Original Research Article

Inventory Control System on Some Products of Some Selected Supermarkets in Port-Harcourt Rivers State

Ukamaka Cynthia Orumie, Francis Egenti Nzerem

Asian Journal of Mathematics and Computer Research, Volume 30, Issue 1, Page 1-16
DOI: 10.56557/ajomcor/2023/v30i18129

Inventory management and control are essential to that company since lack of it poses a threat to a company's viability. The inventory management system has been undercut by supermarkets and other corporate entities, increasing the risk of missing goods and faulty record keeping (stock keeping). This leads to poor stock management in supermarkets and other commercial enterprises due to ignorance of the optimal time to place an order and the perfect quantity of the commodity to be ordered. The goal of this study is to implement an inventory control system in selected supermarkets within university of port Harcourt environment. This includes examining the types of stock control measures used by supermarkets, as well as determining the Economic Order Quantity (EOQ), the Purchase Cost Per Cycle, and the Total Cost Per Unit Time, and obtaining the optimum level using a single item static model with and without product shortages. Purposive sampling was used to select the items from among the wide range of goods offered in the various supermarkets, including Market Square Supermarket Choba Branch, Everyday Supermarket Choba Branch, and Gemstone Ultra Mart Alakahia, all of which are located near the University of Port Harcourt. According to comparisons outcomes using the values obtained as the EOQ, and Lead time, Market Square supermarket had the highest sales, followed by Everyday supermarket, and then Gemstone supermarkets, with the exception of Dettol, where Everyday Supermarket is in the lead. The most regular purchase item is Golden Morning Products, followed by Indomitable and Dettol Disinfectant in the three supermarkets. Considering the EOQ (Q*) results, the inventory cycle duration (to*), and the overall cost per unit of time (CT*) for both when shortage is allowed and when not allowed, the Indomitable product in the Market Square supermarket has the highest EOQ, the Dettol disinfectant product (250ml) in the Gem Stone supermarket has the cycle length to*, and the Golden Morn product in the Market Square supermarket has the highest optimal total cost per unit time (CT).

Original Research Article

Analysis of Mechanisms for Resource Management in IoT: Performance of Mutual Authentication in the Context of Fog and EDGE-Fog Computing

Gaye Abdourahime, Ousmane Ndiaye

Asian Journal of Mathematics and Computer Research, Volume 30, Issue 1, Page 17-25
DOI: 10.56557/ajomcor/2023/v30i18138

The Internet is now experiencing an unprecedented expansion with the development of connected objects. At its inception the IoT, like any revolution, its objectives were quite limited. Its main objective was to reduce the effort of human data entry in order to allow the storage and automatic processing of the latter. Moreover, objects generate a lot of data that they cannot store or process by themselves, hence the need for external support. This is how Cloud Computing comes to answer this problem, making the success of IoT. This technology guarantees the storage, availability, processing, etc. of data, its integration into the latter is known as "Cloud of Things" CoT. The data generated should not only be stored, but rather processed in order to derive knowledge, decision making. The objective of our work is to analyze mutual authentication management models of IoT devices to optimize resources trying to provide solutions in the face of resource availability. To carry out this work, we analyzed the application areas and the challenges of IoT. Then, we studied IoT security threats. Our work ends with a study and an analysis mechanism of mutual authentication management models of IoT based on uncertificated Authentication mechanisms, Elliptic curve cryptography authentication, Mutual Authentication in the context of Fog Computing.

Original Research Article

Research on the Game Mechanism of Rational Outsourcing Database

Li Liu

Asian Journal of Mathematics and Computer Research, Volume 30, Issue 1, Page 26-32
DOI: 10.56557/ajomcor/2023/v30i18165

While outsourcing databases are widely used, their security is also facing great challenges. In order to reduce the validation and communication overheads of outsourcing solutions, this paper designs a game mechanism for rational outsourcing databases based on game theory, setting incentives and defining a payoff matrix to ensure that each rational participant will only maintain an honest strategy so as not to contradict the self-interest nature and achieve a Nash equilibrium. Finally, through simulation experiments, this paper proves that the use of utility functions to secure data can reduce the user's verification overhead and communication overhead, which has important research value.

Original Research Article

Statistical Trend Analysis on Infant Mortality Rate and Estimation of Live Births in Nigeria

Orumie, Ukamaka Cynthia, Inumimonte, David Ennis, Samuel Nvene

Asian Journal of Mathematics and Computer Research, Volume 30, Issue 1, Page 33-47
DOI: 10.56557/ajomcor/2023/v30i18183

Particularly in nations like Nigeria, the likelihood that a child may pass away before turning one is rather distressing. Infant Mortality Rate is the term used to describe this. Ending all preventable deaths of children under the age of five is goal 3.2 of the Sustainable Development Goals (SDGs). This study's foundation is the statistical analysis of Nigeria's infant mortality rate. The secondary data was gathered from the World Bank Survey, which included annual records of the infant mortality rate in Nigeria over the ten-year period from 2012 to 2021. To assess the trend and estimate the model parameters, Time Series Analysis (TREND) was the statistical method employed. The researchers used the trend to predict for the following ten years. Both the number of infant fatalities and the infant mortality rate are moving decrease, according to the trend study. This demonstrates that the Infant Mortality Rate in Nigeria steadily decreases as the live birth rate rises, yet it is unlikely that it will reach zero or be insignificant by 2032. According to the analysis, the quadratic trend model fits the data sets the best because it has the smallest error margin and an R-square value that is extremely close to 100%. According to the model developed, Nigeria's infant mortality rate is expected to continue to drop throughout the course of the following ten years. Yet, the finding is not striking enough because, in 2031, the infant mortality rate will probably still be higher than 45. Hence, if appropriate measures are not implemented, we will not be able to achieve the goal of eliminating all preventable deaths of children under the age of five and lowering new birth deaths to no more than 12 per thousand. Also, it was seen from the table and graphs that the infant mortality rate decreased more rapidly from 2016 to 2017. This shows that the Sustainable Development Goals (SDGs), which went into effect in 2016, contributed to a decrease in the infant mortality rate.

Original Research Article

Relationship between Secure Decision Points and Arbitrary Polygon Positions in Malicious Models

Xueli Yan

Asian Journal of Mathematics and Computer Research, Volume 30, Issue 1, Page 48-57
DOI: 10.56557/ajomcor/2023/v30i18191

The problem of determining the position relationship between points and polygons is very extensive in practical applications. However, the existing solutions are only applicable to the case of convex polygons, and no solutions are given for arbitrary polygons. In addition, most of the existing schemes are carried out under the semi-honest model, and cannot resist the active attack of malicious adversaries. In order to solve these problems, this paper uses Paillier's encryption scheme, the idea of zero-knowledge proof to design a decision protocol to protect the position relationship between points and arbitrary polygons, which can not only prevent the deceptive behavior of malicious adversaries, but also extend the application from convex polygons to arbitrary polygons. A simulation example is used to prove that this paper is safe and efficient under the malicious model.