eISSN:
 2577-8838

All Issues

Volume 3, 2020

Volume 2, 2019

Volume 1, 2018

Call for papers     Special issue on Theme Issue on kernel-based methods (click to view details)
Call for papers     Special Issue on Analysis in Data Science: Methods and Applications (click to view details)

Mathematical Foundations of Computing (MFC), indexed in ESCI, provides an interdisciplinary forum to promote interaction among mathematicians, computer scientists and statisticians as well as engineers to exchange new ideas and techniques for attacking the pressing challenges in data analysis. The journal aims to provide a place for more understanding and transparency of data analytics in different areas of AI. We welcome high-quality papers in all areas of AI related to the computational and algorithmic aspects of data analysis, with emphasis on innovative theoretical development, methods, and algorithms including, but not restricted to, machine learning, deep learning, and learning theory.


Select all articles

Export/Reference:

A fast matching algorithm for the images with large scale disparity
Shichu Chen, Zhiqiang Wang and Yan Ren
2020, 3(3) : 141-155 doi: 10.3934/mfc.2020021 +[Abstract](458) +[HTML](217) +[PDF](944.11KB)
Summation of Gaussian shifts as Jacobi's third Theta function
Shengxin Zhu
2020, 3(3) : 157-163 doi: 10.3934/mfc.2020015 +[Abstract](436) +[HTML](253) +[PDF](306.35KB)
Modal additive models with data-driven structure identification
Tieliang Gong, Chen Xu and Hong Chen
2020, 3(3) : 165-183 doi: 10.3934/mfc.2020016 +[Abstract](451) +[HTML](258) +[PDF](640.33KB)
Averaging versus voting: A comparative study of strategies for distributed classification
Donglin Wang, Honglan Xu and Qiang Wu
2020, 3(3) : 185-193 doi: 10.3934/mfc.2020017 +[Abstract](439) +[HTML](211) +[PDF](275.0KB)
The nonexistence of global solution for system of q-difference inequalities
Yaoyao Luo and Run Xu
2020, 3(3) : 195-203 doi: 10.3934/mfc.2020019 +[Abstract](422) +[HTML](227) +[PDF](282.68KB)
Sparse regularized learning in the reproducing kernel banach spaces with the $ \ell^1 $ norm
Ying Lin, Rongrong Lin and Qi Ye
2020, 3(3) : 205-218 doi: 10.3934/mfc.2020020 +[Abstract](562) +[HTML](236) +[PDF](453.17KB)
A survey on security and privacy issues of blockchain technology
Archana Prashanth Joshi, Meng Han and Yan Wang
2018, 1(2) : 121-147 doi: 10.3934/mfc.2018007 +[Abstract](23199) +[HTML](12635) +[PDF](3282.55KB) Cited By(32)
How convolutional neural networks see the world --- A survey of convolutional neural network visualization methods
Zhuwei Qin, Fuxun Yu, Chenchen Liu and Xiang Chen
2018, 1(2) : 149-180 doi: 10.3934/mfc.2018008 +[Abstract](8393) +[HTML](5262) +[PDF](5025.25KB) Cited By(23)
Hybrid binary dragonfly enhanced particle swarm optimization algorithm for solving feature selection problems
Mohamed A. Tawhid and Kevin B. Dsouza
2018, 1(2) : 181-200 doi: 10.3934/mfc.2018009 +[Abstract](6055) +[HTML](2666) +[PDF](609.18KB) Cited By(13)
Discrete heat transfer search for solving travelling salesman problem
Poonam Savsani and Mohamed A. Tawhid
2018, 1(3) : 265-280 doi: 10.3934/mfc.2018012 +[Abstract](4336) +[HTML](2507) +[PDF](865.09KB) Cited By(5)
A classification algorithm with Linear Discriminant Analysis and Axiomatic Fuzzy Sets
Wenjuan Jia, Yingjie Deng, Chenyang Xin, Xiaodong Liu and Witold Pedrycz
2019, 2(1) : 73-81 doi: 10.3934/mfc.2019006 +[Abstract](2530) +[HTML](968) +[PDF](681.93KB) Cited By(4)
CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids
Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, Zhi Tian, Kemal Akkaya and and Limin Sun
2018, 1(1) : 77-100 doi: 10.3934/mfc.2018005 +[Abstract](6044) +[HTML](2305) +[PDF](1438.97KB) Cited By(2)
Application of learning algorithms in smart home IoT system security
Jian Mao, Qixiao Lin and Jingdong Bian
2018, 1(1) : 63-76 doi: 10.3934/mfc.2018004 +[Abstract](11168) +[HTML](7029) +[PDF](1032.13KB) Cited By(2)
Influence analysis: A survey of the state-of-the-art
Meng Han and Yingshu Li
2018, 1(3) : 201-253 doi: 10.3934/mfc.2018010 +[Abstract](8231) +[HTML](3915) +[PDF](2792.87KB) Cited By(2)
"Reducing the number of dimensions of the possible solution space" as a method for finding the exact solution of a system with a large number of unknowns
Aleksa Srdanov, Radiša Stefanović, Aleksandra Janković and Dragan Milovanović
2019, 2(2) : 83-93 doi: 10.3934/mfc.2019007 +[Abstract](1568) +[HTML](624) +[PDF](311.88KB) Cited By(2)
SEMANTIC-RTAB-MAP (SRM): A semantic SLAM system with CNNs on depth images
Mingyuan Mao, Hewei Zhang, Simeng Li and Baochang Zhang
2019, 2(1) : 29-41 doi: 10.3934/mfc.2019003 +[Abstract](3769) +[HTML](1869) +[PDF](1868.4KB) Cited By(1)
A survey on security and privacy issues of blockchain technology
Archana Prashanth Joshi, Meng Han and Yan Wang
2018, 1(2) : 121-147 doi: 10.3934/mfc.2018007 +[Abstract](23199) +[HTML](12635) +[PDF](3282.55KB) PDF Downloads(3581)
Application of learning algorithms in smart home IoT system security
Jian Mao, Qixiao Lin and Jingdong Bian
2018, 1(1) : 63-76 doi: 10.3934/mfc.2018004 +[Abstract](11168) +[HTML](7029) +[PDF](1032.13KB) PDF Downloads(1159)
Influence analysis: A survey of the state-of-the-art
Meng Han and Yingshu Li
2018, 1(3) : 201-253 doi: 10.3934/mfc.2018010 +[Abstract](8231) +[HTML](3915) +[PDF](2792.87KB) PDF Downloads(810)
How convolutional neural networks see the world --- A survey of convolutional neural network visualization methods
Zhuwei Qin, Fuxun Yu, Chenchen Liu and Xiang Chen
2018, 1(2) : 149-180 doi: 10.3934/mfc.2018008 +[Abstract](8393) +[HTML](5262) +[PDF](5025.25KB) PDF Downloads(746)
SEMANTIC-RTAB-MAP (SRM): A semantic SLAM system with CNNs on depth images
Mingyuan Mao, Hewei Zhang, Simeng Li and Baochang Zhang
2019, 2(1) : 29-41 doi: 10.3934/mfc.2019003 +[Abstract](3769) +[HTML](1869) +[PDF](1868.4KB) PDF Downloads(542)
A Sim2real method based on DDQN for training a self-driving scale car
Qi Zhang, Tao Du and Changzheng Tian
2019, 2(4) : 315-331 doi: 10.3934/mfc.2019020 +[Abstract](1560) +[HTML](491) +[PDF](5616.33KB) PDF Downloads(282)
CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids
Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, Zhi Tian, Kemal Akkaya and and Limin Sun
2018, 1(1) : 77-100 doi: 10.3934/mfc.2018005 +[Abstract](6044) +[HTML](2305) +[PDF](1438.97KB) PDF Downloads(260)
Cryptographic algorithms for privacy-preserving online applications
Ruinian Li, Yinhao Xiao, Cheng Zhang, Tianyi Song and Chunqiang Hu
2018, 1(4) : 311-330 doi: 10.3934/mfc.2018015 +[Abstract](4186) +[HTML](1646) +[PDF](994.72KB) PDF Downloads(228)
A survey: Reward distribution mechanisms and withholding attacks in Bitcoin pool mining
Saide Zhu, Wei Li, Hong Li, Chunqiang Hu and Zhipeng Cai
2018, 1(4) : 393-414 doi: 10.3934/mfc.2018020 +[Abstract](7707) +[HTML](3528) +[PDF](902.32KB) PDF Downloads(228)
An effective hybrid firefly algorithm with the cuckoo search for engineering optimization problems
Mohamed A. Tawhid and Ahmed F. Ali
2018, 1(4) : 349-368 doi: 10.3934/mfc.2018017 +[Abstract](4345) +[HTML](1415) +[PDF](649.23KB) PDF Downloads(214)

Referees

Librarians

Email Alert

[Back to Top]