Higher-order (F, α, β, ρ, d)-convexity is considered. A multiobjective programming problem (MP) is considered. Mond-Weir and Wolfe type duals are considered for multiobjective programming problem. Duality results are established for multiobjective programming problem under higher-order (F, α, β, ρ, d)- convexity assumptions. The results are also applied for multiobjective fractional programming problem.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Dynamic Programming Over Graphs of Bounded TreewidthASPAK2014
This document discusses treewidth and algorithms for graphs with bounded treewidth. It contains three parts:
1) Algorithms for bounded treewidth graphs, including showing weighted max independent set and c-coloring can be solved in FPT time parameterized by treewidth using dynamic programming on tree decompositions.
2) Graph-theoretic properties of treewidth such as definitions of treewidth and tree decompositions.
3) Applications of these algorithms to problems like Hamiltonian cycle on general graphs.
The document discusses applications of graphs with bounded treewidth. It covers the following key points:
1) Courcelle's theorem shows that many NP-complete graph problems can be solved in linear time for graphs of bounded treewidth using monadic second-order logic. This includes problems like independent set, coloring, and Hamiltonian cycle.
2) The treewidth of a graph is closely related to its largest grid minor - graphs with large treewidth contain large grid minors. There are polynomial relationships between treewidth and largest grid minor for planar graphs.
3) Planar graphs have bounded treewidth if and only if they exclude some grid configuration as a contraction. This helps characterize planar graphs of bounded treewidth
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes the concept of bidimensionality and how it can be used to design subexponential algorithms for graph problems on planar and other graph classes. It discusses how bidimensionality can be defined for parameters that are closed under minors or contractions by relating their behavior on grid graphs. It presents examples like vertex cover and dominating set that are bidimensional. It also discusses how bidimensionality can be extended to bounded genus graphs and H-minor free graphs using grid-minor/contraction theorems.
This document discusses important cuts and separators in graphs and their algorithmic applications. It begins by defining cuts, minimum cuts, and minimal cuts. It then characterizes cuts as edges on the boundary of a set of vertices. The document discusses properties of cuts like submodularity. It introduces the concept of important cuts and separators, proving several properties about them. Importantly, it proves that the number of important cuts of size at most k is at most 4k. The document discusses applications of important cuts and separators to parameterized algorithms.
Maximum likelihood estimation of regularisation parameters in inverse problem...Valentin De Bortoli
This document discusses an empirical Bayesian approach for estimating regularization parameters in inverse problems using maximum likelihood estimation. It proposes the Stochastic Optimization with Unadjusted Langevin (SOUL) algorithm, which uses Markov chain sampling to approximate gradients in a stochastic projected gradient descent scheme for optimizing the regularization parameter. The algorithm is shown to converge to the maximum likelihood estimate under certain conditions on the log-likelihood and prior distributions.
8 fixed point theorem in complete fuzzy metric space 8 megha shrivastavaBIOLOGICAL FORUM
ABSTRACT: In this paper our works establish a new fixed point theorem for a different type of mapping in complete fuzzy metric space. Here we define a mapping by using some proved results and obtain a result on the actuality of fixed points. We inspired by the concept of Hossein Piri and Poom Kumam [15]. They introduced the fixed point theorem for generalized F-suzuki -contraction mappings in complete b-metric space. Next Robert plebaniak [16] express his idea by result “New generalized fuzzy metric space and fixed point theorem in fuzzy metric space”. This paper also induces comparing of the outcome with existing result in the literature.
Keywords: Fuzzy set, Fuzzy metric space, Cauchy sequence Non- decreasing sequence, Fixed point, Mapping.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Dynamic Programming Over Graphs of Bounded TreewidthASPAK2014
This document discusses treewidth and algorithms for graphs with bounded treewidth. It contains three parts:
1) Algorithms for bounded treewidth graphs, including showing weighted max independent set and c-coloring can be solved in FPT time parameterized by treewidth using dynamic programming on tree decompositions.
2) Graph-theoretic properties of treewidth such as definitions of treewidth and tree decompositions.
3) Applications of these algorithms to problems like Hamiltonian cycle on general graphs.
The document discusses applications of graphs with bounded treewidth. It covers the following key points:
1) Courcelle's theorem shows that many NP-complete graph problems can be solved in linear time for graphs of bounded treewidth using monadic second-order logic. This includes problems like independent set, coloring, and Hamiltonian cycle.
2) The treewidth of a graph is closely related to its largest grid minor - graphs with large treewidth contain large grid minors. There are polynomial relationships between treewidth and largest grid minor for planar graphs.
3) Planar graphs have bounded treewidth if and only if they exclude some grid configuration as a contraction. This helps characterize planar graphs of bounded treewidth
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes the concept of bidimensionality and how it can be used to design subexponential algorithms for graph problems on planar and other graph classes. It discusses how bidimensionality can be defined for parameters that are closed under minors or contractions by relating their behavior on grid graphs. It presents examples like vertex cover and dominating set that are bidimensional. It also discusses how bidimensionality can be extended to bounded genus graphs and H-minor free graphs using grid-minor/contraction theorems.
This document discusses important cuts and separators in graphs and their algorithmic applications. It begins by defining cuts, minimum cuts, and minimal cuts. It then characterizes cuts as edges on the boundary of a set of vertices. The document discusses properties of cuts like submodularity. It introduces the concept of important cuts and separators, proving several properties about them. Importantly, it proves that the number of important cuts of size at most k is at most 4k. The document discusses applications of important cuts and separators to parameterized algorithms.
Maximum likelihood estimation of regularisation parameters in inverse problem...Valentin De Bortoli
This document discusses an empirical Bayesian approach for estimating regularization parameters in inverse problems using maximum likelihood estimation. It proposes the Stochastic Optimization with Unadjusted Langevin (SOUL) algorithm, which uses Markov chain sampling to approximate gradients in a stochastic projected gradient descent scheme for optimizing the regularization parameter. The algorithm is shown to converge to the maximum likelihood estimate under certain conditions on the log-likelihood and prior distributions.
8 fixed point theorem in complete fuzzy metric space 8 megha shrivastavaBIOLOGICAL FORUM
ABSTRACT: In this paper our works establish a new fixed point theorem for a different type of mapping in complete fuzzy metric space. Here we define a mapping by using some proved results and obtain a result on the actuality of fixed points. We inspired by the concept of Hossein Piri and Poom Kumam [15]. They introduced the fixed point theorem for generalized F-suzuki -contraction mappings in complete b-metric space. Next Robert plebaniak [16] express his idea by result “New generalized fuzzy metric space and fixed point theorem in fuzzy metric space”. This paper also induces comparing of the outcome with existing result in the literature.
Keywords: Fuzzy set, Fuzzy metric space, Cauchy sequence Non- decreasing sequence, Fixed point, Mapping.
The document describes an algorithm for finding a (p,q)-partition of a graph G. A (p,q)-partition partitions the vertices of G into clusters such that each cluster has size at most p and cut size at most q. The algorithm works by first showing that finding a (p,q)-partition can be reduced to finding a (p,q)-cluster for each vertex. It then gives a randomized algorithm for finding a (p,q)-cluster for a given vertex v in time 2O(q)nO(1) by reducing the problem to an instance of the satellite problem, which can be solved in polynomial time. The algorithm works by sampling important cuts in the graph to construct an instance of
In this talk, we give an overview of results on numerical integration in Hermite spaces. These spaces contain functions defined on $\mathbb{R}^d$, and can be characterized by the decay of their Hermite coefficients. We consider the case of exponentially as well as polynomially decaying Hermite coefficients. For numerical integration, we either use Gauss-Hermite quadrature rules or algorithms based on quasi-Monte Carlo rules. We present upper and lower error bounds for these algorithms, and discuss their dependence on the dimension $d$. Furthermore, we comment on open problems for future research.
The document discusses algorithms and techniques for analyzing graphs and polynomials. It describes how an adjacency matrix A can be used to count walks and common neighbors in a graph. It also explains how to construct a polynomial that is equal to zero if and only if a graph G contains a path of length k, by creating terms for all walks in G and exploiting the property that a+a=0 in finite fields of characteristic two. This allows evaluating whether the polynomial is zero to determine if G contains the desired path.
Lecture 2 predicates quantifiers and rules of inferenceasimnawaz54
1) Predicates become propositions when variables are quantified by assigning values or using quantifiers. Quantifiers like ∀ and ∃ are used to make statements true or false for all or some values.
2) ∀ (universal quantifier) means "for all" and makes a statement true for all values of a variable. ∃ (existential quantifier) means "there exists" and makes a statement true if it is true for at least one value.
3) Predicates with unbound variables are neither true nor false. Binding variables by assigning values or using quantifiers turns predicates into propositions that can be evaluated as true or false.
This document contains a proof that the integral from 0 to 1 of x dx equals 1/2. It begins by assuming the integral exists, then provides an alternative proof that does not assume the integral exists. This is done by establishing a lemma about Riemann sums and partitions, and showing that the difference between any two Riemann sums is less than epsilon.
There are infinitely many maximal primitive positive clones in a diagonalizable algebra M* that serves as an algebraic model for provability logic GL. The paper constructs M* as the subalgebra of infinite binary sequences generated by the zero element (0,0,...). It defines primitive positive clones as sets of operations closed under existential definitions, and shows there are infinitely many maximal clones K1, K2, etc. that preserve the relations x = ¬Δi, x = ¬Δ2, etc. in M*. This provides a simple example of infinitely many maximal primitive positive clones.
The document describes the iterative compression technique for designing fixed-parameter tractable algorithms. It shows how to use a vertex/edge cover, feedback vertex set, or odd cycle transversal of size k+1 as "compression" to design a branching algorithm with running time of O*(ck) for some constant c. This technique involves guessing how an optimal solution of size k interacts with the given size k+1 solution, and branching based on including or excluding vertices in the optimal solution.
The generation of Gaussian random fields over a physical domain is a challenging problem in computational mathematics, especially when the correlation length is short and the field is rough. The traditional approach is to make use of a truncated Karhunen-Loeve (KL) expansion, but the generation of even a single realisation of the field may then be effectively beyond reach (especially for 3-dimensional domains) if the need is to obtain an expected L2 error of say 5%, because of the potentially very slow convergence of the KL expansion. In this talk, based on joint work with Ivan Graham, Frances Kuo, Dirk Nuyens, and Rob Scheichl, a completely different approach is used, in which the field is initially generated at a regular grid on a 2- or 3-dimensional rectangle that contains the physical domain, and then possibly interpolated to obtain the field at other points. In that case there is no need for any truncation. Rather the main problem becomes the factorisation of a large dense matrix. For this we use circulant embedding and FFT ideas. Quasi-Monte Carlo integration is then used to evaluate the expected value of some functional of the finite-element solution of an elliptic PDE with a random field as input.
This document introduces predicates and quantifiers in predicate logic. It defines predicates as functions that take objects and return propositions. Predicates allow reasoning about whole classes of entities. Quantifiers like "for all" (universal quantifier ∀) and "there exists" (existential quantifier ∃) are used to make general statements about predicates over a universe of discourse. Examples demonstrate how predicates and quantifiers can express properties and relationships for objects. Laws of quantifier equivalence are also presented.
Group Theory and Its Application: Beamer Presentation (PPT)SIRAJAHMAD36
This document provides an overview of a seminar presentation on group theory and its applications. The presentation covers topics such as the definition of groups, order of groups and group elements, modular arithmetic, subgroups, Lagrange's theorem, and Sylow's theorems. It also discusses some examples of groups and applications of group theory in fields like algebraic topology, number theory, and physics. The presentation aims to introduce fundamental concepts in modern algebra through group theory.
The document discusses inference rules for quantifiers in discrete mathematics. It provides examples of using universal instantiation, universal generalization, existential instantiation, and existential generalization. It also discusses the rules of universal specification and universal generalization in more detail with examples. Finally, it presents proofs involving quantifiers over integers to demonstrate techniques like direct proof, proof by contradiction, and proving statements' contrapositives.
This document presents a modified Mann iteration method for finding common fixed points of a countable family of multivalued mappings in Banach spaces. It introduces using the best approximation operator PTn to define the iteration (1.2), where xn+1 is defined as a convex combination of the previous iterate xn and an element in PTn xn . The paper aims to establish weak and strong convergence theorems for this iterative method to find a common fixed point for a countable family of nonexpansive multivalued mappings. It provides relevant background on fixed points, nonexpansive mappings, and best approximation operators in Banach and Hilbert spaces.
A common fixed point of integral type contraction in generalized metric spacessAlexander Decker
This document presents a common fixed point theorem for two self-mappings S and T on a G-metric space X that satisfies a contractive condition of integral type. It begins with definitions related to G-metric spaces and contractive conditions. It then states Theorem 1.1, which proves that if S and T satisfy the given integral type contractive condition, along with other listed conditions, then S and T have a unique point of coincidence in X. If S and T are also weakly compatible, then they have a unique common fixed point. The proof of Theorem 1.1 is then provided.
Fixed Point Results In Fuzzy Menger Space With Common Property (E.A.)IJERA Editor
This paper presents some common fixed point theorems for weakly compatible mappings via an implicit relation in Fuzzy Menger spaces satisfying the common property (E.A)
This document provides the Curriculum and Assessment Policy Statement for Business Studies for grades 10-12 in South Africa. It outlines the background and purpose of CAPS and the National Curriculum Statement. It describes the general aims of the South African curriculum and the time allocation for Business Studies. It also provides an introduction to the subject of Business Studies and overviews of the topics covered per grade per term, along with annual teaching plans for grades 10-12.
Penicillin is drug of Choice for Syphilis- Still it holds good?inventionjournals
Syphilis resistant to Tetracyclins and macrolids had well documented. Penicillin is still considered as drug of choice in the treatment of Syphilis. Treponemes resistant to Penicillin are yet to be documented. In a private STD clinic of Tirunelveli, South India, during the period of January 2010 to June 2015, 68 cases reactive for syphilis were noted. 13.2 % of false positive were identified. Remaining 59 cases, 31 lost for follow up after treatment. Among whom 12 responded well to treatment following anti-syphilitic treatment with Penicillin whereas 16 (57.14%) remained reactive for more than a year or more. The titers either persist as same or even go up. Nobody in this group are reactive for HIV. All these patients remain in latent state in this series. Nobody progressed to neuro or cardiovascular syphilis. This warrants that it is high time to look for some other better alternative to treat Syphilis or otherwise increase in the dosage may have to be considered. Even though this study comprises of small number of patients, it has to be studied in detail for a longer period at multiple centers.
The document describes an algorithm for finding a (p,q)-partition of a graph G. A (p,q)-partition partitions the vertices of G into clusters such that each cluster has size at most p and cut size at most q. The algorithm works by first showing that finding a (p,q)-partition can be reduced to finding a (p,q)-cluster for each vertex. It then gives a randomized algorithm for finding a (p,q)-cluster for a given vertex v in time 2O(q)nO(1) by reducing the problem to an instance of the satellite problem, which can be solved in polynomial time. The algorithm works by sampling important cuts in the graph to construct an instance of
In this talk, we give an overview of results on numerical integration in Hermite spaces. These spaces contain functions defined on $\mathbb{R}^d$, and can be characterized by the decay of their Hermite coefficients. We consider the case of exponentially as well as polynomially decaying Hermite coefficients. For numerical integration, we either use Gauss-Hermite quadrature rules or algorithms based on quasi-Monte Carlo rules. We present upper and lower error bounds for these algorithms, and discuss their dependence on the dimension $d$. Furthermore, we comment on open problems for future research.
The document discusses algorithms and techniques for analyzing graphs and polynomials. It describes how an adjacency matrix A can be used to count walks and common neighbors in a graph. It also explains how to construct a polynomial that is equal to zero if and only if a graph G contains a path of length k, by creating terms for all walks in G and exploiting the property that a+a=0 in finite fields of characteristic two. This allows evaluating whether the polynomial is zero to determine if G contains the desired path.
Lecture 2 predicates quantifiers and rules of inferenceasimnawaz54
1) Predicates become propositions when variables are quantified by assigning values or using quantifiers. Quantifiers like ∀ and ∃ are used to make statements true or false for all or some values.
2) ∀ (universal quantifier) means "for all" and makes a statement true for all values of a variable. ∃ (existential quantifier) means "there exists" and makes a statement true if it is true for at least one value.
3) Predicates with unbound variables are neither true nor false. Binding variables by assigning values or using quantifiers turns predicates into propositions that can be evaluated as true or false.
This document contains a proof that the integral from 0 to 1 of x dx equals 1/2. It begins by assuming the integral exists, then provides an alternative proof that does not assume the integral exists. This is done by establishing a lemma about Riemann sums and partitions, and showing that the difference between any two Riemann sums is less than epsilon.
There are infinitely many maximal primitive positive clones in a diagonalizable algebra M* that serves as an algebraic model for provability logic GL. The paper constructs M* as the subalgebra of infinite binary sequences generated by the zero element (0,0,...). It defines primitive positive clones as sets of operations closed under existential definitions, and shows there are infinitely many maximal clones K1, K2, etc. that preserve the relations x = ¬Δi, x = ¬Δ2, etc. in M*. This provides a simple example of infinitely many maximal primitive positive clones.
The document describes the iterative compression technique for designing fixed-parameter tractable algorithms. It shows how to use a vertex/edge cover, feedback vertex set, or odd cycle transversal of size k+1 as "compression" to design a branching algorithm with running time of O*(ck) for some constant c. This technique involves guessing how an optimal solution of size k interacts with the given size k+1 solution, and branching based on including or excluding vertices in the optimal solution.
The generation of Gaussian random fields over a physical domain is a challenging problem in computational mathematics, especially when the correlation length is short and the field is rough. The traditional approach is to make use of a truncated Karhunen-Loeve (KL) expansion, but the generation of even a single realisation of the field may then be effectively beyond reach (especially for 3-dimensional domains) if the need is to obtain an expected L2 error of say 5%, because of the potentially very slow convergence of the KL expansion. In this talk, based on joint work with Ivan Graham, Frances Kuo, Dirk Nuyens, and Rob Scheichl, a completely different approach is used, in which the field is initially generated at a regular grid on a 2- or 3-dimensional rectangle that contains the physical domain, and then possibly interpolated to obtain the field at other points. In that case there is no need for any truncation. Rather the main problem becomes the factorisation of a large dense matrix. For this we use circulant embedding and FFT ideas. Quasi-Monte Carlo integration is then used to evaluate the expected value of some functional of the finite-element solution of an elliptic PDE with a random field as input.
This document introduces predicates and quantifiers in predicate logic. It defines predicates as functions that take objects and return propositions. Predicates allow reasoning about whole classes of entities. Quantifiers like "for all" (universal quantifier ∀) and "there exists" (existential quantifier ∃) are used to make general statements about predicates over a universe of discourse. Examples demonstrate how predicates and quantifiers can express properties and relationships for objects. Laws of quantifier equivalence are also presented.
Group Theory and Its Application: Beamer Presentation (PPT)SIRAJAHMAD36
This document provides an overview of a seminar presentation on group theory and its applications. The presentation covers topics such as the definition of groups, order of groups and group elements, modular arithmetic, subgroups, Lagrange's theorem, and Sylow's theorems. It also discusses some examples of groups and applications of group theory in fields like algebraic topology, number theory, and physics. The presentation aims to introduce fundamental concepts in modern algebra through group theory.
The document discusses inference rules for quantifiers in discrete mathematics. It provides examples of using universal instantiation, universal generalization, existential instantiation, and existential generalization. It also discusses the rules of universal specification and universal generalization in more detail with examples. Finally, it presents proofs involving quantifiers over integers to demonstrate techniques like direct proof, proof by contradiction, and proving statements' contrapositives.
This document presents a modified Mann iteration method for finding common fixed points of a countable family of multivalued mappings in Banach spaces. It introduces using the best approximation operator PTn to define the iteration (1.2), where xn+1 is defined as a convex combination of the previous iterate xn and an element in PTn xn . The paper aims to establish weak and strong convergence theorems for this iterative method to find a common fixed point for a countable family of nonexpansive multivalued mappings. It provides relevant background on fixed points, nonexpansive mappings, and best approximation operators in Banach and Hilbert spaces.
A common fixed point of integral type contraction in generalized metric spacessAlexander Decker
This document presents a common fixed point theorem for two self-mappings S and T on a G-metric space X that satisfies a contractive condition of integral type. It begins with definitions related to G-metric spaces and contractive conditions. It then states Theorem 1.1, which proves that if S and T satisfy the given integral type contractive condition, along with other listed conditions, then S and T have a unique point of coincidence in X. If S and T are also weakly compatible, then they have a unique common fixed point. The proof of Theorem 1.1 is then provided.
Fixed Point Results In Fuzzy Menger Space With Common Property (E.A.)IJERA Editor
This paper presents some common fixed point theorems for weakly compatible mappings via an implicit relation in Fuzzy Menger spaces satisfying the common property (E.A)
This document provides the Curriculum and Assessment Policy Statement for Business Studies for grades 10-12 in South Africa. It outlines the background and purpose of CAPS and the National Curriculum Statement. It describes the general aims of the South African curriculum and the time allocation for Business Studies. It also provides an introduction to the subject of Business Studies and overviews of the topics covered per grade per term, along with annual teaching plans for grades 10-12.
Penicillin is drug of Choice for Syphilis- Still it holds good?inventionjournals
Syphilis resistant to Tetracyclins and macrolids had well documented. Penicillin is still considered as drug of choice in the treatment of Syphilis. Treponemes resistant to Penicillin are yet to be documented. In a private STD clinic of Tirunelveli, South India, during the period of January 2010 to June 2015, 68 cases reactive for syphilis were noted. 13.2 % of false positive were identified. Remaining 59 cases, 31 lost for follow up after treatment. Among whom 12 responded well to treatment following anti-syphilitic treatment with Penicillin whereas 16 (57.14%) remained reactive for more than a year or more. The titers either persist as same or even go up. Nobody in this group are reactive for HIV. All these patients remain in latent state in this series. Nobody progressed to neuro or cardiovascular syphilis. This warrants that it is high time to look for some other better alternative to treat Syphilis or otherwise increase in the dosage may have to be considered. Even though this study comprises of small number of patients, it has to be studied in detail for a longer period at multiple centers.
Dimensionality Reduction Techniques In Response Surface Designsinventionjournals
Dimensionality reduction has enormous applications in various fields in industries. It can be applied in an optimal way with respect to time and cost related to the agricultural sciences, mechanical engineering, chemical technology, pharmaceutical sciences, clinical trials, biological studies, image processing, pattern recognitions etc. Several researchers made attempts on the reduction of the size of the model for different specific problems using some mathematical and statistical techniques identifying and eliminating some insignificant variables.This paper presents a review of the available literature on dimensionality reduction
ASSESSMENT OF NANOPARTICULATED RESVERATROL AND LOSARTAN IN THE PROPHYLAXIS OF...inventionjournals
The study demonstrated that eight weeks after bilateral ovariectomy in female white Wistar rats, develops endothelial dysfunction of bone microvasculature and deterioration of regional blood flow in the bone, leading to the emergence of generalized osteoporosis. Nanoparticulated forms of Losartan and Nanoparticulated forms of Resveratrol, possessing endothelial protective action, effectively prevent the reduction of regional microcirculation in bone tissue, keeping it at the level of intact rats. It is allowed to maintain an adequate level of bone remodeling processes, which manifested by slowing the thinning of bone trabeculae.
Some Properties of M-projective Curvature Tensor on Generalized Sasakian-Spac...inventionjournals
The document summarizes research on properties of the M-projective curvature tensor on generalized Sasakian-space-forms. Key points:
- It studies whether generalized Sasakian-space-forms are M-projectively semisymmetric (curvature tensor satisfies a certain condition) or M-projectively pseudosymmetric.
- It is shown that an M-projectively semisymmetric generalized Sasakian-space-form is either M-projectively flat or satisfies a specific condition on the structure functions.
- No conclusion is drawn about M-projectively pseudosymmetric generalized Sasakian-space-forms. The research aims to classify these manifolds based on properties of the M
“Desquamative Gingivitis Treated By An Antioxidant Therapy- A Case Report”inventionjournals
This case report describes the successful treatment of desquamative gingivitis in a 52-year-old female patient using systemic antioxidant therapy. Desquamative gingivitis causes red, eroded patches on the gums. While topical steroids provided no improvement, taking an herbal antioxidant capsule containing extracts of various plants twice daily for two months resolved the lesions with no recurrence. Antioxidants can reduce oxidative damage and inflammation, providing an alternative to steroids for treating desquamative gingivitis.
Multiple Linear Regression Applications Automobile Pricinginventionjournals
This document describes using multiple linear regression to predict automobile prices. The response variable is price from Kelley Blue Book for 470 cars. Potential explanatory variables are mileage, make, type, liter size, cruise control, upgraded speakers, and leather seats. Preliminary analysis finds mileage and liter have significant correlations with price. The final regression model finds price is best predicted by an equation involving liter size and mileage as the most important factors. The model explains over 80% of price variation and provides a way for buyers and sellers to estimate reasonable car prices.
Isolation, Screening and Selection of Fungal Strains for Potential Cellulase ...inventionjournals
The present study was aimed to isolate, screen and identify the potential cellulase and xylanase producing fungi from the soil samples collected from different areas of Haryana. Total one hundred fifty one fungal isolates were isolated from these soil samples were then screened by using selective media (i.e. CMC and Xylan agar) in order to determine the potency of microbes in producing cellulase and xylanase which were indicated by clear zones formation around the cultures. This qualitative screening which showing greater cellulase and xylanase indexes were subjected to enzyme activity tests by Dinitrosalicylic acid (DNS) method. Maximum enzyme production was achieved at 30°C, pH of 6.0 by Trichoderma atroviride on 5th day of incubation.
Application of Statistical Quality Control Techniques for Improving the Servi...inventionjournals
This document discusses applying statistical quality control techniques to improve the quality of paramedical services. It analyzes the time taken to provide different paramedical services to patients at a hospital in Bhubaneswar, India. Control charts are created for the mean and range of time taken for seven common services (blood sugar, creatinine, etc.). The charts identify samples where the process went out of control, indicating room for improvement. Suggestions are made to reduce variations and delays in service delivery times.
Genotoxicity Evaluation of Polystyrene Membrane with Collagen and Norbixin by...inventionjournals
The biocompatible membranes are widely applied in the medical field in order to stimulate tissue repair. The biological principle of this type of treatment is the repair and guided regeneration. In the literature, there are few reports of studies evaluating the effects and biological properties of norbixin in animal tissues. Thus, the present study was to evaluate the effect of polystyrene membrane with collagen and norbixin, through the micronucleus test and comet assay in rats, as part of the recommended test battery to evaluate the mutagenic potential. The research project was approved by CEP / FACID Protocol 069/2014. For this study, 15 rats were divided into 3 groups were used: A - the membrane was introduced into the peritoneum of the animals through a laparotomy; B - received cyclophosphamide at a dose of 50mg / kg intraperitoneally; C - were performed only one laparotomy. A peripheral blood sample was collected from the animals for conducting Comet assay and 72 hours after the start of the experiment were euthanized. It was collected bone marrow material of each rat to perform the micronucleus test. In conclusion, through the tests, the membrane is not genotoxic
Stochastic Analysis of a Cold Standby System with Server Failureinventionjournals
This paper throws light on the stochastic analysis of a cold standby system having two identical units. The operative unit may fail directly from normal mode and the cold standby unit can fail owing to remain unused for a longer period of time. There is a single server, who may also follow as precedent unit happens to be in the line of failure .After having treated, the operant unit for functional purposes, the server may eventually perform the better service efficiently. The time to take treatment and repair activity follows negative exponential distribution whereas the distributions of unit and server failure are taken as arbitrary with different probability density functions. The expressions of various stochastic measures are analyzed in steady state using semiMarkov process and regenerative point technique. The graphs are sketched for arbitrary values of the parameters to delineate the behavior of some important performance measures to check the efficacy of the system model under such situations.
Modified Procedure to Solve Fuzzy Transshipment Problem by using Trapezoidal ...inventionjournals
This paper deals with the large scale transshipment problem in Fuzzy Environment. Here we determine the efficient solutions for the large scale Fuzzy transshipment problem. Vogel’s approximation method (VAM) is a technique for finding the good initial feasible solution to allocation problem. Here Vogel’s Approximation Method (VAM) is used to find the efficient initial solution for the large scale transshipment problem.
function f is said to be an even harmonious labeling of a graph G with q edges if f is an injection from the vertices of G to the integers from 0 to 2q and the induced function f* from the edges ofG to {0, 2…….….2(q-1)} defined by f* (uv) = f (u) +f (v) (mod 2q) is bijective. The graph G is said to have an even harmonious labeling. In this paper the even harmonious labeling of a class of graph namely H (2n, 2t+1) is established.
The notion of b-open sets in a topological space was introduced by D. Andrijevic [3] in 1996. Later Talal et al [16] introduced the idea of quasi b-open sets in a bitopological space. Here we have studied the ideas of b* -open sets and weakly b* -open sets in Alexandroff spaces. Also we have introduced the ideas of quasi b* -open sets , b* -open sets w.r.to and pairwise b* open sets in a more general structure of a bispace . 2010 AMS Mathematics Subject Classifications: 54A05, 54E55, 54E99
Qausi Conformal Curvature Tensor on 푳푪푺 풏-Manifoldsinventionjournals
In this paper, we focus on qausi-conformal curvature tensor of 퐿퐶푆 푛 -manifolds. Here we study quasi-conformally flat, Einstein semi-symmetric quasi -conformally flat, 휉-quasi conformally flat and 휙-quasi conformally flat 퐿퐶푆 푛 -manifolds and obtained some interesting results
Clinical and Laboratory Prognostic Factors in Malignant form of Mediterranean...inventionjournals
Mediterranean spotted fever (MSF) caused by Rickettsia conorii has become a significant health risk for suffering people and international travelers. In the past, overlooked as a serious disease, at present it is known that MSF was wrongly considered a benign condition. In this report, we present a set of clinical features and laboratory parameters in 55 patients (19 fatalities and 36 survivors) with malignant forms of the disease. The purpose of the study was to outline the prognostic factors of the fatal outcome in patients with malignant MSF. Based on our data, the main prediction factors for mortality in malignant MSF patients were: advanced age, delayed hospital admission, severe concomitant diseases, and failure to start or to complete appropriate antibiotic treatment. Laboratory prognostic factors in fatalities were: leukocytosis with a marked shift to the left; extremely high serum urea and creatinine levels; low levels of fibrinogen and prolongation of thrombin time. The most frequently involved organ systems of malignant cases were: central nervous system 100%, liver 92.72%, kidneys 60%, lungs 58.18%, myocardium 30.9%, and gastrointestinal tract 23.63%. The conducted histopathological investigations revealed lethal complications: encephalitis, brain edema, acute respiratory distress syndrome, non-cardiogenic lung swelling, acute myocarditis, gastrointestinal bleeding, hemorrhagicnecrotizing pancreatitis and acute renal failure
A Comparative Study of Two-Sample t-Test Under Fuzzy Environments Using Trape...inventionjournals
This paper proposes a method for testing hypotheses over two sample t-test under fuzzy environments using trapezoidal fuzzy numbers (tfns.). In fact, trapezoidal fuzzy numbers have many advantages over triangular fuzzy numbers as they have more generalized form. Here, we have approached a new method where trapezoidal fuzzy numbers are defined in terms of alpha level of trapezoidal interval data and based on this approach, the test of hypothesis is performed. Moreover the proposed test is analysed under various types of trapezoidal fuzzy models such as Alpha Cut Interval, Membership Function, Ranking Function, Total Integral Value and Graded Mean Integration Representation. And two numerical examples have been illustrated. Finally a comparative view of all conclusions obtained from various test is given for a concrete comparative study.
Under- Five Mortality in the West Mamprusi District of Ghanainventionjournals
This study applied both descriptive and logistic regression analysis to the factors associated with under five mortalities in the West Mamprusi district of Ghana. Results from the descriptive analysis revealed that male deaths occur more than female deaths with a percentage of 52(52%) for the three years whiles majority (32.24%) of the deaths were being cause by malaria. The interesting finding in this study was that, among all the factors (variables) associated with under five mortalities, only one variable (i.e. Prematurity) showed significant impact after running the analysis.
General Manpower – Hyper Exponential Machine System with Exponential Producti...inventionjournals
A manpower machine system which produces products for sale is treated. It is assumed that the manpower system fails with a probability when an employee leaves and that the machine system has Hyper exponential life time distribution. The combined system fails when the manpower system fails or the machine fails whichever occurs first. When the combined system fails, sales begin and recruitments are done to fill up vacancies. Two models are treated. In model 1, recruitments are done one by one and in model 2 recruitments are done one by one or in bulk pattern depending on the system operation time is within or exceeding a threshold. Using Laplace transform, the operation time, recruitment time of the employees, repair time of the machine and sales time of the products are studied. Their means and the covariance of the operation time and recruitment time are presented with numerical examples. Mathematics Subject Classification: 91B70
This document discusses the existence and uniqueness of renormalized solutions to a nonlinear multivalued elliptic problem with homogeneous Neumann boundary conditions and L1 data. Specifically, it considers the problem β(u) - div a(x, Du) ∋ f in Ω, with a(x, Du).η = 0 on ∂Ω, where f is an L1 function. It provides definitions of renormalized solutions and entropy solutions. The main result is the existence and uniqueness of renormalized solutions to this problem, which is proved using a priori estimates and a compactness argument with doubling of variables.
This document discusses the existence and uniqueness of renormalized solutions to a nonlinear multivalued elliptic problem with homogeneous Neumann boundary conditions and L1 data. Specifically, it considers the problem β(u) - div a(x, Du) ∋ f in Ω, with a(x, Du).η = 0 on ∂Ω. It defines renormalized solutions and entropy solutions for this problem. The main result is that under certain assumptions on the data, there exists a unique renormalized solution to the problem. The proof uses approximate methods, showing existence and uniqueness for a penalized approximation problem, and passing to the limit.
1) The document discusses proximal algorithms for solving inverse problems in probability spaces, where the goal is to estimate an unknown variable x given noisy measurements y.
2) It describes using Bayesian methods like maximum a posteriori (MAP) estimation and Markov chain Monte Carlo (MCMC) to account for uncertainty, where the posterior distribution p(x|y) is assumed to be log-concave.
3) Proximal algorithms like the unadjusted Langevin algorithm (ULA) and proximal ULA (MYULA) are proposed for sampling from the posterior in high dimensions when p(x|y) is not differentiable.
Unique fixed point theorems for generalized weakly contractive condition in o...Alexander Decker
This document summarizes a research paper that proves some new fixed point theorems for generalized weakly contractive mappings in ordered partial metric spaces. The paper extends previous theorems proved by Nashine and Altun in 2017. It presents definitions of partial metric spaces and properties. It proves a new fixed point theorem (Theorem 2.1) for nondecreasing mappings on ordered partial metric spaces that satisfy a generalized contractive condition. The theorem shows the mapping has a fixed point and the partial metric of the fixed point to itself is 0. It uses properties of partial metrics, contractive conditions and continuity to prove the sequence generated by iterating the mapping is Cauchy and converges.
11.[29 35]a unique common fixed point theorem under psi varphi contractive co...Alexander Decker
This document presents a unique common fixed point theorem for two self maps satisfying a generalized contraction condition in partial metric spaces using rational expressions. It begins by introducing basic definitions and lemmas related to partial metric spaces. It then presents the main theorem, which states that if two self maps T and f satisfy certain contractive and completeness conditions, including being weakly compatible, then they have a unique common fixed point. The proof considers two cases - when the sequences constructed from the maps are eventually equal, and when they are not eventually equal but form a Cauchy sequence. It is shown in both cases that the maps must have a unique common fixed point.
This paper presents a common coupled fixed point theorem for two pairs of w-compatible self-mappings (F, G) and (f) in a metric space (X, d). The mappings satisfy a generalized rational contractive condition. The paper proves that if f(X) is a complete subspace of X, then F, G, and f have a unique common coupled fixed point of the form (u, u) in X × X. This result generalizes and improves previous related theorems by removing the completeness assumption on the entire space X. An example is also provided to support the usability of the theorem.
(α ψ)- Construction with q- function for coupled fixed pointAlexander Decker
This document presents a theorem to prove the existence of coupled fixed points for contractive mappings in partially ordered quasi-metric spaces. It begins with definitions of key concepts such as mixed monotone mappings, coupled fixed points, quasi-metric spaces, and Q-functions. It then states and proves a coupled fixed point theorem for mappings that satisfy an (α-Ψ)-contractive condition in a partially ordered, complete quasi-metric space with a Q-function. The theorem shows that if such a mapping F has the mixed monotone property and satisfies the contractive inequality, then F has at least one coupled fixed point.
The paper reports on an iteration algorithm to compute asymptotic solutions at any order for a wide class of nonlinear
singularly perturbed difference equations.
Partitioning procedures for solving mixed-variables programming problemsSSA KPI
This document presents two procedures for solving mixed-variables programming problems. The key steps are:
1. The problem is partitioned into two subproblems - a programming problem defined on the set S, and a linear programming problem defined in Rp.
2. A partitioning theorem shows that solving the programming problem on S determines whether the original problem is feasible, feasible but not optimal, or determines an optimal solution and reduces the original problem to a linear programming problem.
3. To efficiently solve the programming problem on S without computing the entire constraint set, the problem is decomposed into subproblems where only constraints determining optimality need to be identified.
This document discusses convexity properties of the gamma function. It begins with an introduction to the gamma function and its history. It then revisits earlier work by Krull on functional equations of the form f(x+1)-f(x)=g(x). Several lemmas are presented that characterize properties of convex functions satisfying certain conditions. These results are then applied to derive classical and new representations and characterizations of the gamma function based on its convexity.
This document contains lecture notes on machine learning and deep learning. It discusses regression, classification, and neural networks. For regression and classification, it presents the optimal functions that minimize error and relates them to conditional expectations. It also provides bounds on the generalization error of functions learned through empirical risk minimization. For neural networks, it discusses their ability to approximate functions and bounds the VC-dimension of neural networks with multiple hidden layers.
Image sciences, image processing, image restoration, photo manipulation. Image and videos representation. Digital versus analog imagery. Quantization and sampling. Sources and models of noises in digital CCD imagery: photon, thermal and readout noises. Sources and models of blurs. Convolutions and point spread functions. Overview of other standard models, problems and tasks: salt-and-pepper and impulse noises, half toning, inpainting, super-resolution, compressed sensing, high dynamic range imagery, demosaicing. Short introduction to other types of imagery: SAR, Sonar, ultrasound, CT and MRI. Linear and ill-posed restoration problems.
In mathematics, a partial derivative of a function of several variables is its derivative with respect to one of those variables, with the others held constant (as opposed to the total derivative, in which all variables are allowed to vary). Partial derivatives are used in vector calculus and differential geometry.
This document presents some fixed point theorems for fuzzy mappings. It begins with introducing concepts related to fuzzy mappings such as fuzzy sets, α-level sets, approximate quantities, and fuzzy mappings. It then states some preliminary lemmas. The main results proved are:
1) A fixed point theorem for a fuzzy mapping T on a complete metric space X, showing that if T satisfies a contraction-type condition, then T has a fixed point.
2) A common fixed point theorem for a sequence of fuzzy mappings {Ti} on a complete metric space X, showing that if each Ti satisfies certain rational inequality conditions, then the mappings have a common fixed point.
A common fixed point theorem in cone metric spacesAlexander Decker
This academic article summarizes a common fixed point theorem for continuous and asymptotically regular self-mappings on complete cone metric spaces. The theorem extends previous results to cone metric spaces, which generalize metric spaces by replacing real numbers with an ordered Banach space. It proves that under certain contractive conditions, the self-mapping has a unique fixed point. The proof constructs a Cauchy sequence that converges to the fixed point.
1) The document reviews concepts from probability and statistics including discrete and continuous random variables, their distributions (e.g. binomial, Poisson, normal), and multivariate distributions.
2) It then discusses key properties of multivariate normal distributions including their probability density function and how marginal and conditional distributions can be derived from the joint distribution.
3) Concepts like independence, mean vectors, covariance matrices, and their implications are also covered as they relate to multivariate normal distributions.
This document discusses methods for solving algebraic and transcendental equations. It begins by defining key terms like roots, simple roots, and multiple roots. It then distinguishes between direct and iterative methods. Direct methods provide exact solutions, while iterative methods use successive approximations that converge to the exact root. The document focuses on iterative methods and describes how to obtain initial approximations, including using Descartes' rule of signs and the intermediate value theorem. It also discusses criteria for terminating iterations. One iterative method described in detail is the method of false position, which approximates the curve defined by the equation as a straight line between two points.
This document discusses methods for solving algebraic and transcendental equations. It begins by defining key terms like roots, simple roots, and multiple roots. It then distinguishes between direct and iterative methods. Direct methods provide exact solutions, while iterative methods use successive approximations that converge to the exact root. The document focuses on iterative methods and describes how to obtain initial approximations, including using Descartes' rule of signs and the intermediate value theorem. It also discusses criteria for terminating iterations. One iterative method described in detail is the method of false position, which approximates the curve defined by the equation as a straight line between two points.
Conformable Chebyshev differential equation of first kindIJECEIAES
In this paper, the Chebyshev-I conformable differential equation is considered. A proper power series is examined; there are two solutions, the even solution and the odd solution. The Rodrigues’ type formula is also allocated for the conformable Chebyshev-I polynomials.
Similar to Higher-Order (F, α, β, ρ, d) –Convexity for Multiobjective Programming Problem (20)
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Height and depth gauge linear metrology.pdfq30122000
Height gauges may also be used to measure the height of an object by using the underside of the scriber as the datum. The datum may be permanently fixed or the height gauge may have provision to adjust the scale, this is done by sliding the scale vertically along the body of the height gauge by turning a fine feed screw at the top of the gauge; then with the scriber set to the same level as the base, the scale can be matched to it. This adjustment allows different scribers or probes to be used, as well as adjusting for any errors in a damaged or resharpened probe.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Mechatronics is a multidisciplinary field that refers to the skill sets needed in the contemporary, advanced automated manufacturing industry. At the intersection of mechanics, electronics, and computing, mechatronics specialists create simpler, smarter systems. Mechatronics is an essential foundation for the expected growth in automation and manufacturing.
Mechatronics deals with robotics, control systems, and electro-mechanical systems.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Higher-Order (F, α, β, ρ, d) –Convexity for Multiobjective Programming Problem
1. International Journal of Mathematics and Statistics Invention (IJMSI)
E-ISSN: 2321 – 4767 P-ISSN: 2321 - 4759
www.ijmsi.org Volume 4 Issue 4 || April. 2016 || PP-13-19
www.ijmsi.org 13 | Page
Higher-Order (F, α, β, ρ, d) –Convexity for Multiobjective
Programming Problem
Tarulata R. Patel1
,R. D. Patel2
1
Department Of Statistics, Ambaba Commerce College, MIBM And DICA
Surat
2
Department Of Statistics, Veer Narmad South Gujarat University
Surat
ABSTRCT: Higher-order (F, α, β, ρ, d)-convexity is considered. A multiobjective programming problem (MP)
is considered. Mond-Weir and Wolfe type duals are considered for multiobjective programming problem.
Duality results are established for multiobjective programming problem under higher-order (F, α, β, ρ, d)-
convexity assumptions. The results are also applied for multiobjective fractional programming problem.
Keywords- Higher-order (F, α, β, ρ, d)-convexity; Sufficiency; Optimality conditionsMultiobjective
Programming; Duality, Multiobjective fractional programming.
I. INTRODUCTION
Convexity plays an important role in the optimization theory. In inequality constrained
optimization the Kuhn-Tucker conditions are sufficient for optimality if the functions are convex. However, the
application of the Kuhn-Tucker conditions as sufficient conditions for optimality is not restricted to convex
problems as many mathematical models used in decision sciences, economics, management sciences,
stochastics, applied mathematics and engineering involve non convex functions.
The concept of (F, ρ)-convexity was introduced by Preda[1] as an extension of F-convexity defined by
Hanson and Mond [2] and ρ-convexitygeneralized convexity defined by Vial [3]. Ahmad [5] obtained a number
of sufficiency theorems for efficient and properly efficient solutions under various generalized convexity
assumptions for multiobjective programming problems.Liang et al. [8] introduced a unified formulation
ofgeneralized convexity called (F,α, ρ,d)-convexity and obtained some optimality conditionsand duality results
for nonlinearfractional programming problems.
Recently, Yuan et al. [12] introduced the concept of (C, α,ρ,d)-convexity which is the generalizationof
(F,α, ρ,d)-convexity, and proved optimality conditions and duality theorems fornon-differentiable minimax
fractional programming problems.
In this paper we have considered, higher-order (F,α, β, ρ,d)-convex functions. Under the generalized
convexity, we obtain sufficient optimality conditions for multiobjective programming problem (MP). Mond-
Weir and Wolfe type duals are considered for multiobjective programming problem. Duality results are
established under for multiobjective programming problem under higher-order (F, α, β, ρ, d)-convexity
assumptions. The results are also applied for multiobjective fractional programming problem. In the last we
present Wolfeduality for (MP) and (MFP).
II. DEFINITIONS AND PRELIMINARIES
Definition 1. A functional F:X ×X ×Rn
→ R is said to be sublinear in the third variable, if forall x, x ∈X,
(i) F(x, x ; a1+a2) ≦F(x, x ;a1)+ F(x, x ;a2), for all a1 , a2∈Rn
; and
(ii) F(x, x ; αa) =αF(x, x ; a) for all α ∈R+ , and a ∈Rn
.
From (ii), it is clear that F(x, x ; 0) = 0.
Gulati and Saini [13] introduced the class of higherorder(F, α, β, ρ, d)-convex functions as follows:
Let X ⊆Rn
be an open set. Let 𝜙:X → R, K:X × Rn
→ R be differentiable functions,
F:X ×X × Rn
→ R be a sublinear functional in the third variable and d:X × X → R. Further,
let α, β: X × X → R+ {0} and ρ∈R.
Definition 2. The function 𝜙is said to be higher-order (F, α, β, ρ, d)-convex at x with respect toK, if for all x
∈X and p ∈Rn
,
𝜙(x) −𝜙( x ) ≧F(x, x ; α(x, x ){∇𝜙( x )+∇pK( x , p)})
+ β(x, x ){K( x , p) –pT
∇pK( x , p)}+ ρ d2
(x, x ).
2. Higher-Order (F, α, β, ρ, d) –Convexity For Multiobjective Programming Problem
www.ijmsi.org 14 | Page
Remark 1. Let K( x , p) = 0.
(i) Then the above definition becomes that of (F, α, ρ, d)-convex function introduced by
Liang et al. [8].
(ii)If α(x, x ) = 1, we obtain the definition of (F, ρ)-convex function given by Preda [1].
(iii) If α(x, x ) = 1, ρ= 0 and F(x, x ;∇𝜙( x )) = ηT
(x, x )∇𝜙( x ) for a certain map
η: X × X → Rn
, then (F, α, β, ρ, d)-convexity reduces to the invexity in Hanson [7].
(iv) If F is convex with respect to the third argument, then we obtain the definition of
(F, α, ρ, d)-convex function introduced by Yuan et al. [12].
Remark 2. Let β (x, x ) = 1.
(i)If K ( x , p) = T 21
p x p ,
2
then the above inequality reduces to the definition of
second order (F, α, ρ, d)-convex function given by Ahmad and Husain [6].
(ii) If α(x, x ) = 1, ρ= 0, K( x , p) = T 21
p x p ,
2
and F(x, x ; a) = ηT
(x, x )a, where
η: X × X → Rn
, the above definition becomes that of η -bonvexity introduced by Pandey [10].
We consider the following multiobjective programming problem:
(MP) Minimize 1 2
( ) ( ( ), ( ), ... ( )),i k
x x x x
Subject to j
h (x) 0 ; x ∈X,
where X is an open subset of Rn
and the functions 1 2
: , ,..., :
n
i k
X R and
1 2
: , ,..., :
m
j m
h h h h X R are differentiable on X. Let S = {x ∈X: j
h (x) ≦0} denote the set of all
feasible solutions for(MP).
Proposition 1 (Kuhn-Tucker Necessary Optimality Conditions [9]). Let x ∈S be an optimal solution of (MP)
and let hj satisfy a constraint qualification [Theorem 7.3.7 in 5]. Then thereexists a v ∈Rm
such that
k m
i i j j
i= 1 j= 1
μ ( x ) + v h ( x ) = 0 , (2.1)
1
( ) 0 ,
m
T
j j
j
v h x
(2.2)
i j j
μ 0, v 0, h ( ) 0,x (2.3)
where j
h ( x ) denotes the n× m matrix 1 2 m
h ( x ), h ( x ),..., h ( x ) .
III. SUFFICIENT OPTIMALITY CONDITIONS
In this section, we have established Kuhn-Tucker sufficient optimality conditions for (MP) under
(F, α, β, ρ, d)-convexity assumptions.
Theorem 1. Let x ∈S and v ∈Rm
satisfy (2.1)-(2.3). If
(i) 𝜙iis higher-order (F, α, β, ρ1, d)-convex at x with respect to K,
(ii) v
T
h is higher-order (F, α, β, ρ2, d)-convex at x with respect to −K, and
(iii) ρ1 + ρ2≧0,
then x is an optimal solution of the problem (MP).
Proof.Let x ∈S. Since 𝜙iis higher-order (F, α, β, ρ1, d)-convex at x with respect to K, for
all x ∈S, we have
𝜙i(x) –𝜙i( x ) ≧F(x, x ; α (x, x ){ i
∇𝜙i( x )+∇p K( x , p)})
3. Higher-Order (F, α, β, ρ, d) –Convexity For Multiobjective Programming Problem
www.ijmsi.org 15 | Page
+ β (x, x ){K( x , p) – pT
∇p K( x , p)}+ ρ1d2
(x, x ). (3.1)
Using (2.1), we get
𝜙i(x) –𝜙i( x ) ≧F(x, x ; α (x, x ){- jv ∇hj( x )+∇p K( x , p)})
+ β (x, x ){K( x , p) – pT
∇p K( x , p)}+ ρ1d2
(x, x ). (3.2)
Also, v
T
h is higher-order (F, α, β, ρ2, d)-convex at x with respect to −K. Therefore
T T
v h(x) - v h( x ) ≧F(x, x ; α (x, x ){ v
T
∇ h( x ) - ∇p K( x , p)})
- β (x, x ){K( x , p) – pT
∇p K( x , p)}+ ρ2d2
(x, x ). (3.3)
Since v ( ) 0,
T
h x v ≥ 0 and h(x) ≤ 0, we get
0≧F(x, x ; α (x, x ){ v
T
∇ h( x ) - ∇p K( x , p)})
- β (x, x ){K( x , p) – pT
∇p K( x , p)}+ ρ2d2
(x, x ). (3.4)
Adding the inequalities (3.2) and (3.4), we obtain
𝜙i(x) –𝜙i( x ) ≧(ρ1+ ρ2 ) d2
(x, x ).
which by hypothesis (iii) implies,
𝜙i(x)≧𝜙i( x ).
Hence x is an optimal solution of the problem (MP).
IV. MOND WEIR DUALITY
In this section, we have established weak and strong duality theorems for the following MondWeir dual (MD)
for (MP):
(MD) Maximize 𝜙i(u),
Subject to
k m
i i j j
i= 1 j= 1
μ (u ) + v h (u ) = 0 , (4.1)
T
j j
v h (u ) ≧0, (4.2)
u ∈X, i
μ ≧0,vj ≧0, v ∈Rm
. (4.3)
Theorem 2 (Weak Duality):Let x and (u, v) be feasible solutions of (MP) and (MD) respectively.
Let
(i) 𝜙ibe higher-order (F, α, β, ρ1, d)-convex at u with respect to K,
(ii)
T
v h be higher-order (F, α, β, ρ2, d)-convex at u with respect to −K, and
(iii) ρ1 + ρ2≧0.
Then
𝜙i(x)≧𝜙i( u ).
Proof:By hypothesis (i), we have
𝜙i(x) –𝜙i( u ) ≧F(x, u ; α (x, u ){ μ ∇𝜙i( u )+∇p K( u , p)})
+ β (x, u ){K( u , p) – pT
∇p K( u , p)}+ ρ1d2
(x, u ). (4.4)
Also hypothesis (ii) yields
T T
v h(x) - v h(u) ≧F(x, u ; α (x, u ){ v
T
∇ h( u ) - ∇p K( u , p)})
-β (x, u ){K( u , p) – pT
∇p K( u , p)}+ ρ2d2
(x, u ).
By (4.2), (4.3) and hj(x) ≦0, it follows that
0 ≧F(x, u ; α (x, u ){ v
T
∇ h( u ) - ∇p K( u , p)})
-β (x, u ){K( u , p) – pT
∇p K( u , p)}+ ρ2d2
(x, u ). (4.5)
Adding the inequalities (4.4), (4.5) and applying the properties of sublinear functional, we
Obtain
𝜙i(x) –𝜙i( u ) ≧F(x, u ; α (x, u )[ μ ∇𝜙i( u )+ v
T
∇ hj( u )])+ ρ1d2
(x, u )+ρ2d2
(x, u ).
which in view of (4.1) implies
4. Higher-Order (F, α, β, ρ, d) –Convexity For Multiobjective Programming Problem
www.ijmsi.org 16 | Page
𝜙i(x) –𝜙i( u ) ≧ (ρ1+ ρ2 ) d2
(x, x ).
Using hypothesis (iii) in the above inequality, we get
𝜙i(x)≧𝜙i( u ).
Remark 3. A constraint qualification is not required to establish weak duality. It has been
erroneously assumed in Theorem 3.4 in [4].
Theorem 3(Strong Duality):Let x be an optimal solution of the problem (MP) and let h satisfya constraint
qualification. Further, let Theorem 2 hold for the feasible solution x of (MP) andall feasible solutions (u, v) of
(MD). Then there exists a v ∈Rm
+such that ( x , v ) is an optimalsolution of (MD).
Proof.Since x is an optimal solution for the problem (MP) and h satisfies a constraint
qualification, by Proposition 1 there exists a v ∈Rm
+ such that the Kuhn-Tucker conditions, (2.1)- (2.3) hold.
Hence ( x , v ) is feasible for (MD).
Now let (u, v) be any feasible solution of (MD). Then by weak duality (Theorem 2), wehave
𝜙i( x )≧𝜙i( u ).
Therefore ( x , v ) in an optimal solution of (MD).
V. APPLICATION IN MULTIOBJECTIVE FRACTIONAL PROGRAMMING
If𝜙I : X →R is defined by
i
i
i
f (x )
(x )=
g (x )
where f , g : X → R, fi(x) ≧0 and gi (x) >0 on X, then the multiobjective programming problem (MP) becomes
the following multiobjective fractional programming problem (MFP):
(MFP) Minimize i
i
i
f (x )
(x )=
g (x )
Subject tohj(x) ≦0, x ∈X.
We now prove the following result, which gives higher-order (F, α , β , ρ, d )-convexity of the
ratio function fi(x)/gi(x).
Theorem 4. Let fi (x) and –gi(x) be higher-order (F, α, β, ρ, d)-convex at x with respect to thesame function
K.Then the multiobjective fractional function i
i
f (x )
g (x )
is higher-order (F, α , β , ρ, d )-convex at x withrespect to
K , where
α (x, x )= α (x, x ) i
i
( x )
,
g (x )
g
β (x, x ) = β (x, x ) i
i
( x )
,
g (x )
g
K ( x , p) = i
2
i i
f ( x )1
+
g ( x ) g ( x )
K( x , p),
d (x, x ) =
1
2
i
i i i
f ( x )1
+
g (x ) g (x ).g ( x )
d(x, x ).
Proof:Since fi (x) and –gi(x) are higher-order (F, α, β, ρ, d)-convex at x with respect to
the same function K, we have
fi(x)− fi( x ) ≧F(x, x ; α(x, x ){∇fi ( x )+∇p K( x , p)})
+ β (x, x ){K( x , p) – pT
∇p K( x , p)}+ ρd2
(x, x )
5. Higher-Order (F, α, β, ρ, d) –Convexity For Multiobjective Programming Problem
www.ijmsi.org 17 | Page
And
−gi(x)+ gi( x ) ≧F(x, x ; α (x, x ){-∇gi ( x )+∇p K( x , p)})
+ β (x, x ){K( x , p) – pT
∇p K( x , p)}+ρd2
(x, x ).
Also
i
i i i i
i i i
f ( x )1
f (x ) - f ( x ) + - g (x )+ g ( x ) .
g (x ) g (x )g ( x )
Using the above inequalities and sublinearity of F, we get
i i
i i
f (x) f ( x )
-
g (x) g ( x )
i
1
g (x )
F(x, x ; α (x, x ){∇fi ( x )+∇p K( x , p)})
+
i
1
g (x )
( β (x, x ){K( x , p) – pT
∇p K( x , p)}+ ρd2
(x, x ))
+ i
i i
f ( x )
g (x )g ( x )
F(x, x ; α (x, x ){-∇gi ( x )+∇p K( x , p)})
+ i
i i
f ( x )
g (x )g ( x )
( β (x, x ){K( x , p) – pT
∇p K( x , p)}+ ρd2
(x, x )).
= F(x, x ;
i
α (x , x )
g (x )
{∇fi ( x )+∇p K( x , p)})
+ F(x, x ; α (x, x ) i
i i
f ( x )
g (x )g ( x )
{-∇gi ( x )+∇p K( x , p)}
+β (x, x ) i
i i i
f ( x )1
+
g (x ) g (x ).g ( x )
{K( x , p) – pT
∇p K( x , p)}
+ρ i
i i i
f ( x )1
+
g (x ) g (x ).g ( x )
d2
(x, x ).
= F(x, x ; α (x, x ) i
i
g ( x )
g (x )
i i
p2
i i i
f ( x ) f ( x )1
{ + + K ( x ,p )}
g ( x ) g ( x ) g ( x )
)
+ β (x, x ) i
i
g ( x )
g (x )
i
2
i i
f ( x )1
+
g ( x ) g ( x )
{K( x , p) – pT
∇p K( x , p)}
+ρ i
i i i
f ( x )1
+
g (x ) g (x ).g ( x )
d2
(x, x ).
Therefore,
i i
i i
f (x) f ( x )
-
g (x) g ( x )
F(x, x ; α (x, x ) i
p
i
f ( x )
+ K ( x , p )
g ( x )
)
+β (x, x ) { K ( x , p) – pT
∇p K ( x , p)}+ ρ
2
d (x, x ).
i.e., i
i
f (x )
g (x )
is higher-order (F, α , β , ρ, d )-convex at x with respect to K .
In view of Theorem 4, the results of Section 4 lead to the following duality relations
between (MFP) and its Mond-Weir dual (MFD).
i i
i i
f (x ) f ( x )
- =
g (x ) g ( x )
6. Higher-Order (F, α, β, ρ, d) –Convexity For Multiobjective Programming Problem
www.ijmsi.org 18 | Page
(MFD) Maximize i
i
f (u )
g (u )
Subject to
k m
i i i i j j
i= 1 j= 1
μ f (u ) - λ g (u ) + h (u ) = 0v
k
i i i i
i= 1
μ f (u ) - λ g (u ) 0 ,
m
j j
j= 1
h (u ) 0 ,
T
v
u ∈ X, μi ≥0, λi ≥0, vj ≥0, μi∈Rn
, λi∈Rn
, vj∈ Rm
.
Theorem5 (Weak Duality). Let x and (u,v) be feasible solutions of (MFP) and (MFD) respectively.Let
(i) fi and –gi be higher-order (F, α, β, ρ1, d)-convex at u with respect to K,
(ii) vT
h be higher-order (F, α , β , ρ2, d )-convex at u with respect to - K , where α , β , K
and d are as given in Theorem 4, and
(iii) ρ1 + ρ2≧0.
Then i i
i i
f (x ) f (u )
g (x ) g (u )
Theorem 6 (Strong Duality). Let x be an optimal solution of the problem (MFP) and let h satisfya constraint
qualification. Further, let Theorem 5 hold for the feasible solution x of (MFP) andall feasible solutions (u, v) of
(MFD). Then there exists a v ∈Rm
+such that
( x , v ) is an optimalsolution of (MFD).
VI. WOLFE DUALITY
The Wolfe dual of (MP) and (MFP) are respectively
(MWD)Maximize
k m
T
i i j j
i= 1 j= 1
μ (u )+ v h (u )
Subject to
k m
i i j j
i= 1 j= 1
μ (u )+ v h (u ) = 0
u ∈ X, μi ≥ 0, vj ≥0, μi∈Rn
, vj∈ Rm
(WMFD) Maximize
k m
i i i i j
i= 1 j= 1
μ f (u ) - λ g (u ) + h (u )
T
j
v
Subject to
k m
i i i i j j
i= 1 j= 1
μ f (u ) - λ g (u ) + v h (u ) = 0
u ∈ X, μi ≥0, λi ≥0, vj ≥0, μi∈Rn
, λi∈Rn
, vj∈ Rm
Now we state duality relations for the primal problems (MP) and (MFP) and their Wolfe duals(MWD) and
(WMFD) respectively. Their proofs follow as in Section 4.
Theorem 7 (Weak Duality). Let x and (u, v) be feasible solutions of (MP) and (MWD) respectively.
Let
(i) 𝜙ibe higher-order (F, α, β, ρ1, d)-convex at u with respect to K,
(ii) v T
hbe higher-order (F, α, β, ρ2, d)-convex at u with respect to −K, and
(iii) ρ1 + ρ2≧0.
Then𝜙i(x) ≥𝜙i( u ) + vT
h(u).
Theorem 8 (Strong Duality). Let x be an optimal solution of the problem (MP) and let h satisfya constraint
qualification. Further, let Theorem 7 hold for the feasible solution x of (MP) andall feasible solutions (u, v) of
(MWD). Then there exists a v ∈Rm
+such that ( x , v ) is an optimalsolution of (MWD) and the optimal objective
function values of (MP) and (MWD) are equal.
7. Higher-Order (F, α, β, ρ, d) –Convexity For Multiobjective Programming Problem
www.ijmsi.org 19 | Page
Theorem9 (Weak Duality). Let x and (u,v) be feasible solutions of (MFP) and (WMFD) respectively.
Let
(i) fiand –gi be higher-order (F, α, β, ρ1, d)-convex at u with respect to K,
(ii) vT
h be higher-order (F, α , β , ρ2, d )-convex at u with respect to − K , where α , β , K
and d are as given in Theorem 4, and
(iii) ρ1 + ρ2≧0.
Then i i
i i
f (x ) f (u )
g (x ) g (u )
+v T
h(u).
Theorem 10 (Strong Duality). Let x be an optimal solution of the problem (MFP) and let h satisfya constraint
qualification. Further, let Theorem 9 hold for the feasible solution x of (MFP) and allfeasible solutions (u, v) of
(WMFD). Then there exists a v ∈Rm
+such that
( x , v ) is an optimalsolution of (WMFD) and the optimal objective function values of (MFP) and (WMFD) are
equal.
VII. CONCLUSION
In this paper a new concept of generalized convexity has been introduced. Under this
generalized convexity we have established sufficient optimality conditions and duality results for
amultiobjective programming problem.These duality relations lead to duality in multiobjective
fractionalprogramming.
REFERENCES
Preda, V. (1992): On efficiency and duality for multiobjective programs; J. Math. Anal.Appl., Vol. 166, pp. 365-377.
[1]. Hanson, M.A. and Mond, B. (1982): Further generalizations of convexity in mathematical programming; J. Inf. Opt. Sci., Vol 3,
pp. 25-32.
[2]. Vial, J.P. (1983): Strong convexity of sets and functions; J. Math. Eco., Vol. 9, pp. 187-
[3]. 205.
[4]. Gulati, T.R. and Islam, M.A. (1994): Sufficency and duality in multiobjective programming with generalized F-convex functions;
J. math. Anal. Appl., Vol 183, pp. 181-195
[5]. Ahmad, I.(2005): Sufficiency and duality in multiobjective programming with generalizedconvexity; J. Appl. Anal., Vol. 11, pp. 19-
33.
[6]. Ahmad I. and Husain Z. (2006): Second-order (F, α, ρ, d)-convexity and Duality in Multiobjective Programming. Information
Sciences, 176 : 3094-3103.
[7]. Hanson M. A.(1981): On Sufficiency of the Kuhn-Tucker Conditions. Journal of Mathematical Analysis and Applications, 80 :
545-550.
[8]. Liang, Z.A., Huang H. X. and Pardalos. P. M. (2001): Optimality Conditions and Duality for a Class of Nonlinear Fractional
Programming Problems. Journal of OptimizatioTheory and Applications, 110 : 611-619.
[9]. Mangasarian.O. L. (1969):Nonlinear Programming. Mc Graw Hill, New York, NY.Pandey.S.(1991): Duality for Multiobjective
Fractional Programming involving Generalized η-bonvex Functions. Opsearch, 28: 31-43.
[10]. Vial. J. P.(1983): Strong and Weak Convexity of Sets and Functions. Mathematics of Operations Research, 8 : 231-259.
[11]. Yuan. D. H., Liu. X. L., Chinchuluun, A. and Pardalos. P. M.(2006):Nondifferentiable Minimax Fractional Programming
Problems with (C, α, ρ, d)-Convexity. Journal of Optimization Theory and Applications, 129: 185-199.
[12]. Gulati.T.R.,Saini.H.(2011): Higher –order (F, α, β, ρ, d)-Convexity and its Application In Fractional Programming.European
Journal of Pure and Applied Mathematics.4:266-275.