International Journal of Mathematical Sciences and Computing @ijmsc
Статьи журнала - International Journal of Mathematical Sciences and Computing
Все статьи: 246

Generalized Algorithm on idiosyncrasy of Numbers
Статья научная
In this paper, using computer algebra system a new generalized algorithm is developed to study and generalize the Kaprekar’s operation which can be used for desired numbers of iterations and is also applicable to any n-digits number which is greater than or equal to two. Existing relevant results are verified with the available results in literature and further extended to examine the difference (kernel) of the obtained number during the process with the number obtained in preceding iteration after each step. Sum of the digits of an acquired number obtained after each step is also noticed and found that sum of its digits is divisible by 9. A detailed investigation is conducted for all two-digit number and the output acquired is exhibited in tabular form which has not been studied in earlier. An 8-digits number also considered and found that it does not converges to a unique kernel like 3-digits and 4-digits, but follows a regular pattern after initial iteration. Analytical illustrations are provided along with pictorial representations for 2-digits, 3-digits 4-digits and 8-digits number. This algorithm can further be employed for numbers having any number of digits.
Бесплатно

Graph Dynamic Threshold Model Resource Network: Key Features
Статья научная
In this paper, we describe a graph dynamic threshold model called resource network, and briefly present the main results obtained during several years of research. Resource Network is represented by a connected oriented with weighted graph with an arbitrary topology. Weights of edges denote their throughput capacities for an abstract resource. The resource is stored in vertices, which can contain its unlimited amount. Network operates in discrete time. The total amount of resource is constant, while pieces of resource are reallocating among vertices every time step, according to certain rules with threshold switching. The main objective of our research is to define for a network with an arbitrary topology all its basic characteristics: the vectors of limit state and flow for every total amount of resource W; the threshold value of total recourse T, which switches laws of operating of the network; description of these laws. It turned out that there exists several classes of networks depending on their topologies and capacities. Each class demonstrates fundamentally different behavior. All these classes and their characteristics will be reviewed below.
Бесплатно

Green Computing: An Era of Energy Saving Computing of Cloud Resources
Статья научная
Cloud computing is a widely acceptable computing environment, and its services are also widely available. But the consumption of energy is one of the major issues of cloud computing as a green computing. Because many electronic resources like processing devices, storage devices in both client and server site and network computing devices like switches, routers are the main elements of energy consumption in cloud and during computation power are also required to cool the IT load in cloud computing. So due to the high consumption, cloud resources define the high energy cost during the service activities of cloud computing and contribute more carbon emissions to the atmosphere. These two issues inspired the cloud companies to develop such renewable cloud sustainability regulations to control the energy cost and the rate of CO2 emission. The main purpose of this paper is to develop a green computing environment through saving the energy of cloud resources using the specific approach of identifying the requirement of computing resources during the computation of cloud services. Only required computing resources remain ON (working state), and the rest become OFF (sleep/hibernate state) to reduce the energy uses in the cloud data centers. This approach will be more efficient than other available approaches based on cloud service scheduling or migration and virtualization of services in the cloud network. It reduces the cloud data center's energy usages by applying a power management scheme (ON/OFF) on computing resources. The proposed approach helps to convert the cloud computing in green computing through identifying an appropriate number of cloud computing resources like processing nodes, servers, disks and switches/routers during any service computation on cloud to handle the energy-saving or environmental impact.
Бесплатно

Handling Numerical Missing Values Via Rough Sets
Статья научная
Many existing industrial and research data sets contain missing values. Data sets contain missing values due to various reasons, such as manual data entry procedures, equipment errors, and incorrect measurements. It is usual to find missing data in most of the information sources used. Missing values usually appear as "NULL" values in the database or as empty cells in the spreadsheet table. Multiple ways have been used to deal with the problem of missing data. The proposed model presents rough set theory as a technique to deal with missing data. This model can handle the missing values for condition and decision attributes, the web application was developed to predict these values.
Бесплатно

Hive-Based Data Encryption for Securing Sensitive Data in HDFS
Статья научная
Big Data is a new class of technology that gives businesses more insight into their massive data sets, allowing them to make better business decisions and satisfy customers. Big data systems are also a desirable target for hackers due to the aggregation of their data. Hadoop is used to handle large data sets through reading and writing application programs on a distributed system. Hadoop Distributed File System is used to store massive data. Since HDFS does not safeguard data privacy, encrypting the file is the right way to protect the stored data in HDFS but takes a long time. In this paper, regarding privacy concerns, we use different compression-type data storage file formats with the proposed user-defined function (XOR-Onetime pad with AES) to secure data in HDFS. In this way, we provide a dual level of security by masking the selective data and whole data in the file. Our experiment demonstrates that the whole process time is significantly smaller than that of a conventional method. The proposed UDF with ORC, Zlib file format gives 9-10% better performance results than 2DES and other methods. Finally, we decreased the load time of secure data and significantly improved query processing time with the Hive engine.
Бесплатно

Статья научная
The amount of data that is transmitted across the internet is continuously increasing. With the transmission of this huge volume of data, the need of an encryption algorithm that guarantees the data transmission speedily and in a secure manner is a must. Hence, to achieve security in wireless networks, cryptography plays a very important role. In this paper, several hybrid combinations, which combines both symmetric and asymmetric cryptographic techniques to offer high security with minimum key maintenance is presented. This hybrid combination offers several cryptographic primitives such as integrity, confidentiality and authentication, thereby enhancing the security. Various combinations of Advanced Encryption Standard (AES), Elliptical Curve Cryptography (ECC) and Rivest, Shamir and Adleman (RSA) algorithms are used to provide hybrid encryption. Secure Hash Algorithm (SHA-256) is also used to provide authentication and integrity. The experimental results show that the proposed hybrid combinations gives better performance in terms of computation time compared to individual cryptographic schemes.
Бесплатно

Implementation of Fast and Efficient Mac Unit on FPGA
Статья научная
Floating-point arithmetic operations on digital systems have become an important aspect of research in recent times. Many architecture have been proposed and implemented by various researchers and their merits and demerits are compared. Floating point numbers are first converted into the IEEE 754 single or double precision format in order to be used in the digital systems. The arithmetic operations require various steps to be followed for the correct and accurate steps. In the proposed approach a fast and area efficient Carry Select Adder are implemented along with the parallel processing of various units used in the architecture. The result also verifies the proposed approach that shows a decrement of 27 % in the combinational path delay with an increment of around 8% in the number of LUTs used.
Бесплатно

Статья научная
The mortuary industry in most developing countries are in need of improvement on the receiving and releasing of deceased persons. Paper-based mortuary systems lack reliability, timely information retrieval, accountability, data security and access control; compared to computer-based, mortuaries are the norm in advanced countries. This study reports the development of a fingerprint-based biometric mortuary system for deceased identification and claiming. The system design methodology was based on the object-oriented analysis and design approach using the UML. The system was implemented with Java as the frontend and processing logic, interacting with MySQL Server at the backend for transaction management. As generated from the University of Calabar Teaching Hospital Calabar, the result of this study shows that, with the fingerprint verification technique, mortuary establishments in Nigeria and related countries can enhance the deceased claimant verification process to avoid releasing the deceased to wrong persons and reduce deceased identification anomalies. The study has shown that biometrics technology can enhance deceased identification and release in resource-constrained settings like Nigeria.
Бесплатно

Inhomogeneous Assessment of New Mechanism of Adaptive Detection of Partially-correlated χ2-Targets
Статья научная
Owing to its merits in fluctuating radar targets detection, the scenario of fusion structure has rapidly become a methodology of choice. The base goal of this paper is to analyze the linear type of this methodology, which is termed as linear fusion (LF). The target of interest along with fallacious ones is assumed to be fluctuating obeying χ2-model of two-degrees of freedom in their fluctuation, with particular attention on partially-correlated target returns. Closed-form expression is derived for the detection performance of the proposed processor. The analytical results are validated with computer simulation. Our simulation results demonstrate that the LF model yields impressive detection performance in terms of detection performance and CFAR loss, in comparison with the conventional schemes in the case where the operating environment is free of or contaminated with interferers. Additionally, the LF homogeneous performance outweighs that of Neyman-Pearson (N-P) detector, which is the yardstick of the CFAR world. Moreover, the LF structure has the capability of holding the rate of false alarm fixed against the presence of interferers. The ability to obtain improved performance compared to existing models is the major contribution of this research.
Бесплатно

Integration based on Monte Carlo Simulation
Статья научная
In this short article an attempt has been made to model Monte Carlo simulation to solve integration problems. The Monte Carlo method employs random sampling and the theory of big numbers to generate values that are very close to the integral's true solution. Python programming has been used to implement the developed algorithm for integration. The developed Python functions are tested with the help of six different integration examples which are difficult to solve analytically. It has been observed that that the Monte Carlo simulation has given results which are in good agreement with the exact analytical results.
Бесплатно

Interval-Valued Fuzzy Soft Subhemiring of Hemiring and it’s Application
Статья научная
In this paper, we initiated the idea of interval-valued fuzzy soft set (IVFSS) and a few results, Operations, definitions, and properties also a few properties and characteristics of IVFSSs and Prove some of theorem and we discuss a few examples uses of soft set in finding a selection taking problem. Also initiated the comparable measure of two IVFSSs and discuss with the Presentation of medical application problem.
Бесплатно

Labeling a kind of Cubic Graphs by Subgraph Embedding Method
Статья научная
Based on a problem raised by Gao et. al. (Bull. Malays. Math. Sci. Soc., 41 (2018) 443–453.), we construct a family of cubic graphs which are double-edge blow-up of ladder graphs. We determine the full friendly index sets of these cubic graphs by embedding labeling graph method. At the same time, the corresponding labeling graphs are provided.
Бесплатно

Low-tech steganography for covert operations
Статья научная
Text steganography, the art of concealing a secret text inside another innocuous text called the cover, is usually performed by insertion of whitespace, punctuation marks, misspelling words, or by arbitrarily capitalizing words or inserting synonyms, changing font-sizes & colors, etc. All of these have the disadvantage that they either arouse suspicion or are easily noticeable; and even lost if manually copied, i.e. handwritten. Furthermore, they are easily detectable by automated checkers. Still there are other methods which require a stego-key in order to decrypt the message. In covert intelligence operations, transmission of the stego-key may not be possible at all, more so when the message is urgent. Digital communications and Internet connectivity may also be lacking in certain situations, and the only mode of message passing available may be the exchange of handwritten text on paper; which effectively rules out text modifications like font-changes, whitespace insertion, etc. or any form of digital steganography like image/audio steganography. Finally, in almost all text-steganographic techniques, there is no provision to for the receiver to detect whether or not there is indeed any message embedded. This is very important in intelligence operations where a number of decoy text need to be sent with only one concealing the actual message. In this paper, we propose a new tool called STEGASSIST that can help the sender in generating the stego-text manually. It is a low-tech form of steganography that is especially suited to covert operations like espionage or under-cover journalism. In this method, the generated cover and the stego-text are identical, or in other words, there is no cover-text. Moreover, decryption does not require a stego-key, and the stego-text may be printed or even hand-written and sent via unreliable messengers, or published, without arousing any suspicion. Finally, the received stego-text can be checked by the receiver to detect whether or not there is any actual message embedded in it.
Бесплатно

Статья научная
Precise extrapolative mining and analysis of relevant dataset during or after any disease outbreak can assist the government, stake holders and relevant agencies in the health sector to make important decisions with respect to the disease outbreak control and management. While prior works has concentrated on non-stationary long term data, this work focuses on a short term non-stationary and relatively noisy data. Particularly, a distinctive nonparametric machine learning method based kernel-controlled probabilistic Gaussian process regression model has been proposed and employed to model and analyze Covid-19 pandemic data acquired over a period of approximately six weeks. To accomplish the aim, the MATLAB 2018a computational and machine learning environment was engaged to develop and perform the Gaussian process extrapolative analysis. The results displayed high scalability and optimal performance over the commonly used machine learning methods such as the Neural networks, Neural-Fuzzy networks, Random forest, Regression tree, Support Vector machines, K-nearest neighbor and Discriminant linear regression models. These results offer a solid foundation for conducting research on reliable prognostic estimations and analysis of contagious disease emergence intensity and spread.
Бесплатно

Machine learning applied to cervical cancer data
Статья научная
Cervical Cancer is one of the main reason of deaths in countries having a low capita income. It becomes quite complicated while examining a patient on basis of the result obtained from various doctor’s preferred test for any automated system to determine if the patient is positive with the cancer. There were 898 new cases of cervical cancer diagnosed in Australia in 2014. The risk of a woman being diagnosed by age 85 is 1 in 167. We will try to use machine learning algorithms and determine if the patient has cancer based on numerous factors available in the dataset. Predicting the presence of cervical cancer can help the diagnosis process to start at an earlier stage.
Бесплатно

Статья научная
In countries with arid and semi-arid climate such as Iran with water constraints, the use of groundwater resources is very important. There are various mathematical based methods and software packages for modelling groundwater resources. This paper uses groundwater flow problems to illustrate possible approaches for providing the environment of active teaching. Mathematical models supported by software applications facilitate the gaining of an insight into the physical behaviors by investigating a host of scenarios and events but they are poor in training critical thinking for encapsulating the hardcore mathematical equations describing the problems. Whilst software engineering has transformed the intellectual capitals accumulated between the 20th century and the middle of the 21th century into working tools, it has the drawback of encapsulating core mathematics away from common experience of the students and practitioners. This diminishes critical thinking in a world of increasing risks and ought to be taken a serious side effect of software engineering. This paper suggests a solution by building up a library of solvers using spreadsheets, with the effect that the encapsulated knowledge of building modelling solvers can permanently be brought to life in education with the active learning culture. Implementation was carried out in the same way for steady state flow as well as explicit 2D and 3D finite difference approximation for transient flow. This study raises concern about the encapsulated body of knowledge contributed to the emergence and the establishment of modelling software applications since 1980. This body of knowledge comprise a deeper understanding of equations of often partial differential equations describing physical problems, as well as their numerical transformation into systems of equations and their subsequent properly- and improperly posed systems of equation in terms of their assumptions and quality conditions. The outcome is the emergence of a cookbook mentality among the new breed of mathematical modelers without any critical thinking. The results revealed that spreadsheet can be used with the aid of the Solver function. This idea capitalized on the capabilities of the net-generation and opens up the possibility for the emergence of bottom-up open source modelling platforms.
Бесплатно

Статья научная
The research is concerned with the development of a mathematical model for predicting the rate of human happiness and to outline factors that influence human happiness. The model was optimized and observation about the model’s extreme value was made. The outcome of the optimization result showed that happiness has neither minimum nor maximum level that should be required in human. It means someone’s happiness could be close to 0% or even be up to 100%. Thereafter, the model was analysed and the collated real-life data were correlated with those of the model data (H model) using suitable statistical tools. The findings from the correlation result showed that the questionnaire result attained a 70% degree of correlation with the estimated model result (H model), and thus recommending the model as a standard measure for predicting the rate of human happiness.
Бесплатно

Статья научная
At the end of 2019 the novel coronavirus disease (COVID-19) was declared as a major health hazard by the world health organization (WHO) and the only available way of stopping this threat was via non-pharmaceutical approach. Most authors have studied COVID-19 transmission dynamics using mathematical modeling by involving the basic (major) compartments. In this study we have formulated a mathematical model for the transmission dynamics of COVID-19 which incorporates almost all possible scenarios at present. We have also analyzed the impact of prevention and control strategies. The model has satisfied all the basic properties that infectious disease model should fulfill; Boundedness, positivity of its solutions, stability analysis, epidemic equilibrium point, basic reproduction number and local stability of the disease free equilibrium. We introduced a self-protection parameter, m to analyze the impact of physical distancing, staying at home, using masks, washing hands and so on. The impact of isolation and quarantine has been analyzed and their effects on the number of Exposed, infected and dead people were clearly discussed. In addition to these, the effects of symptomatic and asymptomatic individuals on the value of basic reproduction number have been examined. The numerical simulations of this study indicate that the government should increase isolation, quarantine and self-protection rates. Additionally to minimize the contact rate between susceptible and asymptotic individuals, self-protection at all cost and everywhere has to be done, so that both symptomatic and importantly asymptomatic individuals stop transmitting the virus.
Бесплатно

Means of the Semantic Search Personification on base of Ontological Approach
Статья научная
The main trends of information retrieval deal with its personification and semantization are analyzed. Sources of knowledge about main subjects and objects of the search process are considered. Ontological model of interaction between the Web information resources and information consumers is proposed as a base of the search personification. Methods of development, improvement and usage of this model are defined. User characteristics are supplemented with sociopsychophysiological properties and ontologically personalized readability criteria. Software realization of semantic search on base of this ontological approach is described.
Бесплатно

Mining maximal subspace clusters to deal with inter-subspace density divergence
Статья научная
In general, subspace clustering algorithms identify enormously large number of subspace clusters which may possibly involve redundant clusters. This paper presents Dynamic Epsilon based Maximal Subspace Clustering Algorithm (DEMSC) that handles both redundancy and inter-subspace density divergence, a phenomenon in density based subspace clustering. The proposed algorithm aims to mine maximal and non-redundant subspace clusters. A maximal subspace cluster is defined by a group of similar data objects that share maximal number of attributes. The DEMSC algorithm consists of four steps. In the first step, data points are assigned with random unique positive integers called labels. In the second step, dense units are identified based on the density notion using proposed dynamically computed epsilon-radius specific to each subspace separately and user specified input parameter minimum points, τ. In the third step, sum of the labels of each data object forming the dense unit is calculated to compute its signature and is hashed into the hash table. Finally, if a dense unit of a particular subspace collides with that of the other subspace in the hash table, then both the dense units exists with high probability in the subspace formed by combining the colliding subspaces. With this approach efficient maximal subspace clusters which are non-redundant are identified and outperforms the existing algorithms in terms of cluster quality and number of the resulted subspace clusters when experimented on different benchmark datasets.
Бесплатно