Mustafa Mamat
Universiti Sultan Zainal Abidin
AlgorithmGradient methodMathematical optimizationMathematical analysisGradient descentNonlinear systemAttractorDerivation of the conjugate gradient methodNonlinear conjugate gradient methodChaoticDescent (mathematics)Applied mathematicsUnconstrained optimizationMathematicsComputer scienceControl theoryConvergence (routing)Conjugate gradient methodLine searchConjugate residual method
320Publications
15H-index
1,057Citations
Publications 366
Newest
#1Aceng SambasH-Index: 12
Last. Mustafa MamatH-Index: 15
view all 8 authors...
1 CitationsSource
#2Mustafa MamatH-Index: 15
Last. Maulana MalikH-Index: 4
view all 5 authors...
Source
Last. Nurnadiah ZamriH-Index: 6
view all 5 authors...
Source
In this work, we devise a new 5-D hyperchaotic dynamo system by adding two feedback controllers to the Rikitake 2-disk dynamo system (1958). We show that the new 5-D hyperchaotic system does not possess any equilibrium point and deduce that the new 5-D system has a hidden hyperchaotic attractor. Using Multisim, we develop an electronic circuit design of the new 5-D hyperchaotic dynamo system for practical applications. We also exhibit the implementation of the new 5-D hyperchaotic dynamo system ...
Source
Max-plus algebra is a discrete algebraic system developed on the operations max ( ) and plus ( ), where the max and plus operations are defined as addition and multiplication in conventional algebra. This algebraic structure is a semi-ring with its elements being real numbers along with e=-∞ and e=0. On the other hand, the synchronized discrete event problem is a problem in which an event is scheduled to meet a deadline. There are two aspects of this problem. They include the events running simu...
Source
#1Kalfin (UNPAD: Padjadjaran University)
#2Sukono (UNPAD: Padjadjaran University)H-Index: 5
Last. Mustafa Mamat (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 15
view all 4 authors...
Natural disasters due to excessive rainfall often cause huge losses in the form of impacts including casualties and economic losses. To minimize casualties, disaster mitigation is needed, while financing for disasters (emergency response) and financing after disasters (rehabilitation and reconstruction) can be carried out with insurance. This paper aims to determine mitigation efforts and insurance premiums for natural disasters. The method as a mitigation effort is studied based on several meth...
Source
Conjugate Gradient (CG) method is the most prominent iterative mathematical technique that can be useful for the optimization of both linear and non-linear systems due to its simplicity, low memory requirement, computational cost, and global convergence properties. However, some of the classical CG methods have some drawbacks which include weak global convergence, poor numerical performance both in terms of number of iterations and the CPU time. To overcome these drawbacks, researchers proposed ...
Source
#1Kamilu KamfaH-Index: 2
Last. M. Mamat
view all 5 authors...
In this paper we present a new BFGS method for solving unconstrained optimization problems, using a modified rational approximation model The idea is to improve the Barzilai and Borwein approximation (BBA) [27] by incorporating a new parameter Under certain conditions the global convergent result of the proposed method is established The numerical results have shown that, the new method is promising and outperforms other classical methods Besides, the new method was used to solve data from Covid...
Source
#1Maulana MalikH-Index: 4
#2Siti Sabariah Abas (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 1
Last. Agung Prabowo (Jenderal Soedirman University)H-Index: 1
view all 5 authors...
#1Yahia Alemami (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 1
#2Mohamad Afendee Mohamed (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 6
Last. Mustafa Mamat (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 15
view all 4 authors...
There are various ways of social communication including writing (WhatsApp, Messenger, Facebook, Twitter, Skype, etc), calling (mobile phone) and voice recording (record your voice and then send it to the other party), but there are ways to eavesdropping the calls and voice messages, One way to solve this problem is via cryptographic approach. Chaos cryptography build on top of nonlinear dynamics chaotic system has gained some footstep in data security. It provides an alternative to conventional...
2 CitationsSource