Статьи журнала - International Journal of Mathematical Sciences and Computing
Все статьи: 246

Статья научная
Quantum cryptography is marches towards secure communication by using quantum protocols. Number of quantum protocols has been evolved based on an entanglement in three decades; similarly during this meanwhile non-entanglement based protocols have been evolved within the same period also. Among number of different protocols a torch bearer was BB84 protocol. Even though different quantum communication protocols exist, the BB84 protocol proved its application by initial experiments whereas most of the other protocols are theoretical which marches towards the practical application yet. But in quantum mechanics principle, cryptography based on an entanglement and superposition of entangled particle. Furthermore, challenges ahead are development and design high sensitive equipments for measurement of an entangled particle position at output end. Particle entanglements open a new door for computation worlds such as speedup, security. In this article, we discuss quantum protocols, their challenges, and applications based on above discussion.
Бесплатно

Roman Domination in Semi-Middle Graphs: Insights and Applications in Computer Network Design
Статья научная
Consider a G=(V,E) and the function f :V -{0,1,2}. . Unguarded with regard to is defined as a node u with f (u) = 0 that is not next to a node with 1 or 2 . The function f (V0 ,V1,V2 ) fulfilling the condition, in which each node u for which f (u)=0 is adjoint to at least one node v to which f (v) =2 , is referred to be a Roman dominant function, known as RDF of a graph G . Roman domination number (RDN) of graph represented by rR (G), is the bare lowest count of guards that must be employed in any RDF. In this paper, we introduce a new form for graph called Semi-Middle Graph for any given graph and we find the RDN for the Semi - Middle Graph of some specific graphs. In the field of networking, the concept of the Semi-Middle Graph can be applied to network topology optimization. Specifically, it can be used in the design of communication networks where each direct connection (edge) between two nodes (devices or routers) has an intermediary node that facilitates more efficient data routing or enhances fault tolerance. Usefulness of Roman Domination Number of a Semi-Middle Graph in Networking includes Network Coverage and Monitoring, Fault Tolerance and Redundancy, Optimal Placement of Relays and Routers, Load Balancing and Resource Allocation.
Бесплатно

Статья научная
How to manage patient's service time has been a burden in view of the condition of patients who have to wait for required service from doctors in many hospitals in developing countries. This paper deals with the management of service time of doctor's consultation using parallel service time. Though, the theoretical underlying distribution of service time is exponential, but this research showed service time to be non-exponential but, normal. This unusual distribution of service time was attributed to non-identical services required by patients from doctors in the considered sample space. Secondly, the mean service time from each service point as researched was found the same. This showed that no line could be preferred to other.
Бесплатно

Signature-based malware detection using approximate boyer moore string matching algorithm
Статья научная
Adversaries to any system restlessly continues to sought effective, non-detectable means to aid them successful penetrate secure systems, either for fun or commercial gains. They achieve these feats easily through the use of malware, which keeps on the rise, an ever-growing and corresponding overpopulated malware zoo. As such, information technology industry will continue to encounter via these escapades, both monetary and prestigious losses. Malware by design aims to alter the behaviour of its host by self-replicating its genome or codes unto it. They are quite fascinating in that on execution, some malware change their own structure so that its copies have same functionality but differ in signature and syntax from the original or parent virus. This makes signature detection quite unreliable. Study investigates detection of metamorphic malware attacks using the Boyer Moore algorithm for string-based signature detection scheme.
Бесплатно

Simulation of CPU Scheduling Algorithms using Poisson Distribution
Статья научная
Numerous scheduling algorithms have been developed and implemented in a bid to optimized CPU utilization. However, selecting a scheduling algorithm for real system is still very challenging as most of these algorithms have their peculiarities. In this paper, a comparative analysis of three CPU scheduling algorithms Shortest Job First Non-Preemptive, Dynamic Round-Robin even-odd number quantum Scheduling algorithm and Highest Response-Ratio-Next (HRRN) was carried out using dataset generated using Poisson Distribution. The performance of these algorithms was evaluated in the context of Average Waiting Time (AWT), Average Turnaround Time (ATT). Experimental results showed that Shortest Job First Non-Pre-emptive resulted in minimal AWT and ATT when compared with two other algorithms.
Бесплатно

Slow Invariant Manifold Analysis in a Mitotic Model of Frog Eggs via Flow Curvature Method
Статья научная
A slow-fast dynamical systems can be investigated qualitatively and quantitatively in the study of nonlinear chaotic dynamical systems. Slow-fast autonomous dynamical systems exhibit a dichotomy of motion, which is alternately slow and quick, according to experiments. Some investigations show that slow-fast dynamical systems have slow manifolds, which is supported by theory. The goal of the proposed study is to show how differential geometry may be used to examine the slow manifold of the dynamical system known as the mitotic model of frog eggs. The algebraic equation of the flow curvature manifold is obtained using the flow curvature technique applied to the dynamical mitosis model. Using the Darboux invariance theorem, we then argue that this slow manifold equation is invariant with regard to the flow.
Бесплатно

Slow Invariant Manifold of Brusselator Model
Статья научная
The slow invariant manifold is a unique trajectory of the dynamical system that describes the long-time dynamics of the system’s evolution efficiently. Determining such manifolds is of obvious importance. On one hand they provide a basic insight into the dynamics of the system, on the other hand they allow a reduction of dimension of the system occurs on the invariant manifold only. If the dimension of the invariant manifold is sufficiently low, this reduction may result in substantial savings in computational costs. In this paper, differential geometry based new developed approach called the flow curvature method is considered to analyse the Brusselator model. According to this method, the trajectory curve or flow of any dynamical system of dimension considers as a curve in Euclidean space of dimension . Then the flow curvature or the curvature of the trajectory curve may be computed analytically. The set of points where the flow curvature is null or empty defines the flow curvature manifold. This manifold connected with the dynamical system of any dimension directly describes the analytical equation of the slow invariant manifold incorporated with the same dynamical system. In this article, we apply the flow curvature method for the first time on the two-dimensional Brusselator model to compute the analytical equation of the slow invariant manifold where we use the Darboux theorem to prove the invariance property of the slow manifold.
Бесплатно

Smart Contract Obfuscation Technique to Enhance Code Security and Prevent Code Reusability
Статья научная
Along with the advancements in blockchain technology, many blockchain-based successful projects have been done mainly on the ethereum platform, most of which deal with transactions. Still, it also carries various risks when it comes to security, as evident from past attacks. Most big projects like uniswap, decentraland, and others use smart contracts, deployed on the ethereum platform, leading to similar projects via code reuse. Code reuse practice is quite frequent as a survey suggests 26% of contract code deployed is via code reuse. Smart contract code obfuscation techniques can be used on solidity code that is publicly verified, published (in the case of Ethereum), and on the deployment address. All the above techniques work by replacing characters with their random counterpart, known as statistical substitution. A statistical substitution is a process of transforming an input string into a new string where each character has been replaced by a random character drawn from a stock of all possible 'random' characters. Therefore, we proposed numerous methods in this paper to solve the above problems using various smart contract code obfuscation techniques. These techniques can be really useful in blockchain projects and can save millions of dollars to investors & companies by enhancing code security and preventing code reusability. Techniques mentioned in this paper when compared with other techniques. Our methods are not expensive to implement, very easy to use, and provide a developer-friendly selective increment in code complexity.
Бесплатно

Solving Bi-matrix Games in Tourism Planning Management under Rough Interval Approach
Статья научная
The aim of this article is to propose a novel and simple technique for solving bi-matrix games with rough intervals payoffs. Since the payoffs of the rough bi-matrix games are rough intervals, then its value is also a rough interval. In this technique, we derived four bilinear programming problems, which are used to obtain the upper lower bound, lower lower bound, lower upper bound and upper upper bound of the rough interval values of the players in rough bi-matrix games which we called in this article as 'solution space'. Moreover, the expected value operator and trust measure of rough interval have been used to find the α-trust equilibrium strategies and the expected equilibrium strategies of rough interval bi-matrix games. Finally, numerical example of tourism planning management model is presented to illustrate the methodologies adopted and solution procedure.
Бесплатно

Some measures of picture fuzzy sets and their application in multi-attribute decision making
Статья научная
To measure the difference of two fuzzy sets / intuitionistic sets, we can use the distance measure and dissimilarity measure between fuzzy sets. Characterization of distance/dissimilarity measure between fuzzy sets/intuitionistic fuzzy set is important as it has application in different areas: pattern recognition, image segmentation, and decision making. Picture fuzzy set (PFS) is a generalization of fuzzy set and intuitionistic set, so that it have many application. In this paper, we introduce concepts: difference between PFS-sets, distance measure and dissimilarity measure between picture fuzzy sets, and also provide the formulas for determining these values. We also present an application of dissimilarity measures in multi-attribute decision making.
Бесплатно

Sorting using a combination of bubble sort, selection sort & counting sort
Статья научная
One of the most important problems in computer science is the ordering of the data. Although sorting is a very old computer science problem, it still attracts a great deal of research. Usually, when we face a problem, we’re concerned with finding the solution, then getting it out of our heads and into a text editor, white-board, or down on a piece of paper. Eventually, we start transforming that idea into code, and the code is pretty terrible the first time around. But at some point, once we’ve made it work and made it right, we find ourselves asking: Can I make it fast? Can I make it better? This paper presents an enhanced sorting algorithm which comprises of a combination of Bubble Sort, Selection Sort, and Counting Sort. The new algorithm is analyzed, implemented, tested, compared and the results were promising.
Бесплатно

Stability Analysis of COVID-19 Model with Quarantine
Статья научная
In this paper, A 6 (six) compartmental (S, IU, IS, IA, Q, R) model was presented to examine the dynamical behavior of disease transmission in the system with quarantine effect on the symptomatic infected, asymptomatic infected and Reproduction number R0 within a given population. The parameters model was analyzed and estimated experimentally using the real data of COVID-19 confirmed cases for Ethiopia via MATLAB 2021a. Reproduction number R0 which is a key indicator to whether a disease outbreak spread force will persist or die out within population. R0 was found using the next generation matrix with Gaussian elimination method to obtain the inverse of the transitive matrix. The model also aims at reducing R0 owning to the fact that when the basic reproduction number is less than 1 infected person, disease dies out and when the reproduction number is greater than 1 infected person, the disease persists. The facts about R0 geared us to mathematically check for the Routh-Hurwitz stability criteria and Lyapunov Functions to concisely establish the necessary and sufficient conditions for the Local and Global stability of model. results show that, when R0 - 1 and R0 > 1 the diseases free equilibrium and endemic equilibrium points are locally and globally asymptotically stable respectively. In order to interpret results and recommend possible control measure of disease, The dynamics of the Quarantine compartment in model was tested via sensitivity analysis to experimentally investigate transition/ transmission pattern. The effect of quarantine analysis on the model shows that preventive measures such as increase in quarantine with treatments during disease outbreak will significantly decrease the Reproduction number. Hence, increase in Quarantine compartment will flatten the curve of (S, IU, IS, IA, Q, R) dynamic model correspondingly.
Бесплатно

Статья научная
Newcastle is a viral disease of chicken and other avian species. In this paper, the stability analysis of the disease free and endemic equilibrium points of the Newcastle disease model of the village chicken in the absence of any control are studied. The Hurwitz matrix criterion is applied to study the stability of the Newcastle disease free equilibrium point,Q0. The result shows that the disease free equilibrium point is locally asymptotically stable iff the principle leading minors of the Hurwitz Matrix, (for n∈ℝ+) are all positive. Using the Castillo Chavez Theorem we showed that, the disease free equilibrium point is globally asymptotically when R0-1. Furthermore, using the logarithmic function and the LaSalle’s Theorem, the endemic equilibrium point is found globally asymptotically stable for R0-1. Finally the numerical simulations confirm the existence and stability of the equilibrium points of the model. This reveals that, proper interventions are needed so as to decrease the frequently occurrence of the Newcastle disease in the village chicken population.
Бесплатно

Stochastic Rules in Nucleotide Sequences in Genomes of Higher and Lower Organisms
Статья научная
The article presents new stochastic rules of nucleotide sequences in single-stranded DNA of eukaryotic and prokaryotic genomes. These discovered rules are candidates for the role of universal genomic rules. To reveal such rules, the authors represent any of genomic sequences in single-stranded DNA as a set of n parallel texts (or layers), each of which is written based on one of the different n-plets alphabets (n = 1, 2, 3, ...). Then comparison analysis of percentages of the 4n kinds of n-plets in the n parallel texts in such sequence is fulfield. In the result, unexpected stochastic rules of invariance of total sums of percentages for certain tetra-groupings of n-plets in different parallel texts of genomic DNA sequences are revealed.The presented rules significantly expand modern knowledge about stochastic regularities in long single-stranded DNA sequences, and they can be considered as generalizations of the second Chargaff's rule. A tensor family of matrix representations of interrelated DNA-alphabets of 4 nucleotides, 16 doublets, 64 triplets, and 256 tetraplets is used in the study. Some analogies of the discovered genetic phenomena with phenomena of Gestalt psychology are noted. The authors connect the received results about the genomic percentages rules with a supposition of P. Jordan, who is one of the creators of quantum mechanics and quantum biology, that life's missing laws are the rules of chance and probability of the quantum world.
Бесплатно

Study of memory effect in an inventory model with linear demand and shortage
Статья научная
For real market studies of any business, inclusion of memory or past experience in inventory model has great impact. Memory means it depends on the past state of the process not only current state of the process. Indeed, the inventory system is an appropriate example as a memory affected system. Presence of long past experiences or short past experiences of any company or shop has different importance on increasing or decreasing profit. The description of the memory dependent inventory model is more appropriate process compared to the memory less inventory model. Depending on demand rate, a comparison between the minimized total average costs of different numerical example has been presented. Fractional order derivative and integration have been used to establish the model. Our considered numerical example establishes that if linear type demand rate is only time proportional, profit of the business is high compared to the linear type demand rate.
Бесплатно

Study on Influencing Factors of Regional Economy Based on Multilevel Model
Статья научная
Based on the relevant data of economic development of 31 provinces in China from 2016 to 2021, this paper selects the level of economic development as the response variable. The explanatory variables are selected from the aspects of location, human capital, industrial structure, foreign trade, system, science and technology and employment level. Aiming at the data with hierarchical structure, a multilevel model is proposed for analysis. It is concluded that human capital, industrial structure, foreign trade and system have a significant impact on the level of economic development. The impact of technology and employment level on the level of economic development is not significant. At the same time, this paper also makes a comparative analysis of the linear regression model, random intercept model and random intercept-slope growth model, which shows the advantages of random intercept-slope growth model.
Бесплатно

The Application of Meta-Heuristic Algorithms in Automatic Software Test Case Generation
Статья научная
Nowadays, software test is one of the most important activities that software's quality will be certified by it. Test operation includes program's implement on test case set and comparison of results with expected one. Manual test case for operation test program and error detect is time consuming with insufficient precision and complicated coverage of program, so, the use of algorithms in automatic test case generation has been considered. Meta-heuristic algorithms are known tools which are optimized and used in test case generation. Most of complicated matters need a lot of possible states assessment in order to reach the valid answer. With the proper answer, test case optimization and meta-heuristic algorithms play a constructive role. In this paper we would compare methods and their traits, and the software test case generation methods based on meta-heuristic algorithms with their description.
Бесплатно

The Construction of two classes of 4-valent tri- Cayley Graphs over Cyclic Group
Статья научная
The symmetry of the graph has always been a hot topic in graph theory and the vertex-transitive graphs are a class of graphs with high symmetry. Cayley graphs which are the highly symmetrical graphs play an important role and much work has been done in the study. The tri-Cayley graph is a natural generalization of the Cayley graph. A graph is said to be a tri-Cayley graph if it admits a semiregular subgroup of automorphisms having three orbits of equal length. Koács et al. classified the cubic symmetric tricirculants in 2012 and Potočnik et al. classified the cubic vertex-transitive tricirculants in 2018. Currently, there is no research on the classification of 4-valent tri-Cayley graphs over cyclic group. In this paper, we will construct two classes of 4-valent tri-Cayley graphs over cyclic group and discuss their automorphism groups. In addition, the vertex transitivity, edge transitivity and arc transitivity are proved.
Бесплатно

The Forecast of Jute Export in Bangladesh for Optimal Smoothing Constants
Статья научная
Forecasting is estimating the magnitude of uncertain future events and provides different results with different supposition. In order to identify the core data pattern of jute bale requirements for yarn production, we examined 10 years' worth of data from Jute Yarn/Twin that were shipped by their member mills Limited. Exponential smoothing and Holt’s methods are commonly used to forecast this output because it provides an adequate result. Selecting the right smoothing constant value is essential for reducing predicting errors. In this work, we created a method for choosing the smoothing constant's ideal value to reduce study errors measured by the mean square error (MSE), mean absolute deviation (MAD), and mean square percent error (MAPE). At the contrary, we discuss research finding result and future possibility so that Jute Mills Limited and similar companies may execute forecasting smoothly and develop the expertise level of the procurement system to stay competitive in the worldwide market.
Бесплатно

The Study of Slow Manifolds in the Lorenz-Haken Model Using Differential Geometry
Статья научная
In order to explore the Lorenz-Haken model, we will concentrate on the flow curvature technique, a recently created method based on differential geometry. This approach treats a dynamical system's trajectory curve or flow as a curve in Euclidean space. Analytical calculations may be used to determine the flow curvature, which is the trajectory curve's curvature. The flow curvature manifold, which is related to the dynamical system of any dimension, is defined by the locations where the flow curvature is null. For the slow invariant manifold of the same dynamical system, the flow curvature manifold offers an analytical equation. The slow invariant manifold equation may be discovered using the flow curvature technique without the need of any asymptotic expansions. In this study, we compute the analytical equation of the slow invariant manifold for the three-dimensional Lorenz-Haken model using the flow curvature approach for the first time. This analytical equation, together with its visual representation in phase space, makes it possible to distinguish between the slow development of trajectory curves and the rapid one, which advances our knowledge of this slow-fast domain. This study also advances the field relative to earlier similar work. Aside from that, we utilize the Darboux theorem to demonstrate the slow manifold's invariance characteristic.
Бесплатно