Topics of contemporary computational mathematics - Semantic Scholar

11 downloads 0 Views 68KB Size Report
17 Jan 2012 - This article was downloaded by: [Universidad De Salamanca], [Jesus Vigo-Aguiar] ... University of Salamanca, Spain E-mail: [email protected].
This article was downloaded by: [Universidad De Salamanca], [Jesus Vigo-Aguiar] On: 17 January 2012, At: 02:57 Publisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK

International Journal of Computer Mathematics Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/gcom20

Topics of contemporary computational mathematics a

b

Jesus Vigo-Aguiar , Juan Carlos Reboredo & Higinio Ramos Calle c a

University of Salamanca, Spain

b

University of Santiago de Compostela, Spain E-mail: [email protected] c

University of Salamanca, Spain E-mail: [email protected]

Available online: 17 Jan 2012

To cite this article: Jesus Vigo-Aguiar, Juan Carlos Reboredo & Higinio Ramos Calle (2012): Topics of contemporary computational mathematics, International Journal of Computer Mathematics, 89:3, 265-267 To link to this article: http://dx.doi.org/10.1080/00207160.2012.649131

PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.tandfonline.com/page/terms-andconditions This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae, and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand, or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material.

International Journal of Computer Mathematics Vol. 89, No. 3, February 2012, 265–267

EDITORIAL

Downloaded by [Universidad De Salamanca], [Jesus Vigo-Aguiar] at 02:57 17 January 2012

Topics of contemporary computational mathematics

It is our great pleasure to introduce this Special Issue of the International Journal of Computer Mathematics containing an exciting collection of computational and applied mathematics papers presented at the 10th International Conference of Computational and Mathematical Methods in Science and Engineering (CMMSE-2010), held in Almería (Spain) between 26 and 30 June 2010. This Special Issue continues a well-consolidated tradition of producing special issues for the CMMSE that dates back to 2002. The multi-disciplinary International Conference of Computational and Mathematical Methods in Science and Engineering embraces all the computational science and engineering fields. Since its inception in 2000, the novel mathematical and computational methods and applications for a wide range of disciplines – including physics, chemistry, engineering and economics – have been presented, widely discussed and disseminated within the research community. The CMMSE, which aspires to continue acting as a stimulating point of contact between different disciplines, ultimately aims to encourage new mathematical and computational insights to underpin the progress demanded by our society. The first article of this Special Issue, Multi-authority attribute-based encryption with honestbut-curious central authority, by Božovi´c et al. [2], considers multi-authority attribute-based encryption that is capable of handling disjoint sets of attributes distributed among many authorities. Its threshold scheme based on encryption offers the same security guarantees as Chase’s proposal with the added advantage that it tolerates an honest-but-curious central authority. By assuming that the central authority is honest in the initialization phase, the indistinguishability of the encryption is guaranteed. This proposal improves on Chase’s construction by imposing a weaker assumption on the central authority without paying a high cost in terms of efficiency. The second article, Complete partial metric spaces have partially metrizable computational models, by Romaguera et al. [12], generalizes the Edalat and Heckmann construction for metric spaces by considering a complete partial metric in the domain of formal balls in a complete metric space (X, p) that extends p and induces the Scott topology. It thus introduces the notion of a partially metrizable computational model that characterizes topological spaces by admitting a compatible complete partial metric. The article by Criado et al. [4], motivated by real-life situations in social and communications networks, presents complex systems with some meso-scale structures. The clustering and the metric structures of the multilevel network described and analysed are the analytical relationships

ISSN 0020-7160 print/ISSN 1029-0265 online © 2012 Taylor & Francis http://dx.doi.org/10.1080/00207160.2012.649131 http://www.tandfonline.com

Downloaded by [Universidad De Salamanca], [Jesus Vigo-Aguiar] at 02:57 17 January 2012

266

Editorial

between the clustering coefficient and efficiency with respect to the parameters of the underlying network. On the existence and unicity of stable models in normal residuated logic programs, by Madrid and Ojeda-Aciego [7], describes the conditions that guarantee the existence of stable models for a normal residuated logic program in the truth space [0, 1] and the uniqueness of stable models in the particular case of product t-norms. The research by Troiano et al. [14] uses mining fuzzy rules and shows how to control the sensitive information disclosure by considering the link between certain attributes released with the sensitive information. The pros and cons of this approach with respect to decision trees are also analysed. Using a model based on two populations, humans and mosquitoes, the research by Rodrigues et al. [11] shows that insecticide control aimed at mosquitoes reduces the number of infected humans and mosquitoes and can prevent the kind of outbreak that could transform an epidemiological episode into an endemic disease. Artificial satellites preliminary orbit determination by the modified high-order Gauss method, by Arroyo et al. [1], considers high-order methods to solve nonlinear systems used in positional astronomy to determine the orbit of a celestial body and includes numerical and graphical comparison of the different methods for reference orbits. Muñoz et al. [8] propose a new ratio estimator for a population proportion based on combining two ratio estimators defined by Rueda et al. [13] based on auxiliary information. The performance of this estimator is shown to be an improvement over alternative estimators. The article by Ureña et al. [15] solves the problem of thin and thick elastic plates by using the generalized finite difference method to solve second-order partial differential equation and fourth-order partial differential equation systems. A modified equivalent partial differential equation approach to the modelling of the advection– diffusion equation is presented by Gavete et al. [5], who analyse the stability of the forward explicit integration technique with generalized finite difference spatial discretizations free of numerical diffusion, with two-dimensional results derived, using the von Neuman stability method. In their article, Mathematical modelling of the biological pest control of the sugarcane borer, Rafikov and de Holanda Limeira [10] consider interactions between a linear feedback control strategy and the sugarcane borer and its egg parasitoid Trichogramma galloi, demonstrating that there is a case for introducing natural enemies into the environment. The research underlying the article by Ordoñez et al. [9] proposes to identify functional outliers in GPS receiver observations made in forestry settings, with the aim of identifying differences between errors for coordinates taken at different points of a forest characterized by a set of dasometric data. The results indicate that areas with dasometric values have a more dense forest canopy than other forest areas. Selected mathematical problems of traffic flow theory, by Buslaev et al. [3], considers a nonlinear system of ordinary differential equations for the follow-the-leader model in order to model traffic flows. Existence conditions are provided and open problems related to new mixed traffic models combining deterministic and stochastic approaches are discussed. Finally, the article by López Ortí et al. [6] introduces a set of semi-analytical integrators in celestial mechanics that are based on the use of a class of anomalies characterized by the generalized Sundman transformation. We hope that the readers will find our selection of articles for this Special Issue useful from both the academic and practical points of view.

Editorial

267

Downloaded by [Universidad De Salamanca], [Jesus Vigo-Aguiar] at 02:57 17 January 2012

Finally, we thank all the authors who have contributed to this Special Issue. We would also like to express our gratitude to the Spanish Ministry of Education grant MTM2010-08916-E and Junta of Andalucía IAC 3/2009. Jesus Vigo-Aguiar Guest Editor CMMSE Chair University of Salamanca, Spain Email: [email protected] Juan Carlos Reboredo Guest Editor University of Santiago de Compostela, Spain Email: [email protected] Higinio Ramos Calle Guest Editor University of Salamanca, Spain Email: [email protected]

References [1] V. Arroyo, A. Cordero, J.R. Torregrosa, and M.P. Vassileva, Artificial satellites preliminary orbit determination by the modified high-order Gauss method, Int. J. Comput. Math. 89(3) (2012), pp. 347–356. [2] V. Božovi´c, D. Socek, R. Steinwandt, and V.I. Villányi, Multi-authority attribute-based encryption with honest-butcurious central authority, Int. J. Comput. Math. 89(3) (2012), pp. 268–283. [3] A.P. Buslaev, A.V. Gasnikov, and M.V. Yashina, Selected mathematical problems of traffic flow theory, Int. J. Comput. Math. 89(3) (2012), pp. 409–432. [4] R. Criado, J. Flores, A.G. del Amo, J. Gómez-Gardeñes, and M. Romance, A mathematical model for networks with structures in the mesoscale, Int. J. Comput. Math. 89(3) (2012), pp. 291–309. [5] L. Gavete, F. Ureña, J.J. Benito, and M.L. Gavete, Modelling of the advection–diffusion equation with a meshless method without numerical diffusion, Int. J. Comput. Math. 89(3) (2012), pp. 377–389. [6] J.A.L. Ortí, V.A. Gómez, and M.B. Rochera, A note on the use of the generalized Sundman transformations as temporal variables in celestial mechanics, Int. J. Comput. Math. 89(3) (2012), pp. 433–442. [7] N. Madrid and M. Ojeda-Aciego, On the existence and unicity of stable models in normal residuated logic programs, Int. J. Comput. Math. 89(3) (2012), pp. 310–324. [8] J.F. Muñoz, E. Álvarez, A. Arcos, M. del Mar Rueda, S. González, and A. Santiago, Optimum ratio estimators for the population proportion, Int. J. Comput. Math. 89(3) (2012), pp. 357–365. [9] C. Ordoñez, J. Martínez, J.F. de Cos Juez, and F.S. Lasheras, Comparison of GPS observations made in a forestry setting using functional data analysis, Int. J. Comput. Math. 89(3) (2012), pp. 402–408. [10] M. Rafikov and E. de Holanda Limeira, Mathematical modelling of the biological pest control of the sugarcane borer, Int. J. Comput. Math. 89(3) (2012), pp. 390–401. [11] H.S. Rodrigues, M.T.T. Monteiro, D.F.M. Torres, and A. Zinober, Dengue disease, basic reproduction number and control, Int. J. Comput. Math. 89(3) (2012), pp. 334–346. [12] S. Romaguera, P. Tirado, and O. Valero, Complete partial metric spaces have partially metrizable computational models, Int. J. Comput. Math. 89(3) (2012), pp. 284–290. [13] M.M. Rueda, J.F. Muñoz, A. Arcos, E. Álvarez, and S. Martínez, Estimators and confidence intervals for the proportion using binary auxiliary information with applications to pharmaceutical studies, J. Biopharmaceut. Statist. 21 (2011), pp. 526–554. [14] L. Troiano, L.J. Rodríguez-Muñiz, J. Ranilla, and I. Díaz, Interpretability of fuzzy association rules as means of discovering threats to privacy, Int. J. Comput. Math. 89(3) (2012), pp. 325–333. [15] F. Ureña, E. Salete, J.J. Benito, and L. Gavete, Solving third- and fourth-order partial differential equations using GFDM: application to solve problems of plates, Int. J. Comput. Math. 89(3) (2012), pp. 366–376.