Ferya Fathi; Mohammad Ali Fariborzi Araghi; Seyed Abolfazl Shahzadeh Fazeli
Abstract
Inverse eigenvalue problems (IEPs) of tridiagonal matrices are among the most popular IEPs, this is due to the widespread application of this matrix. In this paper, two different IEPs with different eigen information including eigenvalues and eigenvectors are presented on the nonsymmetric ...
Read More
Inverse eigenvalue problems (IEPs) of tridiagonal matrices are among the most popular IEPs, this is due to the widespread application of this matrix. In this paper, two different IEPs with different eigen information including eigenvalues and eigenvectors are presented on the nonsymmetric tridiagonal matrix. A recursive relation of characteristic polynomials of the leading principal submatrices of the required matrix is presented to solve the problems. The application of the problems in graph and perturbation theory is studied. The necessary and sufficient conditions for solvability of the problems are obtained.The algorithms and numerical examples are given to show the applicability of the proposed scheme.
Reza Habibi
Abstract
threaten system self-worth by preventing them from seeing themselves as a good system, and it can generally erode trust in society. Lying may be considered a game. This paper is concerned with the effect of lying in a system containing two agents using the game theory. From a repeated measurement model, ...
Read More
threaten system self-worth by preventing them from seeing themselves as a good system, and it can generally erode trust in society. Lying may be considered a game. This paper is concerned with the effect of lying in a system containing two agents using the game theory. From a repeated measurement model, two agents (which constitute a system) play a global game and it is seen that during a repeated game, the system will be destroyed by laying an agent. The probability of failing negotiation is derived and its behavior is studied under different scenarios. Simulation results are proposed to support theoretical results. Finally, concluding remarks are given.
Maedeh Mehravaran; Fazlollah Adibnia; Mohammad-Reza Pajoohan
Abstract
In real world, organization's requirements for high performance resources and high capacity storage devices encourage them to use resources in public clouds. While private cloud provides security and low cost for scheduling workflow, public clouds provide a higher scale, potentially exposed to the risk ...
Read More
In real world, organization's requirements for high performance resources and high capacity storage devices encourage them to use resources in public clouds. While private cloud provides security and low cost for scheduling workflow, public clouds provide a higher scale, potentially exposed to the risk of data and computation breach, and need to pay the costs. Task scheduling, therefore, is one of the most important problems in cloud computing. In this paper, a new scheduling method is proposed for workflow applications in hybrid cloud considering security. Sensitivity of tasks has been considered in recent works; we, however, consider security requirement for data and security strength for resources. The proposed scheduling method is implemented in Particle Swarm \linebreak Optimization (PSO) algorithm. Our proposed algorithm considers minimizing security distance, that is maximizing similarity of security between data and resources. It, meanwhile, follows time and budget constraints. Through analysis of experimental results,it is shown that the proposed algorithm has selected resources with the most security similarity while user constraints are satisfied.
Saleh Hatami Sharif Abadi; Hasan Hosseini Nasab; Mohammad Bagher Fakhrzad; Hasan Khademi Zarei
Abstract
We can apply any method for organizing a supply chain, but contracting is more viable. Among many contracts that does so, the Insurance contract is more efficient. The problem is tuning the contract's parameters (for a two-level two-period supply chain with one supplier and one retailer) to achieve the ...
Read More
We can apply any method for organizing a supply chain, but contracting is more viable. Among many contracts that does so, the Insurance contract is more efficient. The problem is tuning the contract's parameters (for a two-level two-period supply chain with one supplier and one retailer) to achieve the optimum point where there is more gain for everyone separately, and the predictable risks all have been covered. The insurance contract covers every predictable risk that the downstream is facing. Instead, the retailer gives the supplier some money as a side payment (Premium). So, it has two main parameters, first, the fraction ($\beta$) of every predictable loss by the retailer, which the supplier must pay, and second, the side payment (M), which the retailer must pay. We will find the best $\beta$ for a one-supplier one-retailors supply chain with two main sale periods. But for reaching the optimum state of all the insurance contract's possible forms, we designed some mathematical models based on scenarios. Then we optimize these stochastic models to find the best contract possible for 1000 initial scenarios. Every scenario indicates one possible number for price and one for demand in each period (generating 4000 possible numbers for the independent demand and price). We needed to know the maximum possible profit for the whole supply chain. First, we designed a centralized supply chain where the maximum profit is possible, then a decentralized supply chain to know the minimum of what's possible. When we have the ends of our range, we can design the final model with an insurance contract applied. In this model, we insert the $\beta$ and M into the model as the insurance contract does. First, we reduce the number of scenarios to 20 with a novel method. Then we find the optimum point by solving the final model for each $\beta$. The result was better at $\beta$=0.25. In the next step, by supposing equal negotiating power for the sides, we split the extra money into two equivalent sizes, and the M amount was measured as half of the extra money that the contract can reach. The extra money was at 0.9893 of our range means the contract earns 99.97\% of what is possible.
Mina Moosapour; Ahmad Bagheri; Mohammad Javad Mahmoodabadi
Abstract
The imperialist competitive algorithm (ICA) is developed based on the socio-political process of imperialist competitions. It is an efficient approach for single-objective optimization problems. However, this algorithm fails to optimize multi-objective problems (MPOs) with conflicting objectives. This ...
Read More
The imperialist competitive algorithm (ICA) is developed based on the socio-political process of imperialist competitions. It is an efficient approach for single-objective optimization problems. However, this algorithm fails to optimize multi-objective problems (MPOs) with conflicting objectives. This paper presents a modification of the ICA to different multi-objective problems. To improve the algorithm performance and adapt to the characteristics of MOPs, the Sigma method was used to establish the initial empires, the weighted sum approach (WSum) was employed for empire competition, and an adaptive elimination approach was used for external archiving strategy. the results indicated that the suggested algorithm had a higher performance compared to other algorithms based on diversity and convergence characteristics.
Dariush Salimi; mohaddese salimi; Ali Moieni
Abstract
The demand for extracting sophisticated features, capable of effectively predicting gene interaction networks, from DNA or RNA sequences has increased in computational biology. The epigenetic modifications along with their patterns have been intensely recognized as appealing features affecting gene interaction. ...
Read More
The demand for extracting sophisticated features, capable of effectively predicting gene interaction networks, from DNA or RNA sequences has increased in computational biology. The epigenetic modifications along with their patterns have been intensely recognized as appealing features affecting gene interaction. However, studying sequenced-based features highly correlated to this key element has remained limited. In this paper, the classification of 23 genes in the PPAR signaling pathway associated with muscle fat tissue in humans was proposed based on statistical distributions of the specified RNA-5-mers abundance. Then, we suggested that these 5-mers highly correlated to epigenetic modifications can efficiently categorize the different gene interactions, particularly co-expression interaction and physical interaction. Our results were evaluated according to GeneMania web interface shows that the geometric distribution of 5 mers in the epigenetic modifications region indicates the proportion of most physical interactions and the Poisson distribution the proportion of most Co-expression between genes
Vahid Heidari; Dara Moazzami
Abstract
In this paper we show that, if $NP\neq ZPP$, for any $\epsilon > 0$, the tenacity of graphwith $n$ vertices is not approximable in polynomial time within a factor of$\frac{1}{2} \left( \frac{n-1}{2} \right) ^{1-\epsilon}$.
Read More
In this paper we show that, if $NP\neq ZPP$, for any $\epsilon > 0$, the tenacity of graphwith $n$ vertices is not approximable in polynomial time within a factor of$\frac{1}{2} \left( \frac{n-1}{2} \right) ^{1-\epsilon}$.
R Ponraj; A Gayathri; S Somasundaram
Abstract
\noindent Let $G = (V, E)$ be a $(p,q)$ graph.\\Define \begin{equation*}\rho =\begin{cases}\frac{p}{2} ,& \text{if $p$ is even}\\\frac{p-1}{2} ,& \text{if $p$ is odd}\\\end{cases}\end{equation*}\\ and $L = \{\pm1 ,\pm2, \pm3 , \cdots ,\pm\rho\}$ called the set of labels.\\\noindent Consider ...
Read More
\noindent Let $G = (V, E)$ be a $(p,q)$ graph.\\Define \begin{equation*}\rho =\begin{cases}\frac{p}{2} ,& \text{if $p$ is even}\\\frac{p-1}{2} ,& \text{if $p$ is odd}\\\end{cases}\end{equation*}\\ and $L = \{\pm1 ,\pm2, \pm3 , \cdots ,\pm\rho\}$ called the set of labels.\\\noindent Consider a mapping $f : V \longrightarrow L$ by assigning different labels in L to the different elements of V when p is even and different labels in L to p-1 elements of V and repeating a label for the remaining one vertex when $p$ is odd.The labeling as defined above is said to be a pair difference cordial labeling if for each edge $uv$ of $G$ there exists a labeling $\left|f(u) - f(v)\right|$ such that $\left|\Delta_{f_1} - \Delta_{f_1^c}\right| \leq 1$, where $\Delta_{f_1}$ and $\Delta_{f_1^c}$ respectively denote the number of edges labeled with $1$ and number of edges not labeled with $1$. A graph $G$ for which there exists a pair difference cordial labeling is called a pair difference cordial graph. In this paper we investigate the pair difference cordial labeling behavior of some snake and butterfly graphs.
KISHORE KRISNA S; Manav R Samant; RAAJ KHISHORRE K R; Sreeharan B N
Abstract
Selecting suitable journals for publishing manuscripts for publication is one of the most essential processes before publishing any manuscript. Finding the relevant journal is a key factor which proves one's work valuable to the entire society. The final output and the performance of one's research is ...
Read More
Selecting suitable journals for publishing manuscripts for publication is one of the most essential processes before publishing any manuscript. Finding the relevant journal is a key factor which proves one's work valuable to the entire society. The final output and the performance of one's research is ultimately validated only if the paper is published in a right journal. One of the greatest mistakes that the authors make is submitting their manuscript in an unsuitable journal. The author should also consider all the six parameters such as Scope, Cite Score, Impact factor, Acceptance Rate, Time to first decision and Time to publication. Some authors only consider the acceptance rate and the time to first decision and publication as their main criteria. The author should consider all these parameters while publishing the paper. An algorithm named DEAR is used in the work which can consider all these parameters to find the right journal among the various alternatives. This DEAR method serves as a user-friendly method in selecting the best journal.
Behnam Iranfar; Mohammad Farshi
Abstract
Given a point set $S\subset \mathbb{R}^d$, the $\theta$-graph of $S$ is as follows: for each point $s\in S$, draw cones with apex at $s$ and angle $\theta$ %fix a line through $p$ at each cone and connect $s$ to the point in each cone such that the projection of the point on the bisector of the cone ...
Read More
Given a point set $S\subset \mathbb{R}^d$, the $\theta$-graph of $S$ is as follows: for each point $s\in S$, draw cones with apex at $s$ and angle $\theta$ %fix a line through $p$ at each cone and connect $s$ to the point in each cone such that the projection of the point on the bisector of the cone is the closest to~$s$. One can define the $\theta$- graph on an uncertain point set, i.e. a point set where each point $s_i$ exists with an independent probability $\pi_i \in (0,1]$. In this paper, we propose an algorithm that computes the expected weight of the $\theta$-graph on a given uncertain point set. The proposed algorithm takes $O(n^2\alpha(n^2,n)^{2d})$ time and $O(n^2)$ space, where $n$ is the number of points, $d$ and $\theta$ are constants, and $\alpha$ is the inverse of the Ackermann's function.
Mostafa Akhavan-Safar; Babak Teimourpour; Mahboube Ayyoubi
Abstract
One of the important topics in oncology for treatment and prevention is the identification of genes that initiate cancer in cells. These genes are known as cancer driver genes (CDG). Identifying driver genes is important both for a basic understanding of cancer and for helping to find new therapeutic ...
Read More
One of the important topics in oncology for treatment and prevention is the identification of genes that initiate cancer in cells. These genes are known as cancer driver genes (CDG). Identifying driver genes is important both for a basic understanding of cancer and for helping to find new therapeutic goals or biomarkers. Several computational methods for finding cancer-driver genes have been developed from genome data. However, most of these methods find key mutations in genomic data to predict cancer driver genes. methods are dependent on mutation and genomic data and often have a high rate of false positives in the results. In this study, we proposed a network-based method, GeneIC, which can detect cancer driver genes without the need for mutation data. In this method, the concept of influence maximization and the independent cascade model is used. First, a cancer gene regulatory network was created using regulatory interactions and gene expression data. Then we implemented an independent cascade propagation algorithm on the network to calculate the coverage of each gene. Finally, the genes with the highest coverage were introduced as driver genes. The results of our proposed method were compared with 19 previous computational and network methods based on the F-measure metric and the number of detected drivers. The results showed that the proposed method has a better outcome than other methods. In addition, more than 25.49\% of the driver genes reported by GeneIC are new driver genes that have not been reported by any other computational method.
Saeid Sadeghi; Kooroush Manochehri; mohsen jahanshahi
Abstract
There are several techniques for implement an authentication system for computers that most commonly use the clear text password. One of the security problems is the use of a text password, the lack of choosing a complicated password by users due to forgetting, and being guessable and retrieved by attackers. ...
Read More
There are several techniques for implement an authentication system for computers that most commonly use the clear text password. One of the security problems is the use of a text password, the lack of choosing a complicated password by users due to forgetting, and being guessable and retrieved by attackers. One of the methods for passing text passwords is the use of graphical password authentication systems that increase the amount of forgetting passwords by using images instead of text characters. In this paper, the security challenges of using a graphical password are discussed. Then, explain a method for using the watermarking digital image for the authentication process and providing an algorithm suitable for watermarking and enhance the security of graphical password authentication system, and its quantitative and qualitative security parameters will be examined.
Mahdieh Hasheminezhad
Abstract
An edge coloring of a digraph $D$ is called a $P_3$-rainbow edge coloring if the edges of any directed path of $D$ with length 2 are colored with different colors. It is proved that for a $P_3$-rainbow edge coloring of a digraph $D$, at least $\left\lceil{log_2{\chi(D)}} ...
Read More
An edge coloring of a digraph $D$ is called a $P_3$-rainbow edge coloring if the edges of any directed path of $D$ with length 2 are colored with different colors. It is proved that for a $P_3$-rainbow edge coloring of a digraph $D$, at least $\left\lceil{log_2{\chi(D)}} \right\rceil$ colors are necessary and $ 2\left\lceil{log_2{\chi(D)}}\right\rceil\}$ colors are enough. One can determine in linear time if a digraph has a $P_3$-rainbow edge coloring with 1 or 2 colors. In this paper, it is proved that determining that a digraph has a $P_3$-rainbow edge coloring with 3 colors is an NP-complete problem even for planar digraphs. Moreover, it is shown that $\left\lceil{log_2{\chi(D)}}\right\rceil$ colors is necessary and sufficient for a $P_3$-rainbow edge coloringof a transitive orientation digraph $D$.
Mahboubeh Shamsi; Abdolreza Rasouli Kenari; Roghayeh Aghamohammadi
Abstract
On a graph with a negative cost cycle, the shortest path is undefined, but the number of edges of the shortest negative cost cycle could be computed. It is called Negative Cost Girth (NCG). The NCG problem is applied in many optimization issues such as scheduling and model verification. The existing ...
Read More
On a graph with a negative cost cycle, the shortest path is undefined, but the number of edges of the shortest negative cost cycle could be computed. It is called Negative Cost Girth (NCG). The NCG problem is applied in many optimization issues such as scheduling and model verification. The existing polynomial algorithms suffer from high computation and memory consumption. In this paper, a powerful Map-Reduce framework implemented to find the NCG of a graph. The proposed algorithm runs in $O(\log_{}{k})$ parallel time over $O(n^3)$ on each Hadoop nodes, where $n, k$ are the size of the graph and the value of NCG, respectively. The Hadoop implementation of the algorithm shows that the total execution time is reduced by 50\% compared with polynomial algorithms, especially in large networks concerning increasing the numbers of Hadoop nodes. The result proves the efficiency of the approach for solving the NCG problem to process big data in a parallel and distributed way.
.Dara Moazzami
Abstract
The edge-tenacity $T_e(G)$ of a graph G was defined as\begin{center} $T_e(G)=\displaystyle \min_{F\subset E(G)}\{\frac{\mid F\mid +\tau(G-F)}{\omega(G-F)}\}$\end{center}where the minimum is taken over all edge cutset F of G. We defineG-F to be the graph induced by the edges of $E(G)-F$, $\tau(G-F)$is ...
Read More
The edge-tenacity $T_e(G)$ of a graph G was defined as\begin{center} $T_e(G)=\displaystyle \min_{F\subset E(G)}\{\frac{\mid F\mid +\tau(G-F)}{\omega(G-F)}\}$\end{center}where the minimum is taken over all edge cutset F of G. We defineG-F to be the graph induced by the edges of $E(G)-F$, $\tau(G-F)$is the number of edges in the largest component of the graphinduced by G-F and $\omega(G-F)$ is the number of components of$G-F$. A set $F\subset E(G)$ is said to be a $T_e$-set of G if\begin{center} $T_e(G)=\frac{\mid F\mid+\tau(G-F)}{\omega(G-F)}$\end{center}Each component has at least one edge. In this paper we introducea new invariant edge-tenacity, for graphs. it is another vulnerability measure.we present several properties and bounds on the edge-tenacity. we alsocompute the edge-tenacity of some classes of graphs.
Amin Ghodousian; parsa hadadian
Abstract
In this paper, a linear programming problem is investigated in which the feasible region is formed as a special type of fuzzy relational equalities (FRE). In this type of FRE, fuzzy composition is considered as the convex combination operator. It is proved that the feasible region of the problem can ...
Read More
In this paper, a linear programming problem is investigated in which the feasible region is formed as a special type of fuzzy relational equalities (FRE). In this type of FRE, fuzzy composition is considered as the convex combination operator. It is proved that the feasible region of the problem can be written by one maximum solution and a finite number of minimal solutions. Some theoretical properties of the feasible region are derived and some necessary and sufficient conditions are also presented to determine the feasibility of the problem. Based on some structural properties of the problem, an algorithm is presented to find the optimal solutions and finally, an example is described to illustrate the algorithm.
Asieh Khoshnood; Dara Moazzami
Abstract
If we think of the graph as modeling a network, the vulnerability measurethe resistance of the network to disruption of operation after the failure of certainstations or communication links. In assessing the "vulnerability"of a graph one determines the extent to which the graph retains certainproperties ...
Read More
If we think of the graph as modeling a network, the vulnerability measurethe resistance of the network to disruption of operation after the failure of certainstations or communication links. In assessing the "vulnerability"of a graph one determines the extent to which the graph retains certainproperties after the removal of vertices and / or edges. Many graph theoretical parameters have been used to describe the vulnerability of communication networks, including connectivity, integrity, toughness, binding number, tenacity and... . In this paper we survey and discuss tenacity and its properties in vulnerability calculation and we will comparedifferent measures of vulnerability with tenacity for several classes ofgraphs.
Elham Daadmehr; Reza Habibi
Abstract
To check the financial stability, it is important to alarm the possibility of future potential financial crisis. In the literature, the early warning system (EWS) is designed to warn the occurrence of a financial crisis before it happens. This tool gives strengthens to managers to make efficient policy ...
Read More
To check the financial stability, it is important to alarm the possibility of future potential financial crisis. In the literature, the early warning system (EWS) is designed to warn the occurrence of a financial crisis before it happens. This tool gives strengthens to managers to make efficient policy in real economic activities. Hyperinflation, as a financial crisis, is an uncommon bad phenomenon in every economy. It quickly erodes the real value of the local currency, as the prices of all goods increase. This causes people to minimize their holdings in that currency as they usually switch to more stable foreign currencies, often the US Dollar. Hence, designing a EWS for detecting hyperinflation is valuable task. In the current paper, Iran monthly inflation is modeled by a first
orders autoregressive and moving average model (ARMA) with two-state Markov switching (MS) states, i.e., \( MS \left( 2 \right) -ARMA \left( 1,1 \right) \) . Based on this model, a logistic-EWS is proposed. From the empirical results, it is seen that, in Iran, the low inflation state is more probable than state of high inflation. Beside this, the time of remaining in the low inflation position is almost 9 times more than of high inflation position. To check validity of the results and control prediction errors,it is seen that at least 89 percentages of future states of inflation are correctly predicted with a low noise-to-signal ratio discrepancy measure.
Mahdi Imanparast; Mehdi Kazemi Torbaghan
Abstract
A new algorithm for point-inclusion test in convex polygons is introduced. The proposed algorithm answers the point-inclusion test in convex polygons in $\mathcal{O}(\log n)$ time without any preprocessing and with $\mathcal{O}(n)$ space. The proposed algorithm is extended to do the point-inclusion test ...
Read More
A new algorithm for point-inclusion test in convex polygons is introduced. The proposed algorithm answers the point-inclusion test in convex polygons in $\mathcal{O}(\log n)$ time without any preprocessing and with $\mathcal{O}(n)$ space. The proposed algorithm is extended to do the point-inclusion test in convex polyhedrons in three dimensional space. This algorithm can solve the point-inclusion test in convex $3D$ polyhedrons in $\mathcal{O}(\log n)$ time with $\mathcal{O}(n)$ preprocessing time and $\mathcal{O}(n)$ space.
sina abbasi; Ali Moieni
Abstract
Eclat is an algorithm that finds frequent itemsets. It uses a vertical database and calculates item's support by intersecting transactions. However, Eclat suffers from the exponential time complexity of calculating the intersection of transactions. In this paper, a randomized algorithm called BloomEclat ...
Read More
Eclat is an algorithm that finds frequent itemsets. It uses a vertical database and calculates item's support by intersecting transactions. However, Eclat suffers from the exponential time complexity of calculating the intersection of transactions. In this paper, a randomized algorithm called BloomEclat based on Bloom filter is presented to improve the Eclat algorithm complexity in finding frequent itemsets. Through Bloom Filter, an element’s membership to a set, can be checked and set operations such as intersection and union of two sets can be executed in a time efficient manner. By using these capabilities, Eclat algorithm’s intersecting problem can significantly improve. In BloomEclat algorithm with slight false positive error, the speed of the intersecting transactions is increased, and consequently the execution time is reduced.
Mohammad Mirabi; Mohammad Reza Zare Banadkouki
Abstract
selecting an efficient project portfolio among available projects is a vital decision for any project manager. The main questions are which projects can have more long-term benefit for manager or organization. Due to the complexity of this field of research, todays so many approaches are developed for ...
Read More
selecting an efficient project portfolio among available projects is a vital decision for any project manager. The main questions are which projects can have more long-term benefit for manager or organization. Due to the complexity of this field of research, todays so many approaches are developed for project selection. Calculation time and the quality of result are two main criterion that almost all researchers have considerate on them. In this research a new hybrid genetic algorithm with new heuristic mutation and cross over are developed to choosing a good portfolio of available projects Presented algorithm is fast and effective to reach the good result in reasonable time. Finding a good point to start as initial population and using good operator a heuristic mutation and cross over are main points of our algorithm. To check the quality of results we compare developed algorithm with some recent ones in the literature and comparison studies and statistical calculation demonstrate the efficiency of the new genetic algorithm to select a good portfolio.
Hajar Alimorad
Abstract
Coupled Riccati equation has widely been applied to various engineering areas such as jump linear quadratic problem, particle transport theory, and Wiener–Hopf decomposition of Markov chains. In this paper, we consider an iterative method for computing Hermitian solution of the Coupled Algebraic ...
Read More
Coupled Riccati equation has widely been applied to various engineering areas such as jump linear quadratic problem, particle transport theory, and Wiener–Hopf decomposition of Markov chains. In this paper, we consider an iterative method for computing Hermitian solution of the Coupled Algebraic Riccati Equations (CARE) which is usually encountered in control theory. We show some properties of this iterative method. Furthermore, it will also be demonstrated that the maximal solution can be obtained numerically via a certain linear or quadratic inequalities optimization problem. Numerical examples are presented and the results are compared.
Coupled algebraic Riccati equations; Maximal solution; Positive semidefinite matrix; Remodified Newton's method.