The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
1) EIRDH-P combines public key cryptography and steganography by encrypting images and embedding secret messages within the encrypted images.
2) It involves an Image Provider who encrypts a cover image using public key encryption. A Data Hider then embeds a secret message within the encrypted image.
3) The receiver decrypts the stego-image to extract the secret message and recover the original cover image using their private key.
The International Journal of Engineering and Sciencetheijes
This document summarizes a research paper that proposes a block cipher involving a key matrix and key bunch matrix supplemented with permutation. The cipher encrypts a plaintext matrix using modular multiplication with the key matrices over 256. It adds a permutation function that circularly rotates and swaps bits in the plaintext matrix in each round. Cryptanalysis showed the cipher cannot be broken by general attacks. The decryption uses the inverse key matrix and multiplicative inverse of the encryption key bunch matrix.
The document contains the details of a mathematics exam paper consisting of 4 questions. Question 1 has 10 sub-parts asking students to attempt various calculus, multivariable calculus and vector calculus problems. Question 2 and 3 have 3 sub-parts each asking students to attempt 2 out of 3 problems involving limits, derivatives and integrals. Question 4 has 2 sub-parts involving further calculus problems. The document provides instructions to students regarding compulsory questions and marking schemes. It also mentions the exam code, subject and pattern.
Signyourd digital signature certificate providerKishankant Yadav
a digital code (generated and authenticated by public key encryption) which is attached to an electronically transmitted document to verify its contents and the sender's identity.
This definition explains how digital signatures work and what they are used for. Learn about the mathematical underpinnings of digital signature technology
A digital signature is basically a way to ensure that an electronic document (e-mail, spreadsheet, text file, etc.) is authentic. Authentic means that you know who created the document and you know that it has not been altered in any way since that person created it.
https://signyourdoc.com/
This document summarizes a presentation about monads in Scala. It discusses how monads allow structuring computations and combining them. Some key monads described include Option for handling failures, State for managing state, and Identity. For comprehensions in Scala emulate do notation in Haskell. Monads are demonstrated through an evaluator for arithmetic expressions that uses different monadic types like Identity, Option and State.
This document contains a 20 question multiple choice quiz on computer science topics. The questions cover areas like algorithms, data structures, complexity analysis, logic, automata theory and databases. Sample questions ask about the minimum number of multiplications needed to evaluate a polynomial, the expected value of the smallest number in a random sample, and the recovery procedure after a database system crash during transaction logging.
The document discusses finite fields and related algebraic concepts. It begins by defining groups, rings, and fields. It then focuses on finite fields, particularly GF(p) fields consisting of integers modulo a prime p. It discusses finding multiplicative inverses in such fields using the extended Euclidean algorithm. As an example, it finds the inverse of 550 modulo 1759.
1) EIRDH-P combines public key cryptography and steganography by encrypting images and embedding secret messages within the encrypted images.
2) It involves an Image Provider who encrypts a cover image using public key encryption. A Data Hider then embeds a secret message within the encrypted image.
3) The receiver decrypts the stego-image to extract the secret message and recover the original cover image using their private key.
The International Journal of Engineering and Sciencetheijes
This document summarizes a research paper that proposes a block cipher involving a key matrix and key bunch matrix supplemented with permutation. The cipher encrypts a plaintext matrix using modular multiplication with the key matrices over 256. It adds a permutation function that circularly rotates and swaps bits in the plaintext matrix in each round. Cryptanalysis showed the cipher cannot be broken by general attacks. The decryption uses the inverse key matrix and multiplicative inverse of the encryption key bunch matrix.
The document contains the details of a mathematics exam paper consisting of 4 questions. Question 1 has 10 sub-parts asking students to attempt various calculus, multivariable calculus and vector calculus problems. Question 2 and 3 have 3 sub-parts each asking students to attempt 2 out of 3 problems involving limits, derivatives and integrals. Question 4 has 2 sub-parts involving further calculus problems. The document provides instructions to students regarding compulsory questions and marking schemes. It also mentions the exam code, subject and pattern.
Signyourd digital signature certificate providerKishankant Yadav
a digital code (generated and authenticated by public key encryption) which is attached to an electronically transmitted document to verify its contents and the sender's identity.
This definition explains how digital signatures work and what they are used for. Learn about the mathematical underpinnings of digital signature technology
A digital signature is basically a way to ensure that an electronic document (e-mail, spreadsheet, text file, etc.) is authentic. Authentic means that you know who created the document and you know that it has not been altered in any way since that person created it.
https://signyourdoc.com/
This document summarizes a presentation about monads in Scala. It discusses how monads allow structuring computations and combining them. Some key monads described include Option for handling failures, State for managing state, and Identity. For comprehensions in Scala emulate do notation in Haskell. Monads are demonstrated through an evaluator for arithmetic expressions that uses different monadic types like Identity, Option and State.
This document contains a 20 question multiple choice quiz on computer science topics. The questions cover areas like algorithms, data structures, complexity analysis, logic, automata theory and databases. Sample questions ask about the minimum number of multiplications needed to evaluate a polynomial, the expected value of the smallest number in a random sample, and the recovery procedure after a database system crash during transaction logging.
The document discusses finite fields and related algebraic concepts. It begins by defining groups, rings, and fields. It then focuses on finite fields, particularly GF(p) fields consisting of integers modulo a prime p. It discusses finding multiplicative inverses in such fields using the extended Euclidean algorithm. As an example, it finds the inverse of 550 modulo 1759.
My PhD talk "Application of H-matrices for computing partial inverse"Alexander Litvinenko
This document describes a hierarchical domain decomposition (HDD) method for solving stochastic elliptic boundary value problems with oscillatory or jumping coefficients. HDD constructs mappings between boundary and interface values that allow the solution to be computed locally in each subdomain. These mappings are represented as H-matrices to reduce computational costs. The total storage cost of HDD is O(kn log2nh) and complexity is O(k2nh log3nh), where n is the number of degrees of freedom, k is the H-matrix rank, and h is the mesh size. HDD can also be used to compute solutions when the right-hand side is represented on a coarser grid.
The document contains instructions for a mathematics exam consisting of 3 sections (A, B, C). Section A has 10 1-mark questions. Section B has 12 4-mark questions. Section C has 7 6-mark questions. Calculators are not permitted. Questions can have either internal choice or no choice. The document provides 10 sample 1-mark questions from Section A to illustrate the format and difficulty level.
This document summarizes research on using elliptic curve cryptography based on imaginary quadratic orders. It shows that for elliptic curves over a finite field Fq, if q satisfies certain conditions, the elliptic curve discrete logarithm problem can be reduced to the discrete logarithm problem over the finite field Fp2. This allows the elliptic curve discrete logarithm problem to potentially be solved faster. It then provides examples of how to construct "weak curves" that satisfy the necessary conditions.
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Marisa Paryasto
This document discusses implementing elliptic curve cryptography using composite fields. It proposes using a 299-bit key represented in the composite field GF((213)23) instead of the conventional GF(2299). This breaks the finite field multiplication into smaller chunks by dividing the field into a ground field and extension field. A lookup table is used for multiplication in the ground field GF(213) while a classic multiplier is used for the extension field GF(23). This composite field approach aims to provide better time and area efficiency for implementation on FPGAs compared to a single large multiplier. The document provides background on elliptic curves, finite fields, and previous work on composite field representations.
The document contains code for several engineering design problems in MATLAB. It includes code to:
1. Design a shaft given inputs of power, rpm, allowable stress, factor of safety, length, and density. It calculates the shaft diameter and weight.
2. Calculate the material saving if a hollow shaft is used instead of a solid shaft, assuming the same input parameters from the first problem.
3. The code demonstrates other engineering design problems can be solved programmatically in MATLAB, such as calculating shape dimensions based on inputs and performing structural analysis calculations.
The document discusses binary index trees (also called Fenwick trees) and segment trees, which are data structures that allow efficient querying of array prefixes and intervals. Binary index trees support adding values to array elements and retrieving prefix sums in O(log n) time. Segment trees similarly support adding values and finding maximum/minimum values in intervals in O(log n) time. Both achieve faster query times than naive solutions by representing the array as a tree structure.
Star, a wild bird, learned to count up to 8 on her own and discovered that numbers can be represented in different ways like 4+4 or 2+2+2+2, showing she was thinking about numbers consciously. She could also recognize number names and remember their sounds. Star showed unusual intelligence for a wild bird in her self-motivated pursuit of numerical science.
The document contains 98 multiple choice questions related to mathematics topics like sets, relations, functions, coordinate geometry, and algebra. Specifically, it tests knowledge of concepts like elements and subsets of sets, Cartesian coordinate planes, linear and quadratic equations, and their solution sets. It also includes questions about arithmetic and geometric sequences, factorials, and trigonometric functions.
This document contains 27 multiple choice questions regarding number systems, Boolean algebra, logic gates and digital circuits. The questions cover topics such as binary, hexadecimal and decimal conversions; Boolean expressions and logic functions; logic gates; and basic digital circuits. Sample questions include the decimal equivalent of a binary number, Boolean expressions for logic functions, minimum number of gates needed for an implementation, and output waveforms of simple circuits.
The document describes a computer graphics lab and contains programs to perform various graphics functions in C++ using graphics libraries. It includes 14 programs to:
1) Draw a line using the DDA algorithm
2) Draw a scenery using 20 graphics functions such as lines, circles, rectangles
3) Draw a circle using Bresenham's circle drawing algorithm
The document provides examples of C++ functions that accept integer arrays as arguments and rearrange or modify the elements in various ways. One function converts a 1D array into a 2D array by assigning elements to rows and columns. Another replaces even elements with half their value and odd elements with double their value. A third swaps elements of even and odd indices. The examples demonstrate functions that rearrange arrays in reverse order or sort structures by a field using bubble sort.
Basic galois field arithmatics required for error control codesMadhumita Tamhane
Knowledge of Galois Fields is must for understanding Error Control Codes. This presentation undertakes concepts of Galois Field required for understanding Error Control Codes in very simple manner, explaining its complex mathematical intricacies in a structured manner.
This week, Luke Pearson (Polychain Capital) and Joshua Fitzgerald (Anoma) present their work on Plonkup, a protocol that combines Plookup and PLONK into a single, efficient protocol. The protocol relies on a new hash function, called Reinforced Concrete, written by Dmitry Khovratovich. The three of them will present their work together at this week's edition of zkStudyClub!
Slides:
---
To Follow the Zero Knowledge Podcast us at https://www.zeroknowledge.fm
To the listeners of Zero Knowledge Podcast, if you like what we do:
- Follow us on Twitter - @zeroknowledgefm
- Join us on Telegram - https://t.me/joinchat/TORo7aknkYNLHmCM
- Support our Gitcoin Grant - https://gitcoin.co/grants/329/zero-knowledge-podcast-2
- Support us on Patreon - https://www.patreon.com/zeroknowledge
The document presents an orthogonal decomposition of the Hilbert space L2(I) over the unit interval I = [0,1]. It establishes that L2(I) can be written as the orthogonal direct sum of two closed subspaces: A2(I), the space of square integrable functions whose first derivative is zero, and the image of the derivative operator applied to a traceless Sobolev space W1,2_0(I). It defines the corresponding projection operators and proves several properties, including that the projections are idempotent and their images are orthogonal. It also provides examples that illustrate the decomposition for some elementary functions.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The International Journal of Engineering and Sciencetheijes
1. The study used DNA barcoding to identify nine medicinal plant species using sequencing of the internal transcribed spacer (ITS) region of nuclear ribosomal DNA.
2. DNA was extracted from the plants and the ITS region was amplified via PCR and sequenced. The ITS sequences were then aligned and analyzed to identify unique patterns for each species.
3. Restriction digestion of the ITS region with EcoRV also produced unique banding patterns that could be used to identify each species. The study demonstrated that DNA barcoding using the ITS region is an effective tool for authentic identification of medicinal plants.
Analysis of the skill of a world-class alpine ski racer by using a 3D CAD systemtheijes
Heavy snow areas account for about 50% of the total land area of Japan. Extension of healthy life expectancy is an important issue for residents of heavy snow areas because most of these areas in Japan are depopulated areas. Skiing is a possible lifelong sport in heavy snow areas because gravity rather than muscular power is mainly utilized in skiing. However, in Japan, the number of skiers has declined to 30% of the peak number. This study was conducted with the aim of recovery of the popularity of skiing, and establishing skiing as lifelong winter sport. World-level success of Japanese alpine ski racers is an important factor for the recovery of the popularity of skiing. In this study, the skill of an alpine ski racer was investigated by using a 3D CAD model of a skier with focus on joint work and energy balance in the turn motion.
My PhD talk "Application of H-matrices for computing partial inverse"Alexander Litvinenko
This document describes a hierarchical domain decomposition (HDD) method for solving stochastic elliptic boundary value problems with oscillatory or jumping coefficients. HDD constructs mappings between boundary and interface values that allow the solution to be computed locally in each subdomain. These mappings are represented as H-matrices to reduce computational costs. The total storage cost of HDD is O(kn log2nh) and complexity is O(k2nh log3nh), where n is the number of degrees of freedom, k is the H-matrix rank, and h is the mesh size. HDD can also be used to compute solutions when the right-hand side is represented on a coarser grid.
The document contains instructions for a mathematics exam consisting of 3 sections (A, B, C). Section A has 10 1-mark questions. Section B has 12 4-mark questions. Section C has 7 6-mark questions. Calculators are not permitted. Questions can have either internal choice or no choice. The document provides 10 sample 1-mark questions from Section A to illustrate the format and difficulty level.
This document summarizes research on using elliptic curve cryptography based on imaginary quadratic orders. It shows that for elliptic curves over a finite field Fq, if q satisfies certain conditions, the elliptic curve discrete logarithm problem can be reduced to the discrete logarithm problem over the finite field Fp2. This allows the elliptic curve discrete logarithm problem to potentially be solved faster. It then provides examples of how to construct "weak curves" that satisfy the necessary conditions.
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Marisa Paryasto
This document discusses implementing elliptic curve cryptography using composite fields. It proposes using a 299-bit key represented in the composite field GF((213)23) instead of the conventional GF(2299). This breaks the finite field multiplication into smaller chunks by dividing the field into a ground field and extension field. A lookup table is used for multiplication in the ground field GF(213) while a classic multiplier is used for the extension field GF(23). This composite field approach aims to provide better time and area efficiency for implementation on FPGAs compared to a single large multiplier. The document provides background on elliptic curves, finite fields, and previous work on composite field representations.
The document contains code for several engineering design problems in MATLAB. It includes code to:
1. Design a shaft given inputs of power, rpm, allowable stress, factor of safety, length, and density. It calculates the shaft diameter and weight.
2. Calculate the material saving if a hollow shaft is used instead of a solid shaft, assuming the same input parameters from the first problem.
3. The code demonstrates other engineering design problems can be solved programmatically in MATLAB, such as calculating shape dimensions based on inputs and performing structural analysis calculations.
The document discusses binary index trees (also called Fenwick trees) and segment trees, which are data structures that allow efficient querying of array prefixes and intervals. Binary index trees support adding values to array elements and retrieving prefix sums in O(log n) time. Segment trees similarly support adding values and finding maximum/minimum values in intervals in O(log n) time. Both achieve faster query times than naive solutions by representing the array as a tree structure.
Star, a wild bird, learned to count up to 8 on her own and discovered that numbers can be represented in different ways like 4+4 or 2+2+2+2, showing she was thinking about numbers consciously. She could also recognize number names and remember their sounds. Star showed unusual intelligence for a wild bird in her self-motivated pursuit of numerical science.
The document contains 98 multiple choice questions related to mathematics topics like sets, relations, functions, coordinate geometry, and algebra. Specifically, it tests knowledge of concepts like elements and subsets of sets, Cartesian coordinate planes, linear and quadratic equations, and their solution sets. It also includes questions about arithmetic and geometric sequences, factorials, and trigonometric functions.
This document contains 27 multiple choice questions regarding number systems, Boolean algebra, logic gates and digital circuits. The questions cover topics such as binary, hexadecimal and decimal conversions; Boolean expressions and logic functions; logic gates; and basic digital circuits. Sample questions include the decimal equivalent of a binary number, Boolean expressions for logic functions, minimum number of gates needed for an implementation, and output waveforms of simple circuits.
The document describes a computer graphics lab and contains programs to perform various graphics functions in C++ using graphics libraries. It includes 14 programs to:
1) Draw a line using the DDA algorithm
2) Draw a scenery using 20 graphics functions such as lines, circles, rectangles
3) Draw a circle using Bresenham's circle drawing algorithm
The document provides examples of C++ functions that accept integer arrays as arguments and rearrange or modify the elements in various ways. One function converts a 1D array into a 2D array by assigning elements to rows and columns. Another replaces even elements with half their value and odd elements with double their value. A third swaps elements of even and odd indices. The examples demonstrate functions that rearrange arrays in reverse order or sort structures by a field using bubble sort.
Basic galois field arithmatics required for error control codesMadhumita Tamhane
Knowledge of Galois Fields is must for understanding Error Control Codes. This presentation undertakes concepts of Galois Field required for understanding Error Control Codes in very simple manner, explaining its complex mathematical intricacies in a structured manner.
This week, Luke Pearson (Polychain Capital) and Joshua Fitzgerald (Anoma) present their work on Plonkup, a protocol that combines Plookup and PLONK into a single, efficient protocol. The protocol relies on a new hash function, called Reinforced Concrete, written by Dmitry Khovratovich. The three of them will present their work together at this week's edition of zkStudyClub!
Slides:
---
To Follow the Zero Knowledge Podcast us at https://www.zeroknowledge.fm
To the listeners of Zero Knowledge Podcast, if you like what we do:
- Follow us on Twitter - @zeroknowledgefm
- Join us on Telegram - https://t.me/joinchat/TORo7aknkYNLHmCM
- Support our Gitcoin Grant - https://gitcoin.co/grants/329/zero-knowledge-podcast-2
- Support us on Patreon - https://www.patreon.com/zeroknowledge
The document presents an orthogonal decomposition of the Hilbert space L2(I) over the unit interval I = [0,1]. It establishes that L2(I) can be written as the orthogonal direct sum of two closed subspaces: A2(I), the space of square integrable functions whose first derivative is zero, and the image of the derivative operator applied to a traceless Sobolev space W1,2_0(I). It defines the corresponding projection operators and proves several properties, including that the projections are idempotent and their images are orthogonal. It also provides examples that illustrate the decomposition for some elementary functions.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The International Journal of Engineering and Sciencetheijes
1. The study used DNA barcoding to identify nine medicinal plant species using sequencing of the internal transcribed spacer (ITS) region of nuclear ribosomal DNA.
2. DNA was extracted from the plants and the ITS region was amplified via PCR and sequenced. The ITS sequences were then aligned and analyzed to identify unique patterns for each species.
3. Restriction digestion of the ITS region with EcoRV also produced unique banding patterns that could be used to identify each species. The study demonstrated that DNA barcoding using the ITS region is an effective tool for authentic identification of medicinal plants.
Analysis of the skill of a world-class alpine ski racer by using a 3D CAD systemtheijes
Heavy snow areas account for about 50% of the total land area of Japan. Extension of healthy life expectancy is an important issue for residents of heavy snow areas because most of these areas in Japan are depopulated areas. Skiing is a possible lifelong sport in heavy snow areas because gravity rather than muscular power is mainly utilized in skiing. However, in Japan, the number of skiers has declined to 30% of the peak number. This study was conducted with the aim of recovery of the popularity of skiing, and establishing skiing as lifelong winter sport. World-level success of Japanese alpine ski racers is an important factor for the recovery of the popularity of skiing. In this study, the skill of an alpine ski racer was investigated by using a 3D CAD model of a skier with focus on joint work and energy balance in the turn motion.
Ethnobotanical documentation of some plants among Igala people of Kogi Statetheijes
This document summarizes an ethnobotanical study conducted among the Igala people of Kogi State, Nigeria. The researchers documented 130 plant species from 53 families that are used for ethnomedicinal and cultural purposes. Some key findings include:
- Many plant species have multiple uses as medicines and for other cultural activities. Leaves are the most commonly used plant part.
- Younger generations have less knowledge about the traditional uses of plants, threatening the loss of important indigenous knowledge.
- Proper documentation is needed to preserve ethnobotanical knowledge and promote conservation of local biodiversity for future generations.
Causes of Failure in Storage Facilities and Their Supportstheijes
Storage tanks in metallic or plastic forms are meant for storing water or other liquid substances for use either in industrial or domestic applications. This work looks into where failure occurs in metallic storage tanks, how there occur and why they occur. This study was important in other to proffer solutions and recommendations to the causes of failure recorded. The area of study was in Kaduna State, Nigeria, where four storage tanks were examined. The major causes of failure recorded were failure due to corrosion, failure due to malfunction of part, failure due to wrong construction methods among others. With corrosion of parts ranking highest on failure types, it was recommended that anti- corrosive materials like aluminum or stainless steel should be used for constructing storage tanks and their supports and when using mild steel materials it should be well protected using red oxide paint or hydrophobic polyester coatings.
Selection of Plastics by Design of Experimentstheijes
This work shows the optimization of two different types of plastic materials to measure a response variable, in order to select the best material that accomplishes the customer´s requirements in a company in the appliances sector. Factorial designs are an effective tool applied to compare two or more materials in order to choose the one that best accomplishes the requirement. The 24 factorial experimental design aims to study the effect of various factors on one or more response variables when it is necessary to know all factors. Factors considered in this case were: plasticity temperature, pigment, injection time and injection pressure. The objective of this work was to minimize weight as the response variable, this study was conducted between two plastics types: low-density polyethylene and nylon. The response variable was studied by an analysis of variance (ANOVA) and the equation of regression was obtained, to find the best array that optimizes both plastics separately with their different operating conditions and the customer can define which plastic is better taking decision based on the design of experiment as a powerful and effective tool that accomplishes the requirements. The results revealed that the most suitable plastic material is polyethylene because it fits with the specification that the client request.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Assessment of mortality and morbidity risks due to the consumption of some sa...theijes
This study assessed the mortality and morbidity risks from consuming sachet drinking waters produced in Abidjan, Côte d'Ivoire. Natural radioactivity measurements of 60 sachet water samples from 15 enterprises found concentrations of 40K, 226Ra, and 232Th ranging from 0.87-5.70 Bq/L, 0.16-0.47 Bq/L, and 0.17-0.60 Bq/L respectively. The estimated annual effective doses from ingesting these radionuclides were 45.48-113.07 μSv/y, with mortality and morbidity risks of 4.94×10-5 to 1.17×10-4 and
The International Journal of Engineering and Sciencetheijes
This document presents a method for identifying weak nodes and branches in electric power systems using metric projections. Metric projections are applied to the Jacobian matrix from a state estimator to calculate distances between nodes. Results show the voltages at each node decrease as reactive power is increased at one node. Metric projections identify nodes 1, 3 and 4 as weak based on their distances from other nodes in the Jacobian matrix. This technique can help utilities improve reactive power support and transmission capacity by identifying stressed areas of the system.
The International Journal of Engineering and Sciencetheijes
1. The document analyzes the behavior of transmission probability in a single rectangular potential barrier where the barrier height and width are scaled by a common factor such that their product remains constant.
2. Expressions for transmission probability are derived for three cases: particle energy greater than, equal to, and less than the barrier energy. Approximations are used to express transmission probability in terms of the constant barrier height-width product.
3. The results show that transmission probability remains constant for particle energy greater than and less than the barrier energy. However, transmission probability decreases with decreasing particle energy when it is equal to the barrier energy.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Organizational Structure and Software Project Success: Implications of the Me...theijes
This study examined the relationship between organizational structure (complexity, formalization, and centralization) and software project success, and whether organizational culture mediates this relationship. A survey was administered to 89 professionals from 10 banks to assess these variables. Results found the dimensions of organizational structure were significantly related to project success. However, organizational culture did not significantly mediate the relationship between organizational structure and project success. The study aims to contribute to understanding how organizational factors influence software project outcomes.
Research, Development Intelligent HVAC Control System Using Fuzzy Logic Contr...theijes
The paper describes an automatic climate in offices, describes the principles of the automation equipment climate, considered air parameters described control algorithms were compared automation system PIDcontroller and using fuzzy logic controller is designed microclimate model in Mathlab program with a fuzzy logic controller.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The International Journal of Engineering and Sciencetheijes
1. The document summarizes observations from the CALLISTO spectrometer of type III and U bursts associated with an M7.9 solar flare on March 9th, 2012.
2. Analysis showed an inverted type U burst occurred between 310-384 MHz within 1 second, preceded by a group of type III bursts.
3. The bursts were associated with an M6 flare in Active Region 1429, and a halo coronal mass ejection was also observed.
An IntelligentMPPT Method For PV Systems Operating Under Real Environmental C...theijes
The sun irradiance (G) and temperature (T) are the two main factors that affect the output power gained from the photovoltaic (PV) DC–DC converter. Therefore, to enhance the performance of the overall system; a mechanism to track the maximum power point (MPP) is required. Conventional maximum power point tracking approaches, such as observation and perturbation technique, experience difficulty in identifying the true MPP. Therefore, intelligent systems including fuzzy logic controllers (FLC) are introduced for the maximum power point tracking system (MPPT). The selection of the membership functions (MFs) and the fuzzy sets (FSs) numbers are crucial in the performance of the FLC based MPPT. Accordingly, this work presents numerous adaptive neuro-fuzzy systems to automatically adjustthe fuzzy logic controller membership functions as an alternative to the trial and error approach, which waste time and effort in MPPT design. For this purpose an adaptive neuro-fuzzy system is developed in MATLAB/Simulink to determine suitable MFs and the FSs for the fuzzy logic controller. The effects of different types of MFs and the FSs are deeply investigated using real data collected from the rooftop PV system. The investigations show that the fuzzy logic controller with a triangular membership function and seven fuzzy setsprovides the best results
The International Journal of Engineering and Sciencetheijes
The document presents a method for determining the cost of reactive power generation. It proposes that the total cost (CQ) is the sum of fixed and variable costs. The fixed cost is calculated based on the annual capital recovery factor of the generator. The variable cost depends on the generator's operating conditions and is modeled using a τ variable related to active and reactive power. Simulations on the IEEE 30-node test system show that the variable cost represents a significant portion of CQ for generators operating farther from their nominal conditions. The proposed cost model aims to properly account for generators' reactive power support based on their operating conditions.
- The document discusses random number generation and probability distributions. It presents methods for generating random numbers from Bernoulli, binomial, beta, and multinomial distributions using random bits generated from linear congruential generators.
- Graphical examples are shown comparing histograms of generated random samples to theoretical probability density functions. Code examples in R demonstrate how to simulate random number generation from various discrete distributions.
- The goal is to introduce different methods for random number generation from basic discrete distributions that are important for modeling random phenomena and Monte Carlo simulations.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
This document contains code to simulate various mathematical functions and experiments using MATLAB. It includes code to plot a circle, straight line, calculate distance between points, plot parabolas and hyperbolas. It also includes code for a factorial calculation experiment and using the Monte Carlo method to estimate pi. Finally, it simulates a random walk experiment to model the movement of a drunk person.
The document describes algorithms for 2D transformations in computer graphics using C programming language. It discusses functions for translation, rotation, and scaling of 2D objects.
The algorithms take input for the type of transformation, parameters for the transformation, and coordinates of the 2D object. Translation simply adds the translation offsets to the x and y coordinates. Rotation rotates the object around the x-axis or y-axis based on the angle input. Scaling multiplies the x and y coordinates by respective scaling factors.
The transformed object is displayed on the graphics screen. Thus basic 2D transformations like translation, rotation, scaling are implemented through these algorithms in C.
This document describes implementing various attributes of lines, circles, and ellipses using the C programming language. It includes the following:
1. The aim is to implement different attributes of lines, circles, and ellipses using C.
2. The algorithm involves including necessary packages, declaring line and fill types as character variables, using setlinestyle and line functions to draw lines with different styles, and using ellipse functions to draw circles and ellipses with different fill styles.
3. The program implements the algorithm by initializing graphics, clearing the screen, outputting text to describe the attributes, using for loops to set line styles, colors, and draw lines/ellipses with varying attributes, and terminating the graphics window.
This document describes an experiment using the Newton-Raphson method to find the roots of nonlinear equations in MATLAB. Two nonlinear equations are given as an example: x^2+xy=10 and y+3xy^2=57. The MATLAB code implements the Newton-Raphson method to iteratively calculate the roots. For the given equations, the method converges after 15 iterations with roots of x=4.3937 and y=-2.1178. The experiment demonstrated the use of the Newton-Raphson method to solve nonlinear equations numerically in MATLAB.
Linear cryptanalysis is a method used to break encryption standards like DES. It involves finding linear approximations between plaintext, ciphertext, and key bits that hold with probability greater than 50%. These approximations are used to determine partial key bits using maximum likelihood algorithms on known or ciphertext-only data. For S-DES, the method finds a linear expression involving S-box inputs/outputs that predicts a key bit with 78% accuracy, allowing recovery of multiple key bits.
The document provides source code for generating and manipulating computer graphics using various algorithms. It includes algorithms for drawing lines, circles and curves, as well as algorithms for translating, rotating, and scaling two-dimensional and three-dimensional objects. The source code is written in C/C++ and uses graphics libraries to output the results. Various input parameters are taken from the user and output is displayed to demonstrate the algorithms.
Given a document describing functions and relations:
- It defines four types of relations: one-to-one, many-to-one, one-to-many, and many-to-many. Relations can be represented using arrow diagrams, ordered pairs, or graphs.
- An example question is worked through to identify the domain, codomain, range, and type of relation for a given set of ordered pairs.
- Functions are represented by lowercase letters like f, g, h. The value of a function f at x is written as f(x).
- Examples demonstrate evaluating functions by substituting values into the function equation and solving composite functions like fg(x).
In the early days of computer science coding was viewed as an art. In the modern world of software engineering we may have lost the art to make way for rules and best practices. The International Obfuscated C Code Contest offers a chance for the coder to think beyond the rules of software engineering and unleash their creative side. We'll explore some of the more interesting entries in the past, take a closer look at some exotic C syntax, and finish up by exploring Bruce Holloway's 1986 entry.
From the Un-Distinguished Lecture Series (http://ws.cs.ubc.ca/~udls/). The talk was given Feb. 2, 2007
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSgraphhoc
An L (2, 1)-labeling of a graph G (also called distance two labeling) is a function f from the vertex set V (G) to the non negative integers {0,1,…, k }such that |f(x)-f(y)| ≥2 if d(x, y) =1 and | f(x)- f(y)| ≥1 if d(x, y) =2. The L (2, 1)-labeling number λ (G) or span of G is the smallest k such that there is a f with
max {f (v) : vє V(G)}= k. In this paper we introduce a new type of graph called multi-storey graph. The distance two labeling of multi-storey of path, cycle, Star graph, Grid, Planar graph with maximal edges and its span value is determined. Further maximum upper bound span value for Multi-storey of simple
graph are discussed.
Communication systems solution manual 5th editionTayeen Ahmed
This document contains solutions to problems from Communications Systems, 5th edition. It includes solutions for time domain representations of pulses, their frequency domain counterparts obtained using Fourier transforms, properties of even and odd functions, and bounds on the bandwidth of time-limited signals. The solutions demonstrate properties like linearity, time-shifting, differentiation in the time and frequency domains, and the relationships between a function and its Fourier transform.
1. The document provides a sample paper for mathematics class 12 with questions covering various topics like vectors, matrices, integrals, probability, linear programming, etc. divided into three sections - short 1 mark questions, 4 mark questions and 6 mark questions.
2. It also includes the marking scheme with answers for all the questions.
3. The questions aim to test different cognitive levels from remembering to applications and higher order thinking skills.
1. The document provides a sample paper for mathematics class 12 with questions covering various topics like vectors, matrices, integrals, probability, linear programming, etc. divided into three sections - short 1 mark questions, 4 mark questions and 6 mark questions.
2. It also includes the marking scheme with answers for all the questions.
3. The questions assess different cognitive levels like remembering, understanding, application and higher order thinking skills.
This document describes how to solve the traveling salesperson problem (TSP) using dynamic programming. It defines g(i,S) as the length of the shortest path from vertex i through vertices in S to vertex 1. It shows that g(1,V-{1}) gives the optimal tour length, and that g(i,S) can be calculated using equation (2) by considering neighboring vertices. This runs in O(n2^n) time but requires O(n2^n) space, which is infeasible for large n.
This document describes how to solve the traveling salesperson problem (TSP) using dynamic programming. It defines g(i,S) as the length of the shortest path from vertex i through all vertices in S to vertex 1. It shows that g(1,V-{1}) gives the optimal tour length, and that g(i,S) can be calculated using g values for smaller sets S via an equation. The complexity is O(n22n) time and O(n2n) space, which is better than brute force but still prohibitive for large n due to the exponential space needed.
Numerical solution of ordinary differential equations by using Runge-Kutta Method of Order Two and Runge-Kutta Method of Order Four
How to write the C++ codes?
This document summarizes the correspondence between single-layer neural networks and Gaussian processes (GPs). It reviews how the outputs of a single-layer neural network converge to a GP in the infinite-width limit, with the network's covariance function determined by its architecture. The document derives the mean and covariance functions for the GP corresponding to a single-layer network, and notes that different network outputs are independent GPs.
This document contains C++ code that implements an adaptive Runge-Kutta Fehlberg method (RKFM) for numerically solving ordinary differential equations. It defines classes and functions for initializing the RKFM algorithm, calculating successive approximations, and checking error tolerances to adapt the step size accordingly. The main function initializes an RKFM object and calls its runIt() method to iteratively apply the algorithm up to 200 times or until the integration range is complete.
Similar to The International Journal of Engineering and Science (IJES) (20)
The International Journal of Engineering and Science (IJES)
1. The International Journal of Engineering And Science (IJES)
||Volume|| 1 ||Issue|| 2 ||Pages|| 287-296 ||2012||
ISSN: 2319 – 1813 ISBN: 2319 – 1805
An Algorithm for Finding Graceful Labeling For P k
A.Solairaju1, N. Abdul Ali2 and S. Abdul Saleem3
1-2, 3
P.G & Research Department of Mathematics, 3:P.G & Research Department of Computer Science, Jamal
Mohamed College, Trichirappalli - 620020
---------------------------------------------------------------Abstract-------------------------------------------------------------
In this paper, we obtained that the connected graph Pk 2C4 is graceful. And also an expression for
the java programming of gracefull ness of pk
---------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 27, November, 2012 Date of Publication: 30, December 2012
---------------------------------------------------------------------------------------------------------------------------------------
I. Introduction:
Most graph labeling methods trace their origin to one introduced by Rosa [2] or one given Graham and
Sloane [1]. Rosa defined a function f, a -valuation of a graph with q edges if f is an injective map from the
vertices of G to the set {0, 1, 2 ,…,q} such that when each edge xy is assigned the label f(x)-f(y), the
resulting edge labels are distinct.
A. Solairaju and others [4,5] proved the results that(1) the Gracefulness of a spanning tree of the graph
of Cartesian product of Pm and Cn,was obtained (2) the Gracefulness of a spanning tree of the graph of cartesian
product of Sm and Sn, was obtained (3) edge-odd Gracefulness of a spanning tree of Cartesian product of P2 and
Cn was obtained (4) Even -edge Gracefulness of the Graphs was obtained (5) ladder P2 x Pn is even-edge
graceful, and (6) the even-edge gracefulness of Pn O nC5 is obtained.
Section 1 : Preliminaries
Definition 1.1: Let G = (V,E) be a simple graph with p vertices and q edges.
A map f :V(G) {0,1,2,…,q} is called a graceful labeling if
(i) f is one – to – one
(ii) The edges receive all the labels (numbers) from 1 to q where the label of an edge is the
absolute value of the difference between the vertex labels at its ends.
A graph having a graceful labeling is called a graceful graph.
Example 1.1: The graph 6 ∆ P5 is a graceful graph.
Section II – Path merging with circuits of length four
www.theijes.com The IJES Page 287
2. An Algorithm for Finding Graceful Labeling For Pk
Definition 2.1: Pk 2C4 is a connected graph obtained by merging a circuit of length 4 with isolated vertex of a
path of length k.
Theorem 2.1: The connected graph Pk 2C4 is graceful.
Case (i): k is even.
Define f: V {1,…, q} by
f(T1) = 0; f(T2) = q, f(T3) = q-1, f(T4) = 2
f(Vi) = (q-2) – ( ), i is odd, i =1,3, … , k+1
(2+ ), i is even, i = 2,4,…, k+2
f(Vk+3) = f(Vk+2) + 1
f(Vk+4) = f(Vk+3) + 1
Case (ii): k is odd.
Define f: V {1,…, q}by
f(T1) = 0; f(T2) = q, f(T3) = q-1, f(T4) = 2
f(Vi) = (q-2) – ( ), i is odd, i =1,3, …, k, k+2
(2+ ), i is even, i = 2,4,…, k+1
f(Vk+3) = f(Vk+2) – 1
f(Vk+4) = f(Vk+3) – 1
www.theijes.com The IJES Page 288
3. An Algorithm for Finding Graceful Labeling For Pk
xample 2.1: k = 11 (odd) ; P: V |→ 19; Q: e |→ 20
Example 2.2: k =14 (even) ; P: V |→ 22; Q: e |→ 23
Section 3: AN ALGORITHM IN JAVA PROGRAMMING FOR GRACEFULNESS OF PK
import java.awt.*;
import java.awt.event.*;
import java.awt.geom.*;
import javax.swing.*;
import java.util.*;
public class GFTree1 extends JApplet implements ActionListener
{
final static Color bg = Color.white;
final static Color fg = Color.black;
static int flag=0;
JButton b1,b2;
JLabel l0,l1;
JTextField tf;
static JPanel jp1,jp2,jp3,jp4;
public void init()
{
www.theijes.com The IJES Page 289
4. An Algorithm for Finding Graceful Labeling For Pk
l0 = new JLabel("Gracefulness of Pk o 2Ck");
l0.setFont(new Font("Serif", Font.BOLD, 40));
l0.setForeground(Color.MAGENTA);
l1 = new JLabel(" Enter the value of K : ");
l1.setFont(new Font("Serif", Font.BOLD, 25));
l1.setForeground(Color.BLUE);
tf = new JTextField(20);
tf.setFont(new Font("Verdana", Font.PLAIN, 25));
tf.setForeground(Color.BLACK);
tf.setText("0");
b1 = new JButton("Submit");
b1.setForeground(Color.darkGray);
b1.setFont(new Font("Verdana", Font.PLAIN, 20));
b1.addActionListener(this);
b2 = new JButton("Exit");
b2.setForeground(Color.darkGray);
b2.setFont(new Font("Verdana", Font.PLAIN, 20));
b2.addActionListener(this);
jp1 = new JPanel();
jp2 = new JPanel();
jp1.add(l0);
jp2.setLayout(new GridLayout(2,2));
jp2.add(l1);
jp2.add(tf);
jp2.add(b1);
b1.setBounds(100,100,200,200);
jp2.add(b2);
jp3 = new JPanel();
jp3.setLayout(new BorderLayout());
jp3.add(jp1,BorderLayout.NORTH);
www.theijes.com The IJES Page 290
5. An Algorithm for Finding Graceful Labeling For Pk
jp3.add(jp2,BorderLayout.SOUTH);
jp4 = new JPanel();
setBackground(bg);
setForeground(fg);
}
public void actionPerformed(ActionEvent e)
{
if(e.getSource()==b1)
{ start(); repaint();}
else
System.exit(0);
}
public void paint(Graphics g)
{
flag=0;
g.clearRect(0,135,1024,550);
Graphics2D g2 = (Graphics2D) g;
int k = Integer.parseInt((String)tf.getText());
int v= k+8;
int e = v+1;
if(k>0)
{
int v1[] = new int[k+4];
for(int i=0;i<=k+3;i++)
{int j = i+1;
v1[i]=j;}
int j1=0,j11=0,i1=0;
// Loop for triangle
int m=0;
www.theijes.com The IJES Page 291
6. An Algorithm for Finding Graceful Labeling For Pk
int x[] = new int[10];
int y[] = new int[10];
for(int i=0;i<200;i+=100)
{
g2.drawOval(50+i,300,5,5);
x[m] = 50+i;
x[m+1] = 300;
m+=2;
}
g2.drawString("0",50,320);
g2.drawString("2",150,320);
g2.drawString(e+"",100,240);
g2.drawString(e+"",70,270);
g2.drawString(v+"",100,370);
g2.drawString(v+"",70,340);
g2.drawString((e-2)+"",130,280);
g2.drawString((v-2)+"",130,340);
m=0;
for(int j=100;j<=200;j+=100)
{
g2.drawOval(100,150+j,5,5);
y[m] = 100;
y[m+1] = 150+j;
m+=2;
}
// Diamond symbol
for(int i=0;i<=2;i+=2)
g2.drawLine(x[i],x[i+1],y[i],y[i+1]);
g2.drawLine(50,300,100,350);
g2.drawLine(100,250,150,300);
www.theijes.com The IJES Page 292
7. An Algorithm for Finding Graceful Labeling For Pk
int x1=0,y1=0,x2,y2;
// Line dots
for(i1=0;i1<k;i1++)
{
g2.drawOval(200+i1*50,300,5,5);
g2.drawLine(150+i1*50,300,250+i1*50,300);
x1 = 250+i1*50;
y1 = 300;
}
int odd=0,even=2,f1=0;
for(i1=1;i1<=k+1;i1++){
g2.drawString(f(i1,k)+" ",148+i1*50,320);
if(i1%2!=0) odd=f(i1,k);
else even=f(i1,k);
if(i1<=2) odd=v-1;
g2.drawString(Math.abs(odd-even)+" ",125+i1*50,290);
f1 = f(i1,k);
}
if(k%2==0)
{
g2.drawString(Math.abs(f1-even-1)+" ",110+i1*50,275);
g2.drawString(Math.abs(f1-even-2)+" ",110+i1*50,340);
g2.drawString(Math.abs(f1-even-3)+" ",175+i1*50,275);
g2.drawString(Math.abs(f1-even-4)+" ",175+i1*50,340);
g2.drawString((even+1)+"",148+i1*50,240);
g2.drawString((even+2)+"",148+i1*50,370);
g2.drawString((odd-2)+" ",198+i1*50,320);
}
else
{
g2.drawString(Math.abs(f1-even+4)+" ",110+i1*50,275);
www.theijes.com The IJES Page 293
8. An Algorithm for Finding Graceful Labeling For Pk
g2.drawString(Math.abs(f1-even+3)+" ",110+i1*50,340);
g2.drawString(Math.abs(f1-even-2)+" ",175+i1*50,275);
g2.drawString(Math.abs(f1-even-1)+" ",175+i1*50,340);
g2.drawString((even+4)+"",148+i1*50,240);
g2.drawString((even+3)+"",148+i1*50,370);
g2.drawString((even+2)+" ",198+i1*50,320);
}
if(x1!=0)
{
g2.drawLine(x1,y1,x1+50,350);
g2.drawLine(x1,y1,x1+50,250);
g2.drawLine(x1+50,250,x1+100,300);
g2.drawLine(x1+50,350,x1+100,300);
}
// Diamond
for(int i=k*50;i<k*50+200;i+=100)
g2.drawOval(200+i,300,5,5);
for(int j=k*50;j<=k*50+50;j+=100)
g2.drawOval(250+j,250,5,5);
for(int j=k*50;j<=k*50+50;j+=100)
g2.drawOval(250+j,350,5,5);
}
}
public static int f(int x,int k1)
{
if(flag!=x)
{
int v= k1+8;
int e = v+1;
www.theijes.com The IJES Page 294
9. An Algorithm for Finding Graceful Labeling For Pk
flag=x;
if((flag%=2)==0)
{
if(x<=k1+2)
{ int ev=(2 + ( x / 2));
return ev;}
else
return 0;
}
else
if(x<=k1+1)
{
int odd = (e-2)-((x -1) / 2);
return odd;
}
else
return 0;
}
return 0;
}
public static void main(String s[])
{
JFrame f = new JFrame("GracefulTree Demo");
JApplet applet = new GFTree1();
applet.setLayout(new BorderLayout());
f.getContentPane().add("Center",applet);
applet.init();
applet.add(jp3,BorderLayout.NORTH);
applet.add(jp4,BorderLayout.SOUTH);
www.theijes.com The IJES Page 295
10. An Algorithm for Finding Graceful Labeling For Pk
f.pack();
f.setSize(1024,786);
f.setVisible(true);
}
}
}
Example 3.1: k = 11 (odd) ; P: V |→ 19; Q: e |→ 20
12
Example 3.2 : k =14 (even) ; P: V |→ 22; Q: e |→ 23
References:
[1]. R. L. Graham and N. J. A. Sloane, On additive bases and harmonious graph, SIAM J. Alg. Discrete
Math., 1 (1980) 382 – 404.
[2]. A. Rosa, On certain valuation of the vertices of a graph, Theory of graphs (International
[3]. Synposium,Rome,July 1966),Gordon and Breach, N.Y.and Dunod Paris (1967), 349-355.
[4]. A.Solairaju, A.Sasikala, C.Vimala Gracefulness of a spanning tree of the graph of product of Pm and Cn,
the Global Journal of Pure and Applied Mathematics of Mathematical Sciences, Vol. 1, No-2 (July-Dec
2008): pp 133-136.
[5]. A.Solairaju, C.Vimala,A.Sasikala Gracefulness of a spanning tree of the graph of Cartesian product of S m
and Sn, The Global Journal of Pure and Applied Mathematics of Mathematical Sciences, Vol. 1,
No-2 (July-Dec 2008): pp117-120.
[6]. Herbert Scheidt , “The Complete ReferenceJava2”,2002,Fifth Edition,TATA Mc Graw-Hill
[7]. E.Balagurusamy Programming with java (A Primer). 3rd edition year: 2008, 8th re print .TATA Mc Graw-
Hill
www.theijes.com The IJES Page 296