In this paper, we study the complexity of sequence entropy for ππ actions. After that, we define πΆπΌ πΉπΌ π , βπΌ πΉπΌ π and the relationships between sequence entropy and complexity sequence entropy. Finally, comparisons between sequence entropy and complexity sequence entropy have been done.
On The Transition Probabilities for the Fuzzy States of a Fuzzy Markov ChainIJERA Editor
Β
In this paper the theory of fuzzy logic is mixed with the theory of Markov systems and the abstraction of a
Markov system with fuzzy states introduced. The notions such as fuzzy transient, fuzzy recurrent etc., were
introduced. The results based on these notions are introduced.
Fuzzy random variables and Kolomogrovβs important resultsinventionjournals
Β
:In this paper an attempt is made to transform Kolomogrov Maximal inequality, Koronecker Lemma, Loeveβs Lemma and Kolomogrovβs strong law of large numbers for independent, identically distributive fuzzy Random variables. The applications of this results is extensive and could produce intensive insights on Fuzzy Random variables
On The Transition Probabilities for the Fuzzy States of a Fuzzy Markov ChainIJERA Editor
Β
In this paper the theory of fuzzy logic is mixed with the theory of Markov systems and the abstraction of a
Markov system with fuzzy states introduced. The notions such as fuzzy transient, fuzzy recurrent etc., were
introduced. The results based on these notions are introduced.
Fuzzy random variables and Kolomogrovβs important resultsinventionjournals
Β
:In this paper an attempt is made to transform Kolomogrov Maximal inequality, Koronecker Lemma, Loeveβs Lemma and Kolomogrovβs strong law of large numbers for independent, identically distributive fuzzy Random variables. The applications of this results is extensive and could produce intensive insights on Fuzzy Random variables
Fixed points of contractive and Geraghty contraction mappings under the influ...IJERA Editor
Β
In this paper, we prove the existence of fixed points of contractive and Geraghty contraction maps in complete metric spaces under the influence of altering distances. Our results extend and generalize some of the known results.
Existance Theory for First Order Nonlinear Random Dfferential Equartioninventionjournals
Β
In this paper, the existence of a solution of nonlinear random differential equation of first order is proved under Caratheodory condition by using suitable fixed point theorem. 2000 Mathematics Subject Classification: 34F05, 47H10, 47H4
Dual Spaces of Generalized Cesaro Sequence Space and Related Matrix Mappinginventionjournals
Β
In this paper we define the generalized Cesaro sequence spaces ννν (ν, ν, ν ). We prove the space ννν (ν, ν, ν ) is a complete paranorm space. In section-2 we determine its Kothe-Toeplitz dual. In section-3 we establish necessary and sufficient conditions for a matrix A to map ννν ν, ν, ν to νβ and ννν (ν, ν, ν ) to c, where νβ is the space of all bounded sequences and c is the space of all convergent sequences. We also get some known and unknown results as remarks.
Stochastics Calculus: Malliavin Calculus in a simplest wayIOSR Journals
Β
We present the theory of Malliavin Calculus by tracing the origin of this calculus as well as giving a
simple introduction to the classical variational problem. In the work, we apply the method of integration-byparts
technique which lies at the core of the theory of stochastic calculus of variation as provided in Malliavin
Calculus. We consider the application of this calculus to the computation of Greeks, as well as discussing the
calculation of Greeks (price sensitivities) by considering a one dimensional Black-Scholes Model. The result
shows that Malliavin Calculus is an important tool which provides a simple way of calculating sensitivities of
financial derivatives to change in its underlying parameters such as Delta, Vega, Gamma, Rho and Theta
Second part of Matrices at undergraduate in science (math, physics, engineering) level.
Please send comments and suggestions to solo.hermelin@gmail.com.
For more presentations visit my website at
http://www.solohermelin.com.
Mathematical description of Legendre Functions.
Presentation at Undergraduate in Science (math, physics, engineering) level.
Please send any comments or suggestions to improve to solo.hermelin@gmail.com.
More presentations can be found on my website at http://www.solohermelin.com.
Markov chains are a very common model for systems that change probablistically over time. We show a few fun examples, define the objects, state the main theorems, and show how to find the steady-state vector.
Effect of Magnesium on Fluoride RemovalIJRES Journal
Β
Fluorides in drinking water are known for both beneficial and detrimental effects on health. The fact that the problems associated with the excess fluorides in drinking water is highly endemic and widespread in countries like India prompted many researchers to explore quite a good number of both organic and inorganic materials adopting various processes from coagulation, precipitation through adsorption, Ion exchange etc. for fluoride removal. Some are good under certain conditions while others are good in other conditions. Leaching of Fluoride from the earth crust is the chief source of fluoride content in ground water; however the other sources like food items also add to increase the overall ingestion of fluoride into the human body. The soil at foot of the mountains is particularly likely to be high in fluoride from the weather and leaching of bed rock with a fluoride. The present paper aims to encompass the work carried out by various researchers in various fluoride affected areas and to access the effectiveness of using magnesium for fluoride removal.\
Control of Nonlinear Industrial Processes Using Fuzzy Wavelet Neural Network ...IJRES Journal
Β
Artificial intelligence control techniques, becomes one of the major control strategies and has received much attention as a powerful tool for the control of nonlinear systems. This paper presents a design of Fuzzy Wavelet Neural Network (FWNN) trained genetic algorithm (FWN-GA) for control of nonlinear industrial process. The FWNN is applied to approximate unknown dynamic of system and GA is used to train and optimize the FWNN parameters. In the proposed control scheme, neural control system synthesis is performed in the closed-loop control system to provide appropriate control input. For this, the error between desired system output and output of control object is directly utilized to tune the network parameters. The controller is applied to a highly nonlinear industrial process of continues stirred tank reactor (CSTR). Simulation results show that FWNN-GA controller has excellent dynamic response and adapt well to changes in reference trajectory and system parameters.
Fixed points of contractive and Geraghty contraction mappings under the influ...IJERA Editor
Β
In this paper, we prove the existence of fixed points of contractive and Geraghty contraction maps in complete metric spaces under the influence of altering distances. Our results extend and generalize some of the known results.
Existance Theory for First Order Nonlinear Random Dfferential Equartioninventionjournals
Β
In this paper, the existence of a solution of nonlinear random differential equation of first order is proved under Caratheodory condition by using suitable fixed point theorem. 2000 Mathematics Subject Classification: 34F05, 47H10, 47H4
Dual Spaces of Generalized Cesaro Sequence Space and Related Matrix Mappinginventionjournals
Β
In this paper we define the generalized Cesaro sequence spaces ννν (ν, ν, ν ). We prove the space ννν (ν, ν, ν ) is a complete paranorm space. In section-2 we determine its Kothe-Toeplitz dual. In section-3 we establish necessary and sufficient conditions for a matrix A to map ννν ν, ν, ν to νβ and ννν (ν, ν, ν ) to c, where νβ is the space of all bounded sequences and c is the space of all convergent sequences. We also get some known and unknown results as remarks.
Stochastics Calculus: Malliavin Calculus in a simplest wayIOSR Journals
Β
We present the theory of Malliavin Calculus by tracing the origin of this calculus as well as giving a
simple introduction to the classical variational problem. In the work, we apply the method of integration-byparts
technique which lies at the core of the theory of stochastic calculus of variation as provided in Malliavin
Calculus. We consider the application of this calculus to the computation of Greeks, as well as discussing the
calculation of Greeks (price sensitivities) by considering a one dimensional Black-Scholes Model. The result
shows that Malliavin Calculus is an important tool which provides a simple way of calculating sensitivities of
financial derivatives to change in its underlying parameters such as Delta, Vega, Gamma, Rho and Theta
Second part of Matrices at undergraduate in science (math, physics, engineering) level.
Please send comments and suggestions to solo.hermelin@gmail.com.
For more presentations visit my website at
http://www.solohermelin.com.
Mathematical description of Legendre Functions.
Presentation at Undergraduate in Science (math, physics, engineering) level.
Please send any comments or suggestions to improve to solo.hermelin@gmail.com.
More presentations can be found on my website at http://www.solohermelin.com.
Markov chains are a very common model for systems that change probablistically over time. We show a few fun examples, define the objects, state the main theorems, and show how to find the steady-state vector.
Effect of Magnesium on Fluoride RemovalIJRES Journal
Β
Fluorides in drinking water are known for both beneficial and detrimental effects on health. The fact that the problems associated with the excess fluorides in drinking water is highly endemic and widespread in countries like India prompted many researchers to explore quite a good number of both organic and inorganic materials adopting various processes from coagulation, precipitation through adsorption, Ion exchange etc. for fluoride removal. Some are good under certain conditions while others are good in other conditions. Leaching of Fluoride from the earth crust is the chief source of fluoride content in ground water; however the other sources like food items also add to increase the overall ingestion of fluoride into the human body. The soil at foot of the mountains is particularly likely to be high in fluoride from the weather and leaching of bed rock with a fluoride. The present paper aims to encompass the work carried out by various researchers in various fluoride affected areas and to access the effectiveness of using magnesium for fluoride removal.\
Control of Nonlinear Industrial Processes Using Fuzzy Wavelet Neural Network ...IJRES Journal
Β
Artificial intelligence control techniques, becomes one of the major control strategies and has received much attention as a powerful tool for the control of nonlinear systems. This paper presents a design of Fuzzy Wavelet Neural Network (FWNN) trained genetic algorithm (FWN-GA) for control of nonlinear industrial process. The FWNN is applied to approximate unknown dynamic of system and GA is used to train and optimize the FWNN parameters. In the proposed control scheme, neural control system synthesis is performed in the closed-loop control system to provide appropriate control input. For this, the error between desired system output and output of control object is directly utilized to tune the network parameters. The controller is applied to a highly nonlinear industrial process of continues stirred tank reactor (CSTR). Simulation results show that FWNN-GA controller has excellent dynamic response and adapt well to changes in reference trajectory and system parameters.
Improving Fracture Toughness of Mullite Ceramics with Metal ReinforcementsIJRES Journal
Β
Mullite/Metal composite ceramics were fabricated by the use of mechanical milling and pressureless sintering. Al2O3 + 10 vol.% of Co, Ni, or Ti were mixed and milled during 12 h at 300 rpm in a horizontal mill, then with the powder mixture it was conformed cylindrical samples by uniaxial pressing using 300 MPa. Pressed samples were sintered during 2 h in an electrical furnace at 1500Β°C. During sintered it was used an argon atmosphere inside the furnace in order to inhibit metal oxidation. XRD results indicate that alumina and metals retain its crystalline structure. Measurements of densities indicate that they were achieved relative densities between 90% and 98% in the manufacture composites. Optical microscopy observations show mulliteβs microstructure with very fine and homogeneous distributions of metal particles. Used metals (Co, Ni and Ti) to reinforce mullite, have yielded favorable results improving the fracture toughness of the mullite. However, it should be made more dense materials with them to better explore this potential.
Scalable Face Restitution Via Attribute-Enhanced Sparse Code wordsIJRES Journal
Β
To develop a scalable face image restitution system we apply Attribute-Enhanced Sparse Code words on local features extracted from face images combining with inverted indexing to construct an efficient and scalable face retrieval system. Nowadays Photos with people are the major interest of users. Among all those photos, a big percentage of them are photos with human faces. The importance and the sheer amount of human face photos make manipulations (e.g., search and mining) of large-scale human face images a really important research problem and enable many real world applications. Thus, with the exponentially growing photos, large-scale content-based face image retrieval is an enabling technology for many emerging applications. To utilize automatically detected human attributes that contain semantic cues of the face photos to improve content based face retrieval by constructing semantic code words for efficient large-scale face retrieval. By leveraging human attributes in a scalable and systematic framework, we propose two orthogonal methods named attribute-enhanced sparse coding and attribute embedded inverted indexing to improve the face retrieval in the offline database. We investigate the effectiveness of different attributes and vital factors essential for face retrieval.
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETIJRES Journal
Β
Mobile ad-hoc network (MANET) is a self-configuring infrastructure-less network of mobile devices. In wireless communication, the privacy-protection of mobile ad hoc networks is more demanding than that of wired networks due to the open nature and mobility. Many schemes have been proposed to protect privacy in ad hoc networks. In these schemes, data packets and control packets are not completely unlikable and unobservable, and it will be distinguishable by harm users. An unobservable secure on-demand routing (USOR) protocol provides complete unlinkability and content unobservability for all type of packets using group signature and ID-based encryption. USOR Protocol did not see any worm in the content particularly disguising worm. The proposed scheme is detecting disguised worm using spectrum based scheme. This scheme uses power spectral density and spectral flatness measure. Spectrum based method not only detect disguising worm, but traditional worms as well.
Noise Control Stratagies in Reinforced Concrete BuildingsIJRES Journal
Β
This study is aimed at bringing out the salient aspects of building noise control. An analysis has been carried out with respect to the noise transmission as well as the characteristics of noise inside buildings. The key issues on building noise control have been included and discussed. A comprehensive study on building noise and on acoustically divisible spaces has been made. It has been observed that a sound insulation of the order of 30 to 35 dB is possible in a given building. Further, the noise propagation parameters in an exhibition hall have been theoretically estimated. The data so obtained has been compared with actual SPL measurements and recorded. Variations in noise levels observed have been explained. Before the partition is made, the SPL drop is faster inside the building but after the partition the drop falls at the rate of 3dB for doubling the distance. The cost of the acoustically divisible partition wall is found to be very high, but the advantage of this partition seems to be creating acoustically divisible spaces where in one can conduct two programs simultaneously, without any disturbance to each other. Prior to the selection and design of control measures, noise sources must be identified and the noise produced must be carefully evaluated.
Applications of Homotopy perturbation Method and Sumudu Transform for Solving...IJRES Journal
Β
In this paper, we make use of the properties of the Sumudu transform to find the exact solution of
fractional initial-boundary value problem (FIBVP) and fractional KDV equation. The method, namely,
homotopy perturbation Sumudu transform method, is the combination of the Sumudu transform and the
HPM using Heβs polynomials. This method is very powerful and professional techniques for solving different
kinds of linear and nonlinear fractional differential equations arising in different fields of science and
engineering. We also present two different examples to illustrate the preciseness and effectiveness of this
method.
An Enhanced & Effective Fall Detection System for Elderly Person Monitoring u...IJRES Journal
Β
Various fall-detection solutions have been previously proposed to create a reliable surveillance system for elderly people with high requirements on accuracy, sensitivity and specificity. In this paper, an enhanced fall detection system is proposed for elderly person monitoring that is based on smart sensors worn on the body and operating through consumer home networks. With treble thresholds, accidental falls can be detected in the home healthcare environment. By utilizing information gathered from an accelerometer, cardiotachometer and smart sensors, the impacts of falls can be logged and distinguished from normal daily activities. The proposed system have to be analyzed in a prototype system as detailed in this paper. From a test group of 30 healthy participants, it was found that the proposed fall detection system can achieve a high detection accuracy of 97.5%, while the sensitivity and specificity are 96.8% and 98.1% respectively. Therefore, this system can reliably be developed and deployed into a consumer product for use as an elderly person monitoring device with high accuracy and a low false positive rate.
Surface Quality Improvement Using Modified Tool Clamping In Boring OperationsIJRES Journal
Β
Boring operations are challenging owing to limited process performance due to inherent tool overhang and resulting vibrations. The tool vibrations can be suppressed with insertion of suitable damping methodology. The present work adopts a method suitable for machine operators, where in insertion of packing sheets at the boring tool support has been suggested. Insertion of number of layers causes frictional phenomenon to dissipate the exciting energy thereby damping the vibrations. Substantial improvement of surface quality of the internally machined surfaces has been noticed in the experiments
The application of Self-adaptive Fuzzy PID control the evaporator superheatIJRES Journal
Β
In view of the characteristics of the cold storage refrigeration system, such as nonlinear, time-varying and coupling, the traditional PID control accuracy is low, this study adopted the method of adaptive Fuzzy PID to control the superheat of the evaporator outlet. Fuzzy PID controller can adjust the parameters according to the deviation and deviation rat. It can avoid the disadvantages of traditional PID controller that it cannot adjust control parameters according to operating conditions.
Prime Ring With 3nο«1 d Contained In The Nucleus.IJRES Journal
Β
In this paper we show that if R is a non associative ring with a derivation d then
d R N n ο ο« ( ) 3 1
and ( ) , 3 1 Rd R N n ο ο«
using this it is show that if R is a non associative prime ring such
that d (R) N. n ο Where n is a fixed positive integer then either R is associative or thederivatives which are
in arithmetic progression becomes zero i.e 3nο«1 d =0.
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless NetworksIJRES Journal
Β
In this paper, we focus on improving wireless networks survivability in terms of increasing network lifetime and its energy efficiency via clustering the network in an efficient way. Clustering the network is the procedure of partitioning it into groups, where each of them is known as a cluster. Each cluster elects the station with the highest power to be a cluster head. The remaining stations follow the nearest cluster head. Instead of having each station sends its packets to a remote receiver, the cluster head receives packets from all stations within its cluster, aggregates them, and forwards the resulting packets to the remote receiver. The most significant benefit of clustering the network that we focus on is to decrease distances between sending and receiving stations, which in turn reduces the transmission energy. This reduction in the energy yields an increase in the network lifetime and its survivability.
Analysis of Power Optimization of Serial Communication Protocol-MemoryβSwitch...IJRES Journal
Β
Power consumption has rapidly risen to an intolerable scale. This results in both high operating costs and high failure rates so it is now a major cause for concern. It is imposed new challenges to the development of high performance systems. Dynamic power can contribute up to 50% of the total power dissipation.In this paper; we first review the basic power management techniques to reduce the dynamic power consumption techniques like clock gating & frequency scaling. Clock-gating is the most common RTL optimization for reducing dynamic power. We have been also studied I2C and SPI are the most commonly used serial protocols for both inter-chip and intra-chip low/medium bandwidth data-transfers. Both protocols are well suited for communications between integrated circuits for slow communication with on-board peripherals.
An Infrastructure Based on a Mobile-Agent for Applications of Ebussiness & EworkIJRES Journal
Β
Mobile agents have emerged as a very promising approach for eWork and eBussiness. We have developed an extensive mobile agent infrastructure that supports diverse applications in these fields. Our infrastructure is built around two basic components: a mobile-agent based framework for distributed database access and the PaCMAn (Parallel Computing with Java Mobile Agents) metacomputer. The major functionality of our database framework includes (a) the ability to dynamically create personalized views for the mobile client, (b) dynamic creation and configuration of Web-based warehouses and (c) dynamic support of mobile transactions. PaCMAn offers the necessary tools for Web-based distributed High Performance Computing (HPC) and distributed data mining. Our infrastructure provides the basis for developing eWork applications in many fields. We have utilized it for applications, both wireless and wireline, such as: Electronic commerce, Health Telematics, Teleworking, Distributed Data-mining and Web-based supercomputing.
Design and Fabrication of Solar Electric ScooterIJRES Journal
Β
Electric motorcycles and scooters are plug-in electric vehicles with two or three wheels that can be recharged from any external source of electricity, and the electricity is stored in a rechargeable battery, which provides power to one or more electric motors to attain movement. Electric motorcycles, as differentiated from scooters, do not have a step-through frame. The electricity generated from an external source helps in acceleration of the motorcycle. The speed of this cycle is limited and the electricity is generated using a solar panel. The generated electricity is stored using a battery and the locomotion and movement of the vehicle is hence propelled using a motor. The cycle need not be continuously fed with solar energy in order to gain the capacity to run. It gets its energy from the batteries where the energy is stored. Conventionally, these types of vehicles are hard to use with the help of just mechanical energy. The energy we get from human effort. But when energy is converted using solar energy and a battery, it becomes more easy and helpful in the propulsion of the motorcycle. The motorcycle, not using an engine, becomes an effective way of road transport as it causes no pollution. It is eco-friendly and it definitely reduces human effort.
Assessment of the Effect of Plan Shapes on Cost of Institutional Buildings in...IJRES Journal
Β
This research analyzed the effect of plan shapes on cost of multi-storey Institutional buildings in Nigeria. Data were collected from drawings and priced bill of quantities for 28 projects of existing institutional buildings in Kwara State. In order to determine the plan shape with the most effect, a descriptive method of analysis (bar chart) was used. It was found out that, in all the plan types (βAβ Circular-shaped, βBβ U-shaped, βCβ L-shaped, and βDβ Rectangular shaped building) observed for each of the building elements (Substructure, Frame work, Block work, Roof work, Services, Finishes) including the overall building cost, plan shape Type βAβ (circular shaped buildings) were the most expensive with an average total cost of N225,959,924.75 Plan shape type βDβ(the Rectangular shaped buildings) have the lowest average total cost of β¦ 87,76I,791.27.It was concluded that plan Type βAβ (circular shaped buildings) were the most expensive with highest average cost, plan Type βBβ and βCβ (U and L shaped) were at the average while building Type βDβ (Rectangular shaped building) has the lowest average cost. The study recommends that clients that might be considering embarking on the multi-storey institutional building development should bear in mind the cost effectiveness of each plan shape in order to avoid adverse cost consequences on the project.
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
Β
Steganography refers to information or a file that has been hidden inside a digital image, video
or audio file. There are different carrier file formats can be used such as Text Steganography, Image
Steganography, Audio/Video Steganography, but Image Steganography are the most popular because of their
frequency on the Internet. It is the first common methods used for hiding the information in the cover image.
The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image
is replaced with data bit. steganographic algorithm for 8bit (gray scale) or 24 bit (colour image) is presented in
this paper. Sometime steganography will not cover the total security of secret massage. So an additional security
need to the secret massage. For this purpose blowfish encryption Algorithm is used in the proposed
Steganographic system This work is concerned with implementing Steganography for images, with an
improvement security and image quality.
The experimental result shows that the stego-image is visually indistinguishable from the original cover-image
It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is
always to cover up the very existence of the embedded data. and that the algorithm has a high capacity and a
good invisibility.
A Numerical Integration Scheme For The Dynamic Motion Of Rigid Bodies Using T...IJRES Journal
Β
The dynamics of rigid bodies have been studied extensively. However, a certain class of time-integration schemes were not consistent since they added vectors not belonging to the same tangent space (so3), of the Lie group (SO3) of the Special Orthogonal transformations in E3. The work of Cardona[1,2], and later Makinen[3,4], highlighted this fact using the rotation vector as the main parameter in their derivations. Some other programs in multibody dynamics, such as the work of Haug[5], rely on the Euler parameters, instead of the rotation vector, as the main variable in their formulations. For this class of programs, different time-integration schemes could be used .This paper discusses one such a scheme. As an example of application, the spinning top was used in this paper. For such a problem, the approximate change of the potential energy was found to be an upper bound to the change in the actual total energy during a time step.
Sensor Stick walking aid for the blindsIJRES Journal
Β
In this paper, few methods of aiding and guiding visually impaired persons are presented. They are analyzed and studied thoroughly. Some commercially available systems help in aiding people with disabilities of seeing and give information refereeing to the location of the users. We propose an intelligentβ stick equipped with an ultrasonic sensor that takes information about the environment. This information is processed and is delivered to the handle stick and thus can be interpreted by the users. The stick will produce beeping sound with varying speed according to the distances of obstacles. This stick will provide assists to visually impaired persons by providing informations related to obstacles distances. This device was tested with blind persons and results are presented.
Generalized Laplace - Mellin Integral TransformationIJERA Editor
Β
The main propose of this paper is to generalized Laplace-Mellin Integral Transformation in between the positive regions of real axis. We have derived some new properties and theorems .And give selected tables for Laplace-Mellin Integral Transformation.
On The Distribution of Non - Zero Zeros of Generalized Mittag β Leffler Funct...IJERA Editor
Β
In this work, we derive some theorems involving distribution of non β zero zeros of generalized Mittag β Leffler functions of one and two variables. Mathematics Subject Classification 2010: Primary; 33E12. Secondary; 33C65, 26A33, 44A20
In this paper, the concepts of sequences and series of complement normalized fuzzy numbers are introduced in terms of πΎ-level, so that some properties and characterizations are presented, and some convergence theorems are proved
A GENERALIZED SAMPLING THEOREM OVER GALOIS FIELD DOMAINS FOR EXPERIMENTAL DESIGNcscpconf
Β
In this paper, the sampling theorem for bandlimited functions over
domains is
generalized to one over β
domains. The generalized theorem is applicable to the
experimental design model in which each factor has a different number of levels and enables us
to estimate the parameters in the model by using Fourier transforms. Moreover, the relationship
between the proposed sampling theorem and orthogonal arrays is also provided.
A Generalized Sampling Theorem Over Galois Field Domains for Experimental Des...csandit
Β
In this paper, the sampling theorem for bandlimited functions over
domains is
generalized to one over β
domains. The generalized theorem is applicable to the
experimental design model in which each factor has a different number of levels and enables us
to estimate the parameters in the model by using Fourier transforms. Moreover, the relationship
between the proposed sampling theorem and orthogonal arrays is also provided.
KEY
Matrix Transformations on Some Difference Sequence SpacesIOSR Journals
Β
The sequence spaces πβ(π’,π£,Ξ), π0(π’,π£,Ξ) and π(π’,π£,Ξ) were recently introduced. The matrix classes (π π’,π£,Ξ :π) and (π π’,π£,Ξ :πβ) were characterized. The object of this paper is to further determine the necessary and sufficient conditions on an infinite matrix to characterize the matrix classes (π π’,π£,Ξ βΆππ ) and (π π’,π£,Ξ βΆ ππ). It is observed that the later characterizations are additions to the existing ones
We show, if thenormsof
k
S
areuniformly boundedon
ο» ο½ n
p
l
for a bounded
ο» ο½n p
if and onlyifthereexists
ν, 1 β€ ν < β,such thatthenormsin
ο» ο½ n
p
l
andtheclassical space
r
l
are equivalent. A "pointwise-bounded" family
of continuous linear operators from a Banach space to a normed space is "Uniformly bounded."
Stated another way, letν be a Banach space and ν be a normed space. If ν is a collection of bounded linear
mappings of ν into ν such that for eachν₯νν, ν ν’ν ν΄ν₯ ; ν΄ β ν < β, thenν ν’ν ν΄ : ν΄ β ν < β.
Generalised Statistical Convergence For Double SequencesIOSR Journals
Β
Recently, the concept of π½-statistical Convergence was introduced considering a sequence of infinite
matrices π½ = (πππ π ). Later, it was used to define and study π½-statistical limit point, π½-statistical cluster point,
π π‘π½ β πππππ‘ inferior and π π‘π½ β πππππ‘ superior. In this paper we analogously define and study 2π½-statistical
limit, 2π½-statistical cluster point, π π‘2π½ β πππππ‘ inferior and π π‘2π½ β πππππ‘ superior for double sequences.
We give an elementary exposition of a method to obtain the infinitesimal point symmetries of Lagrangians.Besides, we exhibit the Lanczos approach to Noetherβs theorem to construct the first integral associated with each symmetry.
MSC 2010:49S05, 58E30, 70H25, 70H33
In this paper we consider the initial-boundary value problem for a nonlinear equation induced with respect to the mathematical models in mass production process with the one sided spring boundary condition by boundary feedback control. We establish the asymptotic behavior of solutions to this problem in time, and give an example and simulation to illustrate our results. Results of this paper are able to apply industrial parts such as a typical model widely used to represent threads, wires, magnetic tapes, belts, band saws, and so on.
Some properties of two-fuzzy Nor med spacesIOSR Journals
Β
The study sheds light on the two-fuzzy normed space concentrating on some of their properties like convergence, continuity and the in order to study the relationship between these spaces
DOUBT INTUITIONISTIC FUZZY IDEALS IN BCK/BCI-ALGEBRASWireilla
Β
In this paper, we introduce the concept of doubt intuitionistic fuzzy subalgebras and doubt intuitionistic fuzzy ideals in BCK/BCI-algebras. We show that an intuitionistic fuzzy subset of BCK/BCI-algebras is an intuitionistic fuzzy subalgebra and an intuitionistic fuzzy ideal if and only if the complement of this intuitionistic fuzzy subset is a doubt intuitionistic fuzzy subalgebra and a doubt intuitionistic fuzzy ideal. And at the same time we have established some common properties related to them.
Doubt intuitionistic fuzzy deals in bckbci algebrasijfls
Β
In this paper, we introduce the concept of doubt intuitionistic fuzzy subalgebras and doubt intuitionistic fuzzy ideals in BCK/BCI-algebras. We show that an intuitionistic fuzzy subset of BCK/BCI-algebras is an
intuitionistic fuzzy subalgebra and an intuitionistic fuzzy ideal if and only if the complement of this intuitionistic fuzzy subset is a doubt intuitionistic fuzzy subalgebra and a doubt intuitionistic fuzzy ideal. And at the same time we have established some common properties related to them.
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...Wireilla
Β
In this paper, the approximate controllability of impulsive linear fuzzy stochastic differential equations with nonlocal conditions in Banach space is studied. By using the Banach fixed point theorems, stochastic analysis, fuzzy process and fuzzy solution, some sufficient conditions are given for the approximate controllability of the system.
APPROXIMATE CONTROLLABILITY RESULTS FOR IMPULSIVE LINEAR FUZZY STOCHASTIC DIF...ijfls
Β
In this paper, the approximate controllability of impulsive linear fuzzy stochastic differential equations with nonlocal conditions in Banach space is studied. By using the Banach fixed point
theorems, stochastic analysis, fuzzy process and fuzzy solution, some sufficient conditions are given for
the approximate controllability of the system.
Similar to Sequence Entropy and the Complexity Sequence Entropy For ππο Action (20)
Exploratory study on the use of crushed cockle shell as partial sand replacem...IJRES Journal
Β
The increasing demand for natural river sand supply for the use in construction industry along
with the issue of environmental problem posed by the dumping of cockle shell, a by-product from cockle
business have initiated research towards producing a more environmental friendly concrete. This research
explores the potential use of cockle shell as partial sand replacement in concrete production. Cockle shell used
in this experimental work were crushed to smaller size almost similar to sand before mixed in concrete. A total
of six concrete mixtures were prepared with varying the percentages of cockle shell viz. 0%, 5%, 10%, 15%,
20% and 25%. All the specimens were subjected to continuous water curing. The compressive strength test was
conducted at 28 days in accordance to BS EN 12390. Finding shows that integration of suitable content of
crushed cockle shell of 10% as partial sand replacement able to enhance the compressive strength of concrete.
Adopting crushed cockle shell as partial sand replacement in concrete would reduce natural river sand
consumption as well as reducing the amount of cockle shell disposed as waste.
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...IJRES Journal
Β
The vertical (trans-placental) transmission of the parasite Plasmodium falciparum from
pregnant mother to fetus during gestational period was investigated in a clinical research involving 43 full term
pregnant women in selected Hospitals in Jimeta Yola, Adamawa State Nigeria. During the observational study,
parasitemia was determined by light microscopic examination of umbilical and maternal peripheral blood film
for the presence of the trophozoites of Plasmodium falciparum. Correlational analysis was then carried on the
result obtained at p<0.05.><0.05) was established between maternal peripheral blood and umbilical cord
blood parasitemia with Pearsonβs correlation coefficient of 0.762. Thus, in a malaria endemic area like Yola,
Adamawa State, Nigeria, with a stable transmission of parasite, there is a high probability of vertical
transmission of Plasmodium falciparum parasite from mother to fetus during gestation that can be followed by
the presentation of the symptoms of malaria by the newborn and other malaria related complications. Families
are advised to consistently sleep under appropriately treated insecticide mosquito net to avoid mosquito bite and
subsequent infestation.
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityIJRES Journal
Β
Heart rate variability (HRV) is a measure of the balance between sympathetic mediators of heart
rate that is the effect of epinephrine and norepinephrine released from sympathetic nerve fibres acting on the
sino-atrial and atrio-ventricular nodes which increase the rate of cardiac contraction and facilitate conduction at
the atrio-ventricular node and parasympathetic mediators of heart rate that is the influence of acetylcholine
released by the parasympathetic nerve fibres acting on the sino-atrial and atrio-ventricular nodes leading to a
decrease in the heart rate and a slowing of conduction at the atrio-ventricular node. Sympathetic mediators
appear to exert their influence over longer time periods and are reflected in the low frequency power(LFP) of
the HRV spectrum (between 0.04Hz and 0.15 Hz).Vagal mediators exert their influence more quickly on the
heart and principally affect the high frequency power (HFP) of the HRV spectrum (between 0.15Hz and 0.4
Hz). Thus at any point in time the LFP:HFP ratio is a proxy for the sympatho- vagal balance. Thus HRV is a
valuable tool to investigate the sympathetic and parasympathetic function of the autonomic nervous system.
Study of HRV enhance our understanding of physiological phenomenon, the actions of medications and disease
mechanisms but large scale prospective studies are needed to determine the sensitivity, specificity and predictive
values of heart rate variability regarding death or morbidity in cardiac and non-cardiac patients. This paper
presents the linear and nonlinear to analysis the HRV.
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...IJRES Journal
Β
A two-phase model is proposed for describing the dynamics of a fluidized bed reactor used for
polypropylene production. In the proposed model, the fluidized bed is divided into an emulsion and bubble
phase where the flow of gas is considered to be plug flow through the bubbles and perfectly mixed through the
emulsion phase. Similar previous models, consider the reaction in the emulsion phase only. In this work the
contribution of reaction in the bubble phase is considered and its effect on the overall polypropylene production
is investigated the kinetic model is combined with hydrodynamic model in order to develop a comprehensive
model for gas-phase propylene copolymerization reactor. Simulation profiles of the proposed model were
compared with those of well mixed model for the emulsion phase temperature. The simulated temperature
profile showed a lower rate of change compared to the previously reported models due to lower polymerization
rate. Model simulation showed that about 13% of the produced polymer comes from the bubble phase and this
considerable amount of polymerization in the bubbles should not be neglected in any modeling attempt.
Study and evaluation for different types of Sudanese crude oil propertiesIJRES Journal
Β
Sudanese crude oil is regarded as one of the sweet types of crude in the world, Sulphur containing
compounds are un desirable in petroleum because they de activate the catalyst during the refining processes and
are the main source of acid rains and environmental pollution.(Mark Cullen 2001),Since it contains considerable
amount of salts and acids, it negatively impact the production facilities and transportation lines with corrosive
materials. However it suffers other problems in flow properties represented by the high viscosity and high
percentage of wax. Samples were collected after the initial and final treatment at CPF, and tested for
physical and chemical properties.wax content is in the range 23-31 weight % while asphalting content is about
0.1 weight% . Resin content is 13-7 weight % and deposits are 0.01 weight%. The carbon number distribution in
the crude is in the range 7-35 carbon atoms. The pour point vary between 39Β°C-42Β°C and the boiling point is in
the range 70 Β°C - 533 Β°C.
A Short Report on Different Wavelets and Their StructuresIJRES Journal
Β
This article consists of basics of wavelet analysis required for understanding of and use of wavelet
theory. In this article we briefly discuss about HAAR wavelet transform their space and structures.
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
Β
Recently, Mobile Cloud Computing reveals many modern development areas in the Information
Technology industry. Several software engineering frameworks and methodologies have been developed to
provide solutions for deploying cloud computing resources on mobile application development. Agile
methodology is one of the most commonly used methodologies in the field. This paper presents the MCCAS a
Web and Mobile application that provide feature for the Palestinian higher education/academic institutions. An
Agile methodology was used in the development of the MCCAS but in parallel with emphasis on Cloud
computing resources deployment. Also many related issues is discussed such as how software engineering
modern methodologies (advances) influenced the development process.
Wear Analysis on Cylindrical Cam with Flexible RodIJRES Journal
Β
Firstly, the kinetic equation of spatial cylindrical cam with flexible rod has been established. Then, an
accurate cylindrical cam mechanism model has been established based on the spatial modeling software
Solidworks. The dynamic effect of flexible rod on mechanical system was studied in detail based on the
mechanical system dynamics analytical software Adams, and Archard wear model is used to predict the wear of
the cam. We used Ansys to create finite element model of the cam link, extracted the first five order mode to
export into Adams. The simulation results show that the dynamic characteristics of spatial cylindrical cam
mechanical system with flexible rod is closed to ideal mechanism. During the cam rotate one cycle, the collision
in the linkage with a clearance occurs in some special location, others still keep a continuous contact, and the
prediction of wear loss is smaller than rigid body.
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
Β
Cloud Computing is a new paradigm provides various host service [paas, saas, Iaas over the internet.
According to a self-service,on-demand and pay as you use business model,the customers will obtain the cloud
resources and services.It is a virtual shared service.Cloud Computing has three basic abstraction layers System
layer(Virtual Machine abstraction of a server),Platform layer(A virtualized operating system, database and
webserver of a server and Application layer(It includes Web Applications).Denial of Service attack is an attempt
to make a machine or network resource unavailable to the intended user. In DOS a user or organization is
deprived of the services of a resource they would normally expect to have.A Successful DOS attack is a highly
noticeable event impacting the entire online user base.DOS attack is found by First Mathematical Metrical
Method (Rate Controlling,Timing Window,Worst Case and Pattern Matching)DOS attack not only affect the
Quality of the service and also affect the performance of the server. DDOS attacks are launched from Botnet-A
large Cluster of Connected device(cellphone,pc or router) infected with malware that allow remote control by an
attacker. Intruder using SIPDAS in DDOS to perform attack.SIPDAS attack strategies are detected using Heap
Space Monitoring Algorithm.
An improved fading Kalman filter in the application of BDS dynamic positioningIJRES Journal
Β
Aiming at the poor dynamic performance and low navigation precision of traditional fading
Kalman filter in BDS dynamic positioning, an improved fading Kalman filter based on fading factor vector is
proposed. The fading factor is extended to a fading factor vector, and each element of the vector corresponds to
each state component. Based on the difference between the actual observed quantity and the predicted one, the
value of the vector is changed automatically. The memory length of different channel is changed in real time
according to the dynamic property of the corresponding state component. The actual observation data of BDS is
used to test the algorithm. The experimental results show that compared with the traditional fading Kalman filter
and the method of the third references, the positioning precision of the algorithm is improved by 46.3% and
23.6% respectively.
Positioning Error Analysis and Compensation of Differential Precision WorkbenchIJRES Journal
Β
Positioning error is a widely problem exists in mechanism, the important factors affecting machining
precision. In order to reduce the error caused by positioning problem processing, based on the differential
workbench as the research object, using the method of theoretical analysis and experimental verification, the
analysis of positioning error mechanism and source of complete differential precision workbench error
compensation, improve the accuracy of the device, provides a method for the application of modern machine
tools. table.
Status of Heavy metal pollution in Mithi river: Then and NowIJRES Journal
Β
The Mithi River runs through the heart of suburban Mumbai. Its path of flow has been severely
damaged due to industrialization and urbanization. The quality of water has been deteriorating ever since. The
Municipal and industrial effluents are discharged in unchecked amounts. The municipal discharge comprises
untreated domestic and sewage wastes whereas the industries are majorly discharge chemicals and other toxic
effluents which are responsible in increasing the metal load of the river. In the current study, the water is
analysed for heavy metals- Copper, Cadmium, Chromium, Lead and Nickel. It also includes a brief
understanding on the fluctuations that have occurred in the heavy metal pollution, through the compilation of
studies carried out in the area previously.
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...IJRES Journal
Β
In order to analyze the temperature distribution of the low-temperature radiant floor heating system
that uses the condensing wall-hung boiler as the heat source, the heating system is designed according to a typical
house facing south in Shanghai. The experiments are carried out to study the effects of the supply water
temperature on the thermal comfort of the system. Eventually, the supply water temperature that makes people in
the room feel more comfortable is obtained. The result shows that in the condition of that the outside temperature
is 8~15β and the relative humidity is 30~70%RH, the temperature distribution in the room is from high to low
when the height is from bottom to top. The floor surface temperature is highest, but its uniformity is very poor.
When the heating system reaches the steady state, the air temperature of the room is uniform. When the supply
water temperature is 63β The room is relatively comfortable at the above experimental condition.
Experimental study on critical closing pressure of mudstone fractured reservoirsIJRES Journal
Β
In the process of oil and gas exploitation of mudstone-fractured reservoir in Daqing oilfield, the
permeability of fracture is easily affected by the influence of stress change, which is shown by the sensitivity of
the permeability to the stress. With the extension of time mining in the fractured mudstone reservoir, fracture
stress sensitivity is obvious in vast decline of production and great influence on reduced yields. In order to
reasonably determine the way of developing method, working system and the exploitation rate of the reservoir,
correspondingly protecting reservoir productivity, improve ultimate recovery. On the basis of the previous
research on the stress sensitivity of fractured mudstone, this essay studied the critical closing pressure of the
simulated underground fractured mudstone under the laboratory condition.
Correlation Analysis of Tool Wear and Cutting Sound SignalIJRES Journal
Β
With the classic signal analysis and processing method, the cutting of the audio signal in time
domain and frequency domain analysis. We reached the following conclusions: in the time domain analysis,
cutting audio signals mean and the variance associated with tool wear state change occurred did not change
significantly, and tool wear is not high degree of correlation, and the mean-square value of the audio signal
changes in the size and tool wear the state has a good relationship.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Β
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...IJRES Journal
Β
Rice stem borer is one of the important pests that attack plants so as to reduce production. One way
to control pests is to use organic fertilizers that make the plant stronger and healthier. This study was conducted
to determine the effects of organic fertilizers with various doses without the use of pesticides in controlling stem
borer, Scirpophaga incertulas. Methods using split-split plot design which consists of two levels of the whole
plot factor (solid and liquid organic fertilizers), two levels of the subplot factor (conventional and industry,
Tiens and Mitraflora), and four levels of the sub-subplot factor of conventional and industry (5, 10, 15, 20
tonnes/ha), and one level of the sub-subplot factor of Tiens and Mitraflora (each 2 ml/l). Based on the results
Statistical analysis there were no significant differences among treatments and this shows that the use of organic
fertilizers that only a dose of 5 tonnes/ha is sufficient available nutrients that make plants more robust and
resistant to control stem borer, besides that can reduce production costs and friendly to the environment when
compared with using inorganic fertilizers.
A novel high-precision curvature-compensated CMOS bandgap reference without u...IJRES Journal
Β
A novel high-precision curvature-compensated bandgap reference (BGR) without using op-amp
is presented in this paper. It is based on second-order curvature correction principle, which is a weighted sum of
two voltage curves which have opposite curvature characteristic. One voltage curve is achieved by first-order
curvature-compensated bandgap reference (FCBGR) without using op-amp and the other found by using W
function is achieved by utilizing a positive temperature coefficient (TC) exponential current and a linear
negative TC current to flow a linear resistor. The exponential current is gained by using anegative TC voltage to
control a MOSFET in sub-threshold region. In the temperature ranging from -40β to 125β, experimental
results implemented with SMIC 0.18ΞΌm CMOS process demonstrate that the presented BGR can achieve a TC
as low as 2.2 ppm/β and power-supply rejection ratio(PSRR)is -69 dB without any filtering capacitor at 2.0 V.
While the range of the supply voltage is from 1.7 to 3.0 V, the output voltage line regulation is about1 mV/ V
and the maximum TC is 3.4 ppm/β.
Structural aspect on carbon dioxide capture in nanotubesIJRES Journal
Β
In this work we reported the carbon dioxide adsorption (CO2) in six different nanostructures in order
to investigate the capturing capacity of the materials at nanoscale. Here we have considered the three different
nanotubes including zinc oxide nanotube (ZnONT), silicon carbide nanotube (SiCNT) and single walled carbon
nanotube (SWCNT). Three different chiralities such as zigzag (9,0), armchair (5,5) and chiral (6,4) having
approximately same diameter are analyzed. The adsorption binding energy values under various cases are
estimated with density functional theory (DFT). We observed CO2 molecule chemisorbed on ZnONT and
SiCNTβs whereas the physisorption is predominant in CNT. To investigate the structural aspect, the tubes with
defects are studied and compared with defect free tubes. We have also analyzed the electrical properties of tubes
from HOMO, LUMO energies. Our results reveal the defected structure enhance the CO2 capture and is
predicted to be a potential candidate for environmental applications.
Thesummaryabout fuzzy control parameters selected based on brake driver inten...IJRES Journal
Β
In this paper, the brake driving intention identification parameters based on the fuzzy control are
summarized and analyzed, the necessary parameters based on the fuzzy control of the brake driving intention
recognition are found out, and I pointed out the commonly corrupt parameters, and through the relevant
parameters , I establish the corresponding driving intention model.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
How to Make a Field invisible in Odoo 17Celine George
Β
It is possible to hide or invisible some fields in odoo. Commonly using βinvisibleβ attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Operation βBlue Starβ is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Β
Andreas Schleicher presents at the OECD webinar βDigital devices in schools: detrimental distraction or secret to success?β on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus βManaging screen time: How to protect and equip students against distractionβ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective βStudents, digital devices and successβ can be found here - https://oe.cd/il/5yV
How to Create Map Views in the Odoo 17 ERPCeline George
Β
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Home assignment II on Spectroscopy 2024 Answers.pdf
Β
Sequence Entropy and the Complexity Sequence Entropy For ππο Action
1. International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 1 Issue 7 Η Nov 2013 Η PP.30-33
www.ijres.org 30 | Page
Sequence Entropy and the Complexity Sequence Entropy For
π π
ο Action
BΓΌnyamin AYDIN
Education of Faculty, Necmettin Erbakan University, Konya- Turkey
Abstract. In this paper, we study the complexity of sequence entropy for π π
actions. After that, we
define πΆ πΌ πΉπΌ π , β πΌ πΉπΌ π and the relationships between sequence entropy and complexity sequence entropy.
Finally, comparisons between sequence entropy and complexity sequence entropy have been done.
Keywords: Sequence entropy, complexity, configuration spaces.2000 Mathematics Subject Classification.
37B05,54H20.
I. Introduction and Background
There are a lot of notions characterizing the variety of the behaviours of the individual trajectories of
the ergodic dynamical systems. And it is a natural interest to determine a quantity tool dividing the individual
trajectories. Itβs also obvious that this notion must have a connection with an entropy which is considered as a
measure of complexity and chaoticness of the dynamical systems in whole [8]. The complexity of finite object
was introduced by A.Komogorov and V.Tihomirov in [1] and it was conjectured that for Z actions the
complexity coincides with topological entropy [2], [3]. After introducing a notion of complexity of a finite
object, due to A.Komogorov [8] many authors tried to give the different variants of these quantity
characteristics. T.Kamae gave a definition of determinated trajectory and etc. [7] οΊ
As in ergodic theory one of the main tools to study the dynamical behaviour of a topological dynamical system
(i.e. a homeomorphism π: π β π where π is a compact metric space) is to understand its fundamental factors
and extensions.
In the category of topological dynamical system, in 1974 Goodman [6] introduced the notion of
topological sequence entropy and studied some properties of null systems which are defined as having zero
topological sequence entropy for any infinite sequence. It is a natural question whether we have similar
characterizations of topological mixing properties using topological sequence entropy.
In [5], [11], the first characterization of topological weak mixing was obtained using sequence entropy.
Namely, the authors localized the notion of sequence entropy by defining sequence entropy pairs and proved
that a system is topologically weakly mixing if any pair not in the diagonal is a sequence entropy pair.
Moreover, they showed that for a minimal system Kushnirenkoβstatement remains true module an almost one to
one extension, i.e. if a minimal system is null, then it is an almost one to one extension of a topological with
discrete spectrum [10], [9], [4]. Sequence entropy for a measure was introduced as an isomorphism invariant by
Kushnirenko, who used it to distinguish between transformations with the same entropy and spectral invariant. It
was also shown that an invertible measure preserving transformation has discrete spectrum if and only if for any
sequence the sequence entropy of the system is zero [3].Recently, in[4] the notion of topological mild mixing
was introduction.
Let π, π΄, π, π be an ergodic system. Let π΄ = π1, π2, π3, β¦ , π π be a finite set of symbols,(alphabet);
β¦ = π΄ π π
= π€ = π€π: π€π β π΄, π β π
be the space of configurations with Tychonoff topology, π be the shift in this configuration space:
Definition 1.1 A topological dynamical system (TDS for short) we mean a pair π, π where X is a compact
metric space (with metric d) and π: π β π is a homeomorphism. A topological dynamical system π, π is a
symbolic system on π π
, π is the π invariant closed subset of and π is the restriction of π to π.
Definition 1.2 For an arbitrary finite subset πΉ of π π
we denote by π΄ πΉ
the set of configuration on πΉ. Every point
π€ πΉ
= π€π, π β πΉ
on this set π΄ πΉ
is called a configuration stamp.
An increasing sequence of integers
Ο: 0 = Ο 0 < π 1 < β― < π k β 1
with π = 1,2, β¦ is called a window of size π. For π = 1,2, β¦ we denote by π the window of size π such that
π π = π π = 0,1,2, β¦ , π β 1
Let πΌ = πΌ0 πΌ1 πΌ2 β¦ be an infinite word over a finite π΄ with πππππ΄ β₯ 2, where πππππ΄ denotes the number of
elements in π΄. Let π be a windows of π. Let πΌ π + π the word πΌ π+π 0 πΌ π+π 1 β¦ πΌ π+π πβ1 over of length π. A
2. Sequence Entropy And The Complexity Sequence Entropy For π π
ο Action
www.ijres.org 31 | Page
finite word π0, π1, β¦ , π πβ1 is called a π βfactor of πΌ if π0, π1, β¦ , π πβ1 = πΌ π + π for some π = 0,1,2, β¦ . The
set of π βfactor of πΌ is denote by πΉπΌ π . We also denote πΉπΌ π = πΉπΌ π 7 .
II. Sequence Entropy
Let be π΄ a finite set #π΄ β₯ 2. Let π = 0,1,2,3, β¦ and π΄ π
be the product space. Let π π π β π be the
projection π΄ π
β π΄ defined by π π = πΌ π for any πΌ β π΄ π
. Let π be the shift on the space π΄ π
. Let Ο: 0 = Ο 0 <
π 1 < β― < π k β 1 , 0 be an infinite sequence of integers. We define sequence entropy
β πΌ πΉπΌ π = lim
πββ
π π’π
1
π
π» ππ 0 , ππ 1 , ππ 2 , β¦ , ππ πβ1 .
where π0, π1, π2, β¦ are considered as random variables on the probability space π΄ π
, . and π» β¦ is the
Shannonβs entropy of random variables.
Corollary 2.1. For πΌ β π΄ π
, assume that
π πΌ = π€ β lim
πββ
1
π
πΏ π π πΌ
πβ1
π=0
exits, where πΏ π₯ is the unit measure at π₯ β π΄ π
and the βw-limβ implies the weak limit on the space of measures
[7].
Let π΄ be an algorithm defined on some subset of a space of all finite 0,1 words and taking values in the set of
all finite words of π΄ and π π be an amount of sings in a 0,1 word p:
Now let πΆπ π define comlexity of the configuration space π€ β π relatively to the program π as
πΆπ π = lim
πββ
π π’π π€βπ
1
π
πΆπ π|πΌ π
where πΌ πΎ = π1, π2, π3, β¦ , π π β π π
: βπ β€ ππ β€ π, π = 1,2,3, β¦ , π , πΌπ = 2π + 1 2
.
Let π be such a program that for an arbitrary program πβ² we have a constant πΆ π, πβ² such that for every stamp
the inequality
πΆπ π β€ πΆπβ² π + πΆπ π, πβ² 2 .
III. Complexity of Sequence Entropy
We define the complexity πΉπΌ π in the usual sense and the maximal pattern complexity by π πΌ π as a function
on π β 1,2,3, β¦ by
π πΌ π = # πΌ π+π 0 , πΌ π+π 1 , πΌ π+π 2 , β¦ , πΌ π+π πβ1 : π: 1,2, β¦ ,
πβ π = π π’ππ#πβ π .
Where the "sup" is taken over all windows π of size π.
Now we define the complexity πΆ πΌ πΉπΌ π space of configurations with Tychonoff topology:
πΆ πΌ πΉπΌ π = lim
πββ
π π’π
1
π
π πΌ π .
For windows π and πβ²
of size π and π + 1, respectively, such that π π = πβ²
(π) for π = 1,2,3, β¦ π,
we call πβ² an immediate extension of π.
Proposition 3.1. For every symbolic system π, π and windows π and πβ² of the size π,
πΆ πΌ πΉπΌ πβ² = πΆ πΌ πΉπΌ π
Let πΌ be a recurrent infinite word over a finite set π΄. For every symbolic system π, π and arbitrary optimal
programs π1 and π2, let us prove the inequality
πΆ πΌ πΉπΌ πβ² β€ πΆ πΌ πΉπΌ π
From the definition of an asymptotically optimal program we have for an arbitrary stamp π πΌ π
πΆ πΌ πΉπΌ πβ² = πΆ πΌ πΉπΌ π + πΆ πΌ π1, π2
where πΆ πΌ π1, π2 is a constant. Thus
π π’π π€βπ πΆ πΌ π πΌ πβ² β€ π π’π π€βπ πΆ πΌ π πΌ π + πΆ πΌ π1, π2
and then
1
π
π π’π π€βπ πΆ πΌ π πΌ πβ² β€
1
π
π π’π π€βπ πΆ πΌ π πΌ π +
1
π
πΆ πΌ π1, π2
But for every constant πΆ πΌ π1, π2 we have
lim
πββ
1
2π + 1
πΆ πΌ π1, π2 = 0
So
πΆ πΌ πΉπΌ πβ² β€ πΆ πΌ πΉπΌ π
Corollary 3.2. For πΌ β π΄ π
, assume that