It is well known how to find the formulae for the number of representations of positive integers by the positive
binary quadratic forms which belong to one-class genera. In this paper we obtain the formulae for the number of
representations by certain binary forms with discriminants –80 and –128 belonging to the genera having two
classes.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
On (1,2)*-πgθ-CLOSED SETS IN BITOPOLOGICAL SPACESijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)paperpublications3
Abstract: Ramanujan’s lost notebook contains many results on mock theta functions. In particular, the lost notebook contains eight identities for tenth order mock theta functions. Previously many authors proved the first six of Ramanujan’s tenth order mock theta function identities. It is the purpose of this paper to prove the seventh and eighth identities of Ramanujan’s tenth order mock theta function identities which are expressed by mock theta functions and also a definite integral. The properties of modular forms are used for the proofs of theta function identities and L. J. Mordell’s transformation formula for the definite integral.Keywords: Mock Theta Functions from Ramanujan’s Lost Notebook.
Title: Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Author: MOHAMMADI BEGUM JEELANI SHAIKH
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Accurate Numerical Method for Singular Initial-Value Problemsaciijournal
In this paper, an accurate numerical method is presented to find the numerical solution of the singular initial value problems. The second-order singular initial value problem under consideration is transferred into a first-order system of initial value problems, and then it can be solved by using the fifth-order Runge Kutta method. The stability and convergence analysis is studied. The effectiveness of the proposed methods is confirmed by solving three model examples, and the obtained approximate solutions are compared with the existing methods in the literature. Thus, the fifth-order Runge-Kutta method is an accurate numerical method for solving the singular initial value problems.
LOCUS AND BISECTOR OF THE ANGLE BETWEEN 2 LINESsumanmathews
This presentation continues with my earlier topics on straight lines, coordinate geometry. Here, we learn how to write the locus os a point satisfying a given equation and also learn how to write the bisector of the angle between 2 lines. Both the acute angled and the obtuse angled bisectors are discussed.
This simple video is useful for students of grade 11 studying math.
This learner's module discusses about the topic of Radical Expressions. It also discusses the definition of Rational Exponents. It also teaches about writing an expression in a radical or exponential form. It also teaches about how to simplify expressions involving rational exponents.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
On (1,2)*-πgθ-CLOSED SETS IN BITOPOLOGICAL SPACESijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)paperpublications3
Abstract: Ramanujan’s lost notebook contains many results on mock theta functions. In particular, the lost notebook contains eight identities for tenth order mock theta functions. Previously many authors proved the first six of Ramanujan’s tenth order mock theta function identities. It is the purpose of this paper to prove the seventh and eighth identities of Ramanujan’s tenth order mock theta function identities which are expressed by mock theta functions and also a definite integral. The properties of modular forms are used for the proofs of theta function identities and L. J. Mordell’s transformation formula for the definite integral.Keywords: Mock Theta Functions from Ramanujan’s Lost Notebook.
Title: Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Author: MOHAMMADI BEGUM JEELANI SHAIKH
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Accurate Numerical Method for Singular Initial-Value Problemsaciijournal
In this paper, an accurate numerical method is presented to find the numerical solution of the singular initial value problems. The second-order singular initial value problem under consideration is transferred into a first-order system of initial value problems, and then it can be solved by using the fifth-order Runge Kutta method. The stability and convergence analysis is studied. The effectiveness of the proposed methods is confirmed by solving three model examples, and the obtained approximate solutions are compared with the existing methods in the literature. Thus, the fifth-order Runge-Kutta method is an accurate numerical method for solving the singular initial value problems.
LOCUS AND BISECTOR OF THE ANGLE BETWEEN 2 LINESsumanmathews
This presentation continues with my earlier topics on straight lines, coordinate geometry. Here, we learn how to write the locus os a point satisfying a given equation and also learn how to write the bisector of the angle between 2 lines. Both the acute angled and the obtuse angled bisectors are discussed.
This simple video is useful for students of grade 11 studying math.
This learner's module discusses about the topic of Radical Expressions. It also discusses the definition of Rational Exponents. It also teaches about writing an expression in a radical or exponential form. It also teaches about how to simplify expressions involving rational exponents.
This learner's module discusses or talks about the topic Radical Expressions. It also teaches how to recognize basic radical notation. It also teaches the multiplication and division of Radical Expressions.
Strong Semiclosed Sets in Topological Spacesijtsrd
In this paper, we introduce and study the notion of strong semiclosed sets in topological spaces P. Chandramoorthi "Strong Semiclosed Sets in Topological Spaces" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18411.pdf
This learner's module discusses about the topic Addition and Subtraction of Radical Expressions. It also teaches about how to add and subtract Radical Expressions. It also includes some problems to be solved involving radical operations.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Performance Analysis of TCP and SCTP For Congestion Losses In ManetIJERA Editor
Transmission control protocols have been used for data transmission process. TCP has been pre-owned for data transmission over wired communication having different bandwidths and message delays over the network. TCP provides communication using 3-handshake which sends RTS and ACK comes from server end and data message has been transmitted over the bandwidth provided. This does not provide security over flooding attack occurred on the network. TCP provides communication between different nodes of the wired communication but when multi-streaming occurs in a network TCP does not provides proper throughput of the system which is major problem that occurred in the previous system. In the proposed work, to overcome this problem SCTP transmission control protocol has been implemented for the system performance of the system. SCTP provides 4-handshake communication in the message transmit due to which security factor get increases and this also provides communication services over multi-streaming and multi-homing. Multiple sender and receivers can communicate over wired network using various approaches of communication through same routers, which degrades in the TCP protocol. In final we evaluate parameters for performance evaluation. Here, we designed and implemented our test bed using Network Simulator (NS-2.35) to test the performance of both Routing protocols.
Review on Identify Kin Relationship Technique in ImageIJERA Editor
In this paper work Kin relationships are traditionally defined as ties based on blood . Kinship include lineal generational bonds like children, parents, grandparents, and great-grandparents, collateral bonds such as siblings, cousins, nieces and nephews, and aunts and uncles, and ties with in-laws. An often-made distinction is that between primary kin members of the families of origin and procreation and secondary kin other family members. The former refer to as “immediate family,” and the latter are generally labelled “extended family.” Marriage, as a principle of kinship, differs from blood in that it can be terminated. Here Proposing the technique to identify Kin relationship System or Kinship model by using face recognition technique splitting the face into subsets like forehead, eyes, nose, mouth, and cheek areas constitute through Gabor Features on available Real time Database. Given the potential for marital break-up, blood is recognized as the more important principle of kinship.
Fault Tree Model for Failure Path Prediction of Bolted Steel Tension Member i...IJERA Editor
Fault tree is a graphical representation of various sequential combinations of events which leads to the failure of any system, such as a structural system. In this paper it is shown that a fault tree model is also applicable to a critical element of a complex structural system. This will help to identify the different failure mode of a particular structural element which might eventually triggered a progressive collapse of the whole structural system. Non-redundant tension member generally regarded as a Fracture Critical Member (FCM) in a complex structural system, especially in bridge, failure of which may lead to immediate collapse of the structure. Limit state design is governed by the failure behavior of a structural element at its ultimate state. Globally, condition assessment of an existing structural system, particularly for bridges, Fracture Critical Inspection becomes very effective and mandatory in some countries. Fault tree model of tension member, presented in this paper can be conveniently used to identify the flaws in FCM if any, in an existing structural system and also as a check list for new design of tension member.
This learner's module discusses or talks about the topic Radical Expressions. It also teaches how to recognize basic radical notation. It also teaches the multiplication and division of Radical Expressions.
Strong Semiclosed Sets in Topological Spacesijtsrd
In this paper, we introduce and study the notion of strong semiclosed sets in topological spaces P. Chandramoorthi "Strong Semiclosed Sets in Topological Spaces" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18411.pdf
This learner's module discusses about the topic Addition and Subtraction of Radical Expressions. It also teaches about how to add and subtract Radical Expressions. It also includes some problems to be solved involving radical operations.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Performance Analysis of TCP and SCTP For Congestion Losses In ManetIJERA Editor
Transmission control protocols have been used for data transmission process. TCP has been pre-owned for data transmission over wired communication having different bandwidths and message delays over the network. TCP provides communication using 3-handshake which sends RTS and ACK comes from server end and data message has been transmitted over the bandwidth provided. This does not provide security over flooding attack occurred on the network. TCP provides communication between different nodes of the wired communication but when multi-streaming occurs in a network TCP does not provides proper throughput of the system which is major problem that occurred in the previous system. In the proposed work, to overcome this problem SCTP transmission control protocol has been implemented for the system performance of the system. SCTP provides 4-handshake communication in the message transmit due to which security factor get increases and this also provides communication services over multi-streaming and multi-homing. Multiple sender and receivers can communicate over wired network using various approaches of communication through same routers, which degrades in the TCP protocol. In final we evaluate parameters for performance evaluation. Here, we designed and implemented our test bed using Network Simulator (NS-2.35) to test the performance of both Routing protocols.
Review on Identify Kin Relationship Technique in ImageIJERA Editor
In this paper work Kin relationships are traditionally defined as ties based on blood . Kinship include lineal generational bonds like children, parents, grandparents, and great-grandparents, collateral bonds such as siblings, cousins, nieces and nephews, and aunts and uncles, and ties with in-laws. An often-made distinction is that between primary kin members of the families of origin and procreation and secondary kin other family members. The former refer to as “immediate family,” and the latter are generally labelled “extended family.” Marriage, as a principle of kinship, differs from blood in that it can be terminated. Here Proposing the technique to identify Kin relationship System or Kinship model by using face recognition technique splitting the face into subsets like forehead, eyes, nose, mouth, and cheek areas constitute through Gabor Features on available Real time Database. Given the potential for marital break-up, blood is recognized as the more important principle of kinship.
Fault Tree Model for Failure Path Prediction of Bolted Steel Tension Member i...IJERA Editor
Fault tree is a graphical representation of various sequential combinations of events which leads to the failure of any system, such as a structural system. In this paper it is shown that a fault tree model is also applicable to a critical element of a complex structural system. This will help to identify the different failure mode of a particular structural element which might eventually triggered a progressive collapse of the whole structural system. Non-redundant tension member generally regarded as a Fracture Critical Member (FCM) in a complex structural system, especially in bridge, failure of which may lead to immediate collapse of the structure. Limit state design is governed by the failure behavior of a structural element at its ultimate state. Globally, condition assessment of an existing structural system, particularly for bridges, Fracture Critical Inspection becomes very effective and mandatory in some countries. Fault tree model of tension member, presented in this paper can be conveniently used to identify the flaws in FCM if any, in an existing structural system and also as a check list for new design of tension member.
Tertiary Treated Waste water as a Promising Alternative for Potable Water for...IJERA Editor
WatersecurityisavitalissueinaridcountrieslikeKuwait,wheredesalinatedwateristhe solesupplyoffresh water.Thispaper isacontributiontotheongoingefforts towardsrationalizationin potablewater consumption.In addition,itdiscusses therole of high-quality effluent water, from wastewater treatment plants in Kuwait, as a potential replacementfor potable water for non-contact domesticapplications as a oneway in savingin thisvaluablecommodity.
Removal of Lignin from aqueous solution using Fe3O4 Nanoparticles as an effec...IJERA Editor
The study was carried out to find out the adsorption efficiency of lignin from paper mill waste water by using Fe3O4 magnetic nanoparticles. The physico-chemical analysis of paper mill effluent results high B.O.D value. Separations of lignin from black liquor were done by acid precipitation method and removal of lignin was done with nanoparticles. Synthesis of nanoparticles was done by co-precipitation method by mixing and stirring of FeCl3.6H2O and FeCl2.4H2O solution at 2:1 molar ratio. The nanoparticles were characterized by using U.V-Vis spectrophotometer and X-Ray Diffraction. U.V-Vis spectra show absorbance spectra at around 585 nm while XRD revealed around 10 nm sizes of Fe3O4 MNPs. The removal efficiency of lignin by Fe3O4 MNPs was investigated at different pH and contact time. Maximum adsorption of lignin onto the surface of Fe3O4 MNPs took place at pH 2.5 and 10 mins of contact time. Desorption of lignin by nanoparticles was studies by using different organic solvents.
Catalan Tau Collocation for Numerical Solution of 2-Dimentional Nonlinear Par...IJERA Editor
Tau method which is an economized polynomial technique for solving ordinary and partial differential
equations with smooth solutions is modified in this paper for easy computation, accuracy and speed. The
modification is based on the systematic use of „Catalan polynomial‟ in collocation tau method and the
linearizing the nonlinear part by the use of Adomian‟s polynomial to approximate the solution of 2-dimentional
Nonlinear Partial differential equation. The method involves the direct use of Catalan Polynomial in the solution
of linearizedPartial differential Equation without first rewriting them in terms of other known functions as
commonly practiced. The linearization process was done through adopting the Adomian Polynomial technique.
The results obtained are quite comparable with the standard collocation tau methods for nonlinear partial
differential equations.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
On New Root Finding Algorithms for Solving Nonlinear Transcendental EquationsAI Publications
In this paper, we present new iterative algorithms to find a root of the given nonlinear transcendental equations. In the proposed algorithms, we use nonlinear Taylor’s polynomial interpolation and a modified error correction term with a fixed-point concept. We also investigated for possible extension of the higher order iterative algorithms in single variable to higher dimension. Several numerical examples are presented to illustrate the proposed algorithms.
In this paper, an accurate numerical method is presented to find the numerical solution of the singularinitial value problems. The second-order singular initial value problem under consideration is transferredinto a first-order system of initial value problems, and then it can be solved by using the fifth-order RungeKutta method. The stability and convergence analysis is studied. The effectiveness of the proposed methodsis confirmed by solving three model examples, and the obtained approximate solutions are compared withthe existing methods in the literature. Thus, the fifth-order Runge-Kutta method is an accurate numericalmethod for solving the singular initial value problems.
ACCURATE NUMERICAL METHOD FOR SINGULAR INITIAL-VALUE PROBLEMSaciijournal
In this paper, an accurate numerical method is presented to find the numerical solution of the singular
initial value problems. The second-order singular initial value problem under consideration is transferred
into a first-order system of initial value problems, and then it can be solved by using the fifth-order Runge
Kutta method. The stability and convergence analysis is studied. The effectiveness of the proposed methods
is confirmed by solving three model examples, and the obtained approximate solutions are compared with
the existing methods in the literature. Thus, the fifth-order Runge-Kutta method is an accurate numerical
method for solving the singular initial value problems.
ACCURATE NUMERICAL METHOD FOR SINGULAR INITIAL-VALUE PROBLEMSaciijournal
In this paper, an accurate numerical method is presented to find the numerical solution of the singular initial value problems. The second-order singular initial value problem under consideration is transferred into a first-order system of initial value problems, and then it can be solved by using the fifth-order Runge Kutta method. The stability and convergence analysis is studied. The effectiveness of the proposed methods is confirmed by solving three model examples, and the obtained approximate solutions are compared with the existing methods in the literature. Thus, the fifth-order Runge-Kutta method is an accurate numerical method for solving the singular initial value problems.
Accurate Numerical Method for Singular Initial-Value Problemsaciijournal
In this paper, an accurate numerical method is presented to find the numerical solution of the singular
initial value problems. The second-order singular initial value problem under consideration is transferred
into a first-order system of initial value problems, and then it can be solved by using the fifth-order Runge
Kutta method. The stability and convergence analysis is studied. The effectiveness of the proposed methods
is confirmed by solving three model examples, and the obtained approximate solutions are compared with
the existing methods in the literature. Thus, the fifth-order Runge-Kutta method is an accurate numerical
method for solving the singular initial value problems.
On Some Double Integrals of H -Function of Two Variables and Their ApplicationsIJERA Editor
This paper deals with the evaluation of four integrals of H -function of two variables proposed by Singh and
Mandia [7] and their applications in deriving double half-range Fourier series for the H -function of two
variables. A multiple integral and a multiple half-range Fourier series of the H -function of two variables are
derived analogous to the double integral and double half-range Fourier series of the H -function of two
variables.
In [8] Liang and Bai have shown that the kC4 − snake graph is an odd harmonious graph for each k ≥ 1. In this paper we generalize this result on cycles by showing that the kCn − snake with string 1,1,…,1 when n ≡ 0 (mod 4) are odd harmonious graph. Also we show that the kC4 − snake with m-pendant edges for each k,m ≥ 1 , (for linear case and for general case). Moreover, we show that, all subdivision of 2 m∆k - snake are odd harmonious for each k,m ≥ 1 . Finally we present some examples to illustrate the proposed theories.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Research on 4-dimensional Systems without Equilibria with ApplicationTELKOMNIKA JOURNAL
Recently chaos-based encryption has been obtained more and more attention. Chaotic systems
without equilibria may be suitable to be used to design pseudorandom number generators (PRNGs)
because there does not exist corresponding chaos criterion theorem on such systems. This paper
proposes two propositions on 4-dimensional systems without equilibria. Using one of the propositions
introduces a chaotic system without equilibria. Using this system and the generalized chaos
synchronization (GCS) theorem constructs an 8-dimensional discrete generalized chaos synchronization
(8DBDGCS) system. Using the 8DBDGCS system designs a 216-word chaotic PRNG. Simulation results
show that there are no significant correlations between the key stream and the perturbed key streams
generated via the 216-word chaotic PRNG. The key space of the chaotic PRNG is larger than 21275. As
an application, the chaotic PRNG is used with an avalanche-encryption scheme to encrypt an RGB image.
The results demonstrate that the chaotic PRNG is able to generate the avalanche effects which are similar
to those generated via ideal chaotic PRNGs.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
On The Number of Representations of a Positive Integer By Certain Binary Quadratic Forms Belonging To Multi-Class Genera
1. Teimuraz Vepkhvadze Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part - 5) June 2015, pp.01-04
www.ijera.com 1 | P a g e
On The Number of Representations of a Positive Integer By
Certain Binary Quadratic Forms Belonging To Multi-Class
Genera
TEIMURAZ VEPKHVADZE
(Department of Mathematics, Iv. Javakhishvili Tbilisi State University, Georgia,
Abstract
It is well known how to find the formulae for the number of representations of positive integers by the positive
binary quadratic forms which belong to one-class genera. In this paper we obtain the formulae for the number of
representations by certain binary forms with discriminants –80 and –128 belonging to the genera having two
classes.
Key words – positive integer, binary form, genera, number of representations.
I. Introduction
Let ( ; )r n f denote a number of representations
of a positive integer n by a positive definite
quadratic form f with a number of variables s. It is
well known that, for case 4s , ( ; )r n f can be
represented as
( ; ) ( ; ) ( ; )r n f n f n f ,
where ( ; )n f is a “singular series” and ( ; )n f is
a Fourier coefficient of cusp form. This can be
expressed in terms of the theory of modular forms
by stating that
( ; ) ( ; ) ( ),f E f X (1)
1
( ; ) 1 ( ; ) ,n
n
f r n f Q
where { : Im 0}H , 2 i
Q e
, X() is a
cusp form and
1
( , ) 1 ( ; ) n
n
E f n f Q
is the Eisenstein series corresponding to f.
Siegel [1] proved that if the number of variables of a
quadratic form f is 4s , then
( ; ) ( ; )E f F f , (2)
where ( ; )F f denote a theta-series of a genus
containing a primitive quadratic form f (both
positive-definite and indefinite).
From formula (2) follows the well-known Siegel’s
theorem [1]: the sum of the singular series corres-
ponding to the quadratic form f is equal to the
average number of representations of a natural
number by a genus that contains the form f.
Later Ramanathan [2] proved that for any primitive
integral quadratic form with 3s variables (except
for zero forms with variables 3s and zero forms
with variables 4s whose discriminant is a
perfect square), there is a function
(2 )
4
1
2
1 2 2 2
( , ) 1
( , ; ) 1
| |
( ; )
,
( ) ( ) | |
m s i
s m s m
zq H
H q
eE z f
d
S f H q
q q H q H q H
which he called the Eisenstein-Siegel series and
which is regular for any fixed when Im 0 and
Re 2
2
sz , analytically extendable in a
neighborhood of 0z , and that
0( ; ) ( , ; ) zF f E z f (3)
Here m and d are respectively the inertia index and
discriminant of f, S(fH;q) is the Gaussian sum. For
4s the function 0( , ; ) zE z f coincides with the
function ( , )E f and the formula (3) with Siegel’s
formula (2).
In [3] we proved that the function ( , ; )E z f is
analytically extendable in a neighborhood of 0z
also in the case where f is any nonzero integral
binary quadratic form and that
0
1
( ; ) ( , ; )
2
zF f E z f further, having defined
the Eisenstein’s series ( , )E f by the formulas
0
1
( ; ) ( , ; )
2
zE f E z f for 2s and
0( ; ) ( , ; ) zE f E z f for 2s , we have
12
1
( , ) 1 ( ; )
2
n
n
E f n f Q
for 2s and
RESEARCH ARTICLE OPEN ACCESS
2. Teimuraz Vepkhvadze Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part - 5) June 2015, pp.01-04
www.ijera.com 2 | P a g e
1
( , ) 1 ( ; ) n
n
E f n f Q
for 2s . Moreover,
convenient formulas are obtained for calculating of
values of the function ( ; )n f in the case where f is
any positive integral form of variables 2s [4],
[5].
Thus, if the genus of the quadratic form f contains
one class, then according to Siegel’s theorem,
( ; )r n f ( ; )n f for 3s ,
1
( ; ) ( ; )
2
r n f n f
for 2s and in that case the problem for obtaining
“exact” formulas for ( ; )r n f is solved completely.
Some papers are devoted to the case of multi-class
genera. For example Van der Blij [6], Lomadze [7],
Vepkhvadze [5] have obtained formulae for ( ; )r n f
for certain special binary forms, which belong to
multi-class genera. In most cases their formulae for
( ; )r n f depend upon the coefficients in the
expansion of certain products of theta functions.
In this paper we obtain formulae for the number of
representations by the binary quadratic forms
2 2
1 1 2 23 2 7x x x x , 2 2
1 1 2 23 2 7x x x x ,
2 2
1 1 2 23 2 11x x x x and 2 2
1 1 2 23 2 11x x x x
belonging to the two-class genera.
II. Preliminaries
Below in this paper n, , , are positive integers;
l, æ, , are non-negative integers; u is an odd
positive integer, m, h are integers, p is a prime
number; h
u
is a Legendre-Jacobi symbol; ( ; )r n f
denote the number of representations of a positive
integer n by the positive binary quadratic form f
with determinant .
Lemma 1 ([4], Lemma 14). Let
1
1( ; )
u
mL m
u u
,
is a square-free integer. Then
(1, )
4
L if 1 ;
1/2
1
4
h
h
if 1(mod4) ,
1 ,
1/2
1
2
2
h
h
if 3(mod4) ,
3/2
2
if 2 ,
1/2
31
16 16 4
1 1
2 2h h
h h
if 2(mod8) , 2 ,
1/2
3
16 16
1
2h
h
if 6(mod8) .
Lemma 2 ([4], Theorem 2). Let
2 2
2f ax bxy cy is a positive binary quadratic
form with determinant 2
ac b , ( ,2 , ) 1a b c ,
( ,2 ) 1a , 2
r , 1 12 (2 ) æ
ł , ||l
p ,
||p n
. ( ; )n f is a “sum of a generalized singular
series” corresponding to f, 2n m
, 2p ,
||l
p , ||p n
,
|
2
p n
p
u p
ł
. Then
2
|/ , 2
1/2
| , 2
( ; )
1
1 (1, )
p
up p
p p
n f
L
p p
where
1 2
2
2 2
, if 2|æ, 0 3 æ , 2|,
(mod8)m a ;
0 , if 2|æ, 0 3 æ , 2|,
(mod8)m a ,
or 0 1 æ , 2 ł ;
1
2 21 ( 1) 2
m a
æ
, if 2|æ, 2 æ ;
1 1( )
2 21 ( 1) 2
m a
æ
, if 2|æ, æ, 2|,
1 1(mod4) ;
1
22
æ
, if 2|æ, æ, 1 1(mod4) ;
1 1
1 1 1 1( 1) ( 1) 1
4 2 4 22 ( 1) 2 1 ( 1) ( 2)2
æ æ
æ
,
if 2|æ, æ, 2|, 1 1(mod4) ;
1
1 1 1( 1) ( )
4 2 21 ( 1) 2
m a
æ
, if 2|æ,
1 æ ,
2 ł , 1 1(mod4) ;
3. Teimuraz Vepkhvadze Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part - 5) June 2015, pp.01-04
www.ijera.com 3 | P a g e
1
1 1( 1) 1
4 21 ( 1) ( 1)2
æ
æ , if 2|æ,
1 æ , 2 ł , 1 1(mod4) .
1 2
22
, if 2łæ, 0 3 æ , 2|,
(mod8)m a ;
0 , if 2łæ, 0 3 æ , 2|,
(mod8)m a ,
or 0 2 æ , 2 ł ;
1 1( ) ( 1)
4 21 ( 1) 2
m a
æ
, if 2łæ, 1 æ ,
2|, (mod8)m ;
1
1 1 1( ) ( ) ( 1)
4 2 2
2 1 ( 1) 2
m a m a
æ
, if 2łæ,
1 æ , 2|, (mod4)m ;
1
1 1( ) ( 1)
4 21 ( 1) 2
m
æ
, if 2łæ, æ,
2 ł ,
1 (mod4)m a ;
1
1 1 1( ) ( ) ( 1)
4 2 21 ( 1) 2
m a m a
æ
, if 2łæ,
æ,
2 ł , 1 (mod4)m a .
1
21p
p na
p
p
, if 1l , 2 | ;
0 , if 1l , 2 ł ;
/211 1 1
2
l l
lp p l
p
p p p
,
if l , 2| l , 2 | ;
/2111 1
2
l l
lp p l
p
p p p
,
if l , 2| l , 2 ł ;
1 1( ) ( 1)
21
l l lp p na
p
p p
,
if l , 2 lł .
III. Basic results
The set of forms with discriminant –80 splits
into to genera of forms and each genus consists two
reduced classes of forms which are respectively
2 2
1 1 1 2 23 2 7f x x x x , 2 2
2 1 1 2 23 2 7f x x x x
and
2 2
3 1 220f x x , 2 2
4 1 24 5f x x .
P. Kaplan and K.S. Wiliams [6] have obtained for-
mulae for the number of representations of an even
positive integer n by the forms 3f and 4f .
It is obvious that
1 2( ; ) ( ; )r n f r n f .
Thus by Siegel’s theorem
1 2 1
1
( ; ) ( ; ) ( ; )
2
r n f r n f n f .
The function 1( ; )n f may be calculated by the
Lemma 2. So we have
Theorem 1. Let 2 5n u
, ( ,10) 1u . Then
1 2
|
1 5
( ; ) ( ; ) 1
2 5 u
u
r n f r n f
for 0 , 3(mod4)u ,
|
5
1 ( 1)
5 u
u
for 2|, 2 , 3(mod4)u ,
or
for 2 , 2 ł ,
1(mod4)u ,
0 otherwise.
The set of forms with discriminant –128 splits into
two genera of forms and each genus consists two
reduced classes of forms which are respectively
2 2
5 1 1 2 23 2 11f x x x x , 2 2
6 1 1 2 23 2 11f x x x x
and
2 2
7 1 232f x x , 2 2
8 1 1 2 24 4 9f x x x x .
P. Kaplan and K.S. Williams [8] have obtained for-
mulae for the number of representations of an even
positive integer n by the forms 6f and 7f .
It is obvious that
5 6( ; ) ( ; )r n f r n f .
Thus by Siegel’s theorem
5 6 5
1
( ; ) ( ; ) ( ; )
2
r n f r n f n f .
The function 5( ; )n f can be calculated by the
Lemma 2.
So we have
Theorem 2. Let 2n u
, ( ,2) 1u . Then
5 6
|
2
( ; ) ( ; )
u
r n f r n f
for 0 ,
3(mod8)u ,
|
2
2
u
for 2 , 3(mod8)u ,
and
for 4 , 1(mod8)u ,
or 3(mod8)u ,
0 otherwise.
4. Teimuraz Vepkhvadze Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part - 5) June 2015, pp.01-04
www.ijera.com 4 | P a g e
References
[1] C.L. Siegel, Uber die analytische theorie der
quadratischen formen. Annals of mathematics,
36, 1935, 527-606.
[2] K.G. Ramanathan, On the analytic theory of
quadratic forms, Acta Arithmetica, 21, 1972,
423-436.
[3] T.V. Vepkhvadze, On a formula of Siegel,
Acta Arithmetica, 40, 1981/82, 125-142 (in
Russian).
[4] T.V.Vepkhvadze, The representation of
numbers by positive Gaussian binary quadratic
forms. Trudy Razmadze Tbilissi Mathematical
Institute 40, 1971, 21-58 (in Russian).
[5] T. Vepkhvadze, Modular properties of theta-
functions and representation of numbers by
positive quadratic forms. Georgian
Mathematical Journal, 4, 1997, 385-400.
[6] F. Van der Blij, Binary quadratic forms of
discriminant – 23, Indagationes Mathematicae,
14, 1952, 489-503.
[7] G.A. Lomadze, On the representation of
numbers by binary diagonal quadratic forms,
Mathematical sbornik, 68, 119, 1965, 283-312
(in Russian).
[8] P. Kaplan and K.S. Williams, On the number
of representations of a positive integer by a
binary quadratic form. Acta Arithmetica, 114,
1, 2004, 87-98.