https://www.rgnpublications.com/journals/index.php/cma/issue/feed Communications in Mathematics and Applications 2022-08-25T04:26:18+00:00 The Head, Editorial Section editorial@rgnpublications.com Open Journal Systems <div id="focusAndScope"> <div id="focusAndScope"> <p style="line-height: 1.5;" align="justify">The "<strong>Communications in Mathematics and Applications</strong>” (CMA) is an international journal devoted to the publication of original and high-quality research of <strong>Pure and Applied Mathematics</strong>. The journal "Communications in Mathematics and Applications” (CMA) is being regularly published since 2010.</p> <p style="line-height: 1.5;" align="justify">The<strong> "Communications in Mathematics and Applications"</strong> covers the following subject fields (but not limited to):</p> <table border="0" width="622" cellspacing="2" cellpadding="2"> <tbody> <tr> <td valign="top"><strong>Pure Mathematics</strong></td> <td valign="top"><strong>Applied Mathematics</strong></td> </tr> <tr> <td valign="top" width="250"> <ul> <li>Algebra</li> <li>Algebraic Geometry</li> <li>Analysis</li> <li>Category Theory</li> <li>Graph Theory</li> <li>Mathematical Logic &amp; Foundations</li> <li>Number Theory</li> <li>Philosophy of Mathematics</li> <li>Topology</li> </ul> </td> <td valign="top" width="350"> <ul> <li>Information Theory</li> <li>Mathematical Physics</li> <li>Numerical Analysis</li> <li>Operations Research</li> <li>Probability Theory</li> <li>Computational Biology</li> <li>Statistics</li> <li>Computer Science</li> <li>Computational Chemistry</li> </ul> </td> </tr> </tbody> </table> <p style="line-height: 1.5;" align="justify">To ensure speedy publication, only articles that are sufficiently well presented, contain significant results, and not required major revisions will be considered. Articles are accepted only after peer review.</p> <p style="line-height: 1.5;" align="justify">The journal is also publishing survey articles giving details of research progress made during the last three decades in a particular area.</p> </div> <div id="peerReviewProcess"> <p style="line-height: 1.5;" align="justify"><strong>Peer Review Process:</strong> A submitted paper will be refereed by atleast one referee. The editorial board will make the decision within 12 weeks (three months) after submission.</p> </div> <div id="publicationFrequency"> <p style="line-height: 1.5;" align="justify"><strong>Publication Frequency:</strong> The "<strong>Communications in Mathematics and Applications</strong>" publishes four issues per volume in a year.</p> </div> </div> https://www.rgnpublications.com/journals/index.php/cma/article/view/1663 A Multistate Markov Model for the Progression of Congestive Heart Failure Using Kolmogorov Differential Equation 2021-09-02T06:35:26+00:00 Meenaxi meenaxijune@gmail.com Dalip Singh dsmdur@gmail.com <p>The reliability of individuals and human activities are vital for the new complexity of life, work and medication improvement. Markov models are grounded strategies for assessing paces of progress between phases of chronic illnesses. This paper is mainly focused on the survival analysis of a heart patient with Congestive cardiac failure. The objective of the paper is to describe the progression process of chronic heart failure (CHF), to estimate the life expectancy of patient suffering from congestive Heart failure. Explicit expression for Availability is also derived in this paper by using Kolmogorov differential equations. Graphs have been plotted to determine the behaviour of life expectancy of patient and availability analysis.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1944 Two Regular Polygons with a Shared Vertex 2022-06-17T07:27:26+00:00 Mamuka Meskhishvili mathmamuka@gmail.com <p>For two non-congruent regular polygons of the same type, the method of finding a point in the plane at the equal distances to the vertices, is established. The existence of two points with this property is proved for two polygons with a shared vertex. For one of them, it is proved that it satisfies the Bottema theorem conditions and based on this, the generalized Bottema theorem for any two regular polygons is given.</p> 2022-08-26T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1795 Radiative Magnetohydrodynamic Flow Over a Vertical Cone Filled With Convective Nanofluid 2022-01-15T09:24:26+00:00 J.L. Rama Prasad jlrprasad@gmail.com I.V. Venkateswara Rao venkat_inturi@rediffmail.com K.S. Balamurugan muruganbalaks@gmail.com G. Dharmaiah dharma.g2007@gmail.com <p>This article describes the magnetohydrodynamic radiative nano convective flow over a cone. Brownian motion and thermophoresis effects in nanofluid transport R-K method is used to compute the solutions to the governing non-dimensional partial differential conservation equations and free stream boundary conditions. Numerous thermo-physical parameters were presented, There is a detailed explanation of the simulations as well. Magnetic parameter increases, reduce velocity. According to the findings, there are numerous applications for heat exchanger technology, including geothermal energy storage and cooling, solar energy systems, and materials processing.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1757 Stability Results of Additive-Quadratic \(n\)-Dimensional Functional Equation: Fixed Point Approach 2021-12-06T07:19:11+00:00 S. Karthikeyan karthik.sma204@yahoo.com J. M. Rassias jrassias@primedu.uoa.gr S. Vijayakumar svr.sh@rmkec.ac.in K. Sakthivel ksl.sh@rmkec.ac.in <p>In this paper, the authors discussed the Ulam-Hyers stability results of \(n\)-dimensional mixed type additive and quadratic functional equation:<br />\begin{align*}<br />\sum\limits^{n}_{i=1}f\!\bigg(\sum\limits^{n}_{j=1}x_{ij}\bigg)\!&amp; = \bigg(\frac{-n^2+7n-6}{2}\bigg)\!\!<br />\sum_{i=1}^n f(x_i)+\!\bigg(\frac{-n^2+5n-2}{2}\bigg)\!\!<br />\sum_{i=1}^n f(-x_i) \\<br />&amp;\quad +\left(\frac{n-4}{2}\right)<br />\sum_{1\le i&lt;j\le n}(f(x_i+x_j)<br />+f(-x_i-x_j))\,,<br />\end{align*}<br />where<br />\begin{align*}<br />x_{ij}=<br />\begin{cases}<br />-x_j&amp;\text{if} \ i=j, \\<br />x_j &amp;\text{if} \ i\neq j,<br />\end{cases}<br />\end{align*} in Banach spaces using fixed point method.</p> 2022-08-15T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1723 Generalized Monotone Mappings with an Application to Variational Inclusions 2021-11-09T04:05:18+00:00 Tirth Ram tir1ram2@yahoo.com Mohd Iqbal iqbalmohd486@gmail.com <p>In this paper, we study a generalized monotone mapping, which is the sum of cocoercive and monotone mapping. The resolvent operator associated with generalized monotone mapping is defined, and some of its properties are discussed. We employ the equivalent formulation of generalized set-valued variational inclusion problems and resolvent equations to show the existence of a solution. In addition, we create an iterative algorithm for the convergence of resolvent equations and solving generalized set-valued variational inclusion problem. An example has also been provided to support the main result.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1756 Linear Complementary Pairs of Multi-twisted Codes and their Characterizations 2021-12-02T12:59:41+00:00 Rubayya rubayyayusuf@gmail.com K. S. Mansoor Ali ksmansoorali@gmail.com M. Sumanth Datt sumanth.datt@gmail.com <p>The linear complementary pairs (LCP) of codes is studied mainly due to their application in cryptography. It is used in the protection against physical attacks such as the side channel and fault injection. In this paper, we study the LCP of codes which belong to the class of multi-twisted codes. We give characterizations for the multi-twisted LCP of codes via their constituents and in terms of the generator polynomial of the code</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1817 Unsteady Stokes Flow Past a Shear Free Sphere 2022-02-05T08:03:20+00:00 A. Venkatalakshmi akavaramvlr@gmail.com <p>A method of solution for the problem of an arbitrary unsteady Stokes flow in the presence of a shear free sphere is discussed. The corresponding Faxén [2] relations for a shear-free sphere are derived. Some previously known results are derived as limiting cases and are detailed in an example.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1802 Some Results on Fractional Differential Equation With Mixed Boundary Condition via S-Iteration 2022-01-21T11:49:13+00:00 Haribhau L. Tidke tharibhau@gmail.com Gajanan S. Patil gajanan.umesh@rediffmail.com <p>The present paper discuss the existence, uniqueness and other properties of solutions of nonlinear differential equation of fractional order involving the Caputo fractional derivative with mixed boundary condition. The analysis of obtained results is based on application of S-iteration method. Since the study of qualitative properties in general required differential and integral inequalities, but here S-iteration method itself has equally important contribution to study various properties such as dependence on boundary data, closeness of solutions and dependence on parameters and functions involved therein. The results obtained are illustrated through example.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1667 Numerical Solution of 2nd Order Boundary Value Problems with Dirichlet, Neumann and Robin Boundary Conditions using FDM 2021-09-04T15:30:08+00:00 M. Adak malabikaadak@yahoo.co.in A. Mandal amandalthesis@yahoo.com <p>In many fields of science and engineering, to determine the harmonic motion, damped and forced variation, current from electric circuit, 2nd order ODE is required to solve. Solving the ODE with complicated boundary condition that occur in engineering problems is a great challenges analytically. Therefore, numerical technique finite difference method (FDM) is very popular and important for solving the boundary value problems. In this article three different conditions as Dirichlet, Neumann and Robin (mixed) boundary conditions are applied in initial-boundary problem. FDM is used to solve ODE boundary value problems. Error calculation, stability, convergence are also explained. To test the accuracy numerical solutions are verified with analytical solution and error is calculated at each point for different mesh grid size as mesh grid size is decreased result will give the accuracy.</p> 2022-05-23T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1719 Vorticity Gramian of Compact Riemannian Manifolds 2021-11-06T07:50:26+00:00 Louis Omenyi omenyi.louis@funai.edu.ng Emmanuel Nwaeze emmanuel.nwaeze@funai.edu.ng Friday Oyakhire friday.oyakhire@funai.edu.ng Monday Ekhator monday.ekhator@funai.edu.ng <p>The vorticity of a vector field on 3-dimensional Euclidean space is usually given by the curl of the vector field. In this paper, we extend this concept to n-dimensional compact and oriented Riemannian manifold. We analyse many properties of this operation. We prove that a vector field on a compact Riemannian manifold admits a unique Helmholtz decomposition and establish that every smooth vector field on an open neighbourhood of a compact Riemannian manifold admits a Stokes’ type identity.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1787 Fixed Point Theorems by Using Altering Distance Function in S-Metric Spaces 2022-01-10T16:04:20+00:00 Manoj Kumar manojantil18@gmail.com Sushma Devi sheoransushma50841@gmail.com Parul Singh parul.vicky2008@gmail.com <p>In the present paper, we prove some fixed point theorems by using the non-decreasing mapping \(\kappa :\mathbb{R}^+\to \mathbb{R}^+\) known as altering distance function or control function, in the context of \(S\)-metric space. Further, we explore the property \(P\) for these contractive mappings.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1810 Strong Vertex Coloring in Bipolar Fuzzy Graphs 2022-01-28T17:56:39+00:00 S. Yahya Mohamed yahya_md@yahoo.com N. Subashini yazhinisuba@gmail.com <p>Bipolar fuzzy graph (BFG) coloring techniques are used to solve many complex real world problems. The chromatic number of complement of BFG is obtained and compared with the chromatic number of the corresponding BFGs. This paper is an attempt to define coloring in a BFG based on strong edges. The strong chromatic number of complete BFG and BF tree are obtained.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1735 Neural Network of Multivariate Square Rational Bernstein Operators 2021-11-12T04:08:54+00:00 Ibtihal J. Mohammad ibtihaljas.moh@gmail.com Ali J. Mohammad alijasmoh@gmail.com <p>This paper introduced a family of neural networks of multivariate square rational Bernstein operators defined by extending the artificial neural networks multivariate Bernstein by using square Bernstein polynomials and studied the behavior of this neural network. Also, gave application through some numerical examples.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1746 M-N Homomorphism of an M-N Fuzzy Soft Subgroups and Its Level M-N Subgroups 2021-12-01T16:50:35+00:00 M. Kaliraja mkr.maths009@gmail.com S. Rumenaka rumenaka@gmail.com <p>We examined the notion of M-N homomorphism of fuzzy soft subgroups in this study, then defined the M-N level subsets of a fuzzy soft subgroup and discussed some of its basic aspects.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1725 A Notes on Matrix Sequence of Pentanacci Numbers and Pentanacci Cubes 2021-11-09T06:51:41+00:00 B. Sivakumar sivakumar.b@rajalakshmi.edu.in V. James james.v@rajalakshmi.edu.in <p>Pentanacci sequence is a fifth order recurrence relation and Pentanacci cubes \(\Gamma_{n}^{(5)}\) are induced subgraphs of the hypercube, obtained by removing all the vertices that contain five or more consecutive 1's. In the present work, we give some properties related to matrix sequence of Pentanacci numbers and Pentanacci cubes \(\Gamma_{n}^{(5)}\). Also, we investigate the generating function of matrix sequence and cube polynomials of Pentanacci cubes.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1905 Method of Construction and Some Properties of 4-Row-Regular Circulant Partial Hadamard Matrices of Order \((k\times 2k)\) 2022-05-08T03:13:38+00:00 Pankaj Kumar Manjhi 19pankaj81@gmail.com <p>In this paper, some properties of circulant partial Hadamard matrices of the form \(4-H(k\times 2k)\) have been obtained together with a method of construction with the help of Toeplitz matrices.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1720 A New Approach of Perfect Domination in Product of Interval-Valued Fuzzy Incidence Graphs With Application 2021-11-07T06:21:25+00:00 K. Kalaiarasi kalaishruthi1201@gmail.com P. Geethanjali geethamaths15@gmail.com <p>Fuzzy graphs, also known as fuzzy incidence graphs, are a useful and well-organized tool for encapsulating and resolving a variety of real-world situations involving ambiguous data and information. In this investigation article, we introduced the chance of interval-valued fuzzy incidence graphs (IVFIGs) alongside their specific properties. The operations of Cartesian product (CP), Tensor product (TP) in IVFIGs are additionally examined. The technique to compute the degree (DG) of IVFIGs acquired by CP and TP is examined. Some significant hypotheses to figure the DG of the vertices of IVFIGs gained by CP and TP are explained. An innovative idea of perfect domination in CP of two IVFIGs and TP of two IVFIGs utilizing incidence pair are presented and gotten the connection between them. Eventually, genuine utilization of perfect domination number (PDN) to discover which countries (country) have the best education policies among various countries is inspected.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1768 Some Fixed Point Theorems in Extended Cone \(b\)-Metric Spaces 2021-12-19T13:36:38+00:00 Abhishikta Das abhishikta.math@gmail.com T. Bag tarapadavb@gmail.com <p>In this paper, the notion of extended cone \(b\)-metric space is introduced, established the structure of the open ball and defined the notion of convergence of a sequence. Finally, restructured the Banach and Kannan contraction theorems without the normality condition in this new setting.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1729 An SIR Model for COVID-19 Outbreak in India 2021-11-11T09:10:37+00:00 S. Sweatha ss0365@srmist.edu.in P. Monisha mp4010@srmist.edu.in S. Sindu Devi sindudes@srmist.edu.in <p>In this paper, we have proposed a SIR fuzzy epidemic model by taking the transmission rate and recovery rate as fuzzy numbers. The basic reproduction number and the fuzzy basic reproduction number have been computed. Further by considering the initial values for the susceptible, infected and recovered population the numerical simulation has been carried out using Runge-Kutta method. We can predict the transmission of the virus and prevent the COVID-19 outbreak in India with the results obtained from the proposed SIR model.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1786 Regional Analysis of Consecutive Days Maximum Rainfall Using L-Moments: A Case Study for Brahmaputra Valley Region of Assam, India 2022-01-08T06:03:56+00:00 Rubul Bora rubulboracnbc@gmail.com Abhijit Bhuyan abhijitckbc@gmail.com Biju Kumar Dutta dutta.bk11@gmail.com <p>In this study, Regional Rainfall Frequency analysis has been carried out based on L-moment in the Brahmaputra Valley. For this purpose, the consecutive 1 to 6 days maximum rainfall for 11 sites (data varying from 14 years to 23 years) have been considered for our study. The heterogeneity measures for 1 to 6 days of the study region are calculated. The five probability distributions namely, generalized extreme value (GEV), generalized logistic (GLO), generalized Pareto (GPA), generalized normal (GNO), and the Pearson Type III (PE3) have been considered. The Z-statistics criteria and L-moment ratio diagram for goodness of fit tests have been used for identifying the best fitting distributions for 1 to 6 days of the study area. The PE3 distribution is identified as the best fitting distribution for the consecutive 1-day and 6-days maximum rainfall while GLO distribution for the consecutive 2-days and 4-days, GNO distributions for the consecutive 3-days and 5-days maximum rainfall of the study region. The regional relationships for each season of the study regions are develope</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1764 The Homotopy Perturbation Method to Solve a Wave Equation 2021-12-17T06:50:15+00:00 P.M. Gouder priyagouder@gmail.com V.H. Kolli vhkolli140366@gmail.com Md. Hanif Page mb_page@kletech.ac.in Krishna B. Chavaraddi praveen.chandargi@kletech.ac.in Praveen Chandaragi ckrishna2002@yahoo.com <p>In the paper, we discuss applications of Homotopy Perturbation Method (HPM) related to wave equations subjected to non-local conditions and the method is applied to two test problems in the paper. The method was introduced by J.-H. He (Homotopy perturbation technique, Computer Methods in Applied Mechanics and Engineering 178(3-4) (1999), 257 – 262) and the solutions are matched against exact solutions as in the literature. The results indicate that the HPM produces accurate solutions and faster converging with less computational effort.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1771 \(n\)-Tuple Fixed Point Theorem in Bi-Complete \(F\)-quasi Metric Space 2021-12-19T18:26:56+00:00 Manjusha Gandhi manjusha_g2@rediffmail.com Anushree Aserkar aserkar_aaa@rediffmail.com <p>In the present paper, two theorems are discussed, one is fixed point theorem and another is \(n\)-tuple fixed point theorem for a new contractive condition in bi-complete $F$-quasi metric space. Also, an example is given to validate the result.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1832 A Common Fixed Point Theorem for Two Compatible Self-maps of a \(S\)-Metric Space 2022-02-28T05:54:54+00:00 V. Kiran kiranmathou@gmail.com J. Niranjan Goud jngoud1979@gmail.com <p>In this paper, we prove a common fixed point theorem for two compatible self-maps of a \(S\)-metric space.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1801 Analytical Solution of Diffraction by a Composite Cylinders Above a Special Bottom Undulation in Uniform Water 2022-01-21T09:43:12+00:00 M. Hassan mdhassan000@gmail.com L. Tashi lham.tashi10@gmail.com <p>We consider the co-axial cylindrical structure as a composite submerged solid cylinder above a special bottom undulation, i.e., a circular plate at the impermeable horizontal bottom. We consider the diffraction problem of the proposed structure in water of finite depth. This diffraction problem can be expressed as a wave energy converter. The variables of separation and eigenfunction expansion methods are utilized to determine the analytical solutions for the diffraction problem in their identified sub-domains. By using the methods of expansion of eigenfunction and the orthogonality of Bessel functions to the expression of the diffracted velocity potentials. We achieve a system of linear equations after suitably truncated to the obtain infinite series. This work may be helpful to the wave designer to design appropriate device so that one can extract maximum wave energy. The created wave energy may be used in many applications of conventional energy.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1796 Applying Hessian Matrix Techniques to Obtain the Efficient Optimal Order Quantity Using Fuzzy Parameters 2022-01-15T11:12:24+00:00 K. Kalaiarasi kalaishruthi1201@gmail.com H. Mary Henrietta mary.henriet123@gmail.com M. Sumathi sunsumi2010@gmail.com <p>In the field of applied mathematics, optimization techniques formulate to the maximizing and minimizing for an objective function. The purpose of the optimization problems plays a vital role in the field of inventory management. The aim is to minimize the total cost, which comprises many fluctuating costs such as shortage, ordering, and holding cost. In this paper, the defective items were under the classification synchronous and asynchronous under a rework strategy process. The rework strategy is separating and accumulating the imperfect items at the time of completion of the process. This study considered asynchronous defective items and tried to minimize the total cost incurred. The optimality of the non-linear programming was achieved by the Hessian matrix, which results in the minimization of the total cost incurred. Furthermore, the usage of hexagonal fuzzy numbers formulates many real-life problems that arise due to flawed knowledge. There might be several situations in decision-making problems where optimization techniques require six parameters or more. The inclusion of Python coding has further made numerical working simpler. Furthermore, sensitivity analysis is carried out.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/1706 On Generalized Fibonacci Hybrinomials 2021-10-20T20:10:51+00:00 Yasemin Taşyurdu ytasyurdu@erzincan.edu.tr Ayşe Şahin aysesahin24@outlook.com <p>In this paper, we define generalized Fibonacci hybrinomials, which are generalization of both Fibonacci type hybrinomials and Lucas type hybrinomials. We introduce these hybrinomials in two types as generalized Fibonacci type hybrinomials and generalized Lucas type hybrinomials. We obtain matrix representations, Binet formulas, generating functions and some properties of the generalized Fibonacci hybrinomials. Moreover, we give relationship between the generalized Fibonacci type hybrinomials and generalized Lucas type hybrinomials.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/2031 The Reality of the Awareness of the Workers in the National Health Information Center of the Importance of Big Data: A Survey Study 2022-08-25T03:42:18+00:00 Amani Abdul Qawi Obaid Al Selmi amani.alselmi@gmail.com Abdulrahman Obaid Ali Alqarni amani.alselmi@gmail.com <p>This study aimed at identifying the reality of the awareness of workers in the National Health Information Center of the importance of big data. It used the descriptive approach (survey study) through the personal interview tool with the aim of collecting data to identify the views of the study sample about the main question of the study, which is “What is the reality of workers’ perceptions in the National Health Information Center of the importance of big data?”From this main question the following sub-questions derive: First, “What is the awareness of workers at all administrative levels of the concept and importance of managing and analyzing big data?”. Second, “What is the importance of managing big data in the National Health Information Center?”. Third, “What value does managing big data add to the National Health Information Center?”. Out of This third question, emerge the following sub-questions: First, “What is the value of big data in the National Health Information Center follow-up on e-health projects?”. Second, “What is the value of big data in decision support for health policy-making?”. Third, “What value does big data add to support health innovation?”. Fourth, “What value does big data add to enhance clinical trials?”. Fifth, “What is the investment value of big data?” The study community consisted of the National Health Information Center, and the study sample was the intentional sample, which consisted of officials, administrative and technical staff directly related to dealing with big data in the center. In its results, the study found a difference in the awareness of the workers in the center of the importance of big data, according to the administrative levels they occupy. The strategic position of the center and its role in making health decisions at the national level and the huge volumes of data it contains and produces illustrate the importance of managing big data in the center. The value added by the management of big data in the center is namely assistance in following up on e-health projects, assisting decision-makers in making health policies. In addition, it is considered one of the most important tributaries to support the process of health innovation and health research, to enhance the aspect of clinical trials, and in investment. In light of these results, the study recommended raising awareness among the center employees through holding seminars and specialized workshops, directing the health sectors and relevant authorities and guiding them with the basic rules for managing and preserving big data, completion of operational plans to actually launch the investment phase of big data</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 https://www.rgnpublications.com/journals/index.php/cma/article/view/2033 Facilitating Software Reuse Through Design Characteristics in Object-Oriented Paradigm 2022-08-25T04:06:53+00:00 Wajdi Aljedebi waljedaibi@kau.edu.sa Rihab Al-Mutawa ral-mutawa@kau.edu.sa <p>Software are used to increases quality as well as productivity that could be associated with lower costs. Implementing software with capability for reuse is difficult without sufficient support. This paper includes tutorial represents four important design characteristics in object-oriented paradigm for facilitating the production of more reusable software. It reviews the concepts of modularity, cohesion, coupling and information hiding and provides a discussion about their effect on software reuse. Object-oriented approach is having wide attention both in research environments and in industry. This tutorial is prepared for newbie developers of reusable software assets and for everyone else interested in the subject.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 https://www.rgnpublications.com/journals/index.php/cma/article/view/2035 Modeling and Characterizing of an Enhanced Practical Terahertz Photoconductive Antenna 2022-08-25T04:19:14+00:00 Aiman Fakieh nsobahi@kau.edu.sa Hatem Rmili nsobahi@kau.edu.sa Nebras Sobahi nsobahi@kau.edu.sa <p>Optical generation can be divided into photoconductive generation and optical rectification. Moreover, the generation of photoconductive is more efficient than optical rectification when standard laser oscillator systems are used. At photoconductive antenna (PCA), the efficiency and terahertz (THz) power generated are affected by different parameters (e.g. incident power of laser pump, dielectric properties and the applied DC bias voltage difference). In this research, four proposed designs of PCAs are presented and compared. Furthermore, microfabrication aspects and concerns have been considered in this study, which are rarely presented in the literature. Therefore, effects of different parameters are shown in this work such as adding adhesion layer in between electrodes and the substrate, varying of gap properties and dipole length. Output frequency, photocurrent and the total effective energy of different antenna models at different values of laser power have been studied and compared.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 https://www.rgnpublications.com/journals/index.php/cma/article/view/2032 Data Security Challenges and Solutions in Cloud Computing: Critical Review 2022-08-25T03:59:00+00:00 Shuruq Zayed Al-Otaibi snalotaibi@stu.kau.edu.sa <p>This paper was prepare, based on the sensitivity of data security topics, and based on the controversy surrounding cloud-computing security. Therefore, this paper aimed to contribute by providing some tips and directions related to cloud security through critical review for a number of recent studies. Then, extracting the most important latest problems and solutions that related to data security in cloud computing; and presenting them all in one study to become a comprehensive reference. The study found that the most important problems are data leakage, data remoteness, privacy and data segregation. As for the most important solutions that this paper reached to meet these challenges, were using practical strategies like models and standards, and using different emerging and programming technologies such as encryption, digital signatures, hashing, and blockchain, smart contracts, IoTs sensors and devices, edge computing, and fog computing. The study recommended researchers to conduct more theoretical and practical research on the subject, and recommended the cloud services providers to adopt several practical strategies and emerging technologies for higher protection.</p> 2022-08-25T00:00:00+00:00 Copyright (c) 2022 Communications in Mathematics and Applications https://www.rgnpublications.com/journals/index.php/cma/article/view/2034 Real-Time Driver Drowsiness Detection System Using Dlib based on Driver Eye/Mouth Monitoring Technology 2022-08-25T04:09:38+00:00 Wesam H. Al-Sabban whsabban@uqu.edu.sa <p>The driver sleepiness is common and one of the main causes of road accidents. So, there is a need for automatically detecting of this human behaviour. In any case, if the drivers feel drowsy, they still keep on driving the vehicle, and accidents occur. This study can be implemented using the CNN training model and initiating an alarm if the drowsiness condition is detected. Many of the authors suggested the process of detecting the Drowsiness (Problem Statement) of the drivers using technologies like the Internet of Things (IoT), Deep learning, and Haar cascade (to detect the coordinates of eyes and mouth, which are the target objects). However, this study contributes towards providing the real-time application in co-operating the CNN model and Dlib. Hence, this study proposes a novel embedded system with CNN technology. The CNN model is fed with inputs based on four (4) images related to eye and mouth openings and closings. This application is trained using the CNN model, which takes inputs as images and processes by identifying the features on the face using the Dlib library while representing the change in the state of coordinates of eyes and mouth as Yawning. This approach is achieved using Convolution Neural Network (CNN), pillow, Pygame, OpenCV, and the Dlib, along with providing an alarm when the position of mouth changes. The model is recorded with a maximum validation accuracy of 98% with the minimum recorded loss of less than 0.04% as areal-time application.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022 https://www.rgnpublications.com/journals/index.php/cma/article/view/2036 Construction of Project Management Using Information System 2022-08-25T04:26:18+00:00 Khaled Mofawiz Alfawaz kalfawaz@kau.edu.sa Fahd Mohammed Aljedani kalfawaz@kau.edu.sa <p>Information is playing a vital role of every concerns project management processes. The activities of organization’s project management, desires to attain an excellent flow of information. This task can be done through to build a high quality information system to that concern. This paper concentrates the present status of information systems in the function of construction project management for the huge corporation and government agencies in Saudi Arabia. The innovative conceptual model names as Information System Success (ISS) is built to obtain the barriers of information system in project constructions as well as independent variables are introduced. With the assistance of ISS model, the researcher can create a survey to verify the achievement of the information system and the autonomous variables that influence the information system within the population data. The results will explain the improvements of Saudi Arabia’s large corporation government agencies construction project. Moreover, the result indicates that the independent variables have focusing the effect of the information system such as IT infrastructure, organizational competence along with management support.</p> 2022-08-17T00:00:00+00:00 Copyright (c) 2022