Some Results on the Group of Lower Unitriangular Matrices L(3,Zp)IJERA Editor
The main objective of this paper is to find the order and its exponent, the general form of all conjugacy classes,
Artin characters table and Artin exponent for the group of lower unitriangular matrices L(3,ℤp), where p is
prime number.
Common Fixed Point Theorems in Uniform SpacesIJLT EMAS
In the process of generalization of metric spaces to
Topological spaces, a few aspects of metric spaces are lost.
Therefore, the requirement of generalization of metric spaces
leads to the theory of uniform spaces. Uniform spaces stand
somewhere in between metric spaces and general topological
spaces. Khan[6] extended fixed point theorems due to Hardy and
Rogers[2], Jungck[4] and Acharya[1] in uniform space by
obtaining some results on common fixed points for a pair of
commuting mappings defined on a sequentially complete
Hausdorff uniform space. Rhoades et. al.[7] generalized the
result of Khan[6] by establishing a general fixed point theorem
for four compatible maps in uniform space .
In this paper, a common fixed point theorem in
uniform spaces is proved which generalizes the result of Khan[6]
and Rhoades et al.[7] by employing the less restrictive condition
of weak compatibility for one pair and the condition of
compatibility for second pair, the result is proved for six selfmappings.
Pseudo Bipolar Fuzzy Cosets of Bipolar Fuzzy and Bipolar Anti-Fuzzy HX Subgroupsmathsjournal
In this paper, we introduce the concept of pseudo bipolar fuzzy cosets, pseudo bipolar fuzzy double cosets of a bipolar fuzzy and bipolar anti-fuzzy subgroups. We also establish these concepts to bipolar fuzzy and bipolar anti-fuzzy HX subgroups of a HX group with suitable examples. Also we discuss some of their relative properties.
“The Comments Were Clear But You Don’t Understand”: Supporting Written Feedba...ijejournal
This paper reports part of a dissertation research for the award of an MA degree at a UK University. The
dissertation research investigated how Nigerian students adapted to novel pedagogic practices in a UK
University. One of such novel pedagogic practices for some of the students was the receiving of feedback
comments on coursework drafts and on summative assessments. Several studies have found that students
may not always understand the feedback comments they receive, thereby undermining its learning and
achievement potential (Chanock, 2000; Weaver, 2006; Smith & Gorard, 2005; Nicol, 2010). Reasons for
this include comments that are too vague, general, ambiguous, abstract or in unfamiliar disciplinary
discourse (Nicol, 2010). In this paper, it is argued that for feedback comments to adequately support
learning and achievement, it should be followed up by dialogue that is proactive and effective, initiated by
any of the concerned parties in an environment of trust.
A UNIVERSITY-INDUSTRY COLLABORATION CASE STUDY:INTEL REAL-TIME MULTI-VIEW FAC...ijejournal
Since 2011, University of Michigan—Shanghai Jiao Tong University Joint Institute (JI) has established 122 corporate-sponsored Capstone Design Projects (CDPs) with world leading companies such as Covidien,
General Electric, Hewlett Packard, Intel, and Siemens. Of these corporations, Intel was the first sponsor,
having funded 21 projects and mentored 105 students over four consecutive years. This paper is a
longitudinal case study following three Intel-sponsored multi-view real-time face detection CDP teams with
15 undergraduate students during 2013 and 2014. On the technical side, the system design of face detection is based on Intel High Definition (HD) 4000 graphics and OpenCL. With numerous techniques, including accelerated pipeline over CPU and GPU, image decomposition, two-dimensional (2D) task
allocation, and a combination of Viola-Jones algorithm and continuously adaptive mean-shift (Camshift) algorithm, a speed of 32 fps was attained for real-time multi-view face detection. In addition, a frontal view detection accuracy of 81% was achieved in Phase I and a multi-view detection accuracy of 95% in Phase III. Furthermore, an innovative application called face-detection game controller (FDGC) was developed. On the other side, this research also addresses benefitsof stakeholders. After graduation, a third(5) of these students worked in multinational corporations (MNCs) and two thirds (10) of these students entered top American graduate schools. At the time of this writing, five of them have finished their master’s degrees
and are currently working for famous companies, such as Amazon, Facebook, and Google.
THE MAIN PROBLEMS OF THE STUDENTS AT PRIMARY LEVEL INRURAL AREA OFTEHSIL: FER...ijejournal
This paper investigates the main problems of the students at primary education level in rural area of
Tehsil: Ferozwala, District: Sheikhupura. “Education for all” is a global slogan of ‘TheGovernment of
Pakistan’ andis committed to achieve it. However in Pakistan one third population of the total is living in
the rural areas and among those very rare ration have knowledge about its importance. The present study
was conducted in rural area of Tehsile: Ferozwala, District: Sheikhupura-Pakistan. In this Tehsile, there
are 21 Union Councils, in which 06 urban and 15 rural. The total strength of the Primary Schools in the
area of rural is463 for the year of 2015and the total strength of the students are18957.Only 100 students
are interviewed, among those 50 are male &50 are female.The results founded that there are a lot of
reasons, who create hurdles to get education. In this regard mostly students are deprived from getting the
basic education.Finally, suggestions are given at the end of paper.
From the dawn of Iranian history, education and learning have been revered and preferred. In the 20th century the tradition of learning has been put forward by the enlightened rule of the Pahlavi’s father and son. Reza shah (1925-41) the founder of the Pahlavi dynasty believed that the expansion of modern
education was a pre-requisite for social and political progress. He wants to make education a corner stone in his nationalist program. He considered education a single most important factor in promoting both the well being of the individual and the progress of the country and is the cure for all that is wrong with the people and the country. During this period a large number of elementary and secondary schools were established in Tehran and other major cities. Education received attention from all social classes. The purpose of the present paper is to examine the role of Reza shah Pahlavi in the development of education based on the modern curricula.
ENERGY HARVESTING METHOD IN WIRELESS SENSOR NETWORKijejournal
With the advent of modern micro mechanical system technology and wireless communication wireless
sensor networks are finding a lot of application in modern day life. The design of the sensor network
depends on the specific application. This paper gives a description of the components of the wireless
sensor nodes used. It also describes how the lifetime of a wireless sensor network can be increased by the
use of energy harvesting sensor nodes.
LEARNER-CENTERED TEACHING: THE STUDENTS’ LEVEL OF LEARNING SKILLS AND STRATEGIESijejournal
Students are challenged to develop their own learning skills and strategies for life-long learning. With this,
the study investigated and analyzed the level of learning skills and strategies of the students in relation to
the extent of implementation of learner-centered teaching in the classroom. This study conducted a survey
in a high school institution where 900 students from first year to fourth year levels were considered as
respondents. A survey tool was used to evaluate the students’ level on their learning skills, collaborative
learning, and study skills through learner-centered teaching. It was found out that students rated
themselves as Good in their learning skills and strategies. This leads to enriching more the learning skills
and strategies of the students and providing them more opportunities to be engaged in meaningful activities
from which they develop their own knowledge and skills applicable in their day-to-day lives
THE MAIN PROBLEMS OF THE STUDENTS AT PRIMARY LEVEL INRURAL AREA OFTEHSIL: FER...ijejournal
This paper investigates the main problems of the students at primary education level in rural area of
Tehsil: Ferozwala, District: Sheikhupura. “Education for all” is a global slogan of ‘TheGovernment of
Pakistan’ andis committed to achieve it. However in Pakistan one third population of the total is living in
the rural areas and among those very rare ration have knowledge about its importance. The present study
was conducted in rural area of Tehsile: Ferozwala, District: Sheikhupura-Pakistan. In this Tehsile, there
are 21 Union Councils, in which 06 urban and 15 rural. The total strength of the Primary Schools in the
area of rural is463 for the year of 2015and the total strength of the students are18957.Only 100 students
are interviewed, among those 50 are male &50 are female.The results founded that there are a lot of
reasons, who create hurdles to get education. In this regard mostly students are deprived from getting the
basic education.Finally, suggestions are given at the end of paper.
This study examined trend in determinants of career choice in quantity surveying between 1960 till
date.Views from 335 respondents collected via structured questionnaire were analysed using
descriptive/inferential statistics. The study reveals in the 60s, personal interest drives choice of career in
quantity surveying. The trend however diminishes significantly in the 20th century. As a result, there islittle
progression from the undergraduate to post graduate studies in the profession. This is unhealthy for the
future of the profession.The study provides an understanding ofthe critical threat to the sustainability of the
profession and brings to bare exciting theoretical insights.
The study investigated the predictors of collaborative behavior and on the job effectiveness among teachers. The population of the study involve teachers within Zaria metropolis. Hence, two hundred of them were purposively sampled for the purpose of the study. Three research questions were formulated to guide the study. The questionnaire was structured in a five point Liker scale system. Any item that achieve mean score of 3 point and above was taken to be accepted, while those that did not achieve that was taken as
rejected. All the items on interaction, relationship and motivation were found to be accepted by the respondents as critical variables for facilitating teachers’ collaboration and on the job effectiveness. It was found that constant interaction among teachers enhances collaboration and effectiveness. The study also revealed that the more teachers relate with one another, the more close they are and also influence each
other’s effectiveness. The study further showed that teachers motivation, influences effectiveness. It was therefore recommended that teachers themselves should establish mechanisms that would help them interact and relate more efficiently with one another on constant bases.
The study focused on finding out the psychological disposition of university student teachers on the functional capacity of the educational system in Nigeria and its impact on national development. The research design employed was survey method. Three hypothesis were raised and tested at 0.05 alpha level of significance. The population of the study includes all the 200 level students’ teachers of Ahmadu Bello
University Zaria and Othman Danfodio University Sokoto which is made up 2,058 students. 200 participants were selected for the study using simple random sampling model. Instrument used for the study was a self - developed questionnaire. Correlational analysis was employed in analyzing the data collected.
The study revealed from all indications that there is a significant relationship between student teachers psychological disposition and functional education in Nigeria. Students’ perception positively correlated with functional education. Attitude was found to positively relate with functional education. By implication, the system demands more proactive practical approach in order to make it more functional so as to fit into the current global trend in education. The recommendation is that the functional level of Nigerian
education should be increased.
Ubiquitous learning allows students to learn at any time and any place. This educational activity is possible to be performed by various types of students and to operate on various devices, networks and environments, where the system understands the study pattern and behaviour of the students. Adaptivity plays an important role in Ubiquitous learning, aiming at providing students with adaptive and
personalized learning material and information at the right place and the right time. Student's history logs
is automatically created and maintained by the student history database that maintains student's history of subject content requested. This offers information on student's hardware capabilities, students preferences,
knowledge level and student status. This information can be utilized to respond to new student's request with subject content created from previous similar request. A Ubiquitous learning student model aims to identify students needs, characteristics and situations. We use C-IOB (Context-Information, Observation
and Belief) model to process the context of the student, formulate the observation and use the observations
to generate beliefs. The belief generated by C-IOB model is based on adaptation decision and subject analysis from student history database, which are able to detect the real-world learning status of students.
Designed method has been illustrated for students with divergent knowledge levels, by considering complete course material of a subject, Communication Protocols offered at graduate level.
Religious education in uzbekistan under sovietijejournal
It is imperative to identify and analyze the educational policies, embarked in Soviet Central Asia. This paper investigates the seven decades Communist rule in Muslim oriented Central Asia with a special focus to Islamic education policies and approaches. The Communist party serves as a seedbed of power not only in economics and politics but also in the realm of ideology and education. The interrogation and persecution on Religious education institutions, its carriers and scholars, Ulamas and believers clearly depicts the atheistic religious policy of soviets. Atheistic propaganda was intensified in the early 1920’s and 1930’s arbitrary arrests and execution took place to eliminate Muslim leaders who refused to cooperate
with the authorities. All Islamic schools (Maktabas and Madrassas) were closed and religious literature was confiscated. Inspite the approach of “drying them out” Islamic education survived in hujra (monastic cell) system of education.
Some Results on the Group of Lower Unitriangular Matrices L(3,Zp)IJERA Editor
The main objective of this paper is to find the order and its exponent, the general form of all conjugacy classes,
Artin characters table and Artin exponent for the group of lower unitriangular matrices L(3,ℤp), where p is
prime number.
Common Fixed Point Theorems in Uniform SpacesIJLT EMAS
In the process of generalization of metric spaces to
Topological spaces, a few aspects of metric spaces are lost.
Therefore, the requirement of generalization of metric spaces
leads to the theory of uniform spaces. Uniform spaces stand
somewhere in between metric spaces and general topological
spaces. Khan[6] extended fixed point theorems due to Hardy and
Rogers[2], Jungck[4] and Acharya[1] in uniform space by
obtaining some results on common fixed points for a pair of
commuting mappings defined on a sequentially complete
Hausdorff uniform space. Rhoades et. al.[7] generalized the
result of Khan[6] by establishing a general fixed point theorem
for four compatible maps in uniform space .
In this paper, a common fixed point theorem in
uniform spaces is proved which generalizes the result of Khan[6]
and Rhoades et al.[7] by employing the less restrictive condition
of weak compatibility for one pair and the condition of
compatibility for second pair, the result is proved for six selfmappings.
Pseudo Bipolar Fuzzy Cosets of Bipolar Fuzzy and Bipolar Anti-Fuzzy HX Subgroupsmathsjournal
In this paper, we introduce the concept of pseudo bipolar fuzzy cosets, pseudo bipolar fuzzy double cosets of a bipolar fuzzy and bipolar anti-fuzzy subgroups. We also establish these concepts to bipolar fuzzy and bipolar anti-fuzzy HX subgroups of a HX group with suitable examples. Also we discuss some of their relative properties.
“The Comments Were Clear But You Don’t Understand”: Supporting Written Feedba...ijejournal
This paper reports part of a dissertation research for the award of an MA degree at a UK University. The
dissertation research investigated how Nigerian students adapted to novel pedagogic practices in a UK
University. One of such novel pedagogic practices for some of the students was the receiving of feedback
comments on coursework drafts and on summative assessments. Several studies have found that students
may not always understand the feedback comments they receive, thereby undermining its learning and
achievement potential (Chanock, 2000; Weaver, 2006; Smith & Gorard, 2005; Nicol, 2010). Reasons for
this include comments that are too vague, general, ambiguous, abstract or in unfamiliar disciplinary
discourse (Nicol, 2010). In this paper, it is argued that for feedback comments to adequately support
learning and achievement, it should be followed up by dialogue that is proactive and effective, initiated by
any of the concerned parties in an environment of trust.
A UNIVERSITY-INDUSTRY COLLABORATION CASE STUDY:INTEL REAL-TIME MULTI-VIEW FAC...ijejournal
Since 2011, University of Michigan—Shanghai Jiao Tong University Joint Institute (JI) has established 122 corporate-sponsored Capstone Design Projects (CDPs) with world leading companies such as Covidien,
General Electric, Hewlett Packard, Intel, and Siemens. Of these corporations, Intel was the first sponsor,
having funded 21 projects and mentored 105 students over four consecutive years. This paper is a
longitudinal case study following three Intel-sponsored multi-view real-time face detection CDP teams with
15 undergraduate students during 2013 and 2014. On the technical side, the system design of face detection is based on Intel High Definition (HD) 4000 graphics and OpenCL. With numerous techniques, including accelerated pipeline over CPU and GPU, image decomposition, two-dimensional (2D) task
allocation, and a combination of Viola-Jones algorithm and continuously adaptive mean-shift (Camshift) algorithm, a speed of 32 fps was attained for real-time multi-view face detection. In addition, a frontal view detection accuracy of 81% was achieved in Phase I and a multi-view detection accuracy of 95% in Phase III. Furthermore, an innovative application called face-detection game controller (FDGC) was developed. On the other side, this research also addresses benefitsof stakeholders. After graduation, a third(5) of these students worked in multinational corporations (MNCs) and two thirds (10) of these students entered top American graduate schools. At the time of this writing, five of them have finished their master’s degrees
and are currently working for famous companies, such as Amazon, Facebook, and Google.
THE MAIN PROBLEMS OF THE STUDENTS AT PRIMARY LEVEL INRURAL AREA OFTEHSIL: FER...ijejournal
This paper investigates the main problems of the students at primary education level in rural area of
Tehsil: Ferozwala, District: Sheikhupura. “Education for all” is a global slogan of ‘TheGovernment of
Pakistan’ andis committed to achieve it. However in Pakistan one third population of the total is living in
the rural areas and among those very rare ration have knowledge about its importance. The present study
was conducted in rural area of Tehsile: Ferozwala, District: Sheikhupura-Pakistan. In this Tehsile, there
are 21 Union Councils, in which 06 urban and 15 rural. The total strength of the Primary Schools in the
area of rural is463 for the year of 2015and the total strength of the students are18957.Only 100 students
are interviewed, among those 50 are male &50 are female.The results founded that there are a lot of
reasons, who create hurdles to get education. In this regard mostly students are deprived from getting the
basic education.Finally, suggestions are given at the end of paper.
From the dawn of Iranian history, education and learning have been revered and preferred. In the 20th century the tradition of learning has been put forward by the enlightened rule of the Pahlavi’s father and son. Reza shah (1925-41) the founder of the Pahlavi dynasty believed that the expansion of modern
education was a pre-requisite for social and political progress. He wants to make education a corner stone in his nationalist program. He considered education a single most important factor in promoting both the well being of the individual and the progress of the country and is the cure for all that is wrong with the people and the country. During this period a large number of elementary and secondary schools were established in Tehran and other major cities. Education received attention from all social classes. The purpose of the present paper is to examine the role of Reza shah Pahlavi in the development of education based on the modern curricula.
ENERGY HARVESTING METHOD IN WIRELESS SENSOR NETWORKijejournal
With the advent of modern micro mechanical system technology and wireless communication wireless
sensor networks are finding a lot of application in modern day life. The design of the sensor network
depends on the specific application. This paper gives a description of the components of the wireless
sensor nodes used. It also describes how the lifetime of a wireless sensor network can be increased by the
use of energy harvesting sensor nodes.
LEARNER-CENTERED TEACHING: THE STUDENTS’ LEVEL OF LEARNING SKILLS AND STRATEGIESijejournal
Students are challenged to develop their own learning skills and strategies for life-long learning. With this,
the study investigated and analyzed the level of learning skills and strategies of the students in relation to
the extent of implementation of learner-centered teaching in the classroom. This study conducted a survey
in a high school institution where 900 students from first year to fourth year levels were considered as
respondents. A survey tool was used to evaluate the students’ level on their learning skills, collaborative
learning, and study skills through learner-centered teaching. It was found out that students rated
themselves as Good in their learning skills and strategies. This leads to enriching more the learning skills
and strategies of the students and providing them more opportunities to be engaged in meaningful activities
from which they develop their own knowledge and skills applicable in their day-to-day lives
THE MAIN PROBLEMS OF THE STUDENTS AT PRIMARY LEVEL INRURAL AREA OFTEHSIL: FER...ijejournal
This paper investigates the main problems of the students at primary education level in rural area of
Tehsil: Ferozwala, District: Sheikhupura. “Education for all” is a global slogan of ‘TheGovernment of
Pakistan’ andis committed to achieve it. However in Pakistan one third population of the total is living in
the rural areas and among those very rare ration have knowledge about its importance. The present study
was conducted in rural area of Tehsile: Ferozwala, District: Sheikhupura-Pakistan. In this Tehsile, there
are 21 Union Councils, in which 06 urban and 15 rural. The total strength of the Primary Schools in the
area of rural is463 for the year of 2015and the total strength of the students are18957.Only 100 students
are interviewed, among those 50 are male &50 are female.The results founded that there are a lot of
reasons, who create hurdles to get education. In this regard mostly students are deprived from getting the
basic education.Finally, suggestions are given at the end of paper.
This study examined trend in determinants of career choice in quantity surveying between 1960 till
date.Views from 335 respondents collected via structured questionnaire were analysed using
descriptive/inferential statistics. The study reveals in the 60s, personal interest drives choice of career in
quantity surveying. The trend however diminishes significantly in the 20th century. As a result, there islittle
progression from the undergraduate to post graduate studies in the profession. This is unhealthy for the
future of the profession.The study provides an understanding ofthe critical threat to the sustainability of the
profession and brings to bare exciting theoretical insights.
The study investigated the predictors of collaborative behavior and on the job effectiveness among teachers. The population of the study involve teachers within Zaria metropolis. Hence, two hundred of them were purposively sampled for the purpose of the study. Three research questions were formulated to guide the study. The questionnaire was structured in a five point Liker scale system. Any item that achieve mean score of 3 point and above was taken to be accepted, while those that did not achieve that was taken as
rejected. All the items on interaction, relationship and motivation were found to be accepted by the respondents as critical variables for facilitating teachers’ collaboration and on the job effectiveness. It was found that constant interaction among teachers enhances collaboration and effectiveness. The study also revealed that the more teachers relate with one another, the more close they are and also influence each
other’s effectiveness. The study further showed that teachers motivation, influences effectiveness. It was therefore recommended that teachers themselves should establish mechanisms that would help them interact and relate more efficiently with one another on constant bases.
The study focused on finding out the psychological disposition of university student teachers on the functional capacity of the educational system in Nigeria and its impact on national development. The research design employed was survey method. Three hypothesis were raised and tested at 0.05 alpha level of significance. The population of the study includes all the 200 level students’ teachers of Ahmadu Bello
University Zaria and Othman Danfodio University Sokoto which is made up 2,058 students. 200 participants were selected for the study using simple random sampling model. Instrument used for the study was a self - developed questionnaire. Correlational analysis was employed in analyzing the data collected.
The study revealed from all indications that there is a significant relationship between student teachers psychological disposition and functional education in Nigeria. Students’ perception positively correlated with functional education. Attitude was found to positively relate with functional education. By implication, the system demands more proactive practical approach in order to make it more functional so as to fit into the current global trend in education. The recommendation is that the functional level of Nigerian
education should be increased.
Ubiquitous learning allows students to learn at any time and any place. This educational activity is possible to be performed by various types of students and to operate on various devices, networks and environments, where the system understands the study pattern and behaviour of the students. Adaptivity plays an important role in Ubiquitous learning, aiming at providing students with adaptive and
personalized learning material and information at the right place and the right time. Student's history logs
is automatically created and maintained by the student history database that maintains student's history of subject content requested. This offers information on student's hardware capabilities, students preferences,
knowledge level and student status. This information can be utilized to respond to new student's request with subject content created from previous similar request. A Ubiquitous learning student model aims to identify students needs, characteristics and situations. We use C-IOB (Context-Information, Observation
and Belief) model to process the context of the student, formulate the observation and use the observations
to generate beliefs. The belief generated by C-IOB model is based on adaptation decision and subject analysis from student history database, which are able to detect the real-world learning status of students.
Designed method has been illustrated for students with divergent knowledge levels, by considering complete course material of a subject, Communication Protocols offered at graduate level.
Religious education in uzbekistan under sovietijejournal
It is imperative to identify and analyze the educational policies, embarked in Soviet Central Asia. This paper investigates the seven decades Communist rule in Muslim oriented Central Asia with a special focus to Islamic education policies and approaches. The Communist party serves as a seedbed of power not only in economics and politics but also in the realm of ideology and education. The interrogation and persecution on Religious education institutions, its carriers and scholars, Ulamas and believers clearly depicts the atheistic religious policy of soviets. Atheistic propaganda was intensified in the early 1920’s and 1930’s arbitrary arrests and execution took place to eliminate Muslim leaders who refused to cooperate
with the authorities. All Islamic schools (Maktabas and Madrassas) were closed and religious literature was confiscated. Inspite the approach of “drying them out” Islamic education survived in hujra (monastic cell) system of education.
CULTIVATING STUDENTS'INNOVATIVE PRACTICE ABILITY IN HARDWARE EXPERIMENTijejournal
How to cultivate students' innovative practical ability effectively is the subject of Computer Science in Colleges and Universities, especially for the first-year or second-year undergraduate students. This paper introduces the experimental teaching reform trial of the Digital Logic Circuit courses, and sums up the experience of how to stimulate students' awareness of innovation in the hardware experiment teaching and how to improve the students' practical ability. This paper proposes that we should start the student
independent innovation experiment as soon as possible at the university stage. We design the independent innovation experiment in Digital Logic Circuit of the hardware experiment, that experiment is an openminded experiment. After years of experiments carried out, the students deepened understanding of the knowledge of theory course, improve the interest in the design of hardware, understand the basic processes of the design of electronic products, improve the ability of practical, and establish the consciousness of
innovation and practice. Our trial has proved that it is very meaningful and feasible to enhance the ability of innovation practice in the low grade students of computer major.
E-LEARNING TECHNOLOGIES AND HUMAN LEARNING PROCESSijejournal
Learning has been a recurrent and inseparable activity of human being since ever. People have been
inventing and discovering various methods and techniques to improve its acquisition process and ways.
One’s progress and development has always been evolutionary as regards to learning versatility. One has
come to know various tactics, techniques and technologies according to the developing circumstances. But
now, in the 21st century, it may be said that this process cannot be termed as evolutionary as it was in its
place a revolutionary phenomenon. Science and technology changes the whole internal mindset as well as
external perspective. Computer changes the whole scenario. With its introduction, the conception of
electronic era emerged. Electronic learning opened a new chapter in the history of human education and
knowledge. Virtual classroom concept came into being. Interactive means changed altogether. All these
means prove to be effective in the human learning process.
A UNIVERSITY-INDUSTRY COLLABORATION CASE STUDY:INTEL REAL-TIME MULTI-VIEW FAC...ijejournal
Since 2011, University of Michigan—Shanghai Jiao Tong University Joint Institute (JI) has established 122
corporate-sponsored Capstone Design Projects (CDPs) with world leading companies such as Covidien,
General Electric, Hewlett Packard, Intel, and Siemens. Of these corporations, Intel was the first sponsor,
having funded 21 projects and mentored 105 students over four consecutive years. This paper is a longitudinal case study following three Intel-sponsored multi-view real-time face detection CDP teams with 15 undergraduate students during 2013 and 2014. On the technical side, the system design of face detection is based on Intel High Definition (HD) 4000 graphics and OpenCL. With numerous techniques,including accelerated pipeline over CPU and GPU, image decomposition, two-dimensional (2D) task
allocation, and a combination of Viola-Jones algorithm and continuously adaptive mean-shift (Camshift)
algorithm, a speed of 32 fps was attained for real-time multi-view face detection. In addition, a frontal view
detection accuracy of 81% was achieved in Phase I and a multi-view detection accuracy of 95% in Phase
III. Furthermore, an innovative application called face-detection game controller (FDGC) was developed.
On the other side, this research also addresses benefitsof stakeholders. After graduation, a third(5) of these
students worked in multinational corporations (MNCs) and two thirds (10) of these students entered top
American graduate schools. At the time of this writing, five of them have finished their master’s degrees and are currently working for famous companies, such as Amazon, Facebook, and Google.
‘A PERSISTENT SOURCE OF DISQUIET’28: AN INVESTIGATION OF THE CULTURAL CAPITAL...ijejournal
This paper discusses the findings of a cultural content analysis conducted on the reading component of
twenty IELTS exams. A total of sixty reading passages were examined for cultural capital. The study found
that, on average, one reading test contained fourteen cultural references in terms of a variety of cultural
elements including cultural objects and historical settings. Geographically speaking, the readings referred
to 139 places or regions around the world with only five references pertaining to the Middle East and none
to the United Arab Emirates where this study was conducted.
Background: As a result of enormous progress in the information technology and communications, several
organizations adopt business intelligence (BI) applications in order to cope with the development in
business mechanisms, staying at the marketplace, competition, customer possession and retention.
The rapid growing capabilities of both generating and gathering data has created an imperative
necessity for new techniques and tools can intelligently and automatically transform the processed data in
to a valuable information and knowledge. Knowledge management is a cornerstone in selecting accurate
information at the appropriate time from many relevant resources.
Objective: The major Objective of this research is to "examine the impact of business intelligence on
employee's knowledge sharing at the Jordanian telecommunications company (JTC)".
Design/methodology/approach: A review of the literature serves as the basis for measuring the impact of
business intelligence using knowledge sharing scale. The study sample consisted of administrators,
technical staff, and senior managers.75 questionnaires were distributed in the site of JTC. (70)
Questionnaires were collected. (63) Found statistically usable for this study representing a response rate
of (84 %).
Findings: Most important findings for this study demonstrate that business intelligence tools respectively
(OLAP, Data Warehousing, and Data Mining)are highly effect on employee knowledge sharing.
Originality/ Value: Business Intelligence play a significant role in obtaining the underlying knowledge in
the organization, through optimum utilization of data sources the internal and external alike. Several
researches addressed the importance of integrating business intelligence with knowledge management,
little of these researches addressing the impact of business intelligence on knowledge sharing. This study
has tried to address this need.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Intuitionistic Fuzzy W- Closed Sets and Intuitionistic Fuzzy W -ContinuityWaqas Tariq
The aim of this paper is to introduce and study the concepts of intuitionistic fuzzy w- closed sets, intuitionistic fuzzy w-continuity and inttuitionistic fuzzy w-open & intuitionistic fuzzy w-closed mappings in intuitionistic fuzzy topological spaces.
Pseudo Bipolar Fuzzy Cosets of Bipolar Fuzzy and Bipolar Anti-Fuzzy HX Subgroupsmathsjournal
In this paper, we introduce the concept of pseudo bipolar fuzzy cosets, pseudo bipolar fuzzy double cosets of a bipolar fuzzy and bipolar anti-fuzzy subgroups. We also establish these concepts to bipolar fuzzy and bipolar anti-fuzzy HX subgroups of a HX group with suitable examples. Also we discuss some of their relative properties.
A crystallographic group is a group acting on R^n that contains a translation subgroup Z^n as a finite index subgroup. Here we consider which Coxeter groups are crystallographic groups. We also expose the enumeration in dimension 2 and 3. Then we shortly give the principle under which the enumeration of N dimensional crystallographic groups is done.
The aim of this paper is to study the class of β-normal spaces. The relationships among s-normal spaces, pnormal spaces and β-normal spaces are investigated. Moreover, we study the forms of generalized β-closed
functions. We obtain characterizations of β-normal spaces, properties of the forms of generalized β-closed
functions and preservation theorems.
The aim of this paper is to study the class of β-normal spaces. The relationships among s-normal spaces, pnormal spaces and β-normal spaces are investigated. Moreover, we study the forms of generalized β-closed
functions. We obtain characterizations of β-normal spaces, properties of the forms of generalized β-closed
functions and preservation theorems.
The aim of this paper is to study the class of β-normal spaces. The relationships among s-normal spaces, pnormal spaces and β-normal spaces are investigated. Moreover, we study the forms of generalized β-closed
functions. We obtain characterizations of β-normal spaces, properties of the forms of generalized β-closed
functions and preservation theorems.
The aim of this paper is to study the class of β-normal spaces. The relationships among s-normal spaces, pnormal spaces and β-normal spaces are investigated. Moreover, we study the forms of generalized β-closed
functions. We obtain characterizations of β-normal spaces, properties of the forms of generalized β-closed
functions and preservation theorems.
COMMON FIXED POINT THEOREMS IN COMPATIBLE MAPPINGS OF TYPE (P*) OF GENERALIZE...mathsjournal
In this paper, we give some new definition of Compatible mappings of type (P), type (P-1) and type (P-2) in intuitionistic generalized fuzzy metric spaces and prove Common fixed point theorems for six mappings under the conditions of compatible mappings of type (P-1) and type (P-2) in complete intuitionistic fuzzy metric spaces. Our results intuitionistically fuzzify the result of Muthuraj and Pandiselvi [15]
COMMON FIXED POINT THEOREMS IN COMPATIBLE MAPPINGS OF TYPE (P*) OF GENERALIZE...mathsjournal
In this paper, we give some new definition of Compatible mappings of type (P), type (P-1) and type (P-2) in intuitionistic generalized fuzzy metric spaces and prove Common fixed point theorems for six mappings under the conditions of compatible mappings of type (P-1) and type (P-2) in complete intuitionistic fuzzy metric spaces.
COMMON FIXED POINT THEOREMS IN COMPATIBLE MAPPINGS OF TYPE (P*) OF GENERALIZE...mathsjournal
In this paper, we give some new definition of Compatible mappings of type (P), type (P-1) and type (P-2) in intuitionistic generalized fuzzy metric spaces and prove Common fixed point theorems for six mappings under the
conditions of compatible mappings of type (P-1) and type (P-2) in complete intuitionistic fuzzy metric spaces. Our results intuitionistically fuzzify the result of Muthuraj and Pandiselvi [15]
Mathematics subject classifications: 45H10, 54H25
Some Other Properties of Fuzzy Filters on Lattice Implication Algebrasijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
A STUDY ON L-FUZZY NORMAL SUBl -GROUP
1. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 3, No. 1, March 2016
DOI : 10.5121/mathsj.2016.3101 1
A STUDY ON L-FUZZY NORMAL SUBl -GROUP
1
K.Sunderrajan, 2
A.Senthilkumar and 3
R.Muthuraj
1
SRMV College of Arts and Science, Coimbatore-641020, Tamilnadu, India.
2
SNS College of Technology , Coimbatore-641035 , Tamilnadu, India.
3
H.H.The Rajah’s College,Pudukkottai-Tamilnadu, India
ABSTRACT
This paper contains some definitions and results of L-fuzzy normal sub l -group and its generalized
characteristics.
KEYWORDS
Fuzzy set, L -fuzzy set, L-fuzzy sub l --group, L-fuzzy normal sub l -group .
AMS Subject Classification (2000): 06D72, 06F15, 08A72.
1.INTRODUCTION
L. A. Zadeh[11] introduced the notion of fuzzy subset of a set S as a function from X into I =
[0, 1]. Rosenfeld[2] applied this concept in group theory and semi group theory, and
developed the theory of fuzzy subgroups and fuzzy subsemigroupoids respectively J.A.Goguen
[6] replaced the valuations set [0, 1],by means of a complete lattice in an attempt to make a
generalized study of fuzzy set theory by studying L-fuzzy sets.. In fact it seems in order to
obtain a complete analogy of crisp mathematics in terms of fuzzy mathematics, it is
necessary to replace the valuation set by a system having more rich algebraic structure.
These concepts l -groups play a major role in mathematics and fuzzy mathematics. G.S.V
Satya Saibaba [9] introduced the concept of L- fuzzy sub l -group and L-fuzzy l -ideal of l -
group. In this paper, we initiate the study of L-fuzzy normal subl -groups .
2.PRELIMINARIES
This section contains some definitions and results to be used in the sequel.
2.1. Definition [5,6,7]
A lattice ordered group (l -group) is a system G= (G, *, ≤ ) where
i (G, *) is a group
ii (G , ≤ ) is a lattice
iii the inclusion is invariant under all translations
x→ a + x+ b i.e. x≤ y ⇒ a+ x+ b ≤ a + y + b, for all a, b∈G.
2. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 3, No. 1, March 2016
2
2.2 .Definition [11]
Let X be a non-empty set. A fuzzy subset A of X is a function
A : X → [ 0, 1 ].
2.3. Definition [1,2]
An L-fuzzy subset A of G is called an L-fuzzy subgroup (ALFS) of G if for every x,y ∈ G,
i A(xy ) ≥ A(x) ˅ A(y)
ii A(x-1
) = A (x).
2.4. Definition [9,10]
An L-fuzzy subset A of G is said to be an L-fuzzy sub l - group(LFSl ) of G if for any x , y ∈
G
i. A(xy) ≥ A(x) ˅ A(y)
ii. A(x -1
) = A(x)
iii. A(x∨y) ≥ A(x) ˅ A(y)
iv. A(x∧y) ≥ A(x) ˅ A(y).
2.5. Definition [4]
Let G and G′ be any two groups. Then the function f: G → G′ is said to be a homomorphism if f
(xy) = f (x) f (y) for all x, y in G.
2.6.Definition[3]
Let G and G′ be any two groups (not necessarily commutative). Then the function f: G → G′ is
said to be an anti-homomorphism if f (xy) = f (y) f (x) for all x, y in G.
Remark: A homomorphism may or may not be an anti-homomorphism
2.7 .Definition [8,10]
A subl -group H of an l - group G is called a normal subl -group of G if for all x in G and h in
H we have xhx-1
∈ H .
2.8.Definition[8,10 ]
An L-fuzzy sub l -group A of G is called an L-fuzzy normal sub l -group (LFNSl G) of G if for
every x, y∈G, A(xyx-1
) ≥ A(y).
3. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 3, No. 1, March 2016
3
3. PROPERTIES OF AN L-FUZZY NORMAL SUB l -GROUP
In this section, we discuss properties of an L-fuzzy normal sub l -group
3.1.Theorem
Let G be an l -group and A be an L-fuzzy sub l -group of G, then the following conditions are
equivalent.
i. A is an L-fuzzy normal sub l -group of G.
ii. A(xyx-1
) = A(y), for all x, y ∈G.
iii. A(xy) = A(yx), for all x, y ∈G.
iv.
Proof:
i ⇒ ii.
Let A is an L-fuzzy normal sub l -group of G.
Then A(xyx-1
) ≥ A(y) for all x, y∈G. By taking advantage of the arbitrary property of x, we
have,
A(x-1
y(x-1
)-1
) ≥ A(y).
Now,
A(y) = A(x-1
(xyx-1
)(x-1
)-1
)
= A(xyx-1
)
≥ A(y).
Hence,
A(xyx-1
) = A(y) for all x, y ∈G.
ii ⇒ iii.
Let A(xyx-1
) = A(y), for all x, y ∈G.
Taking yx instead of y, we get,
A(xy ) = A(yx), for all x, y ∈G.
iii ⇒ i.
Let A(xy) = A(yx), for all x, y ∈G.
A(xyx-1
) = A(yxx-1
) = A(y) ≥ A(y).
Hence, A is an L-fuzzy normal sub l -group of G.
4. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 3, No. 1, March 2016
4
3.2 .Theorem
Let A be an L-fuzzy subset of an l -group G. If A(e) = 1 and A(xy-1
) ≥ A(x) ∧ A(y) , A(x ∨ y) ≥
A(x) ∧ A(y), A(x ∧ y) ≥ A(x) ∧ A(y) and A(xy) = A(yx), for all x and y in G, then A is an L-
fuzzy normal sub l -group of a group G, where e is the identity element of G.
Proof:
Let e be identity element of G and x and y in G.
Let A(e) = 1 and A(xy-1
) ≥ A(x) ∧ A(y), for all x and y in G.
Now, A(x-1
) = A (ex-1
)
≥ A (e) ∧ A (x)
≥ 1 ∧ A(x)
= A(x)
Therefore, A(x-1
) ≥ A(x), for all x in G.
Hence, A((x-1
)-1
) ≥ A(x-1
) and A(x) ≥ A(x-1
).
Therefore, A(x-1
) = A(x), for all x in G.
Now, replace y by y-1
, then
A(xy) = A( x(y-1
) -1
)
≥ A(x) ∧ A(y-1
)
= A(x) ∧ A(y), for all x and y in G.
A(xy) ≥ A(x) ∧ A(y), for all x and y in G.
Also, we have, A(x ∨ y) ≥ A(x) ∧ A(y), A(x ∧ y) ≥ A(x) ∧ A(y).
Hence, A is an L-fuzzy sub l -group of an l -group G.
Since, A(xy) = A(yx) for all x and y in G, A is an L-fuzzy normal sub l -group of an l -group G.
3.3 .Theorem
If A is an L-fuzzy normal sub l -group of an l -group G, then H = {x / x∈G: A(x) = 1} is either
empty or a normal sub l -group of G.
Proof
It is clear from theorem 3.2
5. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 3, No. 1, March 2016
5
3.4 .Theorem
If A is an L-fuzzy normal sub l -group of an l -group G, then H = {x∈G : A(x) = A(e)} is either
empty or a normal sub l -group of G, where e is the identity element of G.
Proof
Since , H is a sub l -group of G.
Now, let for any x in G and y in H, A(xyx-1
) = A(y) = A(e).
Since A is an LFNSl G of an l -group G and y∈H.
Hence, xyx-1
∈G and H is a normal sub l -group of G.
Hence, H is either empty or a normal sub l -group of an l -group G.
3.5 .Theorem
If A and B are two L-fuzzy normal sub l -groups of an l -group G, then their intersection A ∩ B
is an L-fuzzy normal sub l -group of G.
Proof
Let x and y belong to G.
i. (A ∩ B) (xy) = A(xy) ∧ B(xy)
≥ { A(x) ∧ A(y) } ∧ { B(x) ∧ B(y) }
≥ { A(x) ∧ B(x) } ∧ { A(y) ∧ B(y) }
= (A ∩ B) (x) ∧ (A ∩ B) (y).
Therefore, (A ∩ B) (xy) ≥ (A ∩ B)(x) ∧ (A ∩ B) (y), for all x and y in G.
ii. (A ∩ B)(x-1
) = A(x-1
) ∧ B(x-1
)
= A(x) ∧ B(x)
= (A ∩ B)(x).
Therefore, (A ∩ B) (x-1
) = (A ∩ B)(x), for all x in G.
iii. (A ∩ B) (x ∨ y) = A(x ∨ y) ∧ B(x ∨ y)
≥ { A(x) ∧ A(y) } ∧ { B(x) ∧ B(y) }
≥ { A(x) ∧ B(x) } ∧ { A(y) ∧ B(y) }
= (A ∩ B) (x) ∧ (A ∩ B) (y).
Therefore, (A ∩ B) (x ∨ y) ≥ (A ∩ B)(x)∧(A ∩ B)(y), for all x and y in G.
iv. (A ∩ B) (x ∨ y) = A(x ∨ y) ∧ B(x ∨ y)
6. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 3, No. 1, March 2016
6
≥ { A(x) ∧ A(y) } ∧ { B(x) ∧ B(y) }
≥ { A(x) ∧ B(x) } ∧ { A(y) ∧ B(y) }
= (A ∩ B) (x) ∧ (A ∩ B) (y).
Therefore, (A ∩ B) (x ∨ y) ≥ (A ∩ B)(x)∧(A ∩ B)(y), for all x and y in G.
Hence, A ∩ B is an L-fuzzy sub l -group of an l -group G.
Now, (A ∩ B) (xy) = A(xy) ∧ B(xy)
= A(yx) ∧ B(yx), since A and B are LFNS l G of G.
= (A ∩ B) (yx).
(A ∩ B) (xy) = (A ∩ B) (yx).
Hence, A ∩ B is an L-fuzzy normal sub l -group of an l -group G.
Remark
The intersection of a family of L-fuzzy normal sub l -groups of an l -group G is an L-fuzzy
normal sub l -group of an l -group G.
3.6 .Theorem
If A is an L-fuzzy normal sub l -group of an l -group G if and only if A(x) = A(y-1
xy), for all
x , y ∈ G.
Proof
Let x and y be in G. Let A be an L-fuzzy normal sub l -group of an l -group G.
Now, A(y-1
xy) = A(y-1
yx)
= A(ex)
= A(x).
Therefore, A(x) = A(y-1
xy), for all x and y in G.
Conversely, assume that A(x) = A(y-1
xy).
Now, A(xy) = A(xyxx-1
)
= A(yx)
Therefore, A(xy) = A(yx), for all x and y in G.
Hence, A is an L-fuzzy normal sub l -group of an l -group G.
7. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 3, No. 1, March 2016
7
3.7 .Theorem
Let A be an L-fuzzy sub l -group of an l -group G with A(y) < A(x), for some x and y in G, then
A is an L-fuzzy normal sub l -group of an l -group G.
Proof
Let A be an L-fuzzy sub l -group of an l -group G.
Given A(y) < A(x), for some x and y in G,
A(xy) ≥ A(x) ∧ A(y), as A is an LFS l G of G
= A(y); and
A(y) = A(x-1
xy)
≥ A(x-1
) ∧ A(xy)
≥ A(x) ∧ A(xy), as A is an LFS l G of G
= A(xy).
A(y) ≥ A(xy) ≥ A(y).
Therefore, A(xy) = A(y), for all x and y in G.
and, A(yx) ≥ A(y) ∧ A(x), as A is an LFS l G of G
= A(y); and
A(y) = A(yxx-1
)
≥ A(yx) ∧ A(x-1
)
≥ A(yx) ∧ A(x), as A is an LFS l G of G
= A(yx).
A(y) ≥ A(yx) ≥ A(y).
Therefore, A(yx) = A(y), for all x and y in G.
Hence, A(xy) = A(y) = A(yx), for all x and y in G.
Hence, A(xy) = A(yx), for all x and y in G.
Hence, A is an L-fuzzy normal sub l -group of an l -group of G.
3.8 .Theorem
Let A be an L-fuzzy sub l -group of an l -group G with A(y) > A(x) for some x and y in G, then
A is an L-fuzzy normal sub l -group of an l -group G.
Proof
It is clear from theorem 3.7
8. Applied Mathematics and Sciences: An International Journal (MathSJ ), Vol. 3, No. 1, March 2016
8
REFERENCES
[1] Anthony.J.M, Sherwood.H, A characterization of fuzzy subgroups, Fuzzy sets and systems, 7 (1982),
297-305.
[2] Azriel Rosenfeld, Fuzzy Groups, Journal of mathematical analysis and applications, 35, 512-517
(1971).
[3] Biswas.R, Fuzzy subgroups and anti fuzzy subgroups, Fuzzy Sets and Systems 35 (1990) 121 – 124.
[4] Choudhury.F.P, Chakraborty.A.B and Khare.S.S, A note on fuzzy subgroups and fuzzy
homomorphism, Journal of mathematical analysis and applications, 131, 537-553 (1988).
[5] Garrett Birkhof : Lattice Theory, American Mathematical Society colloquium publications,
Volume XXV.
[6] J.A. Goguen : L-fuzzy sets, J.Math.Anal.Appl. 18, 145-174 (1967).
[7] V. Murali : Lattice of fuzzy algebras and closure systems in I X, Fuzzy sets and systems
41, 101-111 (1991).
[8] Mukherjee.N.P and Bhattacharya.P : Fuzzy normal subgroups and fuzzy cosets, inform.Sci 34 (1984),
225-239.
[9] Satya Saibaba.G.S.V, Fuzzy Lattice Ordered Groups, Southeast Asian Bulletin of Mathematics ,
32, 749-766 (2008).
[10] K.Sunderrajan, A.Senthilkumar, Properties of L-fuzzy normal sub -groups, General Mathematical
Notes , Vol. 22, No. 1, May 2014, pp. 93-99.
[11]L.A. Zadeh : Fuzzy sets, Inform and control, 8, 338-353 (1965).