Статьи журнала - International Journal of Mathematical Sciences and Computing

Все статьи: 198

Optimal Solution to the Capacitated Vehicle Routing Problem with Moving Shipment at the Cross-docking Terminal

Optimal Solution to the Capacitated Vehicle Routing Problem with Moving Shipment at the Cross-docking Terminal

Sebastian. R. Gnanapragasam, Wasantha. B. Daundasekera

Статья научная

An innovative and creative docking technique known as cross- docking (CD) strategy was initiated in 1930s to make supply chain fast and productive. However, it only became popular from 1980s. Vehicle routing between suppliers/customers to CD terminal (CDT) is one of operational level problems at CDT. Moreover, moving unloaded products from indoors to outdoors of CDT is one of the internal operations inside a CDT. The main difference between this study and the existing studies which find in the literature is that to consider the activities inside CDT. Also, loading or unloading shipments at all the nodes including CDT are taken into account. Moreover, homogenous fleets of vehicles within pickup or delivery process are assumed, but heterogeneous fleets of vehicles between pickup and delivery processes are assumed in this study. A mixed integer non-linear programming model is developed to address this problem. In our proposed model, costs of transportation between nodes, service at nodes including CDT, moving shipments inside CDT and vehicle operation are considered as the contributors to the total cost. The proposed model was tested for fifteen randomly generated small scale problems using Branch and Bound algorithm and the algorithm was run using LINGO (version 18) optimization software. The average computational time to reach the optimal solution is estimated. The study revealed that for small scale problems, the convergence rate of the problems rises to polynomial with degree 6. Also, the study shows that for moderately large and large scale problems the computational time to reach the optimal solution is exponential. Therefore, this study recommends using a suitable evolutionary algorithm to reach a near optimal solution for moderately large and large scale problems. It further recommends that, this model can be used for last time planning for similar small scale problems.

Бесплатно

Optimal bounding function for GNR-enumeration

Optimal bounding function for GNR-enumeration

Gholam Reza Moghissi, Ali Payandeh

Статья научная

The proposed pruning technique by Gama-Nguyen-Regev for enumeration function makes this pruned enumeration (GNR-enumeration) as a claimant practical solver for SVP. The total cost of GNR-enumeration over a specific input lattice block with pre-defined enumeration radius and success probability would be minimized, just if this enumeration uses an optimal bounding function for pruning. Unfortunately, the running time of the original proposed algorithm of searching optimal bounding function by the work of Chen-Nguyen (in 2011) is not analyzed at all, so our work in this paper tries to introduce some efficient searching algorithms with exact analysis of their time/space complexity. In fact, this paper proposes a global search algorithm to generate the optimal bounding function by a greedy idea. Then, by using our greedy strategy and defining the searching steps based on success probability, a practical search algorithm is introduced, while it’s time-complexity can be determined accurately. Main superiorities of our algorithm include: complexity analysis, using high-performance version of each sub-function in designing search algorithm, jumping from local optimums, simple heuristics to guide the search, trade-off between quality of output and running time by tuning parameters. Also by using the building blocks in our practical search algorithm, a high-quality and fast algorithm is designed to approximate the optimal bounding function.

Бесплатно

Optimal control dynamics: control interventions for eradication of ebola virus infection

Optimal control dynamics: control interventions for eradication of ebola virus infection

Bassey B. Echeng, Bassey Delphine Rexson

Статья научная

In affirmation of the existence of control interventions for the eradication of Ebola virus infection as a remedy to complete lack of outright medical cure, the present study seek and formulated using continuous ordinary differential equations an extended BEB-SEIR 4-Dimensional mathematical Ebola dynamic model vested with the scope of establishing the epidemiological impact of identified structured Ebola control measures. Derived model was presented as an optimal control problem subjected to structured dual treatment functions. Moreso, following the validity of model state components as representatives of living organisms and the establishment of existence of boundedness of solutions; we performed our analysis using classical Pontryagin’s maximum principle with which the optimality system of the model was established. Numerical simulations of derived model via Runge-Kutter of order 4 in a Mathcad surface were conducted. Result clearly indicated enhanced impact of intermediary and secondary control interventions as Ebola virus treatment functions with high significant maximization of susceptible population devoid of Ebola infection. Both the exposed and infectious classes were maximally reduced to near zero with possibilities of achieving complete eradication if time interval could be extended exceeding the of Ebola life-cycle. Furthermore, recovery rate of removed class justified the formulation and application of the model. The study therefore suggests further articulation of the model to account for possible intracellular delay in the biological mechanism.

Бесплатно

Outlier Detection Algorithm Based on Fuzzy C-Means and Self-organizing Maps Clustering Methods

Outlier Detection Algorithm Based on Fuzzy C-Means and Self-organizing Maps Clustering Methods

Mesut. Polatgil

Статья научная

Data mining and machine learning methods are important areas where studies have increased in recent years. Data is critical for these areas focus on inferring meaningful conclusions from the data collected. The preparation of the data is very important for the studies to be carried out and the algorithms to be applied. One of the most critical steps in data preparation is outlier detection. Because these observations, which have different characteristics from the observations in the data, affect the results of the algorithms to be applied and may cause erroneous results. New methods have been developed for outlier detection and machine learning and data mining algorithms have been provided with successful results with these methods. Algorithms such as Fuzzy C Means (FCM) and Self Organization Maps (SOM) have given successful results for outlier detection in this area. However, there is no outlier detection method in which these two powerful clustering methods are used together. This study proposes a new outlier detection algorithm using these two powerful clustering methods. In this study, a new outlier detection algorithm (FUSOMOUT) was developed by using SOM and FCM clustering methods together. With this algorithm, it is aimed to increase the success of both clustering and classification algorithms. The proposed algorithm was applied to four different datasets with different characteristics (Wisconsin breast cancer dataset (WDBC), Wine, Diabetes and Kddcup99) and it was shown to significantly increase the classification accuracy with the Silhouette, Calinski-Harabasz and Davies-Bouldin indexes as clustering success indexes.

Бесплатно

Parametric Equation for Capturing Dynamics of Cyber Attack Malware Transmission with Mitigation on Computer Network

Parametric Equation for Capturing Dynamics of Cyber Attack Malware Transmission with Mitigation on Computer Network

Falaye Adeyinka A, Etuk Stella Oluyemi, Adama Ndako Victor, Ugwuoke Cosmas Uchenna, Olujimi Ogedengbe, Seun Ale

Статья научная

One distress of network and data security professionals and advisers globally is about the abilities of infectious malicious agents (Malware) to invade the entire network terminals to wreak havoc extending from identity theft, financial fraud to systemic digital assault on critical national resources. This work studies the behavioural dynamics of the susceptible, infected, the recovered terminals on the mobile wireless network and the effective use of antivirus security signature as countermeasure. Solving for stability state, we found out that its Eigen value gives a positive value which means that the stability is at an unstable state. Using Homotopy perturbation to calculate the approximate solution of the system. The expression derived was simulated using a mathematical tool (mat lab).

Бесплатно

Periodic pattern formation analysis numerically in a chemical reaction-diffusion system

Periodic pattern formation analysis numerically in a chemical reaction-diffusion system

A. K. M. Nazimuddin, Md. Showkat Ali

Статья научная

In this paper, we analyze the pattern formation in a chemical reaction-diffusion Brusselator model. Two-component Brusselator model in two spatial dimensions is studied numerically through direct partial differential equation simulation and we find a periodic pattern. In order to understand the periodic pattern, it is important to investigate our model in one-dimensional space. However, direct partial differential equation simulation in one dimension of the model is performed and we get periodic traveling wave solutions of the model. Then, the local dynamics of the model is investigated to show the existence of the limit cycle solutions. After that, we establish the existence of periodic traveling wave solutions of the model through the continuation method and finally, we get a good consistency among the results.

Бесплатно

Prediction of Rainfall Using Unsupervised Model based Approach Using K-Means Algorithm

Prediction of Rainfall Using Unsupervised Model based Approach Using K-Means Algorithm

G.Vamsi Krishna

Статья научная

Prediction of rainfall has gained a significant importance because of many associated factors like cultivating, aqua-culture and other indirect parameters allied with the rainfall like global heat. Therefore it is necessary to predict the rainfall from the satellite images effectively. In this article, a segmentation algorithm is developed based on Gaussian mixture models. The initial parameters are estimated using k-means algorithm. The process is presented by using an 2-fold architecture, where in the first stage database creation is considered and the second stage talks about the prediction. The performance analysis is carried out using metrics like PSNR, IF and MSE. The developed model analyzes the satellite images and predicts the Rainfall efficiently.

Бесплатно

Prevalence and Associated Risk Factors of 'Psychological, Financial and Career Effect' Among Bangladeshi Undergraduate Students in the COVID-19 Pandemic Situation

Prevalence and Associated Risk Factors of 'Psychological, Financial and Career Effect' Among Bangladeshi Undergraduate Students in the COVID-19 Pandemic Situation

Fee Faysal Ahmed, Tonmoy Adhikary, Tania Sultana, Sheikh Sadia Arny, Faria Tabassum Nishi, Partho Bosu, Samiran Mondal

Статья научная

Objective: The COVID-19 pandemic situation has deeply affected students' psychological, financial, and career problems. The objective of our study is to find out the prevalence and identify significant risk factors of psychological, financial and career effects among the students in the pandemic. Methods: The cross-sectional survey was performed online via multiple social media sites such as Facebook, Email, WhatsApp, and the survey included 723 individuals. Chi-square analysis was performed to show the association between different selected factors and psychological, financial and career problems. Risk factors were obtained by logistics regression on the basis of p-value (p-value<0.05). Findings: Our findings illustrate that 68.11% of students suffer from depression, 60.86% from anxiety, 61.98% from a mood disorder, and 63.23% from financial difficulties, such as being unable to afford the cost of education, working frustrated all the time, and losing interest in many things. Binary logistic regression demonstrated that student’s gender, feeling helpless, worried, lost interest, educational expenses, and opinion of solve the problems and problems for prolonging education system were the risk factors of career effects. On the other hand, student’s gender, marital status, feeling bad about yourself, symptoms of corona virus, feeling nervous, short term memory loss, mood change, communicating problem, lost interest, feeling helpless, continue of income, study interrupt, irritable mood were associated factors of psychological problems. Family income status, feeling bad about yourself, lost interest, educational expenses, continue of income source, study interrupt, reason of study interrupt, were the factors associated with financial problems. Novelty: We have found many statistically significant risk factors of the psychological (depression, anxiety and mood disorder) as well as financial and career of the students in the pandemic situation, which have not been discussed in previous studies.

Бесплатно

Proposed model for evaluating information systems quality based on single valued triangular neutrosophic numbers

Proposed model for evaluating information systems quality based on single valued triangular neutrosophic numbers

Samah Ibrahim Abdel Aal, Mahmoud M. A. Abd Ellatif, Mohamed Monir Hassan

Статья научная

One of the most important reasons for information systems failure is lack of quality. Information Systems Quality (ISQ) evaluation is important to prevent the lack of quality. ISQ evaluation is one of the most important Multi-Criteria Decision Making (MCDM) problems. The concept of Single Valued Triangular Neutrosophic Numbers (SVTrN-numbers) is a generalization of fuzzy set and intuitionistic fuzzy set that make it is the best fit in representing indeterminacy and uncertainty in MCDM. This paper aims to introduce an ISQ evaluation model based on SVTrN- numbers with introducing two types of evaluating and ranking methods. The results indicated that the proposed model can handle ill-known quantities in evaluating ISQ. Also by analyzing and comparing results of ranking methods, the results indicated that each method has its own advantage that make the proposed model introduces more than one option for evaluating and ranking ISQ.

Бесплатно

Proving Riemann Hypothesis through the Derivative of Zeta Reflection

Proving Riemann Hypothesis through the Derivative of Zeta Reflection

Salah Ameer

Статья научная

A novel proof is presented in this work indicating that all non-trivial zeros of the zeta function has a real part equal to ½. As no proof has been validated yet, this work was successful in introducing a proof through the use of elementary calculus theorems. A second version of the proof was also shown where a more advanced series analysis (e.g. Fourier series) is used.

Бесплатно

Quantum Mechanics Analysis: Modeling and Simulation of some simple systems

Quantum Mechanics Analysis: Modeling and Simulation of some simple systems

Younis A. Shah, Irshad.A. Mir, Uzair M. Rathea

Статья научная

Quantum Mechanics is a radically new way of thinking about the Nature. It is used for explaining the behavior of an electron to the possible existence of parallel universes. Most of the times, it is just too difficult to get an intuitive grasp of Quantum Mechanics. Quantum Mechanics is a mathematical framework for describing atomic and subatomic systems. In this paper the basic principles of Quantum Mechanics have been presented. It has been shown that classical probabilities when added increase the overall probability while in quantum probabilities can cancel each other and hence lower the overall probability. A simple approach has been taken by modeling the systems as graphs. The states and dynamics of the systems have been modeled as matrices. The principle of Superposition and the phenomenon of Interference have been explained in a single simulation. Finally the BLAS functions of Julia programming language have been used for simulating the systems under study on a classical computer and a detailed discussion is presented to highlight the incapability of the classical explanation of quantum phenomenon.

Бесплатно

Quantum Walk Algorithm to Compute Subgame Perfect Equilibrium in Finite Two-player Sequential Games

Quantum Walk Algorithm to Compute Subgame Perfect Equilibrium in Finite Two-player Sequential Games

Arish Pitchai, A V Reddy, Nickolas Savarimuthu

Статья научная

Subgame Perfect Equilibrium (SGPE) is a refined version of Nash equilibrium used in games of sequential nature. Computational complexity of classical approaches to compute SGPE grows exponentially with the increase in height of the game tree. In this paper, we present a quantum algorithm based on discrete-time quantum walk to compute Subgame Perfect Equilibrium (SGPE) in a finite two-player sequential game. A full-width game tree of average branching factor b and height h has nodes in it. The proposed algorithm uses oracle queries to backtrack to the solution. The resultant speed-up is times better than the best known classical approach, Zermelo's algorithm.

Бесплатно

RMSD Protein Tertiary Structure Prediction with Soft Computing

RMSD Protein Tertiary Structure Prediction with Soft Computing

Mohammad Saber Iraji, Hakimeh Ameri

Статья научная

Root-mean-square-deviation (RMSD) is an indicator in protein-structure-prediction-algorithms (PSPAs). Goal of PSP algorithms is to obtain 0 Å RMSD from native protein structures. Protein structure and RMSD prediction is very essential. In 2013, the estimated RMSD proteins based on nine features were obtained best results using D2N (Distance to the native). We presented in This paper proposed approach to reduce predicted RMSD Error Than the actual amount for RMSD and calculate mean absolute error (MAE), through feed forward neural network, adaptive neuro fuzzy method. ANFIS is achieved better and more accurate results.

Бесплатно

Randamization technique for desiging of substitution box in data encryption standard algorithm

Randamization technique for desiging of substitution box in data encryption standard algorithm

Nilima S., Alind, Nitin Aror

Статья научная

A new approach for the generation of randomized substitution box (S-box) based on the concept of a redesign of S-box with fewer numbers of input bits processed at a time as compared to existing S-box in Data Encryption Standard (DES) Algorithm. The results of experimentation prove that proposed randomized approach also generate promising results, which can be particularly useful for devices with less processing power. Proposed approach retains the diffusion and confusion property of a good cryptosystem algorithm.

Бесплатно

Real Time Webcam based Infrared Tracking for Projection Display System

Real Time Webcam based Infrared Tracking for Projection Display System

Aniket Kudale, Kirti Wanjale

Статья научная

In this paper, we propose an interaction based projection display system, which enables an infrared pen touch interaction on flat surface (e.g. walls, whiteboard, tables), with a webcam (with an infrared filter removed) and a projector. The challenge of infrared pen touch detection is to sense the touching and movement information of an infrared pen on the surface just from the 2-dimensional image captured by the webcam. In our method, the content of a computer is projected on the surface and the user interacts with the surface using an infrared pen, the movement of an infrared pen is captured by the webcam. Here, the infrared LED light act as a tracking point which helps in controlling the content projected on surface. The proposed method is performed in three stages: 1) the infrared pen LED image is captured and tracked using webcam 2) the calibration of webcam-projector setup is done by principle of Homography 3) the tracked coordinates or location of Infrared pen LED is mapped to computer cursor. By this way, movement of infrared pen allows user to control computer content projected on the surface.

Бесплатно

Reducing hash function complexity: MD5 and SHA-1 as examples

Reducing hash function complexity: MD5 and SHA-1 as examples

Yousef Ali Al-Hammadi, Mohamed Fadl Idris Fadl

Статья научная

Hash functions algorithms also called message digest algorithms, compress a message input of an arbitrary length, and produce an output with a fixed length that is distributed randomly. Several hash algorithms exist such as Md5 and SHA1. These algorithms verify data integrity and restrict unauthorized data modification. However, they experience some complexities, especially when implemented in bitcoin mining, and low computation devices, in particularly IoT devices. As a remedy, this paper suggests a new compression function that reduces the complexity of the hash function algorithms such as MD5 and SHA-1. Also, proves that we can obtain the same results which are achieved by the original compression function.

Бесплатно

Reliability Evaluation of High Speed Train Bogie System Based on Stochastic Network Flow Model

Reliability Evaluation of High Speed Train Bogie System Based on Stochastic Network Flow Model

Vartika Sharma, Rajesh Mishra

Статья научная

Bogie is an emblematic complex mechanical as well as electronic part of the current high speed rail system. A small failure of components may lead to a loss of production, casualties and damage of the system. Therefore, security and reliability analysis of bogie system is a predominant task. This paper proposes a stochastic network flow model of bogie system based on the forces applied on the components of the bogie, simultaneously considering the deterioration level and functional correlation of components. At first, a detailed description of structure and functions of the CRH3 bogie is introduced. Then a stochastic network flow model is constructed by analysing the direction of various forces applied on bogie. In the proposed model, edges represent the bogie components and vertices are the transmission channels. The flow over each edge is analysed by the forces it withstands. Finally, a combination method using minimal cut sets is proposed to evaluate the reliability of high speed train bogie system. This paper provides a supportive guidance and practical approach to bogie system designers for efficient operation and maintenance of the bogie.

Бесплатно

Research Domain Selection using Naive Bayes Classification

Research Domain Selection using Naive Bayes Classification

Selvani Deepthi Kavila, Radhika Y

Статья научная

Research Domain Selection plays an important role for researchers to identify a particular document based on their discipline or research areas. This paper presents a framework which consists of two phases. In the first phase, a word list is constructed for each area of the research paper. In the second phase, the word list is continuously updated based on the new domains of research documents. Primary area and Sub area of the documents are identified by applying pre-processing and text classification techniques. Naive Bayes classifier is used to find the probability of various areas. An area having the highest probability is considered as primary area of the document. In this paper text classification procedures is condensed as that are utilized to arrange the content archives into predefined classes. Based on the performance analysis, it has been observed that the obtained results are efficient when compared to manual judgement.

Бесплатно

Revised Method for Sampling Coefficient Vector of GNR-enumeration Solution

Revised Method for Sampling Coefficient Vector of GNR-enumeration Solution

Gholam Reza Moghissi, Ali Payandeh

Статья научная

For selecting security parameters in lattice-based cryptographic primitives, the exact manner of BKZ algorithm (as total cost and specification of output basis) should be estimated in high block sizes. The simulations of BKZ are used to predict (estimate) the exact manner of BKZ algorithm which cannot be studied by practical running of BKZ algorithm for higher block sizes. Sampling method of GNR (Gamma-Nguyen-Regev) enumeration solution vector v is one of the main components of designing BKZ-simulation and it includes two phases: sampling the norm of solution vector v and sampling corresponding coefficient vectors. Our work, by Moghissi and Payandeh in 2021, entitled as “Better Sampling Method of Enumeration Solution for BKZ-Simulation”, introduces a simple and efficient idea for sampling the norm and coefficient vectors of GNR enumeration solution v. This paper proposes much better analysis for approximating the expected value and variance of the entries of these coefficient vectors. By this analysis, our previous idea for sampling the coefficient vectors is revised, which means that the expected value and variance of every entry in these coefficient vectors sampled by our new sampling method, are more close to the expected value and variance of corresponding entries in original sampling method, while these new sampled coefficient vectors include no violation from main condition of GNR bounding function (i.e., our new sampling method is not a rejection sampling).

Бесплатно

Revisited Quantum Protocols

Revisited Quantum Protocols

Shyam Sihare, V V Nath

Статья научная

Quantum cryptography is marches towards secure communication by using quantum protocols. Number of quantum protocols has been evolved based on an entanglement in three decades; similarly during this meanwhile non-entanglement based protocols have been evolved within the same period also. Among number of different protocols a torch bearer was BB84 protocol. Even though different quantum communication protocols exist, the BB84 protocol proved its application by initial experiments whereas most of the other protocols are theoretical which marches towards the practical application yet. But in quantum mechanics principle, cryptography based on an entanglement and superposition of entangled particle. Furthermore, challenges ahead are development and design high sensitive equipments for measurement of an entangled particle position at output end. Particle entanglements open a new door for computation worlds such as speedup, security. In this article, we discuss quantum protocols, their challenges, and applications based on above discussion.

Бесплатно

Журнал