:In this paper an attempt is made to transform Kolomogrov Maximal inequality, Koronecker Lemma, Loeve’s Lemma and Kolomogrov’s strong law of large numbers for independent, identically distributive fuzzy Random variables. The applications of this results is extensive and could produce intensive insights on Fuzzy Random variables
Fixed Point Results In Fuzzy Menger Space With Common Property (E.A.)IJERA Editor
This paper presents some common fixed point theorems for weakly compatible mappings via an implicit relation in Fuzzy Menger spaces satisfying the common property (E.A)
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Matrix Transformations on Paranormed Sequence Spaces Related To De La Vallée-...inventionjournals
In this paper, we determine the necessary and sufficient conditions to characterize the matrices which transform paranormed sequence spaces into the spaces 푉휎 (휆) and 푉휎 ∞(휆) , where 푉휎 (휆) denotes the space of all (휎, 휆)-convergent sequences and 푉휎 ∞(휆) denotes the space of all (휎, 휆)-bounded sequences defined using the concept of de la Vallée-Pousin mean.
In this paper, the concepts of sequences and series of complement normalized fuzzy numbers are introduced in terms of 𝛾-level, so that some properties and characterizations are presented, and some convergence theorems are proved
Fixed Point Results In Fuzzy Menger Space With Common Property (E.A.)IJERA Editor
This paper presents some common fixed point theorems for weakly compatible mappings via an implicit relation in Fuzzy Menger spaces satisfying the common property (E.A)
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Matrix Transformations on Paranormed Sequence Spaces Related To De La Vallée-...inventionjournals
In this paper, we determine the necessary and sufficient conditions to characterize the matrices which transform paranormed sequence spaces into the spaces 푉휎 (휆) and 푉휎 ∞(휆) , where 푉휎 (휆) denotes the space of all (휎, 휆)-convergent sequences and 푉휎 ∞(휆) denotes the space of all (휎, 휆)-bounded sequences defined using the concept of de la Vallée-Pousin mean.
In this paper, the concepts of sequences and series of complement normalized fuzzy numbers are introduced in terms of 𝛾-level, so that some properties and characterizations are presented, and some convergence theorems are proved
Part of Lecture series on EE646, Fuzzy Theory & Applications delivered by me during First Semester of M.Tech. Instrumentation & Control, 2012
Z H College of Engg. & Technology, Aligarh Muslim University, Aligarh
Reference Books:
1. T. J. Ross, "Fuzzy Logic with Engineering Applications", 2/e, John Wiley & Sons,England, 2004.
2. Lee, K. H., "First Course on Fuzzy Theory & Applications", Springer-Verlag,Berlin, Heidelberg, 2005.
3. D. Driankov, H. Hellendoorn, M. Reinfrank, "An Introduction to Fuzzy Control", Narosa, 2012.
Please comment and feel free to ask anything related. Thanks!
Part of Lecture series on EE646, Fuzzy Theory & Applications delivered by me during First Semester of M.Tech. Instrumentation & Control, 2012
Z H College of Engg. & Technology, Aligarh Muslim University, Aligarh
Reference Books:
1. T. J. Ross, "Fuzzy Logic with Engineering Applications", 2/e, John Wiley & Sons,England, 2004.
2. Lee, K. H., "First Course on Fuzzy Theory & Applications", Springer-Verlag,Berlin, Heidelberg, 2005.
3. D. Driankov, H. Hellendoorn, M. Reinfrank, "An Introduction to Fuzzy Control", Narosa, 2012.
Please comment and feel free to ask anything related. Thanks!
International Journal of Mathematics and Statistics Invention (IJMSI)inventionjournals
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Fixed Point Theorem in Fuzzy Metric Space Using (CLRg) Propertyinventionjournals
The object of this paper is to establish a common fixed point theorem for semi-compatible pair of self maps by using CLRg Property in fuzzy metric space.
Synaptic memristor bridge circuit with pulse width based programable weights ...inventionjournals
Memristor bridge circuit linearly generates synaptic weights in the range [-1; 1]. A long width pulse programs the synaptic weights and a short width pulse computes multiplication results in ANN model. Each digit is sampled by 10 times, forming 5x4 matrix. Thecharacter recognition rate achieves 100% for digits from 1 through 5 . 5%, 10%, and 15% noisy patterns is added to consider the recognition rate.
New classes of Adomian polynomials for the Adomian decomposition method inventionjournals
In this paper, we proposed two new classes of the Adomian polynomials for the well-known Adomian decomposition method (ADM). The regular polynomials 퐴푛 in the ADM method is replaced by the new classes to solve nonlinear ordinary, partial and fractional differential equations. Numerical test examples indicates that the use of the proposed polynomials in the ADM method gives more accurate approximate solutions than the regular Adomian polynomials 퐴푛 for the same number of solution components.
Bagasse based high pressure co-generation in Pakistaninventionjournals
The paper reports on the assessment of the use of bagasse in sugar industry for high pressure cogeneration. Study was done on a sugar mill which has recently adopted this technology. This paper investigates the efficiency of season and off season operation of sugar mill, high pressure cogeneration technology is much more efficient in bagasse to steam ratio. During seasonal operation CHP efficiency is 76.8% and during offseason its value is 29.9%.Project initial cost is high but payback period is low. It will encourage other sugar mills in Pakistan for the development of high pressure co-generation system to meet increasing energy demands in the country.
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...inventionjournals
The problem of web search time complexity and accuracy has been visited in many research papers, and the authors discussed many approaches to improve the search performance. Still the approaches does not produce any noticeable improvement and struggles with more time complexity as well. To overcome the issues identified, an efficient multi mode conceptual clustering algorithm has been discussed in this paper, which identifies the similar interested user groups by clustering their search context according to different conceptual queries. Identified user groups are shared with the related conceptual queries and their results to reduce the time complexity. The multi mode conceptual clustering, performs grouping of search queries and users according to number of users and their search pattern. The concept of search is identified by using Natural language processing methods and the web logs produced by the default web search engines. The author designed a dedicated web interface to collect the web log about the user search and the same data has been used to cluster the social groups according to number of conceptual queries. The search results has been shared between the users of identified social groups which reduces the search time complexity and improves the efficiency of web search in better manner
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...inventionjournals
One of the most significant challenges introduced by mobile networks is the difficulty in coping withthe unpredictable movement of Geocast mobile nodes. If, instead, the Geocast mobile nodes could be programmed totravel through the world in a predictable and useful manner, the task of designing algorithms for mobile networks would be significantly simplified.Geocasting represents today a challengingfield of research due to the numerous application scenariosoffered by ad hoc and sensor networks. Recently, the some Geocast routing protocols have beenproposed, most of which are basically inherited from unicastrouting solutions and consequently are not optimizedfor Geocast applications. Another, more interesting, classof region, which will be referred to as position-awareGeocast routing Algorithm, follow a progressive reductionin the distance to the destination, every time a relaynode must be chosen for forwarding a data packet. Thisallows to avoid the unnecessary dissemination of datapackets to nodes farther away from the destination andthe consequent useless energy consumption. This paperwill focus on the exploitation of this interesting positionawareapproach which seems to be more suitable forthe scenarios under consideration.
Part of Lecture series on EE646, Fuzzy Theory & Applications delivered by me during First Semester of M.Tech. Instrumentation & Control, 2012
Z H College of Engg. & Technology, Aligarh Muslim University, Aligarh
Reference Books:
1. T. J. Ross, "Fuzzy Logic with Engineering Applications", 2/e, John Wiley & Sons,England, 2004.
2. Lee, K. H., "First Course on Fuzzy Theory & Applications", Springer-Verlag,Berlin, Heidelberg, 2005.
3. D. Driankov, H. Hellendoorn, M. Reinfrank, "An Introduction to Fuzzy Control", Narosa, 2012.
Please comment and feel free to ask anything related. Thanks!
Part of Lecture series on EE646, Fuzzy Theory & Applications delivered by me during First Semester of M.Tech. Instrumentation & Control, 2012
Z H College of Engg. & Technology, Aligarh Muslim University, Aligarh
Reference Books:
1. T. J. Ross, "Fuzzy Logic with Engineering Applications", 2/e, John Wiley & Sons,England, 2004.
2. Lee, K. H., "First Course on Fuzzy Theory & Applications", Springer-Verlag,Berlin, Heidelberg, 2005.
3. D. Driankov, H. Hellendoorn, M. Reinfrank, "An Introduction to Fuzzy Control", Narosa, 2012.
Please comment and feel free to ask anything related. Thanks!
International Journal of Mathematics and Statistics Invention (IJMSI)inventionjournals
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Fixed Point Theorem in Fuzzy Metric Space Using (CLRg) Propertyinventionjournals
The object of this paper is to establish a common fixed point theorem for semi-compatible pair of self maps by using CLRg Property in fuzzy metric space.
Synaptic memristor bridge circuit with pulse width based programable weights ...inventionjournals
Memristor bridge circuit linearly generates synaptic weights in the range [-1; 1]. A long width pulse programs the synaptic weights and a short width pulse computes multiplication results in ANN model. Each digit is sampled by 10 times, forming 5x4 matrix. Thecharacter recognition rate achieves 100% for digits from 1 through 5 . 5%, 10%, and 15% noisy patterns is added to consider the recognition rate.
New classes of Adomian polynomials for the Adomian decomposition method inventionjournals
In this paper, we proposed two new classes of the Adomian polynomials for the well-known Adomian decomposition method (ADM). The regular polynomials 퐴푛 in the ADM method is replaced by the new classes to solve nonlinear ordinary, partial and fractional differential equations. Numerical test examples indicates that the use of the proposed polynomials in the ADM method gives more accurate approximate solutions than the regular Adomian polynomials 퐴푛 for the same number of solution components.
Bagasse based high pressure co-generation in Pakistaninventionjournals
The paper reports on the assessment of the use of bagasse in sugar industry for high pressure cogeneration. Study was done on a sugar mill which has recently adopted this technology. This paper investigates the efficiency of season and off season operation of sugar mill, high pressure cogeneration technology is much more efficient in bagasse to steam ratio. During seasonal operation CHP efficiency is 76.8% and during offseason its value is 29.9%.Project initial cost is high but payback period is low. It will encourage other sugar mills in Pakistan for the development of high pressure co-generation system to meet increasing energy demands in the country.
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...inventionjournals
The problem of web search time complexity and accuracy has been visited in many research papers, and the authors discussed many approaches to improve the search performance. Still the approaches does not produce any noticeable improvement and struggles with more time complexity as well. To overcome the issues identified, an efficient multi mode conceptual clustering algorithm has been discussed in this paper, which identifies the similar interested user groups by clustering their search context according to different conceptual queries. Identified user groups are shared with the related conceptual queries and their results to reduce the time complexity. The multi mode conceptual clustering, performs grouping of search queries and users according to number of users and their search pattern. The concept of search is identified by using Natural language processing methods and the web logs produced by the default web search engines. The author designed a dedicated web interface to collect the web log about the user search and the same data has been used to cluster the social groups according to number of conceptual queries. The search results has been shared between the users of identified social groups which reduces the search time complexity and improves the efficiency of web search in better manner
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...inventionjournals
One of the most significant challenges introduced by mobile networks is the difficulty in coping withthe unpredictable movement of Geocast mobile nodes. If, instead, the Geocast mobile nodes could be programmed totravel through the world in a predictable and useful manner, the task of designing algorithms for mobile networks would be significantly simplified.Geocasting represents today a challengingfield of research due to the numerous application scenariosoffered by ad hoc and sensor networks. Recently, the some Geocast routing protocols have beenproposed, most of which are basically inherited from unicastrouting solutions and consequently are not optimizedfor Geocast applications. Another, more interesting, classof region, which will be referred to as position-awareGeocast routing Algorithm, follow a progressive reductionin the distance to the destination, every time a relaynode must be chosen for forwarding a data packet. Thisallows to avoid the unnecessary dissemination of datapackets to nodes farther away from the destination andthe consequent useless energy consumption. This paperwill focus on the exploitation of this interesting positionawareapproach which seems to be more suitable forthe scenarios under consideration.
Design and Fabrication of a Recreational Human-Powered Vehicleinventionjournals
Human-powered vehicle (HPV) is often the only type of available transport that is underdeveloped and commonly unavailable in mass production. In many cases, it is acustom madevehicle for recreational and only few units are produced due to unobtainable off-the-shelf parts. This paper presents a modest design and development of human powered vehicle for recreational purpose. The basic constraints of the design are recumbent type of seat and wheel base and track sizes are 1.5 m and 1.0 m respectively. Commercial computer aided design (CAD) software is used for drawing and design. Stress analysis is performed on the conceptual design with possible loads and constraints. Available off-the-shelf materials and parts are used and assembled in the fabrication of the HPV to demonstrate the design for manufacture (DFM) practices. The final product is tested for basic functionality as HPV.
Certain D - Operator for Srivastava H B - Hypergeometric Functions of Three V...inventionjournals
The aim of this paper is to derive certain relations involving Srivastava’s hypergeometric functions H B in three variables. Many operator identities involving these pairs of symbolic operators are first constructed for this purpose. By means of these operator identities, which express the aforementioned H B - hypergeometric functions in terms of such simpler functions as the products of the Gauss and Appell hypergeometric functions. Other closely-related results are also considered briefly. Also, we have derived certain new integral representations for the H B - hypergeometric functions of three variables defined earlier by Lauricella [ 8 ] and Srivastava [14 ] .
New binary memristor crossbar architecture based neural networks for speech r...inventionjournals
In this paper, we propose a new binary memristor crossbar architecture based neural networks for speech recognition. The circuit can recognize five vowels. The proposed crossbar is tested by 1,000 speech samples and recognized 94% of the tested samples. We use Monte Carlo simulation to estimate recognitition rate. The percentage variation in memristance is increased from 0% to 15%, the recognition rate is degraded from 94% to 82%.
Leadership, an important universal polymorphic phenomenon found in all cultures of all ages, in all groups and based on certain sources of influence and power, exhibits certain qualities. These qualities of leadership will constitute the subject – matter of this article.
Man, the different situations in which he finds himself, the diversity of aims, objectives and functions that he purpose and that are laid down for him and the many types of frames of reference in which he finds himself, are all together so complex and complicated that we cannot evolve anything like a universal formula for leadership. In fact the most that we can say and we can say it all generic elements of administration – is that the success of leadership in the final analysis is determined by the knowledge of the leader and of the people he leads. This knowledge includes knowledge of things outside the group’s own frame of reference. All this constitute the subject – matter of this article.
Effect of Wind Direction through Double Storied Building Model Configurations...inventionjournals
: Effect of wind direction on plume dispersion around urban buildings has been investigated by physical modelling using arrays of buildings- like obstacles at scale 1:100 in boundary layer wind tunnel for double storied buildings and compared with field data. The particular effect of obstacle width- to - height ratio (S/H) was examined for a fixed obstacle plan area density. Series of experiments have been carried out in which the wind direction varied in steps of 5 for selected orientation of line source at 900 , 95, 100 and 105. Further, from the observation, it was concluded that the maximum lateral concentration shift to upward the wind direction of line source is increased for inline double storied buildings model configuration. It can be concluded, the wind tunnel results showed that concentrations at downwind distances decreased as the wind direction increases (positive values) for measured orientation of line source in inline double storied buildings model configuration. In comparison, experimentally observed σz values are below the field values. They were best fitted with power-law profiles. The non-dimensional concentration for both the field and wind tunnel results of double storied inline buildings configuration seems to be more or less uniform. Values of vertical spread parameters for double storied inline array configuration and field data were followed a similar trend but inline array configuration of double storied buildings model, non-dimensional concentrations were typically twice larger compared to the field data. This is attributed to the fact that the tracer material is quite concentrated in the recirculation region in inline array configuration of the double storied buildings model.
Despite huge sums of money being spent by the federal government of Nigeria in adopting various techniques for a free and fair election in the country, numerous problems are still militating against it. These problems include:- wide rigging of elections, multiple registrations and voting, late arrival of ballot boxes, stealing of ballot boxes, under-aged voting, illegal voting by non-Nigerian nationals, rioting and fighting at election venues due to insufficient number of security personnel, disenfranchisement of those in Diaspora as well as the physically handicapped by virtue of election distances to them, prolonged delay in accreditation of voters for election, cancellation of votes due to improper voting, prolonged counting of votes and delay in determining the result of an election, etc. This work showed how e-voting through the use of mobile phones and PCs would totally eradicate all these problems as people would no longer go to election venues to cast their votes, rather they would be at the comfort of their homes and offices to exercise their franchise using any of these electronic devices effortlessly. E-voting requires a web application program – at the back end – that would be written by computer experts and deployed on a web server so that clients – that is, PCs and mobile phones of voters – can be used to query it on constant basis during elections.
Middle Range Theories as Coherent Intellectual Frameworksinventionjournals
The argument is advanced that sound logical reasoning is essential in understanding the complex concept of middle range theories. This may be explainable as follows: firstly, that epistemological rules and principles are wider and incorporate under to incorporate such concepts as generalization; theoretical paradigms; empirical theories; formal theories; and intellectual theoretical and conceptual frameworks: major premise designated as B. Secondly, that middle range theories have three sets of meanings: called minor premises designated as B1; and these three sets of meanings are: (a)theoretical paradigms as forms of middle range theories are the basic sets of assumptions ideas and unified viewpoints: called minor premise B2; (b) empirical theories as forms of middle range theories as forms of middle range theories are conceptual models of analysis: minor premise B3; (c) formal theories as forms of middle range theories, designated as minor premise B4. (d) Therefore, minor premises B1, B2, B3 and B4 are related to B, major premise. Thirdly, the broader epistemological rules and principles thus incorporate the middle range theories as coherent intellectual frameworks. The latter aspect forms the subject of this article.
Importance and Functions of Bills of Quantities in the Construction Industry:...inventionjournals
Bills of Quantities (BQ) is one of systematic ways applied in the construction industry in which its primary function is to record items of works for tendering purposes and to create a fair agreement among the parties involved for contracting purposes. However, there are some issues pertaining to BQ functions such as BQ is a misunderstood facet in the construction industry today, BQ is only useful for tendering purposes, BQ’s benefit is not fully utilised by the construction team and most of them cannot relate BQ with everyday construction works and processes. Therefore, the purpose of this paper is to study on the importance of BQ and its functions in the construction industry. A content analysis was used to identify the importance and functions of BQ from reviewing articles and books. Findings from this paper are beneficial in providing knowledge to the education field and construction teams on the importance and functions of BQ in the construction industry.
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security should cover are authentication, authorization, data protection etc. Establishing trust between cloud service providers (CSP) is the biggest challenge, when someone is discussing about cloud security. Trust is a critical factor which mainly depends on perception of reputation and self-assessment done by both user and CSP. The trust model can act as security strength evaluator and ranking service for cloud application and services. For establishing trust relationship between two parties, mutual trust mechanism is reliable, as it does verification from both sides. There are various trust models which mainly focuses on securing one party i.e., they validate either user or service node. In this survey paper, the study of various trust models and their various parameters are discussed.
Comparison of Supercritical Fluid Extraction with Steam Distillation for the ...inventionjournals
Bay oil, an extract of Pimenta Racemosa, is produced in Dominica by the traditional process of Steam Distillation Extraction (SDE), and commercially utilised in the perfume and food industries. The objective of the work described in this paper seeks to investigate if it could be better produced by Supercritical Fluid Extraction (SFE) using carbon dioxide as extracting fluid. Experiments were therefore carried out on a bench scale SFE unit to evaluate the extraction characteristics of bay leaves and to compare the results with those from a bench scale SDE unit. The results showed that the SFE extracts contained mainly eugenol and chavicol up to about 1 hour of extraction time, after which higher components, including waxes, were incorporated into the extracts. The optimum operating conditions were deemed to be 150 bar pressure and 50oC temperature. The SDE extracts were also mainly eugenol and chavicol, but in addition contained a significant quantity of myrcene. The extract yield from SFE after I hour was similar to that of the ultimate yield from SDE (~4.0%), but the extraction time for SDE was in excess of twice that figure. It is concluded that the higher phenol content of the SFE product together with lower extraction times makes the use of SFE potentially preferable to the traditional SDE process.
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...inventionjournals
This paper presents a novel approach to face recognition. The task of face recognition is to verify a claimed identity by comparing a claimed image of the individual with other images belonging to the same individual/other individual in a database. The proposed method utilizes Local Ternary Pattern and signed bit multiplication to extract local features of a face. The image is divided into small non-overlapping windows. Processing is carried out on these windows to extract features. Test image’s features are compared with all the training images using Euclidean's distance. The image with lowest Euclidean distance is recognized as the true face image. If the distance between test and all training images is more than threshold then test image is considered as unrecognised image or match not found .The face recognition rate of proposed system is calculated by varying the number of images per person in training database
Numerical Study of Some Iterative Methods for Solving Nonlinear Equationsinventionjournals
In this paper we introduce, numerical study of some iterative methods for solving non linear equations. Many iterative methods for solving algebraic and transcendental equations is presented by the different formulae. Using bisection method , secant method and the Newton’s iterative method and their results are compared. The software, matlab 2009a was used to find the root of the function for the interval [0,1]. Numerical rate of convergence of root has been found in each calculation. It was observed that the Bisection method converges at the 47 iteration while Newton and Secant methods converge to the exact root of 0.36042170296032 with error level at the 4th and 5th iteration respectively. It was also observed that the Newton method required less number of iteration in comparison to that of secant method. However, when we compare performance, we must compare both cost and speed of convergence [6]. It was then concluded that of the three methods considered, Secant method is the most effective scheme. By the use of numerical experiments to show that secant method are more efficient than others.
The Case for Developing and Introducing the M-Procurement System in Nigeria, ...inventionjournals
In this paper the author points out how in the last few years mobile technology has improved a great deal in countries like Nigeria, where individuals possess two or three SIM (Subscriber Identity Module) cards issued from different major mobile service providers. The paper opines that owing to this increased pervasiveness of mobile networks, in the enterprises mobile computing should gradually be replacing the use of desktop systems; the paper went on to highlight the need to leverage this ubiquity of mobile computing and network in improving and overhauling the Nigeria’s clumsy, very slow and oftentimes corrupt procurement system. An architectural model that will support the introduction of m-procurement (mobile procurement) systems was unraveled and examined. Ongoing related works in this regard were discussed. The paper concluded by spurring software application developers and designers to start thinking on the perspectives highlighted by the author.
Some properties of two-fuzzy Nor med spacesIOSR Journals
The study sheds light on the two-fuzzy normed space concentrating on some of their properties like convergence, continuity and the in order to study the relationship between these spaces
COMMON FIXED POINT THEOREMS IN COMPATIBLE MAPPINGS OF TYPE (P*) OF GENERALIZE...mathsjournal
In this paper, we give some new definition of Compatible mappings of type (P), type (P-1) and type (P-2) in intuitionistic generalized fuzzy metric spaces and prove Common fixed point theorems for six mappings under the conditions of compatible mappings of type (P-1) and type (P-2) in complete intuitionistic fuzzy metric spaces. Our results intuitionistically fuzzify the result of Muthuraj and Pandiselvi [15]
COMMON FIXED POINT THEOREMS IN COMPATIBLE MAPPINGS OF TYPE (P*) OF GENERALIZE...mathsjournal
In this paper, we give some new definition of Compatible mappings of type (P), type (P-1) and type (P-2) in intuitionistic generalized fuzzy metric spaces and prove Common fixed point theorems for six mappings under the conditions of compatible mappings of type (P-1) and type (P-2) in complete intuitionistic fuzzy metric spaces.
COMMON FIXED POINT THEOREMS IN COMPATIBLE MAPPINGS OF TYPE (P*) OF GENERALIZE...mathsjournal
In this paper, we give some new definition of Compatible mappings of type (P), type (P-1) and type (P-2) in intuitionistic generalized fuzzy metric spaces and prove Common fixed point theorems for six mappings under the
conditions of compatible mappings of type (P-1) and type (P-2) in complete intuitionistic fuzzy metric spaces. Our results intuitionistically fuzzify the result of Muthuraj and Pandiselvi [15]
Mathematics subject classifications: 45H10, 54H25
Existance Theory for First Order Nonlinear Random Dfferential Equartioninventionjournals
In this paper, the existence of a solution of nonlinear random differential equation of first order is proved under Caratheodory condition by using suitable fixed point theorem. 2000 Mathematics Subject Classification: 34F05, 47H10, 47H4
We continue the study of the concepts of minimality and homogeneity in the fuzzy context. Concretely, we introduce two new notions of minimality in fuzzy bitopological spaces which are called minimal fuzzy open set and pairwise minimal fuzzy open set. Several relationships between such notions and a known one are given. Also, we provide results about the transformation of minimal, and pairwise minimal fuzzy open sets of a fuzzy bitopological space, via fuzzy continuous and fuzzy open mappings, and pairwise continuous and pairwise open mappings, respectively. Moreover, we present two new notions of homogeneity in the fuzzy framework. We introduce the notions of homogeneous and pairwise homogeneous fuzzy bitopological spaces. Several relationships between such notions and a known one are given. And, some connections between minimality and homogeneity are given. Finally, we show that cut bitopological spaces of a homogeneous (resp. pairwise homogeneous) fuzzy bitopological space are homogeneous (resp. pairwise homogeneous) but not conversely.
On Spaces of Entire Functions Having Slow Growth Represented By Dirichlet SeriesIOSR Journals
In this paper spaces of entire function represented by Dirichlet Series have been considered. A
norm has been introduced and a metric has been defined. Properties of this space and a characterization of
continuous linear functionals have been established.
Common Fixed Point Theorems in Compatible Mappings of Type (P*) of Generalize...mathsjournal
In this paper, we give some new definition of Compatible mappings of type (P), type (P-1) and type (P-2) in intuitionistic generalized fuzzy metric spaces and prove Common fixed point theorems for six mappings
under the conditions of compatible mappings of type (P-1) and type (P-2) in complete intuitionistic fuzzy
metric spaces. Our results intuitionistically fuzzify the result of Muthuraj and Pandiselvi [15]
Mathematics subject classifications: 45H10, 54H25
Matrix Transformations on Some Difference Sequence SpacesIOSR Journals
The sequence spaces 𝑙∞(𝑢,𝑣,Δ), 𝑐0(𝑢,𝑣,Δ) and 𝑐(𝑢,𝑣,Δ) were recently introduced. The matrix classes (𝑐 𝑢,𝑣,Δ :𝑐) and (𝑐 𝑢,𝑣,Δ :𝑙∞) were characterized. The object of this paper is to further determine the necessary and sufficient conditions on an infinite matrix to characterize the matrix classes (𝑐 𝑢,𝑣,Δ ∶𝑏𝑠) and (𝑐 𝑢,𝑣,Δ ∶ 𝑙𝑝). It is observed that the later characterizations are additions to the existing ones
Devaney Chaos Induced by Turbulent and Erratic FunctionsIOSRJM
Let I be a compact interval and f be a continuous function defined from I to I. We study the relationship between tubulent function, erratic function and Devaney Chaos.
Dual Spaces of Generalized Cesaro Sequence Space and Related Matrix Mappinginventionjournals
In this paper we define the generalized Cesaro sequence spaces 푐푒푠(푝, 푞, 푠). We prove the space 푐푒푠(푝, 푞, 푠) is a complete paranorm space. In section-2 we determine its Kothe-Toeplitz dual. In section-3 we establish necessary and sufficient conditions for a matrix A to map 푐푒푠 푝, 푞, 푠 to 푙∞ and 푐푒푠(푝, 푞, 푠) to c, where 푙∞ is the space of all bounded sequences and c is the space of all convergent sequences. We also get some known and unknown results as remarks.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Fuzzy random variables and Kolomogrov’s important results
1. International Journal of Engineering Science Invention
ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726
www.ijesi.org ||Volume 5 Issue 3|| March 2016 || PP.45-61
www.ijesi.org 45 | Page
Fuzzy random variables and Kolomogrov’s important results
1
Dr.Earnest Lazarus Piriya kumar, 2
R. Deepa,
1
Associate Professor, Department of Mathematics, Tranquebar Bishop Manickam Lutheran College, Porayar,
India.
2
Assistant Professor, Department of Mathematics, E.G.S. Pillay Engineering College, Nagapattinam,
Tamilnadu, India.
ABSTRACT :In this paper an attempt is made to transform Kolomogrov Maximal inequality, Koronecker
Lemma, Loeve’s Lemma and Kolomogrov’s strong law of large numbers for independent, identically distributive
fuzzy Random variables. The applications of this results is extensive and could produce intensive insights on
Fuzzy Random variables.
Keywords :Fuzzy Random Variables, Fuzzy Real Number, Fuzzy distribution function, Strong law of Large
Numbers.
I. Introduction
The theory of fuzzy random variables and fuzzy stochastic processes has received much attention in
recent years [1-12]. Prompted for studying law of large numbers for fuzzy random variables is both theoretical
since of major concern in fuzzy stochastic theory as in the case of classical probability theory would be the
different limit theorems for sequences of fuzzy random variables and practically since they are applicable to
statistical analysis when samples or prior information are fuzzy. The concept of fuzzy random variables was
introduced by Kwakernack [4] and Puri and Ralesea [6].
In order to make fuzzy random variables applicable to statistical analysis for imprecise data, we need to
come up with weak law of large numbers, strong law of large numbers and Kolomogorov inequalities. In the
present paper we have deduced Kolomogrov maximal inequality, Kronecker’s lemma, and Loeve’s Lemma.
2. Preliminaries
In this section, we describe some basic concepts of fuzzy numbers. Let R denote the real line. A fuzzy
number is a fuzzy set 𝑢 : 𝑅 → [0, 1] with the following properties.
1) 𝑢 is normal, i.e. there exists 𝑥 ∈ 𝑅 such that 𝑢 (𝑥) = 1.
2) 𝑢 is upper semicontinuous.
3) Supp𝑢 = 𝑐𝑙{𝑥 ∈ 𝑅 ∶ 𝑢 𝑥 > 0} is compact.
rights reserved.
4) 𝑢 is a convex fuzzy set, i.e. 𝑢 𝜆𝑥 + 1 − 𝜆 𝑦 ≥ min (𝑢(x)), 𝑢 (y)) for x, y, ∈ R and 𝜆 ∈ [0, 1].
Let F(R) be the family of all fuzzy numbers. For a fuzzy set 𝑢, if we define.
𝑥: 𝑢 𝑥 ≥ ∝ , 0 < ∝ ≤ 1,
𝐿 𝑎 𝑢 =
Supp 𝑢 ∝ = 0
Then it follows that 𝑢 is a fuzzy number if and only if 𝐿1 𝑢 ≠ ∅ and 𝐿 𝑎 𝑢 is a closed bounded interval
for each 𝜆 ∈ [0, 1].
From this characterization of fuzzy numbers, a fuzzy number 𝑢 is a completely determined by the end
points of the intervals 𝐿 𝑎 𝑢 = [𝑢 𝑥
–
,𝑢 𝑥
+
].
3. Fuzzy Random Variables:
Throughout this paper, (Ω, 𝐴, 𝑃) denotes a complete probability space.
2. Fuzzy random variables and Kolomogrov’s…
www.ijesi.org 46 | Page
If 𝑥 : Ω → 𝐹(𝑅) is a fuzzy number valued function and B is a subset of R, then 𝑋–1
(𝐵) denotes the fuzzy subset
of 𝛺 defined by
𝑋–1
𝐵 𝜔 = Sup 𝑥∈𝐵 𝑋(𝜔)(𝑥)
for every 𝜔 ∈ 𝛺. The function 𝑋 : Ω → 𝐹(𝑅) is called a fuzzy random variable if for every closed subset B or
R, the fuzzy set 𝑋–1
𝐵 is measurable when consider as a function from 𝛺 to [0,1]. If we denote 𝑋(𝜔) =
{ 𝑋𝑥
–
(𝜔), 𝑋𝑥
–1
(𝜔) 0 ≤ ∝ ≤ 1 , then it is a well-known that 𝑋is a fuzzy random variable if and only if for each
∝ ∈ [0, 1]. 𝑋𝑥
–
and 𝑋𝑥
+
are random variable in the usual sense (for details, see Ref.[11]). Hence, if 𝜎 𝑋 is the
smallest 𝜎 − field which makes 𝑋is a consistent with 𝜎({𝑋𝑥
–
,𝑋𝑥
+
|0 ≤ ∝ ≤ 1}). This enables us to define the
concept of independence of fuzzy random variables as in the case of classical random variables.
4. Fuzzy Random Variable and its Distribution Function and Exception
Given a real number, x, we can induce a fuzzy number 𝑢 with membership function 𝜉𝑥 (r) such that 𝜉 𝑥
(x) < 1 for r ≠ x (i.e. the membership function has a unique global maximum at x). We call 𝑢 as a fuzzy real
number induced by the real member 𝑥.
A set of all fuzzy real numbers induced by the real number system the relation ~ on ℱℝ as 𝑥–1
~ 𝑥–2
if
and only if 𝑥–1
and 𝑥–2
are induce same real number x. Then ~ is an equivalence relation, which equivalence
classes [𝑥 ] = {𝑎 | 𝑎~ 𝑥 }. The quotient set ℱℝ/ ~ is the equivalence classes. Then the cardinality of ℱℝ/~ is
equal to the real number system ℝ since the map ℝ → ℱℝ/ ~ by x → [𝑥 ] is Necall ℱℝ/ ~ as the fuzzy real
number system.
Fuzzy real number system (ℱℝ/ ~ )Rconsists of canonical fuzzy real number we call ℱℝ/ ~ )R as the
canonical fuzzy real number system be a measurable space and ℝ, ℬ be a Borel measurable space. ℘(𝐑) (Power
set of R) be a set-valued function. According to is called a fuzzy-valued function if {(x, y) : y∈f(x)} is ℳ x ℬ.
f(x) is called a fuzzy-valued function if f : X → ℱ (the set of all numbers). If 𝑓 is a fuzzy-valued function then
𝑓𝑥 is a set-valued function [0, 1]. 𝑓 is called (fuzzy-valued) measurable if and only if 𝑓𝑥 is (set-urable for all ∝∈
[0,1].
Make fuzzy random variables more tractable mathematically, we strong sense of measurability for
fuzzy-valued functions. 𝑓(x) be a closed-fuzzy-valued function defined on X. From Wu wing two statements are
equivalent.
𝑓∝
𝑈
(x) are (real-valued) measurable for all ∝ ∈ [0, 1].
fuzzy-valued) measurable and one of 𝑓∝
𝐿
𝑥 and 𝑓∝
𝑈
(𝑥) is (real-value) measurable for all ∝∈ [0,1].
A fuzzy random variable called strongly measurable if one of the above two conditions is easy to see
that the strong measurability implies measurability. 𝜇) be a measure space and (ℝ, ℬ) be a Borel measurable
space. ℘(ℝ) be a set-valued function. For K ⊆ R the inverse image of f.
= { x ∈ 𝑋 ∶ 𝑓 𝑥 ⋂ 𝐾 ≠ ∅ }
u) be a complete 𝜎–finite measure space. From Hiai and Umehaki ing two statements are equivalent.
Borel set K ⊆ ℝ, f–1
(K) is measurable (i.e. f–1
(K) ∈ ℳ), y∈ 𝑓 𝑥 is ℳ x ℬ - measurable.
If 𝑥 is a canonical fuzzy real number then 𝑥1
–𝐿
= 𝑥1
𝑈
, Let 𝑋be a fuzzy random variable. 𝑥∝
𝐿
and 𝑥∝
𝑈
are random
variables for all x and 𝑥1
𝑈
. Let F(x) be a continuous distribution function of a random variable X. Let 𝑥∝
–𝐿
and
𝑥∝
𝑈
have the same distribution function F(x) for all ∝∈ [0,1]. For any fuzzy observation 𝑥 of fuzzy random
variable 𝑋 (𝑋 (𝜔) = 𝑥 ), the ∝-level set 𝑥 ∝ is 𝑥 ∝ = [𝑥∝
𝐿
, 𝑥∝
𝑈
]. We can see that 𝑥∝
𝐿
and𝑥∝
𝑈
are the
observations of 𝑥∝
𝐿
and 𝑥∝
𝑈
, respectively. 𝑥∝
𝐿
(𝜔) = 𝑥∝
𝐿
and 𝑥∝
𝑈
(𝜔) = 𝑥∝
𝑈
are continuous with respect to ∝ for
fixed 𝜔. Thus 𝑥∝
𝐿
, 𝑥∝
𝑈
is continuously shrinking with respect to ∝. Since [𝑥∝
𝐿
, 𝑥∝
𝑈
] is the disjoint union of [𝑥∝
𝐿
,
𝑥∝
𝐿
] and (𝑥1
𝐿
, 𝑥∝
𝑈
] (note that 𝑥1
𝐿
= 𝑥1
𝑈
), for any real number x ∈ [𝑥1
𝐿
, 𝑥∝
𝑈
], we have x = 𝑥𝛽
𝐿
or F (𝑥𝛽
𝑈
) with x. If we
construct an interval
3. Fuzzy random variables and Kolomogrov’s…
www.ijesi.org 47 | Page
A∝ = [min { inf∝≤𝛽≤1F(𝑥𝛽
𝐿
), inf∝≤𝛽≤1F(𝑥𝛽
𝐿
) }
max {sup∝≤𝛽≤1F(𝑥𝛽
𝐿
), sup∝≤𝛽≤1F(𝑥𝛽
𝐿
)}]
then this interval will contain all of the distributions. (values) associated with each of x ∈ [𝑥∝
𝐿
, 𝑥∝
𝑈
], We denote
𝐹 𝑥 the fuzzy distribution function of fuzzy random variable 𝑋 . Then we define the membership function of
𝐹(𝑥) for any fixed 𝑥by
𝜉 𝐹(𝑥) (r) = sup0≤∝≤1 ∝ | A , (r)
via the form of “Resolution Identity” . we also say that the fuzzy distribution function 𝐹(𝑥) is induced by the
distribution function F(x). Since F(x) is continuous .we can rewrite Aα as
A∝ = [min { inf∝≤𝛽≤1F(𝑥𝛽
𝐿
), min∝≤𝛽≤1F(𝑥𝛽
𝐿
) }
max {max∝≤𝛽≤1F(𝑥𝛽
𝐿
), max∝≤𝛽≤1F(𝑥 𝛽
𝐿
)}]
In order to discuss the convergence in distribution for fuzzy random variables in Section 4, we need to claim
𝐹(𝑥) is a closed-fuzzy-valued function. First of all, we need the following proposition,
We shall discuss the strong and weak convergence in distribution for fuzzy random variables in this section. We
propose the following definition.
Definition 3.1 Let 𝑋 and {𝑥 𝑛 } be fuzzy random variables defined on the same probability space (Ω 𝒜 𝒫 ).
i) We say that {𝑋 𝑛 } converges in distribution to 𝑋level-vise if (𝑥 𝑛 ) 𝛼
𝐿
and (𝑥 𝑛 ) 𝛼
𝑈
converge in distribution to 𝑋 𝛼
𝐿
and 𝑋 𝛼
𝑈
respectively for all α. Let (𝑥) and 𝐹(𝑥) be the respective fuzzy distribution functions of 𝑋 𝛼
and 𝑋.
We say that {𝑋 𝛼 }converges in distribution to 𝑋 strongly if
lim
𝑛→∝
𝐹 𝑛
𝑥
𝑠
𝐹 𝑥
ii) We say that {𝑋 𝑛 } converges in distribution to 𝑋weakly if
lim
𝑛→∝
𝐹 𝑛
𝑥
𝑤
𝐹 𝑥
From the uniqueness of convergence in distribution for usual random variables.We conclude that the above
three kinds of convergence have the unique limits.
5. MAIN RESULTS
THEOREM 5.1 (KOLMOGOROU CONVERGENCE THEOREM)
Let {Xn} be independent fuzzy random variables with
EXn = 0 and 𝜎𝑛
2
= E𝑋 𝑛
2
<∝, n > 1
If E𝑋 𝑛
2∞
𝑛=1 <∝ then 𝑋 𝑛
∞
𝑛=1 converges a.s.
Proof : For ∈ > 0
∈2
P [| 𝑚
𝑘=𝑛 ∝∈(0,1 ∝[ ( (Xk)∝ – v (𝑋 𝑘 )∝
+
] ≥ ∈ | ]
≤ 𝑚
𝑘=𝑛 E ( ∝∈(0,1] ∝[ ((Xk
2
)∝
–
) v (Xk
2
)∝
+
]
<∈3
if m, n ≥ no
Therefore
4. Fuzzy random variables and Kolomogrov’s…
www.ijesi.org 48 | Page
P [| 𝑚
𝑘=𝑛 ∝∈(0,1] α [(Xk )∝
–
– v (𝑋 𝑘)∝
+
] ≥ ∈ ] ≤ ∈
i.e.
P [| ∝∈(0,1] α [(Sm )∝
–
– (𝑆 𝑛–1)∝
–
V (Sm )∝
–
] ≥ ∈ ]
≤ ∈
if m,n ≥ n0
i.e, {Sn} is a calculcy sequence in probability.
@ Sn
𝑃
→ S Say. Hence by Levys Theorem
Sn S a.s.
i.e. ∞
𝑛=1 Xn conveyes a.s.
Definition 5.1:
Two sequences of Fuzzy random variables {Xn}
and {Yn} are said to be tail equivalent if
∞
𝑛=1 P (Xn≠ Yn ) < α
THEOREM 5.2 :
Suppose that {𝑋 𝑛 } 𝑛=1
𝛼
be a sequence of independent fuzzy random variables.
Let
𝑋 𝑛
1
=
𝑋 𝑛 𝑖𝑓 𝑋 𝑛 ≤ 1
0 𝑖𝑓 𝑋 𝑛 > 1
for all n ≥ 1
Then the series 𝑋 𝑛 converges a.s. if the following series converges.
(a) ∞
𝑛=1 P (w : | 𝑋 𝑛 𝑤 / > 1 ) <∞
(b) ∞
𝑛=1 E (𝑋 𝑛
1
) ) converges and
(c) ∞
𝑛=1 𝜎𝑋 𝑛
1
2
<α
Proof
Suppose that the three conditions hold. Because of byKolmogorov Khintchic theorem.
∞
𝑛=1 ∝[((Xn
1
)∝
–
– E(𝑋 𝑛
1
)∝) v ((Xn
1
)∝
+
– E (Xn
1
)∝
+
) ]
Conveys a.s. Then (if) implies
5. Fuzzy random variables and Kolomogrov’s…
www.ijesi.org 49 | Page
∞
𝑛=1 ((Xn
1
)∝
–
v (Xn
1
)∝
+
converges a.s.
By (a) and Borel Can telli lemma
P ( | ∝∝∈(0,1] [(Xn )∝
–
v (Xn )∝
+
] > 1 i.o. ) = 0
So | ∝∝∈(0,1] [(Xn )∝
–
v (Xn )∝
+
] | ≤ 1 a.s.
Thus
∞
𝑛=1 ∝∝∈(0,1] [(Xn )∝
–
v (Xn )∝
+
] Converges a.s.
Conversely
if 𝑛 ∝∈(0,1] ∝[(Xn )∝
–
v (Xn )∝
+
]
Converges a.s. then the fuzzy random variables
Xn 0 a.s.
Hence P ( | ∝∈(0,1] ∝ ( Xn ∝
–
v (Xn )∝
+
) > 1 i.o. ) = 0
This implies (a) byBorel Zero one law. Now
{𝑋 𝑛 } 𝑛=1
∞
and {𝑋 𝑛 } 𝑛=1
∞
are tail equivalent sequences
So it is clear that ∞
𝑛=1 ∝∝∈ 0,1 [(Xn
1
)∝
–
v (Xn
1
)∝
+
]
converges a.s. when ∞
𝑛=1 ∝∝∈ 0,1 [(Xn )∝
–
v (Xn )∝
+
]
converges a.s.
Now[ ∝∈(0,1] ∝ [(Xn
1
)∝
–
v (Xn
1
)∝
+
] 𝑛=1
∞
is a sequence
of uniformly bounded indepdent fuzzy random variables
Let 𝑆 𝑛
1
= 𝑛
𝑗=1 ∝∈(0,1] α ((Xj
1
)∝
–
– v (Xj
1
)∝
+
)
Since ∞
𝑗=1 ∝∈(0,1] α [(Xn
1
)∝
–
– (Xn )∝
–
)] converges a.s.
lim 𝑛→∞ 𝑃( Sup 𝑚≥𝑛 | ∝∈(0,1] α [((Sm
1
)∝
–
– (Sn
1
)∝
–
) V ((Sm
1
)∝
+
– (Sm
1
)∝
+
) ≥ ∈] = 0
By the lower bound of Kolmogovovs inequality
P (Sup 𝑚≥𝑛 | ∝∈(0,1] α [((Sm
1
)∝
–
– (Sn
1
)∝
–
) V ((Sm
1
)∝
+
– (Sm )∝
+
) ≥ ∈
≥ 1 –
(2+∈)2
𝜎
Xj
1
2∞
𝑗=1
Now if
6. Fuzzy random variables and Kolomogrov’s…
www.ijesi.org 50 | Page
𝜎Xj
2∞
𝑗=1 = ∞, then we have
P (Sup 𝑚≥𝑛 | ∝∈(0,1] α [((Sm
1
)∝
–
– (Sn
1
)∝ )–
V ((Sm
1
)∝
+
– (Sm
1
)∝
+
) ≥ ∈ ) = 1
This contradicts the contention (1)
So 𝜎Xj
2∞
𝑗=1 <∞ proving (c)
The Khintchine – Kolmogoroves theorem implies
1
𝑛 ∝∈(0,1] α ((Xn
1
)∝
–
– E(Xn
1
)∝
–
)) V ((Xn
1
)∝
+
– E(Xn
1
)∝
+
))
converges a.s.
Now Since 𝑋 𝑛
1∞
𝑗=1 converges a.s.
We have (𝑋 𝑛
1∞
𝑛=1 ) convergent proving (b)
THEOREM 5. 3 (KOLMOGOROVS INEQUALITY)
Let X1 X2 . . . . . . Xn . . . . be independent fuzzy random variables and
E(𝑋𝑖
2
)<∞, i ≥ 1. If Sn = 𝑋𝑖
𝑛
𝑖=1 and
∈> 0 then
a) ∈2
P (max1≤𝑘≥𝑛 ∝∈(0,1] α | ((S 𝑘 )∝
–
– E(S 𝑘 )∝
–
) | V | ((S 𝑘 )∝
+
– E(S 𝑘 )∝
+
|) ≥ ∈ ≤ 𝜎𝑘
2∞
𝑘=1
and if moreover
∝∈(0,1] α [ | (X 𝑘 )
–
– (X 𝑘 )+
| ≤ C < ∞ a.s.
then
b) 1–
(2+∈)2
𝜎 𝑘
2𝑛
𝑘=1
≤P (max1≤𝑘≥𝑛 ∝∈(0,1] α (|(S 𝑘 )∝
–
– E(S 𝑘 )∝
–
| V | ((S 𝑘 )∝
+
– E(S 𝑘 )∝
+
|) ≥ ∈
Proof :
We assume EXk =0 , k ≥ 1.
Define a fuzzy random variables + by
+
1𝑠𝑡 𝑘, 𝑛 ≥ 𝑘 ≥ 1
𝑛 + 1 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
such that 𝑆𝑘
2
≥ ∈2
if there is such a k.
Then (max 𝑘≤𝑛 ∝∈(0,1] α [(S 𝑘 )∝
–
–V(S 𝑘 )∝
+
] ≥ ∈] = [ t ≤ n ] and [t = k] ∈ −𝐵(x1x2. .xk)
Hence
7. Fuzzy random variables and Kolomogrov’s…
www.ijesi.org 51 | Page
[𝑡=𝑘] ∝∈(0,1] α [(S 𝑘 )∝
–
((S 𝑛 )∝
–
– (S 𝑘 )∝
–
) V (S 𝑘 )∝
+
((S 𝑛 )∝
–
– (S 𝑘 )∝
+
)) d P
= E ∝∈(0,1] α [(S 𝑘 )∝
–
𝐼𝑡=𝑘 ((S 𝑛 )∝
–
– (S 𝑘 )∝
–
) V ((S 𝑛 )∝
+
– (S 𝑘 )∝
+
)]
= E [ Sk 𝐼[𝑡=𝑘] E (((S 𝑛 )∝
–
– (S 𝑘 )∝
–
) V ((S 𝑛 )∝
+
– (S 𝑛 )∝
+
)]
= 0
Therefore,
[𝑡=𝑘]
(S 𝑛 )∝
2
d P
= [𝑡=𝑘]
((S 𝑘 )∝
–
+ ((S 𝑛 )∝
–
– (S 𝑘 )∝
–
)2
V ((S 𝑘 )∝
+
+ ((S 𝑛 )∝
+
– (S 𝑘 )∝
+2
) d P
= [𝑡=𝑘]
((S 𝑘 )∝
–2
+ ((S 𝑛 )∝
–
– (S 𝑘 )∝
–
)2
V ((S 𝑘 )∝
+2
+ ((S 𝑛 )∝
+
– (S 𝑛 )∝
+2
)
+2 ((S 𝑛 )∝
–
– (S 𝑘 )∝
–
) (S 𝑘 )∝
–
) V (S 𝑛 )∝
+
– (S 𝑘 )∝
+
– (S 𝑘 )∝
+
) d P
= [𝑡=𝑘]
(S 𝑘 )∝
–2
– (S 𝑘 )∝
+2
) d P
≥∈2
P(t = k) (5.1)
Therefore
∈2
P (t≤n) = ∈2 𝑛
1 P (t = k)
≤ 𝑛
𝑘=1 [𝑡=𝑘]
(S 𝑘
–
)∝
2
V (S 𝑛
+
)∝
2
) d P
= [𝑡≤𝑛]
(S 𝑘
–
)∝
2
V (S 𝑛
+
)∝
2
) d P
= (S 𝑛
–
)∝
2
V (S 𝑛
+
)∝
2
) d P
= E (S 𝑛
2
) ( 5.2)
But
ES 𝑛
2
= 𝑛
𝑘=1 E (X 𝑘
–
)∝
2
V (X 𝑘
+
)∝
2
)
Let X1 X2 . . . . . . Xn . . . . be independents.
𝜎𝑘
2
𝑛
𝑘=1
So from (3) and (1)
∈2
P [max 1≤𝑘≤𝑛 S 𝑘 ≥ ∈ ] ≤ 𝜎𝑘
2𝑛
𝑘=1
8. Fuzzy random variables and Kolomogrov’s…
www.ijesi.org 52 | Page
To prove the lower bound of Kolmogorovs inequality let fk = I [t>k]. Then fk Sk and Xk+1 are independent
for k = 0, 1, . . . n-1.
Now [t>k] = [t ≤ k]c
∈ B, (x1 . . . xk) since
[t ≤ k] ∈ B, (x1 . . . xk). Therefore
E (fk Sk Xk+1) = E (fk Sk)
E (Xk+1) = 0
Now
= E ((S 𝑘
–
)∝
2
(f 𝑘−1)∝
–
V (S 𝑘
+
)∝
2
+ (f 𝑘−1)∝
+
)
= E ((S 𝑘
–
)∝
2
(f 𝑘−1)∝
–
V (S 𝑘
+
)∝
2
+ (f 𝑘−1
+
)∝
2
)
= E ((S 𝑘−1
–
)∝ (f 𝑘−1
–
)∝ V (S 𝑘–1
+
)∝ + (f 𝑘−1
+
)∝
+ (X 𝑘
–
)∝ (f 𝑘−1
–
)∝ V (X 𝑘
+
)∝ + (f 𝑘−1
+
)∝ )2
= E ((S 𝑘−1
–
)∝
2
(f 𝑘−1
–
)∝ V (S 𝑘–1
+
)∝
2
+ (f 𝑘−1
+
)∝ )
+ E ((X 𝑘
–
)∝
2
(f 𝑘−1
–
)∝ V (X 𝑘
+
)∝
2
+ (f 𝑘−1
+
)∝ )
= E ((S 𝑘−1
–
)∝
2
(f 𝑘−1
–
)∝ V (S 𝑘–1
+
)∝
2
(f 𝑘−1)∝
+
)
+ E ((X 𝑘
–
)∝
2
V (X 𝑘
+
)∝
2
E ((f 𝑘−1
–
)∝ V (f 𝑘−1
+
)∝ )
= E ((S 𝑘−1
–
)∝
2
(f 𝑘−1
–
)∝ V (S 𝑘–1
+
)∝
2
+ (f 𝑘−1
+
)∝ )
+ E ((X 𝑘
–
)∝
2
E (f 𝑘−1
–
)∝ VE ((X 𝑘
+
)∝
2
E(f 𝑘−1
+
)∝ )
= E ((S 𝑘−1
–
)∝
2
(f 𝑘−1
–
)∝ V (S 𝑘–1
+
)∝
2
+ (f 𝑘−1
+
)∝ )
+ E ((X 𝑘
–
)∝
2
V (X 𝑘
+
)∝
2
) P (t > k-1) (5.3)
Again
E ((S 𝑘
–
)∝
2
(f 𝑘−1
–
)∝ V (S 𝑘
+
)∝
2
+ (f 𝑘−1
+
)∝ )
+ E ((S 𝑘
–
)∝
2
(f 𝑘
–
)∝ V (S 𝑘
+
)∝
2
) (f 𝑘
+
)∝ )
+ E ((S 𝑘
–
)∝
2
I [𝑡=𝑘] V (S 𝑘
+
)∝
2
) I [𝑡=𝑘] (5.4)
9. Fuzzy random variables and Kolomogrov’s…
www.ijesi.org 53 | Page
From (5.3) and (5.4)
E ((S 𝑘–1
–
)∝
2
(f 𝑘−1
–
)∝ V (S 𝑘−1
+
)∝
2
+ (f 𝑘−1
+
)∝ )
+ E ((X 𝑘
–
)∝
2
V (X 𝑘
+
)∝
2
) P (t > k-1)
= E ((S 𝑘
–
)∝
2
(f 𝑘−1
–
)∝ V (S 𝑘
+
)∝
2
) (f 𝑘−1
+
)∝ )
= E ((S 𝑘
–
)∝
2
(f 𝑘
–
)∝ V (S 𝑘
+
)∝
2
) (f 𝑘
+
)∝
+ E ((S 𝑘
–
)∝
2
I [𝑡=𝑘] V (S 𝑘
+
)∝
2
) I [𝑡=𝑘]
Since | (X 𝑘
–
)∝ V (X 𝑘
+
)∝ | ≤ C for all K
and | (X 𝑘
–
)∝ – E (X 𝑘
–
)∝ V (X 𝑘
+
)∝ – E (X 𝑘
+
)∝ | ≤ 2C
E ((S 𝑘–1
–
)∝
2
(f 𝑘−1)∝ V (S 𝑘−1
+
)∝
2
+ (f 𝑘−1)∝ )
+ E ((X 𝑘
–
)∝
2
P (t ≥ k) V (X 𝑘
+
)∝
2
) P (t ≥ k)
≤ E ((S 𝑘
–
)∝
2
(f 𝑘 )∝ V (S 𝑘
+
)∝
2
(f 𝑘
–1
)∝ )
+ (∈ +2C)2
P (t ≥ k) (5.5)
Summing over (6) for k=1 to n and after cancellation we get
𝑛
𝑘=1 E ((X 𝑘
–
)2
V (X 𝑘
+
) 2
) P (t ≥ k)
≤ E ((S 𝑘
–
)∝
2
(f 𝑛
–
)∝ V (S 𝑛
+
)∝
2
) (f 𝑛
+
)∝ )
+ (∈ +2C)2
P (t ≤ n)
Now 𝑆 𝑛
2
𝑓𝑛
2
≤ ∈2
By definition of t
and P(t > n) < P(t ≥ k) if k ≥ n imply
𝑛
𝑘=1 E ((X 𝑘
–
) 𝛼
2
P(t ≥ k) V E ((X 𝑘
+
) 𝛼
2
P(t ≥ n)
≤ ∈2
E ((f 𝑛
–
)∝ V (f 𝑛
+
)∝ )
+ (∈ +2C)2
P (t ≤ n)
Or
𝑛
𝑘=1 E ((X 𝑘
–
) 𝛼
2
V ((X 𝑘
+
) 𝛼
2
P(t > n)
≤ ∈2
P(t > n) + (∈ +2C)2
P (t ≤ n)
≤ (∈ +2C)2
P (t ≤ n) + (∈ +2C)2
P (t > n)
10. Fuzzy random variables and Kolomogrov’s…
www.ijesi.org 54 | Page
= (∈ +2C)2
Hence
1 – P (t ≤ n) ≤ (∈ +2C)2
/ 𝑛
𝑘=1 E ((X 𝑘
–
) 𝛼
2
V ((X 𝑘
+
) 𝛼
2
=
(∈+2C)2
𝜎 𝑘
2𝑛
𝑘=1
implies P (t ≤ n) ≥ 1 – (∈ +2C)2
/ 𝑛
1 𝜎𝑘
2
LEMMA 5.1 : (KRONECKER’S LEMMA)
For sequences {an} and {bn} of fuzzy real numbers and ∞
1 an converges
and bn↑
1
bn
𝑛
𝑘=1 bk ak→ 0 as n → ∞
Proof : Since ∞
1 an converges Sn = 𝑛
1 ak S (say)
1
bn
𝑛
𝑘=1 [(b 𝑘
–
)∝ (a 𝑘
–
)∝ V (b 𝑘
+
)∝ (a 𝑘
+
)∝
=
1
bn
𝑛
𝑘=1 [(b 𝑘
–
)∝ ((S 𝑘
–
)∝ – (S 𝑘−1
–
)∝
– (b 𝑘
+
)∝ ((S 𝑘
+
)∝ – (S 𝑘−1
+
)∝ )]
=
1
bn
( 𝑛
1 (b 𝑘
–
)∝ (S 𝑘
–
)∝ 𝑉(b 𝑘
+
)∝ (S 𝑘
+
)∝
– 𝑛
1 (b 𝑘
–
)∝ (S 𝑘−1
–
)∝ 𝑉(b 𝑘
+
)∝ (S 𝑘−1
+
)∝ )
=
1
bn
( 𝑛
1 (b 𝑘
–
)∝ (S 𝑘
–
)∝ 𝑉(b 𝑘
+
)∝ (S 𝑘
+
)∝
– 𝑛−1
1 (b 𝑘+1
–
)∝ (S 𝑘
–
)∝ 𝑉(b 𝑘+1
+
)∝ (S 𝑘
+
)∝ )
=
1
bn
(((b 𝑛
–
)∝ (S 𝑛
–
)∝ 𝑉(b 𝑛
+
)∝ (S 𝑛
+
)∝
– (𝑛−1
1 (b 𝑘
–
)∝ – (b 𝑘+1
–
)∝ (S 𝑘
–
)∝ )
𝑉 ((b 𝑘
+
)∝ – (b 𝑘+1
+
)∝ ) (S 𝑘
+
)∝
= (S 𝑛
–
)∝ 𝑉(S 𝑛
+
)∝
1
bn
𝑛−1
1 ((b 𝑘
–
)∝ – (b 𝑘+1
–
)∝ ) (S 𝑘
–
)∝ )
𝑉 ((b 𝑘
+
)∝ – (b 𝑘+1
+
)∝ ) (S 𝑘
+
)∝
12. Fuzzy random variables and Kolomogrov’s…
www.ijesi.org 56 | Page
𝑉
1
(b 𝑛
+)∝
(𝑛−1
1 (b 𝑘
+
)∝ – (b 𝑘+1
+
)∝ )((S 𝑘
+
)∝ – (S+
)∝ ) |
|
1
(b 𝑛
–
)∝
| | (𝑛0
𝑘=1 (b 𝑘
–
)∝ – (b 𝑘+1
–
)∝ ) S 𝑘
–
∝
– (S 𝑘
–
)∝
𝑉 |
1
(b 𝑛
+)∝
| | (𝑛0
𝑘=1 b 𝑘
+
∝ – (b 𝑘+1
+
)∝ )((S 𝑘
+
)∝ – (S+
)∝ ) |
|
1
(b 𝑛
–
)∝
| (𝑛−1
𝑛0+1 (b 𝑘
–
)∝ – (b 𝑘+1
–
)∝ ) ( S 𝑘
–
∝
– (S 𝑘
–
)∝
𝑉 |
1
(b 𝑛
+)∝
| (𝑛−1
𝑛0+1 b 𝑘
+
∝ – (b 𝑘+1
+
)∝ )((S 𝑘
+
)∝ – (S+
)∝ ) |
for n > n0
≤∈ +
(b 𝑛0+1
–
)∝ (b 𝑛
–
)∝
(b 𝑛
–
)∝
V +
(b 𝑛0+1
+
)∝ – (b 𝑛
+)∝
(b 𝑛
+)∝
∈
if n > n0
LEMMA 5.2 : (Loeve)
Let X be a fuzzy random variables and
q(t) = P { | 𝑋∝
–
V 𝑋∝
+
| > t } = 1 – F(t) = F (t)
For every y > 0, x > 0 we have
𝑥 𝑟 ∞
𝑛=1 q (𝑛𝑙/𝑟
x ) ≤ E ( | 𝑋∝
–
| 𝑟
V | 𝑋∝
–
| 𝑟
≤ 𝑋 𝑟
+ V 𝑋 𝑟 ∞
𝑛=1 q (𝑛𝑙/𝑟
x )
Proof :
E (| 𝑋∝
–
| 𝑟
V | 𝑋∝
+
| 𝑟
=
∞
0
+ d P ( | 𝑋∝
–
| V | 𝑋∝
–
| 𝑟
≤ t )
= –
∞
0
+ tr
dq (t)
= – ∞
𝑛=1
𝑛1/𝑟 𝑥
(𝑛−1) 1/𝑟 𝑥)
tr
dq (t) , x > 0
Now –
𝑛
1
𝑟 𝑥
(𝑛−1)
1
𝑟 𝑥
t r
dq (t)
≤nxr
[ q 𝑛 − 1
1
𝑟 𝑥 – q (𝑛
1
𝑟 𝑥)]
13. Fuzzy random variables and Kolomogrov’s…
www.ijesi.org 57 | Page
and
–
𝑛
1
𝑟 𝑥
(𝑛−1)
1
𝑟 𝑥
t r
dq (t)
≤ (n-1)xr
[ q 𝑛 − 1
1
𝑟 𝑥 – q (𝑛
1
𝑟 𝑥)]
If E (| 𝑋∝
–
| 𝑟
v | 𝑋∝
+
| 𝑟
) = ∞ the proof is obvious.
and if E (| 𝑋∝
–
| 𝑟
v | 𝑋∝
+
| 𝑟
) <∞ then
xr
Nq (𝑁
1
𝑟 𝑥) → 0 as N → ∞
In fact,
∞ > E (| 𝑋∝
–
| 𝑟
v | 𝑋∝
+
| 𝑟
)
≥ E (| 𝑋∝
–
| 𝑟
v | 𝑋∝
+
| 𝑟
) I (| 𝑋∝
–
| v | 𝑋∝
+
| > x N
1
𝑟 ]
= Nxr
P [ | 𝑋∝
–
| 𝑟
v | 𝑋∝
+
| 𝑟
>N
1
𝑛 𝑥 ]
= Nxr
q [ N
1
𝑟 𝑥 ]
If E (| 𝑋∝
–
| 𝑟
v | 𝑋∝
+
| 𝑟
) <∞ by absolute continuity.
of integral Nxr
q [ N
1
𝑟 𝑥 ] → 0 as N → ∞
on the other hand.
E (| 𝑋∝
–
| 𝑟
v | 𝑋∝
+
| 𝑟
) <∞
≥ 𝑛
𝑛=1 (n – 1) xr
[ q (𝑛 − 1)
1
𝑟 𝑥 – q (𝑛
1
𝑟 )𝑥 ]
– 𝑁
𝑛=1 xr
[ q (𝑛)
1
𝑟 𝑥 ] – (N–1)xr
q (𝑛
1
𝑟 )𝑥
Since
Nq (𝑛
1
𝑟 𝑥) → 0 the right hand side of the last inequality tends to
∞
𝑛=1 xr
q (𝑛
1
𝑟 𝑥 )
Now if ∞
1 q (𝑛
1
𝑟 𝑥 )<∞
then nq (𝑛
1
𝑟 𝑥 ) → 0 and
14. Fuzzy random variables and Kolomogrov’s…
www.ijesi.org 58 | Page
E (| 𝑋∝
–
| 𝑟
v | 𝑋∝
+
| 𝑟
)
≤ lim 𝑁→∞
𝑁
𝑛=1 nxv
[ q (𝑛 − 1)
1
𝑟 𝑥 – q (𝑛
1
𝑟 𝑥) ]
≤ lim 𝑁→∞ xv
( 1 + 𝑁−1
1 q (𝑛
1
𝑟 𝑥 ) – Nq (𝑛
1
𝑟 𝑥) )
≤ xv
( 1 + ∞
1 q (𝑛
1
𝑟 𝑥 ))
which completes the proof.
THEOREM 5.4: (KOLMOGOROVS STRONG LAW OF LARGE NUMBERS for independent identicals
distributed r.v.s.)
Let {xn} be a sequence of indendent identically distributed fuzzy random variables then
𝑆 𝑛
𝑛
→ 𝐶 < ∞ a.s.
if and only if E (| (𝑋1)∝
–
v | (𝑋1)∝
–
) <∞
and then C = E (X1)
Proof
For the only if part let An = (| 𝑋 ∝
–
| v | 𝑋 ∝
+
) ≥ n
then ∞
1 ∑ E (| (𝑋1)∝
–
v | (𝑋1)∝
–
+ P ∞
1 𝐴𝑛 (5.7)
Now P(An) = P (| 𝑋 ∝
–
| v | 𝑋 ∝
+
≥ n)
= P (| (𝑋1) ∝
–
v | (𝑋1)∝
+
≥ n)
𝑆 𝑛
𝑛
𝑎.𝑠.
< ∞
then
(𝑋 𝑛 )∝
–
𝑛
V
(𝑋 𝑛 )∝
+
𝑛
=
(𝑆 𝑛 )∝
–
𝑛
V
(𝑆 𝑛 )∝
+
𝑛
–
(𝑛−1)
𝑛
(𝑆 𝑛−1)∝
–
𝑛−1
(𝑆 𝑛–1
)∝
+
𝑛−1
→ 𝐶 – 𝐶 = 0 𝑎. 𝑠.
Hence P ( |
(𝑋1)∝
–
𝑛
| V |
(𝑋1)∝
+
𝑛
>
1
2
i.o. )
By Borel 0 – 1 Law ∞
𝑛=1 P (| (𝑋 𝑛 ) ∝
–
| v | (𝑋 𝑛
+
)∝ ≥
n
2
)
i.e. ∞
𝑛=1 P (| (𝑋1) ∝
–
v (𝑋1 )∝
+
) ≥
n
2
) <∞
15. Fuzzy random variables and Kolomogrov’s…
www.ijesi.org 59 | Page
∞ > 𝑛 P [ |(𝑋1) ∝
–
v (𝑋1 )∝
+
) ≥
n
2
)
≥ 𝑛 P (An)
𝑛 P (An) <∞
So from (1) E (| (𝑋1) ∝
–
v (𝑋1 )∝
+
) ) <∞
Conversely let
E ((𝑋1) ∝
–
v (𝑋1 )∝
+
) <∞
and C = E ((𝑋1) ∝
–
v (𝑋1 )∝
+
)
Define (𝑋 𝑘
–
)∝
∗
V (𝑋 𝑘
+
)∝
∗
= ((𝑋)∝
–
v (𝑋)∝
+
) I [ | 𝑋 𝑘 | ≤ k ] k=1,2,3, . . .
and (𝑆 𝑛 )∝
–∗
V (𝑆 𝑛 )∝
∗
+
= ( 𝑋 ∝
–∗
v 𝑋 ∝
+∗
+ 𝑋2
–
∝
∗
v 𝑋2
–
∝
+∗
+ . . . . 𝑋 𝑛
–
∝
∗
v 𝑋2
+
∝
∗
Then Xk , k=1, 2, . . . . n are independent
and |(𝑋 𝑘 ) ∝
∗
v (𝑋 𝑘 )∝
∗
| ≤ k
Now
∞
𝑘=1 P [ (𝑋 𝑘) ∝
–
v (𝑋 𝑘 )∝
+
≠ (𝑋 𝑘 ) ∝
–∗
v (𝑋 𝑘 )∝
+∗
= ∞
1 P ( |(𝑋 𝑘) ∝
–
v (𝑋 𝑘 )∝
+
| > k)
≤ ∞
1 P (Ak) <∞
@ P [ (𝑋 𝑘 ) ∝
–
v (𝑋 𝑘 )∝
+
≠ (𝑋 𝑘
–
)∝
–∗
v (𝑋 𝑘 )∝
+∗
i.o.
Hence
𝑆 𝑛
𝑛
and
𝑆 𝑛
∗
𝑛
trends to the same limit a.s. if they converge at all in.
(𝑆 𝑛 )∝
–
v (𝑆 𝑛 )∝
+
– (𝑆 𝑛
∗
)∝
–
v (𝑆 𝑛
∗
)∝
+
𝑛
→ 0 𝑎. 𝑠.
𝑎𝑠 𝑛 → ∞
16. Fuzzy random variables and Kolomogrov’s…
www.ijesi.org 60 | Page
So it is enough to prove that
𝑆 𝑛
∗
𝑛
→ E ((𝑋1) ∝
–
v (𝑋1 )∝
+
) <∞
Now 𝑋 𝑛
∗
are independent but may be necessarily be identically distributed, we shall show that
∞
𝑛=1
𝜎2
((𝑋 𝑛 ) ∝
–∗
v (𝑋 𝑛 )∝
+∗ )
𝑛
<∞
and that will imply
𝑆 𝑛
∗
𝑛
→ E (
𝑆 𝑛
∗
𝑛
) converges to zero almost surely.
E ( 𝑋 𝑛 ∝
–∗
v 𝑋 𝑛
+
∝
∗
)
= E ( 𝑋 𝑛 ∝
+
v 𝑋 𝑛 ∝
–
) I [ | 𝑋 𝑛 ∝
–
v 𝑋 𝑛 ∝
+
) ≤ n ]
= E ( 𝑋1 ∝
–
v 𝑋 𝑛 ∝
+
) I [ | 𝑋1 ∝
–
v 𝑋 𝑛 ∝
+
) ≤ n ]
→ E ( 𝑋1 ∝
–
v 𝑋1 ∝
+
) G.S.
Therefore
E (
(𝑆 𝑛 )∝
–∗
V (𝑆 𝑛 )∝
∗
+
𝑛
) → E ( | 𝑋1 ∝
–
v 𝑋1 ∝
+
)
𝜎2∞
1 (
(𝑋 𝑛 )∝
–∗
𝑛
V
(𝑋 𝑛 )∝
+∗
𝑛
)
≤ ∞
1 E (
(𝑋 𝑛
–
)∝
∗2 𝑉 (𝑋 𝑛
+)∝
∗2
𝑛2 )
= ∞
1
1
𝑛2
[| 𝑋1 ∝
–
v 𝑋1 ∝
+
≤𝑛]
((𝑋 𝑛 )∝
–2
𝑉 (𝑋 𝑛 )∝
+2
) dP
= ∞
1
1
𝑛2
𝑛
𝑘=1
[k−1< | 𝑋 𝑛 ∝
–
v 𝑋 𝑛
∝
+
] ≤𝑘
((𝑋 𝑛 )∝
–2
𝑉 (𝑋 𝑛 )∝
+2
) dP
= ∞
1
1
𝑛2
𝑛
𝑘=1
[k−1< | 𝑋1 ∝
–
v 𝑋1 ∝
+
] ≤𝑘
((𝑋1 )∝
–2
𝑉 (𝑋1 )∝
+2
) dP
= ∞
𝑘=1
1
𝑛2
∞
𝑛=𝑘
[k−1< | 𝑋1 ∝
–
v 𝑋1 ∝
+
] ≤𝑘
((𝑋1 )∝
–2
𝑉 (𝑋1 )∝
+2
) dP
≤ 2 ∞
𝑘=1
1
𝑘
k2
P [k − 1 < | 𝑋1 ∝
–
v 𝑋1 ∝
+
] ≤ 𝑘 ]
17. Fuzzy random variables and Kolomogrov’s…
www.ijesi.org 61 | Page
= 2 ∞
𝑘=1 k P [ (k − 1) < | 𝑋1 ∝
–
v 𝑋1 ∝
+
< 𝑘 ]
= 2 ∞
𝑘=1 (k–1)P [ k − 1 < (| 𝑋1 ∝
–
v 𝑋1 ∝
+
≤ 𝑘 ] + 2
≤ 2 ∞
1
[k−1< ( | 𝑋1 ∝
–
v 𝑋1 ∝
+
] ≤𝑘
((𝑋1 )∝
–
𝑉 (𝑋1 )∝
+
) +2
= 2 ( E ( | 𝑋1 ∝
–
v 𝑋1 ∝
+ 1
REFERENCES
[1] A.Colubi, M. Lopez – Diaz, J.S. Domingueez – Mencheru, M.A. Gil, A Generalized strong law of large numbers Pro theory.
Relat. Field 114- (1999) 401-417.
[2] E.P. Klement, M.L. Puri, P.A.Ralesuv, Limit theorems for Fuzzy Random Variables, Proce. Roy. Soc. London Set. A. 407(1986)
171-182.
[3] H. Jnouse, A Strong law of large numbers for fuzzy random sets, Fuzzy sets and Systems 41(1991) 285-291.
[4] H. Kwakernack, Fuzzy random variables – I Definitions and theorems, Inform Sai. 15 (1978) 1-29.
[5] M. Lopez-Diaz, M.Gil, Approximating integrally landed fuzzy random variables in terms of the gerealised Honsdorff Matric.
Inform Sei. 104 (1998) 279-291.
[6] M.L. Puri, D.A. Ralesen, Fuzzy Random variables J. Maths Anas. Appl. 114(1986) 409-422.
[7] M.L. Puri D.A. Rabisen, Fuzzy Random Variables, J.Math Anal. Appl. 114(1986) 409-422.
[8] R. Kroner, on the variance of fuzzy random variables Fuzzy Seb and systems 92 (1997) 83-93.
[9] Y.Feng, Convergence theorems for fuzzy random variables and fuzzy martingales, Fuzzy sets and systems 103 (1999) 435-441.
[10] Y. Feng, Mean-Square integral and differential of Fuzzy stochastic processes, Fuzzy sets and systems 102 (1999) 271-286.
[11] Y. Feng, Decomposition theorems for fuzzy super martingales and sub martingales, Fuzzy sets and systems, 116 (2000) 225-235.
[12] Y. Feng, L.Hu, H. Shu, The variance and covariance of fuzzy random variables and their applications, fuzzy sets and systems
120(2001) 487-497.