Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Graph-Theoretic Problems and Their New Applications
  • Language: en
  • Pages: 294

Graph-Theoretic Problems and Their New Applications

  • Type: Book
  • -
  • Published: 2020-05-27
  • -
  • Publisher: MDPI

Graph theory is an important area of applied mathematics with a broad spectrum of applications in many fields. This book results from aSpecialIssue in the journal Mathematics entitled “Graph-Theoretic Problems and Their New Applications”. It contains 20 articles covering a broad spectrum of graph-theoretic works that were selected from 151 submitted papers after a thorough refereeing process. Among others, it includes a deep survey on mixed graphs and their use for solutions ti scheduling problems. Other subjects include topological indices, domination numbers of graphs, domination games, contraction mappings, and neutrosophic graphs. Several applications of graph theory are discussed, e.g., the use of graph theory in the context of molecular processes.

Mathematical Treatment of Nanomaterials and Neural Networks
  • Language: en
  • Pages: 239
MATHEMATICAL COMBINATORICS (INTERNATIONAL BOOK SERIES), vol. 4/2019
  • Language: en
  • Pages: 1590

MATHEMATICAL COMBINATORICS (INTERNATIONAL BOOK SERIES), vol. 4/2019

The mathematical combinatorics is a subject that applying combinatorial notion to all mathematics and all sciences for understanding the reality of things in the universe, motivated by CC Conjecture of Dr.Linfan MAO on mathematical sciences. TheMathematical Combinatorics (International Book Series) is a fully refereed international book series with an ISBN number on each issue, sponsored by the MADIS of Chinese Academy of Sciences and published in USA quarterly, which publishes original research papers and survey articles in all aspects of mathematical combinatorics, Smarandachemulti-spaces, Smarandache geometries, non-Euclidean geometry, topology and their applications to other sciences.

An optimization strategy with SV-neutrosophic quaternion information and probabilistic hesitant fuzzy rough Einstein aggregation operator
  • Language: en
  • Pages: 42

An optimization strategy with SV-neutrosophic quaternion information and probabilistic hesitant fuzzy rough Einstein aggregation operator

The single valued neutrosophic probabilistic hesitant fuzzy rough Einstein aggregation operator (SV-NPHFRE-AO) is an extension of the neutrosophic probabilistic hesitant fuzzy rough set theory. It is a powerful decision-making tool that combines the concepts of neutrosophic logic, probability theory, hesitant fuzzy sets, rough sets, and Einstein aggregation operators. SV-NPHFREAO can be applied in many fields, including livestock decision making. Making judgments about a wide range of issues, including feed formulation, breeding program design, disease diagnostics, and market analysis, is part of the process of managing livestock. By combining data from many sources, SV-NPHFRE-AO can assist decision-makers in livestock management in integrating and evaluating diverse criteria, which can result in more informed choices. It also provides a more accurate and comprehensive representation of decision-making problems by considering the multiple criteria involved and the relationships between them.

Discrete Mathematics and Symmetry
  • Language: en
  • Pages: 458

Discrete Mathematics and Symmetry

  • Type: Book
  • -
  • Published: 2020-03-05
  • -
  • Publisher: MDPI

Some of the most beautiful studies in Mathematics are related to Symmetry and Geometry. For this reason, we select here some contributions about such aspects and Discrete Geometry. As we know, Symmetry in a system means invariance of its elements under conditions of transformations. When we consider network structures, symmetry means invariance of adjacency of nodes under the permutations of node set. The graph isomorphism is an equivalence relation on the set of graphs. Therefore, it partitions the class of all graphs into equivalence classes. The underlying idea of isomorphism is that some objects have the same structure if we omit the individual character of their components. A set of graphs isomorphic to each other is denominated as an isomorphism class of graphs. The automorphism of a graph will be an isomorphism from G onto itself. The family of all automorphisms of a graph G is a permutation group.

Frontiers in Chemistry - Rising Stars: Asia
  • Language: en
  • Pages: 141
Molecular Computing and Bioinformatics
  • Language: en
  • Pages: 390

Molecular Computing and Bioinformatics

  • Type: Book
  • -
  • Published: 2019-07-11
  • -
  • Publisher: MDPI

This text will provide the most recent knowledge and advances in the area of molecular computing and bioinformatics. Molecular computing and bioinformatics have a close relationship, paying attention to the same object but working towards different orientations. The articles will range from topics such as DNA computing and membrane computing to specific biomedical applications, including drug R&D and disease analysis.

Optical Engineering
  • Language: en
  • Pages: 918

Optical Engineering

  • Type: Book
  • -
  • Published: 2003
  • -
  • Publisher: Unknown

Publishes papers reporting on research and development in optical science and engineering and the practical applications of known optical science, engineering, and technology.

Machine Learning under Malware Attack
  • Language: en
  • Pages: 134

Machine Learning under Malware Attack

Machine learning has become key in supporting decision-making processes across a wide array of applications, ranging from autonomous vehicles to malware detection. However, while highly accurate, these algorithms have been shown to exhibit vulnerabilities, in which they could be deceived to return preferred predictions. Therefore, carefully crafted adversarial objects may impact the trust of machine learning systems compromising the reliability of their predictions, irrespective of the field in which they are deployed. The goal of this book is to improve the understanding of adversarial attacks, particularly in the malware context, and leverage the knowledge to explore defenses against adaptive adversaries. Furthermore, to study systemic weaknesses that can improve the resilience of machine learning models.