Communications in Mathematics and Applications <div id="focusAndScope"> <div id="focusAndScope"> <p style="line-height: 1.5;" align="justify">The "<strong>Communications in Mathematics and Applications</strong>” (CMA) is an international journal devoted to the publication of original and high-quality research of <strong>Pure and Applied Mathematics</strong>. The journal "Communications in Mathematics and Applications” (CMA) is being regularly published since 2010.</p> <p style="line-height: 1.5;" align="justify">The<strong> "Communications in Mathematics and Applications"</strong> covers the following subject fields (but not limited to):</p> <table border="0" width="622" cellspacing="2" cellpadding="2"> <tbody> <tr> <td valign="top"><strong>Pure Mathematics</strong></td> <td valign="top"><strong>Applied Mathematics</strong></td> </tr> <tr> <td valign="top" width="250"> <ul> <li>Algebra</li> <li>Algebraic Geometry</li> <li>Analysis</li> <li>Category Theory</li> <li>Graph Theory</li> <li>Mathematical Logic &amp; Foundations</li> <li>Number Theory</li> <li>Philosophy of Mathematics</li> <li>Topology</li> </ul> </td> <td valign="top" width="350"> <ul> <li>Information Theory</li> <li>Mathematical Physics</li> <li>Numerical Analysis</li> <li>Operations Research</li> <li>Probability Theory</li> <li>Computational Biology</li> <li>Statistics</li> <li>Computer Science</li> <li>Computational Chemistry</li> </ul> </td> </tr> </tbody> </table> <p style="line-height: 1.5;" align="justify">To ensure speedy publication, only articles that are sufficiently well presented, contain significant results, and not required major revisions will be considered. Articles are accepted only after peer review.</p> <p style="line-height: 1.5;" align="justify">The journal is also publishing survey articles giving details of research progress made during the last three decades in a particular area.</p> </div> <div id="peerReviewProcess"> <p style="line-height: 1.5;" align="justify"><strong>Peer Review Process:</strong> A submitted paper will be refereed by atleast one referee. The editorial board will make the decision within 12 weeks (three months) after submission.</p> </div> <div id="publicationFrequency"> <p style="line-height: 1.5;" align="justify"><strong>Publication Frequency:</strong> The "<strong>Communications in Mathematics and Applications</strong>" publishes four issues per volume in a year.</p> </div> </div> en-US <p><a href=""><strong>Creative Commons Licence 4.0</strong></a> <img src="" alt="by" border="0" /> </p> <p>Authors who publish with this journal agree to the following terms:</p> <ul> <li>Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a CCAL that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</li> <li>Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</li> <li>Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.</li> </ul> (The Head, Editorial Section) (The Head, Editorial Section) Wed, 17 Aug 2022 00:00:00 +0000 OJS 60 A Multistate Markov Model for the Progression of Congestive Heart Failure Using Kolmogorov Differential Equation <p>The reliability of individuals and human activities are vital for the new complexity of life, work and medication improvement. Markov models are grounded strategies for assessing paces of progress between phases of chronic illnesses. This paper is mainly focused on the survival analysis of a heart patient with Congestive cardiac failure. The objective of the paper is to describe the progression process of chronic heart failure (CHF), to estimate the life expectancy of patient suffering from congestive Heart failure. Explicit expression for Availability is also derived in this paper by using Kolmogorov differential equations. Graphs have been plotted to determine the behaviour of life expectancy of patient and availability analysis.</p> Meenaxi, Dalip Singh Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 Two Regular Polygons with a Shared Vertex <p>For two non-congruent regular polygons of the same type, the method of finding a point in the plane at the equal distances to the vertices, is established. The existence of two points with this property is proved for two polygons with a shared vertex. For one of them, it is proved that it satisfies the Bottema theorem conditions and based on this, the generalized Bottema theorem for any two regular polygons is given.</p> Mamuka Meskhishvili Copyright (c) 2022 Communications in Mathematics and Applications Fri, 26 Aug 2022 00:00:00 +0000 Radiative Magnetohydrodynamic Flow Over a Vertical Cone Filled With Convective Nanofluid <p>This article describes the magnetohydrodynamic radiative nano convective flow over a cone. Brownian motion and thermophoresis effects in nanofluid transport R-K method is used to compute the solutions to the governing non-dimensional partial differential conservation equations and free stream boundary conditions. Numerous thermo-physical parameters were presented, There is a detailed explanation of the simulations as well. Magnetic parameter increases, reduce velocity. According to the findings, there are numerous applications for heat exchanger technology, including geothermal energy storage and cooling, solar energy systems, and materials processing.</p> J.L. Rama Prasad, I.V. Venkateswara Rao, K.S. Balamurugan, G. Dharmaiah Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 Stability Results of Additive-Quadratic \(n\)-Dimensional Functional Equation: Fixed Point Approach <p>In this paper, the authors discussed the Ulam-Hyers stability results of \(n\)-dimensional mixed type additive and quadratic functional equation:<br />\begin{align*}<br />\sum\limits^{n}_{i=1}f\!\bigg(\sum\limits^{n}_{j=1}x_{ij}\bigg)\!&amp; = \bigg(\frac{-n^2+7n-6}{2}\bigg)\!\!<br />\sum_{i=1}^n f(x_i)+\!\bigg(\frac{-n^2+5n-2}{2}\bigg)\!\!<br />\sum_{i=1}^n f(-x_i) \\<br />&amp;\quad +\left(\frac{n-4}{2}\right)<br />\sum_{1\le i&lt;j\le n}(f(x_i+x_j)<br />+f(-x_i-x_j))\,,<br />\end{align*}<br />where<br />\begin{align*}<br />x_{ij}=<br />\begin{cases}<br />-x_j&amp;\text{if} \ i=j, \\<br />x_j &amp;\text{if} \ i\neq j,<br />\end{cases}<br />\end{align*} in Banach spaces using fixed point method.</p> S. Karthikeyan, J. M. Rassias, S. Vijayakumar, K. Sakthivel Copyright (c) 2022 Communications in Mathematics and Applications Mon, 15 Aug 2022 00:00:00 +0000 Generalized Monotone Mappings with an Application to Variational Inclusions <p>In this paper, we study a generalized monotone mapping, which is the sum of cocoercive and monotone mapping. The resolvent operator associated with generalized monotone mapping is defined, and some of its properties are discussed. We employ the equivalent formulation of generalized set-valued variational inclusion problems and resolvent equations to show the existence of a solution. In addition, we create an iterative algorithm for the convergence of resolvent equations and solving generalized set-valued variational inclusion problem. An example has also been provided to support the main result.</p> Tirth Ram, Mohd Iqbal Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 Linear Complementary Pairs of Multi-twisted Codes and their Characterizations <p>The linear complementary pairs (LCP) of codes is studied mainly due to their application in cryptography. It is used in the protection against physical attacks such as the side channel and fault injection. In this paper, we study the LCP of codes which belong to the class of multi-twisted codes. We give characterizations for the multi-twisted LCP of codes via their constituents and in terms of the generator polynomial of the code</p> Rubayya, K. S. Mansoor Ali, M. Sumanth Datt Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 Unsteady Stokes Flow Past a Shear Free Sphere <p>A method of solution for the problem of an arbitrary unsteady Stokes flow in the presence of a shear free sphere is discussed. The corresponding Faxén [2] relations for a shear-free sphere are derived. Some previously known results are derived as limiting cases and are detailed in an example.</p> A. Venkatalakshmi Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 Some Results on Fractional Differential Equation With Mixed Boundary Condition via S-Iteration <p>The present paper discuss the existence, uniqueness and other properties of solutions of nonlinear differential equation of fractional order involving the Caputo fractional derivative with mixed boundary condition. The analysis of obtained results is based on application of S-iteration method. Since the study of qualitative properties in general required differential and integral inequalities, but here S-iteration method itself has equally important contribution to study various properties such as dependence on boundary data, closeness of solutions and dependence on parameters and functions involved therein. The results obtained are illustrated through example.</p> Haribhau L. Tidke, Gajanan S. Patil Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 Numerical Solution of 2nd Order Boundary Value Problems with Dirichlet, Neumann and Robin Boundary Conditions using FDM <p>In many fields of science and engineering, to determine the harmonic motion, damped and forced variation, current from electric circuit, 2nd order ODE is required to solve. Solving the ODE with complicated boundary condition that occur in engineering problems is a great challenges analytically. Therefore, numerical technique finite difference method (FDM) is very popular and important for solving the boundary value problems. In this article three different conditions as Dirichlet, Neumann and Robin (mixed) boundary conditions are applied in initial-boundary problem. FDM is used to solve ODE boundary value problems. Error calculation, stability, convergence are also explained. To test the accuracy numerical solutions are verified with analytical solution and error is calculated at each point for different mesh grid size as mesh grid size is decreased result will give the accuracy.</p> M. Adak, A. Mandal Copyright (c) 2022 Communications in Mathematics and Applications Mon, 23 May 2022 00:00:00 +0000 Vorticity Gramian of Compact Riemannian Manifolds <p>The vorticity of a vector field on 3-dimensional Euclidean space is usually given by the curl of the vector field. In this paper, we extend this concept to n-dimensional compact and oriented Riemannian manifold. We analyse many properties of this operation. We prove that a vector field on a compact Riemannian manifold admits a unique Helmholtz decomposition and establish that every smooth vector field on an open neighbourhood of a compact Riemannian manifold admits a Stokes’ type identity.</p> Louis Omenyi, Emmanuel Nwaeze, Friday Oyakhire, Monday Ekhator Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 Fixed Point Theorems by Using Altering Distance Function in S-Metric Spaces <p>In the present paper, we prove some fixed point theorems by using the non-decreasing mapping \(\kappa :\mathbb{R}^+\to \mathbb{R}^+\) known as altering distance function or control function, in the context of \(S\)-metric space. Further, we explore the property \(P\) for these contractive mappings.</p> Manoj Kumar, Sushma Devi, Parul Singh Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 Strong Vertex Coloring in Bipolar Fuzzy Graphs <p>Bipolar fuzzy graph (BFG) coloring techniques are used to solve many complex real world problems. The chromatic number of complement of BFG is obtained and compared with the chromatic number of the corresponding BFGs. This paper is an attempt to define coloring in a BFG based on strong edges. The strong chromatic number of complete BFG and BF tree are obtained.</p> S. Yahya Mohamed, N. Subashini Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 Neural Network of Multivariate Square Rational Bernstein Operators <p>This paper introduced a family of neural networks of multivariate square rational Bernstein operators defined by extending the artificial neural networks multivariate Bernstein by using square Bernstein polynomials and studied the behavior of this neural network. Also, gave application through some numerical examples.</p> Ibtihal J. Mohammad, Ali J. Mohammad Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 M-N Homomorphism of an M-N Fuzzy Soft Subgroups and Its Level M-N Subgroups <p>We examined the notion of M-N homomorphism of fuzzy soft subgroups in this study, then defined the M-N level subsets of a fuzzy soft subgroup and discussed some of its basic aspects.</p> M. Kaliraja, S. Rumenaka Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 A Notes on Matrix Sequence of Pentanacci Numbers and Pentanacci Cubes <p>Pentanacci sequence is a fifth order recurrence relation and Pentanacci cubes \(\Gamma_{n}^{(5)}\) are induced subgraphs of the hypercube, obtained by removing all the vertices that contain five or more consecutive 1's. In the present work, we give some properties related to matrix sequence of Pentanacci numbers and Pentanacci cubes \(\Gamma_{n}^{(5)}\). Also, we investigate the generating function of matrix sequence and cube polynomials of Pentanacci cubes.</p> B. Sivakumar, V. James Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 Method of Construction and Some Properties of 4-Row-Regular Circulant Partial Hadamard Matrices of Order \((k\times 2k)\) <p>In this paper, some properties of circulant partial Hadamard matrices of the form \(4-H(k\times 2k)\) have been obtained together with a method of construction with the help of Toeplitz matrices.</p> Pankaj Kumar Manjhi Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 A New Approach of Perfect Domination in Product of Interval-Valued Fuzzy Incidence Graphs With Application <p>Fuzzy graphs, also known as fuzzy incidence graphs, are a useful and well-organized tool for encapsulating and resolving a variety of real-world situations involving ambiguous data and information. In this investigation article, we introduced the chance of interval-valued fuzzy incidence graphs (IVFIGs) alongside their specific properties. The operations of Cartesian product (CP), Tensor product (TP) in IVFIGs are additionally examined. The technique to compute the degree (DG) of IVFIGs acquired by CP and TP is examined. Some significant hypotheses to figure the DG of the vertices of IVFIGs gained by CP and TP are explained. An innovative idea of perfect domination in CP of two IVFIGs and TP of two IVFIGs utilizing incidence pair are presented and gotten the connection between them. Eventually, genuine utilization of perfect domination number (PDN) to discover which countries (country) have the best education policies among various countries is inspected.</p> K. Kalaiarasi, P. Geethanjali Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 Some Fixed Point Theorems in Extended Cone \(b\)-Metric Spaces <p>In this paper, the notion of extended cone \(b\)-metric space is introduced, established the structure of the open ball and defined the notion of convergence of a sequence. Finally, restructured the Banach and Kannan contraction theorems without the normality condition in this new setting.</p> Abhishikta Das, T. Bag Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 An SIR Model for COVID-19 Outbreak in India <p>In this paper, we have proposed a SIR fuzzy epidemic model by taking the transmission rate and recovery rate as fuzzy numbers. The basic reproduction number and the fuzzy basic reproduction number have been computed. Further by considering the initial values for the susceptible, infected and recovered population the numerical simulation has been carried out using Runge-Kutta method. We can predict the transmission of the virus and prevent the COVID-19 outbreak in India with the results obtained from the proposed SIR model.</p> S. Sweatha, P. Monisha, S. Sindu Devi Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 Regional Analysis of Consecutive Days Maximum Rainfall Using L-Moments: A Case Study for Brahmaputra Valley Region of Assam, India <p>In this study, Regional Rainfall Frequency analysis has been carried out based on L-moment in the Brahmaputra Valley. For this purpose, the consecutive 1 to 6 days maximum rainfall for 11 sites (data varying from 14 years to 23 years) have been considered for our study. The heterogeneity measures for 1 to 6 days of the study region are calculated. The five probability distributions namely, generalized extreme value (GEV), generalized logistic (GLO), generalized Pareto (GPA), generalized normal (GNO), and the Pearson Type III (PE3) have been considered. The Z-statistics criteria and L-moment ratio diagram for goodness of fit tests have been used for identifying the best fitting distributions for 1 to 6 days of the study area. The PE3 distribution is identified as the best fitting distribution for the consecutive 1-day and 6-days maximum rainfall while GLO distribution for the consecutive 2-days and 4-days, GNO distributions for the consecutive 3-days and 5-days maximum rainfall of the study region. The regional relationships for each season of the study regions are develope</p> Rubul Bora, Abhijit Bhuyan, Biju Kumar Dutta Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 The Homotopy Perturbation Method to Solve a Wave Equation <p>In the paper, we discuss applications of Homotopy Perturbation Method (HPM) related to wave equations subjected to non-local conditions and the method is applied to two test problems in the paper. The method was introduced by J.-H. He (Homotopy perturbation technique, Computer Methods in Applied Mechanics and Engineering 178(3-4) (1999), 257 – 262) and the solutions are matched against exact solutions as in the literature. The results indicate that the HPM produces accurate solutions and faster converging with less computational effort.</p> P.M. Gouder, V.H. Kolli, Md. Hanif Page, Krishna B. Chavaraddi, Praveen Chandaragi Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 \(n\)-Tuple Fixed Point Theorem in Bi-Complete \(F\)-quasi Metric Space <p>In the present paper, two theorems are discussed, one is fixed point theorem and another is \(n\)-tuple fixed point theorem for a new contractive condition in bi-complete $F$-quasi metric space. Also, an example is given to validate the result.</p> Manjusha Gandhi, Anushree A. Aserkar Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 A Common Fixed Point Theorem for Two Compatible Self-maps of a \(S\)-Metric Space <p>In this paper, we prove a common fixed point theorem for two compatible self-maps of a \(S\)-metric space.</p> V. Kiran, J. Niranjan Goud Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 Analytical Solution of Diffraction by a Composite Cylinders Above a Special Bottom Undulation in Uniform Water <p>We consider the co-axial cylindrical structure as a composite submerged solid cylinder above a special bottom undulation, i.e., a circular plate at the impermeable horizontal bottom. We consider the diffraction problem of the proposed structure in water of finite depth. This diffraction problem can be expressed as a wave energy converter. The variables of separation and eigenfunction expansion methods are utilized to determine the analytical solutions for the diffraction problem in their identified sub-domains. By using the methods of expansion of eigenfunction and the orthogonality of Bessel functions to the expression of the diffracted velocity potentials. We achieve a system of linear equations after suitably truncated to the obtain infinite series. This work may be helpful to the wave designer to design appropriate device so that one can extract maximum wave energy. The created wave energy may be used in many applications of conventional energy.</p> M. Hassan, L. Tashi Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 Applying Hessian Matrix Techniques to Obtain the Efficient Optimal Order Quantity Using Fuzzy Parameters <p>In the field of applied mathematics, optimization techniques formulate to the maximizing and minimizing for an objective function. The purpose of the optimization problems plays a vital role in the field of inventory management. The aim is to minimize the total cost, which comprises many fluctuating costs such as shortage, ordering, and holding cost. In this paper, the defective items were under the classification synchronous and asynchronous under a rework strategy process. The rework strategy is separating and accumulating the imperfect items at the time of completion of the process. This study considered asynchronous defective items and tried to minimize the total cost incurred. The optimality of the non-linear programming was achieved by the Hessian matrix, which results in the minimization of the total cost incurred. Furthermore, the usage of hexagonal fuzzy numbers formulates many real-life problems that arise due to flawed knowledge. There might be several situations in decision-making problems where optimization techniques require six parameters or more. The inclusion of Python coding has further made numerical working simpler. Furthermore, sensitivity analysis is carried out.</p> K. Kalaiarasi, H. Mary Henrietta, M. Sumathi Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 On Generalized Fibonacci Hybrinomials <p>In this paper, we define generalized Fibonacci hybrinomials, which are generalization of both Fibonacci type hybrinomials and Lucas type hybrinomials. We introduce these hybrinomials in two types as generalized Fibonacci type hybrinomials and generalized Lucas type hybrinomials. We obtain matrix representations, Binet formulas, generating functions and some properties of the generalized Fibonacci hybrinomials. Moreover, we give relationship between the generalized Fibonacci type hybrinomials and generalized Lucas type hybrinomials.</p> Yasemin Taşyurdu, Ayşe Şahin Copyright (c) 2022 Communications in Mathematics and Applications Wed, 17 Aug 2022 00:00:00 +0000 The Reality of the Awareness of the Workers in the National Health Information Center of the Importance of Big Data: A Survey Study <p>This study aimed at identifying the reality of the awareness of workers in the National Health Information Center of the importance of big data. It used the descriptive approach (survey study) through the personal interview tool with the aim of collecting data to identify the views of the study sample about the main question of the study, which is “What is the reality of workers’ perceptions in the National Health Information Center of the importance of big data?”From this main question the following sub-questions derive: First, “What is the awareness of workers at all administrative levels of the concept and importance of managing and analyzing big data?”. Second, “What is the importance of managing big data in the National Health Information Center?”. Third, “What value does managing big data add to the National Health Information Center?”. Out of This third question, emerge the following sub-questions: First, “What is the value of big data in the National Health Information Center follow-up on e-health projects?”. Second, “What is the value of big data in decision support for health policy-making?”. Third, “What value does big data add to support health innovation?”. Fourth, “What value does big data add to enhance clinical trials?”. Fifth, “What is the investment value of big data?” The study community consisted of the National Health Information Center, and the study sample was the intentional sample, which consisted of officials, administrative and technical staff directly related to dealing with big data in the center. In its results, the study found a difference in the awareness of the workers in the center of the importance of big data, according to the administrative levels they occupy. The strategic position of the center and its role in making health decisions at the national level and the huge volumes of data it contains and produces illustrate the importance of managing big data in the center. The value added by the management of big data in the center is namely assistance in following up on e-health projects, assisting decision-makers in making health policies. In addition, it is considered one of the most important tributaries to support the process of health innovation and health research, to enhance the aspect of clinical trials, and in investment. In light of these results, the study recommended raising awareness among the center employees through holding seminars and specialized workshops, directing the health sectors and relevant authorities and guiding them with the basic rules for managing and preserving big data, completion of operational plans to actually launch the investment phase of big data</p> Amani Abdul Qawi Obaid Al Selmi, Abdulrahman Obaid Ali Alqarni Copyright (c) 2022 Wed, 17 Aug 2022 00:00:00 +0000 Facilitating Software Reuse Through Design Characteristics in Object-Oriented Paradigm <p>Software are used to increases quality as well as productivity that could be associated with lower costs. Implementing software with capability for reuse is difficult without sufficient support. This paper includes tutorial represents four important design characteristics in object-oriented paradigm for facilitating the production of more reusable software. It reviews the concepts of modularity, cohesion, coupling and information hiding and provides a discussion about their effect on software reuse. Object-oriented approach is having wide attention both in research environments and in industry. This tutorial is prepared for newbie developers of reusable software assets and for everyone else interested in the subject.</p> Wajdi Aljedebi, Rihab Al-Mutawa Copyright (c) 2022 Wed, 17 Aug 2022 00:00:00 +0000 Modeling and Characterizing of an Enhanced Practical Terahertz Photoconductive Antenna <p>Optical generation can be divided into photoconductive generation and optical rectification. Moreover, the generation of photoconductive is more efficient than optical rectification when standard laser oscillator systems are used. At photoconductive antenna (PCA), the efficiency and terahertz (THz) power generated are affected by different parameters (e.g. incident power of laser pump, dielectric properties and the applied DC bias voltage difference). In this research, four proposed designs of PCAs are presented and compared. Furthermore, microfabrication aspects and concerns have been considered in this study, which are rarely presented in the literature. Therefore, effects of different parameters are shown in this work such as adding adhesion layer in between electrodes and the substrate, varying of gap properties and dipole length. Output frequency, photocurrent and the total effective energy of different antenna models at different values of laser power have been studied and compared.</p> Aiman Fakieh, Hatem Rmili, Nebras Sobahi Copyright (c) 2022 Wed, 17 Aug 2022 00:00:00 +0000 Data Security Challenges and Solutions in Cloud Computing: Critical Review <p>This paper was prepare, based on the sensitivity of data security topics, and based on the controversy surrounding cloud-computing security. Therefore, this paper aimed to contribute by providing some tips and directions related to cloud security through critical review for a number of recent studies. Then, extracting the most important latest problems and solutions that related to data security in cloud computing; and presenting them all in one study to become a comprehensive reference. The study found that the most important problems are data leakage, data remoteness, privacy and data segregation. As for the most important solutions that this paper reached to meet these challenges, were using practical strategies like models and standards, and using different emerging and programming technologies such as encryption, digital signatures, hashing, and blockchain, smart contracts, IoTs sensors and devices, edge computing, and fog computing. The study recommended researchers to conduct more theoretical and practical research on the subject, and recommended the cloud services providers to adopt several practical strategies and emerging technologies for higher protection.</p> Shuruq Zayed Al-Otaibi Copyright (c) 2022 Communications in Mathematics and Applications Thu, 25 Aug 2022 00:00:00 +0000 Real-Time Driver Drowsiness Detection System Using Dlib based on Driver Eye/Mouth Monitoring Technology <p>The driver sleepiness is common and one of the main causes of road accidents. So, there is a need for automatically detecting of this human behaviour. In any case, if the drivers feel drowsy, they still keep on driving the vehicle, and accidents occur. This study can be implemented using the CNN training model and initiating an alarm if the drowsiness condition is detected. Many of the authors suggested the process of detecting the Drowsiness (Problem Statement) of the drivers using technologies like the Internet of Things (IoT), Deep learning, and Haar cascade (to detect the coordinates of eyes and mouth, which are the target objects). However, this study contributes towards providing the real-time application in co-operating the CNN model and Dlib. Hence, this study proposes a novel embedded system with CNN technology. The CNN model is fed with inputs based on four (4) images related to eye and mouth openings and closings. This application is trained using the CNN model, which takes inputs as images and processes by identifying the features on the face using the Dlib library while representing the change in the state of coordinates of eyes and mouth as Yawning. This approach is achieved using Convolution Neural Network (CNN), pillow, Pygame, OpenCV, and the Dlib, along with providing an alarm when the position of mouth changes. The model is recorded with a maximum validation accuracy of 98% with the minimum recorded loss of less than 0.04% as areal-time application.</p> Wesam H. Al-Sabban Copyright (c) 2022 Wed, 17 Aug 2022 00:00:00 +0000 Construction of Project Management Using Information System <p>Information is playing a vital role of every concerns project management processes. The activities of organization’s project management, desires to attain an excellent flow of information. This task can be done through to build a high quality information system to that concern. This paper concentrates the present status of information systems in the function of construction project management for the huge corporation and government agencies in Saudi Arabia. The innovative conceptual model names as Information System Success (ISS) is built to obtain the barriers of information system in project constructions as well as independent variables are introduced. With the assistance of ISS model, the researcher can create a survey to verify the achievement of the information system and the autonomous variables that influence the information system within the population data. The results will explain the improvements of Saudi Arabia’s large corporation government agencies construction project. Moreover, the result indicates that the independent variables have focusing the effect of the information system such as IT infrastructure, organizational competence along with management support.</p> Khaled Mofawiz Alfawaz, Fahd Mohammed Aljedani Copyright (c) 2022 Wed, 17 Aug 2022 00:00:00 +0000