Applied Mathematics and Statistics https://w3.sciltp.com/journals/ams <p>Applied Mathematics and Statistics (AMS) is an international interdisciplinary journal committed to publishing original papers of significant scientific value across the spectrum of applied mathematics and statistics. AMS cordially welcomes original research articles and surveys utilizing mathematical or statistical methodologies to tackle intricate issues across diverse fields, thereby fostering future innovations and the development of novel technologies. AMS aims to be a premier publication showcasing cutting-edge research at the intersection of mathematics and applied sciences, hence providing valuable insights and fostering innovation across various domains.</p> Scilight Press en-US Applied Mathematics and Statistics 2982-2602 Editorial for the First Issue of Applied Mathematics and Statistics (AMS) https://w3.sciltp.com/journals/ams/article/view/432 <p class="categorytitle"><em>Editorial</em></p> <h1>Editorial for the First Issue of <em>Applied Mathematics and Statistics (AMS)</em></h1> <div class="abstract_title"> <p><strong>Jinde Cao</strong></p> </div> <div class="abstract_top"> <p>School of Mathematics, Southeast University, Nanjing 211189, China; jdcao@seu.edu.cn</p> </div> Jinde Cao Copyright (c) 2024 by the authors. https://creativecommons.org/licenses/by/4.0/ 2024-07-30 2024-07-30 1 1 10.53941/ams.2024.100001 Hopf Bifurcation of the Oregonator Oscillator with Distributed Delay https://w3.sciltp.com/journals/ams/article/view/385 <p class="categorytitle"><em>Article</em></p> <h1>Hopf Bifurcation of the Oregonator Oscillator with Distributed Delay</h1> <div class="abstract_title"> <p><strong>Yu Wang <sup>1,</sup>*</strong> <strong>and Luca Guerrini <sup>2</sup></strong></p> </div> <div class="abstract_top"> <p><sup>1 </sup>School of Mathematics, Southeast University, Nanjing 210096, China</p> <p><sup>2 </sup>Department of Management, Polytechnic University of Marche, 60121 Ancona, Italy</p> <p>* Correspondence: 230218180@seu.edu.cn</p> <p>Received: 2 June 2024; Revised: 10 July 2024; Accepted: 30 July 2024; Published: 19 August 2024</p> <p> </p> </div> <p><strong id="abstract" class="label">Abstract: </strong>This paper investigates the bifurcation problem of the Oregonator oscillator with distributed time delay, and two cases are considered, namely weak and strong kernels. First, theoretical approaches are provided to analyze the stability properties of the equilibrium in these systems using the chain trick method. Near the positive equilibrium point, the Routh-Hurwitz criteria are employed to establish precise conditions for stability and Hopf bifurcation and determine the bifurcation direction. Additionally, this paper explores the implications of inffnite memory within a distributed delay to gain insights into the dynamic behavior. Moreover, extensive numerical simulations are conducted to support our theoretical analysis. The main simulations illustrate the bifurcation waveform and phase diagrams and reveal complex dynamic behavior, including stable and unstable oscillations.</p> Yu Wang Luca Guerrini Copyright (c) 2024 by the authors. https://creativecommons.org/licenses/by/4.0/ 2024-08-19 2024-08-19 2 2 10.53941/ams.2024.100002 Independent Domination in Claw-Free Cubic Graphs https://w3.sciltp.com/journals/ams/article/view/397 <p class="categorytitle"><em>Article</em></p> <h1>Independent Domination in Claw-Free Cubic Graphs</h1> <div class="abstract_title"> <p><strong>Linyu Li <sup>1</sup></strong> <strong>and Jun Yue <sup>2,</sup>*</strong></p> </div> <div class="abstract_top"> <p><sup>1 </sup>School of Mathematics and Statistics, Shandong Normal University, Jinan 250358, China</p> <p><sup>2 </sup>School of Mathematics Science, Tiangong University, Tianjin 300387, China</p> <p>* Correspondence: yuejun06@126.com</p> <p>Received: 7 June 2024; Revised: 5 August 2024; Accepted: 13 August 2024; Published: 22 August 2024</p> <p> </p> </div> <p><strong id="abstract" class="label">Abstract: </strong>A vertex set <em>S</em> of a graph <em>G</em> is called an independent dominating set if <em>S</em> is an independent set and each vertex in <em>V(G)</em>\<em>S</em> is adjacent to a vertex in <em>S</em>. The independent domination number <em>i</em>(<em>G</em>) of <em>G</em> is the minimum cardinality of an independent dominating set in <em>G</em>. This paper first proves that if <em>G</em> is a connected <span class="inline_formula"><label>\(K_{1,3}\)</label></span>-free cubic graph, then <span class="inline_formula"><label>\(i(G)\leq \frac{1}{3}|V(G)|\)</label></span>. Meanwhile, <span class="inline_formula"><label>\(i(G)=\frac{1}{3}|V(G)|\)</label></span> if and only if <span class="inline_formula"><label>\(G\in \mathcal{H}\)</label></span>, where <span class="inline_formula"><label>\(\mathcal{H}\)</label></span> is an infinite cubic family with each graph being a <span class="inline_formula"><label>\(C_6^+\)</label></span>-necklace. Then, it is shown that if <em>G</em> is a <span class="inline_formula"><label>\(\{K_{1,3}, K_4^-, C_6^+\}\)</label></span>-free cubic graph with no <span class="inline_formula"><label>\(C_3\Box K_2\)</label></span>-component, then <span class="inline_formula"><label>\(i(G)\leq \frac{5}{18}|V(G)|\)</label></span>. This result is tight.</p> Linyu Li Jun Yue Copyright (c) 2024 by the authors. https://creativecommons.org/licenses/by/4.0/ 2024-08-22 2024-08-22 3 3 10.53941/ams.2024.100003 Adaptive Resilience via Probabilistic Automaton: Safeguarding Multi-Agent Systems from Leader Missing Attacks https://w3.sciltp.com/journals/ams/article/view/470 <p class="categorytitle"><em>Article</em></p> <h1>Adaptive Resilience via Probabilistic Automaton: Safeguarding Multi-Agent Systems from Leader Missing Attacks</h1> <div class="abstract_title"> <p><strong>Kuanxiang Wang <sup>1</sup></strong> <strong>and Xin Gong <sup>2,</sup>*</strong></p> </div> <div class="abstract_top"> <p><sup>1 </sup>The School of Information Science and Engineering, East China University of Science and Technology, Shanghai 200237, China</p> <p><sup>2 </sup>The School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China</p> <p>* Correspondence: xingong@seu.edu.cn; Tel.: +86-185-9806-0508</p> <p>Received: 26 August 2024; Revised: 3 October 2024; Accepted: 18 October 2024; Published: 25 October 2024</p> <p> </p> </div> <p><strong id="abstract" class="label">Abstract: </strong>The resilience of leader-following structures has been a hotspot in both academic and industrial research. Existing studies mainly focus on maintaining follower coherence, usually assuming that the leader can always function properly. However, these studies neglect the risk of system paralysis if the leader is compromised. To resolve this problem, this paper leverages probabilistic automata grammar reasoning to investigate how followers can gradually infer their operational rules within the system over time. First, a grammatical inference module is implemented on the followers to enable them to deduce their rules once they receive commands from the leader. Then, this paper proposes three probabilistic automata reasoning methods for this inference: the Algorithm for Learning Regular Grammars with Inference Assistance (ALERGIA), Distinguished String Automata Inference (DSAI), and Minimum Divergent Inference (MDI). By using these methods, a follower can reason about deterministic finite automata from multiple commands issued by the leader, which are then utilized to construct deterministic probabilistic finite automata for representing the follower's rules. Finally, several examples are provided to validate the correctness of these reasoning methods and compare their efficiency in learning probabilistic automata. The results indicate that all three methods achieve an accuracy of 98.535% in learning the correct automata transformation function, and ALERGIA runs slightly faster. These findings suggest that even if the leader is compromised, the agent can still perform tasks autonomously using the inferred rules, thereby avoiding system paralysis.</p> Kuanxiang Wang Xin Gong Copyright (c) 2024 Applied Mathematics and Statistics https://creativecommons.org/licenses/by/4.0/ 2024-10-25 2024-10-25 4 4 10.53941/ams.2024.100004 Bandit-Based Multi-Agent Source Seeking with Safety Guarantees https://w3.sciltp.com/journals/ams/article/view/550 <p class="categorytitle"><em>Article</em></p> <h1>Bandit-Based Multi-Agent Source Seeking with Safety Guarantees</h1> <div class="abstract_title"> <p><strong>Zhibin Ji <sup>†</sup> , Dingqi Zhu <sup>†</sup> and Bin Du * </strong></p> </div> <div class="abstract_top"> <p>College of Automation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 211016, China</p> <p>* Correspondence: iniesdu@nuaa.edu.cn</p> <p>† These authors contributed equally to this work.</p> <p>Received: 2 November 2024; Revised: 24 December 2024;Accepted: 26 December 2024; Published: 27 December 2024</p> <p> </p> </div> <p><strong id="abstract" class="label">Abstract: </strong>In this paper, we focus on a multi-agent source seeking problem where the safety of agents is characterized by a set of linear constraints. In particular, the safety constraints are also dependent on the unknown environment states, which makes the source seeking problem challenging to solve. To overcome such a challenge, we introduce a new notion of measurable path and then specify the reachability condition for all agents. A time-sequence of exploration is further introduced to help the agents to escape the stuck positions. To provide a performance guarantee for our source seeking algorithm, we perform the regret analysis and show a sub-linear cumulative regret. Finally, we evaluate the effectiveness of our SafeSearch algorithm through a set of simulations.</p> Zhibin Ji Dingqi Zhu Bin Du Copyright (c) 2024 by the authors. https://creativecommons.org/licenses/by/4.0/ 2024-12-27 2024-12-27 5 5 10.53941/ams.2024.100005