Editor(s)

Dr. Manuel Alberto M. Ferreira
Professor,
Department of Mathematics, ISTA-School of Technology and Architecture, Lisbon University, Portugal.

ISBN 978-93-91312-39-8 (Print)
ISBN 978-93-91312-42-8 (eBook)
DOI: 10.9734/bpi/ctmcs/v4

This book covers key areas of mathematics and computer science. The contributions by the authors include intuitionistic fuzzy set, selecting specialization, distributed generation, inverter, photovoltaic, microgrid, one-dimensional parabolic partial differential equation, Spectral method, Legendre Pseudo–spectral method, Legendre Differentiation matrices, Kronecker product, computer science, programming, academic performance, examination, technology, institutional quality, Foreign direct investment, authentication code, multiuser authentication, message, verifiable secret sharing, key management, threshold., Scarification, Quantum mechanics, Kadison-Singer problem, state funded enterprises, economic performance, fuzzy sets, fuzzy entropy, Atanassov’s intuitionistic fuzzy entropy, exponential entropy, email and websites phishing, phishing detection techniques, user awareness on email phishing, distributed network, hybrid distributed systems, dynamic provisioning, metric space, contractive conditions, asymptotic formula, beta operators, linear positive operators, simultaneous approximation, unbounded functions, uniform continuity, adaptive collaborative system, dynamic environment, participant, problem solving, information sharing, ontology, knowledge-based systems, collaborative, adaptive and modelling, semantic web. This book contains various materials suitable for students, researchers and academicians in the field of mathematics and computer science.

 

Media Promotion:


Chapters


A Case Study for Engineering Students: Intuitionistic Fuzzy Set and Its Application in Selecting Specialization

A. M. Kozae, Assem Elshenawy, Manar Omran

Current Topics on Mathematics and Computer Science Vol. 4, 10 July 2021, Page 1-7
https://doi.org/10.9734/bpi/ctmcs/v4/10033D

The intuitionistic fuzzy set (IFS) is useful in providing a flexible model to elaborate on the uncertainty and vagueness involved in decision making. The notion of defining intuitionistic fuzzy set as generalized fuzzy set is quite interesting and useful in many application areas. The concept of IFS was examined in this study, and its application in specialised selection was proposed. A case study for engineering students is thoroughly explained. We present a method for calculating membership and non-membership degrees from given data. The method proposed here can be used in a variety of similar real life situations.

Investigation on Electronically Coupled Distributed Generation Modeling and Control Strategies for Microgrid Applications

Bilal M. Eid, Nasrudin Abd. Rahim, Jeyraj Selvaraj, B. W. Williams

Current Topics on Mathematics and Computer Science Vol. 4, 10 July 2021, Page 8-26
https://doi.org/10.9734/bpi/ctmcs/v4/10140D

For electronically coupled distributed generation, a single-stage power converter capable of both maximum power point tracking and unity power factor dispatching is presented. The best control parameters are found by modelling a solar array (the distributed generator) and a three-phase grid-connected inverter. To control parameters, the inverter's controller employs inner and outer control loops. To dispatch at unity power factor, the inner control loop transforms input from the abc frame to the d, q, 0 frame. The new method, which can be applied in microgrid applications at the primary control level, tracks the maximum power point in the outer voltage control loop (local controller). A comparison of the active power provided by single-stage and two-stage power converters is shown, demonstrating that single-stage is more efficient. For the proposed single-stage converter system, a comparison is made between variable and fixed DC reference voltages in terms of active power yields. The effects of various ambient disturbances such as changing weather conditions, solar radiation with severe disturbances, and variable PV cell temperature on active and reactive power yields is investigated in this work. It is suggested that a dynamic reference voltage be used. Matlab/Simulink simulations validate its effectiveness under variable radiation and temperature conditions. Unity power factor operation shows that the single-stage power conversion system performs all tasks properly.

Determination of Legendre–Gauss–Lobatto Pseudo–spectral Method for One–Dimensional Advection–Diffusion Equation

Galal I. El–Baghdady, M. S. El–Azab, W. S. El–Beshbeshy

Current Topics on Mathematics and Computer Science Vol. 4, 10 July 2021, Page 27-40
https://doi.org/10.9734/bpi/ctmcs/v4/10245D

In this chapter, we describe a Legendre pseudo–spectral approach for solving one–dimensional parabolic advection–diffusion equations with constant parameters subject to a given initial and boundary conditions, based on Legendre–Gauss–Lobatto zeros and tensor product formulation. First, we use differentiation matrices and their derivatives with respect to x and t to approximate the unknown function. Second, we solve our issue by converting it to a linear system of equations with unknowns at the collocation locations. Finally, various examples are shown, together with numerical results, to demonstrate the efficacy of the proposed method.

Strategies for Improving Computer Science Students' Academic Performance in Programming Skill

Akinola Kayode Emmanuel, Olanrewaju Grace Oluwadamilare, Oyenuga Augustine Yomi

Current Topics on Mathematics and Computer Science Vol. 4, 10 July 2021, Page 41-48
https://doi.org/10.9734/bpi/ctmcs/v4/2615F

Programming dexterity is a necessary skill for computer science students. Teaching and learning programming concepts and abilities, on the other hand, has been identified as a significant challenge for both teachers and students. As a result, developing effective learning methodologies and environments for programming courses has become a major topic. The goal of the study is to suggest improvement strategies for effectively teaching Computer Programming to undergraduate students in the field of computer science and information technology. Computer programming is widely thought to be one of the most challenging courses in tertiary institutions since it is too abstract and demands better analytical and problem-solving capabilities.  The study employed a survey research design. The study used a descriptive method, actual student grades, and informal interviews among lecturers. According to the recognised evaluation findings, 47% of students in the programming course exhibit inadequate academic performance. This led to the conclusion that there is a need for improvement strategies that need planning and implementation in order to increase students' motivation to study, academic performance,  and education quality in the subject of computer science. Relevant and effective recommendations were proposed.

The present study aims to evaluate the impact of the quality of institutions in the mobilization of foreign direct investment in Burkina Faso. This study examined the impact of institutional quality on the attraction of foreign direct investment in Burkina Faso over the period 1985-2005.

Different analyses on variables allowed use of error correction modelling (VECM).

The results reveal a long- term relationship between foreign direct investment (FDI), corruption, external conflicts and socio-economic conditions.

It is therefore necessary for the country to take appropriate measures to strengthen the fight against corruption in all sectors of economy and strengthen the independence of justice, all of which will help to build investors’ confidence.

Therefore, there is a need to develop appropriate policies such as strengthening judicial governance and improving existing anti-corruption strategies in Burkina Faso. The country must also be involved in the appropriate way of resolution of external conflicts that keep potential investors away, especially in the West African sub region.

In secure group communication, providing authentication for messages exchanged among a group of users is important. We create multiuser authentication techniques that are impenetrable to colluding malevolent users with fewer than k users, where all n users are allowed to transmit messages (simultaneously with being receivers). In our method, each user must keep2k log2 q1 bits of secret information, and tags to authenticate communications must be k log2 q long.. We use this to achieve a non-interactive verifiable secret sharing scheme for many dealers, in which shares reveal no information about the secret and dealers cannot trade inconsistent shares, in the scenario where participants are allowed to use previously released private keys. Without incurring additional storage costs, we also provide authentication to the group key management systems proposed by Blundo et al. and Fiat-Naor.

Study on Sparsification: In Theory and Practice

Srilal Krishnan

Current Topics on Mathematics and Computer Science Vol. 4, 10 July 2021, Page 70-76
https://doi.org/10.9734/bpi/ctmcs/v4/10905D

The Kadison-Singer problem has variants in different branches of the sciences and one of these variants was proved in 2013. Based on the idea of ’sparsification’ and with its origins in quantum physics, we revisit and study the problem in its original formulation and also explore its transition to a result with wide ranging applications. The objective of this study is to see how the notion of ’sparsification’ transcended various fields and how this notion led to resolution of the problem. Besides, in this study, we also take a look at the impact and implications of the resolution in various scientific fields.

Studies on the Economic Performance of Argentinean North Central Railway, a State-Funded Line, from 1889 to 1920

María de las Mercedes Abril, María Beatriz Blanco

Current Topics on Mathematics and Computer Science Vol. 4, 10 July 2021, Page 77-87
https://doi.org/10.9734/bpi/ctmcs/v4/2299F

The state funded railways in Argentina became one of the country's most important enterprises at the turn of the twentieth century, partly because of their political significance as well as their importance in the national economy. The building of a railway is an enterprise that demands large amounts of money, because of its size and complexity.  The behavior of the North Central Railway is the subject of our investigation. To do so, we will use a set of variables that describe its economic performance, such as the annual series of rail kilometres, transported passengers, transported cargo (measured in tonnes), and a measure of invested capital, which we will call return. We'll employ time series analysis methodologies. These methods will allow us to check whether the Argentine government's transportation policy was implemented with a true sense of economic advantage or not.

Generalized Measures of Fuzzy Entropy with Order and Degree for Intuitionistic Fuzzy Set

Bhagwan Dass, Vijay Prakash Tomar, Krishan Kumar

Current Topics on Mathematics and Computer Science Vol. 4, 10 July 2021, Page 88-101
https://doi.org/10.9734/bpi/ctmcs/v4/2600F

The present communication introduces and defines a parametric exponential fuzzy information measure in an axiomatic method of entropy. We generalise Anshu Ohlan's definition of entropy on fuzzy sets to intuitionistic fuzzy sets. To verify that our suggested measure is valid entropy, we have analyzed some properties of this measure.

Using Machine Learning Algorithm to Enhance Phishing Emails Classification

Vidya Mhaske-Dhamdhere, Sandeep Vanjale

Current Topics on Mathematics and Computer Science Vol. 4, 10 July 2021, Page 102-107
https://doi.org/10.9734/bpi/ctmcs/v4/9686D

Phishing emails are becoming a more dangerous problem in online bank truncation processing problem, as well as social networking sites such as Facebook, Twitter, and Instagram. Phishing is typically carried out by imitating an email or embedding content in the email body, which prompts consumers to submit their credentials.  Training on the phishing strategy is not so much effective since users forget their training tricks and warning messages after a while. It is entirely dependent on the user's activity, which will be taken at a specific time in response to software warning messages while operating any URL. On the basis of the Spam base dataset, this paper improves phishing email classification using J48, Nave Bayes, and decision tree. J48 performs the best classification on spam basis, with a true positive rate of 97 percent and a false negative rate of 0.025 percent. Random forest work best on small dataset that is up to 5000 and number of feature are 34. However, when the dataset size is increased and the number of features is reduced, Nave Bayes works faster.

Handling Load intensive Applications Using Aneka Cloud Platform Integrated with Amazon EC2

K. Manjula, S. Meenakshi Sundaram

Current Topics on Mathematics and Computer Science Vol. 4, 10 July 2021, Page 108-114
https://doi.org/10.9734/bpi/ctmcs/v4/9541D

Performance of the distributed network can be evaluated based on the parameters such as response time and throughput. Computing nodes in the local distributed network will have its own limitation in terms of storage, computing capacity and resource availability which will degrade the performance of the network. The local distributed network will serve the minimum number of user requests. With the advent of internet and growing capacity of technology, the number of users accessing the network is increasing tremendously and the requirements of the users is also varying dynamically. Thus in this research paper, thread model based application is run on private cloud with 10 worker machines with varying number of tasks and the same number of tasks has been taken and run on the hybrid cloud enabling dynamic provisioning extending the resources of the private cloud to meet Quality of Service, to handle the dynamic changes in the user load on the distributed network using Amazon EC2 provisioning and resource management configuration.

Emphasizing on Simultaneous Approximation of Unbounded Functions

Sangeeta Garg

Current Topics on Mathematics and Computer Science Vol. 4, 10 July 2021, Page 125-133
https://doi.org/10.9734/bpi/ctmcs/v4/9479D

The word approximation is derived from Latin word “approximatus”. The term can be applied in our surroundings to various properties (e.g. value, quantity, image, description) that are nearly, but not exactly correct or similar, but not exactly the same. Mostly approximation is often applied to numbers but it is also frequently applied to such things as mathematical functions, shapes, and physical laws [1,2]. In science, approximation can refer to use a simpler process or model when the correct model is difficult to use. An approximate model is used to make calculations easier. Approximations might also be used if incomplete information prevents use of exact representations. The type of approximation depends on the available information, the degree of accuracy, sensitivity of the problem to the data and the savings (usually in time and effort).

In this chapter, we present a systematic overview of approximation by the use of linear positive operators, a useful tool used to increase the order of approximation [2]. The properties of operators are not only limited to the functions of bounded variation but unbounded variation also [3]. Many authors studied and used the rate of convergence, Moduli of smoothness etc. to get various results for several operators.

Here we use summation-integral type linear positive operators to approximate an unbounded function. These operators can be named as Dual Beta type operators. We obtain moments and other type of results in simultaneous approximation and Voronovskaya type asymptotic formula for this new sequence of operators. We also find important direct theorem for these operators.

The Development of Adaptive Collaboration in a Dynamic Environment for Information Sharing

A. A. Adigun, A. O. Osofisan, A. B. C. Robert, M. O. Kolawole

Current Topics on Mathematics and Computer Science Vol. 4, 10 July 2021, Page 134-141
https://doi.org/10.9734/bpi/ctmcs/v4/11931D

To track problem-solving methods, collaborative systems are utilised in the learning environment. Collaboration is both a process and an outcome in which shared interest, or key stakeholders address conflict that cannot be addressed by any single individual.  Collaborative systems that had previously been created were primarily focused with the evolutions and contributions in a dynamic environment. When evolution and dynamism are encouraged, however, information sharing among participants is often compromised, a concern that has not been adequately addressed. In this work, Adaptive collaborative systems have been developed that allowed for the reuse of information in a dynamic setting while reducing participant compromise. The amount of time available for adaptive collaboration in a dynamic environment for the sharing of information was increased.

Developing Ontologies for Adaptive Collaboration in a Dynamic Environment

Adepeju A. Adigun, Michael O. Kolawole

Current Topics on Mathematics and Computer Science Vol. 4, 10 July 2021, Page 142-149
https://doi.org/10.9734/bpi/ctmcs/v4/11930D

Constructing or modelling new knowledge-based systems is common while developing new knowledge-based systems. Current knowledge modelling approaches tend to concentrate on the subsystem, considering domain knowledge to be highly dependent on the particular task at hand. However, the importance of task-independent knowledge bases (or "ontologies") for large-scale integration has recently been highlighted in a variety of ways.This article looks at three different approaches to creating ontologies and utilises one of them to create an ontology for adaptive collaboration in a dynamic knowledge-sharing environment. Ontologies are consensual representations of a domain of discourse and the backbone of the future Semantic Web.