SlideShare a Scribd company logo
International Journal of Computing Algorithm, Vol 2(2), December 2013
ISSN(Print):2278-2397
Website: www.ijcoa.com
Application of Topsis Method to Analyze Causes of
Suicide Thought in Domestic Violence
M.Clement Joe Anand, A.Victor Devadoss
Department of Mathematics, Loyola College, Chennai
Email: rarjoemi@gmail.com
Abstract
Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is the best method
to find out the ideal solution of the problem. In recent years, TOPSIS has been widely applied
to many fields with good results such as marketing strategy selection, mechatronic system
optimization, network security management, location planning for urban distribution centers,
business competition evaluation, irrigation water pricing decision making, emergency
management, low carbon development evaluation, spaceflight mission planning,
Environmental Science. This is the first time we study the causes of suicidal thought in
domestic violence using TOPSIS Method. This paper has four sections. Section one gives the
introduction to the suicide thought. Second section gives the Algorithm of TOPSIS method is
explained. In section three we derive the framework of the research topic. Final section gives
the conclusion based on our study.

More Related Content

Similar to APPLICATION OF TOPSIS METHOD TO ANALYZE CAUSES OF SUICIDE THOUGHT IN DOMESTIC VIOLENCE

News document analysis by using a proficient algorithm
News document analysis by using a proficient algorithmNews document analysis by using a proficient algorithm
News document analysis by using a proficient algorithm
IJERA Editor
 
T OWARDS A S YSTEM D YNAMICS M ODELING M E- THOD B ASED ON DEMATEL
T OWARDS A  S YSTEM  D YNAMICS  M ODELING  M E- THOD B ASED ON  DEMATELT OWARDS A  S YSTEM  D YNAMICS  M ODELING  M E- THOD B ASED ON  DEMATEL
T OWARDS A S YSTEM D YNAMICS M ODELING M E- THOD B ASED ON DEMATEL
ijcsit
 
Sigcas computers and society, volume 37, no. 1, june 2007
Sigcas computers and society, volume 37, no. 1, june 2007     Sigcas computers and society, volume 37, no. 1, june 2007
Sigcas computers and society, volume 37, no. 1, june 2007
rock73
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
IJNSA Journal
 
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONGROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
ijfls
 
Greedy Incremental approach for unfolding of communities in massive networks
Greedy Incremental approach for unfolding of communities in massive networksGreedy Incremental approach for unfolding of communities in massive networks
Greedy Incremental approach for unfolding of communities in massive networks
IJCSIS Research Publications
 
A Review of Intelligent Agent Systems in Animal Health Care
A Review of Intelligent Agent Systems in Animal Health CareA Review of Intelligent Agent Systems in Animal Health Care
A Review of Intelligent Agent Systems in Animal Health Care
IJCSIS Research Publications
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
 
A review meta heuristic approaches for solving rectangle packing problem
A review meta  heuristic approaches for solving rectangle packing problemA review meta  heuristic approaches for solving rectangle packing problem
A review meta heuristic approaches for solving rectangle packing problemIAEME Publication
 
A Survey On Recent Research Areas In Computer Science
A Survey On Recent Research Areas In Computer ScienceA Survey On Recent Research Areas In Computer Science
A Survey On Recent Research Areas In Computer Science
Christine Williams
 
Application For Sentiment And Demographic Analysis Processes On Social Media
Application For Sentiment And Demographic Analysis Processes On Social MediaApplication For Sentiment And Demographic Analysis Processes On Social Media
Application For Sentiment And Demographic Analysis Processes On Social Media
Whitney Anderson
 
IRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET - Unauthorized Terror Attack Tracking System using Web Usage MiningIRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET Journal
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
healdkathaleen
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
todd271
 
Insights to Problems, Research Trend and Progress in Techniques of Sentiment ...
Insights to Problems, Research Trend and Progress in Techniques of Sentiment ...Insights to Problems, Research Trend and Progress in Techniques of Sentiment ...
Insights to Problems, Research Trend and Progress in Techniques of Sentiment ...
IJECEIAES
 
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsA Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
CSCJournals
 
fuzzy multi-criteria-decision_making_theory_and_applications
fuzzy multi-criteria-decision_making_theory_and_applicationsfuzzy multi-criteria-decision_making_theory_and_applications
fuzzy multi-criteria-decision_making_theory_and_applications
stone66
 
The Efficacy of Technology Acceptance Model: A Review of Applicable Theoretic...
The Efficacy of Technology Acceptance Model: A Review of Applicable Theoretic...The Efficacy of Technology Acceptance Model: A Review of Applicable Theoretic...
The Efficacy of Technology Acceptance Model: A Review of Applicable Theoretic...
QUESTJOURNAL
 
MOCANAR: A MULTI-OBJECTIVE CUCKOO SEARCH ALGORITHM FOR NUMERIC ASSOCIATION RU...
MOCANAR: A MULTI-OBJECTIVE CUCKOO SEARCH ALGORITHM FOR NUMERIC ASSOCIATION RU...MOCANAR: A MULTI-OBJECTIVE CUCKOO SEARCH ALGORITHM FOR NUMERIC ASSOCIATION RU...
MOCANAR: A MULTI-OBJECTIVE CUCKOO SEARCH ALGORITHM FOR NUMERIC ASSOCIATION RU...
cscpconf
 

Similar to APPLICATION OF TOPSIS METHOD TO ANALYZE CAUSES OF SUICIDE THOUGHT IN DOMESTIC VIOLENCE (20)

News document analysis by using a proficient algorithm
News document analysis by using a proficient algorithmNews document analysis by using a proficient algorithm
News document analysis by using a proficient algorithm
 
T OWARDS A S YSTEM D YNAMICS M ODELING M E- THOD B ASED ON DEMATEL
T OWARDS A  S YSTEM  D YNAMICS  M ODELING  M E- THOD B ASED ON  DEMATELT OWARDS A  S YSTEM  D YNAMICS  M ODELING  M E- THOD B ASED ON  DEMATEL
T OWARDS A S YSTEM D YNAMICS M ODELING M E- THOD B ASED ON DEMATEL
 
Sigcas computers and society, volume 37, no. 1, june 2007
Sigcas computers and society, volume 37, no. 1, june 2007     Sigcas computers and society, volume 37, no. 1, june 2007
Sigcas computers and society, volume 37, no. 1, june 2007
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONGROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
 
Greedy Incremental approach for unfolding of communities in massive networks
Greedy Incremental approach for unfolding of communities in massive networksGreedy Incremental approach for unfolding of communities in massive networks
Greedy Incremental approach for unfolding of communities in massive networks
 
A Review of Intelligent Agent Systems in Animal Health Care
A Review of Intelligent Agent Systems in Animal Health CareA Review of Intelligent Agent Systems in Animal Health Care
A Review of Intelligent Agent Systems in Animal Health Care
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
A review meta heuristic approaches for solving rectangle packing problem
A review meta  heuristic approaches for solving rectangle packing problemA review meta  heuristic approaches for solving rectangle packing problem
A review meta heuristic approaches for solving rectangle packing problem
 
A Survey On Recent Research Areas In Computer Science
A Survey On Recent Research Areas In Computer ScienceA Survey On Recent Research Areas In Computer Science
A Survey On Recent Research Areas In Computer Science
 
Application For Sentiment And Demographic Analysis Processes On Social Media
Application For Sentiment And Demographic Analysis Processes On Social MediaApplication For Sentiment And Demographic Analysis Processes On Social Media
Application For Sentiment And Demographic Analysis Processes On Social Media
 
IRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET - Unauthorized Terror Attack Tracking System using Web Usage MiningIRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
 
Insights to Problems, Research Trend and Progress in Techniques of Sentiment ...
Insights to Problems, Research Trend and Progress in Techniques of Sentiment ...Insights to Problems, Research Trend and Progress in Techniques of Sentiment ...
Insights to Problems, Research Trend and Progress in Techniques of Sentiment ...
 
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsA Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
 
fuzzy multi-criteria-decision_making_theory_and_applications
fuzzy multi-criteria-decision_making_theory_and_applicationsfuzzy multi-criteria-decision_making_theory_and_applications
fuzzy multi-criteria-decision_making_theory_and_applications
 
The Efficacy of Technology Acceptance Model: A Review of Applicable Theoretic...
The Efficacy of Technology Acceptance Model: A Review of Applicable Theoretic...The Efficacy of Technology Acceptance Model: A Review of Applicable Theoretic...
The Efficacy of Technology Acceptance Model: A Review of Applicable Theoretic...
 
MOCANAR: A MULTI-OBJECTIVE CUCKOO SEARCH ALGORITHM FOR NUMERIC ASSOCIATION RU...
MOCANAR: A MULTI-OBJECTIVE CUCKOO SEARCH ALGORITHM FOR NUMERIC ASSOCIATION RU...MOCANAR: A MULTI-OBJECTIVE CUCKOO SEARCH ALGORITHM FOR NUMERIC ASSOCIATION RU...
MOCANAR: A MULTI-OBJECTIVE CUCKOO SEARCH ALGORITHM FOR NUMERIC ASSOCIATION RU...
 

More from ijcoa

SPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
SPSS: An Effective Tool to Compute Learning Outcomes in AcadamicsSPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
SPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
ijcoa
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
ijcoa
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS Technique
ijcoa
 
Analysis of Women Harassment in Villages Using CETD Matrix Modal
Analysis of Women Harassment in Villages Using CETD Matrix ModalAnalysis of Women Harassment in Villages Using CETD Matrix Modal
Analysis of Women Harassment in Villages Using CETD Matrix Modal
ijcoa
 
Solving Assignment Problem Using L-R Fuzzy Numbers
Solving Assignment Problem Using L-R Fuzzy NumbersSolving Assignment Problem Using L-R Fuzzy Numbers
Solving Assignment Problem Using L-R Fuzzy Numbers
ijcoa
 
Fuzzy Chroamtic Number of Line Graph using α-Cuts
Fuzzy Chroamtic Number of Line Graph using α-CutsFuzzy Chroamtic Number of Line Graph using α-Cuts
Fuzzy Chroamtic Number of Line Graph using α-Cuts
ijcoa
 
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
ijcoa
 
Dual Trapezoidal Fuzzy Number and its Applications
Dual Trapezoidal Fuzzy Number and its ApplicationsDual Trapezoidal Fuzzy Number and its Applications
Dual Trapezoidal Fuzzy Number and its Applications
ijcoa
 
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
ijcoa
 
Saturation Index of π(D(r,s))
Saturation Index of π(D(r,s))Saturation Index of π(D(r,s))
Saturation Index of π(D(r,s))
ijcoa
 
Classification and Prediction of Heart Disease from Diabetes Patients using H...
Classification and Prediction of Heart Disease from Diabetes Patients using H...Classification and Prediction of Heart Disease from Diabetes Patients using H...
Classification and Prediction of Heart Disease from Diabetes Patients using H...
ijcoa
 
Format Preserving Encryption for Small Domain
Format Preserving Encryption for Small DomainFormat Preserving Encryption for Small Domain
Format Preserving Encryption for Small Domain
ijcoa
 
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
ijcoa
 
Clustering and Classification in Support of Climatology to mine Weather Data ...
Clustering and Classification in Support of Climatology to mine Weather Data ...Clustering and Classification in Support of Climatology to mine Weather Data ...
Clustering and Classification in Support of Climatology to mine Weather Data ...
ijcoa
 
Test Suite Reduction Based on Fault Detection with Cost Optimization
Test Suite Reduction Based on Fault Detection with Cost OptimizationTest Suite Reduction Based on Fault Detection with Cost Optimization
Test Suite Reduction Based on Fault Detection with Cost Optimization
ijcoa
 
Artifact Facet Ranking and It’s Applications
Artifact Facet Ranking and It’s ApplicationsArtifact Facet Ranking and It’s Applications
Artifact Facet Ranking and It’s Applications
ijcoa
 
Effectual Data Integrity Checking Technique Based on Number Theory
Effectual Data Integrity Checking Technique Based on Number TheoryEffectual Data Integrity Checking Technique Based on Number Theory
Effectual Data Integrity Checking Technique Based on Number Theory
ijcoa
 
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brain
Micro-Neuro-Sensor Recording of STN Neurons of the Human BrainMicro-Neuro-Sensor Recording of STN Neurons of the Human Brain
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brain
ijcoa
 
EDM: Finding Answers to Reduce Dropout Rates in Schools
EDM: Finding Answers to Reduce Dropout Rates in SchoolsEDM: Finding Answers to Reduce Dropout Rates in Schools
EDM: Finding Answers to Reduce Dropout Rates in Schools
ijcoa
 
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...
Analysis of Effort Estimation Model in Traditional and Agile  (USING METRICS ...Analysis of Effort Estimation Model in Traditional and Agile  (USING METRICS ...
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...
ijcoa
 

More from ijcoa (20)

SPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
SPSS: An Effective Tool to Compute Learning Outcomes in AcadamicsSPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
SPSS: An Effective Tool to Compute Learning Outcomes in Acadamics
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS Technique
 
Analysis of Women Harassment in Villages Using CETD Matrix Modal
Analysis of Women Harassment in Villages Using CETD Matrix ModalAnalysis of Women Harassment in Villages Using CETD Matrix Modal
Analysis of Women Harassment in Villages Using CETD Matrix Modal
 
Solving Assignment Problem Using L-R Fuzzy Numbers
Solving Assignment Problem Using L-R Fuzzy NumbersSolving Assignment Problem Using L-R Fuzzy Numbers
Solving Assignment Problem Using L-R Fuzzy Numbers
 
Fuzzy Chroamtic Number of Line Graph using α-Cuts
Fuzzy Chroamtic Number of Line Graph using α-CutsFuzzy Chroamtic Number of Line Graph using α-Cuts
Fuzzy Chroamtic Number of Line Graph using α-Cuts
 
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
A Study on the Exposures of Rag- Pickers Using Induced Neutrosophic Cognitive...
 
Dual Trapezoidal Fuzzy Number and its Applications
Dual Trapezoidal Fuzzy Number and its ApplicationsDual Trapezoidal Fuzzy Number and its Applications
Dual Trapezoidal Fuzzy Number and its Applications
 
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
Developing and Porting multi-grid solver for CFD application on Intel-MIC pla...
 
Saturation Index of π(D(r,s))
Saturation Index of π(D(r,s))Saturation Index of π(D(r,s))
Saturation Index of π(D(r,s))
 
Classification and Prediction of Heart Disease from Diabetes Patients using H...
Classification and Prediction of Heart Disease from Diabetes Patients using H...Classification and Prediction of Heart Disease from Diabetes Patients using H...
Classification and Prediction of Heart Disease from Diabetes Patients using H...
 
Format Preserving Encryption for Small Domain
Format Preserving Encryption for Small DomainFormat Preserving Encryption for Small Domain
Format Preserving Encryption for Small Domain
 
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
Intuitionistic Double Layered Fuzzy Graph and its Cartesian Product Vertex De...
 
Clustering and Classification in Support of Climatology to mine Weather Data ...
Clustering and Classification in Support of Climatology to mine Weather Data ...Clustering and Classification in Support of Climatology to mine Weather Data ...
Clustering and Classification in Support of Climatology to mine Weather Data ...
 
Test Suite Reduction Based on Fault Detection with Cost Optimization
Test Suite Reduction Based on Fault Detection with Cost OptimizationTest Suite Reduction Based on Fault Detection with Cost Optimization
Test Suite Reduction Based on Fault Detection with Cost Optimization
 
Artifact Facet Ranking and It’s Applications
Artifact Facet Ranking and It’s ApplicationsArtifact Facet Ranking and It’s Applications
Artifact Facet Ranking and It’s Applications
 
Effectual Data Integrity Checking Technique Based on Number Theory
Effectual Data Integrity Checking Technique Based on Number TheoryEffectual Data Integrity Checking Technique Based on Number Theory
Effectual Data Integrity Checking Technique Based on Number Theory
 
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brain
Micro-Neuro-Sensor Recording of STN Neurons of the Human BrainMicro-Neuro-Sensor Recording of STN Neurons of the Human Brain
Micro-Neuro-Sensor Recording of STN Neurons of the Human Brain
 
EDM: Finding Answers to Reduce Dropout Rates in Schools
EDM: Finding Answers to Reduce Dropout Rates in SchoolsEDM: Finding Answers to Reduce Dropout Rates in Schools
EDM: Finding Answers to Reduce Dropout Rates in Schools
 
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...
Analysis of Effort Estimation Model in Traditional and Agile  (USING METRICS ...Analysis of Effort Estimation Model in Traditional and Agile  (USING METRICS ...
Analysis of Effort Estimation Model in Traditional and Agile (USING METRICS ...
 

Recently uploaded

SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdfSCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SELF-EXPLANATORY
 
Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
muralinath2
 
Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.
Nistarini College, Purulia (W.B) India
 
Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
SAMIR PANDA
 
Leaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdfLeaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdf
RenuJangid3
 
Hemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptxHemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptx
muralinath2
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
ChetanK57
 
Richard's entangled aventures in wonderland
Richard's entangled aventures in wonderlandRichard's entangled aventures in wonderland
Richard's entangled aventures in wonderland
Richard Gill
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
muralinath2
 
Lateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensiveLateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensive
silvermistyshot
 
Lab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerinLab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerin
ossaicprecious19
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
kumarmathi863
 
filosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptxfilosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptx
IvanMallco1
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
IqrimaNabilatulhusni
 
erythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptxerythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptx
muralinath2
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Erdal Coalmaker
 
Cancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate PathwayCancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate Pathway
AADYARAJPANDEY1
 
platelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptxplatelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptx
muralinath2
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
muralinath2
 
role of pramana in research.pptx in science
role of pramana in research.pptx in sciencerole of pramana in research.pptx in science
role of pramana in research.pptx in science
sonaliswain16
 

Recently uploaded (20)

SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdfSCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
 
Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
 
Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.
 
Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
 
Leaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdfLeaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdf
 
Hemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptxHemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptx
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
 
Richard's entangled aventures in wonderland
Richard's entangled aventures in wonderlandRichard's entangled aventures in wonderland
Richard's entangled aventures in wonderland
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
 
Lateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensiveLateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensive
 
Lab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerinLab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerin
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
 
filosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptxfilosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptx
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
 
erythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptxerythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptx
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
 
Cancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate PathwayCancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate Pathway
 
platelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptxplatelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptx
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
 
role of pramana in research.pptx in science
role of pramana in research.pptx in sciencerole of pramana in research.pptx in science
role of pramana in research.pptx in science
 

APPLICATION OF TOPSIS METHOD TO ANALYZE CAUSES OF SUICIDE THOUGHT IN DOMESTIC VIOLENCE

  • 1. International Journal of Computing Algorithm, Vol 2(2), December 2013 ISSN(Print):2278-2397 Website: www.ijcoa.com Application of Topsis Method to Analyze Causes of Suicide Thought in Domestic Violence M.Clement Joe Anand, A.Victor Devadoss Department of Mathematics, Loyola College, Chennai Email: rarjoemi@gmail.com Abstract Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is the best method to find out the ideal solution of the problem. In recent years, TOPSIS has been widely applied to many fields with good results such as marketing strategy selection, mechatronic system optimization, network security management, location planning for urban distribution centers, business competition evaluation, irrigation water pricing decision making, emergency management, low carbon development evaluation, spaceflight mission planning, Environmental Science. This is the first time we study the causes of suicidal thought in domestic violence using TOPSIS Method. This paper has four sections. Section one gives the introduction to the suicide thought. Second section gives the Algorithm of TOPSIS method is explained. In section three we derive the framework of the research topic. Final section gives the conclusion based on our study.