ORIGINAL_ARTICLE
Existence result of solutions for a class of nonlinear differential systems
In this paper, we will discuss the existence of bounded positive solutions for a class of nonlinear differential systems. The objective will be achieved by applying some results and techniques of functional analysis such as Schauder's fixed point theorem and potential theory tools.
https://ijnaa.semnan.ac.ir/article_5006_29f4a6fe3316ba8010b3e9eae806fd2f.pdf
2021-07-01
1
10
10.22075/ijnaa.2020.17236.1918
nonlinear differential system
potential theory
Green's function
positive solution
Schauder's fixed point theorem
Salim
Mesbahi
salimbra@gmail.com
1
Department of Mathematics, Faculty of Science, Ferhat Abbas University, Setif, Algeria
LEAD_AUTHOR
ORIGINAL_ARTICLE
About solving stochastic It\^{o}-Volterra integral equations using the spectral collocation method
The purpose of this paper is to propose the spectral collocation method to solve linear and nonlinear stochastic It^o-Volterra integral equations (SVIEs). The proposed approach is different from other numerical techniques as we consider the Legendre Gauss type quadrature for estimating It^o integrals. The main characteristic of the presented method is that it reduces SVIEs into a system of algebraic equations. Thus, we can solve the problem by Newton's method. Furthermore, the convergence analysis of the approach is established. The method is computationally attractive, and to reveal the accuracy, validity, and efficiency of the proposed method, some numerical examples and convergence analysis are included.
https://ijnaa.semnan.ac.ir/article_5007_2544128af083bb2a5da69c286e1ac8a0.pdf
2021-07-01
11
24
10.22075/ijnaa.2019.13154.1680
stochastic
It^o-Volterra integral equations
collocation
shifted Legendre polynomials
Gauss type quadrature
Zeinab
Taheri Tari
zeinabtaheritari@gmail.com
1
Department of Mathematics, Faculty of Mathematical Sciences and Computer, Kharazmi University, Tehran, Iran
LEAD_AUTHOR
Shahnam
Javadi
javadi@khu.ac.ir
2
Department of Mathematics, Faculty of Mathematical Sciences and Computer, Kharazmi University, Tehran, Iran
AUTHOR
Esmail
Babolian
babolian@khu.ac.ir
3
Department of Mathematics, Faculty of Mathematical Sciences and Computer, Kharazmi University, Tehran, Iran
AUTHOR
ORIGINAL_ARTICLE
Mittag-Leffler-Hyers-Ulam stability of Prabhakar fractional integral equation
In this paper, we define and investigate Mittag-Leffler-Hyers-Ulam and Mittag-Leffler-Hyers-Ulam-Rassias stability of Prabhakar fractional integral equation.
https://ijnaa.semnan.ac.ir/article_5008_13be82a3a1556ef40eaeab64b2cbac7d.pdf
2021-07-01
25
33
10.22075/ijnaa.2020.20274.2140
Mittag-Leffler-Hyers-Ulam stability
Mittag-Leffler-Hyers-Ulam-Rassias stability
Prabhakar fractional integral equation
Nasrin
Eghbali
nasrineghbali@gmail.com
1
Department of Mathematics, Faculty of Mathematical Sciences, University of Mohaghegh Ardabili, 56199-11367, Ardabil, Iran
LEAD_AUTHOR
Aram
Moharramnia
aramnia@yahoo.com
2
Department of Mathematics, Faculty of Mathematical Sciences, University of Mohaghegh Ardabili, 56199-11367, Ardabil, Iran
AUTHOR
John
Rassias
jrass@otenet.gr
3
Pedagogical Department of Mathematics, The National and Kapodistrian University of Athens, 4, Agamemnonos Str, Aghia Paraskevi, Attikis 15342, Greece
AUTHOR
ORIGINAL_ARTICLE
Fixed point results in partially ordered partial $b_{v}(s)$-metric spaces
In this paper, some fixed point results for generalized Geraghty type $α$-admissible contractive mappings and rational type generalized Geraghty contraction mappings are given in partially ordered partial $b_{v}(s)$-metric spaces. Also, a modified version of a partial $b_{v}(s)$-metric space is defined and a fixed point theorem is proved in this space. Finally, some examples are given related to the results.
https://ijnaa.semnan.ac.ir/article_5010_3ee35e45a10c9dd3363d5e5d66266d38.pdf
2021-07-01
35
52
10.22075/ijnaa.2020.21085.2230
Fixed point
$α$-admissible contraction mappings
Geraghty contraction
partial $b_{v}(s)$-metric
Ebru
Altiparmak
ebru.altiparmak@erzurum.edu.tr
1
Department of Mathematics, Faculty of Science, Erzurum Technical University, Erzurum, Turkey
LEAD_AUTHOR
Ibrahim
Karahan
ibrahimkarahan@erzurum.edu.tr
2
Department of Mathematics, Faculty of Science, Erzurum Technical University, Erzurum, Turkey
AUTHOR
ORIGINAL_ARTICLE
Estimate survival function of the Topp-Leone exponential distribution with application
This is a new lifetime Exponential "distribution using the Topp-Leone generated family of distributions proposed by Rezaei et al. The new distribution is called the Topp-Leone Exponential (TLE) distribution". What is done in this paper is an estimation of the "unlabeled two parameters for Topp-Leone Exponential distribution model by using the maximum likelihood estimator method to get the derivation of the point estimators for all unlabeled parameters according to iterative techniques as Newton $-$ Raphson method, then to derive Ordinary least squares estimator method". "Applying all two methods to estimate related probability functions; death density function, cumulative distribution function, survival function and hazard function (rate function)". When examining the numerical results for probability survival function by employing mean squares error measure and mean absolute percentage measure, this may lead to work on the best method in modeling a set of real data.
https://ijnaa.semnan.ac.ir/article_5014_a5d924b34c9e30341cf35b3737e26e0e.pdf
2021-07-01
53
60
10.22075/ijnaa.2021.5014
Topp-Leone
Maximum Likelihood estimator method
Newton-Raphson Method
Ordinary least squares estimator method
survival function
Hind
Kadhim AlBderi
hind.kadhum@qu.edu.iq
1
College of Administration and Economics, University of Al-Qadisiyah, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
New subclasses of meromorphic bi-univalent functions by associated with subordinate
In the present paper, we define two subclasses $\Sigma(\lambda, \alpha, \beta)$, $\Sigma_{\mathcal C}(\alpha, \beta)$ of meromorphic univalent functions and subclass $\Sigma_{{\mathcal B},{\mathcal C}}(\alpha, \beta, \lambda)$ of meromorphic bi-univalent functions. Furthermore, we obtain estimates on the general coefficients $|b_n|~(n \ge1)$ for functions in the subclasses $\Sigma(\lambda, \alpha, \beta)$, $\Sigma_{\mathcal C}(\alpha, \beta)$ and estimates for the early coefficients of functions in subclass $\Sigma_{{\mathcal B},{\mathcal C}}(\alpha, \beta, \lambda)$ by associated subordination. The results obtained in this paper would generalize and improve those in related works of several earlier authors.
https://ijnaa.semnan.ac.ir/article_5017_7cf5a3eaf20c4092d256fe3bcec9139d.pdf
2021-07-01
61
74
10.22075/ijnaa.2020.17405.1933
Meromorphic univalent functions
Meromorphic bi-univalent functions
Coefficients estimates
Subordinate
Safa
Salehian
s.salehian84@gmail.com
1
Department of Mathematics, Gorgan Branch, Islamic Azad University, Gorgan, Iran
LEAD_AUTHOR
Ahmad
Motamednezhad
a.motamedne@gmail.com
2
Faculty of Mathematical Sciences, Shahrood University of Technology, P.O. Box 316-36155, Shahrood, Iran
AUTHOR
ORIGINAL_ARTICLE
Expected mean square rate estimation of repeated measurements model
In this paper, we obtained the estimation corresponding to the expected mean square rate of repeated measurement model depend on maximum likelihood method (MLM), restricted maximum likelihood method (REMLM) and modified restricted maximum likelihood method (MREMLM), and got eight cases that were classified into three types.
https://ijnaa.semnan.ac.ir/article_5018_38cb6c717787e008d6de9592b49129f0.pdf
2021-07-01
75
83
10.22075/ijnaa.2021.5018
Repeated Measurements Model (RMM)
Maximum Likelihood Method (MLM)
Restricted Maximum Likelihood Method (REMLM)
Modied Restricted Maximum Likelihood Method (MREMLM)
Hayder
Kori
korihaydar@gmail.com
1
Department of Economics, College of Administration and Economics, Thi-Qar University, Thi-Qar, Iraq
LEAD_AUTHOR
Abdulhussein Saber
AL-Mouel
2
Department of mathematics, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq
AUTHOR
ORIGINAL_ARTICLE
On the Cauchy dual and complex symmetric of composition operators
In this paper, firstly we show that some classical properties for Cauchy dual and Moore-Penrose inverse of composition operators, such as complex symmetric and Aluthge transform on $L^{2}(\Sigma)$. Secondly we give a characterization for some operator classes of weak $p$-hyponormal via Moore-Penrose inverse of composition operators. Finally, some examples are then presented to illustrate that, the Moore-Penrose inverse of composition operators lie between these classes.
https://ijnaa.semnan.ac.ir/article_5020_4ad915d56e56743f3d20e5c74d2cf5a0.pdf
2021-07-01
85
97
10.22075/ijnaa.2020.20826.2203
Cauchy dual
Moore-Penrose inverse
polar decomposition
Aluthge transform
complex symmetric
$p$-hyponormal
$p$-paranormal
Morteza
Sohrabi
sohrabi.mo@lu.ac.ir
1
Department of Mathematics, Lorestan University, Khorramabad, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
On the $\Psi$-instability of a nonlinear Lyapunov matrix differential equation with integral term as right side
The aim of this paper is to give sufficient conditions for $\Psi$-instability of trivial solution of a nonlinear Lyapunov matrix differential equation with integral term as right side.
https://ijnaa.semnan.ac.ir/article_5021_0eddc76f6702bc34738027fa4c888e1e.pdf
2021-07-01
99
113
10.22075/ijnaa.2019.17448.1936
$Psi$-instability
nonlinear Lyapunov matrix differential equation
integral term as right side
Aurel
Diamandescu
adiamandescu@yahoo.com
1
Department of Applied Mathematics, University of Craiova, Craiova, Romania
LEAD_AUTHOR
ORIGINAL_ARTICLE
A new method for solving three-dimensional nonlinear Fredholm integral equations by Haar wavelet
In this paper, a new iterative method of successive approximations based on Haar wavelets is proposed for solving three-dimensional nonlinear Fredholm integral equations. The convergence of the method is veriﬁed. The error estimation and numerical stability of the proposed method are provided in terms of Lipschitz condition. Conducting numerical experiments conﬁrm the theoretical results of the proposed method and endorse the accuracy of the method.
https://ijnaa.semnan.ac.ir/article_5022_38df6ed969eb0473a1bf5792ef8657d4.pdf
2021-07-01
115
133
10.22075/ijnaa.2020.20860.2207
Three-dimensional integral equations
Three-dimensional Haar wavelet
Lipschitz condition
Successive approximations
Manochehr
Kazemi
univer_ka@yahoo.com
1
Department of Mathematics, Ashtian Branch, Islamic Azad University, Ashtian, Iran
LEAD_AUTHOR
Vali
Torkashvand
vali_torkashvand@yahoo.com
2
Department of Mathematics, Farhangian University, Tehran, Iran. Member of Young Researchers and Elite club Shahr-e-Qods, Branch Islamic Azad University, Tehran, Iran
AUTHOR
Reza
Ezzati
reza_ezati@yahoo.com
3
Department of Mathematics, Karaj Branch, Islamic Azad University, Karaj, Iran
AUTHOR
ORIGINAL_ARTICLE
Predicting drug-target interaction based on bilateral local models using a decision tree-based hybrid support vector machine
Identifying the interaction between the drug and the target proteins plays a very important role in the drug discovery process. Because prediction experiments of this process are time consuming, costly and tedious, Computational prediction can be a good way to reduce the search space to examine the interaction between drug and target instead of using costly experiments. In this paper, a new solution based on known drug-target interactions based on bilateral local models is introduced. In this method, a hybrid support vector machine based on the decision tree is used to decide and optimize the two-class classification. Using this machine to manage data related to this application has performed well. The proposed method on four criteria datasets including enzymes (Es), ion channels (IC), G protein coupled receptors (GPCRs) and nuclear receptors (NRs), based on AUC, AUPR, ROC and running time has been evaluated. The results show an improvement in the performance of the proposed method.
https://ijnaa.semnan.ac.ir/article_5023_ee31e29ad07264aafe7c88ca8336f636.pdf
2021-07-01
135
144
10.22075/ijnaa.2021.5023
Drug-target interaction
bilateral local model
Decision Tree
hybrid SVM
Ali
Ghanbari sorkhi
ali.ghanbari@mazust.ac.ir
1
Faculty of Electrical and Computer Engineering, University of Science and Technology of Mazandaran, Behshahr, Iran
LEAD_AUTHOR
Majid
Iranpour Mobarakeh
iranpour@pnu.ac.ir
2
Department of Computer Engineering and IT, Payam Noor University, Tehran, Iran
AUTHOR
Seyed Mohammad Reza
Hashemi
smr.hashemi@shahroodut.ac.ir
3
Young Researchers and Elite Club Qazvin Branch Islamic Azad University, Qazvin, Iran
AUTHOR
Maryam
Faridpour
maryam.faridpour68@gmail.com
4
Department of Electrical and Computer Engineering, Mahdishahr Branch, Islamic Azad University, Mahdishahr, Iran
AUTHOR
ORIGINAL_ARTICLE
Predicting with the quantify intensities of transcription factor-target genes binding using random forest technique
With the rapid development of technology, this development led to the emergence of microarray technology. It has the effect of studying the levels of gene expression in a way that makes it easier for researchers to observe the expression levels of millions of genes at the same time in a single experiment. Development also helped in the emergence of powerful tools to identify interactions between target genes and regulatory factors. The main aim of this study is to build models to predicate the relationship (Interaction) between Transcription Factors (TFs) proteins and target genes by selecting the subset of important genes (Relevant genes) from original dataset. The proposed methodology comprises into three major stages: the genes selection, merge datasets and the prediction stage. The process of reducing the computational space of gene data has been accomplished by using proposed mutual information method for genes selection based on the data of gene expression. In the prediction, the proposed prediction regression techniques are utilized to predict with binding rate between single TF-target gene. It has been compared the efficiency of two different proposed regression techniques including: Linear Regression and Random Forest Regression. Two available data sets have been utilized to achieve the objectives of this study: Gene’s expression data of Yeast Cell Cycle dataset and Transcription Factors dataset. The evaluation of predictions performance has been performed depending on two performance prediction measures (Root Mean Square Error (RMSE) and Mean Absolute Error (MAE) with (10) Folds-Cross Validation.
https://ijnaa.semnan.ac.ir/article_5026_e3d788947cfc90a278456e366d83d9e2.pdf
2021-07-01
145
161
10.22075/ijnaa.2021.5026
Microarray Technology
Gene Expression
Genes Selection
Prediction Techniques
Transcription Factors Proteins
Ameer K.
AL-Mashanji
ameeruobabylon@gmail.com
1
University of Babylon, Hilla, Iraq
LEAD_AUTHOR
Sura Z.
AL-Rashid
sura_os@itnet.uobabylon.edu.iq
2
University of Babylon, Hilla, Iraq
AUTHOR
ORIGINAL_ARTICLE
On the spectrum and fine spectrum of an upper triangular double-band matrix on sequence spaces
In this paper, we investigate the spectrum and fine spectrum of the upper triangular double-band matrix $\Delta ^{uv}$ on $cs$ sequence space. We also determine the approximate point spectrum, the defect spectrum and the compression spectrum of this matrix on $cs$.
https://ijnaa.semnan.ac.ir/article_5027_959b4546f6042a2acd485258899cbf06.pdf
2021-07-01
163
171
10.22075/ijnaa.2019.17764.1961
Spectrum of an operator
sequence space
Sinan
Ercan
sinanercan45@gmail.com
1
Department of Mathematics, Faculty of Sciences, Fırat University, Elazıvg, Turkey
LEAD_AUTHOR
ORIGINAL_ARTICLE
Dislocated quasi rectangular $b$-metric spaces and fixed point theorems of cyclic and weakly cyclic contractions
In this paper we have established fixed point theorems for $dq$-rectangular $b$-cyclic-Banach and $dq$-rectangular $b$-cyclic-Kannan contraction mappings in dislocated quasi rectangular $b$-metric spaces. We have also presented examples to support some of our results.
https://ijnaa.semnan.ac.ir/article_5028_c47efbd8d9d2140b71fee58ec9b14fe9.pdf
2021-07-01
173
191
10.22075/ijnaa.2020.18584.2023
Dislocated quasi rectangular b-metric space
fixed point
contractions
Banach contraction
Kannan contraction
cyclic contraction
weak cyclic contraction
Pradip
Golhare
golhare@gmail.com
1
Department of Mathematics, ant Dnyaneshwar Mahavidyalaya, Soegaon, Aurangabad, India
LEAD_AUTHOR
Chintaman
Aage
caage17@gmail.com
2
School of Mathematical Sciences, North Maharashtra University Jalgaon, India
AUTHOR
ORIGINAL_ARTICLE
Variation of the first eigenvalue of $(p,q)$-Laplacian along the Ricci-harmonic flow
In this paper, we study monotonicity for the first eigenvalue of a class of $(p,q)$-Laplacian. We find the first variation formula for the first eigenvalue of $(p,q)$-Laplacian on a closed Riemannian manifold evolving by the Ricci-harmonic flow and construct various monotonic quantities by imposing some conditions on initial manifold.
https://ijnaa.semnan.ac.ir/article_5029_6e3e49fa0b29712e958b9916afa46260.pdf
2021-07-01
193
204
10.22075/ijnaa.2020.18333.2003
Laplace
Ricci flow
Harmonic map
Shahroud
Azami
azami@sci.ikiu.ac.ir
1
Department of Pure Mathematics, Faculty of Sciences, Imam Khomeini International University, Qazvin, Iran.
LEAD_AUTHOR
ORIGINAL_ARTICLE
Existence of solutions for a quasilinear elliptic system with variable exponent
We consider the following quasilinear elliptic system in a Sobolev space with variable exponent:\[-\text{div}(a(|Du|)Du)=f,\]where $a$ is a $C^1$-function and $f\in W^{-1,p'(x)}(\Omega;\R^m)$. We use the theory of Young measures and weak monotonicity conditions to obtain the existence of solutions.
https://ijnaa.semnan.ac.ir/article_5030_a0df1ef3c7a7e6c14b527c75c6cb236e.pdf
2021-07-01
205
217
10.22075/ijnaa.2019.18418.2011
Quasilinear elliptic systems
Sobolev spaces with variable exponent
Weak solutions
Young measures
Elhoussine
Azroul
elhoussine.azroul@gmail.com
1
University of Sidi Mohamed Ben Abdellah, Faculty of Sciences Dhar El Mehraz, B.P. 1796 Atlas, Fez, Morocco
AUTHOR
Farah
Balaadich
balaadich.edp@gmail.com
2
University of Sidi Mohamed Ben Abdellah, Faculty of Sciences Dhar El Mehraz, B.P. 1796 Atlas, Fez, Morocco
LEAD_AUTHOR
ORIGINAL_ARTICLE
Dhage iteration principle for IVPs of nonlinear first order impulsive differential equations
In this paper we prove the existence and approximation theorems for the initial value problems of first order nonlinear impulsive differential equations under certain mixed partial Lipschitz and partial compactness type conditions. Our results are based on the Dhage monotone iteration principle embodied in a hybrid fixed point theorem of Dhage involving the sum of two monotone order preserving operators in a partially ordered Banach space. The novelty of the present approach lies the fact that we obtain an algorithm for the solution. Our abstract main result is also illustrated by indicating a numerical example.
https://ijnaa.semnan.ac.ir/article_5031_32631afebc2300c859e28a09d1ddcbf4.pdf
2021-07-01
219
235
10.22075/ijnaa.2019.17188.1913
Impulsive differential equation
Dhage monotone iteration method
hybrid fixed point principle
existence and approximate solution
Bapurao
Dhage
bcdhage@gmail.com
1
Kasubai, Gurukul Colony, Thodga Road, Ahmedpur-413 515, Dist: Latur, Maharashtra, India
LEAD_AUTHOR
Janhavi
Dhage
jbdhage@gmail.com
2
Kasubai, Gurukul Colony, Thodga Road, Ahmedpur-413 515, Dist: Latur, Maharashtra, India
AUTHOR
ORIGINAL_ARTICLE
Newton-Taylor polynomial solutions of systems of nonlinear differential equations with variable coefficients
The main purpose of this paper is consider Newton-Taylor polynomial solutions method in numerical solution of nonlinear system of differential equations. We apply Newton's method to linearize it. We found Taylor polynomial solution of the linear form. Sufficient conditions for convergence of the numerical method are given and their applicability is illustrated with some examples.In numerical examples we give two benchmark sample problems and compare the proposed method by the famous Runge-Kutta fourth-order method. These sample problems practically show some advantages of the Newton-Taylor polynomial solutions method.
https://ijnaa.semnan.ac.ir/article_5032_f5b59200ab477d70af488b33ac615714.pdf
2021-07-01
237
248
10.22075/ijnaa.2020.18371.2007
Variable coefficients
Newton's method
Taylor polynomial solutions
Ordinary differential equations
Nonlinear systems
Bahman
Babayar-Razlighi
bbabayar@gmail.com
1
Department of Mathematics, Faculty of science, Qom University of Technology, Qom, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
Optimal pricing policy for stock dependent demand with effective investment in preservation technology
In this paper, we suggested an optimal pricing policy for deteriorating items. To reduce the rate of deterioration, we apply a preservation technology and calculate the optimal preservation technology investment. The demand function is dependent on time, stock and selling price. Shortages are allowed in our consideration, and two cases are studied, first complete back-ordering and the second one is partially back-ordering. Our main objective is to find the optimal cycle length, ordering frequency the optimal preservation technology investment and the optimal selling price that maximizes the total profit. This model proves that the total profit is a concave function of the selling price, ordering frequency, preservation technology investment and time cycle. Numerical examples are provided to illustrate the features and advances of the model. A sensitivity analysis is performed in order to assess the stability of the proposed model.
https://ijnaa.semnan.ac.ir/article_5033_081770b0777ab992c54b6d0681cba0ae.pdf
2021-07-01
249
264
10.22075/ijnaa.2020.17515.1943
Dynamic pricing
Time and stock dependent demand
Preservation technology investment. Controllable deterioration rate
Optimization
Ram
Tiwari
shriram.adina@gmail.com
1
Department of Mathematics and Statistics, Dr. Harisingh Gour Vishwavidyalaya, Sagar M.P. India (A Central University)
AUTHOR
Nishant
Khedlekar
uvkk@yahoo.co.in
2
Department Management Studies(DOM), Indian Institute of Technology(IIT), Madras, India
AUTHOR
Uttam
Khedlekar
uvkkcm@yahoo.co.in
3
Department of Mathematics and Statistics, Dr. Harisingh Gour Vishwavidyalaya, Sagar M.P. India (A Central University)
LEAD_AUTHOR
ORIGINAL_ARTICLE
Stability of (1,2)-total pitchfork domination
Let $G=(V, E)$ be a finite, simple, and undirected graph without isolated vertex. We define a dominating $D$ of $V(G)$ as a total pitchfork dominating set, if $1\leq|N(t)\cap V-D|\leq2$ for every $t \in D$ such that $G[D]$ has no isolated vertex. In this paper, the effects of adding or removing an edge and removing a vertex from a graph are studied on the order of minimum total pitchfork dominating set $\gamma_{pf}^{t} (G)$ and the order of minimum inverse total pitchfork dominating set $\gamma_{pf}^{-t} (G)$. Where $\gamma_{pf}^{t} (G)$ is proved here to be increasing by adding an edge and decreasing by removing an edge, which are impossible cases in the ordinary total domination number.
https://ijnaa.semnan.ac.ir/article_5035_a227738d435bd17fe9e9404e2593a4fe.pdf
2021-07-01
265
274
10.22075/ijnaa.2021.5035
total domination
stability of domination
pitchfork domination
Lamees K.
Alzaki
lkalzaki@utq.edu.iq
1
Department of Mathematics, College of Education for Pure Sciences, University of Thi-Qar, Thi-Qar, Iraq
AUTHOR
Mohammed A.
Abdlhusein
mmhd@utq.edu.iq
2
Department of Mathematics, College of Education for Pure Sciences, University of Thi-Qar, Thi-Qar, Iraq
LEAD_AUTHOR
Amenah Kareem
Yousif
amenah.kareem@utq.edu.iq
3
Department of Mathematics, College of Education for Pure Sciences, University of Thi-Qar, Thi-Qar, Iraq
AUTHOR
ORIGINAL_ARTICLE
Projection and multi-projection methods for second kind Volterra-Hammerstein integral equation
In this article, we discuss the piecewise polynomial based Galerkin method to approximate the solutions of second kind Volterra-Hammerstein integral equations. We discuss the convergence of the approximate solutions to the exact solutions and obtain the orders of convergence $\mathcal O(h^{r})$ and $\mathcal O(h^{2r}),$ respectively, for Galerkin and its iterated Galerkin methods in uniform norm, where $h, ~r$ denotes the norm of the partition and smoothness of the kernel, respectively. We also obtain the superconvergence results for multi-Galerkin and iterated multi-Galerkin methods. We show that iterated multi-Galerkin method has the order of convergence $\mathcal O(h^{3r})$ in the uniform norm. Numerical results are provided to demonstrate the theoretical results.
https://ijnaa.semnan.ac.ir/article_5039_941ca03a7b799e9881022c92340f39e6.pdf
2021-07-01
275
291
10.22075/ijnaa.2020.18624.2026
Volterra-Hammerstein integral equations
Galerkin method
Multi-Galerkin method
Piecewise polynomials
Superconvergence rates
Moumita
Mandal
moumita@iitj.ac.in
1
Assistant Professor, Department of Mathematics, Indian Institute of Technology Jodhpur, Rajasthan-342037, India.
LEAD_AUTHOR
Kapil
Kant
sahukapil8@gmail.com
2
Department of Mathematics Indian Institute of Technology Kharagpur, Kharagpur - 721 302, India
AUTHOR
Gnaneshwar
Nelakanti
gnanesh@maths.iitkgp.ac.in
3
Department of Mathematics Indian Institute of Technology Kharagpur, Kharagpur - 721 302, India
AUTHOR
ORIGINAL_ARTICLE
A common fixed point theorem via measure of noncompactness
In this paper by applying the measure of noncompactness a common fixed point for the maps $T$ and $S$ is obtained, where $T$ and $S$ are self maps continuous or commuting continuous on a closed convex subset $C$ of a Banach space $E$ and also $S$ is a linear map.
https://ijnaa.semnan.ac.ir/article_2318_fcb87c6985acaa8cbb2d91eeb2b9afd2.pdf
2021-07-01
293
296
10.22075/ijnaa.2017.10595.1513
Common fixed point theorem
The Kuratowski measure of noncompactness
Commuting map
Darbo's contraction conditions
Alireza
Valipour Baboli
a.valipour@umz.ac.ir
1
Department of Mathematics, Karaj Branch, Islamic Azad University, Karaj, Iran
AUTHOR
Mohammad Bagher
Ghaemi
mghaemi@iust.ac.ir
2
Department of Mathematics, Iran University of Science and Technology, Tehran, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
Fixed points for Banach and Kannan contractions in $G$-metric spaces endowed with a graph
In this paper, we discuss the existence of fixed points for Banach and Kannan contractions defined on $G$-metric spaces, which were introduced by Mustafa and Sims, endowed with a graph. Our results generalize and unify some recent results by Jachymski, Bojor and Mustafa and those contained therein. Moreover, we provide some examples to show that our results are substantial improvement of some known results in literature.
https://ijnaa.semnan.ac.ir/article_3678_688f70778c77be07186393fd74b6b5f0.pdf
2021-07-01
297
304
10.22075/ijnaa.2019.3678
Fixed point
$G$-metric spaces
Banach contraction
Kannan contraction
Nahid Sadat
Mohseni
nsmohseni@mail.kntu.ac.ir
1
Faculty of Mathematics, K. N. Toosi University of Technology, Tehran, Iran.
LEAD_AUTHOR
Hashem
P. Masiha
masiha@kntu.ac.ir
2
K. N. Toosi University of Technology
AUTHOR
Hamid
Mamghaderi
hmamghadery@mail.kntu.ac.ir
3
K. N. Toosi University of Technology
AUTHOR
ORIGINAL_ARTICLE
Bifurcation and chaos in a one mass discrete time vocal fold dynamical model
In this article, we are going to study the stability and bifurcation of a two-dimensional discrete time vocal fold model. The existence and local stability of the unique fixed point of the model is investigated. It is shown that a Neimark-Sacker bifurcation occurs and an invariant circle will appear. We give sufficient conditions for this system to be chaotic in the sense of Marotto. Numerically it is shown that our model has positive Lyapunov exponent and is sensitive dependence on initial conditions. Some numerical simulations are presented to illustrate our theoretical results.
https://ijnaa.semnan.ac.ir/article_5042_4cd6996654256ecdd54a309885bf3fa9.pdf
2021-07-01
305
315
10.22075/ijnaa.2020.19373.2074
Vocal fold
Neimark-Sacker bifurcation
Limit cycle
Marotto's chaos
Lyapunov exponent
Sensitive dependence on initial conditions
Mehdi
Fatehi Nia
fatehiniam@yazd.ac.ir
1
Department of Mathematics, Yazd University, Yazd, Iran
AUTHOR
Mohamad Hossein
Akrami
akrami@yazd.ac.ir
2
Department of Mathematics, Yazd University, Yazd, Iran.
LEAD_AUTHOR
ORIGINAL_ARTICLE
Hyers-Ulam types stability of nonlinear summation equations with delay
In this typescript, we study the existence and uniqueness for a class of nonlinear summation equation with delay. Furthermore, we present Hyers–Ulam stability(HUS), generalized Hyers–Ulam stability(GHUS), Hyers–Ulam–Rassias stability(HURS) and generalized Hyers–Ulam–Rassias stability(GHURS) of the mentioned equation by utilizing discrete Gr¨onwall lemma. We finalized our manuscript through examples to help our primary outcomes.
https://ijnaa.semnan.ac.ir/article_5043_41c06f246b6942b97f2b75ccdf990b51.pdf
2021-07-01
317
326
10.22075/ijnaa.2019.18218.1995
Hyers–Ulam Stability
Nonlinear Summation Equations
Summation Inequality of Gronwall type
Usman
Riaz
usmanriazstd15@uop.edu.pk
1
Department of Mathematics, University of Peshawar, 25000, Pakistan
LEAD_AUTHOR
Akbar
Zada
akbarzada@uop.edu.pk
2
Department of Mathematics, University of Peshawar, 25000, Pakistan
AUTHOR
ORIGINAL_ARTICLE
A Simple proof for the algorithms of relaxed $(u, v)$-cocoercive mappings and $\alpha$-inverse strongly monotone mappings
In this paper, a simple proof is presented for the convergence of the algorithms for the class of relaxed $(u, v)$-cocoercive mappings and $\alpha$-inverse strongly monotone mappings. Based on $\alpha$-expansive maps, for example, a simple proof of the convergence of the recent iterative algorithms by relaxed $(u, v)$-cocoercive mappings due to Kumam-Jaiboon is provided. Also a simple proof for the convergence of the iterative algorithms by inverse-strongly monotone mappings due to Iiduka-Takahashi in a special case is provided. These results are an improvement as well as a refinement of previously known results.
https://ijnaa.semnan.ac.ir/article_5044_f4192721468b6f7afb1859cfbdcef600.pdf
2021-07-01
327
333
10.22075/ijnaa.2019.18336.2004
Inverse-strongly monotone mapping
Strongly monotone mapping
Relaxed $(u, v)$-cocoercive mapping
Ebrahim
Soori
sori.e@lu.ac.ir
1
Department of Mathematics, Lorestan University, P.O. Box 465, Khoramabad, Lorestan, Iran
LEAD_AUTHOR
Ravi
Agarwal
agarwal@tamuk.edu
2
Department of Mathematics Texas and University-Kingsville 700 University Blvd., MSC 172 Kingsville, Texas 78363-8202, USA
AUTHOR
Donal
ORegan
donal.oregan@nuigalway.ie
3
School of Mathematics, Statistics, National University of Ireland, Galway, Ireland
AUTHOR
ORIGINAL_ARTICLE
Convergence theorems of a new multiparametric family of Newton-like method in Banach space
In this work, we have considered a new multi-parametric family of modified Newton-like methods(MNL) of order three to approximate a zero of a nonlinear operator in $\mathbb{B}$-space (Banach space). Here, we studied the semilocal convergence analysis of this family of methods by using a new type of majorant condition. Note that this majorant condition generalizes the earlier majorant conditions used for studying convergence analysis of third order methods. Moreover, by using second-order directional derivative of the majorizing function we obtained an error estimate. We also established relations between our majorant condition and assumption based on Kantorovich, Smale-type and Nesterov-Nemirovskii-type, that will show our result generalize these earlier convergence results.
https://ijnaa.semnan.ac.ir/article_5046_8351ad1f42c41b2b87ad5318ea4cde1f.pdf
2021-07-01
335
362
10.22075/ijnaa.2020.17555.1948
Multi-parametric family of modified Newton-like (MNL) methods
Majorant conditions
Majorizing function
Nesterov-Nemirovskii condition
Kantorovich-type assumption
Smale-type assumption
P K
PARIDA
pkparida@cuj.ac.in
1
Department of Mathematics, Central University of Jharkhand, Ranchi-835205, India
LEAD_AUTHOR
Chandni
Kumari
mar93chandni@gmail.com
2
Department of Mathematics, Central University of Jharkhand, Ranchi-835205, India
AUTHOR
ORIGINAL_ARTICLE
Several integral inequalities and their applications on means
In this paper we prove several sharp inequalities that are new versions and extensions of Jensen and $H-H$ inequalities. Then we apply them on means.
https://ijnaa.semnan.ac.ir/article_5047_ba8e81e6be2dcde3ca0d69c6c3ddf554.pdf
2021-07-01
363
374
10.22075/ijnaa.2021.23169.2486
Jensen’s inequality
Hermite- Hadamard inequality
Integral inequality
Identric mean
Logaritmic mean
Gholamreza
Zabandan
zabandan@khu.ac.ir
1
Department of Mathematics, Kharazmi University, Tehran, Iran.
LEAD_AUTHOR
ORIGINAL_ARTICLE
Almost $\alpha$-$F$-contraction, fixed points and applications
In this manuscript, we initiate an almost $\alpha$-$F$-contraction and an almost $\alpha$-$F$- weak contraction in the setting of partial metric spaces and establish adequate conditions for the presence of fixed points. The obtained results generalize the classical and recent results of the literature, which are validated by suitable examples. As applications of these established results, we solve a nonlinear fractional differential equation and a boundary value problem.
https://ijnaa.semnan.ac.ir/article_5048_0329cd76b0fd9e6bfdefd3990a6aab7d.pdf
2021-07-01
375
386
10.22075/ijnaa.2021.21717.2290
$alpha$-admissible
$0$-complete fixed point
$F$-contraction
Partial metric space
Deepak
Kumar
deepakanand@live.in
1
Department of Mathematics, Lovely Professional University, Phagwara, Punjab-144411, India
LEAD_AUTHOR
Anita
Tomar
anitatmr@yahoo.com
2
Department of Mathematics, Government Degree College Thatyur, Tehri Garhwal(Uttrakhand), India
AUTHOR
Sumit
Chandok
chandhok.sumit@gmail.com
3
School of Mathematics, Thapar Institute of Engineering \& Technology, Patiala-147004, Punjab, India
AUTHOR
Sharma
Ritu
ritus4184@gmail.com
4
Department of Mathematics, G. I. C. Gheradhar (Dogi) Tehri Garhwal (Uttrakhand), India
AUTHOR
ORIGINAL_ARTICLE
Sequential bipolar metric space and well-posedness of fixed point problems
In this paper, we introduce the concept of sequential bipolar metric spaces which is a generalization of bipolar metric spaces and bipolar b−metric spaces and in view of this concept we prove some ﬁxed point theorems for a class of covariant and contravariant contractive mappings over such spaces. Supporting example have been cited in order to validity of the underlying space. Moreover, our ﬁxed point results are applied to well-posedness of ﬁxed point problems.
https://ijnaa.semnan.ac.ir/article_5049_0cdff4555b590a6430320e3f801372fd.pdf
2021-07-01
387
398
10.22075/ijnaa.2020.20397.2150
Fixed point
Sequential bipolar metric space
Well-posedness of ﬁxed point problem
Kushal
Roy
kushal.roy93@gmail.com
1
Department of Mathematics, The University of Burdwan, Purba Bardhaman-713104, West Bengal, India
LEAD_AUTHOR
Mantu
Saha
mantusaha.bu@gmail.com
2
Department of Mathematics, The University of Burdwan, Purba Bardhaman-713104, West Bengal, India
AUTHOR
ORIGINAL_ARTICLE
A nonunique common fixed point theorem of Rhoades type in b-metric spaces with applications
The aim of this paper is to prove a nonunique common fixed point theorem of Rhoades type for two self-mappings in complete b-metric spaces. This theorem extends the results of [17] and [49]. Examples are furnished to illustrate the validity of our results. We apply our theorem to establish the existence of common solutions of a system of two nonlinear integral equations and a system of two functional equations arising in dynamic programming.
https://ijnaa.semnan.ac.ir/article_5050_b5740577d9c5b3c3d44743dd1d198346.pdf
2021-07-01
399
413
10.22075/ijnaa.2021.22279.2344
b-metric space
Common fixed point
Picard sequence
nonlinear inte- gral equations
Dynamic Programming
Taieb
Hamaizia
tayeb042000@yahoo.fr
1
System Dynamics and Control Laboratory , Department of mathematics and informatics, OEB University, Algeria
LEAD_AUTHOR
Abdelkrim
Aliouche
alioumath@yahoo.fr
2
System Dynamics and Control Laboratory , Department of mathematics and informatics, OEB University, Algeria
AUTHOR
ORIGINAL_ARTICLE
Feeble regular and feeble normal spaces in $\alpha$-topological spaces using graph
This paper introduces some properties of separation axioms called $\alpha$ -feeble regular and $\alpha$ -feeble normal spaces (which are weaker than the usual axioms) by using elements of graph which are the essential parts of our $\alpha$ -topological spaces that we study them. Also, it presents some dependent concepts and studies their properties and some relationships between them.
https://ijnaa.semnan.ac.ir/article_5051_9627a38c823211c6800abe1f20e9854e.pdf
2021-07-01
415
423
10.22075/ijnaa.2021.5051
$alpha$-feebly regular
$alpha$-quasiregular
$alpha$-feebly normal
Balqees
Mahmoud
balqees.khaleel1003a@ihcoedu.uobaghdad.edu.iq
1
Department of Mathematics, College of Education for Pure Sciences (Ibn Al-Haitham), University of Baghdad, Iraq
LEAD_AUTHOR
Yousif
Yousif
yousif.y.y@ihcoedu.uobaghdad.edu.iq
2
Department of Mathematics, College of Education for Pure Sciences (Ibn Al-Haitham), University of Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Inequalities for $tgs$-convex functions via some conformable fractional integrals
In this research article, we establish several Hermite-Hadamard type inequalities for tgs-convex functions via conformable fractional integrals and new fractional conformable integral operators.
https://ijnaa.semnan.ac.ir/article_5063_c0e422f4460a62e917f1c7b011e294d3.pdf
2021-07-01
425
436
10.22075/ijnaa.2020.19752.2098
Hermite-Hadamard inequalities
Conformable fractional integral
new fractional conformable integral operators
Naila
Mehreen
nailamehreen@gmail.com
1
School of Natural Sciences, National University of Sciences and Technology, sector H-12, Islamabad, Pakistan
LEAD_AUTHOR
Matloob
Anwar
matloob_t@yahoo.com
2
School of Natural Sciences, National University of Sciences and Technology, Islamabad, Pakistan.
AUTHOR
ORIGINAL_ARTICLE
Existence of farthest points in Hilbert spaces
Let $H$ be a real Hilbert space with the inner product $<.,.>$ and the norm $\|\cdot\|$. In this paper, we introduce hybrid algorithms for generating cyclic, non-expansive mapping of H. Also, we discuss about necessary and sufficient conditions on subsets of Hilbert space to be remotal or uniquely remotal. Moreover, we give the basic concepts and theorems of farthest points of Bounded subsets of H. In the end, we will provide examples to illustrate our results.
https://ijnaa.semnan.ac.ir/article_5070_13aaa9e9b60f179929915b33c16cac3b.pdf
2021-07-01
437
446
10.22075/ijnaa.2019.17319.1922
Best proximity point, Non-expansive mapping, F-property
Farthest point
Hamid
Mazaheri Tehrani
hmazaheri@yazd.ac.ir
1
Faculty of Mathematics, Yazd University, Yazd, Iran
LEAD_AUTHOR
Raham
Rahmani Jafarbeigi
rahmani94@stu.yazd.ac.ir
2
Faculty of Mathematics , Yazd University , Yazd , Iran
AUTHOR
ORIGINAL_ARTICLE
A Robust Encryption Technique Using Enhanced Vigenre Cipher
A lot of data in this world are very important and no matter how simple it can be. Hence the number of data conveyed through the internet still increasing due to the rapid development of computer technology. In order to save the data over the internet, cryptography is a technique for conveying information securely between two parties without interference from outside elements. The Vigenre cipher is a technique of encrypting alphabetic text via using a sequence of different Caesar ciphers depend on the letters of a keyword. It is a simple form of polyalphabetic replacement. In this paper, the traditional way for the Vigenre method is enhanced by using two keys for text encryption. The first key is used to format the table of the alphabet (26 characters) and second keys are used to encrypt the plain text like the original Vigenre cipher. The result shows the proposed method is efficient and stronger against the kasiski and Friedman attack to find the length of the key.
https://ijnaa.semnan.ac.ir/article_5071_7283a705c20580ae37d40cd59b76c968.pdf
2021-07-01
447
454
10.22075/ijnaa.2021.5071
cryptography
Vigenre cipher
polyalphabetic
encryption and decryption
Hazim
Noman Abed
1
Computer Science Department, College of Science, University of Diyala, Diyala, Iraq
AUTHOR
Zainab
Mohammed Ali
zainab-ml@yahoo.com
2
Computer Science Department, College of Science, University of Diyala, Diyala, Iraq
LEAD_AUTHOR
Ahmed
Luay Ahmed
3
Supervision and Scientific Education Apparatus, International Accreditation Department, Ministry of Higher Education, Iraq
AUTHOR
ORIGINAL_ARTICLE
The outbreak disease due to the contamination environment and effect on dynamical behavior of prey-predator model
In this study, a predator-prey model (PPMD) was formulated and studied along with infectious on
populations of prey and predator, since each one is splited into two sub-populations i.e., healthy and
infected. It is presumed that only healthy predator of ability to predate the healthy prey and consume
both healthy and prey being infected. Mathematically, the model solutions uniqueness, existence,
and boundedness are conversed. All probable equilibrium model points are defined. The stability
analyses as local and the regions of worldwide stability of each point of equilibriums are inspected.
Lastly, few simulations as numerical were offered for validation the geted results theoretically.
https://ijnaa.semnan.ac.ir/article_5072_61ca95120dcb35c464285e8a83795973.pdf
2021-07-01
455
470
10.22075/ijnaa.2021.5072
Murtadha M.
Abdulkadhim
murtadha_moh@mu.edu.iq
1
Department of Mathematics, College of Science, Baghdad University, Baghdad, Iraq
AUTHOR
Hassan Fadhil
Al-Husseiny
hassan.fadhil.r@sc.uobaghdad.edu.iq
2
Department of Mathematics, College of Science, Baghdad University, Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
On some maps into Banach algebras and Banach modules
In this paper, we study some maps from a $C^*$-algebra into a Banach algebra or a Banach module. Under some conditions, by extending on unitization of Banach algebras, we prove that the maps defined into Banach algebras are homomorphisms and the others defined into Banach modules are derivations. Applications of our results in the context of $C^*$-algebras are also provided.
https://ijnaa.semnan.ac.ir/article_5073_175bde87616e39245bc7ba2dcab16c49.pdf
2021-07-01
471
477
10.22075/ijnaa.2021.21768.2295
homomorphism
Derivation
Banach module
C*-algebra
Bahman
Hayati
bahmanhayati@yahoo.com
1
Faculty of Mathematical Sciences and Statistics, Malayer University, P.O. Box 65719-95863, Malayer, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
Investigating 1-perfect code using Dominating set
In this article, we investigate the relation between dominating sets and 1-perfect codes. We also study perfect colorings of some Johnson graphs in two colors using linear programming problem.
https://ijnaa.semnan.ac.ir/article_5074_66fca079247bfe308c49507e64888ebc.pdf
2021-07-01
479
483
10.22075/ijnaa.2019.18237.1997
Perfect 2-coloring
1- perfect code
dominating set
Johnson graph
Fatemeh
Halataei
halataei@semnan.ac.ir
1
Faculty of Mathematics, Statistics, and Computer Science, Semnan University, Semnan, Iran
LEAD_AUTHOR
saeed
Mohammadian
s_mohammadian@semnan.ac.ir
2
Faculty of Mathematics, Statistics and Computer Science, Semnan University, Semnan, Iran
AUTHOR
ORIGINAL_ARTICLE
Kalman filter and ridge regression backpropagation algorithms
The Kalman filter (KF) compare with the ridge regression backpropagation algorithm (RRBp) by conducting a numerical simulation study that relied on generating random data applicable to the KF and the RRBp in different sample sizes to determine the performance and behavior of the two methods. After implementing the simulation, the mean square error (MSE) value was calculated, which is considered a performance measure, to find out which two methods are better in making an estimation for random data. After obtaining the results, we find that the Kalman filter has better performance, the higher the randomness and noise in generating the data, while the other algorithm is suitable for small sample sizes and where the noise ratios are lower.
https://ijnaa.semnan.ac.ir/article_5075_3ff14149c20133148aeb5f697d9c66bc.pdf
2021-07-01
485
493
10.22075/ijnaa.2021.5075
Kalman filter
ridge regression
backpropagation algorithms
estimation
Irtefaa A.
Neamah
irtefaa.radhi@uokufa.edu.iq
1
Faculty of Computer Science and Mathematics, University of Kufa, Iraq
LEAD_AUTHOR
Zainab
Abdul Redhaa
zainaba.allahibi@student.uokufa.edu.iq
2
Ministry of Education, Najaf, Iraq
AUTHOR
ORIGINAL_ARTICLE
Linear maps and covariance sets
Let $\mathcal{A}$ and $\mathcal{B}$\ are $C^{{\huge \ast}} $-algebras\textbf{.} A\textbf{ }linear map $\phi:\mathcal{A\rightarrow B}$ is $C^{\ast}$-Jordan homomorphism if it is a Jordan homomorphism which preserves the adjoint operation. In this note we show that $C^{\ast}$-Jordanhomomorphisms -under mild assumptions- preserving covariance set and covariance coset in $C^{\ast}$-algebras.
https://ijnaa.semnan.ac.ir/article_5076_98d5de8f57e3e3c81f2b845a79bbc509.pdf
2021-07-01
495
497
10.22075/ijnaa.2020.19469.2081
Moore-Penrose inverse
covariance set
Jordan homomorphism
Mohammad
Alizadeh
m.alizadeh@iasbs.ac.ir
1
Institute for Advanced Studies in Basic Sciences(IASBS)
LEAD_AUTHOR
ORIGINAL_ARTICLE
A graph associated to proper non-small subsemimodules of a semimodule
Let M be a unitary left R-semimodule where R is a commutative semiring with identity. The small intersection graph G(M) of a semimodule M is an undirected simple graph with all non- small proper subsemimodules of M as vertices and two distinct vertices N and L are adjacent if and only if N ∩ L is not small in M. In this paper, we investigate the fundamental properties of these graphs to relate the combinatorial properties of G(M) to the algebraic properties of the R-semimodule M. Determine the diameter and the girth of G(M). Moreover, we study cut vertex, clique number, domination number and independence number of the graph G(M). It is shown that the independence number of small graph is equal to the number of its maximal subsemimodules.
https://ijnaa.semnan.ac.ir/article_5091_1fcbe04dc35df6fc7c2ed2da5c66352f.pdf
2021-07-01
499
509
10.22075/ijnaa.2021.5091
subsemimodule
small intersection graph
clique number
domination number
independence number
Ahmed H.
Alwan
ahmedha-math@utq.edu.iq
1
Department of Mathematics, College of Education for Pure Sciences, University of Thi-Qar, Thi-Qar, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Strong convergence theorems for minimization, variational inequality and fixed point problems for quasi-nonexpansive mappings using modified proximal point algorithms in real Hilbert spaces
In this paper, we investigate the problem of finding a common element of the solution set of convex minimization problem, the solution set of variational inequality problem and the solution set of fixed point problem with an infinite family of quasi-nonexpansive mappings in real Hilbert spaces. Based on the well-known proximal point algorithm and viscosity approximation method, we propose and analyze a new iterative algorithm for computing a common element. Under very mild assumptions, we obtain a strong convergence theorem for the sequence generated by the proposed method. Application to convex minimization and variational inequality problems coupled with inclusion problem is provided to support our main results.\,Our proposed method is quite general and includes the iterative methods considered in the earlier and recent literature as special cases.
https://ijnaa.semnan.ac.ir/article_5093_e8d4d082d0882bf163bddf32549aba80.pdf
2021-07-01
511
526
10.22075/ijnaa.2019.18153.1991
Convex minimization problem
proximal point algorithm
common fixed points
Quasi-nonexpansive mappings
Variational inequality problem
Thierno
Sow
sowthierno89@gmail.com
1
Amadou Mahtar Mbow University, Senegal
LEAD_AUTHOR
ORIGINAL_ARTICLE
The approximate analytical solutions of nonlinear fractional ordinary differential equations
The Sumudu homotopy perturbation method (SHPM) is applied to solve fractional order nonlinear differential equations in this paper.The current technique incorporates two notable strategies in particular Sumudu transform (ST) and homotopy perturbation method (HPM). The proposed method’s hybrid property decreases the number of the quantity of computations and materials needed. In this method, illustration examples evaluate the accuracy and applicability of the mentioned procedure. The outcomes got by FSHPM are in acceptable concurrence with the specific arrangement of the problem.
https://ijnaa.semnan.ac.ir/article_5094_1c0804b82b17a21154efa934c92fab57.pdf
2021-07-01
527
535
10.22075/ijnaa.2021.5094
Homotopy perturbation method
Fractional differential equation
sumudu transform, Caputo fractional derivative
Lamees
Alzaki
lkalzaki@utq.edu.iq
1
Department of Mathematics, College of Education for Pure Sciences, University of Thi-Qar, Thi-Qar, Iraq
LEAD_AUTHOR
Hassan
Jassim
hassankamil@utq.edu.iq
2
Department of Mathematics, University of Thi-Qar, Nasiriyah, Iraq
AUTHOR
ORIGINAL_ARTICLE
Fuzzy equality co-neighborhood domination of graphs
In that paper the fuzzy equality co-neighborhood domination and denoted by $\gamma_{en}(G)$ for a new definition of domination was described for the fuzzy graph. This new definition was studied in a strong fuzzy graph and constraints were found for many several graphs. Complementary strong fuzzy graphs of the same graphs were examined and studied in detail.
https://ijnaa.semnan.ac.ir/article_5101_71ac3e8cb3ee98864c11a98c17d8e174.pdf
2021-07-01
537
545
10.22075/ijnaa.2021.5101
Fuzzy equality co-neighborhood dominating set
fuzzy equality co-neighborhood domination number
strong fuzzy graph
complement fuzzy graph
Sahib Sh.
Kahat
sgehet@gmail.com
1
Department of Mathematics, College of Science, University of Baghdad, Baghdad, Iraq
AUTHOR
Ahmed
Omran
pure.ahmed.omran@uobabylon.edu.iq
2
Department of Mathematics, College of Education for Pure Science, University of Babylon, Babylon, Iraq.
AUTHOR
Manal
Al-Harere
100035@uotechnology.edu.iq
3
Department of Applied Sciences, University of Technology Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Meta-heuristic innovative algorithm of multi-objectives in tasks timing at cloud computing system
In this article a mathematical model with twin objectives is presented. The objectives are considered as:Minimization of the maximum tardiness of tasks completion time and the total early tasks penalties. Since tasks timing is a tardy and indefinite factor in cloud computing; therefore problem solving model is used as the combined Meta-heuristic innovative algorithm of multi objective swarm of particles based Parto archive has been used. The suggested algorithm with genetic operators as well as the directed and repeated counterpart structures in the format of multi operators are taken to assess the algorithm application. The results will be sorted based on quality, distraction, integrated, the number of non-defeated solutions and the gap from the ideal one is compared with the evolutionary algorithm results titled genetic algorithm. The final results of solved model indicate that firstly, this algorithm is stronger than NSGA-II algorithm but is weaker in timing, norms and scales. In other words, the suggested algorithm, is more capable to discover solutions, accordingly.
https://ijnaa.semnan.ac.ir/article_5103_6710e2d72c1b5d08b236fcc6d1eae34d.pdf
2021-07-01
547
561
10.22075/ijnaa.2021.23201.2491
Multi objective particles swarm
Cloud computing system
tasks timing
NSGA II
Mohsen
Sojoudi
mohsened@gmail.com
1
Faculty of Economic and Administrative Sciences, Ferdowsi University of Mashhad, Mashad, Iran.
AUTHOR
Ahmad
Tavakoli
tavakoli-a@um.ac.ir
2
Faculty of Economic and Administrative Sciences, Ferdowsi University of Mashhad, Mashad, Iran.
AUTHOR
Alireza
Pooya
alireazapooya@gmail.com
3
Faculty of Economic and Administrative Sciences, Ferdowsi University of Mashhad, Mashad, Iran
AUTHOR
Mehdi
Norouzi
mnourouzi@tums.ac.ir
4
Department of Medical Sciences, Tehran University, Tehran-Iran
AUTHOR
ORIGINAL_ARTICLE
Bessel transforms of Dini-Lipschitz functions on Lebesgue spaces $L_{p,\gamma}(\mathbb{R}^{n}_{+})$
In this paper, we obtain a generalization of Titchmarsh's theorem for the Bessel transform for functions satisfying the $(\psi,p)$-Bessel Lipschitz condition in the Lebesgue space $L_{p,\gamma}(\mathbb{R}^{n}_{+})$ for $1< p\leq2$, $\gamma>0$.
https://ijnaa.semnan.ac.ir/article_5108_eee432d035585f87d8b8bc7f41a9d253.pdf
2021-07-01
563
568
10.22075/ijnaa.2021.18844.2039
Bessel operator
Bessel generalized translation
Bessel Lipschitz condition
Esra
Kaya
kayaesra.e.k@gmail.com
1
Department of Mathematics, Kutahya Dumlupinar University, Kutahya, Turkey
LEAD_AUTHOR
Ismail
Ekincioglu
ismail.ekincioglu@dpu.edu.tr
2
Department of Mathematics, Kutahya Dumlupinar University, Kutahya, Turkey
AUTHOR
ORIGINAL_ARTICLE
Some inference of the repeated measurements model
This paper is dedicated to studying the repeated measurements model (RMM). We investigate the analysis of variance (ANOVA) of the model and identify the confidence intervals of the variance components and identify the analytic form of the likelihood- ratio test for the model.
https://ijnaa.semnan.ac.ir/article_5109_cdb0305bbac55a4d4a2d8efca4f95135.pdf
2021-07-01
569
581
10.22075/ijnaa.2021.5109
Repeated measurements model
Variance
likelihood- ratio test
Ammar Abdul Ameer
AL-Hassan
ammar.math.msc@gmail.com
1
Department of Mathematics, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq
LEAD_AUTHOR
Abdul Hussein S.
AL-Moula
bdulhusseinsaber@yahoo.com
2
Department of Mathematics, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq
AUTHOR
ORIGINAL_ARTICLE
Nonlinear instability analysis of a vertical cylindrical magnetic sheet
This paper concerns with the nonlinear instability analysis of double interfaces separated three perfect, incompressible cylindrical magnetic fluids. The cylindrical sheet is acted upon by an axial uniform magnetic field. The current nonlinear approach depends mainly on solving the linear governing equations of motion and subjected to the appropriate nonlinear boundary conditions. This procedure resulted in two nonlinear characteristic equations governed the behavior of the interfaces deflection. By means of the Taylor expansion, together with the multiple time scales, technique, the stability analysis of linear as well as the nonlinear is achieved. The linear stability analysis reveals a quadratic dispersion equation in the square of growth rate frequency of the surface wave. On the other hand, the nonlinear analysis is accomplished by a coupled nonlinear Schrödinger equation of the evolution amplitudes of the surface waves. The stability criteria resulted in a polynomial of the eleventh degree in the square of the magnetic field strength, together with resonance transition curves. Several special cases are reported upon appropriate data choices. The stability criteria are numerically discussed, at which regions of stability and instability are identified. In the stability profile, the magnetic field intensity is plotted versus the wave number. The influences of the parameters on the stability are addressed. The nonlinear stability approach divides the phase plane into several parts of stability/instability. The nonlinear stability shows an in contrast mechanism of the role of the sheet thickness.
https://ijnaa.semnan.ac.ir/article_5111_e2b03e39e80685858cf6c000242abf7b.pdf
2021-07-01
583
601
10.22075/ijnaa.2020.19429.2078
Nonlinear Stability Analysis
Magnetic Fluids
Multiple Time Scales
Coupled Nonlinear Schrödinger Equations
Marwa
Zekry
marwa.zekry@science.bsu.edu.eg
1
Department of Mathematics and Computer Science, Faculty of Science, Beni-Suef University, Egypt
LEAD_AUTHOR
Galal
Moatimid
gal_moa@hotmail.com
2
Department of Mathematics, Faculty of Education, Ain Shams University, Roxy, Cairo, Egypt
AUTHOR
Yusry
El-Dib
yusryeldib52@hotmail.com
3
Department of Mathematics, Faculty of Education, Ain Shams University, Roxy, Cairo, Egypt
AUTHOR
ORIGINAL_ARTICLE
The impact of subband pause noise on the sensitivity of detection methods
Through the use of subband analysis, the article presents a method for selecting pauses in speech communications. An additive blending of normally distributed noise was used in the sensitivity analysis. In various noise / signal respects, the probability of making a bad decision has been identified. The findings show that the proposed sub-band method is stable when subjected to additive noise effects.
https://ijnaa.semnan.ac.ir/article_5115_6636c680037d50305598c9981b603a5e.pdf
2021-07-01
603
607
10.22075/ijnaa.2021.5115
Speech Communications
sensibility
noise / signal
additive noise effects
Entidhar Malik
Hadi
entidhar.malik@yahoo.com
1
Al-Esraa University College, Baghdad, Iraq
AUTHOR
Reham Ihssan
Kamal
reham.ihsan@yahoo.com
2
Al-Esraa University College, Baghdad, Iraq
AUTHOR
Ali M.
Ahmed
ali.majeed@esraa.edu.iq
3
Al-Esraa University College, Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
On the degree of approximation of certain continuous bivariate functions by double matrix means of a double Fourier series
In this paper, we have studied the degree of approximation of certain bivariate functions by double factorable matrix means of a double Fourier series. Four theorems are proved using single rest bounded variation sequences, single head bounded variation sequences, double rest bounded variation sequences, and two non-negative mediate functions. These results expressed in terms of two functions of modulus type and two non-negative mediate functions, imply many particular results as shown at last section of this paper.
https://ijnaa.semnan.ac.ir/article_5117_2f26f93dfcc1b24a060c21311f256a17.pdf
2021-07-01
609
628
10.22075/ijnaa.2020.19112.2056
Double Fourier series
Lipschitz class
Factorable matrices
Ces`aro means
N"orlund means
Riesz means
Xhevat
Krasniqi
xhevat.krasniqi@uni-pr.edu
1
Department of Mathematics and Informatics, University of Prishtina, Hasan Prishtina, Prishtina, Kosovo
LEAD_AUTHOR
ORIGINAL_ARTICLE
Using the infimum form of auxiliary functions to study the common coupled coincidence points in fuzzy semi-metric spaces
The common coupled coincidence points and common coupled fixed points in fuzzy semi-metric spaces are investigated in this paper. In fuzzy semi-metric space, the symmetric condition is not necessarily assumed to be satisfied. In this case, regarding the non-symmetry of metric, there are four kinds of triangle inequalities that can be considered. In order to investigate the common coupled coincidence points and common coupled fixed points, the fuzzy semi-metric space is further assumed to satisfy the so-called canonical condition that is inspired from the intuitive observations. The sufficient conditions for guaranteeing the common coupled coincidence points and common coupled fixed points will be different for the four different kinds of triangle inequalities.
https://ijnaa.semnan.ac.ir/article_5118_06cef3feb00f11425dc6c657c2c51627.pdf
2021-05-23
629
663
10.22075/ijnaa.2020.13960.1728
Common coupled coincidence points
Common coupled fixed points
Distant condition
Fuzzy semi-metric space
Rational condition
Hsien-Chung
Wu
hcwu@nknu.edu.tw
1
Department of Mathematics, National Kaohsiung Normal University, Kaohsiung 802, Taiwan
LEAD_AUTHOR
ORIGINAL_ARTICLE
Generalized Mittag-Leffler stability of nonlinear fractional regularized Prabhakar differential systems
This work is devoted to study of the stability analysis of generalized fractional nonlinear system including the regularized Prabhakar derivative. We present several criteria for the generalized Mittag-Leffler stability and the asymptotic stability of this system by using the Lyapunov direct method. Further, we provide two test cases to illustrate the effectiveness of results. We apply the numerical method to solve the generalized fractional system with the regularized Prabhakar fractional systems and reveal asymptotic stability behavior of the presented systems by employing numerical simulation.
https://ijnaa.semnan.ac.ir/article_5119_1025960cf997217df509259d64592c3f.pdf
2021-07-01
665
678
10.22075/ijnaa.2020.19291.2069
Generalized Mittag-Leffler stability
Asymptotic stability
Regularized Prabhakar derivative
Lyapunov direct method
Numerical simulation
Shiva
Eshaghi
shiva_eshaghi69@yahoo.com
1
Department of Applied Mathematics and Computer Sciences, Faculty of Mathematical Sciences, Shahrekord University, P.O.Box 115, Shahrekord, Iran
LEAD_AUTHOR
Alireza
Ansari
alireza_1038@yahoo.com
2
Department of Applied Mathematics and Computer Sciences, Faculty of Mathematical Sciences, Shahrekord University, P.O. Box 115, Shahrekord, Iran
AUTHOR
Reza
Khoshsiar Ghaziani
khoshsar@sci.sku.ac.ir
3
Department of Applied Mathematics and Computer Sciences, Faculty of Mathematical Sciences, Shahrekord University, P.O.Box 115, Shahrekord, Iran
AUTHOR
ORIGINAL_ARTICLE
On fractional differential equations and fixed point theory
In this work first we establish some fixed point theorems for $\bot-$Mizoguchi-Takahashi contractions mappings in the setting of orthogonal metric spaces. Next, we investigate the existence of solution for certain fractional differential equation via some integral boundary value conditions and obtained fixed point results.
https://ijnaa.semnan.ac.ir/article_5120_01a8ebe63a6dc47c03821669d16de237.pdf
2021-07-01
679
697
10.22075/ijnaa.2019.17291.1920
Fixed point
Reich's conjecture
Fractional differential equation
Mohadeseh
Paknazar
m.paknazar@yahoo.com
1
Department of Mathematics Education, Farhangian University, Tehran, Iran.
LEAD_AUTHOR
ORIGINAL_ARTICLE
Mixed Topp-Leone-Kumaraswamy distribution
In this article, a new generalization of the Topp-Leone distribution with a unit interval, namely Mixed Topp-Leone-Kumaraswamy distribution is defined and studied. The mathematical properties of this mixing distribution are described. Moments, quantile function, R?nyi entropy, incomplete moments and moments of residual are obtained for the new Mixed Topp-Leone - Kumaraswamy distribution. The maximum likelihood (MLE), Crans (CM) , Percentile (PM) and Particle Swarm Optimization(PSO) estimators of the parameters are derived. The percentile Method is more efficient method as compred to the others. Two real data sets are used to illustrate an application and superiority of the proposed distribution.
https://ijnaa.semnan.ac.ir/article_5122_d6ad28256ebf4dbae2165e2652b6346f.pdf
2021-07-01
699
715
10.22075/ijnaa.2021.5122
In this article
a new generalization of the Topp-Leone distribution with a unit interval
namely Mixed Topp-Leone-Kumaraswamy distribution is defined and studied. The mathematical properties of this mixing distribution are described. Moments
quantile function
R?nyi entropy
incomplete moments and moments of residual are obtained for the new Mixed Topp-Leone - Kumaraswamy distribution. The maximum likelihood (MLE)
Crans (CM)
Percentile (PM) and Particle Swarm Optimization(PSO) estimators of the parameters are derived. The percentile Method is more efficient method as compred to the others. Two real data sets are used to illustrate an application and superiority of the pr
Kumaraswamy distribution
mixing Transformation
Moments
Renyi’s entropy
maximum likelihood method
Cran method
Percentile Method
Particle Swarm method
Nashaat
Al-Anber
dr.nashaat@mtu.edu.iq
1
Department of Information Technology, Technical College of Management-Baghdad, Middle Technical University, Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Fixed point in bicomplex valued metric spaces
In the present paper, we introduce new types of convergence of a sequence in left dislocated and right dislocated metric spaces. Also, we generalize Banach contraction principle in these newly defined generalized metric spaces.
https://ijnaa.semnan.ac.ir/article_5123_56645073e7f17575622afd660e7baac3.pdf
2021-07-01
717
727
10.22075/ijnaa.2019.19003.2049
Fixed point
left dislocated metric
right dislocated metric
Contraction
Ismat
Beg
ibeg@lahoreschool.edu.pk
1
Lahore School of Economics, Lahore-53200, Pakistan
LEAD_AUTHOR
Sanjib
Datta
sanjibdatta05@gmail.com
2
University of Kalyani, Kalyani - 741235, West Bengal, India
AUTHOR
Dipankar
Pal
dpal.math@gmail.com
3
Syed Nurul Hasan College, Farakka Barrage-742212, West Bengal, India
AUTHOR
ORIGINAL_ARTICLE
Dynamical analysis, stability and discretization of fractional-order predator-prey model with negative feedback on two species
The Lotka-Volterra model is an important model being employed in biological phenomena to investigate the nonlinear interaction among existing species. In this work, we first consider an integer order predator-prey model with negative feedback on both prey and predator. Then by introducing a fractional model into the existing one, we give them a specified memory. We also obtain its discretized counterpart. Finally, along with giving the biological interpretation of the system, the stability and dynamical analysis of the proposed model are investigated and the results are illustrated as well.
https://ijnaa.semnan.ac.ir/article_5124_971d7bcdce45977492fee48502edab74.pdf
2021-07-01
729
741
10.22075/ijnaa.2020.19764.2099
Fractional calculus
Predator-prey
Lotka-Volterra, Stability
Discretization
Alireza
Vahidi
alrevahidi@yahoo.com
1
Dep. of Applied Mathematics, Yadegar-e-Imam Khomeini (RAH), Shahr-rey Branch, Islamic Azad University,
Tehran, Iran.
LEAD_AUTHOR
Esmail
Babolian
babolian@khu.ac.ir
2
Faculty of Mathematical Sciences and Computer, Kharazmi University, Tehran, Iran
AUTHOR
Nader
Biranvand
nabiranvand@gmail.com
3
Dep. of Applied Mathematics, Yadegar-e-Imam Khomeini (RAH), Shahr-rey Branch, Islamic Azad University, Tehran, Iran.
AUTHOR
ORIGINAL_ARTICLE
Comparison between Renyi GME and Tsallis GME for estimation Kink regression
In this paper, an estimation of the parameters of the Kink regression model was made by relying on higher order from the general maximum entropy method with two measures Tsallis and Renyi ($\alpha=3,~\alpha=4,~\alpha=5,~\alpha=6$), A practical application has been made to data for a real phenomenon in the Iraqi economy, which is inflation with the Debt/GDP ratio and a statistical analysis of it. After making a comparison with other estimation methods, as the results showed that the explanatory variable for the kink point is equal to (5), and the results show a decrease in the Debt/GDP ratio after observations Kink.
https://ijnaa.semnan.ac.ir/article_5125_706b9707b75ec0dc8661a442696e5c75.pdf
2021-07-01
743
750
10.22075/ijnaa.2021.5125
GME
Kink regression
Renyi
Tsallis
Entropy
Debt/GDP
Saad Obaid
Jameela
saad.iraq100@gmail.com
1
LEAD_AUTHOR
Basim Shlaibah
Msallamb
drbasimstatistics@gmail.com
2
Al-Iraqia University, College of Administration and Economics, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Some types of fibrewise fuzzy topological spaces
The aim of this paper is to introduce and study the notion type of fibrewise topological spaces, namely fibrewise fuzzy j-topological spaces, Also, we introduce the concepts of fibrewise j-closed fuzzy topological spaces, fibrewise j-open fuzzy topological spaces, fibrewise locally sliceable fuzzy j-topological spaces and fibrewise locally sectionable fuzzy j-topological spaces. Furthermore, we state and prove several Theorems concerning these concepts, where $j=\{\delta, \theta, \alpha, p, s, b, \beta\}$.
https://ijnaa.semnan.ac.ir/article_5127_6851165a0441388f9fa1eade74bd73db.pdf
2021-07-01
751
756
10.22075/ijnaa.2021.5127
FWF j-TS’s
FWCF j-TS’s
FWOF j-TS’s
FW-LSL-F j-TS’s and FW-LSE-F jTS’s
M. A.
Hussain
hwe1ggh597@gmail.com
1
Department of Mathematics, College of Education for Pure Science (Ibn Al-Haitham), Baghdad University, Baghdad, Iraq
LEAD_AUTHOR
Y Y.
Yousif
yoyayousif@yahoo.com
2
Department of Mathematics, College of Education for Pure Science, Ibn AL-Haitham, University of Baghdad, Baghdad-Iraq.
AUTHOR
ORIGINAL_ARTICLE
Hybrid medical image compression using the IKL transform with an efficient encoder
Medical images are generated in a huge number in the research centers and hospitals every day. Working with the medical images and maintain the storage needs an efficient fund and huge storage space. Retaining the quality of the medical image is also very essential. Image compression without losing its quality is the only term to achieve the desired task. Achieving the desired task using the integer Karhunen Loeve transform attains a quality output and also with less storage space. JPEG and JPEG 2000 are also challenging to the integer transform based compression. Resulting the compression quality in terms of peak signal noise ratio, compression ratio is attained. Proposed method of compression is compared with the other efficient algorithms. Thus this proposed method can be used efficiently for the medical image in order to store and retrieve in healthcare industry.
https://ijnaa.semnan.ac.ir/article_5126_1dd61fe663ed0326940e486105e06bfc.pdf
2021-07-01
757
767
10.22075/ijnaa.2021.5126
Image compression
IKLT
SPIHT
S.
Saravanan
saranrulz671@gmail.com
1
Department of Computer Science and Engineering, Karunya Institute of Technology and sciences, India.
LEAD_AUTHOR
Sujitha
Juliet
sujitha.juliet@gmail.com
2
Department of Computer Science and Engineering, Karunya Institute of Technology and sciences, India.
AUTHOR
ORIGINAL_ARTICLE
Rough continuity and rough separation axioms in $G_m$-closure approximation spaces
The theory of general topology view for continuous mappings is general version and is applied for topological graph theory. Separation axioms can be regard as tools for distinguishing objects in information systems. Rough theory is one of map the topology to uncertainty. The aim of this work is to presented graph, continuity, separation properties and rough set to put a new approaches for uncertainty. For the introduce of various levels of approximations, we introduce several levels of continuity and separation axioms on graphs in $G_m$-closure approximation spaces.
https://ijnaa.semnan.ac.ir/article_5129_254786327e48782f16009f17ad381f5d.pdf
2021-07-01
769
782
10.22075/ijnaa.2021.5129
Rough sets
$G_m$-closure space
Approximation spaces
lower and upper approximation spaces
Rough continuity
Rough separation axioms
Yousif
Yousif
yoyayousif@yahoo.com
1
Department of Mathematics, College of Education for Pure Science, Ibn AL-Haitham, University of Baghdad, Baghdad-Iraq.
LEAD_AUTHOR
ORIGINAL_ARTICLE
Fibrewise totally perfect mapping
The main purpose of this paper is to introduce a some concepts in fibrewise totally topological space which are called fibrewise totally mapping, fiberwise totally closed mapping, fibrewise weakly totally closed mapping, fibrewise totally perfect mapping fibrewise almost totally perfect mapping. Also the concepts as totally adherent point, filter, filter base, totally converges to a subset, totally directed toward a set, totally rigid, totally-H-set, totally Urysohn space, locally totally-QHC totally topological space are introduced and the main concept in this paper is fibrewise totally perfect mapping in totally topological space. Several theorem and characterizations concerning with these concepts are studied.
https://ijnaa.semnan.ac.ir/article_5134_2052f30077a686a8718b8560573600d4.pdf
2021-07-01
783
792
10.22075/ijnaa.2021.5134
Fibrewise totally topological space
filter base
totally converges
totally closed mapping
totally rigid a set
totally perfect mapping
Yousif
Yousif
yoyayousif@yahoo.com
1
Department of Mathematics, College of Education for Pure Sciences (Ibn Al-Haitham), Baghdad University, Baghdad, Iraq
AUTHOR
Amira R.
Kadzam
ameera.radi202a@gmail.com
2
Department of Mathematics, College of Education for Pure Sciences (Ibn Al-Haitham), Baghdad University, Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
An approximate solution of integral equation using Bezier control Points
The integral equations are computed numerically using a Bezier curve. We have written the linear Fredholm integral equation into a matrix formulation by using a Bezier curves as a piecewise polynomials of degree n and we use (n+1) unknown control points on unit interval to determine Bezier curve. two examples have been discussed in details.
https://ijnaa.semnan.ac.ir/article_5135_daa0facf015d177cb8215d007bdfbf9a.pdf
2021-07-01
793
798
10.22075/ijnaa.2021.5135
Bezier curve
Bernstien polynomials
Fredholm integral equation
Asmaa N.
Al-Janabi
asm_no_2006@yahoo.com
1
College of Engineering, Al-Nahrain University, Baghdad, Iraq
LEAD_AUTHOR
Farah J.
Al Zahed
farahj_math@csw.uobaghdad.edu.iq
2
Department of Mathematics, College of Science for woman, University of Baghdad,Iraq
AUTHOR
Ahmad Hadi
Hussain
met.ahmed.hadi@uobabylon.edu.iq
3
College of Engineering Al-musayab, Department of Energy Engineering, University of Babylon, Iraq
AUTHOR
ORIGINAL_ARTICLE
Gronwall type inequalities: new fractional integral results with some applications on hybrid differential equations
In this paper, we are concerned with a class of fractional integral inequalities of Gronwall type. New integral results with some generalizations are proved. Then, some applications on hybrid differential equations with Hadamard derivative are established.
https://ijnaa.semnan.ac.ir/article_5138_66e68858a87657b581360f88b54433a6.pdf
2021-07-01
799
809
10.22075/ijnaa.2020.19595.2089
Hybrid differential equations
Gronwall inequality
Hadamard derivative
Ferraoun
Ferraoun
soumia.ferraoun@gmail.com
1
Laboratory LPAM, UMAB, University of Mostaganem, Algeria
AUTHOR
Zoubir
Dahmani
zzdahmani@yahoo.fr
2
Laboratory LPAM, UMAB, University of Mostaganem, Algeria
LEAD_AUTHOR
ORIGINAL_ARTICLE
Ulam-Hyers stability for fuzzy delay differential equation
In this paper, we aim to study the Ulam-Hyers stability and Ulam-Hyers-Rassias stability of the fuzzy delay differential equation under some suitable conditions by the fixed point technique and successive approximation method. Moreover, we provide two illustrative examples of application of our results.
https://ijnaa.semnan.ac.ir/article_5139_3f61bd5132f8e4aa8566df526d638f0d.pdf
2021-07-01
811
824
10.22075/ijnaa.2019.19065.2053
Ulam-Hyers stability
fuzzy differential equations
generalized differentiability
Successive approximation method
fixed point theory
Vu
Ho
vuh@buh.edu.vn
1
Faculty of Mathematical Economics, Banking University of Ho Chi Minh City, Vietnam
LEAD_AUTHOR
Dong
Le
dls02081985@gmail.com
2
Faculty of Mathematical Economics, Banking University of Ho Chi Minh City, Vietnam
AUTHOR
ORIGINAL_ARTICLE
Shrinking approximation method for solution of split monotone variational inclusion and fixed point problems in Banach spaces
In this paper, we investigate a shrinking algorithm for finding a solution of split monotone variational inclusion problem which is also a common fixed point problem of relatively nonexpansive mapping in uniformly convex real Banach spaces which are also uniformly smooth. The iterative algorithm employed in this paper is design in such a way that it does not require prior knowledge of operator norm. We prove a strong convergence result for approximating the solutions of the aforementioned problems and give applications of our main result to split convex minimization problem. The result present in this paper extends and complements many related results in literature.
https://ijnaa.semnan.ac.ir/article_5140_cc0629302ffb8cd8f654b36b6f959762.pdf
2021-07-01
825
842
10.22075/ijnaa.2021.22634.2393
Maximal monotone operators
Relatively nonexpansive mapping
shrinking iterative scheme
split feasibility problem
fixed point problem
Francis
Akutsah
akutsah@gmail.com
1
School of Mathematics, Statistics and Computer Science, University of KwaZulu-Natal, Durban, South Africa
LEAD_AUTHOR
Narain
Kumar
naraino@ukzn.ac.za
2
School of Mathematics, Statistics and Computer Science, University of KwaZulu-Natal, Durban, South Africa
AUTHOR
Abass
Anuoluwapo
hammedabass548@gmail.com
3
School of Mathematics, Statistics and Computer Science, University of KwaZulu-Natal, Durban, South Africa
AUTHOR
Akindele
Mebawondu
dele@aims.ac.za
4
School of Mathematics, Statistics and Computer Science, University of KwaZulu-Natal, Durban, South Africa
AUTHOR
ORIGINAL_ARTICLE
A topology on a ring part of IS-algebra
We give a topology on a ring part of IS-algebra, by define prime ideals of a commutative ring part of IS-algebra and study some of its properties.
https://ijnaa.semnan.ac.ir/article_5141_c868ea6ce1ddaa59489fbfb67fa7b3a9.pdf
2021-07-01
843
848
10.22075/ijnaa.2021.5141
IS-algebra
adjoin ring part
prime ideal
Fatema F.
Kareem
fa_sa20072000@yahoo.com
1
Department of Mathematics, College of Education for Pure Science,Ibn Al-Haithem, University of Baghdad, Baghdad, Iraq
LEAD_AUTHOR
Reyadh. D.
Ali
eyadhdelphi@gmail.com
2
Department of Mathematics, College of Education for Pure Science,University of Karbala, Karbala, Iraq
AUTHOR
ORIGINAL_ARTICLE
The new integral transform and its applications
We offer a new complex integral transform, the complex SEE transform, in this paper. The properties of this transform are investigated. This complex integral transform is also used to reduce the core problem to a simple algebraic equation. The answer to this primary problem can then be obtained by solving this algebraic equation and using the inverse of this complex integral transform. Finally, the complex integral transform is used to solve higher order ordinary differential equations. Also, we introduce, some important engineering and physics applications.
https://ijnaa.semnan.ac.ir/article_5142_96bd157075152bf42ba09bc02296eeba.pdf
2021-07-01
849
856
10.22075/ijnaa.2021.5142
complex integral transform
Ordinary differential equations
Eman A.
Mansour
iman.am_73@uomustansiriyah.edu.iq
1
Mustansiriyah University, College of Education, Department of Mathematics, Baghdad, Iraq
AUTHOR
Sadiq
Mehdi
sadiqmehdi71@uomustansiriyah.edu.iq
2
Mustansiriyah University, College of Education, Department of Mathematics, Baghdad, Iraq
LEAD_AUTHOR
Emad A.
Kuffi
emad.abbas@qu.edu.iq
3
bAl-Qadisiyah University, College of Engineering, Al-Qadisiyah, Iraq
AUTHOR
ORIGINAL_ARTICLE
A new method of linear support vector regression with interval data
In this paper, the linear support vector regression approach is proposed for solving the regression problem with interval data, which is called interval support vector regression(ISVR). The ISVR approach is equivalent to solving a linear constrained quadratic programming problem (QPP) with an interval cost coefficient in which the value of the objective function is in an interval. Instead of solving an interval QPP, we solve two QPPs and prove that the cost values of these two problems are the lower bound and the upper bound of the target value of the interval QPP. We show these two mentioned QPPs are equivalent to two support vector regression problems which the first problem applies the lower bound of data and the second problem considers the upper bound of the data. to obtain the regression function. Some experiments are made to demonstrate the performance of our method compared with the known algorithms on several artificial, benchmark and real practical datasets.
https://ijnaa.semnan.ac.ir/article_5144_23f5ee5986f53407443cb7ecc43c24e2.pdf
2021-07-01
857
868
10.22075/ijnaa.2020.19163.2067
Quadratic programming
Computing methodologies and applications
Linear regression.
Mojtaba
Baymani
m_baymani@qiet.ac.ir
1
Applied Mathematics, Mathematics, Quchan University of Technology, Quchan, Iran
LEAD_AUTHOR
Hoda
Saffaran
h.safaran@yahoo.com
2
Department of Computer, Engineering Faculty, Ferdowsi University of Mashhad, Mashhad, Iran
AUTHOR
Nima
Salehi-M.
ni.salehi@mail.um.ac.ir
3
Department of Computer, Engineering Faculty, Ferdowsi University of Mashhad, Mashhad, IRAN
AUTHOR
ORIGINAL_ARTICLE
Grasp on next generation security operation centre (NGSOC): Comparative study
With the growing number of cyber security threats affecting the business environment of many organizations, especially the IT environment. With the growing number of cyber security threats affecting the business environment of many organizations, especially the IT environment. Managed protection systems, including SOC, are highly sought after. Managed protection systems, including SOC, are highly sought after. The problem with SOC is that when building up their own SOC or hiring a third-party to provide SOC, organizations are not able to apply adequate criteria or standard frameworks. The aim of the study is to lay the foundations for developing a modern system of systematic operation centers for the next generation (NGSOC) for IIoT climate. This paper contains thorough, qualitative literature survey on the implementation of a Security Operation Centre (SOC). A comparative study is carried out using a variety of previous research sources and a literature review. The findings from the report show that previous research is not adequately guided, especially in the safety and technical aspects of the building block of the SOC. It is hoped that by proposing the framework, cybersecurity threat prevention and identification would be strengthened even further. The success of the NGSOC will ultimately be determined by the integration of individuals, procedure, and technology.
https://ijnaa.semnan.ac.ir/article_5145_8916b1bf910aeabaca0a4ee92861fe13.pdf
2021-07-01
869
895
10.22075/ijnaa.2021.5145
SOC
SIEM
IIOT
security
NGSOC
Yau Ti
Dun
alan@sysarmy.net
1
Faculty of Computing, College of Computing and Applied Sciences, Universiti Malaysia Pahang, 26600 Pekan, Pahang, Malaysia & Sysarmy Snd Bhd, Wisma Zelan, No 12, 1, Jalan Tasik Permaisuri 2, Bandar Tun Razak, 56000 Kuala Lumpur,
AUTHOR
Mohd Faizal
Ab Razak
faizalrazak@ump.edu.my
2
Faculty of Computing, College of Computing and Applied Sciences, Universiti Malaysia Pahang, 26600 Pekan, Pahang, Malaysia
LEAD_AUTHOR
Mohamad Fadli
Zolkiplib
m.fadli.zolkipli@uum.edu.my
3
School of Computing, UUM College Arts Sciences, Universiti Utara Malaysia, 06010 UUM Sintok, Kedah Darul Aman, Malaysia
AUTHOR
Tan Fui
Bee
fuibee@gmail.com
4
Faculty of Computing, College of Computing and Applied Sciences, Universiti Malaysia Pahang, 26600 Pekan, Pahang, Malaysia & Sysarmy Snd Bhd, Wisma Zelan, No 12, 1, Jalan Tasik Permaisuri 2, Bandar Tun Razak, 56000 Kuala Lumpur,
AUTHOR
Ahmad
Firdaus
firdausza@ump.edu.my
5
aFaculty of Computing College of Computing and Applied Sciences, Universiti Malaysia Pahang 26600 Pekan, Pahang Darul Makmur
AUTHOR
ORIGINAL_ARTICLE
Approximation of Fourier series in terms of functions in $L_p$ Spaces for $0
Many results introduced for the absolutely convergence of Fourier series in terms of absolutely continuous functions. Here we study the convergence of Fourier series in terms of $p$-integrable functions series.
https://ijnaa.semnan.ac.ir/article_5146_8f4d994736898a01a9e50813fbab1376.pdf
2021-07-01
897
911
10.22075/ijnaa.2021.5146
modulus of continuity
Dyadic intervals
Haar system
Rademacher system
Sahab Mohsen
Aboud
sahab.aboud@student.uobabylon.edu.iq
1
Mathematics Department, College of Education for pure Sciences, University of Babylon, Babylon, Iraq
AUTHOR
Eman Samir
Bhaya
emanbhaya@uobabylon.edu.iq
2
Mathematics Department, College of Education for pure Sciences, University of Babylon, Babylon, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
An inverse triple effect domination in graphs
In this paper, an inverse triple effect domination is introduced for any finite graph $G=(V, E)$ simple and undirected without isolated vertices. A subset $D^{-1}$ of $V-D$ is an inverse triple effect dominating set if every $v \in D^{-1}$ dominates exactly three vertices of $V-D^{-1}$. The inverse triple effect domination number $\gamma_{t e}^{-1}(G)$ is the minimum cardinality over all inverse triple effect dominating sets in $G$. Some results and properties on $\gamma_{t e}^{-1}(G)$ are given and proved. Under any conditions the graph satisfies $\gamma_{t e}(G)+\gamma_{t e}^{-1}(G)=n$ is studied. Lower and upper bounds for the size of a graph that has $\gamma_{t e}^{-1}(G)$ are putted in two cases when $D^{-1}=V-D$ and when $D^{-1} \neq V-D .$ Which properties of a vertex to be belongs to $D^{-1}$ or out of it are discussed. Then, $\gamma_{t e}^{-1}(G)$ is evaluated and proved for several graphs.
https://ijnaa.semnan.ac.ir/article_5147_ade35cd6670114b0cac6818fbb0517c3.pdf
2021-07-01
913
919
10.22075/ijnaa.2021.5147
dominating set
Triple effect domination
Inverse triple effect domination
Zinah H.
Abdulhasan
zinah_hussein.math@utq.edu.iq
1
Department of Mathematics, College of Education for Pure Sciences, University of Thi-Qar, Thi-Qar, Iraq
AUTHOR
Mohammed A.
Abdlhusein
mmhd@utq.edu.iq
2
Department of Mathematics, College of Education for Pure Sciences, University of Thi-Qar, Thi-Qar, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Automatic detection lung infected COVID-19 disease using deep learning (Convolutional Neural Network)
In late 2019, a virus appeared suddenly he claims Covid-19, which started in China and began to spread very widely around the world. And because of its effects, which are not limited to human life only, but rather in economic and social aspects, and because of the increase in daily injuries and significantly with the limited hospitals that cannot accommodate these large numbers, it is necessary to find an automatic and rapid detection method that limits the spread of the disease and its detection at an early stage in order to be treated more quickly. In this paper, deep learning was relied upon to create a CNN model to detect COVID-19 infected lungs using chest X-ray images. The base consists of a set of images taken of lungs infected with Covid-19 disease and normal lungs, as the CNN structure gave accuracy, Precision, Recall and F-Measure 100%
https://ijnaa.semnan.ac.ir/article_5148_9cb33dcb6e8850fb48ae898898cc890c.pdf
2021-07-01
921
929
10.22075/ijnaa.2021.5148
Deep learning
Convolutional Neural Network
COVID-19
Mali H. Hakem
Alameady
maali.alameedi@uokufa.edu.iq
1
Department of Computer Science, Faculty of Computer Science and Maths, University of Kufa, Najaf, Iraq
LEAD_AUTHOR
Ahmed
Fahad
dr.ahmedalafahad@utq.edu.iq
2
University of Thi-Qar, 64001 Al-Nassiriya, Iraq
AUTHOR
Alaa
Abdullah
anf.alfahad@gmail.com
3
Education Directorate of Thi-Qar, Ministry of Education, Iraq
AUTHOR
ORIGINAL_ARTICLE
Big data analysis by using one covariate at a time multiple testing (OCMT) method: Early school dropout in Iraq
The early school dropout is very significant portents that controls the future of societies and determine the nature of its elements. Therefore, studying this phenomenon and find explanations of it is a necessary matter, by finding or developing appropriate models to predict it in the future. The variables that affect the early school dropout Iraq takes a large size and multiple sources and types due the political and economic situation , which attributes it as a sort of Big Data that must be explored by using new statistical approaches. The research aims at using one Covariate at a Time Multiple Testing OCMT Method to analyze the data from surveys collected by the Central Statistical Organization IRAQ, which contains many indicators related to school dropout and meaningfully affect the life of the Iraqi persons. The Ridge Regression Method as well as the OCMT method were chosen to analyze data and the Mean Square Errors MSE was used to compare the two methods and From the results we find that OCMT estimator is better than Ridge estimator with Big Data conditions.
https://ijnaa.semnan.ac.ir/article_5149_d3e88e6d102b598aebbbfb5d68b4fb93.pdf
2021-07-01
931
938
10.22075/ijnaa.2021.5149
Big Data
OCMT
ridge regression
multiple testing
Ahmed Mahdi
Salih
1
Department of Statistics, College of Administration and Economics Administration and Economics, Wasit University, Wasit, Iraq
LEAD_AUTHOR
Munaf Yousif
Hmood
2
Department of Statistics, College of Administration and Economics Administration and Economics, University of Baghdad, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Fibrewise totally compact and locally totally compact spaces
In this paper we define and study new concepts of fibrwise totally topological spaces over B namely
fibrewise totally compact and fibrwise locally totally compact spaces, which are generalization of well
known concepts totally compact and locally totally compact topological spaces. Moreover, we study
relationships between fibrewise totally compact (resp, fibrwise locally totally compact) spaces and
some fibrewise totally separation axioms.
https://ijnaa.semnan.ac.ir/article_5154_99cc63cb57056e7fb1ee850b773164bd.pdf
2021-07-01
939
948
10.22075/ijnaa.2021.5154
Fiberwise totally topological spaces
Fiberwise totally compact spaces
fiberwise locally totally compact spaces
fibrewise totally separation axioms
Amira R.
Kadzam
ameera.radi202a@gmail.com
1
Department of Mathematics, College of Education for Pure Sciences (Ibn Al-Haitham), Baghdad University, Baghdad, Iraq
AUTHOR
Yousif
Yousif
yoyayousif@yahoo.com
2
Department of Mathematics, College of Education for Pure Science, Ibn AL-Haitham, University of Baghdad, Baghdad-Iraq.
LEAD_AUTHOR
ORIGINAL_ARTICLE
Effects of static magnetic field on dye extracted from Anchusa-Italica through optimization the optoelectronic properties
The dye extracted from the plant is already well used in optoelectronic applications for its easy and safe handling. This study is to demonstrate the effect of magnetized distilled water on dye extracted from Anchusa-Italica flowers. The results of its optoelectronic behavior reveal that the use of magnetized water in the extraction process results in different and better properties than processes in which ordinary water was used. The structural analysis of Anchusa-Italica dye thin-film was performed using the Fourier-transform infrared technique (FT-IR). The optical responses, such as the absorption coefficient, absorption spectra, both standard and refractive indices, and electronic properties (optical energy gap) were studied using Ultraviolet-Visible transmittance spectra range 300–900 nm. The calculated energy band gap of the dye extracted using magnetized water was decreased from 3.23 to 2.35 eV and turned into the preferred direct band gap to make a useful contribution to optical sources. The optical absorption spectra of the dye extracted using magnetized water appear to have a better efficiency compared to that extracted with ordinary water. A significant evolution in the absorption coefficient was obtained by employing magnetized water to extract the dye. The magnetized extraction process also modified the electronic transmission values (indirect to direct). The effect of magnetized water on the resonance mode and transparent indication was deduced by studying the complex refractive index. An increase appeared in the spectrum of the absorption index at a wavelength of 570 nm, whereas a small attenuation coefficient was observed as well. The important effects of magnetized dye extraction will highly benefit the field of optoelectronic applications.
https://ijnaa.semnan.ac.ir/article_5158_2977b9ed2cb754b83dbb0ae379377580.pdf
2021-07-01
949
960
10.22075/ijnaa.2021.5158
static magnetic field
optical absorption spectra
green materials
Optical properties
optical energy gap
Fatima H.
Malek
fatima.malk@uobasrah.edu.iq
1
Department of Material Science, Polymer Research Centre, University of Basrah, Iraq
AUTHOR
Tahseen
Alaridhee
tahseen.alaridhee@uobasrah.edu.iq
2
Department of Material Science, Polymer Research Centre, University of Basrah, Iraq
LEAD_AUTHOR
Abdullah A.
Hussein
aahaat28977@yahoo.com
3
Department of Material Science, Polymer Research Centre, University of Basrah, Iraq
AUTHOR
Arwa H. M.
AL-Saeed
arwa.mahmood@uobasrah.edu.iq
4
Department of chemistry, College of Science, University of Basrah, Iraq
AUTHOR
ORIGINAL_ARTICLE
Bayes estimators of a multivariate generalized hyperbolic partial regression model
The matrix-variate generalized hyperbolic distribution belongs to the family of heavy-tailed mixed
probability distributions and is considered to be one of the continuous skewed probability distributions. This distribution has wide applications in the field of economics, especially in stock modeling.
This paper includes estimation the parameters of the multivariate semi-parametric regression
model represented by the multivariate partial linear regression model when the random error follows the matrix-variate generalized hyperbolic distribution, using the Bayesian method when noninformative prior information is available and under the assumption that the shape parameters and
the skewness matrix are known. In addition, the bandwidth parameter is estimated by a suggested
way based on the normal distribution rule and the proposed kernel function based on the mixed
Gaussian kernel function and studying the findings on the generated data in a way suggested for
the model, comparing the estimators depending on the criterion of the mean sum of squares error.
The two researchers concluded that the proposed kernel function is better than the Gaussian kernel
function in estimate the parameters.
https://ijnaa.semnan.ac.ir/article_5166_1456f87ae28cf6b1cf112a4eab5f36e9.pdf
2021-07-01
961
975
10.22075/ijnaa.2021.5166
matrix-variate generalized hyperbolic distribution
multivariate partial regression model
kernel functions, bandwidth parameter
Bayes method
Sarmad Abdulkhaleq
Saliha
hsarmad012@gmail.com
1
Statistician at the Nineveh Agriculture Directorate, Mosul, Iraq
LEAD_AUTHOR
Emad Hazim
Aboudib
dr.emad.aboudi@gmail.com
2
College of Administration and Economics, University of Baghdad, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Non-Bayesian estimation of Weibull Lindley burr XII distribution
In this paper, we estimate the four parameters of Weibull Lindley burr distribution by using ordinary
least square method and multiple regression least square method. The survival estimate made by
using ordinary least square estimator (OLSE) and multiple regression estimator (MRE).
https://ijnaa.semnan.ac.ir/article_5168_c288f1243b69e678f94e0cd1322b8bb6.pdf
2021-07-01
977
989
10.22075/ijnaa.2021.5168
Weibull Lindley burr XII distribution (WLBD)
The ordinary least squares Method (OLSEM)
Multiple Regression Least Squares Method (MRLSM)
Etab Kazem
Amer
etabkazemamer@gmail.com
1
Department of Mathematics, College of Education for Pure Sciences, University of Thi-Qar, Thi-Qar, Iraq
AUTHOR
Nabeel Jawad
Hassan
nabeel.jawad@utq.edu.iq
2
Department of Mathematics, College of Education for Pure Sciences, University of Thi-Qar, Thi-Qar, Iraq
LEAD_AUTHOR
Hassan
Jassim
hassankamil@utq.edu.iq
3
Department of Mathematics, University of Thi-Qar, Nasiriyah, Iraq
AUTHOR
ORIGINAL_ARTICLE
Customer lifetime value analysis in the banking industry with an emphasis on brand equity
Due to the competitiveness of the banking industry and the importance of profitability, access to customer information is essential for establishing effective relationships that serve the interests of both parties. Establishing long-term customer relationships and building brand equity are pivotal in modern banking, and thus improving relationship quality plays a key role in development of new services and customer lifetime value (CLV) measurement. The purpose of the present research is to provide a new model for CLV measurement in the banking industry with an emphasis on brand equity. This study is descriptive and a question naire is used to collect data. The population consists of all the customers of Refah Bank of Iran (with an average annual resources of at least 500m rials), of whom 382 are randomly selected as the sample. Data are analyzed using de-scriptive statistics in SPSS and partial least squares structural equation modeling (PLS-SEM) in SmartPLS. The results indicate the strong fit of the overall model (GOF = 0.782) and show the significant positive effect of brand equity on CLV.
https://ijnaa.semnan.ac.ir/article_5169_1a5355de0b540ef067b750469f6d5b73.pdf
2021-07-01
991
1004
10.22075/ijnaa.2021.5169
Customer Lifetime Value
Brand Equity
Relationship Quality
Perceived Value
Banking
Bahram
Seyedin
sh_seyedin@yahoo.com
1
Department of Management , Tabriz Branch, Islamic Azad University, Tabriz, Iran
AUTHOR
Mojtaba
Ramazani
m.ramazani@yahoo.com
2
Department of Management, Bonab Branch, Islamic Azad University, Bonab, Iran
LEAD_AUTHOR
Hossein
Bodaghi Khajeh Noubar
h_budaghi@yahoo.com
3
Department of Management , Tabriz Branch, Islamic Azad University, Tabriz, Iran
AUTHOR
Yaghob
Alavimatin
alavimatin@iaut.ac.ir
4
Department of Management , Tabriz Branch, Islamic Azad University, Tabriz, Iran
AUTHOR
ORIGINAL_ARTICLE
Biomechanical analysis of long pass in U-19 women football players
Kicking movement is process of moving position on leg. Biomechanical analysis explains kick performance which influenced by kinematics and kinetics factors. The research purpose analyzed biomechanical long pass movement. This research is both qualitative and quantitative. The research
sample are 11 Indonesian woman football players who were taken by saturated sampling. Data in
the form of long pass kick video with airborne ball test. Data analyzing used Kinovea software to
determine the flexion angle of backswing kick leg, hip angle, and distance to target, then looking
for the force, power, and energy in kick motion. The motion analysis shown that sample 3 produces
closest distance to target as far as 0.65 m which done with flexion angle of backswing knee is 740
and hip angle of 640. The force exerted by sample 3 is 10.09 N, resulting in a ball speed of 22.42
m/s and a kinetic energy of 113.12 Joule, potential energy of 14.64 Joule and mechanical energy of
127.76 Joule. It can be concluded that accuracy of long pass kick are influenced by flexion angle of
backswing kick knee, hip angle, power and force as well as producing energy in the form of kinetic,
potential, and mechanical energy.
https://ijnaa.semnan.ac.ir/article_5171_d764a92abad044dfbfed49e36e6fead2.pdf
2021-07-01
1005
1021
10.22075/ijnaa.2021.5171
Biomechanics
Long Pass
Football
Rumi Iqbal
Doewes
king.doewes@staff.uns.ac.id
1
Fakulti Sains Sukan dan Kejurulatihan, Universiti Pendidikan Sultan Idris, Perak Darul Ridzuan 35900, Malaysia & Faculty of Sport, Universitas Sebelas Maret, Jl. Ir. Sutami, 36A, Kentingan, Surakarta, Indonesia
AUTHOR
Gunathevan
Elumalai
gunathevan@fsskj.upsi.edu.my
2
Fakulti Sains Sukan dan Kejurulatihan, Universiti Pendidikan Sultan Idris, Perak Darul Ridzuan 35900, Malaysia
LEAD_AUTHOR
Siti Hartini
Azmi
siti.hartini@fsskj.upsi.edu.my
3
Fakulti Sains Sukan dan Kejurulatihan, Universiti Pendidikan Sultan Idris, Perak Darul Ridzuan 35900, Malaysia
AUTHOR
Ubaidillah
Ubaidillah
ubaidillah_ft@staff.uns.ac.id
4
Faculty of Engineering, Universitas Sebelas Maret, Jl. Ir. Sutami, 36A, Kentingan, Surakarta, Indonesia
AUTHOR
ORIGINAL_ARTICLE
The level of representation of some learning styles in the content of Mathematics books for the 4th preparatory class (analysis - evaluation study)
The present research aims at identifying the level of representation of some learning styles in the
content of mathematics books for 4th preparatory (scientific and literary). In order to achieve the
goal of the research and answer his questions, the researcher has adopted the descriptive research
method and the content analysis method for the research sample. By using the content analysis card
with indicators of virtual validity. It includes categories of analysis or axes of analysis and represents
Learning methods and the their indicators according to the Filder - Silverman model of learning
styles, which classified students’ learning styles into several methods: ( Sensing Learners vs Intuitive
Learners , visual Learners vs verbal learners , inductive learners versus deductive learners , active
learners vs contemplative learners, sequential learners versus holistic learners).
The researcher has conducted the content analysis process for mathematics books for 4th preparatory
class (scientific and literary) according to specific steps and controls. To determine the level of
representation of some learning styles, using frequencies and percentages. As the results of the
analysis, it is obvious that the frequency totals for learning styles and their indicators are unequal,
and the percentages of their representation level in the content of mathematics books for the 4th
preparatory class (scientific and literary) are below the required level and this is realistic evidence
that some students’ learning styles have not been taken into consideration. The consideration when
preparing mathematics books for the 4th preparatory class (scientific and literary). Therefore, the
researcher recommends the need to pay attention to it and take into account the inclusion of all
students ’learning methods when preparing mathematics curricula in particular and books in general.
https://ijnaa.semnan.ac.ir/article_5172_3d9b89c8c8c5117ba32a86e1f23d7a83.pdf
2021-07-01
1023
1050
10.22075/ijnaa.2021.5172
Content analysis method
Learning styles
school mathematics books
Ali Hussein
Oleiwi Nasir
alwawaalihussien73@gmail.com
1
Ministry of Education, Directorate of Education Babylon, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Fibrewise Slightly Perfect Topological Spaces
The primary objective of this paper is to present a new concept of fibrewise topological spaces over B
is said to be fibrewise slightly topological spaces over B. Also, we introduce the concepts of fibrewise
slightly perfect topological spaces, filter base, contact point, slightly convergent, slightly directed
toward a set, slightly adherent point, slightly rigid, fibrewise slightly weakly closed, H.set, fibrewise
almost slightly perfect, slightly∗
.continuous fibrewise slightly∗
topological spaces respectively, slightly
Te, locally QHC, In addition, we state and prove several propositions related to these concepts.
https://ijnaa.semnan.ac.ir/article_5173_fb0d491cf4d25040708a5de1f2bdf472.pdf
2021-07-01
1051
1059
10.22075/ijnaa.2021.5173
Topological spaces
filter base
fibrewise slightly perfect topological spaces
Yousif
Yousif
yoyayousif@yahoo.com
1
Department of Mathematics, College of Education for Pure Science, Ibn AL-Haitham, University of Baghdad, Baghdad-Iraq.
AUTHOR
Mohammed G .
Mousa
mohammedkata90@gmail.com
2
Department of Mathematics, College of Education for Pure Sciences (Ibn Al-Haitham), University of Baghdad, Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
The numerical solution of bioheat equation based on shifted Legendre polynomial
The goal of this study is to expand the usage of a collection method based on shifted Legendre polynomials in matrix form to approximate the derivative to obtain numerical solutions for the unsteady state one-dimensional bioheat equation. The proposed methodology is used to two examples to illustrate its utility and accuracy. The numerical results shown that the techniques used are effective as well as gives high accuracy and good convergence
https://ijnaa.semnan.ac.ir/article_5175_46200792fb1ff19bb1ac6b43d90a940c.pdf
2021-07-01
1061
1070
10.22075/ijnaa.2021.5175
Collocation method
bioheat equation
Legendre Polynomials
Accuracy
Hameeda O.
Al-Humedi
hameeda.mezban@uobasrah.edu.iq
1
Department Mathematics, Education College for pure Sciences, Basrah University, Basrah, Iraq
LEAD_AUTHOR
Firas A.
Al-Saadawi
firasamer519@yahoo.com
2
Open Education College in Basrah, Basrah, Iraq
AUTHOR
ORIGINAL_ARTICLE
A new approach of classical Hill Cipher in public key cryptography
Secure message transformation promote the creation of various cryptography systems to enable receivers to interpret the transformed information. In the present age of information technology, the secure transfer of information is the main study of most agencies. In this study, a particular symmetric cryptography system, Hill Cipher method, is enhanced with the help of encryption and decryption algorithms of the asymmetric RSA cryptography system to avoid certain problems. Previous results show that the original Hill algorithms are still insufficient because of their weakness to known plaintext attack, and a modification of the Hill Cipher cryptography system is therefore presented to increase its invulnerability. The enhancement focuses on implementing the RSA algorithms over the Hill Cipher to increase its security efficiency. The suggested method relies on the security of the RSA and Hill Cipher cryptosystems to find the private decryption keys, and thus is much more secure and powerful than both methods applied separately. Also secure and dynamic generation of the Hill Cipher matrix instead of using static matrix are proposed. This new approach is composed of a public key cryptosystem that has a shared secret key (between participants only), public key (announced to all), and two private keys (for each person). Therefore, this new modification can increase the invulnerability of the Hill Cipher against future attacks during transmission of information between agencies in this age of information technology
https://ijnaa.semnan.ac.ir/article_5176_b9a2fab810d9bc150ad6e5924234ac9d.pdf
2021-07-01
1071
1082
10.22075/ijnaa.2021.5176
Asymmetric cryptosystem
Hill Cipher
Invertible Key Matrix
Involutory matrix
RSA cryptosystem
Symmetric cryptosystem
Rajaa K.
Hasoun
dr.rajaa@uoitc.edu.iq
1
College of Business Informatics, University of Information Technology and Communication, Iraq
AUTHOR
Sameerah Faris
Khlebus
sameerah.alradhi@uoitc.edu.iq
2
College of Business Informatics, University of Information Technology and Communication, Iraq
LEAD_AUTHOR
Huda Kadhim
Tayyeh
haljobori@uoitc.edu.iq
3
College of Business Informatics, University of Information Technology and Communication, Iraq
AUTHOR
ORIGINAL_ARTICLE
The awareness effect of the dynamical behavior of SIS epidemic model with Crowley-Martin incidence rate and holling type III treatment function
This article deals with the dynamical behaviors for a biological model of epidemic diseases with holling type III treatment function. A Crowley-Martin formula to transmission of disease with coverage media programs effect on the population are introduced and investigated. Through some basic analyses, an explicit formula for the basic reproduction number of the model is calculated, and some results such as the stability analysis and instability of all equilibrium points for the model are established. The local bifurcation occurs near all equilibrium points for the model under some special cases that are studied. The numerical simulations are executed to confirm the theoretical results
https://ijnaa.semnan.ac.ir/article_5177_fe179562ae8b98ea6cfd605c2c9bec0e.pdf
2021-07-01
1083
1097
10.22075/ijnaa.2021.5177
Infection Diseases
Treatment Function
Awareness Programs
Local Bifurcation
Crowley-Martin formula
Ahmed A.
Mohsen
aamuhseen@gmail.com
1
Ministry of Education, Rusafa/1, Baghdad, Iraq
AUTHOR
Hassan Fadhil
Al-Husseiny
hassan.fadhil.r@sc.uobaghdad.edu.iq
2
Department of Mathematics, College of Science, Baghdad University, Baghdad, Iraq
LEAD_AUTHOR
Khalid
Hattaf
k.hattaf@yahoo.fr
3
Centre Regional desMetiers de l’Education et de la Formation (CRMEF), 20340 Derb Ghalef, Casablanca, Morocco, & LAMS, Faculty of Sciences Ben M’sik, Hassan II University of Casablanca, P.O Box 7955 Sidi Othman, Casablanca, Morocco
AUTHOR
ORIGINAL_ARTICLE
Study of the dual ideal of KU-algebra
In this work, we apply the notion of a filter of a KU-Algebra and investigate several properties. The
paper defined some filters such as strong filter, n-fold filter and P-filter and discussed a few theorems
and examples
https://ijnaa.semnan.ac.ir/article_5179_d2624147f42f2ec416117340df552ddf.pdf
2021-07-01
1099
1107
10.22075/ijnaa.2021.5179
KU-algebra
filter KU-algebra
strong filter
P-filter
Qasim Mohsin
Luhaib
qasimmohsinluhaib@gmail.com
1
Thi-Qar General Directorate of Education, Ministry of Education, Iraq
LEAD_AUTHOR
Fatema Faisal
Kareem
fatma.f.k@ihcoedu.uobaghdad.edu.iq
2
Department of Mathematics, College of Education for Pure Sciences (Ibn Al-Haitham), University of Baghdad, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Existence results for common solution of equilibrium and vector equilibrium problems
In this paper, by using the notion of locally segment-dense subsets and sequentially sign property for bifunctions, we establish existence results for a common solution of a finite family of equilibrium problems in the setting of Hausdorff locally convex topological vector spaces. Also similar resultsobtain for vector equilibrium problems.
https://ijnaa.semnan.ac.ir/article_5184_f7ea27de3ead82d8eac4255db48008a3.pdf
2021-07-01
1109
1120
10.22075/ijnaa.2021.23489.2547
equilibrium problem
Common solution
Locally segment-dense
Sequentially sign property
Sirous
Moradi
sirousmoradi@gmail.com
1
Department of Mathematics, Faculty of Science, Lorestan University, 68151-4-4316, Khorramabad, Iran
LEAD_AUTHOR
Milad
Firozeh
firouzeh.math@gmail.com
2
Department of Mathematics, Faculty of Science, Arak University, Arak, Iran
AUTHOR
ORIGINAL_ARTICLE
Common fixed point of generalized weakly contractive mappings on orthogonal modular spaces with applications
In this paper, we provide certain conditions under which guarantee the existence of a common fixed point for weakly contractive mappings defined on orthogonal modular spaces. Also, Banach fixed point theorem on an orthogonal modular space without completeness is obtained. To prove much stronger and more applicable results, some strong assumptions such as the convexity and the Fatou property of a modular are relaxed.
https://ijnaa.semnan.ac.ir/article_5186_61854ba415e5a3b45a48f4b1f64f0545.pdf
2021-07-01
1121
1140
10.22075/ijnaa.2021.22454.2365
Orthogonal modular space
Fixed point
Coincidence point
Fatemeh
Lael
fatemehlael@yahoo.com
1
Imam Khomeini International University, Buin Zahra Higher Education Center of Engineering and Technology, Buin Zahra, 3451866391, Qazvin, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
Face recognition via weighted non-negative sparse representation
Face recognition is one of the most important tools of identification in biometrics. Face recognition has attracted great attention in the last decades and numerous algorithms have been proposed. Different researches have shown that face recognition with Sparse Representation based Classification (SRC) has great classification performance. In some applications such as face recognition, it is appropriate to limit the search space of sparse solver because of local minima problem. In this paper, we apply this limitation via two methods. In the first, we apply the nonnegative constraint of sparse coefficients. As finding the sparse representation is a problem with very local minima, at first we use a simple classifier such as nearest subspace and then add the obtained information of this classifier to the sparse representation problem with some weights. Based on this view, we propose Weighted Non-negative Sparse Representation WNNSR for the face recognition problem. A quick and effective way to identify faces based on the sparse representation (SR) is smoothed $L_0$-norm $(SL_0)$ approach. In this paper, we solve the WNNSR problem based on the $SL_0$ idea. This approach is called Weighted Non-Negative Smoothed $L_0$ norm $(WNNSL_0)$. The simulation results on the Extended Yale B database demonstrate that the proposed method has high accuracy in face recognition better than the ultramodern sparse solvers approach.
https://ijnaa.semnan.ac.ir/article_5187_922a5007b6b21e37bbe932bafc317cd0.pdf
2021-07-01
1141
1150
10.22075/ijnaa.2021.5187
Face recognition
face subspace
sparse decomposition
smoothed $L_0$-norm
weighted $L_0$-norm
non-negative smoothed $L_0$ norm
Hoda
Khosravi
1
Department of Software Engineering, Sari Branch, Islamic Azad University, Sari, Iran
AUTHOR
Aboozar
Ghaffari
2
Department of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran
LEAD_AUTHOR
Javad
Vahidi
j.vahidi@iust.ac.ir
3
Department of Mathematics, Iran University of Science and Technology, Tehran, Iran
AUTHOR
ORIGINAL_ARTICLE
On generalisation of Brown's conjecture
Let $P$ be the complex polynomial of the form $P(z) = z \prod_{j=1}^{n-1}(z-z_{j})$, with $|z_{j}|\geq 1$, $1 \leq j \leq n-1.$ Then according to famous Brown's Conjecture $p'(z) \neq 0$, for $|z| < \frac{1}{n}.$ This conjecture was proved by Aziz and Zarger [1]. In this paper, we present some interesting generalisations of this conjecture and the results of several authors related to this conjecture.
https://ijnaa.semnan.ac.ir/article_5191_42bbd804ea617d83fa8b45a21dde4061.pdf
2021-07-01
1151
1155
10.22075/ijnaa.2021.22265.2343
Polynomial
disk
Zeros
Derivative
conjecture
Ishfaq
Nazir
ishfaqnazir02@gmail.com
1
Department of Mathematics, University of Kashmir, South Campus, Anantnag-192101, Jammu and Kashmir, India
LEAD_AUTHOR
Mohammad
Mir
ibrahimmath80@gmail.com
2
Department of Mathematics, University of Kashmir, South Campus, Anantnag-192101, Jammu and Kashmir, India
AUTHOR
Irfan
Wani
irfanmushtaq62@gmail.com
3
Department of Mathematics, University of Kashmir, South Campus, Anantnag-192101, Jammu and Kashmir, India
AUTHOR
ORIGINAL_ARTICLE
On fixed point in C*-algebra valued metric spaces using $C_*$-class function
In the present article, we prove some result using $C_*$-class function in the notion of C*-algebra valued metric space which is more general than metric space. The obtained results extend and generalize some of the results in the literature.
https://ijnaa.semnan.ac.ir/article_5192_b8c417cc4e4143107e1345a8b3cc95ac.pdf
2021-07-01
1157
1161
10.22075/ijnaa.2021.22750.2411
C*-algebra valued metric space
$C_*$-class function
Fixed point
Deepak
Kumar
deepakanand@live.in
1
Department of Mathematics, Lovely Professional University, Phagwara, 144411, India
AUTHOR
Dhariwal
Rishi
rishidhariwal51@gmail.com
2
Research Scholar, Lovely Professional University, Phagwara, 144411, India
AUTHOR
Choonkil
Park
baak@hanyang.ac.kr
3
Research Institute for Natural Sciences, Hanyang University, Seoul 04763, Korea
AUTHOR
Jung Rye
Lee
jrlee@daejin.ac.kr
4
Department of Mathematics, Daejin University, Kyunggi, Korea
LEAD_AUTHOR
ORIGINAL_ARTICLE
Multi-objective optimization with modified Taguchi approach to specify optimal robot spray painting process parameters
Robot spray painting process can improve the quality, productivity and provide clean environment in addition to minimize the labour and cost. This process is being used in automobiles, home appliances, etc. There is a need to specify optimal spray painting process parameters to improve the quality of paint coating considering the performance indicators as thickness variation, surface roughness and film adhesion. Compared to the Taguchi orthogonal array and gray rational analysis, a simple modified Taguchi approach is adopted here to identify optimal spray painting process parameters (such as distance, pressure and speed) and obtain minimum thickness variation, minimum surface roughness and maximum film adhesion. Empirical relation for thickness variation, surface roughness and film adhesion are presented. Test data are close-to/within the estimated range.
https://ijnaa.semnan.ac.ir/article_5193_04e347670dd9d4e67e7e57c53fc963f4.pdf
2021-07-01
1163
1174
10.22075/ijnaa.2021.5193
ANOVA
Automated paint
Distance
Film adhesion
Pressure
Speed
Surface roughness
Thickness variation
Swetha
Danthala
swethadanthala15@gmail.com
1
Department of Mechanical Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Andhra Pradesh, India.
LEAD_AUTHOR
Seeram
Rao
ssrao@kluniversity.in
2
Department of Mechanical Engineering, K L Deemed to be University, Vaddeswaram, Guntur (Dist), Andhra Pradesh, India.
AUTHOR
Boggarapu
Rao
bnrao52@rediffmail.com
3
Department of Mechanical Engineering, K L Deemed to be University, Vaddeswaram, Guntur (Dist), Andhra Pradesh, India.
AUTHOR
Kasiprasad
Mannepalli
mkasiprasad@gmail.com
4
Department of ECE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur (Dist), Vijayawada, Andhra Pradesh, India.
AUTHOR
ORIGINAL_ARTICLE
Detection of plant leaf nutrients using convolutional neural network based Internet of Things data acquisition
In this paper, the study detects the nutritional deficiencies from these leaves using Internet of Thing (IoT) based image acquisition and nutrition analyser devices. The former captures the color of the leaf and the latter helps in finding the nutrients in each zone based on the image captured by the device. The study uses an improved convolutional neural network to detect automatically the nutrients present in a leaf. The type of leaf is considered from the plants including coriander, tomato, pepper, chili, etc. The Convolutional Neural Network (CNN) is used to extract the patterns of leaf images from the data capturing IoT devices and nutrition analyser device. The system stores and process the data in cloud, where the CNN integrated in Virtual Machines enables the process of input data and process it and sends the report to the authority. A total of 3000 images are collected out of various disorders in five different plants. A 5 fold cross-validation is conducted on training and testing dataset. The system is tested in terms of accuracy, sensitivity, specificity, f-measure, geometric mean and percentage error. The comparison made with existing models shows an improved detection accuracy by CNN than other deep learning models.
https://ijnaa.semnan.ac.ir/article_5194_e166dcac111f34787fe0b9baccf2c305.pdf
2021-07-01
1175
1186
10.22075/ijnaa.2021.5194
Plant Leaf Nutrients
Detection
Convolutional Neural Network
Internet of Things
R
Sathyavani
sathyavanikarthikeyan@gmail.com
1
Department of IT, Institute Of Road and Transport Technology, Erode, India.
LEAD_AUTHOR
K
JaganMohan
auitjagan@gmail.com
2
Department of IT, Annamalai University, Chidambaram, India.
AUTHOR
B
Kalaavathi
kalabhuvanesh@gmail.com
3
Department of CSE, KSR Institute for Engineering and Technology, Tiruchengode, India.
AUTHOR
ORIGINAL_ARTICLE
Supervision calamity of public opinion actions based on field programmable gate array and machine learning
The community's rise, public opinion network's popularity, and emergency personnel's advancement have changed drastically. Individuals can now go online from any place and through communications systems to share their opinions and attitudes more efficiently and more often. As illustrated by the preceeding network approach, public sentiment on neural networks and IoT is critical for the public sector, the public interest, and a special event in an emergency (IoT). In terms of data security and anonymity, the proposed program is not safe and has environmental problems. Network public opinion's approach is based on FPGAs and machine education. FPGAs (Field Programmable Gate Array) Instant perspectives, possible future themes, knowledge exchange, excellent content and Team variance are used to build machine learning. In this popular sentiment network, several disasters have seriously threatened the security of our community. Public views on disaster networks in all type of internet media, such as internet news, blogs and webpages, are inextricably connected with society. This plays into unprecedented stress the ability of the government to deal with crises and their consequences.
https://ijnaa.semnan.ac.ir/article_5195_6fd1530ab08a5101aa660f70a7e49c1e.pdf
2021-07-01
1187
1198
10.22075/ijnaa.2021.5195
Emergency Management
Network Public Opinion Events
FPGA and Machine Learning
A
Rao
asr.unguturu@gmail.com
1
Department of CSE, Dhanekula Institute of Engineering & Technology, Vijayawada, India.
AUTHOR
Brahmadesam
Krishna
krishna.bv@rajalakshmi.edu.in
2
Department of CSE, Rajalakshmi Engineering College, Chennai, India.
AUTHOR
D
Saravanan
saranmds@gmail.com
3
Department of CSE, IFET Colleg of Engineering, Villupuram, India.
LEAD_AUTHOR
D
David
beulahdavid@jeppiaarcollege.org
4
Department of CSE, Jeppiaar Engineering College, Chennai, India.
AUTHOR
O
Devi
odugu.rama@gmail.com
5
Department of CSE, Lakireddy Bali Reddy College of Engineering, Mylavaram, India.
AUTHOR
Anju
Asokan
anjuasokan@skct.edu.in
6
Department of ECE, Sri Krishna College of Technology, Coimbatore, India.
AUTHOR
D
David
sdstalindavid707@gmail.com
7
Department of CSE, IFET Colleg of Engineering, Villupuram, India.
AUTHOR
ORIGINAL_ARTICLE
A new modification of Kalman filter algorithm
This study is concerned with estimating random data and in the presence of noise, as we used the Kalman filter estimation method through the backpropagation algorithm to estimate these data. This is because modern estimation methods have become more important as they were in the past years due to the expansion of the field of science and technology and the increasing data Therefore, the interest became in estimation methods that solve the noise problems that occur in the data. The Kalman filter has become one of the most popular and most reliable estimators in case of data noise. This study tests the use of the Kalman filter and Back Propagation algorithm to estimate the data containing noise and compare the results with the proposed method on the same data. The data is generated randomly in the simulation study. The results showed that Kalman is more efficient in filtering noise from the data and giving a lower mean square error compared to the backpropagation algorithm, but the results of the proposed method outperformed the results of the Kalman filter and the backpropagation with the least possible error.
https://ijnaa.semnan.ac.ir/article_5221_5e76cdeaea83b9aa7f5d9899cec58aed.pdf
2021-07-01
1199
1212
10.22075/ijnaa.2021.5221
Kalman filter
backpropagation algorithms
estimation
machine learning
Ahmed
Radhi
ahmedalshmirty@gmail.com
1
Department of Mathematics, Faculty of Computer Science and Mathematics, University of Kufa, Iraq
LEAD_AUTHOR
Zainab
Abdul Redhaa
zainaba.allahibi@student.uokufa.edu.iq
2
Ministry of Education, Najaf, Iraq
AUTHOR
Irtefaa A.
Neamah
irtefaa.radhi@uokufa.edu.iq
3
Department of Mathematics, Faculty of Computer Science and Mathematics, University of Kufa, Iraq
AUTHOR
ORIGINAL_ARTICLE
The generalized (2 + 1) and (3+1)-dimensional with advanced analytical wave solutions via computational applications
The analytical solutions for an important generalized Nonlinear evolution equations NLEEs dynamical partial differential equations (DPDEs) that involve independent variables represented by the (2 + 1)-dimensional breaking soliton equation, the (2 + 1)-dimensional Calogero--Bogoyavlenskii--Schiff (CBS) equation, and the (2 +1)-dimensional Bogoyavlenskii's breaking soliton equation (BE), and some new exact propagating solutions to a generalized (3+1)-dimensional KP equation with variable coefficients are constructed by using a new algorithm of the first integral method (NAFIM) and determined some analytical solutions by appointing special values of the parameters. In addition to that, we showed a new variety and unique travelling wave solutions by graphical illustration with symbolic computations.
https://ijnaa.semnan.ac.ir/article_5222_1e0135335462a1587d386c8b32f68df1.pdf
2021-07-01
1213
1241
10.22075/ijnaa.2021.5222
First integral method
Nonlinear evolution equations
Solitary waves solutions
Graphical representation
Symbolic computation
Faeza
Hasan
fahas90@yahoo.co.uk
1
Mathematics Department, Education for Pure Science Faculty, Basrah University, Basrah, Iraq
LEAD_AUTHOR
Mohamed
Abdoon
m.alameen@mu.edu.sa
2
Department of Basic Science (Mathematics), Deanship of Common First Year, Majmaah University, Riyadh, Saudi Arabia
AUTHOR
ORIGINAL_ARTICLE
Modelling covid-19 data using double geometric stochastic process
Some properties of the geometric stochastic process (GSP) are studied along with those of a related process which we propose to call the Double geometric stochastic process (DGSP), under certain conditions. This process also has the same advantages of tractability as the geometric stochastic process; it exhibits some properties which may make it a useful complement to the multiple Trends geometric stochastic process. Also, it may be fit to observed data as easily as the geometric stochastic process. As a first attempt, the proposed model was applied to model the data and the Coronavirus epidemic in Iraq to reach the best model that represents the data under study. A chicken swarm optimization algorithm is proposed to choose the best model representing the data, in addition to estimating the parameters a, b, \(\mu\), and \(\sigma^{2}\) of the double geometric stochastic process, where \(\mu\) and \(\sigma^{2}\) are the mean and variance of \(X_{1}\), respectively.
https://ijnaa.semnan.ac.ir/article_5224_02e9a1bfe58a51b45b35967b11edc6fc.pdf
2021-07-01
1243
1254
10.22075/ijnaa.2021.5224
double geometric stochastic process
geometric stochastic process
Parameter estimation
chicken swarm optimization algorithm
multiple monotone trends
root mean square criteria
Omar
Jasim
omar.ramzi89@uohamdaniya.edu.iq
1
College of Administration and Economics, University of Al-Hamdaniya, Iraq
LEAD_AUTHOR
Qutaiba
Nauef
dr.qutaiba@coadec.uobaghdad.edu.iq
2
College of Administration and Economics, University of Bagdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Improvement in credit card fraud detection using ensemble classification technique and user data
Financial fraud is a serious problem in banking system. Credit card fraud is growing with increasing Internet usage, as it becomes very simple to collect user data and do fraud transaction. Fortunately, all records including fraud and legit transactions are present in the financial record. Improved data mining techniques are now capable to find solutions for such outlier detections. Financial data is freely available in many sources, but this data has some challenges like,1) the profile of legit and fraudulent behavior changes constantly, 2) there is a class imbalance problem in dataset, because less than 3% transaction are fraud, 3) transaction verification latency is also one more problem. All this data issues are handled using pre-processing techniques like cleaning and reduction. Main aim of this research is to find out, output attribute "is Fraud", with better time complexity. To this end, K-means, Random Forest and J48 algorithm is used, and its accuracy rates are compared to find best fit pre-processing and machine learning algorithm. It is observed that accuracy rate of Random Forest is 93.8% when both global and local dataset is used.
https://ijnaa.semnan.ac.ir/article_5228_bffa45b11da19bafd8e8431ce1de1e05.pdf
2021-07-01
1255
1265
10.22075/ijnaa.2021.5228
Credit card transaction
Global dataset
User dataset
J48
K-means clustering
Random forest
Ensemble method
Evan
Al Rubaie
eng.evan.rubae@uobabylon.edu.iq
1
College of Engineering, University of Babylon, Babylon, Iraq.
LEAD_AUTHOR
ORIGINAL_ARTICLE
Viscous dissipation and thermal radiation effects on the flow of Maxwell nanofluid over a stretching surface
An analysis is made to examine the viscous dissipation and thermal effects on magneto hydrodynamic mixed convection stagnation point flow of Maxwell nanofluid passing over a stretching surface. The governing partial differential equations are transformed into a system of ordinary differential equations by utilizing similarity transformations. An effective shooting technique of Newton is utilize to solve the obtained ordinary differential equations. Furthermore, we compared our results with the existing results for especial cases. which are in an excellent agreement. The effects of sundry parameters on the velocity, temperature and concentration distributions are examined and presented in the graphical form. These non-dimensional parameters are the velocity ratio parameter $(A)$, Biot number $(Bi$), Lewis number $(Le)$, magnetic parameter $(M)$, heat generation/absorption coefficients $\left(A^*,B^*\right)$, visco-elastic parameters $\left(\beta\right)$, Prandtl number $(Pr)$, Brownian motion parameter $(Nb)$, Eckert number $\left(Ec\right)$, Radiation parameter $\left(R\right)$ and local Grashof number $(Gc;\ Gr).$
An analysis is made to examine the viscous dissipation and thermal effects on magneto hydrodynamic mixed convection stagnation point flow of Maxwell nanofluid passing over a stretching surface. The governing partial differential equations are transformed into a system of ordinary differential equations by utilizing similarity transformations. An effective shooting technique of Newton is utilize to solve the obtained ordinary differential equations. Furthermore, we compared our results with the existing results for especial cases. which are in an excellent agreement. The effects of sundry parameters on the velocity, temperature and concentration distributions are examined and presented in the graphical form. These non-dimensional parameters are the velocity ratio parameter $(A)$, Biot number $(Bi$), Lewis number $(Le)$, magnetic parameter $(M)$, heat generation/absorption coefficients $\left(A^*,B^*\right)$, visco-elastic parameters $\left(\beta\right)$, Prandtl number $(Pr)$, Brownian motion parameter $(Nb)$, Eckert number $\left(Ec\right)$, Radiation parameter $\left(R\right)$ and local Grashof number $(Gc;\ Gr).$
https://ijnaa.semnan.ac.ir/article_5229_6f5b3e7698473398ec0ff1d986109d53.pdf
2021-07-01
1267
1287
10.22075/ijnaa.2020.18958.2045
Maxwell Nanofluid
viscous dissipation
Prandtl number
Velocity ratio parameter
Adam’s – Moultan Method
G
Narender
gnriimc@gmail.com
1
Department of Humanities and Sciences(Mathematics), CVR College of Engineering, Hyderabad, Telangana State, India
LEAD_AUTHOR
K
Govardhan
govardhan_kmtm@yahoo.co.in
2
Department of Mathematics, GITAM University, Hyderabad, Telangana State, India
AUTHOR
G
Sreedhar Sarma
sarma.sreedhar@gmail.com
3
Department of Humanities and Sciences(Mathematics), CVR College of Engineering, Hyderabad,Telangana State, India.
AUTHOR
ORIGINAL_ARTICLE
New common best proximity point theorems in complete metric space with weak $P$-property
In this paper, we define $\phi$-contraction, after that; we obtained the common best proximity point results for different types of contractions in the setting of complete metric spaces by using weak p-property and proved the uniqueness of these points. Also, we presented an example to support our results.
https://ijnaa.semnan.ac.ir/article_5230_6baced3c31a84743dae9791f04dbe023.pdf
2021-07-30
1289
1297
10.22075/ijnaa.2019.18535.2020
common best proximity point
weak $P$-property
$phi$-contraction
Ali
Ganjbakhsh Sanatee
a.ganjbakhsh@qiet.ac.ir
1
Department of Mathematics, Quchan University of Technology, Quchan, Iran
LEAD_AUTHOR
Mahdi
Iranmanesh
m.iranmanesh2012@gmail.com
2
Department of pure Mathematics, Shahrood University of Tehnology, Shahrood, Iran
AUTHOR
ORIGINAL_ARTICLE
Fixed point theorems of non-commuting mappings in b-multiplicative metric spaces
In this paper, we discuss some common fixed point theorems for compatible mappings of type $(E)$ and $R-$weakly commuting mappings of type $(P)$ of a complete $b-$multiplicative metric space along with some examples. As an application, we establish an existence and uniqueness theorem for a solution of a system of multiplicative integral equations. In the last section, we introduce the concept of $R-$multiplicative metric space by giving some examples and at the end of the section, we give an open question.
https://ijnaa.semnan.ac.ir/article_5231_a3dd3bc906cd49809b1c3367fb9597d0.pdf
2021-07-01
1299
1315
10.22075/ijnaa.2021.22582.2388
compatible mappings of type (E)
R-weakly commuting mappings of type (P)
multiplicative metric space
b-multiplicative metric space
common fixed points
compatible mapping
R-multiplicative metric space
orthogonal set
Maibam
Singh
mranjitmu@rediffmail.com
1
Department of Mathematics, Manipur, 795003, Manipur University, Canchipur Imphal, India
AUTHOR
Thangjam
Singh
btsalun29@gmail.com
2
MU, Department of Mathematics, Manipur, 795003 Manipur University, Canchipur, Manipur, India.
LEAD_AUTHOR
Yumnam
Singh
ymahenmit@rediffmail.com
3
Department of Humanities and Basic Sciences, Manipur Institute of Technology, Takyelpat-795004, Manipur, India
AUTHOR
ORIGINAL_ARTICLE
Best proximity point theorems by $K$, $C$ and $\mathcal{MT}$ types in $b$-metric spaces with an application
In this paper, we introduce the concept of weak $\mathcal{MT}-K$ rational cyclic and weak $\mathcal{MT}-C$ rational cyclic conditions and a combination of both conditions in what we call weak $\mathcal{MT}-KC$ rational cyclic condition. We investigate some best proximity points theorems for a pair of mappings that satisfy these conditions that have been established in $b$-metric spaces. Our results include an application to the nonlinear integral equation as well.
https://ijnaa.semnan.ac.ir/article_5232_3603e8af3de50848cc8dfaa6b41dfc00.pdf
2021-07-01
1317
1329
10.22075/ijnaa.2021.19156.2060
$b$-metric space
$mathcal{MT}$-function
Rational cyclic condition
Cyclic map
best proximity point
Setareh
Ghezellou
sghezelloo@yahoo.com
1
Department of Mathematics, Science and Research Branch, Islamic Azad University, Tehran, Iran
AUTHOR
Mahdi
Azhini
m.azhini@srbiau.ac.ir
2
Department of Mathematics, Science and Research Branch, Islamic Azad University, Tehran, Iran.
AUTHOR
Mehdi
Asadi
masadi.azu@gmail.com
3
Department of Mathematics, Zanjan Branch, Islamic Azad University, Zanjan, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
Dynamic investment portfolio optimization using a multivariate Merton model with correlated jump risk
In this paper, we are concerned with the optimization of a dynamic investment portfolio when the securities which follow a multivariate Merton model with dependent jumps are periodically invested and proceed by approximating the Condition-Value-at-Risk (CVaR) by comonotonic bounds and maximize the expected terminal wealth. Numerical studies, as well as applications of our results to real datasets, are also provided.
https://ijnaa.semnan.ac.ir/article_5233_7bbfb56f7ce5b0efeb6c77a4a20788ce.pdf
2021-07-01
1331
1341
10.22075/ijnaa.2021.23421.2538
Risk analysis
Conditional tail expectation
Merton Model
Geometric Brownian motion
Comonotonicity
Bahareh
Afhami
baharehafhami@math.uk.ac.ir
1
Department of Statistics, Faculty of Mathematics and Computer, Shahid Bahonar University of Kerman, Kerman, Iran
AUTHOR
Mohsen
Rezapour
mohsen.r.toughari@uth.tmc.edu
2
Department of Biostatistics \& Data Science, School of Public Health, The University of Texas Health Science Center at Houston (UTHealth), Houston, Texas
AUTHOR
Mohsen
Madadi
madadi@uk.ac.ir
3
Department of Statistics, Faculty of Mathematics and Computer, Shahid Bahonar University of Kerman, Kerman, Iran
LEAD_AUTHOR
Vahed
Maroufy
vahed.maroufy@uth.tmc.edu
4
Department of Biostatistics \& Data Science, School of Public Health, The University of Texas Health Science Center at Houston (UTHealth), Houston, Texas
AUTHOR
ORIGINAL_ARTICLE
Some properties of generalized fundamentally nonexpansive mappings in Banach spaces
In this paper, we introduce a condition on mappings and show that the class of these mappings is broader than both the class of mappings satisfying condition (C) and the class of fundamentally nonexpansive mappings, and it is incomparable with the class of quasi-nonexpansive mappings and the class of mappings satisfying condition (L). Furthermore, we present some convergence theorems and fixed point theorems for mappings satisfying the condition in the setting of Banach spaces. Finally, an example is given to support the usefulness of our results.
https://ijnaa.semnan.ac.ir/article_5234_17ca963885da30c3c26f4ecc5776450e.pdf
2021-07-01
1343
1352
10.22075/ijnaa.2020.19290.2070
fixed point
fundamentally nonexpansive mappings
generalized nonexpansive mappings
Opial's condition
Quasi-nonexpansive mappings
uniformly convex in every direction Banach spaces
weakly compact
Mohammad
Moosaei
moosaeimohammad@gmail.com
1
Department of Mathematics, Faculty of Basic Sciences, Bu-Ali Sina University, Hamedan, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
A secure ECG signal transmission for heart disease diagnosis
Due to the high sampling rate, the recorded Electrocardiograms (ECG) data are huge. For storing and transmitting ECG data, wide spaces and more bandwidth are therefore needed. The ECG data are also very important to preprocessing and compress so that it is distributed and processed with less bandwidth and less space effectively. This manuscript is aimed at creating an effective ECG compression method. The reported ECG data are processed first in the pre-processing unit (ProUnit) in this method. In this unit, ECG data have been standardized and segmented. The resulting ECG data would then be sent to the Compression Unit (CompUnit). The unit consists of an algorithm for lossy compression (LosyComp), with a lossless algorithm for compression (LossComp). The randomness ECG data is transformed into high randomness data by the failure compression algorithm. The data's high redundancy is then used with the LosyComp algorithm to reach a high compression ratio (CR) with no degradation. The LossComp algorithms recommended in this manuscript are the Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). LossComp algorithms such as Arithmetic Encoding (Arithm) and Run Length Encoding (RLE) are also suggested. To evaluate the proposed method, we measure the Compression Time (CompTime), and Reconstruction Time (RecTime) (T), RMSE and CR. Simulation results suggest the highest output in compression ratio and in complexity by adding RLE after the DCT algorithm. The simulation findings indicate that the inclusion of RLE following the DCT algorithm increases performance in terms of CR and complexity. With CR = 55% with RMSE = 0:14 and above 94% with RMSE = 0:2, DCT as a LossComp algorithm was utilized initially, followed by RLE as a LossComp algorithm.
https://ijnaa.semnan.ac.ir/article_5235_25f8997851bde771ff02f02c324322f4.pdf
2021-07-01
1353
1370
10.22075/ijnaa.2021.5235
ECG (Electrocardiogram)
Compression ratio (CR)
Signal quality
Azmi
Abdulbaqi
msc@uoanbar.edu.iq
1
College of Computer Science & Information Technology, University of Anbar, Iraq
LEAD_AUTHOR
Abbas
Abdulhameed
abbasabdulazeez@uomustansiriyah.edu.iq
2
Department of Computer Science, College of Science, AL Mustansiriyah University, Iraq.
AUTHOR
Ahmed
Obaid
ahmedj.aljanaby@uokufa.edu.iq
3
Faculty of Computer Science and Mathematics, University of Kufa, Iraq.
AUTHOR
ORIGINAL_ARTICLE
Modelling US-China relationship: A game theory perspective
Relation between China and the US is one of the most complex relations among the major powers in the world. The aim of this paper is to model China and the US economic relations. We used the new system named Dynamic system of strategic games for this purpose.
https://ijnaa.semnan.ac.ir/article_5237_a4f377598b12f45b073546b389168ca5.pdf
2021-07-01
1371
1382
10.22075/ijnaa.2021.5237
International relations
game theory
Dynamic system of strategic games
Nash equilibrium
Nader
Asghari
n.asghari@semnan.ac.ir
1
Department of Mathematics, Semnan University, P.O. Box 35195-363, Semnan, Iran
AUTHOR
Madjid
Eshaghi
meshaghi@semnan.ac.ir
2
Department of Mathematics, Semnan University, P.O. Box 35195-363, Semnan, Iran
LEAD_AUTHOR
Ali
Ghaffari
aghaffari@semnan.ac.ir
3
Department of Mathematics, Semnan University, P.O. Box 35195-363, Semnan, Iran
AUTHOR
ORIGINAL_ARTICLE
Analysing the impact of the parametric model correction of premium rate on financing social security's long-term commitments using actuarial knowledge
This survey involves the examination of the rate change that is the right to have insurance is one three parametric models (premium rate, experience and age of retirement in financing social security organization by using actuary knowledge and computational software such as ILO-PENS. The statistical population of this survey is the social security organization of the Islamic Republic of Iran. The population and community, are variables because they are huge, there is not statistical sample. And to achieve the hypothesis goal which is based on the total number of the insured persons, pensioners and the source of income of the organization from 2013 – 2019as well as estimating the number of resources available in order to fulfil long term commitment it is actuarial calculations in long term period for commitment payment in long term. In this study the effect of change in rate, insurance right is 1%-5% and the effect is considered over 70 years’ time, on the sustainability resource of the organization and it is measured and examined. In addition, considering the limitation and risk taken from these implements of the parameter are described below and according to the results obtained in case of application, the point of balance was postponed until 1413, and during this time, the necessary resources for paying the commitment is provided. The short gap is an opportunity for the social security organization, to have enough time for long term planning which is a structured reform.
https://ijnaa.semnan.ac.ir/article_5238_26029669cc0c359c6d8cd2f528cf58db.pdf
2021-07-01
1383
1397
10.22075/ijnaa.2021.23696.2584
Parametric reform
Financing
Long term commitment
Actuary
Social security organization
Hadi
Farhadi
h_farhadi_1975@yahoo.com
1
Ph.D. Student in Accounting, Department of Accounting, Kermanshah Branch, Islamic Azad
AUTHOR
Babak
Jamshidinavid
jamshidinavid@iauksh.ac.ir
2
Department of Accounting, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran.
LEAD_AUTHOR
Mehrdad
Ghanbari
mehrdadghanbary@yahoo.com
3
Department of Accounting, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran
AUTHOR
Rohollah
Jamshid Pour
r.jamshidpour@gmail.com
4
Department of Accounting, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran
AUTHOR
ORIGINAL_ARTICLE
Variable coefficient fractional partial differential equations by Base--Chebyshev method
In this paper, the invariant subspace method is generalized and improved and is then used together with the Chebyshev polynomial to approximate the solution of the non-linear, mixed fractional partial differential equations $FPDEs$ with constant, non-constant coefficients. Some examples are given here to illustrate the efficiency of this method.
https://ijnaa.semnan.ac.ir/article_5239_6a3bd4c33e4969f69123fdf798932021.pdf
2021-07-01
1399
1411
10.22075/ijnaa.2021.5239
fractional partial differential equation
Caputo fractional derivative
invariant subspace method
Chebyshev polynomial approximate
Hasan
Shather
hasanshather1968@gmail.com
1
Department of Mathematics, Ministry of Education, Thi-Qar, Iraq
AUTHOR
ORIGINAL_ARTICLE
Nonlinear fractional differential equations with advanced arguments
In this paper, we develop the existence and uniqueness theory of fractional differential equation involving Riemann-Liouville differential operator of order $0 < \alpha< 1$, with advanced argument and integral boundary conditions. We investigate the uniqueness of the solution by using Banach fixed point theorem, we apply the comparison result to obtain the existence and uniqueness of solution by monotone iterative technique also by using weakly coupled extremal solution for the nonlinear boundary value problem (BVP). As an application of this technique, existence and uniqueness results are obtained.
https://ijnaa.semnan.ac.ir/article_5240_53c3b4854cf658a2ebdc8d3e655e9df3.pdf
2021-07-01
1413
1423
10.22075/ijnaa.2020.13473.1697
Fractional di¤erential equations with advanced argument
Riemann-Liouville fractional derivatives
existence and uniqueness
monotone iterative technique
lower and upper solution
integral boundary condition
Bakr
Rizqan
bakeralhaaiti@yahoo.com
1
Department of Mathematics, Faculty of Education, Applied Sciences and Arts, Amran University, Amran, Yemen
LEAD_AUTHOR
Dnyanoba
Dhaigude
dnyanrajaa@gmail.com
2
Department of Mathematics, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad - 431004, India
AUTHOR
ORIGINAL_ARTICLE
Fixed points of a new class of compatible mappings satisfying an implicit relation via inverse $C$-lass function
In this paper, we establish some common fixed point theorems of a new class of compatible mappings satisfying an implicit relation via inverse $C$-class function.
https://ijnaa.semnan.ac.ir/article_5258_fc6a3eb26c1da65be901db9aa1cba9eb.pdf
2021-07-01
1425
1440
10.22075/ijnaa.2020.20948.2216
$mathcal{S}_{mathcal{T}}$-compatible mappings
weakly compatible
implicit relation
inverse $C$-class function
Fixed point
Yumnam
Singh
ymahenmit@rediffmail.com
1
Department of Humanities and Basic Sciences, Manipur Institute of Technology, A Constituent College of Manipur University, Takyelpat-795004, Manipur, India
LEAD_AUTHOR
Mukesh
Jain
mukesh.jain2007@rediffmail.com
2
Department of Basic Sciences and Humanities, Manipur Institute of Technology, A constituent college of Manipur University, Takelpat 795004, Manipur, India
AUTHOR
ORIGINAL_ARTICLE
Function weighted $\mathcal{G}$-metric spaces and Hausdorff $\Delta$-distances; an application to fixed point theory
In this paper, we introduce a new space which is a generalization of function weighted metric space introduced by Jleli and Samet [On a new generalization of metric spaces, J. Fixed Point Theory Appl. 2018, 20:128] where namely function weighted $\mathcal{G}$-metric space. Also, a Hausdorff $\Delta$-distance is introduced in these spaces. Then several fixed point results for both single-valued and multi-valued mappings in such spaces are proved. We also construct some examples for the validity of the given results and present an application to the existence of a solution of the Volterra-type integral equation.
https://ijnaa.semnan.ac.ir/article_5259_af59e02af75d032b4ed517ef2ab8cd74.pdf
2021-07-01
1441
1452
10.22075/ijnaa.2020.20547.2167
Function weighted $mathcal{G}$-metric space
Hausdorff $Delta$-distance
coupled coincidence point
Common coupled fixed point
Ehsan
Lotfali Ghasab
e-lotfali@stu.scu.ac.ir
1
Department of Mathematics, Shahid Chamran University of Ahvaz, Ahvaz, Iran
AUTHOR
Hamid
Majani
majani.hamid@gmail.com
2
Department of Mathematics, Shahid Chamran University of Ahvaz, Ahvaz, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
Training analysis of optimization models in machine learning
Machine learning is fast evolving, with numerous theoretical advances and applications in a variety of domains. In reality, most machine learning algorithms are based on optimization issues. This interaction is also explored in the special topic on machine learning and large-scale optimization. Furthermore, machine learning optimization issues have several unique characteristics that are rarely seen in other optimization contexts. Aside from that, the notions of classical optimization vs machine learning will be discussed. Finally, this study will give an outline of these particular aspects of machine learning optimization.
https://ijnaa.semnan.ac.ir/article_5261_8c00502b39780d60cc968c4d8ac29bdf.pdf
2021-07-01
1453
1461
10.22075/ijnaa.2021.5261
machine learning
mathematical programming
optimization techniques
Ahmed
Alridha
amqa92@yahoo.com
1
Department of Mathematics Science, Ministry of Education, Babylon, Iraq
LEAD_AUTHOR
Fadhil
Wahbi
fadhilf40@gmail.com
2
Department of Mathematics Science, Ministry of Education, Babylon, Iraq
AUTHOR
Mazin
Kadhim
mazen.marjan22@gmail.com
3
Department of Mathematics Science, Ministry of Education, Babylon, Iraq
AUTHOR
ORIGINAL_ARTICLE
Explaining the role of financial leverage speed of adjustment (SOA) during the firm life cycle
This paper analyzes differences in speed of adjustment (SOA) across three life cycle stages of European listed firms: introduction, growth, maturity, decline, and fall. Dickenson's model based on cash flow has been used to divide different periods. For this purpose, the role of four determinants of profitability and intangible assets, growth opportunities, and size on SOA was investigated using the GMM (generalized torque) method. For this purpose, 153 firms listed firms on the Tehran Stock Exchange in the ten years 2009-2019 were selected, and data were analyzed by Stata and Eviews software. The results do not support by trade-off theory (TOT) and pecking order theory (POT) because according to these theories, the SOA of financial leverage is not completed during different stages of the life cycle. Higher speed in the introduction stage provides a different analysis than the growth stage. In addition, results show a lower increase in costs for firms that change from growth to maturity than for firms that change from introduction to growth.
https://ijnaa.semnan.ac.ir/article_5266_ebac60e4c4e9cb4bea8a6d7383c0b4be.pdf
2021-07-01
1463
1475
10.22075/ijnaa.2021.23393.2528
Capital structure
Target leverage
Firm’s life cycle
Speed of adjustment, GMM method
Hamed
Salehi Saber
hsalehisaber@gmail.com
1
Department of Economics and Accounting, Central Tehran Branch, Islamic Azad University, Tehran, Iran
AUTHOR
Yadolah
Tariverdi
yad.tariverdi@iauctb.ac.ir
2
Department of Economics and Accounting, Central Tehran Branch, Islamic Azad University, Tehran, Iran
LEAD_AUTHOR
Afsaneh
Tavangar
a_tavangar@iauctb.ac.ir
3
Department of Economics and Accounting, Central Tehran Branch, Islamic Azad University, Tehran, Iran
AUTHOR
Amir Reza
Keyghobadi
a.keyghobadi@iauctb.ac.ir
4
Department of Economics and Accounting, Central Tehran Branch, Islamic Azad University, Tehran, Iran
AUTHOR
ORIGINAL_ARTICLE
On the complex SEE change and systems of ordinary differential equations
In this paper, we present the properties and meaning of the new indispensable change, called complex SEE the change. Farther, we use the complex SEE integral change to solve systems of ordinary differential equations (ODEs).
https://ijnaa.semnan.ac.ir/article_5267_d199dfdaee15130add7020774e134f5c.pdf
2021-07-01
1477
1483
10.22075/ijnaa.2021.5267
Complex SEE change
arrangement of differential conditions
Eman
Mansour
iman.am-73@uomustansiriyah.edu.iq
1
Department of Mathematics, Mustansiriyah University, Baghdad, Iraq
AUTHOR
Sadiq
Mehdi
sadiqmehdi71@uomustansiriyah.edu.iq
2
Department of Mathematics, Mustansiriyah University, Baghdad, Iraq
LEAD_AUTHOR
Emad A.
Kuffi
emad.abbas@qu.edu.iq
3
College of Engineering, Al-Qadisiyah University, Al-Qadisiyah, Iraq
AUTHOR
ORIGINAL_ARTICLE
Weak subsequential continuity in fuzzy metric spaces and application
Compatibility of type (E) and weak subsequential continuity is utilized in a fuzzy metric space for the existence of a common fixed point. Illustrations and an application are stated to elucidate our outcomes.
https://ijnaa.semnan.ac.ir/article_5276_fad77bc4afdbe7369aed39b9dce12cbf.pdf
2021-07-01
1485
1496
10.22075/ijnaa.2020.20449.2153
Compatibility of type (E)
Fuzzy metric space
dynamic programming functional equation
weak subsequential continuity
Said
Beloul
beloulsaid@gmail.com
1
Operators theory and PDE Laboratory, Department of Mathematics, Faculty of Exact Sciences, University of El Oued, P.O.Box789, El-Oued 39000, Algeria
LEAD_AUTHOR
Anita
Tomar
anitatmr@yahoo.com
2
Department of Mathematics, Government Degree College Thatyur, Tehri Garhwal, Uttarakhand, India
AUTHOR
Sharma
Ritu
ritus4184@gmail.com
3
Department of Mathematics, V. S. K. C. Government P. G. College Dakpathar, Dehradun (Uttrakhand), India
AUTHOR
ORIGINAL_ARTICLE
Improving air pollution detection accuracy and status monitoring based on supervised learning systems and Internet of Things
In recent decades air pollution and its associated health risks are in growing numbers. Detecting air pollution in the environment and alarming the people may accomplish various advantages among health monitoring, telemedicine, and industrial sectors. A novel method of detecting air pollution using supervised learning models and an alert system using IoT is proposed. The main aim of the research is manifold: a) Air pollution data is preprocessed using the feature scaling method, b) The feature selection and feature extraction process done followed by performing a Recurrent Neural Network and c) The predicted data is stored in the cloud server, and it provides the end-users with an alert when the threshold pollution index exceeds. The proposed RNN reports enhanced performance when tested against traditional machine learning models such as Convolutional Neural Networks (CNN), Deep Neural Networks(DNN), and Artificial Neural Networks(ANN) for parameters such as accuracy, specificity, and sensitivity.
https://ijnaa.semnan.ac.ir/article_5278_ff5d86dcb5b2824eb8ceb8074e7111ba.pdf
2021-07-01
1497
1511
10.22075/ijnaa.2021.5278
Internet of Things
Convolutional Neural Networks (CNN)
Deep Neural Networks (DNN)
and Artificial Neural Networks (ANN)
Recurrent Neural Network
D
Saravanan
saranmds@gmail.com
1
Department of CSE, IFET College of Engineering, Villupuram, India.
LEAD_AUTHOR
K
Kumar
santhosh09539@gmail.com
2
Department of IT, Annamalai University, Chidambaram, India.
AUTHOR
ORIGINAL_ARTICLE
A Novel deep learning framework for improving the quality of services using block chain technology
Electronic Health Record (EHR) holds immensely sensitive information and consisting of crucial data related to the patients. Storing and organizing such data is highly arduous task. Researches still going on to improve the Quality of Service (QOS) of such data. Existing study focused only on improving the system throughput, privacy and latency issues. But they did not tend to scrutinize the scalability and privacy of such data records. In this paper, we propose a novel deep learning framework to improve the Quality of Service using block chain technology. Initially the data is classified into high priority and low priority based on its nature by using Recurrent Neural Network (RNN). Then, the classified high priority data is further allowed to each block of a block chain and the low priority data is stored and maintained as log file. Finally, the results are compared based on the evaluation metrics which demonstrates our proposed novel deep learning framework achieves better accuracy.
https://ijnaa.semnan.ac.ir/article_5280_94362947f7fef16b78fd9dab7cf54ead.pdf
2021-07-01
1513
1529
10.22075/ijnaa.2021.5280
Electronic Health Record (EHR)
Quality of Service (QoS)
Recurrent Neural Network (RNN)
Block chain
P
Parthiban
saranmds@gmail.com
1
Department of CSE, IFET Colleg of Engineering, Villupuram, India.
LEAD_AUTHOR
K
Kumar
santhosh09539@gmail.com
2
Department of IT, Annamalai University, Chidambaram, India.
AUTHOR
ORIGINAL_ARTICLE
Using alignment-free methods as preprocessing stage to classification whole genomes
In bioinformatics systems, the study of genetics is a popular research discipline. These systems depend on the amount of similarity between the biological data. These data are based on DNA sequences or raw sequencing reads. In the preprocessing stage, there are several methods for measuring similarity between sequences. The most popular of these methods is the alignment method and alignment-free method, which are applied to determine the amount of functional matching between sequences of nucleotides DNA, ribosome RNA, or proteins. Alignment-based methods pose a great challenge in terms of computational complexity, In addition to delaying the time to search for a match, especially if the data is heterogeneous and its size is huge, and thus the classification accuracy decreases in the post-processing stage. Alignment-free methods have overcome the challenges of alignment-based methods for measuring the distance between sequences, The size of the data used is 1000 genomes uploaded from National Center for Biotechnology Information (NCBI), after eliminating the missing and irrelevant values, it becomes 860 genomes, ready to be segmented into words by the k-mer analysis, after which the frequency of each word is counted for each query. The size of a word depends on a value of k. In this paper we used a value of k =3 ….8, for each iteration will count times of frequencies words.
https://ijnaa.semnan.ac.ir/article_5281_0788537081041f3c9a951c2e8d8c2628.pdf
2021-07-01
1531
1539
10.22075/ijnaa.2021.5281
16S RNA
DNA
k-mers
Najah Abed
Shanan
najahhadi78@gmail.com
1
Computer Department, Science College for Women, University of Babylon, Babylon, Iraq
LEAD_AUTHOR
Hussein
Lafta
hzazmk@yahoo.com
2
Computer Department, Science College for Women, University of Babylon, Babylon, Iraq
AUTHOR
Sura
Alrashid
sura_os@itnet.uobabylon.edu.iq
3
College of Information Technology, University of Babylon, Babylon, Iraq
AUTHOR
ORIGINAL_ARTICLE
Origin-destination trip pattern representative by using bluetooth data collection on the arterial road network, Bangkok, Thailand
In this paper, an efficient GV1-CG is developed to optimizing the modified conjugate gradient algorithm by using a new conjugate property. This is to increase the speed of the convergence and retain the characteristic mass convergence using the conjugate property. This used property is proposed to public functions as it is not necessary to be a quadratic and convex function. The descent sharp property and comprehensive convergence for the proposed improved algorithm have been proved. Numerical results on some test function indicate that the new CG-method outperforms many of the similar methods in this field.
https://ijnaa.semnan.ac.ir/article_5282_6fa00504a11216db67300d5c356c1b66.pdf
2021-07-01
1541
1562
10.22075/ijnaa.2021.5282
Conjugate gradient
Developed conjugation property
Improved algorithm
Optimization
Global convergence
Descent Direction
Rattanaporn
Kasemsri
rattanaporn7777@gmail.com
1
aSchool of Civil Engineering, Institute of Engineering, Suranaree University of Technology, Nakhon Ratchasima, 30000, Thailand.
LEAD_AUTHOR
Tetsuhiro
Ishizaka
ishizaka.tetsuhiro@nihon-u.ac.jp
2
bCollege of Science and Technology, NihonUniversity, Chiba, 274-8501, Japan.
AUTHOR
Piyapong
Suwanno
piyapong.su@rmutsv.ac.th
3
College of Industrial Technology and Management, Rajamangala University of Technology Srivijaya, Nakhon Si Thammarat 80210, Thailand.
AUTHOR
ORIGINAL_ARTICLE
Resilience in semantic networks: A new approach for studying language impairment in Alzheimer's disease
Language Impairment in Alzheimer's disease can occur because of deficits in semantic levels of language processing. It can be studied using computational models of language such as complex semantic networks which are strongly related to semantic memory. We hypothesize that the concept of resilience in scale-free semantic networks can truly model and predict semantic language deficit in Alzheimer's disease. We suggest that increasing the variety of words in the lexicon of patients with Alzheimer's disease, improves the resilience of their semantic networks through breakdowns. Moreover, enlarging the size of the semantic networks of patients with Alzheimer's disease can make these networks more resilient.
https://ijnaa.semnan.ac.ir/article_5284_d76bdbc0bbfd71031310ecbb154749b5.pdf
2021-07-01
1563
1566
10.22075/ijnaa.2021.22221.2339
Alzheimer's disease
Language Impairment
Semantic Networks
Resilience
SomayehSadat
HashemiKamangar
soshashemi@gmail.com
1
Institute for Cognitive and Brain Sciences, Shahid Beheshti University, Tehran, Iran
AUTHOR
Shahriar
Gharibzadeh
s_gharibzadeh@sbu.ac.ir
2
Institute for Cognitive and Brain Sciences, Shahid Beheshti University, Daneshjou Boulevard, District 1, Tehran, Iran
AUTHOR
Fatemeh
Bakouie
fatemeh.bakouie@gmail.com
3
Institute for Cognitive and Brain Sciences, Shahid Beheshti University, Tehran, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
An intellectual procurement innovation of smart grid power system with wireless communication networks based on machine learning
The phased array antenna is one of the most significant applications in fifth-generation mobile networks. It is one of the most important applications in fifth-generation networks. An electric power source that powers the whole application, including the antenna's root, is required. Even with the most outstanding design, if the programme does not have a sound power supply system with minimal packet loss and can't Path find performance, it will be rendered ineffective. When seen from the perspective of the multiplex information, Machine Learning comprises a communication network based on the Internet that transmits information to the control centre via the objects (IOT). To put it another way, the proposed communication infrastructure, via the provision of, and the chance micro-grid state to collect, analyze, and two-way communication link control information, offers the chance to resolve the voltage regulation issues. This cutting-edge communication infrastructure, as well as a suggested state estimation filter focused on improving speed and performance in renewable energy production, are both examples of creative communication infrastructure. Current research is focused on analyzing and enumerating a range of energy abundances in the context of smart grids, which are now in their fifth generation. Rather than concentrating on the future development plan, which should be a problem of illusion, it should concentrate on the composition of the future potential of smart grid communications framework. An in-depth investigation to give evidence to the Machine learning will help intelligent networks in the future conduct a thorough evaluation.
https://ijnaa.semnan.ac.ir/article_5285_eb0ba24df57ecca97391c4ab2bf9f7e3.pdf
2021-07-01
1567
1576
10.22075/ijnaa.2021.5285
Internet of Things (IoT)
machine learning
communication infrastructure provides
Smart grid power supply system
M
Sathya
msathya15@gmail.com
1
Department of CSE, Islamiah Institute of Technology, Bangalore, India.
LEAD_AUTHOR
K
Gunalan
gunalan@rmkcet.ac.in
2
Department of EEE, R. M. K College of Engineering and Technology, Chennai, India.
AUTHOR
Manohar
S
manoharbs@jssateb.ac.in
3
Department of ECE, JSS Academy of Technical Education, Bengaluru, India.
AUTHOR
T
Anil Kumar
mech@vignan.ac.in
4
Department of Mechanical Engineering, Vignan’s Foundation for Science Technology and Research, Andra Pradesh, India.
AUTHOR
Shaik
Shafi
shaikshafi245@gmail.com
5
Department of ECE, B V Raju Institute of Technology, Telangana, India.
AUTHOR
G
Johncy
johncy@sxcce.edu.in
6
Department of CSE, St.Xavier’s Catholic College of Engineering, Kanyakumari, India.
AUTHOR
ORIGINAL_ARTICLE
Walsh functions and their applications to solving nonlinear fractional Volterra integro-differential equation
In this article, we extended an efficient computational method based on Walsh operational matrix to find an approximate solution of nonlinear fractional order Volterra integro-differential equation, First, we present the fractional Walsh operational matrix of integration and differentiation. Then by applying this method, the nonlinear fractional Volterra integro-differential equation is reduced into a system of algebraic equation. The benefits of this method are the low-cost of setting up the equations without applying any projection method such as collocation, Galerkin, etc. The results show that the method is very accuracy and efficiency.
https://ijnaa.semnan.ac.ir/article_5286_cb74b28ee3138dd8b107a61f879d2ec9.pdf
2021-07-01
1577
1589
10.22075/ijnaa.2021.19846.2108
Walsh functions
Operational matrix. Block-pulse functions
Fractional calculus
Amirahmad
Khajehnasiri
a.khajehnasiri@gmail.com
1
Department of Mathematics, North Tehran Branch, Islamic Azad University, Tehran, Iran
AUTHOR
Reza
Ezzati
ezati@kiau.ac.ir
2
Department of Mathematics, Karaj Branch, Islamic Azad University, Karaj, Iran
LEAD_AUTHOR
Akbar
Jafari Shaerlar
jafari-shaerlar@yahoo.com
3
Department of Mathematics, Khalkhal Branch, Islamic Azad University, Khalkhal, Iran
AUTHOR
ORIGINAL_ARTICLE
Parametric regression analysis of bivariate the proportional hazards model with current status data
In this paper, we show the maximum sieved probability of each of the finite Dimensional parameters in a marginal Proportional Hazards risk model with bivariate current position data. We used the copula model to model the combined distribution of bivariate survival times. Simulation studies reveal that the proposed estimations for it have good finite sample properties.
https://ijnaa.semnan.ac.ir/article_5289_5c7172ecb78e2371aab7eaa4928926c0.pdf
2021-07-01
1591
1598
10.22075/ijnaa.2021.5289
Bivariate current status data
Efficient estimation
Hazards Model
Wisam
Ghafil
wisam.kamil@utq.edu.iq
1
Department of Mathematics, College of Education for Pure Sciences, University of Thi-Qar, Thi-Qar, Iraq
LEAD_AUTHOR
Rana
Shamkhi
rana413427@gmail.com
2
Department of Pharmacognosy and Medicinal Plant, College of Pharmacy, University of Basrah, Basrah, Iraq
AUTHOR
ORIGINAL_ARTICLE
Numerical solutions of Abel integral equations via Touchard and Laguerre polynomials
In this article, two numerical methods based on Touchard and Laguerre polynomials were presented to solve Abel integral (AI) equations. Touchard and Laguerre matrices were utilized to transform Abel integral equations into an algebraic system of linear equations. Solve this system of these equations to obtain Touchard and Laguerre parameters. Four examples are given to demonstrate the presented methods. The solutions were compared with the solutions in the literature.
https://ijnaa.semnan.ac.ir/article_5290_e1ad950860922992a9e8b9670acb417f.pdf
2021-07-01
1599
1609
10.22075/ijnaa.2021.5290
Abel integral equation
Numerical Solution
singular Volterra
Touchard polynomials
Laguerre polynomials
Jalil
Talab Abdullah
jabd@uowasit.edu.iq
1
College of Administration and Economics, Wasit University, Iraq
LEAD_AUTHOR
Bushra
Sweedan Naseer
bushrasewdan@gmail.com
2
Institute of Medical Technology, Al-Mansour, Middle Technical University, Iraq
AUTHOR
Balasim
Taha Abdllrazak
balasimth@gmail.com
3
College of Engineering, Al-Mustansiriya University, Iraq
AUTHOR
ORIGINAL_ARTICLE
The impact of diffusion of innovation model on user behavioral intention in adopting social media marketing
Social media has become a new orientation and attitude for businesses today. Tools and methods for communicating with the customers have changed enormously with the revelation of social media and it has become a channel and an instrument that marketers can extend their marketing campaigns to a wider range of consumers. The research purpose of this article is to analyze the impact of diffusion of innovation model on behavioral intention in adopting social media marketing with the moderator role of subjective norms in Iranian users. By making use of an online exploration, this study gathers data from 253 experienced social-media users in Iran. We have utilized partial least squares structural equation modeling to examine the links between items of diffusion of innovation model, social media marketing adoption, behavioral intention and subjective norms. The results revealed that diffusion of innovation influence was found as a nominative determinant of users’ behavioral intention to adopting social media marketing while behavioral intentions were also found to have positive significant association towards users’ behavioral intention to adopt social media marketing. In addition, the results of the empirical study showed that subjective norms moderated the relation between diffusion of innovation and customer behavioral intention.
https://ijnaa.semnan.ac.ir/article_5291_c3bd4334e48796783c72de31c496eca0.pdf
2021-07-01
1611
1632
10.22075/ijnaa.2021.5291
Behavioral intention
Adopting social media marketing
Diffusion of innovation model
Subjective norms
Sahar
Farajnezhad
saharfarajnezhad@yahoo.com
1
Faculty of Management, Economics and Accounting, Department of Management, Tabriz Branch, Islamic Azad University, Tabriz, Iran.
AUTHOR
Hossein
Bodaghi Khajeh Noubar
budaghi@yahoo.com
2
Faculty of Management, Economics and Accounting, Department of Management, Tabriz Branch, Islamic Azad University, Tabriz, Iran.
LEAD_AUTHOR
Sirus
Fakhimi Azar
fakhimiazar@iaut.ac.ir
3
Faculty of Management, Economics and Accounting, Department of Management, Tabriz Branch, Islamic Azad University, Tabriz, Iran.
AUTHOR
ORIGINAL_ARTICLE
Solution of Riccati matrix differential equation using new approach of variational iteration method
To obtain the approximate solution to Riccati matrix differential equations, a new variational iteration approach was proposed, which is suggested to improve the accuracy and increase the convergence rate of the approximate solutons to the exact solution. This technique was found to give very accurate results in a few number of iterations. In this paper, the modified approaches were derived to give modified solutions of proposed and used and the convergence analysis to the exact solution of the derived sequence of approximate solutions is also stated and proved. Two examples were also solved, which shows the reliability and applicability of the proposed approach.
https://ijnaa.semnan.ac.ir/article_5292_982d567403d2de0cc448d3df16e9ad18.pdf
2021-07-01
1633
1640
10.22075/ijnaa.2021.5292
Riccati matrix differential equation
Variational iteration method
Differential equation
He's method
Exact solution
Approximate solutions.
Fadhel
Fadhel
fsf@sc.nahrainuniv.edu.iq
1
Department of Mathematics and Computer Applications, College of Science, Al-Nahrain University, Iraq.
LEAD_AUTHOR
Huda
Altaie
dr.huda_hm2019@yahoo.com
2
Department of Mathematics, College of Education For Pure Scineces, Ibn Al-Haitham, University of Baghdad, Iraq.
AUTHOR
ORIGINAL_ARTICLE
Some applications of independent compatible edges topology
In this article some applications of independent compatible edges topology τICE on directed graphsare introduced. This application includes some aspects. Firstly, medical applications such as voluntary movement of the muscle, work of heart, and pathway involving with neural sensation and motorresponse. Secondly, vital applications such as world wide web and operational problems recovery inairlines.
https://ijnaa.semnan.ac.ir/article_5293_b8f6cf9bf13f8e5b6dab772d8c99790c.pdf
2021-07-01
1641
1652
10.22075/ijnaa.2021.5293
directed graph
Topology
Independent compatible edges topology
Applications
Asmhan
Hassan
asmhanf.alzuhairy@uokufa.edu.iq
1
Department of Mathematics, faculty of education for girls, University of Kufa, Iraq.
LEAD_AUTHOR
Zainab
Redha Ruzoqi Zainy
zainabzainy005@gmail.com
2
Department of Mathematics, faculty of education for girls, University of Kufa, Iraq.
AUTHOR
ORIGINAL_ARTICLE
Right Γ-n-derivations in prime Γ-near-rings
The main purpose of this paper is to study and investigate some results of right Γ-n-derivation on prime Γ-near-ring G which force G to be a commutative ring.
https://ijnaa.semnan.ac.ir/article_5294_e716db816b885e5be79fc58d10733dfe.pdf
2021-07-01
1653
1658
10.22075/ijnaa.2021.5294
Prime Γ –near-ring
Γ-n- derivation
Hiba
Ahmed
hiba.ahmed@sc.uobaghdad.edu.iq
1
University of Baghdad, Department of mathematics College of science , Iraq.
LEAD_AUTHOR
ORIGINAL_ARTICLE
A secure biomedical data sharing framework based on mCloud
Medical Clouds (mCloud) utilized various wearable devices and sensors for better care for patients by encouraging the perspective of the clouds. It gives a more versatile way to centrally and in real-time compare the patients’ profiles in the conventional health-offline system. However, due to the lack of appropriate security measures in low-power computers, there are obstacles to data protection. The limitation made the data vulnerable to hacking and tamper when it transfers from one device to another. In available solutions, the devices send unencrypted data to a central server where it encrypts and forwards, on-demand, to requesting devices. There are two primary challenges in the approach: first, the data link is still vulnerable between the source device and central server; second, the response time of the server gets slower with an increasing number of devices. This manuscript proposes a secure and faster-distributed method, which shares a patient’s data by various devices connected to the mCloud with health caregivers without the need for the centralized server. The research harnesses the power of other locally available mCloud and related devices that have more computational capability. Our experimental results demonstrate that with the number increasing of mCloud devices on the network, the percentage of encrypted data transmissions also increase since there are more chances to find a nearby secure device. Results further shows a decrease in the total response time from 0.6ms to 0.4ms utilizing the proposed distributed vs centralized system.
https://ijnaa.semnan.ac.ir/article_5295_1bb518c2286923a132187cc2fde83438.pdf
2021-07-01
1659
1671
10.22075/ijnaa.2021.5295
mCloud (Medical Cloud)
Health caregiver
Biomedical Data Transmission
Data Encryption
Akeel
Mahmoud
akeelab2000@uoanbar.edu.iq
1
Computer Center, University Of Anbar, Iraq.
LEAD_AUTHOR
Nisreen
Mahmood
eng.nmsw@uoanbar.edu.iq
2
Computer Center, University Of Anbar, Iraq.
AUTHOR
ORIGINAL_ARTICLE
Study the effect of Islamic derivatives during financial crises of 2008 using Translog function, a case study of Iraq
This research uses a statistical method to assess the efficiency and performance of Islamic and conventional banks. The Iraqi banks have been chosen as a case study in the period from 2006 to 2011. The data collected from, banks' financial reports, IMF database, the cost function and Seemingly Unrelated Regression were used to analyse the Iraqi bank's elasticity of substitution between inputs. It has been shown that the conventional banks in Iraq have better substitution than Islamic banks. In conclusion, the Islamic and conventional banks are exposed to a similar degree of risks, but different in nature; and the Islamic banks have less security than conventional banks to financial shocks. Since the Islamic banks cannot charge a fixed, predetermined return, and can't borrow from the financial market, so the Islamic banks could face more risk and volatile returns on their assets. The implication of that an excessive management modernization of Islamic banks is necessary to achieve a higher level of efficiency. This will give privilege for Islamic banks over the conventional bank. For conventional banks, they have to invent similar techniques to reduce cost and keep their position in the market.
https://ijnaa.semnan.ac.ir/article_5297_0b094c0b3cded45ddc76b114f01c5eaa.pdf
2021-07-01
1673
1686
10.22075/ijnaa.2021.5297
Islamic banks
conventional banks
Efficiency
performance
Trans log function seemingly unrelated regression
Hanan
Abdaljabar Assad Al-Ukaily
ass.lhananabdjabar@tu.edu.iq
1
Department of Mathematics, Tikrit University, College of Education for Pure Science, Iraq.
LEAD_AUTHOR
Reem
Adbulqadeer
reemalhwez84@tu.edu.iq
2
Tikrit University, Iraq.
AUTHOR
Hairan
Faris
hairanibrahim61@gmail.com
3
Ministry in Education, Salah Al-deen’s Eduction, Tikrit, Iraq.
AUTHOR
ORIGINAL_ARTICLE
Mixed fractional partial differential equations by the base method
In this paper, the invariant subspace method is generalized and improved and is then used to have an exact solution for a wide class of the linear/ non-linear mixed fractional partial differential equations $(FPDEs)$; with constant, non-constant coefficients. Some examples are given here to illustrate the efficiency of this method.
https://ijnaa.semnan.ac.ir/article_5309_0c98bdee450799b0f5d8ba16898e8277.pdf
2021-07-01
1687
1697
10.22075/ijnaa.2021.5309
Caputo fractional derivative
Mittag-Leffler function
Laplace transform
invariant subspace method
fractional partial differential equations
Ali
Mohammed
ali.alzaidi2000@utq.edu.iq
1
Department of Mathematics, Ministry of Education, Thi-Qar, Iraq
LEAD_AUTHOR
Hasan
Shather
hasanshather1968@gmail.com
2
Department of Mathematics, Ministry of Education, Thi-Qar, Iraq
AUTHOR
ORIGINAL_ARTICLE
Supply chain with fuzzy analytic hierarchy process (AHP): A case study
To achieve real competition in the global market requires the manufacturers to have the ability to meet the needs and demands of their customers, which comes from the optimal planning of the supply chain. In this paper, consideration is given to the supply chain with multi-providers of raw materials, multi-manufacturing locations, multi- centres of selling products to customers in multiple, with instability (fuzzy) of customer demands, holding costs, costs of appointment, retire and training of workforce After building a mathematical model for the supply chain that aims to maximize the net profit and reduce all costs that include production costs, labour, raw materials, storage, transportation, and the cost shortage, the model was improved through a proposal that the decision-maker has a desire to prefer one manufacturing location over another, as the proposal relied on developing a pairwise comparison in the Analytic Hierarchy Process (AHP) when the degree of comparison between factory locations is a fuzzy nature. The results of the proposed model were applied to actual data taken from an industrial organization.
https://ijnaa.semnan.ac.ir/article_5310_4b802ab591787964d6cd2e2ce5ee6de0.pdf
2021-07-01
1699
1717
10.22075/ijnaa.2021.5310
Fuzzy supply chain
Aggregate production planning
graded mean integration method
pairwise comparison
Mohamed
Ibrahim
mohammedsaad@eco.nahrainuniv.edu.iq
1
Ministry of Higher Education and Scientific Research, Iraq
AUTHOR
Barraq
Kaml
barraq@eco.nahrainuniv.edu.iqr
2
Al-Nahrain University, College of Business Economics, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Study of the rings in which each element express as the sum of an idempotent and pure
This article aims to introduce the concept of $p-\mathrm{clean\ ring}\mathrm{s}$ as a generalization of some concepts such as $\mathrm{clean\ rings}$ and $r-\mathrm{clean\ rings}$. As the first result, we prove that every $\mathrm{clean\ ring}$ is a $p-\mathrm{clean\ ring}$ and every $r-\mathrm{clean\ ring}$ is a $p-\mathrm{clean\ ring}$. Furthermore, we give the relation between von Neumann $\mathrm{local\ ring}$ and $p-\mathrm{clean\ ring}$. Finally, we investigate many properties of $p-\mathrm{clean\ ring}\mathrm{s}$.
https://ijnaa.semnan.ac.ir/article_5311_6a1e25efe0449503a198d2a1eb3124aa.pdf
2021-07-01
1719
1724
10.22075/ijnaa.2021.5311
ring
clean ring
r-clean ring
local ring and regular ring
Akram
Mohammed
akr_tel@tu.edu.iq
1
College of Computer Science and Mathematics, Tikrit University, Tikrit, Salahaddin, Iraq
AUTHOR
Ibrahim
Ahmed
ibrahim1992@tu.edu.iq
2
College of Education-Tuzkhurmatu, Tikrit University, Tuzkhurmatu, Salahaddin, Iraq
LEAD_AUTHOR
Samah
Asaad
samah1989@tu.edu.iq
3
College of Education-Tuzkhurmatu, Tikrit University, Tuzkhurmatu, Salahaddin, Iraq
AUTHOR
ORIGINAL_ARTICLE
Application of modify RSA cryptography and randomly LSB steganography on color images of fluid flow in a channel
This paper introduces a combination of three methods including a modified RSA cryptography, hidden text using steganography, and selection of random pixel from image to improve the general security level of the system. In this regard, the image is a carrier of the information transmitted through the media, and the fluid motion image is used to hide the information after it was encoded using modify RSA technique that before hiding it in a random way, because the image of fluid motion possesses the sinusoidal waves and turbulent motion. In this paper, a combination of three techniques is utilized in order to prevent the intruders and attackers from detecting the information and sharing it with others. LSB technique is used for hiding the message in image-based steganography. In addition, pseudo number to choose the random number of pixel when hiding the message after encryption. Four measures including Peak Signal to Noise Ratio (PSNR), Mean Squared Error (MSE), Structural Similarity Index Measure (SSIM), and histogram are used to compare the original image and stego-image. The results demonstrated the outperformance of the proposed method so that neither the attacker nor the intruder could discover the information contained within the image, due to the large value of the PSNR, very small value of the MSE, stability of the SSIM, and matching the histograms.
https://ijnaa.semnan.ac.ir/article_5312_c200e737561827a6491442b3c3147da4.pdf
2021-07-01
1725
1734
10.22075/ijnaa.2021.5312
Steganography
PSNR
MSE
SSIM
Information hiding
Modified RSA cryptography
Seed number
Histogram
Hatem
Mohaisen
ha19652010@yahoo.com
1
Ministry of High Education and Scientific Research, Applied Mathematics, Baghdad, Iraq
LEAD_AUTHOR
Awad
Hammoud
awadkadhim@uoit.edu.iq
2
Univesity of Information Technology and Communication, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Entire functions and some of their growth properties on the basis of generalized order (α,β)
For any two entire functions $f$, $g$ defined on finite complex plane $\mathbb{C}$, the ratios $\frac{M_{f\circ g}(r)}{M_{f}(r)}$ and $\frac{M_{f\circ g}(r)}{M_{g}(r)}$ as $r\rightarrow \infty $ are called the growth of composite entire function $f\circ g$ with respect to $f$ and $g$ respectively in terms of their maximum moduli. Several authors have worked about growth properties of functions in different directions. In this paper, we have discussed about the comparative growth properties of $f\circ g$, $f$ and $g,$ and derived some results relating to the generalized order $(\alpha ,\beta )$ after revised the original definition introduced by Sheremeta, where $\alpha ,$ $\beta $ are slowly increasing continuous functions defined on $(-\infty,+\infty )$. Under different conditions, we have found the limiting values of the ratios formed from the left and right factors on the basis of their generalized order $(\alpha ,\beta )$ and generalized lower order $(\alpha,\beta ),$ and also established some inequalities in this regard.
https://ijnaa.semnan.ac.ir/article_5313_a269705c98c98c6c5301ed8b92b7f7ff.pdf
2021-07-01
1735
1747
10.22075/ijnaa.2021.22299.2346
Entire function
Growth
composition
generalized order $(alpha, beta ) $
generalized lower order $(alpha,beta )$
Tanmay
Biswas
tanmaybiswas_math@rediffmail.com
1
Rajbari, Rabindrapally, R. N. Tagore Road P.O. Krishnagar, Dist-Nadia, PIN- 741101, West Bengal, India
AUTHOR
Chinmay
Biswas
chinmay.shib@gmail.com
2
Department of Mathematics,Nabadwip Vidyasagar College, Nabadwip, Dist.- Nadia, PIN-741302, West Bengal, India
AUTHOR
Biswajit
Saha
sahaanjan11@gmail.com
3
Department of Mathematics, Government General Degree College Muragachha, Nakashipara, Dist.- Nadia, PIN-741154,West Bengal, India
LEAD_AUTHOR
ORIGINAL_ARTICLE
On the dynamical behavior of an Eco-Epidemiological model
The aim of this article is to study the dynamical behavior of an eco-epidemiological model. A prey-predator model comprising infectious disease in prey species and stage structure in predator species is suggested and studied. Presumed that the prey species growing logistically in the absence of predator and the ferocity process happened by Lotka-Volterra functional response. The existence, uniqueness, and boundedness of the solution of the model are investigated. The stability constraints of all equilibrium points are determined. The constraints of persistence of the model are established. The local bifurcation near every equilibrium point is analyzed. The global dynamics of the model are investigated numerically and confronted with the obtained outcomes.
https://ijnaa.semnan.ac.ir/article_5314_be72c68386df4fcb55ea894ca54ce178.pdf
2021-07-01
1749
1767
10.22075/ijnaa.2021.5314
Prey-predator
Disease
Stage-structure
stability
Bifurcation
Hiba
Ibrahim
haibrahim82@yahoo.com
1
Department of Mathematics, College of Science, University of Baghdad, Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
A hybrid semi-supervised boosting to sentiment analysis
In this article, we propose a hybrid semi-supervised boosting algorithm to sentiment analysis. Semi-supervised learning is a learning task from a limited amount of labeled data and plenty of unlabeled data which is the case in our used dataset. The proposed approach employs the classifier predictions along with the similarity information to assign label to unlabeled examples. We propose a hybrid model based on the agreement among different constructed classification model based on the boosting framework to assign a final label to unlabeled data. The proposed approach employs several different similarity measurements in its loss function to show the role of the similarity function. We further address the main preprocessing steps in the used dataset. Our experimental results on real-world microblog data from a commercial website show that the proposed approach can effectively exploit information from the unlabeled data and significantly improves the classification performance.
https://ijnaa.semnan.ac.ir/article_5315_aea4a94ad7cbd947d3cbdc42d2273ea8.pdf
2021-07-01
1769
1784
10.22075/ijnaa.2021.23334.2522
Semi-supervised learning
Sentiment Analysis
Persian Language
Boosting
Similarity Function
Jafar
Tanha
tanha@tabrizu.ac.ir
1
Electrical and Computer Engineering Department, Tabriz University, Tabriz, Iran
LEAD_AUTHOR
Solmaz
Mahmudyan
solmaz_mahmodian@yahoo.com
2
Computer Engineering Department, Payame-Noor University, Tehran, Iran
AUTHOR
Ahmad
Farahi
h.farahi@pnu.ac.ir
3
Computer Engineering Department, Payame-Noor University, Tehran, Iran
AUTHOR
ORIGINAL_ARTICLE
Implementation of hybrid cryptographic schemes in a cloud environment for enhanced medical data security
Nowadays, several security architectures in cloud computing were employed in several applications, but they failed to secure the cloud data entirely. The current approaches use the ensemble algorithm for the decryption and encryption purpose to enhance the security technique. The input medical dataset is usually raw and might contain redundant packets and missing values. Initially, the data is preprocessed by means of the normalization technique. By using Enhanced Principal Component Analysis (EPCA) method, various attributes of the data can be obtained. After the extraction process, the classification mechanism is carried out for recognizing the attacks. The attack is predicted and is classified by means of the Adaptive AlexNet CNN classifier algorithm. A hybrid cryptographic technique in a cloud environment for improving the security rate and providing privacy preservation of the medical data in the cloud environment is presented. The proposed work mainly concentrates mostly on implementing hybrid cryptographic schemes which include AES algorithm, enhanced honeypot algorithm, SHA3 hashing and OTP in the cloud environment. It enhances the security of the data to a great extent. Thus, the presented technique is secured effectively that makes the intruders difficult to access the system as they need to attain control over servers.
https://ijnaa.semnan.ac.ir/article_5316_5b4fd291f811db623eefaf9891f0e0e3.pdf
2021-07-01
1785
1800
10.22075/ijnaa.2021.5316
cloud computing
encryption
decryption
Enhanced Principal Component Analysis
Adaptive AlexNet CNN classifier
cryptographic technique
enhanced honeypot algorithm
SHA3 hashing and OTP
A
Priya
vpriya172112@gmail.com
1
Department of Computer Science, VISTAS, Chennai, India.
LEAD_AUTHOR
S
Saradha
saradha.research@gmail.com
2
Department of Computer Science, VISTAS, Chennai, India.
AUTHOR
ORIGINAL_ARTICLE
Fixed point theorems on orthogonal complete metric spaces with an application
In this paper, we introduce the concept of orthogonal contractive mappings and prove some fixed point theorems for such contractions. We establish our results in orthogonal bounded complete metric spaces via the notion of $\tau-$distances. Moreover, an application to a differential equation is given.
https://ijnaa.semnan.ac.ir/article_5317_74c32927394128ad87f47458c067009d.pdf
2021-07-01
1801
1809
10.22075/ijnaa.2021.23033.2464
Fixed point
O-complete metric space
O-contractive map
$perp$-E-weakly contractive map
$tau$-distance
Hausdorff topological space
Youssef
Touail
youssef9touail@gmail.com
1
Equipe de Recherche en Math'{e}matiques Appliqu'{e}es, Technologies de l'Information et de la Communication Facult'{e} Polydisciplinare de Khouribga, Universit'{e} Sultan Moulay Slimane de Beni-Mellal, Morocco
LEAD_AUTHOR
Driss
El Moutawakil
d.elmoutawakil@gmail.com
2
Equipe de Recherche en Math'{e}matiques Appliqu'{e}es, Technologies de l'Information et de la Communication Facult'{e} Polydisciplinare de Khouribga, Universit'{e} Sultan Moulay Slimane de Beni-Mellal, Morocco
AUTHOR
ORIGINAL_ARTICLE
Essential-small fully stable modules
We will add new types of modules over a ring $\mathfrak{R}$ called $\mathit{g}-$ small completely stable module and $\mathit{g}-$ small duo module, assuming $\mathfrak{R}$ is a ring with identity and $\mathcal{M}$ is a unitary left $\mathfrak{R}$-module. We also present the $\mathit{g}-$ small dual stable module, which is a duality. We show that our new ideas have characterization and a few properties.
https://ijnaa.semnan.ac.ir/article_5318_0c077b2f9cfdcff6a43fca78c2317814.pdf
2021-07-01
1811
1816
10.22075/ijnaa.2021.5318
$mathit{g}-$ small fully modules
$mathit{g}-$ small duo modules
$mathit{g}-$ small dual stable
Aseel
Alatuany
aselamer16@gmail.com
1
Department of Mathematics, College of Science, Baghdad University, Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Classification of singular points of perturbed quadratic systems
We consider the following two-dimensional differential system: \[ \left\{\begin{array}{l} \dot{x}=ax^{2}+bxy+cy^{2}+\Phi(x,y) \,, \\ \dot{y}=dx^{2}+exy+fy^{2}+\Psi(x,y) \,, \end{array} \right.\] in which $\lim_{(x,y)\rightarrow(0,0)}\frac{\Phi(x,y)}{x^{2}+y^{2}} = \lim_{(x,y)\rightarrow(0,0)}\frac{\Psi(x,y)}{x^{2}+y^{2}}=0$ and $\Delta=(af-cd)^{2}-(ae-bd)(bf-ce)\neq0 $. By calculating Poincare index and using Bendixson formula we will find all the possibilities under definite conditions for classifying the system by means of kinds of sectors around the origin which is an equilibrium point of degree two.
https://ijnaa.semnan.ac.ir/article_5319_0bfcf12a7266bea2f8c2cef980500468.pdf
2021-07-01
1817
1825
10.22075/ijnaa.2018.13063.1672
Quadratic system
Classification of singular points
Poincare index
Asadollah
Aghajani
aghajani@iust.ac.ir
1
School of Mathematics, Iran University of Science and Technology, Narmak, Tehran 16844-13114, Iran
LEAD_AUTHOR
Mohsen
Mirafzal
mirafzal@iust.ac.ir
2
School of Mathematics, Iran University of Science and Technology, Narmak, Tehran 16844-13114, Iran
AUTHOR
ORIGINAL_ARTICLE
Stability analysis of a diseased Prey - Predator - Scavenger system incorporating migration and competition
In this paper, a prey-predator-scavenger model is proposed and analyzed. It is assumed that the model considered the effect of disease on the prey. Firstly, the existence, uniqueness and boundedness of the solution of the model are discussed. Secondly, we studied the existence and local stability of all equilibrium points. Furthermore, some of the Sufficient conditions of the global stability of the positive equilibrium are established using suitable Lyapunov functions. Finally, those theoretical results are demonstrated with numerical simulations.
https://ijnaa.semnan.ac.ir/article_5320_efeb17b6e6c2d514e720188de9c3e64e.pdf
2021-07-01
1827
1853
10.22075/ijnaa.2021.5320
prey-predetor-scavenger model
Stability analysis
migrations
Marwah Ali
Yousif
marwa.yousif1203@sc.uobaghdad.edu.iq
1
Department of Mathematics, College of Science, University of Baghdad, Baghdad-Iraq
LEAD_AUTHOR
Hassan Fadhil
Al-Husseiny
hassan.fadhil.r@sc.uobaghdad.edu.iq
2
Department of Mathematics, College of Science, Baghdad University, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Studying the A4-Graphs for elements of order 3 in tits group T and Mathieu group M20
Assume that $X$ is a subset of the finite group $G$. The A4-graph is known as a simple graph denoted by $ \mathcal{A}_4 (G, X) $ having $X$ as a vertex set and two vertices $ x, y \in X,$ is linked by an edges if $ x\neq y $ and $ {xy}^{-1} = {yx}^{-1} $. In this paper, we consider $ \mathcal{A}_4 (G, X) $ when $G$ is either Tits group T or Mathieu group $M_{20}$ and $X$ is $G$-conjugacy class of elements of order three. Valuable results reached, for example, disc structure, girth, clique number, and diameters of the A4-graph.
https://ijnaa.semnan.ac.ir/article_5321_5904545a0b931f7b7c7d8e1a1496214a.pdf
2021-07-01
1855
1860
10.22075/ijnaa.2021.5321
Finite simple groups
A4-graph
connectivity
cliques
Zainab Hasan
Msheree
zainab.hasan@mtu.edu.iq
1
Middle Technical University, Technical Instructors Training Institute, Iraq
LEAD_AUTHOR
Mohammed Mukheef
Abed
mohammed.mukheef@mtu.edu.iq
2
Middle Technical University, Technical Instructors Training Institute, Iraq
AUTHOR
Wissam Fadhel
Abid
wissam@mtu.edu.iq
3
Middle Technical University, Institute of Technology, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
A qualitative study of an Eco-Toxicant model with Anti-Predator behavior
In this study, a mathematical model consisting of four species: first prey and second prey with stage structure and predator in the presence of toxicity and anti-predator has been proposed and studied using the functional response Holling's type IV and Lotka Volttra. The solution's existence, uniqueness, and boundedness have all been studied. All possible equilibrium points have been identified. The stability of this model has been studied. Finally, numerical simulations have been used to verify our analytical results.
https://ijnaa.semnan.ac.ir/article_5322_54dd35892095e4cb9ab0afe06981affb.pdf
2021-07-01
1861
1882
10.22075/ijnaa.2021.5322
Prey- Predator
Function Response
Stage- Structure
Toxicity
Anti-Predator
Huda Salah
Kareem
hudasalah367@gmail.com
1
Department of Mathematics, College of Science, University of Baghdad, Iraq
LEAD_AUTHOR
Azhar Abbas
Majeed
azhar.majeed@sc.uobaghdad.edu.iq
2
Department of Mathematics, College of Science, University of Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Qualitative study of an Eco-Toxicant model with migration
In this article, an ecology toxicant food chain system with Lotka-Volterra functional response for predator population includes prey protection zone has been suggested and studied. Toxins are excreted by all organisms as a form of defence. The prey follows the logistic growth law. The equilibrium points have been established. The analytic approach has been used to investigate the local stability for each acceptable equilibrium point. The global dynamics of this model was studied using the Lyapunov function. Lastly, numerical simulations and graphical illustrations were used to back up our analytic results.
https://ijnaa.semnan.ac.ir/article_5323_4bb7229d337eccb219fd05a0b076737a.pdf
2021-07-01
1883
1902
10.22075/ijnaa.2021.5323
Eco-toxicant model
Food chain
Protection zone
Predatory zone
Tuqaa A.
Radiea
tuqaa.radie1203@sc.uobaghdad.edu.iq
1
Department of mathematics, College of Science, University of Baghdad, Baghdad, Iraq
AUTHOR
Azhar A.
Majeed
azhar_abbas_m@scbaghdad.ed
2
Department of mathematics, College of Science, University of Baghdad, Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Study of the generalized P-contractions on Banach spaces and uniqueness for stability fixed points
This article aims to introduce some concepts such as $P$-contraction and $G-P$-contraction which are defined on Banach spaces as stronger forms of the concepts of $P$-contraction and \'{C}iric type generalized $P$-contraction defined on complete metric spaces, respectively. Furthermore, the relationship between these concepts have been discussed. Finally, the uniqueness of fixed point for the presented concepts has been investigated.
https://ijnaa.semnan.ac.ir/article_5324_1fdf3c43c9b7350c6d17322baf356048.pdf
2021-07-01
1903
1908
10.22075/ijnaa.2021.5324
Fixed point
metric space
Banach space
contraction mapping
F - contractions
Mizal
Alobaidi
mizalobaidi@tu.edu.iq
1
Department of Mathematics, College of Computer Science and Mathematics, Tikrit University, Iraq.
AUTHOR
Ibrahim
Ahmed
ibrahim1992@tu.edu.iq
2
Department of Physics, College of Education-Tuzkhurmatu , Tikrit University, Iraq.
LEAD_AUTHOR
Samah
Asaad
samah1989@tu.edu.iq
3
Department of Physics, College of Education-Tuzkhurmatu , Tikrit University, Iraq.
AUTHOR
ORIGINAL_ARTICLE
A mathematical model for scheduling of transportation, routing, and cross-docking in the reverse logistics network of the green supply chain
Cross-docking refers to the practices of unloading materials from inbound vehicles and then loading them directly into outbound ones. Removing or minimizing warehousing costs, space requirements, as well as inventory utilization, cross-docking simplifies supply chains and makes them deliver goods to markets in a faster and more efficient manner. Accordingly, a mixed-integer linear programming ($MILP $) model is developed in the present study to schedule transportation routing and cross-docking in a reverse logistics network ($RLN$). Furthermore, different traffic modes are also considered to reduce fuel consumption, which reduces emissions and pollution. The proposed model is a multi-product, multi-stage, and non-deterministic polynomial-time that is an NP-hard problem. We use the non-dominated sorting genetic algorithm II ($NSGA-II$) to solve the model. A numerical example has been solved to illustrate the efficiency of the method.
https://ijnaa.semnan.ac.ir/article_5325_f092471f6a8b8eb60a1d32c8da5284be.pdf
2021-07-01
1909
1927
10.22075/ijnaa.2021.5325
Cross-Dock Scheduling
Transportation Routing
Inverse Logistics Network
Mathematical modeling
Green Supply Chain
Seyyed mohammad
Tabatabaei
seyyedmohammadtabatabaei@gmail.com
1
Faculty of Economics and Management, Semnan University, Semnan, Iran
AUTHOR
Mohammadreza
Safi
msafi@semnan.ac.ir
2
Faculty of Mathematics, Statistics and Computer Science, Semnan University, Semnan, Iran
LEAD_AUTHOR
Mohsen
Shafiei Nikabadi
shafiei@semnan.ac.ir
3
Faculty of Economics and Management, Semnan University, Semnan, Iran
AUTHOR
ORIGINAL_ARTICLE
The nonlinear effect in the performance of 4:2 Compressor
In this article, we have designed a novel 4:2 QCA Compressor with a nonlinear effect. This can be considered as a new vision to design approximate Majority circuits with more than five-input. The main advantages of these ideas are the reduced number of QCA cells as well as power dissipation, increased speed, and improved cell area In addition, a novel hierarchy is introduced to optimize digital systems. The 4:2 Compressor circuit is selected as a benchmark. This circuit is simulated with some technologies such as CMOS, CNT, and QCA in different architectures. All results from power respective were compared. We have used QCADesigner and QCAPro for QCA Circuits, Hspice with 20nm-nfet PTM-MG model for CMOS circuits and Stanford CNFET 20nm model for CNT circuits as simulation tools to evaluate circuits.
https://ijnaa.semnan.ac.ir/article_5326_98b05f42c9c12d33136a4574b1e2122c.pdf
2021-07-01
1929
1945
10.22075/ijnaa.2021.21970.2309
QCA
CNT
CMOS
The nonlinear effect
4:2 Compressor
n -input Majority circuit
Approximate Circuit
Power consumption
Norassadat
Moosavi
nou.mousavi.eng@iauctb.ac.ir
1
Department of Computer Engineering, Central Tehran Branch, Islamic Azad University, (IAUCTB)
AUTHOR
Keivan
Navi
navi@sbu.ac.ir
2
Department of Computer Engineering, Shahid Beheshti University
LEAD_AUTHOR
Vahe
Aghazarian
v_aghazarian@iauctb.ac.ir
3
Department of Computer Engineering, Central Tehran Branch, Azad University (IAUCTB),
AUTHOR
ORIGINAL_ARTICLE
Generalized dynamic process for generalized $(\psi, S,F)$-contraction with applications in $b$-Metric Spaces
In this paper, we develop the notion of $(\psi, F)$-contraction mappings introduced in \cite{wad1} in $b$-metric spaces. To achieve this, we introduce the notion of generalized multi-valued $(\psi, S, F)$-contraction type I mapping with respect to generalized dynamic process $D(S, T, x_0),$ generalized multi-valued $(\psi, S, F)$-contraction type II mapping with respect to generalized dynamic process $D(S, T, x_0),$ and establish common fixed point results for these classes of mappings in complete $b$-metric spaces. As an application, we obtain the existence of solutions of dynamic programming and integral equations. The results presented in this paper extends and complements some related results in the literature.
https://ijnaa.semnan.ac.ir/article_5327_a83b2ca432c1dc723818cda66298a987.pdf
2021-07-01
1947
1964
10.22075/ijnaa.2021.23400.2531
Fixed point
dynamic process
generalized multi-valued $(psi,S,F)$-contraction type
$b$-metric space
integral equations
Dynamic Programming
Akindele
Mebawondu
216028272@stu.ukzn.ac.za
1
School of Mathematics, Statistics and Computer Science, University of KwaZulu-Natal, Durban, South Africa
AUTHOR
Oluwatosin
Mewomo
mewomoo@ukzn.ac.za
2
School of Mathematics, Statistics and Computer Science, University of KwaZulu-Natal, Durban, South Africa
LEAD_AUTHOR
ORIGINAL_ARTICLE
Error correction model for estimating the relationship between GDP and inflation in the Iraqi economy (1990-2020)
The relationship between economic growth and inflation a concern for many countries in the developed and developing world, and erected in developed countries, a lot of research to laparoscopy relationship in order to overcome the problems that may be exposed to the States as a result of this association. The current research is an attempt to explore the trends in this relationship in Iraq in order to determine the ranges that can affect or be affected by growth as a result of inflation, period $(1990-2020)$ was adopted to range time frame in which you can determine the nature of the relationship between the two variables as well have been taking data at their nominal value as terms of GDP growth for the accurate diagnosis of the impact of inflation has been relying on time-series analysis to prove the direction of the relationship, and the paper confirmed the conclusion that there are two methods of fundamental bond that link inflation and economic growth in Iraq.
https://ijnaa.semnan.ac.ir/article_5328_fc4368ed4a0ebd32cd3240a2c1bdafd1.pdf
2021-07-01
1965
1979
10.22075/ijnaa.2021.5328
Inflation
Variance
spending
gap
equilibrium
Aqeel
Farhan
aqeel_hameed@ymail.com
1
University of Diyala, College of Administration and Economics, Iraq.
LEAD_AUTHOR
Murtadha
Abdullah
mabdullah@uowasit.edu.iq
2
University of Wasit, College of Administration and Economics, Iraq.
AUTHOR
ORIGINAL_ARTICLE
Identity of the connection curvature tensor of almost manifold C(λ)
This paper aims to investigate the geometry of the projective curvature tensor and to obtain someidentities for this tensor. Several three classes of nearly infinite C(λ) are distinguished and studied.
https://ijnaa.semnan.ac.ir/article_5329_acd00e882bf57e5a7deb4b6ddc434396.pdf
2021-07-01
1981
1989
10.22075/ijnaa.2021.5329
Projective curvature tensor
Riemannian curvature tensor
almost manifold −C(λ)
Ali
Shihab
draliabd@tu.edu.iq
1
Department of Mathematics, College of Education for Pure Sciences, Tikrit University, Iraq.
LEAD_AUTHOR
ORIGINAL_ARTICLE
$C^*$-metric spaces
The purpose of this article is to introduce the notion of an $\mathfrak{A}$-meter, as an operator-valued distance mapping on a set $X$ and investigating the theory of $\mathfrak{A}$-metric spaces, where $\mathfrak{A}$ is a noncommutative $C^*$-algebra. We demonstrate that each metric space may be seen as an $\mathfrak{A}$-metric space and that every $\mathfrak{A}$-metric space $(X,\delta)$ can be regarded as a topological space $(X,\tau_{\delta})$.
https://ijnaa.semnan.ac.ir/article_5330_1ba8b26200a89ba63930f1ea47b3263b.pdf
2021-07-01
1991
1996
10.22075/ijnaa.2020.20839.2205
$C^*$-algebra
$C^*$-metric space
allowance set
downward/upward directed set
positive elements
Mahdi
Mowlavi
mahdi.mowlavi@gmail.com
1
Department of Mathematics,Faculty of Science,Science and Research Branch Islamic Azad University,Tehran , Iran.
AUTHOR
Madjid
Mirzavaziri
mirzavaziri@gmail.com
2
Department of Pure Mathematics, Ferdowsi University of Mashhad, P.O. Box 1159, Mashhad
LEAD_AUTHOR
Mohammadreza
Mardanbeigi
mmardanbeigi@yahoo.com
3
Department of Mathematics, Faculty of Science, Science and Research Branch Islamic Azad University, Tehran, Iran
AUTHOR
ORIGINAL_ARTICLE
Time series analysis of the number of Covid-19 deaths in Iraq
In this paper, the time series data for the number of deaths from Coronavirus (COVID-19) patients in Iraq were analyzed for the period from 4/3/2020 to 18/2/2021. ARCH, GARCH, and TGARCH models were applied due to the changing volatility of the series leading to a heteroscedastic variance. The appropriate models for the series were diagnosed and the best model was chosen and used for forecasting by the exponential smoothing methods. The comparison criterion used was the Root Mean Squared Error and the Sum of Squared Residuals. The most appropriate model for modeling and forecasting the Coronavirus deaths series in Iraq was diagnosed as TGARCH (1,1). Finally, the method of Holt-winter-additive forecasting was the best method among the
https://ijnaa.semnan.ac.ir/article_5331_ad1b945fc7d1acc2c6cfeb8486e3d21e.pdf
2021-07-01
1997
2007
10.22075/ijnaa.2021.5331
COVID-19
time series
Volatility
heteroscedastic variance
Garch
ARCH
TGARCH
Sarab
Shukur
sarab.shukur1203@sc.uobaghdad.edu.iq
1
Department of Mathematics, College of Science, University of Baghdad, Iraq
LEAD_AUTHOR
Tasnim
Kadhim
tasnim.h@sc.uobaghdad.edu.iq
2
Department of Mathematics, College of Science, University of Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Nano generalized regular minimal closed sets in nano topological spaces
This paper aims to define and study a new class of sets called NGRMCS in NTS. The basic properties of NGRMCS are also studied. Finally, we investigate the relationship among NGRMCS, NMCS, NCS, NGRCS, NRCS MCS and NMCS.
https://ijnaa.semnan.ac.ir/article_5337_30b81b7d8a3a67c5eab58641412bb1e6.pdf
2021-07-01
2009
2012
10.22075/ijnaa.2021.5337
NGRMCS
NGRCS
NTS
NMCS
NMOS
Taha
Jasim
tahahameed@tu.edu.iq
1
Department of Mathematics, College of Computer Science and Mathematics, Tikrit University, Tikrit, Iraq.
LEAD_AUTHOR
ORIGINAL_ARTICLE
Comparing three estimators of fuzzy reliability for one scale parameter Rayleigh distribution
This paper deals with comparing three different estimators of fuzzy reliability estimator of one scale parameter Rayleigh distribution were first of all the one scale parameter Rayleigh is defined. Afterwards, the cumulative distribution function is derived, as well as the reliability function is also found. The parameters θ is estimated by three different methods, which are maximum likelihood, and moments, as well as the third method of estimation which is called percentile method or Least Square method, where the estimator $(\hat{\vartheta}_{pec})$ obtained from Minimizing the total sum of the square between given C DF, and one non-parametric estimator like $\hat{F}(ti,\theta)=\frac{i}{n+1}$ after the estimator of $(\theta)$, which $(\hat{\theta})$ is obtained. We work on comparing different fuzzy reliability estimators and all the results are explained besides different sets of taking four sample sizes $(n= 20, 40, 60, and 80)$.
https://ijnaa.semnan.ac.ir/article_5338_e41db2651e37273970f8cb69a2786492.pdf
2021-07-01
2013
2020
10.22075/ijnaa.2021.5338
Fuzzy Reliability Estimator (FRE)
Least Square Estimators (LSE)
Maximum Likelihood Estimator (MLE)
Moments estimator (MOM)
Rayleigh distribution
Mohammed
Hawash
muhamed.khadim@duc.edu.iq
1
Dijlah University College, Baghdad, Iraq.
LEAD_AUTHOR
Suhad
Ahmed
suhadahmed12@gmail.com
2
College of Education Ibn Al Haitham, University of Baghdad, Baghdad, Iraq.
AUTHOR
Dhwyia
Hassan
dhwyia.salman777@yahoo.com
3
Business information college, University of information Technology and communications, Baghdad, Iraq.
AUTHOR
ORIGINAL_ARTICLE
Implementation enhancement of AVR control system within optimization techniques
In this research, Jaya optimization algorithm has been introduced to develop and enhance the performance of the Automatic Voltage Regular system that known as (AVR) system with proposed techniques equilibrium optimizer and rider optimization algorithm which is contributed as additional algorithms to assist PID controller to find the optimum values for the controller in order to improve the performance of the AVR control system to achieve high stability and best for both rising times and settling time and these the best coefficients that made the proposed system work in the greatest performance in addition to that the step response on AVR control system also has been presented in this research and all these techniques implemented on MATLAB Simulink with optimized techniques.
https://ijnaa.semnan.ac.ir/article_5339_1f436aef7e85357eae98c6594d405d77.pdf
2021-07-01
2021
2027
10.22075/ijnaa.2021.5339
PID Controller
Jaya Optimization Algorithm
Automatic Voltage Regulator System
Rider Optimization Algorithm
MATLAB
Ahmed
Ibrahim
ahmedrashid@esraa.edu.iq
1
Department of Computer Techniques Engineering, Al-esraa University College, Baghdad, Iraq
LEAD_AUTHOR
Noorulden
Basil
nooralden@esraa.edu.iq
2
Department of Computer Techniques Engineering, Al-esraa University College, Baghdad, Iraq
AUTHOR
Mohammed
Mahdi
mhibr8@gmail.com
3
College of Computer Science and Information Technology, Wasit University, Al-Kut, Iraq
AUTHOR
ORIGINAL_ARTICLE
On fluctuation analysis of different kinds of n-policy queues with single vacation
In this paper, we debate queueing systems with N-policy and single vacation. We consider these systems when the vacation times have Erlang distribution. Moreover, we adapted the input by studying two different kinds: first, an ordinary Poisson input, and second, type 2 geometric batch input. We derive the probability generating function of the number of units in the system in two cases by using fluctuation analysis.
https://ijnaa.semnan.ac.ir/article_5340_cce625699519dd5713ca68f9d290c000.pdf
2021-07-01
2029
2040
10.22075/ijnaa.2021.5340
N-policy
single vacation
fluctuation theory
input batches
bulk input
marked delayed renewal process
delayed renewal process
point process
marked point process
random walk
Hind
Saad Kazem
hind.kazem@student.uobabylon.edu.iq
1
Department of Mathematics, College of Education for Pure Sciences, University of Babylon, Iraq
LEAD_AUTHOR
Ali
Al-Obaidi
aalobaidi@uobabylon.edu.iq
2
Department of Mathematics, College of Education for Pure Sciences, University of Babylon, Iraq
AUTHOR
ORIGINAL_ARTICLE
Rational maps whose Julia sets are quasi circles
In this paper, we give a family of rational maps whose Julia sets are quasicircles also we the boundaries of $I_0\ , I_\infty$ are quasicircles , we have the family of complex rational maps are given by\begin{equation}\label{e1}\mathcal{Q}_\alpha(Z)=2\alpha^{1-n}\ Z^n -\frac{z^n \left(z^{2n}-\alpha^{n+1}\right)}{z^{2n}-\alpha^{3n-1}}, \end{equation}where $n\geq 2$ and $\alpha \in C\backslash \{0\},$ but $\alpha^{2n-2}\neq 1,\;\;\alpha^{1-n}\neq 1.$
https://ijnaa.semnan.ac.ir/article_5341_e6c7c5de6d8e9d5bf356e9d78e56b624.pdf
2021-07-01
2041
2048
10.22075/ijnaa.2021.5341
Julia Sets
Fatou Sets
Singular Perturbation
Quasi circles
Hassanein
Q. Al-Salami
haszno732@gmail.com
1
Department of Biology, College of Sciences, University of Babylon, Iraq
LEAD_AUTHOR
Iftichar
Al-shara
pure.iftichar.talb@uobabylon.edu.iq
2
Department of Mathematics, College of Education of Pure Sciences, University of Babylon, Iraq
AUTHOR
ORIGINAL_ARTICLE
$ii \delta_g$-closed set in topological spaces
The purpose of this study is to determine if it is possible to use the class of $\delta_g-$close sets and $\delta-$closed sets to find a new class of close sets, namely $ii\delta_g-$close sets and $ii\delta-$close sets. We use these new classes to arrive at the separation axiom, which is the separation axiom of $ii-T_{3/4}.$ We also use the properties of $\delta \hat{g}-$closed sets to find new class of close sets, namely $ii\delta \hat{g}-$closed set. We use it to create a new type of separation axiom. The study found new closed sets, namely: $ii\delta \hat{g}-$closed sets is introduced for topological space. We will also prove that category falls between the class of $ii\delta-$closed set and the class of $iigs-$closed set. As well study the relationship between it and other closed sets, such as the closed set of type $iigs-$ as well as the closed set of type $iig$, and then, through these closed sets, we will study new types of the axiom of separation, which are $ ii- T_{3/4}$ space and $ ii- \hat{T}_{3/4}$ space, and also clarify the relationship between the axiom of separation, and some of the closed and open sets previously studied. The study also included the relationship between the axiom of separation, of type $ii-T_{1/2}$ space and $ii- T_{3/4}$ space as well as the axiom of separation of type $ii- T_{3/4}$ space and $ ii \hat{T}_{3/4}$ space. The study included some important proofs. The study also included a chart, showing the relationship between closed sets of types that were studied and can be used.
https://ijnaa.semnan.ac.ir/article_5342_368072f1d1ff4dc8495bb13803a7ff09.pdf
2021-07-01
2049
2055
10.22075/ijnaa.2021.5342
$ii-$generalized closed sets
$iidelta_g$-closed
$hat{g}-$open sets
$iidelta hat{g}-$closed set
$ ii- T_{3/4}$ and $ ii- hat{T}_{3/4}$ space
Zainab
Awad Kadhum
zz490ssll@gmail.com
1
Department of Mathematics, College of Education for Pure Science, Wassit University, Iraq
LEAD_AUTHOR
Ali
Khalaf Hussain
alhachamia@uowasit.edu.iq
2
Department of Mathematics, College of Education for Pure Science, Wassit University, Iraq
AUTHOR
ORIGINAL_ARTICLE
Walsh function for solving fractional partial differential equation
In this article, we extended an efficient computational method based on Walsh operational matrix to find an approximate solution of fractional diffusion equations, First, we present the fractional Walsh operational matrix of integration and differentiation. Then by applying this method, the Fractional diffusion equations are reduced into a system of an algebraic equation. The benefits of this method are the low cost of setting up the equations without applying any projection method such as collocation, Galerkin, etc. The results show that the method is very accurate and efficient.
https://ijnaa.semnan.ac.ir/article_5343_17afe2d300fb89e12222c4fbee87903a.pdf
2021-07-01
2057
2068
10.22075/ijnaa.2021.5343
Fractional diffusion equations
Operational matrix
Walsh functions
Block-pulse functions
Fractional calculus
Azhar
Malik
120020@uotechnology.edu.iq
1
Computer Engineering Department, University of Technology, Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
A model for backgrounds and implications of customer experience management in dental centers considering the variable role of word of mouth using a phenomenological approach
This research aimed to provide a model for backgrounds and implications of customer experience management in dental centers considering the variable role of word of mouth using a phenomenological approach. In this mixed-method study, the researcher used a phenomenological approach to identify the components of the customer experience in dental centers and then tested the model by a quantitative method. The data collection instrument was in-depth interview and protocol with 23 dental clinic managers and clients with which the researcher reached theoretical saturation. In the next stage, the required data were distributed among 320 patients of the dental clinic in District 2 and 4 of Tehran Municipality, and the results were analyzed by PLS software. Finally, the researcher extracted 152 open source codes, coded and selected them based on the theoretical literature, and presented the results in six main dimensions and 28 sub-dimensions. The researcher has presented the research results in the form of a model with six main dimensions, including customer experience, satisfaction of the medical staff, word of mouth of various dental services, strengthening the clinic brand, satisfaction with the clinical environment, and 28 sub-dimensions. Customer experience has had a positive and significant effect on word of mouth.
https://ijnaa.semnan.ac.ir/article_5345_8a81504090e90c4b6e393f12f9f98f8a.pdf
2021-07-01
2069
2083
10.22075/ijnaa.2021.5345
Customer experience
Brand
Word of mouth
Phenomenology
Shaghayegh
Shakiba Tabar
shakiba.tabar123@gmail.com
1
Department of Business Management, Tehran Central Branch, Islamic Azad University, Tehran, Iran.
AUTHOR
Sina
Nematizadeh
sin.nematizadeh@iauctb.ac.ir
2
Department of Business Management, Tehran Central Branch, Islamic Azad University, Tehran, Iran.
LEAD_AUTHOR
Hamidreza
Saeidnia
drsaeednia1@gmail.com
3
Department of Business Management, Tehran North Branch, Islamic Azad University, Tehran, Iran
AUTHOR
ORIGINAL_ARTICLE
Epidemiological model Involving Two Diseases in Predator Population with Holling Type-II Functional Response
In this paper, two types of diseases in the predator population in an ecological model are proposed and analyzed. The first (SIS infectious disease) transmitted horizontally, spread by contact between susceptible individuals and infected individuals. And the second (SI disease) is transmitted vertically from mothers to offspring with the effect of an external source (environmental effect). No transmission of the diseases can happen from predator to prey by predation or contact. Linear functional response and Holing type-II for describing the predation of the susceptible and the infected predators respectively also linear incidence for describing the transition of diseases are used. All possible equilibrium points were analyzed for this model. Locally and globally dynamics of the model have been discussed, numerical simulation is used to investigate the effect of the diseases on the system’s dynamics.
https://ijnaa.semnan.ac.ir/article_5349_1e686a50855147594a9e9bd2411f81d3.pdf
2021-07-01
2085
2107
10.22075/ijnaa.2021.5349
Eco-epidemiological model
SI disease
SIS epidemic disease
Prey-predator model
Lyapunov function
Atheer Jawad
Kadhim
100023@uotechnology.edu.iq
1
Department of applied science, University of technology, Iraq
LEAD_AUTHOR
Azhar A.
Majeed
azhar_abbas_m@scbaghdad.ed
2
Department of mathematics, College of Science, University of Baghdad, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Testing and fitting a Maskan bank marketing model using an integrated supply chain approach in the construction and housing industry
Maskan Bank is one of the state-owned banks with a wide range of banking services, including financing for housing and construction, financing plans of the government development programs in housing development, inclusive public banking services to conduct its inherent mission, and banking businesses requiring financing from standard methods and banking marketing. This research aimed to provide Maskan bank marketing model using an integrated supply chain approach considering the financial and credit turnover in the construction and housing industry. The Grounded theory strategies, including reading documents, in-depth interviews with experts and extracting concepts, and open, axial, and selective coding, were used in the qualitative section using the mixed method. Then, a paradigm model was presented with 6 dimensions and 42 components. The descriptive survey method was used in the quantitative part, and PLS software was used to test the proposed model. The results were confirmed and fitted in a model for Maskan bank marketing using an integrated supply chain approach in the construction and housing industry.
https://ijnaa.semnan.ac.ir/article_5350_fdee193b8108b3c47ac6e19b5c34985a.pdf
2021-07-01
2109
2129
10.22075/ijnaa.2021.5350
supply chain
Construction and housing industry
Banking marketing model
Grounded theory
Integrity
Mohammad Amir
Keramat
amir.keramat@gmail.com
1
Department of Business Administration, North Tehran Branch, Islamic Azad University, Tehran, Iran.
AUTHOR
Hamidreza
Saeednia
dr.saeednia1@gmail.com
2
Department of Business Administration, North Tehran Branch, Islamic Azad University, Tehran, Iran.
LEAD_AUTHOR
Zahra
Alipour Darvishi
alipourdarvish.z@gmail.com
3
Department of Public Administration, North Tehran Branch, Islamic Azad University, Tehran, Iran.
AUTHOR
Mohammad Ali
Dehghan Dehnavi
dehghandehnavi@atu.ac.ir
4
Department of Finance and Banking, Allameh Tabataba’i University, Tehran, Iran.
AUTHOR
ORIGINAL_ARTICLE
On first excess level analysis of hysteretic bilevel control queue with multiple vacations
In this article, we consider queueing model with bilevel hysteretic control and multiple vacations. This system's mechanism depends on the queue size and the facility where the server goes to the series of vacation trips when the line is empty and returns but waiting in the system when the number of units is more than level \(M\). In this case, the server doesn't start a new busy period unless this size is more than another level \(N > M\). Furthermore, we employ N-policy and first excess level analysis to derive the probability generating function of queue size. Additionally, we assume that the vacation times are exponentially distributed random variables, and arrival batches are type 1 geometrically distributed random variables.
https://ijnaa.semnan.ac.ir/article_5354_a912424497d78f8e9bb1f57abbf15c94.pdf
2021-07-01
2131
2144
10.22075/ijnaa.2021.5354
hysteretic control
multiple vacations
N-policy
first excess level theory
input batches
bulk input
marked delayed renewal process
delayed renewal process
point process
marked point process
random walk
Ekram
Ali
ikram.zahra@student.uobabylon.edu.iq
1
Department of Mathematics, College of Education for Pure Sciences, University of Babylon, Iraq
LEAD_AUTHOR
Ali
Al-Obaidi
aalobaidi@uobabylon.edu.iq
2
Department of Mathematics, College of Education for Pure Sciences, University of Babylon, Iraq
AUTHOR
ORIGINAL_ARTICLE
q-homotopy analysis method for solving nonlinear Fredholm integral equation of the second kind
Several scientific and engineering applications are usually described as integral equations. We propose a numerical approach for solving the type of Fredholm nonlinear boundary value problems in a finite domain. The paper aims to use the q-homotopy analysis method to estimate the solution to test the efficiency of the proposed method. Comparison with updated work is exacted. The obtained results show that the proposed method is very effective and convenient for nonlinear Fredholm integral equations. The interval of convergence of homotopy analysis method, if exists, is increased when using q-homotopy analysis method is more to converge. The result reveals that the q- homotopy analysis method is considered a good method for solving NFIES.
https://ijnaa.semnan.ac.ir/article_5355_cc5eabcc7ea6fc1d50cae8968359452d.pdf
2021-07-01
2145
2152
10.22075/ijnaa.2021.5355
Nonlinear Integral equation
Fredholm Integral equation of the second kind
q-homotopy analysis method
Rajaa
Karim Jbr
rajaak.alebrahimi@student.uokufa.edu.iq
1
Faculty of Mathematics and Computer Science, University of Kufa, Iraq
AUTHOR
Adil
AL-Rammahi
adilm.hasan@uokufa.edu.iq
2
Faculty of Mathematics and Computer Science, University of Kufa, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
More on the Hermit-Hadamard inequality
In this article, we introduce the notion of $(h,k)$-convex functions and their operator form. Moreover, we derive Hermite–Hadamard-type, and Fejer-type inequalities for this class.
https://ijnaa.semnan.ac.ir/article_5357_8cc55973f8ab67ada792a53d184e8fa9.pdf
2021-07-01
2153
2159
10.22075/ijnaa.2021.21753.2293
Convex functions
Hermite-Hadamard inequality
Operator convex functions
Mahmoud
Hassani
mhassanimath@gmail.com
1
Department of Mathematics, Mashhad Branch, Islamic Azad University, Mashhad, Iran
LEAD_AUTHOR
Mehdi
Eghbali Amlashi
amlashi@mshdiau.ac.ir
2
Department of Mathematics, Mashhad Branch, Islamic Azad University, Mashhad, Iran
AUTHOR
ORIGINAL_ARTICLE
Reducing explicit word vectors dimensions using BPSO-based labeling algorithm and voting method
Interpretability of word vector components is very important for obtaining conceptual relations. Word vectors derived from counting models are interpretable but suffer from the high-dimensionality problem. Our goal in this study is to obtain interpretable low-dimensional word vectors in such a way that the least accuracy loss occurs. To achieve this goal, we propose an approach to reduce the dimensions of word vectors using a labeling method based on the BPSO algorithm and a voting method for selecting final context words. In this approach, we define several different base models to solve the labeling problem using different data and different objective functions. Then, we train each base model and select 3 of the best solutions for each model. We create the target word vectors of the dictionary based on the context words labeled "1". Next, we use the three best solutions of each base model to build the ensemble. After creating the ensemble, we use the voting method to assign the final label to the primary context words and select N final context words. In this study, we use the corpus ukWaC to construct word vectors. We evaluate the resulting word vectors on the MEN, RG-65, and SimLex-999 test sets. The evaluation results show that by reducing the word vectors dimensions from 5000 to 1507, the Spearman correlation coefficient of the proposed approach has been reduced to a lesser extent compared to each base model. Therefore, the accuracy drop of the proposed approach is justified after reducing the dimensions from 5000 to 1507. It is not a large penalty because the resulting word vectors are low-dimensional and interpretable.
https://ijnaa.semnan.ac.ir/article_5363_886f093beed888002029dd1a2fb9b04c.pdf
2021-07-01
2161
2178
10.22075/ijnaa.2021.5363
Explicit word vectors
Voting method
Objective function
Binary particle swarm optimization
Labeling method
Atefe
Pakzad
a_pakzad@comp.iust.ac.ir
1
School of Computer Engineering, Iran University of Science and Technology,Tehran, Iran.
AUTHOR
Morteza
Analoui
analoui@iust.ac.ir
2
School of Computer Engineering, Iran University of Science and Technology,Tehran, Iran.
LEAD_AUTHOR
ORIGINAL_ARTICLE
Fraud usage detection in internet users based on log data
The Internet has become one of the most important daily social, financial and other activities. The number of customers who use the Internet to conduct their business and purchases is very large. This results in billions of dollars being transferred every day online. Such a large amount of money attracts the attention of cybercriminals to carry out their illegal activities. “Fraud” is one of the most dangerous of these methods, especially phishing, where attackers try to steal user credentials using fraudulent emails, fake websites, or both. The proposed system in this paper includes efficient data extraction from the web file through data collection and preprocessing. and web usage mining procedure to extract features that demonstrate user behavior. And feature-extracting URL analysis to detect website phishing addresses. After that, the features from the above two parts are combined to make the number of features sixty-three. Finally, a classification algorithm (Random Forests) is applied to determine if website addresses are phishing or legitimate. Suggested algorithms performance is determined by using a confusion matrix that shows the robustness of the proposed system.
https://ijnaa.semnan.ac.ir/article_5367_08b97c81b9686427036222eab02240cf.pdf
2021-07-01
2179
2188
10.22075/ijnaa.2021.5367
Fraud
Phishing
Legitimate Weblog
phishing Log Data
Kareem
Ibrahim
karimk.aljabri@student.uokufa.edu.iq
1
Faculty of Computer Science and Mathematics, University of Kufa, Iraq.
LEAD_AUTHOR
Ahmed
Obaid
ahmedj.aljanaby@uokufa.edu.iq
2
Faculty of Computer Science and Mathematics, University of Kufa, Iraq.
AUTHOR
ORIGINAL_ARTICLE
Trust based blockchain security management in edge computing
In this paper, an analysis is conducted on the data transmitted through the edge computing technique. The research creates a trust model that establishes direct, indirect, and mutual trust between the source and destination blocks when data is sent. That is, the study integrated blockchain as a model to transmit the data in a secured way through the blockchains, however, the intrusion in blockchains can be avoided based on trust based model. The simulation is conducted on various testbeds and with existing blockchain mechanisms. The findings reveal that the suggested trust-based paradigm is successful at safeguarding data sent over the edge.
https://ijnaa.semnan.ac.ir/article_5368_ca7d7ee2961edfa688c6ff2768b060bd.pdf
2021-07-01
2189
2197
10.22075/ijnaa.2021.5368
MANET
Secured routing
Behavioural Trust Detection
Trust Degree
D.
Jayakumar
jayakumarifetd@gmail.com
1
Department of CSE, IFET College of Engineering, Villupuram, India
LEAD_AUTHOR
K.
Kumar
santhosh09539@gmail.com
2
Department of IT, Annamalai University, Chidambaram, India
AUTHOR
R.
Sathya
sathya_vai@yahoo.com
3
Department of CSE, Annamalai University, Chidambaram, India
AUTHOR
ORIGINAL_ARTICLE
Intrusion detection in computer networks using a cost sensitive ensemble classifier
The growing use of Internet technology and the attack on computer networks have made intrusion detection systems an essential part of computer security. Conventional intrusion control methods such as firewalls or access control systems are no longer alone able to withstand attacks. Therefore, the need to detect new attacks and anomalies is inevitable. The dataset used in this paper is called NSL-KDD which includes 5 classes: one of them is normal and the other four classes are attacks. In the presented work, an ensemble classifier based on the mean probability of attacks is adopted. The true detection rate of the proposed system is $99.89\%$ which is more than other competing methods. Moreover, the ensemble classifier achieved an F1-measure of $92.48\%$. To improve the F1 measure, we used a meta-classifier called meta-cost which incorporates a cost matrix to transform the original classifier into a cost-sensitive classifier. By this idea, we achieved an F1-measure of $94.1\%$ which outperforms than non-cost sensitive ensemble classifier. These results show that the proposed system can be used as a suitable defence tool to detect intrusion against cyber-attacks.
https://ijnaa.semnan.ac.ir/article_5369_12405a7aedcf3d5e17820def71e793f2.pdf
2021-07-01
2199
2206
10.22075/ijnaa.2021.5369
Alaa
Mahmood
alaa.thamer@mtu.edu.iq
1
Technical Instructors Training Institute, Middle Technical University, Baghdad, Iraq.
LEAD_AUTHOR
Raed
Kamil Naser
ayhar_2013@yahoo.com
2
Administration Directorate, Ministry of Defense, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
The impact of alternative resources and fear on the dynamics of the food chain
In this paper, a three-species food chain model is proposed and studied. It is assumed that there are fear costs in the first two-level due to predation risk and there exists an alternative source of food for a top predator. Holling’s disc function is adopted to describe the food transition throughout the chain. All the solution properties are discussed. The conditions of local stability and persistence of the model are established. The Lyapunov function is used to specify the basin of attraction for each equilibrium. Local bifurcation analyses are studied. The global dynamics of the model are investigated numerically. Different bifurcation diagrams and attractors are obtained. It is obtained that the system is rich in dynamics that include chaos.
https://ijnaa.semnan.ac.ir/article_5370_80fe199998038a07580ebe9a2b928ac1.pdf
2021-07-01
2207
2234
10.22075/ijnaa.2021.5370
Food chain
Alternative resource
Fear
stability
Bifurcation
Chaos
Aseel.
Abd
aseel.hussein1203@sc.uobaghdad.edu.iq
1
Department of Mathematics, College of Science, University of Baghdad, Baghdad, Iraq
LEAD_AUTHOR
Raid
Naji
rknaji@gmail.com
2
Department of Mathematics, College of Science, University of Baghdad, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Analysis of a harvested discrete-time biological models
This work aims to analyze a three-dimensional discrete-time biological system, a prey-predator model with a constant harvesting amount. The stage structure lies in the predator species. This analysis is done by finding all possible equilibria and investigating their stability. In order to get an optimal harvesting strategy, we suppose that harvesting is to be a non-constant rate. Finally, numerical simulations are given to confirm the outcome of mathematical analysis.
https://ijnaa.semnan.ac.ir/article_5371_9f24d831d49f7e2782f53acc9ffc07da.pdf
2021-07-01
2235
2246
10.22075/ijnaa.2021.5371
Prey-predator model
Optimal control
Stage structure model
optimal Harvesting
Sadiq
Al-Nassir
sadiq.n@sc.uobaghdad.edu.iq
1
Department of Mathematics, College of Science, University of Baghdad, Baghdad, Iraq
LEAD_AUTHOR
Alaa
Lafta
alaa.h@sc.uobaghdad.edu.iq
2
Department of Mathematics, College of Science, University of Baghdad, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Forecasting enhancement using a Hodrick-Prescott filter
Sound forecasts are essential elements of planning, especially for dealing with seasonality, sudden changes in demand levels, strikes, large fluctuations in the economy, and price-cutting manoeuvres for competition. Forecasting can help decision-makers to manage these problems by identifying which technologies are appropriate for their needs. The proposal forecasting model is utilized to extract the trend and cyclical component individually through developing the Hodrick--Prescott filter technique. Then, the fit models of these two real components are estimated to predict the future behaviour of electricity peak load. Accordingly, the optimal model obtained to fit the periodic component is estimated using spectrum analysis and the Fourier model, and the expected trend is obtained using simple linear regression models. Actual and generation data were used for the performance evaluation of the proposed model. The results of the current model, with improvement, showed higher accuracy as compared to ARIMA model performance.
https://ijnaa.semnan.ac.ir/article_5372_caf7f63263e4c87fde6b97dac5d51095.pdf
2021-07-01
2247
2262
10.22075/ijnaa.2021.5372
Forecasting
Spectrum Analysis
Hodrick-Prescott Filter
Aseel
Mohamed
aseelsameer@kmc.uobaghdad.edu.iq
1
Family and Community Medicine Department, Al Kindy Medical College, University of Baghdad, Iraq
LEAD_AUTHOR
Nooriya
Mohammed
nooria.abed@gmail.com
2
Planning and Studies Office, Ministry of Electricity, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Suggested methods for prediction using semiparametric regression function
Ferritin is a key organizer of protected deregulation, particularly below risky hyperferritinemia, by straight immune-suppressive and pro-inflammatory things. We conclude that there is a significant association between levels of ferritin and the harshness of COVID-19. In this paper, we introduce a semi-parametric method for prediction by making a combination of NN and regression models. So, two methodologies are adopted, Neural Network (NN) and regression model in designing the model; the data was collected from a nursing home hospital for period 11/7/2021- 23/7/2021, the sample size is 100 covid positive patients with 12 females \& 38 males out of 50, while 26 female \& 24 male are non-COVID out of 50. The input variables of the NN model are identified as the ferritin and a gender variable. The higher results precision is attained by the multilayer perceptron (MLP) networks when we applied the explanatory variables as the inputs with one hidden layer, which covers 3 neurons, as the planned many hidden layers are with one output of the fitting NN model which is used in stages of training and validation beside the actual data. We used a portion of the actual data to verify the behavior of the developed models, we find out that only one observation is a false predictive value. This means that the estimation model has significant parameters to forecast the type of Covid cases (Covid or no Covid).
https://ijnaa.semnan.ac.ir/article_5373_55921c1087ba54db17730104dfd587fb.pdf
2021-07-01
2263
2267
10.22075/ijnaa.2021.5373
Semi-parametric method
Neural Network models (NN)
regression
Ferritin level
Covid 19
multilayer perceptron (MLP)
Aseel
Mohamed
aseelsameer@kmc.uobaghdad.edu.iq
1
Family and Community Medicine Department, Al Kindy Medical College, University of Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
A proposed method for cleaning data from outlier values using the robust RFCH method in structural equation modeling
The GLS and ML methods are the most common methods for estimating SEM but require multivariate normality. Therefore, methods robust to standard errors and quality of fit indexes to Chi-square have been proposed: MLR and they are considered superior to ML and GLS methods analyzing ordinal data. When we have a five-way Likert scale, the data is treated as continuous by calculating the covariance matrix as inputs for ML, GLS, and MLR. However, outliers are familiar because modeling requires a large sample size, either because of the input of data or answers more than is expressed within a particular category. Their presence affects even methods with robust corrections, where the accuracy of estimating parameters, standard errors, and fit indicators may be compromised the quality of fit indexes and inappropriate solutions, where a robust algorithm is proposed to clean the data from the outlier, as this proposed algorithm calculates the robust correlation matrix robust RFCH Reweighted Fast Consistent and High Breakdown, which consists of several steps and has been modified by taking the clean data before calculating the robust RFCH correlation matrix. It was also suggested to make a comparison between the three methods before the treatment process with the presence of outlier values and note the extent of their impact on the methods and after using the robust RFCH method, and note the extent of improvement in estimations, standard errors and the overall quality of fit indexes for each of the Chi-square index, CFI, TLI, and RMSEA, SRMR and CRMR, with the robust corrections in the Chi-square index for each of the methods MLR. Through the simulation experiment, the researcher reached the power of the proposed method robust RFCH in improving the quality of parameter estimation, standard errors, and overall fit indexes quality.
https://ijnaa.semnan.ac.ir/article_5374_2d94cb42f8cc3bfe0781405d7c4c8e04.pdf
2021-07-01
2269
2293
10.22075/ijnaa.2021.5374
outlier
robust RFCH
SEM
fit indexes
methods estimation
Omar
Ibrahim
omarsalim85@uomosul.edu.iq
1
College of Computer science and Mathematics, Mosul University, Mosul, Iraq
LEAD_AUTHOR
Mohammed
Mohammed
m.jasim@coadec.uobaghdad.edu.iq
2
Statistics Department, College of Administration and Economics, University of Baghdad, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Option for optimal extraction to indicate recognition of gestures using the self-improvement of the micro genetic algorithm
The hearing-impaired community uses gestures to communicate. Gestures can also be used in interactions between man and computer. However, gestures become increasingly complicated in a comparatively complex environment. A recognition algorithm with a choice of function based on the improved genetic algorithm is proposed to improve the ability to identify gestures. The recognition process includes retailing, extraction, and feeding functions before classifying the neural network. After learning gestures, the proposed method is compared with traditional methods that use the classic genetic algorithm. The proposed method demonstrates the effect of optimization and sensitivity of the function.
https://ijnaa.semnan.ac.ir/article_5375_05f0eb44f0a2e8ceec977cf05ac6d668.pdf
2021-07-01
2295
2302
10.22075/ijnaa.2021.5375
Adaptive filter
feature extraction
Genetic algorithm
sign language recognition
speeded-up robust feature (SURF)
Bassam
Sabri
bassam.ali@uoitc.edu.iq
1
Department of Business Information Technology, College of Business Informatics, University of Information Technology and Communications, Baghdad, Iraq
LEAD_AUTHOR
Noaman
Yaseen AL-Falahi
noaman_2000@yahoo.com
2
Director of Price Control and Service Quality Department, Chief programmer, Iraqi Ministry of Communications, Baghdad, Iraq
AUTHOR
Isam
Salman
isamadel200071@gmail.com
3
Associate Director of the Software Department, Senior chief of Programs, Iraqi Ministry of Communications, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Energy Aware Multi Objective Algorithm for Task Scheduling on DVFS-Enabled Cloud Datacenters using Fuzzy NSGA-II
Nowadays, energy consumption is curtailed in an effort to further protect the environment as well as to avoid service level agreement (SLA) breach, as critical issues in task scheduling on heterogeneous computing centers. Any reliable task scheduling algorithm should minimize energy consumption, makespan, and cost for cloud users and maximize resource utilization. However, reduction of energy consumption leads to larger makespan and decreases load balancing and customer satisfaction. Therefore, it is essential to obtain a set of non-domination solutions for these multiple, conflicting objectives, as a non-linear, multi-objective, NP-hard problem. This paper formulates the energy efficient task scheduling in green data centers as a multi-objective optimization problem so that fuzzy Non-dominated Sorting Genetic Algorithm 2 (NSGA-II) has been applied using the concept of Dynamic Voltage Frequency Scaling (DVFS). In this procedure, we adopted fuzzy crossover and mutation for optimal convergence of initial solutions. For this purpose, the binary variance function of gene values and the mean variance function of objective values are proposed for fuzzy control of mutation rate, increasing the variation in the optimal Pareto front as well as the correct frequency variance function of the processors engaged in scheduling to control the crossover rate. This serves to add the objective of indirect load balancing to the optimization objectives, thereby to replace the three-objective optimization process with four-objective optimization. In the experiments, the proposed NSGA-II with fuzzy algorithm is compared against the NSGA-II algorithm, involving three scheduling strategies namely Green, Time and Cost Oriented Scheduling Strategy. The simulation results illustrate that the newly method finds better solutions than others considering these objectives and with less iteration. In fact, the optimal Pareto solutions obtained from the proposed method improved the objectives of makespan, cost, energy and load balance by 4%, 17%, 1% and 13%, respectively.
https://ijnaa.semnan.ac.ir/article_4666_9e091c5c1f1fa05d6c5b9b45247e55af.pdf
2021-07-01
2303
2331
10.22075/ijnaa.2020.21625.2283
Green Computing
Multi Objective Optimization
Pareto solutions
DVFS
Task Scheduling
Saeed
Fatehi
saeed.fatehi62@yahoo.com
1
Department of Computer Engineering, Babol Branch, Islamic Azad University, Babol, Iran
AUTHOR
Homayun
Motameni
h_motameni@yahoo.com
2
Department of Computer Engineering, Sari Branch, Islamic Azad University, Sari, Iran
LEAD_AUTHOR
Behnam
Barzegar
barzegar.behnam@yahoo.com
3
Faculty member, Department of Computer Engineering, Babol Branch, Islamic Azad University, Babol, Iran
AUTHOR
Mehdi
Golsorkhtabaramiri
golesorkh@baboliau.ac.ir
4
Faculty member, Department of Computer Engineering, Babol Branch, Islamic Azad University, Babol, Iran
AUTHOR
ORIGINAL_ARTICLE
Impact of renewable energy sources integration with power grid systems through several methodology's
This paper is primarily committed to three primary angles concerning photovoltaic based DG. The fundamental perspective being the reduction of influence changes in daylight based photovoltaic and the Reduction of influence distribution in the framework of the system. According to the unpredictable changes credited to the wide range of sun situated radiations. Further, the sizing related issues and region of an SPV based DG may cause a ton of influence concerns effecting the overall DG system operation and its efficiency. The second region of concern is the method used in the control of the DG and its feasibility to diminish framework influence issues. Another area of concern is network interconnection, through the appropriate introduction of RES into the ordinary grid for supportable and stable activity. This has been managed through an extensive contextual analysis of an operational system.
https://ijnaa.semnan.ac.ir/article_5377_5ba9df16495929bdca4cc40b95a294bc.pdf
2021-07-01
2333
2344
10.22075/ijnaa.2021.5377
Renewable Energy
power grid system
Energy management
energy efficiency
Omar
AlKawak
o0maar@yahoo.com
1
Department of Air Conditioning and Refrigeration Technical Engineering, Al-Mustaqbal University College, Hilla, Babil, Iraq
LEAD_AUTHOR
Ali
Ramul
ali.rashid@mustaqbal-college.edu.iq
2
Computer Techniques Engineering Department, Al-Mustaqbal University College, Hilla, Babil, Iraq
AUTHOR
ORIGINAL_ARTICLE
Hybrid encryption using playfair and RSA cryptosystems
The security is demanded to transport important data over the network. In this work a hybrid encryption depending on playfair cipher and RSA algorithm is proposed to give more confidentially and get rid of the defects of the two methods. The first cipher text is obtained by playfair cipher by using (812) expanded key matrix that is filled by decimal ASCII characters of Alphabets, numbers and common characters of ASCII table while the final cipher text is obtained by RSA cryptosystem by applying it for blocks of two characters. The proposed hybrid encryption avoids to take large numbers in RSA algorithm and performs complex operations that need a long time to do. The proposed hybrid cipher is tight security that is difficult to analyze and detect from hackers and intruders.
https://ijnaa.semnan.ac.ir/article_5379_7c84af3599a1bda7657884192e5fcc0c.pdf
2021-07-01
2345
2350
10.22075/ijnaa.2021.5379
Playfair
RSA algorithm
ASCII and Hybrid encryption
Raghad K.
Salih
raghad.k.salih@uotechnology.edu.iq
1
Department of Applied Sciences, Mathematics and Computer Applications, University of Technology, Baghdad, Iraq
LEAD_AUTHOR
Madeha Sh.
Yousif
madeha.s.yousif@uotechnology.edu.iq
2
Department of Applied Sciences, Mathematics and Computer Applications, University of Technology, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
On approximation by Szasz-Mirakyan-Schurer-Kantrovich operators preserving $e^{−bx}, b > 0$
Through this treatise, a study has been submitted about modified of Szasz-Mirakyan-Schurer-Kantrovich operators which that preserving \(e^{- bx\ },b > 0\) function. We interpret and study the uniform convergence of the modern operators to \(\text{\ f}\). Also, by analyzing the asymptotic conduct of our operator.
https://ijnaa.semnan.ac.ir/article_5380_5e1be17e80fe1ae43e92177d7cf88fdb.pdf
2021-07-01
2351
2358
10.22075/ijnaa.2021.5380
Szasz-mirakyan-kantorovich operators
Exponential function
linear positive operators
Abdulsattar
Ali Hussein
edw.abdulsattar@uoanbar.edu.iq
1
aUniversity of Anbar, Education College for women, Ramadi, Iraq
LEAD_AUTHOR
Alaa Adnan
Auad
alaa.adnan66.aa@gmail.com
2
University of Anbar, Education College for pure science, Department of Mathematics, Ramadi, Iraq
AUTHOR
ORIGINAL_ARTICLE
Inclined magnetic field and heat transfer of asymmetric and Porous Medium Channel on hyperbolic tangent peristaltic flow
The present study deal with the effective heat transfer with the activity of connected inclined magnetic field of the asymmetric channel through the porous medium. The effect of sliding speed on channel walls was taken into account and the effect of nonlinear particle size was analyzed applying long wavelength and low Reynolds count estimates. The mathematical expression of axial velocity, stream function and pressure rise was analytically determined. The effect of the physical parameter is included in the present model on the computational results. They are presented in chart form by applying for the Mathematica program.
https://ijnaa.semnan.ac.ir/article_5382_78756614742d39a947a2980a1f48af88.pdf
2021-07-06
2359
2372
10.22075/ijnaa.2021.5382
Inclined magnetic felid
Hyperbolic tangent
heat transfer and peristaltic flow
Shahad Ali
Abdulla
ggha79391@gmail.com
1
Department of Mathematic, University of Baghdad, Baghdad, Iraq
LEAD_AUTHOR
Liqaa Zeki
Hummadya
liqaa.hummady@sc.uobaghdad.edu.iq
2
Department of Mathematic, University of Baghdad, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Some results on fuzzy soft sesquilinear functional
In this paper, we study and discussion new kinds of Sesquilinear functional which is fuzzy soft Sesquilinear functional and given some properties with characterization and also theories related on fuzzy soft Sesquilinear functional have been given. Additionally, we present the relationship between this kind and other kinds
https://ijnaa.semnan.ac.ir/article_5381_a389373d51ec0399a6661d59e8d2b81c.pdf
2021-07-01
2373
2382
10.22075/ijnaa.2021.5381
Fuzzy soft set
fuzzy soft Hilbert space
fuzzy soft adjoint operator
Salim Dawood
Mohsen
salim78@uomustansiriyah.edu.iq
1
Mustansiriyah University, College of Education, Baghdad-Iraq
AUTHOR
Jaafer Hmood
Eidi
drjaffarmath@uomustansiriyah.edu.iq
2
Mustansiriyah University, College of Education, Baghdad-Iraq
LEAD_AUTHOR
ayed
hashoosh
ayed197991@yahoo.com
3
Thi-Qar University, College of Education of Pure Sciences, Iraq
AUTHOR
ORIGINAL_ARTICLE
Application of Nonlinear Mathematical Modeling in Panel data analyses of the pecking order theory in capital structure Using Multiple Regression: Evidence from the Tehran Stock Exchange
Financing decisions for investment are one of the important tasks of the company in determining the best composition. On the other hand, how to finance the company’s assets for individuals and institutions is important, and how much debt and stocks the company has used to finance its assets, is important because it depends on the company’s financing decisions will be affected. This study investigates the application of nonlinear mathematical modeling in panel data analyses of the pecking order theory in capital structure using multiple regression in the Tehran stock exchange. The research period is from 2014 to 2019. In this research, panel data regression has been used to test the hypotheses. To collect information and data, the library method, and to test the research hypotheses, panel data and panel analysis using multiple regression have been used. The main hypothesis of this research is based on the fact that in order to Management decisions about the optimal capital structure of the company can be based on the theory model of the pecking order. In the results of this study, it seems that the companies in question to finance themselves, in fact, follow the mathematical model used in the theory of pecking order.
https://ijnaa.semnan.ac.ir/article_5376_be40db5c9a2a801434be706f2138cb7d.pdf
2021-07-01
2383
2401
10.22075/ijnaa.2021.5376
Capital structure
financial deficit
Nonlinear statistical model of pecking order theory
Amin
Heydari
amin.heydariii@gmail.com
1
Department of Accounting, Borujerd Branch, Islamic Azad University, Borujerd, Iran
AUTHOR
Mahmoud
Hematfar
dr.hemmatfar@gmail.com
2
Department of Accounting, Borujerd Branch, Islamic Azad University, Borujerd, Iran.
LEAD_AUTHOR
Mohammad Hassan
Janani
mhjanani@yahoo.com
3
Department of Accounting, Boroujerd branch, Islamic Azad University, Boroujerd, Iran.
AUTHOR
ORIGINAL_ARTICLE
Automated prediction of endometriosis using deep learning
Endometriosis is the anomalous progress of cells at the outer part of the uterus. Generally, this endometrial tissue stripes the uterine cavity. The existence of endometriosis is identified through procedures known as Transvaginal Ultra Sound Scan (TVUS), Magnetic Resonance Imaging (MRI), Laparoscopic procedures, and Histopathological slides. Minimal Invasive Surgery (MIS) Laparo-scopic images are recorded in a small camera. To assist the surgeon in identifying their presence of endometriosis, image quality (characteristics) was enhanced for more visual clarity. Deep learning has the ability in recognising the images for classification. The Convolutional Neural Networks (CNNs) perform classification of images on large datasets. The proposed system evaluates the performance by a novel approach that implements the transfer learning model on a well-known architecture called ResNet50. The proposed system train the model on ResNet50 architecture and yielded a training accuracy of 91%, validation accuracy of 90%, precision of 83%, and recall of 82%, which can be applied for larger datasets with better performance. The presented system yields higher Area Under Curve (AUC) of about 0.78. The proposed method yields better performance using ResNet50 compared to other transfer learning techniques.
https://ijnaa.semnan.ac.ir/article_5383_e1f2eec1fdb3f3493b9c64abbc35ab60.pdf
2021-07-01
2403
2416
10.22075/ijnaa.2021.5383
TVUS
MRI
Laparoscopic images Deep Learning
Convolution neural network (CNN)
Transfer learning
ResNet50
S
Visalaxi
sakthi6visa@gmail.com
1
Department of Computer Science and Engineering, Hindustan Institute of Technology and Science, Padur, Chennai, India.
LEAD_AUTHOR
T
Muthu
sudalaimuthut@gmail.com
2
Department of Computer Science and Engineering, Hindustan Institute of Technology and Science, Padur, Chennai, India.
AUTHOR
ORIGINAL_ARTICLE
Set-valued nonlinear contractive operators in $PM$-spaces
In this paper, we consider some nonlinear contraction for set-valued operators and prove some fixed point results in the case of set-valued operators are ordered-close and not ordered-close, and in the case of set-valued operators are UCAV (LCAV) in quasi-ordered $PM$-spaces. Moreover, we present two examples and an application to show the validity of the main theorems.
https://ijnaa.semnan.ac.ir/article_5385_e30c04fd1e3e59e0fb65f711cc6e7cac.pdf
2021-07-01
2417
2427
10.22075/ijnaa.2021.22375.2354
$PM$-spaces
quasi-ordered $PM$-spaces
ordered-close operator
Ehsan
Lotfali Ghasab
e.l.ghasab@gmail.com
1
Department of Mathematics, Shahid Chamran University of Ahvaz, Ahvaz, Iran.
AUTHOR
Hamid
Majani
majani.hamid@gmail.com
2
Department of Mathematics, Shahid Chamran University, of Ahvaz, Ahvaz, Iran
LEAD_AUTHOR
Erdal
Karapinar
erdalkarapinar@gmail.com
3
Faculty of Fundamental Science, Industrial University of Ho Chi Minh City, Ho Chi Minh, Vietnam, Department of Mathematics, C¸ankaya University, 06790, Etimesgut, Ankara, Turkey
AUTHOR
Ghasem
Soleimani Rad
gha.soleimani.sci@iauctb.ac.ir
4
Department of Mathematics, Faculty of Science, Central Tehran Branch, Islamic Azad University, P. O. Box 13185/768, Tehran, Iran &amp; Young Researchers and Elite club, Central Tehran Branch, Islamic Azad University, Tehran, Iran
AUTHOR
ORIGINAL_ARTICLE
Impact of early treatment programs on Swine flu infection with optimal controls: Mathematical model
This manuscript focuses on the impact of early treatment programs on swine flu disease transmission among the population. In this manuscript, a nonlinear Susceptible-Exposed-Infected-Recovered (SEIR) model with early Treatment programs are developed to examine the transmission dynamics of Swine flu infection with the help of the system of ordinary differential equations. The characteristics of the model are investigated by the basic reproduction number. We analyzed that the model exhibits using stability theory of differential equations, the disease-free equilibrium is linearly stable for R01. Also, conditions for non-linear stability are derived. Sensitivity indices for basic reproduction and also optimal control measures for swine flu are obtained. Further, numerical simulation for the model is supported by relevant graphs.
https://ijnaa.semnan.ac.ir/article_5386_a7b0e58d71867a076fc6ff66f4a10489.pdf
2021-07-01
2429
2451
10.22075/ijnaa.2020.18034.1980
Swine flu and Early Treatment Programs
SEIR Model
Basic Reproduction Number
stability
Sensitivity analysis
Optimal controls
Hema
Purushwani
hemapurushwani1985@outlook.com
1
Govt. Model Science college Gwalior (M.P.)
LEAD_AUTHOR
Chanda
Purushwani
chandapurushwani1987@outlook.com
2
Department of Mathematics, SOS, ITM University Gwalior (M.P.)
AUTHOR
Poonam
Sinha
poonamsinha_1968@yahoo.co.in
3
S. M. S. Govt Model Science College, Gwalior 474010, MP, India
AUTHOR
ORIGINAL_ARTICLE
Enhancement of Electro Hydraulic Position Servo Control System Utilising Ant Lion Optimiser
In this article, ant lion optimiser algorithm is proposed for resolve the working of the electro-hydraulic position servo control scheme on controlling in the general position when compared with local position like the mechanism of work that inspired from particle swarm optimization algorithm in additional to that servo valve contributed by ant lion optimizer algorithm that enhanced and improved the hydraulic cylinder working by using the conventional proportional integral derivative (PID) controller in utilize the optimized algorithm that works as attractive solution added as artificial intelligent algorithm to enhanced the proposed system to achieve best performance for the PID controller and the results analysis achieved for maximum overshooting, rising time, settling time 0 %, 0.020 (sec), 0.0115 (sec) respectively and this work is implemented using MATLAB Simulink
https://ijnaa.semnan.ac.ir/article_5387_384fa0d2dbcf5f025464dfabb8e80d0b.pdf
2021-07-01
2453
2461
10.22075/ijnaa.2021.5387
PID Controller
Ant Lion Optimizer
Electro Hydraulic Position Servo Control System
Optimization Algorithm
MATLAB
Hamzah
Marhoon
hamza@esraa.edu.iq
1
Department of Computer Techniques Engineering, Al-esraa University College, Baghdad, Iraq
LEAD_AUTHOR
Ahmed
Ibrahim
ahmedrashid@esraa.edu.iq
2
Department of Computer Techniques Engineering, Al-esraa University College, Baghdad, Iraq
AUTHOR
Noorulden
Basil
nooralden@esraa.edu.iq
3
Department of Computer Techniques Engineering, Al-esraa University College, Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Characteristics of penta-open sets in penta topological spaces
The aim of the presented study is to introduce and verify two new spaces called $\mathcal{P}\_$ compactness and $\mathcal{P}\_$connectedness using $\mathcal{P}\_$open sets and some of their properties. Moreover, we study the relationship between these spaces. Another purpose of this study is to examine a new form of separation axioms, by using $\mathcal{P}\_$open set namely $T_{\mathcal{P}i}$-spaces where $(i=0,1,2)$. The pertinence between them has been discussed and several features of these spaces are demonstrated as well.
https://ijnaa.semnan.ac.ir/article_5388_cde33a922034cb234fcd4dd96298812e.pdf
2021-07-01
2463
2475
10.22075/ijnaa.2021.5388
Penta Topological Space
$mathcal{P}_$irresolute function
$mathcal{P}_$compactness
locally $mathcal{P}_$compact
$mathcal{P}_$Connectedness
$mathcal{P}_$separated
strongly $mathcal{P}_$connected
$T_{mathcal{P}i}$-space
Rana
Yaseen
zain2016@tu.edu.iq
1
Department of mathematics, College of education for women, Tikrit University, Iraq.
LEAD_AUTHOR
Ali
Shihab
draliabd@tu.edu.iq
2
Department of Mathematics, College of Education for Pure Sciences, Tikrit University, Iraq.
AUTHOR
Mizal
Alobaidi
mizalobaidi@tu.edu.iq
3
Department of Mathematics, College of Computer Science and Mathematics, Tikrit University, Iraq.
AUTHOR
ORIGINAL_ARTICLE
Designing a system for identifying persons using 3d images
Nowadays, information security has become a very important and difficult matter. Security cameras are widespread in banks, ATMs, airports, universities, offices, and anywhere with a security system. The face recognition process is one of the most demanding image analysis and computer vision tasks. Faces are biometric systems that utilized a digital image of a person to identify or authenticate that person. This system is employed in the field of security. The face recognition system is required to detect and recognize the face in the image automatically. It works by extracting and then recognizing its attributes, irrespective of expression or illumination, transitions (translation, rotation and scaling of the image) and ageing, which is a difficult task. The proposed system records the facial features of the person standing in front of the camera, such as the size, position of the nose, eyes, jawbones, and cheekbones structure. This program also allows the user to evaluate and analyze the image. This system does not require long training for technicians because it is easy to use and gives quick and accurate results compared to biometric techniques the other. It is worth noting that Matlab roll was used in the design of this program.
https://ijnaa.semnan.ac.ir/article_5391_0b1f41a8b977754369abd4aade1c691b.pdf
2021-07-01
2477
2481
10.22075/ijnaa.2021.5391
Biometric techniques
ATMS: Automated Teller Machines
FR: Facial Recognition
Suad
Alwahab
suaad71computer@yahoo.com
1
Ministry of Education, Iraq
LEAD_AUTHOR
Hadeel
Nassr
jkh68@yahoo.com
2
Ministry of Education, Iraq
AUTHOR
Baydaa
Al-Khafaji
baydaa.khafaji@gmail.com
3
Computer Science Department College of Education for Pure Science/ Ibn Al-Haitham University of Baghdad, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Design and simulation of optical logic gates based on insulator - metal – insulator (IMI) plasmonic waveguides for optical communications
In this study, a structure has been proposed implementing the optical Plasmonic logic gates (OR, NOR, AND, NAND, NOT) using the linear Plasmonic waveguide and the double ring resonator. The results of these gates were analyzed and simulated by means of Comsol Multiphysics (5.6) using Finite Element Analysis (2-FEM). These gates were implemented in the same structure depending on the characteristic of constructive and destructive optical interference between the signals propagating in the input ports and the control port, the phase and direction of those signals, as well as the positions of these ports. Hence, the performance of these gates was measured according to two criteria, first, the optical transmission ratio and the second, the contrast ratio, which is the ratio between the transmitter ON state of logic (1) and OFF for logic (0).
https://ijnaa.semnan.ac.ir/article_5392_5e9134c9a7c9335a07dde2fff5037796.pdf
2021-07-01
2483
2497
10.22075/ijnaa.2021.5392
Optical logic gates
Plasmonic waveguide (IMI)
surface plasmon polarization (SSP)
Wissam
Jasim
wissam.abed@student.atu.edu.iq
1
Engineering Technical College-Najaf, Al-Furat Al-Awsat Technical University, 31001 Najaf, Iraq.
LEAD_AUTHOR
Faris
Ali
faris@atu.edu.iq
2
Engineering Technical College-Najaf, Al-Furat Al-Awsat Technical University, 31001 Najaf, Iraq.
AUTHOR
Ahmed
Abdullah
ahmedalbakri2012@atu.edu.iq
3
Engineering Technical College-Najaf, Al-Furat Al-Awsat Technical University, 31001 Najaf, Iraq.
AUTHOR
Mohammed
AbdulNabi
mohammeda.khaleel@uokufa.edu.iq
4
Kufa University, College of Engineering, Department of Electronics and Communications Engineering, 54003, Iraq.
AUTHOR
ORIGINAL_ARTICLE
Strategies and challenges of implementing social responsibilities based on compliance auditing banking services to stakeholders and its effect on reducing the gap between expectations
This study aimed to identify strategies for implementing social responsibility in banking services to stakeholders considering the compliance auditing and determine barriers. The Grounded Theory was used to develop the model, and banking experts were interviewed using a purposive sampling method to collect qualitative data. A total of 336 certified public accountants were selected in the quantitative part using a random sampling method. A questionnaire was used for data collection, and the analysis of variance (ANOVA) and t-test and Friedman test were used to analyze the data. The essential executive strategies were to increase welfare services proportional to the inflation rate to employees, implement a meritocracy system in the banking system, accept the workforce with government testing and supervision, increase actual stock returns and distributive profits, provide transparent, timely, and reliable information with simultaneous access for all, development of electronic banking, and justice in equal services to all customers with high quality and speed. In addition, the critical barriers were the lack of prioritizing compliance with social responsibilities at the top of organizational goals and the private or public nature of banks. Considering the confirmation of the five hypotheses, the compliance with social responsibilities in customer service had the most significant effect, and the other stakeholders service had the least effect in reducing the stakeholders’ expectation gap.
https://ijnaa.semnan.ac.ir/article_5398_f87862a2ceb0aa8341b36b1ddd6e50d2.pdf
2021-07-01
2499
2515
10.22075/ijnaa.2021.5398
Compliance audit
Bank social responsibilities
Expectation gap
Stakeholder interests
Mokhtar
Felehgari
felehgari.m1400@gmail.com
1
Department of Accounting, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran
AUTHOR
Babak
Jamshidinavid
jamshidinavid@gmail.com
2
Department of Accounting, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran
LEAD_AUTHOR
Mehrdad
Ghanbari
mehrdadghanbary@yahoo.com
3
Department of Accounting, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran
AUTHOR
Rohollah
Jamshidpour
r.jamshidpour@gmail.com
4
Department of Accounting, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran
AUTHOR
ORIGINAL_ARTICLE
On the existence of solutions for the variational inequality problem $V I(A, \psi, \phi,g;K)$
In this paper, we are concerned with the existence of a solution u 2 K for the variational inequality problem $ V I(A; \psi, \phi, g;K)$. Furthermore, we propose some conditions that ensure the well-posedness of this problem. We study an operator type $g - ql$ which extends the linear problem. Finally, we investigate the existence of solutions for general vector variational inequalities in the inclusion form.
https://ijnaa.semnan.ac.ir/article_5406_f1d6baba0d01f37c5f26484b19370a11.pdf
2021-07-01
2517
2529
10.22075/ijnaa.2021.23099.2477
variational inequality
Type $g-ql$
GKKM mapping
well-posedness
Approximating sequence and Value cone set
mohsen
alimohammadi
amohsen@umz.ac.ir
1
Department of Mathematics, University of Mazandaran, Babolsar, IRAN
LEAD_AUTHOR
Maysam
Gilak
m.hakimabadi@gmail.com
2
PhD student Mathematics department, University of Mazandaran, Babolsar, Iran
AUTHOR
ORIGINAL_ARTICLE
Weakly disk-cyclic mixing operators
It is known that there are disk-cyclic operators that are not satisfy the disk-cyclic criterion. This work introduce weakly disk-cyclic operators, which are kind of disk-cyclic operators, and study its relation with disk-cyclic criterion with several results and properties.
https://ijnaa.semnan.ac.ir/article_5407_b55065d6c8d6f778f71f2d907ae6487c.pdf
2021-07-01
2531
2537
10.22075/ijnaa.2021.5407
disk-cyclic
codisk-cyclic
mixing operators
weakly mixing operators
Rana
Abdulkareem
rorrana2013@gmail.com
1
Department of Mathematics, College of Education for Pure Science (Ibn Al Haitham), Baghdad University, Iraq
LEAD_AUTHOR
Zeana
Jamil
zina.z@sc.uobaghdad.edu.iq
2
Department of Mathematics, College of Science, Baghdad University, Iraq
AUTHOR
ORIGINAL_ARTICLE
Score for some groups \({SUT}(2, p)\)
The problem of finding the Artin character and Artin indicator for the groups \({SUT}(2, p)\), where \(p\)= 3, 5, 7 from the induced character from the cyclic subgroups for these groups determined in this work where \({SUT}(2, p)\) is the special upper triangular group.
https://ijnaa.semnan.ac.ir/article_5408_1e195ea729b99bb211a09b27fa119210.pdf
2021-07-01
2539
2543
10.22075/ijnaa.2021.5408
Artin character
Artin indicator
special upper triangular group
cyclic subgroups
Dunya
Hameed
dunya_mahamed@uomustansiriyah.edu.iq
1
Department of Mathematics, College of Education, Mustansiriyah University, Baghdad, Iraq
LEAD_AUTHOR
Ahmed
Mohsin
ahmed_almosawi@uomustansiriyah.edu.iq
2
Department of Mathematics, College of Education, Mustansiriyah University, Baghdad, Iraq
AUTHOR
Intidhar
Mushtt
intidhar.z.mushtt@uomustansiriyah.edu.iq
3
Department of Mathematics, College of Education, Mustansiriyah University, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Semi local hollow modules
To consider \(R\) is a commutative ring with unitary, \(X\) be a non--Zero unity left \(R - module\); \(X\) is known hollow module if each proper sub module of \(X\) is semi small local hollow module if \(X\) has a unique maximal submodule which contains each semi small submodule. The current study deals with this class of modules and give several fundamental properties related with this concept.
https://ijnaa.semnan.ac.ir/article_5409_5e3dc03d8e24c93bd4bd09a2796f21f3.pdf
2021-07-01
2545
2553
10.22075/ijnaa.2021.5409
Semi small submodules
Local hollow modules
Semi local hollow module
Nada
Abdullah
nada.khalid@tu.edu.iq
1
Department of Mathematics, College of Education for pure science, Tikrit university, Tikrit, Iraq
LEAD_AUTHOR
Nada
Mohammed
naya11415@tu.edu.iq
2
Department of Mathematics, College of Education for women, Tikrit university, Tikrit, Iraq
AUTHOR
ORIGINAL_ARTICLE
Analysis of the structural reliability of dental filling under the effect of mouthwash G.U.M
The application of structural reliability analysis has become very important to ensure the strength of the studied structural design, as it presents results that help in giving evidence about the acceptance of that design according to the materials used under specific operating conditions. In this research an experiment was done, to find out the effect of G.U.M mouthwash on cured and re-cured Visible Light Cured (VLC) composite dental filling material, made according to agreed international standards, where many studies have documented that the surface of restorative materials placed on the tooth may also be affected by the chemical effect of different types of oral health care products, and the experiment was analyzed mathematically by applying structural reliability analysis to know the probability of structural failure when dental filling were exposed to the mouthwash G.U.M (Operational conditions), using analysis technique: the D-vine copula. The results were that the probability of structural failure gave an indication from which to infer the extent to which the experiment was accepted or rejected.
https://ijnaa.semnan.ac.ir/article_5410_999eb1591da10146713fff59901f6d3d.pdf
2021-07-01
2555
2569
10.22075/ijnaa.2021.5410
structural reliability
Probability of structural failure
D-vine copula
mouthwash
dental filling
material
Lamiaa
Dawod
lamya.abd@mtu.edu.iq
1
College of Health and Medical Technology - Baghdad, Middle Technical University, Iraq
LEAD_AUTHOR
Entsar
Fadam
entsar_arebe@coadec.uobaghdad.edu.iq
2
College of Administration and Economics, Department of Statistics, University of Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Some Properties of $\delta$-integral with respect $\delta-$ fuzzy Measure
The $\delta$-integral with respect - $\delta$ - fuzzy measure has significant practical applications such as economic, data mining, etc. In this paper, we define $\delta$-fuzzy measure and studied the measurable function with respect to $\delta-$ fuzzy measure, also we defined an integration on a type of measurement, which is called the $\delta-$ integral because of its importance in many other applications, we studied the properties of this integration and proved some important theories, Besides that, the convergence theorems are studied and the obtained results are proved.
https://ijnaa.semnan.ac.ir/article_5411_0b83235d169eef613a59298f8014a5ad.pdf
2021-07-01
2571
2576
10.22075/ijnaa.2021.5411
$sigma-$ algebra
measurable function
$boldsymbol{delta}-$ fuzzy measure
$boldsymbol{delta}$-integral
Firas
Maghool
firas.maghool@qu.edu.iq
1
Department of Mathematics, College of Computer Science and Information Technology, University of Al-adisiyah, Iraq
AUTHOR
Zainb
Radhy
zainb.hassan@qu.edu.iq
2
Department of Mathematics, College of Computer Science and Information Technology, University of Al-Qadisiyah, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Organizational entrepreneurship barriers in sport organizations (IRI. Gymnastics Federation)
This paper aimed to identify the organizational entrepreneurship barriers of the Gymnastics Federation of the Islamic Republic of Iran. The mixed method and Brown and Clark method were used in the research. The population consisted of two sections, including gymnastics experts and university professors (180 people), and the sample size was 16 people based on the theoretical saturation index and 120 people based on the Cochran formula. Three structural 14, behavioral 13, and contextual barriers with 5 indicators were identified by qualitative data analysis. The research instrument in the quantitative part was a questionnaire that was extracted from the codes of the qualitative part using LISREL and SPSS software. The results confirmed the items and factors in the first and second confirmatory factor analysis tests. Three barriers were identified, and 32 indicators were obtained as the measurement tool. The model was fitted using the structural equation method (SEM) based on path coefficient and t-statistic. The effect of three independent variables was significant (1.00, 0.90, and 0.97), indicating the model’s high estimation power. The results showed that underlying barriers had the most significant effect on the failure of organizational entrepreneurship.
https://ijnaa.semnan.ac.ir/article_5420_0f5267e4c0bc1a0895274f1ac9173b4c.pdf
2021-07-01
2577
2588
10.22075/ijnaa.2021.5420
Sports organizations
Organizational entrepreneurship
Organizational entrepreneurship barriers
Seyed Taher
Alavy Namvar
taher.alavy@gmail.com
1
Department of Sport management, Faculty of Physical Education and Sport Sciences, Islamic Azad University, Tehran South Branch, Tehran, Iran.
AUTHOR
Ali Mohamad
Safania
a.m.safania@gmail.com
2
Department of Physical Education and Sport Science , Faculty of Humanities, Islamic Azad University, Science and Research Branch, Tehran, Iran.
LEAD_AUTHOR
Mohamad Reza
Boroumand
boroumand@sbu.ac.ir
3
Department of Sport management, Faculty of sport sciences and health, University of Shahid Beheshti, Tehran , Iran.
AUTHOR
Akbar
Afarinesh Khaki
akbarafarinesh@gmail.com
4
Department of Sport management, Faculty of Physical Education and Sport Sciences, Islamic Azad University, Tehran South Branch, Tehran, Iran.
AUTHOR
ORIGINAL_ARTICLE
On the $(4\nu,3)$-arcs in $PG(2,q)$ and the related linear codes
In this paper, we use an irreducible plane-cubic curves in the projective plane $PG(2,q)$ to construct (k,3)-arcs of size $4\nu$ where $\lceil \frac{q+1-2\sqrt{q}}{4}\rceil\leq\nu\leq\lfloor \frac{q+1+2\sqrt{q}}{4} \rfloor$. Each of these arcs gives rise to an error-correcting code that corrects the maximum possible number of errors for its length. Furthermore, we discuss the completeness of each arc. The isotropy subgroup of each arc are determined. All Griesmer codes that correspond to plane-cubic curves are given for $7\leq q\leq 37,q$ is a prime.
https://ijnaa.semnan.ac.ir/article_5430_71dc8c1547a3a5d4e42988384b6a1496.pdf
2021-07-01
2589
2599
10.22075/ijnaa.2021.5430
Cubic curves
Arcs
Projective plane
codes
stabilizer groups
Hanan J.
Al_Mayyahi
hanan.alhusayn.sci_@gmail.com
1
Department of Mathematics, College of Science, University of Basrah, Iraq
AUTHOR
Mohammed A.
Alabbood
mohna_l@yahoo.com
2
Department of Mathematics, College of Science, University of Basrah, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Energy efficient Q learning based Kullback sparse encoder for traffic and congestion control data delivery in WSN
In dense traffic Wireless Sensor Network (WSN), traffic congestion can increase routing overhead and packet loss, which restricts the entire network performance, therefore a traffic-aware and congestion-control data delivery is required to control the traffic. The proposed Energy-efficient Q-learning and Kullback Sparse Encoder (EQ-KSE) method is used for traffic-aware routing and congestion-control data delivery method for WSN. The method enforces a traffic balancing strategy using the energy-efficient reward function and estimates the wireless link quality by the Energy-efficient and Q-Learning Routing algorithm. On the basis of the estimation of each wireless link, the Energy-efficient Q-Learning based Traffic-aware Routing model makes routing decisions through energy and queue length to reduce routing overhead and time significantly. With the obtained optimal routes data aggregation are performed at the sink node, causing a proportionate amount of congestion. To handle this issue, a Kullback Leibler Sparse Auto Encoder (KL-SAE) Congestion-control Data Delivery method is proposed. This KL-SAE model with the aid of the reconstruction loss function, through divergence reduces the congestion, therefore contributing to packet loss, and packet delivery ratio. Simulation results show that EQ-KSE method performs traffic-aware routing by minimizing both the route selection time and overhead. In high node density scenarios, it also betters the state-of-the-art methods in packet delivery ratio and packet loss rate.
https://ijnaa.semnan.ac.ir/article_5440_cb142c579bf91935ebec0f9ac9f0460e.pdf
2021-07-01
2601
2618
10.22075/ijnaa.2021.5440
Wireless Sensor Network
Kullback Leibler
Sparse Auto Encoder
Traffic-aware
Congestion-control
Data Delivery
V
Narayanan
narayananvldass@gmail.com
1
Department of Computer Science, Karpagam Academy of Higher Education, Coimbatore – 21.Tamil Nadu, India
LEAD_AUTHOR
P
Selvan
tmselvanin@gmail.com
2
Department of Computer Science, Karpagam Academy of Higher Education, Coimbatore – 21.Tamil Nadu, India
AUTHOR
ORIGINAL_ARTICLE
Directed Power Graphs
In this article, first we introduce six types of power graphs related to a graph (or directed graph), with the help of set theory.Then we show that these newly defined power graphs are pairwise distinct by a few examples. Finally, we discuss the relation between Eulerian being the base graph and these six power graph types. Moreover, we express the relation between pairwise Eulerian of these power graphs.
https://ijnaa.semnan.ac.ir/article_5443_f26548e11331e16e65230d1a28c4646c.pdf
2021-07-01
2619
2657
10.22075/ijnaa.2021.5443
directed Euler tour
directed Euler path
cycle
directed graph
connected directed graph
directed power graph
Eulerian power graph
Elham
Mokhtarian Dehkordi
e.mokhtarian@semnan.ac.ir
1
Faculty of Mathematics, Statistics and Computer Science, Semnan University, Semnan, Iran
AUTHOR
Madjid
Eshaghi
meshaghi@semnan.ac.ir
2
Department of Mathematics, Semnan University, Iran
LEAD_AUTHOR
Sirous
Moradi
moradi.s@lu.ac.ir
3
Department of Mathematics, Faculty of science, Lorestan University, 68151-4-4316, Khorramabad, Iran
AUTHOR
Zahra
Yarahmadi
z.yarahmadi@khoiau.ac.ir
4
Department of Mathematics, Faculty of science, Khorramabad Branch, Islamic Azad University, Khorramabad, I. R. Iran
AUTHOR