Open Access Technical Note

Notes on Admissible Solutions of a Class of Dierential Equations

Weiran Lü, Nana Liu, Qiuying Li, Chungchun Yang

Journal of Advances in Mathematics and Computer Science, Page 1-7
DOI: 10.9734/BJMCS/2015/18246

Aims/ objectives: Let Q1; Q2 and Q3 be three non-vanishing meromorphic functions, and be an entire function. In this paper, we consider the dierential equation of the form: 18246.pngand derive some necessary conditions ( in terms of Qj (j = 1; 2; 3) and ) for the existence of an admissible meromorphic solution f of the above equation. As a consequence of the studies, particularly we are able to conrm partially the validity of Brück Conjecture raised in studying value sharing of an entire function and its rst derivative.

Open Access Short communication

Abuse of Unified Modeling Language Diagrams in Software Development

M. Peter Ogedebe, Faki A. Silas

Journal of Advances in Mathematics and Computer Science, Page 1-9
DOI: 10.9734/BJMCS/2015/17075

The Unified Modeling Language (UML) is a general-purpose visual modeling language for specifying software-intensive systems. More precisely, it is a graphical language for visualizing, specifying, constructing and documenting the artifacts of software-intensive systems. UML is a key enabling technology for Software Developers and Software Engineers who seek to transition from traditional, human-intensive, code-centric software development processes to Model-Driven Development (MDD) processes that are requirements-driven and architecture-centric. However, Due to the lack of skills by developers and general purpose nature of UML diagrams, many developers abuse it by drawing diagrams that did not match particular activities or scenarios in the software project. This study makes a review of how UML is abuse and also makes a simple representation of UML diagrams. 

Open Access Original Research Article

A New Layer of Service Oriented Architecture to Solve Versioning Problem

Soheir Zein, Kassem Akil, Ali Kalakech, Seifedine Kadry

Journal of Advances in Mathematics and Computer Science, Page 1-9
DOI: 10.9734/BJMCS/2015/18505

Aims: Service Oriented Architecture (SOA) is an architecture where reusable solution is provided to solve the common problem in software design. The major advantage of SOA is the light dependent between its functions and services. SOA services are defined through description language, independent of any vendor or technology. Therefore, developers can use SOA services in a standard way without need to know or understand how functions of a service are implemented. SOA services need to evolve to meet business changes and requirements. Even though the light independency of SOA services, any change or update to the implementation of a service will impact other parties who use this service. So SOA versioning service becomes a strong issue. In this paper we will discuss SOA Layers and service versioning problem. We will propose a new layer to SOA architecture to handles service versioning issue and the structure of the new layer will be presented.

Open Access Original Research Article

Open Access Original Research Article

Cluster Analysis as a Strategy of Grouping to Construct Goodness-of-Fit Tests when the Continuous Covariates Present in the Logistic Regression Model

Jassim N. Hussain, Atheer J. Nassir

Journal of Advances in Mathematics and Computer Science, Page 1-16
DOI: 10.9734/BJMCS/2015/18616

When continuous covariates are present, classical Pearson and deviance goodness-of-fit tests to assess logistic model fit break down. Many goodness-of-fit (GOF) tests such as Hosmer–Lemeshow tests can be used in these situations. Meanwhile, it is simple to perform and widely used, it does not have desirable power in many cases and provides no further information on the source of any detectable lack-of-fit. We propose a new strategy of grouping based on a very general partitional clustering in the covariate space to construct two goodness-of-fit test statistics. Many simulation studies are implemented and clinical data set is analyzed to examine the performance of the proposed strategy of grouping and the developed GOF test statistics. The results show that the proposed strategy of grouping and GOF test statistics based on it has a potential for use in practice as a recommended strategy of grouping and as GOF test statistics to assess the adequacy of the logistic regression model.

Open Access Original Research Article

Numerical Function Optimization Solutions Using the African Buffalo Optimization Algorithm (ABO)

Julius Beneoluchi Odili, Mohd Nizam Mohmad Kahar

Journal of Advances in Mathematics and Computer Science, Page 1-12
DOI: 10.9734/BJMCS/2015/17145

This paper proposes a new meta-heuristic approach to solving continuous optimization problems using 21 benchmark test cases. The African buffalo algorithm evolved from an understanding of this animal’s survival instincts and the search techniques they utilize in the African forests and savannahs. The African buffalo employs its exceptionally intelligent, cooperative and democratic attitude in its search for the optimal path to pasture. This enables it to get results faster than some other search agents. The African Buffalo Optimization (A.B.O) algorithm simulates the African buffalos’ behaviour by encapsulation in a mathematical model; which solves a number of continuous optimization problems. When compared to the Genetic Algorithm (GA),Chaotic Gray-coded Genetic Algorithm and the Improved Genetic Algorithm (IGA), the results obtained from African Buffalo Optimization show that the algorithm works well and can be extended to solving  other optimization problems like: path planning, scheduling, vehicle routing.

Open Access Original Research Article

Stego-Scheme for Secret Communication in Grayscale and RGB Images

Aqsa Rashid, Muhammad Khurrum Rahim

Journal of Advances in Mathematics and Computer Science, Page 1-9
DOI: 10.9734/BJMCS/2015/17628

This paper presents the new technique of the spatial domain image steganography for hidden electronic communication in grayscale and color images. The method hide one message bit per pixel and creates least changes in the statistical properties of the image. Experimental results, for the projected method, show the excellence of the method. The projected method is also implemented for two bits per pixel, three bits per pixel, four bits per pixel, five bits per pixel, six bit per pixel, seven bit per pixel and eight bits per pixel using the same concept. At the end the results shows that the method is good up to three bits per pixel.