]>
2014
13
3
94
Hopf Bifurcation in Numerical Approximation for Price Reyleigh Equation with Finite Delay
Hopf Bifurcation in Numerical Approximation for Price Reyleigh Equation with Finite Delay
en
en
The numerical approximation of Price Reyleigh equation is considered using delay as parameter. Fist,
the delay difference equation obtained by using Euler method is written as a map.According to the
theories of bifurcation for discrete dynamical systems, the conditions to guarantee the existence of Hopf
bifurcation for numerical approximation are given. The relations of Hopf bifurcation between the
continuous and the discrete are discussed. That when the Price Reyleigh equation has Hopf bifurcations at
\(r=r_0\), the numerical approximation also has Hopf bifurcations at \(r_h+r_0=0_h\) is proved.
186
193
M.
Taheri-dehkordi
G.
Aliasghari
Price Reyleigh equation
Euler method
Hopf bifurcation
Numericalapproximation.
Article.1.pdf
[
[1]
Shuhe Wang, Differential Equation Model and Chaos, Press of University of Science and Technology of China, (1999), 311-324
##[2]
Xi-fan Zhang, Xia Chen, Yunqing Chen, A qualitative analysis of price model in differential equations of price , Journal of Shenyang Institute of Aeronautical Engineering, 21(1) (2004), 83-86
##[3]
Lei Liu, The Analysis of Stability of the Mathematical Model for Balancing Price, Journal of Hubei University of Technology, 22(2) (2007), 57-58
##[4]
Lin Li, Several Differential Equation Models in Economic Systems, Journal of the Graduate School of the Chinese Academy of Science, 3 (2003), 21-28
##[5]
Jian Xie, Zhong Yan, The Analysis of Price Model of the Nonlinear Market, Quantitative &Technica Economics, 2 (2003), 01-10
##[6]
Fang Chen, Equilibrium Price:the Price Setting in Dynamic Market and Its Changing Trend, Research on Financial andEconomic Issues, 5 (2002), 03-11
##[7]
Cuiling Qi, Yanping Liu, The Stability of General Dynamical Market Pricing System, Journal of Xinjiang University, 1 (2006), 04-34
##[8]
Ping Wang, The Mathematical Model of the Relationship to the Demand and the Supply in Market, Journal of Zaozhuang Teachers collece, 5 (2003), 03-16
##[9]
Tanghong Lv, Zhenwen Liu, Hopf Bifurcation for Price Reyleigh Equation with Finite Delay, Journal of Jilin University (Mathematics) , 47(3) (2009), 441-448
##[10]
N. Kazarino, Y. H. Wan, Van den Driessche P, Hopf Bifurcation and Stability of Periodic Solutions of Differential-Difference and Integro- Differential Equations, Journal of the Institute of Mathematical Appliations, 21 (1978), 461-467
##[11]
S. V. Halej, S. V. Lunel, Introduction to Functional Differential Equations, Spring-Verlag, New York (1993)
##[12]
J. D. Lambert, Numerical Method for Ordinary Differential Equations, John Wiley, Chichester (1991)
##[13]
J. Guckenheimer, P. J. Holmes, No Linear Oscillations,Dynamical Systems and Bifurcation of Vector Fields, Spring-Verlag, New York (1983)
##[14]
Neville Ford, Volker Wulf, Numerical Hopf Bifurcation for a class of delay Differential Equations, JCAM, 115 (2000), 601-616
]
Linear Integer (lip) Programing to Optimization and Sizing a Windsolarbattery System for Islanding Purpose
Linear Integer (lip) Programing to Optimization and Sizing a Windsolarbattery System for Islanding Purpose
en
en
An optimal approach for sizing of stand-alone hybrid distributed generation (DG) power management systems is presented. The methodology is applied to an integrated hybrid system including photovoltaic (PV) panels, wind turbine (WT), and battery (BT). The PV array is operated effectively at the maximum power point tracking. Unit cost of electricity energy (UCEE), as an efficient criterion for the economic assessment and the loss of power supply probability (LPSP), as a suitable criterion for reliable assessment, are used to optimize the system sizing. Typical residential load, solar irradiation, wind speed, and temperature data are collected from the city of Marvdasht, located in Iran, Fars (Latitude: 29°50'N, Longitude: 52°40'E) to evaluate the proposed technique. A Branch and cut method is employed and coded in MATLAB® environment to optimize configuration of proposed hybrid system. Regarding the stochastic nature of renewable sources and load, the simulation results show the suitable match rate between demand and supply.
194
211
Saeed Reza Nazari
Estahbanati
S. Masoud
Barakati
Mehri
Mehrjoo
Hybrid renewable wind/PV/battery system
optimization
sizing method
linear integer programing (LIP)
LPSP
UCEE.
Article.2.pdf
[
[1]
M. Vafaei, Optimally-Sized Design of a Wind/Diesel/Fuel Cell Hybrid System for Remote Community, Master of Applied Science Electrical and Computer Engineering University of Waterloo, (2011)
##[2]
Hongxing Yang, Lin Lu, Wei Zhou, A novel optimization sizing model for hybrid solar-wind power generation system, Solar Energy , 81(1) (2007), 76-84
##[3]
Claudia Valéria Távora Cabral, Delly Oliveira Filho, Antônia Sônia Alves C. Diniz, José Helvecio Martins, Olga Moraes Toledo, Lauro de Vilhena B. Machado Neto, A stochastic method for standalone photovoltaic system sizing , Solar Energy, 84(9) (2010), 1628-1636
##[4]
A. D. Bagul, Z. M. Salameh, B. Borowy, Sizing of a stand-alone hybrid wind-photovoltaic system using a three-event probability density approximation , Solar Energy , 56(4) (1996), 323-335
##[5]
I. Abouzahr, R. Ramakumar , Loss of power supply probability of stand-alone photovoltaic systems: a closed form solution approach, Energy Conversion, IEEE Transactions on Energy Conversion , 6 (1991), 1-11
##[6]
Jing Li, Wei Wei, Ji Xiang, A simple sizing algorithm for stand-alone PV/wind/battery hybrid microgrids, Energies, 5(12) (2012), 5307-5323
##[7]
S. Diaf, M. Belhamel, M. Haddadi, A. Louche, Technical and economic assessment of hybrid photovoltaic/wind system with battery storage in Corsica island, Energy Policy, 36(2) (2008), 743-754
##[8]
Tomas Markvart, Sizing of hybrid PV–wind energy systems, Sol Energy , 59(4) (1996), 277-281
##[9]
HX. Yang, J. Burnett, L. Lu , Weather data and probability analysis of hybrid photovoltaic–wind power generation systems in Hong Kong, Renew Energy , 28(11) (2003), 1813-24
##[10]
S. Ashok, Optimized model for community-based hybrid energy system, Renewable Energy, 32(7) (2007), 1155-1164
##[11]
Javed Dhillon , Multi objective Optimization of Power Dispatch Problem Using NSGA-II, Master of Engineering Power Systems & Electric Drives, Thapar University, Patiala (2009)
##[12]
Eftichios Koutroulis, Dionissia Kolokotsa, Antonis Potirakis, Kostas Kalaitzakis, Methodology for optimal sizing of stand-alone photovoltaic/wind-generator systems using genetic algorithms, Solar Energy, (2006), 1072-1088
##[13]
Mohammad Ali Yazdanpanah Jahromi, Said Farahat, Seyed Masoud Barakati, Optimal size and cost analysis of stand-alone hybrid wind/photovoltaic power-generation systems, Civil Engineering and Environmental Systems, (2013), 1-21
##[14]
Bahman Bahmani-Firouzi, Rasoul Azizipanah-Abarghooee, Optimal sizing of battery energy storage for micro-grid operation management using a new improved bat algorithm, International Journal of Electrical Power & Energy Systems, 56 (2013), 42-54
##[15]
Motaz Amer, A. Namaane, N.K. M'Sirdi, Optimization of Hybrid Renewable Energy Systems (HRES) Using PSO for Cost Reduction, Energy Procedia, 42 (2013), 318-327
##[16]
Masoud Sharafi, Tarek Y. ELMekkawy, Multi-objective optimal design of hybrid renewable energy systems using PSO-simulation based approach, Renewable Energy, 68 (2014), 67-79
##[17]
Adrian Ilinca, Ed McCarthy, Jean-Louis Chaumel, Jean-Louis Rétiveau, Wind potential assessment of Quebec Province, Renewable Energy, 28(12) (2003), 1881-1897
##[18]
M. A. Yazdanpanah-Jahromi, S.-M. Barakati, S. Farahat, An efficient sizing method with suitable energy management strategy for hybrid renewable energy systems, International Transactions on Electrical Energy Systems, (2013)
##[19]
Ortiz Rivera EI , Modeling and analysis of solar distributed generation, Ph.D. thesis, Department of Electrical and Computer Engineering, Michigan State University (2006)
##[20]
S. Piller, M. Perrin, Jossen, Methods for state-of-charge determination and their applications, Power Sources 96, 113–120 (2001)
##[21]
D. Berndt, Maintenance-free Batteries, John Wiley & Sons, England (1994)
##[22]
D. Guasch, S. Silvestre, Dynamic battery model for photovoltaic applications, Progress in Photovoltaics: Research and Applications, 11 (2003), 193-206
##[23]
H. Yang, W. Zhou, L. Lu, Z. Fang , Optimal sizing method for stand-alone hybrid solar-wind system with LPSP technology by using genetic algorithm, Solar Energy, 82 (2008), 354-367
##[24]
M. Padberg, G. Rinaldi, A Branch-and-Cut Algorithm for the Resolution of Large-Scale Symmetric Traveling Salesman Problems, Siam Review, (1991), 60-100
##[25]
E. John, Mitchell, Branch-and-Cut Algorithms for Combinatorial Optimization Problems, Handbook of Applied Optimization, (2002), 65-77
]
Controlling the False Alarm in an Intrusion Tolerant Database System Using Significance Degrees of Data Objects
Controlling the False Alarm in an Intrusion Tolerant Database System Using Significance Degrees of Data Objects
en
en
Traditional database security mechanisms focus on either protection or prevention. However, in practice all attacks are not avoidable. To solve this problem, Intrusion Tolerant Database Systems (ITDBs) were introduced. An ITDB uses new generation database security mechanisms to guarantee specified levels of data availability, integrity and confidentiality in the presence of successful attacks. A key part of an ITDB is the intrusion detection (ID) which informs the system about attacks. One of the problems in using ID is the false alarm that will lead to the reduction of the “availability” or “integrity”. This paper presents an intelligent method to control false alarm. In this method, we will use the significance degrees of data objects to determine the anomaly threshold adaptively, as the “availability” and “integrity” required by the data objects are satisfied.
212
225
Zeinab
Falahizar
Mohsen
Rohani
Alireza
Falahizar
Database Security
Intrusion Tolerance
Intrusion Detection
false alarm
anomaly threshold
adaptive controller.
Article.3.pdf
[
[1]
C. Kruegel, G. Vigna , Anomaly detection of web-based attacks , In CCS’03, , Washington, USA,October, (2003), 251-261
##[2]
T. Ryutov, C. Neuman, D. Kim, L. Zhou , Integrated access control and intrusion detection for web servers, IEEE Transactions on Parallel and Distributed Systems, 14(9) (2003), 814-850
##[3]
P. Liu, Architectures for intrusion tolerant database systems, Proc. 2002 Annual Computer Security Applications Conference, (2002), 311-320
##[4]
P. Luenam, P. Liu , The design of an adaptive intrusion tolerant database system, InProc. IEEE Workshop on Intrusion Tolerant Systems, (2002)
##[5]
P. Liu, J. Jing, P. Luenam, Y. Wang, L. Li, S. Ingsriswang, The Design and Implementation of a Self-Healing Database System , Journal of Intelligent Information Systems, 23 (3) (2004), 247-269
##[6]
T. Lunt , A survey of intrusion detection techniques, Computers & Security, 12(4) (1993), 405-18
##[7]
F. S. Rietta, Application layer intrusion detection for sql injection, In ACM-SE 44: Proc. 44th annual Southeast regional conference, ACM Press, New York, NY, USA, (2006), 531-536
##[8]
C. Y. Chung, M. Gertz, K. Levitt. Demids, A misuse detection system for database systems , In 14th IFIPWG11.3 Working Conference on Database and Application Security, (2000)
##[9]
S. Stolfo, D. Fan, W. Lee, Credit card fraud detection using meta-learning: Issues and initial results, In AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, (1997)
##[10]
P. Liu, H. Wang, L. Li , Real-time data attack isolation for commercial database applications, Elsevier Journal of Network and Computer Applications, 29(4) (2006), 294-320
##[11]
P. Liu, S. Jajodia , Multi-phase damage confinement in database systems for intrusion tolerance, In Proc. 14th IEEE Computer Security Foundations Workshop, Nova Scotia , Canada (2001)
##[12]
Z. Falahiazar, M. Rohani, The architecture of an intrusion tolerant database system, International Conference onEducational and Information Technology, (2010)
##[13]
TPC BenchmarkTM C. , , http://www.tpc.org/tpcc/., ()
##[14]
P. Luenam, P. Liu, A. F. Norcio, Adaptive Intrusion Tolerant Database Systems, VDM VERLAG DR. MULLER, Germany (2008)
##[15]
J. Freeman, D. Skapura , Neural Networks: Algorithms, applications and programming techniques , Addison-Wesley, Reading, MA (1991)
##[16]
S. HAYKIN , Neural Networks: A Comprehensive Foundation, second edition. Prentice Hall 1999. Chapter 4 Multilayer Perceptrons, (1999), 1-156
##[17]
DE. Rumelhart, GE. Hinton, RJ. Williams , Learning internal representations by error propagation, In: Rumelhart DE, McClelland JL (eds). Parallel Distributed Processing, Vol. I. MIT Press, Cambridge ()
##[18]
Madan M. Gupta, Liang Jin, Noriyasu Homma, Static and Dynamic Neural Networks From Fundamentals to Advanced Theory, chapter 4, John Wiley & Sons. , (2003)
##[19]
Oliver Nelles , Nonlinear System Identification From Classical Approaches to Neural Networks and Fuzzy Models, chapter 11, Springer, Verlag Berlin Heidelberg (2001)
##[20]
Martin T. Hagan, HowllId B. Demuth, Neural Network design, chapter 11, PWS Publishing Company. (1996)
##[21]
P. Ammann, S. Jajodia, P. Liu, Recovery from malicious transactions , IEEE Transaction on Knowledge and Data Engineering, 14(5) (2002), 1167-1185
##[22]
T. Chiueh, D. Pilania , Design, implementation, and evaluation of an intrusion resilient database system, In Proc. International Conference on Data Engineering, (2005), 1024-1035
##[23]
R. Sobhan, B. Panda, Reorganization of the database log for information warfare data recovery, In Proceedings of the fifteenth annual working conference on Database and application security, pages , Niagara, Ontario, Canada, (2002), 121-134
##[24]
M. Yu, P. Liu, W. Zang, Self-healing workflow systems under attacks, In The 24th International Conference on Distributed Computing Systems(ICDCS’04), (2004), 418-425
##[25]
Y.-W. Huang, S.-K. Huang, C.-H. Tsai , Web application. In WWW, Budapest, Hungary, ACM, ACM, (2003), 148-159
##[26]
Z. Falahiazar, M. Rohani, L. Falahiazar, M. Teshnelab, Optimizing An Intrusion Tolerant Database System Using Neural Network, In International Journal of Database Theory and Application, Vol. 5, No. 2 (2012)
##[27]
Guoqiang Peter Zhang, Neural Networks for Classification: A Survey, In IEEE Transactions on systems, MAN, and Cybernetics—Part C: applications and reviews, Vol. 30, No. 4 (2000)
##[28]
Mohammad M. Javidi, Mina Sohrabi, Marjan Kuchaki Rafsanjani, Intrusion Detection in Database Systems, In Communication and Networking, Communications in Computer and Information Science, Volume 120. Springer Berlin Heidelberg, 93-101 (2010)
##[29]
M. Hassanzadeh, G. Ardeshir, Optimal Membership Function for Creating Fuzzy Classifiers Ensemble, Journal of mathematics and computerscience, 12 (2014), 73-84
##[30]
Shiva Zahedian , Aspect-Oriented Software Maintainability Assessment Using Adaptive Neuro Fuzzy Inference System (ANFIS) , Journal of mathematics and computerscience, 12 (2014), 243-252
##[31]
Neda Noori, Leila Boti, Ebrahim Nowzarpoor Shami , Surveying Different Aspects of Anomaly Detection and Its Applications, Journal of mathematics and computer science, 4(2) (2012), 129-138
]
Comparison of Normal Equation with an Abs Approach for Solving Convex Quadratic Programs
Comparison of Normal Equation with an Abs Approach for Solving Convex Quadratic Programs
en
en
In this paper, we present numerical results concerning a comparison between the normal equation approach and an ABS approach for computing the search direction of primal-dual infeasible interior point methods for solving convex quadratic programming problems (CQPs). Let \(m\) and \(n\) denote the number of constraints and the number of variables, respectively. The numerical results show that, when \(\frac{m}{n}\) is small, then the ABS approach needs a considerably less computing time. When \(\frac{m}{n}\) is close to one, then the normal equations approach is more efficient than the ABS approach.
226
230
Mostafa
Khorramizadeh
Infeasible interior point method
Primal-dual algorithms
Extended ABS algorithms
Search direction
Iteration free search vector.
Article.4.pdf
[
[1]
J. Abaffy, C. G. Broyden, E. Spedicato, A class of direct methods for linear equations, Numerische Mathematik, 45 (1984), 361-376
##[2]
M. Khorramizadeh, On solving Newton systems of Primal-Dual Infeasible Interior Point methods using ABS methods, Applied Mathematical Sciences, 6(106) (2012), 5263-5272
##[3]
S. J. Wright, Primal--Dual Interior-Point Methods , SIAM, Philadelphia (1997)
]
Interval Interpolation by Newtons Divided Differences
Interval Interpolation by Newtons Divided Differences
en
en
In this paper, we present applied of interval algebra operation in interpolation, when the support points are intervals. We compute interpolation polynomial that coefficients are interval. This polynomial named inters polar polynomial. We compute interpolation polynomial by Newton`s divided difference formula.
231
237
Ali Salimi
Shamloo
Parisa
Hajagharezalou
Interval value
Interpolation polynomial
Interval interpolation
Newton`s Divided differences.
Article.5.pdf
[
[1]
H. Badry Mohamed, Verified solution of parametric interval linear systems, South valley University, Egypt (2007)
##[2]
E. Popova , Parametric interval linear solver, Numer. Algorithms, 37(1–4) (2004), 345-356
##[3]
N. L. Caro , A short course on approximation theory , Bowling green state university, U.S.A (1998)
##[4]
J. Stoer, R. Bulirsch , Introduction to numerical analysis, Springer-Verlag , (2002)
##[5]
E. R. Hansen, Global Optimization Using Interval Analysis, Marcel Dekker, (1992)
##[6]
M. Zimmer, W. Kramer, Solvers for the verified solution of parametric linear systems, Springer- Verlag, (2011)
##[7]
S. Markov, E. Popova, U. Schneider, J. Schulze , On Linear Interpolation under Interval Data , Math.Comput.Simul, 42 (1996), 35-45
##[8]
J. Rokne, Explicit Calculation of the Lagrangian Interval Interpolating Polynomial , Computing, 9 (1972), 149-157
##[9]
R. Dehghan, K. Rahsepar Fard, On Bivariate Haar Functions and Interpolation Polynomial, The Journal of Mathematics and Computer Science, 10 (2014), 100-112
##[10]
M. Sarboland, A. Aminataei, Improvement of the Multiquadric Quasi-Interpolation \(L_{(W_2 )}\), The Journal of Mathematics and Computer Science, 11 (2014), 13-21
]
Short-term Electricity Price Forecasting Using Optimal Tsk Fuzzy Systems
Short-term Electricity Price Forecasting Using Optimal Tsk Fuzzy Systems
en
en
Since all financial transactions in restructured power markets are based on electricity prices, it is necessary that the price of electric power be predicted precisely. Some particular features such as: nonlinearity, non-stationary behaviors, as well as volatility of electricity prices make such a prediction a very challenging task. In this paper, a new structure of TSK fuzzy systems is presented that provides high order TSK fuzzy systems from lower orders which have capability of modeling and forecasting chaotic time series. The method used for optimization of fuzzy systems is the Interior point method. Using this method for forecasting electricity price is useful because of its chaotic behavior. The results are compared with RBF neural network and TSK fuzzy system presents better results.
238
246
Saeid Eslahi
Tatafi
Gholam Ali
Heydari
Ali Akbar
Gharaveisi
Forecasting
TSK fuzzy systems
Interior Point Method
RBF neural network.
Article.6.pdf
[
[1]
A. J. Conejoa , J. Contrerasa, R. Espınolaa, M. A. Plazasb, Forecasting electricity prices for a day-ahead pool-based electric energy market, International Journal of Forecasting, 21 (2005), 435-462
##[2]
G. Raquel, L. M. Romeo, A. Gil, Forecasting of electricity prices with neural networks, Energy Conversion and Management, 47 (2006), 1770-1778
##[3]
G. Li, C. C. Liu, C. Mattson, J. Lawarrée, Day-Ahead Electricity Price Forecasting in a Grid Environment, IEEE Transactions on Power Systems, 22 (2007), 266-274
##[4]
R. C. Garcia, J. Contreras, M. van Akkeren, J. Batista, C. Garcia, A GARCH Forecasting Model to Predict Day-Ahead Electricity Prices, IEEE Transactions on Power Systems, 20 (2005), 867-874
##[5]
Y. Y. Hong, C. F. Lee, A neuro-fuzzy price forecasting approach in deregulated electricity markets, Electric Power Systems Research, 73 (2005), 151-157
##[6]
J. C. Antonio, M. A. Plazas, R. Espínola, A. B. Molina, Day-Ahead Electricity Price Forecasting Using the Wavelet Transform and ARIMA Models, IEEE Transactions on Power Systems, 20 (2005), 1035-1042
##[7]
J. P. Diego, J. R. Trapero, Electricity Prices Forecasting by Automatic Dynamic Harmonic Regression Models, Journal of Energy Conversion and Management, 48 (2006), 1710-1719
##[8]
N. Amjady , Day-Ahead Price Forecasting of Electricity Markets by a New Fuzzy Neural Network, IEEE Transactions on Power Systems, 21 (2006), 887-896
##[9]
F. J. Nogales, J. Contreras, A. J. Conejo, R. Espínola, Forecasting Next-Day Electricity Prices by Time Series Models, IEEE Transactions on Power Systems, 17 (2002), 342-348
##[10]
L.-X. Wang, A Course In Fuzzy Systems And Control , Prentice-Hall, Inc. Upper Saddle River, NJ, USA (1997)
##[11]
J. J. Buckley , Universal fuzzy controllers, Automatica , 28 (1992), 1245-1248
##[12]
R. A. Waltz, J. L. Morales, J. Nocedal, D. Orban , An interior algorithm for nonlinear optimization that combines line search and trust region steps, Mathematical Programming , 107 (2006), 391-408
##[13]
Radial Basis Function , Radial Basis Networks (Neural Network Toolbox), MATLAB 7.1, (2006)
##[14]
Whei-Min Lin, Hong-Jey Gow, Ming-Tang Tsai , Electricity price forecasting using Enhanced Probability Neural Network, Energy Conversion and Management , 51 (2010), 2707-2714
]
Optimizing of Spatial Domain Watermark Recovery Algorithm by Laplacian Filter
Optimizing of Spatial Domain Watermark Recovery Algorithm by Laplacian Filter
en
en
In this paper, impact of a Laplacian filter in better watermark recovery in the spatial domain watermarking algorithms has been investigated. A Laplacian filter is an enhancement filter, this filter could be utilized to optimize extraction of the watermark information in spatial domain watermarking. The distinction between the watermark and unwatermarked part is increased by this filter. Thus, watermark could be extracted significantly better by the watermark recovery algorithm. To show effectiveness of Laplacian filter on the spatial domain watermarking algorithms, it is applied on a typical correlation based method. Several experiments are done to show that performance of correlation based watermarking algorithm is improved by applying this filter before watermark extraction procedure.
247
256
Mehdi
Alirezanejad
Saeed
Amirgholipour
Vahid
Saffari
Moein
Arab
Shahin
Aslani
Laplacian Filter
Digital Image Watermarking
Correlation Based Watermarking
Spatial Domain Watermarking.
Article.7.pdf
[
[1]
Saied Kasmani Amirgholipour, Ahmadreza Naghsh-Nilchi, A new robust digital image watermarking technique based on joint DWT-DCT transformation, In Convergence and Hybrid Information Technology, ICCIT'08. Third International Conference on, IEEE. , 2 (2008), 539-544
##[2]
Saeed K. Amirgholipour, Ahmad Reza Naghsh-Nilchi, Robust Digital Image Watermarking Based on Joint DWT-DCT, JDCTA , 3 (2009), 42-54
##[3]
Saied Amirgholipour Kasmani, Meysam Mahfouzi, Mohsen Asfia, A New Pre-processing Approach to Improve DCT-Based Watermarkings Extraction, In Computer Science and Information Technology-Spring Conference, 2009. IACSITSC'09. International Association of, IEEE. , (2009), 131-135
##[4]
Vidyasagar M. Potdar, Song Han, Elizabeth Chang, A survey of digital image watermarking techniques, In Industrial Informatics, INDIN'05. 3rd IEEE International Conference on, (2005), 709-716
##[5]
Saeed Amirgholipour, Ahmad Reza Naghsh-Nilchi, Aboosaleh Mohammad Sharifi, Mehdi Alirezanejad, Moien Arab, Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking, The Journal of Mathematics and Computer Science (JMCS), 11 (2014), 137-146
##[6]
Geert Depovere, Ton Kalker, J-P. Linnartz, Improved watermark detection reliability using filtering before correlation, In Image Processing, ICIP 98. Proceedings. International Conference on, 1 (1998), 430-434
##[7]
M. Alirezanejad, V. Saffari, S. Amirgholipour, A. M. Sharifi, Effect of Locations of Using High Boost Filtering on the Watermark Recovery in Spatial Domain Watermarking, Indian Journal of Science and Technology, 7 (2014), 517-524
##[8]
Wai C. Chu, DCT-based image watermarking using subsampling, Multimedia, IEEE Transactions on , 5 (2003), 34-38
##[9]
Shinfeng D. Lin, Chin-Feng Chen, A robust DCT-based watermarking for copyright protection, Consumer Electronics, IEEE Transactions on , 46 (2000), 415-421
##[10]
W. Lu, W. Sun, H. Lu, Robust watermarking based on DWT and nonnegative matrix factorization, Computers & Electrical Engineering, 35(1) (2009), 183-188
##[11]
G. Sun, Y. Yu, DWT based watermarking algorithm of color images, In Industrial Electronics and Applications, ICIEA 2007. 2nd IEEE Conference on, (2007), 1823-1826
##[12]
Martin Kutter, Stefan Winkler, A vision-based masking model for spread-spectrum image watermarking, Image Processing, IEEE Transactions on , 11 (2002), 16-25
##[13]
Dušan Levický, Peter Foriš, Human visual system models in digital image watermarking, Radioengineering , 13 (2004), 38-43
##[14]
P. B. Nguyen, A. Beghdadi, M. Luong, Robust watermarking in DoG scale space using a multi-scale JND model, In Advances in Multimedia Information Processing-PCM, Springer Berlin Heidelberg, (2009), 561-573
##[15]
M. Bouchakour, G. Jeannic, F. Autrusseau, JND mask adaptation for wavelet domain watermarking, In Multimedia and Expo, IEEE International Conference on, (2008), 201-204
##[16]
Q. Li, I. J. Cox, Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking, Information Forensics and Security, IEEE Transactions on, 2(2) (2007), 127-139
##[17]
S. Arnirgholipour, A. Sharifi, A Pre-Filtering Method to Improve Watermark Detection Rate in DCT Based Watermarking, International Arab Journal of Information Technology (IAJIT), 11 (2014), 178-185
##[18]
Zhigeng Pan, Li Li, Mingmin Zhang, David Zhang, Watermark extraction by magnifying noise and applying global minimum decoder, In Image and Graphics, Proceedings. Third International Conference on, (2004), 349-352
##[19]
Rafael C. Gonzalez, Richard E. Woods, Digital Image Processing: Introduction, Upper Saddle River, NJ (2002)
]
Mild Solution to Fractional Boundary Value Problem with Nonlinear Boundary Conditions
Mild Solution to Fractional Boundary Value Problem with Nonlinear Boundary Conditions
en
en
In this paper, we consider a system of boundary value problems for fractional differential equation given by
\[
\begin{cases}
^cD^\alpha_{0^+}u(t)=A u(t)+f(t,u(t))+\int^t_0 q(t-s)g(s,u(s))ds, t\in I= [0,T], q\in (0,T), t\neq t_k\\
\Delta u(t_k)=I_k(u(t^-_k)), \Delta \acute{u}(t_k)=J_k(u(t^-_k)), k=1,2,...,m,\\
u(0)=u_0\in X,\quad \acute{u}(0)=u_1\in X,
\end{cases}
\]
where \(^cD^\alpha_{0^+}\) is Caputo's fractional derivative of order \(\alpha, A: D(A)\subset X\rightarrow X\) is a sectorial operator of type (\(M,\theta,\alpha,\mu\)) on a Banach space \(X, 0=t_0<t_1<t_2<...<t_m<t_{m+1}=T,I_k,J_k: \mathbb{R}\rightarrow \mathbb{R}, \Delta x(t_k):= x(t^+_k)-x(t^-_k),x(t^-_k)=\lim_{h\rightarrow 0^-}x(t_k+h),x(t^+_k)=\lim_{h\rightarrow 0^+}x(t_k+h), I_k,J_k\in C(X,X)(k=1,2,...,m)\) are bounded function, the functions \(f,g: I\times X\rightarrow X\) are given operators satisfying some assumptions and \(q: I\rightarrow X\) is a integrable function on I. Several existence results of mild solutions are obtained.
257
280
Shirin
Eivani
Caputo's fractional derivative
Sectorial operator
Mild solution
Analytic solution operators.
Article.8.pdf
[
[1]
R. P. Agarwal, M. Benchohra, B. A. Slimani, Existence results for differential equations with fractional order and impulses , Mem. Differential Equations Math. Phys. , 44 (2008), 1-21
##[2]
B. Ahmad, S. Sivasundaram, Existence of solutions for impulsive integral boundary value problems of fractional order, Nonlinear Anal. Hybrid Syst. , 4 (2010), 134-141
##[3]
E. Bazhlekova, Fractional evolution equations in Banach spaces, Ph.D. Thesis, Eindhoven University of Technology (2001)
##[4]
M. Benchohra, B. A. Slimani, Existence and uniqueness of solutions to impulsive fractional differential equations, Electron. J. Differential Equations, 10 (2009), 1-11
##[5]
L. Byszewski, Differential and functional-differential problems with nonlocal conditions, in: Monograph, Cracow University of Technology, Cracow, vol. 184 (1995)
##[6]
A. Granas, J. Dugundji, Fixed Point Theory, Springer-Verlag, New York (2003)
##[7]
R. Hilfer, Applications of fractional calculus in physics, Singapore , World Scientific Publishing Co (2000)
##[8]
A. A. Kilbas, H. M. Srivastava, J. J. Trujillo , Theory and Applications of Fractional Differential Equations, Elsevier, Amsterdam (2006)
##[9]
A. Lunardi, Analytic Semigroups and Optimal Regularity in Parabolic Problems, Basel, Boston, Berlin (1995)
##[10]
G. M. Mophou, Existence and uniqueness of mild solutions to impulsive fractional differential equations, Nonlinear Anal., 72 (2010), 1604-1615
##[11]
I. Podlubny, Fractional Differential Equations, Academic Press, New York (1999)
##[12]
J. Prȕss, Evolutionary Integral Equations and Applications, Birkhäuser, Basel, Boston, Berlin (1993)
##[13]
X. B. Shu, Q. Wang, The existence and uniqueness of mild solutions for fractional differential equations with nonlocal conditions of order \(1 <\alpha < 2\), Computers and Mathematics with Applications, 64 (2012), 2100-2110
##[14]
J. Sabatier, O. P. Agrawal, J. A. Tenreiro Machado, Advances in fractional calculus, Springer, (2007)
##[15]
G. Samko, A. Kilbas, O. Marichev, Fractional Integrals and Derivatives: Theory and Applications, Gordon and Breach, Amsterdam (1993)
##[16]
Xiao-Bao Shu, Yongzeng Lai, Yuming Chen , The existence of mild solutions for impulsive fractional partial differential equations , Nonlinear Anal. , 74 (2011), 2003-2011
##[17]
D. R. Smart, Fixed Point Theorems, Cambridge University Press, (1980)
##[18]
Mohsen Alipour, Davood Rostamy, Solving Nonlinear Fractional Differential Equations by Bernste in polynomial Operational Matrices, J. Math. Computer Sci., TJMCS, 5 (2012), 185-196
##[19]
M. Bagheri, M. Bagheri, E. Miralikatouli, Comparison Differential Transform Method with Homotopy Perturbation Method for Nonlinear Integral Equations , J. Math. Computer Sci., TJMCS, 5 (2012), 288-296
##[20]
N. Nyamoradi , Existence of positive for third-order boundary value problems, J. Math. Computer Sci., TJMCS, 4 (2012), 8-18
]