International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
STUDIES ON INTUTIONISTIC FUZZY INFORMATION MEASURESurender Singh
This document discusses studies on measures of intuitionistic fuzzy information. It begins with introductions and definitions related to fuzzy sets, intuitionistic fuzzy sets, and measures of fuzzy entropy. It then discusses special t-norm operators and proposes a measure of intuitionistic fuzzy entropy based on these t-norms. The measure is defined using a function of the membership, non-membership, and hesitancy degrees of an intuitionistic fuzzy set. Several desirable properties of such a measure are outlined, including sharpness, maximality, resolution, symmetry, and valuation. The document provides mathematical foundations and definitions to propose and analyze a measure of intuitionistic fuzzy entropy.
Convergence Theorems for Implicit Iteration Scheme With Errors For A Finite F...inventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
This document discusses the duality between initial and terminal function problems for single-delay autonomous linear control systems. It presents theorems from previous work by Ukwu and Garba that provide solution matrices and indices of control systems. The paper establishes that the initial and terminal function problems are topological duals of each other by outlining transformations that can be used to obtain the solution matrix for one problem from the solution matrix of the other problem. This is achieved through key operations including changing variables, integrals, and exponential functions in the solution matrix formulas. The transformations effectively show that results from one problem can be realized from the other, demonstrating the duality between the initial and terminal function problems.
Phase locking in chains of multiple-coupled oscillatorsLiwei Ren任力偉
This document summarizes a research paper that studied phase locking in chains of oscillators with coupling beyond nearest neighbors. It introduced a model for such chains using piecewise linear coupling functions. The paper proved the existence of phase locked solutions for this model by using a homotopy method to smoothly transform the model into more realistic coupling functions. It discussed differences between models with multiple coupling versus nearest neighbor coupling only, and highlighted the importance of studying coupling beyond just the nearest neighbors seen in some biological systems.
Monotonicity of Phaselocked Solutions in Chains and Arrays of Nearest-Neighbo...Liwei Ren任力偉
This document summarizes a paper on phaselocked solutions in chains and arrays of coupled oscillators. It introduces the topic of coupled oscillators and their importance in modeling neural activity. It describes previous work analyzing one-dimensional chains of oscillators using continuum approximations. The current paper aims to rigorously prove the existence of phaselocked solutions in chains without requiring a continuum limit. It also analyzes two-dimensional arrays by decomposing them into independent one-dimensional problems under certain frequency distributions. Key results include proving monotonicity of phaselocked solutions and spontaneous formation of target patterns in two-dimensional arrays with isotropic synaptic coupling.
Complete l fuzzy metric spaces and common fixed point theoremsAlexander Decker
This document presents definitions and theorems related to complete L-fuzzy metric spaces and common fixed point theorems. It begins with introducing concepts such as L-fuzzy sets, L-fuzzy metric spaces, and triangular norms. It then defines Cauchy sequences and completeness in L-fuzzy metric spaces. The main result is Theorem 2.2, which establishes conditions under which four self-mappings of a complete L-fuzzy metric space have a unique common fixed point. These conditions include the mappings having compatible pairs, one mapping having a closed range, and the mappings satisfying a contractive-type inequality condition. The proof of the theorem constructs appropriate sequences to show convergence.
On fixed point theorems in fuzzy 2 metric spaces and fuzzy 3-metric spacesAlexander Decker
1) The document discusses fixed point theorems for mappings in fuzzy 2-metric and fuzzy 3-metric spaces.
2) It defines concepts like fuzzy metric spaces, Cauchy sequences, compatible mappings, and proves some fixed point theorems for compatible mappings.
3) The theorems show that under certain contractive conditions on the mappings, there exists a unique common fixed point for the mappings in a complete fuzzy 2-metric or fuzzy 3-metric space.
STUDIES ON INTUTIONISTIC FUZZY INFORMATION MEASURESurender Singh
This document discusses studies on measures of intuitionistic fuzzy information. It begins with introductions and definitions related to fuzzy sets, intuitionistic fuzzy sets, and measures of fuzzy entropy. It then discusses special t-norm operators and proposes a measure of intuitionistic fuzzy entropy based on these t-norms. The measure is defined using a function of the membership, non-membership, and hesitancy degrees of an intuitionistic fuzzy set. Several desirable properties of such a measure are outlined, including sharpness, maximality, resolution, symmetry, and valuation. The document provides mathematical foundations and definitions to propose and analyze a measure of intuitionistic fuzzy entropy.
Convergence Theorems for Implicit Iteration Scheme With Errors For A Finite F...inventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
This document discusses the duality between initial and terminal function problems for single-delay autonomous linear control systems. It presents theorems from previous work by Ukwu and Garba that provide solution matrices and indices of control systems. The paper establishes that the initial and terminal function problems are topological duals of each other by outlining transformations that can be used to obtain the solution matrix for one problem from the solution matrix of the other problem. This is achieved through key operations including changing variables, integrals, and exponential functions in the solution matrix formulas. The transformations effectively show that results from one problem can be realized from the other, demonstrating the duality between the initial and terminal function problems.
Phase locking in chains of multiple-coupled oscillatorsLiwei Ren任力偉
This document summarizes a research paper that studied phase locking in chains of oscillators with coupling beyond nearest neighbors. It introduced a model for such chains using piecewise linear coupling functions. The paper proved the existence of phase locked solutions for this model by using a homotopy method to smoothly transform the model into more realistic coupling functions. It discussed differences between models with multiple coupling versus nearest neighbor coupling only, and highlighted the importance of studying coupling beyond just the nearest neighbors seen in some biological systems.
Monotonicity of Phaselocked Solutions in Chains and Arrays of Nearest-Neighbo...Liwei Ren任力偉
This document summarizes a paper on phaselocked solutions in chains and arrays of coupled oscillators. It introduces the topic of coupled oscillators and their importance in modeling neural activity. It describes previous work analyzing one-dimensional chains of oscillators using continuum approximations. The current paper aims to rigorously prove the existence of phaselocked solutions in chains without requiring a continuum limit. It also analyzes two-dimensional arrays by decomposing them into independent one-dimensional problems under certain frequency distributions. Key results include proving monotonicity of phaselocked solutions and spontaneous formation of target patterns in two-dimensional arrays with isotropic synaptic coupling.
Complete l fuzzy metric spaces and common fixed point theoremsAlexander Decker
This document presents definitions and theorems related to complete L-fuzzy metric spaces and common fixed point theorems. It begins with introducing concepts such as L-fuzzy sets, L-fuzzy metric spaces, and triangular norms. It then defines Cauchy sequences and completeness in L-fuzzy metric spaces. The main result is Theorem 2.2, which establishes conditions under which four self-mappings of a complete L-fuzzy metric space have a unique common fixed point. These conditions include the mappings having compatible pairs, one mapping having a closed range, and the mappings satisfying a contractive-type inequality condition. The proof of the theorem constructs appropriate sequences to show convergence.
On fixed point theorems in fuzzy 2 metric spaces and fuzzy 3-metric spacesAlexander Decker
1) The document discusses fixed point theorems for mappings in fuzzy 2-metric and fuzzy 3-metric spaces.
2) It defines concepts like fuzzy metric spaces, Cauchy sequences, compatible mappings, and proves some fixed point theorems for compatible mappings.
3) The theorems show that under certain contractive conditions on the mappings, there exists a unique common fixed point for the mappings in a complete fuzzy 2-metric or fuzzy 3-metric space.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document presents several theorems regarding common fixed points of mappings in fuzzy metric spaces. It begins with definitions of key concepts such as fuzzy sets, continuous t-norms, and fuzzy metric spaces. It then states four fixed point theorems for occasionally weakly compatible mappings in fuzzy metric spaces. The theorems provide conditions in terms of inequalities involving the fuzzy metric that guarantee the existence and uniqueness of a common fixed point. The proofs of the theorems demonstrate that the inequalities imply the mappings have a unique point of coincidence, which must then be their common fixed point.
International Journal of Mathematics and Statistics Invention (IJMSI) inventionjournals
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
1. The document presents a new approach to proving comparison theorems for stochastic differential equations (SDEs) using differentiation of solutions with respect to initial data.
2. It proves that if the drift term of one SDE is always greater than or equal to the other, and their initial values satisfy the same relation, then the solutions will also satisfy this relation for all time.
3. Two methods are provided: the first uses explicit solutions, the second avoids this by showing the difference process cannot reach zero in finite time based on its behavior.
On New Root Finding Algorithms for Solving Nonlinear Transcendental EquationsAI Publications
In this paper, we present new iterative algorithms to find a root of the given nonlinear transcendental equations. In the proposed algorithms, we use nonlinear Taylor’s polynomial interpolation and a modified error correction term with a fixed-point concept. We also investigated for possible extension of the higher order iterative algorithms in single variable to higher dimension. Several numerical examples are presented to illustrate the proposed algorithms.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Successive approximation of neutral stochastic functional differential equati...Editor IJCATR
We establish results concerning the existence and uniqueness of solutions to neutral stochastic functional differential
equations with infinite delay and Poisson jumps in the phase space C((-∞,0];Rd) under non-Lipschitz condition with Lipschitz
condition being considered as a special case and a weakened linear growth condition on the coefficients by means of the successive
approximation. Compared with the previous results, the results obtained in this paper is based on a other proof and our results can
complement the earlier publications in the existing literatures.
On fixed point theorems in fuzzy metric spaces in integral typeAlexander Decker
This document presents several common fixed point theorems for occasionally weakly compatible mappings in fuzzy metric spaces. It begins with definitions of key concepts such as fuzzy sets, fuzzy metric spaces, occasionally weakly compatible mappings, and Cauchy sequences in fuzzy metric spaces. It then presents four main theorems that establish the existence and uniqueness of a common fixed point for self-mappings under certain contractive conditions on the mappings and using the concept of occasionally weakly compatible pairs. The proofs of the theorems are also provided.
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...BRNSS Publication Hub
This document summarizes and reviews concepts related to Frechet derivatives. It begins by defining Frechet derivatives on Banach spaces and their properties such as differentiability of compositions of functions. It then discusses applications to ordinary differential equations, including the inverse function theorem. Higher order Frechet derivatives and partial derivatives on product spaces are also introduced. The document concludes by discussing concepts like the mean value theorem and Taylor's theorem in the context of Frechet derivatives.
International Journal of Mathematics and Statistics Invention (IJMSI) inventionjournals
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document summarizes a research paper that introduces new concepts related to characterizing kernel sets in fuzzy topological spaces. Specifically, it defines kernelled fuzzy points, boundary kernelled fuzzy points, and derived kernelled fuzzy points of a subset. Using these notions, the paper presents a new definition of the kernel set of a fuzzy topological space as the union of the set itself and the set of all boundary kernelled fuzzy points. It also introduces the concept of a fuzzy topological kr-space and uses these concepts to characterize weak separation axioms between TF0 and TF1 spaces.
An approach to Fuzzy clustering of the iris petals by using Ac-meansijsc
This paper proposes a definition of a fuzzy partition element based on the homomorphism between type-1 fuzzy sets and the three-valued Kleene algebra. A new clustering method
based on the C-means algorithm, using the defined partition, is presented in this paper, which will
be validated with the traditional iris clustering problem by measuring its petals.
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...ijfls
In this paper, the approximate controllability of impulsive linear fuzzy stochastic differential equations with nonlocal conditions in Banach space is studied. By using the Banach fixed point
theorems, stochastic analysis, fuzzy process and fuzzy solution, some sufficient conditions are given for
the approximate controllability of the system.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document provides an overview of key topics in mathematics including trigonometry, coordinate geometry, calculus, algebra, sequences and series, and permutations and combinations. It discusses important formulas and concepts for each topic, as well as strategies for understanding and solving problems. Key areas covered include trigonometric functions and their inverses, equations of circles, parabolas, ellipses and hyperbolas, limits, derivatives, integrals, complex numbers, and series.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
- The document investigates the action of two fuzzy translation operators, Tα+ and Tα-, on fuzzy and anti-fuzzy submodules of a module.
- It proves that if a fuzzy set is a fuzzy submodule, then applying Tα+ or Tα- results in a fuzzy submodule. However, the converse is not necessarily true.
- Some additional conditions are obtained under which the converse is also true - namely, if Tα+ and Tα- yield fuzzy submodules for all α, then the original fuzzy set must be a fuzzy submodule.
- The operators are also shown to map anti-fuzzy submodules to anti-fuzzy submodules, and the paper explores relationships
Existence of Extremal Solutions of Second Order Initial Value Problemsijtsrd
In this paper existence of extremal solutions of second order initial value problems with discontinuous right hand side is obtained under certain monotonicity conditions and without assuming the existence of upper and lower solutions. Two basic differential inequalities corresponding to these initial value problems are obtained in the form of extremal solutions. And also we prove uniqueness of solutions of given initial value problems under certain conditions. A. Sreenivas ""Existence of Extremal Solutions of Second Order Initial Value Problems"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,
URL: https://www.ijtsrd.com/papers/ijtsrd25192.pdf
Paper URL: https://www.ijtsrd.com/mathemetics/other/25192/existence-of-extremal-solutions-of-second-order-initial-value-problems/a-sreenivas
On Fuzzy - Semi Open Sets and Fuzzy - Semi Closed Sets in Fuzzy Topologic...IOSR Journals
Abstract: The aim of this paper is to introduce the concept of fuzzy - semi open and fuzzy - semi closed sets of a fuzzy topological space. Some characterizations are discussed, examples are given and properties are established. Also, we define fuzzy - semi interior and fuzzy - semi closure operators. And we introduce fuzzy
- t-set, -SO extremely disconnected space analyse the relations between them.
MSC 2010: 54A40, 03E72.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document presents several theorems regarding common fixed points of mappings in fuzzy metric spaces. It begins with definitions of key concepts such as fuzzy sets, continuous t-norms, and fuzzy metric spaces. It then states four fixed point theorems for occasionally weakly compatible mappings in fuzzy metric spaces. The theorems provide conditions in terms of inequalities involving the fuzzy metric that guarantee the existence and uniqueness of a common fixed point. The proofs of the theorems demonstrate that the inequalities imply the mappings have a unique point of coincidence, which must then be their common fixed point.
International Journal of Mathematics and Statistics Invention (IJMSI) inventionjournals
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
1. The document presents a new approach to proving comparison theorems for stochastic differential equations (SDEs) using differentiation of solutions with respect to initial data.
2. It proves that if the drift term of one SDE is always greater than or equal to the other, and their initial values satisfy the same relation, then the solutions will also satisfy this relation for all time.
3. Two methods are provided: the first uses explicit solutions, the second avoids this by showing the difference process cannot reach zero in finite time based on its behavior.
On New Root Finding Algorithms for Solving Nonlinear Transcendental EquationsAI Publications
In this paper, we present new iterative algorithms to find a root of the given nonlinear transcendental equations. In the proposed algorithms, we use nonlinear Taylor’s polynomial interpolation and a modified error correction term with a fixed-point concept. We also investigated for possible extension of the higher order iterative algorithms in single variable to higher dimension. Several numerical examples are presented to illustrate the proposed algorithms.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Successive approximation of neutral stochastic functional differential equati...Editor IJCATR
We establish results concerning the existence and uniqueness of solutions to neutral stochastic functional differential
equations with infinite delay and Poisson jumps in the phase space C((-∞,0];Rd) under non-Lipschitz condition with Lipschitz
condition being considered as a special case and a weakened linear growth condition on the coefficients by means of the successive
approximation. Compared with the previous results, the results obtained in this paper is based on a other proof and our results can
complement the earlier publications in the existing literatures.
On fixed point theorems in fuzzy metric spaces in integral typeAlexander Decker
This document presents several common fixed point theorems for occasionally weakly compatible mappings in fuzzy metric spaces. It begins with definitions of key concepts such as fuzzy sets, fuzzy metric spaces, occasionally weakly compatible mappings, and Cauchy sequences in fuzzy metric spaces. It then presents four main theorems that establish the existence and uniqueness of a common fixed point for self-mappings under certain contractive conditions on the mappings and using the concept of occasionally weakly compatible pairs. The proofs of the theorems are also provided.
On Frechet Derivatives with Application to the Inverse Function Theorem of Or...BRNSS Publication Hub
This document summarizes and reviews concepts related to Frechet derivatives. It begins by defining Frechet derivatives on Banach spaces and their properties such as differentiability of compositions of functions. It then discusses applications to ordinary differential equations, including the inverse function theorem. Higher order Frechet derivatives and partial derivatives on product spaces are also introduced. The document concludes by discussing concepts like the mean value theorem and Taylor's theorem in the context of Frechet derivatives.
International Journal of Mathematics and Statistics Invention (IJMSI) inventionjournals
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document summarizes a research paper that introduces new concepts related to characterizing kernel sets in fuzzy topological spaces. Specifically, it defines kernelled fuzzy points, boundary kernelled fuzzy points, and derived kernelled fuzzy points of a subset. Using these notions, the paper presents a new definition of the kernel set of a fuzzy topological space as the union of the set itself and the set of all boundary kernelled fuzzy points. It also introduces the concept of a fuzzy topological kr-space and uses these concepts to characterize weak separation axioms between TF0 and TF1 spaces.
An approach to Fuzzy clustering of the iris petals by using Ac-meansijsc
This paper proposes a definition of a fuzzy partition element based on the homomorphism between type-1 fuzzy sets and the three-valued Kleene algebra. A new clustering method
based on the C-means algorithm, using the defined partition, is presented in this paper, which will
be validated with the traditional iris clustering problem by measuring its petals.
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...ijfls
In this paper, the approximate controllability of impulsive linear fuzzy stochastic differential equations with nonlocal conditions in Banach space is studied. By using the Banach fixed point
theorems, stochastic analysis, fuzzy process and fuzzy solution, some sufficient conditions are given for
the approximate controllability of the system.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document provides an overview of key topics in mathematics including trigonometry, coordinate geometry, calculus, algebra, sequences and series, and permutations and combinations. It discusses important formulas and concepts for each topic, as well as strategies for understanding and solving problems. Key areas covered include trigonometric functions and their inverses, equations of circles, parabolas, ellipses and hyperbolas, limits, derivatives, integrals, complex numbers, and series.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
- The document investigates the action of two fuzzy translation operators, Tα+ and Tα-, on fuzzy and anti-fuzzy submodules of a module.
- It proves that if a fuzzy set is a fuzzy submodule, then applying Tα+ or Tα- results in a fuzzy submodule. However, the converse is not necessarily true.
- Some additional conditions are obtained under which the converse is also true - namely, if Tα+ and Tα- yield fuzzy submodules for all α, then the original fuzzy set must be a fuzzy submodule.
- The operators are also shown to map anti-fuzzy submodules to anti-fuzzy submodules, and the paper explores relationships
Existence of Extremal Solutions of Second Order Initial Value Problemsijtsrd
In this paper existence of extremal solutions of second order initial value problems with discontinuous right hand side is obtained under certain monotonicity conditions and without assuming the existence of upper and lower solutions. Two basic differential inequalities corresponding to these initial value problems are obtained in the form of extremal solutions. And also we prove uniqueness of solutions of given initial value problems under certain conditions. A. Sreenivas ""Existence of Extremal Solutions of Second Order Initial Value Problems"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,
URL: https://www.ijtsrd.com/papers/ijtsrd25192.pdf
Paper URL: https://www.ijtsrd.com/mathemetics/other/25192/existence-of-extremal-solutions-of-second-order-initial-value-problems/a-sreenivas
On Fuzzy - Semi Open Sets and Fuzzy - Semi Closed Sets in Fuzzy Topologic...IOSR Journals
Abstract: The aim of this paper is to introduce the concept of fuzzy - semi open and fuzzy - semi closed sets of a fuzzy topological space. Some characterizations are discussed, examples are given and properties are established. Also, we define fuzzy - semi interior and fuzzy - semi closure operators. And we introduce fuzzy
- t-set, -SO extremely disconnected space analyse the relations between them.
MSC 2010: 54A40, 03E72.
Este documento fornece uma introdução às Moedas Sociais e Complementares (MSCs), discutindo seus benefícios em relação ao dinheiro convencional e apresentando exemplos de MSCs em operação ao redor do mundo. O documento explica como as MSCs podem ajudar a satisfazer as necessidades das comunidades locais de forma mais sustentável ao mesmo tempo em que promovem a cooperação. Recomenda-se considerar implementar uma MSC em Viçosa seguindo os modelos bem-sucedidos discutidos no documento.
The document discusses the Crime and Justice Information and Analysis Hub run by the Institute for Security Studies (ISS) in South Africa. The ISS is a non-governmental policy research institute that aims to contribute to a stable, peaceful and secure Africa. The Crime Hub was created to improve transparency around crime and safety governance by providing a centralized source of information, analysis and data on crime trends, criminal justice and related issues. Over the past three years, the Hub has worked to disseminate statistics, research and policy briefs. However, it faces ongoing challenges around data gaps, coordination with government, and improving the interactivity of its website to better analyze and share information.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Stability analysis for nonlinear impulsive optimal control problemsAI Publications
We consider the generic stability of optimal control problems governed by nonlinear impulsive evolution equations. Under perturbations of the right-hand side functions of the controlled system, the results of stability for the impulsive optimal control problems are proved given set-valued theory.
Existence of Solutions of Fractional Neutral Integrodifferential Equations wi...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
1) The document discusses the existence of solutions for a nonlinear fractional differential equation with an integral boundary condition. It considers equations defined on the interval [0,T] with values in the space of continuous functions C[0,T].
2) It introduces relevant definitions, lemmas, and theorems for fractional calculus and fixed point theory. It then proves that solutions exist based on the Ascoli-Arzela theorem and Schauder-Tychonoff fixed point theorem.
3) The main result provides an explicit formula for the solution in terms of integrals involving the functions defining the fractional differential equation and the boundary conditions. Existence is established by showing the solution map is a contraction.
This document provides an overview of preliminary topological concepts needed for applied mathematics. It defines topological spaces and metric spaces, and introduces key topological notions like open and closed sets, bases for topologies, convergence of sequences, accumulation points, interior and closure of sets, and dense sets. Metric spaces are shown to induce a natural topological structure, though not all topologies come from a metric. Examples are provided to illustrate various definitions and properties.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Common Fixed Theorems Using Random Implicit Iterative Schemesinventy
This document summarizes research on common fixed point theorems using random implicit iterative schemes. It defines random Mann, Ishikawa, and SP iterative schemes. It also defines modified implicit random iterative schemes associated with families of random asymptotically nonexpansive operators. The paper proves the convergence of two random implicit iterative schemes to a random common fixed point. This generalizes previous results and provides new convergence theorems for random operators in Banach spaces.
International journal of engineering and mathematical modelling vol2 no3_2015_2IJEMM
The document presents a mixed finite element approximation for modeling reaction front propagation in porous media. The model couples equations for motion, temperature, and concentration. The semi-discrete problem is formulated using mixed finite element spaces. Existence and uniqueness of the semi-discrete solution is proven. Error estimates show that the temperature, concentration, velocity, and pressure errors converge with order h^σ, where h is the mesh size and σ is the solution regularity. Stability conditions on the time step and parameters are required.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
The document discusses determining matrices for single-delay autonomous linear neutral control systems. It derives expressions for the determining matrices through a series of lemmas, theorems, and corollaries. The determining matrices constitute an optimal way to determine controllability and compactness of control systems. The paper establishes valid expressions for determining matrices of these types of systems and explores their relationships to partial derivatives of the systems.
Redundancy in robot manipulators and multi robot systemsSpringer
This document summarizes how variational methods have been used to analyze three classes of snakelike robots: (1) hyper-redundant manipulators guided by backbone curves, (2) flexible steerable needles, and (3) concentric tube continuum robots. For hyper-redundant manipulators, variational methods are used to constrain degrees of freedom and provide redundancy resolution. For steerable needles, they generate optimal open-loop plans and model needle-tissue interactions. For concentric tube robots, they determine equilibrium conformations dictated by elastic mechanics principles. The document reviews these applications and illustrates how variational methods provide a natural analysis tool for various snakelike robots.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document summarizes research on generalized classical Fréchet derivatives in real Banach spaces. It begins by reviewing basic definitions and results for Fréchet derivatives, including the chain rule, mean value theorem, and Taylor's formula. It then proves several theorems on generalized Fréchet derivatives, including a generalized chain rule, mean value theorem, and implicit function theorem. It also presents a generalized Taylor's formula for nth order Fréchet differentiable functions. The proofs of the main results on generalized Fréchet derivatives are provided.
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...Wireilla
This summary provides the key details about the document in 3 sentences:
The document discusses approximate controllability results for impulsive linear fuzzy stochastic differential equations under nonlocal conditions. It presents sufficient conditions for the approximate controllability of such systems using Banach fixed point theorems, stochastic analysis, and fuzzy processes. The main result establishes approximate controllability of impulsive linear fuzzy stochastic differential equations by verifying assumptions on the system using fixed point theorems.
Existance Theory for First Order Nonlinear Random Dfferential Equartioninventionjournals
In this paper, the existence of a solution of nonlinear random differential equation of first order is proved under Caratheodory condition by using suitable fixed point theorem. 2000 Mathematics Subject Classification: 34F05, 47H10, 47H4
International Refereed Journal of Engineering and Science (IRJES)irjes
The core of the vision IRJES is to disseminate new knowledge and technology for the benefit of all, ranging from academic research and professional communities to industry professionals in a range of topics in computer science and engineering. It also provides a place for high-caliber researchers, practitioners and PhD students to present ongoing research and development in these areas.
On Generalized Classical Fréchet Derivatives in the Real Banach SpaceBRNSS Publication Hub
This document summarizes research on generalized classical Fréchet derivatives in real Banach spaces. It begins by reviewing basic definitions and results for Fréchet derivatives, including the chain rule, mean value theorem, and Taylor's formula. It then proves that Fréchet derivatives exist and are continuous in real Banach spaces. The main results generalize the chain rule, mean value theorem, and Taylor's formula to higher order Fréchet derivatives in real Banach spaces. Proofs are provided for the generalized chain rule and other theorems.
An Overview of Separation Axioms by Nearly Open Sets in Topology.IJERA Editor
Abstract: The aim of this paper is to exhibit the research on separation axioms in terms of nearly open sets viz
p-open, s-open, α-open & β-open sets. It contains the topological property carried by respective ℘ -Tk spaces (℘
= p, s, α & β; k = 0,1,2) under the suitable nearly open mappings . This paper also projects ℘ -R0 & ℘ -R1
spaces where ℘ = p, s, α & β and related properties at a glance. In general, the ℘ -symmetry of a topological
space for ℘ = p, s, α & β has been included with interesting examples & results.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
B02609013
1. International Journal of Mathematics and Statistics Invention (IJMSI)
E-ISSN: 2321 – 4767 P-ISSN: 2321 - 4759
www.ijmsi.org Volume 2 Issue 6 || June. 2014 || PP-09-13
www.ijmsi.org 9 | P a g e
Relationship between cores of targets and Euclidean
controllability for single-delay neutral control systems
Ukwu Chukwunenye
Department of Mathematics, University of Jos,
P.M.B 2084 Jos, Nigeria.
ABSTRACT : This article established necessary and sufficient conditions for the compactness of cores of
Euclidean targets and Euclidean controllability of single-delay linear neutral control systems.
The proofs relied on the notion of asymptotic directions and other convex set properties as well as the
independent results on cores of targets and Euclidean controllability in Ukwu [1, 2,3] respectively.
KEYWORDS: Asymptotic, Core, Controllability, Euclidean, Targets.
I. INTRODUCTION
The relationship between cores of targets and Euclidean controllability was introduced by Hajek [4],
who examined the system , ( ) , (end) ,x Ax p p t P x T where Ais an n n coefficient matrix, ,P the
constraint set a compact convex non-void subset of the real n-dimensional Euclidean space ,n
R the target set,
,T a closed convex non-void subset of ,n
R and : ,p I P admissible controls on ,I a subset of [0, ).
R
By exploiting the analyticity and non-singularity of the fundamental matrices of the associated homogeneous
system ,x Ax and using the notion of asymptotic directions and other convex set properties, he established
that core( )T is bounded if and only if
1
rank , , , ,
nT T T T T
M A M A M n
for some m n constant matrix,
.M He indicated that the closedness of core( )T could be achieved by using a weak compactness argument.
[5]Extended Hajek’s results to a delay control system, with the major contribution being the varying of the
technique for the boundedness of core( )T due to the singularity of the solution matrices and certain other
properties of such matrices.This paper extends further the relationship between cores of targets and Euclidean
controllability to single-delay linear neutral systems by leaveraging on the results in [1, 2, 3].
Consider the autonomous linear differential – difference control system of neutral type:
1 0 1
; 0 (1)
, , 0 , 0 (2)
x t A x t h A x t A x t h B u t t
x t t t h h
where 1 0 1
, ,A A A are n n constant matrices with real entries and B is an n m constant matrix with the
real entries. The initial function is in , 0 ,
n
C h R equipped with sup norm. The control u is in
1
0, ,
n
L t
R . Such controls will be called admissible controls. 1
for, 0,n
x t x t h t t R . If
1
, , n
x C h t R , then for t t 0 1, we define , 0 , n
t C hx R by
. x s x t s s ht , , 0
II. EXISTENCE, UNIQUENESS AND REPRESENTATION OF SOLUTIONS
If A 1 0 and is continuously differentiable on , 0h , then there exists a unique function : ,x h
which coincides with on , 0h , is continuously differentiable and satisfies (1) except possibly at the points
; 0,1, 2,...jh j . This solution x can have no more derivatives than and continuously differentiable if and
only if the relation:
1 0 1
0 (0) 0 (3)A h A A h Bu
2. Relationship Between Cores Of Targets…
www.ijmsi.org 10 | P a g e
is satisfied. See Bellman and Cooke [6] and theorem 7.1 in Dauer and Gahl [7] for complete discussion on
existence, uniqueness and representations of solutions of (1).
2.1 Preliminaries on the Partial Derivatives
( , )
, 0,1,
k
k
X t
k
Let 1
, 0,t t for fixed t, let ,X t be the unique function satisfying the matrix differential equation:
1 0 1
, , , ,
subject to:
;
, =
0,
0 , ; 0,1,...,
(4)
(5)n
t h t A X t A X h t A
I t
t
t
X X
t t jh j
X
By Tadmore ([8], p. 80), ,X t is analytic on .1 , , 0,1,...t j h t jh j and hence
, isX t C
on these intervals.
The left and right-hand limits of ,X t exist at t jh , so that ,tX is of bounded variation on
each compact interval. Cf. Banks and Jacobs [9], Banks and Kent [10] and Hale [11]. We maintain the notation
, , ,
k k
X t X t as in [1].
III. THEOREM RELATING CORES OF TARGETS AND EUCLIDEAN
CONTROLLABILITY FOR SYSTEM (1)
Consider the control system (1) with its standing hypotheses. Let the target set H be of the
form ,H L D where { : 0}n
L x M x for some m n matrix ,M and some bounded, convex
subset D of
n
with 0 D . Assume that 0 ,U and that 0 H . Then core ( )H is compact if and only if the
system:
1 0 1( ) ( ) ( ) ( ) ( ) (6)T T T T
x t A x t h A x t A x t h M u t
is Euclidean controllable.
Proof
Let a be an asymptotic direction of core ( )H . Let ( , ) ( )t Y t Y t be a solution matrix of the free part
of (1) such that (0) ,n
Y I the identity matrix of order .n Then by lemma 4.2 of [1], we deduce that ( )Y t a is
an asymptotic direction of H for 0.t By lemma 2.6 of [1],
( ) ,Y t a L for all 0.t It follows from the definition of L in the hypotheses of theorem 4.4 that:
( ) 0 (7)MY t a
for each coreO Ha
and where ( )0, O Kt
is the set of asymptotic directions of the convex set ,K as
defined in [1]. Take the transpose of both sides of (7) to get ( ) 0.T T T
a Y t M By lemma 4and theorem 4.1 of
[1], core ( )H is a nonvoid convex subset of
n
R . By lemma 2.5 of [1], core ( )H is bounded if and only if 0 is its
only asymptotic direction.
Claim: ( , )Y t satisfies 1 0 1
, , , ,
T T T T T T
Y t Y t h A Y t A Y t h A
Proof of the claim: Since ( , )t Y t is a solution matrix of the free part of (1), it follows that
1 0 1
, , , ,Y t A Y t h A Y t AY t h
t t
, from which transposition yields
3. Relationship Between Cores Of Targets…
www.ijmsi.org 11 | P a g e
1 0 1
(i) , , , ,
T T T T T T T
Y t Y t h A Y t A Y t h A
t t
ˆ ˆ ˆ ˆSet ( , ) ( , ). Then ( , ) ( ) and ( , ) ( ). Consequently,
T T
X t Y t X t X t Y t X t
( )ˆ ˆ,
( ) ( )
T t
Y t X t X t
t t t t
( )ˆ ˆ,
( ) ( )
T h t
Y t h X h t X h t
t h t t h t
( )ˆ ˆClearly, ,
( ) ( )
T t
Y t X t X t
t t
ˆ ( , )
(ii) , , .
T TX t
Y t Y t
t
( )ˆ ˆ,
( ) ( )
T h t
Y t h X h t X h t
h t h t
ˆ ( , )
(iii) , , .
T TX h t
Y t h Y t h
t
(i), (ii), and (iii) yield
1 0 1
ˆ ˆ ˆ ˆ, , , ,T T T
X t X h t A X t A X h t A
1 0 1
proving the claim, , , , .,T T T T T T T
Y t Y t h A Y t A Y t h A
Let 1 0 1
( ) ( ) ( ) ( ) ( )
T T T T
x t A x t h A x t A x t h M u t
be Euclidean controllable on 1[0, ],t for some 1 0.t By
the above claim and the proof of theorem 2 of [2], this is equivalent to requiring that the
relation 1
.( , ) 0, implies 0, for [max{0, }, ]
T T T
a Y t M t ta Therefore the relation ( ) 0
T T T
a Y t M
1
.implies 0, for [0, ]a t t But a is an arbitrary asymptotic direction of the nonvoid convex set, core ( )H .
Hence (core( )) {0}.O H
We invoke lemma 2.5 to conclude that core ( )H is bounded, since O is its only
asymptotic direction.
It is already established in theorem 4.1 of [1], that core ( )H is closed. Therefore core ( )H is compact.
Conversely let core ( )H be compact. Then (core( )) {0},O H
by lemma 2.5. Suppose (6) is not Euclidean
controllable. Then by theorem 2 of [2], there exists 0,,n
c c R such that ( ) 0,T TT
Y t Mc 1
[0, ].t t
Hence by transposition, ( ) 0MY t c . Consequently, ( ) ( )Y t c L O H
. We appeal to lemma 4.2 of [1] to
deduce that .(core( )), 0c O H c
. This contradicts the compactness of core , by lemma 2.5 of [1]. Hence the
supposition is false. Therefore (6) is Euclidean controllable given that core ( )H is compact. This concludes the
proof of the theorem.
Remarks:
If 1 1 0,A A then the system (6) reduces to 0
( ) ( ) ( )T T
x t A x t M u t , in which case the fundamental
matrix ( )T
Y t of 0
( ) ( )T
x t A x t is analytic, nonsingular and equals 0
T
A t
e . This particular case
1 1
( 0)A A
forces 0j in the formula for ( )k
Q jh and (0),for 0.k
Q s 0
But 0 (0)k
k
k Q A , by
lemma 2.4 of [3]. We then conclude from theorem 4.4of [1] that core ( )H is compact if and if only
rank
1
0 0, , ( )T T T T n T
M A M A M n
. This coincides with Hajek’s result.
4. Relationship Between Cores Of Targets…
www.ijmsi.org 12 | P a g e
IV. ANALYSIS OF SYSTEM (1) AND AN ECONOMIC INTERPRETATION OF
THEOREM IN 3.
The target H could represent the prescribed and desired level of stock of capital assets. The lag h
represents the lead times or periods of gestation for investment in capital stock and P Bu u : denotes
the investment capacity of the given firm. Given u u u u um
, , ,...,1 2 , it is clear that
1 2, , , mu u u are investment strategies. Strategies could be at positive, negative or zero levels. In other words
strategies are unsigned or unrestricted in sign. Write 1 2
, , , ,m
B b b b where i
b is a column n-vector and
{1,2, , }.i m Then B is a matrix of fixed stock and
1
,
m
i i
i
Bu b u
, where i i
b u denotes the availability of
stock ib to be invested at a level iu ; in other words, iu units of stock ib are available for investment. Thus,
for a given strategy
T
1 2
, , , m
u u u u the elements 1 2
, , , m
u u u represent investment coefficients of the
stock 1 2
, , , m
b b b respectively. Hence the definition of P as the power of investment available to the firm is
justified.
The values , ( )t x t denote respectively the current time and the current stock of capital assets, given an
initial endowment. The values ( )x t h denotes respectively available stock of capital assets h time units time
units before, while ( ) and ( )x t x t h denote respectively the current rate of change of capital stock and the rate
of change of capital stock htime- period before. 0A is the matrix of coefficients of stock currently available,
1A is the matrix of coefficients of stock available .h time units; 1A is the matrix of coefficients of investments
an htime- period before.
Therefore system (1) could be a dynamic model of the fluctuations of capital stock, where the current rate of
change of stock depends partly on the following:
[1] Currently available capital stock,
[2] Capital stock available h time units before
[3] Rate of change of capital stock htime units before and
[4] The investment capacity of the firm.
Theorem 3 says that the prescribed target, H is achievable if and only if
rank Q t nn 1 ,
for some t1 0 , where
1 0 1 1 1
( ) ( ) ( ) ( ); {0,1, }, {0, , },T T T
k k k k
Q s A Q s h A Q s A Q s h k s h
with initial conditions.
0
(0) , ( ) 0,for min{ , } 0, andn k
Q I Q s k s
1 0 1 1 1
.ˆ ( ) ( ) , ( ) , , ( ) , [0, ) {0, , }
T T T
nn
Q t Q s M Q s M Q s M s t h
In other words, it is possible to control any initial endowment to a prescribed level of growth of capital stock,
subject to its constraints by a careful implementation of investment strategies. However, the achieved growth
level can only be sustained for small (compact) levels of initial values; otherwise there is no guarantee that the
growth will not be reversed. Compactness of core ( )H means that the initial capital assets need not be too big.
V. CONCLUSION
This paper relied on the results in [1], [2] and [3] to establish necessary and sufficient conditions for the
Euclidean controllability of system (1) in terms of the compactness of cores of targets of a corresponding
transposed system. The result exploited the specified structure of the target set amenable to the application of
the notion of asymptotic directions and other convex set properties, as well as the special relationship between
the solution matrices of the uncontrolled part of system (1) and the associated control index matrices defined in
system (3). In the sequel the paper provided an analysis of system (1) and an economic interpretation of theorem
5. Relationship Between Cores Of Targets…
www.ijmsi.org 13 | P a g e
3.1. The ideas exposed in this paper can be tapped to extend the result and economic interpretations to
associated perturbed and more general systems.
REFERENCES
[1] Ukwu, C. (2014n). Cores of Euclidean targets for single-delay autonomous linear neutral control systems. International Journal of
Mathematics and Statistics Invention (IJMSI).Vol. 2, Iss. 5, April 2014.
[2] Ukwu, C. (2014r). Necessary and sufficient conditions for the Euclidean controllability of single-delay autonomous linear neutral
control systems and applications. International Journal of Mathematics and Statistics Invention (IJMSI).Vol. 2, Iss. 5, May 2014
[3] Ukwu, C. (2014h). The structure of determining matrices for single-delay autonomous linear neutral control systems. International
Journal of Mathematics and Statistics Invention (IJMSI). Vol. 2, Issue 3, March 2014.
[4] Hajek, O. (1974). Cores of targets in Linear Control systems. Math. Systems theory. Vol. 8, No.3, 203 – 206, Springer-Verlag,
New York.
[5] Ukwu, C. (1992). Euclidean Controllability and Cores of Euclidean Targets for Differential difference systems Master of Science
Thesis in Applied Math. with O.R. (Unpublished), North Carolina State University, Raleigh, N. C. U.S.A.
[6] Bellman, R. and Cooke, K.(1963). Differential-difference equations. Acad. Press, New York.
[7] Dauer, J. P. and Gahl, R. D.Controllability of nonlinear delay systems. J.O.T.A. Vol. 21, No. 1, January1977.
[8] Tadmore, G. (1984). Functional differential equations of retarded and neutral types: Analytical solutions and piecewise continuous
controls. J. Differential equations, Vol. 51, No. 2, Pp. 151-181.
[9] Banks, H. T. and Jacobs, M. (1973). An attainable sets approach to optimal control offunctional differential equations with function
space terminal conditions. J. diff. equations, Vol 13, pp. 121- 149.
[10] Banks, H. T. and Kent G. A.(1972). Control of functional differential equations of retarded and neutral type to targets in function
space, SIAM J. Control, Vol. 10. No. 4.
[11] Hale, J. K. (1977). Theory of functional differential equations. Applied Mathematical Science,Vol. 3, Springer-Verlag, New York.