We develop an efficient software package to test for the primality of p2^n+1, p prime and p>2^n. This aids in the determination of large, non-Sierpinski numbers p, for prime p, and in cryptography. It furthermore uniquely allows for the computation of the smallest...

["Cryptography","Data Science","Theory and Formal Methods"]

Evolutionary algorithms often incorporate ecological concepts to help maintain diverse populations and drive continued innovation. However, while there is strong evidence for the value of ecological dynamics, a lack of overarching theoretical framework renders...

["Computational Biology","Adaptive and Self-Organizing Systems","Data Mining and Machine Learning","Theory and Formal Methods"]

In this article we consider a certain sub class of Integer Equal Flow problem, which are known NP hard. Currently there exist no direct solutions for the same. It is a common problem in various inventory management systems. Here we discuss a local minima solution...

["Data Science","Optimization Theory and Computation","Theory and Formal Methods"]

We present a linear time-varying Luenberger observer (LTVLO) using compartmental models to estimate the unmeasurable states in patients with type 1 diabetes. The LTVLO proposed is based on the linearization in an operation point of the virtual patient (VP), where...

["Algorithms and Analysis of Algorithms","Scientific Computing and Simulation","Theory and Formal Methods"]

The growth function is the generating function for sizes of spheres around the identity in Cayley graphs of groups. We present a novel method to calculate growth functions for automatic groups with normal form recognizing automata that recognize a single normal...

An immune system inspired Artificial Immune System (AIS) algorithm is presented, and is used for the purposes of automated program verification. Relevant immunological concepts are discussed and the field of AIS is briefly reviewed. It is proposed to use this AIS...

["Computational Biology","Adaptive and Self-Organizing Systems","Theory and Formal Methods"]

I show that any elementary cellular automata -- a class of 1-dimensional, 2-state cellular automata originally formulated by Stephen Wolfram -- can be deconstructed into a set of two Boolean operators; I also present a conjecture concerning the relationship between...

Previous definitions of a Discrete Hankel Transform (DHT) have focused on methods to approximate the continuous Hankel integral transform without regard for the properties of the DHT itself. Recently, the theory of a Discrete Hankel Transform was proposed that...

["Algorithms and Analysis of Algorithms","Scientific Computing and Simulation","Theory and Formal Methods"]

Metric spaces provide a framework for analysis and have several very useful properties. Many of these properties follow in part from the triangle inequality. However, there are several applications in which the triangle inequality does not hold but in which we...

["Scientific Computing and Simulation","Theory and Formal Methods"]

Identifying a temporal pattern of events is a fundamental task of online (real-time) verification. We present efficient schemes for online monitoring of events for identifying desired/undesired patterns of events. The schemes use preprocessing to ensure that the...

["Algorithms and Analysis of Algorithms","Theory and Formal Methods"]

We present a geometric model of image formation in Scheimpflug cameras that is most general. Scheimpflug imaging is commonly used is scientific and medical imaging either to increase the depth of field of the imager or to focus on tilted object surfaces. Existing...

Formal argument suggests that command, communication and control systems can remain stable in the sense of the Data Rate Theorem that mandates the minimum rate of control information required to stabilize inherently unstable 'plants', but may nonetheless, under...

["Autonomous Systems","Real-Time and Embedded Systems","Robotics","Theory and Formal Methods"]

Identifying patterns and associations in data is fundamental to discovery in science. This work investigates a very simple instance of the problem, where each data point consists of a vector of binary attributes, and attributes are treated equally. For example,...

["Data Mining and Machine Learning","Theory and Formal Methods"]

Agent-based modeling (ABM) is a bottom-up modeling approach, where each entity of the system being modeled is uniquely represented as an independent decision-making agent. ABMs are very sensitive to implementation details. Thus, it is very easy to inadvertently...

["Agents and Multi-Agent Systems","Scientific Computing and Simulation","Theory and Formal Methods"]

The purpose of this paper is to provide a governance structure for IT-related projects in order to assure a safeguarded and timely transition to a productive environment. This transitioning, which rarely exceeds a weekend, is colloquially called ‘cut-over’, ‘rollout’...

["Computer Architecture","Theory and Formal Methods","Software Engineering"]

{"aggs_articles_subjects":{"doc_count_error_upper_bound":0,"sum_other_doc_count":4,"buckets":[{"key":"Theory and Formal Methods","doc_count":21},{"key":"Scientific Computing and Simulation","doc_count":6},{"key":"Algorithms and Analysis of Algorithms","doc_count":5},{"key":"Computational Biology","doc_count":4},{"key":"Agents and Multi-Agent Systems","doc_count":3},{"key":"Adaptive and Self-Organizing Systems","doc_count":2},{"key":"Data Mining and Machine Learning","doc_count":2},{"key":"Data Science","doc_count":2},{"key":"Artificial Intelligence","doc_count":1},{"key":"Autonomous Systems","doc_count":1},{"key":"Bioinformatics","doc_count":1},{"key":"Computational Linguistics","doc_count":1},{"key":"Computer Architecture","doc_count":1},{"key":"Computer Vision","doc_count":1},{"key":"Cryptography","doc_count":1}]},"aggs_journal_slug":{"doc_count_error_upper_bound":0,"sum_other_doc_count":0,"buckets":[{"key":"cs","doc_count":21}]},"aggs_manuscript_types":{"doc_count_error_upper_bound":0,"sum_other_doc_count":0,"buckets":[{"key":"research-article","doc_count":21}]},"aggs_dates":{"buckets":[{"key":"1970-01-01T00:00:00.000Z-2018-12-10T08:13:06.000Z","from":0,"from_as_string":"1970-01-01T00:00:00.000Z","to":1544429586000,"to_as_string":"2018-12-10T08:13:06.000Z","doc_count":21},{"key":"2018-01-01T00:00:00.000Z-2018-12-10T08:13:06.000Z","from":1514764800000,"from_as_string":"2018-01-01T00:00:00.000Z","to":1544429586000,"to_as_string":"2018-12-10T08:13:06.000Z","doc_count":3},{"key":"2018-09-11T00:00:00.000Z-2018-12-10T08:13:06.000Z","from":1536624000000,"from_as_string":"2018-09-11T00:00:00.000Z","to":1544429586000,"to_as_string":"2018-12-10T08:13:06.000Z","doc_count":3},{"key":"2018-10-11T00:00:00.000Z-2018-12-10T08:13:06.000Z","from":1539216000000,"from_as_string":"2018-10-11T00:00:00.000Z","to":1544429586000,"to_as_string":"2018-12-10T08:13:06.000Z","doc_count":2},{"key":"2018-11-10T00:00:00.000Z-2018-12-10T08:13:06.000Z","from":1541808000000,"from_as_string":"2018-11-10T00:00:00.000Z","to":1544429586000,"to_as_string":"2018-12-10T08:13:06.000Z","doc_count":1},{"key":"2018-12-03T00:00:00.000Z-2018-12-10T08:13:06.000Z","from":1543795200000,"from_as_string":"2018-12-03T00:00:00.000Z","to":1544429586000,"to_as_string":"2018-12-10T08:13:06.000Z","doc_count":0},{"key":"2018-12-10T00:00:00.000Z-2018-12-10T08:13:06.000Z","from":1544400000000,"from_as_string":"2018-12-10T00:00:00.000Z","to":1544429586000,"to_as_string":"2018-12-10T08:13:06.000Z","doc_count":0}]}}

I told my colleagues that PeerJ is a journal where they need to publish if they want their paper to be published quickly and with the strict peer review expected from a good journal.