首页 > 最新文献

Communications on Applied Nonlinear Analysis最新文献

英文 中文
Fog Computing Simulators: A Comprehensive Research and Analytical Study 雾计算模拟器:综合研究与分析
Q4 Mathematics Pub Date : 2024-07-18 DOI: 10.52783/cana.v31.1057
Rushikesh Rajendra Nikam, Dr. Dilip Motwani
Fog computing, a novel paradigm for distributed computing, has found extensive applications in critical sectors like healthcare. This study is dedicated to setting up and evaluating network properties crucial for real-time decision-making systems. Specifically, it comprehensively and analytically assesses two leading fog computing simulators, YAFS and LEAF. By focusing on key performance metrics—memory usage, CPU consumption, and execution latency—the research aims to clearly delineate the capabilities and limitations of each simulator. Through meticulous comparative analysis, the study identifies which simulator offers superior efficiency and scalability in modelling complex fog computing environments within healthcare. Moreover, the paper aims to highlight both the strengths and weaknesses of YAFS and LEAF, providing foundational insights to inform the deployment of fog computing solutions in healthcare settings. This research not only examines the technical properties and performance of these simulators but also explores broader implications of adopting fog computing over traditional cloud architectures. Ultimately, the findings aim to serve as a valuable guide for researchers and practitioners in selecting the most suitable simulation tools, thereby facilitating the enhanced design and optimization of fog-based applications.
雾计算是分布式计算的一种新模式,已在医疗保健等关键领域得到广泛应用。本研究致力于建立和评估对实时决策系统至关重要的网络属性。具体来说,它对两个领先的雾计算模拟器 YAFS 和 LEAF 进行了全面的分析评估。通过关注关键性能指标--内存使用量、CPU 消耗量和执行延迟--研究旨在明确划分每个模拟器的能力和局限性。通过细致的比较分析,该研究确定了哪种模拟器在模拟医疗保健领域复杂的雾计算环境时具有更高的效率和可扩展性。此外,本文还旨在强调 YAFS 和 LEAF 的优缺点,为在医疗环境中部署雾计算解决方案提供基础性见解。这项研究不仅考察了这些模拟器的技术特性和性能,还探讨了采用雾计算而非传统云架构的更广泛意义。最终,研究结果旨在为研究人员和从业人员选择最合适的模拟工具提供有价值的指导,从而促进雾计算应用的设计和优化。
{"title":"Fog Computing Simulators: A Comprehensive Research and Analytical Study","authors":"Rushikesh Rajendra Nikam, Dr. Dilip Motwani","doi":"10.52783/cana.v31.1057","DOIUrl":"https://doi.org/10.52783/cana.v31.1057","url":null,"abstract":"Fog computing, a novel paradigm for distributed computing, has found extensive applications in critical sectors like healthcare. This study is dedicated to setting up and evaluating network properties crucial for real-time decision-making systems. Specifically, it comprehensively and analytically assesses two leading fog computing simulators, YAFS and LEAF. By focusing on key performance metrics—memory usage, CPU consumption, and execution latency—the research aims to clearly delineate the capabilities and limitations of each simulator. Through meticulous comparative analysis, the study identifies which simulator offers superior efficiency and scalability in modelling complex fog computing environments within healthcare. Moreover, the paper aims to highlight both the strengths and weaknesses of YAFS and LEAF, providing foundational insights to inform the deployment of fog computing solutions in healthcare settings. This research not only examines the technical properties and performance of these simulators but also explores broader implications of adopting fog computing over traditional cloud architectures. Ultimately, the findings aim to serve as a valuable guide for researchers and practitioners in selecting the most suitable simulation tools, thereby facilitating the enhanced design and optimization of fog-based applications.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141826295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some Results of Data Encryption and Decryption using Euler’s Totient Function 使用欧拉商函数进行数据加密和解密的一些结果
Q4 Mathematics Pub Date : 2024-07-18 DOI: 10.52783/cana.v31.1063
Gobburi Rekha, V. Srinivas
In this paper, we discuss about the Hill Cipher cryptosystem, the RSA public-key cryptosystem, developed by Rivest, Shamir, Adleman for text encoding and decoding. To encrypt and decrypt the message, we use the Euler Phi-function, congruences, and matrix multiplication. Further, we employ two keys for coding and decoding. Introduction: In present, computer networks, internet and mobile communications are important and inevitable part of our society and security of information from hackers is a big task. One of the most widely used applications for information security is Cryptography. Usually in Hill cipher there are two keys, of which one acts as encryption key and the other one acts as decryption key.  In this paper we discuss about Hill Cipher using only one key for data encryption and data decryption. Further, we extend our result with dual encryption and decryption process which is explained by using the RSA public key cryptosystem and Hill Cipher and they together execute a powerful cryptosystem to secure the data. Objectives: The purpose of this paper is to obtain and compare the result of data encryption and data decryption using: A matrix which is invertible. A matrix which is Involutory. An RSA cryptosystem which is applied for Hill Cipher where the matrix is Involutory. Methods: Using Hill Cipher and thereafter Hill Cipher - RSA together we have encrypted and decrypted the data under modulo 255. Results: The text message is converted to coded message and then original message is retrieved by using the three different techniques. Conclusions: As the paper involves two stages of encryption and decryption where public key and private key which are unthinkable by the third parities, the security of information is highly appreciable.
本文讨论希尔密码系统,即 Rivest、Shamir 和 Adleman 开发的用于文本编码和解码的 RSA 公钥密码系统。为了加密和解密信息,我们使用了欧拉腓函数、全等和矩阵乘法。此外,我们还使用两个密钥进行编码和解码。简介当前,计算机网络、互联网和移动通信是我们社会不可避免的重要组成部分,而保护信息安全免遭黑客攻击则是一项艰巨的任务。信息安全最广泛的应用之一就是密码学。希尔密码通常有两个密钥,其中一个作为加密密钥,另一个作为解密密钥。 本文讨论的希尔密码只使用一个密钥进行数据加密和解密。此外,我们还通过使用 RSA 公钥密码系统和希尔密码来解释双重加密和解密过程,从而扩展我们的成果,并共同执行一个强大的密码系统来保护数据安全。研究目的本文的目的是利用以下方法获得并比较数据加密和数据解密的结果: 可逆矩阵。不可逆矩阵。应用于希尔密码的 RSA 密码系统,其中矩阵为非法定矩阵。 方法:使用希尔密码及其后的希尔密码-RSA,我们对模数为 255 的数据进行了加密和解密。结果:使用三种不同的技术将文本信息转换为编码信息,然后检索原始信息。结论由于本文涉及加密和解密两个阶段,其中的公钥和私钥是第三方无法想象的,因此信息的安全性非常高。
{"title":"Some Results of Data Encryption and Decryption using Euler’s Totient Function","authors":"Gobburi Rekha, V. Srinivas","doi":"10.52783/cana.v31.1063","DOIUrl":"https://doi.org/10.52783/cana.v31.1063","url":null,"abstract":"In this paper, we discuss about the Hill Cipher cryptosystem, the RSA public-key cryptosystem, developed by Rivest, Shamir, Adleman for text encoding and decoding. To encrypt and decrypt the message, we use the Euler Phi-function, congruences, and matrix multiplication. Further, we employ two keys for coding and decoding. \u0000Introduction: In present, computer networks, internet and mobile communications are important and inevitable part of our society and security of information from hackers is a big task. One of the most widely used applications for information security is Cryptography. Usually in Hill cipher there are two keys, of which one acts as encryption key and the other one acts as decryption key.  In this paper we discuss about Hill Cipher using only one key for data encryption and data decryption. Further, we extend our result with dual encryption and decryption process which is explained by using the RSA public key cryptosystem and Hill Cipher and they together execute a powerful cryptosystem to secure the data. \u0000Objectives: The purpose of this paper is to obtain and compare the result of data encryption and data decryption using: \u0000 \u0000A matrix which is invertible. \u0000A matrix which is Involutory. \u0000An RSA cryptosystem which is applied for Hill Cipher where the matrix is Involutory. \u0000 \u0000Methods: Using Hill Cipher and thereafter Hill Cipher - RSA together we have encrypted and decrypted the data under modulo 255. \u0000Results: The text message is converted to coded message and then original message is retrieved by using the three different techniques. \u0000Conclusions: As the paper involves two stages of encryption and decryption where public key and private key which are unthinkable by the third parities, the security of information is highly appreciable.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141824656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Common Fixed Point Result in Menger Space 门格尔空间的共同定点结果
Q4 Mathematics Pub Date : 2024-07-18 DOI: 10.52783/cana.v31.1065
Ajay Kumar Chaudhary
By using compatibility condition type (P) in probabilistic metric space, establish common fixed point results for four self-mappings with control function in [0,1]. The result of Chaudhary et. al [5] is a particular case of this new result and it extends and generalizes other similar results in the literature.
通过使用概率度量空间中的相容条件类型 (P),建立了控制函数在 [0,1] 中的四个自映射的共同定点结果。Chaudhary 等人[5] 的结果是这一新结果的一个特殊案例,它扩展并概括了文献中的其他类似结果。
{"title":"A Common Fixed Point Result in Menger Space","authors":"Ajay Kumar Chaudhary","doi":"10.52783/cana.v31.1065","DOIUrl":"https://doi.org/10.52783/cana.v31.1065","url":null,"abstract":"By using compatibility condition type (P) in probabilistic metric space, establish common fixed point results for four self-mappings with control function in [0,1]. The result of Chaudhary et. al [5] is a particular case of this new result and it extends and generalizes other similar results in the literature.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141824358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Advertising and Pricing for Perishable Inventory with Freshness-Related Demand in a Hybrid Partial Prepayment and Trade Credit Supply Chain 在部分预付款和贸易信贷混合供应链中优化具有新鲜度相关需求的易腐存货的广告和定价
Q4 Mathematics Pub Date : 2024-07-18 DOI: 10.52783/cana.v31.1060
T.Vanjikkodi
This paper investigates an inventory model addressing non-instantaneous deteriorating items with expiration concerns, incorporating a hybrid payment approach. The demand factors of this study are price-sensitive demand, product freshness considerations, and advertising frequency impact, which are critical elements in contemporary supply chain challenges. The proposed model investigates multiple prepayments and delayed payments to bolster business operations during financial emergencies. This study aims to enhance business flexibility, and the model reflects real-world complexities by introducing a time-dependent holding cost and accounting for partial backlogged shortages. The establishment of convexity ensures efficient optimization and numerical examples clearly illustrate how the proposed strategies influence overall enterprise profitability. Furthermore, the utilization of MATLAB for graphical representation enhances result availability and understanding. Sensitivity analysis enriches decision-making by providing important managerial insights during the recovery phase. This research contributes a strong foundation for inventory optimization that can adapt to changing post-pandemic economic conditions.
本文研究了一种库存模型,它结合了混合支付方法,解决了非瞬时变质物品的过期问题。本研究的需求因素包括价格敏感需求、产品新鲜度考虑和广告频率影响,这些都是当代供应链挑战中的关键因素。所提出的模型研究了多重预付款和延迟付款,以在金融紧急情况下支持业务运营。这项研究旨在提高业务灵活性,模型通过引入与时间相关的持有成本和考虑部分积压短缺,反映了现实世界的复杂性。凸性的建立确保了高效的优化,数值示例清楚地说明了所提出的策略如何影响企业的整体盈利能力。此外,利用 MATLAB 进行图形表示可提高结果的可用性和理解性。敏感性分析在恢复阶段提供了重要的管理见解,从而丰富了决策。这项研究为库存优化奠定了坚实的基础,使其能够适应大流行后不断变化的经济条件。
{"title":"Optimizing Advertising and Pricing for Perishable Inventory with Freshness-Related Demand in a Hybrid Partial Prepayment and Trade Credit Supply Chain","authors":"T.Vanjikkodi","doi":"10.52783/cana.v31.1060","DOIUrl":"https://doi.org/10.52783/cana.v31.1060","url":null,"abstract":"This paper investigates an inventory model addressing non-instantaneous deteriorating items with expiration concerns, incorporating a hybrid payment approach. The demand factors of this study are price-sensitive demand, product freshness considerations, and advertising frequency impact, which are critical elements in contemporary supply chain challenges. The proposed model investigates multiple prepayments and delayed payments to bolster business operations during financial emergencies. This study aims to enhance business flexibility, and the model reflects real-world complexities by introducing a time-dependent holding cost and accounting for partial backlogged shortages. The establishment of convexity ensures efficient optimization and numerical examples clearly illustrate how the proposed strategies influence overall enterprise profitability. \u0000Furthermore, the utilization of MATLAB for graphical representation enhances result availability and understanding. Sensitivity analysis enriches decision-making by providing important managerial insights during the recovery phase. This research contributes a strong foundation for inventory optimization that can adapt to changing post-pandemic economic conditions.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 46","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141826691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Malware Detection System for Enhanced Cloud Security Utilizing Trust-Based Glow-Worm Swarm Optimization and Recurrent Deep Neural Networks 利用基于信任的萤火虫群优化和递归深度神经网络增强云安全的混合恶意软件检测系统
Q4 Mathematics Pub Date : 2024-07-17 DOI: 10.52783/cana.v31.994
R. Swathi, Sivakumar Depuru, M. Sakthivel, S. Sivanantham, K. Amala, Pavan Kumar
User credentials are vulnerable to exposure in demilitarized zones due to software vulnerabilities and hardware threats. This research aims to mitigate these risks by proposing a sophisticated trust-based malware detection (T-MALWARE DETECTION) method that can accurately classify data. The proposed system utilizes an enhanced Glow-Worm Swarm Optimization (IGWSO) technique to efficiently cluster datasets. To classify potential intrusions and assign trust levels to cloud data after clustering, a Recurrent Neural Network (RNN) approach is employed. The effectiveness of the Trust-oriented Malware Detection System (T-MALWARE DETECTIONS) is evaluated using metrics such as detection rate, precision, recall, and F-measure. This system is developed using Java and the CloudSimulator (CloudSim) tool, allowing for a thorough evaluation of its performance in comparison to contemporary state-of-the-art systems.
由于软件漏洞和硬件威胁,用户凭证在非军事区很容易暴露。本研究旨在通过提出一种复杂的基于信任的恶意软件检测(T-MALWARE DETECTION)方法来降低这些风险,该方法可以对数据进行准确分类。所提出的系统利用增强型光辉虫群优化(IGWSO)技术对数据集进行有效聚类。为了对潜在入侵进行分类,并在聚类后为云数据分配信任级别,系统采用了循环神经网络(RNN)方法。以信任为导向的恶意软件检测系统(T-MALWARE DETECTIONS)的有效性使用检测率、精确度、召回率和 F-measure 等指标进行评估。该系统是使用 Java 和云模拟器(CloudSim)工具开发的,与当代最先进的系统相比,可以对其性能进行全面评估。
{"title":"A Hybrid Malware Detection System for Enhanced Cloud Security Utilizing Trust-Based Glow-Worm Swarm Optimization and Recurrent Deep Neural Networks","authors":"R. Swathi, Sivakumar Depuru, M. Sakthivel, S. Sivanantham, K. Amala, Pavan Kumar","doi":"10.52783/cana.v31.994","DOIUrl":"https://doi.org/10.52783/cana.v31.994","url":null,"abstract":"User credentials are vulnerable to exposure in demilitarized zones due to software vulnerabilities and hardware threats. This research aims to mitigate these risks by proposing a sophisticated trust-based malware detection (T-MALWARE DETECTION) method that can accurately classify data. The proposed system utilizes an enhanced Glow-Worm Swarm Optimization (IGWSO) technique to efficiently cluster datasets. To classify potential intrusions and assign trust levels to cloud data after clustering, a Recurrent Neural Network (RNN) approach is employed. The effectiveness of the Trust-oriented Malware Detection System (T-MALWARE DETECTIONS) is evaluated using metrics such as detection rate, precision, recall, and F-measure. This system is developed using Java and the CloudSimulator (CloudSim) tool, allowing for a thorough evaluation of its performance in comparison to contemporary state-of-the-art systems.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":"135 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141828614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effectiveness of Customer Relationship Management Practices at Hyundai Motors 现代汽车公司客户关系管理实践的有效性
Q4 Mathematics Pub Date : 2024-07-17 DOI: 10.52783/cana.v31.1004
G. M. Siddeeq, Dr. G. Silpa
Companies constantly strive to increase their profits, but the competition is tough in the market. Businesses try to either keep their existing customers through increased satisfaction, or to win new customers and new market shares in order to reach their objective. The term Customer Relationship Management was developed in the late 1990s, in order to facilitate relationships at the “business to consumer market”. CRM is used as a tool in order to build long term relationships between sellers and buyers. Through this relationship both the company and its customers should receive mutual benefits, such as retention and good service. Hence this paper helps to study the effectiveness of CRM practices and its impact on customer satisfaction at Hyundai motors.
企业不断努力增加利润,但市场竞争十分激烈。企业要么通过提高满意度来留住现有客户,要么通过赢得新客户和新市场份额来实现目标。客户关系管理一词诞生于 20 世纪 90 年代末,目的是促进 "企业对消费者市场 "的关系。客户关系管理被用作在卖方和买方之间建立长期关系的工具。通过这种关系,公司和客户双方都应获得互惠互利,如保留客户和提供优质服务。因此,本文有助于研究现代汽车公司客户关系管理实践的有效性及其对客户满意度的影响。
{"title":"Effectiveness of Customer Relationship Management Practices at Hyundai Motors","authors":"G. M. Siddeeq, Dr. G. Silpa","doi":"10.52783/cana.v31.1004","DOIUrl":"https://doi.org/10.52783/cana.v31.1004","url":null,"abstract":"Companies constantly strive to increase their profits, but the competition is tough in the market. Businesses try to either keep their existing customers through increased satisfaction, or to win new customers and new market shares in order to reach their objective. The term Customer Relationship Management was developed in the late 1990s, in order to facilitate relationships at the “business to consumer market”. CRM is used as a tool in order to build long term relationships between sellers and buyers. Through this relationship both the company and its customers should receive mutual benefits, such as retention and good service. Hence this paper helps to study the effectiveness of CRM practices and its impact on customer satisfaction at Hyundai motors.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141828925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision–Making Problem for Triangular Hesitant Fuzzy Set 三角犹豫模糊集的决策问题
Q4 Mathematics Pub Date : 2024-07-17 DOI: 10.52783/cana.v31.1036
E. Fany Helena
In this paper, we proposed two new algorithms to address the task of multicriteria decision-making problems in which the criteria weights which have been unidentified, and alternatives are provided by triangular fuzzy numbers' linguistic values. A decision-making problem with assessments has been proposed on the basis of expected values. The expected values for two algorithms are calculated with two different 'Ranking Functions'. The weights are obtained by calculating the variance and mean of expected values with the aid of the triangular hesitant fuzzy decision matrix. The all alternatives ranking order is determined, and the maximum one is the best that can be identified easily. Lastly, a representative example is provided regarding the health issues of a community.
在本文中,我们提出了两种新算法,以解决标准权重尚未确定、备选方案由三角模糊数的语言值提供的多标准决策问题。在预期值的基础上提出了一个带有评估的决策问题。使用两种不同的 "排序函数 "计算两种算法的预期值。借助三角犹豫模糊决策矩阵,通过计算预期值的方差和均值来获得权重。确定了所有备选方案的排序顺序,其中最大的一个是可以轻松识别的最佳方案。最后,提供了一个关于社区健康问题的代表性实例。
{"title":"Decision–Making Problem for Triangular Hesitant Fuzzy Set","authors":"E. Fany Helena","doi":"10.52783/cana.v31.1036","DOIUrl":"https://doi.org/10.52783/cana.v31.1036","url":null,"abstract":"In this paper, we proposed two new algorithms to address the task of multicriteria decision-making problems in which the criteria weights which have been unidentified, and alternatives are provided by triangular fuzzy numbers' linguistic values. A decision-making problem with assessments has been proposed on the basis of expected values. The expected values for two algorithms are calculated with two different 'Ranking Functions'. The weights are obtained by calculating the variance and mean of expected values with the aid of the triangular hesitant fuzzy decision matrix. The all alternatives ranking order is determined, and the maximum one is the best that can be identified easily. Lastly, a representative example is provided regarding the health issues of a community.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141829069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Hybrid Work Models on Employee Well-being and Engagement 混合工作模式对员工福祉和参与度的影响
Q4 Mathematics Pub Date : 2024-07-17 DOI: 10.52783/cana.v31.1003
T. Saritha, Dr. P. Akthar
This study investigates the impact of hybrid work models on employee well-being and engagement in modern organizational settings. Using a mixed-methods approach, the study examines the effects of hybrid work arrangements on various dimensions of employee well-being, including stress levels, work-life balance, and job satisfaction. Additionally, the study explores the relationship between hybrid work models and employee engagement, considering factors such as communication patterns, collaboration dynamics, and managerial support. The findings shed light on the implications of hybrid work for organizational practices and offer recommendations for optimizing employee well-being and engagement in hybrid work environments.
本研究探讨了现代组织环境中混合工作模式对员工幸福感和参与度的影响。研究采用混合方法,考察了混合工作安排对员工幸福感各方面的影响,包括压力水平、工作与生活的平衡以及工作满意度。此外,研究还探讨了混合工作模式与员工敬业度之间的关系,并考虑了沟通模式、协作动力和管理支持等因素。研究结果阐明了混合工作对组织实践的影响,并为优化混合工作环境中的员工福利和敬业度提出了建议。
{"title":"The Impact of Hybrid Work Models on Employee Well-being and Engagement","authors":"T. Saritha, Dr. P. Akthar","doi":"10.52783/cana.v31.1003","DOIUrl":"https://doi.org/10.52783/cana.v31.1003","url":null,"abstract":"This study investigates the impact of hybrid work models on employee well-being and engagement in modern organizational settings. Using a mixed-methods approach, the study examines the effects of hybrid work arrangements on various dimensions of employee well-being, including stress levels, work-life balance, and job satisfaction. Additionally, the study explores the relationship between hybrid work models and employee engagement, considering factors such as communication patterns, collaboration dynamics, and managerial support. The findings shed light on the implications of hybrid work for organizational practices and offer recommendations for optimizing employee well-being and engagement in hybrid work environments.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141829768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Application of Temporal Intuitionistic Fuzzy Hypergraphs in Mobile Networks 移动网络中时态直觉模糊超图的新应用
Q4 Mathematics Pub Date : 2024-07-17 DOI: 10.52783/cana.v31.1010
S.Jagadeesan
The relationships among the objects in actual scenario are more complex than pairwise. Information loss will unavoidably result from naively condensing complicated relationships into pairwise ones. As a result, hypergraphs are necessary to depict the intricate interactions between the items of our interest, which leads to the issue of learning with hypergraphs. Intuitionistic Fuzzy Hypergraph defined in a time domain, termed as Temporal Intuitionistic Fuzzy Hypergraph (TIFHG) is introduced. Dual Temporal Intuitionistic Fuzzy Hypergraph has also been offered as a concept. An application of TIFHG in mobile communication is discussed.
实际场景中对象之间的关系比成对关系更为复杂。将复杂的关系天真地浓缩为成对关系,难免会造成信息损失。因此,需要用超图来描述我们感兴趣的项目之间错综复杂的互动关系,这就引出了用超图学习的问题。本文介绍了在时域中定义的直觉模糊超图,称为时域直觉模糊超图(TIFHG)。此外,还提出了双时域直觉模糊超图(Dual Temporal Intuitionistic Fuzzy Hypergraph)的概念。讨论了 TIFHG 在移动通信中的应用。
{"title":"A Novel Application of Temporal Intuitionistic Fuzzy Hypergraphs in Mobile Networks","authors":"S.Jagadeesan","doi":"10.52783/cana.v31.1010","DOIUrl":"https://doi.org/10.52783/cana.v31.1010","url":null,"abstract":"The relationships among the objects in actual scenario are more complex than pairwise. Information loss will unavoidably result from naively condensing complicated relationships into pairwise ones. As a result, hypergraphs are necessary to depict the intricate interactions between the items of our interest, which leads to the issue of learning with hypergraphs. Intuitionistic Fuzzy Hypergraph defined in a time domain, termed as Temporal Intuitionistic Fuzzy Hypergraph (TIFHG) is introduced. Dual Temporal Intuitionistic Fuzzy Hypergraph has also been offered as a concept. An application of TIFHG in mobile communication is discussed.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 36","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141831227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Model for Intrusion Detection in Wireless Sensor Network: An Improved Class Imbalance Processing 无线传感器网络入侵检测混合模型:改进的类失衡处理
Q4 Mathematics Pub Date : 2024-07-17 DOI: 10.52783/cana.v31.1006
Sravanthi Godala, Dr. M. Sunil Kumar
A significant difficulty in WSN settings is recognizing the abnormalities as security threats become divergent in various fields. The major drawbacks of WSN including insufficient memory, limited energy, and low compute power, and a small communication range. Thus, enhancing the detection accuracy of intrusion detection in such contexts is critical. However, this work intends to propose intrusion detection in WSN with improved class imbalance processing. The input data is pre-processed to balance the data with modified class imbalance process. Here, the SMOTE-ENN and Tomek link algorithm is employed to pre-process the raw data. Then the entropy and improved correlation based features are retrieved from the balanced data. Later, these features are trained by subjecting those features into the hybrid model that includes Deep Maxout and Bi-GRU model and then the final detection is predicted with the classifier outcomes. Further, at the training rate 90%, the proposed yielded the least FPR rate (0.1038) than the other 60, 70 and 80 training percentages.
WSN 设置中的一个重大难题是识别异常情况,因为各领域的安全威胁各不相同。WSN 的主要缺点包括内存不足、能量有限、计算能力低和通信范围小。因此,在这种情况下提高入侵检测的检测精度至关重要。然而,这项工作旨在提出改进类不平衡处理的 WSN 入侵检测方法。输入数据经过预处理后,使用修改后的类不平衡处理过程来平衡数据。在此,采用 SMOTE-ENN 和 Tomek 链接算法对原始数据进行预处理。然后,从平衡数据中提取基于熵和改进相关性的特征。之后,将这些特征输入包括 Deep Maxout 和 Bi-GRU 模型在内的混合模型,对这些特征进行训练,然后根据分类器的结果预测最终的检测结果。此外,与其他 60%、70% 和 80%的训练率相比,在训练率为 90%的情况下,建议的 FPR 率(0.1038)最低。
{"title":"Hybrid Model for Intrusion Detection in Wireless Sensor Network: An Improved Class Imbalance Processing","authors":"Sravanthi Godala, Dr. M. Sunil Kumar","doi":"10.52783/cana.v31.1006","DOIUrl":"https://doi.org/10.52783/cana.v31.1006","url":null,"abstract":"A significant difficulty in WSN settings is recognizing the abnormalities as security threats become divergent in various fields. The major drawbacks of WSN including insufficient memory, limited energy, and low compute power, and a small communication range. Thus, enhancing the detection accuracy of intrusion detection in such contexts is critical. However, this work intends to propose intrusion detection in WSN with improved class imbalance processing. The input data is pre-processed to balance the data with modified class imbalance process. Here, the SMOTE-ENN and Tomek link algorithm is employed to pre-process the raw data. Then the entropy and improved correlation based features are retrieved from the balanced data. Later, these features are trained by subjecting those features into the hybrid model that includes Deep Maxout and Bi-GRU model and then the final detection is predicted with the classifier outcomes. Further, at the training rate 90%, the proposed yielded the least FPR rate (0.1038) than the other 60, 70 and 80 training percentages.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 20","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141828661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Communications on Applied Nonlinear Analysis
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1