International Journal of Applied Mathematics and Informatics

E-ISSN: 2074-1278
Volume 13, 2019


Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of NAUN Journals is adapted to the 'continuously updated' model. What this means is that instead of being separated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.

Main Page

Submit a paper | Submission terms | Paper format

 


Volume 13, 2019 


Title of the Paper: On the Optimization of an ATM Network: Forecast of Cash Demand and Analysis of Customer Habits

 

Authors: Edvinas Greicius, Saulius Minkevicius

Pages: 59-66

Abstract: An automated teller machine (ATM) is still a very popular mean of cash withdrawals in some countries. In this paper, an overview of its specialities in Lithuania is provided, together with possible problems that may be encountered in the modeling process, including demographic, economic, technical, and political factors. A technical implementation of ATM network simulator is proposed in the paper using MathCad software to forecast cash demand in the ATM network


Title of the Paper: Intelligent Monitoring on the Basis of a UAV for Assessing and Predicting the Condition of Objects with Complex Relief

 

Authors: Ainakulov Zh.Zh., Makarenko N.G., Paltashev T.T.

Pages: 54-58

Abstract: This paper presents the practical experience of using an unmanned aerial vehicle (UAV) for accurate mapping of complex terrain. The use of aerial stereoscopic techniques with subsequent application of digital photogrammetry techniques is described. The obtained information on the area of the probed area, the boundaries of the cadaster is given. And also, intellectual monitoring of the given terrain, estimation, and prediction of the state of objects with a complex relief was carried out. The system of remote sensing based on UAV, its characteristics, such as economic efficiency, operation features, and estimation of the accuracy of flight over the geometry of the flight trajectory, is considered. The results of data processing using digital photogrammetry methods are obtained: the structure of motion algorithms and the geographic information system (GIS) for visualization, where the system makes it possible to obtain images with spatial resolution less than 10 cm, to determine the area of the site, to evaluate individual complex objects such as dumps, excavations or burial mounds, and also to make a topography of the investigated territories. The results of the study obtained by processing 3D models of mounds are presented. The technical characteristics of operated UAV with complexes with artificial intelligence are considered in detail.


Title of the Paper: Data Warehousing and Data Mining for the Management of Scientific Research

 

Authors: Mohamed El Mohadab, Belaid Bouikhaleine, Fahd Ouatik, Said Safi

Pages: 46-53

Abstract: Scientific research [1] represents a very important axis for the university, because it ensures its innovation and its productivity and develops the competencies of their researchers and the reputation and the glow of their research laboratory. But the management and automation of this sector represents a great challenge for universities either for managers, directors, or the researchers from which comes the need of find relevant and effective solution. To manage this sector, we have to study several computer solutions which ensure good management of the information system, in this direction we find that the Data Warehouses and the Data Mining are relatively well mastered when it comes to scientific research data because it is increasingly complex, diverse. The Data Warehouse and the Data Mining is recognized as the core of the decision-making system: it integrates and stores data from the different functional areas of an organization for make it easily accessible to decision-making processes on order to ensure adaptation to the new change that can be brought to the system.


Title of the Paper: Data Hiding Method With Modified Interpolation and Key Based Sudoku

 

Authors: Shailja Shukla, Veerendra Kumar, Vandana Roy, Ragya Kori

Pages: 38-45

Abstract: This work intends to give an overview of image steganography, its uses & techniques. Paper work is an implementation of Image Steganography of same plaintext and the implementation of a system that designs a unique Sudoku for Sudoku based data hiding. Higher security is the main concern of this paper. The system is based on a hybrid algorithm that applies the technique of Sudoku generation and steganography to offer different security features to images transmitted between entities in internet. Based on the proposed algorithm, the authenticity and integrity of the transmitted images can be verified either in the spatial domain or in the encrypted domain or in both domains. The work is implemented on MATLAB design and simulation tool. Paper work uses modified Sudoku based data protection and PSNR is very high in present paper work.


Title of the Paper: Almost Continuity in Soft Minimal Structure

 

Authors: S.S.Thakur, S. K. Jain

Pages: 33-37

Abstract: The present paper, introduces a new class of soft mappings called soft almost M-continuous mappings in soft minimal structures and obtain some of its properties. Index Terms—Soft regular open set ,Soft minimal structure ,Soft m-open set, Soft almost continuous mappings, Soft Mcontinuous mappings.


Title of the Paper: An Intelligent Cartographic Generalization Algorithm Selecting Mode Used in Multi-scale Spatial Data Updating Process

 

Authors: Junkui Xu, Dong Li, Longfei Cui

Pages: 29-32

Abstract: In multi-scale spatial data updating process, cartographic features vary dramatically with the scales evolution. So, it is the critical step to select suitable cartographic generalization algorithm which can perfectly fulfill the scale-transformation task. This problem is also a main obstacle in the way of automatic spatial data updating. Through deeply studying the flows of multi-scale spatial data updating process, an intelligent cartographic generalization algorithm selecting mode is proposed. Firstly cartographic generalization algorithm base, knowledge base and case base is built in this mode. Secondly, based on the step of resolving the cartographic generalization process into segments, a self-adaption cartographic generalization algorithm selecting architecture is constructed. Thirdly, an intelligent cartographic generalization algorithm selecting and using flow is established and put into effect. Overall, this mode provides a new idea to solve the automatic problem of multi-scale spatial data updating.


Title of the Paper: On the Split (s; t)-Padovan and (s; t)-Perrin Quaternions

 

Authors: Orhan Diskaya, Hamza Menken

Pages: 25-28

Abstract: In this paper we consider the generalization of Padovan and Perrin quaternions. We define the split (s; t)-Padovan and (s; t)- Perrin quaternions which generalize Padovan and Perrin quaternions. We derive the Binet-like formulas for the split (s; t)-Padovan and (s; t)-Perrin quaternions. We establish their generating functions. Also, we obtain certain binomial sums regarding the split (s; t)- Padovan and (s; t)-Perrin quaternions


Title of the Paper: Almost Continuity in Soft Minimal Structure

 

Authors: S. S. Thakur, S. K. Jain

Pages: 20-24

Abstract: The present paper, introduces a new class of soft mappings called soft almost M-continuous mappings in soft minimal structures and obtain some of its properties. Index Terms—Soft regular open set ,Soft minimal structure ,Soft m-open set, Soft almost continuous mappings, Soft Mcontinuous mappings.


Title of the Paper: Data Hiding Method with Modified Interpolation and Key based Sudoku

 

Authors: Shailja Shukla, Veerendra Kumar, Vandana Roy, Ragya Kori

Pages: 13-19

Abstract: This work intends to give an overview of image steganography, its uses & techniques. Paper work is an implementation of Image Steganography of same plaintext and the implementation of a system that designs a unique Sudoku for Sudoku based data hiding. Higher security is the main concern of this paper. The system is based on a hybrid algorithm that applies the technique of Sudoku generation and steganography to offer different security features to images transmitted between entities in internet. Based on the proposed algorithm, the authenticity and integrity of the transmitted images can be verified either in the spatial domain or in the encrypted domain or in both domains. The work is implemented on MATLAB design and simulation tool. Paper work uses modified Sudoku based data protection and PSNR is very high in present paper work.


Title of the Paper: Connectedness in Soft Minimal Structure

 

Authors: S. S. Thakur, Alpa Singh Rajput, Shailja Shukla

Pages: 7-12

Abstract: In the present paper we introduces the concept of soft connectedness in soft m-structure and studied some of their properties and characterizations.


Title of the Paper: A Particular Block Vandermonde Matrix

 

Authors: Malika Yaici, Kamel Hariche

Pages: 1-6

Abstract: The Vandermonde matrix is ubiquitous in mathematics and engineering. Both the Vandermonde matrix and its inverse are often encountered in control theory, in the derivation of numerical formulas, and in systems theory. In some cases block vandermonde matrices are used. Block Vandermonde matrices, considered in this paper, are constructed from a full set of solvents of a corresponding matrix polynomial. These solvents represent block poles and block zeros of a linear multivariable dynamical time-invariant system described in matrix fractions. Control techniques of such systems deal with the inverse or determinant of block vandermonde matrices. Methods to compute the inverse of a block vandermonde matrix have not been studied but the inversion of block matrices (or partitioned matrices) is very well studied. In this paper, properties of these matrices and iterative algorithms to compute the determinant and the inverse of a block Vandermonde matrix are given. instructions give you guidelines for preparing papers. A parallelization of these algorithms is also presented. The proposed algorithms are validated by a comparison based on algorithmic complexity.