Communications in Mathematics and Applications
http://www.rgnpublications.com/journals/index.php/cma
<p><span>The journal “<strong>Communications in Mathematics and Applications”</strong></span><span> (CMA) is being regularly published since 2010. </span><span>The “</span><strong>Communications in Mathematics and Applications</strong><span>” is an international journal devoted to the publication of original and high-quality research of pure mathematics.</span></p><p><strong>Subjects covered by <strong>Communications in Mathematics and Applications</strong>: </strong></p><ul><li><strong>Algebra <br /></strong></li><li><strong>Algebraic Geometry <br /></strong></li><li><strong>Analysis <br /></strong></li><li><strong>Category Theory <br /></strong></li><li><strong>Graph Theory <br /></strong></li><li><strong>Mathematical Logic & Foundations <br /></strong></li><li><strong>Number Theory <br /></strong></li><li><strong>Philosophy of Mathematics <br /></strong></li><li><strong>Topology</strong></li></ul><p>To ensure speedy publication, only articles which are sufficiently well presented, containing significant results and not required major revisions will be considered. The papers are accepted only after peer review.</p><p>Editorial decisions on acceptance or otherwise are taken within 4 to 8 weeks (two months) of receipt of the paper.</p><p>The journal will also publish survey articles giving details of research progress made during the last three decades in a particular area.</p><p><img src="/journals/icons/cma/icore.jpg" alt="" /></p>RGN Publicationsen-USCommunications in Mathematics and Applications0976-5905Authors who publish with this journal agree to the following terms:<br /><ul><li>Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a CCAL that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</li><li>Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</li><li>Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.</li></ul>Regularity of Linear Hypersubstitutions for Algebraic Systems of Type \(((n),(m))\)
http://www.rgnpublications.com/journals/index.php/cma/article/view/1098
An algebraic system consisting a nonempty set together with a sequence of operations and a sequence of relations on this set. The properties of this structure are expressed by terms and formulas. In this paper we study on linear terms of type \((n)\) for a natural number $n\geq1$ and linear formulas of type \(((n),(m))\) for natural numbers \(n,m\geq 1\). Using the partial clone of linear terms and the partial clone of linear formulas, we define the new concept of linear hypersubstitutions for algebraic systems of type \(((n),(m))\) and proved that the set of all linear hypersubstitutions for algebraic systems of type \(((n),(m))\) with a binary operation on this set and the identity element forms a monoid. Finally, we also interest in studying the semigroup or monoid properties of its. In particular, we investigate the idempotency and regularity of linear hypersubstitutions for algebraic systems of this monoid.Thodsaporn KumduangSorasak Leeratanavalee2019-03-312019-03-3110Numerical Solution of 2-point Boundary Value Problem by Subdivision Scheme
http://www.rgnpublications.com/journals/index.php/cma/article/view/980
A numerical approximating collocation algorithm is formulated that is based on binary 6-point approximating subdivision scheme to generate the curves. It is examined that the scheme is generating more smooth continuous solutions of the problems. Numerical example is given to illustrate the algorithm with its graphically representation.G. KanwalA. GhaffarM. M. HafeezullahS. A. MananM. RizwanG. Rahman2019-03-312019-03-3110Parameters of Quadratic Residue Digraphs over Certain Finite Fields
http://www.rgnpublications.com/journals/index.php/cma/article/view/1133
Linking graph theory and algebra has been a rich area of mathematical exploration for a long time. Cayley digraphs and Zero-Divisor graphs are two such examples. In this paper, we make another connection by constructing and studying digraphs whose vertices are the elements of the multiplicative group of the finite fields \(\mathbb{Z}_{p}\) for certain primes \(p\). In particular, we determine parameters, including the diameter of such digraphs and the eccentricity of certain vertices of these digraphs. We also find some results on the quadratic residues and nonresidues of \(\mathbb{Z}_{p}\).Louis Beaugris2019-03-312019-03-3110Distribution Solution of Some Nonlinear PDEs Related to the Elastic Bessel Klein-Gordon Wave Operator
http://www.rgnpublications.com/journals/index.php/cma/article/view/1123
This paper studies the existence and uniqueness of the solution to the boundary value problem for the nonlinear partial differential equation. We are particularly interested in the elastic Bessel-Helmholtz and elastic Bessel Klein-Gordon wave operators. To attain the results, the distribution theory (the generalized function theory), the iteration method and the classical Schauder estimates are applied. The solution is consequently in the form of tempered distribution (slow growth function).Chalermpon Bunpog2019-03-312019-03-3110Mixed Energy of a Mixed Hourglass Graph
http://www.rgnpublications.com/journals/index.php/cma/article/view/1143
In this paper we discuss a complete mixed graph called mixed hourglass graph. The direct representation of hourglass matrix in graph gives a weighted mixed hourglass graph. Then, we obtain a mixed hourglass graph from the weighted mixed hourglass graph by assigning its edge-labelled a numerical value of weight 1. Next, we derive the determinant, spectrum and mixed energy of the graph to conclude that the energy of a mixed hourglass graph coincides with twice the number of edges in the graph and the sum of the square of its eigenvalues.Olayiwola BabarinsaHailiza Kamarulhaili2019-03-312019-03-3110The Finite Family \(L\)-Lipschitzian Suzuki-Generalized Nonexpansive Mappings
http://www.rgnpublications.com/journals/index.php/cma/article/view/1146
In this paper, we propose and analyze a \(L\)-Lipschitzian Suzuki-generalized nonexpansive mapping on a nonempty subset of a hyperbolic space and prove \(\Delta\)-convergence theorems and convergence theorems for a \(L\)-Lipschitzian Suzuki-generalized nonexpansive mapping in a hyperbolic space.Cholatis SuanoomKittikorn SriwichaiChakkrid Klin-EamWongvisarut Khuangsatung2019-03-312019-03-3110Roughness Applied to Generalized \(\Gamma\)-ideals of Ordered LA \(\Gamma\)-Semigroups
http://www.rgnpublications.com/journals/index.php/cma/article/view/1148
<p>In this paper, we have applied rough set theory to generalized ordered \(\Gamma\)-ideals in ordered LA \(\Gamma\)-semigroups by using a new type of relations called pseudoorder of relations. Based on this relation we have studied properties of rough ideals, rough interior ideals, rough quasi-ideals, rough bi-ideals and rough prime ideals in ordered LA-\(\Gamma\)-semigroups and have shown that lower and upper approximations of an LA-\(\Gamma\)-subsemigroups (resp., left ideals, right ideals, interior ideals, two-sided ideals, quasi-ideals, bi-ideals and prime ideals) in an ordered LA-\(\Gamma\)-semigroup is an LA-\(\Gamma\) subsemigroups (resp., left ideals, right ideals, interior ideals, two-sided ideals, quasi-ideals, bi-ideals and prime ideals).</p>Moin Akhtar Ansari2019-03-312019-03-3110Hermite-Hadamard Type Inequalities via the Montgomery Identity
http://www.rgnpublications.com/journals/index.php/cma/article/view/1178
The main aim of this manuscript is to prove the result for Hermite-Hadamard types inequalities and to strengthen our results by giving applications for means. The proof of the result is based on the Montgomery identity. We use the Montgomery identity to establish a new identity regarding the Hermite-Hadamard inequality. Based on this identity with a class of convex and monotone functions and Jensen’s inequality, we obtain various results for the inequality. At the end, we also present applications for special bivariate means.Muhammad Adil KhanYousaf KhurshidYu-Ming Chu2019-03-312019-03-3110A Comment-Based Algorithm for Post-Ranking Rapprochement on Facebook
http://www.rgnpublications.com/journals/index.php/cma/article/view/1228
This work investigates the effects of a comment, in an individual post, voted by a reputed person. The proposed algorithm utilized 10 variables for ranking comment's owner represented by the value of \(\textit{Cor}\) variable. Then the model will analyze how such a vote will affect the rank of that post by increasing the upvotes or by increasing the downvotes. Eight variables are proposed to evaluate the rank of the post represented by the value of \(GW_p\) variable. At the end, the overall score of the post will be calculated represented by \(GS_p\) variable. Being simple and easy to implement, the proposed method is expected to measure the post-sensitive influence on participants on that given post. However, introducing user's weight (ranking) as a new parameter for the evaluation of post's weight, could highly correct the whole evaluation of post's ranking. As commenters vary in their weights (rankings), posts can be upvoted or downvoted because of commenter's opinion and thought on the given post. This work is novel and aimed at introduce a new method for post ranking that can be utilized for different purposes in different disciplinarians.Mahdi JemmaliYousef Qawqzeh2019-03-312019-03-3110Portfolio Optimization using the Optimized \(\alpha\) in Renyi Entropy
http://www.rgnpublications.com/journals/index.php/cma/article/view/899
In this paper, a new approach of portfolio optimization using Renyi entropy is presented. In the proposed method, we use Renyi Entropy as a measurement of risk by determining the minimum return. We also attempt to examine the relationship between Renyi Entropy's \(\alpha\)-level and risk. Then, a single-objective function with penalty function approach based on Renyi Entropy-mean-semi-variance models is developed. As a result, we find the optimized \(\alpha\) denoting the most appropriate portfolio related to the risk level denoted by the investor. Finally by providing an illustrative example, the validity of this method is checked and the conclusion is drawn.Alireza SajediGholamhossein Yari2019-03-312019-03-3110User Preferences With Urgent-Time Intervals in a Wireless-Network
http://www.rgnpublications.com/journals/index.php/cma/article/view/1229
This paper focuses on a scheduler component in a wireless network, with constraints based on user preferences. These constraints reflect the fact that users wish to privatize networks for fixed periods (intervals) in order to send urgent data. The user sets in advance certain data constraints and time periods. Each time period is presented as a frozen interval for the router and other users. Only the administrator can send data during these specifics periods and all others users will be frozen. During this interval, the intelligencer can send confidential and emergency data without any concurrency with other data through this interval, which is called an “emergency and secret interval”. Each time, a scheduling problem due to unavailable machines and jobs will be solved. This problem is NP-hard. In this research, we develop two algorithms for transmitting data from the sender to the receiver.Hani Alquhayz2019-03-312019-03-3110Application of the Intuitionistic Fuzzy Logic in Education
http://www.rgnpublications.com/journals/index.php/cma/article/view/964
In this paper, we have proposed an application of intuitionistic fuzzy set in high school determination using distance measures. The purpose of this paper is to interpret the relationship between students’ official test and the pilot test by means of distance measures in intuitionistic fuzzy sets. Distance measures have been compared and the most appropriate distance measure for this paper has been determined. This application of intuitionistic fuzzy set is very useful, because by calculating distance between each student and each school, the most proper school for each student has been determined. Available evaluation system could be renewed by using this application of intuitionistic fuzzy logic. Using this application in evaluation and determination system will have very beneficial results. The contribution of this new system are more stress-free, less anxious for testing, easier to implement, more economical and more advantageous in many ways. Thanks to this system, the enroll of students in high schools will not depend on a single test. Moreover, this is the first study to guide the students in the direction of students preferences in evaluation of success and this is the first one for evaluate with this application and offer recommendations in education.Mehmet Çitil2019-03-312019-03-3110A Comparison of Different Multi-Criteria Analyses for Electric Vehicle Charging Station Deployment
http://www.rgnpublications.com/journals/index.php/cma/article/view/1126
Scarcity in near future, and the price fluctuation of fossil fuels lead to many industries change their products that use these resources into more eco-friendly versions. One of the most recent and noticeable example of this situation is the automobile industry. As a result of this, electric vehicles have started to become more popular and their sales increase substantially. Since these electric vehicles have a limited range for transportation before they require charging, the number and the positions of charging units become very important. In this study, we consider a electric vehicle (EV) charging station (CS) placement problem which aims to maximize users’ utility. To deal with these problem, we survey to find the weights of criterion, which are selected as accessibility, traffic convenience and waiting time calculated by AHP method and VIKOR and TOPSIS methods are used to evaluate each alternative. As a main tool for charging station deployment, an integer programming model, which maximizes electric vehicle driver’s utility in term of evaluation results, is developed and the effects of different evaluation techniques on deployment procedure is shown and compared.Babak Daneshvar Rouyendegh (B. Erdebilli)Cem Isik DogruCanan Basak Aybirdi2019-03-312019-03-3110Relation-Theoretic Common Fixed Point Theorems for a Pair of Implicit Contractive Maps in Metric Spaces
http://www.rgnpublications.com/journals/index.php/cma/article/view/873
In this manuscript, we demonstrate some common fixed point theorems for a pair of weakly compatibleness of the operators under implicit contractive properties in metric spaces endowed with binary relation. An illustration is establish to emphaize the cogency of our results. The outcome of our proofs are unification of several relation theorems existing in the literature.Kanayo Stella EkeBijan DavvazJimevwo Godwin Oghonyon2019-03-312019-03-3110An Optimal Harvesting of A Discrete Time System with Ricker Growth
http://www.rgnpublications.com/journals/index.php/cma/article/view/1035
<p>In this study, the dynamic behavior of a sporadic model (prey-predator) is investigated with Ricker function growth in prey species. We also found the system has four fixed points. We set the conditions that required to achieve local stability of all fixed points. The rate of harvest in the case of being a fixed quantity in the community and the existence of the bionomic equilibruim in the absence of predator are discussed then the system is extended to an optimal harvesting policy. The Pontryagin’s maximum principle is used to solve the optimality problem. Numerical simulations have been applied to enhance the results of mathematical analysis of the system.</p>Sadiq Al-NassirGhosoon M. Hamoudi2019-03-312019-03-3110The Boundedness of Cauchy Integral Operator on a Domain Having Closed Analytic Boundary
http://www.rgnpublications.com/journals/index.php/cma/article/view/1104
In this paper, we prove that the Cauchy integral operators (or Cauchy transforms) define continuous linear operators on the Smirnov classes for some certain domain with closed analytic boundary.Yüksel Soykan2019-03-312019-03-3110