Version-3 (Nov-Dec 2017)
Version-1 Version-2 Version-3 Version-4
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In this companion paper we have to determine the time of sunrise and sunset in any specific terrestrial latitude. Also it has been predicted about the sunrise and sunset in 2017(June - December). Although in this work there are some small errors at different situation but it does not effect on actual time of sunrise and sunset. So this is a good way to determine the time of sunrise and sunset in specific latitude. The result of our calculation is found to be good agreement to the other investigation.
Keywords: Anomaly, Declination, Latitude, Longitude, Time.
[1]. Beijing Astronomical Observatory, 1988, ZhongguoGudaiTianxiangJiluZongji (A Compilation of Chinese Records for Ancient Celestial phenomena), Nanjing: Jiangsu Science and Technology Press.
[2]. XuZhentao, Pankenier David W., Jiang Yaotiao, 2000, East Asian Archaeoastronomy: Historical Records of Astronomical Observations of China, Japan and Korea, Amsterdam: Gordon and Breach Science.
[3]. Liu C. Y., 2002, Chin. J. Astron. Astrophys. (ChJAA), 2, 391
[4]. Li Y., Zhang C. Z., 1998, A&A, 333, L13
[5]. Han Y. B., Qiao Q. Y., 2003, Chin. J. Astron. Astrophys., (ChJAA), 3, 569
[6]. Chen M. D., 2003, ZhongguoKexueJishu Shi Tianwenxue Juan (Volume Astronomy in Chinese History of Science and Technology), Beijing: Science Press
- Citation
- Abstract
- Reference
- Full PDF
Abstract: numerical simulation is performed to investigate Newtonian sinusoidal flows behavior on three dimensional idealized carotid artery (CA) and single stenosed (75% by area) carotid artery(SCA). The wall vessel is set as rigid during simulation. Bifurcated blood vessel are simulated by using three-dimensional flow analysis. Sinusoidal and parabolic velocity profiles are set out to fix the conditions of inlet boundaries of artery. The investigation has a Reynolds number range of 90 to 1430. Low Reynolds number k model has been used as governing equation. The investigation has been carried out to characterize the flow behavior of blood in two geometry, namely, (i) Normal carotid artery...........
Keywords and Phrases: Atherosclerosis, Carotid artery, Sinusoidal blood flow, Stenosis, Viscosity
[1]. Lopez AD, Mathers CD, Ezzati M, Jamison DT and Murray CJ., "Global and regional burden of disease and risk factors, 2001:systematic analysis of population health data", Lancet 367:1747-1757, (2006).
[2]. Lloyd-Jones D, Adams RJ, Brown TM, Carnethon M, Dai S, et al., "Heart disease and stroke statistics-2010 update: a report from the American Heart Association" Circulation 121:e46-e215, (2010).
[3]. Hankey GJ, Jamrozik K, Broadhurst RJ, Forbes S and Anderson CS., "Long-term disability after first-ever stroke and related prognostic factors in the Perth Community Stroke Study," 1989-1990. Stroke 33:1034-1040., (2002).
[4]. Mohan KM, Crichton SL, Grieve AP, Rudd AG, Wolfe CD, et al., "Frequency and predictors for the risk of stroke recurrence up to 10 years after stroke," the South London Stroke Register. J Neurol Neurosurg, Psychiatry 80:1012-1018. (2009).
[5]. Putaala J, Haapaniemi E, Metso AJ, Metso TM, Artto V, et al., "Recurrent ischemic events in young adults after first-ever ischemic stroke.," Ann Neurol 68:661-671., (2010).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Overview of Quantum Cryptography with Lattice Based Cryptography |
Country | : | United States |
Authors | : | Chuck Easttom |
: | 10.9790/5728-1306031821 |
Abstract: Many researchers believe quantum computing will be a practical reality within the next 10 years. Quantum based algorithms will be able to render current number theoretic asymmetric cryptography algorithms obsolete. This means that other algorithms must be discovered, prior to quantum computers becoming a practical reality. Lattice based cryptosystems are a viable candidate for post-quantum computing.
Keywords: Quantum computing, cryptography, quantum physics, post-quantum cryptography, lattice based cryptography
[1]. Imre, S., & Balazs, F. (2013). Quantum computing and communications: An engineering approach. Hoboken, New Jersey: John Wiley & Sons.
[2]. Broadbent, A., & Schaffner, C. (2016). Quantum cryptography beyond quantum key distribution. Designs, Codes and Cryptography, 78(1), 351-382
[3]. Moret-Bonillo, V. (2017). Adventures in computer science: From classical bits to quantum bits. New York City, New York: Springer.
[4]. Neilson, M., Chuang, I. (2011).Quantum Computation and Quantum Information: 10th Anniversary Edition. Cambridge, United Kingdom: Cambridge University Press.
[5]. Fano, G., Blinder, S. (2017). Twenty-First century quantum mechanics: Hilbert space to quantum computers: Mathematical methods and conceptual foundations. New York City, New York: Springer.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A New Approach to Solve Fuzzy Linear Equation A.X+B=C𝑪 |
Country | : | Bangladesh |
Authors | : | Md. Farooq Hasan || Dr. Abeda Sultana |
: | 10.9790/5728-1306032230 |
Abstract: Solving fuzzy equations has long been a problem in fuzzy set theory.Fuzzy equations were solved by using different standard methods. One of the well-known methods is the method of.........
Keywords: Density Function, Fuzzy Number, Fuzzy Equation, Probability Distribution, 𝛼−𝑐𝑢𝑡 method
[1]. L. A. Zadeh, Fuzzy Sets, Information and Control, 8 (1965) 338-353.
[2]. D. Dubois and H. Prade, "Fuzzy Set Theoretic Differences and Inclusions and Their Use in The analysis of Fuzzy Equations",
Control Cybern(Warshaw), Vol. 13, 1984, pp. 129-146.
[3]. E. Sanchez, "Solution of Fuzzy Equations with Extend Operations", Fuzzy Sets and Systems, Vol. 12, 1984, pp. 273-248.
doi:10.1016/0165-0114(84)90071-X.
[4]. J. J. Buckley, "Solving Fuzzy Equations", Fuzzy Sets and Systems, Vol.50, No.1, 1992, pp. 1-14. doi:10.1016/0165-0114(92)90199-
E.
[5]. J. Wasowski, "On Solutions to Fuzzy Equations", Control and Cybern, Vol. 26, 1997, pp. 653-658.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In this paper, we introduce a fractional heat conduction equation with a time-fractional derivative based on using the fractional heat Fourier law, in a half space in contact with vacuum perfectly-conductive half space. The Caputo fractional derivative is used to study the interaction between elastic, thermal, and magnetic fields. The solutions for displacement, temperature, stress and perturbed magnetic fields both in the vacuum and in the half-space are derived. The solutions are first obtained in terms of Laplace transform. The inverse of the Laplace transform is done numerically using a method based on Fourier expansion techniques. Numerical results for a copper-like material are presented graphically and discussed..
Keywords: Magneto-thermoelasticity; half space; Fractional heat conduction; Laplace transform
[1] J. Nowinski, Theory of thermoelasticity with applications (Sijtho and Noordho International Publishers-Alphen Aan Den Rijn,
1978).
[2] P. Chadwick, R. Hill and I.N. Sneddon, Progress in solid mechanics (North Holland- Amsterdam, 1960).
[3] H. Hany, H. Sherief, A.E.M. Elmisiery, and M.A. Elhagary, Generalized thermoelastic problem for an infinitely long hollow
cylinder for short times, J. Therm. Stress, 27, 2004 , 885-902.
[4] R.S. Dhaliwal, A. Singh, Dynamic Coupled Thermoelasticity, Hindustan Publishing Corporation, Delhi,1980, 631-636.
[5] N. Noda, T. Furukawa and F. Ashida, Generalized thermoelasticity in an infinite solid with a hole, J. Therm. Stress. 12,1989, 385-
402.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | On Closed Subsets Of Free Groups |
Country | : | Israel |
Authors | : | Rita Gitik || Eliyahu Rips |
: | 10.9790/5728-1306034547 |
Abstract: We give two examples of a finitely generated subgroup of a free group and a subset, closed in the profinite topology of a free group, such that their product is not closed in the profinite topology of a free group. [2010]Primary: 20E05; Secondary: 05C25, 20E26
Keywords: Free group, Profinite topology, Closed set
[1]. T. Coulbois, Free Product, Profinite Topology, and Finitely Generated Subgroups, Int. J. of Algebra and Computation, 11 (2001), 171-184.
[2]. R. Gitik and E. Rips, On Separability Properties of Groups, Int. J. of Algebra and Computation, 5 (1995), 703-717.
[3]. R. Gitik and E. Rips, On Double Cosets in Free Groups, J. of Mathematics, IOSR, 12, Issue 6 Version IV (November-December 2016), 14-15.
[4]. M. Hall, Jr., Coset Representations in Free Groups, Trans. AMS, 67 (1949), 431-451.
[5]. K. Henckell, S.T. Margolis, J.E. Pin, and J. Rhodes, Ash's Type II Theorem, Profinite Topology, and Malcev Products I, Int J. of Algebra and Computation, 1 (1991), 411-436..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Découverte de la loi cachée pour les nombres premiers |
Country | : | France |
Authors | : | M. Sghiar |
: | 10.9790/5728-1306034850 |
Abstract: From an idea inspired by quantum mechanics, the purpose of this article is to give a function....
Keywords:Nombre premier, Théorie des nombres, distribution des nombres premiers, la loi des nombres premiers, l'hypothèse de Riemann, la fonction zêta de Riemann.
[1]. William H. Mills, Aprime representing finction, Bull. Amer. Math. Soc., 1947, p. 604 et 1196
[2]. Roshdi Rashed, Entre arithmétique et algèbre : Recherches sur l'histoire des mathématiques arabes, Paris, 1984.
[3]. M. Sghiar, (Décembre 2015) , Des applications génératrices des nombres premiers et cinq preuves de l'hypothèse de
Riemann, Pioneer Journal of Algebra, Number Theory and its Applications , Volume 10, Numbers 1-2, 2015, Pages 1-31.
[4]. M. Sghiar, (Livre) Cinq preuves de l'Hypothèse de Riemann, Éditions Universitaires Européennes, ISBN-13 :978-3-639-
54549-4
[5]. M. Sghiar, La relativité et la théorie des nombres , https://hal.archives-ouvertes.fr/hal-01174146v3.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: We give an extremely easy proof of the atomic decomposition for distributions in.......
[1]. A. P. Calderόn, An atomic decomposition of distributions in parabolic Hp spaces, Adv. in Math., 25 (1977), 216-225.
[2]. S.-Y. Chang and R. Feffeπnan, A continuous version of duality of Hι with BMO on the bidisc, Ann. of Math., 112 (1980), 179-201.
[3]. The Calderόn-Zygmund decomposition on product domains, preprint.
[4]. R. R. Coifman, A real variable characterization of Hp, Studia Math., 51 (1974), 269-74.
[5]. R. Coifman, Y. Meyer and E. M. Stein, Un nouvel espace fonctionnel adapte a Γ etude des operateurs definiepar des integrates singulieres, preprint..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Alternative Methods to Prove Theorem of Basis And Dimensions |
Country | : | India |
Authors | : | Arpit Mishra |
: | 10.9790/5728-1306035556 |
Abstract: In this paper, we study about alternative methods by which we can proof the theorem,In a vector space V if {α1,α2,…..,αn} generates V and if {W1 ,W2,…..Wm} is linearly independent (LI), then m ≤ n , where dim W = m and dim V = n. OR We can't have more LI vectors than the number of elements in a set of generators. We all are familiar with the methods of proving the given theorems mentioned in books as reference books but there are also other methods by which we can prove the theorem using some theorems directly as statements.
Keywords: Basis of A Vector Space, Dimension of A Vector Space, Linear Dependence of Vectors, Linear Independence of Vectors, Linear Combination of Vectors, Linear Span.
[1]. Linear Algebra 4th Edition by Seymour Lipschutz (Temple University) and Marc Lars Lipson (University of Virginia), ISBN : 978-0-07-154353-8.
[2]. Halmos, Paul Richard,1916, Finite- Dimensional Vector Spaces,reprint of 2nd ed. Published by D. Van Nostrand Co., Princeton,1958. (Springer)
[3]. Linear Algebra 2nd Edition by Kenneth Hoffman (Massachusetts Institute of Technology) and Ray Kunze(University of California,Irvine).
[4]. Linear Algebra And Matrices by S.J. Publications (A unit of Kedar Nath Ram Nath), Edition-2015.
[5]. Linear Algebra And Matrices (Textbook) by Vigyan Bodh Prakashan, ISBN : 978-81-924048-3-7.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Rainfall Data Forecasting By SARIMA and BPNN Models |
Country | : | Sri Lanka |
Authors | : | Seneviratna,DMKN || Rathnayaka,RMKT |
: | 10.9790/5728-1306035763 |
Abstract: Forecasting is very appropriate and important component in different ways due to the competitive atmospheres around the world. It is a significant methodologyfor inferring the future behavior of a particular field under the uncertainty conditions with the limited known behaviors. This scenario is well suited for many practical applications such as rainfall data.Because of the importance of knowing about weather for agricultural purposes as well as for preventing natural disasters, forecasting rainfall data is significant. Practically, rainfall data forecasting is a difficult task due to its' nonlinear behavior with high volatility and complex nature. Furthermore, rainfall is considered as the most important climatic element that influences agriculture. Therefore monthly rainfall forecasting plays an important role in the planning and management of agricultural scheme and management of water resource systems.........
[1]. Box, G. & Jenkins, G., 1970. Time Series Analysis, Forecasting and Control. San Francisco and London: Holden-Day.
[2]. Box, G. & Pierce, D. A., 1970. Distribution of Residual Autocorrelations in Autoregressive-Integrated Moving Average Time Series Models. Journal of the American Statistical Association, 65, pp. 1509-1526.
[3]. Diaz-Robles, L. et al., 2008. A hybrid ARIMA and artificial neural networks model to forecast particulate matter in urban areas: The case of Temuco, Chile. Atmospheric Environment, Volume 42, pp. 8331 - 8340.
[4]. Etuk, E. & Mohamed, T., 2014. Time Series Analysis of Monthly Rainfall data for the Gadaref rainfall station, Sudan, by Sarima Methods. Intenat in Knowledgeional Journal of Scientific Research, 2(7), pp. 320 - 327.
[5]. Feng, G. et al., 2016. Trend Analysis and Forecast of Precipitation, Reference Evapotranspiration, and Rainfall Deficit in the Blackland Prairie of Eastern Mississippi. Journal of Applied Meteorology and Climatology, Volume 55, pp. 1425 - 1439..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | NILPOTENCY: A Characterization of the finite p-groups |
Country | : | Nigeria |
Authors | : | Adebisi, S.A. |
: | 10.9790/5728-1306036466 |
Abstract: As parts of the characterizations of the finite p-groups is the fact that every finite p-group is NILPOTENT. Hence, there exists a derived series (Lower Central) which terminates at e after a finite number of steps. Suppose that G is a p-group of class at least m ≥ 3. Then L m-1G is abelian and hence G possesses a characteristic abelian subgroup which is not contained in Z(G). If L 3(G) = 1 such that pm is the highest order of an element of G/L2 (G) (where G is any p-group) then no element of L2(G) has an order higher than pm. [1]
Keywords and phrases : Nilpotency, central series, order, commutator, abelian
[1]. Marshall, H. (1959). The Theory of Groups. The Macmillan Company, New York.
[2]. Frobenius, G. and Stickelberger, L. (1879). $\ddot{\mbox{U}}$ber Gruppen von Vertauschbaren Elementen, J. reine angew. Math. 86 (217-262).
[3]. Yakov Berkovic (2008). Groups of prime power order vol. 1. Walter de Gruyter GmbH \& Co. KG, 10785 Berlin, Germany.
[4]. Kuku, A.O. (1992). Abstract Algebra, Ibadan University Press.
[5]. Mattarei, S. (1994). An example of $p$-groups with identical character tables and different derived length. Arch. Math 62 (12-20)..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Human beings are in constant search for self-actualization, recognition, protection from risks and satisfaction of their needs in order to live in peace and harmony. This can only be achieved when all threats to security are removed. Science, Technology and Mathematics (STM) Education is concerned with the development of human resource which has significant impact on the development of social harmony and building a culture of peace. This is with the view to ensuring physical survival of individuals and groups and protection from threats like disease, hunger, unemployment, political oppression and environment degradation as indices of human insecurity. The paper, Science, Technology and Mathematics (STM) Education for human security and sustainable development looks at Human........
Keywords: Human Security, Science, Technology and Mathematics (STM) Education.
[1]. Akpan, B.B. (2010) Innovation in Science and Technology Education through Science Teachers Association. Science Education International. The Online Journal of the International Council of Association for Science Education 21(2) June.
[2]. Aminu, J. (1986) Quality and Stress in Nigerian Education. A Collection of Selected addresses and Memorandum Ministry of Information Printing Division, Lagos Nigeria.
[3]. Asalebe, K.O. (2013): Youth Unemployment: A Threat to Peace and Security in Nigeria. Managing Education for National Security. Journal of Nigerian Association for Educational Administration and Planning (NEAP) 13 (1&3).
[4]. Attah, S.C. & Kyari, Y.B. (2014), Social Security as a Brand of Human Security. An approach for Peach and Development in Nigeria Outreach. A Journal of Research Issues and Ideas 13(2) December Published by Kashim Ibrahim College of Education, Maiduguri. Nigeria.
[5]. Bagudo, A.A. (2015): Rethinking Educational Strategies for Productive and Sustainable Peace and National Development. A lead Paper Presented at the Second Annual National Conference Organize by Faculty of Education and Extensive Service, Usman Danfodiyo University, Sokoto 10th – 12th November..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In this paper, we presented some definite integral formula using the well-known Cauchy Residue theorem. These formulas may not be easily derived using the elementary integral calculus method. We also presented a new representation of beta function.
Keywords: Definite integral, Residue's theorem
[1]. Dennis G. Zill; Calculus, Third Ed.,PWS-KENT PUB. COMPANY, 1992.
[2]. ISBN: 0-534-92793-9
[3]. H.K. DASS; Advanced Engineering Mathematics, S.Chand & Company LTD. (AN ISO 9001: 2000 COMPANY) RAM NAGAR,
NEW DELHI-110055, 1999.
[4]. ISBN: 81-219-0345-9
[5]. H.K. DASS; Engineering Mathematics, S.Chand & Company LTD. (AN ISO 9001: 2000 COMPANY) RAM NAGAR, NEW
DELHI-110055, 2008...
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This research seeksto classify prospective students seeking admissioninto higher institution in Nigeria as fit or unfit using discriminant analysis and artificial neural network analysis. The data is a primary data collected from a sample of 90 second year National Diploma (ND 2) students in various department in Lagos State Polytechnic. Data on students' personal, academic and other information that will accurately classify them as good or bad standing as measured by their first year cumulative grade point average (CGPA)were collected from each student.The data was fitted into discriminating models using discriminant analysis and artificial neural network analysis and the two models complement each other for this purpose. The result of the discriminant analysis was able to classify 60%.........
Keyword: Artificial Neural Network, Discriminant Analysis, Post UTME, Chi-square, UTME[1]. Aru, O.A; Ifeyinwa E. Achumba and F.K. Opara (2016): "Assessment Of The Admission Criteria That Predict Students' Academic Performance in Undergraduate Years in a Nigerian University". Invention Journal of Research Technology in Engineering & Management (IJRTEM). Volume 1 Issue 2 ǁ March. 2016 ǁ PP 01-05
[2]. Asogwa, O.C and Oladugba, A.V (2015)" On The Comparison of Artificial Neural Network (ANN) and Multinomial Logistic Regression (MLR) . West African Journal of Industrial and Academic Research April 2015 Vol.13 No. 1
[3]. Dentonj J.J; Davis, T.J; Capraro, R.M; Smith, B.L; Beason, ; Graham, B.D; Strader, R.A (2008). "Examination of Applicant Profiles for Admission into and Completion of an Online". Secondary Teacher Certification Program. Texas A&M University.
[4]. Fahlman, S. E. and Lebiere, C. (1990): "The cascade-correlation learning architecture" Advances in Neural information Processing Systems 2, D. S. Touretzky, Ed. Morgan Kaufmann Publishers, San Francisc Aggarwal A. K., Travers S. D., and Scott-Conner C. E. H. "Selection of surgical residents: A neural network approach." Cybernetics and Systems 31:417-430, 2000., CA, 524-532, 1990.
[5]. Flitman, A.M. (1997): "Towards analyzing student failure: neural networks compared with regression analysis and multiple discriminant analysis". Computers Operations Research, 24, 367-377...
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Schrödinger Equation Via Laplace-Beltrami Operator |
Country | : | Turkey |
Authors | : | Esin İnan Eskitaşçioğlu || Mehmet Açil |
: | 10.9790/5728-1306039195 |
Abstract: In this work firstly we consider Schrödinger differential equation which satisfies to find wave functions that are important for microscopic systems. Then we generalize these equations by using Laplace- Beltrami operator and compare results we obtained with solutions of Schrödinger differential equations.
Keywords: Differential Equation, Bessel Function, Potential
[1]. Charles Z. Martin, Variational formulas for the Green function. Anal. Math. Phys.2:89103,2012
[2]. David J. Griffiths, Introduction to quantum mechanics(second edition), Pearson Education Inc.,2005
[3]. E. A. Guggenheim, The inverse square potential field, Proc.Phys.Soc.;1966, Vol.89
[4]. Elise Guillaumin-Espana et al., Classical and quantum dynamics in an inverse square potential. Journal of mathematical physics
55,103509, 2014
[5]. Wolfgang Bietenholz et al ., Comment on '' the two-dimensional motion of a particle in an inverse square potential: classical and
quantum aspect'', Journal of mathematical physics 56, 104101,2015..