2024-03-29T21:47:23Z
https://ajmc.aut.ac.ir/?_action=export&rf=summon&issue=409
AUT Journal of Mathematics and Computing
AJMC
2783-2449
2783-2449
2022
3
1
On the geometry of Zermelo’s optimal control trajectories
Zohreh
Fathi
Behroz
Bidabad
In the present work, we study the optimal control paths in the Zermelo navigation problem from the geometric and differential equations point of view rather than the optimal control point of view, where the latter has been carried out in our recent work. Here, we obtain the precise form of the system of ODE where the solutions are optimal trajectories of Zermelo’s navigation problem. Having a precise equation allows optimizing a cost function more accurately and efficiently. The advantage of these equations is to approximate optimal trajectories in the general case by the first order approximation of external fields w. The latter could be solved numerically since we have retrieved simpler equations for these paths.
Optimal control
Zermelo navigation
Finsler
Randers Metric
Geodesic
2022
02
01
1
10
https://ajmc.aut.ac.ir/article_4542_e97d2e032d88876e90e0aeae3c9fc652.pdf
AUT Journal of Mathematics and Computing
AJMC
2783-2449
2783-2449
2022
3
1
The a-number of maximal curves of third largest genus
Vahid
Nourozi
Saeed
Tafazolian
The $a$-number is an invariant of the isomorphism class of the p-torsion group scheme. In this paper, we compute a closed formula for the $a$-number of $y^q + y = x^{\frac{q+1}{3}}$ and $\sum_{t=1}^{s} y^{q/3^t}= x^{q+1}$ with $q = 3^s$ over the finite field $\mathbb{F}_{q^2}$ using the action of the Cartier operator on $H^0(\mathcal{C},\Omega^1)$.
$a$-number
Cartier operator
Super-singular Curves
Maximal Curves
2022
02
01
11
16
https://ajmc.aut.ac.ir/article_4553_c4d0b23d2050389cbeb4e0c4f3608d00.pdf
AUT Journal of Mathematics and Computing
AJMC
2783-2449
2783-2449
2022
3
1
Dym equation: group analysis and conservation laws
S. Reza
Hejazi
Azadeh
Naderifard
In this paper group-invariant properties of the Dym equation are studied. Lie symmetries are given and some group-invariant solutions are found with the use of similarity variables obtained from these operators. Conservation laws are computed via three methods. Direct method for construction of conservation laws is introduced by the concept of multipliers and Euler-Lagrange operator. Next, the non-linearly self-adjointness of the considered PDE is stated. Then, the modified Noether’s theorem is used for finding conservation laws. Finally, the third method is established via the Hereman-Pole method by using the evolutionary form of the equation.
Dym equation
Non-linear self-adjointness
Lie point symmetries
Conservation laws
2022
02
01
17
26
https://ajmc.aut.ac.ir/article_4382_055ceeb805f167305c236103d1b71433.pdf
AUT Journal of Mathematics and Computing
AJMC
2783-2449
2783-2449
2022
3
1
Locally projectively flatness and locally dually flatness of generalized Kropina conformal change of m-th root metric
Achal
Singh
Manoj
Kumar
Chayan
Mishra
In this paper, we consider the generalized Kropina conformal change of m-th root metric and for this, prove a necessary and sufficient condition of locally projectively flatness. Also we proved a necessary and sufficient condition for the generalized Kropina conformal change of m-th root metric is locally dually flat.
Finsler metric
Kropina metric
generalized Kropina metric
m-th root metrics
locally projectively flat
conformal change
locally dually flat
2022
02
01
27
33
https://ajmc.aut.ac.ir/article_4633_773cfa89212b73ab62f9023aba8eee18.pdf
AUT Journal of Mathematics and Computing
AJMC
2783-2449
2783-2449
2022
3
1
Characterization of some alternating groups by order and largest element order
Ali
Mahmoudifar
Ayoub
Gharibkhajeh
The prime graph (or Gruenberg-Kegel graph) of a finite group is a well-known graph. In this paper, first, we investigate the structure of the finite groups with a non-complete prime graph. Then as an application, we prove that every alternating group $A_n$, where $n\leq 31$ is determined by its order and its largest element order. Also, we show that $A_{32}$ is not characterizable by order and the largest element order.
Finite simple group
prime graph
the largest element order
alternating group
2022
02
01
35
44
https://ajmc.aut.ac.ir/article_4571_5f334a3e023d1ce38b1c2d0b3cfb6a75.pdf
AUT Journal of Mathematics and Computing
AJMC
2783-2449
2783-2449
2022
3
1
Extracting some supra topologies from the topology of a topological space using stacks
Amin
Talabeigi
A collection $\mu$ of subsets of a nonempty set $X$ is a supra topology on $X$ whenever $\emptyset$ and $X$ belong to $\mu$, and also $\mu$ is closed under arbitrary unions. Also, a nonempty collection $\mathcal{S}$ of nonempty subsets of a nonempty set $X$ is called a stack on $X$ whenever it is closed under operation superset. In this paper, we are going to introduce an approach to extract some supra topologies from the topology of a topological space. For this purpose, we consider a topological space $(X, \tau)$ with a closed set $P$ of its subsets. Using a stack $\mathcal{S}$ on the space $(X, \tau)$ and the closure operator $cl$ associated with $\tau$, we define a supra closure operator $\lambda_P$ on $X$ to create the desired supra topology. We then characterize the form of this resulting supra topology and also determine its relationship to the initial topology of the space.
supra closure operator
supra topology
supra topological space
stack
2022
02
01
45
52
https://ajmc.aut.ac.ir/article_4296_a119ab172dae103dc5c9686a269092cc.pdf
AUT Journal of Mathematics and Computing
AJMC
2783-2449
2783-2449
2022
3
1
Numerical differential continuation approach for systems of nonlinear equations with singular Jacobian
Mohammad Ali
Mehrpouya
It is well known that, one of the useful and rapid methods for a nonlinear system of algebraic equations is Newton’s method. Newton’s method has at least quadratic convergence when the Jacobian is a nonsingular matrix in a neighborhood of the solution. In this paper, a differential continuation method is presented for solving the nonlinear system of algebraic equations whose Jacobian matrix is singular at the solution. For this purpose, at first, an auxiliary equation named the homotopy equation is constructed. Then, by differentiating from the homotopy equation, a system of differential equations is replaced instead of the target problem and solved. In other words, the solution of the nonlinear system of algebraic equations with singular Jacobian is transformed to the solution of a system of differential equations. Some numerical tests are presented at the end and the computational efficiency of the method is described.
Nonlinear equations
Newton’s method
Singular Jacobian
Continuation method
2022
02
01
53
58
https://ajmc.aut.ac.ir/article_4644_e756b9224e879823a1de07090b1f42f9.pdf
AUT Journal of Mathematics and Computing
AJMC
2783-2449
2783-2449
2022
3
1
The assessment of essential genes in the stability of PPI networks using critical node detection problem
Javad
Rezaei
Fatemeh
Zare Mirakabad
Sayed-Amir
Marashi
Seyed Ali
MirHassani
Essential genes and proteins as their products encode the basic functions of a cell in a variety of conditions and are vital for the survival of a cell. Analyzing the characteristics of these proteins provides important biological information. An interesting analysis is to demonstrate the correlation between the topological importance of a protein in protein-protein interaction networks and its essentiality. Different centrality criteria such as degree, between ness, closeness, and eigenvector centralities are used to investigate such a correlation. Despite the remarkable results obtained by these methods, it is shown that the centrality criteria in scale-free networks show a high level of correlations which indicate that they share similar topo[1]logical information of the networks. In this paper, we use a different approach for analyzing this correlation and use a well-known problem in the field of graph theory, Critical Node Detection Problem and solve it on the protein-protein interaction networks to obtain a subset of proteins called critical nodes which have the most effect on the network stability. Our results show that essential proteins have a more prominent presence in the set of critical nodes than what is expected at random samples. Furthermore, the essential proteins represented in the set of critical nodes have a different distribution of topological properties compared to the essential proteins recovered by the centrality-based methods. All the source codes and data are available at “http://bioinformatics.aut.ac.ir/CNDP PPI networks/”.
Essential genes
Protein-protein interaction network
Centrality
Critical node
Network stability
2022
02
01
59
76
https://ajmc.aut.ac.ir/article_4505_6aa5ff14e54e7a2c643d3d53dab1369d.pdf
AUT Journal of Mathematics and Computing
AJMC
2783-2449
2783-2449
2022
3
1
Comparing regression methods with non-Gaussian stable errors
Reza
Alizadeh Noughabi
Adel
Mohammadpour
Nolan and Ojeda-Revah in [16] proposed a regression model with heavy-tailed stable errors. In this paper, we extend this method for multivariate heavy-tailed errors. Furthermore, A likelihood ratio test (LRT) for testing significant of regression coefficients is proposed. Also, confidence intervals based on fisher information for [16] method, called NOR, and LRT are computed and compared with well-known methods. In the end, we provide some guidance for various error distributions in heavy-tailed caese.
Regression
Quantile regression, Stable distribution
Ordinary least squares, Maximum likelihood
2022
02
01
77
91
https://ajmc.aut.ac.ir/article_4575_0cb2feab9a696847663b1f831beeb0c3.pdf
AUT Journal of Mathematics and Computing
AJMC
2783-2449
2783-2449
2022
3
1
Applying IOTA into distributed computing to master the uncertainty
Morteza
Mozaffari
Farhad
Rahmati
In distributed computing, the uncertainty is the most challenging issue which is caused by the asynchrony of distributed entities’ communication and many other reasons such as geographical scattering of distributed entities, their mobil[1]ity, and etc. In this paper, IOTA, a DAG based Distributed ledger technology is used in order to cope with asynchronous communications and uncertainty. Moreover, IOTA private network is chosen to deal with other mentioned problems inside distributed computing. As a case study, a system is presented which could be implemented inside Tehran Polytechnic university to bring computational power of computers with low resources together in order to solve many problems which can be solved in distributed computing manner.
Distributed ledger technology
Blockchain
IOTA
Directed acyclic graph
Distributed computing
2022
02
01
93
99
https://ajmc.aut.ac.ir/article_4513_66ad0ffa149198a9101010533215a023.pdf
AUT Journal of Mathematics and Computing
AJMC
2783-2449
2783-2449
2022
3
1
An effective version of definability in metric structures
Nazanin
Roshandel Tavana
In this paper, a computably definable predicate in metric structures is defined and characterized. Then, it is proved that every separable infinite-dimensional Hilbert structure in an effectively presented language is computable. Moreover, every definable predicate in these structures is computable.
metric model theory
TTE
2022
02
01
101
111
https://ajmc.aut.ac.ir/article_4645_4280298451c67d5e0ba7b6a16cb157c9.pdf
AUT Journal of Mathematics and Computing
AJMC
2783-2449
2783-2449
2022
3
1
A new approach to solve the reliability problem in any VoIP steganography system
M.-R
Sadeghi
P.
Amirzade Dana
B.
Javadi
VoIP is naturally an unreliable communication system. Thus, using the best VoIP steganographic systems, the accuracy of the hidden message is impaired as a result of the VoIP packet loss. There are many steganography and steganalysis researches that try to improve the robustness and accuracy of VoIP steganography methods. In addition to the fact that these works are done depend on a particular method, none of them have solved the problem of packet loss. Applying error correcting codes, prior to embedding, is a well-known technique in telecommunication to improve robustness and to reconstruct Missing data. However, in the case of VoIP communication, a codeword entirely embedded in the packet may be lost due to the packet loss and therefore ECC techniques will not be capable of reconstructing the lost bits. In this paper, we design a novel scheme to increase the reliability of VoIP steganography systems. We emphasize that our proposed method, independent of the embedding and extracting algorithm, can be used in all VoIP steganography systems. After encoding the secret message to the codewords of $n$ bits, we distribute these $n$ bits into $n$ successive RTP packets, in such a way that, losing one packet leads to miss only one bit of each codeword. Then, with the idea of telecommunication solutions in recovering lost data, when up to $t$ of $n$ packets are lost we can recover the secret message using a $t$-error correcting code ${\bf C}(n,k,d)$. Provided that the average of packet loss over the network is less than $1\%$, using a $t$-error correcting code ${\bf C}(n,k,d)$, the probability of losing hidden data, in each category of $n$-packets, $P_e$, is less than $\leq 10^{-2t}$. Hence, applying the $t$-error correcting codes with larger $t$, in the proposed scheme, results in more reliable steganographic systems.
Steganography
VoIP
Reliability
Error Correcting Codes
2022
02
01
113
127
https://ajmc.aut.ac.ir/article_4769_696b241fdf88dc6eeb233c7364662e2d.pdf