This document discusses computational investigation of the Jordan canonical form for a class of zero-one matrices. It begins with background on Jordan canonical form and its relationship to directed graphs. The author then describes developing a MATLAB toolbox to calculate the Jordan canonical form for these matrices. The toolbox partitions the associated directed graph into cycles and chains to determine the Jordan form. It is found to be more accurate than MATLAB's built-in Jordan function for larger matrices over order 60.
An Overview Applications Of Graph Theory In Real FieldLori Moore
This document provides an overview of applications of graph theory in various real-world fields. It begins by defining some key graph theory concepts such as vertices, edges, directed and undirected graphs, connected graphs, and adjacency matrices. It then discusses how graph theory originated from the Königsberg bridge problem in 1735. The document outlines how graph theory has gradually expanded and is now used widely in fields like computer science, biochemistry, genomics, electrical engineering, and operations research. It identifies some common applications of graph theory such as resource allocation, network formation, data mining, and image processing. In conclusion, the document aims to provide basic graph theory concepts and demonstrate how they are applied across different domains.
An analysis between exact and approximate algorithms for the k-center proble...IJECEIAES
This research focuses on the k-center problem and its applications. Different methods for solving this problem are analyzed. The implementations of an exact algorithm and of an approximate algorithm are presented. The source code and the computation complexity of these algorithms are presented and analyzed. The multitasking mode of the operating system is taken into account considering the execution time of the algorithms. The results show that the approximate algorithm finds solutions that are not worse than two times optimal. In some case these solutions are very close to the optimal solutions, but this is true only for graphs with a smaller number of nodes. As the number of nodes in the graph increases (respectively the number of edges increases), the approximate solutions deviate from the optimal ones, but remain acceptable. These results give reason to conclude that for graphs with a small number of nodes the approximate algorithm finds comparable solutions with those founds by the exact algorithm.
The document defines a graph and discusses its history, types, representations, and applications. It begins with Leonhard Euler's solving of the Königsberg bridge problem in 1735, which is considered the first theorem of graph theory. A graph is defined as a pair of sets (V,E) where V is the set of vertices and E is the set of edges. Graphs can have parallel edges, loops, directed or undirected edges. They can be represented through adjacency matrices or lists. Applications of graph theory include computer science, physics/chemistry, and computer networks.
Benefits Of Innovative 3d Graph Techniques In Construction IndustryA Makwana
1) 3D graph techniques can provide benefits in the construction industry by allowing visualization of complex construction projects and pre-built assemblies to improve efficiency.
2) The document analyzes the use of 3D graph software like MATLAB to generate 3D graphs from datasets and visualize relationships between parameters for improved decision making.
3) 3D graphs are found to provide clearer and more polished presentations of data compared to 2D graphs, allowing easier interpretation and comparison of construction industry parameters.
This document discusses how AI can help advance various scientific fields such as mathematics, quantum chemistry, biology, and more. It provides examples of how machine learning has helped mathematicians develop new theories by analyzing patterns in examples. It also discusses how AI is helping push the limits of density functional theory in quantum chemistry and how AlphaFold uses transformers and protein multiple sequence alignments to predict structures with near experimental accuracy. The conclusion emphasizes not becoming a slave to models and maintaining inspiration.
The document discusses the planted clique problem in graph theory. It introduces the problem and describes how previous research has found polynomial-time algorithms to solve the problem when the size of the planted clique k is O(√n). The document then summarizes two algorithms - Kucera's algorithm and the Low Degree Removal (LDR) algorithm - that have been used to approach the problem. It describes implementing the algorithms in a C++ program to simulate random graphs with planted cliques and test the ability of the algorithms to recover the planted clique.
This document presents a mathematical analysis of seven models of asymmetrical spectral lines. The models are decomposed into symmetrical and asymmetrical parts and their parameters like maximum position, width, and dependence on asymmetry are analyzed. Two new measures of line asymmetry are proposed based on the ratio of first derivative extremes and ratio of second derivative satellite amplitudes. Normalizing the models allows comparison of their dependence on asymmetry. The integral angular function of the asymmetrical part and its difference between line wings is found to be a sensitive indicator of asymmetry. The analyses can aid in modeling asymmetrical lines and selecting appropriate models.
This document discusses several applications of graph theory in different domains. It provides examples of how graph theory can be used to model problems in computer science, chemistry, biology and other fields. Specifically, it discusses how graph theory is applied to find shortest paths in networks, model computer and cellular networks, represent molecular and crystal structures in chemistry, and model gene regulatory, metabolic and protein-protein interaction networks in biology. Many practical problems across diverse domains can be represented and solved using the mathematical abstractions of graph theory.
An Overview Applications Of Graph Theory In Real FieldLori Moore
This document provides an overview of applications of graph theory in various real-world fields. It begins by defining some key graph theory concepts such as vertices, edges, directed and undirected graphs, connected graphs, and adjacency matrices. It then discusses how graph theory originated from the Königsberg bridge problem in 1735. The document outlines how graph theory has gradually expanded and is now used widely in fields like computer science, biochemistry, genomics, electrical engineering, and operations research. It identifies some common applications of graph theory such as resource allocation, network formation, data mining, and image processing. In conclusion, the document aims to provide basic graph theory concepts and demonstrate how they are applied across different domains.
An analysis between exact and approximate algorithms for the k-center proble...IJECEIAES
This research focuses on the k-center problem and its applications. Different methods for solving this problem are analyzed. The implementations of an exact algorithm and of an approximate algorithm are presented. The source code and the computation complexity of these algorithms are presented and analyzed. The multitasking mode of the operating system is taken into account considering the execution time of the algorithms. The results show that the approximate algorithm finds solutions that are not worse than two times optimal. In some case these solutions are very close to the optimal solutions, but this is true only for graphs with a smaller number of nodes. As the number of nodes in the graph increases (respectively the number of edges increases), the approximate solutions deviate from the optimal ones, but remain acceptable. These results give reason to conclude that for graphs with a small number of nodes the approximate algorithm finds comparable solutions with those founds by the exact algorithm.
The document defines a graph and discusses its history, types, representations, and applications. It begins with Leonhard Euler's solving of the Königsberg bridge problem in 1735, which is considered the first theorem of graph theory. A graph is defined as a pair of sets (V,E) where V is the set of vertices and E is the set of edges. Graphs can have parallel edges, loops, directed or undirected edges. They can be represented through adjacency matrices or lists. Applications of graph theory include computer science, physics/chemistry, and computer networks.
Benefits Of Innovative 3d Graph Techniques In Construction IndustryA Makwana
1) 3D graph techniques can provide benefits in the construction industry by allowing visualization of complex construction projects and pre-built assemblies to improve efficiency.
2) The document analyzes the use of 3D graph software like MATLAB to generate 3D graphs from datasets and visualize relationships between parameters for improved decision making.
3) 3D graphs are found to provide clearer and more polished presentations of data compared to 2D graphs, allowing easier interpretation and comparison of construction industry parameters.
This document discusses how AI can help advance various scientific fields such as mathematics, quantum chemistry, biology, and more. It provides examples of how machine learning has helped mathematicians develop new theories by analyzing patterns in examples. It also discusses how AI is helping push the limits of density functional theory in quantum chemistry and how AlphaFold uses transformers and protein multiple sequence alignments to predict structures with near experimental accuracy. The conclusion emphasizes not becoming a slave to models and maintaining inspiration.
The document discusses the planted clique problem in graph theory. It introduces the problem and describes how previous research has found polynomial-time algorithms to solve the problem when the size of the planted clique k is O(√n). The document then summarizes two algorithms - Kucera's algorithm and the Low Degree Removal (LDR) algorithm - that have been used to approach the problem. It describes implementing the algorithms in a C++ program to simulate random graphs with planted cliques and test the ability of the algorithms to recover the planted clique.
This document presents a mathematical analysis of seven models of asymmetrical spectral lines. The models are decomposed into symmetrical and asymmetrical parts and their parameters like maximum position, width, and dependence on asymmetry are analyzed. Two new measures of line asymmetry are proposed based on the ratio of first derivative extremes and ratio of second derivative satellite amplitudes. Normalizing the models allows comparison of their dependence on asymmetry. The integral angular function of the asymmetrical part and its difference between line wings is found to be a sensitive indicator of asymmetry. The analyses can aid in modeling asymmetrical lines and selecting appropriate models.
This document discusses several applications of graph theory in different domains. It provides examples of how graph theory can be used to model problems in computer science, chemistry, biology and other fields. Specifically, it discusses how graph theory is applied to find shortest paths in networks, model computer and cellular networks, represent molecular and crystal structures in chemistry, and model gene regulatory, metabolic and protein-protein interaction networks in biology. Many practical problems across diverse domains can be represented and solved using the mathematical abstractions of graph theory.
Characteristics of Fuzzy Wheel Graph and Hamilton Graph with Fuzzy Ruleijtsrd
Graph theory is the concepts used to study and model various application in different areas. We proposed the wheel graph with n vertices can be defined as 1 skeleton of on n 1 gonal pyramid it is denoted by w nwith n 1 vertex n=3 . A wheel graph is hamiltonion, self dual and planar. In the mathematical field of graph theory, and a Hamilton path or traceable graph is a path in an undirected or directed graph that visits each vertex exactly once. A Hamiltonian cycle is a hamiltonian path that is a cycle. In this paper, we consider the wheel graph and also the hamilton graph using if then rules fuzzy numbers. The results are related to the find the degree of odd vertices and even vertices are same by applying if then rules through the paths described by fuzzy numbers. Nisha. D | Srividhya. B "Characteristics of Fuzzy Wheel Graph and Hamilton Graph with Fuzzy Rule" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29319.pdf Paper URL: https://www.ijtsrd.com/mathemetics/other/29319/characteristics-of-fuzzy-wheel-graph-and-hamilton-graph-with-fuzzy-rule/nisha-d
Node Path Visualizer Using Shortest Path AlgorithmsIRJET Journal
This document describes a tool for visualizing shortest path algorithms. The tool allows users to create and save graph structures and visualize the step-by-step execution of algorithms like Dijkstra's algorithm. It is intended to supplement classroom instruction or be used as a complete e-learning application. The tool implements grid-based graphs and allows selection of different pathfinding algorithms to find the shortest path between two nodes. Algorithms can be unweighted or weighted based on node values. The tool aims to help students better understand shortest path algorithms through interactive visualization.
Correlation between averages times of random walks on an irregularly shaped o...Alexander Decker
This document discusses a study that investigated the correlation between the average times of random walks on irregularly shaped objects (like country maps) and the fractal dimensions of those objects. 20 country maps were analyzed by developing a program to estimate their random walk parameters and fractal dimensions. The program divided each map image into grids and calculated the boundary boxes and distance covered by random walkers on each grid. The slopes of the log-log graphs of these values against grid size represented the fractal dimension and random walk parameter respectively. The estimated fractal dimensions ranged from 1.116 to 1.212, while the random walk parameters ranged from 1.976 to 2.995. However, the correlation between the fractal dimensions and random
Applied parallel coordinates for logs and network traffic attack analysisUltraUploader
This document summarizes a research paper that explores using parallel coordinate plots (PCC) to visualize large datasets for cybersecurity analysis. PCC allows high-dimensional event data to be visualized in 2D. The paper introduces the mathematical foundations of PCC and describes an open-source software called Picviz that generates PCC images from log and network traffic data. Examples are provided of how PCC revealed security issues in Cray system logs and detected botnet attacks. In particular, PCC can identify patterns indicating events like distributed denial-of-service attacks.
Computer Science
Active and Programmable Networks
Active safety systems
Ad Hoc & Sensor Network
Ad hoc networks for pervasive communications
Adaptive, autonomic and context-aware computing
Advance Computing technology and their application
Advanced Computing Architectures and New Programming Models
Advanced control and measurement
Aeronautical Engineering,
Agent-based middleware
Alert applications
Automotive, marine and aero-space control and all other control applications
Autonomic and self-managing middleware
Autonomous vehicle
Biochemistry
Bioinformatics
BioTechnology(Chemistry, Mathematics, Statistics, Geology)
Broadband and intelligent networks
Broadband wireless technologies
CAD/CAM/CAT/CIM
Call admission and flow/congestion control
Capacity planning and dimensioning
Changing Access to Patient Information
Channel capacity modelling and analysis
Civil Engineering,
Cloud Computing and Applications
Collaborative applications
Communication application
Communication architectures for pervasive computing
Communication systems
Computational intelligence
Computer and microprocessor-based control
Computer Architecture and Embedded Systems
Computer Business
Computer Sciences and Applications
Computer Vision
Computer-based information systems in health care
Computing Ethics
Computing Practices & Applications
Congestion and/or Flow Control
Content Distribution
Context-awareness and middleware
Creativity in Internet management and retailing
Cross-layer design and Physical layer based issue
Cryptography
Data Base Management
Data fusion
Data Mining
Data retrieval
Data Storage Management
Decision analysis methods
Decision making
Digital Economy and Digital Divide
Digital signal processing theory
Distributed Sensor Networks
Drives automation
Drug Design,
Drug Development
DSP implementation
E-Business
E-Commerce
E-Government
Electronic transceiver device for Retail Marketing Industries
Electronics Engineering,
Embeded Computer System
Emerging advances in business and its applications
Emerging signal processing areas
Enabling technologies for pervasive systems
Energy-efficient and green pervasive computing
Environmental Engineering,
Estimation and identification techniques
Evaluation techniques for middleware solutions
Event-based, publish/subscribe, and message-oriented middleware
Evolutionary computing and intelligent systems
Expert approaches
Facilities planning and management
Flexible manufacturing systems
Formal methods and tools for designing
Fuzzy algorithms
Fuzzy logics
GPS and location-based app
Introduction to graph theory (All chapter)sobia1122
1) Graph theory can be used to model and solve problems in many fields like physics, chemistry, computer science, and more. Certain problems can be formulated as problems in graph theory.
2) Graph theory has developed from puzzles and practical problems, like the Königsberg bridge problem inspiring Eulerian graph theory and the "Around the World" game inspiring Hamiltonian graph theory.
3) Connectivity in graphs measures how connected a graph is, and how the removal of vertices or edges affects connectivity. Connectivity is important for applications like communication networks.
3D Graph Drawings: Good Viewing for Occluded VerticesIJERA Editor
This document presents a method for drawing 3D graphs using a force-directed algorithm to minimize vertex-vertex occlusions. The Fruchterman and Reingold algorithm is used as a framework, representing vertices as electrically charged particles and edges as springs. Repulsive forces push vertices apart while attractive forces pull connected vertices together. The algorithm iteratively computes vertex displacements until equilibrium is reached. Experiments in Gephi software show the algorithm effectively separates vertices to produce good 3D graph views without occlusions, even for large graphs with hundreds of vertices.
Design and Implementation of Mobile Map Application for Finding Shortest Dire...Eswar Publications
The shortest path problem is an approach towards finding the shortest and quickest path or route from a starting point to a final destination, four major algorithms are peculiar to solving the shortest path problem. The algorithms include Dijkstra’s Algorithm, Floyd-Warshall Algorithm, Bellman-Ford Algorithm and Alternative Path Algorithm. This research work is focused on the design of mobile map application for finding the shortest
route from one location to another within Yaba College of Technology and its environ. The design was focused on
Dijkstra’s algorithm that source node as a first permanent node, and assign it 0 cost and check all neighbor nodes
from the previous permanent node and calculate the cumulative cost of each neighbor nodes and make them
temporary, then chooses the node with the smallest cumulative cost, and make it as a permanent node. The different nodes that lead to a particular destination were identified, the distance and time from a source to a destination is calculated using the Google map. The application then recommends the shortest and quickest route to the destination.
This document discusses strategies for parallelizing spectral methods. Spectral methods are global in nature due to their use of global basis functions, making them challenging to parallelize on fine-grained architectures. However, the document finds that spectral methods can be effectively parallelized. The main computational steps in spectral methods are the calculation of differential operators on functions and solving linear systems, both of which can exploit parallelism. Domain decomposition techniques may also help parallelize computations over non-Cartesian domains.
In this paper, the underlying principles about the theory of relativity are briefly introduced and reviewed. The mathematical prerequisite needed for the understanding of general relativity and of Einstein field equations are discussed. Concepts such as the principle of least action will be included and its explanation using the Lagrange equations will be given. Where possible, the mathematical details and rigorous analysis of the subject has been given in order to ensure a more precise and thorough understanding of the theory of relativity. A brief mathematical analysis of how to derive the Einstein’s field’s equations from the Einstein-Hilbert action and the Schwarzschild solution was also given.
This document summarizes a student paper about using the shortest path algorithm to interpolate contours in images. It discusses how the human visual system perceives 3D representations from 2D images and how extracting meaningful contours is challenging due to noise and discontinuities. The paper proposes using a modified Dijkstra's algorithm to find the shortest path in log-polar space, which maps circles in images to straight lines. This approach aims to identify simple, closed curves representing object contours while ignoring irrelevant edges.
FREQUENT SUBGRAPH MINING ALGORITHMS - A SURVEY AND FRAMEWORK FOR CLASSIFICATIONcscpconf
Data mining algorithms are facing the challenge to deal with an increasing number of complex
objects. Graph is a natural data structure used for modeling complex objects. Frequent subgraph
mining is another active research topic in data mining . A graph is a general model to represent
data and has been used in many domains like cheminformatics and bioinformatics. Mining
patterns from graph databases is challenging since graph related operations, such as subgraph
testing, generally have higher time complexity than the corresponding operations on itemsets,
sequences, and trees. Many frequent subgraph Mining algorithms have been proposed. SPIN,
SUBDUE, g_Span, FFSM, GREW are a few to mention. In this paper we present a detailed
survey on frequent subgraph mining algorithms, which are used for knowledge discovery in
complex objects and also propose a frame work for classification of these algorithms. The
purpose is to help user to apply the techniques in a task specific manner in various application domains and to pave wave for further research.
Shape analysis using conformal mapping is a technique that analyzes geometric shapes by mapping their connections and distributions into computer programs. It is useful in fields like archaeology, architecture, medical imaging, and computer design. Conformal mapping preserves angles between shapes and can map 2D and 3D shapes onto each other. For brain mapping specifically, spherical harmonics equations are used to compress brain surface data and compare different brain scans. Conformal mapping proves useful for medical applications due to its ability to uniformly map points on brain surfaces without distortion.
This document discusses various methods for interpolating geofield parameters to model the surface of geofields. It analyzes methods like algebraic polynomials, filters, splines, kriging and neural networks. It then focuses on using neural networks to identify parameters for a mathematical model of a geofield by training the network parameters using experimental statistical data. As a result, it finds parameters for a regression equation that satisfy the training data. The application of neural networks is shown to have advantages over traditional statistical methods for modeling geofields, especially when data is limited in the early stages.
This document discusses graphs and their representation in code. It defines graphs as consisting of vertices and edges, with edges specified as pairs of vertices. It distinguishes between directed and undirected graphs. Key graph terms like paths, cycles, and connectivity are defined. Real-world systems that can be modeled as graphs are given as an example. The document then discusses representing vertices and edges in code, choosing an adjacency matrix to represent the edges in the graph.
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYFransiskeran
Since the ancient determination of the five platonic solids the study of symmetry and regularity has always
been one of the most fascinating aspects of mathematics. One intriguing phenomenon of studies in graph
theory is the fact that quite often arithmetic regularity properties of a graph imply the existence of many
symmetries, i.e. large automorphism group G. In some important special situation higher degree of
regularity means that G is an automorphism group of finite geometry. For example, a glance through the
list of distance regular graphs of diameter d < 3 reveals the fact that most of them are connected with
classical Lie geometry. Theory of distance regular graphs is an important part of algebraic combinatorics
and its applications such as coding theory, communication networks, and block design. An important tool
for investigation of such graphs is their spectra, which is the set of eigenvalues of adjacency matrix of a
graph. Let G be a finite simple group of Lie type and X be the set homogeneous elements of the associated
geometry.
Social networks are not new, even though websites like Facebook and Twitter might make you want to believe they are; and trust me- I’m not talking about Myspace! Social networks are extremely interesting models for human behavior, whose study dates back to the early twentieth century. However, because of those websites, data scientists have access to much more data than the anthropologists who studied the networks of tribes!
Because networks take a relationship-centered view of the world, the data structures that we will analyze model real world behaviors and community. Through a suite of algorithms derived from mathematical Graph theory we are able to compute and predict behavior of individuals and communities through these types of analyses. Clearly this has a number of practical applications from recommendation to law enforcement to election prediction, and more.
This document proposes using spectral clustering based on the normalized graph Laplacian spectrum to solve problems in community detection and handwritten digit recognition. It summarizes the key concepts in graph signal processing and introduces spectral clustering. The paper provides a mathematical proof that the signs of the second eigenvector components of the normalized graph Laplacian can accurately partition a graph into two communities. It then applies this spectral clustering method to community detection and digit recognition, comparing results to other popular algorithms to demonstrate the advantages of the spectral clustering approach.
On algorithmic problems concerning graphs of higher degree of symmetrygraphhoc
Since the ancient determination of the five platonic solids the study of symmetry and regularity has always
been one of the most fascinating aspects of mathematics. One intriguing phenomenon of studies in graph
theory is the fact that quite often arithmetic regularity properties of a graph imply the existence of many
symmetries, i.e. large automorphism group G. In some important special situation higher degree of
regularity means that G is an automorphism group of finite geometry. For example, a glance through the
list of distance regular graphs of diameter d < 3 reveals the fact that most of them are connected with
classical Lie geometry. Theory of distance regular graphs is an important part of algebraic combinatorics
and its applications such as coding theory, communication networks, and block design. An important tool
for investigation of such graphs is their spectra, which is the set of eigenvalues of adjacency matrix of a
graph. Let G be a finite simple group of Lie type and X be the set homogeneous elements of the associated
geometry. The complexity of computing the adjacency matrices of a graph Gr on the vertices X such that
Aut GR = G depends very much on the description of the geometry with which one starts. For example, we
can represent the geometry as the totality of 1 cosets of parabolic subgroups 2 chains of embedded
subspaces (case of linear groups), or totally isotropic subspaces (case of the remaining classical groups), 3
special subspaces of minimal module for G which are defined in terms of a G invariant multilinear form.
The aim of this research is to develop an effective method for generation of graphs connected with classical
geometry and evaluation of its spectra, which is the set of eigenvalues of adjacency matrix of a graph. The
main approach is to avoid manual drawing and to calculate graph layout automatically according to its
formal structure. This is a simple task in a case of a tree like graph with a strict hierarchy of entities but it
becomes more complicated for graphs of geometrical nature. There are two main reasons for the
investigations of spectra: (1) very often spectra carry much more useful information about the graph than a
corresponding list of entities and relationships (2) graphs with special spectra, satisfying so called
Ramanujan property or simply Ramanujan graphs (by name of Indian genius mathematician) are important
for real life applications (see [13]). There is a motivated suspicion that among geometrical graphs one
could find some new Ramanujan graphs.
The document provides an introduction to graph theory. It lists prescribed and recommended books, outlines topics that will be covered including history, definitions, types of graphs, terminology, representation, subgraphs, connectivity, and applications. It notes that the Government of India designated June 10th as Graph Theory Day in recognition of the influence and importance of graph theory.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
More Related Content
Similar to A MATLAB Computational Investigation of the Jordan Canonical Form of a Class of Zero-One Matrices
Characteristics of Fuzzy Wheel Graph and Hamilton Graph with Fuzzy Ruleijtsrd
Graph theory is the concepts used to study and model various application in different areas. We proposed the wheel graph with n vertices can be defined as 1 skeleton of on n 1 gonal pyramid it is denoted by w nwith n 1 vertex n=3 . A wheel graph is hamiltonion, self dual and planar. In the mathematical field of graph theory, and a Hamilton path or traceable graph is a path in an undirected or directed graph that visits each vertex exactly once. A Hamiltonian cycle is a hamiltonian path that is a cycle. In this paper, we consider the wheel graph and also the hamilton graph using if then rules fuzzy numbers. The results are related to the find the degree of odd vertices and even vertices are same by applying if then rules through the paths described by fuzzy numbers. Nisha. D | Srividhya. B "Characteristics of Fuzzy Wheel Graph and Hamilton Graph with Fuzzy Rule" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29319.pdf Paper URL: https://www.ijtsrd.com/mathemetics/other/29319/characteristics-of-fuzzy-wheel-graph-and-hamilton-graph-with-fuzzy-rule/nisha-d
Node Path Visualizer Using Shortest Path AlgorithmsIRJET Journal
This document describes a tool for visualizing shortest path algorithms. The tool allows users to create and save graph structures and visualize the step-by-step execution of algorithms like Dijkstra's algorithm. It is intended to supplement classroom instruction or be used as a complete e-learning application. The tool implements grid-based graphs and allows selection of different pathfinding algorithms to find the shortest path between two nodes. Algorithms can be unweighted or weighted based on node values. The tool aims to help students better understand shortest path algorithms through interactive visualization.
Correlation between averages times of random walks on an irregularly shaped o...Alexander Decker
This document discusses a study that investigated the correlation between the average times of random walks on irregularly shaped objects (like country maps) and the fractal dimensions of those objects. 20 country maps were analyzed by developing a program to estimate their random walk parameters and fractal dimensions. The program divided each map image into grids and calculated the boundary boxes and distance covered by random walkers on each grid. The slopes of the log-log graphs of these values against grid size represented the fractal dimension and random walk parameter respectively. The estimated fractal dimensions ranged from 1.116 to 1.212, while the random walk parameters ranged from 1.976 to 2.995. However, the correlation between the fractal dimensions and random
Applied parallel coordinates for logs and network traffic attack analysisUltraUploader
This document summarizes a research paper that explores using parallel coordinate plots (PCC) to visualize large datasets for cybersecurity analysis. PCC allows high-dimensional event data to be visualized in 2D. The paper introduces the mathematical foundations of PCC and describes an open-source software called Picviz that generates PCC images from log and network traffic data. Examples are provided of how PCC revealed security issues in Cray system logs and detected botnet attacks. In particular, PCC can identify patterns indicating events like distributed denial-of-service attacks.
Computer Science
Active and Programmable Networks
Active safety systems
Ad Hoc & Sensor Network
Ad hoc networks for pervasive communications
Adaptive, autonomic and context-aware computing
Advance Computing technology and their application
Advanced Computing Architectures and New Programming Models
Advanced control and measurement
Aeronautical Engineering,
Agent-based middleware
Alert applications
Automotive, marine and aero-space control and all other control applications
Autonomic and self-managing middleware
Autonomous vehicle
Biochemistry
Bioinformatics
BioTechnology(Chemistry, Mathematics, Statistics, Geology)
Broadband and intelligent networks
Broadband wireless technologies
CAD/CAM/CAT/CIM
Call admission and flow/congestion control
Capacity planning and dimensioning
Changing Access to Patient Information
Channel capacity modelling and analysis
Civil Engineering,
Cloud Computing and Applications
Collaborative applications
Communication application
Communication architectures for pervasive computing
Communication systems
Computational intelligence
Computer and microprocessor-based control
Computer Architecture and Embedded Systems
Computer Business
Computer Sciences and Applications
Computer Vision
Computer-based information systems in health care
Computing Ethics
Computing Practices & Applications
Congestion and/or Flow Control
Content Distribution
Context-awareness and middleware
Creativity in Internet management and retailing
Cross-layer design and Physical layer based issue
Cryptography
Data Base Management
Data fusion
Data Mining
Data retrieval
Data Storage Management
Decision analysis methods
Decision making
Digital Economy and Digital Divide
Digital signal processing theory
Distributed Sensor Networks
Drives automation
Drug Design,
Drug Development
DSP implementation
E-Business
E-Commerce
E-Government
Electronic transceiver device for Retail Marketing Industries
Electronics Engineering,
Embeded Computer System
Emerging advances in business and its applications
Emerging signal processing areas
Enabling technologies for pervasive systems
Energy-efficient and green pervasive computing
Environmental Engineering,
Estimation and identification techniques
Evaluation techniques for middleware solutions
Event-based, publish/subscribe, and message-oriented middleware
Evolutionary computing and intelligent systems
Expert approaches
Facilities planning and management
Flexible manufacturing systems
Formal methods and tools for designing
Fuzzy algorithms
Fuzzy logics
GPS and location-based app
Introduction to graph theory (All chapter)sobia1122
1) Graph theory can be used to model and solve problems in many fields like physics, chemistry, computer science, and more. Certain problems can be formulated as problems in graph theory.
2) Graph theory has developed from puzzles and practical problems, like the Königsberg bridge problem inspiring Eulerian graph theory and the "Around the World" game inspiring Hamiltonian graph theory.
3) Connectivity in graphs measures how connected a graph is, and how the removal of vertices or edges affects connectivity. Connectivity is important for applications like communication networks.
3D Graph Drawings: Good Viewing for Occluded VerticesIJERA Editor
This document presents a method for drawing 3D graphs using a force-directed algorithm to minimize vertex-vertex occlusions. The Fruchterman and Reingold algorithm is used as a framework, representing vertices as electrically charged particles and edges as springs. Repulsive forces push vertices apart while attractive forces pull connected vertices together. The algorithm iteratively computes vertex displacements until equilibrium is reached. Experiments in Gephi software show the algorithm effectively separates vertices to produce good 3D graph views without occlusions, even for large graphs with hundreds of vertices.
Design and Implementation of Mobile Map Application for Finding Shortest Dire...Eswar Publications
The shortest path problem is an approach towards finding the shortest and quickest path or route from a starting point to a final destination, four major algorithms are peculiar to solving the shortest path problem. The algorithms include Dijkstra’s Algorithm, Floyd-Warshall Algorithm, Bellman-Ford Algorithm and Alternative Path Algorithm. This research work is focused on the design of mobile map application for finding the shortest
route from one location to another within Yaba College of Technology and its environ. The design was focused on
Dijkstra’s algorithm that source node as a first permanent node, and assign it 0 cost and check all neighbor nodes
from the previous permanent node and calculate the cumulative cost of each neighbor nodes and make them
temporary, then chooses the node with the smallest cumulative cost, and make it as a permanent node. The different nodes that lead to a particular destination were identified, the distance and time from a source to a destination is calculated using the Google map. The application then recommends the shortest and quickest route to the destination.
This document discusses strategies for parallelizing spectral methods. Spectral methods are global in nature due to their use of global basis functions, making them challenging to parallelize on fine-grained architectures. However, the document finds that spectral methods can be effectively parallelized. The main computational steps in spectral methods are the calculation of differential operators on functions and solving linear systems, both of which can exploit parallelism. Domain decomposition techniques may also help parallelize computations over non-Cartesian domains.
In this paper, the underlying principles about the theory of relativity are briefly introduced and reviewed. The mathematical prerequisite needed for the understanding of general relativity and of Einstein field equations are discussed. Concepts such as the principle of least action will be included and its explanation using the Lagrange equations will be given. Where possible, the mathematical details and rigorous analysis of the subject has been given in order to ensure a more precise and thorough understanding of the theory of relativity. A brief mathematical analysis of how to derive the Einstein’s field’s equations from the Einstein-Hilbert action and the Schwarzschild solution was also given.
This document summarizes a student paper about using the shortest path algorithm to interpolate contours in images. It discusses how the human visual system perceives 3D representations from 2D images and how extracting meaningful contours is challenging due to noise and discontinuities. The paper proposes using a modified Dijkstra's algorithm to find the shortest path in log-polar space, which maps circles in images to straight lines. This approach aims to identify simple, closed curves representing object contours while ignoring irrelevant edges.
FREQUENT SUBGRAPH MINING ALGORITHMS - A SURVEY AND FRAMEWORK FOR CLASSIFICATIONcscpconf
Data mining algorithms are facing the challenge to deal with an increasing number of complex
objects. Graph is a natural data structure used for modeling complex objects. Frequent subgraph
mining is another active research topic in data mining . A graph is a general model to represent
data and has been used in many domains like cheminformatics and bioinformatics. Mining
patterns from graph databases is challenging since graph related operations, such as subgraph
testing, generally have higher time complexity than the corresponding operations on itemsets,
sequences, and trees. Many frequent subgraph Mining algorithms have been proposed. SPIN,
SUBDUE, g_Span, FFSM, GREW are a few to mention. In this paper we present a detailed
survey on frequent subgraph mining algorithms, which are used for knowledge discovery in
complex objects and also propose a frame work for classification of these algorithms. The
purpose is to help user to apply the techniques in a task specific manner in various application domains and to pave wave for further research.
Shape analysis using conformal mapping is a technique that analyzes geometric shapes by mapping their connections and distributions into computer programs. It is useful in fields like archaeology, architecture, medical imaging, and computer design. Conformal mapping preserves angles between shapes and can map 2D and 3D shapes onto each other. For brain mapping specifically, spherical harmonics equations are used to compress brain surface data and compare different brain scans. Conformal mapping proves useful for medical applications due to its ability to uniformly map points on brain surfaces without distortion.
This document discusses various methods for interpolating geofield parameters to model the surface of geofields. It analyzes methods like algebraic polynomials, filters, splines, kriging and neural networks. It then focuses on using neural networks to identify parameters for a mathematical model of a geofield by training the network parameters using experimental statistical data. As a result, it finds parameters for a regression equation that satisfy the training data. The application of neural networks is shown to have advantages over traditional statistical methods for modeling geofields, especially when data is limited in the early stages.
This document discusses graphs and their representation in code. It defines graphs as consisting of vertices and edges, with edges specified as pairs of vertices. It distinguishes between directed and undirected graphs. Key graph terms like paths, cycles, and connectivity are defined. Real-world systems that can be modeled as graphs are given as an example. The document then discusses representing vertices and edges in code, choosing an adjacency matrix to represent the edges in the graph.
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYFransiskeran
Since the ancient determination of the five platonic solids the study of symmetry and regularity has always
been one of the most fascinating aspects of mathematics. One intriguing phenomenon of studies in graph
theory is the fact that quite often arithmetic regularity properties of a graph imply the existence of many
symmetries, i.e. large automorphism group G. In some important special situation higher degree of
regularity means that G is an automorphism group of finite geometry. For example, a glance through the
list of distance regular graphs of diameter d < 3 reveals the fact that most of them are connected with
classical Lie geometry. Theory of distance regular graphs is an important part of algebraic combinatorics
and its applications such as coding theory, communication networks, and block design. An important tool
for investigation of such graphs is their spectra, which is the set of eigenvalues of adjacency matrix of a
graph. Let G be a finite simple group of Lie type and X be the set homogeneous elements of the associated
geometry.
Social networks are not new, even though websites like Facebook and Twitter might make you want to believe they are; and trust me- I’m not talking about Myspace! Social networks are extremely interesting models for human behavior, whose study dates back to the early twentieth century. However, because of those websites, data scientists have access to much more data than the anthropologists who studied the networks of tribes!
Because networks take a relationship-centered view of the world, the data structures that we will analyze model real world behaviors and community. Through a suite of algorithms derived from mathematical Graph theory we are able to compute and predict behavior of individuals and communities through these types of analyses. Clearly this has a number of practical applications from recommendation to law enforcement to election prediction, and more.
This document proposes using spectral clustering based on the normalized graph Laplacian spectrum to solve problems in community detection and handwritten digit recognition. It summarizes the key concepts in graph signal processing and introduces spectral clustering. The paper provides a mathematical proof that the signs of the second eigenvector components of the normalized graph Laplacian can accurately partition a graph into two communities. It then applies this spectral clustering method to community detection and digit recognition, comparing results to other popular algorithms to demonstrate the advantages of the spectral clustering approach.
On algorithmic problems concerning graphs of higher degree of symmetrygraphhoc
Since the ancient determination of the five platonic solids the study of symmetry and regularity has always
been one of the most fascinating aspects of mathematics. One intriguing phenomenon of studies in graph
theory is the fact that quite often arithmetic regularity properties of a graph imply the existence of many
symmetries, i.e. large automorphism group G. In some important special situation higher degree of
regularity means that G is an automorphism group of finite geometry. For example, a glance through the
list of distance regular graphs of diameter d < 3 reveals the fact that most of them are connected with
classical Lie geometry. Theory of distance regular graphs is an important part of algebraic combinatorics
and its applications such as coding theory, communication networks, and block design. An important tool
for investigation of such graphs is their spectra, which is the set of eigenvalues of adjacency matrix of a
graph. Let G be a finite simple group of Lie type and X be the set homogeneous elements of the associated
geometry. The complexity of computing the adjacency matrices of a graph Gr on the vertices X such that
Aut GR = G depends very much on the description of the geometry with which one starts. For example, we
can represent the geometry as the totality of 1 cosets of parabolic subgroups 2 chains of embedded
subspaces (case of linear groups), or totally isotropic subspaces (case of the remaining classical groups), 3
special subspaces of minimal module for G which are defined in terms of a G invariant multilinear form.
The aim of this research is to develop an effective method for generation of graphs connected with classical
geometry and evaluation of its spectra, which is the set of eigenvalues of adjacency matrix of a graph. The
main approach is to avoid manual drawing and to calculate graph layout automatically according to its
formal structure. This is a simple task in a case of a tree like graph with a strict hierarchy of entities but it
becomes more complicated for graphs of geometrical nature. There are two main reasons for the
investigations of spectra: (1) very often spectra carry much more useful information about the graph than a
corresponding list of entities and relationships (2) graphs with special spectra, satisfying so called
Ramanujan property or simply Ramanujan graphs (by name of Indian genius mathematician) are important
for real life applications (see [13]). There is a motivated suspicion that among geometrical graphs one
could find some new Ramanujan graphs.
The document provides an introduction to graph theory. It lists prescribed and recommended books, outlines topics that will be covered including history, definitions, types of graphs, terminology, representation, subgraphs, connectivity, and applications. It notes that the Government of India designated June 10th as Graph Theory Day in recognition of the influence and importance of graph theory.
Similar to A MATLAB Computational Investigation of the Jordan Canonical Form of a Class of Zero-One Matrices (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Gas agency management system project report.pdfKamal Acharya
The project entitled "Gas Agency" is done to make the manual process easier by making it a computerized system for billing and maintaining stock. The Gas Agencies get the order request through phone calls or by personal from their customers and deliver the gas cylinders to their address based on their demand and previous delivery date. This process is made computerized and the customer's name, address and stock details are stored in a database. Based on this the billing for a customer is made simple and easier, since a customer order for gas can be accepted only after completing a certain period from the previous delivery. This can be calculated and billed easily through this. There are two types of delivery like domestic purpose use delivery and commercial purpose use delivery. The bill rate and capacity differs for both. This can be easily maintained and charged accordingly.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.