Статьи журнала - International Journal of Mathematical Sciences and Computing

Все статьи: 246

Modeling a Fuzzy Logic Controller to Simulate and Optimize the Greenhouse Microclimate Management using MATLAB SIMULINK

Modeling a Fuzzy Logic Controller to Simulate and Optimize the Greenhouse Microclimate Management using MATLAB SIMULINK

Didi Faouzi, N. Bibi-Triki, B. Draoui, A. Abène

Статья научная

The socio-economic evolution of populations has in recent decades a rapid and multiple changes, including dietary habits that have been characterized by the consumption of fresh products out of season and widely available throughout the year. Culture under shelters of fruit, vegetable and flower species developed from the classical to the greenhouse agro - industrial, currently known for its modernity and high level of automation (heating, misting, of conditioning, control, regulation and control, supervisor of computer etc ...). new techniques have emerged, including the use of control devices and regulating climate variables in a greenhouse (temperature, humidity, CO2 concentration etc ...) to the exploitation of artificial intelligence such as neural networks and / or fuzzy logic. Currently the climate computer offers many benefits and solves problems related to the regulation, monitoring and controls. Greenhouse growers remain vigilant and attentive, facing this technological development. they ensure competitiveness and optimize their investments / production cost which continues to grow. The application of artificial intelligence in the industry known for considerable growth, which is not the case in the field of agricultural greenhouses, where enforcement remains timid. it is from this fact, we undertake research work in this area and conduct a simulation based on meteorological data through MATLAB Simulink to finally analyze the thermal behavior - greenhouse microclimate energy.

Бесплатно

Modelling Taylor's Table Method for Numerical Differentiation in Python

Modelling Taylor's Table Method for Numerical Differentiation in Python

Pankaj Dumka, Rishika Chauhan, Dhananjay R. Mishra

Статья научная

In this article, an attempt has been made to explain and model the Taylor table method in Python. A step-by-step algorithm has been developed, and the methodology has been presented for programming. The developed TT_method() function has been tested with the help of four problems, and accurate results have been obtained. The developed function can handle any number of stencils and is capable of producing the results instantaneously. This will eliminate the task of hand calculations and the use can directly focus on the problem solving rather than working hours to descretize the problem.

Бесплатно

Modelling the Impacts of Climate Change on Water Level Fluctuations in Water Resources in Tanzania: A Case Study of Mtera Dam

Modelling the Impacts of Climate Change on Water Level Fluctuations in Water Resources in Tanzania: A Case Study of Mtera Dam

Filimon Abel Mgandu, Mashaka Mkandawile, Mohamed Rashid

Статья научная

This study presents the modelling of impacts of climate change on water resources. Mtera dam in Tanzania was taken as a case study. Data for climate variables on four stations were obtained from Tanzania Meteorological Agency (TMA) while data for water level were obtained from Rufiji Basin Development Authority (RUBADA). The study aimed at doing regression analysis on all stations to analyze the impacts of change in climate variables on water level. Results show that rainfall was significant predictor of water level at Iringa and Dodoma while temperature and sunshine were significant at Mbeya station. Change in climate variables accounted for 37% of the fluctuations of water level in the dam. It was recommended that TANESCO should construct small dams on upper side of Mtera dam to harvest rain water during rainy season. In long run TANESCO should invest into alternative sources of energy.

Бесплатно

Modification on AES-GCM to increment ciphertext randomness

Modification on AES-GCM to increment ciphertext randomness

Ahmad S. Bader, Ali Makki Sagheer

Статья научная

Today, there are many cryptographic algorithms that are designed to maintain the data confidentiality, from these algorithms is AES. In AES-GCM, the key in addition to the IV are used to encrypt the plaintext to obtain the ciphertext instead of just the key in the traditional AES. The Use of the IV with the key in order to gain different ciphertext for the same plaintext that was encrypted more than ones, with the same key. In this paper, the mechanism of change the IV each time in AES-GCM was modified to get more randomness in the ciphertext, thus increase the difficulty of breaking the encrypted text through analysis to obtain the original text. NIST statistical function were used to measure the randomness ratio in the encrypted text before and after modification, where there was a clear rise in the randomness ratio in the encoded text which obtained by using the modified algorithm against ciphertext by using the normal AES_GCM.

Бесплатно

Modified DES using Different Keystreams Based On Primitive Pythagorean Triples

Modified DES using Different Keystreams Based On Primitive Pythagorean Triples

K.Mani, A.Devi

Статья научная

Symmetric-key encryption is a traditional form of cryptography, in which a single key is used to encrypt and decrypt a message. In symmetric–key algorithm before any encrypted message is being transmitted, the sender and receiver must know the key value in advance. There are several drawbacks in symmetric-key algorithms. In some algorithms, the size of the key should be same as the size of the original plaintext and maintaining and remembering such a key is very difficult. Further, in symmetric-key algorithms, several round has to be performed to produce the ciphertext and perhaps the same key is used in each round which results in subkey generated from the current round is fully depending on the previous round. To avoid these, a novel approach in generating the key from the keystream for any symmetric-key algorithms using the Primitive Pythagorean Triples(PPT) has been proposed in this paper. The main advantage of this method is that the key value generated from the keystream is chosen by both the sender and the receiver. Further, the size of the key sequence is not limited but its size is arbitrary in length. Since, the keystream generated is random, no need to remember such keys by both the sender and the receiver.

Бесплатно

Modifying one of the Machine Learning Algorithms kNN to Make it Independent of the Parameter k by Re-defining Neighbor

Modifying one of the Machine Learning Algorithms kNN to Make it Independent of the Parameter k by Re-defining Neighbor

Pushpam Kumar Sinha

Статья научная

When we are given a data set where in based upon the values and or characteristics of attributes each data point is assigned a class, it is known as classification. In machine learning a very simple and powerful tool to do this is the k-Nearest Neighbor (kNN) algorithm. It is based on the concept that the data points of a particular class are neighbors of each other. For a given test data or an unknown data, to find the class to which it is the neighbor one measures in kNN the Euclidean distances of the test data or the unknown data from all the data points of all the classes in the training data. Then out of the k nearest distances, where k is any number greater than or equal to 1, the class to which the test data or unknown data is the nearest most number of times is the class assigned to the test data or unknown data. In this paper, I propose a variation of kNN, which I call the ANN method (Alternative Nearest Neighbor) to distinguish it from kNN. The striking feature of ANN that makes it different from kNN is its definition of neighbor. In ANN the class from whose data points the maximum Euclidean distance of the unknown data is less than or equal to the maximum Euclidean distance between all the training data points of the class, is the class to which the unknown data is neighbor. It follows, henceforth, naturally that ANN gives a unique solution to each unknown data. Where as , in kNN the solution may vary depending on the value of the number of nearest neighbors k. So, in kNN, as k is varied the performance may vary too. But this is not the case in ANN, its performance for a particular training data is unique. For the training data [1] considered in this paper, the ANN gives 100% accurate result.

Бесплатно

Multi-Criteria Decision Making and Numerical Optimization Approaches for Optimizing Water Loss Management Strategies in Water Distribution System - A case of Urban Water Supply and Sanitation Authorities in Tanzania

Multi-Criteria Decision Making and Numerical Optimization Approaches for Optimizing Water Loss Management Strategies in Water Distribution System - A case of Urban Water Supply and Sanitation Authorities in Tanzania

Maselle Joseph Kadenge, Mashaka Mkandawile, Verdiana Grace Masanja

Статья научная

Water loss in water distribution systems (WDS) is a serious problem in Tanzania and the third world countries at large. A lot of water is lost on its way before reaching the consumers. This causes a shortage of water supply which leads to loss of revenues of the concerned water authorities. The control or reduction of water loss in the WDS is closely dependent on the commitment of the decision-makers and on the strategies and budget, they set for that purpose. This paper presents a combined model of Multi-Criteria Decision Making (MCDM) and Numerical optimization techniques which may help decision-makers to prioritize and select the best strategies to be used in the management of water loss in the WDS at Moshi Urban Water Supply and Sanitation Authority (MUWSA), Tanzania. The Multi-Criteria Decision Making family methods namely the Multi-Attribute Value Theory (MAVT), Simple Multi-Attribute Rating Technique Exploiting Ranks (SMARTER), and Complex Proportional Assessment (COPRAS) were used to evaluate and prioritize the strategies, whereas the Integer Linear Programming (ILP) technique a numerical optimization technique was used to select the best strategies or alternatives to be employed in water loss management. The results show that the most preferable alternative is replacement of dilapidated pipes while the least preferable alternative is network zoning. The model selects thirteen out of sixteen alternatives, which cost 97% (TZS 235.71 million) of the total budgets set by the water authority to form a portfolio of the best alternatives for water loss management. Furthermore, the model showed robustness as the selected portfolio of alternatives remained the same even when the weights of the evaluation criteria changed.

Бесплатно

Multiobjective artificial bee colony based job scheduling for cloud computing environment

Multiobjective artificial bee colony based job scheduling for cloud computing environment

Neha Sethi, Surjit Singh, Gurvinder Singh

Статья научная

Cloud computing has become the hottest issue due to its wide range of services. Due to a large number of users, it becomes more significant to provide high availability of services to cloud users. The majority of existing scheduling techniques in the cloud environment is NP-Complete in nature. Many researchers have utilized meta-heuristic techniques to schedule the jobs in cloud data centers. The majority of existing techniques such as Genetic Algorithm, Ant colony optimization, Non-dominated Sorting Genetic Algorithm (NSGA-III), etc. suffer from poor convergence speed. Also, most of these techniques are either based upon scheduling or load balancing. Therefore, to overcome these issues, a new Variance Honey Bee Behavior with multi-objective optimization method (VHBBMO) is proposed in this paper. Extensive experiments have been conducted by considering the various set of jobs. The experimental results have shown that the proposed method provides more significant results than available methods.

Бесплатно

New Framework for Detecting the suitable Supplier of Smart Systems Based on the effect of Internet of Things

New Framework for Detecting the suitable Supplier of Smart Systems Based on the effect of Internet of Things

Samah Ibrahim Abdel Aal

Статья научная

Nowadays, there are many organizations and institutions have realized the significant effect of the Internet of Things (IoT). The IoT technologies can enhance the quality of processes and services that make organizations seek to integrate these technologies to their products especially their smart devices. The IoT can be considered as one of the most important requirements that influences on detecting the best supplier. Therefore, every organization should take into account the effect of IoT on detecting the best supplier. So that, there is a need to a framework to help organizations for detecting the suitable supplier based on the effect of IoT. This work aims to introduce a proposed framework using trapezoidal neutrosophic numbers to detect the suitable supplier for purchasing smart systems based on the effect of IoT. The proposed framework consists of six phases. The proposed framework integrates the values and ambiguities index method with Single Valued Trapezoidal Neutrosophic Numbers (SVTN-numbers) which generalized fuzzy set and intuitionistic fuzzy to give more accurate results. The proposed framework is applied with a case study and the results concluded that the proposed framework can handle unclear information which exists in the purchasing process for detecting the suitable supplier of smart devices based on the effect of IoT. Also, the proposed framework can handle uncertainty in decision making and link between customers and suppliers which can improve Supply Chain Management (SCM).

Бесплатно

Non-singular Transformation Based Encryption Scheme

Non-singular Transformation Based Encryption Scheme

Sunil Kumar, Sandeep Kumar, Gaurav Mittal, Dharminder Dharminder, Shiv Narain

Статья научная

In this paper, we propose a novel variant of the Hill cipher based on vector spaces. In the classical Hill cipher, a non-singular matrix is used for encryption but it is well known that this cipher is vulnerable to the known-plaintext attack. In our proposed cryptosystem, we eradicate this problem by encrypting each plaintext block with a new invertible key matrix. This makes our scheme immune to all existing attacks in literature on this type of ciphers and so the resulting cipher can be used as other state-of-art block cipher. To generate the invertible matrices which serve as the dynamic keys, we make use of the vector spaces along with randomly generated basis and non-singular linear transformation. In addition to this, we also study the computational complexity of the proposed cryptosystem and compare this with the computational complexities of other schemes based on Hill cipher.

Бесплатно

Novel Quantum Random Number Generator with the Improved Certification Method

Novel Quantum Random Number Generator with the Improved Certification Method

Maksim Iavich, Tamari Kuchukhidze, Giorgi Iashvili, Sergiy Gnatyuk, Razvan Bocu

Статья научная

Random numbers play an important role in many areas, for example, encryption, cryptography, static analysis, simulations. It is also a fundamental resource in science and engineering. There are algorithmically generated numbers that are similar to random distributions, but are not actually random, called pseudo random number generators. In many cases the tasks to be solved are based on the unpredictability of random numbers, which cannot be guaranteed in the case of pseudo random number generators, true randomness is required. In such situations, we use real random number generators whose source of randomness is unpredictable random events. Quantum Random Number Generators (QRNGs) generate real random numbers based on the inherent randomness of quantum measurements. Our goal is to generate fast random numbers at a lower cost. At the same time, a high level of randomness is essential. Through quantum mechanics, we can obtain true numbers using the unpredictable behavior of a photon, which is the basis of many modern cryptographic protocols. It is essential to trust cryptographic random number generators to generate only true random numbers. This is why certification methods are needed which will check both the operation of the device and the quality of the random bits generated. We present the improved novel quantum random number generator, which is based the on time of arrival QRNG. It uses the simple version of the detectors with few requirements. The novel QRNG produces more than one random bit per each photon detection. It is rather efficient and has a high level of randomness. Self-testing as well as device independent quantum random number generation methods are analyzed. The advantages and disadvantages of both methods are identified. The model of a novel semi self-testing certification method for quantum random number generators (QRNG) is offered in the paper. This method combines different types of certification approaches and is rather secure and efficient. Finally, the novel certification method is integrated into the model of the new quantum random number generator. The paper analyzes its security and efficiency.

Бесплатно

Numerical Double Integration for Unequal Data Spaces

Numerical Double Integration for Unequal Data Spaces

Md. Nayan Dhali, Nandita Barman, Md. Mohedul Hasan, A. K. M. Selim Reza

Статья научная

Numerical integral is one of the mathematical branches that connect between analytical mathematics and computer. Numerical integration is a primary tool used by engineers and scientists to obtain an approximate result for definite integrals that cannot be solved analytically. Numerical double integration is widely used in calculating surface area, the intrinsic limitations of flat surfaces and finding the volume under the surface. A wide range of method is applied to solve numerical double integration for equal data space but the difficulty is arisen when the data values are not equal. In this paper we have tried to generate a mathematical formula of numerical double integration for unequal data spaces. Trapezoidal rule for unequal space is used to evaluate the formula. We also verified our proposed model by demonstrating some numerical examples and compared the numerical result with the analytical result.

Бесплатно

Numerical Solution of Partial Differential Equations with Fractional Variable Coefficients Using New Iterative Method (NIM)

Numerical Solution of Partial Differential Equations with Fractional Variable Coefficients Using New Iterative Method (NIM)

Falade K. I., Tiamiyu A.T.

Статья научная

In this paper, we studied to obtain numerical solutions of partial differential equations with fractional variable coefficient by MAPLE 18 software algorithm on New Iterative Method. We examined and investigated behaviours of the fractional variable coefficients (Even and Odd) on first order partial differential equation; we obtain numerical solution and plot 2D/3D graphs representation of eight (8) cases for the study of the sequential trend of the fractional coefficients. The simplicity and the accuracy of the proposed numerical scheme are verified. More numerical examples will be used in the future for further testing the ability of the proposed scheme for solving some classical problems in engineering sciences.

Бесплатно

On E–Optimality Design for Quadratic Response Surface Model

On E–Optimality Design for Quadratic Response Surface Model

Ukeme Paulinus Akra, Edet Effiong Bassey, Ofong Edet Ntekim

Статья научная

In response surface methodology, optimality criteria is a major tools used to measure the goodness of a design. Optimal experimental designs (or optimum designs) are a class of experimental designs that are optimal with respect to some statistical criterion. E – Optimality criterion is one of the traditional alphabetical criterion used to explore the right choice of a design in both linear and quadratic response surface models. In this paper, we investigated E – optimal experimental designs for a quadratic response surface model with two factor predictors. We developed an algorithm and a flowchart in line with a program to obtain E – optimal design and compare the result with an existing method. Two designs were formulated each with six points to illustrate the usefulness of the new method. The result revealed that the new technique outperformed better than the existing method. The significance of the later to the former technique is that, it minimizes error due to approximation and also make the computation of the aforementioned optimality easier. We, therefore recommended this method to be used at all length of points when E – optimality is to be evaluated.

Бесплатно

On the Relations between Lucas Sequence and Fibonacci-like Sequence by Matrix Methods

On the Relations between Lucas Sequence and Fibonacci-like Sequence by Matrix Methods

Arfat Ahmad Wani, V. H. Badshah

Статья научная

In the present paper first and foremost we introduce a generalization of a classical Fibonacci sequence which is called a Fibonacci-Like sequence and at hindmost we obtain some relationships between Lucas sequence and Fibonacci-Like sequence by using two cross two matrix representation to the Fibonacci-Like sequence. The most worth noticing cause of this article is our proof method, since all the identities are proved by using matrix methods.

Бесплатно

On the number of Perfect Matchings of Tubular Fullerene Graphs

On the number of Perfect Matchings of Tubular Fullerene Graphs

Yanfei Ma, Rui Yang

Статья научная

The perfect matchings counting problem of graphs has important applications in combinatorial optimization, statistical physics, quantum chemistry and other fields. A perfect matching of a graph G is a set of non-adjacent edges that covers all vertices of G . The number of perfect matchings of a graph is closely related to its number of vertices. A fullerene graph is a 3-connected cubic planar graphs all of whose faces are pentagons and hexagons. Došlić obtained that a fullerene graph with P vertices has at least P/2+1 perfect matchings, Zhang et al. proved a better lower bound 3(p+2)/4 of the number of perfect matchings of a fullerene graph. We have known that the fullerene graph has a nontrivial cyclic 5-edge-cut if and only if it is isomorphic to the graph Tn for some integer n >=1, where Tn is the tubular fullerene graph Tn comprised of two caps formed of six pentagons joined by n concentric layers of hexagons. In this paper, the perfect matchings of the graph Tn is classified by matching a certain vertex, and recursive relations of a set of perfect matching numbers are obtained. Then the calculation formula of the number of perfect matchings of the graph Tn is given by recursive relationships. Finally, we get the number of perfect matchings of Tn with P vertices.

Бесплатно

Optimal Control Dynamics: Multi-therapies with Dual Immune Response for Treatment of Dual Delayed HIV-HBV Infections

Optimal Control Dynamics: Multi-therapies with Dual Immune Response for Treatment of Dual Delayed HIV-HBV Infections

Bassey B. Echeng

Статья научная

It has been of concern for the most appropriate control mechanism associated with the growing complexity of dual HIV-HBV infectivity. Moreso, the scientific ineptitude towards an articulated mathematical model for co-infection dynamics and accompanying methodological application of desired chemotherapies inform this present investigation. Therefore, the uniqueness of this present study is not only ascribed by the quantitative maximization of susceptible state components but opined to an insight into the epidemiological identifiability of dual HIV-HBV infection transmission routes and the methodological application of triple-dual control functions. Using ODEs, the model was formulated as a penultimate 7-Dimensional mathematical dynamic HIV-HBV model, which was then transformed to an optimal control problem, following the introduction of multi-therapies in the presence of dual adaptive immune system and time delay lags. Applying classical Pontryagin’s maximum principle, the system was analyzed, leading to the derivation of the model optimality system and uniqueness of the system. Specifically, following the dual role of the adaptive immune system, which culminated into triple-dual application of multi-therapies, the investigation was characterized by dual delayed HIV-HBV virions decays from infected double-lymphocytes in a biphasic manner, accompanied by more complex decay profiles of infectious dual HIV-HBV virions. The result further led to significant triphasic maximization of susceptible double-lymphocytes and dual adaptive immune system (cytotoxic T-lymphocytes and humeral immune response) achieved under minimal systemic cost. Therefore, the model is comparatively a monumental and intellectual accomplishment, worthy of emulation for related and future dual infectivity.

Бесплатно

Optimal Solution to the Capacitated Vehicle Routing Problem with Moving Shipment at the Cross-docking Terminal

Optimal Solution to the Capacitated Vehicle Routing Problem with Moving Shipment at the Cross-docking Terminal

Sebastian. R. Gnanapragasam, Wasantha. B. Daundasekera

Статья научная

An innovative and creative docking technique known as cross- docking (CD) strategy was initiated in 1930s to make supply chain fast and productive. However, it only became popular from 1980s. Vehicle routing between suppliers/customers to CD terminal (CDT) is one of operational level problems at CDT. Moreover, moving unloaded products from indoors to outdoors of CDT is one of the internal operations inside a CDT. The main difference between this study and the existing studies which find in the literature is that to consider the activities inside CDT. Also, loading or unloading shipments at all the nodes including CDT are taken into account. Moreover, homogenous fleets of vehicles within pickup or delivery process are assumed, but heterogeneous fleets of vehicles between pickup and delivery processes are assumed in this study. A mixed integer non-linear programming model is developed to address this problem. In our proposed model, costs of transportation between nodes, service at nodes including CDT, moving shipments inside CDT and vehicle operation are considered as the contributors to the total cost. The proposed model was tested for fifteen randomly generated small scale problems using Branch and Bound algorithm and the algorithm was run using LINGO (version 18) optimization software. The average computational time to reach the optimal solution is estimated. The study revealed that for small scale problems, the convergence rate of the problems rises to polynomial with degree 6. Also, the study shows that for moderately large and large scale problems the computational time to reach the optimal solution is exponential. Therefore, this study recommends using a suitable evolutionary algorithm to reach a near optimal solution for moderately large and large scale problems. It further recommends that, this model can be used for last time planning for similar small scale problems.

Бесплатно

Optimal bounding function for GNR-enumeration

Optimal bounding function for GNR-enumeration

Gholam Reza Moghissi, Ali Payandeh

Статья научная

The proposed pruning technique by Gama-Nguyen-Regev for enumeration function makes this pruned enumeration (GNR-enumeration) as a claimant practical solver for SVP. The total cost of GNR-enumeration over a specific input lattice block with pre-defined enumeration radius and success probability would be minimized, just if this enumeration uses an optimal bounding function for pruning. Unfortunately, the running time of the original proposed algorithm of searching optimal bounding function by the work of Chen-Nguyen (in 2011) is not analyzed at all, so our work in this paper tries to introduce some efficient searching algorithms with exact analysis of their time/space complexity. In fact, this paper proposes a global search algorithm to generate the optimal bounding function by a greedy idea. Then, by using our greedy strategy and defining the searching steps based on success probability, a practical search algorithm is introduced, while it’s time-complexity can be determined accurately. Main superiorities of our algorithm include: complexity analysis, using high-performance version of each sub-function in designing search algorithm, jumping from local optimums, simple heuristics to guide the search, trade-off between quality of output and running time by tuning parameters. Also by using the building blocks in our practical search algorithm, a high-quality and fast algorithm is designed to approximate the optimal bounding function.

Бесплатно

Optimal control dynamics: control interventions for eradication of ebola virus infection

Optimal control dynamics: control interventions for eradication of ebola virus infection

Bassey B. Echeng, Bassey Delphine Rexson

Статья научная

In affirmation of the existence of control interventions for the eradication of Ebola virus infection as a remedy to complete lack of outright medical cure, the present study seek and formulated using continuous ordinary differential equations an extended BEB-SEIR 4-Dimensional mathematical Ebola dynamic model vested with the scope of establishing the epidemiological impact of identified structured Ebola control measures. Derived model was presented as an optimal control problem subjected to structured dual treatment functions. Moreso, following the validity of model state components as representatives of living organisms and the establishment of existence of boundedness of solutions; we performed our analysis using classical Pontryagin’s maximum principle with which the optimality system of the model was established. Numerical simulations of derived model via Runge-Kutter of order 4 in a Mathcad surface were conducted. Result clearly indicated enhanced impact of intermediary and secondary control interventions as Ebola virus treatment functions with high significant maximization of susceptible population devoid of Ebola infection. Both the exposed and infectious classes were maximally reduced to near zero with possibilities of achieving complete eradication if time interval could be extended exceeding the of Ebola life-cycle. Furthermore, recovery rate of removed class justified the formulation and application of the model. The study therefore suggests further articulation of the model to account for possible intracellular delay in the biological mechanism.

Бесплатно

Журнал