ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books
  • Articles  (5,787)
  • 2015-2019  (5,787)
  • 1980-1984
  • 1945-1949
  • Symmetry  (2,826)
  • 125093
  • Mathematics  (5,787)
  • Natural Sciences in General
  • Architecture, Civil Engineering, Surveying
Collection
  • Books
  • Articles  (5,787)
Years
Year
Topic
  • Mathematics  (5,787)
  • Natural Sciences in General
  • Architecture, Civil Engineering, Surveying
  • Physics  (1,021)
  • 1
    Publication Date: 2015-08-05
    Description: The multi-parameter character of supersymmetric dark-matter models implies the combination of their experimental studies with astrophysical and cosmological probes. The physics of the early Universe provides nontrivial effects of non-equilibrium particles and primordial cosmological structures. Primordial black holes (PBHs) are a profound signature of such structures that may arise as a cosmological consequence of supersymmetric (SUSY) models. SUSY-based mechanisms of baryosynthesis can lead to the possibility of antimatter domains in a baryon asymmetric Universe. In the context of cosmoparticle physics, which studies the fundamental relationship of the micro- and macro-worlds, the development of SUSY illustrates the main principles of this approach, as the physical basis of the modern cosmology provides cross-disciplinary tests in physical and astronomical studies.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Publication Date: 2015-08-05
    Description: In this paper, we study a generalized Zakharov–Kuznetsov equation in three variables, which has applications in the nonlinear development of ion-acoustic waves in a magnetized plasma. Conservation laws for this equation are constructed for the first time by using the new conservation theorem of Ibragimov. Furthermore, new exact solutions are obtained by employing the Lie symmetry method along with the simplest equation method.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2015-08-05
    Description: At the center of core technologies for a future cyber world, such as Internet of Things (IoT) or big data, is a context-rich system that offers services by using situational information. The field where context-rich systems were first introduced is near-field communication (NFC)-based electronic payments. Near-field Communication (NFC) integrated payment services collect the payment information of the credit card and the location information to generate patterns in the user’s consumption or movement through big data technology. Based on such pattern information, tailored services, such as advertisement, are offered to users. However, there is difficulty in controlling access to personal information, as there is a collaborative relationship focused on the trusted service manager (TSM) that is close knit to shared personal information. Moreover, in the case of Hadoop, among the many big data analytical technologies, it offers access control functions, but not a way to authorize the processing of personal information, making it impossible to grant authority between service providers to process information. As such, this paper proposes a key generation and distribution method, as well as a secure communication protocol. The analysis has shown that the efficiency was greater for security and performance compared to relation works.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Publication Date: 2015-08-05
    Description: We introduced an analysis to identify structural characterization of two-dimensional regular and amorphous networks. The analysis was shown to be reliable to determine the global network rigidity and can also identify local floppy regions in the mixture of rigid and floppy regions. The eigenmode analysis explores the structural properties of various networks determined by eigenvalue spectra. It is useful to determine the general structural stability of networks that the traditional Maxwell counting scheme based on the statistics of nodes (degrees of freedom) and bonds (constraints) does not provide. A visual characterization scheme was introduced to examine the local structure characterization of the networks. The eigenmode analysis is under development for various practical applications on more general network structures characterized by coordination numbers and nodal connectivity such as graphenes and proteins.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Publication Date: 2015-08-05
    Description: We study the Bäcklund transformations of integrable geometric curve flows in certain geometries. These curve flows include the KdV and Camassa-Holm flows in the two-dimensional centro-equiaffine geometry, the mKdV and modified Camassa-Holm flows in the two-dimensional Euclidean geometry, the Schrödinger and extended Harry-Dym flows in the three-dimensional Euclidean geometry and the Sawada-Kotera flow in the affine geometry, etc. Using the fact that two different curves in a given geometry are governed by the same integrable equation, we obtain Bäcklund transformations relating to these two integrable geometric flows. Some special solutions of the integrable systems are used to obtain the explicit Bäcklund transformations.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Publication Date: 2015-08-05
    Description: We suggest a diagrammatic model of computation based on an axiom of distributivity. A diagram of a decorated colored tangle, similar to those that appear in low dimensional topology, plays the role of a circuit diagram. Equivalent diagrams represent bisimilar computations. We prove that our model of computation is Turing complete and with bounded resources that it can decide any language in complexity class IP, sometimes with better performance parameters than corresponding classical protocols.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Publication Date: 2015-08-05
    Description: Information technology (IT) security has become a major concern due to the growing demand for information and massive development of client/server applications for various types of applications running on modern IT infrastructure. How has security been taken into account and which paradigms are necessary to minimize security issues while increasing efficiency, reducing the influence on transmissions, ensuring protocol independency and achieving substantial performance? We have found cryptography to be an absolute security mechanism for client/server architectures, and in this study, a new security design was developed with the MODBUS protocol, which is considered to offer phenomenal performance for future development and enhancement of real IT infrastructure. This study is also considered to be a complete development because security is tested in almost all ways of MODBUS communication. The computed measurements are evaluated to validate the overall development, and the results indicate a substantial improvement in security that is differentiated from conventional methods.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Publication Date: 2015-08-05
    Description: With the increase in the number of music files on various devices, it can be difficult to locate a desired file, especially when the title of the song or the name of the singer is not known. We propose a new query-by-singing/humming (QbSH) system that can find music files that match what the user is singing or humming. This research is novel in the following three ways: first, the Fourier descriptor (FD) method is proposed as the first classifier; it transforms the humming or music waveform into the frequency domain. Second, quantized dynamic time warping (QDTW) using symmetrical search space and quantized linear scaling (QLS) are used as the second and third classifiers, respectively, which increase the accuracy of the QbSH system compared to the conventional DTW and LS methods. Third, five classifiers, which include the three already mentioned along with the conventional DTW using symmetrical search space and LS methods, are combined using score level fusion, which further enhances performance. Experimental results with the 2009 MIR-QbSH corpus and the AFA MIDI 100 databases show that the proposed method outperforms those using a single classifier and other fusion methods.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Publication Date: 2015-08-05
    Description: We introduce, generate and study a family of supersymmetric displaced number states (SDNS) that can be considered generalized coherent states of the supersymmetric harmonic oscillator. The family is created from the seminal supersymmetric boson-fermion entangling annihilation operator introduced by Aragone and Zypman and later expanded by Kornbluth and Zypman. Using the momentum representation, the states are obtained analytically in compact form as displaced supersymmetric number states. We study their position-momentum uncertainties, and their bunchiness by classifying them according to their Mandel Q-parameter in phase space. We were also able to find closed form analytical representations in the space and number basis.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Publication Date: 2015-08-05
    Description: Virtual simulation technology has been considered as a highly efficient and cost-effective solution for a soldier training system, and evolved into diverse combinations of hardware and software. To maximize the virtual reality effect within a restricted space, a locomotion interface such as an omni-directional treadmill is introduced as a major component of a virtual simulator, therefore real time interaction between human and the virtual simulator becomes very important. Displacement and heading changes of the trainee are crucial information to control the virtual simulator when we implement highly reactive motion control for the omni-directional treadmill and interaction control of the virtual contents. This paper proposes a control parameter estimation algorithm for the virtual training simulator by using two types of motion capture sensors and presents the experimental results. Kinematic joint positions are analyzed to estimate the trainee’s location and velocity for feedback and feedforward control of the omni-directional treadmill. The accuracy of two approaches is evaluated by comparing with the reference system, which gives a ground truth value.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Publication Date: 2015-08-05
    Description: Continuous flow processes have recently emerged as a powerful technology for performing chemical transformations since they ensure some advantages over traditional batch procedures. In this work, the use of commercially available and affordable PEEK (Polyetheretherketone) and PTFE (Polytetrafluoroethylene) HPLC (High Performance Liquid Chromatography) tubing as microreactors was exploited to perform organic reactions under continuous flow conditions, as an alternative to the commercial traditional glass microreactors. The wide availability of tubing with different sizes allowed quickly running small-scale preliminary screenings, in order to optimize the reaction parameters, and then to realize under the best experimental conditions a reaction scale up for preparative purposes. The gram production of some Active Pharmaceutical Ingredients (APIs) such as (S)-Pregabalin and (S)-Warfarin was accomplished in short reaction time with high enantioselectivity, in an experimentally very simple procedure.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Publication Date: 2015-08-05
    Description: Integrable spin systems possess interesting geometrical and gauge invariance properties and have important applications in applied magnetism and nanophysics. They are also intimately connected to the nonlinear Schrödinger family of equations. In this paper, we identify three different integrable spin systems in (2 + 1) dimensions by introducing the interaction of the spin field with more than one scalar potential, or vector potential, or both. We also obtain the associated Lax pairs. We discuss various interesting reductions in (2 + 1) and (1 + 1) dimensions. We also deduce the equivalent nonlinear Schrödinger family of equations, including the (2 + 1)-dimensional version of nonlinear Schrödinger–Hirota–Maxwell–Bloch equations, along with their Lax pairs.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Publication Date: 2015-08-05
    Description: This paper presents a novel hierarchical clustering method using support vector machines. A common approach for hierarchical clustering is to use distance for the task. However, different choices for computing inter-cluster distances often lead to fairly distinct clustering outcomes, causing interpretation difficulties in practice. In this paper, we propose to use a one-class support vector machine (OC-SVM) to directly find high-density regions of data. Our algorithm generates nested set estimates using the OC-SVM and exploits the hierarchical structure of the estimated sets. We demonstrate the proposed algorithm on synthetic datasets. The cluster hierarchy is visualized with dendrograms and spanning trees.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Publication Date: 2015-08-05
    Description: After a long and brave battle with a serious illness, our dear friend and colleague Slavik Jablan passed away on 26 February 2015. [...]
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Publication Date: 2015-08-05
    Description: Melanoma diagnosis depends on the experience of doctors. Symmetry is one of the most important factors to measure, since asymmetry shows an uncontrolled growth of cells, leading to melanoma cancer. A system for melanoma detection in diagnosing melanocytic diseases with high sensitivity is proposed here. Two different sets of features are extracted based on the importance of the ABCD rule and symmetry evaluation to develop a new architecture. Support Vector Machines are used to classify the extracted sets by using both an alternative labeling method and a structure divided into two different classifiers which prioritize sensitivity. Although feature extraction is based on former works, the novelty lies in the importance given to symmetry and the proposed architecture, which combines two different feature sets to obtain a high sensitivity, prioritizing the medical aspect of diagnosis. In particular, a database provided by Hospital Universitario de Gran Canaria Doctor Negrín was tested, obtaining a sensitivity of 100% and a specificity of 66.66% using a leave-one-out validation method. These results show that 66.66% of biopsies would be avoided if this system is applied to lesions which are difficult to classify by doctors.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Publication Date: 2015-08-05
    Description: The role of symmetry in computer vision has waxed and waned in importance during the evolution of the field from its earliest days. At first figuring prominently in support of bottom-up indexing, it fell out of favour as shape gave way to appearance and recognition gave way to detection. With a strong prior in the form of a target object, the role of the weaker priors offered by perceptual grouping was greatly diminished. However, as the field returns to the problem of recognition from a large database, the bottom-up recovery of the parts that make up the objects in a cluttered scene is critical for their recognition. The medial axis community has long exploited the ubiquitous regularity of symmetry as a basis for the decomposition of a closed contour into medial parts. However, today’s recognition systems are faced with cluttered scenes and the assumption that a closed contour exists, i.e., that figure-ground segmentation has been solved, rendering much of the medial axis community’s work inapplicable. In this article, we review a computational framework, previously reported in [1–3], that bridges the representation power of the medial axis and the need to recover and group an object’s parts in a cluttered scene. Our framework is rooted in the idea that a maximally-inscribed disc, the building block of a medial axis, can be modelled as a compact superpixel in the image. We evaluate the method on images of cluttered scenes.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Publication Date: 2015-08-05
    Description: Big data refers to informationalization technology for extracting valuable information through the use and analysis of large-scale data and, based on that data, deriving plans for response or predicting changes. With the development of software and devices for next generation sequencing, a vast amount of bioinformatics data has been generated recently. Also, bioinformatics data based big-data technology is rising rapidly as a core technology by the bioinformatician, biologist and big-data scientist. KEGG pathway is bioinformatics data for understanding high-level functions and utilities of the biological system. However, KEGG pathway analysis requires a lot of time and effort because KEGG pathways are high volume and very diverse. In this paper, we proposed a network analysis and visualization system that crawl user interest KEGG pathways, construct a pathway network based on a hierarchy structure of pathways and visualize relations and interactions of pathways by clustering and selecting core pathways from the network. Finally, we construct a pathway network collected by starting with an Alzheimer’s disease pathway and show the results on clustering and selecting core pathways from the pathway network.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Publication Date: 2015-08-05
    Description: The similarity patterns of the genetic code result from similar codons encoding similar messages. We develop a new mathematical model to analyze these patterns. The physicochemical characteristics of amino acids objectively quantify their differences and similarities; the Hamming metric does the same for the 64 codons of the codon set. (Hamming distances equal the number of different codon positions: AAA and AAC are at 1-distance; codons are maximally at 3-distance.) The CodonPolytope, a 9-dimensional geometric object, is spanned by 64 vertices that represent the codons and the Euclidian distances between these vertices correspond one-to-one with intercodon Hamming distances. The CodonGraph represents the vertices and edges of the polytope; each edge equals a Hamming 1-distance. The mirror reflection symmetry group of the polytope is isomorphic to the largest permutation symmetry group of the codon set that preserves Hamming distances. These groups contain 82,944 symmetries. Many polytope symmetries coincide with the degeneracy and similarity patterns of the genetic code. These code symmetries are strongly related with the face structure of the polytope with smaller faces displaying stronger code symmetries. Splitting the polytope stepwise into smaller faces models an early evolution of the code that generates this hierarchy of code symmetries. The canonical code represents a class of 41,472 codes with equivalent symmetries; a single class among an astronomical number of symmetry classes comprising all possible codes.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Publication Date: 2015-08-05
    Description: Frequent graph pattern mining is one of the most interesting areas in data mining, and many researchers have developed a variety of approaches by suggesting efficient, useful mining techniques by integration of fundamental graph mining with other advanced mining works. However, previous graph mining approaches have faced fatal problems that cannot consider important characteristics in the real world because they cannot process both (1) different element importance and (2) multiple minimum support thresholds suitable for each graph element. In other words, graph elements in the real world have not only frequency factors but also their own importance; in addition, various elements composing graphs may require different thresholds according to their characteristics. However, traditional ones do not consider such features. To overcome these issues, we propose a new frequent graph pattern mining method, which can deal with both different element importance and multiple minimum support thresholds. Through the devised algorithm, we can obtain more meaningful graph pattern results with higher importance. We also demonstrate that the proposed algorithm has more outstanding performance compared to previous state-of-the-art approaches in terms of graph pattern generation, runtime, and memory usage.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Publication Date: 2015-08-05
    Description: A large class of dynamic sensors have nonlinear input-output characteristics, often corresponding to a bistable potential energy function that controls the evolution of the sensor dynamics. These sensors include magnetic field sensors, e.g., the simple fluxgate magnetometer and the superconducting quantum interference device (SQUID), ferroelectric sensors and mechanical sensors, e.g., acoustic transducers, made with piezoelectric materials. Recently, the possibilities offered by new technologies and materials in realizing miniaturized devices with improved performance have led to renewed interest in a new generation of inexpensive, compact and low-power fluxgate magnetometers and electric-field sensors. In this article, we review the analysis of an alternative approach: a symmetry-based design for highly-sensitive sensor systems. The design incorporates a network architecture that produces collective oscillations induced by the coupling topology, i.e., which sensors are coupled to each other. Under certain symmetry groups, the oscillations in the network emerge via an infinite-period bifurcation, so that at birth, they exhibit a very large period of oscillation. This characteristic renders the oscillatory wave highly sensitive to symmetry-breaking effects, thus leading to a new detection mechanism. Model equations and bifurcation analysis are discussed in great detail. Results from experimental works on networks of fluxgate magnetometers are also included.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Publication Date: 2015-08-05
    Description: Recently, the hospital information system environment using IT communication technology and utilization of medical information has been increasing. In the medical field, the medical information system only supports the transfer of patient information to medical staff through an electronic health record, without information about patient status. Hence, it needs a method of real-time monitoring for the patient. Also, in this environment, a secure method in approaching healthcare through various smart devices is required. Therefore, in this paper, in order to classify the status of the patients, we propose a dynamic approach of the medical information system in a hospital information environment using the dynamic access control method. Also, we applied the symmetric method of AES (Advanced Encryption Standard). This was the best encryption algorithm for sending and receiving biological information. We can define usefulness as the dynamic access application service based on the final result of the proposed system. The proposed system is expected to provide a new solution for a convenient medical information system.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Publication Date: 2015-08-05
    Description: Approximately two decades after the first pioneering analyses, the study of shape asymmetry with the methods of geometric morphometrics has matured and is a burgeoning field. New technology for data collection and new methods and software for analysis are widely available and have led to numerous applications in plants and animals, including humans. This review summarizes the concepts and morphometric methods for studying asymmetry of shape and size. After a summary of mathematical and biological concepts of symmetry and asymmetry, a section follows that explains the methods of geometric morphometrics and how they can be used to analyze asymmetry of biological structures. Geometric morphometric analyses not only tell how much asymmetry there is, but also provide information about the patterns of covariation in the structure under study. Such patterns of covariation in fluctuating asymmetry can provide valuable insight about the developmental basis of morphological integration, and have become important tools for evolutionary developmental biology. The genetic basis of fluctuating asymmetry has been studied from empirical and theoretical viewpoints, but serious challenges remain in this area. There are many promising areas for further research that are only little explored at present.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Publication Date: 2015-08-05
    Description: The developmental instability (DI)-sexual selection hypothesis proposes that large size and symmetry in secondary sexual traits are favored by sexual selection because they reveal genetic quality. A critical prediction of this hypothesis is that there should exist negative correlations between trait fluctuating asymmetry (FA) and size of condition dependent sexual traits; condition dependent traits should reveal an organism’s overall health and vigor, and be influenced by a multitude of genetic loci. Here, we tested for the predicted negative FA-size correlations in the male sex comb of Drosophila bipectinata. Among field-caught males from five widely separated geographic localities, FA-size correlations were consistently positive, despite evidence that sex comb size is condition dependent. After controlling for trait size, FA was significantly negatively correlated with body size within several populations, indicating that developmental instability in the comb may reveal individual genetic quality. We suggest the possibility that condition dependent traits in some cases tap into independent units of the genome (a restricted set of genes), rather than signaling overall genetic properties of the organism. There were pronounced among-population differences in both comb FA and size, and these traits were positively correlated across populations, recapitulating the within-population patterns. We conclude that the results are inconsistent with the DI-sexual selection hypothesis, and discuss potential reasons for positive FA-size co-variation in sexual traits.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Publication Date: 2015-08-05
    Description: We present three types of polyhedral surfaces, which are continuously flexible and have not only an initial pose, where all faces are coplanar, but pass during their self-motion through another pose with coplanar faces (“flat pose”). These surfaces are examples of so-called rigid origami, since we only admit exact flexions, i.e., each face remains rigid during the motion; only the dihedral angles vary. We analyze the geometry behind Miura-ori and address Kokotsakis’ example of a flexible tessellation with the particular case of a cyclic quadrangle. Finally, we recall Bricard’s octahedra of Type 3 and their relation to strophoids.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Publication Date: 2015-08-05
    Description: By insisting on naturalness in both the electroweak and quantum chromodynamics (QCD) sectors of the minimal supersymmetric standard model (MSSM), the portrait for dark matter production is seriously modified from the usual weakly interacting massive particle (WIMP) miracle picture. In supersymmetry (SUSY) models with radiatively-driven naturalness (radiative natural SUSY or radiative natural SUSY (RNS)) which include a Dine–Fischler–Srednicki–Zhitnitsky (DFSZ)-like solution to the strong charge-conjugation-parity (CP) and SUSY \(\mu\) problems, dark matter is expected to be an admixture of both axions and higgsino-like WIMPs. The WIMP/axion abundance calculation requires simultaneous solution of a set of coupled Boltzmann equations which describe quasi-stable axinos and saxions. In most of parameter space, axions make up the dominant contribution of dark matter although regions of WIMP dominance also occur. We show the allowed range of Peccei-Quinn (PQ) scale \(f_a\) and compare to the values expected to be probed by the axion dark matter search experiment (ADMX) axion detector in the near future. We also show WIMP detection rates, which are suppressed from usual expectations, because now WIMPs comprise only a fraction of the total dark matter. Nonetheless, ton-scale noble liquid detectors should be able to probe the entirety of RNS parameter space. Indirect WIMP detection rates are less propitious since they are reduced by the square of the depleted WIMP abundance.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Publication Date: 2015-09-15
    Description: We report predictions for the neutron skin in 208Pb using chiral two- and three-body interactions at increasing orders of chiral effective field theory and varying resolution scales. Closely related quantities, such as the slope of the symmetry energy, are also discussed. The sensitivity of the skin to just pure neutron matter pressure when going from order 2 to order 4 of chiral effective theory is singled out in a set of calculations that employ an empirical equation of state for symmetric nuclear matter.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Publication Date: 2015-09-15
    Description: Using elementary techniques, an algorithmic procedure to construct skew-symmetric matrices realizing the real irreducible representations of so(3) is developed. We further give a simple criterion that enables one to deduce the decomposition of an arbitrary real representation R of so(3) into real irreducible components from the characteristic polynomial of an arbitrary representation matrix.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Publication Date: 2015-08-26
    Description: With the rapid growth of smart TV, the necessity for recognizing a viewer has increased for various applications that deploy face recognition to provide intelligent services and high convenience to viewers. However, the viewers can have various postures, illumination, and expression variations on their faces while watching TV, and thereby, the performance of face recognition inevitably degrades. In order to handle these problems, video-based face recognition has been proposed, instead of a single image-based one. However, video-based processing of multiple images is prohibitive in smart TVs as the processing power is limited. Therefore, a quality measure-based (QM-based) image selection is required that considers both the processing speed and accuracy of face recognition. Therefore, we propose a performance enhancement method for face recognition through symmetrical fuzzy-based quality assessment. Our research is novel in the following three ways as compared to previous works. First, QMs are adaptively selected by comparing variance values obtained from candidate QMs within a video sequence, where the higher the variance value by a QM, the more meaningful is the QM in terms of a distinction between images. Therefore, we can adaptively select meaningful QMs that reflect the primary factors influencing the performance of face recognition. Second, a quality score of an image is calculated using a fuzzy method based on the inputs of the selected QMs, symmetrical membership functions, and rule table considering the characteristics of symmetry. A fuzzy-based combination method of image quality has the advantage of being less affected by the types of face databases because it does not perform an additional training procedure. Third, the accuracy of face recognition is enhanced by fusing the matching scores of the high-quality face images, which are selected based on the quality scores among successive face mages. Experimental results showed that the performance of face recognition using the proposed method was better than that of conventional methods in terms of accuracy.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Publication Date: 2016-07-14
    Description: Region duplication forgery where a part of the image itself is copied and pasted onto a different part of the same image grid is becoming more popular in image manipulation. The forgers often apply geometric transformations such as rotation and scaling operations to make the forgery imperceptible. In this study, an image region duplication forgery detection algorithm is proposed based on the angular radial partitioning and Harris key-points. Two standard databases have been used: image data manipulation and MICC-F220 (Media Integration and Communication Center– of the University of Florence) for experimentation. Experiment results demonstrate that the proposed technique can detect rotated regions in multiples of 30 degrees and can detect region duplication with different scaling factors from 0.8, to 1.2. More experimental results are presented to confirm the effectiveness of detecting region duplication that has undergone other changes, such as Gaussian noise, and JPEG compression.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Publication Date: 2016-07-14
    Description: Nowadays, several wireless location systems have been developed in the research world. The goal of these systems has always been to find the greatest accuracy as possible. However, if every node takes data from the environment, we can gather a lot of information, which may help us understand what is happening around our network in a cooperative way. In order to develop this cooperative location and tracking system, we have implemented a sensor network to capture data from user devices. From this captured data we have observed a symmetry behavior in people’s movements at a specific site. By using these data and the symmetry feature, we have developed a statistical cooperative approach to predict the new user’s location. The system has been tested in a real environment, evaluating the next location predicted by the system and comparing it with the next location in the real track, thus getting satisfactory results. Better results have been obtained when the stochastic cooperative approach uses the transition matrix with symmetry.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Publication Date: 2016-07-19
    Description: Both distributed healthcare systems and the Internet of Things (IoT) are currently hot topics. The latter is a new computing paradigm to enable advanced capabilities in engineering various applications, including those for healthcare. For such systems, the core social requirement is the privacy/security of the patient information along with the technical requirements (e.g., energy consumption) and capabilities for adaptability and personalization. Typically, the functionality of the systems is predefined by the patient’s data collected using sensor networks along with medical instrumentation; then, the data is transferred through the Internet for treatment and decision-making. Therefore, systems creation is indeed challenging. In this paper, we propose a model-driven framework to develop the IoT-based prototype and its reference architecture for personalized health monitoring (PHM) applications. The framework contains a multi-layered structure with feature-based modeling and feature model transformations at the top and the application software generation at the bottom. We have validated the framework using available tools and developed an experimental PHM to test some aspects of the functionality of the reference architecture in real time. The main contribution of the paper is the development of the model-driven computational framework with emphasis on the synergistic effect of security and energy issues.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Publication Date: 2016-07-20
    Description: Two measures are commonly used to describe scale-invariant complexity in images: fractal dimension (D) and power spectrum decay rate (β). Although a relationship between these measures has been derived mathematically, empirical validation across measurements is lacking. Here, we determine the relationship between D and β for 1- and 2-dimensional fractals. We find that for 1-dimensional fractals, measurements of D and β obey the derived relationship. Similarly, in 2-dimensional fractals, measurements along any straight-line path across the fractal’s surface obey the mathematically derived relationship. However, the standard approach of vision researchers is to measure β of the surface after 2-dimensional Fourier decomposition rather than along a straight-line path. This surface technique provides measurements of β that do not obey the mathematically derived relationship with D. Instead, this method produces values of β that imply that the fractal’s surface is much smoother than the measurements along the straight lines indicate. To facilitate communication across disciplines, we provide empirically derived equations for relating each measure of β to D. Finally, we discuss implications for future research on topics including stress reduction and the perception of motion in the context of a generalized equation relating β to D.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Publication Date: 2016-07-21
    Description: An efficient surface area evaluation method is introduced by using smooth surface reconstruction for three-dimensional scanned human body data. Surface area evaluations for various body parts are compared with the results from the traditional alginate-based method, and quite high similarity between the two results is obtained. We expect that our surface area evaluation method can be an alternative to measuring surface area by the cumbersome alginate method.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Publication Date: 2016-07-22
    Description: Deduplication is an efficient data reduction technique, and it is used to mitigate the problem of huge data volume in big data storage systems. Content defined chunking (CDC) is the most widely used algorithm in deduplication systems. The expected chunk size is an important parameter of CDC, and it influences the duplicate elimination ratio (DER) significantly. We collected two realistic datasets to perform an experiment. The experimental results showed that the current approach of setting the expected chunk size to 4 KB or 8 KB empirically cannot optimize DER. Therefore, we present a logistic based mathematical model to reveal the hidden relationship between the expected chunk size and the DER. This model provides a theoretical basis for optimizing DER by setting the expected chunk size reasonably. We used the collected datasets to verify this model. The experimental results showed that the R2 values, which describe the goodness of fit, are above 0.9, validating the correctness of this mathematic model. Based on the DER model, we discussed how to make DER close to the optimum by setting the expected chunk size reasonably.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    Publication Date: 2016-07-22
    Description: We propose an efficient image-matching method for deformable-object image matching using discrimination of deformable objects and geometric similarity clustering between feature-matching pairs. A deformable transformation maintains a particular form in the whole image, despite local and irregular deformations. Therefore, the matching information is statistically analyzed to calculate the possibility of deformable transformations, and the images can be identified using the proposed method. In addition, a method for matching deformable object images is proposed, which clusters matching pairs with similar types of geometric deformations. Discrimination of deformable images showed about 90% accuracy, and the proposed deformable image-matching method showed an average 89% success rate and 91% accuracy with various transformations. Therefore, the proposed method robustly matches images, even with various kinds of deformation that can occur in them.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Publication Date: 2016-07-27
    Description: We explore the dynamics and evolution of the Universe at early and late times, focusing on both dark energy and extended gravity models and their astrophysical and cosmological consequences. Modified theories of gravity not only provide an alternative explanation for the recent expansion history of the universe, but they also offer a paradigm fundamentally distinct from the simplest dark energy models of cosmic acceleration. In this review, we perform a detailed theoretical and phenomenological analysis of different modified gravity models and investigate their consistency. We also consider the cosmological implications of well motivated physical models of the early universe with a particular emphasis on inflation and topological defects. Astrophysical and cosmological tests over a wide range of scales, from the solar system to the observable horizon, severely restrict the allowed models of the Universe. Here, we review several observational probes—including gravitational lensing, galaxy clusters, cosmic microwave background temperature and polarization, supernova and baryon acoustic oscillations measurements—and their relevance in constraining our cosmological description of the Universe.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Publication Date: 2016-07-29
    Description: We consider nonlinear modes of the nonlinear Schrödinger equation with nonlocal nonlinearities and and PT -symmetric parabolic potential. We show that there exists a set of continuous families of nonlinear modes and study their linear stability in the limit of small nonlinearity. It is demonstrated that either PT symmetry or the nonlocality can be used to manage the stability of the small-amplitude nonlinear modes. The stability properties are also found to depend on the particular shape of the nonlocal kernel. Numerical simulations show that the stability results remain valid not only for the infinitesimally small nonlinear modes, but also for the modes of finite amplitude.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Publication Date: 2016-08-05
    Description: We study almost contact metric structures on 5-dimensional nilpotent Lie algebras and investigate the class of left invariant almost contact metric structures on corresponding Lie groups. We determine certain classes that a five-dimensional nilpotent Lie group can not be equipped with.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    Publication Date: 2016-07-29
    Description: In recent years, the increasing use of social networks and applications—especially those used in an asymmetric way—has significantly changed the business processes in many organizations. These applications provide new cooperative ways of performing these processes by taking advantage of the interactions among users. However, the high number of these applications has led to a lack of automation in their interactions and, thus, the need of manually connecting to these networks to perform recurrent and repetitive tasks. In order to automate these operations, this paper presents SCPL, a Domain Specific Language (DSL) that enables connectivity among different social networks and applications and provides a way to automate their management. The main contribution of this paper is showing how SCPL can be used to specify collaborative tasks using symmetric and asymmetric social networks in a transparent way.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    Publication Date: 2016-07-30
    Description: We review some approaches to macroscopic irreversibility from reversible microscopic dynamics, introducing the contribution of time dependent perturbations within the framework of recent developments in non-equilibrium statistical physics. We show that situations commonly assumed to violate the time reversal symmetry (presence of magnetic fields, rotating reference frames, and some time dependent perturbations) in reality do not violate this symmetry, and can be treated with standard theories and within standard experimental protocols.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Publication Date: 2016-08-04
    Description: As an increasing number of people purchase goods and services online, micropayment systems are becoming particularly important for mobile and electronic commerce. We have designed and developed such a system called M&E-NetPay (Mobile and Electronic NetPay). With open interoperability and mobility, M&E-NetPay uses web services to connect brokers and vendors, providing secure, flexible and reliable credit services over the Internet. In particular, M&E-NetPay makes use of a secure, inexpensive and debit-based off-line protocol that allows vendors to interact only with customers, after validating coins. The design of the architecture and protocol of M&E-NetPay are presented, together with the implementation of its prototype in ringtone and wallpaper sites. To validate our system, we have conducted its evaluations on performance, usability and heuristics. Furthermore, we compare our system to the CORBA-based (Common Object Request Broker Architecture) off-line micro-payment systems. The results have demonstrated that M&E-NetPay outperforms the .NET-based M&E-NetPay system in terms of performance and user satisfaction.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    Publication Date: 2016-08-04
    Description: As face recognition technology has developed, it has become widely used in various applications such as door access control, intelligent surveillance, and mobile phone security. One of its applications is its adoption in TV environments to supply viewers with intelligent services and high convenience. In a TV environment, the in-plane rotation of a viewer’s face frequently occurs because he or she may decide to watch the TV from a lying position, which degrades the accuracy of the face recognition. Nevertheless, there has been little previous research to deal with this problem. Therefore, we propose a new fuzzy system–based face detection algorithm that is robust to in-plane rotation based on the symmetrical characteristics of a face. Experimental results on two databases with one open database show that our method outperforms previous methods.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    Publication Date: 2016-07-07
    Description: In this paper, we propose a robust voice activity detection (VAD) algorithm to effectively distinguish speech from non-speech in various noisy environments. The proposed VAD utilizes power spectral deviation (PSD), using Teager energy (TE) to provide a better representation of the PSD, resulting in improved decision performance for speech segments. In addition, the TE-based likelihood ratio and speech absence probability are derived in each frame to modify the PSD for further VAD. We evaluate the performance of the proposed VAD algorithm by objective testing in various environments and obtain better results that those attained by of the conventional methods.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    Publication Date: 2016-06-21
    Description: For a given operator D ( t ) of an observable in theoretical parity-time symmetric quantum physics (or for its evolution-generator analogues in the experimental gain-loss classical optics, etc.) the instant t c r i t i c a l of a spontaneous breakdown of the parity-time alias gain-loss symmetry should be given, in the rigorous language of mathematics, the Kato’s name of an “exceptional point”, t c r i t i c a l = t ( E P ) . In the majority of conventional applications the exceptional point (EP) values are not real. In our paper, we pay attention to several exactly tractable toy-model evolutions for which at least some of the values of t ( E P ) become real. These values are interpreted as “instants of a catastrophe”, be it classical or quantum. In the classical optical setting the discrete nature of our toy models might make them amenable to simulations. In the latter context the instant of Big Bang is mentioned as an illustrative sample of possible physical meaning of such an EP catastrophe in quantum cosmology.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Publication Date: 2016-06-25
    Description: The drastic increase of websites is one of the causes behind the recent information overload on the internet. A recommender system (RS) has been developed for helping users filter information. However, the cold-start and sparsity problems lead to low performance of the RS. In this paper, we propose methods including the visual-clustering recommendation (VCR) method, the hybrid between the VCR and user-based methods, and the hybrid between the VCR and item-based methods. The user-item clustering is based on the genetic algorithm (GA). The recommendation performance of the proposed methods was compared with that of traditional methods. The results showed that the GA-based visual clustering could properly cluster user-item binary images. They also demonstrated that the proposed recommendation methods were more efficient than the traditional methods. The proposed VCR2 method yielded an F1 score roughly three times higher than the traditional approaches.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    Publication Date: 2016-06-29
    Description: Cosmic Dark Fluid is considered as a non-stationary medium, in which electromagnetic waves propagate, and magneto-electric field structures emerge and evolve. A medium-type representation of the Dark Fluid allows us to involve in its analysis the concepts and mathematical formalism elaborated in the framework of classical covariant electrodynamics of continua, and to distinguish dark analogs of well-known medium-effects, such as optical activity, pyro-electricity, piezo-magnetism, electro- and magneto-striction and dynamo-optical activity. The Dark Fluid is assumed to be formed by a duet of a Dark Matter (a pseudoscalar axionic constituent) and Dark Energy (a scalar element); respectively, we distinguish electrodynamic effects induced by these two constituents of the Dark Fluid. The review contains discussions of 10 models, which describe electrodynamic effects induced by Dark Matter and/or Dark Energy. The models are accompanied by examples of exact solutions to the master equations, correspondingly extended; applications are considered for cosmology and space-times with spherical and pp-wave symmetries. In these applications we focused the attention on three main electromagnetic phenomena induced by the Dark Fluid: first, emergence of Longitudinal Magneto-Electric Clusters; second, generation of anomalous electromagnetic responses; third, formation of Dark Epochs in the Universe history.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    Publication Date: 2016-05-10
    Description: This paper defines the multivariate Krawtchouk polynomials, orthogonal on the multinomial distribution, and summarizes their properties as a review. The multivariate Krawtchouk polynomials are symmetric functions of orthogonal sets of functions defined on each of N multinomial trials. The dual multivariate Krawtchouk polynomials, which also have a polynomial structure, are seen to occur naturally as spectral orthogonal polynomials in a Karlin and McGregor spectral representation of transition functions in a composition birth and death process. In this Markov composition process in continuous time, there are N independent and identically distributed birth and death processes each with support 0 , 1 , … . The state space in the composition process is the number of processes in the different states 0 , 1 , … . Dealing with the spectral representation requires new extensions of the multivariate Krawtchouk polynomials to orthogonal polynomials on a multinomial distribution with a countable infinity of states.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    Publication Date: 2016-05-10
    Description: The aim of this study is to rank some features that characterize the psychological dynamics of cooperative team work in order to determine priorities for interventions and formation: leading positive feedback, cooperative manager and collaborative manager features. From a dataset of 20 cooperative sport teams (403 soccer players), the characteristics of the prototypical sports teams are studied using an average Bayesian network (BN) and two special types of BNs, the Bayesian classifiers: naive Bayes (NB) and tree augmented naive Bayes (TAN). BNs are selected as they are able to produce probability estimates rather than predictions. BN results show that the antecessors (the “top” features ranked) are the team members’ expectations and their attraction to the social aspects of the task. The main node is formed by the cooperative behaviors, the consequences ranked at the BN bottom (ratified by the TAN trees and the instantiations made), the roles assigned to the members and their survival inside the same team. These results should help managers to determine contents and priorities when they have to face team-building actions.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Publication Date: 2016-05-27
    Description: As an extension of the class of nonlinear PT -symmetric models, we propose a system of sine-Gordon equations, with the PT symmetry represented by balanced gain and loss in them. The equations are coupled by sine-field terms and first-order derivatives. The sinusoidal coupling stems from local interaction between adjacent particles in coupled Frenkel–Kontorova (FK) chains, while the cross-derivative coupling, which was not considered before, is induced by three-particle interactions, provided that the particles in the parallel FK chains move in different directions. Nonlinear modes are then studied in this system. In particular, kink-kink (KK) and kink-anti-kink (KA) complexes are explored by means of analytical and numerical methods. It is predicted analytically and confirmed numerically that the complexes are unstable for one sign of the sinusoidal coupling and stable for another. Stability regions are delineated in the underlying parameter space. Unstable complexes split into free kinks and anti-kinks that may propagate or become quiescent, depending on whether they are subject to gain or loss, respectively.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Publication Date: 2016-05-27
    Description: The BitTorrent client application is a popular utility for sharing large files over the Internet. Sometimes, this powerful utility is used to commit cybercrimes, like sharing of illegal material or illegal sharing of legal material. In order to help forensics investigators to fight against these cybercrimes, we carried out an investigation of the artifacts left by the BitTorrent client. We proposed a methodology to locate the artifacts that indicate the BitTorrent client activity performed. Additionally, we designed and implemented a tool that searches for the evidence left by the BitTorrent client application in a local computer running Windows. The tool looks for the four files holding the evidence. The files are as follows: *.torrent, dht.dat, resume.dat, and settings.dat. The tool decodes the files, extracts important information for the forensic investigator and converts it into XML format. The results are combined into a single result file.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    Publication Date: 2016-07-15
    Description: In this paper, a modified GrabCut algorithm is proposed using a clustering technique to reduce image noise. GrabCut is an image segmentation method based on GraphCut starting with a user-specified bounding box around the object to be segmented. In the modified version, the original image is filtered using the median filter to reduce noise and then the quantized image using K-means algorithm is used for the normal GrabCut method for object segmentation. This new process showed that it improved the object segmentation performance a lot and the extract segmentation result compared to the standard method.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    Publication Date: 2016-07-15
    Description: The paper develops applications of symmetric orbit functions, known from irreducible representations of simple Lie groups, in numerical analysis. It is shown that these functions have remarkable properties which yield to cubature formulas, approximating a weighted integral of any function by a weighted finite sum of function values, in connection with any simple Lie group. The cubature formulas are specialized for simple Lie groups of rank two. An optimal approximation of any function by multivariate polynomials arising from symmetric orbit functions is discussed.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Publication Date: 2015-05-08
    Description: We survey the role of reduction by symmetry in the large deformation diffeomorphic metric mapping framework for registration of a variety of data types (landmarks, curves, surfaces, images and higher-order derivative data). Particle relabelling symmetry allows the equations of motion to be reduced to the Lie algebra allowing the equations to be written purely in terms of the Eulerian velocity field. As a second use of symmetry, the infinite dimensional problem of finding correspondences between objects can be reduced for a range of concrete data types, resulting in compact representations of shape and spatial structure. Using reduction by symmetry, we describe these models in a common theoretical framework that draws on links between the registration problem and geometric mechanics. We outline these constructions and further cases where reduction by symmetry promises new approaches to the registration of complex data types.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    Publication Date: 2015-05-12
    Description: We review coupled SU(3)-structures, also known in the literature as restricted half-flat structures, in relation to supersymmetry. In particular, we study special classes of examples admitting such structures and the behavior of flows of SU(3)-structures with respect to the coupled condition.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    Publication Date: 2015-05-05
    Description: Physical memory acquisition has been an import facet for digital forensics (DF) specialists due to its volatile characteristics. Nowadays, thousands of millions of global participants utilize online social networking (OSN) mechanisms to expand their social lives, ranging from business-oriented purposes to leisure motivations. Facebook (FB) is one of the most dominant social networking sites (SNS) available today. Unfortunately, it has been a major avenue for cybercriminals to commit illegal activities. Therefore, the digital traces of previous sessions of an FB user play an essential role as the first step for DF experts to pursue the disclosure of the identity of the suspect who was exploiting FB. In this research work, we provide a systematic methodology to reveal a previous session of an FB identity, as well as his/her partial social circle via collecting, analyzing, preserving and presenting the associated digital traces to obtain the online social snapshots of a specific FB user who was utilizing a computing device with Internet Explorer (IE) 10 without turning off the power of the gadget. This novel approach can be a paradigm for how DF specialists ponder the crime scene to conduct the first response in order to avoid the permanent loss of the precious digital evidence in previous FB sessions. The hash values of the image files of the random access memory (RAM) of the computing device have proven to be identical before and after forensics operations, which could be probative evidence in a court of law.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    Publication Date: 2015-05-05
    Description: We indicate that Heron’s formula (which relates the square of the area of a triangle to a quartic function of its edge lengths) can be interpreted as a scissors congruence in four-dimensional space. In the process of demonstrating this, we examine a number of decompositions of hypercubes, hyper-parallelograms and other elementary four-dimensional solids.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Publication Date: 2015-05-06
    Description: The paper presents the group theory of optimally-localized and symmetry-adapted Wannier functions in a crystal of any given space group G or magnetic group M. Provided that the calculated band structure of the considered material is given and that the symmetry of the Bloch functions at all of the points of symmetry in the Brillouin zone is known, the paper details whether or not the Bloch functions of particular energy bands can be unitarily transformed into optimally-localized Wannier functions symmetry-adapted to the space group G, to the magnetic group M or to a subgroup of G or M. In this context, the paper considers usual, as well as spin-dependent Wannier functions, the latter representing the most general definition of Wannier functions. The presented group theory is a review of the theory published by one of the authors (Ekkehard Krüger) in several former papers and is independent of any physical model of magnetism or superconductivity. However, it is suggested to interpret the special symmetry of the optimally-localized Wannier functions in the framework of a nonadiabatic extension of the Heisenberg model, the nonadiabatic Heisenberg model. On the basis of the symmetry of the Wannier functions, this model of strongly-correlated localized electrons makes clear predictions of whether or not the system can possess superconducting or magnetic eigenstates.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Publication Date: 2015-05-13
    Description: This is a survey on harmonic maps and biharmonic maps into (1) Riemannian manifolds of non-positive curvature, (2) compact Lie groups or (3) compact symmetric spaces, based mainly on my recent works on these topics.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    Publication Date: 2015-05-15
    Description: Future communication networks would be required to deliver data on a far greater scale than is known to us today, thus mandating the maximal utilization of the available radio spectrum using cognitive radios. In this paper, we have proposed a novel cooperative spectrum sensing approach for cognitive radios. In cooperative spectrum sensing, the fusion center relies on reports of the cognitive users to make a global decision. The global decision is obtained by assigning weights to the reports received from cognitive users. Computation of such weights requires prior information of the probability of detection and the probability of false alarms, which are not readily available in real scenarios. Further, the cognitive users are divided into reliable and unreliable categories based on their weighted energy by using some empirical threshold. In this paper, we propose a method to classify the cognitive users into reliable, neutral and unreliable categories without using any pre-defined or empirically-obtained threshold. Moreover, the computation of weights does not require the detection, or false alarm probabilities, or an estimate of these probabilities. Reliable cognitive users are assigned the highest weights; neutral cognitive users are assigned medium weights (less than the reliable and higher than the unreliable cognitive users’ weights); and unreliable users are assigned the least weights. We show the performance improvement of our proposed method through simulations by comparing it with the conventional cooperative spectrum sensing scheme through different metrics, like receiver operating characteristic (ROC) curve and mean square error. For clarity, we also show the effect of malicious users on detection probability and false alarm probability individually through simulations.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Publication Date: 2015-04-29
    Description: Transaction privacy has attracted a lot of attention in the e-commerce. This study proposes an efficient and provable fair document exchange protocol with transaction privacy. Using the proposed protocol, any untrusted parties can fairly exchange documents without the assistance of online, trusted third parties. Moreover, a notary only notarizes each document once. The authorized document owner can exchange a notarized document with different parties repeatedly without disclosing the origin of the document or the identities of transaction participants. Security and performance analyses indicate that the proposed protocol not only provides strong fairness, non-repudiation of origin, non-repudiation of receipt, and message confidentiality, but also enhances forward secrecy, transaction privacy, and authorized exchange. The proposed protocol is more efficient than other works.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Publication Date: 2015-03-26
    Description: In recent years, mobile and ubiquitous computing has emerged in our daily lives, and extensive studies have been conducted in various areas using smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, in order to realize this computing technology. Especially, the integration of mobile networking technology and intelligent mobile devices has made it possible to develop the advanced mobile distance learning system that supports portable smart devices such as smartphones and tablets for the future IT environment. We present a synchronous mobile learning system that enables both instructor and student to participate in distance learning with their tablets. When an instructor gives a lecture using a tablet with front-face camera by bringing up slides and making annotations on them, students in the distance can watch the instructor and those slides with annotation on their own tablets in real time. A student can also ask a question or have a discussion together using the text chat feature of the system during a learning session. We also show the user evaluation of the system. A user survey shows that about 67% are in favor of the prototype of the system.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    Publication Date: 2015-04-28
    Description: We revisit the charge-conjugation operation for the Dirac equation in its chiral representation. A new decomposition of the Dirac spinor field is suggested and achieved by means of projection operators based on charge conjugation, which is discussed here in a non-standard way. Thus, two separate two-component Majorana-type field equations for the eigenfields of the charge-conjugation operator are obtained. The corresponding free fields are entirely separated without a gauge field, but remain mixed and coupled together through an electromagnetic field term. For fermions that are charged and, thus, subjected to the gauge field of electrodynamics, these two Majorana fields can be reassembled into a doublet, which is equivalent to a standard four-component Dirac spinor field. In this way, the Dirac equation is retained in a new guise, which is fully equivalent to that equation in its chiral form.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    Publication Date: 2015-04-10
    Description: Fractal symmetry is symmetry across scale. If one looks at a branch of a tree its branching pattern is reminiscent of the tree as a whole. Plants exhibit a number of different symmetries, including bilateral, rotational, translational, and fractal; deviations from each of these types has been associated with organisms developing in stressful environments. Here, we explore the utilization and meaning of fractal analysis on annual growth ring production in woody plants. Early detection of stress in plants is difficult and the compounding effects of multiple or severe stressors can lead to irreversible damage or death. Annual wood production was used to produce a time series for individuals from stands classified as either high vigor or low vigor (a general measure of health). As a measure of symmetry over time, the fractal dimension of each time series was determined and compared among vigor classes. We found that individuals obtained from low vigor sites had a significantly lower fractal dimension than those from high vigor sites. These results agree with patterns found in a variety of other organisms, and we argue that the reduced fractal dimension is related to a loss in system complexity of stressed individuals.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    Publication Date: 2016-01-09
    Description: Isotopic chirality influences sensitively the enantiomeric outcome of the Soai asymmetric autocatalysis. Therefore magnitude and eventual effects of isotopic chirality caused by natural abundance isotopic substitution (H, C, O, Zn) in the reagents of the Soai reaction were analyzed by combinatorics and probability calculations. Expectable enantiomeric excesses were calculated by the Pars–Mills equation. It has been found that the chiral isotopic species formed by substitution in the otherwise achiral reagents provide enantiomeric excess (e.e.) levels that are higher than the sensitivity threshold of the Soai autocatalysis towards chiral induction. Consequently, possible chiral induction exerted by these e.e. values should be taken into account in considerations regarding the molecular events and the mechanism of the chiral induction in the Soai reaction.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Publication Date: 2016-04-01
    Description: By using new algebraic techniques, two Casorati inequalities are established for submanifolds in a Riemannian manifold of quasi-constant curvature with a semi-symmetric metric connection, which generalize inequalities obtained by Lee et al. J. Inequal. Appl. 2014, 2014, 327.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Publication Date: 2016-04-06
    Description: Business applications in advanced logistics service are highly concurrent. In this paper, we propose a resource symmetric dispatch model for the concurrent and cooperative tasks of the Internet of Things. In the model, the terminals receive and deliver commands, data, and information with mobile networks, wireless networks, and sensor networks. The data and information are classified and processed by the clustering servers in the cloud service platform. The cluster service, resource dispatch, and load balance are cooperative for management and monitoring of every application case during the logistics service lifecycle. In order to support the high performance of cloud service, resource symmetric dispatch algorithm among clustering servers and load balancing method among multi-cores in one server, including NIO (Non-blocking Input/Output) and RMI (Remote Method Invocation) are utilized to dispatch the cooperation of computation and service resources.
    Electronic ISSN: 2073-8994
    Topics: Mathematics , Physics
    Published by MDPI Publishing
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Publication Date: 2019
    Description: We propose a derivative-free iterative method with fifth order of convergence for solving systems of nonlinear equations. The scheme is composed of three steps, of which the first two steps are that of third order Traub-Steffensen-type method and the last is derivative-free modification of Chebyshev’s method. Computational efficiency is examined and comparison between the efficiencies of presented technique with existing techniques is performed. It is proved that, in general, the new method is more efficient. Numerical problems, including those resulting from practical problems viz. integral equations and boundary value problems, are considered to compare the performance of the proposed method with existing methods. Calculation of computational order of convergence shows that the order of convergence of the new method is preserved in all the numerical examples, which is not so in the case of some of the existing higher order methods. Moreover, the numerical results, including the CPU-time consumed in the execution of program, confirm the accurate and efficient behavior of the new technique.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Publication Date: 2019
    Description: The elementary symmetric functions play a crucial role in the study of zeros of non-zero polynomials in C [ x ] , and the problem of finding zeros in Q [ x ] leads to the definition of algebraic and transcendental numbers. Recently, Marques studied the set of algebraic numbers in the form P ( T ) Q ( T ) . In this paper, we generalize this result by showing the existence of algebraic numbers which can be written in the form P 1 ( T ) Q 1 ( T ) ⋯ P n ( T ) Q n ( T ) for some transcendental number T, where P 1 , … , P n , Q 1 , … , Q n are prescribed, non-constant polynomials in Q [ x ] (under weak conditions). More generally, our result generalizes results on the arithmetic nature of z w when z and w are transcendental.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Publication Date: 2019
    Description: Machine learning algorithms have been widely used in the field of client credit assessment. However, few of the algorithms have focused on and solved the problems of concept drift and class imbalance. Due to changes in the macroeconomic environment and markets, the relationship between client characteristics and credit assessment results may change over time, causing concept drift in client credit assessments. Moreover, client credit assessment data are naturally asymmetric and class imbalanced because of the screening of clients. Aiming at solving the joint research issue of concept drift and class imbalance in client credit assessments, in this paper, a novel sample-based online learning ensemble (SOLE) for client credit assessment is proposed. A novel multiple time scale ensemble classifier and a novel sample-based online class imbalance learning procedure are proposed to handle the potential concept drift and class imbalance in the client credit assessment data streams. The experiments are carried out on two real-world client credit assessment cases, which present a comprehensive comparison between the proposed SOLE and other state-of-the-art online learning algorithms. In addition, the base classifier preference and the computing resource consumption of all the comparative algorithms are tested. In general, SOLE achieves a better performance than other methods using fewer computing resources. In addition, the results of the credit scoring model and the Kolmogorov–Smirnov (KS) test also prove that SOLE has good practicality in actual client credit assessment applications.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Publication Date: 2019
    Description: This paper adapts the multivariate optimal control theory to a Riemannian setting. In this sense, a coherent correspondence between the key elements of a standard optimal control problem and several basic geometric ingredients is created, with the purpose of generating a geometric version of Pontryagin’s maximum principle. More precisely, the local coordinates on a Riemannian manifold play the role of evolution variables (“multitime”), the Riemannian structure, and the corresponding Levi–Civita linear connection become state variables, while the control variables are represented by some objects with the properties of the Riemann curvature tensor field. Moreover, the constraints are provided by the second order partial differential equations describing the dynamics of the Riemannian structure. The shift from formal analysis to optimal Riemannian control takes deeply into account the symmetries (or anti-symmetries) these geometric elements or equations rely on. In addition, various submanifold integral cost functionals are considered as controlled payoffs.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    Publication Date: 2019
    Description: Positioning devices allow users’ movement to be recorded. The GPS (Global Positioning System) trajectory data typically consists of spatiotemporal points, which make up the major part of the big data concerning urban life. Existing knowledge extraction methods about the trajectory share a general limitation—they only investigate data from a spatiotemporal aspect, but fail to take the semantic information of trajectories into consideration. Therefore, extracting the semantic information of trajectories with the context of big data is challenging pattern recognition task that has practical application prospects. In this paper, a system is proposed to extract the semantic trajectory patterns of positioning device users. Firstly, a spatiotemporal threshold and clustering based pre-processing model is proposed to process the raw data. Then, we design a probabilistic generative model to annotate the semantic information of each trajectory after the pre-processing procedure. Finally, we apply the PrefixSpan algorithm to mine the semantic trajectory patterns. We verify our system on a large dataset of users’ real trajectories over a period of 5 years in Beijing, China. The results of the experiment indicate that our system produces meaningful patterns.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Publication Date: 2019
    Description: Three-way decisions, as a decision-making mode which is consistent with human cognition, have been widely used in various fields. In this paper, we fuse the theory of reliability into the three-way decisions method, replace the conditional probability in the three-way decisions method with reliability, and then propose a novel three-way decisions method. We also describe the loss functions with single-valued triangular neutrosophic numbers (SVTNNs) and propose an operator to calculate the score function of triangular neutrosophic numbers. Then, the result of decision is attained according to the principle of minimizing loss. Finally, we apply this method to the overhaul of machines in a factory, which proves the practicability and effectiveness of the proposed methods.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    Publication Date: 2019
    Description: The solutions for many real life problems may be obtained by interpreting the given problem mathematically in the form f ( x ) = x . One such example is that of the famous Borsuk–Ulam theorem in which, using some fixed point argument, it can be guaranteed that at any given time we can find two diametrically opposite places in a planet with same temperature. Thus, the correlation of symmetry is inherent in the study of fixed point theory. In this article, some new results concerning coincidence and a common fixed point for an A φ -contraction and a generalized ϕ -type weak contraction are established. We prove our results for set valued maps without using continuity of the corresponding maps and completeness of the relevant space. Our results generalize and extend several existing results. Some new examples are given to demonstrate the generality and non-triviality of our results.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Publication Date: 2019
    Description: Studies related to pattern recognition and visualization using computer technology have been introduced. In particular, deep neural networks (DNNs) provide good performance for image, speech, and pattern recognition. However, a poisoning attack is a serious threat to a DNN’s security. A poisoning attack reduces the accuracy of a DNN by adding malicious training data during the training process. In some situations, it may be necessary to drop a specifically chosen class of accuracy from the model. For example, if an attacker specifically disallows nuclear facilities to be selectively recognized, it may be necessary to intentionally prevent unmanned aerial vehicles from correctly recognizing nuclear-related facilities. In this paper, we propose a selective poisoning attack that reduces the accuracy of only the chosen class in the model. The proposed method achieves this by training malicious data corresponding to only the chosen class while maintaining the accuracy of the remaining classes. For the experiment, we used tensorflow as the machine-learning library as well as MNIST, Fashion-MNIST, and CIFAR10 as the datasets. Experimental results show that the proposed method can reduce the accuracy of the chosen class by 43.2%, 41.7%, and 55.3% in MNIST, Fashion-MNIST, and CIFAR10, respectively, while maintaining the accuracy of the remaining classes.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    Publication Date: 2019
    Description: We define a family of observables for abelian Yang-Mills fields associated to compact regions U ⊆ M with smooth boundary in Riemannian manifolds. Each observable is parametrized by a first variation of solutions and arises as the integration of gauge invariant conserved current along admissible hypersurfaces contained in the region. The Poisson bracket uses the integration of a canonical multisymplectic current.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Publication Date: 2019
    Description: Video analysis is currently the main non-intrusive method for the study of collective behavior. However, 3D-to-2D projection leads to overlapping of observed objects. The situation is further complicated by the absence of stall shapes for the majority of living objects. Fortunately, living objects often possess a certain symmetry which was used as a basis for morphological fingerprinting. This technique allowed us to record forms of symmetrical objects in a pose-invariant way. When combined with image skeletonization, this gives a robust, nonlinear, optimization-free, and fast method for detection of overlapping objects, even without any rigid pattern. This novel method was verified on fish (European bass, Dicentrarchus labrax, and tiger barbs, Puntius tetrazona) swimming in a reasonably small tank, which forced them to exhibit a large variety of shapes. Compared with manual detection, the correct number of objects was determined for up to almost 90 % of overlaps, and the mean Dice-Sørensen coefficient was around 0.83 . This implies that this method is feasible in real-life applications such as toxicity testing.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Publication Date: 2019
    Description: In this paper, we are concerned with a nonlinear system containing some essential symmetrical structures (e.g., cross-diffusion) in the two-dimensional setting, which is proposed to model the biological transport networks. We first provide an a priori blow-up criterion of strong solution of the corresponding Cauchy problem. Based on this, we also establish a priori upper bounds to strong solution for all positive times.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    Publication Date: 2019
    Description: We first formulate the mixed backward in time problem in the context of thermoelasticity for dipolar materials. To prove the consistency of this mixed problem, our first main result is regarding the uniqueness of the solution for this problem. This is obtained based on some auxiliary results, namely, four integral identities. The second main result is regarding the temporal behavior of our thermoelastic body with a dipolar structure. This behavior is studied by means of some relations on a partition of various parts of the energy associated to the solution of the problem.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    Publication Date: 2019
    Description: Feature interaction is a newly proposed feature relevance relationship, but the unintentional removal of interactive features can result in poor classification performance for this relationship. However, traditional feature selection algorithms mainly focus on detecting relevant and redundant features while interactive features are usually ignored. To deal with this problem, feature relevance, feature redundancy and feature interaction are redefined based on information theory. Then a new feature selection algorithm named CMIFSI (Conditional Mutual Information based Feature Selection considering Interaction) is proposed in this paper, which makes use of conditional mutual information to estimate feature redundancy and interaction, respectively. To verify the effectiveness of our algorithm, empirical experiments are conducted to compare it with other several representative feature selection algorithms. The results on both synthetic and benchmark datasets indicate that our algorithm achieves better results than other methods in most cases. Further, it highlights the necessity of dealing with feature interaction.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    Publication Date: 2019
    Description: A chaotic system and two Nonlinear Feadback Shift Registers (NFSRs) are used to generate a new stream cipher in this paper. This design can be used for efficient encryption in resource-constrained devices or environments. The chaotic system is quantified and integrated with two NFSRs based on the technology of Field Programmable Gate Array (FPGA). Many analyses are made from the angle of entropy in order to verify the cryptographic characteristics of the stream cipher, and National Institute of Standards and Technology (NIST) statistical test is completed to analyze the cipher. The test results show that the stream cipher here has good cryptographic characteristics.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    Publication Date: 2019
    Description: In this paper, we present a new computational method for solving linear Fredholm integral equations of the second kind, which is based on the use of B-spline quasi-affine tight framelet systems generated by the unitary and oblique extension principles. We convert the integral equation to a system of linear equations. We provide an example of the construction of quasi-affine tight framelet systems. We also give some numerical evidence to illustrate our method. The numerical results confirm that the method is efficient, very effective and accurate.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    Publication Date: 2019
    Description: The security issue on the physical layer is of significant challenge yet of paramount importance for 5G communications. In some previous works, transmit power allocation has already been studied for orthogonal frequency division multiplexing (OFDM) secure communication with Gaussian channel inputs for both a single user and multiple users. Faced with peak transmission power constraints, we adopt discrete channel inputs (e.g., equiprobable Quadrature Phase Shift Keying (QPSK) with symmetry) in a practical communication system, instead of Gaussian channel inputs. Finite-alphabet inputs impose a more significant challenge as compared with conventional Gaussian random inputs for the multiuser wiretap OFDM systems. This paper considers the joint resource allocation in frequency-domain artificial noise (AN) assisted multiuser wiretap OFDM channels with discrete channel inputs. This security problem is formulated as nonconvex sum secrecy rate optimization by jointly optimizing the subcarrier allocation, information-bearing power, and AN-bearing power. To this end, with a suboptimal subcarrier allocation scheme, we propose an efficient iterative algorithm to allocate the power between the information and the AN via the Lagrange duality method. Finally, we carry out some numerical simulations to demonstrate the performance of the proposed algorithm.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    Publication Date: 2019
    Description: A Friedmann–Robertson–Walker Universe was studied with a dark energy component represented by a quintessence field. The Lagrangian for this system, hereafter called the Friedmann–Robertson–Walker–quintessence (FRWq) system, was presented. It was shown that the classical Lagrangian reproduces the usual two (second order) dynamical equations for the radius of the Universe and for the quintessence scalar field, as well as a (first order) constraint equation. Our approach naturally unified gravity and dark energy, as it was obtained that the Lagrangian and the equations of motion are those of a relativistic particle moving on a two-dimensional, conformally flat spacetime. The conformal metric factor was related to the dark energy scalar field potential. We proceeded to quantize the system in three different schemes. First, we assumed the Universe was a spinless particle (as it is common in literature), obtaining a quantum theory for a Universe described by the Klein–Gordon equation. Second, we pushed the quantization scheme further, assuming the Universe as a Dirac particle, and therefore constructing its corresponding Dirac and Majorana theories. With the different theories, we calculated the expected values for the scale factor of the Universe. They depend on the type of quantization scheme used. The differences between the Dirac and Majorana schemes are highlighted here. The implications of the different quantization procedures are discussed. Finally, the possible consequences for a multiverse theory of the Dirac and Majorana quantized Universe are briefly considered.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    Publication Date: 2019
    Description: The main contribution in this paper is to construct an implicit fixed coefficient Block Backward Differentiation Formulas denoted as A ( α ) -BBDF with equal intervals for solving stiff ordinary differential equations (ODEs). To avoid calculating the differentiation coefficients at each step of the integration, the coefficients of the formulas will be stored, with the intention of optimizing the performance in terms of precision and computational time. The plots of their A ( α ) stability region are provided, and the order of the method is also verified. The necessary conditions for convergence, such as the consistency and zero stability of the method, are also discussed. The numerical results clearly showed the efficiency of the method in terms of accuracy and execution time as compared to other existing methods in the scientific literature.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    Publication Date: 2019
    Description: Each loop in a multi-loop rail network consists of two segments, both of which have roughly the same conditions and mileage and are approximately symmetrical. This paper is devoted to optimizing the paths of trains formed at the loading area in a multi-loop rail network. To attain this goal, three different situations are analyzed, and two models are proposed for networks with adequate and inadequate capabilities. Computational experiments are also carried out using the commercial software Lingo, with the branch and bound algorithm. The results show that the models can achieve the same solution with different solution times. To solve the problem of path selection for large-scale train flows, a genetic algorithm is also designed and proves to perform well in a set of computational experiments.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    Publication Date: 2019
    Description: This paper is concerned with the design of an improved El-Gamal cryptosystem based on chaos synchronization. The El-Gamal cryptosystem is an asymmetric encryption algorithm that must use the public and private keys, respectively, in the encryption and decryption processes. However, in our design, the public key does not have to appear in the public channel. Therefore, this proposed improved El-Gamal cryptosystem becomes a symmetric-like encryption algorithm. First, a discrete sliding mode controller is proposed to ensure the synchronization of master and slave chaotic systems; next, a novel improved El-Gamal cryptosystem is presented. In the traditional El-Gamal cryptosystem, the public key is static and needs to be open which provides an opportunity to attack. However, in this improved design, due to the chaos synchronization, the public key becomes dynamic and does not appear in public channels. As a result, drawbacks of long cipher text and time-consuming calculation in the traditional El-Gamal cryptosystem are all removed. Finally, several performance tests and comparisons have shown the efficiency and security of the proposed algorithm.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    Publication Date: 2019
    Description: In this paper, we focus on methods to prevent shoulder-surfing attacks. We initially adopted digraph substitution rules from PlayFair cipher as our proposed method. PlayFair cipher is a modern cryptography method, which exists at the intersection of the disciplines of mathematics and computer science. However, according to our preliminary study it was insufficient to prevent shoulder-surfing attacks. Thus, a new method had to be proposed. In this new proposed method, we improvised the digraph substitution rules and used these rules together with an output feedback method to determine a pass-image. Our proposed method was evaluated with a user study. The results showed our proposed method was robust against both direct observation and video-recorded shoulder-surfing attacks.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    Publication Date: 2019
    Description: In this paper, by applying the decision theorem of the Schur-power convex function, the Schur-power convexity of a class of complete symmetric functions are studied. As applications, some new inequalities are established.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    Publication Date: 2019
    Description: A competing risks model under progressively type II censored data following the Rayleigh distribution is considered. We establish the maximum likelihood estimation for unknown parameters and compute the observed information matrix and the expected Fisher information matrix to construct the asymptotic confidence intervals. Moreover, we obtain the Bayes estimation based on symmetric and non-symmetric loss functions, that is, the squared error loss function and the general entropy loss function, and the highest posterior density intervals are also derived. In addition, a simulation study is presented to assess the performances of different methods discussed in this paper. A real-life data set analysis is provided for illustration purposes.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    Publication Date: 2019
    Description: A Couette-Poiseuille flow between parallel plates saturated with porous medium is studied with emphasis on viscous dissipation effect on the temperature field; assuming a fully developed flow, with both plates subjected to unequal and uniform heat flux. Temperature field and Nusselt number are derived as a function of Brinkman number and porous medium shape factor. By specifying the ratio of wall to mean velocity as one, the resulting velocity and temperature fields attribute to a significant increase in Nusselt number for the moving wall as the permeability of porous medium increases. Increased permeability signifies competing effect between enhanced convection in the proximity of the moving wall and higher local viscous dissipation. When the former effect dominates, heat transfer coefficient increases. Effects of Reynolds number on the temperature field is elucidated, including a comparison between a microchannel and conventional duct to evaluate the characteristic length scale effect. As Reynolds number goes up in a microchannel, heat generation in the form of viscous dissipation intensifies and overrides the convection effect, causing an increase in the highest temperature along the duct on the contrary to the findings in conventional duct.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    Publication Date: 2019
    Description: In this study, we present an analytical study on blood flow analysis through with a tapered porous channel. The blood flow was driven by the peristaltic pumping. Thermal radiation effects were also taken into account. The convective and slip boundary conditions were also applied in this formulation. These conditions are very helpful to carry out the behavior of particle movement which may be utilized for cardiac surgery. The tapered porous channel had an unvarying wave speed with dissimilar amplitudes and phase. The non-dimensional analysis was utilized for some approximations such as the proposed mathematical modelling equations were modified by using a lubrication approach and the analytical solutions for stream function, nanoparticle temperature and volumetric concentration profiles were obtained. The impacts of various emerging parameters on the thermal characteristics and nanoparticles concentration were analyzed with the help of computational results. The trapping phenomenon was also examined for relevant parameters. It was also observed that the geometric parameters, like amplitudes, non-uniform parameters and phase difference, play an important role in controlling the nanofluids transport phenomena. The outcomes of the present model may be applicable in the smart nanofluid peristaltic pump which may be utilized in hemodialysis.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    Publication Date: 2019
    Description: The purpose of this article is to define almost ( α , F σ ) -contractions and establish some generalized fixed-point results for a new class of contractive conditions in the setting of complete metric spaces. In application, we apply our fixed-point theorem to prove the existence theorem for Fredholm integral inclusions ϖ ( t ) ∈ f ( t ) + ∫ 0 1 K ( t , s , x ( s ) ) ϑ s , t ∈ [ 0 , 1 ] where f ∈ C [ 0 , 1 ] is a given real-valued function and K : [ 0 , 1 ] × [ 0 , 1 ] × R → K c v ( R ) is a given multivalued operator, where K c v represents the family of nonempty compact and convex subsets of R and ϖ ∈ C [ 0 , 1 ] is the unknown function. We also provide a non-trivial example to show the significance of our main result.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    Publication Date: 2019
    Description: Composite quantile regression (CQR) estimation and inference are studied for varying coefficient models with response data missing at random. Three estimators including the weighted local linear CQR (WLLCQR) estimator, the nonparametric WLLCQR (NWLLCQR) estimator, and the imputed WLLCQR (IWLLCQR) estimator are proposed for unknown coefficient functions. Under some mild conditions, the proposed estimators are asymptotic normal. Simulation studies demonstrate that the unknown coefficient estimators with IWLLCQR are superior to the other two with WLLCQR and NWLLCQR. Moreover, bootstrap test procedures based on the IWLLCQR fittings is developed to test whether the coefficient functions are actually varying. Finally, a type of investigated real-life data is analyzed to illustrated the applications of the proposed method.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    Publication Date: 2019
    Description: This paper reports on the Walnut Digital Signature Algorithm (WalnutDSA), which is an asymmetric signature scheme recently presented for standardization at the NIST call for post-quantum cryptographic constructions. WalnutDSA is a group theoretical construction, the security of which relies on the hardness of certain problems related to an action of a braid group on a finite set. In spite of originally resisting the typical attacks succeeding against this kind of construction, soon different loopholes were identified rendering the proposal insecure (and finally, resulting in it being excluded from Round 2 of the NIST competition). Some of these attacks are related to the well-structured and symmetric masking of certain secret elements during the signing process. We explain the design principles behind this proposal and survey the main attack strategies that have succeeded, contradicting its claimed security properties, as well as the recently-proposed ideas aimed at overcoming these issues.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    Publication Date: 2019
    Description: Analysis of motion symmetry constitutes an important area with many applications in engineering, robotics, neurology and biomedicine. This paper presents the use of microelectromechanical sensors (MEMS), including accelerometers and gyrometers, to acquire data via mobile devices so as to monitor physical activities and their irregularities. Special attention is devoted to the analysis of the symmetry of the motion of the body when the same exercises are performed by the right and the left limb. The analyzed data include the motion of the legs on a home exercise bike under different levels of load. The method is based on signal analysis using the discrete wavelet transform and the evaluation of signal segment features such as the relative energy at selected decomposition levels. The subsequent classification of the evaluated features is performed by k-nearest neighbours, a Bayesian approach, a support vector machine, and neural networks. The highest average classification accuracy attained is 91.0% and the lowest mean cross-validation error is 0.091, resulting from the use of a neural network. This paper presents the advantages of the use of simple sensors, their combination and intelligent data processing for the numerical evaluation of motion features in the rehabilitation and monitoring of physical activities.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    Publication Date: 2019
    Description: Multipath diversity significantly impacts multipath transmission quality. Enough multipath diversity would minimize the negative influence brought by an individual path, thus improving tolerance capability of network congestion and failure. However, multipath diversity is hard to guarantee on overlay networks because of inaccurate awareness of underlay network and multipath generating methods considering little about underlay diversity. In this paper, we design a multi-dimension spatial method for topology awareness and multipath generating. Analyzing that the complicated underlay networks with multiple autonomous systems reduce the accuracy of network positioning for topology awareness, we decompose the underlay networks into multiple dimensions, namely intra and inter autonomous system dimensions. We generate independent views for each autonomous system and merge views by embedding exchange points. Then, we design some spatial mechanisms to evaluate link diversity and to constrain multipath generating. Based on the multi-dimensional view, multipath generating is conducted in inter and intra autonomous system phases. Experiments demonstrate that the proposed method improves topology awareness accuracy and guarantees multipath diversity better and the transmission quality is improved.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    Publication Date: 2019
    Description: In this paper, a kernel recursive maximum Versoria-like criterion (KRMVLC) algorithm has been constructed, derived, and analyzed within the framework of nonlinear adaptive filtering (AF), which considers the benefits of logarithmic second-order errors and the symmetry maximum-Versoria criterion (MVC) lying in reproducing the kernel Hilbert space (RKHS). In the devised KRMVLC, the Versoria approach aims to resist the impulse noise. The proposed KRMVLC algorithm was carefully derived for taking the nonlinear channel equalization (NCE) under different non-Gaussian interferences. The achieved results verify that the KRMVLC is robust against non-Gaussian interferences and performs better than those of the popular kernel AF algorithms, like the kernel least-mean-square (KLMS), kernel least-mixed-mean-square (KLMMN), and Kernel maximum Versoria criterion (KMVC).
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Publication Date: 2019
    Description: GOX (3QVR), glucose oxidase, is an oxidoreductase enzyme, which has found many applications in biotechnology and modern diagnostics with typical assays including biosensors useful in the determination of free glucose in body fluids. PEI (polyethylenimines) are polymer molecules made up of amine groups and two aliphatic carbons, which are cyclically repeated. PEI are transfection reagents which, using positively charged units, bind well to anionic DNA residues. During the studies on GOX, PEI were used both in their linear and branched structures. Rhombellanes, RBL, are structures decorated with rhombs/squares. The aim of the paper is to study the interactions of two kinds of linear ligands: PEIs (Polyethylenimines) and CHRs (ethers of Hexahydroxy-cyclohexane) with the glucose oxidase enzyme, GOX (3QVR). To understand the structure-activity relationship between the GOX enzyme and the linear ligands PEI and CHR, two steps of docking simulation were performed; mapping the whole area of the 3QVR enzyme and docking on the first and second surface of the enzyme, separately. The studied ligands interacted with amino acids of GOX inside the protein and on its surface, with stronger and shorter bonds inside of the protein. However, long chain ligands can only interact with amino acids on the external protein surface. After the study, two domains of the enzyme were clearly evidenced; the external surface domain more easily creates interactions with ligands, particularly with CHR ligands.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    Publication Date: 2019
    Description: In this article, we study an extension of the sinh Cauchy model in order to obtain asymmetric bimodality. The behavior of the distribution may be either unimodal or bimodal. We calculate its cumulative distribution function and use it to carry out quantile regression. We calculate the maximum likelihood estimators and carry out a simulation study. Two applications are analyzed based on real data to illustrate the flexibility of the distribution for modeling unimodal and bimodal data.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    Publication Date: 2019
    Description: Cisplatin (cisPt) is one of the strongest anticancer agents with proven clinical activity against a wide range of solid tumors. Its mode of action has been linked to its ability to crosslink with the canonical purine bases, primarily with guanine. Theoretical studies performed at the molecular level suggest that such nonspecific interactions can also take place with many competitive compounds, such as vitamins of the B group, containing aromatic rings with lone-pair orbitals. This might be an indicator of reduction of the anticancer therapeutic effects of the Cisplatin drug in the presence of vitamins of the B group inside the cell nucleus. That is why it seems to be important to connect CisPt with nanostructures and in this way prevent the drug from combining with the B vitamins. As a proposal for a new nanodrug, an attempt was made to implement Cispaltin (CisPt) ligand on functionalized C60 fullerenes and on a cube rhombellane homeomorphic surface. The symmetry of the analyzed nanostructures is an important factor determining the mutual affinity of the tested ligand and nanocarriers. The behavior of Cisplatin with respect to rhombellane homeomorphs and functionalized fullerenes C60, in terms of their (interacting) energy, geometry and topology was studied and a detailed analysis of structural properties after docking showed many interesting features.
    Electronic ISSN: 2073-8994
    Topics: Mathematics
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...