With the widespread use of embedded systems, chaos is a nonlinear system with certainty and complexity. It is an important topic in the field of information security at present, and it is an effective way to apply to embedded systems. It has great practical value in theory and in practice. This research mainly focuses on the encryption technology of SQLite embedded database and proposes an improved sparrow algorithm (Logistic Chaos Sparrow Search Algorithm, LCSSA) based on Logistic Chaos Map. It shows that the security level of SQLite in web development is higher than that of conventional Access. The population is initialized by the logistic chaotic mapping method, which improves the quality of the initial solution, increases the diversity of the population, and reduces the risk of premature maturity of the algorithm. The initial value y 0 determines the encryption method of the nonlinear function. Taking the integer variable (int) as an example, the value range is -231~231. It can be seen that the key space is sufficient to prevent various conventional attacks. When the key is the wrong key, decryption will not yield any data. It can be found that encryption and decryption are very sensitive to the key, which is also determined by the sensitivity of chaotic encryption system to the initial value. The benchmark function compares the performance of the improved algorithm with the algorithm before the improvement and compares it with the SSA. The LCSSA has better convergence performance, higher accuracy, and better stability.
{"title":"SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm","authors":"Junlong Shi","doi":"10.1155/2023/5187602","DOIUrl":"https://doi.org/10.1155/2023/5187602","url":null,"abstract":"With the widespread use of embedded systems, chaos is a nonlinear system with certainty and complexity. It is an important topic in the field of information security at present, and it is an effective way to apply to embedded systems. It has great practical value in theory and in practice. This research mainly focuses on the encryption technology of SQLite embedded database and proposes an improved sparrow algorithm (Logistic Chaos Sparrow Search Algorithm, LCSSA) based on Logistic Chaos Map. It shows that the security level of SQLite in web development is higher than that of conventional Access. The population is initialized by the logistic chaotic mapping method, which improves the quality of the initial solution, increases the diversity of the population, and reduces the risk of premature maturity of the algorithm. The initial value \u0000 \u0000 \u0000 \u0000 y\u0000 \u0000 \u0000 0\u0000 \u0000 \u0000 \u0000 determines the encryption method of the nonlinear function. Taking the integer variable (int) as an example, the value range is -231~231. It can be seen that the key space is sufficient to prevent various conventional attacks. When the key is the wrong key, decryption will not yield any data. It can be found that encryption and decryption are very sensitive to the key, which is also determined by the sensitivity of chaotic encryption system to the initial value. The benchmark function compares the performance of the improved algorithm with the algorithm before the improvement and compares it with the SSA. The LCSSA has better convergence performance, higher accuracy, and better stability.","PeriodicalId":14766,"journal":{"name":"J. Appl. Math.","volume":"23 1","pages":"5187602:1-5187602:10"},"PeriodicalIF":0.0,"publicationDate":"2023-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91184763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Identity information security is faced with various challenges, and the traditional identification technology cannot meet the needs of public security. Therefore, it is necessary to further explore and study new identification technologies. In order to solve the complex image preprocessing problems, difficult feature extraction by artificial design algorithm, and low accuracy of lip print recognition, a method based on the convolutional neural network is proposed, by building a convolutional neural network called LPRNet (Lip Print Recognition Network). The obtained lip print image is inputted into the training recognition model of the network to simplify the lip print image preprocessing. By extracting feature information and sampling operation, the model training parameters are reduced, which overcomes the difficulty of designing a complex algorithm to extract features. By analyzing and comparing the experimental results, a higher recognition rate is obtained, and the validity of the method is verified.
{"title":"Lip Print Recognition Algorithm Based on Convolutional Network","authors":"Hongcheng Zhou","doi":"10.1155/2023/4448861","DOIUrl":"https://doi.org/10.1155/2023/4448861","url":null,"abstract":"Identity information security is faced with various challenges, and the traditional identification technology cannot meet the needs of public security. Therefore, it is necessary to further explore and study new identification technologies. In order to solve the complex image preprocessing problems, difficult feature extraction by artificial design algorithm, and low accuracy of lip print recognition, a method based on the convolutional neural network is proposed, by building a convolutional neural network called LPRNet (Lip Print Recognition Network). The obtained lip print image is inputted into the training recognition model of the network to simplify the lip print image preprocessing. By extracting feature information and sampling operation, the model training parameters are reduced, which overcomes the difficulty of designing a complex algorithm to extract features. By analyzing and comparing the experimental results, a higher recognition rate is obtained, and the validity of the method is verified.","PeriodicalId":14766,"journal":{"name":"J. Appl. Math.","volume":"35 1","pages":"4448861:1-4448861:8"},"PeriodicalIF":0.0,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75254758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, the general framework for calculating the stability of equilibria, Hopf bifurcation of a delayed prey-predator system with an SI type of disease in the prey population, is investigated. The impact of the incubation period delay on disease transmission utilizing a nonlinear incidence rate was taken into account. For the purpose of explaining the predation process, a modified Holling type II functional response was used. First, the existence, uniform boundedness, and positivity of the solutions of the considered model system, along with the behavior of equilibria and the existence of Hopf bifurcation, are studied. The critical values of the delay parameter for which stability switches and the nature of the Hopf bifurcation by using normal form theory and center manifold theorem are identified. Additionally, using numerical simulations and a hypothetical dataset, various dynamic characteristics are discovered, including stability switches, chaos, and Hopf bifurcation scenarios.
{"title":"The Dynamics of a Delayed Ecoepidemiological Model with Nonlinear Incidence Rate","authors":"R. M. Hussien, R. K. Naji","doi":"10.1155/2023/1366763","DOIUrl":"https://doi.org/10.1155/2023/1366763","url":null,"abstract":"In this paper, the general framework for calculating the stability of equilibria, Hopf bifurcation of a delayed prey-predator system with an SI type of disease in the prey population, is investigated. The impact of the incubation period delay on disease transmission utilizing a nonlinear incidence rate was taken into account. For the purpose of explaining the predation process, a modified Holling type II functional response was used. First, the existence, uniform boundedness, and positivity of the solutions of the considered model system, along with the behavior of equilibria and the existence of Hopf bifurcation, are studied. The critical values of the delay parameter for which stability switches and the nature of the Hopf bifurcation by using normal form theory and center manifold theorem are identified. Additionally, using numerical simulations and a hypothetical dataset, various dynamic characteristics are discovered, including stability switches, chaos, and Hopf bifurcation scenarios.","PeriodicalId":14766,"journal":{"name":"J. Appl. Math.","volume":"1 1","pages":"1366763:1-1366763:24"},"PeriodicalIF":0.0,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91218406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Crime is one among the most challenging problems in most developing countries in which unemployment is among the causes. Not all kind of crimes can be eradicated indeed; this paper is intended to contribute on eradication of unemployment-related crimes in the developing countries by proposing a deterministic mathematical model of unemployment-crime dynamics including vocational training and employment as control measures for crime. The study adopts the epidemiological model concepts on model formulation and model analysis while considering unemployment as main driver of crime. The basic properties of the model are analyzed, and well-posed of the model is established by using the Lipschitz condition. The next-generation matrix is used to obtain the criminal reproduction number which help to derive the conditions for local and global stability of the model. Moreover, the existence of backward and forward bifurcation when the crime reproduction number is equal to one was analyzed by center manifold theory. Simulations of the model are carried out to validate the theoretical part of the model and demonstrate vocational training, and employment strategies are more effective in combating crime when applied simultaneously. The findings suggest that unemployment problem should be addressed in order to reduce the number of unemployed individuals in joining the criminal activities.
{"title":"Mathematical Model for Crimes in Developing Countries with Some Control Strategies","authors":"Bilali Mataru, O. J. Abonyo, D. Malonza","doi":"10.1155/2023/8699882","DOIUrl":"https://doi.org/10.1155/2023/8699882","url":null,"abstract":"Crime is one among the most challenging problems in most developing countries in which unemployment is among the causes. Not all kind of crimes can be eradicated indeed; this paper is intended to contribute on eradication of unemployment-related crimes in the developing countries by proposing a deterministic mathematical model of unemployment-crime dynamics including vocational training and employment as control measures for crime. The study adopts the epidemiological model concepts on model formulation and model analysis while considering unemployment as main driver of crime. The basic properties of the model are analyzed, and well-posed of the model is established by using the Lipschitz condition. The next-generation matrix is used to obtain the criminal reproduction number which help to derive the conditions for local and global stability of the model. Moreover, the existence of backward and forward bifurcation when the crime reproduction number is equal to one was analyzed by center manifold theory. Simulations of the model are carried out to validate the theoretical part of the model and demonstrate vocational training, and employment strategies are more effective in combating crime when applied simultaneously. The findings suggest that unemployment problem should be addressed in order to reduce the number of unemployed individuals in joining the criminal activities.","PeriodicalId":14766,"journal":{"name":"J. Appl. Math.","volume":"128 1","pages":"8699882:1-8699882:14"},"PeriodicalIF":0.0,"publicationDate":"2023-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78751620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saviour Worlanyo Akuamoah, John Coker Ayimah, D. Yaro, Elikem Kofi Krampa, Awura Amma Adomaa Danso
In this study, a novel modified SIR model is presented with two control measures to predict the endpoint of COVID-19, in top three sub-Saharan African countries (South Africa, Ethiopia, and Kenya) including Ghana and top four European countries (France, Germany, UK, and Italy). The reproduction number’s sensitivity indices with regard to the model parameters were explicitly derived and then numerically evaluated. Numerical simulations of the suggested optimal control schemes in general showed a continuous result of decline at different anticipated extinction timelines. Another interesting observation was that in the simulation of sub-Saharan African dynamics, it was observed that the use of personal protective equipment was more effective than the use of vaccination, whereas in Europe, the use of vaccination was more effective than personal protective equipment. From the simulations, the conclusion is that COVID-19 will end before the 3rd year in Ghana, before the 6th year in Kenya, and before the 9th year in both Ethiopia and South Africa.
{"title":"Predicting COVID-19 Pandemic Endpoint in Some Sub-Saharan African and European Countries","authors":"Saviour Worlanyo Akuamoah, John Coker Ayimah, D. Yaro, Elikem Kofi Krampa, Awura Amma Adomaa Danso","doi":"10.1155/2023/7882843","DOIUrl":"https://doi.org/10.1155/2023/7882843","url":null,"abstract":"In this study, a novel modified SIR model is presented with two control measures to predict the endpoint of COVID-19, in top three sub-Saharan African countries (South Africa, Ethiopia, and Kenya) including Ghana and top four European countries (France, Germany, UK, and Italy). The reproduction number’s sensitivity indices with regard to the model parameters were explicitly derived and then numerically evaluated. Numerical simulations of the suggested optimal control schemes in general showed a continuous result of decline at different anticipated extinction timelines. Another interesting observation was that in the simulation of sub-Saharan African dynamics, it was observed that the use of personal protective equipment was more effective than the use of vaccination, whereas in Europe, the use of vaccination was more effective than personal protective equipment. From the simulations, the conclusion is that COVID-19 will end before the 3rd year in Ghana, before the 6th year in Kenya, and before the 9th year in both Ethiopia and South Africa.","PeriodicalId":14766,"journal":{"name":"J. Appl. Math.","volume":"4 1","pages":"7882843:1-7882843:10"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78355909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this article, we provide refined inequalities for a convex Riemann’s integrable function using refinements of the classical Hermite-Hadamard inequality. The obtained results are applied on special functions to establish new improvements of inequalities on the weighted logarithmic mean and weighted identric mean. Moreover, corresponding operator inequalities are introduced based on the scalar inequalities and the monotonicity property for operators.
{"title":"Improvements of Logarithmic and Identric Mean Inequalities for Scalars and Operators","authors":"Aliaa Burqan, Abeer Abu-Snainah, Rania Saadeh","doi":"10.1155/2023/5195233","DOIUrl":"https://doi.org/10.1155/2023/5195233","url":null,"abstract":"In this article, we provide refined inequalities for a convex Riemann’s integrable function using refinements of the classical Hermite-Hadamard inequality. The obtained results are applied on special functions to establish new improvements of inequalities on the weighted logarithmic mean and weighted identric mean. Moreover, corresponding operator inequalities are introduced based on the scalar inequalities and the monotonicity property for operators.","PeriodicalId":14766,"journal":{"name":"J. Appl. Math.","volume":"225 1","pages":"5195233:1-5195233:7"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76311485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper deals with the solution of a third kind mixed integro-differential equation (MIDE) in displacement type in space L 2 − 1 , 1 × C 0 , T , T <