International Journal of Mathematical Sciences and Computing @ijmsc
Статьи журнала - International Journal of Mathematical Sciences and Computing
Все статьи: 276
Means of the Semantic Search Personification on base of Ontological Approach
Статья научная
The main trends of information retrieval deal with its personification and semantization are analyzed. Sources of knowledge about main subjects and objects of the search process are considered. Ontological model of interaction between the Web information resources and information consumers is proposed as a base of the search personification. Methods of development, improvement and usage of this model are defined. User characteristics are supplemented with sociopsychophysiological properties and ontologically personalized readability criteria. Software realization of semantic search on base of this ontological approach is described.
Бесплатно
Mining maximal subspace clusters to deal with inter-subspace density divergence
Статья научная
In general, subspace clustering algorithms identify enormously large number of subspace clusters which may possibly involve redundant clusters. This paper presents Dynamic Epsilon based Maximal Subspace Clustering Algorithm (DEMSC) that handles both redundancy and inter-subspace density divergence, a phenomenon in density based subspace clustering. The proposed algorithm aims to mine maximal and non-redundant subspace clusters. A maximal subspace cluster is defined by a group of similar data objects that share maximal number of attributes. The DEMSC algorithm consists of four steps. In the first step, data points are assigned with random unique positive integers called labels. In the second step, dense units are identified based on the density notion using proposed dynamically computed epsilon-radius specific to each subspace separately and user specified input parameter minimum points, τ. In the third step, sum of the labels of each data object forming the dense unit is calculated to compute its signature and is hashed into the hash table. Finally, if a dense unit of a particular subspace collides with that of the other subspace in the hash table, then both the dense units exists with high probability in the subspace formed by combining the colliding subspaces. With this approach efficient maximal subspace clusters which are non-redundant are identified and outperforms the existing algorithms in terms of cluster quality and number of the resulted subspace clusters when experimented on different benchmark datasets.
Бесплатно
Статья научная
The socio-economic evolution of populations has in recent decades a rapid and multiple changes, including dietary habits that have been characterized by the consumption of fresh products out of season and widely available throughout the year. Culture under shelters of fruit, vegetable and flower species developed from the classical to the greenhouse agro - industrial, currently known for its modernity and high level of automation (heating, misting, of conditioning, control, regulation and control, supervisor of computer etc ...). new techniques have emerged, including the use of control devices and regulating climate variables in a greenhouse (temperature, humidity, CO2 concentration etc ...) to the exploitation of artificial intelligence such as neural networks and / or fuzzy logic. Currently the climate computer offers many benefits and solves problems related to the regulation, monitoring and controls. Greenhouse growers remain vigilant and attentive, facing this technological development. they ensure competitiveness and optimize their investments / production cost which continues to grow. The application of artificial intelligence in the industry known for considerable growth, which is not the case in the field of agricultural greenhouses, where enforcement remains timid. it is from this fact, we undertake research work in this area and conduct a simulation based on meteorological data through MATLAB Simulink to finally analyze the thermal behavior - greenhouse microclimate energy.
Бесплатно
Modelling Taylor's Table Method for Numerical Differentiation in Python
Статья научная
In this article, an attempt has been made to explain and model the Taylor table method in Python. A step-by-step algorithm has been developed, and the methodology has been presented for programming. The developed TT_method() function has been tested with the help of four problems, and accurate results have been obtained. The developed function can handle any number of stencils and is capable of producing the results instantaneously. This will eliminate the task of hand calculations and the use can directly focus on the problem solving rather than working hours to descretize the problem.
Бесплатно
Статья научная
This study presents the modelling of impacts of climate change on water resources. Mtera dam in Tanzania was taken as a case study. Data for climate variables on four stations were obtained from Tanzania Meteorological Agency (TMA) while data for water level were obtained from Rufiji Basin Development Authority (RUBADA). The study aimed at doing regression analysis on all stations to analyze the impacts of change in climate variables on water level. Results show that rainfall was significant predictor of water level at Iringa and Dodoma while temperature and sunshine were significant at Mbeya station. Change in climate variables accounted for 37% of the fluctuations of water level in the dam. It was recommended that TANESCO should construct small dams on upper side of Mtera dam to harvest rain water during rainy season. In long run TANESCO should invest into alternative sources of energy.
Бесплатно
Modification on AES-GCM to increment ciphertext randomness
Статья научная
Today, there are many cryptographic algorithms that are designed to maintain the data confidentiality, from these algorithms is AES. In AES-GCM, the key in addition to the IV are used to encrypt the plaintext to obtain the ciphertext instead of just the key in the traditional AES. The Use of the IV with the key in order to gain different ciphertext for the same plaintext that was encrypted more than ones, with the same key. In this paper, the mechanism of change the IV each time in AES-GCM was modified to get more randomness in the ciphertext, thus increase the difficulty of breaking the encrypted text through analysis to obtain the original text. NIST statistical function were used to measure the randomness ratio in the encrypted text before and after modification, where there was a clear rise in the randomness ratio in the encoded text which obtained by using the modified algorithm against ciphertext by using the normal AES_GCM.
Бесплатно
Modified DES using Different Keystreams Based On Primitive Pythagorean Triples
Статья научная
Symmetric-key encryption is a traditional form of cryptography, in which a single key is used to encrypt and decrypt a message. In symmetric–key algorithm before any encrypted message is being transmitted, the sender and receiver must know the key value in advance. There are several drawbacks in symmetric-key algorithms. In some algorithms, the size of the key should be same as the size of the original plaintext and maintaining and remembering such a key is very difficult. Further, in symmetric-key algorithms, several round has to be performed to produce the ciphertext and perhaps the same key is used in each round which results in subkey generated from the current round is fully depending on the previous round. To avoid these, a novel approach in generating the key from the keystream for any symmetric-key algorithms using the Primitive Pythagorean Triples(PPT) has been proposed in this paper. The main advantage of this method is that the key value generated from the keystream is chosen by both the sender and the receiver. Further, the size of the key sequence is not limited but its size is arbitrary in length. Since, the keystream generated is random, no need to remember such keys by both the sender and the receiver.
Бесплатно
Статья научная
When we are given a data set where in based upon the values and or characteristics of attributes each data point is assigned a class, it is known as classification. In machine learning a very simple and powerful tool to do this is the k-Nearest Neighbor (kNN) algorithm. It is based on the concept that the data points of a particular class are neighbors of each other. For a given test data or an unknown data, to find the class to which it is the neighbor one measures in kNN the Euclidean distances of the test data or the unknown data from all the data points of all the classes in the training data. Then out of the k nearest distances, where k is any number greater than or equal to 1, the class to which the test data or unknown data is the nearest most number of times is the class assigned to the test data or unknown data. In this paper, I propose a variation of kNN, which I call the ANN method (Alternative Nearest Neighbor) to distinguish it from kNN. The striking feature of ANN that makes it different from kNN is its definition of neighbor. In ANN the class from whose data points the maximum Euclidean distance of the unknown data is less than or equal to the maximum Euclidean distance between all the training data points of the class, is the class to which the unknown data is neighbor. It follows, henceforth, naturally that ANN gives a unique solution to each unknown data. Where as , in kNN the solution may vary depending on the value of the number of nearest neighbors k. So, in kNN, as k is varied the performance may vary too. But this is not the case in ANN, its performance for a particular training data is unique. For the training data [1] considered in this paper, the ANN gives 100% accurate result.
Бесплатно
Статья научная
Water loss in water distribution systems (WDS) is a serious problem in Tanzania and the third world countries at large. A lot of water is lost on its way before reaching the consumers. This causes a shortage of water supply which leads to loss of revenues of the concerned water authorities. The control or reduction of water loss in the WDS is closely dependent on the commitment of the decision-makers and on the strategies and budget, they set for that purpose. This paper presents a combined model of Multi-Criteria Decision Making (MCDM) and Numerical optimization techniques which may help decision-makers to prioritize and select the best strategies to be used in the management of water loss in the WDS at Moshi Urban Water Supply and Sanitation Authority (MUWSA), Tanzania. The Multi-Criteria Decision Making family methods namely the Multi-Attribute Value Theory (MAVT), Simple Multi-Attribute Rating Technique Exploiting Ranks (SMARTER), and Complex Proportional Assessment (COPRAS) were used to evaluate and prioritize the strategies, whereas the Integer Linear Programming (ILP) technique a numerical optimization technique was used to select the best strategies or alternatives to be employed in water loss management. The results show that the most preferable alternative is replacement of dilapidated pipes while the least preferable alternative is network zoning. The model selects thirteen out of sixteen alternatives, which cost 97% (TZS 235.71 million) of the total budgets set by the water authority to form a portfolio of the best alternatives for water loss management. Furthermore, the model showed robustness as the selected portfolio of alternatives remained the same even when the weights of the evaluation criteria changed.
Бесплатно
Статья научная
This study extends the one-dimensional anharmonic oscillators by implementing physics-informed transformer networks (PINNs) for multi-dimensional quantum systems. We develop a novel computational framework that combines transformer architecture with physics-informed neural networks to solve the Schrodinger equation for 2D and 3D anharmonic oscillators, addressing both perturbative and non-perturbative regimes. The methodology incorporates attention mechanisms to capture long-range quantum correlations, orthogonal loss functions for eigenfunction discovery, and adaptive training protocols for progressive dimensionality scaling. Our approach successfully computes eigenvalues and eigenfunctions for quartic anharmonic oscillators in multiple dimensions with coupling parameters ranging from weak (λ = 0.01) to strong (λ = 1000) regimes. Results demonstrate superior accuracy compared to traditional neural networks, with mean absolute errors below 10-6 for ground state energies and the successful capture of symmetry breaking in anisotropic systems. The transformer-based architecture requires 60% fewer trainable parameters than conventional feedforward networks while maintaining comparable accuracy. Applications to molecular vibrational systems and solid-state physics demonstrate the practical utility of this approach for realistic quantum mechanical problems beyond the scope of perturbative methods.
Бесплатно
Multiobjective artificial bee colony based job scheduling for cloud computing environment
Статья научная
Cloud computing has become the hottest issue due to its wide range of services. Due to a large number of users, it becomes more significant to provide high availability of services to cloud users. The majority of existing scheduling techniques in the cloud environment is NP-Complete in nature. Many researchers have utilized meta-heuristic techniques to schedule the jobs in cloud data centers. The majority of existing techniques such as Genetic Algorithm, Ant colony optimization, Non-dominated Sorting Genetic Algorithm (NSGA-III), etc. suffer from poor convergence speed. Also, most of these techniques are either based upon scheduling or load balancing. Therefore, to overcome these issues, a new Variance Honey Bee Behavior with multi-objective optimization method (VHBBMO) is proposed in this paper. Extensive experiments have been conducted by considering the various set of jobs. The experimental results have shown that the proposed method provides more significant results than available methods.
Бесплатно
Статья научная
Nowadays, there are many organizations and institutions have realized the significant effect of the Internet of Things (IoT). The IoT technologies can enhance the quality of processes and services that make organizations seek to integrate these technologies to their products especially their smart devices. The IoT can be considered as one of the most important requirements that influences on detecting the best supplier. Therefore, every organization should take into account the effect of IoT on detecting the best supplier. So that, there is a need to a framework to help organizations for detecting the suitable supplier based on the effect of IoT. This work aims to introduce a proposed framework using trapezoidal neutrosophic numbers to detect the suitable supplier for purchasing smart systems based on the effect of IoT. The proposed framework consists of six phases. The proposed framework integrates the values and ambiguities index method with Single Valued Trapezoidal Neutrosophic Numbers (SVTN-numbers) which generalized fuzzy set and intuitionistic fuzzy to give more accurate results. The proposed framework is applied with a case study and the results concluded that the proposed framework can handle unclear information which exists in the purchasing process for detecting the suitable supplier of smart devices based on the effect of IoT. Also, the proposed framework can handle uncertainty in decision making and link between customers and suppliers which can improve Supply Chain Management (SCM).
Бесплатно
Non-singular Transformation Based Encryption Scheme
Статья научная
In this paper, we propose a novel variant of the Hill cipher based on vector spaces. In the classical Hill cipher, a non-singular matrix is used for encryption but it is well known that this cipher is vulnerable to the known-plaintext attack. In our proposed cryptosystem, we eradicate this problem by encrypting each plaintext block with a new invertible key matrix. This makes our scheme immune to all existing attacks in literature on this type of ciphers and so the resulting cipher can be used as other state-of-art block cipher. To generate the invertible matrices which serve as the dynamic keys, we make use of the vector spaces along with randomly generated basis and non-singular linear transformation. In addition to this, we also study the computational complexity of the proposed cryptosystem and compare this with the computational complexities of other schemes based on Hill cipher.
Бесплатно
Novel Quantum Random Number Generator with the Improved Certification Method
Статья научная
Random numbers play an important role in many areas, for example, encryption, cryptography, static analysis, simulations. It is also a fundamental resource in science and engineering. There are algorithmically generated numbers that are similar to random distributions, but are not actually random, called pseudo random number generators. In many cases the tasks to be solved are based on the unpredictability of random numbers, which cannot be guaranteed in the case of pseudo random number generators, true randomness is required. In such situations, we use real random number generators whose source of randomness is unpredictable random events. Quantum Random Number Generators (QRNGs) generate real random numbers based on the inherent randomness of quantum measurements. Our goal is to generate fast random numbers at a lower cost. At the same time, a high level of randomness is essential. Through quantum mechanics, we can obtain true numbers using the unpredictable behavior of a photon, which is the basis of many modern cryptographic protocols. It is essential to trust cryptographic random number generators to generate only true random numbers. This is why certification methods are needed which will check both the operation of the device and the quality of the random bits generated. We present the improved novel quantum random number generator, which is based the on time of arrival QRNG. It uses the simple version of the detectors with few requirements. The novel QRNG produces more than one random bit per each photon detection. It is rather efficient and has a high level of randomness. Self-testing as well as device independent quantum random number generation methods are analyzed. The advantages and disadvantages of both methods are identified. The model of a novel semi self-testing certification method for quantum random number generators (QRNG) is offered in the paper. This method combines different types of certification approaches and is rather secure and efficient. Finally, the novel certification method is integrated into the model of the new quantum random number generator. The paper analyzes its security and efficiency.
Бесплатно
Numerical Double Integration for Unequal Data Spaces
Статья научная
Numerical integral is one of the mathematical branches that connect between analytical mathematics and computer. Numerical integration is a primary tool used by engineers and scientists to obtain an approximate result for definite integrals that cannot be solved analytically. Numerical double integration is widely used in calculating surface area, the intrinsic limitations of flat surfaces and finding the volume under the surface. A wide range of method is applied to solve numerical double integration for equal data space but the difficulty is arisen when the data values are not equal. In this paper we have tried to generate a mathematical formula of numerical double integration for unequal data spaces. Trapezoidal rule for unequal space is used to evaluate the formula. We also verified our proposed model by demonstrating some numerical examples and compared the numerical result with the analytical result.
Бесплатно
Статья научная
In this paper, we studied to obtain numerical solutions of partial differential equations with fractional variable coefficient by MAPLE 18 software algorithm on New Iterative Method. We examined and investigated behaviours of the fractional variable coefficients (Even and Odd) on first order partial differential equation; we obtain numerical solution and plot 2D/3D graphs representation of eight (8) cases for the study of the sequential trend of the fractional coefficients. The simplicity and the accuracy of the proposed numerical scheme are verified. More numerical examples will be used in the future for further testing the ability of the proposed scheme for solving some classical problems in engineering sciences.
Бесплатно
On E–Optimality Design for Quadratic Response Surface Model
Статья научная
In response surface methodology, optimality criteria is a major tools used to measure the goodness of a design. Optimal experimental designs (or optimum designs) are a class of experimental designs that are optimal with respect to some statistical criterion. E – Optimality criterion is one of the traditional alphabetical criterion used to explore the right choice of a design in both linear and quadratic response surface models. In this paper, we investigated E – optimal experimental designs for a quadratic response surface model with two factor predictors. We developed an algorithm and a flowchart in line with a program to obtain E – optimal design and compare the result with an existing method. Two designs were formulated each with six points to illustrate the usefulness of the new method. The result revealed that the new technique outperformed better than the existing method. The significance of the later to the former technique is that, it minimizes error due to approximation and also make the computation of the aforementioned optimality easier. We, therefore recommended this method to be used at all length of points when E – optimality is to be evaluated.
Бесплатно
Статья научная
This paper aims at providing in-depth refinement to switching time-variant autoregressive processes via the mode as a stable location parameter in adopted noisy Fisher’s z-distribution that was impelled in a Bayesian setting. Explicitly, a four-parameter Fisher’s z-distribution of Bayesian Mixture Autoregressive (FZBMAR) process was proposed to congruous k-mixture components of Fisher’s z-switching mixture autoregressive processes that was based on shifting number of modes in the marginal density of any switching time-variant series of interest. The proposed FZBMAR process was not only used to seize what is term “most likely mode value” of the present conditional modal distribution given the immediate past but was also used to capture the conditional modal distribution of the observations given the immediate past that can either be perceived as an asymmetric or symmetric distributed varieties. The proposed FZBMAR process was compared with the existing Student-t Mixture Autoregressive (StMAR) and Gaussian Mixture Autoregressive (GMAR) processes with the demonstration of monthly average share prices (stock prices) of sixteen (16) swaying European economies. Based on the findings, the FZBMAR process outperformed the existing StMAR and GMAR processes in explaining the sixteen (16) swaying European economies share prices via a minimum Pareto-Smoothed Important Sampling Leave-One-Out Cross-Validation (PSIS-LOO) error process performance in comparison with AIC, HQIC by the latters. The same singly truncated student-t prior distribution was adopted for the noisy adoption of Fisher’s z hyper-parameters and the embedded autoregressive coefficients in the proposed FZBMAR process; such that their resulting posterior distributions gave the same singly truncated student-t distribution (conjugate) with an embedded Gamma variate.
Бесплатно
On the Relations between Lucas Sequence and Fibonacci-like Sequence by Matrix Methods
Статья научная
In the present paper first and foremost we introduce a generalization of a classical Fibonacci sequence which is called a Fibonacci-Like sequence and at hindmost we obtain some relationships between Lucas sequence and Fibonacci-Like sequence by using two cross two matrix representation to the Fibonacci-Like sequence. The most worth noticing cause of this article is our proof method, since all the identities are proved by using matrix methods.
Бесплатно
On the number of Perfect Matchings of Tubular Fullerene Graphs
Статья научная
The perfect matchings counting problem of graphs has important applications in combinatorial optimization, statistical physics, quantum chemistry and other fields. A perfect matching of a graph G is a set of non-adjacent edges that covers all vertices of G . The number of perfect matchings of a graph is closely related to its number of vertices. A fullerene graph is a 3-connected cubic planar graphs all of whose faces are pentagons and hexagons. Došlić obtained that a fullerene graph with P vertices has at least P/2+1 perfect matchings, Zhang et al. proved a better lower bound 3(p+2)/4 of the number of perfect matchings of a fullerene graph. We have known that the fullerene graph has a nontrivial cyclic 5-edge-cut if and only if it is isomorphic to the graph Tn for some integer n >=1, where Tn is the tubular fullerene graph Tn comprised of two caps formed of six pentagons joined by n concentric layers of hexagons. In this paper, the perfect matchings of the graph Tn is classified by matching a certain vertex, and recursive relations of a set of perfect matching numbers are obtained. Then the calculation formula of the number of perfect matchings of the graph Tn is given by recursive relationships. Finally, we get the number of perfect matchings of Tn with P vertices.
Бесплатно