Nothing Special   »   [go: up one dir, main page]

Next Issue
Volume 10, October
Previous Issue
Volume 10, August
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 

Symmetry, Volume 10, Issue 9 (September 2018) – 66 articles

Cover Story (view full-size image): We investigated decaying dark energy in light of the most recent observationally-determined datasets. Our results suggest that the accelerated expansion of the Universe is well described by the cosmological constant, and we argue that forthcoming observations will play a determinant role in constraining/ruling out decaying dark energy. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
16 pages, 8161 KiB  
Article
Effect of Plastic Anisotropy on the Distribution of Residual Stresses and Strains in Rotating Annular Disks
by Woncheol Jeong, Sergei Alexandrov and Lihui Lang
Symmetry 2018, 10(9), 420; https://doi.org/10.3390/sym10090420 - 19 Sep 2018
Cited by 6 | Viewed by 3313
Abstract
Hill’s quadratic orthotropic yield criterion is used for revealing the effect of plastic anisotropy on the distribution of stresses and strains within rotating annular polar orthotropic disks of constant thickness under plane stress. The associated flow rule is adopted for connecting the stresses [...] Read more.
Hill’s quadratic orthotropic yield criterion is used for revealing the effect of plastic anisotropy on the distribution of stresses and strains within rotating annular polar orthotropic disks of constant thickness under plane stress. The associated flow rule is adopted for connecting the stresses and strain rates. Assuming that unloading is purely elastic, the distribution of residual stresses and strains is determined as well. The solution for strain rates reduces to one nonlinear ordinary differential equation and two linear ordinary differential equations, even though the boundary value problem involves two independent variables. The aforementioned differential equations can be solved one by one. This significantly simplifies the numerical treatment of the general boundary value problem and increases the accuracy of its solution. In particular, comparison with a finite difference solution is made. It is shown that the finite difference solution is not accurate enough for some applications. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of a rotating annular disk.</p>
Full article ">Figure 2
<p>Effect of anisotropic properties on the distribution of the radial stress in an <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> disk.</p>
Full article ">Figure 3
<p>Effect of anisotropic properties on the distribution of the circumferential stress in an <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> disk.</p>
Full article ">Figure 4
<p>Effect of anisotropic properties on the distribution of the residual radial stress in an <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> disk.</p>
Full article ">Figure 5
<p>Effect of anisotropic properties on the distribution of the residual circumferential stress in an <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> disk.</p>
Full article ">Figure 6
<p>Effect of anisotropic properties on the distribution of the radial strain in an <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> disk.</p>
Full article ">Figure 7
<p>Effect of anisotropic properties on the distribution of the circumferential strain in an <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> disk.</p>
Full article ">Figure 8
<p>Effect of anisotropic properties on the distribution of the axial strain in an <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> disk.</p>
Full article ">Figure 9
<p>Effect of anisotropic properties on the distribution of the radial plastic strain in an <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> disk.</p>
Full article ">Figure 10
<p>Effect of anisotropic properties on the distribution of the circumferential plastic strain in an <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> disk.</p>
Full article ">Figure 11
<p>Effect of anisotropic properties on the distribution of the axial plastic strain in an <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> disk.</p>
Full article ">Figure 12
<p>Effect of anisotropic properties on the distribution of the residual radial strain in an <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> disk.</p>
Full article ">Figure 13
<p>Effect of anisotropic properties on the distribution of the residual circumferential strain in an <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> disk.</p>
Full article ">Figure 14
<p>Effect of anisotropic properties on the distribution of the residual axial strain in an <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math> disk.</p>
Full article ">Figure 15
<p>Yield loci for several materials.</p>
Full article ">
21 pages, 307 KiB  
Article
Probabilistic Single-Valued (Interval) Neutrosophic Hesitant Fuzzy Set and Its Application in Multi-Attribute Decision Making
by Songtao Shao, Xiaohong Zhang, Yu Li and Chunxin Bo
Symmetry 2018, 10(9), 419; https://doi.org/10.3390/sym10090419 - 19 Sep 2018
Cited by 25 | Viewed by 3312
Abstract
The uncertainty and concurrence of randomness are considered when many practical problems are dealt with. To describe the aleatory uncertainty and imprecision in a neutrosophic environment and prevent the obliteration of more data, the concept of the probabilistic single-valued (interval) neutrosophic hesitant fuzzy [...] Read more.
The uncertainty and concurrence of randomness are considered when many practical problems are dealt with. To describe the aleatory uncertainty and imprecision in a neutrosophic environment and prevent the obliteration of more data, the concept of the probabilistic single-valued (interval) neutrosophic hesitant fuzzy set is introduced. By definition, we know that the probabilistic single-valued neutrosophic hesitant fuzzy set (PSVNHFS) is a special case of the probabilistic interval neutrosophic hesitant fuzzy set (PINHFS). PSVNHFSs can satisfy all the properties of PINHFSs. An example is given to illustrate that PINHFS compared to PSVNHFS is more general. Then, PINHFS is the main research object. The basic operational relations of PINHFS are studied, and the comparison method of probabilistic interval neutrosophic hesitant fuzzy numbers (PINHFNs) is proposed. Then, the probabilistic interval neutrosophic hesitant fuzzy weighted averaging (PINHFWA) and the probability interval neutrosophic hesitant fuzzy weighted geometric (PINHFWG) operators are presented. Some basic properties are investigated. Next, based on the PINHFWA and PINHFWG operators, a decision-making method under a probabilistic interval neutrosophic hesitant fuzzy circumstance is established. Finally, we apply this method to the issue of investment options. The validity and application of the new approach is demonstrated. Full article
16 pages, 780 KiB  
Article
Four Operators of Rough Sets Generalized to Matroids and a Matroidal Method for Attribute Reduction
by Jingqian Wang and Xiaohong Zhang
Symmetry 2018, 10(9), 418; https://doi.org/10.3390/sym10090418 - 19 Sep 2018
Cited by 6 | Viewed by 2516
Abstract
Rough sets provide a useful tool for data preprocessing during data mining. However, many algorithms related to some problems in rough sets, such as attribute reduction, are greedy ones. Matroids propose a good platform for greedy algorithms. Therefore, it is important to study [...] Read more.
Rough sets provide a useful tool for data preprocessing during data mining. However, many algorithms related to some problems in rough sets, such as attribute reduction, are greedy ones. Matroids propose a good platform for greedy algorithms. Therefore, it is important to study the combination between rough sets and matroids. In this paper, we investigate rough sets and matroids through their operators, and provide a matroidal method for attribute reduction in information systems. Firstly, we generalize four operators of rough sets to four operators of matroids through the interior, closure, exterior and boundary axioms, respectively. Thus, there are four matroids induced by these four operators of rough sets. Then, we find that these four matroids are the same one, which implies the relationship about operators between rough sets and matroids. Secondly, a relationship about operations between matroids and rough sets is presented according to the induced matroid. Finally, the girth function of matroids is used to compute attribute reduction in information systems. Full article
(This article belongs to the Special Issue Discrete Mathematics and Symmetry)
12 pages, 404 KiB  
Article
Some Results on Multigranulation Neutrosophic Rough Sets on a Single Domain
by Hu Zhao and Hong-Ying Zhang
Symmetry 2018, 10(9), 417; https://doi.org/10.3390/sym10090417 - 19 Sep 2018
Cited by 3 | Viewed by 2555
Abstract
As a generalization of single value neutrosophic rough sets, the concept of multi-granulation neutrosophic rough sets was proposed by Bo et al., and some basic properties of the pessimistic (optimistic) multigranulation neutrosophic rough approximation operators were studied. However, they did not do a [...] Read more.
As a generalization of single value neutrosophic rough sets, the concept of multi-granulation neutrosophic rough sets was proposed by Bo et al., and some basic properties of the pessimistic (optimistic) multigranulation neutrosophic rough approximation operators were studied. However, they did not do a comprehensive study on the algebraic structure of the pessimistic (optimistic) multigranulation neutrosophic rough approximation operators. In the present paper, we will provide the lattice structure of the pessimistic multigranulation neutrosophic rough approximation operators. In particular, in the one-dimensional case, for special neutrosophic relations, the completely lattice isomorphic relationship between upper neutrosophic rough approximation operators and lower neutrosophic rough approximation operators is proved. Full article
(This article belongs to the Special Issue Discrete Mathematics and Symmetry)
Show Figures

Figure 1

Figure 1
<p>Correspondence relationship among three complete lattices.</p>
Full article ">
16 pages, 1292 KiB  
Article
Intrasession Reliability of the Tests to Determine Lateral Asymmetry and Performance in Volleyball Players
by Mario Iglesias-Caamaño, Javier Carballo-López, Tania Álvarez-Yates, Alba Cuba-Dorado and Oscar García-García
Symmetry 2018, 10(9), 416; https://doi.org/10.3390/sym10090416 - 19 Sep 2018
Cited by 8 | Viewed by 4745
Abstract
The development of lateral asymmetries in athletes could have an influence on performance or injuries. The aim of this study was to determine the within-day reliability of the symmetry tests and the performance tests, and explore the relationship between them. Eighteen male volleyball [...] Read more.
The development of lateral asymmetries in athletes could have an influence on performance or injuries. The aim of this study was to determine the within-day reliability of the symmetry tests and the performance tests, and explore the relationship between them. Eighteen male volleyball players (18.1 ± 2.1 years) participated in this study. Seven lateral symmetry assessments were used, namely: lateral symmetry through tensiomyography (LS), active knee extension (AKE), Y-balance test (YBT), muscular electrical activity in attack jump (MEA-AJ), single-leg squat jump (SLSJ), triple hop test for distance (THTD), and bilateral maximum repetition in leg press (1RMSL); and three volleyball performance tests, namely: the T-test, counter-movement jump (CMJ), and attack jump (AJ). Three in-day measurements were taken from each volleyball player after the recovery was completed. The reliability was calculated through the intraclass correlation coefficient and the coefficient of variation, and the relationship was calculated through Pearson’s bivariate correlation coefficient (p < 0.05). The results indicate that AKE, YBT, and LS are the symmetry tests with increased reproducibility. THTD correlates positively with the AKE test and 1RMSL test, and a greater symmetry in the YBT correlates with a greater performance in the CMJ and AJ performance tests. In conclusion, AKE, LS, and YBT are the best tests to determine, with reliability, the asymmetries in volleyball players, and a greater symmetry in the YBT seems to influence the height of bilateral vertical jump. Full article
(This article belongs to the Special Issue Symmetry-Related Activity in Mid-Level Vision)
Show Figures

Figure 1

Figure 1
<p>Volleyball player in the supine position with the knee joint fixed at 40° knee flexion angle for the evaluation of knee extensors. Positioning of the tensiomyography electrodes and sensor on the rectus femoris.</p>
Full article ">Figure 2
<p>Sequence of the different phases of the attack jump in the Optojump™.</p>
Full article ">Figure 3
<p>Lateral symmetry by tensiomyography graph of both of an athlete’s biceps femoris, where the absolute differences between the maximum radial displacement (Dm), contraction time (Tc), and delay time (Td) of the right and left leg can be viewed. Biceps femoris of the right leg shows a greater maximum radial muscle belly displacement, as well a greater reaction and contraction time than the left leg.</p>
Full article ">Figure 4
<p>Superposition of two root mean square graphs of the rectus femoris of two-flight time measurement of a same athlete.</p>
Full article ">
12 pages, 287 KiB  
Article
Ground State Representations of Some Non-Rational Conformal Nets
by Yoh Tanimoto
Symmetry 2018, 10(9), 415; https://doi.org/10.3390/sym10090415 - 19 Sep 2018
Cited by 2 | Viewed by 2471
Abstract
We construct families of ground state representations of the U ( 1 ) -current net and of the Virasoro nets Vir c with central charge c 1 . We show that these representations are not covariant with respect to the original dilations, [...] Read more.
We construct families of ground state representations of the U ( 1 ) -current net and of the Virasoro nets Vir c with central charge c 1 . We show that these representations are not covariant with respect to the original dilations, and those on the U ( 1 ) -current net are not solitonic. Furthermore, by going to the dual net with respect to the ground state representations of Vir c , one obtains possibly new family of Möbius covariant nets on S 1 . Full article
(This article belongs to the Special Issue Mathematical Physics and Symmetry)
Show Figures

Figure 1

Figure 1
<p>The functions <math display="inline"><semantics> <mrow> <msub> <mi>g</mi> <mi>n</mi> </msub> <mrow> <mo>(</mo> <mo>−</mo> <msup> <mi>e</mi> <mrow> <mi>i</mi> <mi>θ</mi> </mrow> </msup> <mo>)</mo> </mrow> </mrow> </semantics></math> (the thick line) and <math display="inline"><semantics> <mrow> <mi>g</mi> <mo>(</mo> <mo>−</mo> <msup> <mi>e</mi> <mrow> <mi>i</mi> <mi>θ</mi> </mrow> </msup> <mo>)</mo> </mrow> </semantics></math> (the thin line above), restricted to <math display="inline"><semantics> <mrow> <mn>0</mn> <mo>≤</mo> <mi>θ</mi> <mo>≤</mo> <mn>2</mn> <mi>π</mi> </mrow> </semantics></math>.</p>
Full article ">
19 pages, 3475 KiB  
Article
Emotion Classification Using a Tensorflow Generative Adversarial Network Implementation
by Traian Caramihale, Dan Popescu and Loretta Ichim
Symmetry 2018, 10(9), 414; https://doi.org/10.3390/sym10090414 - 19 Sep 2018
Cited by 21 | Viewed by 6869
Abstract
The detection of human emotions has applicability in various domains such as assisted living, health monitoring, domestic appliance control, crowd behavior tracking real time, and emotional security. The paper proposes a new system for emotion classification based on a generative adversarial network (GAN) [...] Read more.
The detection of human emotions has applicability in various domains such as assisted living, health monitoring, domestic appliance control, crowd behavior tracking real time, and emotional security. The paper proposes a new system for emotion classification based on a generative adversarial network (GAN) classifier. The generative adversarial networks have been widely used for generating realistic images, but the classification capabilities have been vaguely exploited. One of the main advantages is that by using the generator, we can extend our testing dataset and add more variety to each of the seven emotion classes we try to identify. Thus, the novelty of our study consists in increasing the number of classes from N to 2N (in the learning phase) by considering real and fake emotions. Facial key points are obtained from real and generated facial images, and vectors connecting them with the facial center of gravity are used by the discriminator to classify the image as one of the 14 classes of interest (real and fake for seven emotions). As another contribution, real images from different emotional classes are used in the generation process unlike the classical GAN approach which generates images from simple noise arrays. By using the proposed method, our system can classify emotions in facial images regardless of gender, race, ethnicity, age and face rotation. An accuracy of 75.2% was obtained on 7000 real images (14,000, also considering the generated images) from multiple combined facial datasets. Full article
(This article belongs to the Special Issue Deep Learning for Facial Informatics)
Show Figures

Figure 1

Figure 1
<p>Different GAN (generative adversarial network) implementations: (<b>a</b>) Conditional GAN [<a href="#B19-symmetry-10-00414" class="html-bibr">19</a>]; (<b>b</b>) Semi-Supervised GAN [<a href="#B29-symmetry-10-00414" class="html-bibr">29</a>]; (<b>c</b>) Info-GAN [<a href="#B58-symmetry-10-00414" class="html-bibr">58</a>].</p>
Full article ">Figure 2
<p>Proposed GAN architecture.</p>
Full article ">Figure 3
<p>Images resulted from dlib detector (<b>a</b>) 68 points; (<b>b</b>) Initial image with facial key points; (<b>c</b>) 51 extracted facial key points.</p>
Full article ">Figure 4
<p>Center of gravity and connections with facial key points.</p>
Full article ">Figure 5
<p>Computing the offset to correct face tilt.</p>
Full article ">Figure 6
<p>Discriminator architecture.</p>
Full article ">Figure 7
<p>Generator architecture.</p>
Full article ">Figure 8
<p>Discriminator and generator adapted for the operational phase: (<b>a</b>) Discriminator; (<b>b</b>) Generator.</p>
Full article ">Figure 9
<p>Sample images from the selected datasets.</p>
Full article ">Figure 10
<p>Generator results.</p>
Full article ">
10 pages, 257 KiB  
Article
On Fitting Ideals of Kahler Differential Module
by Nurbige Turan and Necati Olgun
Symmetry 2018, 10(9), 413; https://doi.org/10.3390/sym10090413 - 19 Sep 2018
Viewed by 2566
Abstract
Let k be an algebraically closed field of characteristic zero, and R / I and S / J be algebras over k . 1 ( R / I ) and 1 ( S / J ) denote universal module of first [...] Read more.
Let k be an algebraically closed field of characteristic zero, and R / I and S / J be algebras over k . 1 ( R / I ) and 1 ( S / J ) denote universal module of first order derivation over k . The main result of this paper asserts that the first nonzero Fitting ideal 1 ( R / I k S / J ) is an invertible ideal, if the first nonzero Fitting ideals 1 ( R / I ) and 1 ( S / J ) are invertible ideals. Then using this result, we conclude that the projective dimension of 1 ( R / I k S / J ) is less than or equal to one. Full article
(This article belongs to the Special Issue Mathematical Physics and Symmetry)
24 pages, 7071 KiB  
Article
Modeling and Control for a Multi-Rope Parallel Suspension Lifting System under Spatial Distributed Tensions and Multiple Constraints
by Naige Wang, Guohua Cao, Lu Yan and Lei Wang
Symmetry 2018, 10(9), 412; https://doi.org/10.3390/sym10090412 - 18 Sep 2018
Cited by 10 | Viewed by 4020
Abstract
The modeling and control of the multi-rope parallel suspension lifting system (MPSLS) are investigated in the presence of different and spatial distributed tensions; unknown boundary disturbances; and multiple constraints, including time varying geometric constraint, input saturation, and output constraint. To describe the system [...] Read more.
The modeling and control of the multi-rope parallel suspension lifting system (MPSLS) are investigated in the presence of different and spatial distributed tensions; unknown boundary disturbances; and multiple constraints, including time varying geometric constraint, input saturation, and output constraint. To describe the system dynamics more accurately, the MPSLS is modelled by a set of partial differential equations and ordinary differential equations (PDEs-ODEs) with multiple constraints, which is a nonhomogeneous and coupled PDEs-ODEs, and makes its control more difficult. Adaptive boundary control is a recommended method for position regulation and vibration degradation of the MPSLS, where adaptation laws and a boundary disturbance observer are formulated to handle system uncertainties. The system stability is rigorously proved by using Lyapunov’s direct method, and the position and vibration eventually diminish to a bounded neighborhood of origin. The original PDEs-ODEs are solved by finite difference method, and the multiple constraints problem is processed simultaneously. Finally, the performance of the proposed control is demonstrated by both the results of ADAMS simulation and numerical calculation. Full article
(This article belongs to the Special Issue Symmetry and Engineering Design)
Show Figures

Figure 1

Figure 1
<p>A multi-rope parallel suspension lifting system (MPSLS).</p>
Full article ">Figure 2
<p>Control block diagram.</p>
Full article ">Figure 3
<p>ADAMS model.</p>
Full article ">Figure 4
<p>Simulation results: ADAMS simulation in red line and Numerical calculation in black line.</p>
Full article ">Figure 5
<p>Displacement of the system without input: (<b>a</b>) 3D transverse displacement; (<b>b</b>) Midpoint and boundary displacements of the system.</p>
Full article ">Figure 6
<p>3D transverse displacement: (<b>a</b>) Control law Equation (34); (<b>b</b>) Control law Equation (47); (<b>c</b>) Control law PID.</p>
Full article ">Figure 7
<p>Transverse displacement of the sinking platform with different cases: (<b>a</b>) The displacement of the sinking platform; (<b>b</b>) The displacement of the lifting container.</p>
Full article ">Figure 8
<p>Control input: (<b>a</b>) Control law Equation (34); (<b>b</b>) Control law Equation (47); (<b>c</b>) Control law PID.</p>
Full article ">Figure 8 Cont.
<p>Control input: (<b>a</b>) Control law Equation (34); (<b>b</b>) Control law Equation (47); (<b>c</b>) Control law PID.</p>
Full article ">Figure 9
<p>The boundary disturbance estimate under the model-based control Equation (47).</p>
Full article ">Figure 10
<p>Parameter estimations with adaptive boundary control Equation (47).</p>
Full article ">
16 pages, 283 KiB  
Article
Dark Energy and Dark Matter Interaction: Kernels of Volterra Type and Coincidence Problem
by Alexander B. Balakin and Alexei S. Ilin
Symmetry 2018, 10(9), 411; https://doi.org/10.3390/sym10090411 - 18 Sep 2018
Cited by 9 | Viewed by 3448
Abstract
We study a new exactly solvable model of coupling of the Dark Energy and Dark Matter, in the framework of which the kernel of non-gravitational interaction is presented by the integral Volterra-type operator well-known in the classical theory of fading memory. Exact solutions [...] Read more.
We study a new exactly solvable model of coupling of the Dark Energy and Dark Matter, in the framework of which the kernel of non-gravitational interaction is presented by the integral Volterra-type operator well-known in the classical theory of fading memory. Exact solutions of this isotropic homogeneous cosmological model were classified with respect to the sign of the discriminant of the cubic characteristic polynomial associated with the key equation of the model. Energy-density scalars of the Dark Energy and Dark Matter, the Hubble function and acceleration parameter are presented explicitly; the scale factor is found in quadratures. Asymptotic analysis of the exact solutions has shown that the Big Rip, Little Rip, Pseudo Rip regimes can be realized with the specific choice of guiding parameters of the model. We show that the Coincidence problem can be solved if we consider the memory effect associated with the interactions in the Dark Sector of the universe. Full article
(This article belongs to the Special Issue Cosmological Inflation, Dark Matter and Dark Energy)
16 pages, 4284 KiB  
Article
Chiral Proportions of Nepheline Originating from Low-Viscosity Alkaline Melts. A Pilot Study
by Ewald Hejl and Friedrich Finger
Symmetry 2018, 10(9), 410; https://doi.org/10.3390/sym10090410 - 18 Sep 2018
Cited by 4 | Viewed by 3297
Abstract
Chromatographic interaction between infiltrating solutions of racemic mixtures of enantiomers and enantiomorphic minerals with chiral excess has been proposed as a scenario for the emergence of biomolecular homochirality. Enantiomer separation is supposed to be produced by different partition coefficients of both enantiomers with [...] Read more.
Chromatographic interaction between infiltrating solutions of racemic mixtures of enantiomers and enantiomorphic minerals with chiral excess has been proposed as a scenario for the emergence of biomolecular homochirality. Enantiomer separation is supposed to be produced by different partition coefficients of both enantiomers with regard to crystal faces or walls of capillary tubes in the enantiomorphic mineral. Besides quartz, nepheline is the only common magmatic mineral with enantiomorphic symmetry. It crystallizes from SiO2-undersaturated melts with low viscosity and is a promising candidate for chiral enrichment by autocatalytic secondary nucleation. Under liquidus conditions, the dynamic viscosity of silicate melts is mainly a function of polymerization. Melts with low concentrations of SiO2 (<55 wt%) and rather high concentrations of Na2O (>7 wt%) are only slightly polymerized and hence are characterized by low viscosities. Such melts can ascend, intrude or extrude by turbulent flow. Fourteen volcanic and subvolcanic samples from alkaline provinces in Africa and Sweden were chemically analyzed. Polished thin sections containing fresh nepheline phenocrysts were etched with 1% hydrofluoric acid at 20 °C for 15 to 25 min. Nepheline crystals suitable for a statistical evaluation of their etch figures were found in four samples. Crystals with chiral etch figures are mainly not twinned. Their chiral proportions in grain percentages of single crystals are close to parity in three samples. Only one sample shows a slight chiral excess (41.67% L-type vs. 58.33% D-type) but at a low level of significance (15 vs. 21 crystals, respectively). Full article
(This article belongs to the Special Issue Possible Scenarios for Homochirality on Earth)
Show Figures

Figure 1

Figure 1
<p>Crossplot of dynamic viscosity (<span class="html-italic">η</span>) vs. hydraulic diameter (<span class="html-italic">L</span>) with corresponding Reynold’s numbers (both 500 and 2500) for a melt density (<span class="html-italic">ρ</span>) of 2800 kg/m<sup>3</sup>, and for various flow velocities (<span class="html-italic">v</span>) between 1 mm/s and 100 m/s. Dynamic viscosities on the right-hand side according to [<a href="#B22-symmetry-10-00410" class="html-bibr">22</a>,<a href="#B29-symmetry-10-00410" class="html-bibr">29</a>,<a href="#B31-symmetry-10-00410" class="html-bibr">31</a>].</p>
Full article ">Figure 2
<p>Schematic representation of crystallization under different magmatic conditions. (<b>a</b>) Early unconstrained crystallization in a mainly liquid environment. (<b>b</b>) Late interstitial crystallization in the pores between earlier crystallized phenocrysts. (<b>c</b>) Crystallization in liquid droplets of an expanding current of hot volcanic gas (ignimbrite or pyroclastic flow). Bold circular arrows symbolize turbulent mixing; dashed circular arrows symbolize low probability of turbulence.</p>
Full article ">Figure 3
<p>Phase relations in the system NaAlSiO<sub>4</sub>-KAlSiO<sub>4</sub>-SiO<sub>2</sub>. The relative proportions of components represent mass concentrations (wt%). (<b>a</b>) Phase relationships with corresponding liquidus temperatures at 1 bar water-vapour pressure according to [<a href="#B34-symmetry-10-00410" class="html-bibr">34</a>,<a href="#B35-symmetry-10-00410" class="html-bibr">35</a>,<a href="#B36-symmetry-10-00410" class="html-bibr">36</a>]. (<b>b</b>) Compositional areas with specific crystallization of nepheline (i.e., early, eutectic, or interstitial).</p>
Full article ">Figure 4
<p>Thin sections of nephelinite samples in transmitted light. (<b>a</b>) Strongly altered nepheline crystals (Ne) in nephelinite from the Tundulu Complex in Malawi; sample no. 6; BM.1980, P31 (27). (<b>b</b>) Porphyric nepheline (Ne) and green aegirine augite (Aeg) in a dark cryptocrystalline matrix; Kerimasi, Tanzania; sample no. 9; BM.1995, P6 (40). (<b>c</b>) Porphyric nepheline (Ne) and green aegirine augite (Aeg) together with fine-grained sanidine in a dark cryptocrystalline matrix; Kerimasi, Tanzania; sample no. 10; BM.1995, P6 (40). (<b>d</b>) Porphyric nepheline (Ne) and green aegirine augite (Aeg) in fine-grained to cryptocrystalline matrix (mainly sanidine); Oldoinyo Lengai, Tanzania; sample no. 11; BM.2004, P12 (28). Scale bars correspond to 500 µm.</p>
Full article ">Figure 5
<p>Idealized enantiomorphic single crystals of nepheline with asymmetric etch figures according to [<a href="#B13-symmetry-10-00410" class="html-bibr">13</a>,<a href="#B14-symmetry-10-00410" class="html-bibr">14</a>,<a href="#B50-symmetry-10-00410" class="html-bibr">50</a>,<a href="#B51-symmetry-10-00410" class="html-bibr">51</a>]. The hexagonal crystallographic c-axis corresponds to the X-axis of the optical indicatrix.</p>
Full article ">Figure 6
<p>Typical shapes of asymmetric etch figures on prism faces of nepheline, depending on the handedness of the crystal [<a href="#B13-symmetry-10-00410" class="html-bibr">13</a>,<a href="#B14-symmetry-10-00410" class="html-bibr">14</a>,<a href="#B50-symmetry-10-00410" class="html-bibr">50</a>,<a href="#B51-symmetry-10-00410" class="html-bibr">51</a>].</p>
Full article ">Figure 7
<p>Etch figures on nepheline crystals from East African nephelinite samples. (<b>a</b>) Left-handed etch figures (type a) in sample no. 9, BM.1995, P6 (40). (<b>b</b>) Left-handed etch figures (arrow: type b) in sample no. 9. (<b>c</b>) Left-handed etch figures (mainly type c) in sample no. 9. (<b>d</b>) Left-handed etch figures (arrow: type d) in sample no. 11, BM.2004, P12 (28). (<b>e</b>) Right-handed etch figures (mainly type c’) in sample no. 9. (<b>f</b>) left-handed (L) and right-handed (D) etch figures (type f and f’, respectively) in a twinned crystal of sample 10, BM.1995, P6 (43). Scale bars correspond to lengths of 10 µm (<b>a</b>,<b>c</b>–<b>f</b>), and 20 µm (<b>b</b>).</p>
Full article ">
7 pages, 209 KiB  
Article
Determining An Unknown Boundary Condition by An Iteration Method
by Dejian Huang, Yanqing Li and Donghe Pei
Symmetry 2018, 10(9), 409; https://doi.org/10.3390/sym10090409 - 18 Sep 2018
Viewed by 2318
Abstract
This paper investigates the boundary value in the heat conduction problem by a variational iteration method. Applying the iteration method, a sequence of convergent functions is constructed, the limit approximates the exact solution of the heat conduction equation in a few iterations using [...] Read more.
This paper investigates the boundary value in the heat conduction problem by a variational iteration method. Applying the iteration method, a sequence of convergent functions is constructed, the limit approximates the exact solution of the heat conduction equation in a few iterations using only the initial condition. This method does not require discretization of the variables. Numerical results show that this method is quite simple and straightforward for models that are currently under research. Full article
23 pages, 2400 KiB  
Article
BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security Solution
by Qianqian Xing, Baosheng Wang and Xiaofeng Wang
Symmetry 2018, 10(9), 408; https://doi.org/10.3390/sym10090408 - 17 Sep 2018
Cited by 30 | Viewed by 6287
Abstract
Without the design for inherent security, the Border Gateway Protocol (BGP) is vulnerable to prefix/subprefix hijacks and other attacks. Though many BGP security approaches have been proposed to prevent or detect such attacks, the unsatisfactory cost-effectiveness frustrates their deployment. In fact, the currently [...] Read more.
Without the design for inherent security, the Border Gateway Protocol (BGP) is vulnerable to prefix/subprefix hijacks and other attacks. Though many BGP security approaches have been proposed to prevent or detect such attacks, the unsatisfactory cost-effectiveness frustrates their deployment. In fact, the currently deployed BGP security infrastructure leaves the chance for potential centralized authority misconfiguration and abuse. It actually becomes the critical yield point that demands the logging and auditing of misbehaviors and attacks in BGP security deployments. We propose a blockchain-based Internet number resource authority and trustworthy management solution, named BGPcoin, to facilitate the transparency of BGP security. BGPcoin provides a reliable origin advertisement source for origin authentication by dispensing resource allocations and revocations compliantly against IP prefix hijacking. We perform and audit resource assignments on the tamper-resistant Ethereum blockchain by means of a set of smart contracts, which also interact as one to provide the trustworthy origin route examination for BGP. Compared with RPKI, BGPcoin yields significant benefits in securing origin advertisement and building a dependable infrastructure for the object repository. We demonstrate it through an Ethereum prototype implementation, and we deploy it and do experiment on a locally-simulated network and an official Ethereum test network respectively. The extensive experiment and evaluation demonstrate the incentives to deploy BGPcoin, and the enhanced security provided by BGPcoin is technically and economically feasible. Full article
(This article belongs to the Special Issue Information Technology and Its Applications 2021)
Show Figures

Figure 1

Figure 1
<p>Operators for IP address and AS number resource in BGPcoin. xIR represents one of the following: Regional Internet Registry (RIR), National Internet Registry (NIR) and Local Internet Registry (LIR).</p>
Full article ">Figure 2
<p>State machine model for the IP address resource.</p>
Full article ">Figure 3
<p>IP division cost for IPallocate/IPassign.</p>
Full article ">Figure 4
<p>Architecture of BGPcoin resource management.</p>
Full article ">Figure 5
<p>A case of RPKI authority misbehaving.</p>
Full article ">Figure 6
<p>Resource distribution in BGPcoin.</p>
Full article ">Figure 7
<p>Block gas cost and number of transactions in each block.</p>
Full article ">Figure 8
<p>Performance of two expensive operations: IP register and IP allocate.</p>
Full article ">
15 pages, 4237 KiB  
Article
Vertex Labeling and Routing for Farey-Type Symmetrically-Structured Graphs
by Wenchao Jiang, Yinhu Zhai, Zhigang Zhuang, Paul Martin, Zhiming Zhao and Jia-Bao Liu
Symmetry 2018, 10(9), 407; https://doi.org/10.3390/sym10090407 - 17 Sep 2018
Cited by 3 | Viewed by 5724
Abstract
The generalization of Farey graphs and extended Farey graphs all originate from Farey graphs. They are simultaneously scale-free and small-world. A labeling of the vertices for them are proposed here. All of the shortest paths between any two vertices in these two graphs [...] Read more.
The generalization of Farey graphs and extended Farey graphs all originate from Farey graphs. They are simultaneously scale-free and small-world. A labeling of the vertices for them are proposed here. All of the shortest paths between any two vertices in these two graphs can be determined only on their labels. The number of shortest paths between any two vertices is the product of two Fibonacci numbers; it is increasing almost linearly with the order or size of the graphs. However, the label-based routing algorithm runs in logarithmic time O(logn). Our efficient routing protocol for Farey-type models should help contribute toward the understanding of several physical dynamic processes. Full article
(This article belongs to the Special Issue Symmetry in Computing Theory and Application)
Show Figures

Figure 1

Figure 1
<p>The Farey graphs <math display="inline"><semantics> <mrow> <mi>F</mi> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>. (From left to right, <math display="inline"><semantics> <mrow> <mi>F</mi> <mo stretchy="false">(</mo> <mn>0</mn> <mo stretchy="false">)</mo> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>F</mi> <mo stretchy="false">(</mo> <mn>1</mn> <mo stretchy="false">)</mo> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>F</mi> <mo stretchy="false">(</mo> <mn>2</mn> <mo stretchy="false">)</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>F</mi> <mo stretchy="false">(</mo> <mn>3</mn> <mo stretchy="false">)</mo> </mrow> </semantics></math>).</p>
Full article ">Figure 2
<p>The construction of <math display="inline"><semantics> <mrow> <mi>F</mi> <mo stretchy="false">(</mo> <mi>t</mi> <mo>+</mo> <mn>1</mn> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>The generalization of Farey graphs. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>G</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mi>t</mi> <mo>,</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> at steps <span class="html-italic">t</span> = 0, 1 and 2 when <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>G</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mi>t</mi> <mo>,</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> at steps <span class="html-italic">t</span> = 0, 1 and 2 when <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 3 Cont.
<p>The generalization of Farey graphs. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>G</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mi>t</mi> <mo>,</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> at steps <span class="html-italic">t</span> = 0, 1 and 2 when <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>G</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mi>t</mi> <mo>,</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> at steps <span class="html-italic">t</span> = 0, 1 and 2 when <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>The extended Farey graphs. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>E</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mi>t</mi> <mo>,</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> at steps <span class="html-italic">t</span> = 0, 1 and 2 when <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>E</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mi>t</mi> <mo>,</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> at steps <span class="html-italic">t</span> = 0, 1 and 2 when <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4 Cont.
<p>The extended Farey graphs. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>E</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mi>t</mi> <mo>,</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> at steps <span class="html-italic">t</span> = 0, 1 and 2 when <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>E</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mi>t</mi> <mo>,</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> at steps <span class="html-italic">t</span> = 0, 1 and 2 when <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Labels of all vertices in <math display="inline"><semantics> <mrow> <mi>F</mi> <mo stretchy="false">(</mo> <mn>5</mn> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>The labeling of <math display="inline"><semantics> <mrow> <mi>G</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mi>t</mi> <mo>,</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>E</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mi>t</mi> <mo>,</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> at step <span class="html-italic">t</span> = 2 for <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>G</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mn>2</mn> <mo>,</mo> <mn>2</mn> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>E</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mn>2</mn> <mo>,</mo> <mn>2</mn> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 6 Cont.
<p>The labeling of <math display="inline"><semantics> <mrow> <mi>G</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mi>t</mi> <mo>,</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>E</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mi>t</mi> <mo>,</mo> <mi>k</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> at step <span class="html-italic">t</span> = 2 for <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>G</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mn>2</mn> <mo>,</mo> <mn>2</mn> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>E</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mn>2</mn> <mo>,</mo> <mn>2</mn> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>The projected graph of <math display="inline"><semantics> <mrow> <mi>G</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mn>2</mn> <mo>,</mo> <mn>2</mn> <mo stretchy="false">)</mo> </mrow> </semantics></math>/<math display="inline"><semantics> <mrow> <mi>E</mi> <mi>F</mi> <mo stretchy="false">(</mo> <mn>2</mn> <mo>,</mo> <mn>2</mn> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">
26 pages, 344 KiB  
Article
Limits of it-Soft Sets and Their Applications for Rough Sets
by Xiaoliang Xie and Jiali He
Symmetry 2018, 10(9), 406; https://doi.org/10.3390/sym10090406 - 17 Sep 2018
Viewed by 2977
Abstract
Soft set theory is a mathematical tool for handling uncertainty. This paper investigates the limits of the interval type of soft sets ( i t -soft sets). The notion of i t -soft sets is first introduced. Then, the limits of [...] Read more.
Soft set theory is a mathematical tool for handling uncertainty. This paper investigates the limits of the interval type of soft sets ( i t -soft sets). The notion of i t -soft sets is first introduced. Then, the limits of i t -soft sets are proposed and their properties obtained. Next, point-wise continuity of i t -soft sets and continuous i t -soft sets is discussed. Finally, an application for rough sets is given. Full article
18 pages, 299 KiB  
Article
Fixed Points Results in Algebras of Split Quaternion and Octonion
by Mobeen Munir, Asim Naseem, Akhtar Rasool, Muhammad Shoaib Saleem and Shin Min Kang
Symmetry 2018, 10(9), 405; https://doi.org/10.3390/sym10090405 - 17 Sep 2018
Cited by 2 | Viewed by 2836
Abstract
Fixed points of functions have applications in game theory, mathematics, physics, economics and computer science. The purpose of this article is to compute fixed points of a general quadratic polynomial in finite algebras of split quaternion and octonion over prime fields Z p [...] Read more.
Fixed points of functions have applications in game theory, mathematics, physics, economics and computer science. The purpose of this article is to compute fixed points of a general quadratic polynomial in finite algebras of split quaternion and octonion over prime fields Z p. Some characterizations of fixed points in terms of the coefficients of these polynomials are also given. Particularly, cardinalities of these fixed points have been determined depending upon the characteristics of the underlying field. Full article
(This article belongs to the Special Issue Discrete Mathematics and Symmetry)
22 pages, 588 KiB  
Article
A New Method to Decision-Making with Fuzzy Competition Hypergraphs
by Musavarah Sarwar, Muhammad Akram and Noura Omair Alshehri
Symmetry 2018, 10(9), 404; https://doi.org/10.3390/sym10090404 - 16 Sep 2018
Cited by 22 | Viewed by 3743
Abstract
Hypergraph theory is the most developed tool for demonstrating various practical problems in different domains of science and technology. Sometimes, information in a network model is uncertain and vague in nature. In this paper, our main focus is to apply the powerful methodology [...] Read more.
Hypergraph theory is the most developed tool for demonstrating various practical problems in different domains of science and technology. Sometimes, information in a network model is uncertain and vague in nature. In this paper, our main focus is to apply the powerful methodology of fuzziness to generalize the notion of competition hypergraphs and fuzzy competition graphs. We introduce various new concepts, including fuzzy column hypergraphs, fuzzy row hypergraphs, fuzzy competition hypergraphs, fuzzy k-competition hypergraphs and fuzzy neighbourhood hypergraphs, strong hyperedges, kth strength of competition and symmetric properties. We design certain algorithms for constructing different types of fuzzy competition hypergraphs. We also present applications of fuzzy competition hypergraphs in decision support systems, including predator–prey relations in ecological niche, social networks and business marketing. Full article
(This article belongs to the Special Issue Fuzzy Techniques for Decision Making 2018)
Show Figures

Figure 1

Figure 1
<p>Fuzzy digraph <math display="inline"><semantics> <mrow> <mover> <mi>G</mi> <mo>→</mo> </mover> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p><math display="inline"><semantics> <mrow> <mi mathvariant="script">R</mi> <mo>∘</mo> <mi mathvariant="script">H</mi> <mo stretchy="false">(</mo> <mover> <mi>G</mi> <mo>→</mo> </mover> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p><math display="inline"><semantics> <mrow> <mi mathvariant="script">C</mi> <mo>∘</mo> <mi mathvariant="script">H</mi> <mo stretchy="false">(</mo> <mover> <mi>G</mi> <mo>→</mo> </mover> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Representation of fuzzy relation in <math display="inline"><semantics> <mrow> <mover> <mi>G</mi> <mo>→</mo> </mover> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">Figure 5
<p>Fuzzy competition hypergraph <math display="inline"><semantics> <mrow> <mi mathvariant="script">CH</mi> <mo stretchy="false">(</mo> <mover> <mi>G</mi> <mo>→</mo> </mover> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p><math display="inline"> <semantics> <mrow> <mi mathvariant="script">DCH</mi> <mo stretchy="false">(</mo> <mover> <mi>G</mi> <mo>→</mo> </mover> <mo stretchy="false">)</mo> <mo>.</mo> </mrow> </semantics> </math></p>
Full article ">Figure 7
<p><math display="inline"> <semantics> <mrow> <mi mathvariant="script">NH</mi> <mo stretchy="false">(</mo> <mover> <mi>G</mi> <mo>→</mo> </mover> <mo stretchy="false">)</mo> <mo>.</mo> </mrow> </semantics> </math></p>
Full article ">Figure 8
<p>Fuzzy <math display="inline"><semantics> <mrow> <mn>0</mn> <mo>.</mo> <mn>2</mn> <mo>-</mo> </mrow> </semantics></math>competition hypergraph.</p>
Full article ">Figure 9
<p>Fuzzy graph <math display="inline"><semantics> <mrow> <mover> <mi>G</mi> <mo>→</mo> </mover> </mrow> </semantics></math>.</p>
Full article ">Figure 10
<p>Fuzzy open neighbourhood hypergraph of <span class="html-italic">G</span>.</p>
Full article ">Figure 11
<p>Fuzzy closed neighbourhood hypergraph.</p>
Full article ">Figure 12
<p>Fuzzy food web.</p>
Full article ">Figure 13
<p>Fuzzy common enemy hypergraph.</p>
Full article ">Figure 14
<p>Fuzzy marketing digraph.</p>
Full article ">Figure 15
<p>Fuzzy competition hypergraph.</p>
Full article ">Figure 16
<p>Fuzzy social digraph.</p>
Full article ">Figure 17
<p>Fuzzy influence hypergraph.</p>
Full article ">
10 pages, 670 KiB  
Article
Testing of Grouped Product for the Weibull Distribution Using Neutrosophic Statistics
by Muhammad Aslam and Osama H. Arif
Symmetry 2018, 10(9), 403; https://doi.org/10.3390/sym10090403 - 15 Sep 2018
Cited by 57 | Viewed by 3024
Abstract
Parts manufacturers use sudden death testing to reduce the testing time of experiments. The sudden death testing plan in the literature can only be applied when all observations of failure time/parameters are crisp. In practice however, it is noted that not all measurements [...] Read more.
Parts manufacturers use sudden death testing to reduce the testing time of experiments. The sudden death testing plan in the literature can only be applied when all observations of failure time/parameters are crisp. In practice however, it is noted that not all measurements of continuous variables are precise. Therefore, the existing sudden death test plan can be applied if failure data/or parameters are imprecise, incomplete, and fuzzy. The classical statistics have the special case of neutrosophic statistics when there are no fuzzy observations/parameters. The neutrosophic fuzzy statistics can be applied for the testing of manufacturing parts when observations are imprecise, incomplete and fuzzy. In this paper, we will design an original neutrosophic fuzzy sudden death testing plan for the inspection/testing of the electronic product or parts manufacturing. We will assume that the lifetime of the product follows the neutrosophic fuzzy Weibull distribution. The neutrosophic fuzzy operating function will be given and used to determine the neutrosophic fuzzy plan parameters through a neutrosophic fuzzy optimization problem. The results of the proposed neutrosophic fuzzy death testing plan will be implemented with the aid of an example. Full article
Show Figures

Figure 1

Figure 1
<p>Operational procedure of proposed plan.</p>
Full article ">
16 pages, 5231 KiB  
Article
Noise-Robust Sound-Event Classification System with Texture Analysis
by Yongju Choi, Othmane Atif, Jonguk Lee, Daihee Park and Yongwha Chung
Symmetry 2018, 10(9), 402; https://doi.org/10.3390/sym10090402 - 15 Sep 2018
Cited by 16 | Viewed by 3668
Abstract
Sound-event classification has emerged as an important field of research in recent years. In particular, investigations using sound data are being conducted in various industrial fields. However, sound-event classification tasks have become more difficult and challenging with the increase in noise levels. In [...] Read more.
Sound-event classification has emerged as an important field of research in recent years. In particular, investigations using sound data are being conducted in various industrial fields. However, sound-event classification tasks have become more difficult and challenging with the increase in noise levels. In this study, we propose a noise-robust system for the classification of sound data. In this method, we first convert one-dimensional sound signals into two-dimensional gray-level images using normalization, and then extract the texture images by means of the dominant neighborhood structure (DNS) technique. Finally, we experimentally validate the noise-robust approach by using four classifiers (convolutional neural network (CNN), support vector machine (SVM), k-nearest neighbors(k-NN), and C4.5). The experimental results showed superior classification performance in noisy conditions compared with other methods. The F1 score exceeds 98.80% in railway data, and 96.57% in livestock data. Besides, the proposed method can be implemented in a cost-efficient manner (for instance, use of a low-cost microphone) while maintaining high level of accuracy in noisy environments. This approach can be used either as a standalone solution or as a supplement to the known methods to obtain a more accurate solution. Full article
Show Figures

Figure 1

Figure 1
<p>Overall system structure of the proposed method.</p>
Full article ">Figure 2
<p>Conversion of two-dimensional gray-level image from a one-dimensional sound signal.</p>
Full article ">Figure 3
<p>Process of extracting texture image using the dominant neighborhood structure (DNS) algorithm.</p>
Full article ">Figure 4
<p>Convolutional neural network (CNN) structure for sound event classification.</p>
Full article ">Figure 5
<p>Sound waveform acquired from railway-point machine: (<b>a</b>) normal event, (<b>b</b>) gravel event, (<b>c</b>) ice-covered event, and (<b>d</b>) unscrewed event. Horizontal axis shows the time axis. and vertical axis displays the sound signal in dB.</p>
Full article ">Figure 5 Cont.
<p>Sound waveform acquired from railway-point machine: (<b>a</b>) normal event, (<b>b</b>) gravel event, (<b>c</b>) ice-covered event, and (<b>d</b>) unscrewed event. Horizontal axis shows the time axis. and vertical axis displays the sound signal in dB.</p>
Full article ">Figure 6
<p>Texture image of different types of events in railway-point machine: (<b>a</b>) normal event, (<b>b</b>) gravel event, (<b>c</b>) ice-covered event, and (<b>d</b>) unscrewed event.</p>
Full article ">Figure 7
<p>The two-step process of transforming sound signals into a texture image. The first step is the process of converting a sound signal into a 2D gray-level image, and the second step is the process of creating a noise-robust texture image by applying DNS: (<b>a</b>) noise-free (normal event), (<b>b</b>) SNR 18, (<b>c</b>) SNR 0, (<b>d</b>) wind, and (<b>e</b>) rain.</p>
Full article ">Figure 8
<p>Structural similarity (SSIM) comparison graph before and after applying DNS to railway-point-machine sound data under various noise conditions.</p>
Full article ">Figure 9
<p>Sound waveforms acquired for the case of respiratory diseases: (<b>a</b>) normal (grunt) event, (<b>b</b>) postweaning multisystemic wasting syndrome (PMWS) event, (<b>c</b>) porcine reproductive and respiratory syndrome (PRRS) event, and (<b>d</b>) mycoplasma hyopneumoniae (MH) event. Horizontal axis shows the time axis and vertical axis shows the sound signal in dB.</p>
Full article ">Figure 10
<p>Texture images of different types of events in the pigsty: (<b>a</b>) normal (grunt) event, (<b>b</b>) PMWS event, (<b>c</b>) PRRS event, and (<b>d</b>) MH event.</p>
Full article ">Figure 11
<p>Texture image of a normal (grunt) sound event in a noisy environment: (<b>a</b>) SNR 18, (<b>b</b>) SNR 0, (<b>c</b>) strong footstep, and (<b>d</b>) door opening.</p>
Full article ">Figure 12
<p>SSIM comparison graph before and after applying DNS to porcine sound data under various noise conditions.</p>
Full article ">
27 pages, 420 KiB  
Article
Symmetric Triangular Interval Type-2 Intuitionistic Fuzzy Sets with Their Applications in Multi Criteria Decision Making
by Sukhveer Singh and Harish Garg
Symmetry 2018, 10(9), 401; https://doi.org/10.3390/sym10090401 - 14 Sep 2018
Cited by 41 | Viewed by 4397
Abstract
Type-2 intuitionistic fuzzy set (T2IFS) is a powerful and important extension of the classical fuzzy set, intuitionistic fuzzy set to measure the vagueness and uncertainty. In a practical decision-making process, there always occurs an inter-relationship among the multi-input arguments. To deal with this [...] Read more.
Type-2 intuitionistic fuzzy set (T2IFS) is a powerful and important extension of the classical fuzzy set, intuitionistic fuzzy set to measure the vagueness and uncertainty. In a practical decision-making process, there always occurs an inter-relationship among the multi-input arguments. To deal with this point, the motivation of the present paper is to develop some new interval type-2 (IT2) intuitionistic fuzzy aggregation operators which can consider the multi interaction between the input argument. To achieve it, we define a symmetric triangular interval T2IFS (TIT2IFS), its operations, Hamy mean (HM) operator to aggregate the preference of the symmetric TIT2IFS and then shows its applicability through a multi-criteria decision making (MCDM). Several enviable properties and particular cases together with following different parameter values of this operator are calculated in detail. At last a numerical illustration is to given to exemplify the practicability of the proposed technique and a comparative analysis is analyzed in detail. Full article
(This article belongs to the Special Issue Fuzzy Techniques for Decision Making 2018)
Show Figures

Figure 1

Figure 1
<p>LMF (dashed), UMF (solid), FOU (shaded) for IT2FS <span class="html-italic">A</span>.</p>
Full article ">Figure 2
<p>LMF (dashed), UMF (solid), LNMF (doted), UNMF (solid), FOU (shaded) for IT2IFS <span class="html-italic">A</span>.</p>
Full article ">Figure 3
<p>Representation of STIT2IFN <math display="inline"><semantics> <mi>α</mi> </semantics></math>.</p>
Full article ">
15 pages, 2907 KiB  
Article
Change of Blink Rate in Viewing Virtual Reality with HMD
by Jungho Kim, Yadav Sunil Kumar, Jisang Yoo and Soonchul Kwon
Symmetry 2018, 10(9), 400; https://doi.org/10.3390/sym10090400 - 14 Sep 2018
Cited by 19 | Viewed by 5182
Abstract
The eye blink rate, a major human physiological response, directly affects ocular diseases, such as keratitis and dry eye syndrome. It has been shown that the eye blink rate in normal eyes has a certain frequency for individuals, from 6–30 times/min. It was [...] Read more.
The eye blink rate, a major human physiological response, directly affects ocular diseases, such as keratitis and dry eye syndrome. It has been shown that the eye blink rate in normal eyes has a certain frequency for individuals, from 6–30 times/min. It was suggested in a previous study that the eye blink rate can be decreased during the viewing of high-intensity and realistic content. Therefore, in this paper, we examine the change of the eye blink rate during the HMD (head-mounted display) viewing of VR (virtual reality) contents; accordingly, we propose an algorithm to measure the eye blink rate as well as compare and analyze this rate in three different environments (natural, monitor, and HMD). We confirmed that IPD (interpupillary distance) and phoria affected the eye blink rate in each environment. In this experiment, 21 subjects (28.38 ± 6.87 years) were selected, and a paired t-test was performed for changes in the eye blink rate over 1 min for each environment. The IPD and phoria effects on the eye blink rate were confirmed using the Spearman’s correlation coefficient. In this experiment, the eye blink rate was decreased in the monitor and HMD environments compared with the natural environment, while that in the HMD environment was decreased compared with the monitor environment. The results of the correlation analysis of far IPD and the eye blink rate show no statistical significance or correlation. The correlation analysis of near IPD and the eye blink rate showed a strong positive correlation of the eye blink rate in the monitor environment. The correlation analysis of distance phoria and the eye blink rate showed a strong negative correlation of the eye blink rate in the HMD environment. The correlation analysis of near-field phoria and the eye blink rate showed a strong negative correlation of the eye blink rate in the HMD environment. It is expected that the results of this study will be used as a VR-viewing recommendation. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed algorithm flowchart for Natural and Monitor environments.</p>
Full article ">Figure 2
<p>Rectangular masks used for edge feature (Haar feature) object detection.</p>
Full article ">Figure 3
<p>Rules of human face proportions.</p>
Full article ">Figure 4
<p>Proposed algorithm flowchart for HMD (head-mounted display).</p>
Full article ">Figure 5
<p>Histogram example: (<b>a</b>) histogram of open eye; (<b>b</b>) open eye; (<b>c</b>) histogram of closed eye; (<b>d</b>) closed eye.</p>
Full article ">Figure 6
<p>Measurement environment of the HMD eye blink rate.</p>
Full article ">Figure 7
<p>Comparison of the blink rate in the natural state and with the viewing monitor (*: <span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">Figure 8
<p>Comparison of the blink rate in the natural state and with the viewing HMD (*: <span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">Figure 9
<p>Comparison of the blink rate with the monitor and the viewing HMD (*: <span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">Figure 10
<p>Analysis of the correlation between far IPD and the eye blink rate: (<b>a</b>) natural; (<b>b</b>) monitor; and (<b>c</b>) HMD.</p>
Full article ">Figure 11
<p>Analysis of the correlation between near IPD (interpupillary distance) and the eye blink rate: (<b>a</b>) natural; (<b>b</b>) monitor; and (<b>c</b>) HMD.</p>
Full article ">Figure 12
<p>Analysis of the correlation between far phoria and the eye blink rate: (<b>a</b>) natural; (<b>b</b>) monitor; and (<b>c</b>) HMD.</p>
Full article ">Figure 13
<p>Analysis of the correlation between near phoria and the eye blink rate: (<b>a</b>) natural; (<b>b</b>) monitor; and (<b>c</b>) HMD.</p>
Full article ">
15 pages, 1974 KiB  
Article
Cryptanalysis and Improvement on an Image Encryption Algorithm Design Using a Novel Chaos Based S-Box
by Congxu Zhu, Guojun Wang and Kehui Sun
Symmetry 2018, 10(9), 399; https://doi.org/10.3390/sym10090399 - 14 Sep 2018
Cited by 79 | Viewed by 5854
Abstract
This article performs the cryptanalysis of an image encryption algorithm using an S-box generated by chaos. The algorithm has the advantages of simple structure, high encryption efficiency, and good encryption performance. However, an attentive investigation reveals that it has some undiscovered security flaws. [...] Read more.
This article performs the cryptanalysis of an image encryption algorithm using an S-box generated by chaos. The algorithm has the advantages of simple structure, high encryption efficiency, and good encryption performance. However, an attentive investigation reveals that it has some undiscovered security flaws. The image cryptosystem is totally breakable under proposed chosen-plaintext attack, and only two chosen plain-images are required. An array equivalent to the S-box is constructed by an elaborately designed chosen-plaintext image, and the cipher-image is deciphered without having to know the S-box itself. Both mathematical deduction and experimental results validate the feasibility of the attacking scheme. Furthermore, an improved encryption scheme is proposed, in which a feedback mechanism is introduced, a bidirectional diffusion scheme is designed, and values of the ciphertext are associated with more parameters in each diffusion process. Testing results and security analysis verify that the improved cryptographic system can achieve a higher security level and has a better performance than some of the latest encryption algorithms. Full article
Show Figures

Figure 1

Figure 1
<p>The flow chart of the original encryption algorithm.</p>
Full article ">Figure 2
<p>The attack result: (<b>a</b>) The plain image Cameraman; (<b>b</b>) The cipher image; and (<b>c</b>) The cracked image.</p>
Full article ">Figure 3
<p>Encryption result for Lena gray-scale image: (<b>a</b>) Plain-image; (<b>b</b>) encrypted image; (<b>c</b>) histogram of plain image in (<b>a</b>); and (<b>d</b>) histogram of encrypted image in (<b>b</b>).</p>
Full article ">Figure 3 Cont.
<p>Encryption result for Lena gray-scale image: (<b>a</b>) Plain-image; (<b>b</b>) encrypted image; (<b>c</b>) histogram of plain image in (<b>a</b>); and (<b>d</b>) histogram of encrypted image in (<b>b</b>).</p>
Full article ">
11 pages, 363 KiB  
Article
The Gauss Map and the Third Laplace-Beltrami Operator of the Rotational Hypersurface in 4-Space
by Erhan Güler, Hasan Hilmi Hacısalihoğlu and Young Ho Kim
Symmetry 2018, 10(9), 398; https://doi.org/10.3390/sym10090398 - 12 Sep 2018
Cited by 29 | Viewed by 4785
Abstract
We study and examine the rotational hypersurface and its Gauss map in Euclidean four-space E 4 . We calculate the Gauss map, the mean curvature and the Gaussian curvature of the rotational hypersurface and obtain some results. Then, we introduce the third Laplace–Beltrami [...] Read more.
We study and examine the rotational hypersurface and its Gauss map in Euclidean four-space E 4 . We calculate the Gauss map, the mean curvature and the Gaussian curvature of the rotational hypersurface and obtain some results. Then, we introduce the third Laplace–Beltrami operator. Moreover, we calculate the third Laplace–Beltrami operator of the rotational hypersurface in E 4 . We also draw some figures of the rotational hypersurface. Full article
Show Figures

Figure 1

Figure 1
<p>Projections of <math display="inline"><semantics> <msub> <mi mathvariant="bold">e</mi> <mi mathvariant="bold">R</mi> </msub> </semantics></math>: (<b>left</b>) into <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>1</mn> </msub> <msub> <mi>x</mi> <mn>2</mn> </msub> <msub> <mi>x</mi> <mn>3</mn> </msub> </mrow> </semantics></math>-space; (<b>right</b>) into <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>1</mn> </msub> <msub> <mi>x</mi> <mn>2</mn> </msub> <msub> <mi>x</mi> <mn>4</mn> </msub> </mrow> </semantics></math>-space; <math display="inline"><semantics> <mrow> <mi>φ</mi> <mo>=</mo> <msup> <mi>u</mi> <mn>4</mn> </msup> <mo>,</mo> </mrow> </semantics></math><math display="inline"><semantics> <mrow> <mi>w</mi> <mo>=</mo> <mi>π</mi> <mo>/</mo> <mn>3</mn> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">Figure 2
<p>Projections of <math display="inline"><semantics> <msub> <mi mathvariant="bold">e</mi> <mi mathvariant="bold">R</mi> </msub> </semantics></math>: (<b>left</b>) into <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>1</mn> </msub> <msub> <mi>x</mi> <mn>3</mn> </msub> <msub> <mi>x</mi> <mn>4</mn> </msub> </mrow> </semantics></math>-space; (<b>right</b>) into <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>2</mn> </msub> <msub> <mi>x</mi> <mn>3</mn> </msub> <msub> <mi>x</mi> <mn>4</mn> </msub> </mrow> </semantics></math>-space; <math display="inline"><semantics> <mrow> <mi>φ</mi> <mo>=</mo> <msup> <mi>u</mi> <mn>4</mn> </msup> <mo>,</mo> </mrow> </semantics></math><math display="inline"><semantics> <mrow> <mi>w</mi> <mo>=</mo> <mi>π</mi> <mo>/</mo> <mn>3</mn> <mo>.</mo> </mrow> </semantics></math></p>
Full article ">
19 pages, 2815 KiB  
Article
A Reversible Watermarking Scheme for Vector Maps Based on Multilevel Histogram Modification
by Xiang Hou, Lianquan Min and Hui Yang
Symmetry 2018, 10(9), 397; https://doi.org/10.3390/sym10090397 - 12 Sep 2018
Cited by 12 | Viewed by 3665
Abstract
To protect the security of vector maps, we propose a novel reversible watermarking scheme for vector maps based on a multilevel histogram modification. First, a difference histogram is constructed using the correlations of adjacent coordinates, and the histogram is divided into continuous regions [...] Read more.
To protect the security of vector maps, we propose a novel reversible watermarking scheme for vector maps based on a multilevel histogram modification. First, a difference histogram is constructed using the correlations of adjacent coordinates, and the histogram is divided into continuous regions and discontinuous regions by combining the characteristics of vector map data. Second, the histogram bins that require modification are determined in the continuous regions through the optimal peak value, and the peak values are chosen from the flanking discontinuous regions in both directions; the watermarks are embedded by adopting the multilevel histogram modification strategy. The watermark extraction process is the reverse of the embedding process, and after completing the watermark extraction, the carrier data can be recovered losslessly. The experimental results show that the proposed algorithm has good invisibility and is completely reversible. Compared with similar algorithms reported previously, it achieves higher watermark embedding capacity under the same embedding distortion with lower complexity, thereby having a higher application value. Full article
Show Figures

Figure 1

Figure 1
<p>Zhao’s histogram modification scheme: (<b>a</b>) original histogram; (<b>b</b>) shifted histogram; (<b>c</b>) 2nd-level modification; (<b>d</b>) 1st-level modification; (<b>e</b>) 0th-level modification; (<b>f</b>) modified histogram.</p>
Full article ">Figure 2
<p>Flowchart of watermark embedding.</p>
Full article ">Figure 3
<p>Flowchart of watermark extraction and data recovery.</p>
Full article ">Figure 4
<p>Test vector maps: (<b>a</b>) contour data, (<b>b</b>) river data, (<b>c</b>) road data, and (<b>d</b>) habitation data.</p>
Full article ">Figure 5
<p>Relationship between the invisibility and the valuation of the parameters: (<b>a</b>) the relationship between <span class="html-italic">t</span> and RMSE, and (<b>b</b>) the relationship between <span class="html-italic">L</span> and RMSE.</p>
Full article ">Figure 6
<p>Relationship between the embedding capacity and the valuation of different parameters: (<b>a</b>) the relationship between <span class="html-italic">t</span> and <span class="html-italic">E</span>, and (<b>b</b>) the relationship between <span class="html-italic">L</span> and <span class="html-italic">E</span>.</p>
Full article ">Figure 7
<p>The comparison of the capacity between the proposed method and Zhao’s method: (<b>a</b>) contour data, (<b>b</b>) river data, (<b>c</b>) road data, and (<b>d</b>) habitation data.</p>
Full article ">Figure 8
<p>Comparisons on the watermark capacity and embedding distortion: (<b>a</b>) contour data, (<b>b</b>) river data, (<b>c</b>) road data, and (<b>d</b>) habitation data.</p>
Full article ">Figure 9
<p>Relationships between algorithm implementation time and embedding level for different experimental data: (<b>a</b>) watermark embedding process, and (<b>b</b>) watermark extraction process.</p>
Full article ">Figure 10
<p>Results of integrity authentication: (<b>a</b>) the tampered contour data, and (<b>b</b>) the tamper localization results.</p>
Full article ">
12 pages, 292 KiB  
Article
Topological Gravity Motivated by Renormalization Group
by Taisaku Mori and Shin’ichi Nojiri
Symmetry 2018, 10(9), 396; https://doi.org/10.3390/sym10090396 - 11 Sep 2018
Cited by 1 | Viewed by 2714
Abstract
Recently, we have proposed models of topological field theory including gravity in Mod. Phys. Lett. A 2016, 31, 1650213 and Phys. Rev. D 2017, 96, 024009, in order to solve the problem of the cosmological constant. The Lagrangian densities [...] Read more.
Recently, we have proposed models of topological field theory including gravity in Mod. Phys. Lett. A 2016, 31, 1650213 and Phys. Rev. D 2017, 96, 024009, in order to solve the problem of the cosmological constant. The Lagrangian densities of the models are BRS (Becchi-Rouet-Stora) exact and therefore the models can be regarded as topological theories. In the models, the coupling constants, including the cosmological constant, look as if they run with the scale of the universe and its behavior is very similar to the renormalization group. Motivated by these models, we propose new models with an the infrared fixed point, which may correspond to the late time universe, and an ultraviolet fixed point, which may correspond to the early universe. In particular, we construct a model with the solutions corresponding to the de Sitter space-time both in the ultraviolet and the infrared fixed points. Full article
(This article belongs to the Special Issue Cosmological Inflation, Dark Matter and Dark Energy)
12 pages, 300 KiB  
Article
Symmetric Identities for (P,Q)-Analogue of Tangent Zeta Function
by Cheon Seoung Ryoo
Symmetry 2018, 10(9), 395; https://doi.org/10.3390/sym10090395 - 11 Sep 2018
Cited by 4 | Viewed by 2933
Abstract
The goal of this paper is to define the ( p , q ) -analogue of tangent numbers and polynomials by generalizing the tangent numbers and polynomials and Carlitz-type q-tangent numbers and polynomials. We get some explicit formulas and properties in conjunction [...] Read more.
The goal of this paper is to define the ( p , q ) -analogue of tangent numbers and polynomials by generalizing the tangent numbers and polynomials and Carlitz-type q-tangent numbers and polynomials. We get some explicit formulas and properties in conjunction with ( p , q ) -analogue of tangent numbers and polynomials. We give some new symmetric identities for ( p , q ) -analogue of tangent polynomials by using ( p , q ) -tangent zeta function. Finally, we investigate the distribution and symmetry of the zero of ( p , q ) -analogue of tangent polynomials with numerical methods. Full article
(This article belongs to the Special Issue Integral Transforms and Operational Calculus)
Show Figures

Figure 1

Figure 1
<p>Zeros of <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mrow> <mi>n</mi> <mo>,</mo> <mi>p</mi> <mo>,</mo> <mi>q</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>x</mi> <mo>)</mo> </mrow> </mrow> </semantics></math>.</p>
Full article ">
13 pages, 3639 KiB  
Article
Products and Mechanistic Investigations on the Reactions of Hydrazines with Ozone in Gas-Phase
by Dan Huang, Xiangxuan Liu, Zheng Xie, Xuanjun Wang, Xin Gao and Yuxue Yang
Symmetry 2018, 10(9), 394; https://doi.org/10.3390/sym10090394 - 11 Sep 2018
Cited by 7 | Viewed by 3605
Abstract
The toxic transformation products of hydrazines are of great concern. These products’ properties combined with their formation mechanisms are needed to assess their potential environmental and human impacts. In this study, the gas-phase reaction of hydrazine (N2H4), monomethyldrazine (MMH) [...] Read more.
The toxic transformation products of hydrazines are of great concern. These products’ properties combined with their formation mechanisms are needed to assess their potential environmental and human impacts. In this study, the gas-phase reaction of hydrazine (N2H4), monomethyldrazine (MMH) and unsymmetrical dimethyhydrazine (UDMH) with O3 have been studied at varying reactant ratios, both in the presence and absence of a radical trap. Gas chromatography-mass spectroscopy (GC-MS) has been implied to follow reactant consumption and product formation. Apart from the reported products detected by Fourier transform infrared spectroscopy (FT-IR), the newly found compounds (hydrazones, formamides, dimethylamine, 1,1,4,4-tetramethyl-1,2-tetrazene,dimethylamino-acetonitrile, N2, H2O, et al.) are identified by GC-MS. The relative yields of the organic products vary considerably at different O3/MMH or UDMH ratios. UDMH and MMH are confirmed as high potential precursors of N-nitrosodimethylamine (NDMA). The presence of hydroxyl radicals (HO·) hinders NDMA formation in MMH-O3 system. Meanwhile, it increases NDMA formation in UDMH-O3 system. The suggested reaction mechanisms which account for the observed products are discussed. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of the main experimental apparatus.</p>
Full article ">Figure 2
<p>Gas chromatogram of the ozonation products of hydrazine.</p>
Full article ">Figure 3
<p>Gas chromatogram of the ozonation products of methylhydrazine: (<b>a</b>) O<sub>3</sub>/MMH ≈ 1:1; (<b>b</b>) O<sub>3</sub>/MMH ≈ 10:1.</p>
Full article ">Figure 4
<p>The curves of change in relative conversion rate of the products in MMH + O<sub>3</sub> system (flushed with ozone continuously).</p>
Full article ">Figure 5
<p>Influence of radical trap on NDMA formation (O<sub>3</sub>/UDMH ratio ≈ 10:1).</p>
Full article ">Figure 6
<p>Gas chromatogram of the ozonation products of methylhydrazine: (<b>a</b>) O<sub>3</sub>/UDMH ≈ 1:1; (<b>b</b>) O<sub>3</sub>/UDMH ≈ 10:1.</p>
Full article ">Figure 7
<p>The curves of change in relative conversion rate of the products in MMH + O<sub>3</sub> system (flushed with ozone continuously).</p>
Full article ">Figure 8
<p>Influence of radical trap on the major products formation (O<sub>3</sub>/UDMH ratio 5:1).</p>
Full article ">Figure 9
<p>Frontier molecular orbital energies levels and the electronic distribution of hydrazines (HOMO) and ozone (LUMO) (energy unit is eV).</p>
Full article ">
22 pages, 331 KiB  
Article
A New Model for Determining Weight Coefficients of Criteria in MCDM Models: Full Consistency Method (FUCOM)
by Dragan Pamučar, Željko Stević and Siniša Sremac
Symmetry 2018, 10(9), 393; https://doi.org/10.3390/sym10090393 - 10 Sep 2018
Cited by 555 | Viewed by 16434
Abstract
In this paper, a new multi-criteria problem solving method—the Full Consistency Method (FUCOM)—is proposed. The model implies the definition of two groups of constraints that need to satisfy the optimal values of weight coefficients. The first group of constraints is the condition that [...] Read more.
In this paper, a new multi-criteria problem solving method—the Full Consistency Method (FUCOM)—is proposed. The model implies the definition of two groups of constraints that need to satisfy the optimal values of weight coefficients. The first group of constraints is the condition that the relations of the weight coefficients of criteria should be equal to the comparative priorities of the criteria. The second group of constraints is defined on the basis of the conditions of mathematical transitivity. After defining the constraints and solving the model, in addition to optimal weight values, a deviation from full consistency (DFC) is obtained. The degree of DFC is the deviation value of the obtained weight coefficients from the estimated comparative priorities of the criteria. In addition, DFC is also the reliability confirmation of the obtained weights of criteria. In order to illustrate the proposed model and evaluate its performance, FUCOM was tested on several numerical examples from the literature. The model validation was performed by comparing it with the other subjective models (the Best Worst Method (BWM) and Analytic Hierarchy Process (AHP)), based on the pairwise comparisons of the criteria and the validation of the results by using DFC. The results show that FUCOM provides better results than the BWM and AHP methods, when the relation between consistency and the required number of the comparisons of the criteria are taken into consideration. The main advantages of FUCOM in relation to the existing multi-criteria decision-making (MCDM) methods are as follows: (1) a significantly smaller number of pairwise comparisons (only n − 1), (2) a consistent pairwise comparison of criteria, and (3) the calculation of the reliable values of criteria weight coefficients, which contribute to rational judgment. Full article
28 pages, 380 KiB  
Article
Probabilistic Hesitant Intuitionistic Linguistic Term Sets in Multi-Attribute Group Decision Making
by M. G. Abbas Malik, Zia Bashir, Tabasam Rashid and Jawad Ali
Symmetry 2018, 10(9), 392; https://doi.org/10.3390/sym10090392 - 10 Sep 2018
Cited by 34 | Viewed by 4404
Abstract
Decision making is the key component of people’s daily life, from choosing a mobile phone to engaging in a war. To model the real world more accurately, probabilistic linguistic term sets (PLTSs) were proposed to manage a situation in which several possible linguistic [...] Read more.
Decision making is the key component of people’s daily life, from choosing a mobile phone to engaging in a war. To model the real world more accurately, probabilistic linguistic term sets (PLTSs) were proposed to manage a situation in which several possible linguistic terms along their corresponding probabilities are considered at the same time. Previously, in linguistic term sets, the probabilities of all linguistic term sets are considered to be equal which is unrealistic. In the process of decision making, due to the vagueness and complexity of real life, an expert usually hesitates and unable to express its opinion in a single term, thus making it difficult to reach a final agreement. To handle real life scenarios of a more complex nature, only membership linguistic decision making is unfruitful; thus, some mechanism is needed to express non-membership linguistic term set to deal with imprecise and uncertain information in more efficient manner. In this article, a novel notion called probabilistic hesitant intuitionistic linguistic term set (PHILTS) is designed, which is composed of membership PLTSs and non-membership PLTSs describing the opinions of decision makers (DMs). In the theme of PHILTS, the probabilities of membership linguistic terms and non-membership linguistic terms are considered to be independent. Then, basic operations, some governing operational laws, the aggregation operators, normalization process and comparison method are studied for PHILTSs. Thereafter, two practical decision making models: aggregation based model and the extended TOPSIS model for PHILTS are designed to classify the alternatives from the best to worst, as an application of PHILTS to multi-attribute group decision making. In the end, a practical problem of real life about the selection of the best alternative is solved to illustrate the applicability and effectiveness of our proposed set and models. Full article
(This article belongs to the Special Issue Fuzzy Techniques for Decision Making 2018)
Show Figures

Figure 1

Figure 1
<p>Extended TOPSIS and Aggregation-based models.</p>
Full article ">
15 pages, 1004 KiB  
Article
Modeling the Service Network Design Problem in Railway Express Shipment Delivery
by Siqi Liu, Boliang Lin, Jianping Wu and Yinan Zhao
Symmetry 2018, 10(9), 391; https://doi.org/10.3390/sym10090391 - 10 Sep 2018
Cited by 8 | Viewed by 3681
Abstract
As air pollution becomes increasingly severe, express trains play a more important role in shifting road freight and reducing carbon emissions. Thus, the design of railway express shipment service networks has become a key issue, which needs to be addressed urgently both in [...] Read more.
As air pollution becomes increasingly severe, express trains play a more important role in shifting road freight and reducing carbon emissions. Thus, the design of railway express shipment service networks has become a key issue, which needs to be addressed urgently both in theory and practice. The railway express shipment service network design problem (RESSNDP) not only involves the selection of train services and determination of service frequency, but it is also associated with shipment routing, which can be viewed as a service network design problem (SNDP) with railway characteristics. This paper proposes a non-linear integer programming model (INLP) which aims at finding a service network and shipment routing plan with minimum cost while satisfying the transportation time constraints of shipments, carrying capacity constraints of train services, flow conservation constraint and logical constraints among decision variables. In addition, a linearization technique was adopted to transform our model into a linear one to obtain a global optimal solution. To evaluate the effectiveness and efficiency of our approach, a small trial problem was solved by the state-of-the-art mathematical programming solver Gurobi 7.5.2. Full article
(This article belongs to the Special Issue Symmetry in Engineering Sciences)
Show Figures

Figure 1

Figure 1
<p>A simple railway service network.</p>
Full article ">Figure 2
<p>A railway sub-network.</p>
Full article ">Figure 3
<p>The optimal service network.</p>
Full article ">Figure 4
<p>The impact of some key parameters on the total cost and number of trains dispatched.</p>
Full article ">
Previous Issue
Next Issue
Back to TopTop