International Journal of Applied Mathematics and Informatics

E-ISSN: 2074-1278
Volume 15, 2021 


Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of NAUN Journals is adapted to the 'continuously updated' model. What this means is that instead of being separated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.

Main Page

Submit a paper | Submission terms | Paper format

 


Volume 15, 2021 


Title of the Paper:  Manufacturing Export Performance: A Trend Analysis Approach

 

Authors:  Nafiu Lukman Abiodun, George Stanley Kinyata, Osinusi Kunle Bankole

Pages: 108-112

DOI: 10.46300/91014.2021.15.18     XML

Certification

Abstract: The study examined the export performance using a trend analysis approach. A graphical demonstration showing the trend of export performance in Nigeria over time was displayed. It also identifies the major determinants of manufacture exports in Nigeria using ordinary least square approach which shows that an increase in the average tariff rate would lead to a decline in the manufacturing exports and its statistically significant at the 5% level of significance. Capacity utilization has a negative and insignificant with manufactured exports. Also, there is a positive and significant relationship between exchange rate and trade openness at 1 and 5% level of significance respectively.


Title of the Paper:  Stability Test of Networked Systems with Multiple Delays

 

Authors:  Yang Xiao, Jinfeng Kou

Pages: 102-107

DOI: 10.46300/91014.2021.15.17     XML

Abstract: In this paper, we propose a sufficient stability condition for networked systems with multiple delays based on the 2-D polynomials and 2-D Hurwitz-Schur stability. The main advantage of the new stability condition is that it is applicable to the general case of networked systems with multiple, incommensurate delays yet numerically tractable. The characteristic polynomials of networked systems are mapping into 2-D hybrid polynomials, then to test the Hurwitz-Schur stability can. determine the networked systems, examples including system simulations verify the validity of the proposed test algorithms.


Title of the Paper:  Image Enhancement Using Weighted Bi-Histogram Equalization

 

Authors:  Thaweesak Trongti rakul, Nattapong Phanthuna

Pages: 98-101

DOI: 10.46300/91014.2021.15.16     XML

Abstract: Image enhancement is one of using in various digital signal processing areas. Advances in microcontrollers, microcomputers and computers have developed traditional algorithms in order to improve the quality of the resulting image and have implied many avenues to the design of new innovations using various techniques. This paper proposes contrast enhancement using weighted bi-histogram equalization based on distributed area ratio. Moreover, this technique must use a weighted factor which is calculated by the ratio of the histogram distribution. Likewise, an original image will be equalized by the modification of the probability density function of the gray levels. As result of the experiment, the contrast of resulting image is improved for implement and human perception – as well as also reduces the absolute mean brightness error (AMBE) than the traditional technique of image enhancement.


Title of the Paper:  Poly Encrypted Text Based on Dynamic Selection and Chaotic Behavior

 

Authors:  Amaria Wael, Seddik Hassene, Bouslehi Hamdi

Pages: 93-97

DOI: 10.46300/91014.2021.15.15     XML

Abstract: Indeed, the current cryptography suffers from the rise of the computing power of computers and the advent of quantum computers could be the death knell of these algorithms. Therefore, with this paper, we present a new encryption approach based on chaotic outputs to insure more protection. This approach combines two encryption techniques in addition to random permutation. The first one consists to put in disorder binary data and the second technique is based on conditional logical function. The choice between those two techniques is perfectly random and generated from chaotic outputs. Each process has her own keys which make the encryption more complicated.


Title of the Paper:  Compression and Visualization Interactive of 3D Mesh

 

Authors:  Zeineb Abderrahim, Mohamed Salim Bouhlel

Pages: 85-92

DOI: 10.46300/91014.2021.15.14     XML

Abstract: The combination of compression and visualization is mentioned as perspective, very few articles treat with this problem. Indeed, in this paper, we proposed a new approach to multiresolution visualization based on a combination of segmentation and multiresolution mesh compression. For this, we proposed a new segmentation method that benefits the organization of faces of the mesh followed by a progressive local compression of regions of mesh to ensure the refinement local of the three-dimensional object. Thus, the quantization precision is adapted to each vertex during the encoding /decoding process to optimize the rate-distortion compromise. The optimization of the treated mesh geometry improves the approximation quality and the compression ratio at each level of resolution. The experimental results show that the proposed algorithm gives competitive results compared to the previous works dealing with the rate-distortion compromise and very satisfactory visual results.


Title of the Paper:  Methods and Tools for Visualization of Graphs and Graph Algorithms

 

Authors:  V.N. Kasyanov

Pages: 78-84

DOI: 10.46300/91014.2021.15.13     XML

Abstract: Graphs are the most common abstract structure encountered in computer science and are widely used for structural information visualization. In the paper, we consider practical and general graph formalism of so called hierarchical graphs and present the Higres and ALVIS systems aimed at supporting of structural information visualization on the base of hierarchical graph models.


Title of the Paper:  My First Phone: Smartphones Android for Kids

 

Authors:  Álvaro Santos, João Gomes, Anabela Gomes

Pages: 72-77

DOI: 10.46300/91014.2021.15.12     XML

Abstract: Anybody can question the advantages of a kid having and starting to use a mobile phone. Nevertheless, from a certain age parents consider the use of mobile phones by kids quite useful. The mobile phone allows an easy communication between parents and children and permits child control. Furthermore, nowadays some Android smartphones have affordable prices that can bring new technologies and other opportunities to this domain. In this paper we present a system, that includes several new easy to use applications but with a set of advanced parent control features, to adapt the phone for child use and to minimize the risks.


Title of the Paper: Information System for Corporate Performance Assessment and Reporting

 

Authors:  Ondřej Popelka, Michal Hodinka, Jiří Hřebíček, Oldřich Trenz

Pages: 65-71

DOI: 10.46300/91014.2021.15.11     XML

Abstract: There are discussed current trends of corporate performance assessment (measurement of economic/financial, environmental, social and governance key performance indicators) and corporate reporting in this paper. In corporate performance assessment we focus particularly on food and agricultural sector. The core of the paper is the proposal of the prototype of information system for small and medium enterprises, which would enable various enterprises to introduce sustainable reporting. We propose a relational data model with several abstract entities to represent various differences in various reporting frameworks. Our goal is to design a generic information system which may be used by small and medium enterprises to start with their corporate performance assessment and reporting. The overall structure of the information system is described in the paper, along with the core data model and possible extensions into XBRL based reporting and business intelligence.


Title of the Paper:  Narrowband Interference Cancellation using Set-membership Adaptive Predictor for GPS Receiver

 

Authors:  Wei-Lung Mao, Chorng-Sii Hwang, Chung-Wen Hung, Jyh Sheen

Pages: 59-64

DOI: 10.46300/91014.2021.15.10     XML

Abstract: The global positioning system (GPS) provides accurate positioning and timing information that is useful in various civil and military applications. The adaptive filtering predictor for GPS jamming suppression applications is proposed. This research uses the gLab-G software to substitute for the hardware receiver to record the GPS signal waveform. The normalized least-mean-square (NLMS) and set-membership NLMS (SM-NLMS) filtering methods are employed for continuous wave interference suppression. Simulation results reveal that our proposed methods can provide the better performances when the interference-to-noise ratios (INR) are varied from 20 to 50 dB. The anti-jamming performances are evaluated via extensive simulation by computing mean squared prediction error (MSPE) and signal-to-noise ratio (SNR) improvements.


Title of the Paper:  Sparsity Enhanced Beamforming in The Presence of Coherent Signals

 

Authors:  Bao Gen Xu, Yi He Wan, Si Long Tang, Xue Ke Ding, Qun Wan

Pages: 55-58

DOI: 10.46300/91014.2021.15.9     XML

Abstract: In order to find the directions of coherent signals, a sparsity enhanced beam-forming method is proposed. Unlike the conventional minimum variance distortless response (MVDR) method, the minimum variance in the proposed method corresponds to the orthogonal relationship between the noise subspace and the sparse representation of the received signal vector, whereas the distortless response corresponds to the nonorthogonal relationship between the signal subspace and the sparse representation of the received signal vector. The proposed sparsity enhanced MVDR (SEMVDR) method is carried out by the iterative reweighted Lp-norm constraint minimization. for direction finding of coherent signals. Simulation results are shown that SEMVDR has better performance than the existing algorithms, such as MVDR and MUSIC, when coherent signals are present.


Title of the Paper:  Analysis of Cyber Networks in a System Concept

 

Authors:  Dana Prochazkova, Jaroslav Srp, Jan Prochazka

Pages: 47-54

DOI: 10.46300/91014.2021.15.8     XML

Abstract: The aim of the paper is to show that all cyber networks (such as telecommunication, IT or ICT networks) are systemically identical or very similar, although each of them is applied in another industry or economy field or includes other added functional elements. The effort is to show that systemic identity (similarity) of the mentioned networks identifies the same set of network security threats that can be solved using the same approaches and techniques. The integrative approach based on the systematic approach enables to effectively use the efforts of professionals and all means target to the actual problem solving. The mentioned networks classification to the cyber critical infrastructures is also made based on this concept. Cyber system and cyber networks are threatened by both, the internal system deficits (technical and organisational nature) and the wide range of disasters: natural disasters - impacts primarily on the technical resources; intentional events caused by human vandalism, theft, terrorist attacks; technological accidents; and failure of electricity supply; etc. They threaten individual humans, human groups and states by their technical and organisational deficits and by the IT disuse.


Title of the Paper: A Survey on VANET Intrusion Detection Systems

 

Authors:  Mohammed Erritali, Bouabid El Ouahidi

Pages: 43-46

DOI: 10.46300/91014.2021.15.7     XML

Abstract: In recent years, the security issues on Vehicular ad hoc networks (VANETs) have become one of the primary concerns. The VANET is inherently very vulnerable to attacks than wired network because it is characterized by high mobility, shared wireless medium and the absence of centralized security services offered by dedicated equipment such as firewalls and authentication servers. Attack countermeasures such as digital signature and encryption, can be used as the first line of defense for reducing the possibilities of attacks. However, these techniques have limited prevention in general, and they are designed for a set of known attacks. They are unlikely to avoid most recent attacks that are designed to circumvent existing security measures. For this reason, there is a need of second technique to “detect and notify” these newer attacks, i.e. “intrusion detection”. This article aims to present and classify current techniques of Intrusion Detection System (IDS) aware VANETs.


Title of the Paper:  Changes in New Private Law of the Czech Republic and Implementation of Basel III

 

Authors:  Jindřiška Šedová

Pages: 37-42

DOI: 10.46300/91014.2021.15.6     XML

Abstract: Competition in the financial market puts currently new requirements for cost reduction on financial institutions. Available sources of cost reduction are seen i.a. in minimizing legal risks, which can reduce the uncertainty associated with enforcement and interpretation of legal acts, treaties and regulations in the field of contractual obligations. In this regard, banks in the Czech Republic are looking for new ways to reduce costs in the ongoing implementation of Basel II and preparation for implementation of Basel III. The central problem to which attention is focused is to ensure the required level of capital adequacy. This is conditioned i.a. by their risk management system. Capital adequacy may affect credit risk substantially. Besides others, the level of credit risk may be affected to a considerable extent by application of hedging instruments. This paper presents conclusions of the executed comparison of the existing and new private law provisions in the Czech Republic and, based on that, draws new opportunities and difficulties for banks in managing their credit risk and capital adequacy. The focus is only on the hedging instruments that may affect the activities of banks in a significant way.


Title of the Paper:  Antecedents Factors Affecting Alignment and Its Impact to Organizational Performance in Universities

 

Authors:  Juhana Salim, Esmadi Abu Abu Seman

Pages: 30-36

DOI: 10.46300/91014.2021.15.5     XML

Abstract: Business and Information Technology (IT) alignment involves applying IT in an appropriate and timely way, in harmony with business strategies, goals and needs. Prior research argues that achieving alignment contributes immensely to ensuring that IT investments improve organisational performance. One important issue in business–IT alignment study is the absence of alignment. Findings indicate that there are many factors/variables that consistently enhance business-IT alignment. By identifying factors to achieve business-IT alignment, the problem on the absence of alignment could be addressed. Due to the complexity of business-IT alignment, there is possibility that successful alignment focuses on managing specific alignment dimension by investigating factors that encourage particular dimension. Past studies have shown the relationship between business-IT alignment and organizational performance. However, only few researchers tried to relate between the factors with organizational performance. Literature on alignment discovered that there seems to be confusion in clarifying the business-IT alignment concept. Based on this gap, this paper examines problem and issues on alignment, identify, analyze and discuss factors affecting alignment, then categorize the constructs identified into dimensions and propose a model for alignment in universities. The study contributes to the formation of a theoretical model influencing alignment dimension that has impact on organizational performance. The model is important to provide empirical evidence that confirms the importance of categorizing factors into dimensions in achieving business-IT alignment and their influence on universities’ performance.


Title of the Paper:  Identification of Effective Leadership Indicators in Ghanaian Retail Banks Using AMOS Based Confirmatory Factor Analysis

 

Authors:  Aminu Sanda, John Kuada

Pages: 21-29

DOI: 10.46300/91014.2021.15.4     XML

Abstract: In the light of the importance of banks to the economic growth process in Ghana, this study sought to identify the determinants of effective leadership style that is appreciated by employees in retail banking firms in Ghana, towards providing practitioners with crucial information that could enable them make informed decisions towards improving the workplace. Using data collected from employees in eleven firms which were analyzed using the AMOS programme, minimum was achieved for the leadership measurement model and the goodness of fit statistics showed that the overall model fit quite well to the data. Based on the findings from both factor analysis and Confirmatory factor analysis, the study established that managers of retail banks in Ghana could be perceived by their employees as good leaders if they give employees full credit for the work that they do. Handling employee issues very well and taking care of their complaints as well as putting in place systems for enhancing employees’ career advancement into specialist departments or management positions are also perceived as good determinant of leadership. It is therefore hypothesized that managers of retail banks in Ghana could be perceived as good leaders by employees if they are seen as giving employees full credit for the work that they employees do at the workplace, handling employee issues very well and taking care of complaints brought up by employees, as well as putting in place systems for enhancing employees’ career advancement into specialist departments or management positions are also perceived as good leaders.


Title of the Paper: An Introduction to the HLanData Project: a Step Forward in the Harmonization of Spatial Information Throughout Europe

 

Authors:  Sarmite Barvika, Liga Jankava

Pages: 14-20

DOI: 10.46300/91014.2021.15.3     XML

Abstract: Nowadays spatial information is becoming more and more accessible for various purposes due to local, national and European initiatives. This paper is addressed to one such initiative Hlandata, whose purpose is to make a significant step forward in the harmonization and use of land cover (LC) and land use (LU) geographic data and its related data bases over Europe. The project was developed using the best experiences from previous geographic data harmonization activities with the goal of demonstrating the feasibility of European level harmonization of land information related datasets. The three pilot projects “LU-LC Data Analysis System for intermediatelevel users”, “Harmonized and Interoperable Land Information Systems” and “Stratification of Waste Dumps” were developed and tested within the project and demonstrated advantages from user oriented value-added services emphasizing data search, exploration and analysis.


Title of the Paper: Mathematical and Trade based Optimization: "Synthetic" Method and Three Industrial Cases

 

Authors: Yvon Gardan, Nicolas Gardan

Pages: 7-13

DOI: 10.46300/91014.2021.15.2     XML

Abstract: The linear process of design-engineeringmanufacturing is nowadays obsolete. Even DFX (Design For X) methodologies are often replaced by Simulation for XFD (X being also Design) approaches. Optimization is also often applied before design. For instance, engineering design optimization of mechanical structures is nowadays essential in the mechanical industry (automotive, aeronautics ...). But optimizing mechanical structures cannot be efficient without taking in account other phases of the design-manufacturing process. In some cases, optimization is only based on trade kwnowledge. Engineers must then design parts or assemblies that are a better compromise, between mechanical and functional performance, weight, manufacturing costs etc. In this paper, after giving an overview on the different disciplines in design optimization of mechanical structures, we propose some trends to take into account the trade knowledge in the optimization/design phases. We propose an integrated approach to optimization in a functional design process with a methodological point of view. We present three different industrial cases of optimization on three examples : one in mechanical structures optimization, on based only on trade knowledge and the third mixing calculus and knowledge.


Title of the Paper: Simulation Model of Heat Transfer through the Wall

 

Authors: Jana Mižáková, Stella Hrehová, Alexander Hošovský

Pages: 1-6

DOI: 10.46300/91014.2021.15.1     XML

Abstract: This paper deals with describing of mathematical model of heat transfer through the wall and simulations, which were obtained by MATLAB Simulink. Model is a part of complex model of heating system. During our model design research we solve partial differential equation system and problem with inverse Laplace transform occurs, because of function of real argument from image function of complex argument is not define.