期刊文献+
共找到99篇文章
< 1 2 5 >
每页显示 20 50 100
Analysis of Progressively Type-Ⅱ Inverted Generalized Gamma Censored Data and Its Engineering Application
1
作者 Refah Alotaibi Sanku Dey Ahmed Elshahhat 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期459-489,共31页
A novel inverted generalized gamma(IGG)distribution,proposed for data modelling with an upside-down bathtub hazard rate,is considered.In many real-world practical situations,when a researcher wants to conduct a compar... A novel inverted generalized gamma(IGG)distribution,proposed for data modelling with an upside-down bathtub hazard rate,is considered.In many real-world practical situations,when a researcher wants to conduct a comparative study of the life testing of items based on cost and duration of testing,censoring strategies are frequently used.From this point of view,in the presence of censored data compiled from the most well-known progressively Type-Ⅱ censoring technique,this study examines different parameters of the IGG distribution.From a classical point of view,the likelihood and product of spacing estimation methods are considered.Observed Fisher information and the deltamethod are used to obtain the approximate confidence intervals for any unknown parametric function of the suggestedmodel.In the Bayesian paradigm,the same traditional inferential approaches are used to estimate all unknown subjects.Markov-Chain with Monte-Carlo steps are considered to approximate all Bayes’findings.Extensive numerical comparisons are presented to examine the performance of the proposed methodologies using various criteria of accuracy.Further,using several optimality criteria,the optimumprogressive censoring design is suggested.To highlight how the proposed estimators can be used in practice and to verify the flexibility of the proposed model,we analyze the failure times of twenty mechanical components of a diesel engine. 展开更多
关键词 Inverted generalized gamma CENSORING spacing function LIKELIHOOD Bayesian optimal plan
下载PDF
Outsmarting Android Malware with Cutting-Edge Feature Engineering and Machine Learning Techniques
2
作者 Ahsan Wajahat Jingsha He +4 位作者 Nafei Zhu Tariq Mahmood Tanzila Saba Amjad Rehman Khan Faten S.A.lamri 《Computers, Materials & Continua》 SCIE EI 2024年第4期651-673,共23页
The growing usage of Android smartphones has led to a significant rise in incidents of Android malware andprivacy breaches.This escalating security concern necessitates the development of advanced technologies capable... The growing usage of Android smartphones has led to a significant rise in incidents of Android malware andprivacy breaches.This escalating security concern necessitates the development of advanced technologies capableof automatically detecting andmitigatingmalicious activities in Android applications(apps).Such technologies arecrucial for safeguarding user data and maintaining the integrity of mobile devices in an increasingly digital world.Current methods employed to detect sensitive data leaks in Android apps are hampered by two major limitationsthey require substantial computational resources and are prone to a high frequency of false positives.This meansthat while attempting to identify security breaches,these methods often consume considerable processing powerand mistakenly flag benign activities as malicious,leading to inefficiencies and reduced reliability in malwaredetection.The proposed approach includes a data preprocessing step that removes duplicate samples,managesunbalanced datasets,corrects inconsistencies,and imputes missing values to ensure data accuracy.The Minimaxmethod is then used to normalize numerical data,followed by feature vector extraction using the Gain ratio andChi-squared test to identify and extract the most significant characteristics using an appropriate prediction model.This study focuses on extracting a subset of attributes best suited for the task and recommending a predictivemodel based on domain expert opinion.The proposed method is evaluated using Drebin and TUANDROMDdatasets containing 15,036 and 4,464 benign and malicious samples,respectively.The empirical result shows thatthe RandomForest(RF)and Support VectorMachine(SVC)classifiers achieved impressive accuracy rates of 98.9%and 98.8%,respectively,in detecting unknown Androidmalware.A sensitivity analysis experiment was also carriedout on all three ML-based classifiers based on MAE,MSE,R2,and sensitivity parameters,resulting in a flawlessperformance for both datasets.This approach has substantial potential for real-world applications and can serve asa valuable tool for preventing the spread of Androidmalware and enhancing mobile device security. 展开更多
关键词 Android malware detection machine learning SVC K-Nearest Neighbors(KNN) RF
下载PDF
Computational Analysis of Novel Extended Lindley Progressively Censored Data
3
作者 Refah Alotaibi Mazen Nassar Ahmed Elshahhat 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2571-2596,共26页
A novel extended Lindley lifetime model that exhibits unimodal or decreasing density shapes as well as increasing,bathtub or unimodal-then-bathtub failure rates, named the Marshall-Olkin-Lindley (MOL) model is studied... A novel extended Lindley lifetime model that exhibits unimodal or decreasing density shapes as well as increasing,bathtub or unimodal-then-bathtub failure rates, named the Marshall-Olkin-Lindley (MOL) model is studied.In this research, using a progressive Type-II censored, various inferences of the MOL model parameters oflife are introduced. Utilizing the maximum likelihood method as a classical approach, the estimators of themodel parameters and various reliability measures are investigated. Against both symmetric and asymmetric lossfunctions, the Bayesian estimates are obtained using the Markov Chain Monte Carlo (MCMC) technique with theassumption of independent gamma priors. From the Fisher information data and the simulatedMarkovian chains,the approximate asymptotic interval and the highest posterior density interval, respectively, of each unknownparameter are calculated. Via an extensive simulated study, the usefulness of the various suggested strategies isassessedwith respect to some evaluationmetrics such as mean squared errors, mean relative absolute biases, averageconfidence lengths, and coverage percentages. Comparing the Bayesian estimations based on the asymmetric lossfunction to the traditional technique or the symmetric loss function-based Bayesian estimations, the analysisdemonstrates that asymmetric loss function-based Bayesian estimations are preferred. Finally, two data sets,representing vinyl chloride and repairable mechanical equipment items, have been investigated to support theapproaches proposed and show the superiority of the proposed model compared to the other fourteen lifetimemodels. 展开更多
关键词 Marshall-Olkin-Lindleymodel reliability inference Bayesian and classical inference progressive Type-II censoring
下载PDF
Image Fusion Using Wavelet Transformation and XGboost Algorithm
4
作者 Shahid Naseem Tariq Mahmood +4 位作者 Amjad Rehman Khan Umer Farooq Samra Nawazish Faten S.Alamri Tanzila Saba 《Computers, Materials & Continua》 SCIE EI 2024年第4期801-817,共17页
Recently,there have been several uses for digital image processing.Image fusion has become a prominent application in the domain of imaging processing.To create one final image that provesmore informative and helpful ... Recently,there have been several uses for digital image processing.Image fusion has become a prominent application in the domain of imaging processing.To create one final image that provesmore informative and helpful compared to the original input images,image fusion merges two or more initial images of the same item.Image fusion aims to produce,enhance,and transform significant elements of the source images into combined images for the sake of human visual perception.Image fusion is commonly employed for feature extraction in smart robots,clinical imaging,audiovisual camera integration,manufacturing process monitoring,electronic circuit design,advanced device diagnostics,and intelligent assembly line robots,with image quality varying depending on application.The research paper presents various methods for merging images in spatial and frequency domains,including a blend of stable and curvelet transformations,everageMax-Min,weighted principal component analysis(PCA),HIS(Hue,Intensity,Saturation),wavelet transform,discrete cosine transform(DCT),dual-tree Complex Wavelet Transform(CWT),and multiple wavelet transform.Image fusion methods integrate data from several source images of an identical target,thereby enhancing information in an extremely efficient manner.More precisely,in imaging techniques,the depth of field constraint precludes images from focusing on every object,leading to the exclusion of certain characteristics.To tackle thess challanges,a very efficient multi-focus wavelet decomposition and recompositionmethod is proposed.The use of these wavelet decomposition and recomposition techniques enables this method to make use of existing optimized wavelet code and filter choice.The simulated outcomes provide evidence that the suggested approach initially extracts particular characteristics from images in order to accurately reflect the level of clarity portrayed in the original images.This study enhances the performance of the eXtreme Gradient Boosting(XGBoost)algorithm in detecting brain malignancies with greater precision through the integration of computational image analysis and feature selection.The performance of images is improved by segmenting them employing the K-Means algorithm.The segmentation method aids in identifying specific regions of interest,using Particle Swarm Optimization(PCA)for trait selection and XGBoost for data classification.Extensive trials confirm the model’s exceptional visual performance,achieving an accuracy of up to 97.067%and providing good objective indicators. 展开更多
关键词 Image fusion max-min average CWT XGBoost DCT inclusive innovations spatial and frequency domain
下载PDF
The Mathematical Modelling for Studying the Influence of the Initial Stresses and Relaxation Times on Reflection and Refraction Waves in Piezothermoelastic Half-Space
5
作者 Fatimah A. Alshaikh 《Applied Mathematics》 2012年第8期819-832,共14页
The present paper concentrates on the study of reflection and refraction phenomena of waves in pyroelectric and piezo-electric media under initial stresses and two relaxation times influence by apply suitable conditio... The present paper concentrates on the study of reflection and refraction phenomena of waves in pyroelectric and piezo-electric media under initial stresses and two relaxation times influence by apply suitable conditions. The generalized theories of linear piezo-thermoelasticity have been employed to investigate the problem. In two-dimensional model of transversely isotropic piezothermoelastic medium, there are four types of plane waves quasi-longitudinal (qP), quasi-transverse (qSV), thermal wave (T-mode), and potential electric waves (φ-mode) The amplitude ratios of reflection and refraction waves have been obtained. Finally, the results in each case are presented graphically. 展开更多
关键词 Piezo-Thermoelasticity Quasi Plane Longitudinal WAVES Reflection and REFRACTION COEFFICIENTS Initial Stresses Green And Lindsay Theory RELAXATION Time
下载PDF
Mathematical Model of Leptospirosis: Linearized Solutions and Stability Analysis
6
作者 B. Pimpunchat G. C. Wake +2 位作者 C. Modchang W. Triampo A. M Babylon 《Applied Mathematics》 2013年第10期77-84,共8页
In this paper the transmission of leptospirosis, an infectious disease caused by bacteria, is studied. Leptospirosis is currently spreading in Thailand and worldwide. A Susceptible-Infected-Removed sir model is used t... In this paper the transmission of leptospirosis, an infectious disease caused by bacteria, is studied. Leptospirosis is currently spreading in Thailand and worldwide. A Susceptible-Infected-Removed sir model is used to study the stability analysis, analytical solution and global behavior of the spreading of the disease. The model was analysed using the techniques of non-linear dynamical systems. Two equilibrium points were found and the stability conditions for these equilibrium points were established. It will be shown that the linearised solutions of the sir equations are in good agreement with numerical solutions. 展开更多
关键词 Technology PREFERENCE for Quality Volume of TRADE Vertical Intra-Industry TRADE
下载PDF
Thermo-diffusion impact on immiscible flow characteristics of convectively heated vertical two-layered Baffle saturated porous channels in a suspension of nanoparticles:an analytical study 被引量:1
7
作者 S.P.V.ANANTH B.N.HANUMAGOWDA +3 位作者 S.V.K.VARMA C.S.K.RAJU I.KHAN P.RANA 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI CSCD 2023年第2期307-324,共18页
The heat and mass transfer of two immiscible fluids in an inclined channel with thermal diffusion,vicious,and Darcy dissipation is studied.The first region consists of a clear fluid,and the second one is filled with a... The heat and mass transfer of two immiscible fluids in an inclined channel with thermal diffusion,vicious,and Darcy dissipation is studied.The first region consists of a clear fluid,and the second one is filled with a nanofluid saturated with a porous medium.The behaviors of Cu-H_(2)O,In-H_(2)O,and Au-H_(2)O nanofluids are analyzed.The transport properties are assumed to be constant.The coupled non-linear equations of the flow model are transformed into the dimensionless form,and the solutions for the velocity,temperature,and concentration are obtained by the regular perturbation technique.Investigations are carried out on the flow characteristics for various values of the material parameters.The results show that the velocity and temperature of the fluids enhance with the thermal Grashof number,solutal Grashof number,and Brinkman number while decrease with the porosity parameter and solid volume fraction. 展开更多
关键词 viscous fluid NANOFLUID heat and mass transfer thermal diffusion
下载PDF
Existence of Two Limit Cycles in Zeeman’s Class 30 for 3D Lotka-Volterra Competitive System
8
作者 Yaoqi Li 《Communications on Applied Mathematics and Computation》 EI 2023年第4期1584-1590,共7页
Gyllenberg and Yan(Discrete Contin Dyn Syst Ser B 11(2):347–352,2009)presented a system in Zeeman’s class 30 of 3-dimensional Lotka-Volterra(3D LV)competitive systems to admit at least two limit cycles,one of which ... Gyllenberg and Yan(Discrete Contin Dyn Syst Ser B 11(2):347–352,2009)presented a system in Zeeman’s class 30 of 3-dimensional Lotka-Volterra(3D LV)competitive systems to admit at least two limit cycles,one of which is generated by the Hopf bifurcation and the other is obtained by the Poincaré-Bendixson theorem.Yu et al.(J Math Anal Appl 436:521–555,2016,Sect.3.4)recalculated the first Liapunov coefficient of Gyllenberg and Yan’s system to be positive,rather than negative as in Gyllenberg and Yan(2009),and pointed out that the Poincaré-Bendixson theorem is not applicable for that system.Jiang et al.(J Differ Equ 284:183–218,2021,p.213)proposed an open question:“whether Zeeman’s class 30 can be rigorously proved to admit at least two limit cycles by the Hopf theorem and the Poincaré-Bendixson theorem?”This paper provides four systems in Zeeman’s class 30 to admit at least two limit cycles by the Hopf theorem and the Poincaré-Bendixson theorem and gives an answer to the above question. 展开更多
关键词 3-dimensional Lotka-Volterra(3D LV)competitive system Zeeman’s class 30 Fine focus Hopf bifurcation Poincaré-Bendixson theorem Limit cycle
下载PDF
化学反应对粗糙边界和被动控制微极性纳米流体热稳定性的影响:神经网络
9
作者 GUPTA Vishal RANA Puneet KUMAR Lokendra 《Journal of Central South University》 SCIE EI CAS CSCD 2023年第5期1581-1600,共20页
本文在无通量和粗糙边界的情况下演示了化学反应对微极性纳米流体中热对流初始状态的影响。本研究应用Saffman界面条件求解粗糙边界。考虑在许多工业应用中具有重要作用的微极性非牛顿纳米流体。对于线性稳定性,利用正态模态技术(NMT)... 本文在无通量和粗糙边界的情况下演示了化学反应对微极性纳米流体中热对流初始状态的影响。本研究应用Saffman界面条件求解粗糙边界。考虑在许多工业应用中具有重要作用的微极性非牛顿纳米流体。对于线性稳定性,利用正态模态技术(NMT)将控制系统的偏微分方程(PDE)转化为特征值问题(EVP),并采用基于有限差分的三阶段LobattoⅢa方法进行数值求解。发现对流的主要模式是静止模式。增加纳米流体中热流通量与自旋霍尔效应的耦合系数(δ)、自旋霍尔效应与涡度的耦合系数(K)、粗糙度参数(λ_(1),λ_(2))、化学反应参数(Cr)、修正扩散比(NA)和微极性参数(A)的取值,可以降低对流,从而稳定系统。然后,在81个数据点的基础上,利用嵌入多人感知的人工神经网络(ANN)确定四个控制参数与Rayleigh临界数之间的关系。 展开更多
关键词 纳米流体 RAYLEIGH-BENARD对流 FDM法 粗糙表面 化学反应 神经计算
下载PDF
A Neural Study of the Fractional Heroin Epidemic Model
10
作者 Wajaree Weera Thongchai Botmart +3 位作者 Samina Zuhra Zulqurnain Sabir Muhammad Asif Zahoor Raja Salem Ben Said 《Computers, Materials & Continua》 SCIE EI 2023年第2期4453-4467,共15页
This works intends to provide numerical solutions based on the nonlinear fractional order derivatives of the classical White and Comiskey model(NFD-WCM).The fractional order derivatives have provided authentic and acc... This works intends to provide numerical solutions based on the nonlinear fractional order derivatives of the classical White and Comiskey model(NFD-WCM).The fractional order derivatives have provided authentic and accurate solutions for the NDF-WCM.The solutions of the fractional NFD-WCM are provided using the stochastic computing supervised algorithm named Levenberg-Marquard Backpropagation(LMB)based on neural networks(NNs).This regression approach combines gradient descent and Gauss-Newton iterative methods,which means finding a solution through the sequences of different calculations.WCM is used to demonstrate the heroin epidemics.Heroin has been on-growth world wide,mainly in Asia,Europe,and the USA.It is the fourth foremost cause of death due to taking an overdose in the USA.The nonlinear mathematical system NFD-WCM discusses the overall circumstance of different drug users,such as suspected groups,drug users without treatment,and drug users with treatment.The numerical results of NFD-WCM via LMB-NNs have been substantiated through training,testing,and validation measures.The stability and accuracy are then checked through the statistical tool,such asmean square error(MSE),error histogram,and fitness curves.The suggested methodology’s strength is demonstrated by the high convergence between the reference solutions and the solutions generated by adding the efficacy of a constructed solver LMB-NNs,with accuracy levels ranging from 10?9 to 10?10. 展开更多
关键词 Fractional order heroin epidemic mathematical system white-comiskey model numerical results neural networks
下载PDF
Application of Intuitionistic Z-Numbers in Supplier Selection
11
作者 Nik Muhammad Farhan Hakim Nik Badrul Alam Ku Muhammad Naim Ku Khalif Nor Izzati Jaini 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期47-61,共15页
Intuitionistic fuzzy numbers incorporate the membership and non-membership degrees.In contrast,Z-numbers consist of restriction components,with the existence of a reliability component describing the degree of certain... Intuitionistic fuzzy numbers incorporate the membership and non-membership degrees.In contrast,Z-numbers consist of restriction components,with the existence of a reliability component describing the degree of certainty for the restriction.The combination of intuitionistic fuzzy numbers and Z-numbers produce a new type of fuzzy numbers,namely intuitionistic Z-numbers(IZN).The strength of IZN is their capability of better handling the uncertainty compared to Zadeh's Z-numbers since both components of Z-numbers are charac-terized by the membership and non-membership functions,exhibiting the degree of the hesitancy of decision-makers.This paper presents the application of such numbers in fuzzy multi-criteria decision-making problems.A decision-making model is proposed using the trapezoidal intuitionistic fuzzy power ordered weighted average as the aggregation function and the ranking function to rank the alternatives.The proposed model is then implemented in a supplier selection problem.The obtained ranking is compared to the existing models based on Z-numbers.The results show that the ranking order is slightly different from the existing models.Sensitivity analysis is performed to validate the obtained ranking.The sensitivity analysis result shows that the best supplier is obtained using the proposed model with 80%to 100%consistency despite the drastic change of criteria weights.Intuitionistic Z-numbers play a very important role in describing the uncertainty in the decision makers’opinions in solving decision-making problems. 展开更多
关键词 Intuitionistic Z-number fuzzy decision making ranking function supplier selection sensitivity analysis
下载PDF
Reliability Analysis of HEE Parameters via Progressive Type-II Censoring with Applications
12
作者 Heba S.Mohammed Mazen Nassar +1 位作者 Refah Alotaibi Ahmed Elshahhat 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第12期2761-2793,共33页
A new extended exponential lifetime model called Harris extended-exponential(HEE)distribution for data modelling with increasing and decreasing hazard rate shapes has been considered.In the reliability context,researc... A new extended exponential lifetime model called Harris extended-exponential(HEE)distribution for data modelling with increasing and decreasing hazard rate shapes has been considered.In the reliability context,researchers prefer to use censoring plans to collect data in order to achieve a compromise between total test time and/or test sample size.So,this study considers both maximum likelihood and Bayesian estimates of the Harris extended-exponential distribution parameters and some of its reliability indices using a progressive Type-II censoring strategy.Under the premise of independent gamma priors,the Bayesian estimation is created using the squared-error and general entropy loss functions.Due to the challenging form of the joint posterior distribution,to evaluate the Bayes estimates,samples from the full conditional distributions are generated using Markov Chain Monte Carlo techniques.For each unknown parameter,the highest posterior density credible intervals and asymptotic confidence intervals are also determined.Through a simulated study,the usefulness of the various suggested strategies is assessed.The optimal progressive censoring plans are also shown,and various optimality criteria are investigated.Two actual data sets,taken from engineering and veterinary medicine areas,are analyzed to show how the offered point and interval estimators can be used in practice and to verify that the proposed model furnishes a good fit than other lifetimemodels:alpha power exponential,generalized-exponential,Nadarajah-Haghighi,Weibull,Lomax,gamma and exponential distributions.Numerical evaluations revealed that in the presence of progressively Type-II censored data,the Bayes estimation method against the squared-error(symmetric)loss is advised for getting the point and interval estimates of the HEE distribution. 展开更多
关键词 Harris extended-exponential model progressive Type-II censoring RELIABILITY maximum likelihood MCMC techniques Monte Carlo experiments
下载PDF
Entropies of the Y-Junction Type Nanostructures
13
作者 Ricai Luo Aisha Javed +3 位作者 Muhammad Azeem Muhammad Kamran Jamil Hassan Raza Muhammad Yasir Ilyas 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第6期2665-2679,共15页
Recent research on nanostructures has demonstrated their importance and application in a variety of fields.Nanostructures are used directly or indirectly in drug delivery systems,medicine and pharmaceuticals,biologica... Recent research on nanostructures has demonstrated their importance and application in a variety of fields.Nanostructures are used directly or indirectly in drug delivery systems,medicine and pharmaceuticals,biological sensors,photodetectors,transistors,optical and electronic devices,and so on.The discovery of carbon nanotubes with Y-shaped junctions is motivated by the development of future advanced electronic devices.Because of their interactionwithY-junctions,electronic switches,amplifiers,and three-terminal transistors are of particular interest.Entropy is a concept that determines the uncertainty of a system or network.Entropy concepts are also used in biology,chemistry,and applied mathematics.Based on the requirements,entropy in the form of a graph can be classified into several types.In 1955,graph-based entropy was introduced.One of the types of entropy is edgeweighted entropy.We examined the abstract form of Y-shaped junctions in this study.Some edge-weight-based entropy formulas for the generic view of Y-shaped junctions were created,and some edge-weighted and topological index-based concepts for Y-shaped junctions were discussed in the present paper. 展开更多
关键词 Y-shaped junctions three-terminal junctions nanostuctures ENTROPY carbon nanotube
下载PDF
Novel Scheme for Robust Confusion Component Selection Based on Pythagorean Fuzzy Set
14
作者 Nabilah Abughazalah Mohsin Iqbal +1 位作者 Majid Khan Iqtadar Hussain 《Computers, Materials & Continua》 SCIE EI 2023年第3期6523-6534,共12页
The substitution box,often known as an S-box,is a nonlinear component that is a part of several block ciphers.Its purpose is to protect cryptographic algorithms from a variety of cryptanalytic assaults.A Multi-Criteri... The substitution box,often known as an S-box,is a nonlinear component that is a part of several block ciphers.Its purpose is to protect cryptographic algorithms from a variety of cryptanalytic assaults.A Multi-Criteria Decision Making(MCDM)problem has a complex selection procedure because of having many options and criteria to choose from.Because of this,statistical methods are necessary to assess the performance score of each S-box and decide which option is the best one available based on this score.Using the Pythagorean Fuzzy-based Technique for Order of Preference by Similarity to Ideal Solution(TOPSIS)method,the major objective of this investigation is to select the optimal S-box to be implemented from a pool of twelve key choices.With the help of the Pythagorean fuzzy set(PFS),the purpose of this article is to evaluate whether this nonlinear component is suitable for use in a variety of encryption applications.In this article,we have considered various characteristics of S-boxes,including nonlinearity,algebraic degree,strict avalanche criterion(SAC),absolute indicator,bit independent criterion(BIC),sum of square indicator,algebraic immunity,transparency order,robustness to differential cryptanalysis,composite algebraic immunity,signal to noise ratio-differential power attack(SNR-DPA),and confusion coefficient variance on some standard S-boxes that are Advanced Encryption Following this,the findings of the investigation are changed into Pythagorean fuzzy numbers in the shape of a matrix.This matrix is then subjected to an analysis using the TOPSIS method,which is dependent on the Pythagorean fuzzy set,to rank the most suitable S-box for use in encryption applications. 展开更多
关键词 Decision making substitution box TOPSIS multi-criterion decision making fuzzy set Pythagorean fuzzy set
下载PDF
A Novel Modified Alpha Power Transformed Weibull Distribution and Its Engineering Applications
15
作者 Refah Alotaibi Hassan Okasha +1 位作者 Mazen Nassar Ahmed Elshahhat 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第6期2065-2089,共25页
This paper suggests a new modified version of the traditional Weibull distribution by adding a new shape parameter utilising the modified alpha power transformed technique.We refer to the new model as modified alpha p... This paper suggests a new modified version of the traditional Weibull distribution by adding a new shape parameter utilising the modified alpha power transformed technique.We refer to the new model as modified alpha power transformed Weibull distribution.The attractiveness and significance of the new distribution lie in its power to model monotone and non-monotone failure rate functions,which are quite familiar in environmental investigations.Its hazard rate function can be decreasing,increasing,bathtub and upside-down then bathtub shaped.Diverse structural properties of the proposed model are acquired including quantile function,moments,entropies,order statistics,residual life and reversed failure rate function.The parameters of the distribution were estimated using the maximum likelihood function.The maximum likelihood method is employed to estimate the model parameters and the approximate confidence intervals are also computed.Via a simulation study,the performance of the point and interval estimates are compared using different criteria.Employing real lifetime data sets,we verify that the offered model furnishes a better fit than some other lifetime models including Weibull,gamma and alpha powerWeibull models. 展开更多
关键词 Weibull distribution modified alpha power transformationmethod maximum likelihood ENTROPY order statistics
下载PDF
An Artificial Approach for the Fractional Order Rape and Its Control Model
16
作者 Wajaree Weera Zulqurnain Sabir +4 位作者 Muhammad Asif Zahoor Raja Salem Ben Said Maria Emilia Camargo Chantapish Zamart Thongchai Botmart 《Computers, Materials & Continua》 SCIE EI 2023年第2期3421-3438,共18页
The current investigations provide the solutions of the nonlinear fractional order mathematical rape and its controlmodel using the strength of artificial neural networks(ANNs)along with the Levenberg-Marquardt backpr... The current investigations provide the solutions of the nonlinear fractional order mathematical rape and its controlmodel using the strength of artificial neural networks(ANNs)along with the Levenberg-Marquardt backpropagation approach(LMBA),i.e.,artificial neural networks-Levenberg-Marquardt backpropagation approach(ANNs-LMBA).The fractional order investigations have been presented to find more realistic results of the mathematical form of the rape and its control model.The differential mathematical form of the nonlinear fractional order mathematical rape and its control model has six classes:susceptible native girls,infected immature girls,susceptible knowledgeable girls,infected knowledgeable girls,susceptible rapist population and infective rapist population.The rape and its control differential system using three different fractional order values is authenticated to perform the correctness of ANNs-LMBA.The data is used to present the rape and its control differential system is designated as 70%for training,14%for authorization and 16%for testing.The obtained performances of the ANNs-LMBA are compared with the dataset of the Adams-Bashforth-Moulton scheme.To substantiate the consistency,aptitude,validity,exactness,and capability of the LMBA neural networks,the obtained numerical values are provided using the state transitions(STs),correlation,regression,mean square error(MSE)and error histograms(EHs). 展开更多
关键词 Rape and its control differential system neural networks fractional order levenberg-marquardt backpropagation approach reference solutions
下载PDF
A New Three-Parameter Inverse Weibull Distribution with Medical and Engineering Applications
17
作者 Refah Alotaibi Hassan Okasha +1 位作者 Hoda Rezk Mazen Nassar 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第5期1255-1274,共20页
The objective of this article is to provide a novel extension of the conventional inverse Weibull distribution that adds an extra shape parameter to increase its flexibility.This addition is beneficial in a variety of... The objective of this article is to provide a novel extension of the conventional inverse Weibull distribution that adds an extra shape parameter to increase its flexibility.This addition is beneficial in a variety of fields,including reliability,economics,engineering,biomedical science,biological research,environmental studies,and finance.For modeling real data,several expanded classes of distributions have been established.The modified alpha power transformed approach is used to implement the new model.The datamatches the new inverseWeibull distribution better than the inverse Weibull distribution and several other competing models.It appears to be a distribution designed to support decreasing or unimodal shaped distributions based on its parameters.Precise expressions for quantiles,moments,incomplete moments,moment generating function,characteristic generating function,and entropy expression are among the determined attributes of the new distribution.The point and interval estimates are studied using the maximum likelihood method.Simulation research is conducted to illustrate the correctness of the theoretical results.Three applications to medical and engineering data are utilized to illustrate the model’s flexibility. 展开更多
关键词 Inverse weibull distribution modified alpha power transformation method MOMENTS order statistics
下载PDF
Fractional Order Nonlinear Bone Remodeling Dynamics Using the Supervised Neural Network
18
作者 Narongsak Yotha Qusain Hiader +5 位作者 Zulqurnain Sabir Muhammad Asif Zahoor Raja Salem Ben Said Qasem Al-Mdallal Thongchai Botmart Wajaree Weera 《Computers, Materials & Continua》 SCIE EI 2023年第2期2415-2430,共16页
This study aims to solve the nonlinear fractional-order mathematical model(FOMM)by using the normal and dysregulated bone remodeling of themyeloma bone disease(MBD).For themore precise performance of the model,fractio... This study aims to solve the nonlinear fractional-order mathematical model(FOMM)by using the normal and dysregulated bone remodeling of themyeloma bone disease(MBD).For themore precise performance of the model,fractional-order derivatives have been used to solve the disease model numerically.The FOMM is preliminarily designed to focus on the critical interactions between bone resorption or osteoclasts(OC)and bone formation or osteoblasts(OB).The connections of OC and OB are represented by a nonlinear differential system based on the cellular components,which depict stable fluctuation in the usual bone case and unstable fluctuation through the MBD.Untreated myeloma causes by increasing the OC and reducing the osteoblasts,resulting in net bone waste the tumor growth.The solutions of the FOMM will be provided by using the stochastic framework based on the Levenberg-Marquardt backpropagation(LVMBP)neural networks(NN),i.e.,LVMBPNN.The mathematical performances of three variations of the fractional-order derivative based on the nonlinear disease model using the LVMPNN.The static structural performances are 82%for investigation and 9%for both learning and certification.The performances of the LVMBPNN are authenticated by using the results of the Adams-Bashforth-Moulton mechanism.To accomplish the capability,steadiness,accuracy,and ability of the LVMBPNN,the performances of the error histograms(EHs),mean square error(MSE),recurrence,and state transitions(STs)will be provided. 展开更多
关键词 Bone remodeling FRACTIONAL-ORDER myeloma disease artificial neural networks levenberg-marquardt backpropagation population cell dynamics
下载PDF
Classification of Nonlinear Confusion Component Using Hybrid Multi-Criteria Decision Making
19
作者 Nabilah Abughazalah Iqra Ishaque +2 位作者 Majid Khan Ammar S.Alanazi Iqtadar Hussain 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1451-1463,共13页
In today’s digital world,the most inevitable challenge is the protection of digital information.Due to the weak confidentiality preserving techniques,the existing world is facing several digital information breaches.T... In today’s digital world,the most inevitable challenge is the protection of digital information.Due to the weak confidentiality preserving techniques,the existing world is facing several digital information breaches.To make our digital data indecipherable to the unauthorized person,a technique forfinding a crypto-graphically strong Substitution box(S-box)have presented.An S-box with sound cryptographic assets such as nonlinearity(NL),strict avalanche criterion(SAC),bit independence criteria(BIC),bit independence criteria of nonlinearity(BIC-NL),Bit independence criteria of Strict avalanche criteria(BIC-SAC),and Input/output XOR is considered as the robust S-box.The Decision-Making Trial and Evaluation Laboratory(DEMATEL)approach of multi-criteria decision making(MCDM)is proposed forfinding the interrelation among cryptographic properties.A combination of two MCDM methods namely Entropy and multi-objective optimization based on ratio analysis(MOORA)is applied for the best S-box selection.A robust substitution box is selected for secure communications in cryptography by using the combination of DEMETAL selection criteria,entro-py weight assigning,and MOORA ranking scheme.The combination of these three methods provides a fast selection procedure for the secure confusion com-ponent.The offered selection method can also be utilized for the choice of the best cryptosystem with highly secure properties and resistive against all possible linear and differential attacks in the cryptanalysis. 展开更多
关键词 DEMATEL MCDM MOORA NONLINEARITY S-BOX
下载PDF
A Proof of Brouwer’s Fixed Point Theorem Using Sperner’s Lemma
20
作者 Cassie Lu 《数学计算(中英文版)》 2023年第2期1-6,共6页
This article offers a simple but rigorous proof of Brouwer’s fixed point theorem using Sperner’s Lemma.The general method I have used so far in the proof is mainly to convert the n-dimensional shapes to the correspo... This article offers a simple but rigorous proof of Brouwer’s fixed point theorem using Sperner’s Lemma.The general method I have used so far in the proof is mainly to convert the n-dimensional shapes to the corresponding case under the Sperner’s Labeling and apply the Sperner’s Lemma to solve the question. 展开更多
关键词 Brouwer’s Fixed Point Theorem Sperner’s Lemma PROOF
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部