https://w3.sciltp.com/journals/ams/issue/feed Applied Mathematics and Statistics 2024-12-30T15:32:52+08:00 Ms. Louise Liu ams@sciltp.com Open Journal Systems <p>Applied Mathematics and Statistics (AMS) is an international interdisciplinary journal committed to publishing original papers of significant scientific value across the spectrum of applied mathematics and statistics. AMS cordially welcomes original research articles and surveys utilizing mathematical or statistical methodologies to tackle intricate issues across diverse fields, thereby fostering future innovations and the development of novel technologies. AMS aims to be a premier publication showcasing cutting-edge research at the intersection of mathematics and applied sciences, hence providing valuable insights and fostering innovation across various domains.</p> https://w3.sciltp.com/journals/ams/article/view/432 Editorial for the First Issue of Applied Mathematics and Statistics (AMS) 2024-07-24T15:21:31+08:00 Jinde Cao jdcao@seu.edu.cn <p class="categorytitle"><em>Editorial</em></p> <h1>Editorial for the First Issue of <em>Applied Mathematics and Statistics (AMS)</em></h1> <div class="abstract_title"> <p><strong>Jinde Cao</strong></p> </div> <div class="abstract_top"> <p>School of Mathematics, Southeast University, Nanjing 211189, China; jdcao@seu.edu.cn</p> </div> 2024-07-30T00:00:00+08:00 Copyright (c) 2024 by the authors. https://w3.sciltp.com/journals/ams/article/view/385 Hopf Bifurcation of the Oregonator Oscillator with Distributed Delay 2024-06-14T16:31:45+08:00 Yu Wang Yu.Wang@pik-potsdam.de Luca Guerrini luca.guerrini@staff.univpm.it <p class="categorytitle"><em>Article</em></p> <h1>Hopf Bifurcation of the Oregonator Oscillator with Distributed Delay</h1> <div class="abstract_title"> <p><strong>Yu Wang <sup>1,</sup>*</strong> <strong>and Luca Guerrini <sup>2</sup></strong></p> </div> <div class="abstract_top"> <p><sup>1 </sup>School of Mathematics, Southeast University, Nanjing 210096, China</p> <p><sup>2 </sup>Department of Management, Polytechnic University of Marche, 60121 Ancona, Italy</p> <p>* Correspondence: 230218180@seu.edu.cn</p> <p>Received: 2 June 2024; Revised: 10 July 2024; Accepted: 30 July 2024; Published: 19 August 2024</p> <p> </p> </div> <p><strong id="abstract" class="label">Abstract: </strong>This paper investigates the bifurcation problem of the Oregonator oscillator with distributed time delay, and two cases are considered, namely weak and strong kernels. First, theoretical approaches are provided to analyze the stability properties of the equilibrium in these systems using the chain trick method. Near the positive equilibrium point, the Routh-Hurwitz criteria are employed to establish precise conditions for stability and Hopf bifurcation and determine the bifurcation direction. Additionally, this paper explores the implications of inffnite memory within a distributed delay to gain insights into the dynamic behavior. Moreover, extensive numerical simulations are conducted to support our theoretical analysis. The main simulations illustrate the bifurcation waveform and phase diagrams and reveal complex dynamic behavior, including stable and unstable oscillations.</p> 2024-08-19T00:00:00+08:00 Copyright (c) 2024 by the authors. https://w3.sciltp.com/journals/ams/article/view/397 Independent Domination in Claw-Free Cubic Graphs 2024-06-12T08:44:38+08:00 Linyu Li linyuxinxiang2021@163.com Jun Yue yuejun06@126.com <p class="categorytitle"><em>Article</em></p> <h1>Independent Domination in Claw-Free Cubic Graphs</h1> <div class="abstract_title"> <p><strong>Linyu Li <sup>1</sup></strong> <strong>and Jun Yue <sup>2,</sup>*</strong></p> </div> <div class="abstract_top"> <p><sup>1 </sup>School of Mathematics and Statistics, Shandong Normal University, Jinan 250358, China</p> <p><sup>2 </sup>School of Mathematics Science, Tiangong University, Tianjin 300387, China</p> <p>* Correspondence: yuejun06@126.com</p> <p>Received: 7 June 2024; Revised: 5 August 2024; Accepted: 13 August 2024; Published: 22 August 2024</p> <p> </p> </div> <p><strong id="abstract" class="label">Abstract: </strong>A vertex set <em>S</em> of a graph <em>G</em> is called an independent dominating set if <em>S</em> is an independent set and each vertex in <em>V(G)</em>\<em>S</em> is adjacent to a vertex in <em>S</em>. The independent domination number <em>i</em>(<em>G</em>) of <em>G</em> is the minimum cardinality of an independent dominating set in <em>G</em>. This paper first proves that if <em>G</em> is a connected <span class="inline_formula"><label>\(K_{1,3}\)</label></span>-free cubic graph, then <span class="inline_formula"><label>\(i(G)\leq \frac{1}{3}|V(G)|\)</label></span>. Meanwhile, <span class="inline_formula"><label>\(i(G)=\frac{1}{3}|V(G)|\)</label></span> if and only if <span class="inline_formula"><label>\(G\in \mathcal{H}\)</label></span>, where <span class="inline_formula"><label>\(\mathcal{H}\)</label></span> is an infinite cubic family with each graph being a <span class="inline_formula"><label>\(C_6^+\)</label></span>-necklace. Then, it is shown that if <em>G</em> is a <span class="inline_formula"><label>\(\{K_{1,3}, K_4^-, C_6^+\}\)</label></span>-free cubic graph with no <span class="inline_formula"><label>\(C_3\Box K_2\)</label></span>-component, then <span class="inline_formula"><label>\(i(G)\leq \frac{5}{18}|V(G)|\)</label></span>. This result is tight.</p> 2024-08-22T00:00:00+08:00 Copyright (c) 2024 by the authors. https://w3.sciltp.com/journals/ams/article/view/470 Adaptive Resilience via Probabilistic Automaton: Safeguarding Multi-Agent Systems from Leader Missing Attacks 2024-10-07T20:05:11+08:00 Kuanxiang Wang kxwang2001@163.com Xin Gong xingong@seu.edu.cn <p class="categorytitle"><em>Article</em></p> <h1>Adaptive Resilience via Probabilistic Automaton: Safeguarding Multi-Agent Systems from Leader Missing Attacks</h1> <div class="abstract_title"> <p><strong>Kuanxiang Wang <sup>1</sup></strong> <strong>and Xin Gong <sup>2,</sup>*</strong></p> </div> <div class="abstract_top"> <p><sup>1 </sup>The School of Information Science and Engineering, East China University of Science and Technology, Shanghai 200237, China</p> <p><sup>2 </sup>The School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China</p> <p>* Correspondence: xingong@seu.edu.cn; Tel.: +86-185-9806-0508</p> <p>Received: 26 August 2024; Revised: 3 October 2024; Accepted: 18 October 2024; Published: 25 October 2024</p> <p> </p> </div> <p><strong id="abstract" class="label">Abstract: </strong>The resilience of leader-following structures has been a hotspot in both academic and industrial research. Existing studies mainly focus on maintaining follower coherence, usually assuming that the leader can always function properly. However, these studies neglect the risk of system paralysis if the leader is compromised. To resolve this problem, this paper leverages probabilistic automata grammar reasoning to investigate how followers can gradually infer their operational rules within the system over time. First, a grammatical inference module is implemented on the followers to enable them to deduce their rules once they receive commands from the leader. Then, this paper proposes three probabilistic automata reasoning methods for this inference: the Algorithm for Learning Regular Grammars with Inference Assistance (ALERGIA), Distinguished String Automata Inference (DSAI), and Minimum Divergent Inference (MDI). By using these methods, a follower can reason about deterministic finite automata from multiple commands issued by the leader, which are then utilized to construct deterministic probabilistic finite automata for representing the follower's rules. Finally, several examples are provided to validate the correctness of these reasoning methods and compare their efficiency in learning probabilistic automata. The results indicate that all three methods achieve an accuracy of 98.535% in learning the correct automata transformation function, and ALERGIA runs slightly faster. These findings suggest that even if the leader is compromised, the agent can still perform tasks autonomously using the inferred rules, thereby avoiding system paralysis.</p> 2024-10-25T00:00:00+08:00 Copyright (c) 2024 Applied Mathematics and Statistics https://w3.sciltp.com/journals/ams/article/view/550 Bandit-Based Multi-Agent Source Seeking with Safety Guarantees 2024-11-11T10:40:01+08:00 Zhibin Ji z2303146@nuaa.edu.cn Dingqi Zhu zdq_2203230@nuaa.edu.cn Bin Du iniesdu@nuaa.edu.cn <p class="categorytitle"><em>Article</em></p> <h1>Bandit-Based Multi-Agent Source Seeking with Safety Guarantees</h1> <div class="abstract_title"> <p><strong>Zhibin Ji <sup>†</sup> , Dingqi Zhu <sup>†</sup> and Bin Du * </strong></p> </div> <div class="abstract_top"> <p>College of Automation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 211016, China</p> <p>* Correspondence: iniesdu@nuaa.edu.cn</p> <p>† These authors contributed equally to this work.</p> <p>Received: 2 November 2024; Revised: 24 December 2024;Accepted: 26 December 2024; Published: 27 December 2024</p> <p> </p> </div> <p><strong id="abstract" class="label">Abstract: </strong>In this paper, we focus on a multi-agent source seeking problem where the safety of agents is characterized by a set of linear constraints. In particular, the safety constraints are also dependent on the unknown environment states, which makes the source seeking problem challenging to solve. To overcome such a challenge, we introduce a new notion of measurable path and then specify the reachability condition for all agents. A time-sequence of exploration is further introduced to help the agents to escape the stuck positions. To provide a performance guarantee for our source seeking algorithm, we perform the regret analysis and show a sub-linear cumulative regret. Finally, we evaluate the effectiveness of our SafeSearch algorithm through a set of simulations.</p> 2024-12-27T00:00:00+08:00 Copyright (c) 2024 by the authors.