Volume 56 (2024)
Volume 55 (2023)
Volume 54 (2022)
Volume 53 (2021)
Volume 52 (2020)
Volume 51 (2019)
Volume 50 (2018)
Volume 49 (2017)
Volume 48 (2016)
Volume 47 (2016)
Volume 46 (2015)
Volume 45 (2014)
Volume 44 (2013)
Volume 43 (2009)
Volume 42 (2008)
Volume 41 (2007)
Number of Articles: 457
On the domination number of generalized Petersen graphs
Volume 52, Issue 2 , December 2020, , Pages 57-65
Abstract
Let $n$ and $k$ be integers such that $3\leq 2k+ 1 \leq n$.The generalized Petersen graph $GP(n, k)=(V,E) $ is the graph with $V=\{u_1, u_2,\ldots, u_n\}\cup\{v_1, v_2,\ldots, v_n\}$ and $E=\{u_iu_{i+1}, u_iv_i, v_iv_{i+k}: 1 \leq i \leq n\}$, whereaddition is in modulo $n$. A subset $D\subseteq V$ is ... Read MoreOn the J-Tightness of Graphs
Volume 53, Issue 2 , December 2021, , Pages 57-74
Abstract
We introduce a new invariant vulnerability parameter named “J-Tightness” or “J(G)” for graphs. As a stability measure, its properties along with comparisons to other parameters of a graph are proposed. We show how it is calculated for complete graphs and cycles. We show that J-Tightness ... Read MoreSignature GOA: A novel comfort zone parameter adjustment using fuzzy signature for task scheduling in cloud environment
Volume 53, Issue 1 , June 2021, , Pages 61-95
Abstract
Task scheduling in cloud computing plays an essential role for service provider to enhance its quality of service. Grasshopper Optimization Algorithm (GOA) is an evolutionary computation technique developed by emulating the swarming behavior of grasshoppers while searching for food. GOA is easy to implement ... Read MoreWhat makes a Rhythm to be Bad
Volume 52, Issue 1 , June 2020, , Pages 65-82
Abstract
Deciding whether a musical rhythm is good or not, depends on many factors like geographical conditions of a region, culture, the mood of society, the view of rhythm over years, and so on. In this paper, we want to make a decision from the scientific point of view, using geometric features of rhythms, ... Read MoreOn Hardy's Apology Numbers
Volume 52, Issue 2 , December 2020, , Pages 67-83
Abstract
Twelve well known `Recreational' numbers are generalized and classified in three generalized types Hardy, Dudeney, and Wells. A novel proof method to limit the search for the numbers is exemplified for each of the types. Combinatorial operators are defined to ease programming the search. Read MorePair Difference Cordial Labeling of Double Alternate Snake Graphs
Volume 55, Issue 1 , June 2023, , Pages 67-77
Abstract
In this paper we investigate the pair difference cordial labeling behavior of double alternate triangular snake and double alternate quadrilatral snake graphs. Read MoreC. elegans Neural Network Analysis
Volume 54, Issue 2 , December 2022, , Pages 71-91
Abstract
Artificial neural networks that have been so popular in recent years, are inspired from biological neural networks in the nature. The aim of this work is to study the properties of biological neural networks to find out what is actually happening in these networks. To do so, we study on Caenrohibditis ... Read MoreComparison of solutions resulted from direct problems formulated as FRE
Volume 54, Issue 1 , June 2022, , Pages 73-87
Abstract
In this paper, we investigate direct solution of FRE and compare their results with expected real consequences. We give an applied example formulated by a FRE problem and show that FRE defined by maximum t-conorm and an arbitrary t-norm can yield different interpretations for our example. A necessary ... Read MoreFuzzy Cumulative Distribution Function and its Properties }
Volume 53, Issue 2 , December 2021, , Pages 75-84
Abstract
The statistical methods based on cumulative distribution function is a start point for many parametric or nonparametric statistical inferences. However, there are many practical problems that require dealing with observations/parameters that represent inherently imprecise. However, Hesamian ... Read MoreAn attributed network embedding method to predict missing links in protein-protein interaction networks
Volume 55, Issue 1 , June 2023, , Pages 79-99
Abstract
Predicting missing links in noisy protein-protein interaction networks is an essential~computational method. Recently, attributed network embedding methods have been shown to be significantly effective in generating low-dimensional representations of nodes to predict links; in these representations, ... Read MoreEfficient Storage and Retrieval of In-Memory Static Data
Volume 52, Issue 1 , June 2020, , Pages 83-96
Abstract
Hash or B-Tree based composite indexes, are the two most commonly used techniques for searching and retrieving data from memory. Although these techniques have a serious memory limitation, that restricts \textit{freedom} to search by any combination of single key/data attribute, that comprises the composite ... Read MoreLP Problems on the max - “Fuzzy Or” inequalities systems
Volume 52, Issue 2 , December 2020, , Pages 85-98
Abstract
In this paper, optimization of a linear objective function with fuzzy relational inequality constraints is investigated whereby the feasible region is formed as the intersection of two inequality fuzzy systems and “Fuzzy Or” operator is considered as fuzzy composition. It is shown that a ... Read MorePlane Bounded-Degree Spanners Among the Obstacles for the Points in Convex Position
Volume 53, Issue 2 , December 2021, , Pages 85-90
Abstract
Let $S$ be a set of points in the plane that are in convex position. Let~$\cal O$ be a set of simple polygonal obstacles whose vertices are in $S$. The visibility graph $Vis(S,{\cal O})$ is the graph which is obtained from the complete graph of $S$ by removing all edges intersecting some obstacle ... Read MoreApproximating the Number of Lattice Points inside a Regular Polygon
Volume 54, Issue 1 , June 2022, , Pages 89-98
Abstract
We study the problem of counting the number of lattice points inside a regular polygon with $n$ sides when its center is at the origin and present an exact algorithm with $\mathcal{O}(k^{2}\log n)$ time and two approximate answers for this problem, where $k$ is the absolute value of side length of the ... Read MoreEffective Tamper Detection and Recovery of Images after Serious Attacks
Volume 53, Issue 2 , December 2021, , Pages 91-111
Abstract
Confirming the integrity of transmitted sensitive digital content is a significant issue due to the evolution in communication technologies and the accessibility of image processing tools. Watermarking has been a successful method of authentication and integrity verification recently. However, several ... Read MoreComparing encryption algorithms and providing a new algorithm based on increasing data security
Volume 54, Issue 2 , December 2022, , Pages 93-103
Abstract
In this article, we examine different algorithms in the field of cryptography. And we analyze them from different aspects. Also, we introduce a new solution and algorithm, based on increasing data security. Our proposed method can perform the task optimally and efficiently compared to similar algorithms. ... Read MoreA Computational Criterion for the Irrationality of Some Real Numbers
Volume 52, Issue 1 , June 2020, , Pages 97-104
Abstract
In this paper, we compute the asymptotic average of the decimals of some real numbers. With the help of this computation, we prove that if a real number cannot be represented as a finite decimal and the asymptotic average of its decimals is zero, then it is irrational. We also show that the asymptotic ... Read MoreA Numerical Method for Eigensolution of Tridiagonal Matrices
Volume 53, Issue 1 , June 2021, , Pages 97-115
Abstract
In this paper we have developed an iterative method to solve eigenproblem for non-repetitive tridiagonal matrices. The importance of eigensolution for tridiagonal matrices is that in many algorithms the eigneproblem for an arbitrary matrix is first converted to the eigenproblem for a tridiagonal matrix ... Read MoreGeneralization of DP Curves and Surfaces
Volume 52, Issue 2 , December 2020, , Pages 99-108
Abstract
In CAGD, the DP curves are known as a normalized totally positive curves that have the linear computational complexity. Because of their geometric properties, these curves will have the shape preserving properties, that is, the form of the curve will maintain the shape of the ... Read MoreRelative Clustering Coefficient
Volume 54, Issue 1 , June 2022, , Pages 99-108
Abstract
In this paper, we relatively extend the definition of the global clustering coefficient to another clustering, which we call it \emph{relative clustering coefficient}. The idea of this definition is to ignore the edges in the network that the probability of having an edge is $0$. Here, we also consider ... Read MoreHybrid Filter-Wrapper Feature Selection using Equilibrium Optimization
Volume 55, Issue 1 , June 2023, , Pages 101-122
Abstract
The topic of feature selection has become one of the hottest subjects in machine learning over the last few years. The results of evolutionary algorithm selection have also been promising, along with standard feature selection algorithms. For K-Nearest Neighbor (KNN) classification, this paper presents ... Read MoreSurvival analyses with dependent covariates: A regression tree-base approach
Volume 52, Issue 1 , June 2020, , Pages 105-129
Abstract
Cox proportional hazards models are the most common modelling framework to prediction and evaluation of covariate effects in time-to-event analyses.These models usually do not account the relationship among covariates which may have impacts on survival times.In this article, we introduce regression tree ... Read MoreTurbulent Supply Chain Control with Entropy Minimization Approach
Volume 54, Issue 2 , December 2022, , Pages 105-122
Abstract
Entropy is a measure of disorder in a system and is widely used in other scientific and engineering disciplines such as statistical mechanics and information theory. In a chaotic supply chain, the goal is to reduce chaotic behaviors and predict the future of the supply chain. In this case, relationships ... Read MoreOn the optimization of Hadoop MapReduce default job scheduling through dynamic job prioritization
Volume 52, Issue 2 , December 2020, , Pages 109-126
Abstract
One of the most popular frameworks for big data processing is Apache Hadoop MapReduce. The default Hadoop scheduler uses queue system. However, it does not consider any specific priority for the jobs required for MapReduce programming model. In this paper, a new dynamic score is developed to improve ... Read MoreAn iterative method and maximal solution of Coupled algebraic Riccati equations
Volume 54, Issue 1 , June 2022, , Pages 109-123