ORIGINAL_ARTICLE
Solvability and numerical method for non-linear Volterra integral equations by using Petryshyn’s fixed point theorem
In this paper, utilizing the technique of Petryshyn’s fixed point theorem in Banach algebra, we analyze the existence of solution for functional integral equations, which includes as special cases many functional integral equations that arise in various branches of non-linear analysis and its application. Finally, we introduce the numerical method formed by modified homotopy perturbation approach to resolving the problem with acceptable accuracy.
https://ijnaa.semnan.ac.ir/article_5442_cf49c6b3330689fa675e605163b77c38.pdf
2022-01-01
1
28
10.22075/ijnaa.2021.22858.2422
Fixed point theorem
Measure of non-compactness(MNC)
Banach algebra
Functional integral equation(FIE)
Modified Homotopy perturbation(MHP)
Amar
Deep
amar54072@gmail.com
1
PDPM-IIITDM, Jabalpur 482005
AUTHOR
Ashish
Kumar
ashishgulia1992@gmail.com
2
Govt. PG college Bina 470113
AUTHOR
Syed
Abbas
abbas@iitmandi.ac.in
3
IIT, Mandi 175005
AUTHOR
Mohsen
Rabbani
mrabbani@iausari.ac.ir
4
Islamic Azad University,
LEAD_AUTHOR
ORIGINAL_ARTICLE
Analysis of Cholera model with treatment noncompliance
A model for transmission dynamics of cholera infection between human host and environment is developed. We incorporate the proportion of infectious individuals who do not comply with treatment into the human population. Stability analysis, as well as simulation of the model, is done. The results from the stability analysis show that the disease-free equilibrium solution is locally asymptotically stable if R0 < 1 while the endemic equilibrium solution is globally asymptotically stable when R0 > 1. The technical tool used for our analysis is the theory of competitive systems, compound matrices and stability of periodic orbits. Finally, we investigate, numerically, the inﬂuence of seasonal variation on the control of cholera.
https://ijnaa.semnan.ac.ir/article_5452_295a49b978ae313144e49aab85c8ef2c.pdf
2022-01-01
29
43
10.22075/ijnaa.2021.23626.2568
Cholera transmission
reproduction number
compound matrices
Global Stability
Matthew
Adewole
olamatthews@ymail.com
1
Department Of Computer Science And Mathematics,
Mountain Top University
LEAD_AUTHOR
Taye
Faniran
tayefaniran@yahoo.com
2
Department of Computer Science, Lead City University, Ibadan, Nigeria
AUTHOR
ORIGINAL_ARTICLE
Generalized $p$-Laplacian systems with lower order terms
This work is devoted to studying the existence of solutions to systems of $p$-Laplacian type. We prove the existence of at least one weak solution, under some assumptions, by applying Galerkin's approximation and the theory of Young measures.
https://ijnaa.semnan.ac.ir/article_5455_f3b763f2247723cdec0f842d6b175ff1.pdf
2022-01-01
45
55
10.22075/ijnaa.2021.20666.2191
Generalized p-Laplacian systems
Weak solutions
Young measures
Sobolev spaces
Galerkin method
Farah
Balaadich
balaadich.edp@gmail.com
1
University of Sidi Mohamed Ben Abdellah, Faculty of Sciences Dhar El Mehraz, B.P. 1796 Atlas, Fez-Morocco
LEAD_AUTHOR
Elhoussine
Azroul
elhoussine.azroul@gmail.com
2
University of Sidi Mohamed Ben Abdellah, Faculty of Sciences Dhar El Mehraz, B.P. 1796 Atlas, Fez-Morocco
AUTHOR
ORIGINAL_ARTICLE
Ulam’s stability of impulsive sequential coupled system of mixed order derivatives
This manuscript is devoted to establishing Hyers–Ulam stability for a class of non-linear impulsive coupled sequential fractional differential equations with multi point boundary conditions on a closed interval [0,T] with Caputo fractional derivative having non-instantaneous impulses. Sufficient conditions are introduced that guarantee the existence of a unique solution to the proposed problem. Furthermore, Hyers–Ulam stability of the proposed model is also presented and an example is provided to authenticate the theoretical results.
https://ijnaa.semnan.ac.ir/article_5456_ed237f264193b220ae585c2b5fdee762.pdf
2022-01-01
57
73
10.22075/ijnaa.2020.20205.2136
Caputo fractional derivative
Boundary conditions
Fixed point theorem
Hyers–Ulam Stability
Akbar
Zada
zadababo@yahoo.com
1
Department of Mathematics, University of Peshawar, 25000, Pakistan
AUTHOR
Sadeeq
Alam
sadeeq_alam@uop.edu.pk
2
Department of Mathematics, University of Peshawar, 25000, Pakistan
AUTHOR
Usman
Riaz
usmanriazstd15@uop.edu.pk
3
Department of Mathematics, University of Peshawar, 25000, Pakistan
LEAD_AUTHOR
ORIGINAL_ARTICLE
A subgradient extragradient method for equilibrium problems on Hadamard manifolds
It is generalized the subgradient extragradient algorithm from linear spaces to nonlinear cases. This algorithm introduces a method for solving equilibrium problems on Hadamard manifolds. The global convergence of the algorithm is presented for pseudo-monotone and Lipschitz-type continuous bifunctions.
https://ijnaa.semnan.ac.ir/article_5458_fbb0a4ff4f27020891ad9245cc705cb0.pdf
2022-01-01
75
84
10.22075/ijnaa.2020.20984.2220
Equilibrium problems
Hadamard manifolds
Subgradient Extragradient Algorithm
Pseudo-Monotone
Mahdi
Ali-Akbari
mahdialiakbari@torbath.ac.ir
1
Department of Computer Engineering, University of Torbat Heydarieh, Torbat Heydarieh, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
Action of topological groupoid on topological space
The main goal of this paper is investigating some types of topological groupoid and their action which denoted by LM- groupoid and M- groupoid. Some properties of these groupoid are written as proposition. We concentrated to research the relation of M- groupoid and LM- groupoid.
https://ijnaa.semnan.ac.ir/article_5459_60292092ab75dbc8f370a3e3151fdff1.pdf
2022-01-01
85
89
10.22075/ijnaa.2022.5459
groupoid
topological groupoid
principal groupoid
topological group
action of topological groupoid
Taghreed
Majeed
taghreedmajeed@uomustansiriyah.edu.iq
1
Education College, Mustansiriyah University, Baghdad, Iraq.
LEAD_AUTHOR
ORIGINAL_ARTICLE
A study of g*-fuzzy closed set via αm in double fuzzy topological space
The aim of this research paper is to present and study a new class of generalized closed sets in double fuzzy topological spaces, by using the fuzzy - αm closed set, that was previously presented. This new class is called the fuzzy αm - g∗fuzzy closed set. The relationship of the new concept with previous concepts is studied and the characteristics of this concept is investigated through important theorems that determine the position of this set in relation to sets that have been studied or that will be presented later. Also, generalizations of the functions are presented according to the concept, their properties are studied, and some necessary examples that show the properties of this concept and its relationships.
https://ijnaa.semnan.ac.ir/article_5460_47a4f906b3bfdeee0dd6d18770e93068.pdf
2022-01-01
91
95
10.22075/ijnaa.2022.5460
DFT
DFαm - g∗f closed set
DF -αm - g∗continuous function
Sanaa
Abdullah
sanaa.i.abdullah35503@st.tu.edu.iq
1
Ministry of Education, Salah al-Din Education Directorate, Tikrit, Iraq
LEAD_AUTHOR
Hiba
Mousa
hom_34@tu.edu.iq
2
Department of Mathematics, University of Tikrit, Iraq
AUTHOR
ORIGINAL_ARTICLE
Z-prime gamma submodule of gamma modules
Let $R$ be a $\Gamma$-ring and $\partial$ be an $R\Gamma$-module. A proper $R\Gamma$-submodule. $T$ of an $R\Gamma$-module $\partial$ is called Z-prime $R\Gamma$-submodule if for each $t\in \partial, \gamma \in \Gamma$ and $f \in \partial^{\ast}=Hom_{R_{\Gamma}}(\partial,R),f(t)\gamma t \in T$ implies that either $t \in T$ or $f(t)\in [T: _{R_{\Gamma}} \ \partial]$. The purpose of this paper is to introduce interesting theorems and properties of Z- prime $R\Gamma$-submodule of $R\Gamma$-module and the relation of Z-prime $R\Gamma$-submodule, which represents of generalization Z-prime R-submodule of R-module.
https://ijnaa.semnan.ac.ir/article_5461_1716752f0b582cca2d8cfb80827e6c0a.pdf
2022-01-01
97
102
10.22075/ijnaa.2022.5461
$Gamma$-ring
$RGamma$-module
$RGamma$-submodule
and prime $RGamma$-submodule
Ali
Zyarah
aliziara107@gmail.com
1
Iraqi Ministry of Education, General Directorate of Education for the Holy Karbala, Karbala, Iraq.
LEAD_AUTHOR
Ahmad Hadi
Hussain
met.ahmed.hadi@uobabylon.edu.iq
2
College of Engineering Al-musayab, Department of Energy Engineering, University of Babylon, Babil, Iraq
AUTHOR
Hayder
Zghair
hyderkadum8@gmail.com
3
Information Technology College, Department of Software, University of Babylon, Iraq.
AUTHOR
ORIGINAL_ARTICLE
Almost maximal, e-maximal and e-simple fuzzy submodules
In this paper, the concepts of almost maximal submodules are fuzzified and studied. Also, three new concepts are introduced, which are: e-simple submodules, Ee-simple modules and e-maximal submodules. Then these concepts are fuzzified and studied.
https://ijnaa.semnan.ac.ir/article_5463_24f752e267793f8840a8d026f947c5ac.pdf
2022-01-01
103
113
10.22075/ijnaa.2022.5463
Almost maximal fuzzy submodules
e-maximal fuzzy submodules
Ee-simple fuzzy modules and Ee-simple fuzzy modules
Maysoun
Hamel
maysoon.a.h@ihcoedu.uobaghdad.edu.iq
1
Department of Mathematics, College of Education for Pure Sciences, Ibn-Al-Haitham, University of Baghdad, Iraq
LEAD_AUTHOR
Inaam
Hadi
inaam1976@yahoo.com
2
Department of Mathematics, College of Education for Pure Sciences, Ibn-Al-Haitham, University of Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Bifurcation analysis and chaos control of the population model with harvest
In this article, we investigated the dynamic behavior of a discrete-time population model with the harvest. We give numerical simulation and chaos control by using the linear feedback control method.
https://ijnaa.semnan.ac.ir/article_5464_0adc01bf0ca0b6a49e7a380ede2a22c3.pdf
2022-01-01
115
125
10.22075/ijnaa.2021.19675.2094
Discrete-time model
stability
Bifurcation
chaos control
harvesting
Ozlem
Gumus
akgumus@adiyaman.edu.tr
1
Faculty of Arts and Sciences, Department of Mathematics, Adiyaman University, Adiyaman-02040, Turkey
LEAD_AUTHOR
A.George
Selvam
agmshc@gmail.com
2
Department of Mathematics, Sacred Heart College (Autonomous), Tirupattur-635 601, Tamil Nadu, India
AUTHOR
R
Dhineshbabu
vrdhinesbabu10@gmail.com
3
Department of Mathematics, Sacred Heart College (Autonomous), Tirupattur-635 601, Tamil Nadu, India
AUTHOR
ORIGINAL_ARTICLE
Estimation of the survival function based on the log-logistic distribution
This paper proposes a new method by hybrid Simplex Downhill Algorithm with Moment Method (SMOM) to estimate the parameters of Log-Logistic distribution based on Survival functions. Simulation is used to compare the suggested methods with two classical methods (Maximum Likelihood Estimator and with Moment Method). The results demonstrate that SMOM was efficient than the maximum likelihood Estimator and Moment method based on Mean Square Error (MSE).
https://ijnaa.semnan.ac.ir/article_5466_cfce13ca8b084830b6da3a643a68c60b.pdf
2022-01-01
127
141
10.22075/ijnaa.2022.5466
hybrid Simplex Downhill Algorithm
Log-Logistic distribution
Mean Square Error
Amina
Ibrahim
amena8303@gmail.com
1
Department of Mathematics, College of Education for pure Sciences, Ibn-Al-Haitham , University of Baghdad, Iraq
LEAD_AUTHOR
Bayda
Kalaf
hbama75@yahoo.com
2
Department of Mathematics, College of Education for pure Sciences, Ibn-Al-Haitham , University of Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Legendre Kantorovich methods for Uryshon integral equations
In this paper, the Kantorovich method for the numerical solution of nonlinear \emph{Uryshon} equations with a smooth kernel is considered. The approximating operator is chosen to be either the orthogonal projection or an interpolatory projection using a Legendre polynomial basis. The order of convergence of the proposed method and those of superconvergence of the iterated versions are established. We show that these orders of convergence are valid in the corresponding discrete methods obtained by replacing the integration by a quadrature rule. Numerical examples are given to illustrate the theoretical estimates.
https://ijnaa.semnan.ac.ir/article_5467_b8d32eccedbe2fe467ce6f225e62107a.pdf
2022-01-01
143
157
10.22075/ijnaa.2021.22966.2441
Uryshon equation
Kantorovich method
Projection operator
Legendre polynomial
Discrete methods
Superconvergence
Chafik
Allouch
c.allouch@ump.ma
1
LEAD_AUTHOR
Mohamed
Arrai
mohamedarrai28@gmail.com
2
University Mohammed I, FPN, MSC Team, LAMAO Laboratory, Nador, Morocco
AUTHOR
Mohammed
Tahrichi
mtahrichi@hotmail.com
3
University Mohammed I, ESTO, ANAA Team, ANO Laboratory, Oujda, Morocco
AUTHOR
ORIGINAL_ARTICLE
Combining B-spline least-square schemes with different weight functions to solve the generalized regularized long wave equation
For solving differential equations, a variety of numerical methods are available, accuracy, performance, and application are all different. In this article, we proposed new numerical techniques for solving the generalized regularized long wave equation(GRLWE) that are based on types M and M-1 of B-splines-least-square method (BSLSM) and weight function of B-splines respectively, which were proposed previously for solving integro-differential equations [2] where $M\in {N}$. We investigated linear stability using a Fourier method.
https://ijnaa.semnan.ac.ir/article_5468_89f38ae584cf4dd9e99c8b5ddc7c6f92.pdf
2022-01-01
159
177
10.22075/ijnaa.2022.5468
B-Spline method
Petrov-Galerkin method
Least-Square method
Fourier method
generalized regularized long wave equation
Hameeda O.
Al-Humedi
hameeda.mezban@uobasrah.edu.iq
1
Department Mathematics, Education College for pure Sciences, Basrah University, Basrah, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
On the location of zeros of generalized derivative
Let $P(z) =\displaystyle \prod_{v=1}^n (z-z_v),$ be a monic polynomial of degree $n$, then, $G_\gamma[P(z)] = \displaystyle \sum_{k=1}^n \gamma_k \prod_{{v=1},{v \neq k}}^n (z-z_v),$ where $\gamma= (\gamma_1,\gamma_2,\dots,\gamma_n)$ is a n-tuple of positive real numbers with $\sum_{k=1}^n \gamma_k = n$, be its generalized derivative. The classical Gauss-Lucas Theorem on the location of critical points have been extended to the class of generalized derivative\cite{g}. In this paper, we extend the Specht Theorem and the results proved by A.Aziz \cite{1} on the location of critical points to the class of generalized derivative .
https://ijnaa.semnan.ac.ir/article_5469_c0d5c598e88d64fc2d4a7ca2b1ac5a5c.pdf
2022-01-01
179
184
10.22075/ijnaa.2021.22496.2382
Polynomial
Zeros
critical points and generalized derivative
Irfan
Wani
irfanmushtaq62@gmail.com
1
Department of Mathematics, University of Kashmir, South Campus, Anantnag-192101, Jammu and Kashmir, India
LEAD_AUTHOR
Mohammad
Mir
ibrahimmir@uok.edu.in
2
Department of Mathematics, University of Kashmir, South Campus, Anantnag-192101, Jammu and Kashmir, India
AUTHOR
Ishfaq
Nazir
ishfaqnazir02@gmail.com
3
Department of Mathematics, University of Kashmir, South Campus, Anantnag-192101, Jammu and Kashmir, India
AUTHOR
ORIGINAL_ARTICLE
Mathematical optimization modeling for estimating the incidence of clinical diseases
The notion that infectious disease transmission and dissemination are governed by rules that may be expressed mathematically is not new. In fact, the nonlinear dynamics of infectious illness transmission were only fully recognized in the twentieth century. However, with the Coronavirus outbreak, there is a lot of discussion and study regarding the origin of the epidemic and how it spreads before all vulnerable people are infected, as well as ideas about how the disease virulence changes during the epidemic. In this paper, we provide some critical mathematical models which are SIR and SIS and their differences in approach for the interpretation and transmission of viruses and other epidemics as well as formulate the optimal control problem with vaccinations.
https://ijnaa.semnan.ac.ir/article_5470_65a5bc8225fef3ee1b2530db0e14aa8f.pdf
2022-01-01
185
195
10.22075/ijnaa.2022.5470
Mathematical modeling
SIR Model
SIS Model
Epidemiology's threshold theorem
the optimal control problem with vaccinations
Mazin
Kadhim
mazen.marjan22@gmail.com
1
Department of Mathematics Science, Ministry of Education, Babylon, Iraq
LEAD_AUTHOR
Fadhil
Wahbi
fadhilf40@gmail.com
2
Department of Mathematics Science, Ministry of Education, Babylon, Iraq
AUTHOR
Ahmed
Hasan Alridha
amqa92@yahoo.com
3
Department of Mathematics Science, Ministry of Education, Babylon, Iraq
AUTHOR
ORIGINAL_ARTICLE
Perturbation of wavelet frames on non-Archimedean fields
The paper deals with two different aspects of wavelet frames. First, we obtain a necessary condition on irregular wavelet frames on local fields of positive characteristic and in the second aspect, we present some results on the perturbation of wavelet frames, when we disturb the mother function of a wavelet frame or dilation parameter. All the results have been carried without the compactness of support neither on generating function nor on its Fourier transform.
https://ijnaa.semnan.ac.ir/article_5471_fdc041bfb12d8d2ec19ef4dd14f4db1c.pdf
2022-01-01
197
208
10.22075/ijnaa.2021.21909.2302
Wavelet frames
Local fields
Perturbation
ishtaq
Ahmad
ishtiyaqahmadun@gmail.com
1
Department of Mathematics, Jammu and Kashmir Institute of Mathematical Sciences, Srinagar-190008, India
LEAD_AUTHOR
Neyaz
Ahmad
neyaznit@yahoo.co.in
2
Department of Mathematics, National Institute of Technology, Srinagar-190006, India
AUTHOR
ORIGINAL_ARTICLE
Novel face detection algorithm with a mask on neural network training
Discovering objects and knowing their number has been discussed in many works. Face detection technology is important for the visual scene, Deep learning theory using computer technology to discover the face, which is a wide field in marketing, traffic and security system control systems, in addition to photography. Facial recognition algorithms or face detection Include steps for the facial image to extract features to match them with a database. The face has a biometric feature. The facial feature consists of prominent and easily identifiable information that is responsible for distinguishing the objects that distinguish the face, the distance between the eyes, the shape of the nose, and The mouth for the device to perform a training group and record the data. Matlab program helps to dispense with training because MATLAB provides the instruction (CascadeObjectDetector) for facial recognition and the Viola-Jones algorithm with the result of separating the detection results in the form of subsets. In this work, a new algorithm is created for a group of elements in the unit picture And run a face detection code to highlight the background to store the information of each image in a specified folder and the face detection techniques by proposing a new algorithm to detect a face from among a group of faces, distinguish it and make it a file of its own, all of that using the Matlab program to train the neural network for face recognition.
https://ijnaa.semnan.ac.ir/article_5472_9e12faefd1513fb5059b2a80f3e74831.pdf
2022-01-01
209
215
10.22075/ijnaa.2022.5472
Neural Network
facial recognition
Convolutional Neural Networks (CNN)
MATLAB
Fouad
Tahir
11015@uotechnology.edu.iq
1
Department of Applied Science, University of Technology, Baghdad, Iraq
LEAD_AUTHOR
Asma
Abdulrahman
asma.a.abdulrahman@uotechnology.edu.iq
2
Department of Applied Science, University of Technology, Baghdad, Iraq
AUTHOR
Zanbaq
Hikmet Thanon
zanbaqlily@yahoo.com
3
Iraqi Commission for Computers & Informatics Informatics Institute for Postgraduate Studies.
AUTHOR
ORIGINAL_ARTICLE
Solving a bi-objective flexible flow shop problem with transporter preventive maintenance planning and limited buffers by NSGA-II and MOPSO
This study deals with a bi-objective flexible flow shop problem (BOFFSP) with transportation times and preventive maintenance (PM) on transporters via considering limited buffers. The PM actions on transporters are a missing part of the literature of the flexible flow shop problem (FFSP) which before the breakdown occurs, each transporter at each stage is stopped and the PM action is performed on it. The capacity of each intermediate buffer is limited and each job has to wait in the intermediate buffers. By including all these features in the proposed BOFFSP, not only processing times affect the objective functions, but also, the transportation times of jobs, the waiting time of jobs in the intermediate buffers, and availability of transporters in the system are considered in the model and make it a sample of a real-world FFSP. The presented BOFFSP has simultaneously minimized the total completion time and the unavailability of the system. As the problem is NP-hard, a non-dominated sorting genetic algorithm II (NSGA-II) and a multi-objective particle swarm optimization (MOPSO) is proposed to solve the model for large size problems. The experimental results show that the proposed MOPSO relatively outperforms the presented NSGA-II in terms of five different metrics considered to compare their performance. Afterwards, two one-way ANOVA tests are performed. It can be observed MOPSO achieves relatively better results than NSGA-II. Finally, sensitivity analysis is conducted to investigate the sensitivity of the objective functions to the number of jobs and their transportation time at each stage.
https://ijnaa.semnan.ac.ir/article_5473_2f7d51a1bc178fdf377308651a8dff89.pdf
2022-01-01
217
246
10.22075/ijnaa.2021.24335.2719
Flexible flow shop problem
Transportation times
preventive maintenance
Limited buffers
Multi-objective algorithms
Meysam
Kazemi Esfeh
meysam.kazemie@gmail.com
1
School of Industrial Engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran
AUTHOR
Amir Abass
Shojaei
amir@ashojaie.com
2
School of Industrial Engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran
LEAD_AUTHOR
Hassan
Javanshir
hassan.javanshir@gmail.com
3
School of Industrial Engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran
AUTHOR
Kaveh
Khalili Damghani
kaveh.khalili@gmail.com
4
School of Industrial Engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran
AUTHOR
ORIGINAL_ARTICLE
Growth estimate for rational functions with prescribed poles and restricted zeros
Let $r(z)= f(z)/w(z)$ where $f(z)$ be a polynomial of degree at most $n$ and $w(z)= \prod_{j=1}^{n}(z-a_{j})$, $|a_j|> 1$ for $1\leq j \leq n.$ If the rational function $r(z)\neq 0$ in $|z|< k$, then for $k =1$, it is known that $$\left|r(Rz)\right|\leq \left(\frac{\left|B(Rz)\right|+1}{2}\right) \underset{|z|=1}\sup|r(z)|\,\,\, for \,\,\,|z|=1$$ where $ B(z)= \prod_{j=1}^{n}\left\{(1-\bar{a_{j}}z)/(z-a_{j})\right\}$. In this paper, we consider the case $k \geq 1$ and obtain certain results concerning the growth of the maximum modulus of the rational functions with prescribed poles and restricted zeros in the Chebyshev norm on the unit circle in the complex plane.
https://ijnaa.semnan.ac.ir/article_5474_3656cfa70e2a244467593adf62ee44b7.pdf
2022-01-01
247
252
10.22075/ijnaa.2021.23465.2544
Rational functions
Polynomial Inequalities
Zeros
Ishfaq
Dar
ishfaq619@gmail.com
1
Department of Mathematics, University of Kashmir, Srinagar-190006, India
LEAD_AUTHOR
Nisar
Rather
dr.narather@gmail.com
2
Department of Mathematics, University of Kashmir, Srinagar-190006, India
AUTHOR
Mohd
Wani
wanishafi1933@gmail.com
3
Department of Mathematics, University of Kashmir, Srinagar-190006, India
AUTHOR
ORIGINAL_ARTICLE
Hadamard and Fejér type inequalities for p-convex functions via Caputo fractional derivatives
Here our aim is to prove the Hermite-Hadamard and Fejér inequalities for p-convex functions via Caputo fractional derivatives. We also establish some useful identities in order to find further Hadamard’s and Fejér type inequalities which are generalizations of the results given in the literature cited here.
https://ijnaa.semnan.ac.ir/article_5475_99724d3a0bfbc13353e0f34919c17812.pdf
2022-01-01
253
266
10.22075/ijnaa.2020.21549.2269
Hermite-Hadamard inequality
Hermite-Hadamard-Fejér inequality
p-convex function
Caputo fractional derivatives
Naila
Mehreen
nailamehreen@gmail.com
1
School of Natural Sciences, National University of Sciences and Technology, sector H-12, Islamabad, Pakistan.
LEAD_AUTHOR
Matloob
Anwar
matloob_t@yahoo.com
2
School of Natural Sciences, National University of Sciences and Technology, H-12 Islamabad, Pakistan
AUTHOR
ORIGINAL_ARTICLE
System of generalized nonlinear variational-like inclusion problems in 2-uniformly smooth Banach spaces
In this manuscript, we introduce and study the existence of a solution of a system of generalized nonlinear variational-like inclusion problems in 2-uniformly smooth Banach spaces by using $H(.,.)$-$\eta$-proximal mapping. The method used in this paper can be considered as an extension of methods for studying the existence of solutions of various classes of variational inclusions considered and studied by many authors in 2-uniformly smooth Banach spaces. Some important results, theorems and the existence of solution of the proposed system of generalized nonlinear variational-like inclusion problems have been derived.
https://ijnaa.semnan.ac.ir/article_5476_cbb99cb6a25ed60152bcd522690e59d9.pdf
2022-01-01
267
287
10.22075/ijnaa.2020.20694.2197
System of generalized nonlinear variational-like inclusion problems
$H(
.)$-$eta$-Proximal mapping method
0-Diagonally Quasi-concave (0-DQCV )
2-uniformly smooth Banach spaces
iterative algorithm
Convergence analysis
Sumeera
Shafi
sumeera.shafi@gmail.com
1
Department of Mathematics, University of Kashmir, Srinagar-190006, India
LEAD_AUTHOR
ORIGINAL_ARTICLE
Some trapezoid type inequalities for generalized fractional integral
In this paper, we have established some trapezoid type inequalities for generalized fractional integral. The results presented here would provide some fractional inequalities and Riemann-Liouville type fractional operators.
https://ijnaa.semnan.ac.ir/article_5486_567e1c6c24f44db249f1ef5bde0ba354.pdf
2022-01-01
289
295
10.22075/ijnaa.2019.16038.1844
simpson type inequalities
convex function
Integral inequalities
Fatma
Ertuğral
fatmaertugral14@gmail.com
1
Department of Mathematics, Faculty of Science and Arts, D\"{u}zce University, D\"{u}zce, Turkey
LEAD_AUTHOR
Mehmet
Sarikaya
sarikayamz@gmail.com
2
Department of Mathematics, Faculty of Science and Arts, D\"{u}zce University, D\"{u}zce, Turkey
AUTHOR
ORIGINAL_ARTICLE
Solving binary semidefinite programming problems and binary linear programming problems via multi-objective programming
In recent years the binary quadratic program has grown in combinatorial optimization. Quadratic programming can be formulated as a semidefinite programming problem. In this paper, we consider the general form of binary semidefinite programming problems (BSDP). We show the optimal solutions of the BSDP belong to the efficient set of a semidefinite multiobjective programming problem (SDMOP). Although finding all efficient points for multiobjective is not an easy problem, but solving a continuous problem would be easier than a discrete variable problem. In this paper, we solve an SDMOP, as an auxiliary, instead of BSDP. We show the performance of our method by generating and solving random problems.
https://ijnaa.semnan.ac.ir/article_5490_98f5ff3feab0998ee2fa7bb7d0334cd0.pdf
2022-01-01
297
304
10.22075/ijnaa.2019.13899.1724
Semidenite programming
Positive semidenite matrix
Multiobjective programming
Binary programming
Mohammadreza
Safi
msafi@semnan.ac.ir
1
Faculty of Mathematics, Statistics and Computer Science, Semnan University, Semnan, Iran
LEAD_AUTHOR
Seyyed Saeed
Nabavi
saeednabavi86@gmail.com
2
Faculty of Mathematics, Statistics and Computer Science, Semnan University, Semnan, Iran
AUTHOR
ORIGINAL_ARTICLE
A lightweight intrusion detection system based on RSSI for sybil attack detection in wireless sensor networks
As the prevalence of Wireless Sensor Networks (WSNs) grows in the many mission-critical applications such as military and civil domains, the need for network security has become a critical concern. The inherently vulnerable characteristics of WSNs appoint them susceptible to various types of attacks. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack, where a node illegitimately claims multiple identities. Sybil attacks can severely deteriorate the network performance and compromise the security by disrupting many networking protocols. This paper presents a lightweight Intrusion detection system (IDS) based on received signal strength indicator (RSSI) readings of messages to protect WSNs against Sybil attack. Our idea in the proposed method is based on the local calculation (within each node and without the need for communications) the RSSI ratio from the suspected nodes to the Sybil attack. The obtained results demonstrate that Proposed System achieves high detection accuracy, low false alarm rate and low energy consumption appointing it a promising IDS candidate for wireless sensor networks.
https://ijnaa.semnan.ac.ir/article_5491_955696556c1e2e90e404b4e702c3f4c3.pdf
2022-01-01
305
320
10.22075/ijnaa.2022.5491
Wireless Sensor networks (WSNs)
Sybil attack
Intrusion detection systems (IDS)
Received signal strength indicator (RSSI)
Mahdi
Sadeghizadeh
m.sadeghizadeh@qiet.ac.ir
1
Department of Computer Engineering, Quchan University of Technology, Quchan, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
Optimization of process parameter involved in the effectiveness evaluation of continuous line manufacturing system (CLMS)
To sustain in the global competitive market, the manufacturing organizations are adopting tools like Total Productive Maintenance (TPM), Lean Manufacturing (LM), etc. Implementation of these tools was assessed by an effectiveness index called Overall Equipment Effectiveness (OEE) Throughput Effectiveness (TE). Overall Manufacturing Line Effectiveness (OMLE) used as the performance evaluation index for the integrated tool {[}Total Productive Lean Manufacturing --TPLM{]} implementation performance has been assessed. OMLE is a robust metric of manufacturing performance that incorporates the measures like Line Availability (LA), Line Production Quality Performance (LPQP) of the product line. OMLE offers a means of controlling the whole production process by analyzing results from the totality of events with or without inventory between the processes in the product line. In the presentpaper, the attempt made towards identifying the bottleneck parameter (Losses in the processes --category A, the Cycle time in the processes-category B, Inventory between the process -- category C) in the bottleneck processes of the n number of the processes product line through programming (software in C). Also, the top three parameters of the processes in the n process product line have been obtained easily towards executing improvements by the engineers and managers. Analyze it with the change of inventory and zero inventory between the five, seven, and nine different processes product line processes. The suggested improvement activities (obtained from the OMLE evaluation and optimization program) are validated in south India's real case study organization and improved the bottleneck processes and losses in the product line.
https://ijnaa.semnan.ac.ir/article_5499_9a56828c89e94ce40062fdfbca09eaa2.pdf
2022-01-01
321
342
10.22075/ijnaa.2022.5499
Performance Evaluation
Bottleneck parameter
World Class Manufacturing
Manufacturing System Analysis
Manufacturing management
J.
Logeshwaran
logesh.jsrm@gmail.com
1
Research Scholar
LEAD_AUTHOR
RM.
Nachiappan
dcenachiappan@gmail.com
2
Department of Manufacturing Engineering, Annamalai University, Annamalai Nagar, Tamil Nadu-608002, India
AUTHOR
ORIGINAL_ARTICLE
Human recognition by utilizing voice recognition and visual recognition
Audio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some area such as W.C. or sleeping room. Thus, its commonly difficult to identify any movement or breakthrough process, on the other hand when need to pursue suspect when enter a building or party to identify his location and/or listen to his speech only and isolate it from other voices or noises, the other. Hence, the use of the hybrid combination technique is very effective. In this work, we proposed a multimodal human recognition approach that utilizes both the face and audio and is based upon a deep convolutional neural network (CNN). Mainly, to solve the challenge of not capturing part of the body, final results of recognizing via separate CNNs of VGG Face16 and ResNet50 are joined together depending on the score-level combination by Weighted Sum rule to enhance recognition performance. The results show that the proposed system success to recognise each person from his voice and/or his face captured. In addition, the system can separate the person voice and isolate it from noisy environment and determine the existence of desired person.
https://ijnaa.semnan.ac.ir/article_5501_7084ee1827614e483ed56fbb83f82ae1.pdf
2022-01-01
343
351
10.22075/ijnaa.2022.5501
Deep learning
Convolutional Neural Networks
Human Recognition
voice recognition
visual recognition
Sukaina
Altyar
sukaina.s.m@ihcoedu.uobaghdad.edu.iq
1
Department of Computer Science, College of Education for Pure Science University of Baghdad, Baghdad, Iraq
LEAD_AUTHOR
Samera
Hussein
samera.s.h@ihcoedu.uobaghdad.edu.iq
2
Department of Computer Science, College of Education for Pure Science University of Baghdad, Baghdad, Iraq
AUTHOR
Mahir
Mohammed
mahir.jasem@yahoo.com
3
Department of Religious Education, Iraqi Sunni Affairs, Iraq
AUTHOR
ORIGINAL_ARTICLE
Homoclinic Orbits and Localized Solutions in Discrete Nonlinear Schrodinger Equation with Long-Range Interaction
In this paper, we use the homoclinic orbit approach without using small perturbations to prove the existence of soliton solutions of the discrete nonlinear Schrödinger equations with long-range interaction by employing the properties of the symmetries of reversible planar maps. Moreover, the long-range interaction by a potential proportional to $1/l^{1+\alpha} $ with fractional $\alpha < 1 $ and $l $ as natural number.
https://ijnaa.semnan.ac.ir/article_5502_f21983ef198669fc7d6bca41170343fe.pdf
2022-01-01
353
363
10.22075/ijnaa.2021.23619.2588
Fractional equation
discrete Schrodinger equation
Long-Range Interaction
Homoclinic orbits
reversible planar maps
Allal
Mehazzem
a.mehazzem@centre-univ-mila.dz
1
Department of Mathematics and Informatics, Faculty of Exact Sciences, Natural and Life Sciences, El Arbi Tebessi University, Tebessa, Algeria.
LEAD_AUTHOR
Mohamed
Abdelouahab
m.abdelouahab@centre-univ-mila.dz
2
Department of Mathematics and Informatic, Abdelhafidh Boussouf University Center of Mila, Mila, Algeria
AUTHOR
Kamel
Haouam
haouam@yahoo.fr
3
Department of Mathematics and Informatics, Faculty of Exact Sciences, Natural and Life Sciences, El Arbi Tebessi University, Tebessa, Algeria.
AUTHOR
ORIGINAL_ARTICLE
Approximate analytic solution of composed linear descriptor operator system using functional analysis approach
This paper focuses on the solvability and approximate analytic solution of composed linear descriptor operator with constant coefficient, using functional (Variational) approach. This approach is based on finding a suitable functional form whose critical points are the solution of the proposed problem and the solution of a proposed problem is a critical point of the obtained variational functional defined on suitable reflexive Hilbert space since the existence of this approach is based on the symmetry and positivity of the composed linear descriptor operator on Hilbert space. The necessary mathematical requirements are derived and proved. A step-by-step computational algorithm is proposed. Illustration and computation with the giving exact solution are also proposed.
https://ijnaa.semnan.ac.ir/article_5503_14b97b3e414ab0e83bde4077e9b75ea5.pdf
2022-01-01
365
378
10.22075/ijnaa.2022.5503
Hams
Al-Helli
hamsmoniem87@gmail.com
1
Department of Mathematics, College of Science, Mustansiriyah University, Baghdad, Iraq
LEAD_AUTHOR
Radhi
Zaboon
r.zaboon@uomustansiriyah.edu.iq
2
Department of Mathematics, College of Science, Mustansiriyah University, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Evaluation of longitudinal wave velocity and elasticity modulus of concrete at different ages considering mixing ratios
Concrete is a material that the mechanical properties of which change over time. This change is due to chemical reactions within the concrete known as hydration. One of these properties is the modulus of elasticity and longitudinal wave velocity, which has a direct relation with the concrete age and its setting. Just after the materials mixing, the concrete setting is fast, and over time its rate decreases. Here, a series of cubic concrete specimens are prepared and changing in longitudinal wave velocity and modulus of elasticity in different ages is monitored during the process of curing and a relationship has been presented. Materials specifications impact and concrete mixing ratios, including the water to cement ratio and fine to coarse aggregates ratio is studied. Ultrasonic wave velocity has been increased faster at early ages of specimens where the concrete setting process is fast and in last days, rates of increasing the longitudinal wave velocity decreases. An increase in the water to cement ratio leads to increases in the longitudinal wave velocity over time. The empirical equations have been formulated as logarithmic curves. These empirical equations have been developed and a model with more efficiency and precision has been presented. These empirical equations can be used in the analytical and numerical analysis of structures. These models can be used to determine the loading time of concrete structures and to predicting their other physical and mechanical properties, such as strength and stiffness.
https://ijnaa.semnan.ac.ir/article_5504_43df1994326bbc284b3c5531fc2d5c09.pdf
2022-01-01
379
396
10.22075/ijnaa.2021.18485.2015
Concrete setting
Concrete age
Non-destructive test
Ultrasonic wave velocity
Modulus of elasticity
Mehdi
Sabagh
sabagh@ut.ac.ir
1
Department of Civil Engineering, Sharif University of Technology, Tehran, Iran
LEAD_AUTHOR
Mansour
Asgari Khorasgani
mansour.asgari@gmail.com
2
Department of Civil Engineering, Islamic Azad University, Najafabad Branch, Najafabad, Iran
AUTHOR
Mohammad Taghi
Kazemi
kazemi@sharif.edu
3
Department of Civil Engineering, Sharif University of Technology, Tehran, Iran
AUTHOR
ORIGINAL_ARTICLE
The existence of periodic solutions to doubly degenerate Allen-Cahn equation with Neumann boundary condition
This work is concerned with the periodic solution of a doubly degenerate Allen-Cahn equation with nonlocal terms associated with Neumann boundary conditions. Firstly, we define a new associated auxiliary problem. Secondly, the topological degree theorem is applied to prove the existence of a limit point to the auxiliary problem, where this limit point represents a nontrivial nonnegative time-periodic solution of the main studied problem. It is observed that the topological degree theorem technique plays an important role in proving the desired results. Furthermore, this technique can be applied to other similar equations with homogeneous Dirichlet or Neumann boundary conditions.
https://ijnaa.semnan.ac.ir/article_5505_38a74da87b97ddb34ded83786807d966.pdf
2022-01-01
397
408
10.22075/ijnaa.2022.5505
Degenerate Allen-Cahn equation
Neumann boundary conditions
Time-periodic solution
Topological degree theorem
Raad
Hameed
dr.raad.awad@tu.edu.iq
1
Department of Mathematics, College of education for pure science, Tikrit University.
LEAD_AUTHOR
Maan
Rasheed
maan.rasheed.edbs@uomustansiriyah.edu.iq
2
Department of Mathematics, College of Basic Education, Mustansiriyah University, Baghdad, Iraq
AUTHOR
Hekmat
Mustafa
hekmat78@uohamdaniya.edu.iq
3
Department of Mathematics, College of Education, Al- Hamdaniya University, Mosul, Iraq
AUTHOR
Faez
Ghaffoori
fng-2022@uomustansiriyah.edu.iq
4
Department of Mathematics, College of Basic Education, Mustansiriyah University, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Comparison of Harder stability and Rus stability of Mann iteration procedure and their equivalence
In this paper, we study the stability of Mann iteration procedure in two directions, namely one due to Harder and the second one due to Rus with respect to a map $T:K\to K$ where $K$ is a nonempty closed convex subset of a normed linear space $X$ and there exist $\delta\in(0,1)$ and $L\geq 0$ such that $||Tx-Ty||\leq\delta||x-y||+L||x-Tx||$ for $x,y\in K$. Also, we show that the Mann iteration procedure is stable in the sense of Rus may not imply that it is stable in the sense of Harder for weak contraction maps. Further, we compare and study the equivalence of these two stabilities and provide examples to illustrate our results.
https://ijnaa.semnan.ac.ir/article_5508_73c55573cbd9c4cd62f4df92bd2278b4.pdf
2022-01-01
409
420
10.22075/ijnaa.2021.17495.1939
Fixed point
Mann iteration procedure
stability in the sense of Harder
limit shadowing property
stability in the sense of Rus
Gutti
Babu
gvr_babu@hotmail.com
1
Department of Mathematics, Andhra University, Visakhapatnam-530 003, India
AUTHOR
Gedala
Satyanarayana
gedalasatyam@gmail.com
2
Department of Mathematics, Andhra University, Visakhapatnam-530 003, India.
LEAD_AUTHOR
ORIGINAL_ARTICLE
Uniform stability of integro-differential inequalities with nonlinear control inputs and delay
In this paper, the uniform stability for the solution of integro-differential inequalities, with nonlinear control inputs and delay functions, is investigated by using some inequality estimator conditions. Moreover, we apply the obtained results on the solutions of some proposed classes of integro-differential inequalities with nonlinear control input functions as problem formulations examples. The results show that the stability technique used in this work is efficient and robust and it can be applied to a general class and various types of integro-differential inequalities.
https://ijnaa.semnan.ac.ir/article_5509_ebf9af71c46cabd8972ee1105a597769.pdf
2022-01-01
421
430
10.22075/ijnaa.2022.5509
Uniform stability
Integro-differential inequalities
Nonlinear control inputs
Delay functions
Sameer
Hasan
dr.sameerqasim@uomustansiriyah.edu.iq
1
Department of Mathematics, College of Education, Mustansiriyah University, Baghdad, Iraq
AUTHOR
Maan
Rasheed
maan.rasheed.edbs@uomustansiriyah.edu.iq
2
Department of Mathematics, College of Basic Education, Mustansiriyah University, Baghdad, Iraq
LEAD_AUTHOR
Talat
Aldhlki
dr.talatjassim.edbs@uomustansiriyah.edu.iq
3
Department of Mathematics, College of Basic Education, Mustansiriyah University, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Inequalities for an operator on the space of polynomials
Let $\mathcal{P}_n$ be the class of all complex polynomials of degree at most $n.$ Recently Rather et. al.[ \On the zeros of certain composite polynomials and an operator preserving inequalities, Ramanujan J., 54(2021) 605–612. \url{https://doi.org/10.1007/s11139-020-00261-2}] introduced an operator $N : \mathcal{P}_n\rightarrow \mathcal{P}_n$ defined by $N[P](z):=\sum_{j=0}^{k}\lambda_j\left(\frac{nz}{2}\right)^j\frac{P^{(j)}(z)}{j!}, ~ k \leq n$ where $\lambda_j\in\mathbb{C}$, $j=0,1,2,\ldots,k$ are such that all the zeros of $\phi(z) = \sum_{j=0}^{k} \binom{n}{j}\lambda_j z^j$ lie in the half plane $|z| \leq \left| z - \frac{n}{2}\right|$ and established certain sharp Bernstein-type polynomial inequalities. In this paper, we prove some more general results concerning the operator $N : \mathcal{P}_n \rightarrow \mathcal{P}_n$ preserving inequalities between polynomials. Our results not only contain several well known results as special cases but also yield certain new interesting results as special cases.
https://ijnaa.semnan.ac.ir/article_5514_783dd656b7da60f84dab87531da4e7eb.pdf
2022-01-01
431
439
10.22075/ijnaa.2021.22378.2355
polynomials
Operators
Inequalities in the complex domain
Nisar
Rather
dr.narather@gmail.com
1
Department of Mathematics, University of Kashmir
AUTHOR
Aaqib
Iqbal
itz.a.iqbal@gmail.com
2
Department of Mathematics, University of Kashmir
AUTHOR
Ishfaq
Dar
ishfaq619@gmail.com
3
Department of Mathematics,
University of Kashmir
LEAD_AUTHOR
ORIGINAL_ARTICLE
Blow up of solutions for a r(x)-Laplacian Lam\'{e} equation with variable-exponent nonlinearities and arbitrary initial energy level
In this paper, we consider the nonlinear $r(x)-$Laplacian Lam\'{e} equation $$ u_{tt}-\Delta_{e}u-div\big(|\nabla u|^{r(x)-2}\nabla u\big)+|u_{t}|^{m(x)-2}u_{t}=|u|^{p(x)-2}u $$ in a smoothly bounded domain $\Omega\subseteq R^{n},\ n\geq1$, where $r(.),\ m(.)$ and $p(.)$ are continuous and measurable functions. Under suitable conditions on variable exponents and initial data, the blow-up of solutions is proved with negative initial energy as well as positive.
https://ijnaa.semnan.ac.ir/article_5516_2a8e3eb4dfc31a013e4e990eba4908eb.pdf
2022-01-01
441
450
10.22075/ijnaa.2021.23671.2578
Blow-Up
variable-exponent nonlinearities
elasticity operator
arbitrary initial energy
Mohammad
Shahrouzi
mshahrouzi@jahromu.ac.ir
1
Department of Mathematics, Jahrom University, Jahrom, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
On existence of solutions for some functional integral equations in Banach algebra by fixed point theorem
In this research, we analyze the existence of solution for some nonlinear functional integral equations using the techniques of measures of noncompactness and the Petryshyn's fixed point theorem in Banach space. The results obtained in this paper cover many existence results obtained by numerous authors under some weaker conditions. We also give an example satisfying the conditions of our main theorem but not satisfying the conditions described by other authors.
https://ijnaa.semnan.ac.ir/article_5515_5e731d50928adc39ed179ae5e06b29cf.pdf
2022-01-01
451
466
10.22075/ijnaa.2021.23635.2570
Functional integral equations
Existence of solution
Measures of noncompactness
Petryshyn's fixed point theorem
Manochehr
Kazemi
univer_ka@yahoo.com
1
Department of Mathematics, Ashtian Branch, Islamic Azad University, Ashtian, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
A numerical scheme for solving variable order Caputo-Prabhakar fractional integro-differential equation
In this paper we apply the Chebyshev polynomials method for the numerical solution of a class of variable-order fractional integro-differential equations with initial conditions. Moreover, a class of variable-order fractional integro-differential equations with fractional derivative of Caputo-Prabhakar sense is considered. The main aim of the Chebyshev polynomials method is to derive four kinds of operational matrices of Chebyshev polynomials. With such operational matrices, an equation is transformed into the products of several dependent matrices, which can also be viewed as the system of linear equations after dispersing the variables. Finally, numerical examples have been presented to demonstrate the accuracy of the proposed method, and the results have been compared with the exact solution.
https://ijnaa.semnan.ac.ir/article_5517_e0c2c674dae3ae90d807af8d52f822be.pdf
2022-01-01
467
484
10.22075/ijnaa.2020.21181.2240
Variable order fractional
Prabhakar fractional derivative
Chebyshev polynomials method
Operational matrices
Bagher
Bagharzadehtvasani
bgh.bagharzadeh@gmail.com
1
Department of Applied Mathematics, Faculty of Mathematical Sciences, Lahijan Branch, Islamic Azad University, Lahijan, Iran
AUTHOR
Amir Hosein
Refahi Sheikhani
ah_refahi@yahoo.com
2
Department of Applied Mathematics, Faculty of Mathematical Sciences, Lahijan
Branch, Islamic Azad University, Lahijan, Iran
LEAD_AUTHOR
Hossein
Aminikhah
hossein.aminikhah@gmail.com
3
Department of Applied Mathematics, Faculty of Mathematical Sciences, University of Guilan, Rasht, Iran
AUTHOR
ORIGINAL_ARTICLE
Investigating essential factors in the spread of lassa fever dynamics through sensitivity analysis
Lassa fever is a zoonotic acute viral illness caused by Lassa virus. Since there is no vaccine yet to protect against contracting the virus, it continues to spread in West Africa. In this paper, a mathematical model of lassa transmission that considers two classes of rats: house rat and bush rat, is proposed. Theoretically, global stability of the model disease-free and endemic equilibria are established by constructing a global Lyapunov function. Sensitivity indices of the basic reproduction number are derived using the normalised forward approach to evaluate the effectiveness of control measures. The disease-free equilibrium is globally asymptotically stable when the basic reproduction number R0 < 1 and the unique endemic equilibrium is globally asymptotically stable when R0 > 1. Results from sensitivity analysis reveals that rat biting rate for infectious house rats RFH and infectious bush rats R_FB, transmission probability per contact with infectious house and bush rats (R_FH and R_FB), human recruitment rate and transmission probability per contact with infectious human hosts are highly significant in determining the severity of lassa infection. On the other hand, natural death rate of rats, natural death rate of human hosts, recovery and hospitalization rates of human hosts are critical for lassa transmission reduction. Plans that target the contact rate between house and bush rats (i.e use of indoor residual spray, fumigation of environment with pesticide) and those that target recovery rate of human hosts (i.e treatment of infectious human hosts) are recommended to control the disease.
https://ijnaa.semnan.ac.ir/article_5519_a6b6a8e6ade531d462dafefc6a7c52b1.pdf
2022-01-01
485
497
10.22075/ijnaa.2021.22707.2405
Lassa
Basic Reproduction Number
stability
Sensitivity analysis
Taye
Faniran
tayefaniran@yahoo.com
1
Department of Computer Science, Lead City University, Ibadan
LEAD_AUTHOR
E.
Ayoola
eoayoola@googlemail.com
2
Department of Mathematics, University of Ibadan, Ibadan
AUTHOR
ORIGINAL_ARTICLE
Forecasting time series using Vector Autoregressive Model
In this study, a vector Autoregressive model was used to analysis the relationship between two time series as well as forecasting. Two financial time series have been used, which are a series of global monthly oil price and global monthly gold price in dollars for a period from January 2015 to Jun 2019. It has 54 monthly values, where the data has been transferred to get the Stationarity, Diekey Fuller test for the Stationarity was conducted. The best three order for model was determined through a standard Akaike information AIC, it is VAR(7) , VAR(8) and VAR(10) respectively. The comparison was made between selected orders by AIC based on the accuracy measure and mean square error (MSE). It turns out that less MSE value of the VAR(10) model. Some tests were conducted like Lagrange-multiplier, Portmanteau, Jarque - Bera to residuals for the selected model, with forecasting for the VAR(10) model for the period from Jun 2019 to Jun 2021 , It is 24 monthly value. It turns out that less MSE for forecasting value for oil price series is to VAR(7) model and less MSE for forecasting value for gold price series is VAR(10) model. The results have been computed through the Stata program.
https://ijnaa.semnan.ac.ir/article_5521_e45a0a97bd91f75225a0a95a478e7406.pdf
2022-01-01
499
511
10.22075/ijnaa.2022.5521
Lagrange-multiplier test
Mean Square Error
Portmanteau test
Standard Akaike information model
Lemya
Abdullah
lemyataha@yahoo.com
1
College of Arts - Information Technology Unit, University of Baghdad, Baghdad, Iraq.
LEAD_AUTHOR
ORIGINAL_ARTICLE
On the estimation the reliability stress-strength model for the odd Fr\`{e}chet inverse exponential distribution
The maximum likelihood estimator employs in this paper to shrinkage estimation procedure for an estimate the system reliability $R$ in the stress-strength model, when the stress and strength are independent and non-identically random variables and they follows the odd Fr\`{e}chet inverse exponential distribution (OFIED). Comparisons among the proposed estimators were presented depend on simulation established on mean squared error (MSE) criteria.
https://ijnaa.semnan.ac.ir/article_5524_114fb28b7507620c8d2f8e9a9758e235.pdf
2022-01-01
513
521
10.22075/ijnaa.2022.5524
odd Fr`{e}chet inverse exponential distribution
Reliability Stress--Strength model
Maximum likelihood estimator
Shrinkage estimator
Single Stage Shrunken estimator
mean squared
A. A.
Eman
eman.a.al@ihcoedu.uobaghdad.edu.iq
1
Department of Mathematics, Baghdad University, College of Education for Pure Sciences (Ibn Al--Haitham), Baghdad, Iraq
LEAD_AUTHOR
Abbas
Salman
abbasnajim66@yahoo.com
2
Department of Mathematics, Baghdad University, College of Education for Pure Sciences (Ibn Al--Haitham), Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
On the Nonlinear Impulsive Volterra-Fredholm Integrodifferential Equations
In this paper, we investigate existence and uniqueness of solutions of nonlinear Volterra-Fredholm impulsive integrodifferential equations. Utilizing theory of Picard operators we examine data dependence of solutions on initial conditions and on nonlinear functions involved in integrodifferential equations. Further, we extend the integral inequality for piece-wise continuous functions to mixed case and apply it to investigate the dependence of solution on initial data through $\epsilon$-approximate solutions. It is seen that the uniqueness and dependency results got by means of integral inequity requires less restrictions on the functions involved in the equations than that required through Picard operators theory.
https://ijnaa.semnan.ac.ir/article_5527_62fca4392d304bcbc05f67148bd9e8c2.pdf
2022-01-01
523
537
10.22075/ijnaa.2020.20005.2117
Volterra-Fredholm equation
Integral inequality
Impulse condition
$epsilon$-approximate solution
Dependence of solutions
Pallavi
Shikhare
jananishikhare13@gmail.com
1
Department of Mathematics,
Shivaji University, Kolhapur-416 004,
Maharashtra, India.
LEAD_AUTHOR
Kishor
Kucche
kdkucche@gmail.com
2
Shivaji University, Kolhapur.
AUTHOR
Jose
Sousa
ra160908@ime.unicamp.br
3
Department of Applied Mathematics, Imecc-Unicamp, 13083-859, Campinas, SP, Brazil.
AUTHOR
ORIGINAL_ARTICLE
The impact of petrochemical industry economic activities on environmental factors using a fuzzy mathematical programming model
Due to the nature of activities and processes, the petrochemical industry causes the production of industrial effluents, emissions and wastes that have adverse effects on the environment. The purpose of this study is to investigate the effect of petrochemical economic activities on environmental factors. In this paper, in order to minimize the costs and the amount of pollution caused by the emission of harmful gases, the closed-loop green supply chain model has been used, in which direct and reverse logistics networks have been considered. As a result, a fuzzy mathematical programming model has been developed for when the data are not definitively known. After the demand parameters and the amount of pollution are considered fuzzy, the maximum and bisector mean methods of the area are considered as methods (diffusion) of comparison and ranking of fuzzy definite numbers, and by adding Limitations of these two methods, the model was developed. To solve the model with real data, a plant from the petrochemical industry was selected and the data were prepared for a solution with very good estimates. Finally, the colonial competition algorithm was used to solve it. According to the model, its applicability was shown to reduce the number of environmental pollutants along with the reduction of transportation and waste, and the model for the closed-loop supply chain, which simultaneously considers two direct and inverse logistics networks. It is appropriate.
https://ijnaa.semnan.ac.ir/article_5510_9d6a44f8ba605a00c773ff7d5192a6df.pdf
2022-01-01
539
553
10.22075/ijnaa.2021.23377.2525
Fuzzy programming
Environmental pollutants
Petrochemical
Colonial competition algorithm
Abdolkhalegh
Vadian
abdolkalegh57vadian@gmail.com
1
Department of Industrial Management, Firoozkooh Branch, Islamic Azad University, Firoozkooh, Iran
AUTHOR
Mohammad Mehdi
Movahedi
mmmovahedi@gmail.com
2
Department of Industrial Management, Firoozkooh Branch, Islamic Azad University, Firoozkooh, Iran
LEAD_AUTHOR
Amir Gholam
Abri
amirgholamabri@gmail.com
3
Department of Mathematics, Firoozkooh Branch, Islamic Azad University, Firoozkooh, Iran
AUTHOR
Mohammad Reza
Lotfi
reza.lotfi300@gmail.com
4
Department of Industrial Management, Firoozkooh Branch, Islamic Azad University, Firoozkooh, Iran
AUTHOR
ORIGINAL_ARTICLE
n-Jordan *-Derivations in Frechet locally C*-algebras
Using the fixed point method, we prove the Hyers-Ulam stability and the superstability of $n$-Jordan $*$-derivations in Fr\'echet locally $C^*$-algebras for the following generalized Jensen-type functional equation$$ f\left(\frac{ a+b}{2} \right) + f\left( \frac{a-b}{2} \right) =f(a).$$
https://ijnaa.semnan.ac.ir/article_5532_772791b2081a9cb65e423eae02f8874e.pdf
2022-01-01
555
562
10.22075/ijnaa.2020.19996.2116
n-Jordan *-derivation
Frechet locally C-algebra
Frechet algebra
Fixed point method
Hyers-Ulam stability
Javad
Jamalzadeh
jamalzadeh1980@gmail.com
1
Department of Mathematics, Faculty of Mathematics, University of Sistan and Baluchestan, Zahedan, Iran
LEAD_AUTHOR
Khatere
Ghasemi
khatere.ghasemi@pgs.usb.ac.ir
2
Department of Mathematics, Faculty of Mathematics, University of Sistan and Baluchestan, Zahedan, Iran
AUTHOR
Shahram
Ghaffary
shahram.ghaffary@gmail.com
3
Department of Mathematics, Faculty of Mathematics, University of Sistan and Baluchestan, Zahedan, Iran
AUTHOR
ORIGINAL_ARTICLE
On the invariance properties of Vaidya-Bonner geodesics via symmetry operators
In the present paper, we try to investigate the Noether symmetries and Lie point symmetries of the Vaidya-Bonner geodesics. Classification of one--dimensional subalgebras of Lie point symmetries are considered. In fact, the collection of pairwise non-conjugate one--dimensional subalgebras that is called the optimal system of subalgebras is determined. Moreover, as illustrative examples, the symmetry analysis is implemented on two special cases of the system.
https://ijnaa.semnan.ac.ir/article_5538_50a531a4744c8629b389997e089ca76e.pdf
2022-01-01
563
571
10.22075/ijnaa.2020.21159.2238
determining equations
Lie point symmetry
Noether's theorem
optimal system
prolongation
Davood
Farrokhi
davoodfarokhi61@gmail.com
1
Department of Mathematics, Karaj Branch, Islamic Azad University, karaj, Iran.
AUTHOR
Rohollah
Bakhshandeh Chamazkoti
r_bakhshandeh@nit.ac.ir
2
Department of Mathematics, Faculty of Basic Sciences, Babol Noshirvani University of Technology, Babol, Iran
LEAD_AUTHOR
Mehdi
Nadjafikhah
m_nadjafikhah@iust.ac.ir
3
School of Mathematics, Iran University of Science and Technology Narmak, Tehran, 16846-13114, Iran
AUTHOR
ORIGINAL_ARTICLE
Some coupled coincidence and coupled common fixed point result in dislocated quasi b-metric spaces for rational type contraction mappings
The aim of this paper is to establish coupled coincidence and coupled common fixed point theorems involving a pair of weakly compatible mappings satisfying rational type contractive condition in the setting of dislocated quasi b-metric spaces. The presented result improves and generalizes several well-known comparable results in the existing literature. We also provided an example in support of our main result.
https://ijnaa.semnan.ac.ir/article_5539_5136459f2829301636f89b901f16912a.pdf
2022-01-01
573
582
10.22075/ijnaa.2020.21543.2270
Dislocated quasi b-metric space
coupled coincidence point
coupled common fixed point
weakly compatible mapping
Mesaud
Yimer
mesaudtesfaye05@gmail.com
1
Department of Mathematics, College of Natural and Computational Science, Samara University, Samara,Ethiopia
AUTHOR
Kidane
Koyas
kidanekoyas@yahoo.com
2
Department of Mathematics, Jimma University, Jimma, Ethiopia
LEAD_AUTHOR
Solomon
Gebregiorgis
solomon.gebregiorgis@ju.edu.et
3
Department of Mathematics, Jimma University, Jimma, Ethiopia
AUTHOR
ORIGINAL_ARTICLE
Review of machine learning and deep learning mechanism in cyber-physical system
Cyber-Physical Systems are one of the emerging technologies which involve the integration of cyber system physical and control systems. This Cyber-physical System automates the industrial process like manufacturing, monitoring and control. Since the system involves three different cyber, physical and control optimization domains, such systems are complex in nature and cannot be done with a traditional optimization mechanism. Machine learning and deep learning are efficient mechanisms to model the behavior of such complex systems for design and optimization. In this work, the application of machine learning mechanisms in the cyber-physical system for various purposes like security, re-organization, and scheduling. This systematic review will give more insight into the latest application and mechanism of machine learning and deep learning for the cyber-physical system.
https://ijnaa.semnan.ac.ir/article_5540_398b923a0de73cc0f5252c9ae9d90b7c.pdf
2022-01-01
583
590
10.22075/ijnaa.2022.5540
Anomalous detection
cyber-physical system
Deep learning
fault analysis
machine learning
security
scheduling
V
Padmajothi
padmajov@srmist.edu.in
1
ECE, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Avadi, Chennai, India
LEAD_AUTHOR
J L
Iqbal
drmazheriqbal@veltechuniv.edu
2
ECE, Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Avadi, Chennai, India
AUTHOR
ORIGINAL_ARTICLE
Genetic algorithm and principal components analysis in speech-based parkinson's early diagnosis studies
Parkinson's Disease (PD) is a neurodegenerative disorder that affects predominantly neurons in the brain. The main purpose of this paper is to define a way in detecting the PD in its early stages. This has been achieved through the use of recorded speech, a biomarker in the natural environment in its original state. In this paper, the Mel-Frequency Cepstral Coefficients (MFCC) method is utilized to extract features from the recorded speech. The principal component analysis (PCA) and Genetic algorithm (GA) are then applied for feature extraction/selection. Once the features are selected, multiple classifiers are then applied for classification. Performance metrics such as accuracy, specificity, and sensitivity are measured. The result shows that Support Vector Machine (SVM) along with the GA has shown optimal performance.
https://ijnaa.semnan.ac.ir/article_5541_cbbf3f9fea1e54ffab081301e9e4c060.pdf
2022-01-01
591
602
10.22075/ijnaa.2022.5541
Parkinson's disease
Support Vector Machine
Mel Frequency Cepstral Coefficient
principal component analysis
Accuracy
Sensitivity
Specificity
Genetic algorithm
Harisudha
Kuresan
harisudk@srmist.edu.in
1
Department of Electronics and Communication Engineering, College of Engineering and Technology, Faculty of Engineering and Technology SRM Institute of Science and Technology SRM Nagar, Kattankulathur 603203. Kanchipuram, Chennai T.N, India
AUTHOR
Dhanalakshmi
Samiappan
dhanalas@srmist.edu.in
2
Department of Electronics and Communication Engineering, College of Engineering and Technology, Faculty of Engineering and Technology SRM Institute of Science and Technology SRM Nagar, Kattankulathur 603203. Kanchipuram, Chennai T.N, India
LEAD_AUTHOR
ORIGINAL_ARTICLE
An innovative and robust technique for human identification and authentication based on a secure clinical signals transmission
EEG (Electroencephalogram) is brain waves measure. It is available test allowed to discover the brain functions over time. The brain troubles are evaluated by EEG. It is used to locate the activity in the brain during a seizure and to consider the patients who suffer from brain functionality problems. These troubles include tumors, coma, confusion and long-term difficulties (such as weakness associated with a stroke). The acquisition of EEG signals requires contact and liveliness and these signals are changes under stress that make so potentially unnecessary if it is acquired under menace. In this paper, an innovative and robust solution for this problem is introduced. To this end, the manner depends on models of various data compression models of information-theoretic plus the metrics symmetry related to Kolmogorov complexity. The proposed procedure compares two EEG segments and clusters the data into three groups: a corresponding record for each participant, a distinct person for each group, and self-participant. The technique was used to determine the database participant based on EEG signals. Using a distance measuring approach suggested in this scheme, a 1-NN classifier was constructed. Nearly every person in the underlying database could be accurately identified by the classifier with $96\%$ accuracy
https://ijnaa.semnan.ac.ir/article_5542_009e0de8249d5709287191d056a22834.pdf
2022-01-01
603
613
10.22075/ijnaa.2022.5542
Electroencephalogram (EEG)
Pearson Correlation (PrCo)
Euclidean Distance (EucDis)
Signal Encryption
Baqer
Hakim
h.bagher@alameed.edu.iq
1
College of Dentistry, University of Al-Ameed, Karbala PO Box 198, Iraq
AUTHOR
Ahmed
Radhi
ahmosawi@alameed.edu.iq
2
College of Pharmacy, University of Al-Ameed, Karbala PO Box 198, Iraq
LEAD_AUTHOR
Fuqdan
AL-Ibraheemi
fuqdan@razi.ac.ir
3
Department of Computer Engineering and Information Technology, Faculty of Engineering, Razi University, Kermanshah, Iran
AUTHOR
ORIGINAL_ARTICLE
Coefficient bounds for a new family of bi-univalent functions associated with $(U,V)$-Lucas polynomials
The aim of this paper is to use (U,V)-Lucas polynomials to introduce and study a new family of holomorphic and bi-univalent functions defined in the open unit disk which involve q-derivative operator. We investigate upper bounds for the Taylor-Maclaurin coefficients |d2| and |d3| and Fekete- Szego ̈ problem for functions belongs to this new family. Some interesting consequences of the results established here are indicated.
https://ijnaa.semnan.ac.ir/article_5549_ac9a6a2837f31e25fffa51b318915480.pdf
2022-01-01
615
626
10.22075/ijnaa.2021.23927.2639
(U
V )-Lucas polynomials
Bi-univalent function
Coefficient bounds
subordination
Timilehin
Shaba
shabatimilehin@gmail.com
1
Department of Mathematics, University of Ilorin, P. M. B. 1515, Ilorin, Nigeria
LEAD_AUTHOR
Abbas
Wanas
abbas.kareem.w@qu.edu.iq
2
University of Al-Qadisiyah, College of science, Department of Mathematics, Al Diwaniyah, Al-Qadisiyah, Iraq
AUTHOR
ORIGINAL_ARTICLE
A hybrid ARFIMA-fuzzy time series (FTS) model for forecasting daily cases of Covid-19 in Iraq
Most time series are characterized in practice that they consist of two components, linear and non-linear, and when making predictions, the single models are not sufficient to model these series. Recently several linear, non-linear and hybrid models have been proposed for prediction, In this research, a new hybrid model was proposed based on the combination of the linear model Auto-Regressive Fractionally Integrated Moving Average (ARFIMA) with the non-linear model fuzzy time series model (FTS). The proposed hybrid model analyzes the linear component of the specified time series using the ARFIMA model, calculates the estimated values, and then calculates the residuals for this model by subtracting the estimated values from the original time series. The nonlinear component is analyzed using the (FTS) model for the computed residuals, which inherently contain the nonlinear patterns of the time series. The final values for the prediction by applying the} {hybrid model (ARFIMA-FTS) are obtained by combining the predictions of the (ARFIMA) model of the original series with the predictions of the model (FTS) for the residual series. The new hybrid model was used to predict those infected with the Covid-19 virus in Iraq for the period from 24/2/2020 to 11/8/2021. The proposed model was more efficient in the prediction process than the single (ARFIMA) model using a number of comparison criteria, including (RMSE), (MAPE) and (MAE). The final results showed that the proposed model has the ability to predict time series that contain linear and nonlinear components
https://ijnaa.semnan.ac.ir/article_5553_6abe734a954f226ca01d0ad59b9d3a91.pdf
2022-01-01
627
641
10.22075/ijnaa.2022.5553
ARFIMA
Fuzzy Time Series
Long Memory Time Series
Hybrid Model
Saif
Salman
saif.salman0901@coadec.uobaghdad.edu.iq
1
Department of Statistics, College of Management and Economics, Baghdad University, Baghdad, Iraq
LEAD_AUTHOR
Emad
Aboudi
emadhazim@coadec.uobaghdad.edu.iq
2
Department of Statistics, College of Management and Economics, Baghdad University, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Investigation and Classification of Chronic Wound Tissue images Using Random Forest Algorithm (RF)
The broad increase make use of digital cameras, by hand wound imaging has turn out to be common practice in experimental place. There is in malice of still a condition for a reasonable device for accurate wound curing consideration between dimensional facility and tissue categorization in a exacting simple to exploit technique We achieved the major unit of this plan by computing a 3-D model for wound dimensions using un calibrated revelation techniques. We highlight at this point on tissue classification from color and eminence region descriptors computed after unverified segmentation. As a result of perception distortions, unconstrained lighting provisions and viewpoints, wound assessments modify commonly in the middle of patient review. The majority significant separation of this article is to overcome this trouble by means of a multi inspection approach for tissue classification, relying on a 3-D model onto which tissue labels are mapped and categorization result merged. The investigational categorization tests communicate that improved repeatability and robustness are obtained and that metric assessment is attain through appropriate region and degree dimensions and wound chart origin. In this manuscript we proposed wound image segmentation, tissue classification in grouping with the Random Forest (RF). These methodology are helpful for classifying the rate of injured tissue in a segmented element and improved accuracy.
https://ijnaa.semnan.ac.ir/article_5554_3a53cdebcc3bbfea2c14f80a41333677.pdf
2022-01-01
643
651
10.22075/ijnaa.2021.24438.2744
Mean Shift Filtering
Region Growing Method
Neural Network
and Random forest Classifier
Tissue classification
T.
Chitra
chitra18041987@gmail.com
1
Department of ECE, Christian College of Engineering \& Technology, Oddanchatram near, Pin code - 624619, Tamilnadu.
LEAD_AUTHOR
C.
Sundar
sundarc007@yahoo.com
2
Department of CSE, Christian College of Engineering & Technology, Oddanchatram near, Pin code - 624619, Tamilnadu.
AUTHOR
S.
GOPALAKRISHNAN
drsgk85@gmail.com
3
Department of Electronics and Communication Engineering, Siddhartha Institute of Technology and Sciences, Narapally, Pin Code - Hyderabad-500088.
AUTHOR
ORIGINAL_ARTICLE
Some common fixed point results of multivalued mappings on fuzzy metric space
The aim of this paper is to establish new fixed point theorems for single-valued and multivalued maps which satisfy α-ψ-contraction conditions in the complete fuzzy metric space. In this paper, we extend the results of Hussain et al. and Samet et al. Some comparative examples are also given which demonstrate the superiority of our results from the exiting results in the literature.
https://ijnaa.semnan.ac.ir/article_5581_2587f5db64fe82a85c09f8386cbf4084.pdf
2022-01-01
653
662
10.22075/ijnaa.2019.17938.1976
Fuzzy metric space
Fixed point
$alpha-psi-$contractive mapping
$alpha_{ast}-$admissible
Hausdorff fuzzy metric space
Mohit
Kumar
mkdgkv@gmail.com
1
Department of Mathematics, School of Computing, University of Engineering and technology Roorkee, Haridwar, Uttarakhand-247667, India
LEAD_AUTHOR
Ritu
Arora
ritu.arora29@gmail.com
2
Department of Mathematics, Kanya Gurukula Campus, Gurukula Kangri Vishwavidyalaya, Haridwar, Uttarakhand-249404, India
AUTHOR
Ajay
Kumar
ajaygraph.gkv.math@gmail.com
3
Department of Mathematics, Shaheed Srimati Hansa Dhanai Government Degree College, Agrora (Dharmandal), Tehri Garhwal, Uttarakhand -249127, India
AUTHOR
ORIGINAL_ARTICLE
Solving partial differential equations via a hybrid method between homotopy analytical method and Harris hawks optimization algorithm
In this article, a modern analytical technique called Homotopy Analysis Method (HAM) has been applied to several partial differential equations to obtain their sequential solution. The performance of the method was analysed on partial differential equations and found to be computationally efficient. The homotopy analysis method (HAM) has been found to be effective. The numerical results have been improved by proposing a new technique that combines the numerical method with the Harris Hawks Optimization algorithm. The current numerical results are compared to the exact solutions and it's found to be in very good results.
https://ijnaa.semnan.ac.ir/article_5555_f080e3ca09d6816c9a81c68fbb8f4a0c.pdf
2022-01-01
663
671
10.22075/ijnaa.2022.5555
homotopy analytical method
Harris hawks optimization algorithm
Partial differential equations
Abeer
Ahmad
abeeraldabagh@uomosul.edu.iq
1
Department of Mathematics, College of Computer Sciences and Mathematics, University of Mosul, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Impact of movement control order implementation on electricity consumption: A case study of university buildings
The Covid-19 pandemic has first been identified in China at the end of 2019 and later has spread worldwide. In Malaysia, Covid-19 cases have increased drastically in March 2020 that caused the Government to implement a Movement Control Order (MCO) starting 18 March 2020 to curb the outbreak which has affected all sectors in the country including higher education institutions. The objective of this paper is to present the impact of MCO implementation on the electricity consumption on the university buildings particularly at Universiti Malaysia Perlis. The methodology processes involve comparing the energy usage in 2019 as baseline data with usage in 2020 as the assessed data. These data then been analyzed for every 3 months or quarterly for reporting. Based on the results, MCO implementation has shown positive impact to the energy conservation where 3,023 MWh of electrical energy has been reduced in 2020 which is 25.72% less than the same period in 2019. This condition has been extremely beneficial to the university’s operations where RM 1.369 million of electricity bill has been saved. In the aspect of environmental sustainability, the amount of energy reduction is equivalent to more than 2,000 tonnes of CO2 avoidance at rated value 0.694 tCO2 per MWh. As a result from energy reduction, the BEI performance of the buildings has improved from 3-Star (moderately efficient) to 4-Star (efficient).
https://ijnaa.semnan.ac.ir/article_5556_c415381d2cfcad37ee45f79d8d5c5fc6.pdf
2022-01-01
673
684
10.22075/ijnaa.2022.5556
COVID-19
Lockdown
Energy consumption
Building Energy Intensity and Sustainability
Tunku Muhammad Nizar
Tunku Mansur
tunkunizar@unimap.edu.my
1
Faculty of Electrical Engineering Technology, University Malaysia Perlis, Arau, Perlis, Malaysia
LEAD_AUTHOR
Nor Hanisah
Baharudin
norhanisah@unimap.edu.my
2
Faculty of Electrical Engineering Technology, University Malaysia Perlis, Arau, Perlis, Malaysia
AUTHOR
Rosnazri
Ali
rosnazri@unimap.edu.my
3
Faculty of Electrical Engineering Technology, University Malaysia Perlis, Arau, Perlis, Malaysia
AUTHOR
Saifol
Nizal Sharif
saifolnizal@unimap.edu.my
4
Development Department, University Malaysia Perlis, Malaysia
AUTHOR
ORIGINAL_ARTICLE
Fixed point theorem for asymptotically nonexpansive mappings under a new iteration sequence in CAT(0) space
This paper is to define a new iterative scheme under a special sequence of asymptotically nonexpansive mapping with a special sequence. We prove some convergence, existence in {CAT(0)} space.
https://ijnaa.semnan.ac.ir/article_5557_2a0d5fe19cc97b56af8f84fa690bab19.pdf
2022-01-01
685
691
10.22075/ijnaa.2022.5557
{CAT(0)} space
new iteration sequence
$mathrm{Delta}$-{convergent subsequence}
Ahmed
Hadi
ahmed08hadi@gmail.com
1
Mathematics Science, Ministry of Education, Directorate of Education Baghdad Al-Rusafa 1{st}, Iraq
LEAD_AUTHOR
Sabah
Malih
sabahhassanmalih@gmail.com
2
Department of mathematics, College of Education for pure science (Ibn-ALHaitham), university of Baghdad, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Implementation of three-phase DSTATCOM using frequency domain-based voltage reference configuration(VRC)control algorithm for power quality improvement
Power quality problems in the distribution system have tremendously escalated due to numerousconsumptions of various types of loads especially nonlinear loads. These problems have affectedthe utility grid and the consumers in the distribution system resulting in equipment breakdown,overheating in utility system equipment, and other problems related to electronics devices that arebeing used by the utility system and the consumers. The electronics devices are quite sensitiveand can be malfunctioned even with small disruptions that occured in the supply power system.The power quality problem involved with nonlinear loads can be mitigated by using DistributionStatic Synchronous Compensator (DSTATCOM). This paper proposed a method for power qualityimprovement by using a Frequency Domain-based Voltage Reference Configuration (VRC) controlalgorithm for the Distribution Static Synchronous Compensator (DSTATCOM) in a three-phasedistribution system. The performance of the proposed control algorithm is simulated in the MATLABenvironment using Simulink. It is verified that the proposed control algorithm can reduce the THDof the distorted grid current at the Point of Common Coupling (PCC) below 5% according to theIEEE Standard 519:2014 under nonlinear loads and unbalanced loads conditions.
https://ijnaa.semnan.ac.ir/article_5558_a62a82b2ea6fe08712f8eb3602f3f015.pdf
2022-01-01
693
705
10.22075/ijnaa.2022.5558
Distribution Static Synchronous Compensator (DSTATCOM)
Three-phase three-wire (3P3W)
Voltage Reference Configuration (VRC)
Frequency Domain
Nur Fatini
Ahmad Sobri
nurfatiniahmad7@gmail.com
1
Faculty of Electrical Engineering Technology, University Malaysia Perlis, Arau, Perlis, Malaysia
AUTHOR
Nor Hanisah
Baharudin
norhanisah@unimap.edu.my
2
Faculty of Electrical Engineering Technology, University Malaysia Perlis, Arau, Perlis, Malaysia
LEAD_AUTHOR
Tunku Muhammad Nizar
Tunku Mansur
tunkunizar@unimap.edu.my
3
Faculty of Electrical Engineering Technology, University Malaysia Perlis, Arau, Perlis, Malaysia
AUTHOR
Rosnazri
Ali
rosnazri@unimap.edu.my
4
Faculty of Electrical Engineering Technology, University Malaysia Perlis, Arau, Perlis, Malaysia
AUTHOR
ORIGINAL_ARTICLE
A modification of the Cayley-Purser algorithm
Cayley- Purser Algorithm is a public key algorithm invited by Sarah Flannery in 1998. The algorithm of Cayley-Purser is much faster than some public key methods like RSA but the problem of it is that it can be easily broken especially if some of the private key information is known. The solution to this problem is to modify this algorithm to be more secure than before so that it gives its utilizers the confidence of using it in encrypting important and sensitive information. In this paper, a modification to this algorithm based on using general linear groups over Galois field $GF(p^n)$, which is represented by $GL_m(GF(p^n))$ where $n$ and $m$ are positive integers and $p$ is prime, instead of $GL_2(Z_n)$ which is General linear set of inverted matrices $2 \times 2$ whose entries are integers modulo $n$. This $GL_m(GF(p^n))$ ensures that the secret key of this algorithm would be very hard to be obtained. Therefore, this new modification can make the Cayley-Purser Algorithm more immune to any future attacks.
https://ijnaa.semnan.ac.ir/article_5559_0b04d85b821583d12a695805b3f5cf5c.pdf
2022-01-01
707
716
10.22075/ijnaa.2022.5559
cryptography
Cayley- Purser Algorithm
Galois field $ GF(p^{n})$
General Linear group over $ GF(p^{n})(GL_{m}(GF(p^{n}))$
Encryption, Decryption
Sameerah Faris
Khlebus
sameerah.alradhi@uoitc.edu.iq
1
College of Business Administration of Informatics, University of Information Technology and Communication, Baghdad, Iraq
LEAD_AUTHOR
Rajaa K.
Hasoun
dr.rajaa@uoitc.edu.iq
2
College of Business Administration of Informatics, University of Information Technology and Communication, Baghdad, Iraq
AUTHOR
Bassam
Sabri
bassam.ali@uoitc.edu.iq
3
College of Business Administration of Informatics, University of Information Technology and Communication, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Evaluating the performance of company risk disclosure on improving the decision-making power of investors using hierarchical analysis technique(AHP)
Researchers have traditionally focused more on the quantity of company information disclosures, but in recent years, the quality of the information disclosed is more important than their quantity. On the other hand, the primary purpose of financial reporting is to provide useful information to stakeholders in relation to the conditions of the company to help investors' economic decisions, which is a function of the quality of the information provided by companies. Therefore, in the present study, by examining the opinions of experts and using the process of hierarchical analysis technique, the weight and importance of risk information disclosure criteria at three different levels (general, company specific and industry specific) were extracted in comparison, then by prioritizing them, Compatibility rate was calculated. Using statistical methods of two-way analysis of variance within the subject, it was concluded that there is no significant difference between the effect of risk information disclosure criteria on corporate investors' decision making.
https://ijnaa.semnan.ac.ir/article_5574_d41d8cd98f00b204e9800998ecf8427e.pdf
2022-01-01
717
728
10.22075/ijnaa.2021.23520.2553
Risk information disclosure
Hierarchical analysis
Investor decision-making power
Maryam
Ahmadi
maryamahmadi1390@yahoo.com
1
Department of Accounting, Qazvin Branch, Islamic Azad University, Qazvin, Iran
AUTHOR
Farzin
Rezaei
farzin.rezaei@qiau.ac.ir
2
Department of Accounting, Qazvin Branch, Islamic Azad University, Qazvin, Iran
LEAD_AUTHOR
Naser
Hamidi
nhamidi1344@gmail.com
3
Department of Of Industrial Management, Qazvin Branch, Islamic Azad University, Qazvin, Iran
AUTHOR
ORIGINAL_ARTICLE
Establishing mathematical models for determining quantum dot potential for pbs and pbte structures in terms of QD's diameters by numerical methods
The main goal of this paper is to obtain the estimated determination of the quantum dot potential for PbS and PbTe structures (in mV) which are compared to other values at different QD's diameters (in nm). In order to investigate this goal, the study relies on two methods of interpolation such as Neville and Spline methods, as well as it constructs mathematical models that help to find the estimate determination of quantum dot potential for PbS and PbTe structures compared to other values at different QD's diameters. The numerical results were very close to the real results. Finally, we estimated the determinations outside the fields and labs of the measured areas.
https://ijnaa.semnan.ac.ir/article_5575_cb9f733233e1c25508e2fdcb1cc96a7d.pdf
2022-01-01
729
735
10.22075/ijnaa.2022.5575
Mathematical model
Neville's method
Spline method
Quantum dot potential for PbS and PbTe
Diameter
Aws
Hamdi
aws7331@gmail.com
1
Directorate of Education Salah Eddin, Ministry of Education, Iraq
LEAD_AUTHOR
Ghassan
Arif
ghasanarif@tu.edu.iq
2
Department of Mathematics, College of Education for Pure Sciences, Tikrit University, Iraq
AUTHOR
Anas
Hamdi
anasasaad785@gmail.com
3
Directorate General of Education in Salah al-Din Province, Iraq
AUTHOR
ORIGINAL_ARTICLE
On $B^{ic}$-open set and $B^{ic}$-continuous function in topological spaces
In this paper, we have introduced a new class of sets in topological space called $B^{ic}$-open set and we have introduced and study the properties of $B^{ic}$-continuous function and topological properties.
https://ijnaa.semnan.ac.ir/article_5576_6715a59a7ffa083b5cb4ed028fcb274a.pdf
2022-01-01
737
744
10.22075/ijnaa.2022.5576
$beta$-open set
$B^{ic}$-open set
$B^{ic}$-continuous function
$beta$- irresolute function
$B^{ic}$-irresolute function
Luma
Abdalbaqi
lumahhany1977@tu.edu.iq
1
Department of Mathematics, College of Education for Women, University of Tikrit, Tikrit, Iraq
LEAD_AUTHOR
Zeina
Abdalqater
ztaha@tu.edu.iq
2
Department of Mathematics, College of Education for Women, University of Tikrit, Tikrit, Iraq
AUTHOR
Hiba
Mousa
hom_34@tu.edu.iq
3
Department of Mathematics, College of Education for Women, University of Tikrit, Tikrit, Iraq
AUTHOR
ORIGINAL_ARTICLE
A landscape view of deepfake techniques and detection methods
Deep fakes is the process of changing the information of the image or video with different techniquesand methods that start with humor and fun and sometimes reach economic, political and social goalssuch as counterfeiting, financial fraud or impersonation. The data for this field is still increasing at avery high rate. And therefore. The process of combating and exploring them is a very difficult task.In this paper, we conducted a review of previous studies and what researchers dealt with on thesubject of deep fakes. Explain the concepts of deepfakes. Counterfeiting methods and techniquesand patterns through the techniques and algorithms used in counterfeiting. Some deepfake detectionalgorithms.
https://ijnaa.semnan.ac.ir/article_5580_0347fd12327a7f700e9f29ba27ffd157.pdf
2022-01-01
745
755
10.22075/ijnaa.2022.5580
Manipulation
faking
deepfakes
counterfeiting
Ahmed
Abdulreda
ahmeds.albudairi@student.uokufa.edu.iq
1
Faculty of Computer Science and Mathematics, University of Kufa, Iraq
LEAD_AUTHOR
Ahmed
Obaid
ahmedj.aljanaby@uokufa.edu.iq
2
Faculty of Computer Science and Mathematics, University of Kufa, Iraq
AUTHOR
ORIGINAL_ARTICLE
Comparing predicative power of foreign adjusted bankruptcy through providing proposed model of bankruptcy in Iran
The aim of the present study was to compare the productive power of foreign adjusted bankruptcy by providing a proposed model of bankruptcy in Iran. This research is applied in terms of purpose and descriptive and correlational in terms of nature which through that bankruptcy models are studied according to the Shumway's hazard model (2001), and in the form of a logit model and accounting are evaluated based on Pourheydari's and Koopayee's model (2010). Accordingly, a sample including1287 years, the company from 2006 to 2018 has been selected from Tehran Stock Exchange. For statistical hypothesis testing, receiver operating characteristics (ROC) was applied. Receiver operating characteristics is applicable in software like SAS, SPSS, and STATA. The results showed that Shumway's model (2001) provides a more accurate bankruptcy prediction of companies and this is the sign of superiority of the hazard model over classic models.
https://ijnaa.semnan.ac.ir/article_5582_33c9a52f2794f3ff2907518e9633e050.pdf
2022-01-01
757
764
10.22075/ijnaa.2021.24005.2651
Bankruptcy
Financial Crisis
Stock Exchange
Mohammad
Sarhadi
mohammad_sarhaddi111@yahoo.com
1
Department of Accounting, Sistan and Baluchestan University, Zahedan, Iran
AUTHOR
Fardin
Mansouri
fm_mansor@yahoo.com
2
Department of Accounting, Sistan and Baluchestan University, Zahedan, Iran
LEAD_AUTHOR
Mahdi
Faghani
mahdifaghani@gmail.com
3
Department of Accounting, Sistan and Baluchestan University, Zahedan, Iran
AUTHOR
ORIGINAL_ARTICLE
Medical data encryption in private cloud based on MAR
It’s easy to exchange files, folders, and emails in a private network with the aid of a private cloud (PriCld). However, the most common attack with this sort of system is the guessing of the password. The unencrypted connection makes it potential for a man-in-the-middle attack (MaMiAtk) to occur at times. Scanners used to discover vulnerabilities in the system and exploiting them are also a major issue. Therefore, a system that can withstand assaults such as MaMiAtk, Denial of Service Attack (DoS attack), and password guessing is required. In the presented study, a log-based analysis approach has been recommended to guard the system against assaults such as DoS attack, password guessing, and automated scanners. We also use encrypted channels to prevent attacks such as MaMiAtk.
https://ijnaa.semnan.ac.ir/article_5583_2dc865493eefcd4a65873221a0daf519.pdf
2022-01-01
765
771
10.22075/ijnaa.2022.5583
Denial of service (DoS attack)
Medical Record Analysis (MAR)
Private Cloud (PriCld)
man-in-the-middle (MaMiAtk)
Ahmed
Radhi
ahmosawi@alameed.edu.iq
1
College of Pharmacy, University of Al-Ameed, Karbala PO Box 198, Iraq
LEAD_AUTHOR
Baqer
Hakim
h.bagher@alameed.edu.iq
2
College of Dentistry, University of Al-Ameed, Karbala PO Box 198, Iraq
AUTHOR
Fuqdan
AL-Ibraheemi
fuqdan@razi.ac.ir
3
Department of Computer Engineering and Information Technology, Faculty of Engineering, Razi University, Kermanshah, Iran
AUTHOR
ORIGINAL_ARTICLE
A hybrid technique for EEG signals evaluation and classification as a step towards to neurological and cerebral disorders diagnosis
Electroencephalography (EEG) signals are commonly used to identify and diagnose brain disorders. Each EEG normal waveform consists of the following waveforms: Gamma(γ) wave, Beta (β) wave, Alpha (α), Theta (θ), and Delta (δ). The term Neurological Diseases ” NurDis ” is used to describe a variety of conditions that affect the nervous Epilepsy, neuro infections (bacterial and viral), brain tumors, cerebrovascular diseases, Alzheimer’s disease, and various dementias are all examples of neurological disorders. Encephalitis is one of the illnesses that affects the brain. The EEG signals used in this paper were from the CHB-MIT Scalp EEG database. The discrete wavelet transform (DWT) was utilized to extract characteristics from the filtered EEG data. Finally, classifiers such as K Nearest Neighbor (KNN) and Support vector machine (SVM) were used to categorize the EEG signals into normal and pathological signal classes using all of the computed characteristics. In order to categorize the signal in a normal and anomalous group, the KNN and SVM classifiers are employed. For both classifiers, performance assessments (accuracy, sensitivity and specificity) are determined. KNN classifier accuracy is 71.88%, whereas SVM classifier accuracy is 81.23%. The sensitivity of KNN and SVM are 80.14% and 77.31%, respectively. The KNN classification specificity is 69.62% and the SVM classification specificity is 98%. Both classifiers performance is evaluated using the confusion matrix.
https://ijnaa.semnan.ac.ir/article_5590_be8a378d229dd308c4305d734cf951aa.pdf
2022-01-01
773
781
10.22075/ijnaa.2022.5590
Discrete wavelet transform (DWT)
Support Vector Machine (SVM)
Electroencephalography (EEG) signals
K-Nearest neighbor (KNN)
Azmi
Abdulbaqi
msc@uoanbar.edu.iq
1
College of Computer Science and Information Technology, University of Anbar, Iraq
AUTHOR
Muhanad
Younis
mty@uomustansiriyah.edu.iq
2
Department of Computer Science, Science College, Mustansiriyah University, Baghdad, Iraq.
LEAD_AUTHOR
Younus
Younus
younus.younus@sadiq.edu.iq
3
Department of Oil and gas economics, college of administration sciences and financial, Imam Ja’afar Al-sadiq university, Baghdad, Iraq
AUTHOR
Ahmed
Obaid
ahmedj.aljanaby@uokufa.edu.iq
4
Faculty of Computer Science and Mathematics, University of Kufa, Iraq.
AUTHOR
ORIGINAL_ARTICLE
A numerical scheme for solving nonlinear parabolic partial differential equations with piecewise constant arguments
This article deals with the nonlinear parabolic equation with piecewise continuous arguments (EPCA). This study, therefore, with the aid of the $\theta$ -methods, aims at presenting a numerical solution scheme for solving such types of equations which has applications in certain ecological studies. Moreover, the convergence and stability of our proposed numerical method are investigated. Finally, to support and confirm our theoretical results, some numerical examples are also presented.
https://ijnaa.semnan.ac.ir/article_5591_36623c277a7661b23cf08680de098715.pdf
2022-01-01
783
789
10.22075/ijnaa.2021.23741.2608
Partial differential equation with piecewise constant arguments (EPCA)
$theta$-methods
Convergence
Trust-region-dogleg method
Mojgan
Esmailzadeh
m.esmailzadeh11@gmail.com
1
Department of Applied Mathematics, Bandar Anzali Branch, Islamic Azad University, Bandar Anzali , Iran
LEAD_AUTHOR
Javad
Alavi
javadealavi@gmail.com
2
Department of Applied Mathematics and Computer Science, Faculty of Mathematical Sciences, University of Guilan, Rasht, Iran
AUTHOR
Hashem
Saberi Najafi
hnajafi@guilan.ac.ir
3
Department of Applied Mathematics and Computer Science, Faculty of Mathematical Sciences, University of Guilan, Rasht, Iran
AUTHOR
ORIGINAL_ARTICLE
A self-adaptive hybrid inertial algorithm for split feasibility problems in Banach spaces
In this paper, we introduce a new self-adaptive hybrid algorithm of inertial form for solving Split Feasibility Problem (SFP) which also solve a Monotone Inclusion Problem (MIP) and a Fixed Point Problem (FPP) in $p$-uniformly convex and uniformly smooth Banach spaces. Motivated by the self-adaptive technique, we incorporate the inertial technique to accelerate the convergence of the proposed method. Under standard and mild assumption of monotonicity of the SFP associated mapping, we establish the strong convergence of the sequence generated by our algorithm which does not require a prior knowledge of the norm of the bounded linear operator. Some numerical examples are presented to illustrate the performance of our method as well as comparing it with some related methods in the literature.
https://ijnaa.semnan.ac.ir/article_5595_f47f154e6a3737e0c65c31d59e56917a.pdf
2022-01-01
791
812
10.22075/ijnaa.2021.23402.2532
split feasibility problem
Bregman distance
uniformly smooth Banach spaces
uniformly convex Banach spaces
Variational inequalities
Bregman and metric projection
Abd-semii Oluwatosin-Enitan
Owolabi
218086824@stu.ukzn.ac.za
1
School of Mathematics, Statistics and Computer Science, University of KwaZulu-Natal, Durban, South Africa
AUTHOR
Adeolu
Taiwo
218086816@stu.ukzn.ac.za
2
School of Mathematics, Statistics and Computer Science, University of KwaZulu-Natal, Durban, South Africa
AUTHOR
Lateef
Jolaoso
216074984@stu.ukzn.ac.za
3
School of Mathematics, Statistics and Computer Science, University of KwaZulu-Natal, Durban, South Africa
AUTHOR
Oluwatosin
Mewomo
mewomoo@ukzn.ac.za
4
School of Mathematics, Statistics and Computer Science, University of KwaZulu-Natal, Durban, South Africa
LEAD_AUTHOR
ORIGINAL_ARTICLE
The operations effects on the line graphs of simple graphs
The line graph of the graph $\Gamma$ denoted by $L(\Gamma)$ is a graph with a vertex set consists of the sets of edges of $\Gamma$ and two vertices are adjacent in $L(\Gamma)$ if they are incident in $\Gamma$. In this article, we discuss and determine the effect of operations on the line graphs of simple graphs.
https://ijnaa.semnan.ac.ir/article_5599_d3736b5a5a43df78cbdd3e0e22a8e2ae.pdf
2022-01-01
813
816
10.22075/ijnaa.2022.5599
Graph
simple
line graph
operations
Fawwaz
Wrikat
fawwari@gmail.com
1
Department of Mathematics and Statics, Mutah University, Al-Karak, Jordan
LEAD_AUTHOR
ORIGINAL_ARTICLE
Comparison of edge discrimination of microbubbles between Sobel and improved mathematics of Canny edge detection
Bubble sizes are generated by micro-bubble generators (MBGs) in the water for their effect on the percentage of dissolved oxygen in the water and we find this in aquaculture where oxygen is important to marine life and in many applications. And since these bubbles range in size from 20 to 50, we need to highlight the shape of the bubble and distinguish it, so two Sobel algorithms were used and the Canny method was improved and compared between them, where the edge detection algorithm is sensitive to noise, and therefore, it is easy to lose weak edge information when filtering noise, and it appears ts fixed parameters are weak adaptability. In response to these problems, this paper proposed an improved algorithm based on the Canny algorithm. This algorithm introduced the concept of gravitational field strength to replace the image gradient and obtained the gravitational field strength factor. Two methods for choosing the adaptive threshold based on the average image gradation The size and standard deviation of two types of model images (one containing less edge information, the other containing rich edge information) were subtracted, respectively. The improved Canny algorithm is simple and easy to achieve. Experimental results show that the algorithm can retain more useful information and is more robust in the face of noise.
https://ijnaa.semnan.ac.ir/article_5600_9025deb0b1144a442ec6d7ecaf1cade8.pdf
2022-01-01
817
829
10.22075/ijnaa.2022.5600
Bubble size
Detection Technique
Sobel edge detection
improved Canny algorithm
Ayman
Qaddoori
ms201910470@iips.icci.edu.iq
1
Informatics Institute for Postgraduate Studies Iraqi Commission for Computer and Informatics, Baghdad, Iraq
LEAD_AUTHOR
Jamila
Saud
dr.jameelahharbi@uomustansiriyah.edu.iq
2
College of Science, Mustansiriyah University, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Fixed point on generalized dislocated metric spaces
In the present paper, we introduce new types of convergence of a sequence in left dislocated and right dislocated metric spaces. Also, we generalize the Banach contraction principle in these newly defined generalized metric spaces.
https://ijnaa.semnan.ac.ir/article_5601_ae584b0e9f2cb4138d40147bad8a3eff.pdf
2022-01-01
831
836
10.22075/ijnaa.2020.20980.2218
Fixed point
left dislocated metric
right dislocated metric
Contraction
M
Ahmed
moh.hassan@mu.edu.sa
1
Department of Mathematics, Faculty of Science, Al-Zulfi, Majmaah University, Majmaah, 11952, Saudi Arabia
AUTHOR
Ismat
Beg
ibeg@lahoreschool.edu.pk
2
Centre for Mathematics and Statistical Sciences, Lahore School of Economics, Lahore 53200, Pakistan
LEAD_AUTHOR
S
Khafagy
khafagy@mu.edu.sa
3
Department of Mathematics, Faculty of Science, Al-Zulfi, Majmaah University, Majmaah, 11952, Saudi Arabia
AUTHOR
N.
Nafadi
hatem9007@yahoo.com
4
Department of Mathematics, Faculty of Science, Port Said University, Port Said, Egypt
AUTHOR
ORIGINAL_ARTICLE
Mathematical analysis wavelets characteristics and their applications
Wavelets are now perceived as a ground-breaking new mathematical apparatus in signal and picture handling, time arrangement analysis, geophysics, guess hypothesis, and numerous various zones. Wavelet analysis has been an effective way to deal with issues related to analysing a signal in both time and frequency areas. Analysing a non-stationary signal becomes difficult for the various transform methods. Wavelet transforms techniques like Fourier Transform (FT), short-time Fourier transforms (STFT), and wavelet transform (WT) methods and their application are also discussed in detail. Wavelet analysis can be applied to one-dimensional signals like audio signals as well as two-dimensional signals like images. However wavelet processing has wide applications, some of the applications and methods are discussed in the paper.
https://ijnaa.semnan.ac.ir/article_5602_bc9c921000a4799e643d0172d5aaba8f.pdf
2022-01-01
837
850
10.22075/ijnaa.2022.5602
Mathematical study
wavelet analysis
signal
Frequency
application and transform methods
Ali
Shaker
alinaji@scrdiraq.gov.iq
1
Directorate of Scholarships and Cultural Relations, Ministry of Higher Education and Scientific Research of Iraq, Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Simulation and analysis of queuing networks at Basra International Airport using the program R
Airports are considered a civilized interface that reflects the economic strength of the country and its development, and that Basra International Airport is the second largest airport in Iraq in terms of area, and one of the most important services it provides is to reduce the waiting time at the boarding pass stations and the security check station and passport stamping for foreign trips and to calculate the airport's ability to leave travellers from Basra airport. The simulation was used to find out the ability of Basra Airport to accommodate the number of passengers at peak times of the sequential queuing networks model.
https://ijnaa.semnan.ac.ir/article_5603_91e757d434560f45cec278dcf25b236b.pdf
2022-01-01
851
858
10.22075/ijnaa.2022.5603
Basra International Airpor
Simulation, queuing networks
programming language R
Salwan
Saleh
ssalwan86@yahoo.com
1
Collage of Management and Economic, University of Basra, Iraq
LEAD_AUTHOR
Nada
Jarah
nadabadrjarah@yahoo.com
2
Collage of Management and Economic, University of Basra, Iraq
AUTHOR
ORIGINAL_ARTICLE
Application of a generalization of Darbo's fixed point theorem via Mizogochi-Takahashi mappings on mixed fractional integral equations involving $(k, s)$-Riemann-Liouville and Erd\'{e}lyi-Kober fractional integrals
We have established the solvability of fractional integral equations with both $(k,s)$-Riemann-Liouville and Erd\'{e}lyi-Kober fractional integrals using a new generalized version of the Darbo's theorem using Mizogochi-Takahashi mappings and justify the validity of our results with the help of suitable examples.
https://ijnaa.semnan.ac.ir/article_5604_2875eb12ff04d03bd58ea4a26040bb6d.pdf
2022-01-01
859
869
10.22075/ijnaa.2021.23002.2451
Functional integral equations (FIE)
Measure of non-compactness (MNC)
Fixed point theorems (FPT)
Anupam
Das
math.anupam@gmail.com
1
Department of Mathematics, Cotton University, Panbazar, Guwahati-781001, Assam, India
AUTHOR
Vahid
Parvaneh
zam.dalahoo@gmail.com
2
Department of Mathematics, Gilan-E-Gharb Branch, Islamic Azad University, Gilan-E-Gharb, Iran
LEAD_AUTHOR
Bhuban
Deuri
bhuban.math@gmail.com
3
Department of Mathematics, Rajiv Gandhi University, Rono Hills, Doimukh-791112, Arunachal Pradesh, India
AUTHOR
Zohreh
Bagheri
zohrehbagheri@yahoo.com
4
Department of Mathematics, Azadshahr Branch, Islamic Azad University, Azadshahr, Iran
AUTHOR
ORIGINAL_ARTICLE
Approximation (M.S.E) of the shape parameter for Pareto distribution by using the standard Bayes estimator
In this paper, Pareto distribution was studied using a standard Bayes estimator. A Pareto distribution of two parameters is investigated to find the approximation of (M.S.E) of the shape parameter by depending on Tyler series of two variables to propose a model mathematically.
https://ijnaa.semnan.ac.ir/article_5605_2258fcb465c3fb0182d4b7fc592a5f9f.pdf
2022-01-01
871
880
10.22075/ijnaa.2022.5605
Approximation
Bayes estimator
Pareto distribution
Shape parameter
Jefferys prior
Adwea
Atewi
adwea-naji@mtu.edu.iq
1
Institute of Medical Technology- Al-Mansour, Middle Technical University, Baghdad, Iraq
LEAD_AUTHOR
Safaa
Ali
safajawad1970@gmail.com
2
Institute of Medical Technology- Al-Mansour, Middle Technical University, Baghdad, Iraq
AUTHOR
Bushra
Swedan Naser
bushrasewdan@gmail.com
3
Institute of Medical Technology- Al-Mansour, Middle Technical University, Baghdad, Iraq
AUTHOR
Muataz
Harhoosh
muataz_adnan@mtu.edu.iq
4
Institute of Medical Technology- Al-Mansour, Middle Technical University, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
E-small essential submodules
Let $R$ be a commutative ring with identity, and \(U_{R}\) be an $R$-module, with \(E = End(U_{R})\). In this work we consider a generalization of class small essential submodules namely E-small essential submodules. Where the submodule $Q$ of \(U_{R}\) is said E-small essential if $Q$ \(\cap W = 0\) , when W is a small submodule of \(U_{R}\), implies that \(N_{S}\left( W \right) = 0\), where \(N_{S}\left( W \right) = \left\{ \psi \in E\ |\ Im\psi \subseteq W \right\}\). The intersection \({\overline{B}}_{R}(U)\) of each submodule of \(U_{R}\) contained in \(Soc(U_{R})\). The \({\overline{B}}_{R}(U)\) is unique largest E-small essential submodule of \(U_{R}\), if \(U_{R}\) is cyclic. Also in this paper we study \({\overline{B}}_{R}(U)\) and \({\overline{W}}_{E}\left( U \right)\). The condition when \({\overline{B}}_{R}(U)\) is E-small essential, and \(\text{Tot}\left( \ U,U \right) = {\overline{W}}_{E}\left( U \right) = J(E)\) are given.
https://ijnaa.semnan.ac.ir/article_5608_eb51ebc1345480975b341782413114a2.pdf
2022-01-01
881
887
10.22075/ijnaa.2022.5608
Small submodule
Small essential submodules
E-small essential submodules
Endomorphism ring
Mamoon
Khalf
mamoun42@uosamarra.edu.iq
1
Department of Physics, College of Education, University of Samarra, Iraq
LEAD_AUTHOR
Hind
Abbas
hind.f1975@gmail.com
2
Directorate of Education Salah Eddin, Khaled Ibn Al Walid School, Tikrit, Iraq
AUTHOR
ORIGINAL_ARTICLE
Qualitative study of an eco-epidemiological model with anti-predator and migration presence
In this work, an environmental and epidemiological model has been formulated and analyzed, where it was assumed that there is a disease in the predator society of an incurable type and does not give the predator immunity that leads to the death of the affected predator in the end. On the other hand, it has been assumed that a healthy predator is only capable of predation according to a functional response ~Holling type -- IV, Also, two types of factors are considered behavior against predation and the group's defence to formulate our proposed model. In addition, immigration was taken into consideration for prey society, mathematically and biologically acceptable equilibrium points for this model were found, as well, these points were studied analytically and numerically to know the effect especially, the emigration and behavior against predation to keep both the two types.
https://ijnaa.semnan.ac.ir/article_5609_bb970363378f17fd457b1af28e24b40c.pdf
2022-01-01
889
899
10.22075/ijnaa.2022.5609
Eco-epidemiological model
SI-disease
Migration
Anti-Predator
Azhar
Majeed
azhar.majeed@sc.uobaghdad.edu.iq
1
Department of Mathematic, College of Science University of Baghdad, Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
The dynamics and analysis of an SIS disease of a stage-structured prey-predator model with a prey refuge
In this paper, the dynamical behaviour of an {epidemiological system} has been investigated. A stage-structured prey-predator model includes harvest and refuge for only prey, the disease of type (SIS) is just in the immature of the prey and the disease is spread by contact and by external source has been studied. The transmission of infectious diseases in the prey populations has been described by the linear type. While Lotka-Volterra functional response is used to describe the predation process of the whole prey population. This model has been represented by a set of nonlinear differential equations. The solution's existence, uniqueness and boundedness have been studied. "The local and global stability conditions of all the equilibrium points" have been confirmed. As a final point, numerical simulation has been used to study the global dynamics of the model.
https://ijnaa.semnan.ac.ir/article_5610_0757e541ba7b66af24fcbc76df7c4670.pdf
2022-01-01
901
919
10.22075/ijnaa.2022.5610
A stage-structured
Prey-predator
SIS disease
Refuge
harvesting
Zina
Alabacy
zina.k.alabacy@uotechnology.edu.iq
1
Department of Control and Systems Engineering, University of Technology, Iraq
LEAD_AUTHOR
Azhar
Majeed
azhar_abbas_m@scbaghdad.ed.iq
2
Department of Mathematics, College of Science, University of Baghdad, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Analyzing the factorial experiments variances with the repeated values in a practical application
With the repeated values, that the factorial experiments will be in three nested factors. And, the third factor is presented by experimental units (subjects). The repeated values or the experimental unit treatments definitely can be taken. These treatments can be dealt with as a fourth factor. Actually, these kinds of experiments have been analyzed in factorial ways, which are presented by the F test. That can be taken place in the condition of variance analysis to the repeated values experiments and in case there is no condition fitting in, we may use non-factorial ways which are presented by shifting into ranks. Therefore, the aim of this research is to make an analyzed study for this kind of factorial ways or non-factorial. This kind of experiment can be applied to Thalassemia in Thi-Qar province.
https://ijnaa.semnan.ac.ir/article_5611_fa484bb39961ebf95c0e98ea56100b89.pdf
2022-01-01
921
936
10.22075/ijnaa.2022.5611
factorial experiment variance
F test
Suheir
Romani
suheir.kareem@alkutcollege.edu.iq
1
Department of Business Administration, Al-Kut University College, Wasit, Iraq
LEAD_AUTHOR
Roadh
Yousif
roadh.raad@alkutcollege.edu.iq
2
Department of Business Administration, Al-Kut University College, Wasit, Iraq
AUTHOR
Hadiya
Matrood
hadiya.hasan@alkutcollege.edu.iq
3
Department of Business Administration, Al-Kut University College, Wasit, Iraq
AUTHOR
ORIGINAL_ARTICLE
Modelling the influence of prey switching and optimal foraging on the control of banana weevil Cosmopolites Sordidus(Germar)
A mathematical model for the control of the banana weevil Cosmopolites Sordidus (Germar) by predatory ant species is formulated and analyzed. The model incorporates predator switching to a non-dynamic alternative food source, optimal foraging theory and self regulation in both the banana weevil and predatory-ant species! Using Lyapunov's first method, the local stability of the equilibria is established. Furthermore, conditions for the existence of the interior equilibrium are derived and its global stability established by the Bendixson--Dulac criterion with periodic orbits ruled out by the Poincare--Bendixson theorem. It is determined that intrinsic growth rates and carrying capacities rather than handling time and nutritional value have significant impact on the banana weevils-- predatory ant interaction. Numerical simulations confirm the theoretical results.
https://ijnaa.semnan.ac.ir/article_5612_b6662ac2e138957eb9031a6391e7474d.pdf
2022-01-01
937
954
10.22075/ijnaa.2021.20119.2127
Alternative food
banana weevil
biological control
Global Stability
prey switching
optimal foraging
Eliab
Kweyunga
hkweyunga@must.ac.ug
1
Department of Mathematics, Mbarara University of Science and Technology, P.O.Box 1410, Mbarara, Uganda.
LEAD_AUTHOR
Julius
Tumwiine
jtumwiine@must.ac.ug
2
Department of Mathematics, Mbarara University of Science and Technology, P.O.Box 1410, Mbarara, Uganda.
AUTHOR
Eldad
Karamura
e.karamura@cgiar.org
3
Bioversity International-Uganda, P.O.Box 24384, Naguru, Kampala, Uganda.
AUTHOR
ORIGINAL_ARTICLE
Optimizing RSA cryptosystem using Hermite polynomials
The Security is requested to relocate paramount information across the networks. To protect the confidential data from hacking, this paper describes a process to increase the security of the RSA algorithm by creating additional layer protection for it using Hermite polynomials which will be represented as a square matrix, its calculation is not complicated. In the RSA process, we need to choose very large numbers that lead to complex operations which require a long computation time, while in proposed encryption due to Hermite key we don't need that because two layers of encryption give robust safeness to the ciphertext from dangers of hackers due to the hard of breakable.
https://ijnaa.semnan.ac.ir/article_5614_7c33464777f3eed627972f08a622d922.pdf
2022-01-01
955
961
10.22075/ijnaa.2022.5614
RSA system
layers and Hermite polynomials
Raghad K.
Salih
raghad.k.salih@uotechnology.edu.iq
1
Department of Applied Sciences, University of Technology, Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Numerical investigation for solving non-linear partial differential equation using Sumudu-Elzaki transform decomposition method
In this study, we used a powerful method, named as Sumudu-Elzaki transform method (SETM) together with Adomian polynomials (APs), which can be used to solve non-linear partial differential equations. We will give the essential clarification of this method by expanding some numerical examples to exhibit the viability and the effortlessness of this technique which can be used to solve other non-linear problems.
https://ijnaa.semnan.ac.ir/article_5615_ecf49c8b91b71374bda0e27aefbf3fe5.pdf
2022-01-01
963
973
10.22075/ijnaa.2022.5615
Sumudu-Elzaki transform
Adomin decomposition
Non-linear partial differential equation
Mohammed
AL-Safi
dr.mohammed.ghazi@esraa.edu.iq
1
Department of Accounting, Al-Esraa University College, Baghdad, Iraq
LEAD_AUTHOR
Ahmed
Yousif
ahmed.ayyoub@nahrainuniv.edu.iq
2
Department of Mathematics and Computer Applications, College of Science, Al-Nahrain University, Baghdad, Iraq
AUTHOR
Muna
Abbas
muna@esraa.edu.iq
3
Department of Accounting, Al-Esraa University College, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Critical review on mathematics virtual classroom practice in private university
A study has proven the benefits of mathematics classes learning mathematics at university. However, there is still a lack of evidence regarding its benefits in mathematics teacher education programs. This study aims to test the flipped class in a mathematics teacher education program at a private university in Indonesia. The data source comes from thirty-one students of the mathematics education program in this study. Various data methods were used, including observation, journals, and tests. Then the data were analyzed quantitatively and qualitatively. The findings showed that a reverse classroom encourages students to learn independently, with students working together with peers and increasing learning awareness. However, some of the challenges presented in flipped classroom applications include technical issues, record editing skills, and longer time consumed. The recommendations offered to refer to the findings.
https://ijnaa.semnan.ac.ir/article_5616_7ab4659bdaee71d05e19cc9c1c2b9356.pdf
2022-01-01
975
982
10.22075/ijnaa.2022.5616
mathematics
Virtual Classroom
Education
university
Samsul
Maarif
samsul.maarif@uhamka.ac.id
1
Mathematic Education Study Program, Universitas Muhammadiyah Prof. DR. HAMKA, Jakarta, Indonesia
LEAD_AUTHOR
Khoerul
Umam
2
Mathematic Education Study Program, Universitas Muhammadiyah Prof. DR. HAMKA, Jakarta, Indonesia
AUTHOR
Joko
Soebagyo
3
Mathematic Education Study Program, Universitas Muhammadiyah Prof. DR. HAMKA, Jakarta, Indonesia
AUTHOR
Trisna
Pradipta
4
Mathematic Education Study Program, Universitas Muhammadiyah Prof. DR. HAMKA, Jakarta, Indonesia
AUTHOR
ORIGINAL_ARTICLE
Effects of guided discovery learning models on students' critical thinking ability on the materials of immune system
Critical thinking is a skill needed in the 4.0 era of education so to improve critical thinking requires the right method so that learning can develop students' critical thinking skills. The purpose of this study was to determine the effect of guided discovery learning models on students' critical thinking skills on the material of the immune system. This type of research is quasi-experimental and post-test only control group design. Samples were taken by cluster random sampling technique. A total of 69 students were made respondents divided into 2 classes, namely class XI IPA 2 (n = 35) and XI IPA 3 (n = 34). The research instrument in the form of multiple choice questions of critical thinking skills was used as a data collection tool. Data were analyzed using normality test, homogeneity test, and t test\ The results of this study indicate that there are significant differences between the experimental class and the control class with tcount (2,031)$\mathrm{>}$ ttable (1,668). Conclusion: It can be concluded that the use of guided discovery learning models has an effect on students' critical thinking skills with the use of syntax involving students to actively think at a high level to hone their critical thinking skills.
https://ijnaa.semnan.ac.ir/article_5617_5a384b8403fe297b70def84200d55ec4.pdf
2022-01-01
983
989
10.22075/ijnaa.2022.5617
Guided Discovery Learning
Critical thinking skills
immune system
Dahlan
Abdullah
dahlan@unimal.ac.id
1
Department of Informatics, Universitas Malikussaleh, Aceh, Indonesia
LEAD_AUTHOR
S.
Susilo
susilo@uhamka.ac.id
2
Department of Biology Education, Universitas Muhammadiyah Prof. DR. HAMKA, Jakarta, Indonesia
AUTHOR
R.
Romdanih
romdanih@stkipkusumanegara.ac.id
3
Department of English Language Education, STKIP Kusuma Negara, Jakarta, Indonesia
AUTHOR
S.
Sujinah
sujinah@pps.um-surabaya.ac.id
4
Faculty of Education, Universitas Muhammadiyah of Surabaya, Indonesia
AUTHOR
ORIGINAL_ARTICLE
On an equation characterizing multi-quartic mappings and its stability
In this paper, we define and investigate the mappings of several variables which are quartic in each variable. We show that such mappings can be unified as an equation, say the multi-quartic functional equation. We also establish the Hyers-Ulam stability of a such functional equation by a fixed point theorem in non-Archimedean normed spaces. Moreover, we generalize some known stability and hyperstability results.
https://ijnaa.semnan.ac.ir/article_5621_c9035fd21dfaa3095bf805ca177f86f0.pdf
2022-01-01
991
1002
10.22075/ijnaa.2021.24010.2652
Multi-quartic functional equation
Multi-quartic mapping
non-Archimedean normed space
Hyers-Ulam stability
Zohreh
Abbasbeygi
zohrehabbasbeygi@yahoo.com
1
Department of Mathematics, Tehran North Branch, Islamic Azad University, Tehran, Iran
AUTHOR
Abasalt
Bodaghi
abasalt.bodaghi@gmail.com
2
Department of Mathematics, Garmsar Branch, Islamic Azad University, Garmsar, Iran
LEAD_AUTHOR
Ayoub
Gharibkhajeh
a.gharibkhajeh@gmail.com
3
Department of Mathematics, Tehran North Branch, Islamic Azad University, Tehran, Iran
AUTHOR
ORIGINAL_ARTICLE
Turan type inequalities for rational functions with prescribed poles
In this paper, we establish some inequalities for rational functions with prescribed poles having t-fold zeros at the origin. The estimates obtained generalise as well as refine some known results for rational functions and in turn, produce extensions of some polynomial inequalities earlier proved by Turan, Jain etc.
https://ijnaa.semnan.ac.ir/article_5622_0eeb060cd89c7690d7b5582ac7402544.pdf
2022-01-01
1003
1009
10.22075/ijnaa.2021.23145.2484
Rational functions
inequalities in complex domain
poles
t-fold zeros
Tawheeda
Akhter
takhter595@gmail.com
1
Naseem Bagh
Srinagar
LEAD_AUTHOR
Shabir
Malik
shabirams2@gmail.com
2
Department of Mathematics, University of Kashmir , Srinagar, Jammu and Kashmir, India
AUTHOR
Bashir
Zargar
bazargar@gmail.com
3
University of Kashmir
AUTHOR
ORIGINAL_ARTICLE
Optimization of FSW process parameters for welding dissimilar 6061 and 7075 Al alloys using Taguchi design approach
Friction stir welding (FSW) produce a strong metallurgical joint with the application of severe deformations and frictional heating in the metals and alloys by using a non-consumable rotating tool consisting of pin and tool shoulder. During welding, the plastic deformations of base metals vary for the varying mechanical properties such as tensile strength (TS), impact strength (IS), and hardness (HV) which in turn varies the welding conditions and parameters. Therefore, selection of optimal weld parameters plays an important role in enhancing the quality of weld joint. In this article, friction stir butt welds made of 6061 and 7075 Al alloys are performed with various welding parameters such as rotational speed of tool, angle of tilt, and axial force using tool has taper pin profile. Experiments are carried out on twenty-seven joints that are made on 6061 and 7075 Al Alloy plates of 6.50 mm thick of same nature and tested for its tensile, impact and HV properties.
https://ijnaa.semnan.ac.ir/article_5637_f742e1e4493a1fc0a22fededcb482620.pdf
2022-01-01
1011
1022
10.22075/ijnaa.2021.24678.2795
Friction stir welding
6061 and 7075 Al alloys
Taguchi design approach
G. S. V.
Seshu Kumar
gsvseshukumar@gmail.com
1
Department of Mechanical Engineering, Koneru Lakshmaiah Education Foundation (Deemed to be University), Vaddeswaram, Andhra Pradesh, India
LEAD_AUTHOR
Kumar
Anshuman
anshu.mit06@gmail.com
2
Department of Mechanical Engineering, Koneru Lakshmaiah Education Foundation (Deemed to be University), Vaddeswaram, Andhra Pradesh, India
AUTHOR
S
Rajesh
rajeshsiri.mech@gmail.com
3
Department of Mechanical Engineering, Sagi Rama Krishnam Raju Engineering College, Bhimavaram, Andhra Pradesh, India
AUTHOR
Rama Bhadri
Raju Chekuri
chekurirbr@gmail.com
4
Department of Mechanical Engineering, Sagi Rama Krishnam Raju Engineering College, Bhimavaram, Andhra Pradesh, India
AUTHOR
K.
Ramakotaiah
drprajk@gmail.com
5
Department of Mechanical Engineering, KKR and KSR Institute of Technology and Sciences, Guntur, Andhra Pradesh, India
AUTHOR
ORIGINAL_ARTICLE
Solvability of infinite systems of fractional differential equations in the space of tempered sequence space $m^\beta(\phi)$
The purpose of this article, is to establish the existence of solution of infinite systems of fractional differential equations in space of tempered sequence $m^\beta(\phi)$ by using techniques associated with Hausdorff measures of noncompactness. Finally, we provide an example to highlight and establish the importance of our main result.
https://ijnaa.semnan.ac.ir/article_5638_617a039cd456560f4b036bd410cef3f2.pdf
2022-01-01
1023
1034
10.22075/ijnaa.2021.23299.2515
Fractional differential equations
Hausdorff measure of noncompactness
Meir-Keeler condensing operator
Space of tempered sequence
Hamid
Mehravaran
hamid_mehravaran@mshdiau.ac.ir
1
Department of Mathematics, Mashhad Branch, Islamic Azad University, Mashhad, Iran.
AUTHOR
Hojjatollah
Amiri Kayvanloo
amiri.hojjat93@mshdiau.ac.ir
2
Department of Mathematics, Mashhad Branch, Islamic Azad University, Mashhad, Iran.
AUTHOR
Reza
Allahyari
rezaallahyari@mshdiau.ac.ir
3
Department of Mathematics, Mashhad Branch, Islamic Azad University, Mashhad, Iran.
LEAD_AUTHOR
ORIGINAL_ARTICLE
Numerical analysis of the wall impact in the peristaltic pumping of a casson liquid in an inclined canal
Flow is considered in the moving frame of reference with constant velocity along the wave. The developed mathematical model is presented by a set of partial differential equations. A numerical algorithm based on finite element method is implemented to evaluate the numerical solution of the governing partial differential equations in the stream-vorticity formulation.This paper is about the study of Numerical analysis of the peristaltic conveyance of a casson fluid in a skewed tube under the consideration of low Reynolds and long wavelength .The problem is discussed on the inclination angle and yield stress of a fluid are examined for different qualitative and quantitative effects on pressure and also the trapping bolus creation analyzed by changing various parameters, the equation of flux analyzed in a wave frame moving at wave speed. Expressions are derived for the frictional force, change in volume flow rate, rise and drop in pressure. The impact of frictional force on various parameters on the pumping characteristics and pressure flow curves discussed through graphs
https://ijnaa.semnan.ac.ir/article_5640_a3645965b2869b0ec43a699dc3847ea7.pdf
2022-01-01
1035
1047
10.22075/ijnaa.2021.24467.2750
Peristaltic pumping
Casson fluid
inclined channel
Non-Newtonian fluid
trapping
frictional force
Ramu
Katipelli
katipellir@gmail.com
1
Assistant Professor, Department of Science and Humanities, Siddhartha Institute of Technology and Sciences Narapally, Hyderabad-500088, Telangana
LEAD_AUTHOR
SHVN
Krishna Kumari
krishnagannamraju@gmail.com
2
Professor, Department of Mathematics Koneru Lakshmaiah Education Foundation R.V.S Nagar, Aziznagar Telangana- 500075.
AUTHOR
ORIGINAL_ARTICLE
Performance analysis of multicast routing using multi agent zone based mechanism in MANET
Mobile Ad-Hoc Network (MANET) is a structure less and emerging technology in recent years. Generally, this structure forms a network with nodes with inherent characteristics, including resource heterogeneity, node reliability, etc. In this manuscript, we proposed a Multi-Agent-Based Zone Routing (MAZR) protocol for enhancing the performance of MANET. Our proposed MAZR is works based on the principle of packet forwarding through intermediate and zone leaders. It consists of multiple agents, which include static and dynamic mobile agents. The proposed implementation is done as follows: Initially discovering the zone leader’s .The discovered zone leaders are connected to the communication nodes. The communication nodes and zone leaders are associated for building the network backbones for achieving multicast routing .To the multicast, zone members are connected .The zone managements, backbone and highly mobile nodes are initiated. The proposed MAZR protocol comprises five types of agents: Path agent, Network control agent, Multicast control agent, Network launch agent, and Multicast control agents. The Path agent, Network control agent, and Multicast control agent are static, and Network launch agents and Multicast control agents are mobile. The future protocol's performance is determined using the experimental work based on the evaluation metrics like delay, power consumption, and network lifetime. The obtained results prove the future MAZR is far improved than the Zone-based Hierarchical Link Protocol and Zone Routing Protocol in all aspects and ensures flexibility with versatile multicast service.
https://ijnaa.semnan.ac.ir/article_5641_66ede5670f517e10989e936347627069.pdf
2022-01-01
1047
1055
10.22075/ijnaa.2021.24657.2792
Mobile Ad hoc Network (MANET)
Multicast routing
Zone protocols
Backbones
Multi-Agent-Based Multi-Hop Routing (MAMR) protocol
S
Manthandi Periannasamy
smpsamy5@gmail.com
1
Department of Electronics and Communication Engineering, Malla Reddy Engineering College for Women, Maisammaguda, Hyderabad 500100. Telangana
AUTHOR
N.C
Sendhilkumar
sendhilkumarnc@gmail.com
2
Department of Electronics and Communication Engineering Sri Indu College of Engineering ; Technology Sheriguda, Hyderabad, Telangana 501510
AUTHOR
R
Arun Prasath
prasath2k6@gmail.com
3
Department of Electronics and Communication Engineering, Siddhartha Institute of Technology and Sciences, Narapally, Hyderabad, Telangana 500088
AUTHOR
C
Senthilkumar
senswain@gmail.com
4
Department of Electronics and Communication Engineering, Saveetha School of Engineering, Chennai, Tamilnadu, India
AUTHOR
S
Gopalakrishnan
drsgk85@gmail.com
5
Department of Electronics and Communication Engineering, Siddhartha Institute of Technology and Sciences, Narapally, Hyderabad, Telangana 500088
LEAD_AUTHOR
T
CHITRA
chitra18041987@gmail.com
6
Department Of ECE, Christian College of Engineering ;Technology, Oddanchatram- 624619, Tamilnadu
AUTHOR
ORIGINAL_ARTICLE
Solving second order ordinary differential equations by using Newton’s interpolation and Aitken’s methods
In this paper, the methods called Newton’s interpolation and Aitken’s methods were developed and examined. We use Newton’s interpolation and Aitken’s methods to find the exact and analytic results for three different types of nonlinear ordinary differential equations (NLODEs) of first and second order through illustrative examples. By using the new method, we successfully handle some class of nonlinear ordinary differential equations of first and second order in a simple and elegant way compared to Newton’s and Lagrange methods in previous studies. One can conclude that Newton’s interpolation and Aitken’s methods are easy to yield and implement actual precise results.
https://ijnaa.semnan.ac.ir/article_5643_3f178e2a593efbfee3b7e245767ede08.pdf
2022-01-01
1057
1066
10.22075/ijnaa.2021.24027.2657
Ordinary differential equation
Newton’s interpolation method
Aitken’s method
Johnpaul
Mbagwu
mbagwujohnpaulchiagoziem@gmail.com
1
Department of Physics, Faculty of Physical Science, Imo State University, Owerri, Nigeria.
LEAD_AUTHOR
Cemil
Tunç
mbagwujp@gmail.com
2
Department of Mathematics, Faculty of Sciences, Van Yuzuncu Yil University 65080, Van-Turkey
AUTHOR
Chris
Enjoh
cenyoh@gmail.com
3
Group Research in Analytical Chemistry, Environment and Climate Change (GRACE\&CC), Department of Chemistry, Faculty of Physical Science, Imo State University, Owerri, Nigeria
AUTHOR
J.I.
Onwuemekaa
johnpaulphysicist@gmail.com
4
Department of Physics, Faculty of Physical Science, Imo State University, Owerri, Nigeria.
AUTHOR
ORIGINAL_ARTICLE
Face and facial expression recognition using local directional feature structure
The face expression recognition is used in countless application areas for example security, computer vision and medical science etc. The facial expressions are used to communicate in a non-verbal way (i.e., using eye contact, facial expressions etc.). Emotions play an important role in facial expression recognition which helps to identify what an individual is feeling. Various AI research in the field of facial recognition system is being carried since a decade. Many of the machine learning algorithms are also being used to identify the facial expression which helps them to train and test using the facial expression to get a correct output of the given expression. This paper presents a new facial expression recognition system, local directional feature structure (LDFS). LDFS uses different features of the face (i.e., eyebrows, nose, mouth, eyes). The face is detected and aligned using the edge detection. The task of the edge detection is to detect the face, face alignment and position variations of the face. The edge detection extracts the specific features for the identification of the emotions. Two types of datasets have been used for the qualitative and quantitative experiments on the face expression mainly the CK+ and Jaffe dataset. This approach for our model shows an improvement when compared to the existing system.
https://ijnaa.semnan.ac.ir/article_5648_081240cf90848209bb7445e5b1bc0eca.pdf
2022-01-01
1067
1079
10.22075/ijnaa.2022.5648
Vidyarani
H J
hjvidyarani@gmail.com
1
Dept. of ISE, Dr. Ambedkar Institute of Technology, Bengaluru, India
LEAD_AUTHOR
Shrishail
Math
shri_math@yahoo.com
2
Dept. of CSE, Shri Krishna Institute of Technology, Bengaluru, India
AUTHOR
ORIGINAL_ARTICLE
The general implicit-block method with two-points and extra derivatives for solving fifth-order ordinary differential equations
In this work, a general implicit block method (GIBM) with two points for solving general fifth-order initial value problems (IVPs) has been derived. GIBM is proposed by adopting the basis functions of Hermite interpolating polynomials. GIBM is presented to be suitable with the numerical solutions of fifth-order IVPs. Hence, the derivation of GIBM has been introduced. Numerical implementations compared with the existing numerical GRKM method are used to prove the accuracy and efficiency of the proposed GIBM method. The impressive numerical results of the test problems using the proposed GIBM method agree well with the approximated solutions of them using the existing GRKM method.
https://ijnaa.semnan.ac.ir/article_5650_aa65c5a374fd035261520395209cd7ec.pdf
2022-01-01
1081
1097
10.22075/ijnaa.2022.5650
Implicit numerical method
ODEs
IVPs
Block method
Order
RKM
GRKM
Fifth-order
Ordinary differential equations
Mohammed
Turki
moh9883@yahoo.com
1
Department of Mathematics, College of Education for Pure Sciences, University of Anbar, Iraq
AUTHOR
Shaymaa
Alku
shaymaa.yaseen@uokufa.edu.iq
2
Department of Mathematics, College of Computer Science and Mathematics, University of Kufa, Najaf, Iraq
LEAD_AUTHOR
Mohammed
Mechee
mohammeds.abed@uokufa.edu.iq
3
Information Technology Research and Development Center (ITRDC), University of Kufa, Najaf, Iraq
AUTHOR
ORIGINAL_ARTICLE
Classes of certain analytic functions defining by subordinations
There are many results for analytic functions in the open unit disk U concerning subordination. Two subclasses of analytic functions in U are introduced using subordinations in U. The object of the present paper is to discuss some properties of functions belonging to these two subclasses.
https://ijnaa.semnan.ac.ir/article_5651_a795b9f28dfe0fd2e409068ffd40ce3e.pdf
2022-01-01
1099
1103
10.22075/ijnaa.2017.10857.1528
Analytic function
subordination
coecient inequality
Mugur
Acu
acumugur@yahoo.com
1
Department of Mathematics and Informatics, Faculty of Sciences, "Lucian Blaga" University, Str. Dr. I. Ra\d{t}iu, No. 5-7, 550012 - Sibiu, Romania
AUTHOR
Shigeyoshi
Owa
owa.shigeyoshi@yamato-u.ac.jp
2
Department of Mathematics, Faculty of Education, Yamato University, Katayama 2-5-1, Suita, Osaka 564-0082, Japan
AUTHOR
Radu
Diaconu
radudyaconu@yahoo.com
3
Department of Mathematics and Informatics, Faculty of Sciences, "Lucian Blaga" University, Str. Dr. I. Ra\d{t}iu, No. 5-7, 550012 - Sibiu, Romania
LEAD_AUTHOR
ORIGINAL_ARTICLE
Some of the sufficient conditions to get the G-Bi-shadowing action
The aim of this paper is introduced some examples of a \(\mathbb{G}\)-bi-shadowing actions on the metric \(\mathbb{G}\)-space, by study a sufficient conditions of actions to be \(\mathbb{G}\)-bi-shadowing. We show the \(\mathbb{G}\)-\(\lambda\)-Contraction actions, \(\mathbb{G}\)-\(\left( \lambda,L \right)\)\textbf{-}Contraction action, and \(\mathbb{G}\)-Hardy-Rogers contraction action are \(\mathbb{G}\)-bi-shadowing by proved some theorems.
https://ijnaa.semnan.ac.ir/article_5652_77bae5ef472b456103f5ea938586dd86.pdf
2022-01-01
1105
1112
10.22075/ijnaa.2022.5652
G-space
G-Bi-Shadowing
Sufficient Conditions
G-Contraction
Mohammed Hussein
Ajam
mohammed_ajam@science.uoqasim.edu.iq
1
Department of Mathematics, Collage of Education for Pure Science, University of Babylon, Babylon, Iraq
LEAD_AUTHOR
Iftichar Mudhar
Al-Shara'a
ifticharalshraa@gmail.com
2
Department of Mathematics, Collage of Education for Pure Science, University of Babylon, Babylon, Iraq
AUTHOR
ORIGINAL_ARTICLE
Developing bulk arrival queuing models with the constant batch policy under uncertainty data using (0 - 1) variables
This paper delves into some significant performance measures (PMs) of a bulk arrival queueing system with constant batch size b, according to arrival rates and service rates being fuzzy parameters. The bulk arrival queuing system deals with observation arrival into the queuing system as a constant group size before allowing individual customers entering to the service. This leads to obtaining a new tool with the aid of generating function methods. The corresponding traditional bulk queueing system model is more convenient under an uncertain environment. The $\alpha$-cut approach is applied with the conventional Zadeh's extension principle (ZEP) to transform the triangular membership functions (Mem. Fs) fuzzy queues into a family of conventional bulkqueues. This new model focus on mixed-integer non-linear programming (MINLP) tenders a mathematical computational approach is known as (0 -1) variables. To measures the efficiency of the method, the efficient solution strategy plays a crucial role in the adequate application of these techniques. Furthermore, different stages of the $\alpha$-cut intervals were analyzed and the final part of the article gives a numerical solution of the proposed model to achieve practical issues.
https://ijnaa.semnan.ac.ir/article_5653_c2d20f572c645dd84033117db9f2dcd8.pdf
2022-01-01
1113
1121
10.22075/ijnaa.2022.5653
Constant batch size
Uncertainty data
Mixed-integer
Non-linear programming (0 - 1) variables
Zeina
Mueen
zeina.m@uobaghdad.edu.iq
1
Department of Studies and Planning Department, University of Baghdad, Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Twofold of algebraic decomposition method used for a watermarking scheme with $LWT$ over medical images
Mathematics has always been of great importance in various sciences, especially computer science. The mechanism used to embed various types of information in a host medical images to safeguard the privacy of the patient including the patient's name, doctor's digital signature is called watermarking. There are a lot of improved watermark algorithms, however, this information is susceptible to attack when the data are transferred over universal internet channels. This paper proposed a robust watermark algorithm that uses a Lifting Wavelet Transform $(LWT)$ and two times of the Hessenberg Matrix Decomposition Method $(HMDM)$ to embed a watermark in a chosen channel of the host image after performing the transform. The experimental results demonstrate that the improvement appears (higher robustness against $JPEG$ compression attack) and good imperceptibility against some attacks, to evaluate the fineness of the original with watermarked images and the extracted watermark respectively.
https://ijnaa.semnan.ac.ir/article_5655_638df0ab93e7112bc9e950117854b8fa.pdf
2022-01-01
1123
1129
10.22075/ijnaa.2022.5655
Hessenberg Matrix Decomposition Method (HMDM)
Lifting Wavelet Transform (LWT)
Image Watermarking
Areej
Abduldaim
100044@uotechnology.edu.iq
1
University of Technology, Department of Applied Sciences, Baghdad 10001, Iraq
LEAD_AUTHOR
Anwar
Faraj
100290@uotechnology.edu.iq
2
applied science department, university of technology, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Caputo definition for finding fractional moments of power law distribution functions
In this paper, we propose a modern technique to derive fractional moment by using Caputo definition of fractional derivative. Such technique represents a modification of fractional moments on a certain type of function which is known by the power law distribution functions. The results have been obtained show that the obtained fractional moments within such functions have closed form.
https://ijnaa.semnan.ac.ir/article_5656_f3f5e18695d18498b84905b7f80dfa05.pdf
2022-01-01
1131
1136
10.22075/ijnaa.2022.5656
Fractional moment
Caputo definition
Power law distribution functions
Fourier Transform
Rifaat
Abdul-Jabbar
drrifaat1974@uoanbar.edu.iq
1
Department of Mathematics, College of Science, University of Anbar, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Generalized modified ratio-cum-product kind exponentially estimator of the populations mean in stratified ranked set sample
In this study, we present a proposal aimed at estimating the finite population's mean of the main variable by stratification rank set sample \(S_{t}\text{RSS}\) through the modification made to generalized ratio-cum-product type exponential estimator. The relative bias \(\text{PRB}\), Mean Squared Error \(\text{Mse}\) and percentage relative efficiencies \(\text{PRE}\) of the proposed modified estimator is obtained to the first degree of approximation. Conditions under which the proposed estimator is more efficient than the usual unbiased estimator, ratio, product type estimators, and some other estimators are obtained. Finally, the estimators' abilities are evaluated through the use of simulations, as showed that the proposed modified estimator is more efficient as compared to several other estimators.
https://ijnaa.semnan.ac.ir/article_5657_a6a62341d4bd34d0d3fc8e4eda431e3e.pdf
2022-01-01
1137
1149
10.22075/ijnaa.2022.5657
Relative Bias
Mean Square Error
Percentage Relative Efficiency
Stratified ranked set sampling
ratio-cum-product type exponential estimator
Rikan
Ahmed
rikan.al_rahman1101@coadec.uobaghdad.edu.iq
1
Department of Statistics and Informatics, Mosul University, Iraq
LEAD_AUTHOR
Saja
Hussein
saja@coadec.uobaghdad.edu.iq
2
Department of Statistics, Baghdad University, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
The emergence of logic in mathematics and its influence on learners' cognition and way of thinking
This article sheds light on the single phrase, logical thinking, which came to be understood in so many diverse ways. To assist explain the many distinct meanings, how they arose, and how they are connected, we trace the emergence and evolution of logical thinking in mathematics. This article is also, to some extent, a description of a movement that arose outside of philosophy's mainstream, and whose beginnings lay in a desire to make logic practical and an essential part of learners' lives.
https://ijnaa.semnan.ac.ir/article_5658_939c279f80e4d42940aac8e29f87d759.pdf
2022-01-01
1151
1160
10.22075/ijnaa.2022.5658
Logical thinking
Thinking
cognition
paradox
Eman
Almuhur
e_almuhur@asu.edu.jo
1
Department of Basic Science and Humanities, Faculty of Arts and Science, Applied Science Private University, Amman, Jordan
AUTHOR
Manal
Al-Labadi
manal.allabadi@uop.edu.jo
2
Department of Mathematics, Faculty of Arts and Sciences, University of Petra, Amman, Jordan
LEAD_AUTHOR
ORIGINAL_ARTICLE
On proximally closed mapping
In this paper, we introduce the concept of proximally closed (or $\delta-$ closed) in the proximity spaces and study some of its properties.
https://ijnaa.semnan.ac.ir/article_5659_22bd942b0a7687f9a7528807ec76df2e.pdf
2022-01-01
1161
1166
10.22075/ijnaa.2022.5659
proximity space
proximally continuous mapping
(delta)-continuous
proximally isomorphic
$delta-$ homeomorphism
Saad
Jaber
s.jaber@uowasit.edu.iq
1
Department of Mathematics, College of Education for Pure Science, University of Wasit, Wasit, Iraq
LEAD_AUTHOR
Marwah
Mohsin
marwayasir91@gmail.com
2
Department of Mathematics, Directorate-General of Education of Wasit, Wasit, Iraq
AUTHOR
ORIGINAL_ARTICLE
Sparse minimum average variance estimation through signal extraction approach to multivariate regression
In this paper, a new sparse method called (MAVE-SiER) is proposed, to introduce MAVE-SiER, we combined the effective sufficient dimension reduction method MAVE with the sparse method Signal extraction approach to multivariate regression (SiER). MAVE-SiER has the benefit of expanding the Signal extraction method to multivariate regression (SiER) to nonlinear and multi-dimensional regression. MAVE-SiER also allows MAVE to deal with problems which the predictors are highly correlated. MAVE-SiER may estimate dimensions exhaustively while concurrently choosing useful variables. Simulation studies confirmed MAVE-SiER performance.
https://ijnaa.semnan.ac.ir/article_5660_c6982b59abc09e37b4f7cbf91b495ec6.pdf
2022-01-01
1167
1173
10.22075/ijnaa.2022.5660
High dimensional predictors
Dimension reduction
sparse
Minimum average variance estimation
Signal extraction approach to multivariate regression
Abdulqader
Ahmed
abdulqaderahmed79@gmail.com
1
Department of Statistics, College of Administration and Economics, University of Baghdad, Baghdad, Iraq
LEAD_AUTHOR
Saja
Mohammad
zina.k.alabacy@uotechnology.edu.iq
2
Department of Statistics, College of Administration and Economics, University of Baghdad, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
New bound for edge spectral radius and edge energy of graphs
Let $ X(V,E) $ be a simple graph with $ n $ vertices and $ m $ edges without isolated vertices. Denote by $ B = (b_{ij})_{m\times m} $ the edge adjacency matrix of $ X $. Eigenvalues of the matrix $ B $, $\mu_1, \mu_2, \cdots, \mu_m $, are the edge spectrum of the graph $ X $. An important edge spectrum-based invariant is the graph energy, defined as $ E_e(X) =\sum_{i=1}^{m} \vert \mu_i \vert $. Suppose $ B^{'} $ be an edge subset of $ E(X) $ (set of edges of $ X $). For any $ e \in B^{'} $ the degree of the edge $ e_i $ with respect to the subset $ B^{'} $ is defined as the number of edges in $ B^{'} $ that are adjacent to $ e_i $. We call it as $ \varepsilon $-degree and is denoted by $ \varepsilon_i $. Denote $ \mu_1(X) $ as the largest eigenvalue of the graph $ X $ and $ s_i $ as the sum of $ \varepsilon $-degree of edges that are adjacent to $ e_i $. In this paper, we give lower bounds of $ \mu_1(X) $ and $ \mu_1^{D^{'}}(X) $ in terms of $ \varepsilon $-degree. Consequently, some existing bounds on the graph invariants $ E_e(X) $ are improved.
https://ijnaa.semnan.ac.ir/article_5661_ce621f9a383e05b56c5982ef6747d6af.pdf
2022-01-01
1175
1181
10.22075/ijnaa.2021.23361.2523
ε-degree
adjacency matrix
spectral radius
dominating set
graph energy
bound of energy
Saeed
Mohammadian Semnani
s_mohammadian@semnan.ac.ir
1
Department of Mathematics, Statistics and Computer Science, Semnan University, Semnan, Iran.
AUTHOR
Samira
Sabeti
sabeti.samira@semnan.ac.ir
2
Department of Mathematics, Statistics and Computer Science, Semnan University, Semnan, Iran.
LEAD_AUTHOR
ORIGINAL_ARTICLE
CFD Analysis of piston bowls geometry for CI direct injection engine using finite element analysis
Both NOx and soot emissions are major concerns in compression ignition (CI) engine with diesel fuel and the enhancement of variety of fuel and air can increase the performance of combustion engine. There are several methods to enhance the variety of air-fuel within the cylinder. Altering the geometry of piston bowl is one of the methods to improve the air-fuel mixture. This article proposes the effect of piston bowl geometry on the direct injection diesel engine performance and emissions, where various profiles of piston bowl referred as hemispherical combustion chamber (HCC), toroidal combustion chamber (TCC) and shallow depth combustion chamber (SCC) are designed using computer aided design and drafting (CADD) tool and ANSYS workbench is adopted for analysis. In addition, Karanja oil mixed with base fluid diesel at different volume fractions like0.2%, 0.3% and 0.4% and are calculated for their combination properties. Further, theoretical calculations are considered to determine the properties of Nano fluids which are later used as inputs for the analysis. Finally, CFD analysis is employed on different geometries at different fluid volume fractions and thermal analysis is done for piston bowl geometries with different composite materials like carbon fiber and armide fiber.
https://ijnaa.semnan.ac.ir/article_5664_8264be31c0c3ffcc1e89ee92ed6954c0.pdf
2022-01-01
1193
1207
10.22075/ijnaa.2021.24710.2801
Compression Ignition Engine
Direct Injection Engine
Piston Bowl Geometry
CFD analysis
Finite element analysis
Potturi S Prakash
Varma
sprakashvarma91@gmail.com
1
Department of Mechanical Engineering Andhra University College of Engineering (A), Visakhapatnam, Andhra Pradesh, India.
LEAD_AUTHOR
K
Venkata Subbaiah
potturispvarma@gmail.com
2
Department of Mechanical Engineering Andhra University College of Engineering (A), Visakhapatnam, Andhra Pradesh, India.
AUTHOR
ORIGINAL_ARTICLE
Transfer learning based deep convolutional neural network model for pavement crack detection from images
The road is a path that supports to connect different places. It plays a crucial role in our day-today life. Improper maintenance, overloading, climate conditions, and some other elements create distress on the roads. The common distresses are Potholes, cracking, and rutting. Manually detecting the distresses means human inspection is a messy and long time-consuming process. In recent past accidents on road is on the increase due to improper maintenance of road. Efficient methods of detecting pavement damages using image processing, machine learning and deep learning techniques have been a trending research topic. Image processing algorithms mainly include edge detection, region growing methods, and threshold segmentation operations for processing the pavement images and extracting crack information from the images. Machine learning methods of pavement crack detection adapts neural networks, supervised and unsupervised learning algorithms with pavement crack image as input. With Deep learning techniques, it has been possible to detect pavement cracks with greater accuracy. In this paper, we review the deep learning methods of pavement crack detection and propose a novel method to detect pavement cracks using Deep Learning with transfer learning. We also analyzed the performance of the proposed model for different network architectures namely, Google net, Alexnet and Resent and inferred that Google net gives better performance in detecting pavement cracks.
https://ijnaa.semnan.ac.ir/article_5672_b61e33f6480f24f30ac07df168ede3d2.pdf
2022-01-01
1209
1223
10.22075/ijnaa.2021.24521.2762
Pavement crack
Deep learning
machine learning
Crack Detection
S.
Jana
drjanaphd@gmail.com
1
Department of Electronics and Communication Engineering, Veltech Rangarajan Dr Sagunthala R &D Institute of Science and Technology, Chennai. Tamil Nadu-600062
LEAD_AUTHOR
S.
Thangam
s_thangam@blr.amrita.edu
2
Department of Computer Science and Engineering, Amrita School of Engineering, Bengaluru campus, Amrita Vishwa Vidyapeetham, India
AUTHOR
Anem
Kishore
sntkishore@gmail.com
3
Department of Electronics and Communication Engineering, Veltech Rangarajan Dr Sagunthala R &D Institute of Science and Technology, Chennai. Tamil Nadu-600062
AUTHOR
Venkata
Sai Kumar
sai663366@gmail.com
4
Department of Electronics and Communication Engineering, Veltech Rangarajan Dr Sagunthala R &D Institute of Science and Technology, Chennai. Tamil Nadu-600062
AUTHOR
Saddapalli
Vandana
vandanasaddapalli2000@gmail.com
5
Department of Electronics and Communication Engineering, Veltech Rangarajan Dr Sagunthala R &D Institute of Science and Technology, Chennai. Tamil Nadu-600062
AUTHOR
ORIGINAL_ARTICLE
Hybrid deep learning framework for human activity recognition
The aim of the recognition in the human activity is to recognize the actions of the individuals using a set of observations and their environmental conditions. Since last two decades, the research on this Human Activity Recognition (HAR) has captured the attention of several computer science communities because of the strength to provide support to different applications and the connection to different fields of study such as, human-computer interaction, healthcare, monitoring, entertainment and education. There are many existing methods like deep learning which have been used to develop to recognize the different activities of the human, but couldn’t identify the sudden change of the activities in the human. This paper presents a method using the deep learning methods which can recognize the specific identities and identify a change from one activity to another for the applications of the healthcare. In this method, a deep convolutional neural network is built using which the features are extracted for the collection of the data from the sensors. After which the Gated Recurrent Unit (GRU) captures the long-tern dependency between the different actions which helps to improve the identification rate of the HAR. From the CNN and GRU, a model of wearable sensor can be proposed which can identify the changes of the activities and can accurately recognize these activities. Experiment have been conducted using open-source University of California (UCI) HAR dataset which composed of six different activity such as lying, standing, sitting, walking downstairs, walking upstairs and walking. The CNN-based model achieves a detection accuracy of 95.99% whereas the CNN-GRU model achieves a detection accuracy of 96.79% which is better than most existing HAR methods.
https://ijnaa.semnan.ac.ir/article_5673_8ceaa6fefc7317c753ebdbd79e3f6a3f.pdf
2022-01-01
1225
1237
10.22075/ijnaa.2022.5673
Deep learning
Convolutional Neural Networks
Activity recognition
Gated recurrent unit
S
Pushpalatha
pushpalat043@gmail.co
1
Research Scholar, Dept. of ISE, Dr. Ambedkar Institute of Technology, Bengaluru, India
LEAD_AUTHOR
Shrishail
Math
shri_math@yahoo.com
2
Dept. of CSE, Shri Krishna Institute of Technology, Bengaluru, India
AUTHOR
ORIGINAL_ARTICLE
Analysis of performance of accuracy by adding new features individually using Relief-F and Budget Tree Random Forest (RFBTRF) method
The education is very important for improving the values of students in the society. Different types of features like school related features, student related features, parent related features and teacher related features are influencing the success rate of students in their education. Identification of best features from the huge set of features for analyzing the success or failure of a student is one important challenge to the research community and academicians. The set of features information is collected for preparing the student dataset also one difficult task in the prediction of student academic performance. We collected a student dataset of different schools that contains 4965 student’s information. The dataset contains information of 45 features of different categories such as school related features, student related features, parent related features and teacher related features. All features are not useful for predicting the academic performance of a student. The Data mining methods are applied in various research domains including education to extract hidden information from datasets. The feature selection algorithms are used to determine the best informative features by eliminating the irrelevant and redundant features. In this work, Relief-F Budget Tree Random Forest feature selection algorithm is used to identify the relevant features in the collected school dataset. Five different machine learning models are used to predict the efficiency of feature selection algorithm. The decision tree model shows best accuracy for student academic performance prediction compared with other models. The experimental results display that the RFBTRF algorithm identifies the best informative features for enhancing the accuracy of student academic performance prediction and also reduces the over-fitting issues. The experiment started with individual features and then continued with combination of different categories of features. It was observed that the accuracy of student academic performance prediction is decreased when some categories of features are added to other categories of features.
https://ijnaa.semnan.ac.ir/article_5674_354c0c551d3f3c27adb2801ed1e7c9eb.pdf
2022-01-01
1239
1252
10.22075/ijnaa.2021.24724.2808
Student Academic Performance Prediction
Machine Learning Models
Educational Data Mining
Feature Selection Algorithms
K
Deepika
deepika.srimanu@gmail.com
1
Department of Information Technology, Kakatiya Institute of technology and science, Warangal- 506015, Telangana
LEAD_AUTHOR
M
Sowjanya Reddy
souji.vj1@gmail.com
2
Department of Computer Science and Engineering, Siddhartha Institute of Technology and Sciences, Narapally, Hyderabad, Telangana 500088
AUTHOR
N
Rajesh Pandian
nrajeshpandian@gmail.com
3
Department of Computer Science and Engineering, PSNA College of Engineering and Technology Kothandaraman Nagar, Dindigul-624622 TamilNadu, India.
AUTHOR
R.
Dinesh Kumar
me.dineshkumar@gmail.com
4
Department of Computer Science and Engineering, Siddhartha Institute of Technology and Sciences, Narapally, Hyderabad, Telangana 500088
AUTHOR
ORIGINAL_ARTICLE
A call reservation scheme for channel allocation using predication approach (CAPA) in wireless networks
The uncommitted bandwidth of the spectrum must be expeditiously employed by the mobile users, since nowadays the mobile users are rising step by step. The major aim of the channel reservation process is to minimize the probability of call dropping and an effective channel assignment approach can significantly minimize such probability of call dropping. There is several channel allocation and assignment approaches has been presented. In our paper, the Channel Allocation using Prediction Approach (CAPA) algorithm is presented. The CAPA algorithm appropriates the channel reservation for mobile users in the destination cell before the mobile user travels into that particular cell. The channels are pre-reserved while the mobile users are travelling inside some distance of the novel cell bound. Channel Adoption approach and Queuing approach are employed in our CAPA algorithm for apportioning the channel to predict permanent and temporary mobile users. In channel Adoption approach, free channels choose from the fundamental pool and optimally apportioned to permanent user. For temporary user, queuing approach is implemented and these approaches are employed to minimize the probability of call dropping and apply the available channel bandwidth efficiently. Hence, the Performance of CAPA algorithm is improved while compared to other existing channel reservation algorithms.
https://ijnaa.semnan.ac.ir/article_5676_d995175fb402bebb8da99a29679d9aa8.pdf
2022-01-01
1253
1267
10.22075/ijnaa.2021.24719.2807
Channel Allocation
Qos
CAPA
Call Management
Call Dropping
G
Vidoda Reddy
vinodareddy.cse@cmrtc.ac.in
1
Department of Computer Science and Engineering(AI\&ML), CMR Technical Campus, Kandlakoya, Medchal (M) Hyderabad, Telangana-501401
LEAD_AUTHOR
P. Jesu
Jayarin
jjayarin@gmail.com
2
Department of Information Technology , Jeppiaar Engineering College,Chennai- 600 119.
AUTHOR
K.
Nandhini
nandhinikrishnan09@gmail.com
3
Department of Electronics and Communication Engineering, Veltech Rangarajan Dr Sagunthala R & D Institute of Science and Technology, Avadi, Chennai-600062
AUTHOR
G.
Sheeba
sheebaj216@gmail.com
4
Department of Electronics and Communication Engineering, New Prince Shri Bhavani College of Eng and Technology Chennai- 600073,Tamil Nadu.
AUTHOR
G
Dhanalakshmi
dhanarjun@gmail.com
5
Department of Electronics and Communication Engineering, Siddhartha Institute of Technology and Sciences, Narapally, Hyderabad, Telangana 500088
AUTHOR
ORIGINAL_ARTICLE
The accrual anomaly analysis at different stages of the corporate life cycle of companies listed on the Tehran stock exchange
Financial theorists believe that low accruals firms have higher returns compared to those with high accruals calling this relationship an accruals anomaly. Since the introduction of this concept, various studies have examined the factors causing accruals anomalies and their impact on corporate revenues. The current paper aims at investigating the impact of accruals anomalies on corporate profitability as well as the role of the corporate life cycle. Thus, the data was collected using 109 companies listed on the Tehran Stock Exchange data during the period 2012 to 2018. Then, the relationships were examined using regression modelling with a panel approach. The results indicate that there is no significant impact of life cycle on the relationship between accrual anomalies and profitability.
https://ijnaa.semnan.ac.ir/article_5677_92e4ed15ca3af619260247e14d6d04b4.pdf
2022-01-01
1269
1278
10.22075/ijnaa.2022.5677
Accruals Anomaly
Life Cycle
Stock returns
Mustafa
Ostad
oustad2013@gmail.com
1
Department of Accounting, Faculty of Economics and Accounting, Islamic Azad University, Isfahan Branch (Khorasgan), Iran
AUTHOR
Mohsen
Dastgir
dastmw@yahoo.com
2
Department of Accounting, Faculty of Economics and Accounting, Islamic Azad University, Isfahan Branch (Khorasgan), Iran
LEAD_AUTHOR
Shukrollah
Khajavi
shkhajavi@gmail.com
3
Department of Accounting, Faculty of Economics, Management and Social Sciences, Shiraz University, Shiraz, Iran
AUTHOR
ORIGINAL_ARTICLE
$ \omega $-$ \alpha $-open sets $ \omega $-$ \alpha $-continuity in bitopological spaces
The purposes of this article are to introduce and characterize the notions of $ (i,j) $-$ \omega $-$ \alpha $-open sets in bitopological spaces. Besides, It introduces and studies the concepts of $ (i,j) $-$ \omega $-$ \alpha $-continuous functions. Furthermore, $ (i,j) $-$ \omega $-$ \alpha $-connected and $ (i,j) $-$ \omega $-$ \alpha $-set-connected functions are defined in bitopological spaces and some of their properties are studied.
https://ijnaa.semnan.ac.ir/article_5678_a8a7444fa7c360ec4921711239ec085f.pdf
2022-01-01
1279
1289
10.22075/ijnaa.2020.21599.2279
j) $-$ alpha $-$ omega $-open sets
j) $-$ omega $-$ alpha $-continuous function
j) $-$ omega $-$ alpha $-connected
$ (i
j) $-$ omega $-$ alpha $-set-connected function
Carlos
Granados
carlosgranadosortiz@outlook.es
1
Estudiante de Doctorado en Matematicas, Universidad de Antioquia, Medellin, Colombia
LEAD_AUTHOR
ORIGINAL_ARTICLE
Comparison between Sinc approximation and differential transform methods for nonlinear Hammerstein integral equations
Here, the comparison between Sinc method in combination with double exponential transformations (DE) and approximation by means of differential transform method (DTM) for nonlinear Hammerstein integral equations is considered. Convergence analysis is presented. Detection of effectiveness from various aspects such as run time, different norms, condition number are highlighted and plotted graphically. Results of two schemes are practically well, but in manner of separable kernel, DTM solution is more accurate and so fast.
https://ijnaa.semnan.ac.ir/article_5679_1f372f5fc445a43420486c1e33475dfe.pdf
2022-01-01
1291
1301
10.22075/ijnaa.2020.19923.2111
Volterra integral equations
Sinc collocation method
double exponential transformation
Differential transform method
Ghasem
Kazemi Gelian
kazemigelian@yahoo.com
1
Department of Mathematics, Shirvan Branch, Islamic Azad University, Shirvan, Iran
LEAD_AUTHOR
Rezvan
Ghoochan Shirvani
re_ghoochani@yahoo.com
2
Department of Mathematics, Shirvan Branch, Islamic Azad University, Shirvan, Iran
AUTHOR
Mohammad Ali
Fariborzi Araghi
fariborzi.araghi@gmail.com
3
Department of Mathematics, Central Tehran Branch, Islamic Azad University, Tehran, Zip code 14676-86831, Iran
AUTHOR
ORIGINAL_ARTICLE
A comparative study of two types of substrates in the manufacture of Schottky diode: p-Si and n- Si
This paper includes description of fabrication and characterization of two Schottky diodes differ in substrate material (n-type and p-type black Silicon). Schottky diodes were composed of (Ag /B-Si/n-Si/Al and Ag/B-Si/p-Si/ Al) respectively. Etching was achieved both electrochemical and photo--electrochemical etching processes. Different etching times and etching current densities were applied. Ag for front contact and Al for back contact were deposited by thermal evaporation method. I-V characteristics were plotted for the diode in dark forward and backward biasing at room temperature. The ideality factor and barrier height values were obtained. The barrier height values was(0,33-0,36) eV and the saturation current values (6,86-7,05) for the diode samples were obtained from the current-voltage (I-V) curves , The ideality factor (\textit{n})\textbf{ } values was(27.47-35.61), Schottky diodes at the Ag/BS or the dual metal-semiconductor junctions (Ag/BS/c-Si and c- Si/Al), of a diode ideally exhibit Ohmic features).
https://ijnaa.semnan.ac.ir/article_5680_334402200bc18f7c33a5d8cbeb99af4a.pdf
2022-01-01
1303
1310
10.22075/ijnaa.2022.5680
mathematics
Black Silicon
schottky diode
Electrochemical Etching
photo-electrochemical etching
Ideality Factor
Schottky barrier
Hussam
Muhsin Hwail
ank.gabor@yahoo.com
1
Department of Physics, University of Kufa, Najaf,Iraq.
LEAD_AUTHOR
Manal
Midhat
2
Department of Physics, University of Baghdad, Al-Jadria, Baghdad, Iraq.
AUTHOR
ORIGINAL_ARTICLE
$H(.,.,.,.)$-$\varphi$-$\eta$-cocoercive Operator with an Application to Variational Inclusions
In this work, we study generalized $ H(.,.,.,.)$-$\varphi$-$\eta-$ cocoercive operator to find the solution of variational like inclusion involving an infinite family of set-valued mappings in semi-inner product spaces via resolvent equation approach. Furthermore, we established an equivalence between the set-valued variational-like inclusion problem and fixed point problem by employing generalized resolvent operator technique involving generalized $H(.,.,.,.)$-$\varphi$-$\eta$-cocoercive operator. Using the equivalent formulation of set-valued variational-like inclusion problem and resolvent equation problem, an iterative algorithm is developed that approximate the uniqueness of solution of the resolvent equation problem.
https://ijnaa.semnan.ac.ir/article_5693_08c18ebff883dd381a74af1baf6d3bfb.pdf
2022-01-01
1311
1327
10.22075/ijnaa.2021.23245.2506
Variational-like inclusions
co-corecive operator
Semi-inner product spaces
Resolvent operator
Lipschitz continuity
Tirth
Ram
tir1ram2@yahoo.com
1
Department of Mathematics, University of Jammu, Jammu-180006, India
LEAD_AUTHOR
Mohd
Iqbal
iqbalmohd486@gmail.com
2
Department of Mathematics, University of Jammu, Jammu-180006, India
AUTHOR
ORIGINAL_ARTICLE
Multi-class LDA classifier and CNN feature extraction for student performance analysis during Covid-19 pandemic
In our modern world, education is essential for developing high moral values and excellence in individuals. But the spread of Covid-19 widely affects the student’s education, the majority of students have continued their education via online learning platforms. The academic performance of students has been sluggish across the globe during this pandemic. This problem is solved using a multiclass Linear Discriminant Analysis (LDA) and Convolutional Neural Network (CNN) model which predicts the student learning rate and behavior. This research aims to classify the students’ performance into low, medium, and high grades in order to assist tutors in predicting the low-ranking students. The student data log is collected from the Kaggle student performance analysis dataset and pre-processed to remove the noise and non-redundance data. By analyzing the pre-processed data, the CNN extracts feature that are based on student interest and subjective pattern sequences. Then extracted features are filtered by the Minimum Redundancy Maximum Relevance(mRMR) method. mRMR selects the best features and dilutes the least one which handles each feature separately. The feature weights are measured by Stochastic Gradient Descent (SGD) and updated for better feature learning by CNN. At the last stage, the Multi-class LDA classifier evaluates the result into categorized classes. Based on the prediction, the tutors can easily find the low ranks of students who need a high preference for improving their academic performance. Experiments showed that the proposed model achieves greater accuracy (96.5%), precision (094), recall (092), F-score (095), and requires less computation time than existing methods.
https://ijnaa.semnan.ac.ir/article_5710_a7547dc664a7be01e4a120b419cf347b.pdf
2022-01-01
1329
1339
10.22075/ijnaa.2022.5710
Multi-class LDA
CNN
mRMR
SGD
subjective pattern sequence
Rasheed
Ali S
srasheedmansoor@gmail.com
1
Department of computer Science, Vels Institute of Science, Technology and Advanced Studies (VISTAS), Chennai, India
LEAD_AUTHOR
S
Perumal
perumal.scs@velsuniv.ac.in
2
Department of computer Science, Vels Institute of Science, Technology and Advanced Studies (VISTAS), Chennai, India
AUTHOR
ORIGINAL_ARTICLE
Study of pressure applied to blood vessels using a mathematical model
In this paper we present a dynamic model of the heart’s pumping blood. To predict blood flow and pressure applied to the area of blood vessels (arteries - veins - capillaries). The fluid dynamics model is derived from the continuum equation and the Navier-Stokes equations. For an incompressible Newton flow through a network of cylindrical vessels. This paper combined a model of pressure applied to the walls of blood vessels with a (regular - turbulent) flow model of blood, and the viscoelastic deformation of the walls (arteries - veins - capillaries) was studied with different blood density and prediction of the effect of the thickness of the rubber wall on the flow and the resulting pressure on the blood vessels. The results of this study show that the viscous elastic wall of the blood vessels allows more physiological prediction of pressure and vascular deformation, and that blood flow with varying intensity is more in the aorta than in the rest of the vessels, and this is subject to wide dilation.
https://ijnaa.semnan.ac.ir/article_5711_30b7ee947e8f4b273cb63f3a8346eedc.pdf
2022-01-01
1341
1350
,
Mathematical model
elastic fiber
viscosity of blood
Enas
Abdullah
inasy.abdullah@uokufa.edu.iq
1
Department of Mathematic, Faculty of Education, Kufa University, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Detection of COVID-19 from radiology modalities and identification of prognosis patterns
SARS-CoV-2 and the consequential COVID-19 virus is one of the major concerns of the 21st century. Pertaining to the novelty of the disease, it became necessary to discover the efficacy of deep learning techniques in the quick and consistent discovery of COVID-19 based on chest X-ray and CT scan image analysis. In this related work, Prognostic tool using regression was designed for patients with COVID-19 and recognizing prediction patterns to make available important prognostic information on mortality or severity in COVID-19 patients. And reliable convolutional neural network (CNN) architecture models (DenseNet, VGG16, ResNet, Inception Net)to institute whether it would work preeminent in terms of accuracy as well as efficiency with image datasets with Transfer Learning. CNN with Transfer Learning were functional to accomplish the involuntary recognition of COVID-19 from numerary chest X-ray and CT scan images. The experimental results emphasize that selected models, which is formerly broadly tuned through suitable parameters, executes in extensive levels of COVID-19 discovery against pneumonia or normal or lung opacity through the precision of up to 87% for X-Ray and 91% intended for CT scans.
https://ijnaa.semnan.ac.ir/article_5713_7701a9b6423576ef1118f15f349f8d44.pdf
2022-01-01
1351
1365
10.22075/ijnaa.2022.5713
Convolutional Neural Network
Transfer learning
COVID-19
X-ray
CTscan
Deep learning
G
JayaLakshmi
jaya1123@vrsiddhartha.ac.in
1
Department of IT, V R Siddhartha Engineering College, India
LEAD_AUTHOR
Haitham
Khalaf
med.haitham.alakidi@uoanbar.edu.iq
2
College of Medicine, University of Anbar, Ramadi, Iraq
AUTHOR
Abolfazl
Farhadi
farhadie_1967@yahoo.com
3
Department of Nursing Sciences, Shirvan Branch, Islamic Azad University, Shirvan, Iran
AUTHOR
Shokhan
Al Barzinji
shokhan.albarzinji@uoanbar.edu.iq
4
Department of Computer Science, College of Computer Science and Information Technology, University of Anbar, Ramadi, Iraq
AUTHOR
Sawsan
Mahmood
sawsan.d.mahmood@tu.edu.iq
5
Department of Electricity Engineering College of Engineering, University of Tikrit, Tikrit, Iraq
AUTHOR
Saif Al-din
Najim
saifaddin.r@uoanbar.edu.iq
6
Department of Computer Science, College of Computer Science and Information Technology, University of Anbar, Ramadi, Iraq
AUTHOR
Maha
Hutaihit
mahaabbashutaihit@uodiyala.edu.iq
7
Department of Communication Engineering Collage of Engineering, University of Diyala: Baqubah, Diyala, Iraq
AUTHOR
Salwa
Nejrs
salwamn@uomisan.edu.iq
8
Directorate of Private University Education, Ministry of Higher Education, Baghdad, Iraq
AUTHOR
Raghda
Al Mahdawi
raghdasalam@uodiyala.edu.iq
9
Department of Computer Engineering Collage of Engineering, University of Diyala: Baqubah, Diyala, Iraq
AUTHOR
Azmi
Abdulbaqi
azmi_msc@uoanbar.edu.iq
10
Department of Computer Science, College of Computer Science and Information Technology, University of Anbar, Ramadi, Iraq
AUTHOR
ORIGINAL_ARTICLE
Sentiment analysis for covid-19 in Indonesia on Twitter with TF-IDF featured extraction and stochastic gradient descent
Twitter is an information platform that can be used by any internet user. The opinions of the Twitter Netizens are still random or unclassified. The technique for classifying sentiment analysis requires an algorithm. One of the classification algorithms is Stochastic Gradient Descent (SGD). The more training data provided to the machine, the accuracy of the classification function model formed by the machine is also higher. But in making representations into numerical vectors, the dimensions of data become large due to the many features. Feature optimization needs to be done to the training data by reducing the dimensions of the training data while maintaining high model accuracy. The optimization feature used is the TF-IDF (term frequency-inverse document frequency) feature extraction. sentiment analysis using TF-IDF feature extraction and stochastic gradient descent algorithm can classify Indonesian text appropriately according to positive and negative sentiment. Classification Performance using TF-IDF feature extraction and stochastic gradient descent algorithm obtained an accuracy is 85.141%.
https://ijnaa.semnan.ac.ir/article_5743_ffddc5f6a3083b5d0785e42d1d39f891.pdf
2022-01-01
1367
1373
10.22075/ijnaa.2021.5735
COVID-19
Twitter
Featured Extraction
Stochastic Gradient Descent
Vindi
Antonio
vindi.antonio@usu.ac.id
1
Department of Master in Informatic Engineering, Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, Medan, Indonesia
LEAD_AUTHOR
Syahril
Efendi
syahril1@usu.ac.id
2
Department of Master in Informatic Engineering, Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, Medan, Indonesia
AUTHOR
Herman
Mawengkang
mawengkang@usu.ac.id
3
Department of Master in Informatic Engineering, Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, Medan, Indonesia
AUTHOR
ORIGINAL_ARTICLE
Semi-parametric regression function estimation for environmental pollution with measurement error using artificial flower pollination algorithm
Artificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing flower pollination algorithm in the environmental field to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement. We estimate the regression function of the semi-parametric model by estimating the parametric model and estimating the non-parametric model, the parametric model is estimated by using an instrumental variables method (Wald method, Bartlett's method, and Durbin's method), The non-parametric model is estimated by using kernel smoothing (Nadaraya Watson), K-Nearest Neighbor smoothing and Median smoothing. The Flower Pollination algorithms were employed and structured in building the ecological model and estimating the semi-parametric regression function with measurement errors in the explanatory and dependent variables, then compare the models to choose the best model used in the environmental scope measurement errors, where the comparison between the models is done using the mean square error (MSE). These methods were applied to real data on environmental pollution/ air pollution in the city of Baghdad, and the most important conclusions that we reached when using statistical methods in estimating parameters and choosing the best model, we found that the Median-Durbin model is the best as it has less MSE, but when using flower The pollination algorithm showed that the Median-Wald model is the best because it has the lowest MSE, and when we compare the statistical methods with the FPA in selecting semi-parametric models, we notice the superiority of the FP algorithm in all methods and for all models.
https://ijnaa.semnan.ac.ir/article_5744_1184f98b4745eee00a909e8d906396fe.pdf
2022-01-01
1375
1389
10.22075/ijnaa.2022.5744
Semi-parametric
Measurement error
Flower Pollination Algorithm
instrument variables method
kernel smoothing
Nadaraya Watson
K-Nearest neighbor smoothing
median smoothing
Ons
Musa
ons.edin1001a@coadec.uobaghdad.edu.iq
1
Mustansiriyah University , College of physical education and sports science, Iraq
LEAD_AUTHOR
Sabah
Ridha
drsabah@coadec.uobaghdad.edu.iq
2
Baghdad University, Department of statistics, Iraq
AUTHOR
ORIGINAL_ARTICLE
A statistical approach and analysis computing based on autoregressive integrated moving averages models to predict COVID-19 outbreak in Iraq
A time series has been adopted for the numbers of people infected with the Covid-19 pandemic in Iraq for a whole year, starting from the first infection recorded on February 18, 2020 until the end of February 2021, which was collected in the form of weekly observations and at a size of 53 observations. The study found the quality and suitability of the autoregressive moving average model from order (1,3) among a group of autoregressive moving average models. This model was built according to the diagnostic criteria. These criteria are the Akaike information criterion, Bayesian Information Criterion, and Hannan \& Quinn Criterion models. The study concluded that this model from order (1,3) is good and appropriate, and its predictions can be adopted in making decisions.
https://ijnaa.semnan.ac.ir/article_5745_3fe9f94ec0f1b50658095ee6405c5e30.pdf
2022-01-01
1391
1415
10.22075/ijnaa.2022.5745
Autoregressive Models
ACF
PACF
COVID-19
Unit Root Test
Ali
Kazem Naji
ali.babylon1982@gmail.com
1
College of Education for Pure Science, University of Babylon, Iraq
LEAD_AUTHOR
Asmaa
Ashoor
2
College of Basic Education, University of Babylon, Iraq
AUTHOR
ORIGINAL_ARTICLE
A comparative study on numerical, non-Bayes and Bayes estimation for the shape parameter of Kumaraswamy distribution
This paper is considered with Kumaraswamy distribution. Numerical, non-Bayes and Bayes methods of estimation were used to estimate the unknown shape parameter. The maximum likelihood is obtained as a non-Bayes estimator. As well as, Bayes estimators under a symmetric loss function (De-groot and NLINEX) by using four types of informative priors three double priors and one single prior. In addition, numerical estimators are obtained by using Newton's method and the false position method. Simulation research is conducted for the comparison of the effectiveness of the proposed estimators. Matlab 2015 will be used to obtain the numerical results.
https://ijnaa.semnan.ac.ir/article_5756_581e024d6b31fab0f47fb5e958a44b8b.pdf
2022-01-01
1417
1434
10.22075/ijnaa.2022.5756
Kumaraswamy distribution
Bayes
non-Bayes
Numerical estimator
Mohammed
Mahmoud
mahommedadnan1993@gmail.com
1
Department of Mathematics, College of Science, Mustansiriyah University, Baghdad, Iraq
LEAD_AUTHOR
Amal
Mohammed
dr.amal70@uomustansiriyah.edu.iq
2
Department of ways and Transportation, College of Engineering, Mustansiriyah University, Baghdad, Iraq
AUTHOR
Sudad
Abraheem
sudad1968@uomustansiriyah.edu.iq
3
Department of Mathematics, College of Science, Mustansiriyah University, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
DId COVID 19 help authors to publish in high impact journal
The progressing of countries is measured by scientific research, Iraq made a good progressing in recent three years, whereas the Ministry of Higher Education and Scientific Research announced that Iraq ranked fifty-fourth among the publishing countries in Scopus. The study aim is to look after if COVID 19 help Iraq to get this rank? The information was collected by questionnaires to general people and a phone interview with chief- editors of Iraqi journals had been made. The results showed that the COVID 19 play an important role in helping authors to collect any information about paper publishing in high impact journals and this is due to the ease of access to information that was previously restricted with a specific time and place and became available online because of the COVID 19 lockdown. Despite the seriousness of COVID 19 but as we know that always there is a positive aspect of everything happening around us, COVID 19 helped us to know an important advantage of e-learning that we do not know before.
https://ijnaa.semnan.ac.ir/article_5757_25457f7c16cf31f16c6ce57f32f82d01.pdf
2022-01-01
1435
1443
10.22075/ijnaa.2022.5757
Covid 19
High impact journals
Iraqi authors
Israa
Alameen
israaalameen@mtu.edu.iq
1
Technical Community Health Department, Technical Medical Institute, Middle Technical University, Baghdad, Iraq
LEAD_AUTHOR
Arkan
Jaber Saeed
arkan.jebur@gmail.com
2
Ministry of Electricity, General Company for Electricity Transmission, Central Network, Iraq
AUTHOR
Aziz
Abdulla
lan914@gmail.com
3
Environmental Engineering Department, College of Engineering, Tikrit University, Tikrit, Iraq
AUTHOR
ORIGINAL_ARTICLE
Some common fixed point theorems for strict contractions
The extension of Aamri and El Moutawakil's property [1] to set-valued mappings arena is given. Also, some common fixed point theorems for strict contractions are established. these theorems extend results in [1,8].
https://ijnaa.semnan.ac.ir/article_5758_15a88f15a3b89d06197ad88573f33941.pdf
2022-01-01
1445
1450
10.22075/ijnaa.2019.17470.1937
Property (M. V.)
set-valued
single-valued
weakly compatible
Mohamed
Ahmed
mahmed68@yahoo.com
1
College of Science and Humanities at Howtat Sudair, Majmaah University, Saudi Arabia
LEAD_AUTHOR
ORIGINAL_ARTICLE
Some modified types of arrow domination
The aim of this paper is to introduce some new modified types of arrow domination by adding some conditions on the arrow dominating set or on its complement set. Co-independent arrow domination, restrained arrow domination, connected arrow domination, and complementary tree arrow domination are the main types of domination introduced here. More properties and bounds are discussed and applied to some graphs.
https://ijnaa.semnan.ac.ir/article_5759_8ae38b85e75842d88d12d788f152b582.pdf
2022-01-01
1451
1461
10.22075/ijnaa.2022.5759
Arrow domination
dominating set
domination number
Suha
Radhi
jabber-math@utq.edu.iq
1
Department of Mathematics, College of Education for Pure Sciences, University of Thi-Qar, Thi-Qar, Iraq
LEAD_AUTHOR
Mohammed
Abdlhusein
mmhd@utq.edu.iq
2
Department of Mathematics, College of Education for Pure Sciences, University of Thi-Qar, Thi-Qar, Iraq
AUTHOR
Ayed
Hashoosh
ayed.hashoosh@utq.edu.iq
3
Department of Mathematics, College of Education for Pure Sciences, University of Thi-Qar, Thi-Qar, Iraq
AUTHOR
ORIGINAL_ARTICLE
On the maximum number of limit cycles of a planar differential system
In this work, we are interested in the study of the limit cycles of a perturbed differential system in \(\mathbb{R}^2\), given as follows\[\left\{\begin{array}{l}\dot{x}=y, \\\dot{y}=-x-\varepsilon (1+\sin ^{m}(\theta ))\psi (x,y),%\end{array}%\right.\]where \(\varepsilon\) is small enough, \(m\) is a non-negative integer, \(\tan (\theta )=y/x\), and \(\psi (x,y)\) is a real polynomial of degree \(n\geq1\). We use the averaging theory of first-order to provide an upper bound for the maximum number of limit cycles. In the end, we present some numerical examples to illustrate the theoretical results.
https://ijnaa.semnan.ac.ir/article_5760_8a9b3bf64826dfec536fc0f11d6a15d0.pdf
2022-01-01
1462
1478
10.22075/ijnaa.2021.23049.2468
Periodic solution
averaging method
differential system
Sana
Karfes
sana.karfes@gmail.com
1
Laboratory of Applied Mathematics, Badji Mokhtar-Annaba University, P.O. Box 12, 23000 Annaba, Algeria
AUTHOR
Elbahi
Hadidi
ehadidi71@yahoo.fr
2
Laboratory of Applied Mathematics, Badji Mokhtar-Annaba University, P.O. Box 12, 23000 Annaba, Algeria
LEAD_AUTHOR
Mohamed Amine
Kerker
a_kerker@yahoo.com
3
Laboratory of Applied Mathematics, Badji Mokhtar-Annaba University, P.O. Box 12, 23000 Annaba, Algeria
AUTHOR
ORIGINAL_ARTICLE
Expanded Integral differential equations and their applications
Differential equations can be used to examine patrials of higher rank with varying coefficients in various regions of the Cartesian coordinate plane. Meanwhile, the researchers and scientists have N. Rajabov, A.S. Star and F.A. Nasim Adeeb Haneen, and others. As a result, while the coefficients ofpartial differential equations differ from those of partial differential equations, this research examined the partial differential equation based on its rank (fourth rank). Conditions are established for the production of their coefficients within the context of that equation. In multiple different scenarios involving these coefficients, a single solution for that partial differential equation. These circumstances were summed up in five theories.
https://ijnaa.semnan.ac.ir/article_5761_9218bfab73c933d8bfc42682afde015a.pdf
2022-01-01
1479
1491
10.22075/ijnaa.2022.5761
differential equations
Partial differential equations
rank
Rusul Mohammed Hussein
Al-Shmary
rusull.alshmary89@gmail.com
1
Ministry of Education, Directorate of Education, Babylon, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Novel solitons through optical fibres for perturbed cubic-quintic-septic nonlinear Schr\"{o}dinger-type equation
The current analysis employs the Riccati and modified simple equation methods to retrieve new optical solitons for highly dispersive nonlinear Schr\"{o}dinger-type equation (NLSE). With cubic-quintic-septic law (also known as a polynomial) of refractive index and perturbation terms having cubic nonlinearity, 1-optical solitons in the form of hyperbolic, periodic, and rational are derived. the two schemes offer an influential mathematical tool for solving NLSEs in various areas of applied sciences.
https://ijnaa.semnan.ac.ir/article_5766_6229a5e93f29b50ba0e4a4e00101ef2f.pdf
2022-01-01
1493
1506
10.22075/ijnaa.2022.5766
Conformable derivative
Riccati simple equation method
Modified simple equation method
Optical soliton solutions
Emad
Az-Zo'bi
eaaz2006@mutah.edu.jo
1
Department of Mathematics and Statistics, Faculty of Science, Mutah University, AlKarak, Jordan
LEAD_AUTHOR
Ahmed
Alleddawi
ahmedo.k.alleddawi@gmail.com
2
Department of Mathematics and Statistics, Faculty of Science, Mutah University, AlKarak, Jordan
AUTHOR
Islam
Alsaraireh
i.alsaraireh@seu.edu.sa
3
Faculty of Informatics and Computing, Universiti Sultan Zainal Abidin (UniSZA), Kuala Terengganu, Malaysia
AUTHOR
Mustafa
Mamat
must@unisza.edu.my
4
Preparatory Year, Saudi Electronic University, Abha, Kingdom of Saudi Arabia
AUTHOR
Lanre
Akinyemi
akinyeml@lafayette.edu
5
Department of Mathematics, Lafayette College, Easton, Pennsylvania, USA
AUTHOR
Hadi
Rezazadeh
rezazadehadi1363@gmail.com
6
Faculty of Engineering Technology, Amol University of Special Modern Technologies, Amol, Iran
AUTHOR
ORIGINAL_ARTICLE
Numerical solutions of nonlinear Burgers‒Huxley equation through the Richtmyer type nonstandard finite difference method
The Burger‒Huxley equation as a well-known nonlinear physical model is studied numerically in the present paper. In this respect, the nonstandard finite difference (NSFD) scheme in company with the Richtmyer’s (3, 1, 1) implicit formula is formally adopted to accomplish this goal. Moreover, the stability, convergence, and consistency analyses of nonstandard finite difference schemes are investigated systematically. Several case studies with comparisons are provided, confirming that the current numerical scheme is capable of resulting in highly accurate approximations.
https://ijnaa.semnan.ac.ir/article_5767_e4a02112fb14d0514f6ec39047c22a2a.pdf
2022-01-01
1507
1518
10.22075/ijnaa.2021.25004.2878
Burger‒Huxley equation
Nonstandard finite difference scheme
Richtmyer’s (3, 1, 1) implicit formula
Farnoosh
Izadi
farnooshizadi@yahoo.com
1
Department of Applied Mathematics, Faculty of Mathematical Sciences, Lahijan Branch, Islamic Azad University, Lahijan, Iran
AUTHOR
Hashem
Saberi Najafi
hnajafi@guilan.ac.ir
2
Department of applied mathematics, Faculty of mathematical sciences, Lahijan branch, Islamic Azad University, Lahijan, Iran
LEAD_AUTHOR
Amir Hosein
Refahi Sheikhani
ah_refahi@liau.ac.ir
3
Department of Applied Mathematics, Faculty of Mathematical Sciences, Lahijan Branch, Islamic Azad University, Lahijan, Iran.
AUTHOR
ORIGINAL_ARTICLE
Compression of image using multi-wavelet techniques
Digital compression of images is a topic that has appeared in a lot of studies over the past decade to this day. As wavelet transform algorithms advance and procedures of quantization have helped to bypass current compression of image standards such as the JPEG algorithm. To get the highest effectiveness in compression of image transforms of wavelet need filters which gather a desirable character's number i.e., symmetry and orthogonally. Nevertheless, wave design capabilities are restricted due to their ability to have all of such desirable characters at the same time. The multi-wavelet technology removes a few of the restrictions of the wavelet play more than the options of design and thus able to gather all desired Characters of transforming. Wavelet andmulti-wave filter banks are tested on a larger scale with images, providing more useful analysis. Multiple waves indicate energy-compression efficiency (a higher compression ratio usually indicates a higher mean square error, MSE, in the compressed image). Filter bank Characters such as orthogonal and compact support, symmetry, and phase response are important factors that also affect MSE and professed quality of the image. The current work analyzes the multi-wave Characters effect on the performance of compression of images. Four multi-wavelength Characters (GHM, CL, ORT4) were used in this thesis and the compression of image performance of grayscale images was compared with common scalar waves (D4). SPIHT quantification device in stress chart and use of PSNR and subjective quality measures to assess performance. The results in this paper point out those multi wave characteristics that are most important for the compression of images. Moreover, PSNR results and subjective quality show similar performance to the best scalar and multi-waves. The analysis also shows that a programmer based on multi-band conversion significantly improves the perceived image quality.
https://ijnaa.semnan.ac.ir/article_5768_f1277a413fb855a150db2d34ccc1e170.pdf
2022-01-01
1519
1535
10.22075/ijnaa.2022.5768
Image processing
Compression
SPIHT
Multi-wavelet
MSE
Saba
Abdul-Wahed
saba.saddam@uobasrah.edu.iq
1
Department of Computer Science, College of Computer Science and Information Technology, University of Basrah, Basrah, Iraq
LEAD_AUTHOR
Marwah
Kamil Hussein
marwa.hussein@uobasrah.edu.iq
2
Department of Information Systems, College of Computer Science and Information Technology, University of Basrah, Basrah, Iraq
AUTHOR
Huda
Ahmed
hudaahmed75.cit@uobasrah.edu.iq
3
Department of Information Systems, College of Computer Science and Information Technology, University of Basrah, Basrah, Iraq
AUTHOR
ORIGINAL_ARTICLE
Escape criteria for one parameter family of complex functions \(\mathbf{f}_{\mathbf{k}}\left( \mathbf{z}\right)\mathbf{=}\mathbf{\text{kcsc}}\left( \mathbf{z} \right)\) via non-standard iterations
In this research we stated and proved the some escape criteria theorems of the one parameter family of the transcendental meromorphic-functions \(F\mathbf{=}\left\{ f_{k}\left( z \right) = k\ csc\left( z \right):k\mathbb{\in C\ }\text{and}\text{\ z}\mathbb{\in C} \right\}\). Furthermore, we used non-standard iterations: Mann, Ishikawa and Noor iterations in the complex plane. This research can be considered as an extension of [1].
https://ijnaa.semnan.ac.ir/article_5769_529d91a0ee77f2c765751705869374f8.pdf
2022-01-01
1537
1543
10.22075/ijnaa.2022.5769
Escape criteria
meromorphic functions
transcendental functions
Mann iteration
Ishikawa iteration
Noor iteration
Iman
Hussain
iman.a.hussain@nahrainuniv.edu.iq
1
Department of Mathematics and Computer Applications College of Science, Al-Nahrain University, Iraq
LEAD_AUTHOR
Zeana
Jamil
zina.z@sc.uobaghdad.edu.iq
2
Department of Mathematics, College of Science, Baghdad University, Iraq
AUTHOR
Nuha
Hamada
nuha.hamada@aau.ac.ae
3
Al Ain University, Abu Dhabi, UAE
AUTHOR
ORIGINAL_ARTICLE
A new bond portfolio optimization model as two-stage stochastic programming problems in U.S. market
We formulate a new bond portfolio optimization model as a two-stage stochastic programming problem in which a decision maker can optimize the cost of bond portfolio selection while deciding which bonds to sell, which bonds to hold, and which bonds to buy from the market, as well as determine the quantity of additional cash in period t under different scenarios and varying assumptions, The model proved its efficiency by finding the optimal values and giving an investment plan that, it will reduce the cost of the portfolio.
https://ijnaa.semnan.ac.ir/article_5771_310d21d30f9c7dc19c3b4ea4db5a159b.pdf
2022-01-01
1545
1563
10.22075/ijnaa.2022.5771
Stochastic Portfolio Programming model
Linear Programming
nonlinear programming
constrained optimization
Mohammed
Alkailany
alkailanym@uomosul.edu.iq
1
Department of Operation Research and Int. Tech., Collage of Computer Sciences and Mathematics, University of Mosul, Iraq
LEAD_AUTHOR
Mohammed
Abdalrazzaq
dr_aldouri@coadec.uobagdad.edu.iq
2
Department of statistic, Collage of Administration and Economics, University of Bagdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
On studying bi-\(\Gamma\)-algebra and some related concepts
The aim of this research paper is to introduce the concept of bi-\(\Gamma\)-algebra space (bi-gamma algebra space). The concept of bi-\(\mu\)-measurable set in a bi-\(\Gamma\)-algebra space is defined. With this concept, some properties of bi-\(\Gamma\)-algebra space are proved. We then define various separation axioms for bi-\(\Gamma\)-algebra space such as \(M_{0},M_{1},\ M_{2},\ M_{3},\) and \(M_{4}\); then the relationships between them are studied. In addition, the concept of measurable function between two bi-measurable spaces is introduced and some results are discussed.
https://ijnaa.semnan.ac.ir/article_5772_cb31ac7125b59a219f98eccaffbe1dd0.pdf
2022-01-01
1565
1572
10.22075/ijnaa.2022.5772
algebra
( sigma)-field
(sigma)-algebra
(Gamma)-algebra
measurable function
Mohaimen
Abbood
mohaimen.m.abbood35502@st.tu.edu.iq
1
Ministry of Education, General Directorate of Education in Diyala, Iraq
LEAD_AUTHOR
Ali Al-Fayadh
Ali Al-Fayadh
aalfayadh@yahoo.com
2
Department of Mathematics and Computer Applications, College of Science, Al-Nahraini University, Baghdad, Iraq
AUTHOR
Hassan
Ebrahim
hassan1962pl@tu.edu.iq
3
Department of Mathematics, College of Computer Science and Mathematics, Tikrit University, Tikrit, Salahaddin, Iraq
AUTHOR
ORIGINAL_ARTICLE
Optimal credit risk model based on metaheuristic particle swarm algorithm and multilayer perceptron neural network
The present study aims to develop a credit portfolio optimization model in the banking industry using a multilayer perceptron artificial neural network with a metaheuristic particle swarm algorithm. Risk, having its own complexity, is a basic concept in financial markets. Since there is no clear picture of risk realization, financial markets are in need of risk control and management approaches. With regard to data collection, this is a descriptive study and regarding the nature and purpose of the research, it is a developmental-applied one. The statistical population of the research includes all facility files of the last 10 years and the financial statements of a commercial bank, selected by census method. The risk criteria used in the models include fuzzy Value-at-Risk (VaR), fuzzy conditional Value-at-Risk (CVAR), fuzzy average Value-at-Risk(AVaR), fuzzy lower absolute deviation(LAD), fuzzy Semi-Kurtosis, and fuzzy Semi-Entropy. The research models were implemented using a three-layer perceptron artificial neural network. MATLAB software was used to conduct the research. The results indicate that the performance of the fuzzy average Value-at-Risk model is better than other models in evaluating optimal portfolios due to the lower mean squared error rate in generating more revenue. Therefore, it is recommended that the above model be used to optimize the credit portfolio.
https://ijnaa.semnan.ac.ir/article_5773_aeab62008d425479ffa04e62af0ed6c5.pdf
2022-01-01
1573
1586
10.22075/ijnaa.2021.25062.2903
Portfolio Optimization, Perceptron Artificial Neural Network
Credit Risk
particle swarm optimization algorithm
Ali Asghar
Tehranipour
ali.tehranippor54@gmail.com
1
Department of Financial Engineering, Aliabad Katoul Branch, Islamic Azad University, Aliabad Katoul, Iran
AUTHOR
Ebrahim
Abbasi
abbasiebrahim2000@alzahra.ac.ir
2
Department of Management, faculty of social sciences and economics, Alzahra University, Tehran, Iran
LEAD_AUTHOR
Hossein
Didehkhani
h.didehkhani@gmail.com
3
Department of Financial Engineering, Aliabad Katoul Branch, Islamic Azad University, Aliabad Katoul, Iran
AUTHOR
Arash
Naderian
arashnaderian@yahoo.com
4
Department of Accounting, Aliabad Katoul branch, Islamic Azad University, Aliabad Katoul, Iran
AUTHOR
ORIGINAL_ARTICLE
On the maximum likelihood, Bayes and expansion estimation for the reliability function of Kumaraswamy distribution under different loos function
This work deals with Kumaraswamy distribution. Maximum likelihood, Bayes and expansion methods of estimation are used to estimate the reliability function. A symmetric Loss function (De-groot and NLINEX) are used to find the reliability function based on four types of informative prior three double priors and one single prior. In addition expansion methods (Bernstein polynomials and Power function) are applied to find reliability function numerically. Simulation research is conducted for the comparison of the effectiveness of the proposed estimators. Matlab (2015) will be used to obtain the numerical results.
https://ijnaa.semnan.ac.ir/article_5774_64d520a2ad11ae29b6411e9f72c9b618.pdf
2022-01-01
1587
1604
10.22075/ijnaa.2022.5774
Kumaraswamy distribution
Maximum likelihood
Bayes, expansion methods
Mohammed
Mahmoud
mahommedadnan1993@gmail.com
1
Department of Mathematics, College of Science, Mustansiriyah University, Baghdad, Iraq
LEAD_AUTHOR
Sudad
Abraheem
sudad1968@uomustansiriyah.edu.iq
2
Department of Mathematics, College of Science, Mustansiriyah University, Baghdad, Iraq
AUTHOR
Amal
Mohammed
dr.amal70@uomustansiriyah.edu.iq
3
Department of Ways and Transportation, College of Engineering, Mustansiriyah University, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
On primary isolated submodules
Let \(L\) be a left module over a ring \(\text{\ S}\) with identity. In this paper, the concept of primary isolated submodules is introduced. We look for relations between this class of submodules and related modules. A number of facts and characterizations that concern is gained. The aim of this work is to introduce and study the primary isolated submodules as a generalization of isolated submodules. A submodule \(A\) of \(L\) is primary isolated if for each proper \(B\) of \(A\), there is a primary submodule \(C\) of \(L\), \(B \subseteq C\) but\(\text{\ A} \nsubseteq C\). Some properties are gained and we look for any relationship between this type of modules and other related modules.
https://ijnaa.semnan.ac.ir/article_5775_4d98f7fe2e71e736fc27c533b80722cd.pdf
2022-01-01
1605
1611
10.22075/ijnaa.2022.5775
Primary isolated submodules
Primary lifted submodules
Primary radical submodules
Primary submodules
Prime submodules
Ghaleb
Ahmed
ghaleb.a.h@ihcoedu.uobaghdad.edu.iq
1
Department of Mathematics, College of Education for Pure Science, Ibn-Al-Haitham, University of Baghdad, Baghdad, Iraq
LEAD_AUTHOR
Tamara
Alshareef
tamaraalshareef@yahoo.com
2
Department of Mathematics, College of Education for Pure Science, Ibn-Al-Haitham, University of Baghdad, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
The decision making strategy of prospective mathematics teachers in improving LOTS to be HOTS problem
This study aimed to explore the decision making of a prospective mathematics teacher in the process of improving a Lower Order Thinking Skills (LOTS) problem to be a Higher Order Thinking Skills (HOTS) problem.~This study involves 51 prospective mathematics teachers taking part in improving HOTS problems. Two students were chosen based on their uniqueness and quality of HOTS problems produced and their fluency in communication.~Semi-structured based task interviews were conducted to both participants in exploring the decision-making process-based. Furthermore, the data were analyzed qualitatively. The results showed that S1 was able to produce three-question related to one another, take two questions assess the reasonableness, finally decide one problem consisting of two items. S2 was able to generate three separate ideas, clarify the three ideas, and assess the three ideas and finally decide on one HOTS problem. S1 and S2 are still lack in involving Pedagogical Content Knowledge in assessing ideas especially. These results have an impact on the importance of developing a teaching model that improves the Decision making Strategy Furthermore, it is necessary to explore the decision-making process of pre-service and in-service mathematics teachers in developing the HOTS problems.
https://ijnaa.semnan.ac.ir/article_5776_6e5fb60988e16e97d6bb1f602a4bda78.pdf
2022-01-01
1613
1627
10.22075/ijnaa.2022.5776
higher order thinking skills
generating
clarifying
assessing ideas
Suwarno
Suwarno
suwarno.1803119@students.um.ac.id
1
Departement of Mathematics Education, Universitas Negeri Malang, Malang, Indonesia
LEAD_AUTHOR
Toto
Nusantara
toto.nusantara.fmipa@um.ac.id
2
Departement of Mathematics Education, Universitas Negeri Malang, Malang, Indonesia
AUTHOR
Susiswo
Susiswo
susiswo.fmipa@um.ac.id
3
Departement of Mathematics Education, Universitas Negeri Malang, Malang, Indonesia
AUTHOR
Santi
Irawati
santi.irawati.fmipa@um.ac.id
4
Departement of Mathematics Education, Universitas Negeri Malang, Malang, Indonesia
AUTHOR
ORIGINAL_ARTICLE
Using Leray-Schauder topological degree to solve a linear diffusion parabolic equation with periodic initial conditions
Throughout this manuscript, we show time periodic solutions to a linear diffusion parabolic equation with Diriclet condition. Based on the topological degree theorem, we prove a time periodic solutions of the system such that we found the fixed point when the domain of the solution is sufficiently small.
https://ijnaa.semnan.ac.ir/article_5777_0e235391729fd0b10b282fa81f43c63a.pdf
2022-01-01
1629
1635
10.22075/ijnaa.2022.5777
weakly nonlinear sources
Diriclet boundary conditions
Time-periodic solution
Topological degree theorem
Raad
Hameed
dr.raad.awad@tu.edu.iq
1
Department of Mathematics, College of Education for Pure Sciences, Tikrit University, Tikrit, Iraq
LEAD_AUTHOR
Faez
Ghaffoori
fng-2022@uomustansiriyah.edu.iq
2
Department of Mathematics, College of Basic Education, Mustansiriyah University, Baghdad, Iraq
AUTHOR
Hekmat
Mustafa
hekmat78@uohamdaniya.edu.iq
3
Department of Mathematics, College of Education, Al- Hamdaniya University, Mosul, Iraq
AUTHOR
Wafaa
Taha
wafaamath2013@gmail.com
4
Department of Mathematics, College of Sciences, Kirkuk University, Kirkuk, Iraq
AUTHOR
Maan
Rasheed
maan.rasheed.edbs@uomustansiriyah.edu.iq
5
Department of Mathematics, College of Basic Education, Mustansiriyah University, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Treatment of dynamical nonlinear Measles model: An evolutionary approach
Measles is a respiratory system infection caused by a Morbillivirus genus virus. The disease spreads directly or indirectly through respiration from the infected person's nose and mouth after contact with fluids. The vast population of infects in developing countries is yet at risk. Generally, the mathematical model of Measles virus propagation is nonlinear and therefore changeable to solve by traditional analytical and finite difference schemes by processing all properties of the model like boundedness, positivity feasibility. In this paper, an unconditionally convergent semi-analytical approach based on modern Evolutionary computational technique and Padé- Approximation (EPA) has been implemented for the treatment of non-linear Measles model. The convergence solution of EPA scheme on population: susceptible people, infective people, and recovered people have been studied and found to be significant. Eventually, EPA reduces contaminated levels very rapidly and no need to supply step size. A robust and durable solution has been established with the EPA in terms of the relationship between disease-free equilibrium in the population. When comparing the Non-Standard Finite Difference (NSFD) approach, the findings of EPA have shown themselves to be far superior.
https://ijnaa.semnan.ac.ir/article_5778_dbe89dfc8f3c97b49e9ec882bdfe3752.pdf
2022-01-01
1629
1638
10.22075/ijnaa.2020.20450.2156
Optimization
Epidemiological Measles Model
Padé-approximation
differential evolution
Penalty Function
Muhammad Farhan
Tabassum
farhanuet12@gmail.com
1
Department of Mathematics, University of Management and Technology, Lahore, Pakistan
AUTHOR
Ali
Akgul
aliakgul00727@gmail.com
2
Art and Science Faculty, Department of Mathematics, Siirt University, 56100 Siirt, Turkey
LEAD_AUTHOR
Sana
Akram
sanaakram03@gmail.com
3
Department of Mathematics, University of Management and Technology, Lahore, Pakistan
AUTHOR
Muhammad
Farman
farmanlink@gmail.com
4
Department of Mathematics and Statistics, University of Lahore, Lahore, Pakistan
AUTHOR
Rabia
Karim
rabia.karim490@gmail.com
5
Department of Sports Sciences, Faculty of Allied Health Science, University of Lahore, Lahore, Pakistan
AUTHOR
Saadia Mahmood ul
Hassan
saadiaa.hassan@gmail.com
6
Department of Sports Sciences, Faculty of Allied Health Science, University of Lahore, Lahore, Pakistan
AUTHOR
ORIGINAL_ARTICLE
Analysis of deep learning methods in diabetic retinopathy disease identification based on retinal fundus image
Diabetic retinopathy (DR) is a serious retinal disease and is considered the leading cause of blindness and is strongly associated with people with diabetes. Ophthalmologists use optical coherence tomography (OCT) and retinal fundus imagery to assess the retinal thickness, structure, and also detecting edema, bleeding, and scarring. Deep learning models are used to analyze OCT or fundus images, extract unique features for each stage of DR, then identify images and determine the stage of the disease. Our research using retinal fundus imagery is used to identify diabetic retinopathy disease, among others, using the Convolutional Neural Network (CNN) method. The methodology stage in the study was a green channel, Contrast Limited Adaptive Histogram Equalization (CLAHE), morphological close, and background exclusion. Next, a segmentation process is carried out that aims to generate binary imagery using thresholding techniques. Then the binary image is used as training data conducted epoch as much as 30 times to obtain an optimal training model. After testing, the deep learning method with the CNN algorithm obtained 95.355\% accuracy in the identification of diabetic retinopathy disease based on fundus image in the retina.
https://ijnaa.semnan.ac.ir/article_5779_a776f85b66874bffc81a79f208705911.pdf
2022-01-01
1639
1647
10.22075/ijnaa.2022.5779
Deep Learning Methods
Diabetic Retinopathy
Retinal Fundus Image
N
Nurrahmadayeni
nurrahmadayeni@usu.ac.id
1
Department of Master in Informatic Engineering, Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, Medan, Indonesia
LEAD_AUTHOR
Syahril
Efendi
syahril1@usu.ac.id
2
Department of Master in Informatic Engineering, Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, Medan, Indonesia
AUTHOR
Muhammad
Zarlis
m.zarlis@usu.ac.id
3
Department of Master in Informatic Engineering, Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, Medan, Indonesia
AUTHOR
ORIGINAL_ARTICLE
Solving multi-objectives function problem using branch and bound and local search methods
In this paper we consider $1//\sum^n_{j=1}{(E_j+T_j+C_j+U_j+V_j)}$ problem, the discussed problem is called a Multi objectives Function (MOF) problem, As objective is to find a sequence that minimizes the multiple objective functions, the sum earliness, the tardiness, the completion time, the number of late jobs and the late work. The NP-hard nature of the problem, hence the existence of a polynomial time method for finding an optimal solution is unlikely. This complexity result leads us to use an enumeration solution approach. In this paper we propose a branch and bound method to solve this problem. Also, we use fast local search methods yielding near optimal solution. We report on computation experience; the performances of exact and local search methods are tested on large class of test problems.
https://ijnaa.semnan.ac.ir/article_5780_3f21f94cf3d643f8862c0e7e9704c901.pdf
2022-01-01
1649
1658
10.22075/ijnaa.2022.5780
Machine Scheduling with Multi-Objective problem
Branch and Bound
Simulated Annealing
Genetic Algorithm. Optimization
Firefly Algorithm
Manal
Ibrahim
manalhashimibrahim@uomustansiriyah.edu.iq
1
Mathematics Dept, Mustansiriyah University, College of Science/ Baghdad, Iraq
LEAD_AUTHOR
Faez
Ali
faezhassan@uomustansiriyah.edu.iq
2
Mathematics Dept, Mustansiriyah University, College of Science/ Baghdad, Iraq
AUTHOR
Hanan
Chachan
3
Mathematics Dept, Mustansiriyah University, College of Science/ Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Designing a control system for traffic lights by VANET protocol
In this paper, VANET protocol is used to reduce traffic jams and accidents on the roads. The proposed algorithm is dependent on the wireless network between cars. The system is part of a wireless control node located at the intersection, which determines the optimal values of the phases of traffic lights. The protocol used in this research provides traffic fluency when compared to adaptive systems based on the use of cameras. It has also been developed as an integrated system validation simulator. The simulation framework consists of a realistic vehicle navigation model and a wireless network simulator. The proposed system designed as a work system that can be analyzed for peak hours and we got acceptable results. Average delay, fuel consumption and pollution are significantly reduced.
https://ijnaa.semnan.ac.ir/article_5781_c88344dd6b60e2cea999649ced2c6b75.pdf
2022-01-01
1659
1666
10.22075/ijnaa.2022.5781
Control System
Traffic Light
Ahmed
Al-Azzawi
ad_ahmedal-azzawi@uodiyala.edu.iq
1
Administrative and Financial Affairs Department, University of Diyala, Iraq
LEAD_AUTHOR
Fadhil
Zaidan
sc_fadhelzaidan@uodiyala.edu.iq
2
Department of Computer, Science College, University of Diyala, Iraq
AUTHOR
Ihsan
Hassan
ihsan@uodiyala.edu.iq
3
College of Medicine, University of Diyala, Iraq
AUTHOR
ORIGINAL_ARTICLE
The effectiveness of the integrated inquiry guided model STEM on students scientific literacy abilities
Science literacy is very important to be prepared for the younger generation in order to solve problems in life. STEM integrated guided inquiry is a strategy that can be done to improve scientific literacy in the learning process. We examine the effect of the integrated STEM guided inquiry model on students' scientific literacy abilities. A total of 66 middle school students participated in this study. Data were collected from one question instrument and then analyzed by normality test (chi square), homogeneity test for variance and hypotesis test (t-test). STEM integrated guided inquiry model has a significant effect with significance level 1\% ($\alpha $= 0,99) is obtained t$ _{\text{count}} $ 7,9 $ > $ t$_ {\text{table}} $ 2,66. Based on the result obtained that STEM integrated guided inquiry model that can improve literacy science skills compared to conventional model
https://ijnaa.semnan.ac.ir/article_5782_6d514b67e90781233b6528a106ef2278.pdf
2022-01-01
1667
1672
10.22075/ijnaa.2022.5782
Guided Inquiry
STEM
Science Literacy
Muhammad
Kahar
syahrulkahar@um-sorong.ac.id
1
Department of Mathematics Education, Universitas Muhammadiyah Sorong, Indonesia
AUTHOR
S.
Susilo
susilo@uhamka.ac.id
2
Program Studi Pendidikan Biologi, Universitas Muhammadiyah Prof. Dr. Hamka, Indonesia
AUTHOR
Dahlan
Abdullah
dahlan@unimal.ac.id
3
Department of Informatics, Universitas Malikussaleh, Aceh, Indonesia
LEAD_AUTHOR
Venny
Oktaviany
4
Department of Primary Teacher Education, STKIP Kusuma Negara, Indonesia
AUTHOR
ORIGINAL_ARTICLE
Forecasting the numbers of cardiac diseases patients by using Box-Jenkins model in time series analysis
The aim of this study is analysis time series with using (Box and Jenkins ) method by identification , estimation, diagnosis, checking of model ,forecasting to find the beast forecasting model to the number of patient with cardiac in Misan province by using the monthly data of the period (2005-2016) by using SPSS version (26).The result of data analysis show that the proper and suitable model is Autoregression of order ARIMA (1,1,0) .According to this model the study forecast the numbers of patients with cardiac diseases the next years in monthly , so the forecasting values represented the scours time series data that deal to the efficiency of the model.
https://ijnaa.semnan.ac.ir/article_5783_1608998a16545e57b01ddb45a1d7f2c5.pdf
2022-01-01
1673
1681
10.22075/ijnaa.2022.5783
Forecasting
Cardiac diseases
Box Jenkins
Time series analysis
Sabah
Jasim Alsaedi
sabah.h.alsaedi@gmail.com
1
Mathematic Department - College of Basic Education, Misan University, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
A local density-based outlier detection method for high dimension data
The researchers faced challenges in the outlier detection process, mainly when deals with the high dimensional dataset; to handle this problem, we use The principal component analysis. Outlier detection or anomaly detection, with local density-based methods, compares the density of observation with the surrounding local density neighbors. We apply the outlier score as a measure of comparison. In this research, we choose different density estimation functions and calculated different distances. Weighted kernel density estimation with adaptive bandwidth for multivariate kernel density estimation(Gaussian) considered the $KNN$ and RNN. $KNN$ is considered too for the Epanenchnikov kernel density estimation. Lastly, we estimate the LOF as a base method in detecting outliers. Extensive experiments on a synthetic dataset have shown that RKDOS and EPA are more efficient than LOF using the precision evaluation criterion.
https://ijnaa.semnan.ac.ir/article_5784_f851540ce83b89b0ba7ae6d2e356ef0a.pdf
2022-01-01
1683
1699
10.22075/ijnaa.2022.5784
local density
K-nearest neighbor
R-nearest neighbor
outlier score
WKDE
Shahad
Abdulghafoor
shahed.adel1001a@coadec.uobaghdad.edu.iq
1
University of Baghdad, College of Management and Economics, Department Of Statistics, Iraq
LEAD_AUTHOR
Lekaa
Mohamed
lekaa.a@coadec.uobaghdad.edu.iq
2
University of Baghdad, College of Management and Economics, Department Of Statistics, Iraq
AUTHOR
ORIGINAL_ARTICLE
Performance analysis of local binary pattern and k-nearest neighbor on image classification of fingers leaves
The K-Nearest Neighbor (KNN) method is often used by researchers for the classification process because it has a relatively great level of accuracy, however it also has a weakness which is sensitive of the noises. This research is aims to introduce an object recognition (identification) system of fingers leaves by classified using the KNN method. To resolves the weaknesses of the KNN method, the researcher has used the Local Binary Pattern (LBP) method to extract features of the leaves. For the comparison in feature extraction, the researcher has used the Gray Level Co-Occurrence Matrix (GLCM) method. The data that were used on this research are papaya leaves and chaya leaves (with the labels such as good and damage forms). In this research, an experimental design has been carried out that was differentiated by according to the comparison (of ratio) between training data and testing data (NI/Np), there were 90 training data and 45 testing data, where the feature extraction method used the 10 of features. Experimentally, it was shown that by using the ratio NI/Np = 67\%:33\%, the performance or system performance for classifying the images of fingers leaves by using the LBP extraction method showed that training data was obtained the results close to 95% and testing data was obtained the results close to 76%, while by using the GLCM extraction showed that training data was obtained the results close to 83\% and testing data was obtained the results close to 58\%.
https://ijnaa.semnan.ac.ir/article_5785_a22fcb5568e49353230ed8cc7d0230f8.pdf
2022-01-01
1701
1708
10.22075/ijnaa.2022.5785
K-Nearest Neighbor Method
Local Binary Pattern Method
Gray Level
Co-Occurrence Matrix Method
Image Classification
A.
Ningtyas
1
Program Study of Computer Sciences, Faculty Computer Sciences and Information Technology, Universitas Sumatera Utara, Medan, Indonesia
AUTHOR
E.
Nababan
ernabrn@usu.ac.id
2
Program Study of Computer Sciences, Faculty Computer Sciences and Information Technology, Universitas Sumatera Utara, Medan, Indonesia
LEAD_AUTHOR
S.
Efendi
3
Program Study of Computer Sciences, Faculty Computer Sciences and Information Technology, Universitas Sumatera Utara, Medan, Indonesia
AUTHOR
ORIGINAL_ARTICLE
Search method for solving multicriteria scheduling problem
Our research includes studying the case $ 1 // F(\sum U_i ,\sum Ti ,T_{max})$ minimized the cost of a three-criteria objective function on a single machine for scheduling n jobs. and divided this into several partial problems and found simple algorithms to find the solutions to these partial problems and compare them with the optimal solutions. This research focused on one of these partial problems to find minimize a function of sum cost of $ (\sum U_i) $ sum number of late job and $ (\sum Ti) $ sum Tardiness and $ (T_{max} ) $ the Maximum Tardiness for n job on the single machine, which is NP-hard problem, first found optimal solutions for it by two methods of Complete Enumeration technique(CEM) and Branch and Bounded ((BAB)). Then use some Local search methods(Descent technique(DM), Simulated Annealing (SA) and Genetic Algorithm (GA)), Develop algorithm called ((A)) to find a solution close to the optimal solution. Finally, compare these methods with each other.
https://ijnaa.semnan.ac.ir/article_5786_eb6d7a226a216c6aca8eb39c41fad3e9.pdf
2022-01-01
1709
1720
10.22075/ijnaa.2022.5786
Descent Method(DM)
Genetic Algorithm(GA)
Maximum tardiness
multi-objective optimization
Simulated annealing ((SA))
Total Number of Late job
Total Tardiness
Doha
Adel Abbas
doha.a.a@uomustansiriyah.edu.iq
1
Department of Mathematics, College of Science, University of Al-Mustansiriyah, Bagdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
On the exact solutions and conservation laws of a generalized (1+2)-dimensional Jaulent-Miodek equation with a power law nonlinearity
In this paper, a generalized (1+2)-dimensional Jaulent-Miodek equation with a power law nonlinearity is examined, which arises in numerous problems in nonlinear science. The computed conservation laws reside in enormously crucial areas both at the foundations of nonlinear science such as biology, physics and other related areas. Exact solutions are acquired using the Lie symmetry method. In addition to exact solutions, we also present conservation laws. The arbitrary functions in the multipliers lead to infinitely many conservation laws.
https://ijnaa.semnan.ac.ir/article_5787_52f1cc12836ea37ee41722f60bf06c85.pdf
2022-01-01
1721
1735
10.22075/ijnaa.2020.20589.2175
A generalized (1+2)-dimensional Jaulent-Miodek equation with a power law nonlinearity
Lie symmetry method
Conservation laws
Sivenathi
Mbusi
siveoscar@gmail.com
1
Department of Mathematical Sciences\ North-West University \Private Bag X 2046, Mmabatho 2735\ Republic of South Africa
AUTHOR
Ben
Muatjetjeja
ben.muatjetjeja@mopipi.ub.bw
2
Department of Mathematical Sciences, North-West University Private Bag X 2046 Mmabatho 2735, Republic of South Africa
AUTHOR
A. R.
Adem
ademar@unisa.ac.za
3
Department of Mathematical Sciences, University of South Africa, UNISA 0003, Republic of South Africa
LEAD_AUTHOR
ORIGINAL_ARTICLE
Generalized Euler and Runge-Kutta methods for solving classes of fractional ordinary differential equations
A third-order fractional ordinary differential equation (FrODE) is very important in the mathematical modelling of physical problems. Generally, the third-order ODE is solved by converting the differential equation to a system of first-order ODEs. However, it is a lot more efficient in terms of accuracy, a number of function evaluations as well as computational time if the problem can be solved directly using numerical methods. In this paper, we are focused on the derivation of the direct numerical methods which are one, two and three-stage methods for solving third-order FrODEs. The RKD methods with two- and three stages for solving third-order ODEs are adapted for solving special third-order FrDEs. Numerical examples have been evaluated to show the effectiveness of the new methods compared with the analytical method. Numerical experiments are carried out to verify the accuracy and efficiency of the proposed methods. Applications of proposed methods are also presented which yield impressive results for the proposed and modified methods. The numerical solutions of the test problems using proposed methods agree well with the analytical solutions. From the numerical results obtained using proposed methods, we can conclude that the proposed methods in which derived or modified in this paper are very efficient.
https://ijnaa.semnan.ac.ir/article_5788_c7a15096c507883f62c71a46700b3d06.pdf
2022-01-01
1737
1745
10.22075/ijnaa.2022.5788
RK
RKD
RKM
Ordinary
Third-order
DEs
ODEs
PDEs
FrDEs
Mohammed
Mechee
mohammeds.abed@uokufa.edu.iq
1
Information Technology Research and Development Center (ITRDC), University of Kufa, Najaf, Iraq
LEAD_AUTHOR
Sameeah
H. Aidi
sameeahaidi9@gmail.com
2
Department of Mathematics, Faculty of Education - Ibn Haithem, Baghdad University, Iraq
AUTHOR
ORIGINAL_ARTICLE
Demming regressive multiobjective dragonfly optimized controller placement in SDN environment
Wireless networks are of high significance in current telecommunication systems, and in order to improve these systems, Software-Defined Networks (SDN)is used to centrally monitor and control the whole network with the help of a controller. The design of an SDN-based network is needed to identify the optimal amount of controllers for improving the performance of the network. The controller placement problem is determined on propagation latency but it failed to consider the load balancing, fault tolerance, bandwidth consumption and data transmission rate. Plan to develop a novel technique called Demming Regressive Multiobjective Dragonfly Optimized Controller Placement (DRMDOCP) for an optimal number of controller placement for enhancing network performance during different topologies. By applying DRMDOCP, the optimum number of controllers are selected and placed into the network to improve the overall network's performance. Therefore, a delay minimization-based controller placement strategy is extremely preferred. The simulation of the DRMDOCP technique and existing methods is conducted using a network topology dataset and different performance metrics. The simulation results demonstrate that the DRMDOCP increases the packet delivery, throughput and reduces the average latency, packet drop when compared to the state-of-the-art method.
https://ijnaa.semnan.ac.ir/article_5789_ec2f6a568dc175ad2a623472a7b6313d.pdf
2022-01-01
1747
1761
10.22075/ijnaa.2022.5789
Control placement Problem
Dragonfly Optimization
SDN
J.
Hemagowri
hemagowri.j@gmail.com
1
Department of Computer Science, Karpagam Academy of Higher Education, Coimbatore, India
LEAD_AUTHOR
P
Selvan
tmselvanin@gmail.com
2
Department of Computer Science, Karpagam Academy of Higher Education, Coimbatore, India
AUTHOR
ORIGINAL_ARTICLE
Some separation axioms On \(\Gamma\)-algebra
In this paper, we define and study some separation axioms on \(\Gamma\)-algebra space (gamma algebra space). The relationships between various separation axioms in \(\Gamma\)-algebra space are proved. In addition, the measurable function between two measurable spaces is introduced and some results are discussed.
https://ijnaa.semnan.ac.ir/article_5795_72a7f39dce1dfedb8cce71758e12bde1.pdf
2022-01-01
1763
1768
10.22075/ijnaa.2022.5795
algebra
( sigma)--field
(sigma)--algebra
(Gamma)-algebra
measurable function
Mohaimen
Abbood
mohaimen.m.abbood35502@st.tu.edu.iq
1
Ministry of Education, General Directorate of Education in Diyala, Iraq
LEAD_AUTHOR
Ali Al-Fayadh
Ali Al-Fayadh
aalfayadh@yahoo.com
2
Department of Mathematics and Computer Applications, College of Science, Al-Nahraini University, Baghdad, Iraq
AUTHOR
Saba
Al-Khafaji
saba.nazar@alzaraa.edu.iq
3
Department of Mathematics, College of Education, Al-Zahraa University for Women, Karbala, Iraq
AUTHOR
ORIGINAL_ARTICLE
Relation theoretic results via simulation function with applications
We introduce \'{C}iri\'{c} type $ \mathcal{Z}_\mathcal{R} $-contraction to investigate the existence of single fixed point under a binary relation. In the sequel we demonstrate that variety of contractions are obtained as consequences of our contraction. Also we provide illustrative examples to demonstrate the significance of \'{C}iri\'{c} type $ \mathcal{Z}_\mathcal{R} $-contraction in the existence of fixed point for discontinuous map via binary relation. The paper is concluded by applications to solve an integral equation and a nonlinear matrix equation.
https://ijnaa.semnan.ac.ir/article_5796_b907e0b1caa5312f4cdf521de427f581.pdf
2022-01-01
1769
1783
10.22075/ijnaa.2021.21036.2224
Binary relation
transitive relation
'{C}iri'{c} type $ mathcal{Z}_mathcal{R} $-contraction
$ mathcal{R} $-continuity
Swati
Antal
antalswati11@gmail.com
1
Department of Mathematics H. N. B. Garhwal University, BGR Campus Pauri Garhwal-246001 Uttarakhand, India
LEAD_AUTHOR
Anita
Tomar
anitatmr@yahoo.com
2
Goverment Degree College Thatyur (Tehri Garhwal) Uttarakhand, India
AUTHOR
U.C.
Gairola
ucgairola@rediffmail.com
3
Department of Mathematics, H.N.B. Garhwal university, Pauri Campus, Uttarakhand
AUTHOR
ORIGINAL_ARTICLE
The bifurcation analysis of an eco-toxicant model with anti-predator behavior
In this study, the mathematical model of four differential equations for organisms that describe the effect of anti-predation behavior, age stage and toxicity have been analyzed. Local bifurcation and Hopf bifurcation have been studied by changing a parameter of a model to study the dynamic behavior determined by bifurcation curves and the occurrence states of bifurcation saddle node, transcritical and pitch fork bifurcation. The potential equilibrium point at which Hopf bifurcation occurs has been determined and the results of the bifurcation behavior analysis have been fully presented using numerical simulation.
https://ijnaa.semnan.ac.ir/article_5798_6c7d14c6d682a38429fd83a78b36f065.pdf
2022-01-01
1785
1801
10.22075/ijnaa.2022.5798
Prey-predator
Local Bifurcation
Global bifurcation
Hopf Bifurcation
Huda
Kareem
huda.kareem1203@sc.uobaghdad.edu.iq
1
Department of Mathematics, College of Science, University of Baghdad, Baghdad, Iraq
LEAD_AUTHOR
Azhar
Majeed
azhar.majeed@sc.uobaghdad.edu.iq
2
Department of mathematics, College of Science, University of Baghdad, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Industry 4.0 technologies assessment: An integrated reverse supply chain model with the whale optimization algorithm
In recent years, integrated reverse supply chain practices have been adopted by companies that desire to reduce the negative environmental and social impacts within their supply chains. models and solutions assisted by industry 4.0 technologies have been developed to transform products in the end of their life cycle into new products with different use. There are several methods with different technologies to recycle the wastes, which have been selected and weighted based on the indicators of the industry 4.0 revolution and the wastes sent to recycling centers based on the technology weight. The understudy model is multi-objective, including minimizing transportation costs and environmental effects and maximizing customer response demand. The whale optimization algorithm and the NSGA-II algorithm were also used to solve this model. The results obtained from whale optimization and genetic algorithms have been comprised of each other through comparative indicators of quality, dispersion, uniformity, and solving time. The results showed that the whale algorithm has a higher ability to explore and extract possible points and achieve optimal solutions in all cases. The NSGA-II algorithm was also superior to the whale algorithm in terms of uniformity and solving time. The investigation of changes in solving time with increasing problem size was another confirmation of the NP-hard nature of the understudied problem.
https://ijnaa.semnan.ac.ir/article_5800_39fc7a54ed3941bd7c5cf6cf1813debf.pdf
2022-01-01
1803
1825
10.22075/ijnaa.2021.25194.2943
Reverse supply chain
Industry 4.0 revolution
whale optimization algorithm
technologies assessment
Sharareh
Mohajeri
mohajerisharareh@gmail.com
1
Department of Industrial Engineering, Nour Branch, Islamic Azad University, Nour, Iran
AUTHOR
Fatemeh
Harsej
f_harsej@iaunour.ac.ir
2
Department of Industrial Engineering, Nour Branch, Islamic Azad University, Nour, Iran
LEAD_AUTHOR
Mahboubeh
Sadeghpour
sadeghpoor.ma@gmail.com
3
Department of Industrial Engineering, Qaemshahr Branch, Islamic Azad University, Qaemshahr, Iran
AUTHOR
Jahanfar
khaleghi nia
j.khaleghinia@gmail.com
4
Department of Mechanical Engineering, Nour Branch, Islamic Azad University, Nour, Iran
AUTHOR
ORIGINAL_ARTICLE
Implementing the EBDI model in an E-health system
Health-care systems (patient monitoring and diagnosis systems) have recently attracted the interest of researchers. Intelligent software has been used as an agent in this field where research addresses the areas of electronic health (E-health) to develop and improve health care systems and to reduce the effort and time on health users (physicians, nurses) and to follow up on the condition of patients, especially the elderly, and also Intelligent software agents are using a result when most hospitals are out of capacity. The major goal of this study is to learn how we may use intelligent software for E-Health to assist physicians, nurses, and other health practitioners in collecting and tracking patient data on a daily basis in order to enhance treatment decisions. How can we achieve this in real-time in a dynamic and non-deterministic environment? As a result, we have built a model-based system such as the Extensible Beliefs Desires and Intentions (EBDI) model as architecture for located autonomic software agents in run-time under dynamic and non-deterministic environments circumstances in this study. We have formalized the EBDI agent in E-Health as an online observer to monitor the state of a patient linked to sensors (thermometer, glucose meter, oxygen meter, etc.). This agent filters the data (sensor readings) and determines which readings are normal or abnormal before sending the patient's information to the administrative agent, which is a different type of EBDI agent. In addition, the system proposes a treatment plan based on the sensor readings and necessitates the participation of a human doctor in emergency situations. This study proposes developing a monitoring system to follow up (monitor) the health status of patients based on a multi-agent-system (MAS) with the Clustering process (using the K-mean Algorithm), where the system is designed to support warnings and alerts in abnormal health conditions and to call for a doctor's intervention in emergencies (when it is necessary).
https://ijnaa.semnan.ac.ir/article_5801_c181c228cdf2bf4ca3d4b40462c30bb5.pdf
2022-01-01
1827
1839
10.22075/ijnaa.2022.5801
Situated Agent
Electronic-Health (E-health)
(EBDI)
K-mean algorithm
multi-agent-system (MAS)
Abir
Jabber
com.post01@qu.edu.iq
1
Department of Computer Science, University of Al-Qadisiyah, Al-Qadisiyah, Iraq
LEAD_AUTHOR
Ali
Obied
ali.obied@qu.edu.iq
2
Computer Science Department, College of Computer Science and Information Technology, University of Al-Qadisiyah, Iraq
AUTHOR
ORIGINAL_ARTICLE
A split common fixed point and null point problem for Lipschitzian $J-$quasi pseudocontractive mappings in Banach spaces
A split common fixed point and null point problem (SCFPNPP) which includes the split common fixed point problem, the split common null point problem and other problems related to the fixed point problem and the null point problem is studied. We introduce a Halpern--Ishikawa type algorithm for studying the split common fixed point and null point problem for Lipschitzian $J-$quasi pseudocontractive operators and maximal monotone operators in real Banach spaces. Moreover, we establish a strong convergence results under some suitable conditions and reduce our main result to the above-mentioned problems. Finally, we applied the study to split feasibility problem (FEP), split equilibrium problem (SEP), split variational inequality problem (SVIP) and split optimization problem (SOP).
https://ijnaa.semnan.ac.ir/article_5814_e5d903510c46e5fcc768903dd50a05ad.pdf
2022-01-01
1827
1853
10.22075/ijnaa.2021.23332.2521
Split common fixed point problem
split common null point problem
$J-$quasi pseudocontractive operators
Maximal monotone operators
Halpern--Ishikawa type algorithm
Uko
Jim
ukojim@uniuyo.edu.ng
1
Department of Mathematics, University of Uyo, P. M. B. 1017, Uyo, Nigeria
LEAD_AUTHOR
Donatus
Igbokwe
igbokwedi@yahoo.com
2
Department of Mathematics, University of Uyo, P. M. B. 1017, Uyo, Nigeria
AUTHOR
ORIGINAL_ARTICLE
Using the wavelet analysis to estimate the nonparametric regression model in the presence of associated errors
The wavelet shrink estimator is an attractive technique when estimating the nonparametric regression functions, but it is very sensitive in the case of a correlation in errors. In this research, a polynomial model of low degree was used for the purpose of addressing the boundary problem in the wavelet reduction in addition to using flexible threshold values in the case of Correlation in errors as it deals with those transactions at each level separately, unlike the comprehensive threshold values that deal with all levels simultaneously, as (Visushrink) methods, (False Discovery Rate) method, (Improvement Thresholding) and (Sureshrink method), as the study was conducted on real monthly data represented in the rates of theft crimes for juveniles in Iraq, specifically the Baghdad governorate, and the risk ratios about those crimes for the years 2008-2018, with a sample size of (128) (Sureshrink) The study also showed an increase in the rate of theft crimes for juveniles in recent years.
https://ijnaa.semnan.ac.ir/article_5816_d7f014815c911fee2c89ff74e54142b1.pdf
2022-01-01
1855
1862
10.22075/ijnaa.2022.5816
Mohmmed Salh
AbduAlkareem Mahdi
mohmmed.salh1201@coadec.uobaghdad.edu.iq
1
Ministry of Interior, Directorate of Human Recourses, Iraq
LEAD_AUTHOR
Saad
Hamza
saad.hamza@coadec.uobaghdad.edu.iq
2
Department of Statistics, College of Administration and Economics University of Baghdad, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
Numerical and experimental performance evaluation of upgraded knee braces under cyclic load
In this paper, the seismic performance of the structure is analyzed by introducing a new angular knee element. Cyclic loads are applied to determine the seismic performance. The result is compared with a vertical knee element. The angular knee element showed better seismic performance as compared to the vertical knee element. The new short knee element studied in two positions including 1- a vertical knee element perpendicular to cross-brace is called VSKE 2- An angular knee element that is called ASKE. Using reduced knee section specimens for better performance. Effect of Angular knee element in knee-braced frames (KBFs) under Cyclic Loading was investigated by testing using a half scale specimen mounted on a reaction frame at two positions including horizontally for VSKE and inclined for ASKE. For experimental tests, specimens were loaded by using a hydraulic actuator. Finite element modelling was used for the simulation of detailed behavior using a verified experiment base model. It has been shown that the performance of knee element fuses can improve the ductile behavior of knee braced frames. Based on the results of vertical and angular cases, it has been shown that an increase of angle between main cross brace and short knee element (incline specimen) can reduce maximum equivalent plastic strain (EPEQ) in the web of knee element fuse.
https://ijnaa.semnan.ac.ir/article_5817_3aad633e34cc9b9167698936b36ac442.pdf
2022-01-01
1863
1872
10.22075/ijnaa.2021.24890.2845
Knee element
Fuse
Cyclic-Loading
Plastic Deformation
Brace
Numerical modelling
Iraj
Gholami Alam
ronaldhernandezvasquez.edu.pe@gmail.com
1
Department of Civil Engineering, Faculty of Engineering, Roudehen Branch, Islamic Azad University, Roudehen, Iran.
AUTHOR
M
Safi
m_safi@sbu.ac.ir
2
Department of Civil Engineering, Faculty of Water and Environmental Engineering, Shahid Beheshti University, Tehran, Iran. (Corresponding author
LEAD_AUTHOR
E
Darvishan
e.darvishan@gmail.com
3
Department of Civil Engineering, Faculty of Engineering, Roudehen Branch, Islamic Azad University, Roudehen, Iran.
AUTHOR
ORIGINAL_ARTICLE
Estimation of parameter for the Pareto distribution based on right censoring
In this paper, we found the estimation of the unknown parameter $\delta$ when $\vartheta$ is a known parameter in the Pareto distribution. First, we get the maximum probability estimators(MLEs) for unknown parameters. We have obtained the Bayes Estimators of unknown parameter $\delta$ using Lindley's approximation. A Monte Carlo simulation is performed and used a programming language R to compare the performance of the method used, and the data set was analyzed for illustration purposes.
https://ijnaa.semnan.ac.ir/article_5819_51212bef80dd11831cc0a50f8eae272c.pdf
2022-01-01
1873
1877
10.22075/ijnaa.2022.5819
Estimation Pareto distribution
right censoring
Rana
Hasan Shamkhi
rana.jbr.sci@uobasrah.edu.iq
1
Department of pharmacognosy and medicinal plants, University of Basrah, Iraq
LEAD_AUTHOR
Wisam
Ghafil
wisam.kamil@utq.edu.iq
2
Department of Mathematics, College of Education for Pure Sciences, University of Thi-Qar, Thi-Qar, Iraq
AUTHOR
Aseel
Ali Jaaze
aseel.jaaze@uobasrah.edu.iq
3
Department of pharmacognosy and medicinal plants, University of Basrah, Iraq
AUTHOR
ORIGINAL_ARTICLE
A survey of $\mathcal{C}-$class and pair upper-class functions in fixed point theory
We demonstrate that the $\mathcal{C}-$class functions, pair $(h,f)$ upper-class functions, cone $\mathcal{C}-$class functions, $1-1-$ up-class functions, multiplicative $\mathcal{C}-$class functions, inverse$-\mathcal{C}-$class functions, $\mathcal{C}_{F}-$simulation functions, $\mathcal{C}^{*}-$class functions are powerful and fascinating weapons for the generalization, improvement, and extension of considerable conclusions obtained in the fixed point theory. Towards the end, we point out some open problems whose answers could be interesting.
https://ijnaa.semnan.ac.ir/article_5820_c41ac028d8cb4fbaa3fce2aaf9d62530.pdf
2022-01-01
1879
1896
10.22075/ijnaa.2021.21162.2239
C−class
pair upper class
up-class
multiplicative C−class
inverse−C−class
Arslan
Hojat Ansari
analsisamirmath2@gmail.com
1
Department of Mathematics, Karaj Branch, Islamic Azad University, Karaj, Iran
AUTHOR
Anita
Tomar
anitatmr@yahoo.com
2
Government Degree College Thatyur (Tehri Garhwal) Uttarakhand, India
LEAD_AUTHOR
Meena
Joshi
joshimeena35@gmail.com
3
S. G. R. R. (P. G.) College Dehradun, India
AUTHOR
ORIGINAL_ARTICLE
An evolutionary game competitive model for increasing accuracy and maximizing influence in social networks
Given the importance of maximizing influence in a social network, studies in this field often seek to find the nodes that have the most influence on the social network if designated as primary seeds. In this study, to reduce the complexity of computation algorithms, the problem is divided into several groups that aim to find a group of influential people among users of a social network. In this paper, a framework is introduced for solving the problem of influence maximization, which is based on the member clustering by the K means method, to improve the classification of network users, the data are weighted and the problem is modeled and analyzed as an evolutionary game. Finally, calculate its evolutionary stable strategy. This framework has been tested on real social network data for Abrar University students and we have achieved results such as increasing classification accuracy, reducing error function and finding a stable strategy in the community.
https://ijnaa.semnan.ac.ir/article_5821_70051c9f1256aea8beb6af4b71cf2579.pdf
2022-01-01
1897
1907
10.22075/ijnaa.2021.22669.2398
Social network
Influence maximization
Distinction factor
K-means clustering
Evolutionary stable strategy
Saeedeh
Noori
saeedehnoori00@gmail.com
1
Department of Mathematics and Computer Science, Shahed University, Tehran, Iran
AUTHOR
Hamidreza
Navidi
navidi@shahed.ac.ir
2
Department of Mathematics and Computer Science, Shahed University, Tehran, Iran
LEAD_AUTHOR
Reza
Bakhtiari
reza.bakhtiari@shahed.ac.ir
3
Department of Computer Science, Shahed University, Tehran, Iran
AUTHOR
ORIGINAL_ARTICLE
Counting of Conjugacy classes in partial transformation semigroup.
J.Koneiczny in [8] introduced the new notion $\sim_{n}$ notion of conjugacy in semigroups. In this paper, we count the number of conjugacy classes in Partial Transformation semigroup $\mathcal{P}(A)$ for an infinite set $A$ with respect to $\sim_{n}$ notion of conjugacy.
https://ijnaa.semnan.ac.ir/article_5822_0055122cef05f1831577e0dbc80f4059.pdf
2022-01-01
1909
1915
10.22075/ijnaa.2021.24082.2666
Conjugacy
Diagraph
Double Ray
Cycle set
Chain
Aftab
Shah
aftab@cukashmir.ac.in
1
Department of Mathematics, Central University of Kashmir, Ganderbal-191201, India
AUTHOR
Mohd
Parray
parrayrafiq@cukashmir.com
2
Department of Mathematics, Central University of Kashmir, Ganderbal-191201, India
AUTHOR
Dilawar
Mir
mirjunaid@cukashmir.ac.in
3
Department of Mathematics, Central University of Kashmir, Ganderbal-191201, India
LEAD_AUTHOR
ORIGINAL_ARTICLE
Optimal values range of interval polynomial programming problems
Uncertainty exists in many real-life engineering and mechanical problems. Here, we assume that uncertainties are caused by intervals of real numbers. In this paper, we consider the interval nonlinear programming (INLP) problems where the objective function and constraints include interval coefficients. So that the variables are deterministic and sign-restricted. Additionally, the constraints are considered in the form of inequalities. A basic task in INLP is calculating the optimal values range of objective function, which may be computationally very expensive. However, if the boundary functions are available, the problems become much easier to solve. By making these assumptions, an efficient method is proposed to compute the optimal values range using two classic nonlinear problems. Then, the optimal values range are obtained by direct inspection for a special kind of interval polynomial programming (IPP) problems. Two numerical examples are given to verify the effectiveness of the proposed method.
https://ijnaa.semnan.ac.ir/article_5828_2d20744fb4e0ae06228d552414547260.pdf
2022-01-01
1917
1929
10.22075/ijnaa.2021.23797.2611
Interval uncertainty
Interval nonlinear programming
Optimal values range
Interval polynomial
Boundary functions
Somayeh
Amirmahmoodi
amirmahmoodis@yahoo.com
1
Mathematics Faculty, University of Sistan and Baluchestan, Zahedan, Iran
AUTHOR
Hassan
Mishmast Nehi
hmnehi@hamoon.usb.ac.ir
2
Mathematics Faculty, University of Sistan and Baluchestan, Zahedan, Iran
LEAD_AUTHOR
Mehdi
Allahdadi
m_allahdadi@math.usb.ac.ir
3
Mathematics Faculty, University of Sistan and Baluchestan, Zahedan, Iran
AUTHOR
ORIGINAL_ARTICLE
Analysis of generic science skills in prospective biology teacher students
The learning process of blood coagulation practicum for circulatory system material in Biology Education students aims to determine the ability of generic science skills. Descriptive method used in this study with research subjects consisted of 58 6th semester students. Data were obtained using essay tests. Achievement of generic science skills in students is focused on five aspects of generic science skills with research results that show, direct observation 98.83% (very good), symbolic language 38.79% (very poor), modeling 90.95% (very good), logical inference 39.51 % (very little), logic framework 94.90% (very very), with an overall average yield (75.6%) in the medium category. this generic science ability is still needed intensive guidance to increase shn for prospective teacher students biology.
https://ijnaa.semnan.ac.ir/article_5834_d41d8cd98f00b204e9800998ecf8427e.pdf
2022-01-01
1931
1935
10.22075/ijnaa.2022.5834
Generic Science Skills
Blood Coagulation, Candidate Teacher
Rinandita
Wikansari
1
International Trade for ASEAN and China Region, Politeknik APP Jakarta, Indonesia.
AUTHOR
Suhardi
Napid
2
Department of Mechanical Engineering, Faculty of Engineering Universitas Islam Sumatera Utara, Indonesia.
AUTHOR
J.
Junaidi
3
Department of Mechanical Engineering, Faculty of Engineering Universitas Islam Sumatera Utara, Indonesia.
AUTHOR
Wahyu
Andryanto
4
UPN Veteran Jakarta , Jakarta, Indonesia.
AUTHOR
S.
Susilo
susilo@uhamka.ac.id
5
Department of Biology Education, Universitas Muhammadiyah Prof. Dr. Hamka, Jakarta Timur, Indonesia.
LEAD_AUTHOR
ORIGINAL_ARTICLE
A research level of efficiency treatment of Covid-19 using data envelopment analysis
Coronavirus Disease 2019 (Covid-19) is a collection of viruses that can infect the respiratory system. This virus only causes mild respiratory infections, such as the flu. The process of handling Corona infection patients is indeed much different from other disease patients. Covid-19 can cause various symptoms in its sufferer. These symptoms depend on the type of corona virus that attacks, and how serious the infection is. The design of this application uses DFD and ERD modeling which is built using the web-based PHP programming language and uses a MySQL database. The assessment of the efficiency level of COVID-19 was carried out in one of the provinces in Indonesia, namely in the province of Aceh, using samples from 12 existing hospitals. All the hospitals that we have taken data every day will continue to increase and decrease. This application is built using the Data Envelopment Analysis (DEA) method, where the search process is determined by the lindo software. The input criteria in this application are suspected patients, probable patients, confirmed patients, and patients being treated. While the output of this application is the patient recovers, and the patient dies. All the data we get is real data that we get directly from the hospital and the results are confirmed via the Internet. All calculation processes use predetermined formulas. The computational result obtained from the DEA CCR Model on the 8 DMUs is 1, it is the gain from dividing the output variable by the input variable, then the results obtained from 8 DMUs are efficient and 4 DMUs are inefficient.
https://ijnaa.semnan.ac.ir/article_5835_28b88b77c841507b2947531a65760430.pdf
2022-01-01
1937
1947
10.22075/ijnaa.2022.5835
Data Envelopment Analysis
Efficiency
COVID-19
Hospital
Dahlan
Abdullah
dahlan@unimal.ac.id
1
Department of Informatics, Universitas Malikussaleh, Aceh, Indonesia.
LEAD_AUTHOR
.Anif
Farida
2
Department of Agriculture, Universitas Muhammadiyah Sorong, Indonesia.
AUTHOR
Sri
Pudjiastuti
3
STKIP Arrahmaniyah Depok, Jawa Barat, Indonesia
AUTHOR
Eka
Harimurti
4
Department of English Language Education, STKIP Kusuma Negara, Indonesia.
AUTHOR
A.
Arifudin
5
Department of Electrical Engineering, Universitas 17 Agustus 1945 Cirebon, Indonesia.
AUTHOR
ORIGINAL_ARTICLE
Palm leaf nutrient deficiency detection using convolutional neural network (CNN)
Palm oil, scientifically known as Elaeis guineensis, is a rapidly growing commercial sector in Southeast Asia with a diverse economic composition. Palm oil plantations are crucial in economic activities and growth, as they generate employment in managing the palm oil quality. However, the lack of nutrients can affect the growth and quality of the crops. The manual detection of palm leaf nutrient deficiency can be one of the challenges as the visual symptoms of the deficiency demonstrate a similar representation. Thus, in this study, the palm leaf nutrient deficiency detection using Convolutional Neural Network (CNN) is proposed. CNN or ConvNet is a branch of deep neural networks in Deep Learning that is commonly used in analysing images and has proven to produce better feature extraction from dataset. A total of 350 images of healthy leaf and six types of palm leaf nutrient deficiency are Nitrogen, Potassium, Magnesium, Boron, Zinc, and Manganese were tested. The application of CNN to a variety of testing datasets returned good detection accuracy at 94.29\%. It can be deduced that the proposed implementation of CNN for palm leaf nutrient deficiency detection is found to be successful. Nonetheless, the number of datasets could be increased in the future to improve the detection performance.
https://ijnaa.semnan.ac.ir/article_5836_e8ce53bcee87db1e6ec2541025ca09de.pdf
2022-01-01
1949
1956
10.22075/ijnaa.2022.5836
Palm leaf
Nutrient deficiency
Detection
Convolutional Neural Network (CNN)
Shafaf
Ibrahim
shafaf2429@uitm.edu.my
1
Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Cawangan Melaka (Kampus Jasin), 77300 Merlimau, Melaka, Malaysia
LEAD_AUTHOR
Noraini
Hasan
norainihasan@uitm.edu.my
2
Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Cawangan Melaka (Kampus Jasin), 77300 Merlimau, Melaka, Malaysia
AUTHOR
Nurbaity
Sabri
nurbaity_sabri@uitm.edu.my
3
Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Cawangan Melaka (Kampus Jasin), 77300 Merlimau, Melaka, Malaysia
AUTHOR
Khyrina
Abu Samah
khyrina783@uitm.edu.my
4
Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Cawangan Melaka (Kampus Jasin), 77300 Merlimau, Melaka, Malaysia
AUTHOR
Muhamad
Rahimi Rusland
rahimirusland97@gmail.com
5
Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Cawangan Melaka (Kampus Jasin), 77300 Merlimau, Melaka, Malaysia
AUTHOR
ORIGINAL_ARTICLE
Convexity in G-metric spaces and approximation of fixed points by Mann iterative process
In this paper, we first define the concept of convexity in G-metric spaces. We then use Mann iterative process in this newly defined convex G-metric space to prove some convergence results for some classes of mappings. In this way, we can extend several existence results to those approximating fixed points. Our results are just new in the setting.
https://ijnaa.semnan.ac.ir/article_5837_0c7566c0774918013f7b857a6f542925.pdf
2022-01-01
1957
1964
10.22075/ijnaa.2021.21435.2259
Convex structure
Convex G-metric space
Mann iterative process
convergence
Isa
Yildirim
isayildirim@atauni.edu.tr
1
Department of Mathematics, Faculty of Science, Ataturk University, Erzurum, 25240, Turkey
LEAD_AUTHOR
Safeer
Khan
safeer@qu.edu.qa
2
Department of Mathematics, Statistics and Physics, Qatar University, Doha 2713, Qatar
AUTHOR
ORIGINAL_ARTICLE
Selection of green suppliers with the approach of integrating economic, environmental and social decisions (Case study of Sazeh Gostar Saipa Photovoltaic Company)
Supply chain network design is one of the key issues in strategic chain planning that refers to the supply chain network configuration and as an infrastructure issue in its management, will have lasting effects on other tactical and operational decisions. In other words, the proper design of the supply chain network leads to the achievement of an optimal structure, which makes effective and competitive supply chain management possible. In this study, a problem of selecting a green supplier in terms of sustainability, under uncertainty based on three economic, environmental and social responsibility dimensions are studied by a case study of Sazeh Gostar Saipa Photovoltaic Company active in the pv industry. One of the environmental dimensions of the problem is the design of an efficient and flexible model for evaluating and selecting suppliers based on environmental indicators. One of the features of the proposed model is the use of environmental criteria in the process of selecting a green supplier and also the flexibility of the model in the number of sub-criteria. In this research, the theory of Rough sets has been used to find the weight of sub-environmental criteria. The obtained results confirm the efficiency of the multi-objective mathematical planning model in this research in evaluating suppliers and also using the theory of Rough sets to weight environmental indicators to achieve the above objectives.
https://ijnaa.semnan.ac.ir/article_5838_f7cc86b305be0fb84d81d68cb1210940.pdf
2022-01-01
1965
1975
10.22075/ijnaa.2021.25153.2930
there objective green supply chain network
Uncertainty
Environment
Social responsibility
PV industry
Bahman
Cimyari
bahman13455@yahoo.com
1
Department of Industrial Engineering, Yazd University, Yazd, Iran
AUTHOR
Mohammad Ali
Vahdat
drmohammadalivahdat@gmail.com
2
Department of Industrial Engineering, Yazd University, Yazd, Iran
LEAD_AUTHOR
Ahmad
Sadeghieh
sadegheih@yazd.ac.ir
3
Department of Industrial Engineering, Yazd University, Yazd, Iran
AUTHOR
Yahya
Zare Mehrjerdi
yzare@yazd.ac.ir
4
Department of Industrial Engineering, Yazd University, Yazd, Iran
AUTHOR
ORIGINAL_ARTICLE
Fish diseases detection using convolutional neural network (CNN)
The fishing industry has become an important income source in the world. However, fish diseases are considered a serious problem among the fishermen as it tends to spread quickly through the water. In decades, fish diseases have been diagnosed manually by the naked eyes of experienced fish farmers. Despite being time-consuming since some lab works are required in determining the relevant microorganisms that cause the diseases, this classical method most often leads to an inaccurate and misleading result. Accordingly, a fast and inexpensive method is therefore important and desirable. Convolutional Neural Network (CNN) performance has recently been demonstrated in a variety of computer vision and machine learning problems. Thus, a study on fish diseases detection using CNN is proposed. A total of 90 images of healthy leaf and two types of fish diseases which are White spot and Red spot was tested. The application of CNN to a variety of testing datasets returned good detection accuracy at 94.44\%. It can be inferred that the CNN is relatively good in detecting and classifying the type of diseases among infected fishes. Regardless, a study with a better number of datasets could be done in the future to improve the detection performance.
https://ijnaa.semnan.ac.ir/article_5839_974f463dd2608e7e1f66880dc8a2dd41.pdf
2022-01-01
1977
1984
10.22075/ijnaa.2022.5839
Fish diseases
Detection
Classification
Convolutional Neural Network (CNN)
Noraini
Hasan
norainihasan@uitm.edu.my
1
Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Cawangan Melaka (Kampus Jasin), 77300 Merlimau, Melaka, Malaysia
LEAD_AUTHOR
Shafaf
Ibrahim
shafaf2429@uitm.edu.my
2
Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Cawangan Melaka (Kampus Jasin), 77300 Merlimau, Melaka, Malaysia
AUTHOR
Anis
Aqilah Azlan
aqilahanisazlan@gmail.com
3
Try Smart Bite Sdn Bhd, The Vertical Business Suite (A-28-07), Bangsar South, No 8, Jalan Kerinchi, 59200 Kuala Lumpur, Malaysia
AUTHOR
ORIGINAL_ARTICLE
Optimizing order picker problem using dynamic programming method
The order picking problem is one of the key elements in warehouse management. The challenge increases during the new norm when orders can be made by going to the shop and also via online that results in high uncertainty in order volume. Despite that, customer expectation remains on fast delivery which requires the selling organizations to be able to provide fast and efficient service to meet the demand from customers. In achieving this, among the contributing factors is efficient warehouse management especially in order picking, storage assignment, sufficient resource allocation, adequate manpower handling and proper tasking allocation. Thus, in this paper, a model for order picking is modified by considering the limited picking capacity of the Order Pickers (OP), the S-shaped route in the warehouse plan and the need for complete order (all demanded items are picked). The modified model is adapted as a Dynamic Programming problem with the objective of minimizing the time taken (through minimizing distance travelled) in picking each order. The results show that testing with a set of secondary data, the modified model shows a reduction of 24.19\% in travel distance compared to using Shortest Path Problem (SPP) and Traveling Salesman Problem (TSP). At the same time, the application of the modified model using the real data shows a reduction of 11.6\% in the travelled distance as well as more quality task allocation among the OPs.
https://ijnaa.semnan.ac.ir/article_5840_39dccb4161fb2efde26bef1ca4d19aa3.pdf
2022-01-01
1985
1998
10.22075/ijnaa.2022.5840
Order picking
Dynamic Programming
shortest path
warehouse routing
inner warehouse transportation
Noraimi
Azlin Mohd Nordin
noraimi@uitm.edu.my
1
Department of Mathematics, Faculty of Computer \& Mathematical Sciences, University Teknologi MARA, Cawangan Negeri Sembilan, Kampus Seremban, 70300 Seremban
AUTHOR
S. Sarifah
Radiah Shariff
shari990@uitm.edu.my
2
Malaysia Institute of Transport (MITRANS), University Teknologi MARA, 40450 Shah Alam, Malaysia
LEAD_AUTHOR
Mohd
Omar
mohd@um.edu.my
3
Institute of Mathematical Sciences, University of Malaya, 50603 Kuala Lumpur, Malaysia
AUTHOR
Siti
Suzlin Supadi
suzlin@um.edu.my
4
Institute of Mathematical Sciences, University of Malaya, 50603 Kuala Lumpur, Malaysia
AUTHOR
ORIGINAL_ARTICLE
Near fixed point, near fixed interval circle and their equivalence classes in a $b-$interval metric space
We introduce a novel distance structure called a b−interval metric space to generalize and extend metric interval space. Also, we demonstrate that the collection of open balls, which forms a basis of a b−interval metric space, generates a T0−topology on it. Further, we define topological notions like an open ball, closed ball, b−convergence, b−Cauchy sequence and completeness of the space on a b−interval metric space to create an environment for the survival of a near fixed point and a unique equivalence class of near fixed point. Towards the end, we introduce notions of interval circle, fixed interval circle, its equivalence class and established the existence of a near fixed interval circle and its equivalence interval C−class of near fixed interval circle to study the geometric properties of non-unique equivalence C−classes of nearly fixed interval circles.
https://ijnaa.semnan.ac.ir/article_5841_d8a270afaaa21e66ea29c1d0efcfcfbc.pdf
2022-01-01
1999
2014
10.22075/ijnaa.2021.21721.2291
continuity
b−convergence
Completeness
fixed interval circle
null set
T0−topology
Meena
Joshi
joshimeena35@gmail.com
1
S. G. R. R. (P. G.) College Dehradun, India
AUTHOR
Anita
Tomar
anitatmr@yahoo.com
2
Sri Dev Suman Uttarakhand Vishwavidyalay, Pt. L. M. S. Campus Rishikesh- 249201, Uttarakhand, India
LEAD_AUTHOR
ORIGINAL_ARTICLE
Effect of financial literacy and risk aversion on the relationship between self-control and financial security of individual investors in Tehran Stock Exchange
Capital markets play an important role in the economy and naturally, the proper functioning of the capital market will play a key role in ensuring economic growth. So, if capital markets are efficient, economic development will be ensured. On the other hand, since the Iranian stock market is currently very popular among investors, it is undoubtedly important to examine the behavioral biases of individual investors. Therefore, in this study, the effect of positive self-control behavioral bias on financial security was investigated with the moderating role of financial literacy and risk aversion of individual investors. For this purpose, the statistical population consisted of individual investors, traders and brokers of Tehran Stock Exchange who are directly participating in the market. Also, the statistical sample was calculated to be 421 using Cochran’s formula. A structural equation model using PLS method was used to analyze the data. The results showed that the self-control variable has a significant positive effect on risk aversion and financial security. Also, by using the financial literacy variable as a moderating variable, the intensity of the relationship between self-control and financial security of individual investors increases; that is, the financial literacy of individual stock market investors intensifies the positive relationship between self-control and security of their financial behavior. In addition, by using risk aversion as moderating variable, the intensity of the relationship between self-control and financial security of individual investors is reduced. This means that the risk aversion of individual stock market investors reduces the positive relationship between self-control and the security of their financial behavior.
https://ijnaa.semnan.ac.ir/article_5879_ab6fe447a569a138f4bdf277a6f70819.pdf
2022-01-01
2015
2024
10.22075/ijnaa.2021.24417.2738
Behavioral finance
self-control
financial security
financial literacy
risk aversion
Manizheh
Mohammadi
mohammadi_manizheh@yahoo.com
1
Department of Accounting, Aliabad Katoul Branch, Islamic Azad University, Aliabad Katoul, Iran
AUTHOR
Arash
Naderian
arashnaderian@yahoo.com
2
Department of Accounting, Aliabad Katoul Branch, Islamic Azad University, Aliabad Katoul, Iran
LEAD_AUTHOR
Majid
Ashrafi
mjd_ashrafi@yahoo.com
3
Department of Accounting, Aliabad Katoul Branch, Islamic Azad University, Aliabad Katoul, Iran
AUTHOR
Jamadori
Gorganli Doji
jgorganli@yahoo.com
4
Department of Accounting, Aliabad Katoul Branch, Islamic Azad University, Aliabad Katoul, Iran
AUTHOR
ORIGINAL_ARTICLE
Non-linear contractions via auxiliary functions and fixed point results with some consequences
In this manuscript, we bring into play the essence of a new class of auxiliary functions, $C$-class functions, and exhibited some fixed point results. Notably, in this draft, we come up with the idea of modified $\mathcal{Z}_F$-contractions and enquire the existence and uniqueness of fixed points of such operators in the framework of $\theta $-metric spaces. Concerning the interpretation of the achieved results, some non-trivial examples are also studied. From obtained theorems, we derive several related fixed point results in usual metric spaces and $\theta $-metric spaces.
https://ijnaa.semnan.ac.ir/article_5880_1959641f522318979030492d42bbcd61.pdf
2022-01-01
2025
2042
10.22075/ijnaa.2021.22017.2315
Fixed point
$C$-class function
$mathcal{Z}_{F}$-contraction
modified $mathcal{Z}_F$-contraction
Ankush
Chanda
ankushchanda8@gmail.com
1
Department of Mathematics, Vellore Institute of Technology, Vellore, India
LEAD_AUTHOR
Lakshmi
Dey
lakshmikdey@yahoo.co.in
2
Department of Mathematics, National Institute of Technology Durgapur, India
AUTHOR
Arslan
Ansari
analsisamirmath2@gmail.com
3
Department of Mathematics, Karaj Branch, Islamic Azad University, Karaj, Iran
AUTHOR
ORIGINAL_ARTICLE
A meshfree radial basis function method for nonlinear phi-four equation
Radial basis function pseudospectral method is applied to obtain the solution for nonlinear Phi-four time dependant equation with nonhomogeneous initial and boundary conditions. In this method, the efficient pseudospectral technique is combined with radial basis function to get the best of it. In the proposed method, the radial basis kernels are used to discretize the space derivatives in the Phi-four equation where as a time stepping technique is used to accord with the temporal part of the solution. The given Phi-four equation is transformed into a set of ordinary equations. An ode solver is used to solve the ordinary equations. An effective approach is used to choose the value of the shape parameter for radial basis function. Numerical results are presented to check the validity and accuracy of the method to solve the Phi-four equation.
https://ijnaa.semnan.ac.ir/article_5890_38a44de2512ccf2415b33322361b4b9a.pdf
2022-01-01
2043
2052
10.22075/ijnaa.2021.22670.2399
Meshfree
Radial basis function
nonlinear Phi-four equations
Shape parameter
Geeta
Arora
geetadma@gmail.com
1
Department of Mathematics, Lovely Professional University, Phagwara, Punjab, India
AUTHOR
Gurpreet
Bhatia
gurpreetsidakbhatia@gmail.com
2
Department of Mathematics, Lovely Professional University, Phagwara, Punjab, India
LEAD_AUTHOR
ORIGINAL_ARTICLE
A real-time forest fire and smoke detection system using deep learning
Large parts of the world's forests are threatened by fires. These fires happen continuously every month around the globe. They are very costly to society and cause serious damage to the ecosystem. This raises the necessity to build a detection system to intervene early and take action. Fire and smoke have various colours, textures, and shapes, which are challenging to detect. In the modern world, neural networks are used extensively in most fields of human activities. For the detection of fire and smoke, we suggest a deep learning technology using transfer learning to extract features of forest fire and smoke. We used a pre-trained Inception-ResNet-v2 network on the ImageNet dataset to be trained on our dataset which consists of 1,102 images for each fire and smoke class. The classification accuracy, precision, recall, F1-Score, and specificity were 99.09\%, 100\%, 98.08\%, 99.09\%, and 98.30\%, respectively. This model has been deployed on a Raspberry Pi device with a camera. For real-time detection, we used the Open CV library to read the camera stream frame by frame and predict the probability of fire or smoke.
https://ijnaa.semnan.ac.ir/article_5899_6e34555fa3ea382a0ef64588b9e608e7.pdf
2022-01-01
2053
2063
10.22075/ijnaa.2022.5899
Convolutional Neural Networks
Deep learning
object detection
smoke detection
fire detection
Transfer learning
Raghad
K. Mohammed
raghad_meme@codental.uobaghdad.edu.iq
1
Department of Basic Sciences, College of Dentistry, University of Baghdad, Baghdad, Iraq
LEAD_AUTHOR
ORIGINAL_ARTICLE
Mathematical modeling of diffusion problem
This work aims to introduce a numerical approximation procedure based on an operational matrix of block pulse functions, which is employed in solving integral-algebraic equations arising from the diffusion model. It is known that the integral-algebraic equations belong to the class of singular problems. The main advantage of this method is the reduction of these singular systems by using an operational matrix to linear lower triangular systems of algebraic equations, which is non-singular. An estimation of the error and illustrative instances are discussed to evaluate the validity and applicability of the presented method.
https://ijnaa.semnan.ac.ir/article_5901_7408dae7eacbd82a256fbad8ce460c7e.pdf
2022-01-01
2065
2073
10.22075/ijnaa.2019.18118.1989
Integral-algebraic equations
Diffusion model
Singular systems
Numerical treatment
Maryam
salemi
maryam.salemi@gmail.com
1
Department of Mathematics, Karaj Branch, Islamic Azad University, Karaj, Iran
AUTHOR
Maryam
Attary
maryam.attari@kiau.ac.ir
2
Department of Mathematics, Karaj Branch, Islamic Azad University, Karaj, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
Theoretical approaches and special cases for a single machine with release dates to minimize four criterion
We propose a multi-objective machine scheduling problem (MSP) in this study. The sum of total flow time, total tardiness, total earliness, and total late work is the topic under discussion. With an arbitrary release date, This paper offers a theoretical analysis, discussion, and proofs for a number of special instances that apply to our topic.
https://ijnaa.semnan.ac.ir/article_5904_d41d8cd98f00b204e9800998ecf8427e.pdf
2022-01-01
2075
2086
10.22075/ijnaa.2022.5904
Multi-objective problems ( MOP )
single machine release date
Omar
Daowd
omarmaysan@yahoo.com
1
Department of Mathematics, College of Sciences, Al-Mustansireah University, Baghdad, Iraq
AUTHOR
Hanan
Chachan
hanomh@uomustansiriyah.edu.iq
2
Department of Mathematics, College of Sciences, Al-Mustansireah University, Baghdad, Iraq
LEAD_AUTHOR
Hazim
Daway
hazimdo@uomustansiriyah.edu.iq
3
Department of Mathematics, College of Sciences, Al-Mustansireah University, Baghdad, Iraq
AUTHOR
ORIGINAL_ARTICLE
A general solution of some linear partial differential equations via two integral transforms
In this paper, a new analytical method is introduced to find the general solution of linear partial differential equations. In this method, each Laplace transform (LT) and Sumudu transform (ST) is used independently along with canonical coordinates. The strength of this method is that it is easy to implement and does not require initial conditions.
https://ijnaa.semnan.ac.ir/article_5905_4b393515a38c352eadeb1b822d59edb0.pdf
2022-01-01
2087
2093
10.22075/ijnaa.2022.5905
Sumudu transform
Laplace transform
Linear partial differential equations
canonical coordinates
Asmaa
Aswhad
asmaa.a.a@ihcoedu.uobaghdad.edu.iq
1
College of Education for Pure Sciences/ Ibn Al- Haithem, University of Baghdad, Baghdad, Iraq
AUTHOR
May
Helal
may.m@ihcoedu.uobaghdad.edu.iq
2
College of Education for Pure Sciences/ Ibn Al- Haithem, University of Baghdad, Baghdad, Iraq
LEAD_AUTHOR