tives like mesh networks, LPWAN solutions deliver much higher energy efficiency along-
side easy installation and management. Three separate wireless sensors were created,
built, and assessed in order to create IoT-based environmental monitoring systems (Mois
et al., 2017). Another beneficial alternative is the ultra-low power design and simple star
topology that has low device and network costs, fewer infrastructure requirements, and
reduces setup and maintenance complexity. All contribute to a low total cost of ownership.
Critical ambient conditions such as temperature, humidity, air quality, and pressure can
be monitored and controlled to improve quality; measure workplace conditions such as air
quality, heat, humidity, radiation, and noise to improve worker safety; ensure regulatory
compliance and maintain quality assurance, and optimize energy consumption by con-
necting an LPWAN-enabled environmental sensor network. Many such algorithms and
protocols are explained as well as analyzed in the work by Prabhu et al. (2018) along with
their merits and demerits. Energy efficiency, overall system cost, sensor module response
time, system accuracy, adequate signal-to-noise ratio, and radio frequency interference/
electromagnetic interference (RFI/EMI) rejection during varying atmospheric conditions
and in inhomogeneous environments are all requirements of a WSN for environmental
monitoring (Prabhu et al., 2018). It addresses the complete procedure of the development of
WSN for IoT devices from scratch considering all aspects of the required platform.
1.5.2 Control Applications
Sensors are characterized as low cost, low power, and highly reliable networks that collect
data and make it available for processing (Atzori et al., 2010; Tomar & Tiwari, 2019). There
are many types of sensors available for use in industrial applications. Some of the common
sensors used are listed in Table 1.2.
Sensors play an important role by providing intelligence to the “things” so that they
respond to all the tasks without any human interference. There is a sensor for almost
every single requirement. Some of them include proximity, position, occupancy, motion,
Embedded Systems and IoT Components 9
TABLE 1.2
Commonly Used Sensors
Photoelectric sensors They work by emitting a visible or infrared light beam from their light-emitting
element. They can work differently depending on the type of sensor. Some may
reflect their light back to themselves for detection, while others may emit their
light to a separate element that watches for breaks in the signal.
Magnetic sensors They work by detecting changes and disturbances in a magnetic field such as flux,
strength velocity, and direction.
Hall effect sensors These can be thought of as being in a similar category as magnetic sensors since
they are devices that are attracted by external magnetic fields.
Presence sensors They work by enabling or disabling devices based on whether presence is detected
nearby. They are commonly used in buildings that turn the lights on or off based
on motion in the room.
Flow sensors These are devices that are used to measure the flow rate of something typically a
fluid. These sensors are often part of a larger device such as a flow meter. Similar
devices are also available for air and gas measurement but flow sensors are
commonly used in various applications, including industrial processes, and HVAC.
velocity, optical, and chemical sensors (Sehrawat & Gill, 2019). The development of
IoT-based a pplications relies heavily on these sensors.
• Miniaturization: The demand for portable devices with various features, like
improved security and cheap prices, has been increasing lately. Different kinds of
designs and ideas are being incorporated across the sensor products to give them
a smaller device with a lot more capability. Some applications of this trend include
sports and fitness watches. The advantages are that these sensors can fit into small
packages.
• Digitization: Almost all the sensors introduced in the present day are available
in both analog and digital output. The common digital output protocols that can
be seen in the digital interfaces globally are I2C (interintegrated circuit) and SPI
(serial peripheral interface). The advantages when we digitize the sensors is we
get better performance in trends of resolution and accuracy and digital sensors
draw less power. These are more compatible with IoT applications. Digitization
can be seen across many industries. Examples include pneumatic control systems
for factories that control air pressure and monitor various air systems that might
be used for the machinery in a factory. There are sensors that can handle both
low- and high-pressure systems. The ability to fit into different kinds of systems
is made much easier through digital sensors. HVAC control systems that consider
humidity, temperature, and airflow rate are all going digital. So, it makes it a lot
easier to apply sensors in these kinds of applications.
10 Mathematical Modeling for Intelligent Systems
• Low power sensors: The Low power sensor emphasize more on the running time
of a sensor on a single charge. For e.g., TSYS02 and HTU21D are low power con-
suming temperature and humidity sensor(s), MS5837 is an low power altimeter
sensor. These sensors consumes as low as 180 µA of power.
• Multisensor modules: The demand to put multisensor capabilities into single
packages is also increasing. The advantages are space and power savings as sev-
eral sensing elements are powered to a single power source. Some examples that
include these combinations are HTU21D, which is a relative humidity and tem-
perature sensor that takes information and measures both relative humidity and
temperature, and MS8607, which goes into home appliances and automotive appli-
cations. One good example is that this sensor finds its way into an inlet manifold
in a car and monitors relative humidity, air temperature, and barometric pressure,
and all this information goes into the engine control unit in the vehicle. The fuel
is adjusted to make sure of its proper usage and does not produce carbon monox-
ides and nitrous oxides. It monitors all three of those things, is a small package
that fits into the intake manifold so that it doesn’t restrict the air, and it is very low
powered. HVAC systems are also examples of such kinds putting multiple sensing
capabilities in the devices and creating better efficiencies.
• Harsh environment sensors: Many locations where sensors are needed are not so
“friendly” to electronic devices and are termed harsh environments. One solution
to this problem is the inclusion of sensors in packaging that can withstand some
of these very harsh environments. A lot of sensors are finding their way into areas
where there are very high EMI and RFI fields. So sensors are imbibed with some fea-
tures to protect them. The MS5837-02BA pressure sensor is an example of this kind.
1.5.4 Future Scope
IoT and its devices are making progress rapidly with time. None of this would be pos-
sible without communicative, diligent data-collectors at the lowest field level called sen-
sors. These sensors utilize the globally standardized I/O-link communication protocol
that allows them to be configured via the system controller and flexibility adjusted to suit
each new production job. The advantage of using small, disposable sensors is that the
measurements can be done directly on the spot. Electrochemical and biochemical sensors
are expected to become a commodity in the future because there are so many different
possibilities with these kinds of sensors such as detecting viruses, safety, and explosive
detection. In the work by Bogue (2007), the future use of microelectromechanical systems
(MEMS) is discussed, as well as its capacity to create sensors at very low unit prices for big
volume applications. The primary characteristics of any chemical sensor are specificity,
accuracy, precision, resolution, and detection level. Its performance is thoroughly exam-
ined in the work by Prien (2007).
convergence of artificial Intelligence (AI) and IoT where if someone has not been in a room
for a certain amount of time, it actually shuts the lights off. It will set the air conditioner
down or do whatever it needs to make sure that the building is operating efficiently. This is
known as proactive or predictive maintenance and quality. AI simulates the ability of the
computer to perform the assigned task by analyzing the data and giving desired outputs
after processing the data. It can be observed in things like process automation and robot-
ics. Nowadays, a lot of chatbots are embedded with ML. Things like smart assistants help
with specific tasks that are also called decision optimization. But the intelligence of these
devices increases eventually with time. The architectural alternatives for embedding AI
in IoT are discussed in the work by Calo et al. (2017). The system developed controls the
data flow rate and extracts the required data implementing the concept of edge computing.
FIGURE 1.4
AI applications.
learning process. So the overall goal for ML is to improve the machines’ performance on a
specific task such as predicting the stock market. Emerging industries that might require
AI in the coming years are shown in Figure 1.4.
• Input layer: The input layer receives data from the physical environment, such as
a smartphone camera feed.
• Hidden layer: The real network’s compute engine is the hidden layer. As a result,
there could be a lot of hidden layers.
• Output layer: The outcome is produced by the output layer.
Embedded Systems and IoT Components 13
ML is the backbone of AI. The first half of ML entails utilizing algorithms to find meaning
in random and disordered data, while the second half entails using learning algorithms to
discover the relationship between that knowledge and improve the learning process. As
a result, the overarching purpose of ML is to increase the computers’ performance on a
certain task, such as stock market prediction. More than 80% of commercial IoT initiatives
will have an AI component by 2022 (Internet of things (IoT), 2019). A self-driving car is an
example of advanced AI that uses a combination of computer vision, image recognition,
and deep learning to drive a vehicle while staying in a defined lane and avoiding obstacles
like pedestrians. Healthcare, education, finance, law, and manufacturing are just a few of
the fields where AI is being used to benefit both businesses and customers. AI is used in
a variety of technologies, including automation, ML, machine vision, natural language
processing, and robotics. AI raises ethical, legal, and security concerns. If an autonomous
vehicle is involved in an accident, for example, it is difficult to determine who is to blame.
In addition, advanced ML technologies are being used by hackers to obtain access to sensi-
tive networks. Despite the dangers, the usage of AI tools is governed by few restrictions.
Experts assure us, however, that AI will simply improve products and services in the near
future, not replace us, the people.
1.7 Conclusion
The IoT is paving the way for digital transformation at an exponential rate. Technical as
well as physical industries are adopting IoT to digitize their products. The embedded sys-
tems give enhanced results because of their small size and low power consumption capa-
bility. The future scope of embedded software testing can be improved by the adoption
of technologies that can process huge amounts of data with a reduced response time. The
data collected from sensors such as liquid levels, distance measures, smoke detectors, soil
moisture levels, temperature, humidity, and light data, as well as location’s longitude and
latitude, is used in burgeoning IoT applications. Apart from different control applications
of sensors, they have also been helpful in environmental monitoring techniques. The data
perceived from sensors becomes difficult to manage, so AI is incorporated in IoT. This
combination not only automates the industries but also results in devices with optimized
results. AI techniques can be used in order to embed human intelligence into devices and
industrial products. AI models train the data for enhanced results. Overall, the impor-
tance and future scope of sensor technologies, embedded systems, and the need for IoT in
the industrial and business sectors have been covered.
1.8 Summary
The IoT has been described here as the emerging resource for a future where all physical
and technical devices will be connected through the internet. The importance of embed-
ded systems has been covered with the supporting statements of their features. The lack
of some characteristics in these systems leading to less reliable behavior of embedded
systems has also been discussed. The sensors that collect huge amounts of data also play
14 Mathematical Modeling for Intelligent Systems
an important role in the study. The factors that make the technology of sensors more
advanced and useful have been stated. The adoption of techniques discussed will result
in desired results depending on the expectations of the consumer. Applications of IoT and
its resulting outcomes have been studied to achieve a deeper understanding of the study.
AI incorporated with IoT has given new hope in the development of a world of digitized
things.
References
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15),
2787–2805. https://doi.org/10.1016/j.comnet.2010.05.010
Azarpeyvand, A., Salehi, M. E., Firouzi, F., Yazdanbakhsh, A., & Fakhraie, S. M. (2010). Instruction
reliability analysis for embedded processors. In: 13th IEEE Symposium on Design and Diagnostics
of Electronic Circuits and Systems (pp. 20–23). https://doi.org/10.1109/DDECS.2010.5491824
Beck, J., Stern, M., & Haugsjaa, E. (1996). Applications of AI in education. XRDS: Crossroads, the ACM
Magazine for Students, 3(1), 11–15. https://doi.org/10.1145/332148.332153
Bertino, E. (2016). Data security and privacy in the IoT. In: EDBT. https://doi.org/10.5441/002/
edbt.2016.02
Bogue, R. (2007). MEMS sensors: Past, present and future. Sensor Review, 27(1), 7–13. https://doi.
org/10.1108/02602280710729068
Calo, S. B., Touna, M., Verma, D. C., & Cullen, A. (2017). Edge computing architecture for applying
AI to IoT. In: IEEE International Conference on Big Data (Big Data), 2017 (pp. 3012–3016). https://
doi.org/10.1109/BigData.2017.8258272
Chen, S., Xu, H., Liu, D., Hu, B., & Wang, H. (2014). A vision of IoT: Applications, challenges, and
opportunities with China perspective. IEEE Internet of Things Journal, 1(4), 349–359. https://
doi.org/10.1109/jiot.2014.2337336
Faught, W. (1986). Applications of AI in engineering. Computer, 19(7), 17–27. https://doi.org/10.1109/
MC.1986.1663273
Glaß, M., Yu, H., Reimann, F., & Teich, J. (2012). Cross-level compositional reliability analysis for
embedded systems. In F. Ortmeier & P. Daniel (Eds.) Computer Safety, Reliability, and Security.
Lecture Notes in Computer Science. SAFECOMP 2012 (vol. 7612, pp. 111–124). Springer. https://
doi.org/10.1007/978-3-642-33678-2_10
Hassan, Q. F. (2018). Introduction to the internet of things. In: The Internet of Things A to Z: Technologies
and Applications (pp. 1–50). IEEE. https://doi.org/10.1002/9781119456735.ch1
https://www.idc.com/getdoc.jsp?containerId=prAP46899220
https://www.idc.com/tracker/showproductinfo.jsp?containerId=IDC_P33198
https://owasp.org/www-project-internet-of-things/
https://www.maximizemarketresearch.com/market-report/global-industrial-sensors-market/
34465/
https://www.statista.com/statistics/273018/number-of-internet-users-worldwide/
https://www.statista.com/statistics/871513/worldwide-data-created/
https://www.wired.com/brandlab/ 2018/05/bringing-power-ai-internet-things/
Internet of things (IoT). (2019). HI, road map AU. https://eps.ieee.org/images/files/HIR_2019/
HIR1_ch03_iot.pdf
Lee, I., Shaw, W., & Fan, X. (2009). Wireless multimedia sensor networks. In: Misra, S, Woungang, I.
& Misra, S. (eds). Computer Communications and Networks (pp. 561–582). Springer. https://doi.
org/10.1007/978-1-84882-218-4_22
Liu, B. (2021). ‘Weak AI’ is likely to never become “strong AI”, so what is its greatest value for us?
https://arxiv.org/pdf/2103.15294.pdf
Embedded Systems and IoT Components 15
Liu, T., & Lu, D. (2012). The application and development of IoT. In: International Symposium on
Information Technologies in Medicine and Education, 2012 (pp. 991–994). https://doi.org/10.1109/
ITiME.2012.6291468
Mois, G., Folea, S., & Sanislav, T. (2017). Analysis of three IoT-based wireless sensors for environmen-
tal monitoring. IEEE Transactions on Instrumentation and Measurement, 66(8), 2056–2064. https://
doi.org/10.1109/TIM.2017.2677619
National Intelligence Council (1663). Disruptive civil technologies—six: Technologies with potential
impacts on the US interests out to 2025. https://www.dni.gov/. Conference Report CR 2008,
07(April) p. 2008.
Prabhu, K., Dhineshkumar, P., Gobisankar, S., Gowrisankar, M., & Suryapranesh, M. B. (2018).
A comparative study of algorithms for measuring HVAC in IoT. https://doi.org/10.15680/
IJIRSET.2018.0702023
Prien, R. D. (2007). The future of chemical in situ sensors. Marine Chemistry, 107(3), 422–432. https://
doi.org/10.1016/j.marchem.2007.01.014
Sarishma, T. R., Kumar S., Awasthi M.K. (2021) To beacon or not?: Speed based probabilistic adap-
tive beaconing approach for vehicular ad-hoc networks. In: Paiva S., Lopes S.I., Zitouni R.,
Gupta N., Lopes S.F., Yonezawa T. (eds) Science and Technologies for Smart Cities. SmartCity360°
2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications
Engineering, vol. 372. Springer, Cham. https://doi.org/10.1007/978-3-030-76063-2_12
Sehrawat, D., & Gill, N. S. (2019). Smart sensors: Analysis of different types of IoT sensors. In: 3rd
International Conference on Trends in Electronics and Informatics (ICOEI), 2019 (pp. 523–528).
https://doi.org/10.1109/ICOEI.2019.8862778
Shukla, A. (2021). A study on Internet of things: Industrial application and difficulties. https://
easychair.org/publications/preprint/5TVQ
Tomar R., & Tiwari R. (2019) Information delivery system for early forest fire detection using inter-
net of things. In: Singh M., Gupta P., Tyagi V., Flusser J., Ören T., Kashyap R. (eds) Advances in
Computing and Data Sciences. ICACDS 2019. Communications in Computer and Information Science,
vol. 1045. Springer, Singapore. https://doi.org/10.1007/978-981-13-9939-8_42
2
Security and Privacy in Mobile Cloud Computing
A. Katal
University of Petroleum and Energy Studies
CONTENTS
2.1 Introduction .......................................................................................................................... 18
2.1.1 General Architecture ............................................................................................... 18
2.1.2 Features ..................................................................................................................... 20
2.2 Mobile Cloud Service Models ............................................................................................ 20
2.3 Green Mobile Cloud Computing ....................................................................................... 21
2.4 Introduction to Security and Privacy in Mobile Cloud Computing ............................22
2.5 Security and Privacy Challenges in Mobile Cloud Computing ................................... 23
2.5.1 Challenges Related to Data Security ..................................................................... 23
2.5.2 Offloading and Partitioning Security Challenges .............................................. 23
2.5.3 Virtualization ........................................................................................................... 24
2.5.4 Challenges Related to Mobile Cloud Applications ............................................. 24
2.5.5 Security Challenges Related to Mobile Devices .................................................. 25
2.5.6 Security of Mobile Network ................................................................................... 25
2.5.7 Problems Related to Mobile Terminal .................................................................. 25
2.5.7.1 Malware ...................................................................................................... 25
2.5.7.2 Vulnerabilities in Software ...................................................................... 26
2.5.8 Mobile Cloud ............................................................................................................ 26
2.5.9 Privacy Challenges .................................................................................................. 27
2.6 Current Solutions for the Security and Privacy Issues .................................................. 27
2.6.1 Data Security ............................................................................................................ 27
2.6.2 Partitioning and Offloading ................................................................................... 27
2.6.3 Virtualization ........................................................................................................... 28
2.6.4 Mobile Cloud Applications..................................................................................... 28
2.6.5 Mobile Devices ......................................................................................................... 29
2.6.6 Mobile Network ....................................................................................................... 29
2.6.7 Mobile Terminal ....................................................................................................... 29
2.6.7.1 Antimalware .............................................................................................. 29
2.6.7.2 Software Vulnerabilities ..........................................................................30
2.6.8 Mobile Cloud ............................................................................................................30
2.6.9 Privacy .......................................................................................................................30
2.7 Discussion and Conclusion ................................................................................................30
References....................................................................................................................................... 31
DOI: 10.1201/9781003291916-2 17
18 Mathematical Modeling for Intelligent Systems
2.1 Introduction
Since 2007, MCC has been an important field of research for the technological and engi-
neering sectors. Cloud computing is usually characterized as a collection of services made
available through a Web cluster system. Such cluster structures are defined as a collection
of reduced cost servers or Personal Computers (PCs) that arrange the machines’ various
resources as per a specific strategy as well as provide services for data processing that are
secure, reliable, rapid, efficient, and consistent to customers. Meanwhile, smartphones have
come to symbolize a wide range of mobile devices since they have become increasingly
internet-connected as wireless network technology has progressed. Growing popularity
and portability are two essential aspects of next-generation networking, which provides
a variety of personalized communication networks via a number of network endpoints
and access methods. The basic technology of Cloud Computing (CC) is the centralization
of computers, services, and specialized applications as a utility to be sold to consumers in
the same way that water, gas, or electricity are. As a result of the combination of ubiquity
mobile networks and CC, a new computing paradigm, termed MCC, is created.
Instead of typical local PCs or servers, resources in MCC networks are virtualized and
deployed to a group of multiple independent systems as development of cloud comput-
ing, and are made available to smartphones like cellphones, mobile terminals, and so
on. Mobile Cloud Computing (MCC) has seen a faster expansion in terms of research as
mobile phones have become a need for human life. The introduction of MCC represents a
fundamental shift in computer science technologies as well as phone developers.
MCC is a relatively new subset of cloud computing in which mobile apps are created
or driven by cloud computing technologies. It is constantly developing and is commonly
used for data storage and processing in mobile devices. Mobile cloud technologies pro-
vide processing power and data management from smartphones and the cloud to a sig-
nificantly greater population of cellular customers, delivering applications and mobile
computing to nonsmartphone consumers (Noor et al., 2018). The number of mobile device
users has increased dramatically in a very short period. Almost every person possesses
at least one Smartphone Device (SMD), and as the number of SMDs has grown so has
the use of the internet in SMDs. Because of the widespread usage of the internet, MCC is
anticipated to play a significant role in the IT sector. A mobile cloud approach enables pro-
grammers to construct mobile user–specific apps which are not constrained by the phone’s
mobile operating system, computation, or storage abilities. MCC has attracted the interest
of businessmen as a lucrative and beneficial solution provider that minimizes mobile app
creation and maintenance costs while letting mobile consumers to easily acquire the on-
demand technology.
While MCC will make and is making a significant contribution to our everyday lives, it
will and has introduced a slew of new obstacles and concerns. In order to overcome the
constraint of limited resources and processing capacity of mobile devices and to attain
good access to CC equivalent to that of regular computers and laptops (Al_Janabi &
Hussein, 2019), it is necessary to study MCC paradigm in detail.
FIGURE 2.1
Architecture of mobile cloud computing.
• Mobile user layer: This tier is made up of many different mobile cloud service
consumers who use mobile devices to access cloud services.
• Mobile network layer: This layer is made up of several mobile network providers
who handle mobile user queries and deliver information via base stations. These
user requests are handled by the home agent’s mobile network services, such as
Authentication, Authorization, and Accounting (AAA). Mobile network carriers
assist in identifying the subscribers’ data held in their databases via their Home
agent (HA).
• Cloud service provider layer: This layer is made up of numerous CC service pro-
viders who offer a variety of CC services. These CC services are elastic, meaning
they may be scaled up or scaled down depending on what CC service consumers
20 Mathematical Modeling for Intelligent Systems
2.1.2 Features
• Elasticity: Users can quickly gain access to provide computer resources without
requiring human intervention. User capabilities may be supplied fast and elasti-
cally, in certain cases dynamically, to easily scale out or up.
• Infrastructure scalability: With minimal modifications to an infrastructure
design and software, new nodes in data centers may be added or withdrawn from
the network. Based on demand, mobile cloud architecture may rapidly expand
horizontally or vertically.
• Access to a broad network: The network makes user skills and abilities accessible,
and they may be retrieved via standard techniques that encourage utilization by
diverse platforms such as mobile phones, PCs, and PDAs.
• Location independence: Another feature of MCC is its independence from loca-
tion. There is a distinct feeling of location independence, in which the user has had
no influence over or awareness of the actual location of the delivered resources.
However, indicating location at different levels of abstraction beyond nation, state,
or data center may be conceivable.
• Cost and scale effectiveness: Mobile cloud deployments, regardless of the deploy-
ment strategy, prefer to be as big as feasible and make it more efficient.
FIGURE 2.2
Service models of mobile cloud computing.
MaaSB extends the cloud boundaries to phones and wireless sensors. As a consequence,
a smartphone may be configured to act as a gateway or proxy, providing network access
via different communication protocols such as 3/4G, Bluetooth, and Wireless internet.
Furthermore, the proxy mobile device may preserve the confidentiality and privacy of
their interfaced sensors.
and productively with no impact on the environment. The goal of Green Computing is
to reduce the usage of hazardous materials, utilize energy-efficient products to extend
their lifespan, and promote the recyclability or biodegradability of obsolete materials and
manufacturing waste. Low carbon footprints must be used to reduce carbon emissions.
MCC is a new and popular mobile technology that makes use of completely accessible
cloud computing services and capabilities. Users, network operators, and cloud service pro-
viders may all benefit from this technology’s extensive computational functions. However,
because of user mobility and intensive computing processes, energy consumption is a big
concern. There is a “capacity crunch” in mobile networks, which indicates that service
providers are straining to meet requests for mobile services. To provide Quality-of-Service
to the user, the service provider must provide a complete package of capabilities, such
as increasing network efficiency and decreasing energy consumption depending on the
user’s mobility behaviors. In the scope of MCC, energy conservation must be addressed
not just on the cloud side but also on the mobile side. The former is utilized to overcome the
latter’s existing constraint by utilizing a distant resource provider rather than processing/
storing data locally. Externalization of data and apps is considered a viable option for con-
serving energy in mobile devices. This, however, is dependent on the MCC design under
consideration.
2.5.3 Virtualization
Cloud service providers in MCC deliver cloud services to mobile consumers using virtu-
alization methods. A replica of the portable smartphone’s virtual machine (VM) is pre-
installed in the cloud, as well as the smartphone’s tasks are outsourced to the VM for
execution. This VM is also known as a thin VM or a phone clone. VMs are preloaded in
the cloud so that duties may be offloaded to the VM for execution, which is known as vir-
tualization. The primary goal of virtualization is to provide several VMs that run on the
same physical system. The implementation of this procedure in mobile apps may provide
numerous problems, such as illegal user access and VM-to-VM attack. The primary goal of
virtualization is to offer several VMs that run on the same physical system or mobile device
while being separated from one another. A hypervisor, often known as a VM Monitor
or Manager (VMM), is software that facilitates the creation, operation, and management
of VMs and other virtual subsystems. Once implemented to MCC, even so, virtualiza-
tion technologies create several security threats, such as security issues inside the VMs,
unauthorized users, VM-to-VM strike, security mechanisms within the virtual environ-
ment, security issues inside the Hypervisors, and data security (Sgandurra & Lupu, 2016).
Efficiency, coverage, complexity, security, and resilience are five essential properties of
virtualization-based security techniques (Annane & Ghazali, 2019; Sahu & Pandey, 2018).
The amount of rogue VMs that properly colocate with a targeted (victim VM) based on the
number of VMs created by the hacker is approximately described as efficiency. Security
relates to the secrecy of the VMs and their confidential material, which means no one
must be able to delete or recover the characteristics unless they have the digital signature.
Likewise, resilience relates to the way of tolerance to any sort of manipulation. Any new
technique must achieve a balance between these five fundamental criteria. Many research-
ers have begun proposing frameworks, strategies, and techniques to address these types
of issues in order to assure mobile user security.
2.5.7.1 Malware
The mobile terminal’s openness and adaptability constantly attract the attention of attack-
ers. Some malware can be downloaded and carried without the user’s knowledge, along-
side helpful programs and systems. This allows the malware to get unauthorized access to
personal information without the user’s intervention. In order to combat malware, several
security firms have created antivirus software for mobile devices. However, as harmful
assaults get more complicated, antimalware solutions should perform a similar role to that
26 Mathematical Modeling for Intelligent Systems
of the desktop. They have limited capacity and resources, necessitating antimalware solu-
tions that need considerable compute resources difficult to achieve.
• Application software: At the moment, the smartphone is the primary mobile ter-
minal and the majority of smartphone customers are used to controlling their
phones via smartphone management system, which manages the information
inside the device through data syncing between the phone and the PC. This pro-
cedure is often carried out via FTP (File Transfer Protocol). The username and
password of FTP are transmitted across the network and recorded in clear text in
the configuration file. This leads to unauthorized access to the cellular telephone
via FTP from PCs on the very same connection, resulting in personal data theft as
well as unauthorized access, intentional deletion, and harmful manipulation. In
reality, application software vulnerabilities are quite frequent. Since the software
is somewhat lax, attackers can infiltrate the mobile phone via a flaw in the applica-
tion program.
• Operating system: The OS is in charge of managing and controlling software
and hardware resources. And because the software is so sophisticated, it may
have coding flaws. In certain cases, attackers will utilize these flaws to destroy the
mobile phone.
• Others: Furthermore, security concerns in mobile terminals are still caused by
mobile users. Mobile users frequently lack security knowledge; second, mobile
users themselves may make mistakes. As a result, companies must identify and
prohibit unusual user activity.
2.5.8 Mobile Cloud
2.5.9 Privacy Challenges
One of the key problems is privacy, which arises when mobile users’ sensitive data or apps
are processed and sent from mobile devices to heterogeneously dispersed cloud servers
when using various cloud services. Such computers are located in diverse locations owned
and managed completely by the providers. In this scenario, consumers cannot personally
be monitoring the preservation of their data, so problems regarding data privacy issues
are in the hands of service suppliers, and consumers are not held accountable for privacy
violations. The use of cloud storage and processing in various places raises privacy con-
cerns (Gupta et al., 2017a, b). Furthermore, it is critical for consumers to obtain information
about the cloud hosting location because the legislation varies from one nation to another.
There are several mobile applications accessible that may be dangerous owing to having
different functionalities, gathering unintentionally users’ personal information such as
hobbies and whereabouts, and spreading unlawfully. Unwanted advertising emails, often
known as trash emails, can infringe on consumers’ privacy (Gupta et al., 2018). One of the
key differences between mobile apps and PCs is context awareness, which is provided via
sensors on mobile devices. Moreover, many systems involve and gather location informa-
tion from users, which may then be used to directly market to clients depending on their
whereabouts. As a result, location-based services pose privacy concerns since they must
collect, store, and process user information.
business. This concept is divided into three stages. First, based on the user’s preferences,
the data is categorized as nonsensitive or sensitive. The sensitive element is subsequently
handled on the smartphone or by a trusted distant entity, whereas the nonsensitive part
is transferred to another entity. TinMan is proposed by the authors of Xia et al. (2015) to
maintain anonymity and to carry out security-oriented shifting from portable devices to
the cloud. To limit vulnerability, critical data from mobile devices is isolated from mobile
applications, which are subsequently downloaded and kept on a neighboring device. A
reliable node is installed on a virtual computer in a reliable cloud. The TinMan is in charge
of determining how efficiently and cleanly this unloading process is carried out. Saab
et al. (2015) suggest a cloud-based smartphone app offloading that is both secure and
energy-efficient. A profiling engine, a deception engine, and an offloading engine are all
part of this system. The decision-making and profiling algorithms are used for continuous
categorization of SMDs in order to enhance power consumption and safety. Following the
deception, the entire or partial component is offloaded to the cloud using the offloading
engine. Langdon et al. (2015) propose and test a method for offloading mobile applications
while maintaining privacy. The privacy of the user information is maintained within the
mobile device during unloading in this technique. The experiment results demonstrate
that the proposed technique protects privacy while conserving energy throughout the
offloading process.
2.6.3 Virtualization
Vaezpour et al. (2016) offer SWAP, a security-aware provisioning and migration approach
for cellphone clones. Hao et al. (2015) explain SMOC, a secure mobile cloud platform. This
technique helps phone devices to safely copy their OS and applications to cloud-based
VMs. To maintain the protection of user information on smartphones, a hardware virtu-
alization technique is used that enables data and application functionality to be separated
from the mobile service device’s operating system. Paladi et al. (2017) provide a security
architecture for cloud infrastructure. Before deploying guest VMs, the trusted VM launch-
ing protocol is utilized.
2.6.5 Mobile Devices
While customers retain and use confidential material, app developers should pay atten-
tion to the two issues: developers can implement a layer of security as an added step in
the application level, and then they can ensure that customers’ sensitive information also
isn’t kept in the identification module card. Moreover, cloud backup solutions are critical
for customers because if a customer’s mobile is stolen or their information is deleted, the
user can restore his data from the cloud. At the moment, unique security mechanisms are
integrated into mobile devices. There are numerous security programs for mobile devices
available, each with its own set of functions such as detecting and preventing mobile
viruses, controlling unwanted access, and protecting privacy.
2.6.6 Mobile Network
The two ways to protect mobile networks are data encryption and security protocol. In
data encryption, only encrypted information is reasonably safe while transmission over
the mobile network, regardless of how the mobile terminals access the network. The inves-
tigation of the security protocol is essential for all types of access methods. Rupprecht
et al. (2018) aim to compile security information on mobile phone networks into a complete
overview and to generate pressing open research topics. To accomplish this methodically,
they create a framework that categorizes known attacks based on their purpose, sug-
gested countermeasures, underlying reasons, and root causes. In addition, they evaluate
the impact and efficacy of each assault and response. This technique is then applied to
existing research on attacks and responses in all three network generations. This allows
them to identify ten causes and four root causes of assaults (Tomar, 2020; Fore et al., 2016).
Mapping the assaults to suggested countermeasures and 5G specification recommenda-
tions are helpful in identifying outstanding research topics and obstacles for the construc-
tion of next-generation mobile networks. The NEMESYS method to smart mobile network
security is presented by the authors of Gelenbe et al. (2013). The NEMESYS project seeks to
deliver novel security mechanisms for seamless network services in the intelligent phone
environment and to enhance cellular data security through a better knowledge of the lat-
est threats. It will gather data on the nature of cyber-attacks on smart devices and the
network architecture in order to execute appropriate measures for protection.
2.6.7 Mobile Terminal
2.6.7.1 Antimalware
To safeguard the mobile terminal from attack, two steps must be taken: the first step is
to investigate and eliminate virus. Virus monitoring might be relocated to the cloud to
avoid the resource restrictions of mobile terminals. If virus is detected, lawful application
form of the cloud can be allocated to a mobile terminal and run to remove it. CloudAV is
a perfect example of antimalware software. CloudAV (CloudAV: N-Version Antivirus in
the Network Cloud, n.d.) is a novel paradigm for malware detection on mobile devices
that is built on offering antivirus as an in-cloud network service. CloudAV offers the fol-
lowing significant advantages: improved identification of dangerous software; the effect
of antivirus loopholes is reduced; previously affected systems are detected retroactively;
forensics abilities are enhanced; and modifiability and administration are improved. It
also includes bridge hosting agents and a data network featuring ten antivirus programs
30 Mathematical Modeling for Intelligent Systems
and two behavioral recognition algorithms that improves identification substantially. The
other is antimalware protection. Users must be cautious of their actions in order to avoid
malicious software from being installed on their mobile devices.
2.6.7.2 Software Vulnerabilities
Consumers must give importance to smartphones OS version notifications and download
patches or revised versions from of the OSs research and development firm as soon as
possible. In the meantime, they must be cautious while installing third-party programs.
On the other hand, in order to decrease software vulnerabilities, they need to implement a
number of technological steps. Checking the validity and integrity of software, for exam-
ple, is a crucial practice before using it.
2.6.8 Mobile Cloud
The MCC platform’s dependability and availability are critical for both cloud providers
and consumers. To begin with, CSPs should use contemporary security mechanisms such
as VPN technology, authentication and authorization, cryptography, and other technical
approaches to assure high supply from different attacks. Second, CSPs should provide
comprehensive recovery and backup solutions in order to retrieve users’ data in the event
of a major assault. By using these methods, the cloud platform may improve service qual-
ity and boost customer confidence. Encryption technology is required for sensitive data
to survive the transition from storage to transportation. However, because encryption
reduces data usage, emphasis shifts to effectively interpreting and processing the cipher-
text. The privacy homomorphism algorithm is the current focus of ciphertext processing
research. Meanwhile, key management is a critical task for corporate users.
2.6.9 Privacy
Pasupuleti et al. (2016) suggest a method that protects the confidentiality of smartphone
data that has been transferred to the cloud. A stochastic public-key cryptography method
and a ranking keyword searching engine are employed in this situation. After creating an
indexing for file collecting, the phone node secures both the information and the search
while transmitting it to be hosted in the system. Bahrami and Singhal (2015) describe a
lightweight authentication algorithm for smartphones to store information on clouds. This
method is dependent on the effect of pseudo-random permutation. Since it is compact, the
permutations process is done on a smartphone instead of the cloud to protect information
confidentiality.
but raises additional security concerns owing to the absence of complete isolation of VMs
housed on a single server. VM safe monitoring, mirroring, and migration can assist to
address some of the security concerns faced by virtualization. Smartphone users should
be allowed to verify the level of security of managed services in order to establish a visible
cloud environment. Cloud storage monitoring can be used to aid with the audits. The
resource-constrained mobile devices pose a major threat to the rapid expansion of mobile
computing. However, by integrating mobile computing with cloud computing, the expan-
sion of mobile computing may be accelerated, resulting in the emergence of a new com-
puting paradigm known as MCC. This chapter provides details about the introduction,
architecture, and service models of MCC. It covers the details in depth about the security
and privacy challenges in different domains of MCC and concludes with the solutions to
the existing problems in MCC.
References
Abdalla, A. K. A., & Pathan, A. S. K. (2014). On protecting data storage in mobile cloud comput-
ing paradigm. IETE Technical Review (Institution of Electronics and Telecommunication Engineers,
India), 31(1), 82–91. https://doi.org/10.1080/02564602.2014.891382
Alakbarov, R. G. (2021). Challenges of mobile devices’ resources and in communication channels
and their solutions. International Journal of Computer Network and Information Security, 13(1),
39–46. https://doi.org/10.5815/IJCNIS.2021.01.04
Al_Janabi, S., & Hussein, N. Y. (2019). The reality and future of the secure mobile cloud com-
puting (SMCC): Survey. Lecture Notes in Networks and Systems, 81, 231–261. https://doi.
org/10.1007/978-3-030-23672-4_18
Al-Mutawa, M., & Mishra, S. (2014). Data partitioning: An approach to preserving data privacy in
computation offload in pervasive computing systems. In Q2SWinet 2014- Proceedings of the 10th
ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 51–60. https://doi.
org/10.1145/2642687.2642696
Alqahtani, H. S., & Kouadri-Mostefaou, G. (2014). Multi-clouds mobile computing for the secure
storage of data. In 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing,
pp. 495–496. https://doi.org/10.1109/UCC.2014.68
Annane, B., & Ghazali, O. (2019). Virtualization-based security techniques on mobile cloud comput-
ing: Research gaps and challenges. International Journal of Interactive Mobile Technologies (IJIM),
13(4), 20–32. https://doi.org/10.3991/IJIM.V13I04.10515
Bahrami, M., & Singhal, M. (2015). A light-weight permutation based method for data privacy in
mobile cloud computing. In 2015 3rd IEEE International Conference on Mobile Cloud Computing,
Services, and Engineering, 189–196. https://doi.org/10.1109/MOBILECLOUD.2015.36
CloudAV: N-Version Antivirus in the Network Cloud (n.d.). https://www.usenix.org/legacy/event/
sec08/tech/full_papers/oberheide/oberheide_html/index.html
Feng, D. G., Zhang, M., Zhang, Y., & Xu, Z. (2011). Study on cloud computing security. Ruan Jian Xue
Bao/Journal of Software, 22(1), 71–83. https://doi.org/10.3724/SP.J.1001.2011.03958
Fore, V., Khanna, A., Tomar, R., & Mishra, A. (2016). Intelligent supply chain management system.
In International Conference on Advances in Computing and Communication Engineering (ICACCE),
pp. 296–302. https://doi.org/10.1109/ICACCE.2016.8073764
Gelenbe, E., Görbil, G., Tzovaras, D., Liebergeld, S., Garcia, D., Baltatu, M., Lyberopoulos, G., Gelenbe,
E., Görbil, G, Görbil, G., Tzovaras, D., Liebergeld, S., Garcia, D., & Baltatu, M. (2013). NEMESYS:
Enhanced network security for seamless service provisioning in the smart mobile ecosystem.
In Information Sciences and Systems 2013 Lecture Notes in Electrical Engineering, vol. 264, pp. 369–
378. https://doi.org/10.1007/978-3-319-01604-7_36
32 Mathematical Modeling for Intelligent Systems
Gupta, M., Benson, J., Patwa, F., & Sandhu, R. (2017a). Dynamic groups and attribute-based access
control for next-generation smart cars. In Proceedings of the Ninth ACM Conference on Data and
Application Security and Privacy, pp. 61–72. 2019.
Gupta, M., Patwa, F., & Sandhu, R. (2017b). Object-tagged RBAC model for the Hadoop ecosystem. In
IFIP Annual Conference on Data and Applications Security and Privacy, pp. 63–81. Springer, Cham.
Gupta, M., Patwa, F., & Sandhu, R. (2018). An attribute-based access control model for secure big data
processing in Hadoop ecosystem. In Proceedings of the Third ACM Workshop on Attribute-Based
Access Control, pp. 13–24.
Hao, Z., Tang, Y., Zhang, Y., Novak, E., Carter, N., & Li, Q. (2015). A secure SMOC mobile cloud
computing platform. In 2015 IEEE Conference on Computer Communications (INFOCOM),
pp. 2668–2676. https://doi.org/10.1109/INFOCOM.2015.7218658
IA Guidance (n.d.). https://apps.nsa.gov/iaarchive/library/ia-guidance/
ITU-T Technical Report XSTR-SEC-MANUAL Security in telecommunications and information
technology (7th edition) (n.d.).
Lai, J., Deng, R. H., Guan, C., & Weng, J. (2013). Attribute-based encryption with verifiable out-
sourced decryption. IEEE Transactions on Information Forensics and Security, 8(8), 1343–1354.
https://doi.org/10.1109/TIFS.2013.2271848
Langdon, R. J., Yousefi, P. D., Relton, C. L., & Suderman, M. J. (2015). Privacy-preserving offloading of
mobile app to the public cloud. Clinical Epigenetics. https://doi.org/10.2/JQUERY.MIN.JS
Nike. Just Do It. Nike IN. (n.d.). https://www.nike.com/in/
Noor, T. H., Zeadally, S., Alfazi, A., & Sheng, Q. Z. (2018). Mobile cloud computing: Challenges and
future research directions. Journal of Network and Computer Applications, 115, 70–85. https://doi.
org/10.1016/J.JNCA.2018.04.018
Paladi, N., Gehrmann, C., & Michalas, A. (2017). Providing User Security Guarantees in Public
Infrastructure Clouds. IEEE Transactions on Cloud Computing, 5(3), 405–419. https://doi.
org/10.1109/TCC.2016.2525991
Pasupuleti, S. K., Ramalingam, S., & Buyya, R. (2016). An efficient and secure privacy-preserving
approach for outsourced data of resource constrained mobile devices in cloud comput-
ing. Journal of Network and Computer Applications, 64, 12–22. https://doi.org/10.1016/J.
JNCA.2015.11.023
Pokharel, S., Choo, K. K. R., & Liu, J. (2017). Mobile cloud security: An adversary model for light-
weight browser security. Computer Standards and Interfaces, 49, 71–78. https://doi.org/10.1016/J.
CSI.2016.09.002
Prokhorenko, V., Choo, K. K. R., & Ashman, H. (2016). Web application protection techniques: A
taxonomy. Journal of Network and Computer Applications, 60, 95–112. https://doi.org/10.1016/J.
JNCA.2015.11.017
Qamar, A., Karim, A., & Chang, V. (2019). Mobile malware attacks: Review, taxonomy & future
directions. Future Generation Computer Systems, 97, 887–909. https://doi.org/10.1016/J.
FUTURE.2019.03.007
Racic, R., Ma, D., & Chen, H. (2006). Exploiting MMS vulnerabilities to stealthily exhaust mobile phone’s
battery. In 2006 Securecomm and Workshops. https://doi.org/10.1109/SECCOMW.2006.359550
Rupprecht, D., Dabrowski, A., Holz, T., Weippl, E., & Popper, C. (2018). On security research towards
future mobile network generations. IEEE Communications Surveys and Tutorials, 20(3), 2518–
2542. https://doi.org/10.1109/COMST.2018.2820728
Saab, S. A., Saab, F., Kayssi, A., Chehab, A., & Elhajj, I. H. (2015). Partial mobile application offloading
to the cloud for energy-efficiency with security measures. Sustainable Computing: Informatics
and Systems, 8, 38–46. https://doi.org/10.1016/J.SUSCOM.2015.09.002
Sahu, I., & Pandey, U. S. (2018). Mobile cloud computing: Issues and challenges. In 2018 International
Conference on Advances in Computing, Communication Control and Networking (ICACCCN),
pp. 247–250. https://doi.org/10.1109/ICACCCN.2018.8748376
Sgandurra, D., & Lupu, E. (2016). Evolution of attacks, threat models, and solutions for virtualized
systems. ACM Computing Surveys (CSUR), 48(3), 1–38. https://doi.org/10.1145/2856126
Mobile Cloud Computing 33
Tan, J., Gandhi, R., & Narasimhan, P. (2015). STOVE: Strict, observable, verifiable data and exe-
cution models for untrusted applications. In Proceedings of the International Conference on
Cloud Computing Technology and Science, CloudCom, pp. 644–649. https://doi.org/10.1109/
CLOUDCOM.2014.116
Tang, L., Ouyang, L., & Tsai, W. T. (2016). Multi-factor web API security for securing Mobile
Cloud. In 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD),
pp. 2163–2168. https://doi.org/10.1109/FSKD.2015.7382287
Tomar R. (2020). Maintaining trust in VANETs using blockchain. ACM SIGAda Ada LettersAda. 40,
91–96. https://doi.org/10.1145/3431235.3431244
Vaezpour, S. Y., Zhang, R., Wu, K., Wang, J., & Shoja, G. C. (2016). A new approach to mitigating
security risks of phone clone co-location over mobile clouds. Journal of Network and Computer
Applications, 62, 171–184. https://doi.org/10.1016/J.JNCA.2016.01.005
Wang, H., Wu, S., Chen, M., & Wang, W. (2014). Security protection between users and the
mobile media cloud. IEEE Communications Magazine, 52(3), 73–79. https://doi.org/10.1109/
MCOM.2014.6766088
Xia, Y., Liu, Y., Tan, C., Ma, M., Guan, H., Zang, B., & Chen, H. (2015). Tinman: Eliminating confiden-
tial mobile data exposure with security oriented offloading. In Proceedings of the 10th European
Conference on Computer Systems, EuroSys 2015. https://doi.org/10.1145/2741948.2741977
3
A Review on Live Memory Acquisition
Approaches for Digital Forensics
CONTENTS
3.1 Introduction .......................................................................................................................... 36
3.2 Related Work ........................................................................................................................ 37
3.3 Technical Background ......................................................................................................... 38
3.3.1 Direct Memory Access ............................................................................................ 39
3.3.2 IEEE 1394 ................................................................................................................... 39
3.3.3 System Management Mode .................................................................................... 40
3.3.4 x86 Architecture ....................................................................................................... 41
3.3.5 Virtualization Support ............................................................................................ 41
3.4 Review of Memory Acquisition Techniques ....................................................................42
3.4.1 Hardware-Based Memory Acquisition.................................................................42
3.4.1.1 Dedicated Hardware ................................................................................42
3.4.1.2 Special Hardware Bus ..............................................................................42
3.4.1.3 Cold Booting ..............................................................................................42
3.4.1.4 Limitations of Hardware-Based Techniques ........................................43
3.4.2 Software-Based Memory Acquisition ...................................................................43
3.4.2.1 User Level ...................................................................................................43
3.4.2.2 Kernel Level ............................................................................................... 45
3.4.2.3 Virtualization Based ................................................................................. 46
3.4.2.4 Limitations of Software-Based Techniques........................................... 46
3.4.3 Firmware-Based Memory Acquisition ................................................................. 46
3.5 Memory Dump Formats ..................................................................................................... 46
3.5.1 Raw Memory Dump ................................................................................................ 47
3.5.2 Windows Crash Dump ........................................................................................... 47
3.5.2.1 Complete Memory Dump ........................................................................ 47
3.5.2.2 Kernel Memory Dump ............................................................................. 47
3.5.2.3 Small Memory Dump ............................................................................... 48
3.5.3 Windows Hibernation File ..................................................................................... 48
3.5.4 Expert Witness Format............................................................................................ 48
3.5.5 AFF4 Format ............................................................................................................. 48
3.5.6 HPAK Format ........................................................................................................... 49
3.6 Memory Acquisition Tools ................................................................................................. 49
3.6.1 Magnet RAM Capture............................................................................................. 50
3.6.2 Belkasoft Live RAM Capturer ............................................................................... 50
DOI: 10.1201/9781003291916-3 35
36 Mathematical Modeling for Intelligent Systems
3.1 Introduction
Digital forensics is defined as the collection, preservation, examination, and presentation
of digital evidence in a coherent, verifiable manner at a court of law using scientifically and
technologically driven methods (Beebe, 2009). In the case of digital forensics, data present
in digital systems is of great significance as it serves as strong baseline evidence in relation
to cybercrimes being committed. Recently, Google suffered a major outage on December
14, 2020 that lasted for about 45 minutes, amounting to serious monetary and service loss
(2020_Google_services_outages @ En.Wikipedia.Org, n.d.).
Since 2000s, malicious attackers have become sophisticated as well as complex in their
approach to attacking and stealing. Various obfuscation based techniques (Harichandran
et al., 2016), hiding via antiforensics based (Palutke et al., 2020) techniques, are now being
actively used. Advanced malware can hide and is often encrypted, making it much more diffi-
cult for the incident response team to determine the true nature of the malware (Rathnayaka &
Jamdagni, 2017). Memory analysis techniques can be used to acquire and examine certain
malware behaviors in their native form while they are running in memory. Live memory
forensics aids in acquiring and analyzing such activities within the digital systems.
Memory forensics is a specialized realm of acquiring, recovering, interpreting, and
analyzing evidence present in the volatile memory of digital systems by using various
approaches and techniques. Fast-paced evolution of cybercrime landscape has necessi-
tated the presence of this area. Memory forensics is used to analyze physical or volatile
memory; more commonly known as RAM (Random Access Memory) in order to collect
the evidence by retrieving data from the confiscated device that was used at the commis-
sion of a crime. It is about acquiring the memory first and then identifying as well as ana-
lyzing it depending upon the case being investigated at hand. It apprehends the memory
contents that is a prominent tool for malware analysis and digital forensic investigators.
Acquisition is a process of collecting evidence from the confiscated device through
which the crime is committed by using various techniques. There are two types of meth-
odologies that are followed for acquiring the image of digital evidence and these are Live
Acquisition and Dead Acquisition.
The data stored on the hard disk drive and within the file system is not lost because the
storage is nonvolatile in nature. However, for volatile memory such as RAM, the data is
lost as soon as the power is cut off. Once the power has been cut off for a period of time,
the state of the data becomes completely unknown. This traditional approach is more com-
monly known as “pulling the plug” where the focus of analysis is on nonvolatile stor-
age. This is now more commonly referred to as Dead Memory Acquisition. It refers to the
powered-off or dead system, which is turned off and no data processing is taking place. It
is performed by pulling the plug methodology to avoid any malicious process from run-
ning and potentially deleting evidence. There are fewer chances of data modification. It
has practical, legal constraints and lacks standardized issues.
In the early 2000s, most investigators simply used to capture the picture of the screen of
what was open at the moment and would pull the plug out of the system. In cases where
Digital Forensics 37
the system was live and encrypted, the investigator easily lost the mere opportunity to
access the system state (Beebe, 2009). If pull the plug methodology is followed, it allows
little or no insight into what operations the processor was executing at the time when the
power was cut off. This severely limits the investigative process.
As the processor’s computational ability and memory increased, the need to analyze it
also increased since many applications started to execute only in-memory leaving no trace
behind. Live Acquisition on the other hand refers to live systems that are up and running
where information may be altered as data is continuously processed. It is performed by
using specialized tools and techniques to extract volatile data from the computer before
turning it off. It can easily retrieve volatile information. The acquisition of RAM can further
be performed via two different ways, i.e., hardware- and software-based memory acquisi-
tion. Sometimes firmware-based memory acquisition is also possible (Stüttgen et al., 2015).
The key contributions of this work are outlined as follows:
The rest of this paper is categorized as follows: Section 3.2 outlines the related work in
this area. Section 3.3 provides the technical background which is necessary to give a con-
text for further discussion. Section 3.4 gives a comprehensive review of various hardware-
and software-based acquisition approaches for memory acquisition. Section 3.5 discusses
the various memory dump formats that are provided by using memory acquiring tools.
Section 3.6 includes various prominent memory acquisition tools along with their detailed
comparison. Section 3.7 provides the testbed setup and methodology required for imple-
menting memory acquisition tools in the system. Lastly, we conclude our work.
3.2 Related Work
Memory forensics was highlighted and worked upon after the initial impetus provided
by the DFRWS challenge in 2005 (Reust & Friedburg, 2006). A trend was observed in the
research community toward acquisition, and analysis of volatile memory in particular
post this challenge. Acquisition techniques faced some setbacks as discussed further,
whereas analysis techniques continue to face resistance and are still worked on.
Figure 3.1 represents the research contribution in the area of volatile memory acquisi-
tion over the last decade. It is clear that the contributions started to significantly increase
once the DFRWS challenge was launched. This impetus fed not only the progress of the
research community but fed directly into the industry-based development. The result was
a steep rise in the presence of write blockers and encryption alternatives which prevented
reliable memory acquisition. This led to a downfall in research interest in the lieu of lim-
ited support from industry and government-backed organizations.
38 Mathematical Modeling for Intelligent Systems
FIGURE 3.1
Year-wise contribution in research publications.
In this section, we analyze and review different research works that are done in the
area of volatile memory acquisition for live systems. The methodologies, techniques,
research works, and anything other than memory acquisition-based are out of the
scope of this discussion. In particular, we have excluded analysis-based discussion
from this work.
Brian D. Carrier and Grand (2004) presented a procedure for acquiring volatile memory
using a hardware expansion card that can copy memory to an external storage device
(Carrier & Grand, 2004). With the flow of passing time, Acquisition of Random-Access
Memory (RAM) was described into two types, i.e., hardware acquisition and software
acquisition as mentioned in the work of Vidas (2007). Vömel and Freiling (2011) in their
work proposed various main memory acquisition approaches on the basis of two fac-
tors, atomicity and availability, and also provided analysis techniques for the Windows
Operating system family. Classification of memory accessibility levels on the basis of pre-
or postincident deployment and terminating vs nonterminating acquisition was provided
in their work by Latzo et al. (2019). Through the years, many research works have been
done in this field. Table 3.1 provides the review of these works with a focus on the purpose
of work and the implementation, if any. Table 3.2 provides a review of the advantages and
limitations of these works.
3.3 Technical Background
In this section, we provide the necessary technical background required for better under-
standing of rest of the work. Some generic concepts such as DMA, IEEE 1394, SMM,
Virtualization support are described in this section. We have used Intel’s x86-64 architec-
ture to demonstrate these principles as it is widely deployed and well documented.
Digital Forensics 39
TABLE 3.1
Review of Existing Work on Memory Acquisition
Author’s Name
and Year Purpose of the Work Proposed and Implementation (If Any)
Carrier and Procedure for obtaining volatile memory with a hardware expansion card, as well as general
Grand (2004) memory acquisition tool specifications. Tribble: The Proof-of-Concept device was designed to
ensure that the protocol was successful
Vidas (2007) The advantages and disadvantages of conventional incident management approaches versus
an augmented model were discussed, as well as a basis for evaluating the captured memory.
On systems with 512MB of RAM and an IBM ThinkPad R51, tests were performed.
Vömel & Freiling An overview of the prevailing techniques and methods to collect and analyze a computer’s
(2011) memory. No specific implementation is provided.
Balogh & Mydlo Proposed a new method for activating DMA, as well as a new approach for memory
(2013) acquisition via DMA solution based on a custom NDIS protocol driver. The NDIS driver and
Network Interface Card were used to implement a method that permitted the memory
content to be dumped.
Stüttgen et al. Variety of firmware-based manipulation techniques and methods are presented for identifying
(2015) firmware-level threats. Two plug-ins for the Volatility and Rekall forensic frameworks were
created for inspection of ACPI environment.
McDown et al. Evaluated widely used seven shareware or freeware/open-source RAM acquisition forensic
(2016) tools that are compatible to work with the latest 64-bit Windows Operating systems. Internet
connection was not present while conducting the experiments on 2 and 4GB of physical
memory.
Parekh & Jani Analyzing the memory that stores relevant data, collection of evidences, extraction of crucial
(2018) information using various memory forensic tools. No practical implementation was done.
The tools are defined and compared theoretically.
Sokolov et al. Proposed a modern instrumental approach for retrieving the contents of a volatile memory, as
(2018) well as general implementation guidelines for retrieving data from memory. It just offers a
theoretical framework for investigating security incidents, with no practical implementation.
Latzo et al. (2019) A taxonomy of acquisition methods that generalizes the principle of ring-based privilege
separation and is based on a well-defined partial order. It provides the techniques for
memory acquisition and the process to achieve this.
3.3.2 IEEE 1394
IEEE 1394 (Witherden, 2010) also known as Firewire is a hardware bus potentially used
for accessing physical memory. It is a serial expansion bus that allows one device on the
bus to directly read/write from the physical memory to another. Most operating systems
40 Mathematical Modeling for Intelligent Systems
TABLE 3.2
Advantage & Limitation of the Existing Work
Author’s Name and Year Advantage and Limitation of the Work
Carrier and Grand (2004) Provides general process of volatile memory acquisition and more reliable
hardware-based evidence than software-based solution.
Prior to an incident, the hardware-based acquisition system must be installed.
Vidas (2007) Techniques for RAM acquisition and Time Sliding Window are provided along
with an overview of RAM analysis.
Operating System level malicious activity detection can be improved; current
tools only support specific runtime environments.
Vömel & Freiling (2011) Classification of volatile memory acquisition is provided on the basis of atomicity
and availability.
The work is oriented toward traditional approaches without providing the path
for future of acquisition
Balogh & Mydlo (2013) Study and implementation of direct memory access that satisfies the
requirements for rootkit detection and for forensic analysis.
The installation of the modified driver can change the contents of the memory
and could not be used if a sophisticated rootkit is already installed.
Stüttgen et al. (2015) Rootkits and other malicious applications ability to exploit x86 systems at the
firmware level is explored.
Software-based memory forensic methods are unable to identify certain firmware
rootkits.
McDown et al. (2016) Memory acquisition software usage, user interface, processing time, loaded
DLLs, and Windows registry keys are retrieved.
The implementation is limited to 2 and 4GB of physical memory, while existing
industry standards call for 16–32GB
Parekh & Jani (2018) Comparison between different tools and techniques for memory acquisition is
provided.
Different tools have been compared but only theoretically and no practical
implementation is done.
Sokolov et al. (2018) Theoretical foundation for examining information security incidents, as well as a
novel approach for accessing a hardware copy of the contents of a virtual
machine.
De-energizing the target computer results in the complete or partial destruction
of information.
Latzo et al. (2019) Classification on the basis of three factors: privilege level, pre- or postincident,
and potential termination.
On embedded systems, memory acquisition is still a hassle.
automatically configure 1394 devices upon insertion, and this can be done without requiring
administrator privileges on the system. Even if the system is locked, it will function. The prob-
lem is that an experienced intruder with administrator access can easily change permissions.
D_ LAC bit in the System Management Control Register is unlocked (Latzo et al., 2019).
Prior to a system’s boot operation, BIOS performs this task. Once the installation is com-
plete, the BIOS can lock the SMRAM, preventing any more modifications.
In SMM, only 4GB of RAM can be accessed because the address mode is equivalent to
16-bit real mode. The SMRAM can be physically located in system memory or a separate
RAM. The saved context can be restored and resumed from SMRAM using the RSM instruc-
tion. The SMM’s execution is fully transparent to the Operating System, which can detect
its execution through time discrepancies. Interrupts are completely disabled in SMM.
3.3.4 x86 Architecture
The Intel IA-32 architecture, which supports 32-bit computing, is referred to as x86 archi-
tecture. It defines Intel’s 32-bit processors instruction set and programming environment.
Byte addressing is used in this architecture, and software running on this processor may
have a linear address space of up to 4GB and a physical address space of up to 4GB. Virtual
memory, paging, privilege levels, and segmentation are all supported by the IA-32’s opera-
tional protected mode.
Fast memory registers are used by the CPU for temporary storage during processing in
the IA-32 architecture. For logical and arithmetic operations, each processor core has eight
32-bit general-purpose registers. The EIP register, also referred to as the program counter,
stores the linear address of the next instruction to be executed. This architecture also has
five control registers that define the processor’s configuration as well as the characteristics
of the task being executed.
Segmentation and paging are two memory management mechanisms implemented in
the IA-32 architecture. The 32-bit linear address space is divided into several variable-
length segments using segmentation. Memory references are addressed using 16-bit
segment selector that identifies memory-resident data structure known as a segment
descriptor, and a 32-bit offset into the specified segment. The ability to virtualize the lin-
ear address space is known as paging. Every 32-bit linear address space is divided into
fixed-length parts known as pages, which can then be mapped into physical memory in
any order. This design also supports pages up to 4MB in size, with only a page directory
needed for translation.
The Intel x86-64 architecture was introduced, which was identical to the IA-32 architec-
ture but with 64-bit registers. It has a linear address space of up to 264 bytes and can accept
64-bit linear addresses. Only 48-bit linear addresses are used in the current version, which
does not accommodate the full 64 bits. On these systems, virtual addresses are in canonical
format, which means that 63:48 can be set to all 1s or all 0s depending on the status of bit
47. It also supports an additional level of paging structures called page map level 4 (PML4).
3.4.1.1 Dedicated Hardware
Using a special hardware card was one of the first techniques for acquiring a forensic rep-
resentation of a system’s RAM storage. Carrier and Grand (2004) introduced the “Tribble”
Proof-of-Concept, which uses DMA operations to construct a replica of physical memory.
The PCI card is mounted as a dedicated hardware unit that can save volatile data to a stor-
age medium connected to it. When an external switch is pressed, the card is triggered, and
the imaging process begins. The contents of RAM are not altered by using this technique
to create a copy.
This approach has a few disadvantages, such as the need to configure a PCI card prior
to use and the fact that hardware cards can be reprogrammed to establish a different view
of physical memory. Advanced attackers can prevent PCI cards from accessing the entire
physical RAM.
3.4.1.3 Cold Booting
As volatile information is not immediately erased after powering off a machine, instead
it gradually fades away. The information can be recovered for a nonnegligible amount of
time as data stays present in the processor for some duration post power cut-off. This pres-
ence of data for a negligible period (nearly 10 seconds) is called data remanence (Vasisht &
Digital Forensics 43
Lee, 2008). It is achieved by artificially cooling down the RAM modules using liquid nitro-
gen to increase the data remanence from 10 to nearly 30 minutes. To access the retained
memory, the target machine can be restarted, i.e., cold booted with a custom kernel.
3.4.2.1 User Level
User level is the least privileged level in most operating environments. Privilege separa-
tion is achieved by operating system by using different rings and the user operates in the
least privileged ring. The user, however, retains complete control over the applications
and targets that are operating on the same privilege level. Using the user-level privileges,
memory dump can be acquired by using different methods such as Software via software
emulators, via data dumper (dd) utility, via PMDump, via Processor Dumper utility (PD).
All of these methods are outlined below (Figure 3.2).
User level is the least privileged level in most operating environments. Privilege separa-
tion is achieved by the operating system by using different rings and the user operates in
the least privileged ring. The user, however, retains complete control over the applications
and targets that are operating on the same privilege level. Using the user-level privileges,
memory dump can be acquired by using different methods such as Software via software
emulators, via dd utility, via PMDump, and via PD. All of these methods are outlined below.
3.4.2.1.1 Software Emulators
Software emulators can be used to acquire memory via user-level privileges. One of the emu-
lators is Bochs that is an open-source x86-64 emulator (Hilgers et al., 2014). No special ker-
nel driver is required for Bochs. An emulator attempts to replicate the original machine as
closely as possible. It fetches, decodes, and executes instructions one by one, mapping them
from source to target and vice-e-versa. The emulator, which is implemented as some kind of
array, provides guest memory, which enables Bochs to generate a dump efficiently. It has a
built-in debugger that can read memory from both virtual and physical addresses. Because of
the significant performance overhead associated with instruction-wise interpretation, typical
44 Mathematical Modeling for Intelligent Systems
FIGURE 3.2
Privilege rings.
programs are not recommended for execution in an emulated environment. Emulators are
also mostly used in software creation and debugging.
3.4.2.1.2 Data Dumper
Garner (2009) proposed Data Dumper, also known as dd, which is part of the Forensic
Acquisition Utilities (FAU) suite. It employs the \\.\Device\PhysicalMemory section object
to construct a full memory dump of the target machine when run with administrative
privileges. Access to this object at the user level has been constrained for security reasons.
This approach has very little value as compared to modern computing platforms.
3.4.2.1.3 PMDump
PMDump, or Process Memory Dump, is a method that enables you to save the address
space of a single process and dump the memory contents of that process into a file. It
dumps process memory with its header information from /proc//maps file. Data is dumped
either to the file or through the network to a designated storage location. This technique
is a closed source in nature that makes the development of additional parsing tools more
difficult. It also has an effect on the target host’s level of contamination.
3.4.2.2 Kernel Level
Kernel in the system is responsible for maintaining volatile memory and its associated
operations along with managing and segregating privileges of different levels. Kernel-
based interfaces and utilities can be used for memory acquisition purposes. To monitor the
debuggee and access its memory, software debuggers use kernel functionality. It has many
different alternatives which can be used to take a memory dump such as: kernel drivers,
hibernation files, software crash dumps, and software debuggers.
3.4.2.2.1 Kernel Drivers
Kernel drivers are commonly used to implement memory acquisition tools that run at
the kernel level. Kernel drivers are more reliable and easier to deploy. Even after a poten-
tial incident has occurred, investigators can initiate the acquisition process. Pmem is one
of the physical memory dumping techniques used with kernel-level access. Physical
memory can be acquired by either requesting kernel support or manually mapping
physical frames on its own. It can acquire the physical memory of both user processes
and the kernel.
3.4.2.2.2 Hibernation Files
Hibernation is a built-in feature that is being adopted by most of the recent operating
system kernels. The hibernation file is known as hiberfil.sys which is located in the root
directory. It contains runtime-specific information for running processes in the volatile
memory. The system state is frozen and a snapshot of the current working set is retained
when the operating system is about to reach an energy-saving sleep mode and is sus-
pended to disk. The hiberfil.sys file allows investigators to capture a consistent image of
volatile data.
3.4.2.2.2.1 Software Crash Dumps When a system crashes, modern operating systems have
the ability to save crash-related data in the form of a crash dump. The dump may be con-
fined to the kernel’s address space, an application’s address space, or the entire physical
address space. The system state is frozen in the event of a critical failure, and the main
memory and CPU details are saved in the system’s root directory. The user can use the built-
in CrashOnCtrlScroll feature or a third-party utility like NotMyFault.exe to force a crash. The
contents of memory will be preserved to a file if the machine is programmed for a complete
crash dump.
3.4.2.2.3 Software Debuggers
A kernel’s debugging support is used by most software debuggers. Debugging system
calls is included in most modern operating systems. The debugger can fully access the
debuggee’s memory. The debuggee is not terminated by a debugger, but it may be inter-
rupted for a random period. Since windows is proprietary in nature, a dedicated debugger
is provided by Windows itself i.e., Windbg. Windbg can be used to understand the memory
dump and map it as process and user level.
3.4.2.3 Virtualization Based
Virtualization is a process of emulating complete, isolated, and reliable system environ-
ments known as virtual machines on top of a host computer. Virtual machine monitor
(VMM) is a special software layer that is responsible for sharing, managing, and restrict-
ing access to the available hardware resources. A virtual machine has the ability to be sus-
pended, which means it can interrupt its execution process. In the case of VMware-based
machine, all volatile data is saved to a.vmem file located in the virtual machine’s working
directory (Shaw et al., 2014). The use of virtualization makes memory acquisition proce-
dure comparatively easier.
memory. They can have binary, octal, or hexadecimal data in them. It is of great signifi-
cance as the investigators analyze the memory dump file to identify the cause of the
crash or abnormal termination of the system while using different analysis techniques.
Memory dump can be used to figure out what was going on in the machine when it
crashed and one can find the appropriate solutions to fix the problem. Memory dumps
are useful for diagnosing device bugs and examining memory contents in the event of
a program failure.
user-mode programs are not included in these memory dumps. It omits only those parts
of memory that aren’t likely to have played a significant role in the issue. The previous file
is overwritten only if the “Overwrite any existing file” option is selected, or if any other issue
arises, or if another kernel memory dump file (or a complete memory dump file) exists.
3.5.5 AFF4 Format
The Advanced Forensics File Format 4 (AFF4) is an open-source format for digital evidence
and data storage. Multiple image sources, arbitrary data, and storage virtualization are
all integrated into the standard forensic file format. It supports features such as writing
and reading zip file style volumes, writing and reading AFF4 image streams, writing and
Digital Forensics 49
reading RDF metadata, logical file acquisition, etc. AFF4 format is believed to have a huge
impact on the future of memory acquisition to create a unified storage format for forensic
evidence present worldwide.
3.5.6 HPAK Format
HBGary software cooperation developed the HPAK file format. HPAK allows the physical
memory and page file(s) of a target device to be embedded in the same output file. Since
this is a proprietary format, the only tool that can create an HPAK file is FastDump. This
file format requires the HPAK command-line option; otherwise, the memory dump is cre-
ated in the default file format, raw, which excludes the page file (s).
TABLE 3.3
Comparison of Memory Acquisition Tools
Belkasoft Live RAM
Tools/Features Magnet RAM Capture Capture FTK Imager DumpIT
Release year 2014 2014 2013 2007
Latest version v1.2.0 v1.0 v4.5.0.3 v1.3.2
Copyright Magnet Forensics Inc. Belkasoft Evidence Access Data Group Inc. Moonsols
Center
Developer Magnet Forensics Belkasoft Evidence Access Data Moonsols
Center
Acquisition time 75 seconds 60 seconds 79 seconds 65 seconds
(4GB)
Acquisition time 54 seconds 31 seconds 36 seconds 34 seconds
(8GB)
Average memory 5.7MB 7.6MB 6.8MB 11.5MB
usage (4GB)
Average memory 6.8MB 7.8MB 7.0MB 12.3MB
usage (8GB)
GUI/CLI GUI GUI GUI CLI
Source go.magnetforensics.com belkasoft.com accessdata.com qpdownload.
com
Portable software Single portable executable Portable executable Requires installation Portable
folder folder executable
folder
Supported image .raw .mem .mem .raw
format
Cost effective Yes Yes Yes Yes
OS supported Windows Vista, XP, 2003, Windows Vista, XP, Windows Vista, XP, 2003, Windows Vista,
2008, 2012, 7, 8, 10 2003, 2008, 7, 8, 10 2008, 2012, 7, 8, 10 XP, 7, 8, 10
50 Mathematical Modeling for Intelligent Systems
3.6.3 FTK Imager
FTK Imager is a data preview and imaging tool for forensically sound data acquisition by
producing copies of data without tampering the original evidence. Following the creation
of an image, the Forensic Toolkit (FTK) is used to conduct a comprehensive forensic analy-
sis and generate a report of the findings (ftkimager3 @ marketing.accessdata.com, n.d.). FTK
Imager makes it simple to create forensic images, display files and directories, preview
their contents, mount an image for read-only viewing, recover deleted files, generate hash
reports, and more.
3.6.4 DumpIt
DumpIT is a free memory forensics tool created by Matthieu Suiche from MoonSols. This
tool is used to create a physical memory dump of Windows system. It is compatible with
both 64-bit and 32-bit versions of Windows operating systems. It is a very easy tool that
can be used by any user with administrative privileges. Only a confirmation question
is prompted before the raw memory dump is created in the current directory. Since it
is a very simple-to-use tool, it does not possess any analysis capabilities. Tools such as
Mandiant Redline can be used for analysis purpose.
3.7 Implementation
Acquiring the memory dump of a system requires specific tools which can be used to
extract and dump the volatile memory onto the physical memory of the system. In this
Digital Forensics 51
section, we provide the testbed setup details and further compare four leading memory
acquisition tools. The four memory acquisition tools for Windows, as described in the
previous section, were implemented on two different physical machines with different
architecture and RAM.
When these tools were executed in the system, it was assured that the same processes were
functioning to have a common standard for analysis of the tool’s performance. At the time
of acquiring memory, the system was connected to the Internet. We provide the methodol-
ogy for executing these tools, in order to assist others as follows:
52 Mathematical Modeling for Intelligent Systems
3.8 Performance Comparison
Performance comparison of the abovementioned tools was conducted and results were
analyzed on the basis of following:
The abovementioned tools are thoroughly compared in Table 3.3 with respect to certain
features. These tools were run on two Windows-based systems with varying configura-
tions. The average processor utilization done by the tools over the acquisition procedure
is graphically represented in Figures 3.3 and 3.4. Figures 3.5 and 3.6 represent processor
utilization by the tools with respect to time. The average disk utilization done by the tools
over the acquisition procedure are graphically represented in Figures 3.7 and 3.8. Figures
3.9 and 3.10 represent disk utilization by the tools with respect to time. The average time
taken by the tools over the acquisition procedure is graphically represented in Figures 3.11
and 3.12. Another detailed comparison with respect to acquisition time taken by the tools
in different runs is represented in Figures 3.13 and 3.14.
The time was calculated manually using a stopwatch. Belkasoft Live RAM Capture was
the fastest for the acquisition of both 4 and 8GB RAM, with DumpIT just a couple of seconds
behind. While the tools are being executed to acquire the memory, the tools themselves
will also utilize the processor and disk space. When it comes to 4GB RAM, FTKImager
Digital Forensics 53
FIGURE 3.3
Average processor utilization during the entire acquisition process (4GB).
FIGURE 3.4
Average processor utilization during entire acquisition process (8GB).
54 Mathematical Modeling for Intelligent Systems
FIGURE 3.5
Processor utilization with respect to time (4GB).
FIGURE 3.6
Processor utilization with respect to time (8GB).
utilizes the least percentage of the processor, whereas Magnet RAM Capture utilizes
the highest percentage of the processor. As soon as the RAM size increases, the results
were completely changed as now FTKImager utilizes the highest percentage of processor,
with DumpIT being the best because it utilizes the least percentage of processor. When
Digital Forensics 55
FIGURE 3.7
Average disk utilization during the entire acquisition process (4GB).
FIGURE 3.8
Average disk utilization during the entire acquisition process (8GB).
compared according to disk utilization in 4GB RAM, Belkasoft Live RAM Capture utilizes
the minimal space while DumpIT utilizes the maximum space in the disk. Whereas in 8GB
RAM, Magnet RAM Capture utilizes minimal space while the rest of the tools have only
the slightest differences in their outcomes in utilizing the space in the disk. The variation
in result of processor and disk utilization are not constant as it might increase, decrease, or
remain constant. The result depends upon the various processes going on while executing
the acquisition tools. The result also depends upon the configuration of windows as vary-
ing configurations will result in varying outcomes.
56 Mathematical Modeling for Intelligent Systems
FIGURE 3.9
Disk utilization with respect to time (4GB).
FIGURE 3.10
Disk utilization with respect to time (8GB).
Digital Forensics 57
FIGURE 3.11
Average time taken to acquire entire volatile memory (4GB).
FIGURE 3.12
Average time taken to acquire entire volatile memory (8GB).
58 Mathematical Modeling for Intelligent Systems
FIGURE 3.13
Time taken by tools in different runs to acquire memory (4GB).
FIGURE 3.14
Time taken by tools in different runs to acquire memory (8GB).
Digital Forensics 59
3.9 Conclusion
In this paper, we have reviewed various memory acquisition techniques that include
hardware-based, software-based, and firmware-based techniques. Hardware-based tech-
niques include dedicated hardware card, special hardware bus, and cold booting, whereas
software-based techniques include user-level, kernel-level, and virtualization-based.
Further, we have also defined various memory dump formats that include raw memory
dump, windows crash dump, and AFF4 Format. We have selected four memory acquisi-
tion tools as they are reliable, easy to use, easily available, and famous in the market. The
methodology for each of these tools is outlined in its own section. These four tools were
implemented in two Windows systems with different configurations and results obtained
were analyzed on the basis of different parameters such as memory acquisition time, pro-
cessor utilization, and disk utilization. The result depends upon the various factors such
as the processes going on while executing the acquisition tools or the windows configu-
rations, as varying configurations will result in varying outcomes. Belkasoft Live RAM
Capture appears to be the best in terms of memory acquisition time, but the variation in
the result of processor and disk utilization is not constant as it might increase, decrease or
remain constant. The outcomes are examined on the basis of various graphs obtained from
the data. Hence, various analysis techniques can be used to further analyze the memory
dump acquired through these tools, which is out of the scope for this paper.
References
2020_Google_services_outages @ en.wikipedia.org. https://en.wikipedia.org/wiki/2020_Google_ser-
vices_outages#:~:text=On 14 December 2020%2C another, still accessible with private browsing.
The last access/edit date was 25 March, 2022.
Balogh, Š., & Mydlo, M. (2013). New possibilities for memory acquisition by enabling DMA using net-
work card. In 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced
Computing Systems (IDAACS) (Vol. 2, pp. 635–639).
Beebe, N. (2009). Digital forensic research: The good, the bad and the unaddressed. IFIP Advances in
Information and Communication Technology, 306, 17–36. https://doi.org/10.1007/978-3-642-04155-6_2
Carrier, B. D., & Grand, J. (2004). A hardware-based memory acquisition procedure for digital inves-
tigations. Digital Investigation, 1(1), 50–60. https://doi.org/10.1016/j.diin.2003.12.001
ftkimager3 @ marketing.accessdata.com. (n.d.). https://marketing.accessdata.com/ftkimager3.4.2
Garner, G. M. (2009). Forensic acquisition utilities. http://gmgsystemsinc. com/fau/
Harichandran, V. S., Breitinger, F., Baggili, I., & Marrington, A. (2016). A cyber forensics needs analy-
sis survey: Revisiting the domain’s needs a decade later. Computers and Security, 57(March),
1–13. https://doi.org/10.1016/j.cose.2015.10.007
Hilgers, C., Macht, H., Muller, T., & Spreitzenbarth, M. (2014). Post-mortem memory analysis of
cold-booted android devices. In Proceedings -8th International Conference on IT Security Incident
Management and IT Forensics, IMF 2014 (pp. 62–75). https://doi.org/10.1109/IMF.2014.8
Klein, T. (2006). Process dumper. http://www.trapkit.de/research/forensic/ pd/index.html
Latzo, T., Palutke, R., & Freiling, F. (2019). A universal taxonomy and survey of forensic memory
acquisition techniques. Digital Investigation, 28, 56–69.
McDown, R. J., Varol, C., Carvajal, L., & Chen, L. (2016). In depth analysis of computer memory
acquisition software for forensic purposes. Journal of Forensic Sciences, 61, S110–S116.
60 Mathematical Modeling for Intelligent Systems
Palutke, R., Block, F., Reichenberger, P., & Stripeika, D. (2020). Hiding process memory via anti-
forensic techniques. Forensic Science International: Digital Investigation, 33, 301012. https://doi.
org/10.1016/j.fsidi.2020.301012
Parekh, M., & Jani, S. (2018). Memory forensic: Acquisition and analysis of memory and its tools com-
parison. International Journal of Engineering Technologies and Management Research, 5(2), 90–95.
ram-capture-twitter @ go.magnetforensics.com. (n.d.). http://go.magnetforensics.com/ram-capture-twitter
ram-capturer @ belkasoft.com. (n.d.). https://belkasoft.com/ram-capturer
Rathnayaka, C., & Jamdagni, A. (2017). An efficient approach for advanced malware analysis
using memory forensic technique. In Proceedings -16th IEEE International Conference on Trust,
Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big
Data Science and Engineering and 14th IEEE International Conference on Embedded Software and
Systems, Trustcom/BigDataSE/ICESS 2017 (pp. 1145–1150). https://doi.org/10.1109/Trustcom/
BigDataSE/ICESS.2017.365
Reust, J., & Friedburg, S. (2006). DFRWS 2005 Workshop Report. Online at http://www.dfrws.
org/2005/download. http://www.w1npp.org/ares/RFI/2005FI~1.PDF
Schatz, B. (2007). BodySnatcher: Towards reliable volatile memory acquisition by software. Digital
Investigation, 4(suppl.), 126–134. https://doi.org/10.1016/j.diin.2007.06.009
Shaw, A. L., Bordbar, B., Saxon, J., Harrison, K., & Dalton, C. I. (2014). Forensic virtual machines:
Dynamic defence in the cloud via introspection. In Proceedings -2014 IEEE International Conference
on Cloud Engineering, IC2E 2014 (pp. 303–310). https://doi.org/10.1109/IC2E.2014.59
Sokolov, A. N., Barinov, A. E., Antyasov, I. S., Skurlaev, S. V., Ufimtcev, M. S., & Luzhnov, V. S. (2018).
Hardware-based memory acquisition procedure for digital investigations of security incidents
in industrial control systems. In Proceedings -2018 Global Smart Industry Conference, GloSIC 2018
(pp. 1–7). https://doi.org/10.1109/GloSIC.2018.8570109
Stüttgen, J., Vömel, S., & Denzel, M. (2015). Acquisition and analysis of compromised firmware using
memory forensics. Digital Investigation, 12, S50–S60. https://doi.org/10.1016/j.diin.2015.01.010
Vasisht, V. R., & Lee, H. H. S. (2008). SHARK: Architectural support for autonomic protection against
stealth by rootkit exploits. In Proceedings of the Annual International Symposium on Microarchitecture,
MICRO, 2008 PROCEEDINGS (pp. 106–116). https://doi.org/10.1109/MICRO.2008.4771783
Vidas, T. (2007). The acquisition and analysis of random access memory. Journal of Digital Forensic
Practice, 1(4), 315–323. https://doi.org/10.1080/15567280701418171
Vömel, S., & Freiling, F. C. (2011). A survey of main memory acquisition and analysis techniques
for the windows operating system. Digital Investigation, 8(1), 3–22. https://doi.org/10.1016/j.
diin.2011.06.002
Wang, J., Zhang, F., Sun, K., & Stavrou, A. (2011). Firmware-assisted memory acquisition and analy-
sis tools for digital forensics. In 2011 Sixth IEEE International Workshop on Systematic Approaches
to Digital Forensic Engineering (pp. 1–5).
Witherden, F. (2010). Memory Forensics over the IEEE 1394 Interface (pp. 1–28). https://freddie.with-
erden.org/pages/ieee-1394-forensics.pdf
4
IoMT and Blockchain-Based Intelligent and
Secured System for Smart Healthcare
CONTENTS
4.1 Introduction .......................................................................................................................... 62
4.2 Application of IoT in Intelligent Systems ......................................................................... 62
4.2.1 Smart Homes ............................................................................................................ 62
4.2.2 Smart City ................................................................................................................. 62
4.2.3 Self-Driven Cars .......................................................................................................63
4.2.4 IoT in Healthcare ......................................................................................................63
4.3 Application of IoT in Healthcare........................................................................................63
4.3.1 Health Monitoring ...................................................................................................63
4.3.2 Remote Sensors ........................................................................................................64
4.3.3 Clinical Alert Systems .............................................................................................64
4.4 Advantages of IoMT ............................................................................................................64
4.5 Blockchain-Based Security of Intelligent IoMT-Based Smart Healthcare ...................65
4.6 Application of Blockchain in Intelligent Systems ........................................................... 66
4.6.1 Cash Transfer and Installment Handling ............................................................ 66
4.6.2 Supply Chains Checking ........................................................................................ 67
4.6.3 Tracking the Supplies .............................................................................................. 67
4.6.4 Verification of the Team .......................................................................................... 67
4.6.5 A Focus on Transactions ......................................................................................... 67
4.7 Advantages of Blockchain in Healthcare ......................................................................... 67
4.7.1 Transparency in the Supply Chain........................................................................ 68
4.7.2 Patient-Centric Electronic Health Records ........................................................... 68
4.7.3 IoT Security for Remote Monitoring ..................................................................... 69
4.8 Challenges for Blockchain in Healthcare ......................................................................... 69
4.8.1 Major Shift ................................................................................................................ 69
4.8.2 Refusal to Share ....................................................................................................... 69
4.8.3 Distributed Healthcare............................................................................................ 69
4.9 IoMT with Edge/Fog Computing ...................................................................................... 69
4.10 Conclusion ............................................................................................................................ 72
References....................................................................................................................................... 72
DOI: 10.1201/9781003291916-4 61
62 Mathematical Modeling for Intelligent Systems
4.1 Introduction
IoT market in the medical sector is the fastest growing market and is estimated to be
worth nearly $176 billion by 2026 [1]. With such vast applications, IoT is extensively used
in healthcare. IoMT is a special IoT-based platform where the patient can meet the doctor,
show their report in virtual manner, and take the proper guidance without physically
meeting them. Few years ago, diagnosis of diseases in the human body was possible only
when the patient physically met the doctor. Sometimes the patient even had to stay in
hospital for treatment, which increased the healthcare cost and also stained the health-
care facility in rural and remote locations. The technological advancement through these
years allowed us for diagnosis of various diseases and health monitoring [2]. In the last
decade, there were so many technologies created with the help of which now we can
monitor the patient blood pressure, level of glucose, oxygen level, and so on in an easier
way, and the best thing is that we do not need to physically meet with doctors to show
our reports.
All these uses can be beneficial for everyone. This makes it easy for people by saving time.
And due to high technology being used, security concerns are solved. All these uses are
carried out after lots of testing to make things reliable [3]. Smart Homes are becoming
popular every day. Due to this, the IoT has gained the trust of many people. This technol-
ogy will keep growing because there’s no end to the needs and imagination of humans.
Hopefully, this can play a major role in sending people to places other than Earth [4].
4.2.2 Smart City
Every country wants to have many Smart Cities. But why? The answer is simple—because
of the ease of everything and time efficiency. A Smart City uses the IoT [5]. Few examples
are:
• Solar panels store energy from sun rays and later use it to light up the nights. This
method is being adopted by almost every city now.
• Day–night sensors.
Smart Healthcare 63
There are a few other uses like GPS tracking and internet connectivity that are available
everywhere [6]. Many cars use this feature to modernize their products. This makes smart
connectivity between everyone. India is also using the IoT to develop. The developments
allowed India to form a movement called Digital India [7].
4.2.3 Self-Driven Cars
We have seen Elon Musk use this technology to make an outstanding product, Tesla, where
cars can move from one destination to the other on their own. Many other brands have
also tried using this technology—Google tried to make its self-driven bicycles and bikes.
This can solve many transport issues as not only do they drive on their own, but they
also interact with other vehicles to ensure safety of the passenger. This can also overcome
human interaction as there wouldn’t be any confusion.
• Minimal errors.
• Online consultancy which saves time.
• Decreases frequent visits.
Healthcare is using and promoting the IoT to decrease workloads and also ensure the
safety of a person.
4.3.2 Remote Sensors
Remote sensors are used for automation in pathology labs to control the proper environ-
ment required for various kinds of lab samples taken from the patients’ body. Like proper
cooling of blood samples etc. [9].
• In a hospital, various devices are used to track and monitor patients’ heartbeats;
their psychological condition, or their movements. All such instruments are con-
nected to each other and provide real-time information to the doctors or nurses.
FIGURE 4.1
Data flow in smart healthcare application using IoT.
Smart Healthcare 65
Such technology helps the staff to keep a check on all the patients at the same time
and even reduces hospital stay time [4].
• IoT also has a huge role in our daily lives. Everyday use devices, such as fitness
bands, oxymeters, sphygmomanometers, etc., can be tuned/programed to provide
daily reports on calories, blood pressure, oxygen levels, and even help in booking
appointments. IoT can also help in preventing emergency situations by sending
alert signals to close kin and concerned authorities when there is a disturbance in
daily patterns or reports of the person.
• Another huge part played by IoT in healthcare is in Healthcare Insurance compa-
nies. Such companies make use of large amounts of data and information collected
extensively from various healthcare facilities and health-monitoring devices. This
data helps them in understanding the most common ailments, injuries, and dis-
eases and coming up with the most helpful and profitable insurance policies for
their customers. It also aids in bringing transparency between people and them-
selves in terms of prices, terms and conditions, etc.
FIGURE 4.2
Role of blockchain in smart healthcare.
and recreated record of occasions, exchanges, and information created through different
IT processes with solid cryptographic certifications of alter obstruction, changelessness,
and unquestionable status. Public blockchain stages permit us to ensure these proper-
ties with overpowering probabilities in any event, when untrusted clients are members
of dispersed applications with the capacity to execute on the stage [11]. Despite the fact
that blockchain innovation has become prominently known due to its utilization in
the execution of Cryptographic forms of money like Bit Coin, Ethereum, and so on, the
actual innovation holds significantly more guarantee in different regions, for example,
time-stepping, logging of basic occasions in a framework, recording of exchanges, reli-
able e-administration, and so on. Numerous specialists are chipping away at many such
use cases like decentralized public key foundation, self-sovereign personality the execu-
tives, library support, wellbeing record the board, decentralized verification, decentral-
ized DNS, and so on. Additionally, organizations, for example, IBM and Microsoft are
fostering their own applications in assorted fields like the IoT, and so forth, in any event,
empowering blockchain stages on the cloud. Thinking about the need to spread the aris-
ing ideas for understudies, we chose to set up another seminar on blockchain innovation
stages and applications [12].
FIGURE 4.3
Benefits of Blockchain in smart healthcare.
Smart Healthcare 69
licensing arrangement to various applications and firms. In the middle of a few IoMT’s
that mention such as linked cars, the fog can pass persuasive short tranny. The analysis
of Fog Computing is the superior solution for applications with reduced time demands
such as increased realism, fluctuating press streaming and game playback, etc. The inte-
gration of IoMT with Fog Computing has a number of advantages to various IoT applica-
tions. Fog processing helps to reduce support times, particularly with IoT requests that
are time fragile, by short contact amid IoMT devices. Furthermore, the capacity to restore
sensor connections to a huge degree is often among the essential components connected
with fog computing. Fog Computing might give various IoMT applications several advan-
tages. This section highlights the distinctive research publications on the interconnection
between IoMT and Fog Computing. In this section, we assess the current work that has
been discussed in different applications regarding IoMT and Fog Computing joints. The
manufacturers have maintained an eye on the motive and characteristics of IoMT applica-
tions. It displays data that can be handled by fog effortlessly by IoMT devices. It also con-
veys the problems of holding up time and block, which can simply be driven by fog. Fog
Computing will also help in a wonderful way, regulate decentralized and fast-developing
IoMT plans, enhance new businesses inside the network and restrict the results of differ-
ent programs connected to network facilitator activity, as well as potential customers. The
builders began by contemplating many challenges in the construction of IoMT structures
and that this is extremely difficult in order to pick issues along with current versions of
the business and calculation frameworks. Then we talk about the advantages of the book
plan for the structuring of frames, how to cope with them, and the limit. Just how this
method may be applied to create amazing possibilities for businesses. In this way, the
unique framework analyzes the particular characteristics of Fog processing and helps to
reduce some IoMT issues. This pushed upon cellular IoT story plus explored the particular
key problems associated with conflict that may have the ability.
This gives the cloud a middleware that foreshadows fog that acts without reservation.
As a further alternative to fog cells, cloud-based middleware is investigated, tested, and
organised. Furthermore, the manufacturers suggested a structured fog framework. They
passed on software with respect to a breeze farm with a shrewd, light-fitting visitor to look
at the qualities of their style. Articles on the regulating causes of fog processing in research
content are seldom truly investigated. The particular process employs the specific task
and unambiguously determines resources for control sources and takes into consideration
everything. These people stated that they could better regulate their own job in order
to achieve much more specific research and development linked to one another so that
they might use Fog Computing plus IoMT to convert to grouped product sales associated
with the special impairment of professions. The makers have defined a big improvement
problem to prevent the reactivity of available nebulous care. They evaluated their specific
design, sometimes simply, by differentiating and active approaches, which results in a fall
in inactivity. The manufacturers have evaluated the best way of restoring IoMT devices,
which are generally resource-focused barriers. In addition, three motivating situations
with WSNs, clever automobiles, and clever organizations, will be presented, showing that
Fog’s activities may be used for a few useful purposes and organizations. The fog com-
pact utilizes a center area process to create goods possible integrated into a professional
slave interface, where expert centers use the planning resources to record information
from slave centers. Fog provides different advantages for using IoT, as they may collect
and work near the edge of the association. Fog movable rear load changes between the
procenters to correlate the slave center points with the stacking master, which updates the
Smart Healthcare 71
FIGURE 4.4
Edge/Fog computing services for IoMT-based intelligent systems.
whole system’s flexibility. The manufacturers have proposed a tonal decreasing approach
for Fog-related centers that often reduces IoT center inactivity companies. They proposed
a technique of just spreading the local store that would build up Fog to Fog to convey
corporate lethargy. With regard to unloading calculations, the specific approach obviously
represents simply not just the full line but also a few interest lessons, which otherwise
have a distinct estimate time (Figure 4.4).
The unique manufacturer has noticed the particular basic advances for the particular
viewpoint of the fog. In addition, a flexible phase for tasks in Fog Computing is provided
to start to finalize operations of fog about the requirement that the cycle be determined.
Furthermore, these folks presented a case for using IoMT environmental factors to relax
the prosperity problem by fog computing in confirmatory reversal data.
They also considered safety measures to be beneficial in ensuring that the IoT fog
emphasizes an interest in facilitating the provision of fog computing through the use
of diverse protective systems. There are scarcely any research publications considered
in automobiles in fog computing. A car strategy reported since the transmission with
handling business is known as automotive Fog Digesting. They are simply recom-
mended by physicians to increase the partnership with clients to finish the transmis-
sion and preparation, based on vehicle assets. They are optimistic in connection with
this building.
Unused approaches are used by fog vehicles to influence fog computing. In the same
vein, the manufacturers expect a cross-cutting design of the fog vehicles to depict the
dimensions of policy-making and, for instance, the fog centers in different organisations
(Figure 4.4).
72 Mathematical Modeling for Intelligent Systems
4.10 Conclusion
The development of the IoT will bring good fortune with it. Special IoT devices and
technologies associated with healthcare are called IoMT. It will greatly increase our
understanding and save our time, workload, and errors with reliability. We can expect a
good future for the IoT because it is being adopted by everyone. This technology is being
improved day by day, many tests are being held to make this technology handy. New ideas
and reviews by people also help in growing. Blockchain is a connection of data between
computers. It is used to save our data and protect it from others. It’s like a safe lock for
our data. This technology is majorly used in almost every field because everyone wants
their privacy. Storing and protecting data is not as easy as it looks. It requires lots of hard
work to do these things because we are not dealing with our own but everyone’s data.
With the help of IoMT and Blockchain, an intelligent system can be developed for smart
healthcare.
References
1. Aazam, M., Zeadally, S., Harras, K.A., “Offloading in fog computing for IoT: Review, enabling
technologies, and research opportunities”, Future Generation Computer Systems 87, pp. 278–289
(2018). https://doi.org/10.1016/j.future.2018.04.057
2. https://labs.sogeti.com/iot-vs-edge-vs-fog-computing.
3. https://www.embeddedcomputing.com/technology/iot/wireless-sensor-networks/how-
fog-computing-can-solve-the-iot-challenges.
4. Atlam, H.F., Walters, R.J., Wills, G.B., “Fog computing and the internet of things: A review”, Big
Data and Cognitive Computing 2(2), p. 10 (2018). https://doi.org/10.3390/bdcc2020010
5. https://www.rtinsights.com/what-is-fog-computing-open-consortium.
6. https://www.powersystemsdesign.com/articles/five-reasons-why-your-iot-application-
needs-fog-computing/140/14857.
7. Alli, A.A, Alam, M.M. “The fog cloud of things: A survey on concepts, architecture, standards,
tools, and applications”, Internet Things 9, p. 100177 (2020).
8. https://labs.sogeti.com/iot-vs-edge-vs-fog-computing/
9. Patni, J.C., Ahlawat, P., Biswas, S.S., “Sensors based smart healthcare framework using inter-
net of things (IoT)”, International Journal of Scientific and Technology Research 9(2), pp. 1228–1234
(2020).
10. Taneja, S., Ahmed, E., Patni, J.C., “I-Doctor: An IoT based self patient’s health monitoring
system”, In 2019 International Conference on Innovative Sustainable Computational Technologies
(CISCT) (2019).
11. Khanchi, I., Agarwal, N., Seth, P., Ahlawat, P., “Real time activity logger: A user activity detec-
tion system”, International Journal of Engineering and Advanced Technology 9(1), pp. 1991–1994
(2019).
12. Tiwari, R., Sharma, H.K., Upadhyay, S., Sachan, S., Sharma, A., “Automated parking system-
cloud and IoT based technique”, International Journal of Engineering and Advanced Technology
8(4C), pp. 116–123 (2019).
13. Kshitiz, K., Shailendra, “NLP and machine learning techniques for detecting insulting com-
ments on social networking platforms”, In Proceedings on 2018 International Conference on
Advances in Computing and Communication Engineering (ICACCE), pp. 265–272 (2018).
Smart Healthcare 73
14. https://medium.com/yeello-digital-marketing-platform/what-is-fog-computing-why-fog-
computing-trending-now-7a6bdfd73ef.
15. Gupta, M., Benson, J., Patwa, F., Sandhu, R., “Dynamic groups and attribute-based access con-
trol for next-generation smart cars”, In Proceedings of the Ninth ACM Conference on Data and
Application Security and Privacy, pp. 61–72 (2019).
16. Sharma, A., Tomar, R., Chilamkurti, N., Kim, B.G. “Blockchain based smart contracts for inter-
net of medical things in e-healthcare”, Electronics 9, p. 1609 (2020). https://doi.org/10.3390/
electronics9101609
5
AI-Enabled Cloud-Based Intelligent
System for Telemedicine
Prashant Ahlawat
GL Bajaj Institute
CONTENTS
5.1 Introduction .......................................................................................................................... 75
5.2 Artificial Intelligence in Intelligent Systems.................................................................... 76
5.2.1 Application of Artificial Intelligence in Telemedicine Systems ........................ 76
5.2.1.1 AI and BCI..................................................................................................77
5.2.1.2 AI and Nanotechnology...........................................................................77
5.2.1.3 AI with Machine Learning in Research ................................................ 78
5.2.1.4 AI and Drug Creation............................................................................... 78
5.2.2 Challenges of AI in Telemedicine Systems .......................................................... 78
5.3 Cloud Computing in Intelligent Systems ......................................................................... 78
5.3.1 Application of Cloud Computing in Telemedicine Systems .............................80
5.4 Conclusion ............................................................................................................................83
References.......................................................................................................................................83
5.1 Introduction
In the current generation, Artificial Intelligence or AI is one of the most popular fields
in terms of research, applications, jobs, etc. It has a wide range of uses in every sector
and domain that also includes healthcare. Artificial Intelligence is the ability of the com-
puter to sense and analyze data provided to it. Healthcare big database [1] is useful for
AI to implement machine learning algorithms. It helps in finding out necessary solutions
where humans need much more effort to do so. AI can change the Health Infrastructure
by using the data provided by IoT devices over cloud and analyzing it in depth [2]. AI
helps in detecting diseases, administration of chronic situations, deliver health and secu-
rity services, and may help in inventing new drugs or discovering drugs by using the
existing database [2–4]. AI also can plan resources—depending upon the condition of
the patient, it can quickly allocate necessary resources (if required) for them and provide
the information to the doctor. In today’s world, AI can be used in mobile applications;
patient can use these apps to feed data regarding their mood swings, anxiety, and depres-
sion; weight, height, and other parameters, and AI could analyze this data and can provide
an approximate diagnostic for the symptoms [5]. More often, smart devices track such
DOI: 10.1201/9781003291916-5 75
76 Mathematical Modeling for Intelligent Systems
information and upload it over the AI database. In surgeries and operations, AI can use its
database to provide the exact location of a certain wound or internal bleeding. Surgeons
can use this information to carry out the operation/surgery with more accuracy. AI is also
being used to detect tumors that may cause cancer in the future. We can also disburden
Electronic Health Records (EHR) using AI. EHR developers now use AI to create better
processing power and limit the time spent by the user on maintaining EHR by automating
the functions.
Similarly, Cloud Computing is the delivery of different services through the internet,
including data storage, servers, databases, networking, software, and gaming. It makes it
possible to save files to a remote database and retrieve them on demand [6]. Cloud com-
puting in health care can be very beneficial—it will increase the efficiency in sharing of
database of every patient with different hospitals without using any extra efforts. It will
also need less money as hospitals depend on large storage devices to store patient data,
which cost lots of money and their energy consumption is also very high, resulting in high
expenses [7]. By using cloud computing, you can get a large amount of storage at very
less prices, and it will be more secure in emergency and its accessibility is way higher.
Institutes that provide insurances can also get a boost as they can also track the health
of their insurance holder as they can now get more accurate status of health and also can
amend new policies to increase their profits [8]. By uploading different medical conditions,
students all over the world can study different medical conditions and their cure without
much effort. It will also develop the healthcare industries.
may currently just be a theory but their applications, when manufactured, are endless.
These tiny “living robots” could enter our bodies, carry out specific tasks, and even help
in curing cancer! AI and ML come together to form Artificial Neural Networks (ANN),
which forms a new branch, called “Deep Learning.” To give a basic idea, ANN uses the
processing of brain to model complex patterns. Through these patterns, it can then predict
unseen data. In healthcare, ANN is used to predict future diseases and inform about clini-
cal diagnosis [12].
Some of the popular application are defined in the following subsections.
with, they have to be significantly more careful with any change made and have a smaller
margin of error [16]. If they unwittingly adopt a technology that was faulty in ways not
obvious in the early stages of widespread implementation of the same, then it can lead to
some disastrous situations. Despite this attitude, the healthcare industry has been one of
the fastest and most willing at adapting cloud computing technology. From West Monroe
Partner’s report, 35% of healthcare organizations surveyed held more than 50% of the data
or infrastructure in the “cloud,” or in such a network, as of 2018. Such monumental moves
to adopting this technology have not been seen in any other industry. In Figure 5.2, block
diagram is shown for data storage and usage through the cloud computing model.
Cloud computing, in layman speak is the ability to store data and use processing power
that isn’t exactly “yours,” i.e., physically a part of your computer. For example, it can allow
for barebones computers to execute highly demanding programs or tasks by simply
requesting another computer over some sort of network to do it in its stead, deflecting the
demands of processing, data, and such requirements to the other computer instead. This
strips the would-be stringent requirements of the computer hardware of the barebones
computer this request originated from, making it easier to perform a larger variety of tasks
from “anywhere” given a sufficiently well-made network. Cloud computing provides mul-
tiple models and multiple services to fulfill the computation and storage requirements as
per customers’ need [17–22].
The various types of cloud computing models are:
• Public cloud: Public clouds are those type of cloud computing models where it is
accessible by all. The resources in this model can be accessed by all people who
want those resources. This type of model is provided by Google Cloud, AWS,
Microsoft Azure. When privacy is not a concern, then an organization or indi-
vidual can go for this type of cloud computing model.
80 Mathematical Modeling for Intelligent Systems
• Private cloud: This type of cloud computing model is secured and has restricted
accessibility. The secret data resources are deployed on this kind of cloud com-
puting model. The charges for this type of cloud computing model are high in
comparison to public cloud.
• Hybrid clouds: It is built with both public and private clouds. Private clouds can
support a hybrid model by supplementing local infrastructure with computing
capacity from an external public cloud. An example of hybrid clouds is Research
Compute Clouds which was developed by IBM to connect the computing IT
resources at eight IT research centers. Hybrid cloud works in the middle of public
and private cloud with many compromises in terms of resource sharing.
• Multiclouds: Multiclouds are made from more than one cloud service and more
than one vendor that is public or private. Multicloud helps organizations to avail
benefits from more than one cloud service provider instead of being dependent on
only one service provider.
• Agility: The cloud provides us quick access to a wide range of technologies, allow-
ing us to develop more quickly and construct almost anything we can dream.
• Elasticity: With cloud computing, we don’t need to over-provision resources to
accommodate future peal levels of the company activity; instead, we allocate the
exact quantity of resources that we require.
• Cost-savings: The cloud enables us to swap fixed costs for variable ones, allowing
us to pay just for IT. Furthermore, due to economies of scale, the variable expendi-
tures are far lower than what we would spend if we did it ourselves.
• Deploy globally in minutes: We may quickly grow to new geographic locations
and deploy internationally using the cloud. Taking the example of AWS, which
has infrastructure all over the world, allows us to deploy the app in different phys-
ical locations in a matter of seconds.
Smart healthcare is a service system that uses technologies such as IoT, internet, etc., to
access people related to healthcare and then manages and responds to medical needs in
an intelligent manner. The adoption of cloud computing requires time and effort from
numerous industries.
As mentioned in the introduction, data storage is one of the primary methods that the
industry has put cloud computing to use. It might be slightly unintuitive, given the name,
but just this facet of cloud computing has tremendously helped the healthcare indus-
try. The first thing having such an efficient method of data storage means that everyone
involved will be able to retrieve it with ease and elegance. This means that people not
familiar with the practice, people like the patients, are easily able to see their own medical
reports. Things like mobile applications, more interactive and informative websites are
now available due to the ease of transfer and organization of data as a result of adopting
the cloud network in the medical industry. A mobile application can provide seamless and
regular updates to patients about their own health, while also reminding them of things
like when and what medicine to take. This has proven to increase the engagement that
patients have with their own health and also has had a positive reaction in general [2].
Another potential benefit to cloud technology is the ease at which an insurance company
or the workplace of the patient can have the information of the medical proceedings in
their hands, alleviating the need for the patient to painstakingly draft up a report. All of
82 Mathematical Modeling for Intelligent Systems
these are just the beginning of cloud computing, as its applications like EMRs, and other
such implementations are being made daily.
Finally, we come to the miscellaneous benefits of cloud computing in healthcare. One of
the most apparent benefits is the flexibility of this system. Most cloud services are handled
by third parties who can handle the large amounts of machinery involved. This allows a
very scalable program and no growth pains, unlike when the analog systems had to be
expanded. Other benefits like the maintenance being handled by the provider. The cloud
services are generally very affordable as compared to buying your own cloud system as
well. All in all, cloud computing can be said to be a unilaterally positive development for
the healthcare industry, and a massive plus for humanity in general.
The centralization of the data storage makes it much easier to manage, and even in such
a simple example in which many nuances are ignored, it is clear how streamlined the
data flow is under such an arrangement. Cloud computing is a useful tool, and the fun-
damental reason for its popularity is that businesses, educational institutions, and other
organizations can rent storage, processing capacity, and applications from a cloud ser-
vice provider. The infrastructure and system maintenance are taken care of by the Cloud
service provider. For businesses, this means less money spent on computers and fewer
employees needed to operate and maintain the system. There are three primary sorts
of clouds: public, private, and hybrid. Microsoft Azure, Amazon Web Services, Google
Cloud, and other public clouds are the most popular. The provider owns and manages
all of the infrastructure and apps in this scenario. The most significant benefit is that the
Cloud provider is responsible for all maintenance and management. Private Clouds, on the
other hand, are restricted to a single firm or organization. The infrastructure for the Cloud
is often managed by an organization’s IT department. The advantages of this strategy for
major organizations are that their data is secure, and they can deliver all of the benefits of
Cloud Computing services inside to their many departments, but at a cost. The best value
is available with Hybrid Cloud. The private cloud is used for very sensitive data, whereas
the public cloud is used for other services. This gives enterprises more control and security
over critical data while yet allowing them to use the public cloud when necessary. Nearly
87% of healthcare firms, for example, choose to employ a hybrid cloud architecture. The
private cloud is typically used to host systems that include sensitive patient data, such as
imaging and EHR. For storing patients’ health files in the cloud, a cloud-based EHR offers
a scalable, adaptable, intuitive, and cost-effective solution. We now have the ease of being
able to communicate with our doctor on the phone or computer from anywhere in the
world, with real-time access to information, anywhere, and compatibility across different
systems as a result of this development. Patients’ portals, telehealth services, healthcare
information exchanges, smart devices, remote monitoring services, and other components
of the new healthcare ecosystem are all powered by this. Patients and doctors do not have
to be physically present at the same area because of telemedicine and telehealth’s Virtual
Care platforms. Patients’ portals allow patients to access their medical records and contact
their doctors safely. Cloud computing is a type of internet-based computing that enables
virtual access to a variety of applications and services such as storage, servers, and net-
working. Cloud computing is a whole new virtualization technology for both individu-
als and businesses that departs from the old software business model. It is defined as
providing end users with remote dynamic access to services and computer resources via
the internet. Medical reports and personal information of the patient are available in the
online records and can be easily accessed by the physicians, pharmacies, and counsel-
ors without charging any extra cost over the diagnosis fees. The healthcare field has a
vast expanse and highly complicated ecosystem, including health insurance companies,
AI-Enabled Cloud-Based Intelligent System 83
hospitals, labs, pharmacies/medical stores, patients, and other bodies as well; hence, in
order to assure good, effective, and fast functionality of this ecosystem, it is very essen-
tial that data is transmitted quickly and securely between the different entities. Cloud
computing provides business models to various hospitals and clinic centers to store the
information of the patient and update it with his/her every visit. Cloud computing helps
in reviewing, exchanging, and sharing the images of MRI, CT-scan, and X-ray reports in
a faster and highly secured environment. Uninterrupted services can be provided to vari-
ous health organizations due to high availability of cloud computing services. The vari-
ous business models of cloud computing benefit the health organizations in many ways.
Cloud computing also provides benefits to the patients like improvement in the quality
of services and collaborations between various health organizations. Since human life is
priceless and precious and the medical facilities across the world are limited, therefore the
healthcare services provided in cloud offer cost-effective concepts so as to benefit both the
patients and the health organizations. Thus, we can see that cloud computing has a big
scope in terms of healthcare as well.
5.4 Conclusion
Artificial Intelligence and Cloud computing together can help the telemedicare services to
perform in a more effective manner. Close by 24*7 availability, clinical consideration pro-
viders certainly need to scale the data amassing and association essentials as per the help
demands. Cloud development can increase or decrease these limit as indicated by the need
of clinical consideration specialists. As cloud development can thoroughly upset your cus-
tomary methodology of data dealing with, clinical benefit providers need to design the
movement cycle well early. Cloud development method diminishes dangers just as it lim-
its the chances of get-away, thwarts information spills, further creates data managing, and
builds up security practices.
In this chapter, we have described the role of AI and Cloud computing in an advanced
Telemedicine System.
References
1. Kustwar, R. K., & Ray, S. (2020). eHealth and telemedicine in India: An overview on the health
care need of the people. Journal of Multidisciplinary Research in Healthcare, 6(2), 25–36. doi:
10.15415/jmrh.2020.62004.
2. Saha, A., Amin, R., Kunal, S., Vollala, S., & Dwivedi, S. K. (2019). Review on “Blockchain tech-
nology based medical healthcare system with privacy issues”. Security and Privacy, 2(5), e83.
doi: 10.1002/spy2.83.
3. Taneja, S., Ahmed, E., & Patni, J. C. (2019). I-Doctor: An IoT based self patient’s health monitor-
ing system. In 2019 International Conference on Innovative Sustainable Computational Technologies
(CISCT).
4. Sharma, A., Choudhury, T., & Kumar, P. (2018). Health monitoring & management using IoT
devices in a Cloud Based Framework. In 2018 International Conference on Advances in Computing
and Communication Engineering (ICACCE), pp. 219–224.
84 Mathematical Modeling for Intelligent Systems
5. Kamdar, N., & Jalilian, L. (2020). Telemedicine: A digital interface for perioperative anesthetic
care. Anesthesia & Analgesia, 130(2), 272–275. doi: 10.1213/ANE.0000000000004513.
6. Patni, J. C., Sharma, H. K., Sharma, S., Choudhury, T., Mor, A., Ahmed, M., & Ahlawat, P.,
(2022) COVID-19 pandemic diagnosis and analysis using clinical decision support systems.
In Tavares, J. M. R. S., Dutta, P., Dutta, S., Samanta, D. (eds) Cyber Intelligence and Information
Retrieval. Lecture Notes in Networks and Systems, vol. 291. Springer, Singapore.
7. Gupta, S., Arya, P., & Sharma, H. K. (2021). User anonymity based secure authentication protocol
for telemedical server systems. International Journal of Information and Computer Security 1(1), 1.
8. Shailender, C., & Sharma H. K. (2018). Digital cancer diagnosis with counts of adenoma and
luminal cells in plemorphic adenoma immunastained healthcare system. IJRAR 5(12), 869–874.
9. Joshi, A., Choudhury, T., Sai Sabitha, A., & Srujan Raju, K. (2020). Data mining in healthcare
and predicting obesity. In Proceedings of the Third International Conference on Computational
Intelligence and Informatics, pp. 877–888, Hyderabad, India.
10. Patni, J.C., Ahlawat, P., & Biswas, S.S. (2020). Sensors based smart healthcare framework using
internet of things (IoT). International Journal of Scientific and Technology Research, 9(2), 1228–1234.
11. Purri, S., Choudhury, T., Kashyap, N., & Kumar, P. (2017). Specialization of IoT applications in
health care industries. In 2017 International Conference on Big Data Analytics and Computational
Intelligence (ICBDAC), pp. 252–256.
12. Krishnan, D. S. R., Gupta, S. C., & Choudhury, T. (2018). An IoT based patient health moni-
toring system. In 2018 International Conference on Advances in Computing and Communication
Engineering (ICACCE), pp. 1–7.
13. Shamshad, S., Mahmood, K., Kumari, S., & Chen, C. M. (2020). A secure blockchain-based
e-health records storage and sharing scheme. Journal of Information Security and Applications 55,
102590.
14. Hussien, H. M., Yasin, S. M., Udzir, S. N. I., Zaidan, A. A., & Zaidan, B. B. (2019). A systematic
review for enabling of develop a blockchain technology in healthcare application: Taxonomy,
substantially analysis, motivations, challenges, recommendations and future direction. Journal
of Medical Systems, 43(10). doi: 10.1007/s10916-019-1445–8.
15. Negi, G., Kumar, A., Pant, S., & Ram, M. (2021). Optimization of complex system reliability
using hybrid grey wolf optimizer. Decision Making: Applications in Management and Engineering,
4(2), 241–256.
16. Koranga, P., Singh, G., Verma, D., Chaube, S., Kumar, A., & Pant, S. (2018). Image denoising based
on wavelet transform using visu thresholding technique. International Journal of Mathematical,
Engineering and Management Sciences, 3(4), 444–449.
17. Fore, V., Khanna, A., Tomar, R., & Mishra, A. (2016). Intelligent supply chain management sys-
tem. In 2016 International Conference on Advances in Computing and Communication Engineering
(ICACCE), pp. 296–302. doi: 10.1109/ICACCE.2016.8073764
18. Srivastava, R., Tomar, R., Gupta, M., Yadav, A.K., & Park, J. (2021). Image watermarking
approach using a hybrid domain based on performance parameter analysis. Information, 12,
310. doi: 10.3390/info12080310
19. Tomar, R., Prateek, M., & Sastry, H. G. (2017). Analysis of beaconing performance in IEEE 802.11p
on vehicular ad-hoc environment. In 2017 4th IEEE Uttar Pradesh Section International Conference
on Electrical, Computer and Electronics (UPCON), pp. 692–696. doi: 10.1109/UPCON.2017.8251133.
20. Gupta, M., Benson, J., Patwa, F., & Sandhu, R. (2019). Dynamic groups and attribute-based
access control for next-generation smart cars. In Proceedings of the Ninth ACM Conference on Data
and Application Security and Privacy, pp. 61–72.
21. Gupta, M., Patwa, F., & Sandhu, R. (2017). Object-tagged RBAC model for the Hadoop ecosys-
tem. In IFIP Annual Conference on Data and Applications Security and Privacy, pp. 63–81. Springer,
Cham.
22. Gupta, M., Patwa, F., & Sandhu, R. (2018). An attribute-based access control model for secure
big data processing in hadoop ecosystem. In Proceedings of the Third ACM Workshop on Attribute-
Based Access Control, pp. 13–24.
6
Fuzzy Heptagonal DEMATEL
Technique and Its Application
S. Karthik
Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology
CONTENTS
6.1 Introduction .......................................................................................................................... 85
6.2 Preliminaries ........................................................................................................................ 86
6.3 Fuzzy Heptagonal DEMATEL Method ............................................................................ 90
6.3.1 Numerical Illustration ............................................................................................. 93
6.4 Conclusion ............................................................................................................................ 96
References....................................................................................................................................... 97
6.1 Introduction
Multicriteria decision-making (MCDM) method is the distinguished division of decision-
making, which creates an interest to the researchers in evaluating, assessing, and ranking
alternatives. In the literature, there are about 20 MCDM techniques (Chen and Chen, 2010)
that have been designed to solve many real-world decision-making problems. Among
them, DEMATEL (decision-making trial and evaluation laboratory) is one of the powerful
tools. It was developed in Geneva Research Centre (Fontela and Gabus 1976; Gabus and
Fontela, 1972) by the Battelle Memorial Institute. This method is an efficient and practi-
cal tool for viewing any difficult structure with matrices/digraphs. The crisp DEMATEL
technique involves only the situation wherein the experts provide their opinion on the cor-
relation between the attributes using the crisp values {0,1}. However, in real-life situations,
correlations among the attributes involve a lot of uncertainty. Thus, the concept of fuzzy
set was introduced to handle the ambiguity and uncertainty of human thought (Zadeh,
1965). Bellmann and Zadeh (1970) introduced decision-making in a fuzzy environment
where the membership functions of the fuzzy decision attain maximum values. Zadeh’s
Fuzzy set theory has paved a way to bring out the fuzzy DEMATEL method (Lin and Wu
2004, 2008; Tseng, 2009a) under the uncertain environment.
When creating a structural model, crisp values are being used to represent human
decisions for determining the relationship among factors. However, in most of the
DOI: 10.1201/9781003291916-6 85
86 Mathematical Modeling for Intelligent Systems
circumstances, human’s decisions with favorites seem hard to evaluate by exact values.
Instead of assigning numerical values in the problem, linguistic variables can be assigned
to take a decision (Zadeh, 1975). In recent times, linguistic terms are widely adopted by
researchers in the decision-making problem. Input variables are represented by linguis-
tic terms in decision-making problems and assigned the values by the fuzzy numbers
(Karthik et al., 2019, 2020). Fuzzy DEMATEL was extended by Lin and Wu (2008) where the
linguistic variables are transformed into triangular fuzzy numbers. Devadoss and Felix
(2013a) used DEMATEL with triangular fuzzy numbers to model the cause and effect fac-
tor of youth violence. Suo et al. (2012) expanded the DEMATEL method in an uncertain
linguistic environment using trapezoidal fuzzy number. Devadoss and Felix (2013a, 2014)
extended DEMATEL technique for hexagonal and octagonal fuzzy numbers.
DEMATEL is one of the potent methods to analyze the cause/effect relationship among the
criteria (Wu and Lee, 2007). This method supports for analyzing the correlations among crite-
ria in the multifaceted systems (Hori and Shimizu, 1999). Currently, fuzzy DEMATEL method
has been used magnificently in various domains such as hospital service quality (Shieh et al.,
2010), hotel service quality (Tseng, 2009b), social problems on youth violence (Devadoss and
Felix, 2013a), human resource management (Abdullah and Zulkifli, 2015), portfolio of invest-
ment projects (Altuntas and Dereli, 2015), business process management (Bai and Sarkis,
2013), green supply chain management (Lin, 2013), global managers competencies (Wu and
Lee, 2007), hotel service quality perceptions (Tseng, 2009b), software system design (Hori and
Shimizu, 1999), extracting consumer’s uneasiness over foods (Tamura et al., 2006), solid waste
management (Tseng and Lin, 2009), emotive Music Composition Selection (Aseervatham
and Devadoss, 2015), climate change (Felix et al., 2017), solid waste management (Selvaraj
et al., 2018; Felix and Dash, 2021), IC fabrication process (Velmathi and Felix, 2019) and bipolar
environment (Deva and Felix, 2021). From this review, it is observed that DEMATEL method
can be extended using heptagonal fuzzy number under uncertain linguistic environment.
To illustrate and demonstrate the heptagonal DEMATEL techniques, the problem on youth
aggressive behavior is studied. The structure of this paper is as follows: the important defini-
tions of fuzzy number, linguistic terms, and modified heptagonal fuzzy numbers are given
in Section 6.2. In Section 6.3, fuzzy DEMATEL-heptagonal method and its application are
presented, and conclusion and direction for future are given in the last section.
6.2 Preliminaries
The important definitions (2.1–2.8) are reviewed and also the modified heptagonal fuzzy
number with respect to alpha cut is explored under an uncertain linguistic environment.
This heptagonal fuzzy number differs from ordinary heptagonal fuzzy numbers (Rathi
and Balamohan, 2014).
Definition 6.2.1
Definition 6.2.2
Fuzzy number can be thought as a subset of the real numbers , which is characterized
: R → [0,1] holds the subsequent properties,
by the membership function, A
(i) A is convex.
µ A ( λτ 1 + (1 − λ )τ 2 ) ≥ min( µ A (τ 1 ), µ A (τ 2 )),
Definition 6.2.3
of the universal set X is defined as the set of all elements
The α-cut of the fuzzy set A
whose membership grade is greater than α, and it is defined as A α = {τ ∈ X / µ (τ ) ≥ α },
A
where α ∈[ 0,1].
Definition 6.2.4
A Triangular Fuzzy Number Tr can be defined as a triplet (l, m, r) where l, m, and r are real
numbers such that l ≤ m ≤ r and the membership function µ N (τ ) is defined as
0 τ <l
τ
−l
l ≤τ ≤ m
m − l
µTr (τ ) =
r −τ
m≤τ ≤ r
r − m
0 τ >r
Definition 6.2.5
A trapezoidal fuzzy number Tre can be defined as (l, m1 , m2 , n) and the membership func-
tion is defined as
τ −l
m − l l ≤ τ ≤ m1
1
1 m1 ≤ τ ≤ m2
µ Tre (τ ) =
n−τ
n − m m2 ≤ τ ≤ n
2
0 l ≤ 0& n ≥ 0
Definition 6.2.6
(τ − a1 ) , a1 ≤ τ ≤ a 2
3(a2 − a1 )
( a3 − a2 ) + (τ − a2 )
, a2 ≤ τ ≤ a3
3(a3 − a2 )
2(a4 − a3 ) + (τ − a3 ) , a3 ≤ τ ≤ a 4
3( a4 − a3 )
µ He (τ ) =
3(a5 − a4 ) − (τ − a4 ) , a 4 ≤ τ ≤ a5
3(a5 − a4 )
2(a6 − a5 ) − (τ − a5 )
, a 5 ≤ τ ≤ a6
3(a6 − a5 )
(a7 − τ ) , a6 ≤ τ ≤ a7
3(a7 − a6 )
A Heptagonal fuzzy number H e can also be defined as µ H e (τ ) = ( P1 (t), Q1 (u), R1 (v), P2 (t), Q2 (u), R2 (v))
, R1 (v), P2 (t), Q2 (u), R2 (v)) for t ∈[0, 0.33), u ∈[0.33, 0.66), and v ∈[0.66,1], where
(τ − a1 ) ( a − a2 ) + (τ − a2 ) 2(a4 − a3 ) + (τ − a3 )
P1 (t) = , Q1 (u) = 3 , R1 ( v) =
3( a2 − a1 ) 3( a3 − a2 ) 3(a4 − a3 )
( a7 − τ ) 2(a6 − a5 ) − (τ − a5 ) 3(a5 − a4 ) − (τ − a4 )
P1 (w) = , Q2 (u) = , R2 ( v) =
3(a7 − a6 ) 3( a6 − a5 ) 3(a5 − a4 )
Here,
1. P1 (t), Q1 (u), and R1 ( v) is bounded and continuous increasing function over [0, 0.33),
[0.33, 0.66) and [0.66, 1] respectively.
2. P2 (t), Q2 (u) and R2 ( v) is bounded and continuous decreasing function over [0, 0.33),
[0.33, 0.66) and [0.66, 1] respectively.
Definition 6.2.7
τ − a1
m , a1 ≤ τ ≤ a2
a2 − a1
m − ( m − n ) τ − a2 , a2 ≤ τ ≤ a3
a − a
3 2
τ − a3
n − ( n − 1) a − a , a3 ≤ τ ≤ a 4
4 3
1, x = a4
µGH ( x ) =
n − ( n − 1) a5 − τ , a 4 ≤ τ ≤ a5
a − a
5 4
a6 − τ
m − ( m − n) a − a , a5 ≤ τ ≤ a6
6 5
a −τ
m 7 , a6 ≤ τ ≤ a7
a7 − a6
0, τ ≤ a1 and τ ≥ a7
Definition 6.2.9
= ( a1 , a2 , a3 , a4 , a5 , a6 , a7 ) and B = (b1 , b2 , b3 , b4 , b5 , b6 , b7 ) are the Heptagonal Fuzzy
If A
Numbers, then the addition, subtraction, multiplication, and division are defined as
⊕ B = ( a1 + b1 , a2 + b2 , , a7 + b7 )
• A
GH (τ )
0 a1 a2 a3 a4 a5 a6 a7 τ
FIGURE 6.1
Heptagonal fuzzy number.
90 Mathematical Modeling for Intelligent Systems
TABLE 6.1
Heptagonal Linguistic Values and Terms
Linguistic Terms Linguistic Values
No influence (NI) (0, 0, 0, 0, 0.05, 0.1, 0.15)
Very low influence (VL) (0, 0.05, 0.1, 0.15, 0.2, 0.25, 0.3)
Medium low influence (ML) (0.15, 0.2, 0.25, 0.3, 0.35, 0.4, 0.45)
Low influence (L) (0.3, 0.35, 0.4, 0.45 0.5, 0.55, 0.6)
High influence (H) (0.45 0.5, 0.55, 0.6, 0.65, 0.7, 0.75)
Medium high influence (MH) (0.6, 0.65, 0.7, 0.75, 0.8, 0.85, 0.9)
Very high influence (VH) 0.75, 0.85, 0.9, 0.95, 1, 1, 1)
ΘB = ( a1 − b7 , a2 − b6 ,… , a7 − b1 )
• A
⊗ B = ( a1b1 , a2 b2 , a3 b3 , …, a7 b7 )
• A
÷ B = a1 , a2 , a3 ,… , a7
• A b b b b1
7 6 5
A ⊕ B , A
ΘB , A
⊗ B , A
÷ B are also Heptagonal Fuzzy Numbers.
Next, the linguistic variables are represented by heptagonal fuzzy numbers in the fol-
lowing Table 6.1.
Step 1: Set up the initial linguistic uncertain direct-relation matrix Xˆ k = [ xˆ kij ]n× n ,
k = 1, 2, , n
Let C = {Ci : i = 1, 2, n} be set of attributes/factors. E = {Ek : k = 1, 2,..., m} be the
experts. Experts are asked to provide the relationship between the factors from
the set S = {NI, VL, ML, L, H, MH, VH}. Xˆ k = [ xˆ kij ]n× n given by expert Ek
C1 C2 Cn
C1
− xˆ k 12 xˆ k 1n
C2 xˆ − xˆ k 2 n
Xˆ k = [ xˆ kij ]n× n =
k 21
, k = 1, 2,…, m
xˆ kn1 xˆ kn2 −
Cn
Step 2: Change uncertain linguistic matrix Xˆ k = [ xˆ kij ]n× n into heptagonal fuzzy matrix
X k = [x kij ]n×n .
Fuzzy Heptagonal DEMATEL Technique 91
m m m m
1
x =
ij
1
m ∑x
k =1
1
kij , 2
x =
ij
1
m ∑
k =1
2
x , x =
kij
1
m
3
ij ∑x k= 1
3
kij , 4
x =
ij
1
m ∑x
k =1
4
kij ,
m m m
xij5 =
1
m ∑
k= 1
5
xkij , xij6 =
1
m ∑
k =1
6
xkij , xij7 =
1
m ∑x
k=1
7
kij i, j = 1, 2,…, n,
n
max
1≤ i ≤ n
∑
xij7 ≠ 0 and 0 ≤ zij1 ≤ zij2 ≤ zij3 ≤ ... ≤ xij7 < 1.,
j=1
Z is factorized into seven crisp value matrices Z 1 , Z 2 , Z 3 ... , Z 7
0 1
z12 z11n 0 2
z12 2
z1n
1 z21
1
0 1
z2n z21
2
0 2
z2n
Z = 2
, Z = , ... ,
zn11 zn1 2 0 2
zn22 0
zn 1
0 7
z12 7
z1n
z7 0 7
z2n
Z 7 = 21
zn71 zn7 2 0
...
Step 6: Derive the total intensities of influencing and influenced correlation of factors
Ci, ci and hi , i = 1, 2,, n,
Let ci be the overall intensity factor Ci influencing others. It is denoted by
(
ci = ci1 , ci2 , ci3 , ci4 , ci5 , ci6 , ci7 ,
n
) n n
n n
ci4 = ∑ t , i = 1, 2,..., n,
j= 1
4
ij ..., ci7 = ∑ t , i = 1, 2,..., n
j=1
7
ij
2,..., n, h = 3
j ∑ t , j = 1, 2,..., n,
i=1
3
ij
4
h =
j ∑ t , j = 1, 2,..., n, ...,
i=1
4
ij
7
h =
j ∑ t , j = 1, 2,..., n,
i=1
7
ij
Step 7: Derive the uncertain prominence and relation of each factor p i and ri
Let p i be the uncertain prominence of factor Ci. It is denoted as
( )
p i = pi1 , pi2 , pi3 , pi4 , pi5 , pi6 , pi7 , where pi1 = ci1 + hi1 , pi2 = ci2 + hi2 , pi3 = ci3 + hi3 , ... , pi7 = ci7 + hi7 , i = 1, 2,
= ci3 + hi3 , ... , pi7 = ci7 + hi7 , i = 1, 2,..., n ,
Let ri be the uncertain relation of factor Ci. It is denoted as ri = ri1 , ri2 , ri3 , ri4 , ri5 , ri6 , ri7 , ( )
where ri1 = ci1 − hi1 , ri2 = ci2 − hi2 , ri3 = ci3 − hi3 , ... , ri7 = ci7 − hi7 , i = 1, 2,..., n
Step 8: Find the crisp prominence and relation between each factor pi and ri.
The crisp values of prominence (pi) and relation (ri) of factor Ci are determined as,
1 1
pi =
7
(
pi + pi2 + pi3 + pi4 + pi5 + pi6 + pi7 , i = 1, 2,..., n. )
1 1
ri =
7
(
ri + ri2 + ri3 + ri4 + ri5 + ri6 + ri7 , ) i = 1, 2,..., n
6.3.1 Numerical Illustration
Violence is a common event occurring everywhere, which disturbs our life in numerous
ways. Although human beings are taking a lot of effort to form civilized societies, we are
unable to stop the influence of violence and aggression. Therefore, it is our concern to
analyze the cause and effects of violence and the people who are responsible for it. It is
reported by WHO that in most cases of violence, the active participants are the youth. Also,
WHO stated that youth violence is the fourth leading cause of death among youngsters
worldwide, and due to this, two lakhs people die every year (WHO, 2016). Aggressiveness
among the youth is one of the unhealthy developmental problems in many families. The
anger of youth is an easy target and vulnerable section of the society to be misused by
anyone. The terrorist acts, for instance, are motivated by two factors, viz., social and politi-
cal injustice, and hence, violence as the only tool for change. Violence includes a range
of actions from bullying, physical fighting, severe sexual, physical assault to homicide,
and other atrocities. Youth engaging themselves in violence and aggressive behavior is
unpredictable because the factors that influence may vary and they belong to the category
of uncertain factors. It is extremely difficult to predict the behavior of the male youth in
comparison to their female counterpart. Therefore, the study aims to analyze the cause
and effect of youth aggressiveness.
We have collected the following attributes which are related to the youth aggressiveness
through the unsupervised method by interviewing the 100 youths from Chennai, Tamil
Nadu. From their statement, the key purposes for youth violence have been selected as the
attributes. C1—Poor monitoring and supervision of children by parents, C2—Academic
failure/dropping out of school, C3—Delinquent peers/Gang membership, C4—Addiction
to drugs and alcohol, C5—Poverty/unemployment, C6 —Involvement in other forms of
antisocial behavior, C7—Aggressive behavior, C8—Parental substance or criminality, C9—
Depression, C10 —Castisem/inequality. Then, three experts—a sociologist, a psychiatrist,
and victims—were interviewed to give opinions on the existence and intensities of the
correlation among the factors from S = {No Influence, Very Low, Medium Low, Low, High,
Medium High, Very High}.
To illustrate the proposed heptagonal DEMATEL technique, the proposed technique has
been applied to solve the problem of youth violence, and the computational procedure is
summarized as follows:
Step 1: At the initial stage, with the three expert’s view, the initial linguistic uncer-
tain direct-relation matrices Xˆ k , k = 1, 2, 3 are given below in Tables 6.2–6.4.
Step 2 and 3: After transforming initial linguistic uncertain direct-relation matri-
ces into heptagonal fuzzy numbers, the group uncertain direct-relation matrix
X k = [x kij ]n×n . is obtained by aggregating all three matrices, which is shown in
Table 6.5.
Step 4: The uncertain overall-relation matrix Z k is obtained from the group uncertain
direct-relation matrix X k .
Step 5: The uncertain overall-relation matrix T is obtained.
Step 6–8: The overall intensities of influencing and influenced correlation of factors
and prominence (p i) and relation (ri ) are obtained and the crisp prominence (pi)
and relation (ri ) are also obtained, which are shown in Table 6.6. To view the com-
plicated (10 by 10) matrices in a simple manner, the causal diagram is depicted
using pi and ri . The causal diagram divides the factors into causes and effect group.
94 Mathematical Modeling for Intelligent Systems
TABLE 6.2
Initial Uncertain Direct-Relation Matrix X̂1 Provided by E1
C1 C2 C3 C4 C5 C6 C7 C8 C9 C10
C1 – VH VH H H VH H NI L NI
C2 NI – VH H VH VH H NI L H
C3 H VH – L H VH H L H H
C4 L H H – VL H H VL L H
C5 VH H VH L – VL VH VL VH NI
C6 VH H VH VH NI – H H L H
C7 H L L H H VL – H VH VH
C8 NI VH VH H H VL L – VH NI
C9 H NI VL H H H VH H – VH
C10 NI H VH VH L H VH NI H –
TABLE 6.3
Initial Uncertain Direct-Relation Matrix X̂ 2 Provided by E2
C1 C2 C3 C4 C5 C6 C7 C8 C9 C10
C1 – H VH H H H L VL VL NI
C2 VL – VH H VH H L NI VL L
C3 L H – L VH VH H VL L VL
C4 L H H – VL H VH L H L
C5 H L VH H – H VH H VH L
C6 H H H VH L – H L H VH
C7 H L VH H VH H – H VH H
C8 NI VH H VH H VH H – VH H
C9 H L H H VH L VL H – H
C10 NI H VH H L H H NI VH –
TABLE 6.4
Initial Uncertain Direct-Relation Matrix X̂ 3 Provided by E3
C1 C2 C3 C4 C5 C6 C7 C8 C9 C10
C1 – VH VH H H L VL NI L NI
C2 VL – H VH L NI VL H L VL
C3 L H – H VH VH H VH NI L
C4 VL VH H – VL VH H L H VH
C5 VH L VH H – H VH H H VH
C6 H H VH VH VL – H L VL H
C7 H VH VH H H VL – H VH H
C8 NI H VH H VH VH H – VH NI
C9 VL H VL H VH H H H – H
C10 NI VL H H VH VH H NI H –
TABLE 6.5
Group Uncertain Direct-Relation Matrix X k
C1 C2 C3 C4
C1 (0, 0, 0, 0, 0, 0, 0) (0.6, 0.7, 0.7, 0.8, 0.8, 0.9, 0.9) (0.7, 0.8, 0.8, 0.9, 0.9, 1, 1) (0.4, 0.5, 0.5, 0.6, 0.6, 0.7, 0.7)
C2 (0.05, 0.08, 0.11, 0.2, 0.25, 0.3) (0, 0, 0, 0, 0, 0, 0) (0.6, 0.7, 0.7, 0.8, 0.8, 0.9, 0.9) (0.5, 0.6, 0.6, 0.7, 0.7, 0.8, 0.8)
C3 (0.3, 0.4, 0.4, 0.5, 0.5, 0.6, 0.6) (0.5, 0.6, 0.6, 0.7, 0.7, 0.8, 0.8) (0, 0, 0, 0, 0, 0, 0) (0.3, 0.4, 0.4, 0.5, 0.5, 0.6, 0.6)
C4 (0.2, 0.2, 0.3, 0.3, 0.4, 0.4, 0.5) (0.5, 0.6, 0.6, 0.7, 0.7, 0.8, 0.8) (0.4, 0.5, 0.5, 0.6, 0.6, 0.7, 0.7) (0, 0, 0, 0, 0, 0, 0)
C5 (0.6, 0.7, 0.7, 0.8, 0.8, 0.9, 0.9) (0.3, 0.4, 0.4, 0.5, 0.5, 0.6, 0.6) (0.7, 0.8, 0.8, 0.9, 0.9, 1, 1) (0.4, 0.4, 0.5, 0.5, 0.6, 0.6, 0.7)
C6 (0.5, 0.6, 0.6, 0.7, 0.7, 0.8, 0.8) (0.4, 0.5, 0.5, 0.6, 0.6, 0.7, 0.7) (0.6, 0.7, 0.7, 0.8, 0.8, 0.9, 0.9) (0.7, 0.8, 0.8, 0.9, 0.9, 1, 1)
C7 (0.4, 0.5, 0.5, 0.6, 0.6, 0.7, 0.7) (0.3, 0.4, 0.4, 0.5, 0.5, 0.6, 0.6) (0.6, 0.6, 0.7, 0.7, 0.8, 0.8, 0.8) (0.4, 0.5, 0.5, 0.6, 0.6, 0.7, 0.7)
C8 (, 0, 0, 0, 0, 0.0, 0.1, 0.1) (0.6, 0.7, 0.7, 0.8, 0.8, 0.9, 0.9) (0.6, 0.6, 0.7, 0.7, 0.8, 0.8, 0.8) (0.5, 0.6, 0.6, 0.7, 0.7, 0.8, 0.8)
C9 (0.3, 0.3, 0.4, 0.4, 0.5, 0.5, 0.6) (0.2, 0.2, 0.3, 0.3, 0.4, 0.4, 0.5) (0.2, 0.2, 0.3, 0.3, 0.4, 0.4, 0.5) (0.4, 0.5, 0.5, 0.6, 0.6, 0.7, 0.7)
C10 (0, 0, 0, 0, 0.05, 0.1, 0.15) (0.3, 0.3, 0.4, 0.4, 0.5, 0.5, 0.6) (0.6, 0.6, 0.7, 0.7, 0.8, 0.8, 0.8) (0.5, 0.6, 0.6, 0.7, 0.7, 0.8, 0.8)
C5 C6 C7 C8
Fuzzy Heptagonal DEMATEL Technique
C1 (0.4, 0.5, 0.5, 0.6, 0.6, 0.7, 0.7) (0.5, 0.5, 0.6, 0.6, 0.7, 0.7, 0.7) (0.2, 0.3, 0.3, 0.4, 0.4, 0.5, 0.5) (0, 0.0, 0.0, 0.1, 0.1, 0.2, 0.2)
C2 (0.6, 0.6, 0.7, 0.7, 0.8, 0.8, 0.8) (0.4, 0.4, 0.4, 0.5, 0.5, 0.6, 0.6) (0.2, 0.3, 0.3, 0.4, 0.4, 0.5, 0.5) (0.1, 0.1, 0.1, 0.2, 0.2, 0.3, 0.3)
C3 (0.6, 0.7, 0.7, 0.8, 0.8, 0.9, 0.9) (0.7, 0.8, 0.8, 0.9, 0.9, 1, 1) (0.4, 0.5, 0.5, 0.6, 0.6, 0.7, 0.7) (0.3, 0.4, 0.4, 0.5, 0.5, 0.6, 0.6)
C4 (0, 0.05, 0.1, 0.1, 0.2, 0.2, 0.3) (0.5, 0.6, 0.6, 0.7, 0.7, 0.8, 0.8) (0.5, 0.6, 0.6,0.7, 0.7, 0.8, 0.8) (0.2, 0.2, 0.3, 0.3, 0.4, 0.4, 0.5)
C5 (0, 0, 0, 0, 0, 0, 0) (0.3, 0.3, 0.4, 0.4, 0.5, 0.5, 0.6) (0.7, 0.8, 0.8, 0.9, 0.9, 1, 1) (0.3, 0.3, 0.4, 0.4, 0.5, 0.5, 0.6)
C6 (0.1, 0.1, 0.1, 0.2, 0.2, 0.3, 0.3) (0, 0, 0, 0, 0, 0, 0) (0.4, 0.5, 0.5, 0.6, 0.6, 0.7, 0.7) (0.3, 0.4, 0.4, 0.5, 0.5, 0.6, 0.6)
C7 (0.5, 0.6, 0.6, 0.7, 0.7, 0.8, 0.8) (0.1, 0.2, 0.2, 0.3, 0.3, 0.4, 0.4) (0, 0, 0, 0, 0, 0, 0) (0.4, 0.5, 0.5, 0.6, 0.6, 0.7, 0.7)
C8 (0.5, 0.6, 0.6, 0.7, 0.7, 0.8, 0.8) (0.5, 0.5, 0.6, 0.6, 0.7, 0.7, 0.7) (0.4, 0.4, 0.5, 0.5, 0.6, 0.6, 0.7) (0, 0, 0, 0, 0, 0, 0)
C9 (0.6, 0.7, 0.7, 0.8, 0.8, 0.9, 0.9) (0.4, 0.4, 0.5, 0.5, 0.6, 0.6, 0.7) (0.4, 0.4, 0.5, 0.5, 0.6, 0.6, 0.6) (0.4, 0.5, 0.5, 0.6, 0.6, 0.7, 0.7)
C10 (0.4, 0.5, 0.5, 0.6, 0.6, 0.7, 0.7) (0.5, 0.6, 0.6, 0.7, 0.7, 0.8, 0.8) (0.5, 0.6, 0.6, 0.7, 0.7, 0.8, 0.8) (0, 0, 0, 0, 0.0, 0.1, 0.1)
C9 C10
C1 (0.2, 0.2, 0.3, 0.3, 0.4, 0.4, 0.5) (0, 0, 0, 0, 0.0, 0.1, 0.1)
C2 (0.2, 0.2, 0.3, 0.3, 0.4, 0.4, 0.5) (0.2, 0.3, 0.3, 0.4, 0.4, 0.5, 0.5)
C3 (0.2, 0.2, 0.3, 0.3, 0.4, 0.4, 0.5) (0.2, 0.3, 0.3, 0.4, 0.4, 0.5, 0.5)
C4 (0.4, 0.4, 0.5, 0.5, 0.6, 0.6, 0.7) (0.5, 0.5, 0.6, 0.6, 0.7, 0.7, 0.7)
C5 (0.6, 0.7, 0.7, 0.8, 0.8, 0.9, 0.9) (0.3, 0.3, 0.4, 0.4, 0.5, 0.5, 0.5)
C6 (0.2, 0.3, 0.3, 0.4, 0.4, 0.5, 0.5) (0.5, 0.6, 0.6, 0.7, 0.7, 0.8, 0.8)
C7 (0.7, 0.8, 0.8, 0.9, 0.9, 1, 1) (0.5, 0.6, 0.6, 0.7, 0.7, 0.8, 0.8)
C8 (0.7, 0.8, 0.8, 0.9, 0.9, 1, 1) (0.1, 0.1, 0.1, 0.2, 0.2, 0.3, 0.3)
95
TABLE 6.6
Computational Results
p i ri pi ri
C1 (1.5316, 1.9317, 2.4410, 3.1110, (0.1469, 0.1741, 0.2086, 0.2537, 3.8025 0.2736
4.1666, 5.7683, 7.6674) 0.3043, 0.3812, 0.4465)
C2 (1.8578, 2.3160, 2.8985, 3.6639, (−0.2290, −0.2666, −0.3143, −0.3766, 4.4040 −0.4153
4.8294, 6.5980, 8.6646) −0.4515, −0.5652, −0.7042)
C3 (2.3550, 2.8825, 3.5528, 4.4333, (−0.3063, −0.3394, −0.3816, −0.4371, 5.2418 −0.4811
5.7514, 7.7516, 9.9661) −0.5240, −0.6559, −0.7233)
C4 (2.0175, 2.5160, 3.1495, 3.9814, (−0.2688, −0.2986, −0.3366, −0.3866, 4.7462 −0.4320
5.2100, 7.0744, 9.2744) −0.4632, −0.5796, −0.6904)
C5 (2.1761, 2.6837, 3.3288, 4.1762, (0.1301, 0.1462, 0.1668, 0.1938, 4.9557 0.2140
5.4433, 7.3661, 9.5157) 0.2321, 0.2903,0.3385)
C6 (2.0976, 2.5951, 3.2273, 4.0577, (−0.0186, −0.0202, −0.0222, −0.0249, 4.8306 −0.0241
5.3014, 7.1886, 9.3467) −0.0296, −0.0369, −0.0163)
C7 (2.1532, 2.6674, 3.3206, 4.1786, (0.0529, 0.0583, 0.0652, 0.0744, 4.9613 0.0830
5.4460, 7.3693, 9.5942) 0.0892, 0.1117, 0.1291)
C8 (1.6839, 2.0998, 2.6292, 3.3254, (0.4588, 0.5150, 0.5864, 0.6802, 4.0403 0.7466
4.4234, 6.0897, 8.0307) 0.8151, 1.0200, 1.1509)
C9 (1.9758, 2.4555, 3.0652, 3.8661, (−0.0487, −0.0577, −0.0690, −0.0838, 4.6234 −0.0857
5.0718, 6.9013, 9.0279) −0.1007, −0.1264, −0.1137)
C10 (1.7698, 2.1933, 2.7323, 3.4414, (0.0827, 0.0889,0.0967, 0.1069, 4.1721 0.1210
4.5623, 6.2631, 8.2424) 0.1283, 0.1608, 0.1829)
Here, pi shows the degree of importance that factor Ci acts in the entire system. On
the contrary, the ri portrays the effect that factor Ci pays to the system. Precisely,
if ri is +ve, factor Ci is a cause group, while factor Ci is an effect group if ri is −ve.
6.4 Conclusion
This present study has proposed an extension of DEMATEL method using heptagonal
fuzzy numbers for analyzing the relationship among factors. With the aid of this technique,
Fuzzy Heptagonal DEMATEL Technique 97
FIGURE 6.2
Causal diagram.
the complex interaction between factors and digraphs can be converted into an observ-
able model. The merit of this technique lies in catching the complexity of any problem
through which an insightful decision can be taken by the decision-maker. Compared with
the other existing DEMATEL methods, the unique characteristics of this new extended
DEMATEL method are the following: (a) appropriate to solve the problem of interrelated
factor analysis in fuzzy environment when the judgments and decisions are uncertain in
nature and (b) this technique acts better to reduce the uncertainty instead of using trian-
gular and trapezoidal fuzzy number. This proposed technique can also be applied in all
decision-making fields such as Engineering, Data Science, Medical, and Social Science.
Further research, linguistic variables may be represented by nonagonal and decagonal
fuzzy number to extend the DEMATEL method.
References
Abdullah, L., & Zulkifli, N. (2015). Integration of fuzzy AHP and interval type-2 fuzzy DEMATEL: An
application to human resource management. Expert Systems with Applications 42(9):4397–4409.
Altuntas, S., & Dereli, T. (2015). A novel approach based on DEMATEL method and patent cita-
tion analysis for prioritizing a portfolio of investment projects. Expert Systems with Applications
42(3):1003–1012.
Aseervatham, S., & Devadoss A. V. (2015). Analysis on criteria based emotive music composition
selection using a new trapezoidal fuzzy DEMATEL - TOPSIS hybrid technique. Journal of Fuzzy
Set Valued Analysis 2:122–133.
Bai, C., & Sarkis, J. (2013). A grey-based DEMATEL model for evaluating business process manage-
ment critical success factors. International Journal of Production Economics 146(1):281–292.
Bellmann, R. E., & Zadeh, L. A. (1970). Decision making in fuzzy environment. Management Science
17(4):141–164.
98 Mathematical Modeling for Intelligent Systems
Chen, J. K., & Chen, I. S. (2010). Using a novel conjunctive MCDM approach based on DEMATEL,
fuzzy ANP, and TOPSIS as an innovation support system for Taiwanese higher education.
Expert System with Application 37(3):1981–1990.
Deva, N., & Felix, A. (2021). Designing DEMATEL method under bipolar fuzzy environment. Journal
of Intelligent and Fuzzy Systems 41(6):7257–7273.
Devadoss, A. V., & Felix, A. (2013a). A Fuzzy DEMATEL approach to study cause and effect relation-
ship of youth violence. International Journal of Computing Algorithm 2:363–372.
Devadoss, A. V., & Felix, A. (2013b). A new Fuzzy DEMATEL method in an Uncertain Linguistic
Environment. Advances in Fuzzy Sets and Systems 16(2):93–123.
Devadoss, A. V., & Felix, A. (2014). An extension of fuzzy DEMATEL- hexagonal techniques. In
Proceedings of International Conference on Mathematical Sciences, Sathyabama University.
Felix, A., Christopher, S., & Mani, R. (2017). Fuzzy cognitive DEMATEL technique for modeling cause
and effect of climate change. International Journal of Pure and Applied Mathematics 117(4):655–661.
Felix, A., & Dash, S. K. (2021). Haar FCM with DEMATEL techniques to analyze the solid waste man-
agement. Advances in Smart Grid Technology, Lecture Notes in Electrical Engineering 688:393–402.
Fontela, E., & Gabus, A. (1976). The DEMATEL observer, DEMATEL 1976 report. Battelle Geneva
Research Centre, Geneva.
Gabus, A., & Fontela, E. (1972). World problems an invitation to further thought within the framework of
DEMATEL. Battelle Geneva Research Centre, Geneva.
Hori, S., & Shimizu, Y. (1999). Designing methods of human interface for supervisory control sys-
tems. Control Engineering Practice 7(11):1413–1419.
Karthik, S., Sarojkumar, D., & Punithavelan, N. (2019). Haar ranking of linear and non-linear hep-
tagonal fuzzy number and its application. International Journal of Innovative Technology and
Exploring Engineering 8(6):1212–1220.
Karthik, S., Sarojkumar, D., & Punithavelan, N. (2020). A fuzzy decision-making system for the
impact of pesticides applied in agricultural fields on human health. International Journal of
Fuzzy System Applications 9(3):42–62.
Lin, R. J. (2013). Using fuzzy DEMATEL to evaluate the green supply chain management practices.
Journal of Cleaner Production 40:32–39.
Lin, C. J., & Wu, W. W. (2004). A fuzzy extension of the DEMATEL method for group decision mak-
ing. European Journal of Operational Research 156(1):445-455.
Lin, C. J., & Wu, W. W. (2008). A causal analytical method for decision making under fuzzy environ-
ment. Expert System with Applications 34(1):205–213.
Rathi, K., & Balamohan, S. (2014). Representation and ranking of fuzzy numbers with heptago-
nal membership function using value and ambiguity index. Applied Mathematical Sciences
8(87):4309–4321.
Selvaraj, A., Dash, S. K., & Punithavelan, N. (2018). Hexagonal fuzzy DEMATEL approach to ana-
lyze the solid waste management. International Journal of Pure and Applied Mathematics 118(5):
475–492.
Shieh, J. I., Wu, H. H., & Huang, K. K. (2010). A DEMATEL method in identifying key success factors
of hospital service quality. Knowledge-Based System 23(3):277–282.
Suo, W. L., Feng, B., & Fan, Z. P. (2012). Extension of the DEMATEL method in an uncertain linguistic
environment. Soft Computing 16(3):471–483.
Tamura, H., Okanishi, H., & Akazawa, K. (2006). Decision support for extracting and dissolving
consumer’s uneasiness over foods using stochastic DEMATEL. Journal of Telecommunication
Information and Technology 4:91–95.
Tseng, M. L. (2009a). A causal and effect decision making model of service quality expectation using
grey-fuzzy DEMATEL approach. Expert System with Applications 36(4):7738–7748.
Tseng, M. L. (2009b). Using the extension of DEMATEL to integrate hotel service quality perceptions
into a cause-effect model in uncertainty. Expert Systems with Applications 36(5):9015–9023.
Tseng, M. L., & Lin, H. Y. (2009). Application of fuzzy DEMATEL to develop a cause and effect
model of municipal solid waste management in Metro Manila. Environmental and Monitoring
Assessment 158:519–533.
Fuzzy Heptagonal DEMATEL Technique 99
Velmathi, G., & Felix, A. (2019). IC fabrication process steps analysis using fuzzy DEMATEL method.
International Journal of Innovative Technology and Exploring Engineering 9(1):1968–1973.
WHO (2016). https://www.who.int/news-room/fact-sheets/detail/youth-violence
Wu, W. W., & Lee, Y. T. (2007). Developing global managers competencies using the fuzzy DEMATEL
method. Expert Systems with Applications 32:499–507.
Zadeh, L. A. (1965). Fuzzy Sets. Information and Control 8(2):338–353.
Zadeh, L. A. (1975). The concept of a linguistic variable and its application to approximate reasoning
(Part II). Information Science 8:301–357.
7
A Comparative Study of Intrapersonal and
Interpersonal Influencing Factors on the Academic
Performance of Technical and Nontechnical Students
CONTENTS
7.1 Introduction ........................................................................................................................ 101
7.1.1 Intrapersonal Factors ............................................................................................. 102
7.1.2 Interpersonal Influencing Factors ....................................................................... 103
7.2 Aim of the Research .......................................................................................................... 105
7.3 Methodology ...................................................................................................................... 106
7.4 Data Analysis ..................................................................................................................... 107
7.5 Results and Discussions ................................................................................................... 108
7.6 Conclusion .......................................................................................................................... 114
References..................................................................................................................................... 115
7.1 Introduction
Students’ varying academic temperaments often surprise the academicians. Some stu-
dents’ enthusiasm to embrace academic challenges delights the academicians, whereas
others’ sheer reluctance and disengagement toward academics disheartens their endeav-
ors. Students’ diverse and miscellaneous academic behavior thus intrigues the researchers
to unravel the possible factors that help them understand their students’ academic perfor-
mance. Mere assessment of some assignments and examinations cannot give an elabora-
tive picture of students’ behavior and attitude toward their academic work and success in
their formal education
A lot of research has already been done to study the different factors which affect stu-
dents’ performance (Saa et al., 2019; Cavilla, 2017; Anderson & Good, 2016; Gibson, 1982)
but we have categorized the various factors into intrapersonal and interpersonal influenc-
ing factors to see how they impact students’ academic performance.
The cultural diversity of India makes it unique and remarkable in every sense. It is quite
challenging for universities to accept and embrace the multidimensional aspects of diver-
sity (Cooke & Saini, 2010). The students come from diverse backgrounds/cultures, which
to some extent propel their ways of formulating an opinion and also influence their intra-
personal and interpersonal influencing factors. Hence, the varied backgrounds of the stu-
dents fascinated us to study how different factors navigate the mindsets of the students
which affect their academic performance culture is “the way of life especially the general
customs and beliefs, of a particular group of people at a particular time” (The Cambridge
English Dictionary, 2015).
Intrapersonal as well as interpersonal influencing factors consciously and sometimes
unconsciously affect an individual’s behavior. Kassarnig et al. (2018) state that several
behavioral patterns are closely attached to academic performance. They can influence
social ties and other activities in which students participate. These factors also shape the
individual’s mindset. Mindset is interpreted as a collection of our thoughts and beliefs,
which culminates our inner and outer world. Many researchers have shared their valu-
able insights to define Mindset. Dweck and Yeager (2019) state, Mindsets help to organize
multiple variables such as goals, attributions, helplessness, etc. to provide them a clear
meaning, which further adds a significant value of right efforts to achieve better results.
Various factors such as leadership (Deng et al., 2020), parenting style (Yang & Zhao,
2020) personality traits (Credê & Kuncel, 2008), or stress (Elias et al. 2011) collectively play
a significant role to affect the mindset of the students which consciously or unconsciously
impacts their academic performance. The cumulative effect of different factors paves a
route to consolidate different thoughts. People with fixed mindset believe that intelligence
is fixed and cannot be changed, whereas people with growth mindset feel that intelligence
can be developed and improved with the right efforts.
Various intrapersonal and interpersonal influencing factors pave our way of thinking
and sometimes motivate or demotivate us in different situations. It is hence difficult to
ascertain which factor has an edge over the other. Wentzel and Wigfield (1998) stated that
a comprehensive study of students’ academic behavior is possible when both social and
academic factors are sincerely taken into consideration.
7.1.1 Intrapersonal Factors
Intrapersonal factors are the individual’s beliefs such as a sense of self, awareness to
restrict behavior in extreme states, recognition of the power of expression, etc. Tatnell et al.
(2014) state that among intrapersonal factors, emotion regulation and self-esteem show the
strongest role in behavior. These factors have tremendous scope of bringing exponential
growth in life provided the individual is aware of his abilities. Rampullo et al. (2015) state
intrapersonal factors play a significant role; they can act as a source of support or a barrier.
They are the talents and abilities which reinforce the individual’s competence to face and
accomplish the challenges and goals. Flavian (2016) states that students’ self-fulfillment is
based on realistic self-awareness. Research shows that factors including students’ aware-
ness about themselves, their goals to achieve, and their expectations from themselves and
external world play a pivotal role in their academic performance and mental well-being
(Gu et al., 2015). Bandura, an eminent Social Cognitive Psychologist, stated that self-effi-
cacy or confidence is one of the pivotal factors which guides an individual to develop an
optimistic view about his goal. It is self-belief in one’s abilities that ascertains the success-
ful accomplishment of the task. They are the predictors of the guaranteed completion of
the task (Bandura, 1997; Bandura et al., 1999).
To hone intrapersonal skills, language determines a significant role. Language is the
most potent vehicle of expression. English is the most common language used in edu-
cation and professional world. Nonnative English learners may feel uncomfortable and
anxious while expressing their opinions. MacIntyre et al. (1998) describe foreign language
anxiety as “the worry and negative emotional reaction aroused when learning or using a
second language.” It is perceived that students suffer foreign language learning anxiety
and it reflects on their academic and peer performance: “Language anxiety can originate
Technical and Nontechnical Students 103
from learner’s own sense of self, their self-related cognitions, language learning difficul-
ties, differences in learners” (Hashemi, 2011). Students who suffer from language anxiety
usually avoid eye contact and feel uncomfortable in expressing their thoughts in the class-
room and gradually they start avoiding the class discussions.
Each student has a unique way to respond to setbacks and challenges. Some accept the
hurdles to improvise their performance and some may get intimidated and see them as
insurmountable blocks.
Anxiety, nervousness, and stress are the immediate responses, which occur when stu-
dents face some unexpected challenges. It is interesting to study to what extent anxiety
obstructs academic performance. Research shows different results, in a few cases, it was
found that anxiety impedes success (Seipp, 1991; Keogh et al. 2004; Dobson 2012; Macher
et al., 2012; Owens et al., 2012) On the contrary, in a few cases, anxiety helped the students
to perform better (Alkhalaf, 2018).
Joining university is a huge transition in students’ life. A major shift takes place in their
physical, mental, psychological, and social arena. The sudden shift may overwhelm some
students to adapt to the new changes. As mentioned earlier, individuals with growth
mindset will take this as a huge opportunity as they enter a new phase of life. On the
contrary, those who feel little intimidated by the change may get affected by some of their
preconceived notions or feedback they receive about the teachers. Students who frequently
miss the mark become fearful of new tasks and distraught by setbacks (Dweck, 2006).
Prejudices, preconceived notions, and biasedness can have a major influence on some-
body’s behavior if he lacks the vision to pierce through them to see the reality (Duckitt,
1992; Olson, 2009; Rattan & Dweck, 2010).
Some students are eager to take feedback from their seniors and peers about the uni-
versity, curriculum, faculty, other activities, etc. (Owen, 2016). They are not affected by
the feedback they receive as they wish to make their own opinions as their academic
journey progresses. They don’t allow their preconceived notions to affect their thinking.
Cognitive biases can impair the decision-making process and can disrupt collective out-
comes (Caviola et al. 2014).
Correct opinions are formed after an exhaustive analysis of the situation. Self-driven
individuals do not form opinions easily. They critically evaluate the situation, spend time
in thorough analysis, observe how others respond in the same situation (Moussaïd et al.,
2013), and then derive their conclusions. Conscious opinions help in taking wiser decisions
(Shahsavarani & Abadi, 2015).
engaging and active bond of the teacher and student always strengthens the overall learn-
ing which takes place in the class (Gablinske, 2014). The teacher not only provides academic
support but also looks after the emotional and social being of the students (Varga, 2017).
A well-informed and conscious teacher knows that his/her knowledge and skills have
a direct and indirect effect on the students. Many studies show that the teacher’s com-
munication style has an indelible effect on the students. Right paralinguistic features such
as voice modulation, pitch, rate of speech and tone, determine the effectiveness of com-
munication. Positive and efficient communication motivates the students significantly. On
the contrary, weak and fragile communication not only demotivates the students but also
pushes them to lose interest in a particular subject. It further affects students’ communica-
tion style due to which they might struggle to voice their opinion in public (Ataunal, 2003).
Effective teaching depends on the teacher’s effective communication. A teacher with
effective communication skills understands the needs of the students and uses their com-
munication skills to make learning an enjoyable and fruitful experience. Amadi and Paul
(2017) state that a teacher’s efficient communication skills have a direct positive effect on a
students’ academic performance.
Besides verbal, a teacher’s nonverbal communication also leaves a remarkable impression
on the students’ attentiveness. Nonverbal communication includes kinesics, proxemics,
chronemics, and paralinguistic features. Kinesics includes correct postures, appropriate
gesticulation, positive body language, right facial expressions, and correct eye contact.
Proxemics helps us to use the space while communicating with others. Bambaeeroo and
Shokrpour (2017) found that nonverbal cues should complement verbal communication,
and balanced communication enhances students learning and improves academic per-
formance. Sutiyatno (2018) also states that verbal and nonverbal communication has a
significant positive impact on a students’ learning process. Zeki (2009) indicated that the
teacher’s nonverbal communication creates a comfortable environment for learning and
motivates students to participate in group discussions.
A major transformation can be seen in teaching methodology due to the advancement of
technology. Technology has opened multiple platforms where students and teachers find
a constant inflow of knowledge (Bruenjes, 2002). Burton (2003) also supports that incor-
porating technology in the class also helps a teacher to build better rapport with the stu-
dents. In order to meet the pace, the teaching pedagogies are also evolving. Teachers are
experimenting with blended learning to improvise their teaching style. They are making
a fine balance by adopting multiple approaches to deal with different topics (Muema et al.,
2018). The conventional way of teaching is used, especially to explain theoretical concepts.
The interactive mode of teaching promotes an active and participative environment in the
class. The interactive mode of teaching enhances collaborative learning. An amalgama-
tion of novel techniques in teaching bridges the gap between the teacher and the student
(Jamian & Baharom, 2012). It fosters innovation and creativity, enhances the ability to ask
the right questions, gives an opportunity to everyone to participate in the tasks more effi-
ciently, and pushes the individuals to break their boundaries and open up to new chal-
lenges (Dexter et al, 1999; Loveless & Ellis, 2001).
University education is always progressive and encompasses diversity to spread its
arena. The inclusion of students from different backgrounds has always been a welcoming
aspect of university education. Cultural diversity opens new avenues for the students to
practically learn various things about different cultures. Each culture possesses a multi-
tude of different beliefs, values, assumptions, attitudes to respond in different situations.
It also affects our responses and decision-making and also influences the development of
personalities (Traindis & Suh, 2002; McCullers & Plant, 1964; Sears, 1948) Most of the time
Technical and Nontechnical Students 105
we judge people as per our own beliefs, which are to an extent influenced by our cultural
influences.
This diversity makes a university a vibrant place where people from diverse places
promote new language skills and novel ways of thinking by sharing their experiences.
Teaching ethnically diverse classrooms starts from embracing views and employing expe-
riential learning that can transmute the differences into positivity (Civitillo et al., 2018).
Students are often receptive to assimilate and accept each other without giving much
consideration to cultural differences; however, they may face some challenges in the begin-
ning, such as perceived discrimination, social isolation, and cultural adjustment (Wu et al.,
2015; Wright & Schartner, 2013; Russell et al. 2010). A study conducted by Newsome and
Cooper, in 2016, pointed the difficulties such as isolation, loneliness, racial discrimination,
and economic exploitation faced by international students in adjusting and accommodat-
ing to a new environment. Although these differences do not impact the students’ mindset
significantly, they may leave certain marks of their presence in the initial days. These bar-
riers can be overcome with the passage of time.
7.3 Methodology
The population of the study consisted of undergraduate students of an Indian university,
located in Haryana. The sample population consisted of 310 undergraduate students, out
of which 258 students were in a technical group and 52 students were in a nontechnical
group. The term technical refers to engineering undergraduates and nontechnical refers
to management and law undergraduate students. The researchers prepared a question-
naire using a four-point Likert scale. The sample population of three schools of the same
university: School of Engineering and Technology, School of Management, and School of
Law filled the questionnaire shared through a Google form. As seen in Tables 7.1 and 7.2,
the Questionnaire had ten questions that were framed keeping the Intrapersonal and
Interpersonal influencing factors in mind.
As seen in Table 7.3, a four-point Likert scale has been used in this study ranging from
Always, Sometimes, Rarely, Never. We have transformed this to numeric values in the fol-
lowing ways: Always = 4, Sometimes = 3, Rarely = 2, Never = 1.
TABLE 7.1
Questionnaire—Intrapersonal Factors
S. No. Intrapersonal Factors
1 Which specific language skill do you feel is the cause of poor academic performance? (due to your
lack of understanding or efficiency of that skill)
2 Does lack of language proficiency impact the overall understanding and performance of core
engineering/management
3 To what extent/how frequently does stress or anxiety impact academic performance?
4 Do the preconceived notions, feedback from the seniors about the teacher affect the overall interest/
performance in any particular subject?
TABLE 7.2
Questionnaire -Interpersonal Influencing Factors
S. No. Interpersonal Influencing Factors
1 Does teacher’s accent or pronunciation affect your understanding of any subject?
2 Does cultural difference affect the academic performance?
3 To what extent does the usage of digital teaching aids like power point presentations, online
courses, models, videos etc., help in improving the understanding of the subject?
4 Does conventional teaching hinder the overall understanding of the subject?
5 Does the interactive mode of teaching help in better understanding of the subject?
6 Do nonverbal communication skills: Body language, postures, gestures, facial expressions and eye
contact of the teacher effect in generating interest in any particular subject?
Technical and Nontechnical Students 107
TABLE 7.3
Likert Scale and Weightage Used
Likert Scale Agreement Weightage
Always 4
Sometimes 3
Rarely 2
Never 1
The value of Cronbach’s alpha is 0.53. A possible reason for this Cronbach’s alpha value
could be the different types of questions that were not similar and consistent in nature.
Since this chapter aimed to see the impact of the intrapersonal and interpersonal factors, we
decided to take the first response of the students to avoid the biasedness of the responses.
7.4 Data Analysis
The first question of the questionnaire was the following: Which specific language skill do
you feel is the cause of poor academic performance? (Due to your lack of understanding
or efficiency of that skill). The students were asked to write any one skill from Listening,
Speaking, Reading and Writing. Many authors (Nan, 2018; Evans, 2018; Sadiku, 2015;
Wallace et al., 2004) have focused on LSRW—Listening, Speaking, Reading and Writing—
the four skills that are essentially required while learning a language and known as lan-
guage foundation skills. Since this question asked them to write only one skill and did not
provide options such as Always, Sometimes, Rarely and Never, the analysis of this ques-
tion has been done separately.
From Figures 7.1 and 7.2, we can see that both technical and nontechnical groups think
that their listening skill is the weakest among all the language skills. Although both the
groups acknowledge that listening is the weakest skill, still the percentage of listening as
the weakest skill is more in the technical group as compared with the nontechnical. There
could be a number of reasons for weak listening skills. The majority of the students feel
that listening comes naturally. They interpret listening and hearing as the same and don’t
put in the required efforts in listening.
FIGURE 7.1
Shows the language skills of the technical group.
108 Mathematical Modeling for Intelligent Systems
FIGURE 7.2
Shows the language skills of the nontechnical group.
The students get distracted easily due to their short span of concentration. Although
students give various reasons for their inept listening skills, at the same time they also
realize the barriers to listening can be overcome with their consistent practice. One of the
ways to improvise listening skills is active participation, which motivates the students to
stay focused while listening. The pie charts also present some interesting facts besides
the weakest skill. The technical group sees listening as the weakest skill and speaking as
the second weakest. The difference between the two skills is significant. Although in the
nontechnical group, the students feel listening is their weakest skill, they find writing and
speaking skills equally challenging after listening. This may happen because the nontech-
nical students often write subjective articles/essays and present them frequently. Due to
that they may feel their writing and speaking skills are constantly challenged.
Rest all questions were analyzed following the Likert scale. Each of the questions had
four options: Always, Sometimes, Rarely, Never. We have transformed this to numeric val-
ues (refer Table 7.3) in the following ways: Always = 4, Sometimes = 3, Rarely = 2, Never = 1.
We have taken the opinion of students from the following two groups: technical and non-
technical. There were 258 students in the technical group and 52 students in the non-
technical group. We have compared their average (mean) opinion on each question using
t-distribution for two samples of technical and nontechnical groups. In this case, we have
tested null hypothesis: mean of two populations are same vs alternative hypothesis: mean
of two populations are not same. We have also compared the variance of two groups using
F-distribution. In this case, we have tested null hypothesis: variances of two populations
are same vs. alternative hypothesis: Variances of two populations are not same. Here we
have discussed results related to each of these nine questions.
TABLE 7.4
Intrapersonal Factors—t Test
Preconceived Notions,
Lack of Language Feedback about the
Proficiency on Anxiety Impact on Teacher Affect the
Subject the Academic Interest/Performance in
Intrapersonal Factors Understanding Performance Subject
Mean of technical group 2.810 3.100 2.759
Mean of nontechnical group 2.846 2.923 2.5
Variance of technical group 0.714 0.581 0.665
Variance of nontechnical group 0.995 0.660 0.725
Hypothesized mean difference 0 0 0
t Stat −0.243 1.452 2.019
P(T≤t) two-tail 0.808 0.150 0.047
t critical two-tail 1.996 1.994 1.993
Conclusion Do not reject null Do not reject null Reject the null hypothesis.
hypothesis. hypothesis.
TABLE 7.5
Intrapersonal Factors-F Test
Lack of Language Anxiety Impact Preconceived Notions, Feedback
Intrapersonal Proficiency on Subject on the Academic about the Teacher Affect the
Factors Understanding Performance Interest/Performance in Subject
Variance of technical 0.714 0.581 0.802
group
Variance of 0.995 0.660 0.685
nontechnical group
Hypothesis Variance of two Variance of two Variance of two population are
populations are same populations are same
same
F 1.392 1.136 1.169
F critical 1.397 1.397 1.468
Conclusion Do not reject null Do not reject null Do not reject the null hypothesis
Hypothesis. Hypothesis.
TABLE 7.6
Interpersonal Influencing Factors-t Test
Integrating Nonverbal
Teachers Digital Conventional Interactive Communication Cultural
Accent/ Teaching Aids Teaching Mode of of the Teacher Difference
Pronunciation Improving the Hinder the Teaching Help Affect in Affect the
Interpersonal Affect Subject Subject Subject in Better Subject Generating Academic
Factors Understanding Understanding Understanding understanding Interest in Subject Performance
Mean of 2.717 3.431 2.751 3.759 3.399 1.964
technical
group
Means for two samples of technical and nontechnical groups are 2.717 and 2.5, respec-
tively, for the factors: teachers’ accent/pronunciation affects subject understanding. Since
there is no difference in average opinion of two populations, we can conclude that both
groups think that the teacher’s accent or pronunciation rarely or sometimes affect their
understanding of any subject. Many of them believe it sometimes influences their under-
standing. The teacher’s paralinguistic skills play a vital role in overall students’ learning
process. For technical students, communication skills predominantly affect the students
in their skills and perspective courses, where they need good communication skills to
perform well. If some students struggle to understand the teacher’s accent, then they may
feel difficult to cope with the course.
On the other hand, if the students find the teacher’s accent unclear or faulty, they struggle
to understand the course content. Consequently, it may hinder their understanding of the
core engineering courses because these courses are full of technical jargon. Nontechnical
students don’t use too much jargon and can enjoy the flexibility of subjective terms and
expressions.
If some students are already apprehensive about their language skills and constantly
strive to understand things, then they may take time to understand the teacher’s accent.
On the other hand, if the students don’t appreciate the teacher’s accent but understand the
concept taught by him/her, then it may not have much impact on their academic perfor-
mance. The result also supports/highlights this fact.
Means for two samples of technical and nontechnical groups are 3.431 and 3.442, respec-
tively, for the factor: integrating digital teaching aids improve the subject understanding.
112 Mathematical Modeling for Intelligent Systems
Since there is no difference in average opinion of two populations (in this case sample
means are very close as well), we can conclude that both groups think that usage of
digital teaching aids like ppts, online courses, models, and videos, sometimes or always
help in improving the understanding of the subject. Majority of them believe that it
always helps in improving the understanding of the subject. For this question, average
opinions of two groups are very similar, and this fact is also verified with high p-value.
This clearly shows that the students in both groups feel that technology expands their
horizon of learning. Technology strengthens their problem-solving aptitude. It not only
helps them to identify the gaps of learning but also offers various platforms to bridge
those gaps. Through advanced technology, they can get access to various new courses.
Online learning is one such example. The result shows that both technical and nontech-
nical students welcome and embrace blended learning that amalgamates technology
with theoretical concepts.
Means for two samples of technical and nontechnical groups are 2.751 and 2.480, respec-
tively, for the factor: conventional teaching hinders the subject understanding. Since
there is a difference in average opinion of the two populations, we can conclude that both
groups think differently about conventional teaching. Many students of the technical
group in comparison to the nontechnical group believe that sometimes it hinders the over-
all understanding of the subject. Conventional teaching is interpreted as long descriptive
lectures with minimum or no usage of technology. Technical courses are more focused on
experiments. The technical students are always inquisitive to validate the concepts that
are taught in the class. It can be deduced from the results that technical students may
like to give more importance to task-oriented lectures that promote experiential learning
instead of listening to long descriptive lectures. That does not deny the value of theoretical
lectures but the majority of them welcome blended learning over conventional learning.
Nontechnical subjects are more subjective and descriptive such as subjects taught to law
students. The students understand the nature of the course and hence are prepared to
listen to the lectures. This could be one of the reasons that the majority of nontechnical
students are comfortable with conventional methods of teaching.
Means for two samples of technical and nontechnical group are 3.759 and 3.711, respec-
tively, for the factor: interactive mode of teaching help in better subject understanding.
Since there is no difference in average opinion of two populations (in this case sample
means are very close as well), we can conclude that both groups think that the interac-
tive mode of teaching always helps in better understanding of the subject as two samples
means are very close to four. For this question, the average opinions of the two groups are
very similar and this fact is also verified with high p-value. Through interactive teaching, a
teacher actively involves the students in their learning process by way of regular teacher–
student interaction, student–student interaction, use of audio–visuals, and hands-on dem-
onstrations. The students act as active contributors and learn significantly through such
interactions. It is clearly demonstrated in the result that both groups hail and acknowledge
the advantages of interactive mode of teaching.
Means for two samples of technical and nontechnical groups are 3.399 and 3.557, respec-
tively, for the factor: nonverbal communication of the teacher affects in generating interest
in the subject. Since there is no difference in average opinion of two populations, we can
conclude that both groups think that nonverbal communication skills that include body
language, postures, gestures, facial expressions, and eye contact of the teacher sometimes
or always affect in generating interest in any subject. The majority of them believe that
nonverbal communication skills: body language, postures, gestures, facial expressions,
and eye contact of the teacher always promote interest in any subject. Both the groups feel
Technical and Nontechnical Students 113
that nonverbal communication improves a person’s ability to relate, engage, and establish
meaningful interactions in everyday life and leads to developing a good rapport with the
teacher, which helps them to develop more interest and participation in the subject.
The means for two samples of the technical and nontechnical group are 1.964980545 and
2.096153846, respectively, for the factor: cultural difference affects academic performance.
Since there is no difference in average opinion of two populations (in this case sample
means are very close as well), we can conclude that both groups think that cultural dif-
ferences rarely affect academic performance as 2 samples means are very close to 2. For
this question, the average opinions of the two groups are very similar and this fact is also
verified with high p-value. The students in both groups feel that cultural diversity does
not have any tangible effect on their performance.
As shown in Table 7.7, we have compared the variability of the opinion of two groups
(technical and nontechnical groups) for the questions addressing different interpersonal
influencing factors.
As it is evident from Table 7.7, there is not much difference in the sample variances of
technical and nontechnical groups for the interpersonal influencing factors discussed in
the table. We can conclude that there is no variability in the opinion of two populations
for the factors: teacher’s accent/pronunciation affects subject understanding, integrating
digital teaching improves the subject understanding, conventional teaching hinders the
subject understanding, teacher’s nonverbal communication yields in generating interest
in the subject and, cultural differences do affect the academic performance. There is sig-
nificant variability in the opinions of two populations for the factor: interactive mode of
teaching promotes better subject understanding, although there is no difference in the
average opinion of two populations for this factor. In this case, we can conclude that there
is variability in opinion of two groups that the interactive mode of teaching helps in better
understanding of the subject. This variation is more for nontechnical group in comparison
to the technical group as evident from sample variances of technical and nontechnical
groups.
TABLE 7.7
Interpersonal Influencing Factors-F Test
Teachers Integrating Conventional Interactive NVC of the Cultural
Accent/ Digital Teaching Teaching Mode of Teaching Teacher Affect Difference
Pronunciation Aids Improving Hinder the Help in Better in Generating Affect the
Interpersonal Affect Subject the Subject Subject Subject Interest in Academic
Factors Understanding Understanding Understanding Understanding Subject Performance
Variance of 0.966 0.535 0.665 0.237 0.684 0.947
technical
group
Variance of 1 0.486 0.725 0.483 0.526 0.951
nontechnical
group
Hypothesis Variance of two Variance of two Variance of two Variance of two Variance of two Variance of
population are population are population are population are population are two
same same same same same population
are same
F 1.034 1.098 1.089 2.034 1.301 1.003
F critical 1.397 1.468 1.397 1.397 1.468 1.397
Conclusion Do not reject the Do not reject the Do not reject the reject the null Do not reject the Do not reject
null hypothesis null hypothesis null hypothesis hypothesis null hypothesis the null
hypothesis
114 Mathematical Modeling for Intelligent Systems
7.6 Conclusion
Coping with students’ academic challenges is a complex and rigorous experience for aca-
demicians. Motivating students to channelize their intellect and emotions in the right
direction requires robust and consistent efforts. The present study presents the impact of
intrapersonal and interpersonal influencing factors on the academic performance of techni-
cal and nontechnical students and highlights how different factors differently affect each
group’s academic performance. The responses to the questionnaire helped us to under-
stand how these factors play their roles in two different groups. We could deduce some
interesting results through the varied responses of each group. For a few factors, the groups
showed similar opinions: as the fondness of digital learning in both groups, the impact of
lack of proficiency in language skills on their academic performance, nonverbal commu-
nication of the teachers and their effect on their interest in that subject, the impact of anxi-
ety on academic performance, least effect of cultural diversity on academic performance.
Although the average opinion of the two groups toward an interactive mode of teaching
is similar, there is variability in the opinion of the two groups. Besides similarities, we
also found some differences in the opinions of the technical and nontechnical groups. The
technical group believes that conventional teaching may hinder their performance but the
nontechnical group shows no such indifference toward conventional teaching, the techni-
cal group believes that the teacher’s accent and paralinguistic skills can have an effect on
their understanding of the subject, but the nontechnical group seems less affected from
this. The technical group indicates the possibility of the effect of the preconceived notions
or the feedback they receive about the teacher from their seniors on their academic perfor-
mance, but the nontechnical group does not agree to this thought much. It is an enriching,
scholastic, and edifying experience to see the differences in the responses of the technical
and nontechnical students. The study of the intrapersonal and interpersonal influencing
factors on two different groups has broadened our view as teachers to understand the effect
of different factors on the students’ academic performance. The reasons for these differ-
ences are explained in the result analysis section, and we feel that one of the major reasons
for the difference of opinions in the two groups could be the nature of the courses that the
technical and nontechnical students pursue. We are very hopeful that the results of this
study will be promising for the academicians to fathom the academic challenges of the
technical and nontechnical students and provide them their timely assistance to boost their
academic performance. A future study on overcoming the factors can be pursued to see the
direct advantages on academic performance. Factors can be undertaken individually to see
their vast implication in the academic realm. These factors can also be studied to see their
effects on postgraduate students. Following are the limitations of this research:
• We conducted the survey only once to avoid the biasedness of the responses. Had
the survey been conducted more than once, we could have applied test–retest
reliability.
• We could only collect the sample from one university from different courses that
the university offers. To obtain better results, the sample size could have been
varied and vast.
• We had decided the influencing factors—intrapersonal and interpersonal—before
drafting the questionnaire and adhered to those factors only. In the future, we
would like to explore factors by conducting factor analysis.
Technical and Nontechnical Students 115
References
Alkhalaf AM (2018) Positive and negative affect, anxiety, and academic achievement among medical
students in Saudi Arabia. Inter Journal of Emergency Mental Health and Human Resilience 20(2):
397.
Amadi G, Paul AK (2017) Influence of student-teacher communication on students’ academic
achievement for effective teaching and learning. American Journal of Educational Research 5(10):
1102–1107.
Anderson AS, Good, DJ (2016) Increased body weight affects academic performance in university
students. Preventive Medicine Reports 5: 220–223.
Ataunal A (2003) Niçin ve nasıl bir öğretmen? (Why and what kind of teacher?). Ankara: Milli Eğitim
Vakfı Yayınları.
Bambaeeroo F, Shokrpour N (2017) The impact of the teachers’ non-verbal communication on suc-
cess in teaching. Journal of Advances in Medical Education and Professionalism 5(2): 51–59.
Bandura A (1997) Self-efficacy: The exercise of control. New York: W H Freeman/Times Books/Henry
Holt & Co.; MacMillan Publisher.
Bandura A, Freeman WH, Lightsey R (1999) Self-efficacy: The exercise of control. Journal of Cognitive
Psychotherapy 13(2): 158–166.
Berscheid ES, Rega PC (2005) The psychology of interpersonal relationships. Upper Saddle River, NJ:
Pearson Prentice Hall.
Bruenjes LS (2002) A multi-case study investigating the disposition of faculty use of technology as a
teaching and learning tool in the higher education classroom. Doctoral dissertation University
of Massachusetts, Lowell. UMI 3041377.
Burton DB (2003) Technology professional development: A case study, Academic Exchange Quarterly
7(2): 2378–2381.
Cambridge English Dictionary (2015) Meaning of culture- Archived from the original on August 15,
2015. Retrieved July 26, 2015.
Cavilla D (2017) The effects of student reflection on academic performance and motivation. Sage
Open 7(3), 2158244017733790.
Caviola L, Mannino A, Savulescu J, Faulmüller N (2014) Cognitive biases can affect moral intuitions
about cognitive enhancement. Frontiers in Systems Neuroscience. https://www.frontiersin.org/
articles/10.3389/fnsys.2014.00195/full
Civitillo S, Juanga LP, Schachner MK (2018) Challenging beliefs about cultural diversity in educa-
tion: A synthesis and critical review of trainings with pre-service teachers. Educational Research
Review 24: 67–83.
Cooke FL, Saini DS (2010) Diversity management in India: A study of organizations in different
ownership forms and industrial sectors. HR Science Forum 40(3): 477–500.
Credê M, Kuncel NR (2008) Study habits, skills, and attitudes: The third pillar supporting collegiate
academic performance. Perspectives on Psychological Science 3(6): 425–453.
Deng W, Li X, Wu H, Xu G (2020) Student leadership and academic performance. China Economic
Review 60
Dexter SL, Anderson RE, Becker HJ (1999) Teachers’ views of computers as catalysts for changes in
their teaching practice. Journal of Research on Computing in Education 31(3): 221–239.
Dobson C (2012) Academic anxiety and coping with anxiety effects of academic anxiety on the
performance of students with and without learning disabilities and how students can cope
with anxiety at school, Master Thesis, Northern Michigan University, https://www.nmu.edu/
education/sites/DrupalEducation/files/UserFiles/Dobson_Cassie_MP.pdf
Duckitt J (1992) Prejudice and behavior: A review. Current Psychology 11(4): 291–307.
Dweck CS (2006) Mindset: The new psychology of success. New York, NY: Random House.
Dweck CS, Yeager DS (2019) Mindsets: A view from two eras. Perspectives on Psychological Science
14(3), 481–496.
116 Mathematical Modeling for Intelligent Systems
Elias H, Ping WS, Abdullah MC (2011) Stress and academic achievement among undergraduate stu-
dents in Universiti Putra Malaysia. Procedia-Social and Behavioral Sciences 29: 646–655.
Evans MB (2018) The Integration of Reading, Writing, Speaking, and Listening Skills in the Middle
School Social Studies Classroom in the Middle School Social Studies Classroom. Utah State
University Utah State University, All Graduate Theses and Dissertations. 7157. https://digitalc-
ommons.usu.edu/cgi/viewcontent..cgi?article=8259&context=etd
Flavian H (2016) Towards teaching and beyond: Strengthening education by understanding stu-
dents’ self-awareness development. Power and Education 8(1), 88–100.
Gablinske PB (2014) A case study of student and teacher relationships and the effect on student learn-
ing and the effect on student learning, Doctorate Thesis, University of Rhode Island University.
https://digitalcommons.uri.edu/cgi/viewcontent..cgi?article=1284&context=oa_diss
Gibson MA (1982) Reputation and respectability: How competing cultural systems affect students’
performance in school, Anthropology & Education Quarterly. https://anthrosource.onlinelibrary.
wiley.com/doi/abs/10.1525/aeq.1982.13.1.04x0462t
Gu J, Strauss C, Bond R, Cavanagh K (2015) How do mindfulness-based cognitive therapy and
mindfulness-based stress reduction improve mental health and wellbeing? A systematic
review and meta-analysis of mediation studies. Clinical Psychology Review 37: 1–12.
Hashemi M (2011) Language stress and anxiety among the English language learners. Procedia-
Social and Behavioral Sciences 30: 1811–1816.
Jamian AR, Baharom R (2012) The application of teaching aids and school supportive factors in
learning reading skill among the remedial students in under enrolment schools. Procedia-
Social and Behavioral Sciences 35:187–194
Kassarnig V, Mones E, Nielsen AB, Sapiezynski P, Lassen DD, Lehmann S (2018) Academic perfor-
mance and behavioral patterns. EPJ Data Science 7: 1–16.
Keogh E, Bond FW, French CC, Richards A, Davis RE (2004) Test anxiety, Susceptibility to distrac-
tion and examination performance. J of Anxiety, Stress and Coping 17(3): 241–252.
Lamb ME, Bornstein MH (2011) Social and Personality Development: An Advanced Textbook, Psychology
Press Taylor & Francis Group, New York.
Loveless A, Ellis V (2001) ICT, Pedagogy and the Curriculum. Taylor and Francis Group. https://
teknologipendidikankritis.files.wordpress.com/2011/11/loveless-ellis_ict-pedagogy-and-cur-
riculum.pdf
Macher D, Paechter M, Papousek I, Ruggeri K (2012) Statistics anxiety, trait anxiety, learning behav-
ior, and academic performance. European Journal of Psychology of Education 27: 483–498.
MacIntyre PD, Dörnyei Z, Clément R, Noels KA (1998) Conceptualizing willingness to communicate
in a L2: A situational model of L2 confidence and affiliation, Journal of The Modern Language
82(4): 545–562.
McCullers JC, Plant WT (1964) Review of educational research growth. Development, and Learning
34(5): 599–610.
Moussaïd M, Kämmer JE, Analytis PP, Neth H (2013) Social influence and the collective dynamics of
opinion formation. PLoS One, 8(11): e78433.
Muema JS, Mulwa DM, Mailu, SN (2018) Relationship between teaching method and students. per-
formance in mathematics in public secondary schools in Dadaab Sub County, Garissa County;
Kenya. IOSR Journal of Research & Method in Education 8(5): 59–63.
Nan C (2018) Implications of Interrelationship among four language skills for high school english
teaching, Journal of Language Teaching and Research 9(2) 418–423.
Newsome LK, Cooper P (2016) International students’ cultural and social experiences in a British
University: “Such a hard life [it] is here”. Journal of International Students 6(1): 195–215.
Olson MA (2009) Measures of prejudice. In: Nelson TD, editor. Handbook of prejudice, stereotyping, and
discrimination. New York: Psychology Press 367–386.
Owen L (2016) The impact of feedback as formative assessment on student performance. Inter J of
Teaching and Learning in Higher Education 28(2): 168–175.
Technical and Nontechnical Students 117
Owens M, Stevenson J, Hadwin JA, Norgate R (2012) Anxiety and depression in academic per-
formance: An exploration of the mediating factors of worry and working memory. School
Psychology International 33: 433–449.
Rampullo A, Licciardello O, Castiglione C (2015) Intrapersonal factors effects on professional orien-
tation and environmental representations. Procedia-Social and Behavioral Sciences 205(9):422–428.
Rattan A, Dweck CS (2010) Who confronts prejudice? The role of implicit theories in the motivation
to confront prejudice. Psychological Science 21(7): 952–959.
Russell J, Rosenthal D, Thomson G (2010) The international student experience: Three styles of adap-
tation. Higher Education, 60(2): 235–249.
Saa AA, Emran MA, Shaalan K (2019) Factors affecting students’ performance in higher education:
a systematic review of predictive data mining techniques. Technology, Knowledge and Learning
24: 567–598.
Sadiku LM (2015) The importance of four skills reading, speaking, writing, listening in a lesson
hour. European Journal of Language and Literature Studies 1(1): 29–31.
Sears RR (1948) Personality development in contemporary culture. Proceedings of the American
Philosophical Society 92(5): 363–370.
Seipp B (1991) Anxiety and academic performance: A meta-analysis of findings” Journal of Anxiety
Research 4(1): 27–41.
Shahsavarani AM, Abadi EAM (2015) The bases, principles, and methods of decision-making: A
review of literature. International Journal of Medical Reviews 2(1): 214–225.
Sutiyatno S (2018) The effect of teacher’s verbal communication and non-verbal communication on
students english achievement. Journal of Language Teaching and Research 9(2): 430–437.
Tatnell R, Kelada L, Hasking P, Martin G (2014) Longitudinal analysis of adolescent NSSI: The role
of intrapersonal and interpersonal factors. Journal of Abnormal Child Psychology 42(6): 885–896.
Traindis H, Suh EM (2002) Cultural influences on personality. Annual Review of Psychology 5(1):
133–160.
Varga M (2017) The effect of teacher-student relationships on the academic engagement of students.
Master Thesis, Graduate Programs in Education, Goucher College.
Wallace T, Stariha E, Walberg, HJ (2004) Teaching, speaking, listening and writing. Educational practices
series-14. International Academy of Education, International Bureau of Education. https://files.
eric.ed.gov/fulltext/ED495377.pdf
Wentzel KR, Wigfield A (1998) Academic and Social Motivational Influences on Students’ Academic
Performance. Educational Psychology Review 10:155–175.
Wright C, Schartner A (2013) “I can’t...I won’t?” International students at the threshold of social inter-
action. Journal of Research in International Education 12(2):113–128.
Wu HP, Garza E, Guzman N (2015) International student’s challenge and adjustment to col-
lege. Education Research International 2015: 202753. https://www.hindawi.com/journals/
edri/2015/202753/
Yang J, Zhao X (2020) Parenting styles and children’s academic performance: Evidence from middle
schools in China. Children and Youth Services Review 113: 105017.
Zeki CP (2009) The importance of non-verbal communication in classroom management. Procedia-
Social and Behavioral Sciences 1(1): 1443–1449.
8
PIN Solar Cell Characteristics:
Fundamental Physics
CONTENTS
8.1 Introduction ........................................................................................................................ 119
8.2 Working of the PIN Solar Cell ......................................................................................... 120
8.3 Dark Current....................................................................................................................... 123
8.4 Photocurrent ....................................................................................................................... 127
8.5 Conclusion .......................................................................................................................... 131
References..................................................................................................................................... 131
8.1 Introduction
Solar cells are prevalent in our lives today. Roadside lamp posts use solar cells, solar vehi-
cles are roaming in the city, and space stations up in the sky are using solar panels for pow-
ering up. Some natural questions arise: what are solar cells? How do they function? Well,
a short answer is that solar cells are power sources: they convert sunlight into electricity.
They act like batteries when they are illuminated. That is, when there is light, a solar cell
produces a voltage.
Like many other devices, solar cells have two terminals. Under illumination, if the two
terminals are shorted, a short-circuit current flows. To understand solar cell action, further
a current–voltage study is needed; questions need to be addressed like, under illumination,
and subject to a voltage, what happens to a solar cell’s current? Under a known intensity of
light, if a certain voltage is applied against a solar cell, can we know how much current will
flow in the circuit? This chapter ventures out to answer this question, i.e., it works toward
figuring out the current–voltage–light phase space of a solar cell. For that, we would first
go through the operations of a solar cell in dark. We would figure out the solar cell’s dark
current–voltage characteristics. Then we would illuminate the solar cell and would derive
the current–voltage characteristics under illumination. Details of the dark characteristics
can be found in Refs. [1–4]. The illuminated characteristics were discussed in Ref. [5].
From various types of solar cells that are getting researched at present, we would pick
the PIN type. The PIN solar cell has three layers of semiconductors—a P type semiconduc-
tor, an I type (intrinsic) semiconductor, and an N type semiconductor. The P layer is doped
with negatively charged acceptor ions and has more holes than electrons. Similarly, the N
layer is doped with positively charged donor ions and has more electrons than holes. The I
layer is intrinsic; it has an equal number of holes and electrons. The I layer can also instead
be lightly doped (P or N type) but the doping density should ideally be less than that of
the P and N layers.
DOI: 10.1201/9781003291916-8 119
120 Mathematical Modeling for Intelligent Systems
FIGURE 8.1
(a) A PIN solar cell showing the three layers—the P, the I, and the N. (b) Under illumination the I layer absorbs
light and produces free electron and hole pairs. These opposite charge carriers travel in opposite directions
under the effect of the built-in electric field present in the PIN structure. This causes an electric current from the
P side to the N side, or an open-circuit voltage when the cell is left open.
PIN Solar Cell Characteristics 121
by equations (8.1) and (8.2). NC and NV are the effective conduction and the valence band
density of states, kB is the Boltzmann constant, and T is temperature.
E − EC
n = N C exp F (8.1)
k BT
E − EF
p = NV exp V (8.2)
k BT
The electron-hole concentration product, i.e., np product is always equal to the semiconduc-
tor’s intrinsic carrier density squared. The intrinsic carrier concentration ni is the (equal)
number of electrons and holes present in the undoped semiconductor due to thermal acti-
vation. ni is expressed in equation (8.3). EG is the bandgap.
−E
ni2 = np = N C NV exp G (8.3)
k BT
The PIN energy band diagram is drawn keeping in mind what would happen to the P, I,
and N layers due to each other’s presence. The P layer has more holes than the I layer. This
would make holes diffuse out from the P layer into the I layer when the P and the I layer
are brought in close proximity. Similarly, the N layer will lose electrons to the I layer. As a
result, the I layer’s carrier concentration profiles become nontrivial: toward the P side, the I
layer will have more holes, and toward the N side, it will have more electrons. This makes
the I layer tilt (with respect to the Fermi level) as shown in Figure 8.2a. The P layer and the
N layer will not get affected by this tilt. They will just become devoid of respective carriers
up to a width (xp –wp) and (wn –xn).
Electric field inside a semiconductor can be calculated using Poisson’s Equation: at any
point in space, the gradient of the electric field is given by the total charge density stored
at that point divided by the electric permittivity at that point. Applying Poisson’s Equation
to the PIN structure is done below. NA and ND are the doping densities of the P and the N
layers (i.e., the total hole and electron concentrations), εr is the dielectric constant, and ε 0 is
the permittivity of the vacuum.
dε −qN A
= for w p < x < x p . (8.4a)
dx ε r ,P ε 0
FIGURE 8.2
(a) The PIN energy band diagram. The P semiconductor is xp units wide. The I layer (absorber of the solar cell) is
(xn –xp) units wide. The N layer’s width is (d–xn). xp –wp is the width of the affected region in the P layer due to the
presence of the neighboring I layer, and similarly (wn –xn) is the width of the affected portion of the N layer. d is
the total width of the solar cell. (b) Electric field in the P, I, and N layers. The absolute value of the field is plotted,
i.e., the field ℇ is actually negative. The field is constant across the I layer and drops to zero in the regions of the
P and N layers that are unaffected by the I layer.
122 Mathematical Modeling for Intelligent Systems
dε p ( x ) − n ( x )
dx
=
ε r ,I ε 0
( )
for x p < x < xn − x p 2 (8.4b)
dε n( x) − p ( x)
dx
= −
ε r ,I ε 0
( )
for xn − x p 2 < x < xn (8.4c)
dε qN D
= for xn < x < wn (8.4d)
dx ε r ,N ε 0
Solutions of the above Poisson Equations lead to the electric field distribution as shown in
Figure 8.2b. Figure 8.2b gives the absolute value of the solved electric field. The real elec-
tric field is negative which is easy to find from Figure 8.2a. Down the slope of the tilted I
layer, an electron travels from left to right which means the electric field under which the
electron is in is negative (the current is negative, and from Ohm’s Law, so is the field). This
electric field is sufficient to make the PIN structure gain solar cell functionalities. Electrons
and holes can follow this field and can travel toward the N and the P side when the I layer
is illuminated. This gives rise to a Voc. Thus Figure 8.2 shows the PIN band diagram in dark
and gives a rough idea of what can happen when the solar cell is illuminated.
There is a second variant of the PIN band diagram. In reality, having a perfectly intrinsic
semiconductor is not possible. So the I layer always remains very lightly doped. In addition,
if the I layer is also sufficiently wide, the free carriers inside the I layer can rearrange them-
selves in a way so as to cancel the electric field in the bulk. The electric field arises due to the
immobile charges in the P and N layers’ depletion regions, i.e., in the portions (xp –wp) and
(wn–xn). These regions are devoid of carriers and so are negatively and positively charged
due to the ionized acceptor and donor atoms. After the field is canceled at the I layer’s bound-
aries, it drops to zero in the I layer’s bulk. As a result, the bands in the bulk are flat and don’t
tilt or bend. The energy band diagram of this type of PIN structure is shown in Figure 8.3.
A natural question, therefore, arises—if the electric field in the I layer’s bulk is zero what
aids the solar cell function when the device is illuminated? The answer is—diffusion. After
the I layer is illuminated, it gets filled with free electrons and holes. Both of these entities
tend to diffuse out of the I layer because they are more in number inside the I layer. Due to
the band bending present on either sides of the I layer (Figure 8.3a), electrons travel to the
right, i.e., toward the N layer (down the band diagram) and holes travel to the P layer (up
the band diagram). This ensures solar cell functions when the device is illuminated. Just as
it is easy for electrons to move down an electron energy band diagram, it is easy for holes
to move up. That is how the band diagram is.
FIGURE 8.3
(a) The energy band diagram of the PIN structure where the I layer is intentionally/unintentionally doped and
is also wider. The electric field arising from the P and N layers is canceled at the I layer boundaries making the
field in the I layer interior zero. (b) The electric field in this type of PIN structure.
PIN Solar Cell Characteristics 123
8.3 Dark Current
After getting the fundamentals of the energy band diagram right, one should ponder how
will a solar cell’s current–voltage curve look in the dark. That is what we will discuss next.
Across all the three solar cell layers—P, I, and N—the current–voltage relation will be cal-
culated. In principle, the total current should be independent of space.
There are three kinds of currents involved in semiconductors—drift current, diffusion
current, and generation–recombination (RG) current.
dc
J diff = qD (8.5b)
dx
x
J RG =
∫ qMdx
0
(8.5c)
The drift current density is given by equation (8.5a). Here, by c we mean either the hole
concentration p or the electron concentration n. μ is mobility. By drift, we mean Ohm’s Law.
Likewise, the diffusion current density is given by Fick’s Law in equation (8.5b). D is diffu-
sion coefficient or diffusivity. When a semiconductor is illuminated, after an electron and
hole pair is created, a current can flow known as the generation (G) current. Similarly an
electron and hole pair can combine back and vanish (i.e., recombine) to give rise to another
current component called the recombination (R) current. The generation or recombination
current density should go so as to make 1/q (dJRG/dx) = M, where M stands for G or R. Thus,
the G or R current density is given by equation (8.5c).
While deriving currents inside semiconductors, one comes across the Continuity
Equations which states that a carrier just cannot appear or disappear at a given point of
space. In other words, if there are some electrons, getting created or destroyed per sec-
ond, for example, inside the P layer (as minority carriers), then those electrons must have
arrived at that point of space following the physical processes of either drift, or diffusion,
or recombination, or generation. The Continuity Equations are given in equations (8.6a)
and (8.6b).
dp dp dp dp dp
= + + + (8.6a)
dt total dt drift dt diff dt G dt R
dn dn dn dn dn
= + + + (8.6b)
dt total dt drift dt diff dt G dt R
Further, because there are only two types of currents that are physically possible—the cur-
rents due to drift and diffusion—one can write
dp dp 1 dJ p
+ = (8.7a)
dt drift dt diff q dx
dn dn 1 dJ n
+ = (8.7b)
dt drift dt diff q dx
124 Mathematical Modeling for Intelligent Systems
dp dp
+ =0 (8.8a)
dt drift dt diff
dn dn
+ = 0 (8.8b)
dt drift dt diff
From equations (8.7) and (8.8) one sees that, in the I layer, both the electron and the hole
currents, individually, are constant spatially. We call these values Jsn and Jsp.
Interestingly, just as drift balances diffusion in the I layer, for the P and N layers, in the
quasi-neutral regions (i.e., for x < wp, and for x > wn), it’s recombination that balances diffu-
sion. In other words, diffusion brings the carriers and recombination subtracts them. There
is no generation or drift present in the quasi-neutral regions. Therefore, the Continuity
Equations in the P and N layers go as
dp dp
+ = 0 (8.8c)
dt diff dt R
dn dn
+ = 0 (8.8d)
dt diff dt R
The recombination here follows the monomolecular Shockley Read Hall (SRH) model. In
other words, the Continuity Equation terms for recombination becomes
dp p − p0 ∆p
= = (8.9a)
dt R τp τp
dn n − n0 ∆n
= = (8.9b)
dt R τn τn
where p0 and n0 are the carrier concentrations that are present in the quasi-neutral regions at
zero applied voltage V, i.e., before the applied bias brings in more minority carriers in the P
and the N layers. τ is the minority carrier lifetime for holes (τp) or electrons (τn) accordingly.
This means, in the dark and under zero applied voltage, the hole concentration in the N layer
for x > wn is p0. Likewise, the electron concentration in the P layer for x < wp is n0. It is easy to see
that p0 = ni2/ND, and n0 = ni2/NA. As voltage is applied to the PIN structure, with the positive
terminal at P and the negative terminal at N, the minority carrier concentrations (i.e., the con-
centration of holes in the N layer and that of the electrons in the P layer) increase. The recom-
bination is proportional to this increase and inversely proportional to the carrier lifetime τ.
At an applied voltage V the minority carrier concentration, say, increases to p1 and n1 in
the quasi-neutral regions’ edges, i.e., at wn and wp.
ni2 qV
p1 = exp (8.10a)
ND kBT
PIN Solar Cell Characteristics 125
ni2 qV
n1 = exp (8.10b)
NA kBT
From the fact that ℇ = 0 in the quasi-neutral regions, and from equations (8.5b), (8.7), (8.8c),
(8.8d), and (9), we have
d 2 ( ∆p ) ( ∆p )
Dp = for x ≥ wn (8.11)
dx 2
τp
d 2 ( ∆p ) ( ∆p )
Dp = for x′ ≥ 0 (8.12)
dx '2
τp
∆p = p1 − p0 at x ′ = 0 (8.13a)
∆p = 0 at x ′ → ∞ (8.13b)
Solving equation (8.12) with the above boundary conditions one arrives at the solution
x′
∆p ( x ′ ) = ( p1 − p0 ) exp − (8.14)
Lp
where L is called the minority carrier diffusion length. Simplifying the expression one
arrives at –
ni2 qV x′
∆p ( x ′ ) = exp − 1 exp − (8.15)
ND k BT Lp
i.e.,
ni2 qV x′ n2
p ( x ′ ) = exp − 1 exp − + i (8.16)
ND k BT Lp N D
qni2 Dp qV x′
J p ( x ′ ) = exp − 1 exp − (8.17)
N D Lp k BT Lp
126 Mathematical Modeling for Intelligent Systems
One must balance for the minus sign as the hole minority carriers travel from left to right,
and, therefore, the current must be positive, and, on the other hand, the slope of p(x’), for
x′ > 0, is negative.
The electron current will have a similar expression.
From equation (8.17), at x′ = 0, one can get the expression of the hole current density, i.e.,
qni2 Dp qV
J sp = exp − 1 (8.18)
N D Lp k B T
qni2 Dn qV
J sn = exp − 1 (8.19)
N A Ln kBT
Keeping in mind that in the I layer the current densities do not change spatially, for the
PIN solar cell in dark, the current density–voltage characteristics go as
J = J sp + J sn (8.20a)
qV
J = JS exp − 1 (8.20b)
k BT
Dp D
JS = qni2 + n (8.20c)
N D Lp N A Ln
Strictly speaking equation (8.20b) is valid for a PN junction diode, but it can also hold for
a PIN structure when recombination in the I layer is considered negligible. JS is called the
saturation current density. When recombination in the I layer is significant an ideality fac-
tor nID enters in equation (8.20b), but that we do not discuss here. Equation (8.20b) is also
called the Ideal Diode Equation or the Shockley Equation. Figures 8.4 and 8.5 show the
dark carrier concentrations and the dark current densities of the PIN solar cell. Figure 8.6,
finally, shows the current–voltage characteristics that is given by equation (8.20b).
FIGURE 8.4
(a) Hole concentration in the solar cell under dark and at an applied voltage V. The dashed profile is at zero
applied voltage. At the N layer edge (more precisely, at the depletion layer edge of the N layer) the hole concen-
tration at V = 0 is p0 and becomes p1 at applied voltage V. (b) The hole current density for the PIN solar cell under
dark at applied bias V.
PIN Solar Cell Characteristics 127
FIGURE 8.5
(a) Likewise, electron concentration in the solar cell under dark and at an applied voltage V. The dashed profile
signifies the pattern at zero applied voltage. At the depletion layer edge of the P layer the electron concentration
at V = 0 is n0 and becomes n1 at applied bias V. (b) The electron current density for the PIN solar cell under dark
and at applied voltage V.
FIGURE 8.6
The dark current–voltage characteristics of the solar cell showed in normal (a) and in natural logarithm (b) scale.
8.4 Photocurrent
After deriving the dark current for our PIN solar cell, the next aim will be to derive the
current bias dependence under illumination. For this, we would follow a method similar
to what we did for the dark current. We will start with the Continuity Equation, equate the
generation current to the current caused by drift and diffusion, and will derive the spatial
profiles of carrier concentrations and current densities. The total current density will be
independent of space as before. An important point on deriving the photocurrent is that all
calculations are done for the I layer, i.e., the absorber. Just as the P and the N layers formed
the center of attraction while deriving the dark current, this time, the absorber will take
the front seat for getting into photocurrent. In what follows the spatial variable x″ is con-
sidered to be 0 at xp, and to be di at xn.
Following equation (8.5c), the generation term can be written, for both electrons and holes, as
1 dJ p
= G (8.21a)
q dx′′
1 dJ n
= −G (8.21b)
q dx′′
The electron and hole drift and diffusion current densities can be expressed as
qµ pV ′
J p ,drift = p. (8.22b)
di
dp
J p ,diff = − qDp (8.22c)
dx′′
qµnV ′
J n,drift = n (8.23b)
di
dn
J n,diff = qDn (8.23c)
dx′′
Here, the width of the I layer is considered to be di, i.e., (xn –xp) = di. The total bias is consid-
ered as V′. It must be borne in mind that at zero applied bias the photogenerated charge
carriers will be under the built-in electric field ℇ, and, therefore, under the built-in voltage
Vbi, where Vbi = ℇ/di. Any externally applied voltage V will add to this built-in voltage and
therefore the total bias V′ = V–Vbi. Meanwhile, solving equation (8.21) we get
J p = qGx′′ + Ap (8.24a)
J n = − qGx′′ + An (8.24b)
By using equations (8.22) and (8.24a) we can solve for the hole spatial profile p(x″)
µ pV′
Bp exp x ′′ + q 2GDp
qGx ′′ + Ap Dp di
p = + (8.25a)
qµ pV ′ qµ pV ′
2
di di
Similarly, by using equations (8.23) and (8.24b), we can solve for the electron spatial profile
n(x″)
µnV′
Bn exp − x ′′ − q 2GDn
−qGx ′′ + An Dn di
n = + (8.25b)
qµ pV ′
( )
2
qµnV ′
di di
The two unknowns A and B in each of equation (8.25) can be solved by using boundary
conditions. Under high-level injection, i.e., when the concentration of photogenerated car-
riers is higher than the doping densities, it is easy to see that p = n = 0 at x″ = 0 (i.e., at x = xp)
and at x″ = di (i.e., at x = xn). In other words, the electron and hole densities in these points
will be negligibly small compared to that in the I layer. Under low-level injection, i.e., when
the concentration of photogenerated carriers are higher than the minority carrier concen-
trations in the P and the N layers but lower than the doping densities, these boundary
PIN Solar Cell Characteristics 129
conditions change. This makes the p and n spatial dependencies different, but in either
cases the current density graphs and expressions stay approximately the same, and the
final bias-dependent photocurrent expression is that which is obtained using the p = n = 0
boundary conditions at the boundaries of the I layer. The solutions are given as
qV′ x′′
exp − 1
Gdi2 x′′ kBT di
p = − (8.26a)
µ pV′ di qV′
exp − 1
k BT
qV′ x′′
exp − − 1
2
Gd x′′
i k B T di
n = − − (8.26b)
µnV′ di qV′
exp − − 1
k BT
Following equations (8.22a) and (8.23a) the photocurrent densities can be deduced
x′′ kBT 1
J p = J L − + (8.27a)
di qV′ qV ′
exp − 1
k BT
x′′ kBT 1
Jn = − JL + + (8.27b)
di qV′ −qV′
exp − 1
k BT
J L = qGdi (8.27c)
qV′ 2kBT
J = J p + J n = J L coth − (8.27d)
2kBT qV′
Thus the final bias-dependent photocurrent expression is given by equations (8.27c) and
(8.27d).
The photocurrent densities in the P or N layers should be independent of space because
both the generation and recombination there are zero. The generation is zero because
in our derivation we have considered illumination only in the I layer, i.e., the absorber.
The recombination is also zero because for majority carriers in the P and N quasi-neutral
regions there is no recombination present.
Figure 8.7 shows the carrier concentration profiles for V′ close to zero (but negative). It
assumes high-level injection. Figures 8.8 and 8.9 show the carrier profiles under low-level
injection, and also the current density profiles. The photocurrents are always negative,
however, in the diagrams only the magnitudes are shown.
130 Mathematical Modeling for Intelligent Systems
FIGURE 8.7
The solved spatial profiles of holes (a) and electrons (b) in the I layer under the assumption of high-level injection.
FIGURE 8.8
(a) The hole spatial profile under low-level injection. (b) The hole current density profile. JLP = JLn = JL. The mag-
nitude of the hole current is drawn.
FIGURE 8.9
(a) The electron spatial profile under low-level injection. (b) The electron current density profile. JLP = JLn = JL. The
magnitude of the electron current is drawn.
FIGURE 8.10
(a) The bias-dependent photocurrent of the solar cell. (b) The total current–voltage characteristics of the solar cell.
PIN Solar Cell Characteristics 131
8.5 Conclusion
Thus, in summary, in this chapter, we have derived the PIN current–voltage character-
istics in dark and under illumination. We have started with the energy band diagram,
have introduced the Continuity Equations, and from the Drift Diffusion Equations, we
arrived at the fact that for the P and N layers the diffusion will be equal to the recombina-
tion and thus the exponential current–voltage curve and the Ideal Diode Equation were
derived. Next we assumed high-level injection in the absorber and with those boundary
conditions, we equated drift and diffusion to generation in the I layer and arrived at the
bias-dependent photocurrent S curve. When both of these characteristics are added, the
total current–voltage characteristics of the solar cell are obtained under illumination. With
more illumination G increases, and, from Equation 27(c), JL increases, and thus the current–
voltage–light phase space of the solar cell can be chalked out.
References
[1] R. F. Pierret, Semiconductor Device Fundamentals, Addison-Wesley Publishing Company,
New York (1996).
[2] D. A. Kleinman, “The forward characteristic of the PIN diode”, Bell Syst. Tech. J. 35 (1956)
685–706.
[3] A. Herlet, “The forward characteristic of Silicon power rectifiers at high current densities”,
Solid State Electron. 11 (1968) 717–742.
[4] F. Berz, “A simplified theory of the PIN diode”, Solid State Electron. 20 (1977) 709–714.
[5] R. Sokel and R. C. Hughes, “Numerical analysis of transient photoconductivity in insulators”,
J. Appl. Phys. 53 (1982) 7414.
9
A New Approximation for Conformable Time-
Fractional Nonlinear Delayed Differential
Equations via Two Efficient Methods
CONTENTS
9.1 Introduction ........................................................................................................................ 133
9.2 Basic Literature ................................................................................................................... 134
9.3 Description of IDTM....................................................................................................... 137
9.4 Description of O HAITM ................................................................................................. 138
9.4.1 Error Estimation of O HAITM ............................................................................ 140
9.5 Test Examples ..................................................................................................................... 141
9.6 Conclusion .......................................................................................................................... 150
9.7 Result and Discussion ....................................................................................................... 150
Acknowledgments ...................................................................................................................... 157
References..................................................................................................................................... 157
9.1 Introduction
Delayed differential equations are concerned to be very beneficial in biological and physi-
cal sciences, in which the evaluation of the structure confides on both present and former
positions. In the literature, vigorous physical/biological models arise in terms of frac-
tional-order systems that could not be handled by any integer order system, for instance,
Robertson diffusion model, signal processing, electrical network system, space–time delay
models, and so forth [1–4]. The investigation of Burgers’ equation assumes an imperative
role in understanding distinctive numerical and analytical methods. These models give a
premise to the hypothesis of shock waves and turbulence flow, refer [5–7] for more details.
Integro-delay differential equations are generally named pantograph-type delay differ-
ential equations or generalized delay equations, which are frequently utilized to demon-
strate certain issues with delayed consequence in mechanics and the related logical fields.
Numerous models, for example, stress–strain conditions of materials, models of polymer
crystallization, movement of rigid bodies are described in Kolmanovskii and Myshkis’s
monograph [8] and the references therein. In addition, we have considered the time-
fractional pantograph differential equation (pantograph: z-formed mechanical connection
appended to the top of an electric train/transport to acquire power flexibly by an over-
head electric wire) that has a wide range of application in several systems of mechanical/
electro-dynamic framework [9].
DOI: 10.1201/9781003291916-9 133
134 Mathematical Modeling for Intelligent Systems
where
( ( m)
N [t T α φ ( x , t)] = t T α φ ( x , t) − F x , φ ( a0 x , b0 t), φ x ( a1 x , b1t),…, φ x ( am x , bm t) ) (9.2)
9.2 Basic Literature
There are numerous definitions of fractional derivatives proposed in history. Researchers
have found some weaknesses in various types of definitions by which few models do not
approach toward reality. For instance, Caputo fractional derivative [2] is noncommutative
[20]. Keeping this in mind, a new sort of meaning of fractional derivative, i.e., Conformable
Fractional Derivative as mentioned above is defined as f.
φ ( x , t + ht 1−α ) − φ (x , t)
t α φ ( x , t) = lim , α ∈ (0,1].
h→0 h
where α is the fractional order of derivative.
Nonlinear Delayed Differential Equations 135
a. t α (C φ + D ψ ) = C t α φ + D t αψ ,
b. t α (C) = 0,
c. t α (φ ψ ) = φ t αψ + ψ t α φ ,
ψ t α φ − ψ t α φ
d. t α (φ /ψ ) = ,
ψ2
e. For every r ∈ R , i) T α (t r ) = r t r −α , ii) t T aα (t − a)r = r(t − a)r −α .
Appropriately, t aα (t − a)α = α .
f. If φ , ψ are differentiable functions w.r.t. t, then
∂φ ∂ψ
i) t aα φ = t 1−α , ii) t aαψ = (t − a)(1−α ) ,
∂t ∂t
λ (t− a )α +x ( t − a )α
λ +x
g. t a
α e α
= λe α
.
∂ mψ ∂ mψ
h. Take m < α ≤ m + 1, β = α − m, if exists, t aαψ = t aβ m .
∂t m
∂t
i. Consider α ∈(0,1] and φ ( x , t) be k − times differentiable function at (x , t0 ) ∈ × (0, ∞)
∂i φ
s.t. |( x ,t0 ) = 0, ∀i ∈ {1, 2… k − 1}, therefore, the k − times CTFD φ ( x , t) is
∂t i
∂k φ
t t0kα φ = (t − t0 )k −kα k , where t t0kα ≡ t t0kα …t t0kα .
∂t t=t0
k-times
The conformable integration of fractional order α as defined in Ref. [21] is given below:
φ ( x)
t
(tα φ )(t) =
∫
0 x
1−α
dx , t > 0 (9.3)
1 ∞
−tα
Φ( x , µ ) = α {φ ( x , t)} :=
µ ∫ 0
exp 2 φ ( x , t) tα −1 dt,
αµ
(9.5)
∂κ g( x ,t)
a. The NIT of ∈ is defined by
∂tκ
k−1
∂ k g( x ,t) G( x , µ ) ∂ g( x , 0 + )
Kα
∂t
k =
µ2k
− ∑µ =0
1
2 ( k− )− 1
∂t
, k ≥ 1.
i. Kα {T t
−α
}
g( x ,t) = µ 2α G ( x , µ ),
k −1
G( x , µ ) ∂l g( x , 0)
ii. Kα { α
t T g( x , t) = }µ 2α
− ∑µ
=0
1
2 (α − )− 1
∂t l
, k − 1 < α ≤ k ∈,
i. α {1} = µ
λ 2λ
λ
{ }
+1
ii. α t λ = α α µ α Γ(1 + ), κ = 0,1, 2,…, n
α
tα µ
iii. α exp =
α 1 − µ2
tα µ3
iv. α sin = ;
α 1 + µ
4
tα µ
v. α cos =
α 1 + µ4
Nonlinear Delayed Differential Equations 137
9.3 Description of IDTM
This section represents the IDTM [25] for the system of CTFPDEs. Consider a nonlinear
PDEs with conformable derivative of the type equation (9.1) whose standard form is given as
where the and are linear and nonlinear operators, respectively; h( x ,t) is the known
source term, t α be the conformable fractional operator of order α .
Applying conformable NIT to both sides of equation (6)
Kα {Tt
α
}
(ϕ ( x , t)) + Kα {L[ϕ ( x , t)] + N [ϕ ( x , t)] − h( x, t)} = 0. (9.7)
kα
utilizing the property of conformable NIT operator for t (φ ( x , t)) with initial condition,
we obtain
Kα {φ ( x , t)}
k−1
∂ φ ( x , 0)
µ 2α
− ∑µ
=0
1
2 (α − )− 1
∂t
= −Kα {L[φ ( x , t)] + N [φ ( x , t)] − h( x ,t)} . (9.8)
where ( x , t) represents the source term with initial condition. Formulate linear and non-
linear terms as
∞ ∞
where
∞
(
Pk φk ( x , t) =
1 ∂k
)
k ! ∂ℵk
N
∑
k=0
ℵkφ ( x , t,ℵ) .
ℵ=0
∞
∞ ∞
∑ φk ( x , t) = G (x , t) − Kα−1 µ 2α Kα
∑
L φk ( x , t) + N ∑
φk ( x , t) − h( x ,t)
(9.11)
k =0 k = 0 k= 0
In general, for k ≥ 1:
9.4 Description of O HAITM
This section elaborates the O HAITM [13] for the system of CTFPDEs. Consider nonlin-
ear PDEs with conformable derivative of the type equation (9.1) whose standard form is
given as
where the and are linear and nonlinear operators, respectively; h( x ,t) is the known
source term, and t kα be the conformable fractional operator of order kα , k be a positive
integer.
Applying conformable NIT on both sides of equation (9.13)
Kα {T t
α
}
(ϕ ( x , t)) + Kα {L[ϕ ( x , t)] + N [ϕ ( x , t)] − h( x, t)} = 0. (9.14)
kα
and utilizing the property of conformable NIT operator for t (φ ( x , t)) :
k−1
∂ φ ( x , 0)
Kα { T {φ(x, t)}} = µ1
t
α
2α
Φα ( x , µ ) − ∑µ
=0
1
2 (α − )− 1
∂t
.
we get,
k −1
∂ φ ( x , 0)
Φα ( x , µ ) − ∑µ
=0
1
−2 − 1
∂t
+ µ 2α Kα {L[φ (x , t)] + N [φ ( x , t)] − h( x ,t)} = 0.
[ϕ ( x , t ;ℵ)]
k−1
= Kα {ϕ ( x , t;ℵ)} − ∑µ
=0
1
2 − 1
∂ φ ( x , 0)
∂t
+ µ 2α Kα {L[ϕ (x , t ;ℵ)] + N [ϕ (x , t ;ℵ)] − h(x , t)} .
The function ϕ ( x , t;ℵ) can be expanded utilizing Taylor’s formula in the form of ℵ as
follows:
where the parameter regulates the convergence area of the solution of equation (9.16). The
convergence of the solution equation (9.16) at ℵ = 1 can be established by suitable selection
of the auxiliary parameters: , H ( x, t) ≠ 0 and the initial guess. Thus,
φ ( x , t) = φ0 ( x , t) + ∑φ (x, t).
k=1
k (9.17)
1 ∂k ϕ
where φk ( x , t) = .
k ! ∂ℵk ℵ=0
φk ( x , t) = (φ0 ( x , t), φ1 ( x , t), φ2 ( x , t), …, φk ( x , t)) .
Kα [φk ( x , t) − χ kφk −1 ( x , t)] = ℵH ( x ,t)Pk (φk −1 ( x ,t)), (9.18)
where
1 ∂ k−1 T [ϕ ( x , t ,ℵ)]
Pk ( ϕ k −1 ( x , t)) = .
( k − 1)! ∂ℵk−1 ℵ=0
Theorem 9.3
As far as the series approximation equation (9.17) converges, where φk ( x , t) are computed
from equation (9.19), then the series approximation equation (9.17) must be the exact solu-
tion to the conformable differential equation (9.13).
Let the series approximation of equation (9.13) converges. If we set
∞
Ξ( x , t) = ∑φ (x, t),
k=0
k
(*)lim φκ ( x , t) = 0.
κ →∞
Utilize the condition (*) and (**) in equation (9.20) with property ℵ ≠ 0, we get
κ ∞
lim
κ →∞ ∑
k=1
k (φk −1 ( x , t)) = ∑ (φ
k=1
k k−1 ( x , t)) = 0.
Therefore,
∞
∑ (ϕ
k k−1 ( x , t))
k=1
∞ k −1
∂ φ ( x , 0)
= ∑k =1
Kα [φk −1 ( x , t)] − (1 − χ k )
∑µ
= 0
2 + 1
∂t
+ µ 2α h( x , t) + µ 2α Kα {L[φk −1 ( x , t)] + N [φk −1 ( x , t)]}
which confirms that the series solution φ ( x , t) in equation (9.18) is the exact solution of the
differential equation equation (9.14).
2
k
∑
1 1
∆ k () =
∫∫ 0
0
i=0
φi ( x , t) dxdt.
(9.21)
Nonlinear Delayed Differential Equations 141
1 1
where δ x = and δ t = , k1 = k2 = 10.
k1 k2
The bound on the maximum absolute truncated error of the O HAITM, as proved in
[14], is reported in the following
Let 0 < ρ < 1. If φi+1 ( x , t) ≤ ρ φi ( x , t) for each i. In addition, if the truncated series
represents an approximation for the solution of φ ( x , t).
∑φ (x, t)
i=0
i
Then the maximum truncated absolute error can obtain by the following
k
9.5 Test Examples
Example 9.1
Firstly, assume nonlinear nonhomogeneous time-fractional pantograph differential
equation [26]
t
t α φ (t) + 2φ 2 = 1 φ (0) = 0, t ∈[0, 1], 0 < α ≤ 1. (9.24)
2
In particular case when α = 1 the exact solution of this equation is φ (t) = sin t.
142 Mathematical Modeling for Intelligent Systems
∞ k
∑ φk +1 (t) = −α−1 µ 2α α
2
∑φ 2t φ
j k− j
t
.
2
(9.25)
k =0 j=0
By solving the recurrence relation equation (9.25), the first three iterations can be com-
puted by using Mathematica software as
tα 2 1− 2α t 3α 81− 2α t 5α
φ0 (t) = ; φ1 (t) = − ; φ2 (t) = ;
α 3α 3
15α 5
2 3 − 10α t 7α 2 5 − 12α t 7α
φ3 (t) = − − . (9.26)
63α 7 105α 7
In this consequence, the kth iterative solutions φk (t) for k ≥ 4 can be evaluated from equa-
tion (9.26). Therefore, sixth-order approximate solution for α = 1 is obtained as
t
α {φ (t)} − µφ (0) + µ 2α α 2φ 2 − 1 = 0
2
t
Nϕ (t ,ℵ) = Kα {ϕ (t ;ℵ)} + µ 2α Kα 2ϕ 2 ;ℵ − 1 . (9.28)
2
Utilizing equation (9.28) in equation (9.19), we get the recursive formula to evaluate the
term φk (t)
for each k ≥ 1 :
φk (t) = χ kφk −1 (t) + Kα−1 Pk (φk −1 (t)) (9.29)
where
k −1
Pk (φk − 1 (t)) = Kα {φk − 1 (t)} − (1 − χ k )µ 2 + µ 2α Kα
∑
2 φk − 1− j t φ j t
2 2
j=0
Nonlinear Delayed Differential Equations 143
With the aid of Mathematica software, solve recurrence relation equation (9.30) for φk (t)
for k ≥ 1 as follows, on solving recurrence equation (9.30), the first three iterations are
obtained as:
In this consequence, the kth iterative solutions φk (t) for k ≥ 4 can be evaluated from equa-
tion (9.29). Thus, sixth-order approximate solution at = −1 is obtained as:
6 α 1− 2α 3α
81− 2α t 5α
S6 (t) = ∑φ (t) = tα − 2 3α t
k =0
k 3 +
15α 5
Example 9.2
Let us consider the following first-order nonlinear nonhomogeneous pantograph-type
integro-differential equation [26]
t
t s
t α φ (t) + − 2 φ (t) − 2
2 ∫φ 0
2
ds = 1, 0 < α ≤ 1, φ (0) = 0, t ∈[0, 1].
2
(9.30)
∞ t k
∑
∫∑
s
t
s
φk +1 (t) = −α−1 µ 2α α − 2 φ j (t) − 2 φ j φk − j (9.31)
2 2
k =0 2 0
j=0
By solving the relation equation (9.31), the first two iterations are obtained as:
tα
φ0 (t) = ;
α
1
−1/α 1/α
1 1 tα 1
4 −α Γ 2 + 4Γ 3 + tα − 4α α 2 Γ 4 +
α α α
α α
t 2α 2α 2 +
1 1
Γ3 + Γ4 +
α α
φ1 (t) = ;
2α 4
In this consequence, the kth iterative solutions φk (t) for k ≥ 2 can be evaluated from equa-
tion (9.31). Thus sixth-order approximate solution for α = 1 is obtained as:
144 Mathematical Modeling for Intelligent Systems
S6 (t) = ∑φ (t) = t + t
k =0
k
2
+
t3 t4 t5
+ + +
t6
+
t7
−
t8
+
97t 9
2 6 24 120 720 336 40320 44800
−
39t 10
t t
s
α {φ (t)} − µ 2φ (0) + µ 2α α − 2 φ (t) − 2
2 ∫φ 0
2
ds − 1 = 0
2
t t
s
Nϕ (t ,ℵ) = Kα {ϕ (t ;ℵ)} + µ 2α Kα − 2 ϕ (t;ℵ) − 2
2 ∫ϕ 0
2
;ℵ ds − 1 .
2
(9.33)
Utilizing equation (9.33) in equation (9.19), to evaluate the term φk (t) for each k ≥ 1 :
φk (t) = χ kφk −1 (t) + Kα−1 Pk (φk −1 (t)) (9.34)
where
Pk (φk − 1 (t)) = Kα {φk − 1 (t)} − (1 − χ k )µ 2
k −1
t
∑∫
s
t
s
+ µ 2α Kα − 2 φ (t) − 2 φ j φk − 1− j ds
2 2 2
j=0
0
With the aid of Mathematica software, solve recurrence relation equation (34) for φk (t)
for k ≥ 1. On solving recurrence equation (9.34), the first three iterations are obtained as
follows:
1
−1/α
1 α tα
1/α
Γ 2 + t
tα 2 tα α α α α α
− t ;
φ1 (t) = − ; φ2 (t) = 2 −2α + 2t −
α 2α 1 α
Γ3 +
α
Nonlinear Delayed Differential Equations 145
1
−1/α
1 α tα
1/α
Γ 2 + t
2 tα α
α α α α 2 2α 2 α 3 α
− t + t − t − t
φ3 (t) = α
2 −2 + 2t −
2α 1 α α 2
α α
Γ3 +
α
1
−1/α +2
1 1 tα α
2
(2 + 1) Γ 2 +
2 3 t 3α 2 3 t 2α α α α
− + −
3α 3 α2 1
2Γ 3 +
α
1 2
−1/α +3 −2/α +3
1 1 tα α 1 2 tα α
(4α + 1) 3
Γ2 + α Γ 3 +
3
α α α α α α
+ −
1 2
2αΓ 4 + 4(2α + 1)Γ 4 +
α α
1
−1/α +3
1 1 tα α
2
α
3
Γ2 +
α α
( sinh(α log 4) − cosh(α log 4))
+
1
αΓ 4 +
α
In this consequence, the kth iterative solutions φk (t) for k ≥ 4 can be evaluated from equa-
tion (9.34). Thus sixth-order approximate solution at α = 1 and = −1 is obtained as:
S6 (t) = ∑φ (t) = t + t
k =0
k
2
+
t3 t4 t5
+ + +
t6
−
19t 7
2 6 24 120 1680 13440
+
61t 8
10189t 9 4769t 10 t 11
− + − (9.35)
11612160 58060800 332640
Example 9.3
Take the following initial valued problem of T GBE PD :
∂2 ∂ t x t 1
α φ ( x , t) = [φ ( x , t)] + φ x, φ , + φ( x , t),
∂x 2 2 2 2
t
∂x 2 (9.36)
φ (x , 0) = x , x , t ∈[0, 1], 0 < α ≤ 1.
∑φ (x, t)
k =0
k
∂2 k −1
t x t 1
= φ ( x , 0) − α−1 µ 2α α
2 [φk − 1 ( x , t)] +
∂ x
∑ ∂x∂ φ k − 1− j
2 2 2 2
x , φ j , + φk −1 ( x , t)
(9.37)
j=0
146 Mathematical Modeling for Intelligent Systems
By solving the recurrence relation equation (9.37), the first three iterative terms are
obtained as:
− α 1 2α
2 + xt
xtα 2
φ0 ( x , t) = x ; φ1 ( x , t) = ; φ2 ( x , t) = ;
α 2α 2
φ3 ( x , t) =
(
2 −3(α + 1) 3 2α + 1 + 2 2α + 1 + 8α + 4 xt 3α )
3α 3
In this consequence, the kth iterative solutions φk (t) for k ≥ 4 can be evaluated from equa-
tion (9.37). Thus sixth-order approximate solution for α = 1 is obtained as:
6
∑φ (x, t) = x 1 + t + t2! + t3! + t4! + t5! + 6!t
2 3 4 5 6
S6 ( x , t) = k (9.38)
k=0
∂ 2 ∂ t x t 1
α {φ ( x , t)} − µφ ( x , 0) − µ 2α α 2 [φ (x , t)] + φ x, φ , + φ (x , t) = 0
∂x ∂x
2 2 2 2
Nϕ (t ,ℵ) = Kα {ϕ ( x , t ;ℵ)} − xµ − µ 2α
∂ 2 ∂ t x t 1
× Kα 2 [ϕ ( x , t ;ℵ)] + ϕ x, ;ℵ ϕ , ;ℵ + ϕ ( x , t;ℵ) . (9.39)
∂x ∂x 2
2 2 2
Utilizing equation (9.39) in equation (9.19), we get the recursive formula to evaluate the
term φk ( x , t) for each k ≥ 1 :
φk ( x , t) = χ kφk − 1 ( x , t) + Kα−1 Pk (φk −1 ( x , t)) (9.40)
where
Pk (φk − 1 (t)) = Kα {φk − 1 (t)} − (1 − χ k )µφk −1 ( x, 0)
2 k −1
t x t 1
∂
+ µ 2α Kα 2 [φk − 1 ( x , t)] +
∂x ∑ ∂∂x φ k − 1− j
2 2 2 2
x , φ j , + φk − 1 ( x , t)
j=0
With the aid of Mathematica software, solve recurrence relation equation (9.40) for
φk ( x , t) for k ≥ 1. On solving the recurrence equation (9.40), the first three iterations are
obtained as follows:
Nonlinear Delayed Differential Equations 147
φ1 ( x , t) = −
xtα
; φ2 ( x , t) =
( )
2 −α − 2 2α + 2 xt 2α xtα xtα
− − ;
α α2 α α
2 −3α − 2 2 xt 2α 3α 2α +1
+ 2
+2 + 2( + 1)sinh(α log 4) + 2( + 1)cosh(α log 4)
α2
+ ( + 1)sinh(α log 4) ( sinh(α log 2)) + cosh(α log 2)
+
( 3 (− x) − 2 x)tα xtα
− +
( −
)
2 −α − 2 2α + 2 xt 2α xtα
α α α2 α
In this consequence, the kth iterative solutions φk (t) for k ≥ 4 can be evaluated from equa-
tion (9.40). Thus sixth-order approximate solution at = −1 is obtained as:
Example 9.4
In the last example consider the CTFPDEs as follows:
∂2 x t ∂ x t 1 ∂
t α φ ( x , t) = φ , φ , − φ ( x , t) − φ (x , t)
∂x 2 2 2 ∂ x 2 2 8 ∂x (9.41)
φ ( x , 0) = x , x , t ∈[0, 1], 0 < α ≤ 1.
2
∞ k ∂2
∑ φk ( x , t) = φ ( x, 0) − α−1 µ 2α α
∑ ∂x
φ
x t ∂
2 j
, φ
x t 1 ∂
, − φ
2 2 ∂ x k − j 2 2 8 ∂x k
( x , t) − φ k ( x , t )
k =0 j =0
(9.42)
148 Mathematical Modeling for Intelligent Systems
By solving the relation equations (9.42), the first three iterations are obtained as
φ0 ( x , t) = x 2 ; φ1 ( x , t) = −
x 2 tα
; φ 2 ( x , t) =
(
2 −α − 3 xt 2α 2α + 2α + 2 x − 2
;
)
α α2
φ 3 ( x , t) = −
( (
8−α − 2 t 3α 8α − 2α + 1 − 2 2α + 1 + 2 3α + 5 x 2 + 2α + 4 −2α + 4α − 2 x + 4 ) )
3α 3
In this consequence, the kth iterative solutions φk (t) for k ≥ 4 can be evaluated from equa-
tion (9.42). Thus sixth-order approximate solution for α = 1 is obtained as
6
∑φ (x, t) = x 1 − t + t2! − t3! + t4! − t5! + 6!t
2 3 4 5 6
S6 ( x , t) = k
2
k =0
∂2 x t ∂ x t 1 ∂
α {φ ( x , t)} − µφ ( x, 0) − µ 2α α 2 φ , φ , − φ ( x , t) − φ ( x , t) = 0
∂x
2 2 ∂x 2 2 8 ∂x
Nϕ (t ,ℵ) = Kα {ϕ ( x , t ;ℵ)} − x 2 µ − µ 2α Kα
∂2 x t ∂ x t 1 ∂
2 ϕ , ;ℵ ϕ , ;ℵ − ϕ ( x , t;ℵ) − ϕ ( x, t;ℵ) . (9.43)
∂x 2 2 ∂x 2 2 8 ∂x
Utilizing equation (9.43) in equation (9.19), we get the reclusive formula to evaluate the
term φk ( x , t) for each k ≥ 1 :
φk ( x , t) = χ kφk −1 ( x , t) + Kα−1 Pk (φk −1 ( x , t)) (9.44)
where
Pk (φk − 1 (t)) = Kα {φk − 1 (t)} − (1 − χ k )x 2 µ + µ 2α
k −1
∂2 x t ∂ x t 1 ∂
× Kα ∑
∂x 2 φ k − 1− j
2
,
2 ∂x
φj , −
2 2 8 ∂ x
φk − 1 ( x , t) − φk − 1 ( x , t)
j =0
With the aid of Mathematica software, solve recurrence relation equation (9.44) for
φk ( x , t) for k ≥ 1. On solving recurrence equation (9.44), the first three iterations are
obtained as follows:
Nonlinear Delayed Differential Equations 149
hx 2 tα h2 x 2 t 2α 2 −α − 2 h2 xt 2α h2 xt 2α h2 x 2 tα hx 2 tα
φ1 ( x , t) = ; φ2 ( x , t) = − + + + ;
α 2α 2 α2 8α 2 α α
3 x 2 tα 2 2 x 2 tα x 2 tα
φ3 ( x , t) = + +
α α α
2 −3α − 3 2 ( + 1)x cosh(α log 4) ( cosh(α log 2) + sinh(α log 2)) t 2α
+
α2
2 −3α −1 2 ( + 1)x 2 ( cosh(α log 8) + sinh(α log 8)) t 2α
+
α2
2 −3α − 3 2 ( + 1)x sinh(α log 4) ( cosh(α log 2) + sinh(α log 2)) t 2α
+
α2
+
(
2 −3α − 2 h3 x cosh 3 (α log 2) + sinh 3 (α log 2) t 3α )
3α 3
In this consequence, the kth iterative solutions φk (t) for k ≥ 4 can be evaluated from equa-
tion (9.44). Thus sixth-order approximate solution at and α = 1 reduces to
6
∑φ (x, t) = x 1 − t + t2! − t3! + t4! − t5! + 6!t
2 3 4 5 6
S6 ( x , t) = k
2
k =0
9.6 Conclusion
In this chapter, a comparative study for CTFPDEs with proportional delay has been made
by adopting two efficient techniques: New integral decomposition transform method
(IDTM) and optimal homotopy analysis NIT method (O HAITM). Specially, conform-
able time-fractional nonlinear nonhomogeneous pantograph-type integro-differential
equation and Burger equation with proportional delay along with two more problems are
effectively solved and analyzed via these two techniques. The findings from the graph-
ics and tables represent that the approximate solutions from both techniques agreed well
with the exact solution and the error decreases with increasing the order of iterations.
Moreover, (IDTM) converges faster than (O HAITM) but computational cost of (IDTM)
is higher than (O HAITM) for Examples 9.1 and 9.2. But for Examples 9.3 and 9.4 the solu-
tions obtained from IDTM and (O HAITM) for = −1 coincides. Although (O HAITM)
produces more accurate results in comparison to IDTM and existing results [19] at opti-
mal value of with higher computational cost.
TABLE 9.1
Approximate Solutions in k = 6th Order Results of Example 9.1
Absolute Error
For α = 0.8, 0.9 & 1 compared with exact result and absolute error in 6th order results obtained from O HAITM for
optimal value of ( = −1) and IDTM at distinct time levels 0 < t ≤ 1.
Nonlinear Delayed Differential Equations 151
TABLE 9.2
Approximate Solutions in k = 6th Order Results of Example 9.2
Absolute Error
For α = 0.8, 0.9 &1 compared with exact result and absolute error in 6th order results obtained from O HAITM for
= −1 and optimal value of ) and IDTM at distinct time levels 0 < t ≤ 1.
and 9.2c display the comparison of the absolute error in k = 6th order solution obtained from
IDTM and O HAITM. The findings show that the computed result obtained from both
techniques agreed well with the exact solution and the error decreases with increasing the
iterations. It can also be depicted from table that IDTM converges faster than O HAITM
but the computational cost of IDTM is much higher than O HAITM for Examples 9.1
and 9.2.
Tables 9.3 and 9.4 report approximate solutions obtained from O HAITM at = −1 and
at the optimal value = −1.1240 for different values of α = 0.8, 0.9,1 and exact solution at
α = 1. In addition, absolute error in sixth-order results computed from IDTM and
O HAITM & comparison with [19] at different time levels also reported in table.
Figures 9.3a and 9.4a depict the behavior of sixth-order results for different α = 0.8, 0.9,1;
Figures 9.3b and 9.4b show 3D plots of the absolute error for α = 1 in kth order results (k = 4,
5, 6); Figures 9.3c and 9.4c show the two-dimensional plots of the absolute error for α = 1 in
kth order results (k = 4, 5, 6); Figures 9.3d and 9.4d display the comparison of absolute error
in k = 6th order solution obtained from IDTM and O HAITM.The finding shows that the
computed result obtained from both techniques agreed well with the exact solution and
the error decreases with increasing the iterations. It can also be depicted from table that
the solutions obtained from IDTM and O HAITM for -coincides but at optimal value of
absolute error in k = 6th order solution decrease more rapidly than IDTM and ERCDTM
[19]. Also, computational cost of O HAITM is higher than IDTM for Examples 9.3 and 9.4.
152 Mathematical Modeling for Intelligent Systems
(a)
(b)
(c)
FIGURE 9.1
(a) 2D plots of the behavior k = 6th order results for α = 0.8, 0.9, 1 and exact result in t ∈(0, 1) for Example 9.1.
(b) Absolute error plot for kth iterative (k = 4, 5, 6) results for Example 9.1. (c) Comparison in absolute error for
k = 6th order iterative results obtained from both techniques in Example 9.1.
Nonlinear Delayed Differential Equations 153
(a)
(b)
(c)
FIGURE 9.2
(a) 2D plots of the behavior k = 6th order results for α = 0.8, 0.9, 1 and exact result in t ∈(0, 1) for Example 9.2.
(b) Absolute error plot for kth iterative (k = 4, 5, 6) results for Example 9.2. (c) Comparison in absolute error for
k = 6th order iterative results obtained from both techniques in Example 9.2.
154 Mathematical Modeling for Intelligent Systems
TABLE 9.3
Approximate Solution in k = 6th Order Results of Example 9.3
Absolute Error
For α = 0.8, 0.9 & 1 and comparison of absolute error from IDTM and O HAITM in M = 6th order results with
ERC-DTM [19] at distinct time levels 0 < x ≤ 1 and 0 < t ≤ 1.
TABLE 9.4
Approximate Solution in k = 6th order Results of Example 9.4
Absolute Error
For α = 0.8, 0.9 & 1 and comparison of absolute error obtained from IDTM and O HAITM in k = 6th order results
with [19] at distinct time levels 0 < x ≤ 1 and 0 < t ≤ 1.
Nonlinear Delayed Differential Equations 155
(a)
(b)
(c)
(d)
FIGURE 9.3
(a) 2D plots of the behavior k = 6th order results for α = 0.8, 0.9, 1 and exact result in t ∈(0, 1) for Example 9.3.
(b) 3D plots of the behavior k = 6th order results for α = 0.8, 0.9, 1 and exact result in x , t ∈ (0, 1) for Example 9.3.
(c) Absolute error plot for kth iterative (k = 4, 5, 6) results for Example 9.3. (d) Comparison in absolute error for
k = 6th order iterative results obtained from both techniques for x = 0.5 and t ∈(0, 1) in Example 9.3.
156 Mathematical Modeling for Intelligent Systems
(a)
(b)
(c)
(d)
FIGURE 9.4
(a) 2D plots of the behavior k = 6th order results for α = 0.8, 0.9, 1 and exact result in t ∈(0, 1) for Example 9.4.
(b) 3D plots of the behavior k = 6th order results for α = 0.8, 0.9, 1 and exact result in x , t ∈ (0, 1) for Example 9.4.
(c) Absolute error plot for kth iterative (M = 4, 5, 6) results for Example 9.4. (d) Comparison in absolute error for
k = 6th order iterative results obtained from both techniques for x = 0.5 and t ∈(0, 1) in Example 9.4.
Nonlinear Delayed Differential Equations 157
Acknowledgments
The authors are obliged to the editor and reviewers for their advice & instructions. S.
Agrawal thanks to BBA University, Lucknow, India for their economic support to perform
her research article.
References
1. Miller, K. S., Ross, B., An Introduction to the Fractional Calculus and Fractional Differential Equations,
Wiley, New York (1993).
2. Podlubny, I., Fractional Differential Equations, Academic Press, San Diego (1999).
3. Caputo, M., Mainardi, F., Linear models of dissipation in anelastic solids, Rivista del Nuovo
Cimento, 1 (1971) 161–98.
4. He, J.H., Nonlinear oscillation with fractional derivative and its applications. In International
Conference on Vibrating Engineering (1998) 288–291.
5. Burgers, J.M., A mathematical model illustrating the theory of turbulence, Adv. Appl. Mech. 1
(1948) 171–199.
6. Duan, Y., Tian, P., Zhang, S., Oscillation and stability of nonlinear neutral impulsive delay dif-
ferential equations, J. Appl. Math. Comput. 11 (2003) 243–253.
7. Jordan, P.M., A note on Burgers’ equation with time delay: Instability via finite-time blow-up,
Phys. Lett. A 372 (2008) 6363–6367.
8. Kolmanovskii, V., Myshkis, A., Introduction to the theory and applications of functional dif-
ferential equations, 1999.
9. Ockendon, J.R., Tayler, A.B., The dynamics of a current collection system for an electric loco-
motive, Proc. R. Soc. Lond. Ser. A. 322(1971) 447–468.
10. Khalil, R., Al Horani, M., Yousef, A., Sababheh, M., A new definition of fractional derivative, J.
Comput Appl Math, 264 (2014) 65–70. doi: 10.1016/j.cam.2014.01.002
11. Lio, S., The proposed homotopy analysis techniques for the solution of nonlinear problems
(Ph.D. Thesis), Shanghai Jiao Tong University, Shanghai (1992).
12. Liao, S., Homotopy Analysis Method in Nonlinear Differential Equations, Springer, Heidelberg,
Dordrecht, London (2012).
13. Iyiola, O. S., Tasbozan, O., Kurt, A., Çenesiz, Y., On the analytical solutions of the system of con-
formable time-fractional Robertson equations with 1-D diffusion, Chaos, Solitons and Fractals 94
(2017), 1–7. doi: 10.1016/j.chaos.2016.11.003.
14. Kumar, S., Kumar, A., Baleanu, D., Two analytical methods for time fractional nonlinear cou-
pled Boussinesq Burger’s equations arise in propagation of shallow water waves, Nonlinear
Dyn. 85 (2) (2016) 699–715.
15. Zurigat, M., Momani, S., Odibat, Z., Alawneh, A., The homotopy analysis method for handling
systems of fractional differential equations, Appl. Math. Model. 34 (2010) 24–35.
16. Ray, S.S., Patra, A., Application of homotopy analysis method and adomian decomposition
method for the solution of neutron diffusion equation in the hemisphere and cylindrical reac-
tors, J. Nucl. Eng. Technol. 1 (2011) 1–12.
17. Cenesiz, Y., Kurt, A., Tasbozan, O., On the new solutions of the conformable time fractional
generalized hirota-satsuma coupled KdV system, Ann. West Univ. Timisoara-Math. Comput. Sci.
1 (2017) 37–49. doi: 10.1515/awutm–2017–0003
18. Saad, K.M., Al-Shareef, E.H., Mohamed, M.S., Yang, X.-J., Optimal q-homotopy analysis
method for time-space fractional gas dynamics equation, Eur. Phys. J. Plus 132 (2017) 23.
158 Mathematical Modeling for Intelligent Systems
19. Singh, B.K., Agrawal, S., A new approximation of conformable time fractional partial differ-
ential equations with proportional delay, App. Numer. Math. 157(2020) 419–433. doi: 10.1016/j.
apnum.2020.07.001
20. Thabet, H., Kendre, S., Analytical solutions for conformable space-time fractional partial dif-
ferential equations via fractional differential transform, Chaos Solitons Fractals 109 (2018) 238–
245. doi: 10.1016/j.chaos.2018.03.001
21. Abdeljawad, T., On conformable fractional calculus, J. Comput. Appl. Math. 279 (2015) 57–66.
doi: 10.1016/j.cam.2014.10.016.
22. Kashuri, A., Fundo, A., A new integral transform, Adv. Theor. Appl. Math. 8(1) (2013) 27–43.
23. Singh, B.K., Homotopy perturbation new integral transform method for numeric study of
spaceand time- fractional (n+1)-dimensional heatand wave-like equations, Waves Wavelets
Fractals 4 (2018) 19–36. doi: 10.1515/wwfaa–2018–0003
24. Shah, K., Twinkle, S., Kilicman, A., Combination of integral and projected differential trans-
form methods for time-fractional gas dynamics equations, Ain Shams Eng. J. 9(4) (2017) 1683–
1688. doi: 10.1016/j.asej.2016.09.012
25. Khan, H., Khan, A., Chen, W., Shah, K., Stability analysis and a numerical scheme for fractional
Klein-Gordon equations, Math Methods Appl. Sci. 42 (2019) 723–732. doi: 10.1002/mma.5375
26. Smardal, Z., Diblikl, J., Khan, Y., Extension of the differential transformation method to non-
linear differential and integro-differential equations with proportional delays, Adv. Differ.
Equ. 2013 (2013) 1–12.
10
Numerical Treatment on the Convective
Instability in a Jeffrey Fluid Soaked
Permeable Layer with Through-Flow
Dhananjay Yadav
University of Nizwa
U. S. Mahabaleshwar
Davangere University
Krishnendu Bhattacharyya
Banaras Hindu University
CONTENTS
10.1 Introduction ........................................................................................................................ 159
10.2 Mathematical Model.......................................................................................................... 160
10.2.1 Basic State ................................................................................................................ 162
10.3 Stability Analysis ............................................................................................................... 162
10.4 Procedure of Solution ........................................................................................................ 163
10.5 Outcomes and Discussion ................................................................................................ 163
10.6 Conclusions......................................................................................................................... 166
Acknowledgments ...................................................................................................................... 166
References..................................................................................................................................... 167
10.1 Introduction
Convective instability is a phenomenon that frequently occurs in a horizontal layer of fluid
warmed from the bottom. Due to heat from the bottom, the density of the bottom fluid
decreases, so buoyancy force drives the less-dense fluid upward in the direction of the
colder end of the plate [1–4]. In the meantime, the colder fluid at the top is denser, so it goes
down and substitutes the hot fluid. This convective instability problem in a layer of liquid-
soaked permeable media has been extensively explored by numerous investigators in the
past as current because of its significant applications in various areas, like geosciences
(geothermal basins, geological carbon repository), astrophysics (pore-liquid convective
10.2 Mathematical Model
The physical setup engages a horizontal Jeffrey fluid flooded permeable layer bounded by
restrictions at z = 0 and z = d as exposed in Figure 10.1. The base boundary is mentioned
at an identical temperature T0 + ∆T, while the top boundary is kept at a temperature T0.
Numerical Treatment on the Convective Instability 161
FIGURE 10.1
Graphic representation of the considered problem.
The layer is activated by a uniform upward throughflow q0 and the gravity which pro-
ceeds in the reverse z-pathway. The Darcy law is expanded to comprise the viscoelasticity
of the Jeffrey fluid and the Boussinesq finding is employed for density digressions. The
pertinent governing equations are [5,44,46]:
∇ ⋅ q = 0, (10.1)
µK
∇P + q = ρ0 1 − βT (T − T0 ) g , (10.2)
(1 + η )
∂T
γ + (q ⋅ ∇ ) T = α∇ 2T , (10.3)
∂t
w = q0 , T = T0 +∆T , at z = 0 and w = q0 , T = T0 , at z = d. (10.4)
where q ( u, v , w ) means the velocity vector, t corresponds to the time, ρ0 represents the
reference density at T = T0 , K and α are the permeability and the thermal diffusivity of
the permeable medium, correspondingly, βT illustrates the heat expansion coefficient, P
designates the pressure, γ characterizes the heat capacity fraction, η symbolizes the Jeffrey
parameter and described by the fraction of relaxation to retardation instants, and µ denotes
the viscosity of the Jeffrey liquid.
The following scaling is used to get the nondimensional formulation of the problem:
x tα qd PK T − T0
x → , t → 2 , q = , P= ,T= , (10.5)
d γd α µα ∆T
⋅ q = 0,
∇ (10.6)
q
(1 + η )
= −∇ ( 0 )
P + zR ρ eˆ z + R T T eˆ z , (10.7)
∂T
∂t
(
+ q ⋅ ∇ ) 2T ,
T = ∇ (10.8)
ρ0 g Kd ρ0 βT g∆TKd
Here, R ρ0 = (density Rayleigh–Darcy number), R T = (Rayleigh–Darcy
µα µα
q0 d
number), and Pe = (Péclet number).
α
10.2.1 Basic State
It is believed that the basic status of affairs to be steady and fully developed in the upright
z—direction as q b = ( 0, 0, Pe ) and Tb = Tb ( z ) . Then, from the equations (10.8) and (10.9), the
basic temperature field is found as:
e Pe − e Pez
Tb = Pe . (10.10)
e −1
10.3 Stability Analysis
For stability analysis, we disturb the basic state by very small amplitude disturbances as
Here prime denotes the perturbed nondimensional variables and φ << 1. Replacing equa-
tion (10.11) into equations.(10.6)–(10.9) with the basic state results and eliminating the pres-
sure term from equation (10.7), we have the stability equations as:
2 w ′
∇ 2 T ′,
=R ∇ (10.12)
(1 + η ) T H
∂T ′
∂t
(
+ q ′ ⋅ ∇ ) ( T ′ = ∇
Tb + q b ⋅ ∇
) 2T ′. (10.13)
w ′ = 0, T ′ = 0, at z = 0,1. (10.14)
2 2
Here ∇ 2H = ∂ + ∂ . By means of the normal modes [1, 49–58], the perturbed variables
∂x 2 ∂ y 2
can be taken as:
w ′ W ( z )
= exp iλ x x + iλ y y + ω t. (10.15)
T ′ Θ ( z )
where λ x and λ y are the wave numbers in the x and y directions, respectively and ω is the
growth rate of instability. On using equation (10.15) into equations (10.12)–(10.14), we have:
(D2 − λ 2 )W + (1 + η )λ 2 RT Θ = 0, (10.16)
dT
− b W + D2 − λ 2 − ω − PeDΘ
= 0, (10.17)
dz
Numerical Treatment on the Convective Instability 163
W = Θ = 0, at z = 0,1. (10.18)
d
where ≡ D and λ = λ x 2 + λ y 2 is the resulting dimensionless wave number.
dz
10.4 Procedure of Solution
The resulting system of equations (10.16)–(10.18) are solved with high numerical correct-
ness by utilizing the higher-order Galerkin process. Thus, we assumed as
n N
W= ∑
p=1
Ep sin pπ z and Θ = ∑ F sin pπ z (10.19)
p=1
p
where Ep and Fp are undisclosed coefficients. Exploiting equation (10.19) into equations
(10.16) and (10.17) and using the orthogonal properties, we have
G jp Ep + H jp Fp = 0,
(10.20)
I jp Ep + J jp Fp = ω K jp Fp .
J jp = DΘ j DΘ p − λ Θ j Θ p − PeΘ j DΘ p , K jp = Θ j Θ p , where AB =
2
∫ ABdz.
0
The above arrangement of equation (10.20) is a generalized eigenvalue condition and
resolved in MATLAB® exploiting QZ algorithm, EIG function and Newton’s routine. The
pattern of the convective activity is stationary for an investigated problem.
TABLE 10.1
Contrast of RT , c and λc with Pe in the Nonexistence of η
Present Study Yadav [20]
Pe RT , c λc RT , c λc
0 39.478 3.14 39.478 3.142
0.5 39.826 3.15 39.827 3.151
1.0 40.873 3.18 40.873 3.179
1.5 42.621 3.23 42.621 3.225
2.0 45.071 3.29 45.071 3.292
FIGURE 10.2
The impact of Péclet number Pe on neutral stability curves at η = 0.4.
FIGURE 10.3
The effect of Jeffrey parameter η on neutral stability diagrams at Pe = 0.5.
Figures 10.2 and 10.3 show the neutral stability diagrams in the ( RT , λ )-plane for diverse
estimates of Péclet number Pe and the Jeffrey parameter η , respectively, using two-term
Galerkin method. The neutral stability graphs provide the threshold among the stability
and instability. The smallest of the neutral stability diagrams gives the critical assessments
of RT and λ which are indicated by RT ,c and λc, correspondingly. The physical significance
of the critical assessments is that the system will be stable for RT < RT ,c .
Numerical Treatment on the Convective Instability 165
FIGURE 10.4
Digression of R T , c with Pe for diverse estimates of η .
TABLE 10.2
Estimation of the RT , c and λc for Diverse Estimates of Pe and η
Pe η RD , c ac Pe η RD , c ac
0 0 39.478 3.14 1.5 0 42.621 3.23
0.2 32.899 3.14 0.2 35.518 3.23
0.4 28.199 3.14 0.4 30.444 3.23
0.6 24.674 3.14 0.6 26.638 3.23
0.8 21.932 3.14 0.8 23.678 3.23
1 19.739 3.14 1 21.311 3.23
0.5 0 39.827 3.15 2.0 0 45.071 3.29
0.2 33.189 3.15 0.2 37.559 3.29
0.4 28.448 3.15 0.4 32.194 3.29
0.6 24.892 3.15 0.6 28.169 3.29
0.8 22.126 3.15 0.8 25.039 3.29
1 19.913 3.15 1 22.536 3.29
1.0 0 40.873 3.18 2.5 0 48.220 3.38
0.2 34.061 3.18 0.2 40.183 3.38
0.4 29.195 3.18 0.4 34.443 3.38
0.6 25.546 3.18 0.6 30.137 3.38
0.8 22.707 3.18 0.8 26.789 3.38
1 20.437 3.18 1 24.110 3.38
Figure 10.4 shows the disparity of the critical Rayleigh–Darcy number R T ,c with a varia-
tion of Péclet number Pe for assorted estimates of the Jeffrey parameter η . The outcomes
are also listed in Table 10.2. The corresponding critical wave number λc is presented in
Figure 10.5. From Figure 10.4, it is established that on increasing the worth of Pe, the
assessment of R T ,c boosts. Thus, the effect of Pe is to postponement the start of convective
movement. This came about because the throughflow transports the imperative warmth
166 Mathematical Modeling for Intelligent Systems
FIGURE 10.5
Digression of λc with Pe for diverse values of η .
gradient into a thermal boundary layer at the boundary toward which it is implemented.
From Figure 10.4, we can also find that the stability of the system decreases with raising
the Jeffery parameter λ . This is because increasing value of Jeffery parameter η reduces the
retardation time of Jeffery fluid, thus making the system more unstable.
From Figure 10.5, it is found that the worth of λc enlarges with an increase in the values
of Pe. Thus, Pe reduces the magnitude of convective cells, whereas the Jeffery parameter η
has no major control on λc.
10.6 Conclusions
The influence of throughflow is analyzed on the convective movement in a Jeffrey fluid-
saturated permeable layer numerically. The following conclusions are made:
Increasing Péclet number Pe increases the critical Rayleigh–Darcy number R T ,c. Thus, it
postpones the onset of convective instability by increasing R T ,c.
The arrangement becomes more unstable with escalating Jeffrey parameter η .
The size of convective cell shrinks with Pe, while the Jeffrey parameter η has no effect
on it.
Acknowledgments
This study was supported by the University of Nizwa Research Grant (Grant No.: A/2021-
2022-UoN/3/CAS/IF), the Sultanate of Oman.
Numerical Treatment on the Convective Instability 167
References
1. Chandrasekhar S., Hydrodynamic and hydromagnetic stability. Dover Publication, New York, (2013).
2. Banzhaf, W., Self-organizing systems, in: R.A. Meyers (Ed.) Encyclopedia of physical science and
technology (Third Edition), Academic Press, New York (2003) 589–598.
3. Chandrasekhar, S., Thermal convection, Daedalus, 86(4) (1957) 323–339.
4. Kadanoff, L. P., Turbulent heat flow: structures and scaling, Physics Today, 54(8) (2001) 34–39.
5. Nield, D.A., Bejan, A., Convection in porous media, Springer (2006).
6. Capone, F., Gentile, M., Massa, G., The onset of thermal convection in anisotropic and rotat-
ing bidisperse porous media, Zeitschrift für angewandte Mathematik und Physik, New York, 72(4)
(2021) 1–16.
7. Xu, X., Chen, S., Zhang, D., Convective stability analysis of the long-term storage of carbon
dioxide in deep saline aquifers, Advances in Water Resources, 29(3) (2006) 397–407.
8. Pozzoni, P., Di Filippo, S., Manzoni, C., Locatelli, F., The relevance of convection in clinical
practice: a critical review of the literature, Hemodialysis International, 10 (2006) S33–S38.
9. Zhang, K., Liao, X., Schubert, G., Pore water convection within carbonaceous chondrite par-
ent bodies: Temperature-dependent viscosity and flow structure, Physics of Fluids, 17(8) (2005)
086602.
10. Kim, M. C., Yadav, D., Linear and nonlinear analyses of the onset of buoyancy-induced insta-
bility in an unbounded porous medium saturated by miscible fluids, Transport in Porous Media,
104(2) (2014) 407–433.
11. G. Higgins, A new concept for in situ coal gasification: Livermore, Ca, Univ. Ca., Lawrence
Livermore Lab., Rept. UCRL-51217, (1972).
12. Sherwood, A., Homsy, G. M., Convective instability during in situ coal gasification, Lawrence
Livermore Laboratory (1975).
13. Nield, D., Convective instability in porous media with throughflow, AIChE Journal, California,
33(7) (1987) 1222–1224.
14. Chen, F., Throughflow effects on convective instability in superposed fluid and porous layers,
Journal of Fluid Mechanics, 231 (1991) 113–133.
15. Nield, D., Kuznetsov, A., The onset of convection in a layered porous medium with vertical
throughflow, Transport in Porous Media, 98(2) (2013) 363–376.
16. Hill, A. A., Unconditional nonlinear stability for convection in a porous medium with vertical
throughflow, Acta Mechanica, 193(3) (2007) 197–206.
17. Hill, A. A., Rionero, S., Straughan, B., Global stability for penetrative convection with through-
flow in a porous material, IMA Journal of Applied Mathematics, 72(5) (2007) 635–643.
18. Yadav, D. The influence of pulsating throughflow on the onset of electro-thermo-convection
in a horizontal porous medium saturated by a dielectric nanofluid, Journal of Applied Fluid
Mechanics, 11(6) (2018) 1679–1689.
19. Yadav, D., Throughflow and magnetic field effects on the onset of convection in a Hele Shaw
cell, Revista Cubana de Física, 35(2) (2018) 108–114.
20. Yadav, D., Numerical investigation of the combined impact of variable gravity field and
throughflow on the onset of convective motion in a porous medium layer, International
Communications in Heat and Mass Transfer, 108 (2019) 104274.
21. Yadav, D., The effect of pulsating throughflow on the onset of magneto convection in a layer
of nanofluid confined within a Hele-Shaw cell, Proceedings of the Institution of Mechanical
Engineers, Part E: Journal of Process Mechanical Engineering, 233(5) (2019) 1–12.
22. Shankar, B., Shivakumara, I., Stability of porous-Poiseuille flow with uniform vertical through-
flow: High accurate solution, Physics of Fluids, 32(4) (2020) 044101.
23. Shankar, B., Shivakumara, I., Changes in the hydrodynamic stability of plane porous-Couette
flow due to vertical throughflow, Physics of Fluids, 33(7) (2021) 074103.
168 Mathematical Modeling for Intelligent Systems
24. Shankar, B., Shivakumara, I., Instability of natural convection in a vertical fluid layer with net
horizontal throughflow, Zeitschrift für angewandte Mathematik und Physik, 72(3) (2021) 1–17.
25. Brevdo, L., M.S. Ruderman, On the convection in a porous medium with inclined temperature
gradient and vertical throughflow. Part I. Normal modes, Transport in Porous Media, 80(1) (2009)
137–151.
26. Kiran, P., Nonlinear throughflow and internal heating effects on vibrating porous medium,
Alexandria Engineering Journal, 55(2) (2016) 757–767.
27. Ahmad, K., Hanouf, Z., Ishak, A., Mixed convection Jeffrey fluid flow over an exponentially
stretching sheet with magnetohydrodynamic effect, AIP Advances, 6(3) (2016) 035024.
28. Bhatti, M., Abbas, A., Simultaneous effects of slip and MHD on peristaltic blood flow of Jeffrey
fluid model through a porous medium, Alexandria Engineering Journal, 55(2) (2016) 1017–1023.
29. Hayat, T., Qayyum, S., Imtiaz, M., Alsaedi, A., Impact of Cattaneo-Christov heat flux in Jeffrey
fluid flow with homogeneous-heterogeneous reactions, PLoS One, 11(2) (2016) e0148662.
30. Javed, M., Farooq, M., Anjum, A., Ahmad, S., Insight of thermally stratified Jeffrey fluid flow
inside porous medium subject to chemical species and melting heat transfer, Advances in
Mechanical Engineering, 11(9) (2019) 1687814019876187.
31. Kahshan, M., Lu, D., Siddiqui, A., A Jeffrey fluid model for a porous-walled channel: Application
to flat plate dialyzer, Scientific Reports, 9(1) (2019) 1–18.
32. Krishna, M. V., Bharathi, K., Chamkha, A. J., Hall effects on MHD peristaltic flow of Jeffrey
fluid through porous medium in a vertical stratum, Interfacial Phenomena and Heat Transfer, 6(3)
(2018) 253–268.
33. Naganthran, K., Nazar, R., Pop, I., Effects of heat generation/absorption in the Jeffrey fluid past
a permeable stretching/shrinking disc, Journal of the Brazilian Society of Mechanical Sciences and
Engineering, 41(10) (2019) 1–12.
34. Nallapu, S., Radhakrishnamacharya, G., Jeffrey fluid flow through porous medium in the
presence of magnetic field in narrow tubes, International Journal of Engineering Mathematics,
2014 (2014) 713831.
35. Narayana, P. S., Babu, D. H., Numerical study of MHD heat and mass transfer of a Jeffrey fluid
over a stretching sheet with chemical reaction and thermal radiation, Journal of the Taiwan
Institute of Chemical Engineers, 59 (2016) 18–25.
36. Noor, N A., Shafie, M. S., Admon, M. A., Unsteady MHD squeezing flow of Jeffrey fluid in a
porous medium with thermal radiation, heat generation/absorption and chemical reaction,
Physica Scripta, 95(10) (2020) 105213.
37. Ojjela, O., Raju, A., Kumar, N. N., Influence of induced magnetic field and radiation on free
convective Jeffrey fluid flow between two parallel porous plates with Soret and Dufour effects,
Journal of Mechanics, 35(5) (2019) 657–675.
38. Santhosh, N., Radhakrishnamacharya, G., Chamkha, A. J., Flow of a Jeffrey fluid through a
porous medium in narrow tubes, J. Porous Media, 18(1) (2015) 71–78.
39. Vajravelu, K., Sreenadh, S., Lakshminarayana, P., The influence of heat transfer on peristaltic
transport of a Jeffrey fluid in a vertical porous stratum, Communications in Nonlinear Science and
Numerical Simulation, 16(8) (2011) 3107–3125.
40. Nazeer, M., Hussain, F., Ahmad, M. O., Saeed, S., Khan, M. I., Kadry, S., Chu, Y.-M., Multi-phase
flow of Jeffrey Fluid bounded within magnetized horizontal surface, Surfaces and Interfaces, 22
(2021) 100846.
41. Khan, A., Rafaqat, A. R., Effects of radiation and MHD on compressible Jeffrey fluid with peri-
stalsis, Journal of Thermal Analysis and Calorimetry, 143(3) (2021) 2775–2787.
42. Mehboob, H., Maqbool, K., Ellahi, R., Sait, S. M., Transport of Jeffrey fluid in a rectangular
slit of the microchannel under the effect of uniform reabsorption and a porous medium,
Communications in Theoretical Physics, 73(11) (2021) 115003.
43. Ali, F., Hou, Y., Zahid, M., Rana, M. A., Usman, M., Influence of magnetohydrodynamics and
heat transfer on the reverse roll coating of a Jeffrey fluid: A theoretical study, Journal of Plastic
Film & Sheeting, 38(1) (2022) 72–104.
Numerical Treatment on the Convective Instability 169
44. Gautam, P. K., Rana, G. C., Saxena, H., Stationary convection in the electrohydrodynamic ther-
mal instability of Jeffrey nanofluid layer saturating a porous medium: free-free, rigid-free, and
rigid-rigid boundary conditions, Journal of Porous Media, 23(11) (2020) 1043–1063.
45. Yadav, D., Thermal non-equilibrium effects on the instability mechanism in a non-Newtonian
Jeffery fluid saturated porous layer, Journal of Porous Media, 25(2) (2022) 1–12.
46. Yadav, D., Influence of anisotropy on the Jeffrey fluid convection in a horizontal rotary porous
layer, Heat Transfer, 50(5) (2021) 4595–4606.
47. Yadav, D., Electric field effect on the onset of Jeffery fluid convection in a heat generating
porous medium layer, Pramana - Journal of Physics, 96, 19, (2022).
48. Yadav, D., Mohamad, A. A., Awasthi, M. K., The Horton–Rogers–Lapwood problem in a Jeffrey
fluid influenced by a vertical magnetic field, Proceedings of the Institution of Mechanical Engineers,
Part E: Journal of Process Mechanical Engineering, 235(6) (2021) 2119–2128.
49. Akbarzadeh, P., Mahian, O., The onset of nanofluid natural convection inside a porous layer
with rough boundaries, Journal of Molecular Liquids, 272 (2018) 344–352.
50. Alex, S. M., Patil, P. R., Effect of variable gravity field on Soret driven thermosolutal convec-
tion in a porous medium, International Communications in Heat and Mass Transfer, 28(4) (2001)
509–518.
51. Awad, F., Sibanda, P., Motsa, S. S., On the linear stability analysis of a Maxwell fluid with
double-diffusive convection, Applied Mathematical Modelling, 34(11) (2010) 3509–3517.
52. Banu, N., Rees, D., Onset of Darcy–Benard convection using a thermal non-equilibrium model,
International Journal of Heat and Mass Transfer, 45(11) (2002) 2221–2228.
53. Capone, F., Gentile, M., Hill, A. A., Penetrative convection via internal heating in anisotropic
porous media, Mechanics Research Communications, 37(5) (2010) 441–444.
54. Yadav, D., Mohamad, A., Rana, G., Effect of throughflow on the convective instabilities in an
anisotropic porous medium layer with inconstant gravity, Journal of Applied and Computational
Mechanics, 7(4) (2020) 1964–1972.
55. Yadav, D., Effects of rotation and varying gravity on the onset of convection in a porous
medium layer: A numerical study, World Journal of Engineering, 17(6) (2020) 785–793.
56. Yadav, D., Maqhusi, M., Influence of temperature dependent viscosity and internal heating
on the onset of convection in porous enclosures saturated with viscoelastic fluid, Asia‐Pacific
Journal of Chemical Engineering, 15(6) (2020) e2514.
57. Yadav, D., Numerical solution of the onset of Buoyancy‐driven nanofluid convective motion
in an anisotropic porous medium layer with variable gravity and internal heating, Heat
Transfer—Asian Research, 49(3) (2020) 1170–1191.
58. Yadav, D., The density-driven nanofluid convection in an anisotropic porous medium layer
with rotation and variable gravity field: A numerical investigation, Journal of Applied and
Computational Mechanics, 6(3) (2020) 699–712.
11
Computational Modeling of Nonlinear
Reaction-Diffusion Fisher–KPP Equation
with Mixed Modal Discontinuous Galerkin Scheme
Satyvir Singh
Nanyang Technological University
CONTENTS
11.1 Introduction ........................................................................................................................ 171
11.2 Mixed Modal Discontinuous Galerkin Scheme ............................................................ 173
11.3 Numerical Results.............................................................................................................. 176
11.4 Concluding Remarks ......................................................................................................... 181
Acknowledgements .................................................................................................................... 182
References..................................................................................................................................... 182
11.1 Introduction
It is constantly difficult for researchers to simulate nonlinear partial differential equations
(PDEs) since these nonlinear PDEs are utilized to solve several challenging problems that
occurred in science, nature, engineering, and other fields. For example, Cahn–Hilliard PDE
in material sciences; nonlinear Schrödinger PDE sinquantum mechanics; nonlinear reac-
tion–diffusion PDEs in biology; Euler and Navier–Stokes PDEs in fluid dynamics (Zheng,
2004), Schrödinger/Gross–Pitaevskii and Klein–Gordon–Zakharov PDEs (Dehghan and
Abbaszadeh, 2018), generalized Zakharov and Gross–Pitaevskii PDEs (Dehghan and
Abbaszadeh, 2017) are several illustrious examples of the nonlinear PDEs. Many scholars
have spent decades trying to find effective numerical methods for solving nonlinear PDEs.
The purpose of this chapter is to describe an efficient numerical technique based on modal
discontinuous Galerkin (DG) method for simulating nonlinear reaction–diffusion PDEs in
two dimensions.
A nonlinear reaction–diffusion model was introduced by Fisher (1937) and Kolmogorov
(1937) autonomously to delineate the propagation of a mutant gene across a population.
This model is commonly referred to as the Fisher or Fisher–Kolmogorov–Petrovsky–
Piscounov (Fisher–KPP) equation in the literature. This Fisher–KPP equation has since
been applied in a variety of fields of research, most notably biological applications. The
Fisher–KPP equation, for example, can be used to represent the logistic growth of coral
reefs (Roessler and Hüssner, 1997) and the stirrings of neutrons in a nuclear reactor (José,
1969). The mathematical expression of the Fisher–KPP equation is given by
∂w
= ∇ ⋅ ( λ∇w ) + µ f ( w ) , (11.1)
∂T
∂w
= λ1 wXX + λ2 wYY + µ w ( 1 − w ) . (11.2)
∂T
On rescaling X , Y and T as
µ µ
t = µT , x= X , and y = Y, (11.3)
λ1 λ2
∂w
= λ1 wxx + λ2 wyy + µ w ( 1 − w ) , (11.4)
∂t
Battiato, 2021a; Singh and Battiato, 2021b; Singh et al., 2021; Singh, 2021a; Singh, 2021b;
Singh, 2021c). The DG approaches have several key characteristics that make them interest-
ing for usage in applications. These characteristics include their capacity to easily address
complex geometry and boundary conditions, their flexibility for easy hp-adaptivity, their
ability for nonconforming elements having hanging nodes, and efficient parallel imple-
mentation along with time-stepping algorithms.
This study presents a two-dimensional mixed modal DG scheme different from previous
studies for solving the nonlinear Fisher–KPP equations. The third-order scaled Legendre
polynomials are adopted for DG spatial discretization, while a third-order Strong Stability
Preserving Runge–Kutta (SSP-RK33) scheme is employed for a temporal marching algo-
rithm is utilized to temporally discretize the emerging semi-discrete differential equation.
The accuracy and efficiency of the proposed algorithm are evaluated by solving four well-
known Fisher–KPP test problems.
∂w
+ ∇F ( ∇w ) = S ( w ) , (11.5)
∂t
w − ∇Θ = 0,
∂w (11.6)
+ ∇F ( Θ ) = S ( w ) .
∂t
xL = x1/2 < x3/2 < ⋅ ⋅ ⋅ ⋅ ⋅ < xi−1/2 < xi+1/2 < ⋅ ⋅ ⋅ ⋅ ⋅ < xN +1/2 = xR ,
(11.7)
y B = y1/2 < y 3/2 < ⋅ ⋅ ⋅ ⋅ ⋅ < y j−1/2 < y j+1/2 < ⋅ ⋅ ⋅ ⋅ ⋅ < y N +1/2 = yU .
174 Mathematical Modeling for Intelligent Systems
{
ℑ := Tij = I i × J j , 1 ≤ i ≤ N x , 1 ≤ j ≤ N y , }
I i := [ xi−1/2 , xi+1/2 ] , ∀i = 1 ⋅ ⋅ ⋅ ⋅ ⋅ N x ; (11.8)
J j := y j−1/2 , y j+1/2 , ∀j = 1 ⋅ ⋅ ⋅ ⋅ ⋅ N y .
( ) ( ( ) )
where xi , y j = ( xi−1/2 + xi+1/2 ) 2 , y j−1/2 + y j+1/2 2 denotes the cell-center points of the
elements. In the case of Ω x − domain, the piecewise polynomial space of the functions
ξ : Ω x → ℜ is defined as
{
Zhk = ξ : ξ |Ωx ∈ k ( I i ) , i = 1 ⋅ ⋅ ⋅ ⋅ ⋅ N x , } (11.9)
where k ( I i ) is the space of polynomial functions of degree at most k on I i . For the domain
Ω = Ω x × Ω y , it is defined ϕ : Ω → ℜ as
{ ( )
Vhk = ϕ : ϕ |Ω ∈ k Tij , 1 ≤ i ≤ N x , 1 ≤ j ≤ N y , } (11.10)
( ) ( )
where F k Tij = S k ( I i ) ⊗ S k J j denotes the space of polynomials of degree at most k on Tij .
( )
The number of degrees of freedom of k Tij can be calculated by N k = ( k + 1) ( k + 2 ) / 2.
After then, the exact solutions of w and Θ can be approximated by the DG polynomial
approximations of wh ∈ Vhk and Θ h ∈ Vhk as
Nk
Θh ( x, y ) = ∑ Θ (t ) b ( x, y ) ,
i=0
i
h i
(11.11)
Nk
wh ( x, y , t ) = ∑ w (t ) b ( x, y ) ,
i=0
i
h i ∀ ( x , y ) ∈Tij ,
where whi denotes the unknown coefficients for w to be corrected with time, and bi ( x , y )
represents the polynomial (basis) function. The two-dimensional scaled Legendre polyno-
mial functions are formulated here as a tensor product of the so-called principal functions,
which are defined as (Singh, 2018)
bk (ξ , η ) = ψ i (ξ ) ⊗ ψ j (η ) , (11.12)
with
2 i ( i !) 0,0
2
ψ i (ξ ) = P (ξ ) , − 1 ≤ ξ ≤ 1,
( 2 i )!
2 i ( j !)
2
ψ j (η ) = P 0,0 (η ) , − 1 ≤ η ≤ 1,
( 2 j )!
Computational Modeling 175
FIGURE 11.1
Elemental transformation from physical element to reference element in a 2D computational domain.
where P 0,0 (ξ ) is the Legendre polynomial function. A standard rectangular element Ωest
is defined using a local Cartesian coordinate system (ξ , η ) ∈[ −1,1], which is illustrated in
Figure 11.1. The standard element can be mapped from the computational space (ξ , η ) to an
arbitrary rectangular element in the physical space ( x , y ) under the linear transformation
T : Ωest → Ωe defined by
1
x= ( 1 − ξ ) x1 + ( 1 + ξ ) x2 ,
2
(11.13)
1
y = ( 1 − η ) y1 + ( 1 + η ) y 2 ,
2
∫ Θ b dV + ∫ ∇b ⋅ w dV − ∫ b w
Ωe
h h
Ωe
h h
∂Ωe
h h ⋅ ndΓ = 0,
(11.14)
∂
∂t ∫ w b dV − ∫ ∇b ⋅ F (Θ ) dV + ∫ b F (Θ ) ⋅ ndΓ = ∫ b S( w ) dV.
Ωe
h h
Ωe
h h
∂Ωe
h h
Ωe
h h
where n denotes the outward unit normal vector; Γ and V are the boundary and volume of
the element Ωe, respectively. The interface fluxes are not uniquely defined because of the
discontinuity in the solution wh and Θ h at the elemental interfaces. The functions F ( Θ h ) ⋅ n
and wh ⋅ n emerging in equation (11.14) can be substituted by the numerical fluxes at the
elemental interfaces denoted by H BR1 and H aux , respectively. Here, the central flux or Bassi
Rebay (BR1) scheme is employed for the viscous and auxiliary numerical fluxes to calcu-
late the flux at elemental interfaces.
176 Mathematical Modeling for Intelligent Systems
1 −
(
wh ⋅ n ≡ H aux wh− , wh+ = ) wh + wh+ ,
2
(11.15)
1
(
F ( Θ h ) ⋅ n ≡ H BR1 Θ −h ,Θ +h = ) 2
( ) ( )
F Θ −h + F Θ +h .
Here, the superscripts ( − ) and ( + ) are the left and right states of the elemental interface. As
a result, the DG weak formulation is obtained as
∫ Θ b dV + ∫ ∇b ⋅ w dV − ∫ b H
Ωe
h h
Ωe
h h
∂Ωe
h
aux
d Γ = 0,
(11.16)
∂
∂t ∫ w b dV − ∫ ∇b ⋅ F (Θ ) dV + ∫ b H
Ωe
h h
Ωe
h h
∂Ωe
h
BR1
dΓ =
∫ b S( w ) dV.
Ωe
h h
In the expression equation (11.16), the emerging volume and surface integrals are approxi-
mated by the Gaussian–Legendre quadrature rule within the elements to ensure the
high-order accuracy (Cockburn and Shu, 2001). Furthermore, a nonlinear TVB limiter
(Cockburn and Shu, 1998) is utilized to remove the artificial oscillations arising in the
numerical solution.
Finally, the DG spatial discretization equation (11.16) can be expressed in semi-discrete
ordinary differential equations form as
dwh
M = R ( wh ) , (11.17)
dt
where M and R ( wh ) are the orthogonal mass matrix and the residual function, respec-
tively. Here, an explicit form of Strongly Stability Preserving Runge–Kutta method with
third-order accuracy (Shu and Osher, 1988) is adopted as the time marching scheme.
h = w h + ∆t M R ( w h ) ,
−1
w(1) n
w(2)
h =
3 n 1 (1) 1
4
wh + wh + ∆t M −1 R w(1)
4 4
h , ( ) (11.18)
whn+1 =
1 n 2 (2) 2
3
wh + wh + ∆t M −1 R w(h2 ) ,
3 3
( )
( )
where R whn is the residual approximation at time tn , and ∆t is the suitable time step value.
11.3 Numerical Results
In this section, four test problems of Fisher–KPP equations are examined by simulating
numerical results with the proposed mixed modal DG scheme.
Computational Modeling 177
PROBLEM 11.1
For testing the accuracy of the present DG scheme, we consider a one-dimensional Fisher’s
KPP problem (Wazwaz and Gorguis, 2004)
∂w ∂2 w
= λ1 2 + µ w ( 1 − w ) , (11.19)
∂t ∂x
1
w ( x, 0 ) = ,
(1 + e )x 2
(11.20)
lim w ( x , t ) = 1.0, lim w ( x , t ) = 0.
x→−∞ x→∞
−2
µ 5
x − µt
w ( x, t ) = 1 + e 6 6
. (11.21)
The numerical solution of one-dimensional Fisher–KPP problem equation (11.19) has been
obtained for λ1 = 1.0 with N = 200 elements and ∆t = 0.0001. Figure 11.2 illustrates the
numerical and exact solutions at different time instants t = 0, 0.2, 0.4, 0.6, 0.8 and 1. The
computed results are depicted graphically in such a way that the numerical result can be
compared with the analytical solutions. The provided solutions are found in good match
with the analytical solutions. In addition, Table 11.1 shows the comparison between com-
puted DG and analytical solutions, and the maximum error (L∞ ) at two different time
instants t = 0.5, and 1.
FIGURE 11.2
Profiles and space-time plots for one-dimensional Fisher–KPP Problem 1 at early time instants. Arrow symbol
represents the direction of traveling wave solutions.
178 Mathematical Modeling for Intelligent Systems
TABLE 11.1
Comparison of Exact and Present Numerical Solutions of Problem 1 at Two Different Time
Level st = 0.5 and 1.0.
t = 0.5 t = 1.0
x Present Exact Error Present Exact Error
-10 0.10000E+1 0.99999E+0 0.42469E-4 0.10001E+1 0.99999E+0 0.49076E-4
−8 0.99999E+0 0.99994E+0 0.47085E-4 0.10001E+1 0.99999E+0 0.49529E-4
−6 0.99962E+0 0.99957E+0 0.46834E-4 0.10000E+1 0.99996E+0 0.49533E-4
−4 0.99689E+0 0.99681E+0 0.44718E-4 0.99979E+0 0.99974E+0 0.49400E-4
−2 0.97708E+0 0.97704E+0 0.36362E-4 0.99814E+0 0.99809E+0 0.49064E-4
0 0.85748E+0 0.85744E+0 0.47593E-4 0.98604E+0 0.98599E+0 0.50665E-4
2 0.40232E+0 0.40213E+0 0.18926E-3 0.91172E+0 0.91165E+0 0.70946E-4
4 0.36165E-1 0.36101E-1 0.64248E-4 0.54906E+0 0.54889E+0 0.17092E-3
6 0.94896E-3 0.94672E-3 0.22402E-5 0.77927E-1 0.77833E-1 0.93739E-4
8 0.18347E-4 0.18301E-4 0.46535E-7 0.24806E-2 0.24761E-2 0.45552E-5
10 0.54037E-6 0.27650E-6 0.26387E-7 0.80924E-4 0.40598E-4 0.40325E-4
PROBLEM 11.2
Consider a one-dimensional Fisher’s KPP equation (Tang and Weber, 1991)
∂w ∂2 w
= λ1 2 + µ w ( 1 − w ) , (11.22)
∂t ∂x
w ( x , 0 ) = 1, if − 1 ≤ x ≤ −1 (11.23)
The parameters are selected as ∆t = 0.01 and ∆x = 0.01. Figures 11.3–11.5 illustrate the
numerical solutions at various time instants. In Figure 11.3, the numerical solutions are
drawn for Ω x = [ −3, 3 ] at t = 0.1, 0.2, 0.3, 0.4 and 0.5, while in Figure 11.4, is shown for
Ω x = [ −6,6 ] at time instants t = 1, 2, 3, 4 and 5. Although, in general, the influence of reac-
tion–diffusion is minor early in the simulation, reaction is more dominant than diffusion
because there is a change from sharpness to smoothness near x = ±1 in the solutions. In
Figure 11.5, solution profiles across the interval Ω x = [ −30, 30 ] at time t = 0 − 35 are illus-
trated, where the numerical solution grows flatter because of diffusion impacts.
PROBLEM 11.3
Next, a two-dimensional Fisher’s KPP based test problem is considered.
∂w ∂2 w ∂2 w
= λ1 2 + λ 2 + µw (1 − w ) , (11.24)
∂t ∂x ∂y 2
Computational Modeling 179
FIGURE 11.3
Profiles and space-time plots for one-dimensional Fisher–KPP Problem 2 at early time instants. Arrow symbol
represents the direction of traveling wave solutions.
FIGURE 11.4
Profiles and space-time plots for one-dimensional Fisher–KPP Problem 2 at middle time instants. Arrow sym-
bol represents the direction of traveling wave solutions.
FIGURE 11.5
Profiles and space-time plots for one-dimensional Fisher–KPP Problem 2 at longer time instants. Arrow symbol
represents the direction of traveling wave solutions.
180 Mathematical Modeling for Intelligent Systems
FIGURE 11.6
Surface plots of numerical solutions for two-dimensional Fisher–KPP Problem 3 at various time instants t = 0,
1, 2, 3, 4 and 5.
with the parameters λ1 = 0.1, λ2 = 0.01, µ = 0.1, Ω = [ −2 , 2 ] × [ −1,1] and the initial condi-
tions are as follows:
w ( x , y , 0 ) = 1, if x 2 + 4 y 2 ≤ 0.25
(11.25)
w ( x, y , 0) = e
(
−10 x 2 + 4 y 2 − 0.25 ) , otherwise.
Figure 11.6 shows the surface plots of the numerical solution at time 0, 1, 2, 3, 4, and 5. This
example demonstrates that as time passes, the spreading disturbance causes the top to fall
first, although the initial disturbance has a flat top in the middle with zero diffusion and a
significant diffusion at the edge.
PROBLEM 11.4
Finally, a two-dimensional Fisher’s KPP equation is considered as (Tang et al. 1993)
∂w ∂2 w ∂2 w
= λ1 2 + λ 2 + µw (1 − w ) , (11.26)
∂t ∂x ∂y 2
with the parameters λ1 = 0.02, λ1 = 0.01, µ = 1, Ω = [ −10,10 ] × [ −8, 8 ] and the initial condi-
tions are as following:
w ( x, y , 0) = x 2 + 4y 2 , if x 2 + 4 y 2 ≤ 1 and x ≥ 0
w ( x , y , 0 ) = 1, if 1 ≤ x 2 + 4y 2 ≤ 2.25 and x ≥ 0
(11.27)
w ( x, y , 0) = e
(
−10 x 2 + 4 y 2 − 2.25 ) , if x 2 + 4y 2 ≥ 2.25 and x ≥ 0
w ( x , y , 0 ) = 0, if x > 0.
Computational Modeling 181
FIGURE 11.7
Surface plots of numerical solutions for two-dimensional Fisher–KPP Problem 4 at various time instants t = 0,
2, 5, 10, 20 and 30.
The parameters are selected to depict the concave and convex distributions across a vast
area. Figure 11.7 illustrates the surface plots of the numerical solutions at several time
instants t = 0, 2, 5, 10, 20 and 30. It can be observed that as time passes, the concave part
of w and its isopleths will become convex. The two-dimensional quasi-traveling waves are
obtained as shown and discussed by Tang and Weber (1991).
11.4 Concluding Remarks
The aim of this chapter is to find approximate solutions to the nonlinear Fisher–KPP reac-
tion-diffusion equation emerging in biology. A mixed modal DG scheme is developed to
simulate the two-dimensional Fisher–KPP equation. This numerical approach is based
on the concept of addressing an additional auxiliary unknown in the high-order deriv-
ative diffusion term. The scaled Legendre polynomials with third-order accuracy are
used for spatial discretization, while, a third-order Strongly-Stability-Preserving Runge-
Kutta (SSP-RK33) scheme is used for temporal discretization. This numerical approach
is widely applicable for several nonlinear reaction–diffusion problems. To verify the
accuracy and reliability of the DG scheme, four well-known one-dimensional and two-
dimensional numerical problems in literature are solved. The derived numerical solu-
tions and errors show that the results are in good match with the analytical solutions. In
the case of two-dimensional work, surface plots are also shown, which is identical to the
results reported graphically in the literature. This proposed DG approach demonstrates
that it is an efficient scheme to find numerical solutions in a variety of linear and non-
linear physical models. It may thus be extended to tackle higher-dimensional problems
efficiently.
182 Mathematical Modeling for Intelligent Systems
Acknowledgements
The author gratefully acknowledges the financial support provided by the Nanyang
Technological University, Singapore through the NAP-SUG grant program.
References
Arora, G. & Joshi, V. (2021). A computational approach for one and two dimensional Fisher’s equa-
tion using quadrature technique. American Journal of Mathematical and Management Sciences,
40(2), 145–162.
Chourushi, T., Rahimi, A., Singh, S., & Myong, R.S. (2020). Computational simulation of near con-
tinuum external gas flows using the Navier-Stokes-Fourier equations with slip/jump condi-
tions based on a modal discontinuous Galerkin method, Advances in Aerodynamics, 2(8), 1–37.
Cockburn, B., & Shu, C.-W. (1989a). TVB Runge-Kutta local projection discontinuous Galerkin finite
element method for conservation laws II, General framework. Mathematics of Computation, 52,
411–435.
Cockburn, B., & Shu, C.-W. (1989b). TVB Runge-Kutta local projection discontinuous Galerkin finite
element method for conservation laws III: one-dimensional systems. Journal of Computational
Physics, 84, 90–113
Cockburn, B., & Shu, C.-W. (1998). The Runge-Kutta discontinuous Galerkin method for conserva-
tion laws V: Multidimensional systems. Journal of Computational Physics, 141(2), 199–224.
Cockburn, B., & Shu, C.-W. (2001). Runge–Kutta discontinuous Galerkin methods for convection-
dominated problems. Journal of Scientific Computing, 16(3), 173–261.
Dehghan, M. & Abbaszadeh, M. (2017). Numerical investigation based on direct meshless local Petrov
Galerkin (direct MLPG) method for solving generalized Zakharov system in one and two
dimensions and generalized Gross-Pitaevskii equation. Engineering Computations, 34(4), 983–996.
Dehghan, M. & Abbaszadeh, M. (2018). Solution of multi-dimensional Klein-Gordon-Zakharov and
Schrödinger/Gross-Pitaevskii equations via local radial basis functions-differential quadra-
ture (RBF-DQ) technique on non-rectangular computational domains. Engineering Analysis
with Bundary Elements, 92, 156–170.
Evans, D.J., & Sahimi, M.S. (1989). The alternating group explicit iterative method to solve parabolic
and hyperbolic partial differential equations. Annual Review of Numerical FluidMechanics and
Heat Transfer, 2, 283–389.
Fisher, R.A. (1937). The wave of advance of advantageous genes. Annals of Eugenics, 7(4), 355–369.
Gazdag, J., & Canosa, J. (1974). Numerical solution of Fisher’s equation. Journal of Applied Probability,
11(3), 445–457.
Hagstrom, T., & Keller, H.B. (1986). The numerical calculation of travelling wave solutions of non-
linear parabolic equations. SIAM Journal on Scientific and Statistical Computing, 7(3), 978–988.
José, C. (1969). Diffusion in nonlinear multiplicative media. Journal of Mathematical Physics, 10(10),
1862–1868.
Kolmogorov, A.N. (1937). Étude de l‘équation de la diffusion avec croissance de la quantité de
matière et son application à un problème biologique. Moskow University Bulletin, International
Series, Section A, 1, 1–25.
Le, N.T.P., Xiao, H., & Myong, R.S. (2014). A triangular discontinuous Galerkin method for non-New-
tonian implicit constitutive models of rarefied and microscale gases. Journal of Computational
Physics, 273, 160–184.
Mittal, R.C. & Kumar, S. (2006). Numerical study of Fisher’s equation by wavelet Galerkin method.
International Journal of Computer Mathematics 83(3), 287–298.
Computational Modeling 183
Mittal, R.C., & Arora, G. (2010). Efficient numerical solution of Fisher’s equation by using B-spline
method. International Journal of Computer Mathematics, 87(13), 3039–3051.
Mo, J. Q., Zhang, W. J., & He, M. (2007). Asymptotic method of travelling wave solutions for aclass of
nonlinear reaction diffusion equation. Acta Mathematica Scientia, 27(4), 777–780.
Parekh, N., & Puri, S. (1990). A new numerical scheme for the Fisher’s equation. Journal of Physics A:
Mathematical and General, 23, 1085–1091.
Raj, L.P., Singh, S., Karchani, A., & Myong, R.S. (2017). A super-parallel mixed explicit discontinuous
Galerkin method for the second-order Boltzmann-based constitutive models of rarefied and
microscale gases. Computers & Fluids, 157, 146–163.
Reed, W.H., & Hill, T.R. (1973). Triangular mesh methods for the neutron transport equation. Los
Alamos Scientific Laboratory Report LA-UR, 13(7), 73–79
Roessler, J. & Hüssner, H. (1997).Numerical solution of the 1+ 2 dimensional Fisher’s equation by
finite elements and the Galerkin method. Mathematical and Computer Modelling, 25(3), 57–67.
Shu, C.-W., & Osher, S. (1988). Efficient implementation of essentially non-oscillatory shock-captur-
ing schemes. Journal of Computational Physics, 77(2), 439–471.
Singh, S. (2018). Development of a 3D discontinuous Galerkin method for the second-order
Boltzmann-Curtiss based hydrodynamic models of diatomic and polyatomic gases. (Doctoral
dissertation, Gyeongsang National University South Korea. Department of Mechanical and
Aerospace Engineering.)
Singh, S. (2020). Role of Atwood number on flow morphology of a planar shock-accelerated square
bubble: A numerical study. Physics of Fluids, 32, 126112.
Singh, S. (2021a). Numerical investigation of thermal non-equilibrium effects of diatomic and poly-
atomic gases on the shock-accelerated square light bubble using a mixed-type modal discon-
tinuous Galerkin method. International Journal of Heat and Mass Transfer, 169, 121708.
Singh, S. (2021b). Contribution of Mach number on the evolution of Richtmyer-Meshkov instability
induced by a shock-accelerated square light bubble. Physical Review Fluids 6(10), 104001.
Singh, S. (2021c). Mixed-type discontinuous Galerkin approach for solving the generalized
FitzHugh-Nagumo reaction-diffusion model. International Journal of Applied and Computational
Mathematics, 7, 207.
Singh, S. (2021d). A mixed-type modal discontinuous Galerkin approach for solving nonlinear reac-
tion diffusion equations. AIP Conference Proceedings (accepted).
Singh, S., & Battiato, M. (2020a). Effect of strong electric fields on material responses: The Bloch oscil-
lation resonance in high field conductivities. Materials, 13, 1070.
Singh, S., & Battiato, M. (2020b). Strongly out-of-equilibrium simulations for electron Boltzmann
transport equation using explicit modal discontinuous Galerkin method. International Journal
of Applied and Computational Mathematics, 6,133.
Singh, S., & Battiato, M. (2021a). An explicit modal discontinuous Galerkin method for Boltzmann
transport equation under electronic nonequilibrium conditions. Computers & Fluids, 224,
104972.
Singh, S., & Battiato, M. (2021b). Behavior of a shock-accelerated heavy cylindrical bubble under
nonequilibrium conditions of diatomic and polyatomic gases. Physical Review Fluids, 6,
044001.
Singh, S., & Myong, R.S. (2017). A computational study of bulk viscosity effects on shock-vortex
interaction using discontinuous Galerkin method. Journal of Computational Fluids Engineering,
22, 86–95.
Singh, S., Battiato, M. & Myong, R.S. (2021). Impact of bulk viscosity on flow morphology of shock-
accelerated cylindrical light bubble in diatomic and polyatomic gases. Physics of Fluids, 33,
066103.
Tan, Y., Xu, H., & Liao, S.J. (2007). Explicit series solution of travelling waves with a front of Fisher
equation. Chaos, Solitons and Fractals, 31(2), 462–472.
Tang, S., Qin, S. & Weber, R.O. (1993). Numerical studies on 2-dimensional reaction-diffusion equa-
tions. The Journal of the Australian Mathematical Society. Series B. Applied Mathematics, 35(2),
223–243.
184 Mathematical Modeling for Intelligent Systems
Tang, S. & Weber, R.O. (1991). Numerical study of Fisher’s equation by a Petrov–Galerkin finite ele-
ment method. The Journal of the Australian Mathematical Society. Series B. Applied Mathematics,
33(1), 27–38.
Wazwaz, A.M. (2004). The tanh method for traveling wave solutions of nonlinear equations. Applied
Mathematics and Computation, 154(3), 713–723.
Wazwaz, A.-M. & Gorguis, A. (2004). An analytic study of Fisher's equation by using Adomian
decomposition method. Applied Mathematics and Computation, 154(3), 609–620.
Zheng, S. (2004). Nonlinear evolution equations. Monographs and surveys in pure and applied
Mathematics. CRC Press, Boca Raton.
12
A Numerical Approach on Unsteady Mixed
Convection Flow with Temperature-Dependent
Variable Prandtl Number and Viscosity
A. K. Singh
VIT University
S. Roy
Indian Institute of Technology Madras
P. Shukla
VIT University
CONTENTS
12.1 Introduction ........................................................................................................................ 185
12.2 Formation of Governing Equations ................................................................................ 186
12.3 Numerical Computation with Quasilinearization Technique .................................... 189
12.4 Results and Discussion ..................................................................................................... 190
12.5 Conclusions......................................................................................................................... 194
References..................................................................................................................................... 195
12.1 Introduction
The unsteady heat transfer fluid flow is very important for many real-life applications where
fluid has direct contact with solid such as plastic sheet extrusion, wire and fiber coating,
metal and glass spinning, polymer sheets, the boundary layer along with material handlings
conveyers, etc. The boundary layer fluid flow is very thin and sometimes is visible to the
naked eye. For example, near the ship, there is a narrow band of water and the relative veloc-
ity of the ship is less than that of water. Water is used for working in many industrial and
engineering fields and hence the current study is based on water. The study on convection
pattern flow over various surfaces was performed with constant physical parameters of flu-
ids. Cortell [1] presented the numerical study of the fluid over moving surface and discussed
the direction of wall shear and temperature variations. Fang [2] discussed the unsteady flow
over moving plate, and the characteristics of the heat transfer and fluid motion are found.
Patil and Roy [3] numerically analyzed fluid flow over moving vertical plates along with par-
allel to the free stream. They discussed heat absorption or generation within the boundary
DOI: 10.1201/9781003291916-12 185
186 Mathematical Modeling for Intelligent Systems
layer. Bhattacharyya et al. [4] analyzed the slip impact on the flow over a flat plate. They have
found that velocity and temperature overshoot acting on near the plate. The fluid flow over
moving a plate is theoretically investigated with viscous dissipation term by Bachok et al.
[5]. The results indicated that the solution’s nature of the similarity equations depends on
the velocity ratio parameter, mixed convection parameter and the Eckert number. Aman and
Ishak [6] discussed the mixed convection flow toward a plate. The results indicate that dual
and unique solutions are based on opposing and assisting flow.
In general, various studies of boundary layer flow are based on constant Prandtl number
and variable viscous fluid. But in practical, liquids say water, are particularly sensitive to tem-
perature changes as for as Prandtl number and viscosity are concerned. It is assumed that the
Prandtl and viscosity are varied on inverse of linear function of temperature [7,8]. Pop et al. [9]
examined the impact on variable viscosity of the fluid flow over moving flat plate. The non-
uniform slot suction can be used for delayed separation, but the opposite effect is observed
in the case of nonuniform slot injection. Saikrishnan and Roy [10] presented the forced con-
vection flow impact on Prandtl number and viscosity with temperature. They discussed the
effects of skin friction and heat transfer rate on viscous dissipation. Roy et al. [11] studied the
laminar flow and heat transfer over a sphere and analyzed the impact of injection and suc-
tion. They have found that nonuniform slot suction can be used for delaying the separation
but the opposite effect is observed in the case of nonuniform slot injection. Mureithi et al. [12]
performed the numerical study of fluid flow on moving flat plates with the streaming flow
with temperature-dependent viscosity. Das et al. [13] discussed unsteady fluid flow over a
parallel plate with different temperature and mass diffusion in the presence of thermal radia-
tion. Govindaraj et al. [14,15] study the convection fluid flow over a stretching exponential
surface with a porous plate. Maitil and Mandal [16] have investigated impacts of thermal
radiation and buoyancy force over an infinite vertical flat plate with slip conditions. Talha
Anwar et al. [17] discussed magneto hydrodynamics effects on natural convection nanofluid
flow over a porous media with time-dependent and heat source/Sink. The effects of thermal
radiation heat absorption over an accelerated infinite vertical plate and ramped plate of con-
vective flow of nanofluids with time-dependent are discussed in Refs. [18] and [19].
The objective of the current work is to focus on the unsteady flow over a vertical plate
with temperature-dependent and physical parameters of fluids. This investigation of the
current problem is considered mainly focused on the time-dependent, various values
of Reynolds number, Prandtl number, and viscosity of fluid flow moving on a flat plate.
The nonlinear governing equations have been converted into linear equation using the
Quasi-linearization technique and further obtained the system of equations based on the
finite difference method. The effects of physical parameters on velocity, temperature, heat
transfer, and skin friction have been investigated. The unsteadiness in the flow and tem-
perature fields is induced by the free stream and moving plate velocity. The validation of
current results has been done by comparing them with previously published results that
are shown in Table 12.2.
FIGURE 12.1
Physical coordination of model figure.
temperature. At constant strain, the variance of both specific heat Cp and density (ρ) is ( )
assumed to be less than 1%, so they are treated as constants. Reference [7] provided the
values for thermophysical properties of water at various temperatures. Buoyancy force rise
to the fluid properties to relate the density changes to temperature, and the thermophysi-
cal properties of water with various temperature has been shown in [20]. In an incompress-
ible fluid, the contribution of heat due to the contraction of the fluid is very small and it is
ignored. The fluid at the surface is kept at a constant temperature Tw , and the boundary
layer’s edge is kept at the same temperature T∞ .
The variable Prandtl number and variable viscosity are defined as
1 1
Pr = and µ=
c1 + c 2 T b1 + b2T
where b1, b2 , c1 and c2 are the best approximation of water and the numerical data presented
[20] (Figure 12.1).
The governing equations of the current problem are given as
∇.V = 0 (12.1)
1
(∇u)t + u ( ∇u)i + v ( ∇u) j = (∇U e )t + ( ∇ ) j µ (∇u) j + g β (Tw − T∞ ) (12.2)
ρ
1 µ
(∇T )t + u (∇T )i + v (∇T ) j = ( ∇ ) j ( ∇T ) j (12.3)
ρ Pr
The boundary constraints:
( )
y = 0 : u ( t , x , y ) = U w ( t ) = U 0 wφ t * , T ( t , x , y ) = Tw , v ( t , x , y ) = 0,
(12.4)
y → ∞ : u ( t , x , y ) → U ( t ) → U φ ( t ) , T ( t , x , ∞ ) → T
e ∞
*
∞
188 Mathematical Modeling for Intelligent Systems
To determine the velocity field and temperature profiles within the boundary layer, the
problem is well posted with boundary condition equations (12.1)–(12.4) grouping into non-
dimensional fluid parameters with the following similarity transformation:
1/2
x U∞ U
ξ=
L
( )
, ψ ( x , y ) = φ t * (Uxυ ) f (ξ , η ) , ε =
1/2
U∞ + U 0w
, η =
xυ
y;
(Uυ x )1/2
v=−
2x
{ f + 2ξ fη − η F} , fη = F , t* = Ux t;
gβT (Tw − T∞ ) L3
GrL =
υ2
, U = U 0 w + U∞ , T − T∞ = (Tw − T∞ ) θ t * , ξ , η ( )
GrL ∂ψ UL ∂ψ
λ=
ReL2
, u =
∂y
, ReL =
ν
, v = −
∂x
, u = Uφ t * F ( ) (12.5)
( )
= ξφ t * ( FFξ − fξ Fη ) (12.6)
f dθ
( NPr −1
θη )
η
( ) 2 dt
( )
+ θηφ t * − ReLξ * = ξφ t * ( Fθξ − θη fξ ) (12.7)
η
where f =
∫ Fd
0
η + fw , fw = 0 (Table 12.1)
TABLE 12.1
The Values of Thermo-Physical Properties at Different Temperature. Values of Water as Given
Below [7]
Temperature Density Specific Heat Thermal Conductivity Viscosity Prandtl
(T) (C o ) (g /m 3) (J.107/kg K) (erg.105)/cm.s.K) (g.10 −2-cm.s) Number
0 1.00228 4.2176 0.5610 1.7930 13.48
10 0.99970 4.1921 0.5800 1.3070 9.45
20 0.99821 4.1818 0.5984 1.0060 7.03
30 0.99565 4.1784 0.6154 0.7977 5.12
40 0.99222 4.1785 0.6305 0.6532 4.32
50 0.98803 4.1806 0.6435 0.5470 3.55
Numerical Approach on Unsteady Mixed Convection Flow 189
*
( )
i.e., fw = 0 is impermeable plate. Noted that φ t * = 1 + α t * ; α > 0 or α < 0, where the time
t = 0 is steady-state flow are obtained from equations (12.6) and (12.7) by substituting
( )
d∅ t * dF
dt *
dt
( )
= * = 0,∅ t * = 1 and if t * > 0 become unsteady flow with free stream velocity
( )
U e ( t ) = U∞ φ t * and velocity at wall U w ( t ) = U 0 wφ t * .
( )
( )
The skin friction coefficient C fx as below:
∂u
2µ
∂y y=0
C fx =
ρU 2
w
( )
= 2φ t * Fη (ξ , 0 )( ReLξ )
−1/2
(12.9)
(
i.e.,\dsC fx ( ReLξ )
1/2
) = 2φ (t ) F (ξ , 0)
*
η
∂T
−x
∂y y=0
= −θη (ξ , 0 ) ( ReL ~ ξ )
1/2
Nux = (12.10)
(Tw − T∞ )
(
i.e.,\dsNux ( ReLξ )
−1/2
) = −θ (ξ , 0).
η
s+ 1
X 1s Fηη + X 2s Fηs+ 1 + X 3s F s+ 1 + X 4s Fξs+ 1 + X 5s Fts* + 1 + X 6sθηs+ 1 + X 7sθ s+1 = X 8s (12.11)
Y1sθηη
s+ 1
+ Y2sθηs+1 + Y3sθ s+1 + Y4sθηs+1 + Y5sθ ts*+1 + Y6s F s+1 = Y7s (12.12)
X 1s = N
190 Mathematical Modeling for Intelligent Systems
X 2s = − a1 N 2θη + φ t * ( ) 2f + φ (t )ξ f
*
ξ
( ) − ξφ
dφ t *
( ) (t ) F
−1
X 3s = −ξ Reφ t * \ ds *
ξ
dt *
( )
X 4s = −ξφ t * F
X 5s = −ξ Re
X 6s = − a1 N 2 Fη
( )
−1
X 7s = − a1 N 2 Fηη + 2 a12 N 3 Fηθη + λξφ t *
( ) − ξφ t FF
dφ t *
( ) ( )
−1\
X 8s = − a1 N 2 Fηθη − a1 N 2 Fηηθ + 2 a12 N 3 Fηθηθ − ξ Reφ t * ds *
*
ξ
dt
Y1s = NPr −1
( )
Y4s = −ξφ t * F
Y5s = −ξ Re
( )
Y6s = −ξφ t * θξ
TABLE 12.2
Comparison of the Steady State Results
Pr 2 5 7 10 100
Ali [21] – – – 1.6713 –
Chen [22] 0.68324 – 1.38619 1.68008 5.54450
A.K. Singh [23] 0.6830 1.151 1.38600 1.6801 5.5450
Present work 0.6832 1.149 1.385 1.6800 5.5449
Numerical Approach on Unsteady Mixed Convection Flow 191
Prandtl number is considered. Numerical computation process has been carried out for
different parameters values of α ( 0 ≤ α ≤ 2.5 ), ( 0.1 ≤ ≤ 0.9 ), ξ ( 0 ≤ ξ ≤ 1), λ ( 0 ≤ λ ≤ 4 ), and
(
t* 0 ≤ t* ≤ 2 .)
Comparison of the steady state results −θη (ξ , 0 ) for λ = 0, ξ = 0, ε = 0 with those of Ali and
Yousef [21], Chen [22] and A.K. Singh et al. [23].
( )
Figure 12.2 displays the influence of accelerating fluid flow φ t * , time parameter t * , ( )
and buoyancy force ( λ ) on the velocity profile. Noted that, near the wall high overshoot
is presents in the velocity profile as increase λ with decrease t *. Also, the velocity profile
enhanced near the wall due to the increase of buoyancy force ( λ ). In case of time parameter
increase, the steepness of velocity profile is almost absent, which means that the intensity
of the fluid flow goes down. For example, when λ increases from 2 to 4 the fluid accelerated
near the wall and increased the velocity profile for = 0.4, α = 0.5, ξ = 0.5, t * = 1 and Re = 1.0.
( )
Figure 12.3 shows the impact of t *, ε and accelerating flow ∅ t * on θ (temperature
profile). It is noted that intensity of temperature profile θ increases with increase of ε and
its followed decreasing trends with the increase of time t * . However, due increase of ε the
fluid gets accelerated and the magnitude of temperature is increased. As ∅ t * increase( )
the thickness of the thermal boundary layer is close to the lower segment of the plate. The
temperature gradient increased when t * decreases from 1 to 0 and hence thermal thickness
are much smaller for t = 1 as compared to t = 0. For example, the intensity of θ increases by
36% as ε varies from 0.1 to 0.7 at t * = 0, ξ = 0, λ = 2, α = 0.5 and Re = 1.
Figure 12.4 depicts the impact of the accelerating flow α and t * on the velocity profile.
The impacts of velocity profile indicate that it is strongly dependent on α and t * . In F,
the decreasing trend is observed for all values of α . Physically, furthermore accelerating
parameter is directly related to α and more significant effects are observed in velocity pro-
files. However, velocity profiles are enhanced for low values of α (α = 0.5) and time t * = 1.
In particular, for ε = 0.2, η = 1, ξ = 0, λ = 2.0 and Re = 100, the magnitude of F (η, ξ ) increases
by 20% with decreases of α from 2.5 to 0.5 at t * = 1.0.
FIGURE 12.2
( )
Variations of t * and α on F for φ t * when Re = 100, = 0.2, ξ = 0, and λ = 2.0.
192 Mathematical Modeling for Intelligent Systems
FIGURE 12.3
( )
Variations of t * and α on F for φ t * when Re = 100, = 0.2, ξ = 0, and λ = 2.0.
FIGURE 12.4
*
( )
Variations of t and α on F for φ t * when Re = 100, = 0.2, ξ = 0, and λ = 2.0.
Figure 12.5 presents the effects of the accelerating flow α and t * on the temperature
profile. The temperature profile gradually decreases with the increase of α and time (t * ).
The temperature profiles are directly related to the energy equation of the right-hand side,
which gives the high friction near the wall due to increase of α . In particular, for ε = 0.2,
ε = 0.2, ξ = 0, λ = 2.0 and Re = 100 the magnitude of temperature profile increases by 26% as
α decreases 2.3 to 0.4 at t * = 1.5.
Numerical Approach on Unsteady Mixed Convection Flow 193
FIGURE 12.5
( )
Variations of α and t * on θ for φ t * when = 0.2, Re = 100, ξ = 0 and λ = 2.0.
FIGURE 12.6
(
Variations of α and λ on C fx ( ReL ξ ) )
1/2
( )
for φ t * when = 0.2, ξ = 0.5 and Re = 1.0.
Figure 12.6 depicts the impacts of λ and accelerating flow α on the skin-friction. For
the higher values of (λ >0), the fluid moves faster near the wall and increase the thermal
and acceleration of the fluid. Due to the fluid acceleration, the fluid gets hot and moves
towards the momentum boundary layers. In fact, the shear stress increased near the
wall and the magnitude of the C fx ( ReLξ )
−1/2
is increased. Initially (t * ≤ 0.4), the magni-
tude of C fx ( ReLξ )
−1/2
is very high for higher values of α = 1.0, whereas, the magnitude
194 Mathematical Modeling for Intelligent Systems
FIGURE 12.7
(
Variations of ∆T and on C fx ( ReL ξ ) )
1/2
( )
for φ t * , α = 0.5 when ξ = 0, Re = 100, and λ = 1.0.
of C fx ( ReLξ )
−1/2
is decreasing trend observed for lesser value of α = 0.5 when t * ≥ 0.5. In
particular, for ε = 0.2, Re = 1.0, ξ = 0.5, and t * = 0.2, the skin-friction increases by 179% as λ
increase from 2 to 3 at α = 0.5.
Figure 12.7 represents the effects of ε and temperature dependent (∆Tw) on C fx ( ReLξ ) .
1/2
( )
The accelerating flow parameter ∅ t * , which gives the acceleration to the fluid due to
this the increasing trends observed with increase of velocity ratio (ε ). In case of lesser
values of (ε ) the decreasing trends is observed with increase of ∆Tw. In particular, for ξ =0,
α = 0.5, ξ = 0, λ = 1.0 and Re = 100 the magnitude of the skin-friction increases about 195%
when ε increases from 0.4 to 0.6 at ∆Tw = 15. Figure 12.8 shows the effects of ε and tem-
perature dependent (∆Tw) on Nux ( ReLξ ) . The heat-transfer coefficient increases with
−1/2
the increase of ε , but reverse trend is observed when ∆Tw decreases. The velocity ratio
(ε ) increase from 0.1 to 0.5, which produces the higher heat generation. In particular, for
α = 0.5, t * = 0.3, λ = 1.0, ξ = 0 and Re = 100 the magnitude of the heat transfer increases about
93%, when ε increases from 0.4 to 0.6 at ∆Tw = 15.
12.5 Conclusions
This work investigated numerically an unsteady laminar fluid flow of stretching sheets
the following results are summarized.
• The velocity profile overshoots with an increase of buoyancy parameters (λ) and
undershoot velocity profile with an increase of t * . In particular, for ε = 0.4, α = 0.5,
Re = 1.0, t * = 1 and ξ = 0.5, the magnitude of velocity profile maximum overshoot
by 21% between λ = 2 and λ = 4.
Numerical Approach on Unsteady Mixed Convection Flow 195
FIGURE 12.8
(
Variations ∆T and on Nux ( ReL ξ ) )
−1/2
( )
for φ t * , α = 0.5, when Re = 100, ξ = 0 and λ = 1.0.
References
1. R. Cortell (2007), Flow and heat transfer in moving fluid over a moving flat surface. Theor
Comput Fluid Dyn 21, 435–446.
2. T. Fang (2008), A note on the unsteady boundary layer over a flat plate, I. J. Non-linear Mech 43,
1007–1011.
3. P. M. Patil and S. Roy (2010), Unsteady mixed convection flow from a vertical plate in paral-
lel free stream: influence of heat generation or absorption, Int J Heat Mass Transf 53(21–22),
4749–4756.
4. K. Bhattacharyya, S. Mukhopadhyay, and G. C. Layek (2013), Similarity solution of mixed con-
vective boundary layer slip flow over a vertical plate, Ain Shams Eng J 4, 299–305.
196 Mathematical Modeling for Intelligent Systems
5. N. Bachok, A. Ishak, and I. Pop (2013), Mixed convection boundary layer flow over a moving
vertical flat plate in an external fluid flow with viscous dissipation effect, PLoS One 8(4), e60766.
6. F. Aman and A. Ishak (2012), Mixed convection boundary layer flow towards a vertical plate
with a convective surface boundary condition mathematical problems in engineering, Math
Probl Eng 2012, 453457.
7. I. Govindhasamy and A. K. Singh (2020), Boundary layer flow and stability analysis of forced
convection over a diverging channel with variable properties of fluids, Heat Transf 49(8),
5050–5065.
8. D. R. Lide (Ed.) (1990), CRC Handbook of Chemistry and Physics, 71st ed., CRC Press, BocaRaton,
FL.
9. H. Schlichting (2000), Boundary Layer Theory, McGraw Hill, New York.
10. I. Pop, R. S. R. Gorla, and M. Rashidi (1992), The effect of variable viscosity on flow and heat
transfer to a continuous moving flat plate, Int J Eng Science 30, 1–6.
11. P. Saikrishnan and S. Roy (2002), Steady nonsimilar axisymmetric water boundary layer with
variable and Prandtl number, Acta Mech 157 187–199.
12. S. Roy, P. Saikrishnan, and B. D. Pandey (2009), Influence of double slot suction (injection) into
water boundary layer flows over sphere, Int Commun Heat Mass Transf 36, 646–650.
13. E. M. Mureithi, J. J. Mwaonanji, and O. D. Makinde (2013), On boundary layer flow over a mov-
ing surface in a fluid with temperature-dependent viscosity, Open J Fluid Dyn 3, 135–140.
14. S. Das, R. N. Jana, and A. Chamkha (2015), Unsteady free convection flow between two vertical
plates with variable temperature and mass diffusion, J Heat Mass Transf Res 2 49–58.
15. N. Govindaraj, A. K. Singh, S. Roy, and P. Shukla (2019), Analysis of a boundary layer flow over
moving an exponentially stretching surface with variable viscosity and Prandtl number, Heat
Transf 48(7), 2736–2751.
16. N. Govindaraj, A. K. Singh, and S. Roy (2018), Water boundary layer flow over an exponen-
tially permeable stretching sheet with variable viscosity and Prandtl number, In International
Conference on Mathematical Modelling and Scientific Computation (pp. 207–217). Springer,
Singapore.
17. D. K. Maiti and H. Mandal (2019), Unsteady slip flow past an infinite vertical plate with ramped
plate temperature and concentration in the presence of thermal radiation and boyancy, J Eng
Thermophys 28(3), 431–452.
18. T. Anwar, P. Kumam, Z. Shah, W. Watthayu, and P. Thounthong (2020), Unsteady radiative
natural convective MHD nanofluid flow past a porous moving vertical plate with heat source/
sink, Molecules 25, 854.
19. M. V. Krishna, N. A. Ahamad, and A. J. Chamkha (2021), Radiation absorption on MHD con-
vective flow of nanofluids through vertically travelling absorbent plate, Ain Shams Eng J 12,
3043–3056.
20. Y. D. Reddy, B. S. Goud, and M. A. Kumar (2021), Radiation and heat absorption effects on an
unsteady MHD boundary layer flow along an accelerated infinite vertical plate with ramped
plate temperature in the existence of slip condition, Partial Diff Equ Appl Math 4, 100166.
21. M. Ali and F. Al-Yousef (1998), Laminar mixed convection from a moving vertical surface with
suction or injection, Heat Mass Transf 33(4), 301–306.
22. C. H. Chen (1998), Laminar mixed convection adjacent to vertical, continuously stretching
sheets, Heat Mass Transf 33, 471–476.
23. A. K. Singh, A. K. Singh, and S. Roy (2019), Analysis of mixed convection in water boundary
layer flows over a moving vertical plate with variable viscosity and Prandtl number, Int. J.
Numer. Methods Heat Fluid Flow 29(2), 602–616.
13
Study of Incompressible Viscous Flow
Due to a Stretchable Rotating Disk
Through Finite Element Procedure
Anupam Bhandari
University of Petroleum & Energy Studies (UPES)
CONTENTS
13.1 Introduction ........................................................................................................................ 197
13.2 Mathematical Formulation ............................................................................................... 198
13.3 Finite Element Procedure for Numerical Solution ........................................................ 200
13.4 Results and Discussion ..................................................................................................... 203
13.5 Conclusion .......................................................................................................................... 211
References..................................................................................................................................... 212
13.1 Introduction
The study of three-dimensional incompressible flow in a rotating system has been
researched owing to its significant role in rotating equipment. Such types of interest-
ing problems have been solved using the similarity transformation. It reduces the three-
dimensional Navier–Stokes equations into nondimensional nonlinear ordinary differential
equations. Then the converted nondimensional equations represent the nondimensional
velocity distribution for the nondimensional similarity variable of the flow.
Cochran implemented the power series approximations method for the solution of non-
dimensional differential equations (Cochran, 1934). In 1966, Benton tried to obtain a more
accurate solution than Cochran (Benton, 1966). In magnetohydrodynamic flow, Hassan
and Attia used a finite difference scheme for solving problems of rotational flow (Aboul-
Hassan & Attia, 1997). Turkyilmazoglu used the fourth-order Runge–Kutta scheme for
solving the nonlinear coupled differential equations for magnetohydrodynamic stagna-
tion revolving flow with the help of MATHEMATICA Software (Turkyilmazoglu, 2012).
Similarity solutions have been obtained through the homotopy analysis method for dif-
ferent types of steady flow in the rotating system considering the influence of variable
thickness and slip effects (Rashidi et al., 2011, 2012; Sravanthi, 2019).
Due to the importance of the finite element method over other numerical methods, this
method is being commercialized (Reddy & Gartling, 2010). Gupta et al. developed the
finite element procedure to investigate the micropolar flow over a shrinking sheet (Gupta
et al., 2018). Anjos et al. implemented the finite element method procedure for the flow
over a rotating plate (Anjos et al., 2014). Takhar et al. presented the finite element solu-
tion for micropolar fluid flow from an enclosed rotating plate (Takhar et al., 2001). Yoseph
and Olek described the solution of compressible flow over a rotating porous disk using
asymptotic and finite element approximation (Bar-Yoseph & Olek, 1984). Sheikholeslami
and Ganji used the control volume finite element technique to investigate ferrofluid flow
and heat transfer in a semiannulus enclosure (Sheikholeslami & Ganji, 2014). Vasu et al.
demonstrated the magnetohydrodynamic flow through a stenosed coronary artery using
finite element analysis (Vasu et al., 2020). Feistauer et al. demonstrated the finite element
solution for nonviscous subsonic irrotational flow (Feistauer et al., 1992).
This work investigates the steady, incompressible, and axisymmetric flow of viscous
fluid due to rotating and stretching disks. The influence of rotation and stretching of
the disk on the velocity profiles is graphically presented. The finite element procedure is
explained for solving nonlinear coupled differential equations of the flow due to a rotating
and stretching disk. The problem formulation is presented over a typical element of the
solution domain. In the present analysis, the solution of nonlinear differential equations is
demonstrated through finite element procedure in COMSOL Multiphysics Software and
is compared with the previously reported solutions. The present solution finite element
solution is corrected up to ten decimal places.
13.2 Mathematical Formulation
Figure 13.1 demonstrates the flow configuration of viscous over a rotating and stretching
plate. Let ( u, v , w ) be the velocity components in the cylindrical coordinates ( r , ϕ , z ) direc-
tion, respectively. It is assumed that the disk uniformly rotates with the angular velocity ω
about z-axis. Along with the rotation, the disk is stretching at a uniform rate s in the direc-
tion of. The governing equations for the steady and axisymmetric flow due to rotating disk
are as follows (Benton, 1966; Cochran, 1934; Turkyilmazoglu, 2014):
∂u u ∂w
+ + =0 (13.1)
∂r r ∂z
∂u ∂ u v2 ∂p ∂2u 1 ∂u u ∂2u
ρ u +w − =− +µ 2 + − + (13.2)
∂r ∂z r ∂r ∂z r ∂ r r 2 ∂ r 2
FIGURE 13.1
Flow configuration of viscous fluid due to rotating and stretching disk.
Study of Incompressible Viscous Flow 199
∂v ∂ v uv ∂2v 1 ∂ v ∂2v v
ρ u +w + = µ 2 + + − (13.3)
∂r ∂z r
∂z r ∂ r ∂ r 2 r 2
∂w ∂w ∂p ∂2 w 1 ∂w ∂2 w
ρ u +w =− +µ 2 + + (13.4)
∂r
∂z ∂z ∂z r ∂r ∂r 2
z = 0; u = rs, v = rω , w = 0 ; z → ∞; u → 0, v → 0 (13.5)
ω
u = rω F (η ) , v = rω G (η ) , w = υω H (η ) , p − p∞ = − ρυω P (η ) , η = z (13.6)
υ
dH
+ 2F = 0 (13.7)
dη
d2 F dF
−H − F 2 + G2 = 0 (13.8)
dη 2
dη
d 2G dG
−H − 2 FG = 0 (13.9)
dη 2 dη
F ( 0 ) = C , G ( 0 ) = 1, H ( 0 ) = 0, F ( ∞ ) = 0, G ( ∞ ) = 0 (13.10)
s
where C = denotes the stretching strength parameter.
ω
A case C = 0 demonstrates that there is no stretching in the disk and the problem reduces
into the flow due to rotating disk only. However, the present problem can also be inves-
tigated for different speeds of rotation of the disk. In this case, the following similarity
transformation can be used:
s
u = rsF (η ) , v = rsG (η ) , w = υω H (η ) , p − p∞ = − ρυω P (η ) , η = z (13.11)
υ
In this case, the boundary conditions can be written as
F ( 0 ) = 1, G ( 0 ) = Ω, H ( 0 ) = 0, F ( ∞ ) = 0, G ( ∞ ) = 0 (13.12)
200 Mathematical Modeling for Intelligent Systems
ω
where Ω = represents the rotation strength parameter.
s
A case Ω = 0 represents there is no rotation of the disk and the flow of viscous fluid is
appeared due to only stretching. If only stretching of the plate is present, then the three-
dimensional flow reduces into the two-dimensional flow.
ηbe
dH
∫ W dη + 2F dη = 0
ηae
(13.13)
ηbe
d2 F dF
∫
ηe
a
W 2 − H
dη dη
− F 2 + G 2 dη = 0
(13.14)
ηbe
d 2G dG
∫
ηe
a
W 2 − H
dη dη
− 2 FG dη = 0
(13.15)
(a)
(b)
FIGURE 13.2
(a) Domain of the solution and (b) finite element mesh of the domain
Study of Incompressible Viscous Flow 201
ηbe ηe
dW dF dF dF b
∫
ηae
dη dη + W H
dη
+ W FF − WGG dη = W dη (13.16)
ηae
ηbe ηe
dW dG dG dG b
∫
ηae
dη dη + W H
dη
− 2W FG d η = W dη (13.17)
ηae
The above equations, F, G and H are nonlinear and considered the known quantity using
Lagrange’s interpolation formula. Therefore, the system of equations becomes linear to
obtain the unknown dependent variables.
( )
For a typical element Ωe = ηae , ηbe , we consider the quadratic Lagrange’s interpolation
functions (J. N. Reddy, 2019; Reddy & Gartling, 2010)
3
F (η ) ≈ Fhe (η ) = ∑F ψ
j=1
j
e e
j (η ) (13.18)
G (η ) ≈ Ghe (η ) = ∑G ψ
j=1
e
j
e
j (η ) (13.19)
H (η ) ≈ H he (η ) = ∑H ψ
j=1
e
j
e
j (η ) (13.20)
where ψ ej (η ) are the Lagrange’s interpolation functions. In the present analysis, quadratic
interpolation functions are used, which are defined as follows (J. N. Reddy, 2019):
η 2η 4η η η 2η
ψ 1e (η ) = 1 − 1 − , ψ 2e (η ) = 1 − , ψ 3e (η ) = 1 − (13.21)
he he he he he he
where η denotes the local coordinates. Therefore, the local coordinate η and global coordi-
nate η are related to each other with the linear relation η = η − ηae.
Consider the weight function W = ψ ie (η ), equations (13.13), (13.16), and (13.17) can be
written as
ηbe
∫ ψ e
1
d
dη
( ) (
H 1eψ 1e + H 2eψ 2e + H 3eψ 3e + 2ψ 1e F1eψ 1e + F2eψ 2e + F3eψ 3e )dη = 0 (13.22)
ηae
ηbe
d
∫ ψ e
2
dη
( ) ( )
H 1eψ 1e + H 2eψ 2e + H 3eψ 3e + 2ψ 2e F1eψ 1e + F2eψ 2e + F3eψ 3e dη = 0 (13.23)
ηae
ηbe
d
∫ ψ e
3
dη
( ) ( )
H 1eψ 1e + H 2eψ 2e + H 3eψ 3e + 2ψ 3e F1eψ 1e + F2eψ 2e + F3eψ 3e dη = 0 (13.24)
ηae
202 Mathematical Modeling for Intelligent Systems
ηbe
dψ e d 3
d
3
3
3
∫
d η
1
dη ∑ Fieψ ie + ψ 1e H
dη ∑ Fieψ ie + ψ 1e F
∑ Fieψ ie − ψ 1e G
∑ Gieψ ie dη
ηae i=1 i=1 i= 1 i=1
( )
= ψ 1e ηae Q1e + ψ 1e ηbe Q2e( ) (13.25)
ηbe
dψ 2e d d
3 3 3 3
∫
e dη dη
∑
i= 1
Fieψ ie + ψ 2e H
dη ∑i=1
Fieψ ie + ψ 2e F
∑i= 1
Fieψ ie − ψ 2e G
∑
i=1
Gieψ ie dη
ηa
( ) ( )
= ψ 2e ηae Q1e + ψ 2e ηbe Q2e (13.26)
ηbe
dψ 3e d d
3 3 3 3
∫
dη dη
∑ Fieψ ie + ψ 3e H
dη ∑ Fieψ ie + ψ 3e F
∑ Fieψ ie − ψ 3e G
∑ Gieψ ie dη
ηae i= 1 i=1 i= 1 i=1
( )
= ψ 3e ηae Q1e + ψ 3e ηbe Q2e( ) (13.27)
ηbe
dψ e d 3
d
3
3
∫
d η
1
dη ∑ G ψ + ψ 1e H
e
i
e
i
dη ∑ G ψ − 2ψ 1e F
e
i
e
i
∑ G ψ dη
e
i
e
i
( )
= ψ 1e ηae Q3e + ψ 1e ηbe Q4e ( ) (13.28)
ηbe
dψ e d 3
d
3
3
∫
dη
2
dη ∑ G ψ + ψ 2e H
e
i
e
i
dη ∑ G ψ − 2ψ 2e F
e
i
e
i
∑ G ψ dη
e
i
e
i
ηae
i=1 i=1 i= 1
( )
= ψ 2e ηae Q3e + ψ 2e ηbe Q4e ( ) (13.29)
ηbe
dψ e d 3
d
3
3
∫
d η
3
dη ∑ G ψ + ψ 3e H
e
i
e
i
dη ∑ G ψ − 2ψ 3e F
e
i
e
i
∑ G ψ dη
e
i
e
i
( )
= ψ 3e ηae Q3e + ψ 3e ηbe Q4e ( ) (13.30)
In the above equations Q1e, Q2e, Q3e and Q4e represents the secondary variables. These are
defined as follows:
dF dF dG dG
Q1e = − , Q2e = − , Q3e = − , Q4e = − (13.31)
dη ηae dη η e dη ηae dη ηae
b
Study of Incompressible Viscous Flow 203
A
ij Bij Cij F
e e e
0
D
e
ij E
e
ij Fije G
= Q1 + Q2e
e
(13.32)
H
Q3e + Q4e
M N Oij
e e e
ij ij
ηbe ηbe
dψ ie dψ ej e dψ j
e
e
ij
∫
E = − Gψ iψ j dη , N =
ηae
e
ij
∫
ηae
dη dη + Hψ i
dη
− 2 Fψ iψ j dη
(13.33)
After the assembly of element equations, a set of nonlinear equations can be obtained.
We assume the functions for F and H at a lower iteration level to obtain a system of linear
equations. The present domain of the solution is considered (0,10) to obtain the asymp-
totic solution. If we consider the element length 0.001, then 10,000 element equations
need to assemble through the finite element method. This attempt is used in COMSOL
Multiphysics Software and then automatic Newton is used to obtain the numerical results.
radially stretch of the disk diminishes the azimuthal velocity profile. Figures 13.6 and 13.7
represents the radial and axial velocity profiles for different values of stretching strength
parameter. In this case, the rotation of the disk is considered zero. The stretching of the
disk without rotation produces only a two-dimensional flow. The comparative study of
rotation and stretching indicates that the stretching parameter influences the radial and
axial velocities more than the rotation parameter. Stretching of the disk increases the axial
velocity more than the rotation of the disk as shown in Figures 13.5, 13.7, and 13.10. It rep-
resents the dominance of stretching effects on the velocity.
Figures 13.8–13.10 represent the radial, tangential, and axial velocity profiles, respectively
for variation of the strength of rotation parameter along with constant radial stretching.
Increasing the rotation parameter enlarges the momentum boundary layer. At Ω = 0, the
tangential velocity becomes zero which reduces the three-dimensional boundary layer flow
into the flow in the radial and axial directions only.
Table 13.1 represents the comparison of the finite element method with previous results
(Bachok et al., 2011; Benton, 1966; Cochran, 1934; Kelson & Desseaux, 2000; Turkyilmazoglu,
2014). In references (Benton, 1966; Cochran, 1934), the similarity equations were solved
using power series approximation and recurrence relation method and the solution was
not achieved to a higher degree of accuracy due to the unavailability of a high computa-
tional computer. However, using computational software, the similarity equations were
numerically solved using the finite difference scheme, shooting method, and Runge–Kutta
fourth-order method (Bachok et al., 2011; Kelson & Desseaux, 2000; Turkyilmazoglu, 2014).
Using the finite element method, we obtained the solution with better accuracy in com-
parison to the previous results. The derivative of the radial and tangential velocity profiles
are shown in Figures 13.11 and 13.12.
Tables 13.2 and 13.3 show the values of velocities and derivatives of radial and tangen-
tial velocities. The values of Tables 13.2 and 13.3 can be compared with the finite element
FIGURE 13.3
Influence of stretching on the radial velocity profile.
Study of Incompressible Viscous Flow 205
FIGURE 13.4
Influence of stretching on the tangential velocity profile.
FIGURE 13.5
Influence of stretching on the axial velocity profile.
solution presented in Tables 13.4 and 13.5. The finite element method improves the previ-
ous solution of incompressible viscous flow due to the rotating disk. The degree of accu-
racy is higher as compared to previous methods. The present solution represents better
asymptotic behaviors since the domain of the solution is extended.
206 Mathematical Modeling for Intelligent Systems
FIGURE 13.6
Influence of stretching in the absence of the rotation of the disk on the radial velocity profile.
FIGURE 13.7
Influence of stretching in the absence of the rotation of the disk on the axial velocity profile.
Study of Incompressible Viscous Flow 207
FIGURE 13.8
Influence of rotation of the disk in the presence of constant stretching on the radial velocity profile.
FIGURE 13.9
Influence of rotation of the disk in the presence of constant stretching on the tangential velocity profile.
208 Mathematical Modeling for Intelligent Systems
FIGURE 13.10
Influence of rotation of the disk in the presence of constant stretching on the axial velocity profile.
FIGURE 13.11
Derivative of the radial velocity profile at Ω = 1 and C = 0.
Study of Incompressible Viscous Flow 209
FIGURE 13.12
Derivative of the tangential velocity profile at Ω = 1 and C = 0.
TABLE 13.1
Comparison of the Finite Element Solution with Previous Results
dF dG H∞
dη η = 0 dη η = 0
TABLE 13.2
Steady-State Radial, Tangential and Axial Velocities in Previous Studies
η Benton (1966) Cochran (1934) G Benton (1966) G Cochran (1934) Benton (1966) −H Cochran (1934)
0.50 0.1536 0.154 0.7076 0.708 0.0919 0.092
1.0 0.1802 0–180 0.4766 0.468 0.2655 0.266
1.5 0.1559 0–156 0.3132 0.313 0.4357 0.435
2 0.1189 0–118 0.2033 0.203 0.5732 0.572
2.5 0.0848 0–084 01313 0.131 0.6745 0.674
3 0.0581 0–058 0.0845 0.083 0.7452 0.746
3.5 0.0389 – 0.0544 – 0.7851 –
4 0.0257 0–026 0.0349 0.035 0.8251 0.826
210 Mathematical Modeling for Intelligent Systems
TABLE 13.3
Derivative of Radial and Tangential Velocities in Previous Investigations
η dF Benton (1966) dF Cochran (1934) dG Benton (1966) dG Cochran (1934)
− −
dη dη dη dη
TABLE 13.4
Steady-State Radial, Tangential, and Axial Velocities Obtained Through Finite Element Procedure
η F G H
0.50 0.1536131403 0.7075852568 −0.0918753802
1.0 0.1801341021 0.4766341550 −0.2654525478
1.5 0.1558260932 0.3129478876 −0.3189416011
2 0.1187269872 0.2031634678 −0.5733460188
2.5 0.0846300712 0.1311306716 −0.6744852792
3 0.0579977303 0.0844028956 −0.7451407153
3.5 0.0387932911 0.0542459886 −0.7929703003
4 0.0255481732 0.0348269501 −0.8247142674
4.5 0.0166514271 0.0223339711 −0.8455125851
5 0.0107715388 0.0142996297 −0.8590187475
5.5 0.0069307523 0.00913324178 −0.8677299880
6 0.0044236713 0.00581107831 −0.8733141462
6.5 0.0028043468 0.0036747368 −0.8768694802
7 0.0017585143 0.0023008742 −0.8791128449
7.5 0.0010841529 0.0014173033 −0.8805095641
8 6.497563E-4 8.4901977E-4 −0.8813606353
8.5 3.701088E-4 4.8349759E-4 −0.8818603319
9 1.901497E-4 2.483802E-4 −0.8821338701
9.5 7.436672E-5 9.71374E-5 −0.8822618862
10 0 0 −0.8822962810
Study of Incompressible Viscous Flow 211
TABLE 13.5
Derivative of Radial and Tangential Velocities Through Finite Element Procedure
η dF dG
−
dη
dη
0.50 0.1467227786 0.5321338435
1.0 −0.0157293502 0.3911387287
1.5 −0.0693942529 0.2675140128
2 −0.0739028582 0.1770084427
2.5 −0.0611822145 0.1152706230
3 −0.0454564158 0.0745204320
3.5 −0.0318893113 0.0480213081
4 −0.0216399180 0.0309029877
4.5 −0.0143921656 0.0198760889
5 −0.0094532799 0.0127814181
5.5 −0.0061608755 0.0082188276
6 −0.0039953788 0.0052850668
6.5 −0.0025829536 0.0033986920
7 −0.0016665482 0.0021857371
7.5 −0.001073940 0.0014057558
8 −6.915250E-4 9.041639E-4
8.5 −4.450734E-4 5.815783E-4
9 −2.863757E-4 3.741021E-4
9.5 −1.842369E-4 2.406515E-4
10 −1.1862427E-4 1.549458E-4
13.5 Conclusion
The present investigation describes the flow of viscous fluid over a rotating and stretch-
ing plate. Without rotation of the plate, the three-dimensional flow reduces into a two-
dimensional flow case. However, in the absence of the stretching, the flow remains
three-dimensional. The present results show that the influence of stretching on the radial
and axial velocity profiles is more dominant than the rotation of the disk. The results in the
present solution are improved to a higher degree of accuracy as compared to the previous
studies.
212 Mathematical Modeling for Intelligent Systems
References
Aboul-Hassan, A. L., & Attia, H. A. (1997). Flow due to a rotating disk with Hall effect. Physics Letters,
Section A: General, Atomic and Solid State Physics, 228(4–5), 286–290. https://doi.org/10.1016/
S0375–9601(97)00086–8
Anjos, G. R., Mangiavacchi, N., & Pontes, J. (2014). Three-dimensional finite element method for
rotating disk flows. Journal of the Brazilian Society of Mechanical Sciences and Engineering, 36(4),
709–724. https://doi.org/10.1007/s40430-013-0120–0
Bachok, N., Ishak, A., & Pop, I. (2011). Flow and heat transfer over a rotating porous disk in a
nanofluid. Physica B: Physics of Condensed Matter, 406(9), 1767–1772. https://doi.org/10.1016/j.
physb.2011.02.024
Bar-Yoseph, P., & Olek, S. (1984). Asymptotic and finite element approximations for heat transfer in
rotating compressible flow over an infinite porous disk. Computers and Fluids, 12(3), 177–197.
https://doi.org/10.1016/0045–7930(84)90003–3
Benton, E. R. (1966). On the flow due to a rotating disk. Journal of Fluid Mechanics, 24(4), 781–800.
https://doi.org/10.1017/S0022112066001009
Bhandari, A. (2020). Effect of magnetic field dependent viscosity on the unsteady ferrofluid flow due
to a rotating disk. International Journal of Applied Mechanics and Engineering, 25(2), 22–39. https://
doi.org/10.2478/ijame–2020–0018
Cochran, W. G. (1934). The flow due to a rotating disc. Mathematical Proceedings of the Cambridge
Philosophical Society, 30(3), 365–375. https://doi.org/10.1017/S0305004100012561
Feistauer, M., Felcman, J., Rokyta, M., & Vlášek, Z. (1992). Finite-element solution of flow prob-
lems with trailing conditions. Journal of Computational and Applied Mathematics, 44(2), 131–166.
https://doi.org/10.1016/0377–0427(92)90008–L
Gupta, D., Kumar, L., Anwar Bég, O., & Singh, B. (2018). Finite element analysis of MHD flow of
micropolar fluid over a shrinking sheet with a convective surface boundary condition. Journal
of Engineering Thermophysics, 27(2), 202–220. https://doi.org/10.1134/S1810232818020078
Kelson, N., & Desseaux, A. (2000). Note on porous rotating disk flow. ANZIAM Journal, 42, 837.
https://doi.org/10.21914/anziamj.v42i0.624
Ram, P., & Bhandari, A. (2013). Negative viscosity effects on ferrofluid flow due to a rotating disk.
International Journal of Applied Electromagnetics and Mechanics, 41(4), 467–478. https://doi.
org/10.3233/JAE–121637
Rashidi, M. M., Hayat, T., Erfani, E., Mohimanian Pour, S. A., & Hendi, A. A. (2011). Simultaneous
effects of partial slip and thermal-diffusion and diffusion-thermo on steady MHD convective
flow due to a rotating disk. Communications in Nonlinear Science and Numerical Simulation, 16(11),
4303–4317. https://doi.org/10.1016/j.cnsns.2011.03.015
Rashidi, M. M., Mohimanian Pour, S. A., Hayat, T., & Obaidat, S. (2012). Analytic approximate solu-
tions for steady flow over a rotating disk in porous medium with heat transfer by homotopy
analysis method. Computers and Fluids, 54(1), 1–9. https://doi.org/10.1016/j.compfluid.2011.08.001
Reddy, J. N. (2019). Introduction to the Finite Element Method, Fourth Edition. https://www.accessengi-
neeringlibrary.com/content/book/9781259861901
Reddy, J. N., & Gartling, D. K. (2010). The finite element method in heat transfer and fluid dynam-
ics. In The Finite Element Method in Heat Transfer and Fluid Dynamics, Third Edition. https://
books.google.co.in/books?hl=en&lr=&id=sv0VKLL5lWUC&oi=fnd&pg=PP1&dq=Finite+el
ement+method+in+Fluid+Mechanics+JN+Reddy&ots=r-MY7AjsSs&sig=OrMQdhVV45vXpS
oYkzaOa_z-qIU&redir_esc=y#v=onepage&q=Finite element method in Fluid Mechanics JN
Reddy&f=false
Reddy, J. N., Nampally, P., & Srinivasa, A. R. (2020). Nonlinear analysis of functionally graded beams
using the dual mesh finite domain method and the finite element method. International Journal
of Non-Linear Mechanics, 127. https://doi.org/10.1016/j.ijnonlinmec.2020.103575
Study of Incompressible Viscous Flow 213
Manu Devi
Motherhood University
Dhananjay Yadav
University of Nizwa
Vivek Kumar
Shri Guru Ram Rai (PG) College
A. K. Singh
VIT University
CONTENTS
14.1 Introduction ........................................................................................................................ 215
14.2 Formulation of the Problem ............................................................................................. 217
14.3 Viscoelastic Potential Flow (VPF) Analysis ................................................................... 218
14.4 Viscoelastic Contribution for the Viscoelastic Potential Flow (VCVPF) Analysis ... 219
14.5 Dissipation Calculation for the Cylindrical Jet of Viscoelastic Fluid .........................222
14.6 Dimensionless Form of the Dispersion Relation ........................................................... 224
14.7 Results and Discussions ................................................................................................... 227
14.8 Conclusions......................................................................................................................... 229
References..................................................................................................................................... 229
14.1 Introduction
It is necessary to know the breakup behavior of liquid jet of non-Newtonian fluids because
this phenomenon has many engineering applications, including fertilizers, inkjets, paint
leveling, and roll coating, etc. The cylindrical free surface containing jets of viscoelastic
fluids can be applied in many engineering processes such as oil-drilling fiber spinning,
bottle-filling, etc.
Viscoelastic fluids are non-Newtonian fluids that can display a response that resem-
bles that of a viscous liquid under some circumstances or the response of an elastic solid
under other circumstances. The most common type of fluids with visco-elasticity is poly-
meric liquids: melts and solutions of polymers. Middleman [1] considered the stability of
a jet in the cylindrical flow of three-constant linearized Oldroyd fluid for axisymmetric
disturbances in an inviscid medium. Goldin et al. [2] extended the study of Middleman
[1] for the generalized viscoelastic material. Bousfield et al. [3] considered the combined
effect of nonlinearity and surface tension on the breakup of viscoelastic filament. Later,
Chang et al. [4] extended the outcomes of Bousfield et al. [3] by performing an extended
wave investigation of the stretching dynamics of bead string filament for FENE as well as
Oldroyd-B fluids. Brenn et al. [5] analyzed the stability of non-Newtonian liquid linearly
taking the effects of aerodynamic forces as well as surface tension. El-Dib and Moatimid
[6] investigated the instability of a cylindrical interface of viscoelastic fluids which sup-
ports free-surface currents. Moatimid [7] also considered the nonlinear instability of two
dielectric viscoelastic fluids. The linear stability investigation of a viscoelastic liquid jet
has been studied by Liu and Liu [8,9] taking both symmetrical as well as unsymmetrical
disturbances.
In 1994, Joseph and Liao [10] have given the idea of viscoelastic flow theory. In the visco-
elastic flow concept, tangential elements of stresses which are irrotational assumed to be
zero and normal stresses balance has to include viscosity. This concept does not require
a no-slip condition at rigid boundaries. Several vorticity and theorems of circulation of
inviscid potential flow are also valid in viscous potential flow theory. At some finite value
of Reynolds number, viscous potential flow theory produces excellent physical results
in many cases. A theory, in which both pressure and motion are irrotational and nor-
mal stresses balance equation was used to include viscosity at the interface, is termed as
viscoelastic potential flow (VPF). The stability of viscous liquid jets into incompressible
and viscous gases and liquids using viscous flow theory has been measured by Funada
et al. [11]. They showed that instability may be motivated by Kelvin–Helmholtz instability
(KHI) because of the difference in the velocity at the interface and a neck-down because of
capillary instability.
At the high Weber number, the Rayleigh–Taylor stability of viscoelastic fluids was exam-
ined by Joseph et al. [12]. They found that the majority of unstable waves, are the functions
of the retardation time and it fits into experimental data excellently if the ratio of the relax-
ation time to that of retardation time is of order 103. Funada and Joseph [13] study capillary
instability of viscoelastic fluid of Maxwell-type and observe that the growth is bigger for
the viscoelastic fluid as compared to the similar Newtonian fluids. The stability of a cylin-
drical jet of viscoelastic fluid has been considered by Awasthi et al. [14] using potential
theory and observed that the elastic property enhances the instability.
If the analysis is based on VPF theory; normal stresses balance has to include viscosity
and there is no contribution of the tangential element of viscous stresses. An additional
way to analyze the stability of viscous fluids by using potential flow is the dissipation
approximation. The dissipation approximation is based on an assessment of the equa-
tions that govern the progress of energy in fields. The coefficient of the dissipation integral
includes viscosity and estimates, certain viscous stress at the boundaries. This technique
has been used by Lamb [15] and by Funada et al. [16] to study the stability of cylindrical
incompressible jet into incompressible fluids, and also by Wang et al. [17,18] to analyze the
capillary instability of two liquids.
These two theories, VPF and DM, are not the same and, therefore, it is important to
study the difference between the VPF and dissipation approximation. It was established
Instability of a Viscoelastic Cylindrical Jet 217
by Joseph et al. [19] that the above two theories could provide identical observations if
extra viscous stress in terms of a viscoelastic modification of the extra irrotational pres-
sure, which was computed through a technique based on the concept that this extra con-
tribution is developed in a very thin boundary layer. The theory based on added extra
pressure, which gives almost identical results as given by dissipation approximation, is
termed VCVPF (viscoelastic contribution of VPF). Therefore, VCVPF is the VPF adding
extra pressure. In this paper, we use VCVPF to study the stability of a cylindrical jet of
viscoelastic fluid moving in a viscous medium.
f (r , θ , z, t) = r − R − η (θ , z, t ) = 0. (14.1)
−1/2
∂η 1 ∂η ∂η
2 2
1 ∂η
n = er − eθ − e z 1 + + (14.2)
r ∂θ ∂ z r ∂θ ∂ z
where ez , er and eθ are unit vectors along the z, r, and θ directions, respectively.
In the present analysis, the velocity can be denoted as the gradient of some potential
function and the potential functions always satisfy the Laplace equation because the fluids
are incompressible, i.e.,
∇ 2φ j = 0, ( j = 1, 2) (14.3)
∂2 1 ∂ 1 ∂2 ∂2
where ∇ 2 = + + 2 + 2.
∂r 2
r ∂r r ∂θ 2
∂z
We assume that every particle, which is on the interface currently, will remain on the
interface throughout the analysis, we derive the following kinematic conditions:
∂η ∂η ∂φ1
+U = at r = R (14.4)
∂t ∂z ∂r
∂η ∂φ2
= at r = R (14.5)
∂t ∂r
218 Mathematical Modeling for Intelligent Systems
Using normal mode technique and taking the help of kinematics boundary conditions
equations (14.4) and (14.5), the solution of equation (14.3) can be expressed as
where C denotes complex constant, m is the positive integer, k represents real wave num-
I ( kr ) K ( kr )
ber. ω represents growth rate and E1 ( kr ) = n , E2 ( kr ) = n . I n ( kr ) and K n ( kr ) are
I n′ ( kR) K n′ ( kR)
the modified Bessel’s function of first and second kind of order n, respectively, and c.c.
denotes the complex conjugate of the previous term.
Here, we consider the fluid is of the Oldroyd-B type [13] because it has a feature that
combines the effects of relaxation and nonlinearity, with a relative case of execution, better
than any other viscoelastic fluid. The governing equation of the linear viscoelastic fluid of
Oldroyd-B type is written as
∂ ∂
1 + λ1 ∂t τ = 2 µ1 1 + λ2 ∂t γ , (14.9)
where τ denotes viscous stress tensor, µ1 represents viscosity, γ denotes strain tensor, and
λ2 and λ1 are the retardation and relaxation time, respectively.
∂ 2 φ1 ∂ 2 φ2 ∂2 η 1 ∂2 η η
p1 − p2 − 2 µ1 + 2 µ 2 = −σ ∂z 2 + r 2 ∂θ 2 + R 2 (14.10)
∂r 2 ∂r 2
where p j ( j = 1, 2) represent the pressure for the inner and outer fluid, respectively. If we
use the equation given by Bernoulli for irrotational flow and linearize it, we have
∂φ1 ∂φ ∂φ ∂2 φ ∂ 2 φ2
− ρ1 ( + U 1 ) + ρ2 ( 2 ) − 2 µ1 21 + 2 µ2
∂t ∂z ∂t ∂r ∂r 2
(14.11)
∂2 η 1 ∂2 η η
= −σ 2 + 2 +
∂z r ∂θ 2 R 2
n2 − 1
ρ1 (ω − kU )2 E1 ( kR) − ω 2 ρ2 E2 ( kR) − 2 iµ1 k 2 ( kU − ω )F1 ( kR) − 2 iµ2 k 2ω F2 ( kR) = σ k 2 +
R 2
(14.12)
Instability of a Viscoelastic Cylindrical Jet 219
I n′′( kR) n2 1
where F1 ( kR) = = 1 + 2 2 E1 ( kR) −
I n′ ( kR) k R kR
K n′′( kR) n2 1
F2 ( kR) = = 1 + 2 2 E2 ( kR) −
K n′ ( kR) k R kR
Since the inside fluid is viscoelastic fluid of Oldroyd-B type, viscosity µ1 is modified as
1 − iλ2ω
µ1 .
1 − iλ1ω
Using the expression for µ 1 in equation (14.12), the dispersion relation for the VPF analy-
sis can be written as
where
a2 = −2 kλ1Uρ1E1 ( kR)
n2 − 1
a1 = λ1 k 2U 2 ρ1E1 ( kR) − σ k( k 2 + ) − 2 k 2 ( µ1 F1 ( kR) − µ2 F2 ( kR))
R 2
a0 = 2 k 3Uµ1 F1 ( kR)
n2 − 1
b0 = k 2U 2 ρ1E1 ( kR) − σ k(k 2 + )
R2
The mechanical energy balance equations for outer and inner fluids are as follows;
d ρ2
∫2 ∫ ( u ⋅ T ⋅ n )dA − ∫ 2µ D
2
u2 dV = 2 2 2 2 : D2 dV
dt
V2 A V2
(14.14)
=−
∫(
A
u2 ⋅ n1 (− p2i + τ 2n ) + u2 ⋅ t τ 2s dV − ) ∫
V2
2 µ2 D2 : D2 dV
d ρ1
∫2 ∫ ( u ⋅ T ⋅ n )dA − ∫ 2µ D : D
2
u1 dV = 1 1 1 1 1 dV
dt
V1 A V1
(14.15)
=
∫ ( u ⋅ n (− p
A
1 1
i
1 + τ ) + u1 ⋅ t τ
n
1
s
1 ) dV − ∫ 2 µ D
V1
1 1 : D1 dV
where D j ( j = 1, 2) represents the symmetric component of the rate of strain tensor for inner
and outer fluids, respectively.
As the normal components of velocities are continuous at the interface, we have
u2 ⋅ n1 = u1 ⋅ n1 = un,
d ρ2 d ρ1
∫2 ∫2 ∫ ( u (− p )
2 2
u2 dV + u1 dV = n
i
1 + τ 1n + p2i − τ 2n ) + u2 ⋅ t τ 2s − u1 ⋅ t τ 1s dA
dt dt
V2 V1 A
(14.16)
−
∫ 2µ D
V2
2 2 : D2 dV −
∫ 2µ D : D dV
V1
1 1 1
If we introduce two viscoelastic pressure terms, namely, p1v and p2v for the inner and outer
flow, the horizontal velocity and shear stress will be continuous at the interface, and,
therefore,
u2 ⋅ t = u1 ⋅ t = us and τ1s = τ s2 = τ s
Here, we have taken an assumption that the boundary layer estimate has an insignificant
outcome on the flow in the bulk liquid, but it disturbs the continuity and pressure condi-
tions at the interface. Therefore, the equation (14.16) can be written as
d ρ2 d ρ1
∫2 ∫2 ∫ ( u (− p )
2 2
u2 dV + u1 dV = n
i
1 − p1v + τ 1n + p2i + p2v − τ 2n ) dA
dt dt
V2 V1 A
(14.17)
−
∫
V2
2 µ2 D2 : D2 dV −
∫
V1
2 µ1 D1 : D1 dV
Now we can obtain a relation between irrotational shear stresses and viscoelastic pressure
from equations (14.16) and (14.17)
Instability of a Viscoelastic Cylindrical Jet 221
We consider here that an extra pressure termed as viscoelastic pressure will be present in
the normal stress balance equation with irrotational pressures and, therefore, the normal
stress balance equation can be written as
∂ 2 φ1 ∂ 2 φ2 ∂2 η 1 ∂2 η η
p1i + p1v − p2i − p2v − 2 µ1 + 2 µ = −σ + + (14.23)
∂z 2 r 2 ∂θ 2 R 2
2
∂r 2 ∂r 2
where p ij denote irrotational pressure, p vj representing viscous pressure for inner and outer
fluid ( j = 1, 2), respectively.
To find irrotational pressure, we use Bernoulli’s equation and then linearizing it, we
have
∂φ ∂φ ∂φ ∂2 φ ∂ 2 φ2 ∂2 η 1 ∂2 η η
− ρ1 1 + U 1 + p1v + ρ2 2 − p2v − 2 µ1 21 + 2 µ2 = −σ 2 + 2 +
∂t ∂z ∂t ∂r ∂r 2
∂z r ∂θ 2 R 2
(14.24)
Putting the values of η , φ1 ,φ2 and contribution of viscous pressure in equation (14.24) we
get the expression
n2 − 1 (14.26)
( F1 (kR) + E1 (kR)) − 2iµ2 k 2ω ( F2 (kR) + E2 (kR)) = σ k 2 +
R 2
222 Mathematical Modeling for Intelligent Systems
Since the inside fluid is viscoelastic fluid of Oldroyd-B type so viscosity µ1 is modified as
1 − iλ2ω
µ1 .
1 − iλ1ω
Using the expression for µ1 in equation (14.26), the dispersion relation for VCVPF solu-
tion is expressed as:
where
a2 = −2 kλ1Uρ1E1 ( kR)
n2 − 1
a1 = λ1 k 2U 2 ρ1E1 ( kR) − σ k( k 2 + )
R 2
n2 − 1
b0 = k 2U 2 ρ1E1 ( kR) − σ k(k 2 + )
R2
d ρ2 d ρ1
∫2 ∫2 ∫ u (− p
2 2
u2 dV + u1 dV = n
i
1 + τ 1n + p2i − τ 2n ) + u2 ⋅ t τ 2s − u1 ⋅ t τ 1s dA
dt dt
V2 V1 A
(14.28)
−
∫ 2µ D
V2
2 2 : D2 dV −
∫ 2µ D : D dV
V1
1 1 1
Instability of a Viscoelastic Cylindrical Jet 223
Here, we consider the annular cylinder together with the surface r = R; the length
of the cylinder is taken as λ . Therefore, the volume of the inner cylinder is written as
2π R z+λ
V1 =
0 0
∫∫ ∫
z
r dθ dr dz.
2π ∞ z+λ
Similarly, the volume of the outer cylinder is given by V2 =
0 R z
r dθ dr dz
∫∫ ∫
The conservation equation of momentum in linear form is expressed as
∂2 η 1 ∂2 η η
p2 − τ 2n − p1 + τ 2n = σ 2 + 2 + (14.29)
∂z R ∂θ 2 R 2
and also we know that horizontal velocity and stresses are continuous at the interface, i.e.,
u2 ⋅ t = u1 ⋅ t = us , τ 2s = τ 1s = τ s (14.30)
Here, the potential flow theory approximates the flows of the fluids, and therefore, we can
use Gauss’s divergence theorem, i.e.,
∫ 2 µ D : D dV = ∫ n ⋅ 2 µ D ⋅ u dA (14.31)
V A
where V is the volume bounded by the surface A and n represents outward unit normal
vector. Putting equations (14.29)–(14.31) into equation (14.28), we obtain
d ρ2 d ρ1 2 ∂2 η 1 ∂2 η η
∫ ∫ ∫
2
u2 dV + u1 dV = unσ 2 + 2 + dA
dt 2 dt 2 ∂z R ∂θ 2 R 2
V2 V1 A
(14.32)
+
∫ n ⋅ 2µ D ⋅ u dA − ∫ n ⋅ 2µ D ⋅ u dA
A
1 2 2 2
A
1 1 1 1
2π z+λ ∞
d ρ2 ρ2 ∂
∫ ∫0 ∫z R∫ 2 ∂t u
2 2
u2 dV = 2 r dθ dzdr
dt 2
V2
(14.33)
R α α 2
= 2 iπωρ2 λ − iω + iω C E2 ( kR)exp i (ω − ω ) t
k ρ2 ρ2
2π z+λ R
d ρ1 2 ρ1 ∂ ∂
∫ ∫0 ∫z ∫0 2 ∂t + U ∂z u
2
u1 dV = 1 r dθ dzdr
dt 2
V1
(14.34)
R α α
= πρ1 λ ( 2ikU − 2iω ) + ikU − iω − ikU + iω C 2 E1 (kR) exp i (ω − ω ) t
k ρ1 ρ1
224 Mathematical Modeling for Intelligent Systems
∂2 η 1 ∂2 η η
∫ unσ 2 + 2
A
∂z
+ dA
R ∂θ 2 R 2
2π z+ λ
n2 1 α 2
=
∫0 dθ
∫z σ − k 2 − 2 + 2 − ikU + iω C E1′ ( kR) exp i (ω − ω ) t rdz
R R ρ1
(14.35)
n2 1 α 2
= 2πλ Rσ − k 2 − 2 + 2 − ikU + iω C exp i (ω − ω ) t
R R ρ1
∫ n1 ⋅ 2 µ2 D2 ⋅ u2 dA
A
(14.36)
α α 2
= 4πλµ2 kR − iω + iω C ( F2 ( kR) + E2 ( kR)) exp i (ω − ω ) t
ρ ρ
2 2
∫ n1 ⋅ 2 µ1 D1 ⋅ u1 dA
A
(14.37)
α α 2
= 4πλµ1 kR + ikU − iω − ikU + iω C ( F1 ( kR) + E1 ( kR)) exp i (ω − ω ) t
ρ 1 ρ 1
Putting the values from equations (14.33)–(14.37) into equation (14.32) and using the con-
cept that normal velocity is continuous at the interface, we have
α α n2 1
ρ1 + ikU − iω ( ikU − iω ) E1 ( kR) − ρ2 − iω × ( − iω ) E2 ( kR) = kσ − k 2 − 2 + 2
ρ1 ρ2 R R
α α
+2 µ2 k 2 − iω × ( F2 ( kR) + E2 ( kR)) − 2 µ1 k 2 + ikU − iω ( F1 ( kR) + E1 ( kR)) (14.38)
ρ2 ρ1
1 − iλ2ω
By putting µ1 at the place of µ1, we are getting the same dispersion relation as we
1 − iλ1ω
obtain in VCVPF analysis.
R 1 ˆ ρ (1)VD ρ (1) DV 2 U
Rˆ = = , k = kD, Re = , W= , Uˆ =
D 2 µ (1) σ V
Instability of a Viscoelastic Cylindrical Jet 225
where Re denotes the Reynolds number that is defined as the ratio of inertia forces to vis-
cous forces. The ratio of the inertia force to the surface tension force is known as Weber
number and it is denoted by W . Here, Λ 1 denotes The Deborah number and is defined as
the ratio of relaxation time to the characteristic time scale. ρ̂ and µ̂ represents the density
ratio and viscosity ratio, respectively.
The dimensionless form of the dispersion relation for the VPF analysis is written as
( ) ( ) (
aˆ 3ωˆ 3 + aˆ 2 + ibˆ2 ωˆ 2 + aˆ 1 + ibˆ1 ω̂ + aˆ 0 + ibˆ0 = 0 ) (14.39)
where
( ˆ
aˆ 3 = Λ 1 E1 ( k̂/2) − ρˆ E2 ( k/2) )
aˆ 2 = −2 kˆUˆ Λ 1E1 (k̂/2)
(
bˆ2 = E1 ( kˆ/2) − ρˆ E2 ( kˆ/2) +
2k̂ 2
Re
) (
Λ 2 F1 ( kˆ/2) − Λ 1 µˆ F2 ( kˆ/2) )
2kˆ 2
(
aˆ 3 = Λ 1 kˆ 2Uˆ 2 E1 (kˆ/2) − W −1 kˆ( kˆ 2 + 4(n2 − 1)) −
Re
) (
F1 ( kˆ/2) − µ̂ F2 ( kˆ/2) )
3
ˆ ˆ ( kˆ/2) − Λ 2k̂ UF
bˆ1 = −2kUE ˆ
ˆ 1 (k/2)
1 2
Re
2k 3 ˆ ˆ
â0 = UF1 (k/2)
Re
( ) ( ) (
aˆ 3ωˆ 3 + aˆ 2 + ibˆ2 ωˆ 2 + aˆ 1 + ibˆ1 ω̂ + aˆ 0 + ibˆ0 = 0 ) (14.40)
( ˆ
where aˆ 3 = Λ 1 E1 ( k̂/2) − ρˆ E2 ( k/2) )
aˆ 2 = −2 kˆUˆ Λ 1E1 ( k/2)
ˆ
(
b̂2 = E1 ( kˆ/2) − ρˆ E2 ( kˆ/2) )
+
2kˆ 2
Re ( ( ) (
Λ 2 F1 ( kˆ/2) + E1 ( kˆ/2) − Λ 1 µˆ F2 ( kˆ/2) + E2 ( k/2)
ˆ
))
226 Mathematical Modeling for Intelligent Systems
(
aˆ 1 = Λ 1 kˆ 2Uˆ 2 E1 (kˆ/2) − W −1 kˆ( kˆ 2 + 4(n2 − 1)) )
−
2kˆ 2
Re (( F (kˆ/2) + E (k/2)
1
ˆ
1 ) − µ̂ ( F (kˆ/2) + E (k/2)
2
ˆ
))
2
ˆ3
1 2
Re
1 1 (
ˆ ˆ ( kˆ/2) − Λ 2k Uˆ F ( kˆ/2) + E (k/2)
bˆ1 = −2kUE ˆ
)
â0 =
2k 3 ˆ
Re
(
U F1 (kˆ/2) + E1 (k/2)
ˆ
)
b̂0 = kˆ 2Uˆ 2 E1 ( kˆ/2) − W −1 kˆ(kˆ 2 + 4(n2 − 1))
In the case of inviscid viscoelastic fluid (Re → ∞), the VPF and VCVPF solution gives the
same dispersion relation. From the above two expressions, it can also be observed that the
VCVPF and VPF give the same solution at the higher values of W −1, while the difference
between the two theories increases at the smaller values of W −1.
For axisymmetric disturbances, i.e., for n = 0, the dimensionless dispersion relation
becomes
2kˆ 2
1 (α 1 + ρ̂α 2 ) ωˆ + ωˆ −2kUΛ 1α 1 + i (α 1 + ρˆ α 2 ) + Re (Λ 1 µˆ ( β 2 + α 2 ) + Λ 2 ( β1 + α 1 ))
Λ 3 2 ˆˆ
ˆ3
ˆ ˆ α − i 2k Λ Uˆ ( β + α ) ωˆ
( )
2
ˆ ˆ 2 − 4)) − 2 k (( β + α ) + µˆ ( β + α )) − 2 ikU
+ Λ 1 kˆ 2Uˆ 2α 1 − W −1 k(k 1 1 2 2 1 2 1 1
Re Re
2k 3 ˆ
+
Re
( ˆ ˆ 2 − 4) = 0
U ( β1 + α 1 ) + i kˆ 2Uˆ 2α l − W −1 k(k
) (14.41)
If we put Deborah number Λ 1 = Λ 2 and Û = 1 in the equation (14.41), the dispersion relation
becomes
2 kˆ 2
(α l + ρˆ α a )ωˆ 2 + −2kˆα l + i (( β1 + α 1 ) + µ̂ ( β 2 + α 2 )) ω̂
Re
(14.42)
2k 3
+ kˆ 2α l − i ( β1 + α 1 ) − W −1 kˆ(kˆ 2 − 4) = 0
Re
TABLE 14.1
Viscoelastic Fluid Parameters and Their Properties
2% PAA 2% PO
ρ1 (g/cm )
3 0.99 0.99
µ1 ( P ) 96.0 350.0
ρ2 (g/cm 3 ) 1.947 × 10−3 1.776 × 10−3
µ2 ( P) 1.8 × 10 −4 1.8 × 10−4
σ (dyn cm )−1 45.0 63.0
λ1 (s) 0.039 0.21
λ2 (s) 0.0 0.0
V(cm/s) 0.4688 0.18
Re 206.8466 1964.10
W 206.8246 1964.10
ρ̂ 1.967 × 10−3 1.794 × 10−3
µ̂ 1.875 × 10−6 5.143 × 10−7
Λ1 0.01828 0.0378
Λ2 0.0 0.0
228 Mathematical Modeling for Intelligent Systems
In Figure 14.1(a), the viscoelastic fluid (2% PAA) is taken while (2% PO) is considered in
Figure 14.1(b). It has been found that the highest growth rates for the VCVPF solution are
almost identical to the VPF solution for lower values of Weber number. At the larger values
of Weber number, the maximum growth rate obtained in the VCVPF solution is lower as
compared to the maximum growth rate obtained in the VPF solution. This concludes that
at low Weber number, the VPF and VCVPF solutions are the same but as Weber number
increases, the VCVPF solution most stable waves. The VPF solution only contains the effect
of normal stresses, while in the VCVPF solution, the effect of both normal and tangen-
tial stresses is included. Therefore, it is concluded that the effect of horizontal irrotational
stresses resists the breakup of the viscoelastic liquid jet.
Figure 14.2 compares the highest growth rate curves for the VCVPF and VPF analysis
for the asymmetric disturbances. Figure 14.2(a) is drawn for (2% PAA) viscoelastic fluid
and (2% PO) is considered in Figure 14.2(b). Here, we also obtain that the highest growth
rate obtained in the VCVPF solution is nearly the same as obtained for the VPF solution;
however, at larger values of Weber number, the VPF solution is less stable.
FIGURE 14.1
Comparison of highest growth rate curves versus Weber number for VCVPF solution and VPF solution for
axisymmetric disturbances (a) viscoelastic jet (2% PAA) and (b) viscoelastic jet (2% PO).
FIGURE 14.2
Comparison of highest growth rate curves versus Weber number for VCVPF solution and VPF solution for
asymmetric disturbances (a) viscoelastic jet (2% PAA) and (b) viscoelastic jet (2% PO).
Instability of a Viscoelastic Cylindrical Jet 229
14.8 Conclusions
The temporal stability behavior of viscoelastic cylindrical jet with both asymmetric and
axisymmetric perturbations in an infinite viscous fluid has been studied by taking the
assumption that the motion in the fluids is irrotational. In the earlier theory (VPF), the
stability of the viscoelastic cylindrical jet was investigated taking the assumption that both
pressure and motion are irrotational and normal stresses balance equation was used to
include viscosity at the interface (Awasthi et al. [14]). Here, a different irrotational theory
identified as the VCVPF which incorporates the differences in the shearing stresses and
horizontal velocities at the plane interface is used to study the instability of viscoelastic
cylindrical jet. The key results are given as follows:
1. The dispersion relation found in the dissipation approximation is the one that
comes in the VCVPF solution.
2. In both the theories, the breakup is dominated by capillary instability if Weber’s
number is low and by KHI if the Weber number is very large.
3. The discrepancy between VCVPF and VPF is significant when the Weber number
is large and the Reynolds number is small.
4. The difference between the two theories is irrelevant if capillary instability is
dominant and is reasonable when KHI dominates.
References
1. Middleman, S., Stability of a viscoelastic jet, Chem. Eng. Sci., 20 (1965) 1037–1040.
2. Goldin, M., Yerushalmi J., Pfeffer, R. and Shinaar, R., Breakup of laminar capillary jet of visco-
elastic fluid, J. Fluid Mech. 38 (1969) 689–711.
3. Bousfield, D.W., Keunings, R., Marruci, G. and Denn, M. M., Nonlinear analysis of surface
driven breakup of viscoelastic filaments, J. Non-Newtonian Fluid Mech. 21(1986) 79–97.
4. Chang, H. C., Demekhin, E. A. and Kalaidin, E., Interated stretching of viscoelastic jets, Phy.
Fluids. 11(7) (1986) 1717–1737.
5. Brenn, G., Liu, Z. and Durst, F., Linear analysis of temporal instability of axisymmetrical non-
Newtonian liquid jets, Int. J. Multiph. Flow 26 (2000) 1621–1644.
6. El-Dib, Y. O. and Moatimid, G.M., The instability of a viscoelastic conducting cylindrical inter-
faces supporting free-surface currents, Z. Naturforsch A 57 (2002) 159–176.
7. Moatimid, G. M., Non-linear instability of two dielectric viscoelastic fluids, Can. J. Phys. 82
(2004) 1109–1133.
8. Liu, Z. and Liu, Z., Linear analysis of three-dimensional instability of non-Newtonian liquid
jets, J. Fluid Mech. 559 (2006) 451–459.
9. Liu, Z. and Liu, Z., Instability of viscoelastic liquid jet with axisymmetric and asymmetric
disturbances, Int. J. Multiph. Flow 34 (2008) 42–60.
10. Joseph, D.D. and Liao, T., Potential flows of viscous and viscoelastic fluids, J. Fluid Mech. 256
(1994) 1–23.
11. Funada, T., Joseph, D. D. and Yamashita, S., Stability of liquid jet into incompressible gases and
liquids, Int. J. Multiph. Flow 30 (2004) 1177–1208.
12. Joseph, D. D., Beavers, G. S. and Funada, T., Rayleigh-Taylor instability of viscoelastic drops at
high weber numbers, J. Fluid Mech. 453(2002) 109–132.
230 Mathematical Modeling for Intelligent Systems
13. Funada, T. and Joseph, D. D., Viscoelastic potential flow analysis of capillary instability, J. Non-
Newtonian Fluid Mech. 111(2003) 87–105.
14. Awasthi, M. K., Asthana, R. and Agrawal, G. S., Viscoelastic potential flow analysis of the sta-
bility of a cylindrical jet, Sci. Iran. 21 (2014) 578–586.
15. Lamb, S. H., Hydrodynamics, NewYork: Cambridge University Press (1994).
16. Funada, T., Saitoh, M., Wang, J. and Joseph, D. D., Stability of a liquid jet into incompressible
gases and liquids: Part 2. Effects of the irrotational viscous pressure, Int. J. Multiiph. Flow, 31
(2005) 1134–1154.
17. Wang, J., Joseph D. D. and Funada, T., Viscous contributions to the pressure for potential flow
analysis of capillary instability of two viscous fluids, Phys. Fluids, 17 (2005) 052105.
18. Wang, J., Joseph, D. D. and Funada, T., Pressure corrections for potential flow analysis of capil-
lary instability of viscous fluids, J. Fluid Mech. 522 (2005) 383–394.
19. Joseph D. D. and Wang, J., The dissipation approximation and viscous potential flow, J. Fluid.
Mech. 505 (2004) 365–377.
15
Evaporative Kelvin–Helmholtz Instability
of a Porous Swirling Annular Layer
CONTENTS
15.1 Introduction ........................................................................................................................ 231
15.2 Problem Statement ............................................................................................................. 232
15.3 Boundary and Interfacial Conditions ............................................................................. 233
15.4 Dispersion Relationship .................................................................................................... 235
15.5 Nondimensional Form ...................................................................................................... 237
15.6 Results and Numerical Discussions................................................................................ 239
15.7 Conclusions......................................................................................................................... 243
Acknowledgment ........................................................................................................................ 243
References..................................................................................................................................... 243
15.1 Introduction
The K-H instability appears when there is a velocity shear at the interface of two fluids.
The K-H instability is not only restricted to a water surface but is evident through other
natural phenomena such as the ocean, Saturn’s band, and Jupiter red spot.
Hsieh [1] first studied the K-H instability between two fluids including heat transport at
the interface and found that when the liquid is colder than the vapor, heat transport has a
destabilizing nature. Nayak and Chakraborty [2] extended the analysis of the K-H instabil-
ity in the cylindrical geometry between the vapor–liquid phases admitting heat transport
at the interface. They compared results for the plane and cylindrical geometries, which
revealed that plane configuration is more stable. Lee [3] analyzed the nonlinear stability of
the streaming liquid-vapor interface in the presence of heat transport.
The viscous potential flow (VPF) theory is a theory which deals the fluid motion as irro-
tational but viscosity is nonzero. Funada and Joseph [4] examined the instability of viscous
fluids in a horizontal rectangular channel and they considered the normal irrotational
viscous stresses into the model. It was observed that the VPF analysis agrees with the
experimental data. Awasthi and Agrawal [5] studied K-H instability in cylindrical geom-
etry. This analysis was also based on the VPF theory. Funada et al. [6] applied the stability
of a viscous liquid jet surrounded by a viscous fluid is investigated using the VPF theory.
The effect of heat transport in the VPF analysis of K-H instability at the cylindrical inter-
face was included by Asthana et al. [7]. They showed that transport of heat destabilizes
the interface but the presence of viscosity delays the instability. Awasthi et al. [8] analyzed
DOI: 10.1201/9781003291916-15 231
232 Mathematical Modeling for Intelligent Systems
the nonlinear theory of the same problem discussed by Asthana et al. [9] and found that
nonlinear effects reduce the range of stability. The effect of the porous medium on the
K-H instability was examined by Awasthi et al. [10,11]. It was established that perturbation
travels faster in a viscous medium than in a porous medium.
The swirling of cylinders also affects the instability criterion in the cylindrical configu-
ration. Fu et al. [12, 13] studied the swirling effects on interfacial instability admitting heat
transport. They considered nonviscous fluids for their study and found that swirling has
stabilizing nature. Awasthi et al. [14–16] considered the swirling effect on the VPF analysis
of stability problems including heat transport.
The K-H instability in an annular porous zone bounded by two nonflexible cylinders
is investigated in this work. The medium porosity and permeability are assumed to be
constants. The inner cylinder is stationary, whereas the outer cylinder swirls at a constant
angular velocity. The interface is responsible for the transmission of heat along with mass
from one phase to the other. The fluids are viscous, and their dynamic viscosities vary.
The mathematical equations are solved using the VPF theory, and the stability is tested
using the normal mode approach. The marginal stability curves are drawn as well as the
stability/instability criteria are explained.
15.2 Problem Statement
The porous annular region is considered with constant porosity ε 1 and permeability ki .
This region is enclosed by two cylinders of radii ai and bo ( ai < bo ) . The inside cylindrical
boundary is immovable while the outside cylinder is swirling with velocity rΩ, where Ω is
angular velocity. The fluid with density ρ ( i) , viscosity µ ( i) , and its vapor with density ρ ( o) ,
viscosity µ ( o) lie in this porous annular region and is separated by an interface r = R. The
surface tension and temperature at the interface are denoted by σ and T ( o ), respectively.
The fluid in the region ai < r < R is flowing with velocity Vi and the temperature r = ai is
represented by T ( a ). The velocity of the fluid in the region R < r < bo is Vo and the tempera-
ture at r = bo is represented by T (b ).
We use the Darcy–Brinkman model to incorporate the porous medium effects into the
analysis. The continuity equation and the Navier–Stokes equation for the considered prob-
lem can be expressed as
∇⋅q = 0 (15.1)
ρ ∂q 1 µ µ
+ ( q ⋅ ∇ ) q = −∇p − q + ∇ 2 q (15.2)
ε 1 ∂t ε 1 k i ε 1
where µ represents the fluid viscosity, p denotes pressure, and q represents the fluid
velocity.
We are interested in studying the temporal stability of the considered flow and there-
fore, a small perturbation is applied to the basic state of flow and interface takes form as
r − R = ξ (θ , z, t), where ξ (θ , z, t) represents the free-surface deflection.
E ( r , θ , z, t ) = ξ (θ , z,t) + R − r = 0 (15.3)
Evaporative Kelvin-Helmholtz Instability 233
ˆ 1 ∂ξ ˆ ∂ξ ˆ
er − eθ − ez
∇E r ∂θ ∂ z
n̂ = = (15.4)
∇E 1 ∂ξ
2
∂ξ
2
1 + 2 +
r ∂θ ∂ z
In purpose of answering the mathematical problems, the potential flow theory is applied,
q j = ∇φ ( j ) (15.5)
∇ 2φ ( j ) = 0, where ( j = i, o) (15.6)
∂2 1 ∂2 1 ∂ ∂2
∇2 = + + +
∂r 2 r 2 ∂θ 2 r ∂r ∂z 2
The potential functions can also be represented as in their most basic state.
φo( j ) = Vj z ( j = i, o) (15.7)
∂φ ( i )
∂r = 0 at r = ai
(15.8)
∂φ ( o )
∂r = 0 at r = bo
∂E ∂E
ρ (i) + ∇φ ( i ) ⋅ ∇E = ρ ( o) + ∇φ ( o ) ⋅ ∇E (15.9)
∂t ∂t
∂E 1
∂t + ∇φ ⋅ ∇E = Lρ ( i) S (ξ )
(i)
(15.10)
Here S (ξ ) represents the heat flux and L stands for the released latent heat.
The heat flux in the interior phase is achieved as
−K i (T ( a ) − T ( i ) ) R(log( a ) − log(R))
i (15.11)
234 Mathematical Modeling for Intelligent Systems
1 K o (T ( o ) − T (b ) ) K i (T ( a ) − T ( i ) )
S(ξ ) = − (15.13)
( R + ξ ) log(bo ) − log(R + ξ ) log(R + ξ ) − log(ai )
ξ2 ξ3
S(ξ ) = S(0) + ξ S′(0) + S′′(0) + S′′′(0) + ........ (15.14)
2 2
K o (T ( o ) − T (b ) ) K i (T ( a ) − T ( i ) )
= =P (15.16)
R ( log(bo ) − log(R)) R ( log(R) − log( ai ))
∂φ ( i ) ∂ξ ∂ξ ∂φo( i )
ρ (i) − − ⋅ = βξ (15.17)
∂r ∂t ∂z ∂ z
P log ( bo ai )
here β =
LR log ( R ai ) log ( bo R )
The interfacial normal stress is balanced by the interfacial tension. This equation can be
expressed as
∂2 φ (i)
(p( o) − p( i) ) −
1
ki
( )
∇φ ( o ) µ ( o) − ∇φ ( i ) µ ( i) − 2 µ ( o)
∂2 φ (o)
∂r 2
− µ (i)
∂r 2
− ρ ( o)Ωo2 Rξ
∂2 ξ 2 1 ∂2 ξ 2 ξ
= −σ + 2 + (15.18)
∂z 2
R ∂θ 2 R 2
As the flow is irrotational, the pressure can be computed by Bernaoulli’s equation and,
therefore, above equation takes form as
( o) 1 ∂φ ( o ) ∂φo( o ) 1 ∂φ ( o ) 1 ( o) ( o ) 1 ∂φ ( i ) ∂φo( i ) ∂φ ( i ) 1
ρ
ε 1 ∂z ∂z
+
ε 1 ∂t ki
+ (
µ φ − µ ( i)φ ( i ) − ρ ( i) )
ε 1 ∂z ∂ z
+
∂t ε 1
2 ( o) ∂2 φ ( o) ∂2 φ (i) ∂2 ξ 1 ∂2 ξ ξ
+ µ − µ (i) 2
+ σ 2 + 2 2 + 2 = ρ ( o)Ωo2 Rξ (15.19)
ε1 ∂r 2
∂r ∂z R ∂θ R
Evaporative Kelvin-Helmholtz Instability 235
15.4 Dispersion Relationship
We are seeking the solution of the above equations in the context of the normal mode
technique. Using the normal modes technique, the surface elevation ξ (θ , z, t) may be
written as
1 β
φ (i) = ( i)
+ ikVi − iω BH ( i) ( kr ) exp ( imθ − iω t ) exp ( ikz ) (15.21)
kρ
1 β
φ (o) = ( o)
+ ikVo − iω BH ( o) ( kr ) exp ( imθ − iω t ) exp ( ikz ) (15.22)
kρ
here
I m ( kr )K m′ ( kai ) − I m′ ( kai )K m ( kr )
H ( i) ( kr ) = ,
I m′ ( kR)K m′ ( kai ) − I m′ ( kai )K m′ ( kR)
P log ( bo ai )
β=
LR log ( R ai ) log ( bo R )
1 (i) (i)
where C0 =
ε1
[ ρ H (kR) − ρ(o) H (o) (kR)
2k ( o)
C1 = ρ Vo H ( o) ( kR) − ρ ( i)Vi H ( i) ( kR)
ε1
β 2
D1 = H ( i) ( kR) − H ( o) ( kR) + µ ( i) k 2 G( i) ( kR) − µ ( o)k 2G( o) ( kR)
ε1 ε1
1 (i) (i)
+ µ H ( kR) − µ ( o)H ( o) ( kR)
ki
236 Mathematical Modeling for Intelligent Systems
+
(
σ k 1 − m2 − k 2 R 2 ) − 2k β µ( ) G( ) (kR) − µ( ) G( ) (kR) − ρ( )Ω Rk
2 i
i
o
o o 2
(i) (o) o
R 2
ε1 ρ ρ
V V
− β k i H ( i) ( kR) − o H ( o) ( kR)
ε
1 ε 1
m2 1
Here G( i) ( kR ) = 1 + 2 2 H ( i) ( kR ) −
k R kR
m2 1
G( o) ( kR ) = 1 + 2 2 H ( o) ( kR ) −
k R kR
C1 D C D
where P1 = , Q1 = 1 , P2 = 2 , Q2 = 2
Co Co Co Co
Put ω = ω r + iω i in equation (24)
ω r ( 2ω i + q1 ) + ( p1ω i + q2 ) = 0 (15.26)
5 2 1 2
where B0 = 1, B1 = 2 q1 , B2 = −p2 + q1 + p1
4 4
1 3 1 2 1 1 1
B3 = − p2 q1 + q1 + p1 q1 , B4 = − q22 + p1 q1 q2 − p2 q12
4 4 4 4 4
Then, we get
(
k 6 ( i) ( o)2 ( i)
( ) ) + 4 βεk {H ( ) ( kR ) H ( ) ( kR )
4
( )
2 2
4 ε 3 ρ µ H ( kR ) G ( kR ) − ρ ( o) µ ( i) H ( o) ( kR ) G( i) ( kR )
2
(o) i o
3
1 1
(
× ρ ( i) µ ( o)G( o) ( kR ) − ρ ( o) µ ( i)G( i) ( kR ) + 4 )} k4
ε 1 ki
2 {
ρ ( i) µ ( o) H ( i) ( kR ) H ( o) ( kR ) G( o) ( kR ) − ρ ( o) µ (i)
2 2
) }U
β µ (i) µ(o)
( ) (
2 2
× H ( o) ( kR ) − ρ ( o) µ ( i) H ( o) ( kR ) H ( i) ( kR ) 2
rel = ( i) H ( i) ( kR ) − ( o) H ( o) ( kR )
i ρ
k ρ
+2
k 2 β µ (i) (i)
G ( kR ) −
µ(o) (o)
G ( kR )
σk 1− m − k R
−
2 2 2
+ ρ ( o) Ωo2 Rk
( )
ε1 ρ ( i) ( o) 2
ρ R
k 2 (i) (i)
× 2
1ε
(
µ G ( kR ) − µ( o)G( o) ( kR ) +
β
ε 1
)
H ( i) ( kR ) − H ( o) ( kR ) ( )
2
µ (i) (i) µ(o) (o)
+ H ( kR ) − H ( kR ) (15.29)
ki ki
15.5 Nondimensional Form
If we assume characteristic length H = bo − ai and characteristic velocity V, other param-
eters in the dimensionless form are
βH ˆ Vi ˆ Vo ωH ρ (i) µ (i)
ς = kH, βˆ = ( o ) , Vi = V , Vo = V , ω̂ = V , ρ = ( o ) , µ = ( o ) ,
Vρ ρ µ
µ σ ˆ = R, H2 ρ ( o) HV VH
ν= , σ̂ = ( o) , ℜ o Pˆi = , Re = ( o)
, Ro = ,
ρ ρ HV 2
H ki µ Ωo
Here Re denotes the Reynolds number, Ro denotes Rossby number, and ν represents the
kinematic viscosity.
Hence, the nondimensional form of equation (15.23) is
where
Cˆ 0 =
ρ (i) ˆ 1 ˆ ς )
H (ℜ o ς ) − H ( i) (ℜ
o
ε1 ρ
2ς ˆ ( o) ˆ ˆ ς )
Cˆ 1 = Vo H (ℜ oς ) − ρVˆi H ( i) (ℜ
ε1
o
ˆ
ˆ ς ) + 2ς µˆ G( i) (ℜ̂ ς ) − 1 G( o) (ℜ
ˆ ς ) + Pi µ H ( i) (ℜ ˆ ς )
2
ˆ 1 = 1 βˆ H ( i) (ℜ
D ˆ ς ) − βˆ H ( o) (ℜ ˆ ς ) − 1 H ( o) (ℜ
ε1
o o
ε 1 Re o
µ̂
o Re o
µ
o
Ĉ2 =
ς 2 ˆ 2 (i) ˆ ˆˆ
ˆ ς ) − β Pi ν H ( i) (ℜ
ρVi H (ℜ oς ) − Vˆ o2 H ( o) (ℜ ˆ ς ) − H ( o ) (ℜ
ˆ ς ) +
ˆ 2ς 2
ˆ 1 − m2 − ℜ
σς o ( )
ε1 Re
o o o
2
ℜ̂ o
2ς 2 βˆ ( i) ˆ
2
− ˆ ς ) − 1 ℜ
ν G (ℜ oς ) − G( o) (ℜ ˆ ς
Re ε 1 o
Ro o
ˆ
ˆ 2 = − 2ς µ̂ Vˆ i G( i) (ℜ
ˆ ς ) − 1 Vˆ G( o) (ℜ̂ ς ) − ς Pi µVˆ H (i) (ℜ
3
D ˆ ς ) − Vˆ H ( o) (ℜ
ˆ ς )
Re ε 1 Re i
o o o o o o
ε1
ˆ ˆ
ˆ Vi H (i) (ℜ
− βς
ε 1
o
ε1
ˆ ς
ˆ ς ) − Vo H ( o) ℜ
o
( )
Nondimensional form of equation (15.29) is
( )) βˆ 2ς 2
( ) ( ( )) ( ( )) ( )
ˆ ς + ς P̂i ρ H ( i) ℜ
( ( )
2 2
ˆ ς (i) ˆ (o) ˆ
2
ˆ ς
2
ˆ ς
×G( i) ℜ o + ρ H ℜ oς H ℜ oς − H (i) ℜ o H (o) ℜ o ε Re2 o
ε 13 1
(1 − m ) ˆ ς µ G( i ) ℜ
( ) ( ) ( ( ) ( ))
2
ˆ
σς ˆ2 + 1 ℜ
2
ˆ ς − 1 G( o) ℜ̂ ς + β̂ G( i) ℜ
ˆ ς − G( o) ℜ
ˆ ς
− 2
− ς 2ℜ o oς 2 o o ε o o
ℜ̂ 2o Ro ε 1 Re µ 1
2
P̂ µ
Re
o ( )
µ
ˆ ς
ˆ ς − 1 G( o) ℜ
+ i G( i ) ℜ o
( ) (15.31)
Evaporative Kelvin-Helmholtz Instability 239
( )
2
Here Uˆ rel
2
= Vˆ2 − Vˆ1
In the case of viscous medium (ε 1 = 1, P̂i → 0), the relation of Awasthi et al. [15] can be
recovered from equation (15.31). If swirling is absent, we can get the relation of Awasthi [7].
The effect of Reynolds number, viscosity ratio, Rossby number, heat transfer coefficient,
porosity, etc. The arrival of instability is depicted in the following graphs.
The porous medium effect on the instability of the interface is illustrated in Figure 15.1.
The marginal stability curves for the relative velocity of the interface are plotted in this fig-
ure. In this figure, we plotted asymmetric disturbances, i.e., m = 1. The lower portion of the
curve shows a stable area, while the above portion represents an unstable area. It is noted
from the figure that the stable area is more when the medium is porous and, therefore, one
can say that the perturbation expands more rapidly in the pure flow than the porous flow.
In the case of a porous medium, the flow area is less in comparison with a viscous medium
and, therefore, perturbations do not grow as quickly as they grow in the viscous medium.
As a result, the interface in a porous medium is more stable than in a viscous medium.
Now we are looking to study the swirling effect on the instability of the vapor–water
interface. Figure 15.2 shows the response of the Rossby number (Ro) on the instability of
the interface through marginal curves of relative velocity. It is detected from this figure
that as Ro increases, stability range decreases. The Rossby number Ro is defined as the
ratio of inertia force to the Coriolis force, i.e., Ro is inversely proportional to the swirling.
FIGURE 15.1
Marginal stability curves for viscous and porous medium (β̂ = 1, m = 1).
240 Mathematical Modeling for Intelligent Systems
FIGURE 15.2
Effect of Rossby number when (β̂ = 1, m = 1, Re = 100, ε 1 = 0.3, Pˆi = 1/ 0.0003).
FIGURE 15.3
Effect of Reynolds number (β̂ = 1, m = 1, Ro = 0.1, ε 1 = 0.3, Pˆi = 1/ 0.0003).
Hence, the swirling works across the development of perturbation and stabilize the inter-
face. As the Rossby number Ro increases, the swirl decreases and hence we concluded that
the swirl induces stability.
For various values of the Reynolds number, we plotted the growth of perturbations in
Figure 15.3. The stability range reduces as the Reynolds number grows, indicating that
the Reynolds number causes instability at the system’s interface. The Reynolds number is
defined as Re = ρ ( o) HV µ ( o) . If the Reynolds number increases, the viscosity of the outer
fluid ( µ ( o) ) decreases, and consequently the resistance of the fluid flow at the interface
decrease. Hence, the flow becomes unstable. If the density of the outer fluid ( ρ ( o) ) increases,
the Reynolds number also increases showing that ρ ( o) has destabilizing nature.
The variation of marginal stability curves of relative velocity for heat transport constant
()
β̂ is shown in Figure 15.4. It should be noted from the figure that as β̂ increases, the range
of instability increases, which is in the conclusion that the heat transfer at the interface
Evaporative Kelvin-Helmholtz Instability 241
FIGURE 15.4
Effect of heat transport (Re = 100, m = 1, Ro = 0.1, ε 1 = 0.3, Pˆi = 1/ 0.0003).
acts to encourage the perturbations. As the heat transport through the interface increases,
more heat is conveyed to a point in a trough and less heat is passed aside from that point.
Therefore, the amount of evaporation increases at the trough and it passes to the other side
through the interface. This added evaporation will grow the amplitude of the perturba-
tions and interface move toward instability. A similar result was achieved by Fu et al. [12]
and Awasthi et al. [9]. One can say here that the heat transport effect does not change even
in the presence of the porous medium, swirling, and/or viscosity of the fluids.
Figure 15.5 compares the marginal stability curves of relative velocity for distinct values
of porosity ε 1 . Since porosity is defined as the ratio of the volume of voids over the total
volume and therefore, more porosity implies more void space. If a perturbation gets more
void space, it rotates and, therefore, travels slower than the less void space. Hence, if the
porosity of the medium increases, the void space increases, and perturbations grow slow.
A similar observation has been obtained from Figure 15.5. We recognize that more void
volume will form a stable arrangement.
FIGURE 15.5
Effect of medium porosity (Re = 100, m = 1, Ro = 0.1, Pˆi = 1/ 0.0003).
242 Mathematical Modeling for Intelligent Systems
In Figure 15.6, we have drawn marginal stability curves for relative velocity for par-
ticular values P̂i . The range of stability enlarges on increasing the value of P̂i , and this is
an indication that P̂i induces stability into the system. Since Pˆi = H 2 ki , i.e., P̂i is inversely
proportional to the permeability (ki ). So, we can say that permeability has a destabilizing
character. Hence, if the material has a greater ability for fluid flow, the interface may get
easily unstable.
The response of the viscosity ratio of two fluids µ = µ ( i) µ ( o) has been examined in
Figure 15.7. We take a vapor–water system for this study and, therefore, µ directly depend
on vapor viscosity, while it varies inversely with water viscosity. It is detected from the
figure that as the viscosity ratio grows, the range of instability also grows. On increasing
µ, µ ( i ) increases while keeping µ ( o ) constant. The increase in vapor viscosity impedes the
flow and, therefore, perturbations travel faster. The vapor viscosity has a destabilizing
character. If outer fluid viscosity increases and vapor viscosity is fixed, the viscosity ratio
decreases, hence outer fluid viscosity induces stability.
FIGURE 15.6
Effect of medium permeability (Re = 100, m = 1, Ro = 0.1, ε 1 = 0.3).
FIGURE 15.7
Effect of viscosity ratio (Re = 100, m = 1, Ro = 0.1, ε 1 = 0.3).
Evaporative Kelvin-Helmholtz Instability 243
15.7 Conclusions
The K-H instability at the cylindrical interface of two viscous fluids is examined. We
achieve a second-order polynomial in the growth rate parameter and the imaginary part
of the growth rate parameter is illustrated to investigate the effect of physical parameters
like porous medium, heat/mass transfer, Reynolds number, and Rossby number. Our
main result indicates that the vapor–water interface is more stable in a porous medium
than the viscous medium. We found that heat/mass transfer grows the perturbation
growth at the interface. The outer fluid viscosity has stabilizing nature, while inner fluid
viscosity destabilizes the system. The medium porosity shows a stabilizing nature while
medium permeability has destabilizing nature. The outer fluid density also has destabiliz-
ing nature.
Acknowledgment
The author S. Agarwal is thankful to CSIR, New Delhi, India (File No. 09/961(0013)/2019-
EMR-I) for their financial assistantship to carry out this work.
References
1. Hsieh, D. Y., Interfacial stability with mass and heat transfer, Phys. Fluids, 21 (1978) 745–748.
2. Nayak, A. R. and Chakraborty, B. B., Kelvin–Helmholtz stability with mass and heat transfer,
Phys. Fluids, 27 (1984) 1937–1941.
3. Lee, D. S., Nonlinear Kelvin–Helmholtz instability of cylindrical flow with mass and heat
transfer, Phys. Scr., 76 (2007) 97–103.
4. Funada, T. and Joseph, D. D., Viscous potential flow analysis of Kelvin–Helmholtz instability
in a channel, J. Fluid Mech., 445 (2001) 263–283.
5. Awasthi, M. K. and Agrawal, G. S., Viscous potential flow analysis of Kelvin–Helmholtz insta-
bility of cylindrical interface, Int. J. Appl. Math. Comput., 3 (2011) 130–141.
6. Funada, T., Joseph, D. D. and Yamashita, S., Stability of liquid jet into incompressible gases and
liquids, Int. J. Multi. Flow, 30 (2004) 1177–1208.
7. Awasthi, M. K., Study on Kelvin–Helmholtz instability of cylindrical flow with mass and heat
transfer through porous medium, J. Porous Media, 17 (2014) 457–467.
8. Awasthi, M. K. and Asthana, R., Nonlinear Study of Kelvin-Helmholtz instability of cylindri-
cal flow with mass and heat transfer, Int. Commun. Heat Mass Transfer, 71 (2016) 216–224.
9. Asthana, R., Awasthi, M. K. and Agrawal, G. S., Viscous potential flow analysis of Kelvin–
Helmholtz instability of cylindrical flow with heat and mass transfer, Heat Transfer Asian Res.,
43 (2014) 489–503.
10. Awasthi, M. K. and Asthana, R., Viscous potential flow analysis of capillary instability with
and mass transfer through porous media, Int. Commun. Heat Mass Trans., 40 (2013) 7–11.
11. Awasthi, M. K., Effect of viscous pressure on Kelvin−Helmholtz instability through porous
media, J. Porous Media, 19 (2016) 205–218.
12. Fu, Q. F., Jia, B. Q., Yang, L. J., Stability of a confined swirling annular liquid layer with heat and
mass transfer, Int. J. Heat Mass Trans., 104 (2017) 644–649.
244 Mathematical Modeling for Intelligent Systems
13. Fu, Q. F., Deng, X. D., Jia, B. Q. and Yang, L. J., Temporal instability of a confined liquid film
with heat and mass transfer, AIAA J., 56, (2018) 2615–2622.
14. Awasthi, M. K., Rayleigh–Taylor Instability of swirling annular layer with mass transfer,
J. Fluids Eng., 141 (2019) 071202.
15. Awasthi, M. K., Sarychev, V. D., Nevskii, S. A., Kuznetsov, M. A., Solodsky, S. A., Chinakhov,
D. A., Krampit, M. A., Kelvin-Helmholtz instability of swirling annular layer with heat and
mass transfer, J. Adv. Res. Dyn. Control Syst., 11 (2019) 86–96.
16. Awasthi, M. K. and Devi, M., Temporal instability of swirling annular layer with mass transfer
through porous media, Spec. Top. Rev. Porous Media Int J., 11 (2020) 61–70.
Index