ASPG Menu
search

American Scientific Publishing Group

Research Feed

Found 3831 matches for "All Articles"

A New Score Function of Pentagonal Neutrosophic Number and its Application in Networking Problem

Pentagonal neutrosophic number is an extended version of a single typed neutrosophic number. Real-humankind problems have different sorts of ambiguity in nature and among them; one of the important problems is solving the networking problem. In this contribution, the conception of pentagonal neutrosophic number has been focused on a distinct framework of reference. Here, we develop a new score function and its estimation has been formulated from different perspectives. Further, a time computing-based networking problem is considered herein the pentagonal neutrosophic arena and solved it using an influx of dissimilar logical & innovative thinking. Lastly, the computation of the total completion time of the problem reflects the impotency of this noble work.

groups
Avishek Chakraborty mail
link https://doi.org/10.54216/IJNS.010102

Volume & Issue

Vol. Volume 1 / Iss. Issue 1

Details open_in_new

MBJ-neutrosophic T-ideal on B-algebra

   In this paper we define and study the MBJ-neutrosophic T-ideal through diferent concept like union, intersection. further we use the important properties to investigate the MBJ-neutrosophic T-ideal under cartesian product and homomorphic results.

groups
Mohsin Khalid mail -
Neha Andaleeb Khalid mail -
Rakib Iqbal mail
link https://doi.org/10.54216/IJNS.010103

Volume & Issue

Vol. Volume 1 / Iss. Issue 1

Details open_in_new

A Direct Model for Triangular Neutrosophic Linear Programming

This paper aims to propose a new direct algorithm to solve the neutrosophic linear programming where the variables and right-hand side represented with triangular neutrosophic numbers. The effectiveness of the proposed procedure is illustrated through numerical experiments. The extracted results show that the new algorithm is straightforward and could be useful to guide the modeling and design of a wide range of neutrosophic optimization.

groups
S. A. Edalatpanah mail
link https://doi.org/10.54216/IJNS.010104

Volume & Issue

Vol. Volume 1 / Iss. Issue 1

Details open_in_new

A Single Valued Neutrosophic Inventory Model with Neutrosophic Random Variable

This paper presents the problematic period of neutrosophic inventory in an inaccurate and unsafe mixed environment. The purpose of this paper is to present demand as a neutrosophic random variable.  For this model, a new method is developed for determining the optimal sequence size in the presence of neutrosophic random variables.  Where to get optimality by gradually expressing the average value of integration. The newsvendor problem is used to describe the proposed model.

groups
M. Mullai*, K. Sangeetha, R. Surya, G. Madhan kumar, R. Jeyabalan mail -
S. Broumi mail
link https://doi.org/10.54216/IJNS.010201

Volume & Issue

Vol. Volume 1 / Iss. Issue 2

Details open_in_new

The Relationship between Artificial Intelligence and Internet of Things: A quick review

Internet Of Things (IOT) is a network of various devices that are connected over the internet, and they can collect and exchange data with each other. These IOT devices generate a lot of data that needs to be collected and mined for actionable results through use artificial intelligence (AI) to manage huge data flows and storage in the IOT network. In this paper we briefly discussed about what IOT is, what AI is, Algorithm of AI, Challenge AI with IOT, application of artificial intelligence system in the IOT. The self-optimizing network and software defined network are parts of the important parameters in the Artificial Intelligence IoT System. This paper provides a general discussion about importance of the IoT in different applications. The paper covers different applications of IoT and shows the relationship between AI and IoT. The role of the AI in IoT applications is extensively discussed. In the future work, we are planning to work on improving the performance of IoT applications using advanced AI methods and algorithms such as Machine Learning and Deep Learning.

groups
Esraa Mohamed mail
link https://doi.org/10.54216/JCIM.010101

Volume & Issue

Vol. Volume 1 / Iss. Issue 1

Details open_in_new

Authenticating IoT Devices issues based on Blockchain

The Internet of Things (IoT) is increasingly an authenticity today. Nevertheless, some key challenges still need to be given care so that IoT solutions further support the rising demand for connected devices and the facilities offered. Outstanding to the possible significance and sensitivity of facilities, IoT solutions should address the security and privacy worries nearby these devices and the data they assemble, generate, and process. Recently, Blockchain technology has increased much attention in IoT solutions. Its principal usage conditions are in the financial domain, where Blockchain creates a capable application world and can be leveraged to explain security and privacy issues. However, this developing technology has a great possibility in the most various technological areas and can significantly help achieve the Internet of Things view in different features, increasing the measurements of decentralization, facilitating communications, allowing new transaction models, and allowing independent coordination of the devices. The paper's goal is to provide the ideas about the structure and operation of Blockchain and, typically, analyze how the use of this technology can be used to deliver security and privacy in IoT.

groups
Hosny. H. Abo Emira mail
link https://doi.org/10.54216/JCIM.010202

Volume & Issue

Vol. Volume 1 / Iss. Issue 2

Details open_in_new

Multiplicative Interpretation of Neutrosophic Cubic Set on B-Algebra

The purpose of this paper is to interpret the multiplication of neutrosophic cubic set. Here we define the notation of ɤ-multiplication of neutrosophic cubic set and study it with the help of neutrosophic cubic M-subalgebra, neutrosophic cubic normal ideal and neutrosophic cubic closed normal ideal. We also study ɤ-multiplication under homomorphism and cartesian product through significant characteristics.

groups
Mohsin Khalid mail -
Neha Andaleeb Khalid mail -
Hasan Khalid mail -
Said Broumi mail
link https://doi.org/10.54216/IJNS.010202

Volume & Issue

Vol. Volume 1 / Iss. Issue 2

Details open_in_new

A Novel Fuzzy Bat Based Ambulance Detection and Traffic Counting Approach

In the recent years the importance of automatic traffic control has increased due to the traffic jams problem especially in big cities for signal control and efficient traffic management. The input video is processed and analyzed to detect an ambulance vehicle. This article introduces a robust approach for ambulance detection and traffic counting approach using novel fuzzy Bat swarm optimization and different image processing techniques. The fuzzy Bat based optimization algorithm is used to generate a template of ambulance from the abstracted frames obtained from predefined ambulance samples. This is done by using a collection of Gabor filters that have been particularly customized for the ambulance detection problem in which filter selection is achieved to group filters that have similar characteristics. The fitness criterion based on Support Vector Machine (SVM) is used to evaluate the output filters. The proposed approach is composed of the following five fundamental building phases: Fuzzy Bat based optimization, image acquisition, object detection, counting the connected objects, and finally ambulance detection.  One of the main advantages of the proposed approach is that key Gabor filters is obtained from the selected features (filters with highest membership values) which have a vital role in the ambulance detection phase. Experimental results show that the overall accuracy confirms that the performance of the proposed approach is high.  

groups
Hossam M. Moftah mail -
Taha M. Mohamed mail
link https://doi.org/10.54216/JCIM.010203

Volume & Issue

Vol. Volume 1 / Iss. Issue 2

Details open_in_new

Neutrosophy for physiological data compression: in particular by neural nets using deep learning

We would like to show the small distance in neutropsophy applications in sciences and humanities, has both finally consider as a terminal user a human. The pace of data production continues to grow, leading to increased needs for efficient storage and transmission. Indeed, the consumption of this information is preferably made on mobile terminals using connections invoiced to the user and having only reduced storage capacities. Deep learning neural networks have recently exceeded the compression rates of algorithmic techniques for text. We believe that they can also significantly challenge classical methods for both audio and visual data (images and videos). To obtain the best physiological compression, i.e. the highest compression ratio because it comes closest to the specificity of human perception, we propose using a neutrosophical representation of the information for the entire compression-decompression cycle. Such a representation consists for each elementary information to add to it a simple neutrosophical number which informs the neural network about its characteristics relative to compression during this treatment. Such a neutrosophical number is in fact a triplet (t,i,f) representing here the belonging of the element to the three constituent components of information in compression; 1° t = the true significant part to be preserved, 2° i = the inderterminated redundant part or noise to be eliminated in compression and 3° f = the false artifacts being produced in the compression process (to be compensated). The complexity of human perception and the subtle niches of its defects that one seeks to exploit requires a detailed and complex mapping that a neural network can produce better than any other algorithmic solution, and networks with deep learning have proven their ability to produce a detailed boundary surface in classifiers.  

groups
Philippe Schweizer mail
link https://doi.org/10.54216/IJNS.010203

Volume & Issue

Vol. Volume 1 / Iss. Issue 2

Details open_in_new

Implicit Authentication Approach by Generating Strong Password through Visual Key Cryptography

In this era of digitization where literally everything is available at the tip of the finger. Huge amount of data used to flow day in day out, where users used to work with various applications like internet websites, cloud applications, various data servers, web servers, etc. This paper provide idea about access control or authentication used to be acting as first line of defense for preserving data secrecy and its integrity, so far it is learned that the usual login password based methods are easy to implement and to use as well but it is also observed that they are more subjected to be get attacked therefore to preserve authentication on the basis of simple alphanumeric passwords is a challenging task now a days. Hence new methods which bring more strength for authentication and access control are so very expected and desirable.

groups
Dr. Ajay B. Gadicha mail -
Dr. Vijay B. Gadicha mail
link https://doi.org/10.54216/JCIM.010102

Volume & Issue

Vol. Volume 1 / Iss. Issue 1

Details open_in_new