International Journal of Computing Science and Applied Mathematics最新文献

筛选
英文 中文
Elementary Analysis of the Communication Complexity of Divide-and-Conquer Diffie-Hellman Key Agreement Protocol 分而治之Diffie-Hellman密钥协议通信复杂度的初步分析
International Journal of Computing Science and Applied Mathematics Pub Date : 2022-09-23 DOI: 10.12962/j24775401.v8i2.13414
Muhammad Arzaki
{"title":"Elementary Analysis of the Communication Complexity of Divide-and-Conquer Diffie-Hellman Key Agreement Protocol","authors":"Muhammad Arzaki","doi":"10.12962/j24775401.v8i2.13414","DOIUrl":"https://doi.org/10.12962/j24775401.v8i2.13414","url":null,"abstract":"","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123480750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Tire Production Planning Using The Goal Programming Method and Sensitivity Analysis 基于目标规划法和灵敏度分析的轮胎生产计划优化
International Journal of Computing Science and Applied Mathematics Pub Date : 2022-09-23 DOI: 10.12962/j24775401.v8i2.7364
Vera Devani, M. I. H. Umam, Yulia Aiza, S. Sarbaini
{"title":"Optimization of Tire Production Planning Using The Goal Programming Method and Sensitivity Analysis","authors":"Vera Devani, M. I. H. Umam, Yulia Aiza, S. Sarbaini","doi":"10.12962/j24775401.v8i2.7364","DOIUrl":"https://doi.org/10.12962/j24775401.v8i2.7364","url":null,"abstract":"","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"435 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126109903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Restricted Size Ramsey Number for Matching versus Tree and Triangle Unicyclic Graphs of Order Six 六阶树与三角形单环图匹配的受限大小Ramsey数
International Journal of Computing Science and Applied Mathematics Pub Date : 2022-02-21 DOI: 10.12962/j24775401.v8i1.10817
Elda Safitri, P. John, D. R. Silaban
{"title":"Restricted Size Ramsey Number for Matching versus Tree and Triangle Unicyclic Graphs of Order Six","authors":"Elda Safitri, P. John, D. R. Silaban","doi":"10.12962/j24775401.v8i1.10817","DOIUrl":"https://doi.org/10.12962/j24775401.v8i1.10817","url":null,"abstract":"—Let F , G , and H be simple graphs. The graph F arrows ( G, H ) if for any red-blue coloring on the edge of F , we find either a red-colored graph G or a blue-colored graph H in F . The Ramsey number r ( G, H ) is the smallest positive integer r such that a complete graph K r arrows ( G, H ) . The restricted size Ramsey number r ∗ ( G, H ) is the smallest positive integer r ∗ such that there is a graph F , of order r ( G, H ) and with the size r ∗ , satisfying F arrows ( G, H ) . In this paper we give the restricted size Ramsey number for a matching of two edges versus tree and triangle unicyclic graphs of order six.","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129219009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Texture-Based Woven Image Classification using Fuzzy C-Means Algorithm 基于纹理的模糊c均值编织图像分类
International Journal of Computing Science and Applied Mathematics Pub Date : 2022-02-21 DOI: 10.12962/j24775401.v8i1.9588
S. Soetrisno, D. Sulistyaningrum, Isi Bifawa’idati
{"title":"Texture-Based Woven Image Classification using Fuzzy C-Means Algorithm","authors":"S. Soetrisno, D. Sulistyaningrum, Isi Bifawa’idati","doi":"10.12962/j24775401.v8i1.9588","DOIUrl":"https://doi.org/10.12962/j24775401.v8i1.9588","url":null,"abstract":"—There are a lot of texture-based image data stored in the storage media Internet. Most of these data portray the cultural fabric texture results from a State. Because of the many variants of the existing texture, the data need to be easily accessible through the Internet. Moreover, the area of origin of weaving the surface is easily known. Therefore, it is necessary to develop a classification system based on woven image data. The texture of the image data stored in a database on the Internet can be grouped/clustered well, making it easy to access. This study examines a texture-based woven image classification using fuzzy c-means algorithm. This method combines extraction meth- ods Gabor filter, fuzzy c-means algorithm and Euclid distance similarity measure. An experiment was done using the system as many as 60 woven images from Bali, NTT and Central Java areas, each taken as many as 25 images weaving. The test results stated that testing using the test images taken from the images in the database generates a 100% accuracy rate, and testing using test images taken from outside the database produces an accuracy rate of 94%.","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114706202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability Analysis of Traveling Waves to Advection-Diffusion Equation Involving Square-root 平方根平流扩散方程行波稳定性分析
International Journal of Computing Science and Applied Mathematics Pub Date : 2022-02-21 DOI: 10.12962/j24775401.v8i1.10922
Mohammad Ghani, Wahyuni Ningsih, N. Izzati
{"title":"Stability Analysis of Traveling Waves to Advection-Diffusion Equation Involving Square-root","authors":"Mohammad Ghani, Wahyuni Ningsih, N. Izzati","doi":"10.12962/j24775401.v8i1.10922","DOIUrl":"https://doi.org/10.12962/j24775401.v8i1.10922","url":null,"abstract":"—In this paper, we study the existence and stability of advection-diffusion equation involving square-root. We first change the original equation into the traveling wave by using ansatz transformation. Then, we apply the appropriate perturbation to establish the energy estimate under small perturbation and large wave amplitude. These results of energy estimates are used to prove the stability of traveling wave solutions.","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116889542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling Portfolio Based on Linear Programming for Bank Business Development Project Plan 基于线性规划的银行业务开发项目计划组合建模
International Journal of Computing Science and Applied Mathematics Pub Date : 2022-02-21 DOI: 10.12962/j24775401.v8i1.6467
Shanti Wulansari, M. Purnomo
{"title":"Modeling Portfolio Based on Linear Programming for Bank Business Development Project Plan","authors":"Shanti Wulansari, M. Purnomo","doi":"10.12962/j24775401.v8i1.6467","DOIUrl":"https://doi.org/10.12962/j24775401.v8i1.6467","url":null,"abstract":"—The bank’s business processes target business plans for the next year. Existing conditions, the business plan is based on the growth asset portfolio every year, so that the purchase of productive assets awaits issuers’ offers. This condition will cause a portfolio not to be measured and the inaccuracy of portfolio selection. Asset Liability Management (ALM) is the management of the structure of assets and liabilities to achieve profit. Banking books and trading books are bank portfolios to earn income. In selecting each portfolio, it contains liquidity risk, market risk and, credit risk. The level of profit is reflected in returns, while returns and risks are a trade-off so that calculations require mathematical and simulation models. Each bank needs an overview of the composition of productive assets, as short-term, medium-term and, long-term assets must be measured risk and target achievement. Linear programming method will allocate productive assets as the bank’s leading source of income, to achieve optimization of profit on the risks received. The problem with this research is that there are 830 variables as banking assets and 19 constraints as indicators of risk. In the seventh iteration of mathematical models, return 1,803 Trillyun from 11 banking book assets.","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127857666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Convolutional Neural Networks for Batik Image Dataset 蜡染图像数据集卷积神经网络的实现
International Journal of Computing Science and Applied Mathematics Pub Date : 2022-02-21 DOI: 10.12962/j24775401.v8i1.5053
Vina Ayumi, Ida Nurhaida, Handrie Noprisson
{"title":"Implementation of Convolutional Neural Networks for Batik Image Dataset","authors":"Vina Ayumi, Ida Nurhaida, Handrie Noprisson","doi":"10.12962/j24775401.v8i1.5053","DOIUrl":"https://doi.org/10.12962/j24775401.v8i1.5053","url":null,"abstract":"","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130087589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling of Water Treatment Plant using Hybrid Petri Nets 基于混合Petri网的水处理厂建模
International Journal of Computing Science and Applied Mathematics Pub Date : 2022-02-21 DOI: 10.12962/j24775401.v8i1.9087
Deny Murdianto
{"title":"Modeling of Water Treatment Plant using Hybrid Petri Nets","authors":"Deny Murdianto","doi":"10.12962/j24775401.v8i1.9087","DOIUrl":"https://doi.org/10.12962/j24775401.v8i1.9087","url":null,"abstract":"—Hybrid Petri nets are modeling framework for a system that contains discrete and continuous states. In this paper, we construct a model of water treatment plant using Hybrid Petri nets. We choose hybrid Petri nets because the water treatment plant contains discrete and continuous parts. The discrete part consists of the state of pumps and the continuous part consists of water volume in each processing unit. The Petri Nets obtained were further simplified to facilitate simulation. Through simulation we can determine the amount of water production with certain specifications.","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132669547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of The Phases of The Spread of Covid-19 in Maluku Province with Richards Curve 用Richards曲线识别新冠病毒在马鲁库省的传播阶段
International Journal of Computing Science and Applied Mathematics Pub Date : 2021-08-17 DOI: 10.12962/j24775401.v7i2.10925
Nanang Ondi, Y. A. Lesnussa, F. Y. Rumlawang
{"title":"Identification of The Phases of The Spread of Covid-19 in Maluku Province with Richards Curve","authors":"Nanang Ondi, Y. A. Lesnussa, F. Y. Rumlawang","doi":"10.12962/j24775401.v7i2.10925","DOIUrl":"https://doi.org/10.12962/j24775401.v7i2.10925","url":null,"abstract":"—Richards Curve is an extension of the Logistics Curve which was first discovered in 1959 and is a type of sigmoid curve where in the sigmoid curve there are 3 growth phases, namely the logarithmic phase, the linear phase and the aging phase. This research aims to identify and determine the phase of the spread of COVID-19 in Maluku province with the Richards curve. From the calculation results obtained that the initial phase of the spread occurred on March 23 - July 5 2020, the peak phase of the spread occurred on July 6 - October 22 2020, the final phase of the peak of the spread occurred on October 23, 2020 April 14, 2021 and began to enter the final phase of the spread on April 15, 2021.","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132053757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis Mathematical Model of Radicalization S(Susceptible) E(Extremists) R(Recruiters) I(Immunity) with Optimal Control 最优控制下激进化S(易感)E(极端分子)R(招募者)I(免疫)的数学模型分析
International Journal of Computing Science and Applied Mathematics Pub Date : 2021-08-17 DOI: 10.12962/j24775401.v7i2.4605
Dauliyatu Achsina, M. Mardlijah
{"title":"Analysis Mathematical Model of Radicalization S(Susceptible) E(Extremists) R(Recruiters) I(Immunity) with Optimal Control","authors":"Dauliyatu Achsina, M. Mardlijah","doi":"10.12962/j24775401.v7i2.4605","DOIUrl":"https://doi.org/10.12962/j24775401.v7i2.4605","url":null,"abstract":"—Radicalization is a process when people come to adopt increasingly extreme political or religious ideologies, radicalization almost occurs in almost all countries in the world. Seeing a number of cases in recent times, radicalization has become a major concern for the world, especially in the field of national security. Radicalization has become one of the focuses in the national security sector because it leads to acts of extremism, violence and terrorism. The level of radicalization is high in each year and continues to increase so special supervision is needed to control it because it causes huge financial losses. Therefore a preventive effort is needed to overcome this. Efforts to prevent radical movements have been widely used, ranging from direct or indirect, in addition some things have also been done directly by the government. So far it has not been seen how effective these efforts are. Radicalization is formed because of the influence of extremists and the recruiters group. Many individuals are affected and enter the group because they are influenced by the people in the group who are within their scope. To overcome these problems, a control is needed as an effort to prevent radicalism. Prevention efforts are in the form of strict sanctions given to recruiters. Next to find out how the influence of controls on individual groups of recruiters is needed a tool to represent the tool is a model. The mathematical model that is suitable for representing the appropriate problems of radicalization is the Susceptible (S) , Extremists (E) Recruiters (R), Immunity (I) model.","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114718208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书