Amirkabir University of TechnologyAUT Journal of Mathematics and Computing2783-24493120220201On the geometry of Zermelo's optimal control trajectories110454210.22060/ajmc.2021.20459.1066ENZohrehFathiFaculty of Mathematics Amirkabir University of TechnologyBehrozBidabadDepartment of Mathematics and Computer Science, Amirkabir University of Technology (Tehran Polytechnic)0000-0003-3993-4268Journal Article20210824In the present work, we study the optimal control paths in the Zermelo navigation problem from the geometric and differential equations point of view rather than the optimal control point of view, where the latter has been carried out in our recent work. Here, we obtain the precise form of the system of ODE where the solutions are optimal trajectories of Zermelo's navigation problem. Having a precise equation allows optimizing a cost function more accurately and efficiently. The advantage of these equations is to approximate optimal trajectories in the general case by the first order approximation of external fields ω. The latter could be solved numerically since we have retrieved simpler equations for these paths.https://ajmc.aut.ac.ir/article_4542_e97d2e032d88876e90e0aeae3c9fc652.pdfAmirkabir University of TechnologyAUT Journal of Mathematics and Computing2783-24493120220201The a-number of maximal curves of third largest genus1116455310.22060/ajmc.2021.20511.1069ENVahidNouroziDepartment of Mathematics and Computer Science, Amirkabir University of Technology (Tehran Polytechnic), Tehran, IranSaeedTafazolianIMECC/UNICAMP, R. Sergio Buarque de Holanda, 651, Cidade Universitaria, Zeferino Vaz, 13083-859, Campinas, SP, BrazilJournal Article20210907The a-number is an invariant of the isomorphism class of the p-torsion group scheme. In this paper, we compute a closed formula for the a-number of y<sup>q</sup> + y =x<sup>(q+1)/3</sup> and $sum_{t=1}^{s} y^{q⁄ 3^t}= x<sup>q+1</sup><sup>$</sup> with q = 3<sup>s</sup> over the finite field <strong>F</strong><sub>q<sup>2</sup></sub> using the action of the Cartier operator on H<sup>0</sup>(<em>C</em>,Ω<sup>1</sup>).https://ajmc.aut.ac.ir/article_4553_c4d0b23d2050389cbeb4e0c4f3608d00.pdfAmirkabir University of TechnologyAUT Journal of Mathematics and Computing2783-24493120220201Dym equation: group analysis and conservation laws1726438210.22060/ajmc.2021.19680.1050ENS. RezaHejaziFaculty of Mathematical Sciences, Shahrood University of Technology, Shahrood, Semnan, Iran.AzadehNaderifardFaculty of Mathematical Sciences, Shahrood University of Technology, Shahrood, Semnan, Iran.Journal Article20210227In this paper group-invariant properties of the Dym equation are studied. Lie symmetries are given and some group-invariant solutions are found with the use of similarity variables obtained from these operators. Conservation laws are computed via three methods. Direct method for construction of conservation laws is introduced by the concept of multipliers and Euler-Lagrange operator. Next, the non-linearly self-adjointness of the considered PDE is stated. Then, the modified Noether's theorem is used for finding conservation laws. Finally, the third method is established via the Hereman-Pole method by using the evolutionary form of the equation.https://ajmc.aut.ac.ir/article_4382_055ceeb805f167305c236103d1b71433.pdfAmirkabir University of TechnologyAUT Journal of Mathematics and Computing2783-24493120220201Locally projectively flatness and locally dually flatness of generalized Kropina conformal change of m-th root metric2733463310.22060/ajmc.2021.20561.1070ENAchalSinghDepartment of Mathematics
Institute of Applied Sciences and Humanities
GLA University Mathura-281406, IndiaManojKumarDepartment of Mathematics
Dr Rammanohar Lohia Avadh University, Ayodhya-224001, UP, IndiaC. K.MishraDepartment of Mathematics and Statistics
Dr. Rammanohar Lohiya Avadh University, Ayodhya-224001Journal Article20210914In this paper, we consider the generalized Kropina conformal change of m-th root metric and for this, prove a necessary and sufficient condition of locally projectively flatness. Also we proved a necessary and sufficient condition for the generalized Kropina conformal change of m-th root metric is locally dually flat.https://ajmc.aut.ac.ir/article_4633_773cfa89212b73ab62f9023aba8eee18.pdfAmirkabir University of TechnologyAUT Journal of Mathematics and Computing2783-24493120220201Characterization of some alternating groups by order and largest element order3544457110.22060/ajmc.2021.19507.1047ENAliMahmoudifarDepartment of Mathematics, North Tehran Branch, Islamic Azad University, Tehran, IranAyoubGharibkhajehDepartment of Mathematics, North Tehran Branch, Islamic Azad University, Tehran, IranJournal Article20210115The prime graph (or Gruenberg-Kegel graph) of a finite group is a well-known graph. In this paper, first, we investigate the structure of the finite groups with a non-complete prime graph. Then as an application, we prove that every alternating group A<sub>n</sub>, where n≤31 is determined by its order and its largest element order. Also, we show that A<sub>32</sub> is not characterizable by order and the largest element order.https://ajmc.aut.ac.ir/article_4571_5f334a3e023d1ce38b1c2d0b3cfb6a75.pdfAmirkabir University of TechnologyAUT Journal of Mathematics and Computing2783-24493120220201Extracting some supra topologies from the topology of a topological space using stacks4552429610.22060/ajmc.2021.19123.1042ENAminTalabeigiDepartment of Mathematics, Payame Noor University, P.O. Box, 19395-3697,
Tehran, Iran.Journal Article20201012A collection μ of subsets of a nonempty set X is a supra topology on X whenever ∅ and X belong to μ, and also μ is<br />closed under arbitrary unions. Also, a nonempty collection <em>S</em> of nonempty subsets of a nonempty set X is called a stack on X whenever it is closed under operation superset. In this paper, we are going to introduce an approach to extract some supra topologies from the topology of a topological space. For this purpose, we consider a topological space (X, τ) with a closed set P of its subsets. Using a stack <em>S</em> on the space (X, τ) and the closure operator <em>cl</em> associated with τ, we define a supra closure operator λ<sub>P</sub> on X to create the desired supra topology. We then characterize the form of this resulting supra topology and also determine its relationship to the initial topology of the space.https://ajmc.aut.ac.ir/article_4296_a119ab172dae103dc5c9686a269092cc.pdfAmirkabir University of TechnologyAUT Journal of Mathematics and Computing2783-24493120220201Numerical differential continuation approach for systems of nonlinear equations with singular Jacobian5358464410.22060/ajmc.2021.20487.1068ENMohammad AliMehrpouyaDepartment of Mathematics, Tafresh University0000-0001-9598-4943Journal Article20210829It is well known that, one of the useful and rapid methods for a nonlinear system of algebraic equations is Newton's method. Newton's method has at least quadratic convergence when the Jacobian is a nonsingular matrix in a neighborhood of the solution. In this paper, a differential continuation method is presented for solving the nonlinear system of algebraic equations whose Jacobian matrix is singular at the solution. For this purpose, at first, an auxiliary equation named the homotopy equation is constructed. Then, by differentiating from the homotopy equation, a system of differential equations is replaced instead of the target problem and solved. In other words, the solution of the nonlinear system of algebraic equations with singular Jacobian is transformed to the solution of a system of differential equations. Some numerical tests are presented at the end and the computational efficiency of the method is described.https://ajmc.aut.ac.ir/article_4644_e756b9224e879823a1de07090b1f42f9.pdfAmirkabir University of TechnologyAUT Journal of Mathematics and Computing2783-24493120220201The assessment of essential genes in the stability of PPI networks using critical node detection problem5976450510.22060/ajmc.2021.20101.1053ENJavadRezaeiDepartment of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, IranFatemehZare MirakabadDepartment of Mathematics and Computer Science, Amirkabir University of Technology (Tehran Polytechnic)Sayed-AmirMarashiDepartment of Biotechnology, College of Science, University of Tehran, Tehran, IranSeyed AliMirHassaniDepartment of Mathematics and Computer Science, Amirkabir University of Technology (Tehran Polytechnic)Journal Article20210531Essential genes and proteins as their products encode the basic functions of a cell in a variety of conditions and are vital for the survival of a cell. Analyzing the characteristics of these proteins provides important biological information. An interesting analysis is to demonstrate the correlation between topological importance of a protein in protein-protein interaction networks and its essentiality. Different centrality criteria such as degree, betweenness, closeness, and eigenvector centralities are used to investigate such a correlation. Despite the remarkable results obtained by these methods, it is shown that the centrality criteria in scale-free networks show a high level of correlations which indicate that they share similar topological information of the networks. In this paper, we use a different approach for analyzing this correlation and use a well-known problem in the field of graph theory, Critical Node Detection Problem and solve it on the protein-protein interaction networks to obtain a subset of proteins called critical nodes which have the most effect on the network stability. Our results show that essential proteins have a more prominent presence in the set of critical nodes than what expected at random samples. Furthermore, the essential proteins represented in the set of critical nodes have a different distribution of topological properties compared to the essential proteins recovered by the centrality-based methods.<br />All the source codes and data are available at “http://bioinformatics.aut.ac.ir/CNDP_PPI_networks/”.https://ajmc.aut.ac.ir/article_4505_6aa5ff14e54e7a2c643d3d53dab1369d.pdfAmirkabir University of TechnologyAUT Journal of Mathematics and Computing2783-24493120220201Comparing regression methods with non-Gaussian stable errors7791457510.22060/ajmc.2021.20246.1062ENRezaAlizadeh NoughabiDepartment of Statistics, Faculty of Mathematics and Computer Science,
Amirkabir University of Technology (Tehran Polytechnic), Tehran, Iran.AdelMohammadpourDepartment of Mathematics and Computer Science, Amirkabir University of Technology (Tehran Polytechnic)0000-0002-5079-7025Journal Article20210708Nolan and Ojeda-Revah (2013) proposed a regression model with heavy-tailed stable errors. In this paper we extend this method for multivariate heavy-tailed errors. Furthermore, A likelihood ratio test (LRT) for testing significant of regression coefficients is proposed. Also, confidence intervals based on Fisher information for Nolan and Ojeda-Revah (2013) method, called NOR, and LRT are computed and compared with well-known methods. At the end we provide some guidance for various error distributions in heavy-tailed cases.https://ajmc.aut.ac.ir/article_4575_0cb2feab9a696847663b1f831beeb0c3.pdfAmirkabir University of TechnologyAUT Journal of Mathematics and Computing2783-24493120220201Applying IOTA into distributed computing to master the uncertainty9399451310.22060/ajmc.2021.20153.1055ENMortezaMozaffariDepartment of Mathematics and Computer Science, Amirkabir University of TechnologyFarhadRahmatiDepartment of Mathematics and Computer Science, Amirkabir University of Technology (Tehran Polytechnic)Journal Article20210609In distributed computing, the uncertainty is the most challenging issue which is caused by the asynchrony of distributed entities' communication and many other reasons such as geographical scattering of distributed entities, their mobility, and etc. In this paper, IOTA, a DAG based Distributed ledger technology is used in order to cope with asynchronous communications and uncertainty. Moreover, IOTA private network is chosen to deal with other mentioned problem inside distributed computing. As case study, a system is presented which could be implemented inside Tehran Polytechnic university to bring computational power of computers with low resources together in order to solve many problems which can be solved in distributed computing manner.https://ajmc.aut.ac.ir/article_4513_66ad0ffa149198a9101010533215a023.pdfAmirkabir University of TechnologyAUT Journal of Mathematics and Computing2783-24493120220201An effective version of definability in metric structures101111464510.22060/ajmc.2021.20660.1071ENNazaninRoshandel TavanaDepartment of Mathematics and computer science, Amirkabir University of technologyJournal Article20211012In this paper, a computably definable predicate in metric structures is defined and characterized. Then, it is proved that every separable infinite-dimensional Hilbert structure in an effectively presented language is computable. Moreover, every definable predicate in these structures is computable.https://ajmc.aut.ac.ir/article_4645_4280298451c67d5e0ba7b6a16cb157c9.pdfAmirkabir University of TechnologyAUT Journal of Mathematics and Computing2783-24493120220201A new approach to solve the reliability problem in any VoIP steganography system113127476910.22060/ajmc.2022.20710.1073ENMohammad-RezaRafsanjani SadeghiDepartment of Mathematics and Computer Science, Amirkabir University of Technology (Tehran Polytechnic)0000-0002-7676-4168ParvanehAmirzade DanaDepartment of Mathematics and Computer Science, Amirkabir University of Technology (Tehran Polytechnic)BahramJavadiDepartment of Mathematics and Computer Science, Amirkabir University of Technology (Tehran Polytechnic)Journal Article20211026VoIP is naturally an unreliable communication system. Thus, using the best VoIP steganographic systems, the accuracy of the hidden message is impaired as a result of the VoIP packet loss. There are many steganography and steganalysis researches that try to improve the robustness and accuracy of VoIP steganography methods. In addition to the fact that these works are done depend on a particular method, none of them have solved the problem of packet loss. Applying error correcting codes, prior to embedding, is a wellknown technique in telecommunication to improve robustness and to reconstruct Missing data. However, in the case of VoIP communication, a codeword entirely embedded in the packet may be lost due to the packet loss and therefore ECC techniques will not be capable of reconstructing the lost bits. In this paper, we design a novel scheme to increase the reliability of VoIP steganography systems. We emphasize that our proposed method, independent of the embedding and extracting algorithm, can be used in all VoIP steganography systems. After encoding the secret message to the codewords of n bits, we distribute these n bits into n successive RTP packets, in such a way that, losing one packet leads to missing only one bit of each codeword. Then, with the idea of telecommunication solutions in recovering lost data, when up to t of n packets are lost we can recover the secret message using a t-error correcting code <strong>C</strong>(n,k,d). Provided that the average of packet loss over the network is less than 1%, using a t-error correcting code <strong>C</strong>(n,k,d), the probability of losing hidden data, in each category of n-packets, P<sub>e</sub>, is less than 10<sup>-2t</sup>. Hence, applying the t-error correcting codes with larger t, in the proposed scheme, results in more reliable steganographic systems.https://ajmc.aut.ac.ir/article_4769_696b241fdf88dc6eeb233c7364662e2d.pdf