Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (99)
  • Open Access

    ARTICLE

    Partial Bell Polynomials, Falling and Rising Factorials, Stirling Numbers, and Combinatorial Identities

    Siqintuya Jin1, Bai-Ni Guo2,*, Feng Qi3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.3, pp. 781-799, 2022, DOI:10.32604/cmes.2022.019941

    Abstract In the paper, the authors collect, discuss, and find out several connections, equivalences, closed-form formulas, and combinatorial identities concerning partial Bell polynomials, falling factorials, rising factorials, extended binomial coefficients, and the Stirling numbers of the first and second kinds. These results are new, interesting, important, useful, and applicable in combinatorial number theory. More >

  • Open Access

    ARTICLE

    Some Identities of the Degenerate Poly-Cauchy and Unipoly Cauchy Polynomials of the Second Kind

    Ghulam Muhiuddin1,*, Waseem A. Khan2, Deena Al-Kadi3

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.3, pp. 763-779, 2022, DOI:10.32604/cmes.2022.017272

    Abstract In this paper, we introduce modied degenerate polyexponential Cauchy (or poly-Cauchy) polynomials and numbers of the second kind and investigate some identities of these polynomials. We derive recurrence relations and the relationship between special polynomials and numbers. Also, we introduce modied degenerate unipolyCauchy polynomials of the second kind and derive some fruitful properties of these polynomials. In addition, positive associated beautiful zeros and graphical representations are displayed with the help of Mathematica. More >

  • Open Access

    ARTICLE

    A Hybrid Particle Swarm Optimization to Forecast Implied Volatility Risk

    Kais Tissaoui1,2,*, Sahbi Boubaker3,4, Waleed Saud Alghassab1, Taha Zaghdoudi1,5, Jamel Azibi6

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4291-4309, 2022, DOI:10.32604/cmc.2022.028830

    Abstract The application of optimization methods to prediction issues is a continually exploring field. In line with this, this paper investigates the connectedness between the infected cases of COVID-19 and US fear index from a forecasting perspective. The complex characteristics of implied volatility risk index such as non-linearity structure, time-varying and non-stationarity motivate us to apply a nonlinear polynomial Hammerstein model with known structure and unknown parameters. We use the Hybrid Particle Swarm Optimization (HPSO) tool to identify the model parameters of nonlinear polynomial Hammerstein model. Findings indicate that, following a nonlinear polynomial behaviour cascaded to an autoregressive with exogenous input… More >

  • Open Access

    ARTICLE

    Asymptotic Approximations of Apostol-Tangent Polynomials in Terms of Hyperbolic Functions

    Cristina B. Corcino1,2, Wilson D. Castañeda Jr.3, Roberto B. Corcino1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 133-151, 2022, DOI:10.32604/cmes.2022.019965

    Abstract The tangent polynomials Tn (z) are generalization of tangent numbers or the Euler zigzag numbers Tn. In particular, Tn (0) = Tn. These polynomials are closely related to Bernoulli, Euler and Genocchi polynomials. One of the extensions and analogues of special polynomials that attract the attention of several mathematicians is the Apostoltype polynomials. One of these Apostol-type polynomials is the Apostol-tangent polynomials Tn(z, λ). When λ = 1, Tn (z, 1) = Tn(z). The use of hyperbolic functions to derive asymptotic approximations of polynomials together with saddle point method was applied to the Bernoulli and Euler polynomials by Lopez and… More >

  • Open Access

    ARTICLE

    A Mathematical Model for COVID-19 Image Enhancement based on Mittag-Leffler-Chebyshev Shift

    Ibtisam Aldawish1, Hamid A. Jalab2,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1307-1316, 2022, DOI:10.32604/cmc.2022.029445

    Abstract The lungs CT scan is used to visualize the spread of the disease across the lungs to obtain better knowledge of the state of the COVID-19 infection. Accurately diagnosing of COVID-19 disease is a complex challenge that medical system face during the pandemic time. To address this problem, this paper proposes a COVID-19 image enhancement based on Mittag-Leffler-Chebyshev polynomial as pre-processing step for COVID-19 detection and segmentation. The proposed approach comprises the Mittag-Leffler sum convoluted with Chebyshev polynomial. The idea for using the proposed image enhancement model is that it improves images with low gray-level changes by estimating the probability… More >

  • Open Access

    ARTICLE

    Analysis of Eigenvalues for Molecular Structures

    Muhammad Haroon Aftab1, Kamel Jebreen2,*, Mohammad Issa Sowaity3, Muhammad Hussain4

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1225-1236, 2022, DOI:10.32604/cmc.2022.029009

    Abstract In this article, we study different molecular structures such as Polythiophene network, for and , Orthosilicate (Nesosilicate) , Pyrosilicates (Sorosilicates) , Chain silicates (Pyroxenes), and Cyclic silicates (Ring Silicates) for their cardinalities, chromatic numbers, graph variations, eigenvalues obtained from the adjacency matrices which are square matrices in order and their corresponding characteristics polynomials. We convert the general structures of these chemical networks in to mathematical graphical structures. We transform the molecular structures of these chemical networks which are mentioned above, into a simple and undirected planar graph and sketch them with various techniques of mathematics. The matrices obtained from these… More >

  • Open Access

    ARTICLE

    Protected Fair Secret Sharing Based Bivariate Asymmetric Polynomials in Satellite Network

    Yanyan Han1,2, Jiangping Yu3, Guangyu Hu4, Chenglei Pan4, Dingbang Xie5, Chao Guo1,2,6,*, Abdul Waheed7

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4789-4802, 2022, DOI:10.32604/cmc.2022.027496

    Abstract Verifiable secret sharing mainly solves the cheating behavior between malicious participants and the ground control center in the satellite network. The verification stage can verify the effectiveness of secret shares issued by the ground control center to each participant and verify the effectiveness of secret shares shown by participants. We use a lot of difficult assumptions based on mathematical problems in the verification stage, such as solving the difficult problem of the discrete logarithm, large integer prime factorization, and so on. Compared with other verifiable secret sharing schemes designed for difficult problems under the same security, the verifiable secret sharing… More >

  • Open Access

    ARTICLE

    Degenerate s-Extended Complete and Incomplete Lah-Bell Polynomials

    Hye Kyung Kim1,*, Dae Sik Lee2

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1479-1495, 2022, DOI:10.32604/cmes.2022.017616

    Abstract Degenerate versions of special polynomials and numbers applied to social problems, physics, and applied mathematics have been studied variously in recent years. Moreover, the (s-)Lah numbers have many other interesting applications in analysis and combinatorics. In this paper, we divide two parts. We first introduce new types of both degenerate incomplete and complete s-Bell polynomials respectively and investigate some properties of them respectively. Second, we introduce the degenerate versions of complete and incomplete Lah-Bell polynomials as multivariate forms for a new type of degenerate s-extended Lah-Bell polynomials and numbers respectively. We investigate relations between these polynomials and degenerate incomplete and… More >

  • Open Access

    ARTICLE

    Comparative Study of Machine Learning Modeling for Unsteady Aerodynamics

    Mohammad Alkhedher*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1901-1920, 2022, DOI:10.32604/cmc.2022.025334

    Abstract Modern fighters are designed to fly at high angle of attacks reaching 90 deg as part of their routine maneuvers. These maneuvers generate complex nonlinear and unsteady aerodynamic loading. In this study, different aerodynamic prediction tools are investigated to achieve a model which is highly accurate, less computational, and provides a stable prediction of associated unsteady aerodynamics that results from high angle of attack maneuvers. These prediction tools include Artificial Neural Networks (ANN) model, Adaptive Neuro Fuzzy Logic Inference System (ANFIS), Fourier model, and Polynomial Classifier Networks (PCN). The main aim of the prediction model is to estimate the pitch… More >

  • Open Access

    ARTICLE

    An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures

    Chandrashekhar Meshram1,*, Agbotiname Lucky Imoize2,3, Sajjad Shaukat Jamal4, Parkash Tambare5, Adel R. Alharbi6, Iqtadar Hussain7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1373-1389, 2022, DOI:10.32604/cmc.2022.024996

    Abstract The Human-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and privacy concerns. Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement. Most of the early authenticated key agreement systems relied on pairing, hashing, or modular exponentiation processes that are computationally intensive and cost-prohibitive. In order to address this problem, this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps. The new scheme uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the network… More >

Displaying 21-30 on page 3 of 99. Per Page