Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (16)

Search Parameters:
Keywords = bijective transformation

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
29 pages, 652 KB  
Article
Bijective Network-to-Image Encoding for Interpretable CNN-Based Intrusion Detection System
by Omesh A. Fernando, Joseph Spring and Hannan Xiao
Network 2025, 5(4), 42; https://doi.org/10.3390/network5040042 - 25 Sep 2025
Abstract
As 5G and beyond networks grow in heterogeneity, complexity, and scale, traditional Intrusion Detection Systems (IDS) struggle to maintain accurate and precise detection mechanisms. A promising alternative approach to this problem has involved the use of Deep Learning (DL) techniques; however, DL-based IDS [...] Read more.
As 5G and beyond networks grow in heterogeneity, complexity, and scale, traditional Intrusion Detection Systems (IDS) struggle to maintain accurate and precise detection mechanisms. A promising alternative approach to this problem has involved the use of Deep Learning (DL) techniques; however, DL-based IDS suffer from issues relating to interpretation, performance variability, and high computational overheads. These issues limit their practical deployment in real-world applications. In this study, CiNeT is introduced as a novel DL-based IDS employing Convolutional Neural Networks (CNN) within a bijective encoding–decoding framework between network traffic features (such as IPv6, IPv4, Timestamp, MAC addresses, and network data) and their RGB representations. This transformation facilitates our DL IDS in detecting spatial patterns without sacrificing fidelity. The bijective pipeline enables complete traceability from detection decisions to their corresponding network traffic features, enabling a significant initiative towards solving the ‘black-box’ problem inherent in Deep Learning models, thus facilitating digital forensics. Finally, the DL IDS has been evaluated on three datasets, UNSW NB-15, InSDN, and ToN_IoT, with analysis conducted on accuracy, GPU usage, memory utilisation, training, testing, and validation time. To summarise, this study presents a new CNN-based IDS with an end-to-end pipeline between network traffic data and their RGB representation, which offers high performance and enhanced interpretability through revisable transformation. Full article
(This article belongs to the Special Issue AI-Based Innovations in 5G Communications and Beyond)
Show Figures

Figure 1

24 pages, 441 KB  
Article
Promotion of Lattice Paths by Riordan Arrays
by Aoife Hennessy, Kieran Murphy, Narciso Gonzaga and Paul Barry
Mathematics 2025, 13(18), 2949; https://doi.org/10.3390/math13182949 - 11 Sep 2025
Viewed by 267
Abstract
This paper investigates the use of Riordan arrays in the enumeration and transformation of lattice paths through a combinatorial framework of promotion. We demonstrate how Dyck paths can be promoted to generalised Motzkin and Schröder paths via two key transformations: the Binomial and [...] Read more.
This paper investigates the use of Riordan arrays in the enumeration and transformation of lattice paths through a combinatorial framework of promotion. We demonstrate how Dyck paths can be promoted to generalised Motzkin and Schröder paths via two key transformations: the Binomial and Chebyshev transforms, each associated with specific Riordan arrays. These promotions yield classical integer sequences and continued fraction representations that enumerate weighted lattice paths. The framework is further extended to analyse grand paths, which are permitted to cross below the x-axis. We develop constructive bijections establishing explicit correspondences between promoted path families. The promotion framework offers new insights into known integer sequences and enables a unified approach to the generalisation and classification of lattice paths. Full article
Show Figures

Figure 1

23 pages, 977 KB  
Article
Development of High-Quality Cryptographic Constructions Based on Many-Valued Logic Affine Transformations
by Mikolaj Karpinski, Artem Sokolov, Aizhan Tokkuliyeva, Volodymyr Radush, Nadiia Kazakova, Aigul Shaikhanova, Nataliya Zagorodna and Anna Korchenko
Electronics 2025, 14(10), 2094; https://doi.org/10.3390/electronics14102094 - 21 May 2025
Viewed by 601
Abstract
The S-box is a key component of modern ciphers, determining the quality and performance of the cryptographic algorithms in which it is applied. Many constructions for synthesizing high-quality S-boxes have been established, and those based on Galois fields theory—for example, the Nyberg construction [...] Read more.
The S-box is a key component of modern ciphers, determining the quality and performance of the cryptographic algorithms in which it is applied. Many constructions for synthesizing high-quality S-boxes have been established, and those based on Galois fields theory—for example, the Nyberg construction applied in the AES cryptographic algorithm—are particularly important. An integral component of the Nyberg construction is the affine transformation, which is used to improve the avalanche and correlation properties of the S-box. In this paper, a new approach is adopted for synthesizing affine transformations for S-boxes based on the quaternary matrices over the Galois field GF(4). We describe four basic structures that serve as the foundation for synthesizing a complete class of 648 affine transformation matrices of order n = 3 and a class of 7776 matrices of order n = 4 and introduce a recurrent structure to facilitate the synthesis of matrices for higher orders. Using these matrices in combination with the Nyberg construction, it is possible to construct bijective S-boxes that outperform the original Nyberg construction and many other known S-boxes in terms of strict avalanche criterion (SAC) and bit independence criterion strict avalanche criterion (BIC SAC) values, while maintaining a maximal level of nonlinearity and good cryptographic properties. We also propose modified GF(4) affine transformations that can be applied to specialized S-boxes which already satisfy the SAC for both component Boolean and 4-functions, as well as the criterion of minimal correlation between input and output, allowing us to enhance their nonlinearity to the value of Nf = 96. We integrate the synthesized S-boxes into the AES algorithm and evaluate their practical performance. The encryption outputs successfully pass the NIST statistical test suite in 96 out of 100 cases, outperforming both the original AES S-box and other reference constructions, confirming the practical strength of the proposed method. Full article
Show Figures

Figure 1

47 pages, 618 KB  
Article
Compression Sensitivity of the Burrows–Wheeler Transform and Its Bijective Variant
by Hyodam Jeon and Dominik Köppl
Mathematics 2025, 13(7), 1070; https://doi.org/10.3390/math13071070 - 25 Mar 2025
Cited by 1 | Viewed by 548
Abstract
The Burrows–Wheeler Transform (BWT) is a widely used reversible data compression method, forming the foundation of various compression algorithms and indexing structures. Prior research has analyzed the sensitivity of compression methods and repetitiveness measures to single-character edits, particularly in binary alphabets. However, the [...] Read more.
The Burrows–Wheeler Transform (BWT) is a widely used reversible data compression method, forming the foundation of various compression algorithms and indexing structures. Prior research has analyzed the sensitivity of compression methods and repetitiveness measures to single-character edits, particularly in binary alphabets. However, the impact of such modifications on the compression efficiency of the bijective variant of BWT (BBWT) remains largely unexplored. This study extends previous work by examining the compression sensitivity of both BWT and BBWT when applied to larger alphabets, including alphabet reordering. We establish theoretical bounds on the increase in compression size due to character modifications in structured sequences such as Fibonacci words. Our devised lower bounds put the sensitivity of BBWT on the same scale as of BWT, with compression size changes exhibiting logarithmic multiplicative growth and square-root additive growth patterns depending on the edit type and the input data. These findings contribute to a deeper understanding of repetitiveness measures. Full article
(This article belongs to the Section E: Applied Mathematics)
Show Figures

Figure 1

17 pages, 1696 KB  
Article
The Edge Odd Graceful Labeling of Water Wheel Graphs
by Mohammed Aljohani and Salama Nagy Daoud
Axioms 2025, 14(1), 5; https://doi.org/10.3390/axioms14010005 - 26 Dec 2024
Viewed by 1084
Abstract
A graph, G=(V,E), is edge odd graceful if it possesses edge odd graceful labeling. This labeling is defined as a bijection [...] Read more.
A graph, G=(V,E), is edge odd graceful if it possesses edge odd graceful labeling. This labeling is defined as a bijection g:E(G){1,3,,2m1}, from which an injective transformation is derived, g*:V(G){1,2,3,,2m1}, from the rule that the image of uV(G) under g* is uvE(G)g(uv)mod(2m). The main objective of this manuscript is to introduce new classes of planar graphs, namely water wheel graphs, WWn; triangulated water wheel graphs, TWn; closed water wheel graphs, CWn; and closed triangulated water wheel graphs, CTn. Furthermore, we specify conditions for these graphs to allow for edge odd graceful labelings. Full article
(This article belongs to the Section Algebra and Number Theory)
Show Figures

Figure 1

27 pages, 1452 KB  
Article
Partial Imaginary Transition State (ITS) Graphs: A Formal Framework for Research and Analysis of Atom-to-Atom Maps of Unbalanced Chemical Reactions and Their Completions
by Marcos E. González Laffitte, Klaus Weinbauer, Tieu-Long Phan, Nora Beier, Nico Domschke, Christoph Flamm, Thomas Gatter, Daniel Merkle and Peter F. Stadler
Symmetry 2024, 16(9), 1217; https://doi.org/10.3390/sym16091217 - 16 Sep 2024
Cited by 3 | Viewed by 2069
Abstract
Atom-to-atom maps (AAMs) are bijections that establish the correspondence of reactant and product atoms across chemical reactions. They capture crucial features of the reaction mechanism and thus play a central role in modeling chemistry at the level of graph transformations. AAMs are equivalent [...] Read more.
Atom-to-atom maps (AAMs) are bijections that establish the correspondence of reactant and product atoms across chemical reactions. They capture crucial features of the reaction mechanism and thus play a central role in modeling chemistry at the level of graph transformations. AAMs are equivalent to so-called “imaginary transition state” (ITS) graphs, making it possible to reduce tasks such as the computational comparison of AAMs to testing graph isomorphisms. In many application scenarios, nonetheless, only partial information is available, i.e., only partial maps or, equivalently, only subgraphs of the ITS graphs, are known. Here, we investigate whether and how, and to what extent, such partial chemical data can be completed and compared. The focus of this contribution is entirely on the development of a solid mathematical foundation for the analysis of partial AAMs and their associated partial ITS graphs. Full article
(This article belongs to the Special Issue Symmetry in Graph Algorithms and Graph Theory III)
Show Figures

Figure 1

24 pages, 13367 KB  
Article
Compact Walsh–Hadamard Transform-Driven S-Box Design for ASIC Implementations
by Omer Tariq, Muhammad Bilal Akram Dastagir and Dongsoo Han
Electronics 2024, 13(16), 3148; https://doi.org/10.3390/electronics13163148 - 9 Aug 2024
Viewed by 2009
Abstract
With the exponential growth of the Internet of Things (IoT), ensuring robust end-to-end encryption is paramount. Current cryptographic accelerators often struggle with balancing security, area efficiency, and power consumption, which are critical for compact IoT devices and system-on-chips (SoCs). This work presents a [...] Read more.
With the exponential growth of the Internet of Things (IoT), ensuring robust end-to-end encryption is paramount. Current cryptographic accelerators often struggle with balancing security, area efficiency, and power consumption, which are critical for compact IoT devices and system-on-chips (SoCs). This work presents a novel approach to designing substitution boxes (S-boxes) for Advanced Encryption Standard (AES) encryption, leveraging dual quad-bit structures to enhance cryptographic security and hardware efficiency. By utilizing Algebraic Normal Forms (ANFs) and Walsh–Hadamard Transforms, the proposed Register Transfer Level (RTL) circuitry ensures optimal non-linearity, low differential uniformity, and bijectiveness, making it a robust and efficient solution for ASIC implementations. Implemented on 65 nm CMOS technology, our design undergoes rigorous statistical analysis to validate its security strength, followed by hardware implementation and functional verification on a ZedBoard. Leveraging Cadence EDA tools, the ASIC implementation achieves a central circuit area of approximately 199 μm2. The design incurs a hardware cost of roughly 80 gate equivalents and exhibits a maximum path delay of 0.38 ns. Power dissipation is measured at approximately 28.622 μW with a supply voltage of 0.72 V. According to the ASIC implementation on the TSMC 65 nm process, the proposed design achieves the best area efficiency, approximately 66.46% better than state-of-the-art designs. Full article
Show Figures

Figure 1

31 pages, 3625 KB  
Article
Edge Odd Graceful Labeling in Some Wheel-Related Graphs
by Mohammed Aljohani and Salama Nagy Daoud
Mathematics 2024, 12(8), 1203; https://doi.org/10.3390/math12081203 - 17 Apr 2024
Cited by 1 | Viewed by 1823
Abstract
A graph’s edge labeling involves the allocation of symbols (colors or numbers) to the edges of a graph governed by specific criteria. Such labeling of a graph G with order n and size m is named edge odd graceful if there is a [...] Read more.
A graph’s edge labeling involves the allocation of symbols (colors or numbers) to the edges of a graph governed by specific criteria. Such labeling of a graph G with order n and size m is named edge odd graceful if there is a bijective map φ from the set of edges E(G)={e1,,em} to the set {1,3,,2m1} in a way that the derived transformation φ from the vertex-set V(G)={v1,,vn} to the set {0,1,2,,2m1} given by φ(u)=uvE(G)φ(uv)mod(2m) is injective. Any graph is named edge odd graceful if it permits an edge odd graceful allocation (Solairaju and Chithra). The primary aim of this study is to define and explore the edge odd graceful labeling of five new families of wheel-related graphs. Consequently, necessary and sufficient conditions for these families to be edge odd graceful are provided. Full article
(This article belongs to the Special Issue Advanced Graph Theory and Combinatorics)
Show Figures

Figure 1

30 pages, 3022 KB  
Article
Catastrophe Bond Diversification Strategy Using Probabilistic–Possibilistic Bijective Transformation and Credibility Measures in Fuzzy Environment
by Wulan Anggraeni, Sudradjat Supian, Sukono and Nurfadhlina Abdul Halim
Mathematics 2023, 11(16), 3513; https://doi.org/10.3390/math11163513 - 14 Aug 2023
Viewed by 1793
Abstract
The variety of catastrophe bond issuances can be used for portfolio diversification. However, the structure of catastrophe bonds differs from traditional bonds in that the face value and coupons depend on triggering events. This study aims to build a diversification strategy model framework [...] Read more.
The variety of catastrophe bond issuances can be used for portfolio diversification. However, the structure of catastrophe bonds differs from traditional bonds in that the face value and coupons depend on triggering events. This study aims to build a diversification strategy model framework using probabilistic–possibilistic bijective transformation (PPBT) and credibility measures in fuzzy environments based on the payoff function. The stages of modeling include identifying the trigger distribution; determining the membership degrees for the face value and coupons using PPBT; calculating the average face value and coupons using the fuzzy quantification theory; formulating the fuzzy variables for the yield; defining the function of triangular fuzzy membership for the yield; defining the credibility distribution for the triangular fuzzy variables for the yield; determining the expectation and total variance for the yield; developing a model of the catastrophe bond diversification strategy; the numerical simulation of the catastrophe bond strategy model; and formulating a solution to the simulation model of the diversification strategy using the sequential method, quadratic programming, transformation, and linearization techniques. The simulation results show that the proposed model can overcome the self-duality characteristic not possessed by the possibilistic measures in the fuzzy variables. The results obtained are expected to contribute to describing the yield uncertainty of investing in catastrophe bond assets so that investors can make wise decisions. Full article
(This article belongs to the Topic Mathematical Modeling)
Show Figures

Figure 1

7 pages, 254 KB  
Article
A Covariant Polymerized Scalar Field in Semi-Classical Loop Quantum Gravity
by Rodolfo Gambini, Florencia Benítez and Jorge Pullin
Universe 2022, 8(10), 526; https://doi.org/10.3390/universe8100526 - 10 Oct 2022
Cited by 17 | Viewed by 1689
Abstract
We propose a new polymerization scheme for scalar fields coupled to gravity. It has the advantage of being a (non-bijective) canonical transformation of the fields, and therefore ensures the covariance of the theory. We study it in detail in spherically symmetric situations and [...] Read more.
We propose a new polymerization scheme for scalar fields coupled to gravity. It has the advantage of being a (non-bijective) canonical transformation of the fields, and therefore ensures the covariance of the theory. We study it in detail in spherically symmetric situations and compare to other approaches. Full article
(This article belongs to the Special Issue Loop Quantum Gravity: A Themed Issue in Honor of Prof. Abhay Ashtekar)
Show Figures

Figure 1

17 pages, 582 KB  
Article
Snake Graphs Arising from Groves with an Application in Coding Theory
by Agustín Moreno Cañadas, Gabriel Bravo Rios and Robinson-Julian Serna
Computation 2022, 10(7), 124; https://doi.org/10.3390/computation10070124 - 19 Jul 2022
Cited by 5 | Viewed by 2972
Abstract
Snake graphs are connected planar graphs consisting of a finite sequence of adjacent tiles (squares) T1,T2,,Tn. In this case, for 1jn1, two consecutive tiles Tj [...] Read more.
Snake graphs are connected planar graphs consisting of a finite sequence of adjacent tiles (squares) T1,T2,,Tn. In this case, for 1jn1, two consecutive tiles Tj and Tj+1 share exactly one edge, either the edge at the east (west) of Tj (Tj+1) or the edge at the north (south) of Tj (Tj+1). Finding the number of perfect matchings associated with a given snake graph is one of the most remarkable problems regarding these graphs. It is worth noting that such a number of perfect matchings allows a bijection between the set of snake graphs and the positive continued fractions. Furthermore, perfect matchings of snake graphs have also been used to find closed formulas for cluster variables of some cluster algebras and solutions of the Markov equation, which is a well-known Diophantine equation. Recent results prove that snake graphs give rise to some string modules over some path algebras, connecting snake graph research with the theory of representation of algebras. This paper uses this interaction to define Brauer configuration algebras induced by schemes associated with some multisets called polygons. Such schemes are named Brauer configurations. In this work, polygons are given by some admissible words, which, after appropriate transformations, permit us to define sets of binary trees called groves. Admissible words generate codes whose energy values are given by snake graphs. Such energy values can be estimated by using Catalan numbers. We include in this paper Python routines to compute admissible words (i.e., codewords), energy values of the generated codes, Catalan numbers and dimensions of the obtained Brauer configuration algebras. Full article
(This article belongs to the Special Issue Graph Theory and Its Applications in Computing)
Show Figures

Figure 1

9 pages, 314 KB  
Article
Composition Vector Spaces as a New Type of Tri-Operational Algebras
by Omid Reza Dehghan, Morteza Norouzi and Irina Cristea
Mathematics 2021, 9(18), 2344; https://doi.org/10.3390/math9182344 - 21 Sep 2021
Viewed by 2195
Abstract
The aim of this paper is to define and study the composition vector spaces as a type of tri-operational algebras. In this regard, by presenting nontrivial examples, it is emphasized that they are a proper generalization of vector spaces and their structure can [...] Read more.
The aim of this paper is to define and study the composition vector spaces as a type of tri-operational algebras. In this regard, by presenting nontrivial examples, it is emphasized that they are a proper generalization of vector spaces and their structure can be characterized by using linear operators. Additionally, some related properties about foundations, composition subspaces and residual elements are investigated. Moreover, it is shown how to endow a vector space with a composition structure by using bijective linear operators. Finally, more properties of the composition vector spaces are presented in connection with linear transformations. Full article
Show Figures

Figure 1

19 pages, 804 KB  
Article
On Some Symmetries of Quadratic Systems
by Maoan Han, Tatjana Petek and Valery G. Romanovski
Symmetry 2020, 12(8), 1300; https://doi.org/10.3390/sym12081300 - 4 Aug 2020
Cited by 1 | Viewed by 2353
Abstract
We provide a general method for identifying real quadratic polynomial dynamical systems that can be transformed to symmetric ones by a bijective polynomial map of degree one, the so-called affine map. We mainly focus on symmetry groups generated by rotations, in other words, [...] Read more.
We provide a general method for identifying real quadratic polynomial dynamical systems that can be transformed to symmetric ones by a bijective polynomial map of degree one, the so-called affine map. We mainly focus on symmetry groups generated by rotations, in other words, we treat equivariant and reversible equivariant systems. The description is given in terms of affine varieties in the space of parameters of the system. A general algebraic approach to find subfamilies of systems having certain symmetries in polynomial differential families depending on many parameters is proposed and computer algebra computations for the planar case are presented. Full article
Show Figures

Figure 1

11 pages, 676 KB  
Article
Reflection-Like Maps in High-Dimensional Euclidean Space
by Zhiyong Huang and Baokui Li
Mathematics 2020, 8(6), 872; https://doi.org/10.3390/math8060872 - 28 May 2020
Viewed by 2303
Abstract
In this paper, we introduce reflection-like maps in n-dimensional Euclidean spaces, which are affinely conjugated to [...] Read more.
In this paper, we introduce reflection-like maps in n-dimensional Euclidean spaces, which are affinely conjugated to θ : ( x 1 , x 2 , , x n ) 1 x 1 , x 2 x 1 , , x n x 1 . We shall prove that reflection-like maps are line-to-line, cross ratios preserving on lines and quadrics preserving. The goal of this article was to consider the rigidity of line-to-line maps on the local domain of R n by using reflection-like maps. We mainly prove that a line-to-line map η on any convex domain satisfying η 2 = i d and fixing any points in a super-plane is a reflection or a reflection-like map. By considering the hyperbolic isometry in the Klein Model, we also prove that any line-to-line bijection f : D n D n is either an orthogonal transformation, or a composition of an orthogonal transformation and a reflection-like map, from which we can find that reflection-like maps are important elements and instruments to consider the rigidity of line-to-line maps. Full article
(This article belongs to the Special Issue Modern Analysis and Partial Differential Equation)
Show Figures

Figure 1

10 pages, 523 KB  
Article
Codon Directional Asymmetry Suggests Swapped Prebiotic 1st and 2nd Codon Positions
by Hervé Seligmann and Jacques Demongeot
Int. J. Mol. Sci. 2020, 21(1), 347; https://doi.org/10.3390/ijms21010347 - 5 Jan 2020
Cited by 8 | Viewed by 3237
Abstract
Background: Codon directional asymmetry (CDA) classifies the 64 codons into palindromes (XYX, CDA = 0), and 5′- and 3′-dominant (YXX and XXY, CDA < 0 and CDA > 0, respectively). Previously, CDA was defined by the purine/pyrimidine divide (A,G/C,T), where X is [...] Read more.
Background: Codon directional asymmetry (CDA) classifies the 64 codons into palindromes (XYX, CDA = 0), and 5′- and 3′-dominant (YXX and XXY, CDA < 0 and CDA > 0, respectively). Previously, CDA was defined by the purine/pyrimidine divide (A,G/C,T), where X is either a purine or a pyrimidine. For the remaining codons with undefined CDA, CDA was defined by the 5′ or 3′ nucleotide complementary to Y. This CDA correlates with cognate amino acid tRNA synthetase classes, antiparallel beta sheet conformation index and the evolutionary order defined by the self-referential genetic code evolution model (CDA < 0: class I, high beta sheet index, late genetic code inclusion). Methods: We explore associations of CDAs defined by nucleotide classifications according to complementarity strengths (A:T, weak; C:G, strong) and keto-enol/amino-imino groupings (G,T/A,C), also after swapping 1st and 2nd codon positions with amino acid physicochemical and structural properties. Results: Here, analyses show that for the eight codons whose purine/pyrimidine-based CDA requires using the rule of complementarity with the midposition, using weak interactions to define CDA instead of complementarity increases associations with tRNA synthetase classes, antiparallel beta sheet index and genetic code evolutionary order. CDA defined by keto-enol/amino-imino groups, 1st and 2nd codon positions swapped, correlates with amino acid parallel beta sheet formation indices and Doolittle’s hydropathicities. Conclusions: Results suggest (a) prebiotic swaps from N2N1N3 to N1N2N3 codon structures, (b) that tRNA-mediated translation replaced direct codon-amino acid interactions, and (c) links between codon structures and cognate amino acid properties. Full article
(This article belongs to the Special Issue Origins of Protein Translation)
Show Figures

Figure 1

Back to TopTop