ASPG Menu
search

American Scientific Publishing Group

Research Feed

Found 3831 matches for "All Articles"

NeutroAlgebra is a Generalization of Partial Algebra

In this paper we recall, improve, and extend several definitions, properties and applications of our previous 2019 research referred to NeutroAlgebras and AntiAlgebras (also called NeutroAlgebraic Structures and respectively AntiAlgebraic Structures).  Let <A> be an item (concept, attribute, idea, proposition, theory, etc.). Through the process of neutrosphication, we split the nonempty space we work on into three regions {two opposite ones corresponding to <A> and <antiA>, and one corresponding to neutral (indeterminate) <neutA> (also denoted <neutroA>) between the opposites}, which may or may not be disjoint – depending on the application, but they are exhaustive (their union equals the whole space).  A NeutroAlgebra is an algebra which has at least one NeutroOperation or one NeutroAxiom (axiom that is true for some elements, indeterminate for other elements, and false for the other elements). A Partial Algebra is an algebra that has at least one Partial Operation, and all its Axioms are classical (i.e. axioms true for all elements). Through a theorem we prove that NeutroAlgebra is a generalization of Partial Algebra, and we give examples of NeutroAlgebras that are not Partial Algebras. We also introduce the NeutroFunction (and NeutroOperation).  

groups
Florentin Smarandache mail
link https://doi.org/10.54216/IJNS.020103

Volume & Issue

Vol. Volume 2 / Iss. Issue 1

Details open_in_new

Triangular Neutrosophic-based EOQ model for non-Instantaneous Deteriorating Item under Shortages

In this paper, we applied the concept of triangular Neutrosophic number from a special viewpoint. Additionally, we utilized specific varieties of linear triangular Neutrosophic numbers and de-neutrosofication idea which could be very critical for uncertainty concept. Here, an EOQ model has been developed for a linearly dependent demand of non-instantaneous items under shortages. The paper considers holding cost as triangular neutrosophic number (TNN) and optimizes the model. A comparative study is done under crisps and neutrosophic domain and the model gives better result under the later domain. This noble notion will assist us to resolve a plethora of realistic existence problems in neutrosophic area.

groups
Shilpi Pal mail -
Avishek Chakraborty mail
link https://doi.org/10.54216/AJBOR.010103

Volume & Issue

Vol. Volume 1 / Iss. Issue 1

Details open_in_new

Uncertainty: two probabilities for the three states of neutrosophy

Uncertainty is inherent to the real world: everything is only probable, precision like in measurements is finite, noise is everywhere... Also, science is based on a modeling of reality that can only be approximate. Therefore we postulate that uncertainty should be considered in our models, and for making this more easy we propose a simple operational conceptualization of uncertainty. Starting from the simple model of associating a probability p to a statement supposed to be true our proposed modeling bridges the gap towards the most complex representation proposed by neutrosophy as a triplet of probabilities. The neutrosophic representation consists in using a triplet of probabilities (t,i,f)  instead of just a single probability. In this triplet, t represents the probability of the statement to be true, and f it's the probability to be false. The specific point of neutrosophy it that the probability i represents  the probability of the statement to be uncertain, imprecise, or neutral among other significations according to the application. Our proposed representation uses only 2 probabilities instead of 3, and it can be easily translated into the neutrosophic representation. By being simpler we renounce to some power of representing the uncertain but we encourage the modeling of uncertainty (instead of ignoring it) by making this simpler. Briefly said, the prepare the path towards using neutrosophy. Our proposed representation of uncertainty consist, for a statement, not only to add its probability to be true p, but also a second probability pp to model the confidence we have in the first probability p. This second parameter pp represents the plausibility of p, therefore the opposite of its uncertainty. This is the confidence given to the value of p, in short pp is the probability of p (hence the name pp), This is simple to understand, and that allows calculations of combined events using classical probability such as based on the concepts of mean and variance. The stringent advantage of our modeling by the couple (p,pp) is that experts can be easily interrogated to provide their expertise by asking them simply the chance they give to an event a occur (this is p) and the confidence they have in that prediction (which is pp). We give also a formula to transform from our model to the neutrosophic representation. Finally, a short discussion on the entropy as a measure of uncertainty is done.  

groups
Philippe Schweizer mail
link https://doi.org/10.54216/IJNS.020104

Volume & Issue

Vol. Volume 2 / Iss. Issue 1

Details open_in_new

Implementation of Crowd Sale using ERC-20 Tokens

The paper aims at creating ERC-20 Token and crowd sale step-by-step with Ethereum smart contracts. In the process, it focuses on testing the smart contracts, deploying the smart contracts to the Ethereum blockchain, and building an ICO website deployed to the web for the buying and selling of the tokens. The Ethereum blockchain provides a platform for creating our cryptocurrency, or tokens that can be purchased via Ether which is the native cryptocurrency of the Ethereum blockchain. ERC-20 is a standard document that specifies the behavior of the tokens so that they are compatible with other platforms like cryptocurrency exchanges. We used Ethereum which is a blockchain like Bitcoin. We created a token called "Token" and there are 100,000,000 such tokens. Firstly, the token smart contract keeps track of some token attributes which are basic. It also keeps track of who owns "My Token" and how much. ERC-20 tokens can be used as a payment just, just like any other cryptocurrency, from one account to another. They can also be purchased in a crowd sale, like an ICO. 

groups
Ashish Sharma mail -
Yogesh Sharma mail -
Radhika Bansal mail -
Sushant Verma mail
link https://doi.org/10.54216/JCIM.020101

Volume & Issue

Vol. Volume 2 / Iss. Issue 1

Details open_in_new

Energy Efficiency Techniques in Heterogeneous Networks

According to the present data 0.5% of global energy is consumed by wireless networks. Energy efficiency is required for the environment and to lower the network operational cost. In this paper, we are about to discuss various methods of energy conservation in the heterogeneous cellular network. Energy consumption is reduced by self-organization algorithm and message passing algorithm by switching off-peak Base station controllers (BSC). Along with the increasing demands for cellular networks, the various problems for energy conservation in cellular networking have also increased. There are various models present which help in increasing the energy efficiency of cellular networking such as the Novel power consumption model and refined power consumption model. Also, an increase in the higher performance of cellular networks leads to an increase in energy consumption. In this paper, we are about to discuss various challenges which are faces for increasing energy efficiency and their solution.

groups
Ashish Sharma mail -
Sandeep Tayal mail -
Radhika Bansal mail -
Sushant Verma mail
link https://doi.org/10.54216/JCIM.020102

Volume & Issue

Vol. Volume 2 / Iss. Issue 1

Details open_in_new

Empirical Study of Function Point Analysis during Software Development Phase

During the development of the software, Software Requirement Changes (SRC) often occurs. Software estimation helps in maintaining a balance between the increase and decrease of the price, time, etc. Function Point Analysis (FPA) is a software effort estimation technique used for measuring the size and complexity of software by calculating the functionality from a user's point of view. Function count focuses on what functionality is being delivered. It enables programmers to perform function point counting themselves instead of contacting an expert. An empirical study has been conducted to analyze the capability of the FPA technique. The results of the FPA-SDP (Function Point Analysis for Software Development Phase) model can help software project managers in (i) knowing the inconsistent states of software artifacts (ii) estimating the actual size of a change request with its complexity level for the software development phase. 

groups
Ashish Sharma mail -
Yogesh Sharma mail -
Radhika Bansal mail -
Sushant Verma mail
link https://doi.org/10.54216/JCIM.020103

Volume & Issue

Vol. Volume 2 / Iss. Issue 1

Details open_in_new

A Validation Model for ERP systems

ERP system became one of the main infrastructures for the organizations and manufacturing industry for the facilities it provides such as the integration between all the organization system which make the control of all the available resource easy, fast and controlled, implementation the ERP system is not an easy issue, many projects has been failed for many reasons; lack of knowledge, Requirements inconsistency, incompleteness and uncertainty, in this paper, a propose for a new method to solve the implementation based on the knowledge base which saves all the knowledge about the ERP system Modules and the new part developed to satisfy customers’ requirements not available in the existing modules.  In the same time, this work proposed a new validation method for the proposed method to ensure its validity.

groups
Nada M. Alhakkak mail
link https://doi.org/10.54216/JCIM.020104

Volume & Issue

Vol. Volume 2 / Iss. Issue 1

Details open_in_new

Energy efficient Laser based embedded system for blind turn traffic control

The usage of embedded system in the traffic control unit is not new. Many advanced intelligent systems are being used to reduce the human effort, and wasting time. As a result, road congestion and accident rate are being decreased. But in some critical spots like blind turn in the hill areas where the turn is too much sharp that it’s impossible to identify the existence of coming vehicles and the result may be very dangerous which need to be improved more with advance traffic controlling system. In this paper, we are going to propose a laser based embedded system which can efficiently control the traffic in the blind turn areas through giving proper signals in any situation. A driver can easily identify both the types and numbers of the vehicles coming from the other side by getting signals from the signal terminal. The proposed system is flexible and cost effective so that it can play a vital role by being widely used in the near future.

groups
Deepak Prashar mail -
Gouri Shankar Chakraborty mail -
Sudan Jha mail
link https://doi.org/10.54216/JCIM.020201

Volume & Issue

Vol. Volume 2 / Iss. Issue 2

Details open_in_new

Mindful Horizons: Navigating the Future Challenges and Potential Threats of Brain-Computer Interfaces (BCIS)

One example of a cutting-edge technology that is opening up new channels for human-machine connection is brain-computer interfaces, or BCIs. From keyboards and mice to touchscreens, voice commands, and gesture engagements, communication interfaces have evolved over time. New methods of controlling computer systems and engaging with virtual worlds have gained appeal as computers become more and more ingrained in daily life. These innovative applications range from gaming to teaching. It's important to handle ethical, privacy, and security issues related to developing and applying Brain-Computer Interface (BCI) technology from a balanced standpoint. Susceptible brain signals must be gathered and interpreted for BCI devices. Unauthorized access to this material carries the risk of compromising privacy by disclosing private thoughts, feelings, or other sensitive information. The initial areas of brain-computer interface (BCI) applications were based on EEG and created for medical use, hoping to help patients get back to their regular lives. Beyond the original purpose, EEG-based BCI applications have become more and more important in the non-medical field, helping healthy individuals live better lives by becoming more productive, collaborative, and self-developing, for example.

groups
Bushra Khatoon Zaidi mail -
Meena Chaudhary mail -
Javed Wasim mail -
Prabhat Kumar Srivastava mail -
Aditi Sharma mail -
Atifa Arshad mail
link https://doi.org/10.54216/JISIoT.140103

Volume & Issue

Vol. Volume 14 / Iss. Issue 1

Details open_in_new

A novel approach for Spam Email Filtering Using Machine Learning

Spam emails also known as unsolicited emails (maybe commercial or maybe not) i.e. those mails which are sent without our request or concern. Email spam is the practice of sending unwanted emails, mostly contains commercial messages to randomly generated persons. In the internet email spam is widespread because of such low cost of sending emails other than any other means of communication. It is important to filter spam emails because most of the malicious activities performed in the internet done through email spamming. Though there are many spam filters are available we still get huge amount of spam emails. This is not because the filters are not accurate & effective; the reason is the generation of quick and effective counters of the algorithm used in the filters. In our project we used mainly three supervised learning algorithms namely Linear SVC, Multinomial NB, and k-NN to implement the filter. We used these algorithms to train the system about spam email by using the feature called word count vector which is generated by processing a dataset filled with existing emails containing both spam and legitimate emails. The full process of the project and the result of the execution by implementing the three models/algorithms are discussed.

groups
Subhalaxmi Sahoo mail -
Sudan Jha mail -
Deepak Prashar mail
link https://doi.org/10.54216/JCIM.020202

Volume & Issue

Vol. Volume 2 / Iss. Issue 2

Details open_in_new