Skip Content
You are currently on the new version of our website. Access the old version .

Symmetry, Volume 12, Issue 5

2020 May - 188 articles

Cover Story: An asymmetric feature of the cerebellar lobular morphology was characterized in ferrets using ex vivo MR images. Asymmetric hallmarks visible on the cerebellar surface were relevant to the left-biased laterality volume of particular cerebellar regions, including lobule VI and ansiform lobules.View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (188)

  • Article
  • Open Access
10 Citations
4,647 Views
22 Pages

25 May 2020

High dimensionality continues to be a challenge in computational systems biology. The kinetic models of many phenomena of interest are high-dimensional and complex, resulting in large computational effort in the simulation. Model order reduction (MOR...

  • Article
  • Open Access
8 Citations
5,110 Views
17 Pages

Hierarchical Cubical Tensor Decomposition through Low Complexity Orthogonal Transforms

  • Roumen K. Kountchev,
  • Rumen P. Mironov and
  • Roumiana A. Kountcheva

25 May 2020

In this work, new approaches are proposed for the 3D decomposition of a cubical tensor of size N × N × N for N = 2n through hierarchical deterministic orthogonal transforms with low computational complexity, whose kernels are based on the...

  • Article
  • Open Access
18 Citations
3,747 Views
11 Pages

A Nonlinear Five-Term System: Symmetry, Chaos, and Prediction

  • Vo Phu Thoai,
  • Maryam Shahriari Kahkeshi,
  • Van Van Huynh,
  • Adel Ouannas and
  • Viet-Thanh Pham

25 May 2020

Chaotic systems have attracted considerable attention and been applied in various applications. Investigating simple systems and counterexamples with chaotic behaviors is still an important topic. The purpose of this work was to study a simple symmet...

  • Article
  • Open Access
7 Citations
5,267 Views
22 Pages

A Machine-Learning-Based Approach to Predict the Health Impacts of Commuting in Large Cities: Case Study of London

  • Madhav Raj Theeng Tamang,
  • Mhd Saeed Sharif,
  • Ali H. Al-Bayatti,
  • Ahmed S. Alfakeeh and
  • Alhuseen Omar Alsayed

25 May 2020

The daily commute represents a source of chronic stress that is positively correlated with physiological consequences, including increased blood pressure, heart rate, fatigue, and other negative mental and physical health effects. The purpose of this...

  • Article
  • Open Access
6 Citations
4,282 Views
11 Pages

25 May 2020

Various defects are formed on the workpiece surface during the production process. Workpiece surface defects are classified according to various characteristics, which includes a bumped surface, scratched surface and pit surface. Suppliers analyze th...

  • Article
  • Open Access
10 Citations
3,615 Views
18 Pages

25 May 2020

In this study, a new way of criteria selection and a weighting system will be presented in a multi-disciplinary framework. Weighting criteria in Multi-Attribute Decision Making (MADM) has been developing as the most attractive section in the field. A...

  • Article
  • Open Access
13 Citations
6,587 Views
15 Pages

A Gamma-Type Distribution with Applications

  • Yuri A. Iriarte,
  • Héctor Varela,
  • Héctor J. Gómez and
  • Héctor W. Gómez

25 May 2020

This article introduces a new probability distribution capable of modeling positive data that present different levels of asymmetry and high levels of kurtosis. A slashed quasi-gamma random variable is defined as the quotient of independent random va...

  • Article
  • Open Access
5 Citations
3,213 Views
25 Pages

24 May 2020

As a type of distributed computing, volunteer computing (VC) has provided unlimited computing capacity at a low cost in recent decades. The architecture of most volunteer computing platforms (VCPs) is a master–worker model, which defines a mast...

  • Article
  • Open Access
42 Citations
4,408 Views
16 Pages

23 May 2020

Smartphones and mobile tablets play significant roles in daily life and have led to an increase in the number of users of this technology. The rising number of mobile device end-users has resulted in the generation of malware by hackers. Thus, mobile...

  • Article
  • Open Access
6 Citations
4,006 Views
10 Pages

Perfectly Secure Shannon Cipher Construction Based on the Matrix Power Function

  • Eligijus Sakalauskas,
  • Lina Dindienė,
  • Aušrys Kilčiauskas and
  • Kȩstutis Lukšys

23 May 2020

A Shannon cipher can be used as a building block for the block cipher construction if it is considered as one data block cipher. It has been proved that a Shannon cipher based on a matrix power function (MPF) is perfectly secure. This property was ob...

  • Article
  • Open Access
1 Citations
3,643 Views
9 Pages

23 May 2020

One can question the relationship between the symmetries of the exterior and interior of black holes with an isotropic and static exterior. This question is justified by the variety of recent findings indicating substantial or even dramatic differenc...

  • Article
  • Open Access
27 Citations
4,864 Views
15 Pages

Forecasting of Coalbed Methane Daily Production Based on T-LSTM Neural Networks

  • Xijie Xu,
  • Xiaoping Rui,
  • Yonglei Fan,
  • Tian Yu and
  • Yiwen Ju

23 May 2020

Accurately forecasting the daily production of coalbed methane (CBM) is important forformulating associated drainage parameters and evaluating the economic benefit of CBM mining. Daily production of CBM depends on many factors, making it difficult to...

  • Article
  • Open Access
10 Citations
9,037 Views
20 Pages

Application of Six Sigma Model on Efficient Use of Vehicle Fleet

  • Tatjana Stanivuk,
  • Tamara Gvozdenović,
  • Jelena Žanić Mikuličić and
  • Vesko Lukovac

22 May 2020

Each business faces large competition in the market, and it is necessary to adopt the most effective methodology as possible in order to obtain the best solution. Six Sigma (6σ) is a set of techniques and tools for process improvement. The tool...

  • Article
  • Open Access
10 Citations
4,300 Views
11 Pages

22 May 2020

Venlafaxine (VFX) is a modern antidepressant from the serotonin and norepinephrine reuptake inhibitor (SNRI) class. It is a chiral substance used in therapy as a racemate, but differences between the pharmacological properties of the two enantiomers...

  • Article
  • Open Access
8 Citations
2,782 Views
14 Pages

22 May 2020

The Marshall-Olkin extended family of distributions is an alternative for modeling lifetimes, and considers more or less asymmetry than its parent model, achieved by incorporating just one extra parameter. We investigate the bias of maximum likelihoo...

  • Article
  • Open Access
14 Citations
6,408 Views
29 Pages

Lifelong Machine Learning Architecture for Classification

  • Xianbin Hong,
  • Sheng-Uei Guan,
  • Ka Lok Man and
  • Prudence W. H. Wong

22 May 2020

Benefiting from the rapid development of big data and high-performance computing, more data is available and more tasks could be solved by machine learning now. Even so, it is still difficult to maximum the power of big data due to each dataset is is...

  • Article
  • Open Access
21 Citations
3,158 Views
20 Pages

22 May 2020

This paper proposes neutrosophic vague N-soft sets which is composed of neutrosophic vague sets and N-soft sets for the first time. The new hybrid model includes a pair of asymmetric functions: truth-membership and false-membership, and an indetermin...

  • Feature Paper
  • Article
  • Open Access
3 Citations
4,441 Views
12 Pages

22 May 2020

Sports activities engagement is a sustainable lifestyle that can signal that individuals have the potential to become successful. The lifetime wellbeing that comes from participating in sports activities results in a general and global policy agenda...

  • Article
  • Open Access
22 Citations
3,064 Views
10 Pages

Variational Principles for Two Kinds of Coupled Nonlinear Equations in Shallow Water

  • Xiao-Qun Cao,
  • Ya-Nan Guo,
  • Shi-Cheng Hou,
  • Cheng-Zhuo Zhang and
  • Ke-Cheng Peng

22 May 2020

It is a very important but difficult task to seek explicit variational formulations for nonlinear and complex models because variational principles are theoretical bases for many methods to solve or analyze the nonlinear problem. By designing skillfu...

  • Feature Paper
  • Article
  • Open Access
4 Citations
3,527 Views
23 Pages

22 May 2020

As a common method applied in the construction of tunnels with Grade IV and Grade V surrounding rock, the center diaphragm (CD) method has the advantage of resisting the inward horizontal convergence of the tunnel. However, due to the small lateral e...

  • Article
  • Open Access
5 Citations
2,721 Views
13 Pages

Fixed Point Problems on Generalized Metric Spaces in Perov’s Sense

  • Liliana Guran,
  • Monica-Felicia Bota and
  • Asim Naseem

22 May 2020

The aim of this paper is to give some fixed point results in generalized metric spaces in Perov’s sense. The generalized metric considered here is the w-distance with a symmetry condition. The operators satisfy a contractive weakly condition of...

  • Article
  • Open Access
8 Citations
2,825 Views
18 Pages

21 May 2020

Our work is based on the multiple inequalities illustrated in 1967 by E. K. Godunova and V. I. Levin, in 1990 by Hwang and Yang and in 1993 by B. G. Pachpatte. With the help of the dynamic Jensen and Hölder inequality, we generalize a number of...

  • Feature Paper
  • Article
  • Open Access
5 Citations
4,520 Views
23 Pages

A Two-Tier Partition Algorithm for the Optimization of the Large-Scale Simulation of Information Diffusion in Social Networks

  • Bin Chen,
  • Hailiang Chen,
  • Dandan Ning,
  • Mengna Zhu,
  • Chuan Ai,
  • Xiaogang Qiu and
  • Weihui Dai

21 May 2020

As online social networks play a more and more important role in public opinion, the large-scale simulation of social networks has been focused on by many scientists from sociology, communication, informatics, and so on. It is a good way to study rea...

  • Article
  • Open Access
3 Citations
2,651 Views
13 Pages

21 May 2020

The conditional Lie–Bäcklund symmetry method is applied to investigate the functionally generalized separation of variables for quasi-linear diffusion equations with a source. The equations and the admitted conditional Lie–Bäckl...

  • Article
  • Open Access
27 Citations
2,915 Views
13 Pages

21 May 2020

Because Herglotz’s variational problem achieves the variational representation of non-conservative dynamic processes, its research has attracted wide attention. The aim of this paper is to explore Herglotz’s variational problem for a non-...

  • Article
  • Open Access
3 Citations
3,646 Views
13 Pages

21 May 2020

Although the turbulent intensity is suppressed in the drag-reducing channel flow by viscoelastic additives, the mean velocity distribution in the channel flow is symmetrical and tends to be similar to the laminar flow. In the study of near-wall modul...

  • Article
  • Open Access
8 Citations
4,479 Views
32 Pages

21 May 2020

The development of the regional economy cannot be separated from the support of regional logistics, as the scientific decisions of regional logistics are helpful to promote the healthy development of the regional economy. The comprehensive evaluation...

  • Article
  • Open Access
129 Citations
3,815 Views
15 Pages

21 May 2020

This work is devoted to the investigation of a two-dimensional porous material under weak, strong and normal conductivity, using the eigenvalues method. By using Laplace–Fourier transformations with the eigenvalues technique, the variables are...

  • Article
  • Open Access
47 Citations
5,268 Views
15 Pages

20 May 2020

Wireless Sensor Networks (WSNs) may be incorporated with thousands of small nodes. This gives them the capability to effectively sense, communicate, and compute parameters. However, the security and life span of a WSN node is a primary concern. This...

  • Article
  • Open Access
28 Citations
4,470 Views
24 Pages

20 May 2020

The increasing availability of medical images generated via different imaging techniques necessitates the need for their remote analysis and diagnosis, especially when such datasets involve brain morphological biomarkers, an important biological symm...

  • Article
  • Open Access
7 Citations
4,507 Views
13 Pages

A New LSB Attack on Special-Structured RSA Primes

  • Amir Hamzah Abd Ghafar,
  • Muhammad Rezal Kamel Ariffin and
  • Muhammad Asyraf Asbullah

20 May 2020

Asymmetric key cryptosystem is a vital element in securing our communication in cyberspace. It encrypts our transmitting data and authenticates the originality and integrity of the data. The Rivest–Shamir–Adleman (RSA) cryptosystem is hig...

  • Article
  • Open Access
2,686 Views
17 Pages

Space-Time Inversion of Stochastic Dynamics

  • Massimiliano Giona,
  • Antonio Brasiello and
  • Alessandra Adrover

20 May 2020

This article introduces the concept of space-time inversion of stochastic Langevin equations as a way of transforming the parametrization of the dynamics from time to a monotonically varying spatial coordinate. A typical physical problem in which thi...

  • Article
  • Open Access
9 Citations
4,194 Views
8 Pages

20 May 2020

Owing to the limitations of practical realizations, block-based motion is widely used as an alternative for pixel-based motion in video applications such as global motion estimation and frame rate up-conversion. We hereby present BlockNet, a compact...

  • Article
  • Open Access
4 Citations
4,159 Views
12 Pages

20 May 2020

Surface Plasma resonance (SPR) sensors combined with biological receptors are widely used in biosensors. Due to limitations of measurement techniques, small-scale, low accuracy, and sensitivity to the refractive index of solution in traditional SPR p...

  • Article
  • Open Access
21 Citations
4,690 Views
12 Pages

Malware Classification Using Simhash Encoding and PCA (MCSP)

  • Young-Man Kwon,
  • Jae-Ju An,
  • Myung-Jae Lim,
  • Seongsoo Cho and
  • Won-Mo Gal

19 May 2020

Malware is any malicious program that can attack the security of other computer systems for various purposes. The threat of malware has significantly increased in recent years. To protect our computer systems, we need to analyze an executable file to...

  • Article
  • Open Access
58 Citations
6,010 Views
16 Pages

19 May 2020

The association of M-polynomial to chemical compounds and chemical networks is a relatively new idea, and it gives good results about the topological indices. These results are then used to correlate the chemical compounds and chemical networks with...

  • Article
  • Open Access
26 Citations
3,257 Views
15 Pages

19 May 2020

We present the notion of orthogonal F -metric spaces and prove some fixed and periodic point theorems for orthogonal Ω -contraction. We give a nontrivial example to prove the validity of our result. Finally, as application, w...

  • Feature Paper
  • Article
  • Open Access
29 Citations
3,323 Views
16 Pages

Determination of Forces and Moments Per Unit Length in Symmetric Exponential FG Plates with a Quasi-Triangular Hole

  • Mohammad Jafari,
  • Mohammad Hossein Bayati Chaleshtari ,
  • Hamid Abdolalian,
  • Eduard-Marius Craciun and
  • Luciano Feo

19 May 2020

In this study, the resultant forces and moments acting on infinite symmetric FGPs with a triangular hole subject to uniaxial tensile load were examined via an analytical method using the complex variable approach. The mechanical properties of graded...

  • Article
  • Open Access
13 Citations
10,394 Views
21 Pages

19 May 2020

Data mining is becoming increasingly used in sports. Sport data analyses help fans to understand games and teams’ results. Information provided by such analyses is useful for game lovers. Specifically, the information can help fans to predict w...

  • Article
  • Open Access
2,415 Views
15 Pages

18 May 2020

This paper investigates the optimal personal bankruptcy decision of a debtor who participates in the labor market. This paper is based on a mathematical finance model that assumes a Black-Scholes financial market and describes a decision problem as a...

  • Feature Paper
  • Article
  • Open Access
13 Citations
5,803 Views
30 Pages

A Parametric Study of Trailing Edge Flap Implementation on Three Different Airfoils Through an Artificial Neuronal Network

  • Igor Rodriguez-Eguia,
  • Iñigo Errasti,
  • Unai Fernandez-Gamiz,
  • Jesús María Blanco,
  • Ekaitz Zulueta and
  • Aitor Saenz-Aguirre

18 May 2020

Trailing edge flaps (TEFs) are high-lift devices that generate changes in the lift and drag coefficients of an airfoil. A large number of 2D simulations are performed in this study, in order to measure these changes in aerodynamic coefficients and to...

  • Article
  • Open Access
39 Citations
5,590 Views
11 Pages

A Two-Parameter Modified Logistic Map and Its Application to Random Bit Generation

  • Lazaros Moysis,
  • Aleksandra Tutueva,
  • Christos Volos,
  • Denis Butusov,
  • Jesus M. Munoz-Pacheco and
  • Hector Nistazakis

18 May 2020

This work proposes a modified logistic map based on the system previously proposed by Han in 2019. The constructed map exhibits interesting chaos related phenomena like antimonotonicity, crisis, and coexisting attractors. In addition, the Lyapunov ex...

  • Article
  • Open Access
17 Citations
2,871 Views
15 Pages

Image Watermarking in Curvelet Domain Using Edge Surface Blocks

  • Mamta Mittal,
  • Ranjeeta Kaushik,
  • Amit Verma,
  • Iqbaldeep Kaur,
  • Lalit Mohan Goyal,
  • Sudipta Roy and
  • Tai-hoon Kim

17 May 2020

Digital image watermarking aims to protect the information in an image without significantly affecting visual quality. In this paper, a new image watermarking technique has been proposed that uses Gaussian filters and first-order partial differential...

  • Feature Paper
  • Article
  • Open Access
10 Citations
2,834 Views
16 Pages

17 May 2020

In this work, an anisotropic constitutive model of hexagonal columnar jointed rock masses is established to describe the distribution law of deformation and the failure of columnar joint caverns under anisotropic conditions, and is implemented to stu...

  • Article
  • Open Access
28 Citations
5,281 Views
20 Pages

17 May 2020

Weapon-target assignment (WTA) is a kind of NP-complete problem in military operations research. To solve the multilayer defense WTA problems when the information about enemy’s attacking plan is symmetric to the defender, we propose four heuris...

  • Article
  • Open Access
9 Citations
3,469 Views
19 Pages

17 May 2020

Distributed systematic grid-connected inverter practice needs to improve insulated gate bipolar transistor (IGBT) stability to ensure the safe operation. This study is to ensure the safety and reliability operation of the IGBT module in symmetry to m...

  • Article
  • Open Access
59 Citations
15,782 Views
16 Pages

17 May 2020

Substitution boxes (S-box) with strong and secure cryptographic properties are widely used for providing the key property of nonlinearity in block ciphers. This is critical to be resistant to a standard attack including linear and differential crypta...

  • Article
  • Open Access
8 Citations
2,288 Views
11 Pages

Neutrosophic Components Semigroups and Multiset Neutrosophic Components Semigroups

  • Vasantha W. B.,
  • Ilanthenral Kandasamy and
  • Florentin Smarandache

16 May 2020

Neutrosophic components (NC) under addition and product form different algebraic structures over different intervals. In this paper authors for the first time define the usual product and sum operations on NC. Here four different NC are defined using...

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Symmetry - ISSN 2073-8994