Loading [MathJax]/jax/element/mml/optable/GreekAndCoptic.js
Research article

Security of image transfer and innovative results for (p,q)-Bernstein-Schurer operators

  • Received: 31 May 2024 Revised: 31 July 2024 Accepted: 02 August 2024 Published: 09 August 2024
  • MSC : 41A10, 41A25, 41A36, 68W99

  • With the advent of quantum computing, traditional cryptography algorithms are at risk of being broken. Post-quantum encryption algorithms, developed to include mathematical challenges to make it impossible for quantum computers to solve problems, are constantly being updated to ensure that sensitive information is protected from potential threats. In this study, a hybrid examination of a (p,q)-Bernstein-type polynomial, which is an argument that can be used for encryption algorithms with a post-quantum approach, was made from a mathematical and cryptography perspective. In addition, we have aimed to present a new useful operator that approximates functions and can be used in cases where it is not possible to work with functions in the fields of technology, medicine, and engineering. Based on this idea, a new version of the (p,q)-Bernstein-Schurer operator was introduced in our study on a variable interval and the convergence rate was calculated with two different methods. At the same time, the applications of the theoretical situation in the study were presented with the help of visual illustrations and tables related to the approach. Additionally, our operator satisfied the statistical-type Korovkin theorem and is suitable for variable interval approximation. This is the first paper to study the statistical convergence properties of (p,q)-Bernstein-Schurer operators defined on a variable bounded interval, to obtain special matrices with the help of (p,q)-basis functions, and to give an application of (p,q)-type operators for encrypted image transmission.

    Citation: Nazmiye Gonul Bilgin, Yusuf Kaya, Melis Eren. Security of image transfer and innovative results for (p,q)-Bernstein-Schurer operators[J]. AIMS Mathematics, 2024, 9(9): 23812-23836. doi: 10.3934/math.20241157

    Related Papers:

    [1] Qing-Bo Cai, Melek Sofyalıoğlu, Kadir Kanat, Bayram Çekim . Some approximation results for the new modification of Bernstein-Beta operators. AIMS Mathematics, 2022, 7(2): 1831-1844. doi: 10.3934/math.2022105
    [2] Suriyakamol Thongjob, Kamsing Nonlaopon, Sortiris K. Ntouyas . Some (p, q)-Hardy type inequalities for (p, q)-integrable functions. AIMS Mathematics, 2021, 6(1): 77-89. doi: 10.3934/math.2021006
    [3] Zhongbin Zheng, Jinwu Fang, Wentao Cheng, Zhidong Guo, Xiaoling Zhou . Approximation properties of modified (p, q)-Szász-Mirakyan-Kantorovich operators. AIMS Mathematics, 2020, 5(5): 4959-4973. doi: 10.3934/math.2020317
    [4] Ruishen Qian, Xiangling Zhu . Embedding of Qp spaces into tent spaces and Volterra integral operator. AIMS Mathematics, 2021, 6(1): 698-711. doi: 10.3934/math.2021042
    [5] Khadeejah Rasheed Alhindi, Khalid M. K. Alshammari, Huda Ali Aldweby . Classes of analytic functions involving the q-Ruschweyh operator and q-Bernardi operator. AIMS Mathematics, 2024, 9(11): 33301-33313. doi: 10.3934/math.20241589
    [6] Abdullah Alotaibi, M. Mursaleen . Approximation of Jakimovski-Leviatan-Beta type integral operators via q-calculus. AIMS Mathematics, 2020, 5(4): 3019-3034. doi: 10.3934/math.2020196
    [7] B. B. Jena, S. K. Paikray, S. A. Mohiuddine, Vishnu Narayan Mishra . Relatively equi-statistical convergence via deferred Nörlund mean based on difference operator of fractional-order and related approximation theorems. AIMS Mathematics, 2020, 5(1): 650-672. doi: 10.3934/math.2020044
    [8] Pinhong Long, Huo Tang, Wenshuai Wang . Functional inequalities for several classes of q-starlike and q-convex type analytic and multivalent functions using a generalized Bernardi integral operator. AIMS Mathematics, 2021, 6(2): 1191-1208. doi: 10.3934/math.2021073
    [9] Kai Wang, Guicang Zhang . Curve construction based on quartic Bernstein-like basis. AIMS Mathematics, 2020, 5(5): 5344-5363. doi: 10.3934/math.2020343
    [10] Muhammad Sabil Ur Rehman, Qazi Zahoor Ahmad, H. M. Srivastava, Nazar Khan, Maslina Darus, Bilal Khan . Applications of higher-order q-derivatives to the subclass of q-starlike functions associated with the Janowski functions. AIMS Mathematics, 2021, 6(2): 1110-1125. doi: 10.3934/math.2021067
  • With the advent of quantum computing, traditional cryptography algorithms are at risk of being broken. Post-quantum encryption algorithms, developed to include mathematical challenges to make it impossible for quantum computers to solve problems, are constantly being updated to ensure that sensitive information is protected from potential threats. In this study, a hybrid examination of a (p,q)-Bernstein-type polynomial, which is an argument that can be used for encryption algorithms with a post-quantum approach, was made from a mathematical and cryptography perspective. In addition, we have aimed to present a new useful operator that approximates functions and can be used in cases where it is not possible to work with functions in the fields of technology, medicine, and engineering. Based on this idea, a new version of the (p,q)-Bernstein-Schurer operator was introduced in our study on a variable interval and the convergence rate was calculated with two different methods. At the same time, the applications of the theoretical situation in the study were presented with the help of visual illustrations and tables related to the approach. Additionally, our operator satisfied the statistical-type Korovkin theorem and is suitable for variable interval approximation. This is the first paper to study the statistical convergence properties of (p,q)-Bernstein-Schurer operators defined on a variable bounded interval, to obtain special matrices with the help of (p,q)-basis functions, and to give an application of (p,q)-type operators for encrypted image transmission.



    In the digital world where we need to communicate and transfer information more and more, we have to protect the information we want to transfer, our personal data, and our interests from the dangerous actions of malicious people [1]. The elements of communication are sender, receiver, messages, channels, flashbacks, codes, encoding and decoding, noise, and status [2]. In today's rapidly advancing technology, security has become an issue that needs to be evaluated separately in order to protect data from external threats during storage and transmission. The way to protect data from destruction and prevent unauthorized access is encryption. Encryption is used for transmitted data or plaintext to produce data or password text, whereas decryption is used to regenerate the original data from the password text through the secret key shared between the receiver and the transmitter. The information security practice, known as cryptology, is related to protecting data integrity, ensuring confidentiality and authentication [3]. Cryptology, which for centuries has focused on the codes used for secret communication, today encompasses much more: Cryptology today deals with techniques for exchanging secret keys, mechanisms for ensuring data integrity, protocols for authentication, digital coin, electronic elections, and more. Modern cryptography involves the study of complex computational and mathematical techniques for protecting digital information and systems against enemy attacks [4].

    Ensuring data security requires a complex and multidimensional approach. For this, precautions such as encryption of data and using strong authentication methods should be taken. Along with the studies carried out to prevent information loss, to cope with the noise problem and the need for excessive memory, research to prevent security vulnerabilities continues at a great pace, both theoretically and experimentally. Following the initiation of research on post-quantum cryptography by the National Institute of Standards and Technology in 2012, global studies began in 2016 to establish standards for post-quantum encryption. As of 2017, the National Institute of Standards and Technology has published 69 draft algorithms using four main mathematical methods: lattice-based algorithms, code-based algorithms, algorithms based on multivariate polynomials, and hash-based signature algorithms [5].

    Polynomials are used in many fields other than mathematics. For example, in [6], the energy compression performance of several different signal decomposition techniques for AR(l) signal sources, where a set of specific sample points of the square function of the desired size was approximately found using Bernstein polynomials, was mentioned. In [7], a steering law called range polynomial guidance is presented for the pulse angle control problem by shaping the viewing light angle with relative range by applying a polynomial shaping method.

    Polynomials are used as a cryptographic tool in important issues such as protecting information and the secure transfer of images. An example is [8], where classical Bernstein polynomials were used. In that study, which aimed to ensure secure transmission of the image with the public key cryptographic technique with the help of the Bernstein polynomial, the original image was compressed using the Bernstein image. The compressed image was decrypted by the receiver using a cryptographic algorithm, and the decrypted image was decompressed to recover the main image.

    Polynomials are used in many sub-branches of mathematics. One of these is approximation theory. This theory, which is of great importance for applied fields, has recently been an area where researchers have worked extensively. Bernstein operators, Szasz operators, Schurer operators, etc., are among the important operators used in approximation research. In addition, studies [9,10,11] can be used as examples of different operators defined.

    The beginning of the operators in approximation theory is based on the Bernstein polynomial. Bernstein introduced a polynomial sequence named after him in [12]. Bernstein polynomials have many uses such as statistics, numerical analysis, and mechanical components. After the introduction of quantum and post-quantum ideas into many fields, the application of q-calculus and (p,q) has made important contributions to the development of approximation theory, applied mathematics, and engineering. With the development of q-analysis, many operators have been defined. For example, q generalization of a Bernstein-type operator is given in [13]. Although q-Bernstein polynomials and classical Bernstein polynomials are similar in terms of some properties, their convergence properties are different from each other. The convergence properties of q-Bernstein polynomials vary depending on whether q is in the range (0,1) or not. Some of the studies carried out today involve the (p,q) versions of the operators as important study subjects, as in [14].

    Mursaleen et al., in [15], gave the structure of (p,q)-Bernstein operators. For (p,q)-Bernstein operators, whether the operator is convergent or not depends on the range in which p and q are defined. Many different generalizations have been made about this operator. For example, a modification of the two-dimensional Bernstein-Stancu operator is studied in [16]. Karahan and Izgi gave a modification of this operator and Cevik examined this modification on a certain interval in [17,18], respectively.

    On the other hand, Schurer defined a new operator in [19]. Cai and Zhou examined the important features of the Kantorovich-type Bernstein-Stancu-Schurer operator in [20]. Then, q- and (p,q)-Bernstein analogues of these operators were introduced in [21,22]. Many different modifications of the Schurer operator have been defined in the sense of q and then (p,q), e.g., [23,24]. The appear of the concept of statistical convergence has enabled important studies to be carried out in many sub-branches of functional analysis. [25] After the transfer of statistical convergence theory to approximation theory, it was investigated whether existing or newly defined operators in the literature would approximate statistical convergence [26]. Important properties on the variable range of one- and two-variable operator generalization were also examined in [27].

    After summarizing the literature on approximation theory, before moving on to the requirements for the use of polynomials in cryptology, we will discuss image transmission, which is one of the data types for which different encryption algorithms are used. The most important problem in the use of wireless transmission of images, especially in the fields of the defense industry and the transfer of personal information to those concerned, is security. The data transmitted by wireless communication can be copied by espionage and unwanted malicious people and can reveal negative situations. In the Russia-Ukraine war, where UAVs were widely used, it was seen that the aforementioned situations were experienced and the side that gained superiority on the frontline in this way changed instantly. Because UAV systems communicate wirelessly with the ground control station and transmit real-time images, the above-mentioned situations occur if the security of the UAV platforms is not developed to resist electronic attacks. For this reason, war technologies are sometimes prepared before the war, and sometimes, as in this war, they are developed and made more effective in line with the needs during the war. Different encryption algorithms are used to prevent security problems during the transmission of images, and as technology develops, efforts to prevent the decrypt ability of ciphers cover the development of new methods or the strengthening of existing ciphers.

    For this purpose, efficient image encryption algorithms that consume minimum power and work fast, along with expressions with mathematical difficulty, should be utilized. Since the 2000s, many mathematical concepts such as matrices, modular arithmetic, and polynomials have been used in encryption algorithms as the security of encryption methods is mostly based on the solution of mathematical problems. Without the use of quantum computers, there was no algorithm that worked in polynomial time to solve problems such as factorization and discrete logarithms. After quantum concepts are utilized, many problems that cannot be solved in polynomial time are transformed into ones that can be solved in polynomial time.

    When determining an image encryption method, security, format suitability, time, and suitability for compression should be taken into account. For this reason, we consider the compression of the original image with the help of a sequence of polynomials using the polynomial image we define. Taking advantage of the difficulties of post-quantum numbers, the defined operator is based on the method described in [8], which uses the classical Bernstein polynomial for image transmission.

    The contributions of this study to the literature can be presented as follows:

    ●    The study contains important approximation properties of the (p,q)-Bernstein-Schurer operator on a variable bounded interval.

    ●    Since the defined basis functions provide De Casteljau steps, a mathematical argument is presented for model validation and simulation studies that can be performed using Bezier curves such as designing air vehicle airfoil curves and route planning of unmanned aerial vehicles with the help of mathematical modeling.

    ●    This work includes a cryptological algorithm based on (p,q)-Bernstein-Schurer functions that we define for the security of images that need to be protected during transmission between wireless communication devices, which is of great importance for local control, smart object design.

    ●    The image transfer algorithm given in [8] using the classical Bernstein algorithm is modified with the innovations brought by the operator we defined with the aim of increasing the security so that the password cannot be decrypted by third parties thanks to the difficult calculations of (p, q)-numbers.

    ●    As the defined operator has statistical approximation properties, it is a good reference for researchers who study different types of approximation.

    In this study, considering the rapid developments in technology, medicine, and engineering, it is our aim to define and make available a new operator approaching functions, which can be used in situations where it is not possible to work with some functions in these areas. This study was created in order to fill the relevant gap in the literature as an intersection of (p,q)-operators and mobilization of the working interval. In our work, we give a new modification of (p,q)-Bernstein-Schurer-type operators inspired by [16,17,18,19,22,23,24,26]. We examinate the convergence properties and give moments of this operator. Also, important examples are given to support the theoretical information visually and numerically. Then, it is shown that the defined operator is suitable for statistical convergence by showing that it satisfies the Korovkin-type theorem. In Section 4, the (p,q)-Bernstein-Schurer basis functions that provide some properties used in De Casteljau algorithms are introduced and various equations are presented. In Section 5, matrix implementations of the defined basis functions are given, taking into account the applications of matrices in decision-making and cryptology. In the 6th part of the study, which includes cryptological data, an algorithm is given to encrypt the image for secure transmission and decrypt it by the receiver with the help of the (p,q)-operator, which we defined based on the method applied in [8] for the classical Bernstein operator.

    Now, we remind the reader of some definitions of (p,q)-analysis, which is worked in [28,29,30]. For all p,q>0, [s]pq are defined by

    [s]pq={psqspq,ifpq1;1qs1q,ifp=1;s,ifp=q=1. (1)

    [s]pq! and [s]pq are defined as follows:

    [s]pq!={[s]pq[s1]pq[1]pq,ifs11,ifs=0 (2)
    [s]pq=[s]pq![s]pq![]pq!. (3)

    For m>0, (zt)mpq is defined as

    (zt)mpq=m1r=0(przqrt)=(zt)(pzqt)×(p2zq2t)(pm1zqm1t). (4)

    For m0,m1r=0(przqrt)=0. In this study, for n=0, 0n1 is taken. This section contains definitions and lemmas as a preparation for the main section. We introduce our new operators and the relevant equations are given by applying the operator to the test functions. Here, we define the next operator on C[0,[s+1]pq[s+2]pq].

    Definition 1. Let p>q,p,q(0,1] and 0x[s+1]pq[s+2]pq. For every fC[0,[s+1]pq[s+2]pq], the new type (p,q)-Bernstein-Schurer operators are defined by

     L(p,q)s(f;x):=1p(s+η)(s+η1)2s+ηk=0Ms(x)×f(ps+ηk[k]pq[1+s]pq[s]pq[2+s]pq). (5)

    Here,

    Ms(x):=[s+ηk]pq([s+2]pq[s+1]pq)s+η(pk(k1)2xk)s+ηk1t=0(pt[s+1]pq[s+2]pqqtx). (6)

    Lemma 1. Let p>q,fC[0,[s+1]pq[s+2]pq], and p,q(0,1].  L(p,q)s(f;x) is positive and linear.

    Lemma 2. For 1p>q>0, x[0,[s+1]pq[s+2]pq],

    i. L(p,q)s(1;x)=1, (7)
    ii. L(p,q)s(y;x)=x[s+η]pq[s]pq, (8)
    iii. L(p,q)s(y2;x)=[s+η]pq[s+η1]pq[s]2pqqx2+[s+η]pq[s+1]pq[s+2]pq[s]2pqps+η1x. (9)

    Proof. ⅰ. Actually, by the definition of  L(p,q)s(f;x),

     L(p,q)s(1;x)=1p(s+η)(s+η1)2s+ηk=0Ms(x)=1p(s+η)(s+η1)2s+ηk=0(([s+2]p,q[s+1]p,q)s+η[s+ηk]p,qpk(k1)2xks+ηk1t=0(pt[s+1]p,q[s+2]p,qqtx))

    So we get  L(p,q)s(1;x)=1.

    ⅱ. From the definition of the operators, we have

     L(p,q)s(y;x)=1p(η+s)(s1+η)2×s+ηk=0(([s+1]pq[s+2]pq[s]pq[k]pqps+ηk)Ms(x))=(ps+η[s+η]pqp(η1+s)2(η+s)[s]pq([s+2]pq[s+1]pq)s+η1)s+ηk=0(pk[s+η1k]pq[k]pqxkp(k1)k2×k+s+η1t=0(pt[1+s]pq[2+s]pqqtx))=x[s+η]pq[s]pq.

    ⅲ.  L(p,q)s(y2;x)=p2(s+η)[s+η]pqp(s+η)(s+η1)2[s]2pq([s+2]pq[s+1]pq)s+η2

    ×s+η1k=0([s+η1k]pq[1+k]pqp(k+1)(k4)2xk+1×k+η+s2t=0(pt[1+s]pq[2+s]pqqtx)).

    From [1+u]pq=pu+[u]pqq, we have

     L(p,q)s(y2;x)=xp2(η+s1)[s+η]pq[s]2pqp(η1+s)(s+η2)2[1+s]pq[2+s]pq+p2(s+η)q[s+η]pq[s+η1]pqp(s+η)(s+η1)2[s]2pq([s+2]pq[s+1]pq)s+η2s+η2k=0([s+η2k]pq×p(k+2)2(k3)xk+2([s+1]pq[s+2]pqx)s+ηk3)=[η+s]pq[s]pqqx2[s+η1]pq[s]pq+[s+1]pq[s+η]pq[s]2pq[s+2]pqps+η1x.

    Now, from these equations, we can give important theorems about the operators. We will show that the operator we defined in this section satisfies the Korovkin theorem. The applicability of the operator is shown by giving the graphs of the approach.

    Remark 1. Let 1psqs>0 and

    limsps=limsqs=1. (10)

    Then, the following equalities hold:

    limspss[s]psqs=0,limsqs[s+η1]psqs[s]psqs=1. (11)

    Theorem 1. Let limsps=limsqs=1 with 1psqs>0. In this case,  L(ps,qs)s(f,x) uniformly converges to f on ˘A[0,[s+1]pq[s+2]pq], i.e., for every fC(˘A),

    lims L(p,q)s(f;x)f(x)C(˘A)=0. (12)

    Proof. From the Korovkin theorem, it is enough to prove the next properties

    lims L(p,q)s(yμ;x)xμC(˘A)=0.

    Since

    lims L(p,q)s(1;x)1C(˘A)=0, (13)

    we can see that for μ=1,2

    lims L(p,q)s(yμ;x)xμC(˘A)=0. (14)

    For 0<qs<ps1, using

    lims[s+η]psqs[s]psqs=lims[1+s+η]psqs[s]psqsqs=1, (15)

    we get

    lims L(ps,qs)s(y;x)xC(˘A)lims(1+[s+η]psqs[s]psqs)[s+1]psqs[s+2]psqsC(˘A)=0, (16)
    lims L(ps,qs)s(y2;x)x2C(˘A)lims([s+η]psqs[s+η1]psqs[s]2psqsqs)C(˘A)
    +lims([s+1]psqs[s+2]psqs)2C(˘A)+lims([s+η]psqs[s]2psqsps+η11)([s+1]psqs[s+2]psqs)2C(˘A)=0.

    Example 1. Let f(x)=2x3((esin(x+1))2(ecos(2x2))). We are given the graphs of the approximation of the function (blue) using different p and q values (see Figure 1).

    The algorithm prepared with the Maple program, which gives the operator's approach to some n values, is presented below.

    restart;

    with(plots):

    >f: = x- > 4*(x^3)*((exp(sin(x+1))^2)-exp(cos(2*x^2)))/2:

    >q: = 0.7: p: = 0.99:

    >m: = 17: eta: = 3:

    >int1: = ((p)^k-(q)^k)/(p-q):

    >int4: = ((p)^n-(q)^n)/(p-q):

    >int2: = (((p)^(n+1))-((q)^(n+1)))/(p-q):

    >int3: = (((p)^(n+2))-((q)^(n+2)))/(p-q):

    >M: = Product((p^t)*(int2/int3)-((q^t)*x), t = 0..(n+eta-k-1)):

    >for n from 1 to m do

    >L[n](f, x): = (1/(p^((n+eta)*((n+eta-1)/2))))*sum(f((((int2)

    *(int1))*p^(n+eta-k))/((int3)*(int4))) *evalf(simplify(sum(((p^(n+eta-i+1))

    >-(q^(n+eta-i+1)))/(p-q), i = 0..k)))*(p^((k*(k-1))/2))

    *(x^k)*M*((int3/int2)^(n+eta)), k = 0..n+eta);

    >end do:

    M1: = plot(f(x), x = 0.09..0.18, y = 0..2, color = blue, style = point,

    symbol = diamond, numpoints = 380, symbolsize = 8):

    >M2: = plot(L[2](f, x), x = 0.09..0.18, y = 0..2, color = green, style = point,

    symbol = circle, numpoints = 380, symbolsize = 8):

    >M3: = plot(L[3](f, x), x = 0.09..0.18, y = 0..2, color = red, style = point,

    symbol = circle, numpoints = 380, symbolsize = 8):

    >M4: = plot(L[4](f, x), x = 0.09..0.18, y = 0..2, color = black, style = point,

    symbol = circle, numpoints = 380, symbolsize = 8):

    >M5: = plot(L[5](f, x), x = 0.09..0.18, y = 0..2, color = cyan, style = point,

    symbol = circle, numpoints = 380, symbolsize = 7):

    >M6: = plot(L[8](f, x), x = 0.09..0.18, y = 0..2, color = magenta, style = point,

    symbol = circle, numpoints = 380, symbolsize = 8):

    >display([M1, M2, M3, M4, M5, M6]);

    The second example, which gives the operator's approach to the g function for some different values of p and q, is as follows:

    Example 2. Let g(x)=x215cos(x3+1)+4sin(x3+1)+90. We are given the graphs of the approximation of the function (blue) using different p and q values (see Figure 2).

    Lemma 3. The following formulas are obtained for the moments.

    i. L(p,q)s((yx)0;x)=1, (17)
    ii. L(p,q)s((yx)1;x)=x[s+η]pq[s]pqx, (18)
    iii. L(p,q)s((yx)2;x)=(q[s+η]pq[s+η1]pq[s]2pq)x2+(12[s+η]pq[s]pq)x2+[s+1]pq[s+2]pq[s+η]pq[s]2pqps+η1x.

    Proof. From Lemma 2,

    ⅰ.  L(p,q)s((yx)0;x)=1.

    If (yx) is substituted in the operator, we obtain the following

    ⅱ.  L(p,q)s((yx)1;x)=([s+η]pq[s]pq1)x.

    ⅲ. From equations valid for  L(p,q)s(y2;x) and  L(p,q)s(y;x),

     L(p,q)s((yx)2;x)=x2+ L(p,q)s(y2;x)2x L(p,q)s(y;x)=(q[s+η]pq[s+η1]pq[s]2pq2[s+η]pq[s]pq+1)x2+[s+η]pq[s+1]pq[s]2pq[s+2]pqps+η1x.
    Figure 1.  Approximation by operators for (p, q = 0.99, 0.70), (p, q = 0.99, 0.85), and (p, q = 0.99, 0.97), respectively.
    Figure 2.  Approximation by operators for (p, q = 0.95, 0.75), (p, q = 0.89, 0.82), and (p, q = 0.79, 0.76), respectively.

    Let x1,x2[0,[s+1]pq[s+2]pq]. The modulus of continuity is given by

    w(f,δ)=sup|x1x2|δ|f(x1)f(x2)|. (20)

    For σ(0,1], M>0 and x1,x2[0,[s+1]pq[s+2]pq], then fLipM(σ) if

    |f(x1)f(x2)|M|tx|σ. (21)

    From the definitions in the literature (e.g., [22]), we can give the following theorems.

    Theorem 2. Let fC[0,[s+1]pq[s+2]pq], and in this case

    | L(p,q)s(f;x)f(x)|([s+1]pq[s+2]pq+1)ω(f;δs), (22)

    where δs=([s+1]pq[s+2]pq)([s+η]pq[s+η1]pq[s]2pqq+[s+η]pq[s]2pqps+η12[s+η]pq[s]pq+1)12.

    Proof. From the definition of w(f,δ), the following inequality,

    |f(y)f(x)|(1+|yx|δs)ω(f;δs), (23)

    can be written. Applying the operator to this inequality and using linearity properties, we get

    | L(p,q)s(f;x)f(x)|(1+1δs L(p,q)s(|yx|;x))ω(f;δs).

    From the Cauchy-Schwarz inequality, we have

    | L(p,q)s(f;x)f(x)|(1+1δs L(p,q)s((yx)2;x))ω(f;δs). (24)

    If  L(p,q)s((yx)2;x) from Lemma 2 is substituted in the last inequality with the selection of the (qs) satisfying the conditions in Remark 1,

     L(p,q)s(f;x)f(x)C[0,[s+1]pq[s+2]pq](1+1δs L(p,q)s((yx)2;x))ω(f;δs)(1δs([s+1]pq[s+2]pqδs)+1)×ω(f;δs)

    is obtained. In this last inequality, if we choose

    δs=([s+1]pq[s+2]pq)([s+η]p,q[s+η1]pq[s]2pqq+[s+η]pq[s]2pqps+η12[s+η]pq[s]pq+1)12,

    then

    | L(p,q)s(f;x)f(x)|(1+[s+1]pq[s+2]pq)ω(f;δs)

    is found.

    The numerical calculations of error bounded to the functions are given in Table 1 below.

    Example 3. The error bound of the functions for x[0,[s+1]pq[s+2]pq],f(x)=13exp(x3+1), q=0.97,p=0.99,η=3, and g(x)=sin(13)+(x2+1), q=0.94,p=0.98,η=5.

    Theorem 3. Let fLipM(σ),0<qs<ps1. In this case, we have the following inequality,

    | L(ps,qs)s(f;x)f(x)|M(δs)σ2. (25)

    Proof. The proof can be done easily using Lemma 3.

    Table 1.  The error bound of function f and g.
    s Error bound for f s Error bound for g
    10 0.5713948672 10 0.2023919644
    102 0.00687324736 102 0.03644928772
    103 0.01388441546 103 0.03862481462
    104 0.01388446384 104 0.03862482420
    105 0.01388503849 105 0.03862321282
    106 0.01394821027 106 0.03861813728
    107 0.01443107879 107 0.03856046586
    108 0.02076262260 108 0.03698847304
    109 0.06986735306 109 0.03130302222

     | Show Table
    DownLoad: CSV

    Now, let us examine whether this operator, which we define on a variable-bounded interval and test its suitability for the classical convergence method, is a suitable operator for statistical convergence.

    In this section, we employed the following methodology and algorithm, which must be followed to illustrate the approximation of a linear positive operator, as can be seen from the literature (see, e.g., [31]):

    1) Assume that C(˘A) is the space of all continuous functions in the interval [0,[s+1]pq[s+2]pq], and first get all functions from C(˘A).

    2) Determine the properties that the sequences (ps) and (qs) must satisfy in order to achieve convergence.

    3) Implement the new type (p,q)-Bernstein-Schurer operators defined by (5) on continuous functions.

    4) Compute ancillary results for test functions (1,t,t2) using the Korovkin theorem, which shows the existence of a positive linear operator.

    5) Determine the statistical limits to find convergence in a statistical sense through (5).

    The next algorithm gives us a method to select the function from C(˘A) depending on our needs.

    Algorithm.

    We see by the following theorem that, Korovkin type theorem is also valid in the case of statistical convergence.

    Theorem 4. Let |f(y)f(x)|w(f,|yx|) and for 0<qs<ps<1, limsps=limsqs=1. Also for c,d(0,1], limspss=c, limsqss=d, and lims[s]psqs=. In this case, for all f on C(˘A),

    stlims L(ps,qs)s(f;x)f(x)C(˘A)=0. (26)

    Proof. Using  L(p,q)s(1;x)=1, we get

    stlims L(ps,qs)s(1;x)1C(˘A)=0.

    Similarly, using  L(p,q)s(y;x)=x[s+η]pq[s]pq, we have

     L(ps,qs)s(y;x)xC(˘A)=x+[s+η]pqx[s]pq.

    For a given ϵ>0, we define the next sets:

    Y1={s: Ls(t;x)xϵ},Y2={s:[s+η]pq[s]pq+1ϵ}.

    Then, if we use δ{ks:[s+η]pq[s]pq+1ϵ}, we get

    stlims L(ps,qs)s(y;x)xC(˘A)=0.

    Now, we show

    stlims L(ps,qs)s(y2;x)x2C(˘A)=0.
     L(ps,qs)s(y2;x)x2C(˘A)=([s+η]pq[s]pq[1+s+η]pq[s]pqq1)x2+[s+1]pq[2+s]pqpa+η1x[s+η]pq[s]2pq.

    Here, we take

    Bs=1+[1+s+η]pq[s]pqq[s+η]pq[s]pq,us=[s+η]pq[s]2pq+[1+s]pq[s+2]pqps+η1,

    And then, stlimsBs=stlimsus=0.

    For given ϵ>0, we define the next sets:

    M1={s: Ls(y2;x)x2ϵ},M2={s:Bsϵ2},M3={s:usϵ2}.

    Using M1M2M3, we get

    δ{ks: Ls(y2;x)x2ϵ}δ{ks:Bsϵ2}+δ{ks:usϵ2}.

    Then we have

    stlims L(p,q)s(y2;x)x2C(˘A)=0.

    So, for all fC[0,[1+s]pq[s+2]pq],

    stlims L(p,q)s(f;x)f(x)C(˘A)=0.

    Definition 2. For p>q, p,q(0,1], and 0u[s+1]pq[s+2]pq, the new type (p,q)- Bernstein-Schurer functions are defined by

     L(p,q)s+η,k(u):=1p(s+η)(s+η1)2Ms(u), (27)

    where

    Ms(u):=[s+ηk]pq([s+2]pq[s+1]pq)s+η(pk(k1)2uk)s+ηk1t=0(pt[s+1]pq[s+2]pqqtu).

    Theorem 5. The new type (p,q)-Bernstein-Schurer functions have the following properties on [0,[s+1]pq[s+2]pq] :

    ⅰ. Non-Negativity: For k=0,1,,s+η and u[0,[s+1]pq[s+2]pq], L(p,q)s+η,k(u)0.

    ⅱ. Partition of Unity: For all u[0,[s+1]pq[s+2]pq], s+ηk=0 L(p,q)s+η,k(u)=1.

    ⅲ. End-Point Property:  L(p,q)s+η,k(0)=0 and  L(p,q)s+η,k([s+1]pq[s+2]pq)=0.

    Proof. The property ⅰ. is easily obtained from the definition.

    ⅱ. s+ηk=0 L(p,q)s+η,k(u)=s+ηk=01p(s+η)(s+η1)2Ms(u)

    =1p(s+η)(s+η1)2s+ηk=0[s+ηk]pq([s+2]pq[s+1]pq)s+η(pk(k1)2uk)s+ηk1t=0(pt[s+1]pq[s+2]pqqtu)=1.

    iii.  L(p,q)s+η,k(0)=1p(s+η)(s+η1)2Ms(0)

    =1p(s+η)(s+η1)2[s+ηk]pq([s+2]pq[s+1]pq)s+η(pk(k1)20k)s+ηk1t=0(pt[s+1]pq[s+2]pqqt0)
    =1p(s+η)(s+η1)2[s+ηk]pq([s+2]pq[s+1]pq)s+η(pk(k1)20k)s+ηk1t=0(pt[s+1]pq[s+2]pq).

    So, we get  L(p,q)s+η,k(0)=0.

    On the other hand,

     L(p,q)s+η,k([s+1]pq[s+2]pq)=1p(s+η)(s+η1)2[s+ηk]pq([s+2]pq[s+1]pq)s+η(pk(k1)2([s+1]pq[s+2]pq)k)×s+ηk1t=0(pt[s+1]pq[s+2]pqqt[s+1]pq[s+2]pq)=1p(s+η)(s+η1)2[s+ηk]pq([s+2]pq[s+1]pq)s+η(pk(k1)2([s+1]pq[s+2]pq)k)×([s+1]pq[s+2]pq)s+ηk1s+ηk1t=0(ptqt).

    Here, if t=0,  L(p,q)s+η,k([s+1]pq[s+2]pq)=0, and if t0 and p=q, then  L(p,q)s+η,k([s+1]pq[s+2]pq)=0.

    Lemma 4. Some (p,q)-Bernstein-Schurer polynomials according to their degrees are calculated as follows:

     L(p,q)0,0(u)= L(p,q)0,1(u)= L(p,q)0,2(u)==0,
     L(p,q)1,2(u)= L(p,q)1,3(u)= L(p,q)1,4(u)==0,
     L(p,q)1,1(u)= L(p,q)2,2(u)= L(p,q)3,3(u)==0,
     L(p,q)1,0(u)=([s+2]pq[s+1]pq)([s+1]pq[s+2]pqu),
     L(p,q)2,0(u)=1p([s+2]pq[s+1]pq)2([s+1]pq[s+2]pqu)(p[s+1]pq[s+2]pqqu).

    In this section, considering that matrices also have applications in areas such as decision-making processes and cryptology, some important matrices have been constructed using (p, q)-Bernstein basis functions and made available to researchers. Let p>q, p,q(0,1], and 0u[s+1]pq[s+2]pq. Various applications can be made regarding the (p,q) version of some special matrices using the (p, q)-operators and polynomials we defined in this section.

    For ap,qs=([s+2]pq[s+1]pq)s+η, we write two (p,q)-Rhaly-type matrices Rap,qs, Rap,qs :

    Rap,qs=(ap,q100ap,q2ap,q20ap,q3ap,q3ap,q3)=(([3]pq[2]pq)1+η00([4]pq[3]pq)2+η([4]pq[3]pq)2+η0([5]pq[4]pq)3+η([5]pq[4]pq)3+η([5]pq[4]pq)3+η)

    and

     Rap,qs=(ap,q100ap,q2[2]pqap,q1[2]pq0ap,q3[3]pqap,q2[3]pqap,q1[3]pq)=(([3]pq[2]pq)1+η001[2]pq([4]pq[3]pq)2+η1[2]pq([4]pq[3]pq)1+η01[3]pq([5]pq[4]pq)3+η1[3]pq([4]pq[3]pq)2+η1[3]pq([3]pq[2]pq)1+η).

    The determinant of the 3×3 type Rap,qs and  Rap,qs matrices is as follows.

    |Rap,qs3×3|=([5]3pq[4]pq!)([5]pq[2]pq)η,
    | Rap,qs3×3|=(p2+q2)1+η[3]pq!([3]pq[2]pq)1+η.

    Using the (p,q)-Bernstein-Schurer polynomials, we can build another terraced-type matrix as follows.

     Lap,qs=(˜L(p,q)1,1(u)00˜L(p,q)2,1(u)˜L(p,q)2,2(u)0˜L(p,q)3,1(u)˜L(p,q)3,2(u)˜L(p,q)3,3(u))=(000˜L(p,q)2,1(u)00˜L(p,q)3,1(u)˜L(p,q)3,2(u)0)

    Here are a few values of  L(p,q)i,j(u) in the matrix:

     L(p,q)2,1(u)=1p[31]pq([s+2]pq[s+1]pq)2([s+1]pq[s+2]pquqtu2),
     L(p,q)3,1(u)=1p3[31]pq([s+2]pq[s+1]pq)3u3([s+1]pq[s+2]pqu)(p[s+1]pq[s+2]pqqu),
     L(p,q)3,2(u)=1p2[32]pq([s+2]pq[s+1]pq)3u2([s+1]pq[s+2]pqu).

    The determinant of the 3×3 type  Lap,qs matrix is |Lap,qs3×3|=0.

    Another useful matrix that can be constructed using the above polynomials is as follows.

      Lap,qs=˜˜Lp,qas=(100˜L(p,q)1,1(u)10˜L(p,q)2,1(u)˜L(p,q)2,2(u)1)=(100010˜L(p,q)2,1(u)01)

    Also, the determinant of the 3×3 type   Lap,qs matrix is 0. That is |  Lap,qs3×3|=0.

    In this section, we bring together the Rivest Shamir Adleman (RSA) method, from the literature, which we prefer because it is secure depending on the key state being used, and an approach that uses polynomials to increase password security. We present a modification of the method in [8] that uses polynomials to compress the encrypted image and decrypt it at the receiver to restore the image. According to this method, the compressed image is encrypted at the sender's end and decrypted by the receiver using the proposed encryption algorithm. The decrypted image is decompressed to recover the master image. The difficulty with the RSA method is that it requires the plaintext to be represented as an integer [8]. To overcome these difficulties and take advantage of the characteristics of the method, in our study, we propose a (p,q)-polynomial method that encrypts the plaintext based on the polynomial points we define.

    The components of the encryption and decryption process are the algorithm used and the keys. A key is a secret numerical data shared in advance between the sender and the receiver, unknown to others, and of a certain length for each cryptosystem. Encryption algorithms are called secret-key cryptosystems when the keys of the sender and receiver are the same, and public-key cryptosystems when the keys are different. In the second method, there are two keys, one public and one private, with a mathematical relation between them. The first one used for encryption is publicly available. In this study, the Rivest Shamir Adleman (RSA) method, which is one of the public key algorithms, is used because of the lower risk of key disclosure and interception. Although it takes longer to be decrypted by the recipient, RSA is still the preferred method because the method uses less memory for encrypted data and third parties cannot easily crack the password.

    There are many methods to transfer information with minimal loss, and the basic idea is to make different changes and complicate the bits of the pixels. In digital systems, information can be expressed in the form of a sequence of bits. When converting a decimal number to a binary number, the number is divided by 2 until the quotient is less than 2, the remainder is taken from each division, and the remainder is written sequentially from left to right, starting from the last division. When converting a binary number to a decimal number, the numbers consisting of 0 and 1 are multiplied by the power of 2, starting from zero and increasing by one, to be used in order from right to left. The results are summed and the decimal number is found. In the binary notation of a number, the leftmost digit, which is represented by the largest exponential value in base 2, is the most significant value for that number, called the most significant bit (MSB). On the other hand, the rightmost digit of the number, which is expressed with the smallest exponential value in base 2, is the least significant value (LSB) for that number. Therefore, this indicates that changing the MSB digit of a number in binary notation is the largest change that can be made to that number, and changing the LSB digit is the smallest change [32].

    In this section, an approach that uses (p, q)-polynomials to increase password security aims to minimize losses and obtain a more detailed image than the classical Bernstein operator. In addition, a more secure encryption is achieved by making the operator dependent on p and q variables, similar to the increase in security obtained by using multivariate polynomials.

    First of all, we should start by reminding the reader of the notation of the (p,q)-Bernstein-Schurer basic functions we defined.

     L(p,q)s+η,k(u)=1p(s+η)(s+η1)2Ms(u),where
    Ms(u)=[s+ηk]pq([s+2]pq[s+1]pq)s+η(pk(k1)2uk)s+ηk1t=0(pt[s+1]pq[s+2]pqqtu).

    (x,y) coordinates are calculated according to the polynomial degree and the image is obtained for (p,q)-Bernstein-Schurer coordinate elements. This method uses the (p,q)-Bernstein-Schurer image to squeeze the input image and then the squeezed image is encrypted using a prepared algorithm. At the time of compression, the input is partitioned with the help of the (p,q)-Bernstein-Schurer image. This algorithm is an adaptation of the algorithm presented in [8] for the classical Bernstein operator to the operator we defined.

    Stage 1: Determine the numbers p and q. Partition the input with the help of the (p,q)-Bernstein-Schurer image.

    Stage 2: Select key pairs \left({{Ϗ}}_{u}, {{ϗ}}_{r}\right) , where {{Ϗ}}_{u} is the public key and {{ϗ}}_{r} is the private key.

    Stage 3: Select the hidden reference value {Ϗ} on the curve based on the (p,q)-Bernstein-Schurer polynomial.

    Stage 4: The original text points are considered as pixel values of the squeezed image.

    Stage 5: Let ԗ≔{\left(s+\eta \right)}^{2}+\left(s+\eta \right)-4I . Determine \left(Ԗ/{{Ϗ}}_{u}\right)\left(modGF\left(ԗ\right)\right) = {æ} (perform) achieved by the point division formula.

    Using the pixel value Ԗ of the squeezed image, {æ} = Ԗ+\left(s+\eta \right)\left({{Ϗ}}_{u}-Ԗ\right)\left(modGF\left(ԗ\right)\right) .

    Stage 6: For hidden reference value {Ϗ}, perform \left({æ} /{Ϗ}\right)\left(modGF\left(ԗ\right)\right) = \mathfrak{S} to produce the encrypted image where \mathfrak{S} = \mathfrak{{æ} }+\left(s+\eta \right)\left({Ϗ}-{æ} \right)\left(modGF\left(ԗ\right)\right).

    Stage 7: The encrypted image is sent to the receiving end.

    Stage 8 (decryption): The receiver gets the encrypted image and starts to perform decryption.

    Stage 9: Perform point multiplication on \mathfrak{S} and \mathfrak{{Ϗ}} \left(modGF\left(ԗ\right)\right) = \stackrel{~}{{æ} } using the hidden reference value {Ϗ} to be shared between the two sides using any secure key exchange algorithm, {Ϗ} \stackrel{~}{{æ} } = \left(\left(s+\eta \right){Ϗ}-\mathfrak{S}\right)/\left(s+\eta -1\right)\left(modGF\left(ԗ\right)\right) .

    Stage 9: Decryption performs \left(\stackrel{~}{{æ} }/{{ϗ}}_{r}\right)\left(modGF\left(ԗ\right)\right) = Ԗ , where Ԗ = \stackrel{~}{ɓ}+1/\left(\left(s+\eta \right)\left({{ϗ}}_{r}-\stackrel{~}{ɓ}\right)\right)\left(modGF\left(ԗ\right)\right) . If the receiver uses a suitable private key, this is the pixel value of the compressed image. Here, the relationship between {{Ϗ}}_{u} and {{ϗ}}_{r} is {{ϗ}}_{r} = \left(s+\eta \right)\left[\left(\left(\mathrm{ɓ}-\left(s+\eta \right){{Ϗ}}_{u}\right)/\left(1-\left(s+\eta \right)\right)+\left(\mathrm{ɓ}\left(1-\left(s+\eta \right)\right)/\left(s+\eta \right)\right)\right)\right]\left(modGF\left(ԗ\right)\right) . When {æ} , \stackrel{~}{{æ} } are substituted in the polynomial, the resulting value is ɓ, \stackrel{~}{ɓ} , respectively.

    Stage 10: The decrypted image is decompressed to get the parent image.

    Cryptology plays a major role in the dynamic development process regarding information security. The most important part of cryptography is the data encryption method. Many different methods have been developed and are being developed for this purpose. In this paper, we exploit the difficulties of (p,q)-numbers and polynomials to reduce the decrypt ability of encryption in order to prepare useful material for the data encryption algorithm.

    For this purpose, important approximation results of the (p,q)-operator defined here for the first time were given. We defined a modification of the (p,q)-Bernstein-Schurer operators and we saw that the choice of p and q was important in order to reveal the approximation. We believe that we have brought a useful operator to the literature where the interval is important, since we can achieve the goals related to the approach situation that we have set out while defining the operator. The advantage of our study compared to many other articles in this field is that it contains numerical calculations and visual elements obtained with a mathematical drawing program.

    In the study given in [33], the Kantorovich family of operators was used to process the image with computed tomography in research aimed at facilitating the adaptation of the vessel to heart contraction-relaxation movements by increasing the lumen of the vessel, allowing the image to be reconstructed and improved. Considering that the two-variable generalizations of the operator we have defined will detail the image and enable better imaging, this new operator will be important for future studies in the health field. As a note for future researchers, based on the result obtained above that the operator gives better approximation graphs when p and q are chosen close to each other, it is predicted that similar results will be obtained in the two-dimensional version of the operator.

    In [34], Bezier curves, a concept related to Bernstein polynomials, were used to propose a solution to a real-world problem. In this study, important results were presented regarding a collision-free arrival at the desired target in multiple drone use. With a similar idea, the results can be analyzed with the help of control points and polynomials of appropriate degree by taking into account the results of Section 4 in our study to prevent collisions in the process of maximum hover performance with minimum energy and reaching the desired target in the use of multiple drones.

    Therefore, our results can be used for potential applications in both medical (diagnostic imaging) and strategic security (UAV route determination) areas, where we have presented similar application examples.

    Moreover, we defined some special matrices with the help of (p,q)-polynomials obtained from the operator. For classical forms of matrices, see, for example, [35] and [36]. These matrices can be transferred to different application areas with many algebraic operations in matrix theory.

    In our study, we modified the method in [8], which was developed for classical Bernstein polynomials, by using both (p,q)-integers and the Schurer version of polynomials to increase password security. With this method, a useful encryption method was presented by reducing the processing time and computational complexity. The security of the algorithm has been increased through the information shared between the parties with the help of any secure key exchange algorithm.

    We have presented a modification of Bernstein-Schurer operators and then calculated the moments of those operators. We also gave convergence properties of this generalization. We conclude that the approximation properties provided for different modifications of this operator are provided for our operator, which we defined to include the right endpoint of the interval. Researchers who want to work in this field can produce new operators by combining a different operator with this operator or by including a polynomial, thus contributing to the development of approximation theory. In addition, researchers in this field can examine different types of convergence for the operators, since we have shown that the statistical convergence conditions are met, e.g., [37].

    As it is known, matrix theory is an important field of mathematics where active studies continue and contains important tools for many scientific fields. In this sense, in order to offer a useful and dynamic topic to researchers who would be inspired by our work, we included some small information from matrix theory, which contains the keys to new important topics. By using the special matrices included in the study, many different special matrices can be created with the help of (p,q)-polynomials obtained from the operator we defined, and transition can be made to the field where these matrices are applied or needed.

    In the last part of our study, we adapted the method in [8] for classical Bernstein polynomials to the Bernstein-Schurer operator by using the properties of (p,q)-integers and polynomials in order to increase information security. With this method, the algorithm was made more secure with the help of a secure key exchange algorithm, and the decrypt ability of the cipher by third parties is reduced due to the difficulties of the sum formula and polynomials. Therefore, based on this study, researchers can develop different encryption algorithms by using this operator or different operators with useful features.

    This study can be combined with studies such as [38,39,40,41], which use different methods and include new image encryption algorithms to provide the basic features of a good encryption structure, and important studies containing comprehensive cryptological information can be produced.

    As another application of our study, future studies can be prepared on the polynomials related to the operator we defined, or special cases of them can be used in order to obtain the approximate numerical solution of partial differential equations or kinetic equations, which are important tools of joint studies in applied mathematics and physics, e.g., [42,43].

    Nazmiye Gonul Bilgin: Conceptualization, Investigation, Methodology, Validation, Writing-review and editing, Formal analysis, Software; Yusuf Kaya: Conceptualization, Methodology, Formal analysis, Writing-review and editing, Supervision; Melis Eren: Methodology, Writing-original draft preparation, Visualization, Validation.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    The authors would like to thank the referees. This research received no external funding.

    The authors declare no conflict of interest.



    [1] Y. Lin, Z. Xie, T. Chen, X. Cheng, H. Wen, Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics, Expert Syst. Appl., in press. https://doi.org/10.1016/j.eswa.2024.124891
    [2] J. Pearson, S. Titsworth, A. Hosek, P. Nelson, Human communication, 7 Eds., New York: McGraw-Hill Education, 2020.
    [3] O. A. Imran, S. F. Yousif, I. S. Hameed, W. N. Al-Din Abed, A. T Hammid, Implementation of El-Gamal algorithm for speech signals encryption and decryption, Procedia Computer Science, 167 (2020), 1028–1037. https://doi.org/10.1016/j.procs.2020.03.402 doi: 10.1016/j.procs.2020.03.402
    [4] J. Katz, Y. Lindell, Introduction to modern cryptography, 3 Eds., New York: Chapman and Hall/CRC, 2020. https://doi.org/10.1201/9781351133036
    [5] S. Li, Y. Chen, L. Chen, J. Liao, C. Kuang, K. Li, et al., Post-quantum security: opportunities and challenges, Sensors, 23 (2023), 8744. https://doi.org/10.3390/s23218744 doi: 10.3390/s23218744
    [6] H. Caglar, A. N. Akansu, A generalized parametric PR-QMF design technique based on Bernstein polynomial approximation, IEEE Trans. Signal Process., 41 (1993), 2314–2321. https://doi.org/10.1109/78.224242 doi: 10.1109/78.224242
    [7] Z. Zhou, X. Yao, Polynomial guidance law for impact angle control with a seeker look angle limit, Proc. Inst. Mech. Eng. G: J. Aer. Eng., 234 (2020), 857–870. https://doi.org/10.1177/0954410019890808 doi: 10.1177/0954410019890808
    [8] S. Sasi, L. S. Jyothi, A heuristic approach for secured transmission of image based on Bernstein polynomial, In: International Conference on Circuits, Communication, Control and Computing, 21–22 November 2014, IEEE, 312–315. https://doi.org/10.1109/CIMCA.2014.7057813
    [9] I. Buyukyazici, E. Ibikli, The approximation properties of generalized Bernstein polynomials of two variables, Appl. Math. Comput., 156 (2004), 367–380. https://doi.org/10.1016/j.amc.2003.07.023 doi: 10.1016/j.amc.2003.07.023
    [10] N. G. Bilgin, E. Coskun, Approximation with modified Gadjiev-Ibragimov operators in C[0, A], Journal of Computational Analysis & Applications, 15 (2013), 868–879.
    [11] M. A. Ozarslan, H. Aktuglu, Quantitative global estimates for generalized double Szasz-Mirakjan operators, J. Appl. Math., 2013 (2013), 613258. https://doi.org/10.1155/2013/613258 doi: 10.1155/2013/613258
    [12] S. N. Bernstein, Démonstration du théoréme de Weierstrassfondéesur le calcul de probabilités, Communications of the Kharkov Mathematical Society, 13 (1912), 1–2.
    [13] N. G. Bilgin, M. Cetinkaya, Approximation by three-dimensional q-Bernstein-Chlodowsky polynomials, Sakarya University Journal of Science, 22 (2018), 1774–1786. https://doi.org/10.16984/saufenbilder.348912 doi: 10.16984/saufenbilder.348912
    [14] T. Acar, (p, q)-Generalization of Szasz-Mirakyan operators, Math. Method. Appl. Sci., 39 (2016), 2685–2695. https://doi.org/10.1002/mma.3721 doi: 10.1002/mma.3721
    [15] M. Mursaleen, K. J. Ansari, A. Khan, On (p, q)-analogue of Bernstein operators, Appl. Math. Comput., 266 (2015), 874–882. https://doi.org/10.1016/j.amc.2015.04.090 doi: 10.1016/j.amc.2015.04.090
    [16] N. G. Bilgin, M. Eren, Results on bivariate modified (p, q)-Bernstein type operators, Gazi University Journal of Science, 36 (2023), 845–860. https://doi.org/10.35378/gujs.868893 doi: 10.35378/gujs.868893
    [17] D. Karahan, A. Izgi, On approximation properties of (p, q)-Bernstein operators, Eur. J. Pure Appl. Math., 11 (2018), 457–467. https://doi.org/10.29020/nybg.ejpam.v11i2.3213 doi: 10.29020/nybg.ejpam.v11i2.3213
    [18] E. Cevik, Approximation properties of modified (p, q)-Bernstein type operators, MS Thesis, Institute of Science, Harran University, Sanliurfa, 2019.
    [19] F. Schurer, Linear positive operators in approximation theory, PhD Thesis, Institute of Science, Technology. Delft University, 1965.
    [20] Q. B. Cai, G. Zhou, On (p, q)-analogue of Kantorovich type Bernstein-Stancu-Schurer operators, Appl. Math. Comput., 276 (2016), 12–20. https://doi.org/10.1016/j.amc.2015.12.006 doi: 10.1016/j.amc.2015.12.006
    [21] C. V. Muraru, Note on q-Bernstein-Schurer operators, Stud. Univ. Babeș-Bolyai Math., 56 (2011), 489–495.
    [22] M. Mursaleen, A. Al-Abied, M. Nasiruzzaman, Modified (p, q)-Bernstein-Schurer operators and their approximation properties, Cogent Mathematics, 3 (2016), 1236534. https://doi.org/10.1080/23311835.2016.1236534 doi: 10.1080/23311835.2016.1236534
    [23] K. Kanat, M. Sofyalioglu, Approximation by (p, q)-Lupaş-Schurer-Kantorovich operators, J. Inequal. Appl., 2018 (2018), 263. https://doi.org/10.1186/s13660-018-1858-9 doi: 10.1186/s13660-018-1858-9
    [24] K. Kanat, M. Sofyalioglu, Some approximation results for (p, q)-Lupaş-Schurer operators, Filomat, 32 (2018), 217–229. https://doi.org/10.2298/FIL1801217K doi: 10.2298/FIL1801217K
    [25] N. G. Bilgin, Hibrid ∆-statistical convergence for neutrosophic normed space, J. Math., 2022 (2022), 3890308. https://doi.org/10.1155/2022/3890308 doi: 10.1155/2022/3890308
    [26] M. Mursaleen, M. Nasiruzzaman, A. Nurgali, Some approximation results on Bernstein-Schurer operators defined by (p, q)-integers, J. Inequal. Appl., 2015 (2015), 249. https://doi.org/10.1186/s13660-015-0767-4 doi: 10.1186/s13660-015-0767-4
    [27] R. Aslan, A. Izgi, Approximation by one and two variables of the Bernstein-Schurer-type operators and associated GBS operators on symmetrical mobile interval, J. Funct. Space., 2021 (2021), 9979286. https://doi.org/10.1155/2021/9979286 doi: 10.1155/2021/9979286
    [28] R. Jagannathan, K. S. Rao, Two-parameter quantum algebras, twin-basic numbers and associated generalized hyper geometric series, In: Proceedings of the International Conference on Number Theory and Mathematical Physics, India, 20–21 December 2005.
    [29] P. N. Sadjang, On the fundamental theorem of (p, q)-calculus, some (p, q)-Taylor formulas, Results Math., 73 (2018), 39. https://doi.org/10.1007/s00025-018-0783-z doi: 10.1007/s00025-018-0783-z
    [30] M. N. Hounkonnou, J. D. B. Kyemba, R(p, q)-calculus: differentiation and integration, SUT J. Math., 49 (2013), 145–167. https://doi.org/10.55937/sut/1394548362 doi: 10.55937/sut/1394548362
    [31] N. Bhardwaj, R. Singh, A. Chaudhary, A. Shankar, R. Kumar, Statistical convergence of integral form of modified Szász–Mirakyan operators: an algorithm and an approach for possible applications, J. Inequal. Appl., 2024 (2024), 71. https://doi.org/10.1186/s13660-024-03121-5 doi: 10.1186/s13660-024-03121-5
    [32] C. K. Chan, L. M. Cheng, Hiding data in images by simple LSB substitution, Pattern Recogn., 37 (2004), 469–474. https://doi.org/10.1016/j.patcog.2003.08.007 doi: 10.1016/j.patcog.2003.08.007
    [33] D. Costarelli, G. Vinti, Sampling Kantorovich operators and their applications to approximation problems and to digital image processing, In: Proceedings of 8th International Conference on Applied Mathematics Simulation, Modelling (ASM'14), Florence, Italy, November 22–24, 2014,256-260.
    [34] B. Sabetghadam, R. Cunha, A. Pascoal, Real-time trajectory generation for multiple drones using bézier curves, IFAC-PapersOnLine, 53(2020), 9276–9281. https://doi.org/10.1016/j.ifacol.2020.12.2380 doi: 10.1016/j.ifacol.2020.12.2380
    [35] G. Leibowitz, Rhaly matrices, J. Math. Anal. Appl., 128 (1987), 272–286. https://doi.org/10.1016/0022-247X(87)90230-7 doi: 10.1016/0022-247X(87)90230-7
    [36] N. Durna, M. Yildirim, Generalized terraced matrices, Miskolc Math. Notes, 17 (2016), 201–208. https://doi.org/10.18514/MMN.2016.1272 doi: 10.18514/MMN.2016.1272
    [37] S. Aytar, Rough statistical convergence, Numer. Funct. Anal. Opt., 29(2008), 291–303. https://doi.org/10.1080/01630560802001064 doi: 10.1080/01630560802001064
    [38] S. Gao, J. Liu, H. H. C. Iu, U. Erkan, S. Zhou, R. Wu, et al., Development of a video encryption algorithm for critical areas using 2D extended Schaffer function map and neural networks, Appl. Math. Model., 134 (2024), 520–537. https://doi.org/10.1016/j.apm.2024.06.016 doi: 10.1016/j.apm.2024.06.016
    [39] S. Gao, H. H. C. Iu, J. Mou, U. Erkan, J. Liu, R. Wu, et al., Temporal action segmentation for video encryption, Chaos Soliton. Fract., 183 (2024), 114958. https://doi.org/10.1016/j.chaos.2024.114958 doi: 10.1016/j.chaos.2024.114958
    [40] S. Gao, H. H. C. Iu, M. Wang, D. Jiang, A. A. Abd El-Latif, R. Wu, et al., Design, hardware implementation, and application in video encryption of the 2D memristive cubic map, IEEE Internet Things J., 11 (2024), 21807–21815. https://doi.org/10.1109/JIOT.2024.3376572 doi: 10.1109/JIOT.2024.3376572
    [41] M. Wang, X. Fu, L. Teng, X. Yan, Z. Xia, P. Liu, A new 2D-HELS hyperchaotic map and its application on image encryption using RNA operation and dynamic confusion, Chaos Soliton. Fract., 183 (2024), 114959. https://doi.org/10.1016/j.chaos.2024.114959 doi: 10.1016/j.chaos.2024.114959
    [42] S. Razvarz, R. Jafari, A. Gegov, Solving partial differential equations with Bernstein neural networks, In: Advances in Computational Intelligence Systems, Springer International Publishing, 2019, 57–70. https://doi.org/10.1007/978-3-319-97982-3_5
    [43] O. Kaytmaz, The problem of determining source term in a kinetic equation in an unbounded domain, AIMS Mathematics, 9 (2024), 9184–9194. https://doi.org/10.3934/math.2024447 doi: 10.3934/math.2024447
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(909) PDF downloads(68) Cited by(0)

Figures and Tables

Figures(2)  /  Tables(1)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog