eISSN:
 2577-8838

All Issues

Volume 3, 2020

Volume 2, 2019

Volume 1, 2018

MFC Flyer: showing all essential information of the journal.
Call for papers     Special issue on Approximation by linear and nonlinear operators with applications (click to view details)

Mathematical Foundations of Computing (MFC), indexed in ESCI, provides an interdisciplinary forum to promote interaction among mathematicians, computer scientists and statisticians as well as engineers to exchange new ideas and techniques for attacking the pressing challenges in data analysis. The journal aims to provide a place for more understanding and transparency of data analytics in different areas of AI. We welcome high-quality papers in all areas of AI related to the computational and algorithmic aspects of data analysis, with emphasis on innovative theoretical development, methods, and algorithms including, but not restricted to, machine learning, deep learning, and learning theory.


Select all articles

Export/Reference:

Word sense disambiguation based on stretchable matching of the semantic template
Wei Wang, Degen Huang and Haitao Yu
2021, 4(1) : 1-13 doi: 10.3934/mfc.2020022 +[Abstract](508) +[HTML](297) +[PDF](4425.14KB)
On approximation to discrete q-derivatives of functions via q-Bernstein-Schurer operators
Harun Karsli
2021, 4(1) : 15-30 doi: 10.3934/mfc.2020023 +[Abstract](409) +[HTML](224) +[PDF](472.17KB)
Fixed-point algorithms for inverse of residual rectifier neural networks
Ruhua Wang, Senjian An, Wanquan Liu and Ling Li
2021, 4(1) : 31-44 doi: 10.3934/mfc.2020024 +[Abstract](374) +[HTML](217) +[PDF](417.25KB)
The uses and abuses of an age-period-cohort method: On the linear algebra and statistical properties of intrinsic and related estimators
Qiang Fu, Xin Guo, Sun Young Jeon, Eric N. Reither, Emma Zang and Kenneth C. Land
2021, 4(1) : 45-59 doi: 10.3934/mfc.2021001 +[Abstract](622) +[HTML](162) +[PDF](403.91KB)
An extension of TOPSIS for group decision making in intuitionistic fuzzy environment
Naziya Parveen and Prakash N. Kamble
2021, 4(1) : 61-71 doi: 10.3934/mfc.2021002 +[Abstract](178) +[HTML](166) +[PDF](375.04KB)
A survey on security and privacy issues of blockchain technology
Archana Prashanth Joshi, Meng Han and Yan Wang
2018, 1(2) : 121-147 doi: 10.3934/mfc.2018007 +[Abstract](26526) +[HTML](14036) +[PDF](3282.55KB) Cited By(57)
How convolutional neural networks see the world --- A survey of convolutional neural network visualization methods
Zhuwei Qin, Fuxun Yu, Chenchen Liu and Xiang Chen
2018, 1(2) : 149-180 doi: 10.3934/mfc.2018008 +[Abstract](10354) +[HTML](5750) +[PDF](5025.25KB) Cited By(26)
Hybrid binary dragonfly enhanced particle swarm optimization algorithm for solving feature selection problems
Mohamed A. Tawhid and Kevin B. Dsouza
2018, 1(2) : 181-200 doi: 10.3934/mfc.2018009 +[Abstract](6496) +[HTML](2816) +[PDF](609.18KB) Cited By(13)
Discrete heat transfer search for solving travelling salesman problem
Poonam Savsani and Mohamed A. Tawhid
2018, 1(3) : 265-280 doi: 10.3934/mfc.2018012 +[Abstract](4717) +[HTML](2637) +[PDF](865.09KB) Cited By(6)
A classification algorithm with Linear Discriminant Analysis and Axiomatic Fuzzy Sets
Wenjuan Jia, Yingjie Deng, Chenyang Xin, Xiaodong Liu and Witold Pedrycz
2019, 2(1) : 73-81 doi: 10.3934/mfc.2019006 +[Abstract](2920) +[HTML](1099) +[PDF](681.93KB) Cited By(4)
Influence analysis: A survey of the state-of-the-art
Meng Han and Yingshu Li
2018, 1(3) : 201-253 doi: 10.3934/mfc.2018010 +[Abstract](8883) +[HTML](4090) +[PDF](2792.87KB) Cited By(4)
CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids
Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, Zhi Tian, Kemal Akkaya and and Limin Sun
2018, 1(1) : 77-100 doi: 10.3934/mfc.2018005 +[Abstract](6527) +[HTML](2426) +[PDF](1438.97KB) Cited By(3)
Application of learning algorithms in smart home IoT system security
Jian Mao, Qixiao Lin and Jingdong Bian
2018, 1(1) : 63-76 doi: 10.3934/mfc.2018004 +[Abstract](12675) +[HTML](7350) +[PDF](1032.13KB) Cited By(2)
"Reducing the number of dimensions of the possible solution space" as a method for finding the exact solution of a system with a large number of unknowns
Aleksa Srdanov, Radiša Stefanović, Aleksandra Janković and Dragan Milovanović
2019, 2(2) : 83-93 doi: 10.3934/mfc.2019007 +[Abstract](1813) +[HTML](783) +[PDF](311.88KB) Cited By(2)
SEMANTIC-RTAB-MAP (SRM): A semantic SLAM system with CNNs on depth images
Mingyuan Mao, Hewei Zhang, Simeng Li and Baochang Zhang
2019, 2(1) : 29-41 doi: 10.3934/mfc.2019003 +[Abstract](4493) +[HTML](2033) +[PDF](1868.4KB) Cited By(1)
A survey on security and privacy issues of blockchain technology
Archana Prashanth Joshi, Meng Han and Yan Wang
2018, 1(2) : 121-147 doi: 10.3934/mfc.2018007 +[Abstract](26526) +[HTML](14036) +[PDF](3282.55KB) PDF Downloads(4827)
Application of learning algorithms in smart home IoT system security
Jian Mao, Qixiao Lin and Jingdong Bian
2018, 1(1) : 63-76 doi: 10.3934/mfc.2018004 +[Abstract](12675) +[HTML](7350) +[PDF](1032.13KB) PDF Downloads(1651)
Influence analysis: A survey of the state-of-the-art
Meng Han and Yingshu Li
2018, 1(3) : 201-253 doi: 10.3934/mfc.2018010 +[Abstract](8883) +[HTML](4090) +[PDF](2792.87KB) PDF Downloads(1085)
How convolutional neural networks see the world --- A survey of convolutional neural network visualization methods
Zhuwei Qin, Fuxun Yu, Chenchen Liu and Xiang Chen
2018, 1(2) : 149-180 doi: 10.3934/mfc.2018008 +[Abstract](10354) +[HTML](5750) +[PDF](5025.25KB) PDF Downloads(895)
SEMANTIC-RTAB-MAP (SRM): A semantic SLAM system with CNNs on depth images
Mingyuan Mao, Hewei Zhang, Simeng Li and Baochang Zhang
2019, 2(1) : 29-41 doi: 10.3934/mfc.2019003 +[Abstract](4493) +[HTML](2033) +[PDF](1868.4KB) PDF Downloads(701)
A Sim2real method based on DDQN for training a self-driving scale car
Qi Zhang, Tao Du and Changzheng Tian
2019, 2(4) : 315-331 doi: 10.3934/mfc.2019020 +[Abstract](2035) +[HTML](719) +[PDF](5616.33KB) PDF Downloads(447)
CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids
Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, Zhi Tian, Kemal Akkaya and and Limin Sun
2018, 1(1) : 77-100 doi: 10.3934/mfc.2018005 +[Abstract](6527) +[HTML](2426) +[PDF](1438.97KB) PDF Downloads(311)
Cryptographic algorithms for privacy-preserving online applications
Ruinian Li, Yinhao Xiao, Cheng Zhang, Tianyi Song and Chunqiang Hu
2018, 1(4) : 311-330 doi: 10.3934/mfc.2018015 +[Abstract](4669) +[HTML](1797) +[PDF](994.72KB) PDF Downloads(276)
A survey: Reward distribution mechanisms and withholding attacks in Bitcoin pool mining
Saide Zhu, Wei Li, Hong Li, Chunqiang Hu and Zhipeng Cai
2018, 1(4) : 393-414 doi: 10.3934/mfc.2018020 +[Abstract](9048) +[HTML](3701) +[PDF](902.32KB) PDF Downloads(259)
A novel approach for solving skewed classification problem using cluster based ensemble method
Gillala Rekha, V Krishna Reddy and Amit Kumar Tyagi
2020, 3(1) : 1-9 doi: 10.3934/mfc.2020001 +[Abstract](1093) +[HTML](506) +[PDF](234.78KB) PDF Downloads(258)

Referees

Librarians

Email Alert

[Back to Top]