Pub Date : 2022-01-01DOI: 10.22075/IJNAA.2022.5759
S. J. Radhi, M. A. Abdlhusein, Ayed Elayose Hashoosh
The aim of this paper is to introduce some new modified types of arrow domination by adding some conditions on the arrow dominating set or on its complement set. Co-independent arrow domination, restrained arrow domination, connected arrow domination, and complementary tree arrow domination are the main types of domination introduced here. More properties and bounds are discussed and applied to some graphs.
{"title":"Some modified types of arrow domination","authors":"S. J. Radhi, M. A. Abdlhusein, Ayed Elayose Hashoosh","doi":"10.22075/IJNAA.2022.5759","DOIUrl":"https://doi.org/10.22075/IJNAA.2022.5759","url":null,"abstract":"The aim of this paper is to introduce some new modified types of arrow domination by adding some conditions on the arrow dominating set or on its complement set. Co-independent arrow domination, restrained arrow domination, connected arrow domination, and complementary tree arrow domination are the main types of domination introduced here. More properties and bounds are discussed and applied to some graphs.","PeriodicalId":14240,"journal":{"name":"International Journal of Nonlinear Analysis and Applications","volume":"13 1","pages":"1451-1461"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68126443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.22075/IJNAA.2022.5652
M. H. O. Ajam, Iftichar M. T. Al-Shara’a
The aim of this paper is introduced some examples of a (mathbb{G})-bi-shadowing actions on the metric (mathbb{G})-space, by study a sufficient conditions of actions to be (mathbb{G})-bi-shadowing. We show the (mathbb{G})-(lambda)-Contraction actions, (mathbb{G})-(left( lambda,L right))textbf{-}Contraction action, and (mathbb{G})-Hardy-Rogers contraction action are (mathbb{G})-bi-shadowing by proved some theorems.
{"title":"Some of the sufficient conditions to get the G-Bi-shadowing action","authors":"M. H. O. Ajam, Iftichar M. T. Al-Shara’a","doi":"10.22075/IJNAA.2022.5652","DOIUrl":"https://doi.org/10.22075/IJNAA.2022.5652","url":null,"abstract":"The aim of this paper is introduced some examples of a (mathbb{G})-bi-shadowing actions on the metric (mathbb{G})-space, by study a sufficient conditions of actions to be (mathbb{G})-bi-shadowing. We show the (mathbb{G})-(lambda)-Contraction actions, (mathbb{G})-(left( lambda,L right))textbf{-}Contraction action, and (mathbb{G})-Hardy-Rogers contraction action are (mathbb{G})-bi-shadowing by proved some theorems.","PeriodicalId":14240,"journal":{"name":"International Journal of Nonlinear Analysis and Applications","volume":"13 1","pages":"1105-1112"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68126498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.22075/IJNAA.2022.5655
Areej M. Abduldaim, A. Faraj
Mathematics has always been of great importance in various sciences, especially computer science. The mechanism used to embed various types of information in a host medical images to safeguard the privacy of the patient including the patient's name, doctor's digital signature is called watermarking. There are a lot of improved watermark algorithms, however, this information is susceptible to attack when the data are transferred over universal internet channels. This paper proposed a robust watermark algorithm that uses a Lifting Wavelet Transform $(LWT)$ and two times of the Hessenberg Matrix Decomposition Method $(HMDM)$ to embed a watermark in a chosen channel of the host image after performing the transform. The experimental results demonstrate that the improvement appears (higher robustness against $JPEG$ compression attack) and good imperceptibility against some attacks, to evaluate the fineness of the original with watermarked images and the extracted watermark respectively.
{"title":"Twofold of algebraic decomposition method used for a watermarking scheme with $LWT$ over medical images","authors":"Areej M. Abduldaim, A. Faraj","doi":"10.22075/IJNAA.2022.5655","DOIUrl":"https://doi.org/10.22075/IJNAA.2022.5655","url":null,"abstract":"Mathematics has always been of great importance in various sciences, especially computer science. The mechanism used to embed various types of information in a host medical images to safeguard the privacy of the patient including the patient's name, doctor's digital signature is called watermarking. There are a lot of improved watermark algorithms, however, this information is susceptible to attack when the data are transferred over universal internet channels. This paper proposed a robust watermark algorithm that uses a Lifting Wavelet Transform $(LWT)$ and two times of the Hessenberg Matrix Decomposition Method $(HMDM)$ to embed a watermark in a chosen channel of the host image after performing the transform. The experimental results demonstrate that the improvement appears (higher robustness against $JPEG$ compression attack) and good imperceptibility against some attacks, to evaluate the fineness of the original with watermarked images and the extracted watermark respectively.","PeriodicalId":14240,"journal":{"name":"International Journal of Nonlinear Analysis and Applications","volume":"13 1","pages":"1123-1129"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68126522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.22075/IJNAA.2022.5658
E. Almuhur, M. Al-Labadi
This article sheds light on the single phrase, logical thinking, which came to be understood in so many diverse ways. To assist explain the many distinct meanings, how they arose, and how they are connected, we trace the emergence and evolution of logical thinking in mathematics. This article is also, to some extent, a description of a movement that arose outside of philosophy's mainstream, and whose beginnings lay in a desire to make logic practical and an essential part of learners' lives.
{"title":"The emergence of logic in mathematics and its influence on learners' cognition and way of thinking","authors":"E. Almuhur, M. Al-Labadi","doi":"10.22075/IJNAA.2022.5658","DOIUrl":"https://doi.org/10.22075/IJNAA.2022.5658","url":null,"abstract":"This article sheds light on the single phrase, logical thinking, which came to be understood in so many diverse ways. To assist explain the many distinct meanings, how they arose, and how they are connected, we trace the emergence and evolution of logical thinking in mathematics. This article is also, to some extent, a description of a movement that arose outside of philosophy's mainstream, and whose beginnings lay in a desire to make logic practical and an essential part of learners' lives.","PeriodicalId":14240,"journal":{"name":"International Journal of Nonlinear Analysis and Applications","volume":"13 1","pages":"1151-1160"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68126575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.22075/IJNAA.2022.5660
Saja Mohammad, Z. Alabacy
In this paper, a new sparse method called (MAVE-SiER) is proposed, to introduce MAVE-SiER, we combined the effective sufficient dimension reduction method MAVE with the sparse method Signal extraction approach to multivariate regression (SiER). MAVE-SiER has the benefit of expanding the Signal extraction method to multivariate regression (SiER) to nonlinear and multi-dimensional regression. MAVE-SiER also allows MAVE to deal with problems which the predictors are highly correlated. MAVE-SiER may estimate dimensions exhaustively while concurrently choosing useful variables. Simulation studies confirmed MAVE-SiER performance.
{"title":"Sparse minimum average variance estimation through signal extraction approach to multivariate regression","authors":"Saja Mohammad, Z. Alabacy","doi":"10.22075/IJNAA.2022.5660","DOIUrl":"https://doi.org/10.22075/IJNAA.2022.5660","url":null,"abstract":"In this paper, a new sparse method called (MAVE-SiER) is proposed, to introduce MAVE-SiER, we combined the effective sufficient dimension reduction method MAVE with the sparse method Signal extraction approach to multivariate regression (SiER). MAVE-SiER has the benefit of expanding the Signal extraction method to multivariate regression (SiER) to nonlinear and multi-dimensional regression. MAVE-SiER also allows MAVE to deal with problems which the predictors are highly correlated. MAVE-SiER may estimate dimensions exhaustively while concurrently choosing useful variables. Simulation studies confirmed MAVE-SiER performance.","PeriodicalId":14240,"journal":{"name":"International Journal of Nonlinear Analysis and Applications","volume":"13 1","pages":"1167-1173"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68126700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.22075/IJNAA.2022.5673
S. Pushpalatha, Shrishail Math
The aim of the recognition in the human activity is to recognize the actions of the individuals using a set of observations and their environmental conditions. Since last two decades, the research on this Human Activity Recognition (HAR) has captured the attention of several computer science communities because of the strength to provide support to different applications and the connection to different fields of study such as, human-computer interaction, healthcare, monitoring, entertainment and education. There are many existing methods like deep learning which have been used to develop to recognize the different activities of the human, but couldn’t identify the sudden change of the activities in the human. This paper presents a method using the deep learning methods which can recognize the specific identities and identify a change from one activity to another for the applications of the healthcare. In this method, a deep convolutional neural network is built using which the features are extracted for the collection of the data from the sensors. After which the Gated Recurrent Unit (GRU) captures the long-tern dependency between the different actions which helps to improve the identification rate of the HAR. From the CNN and GRU, a model of wearable sensor can be proposed which can identify the changes of the activities and can accurately recognize these activities. Experiment have been conducted using open-source University of California (UCI) HAR dataset which composed of six different activity such as lying, standing, sitting, walking downstairs, walking upstairs and walking. The CNN-based model achieves a detection accuracy of 95.99% whereas the CNN-GRU model achieves a detection accuracy of 96.79% which is better than most existing HAR methods.
{"title":"Hybrid deep learning framework for human activity recognition","authors":"S. Pushpalatha, Shrishail Math","doi":"10.22075/IJNAA.2022.5673","DOIUrl":"https://doi.org/10.22075/IJNAA.2022.5673","url":null,"abstract":"The aim of the recognition in the human activity is to recognize the actions of the individuals using a set of observations and their environmental conditions. Since last two decades, the research on this Human Activity Recognition (HAR) has captured the attention of several computer science communities because of the strength to provide support to different applications and the connection to different fields of study such as, human-computer interaction, healthcare, monitoring, entertainment and education. There are many existing methods like deep learning which have been used to develop to recognize the different activities of the human, but couldn’t identify the sudden change of the activities in the human. This paper presents a method using the deep learning methods which can recognize the specific identities and identify a change from one activity to another for the applications of the healthcare. In this method, a deep convolutional neural network is built using which the features are extracted for the collection of the data from the sensors. After which the Gated Recurrent Unit (GRU) captures the long-tern dependency between the different actions which helps to improve the identification rate of the HAR. From the CNN and GRU, a model of wearable sensor can be proposed which can identify the changes of the activities and can accurately recognize these activities. Experiment have been conducted using open-source University of California (UCI) HAR dataset which composed of six different activity such as lying, standing, sitting, walking downstairs, walking upstairs and walking. The CNN-based model achieves a detection accuracy of 95.99% whereas the CNN-GRU model achieves a detection accuracy of 96.79% which is better than most existing HAR methods.","PeriodicalId":14240,"journal":{"name":"International Journal of Nonlinear Analysis and Applications","volume":"13 1","pages":"1225-1237"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68126741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.22075/ijnaa.2022.5907
Heba Fawzy, Asmaa Ghalib
Quality control Charts were used to monitor the number of infections with the emerging corona virus (Covid-19) for the purpose of predicting the extent of the disease's control, knowing the extent of its spread, and determining the injuries if they were within or outside the limits of the control charts. The research aims to use each of the control chart of the (Kernel Principal Component Analysis Control Chart) and (K- Nearest Neighbor Control Chart). As (18) variables representing the governorates of Iraq were used, depending on the daily epidemiological position of the Public Health Department of the Iraqi Ministry of Health. To compare the performance of the charts, a measure of average length of run was adopted, as the results showed that the number of infection with the new Corona virus is out of control, and that the (KNN) chart had better performance in the short term with a relative equality in the performance of the two charts in the medium and long rang
质量控制图用于监测新冠病毒感染人数,以预测疾病控制程度,了解其传播程度,并确定伤害是否在控制图范围内或之外。本研究的目的是利用核主成分分析控制图(Kernel Principal Component Analysis control chart)和K近邻控制图(K- Nearest Neighbor control chart)中的每一种控制图。根据伊拉克卫生部公共卫生司的每日流行病学情况,使用了代表伊拉克各省的变量。为了比较图表的性能,采用平均运行长度的度量,因为结果表明,新型冠状病毒感染人数处于失控状态,(KNN)图表在短期内表现较好,两个图表在中长期表现相对相等
{"title":"Predicting of infected People with Corona virus (covid-19) by using Non-Parametric Quality Control Charts","authors":"Heba Fawzy, Asmaa Ghalib","doi":"10.22075/ijnaa.2022.5907","DOIUrl":"https://doi.org/10.22075/ijnaa.2022.5907","url":null,"abstract":"Quality control Charts were used to monitor the number of infections with the emerging corona virus (Covid-19) for the purpose of predicting the extent of the disease's control, knowing the extent of its spread, and determining the injuries if they were within or outside the limits of the control charts. The research aims to use each of the control chart of the (Kernel Principal Component Analysis Control Chart) and (K- Nearest Neighbor Control Chart). As (18) variables representing the governorates of Iraq were used, depending on the daily epidemiological position of the Public Health Department of the Iraqi Ministry of Health. To compare the performance of the charts, a measure of average length of run was adopted, as the results showed that the number of infection with the new Corona virus is out of control, and that the (KNN) chart had better performance in the short term with a relative equality in the performance of the two charts in the medium and long rang","PeriodicalId":14240,"journal":{"name":"International Journal of Nonlinear Analysis and Applications","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68127822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.22075/ijnaa.2022.5923
M. H. Alameady, Maryim Omran Mosa, Amir A. Aljarrah, Huda Saleem Razzaq
A deep learning powerful models of machine learning indicated better performance as precision and speed for images classification. The purpose of this paper is the detection of patients suspected of pneumonia and a novel coronavirus. Convolutional Neural Network (CNN) is utilized for features extract and it classifies, where CNN classify features into three classes are COVID-19, NORMAL, and PNEUMONIA. In CNN updating weights by CNN backpropagation and SGDM optimization algorithms in the training stage. The performance of CNN on the dataset is a combination between Chest X-Ray dataset (1583-NORMAL images and 4272-PNEUMONIA images) and COVID-19 dataset (126-images) for automatically anticipate whether a patient has COVID-19 or PNEUMONIA, where accuracy 94.31% and F1-Score 88.48% in case 60% training, 20% testing, and 20% validation.
{"title":"Deep convolutional neural network classified the PNEUMONIA and Coronavirus diseases (COVID-19) by softmax nonlinearity function","authors":"M. H. Alameady, Maryim Omran Mosa, Amir A. Aljarrah, Huda Saleem Razzaq","doi":"10.22075/ijnaa.2022.5923","DOIUrl":"https://doi.org/10.22075/ijnaa.2022.5923","url":null,"abstract":"A deep learning powerful models of machine learning indicated better performance as precision and speed for images classification. The purpose of this paper is the detection of patients suspected of pneumonia and a novel coronavirus. Convolutional Neural Network (CNN) is utilized for features extract and it classifies, where CNN classify features into three classes are COVID-19, NORMAL, and PNEUMONIA. In CNN updating weights by CNN backpropagation and SGDM optimization algorithms in the training stage. The performance of CNN on the dataset is a combination between Chest X-Ray dataset (1583-NORMAL images and 4272-PNEUMONIA images) and COVID-19 dataset (126-images) for automatically anticipate whether a patient has COVID-19 or PNEUMONIA, where accuracy 94.31% and F1-Score 88.48% in case 60% training, 20% testing, and 20% validation.","PeriodicalId":14240,"journal":{"name":"International Journal of Nonlinear Analysis and Applications","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68127853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.22075/ijnaa.2022.6149
A. H. Shemail, M. J. Mohammed
In this paper, the intuitionistic fuzzy set and the triangular intuitionistic fuzzy number were displayed, as well as the intuitionistic fuzzy semi-parametric logistic regression model when the parameters and the dependent variable are fuzzy and the independent variables are crisp. Two methods were used to estimate the model on fuzzy data representing Coronavirus data, which are the suggested method and The Wang et al method, through the mean square error and the measure of goodness-of-fit, the suggested estimation method was the best.
{"title":"Comparison between some estimation methods for an intuitionistic fuzzy semi-parametric logistic regression model with practical application about covid-19","authors":"A. H. Shemail, M. J. Mohammed","doi":"10.22075/ijnaa.2022.6149","DOIUrl":"https://doi.org/10.22075/ijnaa.2022.6149","url":null,"abstract":"In this paper, the intuitionistic fuzzy set and the triangular intuitionistic fuzzy number were displayed, as well as the intuitionistic fuzzy semi-parametric logistic regression model when the parameters and the dependent variable are fuzzy and the independent variables are crisp. Two methods were used to estimate the model on fuzzy data representing Coronavirus data, which are the suggested method and The Wang et al method, through the mean square error and the measure of goodness-of-fit, the suggested estimation method was the best.","PeriodicalId":14240,"journal":{"name":"International Journal of Nonlinear Analysis and Applications","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68128106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.22075/IJNAA.2021.23245.2506
Tirth Ram, Mohd Iqbal
In this work, we study generalized $ H(.,.,.,.)$-$varphi$-$eta-$ cocoercive operator to find the solution of variational like inclusion involving an infinite family of set-valued mappings in semi-inner product spaces via resolvent equation approach. Furthermore, we established an equivalence between the set-valued variational-like inclusion problem and fixed point problem by employing generalized resolvent operator technique involving generalized $H(.,.,.,.)$-$varphi$-$eta$-cocoercive operator. Using the equivalent formulation of set-valued variational-like inclusion problem and resolvent equation problem, an iterative algorithm is developed that approximate the uniqueness of solution of the resolvent equation problem.
{"title":"$H(.,.,.,.)$-$varphi$-$eta$-cocoercive Operator with an Application to Variational Inclusions","authors":"Tirth Ram, Mohd Iqbal","doi":"10.22075/IJNAA.2021.23245.2506","DOIUrl":"https://doi.org/10.22075/IJNAA.2021.23245.2506","url":null,"abstract":"In this work, we study generalized $ H(.,.,.,.)$-$varphi$-$eta-$ cocoercive operator to find the solution of variational like inclusion involving an infinite family of set-valued mappings in semi-inner product spaces via resolvent equation approach. Furthermore, we established an equivalence between the set-valued variational-like inclusion problem and fixed point problem by employing generalized resolvent operator technique involving generalized $H(.,.,.,.)$-$varphi$-$eta$-cocoercive operator. Using the equivalent formulation of set-valued variational-like inclusion problem and resolvent equation problem, an iterative algorithm is developed that approximate the uniqueness of solution of the resolvent equation problem.","PeriodicalId":14240,"journal":{"name":"International Journal of Nonlinear Analysis and Applications","volume":"13 1","pages":"1311-1327"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68119548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}