Series-2 (Nov. – Dec. 2022)Nov. – Dec. 2022 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
- Index Page
- Cover Paper
Abstract : In the proposed model, we have developed a co-operative relationship between the vendor and the buyer when the expired stock has salvage value. Demand rate is taken to be selling price and stock dependent with constant deterioration and shortages are not allowed. The permissible credit period is used to motivate the buyer to co-operate in the joint inventory system.
Keywords: Deterioration, Multivariate Demand, Salvage Value
[1]. Balkhi Z.T. and Bankerouf L. (2004): On an inventory model for deteriorating items with stock dependent and time varying demand rates, Computers and Operational Research, 31, 223-240.
[2]. Banerjee A. (1986): A joint economic lot-size model for purchaser and vendor, Decision Sciences, 17, 292-311.
[3]. Clark A. J. and Scarf H. (1960): Optimal policies for a multi-echelon inventory problem, Management Sciences, 6, 475-490
[4]. Covert R. P. and Philip G. C. (1973): An EOQ model for items with weibull distribution deterioration, AIIE Transactions, 5, 323-326.
[5]. Datta T. K. and Paul K. (2001): An inventory system for stock dependent, price sensitive demand rate, Production Planning and Control, 12, 13-20.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Cryptographic method to enhance Data Security using ElGamal algorithm and Mellin Transform |
Country | : | |
Authors | : | Akash Thakkar || Ravi Gor |
: | 10.9790/5728-1806021218 |
Abstract : Cryptography is a popular technique for ensuring information confidentiality.Cryptography is divided into two stages: encryption and decryption.Encryption is the process of transforming plaintext to ciphertext, whereas decryption is the reverse procedure.Encryption and decryption schemes based on Mellin Transformare unable to give more security while communicating the information.ElGamal is a public key algorithm that is based on the discrete logarithm problem. The purpose of this study is to introduce a cryptographic method that uses the ElGamal algorithm and Mellin Transform to improve communication security.
Keywords: Plaintext, Ciphertext, Encryption, Decryption, ElGamal algorithm, Mellin Transform
[1]. Allen B. (2008). "Implementing several attacks on plain ElGamal encryption", Iowa State University.
[2]. Debnath L. and Bhatta D. (2015). "Integral Transforms and Their Applications" (Third Edition), 978-1-4822-2358-3.
[3]. Dissanayake W. D. M. G. M. (2018). "An Improvement of the Basic El-Gamal Public Key Cryptosystem", International Journal of Computer Applications Technology and Research, 7(2), 40-44.
[4]. ElGamal T. (1985). "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE transactions on information theory, 31(4), 469-472.
[5]. Grewal J. (2015). "ElGamal: Public-Key Cryptosystem", Math and Computer Science Department, Indiana State University.
[6]. Johar M. Ashfaque (2019). "The Mellin Transform A Basic Introduction", https.
- Citation
- Abstract
- Reference
- Full PDF
Abstract : In this paper, we propose a new method of ranking a fuzzy number using the simple idea that two nonparallel lines intersect at a unique point. We consider an unbalance fuzzy transportation problem where cost, requirement and availability are a trapezoidal fuzzy number. Using the purpose of ranking fuzzy numbers, the fuzzy transportation problem is converted into a crisp transportation problem. The method for solving the transportation problem are the linear programming technique and Vogal Approximation Method. Numerical examples are used to demonstrate the effectiveness and accuracy of this method
Keywords: Fuzzy Transportation Problem, Trapezoidal Fuzzy Number, Ranking Fuzzy Number. Linear Programming Technique, Vogel Approximation Problem 2010 AMS Subject Classification: 90C08, 03E72
[1]. Hitchcock FL. The distribution of a product from several sources to numerous localities. Journal of Mathematical Physics. 1941; 224-230.
[2]. Zadeh LA. Fuzzy sets, information and control. 1965; 8: 338353
[3]. Bellman RE, Zadeh LA. Decision-making in a fuzzy environment. Management Sci. 1970; 17: 141-164.
[4]. Zimmermann HJ. Fuzzy set theory and its applications. Fourth Edition ISBN 0792374355; 1934.
[5]. Zimmermann HJ. Fuzzy programming and linear programming with several objective functions. Fuzzy Sets and Systems. 1978; 45-55..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Result on Common Fixed Point in S-Metric Spaces |
Country | : | India |
Authors | : | Duduka Venkatesh || V.Nagaraju |
: | 10.9790/5728-1806022630 |
Abstract : The purpose of this paper is to prove a common fixed point theorem for four self maps in complete S-metric space using compatibility of type (A).
Keywords: Fixed Point, S-metric space, Compatible mappings, Compatible mappings of type (A).
[1]. Jungck , (1986), Compatible mappings and common fixed points, Internat.J. Math. Math.Sci.,Vol. 9, pp. 771-778.https://doi.org/10.1155/S0161171286000935
[2]. Jungck , Murthy P.P and Cho Y.J., (1993), Compatible mappings of type (A) and common fixed points, Math.Japonica,Vol .38,
pp. 381-391.
[3]. Sedghi, S., Shobe, N., Aliouche, A.,(2012), A generalization of fixed point theorems in S-metric spaces. Mat. Vesn. Vol. 64, No. 3, pp. 258–266.
[4]. Kyu Kim, J., Sedghi, S., Gholidahneh, A., Mahdi Rezaee, M., (2016), Fixed point theorems in S-metric spaces. East Asian Math. J. Vol. 32, No. 5, pp. 677–684.
[5]. Sedghi, S., Altun, I., Shobe, N., Salahshour, M.A, (2014),Some properties of S-metric spaces and fixed point results. KyungpookMath. J. Vol. 54, No. 1, pp. 113–122.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Queueing Model for PoA based Blockchain system |
Country | : | |
Authors | : | Stuti Vora || Ravi Gor |
: | 10.9790/5728-1806023138 |
Abstract : For many Blockchain applications, Proof of Authority (PoA) is a desirable replacement for PoW-based protocols due to its great performance and energy efficiency.In this work, a Markovian queue-based quantitative analysis is framed to represent authentic PoA-based Blockchains. Consensus process of Blockchain is analysed theoretically usingqueueing model 𝑀𝑏 / M / 1. Primary performance measures such as expected time of transaction in system (transaction confirmation time), expected time of transaction in queue, expected number of transactions in system and expected number of transactions in queue, throughput are examined numerically with the help of python.
Keywords: Blockchain, Consensus, Proof of Authority, Queueing model, Throughput
[1]. BitFury Group and J. Garzik. "Public versus private Blockchains". White Paper, 2015.http://bitfury.com/content/5-white-papers-research/public-vs-private-pt1-1
[2]. De Angelis, S., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., & Sassone, V. (2018). "PBFT vs proof-of-authority: Applying the CAPtheorem to permissioned Blockchain".
[3]. Dinh, T. T. A., Wang, J., Chen, G., Liu, R., Ooi, B. C., & Tan, K. L. (2017, May). "Blockbench:A framework for analyzing private Blockchains". In Proceedings of the 2017 ACM internationalconference on management of data pp. 1085-1100.
[4]. Ghimire, S., Ghimire, R. P., & Thapa, G. B. (2014). "Mathematical models of Mb/M/1 bulkarrival queueing system". Journal of the Institute of Engineering, 10(1), 184-191.
[5]. Joshi, S. (2021). Feasibility of Proof of Authority as a Consensus Protocol Model. arXiv. arXivpreprint arXiv:2109.02480.
[6]. Lian, W., Fan, Q., Jia, B., & Liang, Y. (2020). "A Blockchain prediction model on time, value,and purchase based on Markov chain and queuing
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | On The Mathematical Model of the Biomechanics of Green Plants (Part 2) |
Country | : | Nigeria |
Authors | : | Uka N. O || Abbey,T. M || Alex,M |
: | 10.9790/5728-1806023945 |
Abstract : In this study, the effects of aspect ratio, porosity, buoyancy forces (thermal and concentration Grashof numbers) and Schmidt number on the flow of soil mineral salt water in the xylem of a non-bifurcating green plant are examinedon the velocity and temperature fields. The coupled non-linear differential equations governing the motion of the flow are non-dimensionlized and then solved using the homotopy perturbation method. It was discovered from the analysis that;the velocity and temperature of flow fields increases as the porosity of the fluid carrying vessel and aspect ratio increases;increase in the Schmidt number and buoyancy forcesresulted to a corresponding increase in the flow velocity and thus enhancing the effective growth and yield of the plant.
Keywords: Biomechanics, xylem flow, homotopy perturbation method (HPM)
[1]. Bestman, A. R. (1991). "Global Models for the Biomechanics of Green Plants Part 1"International Journal of Energy Research,16:677-684.
[2]. Bestman, A. R. (1992). "Global Models for the Biomechanics of Green Plants Part 2" International Journal of Energy Research,16:685-689.
[3]. Cabrita, P. (2012). "Experimental and Theoretical Studies of Phloem Transport with the Inclusion of Lateral Solute Exchange and Apoplastic Conditions" M.Sc. Thesis,institute of Bio and Geo-Sciences: Plant Science (IBG-2)
[4]. Cabrita, P., Thorpe, M. & Huber, G. (2013). "Hydrodynamics of Steady State Phloem Transport with Radial Leakage of Solute" Frontiers in Plant Science, 4
[5]. Dolger, J., Rademaker, H., Liesche, J., Schulz, A. & Bohr, T. (2014). "Diffusion and Bulk Flow in Phloem Loading: A Theoretical Analysis of the Polymer Trap Mechanism for Sugar Transport in Plants" PHYSICAL REVIEW E 90
- Citation
- Abstract
- Reference
- Full PDF
Abstract : Textbooks play a prominent role in the teaching and learning process in developing countries like Sri Lanka. Mathematics textbooks could be the most important tool in a classroom environment of teaching and learning Mathematics. Several challenges of teaching and learning Mathematics have been identified in the Sri Lankan education system such as existence of teachers without adequate teacher training in Mathematics, teacher deployment issues, and severe shortage of competent Mathematics teachers in many schools. Therefore, it was observed that the Mathematics textbook is using as a hand book in Sri Lankan schools. Consequently, there is a huge need for providing highly effective textbooks to aid student learning........
Keywords: Textbook, Mathematics, Evaluation, Self-study.
[1]. Department of Examination (2012). Performance of Candidates GCE(O/L). Available at: 2012 (OL).pdf (doenets.lk)
[2]. Department of Examinations, 2014, Performance of Candidates GCE(O/L), Available at: 2014 (OL).pdf (doenets.lk) [3]. Devore, J. and Berk, K. (2006).Modern Mathematical Statistics with Applications.2ed,Springer.
[4]. Fan, L. (2011). Textbook research as scientific research: towards a common ground on issues and methods of research on Mathematics textbooks. International Conference on School Mathematics Textbooks, China. Available at:https://eprints.soton.ac.uk/201715/1/Textbook_Research_as_Scientific_Research_%2528FLH_for_2011_ICSMT%2529.pdf
[5]. Fan, L. and Zhu, Y. (2002). Textbooks use by Singaporean Mathematics teachers at lower secondary school level, Mathematics education for a knowledge-based era, (Vol.2).
- Citation
- Abstract
- Reference
- Full PDF
Abstract : Zadeh introduced the concept of fuzzy sets in 1965, while Atanassov developed the concept of intuitionistic fuzzy sets in 1986. Many researchers apply these two concepts to graph structures, so as to produce a fuzzy graph structure, an anti-fuzzy graph, a fuzzy graph of semigroup, ananti-fuzzy graph of semigroup, an intuitionistic fuzzy graph (IFG), an intuitionistic anti-fuzzy graph (IAFG) and anintuitionistic fuzzy graph of semigroup (IFGS). In this article, we introduce the concept of an intuitionistic anti-fuzzy graph of a semigroup which is a development of two concepts namely IAFG and IFGS.....
Keywords: Fuzzyideal graph ofsemigroup,Anti fuzzyideal graph ofsemigroup,Intuitionistic fuzzy ideal graph ofsemigroup,Intuitionistic anti fuzzyideal graph ofsemigroup.
[1] G.-C. Rota, "An introduction to semigroup theory," Advances in Mathematics, vol. 28, no. 1. p. 87, 1978. doi: 10.1016/0001-8708(78)90053-1.
[2] K. T. Atanassov, "Intuitionistic fuzzy sets," Fuzzy Sets Syst., vol. 20, no. 1, pp. 87–96, 1986, doi: 10.1016/S0165-0114(86)80034-3.
[3] L. A. Zadeh, "Fuzzy sets," Inf. Control, vol. 8, no. 3, pp. 338–353, Jun. 1965, doi: 10.1016/S0019-9958(65)90241-X.
[4] A. Rosenfeld, "FUZZY GRAPHS††The support of the Office of Computing Activities, National Science Foundation, under Grant GJ-32258X, is gratefully acknowledged, as is the help of Shelly Rowe in preparing this paper.," Fuzzy Sets their Appl. to Cogn. Decis. Process., pp. 77–95, 1975, doi: 10.1016/b978-0-12-775260-0.50008-6.
[5] N. Gani, "3 . Order and size in fuzzy Graph," no. May, 2015, doi: 10.13140/2.1.3884.0969.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Transitivity and sensitivity of non-autonomous discrete product systems |
Country | : | |
Authors | : | Yuanlin Chen || Tianxiu Lu || Jingmin Pi |
: | 10.9790/5728-1806026166 |
Abstract :This paper studies the chaotic properties between product non-autonomous discrete systems.....
Keywords: transitivity; sensitivity; non-autonomous discrete systems; product system
[1]. S. Kolyada, L. Snoha, Topological entropy of nonautonomous dynamical systems. Random Comput. Dyn., 4, 1996, 205-233.
[2]. D. Thakkar, R. Das, Topological stability of a sequence of maps on a compact metric space. B. Math. Sci., 4, 2014, 99-111.
[3]. L. Liu, Y. Sun, Weakly mixing sets and transitive sets for nonautonomous discrete systems. Adv. Differ. Equ., 9, 2014, 217.
[4]. C. Tian, G. Chen, Chaos of a sequence of maps in a metric space. Chaos Soliton. Fract., 28(4), 2006, 1067-1075.
[5]. Y. Shi, G. Chen, Chaos of time-varying discrete dynamical systems. J. Diff er. Equ. Appl., 15(5), 2009, 429-449.
[6]. F. Balibrea, P. Oprocha, Weak mixing and chaos in nonautonomous discrete systems. Appl. Math. Lett., 25(8), 2012, 1135–1141.
[7]. R. Vasisht, R. Das, Furstenberg families and transitivity in non-autonomous systems. Asian-European J. Math., 13(01), 2020,
2050029.