Sunita Pachar, Dhiraj Kapila, J. Cotrina-Aliaga, J. L. Arias-Gonzáles, Sanjay Yadav, Sandeep Aggarwal, Udit Mamodiya
The cloud real time services are provided in an efficient manner now a days in rapid way. The Cloud computing objective is an on-request administration model for end clients. The on-request administration model comprises memory stockpiling, equipment on the board, data handling, and different IoT applications utilizing numerical programming rationales with the upgraded fluffy model. Money saving advantage analysis is the thing that everybody should do as such as to consider a strong or a proficient framework. In any case, while thinking out on cost and advantage examination, we additionally need to figure out factors that truly influence the advantages and expenses of the framework. In creating quotes for a framework, we really want to think about some of the cost components. A few components among them are equipment, staff, office, working, and supply costs. By utilizing the fluffy model, the end clients get the best ideal cloud administrations. The proposed system provides mathematical model of rough set theory. The proposed model provides an adequate cost to the end users in terms of cloud services. For giving cloud administrations in a streamlined manner the fluffy rationale is assuming a significant part. Our proposed calculation is performing better under pressure from different calculations. The proposed algorithm finds the proposed system most suitable w.r.t cost. The reproduction of our calculation is finished in simulation system of the cloud environment.
{"title":"Efficient cost evaluation of real time applications using mathematical model in computing environment","authors":"Sunita Pachar, Dhiraj Kapila, J. Cotrina-Aliaga, J. L. Arias-Gonzáles, Sanjay Yadav, Sandeep Aggarwal, Udit Mamodiya","doi":"10.47974/jim-1679","DOIUrl":"https://doi.org/10.47974/jim-1679","url":null,"abstract":"The cloud real time services are provided in an efficient manner now a days in rapid way. The Cloud computing objective is an on-request administration model for end clients. The on-request administration model comprises memory stockpiling, equipment on the board, data handling, and different IoT applications utilizing numerical programming rationales with the upgraded fluffy model. Money saving advantage analysis is the thing that everybody should do as such as to consider a strong or a proficient framework. In any case, while thinking out on cost and advantage examination, we additionally need to figure out factors that truly influence the advantages and expenses of the framework. In creating quotes for a framework, we really want to think about some of the cost components. A few components among them are equipment, staff, office, working, and supply costs. By utilizing the fluffy model, the end clients get the best ideal cloud administrations. The proposed system provides mathematical model of rough set theory. The proposed model provides an adequate cost to the end users in terms of cloud services. For giving cloud administrations in a streamlined manner the fluffy rationale is assuming a significant part. Our proposed calculation is performing better under pressure from different calculations. The proposed algorithm finds the proposed system most suitable w.r.t cost. The reproduction of our calculation is finished in simulation system of the cloud environment.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70468766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this article exact solution for nonlinear wave-like equations with variable coefficients will be obtain by using reliable manner depend on combined Laplace transform with decomposition technique and the results has shown a high-precision, smooth and the series solution is converge rapidly to exact analytic solution compared with other classic approaches. Suggested approach not needs any discretization by data of domain or presents assumption or neglect for a perturbation parameter in problems and not need to use any assumption to convert the non-linear terms into linear. Two examples of strongly nonlinear 2-dimensional space high order have been presented to show the convergence of solution obtained by suggested method to the exact.
{"title":"Recent modification of decomposition method for solving wave-like equation","authors":"Z. H. Kareem, L. Tawfiq","doi":"10.47974/jim-1235","DOIUrl":"https://doi.org/10.47974/jim-1235","url":null,"abstract":"In this article exact solution for nonlinear wave-like equations with variable coefficients will be obtain by using reliable manner depend on combined Laplace transform with decomposition technique and the results has shown a high-precision, smooth and the series solution is converge rapidly to exact analytic solution compared with other classic approaches. Suggested approach not needs any discretization by data of domain or presents assumption or neglect for a perturbation parameter in problems and not need to use any assumption to convert the non-linear terms into linear. Two examples of strongly nonlinear 2-dimensional space high order have been presented to show the convergence of solution obtained by suggested method to the exact.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70465412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Our life contains many scientific, health, and social problems, which are complex and difficult for easy modeling. Therefore, most researchers resorted to studying distributions in different forms to be able to represent these problems, and from these new forms of distributions are called truncated distributions. This paper, suggests a new formula to find the multiple truncations for one or more intervals to a double truncated continuous distribution. Some statistical properties of multi–double truncated are introduced. Weibull distribution is applied for two intervals on the double truncation and introduced some of its statistical properties.
{"title":"Multi-double truncated continuous distribution","authors":"Kawther F. Al-Hasan, K. A. Al-Kadim","doi":"10.47974/jim-1464","DOIUrl":"https://doi.org/10.47974/jim-1464","url":null,"abstract":"Our life contains many scientific, health, and social problems, which are complex and difficult for easy modeling. Therefore, most researchers resorted to studying distributions in different forms to be able to represent these problems, and from these new forms of distributions are called truncated distributions. This paper, suggests a new formula to find the multiple truncations for one or more intervals to a double truncated continuous distribution. Some statistical properties of multi–double truncated are introduced. Weibull distribution is applied for two intervals on the double truncation and introduced some of its statistical properties.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70465777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper is concerned with the stability of some classes of integro-differential inequalities with multi-control inputs. Namely, some estimators’ formulations for the stability of solutions for some multi-control problems are established. The illustrative problems show that the stability technique, considered in the present paper, is efficient and robust. Moreover, it can be used with other classes of integro-differential inequalities.
{"title":"Stability for some types of multi control integro differential inequalities","authors":"Ali Abdulhasan Kasim, Maan A. Rasheed, S. Hasan","doi":"10.47974/jim-1487","DOIUrl":"https://doi.org/10.47974/jim-1487","url":null,"abstract":"This paper is concerned with the stability of some classes of integro-differential inequalities with multi-control inputs. Namely, some estimators’ formulations for the stability of solutions for some multi-control problems are established. The illustrative problems show that the stability technique, considered in the present paper, is efficient and robust. Moreover, it can be used with other classes of integro-differential inequalities.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70466346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Virus needs to infect cells to spread the disease in the host and to achieve this, they have developed specific tactics to evade the immune system, which is in charge of trying to prevent any infection. In this way, we develop a mathematical model to represent the evasion of immune system by virus using a non-monotonic functional response describing an antipredator behavior, where the virus is the prey and the immune cells are the predator. We found four equilibrium points, the disease free equilibrium, immune evasion equilibrium and two immune activation equilibrium points. The disease free equilibrium is globally asymptotically stable if R0 ≤ 1, the immune evasion equilibrium and two immune activation equilibria are locally asymptotically stable if R0 >1. We conclude that in our model the evasion of immune system is always possible when there is a inoculation of virus in the host, but there is also a chance to control the infection or to activate the immune system when there are a cross-reactive antibodies.
{"title":"Mathematical model of evasion of immune system by virus","authors":"M. C. Gómez, E. I. Mondragón, P. C. Tabares","doi":"10.47974/jim-1508","DOIUrl":"https://doi.org/10.47974/jim-1508","url":null,"abstract":"Virus needs to infect cells to spread the disease in the host and to achieve this, they have developed specific tactics to evade the immune system, which is in charge of trying to prevent any infection. In this way, we develop a mathematical model to represent the evasion of immune system by virus using a non-monotonic functional response describing an antipredator behavior, where the virus is the prey and the immune cells are the predator. We found four equilibrium points, the disease free equilibrium, immune evasion equilibrium and two immune activation equilibrium points. The disease free equilibrium is globally asymptotically stable if R0 ≤ 1, the immune evasion equilibrium and two immune activation equilibria are locally asymptotically stable if R0 >1. We conclude that in our model the evasion of immune system is always possible when there is a inoculation of virus in the host, but there is also a chance to control the infection or to activate the immune system when there are a cross-reactive antibodies.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70466984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We apply Lie theory to determine the aone-parameter point transformations which leave complex-valued Korteweg-de Vries equations invariant. The conserved vectors of the systems are constructed. We provide travelling wave reductions that lead to third-order ordinary differential equations. These equations are highly nonlinear to solve directly and, therefore, we establish their first integrals. The latter is of second-order and facilitates the analysis of the complex-valued system, as well as some interesting blow-up solutions.
{"title":"First integral blow-up solutions to complex-valued KdV equations","authors":"B. Gwaxa, S. Jamal","doi":"10.47974/jim-1511","DOIUrl":"https://doi.org/10.47974/jim-1511","url":null,"abstract":"We apply Lie theory to determine the aone-parameter point transformations which leave complex-valued Korteweg-de Vries equations invariant. The conserved vectors of the systems are constructed. We provide travelling wave reductions that lead to third-order ordinary differential equations. These equations are highly nonlinear to solve directly and, therefore, we establish their first integrals. The latter is of second-order and facilitates the analysis of the complex-valued system, as well as some interesting blow-up solutions.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70467127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Let H be a Hilbert space. A complex number is named the extended eigenvalue for an operator T ∈ B(H), if there is operator not equal zero X ∈ B(H) so that: TX = mXT and X are named as extended eigen operator for an operator T opposite to m. The goal of this work is to find extended eigenvalues and extended eigen operators for shift operators J, Ja, K, Ka such that J : I2 (ℕ) → I2 (ℕ) and K : I2 (ℕ) → I2 (ℕ) defined by: Jen = e2n , and Ken = { (en/2 if n even) (0 if n odd), for all x ∈ l2(ℕ). Furthermore, the closeness of extended eigenvalues for all of these shift operators under multiplication has been proven.
设H是希尔伯特空间。复数命名的扩展特征值算子T∈B (H),如果运营商不等于0 X∈B (H),这样:TX = mXT中X命名作为运营商扩展特征算子T m相反。这项工作的目标是找到特征值和特征运营商延伸为移动运营商J,是的,K, Ka, J: I2(ℕ)→I2(ℕ)和K: I2(ℕ)→I2(ℕ)定义的 : Jen = e2n,肯= {(en / 2如果n)(0如果n奇怪),对于所有x∈l2(ℕ)。进一步证明了所有这些移位算子的扩展特征值在乘法下的接近性。
{"title":"Weighted shift operators and extended eigenvalues","authors":"Kareem M. Hussein, Buthainah A. Ahmed","doi":"10.47974/jim-1516","DOIUrl":"https://doi.org/10.47974/jim-1516","url":null,"abstract":"Let H be a Hilbert space. A complex number is named the extended eigenvalue for an operator T ∈ B(H), if there is operator not equal zero X ∈ B(H) so that: TX = mXT and X are named as extended eigen operator for an operator T opposite to m. The goal of this work is to find extended eigenvalues and extended eigen operators for shift operators J, Ja, K, Ka such that J : I2 (ℕ) → I2 (ℕ) and K : I2 (ℕ) → I2 (ℕ) defined by: Jen = e2n , and Ken = { (en/2 if n even) (0 if n odd), for all x ∈ l2(ℕ). Furthermore, the closeness of extended eigenvalues for all of these shift operators under multiplication has been proven.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70467161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A semimodule T is named ss-supplemented if all subsemimodule N of T have supplement L in T such that N ∩ L is semisimple. T is named strongly local if Rad(T) is semisimple and T is local. It is shown that every strongly local semimodule is amply ss-supplemented. If T is an ss-supplemented p-projective subtractive semimodule, at that time T is amply ss-supplemented.
{"title":"Ss-supplemented semimodules","authors":"Ahmed H. Alwan, Zainab R. Sharif","doi":"10.47974/jim-1524","DOIUrl":"https://doi.org/10.47974/jim-1524","url":null,"abstract":"A semimodule T is named ss-supplemented if all subsemimodule N of T have supplement L in T such that N ∩ L is semisimple. T is named strongly local if Rad(T) is semisimple and T is local. It is shown that every strongly local semimodule is amply ss-supplemented. If T is an ss-supplemented p-projective subtractive semimodule, at that time T is amply ss-supplemented.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70467435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Let R be an individual left R-module of the same type as W, with W being a ring containing one. W’s submodules N and K should be referred to as N and K, respectively that K ⊆ N ⊆ W if N/K <<_J (D_j (W)+K)/K, Then K is known as the D J-coessential submodule of Nin W as K⊆_ (Rce) N. Coessential submodule is a generalization of this idea. These submodules have certain interesting qualities, such that if a certain condition is met, the homomorphic image of D J- N has a coessential submodule called D J-coessential submodule.
{"title":"DJ-coessential submodules","authors":"Amenah Hasan, Wasan Khalid","doi":"10.47974/jim-1535","DOIUrl":"https://doi.org/10.47974/jim-1535","url":null,"abstract":"Let R be an individual left R-module of the same type as W, with W being a ring containing one. W’s submodules N and K should be referred to as N and K, respectively that K ⊆ N ⊆ W if N/K <<_J (D_j (W)+K)/K, Then K is known as the D J-coessential submodule of Nin W as K⊆_ (Rce) N. Coessential submodule is a generalization of this idea. These submodules have certain interesting qualities, such that if a certain condition is met, the homomorphic image of D J- N has a coessential submodule called D J-coessential submodule.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70468030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Yadav, D. K. Saini, Akanksha Uniyal, Nidhi Yadav, Maya S. Bembde, Dharmesh Dhabliya
Several mutants of SARS COV-2 have been reported so far, each one having different severity and infectivity rate. Omicron has enhanced resistance to host immunity and displays higher transmission. 15 of the 37 known mutations in the spike protein’s receptor-binding domain (RBD), the primary target of neutralising antibodies, are found there. An enhanced RNN, or sequential network, called a long short-term memory network, permits informatics data to endure. It is capable of resolving the RNN’s vanishing gradient issue. RNN, also referred to as a recurrent neural network, is utilized for persistent memory. “In medication, the right analysis and the perfect opportunity are the keys for effective treatment. For the current review, the gathered Past information was utilized to train the model, and afterward this trained model was utilized to test new information and afterward for utilized for the advancement of the prediction model”. The trained ML model’s presentation or approval was assessed utilizing some piece of accessible past datasets and this method known as validation process. According to findings of the current study, Indian citizens can aid their nation in the fight against Omicron by adhering to the directions and instructions provided by the Indian government. We ought to cooperate to overcome the new lethal variation of Coronavirus.
{"title":"Prediction of Omicron cases in India using LSTM: An advanced approach of artificial intelligence","authors":"N. Yadav, D. K. Saini, Akanksha Uniyal, Nidhi Yadav, Maya S. Bembde, Dharmesh Dhabliya","doi":"10.47974/jim-1667","DOIUrl":"https://doi.org/10.47974/jim-1667","url":null,"abstract":"Several mutants of SARS COV-2 have been reported so far, each one having different severity and infectivity rate. Omicron has enhanced resistance to host immunity and displays higher transmission. 15 of the 37 known mutations in the spike protein’s receptor-binding domain (RBD), the primary target of neutralising antibodies, are found there. An enhanced RNN, or sequential network, called a long short-term memory network, permits informatics data to endure. It is capable of resolving the RNN’s vanishing gradient issue. RNN, also referred to as a recurrent neural network, is utilized for persistent memory. “In medication, the right analysis and the perfect opportunity are the keys for effective treatment. For the current review, the gathered Past information was utilized to train the model, and afterward this trained model was utilized to test new information and afterward for utilized for the advancement of the prediction model”. The trained ML model’s presentation or approval was assessed utilizing some piece of accessible past datasets and this method known as validation process. According to findings of the current study, Indian citizens can aid their nation in the fight against Omicron by adhering to the directions and instructions provided by the Indian government. We ought to cooperate to overcome the new lethal variation of Coronavirus.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70468924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}