<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE ArticleSet PUBLIC "-//NLM//DTD PubMed 2.7//EN" "https://dtd.nlm.nih.gov/ncbi/pubmed/in/PubMed.dtd">
<ArticleSet>
<Article>
<Journal>
				<PublisherName>Amirkabir University of Technology</PublisherName>
				<JournalTitle>AUT Journal of Mathematics and Computing</JournalTitle>
				<Issn>2783-2449</Issn>
				<Volume>1</Volume>
				<Issue>2</Issue>
				<PubDate PubStatus="epublish">
					<Year>2020</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Roadside acoustic sensors to support vulnerable pedestrians via their smartphones</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>135</FirstPage>
			<LastPage>143</LastPage>
			<ELocationID EIdType="pii">3312</ELocationID>
			
<ELocationID EIdType="doi">10.22060/ajmc.2019.15479.1017</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Mehdi</FirstName>
					<LastName>Ghatee</LastName>
<Affiliation>Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran</Affiliation>
<Identifier Source="ORCID">0000-0002-9558-8286</Identifier>

</Author>
<Author>
					<FirstName>Masoomeh</FirstName>
					<LastName>Khalili</LastName>
<Affiliation>Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Mehdi</FirstName>
					<LastName>Teimouri</LastName>
<Affiliation>Faculty of New Sciences and Technologies, University of Tehran, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Mohammad Mahdi</FirstName>
					<LastName>Bejani</LastName>
<Affiliation>Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2018</Year>
					<Month>12</Month>
					<Day>18</Day>
				</PubDate>
			</History>
		<Abstract>This paper proposes a smartphone-based warning system to evaluate the risk of a motor vehicle for vulnerable pedestrians (VP). The acoustic sensors are embedded in the roadside to receive vehicle sounds and they are classified into heavy vehicles, light vehicles with low speed, light vehicles with high speed, and no vehicle classes. For this aim, we extract new features by Mel-frequency Cepstrum Coefficients (MFCC) and Linear Predictive Coefficients (LPC) algorithms. We use different classification algorithms and show that MLP neural network achieves at least $96.77$% accuracy criterion. To install this system, directional microphones are embedded on the roadside and the risk is classified. Then, for every microphone, a danger area is defined and the warning alarms have been sent to every VPs’ smartphones covered in this danger area.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Intelligent Transportation Systems</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Acoustic signal analysis</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">smartphone</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Road traffic sensors</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Road Safety</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Risk analysis</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Vulnerable pedestrians</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://ajmc.aut.ac.ir/article_3312_9418b8be2fef85561e0bb01705f4d053.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Amirkabir University of Technology</PublisherName>
				<JournalTitle>AUT Journal of Mathematics and Computing</JournalTitle>
				<Issn>2783-2449</Issn>
				<Volume>1</Volume>
				<Issue>2</Issue>
				<PubDate PubStatus="epublish">
					<Year>2020</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Approximation algorithms for multi-multiway cut and multicut problems on directed graphs</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>145</FirstPage>
			<LastPage>152</LastPage>
			<ELocationID EIdType="pii">3810</ELocationID>
			
<ELocationID EIdType="doi">10.22060/ajmc.2018.15109.1014</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Ramin</FirstName>
					<LastName>Yarinezhad</LastName>
<Affiliation>Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Seyed Naser</FirstName>
					<LastName>Hashemi</LastName>
<Affiliation>Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2018</Year>
					<Month>10</Month>
					<Day>08</Day>
				</PubDate>
			</History>
		<Abstract>In this paper, we study the directed multicut and directed multimultiway cut problems. The input to the directed multi-multiway cut problem is a weighted directed graph $G=(V,E)$ and $k$ sets $S_1, S_2,\cdots, S_k$ of vertices. The goal is to find a subset of edges of minimum total weight whose removal will disconnect all the connections between the vertices in each set $S_i$, for $1\leq i\leq k$. A special case of this problem is the directed multicut problem whose input consists of a weighted directed graph $G=(V,E)$ and a set of ordered pairs of vertices $(s_1,t_1),\cdots,(s_k,t_k)$. The goal is to find a subset of edges of minimum total weight whose removal will make for any $i, 1\leq i\leq k$, there is no directed path from si to ti . In this paper, we present two approximation algorithms for these problems. The so called region growing paradigm is modified and used for these two cut problems on directed graphs. using this paradigm, we give an approximation algorithm for each problem such that both algorithms have the approximation factor of $O(k)$ the same as the previous works done on these problems. However, the previous works need to solve $k$ linear programming, whereas our algorithms require only one linear programming. Therefore, our algorithms improve the running time of the previous algorithms.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Approximation algorithm</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Complexity</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">NP-hard problems</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Directed multi-multiway cut</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Directed multicut cut</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://ajmc.aut.ac.ir/article_3810_69f25b4f5d961c6937f15882badbf69f.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Amirkabir University of Technology</PublisherName>
				<JournalTitle>AUT Journal of Mathematics and Computing</JournalTitle>
				<Issn>2783-2449</Issn>
				<Volume>1</Volume>
				<Issue>2</Issue>
				<PubDate PubStatus="epublish">
					<Year>2020</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Heuristic artificial bee colony algorithm for solving the Homicidal Chauffeur differential game</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>153</FirstPage>
			<LastPage>163</LastPage>
			<ELocationID EIdType="pii">3819</ELocationID>
			
<ELocationID EIdType="doi">10.22060/ajmc.2019.16949.1025</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Zahra</FirstName>
					<LastName>Yazdaniyan</LastName>
<Affiliation>Department of Applied Mathematics, Faculty of Mathematics and Computer Science, Amirkabir University of Technology, Tehran,
Iran</Affiliation>

</Author>
<Author>
					<FirstName>M.</FirstName>
					<LastName>Shamsi</LastName>
<Affiliation>Department of Applied Mathematics, Faculty of Mathematics and Computer Science, Amirkabir University of Technology, Tehran,
Iran</Affiliation>

</Author>
<Author>
					<FirstName>Maria Do Rosario</FirstName>
					<LastName>De Pinho</LastName>
<Affiliation>Department of Electrical and Computer Engineering, SYSTEC, Faculdade de Engenharia, Universidade do Porto, 4200-465, Porto,
Portugal</Affiliation>

</Author>
<Author>
					<FirstName>Z.</FirstName>
					<LastName>Foroozandeh</LastName>
<Affiliation>Department of Electrical and Computer Engineering, SYSTEC, Faculdade de Engenharia, Universidade do Porto, 4200-465, Porto, Portugal</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2019</Year>
					<Month>08</Month>
					<Day>21</Day>
				</PubDate>
			</History>
		<Abstract>In this paper, we consider the Homicidal Chauffeur (HC) problem as an interesting and practical differential game. At first, we introduce a bilevel optimal control problem (BOCP) and prove that a saddle point solution for this game exists if and only if this BOCP has an optimal solution in which the optimal value of the objective function is equal to $1$. Then, BOCP is discretized and converted to a nonlinear bilevel programming problem. Finally, an Artificial Bee Colony (ABC) algorithm is used for solving this problem, in which the lower-level problem will be considered as a constraint and solved by an NLP-solver. Finally, to demonstrate the effectiveness of the presented method, various cases of HC problem are solved and the simulation results are reported.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Differential game</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Saddle point solution</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Artificial bee colony</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Bilevel optimal control</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://ajmc.aut.ac.ir/article_3819_d7bf45bb8b6003cc03fb68a78cdb6ff7.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Amirkabir University of Technology</PublisherName>
				<JournalTitle>AUT Journal of Mathematics and Computing</JournalTitle>
				<Issn>2783-2449</Issn>
				<Volume>1</Volume>
				<Issue>2</Issue>
				<PubDate PubStatus="epublish">
					<Year>2020</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>A new hash function and its use in read mapping on genome</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>165</FirstPage>
			<LastPage>170</LastPage>
			<ELocationID EIdType="pii">3820</ELocationID>
			
<ELocationID EIdType="doi">10.22060/ajmc.2019.15991.1020</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Farzaneh</FirstName>
					<LastName>Salari</LastName>
<Affiliation>Department of Mathematics and computer science, Amirkabir University of Technology, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Fatemeh</FirstName>
					<LastName>Zare Mirakabad</LastName>
<Affiliation>Department of Mathematics and computer science, Amirkabir University of Technology, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Mehdi</FirstName>
					<LastName>Sadeghi</LastName>
<Affiliation>National Institute of Genetic Engineering and Biotechnology, Tehran, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2019</Year>
					<Month>03</Month>
					<Day>13</Day>
				</PubDate>
			</History>
		<Abstract>Mapping reads onto genomes is an indispensable step in sequencing data analysis. A widely used method to speed up mapping is to index a genome by a hash table, in which genomic positions of $k$-mers are stored in the table. The hash table size increases exponentially with the $k$-mer length and thus the traditional hash function is not appropriate for a $k$-mer as long as a read. We present a hashing mechanism by two functions named $score1$ and $score2$ which can hash sequences with the length of reads. The size of hash table is directly proportional to the genome size, which is absolutely lower than that of hash table built by the conventional hash function. We evaluate our hashing system by developing a read mapper and running the mapper on $E. coli$ genome with some simulated data sets. The results show that the high percentage of simulated reads can be mapped to correct locations on the genome.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Read mapping</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Reference-based assembly</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Hash Function</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://ajmc.aut.ac.ir/article_3820_de7ce01f748ce6cb663e3e2cb327db6f.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Amirkabir University of Technology</PublisherName>
				<JournalTitle>AUT Journal of Mathematics and Computing</JournalTitle>
				<Issn>2783-2449</Issn>
				<Volume>1</Volume>
				<Issue>2</Issue>
				<PubDate PubStatus="epublish">
					<Year>2020</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Counting closed billiard paths</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>171</FirstPage>
			<LastPage>177</LastPage>
			<ELocationID EIdType="pii">3821</ELocationID>
			
<ELocationID EIdType="doi">10.22060/ajmc.2020.17320.1026</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Zahed</FirstName>
					<LastName>Rahmati</LastName>
<Affiliation>Department of Mathematics and Computer Science, Amirkabir University of Technology (Tehran Polytechnic), Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Sina</FirstName>
					<LastName>Farahzad</LastName>
<Affiliation>Department of Mathematics and Computer Science, Amirkabir University of Technology (Tehran Polytechnic), Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Ali</FirstName>
					<LastName>Rahmati</LastName>
<Affiliation>Malek-Ashtar University of Technology, Tehran, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2019</Year>
					<Month>11</Month>
					<Day>04</Day>
				</PubDate>
			</History>
		<Abstract>Given a pool table enclosing a set of axis-aligned rectangles, with a total of n edges, this paper studies $\it{closed~billiard~paths}$. A closed billiard path is formed by following the ball shooting from a starting point into some direction, such that it doesn’t touch any corner of a rectangle, doesn’t visit any point on the table twice, and stops exactly at the starting position. The $\it{signature}$ of a billiard path is the sequence of the labels of edges in the order that are touched by the path, while repeated edge reflections like $abab$ are replaced by $ab$. We prove that the length of a signature is at most $4.5n−9$, and we show that there exists an arrangement of rectangles where the length of the signature is $1.25n+2$. We also prove that the number of distinct signatures for fixed shooting direction ($45^{\circ}$) is at most $1.5n−6$.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Billiard Paths</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Maximum Path Length</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">computational geometry</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://ajmc.aut.ac.ir/article_3821_9489e0477a249fc2d912a25b0c2814a4.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Amirkabir University of Technology</PublisherName>
				<JournalTitle>AUT Journal of Mathematics and Computing</JournalTitle>
				<Issn>2783-2449</Issn>
				<Volume>1</Volume>
				<Issue>2</Issue>
				<PubDate PubStatus="epublish">
					<Year>2020</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>A model transformation approach to perform refactoring on software architecture using refactoring patterns based on stakeholder requirements</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>179</FirstPage>
			<LastPage>216</LastPage>
			<ELocationID EIdType="pii">3822</ELocationID>
			
<ELocationID EIdType="doi">10.22060/ajmc.2020.17541.1027</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Mohammad</FirstName>
					<LastName>Tanhaei</LastName>
<Affiliation>Department of Engineering, Ilam University, Ilam, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2019</Year>
					<Month>12</Month>
					<Day>15</Day>
				</PubDate>
			</History>
		<Abstract>Software Architecture (SA) generally has a considerable influence on software quality attributes. Coordination of software architecture to the requirements of the stakeholders and avoiding common mistakes and faults in designing SA increases the chance of success of the project and satisfaction of the stakeholders. Making the wrong decisions at the architectural design phase usually proves very costly later on. Refactoring is a method which helps in detecting and avoiding complications, improving the internal characteristics of software, while keeping the external behavior intact. Various problems can undermine the architecture refactoring process. The existence of different requirements in different domains, the diversity of architecture description languages, and the difficulty of describing refactoring patterns lead to the difficulty of performing automatic and semi-automatic refactoring on the SA. In this study, we use model transformation as a way to overcome the above mentioned difficulties. In this regard, the first step is converting the SA to a pivot-model. Then, based on the refactoring patterns, the refactoring process is performed on the pivotmodel. And finally, the pivot-model is converted back to the original (source) model. In this paper, the requirements of the stakeholders are taken into account in the refactoring process by modeling them as refactoring goals. These goals show the importance of the quality attributes in the project and the process of refactoring. The applicability of the framework is demonstrated using a case study.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Refactoring</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Software Architecture</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Pattern</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Model transformation</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://ajmc.aut.ac.ir/article_3822_46e6f2074d7747b2d0708cec653d86e3.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Amirkabir University of Technology</PublisherName>
				<JournalTitle>AUT Journal of Mathematics and Computing</JournalTitle>
				<Issn>2783-2449</Issn>
				<Volume>1</Volume>
				<Issue>2</Issue>
				<PubDate PubStatus="epublish">
					<Year>2020</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>The regularity of binomial edge ideals of graphs</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>217</FirstPage>
			<LastPage>221</LastPage>
			<ELocationID EIdType="pii">3929</ELocationID>
			
<ELocationID EIdType="doi">10.22060/ajmc.2020.16433.1024</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Sara</FirstName>
					<LastName>Saeedi Madani</LastName>
<Affiliation>Faculty of Mathematics and Computer Science, Amirkabir University of Technology (Tehran Polytechnic),Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Dariush</FirstName>
					<LastName>Kiani</LastName>
<Affiliation>Faculty of Mathematics and Computer Science, Amirkabir University of Technology (Tehran Polytechnic),Tehran, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2019</Year>
					<Month>05</Month>
					<Day>28</Day>
				</PubDate>
			</History>
		<Abstract>In this paper, we study the Castelnuovo-Mumford regularity and the graded Betti numbers of the binomial edge ideals of some classes of graphs. Our special attention is devoted to a conjecture which asserts that the number of maximal cliques of a graph provides an upper bound for the regularity of its binomial edge ideal.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Binomial edge ideal</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Castelnuovo-Mumford regularity</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">free cut edge</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://ajmc.aut.ac.ir/article_3929_619ad9ec206e7628fa7f63da7155254e.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Amirkabir University of Technology</PublisherName>
				<JournalTitle>AUT Journal of Mathematics and Computing</JournalTitle>
				<Issn>2783-2449</Issn>
				<Volume>1</Volume>
				<Issue>2</Issue>
				<PubDate PubStatus="epublish">
					<Year>2020</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Lie group analysis for short pulse equation</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>223</FirstPage>
			<LastPage>227</LastPage>
			<ELocationID EIdType="pii">3997</ELocationID>
			
<ELocationID EIdType="doi">10.22060/ajmc.2020.18416.1032</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Mehdi</FirstName>
					<LastName>Nadjafikhah</LastName>
<Affiliation>Department of Pure Mathematics, School of Mathematics, Iran University of Science and Technology, Narmak, Tehran, 16846-13114,
Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2020</Year>
					<Month>05</Month>
					<Day>12</Day>
				</PubDate>
			</History>
		<Abstract>In this paper, the classical Lie symmetry analysis and the generalized form of Lie symmetry method are performed for a general short pulse equation. The point, contact and local symmetries for this equation are given. In this paper, we generalize the results of H. Liu and J. Li [2], and add some further facts, such as an optimal system of Lie symmetry subalgebras and two local symmetries.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Lie symmetry analysis</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">General short pulse equation</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Invariant solution</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Local symmetry</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://ajmc.aut.ac.ir/article_3997_61935ef445eef5d128b2cf7df8033c1f.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Amirkabir University of Technology</PublisherName>
				<JournalTitle>AUT Journal of Mathematics and Computing</JournalTitle>
				<Issn>2783-2449</Issn>
				<Volume>1</Volume>
				<Issue>2</Issue>
				<PubDate PubStatus="epublish">
					<Year>2020</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>On the gradient Finsler Yamabe solitons</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>229</FirstPage>
			<LastPage>233</LastPage>
			<ELocationID EIdType="pii">3998</ELocationID>
			
<ELocationID EIdType="doi">10.22060/ajmc.2020.18420.1034</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Mohamad</FirstName>
					<LastName>Yar Ahmadi</LastName>
<Affiliation>Department of Mathematics, Faculty of Mathematical Sciences and Computer, Shahid Chamran University of Ahvaz, Ahvaz, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2020</Year>
					<Month>05</Month>
					<Day>13</Day>
				</PubDate>
			</History>
		<Abstract>Here, it is proved that the potential functions of Finsler Yamabe solitons have at most quadratic growth in distance function. Also it is obtained a finite topological type property on complete gradient Finsler Yamabe solitons under suitable scalar curvature assumptions.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Finsler metric</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">gradient Yamabe soliton</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">finite topological type</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://ajmc.aut.ac.ir/article_3998_b1b16f83391a831c34da00226ab0aba8.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Amirkabir University of Technology</PublisherName>
				<JournalTitle>AUT Journal of Mathematics and Computing</JournalTitle>
				<Issn>2783-2449</Issn>
				<Volume>1</Volume>
				<Issue>2</Issue>
				<PubDate PubStatus="epublish">
					<Year>2020</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Homotopy perturbation transform method for time-fractional Newell-Whitehead Segel equation containing Caputo-Prabhakar fractional derivative</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>235</FirstPage>
			<LastPage>250</LastPage>
			<ELocationID EIdType="pii">3999</ELocationID>
			
<ELocationID EIdType="doi">10.22060/ajmc.2020.18012.1028</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Mohammadhossein</FirstName>
					<LastName>Derakhshan</LastName>
<Affiliation>Faculty of Mathematics, K. N. Toosi University of Technology, P. O. Box: 16765-3381, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Azim</FirstName>
					<LastName>Aminataei</LastName>
<Affiliation>Faculty of Mathematics, K. N. Toosi University of Technology, P. O. Box: 16765-3381, Tehran, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2020</Year>
					<Month>02</Month>
					<Day>27</Day>
				</PubDate>
			</History>
		<Abstract>The main aim of the current article is to find the solution for Newell Whitehead-Segel equations with constant coefficients containing Caputo-Prabhakar fractional derivative using the homotopy perturbation transform method. The convergence analysis of the obtained solution for the proposed fractional order model is presented. Four examples are presented to illustrate the efficiency and applicability and accurateness of the proposed numerical technique</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Nonlinear fractional differential equations</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Newell-Whitehead-Segel equations</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Homotopy perturbation transform method</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Caputo-Prabhakar fractional derivative</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://ajmc.aut.ac.ir/article_3999_4955dedeffddde11820cf2ce1a74c6ba.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Amirkabir University of Technology</PublisherName>
				<JournalTitle>AUT Journal of Mathematics and Computing</JournalTitle>
				<Issn>2783-2449</Issn>
				<Volume>1</Volume>
				<Issue>2</Issue>
				<PubDate PubStatus="epublish">
					<Year>2020</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>New directions in general fuzzy automata: a dynamic-logical view</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>251</FirstPage>
			<LastPage>262</LastPage>
			<ELocationID EIdType="pii">4026</ELocationID>
			
<ELocationID EIdType="doi">10.22060/ajmc.2020.18629.1040</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Khadijeh</FirstName>
					<LastName>Abolpour</LastName>
<Affiliation>Dept. of Math., Shiraz Branch, Islamic Azad University, Shiraz, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Mohammad Mehdi</FirstName>
					<LastName>Zahedi</LastName>

						<AffiliationInfo>
						<Affiliation>Dept. of Math., Graduate University of Advanced Technology, Kerman, Iran</Affiliation>
						</AffiliationInfo>

						<AffiliationInfo>
						<Affiliation>Dept. of Math., Behbahan Khatam Alanbia University of Technology, Behbahan, Iran</Affiliation>
						</AffiliationInfo>

</Author>
<Author>
					<FirstName>Marzieh</FirstName>
					<LastName>Shamsizadeh</LastName>

						<AffiliationInfo>
						<Affiliation>Dept. of Math., Graduate University of Advanced Technology, Kerman, Iran</Affiliation>
						</AffiliationInfo>

						<AffiliationInfo>
						<Affiliation>Dept. of Math., Behbahan Khatam Alanbia University of Technology, Behbahan, Iran</Affiliation>
						</AffiliationInfo>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2020</Year>
					<Month>06</Month>
					<Day>24</Day>
				</PubDate>
			</History>
		<Abstract>In the current study, by a general fuzzy automaton we aim at showing a set of propositions related to a given automaton showing that the truth-values are depended on thestates, inputs and membership values of active states at time t. This new approach enables us to consider automata from a different point of view which is more close to logical treatment and helps us make estimations about the behavior of automaton particularly in a nondeterministic mode. The logic consists of propositions on the given GFA and its dynamic nature is stated by means of the so-called transition functor. This logic enables us to derive a certain relation on the set of states labeled by inputs. In fact, it is shown that if our set of propositions is large enough, this recovering of the transition relation is possible. Through a synthesis in the theory of systems, this study contributes to construct a general fuzzy automaton which realizes a dynamic process at least partially known to the user, which has been fully achieved in Theorem 3.6. Also, we study the theory of general fuzzy automata by using the concepts of operators. Such operators help us in the algebraic study of general fuzzy automata theory and provide a platform to use fuzzy topological therein. Further, a Galois connection is obtained between the state-transition relation on states and thetransition operators on propositions. To illustrate the proposed approach, the subject matter is more elaborated in detail through examples.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Dynamic Logic</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">General Fuzzy Automata</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Proposition</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Functor</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">modal</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Transition</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Active State</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://ajmc.aut.ac.ir/article_4026_e4987ba8281ce1725cd4a51bd420d7f2.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Amirkabir University of Technology</PublisherName>
				<JournalTitle>AUT Journal of Mathematics and Computing</JournalTitle>
				<Issn>2783-2449</Issn>
				<Volume>1</Volume>
				<Issue>2</Issue>
				<PubDate PubStatus="epublish">
					<Year>2020</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>A linear-time algorithm to compute total $[1,2]$-domination number of block graphs</ArticleTitle>
<VernacularTitle></VernacularTitle>
			<FirstPage>263</FirstPage>
			<LastPage>270</LastPage>
			<ELocationID EIdType="pii">4029</ELocationID>
			
<ELocationID EIdType="doi">10.22060/ajmc.2020.18444.1035</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Pouyeh</FirstName>
					<LastName>Sharifani</LastName>

						<AffiliationInfo>
						<Affiliation>Institute for Research in Fundamental Sciences (IPM), Tehran, Iran</Affiliation>
						</AffiliationInfo>

						<AffiliationInfo>
						<Affiliation>Department of Computer Science, Yazd University, Yazd, Iran</Affiliation>
						</AffiliationInfo>

</Author>
<Author>
					<FirstName>Mohammadreza</FirstName>
					<LastName>Hooshmandasl</LastName>

						<AffiliationInfo>
						<Affiliation>Department of Computer Science, University of Mohaghegh Ardabili, Ardabil, Iran</Affiliation>
						</AffiliationInfo>

						<AffiliationInfo>
						<Affiliation>Department of Computer Science, Yazd University, Yazd, Iran</Affiliation>
						</AffiliationInfo>

</Author>
<Author>
					<FirstName>Saeid</FirstName>
					<LastName>Alikhani</LastName>
<Affiliation>Department of Mathematics, Yazd University, Yazd, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2020</Year>
					<Month>05</Month>
					<Day>19</Day>
				</PubDate>
			</History>
		<Abstract>Let $G=(V, E)$ be a simple graph without isolated vertices. A set $D\subseteq V$ is a total $[1,2]$-dominating set if for every vertex $v\in V , 1\leq |N(v)\cap D|\leq 2$. The total $[1,2]$-domination problem is to determine the total $[1,2]$-domination number $\gamma_{t[1,2]}(G)$, which is the minimum cardinality of a total $[1,2]$-dominating set for a graph $G$. In this paper, we present a linear-time algorithm to compute $\gamma_{t[1,2]}(G)$, for a block graph $G$.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Total $[1,2]$-set</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Dominating set</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Block graph</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://ajmc.aut.ac.ir/article_4029_db3fbe3f0db6f6079698d2381e798970.pdf</ArchiveCopySource>
</Article>
</ArticleSet>
