A novel inverted generalized gamma(IGG)distribution,proposed for data modelling with an upside-down bathtub hazard rate,is considered.In many real-world practical situations,when a researcher wants to conduct a compar...A novel inverted generalized gamma(IGG)distribution,proposed for data modelling with an upside-down bathtub hazard rate,is considered.In many real-world practical situations,when a researcher wants to conduct a comparative study of the life testing of items based on cost and duration of testing,censoring strategies are frequently used.From this point of view,in the presence of censored data compiled from the most well-known progressively Type-Ⅱ censoring technique,this study examines different parameters of the IGG distribution.From a classical point of view,the likelihood and product of spacing estimation methods are considered.Observed Fisher information and the deltamethod are used to obtain the approximate confidence intervals for any unknown parametric function of the suggestedmodel.In the Bayesian paradigm,the same traditional inferential approaches are used to estimate all unknown subjects.Markov-Chain with Monte-Carlo steps are considered to approximate all Bayes’findings.Extensive numerical comparisons are presented to examine the performance of the proposed methodologies using various criteria of accuracy.Further,using several optimality criteria,the optimumprogressive censoring design is suggested.To highlight how the proposed estimators can be used in practice and to verify the flexibility of the proposed model,we analyze the failure times of twenty mechanical components of a diesel engine.展开更多
The growing usage of Android smartphones has led to a significant rise in incidents of Android malware andprivacy breaches.This escalating security concern necessitates the development of advanced technologies capable...The growing usage of Android smartphones has led to a significant rise in incidents of Android malware andprivacy breaches.This escalating security concern necessitates the development of advanced technologies capableof automatically detecting andmitigatingmalicious activities in Android applications(apps).Such technologies arecrucial for safeguarding user data and maintaining the integrity of mobile devices in an increasingly digital world.Current methods employed to detect sensitive data leaks in Android apps are hampered by two major limitationsthey require substantial computational resources and are prone to a high frequency of false positives.This meansthat while attempting to identify security breaches,these methods often consume considerable processing powerand mistakenly flag benign activities as malicious,leading to inefficiencies and reduced reliability in malwaredetection.The proposed approach includes a data preprocessing step that removes duplicate samples,managesunbalanced datasets,corrects inconsistencies,and imputes missing values to ensure data accuracy.The Minimaxmethod is then used to normalize numerical data,followed by feature vector extraction using the Gain ratio andChi-squared test to identify and extract the most significant characteristics using an appropriate prediction model.This study focuses on extracting a subset of attributes best suited for the task and recommending a predictivemodel based on domain expert opinion.The proposed method is evaluated using Drebin and TUANDROMDdatasets containing 15,036 and 4,464 benign and malicious samples,respectively.The empirical result shows thatthe RandomForest(RF)and Support VectorMachine(SVC)classifiers achieved impressive accuracy rates of 98.9%and 98.8%,respectively,in detecting unknown Androidmalware.A sensitivity analysis experiment was also carriedout on all three ML-based classifiers based on MAE,MSE,R2,and sensitivity parameters,resulting in a flawlessperformance for both datasets.This approach has substantial potential for real-world applications and can serve asa valuable tool for preventing the spread of Androidmalware and enhancing mobile device security.展开更多
A novel extended Lindley lifetime model that exhibits unimodal or decreasing density shapes as well as increasing,bathtub or unimodal-then-bathtub failure rates, named the Marshall-Olkin-Lindley (MOL) model is studied...A novel extended Lindley lifetime model that exhibits unimodal or decreasing density shapes as well as increasing,bathtub or unimodal-then-bathtub failure rates, named the Marshall-Olkin-Lindley (MOL) model is studied.In this research, using a progressive Type-II censored, various inferences of the MOL model parameters oflife are introduced. Utilizing the maximum likelihood method as a classical approach, the estimators of themodel parameters and various reliability measures are investigated. Against both symmetric and asymmetric lossfunctions, the Bayesian estimates are obtained using the Markov Chain Monte Carlo (MCMC) technique with theassumption of independent gamma priors. From the Fisher information data and the simulatedMarkovian chains,the approximate asymptotic interval and the highest posterior density interval, respectively, of each unknownparameter are calculated. Via an extensive simulated study, the usefulness of the various suggested strategies isassessedwith respect to some evaluationmetrics such as mean squared errors, mean relative absolute biases, averageconfidence lengths, and coverage percentages. Comparing the Bayesian estimations based on the asymmetric lossfunction to the traditional technique or the symmetric loss function-based Bayesian estimations, the analysisdemonstrates that asymmetric loss function-based Bayesian estimations are preferred. Finally, two data sets,representing vinyl chloride and repairable mechanical equipment items, have been investigated to support theapproaches proposed and show the superiority of the proposed model compared to the other fourteen lifetimemodels.展开更多
Recently,there have been several uses for digital image processing.Image fusion has become a prominent application in the domain of imaging processing.To create one final image that provesmore informative and helpful ...Recently,there have been several uses for digital image processing.Image fusion has become a prominent application in the domain of imaging processing.To create one final image that provesmore informative and helpful compared to the original input images,image fusion merges two or more initial images of the same item.Image fusion aims to produce,enhance,and transform significant elements of the source images into combined images for the sake of human visual perception.Image fusion is commonly employed for feature extraction in smart robots,clinical imaging,audiovisual camera integration,manufacturing process monitoring,electronic circuit design,advanced device diagnostics,and intelligent assembly line robots,with image quality varying depending on application.The research paper presents various methods for merging images in spatial and frequency domains,including a blend of stable and curvelet transformations,everageMax-Min,weighted principal component analysis(PCA),HIS(Hue,Intensity,Saturation),wavelet transform,discrete cosine transform(DCT),dual-tree Complex Wavelet Transform(CWT),and multiple wavelet transform.Image fusion methods integrate data from several source images of an identical target,thereby enhancing information in an extremely efficient manner.More precisely,in imaging techniques,the depth of field constraint precludes images from focusing on every object,leading to the exclusion of certain characteristics.To tackle thess challanges,a very efficient multi-focus wavelet decomposition and recompositionmethod is proposed.The use of these wavelet decomposition and recomposition techniques enables this method to make use of existing optimized wavelet code and filter choice.The simulated outcomes provide evidence that the suggested approach initially extracts particular characteristics from images in order to accurately reflect the level of clarity portrayed in the original images.This study enhances the performance of the eXtreme Gradient Boosting(XGBoost)algorithm in detecting brain malignancies with greater precision through the integration of computational image analysis and feature selection.The performance of images is improved by segmenting them employing the K-Means algorithm.The segmentation method aids in identifying specific regions of interest,using Particle Swarm Optimization(PCA)for trait selection and XGBoost for data classification.Extensive trials confirm the model’s exceptional visual performance,achieving an accuracy of up to 97.067%and providing good objective indicators.展开更多
The present paper concentrates on the study of reflection and refraction phenomena of waves in pyroelectric and piezo-electric media under initial stresses and two relaxation times influence by apply suitable conditio...The present paper concentrates on the study of reflection and refraction phenomena of waves in pyroelectric and piezo-electric media under initial stresses and two relaxation times influence by apply suitable conditions. The generalized theories of linear piezo-thermoelasticity have been employed to investigate the problem. In two-dimensional model of transversely isotropic piezothermoelastic medium, there are four types of plane waves quasi-longitudinal (qP), quasi-transverse (qSV), thermal wave (T-mode), and potential electric waves (φ-mode) The amplitude ratios of reflection and refraction waves have been obtained. Finally, the results in each case are presented graphically.展开更多
In this paper the transmission of leptospirosis, an infectious disease caused by bacteria, is studied. Leptospirosis is currently spreading in Thailand and worldwide. A Susceptible-Infected-Removed sir model is used t...In this paper the transmission of leptospirosis, an infectious disease caused by bacteria, is studied. Leptospirosis is currently spreading in Thailand and worldwide. A Susceptible-Infected-Removed sir model is used to study the stability analysis, analytical solution and global behavior of the spreading of the disease. The model was analysed using the techniques of non-linear dynamical systems. Two equilibrium points were found and the stability conditions for these equilibrium points were established. It will be shown that the linearised solutions of the sir equations are in good agreement with numerical solutions.展开更多
The heat and mass transfer of two immiscible fluids in an inclined channel with thermal diffusion,vicious,and Darcy dissipation is studied.The first region consists of a clear fluid,and the second one is filled with a...The heat and mass transfer of two immiscible fluids in an inclined channel with thermal diffusion,vicious,and Darcy dissipation is studied.The first region consists of a clear fluid,and the second one is filled with a nanofluid saturated with a porous medium.The behaviors of Cu-H_(2)O,In-H_(2)O,and Au-H_(2)O nanofluids are analyzed.The transport properties are assumed to be constant.The coupled non-linear equations of the flow model are transformed into the dimensionless form,and the solutions for the velocity,temperature,and concentration are obtained by the regular perturbation technique.Investigations are carried out on the flow characteristics for various values of the material parameters.The results show that the velocity and temperature of the fluids enhance with the thermal Grashof number,solutal Grashof number,and Brinkman number while decrease with the porosity parameter and solid volume fraction.展开更多
Gyllenberg and Yan(Discrete Contin Dyn Syst Ser B 11(2):347–352,2009)presented a system in Zeeman’s class 30 of 3-dimensional Lotka-Volterra(3D LV)competitive systems to admit at least two limit cycles,one of which ...Gyllenberg and Yan(Discrete Contin Dyn Syst Ser B 11(2):347–352,2009)presented a system in Zeeman’s class 30 of 3-dimensional Lotka-Volterra(3D LV)competitive systems to admit at least two limit cycles,one of which is generated by the Hopf bifurcation and the other is obtained by the Poincaré-Bendixson theorem.Yu et al.(J Math Anal Appl 436:521–555,2016,Sect.3.4)recalculated the first Liapunov coefficient of Gyllenberg and Yan’s system to be positive,rather than negative as in Gyllenberg and Yan(2009),and pointed out that the Poincaré-Bendixson theorem is not applicable for that system.Jiang et al.(J Differ Equ 284:183–218,2021,p.213)proposed an open question:“whether Zeeman’s class 30 can be rigorously proved to admit at least two limit cycles by the Hopf theorem and the Poincaré-Bendixson theorem?”This paper provides four systems in Zeeman’s class 30 to admit at least two limit cycles by the Hopf theorem and the Poincaré-Bendixson theorem and gives an answer to the above question.展开更多
This works intends to provide numerical solutions based on the nonlinear fractional order derivatives of the classical White and Comiskey model(NFD-WCM).The fractional order derivatives have provided authentic and acc...This works intends to provide numerical solutions based on the nonlinear fractional order derivatives of the classical White and Comiskey model(NFD-WCM).The fractional order derivatives have provided authentic and accurate solutions for the NDF-WCM.The solutions of the fractional NFD-WCM are provided using the stochastic computing supervised algorithm named Levenberg-Marquard Backpropagation(LMB)based on neural networks(NNs).This regression approach combines gradient descent and Gauss-Newton iterative methods,which means finding a solution through the sequences of different calculations.WCM is used to demonstrate the heroin epidemics.Heroin has been on-growth world wide,mainly in Asia,Europe,and the USA.It is the fourth foremost cause of death due to taking an overdose in the USA.The nonlinear mathematical system NFD-WCM discusses the overall circumstance of different drug users,such as suspected groups,drug users without treatment,and drug users with treatment.The numerical results of NFD-WCM via LMB-NNs have been substantiated through training,testing,and validation measures.The stability and accuracy are then checked through the statistical tool,such asmean square error(MSE),error histogram,and fitness curves.The suggested methodology’s strength is demonstrated by the high convergence between the reference solutions and the solutions generated by adding the efficacy of a constructed solver LMB-NNs,with accuracy levels ranging from 10?9 to 10?10.展开更多
Intuitionistic fuzzy numbers incorporate the membership and non-membership degrees.In contrast,Z-numbers consist of restriction components,with the existence of a reliability component describing the degree of certain...Intuitionistic fuzzy numbers incorporate the membership and non-membership degrees.In contrast,Z-numbers consist of restriction components,with the existence of a reliability component describing the degree of certainty for the restriction.The combination of intuitionistic fuzzy numbers and Z-numbers produce a new type of fuzzy numbers,namely intuitionistic Z-numbers(IZN).The strength of IZN is their capability of better handling the uncertainty compared to Zadeh's Z-numbers since both components of Z-numbers are charac-terized by the membership and non-membership functions,exhibiting the degree of the hesitancy of decision-makers.This paper presents the application of such numbers in fuzzy multi-criteria decision-making problems.A decision-making model is proposed using the trapezoidal intuitionistic fuzzy power ordered weighted average as the aggregation function and the ranking function to rank the alternatives.The proposed model is then implemented in a supplier selection problem.The obtained ranking is compared to the existing models based on Z-numbers.The results show that the ranking order is slightly different from the existing models.Sensitivity analysis is performed to validate the obtained ranking.The sensitivity analysis result shows that the best supplier is obtained using the proposed model with 80%to 100%consistency despite the drastic change of criteria weights.Intuitionistic Z-numbers play a very important role in describing the uncertainty in the decision makers’opinions in solving decision-making problems.展开更多
A new extended exponential lifetime model called Harris extended-exponential(HEE)distribution for data modelling with increasing and decreasing hazard rate shapes has been considered.In the reliability context,researc...A new extended exponential lifetime model called Harris extended-exponential(HEE)distribution for data modelling with increasing and decreasing hazard rate shapes has been considered.In the reliability context,researchers prefer to use censoring plans to collect data in order to achieve a compromise between total test time and/or test sample size.So,this study considers both maximum likelihood and Bayesian estimates of the Harris extended-exponential distribution parameters and some of its reliability indices using a progressive Type-II censoring strategy.Under the premise of independent gamma priors,the Bayesian estimation is created using the squared-error and general entropy loss functions.Due to the challenging form of the joint posterior distribution,to evaluate the Bayes estimates,samples from the full conditional distributions are generated using Markov Chain Monte Carlo techniques.For each unknown parameter,the highest posterior density credible intervals and asymptotic confidence intervals are also determined.Through a simulated study,the usefulness of the various suggested strategies is assessed.The optimal progressive censoring plans are also shown,and various optimality criteria are investigated.Two actual data sets,taken from engineering and veterinary medicine areas,are analyzed to show how the offered point and interval estimators can be used in practice and to verify that the proposed model furnishes a good fit than other lifetimemodels:alpha power exponential,generalized-exponential,Nadarajah-Haghighi,Weibull,Lomax,gamma and exponential distributions.Numerical evaluations revealed that in the presence of progressively Type-II censored data,the Bayes estimation method against the squared-error(symmetric)loss is advised for getting the point and interval estimates of the HEE distribution.展开更多
Recent research on nanostructures has demonstrated their importance and application in a variety of fields.Nanostructures are used directly or indirectly in drug delivery systems,medicine and pharmaceuticals,biologica...Recent research on nanostructures has demonstrated their importance and application in a variety of fields.Nanostructures are used directly or indirectly in drug delivery systems,medicine and pharmaceuticals,biological sensors,photodetectors,transistors,optical and electronic devices,and so on.The discovery of carbon nanotubes with Y-shaped junctions is motivated by the development of future advanced electronic devices.Because of their interactionwithY-junctions,electronic switches,amplifiers,and three-terminal transistors are of particular interest.Entropy is a concept that determines the uncertainty of a system or network.Entropy concepts are also used in biology,chemistry,and applied mathematics.Based on the requirements,entropy in the form of a graph can be classified into several types.In 1955,graph-based entropy was introduced.One of the types of entropy is edgeweighted entropy.We examined the abstract form of Y-shaped junctions in this study.Some edge-weight-based entropy formulas for the generic view of Y-shaped junctions were created,and some edge-weighted and topological index-based concepts for Y-shaped junctions were discussed in the present paper.展开更多
The substitution box,often known as an S-box,is a nonlinear component that is a part of several block ciphers.Its purpose is to protect cryptographic algorithms from a variety of cryptanalytic assaults.A Multi-Criteri...The substitution box,often known as an S-box,is a nonlinear component that is a part of several block ciphers.Its purpose is to protect cryptographic algorithms from a variety of cryptanalytic assaults.A Multi-Criteria Decision Making(MCDM)problem has a complex selection procedure because of having many options and criteria to choose from.Because of this,statistical methods are necessary to assess the performance score of each S-box and decide which option is the best one available based on this score.Using the Pythagorean Fuzzy-based Technique for Order of Preference by Similarity to Ideal Solution(TOPSIS)method,the major objective of this investigation is to select the optimal S-box to be implemented from a pool of twelve key choices.With the help of the Pythagorean fuzzy set(PFS),the purpose of this article is to evaluate whether this nonlinear component is suitable for use in a variety of encryption applications.In this article,we have considered various characteristics of S-boxes,including nonlinearity,algebraic degree,strict avalanche criterion(SAC),absolute indicator,bit independent criterion(BIC),sum of square indicator,algebraic immunity,transparency order,robustness to differential cryptanalysis,composite algebraic immunity,signal to noise ratio-differential power attack(SNR-DPA),and confusion coefficient variance on some standard S-boxes that are Advanced Encryption Following this,the findings of the investigation are changed into Pythagorean fuzzy numbers in the shape of a matrix.This matrix is then subjected to an analysis using the TOPSIS method,which is dependent on the Pythagorean fuzzy set,to rank the most suitable S-box for use in encryption applications.展开更多
This paper suggests a new modified version of the traditional Weibull distribution by adding a new shape parameter utilising the modified alpha power transformed technique.We refer to the new model as modified alpha p...This paper suggests a new modified version of the traditional Weibull distribution by adding a new shape parameter utilising the modified alpha power transformed technique.We refer to the new model as modified alpha power transformed Weibull distribution.The attractiveness and significance of the new distribution lie in its power to model monotone and non-monotone failure rate functions,which are quite familiar in environmental investigations.Its hazard rate function can be decreasing,increasing,bathtub and upside-down then bathtub shaped.Diverse structural properties of the proposed model are acquired including quantile function,moments,entropies,order statistics,residual life and reversed failure rate function.The parameters of the distribution were estimated using the maximum likelihood function.The maximum likelihood method is employed to estimate the model parameters and the approximate confidence intervals are also computed.Via a simulation study,the performance of the point and interval estimates are compared using different criteria.Employing real lifetime data sets,we verify that the offered model furnishes a better fit than some other lifetime models including Weibull,gamma and alpha powerWeibull models.展开更多
The current investigations provide the solutions of the nonlinear fractional order mathematical rape and its controlmodel using the strength of artificial neural networks(ANNs)along with the Levenberg-Marquardt backpr...The current investigations provide the solutions of the nonlinear fractional order mathematical rape and its controlmodel using the strength of artificial neural networks(ANNs)along with the Levenberg-Marquardt backpropagation approach(LMBA),i.e.,artificial neural networks-Levenberg-Marquardt backpropagation approach(ANNs-LMBA).The fractional order investigations have been presented to find more realistic results of the mathematical form of the rape and its control model.The differential mathematical form of the nonlinear fractional order mathematical rape and its control model has six classes:susceptible native girls,infected immature girls,susceptible knowledgeable girls,infected knowledgeable girls,susceptible rapist population and infective rapist population.The rape and its control differential system using three different fractional order values is authenticated to perform the correctness of ANNs-LMBA.The data is used to present the rape and its control differential system is designated as 70%for training,14%for authorization and 16%for testing.The obtained performances of the ANNs-LMBA are compared with the dataset of the Adams-Bashforth-Moulton scheme.To substantiate the consistency,aptitude,validity,exactness,and capability of the LMBA neural networks,the obtained numerical values are provided using the state transitions(STs),correlation,regression,mean square error(MSE)and error histograms(EHs).展开更多
The objective of this article is to provide a novel extension of the conventional inverse Weibull distribution that adds an extra shape parameter to increase its flexibility.This addition is beneficial in a variety of...The objective of this article is to provide a novel extension of the conventional inverse Weibull distribution that adds an extra shape parameter to increase its flexibility.This addition is beneficial in a variety of fields,including reliability,economics,engineering,biomedical science,biological research,environmental studies,and finance.For modeling real data,several expanded classes of distributions have been established.The modified alpha power transformed approach is used to implement the new model.The datamatches the new inverseWeibull distribution better than the inverse Weibull distribution and several other competing models.It appears to be a distribution designed to support decreasing or unimodal shaped distributions based on its parameters.Precise expressions for quantiles,moments,incomplete moments,moment generating function,characteristic generating function,and entropy expression are among the determined attributes of the new distribution.The point and interval estimates are studied using the maximum likelihood method.Simulation research is conducted to illustrate the correctness of the theoretical results.Three applications to medical and engineering data are utilized to illustrate the model’s flexibility.展开更多
This study aims to solve the nonlinear fractional-order mathematical model(FOMM)by using the normal and dysregulated bone remodeling of themyeloma bone disease(MBD).For themore precise performance of the model,fractio...This study aims to solve the nonlinear fractional-order mathematical model(FOMM)by using the normal and dysregulated bone remodeling of themyeloma bone disease(MBD).For themore precise performance of the model,fractional-order derivatives have been used to solve the disease model numerically.The FOMM is preliminarily designed to focus on the critical interactions between bone resorption or osteoclasts(OC)and bone formation or osteoblasts(OB).The connections of OC and OB are represented by a nonlinear differential system based on the cellular components,which depict stable fluctuation in the usual bone case and unstable fluctuation through the MBD.Untreated myeloma causes by increasing the OC and reducing the osteoblasts,resulting in net bone waste the tumor growth.The solutions of the FOMM will be provided by using the stochastic framework based on the Levenberg-Marquardt backpropagation(LVMBP)neural networks(NN),i.e.,LVMBPNN.The mathematical performances of three variations of the fractional-order derivative based on the nonlinear disease model using the LVMPNN.The static structural performances are 82%for investigation and 9%for both learning and certification.The performances of the LVMBPNN are authenticated by using the results of the Adams-Bashforth-Moulton mechanism.To accomplish the capability,steadiness,accuracy,and ability of the LVMBPNN,the performances of the error histograms(EHs),mean square error(MSE),recurrence,and state transitions(STs)will be provided.展开更多
In today’s digital world,the most inevitable challenge is the protection of digital information.Due to the weak confidentiality preserving techniques,the existing world is facing several digital information breaches.T...In today’s digital world,the most inevitable challenge is the protection of digital information.Due to the weak confidentiality preserving techniques,the existing world is facing several digital information breaches.To make our digital data indecipherable to the unauthorized person,a technique forfinding a crypto-graphically strong Substitution box(S-box)have presented.An S-box with sound cryptographic assets such as nonlinearity(NL),strict avalanche criterion(SAC),bit independence criteria(BIC),bit independence criteria of nonlinearity(BIC-NL),Bit independence criteria of Strict avalanche criteria(BIC-SAC),and Input/output XOR is considered as the robust S-box.The Decision-Making Trial and Evaluation Laboratory(DEMATEL)approach of multi-criteria decision making(MCDM)is proposed forfinding the interrelation among cryptographic properties.A combination of two MCDM methods namely Entropy and multi-objective optimization based on ratio analysis(MOORA)is applied for the best S-box selection.A robust substitution box is selected for secure communications in cryptography by using the combination of DEMETAL selection criteria,entro-py weight assigning,and MOORA ranking scheme.The combination of these three methods provides a fast selection procedure for the secure confusion com-ponent.The offered selection method can also be utilized for the choice of the best cryptosystem with highly secure properties and resistive against all possible linear and differential attacks in the cryptanalysis.展开更多
This article offers a simple but rigorous proof of Brouwer’s fixed point theorem using Sperner’s Lemma.The general method I have used so far in the proof is mainly to convert the n-dimensional shapes to the correspo...This article offers a simple but rigorous proof of Brouwer’s fixed point theorem using Sperner’s Lemma.The general method I have used so far in the proof is mainly to convert the n-dimensional shapes to the corresponding case under the Sperner’s Labeling and apply the Sperner’s Lemma to solve the question.展开更多
基金funded by the Deanship of Scientific Research and Libraries,Princess Nourah bint Abdulrahman University,through the Program of Research Project Funding after Publication,Grant No.(RPFAP-34-1445).
文摘A novel inverted generalized gamma(IGG)distribution,proposed for data modelling with an upside-down bathtub hazard rate,is considered.In many real-world practical situations,when a researcher wants to conduct a comparative study of the life testing of items based on cost and duration of testing,censoring strategies are frequently used.From this point of view,in the presence of censored data compiled from the most well-known progressively Type-Ⅱ censoring technique,this study examines different parameters of the IGG distribution.From a classical point of view,the likelihood and product of spacing estimation methods are considered.Observed Fisher information and the deltamethod are used to obtain the approximate confidence intervals for any unknown parametric function of the suggestedmodel.In the Bayesian paradigm,the same traditional inferential approaches are used to estimate all unknown subjects.Markov-Chain with Monte-Carlo steps are considered to approximate all Bayes’findings.Extensive numerical comparisons are presented to examine the performance of the proposed methodologies using various criteria of accuracy.Further,using several optimality criteria,the optimumprogressive censoring design is suggested.To highlight how the proposed estimators can be used in practice and to verify the flexibility of the proposed model,we analyze the failure times of twenty mechanical components of a diesel engine.
基金Princess Nourah bint Abdulrahman University and Researchers Supporting Project Number(PNURSP2024R346)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘The growing usage of Android smartphones has led to a significant rise in incidents of Android malware andprivacy breaches.This escalating security concern necessitates the development of advanced technologies capableof automatically detecting andmitigatingmalicious activities in Android applications(apps).Such technologies arecrucial for safeguarding user data and maintaining the integrity of mobile devices in an increasingly digital world.Current methods employed to detect sensitive data leaks in Android apps are hampered by two major limitationsthey require substantial computational resources and are prone to a high frequency of false positives.This meansthat while attempting to identify security breaches,these methods often consume considerable processing powerand mistakenly flag benign activities as malicious,leading to inefficiencies and reduced reliability in malwaredetection.The proposed approach includes a data preprocessing step that removes duplicate samples,managesunbalanced datasets,corrects inconsistencies,and imputes missing values to ensure data accuracy.The Minimaxmethod is then used to normalize numerical data,followed by feature vector extraction using the Gain ratio andChi-squared test to identify and extract the most significant characteristics using an appropriate prediction model.This study focuses on extracting a subset of attributes best suited for the task and recommending a predictivemodel based on domain expert opinion.The proposed method is evaluated using Drebin and TUANDROMDdatasets containing 15,036 and 4,464 benign and malicious samples,respectively.The empirical result shows thatthe RandomForest(RF)and Support VectorMachine(SVC)classifiers achieved impressive accuracy rates of 98.9%and 98.8%,respectively,in detecting unknown Androidmalware.A sensitivity analysis experiment was also carriedout on all three ML-based classifiers based on MAE,MSE,R2,and sensitivity parameters,resulting in a flawlessperformance for both datasets.This approach has substantial potential for real-world applications and can serve asa valuable tool for preventing the spread of Androidmalware and enhancing mobile device security.
文摘A novel extended Lindley lifetime model that exhibits unimodal or decreasing density shapes as well as increasing,bathtub or unimodal-then-bathtub failure rates, named the Marshall-Olkin-Lindley (MOL) model is studied.In this research, using a progressive Type-II censored, various inferences of the MOL model parameters oflife are introduced. Utilizing the maximum likelihood method as a classical approach, the estimators of themodel parameters and various reliability measures are investigated. Against both symmetric and asymmetric lossfunctions, the Bayesian estimates are obtained using the Markov Chain Monte Carlo (MCMC) technique with theassumption of independent gamma priors. From the Fisher information data and the simulatedMarkovian chains,the approximate asymptotic interval and the highest posterior density interval, respectively, of each unknownparameter are calculated. Via an extensive simulated study, the usefulness of the various suggested strategies isassessedwith respect to some evaluationmetrics such as mean squared errors, mean relative absolute biases, averageconfidence lengths, and coverage percentages. Comparing the Bayesian estimations based on the asymmetric lossfunction to the traditional technique or the symmetric loss function-based Bayesian estimations, the analysisdemonstrates that asymmetric loss function-based Bayesian estimations are preferred. Finally, two data sets,representing vinyl chloride and repairable mechanical equipment items, have been investigated to support theapproaches proposed and show the superiority of the proposed model compared to the other fourteen lifetimemodels.
基金Princess Nourah bint Abdulrahman University and Researchers Supporting Project Number(PNURSP2024R346)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Recently,there have been several uses for digital image processing.Image fusion has become a prominent application in the domain of imaging processing.To create one final image that provesmore informative and helpful compared to the original input images,image fusion merges two or more initial images of the same item.Image fusion aims to produce,enhance,and transform significant elements of the source images into combined images for the sake of human visual perception.Image fusion is commonly employed for feature extraction in smart robots,clinical imaging,audiovisual camera integration,manufacturing process monitoring,electronic circuit design,advanced device diagnostics,and intelligent assembly line robots,with image quality varying depending on application.The research paper presents various methods for merging images in spatial and frequency domains,including a blend of stable and curvelet transformations,everageMax-Min,weighted principal component analysis(PCA),HIS(Hue,Intensity,Saturation),wavelet transform,discrete cosine transform(DCT),dual-tree Complex Wavelet Transform(CWT),and multiple wavelet transform.Image fusion methods integrate data from several source images of an identical target,thereby enhancing information in an extremely efficient manner.More precisely,in imaging techniques,the depth of field constraint precludes images from focusing on every object,leading to the exclusion of certain characteristics.To tackle thess challanges,a very efficient multi-focus wavelet decomposition and recompositionmethod is proposed.The use of these wavelet decomposition and recomposition techniques enables this method to make use of existing optimized wavelet code and filter choice.The simulated outcomes provide evidence that the suggested approach initially extracts particular characteristics from images in order to accurately reflect the level of clarity portrayed in the original images.This study enhances the performance of the eXtreme Gradient Boosting(XGBoost)algorithm in detecting brain malignancies with greater precision through the integration of computational image analysis and feature selection.The performance of images is improved by segmenting them employing the K-Means algorithm.The segmentation method aids in identifying specific regions of interest,using Particle Swarm Optimization(PCA)for trait selection and XGBoost for data classification.Extensive trials confirm the model’s exceptional visual performance,achieving an accuracy of up to 97.067%and providing good objective indicators.
文摘The present paper concentrates on the study of reflection and refraction phenomena of waves in pyroelectric and piezo-electric media under initial stresses and two relaxation times influence by apply suitable conditions. The generalized theories of linear piezo-thermoelasticity have been employed to investigate the problem. In two-dimensional model of transversely isotropic piezothermoelastic medium, there are four types of plane waves quasi-longitudinal (qP), quasi-transverse (qSV), thermal wave (T-mode), and potential electric waves (φ-mode) The amplitude ratios of reflection and refraction waves have been obtained. Finally, the results in each case are presented graphically.
文摘In this paper the transmission of leptospirosis, an infectious disease caused by bacteria, is studied. Leptospirosis is currently spreading in Thailand and worldwide. A Susceptible-Infected-Removed sir model is used to study the stability analysis, analytical solution and global behavior of the spreading of the disease. The model was analysed using the techniques of non-linear dynamical systems. Two equilibrium points were found and the stability conditions for these equilibrium points were established. It will be shown that the linearised solutions of the sir equations are in good agreement with numerical solutions.
基金supported by the research seed grant(No.RU:EST:MT:2022/4)funded by REVA University.
文摘The heat and mass transfer of two immiscible fluids in an inclined channel with thermal diffusion,vicious,and Darcy dissipation is studied.The first region consists of a clear fluid,and the second one is filled with a nanofluid saturated with a porous medium.The behaviors of Cu-H_(2)O,In-H_(2)O,and Au-H_(2)O nanofluids are analyzed.The transport properties are assumed to be constant.The coupled non-linear equations of the flow model are transformed into the dimensionless form,and the solutions for the velocity,temperature,and concentration are obtained by the regular perturbation technique.Investigations are carried out on the flow characteristics for various values of the material parameters.The results show that the velocity and temperature of the fluids enhance with the thermal Grashof number,solutal Grashof number,and Brinkman number while decrease with the porosity parameter and solid volume fraction.
基金the National Natural Science Foundation of China(NSFC)under Grant No.12171321.
文摘Gyllenberg and Yan(Discrete Contin Dyn Syst Ser B 11(2):347–352,2009)presented a system in Zeeman’s class 30 of 3-dimensional Lotka-Volterra(3D LV)competitive systems to admit at least two limit cycles,one of which is generated by the Hopf bifurcation and the other is obtained by the Poincaré-Bendixson theorem.Yu et al.(J Math Anal Appl 436:521–555,2016,Sect.3.4)recalculated the first Liapunov coefficient of Gyllenberg and Yan’s system to be positive,rather than negative as in Gyllenberg and Yan(2009),and pointed out that the Poincaré-Bendixson theorem is not applicable for that system.Jiang et al.(J Differ Equ 284:183–218,2021,p.213)proposed an open question:“whether Zeeman’s class 30 can be rigorously proved to admit at least two limit cycles by the Hopf theorem and the Poincaré-Bendixson theorem?”This paper provides four systems in Zeeman’s class 30 to admit at least two limit cycles by the Hopf theorem and the Poincaré-Bendixson theorem and gives an answer to the above question.
基金National Research Council of Thailand(NRCT)and Khon Kaen University:N42A650291.
文摘This works intends to provide numerical solutions based on the nonlinear fractional order derivatives of the classical White and Comiskey model(NFD-WCM).The fractional order derivatives have provided authentic and accurate solutions for the NDF-WCM.The solutions of the fractional NFD-WCM are provided using the stochastic computing supervised algorithm named Levenberg-Marquard Backpropagation(LMB)based on neural networks(NNs).This regression approach combines gradient descent and Gauss-Newton iterative methods,which means finding a solution through the sequences of different calculations.WCM is used to demonstrate the heroin epidemics.Heroin has been on-growth world wide,mainly in Asia,Europe,and the USA.It is the fourth foremost cause of death due to taking an overdose in the USA.The nonlinear mathematical system NFD-WCM discusses the overall circumstance of different drug users,such as suspected groups,drug users without treatment,and drug users with treatment.The numerical results of NFD-WCM via LMB-NNs have been substantiated through training,testing,and validation measures.The stability and accuracy are then checked through the statistical tool,such asmean square error(MSE),error histogram,and fitness curves.The suggested methodology’s strength is demonstrated by the high convergence between the reference solutions and the solutions generated by adding the efficacy of a constructed solver LMB-NNs,with accuracy levels ranging from 10?9 to 10?10.
基金funded by the Fundamental Research Grant Scheme under the Ministry of Higher Education Malaysia FRGS/1/2019/STG06/UMP/02/9.
文摘Intuitionistic fuzzy numbers incorporate the membership and non-membership degrees.In contrast,Z-numbers consist of restriction components,with the existence of a reliability component describing the degree of certainty for the restriction.The combination of intuitionistic fuzzy numbers and Z-numbers produce a new type of fuzzy numbers,namely intuitionistic Z-numbers(IZN).The strength of IZN is their capability of better handling the uncertainty compared to Zadeh's Z-numbers since both components of Z-numbers are charac-terized by the membership and non-membership functions,exhibiting the degree of the hesitancy of decision-makers.This paper presents the application of such numbers in fuzzy multi-criteria decision-making problems.A decision-making model is proposed using the trapezoidal intuitionistic fuzzy power ordered weighted average as the aggregation function and the ranking function to rank the alternatives.The proposed model is then implemented in a supplier selection problem.The obtained ranking is compared to the existing models based on Z-numbers.The results show that the ranking order is slightly different from the existing models.Sensitivity analysis is performed to validate the obtained ranking.The sensitivity analysis result shows that the best supplier is obtained using the proposed model with 80%to 100%consistency despite the drastic change of criteria weights.Intuitionistic Z-numbers play a very important role in describing the uncertainty in the decision makers’opinions in solving decision-making problems.
基金This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2023R175),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘A new extended exponential lifetime model called Harris extended-exponential(HEE)distribution for data modelling with increasing and decreasing hazard rate shapes has been considered.In the reliability context,researchers prefer to use censoring plans to collect data in order to achieve a compromise between total test time and/or test sample size.So,this study considers both maximum likelihood and Bayesian estimates of the Harris extended-exponential distribution parameters and some of its reliability indices using a progressive Type-II censoring strategy.Under the premise of independent gamma priors,the Bayesian estimation is created using the squared-error and general entropy loss functions.Due to the challenging form of the joint posterior distribution,to evaluate the Bayes estimates,samples from the full conditional distributions are generated using Markov Chain Monte Carlo techniques.For each unknown parameter,the highest posterior density credible intervals and asymptotic confidence intervals are also determined.Through a simulated study,the usefulness of the various suggested strategies is assessed.The optimal progressive censoring plans are also shown,and various optimality criteria are investigated.Two actual data sets,taken from engineering and veterinary medicine areas,are analyzed to show how the offered point and interval estimators can be used in practice and to verify that the proposed model furnishes a good fit than other lifetimemodels:alpha power exponential,generalized-exponential,Nadarajah-Haghighi,Weibull,Lomax,gamma and exponential distributions.Numerical evaluations revealed that in the presence of progressively Type-II censored data,the Bayes estimation method against the squared-error(symmetric)loss is advised for getting the point and interval estimates of the HEE distribution.
基金supported by the National Science Foundation of China (11961021 and 11561019)Guangxi Natural Science Foundation (2020GXNSFAA159084)Hechi University Research Fund for Advanced Talents (2019GCC005).
文摘Recent research on nanostructures has demonstrated their importance and application in a variety of fields.Nanostructures are used directly or indirectly in drug delivery systems,medicine and pharmaceuticals,biological sensors,photodetectors,transistors,optical and electronic devices,and so on.The discovery of carbon nanotubes with Y-shaped junctions is motivated by the development of future advanced electronic devices.Because of their interactionwithY-junctions,electronic switches,amplifiers,and three-terminal transistors are of particular interest.Entropy is a concept that determines the uncertainty of a system or network.Entropy concepts are also used in biology,chemistry,and applied mathematics.Based on the requirements,entropy in the form of a graph can be classified into several types.In 1955,graph-based entropy was introduced.One of the types of entropy is edgeweighted entropy.We examined the abstract form of Y-shaped junctions in this study.Some edge-weight-based entropy formulas for the generic view of Y-shaped junctions were created,and some edge-weighted and topological index-based concepts for Y-shaped junctions were discussed in the present paper.
基金This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R87),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘The substitution box,often known as an S-box,is a nonlinear component that is a part of several block ciphers.Its purpose is to protect cryptographic algorithms from a variety of cryptanalytic assaults.A Multi-Criteria Decision Making(MCDM)problem has a complex selection procedure because of having many options and criteria to choose from.Because of this,statistical methods are necessary to assess the performance score of each S-box and decide which option is the best one available based on this score.Using the Pythagorean Fuzzy-based Technique for Order of Preference by Similarity to Ideal Solution(TOPSIS)method,the major objective of this investigation is to select the optimal S-box to be implemented from a pool of twelve key choices.With the help of the Pythagorean fuzzy set(PFS),the purpose of this article is to evaluate whether this nonlinear component is suitable for use in a variety of encryption applications.In this article,we have considered various characteristics of S-boxes,including nonlinearity,algebraic degree,strict avalanche criterion(SAC),absolute indicator,bit independent criterion(BIC),sum of square indicator,algebraic immunity,transparency order,robustness to differential cryptanalysis,composite algebraic immunity,signal to noise ratio-differential power attack(SNR-DPA),and confusion coefficient variance on some standard S-boxes that are Advanced Encryption Following this,the findings of the investigation are changed into Pythagorean fuzzy numbers in the shape of a matrix.This matrix is then subjected to an analysis using the TOPSIS method,which is dependent on the Pythagorean fuzzy set,to rank the most suitable S-box for use in encryption applications.
基金funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project No.(PNURSP2022R50),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘This paper suggests a new modified version of the traditional Weibull distribution by adding a new shape parameter utilising the modified alpha power transformed technique.We refer to the new model as modified alpha power transformed Weibull distribution.The attractiveness and significance of the new distribution lie in its power to model monotone and non-monotone failure rate functions,which are quite familiar in environmental investigations.Its hazard rate function can be decreasing,increasing,bathtub and upside-down then bathtub shaped.Diverse structural properties of the proposed model are acquired including quantile function,moments,entropies,order statistics,residual life and reversed failure rate function.The parameters of the distribution were estimated using the maximum likelihood function.The maximum likelihood method is employed to estimate the model parameters and the approximate confidence intervals are also computed.Via a simulation study,the performance of the point and interval estimates are compared using different criteria.Employing real lifetime data sets,we verify that the offered model furnishes a better fit than some other lifetime models including Weibull,gamma and alpha powerWeibull models.
文摘The current investigations provide the solutions of the nonlinear fractional order mathematical rape and its controlmodel using the strength of artificial neural networks(ANNs)along with the Levenberg-Marquardt backpropagation approach(LMBA),i.e.,artificial neural networks-Levenberg-Marquardt backpropagation approach(ANNs-LMBA).The fractional order investigations have been presented to find more realistic results of the mathematical form of the rape and its control model.The differential mathematical form of the nonlinear fractional order mathematical rape and its control model has six classes:susceptible native girls,infected immature girls,susceptible knowledgeable girls,infected knowledgeable girls,susceptible rapist population and infective rapist population.The rape and its control differential system using three different fractional order values is authenticated to perform the correctness of ANNs-LMBA.The data is used to present the rape and its control differential system is designated as 70%for training,14%for authorization and 16%for testing.The obtained performances of the ANNs-LMBA are compared with the dataset of the Adams-Bashforth-Moulton scheme.To substantiate the consistency,aptitude,validity,exactness,and capability of the LMBA neural networks,the obtained numerical values are provided using the state transitions(STs),correlation,regression,mean square error(MSE)and error histograms(EHs).
基金funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project No. (PNURSP2022R50),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘The objective of this article is to provide a novel extension of the conventional inverse Weibull distribution that adds an extra shape parameter to increase its flexibility.This addition is beneficial in a variety of fields,including reliability,economics,engineering,biomedical science,biological research,environmental studies,and finance.For modeling real data,several expanded classes of distributions have been established.The modified alpha power transformed approach is used to implement the new model.The datamatches the new inverseWeibull distribution better than the inverse Weibull distribution and several other competing models.It appears to be a distribution designed to support decreasing or unimodal shaped distributions based on its parameters.Precise expressions for quantiles,moments,incomplete moments,moment generating function,characteristic generating function,and entropy expression are among the determined attributes of the new distribution.The point and interval estimates are studied using the maximum likelihood method.Simulation research is conducted to illustrate the correctness of the theoretical results.Three applications to medical and engineering data are utilized to illustrate the model’s flexibility.
基金Thailand Science Research and Innovation(TSRI).Contract No.FRB650059/NMA/10the NSRF via the Program Management Unit for Human Resources&Institutional Development,Research and Innovation(grant number B05F640092).
文摘This study aims to solve the nonlinear fractional-order mathematical model(FOMM)by using the normal and dysregulated bone remodeling of themyeloma bone disease(MBD).For themore precise performance of the model,fractional-order derivatives have been used to solve the disease model numerically.The FOMM is preliminarily designed to focus on the critical interactions between bone resorption or osteoclasts(OC)and bone formation or osteoblasts(OB).The connections of OC and OB are represented by a nonlinear differential system based on the cellular components,which depict stable fluctuation in the usual bone case and unstable fluctuation through the MBD.Untreated myeloma causes by increasing the OC and reducing the osteoblasts,resulting in net bone waste the tumor growth.The solutions of the FOMM will be provided by using the stochastic framework based on the Levenberg-Marquardt backpropagation(LVMBP)neural networks(NN),i.e.,LVMBPNN.The mathematical performances of three variations of the fractional-order derivative based on the nonlinear disease model using the LVMPNN.The static structural performances are 82%for investigation and 9%for both learning and certification.The performances of the LVMBPNN are authenticated by using the results of the Adams-Bashforth-Moulton mechanism.To accomplish the capability,steadiness,accuracy,and ability of the LVMBPNN,the performances of the error histograms(EHs),mean square error(MSE),recurrence,and state transitions(STs)will be provided.
基金funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R87),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘In today’s digital world,the most inevitable challenge is the protection of digital information.Due to the weak confidentiality preserving techniques,the existing world is facing several digital information breaches.To make our digital data indecipherable to the unauthorized person,a technique forfinding a crypto-graphically strong Substitution box(S-box)have presented.An S-box with sound cryptographic assets such as nonlinearity(NL),strict avalanche criterion(SAC),bit independence criteria(BIC),bit independence criteria of nonlinearity(BIC-NL),Bit independence criteria of Strict avalanche criteria(BIC-SAC),and Input/output XOR is considered as the robust S-box.The Decision-Making Trial and Evaluation Laboratory(DEMATEL)approach of multi-criteria decision making(MCDM)is proposed forfinding the interrelation among cryptographic properties.A combination of two MCDM methods namely Entropy and multi-objective optimization based on ratio analysis(MOORA)is applied for the best S-box selection.A robust substitution box is selected for secure communications in cryptography by using the combination of DEMETAL selection criteria,entro-py weight assigning,and MOORA ranking scheme.The combination of these three methods provides a fast selection procedure for the secure confusion com-ponent.The offered selection method can also be utilized for the choice of the best cryptosystem with highly secure properties and resistive against all possible linear and differential attacks in the cryptanalysis.
基金by Dr Kemp from National Mathematics and Science College.
文摘This article offers a simple but rigorous proof of Brouwer’s fixed point theorem using Sperner’s Lemma.The general method I have used so far in the proof is mainly to convert the n-dimensional shapes to the corresponding case under the Sperner’s Labeling and apply the Sperner’s Lemma to solve the question.