https://stm1.bookpi.org/index.php/tams-v1/issue/feed Theory and Applications of Mathematical Science Vol. 1 2021-07-21T10:07:08+00:00 Open Journal Systems <p><em>This book covers all areas of mathematical science. The contributions by the authors include</em><em>&nbsp;combinatorics, magic polygons, degenerated magic polygons, bifurcation, oscillatory flow, matrix determinant, matrix inversion, co-factor expansion, QR decomposition, gauss elimination, polynomial division, non-preemptive EDF scheduling, code refactoring, machine learning, intrusion detection, false positives, neuro-fuzzy, multilayer perceptron, voting combination rule, Angstrom model, fuzzy logic system, neural network, solar radiation, Linear Multiparameter Matrix Eigenvalue Problems (LMEP), Generalized Eigenvalue Problems (GEP), LU-decomposition of matrix, implicit determinant algorithm, Hahn-Banach theorem, separation theorems, convex programming, Kuhn-Tucker theorem, minimax theorem, differential subordination, non-analytic function, Homfly polynomial, periodic links, knotted trivalent plane graphs, convergent and divergent channels, perturbation method etc. This book contains various materials suitable for students, researchers and academicians in the field of mathematical science.</em></p> https://stm1.bookpi.org/index.php/tams-v1/article/view/24 Magic Polygons and Degenerated Magic Polygons: Characterization and Properties 2021-07-21T09:07:20+00:00 Danniel Dias Augusto Josimar da Silva Rocha jsrocha74@gmail.com <p>In this work we define Magic Polygons P(n; k) and Degenerated Magic Polygons D(n; k) and we obtain their main properties, such as the magic sum and the value corresponding to the root vertex. The existence of magic polygons P(n; k) and degenerated magic polygons D(n; k) are discussed for certain values of n and k:</p> 2020-01-04T00:00:00+00:00 ##submission.copyrightStatement## https://stm1.bookpi.org/index.php/tams-v1/article/view/25 Blood Flow Through a One-point Stenosed Artery: Reynolds Number Effects 2021-07-21T09:12:58+00:00 W. I. A. Okuyade wiaokuyade@gmail.com T. M. Abbey <p>This paper studies the effects of Reynolds number on the oscillating flow in through a one-point stenosed artery. The nonlinear equations governing the flow are solved analytically by the method of perturbation series solutions. Expressions for the velocities and wall shear stress are obtained and analyzed graphically. It is found that increase in the Reynolds number increases the velocities and wall shear stress. Similarly, it is seen that a flow separation occurs in the radial velocity flow structure.</p> 2020-01-04T00:00:00+00:00 ##submission.copyrightStatement## https://stm1.bookpi.org/index.php/tams-v1/article/view/26 Automatic Task Splitting for Uniprocessor Systems Scheduled with Non-Preemptive EDF 2021-07-21T09:18:45+00:00 Michael Short m.short@tees.ac.uk <p>Although preemptive scheduling dominates non-preemptive scheduling from a schedulability perspective, the latter will often be chosen by developers of real-time systems with resource constraints due to the inherently lower system overheads, easier code implementation and timing analysis. This paper is concerned with the uniprocessor scheduling of periodic and sporadic tasks with arbitrary relative deadlines in real-time systems using the non-preemptive version of the Earliest Deadline First (npEDF) algorithm. Although npEDF is known to be optimal among the non-preemptive work-conserving schedulers, it can still be restrictive in the sense that there exists uniprocessor-feasible task sets (with arbitrarily low CPU utilization) that are not schedulable with npEDF. For such task sets, system developers are forced to either consider the use of an alternate scheduling strategy or refactor the task software in some beneficial way. One such beneficial way is to apply a concept known as ‘task splitting’. However to date, little guidance has been available to assist developers with the latter process, and it is often performed on an ad-hoc basis. This paper will propose the application of a fast and efficient task splitting technique to assist developers with this software refactoring process, which can thus be used to maximize the achievable CPU utilization whilst retaining the benefits of non-preemption. Examples and experimental results are given to illustrate the performance of the algorithm. For random but representative task sets, the results also indicate that in the average case only a relatively small number of tasks require the application of task splitting to become schedulable under npEDF.</p> 2020-01-04T00:00:00+00:00 ##submission.copyrightStatement## https://stm1.bookpi.org/index.php/tams-v1/article/view/27 Fuzzy Model, Neural Network and Empirical Model for the Estimation of Global Solar Radiation for Port-Harcourt, Nigeria 2021-07-21T09:25:46+00:00 Olumide Olufemi Akinnawo oluzman@gmail.com Oluwaseun Caleb Adebayo Abel Giwa Usifo Abiodun Kazeem Ogundele <p>The invaluable role of the estimation of global solar radiation in solar engineering systems provides very useful direction for various solar applications. This paper employs the Adaptive Neuro Fuzzy Inference System (ANFIS), Artificial Neural Network (ANN) and regressive technique for the prediction of global solar radiation(GSR) on horizontal surface using temperature swing and relative humidity as input parameters covering years 1981 to 2005. The performance of the models was tested using statistical indicators such as mean bias error (MBE), root mean square error (RMSE) and correlation coefficient (CC). The results with ANFIS and ANN method provide a relatively better prediction with ANFIS the more preferable.</p> 2020-01-04T00:00:00+00:00 ##submission.copyrightStatement## https://stm1.bookpi.org/index.php/tams-v1/article/view/28 Convex Programming Based on Hahn-Banach Theorem 2021-07-21T09:30:13+00:00 Manuel Alberto M. Ferreira manuel.ferreira@iscte.pt <p>The main objective of this chapter is to present the separation theorems, important consequences of Hahn-Theorem theorem. Therefore, we begin with an overview on convex sets and convex functionals. Then go on with the Hahn-Banach theorem and separation theorems. Follow these results specification: first for normed spaces and then for a subclass of these spaces, the Hilbert spaces. In this last case plays a key role the Riesz representation theorem. Separation theorems are key results in convex programming. Then the chapter ends with the outline of applications of these results in convex programming, Kuhn-Tucker theorem, and in minimax theorem, two important tools in operations research, management and economics, for instance.</p> 2020-01-04T00:00:00+00:00 ##submission.copyrightStatement## https://stm1.bookpi.org/index.php/tams-v1/article/view/29 Determinant of Matrix by Order Condensation 2021-07-21T09:35:23+00:00 Feng Cheng Chang fcchang007@yahoo.com <p>A simple and direct process is derived to compute the determinant of any square matrix of high order. The approach involves successive applying the matrix order condensation algorithm.&nbsp; A computer program listing in MATLAB is included and examples for finding the determinant of a given 7x7 matrix are given here for illustration.</p> 2020-01-04T00:00:00+00:00 ##submission.copyrightStatement## https://stm1.bookpi.org/index.php/tams-v1/article/view/30 Ensemble of Soft Computing Techniques for Inline Intrusion Detection System 2021-07-21T09:39:05+00:00 D. P. Gaikwad dp.g@rediffmail.com R. C. Thool <p>An intrusion detection system automates the supervising activities in a computer network and computer system. It is used to analyses activities in network or computer. Basically, intrusion detection system is used to identify abuse or incomplete threats of abuse of computer security policies. It detects intruders, malicious actions, malicious code, and unwanted communications over the Internet. Despite the advancements and substantial research efforts, the general intrusion detection system gives high false positive rate, low classification accuracy and slow speed. For overcoming these limitations, many researchers are trying to design and implement intrusion detection systems that are easy to use and easy to install. There are many methods and techniques of intrusion detection system. Soft computing techniques are gradually being used for intrusion detection system. In this chapter, we present the ensemble approach of different soft computing techniques for designing and implementing inline intrusion detection system. In this work, three base classifiers are implemented using different artificial neural networks. Initially, Neuro-fuzzy neural network, Multilayer Perceptron and Radial Basis Function neural network have been constructed. These three networks have been combined using voting methods of machine learning. Three base classifiers are separately trained and evaluated in term of classification accuracy, false positive rate, false negative rate, sensitivity, specificity and precision. The voting combination ensemble method of machine learning has used to combine these three trained models. The performance ensemble classifier is evaluated and compared with the performances of base classifiers. In our study, we found that final ensemble classifier using Neuro-fuzzy, Multilayer Perceptron and Radial Basis Function neural network is superior to the individual base classifier in detection of intruder in network. The performance of ensemble classifier is measured in terms of classification accuracy and sensitivity. It is also found that ensemble based classifier for intrusion detection system has reasonable classification accuracy, the best sensitivity and false negative rate with very low false positive rate on test data set. The experimental results show that the base classifiers take very less time to build models and the proposed ensemble classifier for intrusion detection system takes very less time to test data set. These advantages can help to deploy the intrusion detection system to easily capture and detect online packets.</p> 2020-01-04T00:00:00+00:00 ##submission.copyrightStatement## https://stm1.bookpi.org/index.php/tams-v1/article/view/31 Energy Integration to Ensure Effective Generation Supply and Distribution in Ghana Corporation Perspective 2021-07-21T09:44:34+00:00 Francois Mahama Carlos Ankora thedonkarlos@gmail.com Noble Kuadey Lily Bensah <p><strong>Aims: </strong>The objectives of the research are to examine the awareness and efficiency of the renewable energy law in Ghana; determine the main source for energy generated by the VRA, GRIDCO, and ECG; determine the distribution gap and find out how effectively these corporations are making use of the other resources to generate electric energy in Ghana.</p> <p><strong>Study Design:</strong>&nbsp; Purposive Sampling technique study design.</p> <p><strong>Place and Duration of Study:</strong> Volta River Authority, Ghana Grid Company, Electricity Company of Ghana, Ghana, between April 2016 and August 2016.</p> <p><strong>Methodology:</strong> We included sampled employees from the Volta River Authority, Ghana Grid Company, Electricity Company of Ghana. A total of 300 employees of the three organizations were selected for the research. The study employed a purposive sampling technique in selecting the employees from the three organizations.</p> <p><strong>Results:</strong> Data collected was analyzed using appropriate descriptive and inferential statistics. Results revealed that all employees are aware of the Renewable Energy Law Act 832 and that it is defined as energy obtained from non-depleting sources such as “Wind energy”, “Solar energy”, “Bio-energy”, “Geothermal energy”, and “Ocean energy”. Also, this study has established that, “hydro power sources”, “thermal energy sources”; and “renewable energy sources” are the main sources of energy generated by the Volta River Authority and also the type of renewable energy currently generated by the Volta River Authority is the solar energy.</p> <p>Furthermore, the study has been able to establish that the Volta River Authority currently produce between 2100 to 2499 megawatts of electricity but however, there is a distribution gap or shortfall of about 900 to 1299 megawatts of electricity. Finally, findings from the study revealed that other corporations generate about 900 to 1299 megawatts of electricity.</p> <p><strong>Conclusion:</strong> “High-Cost” and “Lack of trust in the technology” are the factors that will prevent the adoption of renewable energy sources. Also, “Lack of budget funding” and “Unavailability of Gas/Crude oil to power plants” are the barriers to improving energy efficiency. It was however recommended that, the government should endeavor to initiate informative programs aimed at promoting renewable energy and provide capital subsidies and make investments through specialized agencies created for the promotion of renewable energy development and for installation of renewable energy.</p> 2020-01-04T00:00:00+00:00 ##submission.copyrightStatement## https://stm1.bookpi.org/index.php/tams-v1/article/view/32 Computation of Partial Derivative of Matrix Determinant Arises in Multiparameter Eigenvalue Problems 2021-07-21T09:55:13+00:00 Niranjan Bora niranjanbora11@gmail.com <p>This chapter considers an iterative scheme based on Newton’s method to find the solution of eigenvalues of Linear Multiparameter Matrix Eigenvalue Problems . This chapter is also intended to review some iterative algorithms for computation of partial derivatives of matrix determinant involved in Newton’s Method. First algorithm is based on standard Jacobi formula and second one is based on LU-decomposition Method together with an algorithm to compute directly the entries of the matrices involved in decomposition. Finally, an implicit determinant method is used for the computation of the partial derivatives of matrix determinant. Although the algorithms can be used to find the approximate eigenvalues of s, but the numerical works are performed by considering three-parameter case for better convenience and to relax computational cost and time. Numerical example is presented to test the efficiency of each iterative algorithms. Errors in computed eigenvalues are also compared with exact eigenvalues evaluated by -Method, adopted by Atkinson.</p> 2020-01-04T00:00:00+00:00 ##submission.copyrightStatement## https://stm1.bookpi.org/index.php/tams-v1/article/view/33 Hom y Polynomial of Knotted Trivalent Plane Graphs 2021-07-21T09:59:38+00:00 K. Qazaqzeh Ayman A. Aboufattoum ayman@sci.kuniv.edu.kw E. A. Elsakhawy A. T. Diab <p>We study the Hom y polynomial of periodic knotted trivalent plane graphs introduced in [1]. We show how periodicity of a knotted trivalent plane graphs is re ected in this polynomial. In particular, we derive congruences of periodic knotted trivalent plane graphs in terms of this polynomial invariant. These congruences yield criteria for periodicity of knotted trivalent plane graphs.</p> 2020-01-04T00:00:00+00:00 ##submission.copyrightStatement## https://stm1.bookpi.org/index.php/tams-v1/article/view/34 Differential Subordinations for Non-analytic Functions 2021-07-21T10:04:13+00:00 Georgia Irina Oros georgia_oros_ro@yahoo.co.uk Gheorghe Oros <p>In paper [1], Petru T. Mocanu has obtained sufficient conditions for a function in the classes C (U), respectively C 2 (U) to be univalent and to map U onto a domain which is starlike (with respect to origin), respectively convex. Those conditions are similar to those in the analytic case. In paper [2], Petru T. Mocanu has obtained sufficient conditions of univalency for complex functions in the class C 1 which are also similar to those in the analytic case. Having those papers as inspiration, we have tried to introduce the notion of subordination for non-analytic functions of classes C and C 2 following the classical theory of differential subordination for analytic functions introduced by S.S. Miller and P.T. Mocanu in papers [3] and [4] and developed in the book [5]. Let Ω be any set in the complex plane C, let p be a non-analytic function in the unit disc U, p ∈ C (U) and let ψ(r, s, t; z) : C 3 ×U → C. In article [6] we have considered the problem of determining properties of the function p, non-analytic in the unit disc U, such that p satisfies the differential subordination. ψ(p(z), Dp(z), D 2 p(z) − Dp(z); z) ⊂ Ω ⇒ p(U) ⊂ ∆. The present chapter is based on the results contained in paper [7], some parts of it have been removed and results obtained after the appearance of the paper have been added.</p> 2020-01-04T00:00:00+00:00 ##submission.copyrightStatement## https://stm1.bookpi.org/index.php/tams-v1/article/view/35 Oscillatory Blood Flow in Bifurcating Capillaries 2021-07-21T10:07:08+00:00 W. I. A. Okuyade wilsonia6011@gmail.com <p>Oscillatory blood flow in bifurcating capillaries is examined. The governing nonlinear and coupled equations expressed in the form of the Boussinesq approximations are solved by the method of perturbation series expansions. Solutions for the concentration, temperature and velocity are obtained, and presented quantitatively using Malple 18 computational software. The results show that the rate of chemical reaction, Hartmann number (M<sup>2</sup>≤I.0), heat exchange parameter and Grashof number (Gr/Gc≤I.0) tend to increase the velocity of the flow. The increase in the velocity structure has some attendant implications. In fact, it tends to increase the rate of transport of oxygen and nutrient-rich blood to the tissues, and this in turn enhances the physiological well-being of man.</p> 2020-01-04T00:00:00+00:00 ##submission.copyrightStatement##