Volume 55 (2023)
Volume 54 (2022)
Volume 53 (2021)
Volume 52 (2020)
Volume 51 (2019)
Volume 50 (2018)
Volume 49 (2017)
Volume 48 (2016)
Volume 47 (2016)
Volume 46 (2015)
Volume 45 (2014)
Volume 44 (2013)
Volume 43 (2009)
Volume 42 (2008)
Volume 41 (2007)

Two different inverse eigenvalue problems for nonsymmetric tridiagonal matrices

Ferya Fathi; Mohammad Ali Fariborzi Araghi; Seyed Abolfazl Shahzadeh Fazeli

Volume 52, Issue 2 , December 2020, , Pages 137-148


  Inverse eigenvalue problems (IEPs) of tridiagonal matrices are among the most popular IEPs, this is due to the widespread application of this matrix. In this paper, two different IEPs with different eigen information including eigenvalues and eigenvectors are presented on the nonsymmetric ...  Read More

A Note on : The Effect of Lying in a Negotiation Game

Reza Habibi

Volume 54, Issue 2 , December 2022, , Pages 137-142


  threaten system self-worth by preventing them from seeing themselves as a good system, and it can generally erode trust in society. Lying may be considered a game. This paper is concerned with the effect of lying in a system containing two agents using the game theory. From a repeated measurement model, ...  Read More

A security aware workflow scheduling in hybrid cloud based on PSO algorithm

Maedeh Mehravaran; Fazlollah Adibnia; Mohammad-Reza Pajoohan

Volume 52, Issue 1 , June 2020, , Pages 139-161


  In real world, organization's requirements for high performance resources and high capacity storage devices encourage them to use resources in public clouds. While private cloud provides security and low cost for scheduling workflow, public clouds provide a higher scale, potentially exposed to the risk ...  Read More

Optimizing Insurance Contract for a two-level two-period Supply Chain

Saleh Hatami Sharif Abadi; Hasan Hosseini Nasab; Mohammad Bagher Fakhrzad; Hasan Khademi Zarei

Volume 54, Issue 1 , June 2022, , Pages 139-174


  We can apply any method for organizing a supply chain, but contracting is more viable. Among many contracts that does so, the Insurance contract is more efficient. The problem is tuning the contract's parameters (for a two-level two-period supply chain with one supplier and one retailer) to achieve the ...  Read More

Using a New Strategy in Imperialist Competitive Algorithm to Solve Multi‑objective Problems (WSICA)

Mina Moosapour; Ahmad Bagheri; Mohammad Javad Mahmoodabadi

Volume 55, Issue 1 , June 2023, , Pages 141-183


  The imperialist competitive algorithm (ICA) is developed based on the socio-political process of imperialist competitions. It is an efficient approach for single-objective optimization problems. However, this algorithm fails to optimize multi-objective problems (MPOs) with conflicting objectives. This ...  Read More

Distribution of RNA 5-mers in Epigenetic Modification Regions and Genes Interactions

Dariush Salimi; mohaddese salimi; Ali Moieni

Volume 54, Issue 2 , December 2022, , Pages 143-162


  The demand for extracting sophisticated features, capable of effectively predicting gene interaction networks, from DNA or RNA sequences has increased in computational biology. The epigenetic modifications along with their patterns have been intensely recognized as appealing features affecting gene interaction. ...  Read More

A note on the approximability of the tenacity of graphs

Vahid Heidari; Dara Moazzami

Volume 52, Issue 2 , December 2020, , Pages 149-157


  In this paper we show that, if $NP\neq ZPP$, for any $\epsilon > 0$, the tenacity of graphwith $n$ vertices is not approximable in polynomial time within a factor of$\frac{1}{2} \left( \frac{n-1}{2} \right) ^{1-\epsilon}$.  Read More

Pair Difference Cordiality of Some Snake and Butterfly Graphs

R Ponraj; A Gayathri; S Somasundaram

Volume 53, Issue 1 , June 2021, , Pages 149-163


  \noindent Let $G = (V, E)$ be a $(p,q)$ graph.\\Define \begin{equation*}\rho =\begin{cases}\frac{p}{2} ,& \text{if $p$ is even}\\\frac{p-1}{2} ,& \text{if $p$ is odd}\\\end{cases}\end{equation*}\\ and $L = \{\pm1 ,\pm2, \pm3 , \cdots ,\pm\rho\}$ called the set of labels.\\\noindent Consider ...  Read More

A Systematic Way for Selecting Suitable Journal for Publishing Manuscripts


Volume 53, Issue 2 , December 2021, , Pages 157-164


  Selecting suitable journals for publishing manuscripts for publication is one of the most essential processes before publishing any manuscript. Finding the relevant journal is a key factor which proves one's work valuable to the entire society. The final output and the performance of one's research is ...  Read More

On the expected weight of the theta graph on uncertain points

Behnam Iranfar; Mohammad Farshi

Volume 52, Issue 1 , June 2020, , Pages 163-174


  Given a point set $S\subset \mathbb{R}^d$, the $\theta$-graph of $S$ is as follows: for each point $s\in S$, draw cones with apex at $s$ and angle $\theta$ %fix a line through $p$ at each cone and connect $s$ to the point in each cone such that the projection of the point on the bisector of the cone ...  Read More

Colorectal cancer driver gene detection in human gene regulatory network using an independent cascade diffusion model

Mostafa Akhavan-Safar; Babak Teimourpour; Mahboube Ayyoubi

Volume 54, Issue 2 , December 2022, , Pages 163-185


  One of the important topics in oncology for treatment and prevention is the identification of genes that initiate cancer in cells. These genes are known as cancer driver genes (CDG). Identifying driver genes is important both for a basic understanding of cancer and for helping to find new therapeutic ...  Read More

Use of Digital Image Watermarking to Enhance the Security of Graphical Password Authentication

Saeid Sadeghi; Kooroush Manochehri; mohsen jahanshahi

Volume 53, Issue 1 , June 2021, , Pages 165-180


  There are several techniques for implement an authentication system for computers that most commonly use the clear text password. One of the security problems is the use of a text password, the lack of choosing a complicated password by users due to forgetting, and being guessable and retrieved by attackers. ...  Read More

Rainbow Edge Colouring of Digraphs

Mahdieh Hasheminezhad

Volume 53, Issue 2 , December 2021, , Pages 165-172


  An edge  coloring of a digraph  $D$ is called a $P_3$-rainbow edge coloring if  the edges of any directed path of $D$ with length 2 are colored with different colors. It is proved that  for a $P_3$-rainbow edge coloring of  a digraph $D$, at least $\left\lceil{log_2{\chi(D)}} ...  Read More

Negative Cost Girth Problem using Map-Reduce Framework

Mahboubeh Shamsi; Abdolreza Rasouli Kenari; Roghayeh Aghamohammadi

Volume 53, Issue 2 , December 2021, , Pages 173-196


  On a graph with a negative cost cycle, the shortest path is undefined, but the number of edges of the shortest negative cost cycle could be computed. It is called Negative Cost Girth (NCG). The NCG problem is applied in many optimization issues such as scheduling and model verification. The existing ...  Read More


.Dara Moazzami

Volume 52, Issue 1 , June 2020, , Pages 175-182


  The edge-tenacity $T_e(G)$ of a graph G was defined as\begin{center} $T_e(G)=\displaystyle \min_{F\subset E(G)}\{\frac{\mid F\mid +\tau(G-F)}{\omega(G-F)}\}$\end{center}where the minimum is taken over all edge cutset F of G. We defineG-F to be the graph induced by the edges of $E(G)-F$, $\tau(G-F)$is ...  Read More

On the resolution of LP-FRE defined by the convex combination operator

Amin Ghodousian; parsa hadadian

Volume 54, Issue 1 , June 2022, , Pages 175-186


  In this paper, a linear programming problem is investigated in which the feasible region is formed as a special type of fuzzy relational equalities (FRE). In this type of FRE, fuzzy composition is considered as the convex combination operator. It is proved that the feasible region of the problem can ...  Read More

A Survey on Tenacity Parameter\\Part I

Asieh Khoshnood; Dara Moazzami

Volume 53, Issue 1 , June 2021, , Pages 181-196


  If we think of the graph as modeling a network, the vulnerability measurethe resistance of the network to disruption of operation after the failure of certainstations or communication links. In assessing the "vulnerability"of a graph one determines the extent to which the graph retains certainproperties ...  Read More

A Note on Early Warning Systems for Monitoring the Inflation of Iran

Elham Daadmehr; Reza Habibi

Volume 52, Issue 1 , June 2020, , Pages 183-195


  To check the financial stability, it is important to alarm the possibility of future potential financial crisis. In the literature, the early warning system (EWS) is designed to warn the occurrence of a financial crisis before it happens. This tool gives strengthens to managers to make efficient policy ...  Read More

On Point-inclusion Test in Convex Polygons and Polyhedrons

Mahdi Imanparast; Mehdi Kazemi Torbaghan

Volume 52, Issue 1 , June 2020, , Pages 197-207


  A new algorithm for point-inclusion test in convex polygons is introduced. The proposed algorithm answers the point-inclusion test in convex polygons in $\mathcal{O}(\log n)$ time without any preprocessing and with $\mathcal{O}(n)$ space. The proposed algorithm is extended to do the point-inclusion test ...  Read More

BloomEclat: Efficient Eclat Algorithm based on Bloom filter

sina abbasi; Ali Moieni

Volume 53, Issue 1 , June 2021, , Pages 197-208


  Eclat is an algorithm that finds frequent itemsets. It uses a vertical database and calculates item's support by intersecting transactions. However, Eclat suffers from the exponential time complexity of calculating the intersection of transactions. In this paper, a randomized algorithm called BloomEclat ...  Read More

Developing a New Genetic Algorithm for Selecting Efficient Project Portfolio

Mohammad Mirabi; Mohammad Reza Zare Banadkouki

Volume 53, Issue 2 , December 2021, , Pages 197-208


  selecting an efficient project portfolio among available projects is a vital decision for any project manager. The main questions are which projects can have more long-term benefit for manager or organization. Due to the complexity of this field of research, todays so many approaches are developed for ...  Read More

An iterative method and maximal solution of Coupled algebraic Riccati equations

Hajar Alimorad

Articles in Press, Accepted Manuscript, Available Online from 29 August 2022


  Coupled Riccati equation has widely been applied to various engineering areas such as jump linear quadratic problem, particle transport theory, and Wiener–Hopf decomposition of Markov chains. In this paper, we consider an iterative method for computing Hermitian solution of the Coupled Algebraic ...  Read More