International Journal of Nonlinear Analysis and Applications
https://ijnaa.semnan.ac.ir/
International Journal of Nonlinear Analysis and Applicationsendaily1Thu, 01 Jul 2021 00:00:00 +0430Thu, 01 Jul 2021 00:00:00 +0430Existence result of solutions for a class of nonlinear differential systems
https://ijnaa.semnan.ac.ir/article_5006.html
In this paper, we will discuss the existence of bounded positive solutions for a class of nonlinear&nbsp; differential systems. The objective will be achieved by applying some results and techniques of&nbsp; functional analysis such as Schauder's fixed point theorem and potential theory tools.About solving stochastic It\^{o}-Volterra integral equations using the spectral collocation method
https://ijnaa.semnan.ac.ir/article_5007.html
The purpose of this paper is to propose the spectral collocation method to solve&nbsp;linear and nonlinear stochastic It^o-Volterra integral equations (SVIEs). The proposed approach is different from other numerical techniques as we consider the&nbsp;Legendre Gauss type quadrature for estimating It^o integrals. The main characteristic of the presented method is that it reduces SVIEs into a system of algebraic&nbsp;equations. Thus, we can solve the problem by Newton's method. Furthermore,&nbsp; the&nbsp;convergence analysis of the approach is established. The method is computationally attractive, and to reveal the accuracy, validity, and efficiency of the proposed&nbsp;method, some numerical examples and convergence analysis are included.Mittag-Leffler-Hyers-Ulam stability of Prabhakar fractional integral equation
https://ijnaa.semnan.ac.ir/article_5008.html
In this paper, we define and investigate Mittag-Leffler-Hyers-Ulam&nbsp;and Mittag-Leffler-Hyers-Ulam-Rassias stability of Prabhakar fractional integral&nbsp;equation.Fixed point results in partially ordered partial $b_{v}(s)$-metric spaces
https://ijnaa.semnan.ac.ir/article_5010.html
In this paper, some fixed point results for generalized Geraghty type $&alpha;$-admissible contractive mappings and rational type generalized Geraghty contraction mappings are given in partially ordered partial &nbsp;$b_{v}(s)$-metric spaces. Also, a modified version of a partial &nbsp;$b_{v}(s)$-metric space is defined and a fixed point theorem is proved in this space. Finally, some examples are given related to the results.Estimate survival function of the Topp-Leone exponential distribution with application
https://ijnaa.semnan.ac.ir/article_5014.html
This is a new lifetime Exponential "distribution using the Topp-Leone generated family of distributions proposed by Rezaei et al. The new distribution is called the Topp-Leone Exponential (TLE) distribution". What is done in this paper is an estimation of the "unlabeled two parameters for Topp-Leone Exponential distribution model by using the maximum likelihood estimator method to get the derivation of the point estimators for all unlabeled parameters according to iterative techniques as Newton $-$ Raphson method, then to derive Ordinary least squares estimator method". "Applying all two methods to estimate related probability functions; death density function, cumulative distribution function, survival function and hazard function (rate function)".&nbsp;When examining the numerical results for probability survival function by employing mean squares error measure and mean absolute percentage measure, this may lead to work on the best method in modeling a set of real data.New subclasses of meromorphic bi-univalent functions by associated with subordinate
https://ijnaa.semnan.ac.ir/article_5017.html
&lrm;In the present paper&lrm;, &lrm;we define two subclasses $\Sigma(\lambda&lrm;, &lrm;\alpha&lrm;, &lrm;\beta)$&lrm;, &lrm;$\Sigma_{\mathcal C}(\alpha&lrm;, &lrm;\beta)$ of meromorphic univalent functions and subclass $\Sigma_{{\mathcal B},{\mathcal C}}(\alpha&lrm;, &lrm;\beta&lrm;, &lrm;\lambda)$ of meromorphic bi-univalent functions&lrm;. &lrm;Furthermore&lrm;, &lrm;we obtain estimates on the general coefficients $|b_n|~(n \ge1)$ for functions in the subclasses $\Sigma(\lambda&lrm;, &lrm;\alpha&lrm;, &lrm;\beta)$&lrm;, &lrm;$\Sigma_{\mathcal C}(\alpha&lrm;, &lrm;\beta)$ and estimates for the early coefficients of functions in subclass $\Sigma_{{\mathcal B},{\mathcal C}}(\alpha&lrm;, &lrm;\beta&lrm;, &lrm;\lambda)$ by associated subordination&lrm;. &lrm;The results obtained in this paper would generalize and improve those in related works of several earlier authors&lrm;.Expected mean square rate estimation of repeated measurements model
https://ijnaa.semnan.ac.ir/article_5018.html
In this paper, we obtained the estimation corresponding to the expected mean square rate of repeated measurement model depend on maximum likelihood method (MLM), restricted maximum likelihood method (REMLM) and modied restricted maximum likelihood method (MREMLM), and got eight&nbsp; cases that were classified into three types.On the Cauchy dual and complex symmetric of composition operators
https://ijnaa.semnan.ac.ir/article_5020.html
In this paper, firstly we show that some classical properties for Cauchy dual and Moore-Penrose inverse of composition operators, such as complex symmetric and Aluthge transform on $L^{2}(\Sigma)$. Secondly we give a characterization for some operator classes of weak $p$-hyponormal via Moore-Penrose inverse of composition operators. Finally, some examples are then presented to illustrate that, the Moore-Penrose inverse of composition operators lie between these classes.On the $\Psi$-instability of a nonlinear Lyapunov matrix differential equation with integral term as right side
https://ijnaa.semnan.ac.ir/article_5021.html
The aim of this paper is to give sufficient conditions for $\Psi$-instability of trivial solution of a nonlinear Lyapunov matrix differential equation with integral term as right side.A new method for solving three-dimensional nonlinear Fredholm integral equations by Haar wavelet
https://ijnaa.semnan.ac.ir/article_5022.html
In this paper, a new iterative method of successive approximations based on Haar wavelets is proposed for solving three-dimensional nonlinear Fredholm integral equations. The convergence of the method is veriﬁed. The error estimation and numerical stability of the proposed method are provided in terms of Lipschitz condition. Conducting numerical experiments conﬁrm the theoretical results of the proposed method and endorse the accuracy of the method.Predicting drug-target interaction based on bilateral local models using a decision tree-based hybrid support vector machine
https://ijnaa.semnan.ac.ir/article_5023.html
Predicting with the quantify intensities of transcription factor-target genes binding using random forest technique
https://ijnaa.semnan.ac.ir/article_5026.html
With the rapid development of technology, this development led to the emergence of microarray technology. It has the effect of studying the levels of gene expression in a way that makes it easier for researchers to observe the expression levels of millions of genes at the same time in a single experiment. Development also helped in the emergence of powerful tools to identify interactions between&nbsp;target genes and regulatory factors. The main aim of this study is to build models to predicate the&nbsp;relationship (Interaction) between Transcription Factors (TFs) proteins and target genes by selecting&nbsp;the subset of important genes (Relevant genes) from original dataset. The proposed methodology&nbsp;comprises into three major stages: the genes selection, merge datasets and the prediction stage. The&nbsp;process of reducing the computational space of gene data has been accomplished by using proposed&nbsp;mutual information method for genes selection based on the data of gene expression. In the prediction, the proposed prediction regression techniques are utilized to predict with binding rate between&nbsp;single TF-target gene. It has been compared the efficiency of two different proposed regression techniques including: Linear Regression and Random Forest Regression. Two available data sets have&nbsp;been utilized to achieve the objectives of this study: Gene&rsquo;s expression data of Yeast Cell Cycle&nbsp;dataset and Transcription Factors dataset. The evaluation of predictions performance has been performed depending on two performance prediction measures (Root Mean Square Error (RMSE) and&nbsp;Mean Absolute Error (MAE) with (10) Folds-Cross Validation.On the spectrum and fine spectrum of an upper triangular double-band matrix on sequence spaces
https://ijnaa.semnan.ac.ir/article_5027.html
In this paper, we investigate the spectrum and fine&nbsp;spectrum of the upper triangular double-band matrix $\Delta ^{uv}$&nbsp;on $cs$ sequence space. We also determine&nbsp;the approximate point spectrum, the defect spectrum and the compression&nbsp;spectrum of this matrix on $cs$.Dislocated quasi rectangular $b$-metric spaces and fixed point theorems of cyclic and weakly cyclic contractions
https://ijnaa.semnan.ac.ir/article_5028.html
In this paper we have established fixed point theorems for $dq$-rectangular $b$-cyclic-Banach and $dq$-rectangular $b$-cyclic-Kannan contraction mappings in dislocated quasi rectangular $b$-metric spaces. We have also presented examples to support some of our results.Variation of the first eigenvalue of $(p,q)$-Laplacian along the Ricci-harmonic flow
https://ijnaa.semnan.ac.ir/article_5029.html
In this paper, we study monotonicity for the first eigenvalue of a class of $(p,q)$-Laplacian. We find the first variation formula for the first eigenvalue&nbsp;of $(p,q)$-Laplacian on a closed Riemannian manifold&nbsp; evolving by the Ricci-harmonic flow and construct various monotonic quantities by imposing some conditions on initial manifold.Existence of solutions for a quasilinear elliptic system with variable exponent
https://ijnaa.semnan.ac.ir/article_5030.html
We consider the following quasilinear elliptic system in a Sobolev space with variable exponent: \[-\text{div}(a(|Du|)Du)=f,\] where $a$ is a $C^1$-function and $f\in W^{-1,p'(x)}(\Omega;\R^m)$. We use the theory of Young measures and weak monotonicity conditions to obtain the existence of solutions.Dhage iteration principle for IVPs of nonlinear first order impulsive differential equations
https://ijnaa.semnan.ac.ir/article_5031.html
In this paper we prove the existence and approximation theorems for the initial value problems of first order nonlinear impulsive differential equations under certain mixed partial Lipschitz and partial compactness type conditions. Our results are based on the Dhage monotone iteration principle embodied in a hybrid fixed point theorem of Dhage involving the sum of two monotone order preserving operators in a partially ordered Banach space. The novelty of the present approach lies the fact that we obtain an algorithm for the solution. Our abstract main result is also illustrated by indicating a numerical example.Newton-Taylor polynomial solutions of systems of nonlinear differential equations with variable coefficients
https://ijnaa.semnan.ac.ir/article_5032.html
The main purpose of this paper is consider Newton-Taylor polynomial solutions method in&nbsp;numerical solution of nonlinear system of&nbsp;differential equations. We apply&nbsp;Newton's method to linearize it. We&nbsp; found Taylor polynomial solution of the linear form. Sufficient conditions for convergence&nbsp;of the numerical method are given and their applicability is&nbsp;illustrated with some examples.In numerical examples we give two benchmark sample problems and compare the proposed method by the famous Runge-Kutta fourth-order method. These sample problems practically show some advantages of the Newton-Taylor polynomial solutions method.Optimal pricing policy for stock dependent demand with effective investment in preservation technology
https://ijnaa.semnan.ac.ir/article_5033.html
In this paper, we suggested an optimal pricing policy for deteriorating items. To reduce the rate of&nbsp; deterioration, we apply a preservation technology and calculate the optimal preservation technology&nbsp; investment. The demand function is dependent on time, stock and selling price. Shortages are allowed in our consideration, and two cases are studied, first complete back-ordering and the second one is partially back-ordering. Our main objective is to find the optimal cycle length, ordering frequency the optimal preservation technology investment and the optimal selling price that maximizes the total profit. This model proves that the total profit is a concave function of the selling price, ordering frequency, preservation technology investment and time cycle. Numerical examples are provided to illustrate the features and advances of the model. A sensitivity analysis is performed in order to assess the stability of the proposed model.Stability of (1,2)-total pitchfork domination
https://ijnaa.semnan.ac.ir/article_5035.html
Let $G=(V, E)$ be a finite, simple, and undirected graph without isolated vertex. We define a dominating&nbsp; $D$ of $V(G)$ as a total pitchfork dominating set, if $1\leq|N(t)\cap V-D|\leq2$ for every $t \in D$ such that $G[D]$ has no isolated vertex. In this paper, the effects of adding or removing an edge and removing a vertex from a graph are studied on the order of minimum total pitchfork dominating set $\gamma_{pf}^{t} (G)$ and the order of minimum inverse total pitchfork dominating set $\gamma_{pf}^{-t} (G)$. Where $\gamma_{pf}^{t} (G)$ is proved here to be increasing by adding an edge and decreasing by removing an edge, which are impossible cases in the ordinary total domination number.Projection and multi-projection methods for second kind Volterra-Hammerstein integral equation
https://ijnaa.semnan.ac.ir/article_5039.html
In this article, we discuss the piecewise polynomial based Galerkin method to approximate the solutions of second kind Volterra-Hammerstein integral equations. We discuss the convergence of the approximate solutions to the exact solutions and obtain the orders of convergence $\mathcal O(h^{r})$ and $\mathcal O(h^{2r}),$ respectively, for Galerkin and its iterated Galerkin methods in uniform norm, where $h, ~r$ denotes the norm of the partition and smoothness of the kernel, respectively. We also obtain the superconvergence results for multi-Galerkin and iterated multi-Galerkin methods. We show that iterated multi-Galerkin method has the order of convergence $\mathcal O(h^{3r})$ in the uniform norm. Numerical results are provided to demonstrate the theoretical results.A common fixed point theorem via measure of noncompactness
https://ijnaa.semnan.ac.ir/article_2318.html
In this paper by applying the measure of noncompactness a common fixed point for the maps $T$ and $S$ is obtained, where $T$ and $S$ are self maps continuous or commuting continuous on a closed convex subset $C$ of a Banach space $E$ and also $S$ is a linear map.Common Fixed Point Theorems with Applications to Theoretical Computer Science
https://ijnaa.semnan.ac.ir/article_3674.html
Owing to the notion of L-fuzzy mapping, we establish some common $L$-fuzzy fixed point results&nbsp;for almost $\Theta$-contraction in the setting of complete metric spaces. An application to theoretical&nbsp;computer science is also provided to show the significance of the investigations.Fractals of Generalized $\Theta$-Hutchinson Operator
https://ijnaa.semnan.ac.ir/article_3675.html
The aim of this paper is to construct a fractal of generalized $\Theta$-Hutchinson Operator with the help&nbsp;of a finite family of $\Theta$-contraction mappings, a class of mappings more general than contractions,&nbsp;defined on a complete metric space. Our results unify, generalize and extend various results in the&nbsp;existing literature.Fixed points for Banach and Kannan contractions in $G$-metric spaces endowed with a graph
https://ijnaa.semnan.ac.ir/article_3678.html
In this paper, we discuss the existence of fixed points for Banach and Kannan contractions defined on $G$-metric&nbsp;spaces, which were introduced by Mustafa and Sims, endowed with a graph. Our results generalize and unify some recent results by Jachymski, Bojor and Mustafa and those contained therein. Moreover, we provide some examples to show that our results are substantial improvement of some known results in literature.$(G,\psi)$-Ciric-Reich-Rus contraction on metric space endowed with a graph
https://ijnaa.semnan.ac.ir/article_3724.html
In this paper, we introduce the $(G,\psi)$-Ciric-Reich-Rus contraction on metric space endowed with a&nbsp;graph, such that $(X,d)$ is a metric space, and $V (G)$ is the vertices of $G$ coincides with $X$. We give&nbsp;an example to show that our results generalize some known resultsThe Essential of Applying Nonlinear-Analysis to Validate Experiments, Assessing Superior Brain Functions: Case-Study of a Bayesian-Model of Inhibitory Control in ADHD
https://ijnaa.semnan.ac.ir/article_3946.html
In the last decades, nonlinear methods have been applied, in a large number of studies from the computational neuroscience field, to describe neuronal implementations of superior brain functions. Superior brain functions, called cognitive functions, control our behavior. Therefore, they should be assessed through evaluating individual performances in the experiments, using standard tasks, which represent the condition that cognitive functions are required. The mathematical models of cognitive functions, in neuronal implementation level, are based on real condition of standard cognitive tasks. However, it is not validated whether applied task conditions are appropriate to represent neuronal implementation of a cognitive function. Hence, as a case-study, we used a developed Bayesian Model to assess whether GoNoGo task is valid to be applied for neural measurement and modeling neural implementation of Inhibitory Control (IC). As GoNoGo is the most common task used for neural measurement of impaired cognitive function (IC) in ADHD, we fit the model to behavioral data of two groups of children/adolescents with and without ADHD. The results demonstrated that the model could simulated the behavioral data; and also the model parameters could differentiate the groups significantly. However, neural implementation of IC may not be represented through the rewarded condition of GoNoGo task. We concluded that before modeling neural implementation of cognitive functions, it is essential to apply nonlinear methods to validate current behavioral experiments computationally; or to design new model-based experiments for using in neural measurementsA Nonmonotone Hestenes ans Stiefel Conjugate Gradient Algorithm for Nonsmooth Convex Optimization
https://ijnaa.semnan.ac.ir/article_3958.html
Here, we propose a practical method for solving nonsmooth convex problems by using conjugate gradient type methods. We present a modified HS conjugate gradient method, as one of the most remarkable methods to solve smooth and large-scale optimization problems. In the case that we have a nonsmooth convex problem, by way of the Moreau-Yosida regularization, we convert the nonsmooth objective function to a smooth function and then we use our method, by making use of a nonmonotone line search, for solving a nonsmooth convex optimization problem. We prove that our algorithm converges to an optimal solution under standard condition. Our algorithm inherits the performance of HS conjugate gradient method.Bifurcation and chaos in a one mass discrete time vocal fold dynamical model
https://ijnaa.semnan.ac.ir/article_5042.html
In this article, we are going to study the stability and bifurcation of a two-dimensional discrete time vocal fold model. The existence and local&nbsp;stability of the unique fixed point of the model is investigated. It is shown that a Neimark-Sacker bifurcation occurs and an invariant circle will appear. We give sufficient conditions for this system to be chaotic in the sense of Marotto. Numerically it is shown that our model has positive Lyapunov exponent and is sensitive dependence on initial conditions. Some numerical simulations are presented to illustrate our theoretical results.Hyers-Ulam types stability of nonlinear summation equations with delay
https://ijnaa.semnan.ac.ir/article_5043.html
In this typescript, we study the existence and uniqueness for a class of nonlinear summation&nbsp;equation with delay. Furthermore, we present Hyers&ndash;Ulam stability(HUS), generalized Hyers&ndash;Ulam&nbsp; stability(GHUS), Hyers&ndash;Ulam&ndash;Rassias stability(HURS) and generalized Hyers&ndash;Ulam&ndash;Rassias&nbsp; stability(GHURS) of the mentioned equation by utilizing discrete Gr&uml;onwall lemma. We&nbsp;finalized our manuscript through examples to help our primary outcomes.A Simple proof for the algorithms of relaxed $(u, v)$-cocoercive mappings and $\alpha$-inverse strongly monotone mappings
https://ijnaa.semnan.ac.ir/article_5044.html
In this paper, a simple proof is presented for the Convergence of the algorithms for the class of relaxed $(u, v)$-cocoercive mappings and $\alpha$-inverse strongly monotone mappings. Based on $\alpha$-expansive maps, for example,&nbsp;a simple proof of the convergence of the recent iterative algorithms by relaxed $(u, v)$-cocoercive mappings due to Kumam-Jaiboon is provided. Also a simple proof for the convergence of the iterative algorithms by inverse-strongly monotone mappings due to Iiduka-Takahashi in a special case is provided. These results are an improvement as well as a refinement of previously known results.Convergence theorems of a new multiparametric family of Newton-like method in Banach space
https://ijnaa.semnan.ac.ir/article_5046.html
In this work, we have considered a new multi-parametric family of modified Newton-like methods(MNL) of order three to approximate a zero of a nonlinear operator in $\mathbb{B}$-space (Banach space). Here, we studied the semilocal convergence analysis of this family of methods by using a new type of majorant condition. Note that this majorant condition generalizes the earlier majorant conditions used for studying convergence analysis of third order methods. Moreover, by using second-order directional derivative of the majorizing function we obtained an error estimate. We also established relations between our majorant condition and assumption based on Kantorovich, Smale-type and Nesterov-Nemirovskii-type, that will show our result generalize these earlier convergence results.Several integral inequalities and their applications on means
https://ijnaa.semnan.ac.ir/article_5047.html
In this paper we prove several sharp inequalities that are new versions and&nbsp; extensions of Jensen and $H-H$ inequalities. Then we apply them on means.Almost $\alpha$-$F$-contraction, fixed points and applications
https://ijnaa.semnan.ac.ir/article_5048.html
In this manuscript, we initiate an almost $\alpha$-$F$-contraction and an almost $\alpha$-$F$- weak contraction in the setting of partial metric spaces and establish adequate conditions for the presence of fixed points. The obtained results generalize the classical and recent results of the literature, which are validated by suitable examples. As applications of these established results, we solve a nonlinear fractional differential equation and a boundary value problem.Sequential bipolar metric space and well-posedness of fixed point problems
https://ijnaa.semnan.ac.ir/article_5049.html
In this paper, we introduce the concept of sequential bipolar metric spaces which is a generalization of bipolar metric spaces and bipolar b&minus;metric spaces and in view of this concept we prove some ﬁxed point theorems for a class of covariant and contravariant contractive mappings over such spaces. Supporting example have been cited in order to validity of the underlying space. Moreover, our ﬁxed point results are applied to well-posedness of ﬁxed point problems.A nonunique common fixed point theorem of Rhoades type in b-metric spaces with applications
https://ijnaa.semnan.ac.ir/article_5050.html
The aim of this paper is to prove a nonunique common fixed point&nbsp;theorem of Rhoades type for two self-mappings in complete b-metric spaces.&nbsp;This theorem extends the results of [17] and [49]. Examples are furnished to&nbsp;illustrate the validity of our results. We apply our theorem to establish the&nbsp;existence of common solutions of a system of two nonlinear integral equations&nbsp;and a system of two functional equations arising in dynamic programming.Feeble regular and feeble normal spaces in $\alpha$-topological spaces using graph
https://ijnaa.semnan.ac.ir/article_5051.html
This paper introduces some properties of separation axioms called $\alpha$ -feeble regular and $\alpha$ -feeble normal spaces (which are weaker than the usual axioms) by using elements of graph which are the essential parts of our $\alpha$ -topological spaces that we study them. Also, it presents some dependent concepts and studies their properties and some relationships between them.Inequalities for $tgs$-convex functions via some conformable fractional integrals
https://ijnaa.semnan.ac.ir/article_5063.html
In this research article, we establish several Hermite-Hadamard type inequalities for tgs-convex functions via conformable fractional integrals and new fractional conformable integral operators.Existence of farthest points in Hilbert spaces
https://ijnaa.semnan.ac.ir/article_5070.html
Let $H$ be a real Hilbert space with the inner product $&lt;.,.&gt;$ and the norm $\|\cdot\|$. In this paper, we introduce hybrid algorithms for generating cyclic, non-expansive mapping of H. Also, we discuss about necessary and sufficient conditions on subsets of Hilbert space to be remotal or uniquely&nbsp;remotal. Moreover, we give the basic concepts and theorems of farthest points of Bounded subsets of H. In the end, we will provide examples to illustrate our results.A Robust Encryption Technique Using Enhanced Vigenre Cipher
https://ijnaa.semnan.ac.ir/article_5071.html
A lot of data in this world are very important and no matter how simple it can be. Hence the number of data conveyed through the internet still increasing due to the rapid development of computer technology. In order to save the data over the internet, cryptography is a technique for conveying information securely between two parties without interference from outside elements. The Vigenre cipher is a technique of encrypting alphabetic text via using a sequence of different Caesar ciphers depend on the letters of a keyword. It is a simple form of polyalphabetic replacement. In this paper, the traditional way for the Vigenre method is enhanced by using two keys for text encryption. The first key is used to format the table of the alphabet (26 characters) and second keys are used to encrypt the plain text like the original Vigenre cipher. The result shows the proposed method is efficient and stronger against the kasiski and Friedman attack to find the length of the key.The outbreak disease due to the contamination environment and effect on dynamical behavior of prey-predator model
https://ijnaa.semnan.ac.ir/article_5072.html
In this study, a predator-prey model (PPMD) was formulated and studied along with infectious on
populations of prey and predator, since each one is splited into two sub-populations i.e., healthy and
infected. It is presumed that only healthy predator of ability to predate the healthy prey and consume
both healthy and prey being infected. Mathematically, the model solutions uniqueness, existence,
and boundedness are conversed. All probable equilibrium model points are defined. The stability
analyses as local and the regions of worldwide stability of each point of equilibriums are inspected.
Lastly, few simulations as numerical were offered for validation the geted results theoretically.On some maps into Banach algebras and Banach modules
https://ijnaa.semnan.ac.ir/article_5073.html
In this paper, we study some maps from a $C^*$-algebra into a Banach algebra or a Banach module. Under some conditions, by extending on unitization of Banach algebras, we prove that the maps defined into Banach algebras are homomorphisms and the others defined into Banach modules are derivations. Applications of our results in the context of $C^*$-algebras are also provided.Investigating 1-perfect code using Dominating set
https://ijnaa.semnan.ac.ir/article_5074.html
In this article, we investigate the relation between dominating sets and 1-perfect codes. We also study perfect colorings of some Johnson graphs in two colors using linear programming problem.Kalman filter and ridge regression backpropagation algorithms
https://ijnaa.semnan.ac.ir/article_5075.html
The Kalman filter (KF) compare with the ridge regression backpropagation algorithm (RRBp) by&nbsp;conducting a numerical simulation study that relied on generating random data applicable to the&nbsp;KF and the RRBp in different sample sizes to determine the performance and behavior of the two&nbsp;methods. After implementing the simulation, the mean square error (MSE) value was calculated,&nbsp;which is considered a performance measure, to find out which two methods are better in&nbsp; making an&nbsp;estimation for random data.&nbsp;After obtaining the results, we find that the Kalman filter has better performance, the higher the&nbsp;randomness and noise in generating the data, while the other&nbsp; algorithm is suitable for small sample&nbsp;sizes and where the noise ratios are lower.Linear maps and covariance sets
https://ijnaa.semnan.ac.ir/article_5076.html
Let $\mathcal{A}$ and $\mathcal{B}$\ are $C^{{\huge \ast}} $-algebras\textbf{.} A\textbf{ }linear map $\phi:\mathcal{A\rightarrow B}$ is $C^{\ast}$-Jordan homomorphism if it is a Jordan homomorphism which preserves the adjoint operation. In this note we show that $C^{\ast}$-Jordanhomomorphisms -under mild assumptions- preserving covariance set and covariance coset in $C^{\ast}$-algebras.A graph associated to proper non-small subsemimodules of a semimodule
https://ijnaa.semnan.ac.ir/article_5091.html
Let M be a unitary left R-semimodule where R is a commutative semiring with identity. The&nbsp; small intersection graph G(M) of a semimodule M is an undirected simple graph with all non-&nbsp; small proper subsemimodules of M as vertices and two distinct vertices N and L are adjacent if&nbsp; and only if N &cap; L is not small in M. In this paper, we investigate the fundamental properties&nbsp; of these graphs to relate the combinatorial properties of G(M) to the algebraic properties of the&nbsp; R-semimodule M. Determine the diameter and the girth of G(M). Moreover, we study cut vertex,&nbsp; clique number, domination number and independence number of the graph G(M). It is shown that&nbsp; the independence number of small graph is equal to the number of its maximal subsemimodules.Strong convergence theorems for minimization, variational inequality and fixed point problems for quasi-nonexpansive mappings using modified proximal point algorithms in real Hilbert spaces
https://ijnaa.semnan.ac.ir/article_5093.html
In this paper, we investigate the problem of finding a common element of the solution set of convex minimization problem, the solution set of variational inequality problem and the&nbsp; solution set of fixed point problem with an infinite family of quasi-nonexpansive mappings in&nbsp; real Hilbert spaces. Based on the well-known proximal point algorithm and viscosity approximation method, we propose and analyze a&nbsp; new iterative algorithm for computing a common element. Under very mild assumptions, we obtain a strong convergence theorem for the sequence generated by the proposed method. Application to convex minimization and variational inequality problems coupled with inclusion problem&nbsp; is provided to support our main results.\,Our proposed method is quite general and includes the iterative methods considered in the earlier and recent literature as special cases.The approximate analytical solutions of nonlinear fractional ordinary differential equations
https://ijnaa.semnan.ac.ir/article_5094.html
The Sumudu homotopy perturbation method (SHPM) is applied to solve fractional order nonlinear&nbsp;differential equations in this paper.The current technique incorporates two notable&nbsp; strategies in particular Sumudu transform (ST) and homotopy perturbation method (HPM). The&nbsp; proposed method&rsquo;s&nbsp;hybrid property decreases the number of the quantity of computations and&nbsp; materials needed. In this&nbsp;method, illustration examples evaluate the accuracy and applicability of the mentioned procedure.&nbsp;The outcomes got by FSHPM are in acceptable concurrence with the specific&nbsp; arrangement of the&nbsp;problem.Fuzzy equality co-neighborhood domination of graphs
https://ijnaa.semnan.ac.ir/article_5101.html
In that paper the fuzzy equality co-neighborhood domination and denoted by $\gamma_{en}(G)$ for a new definition of domination was&nbsp;described for the fuzzy graph. This new definition was studied in a strong fuzzy graph and constraints were found for many several&nbsp;graphs. Complementary strong fuzzy graphs of the same graphs were examined and studied in detail.Meta-heuristic innovative algorithm of multi-objectives in tasks timing at cloud computing system
https://ijnaa.semnan.ac.ir/article_5103.html
In this article a mathematical model with twin objectives is presented. The objectives are considered as:Minimization of the maximum tardiness of tasks completion time and the total early tasks penalties. Since tasks timing is a tardy and indefinite factor in cloud computing; therefore problem solving model is used as the combined Meta-heuristic innovative algorithm of multi objective swarm of particles based Parto archive has been used. The suggested algorithm with genetic operators as well as the directed and repeated counterpart structures in the format of multi operators are taken to assess the algorithm application. The results will be sorted based on quality, distraction, integrated, the number of non-defeated solutions and the gap from the ideal one is compared with the evolutionary algorithm results titled genetic algorithm. The final results of solved model indicate that firstly, this algorithm is stronger than NSGA-II algorithm but is weaker in timing, norms and scales. In other words, the suggested algorithm, is more capable to discover solutions, accordingly.Bessel transforms of Dini-Lipschitz functions on Lebesgue spaces $L_{p,\gamma}(\mathbb{R}^{n}_{+})$
https://ijnaa.semnan.ac.ir/article_5108.html
In this paper, we obtain a generalization of Titchmarsh's theorem for the Bessel transform for functions satisfying the $(\psi,p)$-Bessel Lipschitz condition in the Lebesgue space $L_{p,\gamma}(\mathbb{R}^{n}_{+})$ for $1&lt; p\leq2$, $\gamma&gt;0$.Some inference of the repeated measurements model
https://ijnaa.semnan.ac.ir/article_5109.html
This paper is dedicated to studying the repeated measurements model (RMM). We investigate the analysis of variance (ANOVA) of the model and identify the confidence intervals of the variance components and identify the analytic form of the likelihood- ratio test for the model.Nonlinear instability analysis of a vertical cylindrical magnetic sheet
https://ijnaa.semnan.ac.ir/article_5111.html
This paper concerns with the nonlinear instability analysis of double interfaces separated three perfect, incompressible cylindrical magnetic fluids. The cylindrical sheet is acted upon by an axial&nbsp; uniform magnetic field. The current nonlinear approach depends mainly on solving the linear governing equations of motion and subjected to the appropriate nonlinear boundary conditions. This procedure resulted in two nonlinear characteristic equations governed the behavior of the interfaces deflection. By means of the Taylor expansion, together with the multiple time scales, technique, the stability analysis of linear as well as the nonlinear is achieved. The linear stability analysis reveals a quadratic dispersion equation in the square of growth rate frequency of the surface wave. On the other hand, the nonlinear analysis is accomplished by a coupled nonlinear Schr&ouml;dinger equation of the evolution amplitudes of the surface waves. The stability criteria resulted in a polynomial of the eleventh degree in the square of the magnetic field strength, together with resonance transition curves. Several special cases are reported upon appropriate data choices. The stability criteria are numerically discussed, at which regions of stability and instability are identified. In the stability profile, the magnetic field intensity is plotted versus the wave number. The influences of the parameters on the stability are addressed. The nonlinear stability approach divides the phase plane into several parts of stability/instability. The nonlinear stability shows an in contrast mechanism of the role of the sheet thickness.The impact of subband pause noise on the sensitivity of detection methods
https://ijnaa.semnan.ac.ir/article_5115.html
Through the use of subband analysis, the article presents a method for selecting pauses in speech communications. An additive blending of normally distributed noise was used in the sensitivity analysis. In various noise / signal respects, the probability of making a bad decision has been identified. The findings show that the proposed sub-band method is stable when subjected to additive noise effects.On the degree of approximation of certain continuous bivariate functions by double matrix means of a double Fourier series
https://ijnaa.semnan.ac.ir/article_5117.html
In this paper, we have studied the degree of approximation of certain bivariate functions by double factorable matrix means of a double Fourier series. Four theorems are proved using single rest bounded variation sequences, single head bounded variation sequences, double rest bounded variation sequences, and two non-negative mediate functions. These results expressed in terms of two functions of modulus type and two non-negative mediate functions, imply many particular results as shown at last section of this paper.Using the infimum form of auxiliary functions to study the common coupled coincidence points in fuzzy semi-metric spaces
https://ijnaa.semnan.ac.ir/article_5118.html
The common coupled coincidence points and common coupled fixed points in fuzzy semi-metric spaces are investigated in this paper. In fuzzy semi-metric space, the symmetric condition is not necessarily assumed to be satisfied. In this case, regarding the non-symmetry of metric, there are four kinds of triangle inequalities that can be considered. In order to investigate the common coupled coincidence points and common coupled fixed points, the fuzzy semi-metric space is further assumed to satisfy the so-called canonical condition that is inspired from the intuitive observations. The sufficient conditions for guaranteeing the common coupled coincidence points and common coupled fixed points will be different for the four different kinds of triangle inequalities.Generalized Mittag-Leffler stability of nonlinear fractional regularized Prabhakar differential systems
https://ijnaa.semnan.ac.ir/article_5119.html
This work is devoted to study of&nbsp; the stability analysis of generalized fractional nonlinear system including the regularized Prabhakar derivative. We present several criteria for the generalized Mittag-Leffler stability and the asymptotic stability of this system by using the Lyapunov direct method. Further, we provide two test cases to illustrate the effectiveness&nbsp; of&nbsp; results. We apply the numerical method to solve the generalized fractional system with the regularized Prabhakar fractional systems and reveal asymptotic stability behavior of the presented systems by employing numerical simulation.On fractional differential equations and fixed point theory
https://ijnaa.semnan.ac.ir/article_5120.html
In this work first we establish some fixed point theorems for $\bot-$Mizoguchi-Takahashi contractions mappings in the setting of orthogonal metric spaces. Next, we investigate the existence of solution for certain fractional differential equation via some integral boundary value conditions and obtained fixed point results.Mixed Topp-Leone-Kumaraswamy distribution
https://ijnaa.semnan.ac.ir/article_5122.html
In this article, a new generalization of the Topp-Leone distribution with a unit interval, namely Mixed Topp-Leone-Kumaraswamy distribution is defined and studied. The mathematical properties of this mixing distribution are described. Moments, quantile function, R?nyi entropy, incomplete moments and moments of residual are obtained for the new Mixed Topp-Leone - Kumaraswamy distribution. The maximum likelihood (MLE), Crans (CM) , Percentile (PM) and Particle Swarm Optimization(PSO) estimators of the parameters are derived. The percentile Method is more efficient method as compred to the others. Two real data sets are used to illustrate an application and superiority of the proposed distribution.Fixed point in bicomplex valued metric spaces
https://ijnaa.semnan.ac.ir/article_5123.html
In the present paper, we introduce new types of convergence of a sequence in left dislocated and right dislocated metric spaces. Also, we generalize Banach contraction principle in these newly defined generalized metric spaces.Dynamical analysis, stability and discretization of fractional-order predator-prey model with negative feedback on two species
https://ijnaa.semnan.ac.ir/article_5124.html
&lrm;The Lotka-Volterra model is an important model being employed in biological phenomena to investigate the nonlinear interaction among existing species&lrm;. &lrm;In this work&lrm;, &lrm;we first consider an integer order predator-prey model with negative feedback on both prey and predator&lrm;. &lrm;Then by introducing a fractional model into the existing one&lrm;, &lrm;we give them a specified memory&lrm;. &lrm;We also obtain its discretized counterpart&lrm;. &lrm;Finally&lrm;, &lrm;along with giving the biological interpretation of the system&lrm;, &lrm;the stability and dynamical analysis of the proposed model are investigated and the results are illustrated as well&lrm;.Comparison between Renyi GME and Tsallis GME for estimation Kink regression
https://ijnaa.semnan.ac.ir/article_5125.html
In this paper, an estimation of the parameters of the Kink regression model was made by relying on higher order from the general maximum entropy method with two measures Tsallis and Renyi ($\alpha=3,~\alpha=4,~\alpha=5,~\alpha=6$), A practical application has been made to data for a real phenomenon in the Iraqi economy, which is inflation with the Debt/GDP ratio and a statistical analysis of it.&nbsp; After making a comparison with other estimation methods, as the results showed that the explanatory variable for the kink point is equal to (5), and the results show a decrease in the Debt/GDP ratio after observations Kink.Some types of fibrewise fuzzy topological spaces
https://ijnaa.semnan.ac.ir/article_5127.html
The aim of this paper is to introduce and study the notion type of fibrewise topological spaces, namely fibrewise fuzzy j-topological spaces, Also, we introduce the concepts of fibrewise j-closed fuzzy topological spaces, fibrewise j-open fuzzy topological spaces, fibrewise locally sliceable fuzzy j-topological spaces and fibrewise locally sectionable fuzzy j-topological spaces. Furthermore, we state and prove several Theorems concerning these concepts, where $j=\{\delta, \theta, \alpha, p, s, b, \beta\}$.Hybrid medical image compression using the IKL transform with an efficient encoder
https://ijnaa.semnan.ac.ir/article_5126.html
Medical images are generated in a huge number in the research centers and hospitals every day. Working with the medical images and maintain the storage needs an efficient fund and huge storage space. Retaining the quality of the medical image is also very essential. Image compression without losing its quality is the only term to achieve the desired task. Achieving the desired task using the integer Karhunen Loeve transform attains a quality output and also with less storage space. JPEG and JPEG 2000 are also challenging to the integer transform based compression. Resulting the compression quality in terms of peak signal noise ratio, compression ratio is attained. Proposed method of compression is compared with the other efficient algorithms. Thus this proposed method can be used efficiently for the medical image in order to store and retrieve in healthcare industry.Rough continuity and rough separation axioms in $G_m$-closure approximation spaces
https://ijnaa.semnan.ac.ir/article_5129.html
The theory of general topology view for continuous mappings is general version and is applied for topological graph theory. Separation axioms can be regard as tools for distinguishing objects in&nbsp; information systems. Rough theory is one of map the topology to uncertainty. The aim of this work is to&nbsp; presented graph, continuity, separation properties and rough set to put a new approaches for&nbsp; uncertainty. For the introduce of various levels of approximations, we introduce several levels of&nbsp; continuity and separation axioms on graphs in $G_m$-closure approximation spaces.Fibrewise totally perfect mapping
https://ijnaa.semnan.ac.ir/article_5134.html
The&nbsp; main&nbsp; purpose&nbsp; of&nbsp; this&nbsp; paper&nbsp; is&nbsp; to&nbsp; introduce&nbsp; a&nbsp; some&nbsp; concepts&nbsp; in&nbsp; fibrewise&nbsp; totally topological space which are called fibrewise totally mapping, fiberwise totally closed mapping, fibrewise weakly totally closed mapping, fibrewise totally perfect&nbsp; &nbsp;mapping fibrewise almost totally perfect&nbsp; mapping.&nbsp; Also&nbsp; the&nbsp; concepts as&nbsp; totally adherent&nbsp; point, filter, filter&nbsp; base, totally converges to a subset, totally directed toward a set, totally rigid, totally-H-set, totally Urysohn space, locally totally-QHC totally topological space are introduced and the main concept in this paper&nbsp; is&nbsp; fibrewise&nbsp; totally&nbsp; perfect&nbsp; mapping&nbsp; in&nbsp; totally&nbsp; topological&nbsp; space.&nbsp; Several&nbsp; theorem&nbsp; and characterizations concerning with these concepts are studied.An approximate solution of integral equation using Bezier control Points
https://ijnaa.semnan.ac.ir/article_5135.html
&nbsp;The integral equations are computed numerically using a Bezier curve. We have written the&nbsp; linear&nbsp; Fredholm integral equation into a matrix formulation by using a Bezier curves as a piecewise polynomials of degree n and we use (n+1) unknown control points on unit interval to determine Bezier curve. two examples have been discussed in details.Gronwall type inequalities: new fractional integral results with some applications on hybrid differential equations
https://ijnaa.semnan.ac.ir/article_5138.html
In this paper, we are concerned with a class of fractional integral inequalities of Gronwall type. New integral results with some generalizations are proved. Then, some applications on hybrid differential equations with Hadamard derivative are established.Ulam-Hyers stability for fuzzy delay differential equation
https://ijnaa.semnan.ac.ir/article_5139.html
In this paper, we aim to study the Ulam-Hyers stability and Ulam-Hyers-Rassias stability of the fuzzy delay differential equation under some suitable conditions by the fixed point technique and successive approximation method. Moreover, we provide two illustrative examples of application of our results.Shrinking approximation method for solution of split monotone variational inclusion and fixed point problems in Banach spaces
https://ijnaa.semnan.ac.ir/article_5140.html
In this paper, we investigate a shrinking algorithm for finding a solution of split monotone variational inclusion problem which is also a common fixed point problem of relatively nonexpansive mapping in uniformly convex real Banach spaces which are also uniformly smooth. The iterative algorithm employed in this paper is design in such a way that it does not require prior knowledge of operator norm. We prove a strong convergence result for approximating the solutions of the aforementioned problems and give applications of our main result to split convex minimization problem. The result present in this paper extends and complements many related results in literature.A topology on a ring part of IS-algebra
https://ijnaa.semnan.ac.ir/article_5141.html
We give a topology on a ring part of IS-algebra, by define prime ideals of a commutative ring part of IS-algebra and study some of its properties.The new integral transform and its applications
https://ijnaa.semnan.ac.ir/article_5142.html
We offer a new complex integral transform, the complex SEE transform, in this paper. The properties&nbsp;of this transform are investigated. This complex integral transform is also used to reduce the core problem to a simple algebraic equation. The answer to this primary problem can then be obtained&nbsp;by solving this algebraic equation and using the inverse of this complex integral transform. Finally,&nbsp;the complex integral transform is used to solve higher order ordinary differential equations. Also, we&nbsp;introduce, some&nbsp; important engineering and physics applications.A new method of linear support vector regression with interval data
https://ijnaa.semnan.ac.ir/article_5144.html
&lrm;In this paper&lrm;, &lrm;the linear support vector regression approach is proposed for solving the regression problem with interval data&lrm;, &lrm;which is called interval support vector regression(ISVR)&lrm;. &lrm;The ISVR approach is equivalent to solving a linear constrained quadratic programming problem (QPP) with an interval cost coefficient in which the value of the objective function is in an interval&lrm;. &lrm;Instead of solving an interval QPP&lrm;, &lrm;we solve two QPPs and prove that the cost values of these two problems are the lower bound and the upper bound of the target value of the interval QPP&lrm;. &lrm;We show these two mentioned QPPs are equivalent to two support vector regression problems which the first problem applies the lower bound of data and the second problem considers the upper bound of the data&lrm;. &lrm;to obtain the regression function&lrm;. &lrm;Some experiments are made to demonstrate the performance of our method compared with the known algorithms on several artificial&lrm;, &lrm;benchmark and real practical datasets&lrm;.&lrm;&lrm;&lrm;Grasp on next generation security operation centre (NGSOC): Comparative study
https://ijnaa.semnan.ac.ir/article_5145.html
With the growing number of cyber security threats affecting the business environment of many organizations, especially the IT environment. With the growing number of cyber security threats affecting the business environment of many organizations, especially the IT environment. Managed protection systems, including SOC, are highly sought after. Managed protection systems, including SOC, are highly sought after. The problem with SOC is that when building up their own SOC or hiring a third-party to provide SOC, organizations are not able to apply adequate criteria or standard frameworks. The aim of the study is to lay the foundations for developing a modern system of systematic operation centers for the next generation (NGSOC) for IIoT climate. This paper contains thorough, qualitative literature survey on the implementation of a Security Operation Centre (SOC). A comparative study is carried out using a variety of previous research sources and a literature review. The findings from the report show that previous research is not adequately guided, especially in the safety and technical aspects of the building block of the SOC. It is hoped that by proposing the framework, cybersecurity threat prevention and identification would be strengthened even further. The success of the NGSOC will ultimately be determined by the integration of individuals, procedure, and technology.Approximation of Fourier series in terms of functions in $L_p$ Spaces for $0
https://ijnaa.semnan.ac.ir/article_5146.html
Many results introduced for the absolutely convergence of Fourier series in terms of absolutely continuous functions. Here we study the convergence of Fourier series in terms of $p$-integrable functions series.An inverse triple effect domination in graphs
https://ijnaa.semnan.ac.ir/article_5147.html
In this paper, an inverse triple effect domination is introduced for any finite graph $G=(V, E)$ simple and undirected without isolated vertices. A subset $D^{-1}$ of $V-D$ is an inverse triple effect dominating set if every $v \in D^{-1}$ dominates exactly three vertices of $V-D^{-1}$. The inverse triple effect domination number $\gamma_{t e}^{-1}(G)$ is the minimum cardinality over all inverse triple effect dominating sets in $G$. Some results and properties on $\gamma_{t e}^{-1}(G)$ are given and proved. Under any conditions the graph satisfies $\gamma_{t e}(G)+\gamma_{t e}^{-1}(G)=n$ is studied. Lower and upper bounds for the size of a graph that has $\gamma_{t e}^{-1}(G)$ are putted in two cases when $D^{-1}=V-D$ and when $D^{-1} \neq V-D .$ Which properties of a vertex to be belongs to $D^{-1}$ or out of it are discussed. Then, $\gamma_{t e}^{-1}(G)$ is evaluated and proved for several graphs.Automatic detection lung infected COVID-19 disease using deep learning (Convolutional Neural Network)
https://ijnaa.semnan.ac.ir/article_5148.html
&nbsp; In late 2019,&nbsp; a virus appeared suddenly he claims Covid-19, which started in China and began to spread very widely around the world. And because of its effects, which are not limited to human life only, but rather in economic and social aspects, and because of the increase in daily injuries and significantly with the limited hospitals that cannot accommodate these large numbers, it is necessary to find an automatic and rapid detection method that limits the spread of the disease and its detection at an early stage in order to be treated more quickly. In this paper, deep learning was relied upon to create a CNN model to detect COVID-19 infected lungs using chest X-ray images. The base consists of a set of images taken of lungs infected with Covid-19 disease and normal lungs, as the CNN structure gave accuracy, Precision, Recall and F-Measure 100%Big data analysis by using one covariate at a time multiple testing (OCMT) method: Early school dropout in Iraq
https://ijnaa.semnan.ac.ir/article_5149.html
The early school dropout is very significant portents that controls the future of societies and determine the nature of its elements. Therefore, studying this phenomenon and find explanations of it is a necessary matter, by finding or developing appropriate models to predict it in the future. The variables that affect the early school dropout Iraq takes a large size and multiple sources and types due the political and economic situation , which attributes it as a sort of Big Data that must be explored by using new statistical approaches. The research aims at using one Covariate at a Time Multiple Testing OCMT Method to analyze the data from surveys collected by the Central Statistical Organization IRAQ, which contains many indicators related to school dropout and meaningfully affect the life of the Iraqi persons. The Ridge Regression Method as well as the OCMT method were chosen to analyze data and the Mean Square Errors MSE was used to compare the two methods and From the results we find that OCMT estimator is better than Ridge estimator with Big Data conditions.Fibrewise totally compact and locally totally compact spaces
https://ijnaa.semnan.ac.ir/article_5154.html
In this paper we define and study new concepts of fibrwise totally topological spaces over B namely
fibrewise totally compact and fibrwise locally totally compact spaces, which are generalization of well
known concepts totally compact and locally totally compact topological spaces. Moreover, we study
relationships between fibrewise totally compact (resp, fibrwise locally totally compact) spaces and
some fibrewise totally separation axioms.Effects of static magnetic field on dye extracted from Anchusa-Italica through optimization the optoelectronic properties
https://ijnaa.semnan.ac.ir/article_5158.html
The dye extracted from the plant is already well used in optoelectronic applications for its easy and safe handling. This study is to demonstrate the effect of magnetized distilled water on dye extracted from Anchusa-Italica flowers. The results of its optoelectronic behavior reveal that the use of magnetized water in the extraction process results in different and better properties than processes in which ordinary water was used. The structural analysis of Anchusa-Italica dye thin-film was performed using the Fourier-transform infrared technique (FT-IR). The optical responses, such as the absorption coefficient, absorption spectra, both standard and refractive indices, and electronic properties (optical energy gap) were studied using Ultraviolet-Visible transmittance spectra range 300&ndash;900 nm. The calculated energy band gap of the dye extracted using magnetized water was decreased from 3.23 to 2.35 eV and turned into the preferred direct band gap to make a useful contribution to optical sources. The optical absorption spectra of the dye extracted using magnetized water appear to have a better efficiency compared to that extracted with ordinary water. A significant evolution in the absorption coefficient was obtained by employing magnetized water to extract the dye. The magnetized extraction process also modified the electronic transmission values (indirect to direct). The effect of magnetized water on the resonance mode and transparent indication was deduced by studying the complex refractive index. An increase appeared in the spectrum of the absorption index at a wavelength of 570 nm, whereas a small attenuation coefficient was observed as well. The important effects of magnetized dye extraction will highly benefit the field of optoelectronic applications.Bayes estimators of a multivariate generalized hyperbolic partial regression model
https://ijnaa.semnan.ac.ir/article_5166.html
The matrix-variate generalized hyperbolic distribution belongs to the family of heavy-tailed mixed
probability distributions and is considered to be one of the continuous skewed probability distributions. This distribution has wide applications in the field of economics, especially in stock modeling.
This paper includes estimation the parameters of the multivariate semi-parametric regression
model represented by the multivariate partial linear regression model when the random error follows the matrix-variate generalized hyperbolic distribution, using the Bayesian method when noninformative prior information is available and under the assumption that the shape parameters and
the skewness matrix are known. In addition, the bandwidth parameter is estimated by a suggested
way based on the normal distribution rule and the proposed kernel function based on the mixed
Gaussian kernel function and studying the findings on the generated data in a way suggested for
the model, comparing the estimators depending on the criterion of the mean sum of squares error.
The two researchers concluded that the proposed kernel function is better than the Gaussian kernel
function in estimate the parameters.
&nbsp;Non-Bayesian estimation of Weibull Lindley burr XII distribution
https://ijnaa.semnan.ac.ir/article_5168.html
In this paper, we estimate the four parameters of Weibull Lindley burr distribution by using ordinary
least square method and multiple regression least square method. The survival estimate made by
using ordinary least square estimator (OLSE) and multiple regression estimator (MRE).
&nbsp;Customer lifetime value analysis in the banking industry with an emphasis on brand equity
https://ijnaa.semnan.ac.ir/article_5169.html
Due to the competitiveness of the banking industry and the importance of profitability, access to customer information is essential for establishing effective relationships that serve the interests of both parties. Establishing long-term customer relationships and building brand equity are pivotal in modern banking, and thus improving relationship quality plays a key role in development of new services and customer lifetime value (CLV) measurement. The purpose of the present research is to provide a new model for CLV measurement in the banking industry with an emphasis on brand equity. This study is descriptive and a question naire is used to collect data. The population consists of all the customers of Refah Bank of Iran (with an average annual resources of at least 500m rials), of whom 382 are randomly selected as the sample. Data are analyzed using de-scriptive statistics in SPSS and partial least squares structural equation modeling (PLS-SEM) in SmartPLS. The results indicate the strong fit of the overall model (GOF = 0.782) and show the significant positive effect of brand equity on CLV.Biomechanical analysis of long pass in U-19 women football players
https://ijnaa.semnan.ac.ir/article_5171.html
Kicking movement is process of moving position on leg. Biomechanical analysis explains kick performance which influenced by kinematics and kinetics factors. The research purpose analyzed biomechanical long pass movement. This research is both qualitative and quantitative. The research
sample are 11 Indonesian woman football players who were taken by saturated sampling. Data in
the form of long pass kick video with airborne ball test. Data analyzing used Kinovea software to
determine the flexion angle of backswing kick leg, hip angle, and distance to target, then looking
for the force, power, and energy in kick motion. The motion analysis shown that sample 3 produces
closest distance to target as far as 0.65 m which done with flexion angle of backswing knee is 740
and hip angle of 640. The force exerted by sample 3 is 10.09 N, resulting in a ball speed of 22.42
m/s and a kinetic energy of 113.12 Joule, potential energy of 14.64 Joule and mechanical energy of
127.76 Joule. It can be concluded that accuracy of long pass kick are influenced by flexion angle of
backswing kick knee, hip angle, power and force as well as producing energy in the form of kinetic,
potential, and mechanical energy.The level of representation of some learning styles in the content of Mathematics books for the 4th preparatory class (analysis - evaluation study)
https://ijnaa.semnan.ac.ir/article_5172.html
The present research aims at identifying the level of representation of some learning styles in the
content of mathematics books for 4th preparatory (scientific and literary). In order to achieve the
goal of the research and answer his questions, the researcher has adopted the descriptive research
method and the content analysis method for the research sample. By using the content analysis card
with indicators of virtual validity. It includes categories of analysis or axes of analysis and represents
Learning methods and the their indicators according to the Filder - Silverman model of learning
styles, which classified students&rsquo; learning styles into several methods: ( Sensing Learners vs Intuitive
Learners , visual Learners vs verbal learners , inductive learners versus deductive learners , active
learners vs contemplative learners, sequential learners versus holistic learners).
The researcher has conducted the content analysis process for mathematics books for 4th preparatory
class (scientific and literary) according to specific steps and controls. To determine the level of
representation of some learning styles, using frequencies and percentages. As the results of the
analysis, it is obvious that the frequency totals for learning styles and their indicators are unequal,
and the percentages of their representation level in the content of mathematics books for the 4th
preparatory class (scientific and literary) are below the required level and this is realistic evidence
that some students&rsquo; learning styles have not been taken into consideration. The consideration when
preparing mathematics books for the 4th preparatory class (scientific and literary). Therefore, the
researcher recommends the need to pay attention to it and take into account the inclusion of all
students &rsquo;learning methods when preparing mathematics curricula in particular and books in general.
Fibrewise Slightly Perfect Topological Spaces
https://ijnaa.semnan.ac.ir/article_5173.html
The primary objective of this paper is to present a new concept of fibrewise topological spaces over B
is said to be fibrewise slightly topological spaces over B. Also, we introduce the concepts of fibrewise
slightly perfect topological spaces, filter base, contact point, slightly convergent, slightly directed
toward a set, slightly adherent point, slightly rigid, fibrewise slightly weakly closed, H.set, fibrewise
almost slightly perfect, slightly&lowast;
.continuous fibrewise slightly&lowast;
topological spaces respectively, slightly
Te, locally QHC, In addition, we state and prove several propositions related to these concepts.
&nbsp;The numerical solution of bioheat equation based on shifted Legendre polynomial
https://ijnaa.semnan.ac.ir/article_5175.html
The goal of this study is to expand the usage of a collection method based on shifted Legendre polynomials in matrix form to approximate the derivative to obtain numerical solutions for the unsteady state one-dimensional bioheat equation. The proposed methodology is used to two examples to illustrate its utility and accuracy. The numerical results shown that the techniques used are effective as well as gives high accuracy and good convergenceA new approach of classical Hill Cipher in public key cryptography
https://ijnaa.semnan.ac.ir/article_5176.html
Secure message transformation promote the creation of various cryptography systems to enable receivers to interpret the transformed information. In the present age of information technology, the secure transfer of information is the main study of most agencies. In this study, a particular symmetric cryptography system, Hill Cipher method, is enhanced with the help of encryption and decryption algorithms of the asymmetric RSA cryptography system to avoid certain problems. Previous results show that the original Hill algorithms are still insufficient because of their weakness to known plaintext attack, and a modification of the Hill Cipher cryptography system is therefore presented to increase its invulnerability. The enhancement focuses on implementing the RSA algorithms over the Hill Cipher to increase its security efficiency. The suggested method relies on the security of the RSA and Hill Cipher cryptosystems to find the private decryption keys, and thus is much more secure and powerful than both methods applied separately. Also secure and dynamic generation of the Hill Cipher matrix instead of using static matrix are proposed. This new approach is composed of a public key cryptosystem that has a shared secret key (between participants only), public key (announced to all), and two private keys (for each person). Therefore, this new modification can increase the invulnerability of the Hill Cipher against future attacks during transmission of information between agencies in this age of information technologyThe awareness effect of the dynamical behavior of SIS epidemic model with Crowley-Martin incidence rate and holling type III treatment function
https://ijnaa.semnan.ac.ir/article_5177.html
&nbsp; This article deals with the dynamical behaviors for a biological model of epidemic diseases with holling type III treatment function. A Crowley-Martin formula to transmission of disease with coverage media programs effect on the population are introduced and investigated. Through some basic analyses, an explicit formula for the basic reproduction number of the model is calculated, and some results such as the stability analysis and instability of all equilibrium points for the model are established. The local bifurcation occurs near all equilibrium points for the model under some special cases that are studied. The numerical simulations are executed to confirm the theoretical resultsStudy of the dual ideal of KU-algebra
https://ijnaa.semnan.ac.ir/article_5179.html
In this work, we apply the notion of a filter of a KU-Algebra and investigate several properties. The
paper defined some filters such as strong filter, n-fold filter and P-filter and discussed a few theorems
and examplesExistence results for common solution of equilibrium and vector equilibrium problems
https://ijnaa.semnan.ac.ir/article_5184.html
In this paper, by using the notion of locally segment-dense subsets and sequentially sign property for bifunctions, we establish existence results for a common solution of a finite family of equilibrium problems in the setting of Hausdorff locally convex topological vector spaces. Also similar resultsobtain for vector equilibrium problems.Common fixed point of generalized weakly contractive mappings on orthogonal modular spaces with applications
https://ijnaa.semnan.ac.ir/article_5186.html
In this paper, we provide certain conditions under which guarantee the existence of a common fixed point for weakly contractive mappings defined on orthogonal modular spaces. Also, Banach fixed point theorem on an orthogonal modular space without completeness is obtained.&nbsp; To prove much stronger and more applicable results,&nbsp; some strong assumptions such as the convexity and the Fatou property of a modular are relaxed.Face recognition via weighted non-negative sparse representation
https://ijnaa.semnan.ac.ir/article_5187.html
Face recognition is one of the most important tools of identification in biometrics. Face recognition has attracted great attention in the last decades and numerous algorithms have been proposed. Different researches have shown that face recognition with Sparse Representation based Classification (SRC) has great classification performance. In some applications such as face recognition, it is appropriate to limit the search space of sparse solver because of local minima problem. In this paper, we apply this limitation via two methods. In the first, we apply the nonnegative constraint of sparse coefficients. As finding the sparse representation is a problem with very local minima, at first we use a simple classifier such as nearest subspace and then add the obtained information of this classifier to the sparse representation problem with some weights. Based on this view, we propose Weighted Non-negative Sparse Representation WNNSR for the face recognition problem. A quick and effective way to identify faces based on the sparse representation (SR) is smoothed $L_0$-norm $(SL_0)$ approach. In this paper, we solve the WNNSR problem based on the $SL_0$ idea. This approach is called Weighted Non-Negative Smoothed $L_0$ norm $(WNNSL_0)$. The simulation results on the Extended Yale B database demonstrate that the proposed method has high accuracy in face recognition better than the ultramodern sparse solvers approach.On generalisation of Brown's conjecture
https://ijnaa.semnan.ac.ir/article_5191.html
Let&nbsp; $P$ be the complex polynomial of the form $P(z) = z \prod_{j=1}^{n-1}(z-z_{j})$, with $|z_{j}|\geq 1$, $1 \leq j \leq n-1.$ Then according to famous Brown's Conjecture $p'(z) \neq 0$, for $|z| &lt; \frac{1}{n}.$ This conjecture was proved by Aziz and Zarger [1]. In this paper, we present some interesting generalisations of this conjecture and the results of several&nbsp; authors related to this conjecture.On fixed point in C*-algebra valued metric spaces using $C_*$-class function
https://ijnaa.semnan.ac.ir/article_5192.html
In the present article, we prove some result using $C_*$-class function in the notion of C*-algebra valued metric space which is more general than metric space. The obtained results extend and generalize some of the results in the literature.Multi-objective optimization with modified Taguchi approach to specify optimal robot spray painting process parameters
https://ijnaa.semnan.ac.ir/article_5193.html
Robot spray painting process can improve the quality, productivity and provide clean&nbsp;environment in addition to minimize the labour and cost. This process is being used in automobiles,&nbsp;home appliances, etc. There is a need to specify optimal spray painting process parameters to&nbsp;improve the quality of paint coating considering the performance indicators as thickness variation,&nbsp;surface roughness and film adhesion. Compared to the Taguchi orthogonal array and gray rational&nbsp;analysis, a simple modified Taguchi approach is adopted here to identify optimal spray painting&nbsp;process parameters (such as distance, pressure and speed) and obtain minimum thickness variation,&nbsp;minimum surface roughness and maximum film adhesion. Empirical relation for thickness variation,&nbsp;surface roughness and film adhesion are presented. Test data are close-to/within the estimated&nbsp;range.Detection of plant leaf nutrients using convolutional neural network based Internet of Things data acquisition
https://ijnaa.semnan.ac.ir/article_5194.html
In this paper, the study detects the nutritional deficiencies from these leaves using Internet of Thing (IoT) based image acquisition and nutrition analyser devices. The former captures the color of the leaf and the latter helps in finding the nutrients in each zone based on the image captured by the device. The study uses an improved convolutional neural network to detect automatically the nutrients present in a leaf. The type of leaf is considered from the plants including coriander, tomato, pepper, chili, etc. The Convolutional Neural Network (CNN) is used to extract the patterns of leaf images from the data capturing IoT devices and nutrition analyser device. The system stores and process the data in cloud, where the CNN integrated in Virtual Machines enables the process of input data and process it and sends the report to the authority. A total of 3000 images are collected out of various disorders in five different plants. A 5 fold cross-validation is conducted on training and testing dataset. The system is tested in terms of accuracy, sensitivity, specificity, f-measure, geometric mean and percentage error. The comparison made with existing models shows an improved detection accuracy by CNN than other deep learning models.Supervision calamity of public opinion actions based on field programmable gate array and machine learning
https://ijnaa.semnan.ac.ir/article_5195.html
The community's rise, public opinion network's popularity, and emergency personnel's advancement have changed drastically. Individuals can now go online from any place and through communications systems to share their opinions and attitudes more efficiently and more often. As illustrated by the preceeding network approach, public sentiment on neural networks and IoT is critical for the public sector, the public interest, and a special event in an emergency (IoT). In terms of data security and anonymity, the proposed program is not safe and has environmental problems. Network public opinion's approach is based on FPGAs and machine education. FPGAs (Field Programmable Gate Array) Instant perspectives, possible future themes, knowledge exchange, excellent content and Team variance are used to build machine learning. In this popular sentiment network, several disasters have seriously threatened the security of our community. Public views on disaster networks in all type of internet media, such as internet news, blogs and webpages, are inextricably connected with society. This plays into unprecedented stress the ability of the government to deal with crises and their consequences.A new modification of Kalman filter algorithm
https://ijnaa.semnan.ac.ir/article_5221.html
This study is concerned with estimating random data and in the presence of noise, as we used the Kalman filter estimation method through the backpropagation algorithm to estimate these data. This is because modern estimation methods have become more important as they were in the past years due to the expansion of the field of science and technology and the increasing data Therefore, the interest became in estimation methods that solve the noise problems that occur in the data. The Kalman filter has become one of the most popular and most reliable estimators in case of data noise. This study tests the use of the Kalman filter and Back Propagation algorithm to estimate the data containing noise and compare the results with the proposed method on the same data. The data is generated randomly in the simulation study. The results showed that Kalman is more efficient in filtering noise from the data and giving a lower mean square error compared to the backpropagation algorithm, but the results of the proposed method outperformed the results of the Kalman filter and the backpropagation with the least possible error.The generalized (2 + 1) and (3+1)-dimensional with advanced analytical wave solutions via computational applications
https://ijnaa.semnan.ac.ir/article_5222.html
The analytical solutions for an important generalized Nonlinear evolution equations NLEEs dynamical partial differential equations (DPDEs) that involve independent variables represented by the (2 + 1)-dimensional breaking soliton equation, the (2 + 1)-dimensional Calogero--Bogoyavlenskii--Schiff&nbsp; (CBS) equation, and the (2 +1)-dimensional Bogoyavlenskii's breaking soliton equation (BE), and some new exact propagating solutions to a generalized (3+1)-dimensional KP equation with variable coefficients are constructed by using a new algorithm of the first integral method (NAFIM) and determined some analytical solutions by appointing special values of the parameters. In addition to that, we showed a new variety and unique travelling wave solutions by graphical illustration with symbolic computations.Modelling covid-19 data using double geometric stochastic process
https://ijnaa.semnan.ac.ir/article_5224.html
Some properties of the geometric stochastic process (GSP) are studied along with those of a related process which we propose to call the Double geometric stochastic process (DGSP), under certain conditions. This process also has the same advantages of tractability as the geometric stochastic process; it exhibits some properties which may make it a useful complement to the multiple Trends geometric stochastic process. Also, it may be fit to observed data as easily as the geometric stochastic process. As a first attempt, the proposed model was applied to model the data and the Coronavirus epidemic in Iraq to reach the best model that represents the data under study. A chicken swarm optimization algorithm is proposed to choose the best model representing the data, in addition to estimating the parameters a, b, \(\mu\), and \(\sigma^{2}\) of the double geometric stochastic process, where&nbsp;\(\mu\) and \(\sigma^{2}\) are the mean and variance of \(X_{1}\), respectively.Improvement in credit card fraud detection using ensemble classification technique and user data
https://ijnaa.semnan.ac.ir/article_5228.html
Financial fraud is a serious problem in banking system. Credit card fraud is growing with increasing Internet usage, as it becomes very simple to collect user data and do fraud transaction. Fortunately, all records including fraud and legit transactions are present in the financial record. Improved data mining techniques are now capable to find solutions for such outlier detections. Financial data is freely available in many sources, but this data has some challenges like,1) the profile of legit and fraudulent behavior changes constantly, 2) there is a class imbalance problem in dataset, because less than 3% transaction are fraud, 3) transaction verification latency is also one more problem. All this data issues are handled using pre-processing techniques like cleaning and reduction. Main aim of this research is to find out, output attribute "is Fraud", with better time complexity. To this end, K-means, Random Forest and J48 algorithm is used, and its accuracy rates are compared to find best fit pre-processing and machine learning algorithm. It is observed that accuracy rate of Random Forest is 93.8% when both global and local dataset is used.Viscous dissipation and thermal radiation effects on the flow of Maxwell nanofluid over a stretching surface
https://ijnaa.semnan.ac.ir/article_5229.html
An analysis is made to examine the viscous dissipation and thermal effects on magneto hydrodynamic mixed convection stagnation point flow of Maxwell nanofluid passing over a stretching surface. The governing partial differential equations are transformed into a system of ordinary differential equations by utilizing similarity transformations. An effective shooting technique of Newton is utilize to solve the obtained ordinary differential equations. Furthermore, we compared our results with the existing results for especial cases. which are in an excellent agreement. The effects of sundry parameters on the velocity, temperature and concentration distributions are examined and presented in the graphical form. These non-dimensional parameters are the velocity ratio parameter $(A)$, Biot number $(Bi$), Lewis number $(Le)$, magnetic parameter $(M)$, heat generation/absorption coefficients $\left(A^*,B^*\right)$, visco-elastic parameters $\left(\beta\right)$, Prandtl number $(Pr)$, Brownian motion parameter $(Nb)$,&nbsp; Eckert number $\left(Ec\right)$, Radiation parameter $\left(R\right)$ and local Grashof number $(Gc;\ Gr).$
An analysis is made to examine the viscous dissipation and thermal effects on magneto hydrodynamic mixed convection stagnation point flow of Maxwell nanofluid passing over a stretching surface. The governing partial differential equations are transformed into a system of ordinary differential equations by utilizing similarity transformations. An effective shooting technique of Newton is utilize to solve the obtained ordinary differential equations. Furthermore, we compared our results with the existing results for especial cases. which are in an excellent agreement. The effects of sundry parameters on the velocity, temperature and concentration distributions are examined and presented in the graphical form. These non-dimensional parameters are the velocity ratio parameter $(A)$, Biot number $(Bi$), Lewis number $(Le)$, magnetic parameter $(M)$, heat generation/absorption coefficients $\left(A^*,B^*\right)$, visco-elastic parameters $\left(\beta\right)$, Prandtl number $(Pr)$, Brownian motion parameter $(Nb)$,&nbsp; Eckert number $\left(Ec\right)$, Radiation parameter $\left(R\right)$ and local Grashof number $(Gc;\ Gr).$New common best proximity point theorems in complete metric space with weak $P$-property
https://ijnaa.semnan.ac.ir/article_5230.html
In this paper, we define $\phi$-contraction, after that; we obtained the common best proximity point results for different types of contractions in the setting of complete metric spaces by using weak p-property and proved the uniqueness of these points. Also, we presented an example to support our results.Fixed point theorems of non-commuting mappings in b-multiplicative metric spaces
https://ijnaa.semnan.ac.ir/article_5231.html
In this paper, we discuss some common fixed point theorems for compatible mappings of type $(E)$ and $R-$weakly commuting mappings of type $(P)$ of a complete $b-$multiplicative metric space along with some examples. As an application, we establish an existence and uniqueness theorem for a solution of a system of multiplicative integral equations. In the last section, we introduce the concept of $R-$multiplicative metric space by giving some examples and at the end of the section, we give an open question.Best proximity point theorems by $K$, $C$ and $\mathcal{MT}$ types in $b$-metric spaces with an application
https://ijnaa.semnan.ac.ir/article_5232.html
In this paper, we introduce the concept of weak $\mathcal{MT}-K$ rational cyclic and weak $\mathcal{MT}-C$&nbsp; rational cyclic conditions and a combination of both conditions in what we call weak $\mathcal{MT}-KC$ rational cyclic condition. We investigate some best proximity points theorems for a pair of mappings that satisfy these conditions that have been established in $b$-metric spaces. Our results include an application to the nonlinear integral equation as well.Dynamic investment portfolio optimization using a multivariate Merton model with correlated jump risk
https://ijnaa.semnan.ac.ir/article_5233.html
&lrm;In this paper&lrm;, &lrm;we are concerned with the optimization of a dynamic investment portfolio when the securities which follow a multivariate Merton model with dependent jumps are periodically invested and proceed by approximating the Condition-Value-at-Risk (CVaR) by comonotonic bounds and maximize the expected terminal wealth&lrm;. &lrm;Numerical studies&lrm;, &lrm;as well as applications of our results to real datasets&lrm;, &lrm;are also provided&lrm;.Some properties of generalized fundamentally nonexpansive mappings in Banach spaces
https://ijnaa.semnan.ac.ir/article_5234.html
In this paper, we introduce a condition on mappings and show that the class of these mappings is broader than both the class of mappings satisfying condition (C) and the class of fundamentally nonexpansive mappings, and it is incomparable with the class of quasi-nonexpansive mappings and the class of mappings satisfying condition (L). Furthermore, we present some convergence theorems and fixed point theorems for mappings satisfying the condition in the setting of Banach spaces. Finally, an example is given to support the usefulness of our results.A secure ECG signal transmission for heart disease diagnosis
https://ijnaa.semnan.ac.ir/article_5235.html
Due to the high sampling rate, the recorded Electrocardiograms (ECG) data are huge. For storing and transmitting ECG data, wide spaces and more bandwidth are therefore needed. The ECG data are also very important to preprocessing and compress so that it is distributed and processed with less bandwidth and less space effectively. This manuscript is aimed at creating an effective ECG compression method. The reported ECG data are processed first in the pre-processing unit (ProUnit) in this method. In this unit, ECG data have been standardized and segmented. The resulting ECG data would then be sent to the Compression Unit (CompUnit). The unit consists of an algorithm for lossy compression (LosyComp), with a lossless algorithm for compression (LossComp). The randomness ECG data is transformed into high randomness data by the failure compression algorithm. The data's high redundancy is then used with the LosyComp algorithm to reach a high compression ratio (CR) with no degradation. The LossComp algorithms recommended in this manuscript are the Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). LossComp algorithms such as Arithmetic Encoding (Arithm) and Run Length Encoding (RLE) are also suggested. To evaluate the proposed method, we measure the Compression Time (CompTime), and Reconstruction Time (RecTime) (T), RMSE and CR. Simulation results suggest the highest output in compression ratio and in complexity by adding RLE after the DCT algorithm. The simulation findings indicate that the inclusion of RLE following the DCT algorithm increases performance in terms of CR and complexity. With CR = 55% with RMSE = 0:14 and above 94% with RMSE = 0:2, DCT as a LossComp algorithm was utilized initially, followed by RLE as a LossComp algorithm.Modelling US-China relationship: A game theory perspective
https://ijnaa.semnan.ac.ir/article_5237.html
Relation between China and the US is one of the most complex relations among the major powers in the world. The aim of this paper is to model China and the US economic relations. We used the new system named Dynamic system of strategic games for this purpose.Analysing the impact of the parametric model correction of premium rate on financing social security's long-term commitments using actuarial knowledge
https://ijnaa.semnan.ac.ir/article_5238.html
This survey involves the examination of the rate change that is the right to have insurance is one three parametric models (premium rate, experience and age of retirement in financing social security organization by using actuary knowledge and computational software such as ILO-PENS. The statistical population of this survey is the social security organization of the Islamic Republic of Iran. The population and community, are variables because they are huge, there is not statistical sample. And to achieve the hypothesis goal which is based on the total number of the insured persons, pensioners and the source of income of the organization from 2013 &ndash; 2019as well as estimating the number of resources available in order to fulfil long term commitment it is actuarial calculations in long term period for commitment payment in long term. In this study the effect of change in rate, insurance right is 1%-5% and the effect is considered over 70 years&rsquo; time, on the sustainability resource of the organization and it is measured and examined. In addition, considering the limitation and risk taken from these implements of the parameter are described below and according to the results obtained in case of application, the point of balance was postponed until 1413, and during this time, the necessary resources for paying the commitment is provided. The short gap is an opportunity for the social security organization, to have enough time for long term planning which is a structured reform.Variable coefficient fractional partial differential equations by Base--Chebyshev method
https://ijnaa.semnan.ac.ir/article_5239.html
In this paper, the invariant subspace method is generalized and improved and is then used together with the Chebyshev polynomial to approximate the solution of the non-linear, mixed fractional partial differential equations $FPDEs$&nbsp; with constant, non-constant coefficients. Some examples are given here to illustrate the efficiency of this method.Nonlinear fractional differential equations with advanced arguments
https://ijnaa.semnan.ac.ir/article_5240.html
In this paper, we develop the existence and uniqueness theory of fractional differential equation involving Riemann-Liouville differential operator of order $0 &lt; \alpha&lt; 1$, with advanced argument and integral boundary conditions. We investigate the uniqueness of the solution by using Banach fixed point theorem, we apply the comparison result to obtain the existence and uniqueness of solution by monotone iterative technique also by using weakly coupled extremal solution for the nonlinear boundary value problem (BVP). As an application of this technique, existence and uniqueness results are obtained.Fixed points of a new class of compatible mappings satisfying an implicit relation via inverse $C$-lass function
https://ijnaa.semnan.ac.ir/article_5258.html
In this paper, we establish some common fixed point theorems of a new class of compatible mappings satisfying an implicit relation via inverse $C$-class function.Function weighted $\mathcal{G}$-metric spaces and Hausdorff $\Delta$-distances; an application to fixed point theory
https://ijnaa.semnan.ac.ir/article_5259.html
In this paper, we introduce a new space which is a generalization of function weighted metric space introduced by Jleli and Samet [On a new generalization of metric spaces, J. Fixed Point Theory Appl. 2018, 20:128] where namely function weighted $\mathcal{G}$-metric space. Also, a Hausdorff $\Delta$-distance is introduced in these spaces. Then several fixed point results for both single-valued and multi-valued mappings in such spaces are proved. We also construct some examples for the validity of the given results and present an application to the existence of a solution of the Volterra-type integral equation.Training analysis of optimization models in machine learning
https://ijnaa.semnan.ac.ir/article_5261.html
Machine learning is fast evolving, with numerous theoretical advances and applications in a variety of domains. In reality, most machine learning algorithms are based on optimization issues. This interaction is also explored in the special topic on machine learning and large-scale optimization. Furthermore, machine learning optimization issues have several unique characteristics that are rarely seen in other optimization contexts. Aside from that, the notions of classical optimization vs machine learning will be discussed. Finally, this study will give an outline of these particular aspects of machine learning optimization.Explaining the role of financial leverage speed of adjustment (SOA) during the firm life cycle
https://ijnaa.semnan.ac.ir/article_5266.html
This paper analyzes differences in speed of adjustment (SOA) across three life cycle stages of European listed firms: introduction, growth, maturity, decline, and fall. Dickenson's model based on cash flow has been used to divide different periods. For this purpose, the role of four determinants of profitability and intangible assets, growth opportunities, and size on SOA was investigated using the GMM (generalized torque) method. For this purpose, 153 firms listed firms on the Tehran Stock Exchange in the ten years 2009-2019 were selected, and data were analyzed by Stata and Eviews software. The results do not support by trade-off theory (TOT) and pecking order theory (POT) because according to these theories, the SOA of financial leverage is not completed during different stages of the life cycle. Higher speed in the introduction stage provides a different analysis than the growth stage. In addition, results show a lower increase in costs for firms that change from growth to maturity than for firms that change from introduction to growth.On the complex SEE change and systems of ordinary differential equations
https://ijnaa.semnan.ac.ir/article_5267.html
In this paper, we present the properties and meaning of the new indispensable change, called complex SEE the change. Farther, we use the complex SEE integral change to solve systems of ordinary differential equations (ODEs).Weak subsequential continuity in fuzzy metric spaces and application
https://ijnaa.semnan.ac.ir/article_5276.html
Compatibility of type (E) and weak subsequential continuity is utilized in a fuzzy metric space for the existence of a common fixed point. Illustrations and an application are stated to elucidate our outcomes.Improving air pollution detection accuracy and status monitoring based on supervised learning systems and Internet of Things
https://ijnaa.semnan.ac.ir/article_5278.html
In recent decades air pollution and its associated health risks are&nbsp;in growing numbers. Detecting &lrm;air pollution in the environment and&nbsp;alarming the people may accomplish various advantages &lrm;among health monitoring, telemedicine, and industrial sectors. A novel method of detecting air &lrm;pollution using supervised learning models and an&nbsp;alert system using IoT is proposed. The main &lrm;aim of the research&nbsp;is manifold: a) Air pollution data is preprocessed using the feature&nbsp;scaling &lrm;method, b) The feature selection and feature extraction&nbsp;process done followed by performing a &lrm;Recurrent Neural Network and&nbsp;c) The predicted data is stored in the cloud server, and it provides&nbsp;&lrm;the end-users with an alert when the threshold pollution index&nbsp;exceeds. The proposed RNN &lrm;reports enhanced performance when tested&nbsp;against traditional machine learning models such as &lrm;Convolutional&nbsp;Neural Networks (CNN), Deep Neural Networks(DNN), and Artificial&nbsp;Neural &lrm;Networks(ANN) for parameters such as accuracy, specificity,&nbsp;and sensitivity.&lrm;A Novel deep learning framework for improving the quality of services using block chain technology
https://ijnaa.semnan.ac.ir/article_5280.html
Electronic Health Record (EHR) holds immensely sensitive information&nbsp;and consisting of &lrm;crucial data related to the patients.&nbsp; Storing&nbsp;and organizing such data is highly arduous task.&nbsp; &lrm;Researches still&nbsp;going on to improve the Quality of Service (QOS) of such data.&nbsp;Existing &lrm;study focused only on improving the system throughput,&nbsp;privacy and latency issues.&nbsp; But they &lrm;did not tend to scrutinize&nbsp;the scalability and privacy of such data records.&nbsp; In this paper, we&nbsp;&lrm;propose a novel deep learning framework to improve the Quality of&nbsp;Service using block chain &lrm;technology.&nbsp; Initially the data is&nbsp;classified into high priority and low priority based on its &lrm;nature&nbsp;by using Recurrent Neural Network (RNN).&nbsp; Then, the classified high&nbsp;priority data is &lrm;further allowed to each block of a block chain and&nbsp;the low priority data is stored and &lrm;maintained as log file.&nbsp;Finally, the results are compared based on the evaluation metrics&nbsp;&lrm;which demonstrates our proposed novel deep learning framework&nbsp;achieves better accuracy. &nbsp;Using alignment-free methods as preprocessing stage to classification whole genomes
https://ijnaa.semnan.ac.ir/article_5281.html
In bioinformatics systems, the study of genetics is a popular research discipline. These systems depend on the amount of similarity between the biological data. These data are based on DNA sequences or raw sequencing reads. In the preprocessing stage, there are several methods for measuring similarity between sequences. The most popular of these methods is the alignment method and alignment-free method, which are applied to determine the amount of functional matching between sequences of nucleotides DNA, ribosome&nbsp; RNA, or proteins. Alignment-based methods pose a great challenge in terms of computational complexity, In addition to delaying the time to search for a match, especially if the data is heterogeneous and its size is huge, and thus the classification accuracy decreases in the post-processing stage. Alignment-free methods have overcome the challenges of alignment-based methods for measuring the distance between sequences, The size of the data used is 1000 genomes uploaded from National Center for Biotechnology Information (NCBI), after eliminating the missing and irrelevant values, it becomes 860 genomes, ready to be segmented into words by the k-mer analysis, after which the frequency of each word is counted for each query. The size of a word depends on a value of k. In this paper we used a value of k =3 &hellip;.8, for each iteration will count times of frequencies words.Origin-destination trip pattern representative by using bluetooth data collection on the arterial road network, Bangkok, Thailand
https://ijnaa.semnan.ac.ir/article_5282.html
In this paper, an efficient GV1-CG is developed to optimizing the modified conjugate gradient algorithm by using a new conjugate property. This is to increase the speed of the convergence and retain the characteristic mass convergence using the conjugate property. This used property is proposed to public functions as it is not necessary to be a quadratic and convex function.&nbsp; The descent sharp property and comprehensive convergence for the proposed improved algorithm have been proved. Numerical results on some test function indicate that the new CG-method outperforms many of the similar methods in this field.Resilience in semantic networks: A new approach for studying language impairment in Alzheimer's disease
https://ijnaa.semnan.ac.ir/article_5284.html
Language Impairment in Alzheimer's disease can occur because of deficits in semantic levels of language processing. It can be studied using computational models of language such as complex semantic networks which are strongly related to semantic memory. We hypothesize that the concept of resilience in scale-free semantic networks can truly model and predict semantic language deficit in Alzheimer's disease. We suggest that increasing the variety of words in the lexicon of patients with Alzheimer's disease, improves the resilience of their semantic networks through breakdowns. Moreover, enlarging the size of the semantic networks of patients with Alzheimer's disease can make these networks more resilient.An intellectual procurement innovation of smart grid power system with wireless communication networks based on machine learning
https://ijnaa.semnan.ac.ir/article_5285.html
The phased array antenna is one of the most significant applications in fifth-generation mobile networks. It is one of the most important applications in fifth-generation networks. An electric power source that powers the whole application, including the antenna's root, is required. Even with the most outstanding design, if the programme does not have a sound power supply system with minimal packet loss and can't Path find performance, it will be rendered ineffective. When seen from the perspective of the multiplex information, Machine Learning comprises a communication network based on the Internet that transmits information to the control centre via the objects (IOT). To put it another way, the proposed communication infrastructure, via the provision of, and the chance micro-grid state to collect, analyze, and two-way communication link control information, offers the chance to resolve the voltage regulation issues. This cutting-edge communication infrastructure, as well as a suggested state estimation filter focused on improving speed and performance in renewable energy production, are both examples of creative communication infrastructure. Current research is focused on analyzing and enumerating a range of energy abundances in the context of smart grids, which are now in their fifth generation. Rather than concentrating on the future development plan, which should be a problem of illusion, it should concentrate on the composition of the future potential of smart grid communications framework. An in-depth investigation to give evidence to the Machine learning will help intelligent networks in the future conduct a thorough evaluation.Walsh functions and their applications to solving nonlinear fractional Volterra integro-differential equation
https://ijnaa.semnan.ac.ir/article_5286.html
In this article&lrm;, &lrm;we extended an efficient computational&lrm; &lrm;method based on Walsh operational matrix to find an approximate&lrm; &lrm;solution of nonlinear fractional order Volterra integro-differential&lrm; &lrm;equation&lrm;, &lrm;First&lrm;, &lrm;we present the fractional Walsh operational&lrm; &lrm;matrix of integration and differentiation&lrm;. &lrm;Then by applying this&lrm; &lrm;method&lrm;, &lrm;the nonlinear fractional Volterra integro-differential&lrm; &lrm;equation is reduced into a system of algebraic equation&lrm;. &lrm;The&lrm; &lrm;benefits of this method are the low-cost of setting up the equations&lrm;&nbsp;&lrm;without applying any projection method such as collocation&lrm;, &lrm;Galerkin&lrm;, &lrm;etc&lrm;. &lrm;The results show that the method is very accuracy and &lrm;efficiency.&lrm;Parametric regression analysis of bivariate the proportional hazards model with current status data
https://ijnaa.semnan.ac.ir/article_5289.html
In this paper, we show the maximum sieved probability of each of the finite Dimensional parameters in a marginal Proportional Hazards risk model with bivariate current position data. We used the copula model to model the combined distribution of bivariate survival times. Simulation studies reveal that the proposed estimations for it have good finite sample properties.Numerical solutions of Abel integral equations via Touchard and Laguerre polynomials
https://ijnaa.semnan.ac.ir/article_5290.html
In this article, two numerical methods based on Touchard and Laguerre polynomials were presented to solve Abel integral (AI) equations. Touchard and Laguerre matrices were utilized to transform Abel integral equations into an algebraic system of linear equations. Solve this system of these equations to obtain Touchard and Laguerre parameters. Four examples are given to demonstrate the presented methods. The solutions were compared with the solutions in the literature.The impact of diffusion of innovation model on user behavioral intention in adopting social media marketing
https://ijnaa.semnan.ac.ir/article_5291.html
Social media has become a new orientation and attitude for businesses today. Tools and methods for communicating with the customers have changed enormously with the revelation of social media and it has become a channel and an instrument that marketers can extend their marketing campaigns to a wider range of consumers. The research purpose of this article is to analyze the impact of diffusion of innovation model on behavioral intention in adopting social media marketing with the moderator role of subjective norms in Iranian users.&nbsp; By making use of an online exploration, this study gathers data from 253 experienced social-media users in Iran. We have utilized partial least squares structural equation modeling to examine the links between items of diffusion of innovation model, social media marketing adoption, behavioral intention and subjective norms. The results revealed that diffusion of innovation influence was found as a nominative determinant of users&rsquo; behavioral intention to adopting social media marketing while behavioral intentions were also found to have positive significant association towards users&rsquo; behavioral intention to adopt social media marketing. In addition, the results of the empirical study showed that subjective norms moderated the relation between diffusion of innovation and customer behavioral intention.Solution of Riccati matrix differential equation using new approach of variational iteration method
https://ijnaa.semnan.ac.ir/article_5292.html
To obtain the approximate solution to Riccati matrix differential&nbsp;equations, a new variational iteration approach was &lrm;proposed, which&nbsp;is suggested to improve the accuracy and increase the convergence&nbsp;rate of the approximate solutons to the &lrm;exact solution. This&nbsp;technique was found to give very accurate results in a few number of&nbsp;iterations. In this paper, the &lrm;modified approaches were derived to&nbsp;give modified solutions of proposed and used and the convergence&nbsp;analysis to the exact &lrm;solution of the derived sequence of&nbsp;approximate solutions is also stated and proved. Two examples were&nbsp;also solved, which &lrm;shows the reliability and applicability of the&nbsp;proposed approach. &lrm;Some applications of independent compatible edges topology
https://ijnaa.semnan.ac.ir/article_5293.html
In this article some applications of independent compatible edges topology &tau;ICE on directed graphsare introduced. This application includes some aspects. Firstly, medical applications such as voluntary movement of the muscle, work of heart, and pathway involving with neural sensation and motorresponse. Secondly, vital applications such as world wide web and operational problems recovery inairlines. Right Γ-n-derivations in prime Γ-near-rings
https://ijnaa.semnan.ac.ir/article_5294.html
The main purpose of this paper is to study and investigate some results of right &Gamma;-n-derivation on prime &Gamma;-near-ring G which force G to be a commutative ring.A secure biomedical data sharing framework based on mCloud
https://ijnaa.semnan.ac.ir/article_5295.html
Medical Clouds (mCloud) utilized various wearable devices and sensors for better care for patients by encouraging the perspective of the clouds. It gives a more versatile way to centrally and in real-time compare the patients&rsquo; profiles in the conventional health-offline system. However, due to the lack of appropriate security measures in low-power computers, there are obstacles to data protection. The limitation made the data vulnerable to hacking and tamper when it transfers from one device to another. In available solutions, the devices send unencrypted data to a central server where it encrypts and forwards, on-demand, to requesting devices. There are two primary challenges in the approach: first, the data link is still vulnerable between the source device and central server; second, the response time of the server gets slower with an increasing number of devices. This manuscript proposes a secure and faster-distributed method, which shares a patient&rsquo;s data by various devices connected to the mCloud with health caregivers without the need for the centralized server. The research harnesses the power of other locally available mCloud and related devices that have more computational capability. Our experimental results demonstrate that with the number increasing of mCloud devices on the network, the percentage of encrypted data transmissions also increase since there are more chances to find a nearby secure device. Results further shows a decrease in the total response time from 0.6ms to 0.4ms utilizing the proposed distributed vs centralized system.Study the effect of Islamic derivatives during financial crises of 2008 using Translog function, a case study of Iraq
https://ijnaa.semnan.ac.ir/article_5297.html
This research uses a statistical method to assess the efficiency and performance of Islamic and conventional banks.&nbsp; The Iraqi banks have been chosen as a case study in the period from 2006 to 2011. The data collected from, banks' financial reports, IMF database, the cost function and Seemingly Unrelated Regression were used to analyse the Iraqi bank's elasticity of substitution between inputs. It has been shown that the conventional banks in Iraq have better substitution than Islamic banks.&nbsp; In conclusion, the Islamic and conventional banks are exposed to a similar degree of risks, but different in nature; and the Islamic banks have less security than conventional banks to financial shocks. Since the Islamic banks cannot charge a fixed, predetermined return, and can't borrow from the financial market, so the Islamic banks could face more risk and volatile returns on their assets. The implication of that an excessive management modernization of Islamic banks is necessary to achieve a higher level of efficiency. This will give privilege for Islamic banks over the conventional bank. For conventional banks, they have to invent similar techniques to reduce cost and keep their position in the market.Mixed fractional partial differential equations by the base method
https://ijnaa.semnan.ac.ir/article_5309.html
&nbsp;In this paper, the invariant subspace method is generalized and improved and is then used to have an exact solution for a wide class of the linear/ non-linear mixed fractional partial differential equations $(FPDEs)$; with constant, non-constant coefficients.&nbsp; Some examples are given here to illustrate the efficiency of this method.Supply chain with fuzzy analytic hierarchy process (AHP): A case study
https://ijnaa.semnan.ac.ir/article_5310.html
To achieve real competition in the global market requires the manufacturers to have the ability to meet the needs and demands of their customers, which comes from the optimal planning of the supply chain. In this paper, consideration is given to the supply chain with multi-providers of raw materials, multi-manufacturing locations, multi- centres of selling products to customers in multiple, with instability (fuzzy) of customer demands, holding costs, costs of appointment, retire and training of workforce After building a mathematical model for the supply chain that aims to maximize the net profit and reduce all costs that include production costs, labour, raw materials, storage, transportation, and the cost shortage, the model was improved through a proposal that the decision-maker has a desire to prefer one manufacturing location over another, as the proposal relied on developing a pairwise comparison in the Analytic Hierarchy Process (AHP) when the degree of comparison between factory locations is a fuzzy nature. The results of the proposed model were applied to actual data taken from an industrial organization.Study of the rings in which each element express as the sum of an idempotent and pure
https://ijnaa.semnan.ac.ir/article_5311.html
&nbsp;This article aims to introduce the concept of $p-\mathrm{clean\ ring}\mathrm{s}$ as a generalization of some concepts such as $\mathrm{clean\ rings}$ and $r-\mathrm{clean\ rings}$. As the first result, we prove that every $\mathrm{clean\ ring}$ is a $p-\mathrm{clean\ ring}$ and every $r-\mathrm{clean\ ring}$ is a $p-\mathrm{clean\ ring}$. Furthermore, we give the relation between von Neumann $\mathrm{local\ ring}$ and $p-\mathrm{clean\ ring}$. Finally,&nbsp; we investigate many properties of $p-\mathrm{clean\ ring}\mathrm{s}$.Application of modify RSA cryptography and randomly LSB steganography on color images of fluid flow in a channel
https://ijnaa.semnan.ac.ir/article_5312.html
This paper introduces a combination of three methods including a modified RSA cryptography, hidden text using steganography, and selection of random pixel from image to improve the general security level of the system. In this regard, the image is a carrier of the information transmitted through the media, and the fluid motion image is used to hide the information after it was encoded using modify RSA technique that before hiding it in a random way, because the image of fluid motion possesses the sinusoidal waves and turbulent motion.&nbsp; In this paper, a combination of three techniques is utilized in order to prevent the intruders and attackers from detecting the information and sharing it with others. LSB technique is used for hiding the message in image-based steganography. In addition, pseudo number to choose the random number of pixel when hiding the message after encryption. Four measures including Peak Signal to Noise Ratio (PSNR), Mean Squared Error (MSE), Structural Similarity Index Measure (SSIM), and histogram are used to compare the original image and stego-image. The results demonstrated the outperformance of the proposed method so that neither the attacker nor the intruder could discover the information contained within the image, due to the large value of the PSNR, very small value of the MSE, stability of the SSIM, and matching the histograms.Entire functions and some of their growth properties on the basis of generalized order (α,β)
https://ijnaa.semnan.ac.ir/article_5313.html
For any two entire functions $f$, $g$ defined on finite complex plane $\mathbb{C}$, the ratios $\frac{M_{f\circ g}(r)}{M_{f}(r)}$ and $\frac{M_{f\circ g}(r)}{M_{g}(r)}$ as $r\rightarrow \infty $ are called the growth of composite entire function $f\circ g$ with respect to $f$ and $g$ respectively in terms of their maximum moduli. Several authors have worked about growth properties of functions in different directions. In this paper, we have discussed about the comparative growth properties of $f\circ g$, $f$ and $g,$ and derived some results relating to the generalized order $(\alpha ,\beta )$ after revised the original definition introduced by Sheremeta, where $\alpha ,$ $\beta $ are slowly increasing continuous functions defined on $(-\infty,+\infty )$. Under different conditions, we have found the limiting values of the ratios formed from the left and right factors on the basis of their generalized order $(\alpha ,\beta )$ and generalized lower order $(\alpha,\beta ),$ and also established some inequalities in this regard.On the dynamical behavior of an Eco-Epidemiological model
https://ijnaa.semnan.ac.ir/article_5314.html
The aim of this article is to study the dynamical behavior of an eco-epidemiological model. A prey-predator model comprising infectious disease in prey species and stage structure in predator species is suggested and studied. Presumed that the prey species growing logistically in the absence of predator and the ferocity process happened by Lotka-Volterra functional response. The existence, uniqueness, and boundedness of the solution of the model are investigated. The stability constraints of all equilibrium points are determined. The constraints of persistence of the model are established. The local bifurcation near every equilibrium point is analyzed. The global dynamics of the model are investigated numerically and confronted with the obtained outcomes.A hybrid semi-supervised boosting to sentiment analysis
https://ijnaa.semnan.ac.ir/article_5315.html
&nbsp;In this article, we propose a hybrid semi-supervised boosting algorithm to sentiment analysis. Semi-supervised learning is a learning task from a limited amount of labeled data and plenty of unlabeled data which is the case in our used dataset. The proposed approach employs the classifier predictions along with the similarity information to assign label to unlabeled examples. We propose a hybrid model based on the agreement among different constructed classification model based on the boosting framework to assign a final label to unlabeled data. The proposed approach employs several different similarity measurements in its loss function to show the role of the similarity function. We further address the main preprocessing steps in the used dataset. Our experimental results on real-world microblog data from a commercial website show that the proposed approach can effectively exploit information from the unlabeled data and significantly improves the classification performance.Implementation of hybrid cryptographic schemes in a cloud environment for enhanced medical data security
https://ijnaa.semnan.ac.ir/article_5316.html
Nowadays, several security architectures in cloud computing were employed in several applications, but they failed to secure the cloud data entirely. The current approaches use the ensemble algorithm for the decryption and encryption purpose to enhance the security technique. The input medical dataset is usually raw and might contain redundant packets and missing values. Initially, the data is preprocessed by means of the normalization technique. By using Enhanced Principal Component Analysis (EPCA) method, various attributes of the data can be obtained. After the extraction process, the classification mechanism is carried out for recognizing the attacks. The attack is predicted and is classified by means of the Adaptive AlexNet CNN classifier algorithm. A hybrid cryptographic technique in a cloud environment for improving the security rate and providing privacy preservation of the medical data in the cloud environment is presented. The proposed work mainly concentrates mostly on implementing hybrid cryptographic schemes which include AES algorithm, enhanced honeypot algorithm, SHA3 hashing and OTP in the cloud environment. It enhances the security of the data to a great extent. Thus, the presented technique is secured effectively that makes the intruders difficult to access the system as they need to attain control over servers.Fixed point theorems on orthogonal complete metric spaces with an application
https://ijnaa.semnan.ac.ir/article_5317.html
In this paper, we introduce the concept of orthogonal contractive mappings and prove some fixed point theorems for such contractions. We establish our results in orthogonal bounded complete metric spaces via the notion of $\tau-$distances. Moreover, an application to a differential equation is given.Essential-small fully stable modules
https://ijnaa.semnan.ac.ir/article_5318.html
We will add new types of modules over a ring $\mathfrak{R}$ called $\mathit{g}-$ small completely stable module and $\mathit{g}-$ small duo module, assuming $\mathfrak{R}$ is a ring with identity and $\mathcal{M}$ is a unitary left $\mathfrak{R}$-module. We also present the $\mathit{g}-$ small dual stable module, which is a duality. We show that our new ideas have characterization and a few properties.Classification of singular points of perturbed quadratic systems
https://ijnaa.semnan.ac.ir/article_5319.html
We consider the following two-dimensional differential system: \[ \left\{\begin{array}{l} \dot{x}=ax^{2}+bxy+cy^{2}+\Phi(x,y) \,, \\ \dot{y}=dx^{2}+exy+fy^{2}+\Psi(x,y) \,, \end{array} \right.\] in which $\lim_{(x,y)\rightarrow(0,0)}\frac{\Phi(x,y)}{x^{2}+y^{2}} = \lim_{(x,y)\rightarrow(0,0)}\frac{\Psi(x,y)}{x^{2}+y^{2}}=0$ and $\Delta=(af-cd)^{2}-(ae-bd)(bf-ce)\neq0 $. By calculating Poincare index and using Bendixson formula we will find all the possibilities under definite conditions for classifying the system by means of kinds of sectors around the origin which is an equilibrium point of degree two.Stability analysis of a diseased Prey - Predator - Scavenger system incorporating migration and competition
https://ijnaa.semnan.ac.ir/article_5320.html
In this paper, a prey-predator-scavenger model is proposed and analyzed. It is assumed that the model considered the effect of disease on the prey. Firstly, the existence, uniqueness and boundedness of the solution of the model are discussed. Secondly, we studied the existence and local stability of all equilibrium points. Furthermore, some of the Sufficient conditions of the global stability of the positive equilibrium are established using suitable Lyapunov functions. Finally, those theoretical results are demonstrated with numerical simulations.Studying the A4-Graphs for elements of order 3 in tits group T and Mathieu group M20
https://ijnaa.semnan.ac.ir/article_5321.html
Assume that $X$ is a subset of the finite group $G$. The A4-graph is known as a simple graph denoted by $ \mathcal{A}_4 (G, X) $ having $X$ as a vertex set and two vertices $ x, y \in X,$ is linked by an edges if $ x\neq y $ and $ {xy}^{-1} = {yx}^{-1} $. In this paper, we consider $ \mathcal{A}_4 (G, X) $ when $G$ is either Tits group T or Mathieu group $M_{20}$ and $X$ is $G$-conjugacy class of elements of order three. Valuable results reached, for example, disc structure, girth, clique number, and diameters of the A4-graph.A qualitative study of an Eco-Toxicant model with Anti-Predator behavior
https://ijnaa.semnan.ac.ir/article_5322.html
In this study, a mathematical model consisting of four species: first prey and second prey with stage structure and predator in the presence of toxicity and anti-predator has been proposed and studied using the functional response Holling's type IV and Lotka Volttra. The solution's existence, uniqueness, and boundedness have all been studied. All possible equilibrium points have been identified. The stability of this model has been studied. Finally, numerical simulations have been used to verify our analytical results.Qualitative study of an Eco-Toxicant model with migration
https://ijnaa.semnan.ac.ir/article_5323.html
In this article, an ecology toxicant food chain system with Lotka-Volterra functional response for predator population includes prey protection zone has been suggested and studied. Toxins are excreted by all organisms as a form of defence. The prey follows the logistic growth law. The equilibrium points have been established. The analytic approach has been used to investigate the local stability for each acceptable equilibrium point. The global dynamics of this model was studied using the Lyapunov function. Lastly, numerical simulations and graphical illustrations were used to back up our analytic results.Study of the generalized P-contractions on Banach spaces and uniqueness for stability fixed points
https://ijnaa.semnan.ac.ir/article_5324.html
This article aims to introduce some concepts such as $P$-contraction and&nbsp; $G-P$-contraction which are defined on Banach spaces as stronger forms of the concepts of&nbsp; $P$-contraction and \'{C}iric type generalized $P$-contraction defined on complete metric spaces, respectively. Furthermore, the relationship between these concepts have been discussed. Finally, the uniqueness of fixed point for the presented concepts has been investigated.A mathematical model for scheduling of transportation, routing, and cross-docking in the reverse logistics network of the green supply chain
https://ijnaa.semnan.ac.ir/article_5325.html
Cross-docking refers to the practices of unloading materials from inbound vehicles and then loading them directly into outbound ones. Removing or minimizing warehousing costs, space requirements, as well as inventory utilization, cross-docking simplifies supply chains and makes them deliver goods to markets in a faster and more efficient manner. Accordingly, a mixed-integer linear programming ($MILP $) model is developed in the present study to schedule transportation routing and cross-docking in a reverse logistics network ($RLN$). Furthermore, different traffic modes are also considered to reduce fuel consumption, which reduces emissions and pollution. The proposed model is a multi-product, multi-stage, and non-deterministic polynomial-time that is an NP-hard problem. We use the non-dominated sorting genetic algorithm II ($NSGA-II$) to solve the model. A numerical example has been solved to illustrate the efficiency of the method.The nonlinear effect in the performance of 4:2 Compressor
https://ijnaa.semnan.ac.ir/article_5326.html
In this article, we have designed a novel 4:2 QCA Compressor with a nonlinear effect. This can be considered as a new vision to design approximate Majority circuits with more than five-input. The main advantages of these ideas are the reduced number of QCA cells as well as power dissipation, increased speed, and improved cell area In addition, a novel hierarchy is introduced to optimize digital systems. The 4:2 Compressor circuit is selected as a benchmark. This circuit is simulated with some technologies such as CMOS, CNT, and QCA in different architectures. All results from power respective were compared. We have used QCADesigner and QCAPro for QCA Circuits, Hspice with 20nm-nfet PTM-MG model for CMOS circuits and Stanford CNFET 20nm model for CNT circuits as simulation tools to evaluate circuits.Generalized dynamic process for generalized $(\psi, S,F)$-contraction with applications in $b$-Metric Spaces
https://ijnaa.semnan.ac.ir/article_5327.html
In this paper, we develop the notion of $(\psi, F)$-contraction mappings introduced in \cite{wad1} in $b$-metric spaces. To achieve this, we introduce the notion of generalized multi-valued $(\psi, S, F)$-contraction type I mapping with respect to generalized dynamic process $D(S, T, x_0),$ generalized multi-valued $(\psi, S, F)$-contraction type II mapping with respect to generalized dynamic process $D(S, T, x_0),$ and establish common fixed point results for these classes of mappings in complete $b$-metric spaces. As an application, we obtain the existence of solutions of dynamic programming and integral equations. The results presented in this paper extends and complements some related results in the literature.Error correction model for estimating the relationship between GDP and inflation in the Iraqi economy (1990-2020)
https://ijnaa.semnan.ac.ir/article_5328.html
The relationship between economic growth and inflation a concern for many countries in the developed and developing world, and erected in developed countries, a lot of research to laparoscopy relationship in order to overcome the problems that may be exposed to the States as a result of this association. The current research is an attempt to explore the trends in this relationship in Iraq in order to determine the ranges that can affect or be affected by growth as a result of inflation, period $(1990-2020)$ was adopted to range time frame in which you can determine the nature of the relationship between the two variables as well have been taking data at their nominal value as terms of GDP growth for the accurate diagnosis of the impact of inflation has been relying on time-series analysis to prove the direction of the relationship, and the paper confirmed the conclusion that there are two methods of fundamental bond that link inflation and economic growth in Iraq.Identity of the connection curvature tensor of almost manifold C(λ)
https://ijnaa.semnan.ac.ir/article_5329.html
This paper aims to investigate the geometry of the projective curvature tensor and to obtain someidentities for this tensor. Several three classes of nearly infinite C(&lambda;) are distinguished and studied.$C^*$-metric spaces
https://ijnaa.semnan.ac.ir/article_5330.html
&lrm;The purpose of this article is to introduce the notion of an $\mathfrak{A}$-meter&lrm;, &lrm;as an operator-valued distance mapping on a set $X$ and investigating the theory of $\mathfrak{A}$-metric spaces&lrm;, &lrm;where $\mathfrak{A}$ is a noncommutative $C^*$-algebra&lrm;. &lrm;We demonstrate that each metric space may be seen as an $\mathfrak{A}$-metric space and that every $\mathfrak{A}$-metric space $(X,\delta)$ can be regarded as a topological space $(X,\tau_{\delta})$&lrm;.Time series analysis of the number of Covid-19 deaths in Iraq
https://ijnaa.semnan.ac.ir/article_5331.html
In this paper, the time series data for the number of deaths from Coronavirus (COVID-19) patients in Iraq were analyzed for the period&nbsp;from 4/3/2020 to 18/2/2021. ARCH, GARCH, and TGARCH models were applied due to the changing volatility of the series leading to a&nbsp;heteroscedastic variance. The appropriate models for the series were diagnosed and the best model was chosen and used for forecasting by the&nbsp;exponential smoothing methods. The comparison criterion used was the Root Mean Squared Error and the Sum of Squared Residuals. The most&nbsp;appropriate model for modeling and forecasting the Coronavirus deaths series in Iraq was diagnosed as TGARCH (1,1). Finally, the method of&nbsp;Holt-winter-additive forecasting was the best method among theA Novel Method for Detection of Fraudulent Bank Transactions using Multi-Layer Neural Networks with Adaptive Learning Rate
https://ijnaa.semnan.ac.ir/article_4562.html
Fraud refers to earn wealth including property, goods and services through immoral and non-legalchannels. Fraud has always been in action and experiences an increasing trend worldwide. Fraud infinancial transactions not only leads to losing huge financial resources, but also leads to reductionin trust of customers on using modern banking systems and hence, reduction in efficiency of thesystems and optimal management of financial transactions. In recent years, by emerging new tech-nologies of banking industry, new means of fraud are discovered. Although a new information systemcarry advantages and benefits, new opportunities are made for fraudsters. The applications of frauddetection methods encompasses detection of frauds in an organization, analysis of frauds and alsouser/customer behavior analytics in order to predict future behavior and reduce the fraud risks. Inrecent decades, employing new technologies in management of banking transactions has risen. Banks and financial institutions inevitably migrated from traditional banking to modern online banking to provide effective services. Although, the use of online banking systems improves the management of financial processes and speeds up services to customers of institutions, but some issues would also be carried. Financial frauds is one of the issues which organizations seek to prevent and reduceeffects. In this paper, a novel machine learning based model is presented to detect fraud in electronicbanking transactions using profile data of bank customers. In the proposed method, transactionaldata from banks are leveraged and a multi-layer perceptron neural network with adaptive learningrate is trained to prove the validity of a transaction and hence, improve the fraud detection in elec-tronic banking. The proposed method shows promising results compared with logistic regression andsupport vector machines.Energy Aware Multi Objective Algorithm for Task Scheduling on DVFS-Enabled Cloud Datacenters using Fuzzy NSGA-II
https://ijnaa.semnan.ac.ir/article_4666.html
Nowadays, energy consumption is curtailed in an effort to further protect the environment as well as to avoid service level agreement (SLA) breach, as critical issues in task scheduling on heterogeneous computing centers. Any reliable task scheduling algorithm should minimize energy consumption, makespan, and cost for cloud users and maximize resource utilization. However, reduction of energy consumption leads to larger makespan and decreases load balancing and customer satisfaction. Therefore, it is essential to obtain a set of non-domination solutions for these multiple, conflicting objectives, as a non-linear, multi-objective, NP-hard problem. This paper formulates the energy efficient task scheduling in green data centers as a multi-objective optimization problem so that fuzzy Non-dominated Sorting Genetic Algorithm 2 (NSGA-II) has been applied using the concept of Dynamic Voltage Frequency Scaling (DVFS). In this procedure, we adopted fuzzy crossover and mutation for optimal convergence of initial solutions. For this purpose, the binary variance function of gene values and the mean variance function of objective values are proposed for fuzzy control of mutation rate, increasing the variation in the optimal Pareto front as well as the correct frequency variance function of the processors engaged in scheduling to control the crossover rate. This serves to add the objective of indirect load balancing to the optimization objectives, thereby to replace the three-objective optimization process with four-objective optimization. In the experiments, the proposed NSGA-II with fuzzy algorithm is compared against the NSGA-II algorithm, involving three scheduling strategies namely Green, Time and Cost Oriented Scheduling Strategy. The simulation results illustrate that the newly method finds better solutions than others considering these objectives and with less iteration. In fact, the optimal Pareto solutions obtained from the proposed method improved the objectives of makespan, cost, energy and load balance by 4%, 17%, 1% and 13%, respectively.Coupled fixed point theorems in partially ordered complex valued metric spaces with application
https://ijnaa.semnan.ac.ir/article_4921.html
In this paper, we prove some coupled fixed point theorems for nonlinear contraction type&nbsp;mappings in complete complex valued metric spaces endowed with partial order. We support our results by establishing an illustrative example. Also we give an application of this results to the solution of the Urysohn type integral equations.&nbsp;