Skip Content
You are currently on the new version of our website. Access the old version .

Mathematics, Volume 13, Issue 11

2025 June-1 - 206 articles

Cover Story: In this paper, we present two symbolic methods, in particular, the method starting from the source identity, umbra identity, for constructing identities of s-Appell polynomials related to Stirling numbers and binomial coefficients. We discuss some properties of s-Appell polynomial sequences related to Riordan arrays, Sheffer matrices, and their q analogs. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (206)

  • Article
  • Open Access
1,929 Views
22 Pages

Research on a PTSD Risk Assessment Model Using Multi-Modal Data Fusion

  • Youxi Luo,
  • Yucui Shang,
  • Dongfeng Zhu,
  • Tian Zhang and
  • Chaozhu Hu

5 June 2025

Post-traumatic stress disorder (PTSD) is a complex psychological disorder caused by multiple factors, which are not only related to individual psychological states but also closely linked to physiological responses, social environments, and personal...

  • Article
  • Open Access
1 Citations
1,249 Views
15 Pages

On the Product of Zeta-Functions

  • Nianliang Wang,
  • Kalyan Chakraborty and
  • Takako Kuzumaki

5 June 2025

In this paper, we study the Bochner modular relation (Lambert series) for the kth power of the product of two Riemann zeta-functions with difference α, an integer with the Voronoĭ function weight Vk. In the case of V1(x)=ex, the res...

  • Article
  • Open Access
794 Views
16 Pages

5 June 2025

In this paper, we propose a numerical method for the fractional Bagley–Torvik equation of variable coefficients with Robin boundary conditions. The problem is approximated using a finite difference scheme on a uniform mesh that combines the L1...

  • Feature Paper
  • Article
  • Open Access
852 Views
23 Pages

5 June 2025

This paper comprehensively examines symmetric difference operators within logical systems generated by nilpotent t-norms and t-conorms, specifically addressing their behavior and applicability in bounded and Łukasiewicz fuzzy logic systems. We i...

  • Feature Paper
  • Article
  • Open Access
661 Views
35 Pages

Correctness of Fuzzy Inference Systems Based on f-Inclusion

  • Carolina Díaz-Montarroso,
  • Nicolás Madrid and
  • Eloísa Ramírez-Poussa

5 June 2025

Recent work has shown that the f-index of inclusion can serve as a foundation for modeling Generalized Modus Ponens. In this paper, we develop a novel fuzzy inference system based on this inference rule. To establish its soundness, we connect it to a...

  • Article
  • Open Access
1,003 Views
23 Pages

5 June 2025

The cross-border port serves as a crucial cross-border travel connecting mainland China with Hong Kong and Macau, directly impacting the overall satisfaction of cross-border travel. While previous studies on neighborhoods, communities, and other area...

  • Article
  • Open Access
1 Citations
741 Views
30 Pages

5 June 2025

With the growing severity of global climate change, forecasting and managing carbon dioxide (CO2) emissions has become one of the critical tasks in addressing climate change. To improve the accuracy of CO2 emission forecasting, an innovative framewor...

  • Article
  • Open Access
4 Citations
2,580 Views
23 Pages

Modeling Time Series with SARIMAX and Skew-Normal and Zero-Inflated Skew-Normal Errors

  • M. Alejandro Dinamarca,
  • Fernando Rojas,
  • Claudia Ibacache-Quiroga and
  • Karoll González-Pizarro

5 June 2025

This study proposes an extension of Seasonal Autoregressive Integrated Moving Average models with exogenous regressors (SARIMAX) by incorporating skew-normal and zero-inflated skew-normal error structures to better accommodate asymmetry and excess ze...

  • Article
  • Open Access
5 Citations
6,147 Views
26 Pages

5 June 2025

Existing stock volatility forecasting models predominantly rely on same-frequency market data while neglecting mixed-frequency integration and face particular challenges in incorporating low-frequency macroeconomic variables that exhibit temporal mis...

  • Article
  • Open Access
1 Citations
999 Views
18 Pages

5 June 2025

For image data, the processing of each pixel using a cryptographic hash function is linear, and the existing cryptographic hash function lacks parallel processing of image width and height. In order to improve the computational efficiency and ensure...

  • Article
  • Open Access
1 Citations
1,496 Views
21 Pages

4 June 2025

To address modality heterogeneity and accelerate large-scale retrieval, cross-modal hashing strategies generate compact binary codes that enhance computational efficiency. Existing approaches often struggle with suboptimal feature learning due to fix...

  • Article
  • Open Access
1 Citations
3,764 Views
16 Pages

4 June 2025

Incremental learning empowers models to continuously acquire knowledge of new classes while retaining previously learned information. However, catastrophic forgetting and class imbalance often impede this process, especially when new classes are intr...

  • Article
  • Open Access
1 Citations
737 Views
13 Pages

4 June 2025

Many studies aim to suppress vibrations in vibrating dynamic systems, such as bridges, highways, and aircraft. In this study, we scrutinize the primary resonance of a cantilever beam excited by an external force via a proportional fractional-order de...

  • Article
  • Open Access
2 Citations
959 Views
19 Pages

4 June 2025

In reversible data hiding, prediction error generation plays a crucial role, with pixel value ordering (PVO) standing out as a prediction method that achieves high fidelity. However, conventional PVO approaches select predicted pixels and their predi...

  • Article
  • Open Access
2 Citations
2,330 Views
31 Pages

Dynamic Portfolio Return Classification Using Price-Aware Logistic Regression

  • Yakubu Suleiman Baguda,
  • Hani Moaiteq AlJahdali and
  • Altyeb Altaher Taha

4 June 2025

The dynamic and uncertain nature of financial markets presents significant challenges in accurately predicting portfolio returns due to inherent volatility and instability. This study investigates the potential of logistic regression to enhance the a...

  • Article
  • Open Access
747 Views
21 Pages

4 June 2025

In this paper, we propose and develop a stationary Stokes Inverse Model (SIM) to estimate the stress distributions that are difficult to measure directly in flows. We estimate the driving stresses from the velocities by solving the inverse problem go...

  • Article
  • Open Access
1,122 Views
18 Pages

A Cloud-Edge-End Collaboration Framework for Fixed-Time Distributed Optimization of Virtual Power Plants

  • Kai Kang,
  • Nian Shi,
  • Keqi Zhang,
  • Si Cai,
  • Liang Zhang,
  • Xinan Shao,
  • Lei Shu,
  • Renjie Hu and
  • Leimin Wang

4 June 2025

As the power grid expands, concerns about system computation speed and information privacy are becoming more critical. While distributed optimization methods protect individual privacy effectively, they struggle with computational efficiency in compl...

  • Review
  • Open Access
5 Citations
4,912 Views
28 Pages

4 June 2025

This review summarizes the application of physics-informed neural networks (PINNs) for solving higher-order nonlinear partial differential equations belonging to the nonlinear Schrödinger equation (NLSE) hierarchy, including models with external...

  • Article
  • Open Access
1,974 Views
25 Pages

4 June 2025

The Intel® Trust Domain Extensions (TDX) encrypt guest memory and minimize host interactions to provide hardware-enforced isolation for sensitive virtual machines (VMs). Software vulnerabilities in the guest OS continue to pose a serious risk eve...

  • Review
  • Open Access
21 Citations
16,034 Views
21 Pages

Deploying AI on Edge: Advancement and Challenges in Edge Intelligence

  • Tianyu Wang,
  • Jinyang Guo,
  • Bowen Zhang,
  • Ge Yang and
  • Dong Li

4 June 2025

In recent years, artificial intelligence (AI) has achieved significant progress and remarkable advancements across various disciplines, including biology, computer science, and industry. However, the increasing complexity of AI network structures and...

  • Article
  • Open Access
801 Views
23 Pages

4 June 2025

Some knowledge bases (KBs) extracted from Wikipedia articles can achieve very high average precision values (over 95% in DBpedia). However, subtle mistakes including inconsistencies, outliers, and erroneous relations are usually ignored in the constr...

  • Article
  • Open Access
2 Citations
759 Views
19 Pages

3 June 2025

We consider a two-dimensional parabolic problem subject to both Neumann and Dirichlet boundary conditions, along with an integral constraint. Based on the integral observation, we solve the inverse problem of a recovering time-dependent right-hand si...

  • Article
  • Open Access
707 Views
30 Pages

Problems with Missing Tricomi Condition and Analog of Frankl Condition for One Class of Mixed Type Equations

  • Assel Makulbay,
  • Mirakhmat Mirsaburov,
  • Abdumauvlen Berdyshev and
  • Gulbakhor Mirsaburova

3 June 2025

In this paper, for a mixed elliptic-hyperbolic type equation with various degeneration orders and singular coefficients, theorems of uniqueness and existence of the solution to the problem with a missing Tricomi condition on boundary characteristic a...

  • Article
  • Open Access
1,124 Views
16 Pages

3 June 2025

Multimodal Machine Translation (MMT) has long been assumed to outperform traditional text-only MT by leveraging visual information. However, recent studies challenge this assumption, showing that MMT models perform similarly even when tested without...

  • Article
  • Open Access
2 Citations
979 Views
13 Pages

3 June 2025

The human brain is an extremely sophisticated system. Several neural models have been proposed to mimic and understand brain function. Most of them incorporate memristors to simulate autapse or self-coupling, electromagnetic radiation and the synapti...

  • Article
  • Open Access
2 Citations
850 Views
19 Pages

Some New Sobolev-Type Theorems for the Rough Riesz Potential Operator on Grand Variable Herz Spaces

  • Ghada AlNemer,
  • Ghada Ali Basendwah,
  • Babar Sultan and
  • Ioan-Lucian Popa

3 June 2025

In this paper, our first objective is to define the idea of grand variable Herz spaces. Then, our main goal is to prove boundedness results for operators, including the rough Riesz potential operator of variable order and the fractional Hardy operato...

  • Article
  • Open Access
1 Citations
860 Views
20 Pages

3 June 2025

This study introduces the sine unit exponentiated half-logistic distribution, a novel extension of the unit exponentiated half-logistic distribution within the sine-G family. Using trigonometric transformations, the proposed distribution offers flexi...

  • Article
  • Open Access
674 Views
12 Pages

3 June 2025

This work examines a singular elliptic problem with a fractional and a non-local integrodifferential operator. The question of whether solutions exist is transformed into the existence of critical points of the associated functional energy, to be mor...

  • Article
  • Open Access
1 Citations
790 Views
12 Pages

Existence and Stability Analysis of Nonlinear Systems with Hadamard Fractional Derivatives

  • Mouataz Billah Mesmouli,
  • Ioan-Lucian Popa and
  • Taher S. Hassan

3 June 2025

This paper investigates the existence, uniqueness, and finite-time stability of solutions to a class of nonlinear systems governed by the Hadamard fractional derivative. The analysis is carried out using two fundamental tools from fixed point theory:...

  • Article
  • Open Access
1 Citations
2,574 Views
29 Pages

3 June 2025

Deep learning-based fault diagnosis methods have gained extensive attention in recent years due to their outstanding performance. The model input can take the form of multiple domains, such as the time domain, frequency domain, and time–frequen...

  • Article
  • Open Access
1 Citations
1,531 Views
18 Pages

GazeMap: Dual-Pathway CNN Approach for Diagnosing Alzheimer’s Disease from Gaze and Head Movements

  • Hyuntaek Jung,
  • Shinwoo Ham,
  • Hyunyoung Kil,
  • Jung Eun Shin and
  • Eun Yi Kim

3 June 2025

Alzheimer’s disease (AD) is a progressive neurodegenerative disorder that impairs cognitive function, making early detection crucial for timely intervention. This study proposes a novel AD detection framework integrating gaze and head movement...

  • Article
  • Open Access
1,813 Views
17 Pages

3 June 2025

This paper proposes a high-efficiency design for an external rotor interior permanent magnet synchronous motor (IPMSM) that eliminates the magnetic leakage flux path. The conventional model based on an external rotor surface-mounted permanent magnet...

  • Article
  • Open Access
10 Citations
1,512 Views
13 Pages

3 June 2025

Achieving high-order accuracy in finite difference/spectral methods for space-time fractional differential equations often relies on very restrictive and usually unrealistic smoothness assumptions in the spatial and/or temporal domains. For spatial d...

  • Feature Paper
  • Article
  • Open Access
2 Citations
742 Views
11 Pages

3 June 2025

The manifolds studied are almost contact complex Riemannian manifolds, known also as almost contact B-metric manifolds. They are equipped with a pair of pseudo-Riemannian metrics that are mutually associated to each other using an almost contact stru...

  • Article
  • Open Access
805 Views
12 Pages

3 June 2025

A composite-coated inclusion is embedded in a matrix, where the conductivity (permittivity) of the phases is assumed to be complex-valued. The purpose of this paper is to demonstrate that a non-zero flux can arise under specific conditions related to...

  • Article
  • Open Access
1 Citations
949 Views
16 Pages

2 June 2025

The design and cracking of text-based CAPTCHAs are important topics in computer security. This study proposes a method for the style transfer of text-based CAPTCHAs using Generative Adversarial Networks (GANs). First, a curated dataset was used, comb...

  • Article
  • Open Access
811 Views
19 Pages

2 June 2025

Recently, the development of the Metaverse has emerged as a pivotal concern within both industrial and academic realms. The future development of the Metaverse industry is shrouded in uncertainty, complexity, and a dearth of technical and economic in...

  • Article
  • Open Access
2 Citations
756 Views
16 Pages

2 June 2025

This paper introduces new structures (DV, FL) on a set Ξ. They will be known as diving structures and floating structures. The pairs (Ξ,DV), (Ξ,FL) will be called diving spaces and floating spaces, respectively. These structures are not rela...

  • Article
  • Open Access
1,336 Views
15 Pages

2 June 2025

Aiming at the problem that the existing auxiliary diagnosis methods for fractures are mostly limited to specific body parts and lack generality and robustness when applied to multi-part diagnoses, this study proposes a two-stage upper limb fracture a...

  • Article
  • Open Access
2 Citations
905 Views
20 Pages

2 June 2025

This study presents an innovative solution method for ultra-fine group slowing-down equations tailored to stochastic media with double heterogeneity (DH), focusing on advanced nuclear fuels such as fully ceramic microencapsulated (FCM) fuel and Mixed...

  • Article
  • Open Access
815 Views
20 Pages

2 June 2025

With the rapid development of e-commerce, Return Freight Insurance (RFI) has emerged as a vital tool for retailers and customers to mitigate the financial burden posed by high return rates in online shopping. This paper investigates the strategic dec...

  • Article
  • Open Access
849 Views
21 Pages

2 June 2025

Inspired by call centers, this paper models them as a constant retrial queue, with feedback and delayed vacations to balance high efficiency and low cost for service agents. After completing the service, the server randomly waits for an idle period....

  • Article
  • Open Access
1 Citations
842 Views
20 Pages

2 June 2025

This work aims to propose an iterative method for approximating solutions of two-dimensional weakly singular Fredholm integral Equation (2D-WSFIE) by incorporating the product integration technique, an appropriate cubature formula, and the Picard alg...

  • Article
  • Open Access
2 Citations
1,343 Views
29 Pages

2 June 2025

Distributed Denial-of-Service (DDoS) attacks generate deceptive, high-volume traffic that bypasses conventional detection mechanisms. When interception fails, effectively allocating mixed benign and malicious traffic under resource constraints become...

  • Article
  • Open Access
724 Views
20 Pages

Variable Dose-Constraints Method Based on Multiplicative Dynamical Systems for High-Precision Intensity-Modulated Radiation Therapy Planning

  • Omar M. Abou Al-Ola,
  • Takeshi Kojima,
  • Ryosei Nakada,
  • Norihisa Obata,
  • Kohei Hayashi and
  • Tetsuya Yoshinaga

2 June 2025

An optimization framework that effectively balances dose–volume constraints and treatment objectives is required in intensity-modulated radiation therapy (IMRT) planning. In our previous work, we proposed a dynamical systems-based approach in w...

of 5

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Mathematics - ISSN 2227-7390