Статьи журнала - International Journal of Mathematical Sciences and Computing

Все статьи: 198

Building Background to the Elgamal Algorithm

Building Background to the Elgamal Algorithm

Toan Nguyen Duc, Hong Bui The

Статья научная

In this paper, we develop a new encryption scheme based on the ELGAMAL encryption algorithm and the degree of difficulty of the discrete logarithm problem (DLP). In public key cryptography, a secret key is often used for a long period of time, thus expelling the secret key. Moreover, devices used to calculate cryptography can also be physically attacked, leading to the secret key being exposed. This paper proposes a new encryption scheme to reduce the risk of revealing a secret key.

Бесплатно

Category specific prediction modules for visual relation recognition

Category specific prediction modules for visual relation recognition

Sohan Chowdhury, Tanbirul Hashan, Afif Abdur Rahman, A.F.M. Saifuddin Saif

Статья научная

Object classification in an image does not provide a complete understanding of the information contained in it. Visual relation information such as “person playing with dog” provides substantially more understanding than just “person, dog”. The visual inter-relations of the objects can provide substantial insight for truly understanding the complete picture. Due to the complex nature of such combinations, conventional computer vision techniques have not been able to show significant promise. Monolithic approaches are lacking in precision and accuracy due to the vastness of possible relation combinations. Solving this problem is crucial to development of advanced computer vision applications that impact every sector of the modern world. We propose a model using recent advances in novel applications of Convolution Neural Networks (Deep Learning) combined with a divide and conquer approach to relation detection. The possible relations are broken down to categories such as spatial (left, right), vehicle-related (riding, driving), etc. Then the task is divided to segmenting the objects, estimating possible relationship category and performing recognition on modules specially built for that relation category. The training process can be done for each module on significantly smaller datasets with less computation required. Additionally this approach provides recall rates that are comparable to state of the art research, while still being precise and accurate for the specific relation categories.

Бесплатно

Clustering of Multi Scripts Isolated Characters Using k-Means Algorithm

Clustering of Multi Scripts Isolated Characters Using k-Means Algorithm

Neeru Garg, Munish Kumar

Статья научная

The aim of this paper is script identification problem of handwritten text which facilitates the clustering of data according to their type of script. In this paper, collection of different types of handwritten text document i.e. Devanagari, Gurumukhi and Roman is taken as input and then cluster of all these documents according to script type whether i.e. Devanagari, Gurumukhi, or Roman was prepared. Clustering of handwritten multi-script document scheme proposed in this paper is divided into two phases. First phase used to extract the features of given text images. In the second phase, features extracted in the previous phase were used for clustering with k-Means algorithm. In feature extraction phase, we have extracted four types of features, namely, circular curvature feature, horizontal stroke density feature, pixel density feature value and zoning based feature. In this study, we have considered 4,850 samples of isolated characters of Devanagari, Gurumukhi and Roman script.

Бесплатно

Comparative Analysis of Customers' Queue Management of First Bank Plc. and Guaranty Trust Bank Plc, Isokun Ilesa, Nigeria

Comparative Analysis of Customers' Queue Management of First Bank Plc. and Guaranty Trust Bank Plc, Isokun Ilesa, Nigeria

David O. Ikotun, Justus A. Ademuyiwa, Festus D. Famule

Статья научная

Problem of queue management has been a great barrier to the financial institutions. Another way of measuring efficiency in banking industries is how fast the service of saving and withdraw is been rendered. Imagine customers that spend the whole day in the banking hall for one service or the other, due to poor service delivery and long stay on the queue will not hesitate to change his bank. Data was collected by direct observation in two banks, one old generation bank and one new generation bank, queue model and other statistical tools were used to analyze the data. Result of the analysis shows that Guaranty Trust Bank is more efficient than First Bank in that the later has a prolonged service time attributed to the preference of it by a pool of customers for many reasons.

Бесплатно

Comparative Analysis of Steganography Technique for Information Security

Comparative Analysis of Steganography Technique for Information Security

Pooja Yadav, Sangeeta Dhall

Статья научная

Organisations need information security to reduce the risk of unauthorized information disclosure, use, modification and destruction. To avoid this risk and ensure security diverse solutions are available such as Cryptography, Steganography and Watermarking. Encryption changes the form of information but latter two hide records or watermark in some medium. This paper is an effort to explore one of the solutions i.e. Steganography. It is a mechanism of hiding secret information in text, image, audio or video carriers. Broadly, these are classified in various categories such as Spatial domain, Transform domain and Distortion Technique. This work intends to give an overview of above mentioned techniques in detail by comparing algorithms based on performance metrics such as Bhattacharyya Coefficient, Correlation Coefficient, Intersection Coefficient, Jaccard Index, MAE, MSE, PSNR and UIQI. After analysing the MATLAB simulation and comparison based on different performance metrics, LSB Substitution and Pseudorandom technique are best suited for generating highly matched stego image with respect to their cover image.

Бесплатно

Comparative analysis of personnel distributions in the local government service in ekiti-state, nigeria, for service delivery

Comparative analysis of personnel distributions in the local government service in ekiti-state, nigeria, for service delivery

Olaniyan Joseph Olawale, Ademuyiwa A. Justus

Статья научная

It’s is no longer news that the Local Government (Third-tier of government in Nigeria) has not been able to optimally discharge its responsibilities according to its mandate. This had raised serious policy and research concerns that resulted to several reformative approaches in a bid to restructuring the system for efficient service delivery in the past decade. One major unpopular reason for inefficient service delivery was poor administration in the Local Government as a result of unbalanced distribution of personnel by cadre and gender in each local government in the state. This had not only hampered local government administration but also impeded adequate provision of expected services to local populace in line with its mandate as enshrined in the fourth schedule of the 1999 Constitution of the Federal Republic of Nigeria. Application of Statistical analysis using Chi-square Test of Independence showed that distribution of employees by cadre depends on local government in post in the year under study. Percentage distributions employed revealed that some local governments that are located around the capital city had more workers than those located outside the state capital city except some local governments with more viable socio-economic benefits. Sex ratio showed that there was gender imbalance as female personnel are more than their male counterpart in the local government service is.

Бесплатно

Comparison of Four Interval ARIMA-base Time Series Methods for Exchange Rate Forecasting

Comparison of Four Interval ARIMA-base Time Series Methods for Exchange Rate Forecasting

Mehdi Khashei, Mohammad Ali Montazeri, Mehdi Bijari

Статья научная

In today's world, using quantitative methods are very important for financial markets forecast, improvement of decisions and investments. In recent years, various time series forecasting methods have been proposed for financial markets forecasting. In each case, the accuracy of time series methods fundamental to make decision and hence the research for improving the effectiveness of forecasting models have been curried on. In the literature, Many different time series methods have been frequency compared together in order to choose the most efficient once. In this paper, the performances of four different interval ARIMA-base time series methods are evaluated in financial markets forecasting. These methods are including Auto-Regressive Integrated Moving Average (ARIMA), Fuzzy Auto-Regressive Integrated Moving Average (FARIMA), Fuzzy Artificial Neural Network (FANN) and Hybrid Fuzzy Auto-Regressive Integrated Moving Average (FARIMAH). Empirical results of exchange rate forecasting indicate that the fuzzy artificial neural network model is more satisfactory than other models.

Бесплатно

Comparison of fog computing & cloud computing

Comparison of fog computing & cloud computing

Vishal Kumar, Asif Ali Laghari, Shahid Karim, Muhammad Shakir, Ali Anwar Brohi

Статья научная

Fog computing is extending cloud computing by transferring computation on the edge of networks such as mobile collaborative devices or fixed nodes with built-in data storage, computing, and communication devices. Fog gives focal points of enhanced proficiency, better security, organize data transfer capacity sparing and versatility. With a specific end goal to give imperative subtle elements of Fog registering, we propose attributes of this region and separate from cloud computing research. Cloud computing is developing innovation which gives figuring assets to a specific assignment on pay per utilize. Cloud computing gives benefit three unique models and the cloud gives shoddy; midway oversaw assets for dependable registering for performing required errands. This paper gives correlation and attributes both Fog and cloud computing differs by outline, arrangement, administrations and devices for associations and clients. This comparison shows that Fog provides more flexible infrastructure and better service of data processing by consuming low network bandwidth instead of shifting whole data to the cloud.

Бесплатно

Comparison on Trapezoidal and Simpson’s Rule for Unequal Data Space

Comparison on Trapezoidal and Simpson’s Rule for Unequal Data Space

Md. Nayan Dhali, Mohammad Farhad Bulbul, Umme Sadiya

Статья научная

Numerical integration compromises a broad family of algorithm for calculating the numerical value of a definite integral. Since some of the integration cannot be solved analytically, numerical integration is the most popular way to obtain the solution. Many different methods are applied and used in an attempt to solve numerical integration for unequal data space. Trapezoidal and Simpson’s rule are widely used to solve numerical integration problems. Our paper mainly concentrates on identifying the method which provides more accurate result. In order to accomplish the exactness we use some numerical examples and find their solutions. Then we compare them with the analytical result and calculate their corresponding error. The minimum error represents the best method. The numerical solutions are in good agreement with the exact result and get a higher accuracy in the solutions.

Бесплатно

Concepts of Bezier Polynomials and its Application in Odd Higher Order Non-linear Boundary Value Problems by Galerkin WRM

Concepts of Bezier Polynomials and its Application in Odd Higher Order Non-linear Boundary Value Problems by Galerkin WRM

Nazrul Islam

Статья научная

Many different methods are applied and used in an attempt to solve higher order nonlinear boundary value problems (BVPs). Galerkin weighted residual method (GWRM) are widely used to solve BVPs. The main aim of this paper is to find the approximate solutions of fifth, seventh and ninth order nonlinear boundary value problems using GWRM. A trial function namely, Bezier Polynomials is assumed which is made to satisfy the given essential boundary conditions. Investigate the effectiveness of the current method; some numerical examples were considered. The results are depicted both graphically and numerically. The numerical solutions are in good agreement with the exact result and get a higher accuracy in the solutions. The present method is quit efficient and yields better results when compared with the existing methods. All problems are performed using the software MATLAB R2017a.

Бесплатно

Construction of Fractals based on Catalan Solids

Construction of Fractals based on Catalan Solids

Andrzej Katunin

Статья научная

The deterministic fractals play an important role in computer graphics and mathematical sciences. The understanding of construction of such fractals, especially an ability of fractals construction from various types of polytopes is of crucial importance in several problems related both to the pure mathematical issues as well as some issues of theoretical physics. In the present paper the possibility of construction of fractals based on the Catalan solids is presented and discussed. The method and algorithm of construction of polyhedral strictly deterministic fractals is presented. It is shown that the fractals can be constructed only from a limited number of the Catalan solids due to the specific geometric properties of these solids. The contraction ratios and fractal dimensions are presented for existing fractals with adjacent contractions constructed based on the Catalan solids.

Бесплатно

Журнал