01-Applied Mathematics & Information Sciences An International Journal

Forthcoming

 Secure and Efficient Deduplication Scheme based on Ownership Challenge for Mobile Cloud Environment Abstract : Cloud Computing plays a vital job in providing storage, infrastructure, and processing services. The demand for storing data in cloud is increasing day by day due to the large number of users. To protect the data stored in the cloud, data is often stored in an encrypted form. Cloud storage includes a large amount of duplicated data under different encryption schemes by different users. Existing solutions that deals with encrypted deduplication does not support controlled access, ownership revocation and file modification requires uploading the entire file in encrypted form. In this paper, a scheme based on Incremental Proxy Re-Encryption (IPRE) scheme for deduplication with ownership challenge integrated with improved file modification operation in mobile cloud environment is proposed. The proposed scheme is compared with Proxy Re-Encryption (PRE) scheme based on turnaround time and energy consumption. During file modification operation, the proposed scheme shows remarkable improvement in results using the restricted storage and processing speed of mobile devices.

 An Efficient Packet Loss Resilience Method Using Closed Form Solution for Unequal FEC Assignment Abstract : This paper deals with an effective video transmission in communication networks by maintaining the quality parameters of the transmitted video file within the desired value. In this work, the Forward Error Correction (FEC) method is proposed to reduce the distortion in video transmission with H.264 video encoder. Initially, the packet distortion model is derived based on the error concealment property and error propagation effect in H.264 encoder. The transmission medium induces various noises which will be transmitted to the receiver. Hence, the Channel Pattern Integration (CPI) algorithm is employed to find the best channel which is free of noises, for transmitting the selected video. Then, the Hierarchical Sequence Pattern (HSP) algorithm is used to validate the errors present in the received packets. The simulation results show that the proposed FEC scheme gives the substantial increase in PSNR performance. Due to the reduced computational complexity compared to the previous scheme, the proposed CPI technique offers an increased flexibility of dynamic video transfer over packet-lossy environments.

 Conceptual Cost Modelling for Sustainable Construction Project Planning— A Levenberg–Marquardt Neural Network Approach Abstract : The main objective of this paper is to develop a systematic neural network model to estimate the conceptual cost for sustainable construction projects. A wide range of influencing factors on micro and macro level has been considered. The proposed engineering approach was pragmatic to model labour and material cost incurred in different stages of construction using the artificial neural network (ANN) technique. The results indicated an acceptable convergence with reasonable generalization capabilities and the results obtained from the neural network model are more accurate and credible. This study contributes the construction professionals by providing insight into using different ANN activation and transfer functions along with a wide range of influencing factors to benchmark the project manager’s conceptual cost predicting capabilities. Moreover, the systematic engineering approach guides the project managers how a readily available practical database can help optimize several objectives. It supports two key factors of sustainable construction: the economic dimension and the social dimension.

 Neuro-Fuzzy SVD Technique for Image Recognition and Safety in Construction Site Abstract : This paper presents a novel computer vision technique of intelligent recognition of safety in construction sites. The proposed technique relies on a new methodology for Neuro-Fuzzy Singular Value Decomposition (NFSVD). This methodology utilized unmanned safety worker’s wears. Where within a construction site entranced a multi-camera is used and fixed on a special frame inside the security Cabin. Before the workers allowed for entering the construction site, an automatic detecting, and an intelligent matching system has the ability to recognize the worker’s dress shapes and colors through a multi snap image. To improve the success of this methodology, the proposed technique empirically investigated, analyzed and verified to check the image frame quality, accept and reject indication, real-time complexity, diffusion, confusion and PSNR. The results performed by this technique demonstrated the robustness and reliability of this methodology for safety in the construction field.

 Dual Tree Complex Wavelet Transform based Image Security using Steganography Abstract : Modern communication media requires high level of protection system for securing the multimedia data from hackers. The most important objective of this manuscript is to develop a simple and efficient methodology for protecting the information from hackers. In this paper, the level of image security is improved by integrating the steganography and cryptography techniques in order to produce the secured image. In this manuscript, Secured image is produced by applying Dual Tree Complex Wavelet Transform (DT-CWT). Further, cryptography algorithm is applied on the steganography image if the level of information entropy lies beyond the threshold value. Mean Square Error (MSE),Peak Signal to Noise Ratio (PSNR) and Mean Absolute Error (MAE) are the metrics which are used to evaluate the performance of the proposed method in this manuscript. The proposed image security methodology achieves 47.04 dB of PSNR, 165.86 of MSE and 31.66% of MAE on bone image dataset.

 Group Mosquito Host Seeking Behaviour Based Self Organizing Technique for Genetic Algorithm Abstract : Genetic algorithms (GAs) are the most important evolutionary computation technique that is used to solve various complex problems that involve a large search space. To have a performance improvement over GA, the concept of Hybrid genetic algorithms that were inspired from the biological behaviour of different living beings was put to use to solve the Non-deterministic Polynomial (NP) complete problems. Hybrid GA can be derived by amalgamating with efficient nature inspired heuristic algorithms like Particle Swarm optimization (PSO), Ant Colony Optimization (ACO), firefly algorithm, cuckoo search, etc.. The grey wolf optimization algorithm has been the recently proposed bio-inspired optimization algorithm that proved as the most recent and best in solving complex problems. In this perspective, Group Mosquito Host Seeking Behaviour based Self-organizing (GMHSA) technique for genetic algorithm has been proposed. The proposed GMHSA model is embedded at the stage prior to genetic operations in order to achieve better exploration and exploitation. The well-known combinatorial optimization problem, Travelling Salesman Problem (TSP), is used as the testbed and the test instances retrieved from the standard TSP library. Various recent and best working hybrid GA models are used to justify the significances of the proposed model. The experimental results show that the proposed algorithm yields better outcome with respect to computational time and also achieve improvement in average convergence rate, irrespective of the size of the test instance, compared to other existing models.

 A Partial Grained Attribute-Based Encryption for Secure Data Access in the Cloud Environment Abstract : A recent fast developing method for easy access and sharing of medical data is to maintain the patients’ information in the form of Electronic Health Record (EHRs). Nowadays, these EHRs are most frequently outsourced and stockpiled at third parties namely cloud servers. This reduces the burden on health care providers but introduces more safety problems like revealing of health data to unapproved parties due to access, by not only illegitimate users but also unauthorized access by legitimate users. Though illegitimate users can be identified by authentication mechanisms, unauthorized access by authentic users cannot be restricted by such authentication mechanisms. To guarantee the control of the users’ access, efficient access control mechanisms and access policies are required. This research paper introduces an innovative data access mechanism based on Partial grained Attribute Based Encryption (PABE) and policies to access, depending on users’ roles in cloud servers. The proposed secure data access aims at providing attribute based keys selectively only to sensitive data thereby restricting access to sensitive data alone to reduce access rights validation time.

 A Lower Bound for Edge-congestion of an Embedding Abstract : In network theory, the problem of simulating one architecture into another architecture is converted into a graph embedding problem. In this paper, we have extended our work in [1] and give algorithms to compute optimal edge-congestion of embedding hypercubes, folded hypercubes, crossed cubes and circulant networks into hypertrees thereby proving that the edge-congestion bound obtained in [1] is sharp.

 Performance Analysis of an M/M/1 Queue with close down periods, server under Maintenance Subject to Catastrophe Abstract : Mathematical analysis of Queueing systems shows a significant part in wireless communication network such as channel control, energy saving schemes etc. Here, we consider a M/M/1 Queue with the server operating in three modes -Active mode, maintenance mode, sleep mode/close down period (with transitions from the maintenance mode to the sleep mode/close down period and active mode), subject to catastrophes. Catastrophes occur only when there are customers in the system and they wipe out the entire system resulting in the system being rendered inactive for a random period of time. Explicit expressions have been obtained for the transient probabilities and steady state probabilities of the close down period, maintenance state and system size along with the many performance measures. Influence of the different parameters on the steady state probabilities, system performance measures are studied using numerical examples.

 A Generalized transformation function that transforms Multiplicative Preference Relation into Fuzzy Preference Relation in MCDM Abstract : This paper proposes a generalized transformation function that transforms multiplicative preference relation (MPR) into fuzzy preference relation (FPR) in multi criteria decision making (MCDM). In analytic hierarchy process (AHP), reciprocal multiplicative preference relation is considered to be the preference representation and in fuzzy majority based selection, FPR acts as uniform representation element. Though, the effectiveness of AHP is to find incompatible judgments, it does not take into account the uncertainty to a number. In decision making problems (DMP) , the lack of consistency leads to get the inconsistent solutions. By exploiting this proposed transformation, it is possible to find a preference of alternatives with strongly consistent solutions in decision making processes. This work is an improvement to the existing work of Herrera et., al.,.

 A Linguistic approach of IFSM with Euclidean Distance in decision making of compatible waste treatment methods Abstract : Decision making of suitable waste treatment method for promoting environmental sustainability is indeed a challenging task for the industrial sectors. There are various approaches and methods of decision making ranging from simple to complex, but in recent times the concept of soft sets represented as soft matrix are used in making appropriate decisions by associating several parameters. To overcome the uncertainty and impreciseness the notion of intutionistic fuzzy soft matrix is used (IFSM). In this paper, a new approach of linguistic IFSM is employed in which the membership and non-membership values are represented in terms of linguistic variables instead of numerical values. This approach presents the realistic opinion of experts and it creates a new paradigm of decision making. This paper primarily aims in introducing LAIFSM and validates the proposed approach with the real life application.

 On Face Magic Labeling of Duplication of a Tree Abstract : This paper deals with the problem of labeling the vertices, edges and faces of a plane graph. Let (a,b, c) ∈ {0,1}. A labeling of type (a,b, c) assigns labels from the set {1,2, . . . ,a|V(G)|+b|E(G)|+c|F(G)|} to the vertices, edges and faces of G in such a way that each vertex receives a labels, each edge receives b labels and each face receives c labels and each number is used exactly once without repetition as a label. The weight of the face w( f ) under a labeling is the sum of the labels of the face itself together with the labels of vertices and edges surrounding that face. A labeling of type (a,b, c) is said to be face magic, if for every positive integer k all k-sided faces have the same weight. Here we study the existence of face magic labeling of duplication and double duplication of trees.

 Star Edge Coloring of Subcubic Graphs Abstract : A proper edge coloring of a graph G is called star edge coloring if there is no bi-colored path or cycle of length four in G. The star chromatic index of G, denoted by c0 s(G), is the least number of colors needed for a star edge coloring of G. Dvoˇr´ak et. al. in 2013, proved that for a subcubic graph G, c0 s(G)  7 and conjectured that it is less than or equal to 6. In this paper, we show that if a subcubic graph G has maximum average degree less than 83 then c0 s(G) < 6.

 Application of Category Graph in finding the Wiener Index of Rough Ideal based Rough Edge Cayley Graph Abstract : The Rough Ideal based Rough Edge Cayley Graph is defined on the Rough semiring (T;D;Ñ) along with its Rough Ideal J and this graph consists of 2n􀀀m3m elements. The complexity in studying the Rough Ideal based Rough Edge Cayley Graph is made simpler by defining the category graph. Wiener index of the Rough Ideal based Rough Edge Cayley Graph is obtained through this category graph and the concepts are illustrated through examples.

 Game chromatic number and game chromatic index of the Mycielski graphs of some families of graphs Abstract : In this paper, we determine the game chromatic number and game chromatic index of the Mycielski graphs of some families of graphs.

 Steiner Reciprocal Degree Distance Index Abstract : In this paper, we introduce the Steiner Reciprocal Degree Distance Index SRDDt (G) for some standard graph structures as well as some properties and bounds for it.

 Computing Degree based Topological Indices for Molecular Graphs Abstract : In our paper, by means of drug molecular structure analysis and edge dividing technology, we investigate the degree based topological indices of several widely used chemical structures which often appear in drug molecular graphs.

 Computational and Mathematical Analysis of Fuzzy Quota Harvesting Model in Fuzzy Environment using Homotopy Perturbation Method Abstract : The mathematical model of fuzzy quota harvesting in fuzzy environment under non-steady state conditions is discussed. Analytical expressions for population density for all values of harvesting constant rate and growth rate are presented by using Homotopy perturbation method. Further, the population densities are compared with simulation results and fuzzy solution in which a good agreement was noted.

 A New Optimized Distributed Scheduling Service using Genetic Computing Abstract : Cloud computing is a paradigm to perform distributed processing and open computing environment. It hides the need of high-cost dedicated expensive hardware, space and dedicated software to minimal interaction and management. Enormous growth of data or big-data generated by cloud system has been recognized. Recently cloud computing is delivering on-demand services like software, memory, data, network-bandwidth and IT related services on Internet. The reliable performance of cloud-services can be related to various key-factors like task-scheduling. Scheduling can be done in different levels like job level or infrastructure level or process level. In this research work focus mainly on task scheduling method. End-user sends the request to the main data-center for jobs to be computing, tasks are named. A task means piece of work or process that can be executed within the deadline. Tasks are divided into critical and non-critical where critical tasks are executed with in the given time period, and non-critical consider as low priority work in the cloud system. Scheduling dispatches the all user tasks provided by the users of cloud system to the cloud service provider for available resources in the cloud.

 Multiscale Wavelet Transformation and Amplitude Zone Time Epoch Coding for ECG Data Extraction and Compression Abstract : Tele-health monitoring plays a vital role in healthcare applications. Electrocardiogram (ECG) signals are an essential part in diagnosis and analysis of cardiac diseases. It consumes large amount of time and space during transmission and data storage. To reduce the time and space complexity, an Integrated Multiscale Gabor Wavelet Transformation and Amplitude Zone Time Epoch Coding (IMGWT–AZTEC) Mechanism is introduced. Multiscale Approximated Gabor Wavelet Transformation is used in IMGWT–AZTEC mechanism to decompose the ECG signals into many sub-bands and to extract the P, T waves and QRS complex. After extraction of signals, Amplitude Zone Time Epoch encoding and decoding Techniques are introduced for data compression and decompression. This in turn helps to improve the data extraction and data compression performance in IMGWT–AZTEC mechanism.

 A CPW-Fed Hexagonal Antenna With Fractal Elements For UWB Applications Abstract : We proposed a coplanar waveguide fed hexagonal antenna design for ultra wideband applications. The size of the antenna is miniaturized to 25×25×1.588 mm3 and the impedance bandwidth is improved by adding fractal elements at the edges. Parametric analysis of the fractal elements and the impedance behavior is performed to realize the radiation characteristics and bandwidth coverage as required for microwave imaging. The addition of fractal elements introduces multi-resonance at different frequency and covers a large bandwidth of 1.7 GHz–11 GHz respectively. The effect of surface currents in the ground plane reduces the antennas operating bandwidth which is reduced by introducing defective ground structure. The proposed antenna has an average gain of 2.35dB, radiation efficiency of 93% to 96%.

 The Narrative of Renewable Sources of Energy in Science Fiction Films Abstract : We identify how images of future cities in science fiction films make global change information more widely available to the public. However, it is noticed the persistence of presenting future cities as dystopias. This paper aims to identify how informed the images of future cities in science fiction films are by the current developments in renewable sources of energy and their integration within the city. It can be argued that science fiction films generally lack references to renewable sources of energy. The scarcity of these references to renewable sources of energy in science fiction films can be attributed to the perception of these images as a representation of a prosperous future society while, in many occasions, science fiction films depict future cities as a dystopia. This paper examines this assumption by comparing the dystopic visions of future cities to the utopic vision in science fiction films through the implementation of renewable sources of energy within the depicted future city and its buildings.

 AN INTEGRATEDFRAMEWORKFORTHE ROLE OF MANAGERIAL ACCOUNTING IFORMATION SYSTEM IN BUSINESS PROCESS REENGINEERING: AN ANALYTICAL FIELD STUDY Abstract : This research was evolved to identify the role of managerial accounting information system (MAIS) in providing the necessary information needed for business process re-engineering (BPR), and suggestan integrated framework for such role. To achieve the study objective, an analytical field study was conducted. The analytical study comprises the BPR concepts, goals, motives and steps; the information needed for BPR; the extent to which the traditional, strategic and applied MAIS provide the information needed in conducting BPR; and the integrated framework for MAIS for the purpose of BPR. The field study was conducted through personal interview andquestionnaire to test the five hypotheses formulated from the theoretical study. The questionnaire was polled to managerial accountants, finance directors and production directors in a sample of companies engaged in the engineering industries and listed in the Egyptian stock market. The most important findings of this research are that; there are several factors that pushed the organizations to conduct the BPR, such as the accelerated developments in production and information technology, severe competition on both domestic and international levels andgrowth of the customer care concept. The BPR requires information in several areas which should be provided by the MAIS. The traditional managerial accounting information system (TMAIS) is not capable of fulfilling its role in the completion of BPR, and strategic managerial accounting information system (SMAIS) provides valued information about customers, competitors which help the organization to perform some of BPR. However, the BPR requires some more information which is not provided by SMAIS. The applied managerial accounting information systems (AMAIS) in the Egyptian companies do not provide the necessary information needed for BPR. There are a number of considerations that should be taken into account when the MAIS designed for the purposes of BPR. Furthermore, there is agreement between the finding of field study and the analytical study derived from the literature in this regard.

 Modelling of HCHS System for Optimal E-O-L Combination Section and Disassembly in Reverse Logistics Abstract : We propose a novel strategy for the multi period disassembly in reverse logistic. The proposed system combines the natural inspired cuckoo search with the artificial inspired harmony search algorithms for disassembly of end of life products. The new strategy is tested by considering a test case and its performance is compared with the conventional optimization techniques. The obtained results are validated based on the cost, disassembly time, and execution time. It is shown that, the performance is outperforms the conventional performance. Hence the proposed hybrid metaheuristics approach is suitable for real time reverse logistics management.

 Non-Linear Machine Learning Techniques for Multi-Label Image Data Classification Abstract : In this paper, we propose non-linear Machine Learning Techniques (MLT) for Multi-Label Image Classification (MLIC) problems. Multi-Label Learning requires MLT to identify the complex non-linear relationship between the features and class labels. Also, Multi-Label data degrades the performance of the classifiers and processing of this data with a large number of features is too complex while using traditional methods. Therefore, we propose two approaches namely ensemble Deep Learning Network (DLN) and Multivariate Adaptive Regression Splines (MARS) for MLIC. The experimental results show that the proposed (DLN and MARS) algorithms achieves a superior predictive performance rate of 94.77% and 81.68% respectively, compared to the existing methods.

 An Analysis on Web Service Generated Data to Facilitate Service Retrieval Abstract : In this paper, a novel layered clustering approach is proposed to cluster web services in order to facilitate web service selection process. The process of web service selection from a rapidly growing number of functionally similar services in the internet, results in an increase of service discovery cost, transforming data time between services and service searching time. Though suitable technologies for web services clustering are being developed, blending neural networks and swarm based algorithms is not prevailing. A novel two-phase clustering approach involving ART (Adaptive Resonance Theory) network for primary clustering with functional data and swarm algorithms (BOIDs, ABC and PSO) for sub-clustering with non-functional data (metadata, QoS and service generated data respectively) is proposed in this work. As a result of this layered approach, the computational overhead is greatly reduced and the search space is also abridged significantly in order to obtain optimal services.

 Heterogeneous Image Transcoding using Interconversion Matrices Abstract : We propose a new scheme for heterogeneous transcoding of Image files from JPEG to JPEG 2000 format with directional filter analysis and modified SPIHT coding scheme. The optimal parameters QF out(I,D) and Z(I,D) that produce high perceived quality in terms of SSIM are selected using a prediction algorithm. Furthermore, the Heterogeneous Image Transcoding are performed using Inter-conversion Matrices which reduce the computational overheads. The resultant coefficients, using BDCT to DWT, are analyzed by Directional Filter banks (DFBs). The DWT-DFB coefficients are encoded via progressive SPIHT algorithm to meet the devices constraints. In the experimental set up, the quality of reconstructed image is measured using PSNR and SSIM. It is shown that there is an improvement of more than 4 dB in the quality of reconstruction for the same bit rate as that of mere DWT based SPIHT encoding.

 Computing the Median and Range for Power Function Distributions Abstract : Median and range of a random sample are measures based on order statistics which are descriptive of the central tendency and dispersion of the population, respectively. In this paper, I obtained the median and range for order statistics from non-identical standard power distributions functions. Then, the median and range for identical standard power functions distributions and uniform distributions functions are given. Finally numerical results of the median and range are presented.

 The Solution of Quantum Kinetic Equation with Delta Potential and its Application for Information Technology Abstract : The existence of the unique solution, in terms of initial data of the hierarchy of quantum kinetic equations with delta potential and application of kinetic equation for information technology, has been proven. The proof is based on the nonrelativistic quantum mechanics and application of semigroup theory methods.

 EFFICIENT DETECTION OF SIGNAL IN MIMO SYSTEM USING MODIFIED MEMETIC ALGORITHM WITH HIGHER ORDER QAM CONSTELLATIONS Abstract : MIMO is a key technology to meet high data rate requirement for next generation communication system. It can efficiently use the spectrum to increase the communication throughput. Designing a low-complex, high performance detection algorithm for the MIMO system has been a vital issue. The efficient detection of MIMO signal using Modified Memetic Algorithm (MMA) with Quadrature Amplitude Modulation (QAM) varying constellation size is proposed in this paper. The performance of the proposed work is at far with the optimum Maximum Likelihood Detector (MLD) in terms of Bit Error Rate (BER) and computational complexity. Three stages are there in proposed work. In the first stage, using partial ML detections certain bits are detected. The undetected bits in the first stage are calculated in the second stage using soft values generation method. In the last stage, the undetected bits are detected by using MMA. The soft values obtained from second stage and the partial ML bits from the first stage are combined and used as the input for the last stage. In this stage, the best individuals are obtained. MMA uses hill climbing local search technique to obtain the high quality individuals as starting point. The simulation results demonstrate that MMA based MIMO detectors outperformed the state of art detectors for different antenna configurations. Also it gives reduced complexity as compared to the existing detectors. For a 4x4, 16-QAM MIMO system, the proposed work gives BER of 10-4 for 8dB SNR with the complexity value of 51.4.

 New aspects and applications of entrepreneur’s critical success elements Abstract : We investigate how critical success elements are perceived by the entrepreneurs. Determining unknown factors for small and medium businesses from an ensemble of identical systems is a fundamental, yet experimentally demanding, task in business. Here we study the critical success elements needed to fully characterize the success in business. We show this task can be achieved using new model, which yield a practical though non-universal set of projective measurements. An application has been given and it is shown that Bahrain is stepping up efforts to make small and medium businesses a major contributor to its growth.

 A Hybrid Approach to Optimize Feature Selection Process Using iBPSO- BFPA for Review Spam Detection Abstract : With the increase in the customer reviews, feedbacks, suggestions posted in the web forum, blogs led to the emergence of spam. Spam detection is important for both the customer and service providers to arrive at a proper decision while purchasing as well as marketing the product. Most of the research works has been developed only for sentiment classification for the past few decades which favors the spammers to write fake reviews. Hence it is important to detect the spam reviews but the major issues in spam review detection are the high dimensionality of feature space which contains redundant, noisy and irrelevant features. To resolve this, optimization method for selecting subset of features is necessary. Hence, this paper proposes Hybridization of Improved Binary Particle Swarm Optimization (iBPSO) and Binary Flower Pollination Algorithm (BFPA) utilized with Naive Bayes and k-NN for optimization process to improve the classification performance. Experimentation result proves that hybrid iBPSO BFPA outperformed the existing approach by obtaining the maximum accuracy of 94.43% for review spam dataset when compared with existing Cuckoo Search NB(CS) and Shuffled Frog Leaping Algorithm NB (SFLA) which achieved only 81.87% and 88.23%. The experimental result proves that the proposed hybrid method increases the classification accuracy.

 The impact of Arab Impact Factor (AIF) on Human Knowledge Abstract : Inspiration driven activities and services are used more nowadays to raise a communication capacity for meeting such society demands. Arab impact factor (AIF) originally inspired by Arab Impact Factor Project, is highly needed to increase the attention towards Arabic journals regularly published. Important knowledge published in Arabic language can experience new products and services that improve Arab quality of life. Inspiration and innovation mainly achieved by mother tongue. Publications in Arabic language will increase the impact of Arab activity in a way may impact the human inspiration and innovation in different behaviors. Using data mining analyses can predict those Journals will be repeatedly cited in the future, other journals might not be highly cited, accordingly give advice to predictable high- cited journals and predictably not cited Journals to promote activities or change strategy respectively. AIF using data mining machine learning may predict success of every organization.

 Magnetohydrodynamic Peristaltic Flow of Jeffry Nanoﬂuid with Heat Transfer Through a Porous Medium in a Vertical Tube Abstract : The present paper deals with the peristaltic motion of a non-Newtonian nanoﬂuid with heat transfer through a porous medium inside a vertical tube. The system is stressed by a uniform magnetic ﬁeld. The viscous dissipation, internal heat generation with radiation effects are considered. A Rung-Kutta-Merson method and a Newton iteration in a shooting and matching technique are used to ﬁnd the solutions of the momentum, temperature and nanoparticles equations. The numerical formula of the axial velocity, temperature and nanoparticles are obtained as functions of the physical parameters of the problem. Numerical calculations are carried out for these formula. The effects of physical parameters of the problem on this formula are discussed numerically and illustrated graphically througth a set of ﬁgures.

 Complete Tripartite Graph accepting Continuous Monotonic Decomposition theorem for evaluation routing of reaction mechanism of Piperdone Derivatives with different colour mobility of Graph labelling Abstract : This research paper has provided a new platform for the Graph labelling method of 3- isobutyl-2,6–bis(m-nitrophenyl)-piperidin-4-one semicarbazone. A futuristic approach for the synthesised compound has been developed in the graph theory and sequence of reaction mechanism of compound is done through Complete Tripartite Graph accepting Continuous Monotonic Decomposition concepts. In the same way we have desired functional illustration and acceptance of Graph Theory to chemistry dictionary. Thus the complex compound is enhanced in mathematical theory and to correlate the mode of arrangement of compound in graph labelling. The focus of this application is to bridge qualitative relationship and representation of research compound in graphical decomposition factors.

 An Effective Approach for solving MHD Viscous Flow Due to A Shrinking Sheet Abstract : In this paper, we present an effective technique combined between homotopy analysis method and traditional Pad´e approximation so-called (HAM Pad´e), the technique to obtain the analytic approximation solution of a certain type of nonlinear boundary value problem with one boundary condition at infinity. The analytic series solution obtained from the homotopy analysis method and the Pad´e diagonal approximation to handle the boundary condition at infinity. This technique apply to the boundary value problem resulting from the magnetohydrodynamic (MHD) viscous flow due to a shrinking sheet. The proposed technique success to obtain the two branches of solutions for important parameter. Comparison of the present solution is made with the existing solution and excellent agreement is noted.

 Akaike Information Criterion and Fourth-Order Kernel Method for Line Transect Sampling (LTS) Abstract : Parametric and noparametric approaches were used to fit line transect data. Different parametric detection functions are suggested to compute the smoothing parameter of the nonparametric fourth-order kernel estimator. Among the different candidate parametric detection functions, the researcher suggests to use Akaike Information Criterion (AIC) to select the most appropriate one of them to fit line transect data. More specifically, four different parametric models are considered in this research. Where as two models were taken to satisfy the shoulder condition assumption, the other two do not. Once the appropriate model is determined, it can be used to select the smoothing parameter of the nonparametric fourth-order kernel estimator. As the researcher expected, this technique leads to improve the performances of the fourth-order kernel estimator. For a wide range of target densities, a simulation study is performed to study the properties of the proposed estimators which show the superiority of the resulting proposed fourth-order kernel estimator over the classical kernel estimator in most considered cases.

 Median and Extreme Ranked Set Sampling for penalized spline estimation Abstract : This paper improves and demonstrates two approaches of Ranked Set Sampling (RSS) method for penalized spline models which are Median and Extreme RSS. These improved methods increase the efficiency of the estimated parameters in the targeted model with comparing to usual RSS and Simple Random Sampling (SRS). Moreover, in practical studies, our improved methods can reduce sampling expenses dramatically. The paper approaches are illustrated using a simulation study as well as a practical example.

 Control of Quantum and Classical Correlations in Werner-like States Under Dissipative Environments. Abstract : Quantum and classical correlations are studied for Werner-like state interacting with a thermal reservoir. Starting from Werner-like states, we have shown that entanglement sudden death and decay of both the quantum discord and classical correlation are accelerated by the different factors: thermal photons, cavity decay and the purity of the initial state. By these factors, the death-start points of the correlations can be controlled and the two-qubit states have no correlations that can be determined. There is no sudden death for quantum discord and classical correlation.

 Visualisation of a Three-Dimensional (3D) Object’s Optimal Reality in a 3D Map on a Mobile Device Abstract : Prior research on the subject of visualisation of three-dimensional (3D) objects by coordinate systems has proved that all objects are translated so that the eye is at the origin (eye space). The multiplication of a point in eye space leads to perspective space, and dividing perspective space leads to screen space. This paper utilised these findings and investigated the key factor(s) in the visualisation of 3D objects within 3D maps on mobile devices. The motivation of the study comes from the fact that there is a disparity between 3D objects within a 3D map on a mobile device and those on other devices; this difference might undermine the capabilities of a 3D map view on a mobile device. This concern arises while interacting with a 3D map view on a mobile device. It is unclear whether an increasing number of users will be able to identify the real world as the 3D map view on a mobile device becomes more realistic. We used regression analysis intended to rigorously explain the participants’ responses and the Decision Making Trial and Evaluation Laboratory method (DEMATEL) to select the key factor(s) that caused or were affected by 3D object views. The results of regression analyses revealed that eye space, perspective space and screen space were associated with 3D viewing of 3D objects in 3D maps on mobile devices and that eye space had the strongest impact. The results of DEMATEL using its original and revised version steps showed that the prolonged viewing of 3D objects in a 3D map on mobile devices was the most important factor for eye space and a long viewing distance was the most significant factor for perspective space, while large screen size was the most important factor for screen space. In conclusion, a 3D map view on a mobile device allows for the visualisation of a more realistic environment.

 A bandwidth efficient video conferencing system for streaming gesture based video using a Pareto minimal approach to D-HOH-SI individuals Abstract : Deaf, Hard-Of-Hearing and Speech-Impaired (D-HOH-SI) individuals have a specific interest in the development of affordable high-quality videoconferencing as a means of communicating with their family members and peers using sign language. Unlike Video Relay Service, which is intended to support communication between a caller using sign language and another party using spoken language, videoconferencing can directly be used either between two deaf signers or between a caller using sign language and the other using spoken language without the need of an interpreter. This paper proposes a Bandwidth Aware Gesture Based Layered (BAGBL) framework for sign language recognition based video conferencing application. Assuming a D-HOH-SI individual at the sender side, the proposed framework uses shape energy trajectory of hand sign gesture for video layering, a Multi-dimensional Multiplechoice Knapsack Problem (MMKP) based gradational hull pareto minimization heuristic called MMKP based Pareto Minimization Heuristic for Substream Scaling (MPMHSS) and a heuristic for substream scheduling which is based on Dynamic Multilevel Priority (DMP) called Modified DMP packet scheduling (MDMP) mechanism. At the receiving side, our framework includes an automatic sign language recognizer to recognize the sign language gesture and a speech synthesizer to convert the recognized words to speech. Our framework intelligently forms and selects video layers from a video sequence to maximize the video quality. Using extensive simulation and mathematical analysis we show that the proposed solution: (i) is efficient in terms of recognition rate (ii) achieves high radio resource utilization, (iii) maximizes the received video quality.

 The Development of a Prototype of the Campus Guide Mobile Application Abstract : We have developed a so-called campus guide mobile application running on Android smart phones. Nowadays, a smart phone is equipped with many sensors - some of them are pretty accurate, a powerful processor, and large capacity secondary memory devices. Making use of these features of smart phones, we have made the campus guide a location-based service in that it determines where the user is located, which building the user is interested in, and plays the video which is related to the building. Our implementation of the application is briefly described in this paper.

 A completely monotonic function involving the gamma and tri-gamma functions Abstract : In this paper we provide necessary and sufficient conditions on $a$ for the function $\frac{1}{2}\ln(2\pi)-x+\bigl(x-\frac{1}{2}\bigr)\ln x-\ln\Gamma(x)+\frac1{12}{\psi(x+a)}$ and its negative to be completely monotonic on $(0,\infty)$, where $a\ge0$ is a real number, $\Gamma(x)$ is the classical gamma function, and $\psi(x)=\frac{\Gamma(x)}{\Gamma(x)}$ is the di-gamma function. As applications, some known results and new inequalities are derived.

 Quantum information of two three-level trapped ions irradiated by laser beams Abstract : Quantum information of two particles taking into account the time-dependent laser field is discussed. Considering the initial pure state of the ions, we discuss the properties of the entanglement due to the concurrence and quasi-probability distribution via Wigner function. Although, the results are presented in a general framework, we have realized controllable coupling between the qubit and field by inserting an additional factors between them.

 An On-line Analytical Data Mining (OLAM) Prototype for Telecommunication Data Mining International Calls Abstract : In Nowadays, the telecommunication market is rapidly expanding and becoming highly competitive especially in international calls. The telecommunication companies have several millions of daily international call records. The huge corpus of database could be used to study the trend of customer. The main objective of this paper is to develop a model to decision system support. One of the main problems addressed in this paper is the shortage of quickly and accurate tool to process these data using data mining techniques. In this paper we designed an Online Analysis Data Mining (OLAM) prototype to help in the analysis of telecommunication data to support decision makers using Microsoft SQL server 2005 and SSAS 2005. We have also used association rules, clustering, Naïve Bayes, decision tree, and linear regression which have given us different views to the same data.

 A new triangulation algorithm from 3D unorganized dense point cloud Abstract : This paper presents an algorithm for triangular mesh generation from unorganized points based on 3D Delaunay tetrahedralization and mesh-growing method. This algorithm requires the point density to meet the well-sampled condition in smooth regions and dense sampling in sections of a great curvature and two close opposite surfaces. The principle of the algorithm is as follows. It begins with 3D Delaunay tetrahedralization of all sampling points. Then extract part of triangles belonging to the surface as the seed facets according to the rough separation characteristics which based on the angle formed by the circumscribing balls of incident tetrahedrons. Finally, the algorithm grows the seed facets from front triangles to all triangles of the surface. This paper shows several experimental results which explain this approach is general and applicable to various object topologies.

 Numerical Investigations of Turbulent Liquid Flows through a Centrifugal Impeller by Using Structural-Function LES Abstract : Based on second-order structural functions, a sub-grid eddy viscosity model is proposed for Large Eddy Simulation (LES) of turbulent flows through a centrifugal impeller in a rotating coordinate system. The current model is based on the modified Karman-Howarth equation of resolved scale turbulence of LES and allows energy transfer between resolved and unresolved scale turbulence, but the sub-grid eddy viscosity model is a function of structural functions and measures the ratio of cascade energy to the dissipation. During the simulation, the finite volume method is used to discretize the filtered governing equations, the SIMPLEC algorithm is used to solve the discretized equations and body-fitted coordinates are used to simulate turbulent flows in complex geometries. The computational results of turbulent flows in a centrifugal impeller are used to illustrate the effectiveness of the model and the predicted relative velocity distributions follow the practical rules of turbulent flows inside an impeller. The simulated pressure is in good agreement with experimental data.

 Rotation-Invariant Texture Image Retrieval Based on Multiscale Geometric Analysis and WARD Abstract : In this paper, we present an effective approach for rotation-invariant texture image retrieval based on multiscale geometric analysis and weighted average relative distance(WARD). The anisotropy of nonsubsampled contourlet transform (NSCT) can help us to represent the texture in image more effectively than traditional orthogonal wavelet transforms. We achieve rotation-invariant features by combining average energy with average standard deviation of all subbands at each NSCT scale. We propose an effective similarity measure, and this measure need not calculate the statistics of the entire image database in advance, so it has much wider application situation, e.g., internet. Experimental results demonstrate that the proposed approach improves retrieval accuracy from 73.3% to 77.6% on the rotated database, compared with Dual-Tree-Complex Wavelet Transform (DT-CWT)- based approach.

 Doubly Constrained Robust Constant Modulus Algorithm Abstract : The constant modulus algorithm (CMA) has been known as blind adaptive beamforming because it requires no knowledge about the signal except that the transmitted signal waveform has a constant envelope. But in practical applications, the performance of the linearly constrained CMA is known to degrade severely in the presence of even slight signal steering vector mismatches. To account for the mismatches, a novel robust CMA algorithm based on double constraints is proposed via oblique projection of signal steering vector and worst-case performance optimization. To improve robustness, the weight vector is optimized to involve minimization of a constant modulus algorithm objective function with penalty for the worst-case signal steering vector by the Lagrange multiplier method, in which the parameters can be precisely derived at each iterative step. Moreover, the online implementation of the proposed algorithm has a low computational load. A theoretical analysis for our proposed algorithm in terms of the choice of step size, convergence perforamnce and SINR performance is presented in this paper. The proposed robust constrained CMA suffers the least distortion from the directions near the desired steering angle, provides a significantly improved robustness against the signal steering vector mismatches, yields better signal capture performance and improves the mean output array SINR as compared with the conventional constrained CMA. The numerical experiments have been carried out to demonstrate the superiority of the proposed algorithm on beampattern control and output SINR enhancement.

 Global Exponential Stability for Hopfield Neural Networks with Varying Delays Abstract : The main purpose of this paper is to study the global exponential stability of the equilibrium point for a class of Hopfield neural networks with varying delays. A new sufficient condition for the global exponential stability of neural networks is obtained by using M-matrix analysis. The condition is easy to check in practice. A numerical example is worked out by using the results obtained to illustrate it

 The Evolution of Communication Network Architecture Abstract : Communication network architecture has experienced tremendous improvement from the ARPANET to IP with the number and traffic forms of users. Although IP is widely considered as the platform for future network, unfortunately, it is burdened by its her- itage of several decades. Nowadays, the bottleneck of bandwidth mainly lies in IP router not links. In this paper, we argue that one of the principal reasons for this is routing and forwarding planes are coupled together by analyzing the evolution of com- munication network architecture. Then we proposed a new network architecture to pro- vide faster forwarding speed. Simulation scenery shows this architecture is practical. Furthermore, we compared performance metrics (forwarding speed, length of address and total cost) with today’s IP network, our results indicate that forwarding speed is increased 72% of IP, the length of address is much less than IPv4 address and the total cost can be decreased 76% of the current network. Finally, we discuss several impor- tant issues of the new network architecture including address, network connection and end-to-end QoS as well as architecture extension.

 Quaternion Encryption Scheme Modification Resistant to Known Plaintext- Ciphertext Attack and its Hardware-Oriented Implementation Abstract : Quaternion encryption scheme (QES) is shown to be susceptible to the known plaintext-ciphertext attack (KPCA) due to not proper choice of the frame size and the procedure of secret quaternion updating. In this paper, we propose a modification of the QES (M-QES) which is resistant to the KPCA. The M-QES is based on adjusting the frame size and the quaternion update procedure. An approach for effective hardware (HW-QES) implementation of the proposed algorithm is discussed. The HW-QES uses mainly addition and shift operations. Experimental results show that the proposed M-QES and HW-QES are six-eight times more effective in the encryption quality of signals than the original QES. Additionally, M-QES is shown to be significantly more effective in the encryption quality of images than the original QES. Our results show that, the performance of the HW-QES is only 10% worse than that of QES.

 Selfish Game-Theoretic Approach for Dynamic Spectrum Sharing with Software Defined Radio Networks Abstract : To analyze the dynamic spectrum access of Cognitive Radio Networks (CRN), this paper proposes the selfish game-theoretic model for multi-hop networking with wireless nodes, which matches well with the physical administrative structure in real-life situations. User communication session is investigated via a cross-layer optimization approach, with joint consideration of power control, scheduling, and routing. Both the channel quality and the spectrum substitutability are discussed. A utility function is built, for the secondary user to obtain the spectrum demand function. In addition, in terms of spectrum access opportunities, an equilibrium pricing scheme is presented to shows that it is close to optimal in most scenarios. The proposed Game-theoretic End-to-end Spectrum Sharing algorithm (GE2SS) highlights the trend of spectrum pricing design that it is not necessarily bad for the network users to behave selfishly. Simulation and experimental results are presented as verifications.

 High Variability Resilient in Nano-Scaled Technologies for Low power 7T-SRAM Design Abstract : High variability in nano-scaled technologies can easily disturb the stability of a carefully designed standard 6TSRAM cell, causing access failures during a read/write operation. We propose a 7T-SRAM cell to increase the read/write stability under large variations. The proposed design uses a low overhead read/write assist circuitry to increase the noise immunity. Use of an additional transistor and a floating ground allows read disturb free operation. While the write assist circuitry provides a floating ground during a write operation that weakens cell storage by turning off the supply voltage to ground path of the cross-coupled inverter pair. This allows a high speed/low power write operation. Monte Carlo simulations indicate a 200% increase in the read stability and a boost of 124% in write stability compared to a conventional 6T-SRAM design, when subjected to random dopant fluctuations, line edge roughness, and poly-granularity variations. HSPICE simulations of a 45nm 64x32 bit SRAM array designed using standard 6T and proposed 7T SRAM cells indicate a 31% improvement in write speed, 30% decrease in write power, read power decreases by 60%, and a 44% reduction in the total average power consumption is achieved with the proposed design.

 Numerical Simulations of Circular Anchor Plates under Pull-out in Sand Abstract : This research presents the studies conducted on a type of soil anchor, a circular anchor plate, and its pullout capacity. Soil anchors are used as foundation system for the soil structures that needs to pull-out load. Experimental and numerical analysis investing the pullout test of 0.1m diameter of circular horizontal anchor plates in cohesion less soil show that maximum pullout increase with embedment ratio in sand. This paper investigated the ultimate pullout capacity of circular horizontal anchor plate in cohesion less soils subjected to pullout test in loose sand. An agreement between pullout loads from chamber box and finite element modeling using PLAXIS based on 0.4m analyzed maximum displacements for circular horizontal anchor plates to embedment ratio of 4. In the research, The Hardening Soil Model is using in PLAXIS. The numerical analysis based on PLAXIS predicted higher pullout load in loose sand due to experimental results but in final showed a good agreement with physical results.

 Numerical Analysis of Buried Pipe under Wheel Loads by Three Dimensional at Finite Difference Method (FDM) Abstract : The behavior of steel pipe during wheel load was studied in this paper by FLAC 3D. A steel pipe is buried at a shallow depth beneath a roadway. An analysis is needed to evaluate the effect of wheel loading on the road surface deflection and pipe deformation. The top of the pipe is 1.5m beneath the road surface. The pipe has an outer diameter of 4m and is 0.12m thick. The pipe excavation is 15m wide and 6m depth. The steel pipe is placed on a 0.4m thick layer of soil backfill, and then soil is compacted around the steel pipe. The wheel load is increased during failure occurs in the soil. Soil backfill behavior has been considered with Mohr-Coulomb Model in analysis. The analysis defines the failure load and the resulting soil and pipe displacement.