SlideShare a Scribd company logo
1 of 3
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 03 Issue: 02 June 2014 Pages: 135-137
ISSN: 2278-2397
135
Study on Impact of Media on Education Using
Fuzzy Relational Maps
J. Maria Roy Felix, J. Josephine Suganya
Department of Mathematics, Loyola College, Chennai
Email: jjsuganya9@gmail.com
Abstract- In this paper we bring out the depth of impact of media
upon the growth of education. Education moulds an individual to
take firm decisions on issues. It makes to feel independent and
leads to a more exposed world. Media is a very powerful tool to
explore the world and have access to the world. Internet, Mobile
phones, etc., helps for an easy access to any part of the world at
our finger tips. Media may lead us to both constructive and
destructive mechanism depending the way we deal with it.Here
we use FRM model to study and analyze the impact of media on
education.
Fuzzy Relational Maps (FRM),Media, Education.
I. SECTION ONE: FUZZY RELATIONAL MAPS (
FRMS)
The new notion called Fuzzy Relational Maps (FRMs) was
introduced by Dr. W.B.Vasantha and Yasmin Sultana in the
year 2000. In FRMs we divide the very casual associations into
two disjoint units, like for example the relation between a
teacher and a student or relation; between an employee and an
employer or a relation; between the parent and the child in the
case of school dropouts and so on. In these situations we see
that we can bring out the casual relations existing between an
employee and employer or parent and child and so on. Thus for
us to define a FRM we need a domain space and a range space
which are disjoint in the sense of concepts. We further assume
no intermediate relations exist within the domain and the range
space. The number of elements in the range space need not in
general be equal to the number of elements in the domain
space.In our discussion the elements of the domain space are
taken from the real vector space of dimension n and that of the
range space are real vectors from the vector space of dimension
m (m in general need not be equal to n). We denote by R the
set of nodes R1, … , Rm of the range space, where Ri = {(x1, x2,
…, xm) / xj = 0 or 1} for i = 1, … ,m. If xi = 1 it means that the
node Ri is in the ON state and if xi = 0 it means that the node Ri
is in the OFF state.
Similarly D denotes the nodes D1,…,Dn of the domain space
where Di = {(x1,…, xn) / xj= 0 or 1} for i = 1, …, n. If xi = 1, it
means that the node Di is in the on state and if xi = 0 it means
that the node Di is in the off state.A FRM is a directed graph or
a map from D to R with concepts like policies or events etc. as
nodes and causalities as edges. It represents casual relations
between spaces D and R. Let Di and Rj denote the two nodes of
an FRM. The directed edge from D to R denotes the casuality
of D on R , called relations. Every edge in the FRM is
weighted with a number in the set {0, 1}.Let ei j be the weight
of the edge DiRj,e i j  {0.1}. The weight of the edge DiRj is
positive if increase in Di implies increase in Rj or decrease in
Di implies decrease in Rj. i.e. casuality of Di on Rj is 1. If e i j =
0 then Di does not have any effect on Rj. We do not discuss the
cases when increase in Di implies decrease in Rj or decrease in
Di implies increase in Rj.When the nodes of the FRM are fuzzy
sets, then they are called fuzzy nodes, FRMs with edge weights
{0, 1) are called simple FRMs.Let D1, …,Dn be the nodes of
the domain space D of an FRM and R1, …, Rm be the nodes of
the range space R of an FRM.Let the matrix E be defined as E
= (eij ) where ei j  {0, 1}; is the weight of the directed edge
DiRj ( or RjDi ), E is called the relational matrix of the FRM.It
is pertinent to mention here that unlike the FCMs, the FRMs
can be a rectangular matrix; with rows corresponding to the
domain space and columns corresponding to the range space.
This is one of the marked difference between FRMs and
FCMs.
Let D1, …,Dn and R1,…,Rm be the nodes of an FRM. Let DiRj
(or RjDi) be the edges of an FRM, j = 1, …, m, i = 1, …, n. The
edges form a directed cycle if it possesses a directed cycle. An
FRM is said to be acycle if it does not posses any directed
cycle.An FRM with cycles is said to have a feed back when
there is a feed back in the FRM, i.e. when the casual relations
flow through a cycle in a revolutionary manner the FRM is
called a dynamical system.Let DiRj( orRjDi), 1  j  m, 1 i n.
When Rj( or Di) is switched on and if casuality flows through
edges of the cycle and if it again causes Ri(Dj), we say that the
dynamical system goes round and round. This is true for any
node Ri (or Dj) for 1 im, ( or 1  j  n). The equilibrium state
of this dynamical system is called the hidden pattern. If the
equilibrium state of the dynamical system is a unique state
vector, then it is called a fixed point. Consider an FRM with
R1, …, Rm and D1, …, Dn as nodes. For example let us start the
dynamical system by switching on R1 or D1. Let us assume that
the FRM settles down with R1 and Rm( or D1 and Dn) on i.e. the
state vector remains as (10…01) in R [ or (10…01) in D], this
state vector is called the fixed point.If the FRM settles down
with a state vector repeating in the form A1  A2 
…. Ai  A1 or ( B1 B2  …  Bi B1 ) then this
equilibrium is called a limit cycle.
A. Methods of determination of hidden pattern.
Let R1, …, Rm and D1, …, Dn be the nodes of a FRM with feed
back. Let E be the n  m relational matrix. Let us find a hidden
pattern when D1 is switched on i.e. when an input is given as
vector A1= (1000...0) in D the data should pass through the
relational matrix E. This is done by multiplying A1 with the
relational matrix E. Let A1E = (r1, … ,rm) after thresholding
and updating the resultant vector (say B) belongs to R. Now we
pass on B into ET
and obtain BET
. After thresholding and
updating BET
we see the resultant vector say A2 belongs to D.
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 03 Issue: 02 June 2014 Pages: 135-137
ISSN: 2278-2397
136
This procedure is repeated till we get a limit cycle or a fixed
point.
II. SECTION TWO: DESCRIPTION OF THE
PROBLEM
Education civilizes a society. Teachers mould the student’s
community to be better part takers of our society. Teachers
impart knowledge to the students for their own betterment and
the society at large. Students of different backgrounds are place
under one roof known as class room, A teachers has to be so
prudent that he/she reaches the students of different caliber. A
small mess up in this regard may ruin the future of the student
and the on the whole the society. Hence to study and analyze
this problem we have constructed a linguistic questionnaire and
using this linguistic questionnaire we have interviewed 50
persons. This linguistic questionnaire was used to obtain the
attributes and using these attributes and the opinion of the experts
we have used FRM to analyze the problem.
III. SECTION THREE: FRM MODEL TO STUDY
ABOUT THE IMPACT OF MEDIA ON
EDUCATION
Now using the linguistic questionnaire and the expert’s opinion
following attributes associated by impact of mediaon education is
listed. Thus the types of media are taken as the domain space and
the types of education as the range space of the FRM. In
choosing the attributes there is no hard and fast rule. It is left to
the choice of any researcher to include or exclude any of the
attributes.
Attributes Related to the Domain space M given by M = {M1,
…,M5}
M1 - Magazines
M2 - Films and movies
M3 - News papers
M4 - Television
M5 - Internet
Attributes Related to the Range space Y given by Y = {Y1,
…,Y7}
Y1 - Nursery
Y2 - Elementary
Y3 - technical
Y4 - Special( mentally& physically challenged)
Y5 - Collegiate
Y6 - Secondary
Y7 - Adult.
Now using the expert's opinion who is a media person we have
the following relation matrix. We have M1.M2, M3,M4,M5 as
the rows and Y12,Y2,Y3,Y4,Y5,Y6,Y7 are the columns.
0 0 0 0 0 1 0
0 1 0 0 0 0 0
A 0 0 0 1 0 0 1
1
0 1 0 0 0 0 0
1 0 0 0 1 0 0
 
 
 
 

 
 
 
 
.
The hidden pattern of the state vector X = (0 1 0 0 0 ) is obtained
by the following method:
XA1 ↪(0 1 0 0 0 0 0 ) = Y
YA1
T
↪(0 1 0 1 0) = X1
X1A1 ↪(0 1 0 0 1 0 0 ) = Y1
Y1A1
T
↪(0 1 0 1 1) = X2
X2A1 ↪(1 1 0 0 1 0 0) = Y2
Y2A1
T
↪(0 1 0 1 1) = X3 (say)
X3A1 ↪( 1 1 0 0 1 0 0) = Y3 (say)
(Where ↪ denotes the resultant vector after thresholding and
updating) When we take M2 in the ON state ( i.e. films /movies )
and all other attributes to be in the off state.
We see the effect of X on the dynamical system A1 is a fixed
point given by the binary pair {(0 1 0 1 1 ), (1 1 0 0 1 0 0)}.
When we take flims/movies node alone in the on state we get say
X = (0 1 0 0 0 )
The resultant to be the fixed point given by the binary pair {(0
1 0 1 1 ), (1 1 0 0 1 0 0)}. When the on state is taken as node
M2 we see the hidden pattern is the fixed point which is the
same binary pair, which makes the nodes M4and M5to be in
the on state in the domain space and makes the nodes Y1, Y2
and Y5 of the range space to be in the on state.Since the
working is time consuming, a C program is formulated for
finding the hidden pattern. The casual connection matrix A2 is
given by the second expert who is a professor.Let M1.M2,
M3,M4,M5 taken along the rows and Y1,Y2,Y3,Y4,Y5,Y6,Y7
along the columns.
0 1 0 0 0 1 0
0 0 0 1 0 0 0
A 0 0 1 0 0 0 1
2
0 0 0 0 0 1 0
1 0 0 0 1 0 0
 
 
 
 

 
 
 
 
Suppose the state vector X = (0 0 0 1 0) ie., the node internet is in
the on state condition and all other nodes are in the off state. We
see the resultant binary pair using the
C - program is given by {( 1 0 0 1 0 ), ( 0 1 0 0 0 1 0)} which is
the fixed point.When we take the state vector X1 = (0 0 0 1 0 )
ie., the node television i.e., M4 in the on state and all other
attributes be in the off state we see the effect of X1 on the
dynamical system A2 is a fixed point given by the binary pair {( 1
0 0 1 0 ), ( 0 1 0 0 0 1 0)} .The interpretation of the hidden
pattern of several state vectors using several experts is used in
this paper to arrive at the conclusion. To show the mode of
working we have just given two experts opinion.
IV. SECTION FOUR: CONCLUSIONS AND SUGGESTIONS
Students should be trained to use the technology to have better
understanding.Internet is a very powerful tool which has all the
information required, the young minds should to motivate in
right sense to make use of it rather than accusing young ones
for using internet.Usage of camera mobile phone and its
feature has to be meticulously and carefully dealt
with.Education and media should go in hand in hand for the
betterment of an individual and the society at large.Computers
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 03 Issue: 02 June 2014 Pages: 135-137
ISSN: 2278-2397
137
knowledge should be thought to children to bring out their
talent and creativity.
REFERENCES
[1]. GILL S.S, “ living with Sky TV “ in the Hindu Magazine, Sunday ,
April 5 , 1992.
[2]. W.B.VasanthaKandasamy“ Love . Life .Lust . Loss” 101 real life stories of
migration and AIDS.
[3]. Bart Kosko, Neural Networks and Fuzzy Systems, Prentice Hall of India
Private Limited, 1967.
[4]. W.B.VasanthaKandasamy and Yasmin Sultana, Knowledge processing
using Fuzzy
[5]. Relational Maps, Ultra Sci. of Phyl. Sciences, 12, 242-245, (2000).

More Related Content

Similar to Study on Impact of Media on Education Using Fuzzy Relational Maps

Application of stochastic lognormal diffusion model with
Application of stochastic lognormal diffusion model withApplication of stochastic lognormal diffusion model with
Application of stochastic lognormal diffusion model withAlexander Decker
 
Analysis and algebra on differentiable manifolds
Analysis and algebra on differentiable manifoldsAnalysis and algebra on differentiable manifolds
Analysis and algebra on differentiable manifoldsSpringer
 
Master Thesis on the Mathematial Analysis of Neural Networks
Master Thesis on the Mathematial Analysis of Neural NetworksMaster Thesis on the Mathematial Analysis of Neural Networks
Master Thesis on the Mathematial Analysis of Neural NetworksAlina Leidinger
 
DIGITAL TOPOLOGY OPERATING IN MEDICAL IMAGING WITH MRI TECHNOLOGY.pptx
DIGITAL TOPOLOGY OPERATING IN MEDICAL IMAGING WITH MRI TECHNOLOGY.pptxDIGITAL TOPOLOGY OPERATING IN MEDICAL IMAGING WITH MRI TECHNOLOGY.pptx
DIGITAL TOPOLOGY OPERATING IN MEDICAL IMAGING WITH MRI TECHNOLOGY.pptxmathematicssac
 
STATISTICAL ANALYSIS OF FUZZY LINEAR REGRESSION MODEL BASED ON DIFFERENT DIST...
STATISTICAL ANALYSIS OF FUZZY LINEAR REGRESSION MODEL BASED ON DIFFERENT DIST...STATISTICAL ANALYSIS OF FUZZY LINEAR REGRESSION MODEL BASED ON DIFFERENT DIST...
STATISTICAL ANALYSIS OF FUZZY LINEAR REGRESSION MODEL BASED ON DIFFERENT DIST...Wireilla
 
Probility distribution
Probility distributionProbility distribution
Probility distributionVinya P
 
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENTA NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENTijcisjournal
 
Amirim Project - Threshold Functions in Random Simplicial Complexes - Avichai...
Amirim Project - Threshold Functions in Random Simplicial Complexes - Avichai...Amirim Project - Threshold Functions in Random Simplicial Complexes - Avichai...
Amirim Project - Threshold Functions in Random Simplicial Complexes - Avichai...Avichai Cohen
 
STATISTICAL ANALYSIS OF FUZZY LINEAR REGRESSION MODEL BASED ON DIFFERENT DIST...
STATISTICAL ANALYSIS OF FUZZY LINEAR REGRESSION MODEL BASED ON DIFFERENT DIST...STATISTICAL ANALYSIS OF FUZZY LINEAR REGRESSION MODEL BASED ON DIFFERENT DIST...
STATISTICAL ANALYSIS OF FUZZY LINEAR REGRESSION MODEL BASED ON DIFFERENT DIST...ijfls
 
On The Transition Probabilities for the Fuzzy States of a Fuzzy Markov Chain
On The Transition Probabilities for the Fuzzy States of a Fuzzy Markov ChainOn The Transition Probabilities for the Fuzzy States of a Fuzzy Markov Chain
On The Transition Probabilities for the Fuzzy States of a Fuzzy Markov ChainIJERA Editor
 
20070823
2007082320070823
20070823neostar
 
Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryIJERA Editor
 
Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryIJERA Editor
 
On the Cryptographic Measures and Chaotic Dynamical Complexity Measures
On the Cryptographic Measures and Chaotic Dynamical Complexity MeasuresOn the Cryptographic Measures and Chaotic Dynamical Complexity Measures
On the Cryptographic Measures and Chaotic Dynamical Complexity Measuresijcisjournal
 

Similar to Study on Impact of Media on Education Using Fuzzy Relational Maps (20)

Application of stochastic lognormal diffusion model with
Application of stochastic lognormal diffusion model withApplication of stochastic lognormal diffusion model with
Application of stochastic lognormal diffusion model with
 
Polyadic integer numbers and finite (m,n) fields
Polyadic integer numbers and finite (m,n) fieldsPolyadic integer numbers and finite (m,n) fields
Polyadic integer numbers and finite (m,n) fields
 
Analysis and algebra on differentiable manifolds
Analysis and algebra on differentiable manifoldsAnalysis and algebra on differentiable manifolds
Analysis and algebra on differentiable manifolds
 
Master Thesis on the Mathematial Analysis of Neural Networks
Master Thesis on the Mathematial Analysis of Neural NetworksMaster Thesis on the Mathematial Analysis of Neural Networks
Master Thesis on the Mathematial Analysis of Neural Networks
 
DIGITAL TOPOLOGY OPERATING IN MEDICAL IMAGING WITH MRI TECHNOLOGY.pptx
DIGITAL TOPOLOGY OPERATING IN MEDICAL IMAGING WITH MRI TECHNOLOGY.pptxDIGITAL TOPOLOGY OPERATING IN MEDICAL IMAGING WITH MRI TECHNOLOGY.pptx
DIGITAL TOPOLOGY OPERATING IN MEDICAL IMAGING WITH MRI TECHNOLOGY.pptx
 
STATISTICAL ANALYSIS OF FUZZY LINEAR REGRESSION MODEL BASED ON DIFFERENT DIST...
STATISTICAL ANALYSIS OF FUZZY LINEAR REGRESSION MODEL BASED ON DIFFERENT DIST...STATISTICAL ANALYSIS OF FUZZY LINEAR REGRESSION MODEL BASED ON DIFFERENT DIST...
STATISTICAL ANALYSIS OF FUZZY LINEAR REGRESSION MODEL BASED ON DIFFERENT DIST...
 
201977 1-1-4-pb
201977 1-1-4-pb201977 1-1-4-pb
201977 1-1-4-pb
 
Probility distribution
Probility distributionProbility distribution
Probility distribution
 
Text book pdf
Text book pdfText book pdf
Text book pdf
 
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENTA NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT
A NEW ATTACK ON RSA WITH A COMPOSED DECRYPTION EXPONENT
 
F-Compact operator1_p1-2
F-Compact operator1_p1-2F-Compact operator1_p1-2
F-Compact operator1_p1-2
 
Amirim Project - Threshold Functions in Random Simplicial Complexes - Avichai...
Amirim Project - Threshold Functions in Random Simplicial Complexes - Avichai...Amirim Project - Threshold Functions in Random Simplicial Complexes - Avichai...
Amirim Project - Threshold Functions in Random Simplicial Complexes - Avichai...
 
STATISTICAL ANALYSIS OF FUZZY LINEAR REGRESSION MODEL BASED ON DIFFERENT DIST...
STATISTICAL ANALYSIS OF FUZZY LINEAR REGRESSION MODEL BASED ON DIFFERENT DIST...STATISTICAL ANALYSIS OF FUZZY LINEAR REGRESSION MODEL BASED ON DIFFERENT DIST...
STATISTICAL ANALYSIS OF FUZZY LINEAR REGRESSION MODEL BASED ON DIFFERENT DIST...
 
On The Transition Probabilities for the Fuzzy States of a Fuzzy Markov Chain
On The Transition Probabilities for the Fuzzy States of a Fuzzy Markov ChainOn The Transition Probabilities for the Fuzzy States of a Fuzzy Markov Chain
On The Transition Probabilities for the Fuzzy States of a Fuzzy Markov Chain
 
Kanal wireless dan propagasi
Kanal wireless dan propagasiKanal wireless dan propagasi
Kanal wireless dan propagasi
 
20070823
2007082320070823
20070823
 
Solve Equations
Solve EquationsSolve Equations
Solve Equations
 
Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding Theory
 
Application of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding TheoryApplication of Fuzzy Algebra in Coding Theory
Application of Fuzzy Algebra in Coding Theory
 
On the Cryptographic Measures and Chaotic Dynamical Complexity Measures
On the Cryptographic Measures and Chaotic Dynamical Complexity MeasuresOn the Cryptographic Measures and Chaotic Dynamical Complexity Measures
On the Cryptographic Measures and Chaotic Dynamical Complexity Measures
 

More from MangaiK4

Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...MangaiK4
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...MangaiK4
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
 
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmRelation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmMangaiK4
 
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicSaturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicMangaiK4
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmMangaiK4
 
A Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationA Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationMangaiK4
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingMangaiK4
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachMangaiK4
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMangaiK4
 
Encroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyEncroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyMangaiK4
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesMangaiK4
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
 
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmModeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmMangaiK4
 
quasi-uniform theta graph
quasi-uniform theta graphquasi-uniform theta graph
quasi-uniform theta graphMangaiK4
 
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...MangaiK4
 
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...MangaiK4
 
Marine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMarine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMangaiK4
 
Implementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAImplementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAMangaiK4
 
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...MangaiK4
 

More from MangaiK4 (20)

Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
 
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmRelation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
 
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicSaturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA Algorithm
 
A Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationA Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for Education
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS Technique
 
Encroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyEncroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data Technology
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing Images
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and Steganography
 
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmModeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
 
quasi-uniform theta graph
quasi-uniform theta graphquasi-uniform theta graph
quasi-uniform theta graph
 
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
 
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
 
Marine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMarine Object Recognition using Blob Analysis
Marine Object Recognition using Blob Analysis
 
Implementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAImplementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGA
 
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
 

Recently uploaded

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Recently uploaded (20)

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

Study on Impact of Media on Education Using Fuzzy Relational Maps

  • 1. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 03 Issue: 02 June 2014 Pages: 135-137 ISSN: 2278-2397 135 Study on Impact of Media on Education Using Fuzzy Relational Maps J. Maria Roy Felix, J. Josephine Suganya Department of Mathematics, Loyola College, Chennai Email: jjsuganya9@gmail.com Abstract- In this paper we bring out the depth of impact of media upon the growth of education. Education moulds an individual to take firm decisions on issues. It makes to feel independent and leads to a more exposed world. Media is a very powerful tool to explore the world and have access to the world. Internet, Mobile phones, etc., helps for an easy access to any part of the world at our finger tips. Media may lead us to both constructive and destructive mechanism depending the way we deal with it.Here we use FRM model to study and analyze the impact of media on education. Fuzzy Relational Maps (FRM),Media, Education. I. SECTION ONE: FUZZY RELATIONAL MAPS ( FRMS) The new notion called Fuzzy Relational Maps (FRMs) was introduced by Dr. W.B.Vasantha and Yasmin Sultana in the year 2000. In FRMs we divide the very casual associations into two disjoint units, like for example the relation between a teacher and a student or relation; between an employee and an employer or a relation; between the parent and the child in the case of school dropouts and so on. In these situations we see that we can bring out the casual relations existing between an employee and employer or parent and child and so on. Thus for us to define a FRM we need a domain space and a range space which are disjoint in the sense of concepts. We further assume no intermediate relations exist within the domain and the range space. The number of elements in the range space need not in general be equal to the number of elements in the domain space.In our discussion the elements of the domain space are taken from the real vector space of dimension n and that of the range space are real vectors from the vector space of dimension m (m in general need not be equal to n). We denote by R the set of nodes R1, … , Rm of the range space, where Ri = {(x1, x2, …, xm) / xj = 0 or 1} for i = 1, … ,m. If xi = 1 it means that the node Ri is in the ON state and if xi = 0 it means that the node Ri is in the OFF state. Similarly D denotes the nodes D1,…,Dn of the domain space where Di = {(x1,…, xn) / xj= 0 or 1} for i = 1, …, n. If xi = 1, it means that the node Di is in the on state and if xi = 0 it means that the node Di is in the off state.A FRM is a directed graph or a map from D to R with concepts like policies or events etc. as nodes and causalities as edges. It represents casual relations between spaces D and R. Let Di and Rj denote the two nodes of an FRM. The directed edge from D to R denotes the casuality of D on R , called relations. Every edge in the FRM is weighted with a number in the set {0, 1}.Let ei j be the weight of the edge DiRj,e i j  {0.1}. The weight of the edge DiRj is positive if increase in Di implies increase in Rj or decrease in Di implies decrease in Rj. i.e. casuality of Di on Rj is 1. If e i j = 0 then Di does not have any effect on Rj. We do not discuss the cases when increase in Di implies decrease in Rj or decrease in Di implies increase in Rj.When the nodes of the FRM are fuzzy sets, then they are called fuzzy nodes, FRMs with edge weights {0, 1) are called simple FRMs.Let D1, …,Dn be the nodes of the domain space D of an FRM and R1, …, Rm be the nodes of the range space R of an FRM.Let the matrix E be defined as E = (eij ) where ei j  {0, 1}; is the weight of the directed edge DiRj ( or RjDi ), E is called the relational matrix of the FRM.It is pertinent to mention here that unlike the FCMs, the FRMs can be a rectangular matrix; with rows corresponding to the domain space and columns corresponding to the range space. This is one of the marked difference between FRMs and FCMs. Let D1, …,Dn and R1,…,Rm be the nodes of an FRM. Let DiRj (or RjDi) be the edges of an FRM, j = 1, …, m, i = 1, …, n. The edges form a directed cycle if it possesses a directed cycle. An FRM is said to be acycle if it does not posses any directed cycle.An FRM with cycles is said to have a feed back when there is a feed back in the FRM, i.e. when the casual relations flow through a cycle in a revolutionary manner the FRM is called a dynamical system.Let DiRj( orRjDi), 1  j  m, 1 i n. When Rj( or Di) is switched on and if casuality flows through edges of the cycle and if it again causes Ri(Dj), we say that the dynamical system goes round and round. This is true for any node Ri (or Dj) for 1 im, ( or 1  j  n). The equilibrium state of this dynamical system is called the hidden pattern. If the equilibrium state of the dynamical system is a unique state vector, then it is called a fixed point. Consider an FRM with R1, …, Rm and D1, …, Dn as nodes. For example let us start the dynamical system by switching on R1 or D1. Let us assume that the FRM settles down with R1 and Rm( or D1 and Dn) on i.e. the state vector remains as (10…01) in R [ or (10…01) in D], this state vector is called the fixed point.If the FRM settles down with a state vector repeating in the form A1  A2  …. Ai  A1 or ( B1 B2  …  Bi B1 ) then this equilibrium is called a limit cycle. A. Methods of determination of hidden pattern. Let R1, …, Rm and D1, …, Dn be the nodes of a FRM with feed back. Let E be the n  m relational matrix. Let us find a hidden pattern when D1 is switched on i.e. when an input is given as vector A1= (1000...0) in D the data should pass through the relational matrix E. This is done by multiplying A1 with the relational matrix E. Let A1E = (r1, … ,rm) after thresholding and updating the resultant vector (say B) belongs to R. Now we pass on B into ET and obtain BET . After thresholding and updating BET we see the resultant vector say A2 belongs to D.
  • 2. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 03 Issue: 02 June 2014 Pages: 135-137 ISSN: 2278-2397 136 This procedure is repeated till we get a limit cycle or a fixed point. II. SECTION TWO: DESCRIPTION OF THE PROBLEM Education civilizes a society. Teachers mould the student’s community to be better part takers of our society. Teachers impart knowledge to the students for their own betterment and the society at large. Students of different backgrounds are place under one roof known as class room, A teachers has to be so prudent that he/she reaches the students of different caliber. A small mess up in this regard may ruin the future of the student and the on the whole the society. Hence to study and analyze this problem we have constructed a linguistic questionnaire and using this linguistic questionnaire we have interviewed 50 persons. This linguistic questionnaire was used to obtain the attributes and using these attributes and the opinion of the experts we have used FRM to analyze the problem. III. SECTION THREE: FRM MODEL TO STUDY ABOUT THE IMPACT OF MEDIA ON EDUCATION Now using the linguistic questionnaire and the expert’s opinion following attributes associated by impact of mediaon education is listed. Thus the types of media are taken as the domain space and the types of education as the range space of the FRM. In choosing the attributes there is no hard and fast rule. It is left to the choice of any researcher to include or exclude any of the attributes. Attributes Related to the Domain space M given by M = {M1, …,M5} M1 - Magazines M2 - Films and movies M3 - News papers M4 - Television M5 - Internet Attributes Related to the Range space Y given by Y = {Y1, …,Y7} Y1 - Nursery Y2 - Elementary Y3 - technical Y4 - Special( mentally& physically challenged) Y5 - Collegiate Y6 - Secondary Y7 - Adult. Now using the expert's opinion who is a media person we have the following relation matrix. We have M1.M2, M3,M4,M5 as the rows and Y12,Y2,Y3,Y4,Y5,Y6,Y7 are the columns. 0 0 0 0 0 1 0 0 1 0 0 0 0 0 A 0 0 0 1 0 0 1 1 0 1 0 0 0 0 0 1 0 0 0 1 0 0                  . The hidden pattern of the state vector X = (0 1 0 0 0 ) is obtained by the following method: XA1 ↪(0 1 0 0 0 0 0 ) = Y YA1 T ↪(0 1 0 1 0) = X1 X1A1 ↪(0 1 0 0 1 0 0 ) = Y1 Y1A1 T ↪(0 1 0 1 1) = X2 X2A1 ↪(1 1 0 0 1 0 0) = Y2 Y2A1 T ↪(0 1 0 1 1) = X3 (say) X3A1 ↪( 1 1 0 0 1 0 0) = Y3 (say) (Where ↪ denotes the resultant vector after thresholding and updating) When we take M2 in the ON state ( i.e. films /movies ) and all other attributes to be in the off state. We see the effect of X on the dynamical system A1 is a fixed point given by the binary pair {(0 1 0 1 1 ), (1 1 0 0 1 0 0)}. When we take flims/movies node alone in the on state we get say X = (0 1 0 0 0 ) The resultant to be the fixed point given by the binary pair {(0 1 0 1 1 ), (1 1 0 0 1 0 0)}. When the on state is taken as node M2 we see the hidden pattern is the fixed point which is the same binary pair, which makes the nodes M4and M5to be in the on state in the domain space and makes the nodes Y1, Y2 and Y5 of the range space to be in the on state.Since the working is time consuming, a C program is formulated for finding the hidden pattern. The casual connection matrix A2 is given by the second expert who is a professor.Let M1.M2, M3,M4,M5 taken along the rows and Y1,Y2,Y3,Y4,Y5,Y6,Y7 along the columns. 0 1 0 0 0 1 0 0 0 0 1 0 0 0 A 0 0 1 0 0 0 1 2 0 0 0 0 0 1 0 1 0 0 0 1 0 0                  Suppose the state vector X = (0 0 0 1 0) ie., the node internet is in the on state condition and all other nodes are in the off state. We see the resultant binary pair using the C - program is given by {( 1 0 0 1 0 ), ( 0 1 0 0 0 1 0)} which is the fixed point.When we take the state vector X1 = (0 0 0 1 0 ) ie., the node television i.e., M4 in the on state and all other attributes be in the off state we see the effect of X1 on the dynamical system A2 is a fixed point given by the binary pair {( 1 0 0 1 0 ), ( 0 1 0 0 0 1 0)} .The interpretation of the hidden pattern of several state vectors using several experts is used in this paper to arrive at the conclusion. To show the mode of working we have just given two experts opinion. IV. SECTION FOUR: CONCLUSIONS AND SUGGESTIONS Students should be trained to use the technology to have better understanding.Internet is a very powerful tool which has all the information required, the young minds should to motivate in right sense to make use of it rather than accusing young ones for using internet.Usage of camera mobile phone and its feature has to be meticulously and carefully dealt with.Education and media should go in hand in hand for the betterment of an individual and the society at large.Computers
  • 3. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 03 Issue: 02 June 2014 Pages: 135-137 ISSN: 2278-2397 137 knowledge should be thought to children to bring out their talent and creativity. REFERENCES [1]. GILL S.S, “ living with Sky TV “ in the Hindu Magazine, Sunday , April 5 , 1992. [2]. W.B.VasanthaKandasamy“ Love . Life .Lust . Loss” 101 real life stories of migration and AIDS. [3]. Bart Kosko, Neural Networks and Fuzzy Systems, Prentice Hall of India Private Limited, 1967. [4]. W.B.VasanthaKandasamy and Yasmin Sultana, Knowledge processing using Fuzzy [5]. Relational Maps, Ultra Sci. of Phyl. Sciences, 12, 242-245, (2000).