Investigation on the effect of stent in unsteady blood flow
In this work, we tried to determine the fact that an interest in optimal stents shapes helps to minimize fluid swirl and to maximize shear stress on the wall artery in order to reduce the risk of the restenosis in stented segments. Our study deals with three geometric parameters of the stent, namely the strut spacing, the strut height and the strut width. These parameters have direct effect on blood...
Thermal deflection of a thin circular plate with radiation
This paper deals with the determination of thermal deflection of a thin circular plate defined as ;. A circular plate is considered having arbitrary initial temperature and subjected to radiation type boundary condition which is fixed at . The non homogeneous type boundary conditions are maintained at plane surfaces of the plate. The governing heat conduction equation has been solved by using...
Application of Bousinesq’s and Westergaard’s formulae in analysing foundation stress distribution for a failed telecommunication mast
The concurrent foundation failure of telecommunication masts in Nigeria and all over the world which endanger the lives and properties of residents situated within the fall distance of the telecommunication mast is a thing of great concern. In this study, a GSM mast that underwent foundation failure at Ibadan, Oyo State, Nigeria was critically examined with a view to providing engineering solution. The soil...
Utilization of mixture of andin imputation for missing data in post-stratification
To estimate the population mean using auxiliary variable there are many estimators available in literature like-ratio, product, regression, dual-to-ratio estimator and so on. Suppose that all the information of the main variable is present in the sample but only a part of data of the auxiliary variable is available. Then, in this case none of the aforementioned estimators could be used. This paper presents an...
Critical thinking: Essence for teaching mathematics and mathematics problem solving skills
Critical thinking is a learned skill that requires instruction and practice. Mathematics education instructors at both the secondary and post-secondary levels can enhance students’ critical thinking skills by (i) using instructional strategies that actively engage students in the learning process rather than relying on lecture and note memorization, (ii) focusing instruction on the process of learning...
Einstein's equivalence principle has three further implications besides affecting time: T-L-M-Ch theorem (“Telemach”)
General relativity is notoriously difficult to interpret. A "return to the mothers" is proposed to better understand the gothic-R theorem of the Schwarzschild metric of general relativity. It is shown that the new finding is already implicit in Einstein's equivalence principle of 1907 and hence in special relativity (with acceleration included). The TeLeMaCh theorem, named onomatopoetically...
Cross efficiency by using common weights for fuzzy data
This paper firstly revists the cross efficiency evaluation method which is an extention tool of data envelopment analysis (DEA), then analyzes the potential flawes which happens when the ultimate average cross efficiency scores are used. In this paper, we consider the decision making units (DMUs) as the players in a cooperative fuzzy game, where the characteristic function values of coalitions are...
Flow induced by non-coaxial rotations of porous disk and a fluid in a porous medium
This paper deals with the flow of an incompressible, viscous and electrically conducting fluid in a porous medium when no slip condition is no longer valid. The fluid is bounded by a non-conducting porous disk. The flow is due to non-coaxial rotations of porous disk and a fluid at infinity. The fluid is electrically conducting in the presence of a constant applied magnetic field in the transverse direction....
A study on a novel method of mining fuzzy association using fuzzy correlation analysis
Two different data variables may behave very similarly. Correlation is the problem of determining how much alike the two variables actually are and association rules are used just to show the relationships between data items. Mining fuzzy association rules is the job of finding the fuzzy item-sets which frequently occur together in large fuzzy data set, where the presence of one fuzzy item-set in a record...
A sampling plan with producer’s allowable risk (PAR) at maximum allowable proportion defective (MAPD)
This paper deals with sampling designs on incoming quality MAPD along with a specified probability of acceptance at this point called producer’s allowable risk (PAR). It is defined as the minimum probability of acceptance of the lot with a maximum allowable proportion defective. Tables and graphs are presented, comparing the efficiency of new SSP as to protect AQL. An optimum criterion of sample size...
Wu’s algorithm and its possible application in cryptanalysis
In this paper we reviewed Wu’s algorithm and introduced it as a cryptanalysis technique. This study reveals that when Wu’s algorithm is used for cryptanalysis it simplifies. This is true because Wu’s algorithm has to be applied to binary polynomials only, when used for cryptanalysis. To summarize, we gave a full description of Wu’s algorithm in the binary case and also a...
Egoists dilemma with fuzzy data
In this paper, we investigate the problems of consensus–making among individuals or organizations with multiple criteria for evaluating performance when the players are supposed to be egoistic and the score for each criterion for a player is supposed to be fuzzy number. We deal with problems with fuzzy parameters from the viewpoint of experts’ imprecise or fuzzy understanding of the...
On three-dimensional generalized sasakian space – forms
The object of the present paper is to study locally j –symmetric three-dimensional generalized Sasakian space forms and such manifolds with Ricci semi symmetric, h -parallel Ricci tensor and cyclic Ricci tensor. Such space forms with non-null concircular vector field are also considered. Key words: Generalized sasakian space forms, cosymplectic, locally-j -symmetric, h -parallel ricci...
Department of Applied Mathematics with Oceanology and Computer Programming, Vidyasagar University, Midnapore -- 721102, India
In this paper, soft matrices are defined based on soft set. Cartesian product of two soft sets is defined here. The very common operations of soft matrices are defined like AND, OR, union, intersection. commutative, associative, distributive, De Morgan's laws and convergent property for soft matrices are investigated. Key words: Soft set, soft relation, soft matrices, AND, OR...
Estimation of temperature distribution and thermal stresses in a thick circular plate
A thick circular plate with the arbitrary initial heat flux prescribed on the upper surface is considered and lower and the curved boundary surface are kept at zero temperature. The temperature distribution in the plate is determined by solving heat conduction equation with the help of variable separation technique and then stresses are determined with the help of suitable Michell’s...
Sharon - Agent based service middleware for E-governance: A systematic web examination based approach using Christina ontology
Over the past few years, semantic web service and multi agent approach has been used successfully inthe development of E-governance. Such a hybrid approach can be considered as an effective approachfor the development of predictive modeling in complex...
Some common fixed point theorems in D* - metric space
In this paper we establish some common fixed point theorems for contraction and generalized contraction mappings in D* - metric space which is introduced by Shaban et al. (2007). In what follows, (X, D*) will denote D* - metric space, N, the set of all natural number and R+, the set of all positive real numbers. Key words: D* - metric contractive mapping, complete D* - metric space, common...
Formal partitioning analysis and verification of extended algebraic automata
Algebraic automata is getting much importance in theoretical computer science because of its various applications, for example, in optimization of programs, verification of protocols, cryptography and modeling biological phenomena. Design of a complex system not only requires functionality but it also needs to capture its control behaviour. This paper is a part of our ongoing research on integration of algebraic...
Entropy and utility based trip distribution model
This paper aims to explore the interrelation and equivalence between methods of maximum entropy and utility in establishing the trip distribution model. Key words: Entropy, utility, trip distribution, Bose–Einstein entropy, Fermi-Dirac entropy.
Solving traveling salesman problem by using a fuzzy multi-objective linear programming
The traveling salesman problem (TSP) is one of the most intensively studied problems in computational mathematics. Information about real life systems is often available in the form of vague descriptions. Hence, fuzzy methods are designed to handle vague terms, and are most suited to finding optimal solutions to problems with vague parameters. This study develops a fuzzy multi-objective linear programming...
Optimizing the underground water confined steady flow using a fuzzy approach
In this paper we discuss the underground water aquifers, the confined steady flow in homogeneous system where the transmissivities at all nodes inside the zone are represented by the same fuzzy number. A solution algorithm to solve the underground water confined steady flow in homogeneous system (in three dimensions) under fuzziness is considered. The purpose behind this study is to optimize the sum of the...
Characterization of de Bruijn graphs homomorphisms
We study homomorphisms between de Bruijn digraphs of different orders. A main theme of this paper is to characterize de Bruijn graph homomorphisms such that the inverse of a factor in the lower order digraph is also a factor in the higher order one, where a factor is a collection of cycles that partition the digraph. We generalize Lempel's homomorphism by describing and characterizing a class of...
On weakly symmetric and weakly Ricci symmetric Lorentzian Para-Sasakian manifolds
The aim of the present paper is to study weakly symmetric and weakly Ricci symmetric an LP-Sasakian manifolds and proved that if weakly symmetric LP-Sasakian manifold satisfies -parallel Ricci condition then the scalar curvature of the manifolds is equal to rank of . If weakly symmetric an LP-Sasakian manifolds satisfies Ricci tensor of coddazi type then the manifolds is R-Harmonic, further we have...
Conceptual networks: The role of concept lattices in knowledge management
Concepts are defined as couples (O, A) of sets O and A: the object O (a set of none, or one or more elements) is assigned to the set A of these elements’ (common) attributes. The objects change according to the sequence of attributes. Only couples of objects and attributes, that is concepts, are adequate for our world. The connections and links we need in databases and multimedia are expressed, naturally, by...
Optimality of the flexible job shop scheduling problem
The flexible job shop scheduling problem is NP-hard problem. There is no efficient technique to check the optimality of the solution of the flexible job shop scheduling problem. So, in this paper, theorems and lemmas for defining some optimality conditions for the solution of the flexible job shop scheduling problem are introduced. In addition, a mathematical model of the primal problem of the flexible job...
Interpolation by quartic splines
This paper proposes two special lacunary interpolation problems using quartic splines of continuity class C2. We call the problems (0,3) and (0,4) lacunary interpolation. In these two cases, the third and fourth derivative respectively is also prescribed in between the nodes along with the function value at the nodes. This paper is divided into two parts namely cases A and B. Case A deals with the (0,3)...
Thermal stresses induced by a point heat source in a hollow disk by quasi-static approach
This paper deals with the two dimensional non-homogeneous boundary value problem of heat conduction in a hollow disk defined as and discussed the thermoelastic behavior due to internal heat generation within it. A thin hollow disk is considered having arbitrary initial temperature and subjected to time dependent heat flux at the outer circular boundary whereas inner circular...
New scrambling algorithm for hiding scanned documents
This paper introduces a new technique to hide scanned document in a digital image. It is a one-to-one matching between the pixels from the cover image to the pixel in scanned documents image. The proposed algorithm is an efficient computer-based steganographic method for embedding secret messages into images without producing noticeable changes is implemented. There is no need of referencing the original...
In this paper, a natural dual of an injective semimodule which was obtained by reversing the arrows in the definition of injective semimodule and replacing epimorphsims with monomorphisms was considered. These new objects are called “projective semimodules”. Key words: Projective semimodule, epimorphisim, left regular exact sequence, proper exact sequence.
A common fixed point theorem and some fixed point theorems in D*- Metric spaces
In this paper we establish some common fixed point theorems for contraction and some generalized contraction mappings in D* - metric space which is introduced by Shaban et al. (2007). In what follows, (X, D*) will denote D* - metric space, N is the set of all natural number and R+ is the set of all positive real number. Key words: D*- metric, contraction mapping, complete D*- metric...
Some finite integrals involving multivariable polynomials, H-function of one variable and H-function of ‘r’ variables
In the present paper we establish the integrals involving the product of two general classes of polynomial, H-function of one variable and H-function of ‘r’ variables. These integrals are unified in nature and we can derive from them by a large number of integrals involving simpler functions and polynomials as their particular cases. Key...
MHD Heat transfer aspects between two parallel conducting porous walls in a rotating system, with Hall currents
An analysis is presented for heat transfer in fully developed viscous incompressible hydromagnetic flow of an ionized gas bounded by two parallel porous walls under the action of uniform transverse magnetic field, when rotated with an angular velocity about an axis perpendicular to the walls, by taking Hall effect into account. The governing equations of motion and heat transfer expressing the physical...
Mixed type symmetric and self duality for multiobjective variational problems with support functions
In this paper, a pair of mixed type symmetric dual multiobjective variational problems containing support functions is formulated. This mixed formulation unifies two existing pairs Wolfe and Mond-Weir type symmetric dual multiobjective variational problems containing support functions. For this pair of mixed type nondifferentiable multiobjective variational problems, various duality theorems are established...
A Branch and Bound approach to a state government capital budgeting
The capital budgeting problem is a multi-constraint Knapsack problem. Hence this paper provides a solution to a capital budgeting problem of Akwa Ibom State, Nigeria using a Branch and Bound approach. The capital projects are summarized in four broad groups: The Economic sector (X1), The Social Service sector (X2), The Environmental/Regional Development sector (X3), and...
4th-Step implicit formula for solution of initial value problems of second order ordinary differential equations
This paper proposes a direct method of solution for second order initial value problems of ordinary differential equations. Its derivation adopts Taylor series expansion techniques and Dahlquist stability test model. It was revealed from the results obtained that the method is consistent, convergent and zero-stable. Numerical examples are solved to ensure accuracy of the method on both linear and non-linear...
One way functions and public key cryptography
The problem faced with symmetric ciphers has always been key exchange. Hellman and Diffie (1976) proposed the idea for key exchange (public key cryptography). Their idea was based on the difficulty in inverting certain mathematical functions; one way functions. The RSA was one of the first practical solutions of key exchange. This paper identifies one way functions and their corresponding public key encryption system,...
The formulation of complex queries and interactions using SMS text messages
There is no question that short message service (SMS) has achieved huge success in the wireless world. Billions of SMS text messages are sent every day worldwide. SMS is now a major revenue generator for wireless carriers like expresso and MTN of Ghana. A lot of innovative applications are now built on top of the SMS technology and more are being developed. One of the emerging applications is the use of text...
A new algorithm for static task scheduling for heterogeneous distributed computing systems
Effective task scheduling is essential for obtaining high performance in heterogeneous distributed computing systems (HeDCSs). However, finding an effective task scheduling in HeDCSs should take into consideration the heterogeneity of processors and inter-processor communication over head, which results from non-trivial data movement between tasks scheduled on different processors. In this paper, a new high...
Some results on principal ideal graph of a ring
Let R be an associative (not necessarily commutative) ring. In the present paper, we introduced a new type of graph (called ‘Principal Ideal Graph’, denoted by PIG(R)) related to a given associative ring R. We presented some examples. We obtained few fundamental important relations between rings and graphs with respect to the properties: simple ring, complete graph, etc. We also observed...
Asymptotic behavior of solutions of nonlinear delay differential equations with impulse
This paper studies the asymptotic behavior of solutions of the second-order nonlinear delay differential equations with impulses: and some sufficient conditions are obtained. Key words: Asymptotic behavior, second-order nonlinear delay differential equation, impulses.
Mathematical model of homogenious tumour growth with delay in time
This paper consist of a problem of tumor growth with the function of phosphorous to both tumor cells and healthy cells. A detailed discussion about the growth of healthy cells and tumor cells was observed here. A consideration about the solution part of tumor micro vessels has been made here. The governing equations are than solved using MATLAB (a differential equation solver) and graphs are drawn which show...
Triangular matrix summability of a series
In this paper, in extending a result of Savas and Rhodes on indexed matrix summability, an analogue theorem has been established by using Euler-Totient function. Key words: Summability, triangular matrix summability, Euler-Totient function.
Approximation formulae for phase shifts of s–wave Schrödinger equation due to binomial potential and their applications
In this paper, we derive the approximation formulae for phase shifts of s-wave Schrödinger equation on introducing binomial potential function and then make their applications to study the fluctuations in the phase shift difference from the s-wave with respect to different values of the arbitrary parameter occurring in a given binomial potential function. Key words: S-wave...
Estimates for contraction oscillatory integral operators on Lp – spaces
In this study, we shall prove that the oscillatory integral operator can be reduced to the study of another contraction oscillatory integral operator, with a fixed point which leads to a sharp estimate. Key words: Oscillatory integrals operator, bilinear forms, Fourier transform, non singular matrix, intertwining.
Interval cut-set of interval-valued intuitionistic fuzzy sets
In this paper, different types of interval cut-set of interval-valued intuitionistic fuzzy sets (IVIFSs), complement of these cut-sets are defined. Some properties of those cut-set of IVIFSs are investigated. Also three decomposition theorems of IVIFSs are defined. These works can also be used in setting up the basic theory of IVIFSs. Key words: Interval-valued intuitionistic fuzzy sets,...
Knapsack problem: A case study of garden city radio (GCR), Kumasi, Ghana
Packing or arrangement problems form an integral part in a man’s life and cannot be out rightly ignored. Items need to be well arranged and protected to survive the move unscathed. When it is done efficiently, at least to its optimal level, space is saved. A room may become spacious when furniture, bags and other household items are arranged very well. The end result is beauty and attractiveness. Radio...
A class of one-point zero-stable continuous hybrid methods for direct solution of second-order differential equations
This paper considers the development of a class of one-point hybrid implicit methods for direct solution of general second order ordinary differential equations. The main predictors needed for the evaluation of the implicit methods are obtained to be of the same order with the methods at whatever hybrid point of collocation. The methods and their respective predictors are consistent and zero-stable....
Application of multi criteria decision making technique to evaluation suppliers in supply chain management
Supplier selection, the process of determining the suitable suppliers who are able to provide the buyer with the right quality products and/or services at the right price, at the right time and in the right quantities, is one of the most critical activities for establishing an effective supply chain. In other words, supplier selection is a multi-criteria decision making problem which includes both...
Optimal packing of fm station progammes case study: Kaase Fm Station, Kumasi, Ghana
A FM station has a pile of programmes being broadcast in the testing phase of the station. The programmes consist of fixed and unfixed programmes. However the full complement of programmes has not been reached. To achieve full complement, the station wants to plan a new programme mix with fixed programmes retaining their original time slots. The rearrangement of the programmes is modeled as a...
Semantic web - The future of the web
The web has grown steadily since its inception in 1990. Websites developed today are now tagged as Web 2.0; that is, they are user oriented and allow distributed publishing. Web 2.0 still follows the principle of the early web, a system of interlinked documents without organization. To onus was on the developers to design web applications that allow user interaction. The semantic web is the next generation of...
Page 3 of 5, showing 50 records out of 245 total, starting on record 101, ending on 150