Forthcoming and Online First Articles

International Journal of Computing Science and Mathematics

International Journal of Computing Science and Mathematics (IJCSM)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

International Journal of Computing Science and Mathematics (7 papers in press)

Regular Issues

  • Stability and bifurcation study of interaction in the vermi filtration phase between predators and prey   Order a copy of this article
    by Madhan Kumar, Mullai Murugappan 
    Abstract: The issue of waste water disposal that poses a major challenge especially in the industrial sector is discussed in this article. Vermifiltration is used to transform toxic waste to non-hazardous waste. Our focus is on the survival of living organisms which is involved in the process of vermifiltration. We formulate and build a prey predator model with stage structure for the predator population. Model equilibria are observed and studied. The proposed model is expanded by incorporating time delays in the model. The global stability (with and without delay) of the model is discussed in detail. Our findings show that the increase in the density mortality rate of the predator maintains the equilibrium to a certain degree and Hopf bifurcation occurs in the model beyond this. The system exhibits oscillatory behavior when the gestation time delay reaches the threshold level. Further, computational simulations are demonstrated and biological explanations are provided.
    Keywords: vermifiltration; prey-predator; time delay; equilibria; stability; Hopf bifurcation.

  • A New Second Order Kernel of the Beta Polynomial Family in Density Estimation   Order a copy of this article
    by Israel Uzuazor Siloko, Edith Akpevwe Siloko, Sunday Amaju Ojobor, Richard Oghenefejio Agwemuria, Cyril Chukwuka Ishiekwene, Osayomore Ikpotokin, Efosa Michael Ogbeide, Esosa Enoyoze 
    Abstract: Data exploratory analysis and data visualizations are the primary functions of kernel density estimation, with kernel estimation techniques fundamentally relying on the bandwidth and a kernel function. A large number of bandwidth selectors exist in literatures with less attention on the kernel function. In this paper, a novel second order beta kernel family from its classical counterpart with improved performance is introduced. The improvement of the newly introduced kernel family with respect to performance is ascribed to their possession of additional powers that gives rise to more derivatives since they are polynomial kernel families. Although several techniques of kernel construction exist in literature, the proposed second order kernel functions were derived by modifying the additive higher order kernel construction rule which generates second order kernel functions. A real data and distinguishable number of sample sizes were employed in authenticating and validating the efficacy of the proposed kernel functions' performances using the asymptotic mean integrated squared error (AMISE) as the measure of accuracy. The results of the proposed kernels were compared with existing kernels with the proposed kernels outperforming the traditional kernels family.
    Keywords: AMISE; Bandwidth; Beta kernel; Density Estimation; Second order kernel.
    DOI: 10.1504/IJCSM.2024.10065595
     
  • Network Intrusion Detection Using Adversarial Computational Intelligence   Order a copy of this article
    by Sudhir Pandey, Ditipriya Sinha 
    Abstract: Conventional intrusion detection systems in network ecosystems frequently face difficulties in recognising new types of attacks and navigating intricate network architectures, often resulting in a high false positives. Over the past recent years, researchers have probed a range of machine learning and deep learning frameworks to tackle these challenges, although many of these models demand more labelled data than what is typically accessible. To mitigate the data scarcity issue, researchers have begun utilising Generative Adversarial Networks, specifically the External Classifier GAN (EC-GAN) approach, to generate synthetic data. Our study employs a deep neural network classifier, trained using EC-GAN, and benchmarks its performance against both earlier research and traditional training techniques Remarkably, the classifier that leveraged the EC-GAN method demonstrated superior performance compared to other investigations, even though it requires only a small portion of the original training dataset. To judge the computational novelty, comparative analysis and benchmarking is also carried out.
    Keywords: Generative Adversarial Networks; EC-GAN; Synthetic data; Classification; Deep neural networks; Semi-supervised learning; Intrusion Detection Systems; CICIDS-2017.
    DOI: 10.1504/IJCSM.2024.10065631
     
  • FFHE-SSC: A Robust Framework for Performing Statistical Computation on Encrypted Data   Order a copy of this article
    by Abdullah Moonis, Ajeet Singh 
    Abstract: In the field of data privacy and security, performing computations on encrypted data without compromising confidentiality presents a significant challenge. The FFHE-SSC (Fast Fully Homomorphic Encryption for Secure Statistical Computation) framework, introduced in this article, directly addresses this challenge. Utilising advanced cryptographic techniques, including Fully Homomorphic Encryption (FHE), the framework facilitates robust statistical analysis on encrypted data, thereby ensuring the security of sensitive information throughout the analysis process. Empirical evaluations and analyses have shown that FFHE-SSC not only preserves the integrity and confidentiality of data but also achieves computational performance viable for practical applications. Moreover, the framework's adaptability to various data types and its applicability across diverse sectors which require privacy-preserving data analysis, is also examined.
    Keywords: Homomorphic encryption; Privacy preserving machine learning; Private statistical computations; Finite field.
    DOI: 10.1504/IJCSM.2024.10065688
     
  • Yarn Tension Measurement of Ring Spinning Balloon Based on MATLAB Image Processing Technology   Order a copy of this article
    by Zhen Chen, Shunqi Mei, Zhiming Zhang 
    Abstract: During the spinning process of a spinning machine, the tension of the yarn is directly related to the quality of the yarn and the number of the thread ends. The detection of the yarn balloon tension has always been a hot research topic for experts and scholars. This article is based on digital image processing technology to study the non-contact measurement method of yarn balloon tension on spinning machines, the image processing method and basic algorithm of yarn balloon, the implementation of image processing in MATLAB, and the solution method of yarn tension.
    Keywords: Yarn balloon; Image processing; MATLAB.
    DOI: 10.1504/IJCSM.2024.10067296
     
  • A Reduction based on Event Structure in Automorphism Group   Order a copy of this article
    by Huaxu Li, Weidong Tang, Meiling Liu 
    Abstract: The process systems in large-scale software applications are often very complex, and due to the continuous growth of software volume, how to detect these process systems has become a key focus of event structure research. Event structure, as a semantic model, can partition process systems into different structures, making it convenient for people to analyse and study programs. Therefore, how to further simplify the process system to reduce the complexity of system analysis has become an urgent problem that needs to be solved. This paper applies event structure to rewrite process systems, analyses and studies the automorphism properties in event structures by introducing the theory of automorphism groups, and proposes two event structure reduction methods based on automorphism groups. This paper simplifies complex system structures by utilising the equivalence properties within event structures, and proves through the relevant theory of automorphism groups that the reduced structure is equivalent to the original complex structural model. Therefore, it can simplify complex models and achieve the goal of reducing program analysis complexity.
    Keywords: Event structure; Automorphism group; Process algebra; Reduction.
    DOI: 10.1504/IJCSM.2024.10067402
     
  • B-Spline Finite Element Solution of 1-D Contaminant Transport Equation along Unsteady Flow in Saturated Contaminant Free Porous media with General Boundary Conditions   Order a copy of this article
    by Mansi Palav, Vikas Pradhan 
    Abstract: In the present paper, an analytical solution for 1-D non-reactive contaminant transport in a homogeneous contaminant-free porous medium with time-dependent velocity has been modified by considering well-posedness of the problem in previous standard literature. The analytical solution has been considered by considering ill-posedness of the problem where the obtained analytical solution does not depend continuously on time and does not satisfy the initial condition. The analytical solution has been obtained by considering the general boundary condition which preserve the compatibility of the boundary and initial condition. Laplace transform technique has been applied to obtain modified analytical solution and compared with the previous analytical solution for ill posed-ness of the problem. By considering the specific value of the parameter in the general boundary condition, the obtained modified analytical solution is found to be exactly the same with the previous analytical solution. The numerical solution is also obtained using Quadratic B-Spline finite element method (QBSFEM) and compared with obtained analytical solution and error analysis is also done.
    Keywords: well-posed; general boundary condition; B-spline; FEM.
    DOI: 10.1504/IJCSM.2024.10067931