Search all articles
8183 articles
Research Article
Internal equatorial water waves in the f−plane
David Henry
Pages: 499 - 506
In this paper we describe an exact, and explicit, three-dimensional nonlinear solution for geophysical internal ocean waves in the Equatorial region which incorporates a transverse-Equatorial meridional current.
Research Article
An Algorithm Based on Neuro-Fuzzy Controller Implemented in A Smart Clothing System For Obstacle Avoidance
Senem Kursun Bahadir, Sebastien Thomassey, Vladan Koncar, Fatma Kalaoglu
Pages: 503 - 517
In this study, to overcome navigation concerns of visually impaired people, an algorithm based on neuro-fuzzy controller composed of multi-layer fuzzy inference systems (FIS) for obstacle avoidance was developed and it was implemented in a smart clothing system. The success of the proposed algorithm...
Research Article
A Novel Method Based on Extended Uncertain 2-tuple Linguistic Muirhead Mean Operators to MAGDM under Uncertain 2-Tuple Linguistic Environment
Yi Liu, Jun Liu, Ya Qin, Yang Xu
Pages: 498 - 512
The present work is focused on multi-attribute group decision-making (MAGDM) problems with the uncertain 2-tuple linguistic information (ULI2–tuple) based on new aggregation operators which can capture interrelationships of attributes by a parameter vector P. To begin with, we present some new uncertain...
Research Article
A Supervised Requirement-oriented Patent Classification Scheme Based on the Combination of Metadata and Citation Information
Fujin Zhu, Xuefeng Wang, Donghua Zhu, Yuqin Liu
Pages: 502 - 516
Patent classification systems are applied extensively in innovative analysis. Existing patent classification schemes are either technology-dependent or TRIZ-based. The former ones, such as the IPC and UPC, are normally developed by different patent offices in the world mainly for the purpose of patentability...
Research Article
A Definition for Hesitant fuzzy Partitions
Laya Aliahmadipour, Vicenç Torra, Esfandiar Eslami, Mahdi Eftekhari
Pages: 497 - 505
In this paper, we define hesitant fuzzy partitions (H-fuzzy partitions) to consider the results of standard fuzzy clustering family (e.g. fuzzy c-means and intuitionistic fuzzy c-means). We define a method to construct H-fuzzy partitions from a set of fuzzy clusters obtained from several executions of...
Research Article
Further Riccati Differential Equations with Elliptic Coefficients and Meromorphic Solutions
Adolfo Guillot
Pages: 497 - 508
We exhibit some families of Riccati differential equations in the complex domain having elliptic coefficients and study the problem of understanding the cases where there are no multivalued solutions. We give criteria ensuring that all the solutions to these equations are meromorphic functions defined...
Research Article
A Social Choice Analysis of the Borda Rule in a General Linguistic Framework
José Luis Garcia-Lapresta, Bonifacio Llamazares, Miguel Martinez-Panero
Pages: 501 - 513
In this paper the Borda rule is extended by allowing the voters to show their preferences among alternatives through linguistic labels. To this aim, we need to add them up for assigning a qualification to each alternative and then to compare such qualifications. Theoretically, all these assessments and...
Research Article
Personalized individual semantics based approach to MAGDM with the linguistic preference information on alternatives
Yuexuan Wang, Yucheng Dong, Hengjie Zhang, Yuan Gao
Pages: 496 - 513
Personalized individual semantics (PIS) exist widely in our daily life, and it means that different people have different understandings regarding the same word. In decision making, decision makers are accustomed to express their preferences using a linguistic way, and it is naturally that the PIS will...
Research Article
Enhancing of Artificial Bee Colony Algorithm for Virtual Machine Scheduling and Load Balancing Problem in Cloud Computing
Boonhatai Kruekaew, Warangkhana Kimpan
Pages: 496 - 510
This paper proposes the combination of Swarm Intelligence algorithm of artificial bee colony with heuristic scheduling algorithm, called Heuristic Task Scheduling with Artificial Bee Colony (HABC). This algorithm is applied to improve virtual machines scheduling solution for cloud computing within homogeneous...
Research Article
New Properties of the Zeros of Krall Polynomials
Oksana Bihun
Pages: 495 - 515
We identify a new class of algebraic relations satisfied by the zeros of orthogonal polynomials that are eigenfunctions of linear differential operators of order higher than two, known as Krall polynomials. Given an orthogonal polynomial family
{pv(x)}v=0∞
, we relate the zeros of the polynomial...
Research Article
Functional representation of the negative DNLS hierarchy
V.E. Vekslerchik
Pages: 495 - 513
This paper is devoted to the negative flows of the derivative nonlinear Schrödinger hierarchy (DNLSH). The main result of this work is the functional representation of the extended DNLSH, composed of both positive (classical) and negative flows. We derive a finite set of functional equations, constructed...
Research Article
Jacobi's Three-Body System Moves like a Free Particle
M.C. Nucci
Pages: 499 - 506
The problem of three bodies which attract each other with forces proportional to the cube of the inverse of their distance and move on a line was reduced to one quadrature by Jacobi [23]. Here we show that the equations of motions admit a five-dimensional Lie symmetry algebra and can be reduced to a...
Research Article
Inverse Spectral Problem for the Periodic Camassa-Holm Equation
Evgeni Korotyaev
Pages: 499 - 507
We consider the direct/inverse spectral problem for the periodic Camassa-Holm eqution. In fact, we survey the direct/inverse spectral problem for the periodic weighted operator Ly = m-1 (-y +1 4 y) acting in the space L2 (R, m(x)dx), where m = uxx-u > 0 is a 1-periodic positive function and u is the...
Research Article
Group analysis of the generalized Burnett equations
Alexander V. Bobylev, Sergey V. Meleshko
Pages: 494 - 508
In this paper group properties of the so-called Generalized Burnett equations are studied. In contrast to the classical Burnett equations these equations are well-posed and therefore can be used in applications. We consider the one-dimensional version of the generalized Burnett equations for Maxwell...
Research Article
On integrability of the Szekeres system. I
Anna Gierzkiewicz, Zdzisław A. Golda
Pages: 494 - 506
The Szekeres system is a four-dimensional system of first-order ordinary differential equations with nonlinear but polynomial (quadratic) right-hand side. It can be derived as a special case of the Einstein equations, related to inhomogeneous and nonsymmetrical evolving spacetime. The paper shows how...
Research Article
On Symmetric Water Waves with Constant Vorticity
Florian Kogelbauer
Pages: 494 - 498
We prove that a solution to the gravity water wave problem with constant vorticity, whose wave profile as well as its horizontal velocity component at the free surface are symmetric at any instant of time, is given by a traveling wave. The proof is based on maximum principles and structural properties...
Research Article
A hybrid genetic algorithm for the distributed permutation flowshop scheduling problem
Jian Gao, Rong Chen
Pages: 497 - 508
Distributed Permutation Flowshop Scheduling Problem (DPFSP) is a newly proposed scheduling problem, which is a generalization of classical permutation flow shop scheduling problem. The DPFSP is NP-hard in general. It is in the early stages of studies on algorithms for solving this problem. In this paper,...
Research Article
Parameter Estimation and Application of Generalized Inflated Geometric Distribution
Avishek Mallick, Ram Joshi
Pages: 491 - 519
A count data that have excess number of zeros, ones, twos or threes are commonplace in experimental studies. But these inflated frequencies at particular counts may lead to overdispersion and thus may cause difficulty in data analysis. So to get appropriate results from them and to overcome the possible...
Research Article
Propagation of Spikes in Nonresonant Atomic Media: The Reduced Maxwell-Duffing Model
Utpal Roy, Thokala Soloman Raju, Prasanta K. Panigrahi, Ashutosh Rai
Pages: 491 - 499
We obtain spikes or extremely short pulses for reduced Maxwell-Duffing equations under a general boundary condition, connecting the electric field and electron amplitude, using a Möbius transformation. For a nonzero background, this system is shown to admit two families of exact solutions in the form...
Research Article
Lax Pair, Binary Darboux Transformation and New Grammian Solutions of Nonisospectral Kadomtsev–Petviashvili Equation with the Two-Singular-Manifold Method
Shou-Fu Tian, Hong-Qing Zhang
Pages: 491 - 502
In this letter, the two-singular-manifold method is applied to the (2+1)-dimensional nonisospectral Kadomtsev–Petviashvili equation with two Painlevé expansion branches to determine auto-Bäcklund transformation, Lax pairs and Darboux transformation. Based on the two obtained Lax pairs, the binary Darboux...
Research Article
Consensus Model with Double Feedback Mechanism Based on Dynamic Trust Relationship in Social Network Group Decision-Making
Yueqin Gu, Tiantian Hao, Dong Cheng, Juan Wang, Faxin Cheng
Pages: 491 - 502
In social network group decision-making, adjusting the opinions of decision makers is often used to promote consensus. But decision makers are not always willing to accept the feedback mechanism, and decision-makers' trust relationships are not constant during the consensus process. This paper constructs...
Research Article
An Efficient Fuzzy Self-Classifying Clustering based Framework for Cloud Security
Sivakami Raja, Jaiganesh M, Saravanan Ramaiah
Pages: 495 - 506
Though cloud computing has become an attractive technology due to its openness and services, it brings several security hazards towards cloud storage. Since the distributed nature of clouds is achieved through internetworking technologies, clouds suffer from all the vulnerabilities by which networking...
Research Article
Jordan Manifolds and Dispersionless KdV Equations
I.A.B. Strachan
Pages: 495 - 510
Multicomponent KdV-systems are defined in terms of a set of structure constants and, as shown by Svinolupov, if these define a Jordan algebra the corresponding equations may be said to be integrable, at least in the sense of having higher-order symmetries, recursion operators and hierarchies of conservation...
Research Article
Anisotropic Diffusion based Brain MRI Segmentation and 3D Reconstruction
M. Arfan Jaffar, Sultan Zia, Ghaznafar Latif, Anwar M. Mirza, Irfan Mehmood, Naveed Ejaz, Sung Wook Baik
Pages: 494 - 504
In medical field visualization of the organs is very imperative for accurate diagnosis and treatment of any disease. Brain tumor diagnosis and surgery also required impressive 3D visualization of the brain to the radiologist. Detection and 3D reconstruction of brain tumors from MRI is a computationally...
Research Article
Q->infinite limit of the quasitriangular WZW model
Ctirad Klimčík
Pages: 494 - 526
We study the 'q-> infinite' limit of the q-deformation of the WZW model on a compact simple and simply connected target Lie group. We show that the commutation rela- tions of the 'q -> infinite' current algebra are underlied by certain affine Poisson structure on the group of holomorphic maps from the...
Research Article
Quasi-Periodic Solutions of the Relativistic Toda Hierarchy
Dong Gong, Xianguo Geng
Pages: 489 - 523
On the basis of the theory of algebraic curves, the continuous flow and discrete flow related to the relativistic Toda hierarchy are straightened out using the Abel–Jacobi coordinates. The meromorphic function and the Baker–Akhiezer function are introduced on the hyperelliptic curve. Quasi-periodic solutions...
Research Article
On Nonlocal Symmetries, Nonlocal Conservation Laws and Nonlocal Transformations of Evolution Equations: Two Linearisable Hierarchies
Norbert Euler, Marianna Euler
Pages: 489 - 504
We discuss nonlocal symmetries and nonlocal conservation laws that follow from the systematic potentialisation of evolution equations. Those are the Lie point symmetries of the auxiliary systems, also known as potential symmetries. We define higher-degree potential symmetries which then lead to nonlocal...
Research Article
A Component-based Intelligent Seamless Service Migration Mechanism and Flexible Communication Protocol in Pervasive Computing Systems
Haibin Cai, Chao Peng, Yue Zhang, Linhua Jiang
Pages: 493 - 505
In pervasive computing systems, service selection and fault tolerance are two primary factors, which determines reliability and efficient of service selection system. In this paper, according on ANN-based (Artificial Neural Network) service selection model, we extend the definition and formal description...
Research Article
Supervised Filter Learning for Coronary Artery Vesselness Enhancement Diffusion in Coronary CT Angiography Images
Hengfei Cui
Pages: 488 - 495
In medical imaging, vesselness diffusion is usually performed to enhance the vessel structures of interest and reduce background noises, before vessel segmentation and analysis. Numerous learning-based techniques have recently become very popular for coronary artery filtering due to their impressive...
Research Article
Wavelet Transforms in Quantum Calculus
Ahmed Fitouhi, Néji Bettaibi
Pages: 492 - 506
This paper aims to study the q-wavelets and the q-wavelet transforms, using only the q-Jackson integrals and the q-cosine Fourier transform, for a fix q ]0, 1[. For this purpose, we shall attempt to extend the classical theory by giving their q-analogues.
Research Article
A Dynamical Mapping Method in Nonrelativistic Models of Quantum Field Theory
A.N. Vall, S.E. Korenblit, V.M. Leviant, A.B. Tanaev
Pages: 492 - 503
Exact solutions of Heisenberg equations and two-particle eigenvalue problems for the nonrelativistic four-fermion interaction and N, model are obtained in the framework of a dynamical mapping method. Equivalence of different dynamical mappings is shown.
Research Article
Transmuted Kumaraswamy Weibull Distribution with Covariates Regression Modelling to Analyze Reliability Data
Muhammad Shuaib Khan, Robert King, Irene Lena Hudson
Pages: 487 - 505
This paper investigates the potential usefulness of the transmuted Kumaraswamy Weibull distribution by using quadratic rank transmutation map technique for modelling reliability data. Some structural properties of the transmuted Kumaraswamy Weibull distribution are discussed. We propose a location-scale...
Research Article
Random Groups in the Optical Waveguides Theory
G.B. Malykin, V.I. Pozdnyakova, I.A. Shereshevskii
Pages: 491 - 517
We propose a new approach to the mathematical description of light propagation in a single-mode fiber light-guide (SMFLG) with random inhomogeneities. We investgate statistics of complex amplitudes of the electric field of light wave by methods of the random group theory. We have analyzed the behavior...
Research Article
New solvable dynamical systems
Francesco Calogero
Pages: 486 - 493
New solvable dynamical systems are identified and the properties of their solutions are tersely discussed.
Research Article
A new family of distributions to analyze lifetime data
M. Mansoor, M.H. Tahir, Gauss M. Cordeiro, Ayman Alzaatreh, M. Zubair
Pages: 490 - 507
In this paper, a new family of distributions is proposed by using quantile functions of known distributions. Some general properties of this family are studied. A special case of the proposed family is studied in detail, namely the Lomax-Weibull distribution. Some structural properties of the special...
Research Article
Neural Incremental Attribute Learning in Groups
Fangzhou Liu, Ting Wang, Sheng-Uei Guan, Ka Lok Man
Pages: 490 - 501
Incremental Attribute Learning (IAL) is a feasible approach for solving high-dimensional pattern recognition problems. It gradually trains features one by one. Previous research indicated that supervised machine learning with input attribute ordering can improve classification results. Moreover, input...
Research Article
An Adaptive Control Method for Resource Provisioning with Resource Utilization Constraints in Cloud Computing
Siqian Gong, Beibei Yin, Zheng Zheng, Kai-yuan Cai
Pages: 485 - 497
Cloud computing enables users to purchase virtual resources on demand; therefore, the service requests change over time. Dynamic resource provisioning for cloud computing has become a key challenge. To reduce the associated costs, resource utilization must be improved, and ensure the Quality of Service...
Research Article
The Quantization of a Fourth-Order Equation without a Second-Order Lagrangian
M. C. Nucci, P. G. L. Leach
Pages: 485 - 490
We present an equation of the fourth-order which does not possess a second-order Lagrangian and demonstrate by means of the method of reduction of order that one can obtain a first-order Lagrangian for it. This opens the way to quantization through the construction of an Hamiltonian which is suitable...
Research Article
The number of independent Traces and Supertraces on the Symplectic Reflection Algebra H1,η(Γ ≀ SN)
S.E. Konstein, I.V. Tyutin
Pages: 485 - 496
Symplectic reflection algebra H1,η(G) has a T(G)-dimensional space of traces whereas, when considered as a superalgebra with a natural parity, it has an S(G)-dimensional space of supertraces. The values of T(G) and S(G) depend on the symplectic reflection group G and do not depend on the parameter η.
In...
Research Article
A Decision Support System Based on a Genetic Algorithm for the Utilization of Leftovers
Hsin-Pin Fu, Cheng-Yuan Ku, Tsung-Sheng Chang
Pages: 483 - 496
There are usually some leftovers (usable pieces of raw material) and scraps (unusable pieces of raw material).generated after the completion of a manufacturing process. These leftovers consist of many different types, materials, styles and sizes so the use of such materials is difficult to manage, resulting...
Research Article
A new access control method based on multi-authority in cloud storage service
Sheng Luo, Qiang Liu
Pages: 483 - 495
With the arrival of the era of big data, data has become a kind of important assets. In order to get a better utilization of big data, paid or unpaid data sharing will be a trend. And as one of key techniques to maintain security of data sharing, access control will play an important role in cloud storage...
Letter to Editor
The Transformation between the AKNS Hierarchy and the KN Hierarchy with Self-Consistent Sources
Qi Li, Wen Zhang, Qiu-Yuan Duan, Deng-Yuan Chen
Pages: 483 - 490
It is shown that the AKNS hierarchy with self-consistent sources can transform to KN hierarchy with self-consistent sources through a transformation operator and gauge transformation. Besides, there exists transformation in their conservation laws and Hamiltonian structures.
Research Article
The Riemann–Hilbert problem to coupled nonlinear Schrödinger equation: Long-time dynamics on the half-line
Boling Guo, Nan Liu
Pages: 483 - 508
We derive the long-time asymptotics for the solution of initial-boundary value problem of coupled nonlinear Schrödinger equation whose Lax pair involves 3 × 3 matrix in present paper. Based on a nonlinear steepest descent analysis of an associated 3 × 3 matrix Riemann–Hilbert problem, we can give the...
Research Article
A Fuzzy Multi-Attribute Decision Making Model for Strategic Risk Assessment
Rabia Arikan, Metin Dağdeviren, Mustafa Kurt
Pages: 487 - 502
Risk assessment is a very important issue for an effective institution, since the lack of accurate risk assessment method or the improper risk management might cause problems to achieve institutions’ strategic objectives. There are a finite number of risks which have to be ranked considering many...
Research Article
A Method for q-Calculus
Thomas Ernst
Pages: 487 - 525
We present a notation for q-calculus, which leads to a new method for computtions and classifications of q-special functions. With this notation many formulas of q-calculus become very natural, and the q-analogues of many orthogonal polynomals and functions assume a very pleasant form reminding directly...
Research Article
Human Body Multiple Parts Parsing for Person Reidentification Based on Xception
Sibo Qiao, Shanchen Pang, Xue Zhai, Min Wang, Shihang Yu, Tong Ding, Xiaochun Cheng
Pages: 482 - 490
A mass of information grows explosively in socially networked industries, as extensive data, such as images and texts, is captured by vast sensors. Pedestrians are the main initiators of various activities in socially networked industries, hence, it is very important to quickly obtain relevant information...
Research Article
An Extended Hierarchical Linguistic Model for Managing Integral Evaluation
Rocio de Andres, Macarena Espinilla, Luis Martinez
Pages: 486 - 500
Performance appraisal is a process used by companies in order to evaluate their employees' efficiency and productivity for planning their Human Resource policies. Traditionally this process has just been carried out by the executive staff but recently it has started to be based on opinions of different...
Research Article
An Ant Colony Optimization Approach for the Machine-Part Cell Formation Problem
Mehdi Hosseinabadi Farahani, Leila Hosseini
Pages: 486 - 496
In this paper, the problem of grouping machines and parts into cells (machine-part cell formation problem) is considered with the objective of minimizing grouping efficacy. An ant colony optimization algorithm is developed to solve such problem. In the proposed algorithm, solutions are constructed in...
Research Article
Modified Maximum Likelihood Estimations of the Epsilon-Skew-Normal Family
Parichehr Jamshidi, Mohsen Maleki, Zahra Khodadadi
Pages: 481 - 486
In this work, maximum likelihood (ML) estimations of the epsilon-skew-normal (ESN) family are obtained using an EM-algorithm to modify the ordinary estimation already used and solve some of its problems within issues. This family can be used for analyzing the asymmetric and near-normal data, so the skewness...
Research Article
q-Oscillator Algebra And d-Orthogonal Polynomials
Fethi Bouzeffour, Ali Zagouhani
Pages: 480 - 494
In this paper we express the matrix coefficients of the Fock representation of a q-oscillator algebra in terms of the d-orthogonal Al-Salam Carlitz polynomials. Also, we derive a generating functions, recurrence relations and q-difference equations for these d-orthogonal polynomials.