In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
Some Soliton Solutions of Non Linear Partial Differential Equations by Tan-Co...IOSR Journals
Tan-cot method is applied to get exact soliton solutions of non-linear partial differential equations notably generalized Benjamin-Bona-Mahony, Zakharov-Kuznetsov Benjamin-Bona-Mahony, Kadomtsov-Petviashvilli Benjamin-Bona-Mahony and Korteweg-de Vries equations, which are important evolution equations with wide variety of physical applications. Elastic behavior and soliton fusion/fission is shown graphically and discussed physically as far as possible
Compensating Joint Configuration through Null Space Control in Composite Weig...Waqas Tariq
We have presented a methodology for compensating joint configuration by composite weighting in different sub spaces. It augments the weighted least norm solution by weighted residual of the current joint rate and preferred pose rate in null space, so that we can arrive at a solution which is able to handle both joint limits and preferred joint configuration simultaneously satisfying the primary task. The null space controller is formulated in conjunction with the work space controller to achieve the objective. The contribution of null space has been discussed in the formulation in two different situations including joint limits, workspace and near configuration singularities.
Direct split-radix algorithm for fast computation of type-II discrete Hartley...TELKOMNIKA JOURNAL
In this paper, a novel split-radix algorithm for fast calculation the discrete Hartley transform of type-II (DHT-II) is intoduced. The algorithm is established through the decimation in time (DIT) approach, and implementedby splitting a length N of DHT-II into one DHT-II of length N/2 for even-indexed samples and two DHTs-II of length N/4 for odd-indexed samples. The proposed algorithm possesses the desired properties such as regularity, inplace calculation and it is represented by simple closed form decomposition sleading to considerable reductions in the arithmetic complexity compared to the existing DHT-II algorithms. Additionally, the validity of the proposed algorithm has been confirmed through analysing the arithmetic complexityby calculating the number of real additions and multiplications and associating it with the existing DHT-II algorithms.
Local Model Checking Algorithm Based on Mu-calculus with Partial OrdersTELKOMNIKA JOURNAL
The propositionalμ-calculus can be divided into two categories, global model checking algorithm
and local model checking algorithm. Both of them aim at reducing time complexity and space complexity
effectively. This paper analyzes the computing process of alternating fixpoint nested in detail and designs
an efficient local model checking algorithm based on the propositional μ-calculus by a group of partial
ordered relation, and its time complexity is O(d2(dn)d/2+2) (d is the depth of fixpoint nesting, n is the
maximum of number of nodes), space complexity is O(d(dn)d/2). As far as we know, up till now, the best
local model checking algorithm whose index of time complexity is d. In this paper, the index for time
complexity of this algorithm is reduced from d to d/2. It is more efficient than algorithms of previous
research.
Some Soliton Solutions of Non Linear Partial Differential Equations by Tan-Co...IOSR Journals
Tan-cot method is applied to get exact soliton solutions of non-linear partial differential equations notably generalized Benjamin-Bona-Mahony, Zakharov-Kuznetsov Benjamin-Bona-Mahony, Kadomtsov-Petviashvilli Benjamin-Bona-Mahony and Korteweg-de Vries equations, which are important evolution equations with wide variety of physical applications. Elastic behavior and soliton fusion/fission is shown graphically and discussed physically as far as possible
Compensating Joint Configuration through Null Space Control in Composite Weig...Waqas Tariq
We have presented a methodology for compensating joint configuration by composite weighting in different sub spaces. It augments the weighted least norm solution by weighted residual of the current joint rate and preferred pose rate in null space, so that we can arrive at a solution which is able to handle both joint limits and preferred joint configuration simultaneously satisfying the primary task. The null space controller is formulated in conjunction with the work space controller to achieve the objective. The contribution of null space has been discussed in the formulation in two different situations including joint limits, workspace and near configuration singularities.
Direct split-radix algorithm for fast computation of type-II discrete Hartley...TELKOMNIKA JOURNAL
In this paper, a novel split-radix algorithm for fast calculation the discrete Hartley transform of type-II (DHT-II) is intoduced. The algorithm is established through the decimation in time (DIT) approach, and implementedby splitting a length N of DHT-II into one DHT-II of length N/2 for even-indexed samples and two DHTs-II of length N/4 for odd-indexed samples. The proposed algorithm possesses the desired properties such as regularity, inplace calculation and it is represented by simple closed form decomposition sleading to considerable reductions in the arithmetic complexity compared to the existing DHT-II algorithms. Additionally, the validity of the proposed algorithm has been confirmed through analysing the arithmetic complexityby calculating the number of real additions and multiplications and associating it with the existing DHT-II algorithms.
Local Model Checking Algorithm Based on Mu-calculus with Partial OrdersTELKOMNIKA JOURNAL
The propositionalμ-calculus can be divided into two categories, global model checking algorithm
and local model checking algorithm. Both of them aim at reducing time complexity and space complexity
effectively. This paper analyzes the computing process of alternating fixpoint nested in detail and designs
an efficient local model checking algorithm based on the propositional μ-calculus by a group of partial
ordered relation, and its time complexity is O(d2(dn)d/2+2) (d is the depth of fixpoint nesting, n is the
maximum of number of nodes), space complexity is O(d(dn)d/2). As far as we know, up till now, the best
local model checking algorithm whose index of time complexity is d. In this paper, the index for time
complexity of this algorithm is reduced from d to d/2. It is more efficient than algorithms of previous
research.
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...IJCNC
In this article, we employ two distinct methods to derive simple closed-form approximations for the
statistical expectations of the positive integer powers of Gaussian probability integral Eg [Qp ( bWg )]
with
respect to its fading signal-to-noise ratio (SNR) g random variable. In the first approach, we utilize the
shifting property of Dirac delta function on three tight bounds/approximations for Q(.) to circumvent the
need for integration.
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETIJCSEIT Journal
The innovative concept of Complex Fuzzy Set is introduced. The objective of the this paper to investigate
the concept of Complex Fuzzy set in constraint to a traditional Fuzzy set , where the membership function
ranges from [0, 1], but in the Complex fuzzy set extended to a unit circle in a complex plane, where the
member ship function in the form of complex number. The Compressive study of mathematical operation of
Complex Fuzzy set is presented. The basic operation like addition, subtraction, multiplication and division
are described here. The Novel idea of this paper to measure the similarity between two fuzzy relations by
evaluating δ -equality. Here also we introduce the probabilistic interpretation of the complex fuzzy set
where we attempted to clarify the distinction between Fuzzy logic and probability.
A numerical solution for Sine-Gordon type system was done by the use of two finite difference schemes, the first is the explicit scheme and the second is the Crank-Nicholson scheme. A comparison between the two schemes showed that the explicit scheme is easier and has faster convergence than the Crank-Nicholson scheme which is more accurate. The MATLAB environment was used for the numerical computations.
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...ijfls
Fuzzy logic is an alternate approach for quantifying uncertainty relating to activity duration. The fuzzy
version of the backward recursion has been shown to produce results that incorrectly amplify the level of
uncertainty. However, the fuzzy version of the forward recursion has been widely proposed as an
approach for determining the fuzzy set of critical path lengths. In this paper, the direct application of the
extension principle leads to a proposition that must be satisfied in fuzzy critical path analysis. Using a
counterexample it is demonstrated that the fuzzy forward recursion when discrete fuzzy sets are used to
represent activity durations produces results that are not consistent with the theory presented. The
problem is shown to be the application of the fuzzy maximum. Several methods presented in the literature
are described and shown to provide results that are consistent with the extension principle.
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULFransiskeran
The ladder graph plays an important role in many applications as Electronics, Electrical and Wireless
communication areas. The aim of this work is to present a new class of odd graceful labeling for the ladder
graph. In particular, we show that the ladder graph Ln with m-pendant Ln mk1 is odd graceful. We also
show that the subdivision of ladder graph Ln with m-pendant S(Ln) mk1 is odd graceful. Finally, we
prove that all the subdivision of triangular snakes ( k snake ) with pendant edges
1
( ) k S snake mk are odd graceful.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
FITTED OPERATOR FINITE DIFFERENCE METHOD FOR SINGULARLY PERTURBED PARABOLIC C...ieijjournal
In this paper, we study the numerical solution of singularly perturbed parabolic convection-diffusion type
with boundary layers at the right side. To solve this problem, the backward-Euler with Richardson
extrapolation method is applied on the time direction and the fitted operator finite difference method on the
spatial direction is used, on the uniform grids. The stability and consistency of the method were established
very well to guarantee the convergence of the method. Numerical experimentation is carried out on model
examples, and the results are presented both in tables and graphs. Further, the present method gives a more
accurate solution than some existing methods reported in the literature.
The idea of metric dimension in graph theory was introduced by P J Slater in [2]. It has been found
applications in optimization, navigation, network theory, image processing, pattern recognition etc.
Several other authors have studied metric dimension of various standard graphs. In this paper we
introduce a real valued function called generalized metric G X × X × X ® R+ d : where X = r(v /W) =
{(d(v,v1),d(v,v2 ),...,d(v,v ) / v V (G))} k Î , denoted d G and is used to study metric dimension of graphs. It
has been proved that metric dimension of any connected finite simple graph remains constant if d G
numbers of pendant edges are added to the non-basis vertices.
vFORTRAN is used as a numerical and scientific computing language. The main objective of the lab work is to understand FORTRAN language using which we solve simple numerical problems and compare different methodologies. Through this project we make use of various functions of FORTRAN and solve a simple projectile problem and also LAPACK library to solve a tridiagonal matrix problem. We use DGESV and DGTSV functions to make it possible. The given problems are built and compiled using a free integrated development environment called CODE::BLOCKS [1] which is an open source platform for FORTRAN and C.
https://arxiv.org/abs/2011.04370
A concept of quantum computing is proposed which naturally incorporates an additional kind of uncertainty, i.e. vagueness (fuzziness), by introducing obscure qudits (qubits), which are simultaneously characterized by a quantum probability and a membership function. Along with the quantum amplitude, a membership amplitude for states is introduced. The Born rule is used for the quantum probability only, while the membership function can be computed through the membership amplitudes according to a chosen model. Two different versions are given here: the "product" obscure qubit in which the resulting amplitude is a product of the quantum amplitude and the membership amplitude, and the "Kronecker" obscure qubit, where quantum and vagueness computations can be performed independently (i.e. quantum computation alongside truth). The measurement and entanglement of obscure qubits are briefly described.
A landing gear assembly consists of various components viz. Lower side stay, Upperside stay, Locking actuators, Extension actuators, Tyres, and Locking pins to name a few. Each unit having a specific operation to deal with, in this project the main unit being studied is the lower brace. The primary objective is to analyse stresses in the element of the lower brace unit using strength of materials or RDM method and Finite Element Method (FEM) and compare both. Using the obtained data a suitable material is proposed for the component. The approach used here is to study the overall behaviour of the element by taking up each aspect, finally summing up the total effect of all the aspects in the functioning of the element.
In an earlier paper in 2017, Rastogi and Bajpai[1] defined and studied a special vector field of the first kind in a Finsler space as follows:
Definition 1: A vector field Xi(x), in a Finsler space, is said to be a special vector field of the first kind, if (i) Xi/j = - δij and (ii) Xi hij = Ɵj, where Ɵj is a non-zero vector field in the given Finsler space.
In 2019, some more special vector fields in a Finsler space of two and three dimensions have been defined and studied by the authors Dwivedi et al.[2] and Dwivedi et al.[3] In Dwivedi et al.[3], the authors defined and studied six kinds of special vector fields in a Finsler space of three dimensions and, respectively, called them special vector fields of the second, third, fourth, fifth, sixth, and seventh kind. In the present paper, we shall study some curvature properties of special vector fields of the first and seventh kind in a Finsler space of three dimensions.
An Approach to Analyze Non-linear Dynamics of Mass Transport during Manufactu...BRNSS Publication Hub
In this paper, we introduce an approach to increase integration rate of elements of a hybrid comparator with the first dynamic amplifying stage and the second quasi-dynamic latching stage. Framework the approach, we consider a heterostructure with special configuration. Several specific areas of the heterostructure should be doped by diffusion or ion implantation. Annealing of dopant and/or radiation defects should be optimized
FITTED OPERATOR FINITE DIFFERENCE METHOD FOR SINGULARLY PERTURBED PARABOLIC C...ieijjournal
In this paper, we study the numerical solution of singularly perturbed parabolic convection-diffusion type
with boundary layers at the right side. To solve this problem, the backward-Euler with Richardson
extrapolation method is applied on the time direction and the fitted operator finite difference method on the
spatial direction is used, on the uniform grids. The stability and consistency of the method were established
very well to guarantee the convergence of the method. Numerical experimentation is carried out on model
examples, and the results are presented both in tables and graphs. Further, the present method gives a more
accurate solution than some existing methods reported in the literature.
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...IJCNC
In this article, we employ two distinct methods to derive simple closed-form approximations for the
statistical expectations of the positive integer powers of Gaussian probability integral Eg [Qp ( bWg )]
with
respect to its fading signal-to-noise ratio (SNR) g random variable. In the first approach, we utilize the
shifting property of Dirac delta function on three tight bounds/approximations for Q(.) to circumvent the
need for integration.
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETIJCSEIT Journal
The innovative concept of Complex Fuzzy Set is introduced. The objective of the this paper to investigate
the concept of Complex Fuzzy set in constraint to a traditional Fuzzy set , where the membership function
ranges from [0, 1], but in the Complex fuzzy set extended to a unit circle in a complex plane, where the
member ship function in the form of complex number. The Compressive study of mathematical operation of
Complex Fuzzy set is presented. The basic operation like addition, subtraction, multiplication and division
are described here. The Novel idea of this paper to measure the similarity between two fuzzy relations by
evaluating δ -equality. Here also we introduce the probabilistic interpretation of the complex fuzzy set
where we attempted to clarify the distinction between Fuzzy logic and probability.
A numerical solution for Sine-Gordon type system was done by the use of two finite difference schemes, the first is the explicit scheme and the second is the Crank-Nicholson scheme. A comparison between the two schemes showed that the explicit scheme is easier and has faster convergence than the Crank-Nicholson scheme which is more accurate. The MATLAB environment was used for the numerical computations.
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...ijfls
Fuzzy logic is an alternate approach for quantifying uncertainty relating to activity duration. The fuzzy
version of the backward recursion has been shown to produce results that incorrectly amplify the level of
uncertainty. However, the fuzzy version of the forward recursion has been widely proposed as an
approach for determining the fuzzy set of critical path lengths. In this paper, the direct application of the
extension principle leads to a proposition that must be satisfied in fuzzy critical path analysis. Using a
counterexample it is demonstrated that the fuzzy forward recursion when discrete fuzzy sets are used to
represent activity durations produces results that are not consistent with the theory presented. The
problem is shown to be the application of the fuzzy maximum. Several methods presented in the literature
are described and shown to provide results that are consistent with the extension principle.
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULFransiskeran
The ladder graph plays an important role in many applications as Electronics, Electrical and Wireless
communication areas. The aim of this work is to present a new class of odd graceful labeling for the ladder
graph. In particular, we show that the ladder graph Ln with m-pendant Ln mk1 is odd graceful. We also
show that the subdivision of ladder graph Ln with m-pendant S(Ln) mk1 is odd graceful. Finally, we
prove that all the subdivision of triangular snakes ( k snake ) with pendant edges
1
( ) k S snake mk are odd graceful.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
FITTED OPERATOR FINITE DIFFERENCE METHOD FOR SINGULARLY PERTURBED PARABOLIC C...ieijjournal
In this paper, we study the numerical solution of singularly perturbed parabolic convection-diffusion type
with boundary layers at the right side. To solve this problem, the backward-Euler with Richardson
extrapolation method is applied on the time direction and the fitted operator finite difference method on the
spatial direction is used, on the uniform grids. The stability and consistency of the method were established
very well to guarantee the convergence of the method. Numerical experimentation is carried out on model
examples, and the results are presented both in tables and graphs. Further, the present method gives a more
accurate solution than some existing methods reported in the literature.
The idea of metric dimension in graph theory was introduced by P J Slater in [2]. It has been found
applications in optimization, navigation, network theory, image processing, pattern recognition etc.
Several other authors have studied metric dimension of various standard graphs. In this paper we
introduce a real valued function called generalized metric G X × X × X ® R+ d : where X = r(v /W) =
{(d(v,v1),d(v,v2 ),...,d(v,v ) / v V (G))} k Î , denoted d G and is used to study metric dimension of graphs. It
has been proved that metric dimension of any connected finite simple graph remains constant if d G
numbers of pendant edges are added to the non-basis vertices.
vFORTRAN is used as a numerical and scientific computing language. The main objective of the lab work is to understand FORTRAN language using which we solve simple numerical problems and compare different methodologies. Through this project we make use of various functions of FORTRAN and solve a simple projectile problem and also LAPACK library to solve a tridiagonal matrix problem. We use DGESV and DGTSV functions to make it possible. The given problems are built and compiled using a free integrated development environment called CODE::BLOCKS [1] which is an open source platform for FORTRAN and C.
https://arxiv.org/abs/2011.04370
A concept of quantum computing is proposed which naturally incorporates an additional kind of uncertainty, i.e. vagueness (fuzziness), by introducing obscure qudits (qubits), which are simultaneously characterized by a quantum probability and a membership function. Along with the quantum amplitude, a membership amplitude for states is introduced. The Born rule is used for the quantum probability only, while the membership function can be computed through the membership amplitudes according to a chosen model. Two different versions are given here: the "product" obscure qubit in which the resulting amplitude is a product of the quantum amplitude and the membership amplitude, and the "Kronecker" obscure qubit, where quantum and vagueness computations can be performed independently (i.e. quantum computation alongside truth). The measurement and entanglement of obscure qubits are briefly described.
A landing gear assembly consists of various components viz. Lower side stay, Upperside stay, Locking actuators, Extension actuators, Tyres, and Locking pins to name a few. Each unit having a specific operation to deal with, in this project the main unit being studied is the lower brace. The primary objective is to analyse stresses in the element of the lower brace unit using strength of materials or RDM method and Finite Element Method (FEM) and compare both. Using the obtained data a suitable material is proposed for the component. The approach used here is to study the overall behaviour of the element by taking up each aspect, finally summing up the total effect of all the aspects in the functioning of the element.
In an earlier paper in 2017, Rastogi and Bajpai[1] defined and studied a special vector field of the first kind in a Finsler space as follows:
Definition 1: A vector field Xi(x), in a Finsler space, is said to be a special vector field of the first kind, if (i) Xi/j = - δij and (ii) Xi hij = Ɵj, where Ɵj is a non-zero vector field in the given Finsler space.
In 2019, some more special vector fields in a Finsler space of two and three dimensions have been defined and studied by the authors Dwivedi et al.[2] and Dwivedi et al.[3] In Dwivedi et al.[3], the authors defined and studied six kinds of special vector fields in a Finsler space of three dimensions and, respectively, called them special vector fields of the second, third, fourth, fifth, sixth, and seventh kind. In the present paper, we shall study some curvature properties of special vector fields of the first and seventh kind in a Finsler space of three dimensions.
An Approach to Analyze Non-linear Dynamics of Mass Transport during Manufactu...BRNSS Publication Hub
In this paper, we introduce an approach to increase integration rate of elements of a hybrid comparator with the first dynamic amplifying stage and the second quasi-dynamic latching stage. Framework the approach, we consider a heterostructure with special configuration. Several specific areas of the heterostructure should be doped by diffusion or ion implantation. Annealing of dopant and/or radiation defects should be optimized
FITTED OPERATOR FINITE DIFFERENCE METHOD FOR SINGULARLY PERTURBED PARABOLIC C...ieijjournal
In this paper, we study the numerical solution of singularly perturbed parabolic convection-diffusion type
with boundary layers at the right side. To solve this problem, the backward-Euler with Richardson
extrapolation method is applied on the time direction and the fitted operator finite difference method on the
spatial direction is used, on the uniform grids. The stability and consistency of the method were established
very well to guarantee the convergence of the method. Numerical experimentation is carried out on model
examples, and the results are presented both in tables and graphs. Further, the present method gives a more
accurate solution than some existing methods reported in the literature.
SUCCESSIVE LINEARIZATION SOLUTION OF A BOUNDARY LAYER CONVECTIVE HEAT TRANSFE...ijcsa
The purpose of this paper is to discuss the flow of forced convection over a flat plate. The governing partial
differential equations are transformed into ordinary differential equations using suitable transformations.
The resulting equations were solved using a recent semi-numerical scheme known as the successive
linearization method (SLM). A comparison between the obtained results with homotopy perturbation method and numerical method (NM) has been included to test the accuracy and convergence of the method.
Fuzzy transform for high-resolution satellite images compressionTELKOMNIKA JOURNAL
Many compression methods have been developed until now, especially for very high-resolution satellites images, which, due to the massive information contained in them, need compression for a more efficient storage and transmission. This paper modifies Perfilieva's Fuzzy transform using pseudo-exponential function to compress very high-resolution satellite images. We found that very high-resolution satellite images can be compressed by F-transform with pseudo-exponential function as the membership function. The compressed images have good quality as shown by the PSNR values ranging around 59-66 dB. However, the process is quite time-consuming with average 187.1954 seconds needed to compress one image. These compressed images qualities are better than the standard compression methods such as CCSDS and Wavelet method, but still inferior regarding time consumption.
Some new exact Solutions for the nonlinear schrödinger equationinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Numerical Solution Of Delay Differential Equations Using The Adomian Decompos...theijes
Adomian Decomposition Method has been applied to obtain approximate solution to a wide class of ordinary and partial differential equation problems arising from Physics, Chemistry, Biology and Engineering. In this paper, a numerical solution of delay differential Equations (DDE) based on the Adomian Decomposition Method (ADM) is presented. The solutions obtained were without discretization nor linearization. Example problems were solved for demonstration. Keywords: Adomian Decomposition, Delay Differential Equations (DDE), Functional Equations , Method of Characteristic.
Computer Science
Active and Programmable Networks
Active safety systems
Ad Hoc & Sensor Network
Ad hoc networks for pervasive communications
Adaptive, autonomic and context-aware computing
Advance Computing technology and their application
Advanced Computing Architectures and New Programming Models
Advanced control and measurement
Aeronautical Engineering,
Agent-based middleware
Alert applications
Automotive, marine and aero-space control and all other control applications
Autonomic and self-managing middleware
Autonomous vehicle
Biochemistry
Bioinformatics
BioTechnology(Chemistry, Mathematics, Statistics, Geology)
Broadband and intelligent networks
Broadband wireless technologies
CAD/CAM/CAT/CIM
Call admission and flow/congestion control
Capacity planning and dimensioning
Changing Access to Patient Information
Channel capacity modelling and analysis
Civil Engineering,
Cloud Computing and Applications
Collaborative applications
Communication application
Communication architectures for pervasive computing
Communication systems
Computational intelligence
Computer and microprocessor-based control
Computer Architecture and Embedded Systems
Computer Business
Computer Sciences and Applications
Computer Vision
Computer-based information systems in health care
Computing Ethics
Computing Practices & Applications
Congestion and/or Flow Control
Content Distribution
Context-awareness and middleware
Creativity in Internet management and retailing
Cross-layer design and Physical layer based issue
Cryptography
Data Base Management
Data fusion
Data Mining
Data retrieval
Data Storage Management
Decision analysis methods
Decision making
Digital Economy and Digital Divide
Digital signal processing theory
Distributed Sensor Networks
Drives automation
Drug Design,
Drug Development
DSP implementation
E-Business
E-Commerce
E-Government
Electronic transceiver device for Retail Marketing Industries
Electronics Engineering,
Embeded Computer System
Emerging advances in business and its applications
Emerging signal processing areas
Enabling technologies for pervasive systems
Energy-efficient and green pervasive computing
Environmental Engineering,
Estimation and identification techniques
Evaluation techniques for middleware solutions
Event-based, publish/subscribe, and message-oriented middleware
Evolutionary computing and intelligent systems
Expert approaches
Facilities planning and management
Flexible manufacturing systems
Formal methods and tools for designing
Fuzzy algorithms
Fuzzy logics
GPS and location-based app
Solitons Solutions to Some Evolution Equations by ExtendedTan-Cot Methodijceronline
The proposed extended Tan-Cot method is applied to obtain new exact travelling wave solutions to evolution equation. The method is applicable to a large variety of nonlinear partial differential equations, the Fifth-order nonlinear integrable equation, the symmetric regularized long wave equation, the higher-order wave equation of Kdv type, and Benney-Luke equation. The Extended Tan-Cot method seems to be powerful tool in dealing with nonlinear physical models
Fast Algorithm for Computing the Discrete Hartley Transform of Type-IIijeei-iaes
The generalized discrete Hartley transforms (GDHTs) have proved to be an efficient alternative to the generalized discrete Fourier transforms (GDFTs) for real-valued data applications. In this paper, the development of direct computation of radix-2 decimation-in-time (DIT) algorithm for the fast calculation of the GDHT of type-II (DHT-II) is presented. The mathematical analysis and the implementation of the developed algorithm are derived, showing that this algorithm possesses a regular structure and can be implemented in-place for efficient memory utilization.The performance of the proposed algorithm is analyzed and the computational complexity is calculated for different transform lengths. A comparison between this algorithm and existing DHT-II algorithms shows that it can be considered as a good compromise between the structural and computational complexities.
Numerical Solution of Diffusion Equation by Finite Difference Methodiosrjce
IOSR Journal of Mathematics(IOSR-JM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of mathemetics and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mathematics. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Similar to EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-TYPE EQUATIONS (20)
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
Using social media in education provides learners with an informal way for communication. Informal communication tends to remove barriers and hence promotes student engagement. This paper presents our experience in using three different social media technologies in teaching software project management course. We conducted different surveys at the end of every semester to evaluate students’ satisfaction and engagement. Results show that using social media enhances students’ engagement and satisfaction. However, familiarity with the tool is an important factor for student satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This paper discusses the importance of verb suffix mapping in Discourse translation system. In
discourse translation, the crucial step is Anaphora resolution and generation. In Anaphora
resolution, cohesion links like pronouns are identified between portions of text. These binders
make the text cohesive by referring to nouns appearing in the previous sentences or nouns
appearing in sentences after them. In Machine Translation systems, to convert the source
language sentences into meaningful target language sentences the verb suffixes should be
changed as per the cohesion links identified. This step of translation process is emphasized in
the present paper. Specifically, the discussion is on how the verbs change according to the
subjects and anaphors. To explain the concept, English is used as the source language (SL) and
an Indian language Telugu is used as Target language (TL)
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The using of information technology resources is rapidly increasing in organizations,
businesses, and even governments, that led to arise various attacks, and vulnerabilities in the
field. All resources make it a must to do frequently a penetration test (PT) for the environment
and see what can the attacker gain and what is the current environment's vulnerabilities. This
paper reviews some of the automated penetration testing techniques and presents its
enhancement over the traditional manual approaches. To the best of our knowledge, it is the
first research that takes into consideration the concept of penetration testing and the standards
in the area.This research tackles the comparison between the manual and automated
penetration testing, the main tools used in penetration testing. Additionally, compares between
some methodologies used to build an automated penetration testing platform.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several
algorithms have been introduced to extract these rules. However, these algorithms suffer from
the problems of utility, redundancy and large number of extracted fuzzy association rules. The
expert will then be confronted with this huge amount of fuzzy association rules. The task of
validation becomes fastidious. In order to solve these problems, we propose a new validation
method. Our method is based on three steps. (i) We extract a generic base of non redundant
fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis.
(ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules
using structural equation model.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
APPLYING DISTRIBUTIONAL SEMANTICS TO ENHANCE CLASSIFYING EMOTIONS IN ARABIC T...cscpconf
Most of the recent researches have been carried out to analyse sentiment and emotions found in
English texts, where few studies have been conducted on Arabic contents, which have been
focused on analysing the sentiment as positive and negative, instead of the different emotions’
classes. Therefore this paper has focused on analysing different six emotions’ classes in Arabic
contents, especially Arabic tweets which have unstructured nature that make it challenging task
compared to the formal structured contents found in Arabic journals and books. On the other
hand, the recent developments in the distributional sematic models, have encouraged testing the
effect of the distributional measures on the classification process, which was not investigated by
any other classification-related studies for analysing Arabic texts. As a result, the model has
successfully improved the average accuracy to more than 86% using Support Vector Machine
(SVM) compared to the different sentiments and emotions studies for classifying Arabic texts
through the developed semi-supervised approach which has employed the contextual and the
co-occurrence information from a large amount of unlabelled dataset. In addition to the
different remarkable achieved results, the model has recorded a high average accuracy,
85.30%, after removing the labels from the unlabelled contextual information which was used in
the labelled dataset during the classification process. Moreover, due to the unstructured nature
of Twitter contents, a general set of pre-processing techniques for Arabic texts was found which
has resulted in increasing the accuracy of the six emotions’ classes to 85.95% while employing
the contextual information from the unlabelled dataset.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
2. 132 Computer Science & Information Technology (CS & IT)
to reduce the size of computations during the solution procedure. Therefore, it can be applied
without using any symbolic computation software.
As one of the most well-known nonlinear dispersive equations, the Korteweg-de Vries (KdV)
equation has attracted much attention by many researchers in the scientific community duo to its
significant role in various scientific disciplines. It describes a variety of important nonlinear
phenomena, including finite amplitude dispersive wave phenomena, acoustic waves in a
harmonic crystal and ion-acoustic waves in plasmas [23]. Several variations of this equation have
been introduced in the literature. The (3+1)-dimensional Zakharov-Kuznetsov (ZK) equation was
derived as a three-dimensional generalization of the KdV equation, which arises as a model for
the propagation of nonlinear plasma-acoustic waves in the isothermal multi-component
magnetized plasma [24,25]. If the nonlinear dispersion in KdV equation is incorporated, the
Benjamin-Bona-Mahony (BBM) equation arises to describe a propagation of long waves. The
(2+1)-dimensional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony (GZK-BBM)
equation was developed by Wazwaz [26] as a combination of the well-known Benjamin-Bona-
Mahony (BBM) equation with the ZK equation. It arises as a description of gravity water waves
in the long-wave regime. Therefore, it is very interesting to examine the traveling wave solutions
of KdV-type equations. It is worthwhile to mention that the (3+1)-dimensional space–time
fractional ZK equation and the (2+1)-dimensional space–time fractional GZK-BBM equation
have not been solved yet by using any existing analytical method.
There are many different definitions for fractional differential equations in fractional calculus;
among these definitions are Riemann–Liouville, Grünwald–Letnikov, Caputo, Weyl, Marchaud,
Hadamard, Canavati, Davidson-Essex, Riesz–Fischer, Jumarie fractional derivatives and so on
[2,27]. However, these definitions have some shortcomings. For instance, they do not satisfy the
product rule, the quotient rule and the chain rule for derivative operations. To overcome these
drawbacks, Khalil et al. [28] introduced a completely new definition of the fractional derivative,
which is more natural and fruitful than previous ones, called conformable fractional derivative.
The present paper is devoted to suggest the functional variable method for constructing new exact
solutions of two higher-dimensional space-time fractional KdV-related equations, namely the
(3+1)-dimensional space–time fractional ZK equation and the (2+1)-dimensional space–time
fractional GZK-BBM equation. The fractional derivatives are presented in terms of the
conformable sense. To the best of our knowledge, these equations have not been investigated
previously by using the functional variable method in the sense of conformable derivative.
The rest of the paper is organized as follows: In Section 2, we describe some relevant materials
and methods. In Section 3, the proposed approach is applied to establish the exact solutions of the
underlying equations. The graphical representations of the obtained solutions are provided in
Section 4, Results and discussion are presented in Section 5. Finally, conclusions are given in
Section 6.
2. MATERIALS AND METHODS
2.1. Conformable fractional derivative and its properties
In this subsection, we present some basic definitions and properties of the conformable fractional
calculus. Suppose a function :[0, )f ∞ → , then, the conformable fractional derivative of order
α is defined as follows [28,29]:
3. Computer Science & Information Technology (CS & IT) 133
( )1
0
( )
( )( ) lim ,
f t t f t
T f t
α
α
ε
ε
ε
−
→
+ −
= (1)
in which 0t > and 0 1α< ≤ . If f is α −differentiable in some (0, )a , 0a > , and ( )
0
lim ( )
t
f tα
+
→
exists, then ( ) ( )
0
(0) lim ( )
t
f f tα α
+
→
= .
Now, we summarize some useful properties of the conformable derivative as follows [28-30]:
(i) ( ) ( ) ( ),T af bg aT f bT gα α α+ = + for all ,a b ∈ .
(ii) ( ) ,p p
T t pt α
α
−
= for all p ∈ .
(iii) ( ) ( ) ( )T fg fT g gT fα α α= + .
(iv) 2
( ) ( )gT f fT gf
T
g g
α α
α
−
=
.
(v) ( ) 0,Tα λ = where λ is a constant.
(vi) If f is differentiable, then 1
( )( )
df
T f t t
dt
α
α
−
= .
(vii) If ,f g are differential functions, then ( )1
( )( ) ( ) ( )T f g t t g t f g tα
α
−
′ ′=o .
Moreover, some conformable fractional derivatives of certain functions can be found in [28]. The
abovementioned properties will be utilized further in the forthcoming sections.
2.2. Description of the functional variable method
Consider the following general FPDE with four independent variables:
2 2
2 2
( , , , , , , , ) 0, 0
u u u u u u
P u
t x y z t x
α α α α α α
α α α α α α
α
∂ ∂ ∂ ∂ ∂ ∂
… = < ≤1
∂ ∂ ∂ ∂ ∂ ∂
(2)
where P is a polynomial of ( , , , )u x y z t and its fractional partial derivatives, in which the
highest order derivatives and the nonlinear terms are involved.
The foremost steps of the FVM can be outlined as follows [18,19]:
Step 1: To find the exact solution of Eq. (2), we use the fractional complex transformation
( , , , ) ( ),u x y z t u ξ= 31 2
,
k zk x k y ctαα α α
ξ
α α α α
= + + + (3)
where 1 2 3, ,k k k and c are nonzero arbitrary constants, to convert Eq. (2) into the following
ordinary differential equation (ODE) of integer order:
2 2
1 2 3 1( , , , , , , , ) 0,P u cu k u k u k u c u k u′ ′ ′ ′ ′′ ′′ … =% (4)
4. 134 Computer Science & Information Technology (CS & IT)
where P% is a polynomial in ( )u ξ and its total derivatives with respect to ξ .
Step 2: Let us make a transformation in which the unknown function ( )u ξ is considered as a
functional variable in the form
( ),u F uξ = (5)
It is easy to find some higher order derivatives of ( )u ξ as follows:
( )
( ) ( )
( ) ( ) ( )
2
2 2 2
2 2 2 2
1
,
2
1 1
,
2 2
1 1
,
2 2
u FF F
u F F F F
u F F F F
ξξ
ξξξ
ξξξξ
′′= =
′′ ′′= =
′′′ ′′ ′= +
(6)
and so on, where the prime denotes the derivative with respect to u .
Step 3: We substitute Eqs. (5) and (6) into Eq. (4) to reduce it to the following ODE:
( , , , , ) 0.R u F F F′ ′′ =K (7)
Step 4: After integration, Eq. (7) provides the expression of F , and this in turn together with Eq.
(5) gives the appropriate solutions to the original equation.
3. APPLICATIONS
In this section, we apply the functional variable method, which described in the previous section,
to look for the exact solutions of two higher-dimensional space-time fractional equations of KdV-
type.
3.1 The (3+1)-dimensional space–time fractional ZK equation
Consider the (3+1)-dimensional space–time fractional ZK equation [24,25]
2 2 2
0,t x x y zD u auD u D u D u D uα α α α α
+ + + + = (8)
where 0 1α< ≤ and a is a nonzero constant.
To investigate Eq. (8) using the FVM, we use the fractional complex transformation given by Eq.
(3) to reduce Eq. (8) into the following ODE:
( )2 2 2
1 1 2 3 0,cu ak uu k k k uξ ξ ξξ+ + + + = (9)
Integrating once w.r.t. ξ and setting the constant of integration to zero, yields
( )2 2 2 21
1 2 3 0,
2
ak
cu u k k k uξ+ + + + = (10)
5. Computer Science & Information Technology (CS & IT) 135
Substituting Eq. (5) into Eq. (10), the function ( )F u reads
1
2 2 2
1 2 3
( ) 1 ,
2
akc
F u u u
k k k c
= − +
+ +
(11)
Separating the variables in Eq. (11) and then integrating, we obtain
( )02 2 2
1 1 2 3
,
1
2
du c
ak k k k
u u
c
ξ ξ
−
= +
+ +
+
∫ (12)
where 0ξ is a constant of integration. After completing the integration of Eq. (12), we get the
following exact solutions:
( )1 02 2 2
1 1 2 3
( ) 1 tanh ( ) ,
2
c c
u
ak k k k
ξ ξ ξ
= − − +
+ +
(13)
( )2 02 2 2
1 1 2 3
( ) 1 coth ( ) .
2
c c
u
ak k k k
ξ ξ ξ
= − − +
+ +
(14)
where 31 2 k zk x k y ctαα α α
ξ
α α α α
= + + + .
3.2 The (2+1)-dimensional space–time fractional GZK–BBM equation
Consider the (2+1)-dimensional space–time fractional GZK-BBM equation in the form [26]
( )2
0, 1n
t x x x x t yD u D u aD u bD D D u D u nα α α α α α α
+ + + + = > (15)
where 0 1α< ≤ and ,a b are nonzero constants.
To apply the FVM for Eq. (15). We exploit the fractional complex transformation
( , , ) ( ),u x y t u ξ= 1 2
,
k x k y ctα α α
ξ
α α α
= + + (16)
to convert Eq. (15) into the following ODE:
( ) ( ) ( )2
1 1 1 1 2 0,n
c k u ak u bk k cu k uξ ξξ ξξξ ξ
+ + + + = (17)
Integrating once w.r.t. ξ with zero constant of integration, we obtain
( ) ( )2
1 1 1 1 2 0,n
c k u ak u bk k c k uξξ+ + + + = (18)
Substituting Eqs. (6) into Eq. (18), yields
6. 136 Computer Science & Information Technology (CS & IT)
( )
( )
( )2
1 12
1 1 2
2
,n
F c k u ak u
bk k c k
′ = − + + +
(19)
Integrating Eq. (19) w.r.t. u , we deduce the expression of the function ( )F u as follows
( )
( ) ( )( )
1 11
2
11 1 2
2
( ) 1 ,
1
nc k ak
F u u u
c k nbk k c k
−− +
= +
+ ++
(20)
Separating the variables in Eq. (20) and then integrating, we obtain
( )( )
( )
( )
( )1
02
1 1 1 21
1
,
2
1
1
n
c kdu
bk k c kak
u u
c k n
ξ ξ
−
− +
= +
+
+
+ +
∫ (21)
where 0ξ is a constant of integration. After completing the integration of Eq. (21), we can simply
attain the following exact solutions:
(i) If
( )
1
2
1 1 2
0
c k
bk k c k
+
<
+
, we have the following hyperbolic solutions:
( )( ) ( )
( )
( )
1
1
1 12
1 02
1 1 1 2
1 1
( ) sech ,
2 2
n
c k n c kn
u
ak bk k c k
ξ ξ ξ
− + + − +− = − +
+
(22)
( )( ) ( )
( )
( )
1
1
1 12
2 02
1 1 1 2
1 1
( ) csch ,
2 2
n
c k n c kn
u
ak bk k c k
ξ ξ ξ
− + + − +− = +
+
(23)
where 1 2k x k y ctα α α
ξ
α α α
= + + .
(ii) If
( )
1
2
1 1 2
0
c k
bk k c k
+
>
+
, we have the following trigonometric solutions:
( )( ) ( )
( )
( )
1
1
1 12
3 02
1 1 1 2
1 1
( ) sec ,
2 2
n
c k n c kn
u
ak bk k c k
ξ ξ ξ
− + + +− = − +
+
(24)
( )( ) ( )
( )
( )
1
1
1 12
4 02
1 1 1 2
1 1
( ) csc .
2 2
n
c k n c kn
u
ak bk k c k
ξ ξ ξ
− + + +− = − +
+
(25)
7. Computer Science & Information Technology (CS & IT) 137
where 1 2k x k y ctα α α
ξ
α α α
= + + .
4. GRAPHICAL ILLUSTRATIONS
In this section, with the aid of Maple software, we show the graphical representation of some
results in Figs. 1-3 by assigning appropriate values to the unknown parameters in order to
visualize the mechanism of Eqs. (8) and (15). Some physical interpretations are also presented.
4.1 The (3+1)-dimensional space–time fractional ZK equation
The profiles of the kink-shaped solution 1( )u ξ given by Eq. (13) is shown in Fig. 1 when
0, 1, 1,y z a= = = 1 21.5, 0.25,k k= = 3 01, 2, 0k c ξ= = − = for various values of α . We can
observe that when the fractional derivative order α increased, the shape is closer to the known
kink wave as the velocity of the propagation wave decreases. The kink wave keeps its height for
various values of α . It should also be pointed out that the solution 2 ( )u ξ given by Eq. (14) is a
singular kink solution.
(a) 0.25α = (b) 0.5α = (c) 1α =
Figure 1. The kink solution corresponding to Eq. (13) for various values of α
4.2 The (2+1)-dimensional space–time fractional GZK-BBM equation
The dynamics of the singular soliton solution 2 ( )u ξ given by Eq. (23) is shown in Fig. 2 when
1,y = 1,a = 1 22, 1.25, 4,b k k= − = = − 02, 4, 0c n ξ= = = for various values of α . When α
increased, the height of the wave changes as the velocity of the wave propagation decreases. Fig.
3 shows the motions of the periodic wave solution 3 ( )u ξ given by Eq. (24) when 0, 1,y a= =
0.5,b = 1 0.5,k = 2 0.25,k = 2, 4,c n= − = 0 0.ξ = for various values of α . When α increased,
the height of the wave becomes lower as the velocity of the wave propagation decreases. It should
also be mentioned that the solution 1( )u ξ given by Eq. (22) is a bell-shaped soliton solution.
8. 138 Computer Science & Information Technology (CS & IT)
(a) 0.25α = (b) 0.5α = (c) 1α =
Figure 2. The singular soliton solution corresponding to Eq. (23) for various values of α
(a) 0.25α = (b) 0.5α = (c) 1α =
Figure 3. The periodic solution corresponding to Eq. (24) for various values of α
5. RESULTS AND DISCUSSION
For the first time, the analytical solutions of the (3+1)-dimensional space–time fractional ZK
equation and the (2+1)-dimensional space–time fractional GZK-BBM equation have been
attained via the functional variable method, the fractional derivative has been described in the
conformable sense. Consequently, we deduce that our solutions (13), (14), (22)-(25) are new and
not discussed heretofore. It is remarkable that the obtained solutions in this article have potential
physical meaning for the underlying equations. In addition to the physical meaning, these
solutions can be used to measure the accuracy of numerical results and to help in the study of
stability analysis.
6. CONCLUSIONS
In this paper, we have successfully executed the functional variable method to attain new exact
traveling wave solutions of a family of higher-dimensional space-time fractional KdV-type
9. Computer Science & Information Technology (CS & IT) 139
equations arising in mathematical physics, namely the (3+1)-dimensional space–time fractional
ZK equation and the (2+1)-dimensional space–time fractional GZK-BBM equation. Two types of
solutions including hyperbolic function solutions and trigonometric function solutions are
obtained and numerically simulated in Figs. 1-3. The obtained solutions are significant to reveal
the inner mechanism of the nonlinear physical phenomena that described by the aforementioned
equations. It is shown that the FVM is straightforward, powerful and can be extended to handle
many other higher-dimensional fractional partial differential equations as it maintains the reduced
volume of computational work. With the aid of the Maple, we have verified our results.
REFERENCES
[1] Samko, S.G., Kilbas, A.A., Marichev, O.I., (1993) Fractional Integrals and Derivatives Theory and
Applications. Gordonand Breach, New York.
[2] Podlubny, I., (1999) Fractional Differential Equations. Academic Press, San Diego.
[3] Zhang, S., Zong, Q.A., Liu, D., Gao, Q., (2010) A generalized exp-function method for fractional
Riccati differential equations. Commun. Fract. Calc. 1, 48-51.
[4] Bekir, A., Guner, O., Cevikel, A.C., (2013) Fractional complex transform and exp-function methods
for fractional differential equations. Abstr. Appl. Anal. 2013, 426462.
[5] El-Sayed, A.M.A., Rida, S.Z., Arafa, A.A.M., (2009) Exact solutions of fractional-order biological
population model. Commun. Theor. Phys. 52, 992 -996.
[6] Shang, N., Zheng, B., (2013) Exact solutions for three fractional partial differential equations by the
method. Int. J. Appl. Math. 43 (3), 114-119.
[7] Ekici, M., Mirzazadeh, M., Eslami, M., Zhou, Q., Moshokoa, S.P., Biswas, A., Belic, M., (2016)
Optical soliton perturbation with fractional-temporal evolution by first integral method with
conformable fractional derivatives. Optik 127, 10659–10669.
[8] Eslami, M., Rezazadeh, H., (2016) The first integral method for Wu–Zhang system with conformable
time-fractional derivative. Calcolo 53, 475–485.
[9] Inc, M., (2008) The approximate and exact solutions of the space- and time-fractional Burgers
equations with initial conditions by variational iteration method. J. Math. Anal. Appl. 345, 476-484.
[10] Aminikhah, H., Sheikhani, A.H.R., Rezazadeh, H., (2016) Sub-equation method for the fractional
regularized long-wave equations with conformable fractional derivatives. Scientia Iranica B 23 (3),
1048-1054.
[11] Zheng, B., Wen, C., (2013) Exact solutions for fractional partial differential equations by a new
fractional sub-equation method. Adv. Difference Equ. 2013, 199.
[12] Kaplan, M., Bekir, A., Akbulut, A., Aksoy, E., (2015) The modified simple equation method for
nonlinear fractional differential equations. Rom. Jour. Phys. 60, 1374-1383.
[13] Tasbozan, O., Çenesiz, Y., Kurt, A., (2016) New solutions for conformable fractional Boussinesq and
combined KdV-mKdV equations using Jacobi elliptic function expansion method. Eur. Phys. J. Plus
131, 244.
10. 140 Computer Science & Information Technology (CS & IT)
[14] Demiray, S.T., Pandir, Y., Bulut, H., (2014) The investigation of exact solutions of nonlinear time-
fractional Klein-Gordon equation by using generalized Kudryashov method. AIP Conf. Proc. 1637,
283 -289.
[15] Demiray, S.T., Pandir, Y., Bulut, H., (2014) Generalized Kudryashov method for time-fractional
differential equations. Abstr. Appl. Anal. 2014, 901540.
[16] Zerarka, A., Ouamane, S., Attaf, A., (2010) On the functional variable method for finding exact
solutions to a class of wave equations. App. Math. and Com. 217, 2897–2904.
[17] Zerarka, A., Ouamane, S., (2010) Application of the functional variable method to a class of
nonlinear wave equations. World J. Model. Simul. 6 (2), 150-160.
[18] Liu, W., Chen, K., (2013) The functional variable method for finding exact solutions of some
nonlinear time-fractional differential equations. Pramana J. Phys., 81 (3), 377–384.
[19] Bekir, A., Güner, Ö., Aksoy, E., Pandir, Y., (2015) Functional variable method for the nonlinear
fractional differential equations. AIP Conf. Proc. 1648, 730001.
[20] Khan, K., Akbar, M.A., (2015) Study of functional variable method for finding exact solutions of
nonlinear evolution equations. Walailak J. Sci & Tech. 12 (11), 1031-1042.
[21] Mirzazadeh, M., Eslami, M., (2013) Exact solutions for nonlinear variants of Kadomtsev-Petviashvili
(n,n) equation using functional variable method. Pramana J. Phys. 81, 911-24.
[22] Bekir, A., San, S., (2013) Periodic, hyperbolic and rational function solutions of nonlinear wave
equations. Appl. Math. Inf. Sci. Lett. 1 (3), 97-101.
[23] Wazwaz, A.M., (2009) Partial Differential Equations and Solitary Waves Theory (Higher Education
Press, Beijing) P. 503.
[24] Zakharov, V.E., Kuznetsov, E.A., (1974) Three-dimensional solitons. Sov. Phys. 39, 285-286.
[25] Das, G.C., Sarma, J., Gao, Y.T., Uberoi, C., (2000) Dynamical behavior of the soliton formation and
propagation in magnetized plasma. Phys. Plasmas 7, 2374- 2380.
[26] Wazwaz, A.M., (2005) Compact and noncompact physical structures for the ZK–BBM equation.
App. Math. Comput. 169, 713–725.
[27] Oliveira, E.C. & Machado, J.A.T., (2014) A review of definitions of fractional derivatives and
Integral, Math. Probl. Eng. 2014 238459.
[28] Khalil, R., Horani, AL.M., Yousef, A., Sababheh, M., (2014) A new definition of fractional
derivative. J. Comput. Appl. Math. 264, 65-70.
[29] Abu Hammad, M., Khalil, R., (2014) Conformable fractional heat differential equation. Int. J. Pure
Appl. Math. 94 (2), 215-221.
[30] Abdeljawad, T., (2015) On conformable fractional calculus. J. Comput. Appl. Math. 279 (1), 57-66.
11. Computer Science & Information Technology (CS & IT) 141
AUTHOR
Mohammed O. Al-Amr was born on January 29th, 1986 in Mosul, Iraq. He
received his B.Sc. in Mathematics from University of Mosul in 2007. He received his
M.Sc. in Mathematics from University of Mosul in 2013 and studied in the field of
‘‘Numerical Analysis’’. Since 2013, he has been an assistant lecturer at University of
Mosul. He published many papers in reputable scientific journals. He serves as a
reviewer and editorial member of many scientific journals. He is a member of many
international scientific associations. His main research interests are numerical
analysis, partial differential equations, semi-analytical methods, stability analysis,
traveling wave analysis, theory of solitons.