Mathematics and Computer Science

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This second volume in a new multi-volume set builds on the basic concepts and fundamentals laid out in the previous volume, presenting the reader with more advanced and cutting-edge topics being developed in this exciting field. This second volume in a new series from Wiley-Scrivener is the first of its kind to present scientific and technological innovations by leading academicians, eminent researchers, and experts around the world in the areas of mathematical sciences and computing. Building on what was presented in volume one, the chapters focus on more advanced topics in computer science, mathematics, and where the two intersect to create value for end users through practical applications. The chapters herein cover scientific advancements across a diversified spectrum that includes differential as well as integral equations with applications, computational fluid dynamics, nanofluids, network theory and optimization, control theory, machine learning and artificial intelligence, Big Sata analytics, Internet of Things, cryptography, fuzzy automata, statistics, and many more. Readers of this book will get access to diverse ideas and innovations in the field of computing together with its growing interactions in various fields of mathematics. Whether for the engineer, scientist, student, academic, or other industry professional, this is a must-have for any library.

Author(s): Sharmistha Ghosh, M. Niranjanamurthy, Krishanu Deyasi
Publisher: Wiley-Scrivener
Year: 2023

Language: English
Pages: 431

Cover
Title Page
Copyright Page
Contents
Preface
Chapter 1 A Comprehensive Review on Text Classification and Text Mining Techniques Using Spam Dataset Detection
1.1 Introduction
1.2 Text Mining Techniques
1.2.1 Data Mining
1.2.2 Information Retrieval
1.2.3 Natural Language Processing (NLP)
1.2.4 Information Extraction
1.2.5 Text Summarization
1.2.6 Text Categorization
1.2.7 Clustering
1.2.8 Information Visualization
1.2.9 Question Answer
1.3 Dataset and Preprocessing Steps
1.3.1 Text Preprocess
1.4 Feature Extraction
1.4.1 Term Frequency – Inverse Document Frequency
1.4.2 Bag of Words (BoW)
1.5 Supervised Machine Learning Classification
1.6 Evaluation
1.7 Experimentation and Discussion Results for Spam Detection Data
1.8 Text Mining Applications
1.9 Text Classification Support
1.9.1 Health
1.9.2 Business and Marketing
1.9.3 Law
1.10 Conclusions
References
Chapter 2 Study of Lidar Signals of the Atmospheric Boundary Layer Using Statistical Technique
2.1 Introduction
2.2 Methodology
2.2.1 A Statistical Approach to Determine the CBLH
2.2.2 A Statistical Approach to Determine the Best Fit Distribution to the Backscatter Signals of the Lidar Dataset
2.3 Mathematical Background of Method
2.4 Example and Result
2.5 Conclusion and Future Scope
Acknowledgement
References
Annexure
Chapter 3 Optimal Personalized Therapies in Colon Cancer Induced Immune Response using a Fokker-Planck Framework
3.1 Introduction
3.2 The Control Framework Based on Fokker-Planck Equations
3.3 Theoretical Results
3.4 Numerical Schemes
3.5 Results
3.6 Conclusion
Acknowledgments
References
Chapter 4 Detection and Classification of Leaf Blast Disease using Decision Tree Algorithm in Rice Crop
4.1 Introduction
4.2 Proposed Methodology
4.3 Result Analysis
4.4 Conclusion
4.5 Future Work
References
Chapter 5 Novel Hybrid Optimal Deep Network and Optimization Approach for Human Face Emotion Recognition
5.1 Introduction
5.2 Related Work
5.3 System Model and Problem Statement
5.4 Proposed Model
5.4.1 Preprocessing Stage
5.4.2 Knowledge Based Face Detection
5.4.3 Image Resizing
5.4.4 Feature Extraction
5.5 Proposed HDC-GEN Classification
5.6 Result and Discussion
5.6.1 Performance Metrics Evaluation
5.6.2 Comparative Analysis
5.7 Conclusion
References
Chapter 6 An Application of Information Technology in Adaptive Leadership of Ministry of Ayush During Pandemic of Covid 19: A Case Study
6.1 Introduction
6.2 Ministry of AYUSH
6.3 Leadership Principles and Practices by Ministry of AYUSH During Covid-19
6.4 Effective Communication
6.5 Sharing of Resources
6.6 Shared Decision Making
6.7 Training of Manpower
6.8 Use of IT Platform
6.9 Finding Opportunities for R&D During the Crisis
6.10 Collaborating with Stakeholders for International Day of Yoga (IDY)
6.11 Providing Hope When Nothing Seemed to be Working
6.12 Leveraging Old Knowledge
6.13 Conclusion
References
Chapter 7 Encoder-Decoder Models for Protein Secondary Structure Prediction
7.1 Introduction
7.2 Literature Review
7.3 Experimental Work
7.3.1 Data Set
7.3.2 Proposed Methodology
7.3.3 Data Preprocessing
7.3.4 Long Short Term Memory
7.4 Results and Discussion
7.5 Conclusion
References
Chapter 8 Hesitancy, Awareness, and Vaccination: A Computational Analysis on Complex Networks
8.1 Introduction
8.2 Model Formulation
8.3 Model Analysis on Complex Network
8.3.1 Effect of Vaccination Rate
8.3.2 Effect of Negative Rumors
8.3.3 Effect of Positive Peer Influence
8.4 Conclusions and Perspectives
References
Chapter 9 Propagation of Seismic Waves in Porous Thermoelastic Semi-Infinite Space with Impedance Boundary Conditions
9.1 Introduction
9.2 Basic Equations
9.3 Problem Formulation
9.4 Reflection at the Free Surface
9.4.1 Boundary Conditions
9.4.2 Energy Ratios
9.5 Numerical Results and Discussion
9.6 Conclusion
References
Chapter 10 IoT Based Ensemble Predictive Techniques to Determine the Student Observing Analysis through E-Learning
10.1 Introduction
10.2 Review of Literature
10.2.1 Objectives of the Study
10.3 Methodology
10.4 Analysis and Interpretation
10.5 Findings and Conclusion
References
Chapter 11 Modelling and Analysis of a Congestion Dependent Queue with Bernoulli Scheduled Vacation Interruption and Client Impatience
11.1 Introduction
11.2 Model Overview
11.3 Model Analysis
11.3.1 Pre-Arrival Epoch Probabilities
11.3.2 Arbitrary Epoch Probabilities
11.4 Special Cases
11.5 Performance Metrics
11.6 Numerical Outcomes
11.7 Conclusion
References
Chapter 12 Resource Allocation Determines Alternate Cell Fate in Bistable Genetic Switch
12.1 Introduction
12.2 Model Formulation
12.3 Result Section
12.3.1 Pitchfork Bifurcation in Genetic Toggle
12.3.1.1 Resource Affinity Regulates the Symmetry of Pitchfork Bifurcation
12.3.1.2 Availability of Total mRNA Pool Regulates the Symmetry of Pitchfork Bifurcation
12.3.1.3 Total Resource Availability Regulates the Point of Bifurcation in the System
12.3.2 Saddle Node Bifurcation in Genetic Toggle
12.3.2.1 Resource Distribution Regulates the Point of Bifurcation in Toggle Switch
12.3.2.2 Region of Interest in Toggle Switch is Significantly Regulated by Resource Allocation
12.3.2.3 Total Resource Availability T Regulates Saddle Node Bifurcation Curve
12.4 Conclusion
Acknowledgement
References
Chapter 13 A Hybrid Approach to Ontology Evaluation
13.1 Introduction
13.2 Background
13.3 The Developed OntoEva Method
13.4 Ontology Selection for Epilepsy Disorder
13.4.1 Accuracy
13.4.2 Adaptability
13.4.3 Clarity
13.4.4 Completeness
13.4.5 Conciseness
13.4.6 Consistency
13.4.7 Organizational Fitness
13.5 Results
13.6 Comparison of Ontologies
13.7 Conclusion
References
Chapter 14 Smart Health Care Waste Segregation and Safe Disposal
14.1 Introduction
14.2 Related Works
14.3 System Architecture
14.3.1 Wrapping
14.3.2 Incinerator
14.3.3 Conveyor Cleaning System
14.3.4 Circuit Diagram
14.3.5 Optimal Path Planning Algorithm for Waste Collection
14.4 Methodology
14.5 Mobile App
14.6 Conclusions and Future Works
Declarations
Availability of Data and Materials
Competing Interests
Author’s Contribution
References
Chapter 15 Investigation of Viscoelastic Magnetohydrodynamics (MHD) Flow Over an Expanded Lamina Surrounded in a Permeable Media
15.1 Introduction
15.1.1 Literature Review
15.1.2 Nomenclature
15.2 Formulation of the Problem
15.2.1 Analytical Solution
15.2.2 Numerical Methods (Spectral Quasi-Linearization Methods)
15.3 Result and Argument
15.4 Conclusion
References
Chapter 16 Quickest Multi-Commodity Contraflow with Non-Symmetric Traversal Times
16.1 Introduction
16.2 Preliminaries with Flow Models
16.2.1 Mathematical Model with Contraflow
16.3 QMCCF with Non-Symmetric Transit Times
16.3.1 Approximation Approach for the QMCCF
16.4 Conclusions
Acknowledgments
References
Chapter 17 A Mathematical Representation for Deteriorating Goods with a Trapezoidal-Type Demand, Shortages and Time Dependent Holding Cost
17.1 Introduction
17.2 Assumptions and Notations
17.2.1 Assumptions
17.2.2 Notation
17.2.3 Decision Variables
17.3 Formulation and Solution
17.3.1 Case 1 i) 0 < í < t1 < t2 < t3 < T
17.3.2 Case 2 ii) 0 < ta < í < tb < tc < T
17.3.3 Case 3 iii) 0 < ta < tb < í < tc < T
17.4 Numerical Example
17.5 Discussion
17.6 Inference
References
Chapter 18 An Amended Moth Flame Optimization Algorithm Based on Fibonacci Search Approach for Solving Engineering Design Problems
18.1 Introduction
18.2 Classical MFO Algorithm
18.3 Proposed Method
18.4 Results and Discussions on IEEE CEC 2019 Benchmark Problems
18.5 Real-Life Applications
18.5.1 Optimal Gas Production Capacity Problem
18.5.2 Three-Bar Truss Design (TSD) Problem
18.6 Conclusion with Future Studies
References
Chapter 19 Image Segmentation of Neuronal Cell with Ensemble Unet Architecture
19.1 Introduction
19.2 Methods
19.3 Dataset
19.4 Implementation Details
19.5 Evaluation Metrics
19.6 Result
19.7 Conclusion
References
Chapter 20 Automorphisms of Some Non-Abelian p-Groups of Order p4
20.1 Introduction
20.2 Categorization of p-Groups with Order p4
20.3 Number of Automorphisms of Some Non-Abelian Groups of Order p4
20.3.1 Computation of Automorphisms of Group G9
20.3.2 Computation of Automorphisms of Group G10
20.3.3 Computation of Automorphisms of G11
References
Chapter 21 Viscoelastic Equation of p-Laplacian Hyperbolic Type with Logarithmic Source Term
21.1 Introduction
21.2 Preliminaries
21.3 Global Existence Result
21.4 Blow Up Results of the Solution for Equation (21.1)
References
Chapter 22 Flow Dynamics in Continuous-Time with Average Arc Capacities
22.1 Introduction
22.2 Literature Review
22.3 Failure in Extension of AP to AAP
22.4 Formulation
22.5 Conclusion
Acknowledgment
References
Chapter 23 Analysis of a Multiserver System of Queue-Dependent Channel Using Genetic Algorithm
23.1 Introduction
23.2 Description of the Model
23.3 Notations
23.4 Steady State Equations
23.4.1 Performance Characteristics of the System
23.4.2 Queue Length Evaluations at Different Epochs
23.4.3 Leisure Period and Working Period Length
23.4.4 Cost of the System
23.5 Conclusions
References
Chapter 24 An Approach to Ranking of Single Valued Neutrosophic Fuzzy Numbers Based on (α, β, γ)) Cut Sets
24.1 Introduction
24.2 Definition and Representations
24.3 Proposed Method
24.4 Theorems
24.5 Numerical Examples
24.6 Conclusion
References
Chapter 25 Performance Analysis of Database Models Based on Fuzzy and Vague Sets for Uncertain Query Processing
25.1 Introduction
25.2 Basic Definitions
25.2.1 Fuzzy Set
25.2.2 Vague Set
25.2.3 Similarity Measure
25.3 Algorithm to Generate Membership Values
25.4 Real Life Applications
25.5 Conclusion
References
Chapter 26 Estimating Error of Signals by Product Means (N, pn ,qn) (C, 2) of the Fourier Series in a W(Lr, ξ (t))(r ≥ 1) Class
26.1 Introduction
26.1.1 Definition 1
26.1.2 Definition 2
26.1.3 Definition 3
26.1.4 Definition 4
26.1.5 Remark 1
26.2 Known Result
26.2.1 Theorem 1
26.3 Main Theorem
26.3.1 Theorem 2
26.4 Some Auxiliary Results
26.4.1 Lemma-1
26.4.2 Lemma-2
26.5 Theorem’s Proof
26.6 Applications
26.6.1 Cor. 1
26.6.2 Cor. 2
26.7 Conclusion
Acknowledgement
References
About the Editors
Index
EULA