This document presents patterns of Pythagorean triangles where the ratio of the triangle's area to perimeter is represented by a special polygonal number. Four patterns are described where this ratio equals a triangular number, square number, pentagonal number, and hexagonal number, respectively. For each pattern, the document gives the equations relating the triangle side lengths to the polygonal number rank and provides examples of Pythagorean triangles that fit the pattern along with properties of the triangles' sides.
1. The document describes an investigation of infinite sequences and calculating the sum of the first n terms as n approaches infinity.
2. The analysis shows that as n increases, the sum approaches the value of the parameter a, regardless of the values of a and x. However, larger values of a and x cause the sum to converge more slowly.
3. The general conclusion is that the sum of the infinite sequence (lna)n/n! as n approaches infinity equals the value of the parameter a.
The document describes three numerical methods problems solved using MATLAB. The first compares solutions to a differential equation using Euler, Runge-Kutta, and Adams-Bashforth methods. The second solves a second order differential equation using Euler and Runge-Kutta order 4. The third uses MATLAB's ode45 function to solve initial value problems modeling a pendulum, Duffing oscillator, and RLC circuit.
This document summarizes a research article about numerical modeling of gas turbine engines. The researchers developed mathematical models and numerical methods to calculate the stationary and quasi-stationary temperature fields of gas turbine blades with convective cooling. They combined the boundary integral equation method and finite difference method to solve this problem. The researchers proved the validity of these methods through theorems and estimates. They were able to visualize the temperature profiles using methods like least squares fitting with automatic interpolation, spline smoothing, and neural networks. The reliability of the numerical methods was confirmed through calculations and experimental tests of heat transfer characteristics on gas turbine nozzle blades.
The document describes the Jacobi iterative method for solving systems of linear equations. It begins with an initial estimate for the solution variables, inserts them into the equations to get updated estimates, and repeats this process iteratively until the estimates converge to the desired solution. As an example, it applies the method to a set of 3 equations in 3 unknowns, showing the estimates after each iteration getting progressively closer to the exact solution obtained using Gaussian elimination. A Fortran program implementing the Jacobi method is also presented.
A lambda calculus for density matrices with classical and probabilistic controlsAlejandro Díaz-Caro
This document presents a lambda calculus for density matrices called λρ. It extends the standard lambda calculus with constructs that model the four postulates of quantum mechanics using density matrices rather than state vectors. This includes operations for unitary evolution (U), measurement (π), composite systems (⊗), and allowing classical control over measurements. Types are also presented for the language. A denotational semantics is given that interprets terms as probability distributions over density matrices or functions on density matrices. An example is analyzed showing how measurement and classical control can be modeled in the language.
2012 mdsp pr12 k means mixture of gaussiannozomuhamada
The document provides the course calendar and lecture plan for a machine learning course. The course calendar lists the class dates and topics to be covered from September to January, including Bayes estimation, Kalman filters, particle filters, hidden Markov models, Bayesian decision theory, principal component analysis, and clustering algorithms. The lecture plan focuses on clustering methods, including k-means clustering, mixtures of Gaussians models, and using the expectation-maximization (EM) algorithm to estimate the parameters of Gaussian mixture models.
This document presents a cumulant-based algorithm for identifying the parameters of an input-output quadratic system from measured input-output data. The algorithm involves computing input-output cross-cumulants up to fifth order and solving successive linear systems to estimate the unknown model coefficients. Simulation results show the algorithm performs well in estimating parameters for different signal-to-noise ratios.
The document describes the Jacobi iterative method for solving systems of linear equations. It explains that the Jacobi method makes approximations to the solution by iteratively solving for each variable in terms of the most recent approximations for the other variables. The method works by rewriting the system of equations in a form where the coefficient matrix is split into diagonal, lower triangular, and upper triangular matrices. Approximations converge to the true solution as the number of iterations increase. Pseudocode and a MATLAB implementation are provided.
1. The document describes an investigation of infinite sequences and calculating the sum of the first n terms as n approaches infinity.
2. The analysis shows that as n increases, the sum approaches the value of the parameter a, regardless of the values of a and x. However, larger values of a and x cause the sum to converge more slowly.
3. The general conclusion is that the sum of the infinite sequence (lna)n/n! as n approaches infinity equals the value of the parameter a.
The document describes three numerical methods problems solved using MATLAB. The first compares solutions to a differential equation using Euler, Runge-Kutta, and Adams-Bashforth methods. The second solves a second order differential equation using Euler and Runge-Kutta order 4. The third uses MATLAB's ode45 function to solve initial value problems modeling a pendulum, Duffing oscillator, and RLC circuit.
This document summarizes a research article about numerical modeling of gas turbine engines. The researchers developed mathematical models and numerical methods to calculate the stationary and quasi-stationary temperature fields of gas turbine blades with convective cooling. They combined the boundary integral equation method and finite difference method to solve this problem. The researchers proved the validity of these methods through theorems and estimates. They were able to visualize the temperature profiles using methods like least squares fitting with automatic interpolation, spline smoothing, and neural networks. The reliability of the numerical methods was confirmed through calculations and experimental tests of heat transfer characteristics on gas turbine nozzle blades.
The document describes the Jacobi iterative method for solving systems of linear equations. It begins with an initial estimate for the solution variables, inserts them into the equations to get updated estimates, and repeats this process iteratively until the estimates converge to the desired solution. As an example, it applies the method to a set of 3 equations in 3 unknowns, showing the estimates after each iteration getting progressively closer to the exact solution obtained using Gaussian elimination. A Fortran program implementing the Jacobi method is also presented.
A lambda calculus for density matrices with classical and probabilistic controlsAlejandro Díaz-Caro
This document presents a lambda calculus for density matrices called λρ. It extends the standard lambda calculus with constructs that model the four postulates of quantum mechanics using density matrices rather than state vectors. This includes operations for unitary evolution (U), measurement (π), composite systems (⊗), and allowing classical control over measurements. Types are also presented for the language. A denotational semantics is given that interprets terms as probability distributions over density matrices or functions on density matrices. An example is analyzed showing how measurement and classical control can be modeled in the language.
2012 mdsp pr12 k means mixture of gaussiannozomuhamada
The document provides the course calendar and lecture plan for a machine learning course. The course calendar lists the class dates and topics to be covered from September to January, including Bayes estimation, Kalman filters, particle filters, hidden Markov models, Bayesian decision theory, principal component analysis, and clustering algorithms. The lecture plan focuses on clustering methods, including k-means clustering, mixtures of Gaussians models, and using the expectation-maximization (EM) algorithm to estimate the parameters of Gaussian mixture models.
This document presents a cumulant-based algorithm for identifying the parameters of an input-output quadratic system from measured input-output data. The algorithm involves computing input-output cross-cumulants up to fifth order and solving successive linear systems to estimate the unknown model coefficients. Simulation results show the algorithm performs well in estimating parameters for different signal-to-noise ratios.
The document describes the Jacobi iterative method for solving systems of linear equations. It explains that the Jacobi method makes approximations to the solution by iteratively solving for each variable in terms of the most recent approximations for the other variables. The method works by rewriting the system of equations in a form where the coefficient matrix is split into diagonal, lower triangular, and upper triangular matrices. Approximations converge to the true solution as the number of iterations increase. Pseudocode and a MATLAB implementation are provided.
NUMERICAL METHODS -Iterative methods(indirect method)krishnapriya R
The document discusses two iterative methods for solving systems of linear equations: Gauss-Jacobi and Gauss-Seidel. Gauss-Jacobi solves each equation separately using the most recent approximations for the other variables. Gauss-Seidel updates each variable with the most recent values available. The document provides an example applying both methods to solve a system of three equations. Gauss-Seidel converges faster, requiring fewer iterations than Gauss-Jacobi to achieve the same accuracy. Both methods are useful alternatives to direct methods like Gaussian elimination when round-off errors are a concern.
The document discusses solving linear equations using numerical methods in MATLAB. It provides code implementations for Gauss-Seidel method, Jacobi method, and Cholesky method. It also includes routines for calculating the inverse of a 3x3 matrix, matrix norm, and forward substitution. Examples are given applying each method to different 3x3 matrices. Spectral radius is also calculated for some examples to analyze convergence properties.
On problem-of-parameters-identification-of-dynamic-objectCemal Ardil
This document discusses methods for identifying parameters of dynamic objects described by systems of ordinary differential equations. Specifically, it addresses problems with multiple initial boundary conditions that are not shared across points.
The paper proposes a new "conditions shift" method to transfer the initial boundary conditions in a way that eliminates differential links and multipoint conditions. This reduces the parameter identification problem to solving either an algebraic system or a quadratic programming problem.
Two cases are considered: case A where the number of conditions equals the number of conditionally free parameters, resulting in a single parameter vector solution. Case B where additional conditions on the parameters are needed in the form of equalities or inequalities, resulting in an optimization problem to select optimal parameter values.
This document discusses numerical methods for approximating solutions to differential equations. It begins by introducing Euler's method, which uses forward differencing to iteratively calculate approximations of the solution. An example problem is presented and Euler's method is applied with various step sizes, showing its accuracy improves with smaller step sizes. Alternative formulations of Euler's method are described using forward differencing, an integral equation, and Taylor series expansion. The backward Euler method is also introduced, which uses backward differencing and must be solved implicitly. This method is applied to the example problem.
1. The document discusses numerical methods for solving ordinary differential equations, including power series approximations, Taylor series, Euler's method, and the Runge-Kutta method.
2. It provides examples of using each of these methods to solve sample differential equations and compares the numerical solutions to exact solutions.
3. Truncation errors are defined as errors that result from using an approximation instead of an exact mathematical procedure.
The Runge-Kutta method approximates the solution to differential equations by taking a weighted average of the function values at the endpoints and midpoint of each interval. It has a local truncation error proportional to h^5, higher than previous methods. Adaptive Runge-Kutta methods allow the step size h to vary over the interval to better match the local error, improving efficiency over fixed step size Runge-Kutta.
This document summarizes lecture two on process control fundamentals. It discusses analytical and numerical methods for solving ordinary differential equations (ODEs). Analytical solutions using techniques like Laplace transforms are preferred when possible as they provide insights into system behavior and relationships between variables. Numerical methods like Euler and Runge-Kutta are used when analytical solutions cannot be derived, though they lose some insight. Examples demonstrate solving ODEs for concentration changes in a continuous stirred tank reactor using both approaches.
Solution manual for introduction to nonlinear finite element analysis nam-h...Salehkhanovic
Solution Manual for Introduction to Nonlinear Finite Element Analysis
Author(s) : Nam-Ho Kim
This solution manual include all problems (Chapters 1 to 5) of textbook. There is one PDF for each of chapters.
The document discusses heat transfer through multiple dimensions and steady-state conduction. It covers analytical solutions using separation of variables for simple geometries with various boundary conditions. Numerical techniques using finite difference methods are also introduced. The temperature field is discretized on a grid and the heat diffusion equation is expressed as algebraic equations at the grid points using Taylor series approximations. Thermal balance is enforced at interior points by equating heat conduction to neighboring points.
This document discusses correlation and regression analysis. It defines correlation as dealing with the association between two or more variables. Regression analysis develops a statistical model to predict a dependent variable from an independent variable. The key methods covered are Karl Pearson's coefficient of correlation, Spearman's rank correlation coefficient, and linear regression lines and coefficients. Formulas are provided for calculating these statistical measures.
The document discusses response surface methodology (RSM), which uses statistical and mathematical techniques to model and analyze problems with responses influenced by several variables. RSM is used to optimize responses by exploring the relationships between variables and responses through designed experiments and polynomial mathematical models. Key aspects covered include first and second-order polynomial models, experimental designs like factorial and central composite designs, and techniques like steepest ascent to navigate response surfaces. Examples demonstrate how RSM can be applied to optimize process variables and responses.
This document discusses correlation and regression analysis. It defines correlation as dealing with the association between two or more variables, and identifies different types including positive/negative, simple/multiple, and linear/non-linear. Regression analysis predicts the value of a dependent variable based on an independent variable. Key aspects covered include Karl Pearson's coefficient of correlation, Spearman's rank correlation coefficient, regression lines, coefficients, and estimating values from the regression equation.
This document discusses correlation and regression analysis. It defines correlation as dealing with the association between two or more variables. There are different types of correlation including positive, negative, simple, and multiple. Methods for measuring correlation include scatter diagrams, graphs, and Karl Pearson's coefficient of correlation. Regression analysis develops a statistical model to predict a dependent variable from an independent variable. Regression coefficients and the correlation coefficient can be used to describe the relationship between variables.
New technologies-for-modeling-of-gas-turbine-cooled-bladesCemal Ardil
The document describes new technologies for modeling gas turbine cooled blades, including:
1) Developing mathematical models and numerical methods using the boundary integral equation method (BIEM) and finite difference method (FDM) to calculate the stationary and quasi-stationary temperature field of a blade profile with convective cooling.
2) Using splines, smooth interpolation, and neural networks for visualization of blade profiles.
3) Validating the designed methods through computational and experimental investigations of heat and hydraulic characteristics of a gas turbine nozzle blade.
The document discusses numerical methods for solving mathematical problems. It begins by defining numerical methods as algorithms used to obtain numerical solutions when an analytical solution does not exist or is difficult to obtain. It then provides the Navier-Stokes equations as an example of equations that require numerical methods to solve. The document concludes by discussing the importance of numerical accuracy and computation time for numerical methods.
This document provides a summary of the course contents for an Independent Component Analysis (ICA) class.
1. The class covers the basics of ICA, including problem formulation, whitening using Principal Component Analysis, and measuring non-Gaussianity.
2. Key topics include linear mixing models, assumptions of source signal independence and non-Gaussianity, whitening observed signals to obtain independent components, and maximizing non-Gaussianity measures to separate the sources.
3. Non-Gaussian source examples and Gaussian limitations are discussed. Kurtosis is introduced as a classical measure of non-Gaussianity to formulate ICA as an optimization problem.
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelIOSR Journals
Abstract: MIMO-OFDM system in Rayleigh Fading Channel is very popular technique for mobile communication now a day’s for research. Here we want increase the capacity of MIMO-OFDM of system by using adaptive modulation, Algebraic Space-Time Codes (ASTC) encoder for MIMO Systems are based on quaternion algebras .we found that ergodic capacity has some limitation which reduce the system’s performance to overcome this we use ASTC code . ASTC code are full rank, full rate and non vanishing constant minimum determinant for increasing spectral efficiency and reducing Peak to Average Power Ratio (PAPR) . Keywords— Adaptive modulation ASTC code, Capacity, BER, Ergodic capacity, PAPR, Spectral Efficiency and SNR
A Digital Pen with a Trajectory Recognition AlgorithmIOSR Journals
Abstract : Now a days, the development of miniaturization technologies in electronic circuits and components has seriously decreased the dimension and weight of consumer electronic products, those are smart phones and handheld computers, and thus prepared them more handy and convenient. This paper contains an accelerometer-based digital pen for handwritten digit and gesture trajectory recognition applications. The digital pen consists of a triaxial accelerometer, a microcontroller, and an Zigbee wireless transmission module for sensing and collecting accelerations of handwriting and gesture trajectories. with this project we can do human computer interaction. Users can utilize this pen to write digits or make hand gestures, and the accelerations of hand motions calculated by the accelerometer are wirelessly transmitted to a computer for online trajectory recognition. So, by varying the position of mems (micro electro mechanical systems) we can capable to show the alphabetical characters in the PC. The acceleration signals calculated from the triaxial accelerometer are transmitted to a computer via the wireless module. Keywords - ARM, Zigbee, Sensors module
Area Time Efficient Scaling Free Rotation Mode Cordic Using Circular TrajectoryIOSR Journals
Abstract: This paper presents an area-time efficient Coordinate Rotation Digital Computer (CORDIC) algorithm that completely eliminates the scale-factor. Besides we have proposed an algorithm to reduce the number of CORDIC iterations by increasing the number of stages. The efficient scale factor compensation techniques are proposed which adversely effect the latency/throughput of computation. The proposed CORDIC algorithm provides the flexibility to manipulate the number of iterations depending on the accuracy, area and latency requirements. The CORDIC is an iterative arithmetic algorithm for computing generalized vector rotations without performing multiplications. Index Terms: coordinate rotation digital computer (CORDIC), cosine/sine, field-programmable gate array (FPGA), most-significant-1, recursive architecture, Discrete Fourier Transform (DFT), Discrete Cosine transform (DCT), Iterative CORDIC, Pipelined CORDIC.
NUMERICAL METHODS -Iterative methods(indirect method)krishnapriya R
The document discusses two iterative methods for solving systems of linear equations: Gauss-Jacobi and Gauss-Seidel. Gauss-Jacobi solves each equation separately using the most recent approximations for the other variables. Gauss-Seidel updates each variable with the most recent values available. The document provides an example applying both methods to solve a system of three equations. Gauss-Seidel converges faster, requiring fewer iterations than Gauss-Jacobi to achieve the same accuracy. Both methods are useful alternatives to direct methods like Gaussian elimination when round-off errors are a concern.
The document discusses solving linear equations using numerical methods in MATLAB. It provides code implementations for Gauss-Seidel method, Jacobi method, and Cholesky method. It also includes routines for calculating the inverse of a 3x3 matrix, matrix norm, and forward substitution. Examples are given applying each method to different 3x3 matrices. Spectral radius is also calculated for some examples to analyze convergence properties.
On problem-of-parameters-identification-of-dynamic-objectCemal Ardil
This document discusses methods for identifying parameters of dynamic objects described by systems of ordinary differential equations. Specifically, it addresses problems with multiple initial boundary conditions that are not shared across points.
The paper proposes a new "conditions shift" method to transfer the initial boundary conditions in a way that eliminates differential links and multipoint conditions. This reduces the parameter identification problem to solving either an algebraic system or a quadratic programming problem.
Two cases are considered: case A where the number of conditions equals the number of conditionally free parameters, resulting in a single parameter vector solution. Case B where additional conditions on the parameters are needed in the form of equalities or inequalities, resulting in an optimization problem to select optimal parameter values.
This document discusses numerical methods for approximating solutions to differential equations. It begins by introducing Euler's method, which uses forward differencing to iteratively calculate approximations of the solution. An example problem is presented and Euler's method is applied with various step sizes, showing its accuracy improves with smaller step sizes. Alternative formulations of Euler's method are described using forward differencing, an integral equation, and Taylor series expansion. The backward Euler method is also introduced, which uses backward differencing and must be solved implicitly. This method is applied to the example problem.
1. The document discusses numerical methods for solving ordinary differential equations, including power series approximations, Taylor series, Euler's method, and the Runge-Kutta method.
2. It provides examples of using each of these methods to solve sample differential equations and compares the numerical solutions to exact solutions.
3. Truncation errors are defined as errors that result from using an approximation instead of an exact mathematical procedure.
The Runge-Kutta method approximates the solution to differential equations by taking a weighted average of the function values at the endpoints and midpoint of each interval. It has a local truncation error proportional to h^5, higher than previous methods. Adaptive Runge-Kutta methods allow the step size h to vary over the interval to better match the local error, improving efficiency over fixed step size Runge-Kutta.
This document summarizes lecture two on process control fundamentals. It discusses analytical and numerical methods for solving ordinary differential equations (ODEs). Analytical solutions using techniques like Laplace transforms are preferred when possible as they provide insights into system behavior and relationships between variables. Numerical methods like Euler and Runge-Kutta are used when analytical solutions cannot be derived, though they lose some insight. Examples demonstrate solving ODEs for concentration changes in a continuous stirred tank reactor using both approaches.
Solution manual for introduction to nonlinear finite element analysis nam-h...Salehkhanovic
Solution Manual for Introduction to Nonlinear Finite Element Analysis
Author(s) : Nam-Ho Kim
This solution manual include all problems (Chapters 1 to 5) of textbook. There is one PDF for each of chapters.
The document discusses heat transfer through multiple dimensions and steady-state conduction. It covers analytical solutions using separation of variables for simple geometries with various boundary conditions. Numerical techniques using finite difference methods are also introduced. The temperature field is discretized on a grid and the heat diffusion equation is expressed as algebraic equations at the grid points using Taylor series approximations. Thermal balance is enforced at interior points by equating heat conduction to neighboring points.
This document discusses correlation and regression analysis. It defines correlation as dealing with the association between two or more variables. Regression analysis develops a statistical model to predict a dependent variable from an independent variable. The key methods covered are Karl Pearson's coefficient of correlation, Spearman's rank correlation coefficient, and linear regression lines and coefficients. Formulas are provided for calculating these statistical measures.
The document discusses response surface methodology (RSM), which uses statistical and mathematical techniques to model and analyze problems with responses influenced by several variables. RSM is used to optimize responses by exploring the relationships between variables and responses through designed experiments and polynomial mathematical models. Key aspects covered include first and second-order polynomial models, experimental designs like factorial and central composite designs, and techniques like steepest ascent to navigate response surfaces. Examples demonstrate how RSM can be applied to optimize process variables and responses.
This document discusses correlation and regression analysis. It defines correlation as dealing with the association between two or more variables, and identifies different types including positive/negative, simple/multiple, and linear/non-linear. Regression analysis predicts the value of a dependent variable based on an independent variable. Key aspects covered include Karl Pearson's coefficient of correlation, Spearman's rank correlation coefficient, regression lines, coefficients, and estimating values from the regression equation.
This document discusses correlation and regression analysis. It defines correlation as dealing with the association between two or more variables. There are different types of correlation including positive, negative, simple, and multiple. Methods for measuring correlation include scatter diagrams, graphs, and Karl Pearson's coefficient of correlation. Regression analysis develops a statistical model to predict a dependent variable from an independent variable. Regression coefficients and the correlation coefficient can be used to describe the relationship between variables.
New technologies-for-modeling-of-gas-turbine-cooled-bladesCemal Ardil
The document describes new technologies for modeling gas turbine cooled blades, including:
1) Developing mathematical models and numerical methods using the boundary integral equation method (BIEM) and finite difference method (FDM) to calculate the stationary and quasi-stationary temperature field of a blade profile with convective cooling.
2) Using splines, smooth interpolation, and neural networks for visualization of blade profiles.
3) Validating the designed methods through computational and experimental investigations of heat and hydraulic characteristics of a gas turbine nozzle blade.
The document discusses numerical methods for solving mathematical problems. It begins by defining numerical methods as algorithms used to obtain numerical solutions when an analytical solution does not exist or is difficult to obtain. It then provides the Navier-Stokes equations as an example of equations that require numerical methods to solve. The document concludes by discussing the importance of numerical accuracy and computation time for numerical methods.
This document provides a summary of the course contents for an Independent Component Analysis (ICA) class.
1. The class covers the basics of ICA, including problem formulation, whitening using Principal Component Analysis, and measuring non-Gaussianity.
2. Key topics include linear mixing models, assumptions of source signal independence and non-Gaussianity, whitening observed signals to obtain independent components, and maximizing non-Gaussianity measures to separate the sources.
3. Non-Gaussian source examples and Gaussian limitations are discussed. Kurtosis is introduced as a classical measure of non-Gaussianity to formulate ICA as an optimization problem.
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelIOSR Journals
Abstract: MIMO-OFDM system in Rayleigh Fading Channel is very popular technique for mobile communication now a day’s for research. Here we want increase the capacity of MIMO-OFDM of system by using adaptive modulation, Algebraic Space-Time Codes (ASTC) encoder for MIMO Systems are based on quaternion algebras .we found that ergodic capacity has some limitation which reduce the system’s performance to overcome this we use ASTC code . ASTC code are full rank, full rate and non vanishing constant minimum determinant for increasing spectral efficiency and reducing Peak to Average Power Ratio (PAPR) . Keywords— Adaptive modulation ASTC code, Capacity, BER, Ergodic capacity, PAPR, Spectral Efficiency and SNR
A Digital Pen with a Trajectory Recognition AlgorithmIOSR Journals
Abstract : Now a days, the development of miniaturization technologies in electronic circuits and components has seriously decreased the dimension and weight of consumer electronic products, those are smart phones and handheld computers, and thus prepared them more handy and convenient. This paper contains an accelerometer-based digital pen for handwritten digit and gesture trajectory recognition applications. The digital pen consists of a triaxial accelerometer, a microcontroller, and an Zigbee wireless transmission module for sensing and collecting accelerations of handwriting and gesture trajectories. with this project we can do human computer interaction. Users can utilize this pen to write digits or make hand gestures, and the accelerations of hand motions calculated by the accelerometer are wirelessly transmitted to a computer for online trajectory recognition. So, by varying the position of mems (micro electro mechanical systems) we can capable to show the alphabetical characters in the PC. The acceleration signals calculated from the triaxial accelerometer are transmitted to a computer via the wireless module. Keywords - ARM, Zigbee, Sensors module
Area Time Efficient Scaling Free Rotation Mode Cordic Using Circular TrajectoryIOSR Journals
Abstract: This paper presents an area-time efficient Coordinate Rotation Digital Computer (CORDIC) algorithm that completely eliminates the scale-factor. Besides we have proposed an algorithm to reduce the number of CORDIC iterations by increasing the number of stages. The efficient scale factor compensation techniques are proposed which adversely effect the latency/throughput of computation. The proposed CORDIC algorithm provides the flexibility to manipulate the number of iterations depending on the accuracy, area and latency requirements. The CORDIC is an iterative arithmetic algorithm for computing generalized vector rotations without performing multiplications. Index Terms: coordinate rotation digital computer (CORDIC), cosine/sine, field-programmable gate array (FPGA), most-significant-1, recursive architecture, Discrete Fourier Transform (DFT), Discrete Cosine transform (DCT), Iterative CORDIC, Pipelined CORDIC.
To find a non-split strong dominating set of an interval graph using an algor...IOSR Journals
In graph theory, a connected component of an undirected graph is a sub graph in which any two
vertices are connected to each other by paths. For a graph G, if the subgraph of G itself is a connected
component then the graph is called connected, else the graph G is called disconnected and each connected
component sub graph is called it’s components. A dominating set Dst of graph G=(V,E) is a non-split strong
dominating set if the induced sub graph < V-Dst > is connected. The non-split strong domination number of G is
the minimum cardinality of a non-split strong dominating set . In this paper constructed a verification method
algorithm for finding a non-split strong dominating set of an interval graph.
Eleven (11) composites, are unfilled and five each filled with varying contents of charcoal and wood dust separating bonded with melted spent thermoplastics have been compounded and their compressive strength, density, specific gravity, percentage shrinkage and percentage absorption determined.Composite density ranges (0.83-0.94)g/cm3, compressive strength from (6.92-16.14)n/mm2, percentage shrinkage from (1.01-4.76)% and percentage water absorption from (1.75-15.75)%. These results suggest that these composites (i) meet the allowable American standard for test and measurement (ASTM) for ceramic floor and wall tiles in compressor strength (0.2-22.1)minimum, % shrinkage (maximum 15%) and water absorption (maximum 16%) (ii)are appreciably strong compare to the gmelina-wood/cement composite and (iii) if comprehensively examined, composites may be useful in the building industry for the manufacture of tiles and boards and even compete favorably with the wood cement composites.
Comparison of Sports Anxiety in three different Stages between Team and Indiv...IOSR Journals
This document summarizes a study that compared sports anxiety levels in individual and team athletes from Manipur, India at three stages: before, during, and after competition. The study surveyed 173 individual athletes and 173 team athletes over 5 years using anxiety questionnaires. It found that both individual and team athletes experienced significantly higher anxiety during competition than before or after. It also found no significant difference in anxiety levels between individual and team athletes before and after competition, but individuals had significantly higher anxiety than teams during competition. The study concluded that anxiety is an important factor affecting sports performance that varies depending on the stage of competition and type of sport.
Assessment of water supply facilities in Owo Local Government Area, Ondo Stat...IOSR Journals
The current study was carryout to investigate the status of water supply facilities in 24 rural
communities of Owo local government area of Ondo State, Nigeria. Former and informer interview,
questionnaire and physical assessment conducted. Secondary data from Nigeria National Population
Commission (NNPC) were used in this study. The major water supply facilities used by the communities were
mostly hand dug well and boreholes which in most cases were fitted with either electric or hand pump. It was
observed that all the boreholes fitted with hand pump were failed while 86 % of those fitted with electrics pump
were also failed. In the case of the hand dug well more than 37 % of all the hand dug well were failed. Borehole
failure was due to people ignorance, non availability of spare parts, constant water failure, poor maintenance
skills and attitude of the communities. The failures of the hand dug well were mainly due to low water table or
aquifer region. The survey assessment results revealed that sustainable water supply to the community could be
enhancing through the use of hand pump boreholes. Hand pump boreholes appeared more reliable with low
operational technology, their cost effectiveness affordability and available spare parts. The studies recommend
the involvement of the community participation in the overall management of the water facility in other to
enhance sustainability.
Smartdust Network for Tactical Border Surveillance Using Multiple SignaturesIOSR Journals
The paper aims at designing a system for border surveillance using the concept of smartdust
technology. Smartdusts are small dust like wireless sensor motes with multiple on-board sensors and
microcontroller. In real time, thousands of such smartdust motes must be deployed in a large area. The motes
can form a network among them and has wireless connection to outside world. Onboard hardware include a
variety of sensors for vibration/seismic, magnetic, acoustic and thermal signature recognition, a
microcontroller for processing these sensor values and a radio transceiver for communication over a wireless
network. In this experimental project, we have designed one central monitoring mote and two smartdust motes
using ARM controller, IEEE radio transceiver and sensors.The central monitoring mote also displays the
tracking history of intrusion on enabling a switch
Evaluation of Level of Precursors of N-Nitrosamine in Vitro in Wistar Rats Fe...IOSR Journals
This study evaluated the effects of different dietary protein levels on the excretion of precursors of N-
nitrosamine in Wistar rats. Rats were fed either a high (64%), normal (27%), or low (3.5%) protein diet and
administered sodium nitrite and dimethylamine hydrochloride. The rats fed a high protein diet excreted
significantly higher levels of nitrite in their urine compared to rats fed normal or low protein diets. The protein
and nitrite concentrations in the post-mitochondrial fraction of the liver were also highest in rats fed a high
protein diet. This suggests that dietary protein intake affects the metabolism and excretion of nitrite and
Effect of Fermentation on the Nutritional and Antinutritional Composition of ...IOSR Journals
The dehulled seeds of three varieties of Lagenaria siceraria were subjected to control fermentation process. The fermented and unfermented seeds were analysed for their nutritional and anti-nutritional compositions using AOAC 1998. The fermented seeds were found to contain high amount of crude protein (48.12%) and crude fibre (4.11%) compared to 27.42% and 0.67% for unfermented seeds respectively. Similarly, crude lipid content of the seeds decreased by about 75%. The process also results in decrease in phytate, oxalate, tannins and cyanide content with consequent increase in nitrate and Vitamin C. Hence fermenting the seeds is an important way of exposing its protein content and reducing the antinutritional content. The seeds were found to have good potentials for preparation of condiments which are commonly used in the preparation of soup.
Complexation, Spectroscopic, Thermal, Magnetic And Conductimetric Studies On ...IOSR Journals
7-hydroxy-4-methyl-8-(phenylazo) coumarin (L1)and 7-hydroxy-4-methyl-8-(o-carboxyphenylazo) coumarin (L2) have been prepared and characterized by elemental analysis, infrared (IR), proton nuclear magnetic resonance (1H NMR) and Mass spectra. The important infrared (IR) spectral bands corresponding to the active groups in the two ligands and the solid complexes under investigation were studied. Also the important fragments in the ligands and the complexes were done using mass spectra and the main peaks were corresponding to the molecular weights of the ligands and complexes. The solid complexes have been synthesized and studied by elemental and thermal analyses (TG and DTA) as well as by IR, 1H NMR, magnetic measurements, electronic transition, molar conductance, mass spectra and electron spin resonance (ESR) spectra. The proposed steriochemical structures for the investigated metal complexes suggest octahedral geometry with respect to Mn, Co, Ni, Cu and Zn metal ions and all of the formed complexes contain coordinated and hydrated water molecules. All of the prepared solid complexes behave as non-electrolytes in chloroform.
A New Lupan type Triterpene Butilinol from Viburnum grandiflorumIOSR Journals
The isolation and structural studies on the chemical constituents of Viburnum grandiflorum are described. The medicinal properties of the plant are also described. The mentholic extract was subjected to the preparative thin layer chromatography (PTLC) test experiments to investigate the isolation pattern. Based on the PTLC test experiments, the extract was subjected to the silica gel column chromatography. The column was eluted with increasing polarities of organic solvents. This afforded several fractions. The fractions were re-chromatographed on silica gel column to afford a new lupan type triterpene butilinol (1) with several known compounds i. e. oleanolic acid (2), ursolic acid (3), β-sitosterol (4), butilinic acid (5), butilin (6), α-amyrin (7) and germanicol (8). The compound (6) was not reported previously from the genus Viburnum. This therefore represents its first report from Viburnum grandiflorum. The compounds (2) and (4) have been previously reported from Viburnum pronifolium while the compounds (3) and (8) from Viburnum opulus and Viburnum erubescens, respectively. This represents the first report of the presence of these compounds in Viburnum grandiflorum. The structures of the above compounds were identified on the basis of spectral data (UV, IR, Mass, 1NMR, 13C-NMR) and literature evidences. The hexane and ethyl acetate soluble portions of the methanolic extract showed significant antifungal activity, while the chloroform soluble portion and the remaining methanol extract showed moderate activity.
Biomimetic Materials in Our World: A Review.IOSR Journals
The study of biomineralization offers valuable and incredible insights into the scope and nature of material chemistry at the inorganic and organic surfaces. Biological systems (architecture) are replete with examples of organic supramolecular assemblies (double and triplet helices, multisubunit proteins, membrane-bound reaction centres, vesicle, tubules e. t. c.), some of which (collagen, cellulose and chitin) extend to microscopic dimensions in the form of hierarchical structure, There are ample opportunities of lessons from the biological (on growth and functional adaptation), and physical (properties and compositions) world. This review explores the field of biomimetic material chemistry as it relates to fibres with respect to their historical perspective, the use of the products of biomimetic material, the progressive efforts and a general overview. Conclusively, biomimetic materials research is indeed a rapidly growing and enormously promising field that needs to be explored.
Investigating and Classifying the Applications of Flexible Manufacturing Syst...IOSR Journals
The recent manufacturing environment is characterized as having diverse products due to mass
customization, short production lead-time, and unstable customer demand. Today, the need for flexibility, quick
responsiveness, and robustness to system uncertainties in production scheduling decisions has increased
significantly. In traditional job shops, tooling is usually assumed as a fixed resource. However, when tooling
resource is shared among different machines, a greater product variety, routing flexibility with a smaller tool
inventory can be realized. Such a strategy is usually enabled by an automatic tool changing mechanism and tool
delivery system to reduce the time for tooling setup, hence allows parts to be processed in small batches. In this
research, a dynamic scheduling problem under flexible tooling resource constraints is studied. An integrated
approach is proposed to allow two levels of hierarchical, dynamic decision making for job scheduling and tool
flow control in Automated Manufacturing Systems. It decomposes the overall problem into a series of static subproblems
for each scheduling window, handles random disruptions by updating job ready time, completion
time, and machine status on a rolling horizon basis, and considers the machine availability explicitly in
generating schedules. Two types of manufacturing system models are used in simulation studies to test the
effectiveness of the proposed dynamic scheduling approach. First, hypothetical models are generated using
some generic shop flow structures (e.g. flexible flow shops, job shops, and single-stage systems) and
configurations(Insup,Um.,et al.,2009).They are tested to provide the empirical evidence about how well the
proposed approach performs for the general automated manufacturing systems where parts have alternative
routings. Second, a model based on a real industrial flexible manufacturing system was used to test the
effectiveness of the proposed approach when machine types, part routing, tooling, and other production
parameters closely mimic to the real flexible manufacturing operations.
Application of Artificial Neural Network (Ann) In Operation of ReservoirsIOSR Journals
Abstract: Reservoir operation is an important element in water resources planning and management. It consists
of several parameters like inflow, storage, evaporation and demands that define the operation strategies for
giving a sequence of releases to meet the demands. The operating policy is a set of rules for determining the
quantities of water to be stored or released or withdrawn from a reservoir or system of several reservoirs under
various conditions. Reservoir operation frequently follows a conventional policy based on Guide curves (Rule
curves) that prescribes reservoir releases based on limited criteria such as current storage levels, season and
demands. Operating policies can be derived using system techniques such as simulation, optimisation and
combination of these two. System analysis has proved to be a potential tool in the planning, operation and
management of the available resources. In recent years, artificial intelligence techniques like Artificial Neural
Networks (ANN) have arisen as an alternative to overcome some of the limitations of traditional methods. In
most of the studies, feed forward structure and the back propagation algorithm have been used to design and
train the ANN models respectively. Detail analysis will be carried out to develop an ANN model for reservoir
operation and assess the application potential of ANN in attaining the reservoir operation objectives compared
with the conventional rule curves.
Key words:Artificial Neural Network, Back propagation, Guide curves (Rule curves), optimisation,reservoir
operation, simulation.
Removal of lead (II) and copper (II) ions from aqueous solution by baobab (Ad...IOSR Journals
High concentration of heavy metals in the environment can be detrimental to a variety of living species. The purpose of this research was to explore the use of baobab (Adsononsia digitata) fruit shells in the removal of lead(II) and copper(II) ions from aqueous solutions. Batch experiments were conducted to determine the effect of varying adsorption parameters on the removal of aqueous lead and copper ions. The adsorption of Pb(II) was found to be maximum at pH 5.5 using adsorbent dose of 0.7 g. The adsorption of Cu(II) was found to be optimum at pH 6 using adsorbent dosage of 0.9 g. The adsorption data conformed to Langmuir, Freundlich and Temkin isotherms. However the Temkin isotherm showed the best fitting model with highest R2 values for both lead and copper (0.9977 and 0.9967) respectively. Baobab fruit shells can be used as a cost effective adsorbent for the removal of lead(II) and copper(II) ions from aqueous solutions in the treatment of industrial effluent.
The document presents soliton solutions to four nonlinear evolution equations (NLEEs) using the Rational Sine-Cosine Method. It summarizes the method and then applies it to obtain solutions for:
1) The Boussinesq Equation, resulting in a soliton solution involving parameters α, β, γ, μ, and c.
2) The Gardner Equation, obtaining a soliton solution involving parameters α, β, γ, μ, and c.
3) The Generalized Boussinesq-Burgers Equations, though no explicit solution is shown.
4) The Mikhailov-Shabat system of equations, though again no solution is displayed.
This document summarizes a research paper on tracking moving objects and determining their distance and velocity using background subtraction algorithms. It first describes background subtraction as a process to extract foreground objects from video by comparing each frame to a background model. It then discusses several algorithms used in the research, including median filtering for noise removal, morphological operations to smooth object regions, and connected component analysis to detect large foreground regions representing objects. The document evaluates these techniques on video to track a single object, determine the distance and velocity of that object between frames, and identify multiple moving objects.
This document discusses the application of systems theory and operations research concepts to sustainable development problems. It establishes that sustainable development can be represented as a control problem in a state space to keep the system within feasible regions over time. Multiple criteria optimization methods from operations research are well-suited to analyze planning and control for sustainable development given its economic, social, and environmental aspects. The document provides examples of how traditional operations research problems have evolved to incorporate more criteria related to sustainability over time.
Herbal Cures Practised By Rural Populace In Varanasi Region Of Eastern U.P.(I...IOSR Journals
A survey based study to collect information regarding use of herbs as household treatment of common ailments in rural areas of Varanasi region of eastern U.P. was undertaken .In Varanasi as in other parts of India , the people especially those residing in rural and semi-urban areas still practise herbal cures for many of their ailments. In the present investigation a total of 40 medicinally important plant species belonging to 27 families were recorded which are frequently used by local populace to cure diseases such as cold,cough,fever,snake bite,boils piles etc.As plants are easily available and sometimes the only source of healthcare available to poor therefore there is a great need for preservation of such medicinal plants.
We search for pairs of distinct Pythagorean triangles suchthat the difference between their perimeters is represented by (i)
2 k (ii) k ,n 2 n (iii) 3 2 3 N P (iv) 12Pt2N
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
EXACT SOLUTIONS OF SCHRÖDINGER EQUATION WITH SOLVABLE POTENTIALS FOR NON PT/P...ijrap
We have obtained explicitly the exact solutions of the Schrodinger equation with Non PT/PT symmetric
Rosen Morse II, Scarf II and Coulomb potentials. Energy eigenvalues and the corresponding
unnormalized wave functions for these systems for both Non PT and PT symmetric are also obtained using
the Nikiforov-Uvarov (NU) method.
Measures of different reliability parameters for a complex redundant system u...Alexander Decker
This document summarizes a mathematical model of a complex redundant system consisting of two subsystems (A and B) connected in series. Subsystem A has N non-identical units in series, while subsystem B has 3 identical components in parallel. The model analyzes the system's reliability under a "head-of-line" repair policy where failures follow exponential and repair times follow general distributions. Differential equations are formulated and solved using Laplace transforms to obtain state probabilities and an expression for the expected total cost of the system over time.
MATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIREditor IJMTER
Suppose a composite system consisting of two subsystems designated as ‘P’ and
‘Q’ connected in series. Subsystem ‘P’ consists of N non-identical units in series, while the
subsystem ‘Q’ consists of three identical components in parallel redundancy.
Stereographic Circular Normal Moment Distributionmathsjournal
This document presents a new circular distribution called the stereographic circular normal moment distribution. The distribution is derived by applying a modified inverse stereographic projection to the existing normal moment distribution defined on the real line. Explicit expressions are provided for the probability density function, cumulative distribution function, and trigonometric moments of the proposed stereographic circular normal moment distribution. Graphs of the probability density function for various parameter values are also presented.
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Development of a test statistic for testing equality of two means under unequ...Alexander Decker
This document proposes a new test statistic for testing the equality of two means from independent samples with unequal variances (known as the Behrens-Fisher problem). It develops a test that uses the harmonic mean of the sample variances instead of the pooled variance. Through simulation, it determines the degrees of freedom for the distribution of the harmonic mean that allows it to be approximated by the chi-square distribution. It then provides an example application to agricultural yield data to demonstrate how the new test statistic can be used.
Finite Element Solution On Effects Of Viscous Dissipation & Diffusion Thermo ...IRJET Journal
This document presents a finite element solution to analyze the effects of viscous dissipation and diffusion thermo on an unsteady magnetohydrodynamic (MHD) flow past an impulsively started inclined oscillating plate with variable temperature and mass diffusion. The governing nonlinear partial differential equations describing the flow are non-dimensionalized and solved using the finite element method. The effects of various flow parameters on flow variables are discussed and results are analyzed graphically.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Observations on Ternary Quadratic Equation z2 = 82x2 +y2IRJET Journal
This document analyzes the ternary quadratic equation z2 = 82x2 + y2 for its non-zero distinct integer solutions. Four different patterns of solutions are presented. Notable observations include some solutions being related to polygonal numbers, octahedral numbers, and four dimensional figurate numbers. Specific relations are shown between the solutions and expressions representing "nasty numbers". The analysis finds multiple parametric representations of solutions to the given equation.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
1. The document discusses Legendre polynomials and their properties, including deriving a recurrence relation.
2. It introduces a generating function for Legendre polynomials and shows that the coefficient of tn in the power series expansion is Pn(x).
3. The recurrence relation derived is: (n+1)Pn+1(x) - (2n+1)xPn(x) + nPn-1(x) = 0.
Toeplitz Hermitian Positive Definite (THPD) matrices play an important role in signal processing and computer graphics and circular models, related to angular / periodic data, have vide applications in various walks of life. Visualizing a circular model through THPD matrix the required computations on THPD matrices using single bordering and double bordering are discussed. It can be seen that every tridiagonal THPD leads to Cardioid model.
This document summarizes a research article that discusses computations involving Toeplitz Hermitian Positive Definite (THPD) matrices. Some key points:
- THPD matrices are important in signal processing and have applications in representing circular models from angular/periodic data.
- The document outlines algorithms for LU decomposition of THPD matrices using single bordering, allowing computations on THPD matrices of any size.
- A THPD matrix corresponds to every circular probability model through the model's characteristic function. The matrix entries are defined in terms of the characteristic function coefficients.
- A tridiagonal THPD matrix specifically corresponds to a Cardioid probability distribution. Examples are provided of decomposing sample THPD matrices
Toeplitz Hermitian Positive Definite (THPD) matrices play an important role in signal processing and
computer graphics and circular models, related to angular / periodic data, have vide applications in
various walks of life. Visualizing a circular model through THPD matrix the required computations on
THPD matrices using single bordering and double bordering are discussed. It can be seen that every
tridiagonal THPD leads to Cardioid model.
This document summarizes a research article that discusses computations involving Toeplitz Hermitian Positive Definite (THPD) matrices. Some key points:
- THPD matrices are important in signal processing and have applications in representing circular models from angular/periodic data.
- The document outlines algorithms for LU decomposition of THPD matrices using single bordering, allowing computations on THPD matrices of any size.
- A THPD matrix corresponds to every circular probability model through the model's characteristic function. The matrix representations of common circular models like the Cardioid distribution are discussed.
- An example computation of the LU decomposition of a 5x5 THPD matrix associated with the Wrapped Weibull distribution is
Markov chains can be used for economic modeling. A Markov chain is characterized by: (1) possible states of a system, (2) a transition matrix showing the probability of moving between states, and (3) initial state probabilities. The transition matrix specifies the one-step probabilities between each pair of states. Markov chains can converge to a stationary distribution over time. Recurrent states will be revisited, while transient states will not. Markov chains can model topics like industry investment, consumption/saving over a lifecycle, and regime-switching in economic time series.
Hermite spline english_20161201_jintaeksJinTaek Seo
The document discusses Hermite splines and their implementation for mobile game programming. It defines splines and their properties such as continuity and order. It also explains cubic Hermite splines which are specified by values and derivatives at endpoints. The key steps to implement a Hermite spline are presented, including defining the geometry and basis matrices to calculate spline points and derivatives as a function of a parameter. Code examples of 1D and 2D Hermite spline classes are also provided.
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
1. IOSR Journal of Mathematics (IOSR-JM)
e-ISSN: 2278-5728,p-ISSN: 2319-765X, Volume 7, Issue 3 (Jul. - Aug. 2013), PP 52-62
www.iosrjournals.org
www.iosrjournals.org 52 | Page
Pythagorean Triangle with Area/ Perimeter as a special polygonal
number
M.A.Gopalan1
, Manju Somanath2
, K.Geetha3
1. Department of Mathematics, Shrimati Indira Gandhi College, Trichy.
2. Department of Mathematics, National College, Trichy.
3. Department of Mathematics, Cauvery College for Women, Trichy.
Abstract: Patterns of Pythagorean triangles, in each of which the ratio Area/ Perimeter is represented by some
polygonal number. A few interesting relations among the sides are also given.
Keyword: Polygonal number, Pyramidal number, Centered polygonal number, Centered pyramidal number,
Special number
I. Introduction
The method of obtaining three non-zero integers x, y and z under certain conditions satisfying the
relation
2 2 2
x y z has been a matter of interest to various Mathematicians [1, 3, 4, 5,6]. In [7-15], special
Pythagorean problems are studied. In this communication, we present yet another interesting Pythagorean
problem. That is, we search for patterns of Pythagorean triangles where, in each of which, the ratio Area/
Perimeter is represented by a special polygonal number. Also, a few relations among the sides are presented.
Notation
m
np = Pyramidal number of rank n with sides m
,m nt = Polygonal number of rank n with sides m
njal = Jacobsthal Lucas number
nja = Jacobsthal number
,m nct = Centered Polygonal number of rank n with sides m
m
ncp = Centered Pyramidal number of rank n with sides m
ng = Gnomonic number of rank n with sides m
np = Pronic number
ncarl = Carol number
nky =Kynea number
II. Method of Analysis
The most cited solution of the Pythagorean equation,
2 2 2
x y z (1)
is represented by
2 ,x uv 2 2
y u v , 2 2
0z u v u v (2)
Pattern 1:
Denoting the Area and Perimeter of the triangle by A and P respectively, the assumption
11,n
A
t
P
leads to the equation
9 7q p q n n
This equation is equivalent to the following two systems I and II respectively:
2. Pythagorean Triangle with Area/ Perimeter as a special polygonal number
www.iosrjournals.org 53 | Page
p-q Q
9n-7 N
N 9n-7
In what follows, we obtain the values of the generators p, q and hence the corresponding sides of the
Pythagorean triangle
Case 1:
On evaluation, the values of the generators satisfying system I are,
10 7,p n q n
Employing (2), the sides of the corresponding, Pythagorean triangle are given by
2
20 14x n n n , 2
99 140 49y n n n , 2
101 140 49z n n n
Examples:
n X Y Z A P
1 6 8 10 24 24
2 52 165 173 4290 390
3 138 520 538 35880 1196
4 264 1073 1105 141636 2442
5 430 1824 1874 392160 4128
Properties:
1)
3
22,
8
6
n
z y x n
t
is a Nasty number[2]
2) 10 42 mod140x y z
3) 2 2
3, 110 2 1 2 1 2 1 78 140 8 nx n y n z n t
Case 2:
On evaluation, the values, of the generators satisfying system II are
10 7, 9 7p n q n
Using (2), the corresponding Pythagorean triangle is
2
180 266 98x n n n , 2
19 14y n n n , 2
181 266 98z n n n
Examples:
n X Y z A P
1 12 5 13 30 30
2 286 48 290 6864 624
3 920 129 929 59340 1978
4 1914 248 1930 1081 2372
5 3268 405 3293 661770 6966
Properties:
1) 10,9 97 mod131n nz y s t
2) 5
65,10 5 98 mod228n ny z x t p
3) 10 9 98 mod140x y z
Pattern 2:
The assumption
12,n
A
t
P
leads to the equation
2 5 4q p q n n
This equation is equivalent to the following two systems I and II respectively
3. Pythagorean Triangle with Area/ Perimeter as a special polygonal number
www.iosrjournals.org 54 | Page
As in the previous case, we obtain the values of the generators u, v and hence the corresponding sides of the
Pythagorean triangle.
Case 1:
On evaluation, the values of the generators satisfying system I are,
7 4,p n 2q n
Using (2), the corresponding Pythagorean triangle is
2
( ) 28 16x n n n ,
2
( ) 45 56 16y n n n ,
2
( ) 53 56 16z n n n
Examples:
n X Y z A P
1 12 5 13 30 30
2 80 84 116 3360 280
3 204 253 325 25806 782
4 384 512 640 98304 1536
5 620 861 1061 266910 2542
Properties:
1) 58,8 0 mod88nx z y t
2) 12,4 0nx y z t
3)
2
8
6
y n
z
is a nasty number
Case 2:
On evaluation, the values of the generators satisfying the system II are
7 4,p n 6 4q n
Using (2), the corresponding Pythagorean triangle is
2
( ) 84 104 32x n n n ,
2
( ) 13 8y n n n ,
2
( ) 85 104 32z n n n
Examples:
n x Y z A P
1 12 5 13 30 30
2 160 44 164 3520 368
3 476 109 485 25942 1070
4 960 200 976 96000 2136
5 1612 317 1637 255502 3566
Properties:
1) 2 44,13,
2 2 mod20nn
z x y ct t
2) 6 32 8nx y g n is a Nasty number
3) 3, 11 6 1 12 30 mod62nx n y n t
Pattern 3:
Under our assumption
13,n
A
t
P
leads to the equation
11 7q p q n n
This equation is equivalent to the following two systems I and II,
p-q Q
5n-7 2n
2n 5n-7
4. Pythagorean Triangle with Area/ Perimeter as a special polygonal number
www.iosrjournals.org 55 | Page
p-q Q
11n-7 N
n 11n-7
Case 1:
On evaluation, the values of the generators satisfying system I are
12 7,p n q n
In view of (2) the corresponding Pythagorean triangle is
2
( ) 24 14x n n n ,
2
( ) 143 168 49y n n n ,
2
( ) 145 168 49z n n n
Examples:
n x Y z A P
1 10 24 26 120 60
2 68 285 293 9690 646
3 174 832 850 72384 1856
4 328 1665 1697 273060 3690
5 530 2784 2834 737760 6148
Properties:
1)
2
2
6
y n
z
is a Nasty number
2) 3,6 2 49 mod85nz x t
3) 4
23,6 2 0 mod4n nn z y x p t
Case 2:
On evaluation, the values of the generators satisfying system II are
11 7,p n 10 7q n
Employing (2), the corresponding Pythagorean triangle is
2
220 294 98x n n ,
2
21 14y n n ,
2
221 294 98z n n
Examples:
n x Y z A P
1 24 7 84 56 25
2 390 56 10920 840 394
3 1196 147 87906 2548 1205
4 2442 280 341880 5180 2458
5 4128 455 939120 8736 4153
Properties:
1) 22,10 98 mod145nx y t
2) 13
8, 3,10 6 52 2 0 mod3n n nn z y p t t
3) 2
6 5
15,
13 2 61 506n nn
z x x y t cp p
Pattern 4:
Under the assumption
14,n
A
t
P
leads to the equation
2 6 5q p q n n
This equation is equivalent to the following two systems
p-q Q
6n-7 2n
2n 6n-5
5. Pythagorean Triangle with Area/ Perimeter as a special polygonal number
www.iosrjournals.org 56 | Page
As in the previous case, we obtain the values of the generators u, v and hence the corresponding sides
of the Pythagorean triangle.
Case 1:
On evaluation, the values of generators satisfying system I are
8 5,p n 2q n
Employing (2), the corresponding Pythagorean triangle is
2
32 20x n n ,
2
60 80 25y n n ,
2
68 80 25z n n
Examples:
n x Y z A P
1 12 5 13 30 30
2 88 105 137 4620 330
3 228 325 397 37050 950
4 432 665 793 143640 1890
5 700 1125 1325 393750 3150
Properties:
1) 9,2 25 mod37nz x t
2) 6
8 nn z y cp
3) 30 8
44,6 2 0 mod5n n nnx cp p t
Case 2:
On evaluation, the values of generators satisfying II are
8 5,p n 6 5q n
Employing (2), the corresponding Pythagorean triangle is
2
( ) 96 140 50x n n n ,
2
( ) 28 20y n n n ,
2
( ) 100 140 50z n n n
Examples:
n x Y z A P
1 6 8 10 24 24
2 154 72 170 5472 1216
3 494 192 530 47424 1216
4 1026 368 1090 188784 2484
5 1750 600 1850 525000 4200
Properties:
1)
3
20 5
2
n
x y
g
is a Nasty number
2) 23, 23 mod116
2
n
z
ct
3) 8,3 23 6 2
2
n n
x
y ct g
Pattern 5:
The assumption
15,n
A
t
P
leads to the equation
13 11q p q n n
The above equation is equivalent to the following two systems I and II respectively
6. Pythagorean Triangle with Area/ Perimeter as a special polygonal number
www.iosrjournals.org 57 | Page
p-q Q
13n-11 N
n 13n-11
As in the previous case, we obtain the values of the generators u, v and hence the corresponding sides
of the Pythagorean triangle.
Case 1:
On evaluation, the values of generators satisfying system I are
14 11,p n q n
Employing (2), the corresponding Pythagorean triangle is
2
( ) 28 22x n n n ,
2
( ) 195 308 121y n n n ,
2
( ) 197 308 121z n n n
Examples:
n x Y z A P
1 6 8 10 24 24
2 68 285 293 9690 646
3 186 952 970 88536 2108
4 360 2009 2041 361620 4410
5 590 3456 3506 1019520 7552
Properties:
1)
28 6
7 42 196 121n nz x cp cp is a perfect square
2)
2
2
z y
is biquadratic integer
3)
13
24,6 3 3
2
n n
nx
cp t n is cubic integer
Case 2:
On evaluation, the values of generators satisfying system II are
14 11,p n 13 11q n
Employing (2), the corresponding Pythagorean triangle is
2
( ) 364 594 242x n n n ,
2
( ) 27 22y n n n ,
2
( ) 365 594 242z n n n
Examples:
n x Y z A P
1 12 5 13 30 30
2 510 64 514 16320 1088
3 1736 177 1745 153636 3658
4 3690 344 3706 634680 7740
5 6372 565 6397 1800090 13334
Properties:
1) 2
6 5
15,
13 2 561 506n nn
z x x y t cp p
2) 2 6
56, 4n nz x y n t cp
3) 15,14 2 242 mod275ny z t
Pattern 6:
The assumption
16,n
A
t
P
leads to the equation
2 7 6q p q n n
The above equation is equivalent to the following two systems I and II respectively
7. Pythagorean Triangle with Area/ Perimeter as a special polygonal number
www.iosrjournals.org 58 | Page
p-q Q
7n-6 2n
2n 7n-6
As in the previous case, we obtain the values of the generators u, v and hence the corresponding sides
of the Pythagorean triangle.
Case 1:
On evaluation, the values of generators satisfying system I are
9 6,p n 2q n
Employing (2), the corresponding Pythagorean triangle is
2
( ) 36 24x n n n ,
2
( ) 77 108 36y n n n ,
2
( ) 85 108 36z n n n
Examples:
n x y z A P
1 12 5 13 30 30
2 96 128 160 6144 384
3 252 405 477 51030 1134
4 480 836 964 200640 2280
5 780 1421 1621 554190 3822
Properties:
1) 58,8 3 2 108 mod186nx y t
2) 2
58, 8 0 mod3nx t n
3) 16, 1 mod8nz y ct
Case 2:
On evaluation the values of generators satisfying equation II are
9 6,p n 7 6q n
Employing (2), the corresponding Pythagorean triangle is
2
( ) 126 192 72x n n n ,
2
( ) 32 24y n n n ,
2
( ) 130 192 72z n n n
Examples:
n x y z A P
1 6 8 10 24 24
2 192 80 208 7680 480
3 630 216 666 68040 1512
4 1320 416 1384 274560 3120
5 2262 680 2362 769080 5304
Properties:
1) 4 2 48 24ny x z g n is a Nasty number
2) 4,(2 1) 65(mod294)ny n x ct
3) 8,( 1) 132 189n nz n x ct g
Pattern 7:
The assumption
17,n
A
t
P
leads to the equation
15 13q p q n n
The above equation is equivalent to the following two systems I and II respectively
p-q Q
15n-13 N
n 15n-13
8. Pythagorean Triangle with Area/ Perimeter as a special polygonal number
www.iosrjournals.org 59 | Page
As in the previous case, we obtain the values of the generators u, v and hence the corresponding sides
of the Pythagorean triangle.
Case 1:
On evaluation, the values of generators satisfying system I are
16 13,p n q n
Employing (2), the corresponding Pythagorean triangle is
2
( ) 32 26x n n n ,
2
( ) 255 169 416y n n n ,
2
( ) 257 169 416z n n n
Examples:
n x y z A P
1 6 8 10 24 24
2 76 357 365 13566 798
3 210 1216 1234 127680 2660
4 408 2585 2617 527340 5610
5 670 4464 4514 1495440 9648
Properties:
1) 2(2 ) 8 26 34 0n
n nx jal mer
2) n2 2 ln
ny z car ky
Case 2:
On evaluation the values of generators satisfying system II are given by
16 13,p n 15 13q n
Employing (2), the corresponding Pythagorean triangle is
2
( ) 480 806 338x n n n ,
2
( ) 31 26y n n n ,
2
( ) 481 806 338z n n n
Examples:
n x y z A P
1 12 5 13 30 30
2 358 72 650 12888 1080
3 2240 201 2249 225120 4690
4 4794 392 4810 939624 9996
5 8308 645 8333 2679330 17286
Properties:
1) 5
31 0 mod57ny p
2) 62, 0 mod3ny z x t
3) 3, 5, 6, 26,15 4 . 223 7 4 mod61n n n nx y z x ct ct nt t
Pattern 8:
Under our assumption
18,n
A
t
P
leads to the equation
2 8 7q p q n n
The above equation is equivalent to the following two systems I and II respectively
p-q Q
8n-7 2n
2n 8n-7
As in the previous case, we obtain the values of the generators u, v and hence the corresponding sides
of the Pythagorean triangle.
Case 1:
On evaluation, the values of generators satisfying system I are
9. Pythagorean Triangle with Area/ Perimeter as a special polygonal number
www.iosrjournals.org 60 | Page
10 7,p n 2q n
Employing (2), the corresponding Pythagorean triangle is
2
( ) 40 28x n n n ,
2
( ) 96 140 49y n n n ,
2
( ) 104 140 49z n n n
Examples:
n x y z A P
1 12 5 13 30 30
2 104 153 185 7956 442
3 276 493 565 68034 1334
4 528 1025 1153 270600 2706
5 860 1749 1949 752070 4558
Properties:
1)
2
60, 11 0nx t n
2) 2
46,2 26 7n nn y x Rh t n
3) 26,18 141 190 0n nz y x z t g
Case 2:
On evaluation, the values of generators satisfying system I are
10 7,p n 2q n
Employing (2), the corresponding Pythagorean triangle is
2
( ) 160 252 98x n n n ,
2
( ) 36 28y n n n ,
2
( ) 164 252 98z n n n
Examples:
n x y z A P
1 6 8 10 24 24
2 234 88 250 10296 572
3 782 240 818 93840 1840
4 1650 464 1714 382800 3828
5 2838 760 2938 1078440 6536
Properties:
1)
23, 11,
2 1
1
2
n n
z x n
ct t
2) 50,5 2 76 4 169n nx y z g t
3) 17, 3,4 1 2 80 174 0n n nx y n t t g
Pattern 9:
Under our assumption
19,n
A
t
P
leads to the equation
19 17q p q n n
The above equation is equivalent to the following two systems I and II respectively
p-q Q
19n-17 N
n 19n-17
As in the previous case, we obtain the values of the generators u, v and hence the corresponding sides
of the Pythagorean triangle.
Case 1:
On evaluation, the values of generators satisfying system I are
20 17,p n q n
Employing (2), the corresponding Pythagorean triangle is
10. Pythagorean Triangle with Area/ Perimeter as a special polygonal number
www.iosrjournals.org 61 | Page
2
( ) 40 34x n n n ,
2
( ) 399 680 289y n n n ,
2
( ) 410 680 289z n n n
Examples:
n x y z A P
1 6 8 10 24 24
2 92 525 533 24150 1150
3 258 1840 1858 237360 3956
4 504 3953 3958 996156 8442
5 830 6864 6914 2848560 14608
Properties:
1) 2 22 3n
n nz y jal ja
2) 42,2 0 mod4nx t
3) 3, 1 3,2 1 2 2 0n n nz y n t ct g
Case 2:
On evaluation, the values of generators satisfying system I are
20 17,p n 19 17q n
Employing (2), the corresponding Pythagorean triangle is
2
( ) 760 1326 578x n n n ,
2
( ) 39 34y n n n ,
2
( ) 761 1326 578z n n n
Examples:
n x y z A P
1 12 5 13 30 30
2 966 88 970 42504 2024
3 3440 249 3449 428280 7138
4 7434 488 7450 1813896 15372
5 12948 805 12973 5211570 26726
Properties:
1) n2 28 l 11 39n
ny car ky
2) 21,20 2 274 852 0n ny z t g
3) 39 0 mod34z x y
Pattern 10:
Under our assumption
20,n
A
t
P
leads to the equation
2 5 4q p q n n
The above equation is equivalent to the following two systems I and II respectively
p-q Q
5n-4 2n
2n 5n-4
As in the previous case, we obtain the values of the generators u, v and hence the corresponding sides
of the Pythagorean triangle.
Case 1:
On evaluation, the values of generators satisfying system I are
7 4,p n 2q n
Employing (2), the corresponding Pythagorean triangle is
2
( ) 28 16x n n n ,
2
( ) 45 56 16y n n n ,
2
( ) 53 56 16z n n n
11. Pythagorean Triangle with Area/ Perimeter as a special polygonal number
www.iosrjournals.org 62 | Page
Examples:
n x y z A P
1 12 5 13 30 30
2 80 84 116 3360 280
3 204 253 325 25806 782
4 384 512 640 98304 1500
5 620 861 1061 266910 2542
Properties:
1) 2
6 5
66,
245 42n nn
z y x cp t p
2) 54,3 2 32 mod55ny x z t
3)
3, 1 17,
2 1 49 28n
n n
x z y n g
t t
is a nasty number
Case 2:
On evaluation, the values of generators satisfying system II are
7 4,p n 5 4q n
Employing (2), the corresponding Pythagorean triangle is
2
( ) 70 96 32x n n n ,
2
( ) 24 16y n n n ,
2
( ) 74 96 32z n n n
Examples:
n x y z A P
1 6 8 10 24 24
2 120 64 136 3840 320
3 374 168 410 31416 952
4 768 320 832 122880 1920
5 1302 520 1402 338520 3224
Properties:
1) 6 48 16nx z y g
2) 3,2 12 nz x t
3) 4,3 31 mod50nz y ct
III. Conclusion
One may search for other patterns of Pythagorean triangles under consideration.
References
[1]. Albert H.Beiler, Recreations in the Theory of Numbers, (Dover Publications, New York, 1963).
[2]. Bhatia B.L., and Supriya Mohanty, Nasty numbers and their characterizations, (Mathematical Education, P.34-37, July – Sep
1985).
[3]. Dickson L.E., History of the Theory of number, (Chelesa publishing Company, New York, Vol II, 1952).
[4]. Malik S.B., Basic Number theory, (Vikas Publishing house pvt Ltd., New Delhi, 1998).
[5]. Mordell L.J., Diophantine equations, (Academic press, New York, 1969).
[6]. Ivan Niven, Zuckermann, Herbert.S, and Montgomery, Hugh.L, An introduction to the Theory of Numbers, (John Wiley and Sons,
Inc, New York, 2004).
[7]. Gopalan M.A., and Devibala.S., Pythagorean Triangle: A Tressure house, proceeding of the KMA national seminar on Algebra,
Number theory and applications to coding and Cryptanalysis, Little Flower College, Guruvayur, 2004, Pp.16-18.
[8]. Gopalan M.A., and Anbuselvi.R., A Special Pythagorean Triangle, Acta Ciencia Indica, VolXXXIM, No.1, 2005, Pp.53.
[9]. Gopalan M.A., and Devibala.S., On a Pythagorean Triangle Problem, Acta Ciencia indica, Vol.XXXIIM, No.4, 2006, Pp.1451.
[10]. Gopalan M.A., and Gnanam.A, A Special Pythagorean Triangle, Acta Ciencia Indica, VolXXXIII M, No.4, 2007, Pp. 1435.
[11]. Gopalan M.A., and Leelavathi.S., Pythagorean triangle with 2 Area/Perimeter as a cubic integer, Bulletin of Pure and Applied
Sciences, Vol.26E, No.2, 2007, Pp.197-200.
[12]. Gopalan M.A., and Sriram.S., Pythagorean triangle with Area/ Perimeter as difference of two squares, Impact journal of Science
and Technology, Vol.2, No.3, 2008, Pp.159-167.
[13]. Gopalan M.A., and Janaki G., Pythagorean trainagle with Area/Perimeter as a special polygonal number, Bulletin of Pure and
Applied Sciences, Vol.27E , No.2, 2008, Pp. 393-402.
[14]. Gopalan M.A., and Leelavathi S., Pythagorean triangle with Area/Perimeter as a Square integer, International journal of
Mathematics, Computer Sciences and Information Technology, Vol.1, No.2, July- Dec, 2008, Pp.199-204.
[15]. Gopalan M.A., and Vijayasankar.A., Observations on a Pythagorean problem, Acta Ciencia Indica, Vol-XXXVIM, No.4, 2010, Pp.
517.