Skip Content
You are currently on the new version of our website. Access the old version .

Mathematics, Volume 11, Issue 24

2023 December-2 - 136 articles

Cover Story: This paper is about binary linear self-complementary codes. A natural goal in coding theory is to find a linear code with a given length n and dimension k such that the minimum distance d is maximal. Codes with these properties are called optimal. Another important issue is classifying the optimal codes, i.e., finding exactly one representative of each equivalence class. In some sense, the classification problem is more general than the minimum distance bounds problem. In this work, we summarize the classification results for self-complementary codes with the maximum possible minimum distance and a length of up to 20. For the classification, we developed a new algorithm that is much more efficient compared to existing ones in some cases. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (136)

  • Article
  • Open Access
2,169 Views
20 Pages

18 December 2023

In the field of finance and insurance, addressing the optimal investment and reinsurance issue is a focal point for researchers. This paper contemplates the optimal strategy for insurance companies within a model where wealth dynamics adhere to a jum...

  • Article
  • Open Access
15 Citations
3,630 Views
19 Pages

18 December 2023

Supervised training has traditionally been the cornerstone of hate speech detection models, but it often falls short when faced with unseen scenarios. Zero and few-shot learning offers an interesting alternative to traditional supervised approaches....

  • Article
  • Open Access
2 Citations
1,927 Views
23 Pages

Parallel Prediction Method of Knowledge Proficiency Based on Bloom’s Cognitive Theory

  • Tiancheng Zhang,
  • Hanyu Mao,
  • Hengyu Liu,
  • Yingjie Liu,
  • Minghe Yu,
  • Wenhui Wu,
  • Ge Yu,
  • Baoze Wei and
  • Yajuan Guan

18 December 2023

Knowledge proficiency refers to the extent to which students master knowledge and reflects their cognitive status. To accurately assess knowledge proficiency, various pedagogical theories have emerged. Bloom’s cognitive theory, proposed in 1956...

  • Article
  • Open Access
12 Citations
1,986 Views
16 Pages

18 December 2023

Generally, these days people live longer but often with increased impairment and disabilities; therefore, they can benefit from assistive technologies. In this paper, we focus on the completion of activities of daily living (ADLs) by such patients, u...

  • Article
  • Open Access
2,609 Views
23 Pages

The Inverse Weber Problem on the Plane and the Sphere

  • Franco Rubio-López,
  • Obidio Rubio and
  • Rolando Urtecho Vidaurre

18 December 2023

Weber’s inverse problem in the plane is to modify the positive weights associated with n fixed points in the plane at minimum cost, ensuring that a given point a priori becomes the Euclidean weighted geometric median. In this paper, we investig...

  • Article
  • Open Access
5 Citations
1,598 Views
15 Pages

Non-Stationary Helical Flows for Incompressible Couple Stress Fluid

  • Sergey V. Ershkov,
  • Evgeniy Yu. Prosviryakov,
  • Mikhail A. Artemov and
  • Dmytro D. Leshchenko

18 December 2023

We explored here the case of three-dimensional non-stationary flows of helical type for the incompressible couple stress fluid with given Bernoulli-function in the whole space (the Cauchy problem). In our presentation, the case of non-stationary heli...

  • Article
  • Open Access
1 Citations
1,213 Views
15 Pages

18 December 2023

The main purpose of this paper is to introduce a new family of parametric Kantorovichtype operators on the half-bounded interval. The convergence properties of these new operators are investigated. The Voronovskaja-type weak inverse theorem and the r...

  • Feature Paper
  • Article
  • Open Access
2 Citations
1,472 Views
17 Pages

18 December 2023

Cell migration in a biological medium towards a blood vessel is modeled, as a random process, sucessively inside an annulus (two-dimensional domain) and an annular cylinder (three-dimensional domain). The conditional probability function u for the ce...

  • Article
  • Open Access
1,720 Views
12 Pages

18 December 2023

This paper describes the optimal path planning of a redundant finishing mechanism developed for joint space-based additive-finishing integrated manufacturing (AFM). The research motivation results from an inevitable one-sided layout of a finishing st...

  • Article
  • Open Access
4 Citations
2,498 Views
18 Pages

18 December 2023

Shared bicycles provide a green, environmentally friendly, and healthy mode of transportation that effectively addresses the “final mile” problem in urban travel. However, the uneven distribution of bicycles and the imbalance of user dema...

  • Article
  • Open Access
2 Citations
1,610 Views
18 Pages

18 December 2023

Critical infrastructure is essential for the stability and development of modern society, and a combination of complex network theory and game theory has become a new research direction in the field of infrastructure protection. However, existing stu...

  • Article
  • Open Access
1,305 Views
13 Pages

18 December 2023

Consider a sequence (Xn)n1 of i.i.d. 2×2 stochastic matrices with each Xn distributed as μ. This μ is described as follows. Let (Cn,Dn)T denote the first column of Xn and for a given real r with 0<r<1, let r1Cn and r&minu...

  • Article
  • Open Access
4 Citations
1,706 Views
25 Pages

Verification and Enforcement of (ϵ, ξ)-Differential Privacy over Finite Steps in Discrete Event Systems

  • Tareq Ahmad Al-Sarayrah,
  • Zhiwu Li,
  • Guanghui Zhu,
  • Mohammed A. El-Meligy and
  • Mohamed Sharaf

18 December 2023

In the realm of data protection strategies, differential privacy ensures that unauthorized entities cannot reconstruct original data from system outputs. This study explores discrete event systems, specifically through probabilistic automata. Central...

  • Article
  • Open Access
5 Citations
1,773 Views
19 Pages

18 December 2023

The present paper provides a comparison of different optimization techniques applied to the model-based design of a Buck Zero Voltage Switching (ZVS) Quasi-Resonant DC-DC Converter. The comparison was made both on the basis of the duration of the opt...

  • Article
  • Open Access
1 Citations
1,802 Views
12 Pages

18 December 2023

The security of several fully homomorphic encryption (FHE) schemes depends on the intractability assumption of the approximate common divisor (ACD) problem over integers. Subsequent efforts to solve the ACD problem as well as its variants were also d...

  • Article
  • Open Access
1,602 Views
10 Pages

Diffusion Simulation on Mammograms: A Technique for Analyzing and Monitoring Breast Tumors

  • Jonas Borjas,
  • Kay Tucci,
  • Orlando Alvarez-Llamoza and
  • Carlos Echeverria

18 December 2023

We have developed an imaging biomarker for quantitatively monitoring the response to clinical treatment in cancer patients. Similar to other diffusion-weighted imaging DWI techniques, our method allows for the monitoring of breast cancer progression...

  • Article
  • Open Access
3 Citations
1,918 Views
17 Pages

Revocable-Attribute-Based Encryption with En-DKER from Lattices

  • Qi Wang,
  • Juyan Li,
  • Zhedong Wang and
  • Yanfeng Zhu

17 December 2023

Cloud computing offers abundant computing resources and scalable storage, but data leakage in the cloud storage environment is a common and critical concern due to inadequate protection measures. Revocable-attribute-based encryption (RABE) is introdu...

  • Article
  • Open Access
5 Citations
1,675 Views
9 Pages

On a Linear Differential Game in the Hilbert Space 2

  • Marks Ruziboev,
  • Gafurjan Ibragimov,
  • Khudoyor Mamayusupov,
  • Adkham Khaitmetov and
  • Bruno Antonio Pansera

17 December 2023

Two player pursuit evasion differential game and time optimal zero control problem in <i>ℓ</i><sup>2</sup> are considered. Optimal control for the corresponding zero control problem is found. A strategy for the pursuer t...

  • Article
  • Open Access
2,052 Views
33 Pages

17 December 2023

Self-rated health (SRH) serves as an important indicator for measuring the physical and mental well-being of older adults, holding significance for their health management and disease prevention. In this paper, we introduce a novel classification met...

  • Article
  • Open Access
16 Citations
5,029 Views
41 Pages

17 December 2023

A precise evaluation of the actual situation is a significant aspect of making a correct and informed decision. Due to the bounded accuracy and elements of uncertainty in the data itself, a point estimate may be less adjusted and rough than an estima...

  • Article
  • Open Access
1 Citations
1,801 Views
13 Pages

17 December 2023

Cryptography is the process of transforming data so that only the recipient of the message can read it. It uses an algorithm and a key to convert an input into an encrypted output. In this study, we introduce a novel method for protecting readable me...

  • Article
  • Open Access
14 Citations
3,221 Views
14 Pages

17 December 2023

We provide a condition for a 2-Killing vector field on a compact Riemannian manifold to be Killing and apply the result to doubly warped product manifolds. We establish a connection between the property of a vector field on a doubly warped product ma...

  • Article
  • Open Access
1,261 Views
18 Pages

17 December 2023

Cauchy problems are considered for families of, generally speaking, non-Volterra functional differential equations of the second order. For each family considered, in terms of the parameters of this family, necessary and sufficient conditions for the...

  • Article
  • Open Access
1 Citations
1,657 Views
13 Pages

17 December 2023

A graph with n vertices is called an n-graph. A spanning tree with at most k leaves is referred to as a spanning k-ended tree. Spanning k-ended trees are important in various fields such as network design, graph theory, and communication networks. Th...

  • Article
  • Open Access
2,291 Views
21 Pages

17 December 2023

We present a new penalized method for estimation in sparse logistic regression models with a group structure. Group sparsity implies that we should consider the Group Lasso penalty. In contrast to penalized log-likelihood estimation, our method can b...

  • Article
  • Open Access
5 Citations
2,478 Views
10 Pages

On Some Formulas for the Lauricella Function

  • Ainur Ryskan and
  • Tuhtasin Ergashev

16 December 2023

Lauricella, G. in 1893 defined four multidimensional hypergeometric functions FA, FB, FC and FD. These functions depended on three variables but were later generalized to many variables. Lauricella’s functions are infinite sums of products of v...

  • Article
  • Open Access
12 Citations
3,427 Views
18 Pages

16 December 2023

Learning patterns are crucial for predicting student dropout in educational settings, providing insights into students’ behaviors and motivations. However, existing mainstream dropout prediction models have limitations in effectively mining the...

  • Article
  • Open Access
2 Citations
2,118 Views
19 Pages

Benchmarking Perception to Streaming Inputs in Vision-Centric Autonomous Driving

  • Tianshi Jin,
  • Weiping Ding,
  • Mingliang Yang,
  • Honglin Zhu and
  • Peisong Dai

16 December 2023

In recent years, vision-centric perception has played a crucial role in autonomous driving tasks, encompassing functions such as 3D detection, map construction, and motion forecasting. However, the deployment of vision-centric approaches in practical...

  • Article
  • Open Access
4 Citations
1,282 Views
27 Pages

Weighted Fractional Hermite–Hadamard Integral Inequalities for up and down Ԓ-Convex Fuzzy Mappings over Coordinates

  • Muhammad Bilal Khan,
  • Eze R. Nwaeze,
  • Cheng-Chi Lee,
  • Hatim Ghazi Zaini,
  • Der-Chyuan Lou and
  • Khalil Hadi Hakami

16 December 2023

Due to its significant influence on numerous areas of mathematics and practical sciences, the theory of integral inequality has attracted a lot of interest. Convexity has undergone several improvements, generalizations, and extensions over time in an...

  • Article
  • Open Access
7 Citations
1,135 Views
22 Pages

16 December 2023

In this research, we combine ideas from geometric function theory and fuzzy set theory. We define a new operator DτλLα,ζm:AA of analytic functions in the open unit disc Δ with the help of the Riemann–Lio...

  • Article
  • Open Access
4 Citations
1,133 Views
11 Pages

16 December 2023

Postselective transformations of quantum states is a broader class of operations than deterministic quantum channels. Here, we describe the possibility of increasing the success probability of postselective operations by using additional information,...

  • Article
  • Open Access
18 Citations
7,146 Views
17 Pages

16 December 2023

Estimating the remaining useful life (RUL) of aircraft engines holds a pivotal role in enhancing safety, optimizing operations, and promoting sustainability, thus being a crucial component of modern aviation management. Precise RUL predictions offer...

  • Article
  • Open Access
1 Citations
1,481 Views
15 Pages

Emergent Spatial–Temporal Patterns in a Ring of Locally Coupled Population Oscillators

  • Alexey V. Rusakov,
  • Dmitry A. Tikhonov,
  • Nailya I. Nurieva and
  • Alexander B. Medvinsky

15 December 2023

A closed chain of oscillators can be considered a model for ring-shaped ecosystems, such as atolls or the coastal zones of inland reservoirs. We use the logistic map, which is often referred to as an archetypical example of how complex dynamics can a...

  • Article
  • Open Access
1 Citations
1,950 Views
23 Pages

The Evolutionary Dynamics of a Sex-Structured Population with Non-Overlapping Generations

  • Oksana Revutskaya,
  • Galina Neverova,
  • Oksana Zhdanova and
  • Efim Frisman

15 December 2023

This paper proposes and studies a discrete-time model for a sex-structured population with non-overlapping generations under density-dependent regulation of survival. The population is assumed to have genetic variety among individuals in terms of rep...

  • Article
  • Open Access
2 Citations
1,451 Views
11 Pages

15 December 2023

In this study, we consider an intensity-based model for pricing a commodity-linked bond with credit risk. Recently, the pricing of a commodity-linked bond with credit risk under the structural model has been studied. We extend the result using an int...

  • Article
  • Open Access
2 Citations
2,251 Views
18 Pages

15 December 2023

Federated learning is a promising technique in cloud computing and edge computing environments, and designing a reasonable resource allocation scheme for federated learning is particularly important. In this paper, we propose an auction mechanism for...

  • Article
  • Open Access
5 Citations
3,228 Views
20 Pages

15 December 2023

Various methods are used when building bankruptcy prediction models. New sophisticated methods that are already used in other scientific fields can also be applied in this area. Graph theory provides a powerful framework for analyzing and visualizing...

  • Article
  • Open Access
1,673 Views
13 Pages

15 December 2023

We study a system of M particles with jump dynamics on a network of N sites. The particles can exist in two states, active or inactive. Only the former can jump. The state of each particle depends on its position. A given particle is inactive when it...

  • Article
  • Open Access
3 Citations
1,654 Views
14 Pages

15 December 2023

We propose a generalized multiscale finite element method combined with a balanced truncation to solve a parameter-dependent parabolic problem. As an updated version of the standard multiscale method, the generalized multiscale method contains the ne...

  • Article
  • Open Access
1 Citations
1,252 Views
11 Pages

15 December 2023

The paper proposes a new method for solving the parameter identification problem for a class of discrete-time linear stochastic systems with multiplicative and additive noises using a numerical gradient-based optimization. The constructed method is b...

  • Article
  • Open Access
1 Citations
1,363 Views
15 Pages

15 December 2023

In this paper, we present a novel class of analytic functions in the form h(z)=zp+k=p+1akzk in the unit disk. These functions establish a connection between the extended Mittag–Leffler function and the quantum operator presented in...

  • Article
  • Open Access
3 Citations
1,830 Views
18 Pages

14 December 2023

In this paper, we first propose the concept of a family of quasi-G-metric spaces corresponding to the tripled fuzzy metric spaces (or G-fuzzy metric spaces). Using their properties, we give the characterization of tripled fuzzy metrics. Second, we in...

  • Article
  • Open Access
5 Citations
2,204 Views
13 Pages

Adaptive Variable-Damping Impedance Control for Unknown Interaction Environment

  • Dawei Gong,
  • Yaru Song,
  • Minglei Zhu,
  • Yunlong Teng,
  • Jinmao Jiang and
  • Shiliang Zhang

14 December 2023

Aiming at the force-tracking error phenomenon of impedance control in an unknown surface environment, an adaptive variable-damping impedance control algorithm is proposed, and the stability and convergence of the algorithm are deduced. An adaptive-la...

  • Article
  • Open Access
11 Citations
3,591 Views
20 Pages

14 December 2023

In the realm of the five-category classification endeavor, there has been limited exploration of applied techniques for classifying Arabic text. These methods have primarily leaned on single-task learning, incorporating manually crafted features that...

  • Article
  • Open Access
10 Citations
6,992 Views
23 Pages

14 December 2023

Two problems concerning detecting change-points in linear regression models are considered. One involves discontinuous jumps in a regression model and the other involves regression lines connected at unknown places. Significant literature has been de...

  • Article
  • Open Access
12 Citations
1,787 Views
18 Pages

14 December 2023

In this essay, we introduce a bioeconomic predator–prey model which incorporates the square root functional response and nonlinear prey harvesting. Due to the introduction of nonlinear prey harvesting, the model demonstrates intricate dynamic b...

  • Article
  • Open Access
9 Citations
2,177 Views
29 Pages

14 December 2023

Random forest (RF) is a widely used data prediction and variable selection technique. However, the variable selection aspect of RF can become unreliable when there are more irrelevant variables than relevant ones. In response, we introduced the Bayes...

  • Article
  • Open Access
4 Citations
3,121 Views
16 Pages

14 December 2023

A prescriptive simulation model of a process operator’s decision making assisted with an artificial intelligence (AI) algorithm in a technical system control loop is proposed. Situations fraught with a catastrophic threat that may cause unaccep...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Mathematics - ISSN 2227-7390