Mathematics and Computer Science, Volume 2

Book description

MATHEMATICS AND COMPUTER SCIENCE

This second volume in a new multi-volume set builds on the basic concepts and fundamentals laid out in the previous volume, presenting the reader with more advanced and cutting-edge topics being developed in this exciting field.

This second volume in a new series from Wiley-Scrivener is the first of its kind to present scientific and technological innovations by leading academicians, eminent researchers, and experts around the world in the areas of mathematical sciences and computing. Building on what was presented in volume one, the chapters focus on more advanced topics in computer science, mathematics, and where the two intersect to create value for end users through practical applications.

The chapters herein cover scientific advancements across a diversified spectrum that includes differential as well as integral equations with applications, computational fluid dynamics, nanofluids, network theory and optimization, control theory, machine learning and artificial intelligence, big data analytics, Internet of Things, cryptography, fuzzy automata, statistics, and many more. Readers of this book will get access to diverse ideas and innovations in the field of computing together with its growing interactions in various fields of mathematics. Whether for the engineer, scientist, student, academic, or other industry professional, this is a must-have for any library.

Table of contents

  1. Cover
  2. Series Page
  3. Title Page
  4. Copyright Page
  5. Preface
  6. 1 A Comprehensive Review on Text Classification and Text Mining Techniques Using Spam Dataset Detection
    1. 1.1 Introduction
    2. 1.2 Text Mining Techniques
    3. 1.3 Dataset and Preprocessing Steps
    4. 1.4 Feature Extraction
    5. 1.5 Supervised Machine Learning Classification
    6. 1.6 Evaluation
    7. 1.7 Experimentation and Discussion Results for Spam Detection Data
    8. 1.8 Text Mining Applications
    9. 1.9 Text Classification Support
    10. 1.10 Conclusions
    11. References
  7. 2 Study of Lidar Signals of the Atmospheric Boundary Layer Using Statistical Technique
    1. 2.1 Introduction
    2. 2.2 Methodology
    3. 2.3 Mathematical Background of Method
    4. 2.4 Example and Result
    5. 2.5 Conclusion and Future Scope
    6. Acknowledgement
    7. References
    8. Annexure
  8. 3 Optimal Personalized Therapies in Colon Cancer Induced Immune Response using a Fokker-Planck Framework
    1. 3.1 Introduction
    2. 3.2 The Control Framework Based on Fokker-Planck Equations
    3. 3.3 Theoretical Results
    4. 3.4 Numerical Schemes
    5. 3.5 Results
    6. 3.6 Conclusion
    7. Acknowledgments
    8. References
  9. 4 Detection and Classification of Leaf Blast Disease using Decision Tree Algorithm in Rice Crop
    1. 4.1 Introduction
    2. 4.2 Proposed Methodology
    3. 4.3 Result Analysis
    4. 4.4 Conclusion
    5. 4.5 Future Work
    6. References
  10. 5 Novel Hybrid Optimal Deep Network and Optimization Approach for Human Face Emotion Recognition
    1. 5.1 Introduction
    2. 5.2 Related Work
    3. 5.3 System Model and Problem Statement
    4. 5.4 Proposed Model
    5. 5.5 Proposed HDC-GEN Classification
    6. 5.6 Result and Discussion
    7. 5.7 Conclusion
    8. References
  11. 6 An Application of Information Technology in Adaptive Leadership of Ministry of Ayush During Pandemic of Covid 19: A Case Study
    1. 6.1 Introduction
    2. 6.2 Ministry of AYUSH
    3. 6.3 Leadership Principles and Practices by Ministry of AYUSH During Covid-19
    4. 6.4 Effective Communication
    5. 6.5 Sharing of Resources
    6. 6.6 Shared Decision Making
    7. 6.7 Training of Manpower
    8. 6.8 Use of IT Platform
    9. 6.9 Finding Opportunities for R&D During the Crisis
    10. 6.10 Collaborating with Stakeholders for International Day of Yoga (IDY)
    11. 6.11 Providing Hope When Nothing Seemed to be Working
    12. 6.12 Leveraging Old Knowledge
    13. 6.13 Conclusion
    14. References
  12. 7 Encoder-Decoder Models for Protein Secondary Structure Prediction
    1. 7.1 Introduction
    2. 7.2 Literature Review
    3. 7.3 Experimental Work
    4. 7.4 Results and Discussion
    5. 7.5 Conclusion
    6. References
  13. 8 Hesitancy, Awareness, and Vaccination: A Computational Analysis on Complex Networks
    1. 8.1 Introduction
    2. 8.2 Model Formulation
    3. 8.3 Model Analysis on Complex Network
    4. 8.4 Conclusions and Perspectives
    5. References
  14. 9 Propagation of Seismic Waves in Porous Thermoelastic Semi-Infinite Space with Impedance Boundary Conditions
    1. 9.1 Introduction
    2. 9.2 Basic Equations
    3. 9.3 Problem Formulation
    4. 9.4 Reflection at the Free Surface
    5. 9.5 Numerical Results and Discussion
    6. 9.6 Conclusion
    7. References
  15. 10 IoT Based Ensemble Predictive Techniques to Determine the Student Observing Analysis through E-Learning
    1. 10.1 Introduction
    2. 10.2 Review of Literature
    3. 10.3 Methodology
    4. 10.4 Analysis and Interpretation
    5. 10.5 Findings and Conclusion
    6. References
  16. 11 Modelling and Analysis of a Congestion Dependent Queue with Bernoulli Scheduled Vacation Interruption and Client Impatience
    1. 11.1 Introduction
    2. 11.2 Model Overview
    3. 11.3 Model Analysis
    4. 11.4 Special Cases
    5. 11.5 Performance Metrics
    6. 11.6 Numerical Outcomes
    7. 11.7 Conclusion
    8. References
  17. 12 Resource Allocation Determines Alternate Cell Fate in Bistable Genetic Switch
    1. 12.1 Introduction
    2. 12.2 Model Formulation
    3. 12.3 Result Section
    4. 12.4 Conclusion
    5. Acknowledgement
    6. References
  18. 13 A Hybrid Approach to Ontology Evaluation
    1. 13.1 Introduction
    2. 13.2 Background
    3. 13.3 The Developed OntoEva Method
    4. 13.4 Ontology Selection for Epilepsy Disorder
    5. 13.5 Results
    6. 13.6 Comparison of Ontologies
    7. 13.7 Conclusion
    8. References
  19. 14 Smart Health Care Waste Segregation and Safe Disposal
    1. 14.1 Introduction
    2. 14.2 Related Works
    3. 14.3 System Architecture
    4. 14.4 Methodology
    5. 14.5 Mobile App
    6. 14.6 Conclusions and Future Works Declarations
    7. Declarations
    8. References
  20. 15 Investigation of Viscoelastic Magnetohydrodynamics (MHD) Flow Over an Expanded Lamina Surrounded in a Permeable Media
    1. 15.1 Introduction
    2. 15.2 Formulation of the Problem
    3. 15.3 Result and Argument
    4. 15.4 Conclusion
    5. References
  21. 16 Quickest Multi-Commodity Contraflow with Non-Symmetric Traversal Times
    1. 16.1 Introduction
    2. 16.2 Preliminaries with Flow Models
    3. 16.3 QMCCF with Non-Symmetric Transit Times
    4. 16.4 Conclusions
    5. Acknowledgments
    6. References
  22. 17 A Mathematical Representation for Deteriorating Goods with a Trapezoidal-Type Demand, Shortages and Time Dependent Holding Cost
    1. 17.1 Introduction
    2. 17.2 Assumptions and Notations
    3. 17.3 Formulation and Solution
    4. 17.4 Numerical Example
    5. 17.5 Discussion
    6. 17.6 Inference
    7. References
  23. 18 An Amended Moth Flame Optimization Algorithm Based on Fibonacci Search Approach for Solving Engineering Design Problems
    1. 18.1 Introduction
    2. 18.2 Classical MFO Algorithm
    3. 18.3 Proposed Method
    4. 18.4 Results and Discussions on IEEE CEC 2019 Benchmark Problems
    5. 18.5 Real-Life Applications
    6. 18.6 Conclusion with Future Studies
    7. References
  24. 19 Image Segmentation of Neuronal Cell with Ensemble Unet Architecture
    1. 19.1 Introduction
    2. 19.2 Methods
    3. 19.3 Dataset
    4. 19.4 Implementation Details
    5. 19.5 Evaluation Metrics
    6. 19.6 Result
    7. 19.7 Conclusion
    8. References
  25. 20 Automorphisms of Some Non-Abelian p−Groups of Order p4
    1. 20.1 Introduction
    2. 20.2 Categorization of p-Groups with Order p4
    3. 20.3 Number of Automorphisms of Some Non-Abelian Groups of Order p4
    4. References
  26. 21 Viscoelastic Equation of p-Laplacian Hyperbolic Type with Logarithmic Source Term
    1. 21.1 Introduction
    2. 21.2 Preliminaries
    3. 21.3 Global Existence Result
    4. 21.4 Blow Up Results of the Solution for Equation (21.1)
    5. References
  27. 22 Flow Dynamics in Continuous-Time with Average Arc Capacities 327
    1. 22.1 Introduction
    2. 22.2 Literature Review
    3. 22.3 Failure in Extension of AP to AAP
    4. 22.4 Formulation
    5. 22.5 Conclusion
    6. Acknowledgment
    7. References
  28. 23 Analysis of a Multiserver System of Queue-Dependent Channel Using Genetic Algorithm
    1. 23.1 Introduction
    2. 23.2 Description of the Model
    3. 23.3 Notations
    4. 23.4 Steady State Equations
    5. 23.5 Conclusions
    6. References
  29. 24 An Approach to Ranking of Single Valued Neutrosophic Fuzzy Numbers Based on (α, β, γ) Cut Sets
    1. 24.1 Introduction
    2. 24.2 Definition and Representations
    3. 24.3 Proposed Method
    4. 24.4 Theorems
    5. 24.5 Numerical Examples
    6. 24.6 Conclusion
    7. References
  30. 25 Performance Analysis of Database Models Based on Fuzzy and Vague Sets for Uncertain Query Processing
    1. 25.1 Introduction
    2. 25.2 Basic Definitions
    3. 25.3 Algorithm to Generate Membership Values
    4. 25.4 Real Life Applications
    5. 25.5 Conclusion
    6. References
  31. 26 Estimating Error of Signals by Product Means (C, 2) of the Fourier Series in a W(Lr, ξ (t))(r ≥ 1) Class
    1. 26.1 Introduction
    2. 26.2 Known Result
    3. 26.3 Main Theorem
    4. 26.4 Some Auxiliary Results
    5. 26.5 Theorem’s Proof
    6. 26.6 Applications
    7. 26.7 Conclusion
    8. Acknowledgement
    9. References
  32. About the Editors
  33. Index
  34. Also of Interest
  35. End User License Agreement

Product information

  • Title: Mathematics and Computer Science, Volume 2
  • Author(s): Sharmistha Ghosh, M. Niranjanamurthy, Krishanu Deyasi, Biswadip Basu Mallik, Santanu Das
  • Release date: August 2023
  • Publisher(s): Wiley-Scrivener
  • ISBN: 9781119896326