REA PressComputational Algorithms and Numerical Dimensions2980-76462120230301Trigonometric Functions and Some Trigonometrical Identities1616581510.22105/cand.2023.382247.1039ENLaxmi RathourWard Number – 16, Bhagatbandh, Anuppur 484 224, Madhya Pradesh, India.0000-0002-2659-7568Dragan ObradovicElementary School "Jovan Cvijic", Kostolac-Pozarevac, Teacher of Мathematics, Serbia.0000-0001-5871-6958Shiv KantTiwariDepartment of Mathematics, L. E. College, Morbi-363 642, Gujarat, India.0000-0003-0942-3467Lakshmi NarayanMishraDepartment of Mathematics, School of Advanced Sciences, Vellore Institute of Technology, Vellore 632 014, Tamil Nadu, India.0000-0001-7774-7290Vishnu NarayanMishraDepartment of Mathematics, Indira Gandhi National Tribal University, Lalpur, Amarkantak 484 887, Madhya Pradesh, India.0000-0002-2159-7710Journal Article20221106Trigonometry is a part of mathematics which deals with specific functions of angles and their application, and it is studies of the dependence between the sides and angles of a triangle. The word trigonometry is associated the operations between the sides and angles of the triangles. Initially, it aimed to calculate the values of all elements of a triangle (height, centroid length, bisector, radius, area and angles) using data sufficient to determine the triangle. In the paper, trigonometric functions are defined, and some statements about trigonometric identities are stated and proved.https://www.journal-cand.com/article_165815_9bc3078da19f606aa230413529f28572.pdfREA PressComputational Algorithms and Numerical Dimensions2980-76462120230301Review of Blockchain integrated WSN71116335210.22105/cand.2023.163352ENSamira TorabiGriffith Centre for Coastal Management, Griffith University Gold Coast Campus, Queensland 4222, Australia.Journal Article20221124Nowadays, we know that wireless sensor networks are being widely applied in many fields of human life such as civil and military applications. Wireless Sensor Networks (WSNs) are broadly applied for various applications in tracking and surveillance due to their ease of use and other distinctive characteristics compelled by real-time cooperation among the sensor nodes. when applying the WSN in the real world we have to face many challenges such as security, storage due to its centralized server/client models. Although WSNs can bring a lot of benefits and conveniences. This paper discusses an in-depth survey of a blockchain-based approach for malicious node detection, an exhaustive examination of the integration of blockchain techniques with WSNs (BWSN), and insights into this novel concept.https://www.journal-cand.com/article_163352_7de19d6b77ea0e8401c180a80338f788.pdfREA PressComputational Algorithms and Numerical Dimensions2980-76462120230301Smart Home Environment Future Challenges and Issues121616335310.22105/cand.2023.163353ENVictoria NozickOperations and Information Management Group, Aston Business School, Aston University, Birmingham B4 7ET, United Kingdom.Journal Article20221124The most energy consumption in smart domestic network is smart plugs because of an uninterrupted supply. Consequently, this studies article accommodates about home automation electricity management that indicates the balance strength consumption between the gadgets in a regular c program language period. Also, this research article presents future project duties in protection troubles in smart home surroundings. Additionally, the belief for smart home surroundings focuses the Interoperability, Reliability, Integration of clever houses and term privacy in context, term safety and privacy vulnerabilities to smart domestic. The energy may be decreased in the direction of inexperienced surroundings. Furthermore, the studies paper is considering the evaluation of calculate the terrible outcomes in environment because of complete home automation system. While calculating these bad results, the life Cycle evaluation (LCA) ought to be in sum general. This study makes use of two analyses the strength intake for environment effect of home strength management device (HEMs). The research article discusses home automation gadget consumes the strength for special devices linked for smart home.https://www.journal-cand.com/article_163353_147fae2f9b651099ef38556dc4e4fe0e.pdfREA PressComputational Algorithms and Numerical Dimensions2980-76462120230301Contribution of Wireless Sensor Networks in Domestic and Hostile Environment172216335510.22105/cand.2023.163355ENNatalja OsintsevFraunhofer-Institut für Holzforschung Wilhelm-Klauditz Institut WKI, Bienroder Weg 54 E, 38108 Brunswick, Germany.Journal Article20220304Wireless Sensor Networks are considered to be among the most rapidly evolving technological domains thanks to the numerous benefits that their usage provides. As a result, from their first appearance until the present day, Wireless Sensor Networks have had a continuously growing range of applications. The purpose of this article is to provide an up-to-date presentation of both traditional and most recent applications of Wireless Sensor Networks and hopefully not only enable the comprehension of this scientific area but also facilitate the perception of novel applications. In order to achieve this goal, the main categories of applications of Wireless Sensor Networks are identified, and characteristic examples of them are studied. Their particular characteristics are explained, while their pros and cons are denoted. Next, a discussion on certain considerations that are related with each one of these specific categories takes place. Finally, concluding remarks are drawn.https://www.journal-cand.com/article_163355_a8604946f9ed1c165204eac368ea7099.pdfREA PressComputational Algorithms and Numerical Dimensions2980-76462120230301Integrating PCA and DEA techniques for strategic assessment of network security233418377210.22105/cand.2023.424893.1076ENReza RasinojehdehiDepartment of Industrial Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran.0000-0003-4694-0930Seyyed EsmaeilNajafiDepartment of Industrial Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran.0000-0002-8734-5436Journal Article20221012Network security is paramount in safeguarding the integrity of computer networks and the data they host. The primary objective of network security is to protect data from cyber-attacks and ensure the overall reliability of the network. A robust network security strategy deploys various solutions to shield data within networks, safeguarding both users and organizations from potential threats. This paper introduces a novel approach to evaluating computer network security using Data Envelopment Analysis (DEA), a mathematical method designed to measure the performance of Decision-Making Units (DMUs) employing identical inputs to yield identical outputs. We present a practical application of DEA to assess the security of 10 distinct networks, treating them as DMUs. The resulting performance measurements allow us to classify computer network security into four levels: "terribly insecure," "insecure," "safe," and "very safe. To optimize the discriminating power of DEA, we employ Principal Component Analysis (PCA) to reduce the number of inputs and outputs. It not only enhances the precision of our evaluation but also ensures that the number of DMUs remains well-suited to the analysis. As a rule of thumb, the number of DMUs should be at least three times larger than the sum of the numbers of inputs and outputs to maintain DEA's discriminating power. Through the combined application of DEA and PCA, this research contributes a comprehensive and efficient method for evaluating and classifying computer network security, providing valuable insights for enhancing overall network resilience against cyber threats.https://www.journal-cand.com/article_183772_f41fb2c13f59071e5e44440fff46a0a6.pdfREA PressComputational Algorithms and Numerical Dimensions2980-76462120230301A local meshless radial basis functions based method for solving fractional integral equations354618863910.22105/cand.2023.400616.1064ENMehdi RadmaneshDepartment of Mathematics, Graduate University of Advanced Technology of Kerman, Kerman, Iran.Mohammad JavadEbadiSection of Mathematics, International Telematic University Uninettuno, Corso Vittorio Emanuele II, 39, 00186 Roma, Italy.Department of Mathematics, Chabahar Maritime University, Chabahar, Iran.0000-0002-1324-6953Journal Article20220910This paper presents a Localized Radial Basis Functions Collocation Method (LRBFCM) for numerically solving one and 2-dimensional Fractional Integral Equations (2D-FIEs). The LRBFCM approach decomposes the main problem into several local sub-problems of small sizes, effectively reducing the ill-conditioning of the overall problem. By employing the collocation approach and utilizing the strong form of the equation, the proposed method achieves efficiency. Additionally, the matrix operations only require the inversion of small-sized matrices, further contributing to the method's efficiency. To demonstrate the effectiveness of the LRBFCM, the paper provides test problems encompassing linear, nonlinear, Volterra, and Fredholm types of Fractional Integral Equations (FIEs). The numerical results showcase the efficiency of the proposed method, validating its performance in solving various types of FIEs.https://www.journal-cand.com/article_188639_91ace27fdc12908d7096894ec8e3b838.pdf