Natural & Applied Sciences

Natural & Applied Sciences Research Papers/Topics

The exponentiated odd weibull-topp-leone-g family of distributions: model, properties and applications

Abstract: In this paper, a new generalized family of distributions called the exponentiated odd Weibull-Topp-Leone-G (EOW-TL-G) family of distributions is presented. A linear representation of the proposed model is also presented. A simulation study to examine the consistency of the maximum likelihood estimates is conducted. Usefulness of the new proposed model was assessed by means of applications to two real data examples.

Split equality variational inequality problems for pseudomonotone mappings in Banach spaces

Abstract: A new algorithm for approximating solutions of the split equality variational inequality problems (SEVIP) for pseudomonotone mappings in the setting of Banach spaces is introduced. Strong convergence of the sequence generated by the proposed algorithm to a solution of the SEVIP is then derived without assuming the Lipschitz continuity of the underlying mappings and without prior knowledge of operator norms of the bounded linear operators involved. In addition, we provide several ap...

A general split fixed point problem governed by demicontractive mappings in Banach spaces

Abstract: In this paper, we introduce an iterative process, which converges strongly to the solution of a general split fixed point problem governed by demicontractive mappings and prove strong convergence theorems in Banach spaces.

A Mathematical model of contact tracing during the 2014–2016 West African Ebola outbreak

Abstract: The 2014–2016 West African outbreak of Ebola Virus Disease (EVD) was the largest and most deadly to date. Contact tracing, following up those who may have been infected through contact with an infected individual to prevent secondary spread, plays a vital role in controlling such outbreaks. Our aim in this work was to mechanistically represent the contact tracing process to illustrate potential areas of improvement in managing contact tracing efforts. We also explored the role co...

Reference frame independent twin field quantum key distribution with source flaws

Abstract: The trade-off between distance and secret key generation rate remains one of the major challenges in the practical implementation of quantum key distribution (QKD). As a solution, a twin field QKD protocol was proposed by Lucamarini et al (2018) to address this challenge. In this protocol, the achievable secret key rate scales with the square root of channel transmittance and can surpass the secret key capacity for repeaterless QKD. However, the protocol exploits phase to encode in...

Antibacterial activity of 2-Picolyl-polypyridyl-based Ruthenium (II/III) complexes on non-drug-resistant and drug-resistant bacteria

Abstract: A new hexadentate 2-picolyl-polypyridyl-based ligand (4, 4’-(butane-1, 4-diylbis(oxy))bis(N, N-bis(pyridin-2-ylmethyl)aniline)) (2BUT) (1) and its corresponding Ru(II/III) complexes were synthesized and characterized, followed by assessment of their possible bioactive properties towards drug-resistant and non-drug-resistant bacteria. Spectroscopic characterization of the ligand was done using proton NMR, FTIR, and ESI-MS, which showed that the ligand was successfully synthesized....

The split equality fixed point problem for quasi-pseudo-contractive mappings without prior knowledge of norms

Abstract: Recently, Chang et al. (2015) constructed an algorithm that converges weakly to the solution of the split equality fixed point problem for quasi-pseudo-contractive mappings under some suitable conditions. They also showed that strong convergence is obtained in the case when the quasi-pseudo-contractive mappings are semi-compact. In this article, we construct an algorithm for quasi-pseudo-contractive mappings that always converge strongly to some solution of the split equality fixed...

An innovative microwave-assisted one-step green synthetic approach of biowaste derived fluorescent carbon-dot invisible ink for currency anti-counterfeiting applications

Abstract: The quest for the design and synthesis of carbon dots with anti-counterfeit properties that are derived via green, environmentally friendly and economical procedures is a continuous process. Carbon dots (C-dots) derived from biowaste are cheap to synthesize, possess good photo-stabilityand high synthetic yield, making them applicable in the anti-counterfeiting of currency. Herein, we report a novel eco-friendly, cheaper, and faster method for the synthesis of carbon dots with stron...

Processing and characterization of a sorghum stem-based fibre polymer composite for building insulation application

Abstract: Agricultural residue-based fibrous (ARF) materials have been identified to be a commercially viable solution for energy-efficient building insulation application. ARFs have various advantages over synthetic fibers including environmentally friendly, light weight, low cost, and competent mechanical properties. Meanwhile, in many African countries including Botswana, the expertise to manufacture building insulators by using ARFs is scarce and consequently building insulation material...

Face Recognition Using Dual Tree Complex Wavelet Transform

Abstract: We propose a novel face recognition using Dual Tree Complex Wavelet Transform (DTCWT), which is used to extract features from face images. The Complex Wavelet Transform is a tool that uses a dual tree of wavelet filters to find the real and imaginary parts of complex wavelet coefficients. The DT-CWT is, however, less redundant and computationally efficient. CWT is a relatively recent enhancement to the discrete wavelet transform (DWT). We show that it is a well-suited basis for thi...

Different Data Mining Algorithms: a Performance Analysis

Abstract: Data mining (also called knowledge discovery in databases) represents the process of extracting interesting and previously unknown knowledge (patterns) from data. By applying artificial intelligence together with analytical methods data can be extracted. An association rule expresses the dependence of a set of attribute-value pairs, called items, upon another set of items (item set). . The association rule mining algorithms can be classified into two main groups: the level-wise alg...

GNP-Based Fuzzy Class-Association Rule Mining in IDS

Abstract: As the Internet services spread all over the world, many kinds of security threats are increasing. Therefore, existing Intrusion Detection Systems (IDS) facing very serious issue for the Internet users for their day to day online transactions, like Internet banking, online shopping, foreign exchange and trading stocks. Genetic Algorithm is used to identify various attacks on different type of connections. This algorithm takes into consideration of different features in network conn...

Analysis and optimization of auto-correlation based frequency offset estimation

Abstract: In this letter, a general auto-correlation based frequency offset estimation (FOE) algorithm is analyzed. An approximate closed-form expression for the Mean Square Error (MSE) of the FOE is obtained, and it is proved that, given training symbols of fixed length N, choosing the number of summations in the auto-correlation to be 〈N/3〉 and the correlation distance to be 〈2N/3〉 is optimal in that it minimizes the MSE. Simulation results are provided to validate the analysis and...

Image compression techniques in wireless sensor networks: a survey and comparison

Abstract: There is continuous intensive research on image compression techniques in wireless sensor networks (WSNs) in the literature. Some of the image compression techniques in WSNs that exist in the literature include discrete cosine transform (DCT), discrete waveform transforms (DWT), set partitioning in a hierarchical tree (SPIHT), and embedded zero tree wavelet (EZW) coding. Research on image compression in WSNs is necessitated by the need to improve the energy efficiency of sensor nod...

A phytolith supported biosphere-hydrosphere predictive model for southern Ethiopia: insights into paleoenvironmental changes and human landscape preferences since the last glacial maximum

Abstract: During the past 25 ka, southern Ethiopia has undergone tremendous climatic changes, from dry and relatively cold during the Last Glacial Maximum (LGM, 25–18 ka) to the African Humid Period (AHP, 15–5 ka), and back to present-day dry conditions. As a contribution to better understand the effects of climate change on vegetation and lakes, we here present a new Predictive Vegetation Model that is linked with a Lake Balance Model and available vegetation-proxy records from southern...


136 - 150 Of 7969 Results