Search

Browse Subject Areas

For Authors

Submit a Proposal

Mathematics and Computer Science Volume 1

Concepts and Applications
Edited by Sharmistha Ghosh, M. Niranjanamurthy, Krishanu Deyasi, Biswadip Basu Mallik, and Santanu Das
Series: Mathematics and Computer Science
Copyright: 2023   |   Status: Published
ISBN: 9781119879671  |  Hardcover  |  
532 pages
Price: $225 USD
Add To Cart

One Line Description
This first volume in a new multi-volume set gives readers the basic concepts and applications for diverse ideas and innovations in the field of computing together with its growing interactions with mathematics.

Audience
Engineers, scientists, researchers, developers, faculty, and students in computer science and engineering, electronics, communication engineering, and information technology

Description
This new edited volume from Wiley-Scrivener is the first of its kind to present scientific and technological innovations by leading academicians, eminent researchers, and experts around the world in the areas of mathematical sciences and computing. The chapters focus on recent advances in computer science, mathematics, and where the two intersect to create value for end users through practical applications of the theory.

The chapters herein cover scientific advancements across a diversified spectrum that includes differential as well as integral equations with applications, computational fluid dynamics, nanofluids, network theory and optimization, control theory, machine learning and artificial intelligence, big data analytics, Internet of Things, cryptography, fuzzy automata, Statistics, and many more. Readers of this book will get access to diverse ideas and innovations in the field of computing together with its growing interactions in various fields of mathematics. Whether for the engineer, scientist, student, academic, or other industry professional, this is a must have for any library.

Back to Top
Author / Editor Details
Sharmistha Ghosh, PhD, is a professor at the Institute of Engineering & Management, Kolkata, India. She received her doctorate in mathematics from the Indian Institute of Technology, Kharagpur, India, and is a DAAD fellow. Her major field of study includes fuzzy and vague databases as well as computational fluid dynamics, and she has published several research papers in scientific journals. She is also the editor of several scientific journals and works as reviewer of journals as well as doctoral theses in India as well abroad.

M. Niranjanamurthy, PhD, is an assistant professor in the Department of Computer Applications, M S Ramaiah Institute of Technology, Bangalore, Karnataka. He earned his PhD in computer science at JJTU, Rajasthan, India. He has over 11 years of teaching experience and two years of industry experience as a software engineer. He has published several books, and he is working on numerous books for Scrivener Publishing. He has published over 60 papers for scholarly journals and conferences, and he is working as a reviewer in 22 scientific journals. He also has numerous awards to his credit.

Krishanu Deyasi, PhD, is an associate professor in the Department of Basic Sciences and Humanities at the Institute of Engineering & Management, Kolkata, India. He earned his PhD from the Indian Institute of Science Education and Research, Kolkata, India, and he has postdoctoral experience from The Institute of Mathematical Sciences, Chennai, India. He has written three books and has published papers in several scientific journals. He is also an editor for several scientific journals.

Biswadip Basu Mallik, is a senior assistant professor of mathematics in the Department of Basic Sciences and Humanities at the Institute of Engineering & Management, Kolkata, India. He has been involved in teaching and research for more than 21 years and has published several research papers in various scientific journals along with book chapters with various publishers. He has authored five books, edited nine books, and has five patents to his credit. He is a managing editor of the Journal of Mathematical Sciences & Computational Mathematics (JMSCM) and is an editorial board member and reviewer for several scientific journals.

Santanu Das is an assistant professor in the Department of Basic Sciences and Humanities at the Institute of Engineering & Management, Kolkata, India. He completed his undergraduate degree and post-graduate in Mathematics from Jadavpur University and is pursuing his doctorate from Jadavpur University.

Back to Top

Table of Contents
Preface
1. Error Estimation of the Function by ( ) r u, r ≥ 1 Using Product Means (E,s)(, pn, qn) n, qn) of the Conjugate Fourier Series

Aradhana Dutt Jauhari and Pankaj Tiwar
1.1 Introduction
1.1.1 Definition 1
1.1.2 Definition 2
1.1.3 Definition 3
1.2 Theorems
1.2.1 Theorem 1
1.2.2 Theorem 2
1.3 Lemmas
1.3.1 Lemma 1
1.3.2 Lemma 2
1.3.3 Lemma 3
1.4 Proof of the Theorems
1.4.1 Proof of the Theorem 1
1.4.2 Proof of the Theorem 2
1.5 Corollaries
1.5.1 Corollary 1
1.5.2 Corollary 2
1.6 Example
1.7 Conclusion
References
2. Blow Up and Decay of Solutions for a Klein-Gordon Equation With Delay and Variable Exponents
Hazal Yüksekkaya and Erhan Pişkin
2.1 Introduction
2.2 Preliminaries
2.3 Blow Up of Solutions
2.4 Decay of Solutions
Acknowledgment
References
3. Some New Inequalities Via Extended Generalized Fractional Integral Operator for Chebyshev Functional
Bhagwat R. Yewale and Deepak B. Pachpatte
3.1 Introduction
3.2 Preliminaries
3.3 Fractional Inequalities for the Chebyshev Functional
3.4 Fractional Inequalities in the Case of Extended Chebyshev Functional
3.5 Some Other Fracional Inequalities Related to the Extended Chebyshev Functional
3.6 Concluding Remark
References
4. Blow Up of the Higher-Order Kirchhoff-Type System With Logarithmic Nonlinearities
Nazlı Irkil and Erhan Pişkin
4.1 Introduction
4.2 Preliminaries
4.3 Blow Up for Problem for E (0) < d
4.4 Conclusion
References
5. Developments in Post-Quantum Cryptography
Srijita Sarkar, Saranya Kumar, Anaranya Bose and Tiyash Mukherjee
5.1 Introduction
5.2 Modern-Day Cryptography
5.2.1 Symmetric Cryptosystems
5.2.2 Asymmetric Cryptosystems
5.2.3 Attacks on Modern Cryptosystems
5.2.3.1 Known Attacks
5.2.3.2 Side-Channel Attacks
5.3 Quantum Computing
5.3.1 The Main Aspects of Quantum Computing
5.3.2 Shor’s Algorithm
5.3.3 Grover’s Algorithm
5.3.4 The Need for Post-Quantum Cryptography
5.4 Algorithms Proposed for Post-Quantum Cryptography
5.4.1 Code-Based Cryptography
5.4.2 Lattice-Based Cryptography
5.4.3 Multivariate Cryptography
5.4.4 Hash-Based Cryptography
5.4.5 Supersingular Elliptic Curve Isogeny Cryptography
5.4.6 Quantum-Resistant Symmetric Key Cryptography
5.5 Launching of the Project Called “Open Quantum Safe”
5.6 Algorithms Proposed During the NIST Standardization Procedure for Post-Quantum Cryptography
5.7 Hardware Requirements of Post-Quantum Cryptographic Algorithms
5.7.1 NTRUEncrypt
5.7.1.1 Polynomial Multiplication
5.7.1.2 Hardware to Accelerate NTRUEncrypt
5.7.2 Hardware-Software Design to Implement PCQ Algorithms
5.7.3 Implementation of Cryptographic Algorithms Using HLS
5.8 Challenges on the Way of Post-Quantum Cryptography
5.9 Post-Quantum Cryptography Versus Quantum Cryptography
5.10 Future Prospects of Post-Quantum Cryptography
References
6 .A Statistical Characterization of MCX Crude Oil Price with Regard to Persistence Behavior and Seasonal Anomaly
Anindita Bhattacharjee, Jaya Mamta Prosad and M.K. Das
6.1 Introduction
6.2 Related Literature
6.3 Data Description and Methodology
6.3.1 Data
6.3.2 Methodology
6.3.2.1 Characterizing Persistence Behavior of Crude Oil Return Time Series Using
Hurst Exponent
6.3.2.2 Zipf Plot
6.3.2.3 Seasonal Anomaly in Oil Returns
6.4 Analysis and Findings
6.4.1 Persistence Behavior of Daily Oil Stock Price
6.4.2 Detecting Seasonal Pattern in Oil Prices
6.5 Conclusion and Implications
References
Appendix
7. Some Fixed Point and Coincidence Point Results Involving Gα-Type Weakly Commuting Mappings
Krishna Kanta Sarkar, Krishnapada Das and Abhijit Pramanink
7.1 Introduction
7.2 Definitions and Mathematical Preliminaries
7.2.1 Definition: G-metric Space (G-ms)
7.2.2 Definition: t-norm
7.2.3 Definition: t-norm of Hadžić type (H-type)
7.2.4 Definition: G-fuzzy metric space (G-fms)
7.2.5 Definition
7.2.6 Lemma
7.2.7 Lemma
7.2.8 Definition
7.2.9 Definition
7.2.10 Definition: Φ-Function
7.2.11 Definition: Ψ-Function
7.2.12 Lemma
7.2.13 Definition
7.2.14 Definition
7.2.15 Definition
7.2.16 Definition
7.2.17 Definition
7.2.18 Remarks
7.2.19 Lemma
7.3 Main Results
7.3.1 Theorem
7.3.2 Theorem
7.3.3 Definition Ψ-Function
7.3.4 Theorem
7.3.5 Theorem
7.3.6 Corollary
7.3.7 Corollary
7.3.8 Example
7.3.9 Example
7.3.10 Example
7.3.11 Example
7.4 Conclusion
7.5 Open Question
References
8. Grobner Basis and Its Application in Motion of Robot Arm
Anjan Samanta
8.1 Introduction
8.1.1 Define Orderings in K[y1, ..., yn]
8.1.2 Introducing Division Rule in K[y1, ..., yn]
8.2 Hilbert Basis Theorem and Grobner Basis
8.3 Properties of Grobner Basis
8.4 Applications of Grobner Basis
8.4.1 Ideal Membership Problem
8.4.2 Solving Polynomial Equations
8.5 Application of Grobner Basis in Motion of Robot Arm
8.5.1 Geometric Elucidation of Robots
8.5.2 Mathematical Representation
8.5.3 Forward Kinematic Problem
8.5.4 Inverse Kinematic Problem
8.6 Conclusion
References
9. A Review on the Formation of Pythagorean Triplets and Expressing an Integer as a Difference of Two Perfect Squares
Souradip Roy, Tapabrata Bhattacharyya, Subhadip Roy, Souradeep Paul and Arpan Adhikary
9.1 Introduction
9.2 Calculation of Triples
9.2.1 Calculation for Odd Numbers
9.2.2 Calculation for Even Numbers
9.2.3 Code Snippet
9.2.4 Observation
9.3 Computing the Number of Primitive Triples
9.3.1 Calculation for Odd Numbers
9.3.2 Calculation for Even Numbers
9.3.3 Code Snippet
9.3.4 Observation
9.4 Representation of Integers as Difference of Two Perfect Squares
9.4.1 Calculation for Odd Numbers
9.4.2 Calculation for Even Numbers
9.4.3 Corollaries
9.4.4 Code Snippet
9.4.5 Output
9.5 Conclusion
References
10. Solution of Matrix Games With Pay‑Offs of Single-Valued Neutrosophic Numbers and Its Application to Market Share Problem
Mijanur Rahaman Seikh and Shibaji Dutta
10.1 Introduction
10.2 Preliminaries
10.3 Matrix Games With SVNN Pay-Offs and Concept of Solution
10.4 Mathematical Model Construction for SVNNMG
10.4.1 Algorithm for Solving SVNNMG
10.5 Numerical Example
10.5.1 A Market Share Problem
10.5.2 The Solution Procedure and Result Discussion
10.5.3 Analysis and Comparison of Results With Li and Nan’s Approach
10.6 Conclusion
References
11. A Novel Score Function-Based EDAS Method for the Selection of a Vacant Post of a Company with q-Rung Orthopair Fuzzy Data
Utpal Mandal and Mijanur Rahaman Seikh
11.1 Introduction
11.2 Preliminaries
11.3 A Novel Score Function of q-ROFNs
11.3.1 Some Existing q-ROF Score Functions
11.3.2 A Novel Score Function of q-ROFNs
11.4 EDAS Method for q-ROF MADM Problem
11.5 Numerical Example
11.6 Comparative Analysis
11.7 Conclusions
Acknowledgments
References
12. Complete Generalized Soft Lattice
Manju John and Susha D.
12.1 Introduction
12.2 Soft Sets and Soft Elements—Some Basic Concepts
12.3 gs-Posets and gs-Chains
12.4 Soft Isomorphism and Duality of gs-Posets
12.5 gs-Lattices and Complete gs-Lattices
12.6 s-Closure System and s-Moore Family
12.7 Complete gs-Lattices From s-Closure Systems
12.8 A Representation Theorem of a Complete gs-Lattice as an s-Closure System
12.9 gs-Lattices and Fixed Point Theorem
References
13. Data Representation and Performance in a Prediction Model
Apurbalal Senapati, Soumen Maji and Arunendu Mondal
13.1 Introduction
13.1.1 Various Methods for Predictive Modeling
13.1.2 Problem Definition
13.2 Data Description and Representations
13.3 Experiment and Result
13.4 Error Analysis
13.5 Conclusion
References
14. Video Watermarking Technique Based on Motion Frames by Using Encryption Method
Praful Saxena and Santosh Kumar
14.1 Introduction
14.2 Methodology Used
14.2.1 Discrete Wavelet Transform
14.2.2 Singular-Value Decomposition
14.3 Literature Review
14.4 Watermark Encryption
14.5 Proposed Watermarking Scheme
14.5.1 Watermark Embedding
14.5.2 Watermark Extraction
14.6 Experimental Results
14.7 Conclusion
References
15. Feature Extraction and Selection for Classification of Brain Tumors
Saswata Das
15.1 Introduction
15.2 Related Work
15.3 Methodology
15.3.1 Contrast Enhancement
15.3.2 K-Means Clustering
15.3.3 Canny Edge Detection
15.3.4 Feature Extraction
15.3.5 Feature Selection
15.3.5.1 Genetic Algorithm for Feature Selection
15.3.5.2 Particle Swarm Optimization For Feature Selection
15.4 Results
15.5 Future Scope
15.6 Conclusion
References
16. Student’s Self-Esteem on the Self-Learning Module in Mathematics 6
Ariel Gulla Villar and Biswadip Basu Mallik
16.1 Introduction
16.1.1 Research Questions
16.1.2 Scope and Limitation
16.1.3 Significance of the Study
16.2 Methodology
16.2.1 Research Design
16.2.2 Respondents of the Study
16.2.3 Sampling Procedure
16.2.4 Locale of the Study
16.2.5 Data Collection
16.2.6 Instrument of the Study
16.2.7 Validation of Instrument
16.3 Results and Discussion
16.4 Conclusion
16.5 Recommendation
References
17. Effects on Porous Nanofluid due to Internal Heat Generation and Homogeneous Chemical Reaction
Hiranmoy Mondal and Sharmistha Ghosh
Nomenclature
17.1 Introduction
17.2 Mathematical Formulations
17.3 Method of Local Nonsimilarity
17.4 Results and Discussions
17.5 Concluding Remarks
References
18. Numerical Solution of Partial Differential Equations: Finite Difference Method
Roushan Kumar, Rakhi Tiwari and Rashmi Prasad
18.1 Introduction
18.2 Finite Difference Method
18.2.1 Finite Difference Approximations to Derivatives
18.2.2 Discretization of Domain
18.2.3 Difference Scheme of Partial Differential Equation
18.3 Multilevel Explicit Difference Schemes
18.4 Two-Level Implicit Scheme
18.5 Conclusion
References
19. Godel Code Enciphering for QKD Protocol Using DNA Mapping
Partha Sarathi Goswami and Tamal Chakraborty
19.1 Introduction
19.2 Related Work
19.3 The DNA Code Set
19.4 Godel Code
19.5 Key Exchange Protocol
19.6 Encoding and Decoding of the Plain Text—The QKD Protocol
19.6.1 Plain Text to Encoded Text and Vice-Versa
19.6.2 The Proposed Message Passing Scheme
19.6.3 Illustration
19.7 Experimental Setup
19.8 Detection Probability and Dark Counts
19.9 Security Analysis of Our Algorithm
19.10 Conclusion
References
20. Predictive Analysis of Stock Prices Through Scikit-Learn: Machine Learning in Python
Vikash Kumar Mishra, Richa Binyala, Pratibha Sharma and Simran Singh
20.1 Introduction
20.2 Study Area and Dataset
20.3 Methodology
20.4 Results
20.5 Conclusion
References
21. Pose Estimation Using Machine Learning and Feature Extraction
J. Palanimeera and K. Ponmozhi
21.1 Introduction
21.2 Related Work
21.3 Proposed Work
21.3.1 Yoga Posture Identification
21.3.1.1 Deep Extraction of a Normal Image
21.3.1.2 Human Joints Identification
21.3.1.3 Extraction of L-DoD Features
21.3.1.4 Extraction of D-GoD Features
21.3.2 The Random Forest Classifier’s Design
21.3.2.1 Construction of a Random Forest Model
21.3.2.2 Random Forest Two-Way Voting
21.3.3 Joint Positioning in Humans
21.4 Outcome and Discussion
21.5 Conclusion
References
22. E-Commerce Data Analytics Using Web Scraping
Vikash Kumar Mishra, Bosco Paul Alapatt, Aaditya Aggarwal and Divya Khemani
22.1 Introduction
22.1.1 Uses of Web Scraping
22.2 Research Objective
22.3 Literature Review
22.4 Feasibility and Application
22.4.1 Web Scrapers Process
22.5 Proposed Methodology
22.5.1 Coding Phase
22.5.2 Spreadsheet Analysis and Results
22.6 Conclusion
References
23. A New Language-Generating Mechanism of SNPSSP
Prithwineel Paul, Soumadip Ghosh and Anjan Pal
23.1 Introduction
23.2 Spiking Neural P Systems With Structural Plasticity (SNPSSP)
23.3 Labeled SNPSSP (LSNPSSP)
23.3.1 Working of LSNPSSP
23.4 Main Results
23.5 Conclusion
References
24. Performance Analysis and Interpretation Using Data Visualization
Vikash Kumar Mishra, Iyyappan, M., Muskan Soni and Neha Jain
24.1 Introduction
24.2 Selecting Data Set
24.3 Proposed Methodology
24.4 Results
24.5 Conclusion
References
25. Dealing with Missing Values in a Relation Dataset Using the DROPNA Function in Python
Vikash Kumar Mishra, Shoney Sebastian, Maria Iqbal and Yashwin Anand
25.1 Introduction
25.2 Background
25.3 Study Area and Data Set
25.4 Methodology
25.5 Results
25.6 Conclusion
25.7 Acknowledgment
References
26. A Dynamic Review of the Literature on Blockchain-Based Logistics Management
C. Devi Parameswari and M. Ilayaraja
26.1 Introduction
26.2 Blockchain Concepts and Framework
26.3 Study of the Literature
26.3.1 Blockchain Technology and Supply Chain Trust
26.4 Challenges and Processes of Supply Chain Transparency
26.4.1 Motivation for Transparency in Data
26.5 Challenges in Security
26.6 Discussion: In Terms of Supply Chain Dynamics, Blockchain Technology and Supply Chain Integration
26.7 Conclusion
Acknowledgment
References
27. Prediction of Seasonal Aliments Using Big Data: A Case Study
K. Indhumathi and K. Sathesh Kumar
27.1 Introduction
27.2 Related Works
27.3 Conclusion
References
28. Implementation of Tokenization in Natural Language Processing Using NLTK Module of Python
Vikash Kumar Mishra, Abhimanyu Dhyani, Sushree Barik and Tanish Gupta
28.1 Introduction
28.2 Background
28.3 Study Area and Data Set
28.4 Proposed Methodology
28.5 Result
28.6 Conclusion
28.7 Acknowledgment
Conflicts of Interest/Competing Interests
Availability of Data and Material
References
29. Application of Nanofluids in Heat Exchanger and its Computational Fluid Dynamics
M. Appadurai, E. Fantin Irudaya Raj and M. Chithambara Thanu
29.1 Computational Fluid Dynamics
29.1.1 Continuity Equation
29.1.2 Momentum Equation
29.1.3 Energy Equation
29.1.4 Equations for Turbulent Flows
29.2 Nanofluids
29.2.1 Viscosity
29.2.2 Density
29.2.3 Heat Capacity
29.2.4 Thermal Conductivity
29.3 Preparation of Nanofluids
29.3.1 One-Step Method
29.3.2 Two-Step Method
29.3.3 Nanofluids Implementation in Heat Exchanger
29.4 Use of Computational Fluid Dynamics for Nanofluids
29.5 CFD Approach to Solve Heat Exchanger
29.6 Conclusion
References
About the Editors
Index


Back to Top



Description
Author/Editor Details
Table of Contents
Bookmark this page