This document summarizes research on q-analogues of classical numerical methods for finding solutions to algebraic and transcendental equations. It discusses how classical methods like Newton's method can fail under certain conditions, such as when the derivative is zero at the root or an inappropriate starting point is chosen. The document then proposes q-analogues of classical methods and discusses how q-methods may perform better than classical approaches in some cases where the classical methods fail. It provides background on the history and development of research on q-functions and hypergeometric series.
The Existence of Approximate Solutions for Nonlinear Volterra Type Random Int...ijtsrd
In this paper, we prove the existence of solutions as well as approximations of the solutions for the nonlinear Volterra type random integral equations. We rely our results on a newly constructed hybrid fixed point theorem of B. C. Dhage in partially ordered normed linear space. S. G. Shete | R. G. Metkar "The Existence of Approximate Solutions for Nonlinear Volterra Type Random Integral Equations" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29753.pdf Paper URL: https://www.ijtsrd.com/mathemetics/applied-mathamatics/29753/the-existence-of-approximate-solutions-for-nonlinear-volterra-type-random-integral-equations/s-g-shete
This document discusses rational ergodicity properties of rank-one transformations. It proves that all rank-one transformations are subsequence boundedly rationally ergodic, and that there exist rank-one transformations that are not weakly rationally ergodic. It also proves that rank-one transformations with a bounded sequence of cuts satisfy the stronger property of being boundedly rationally ergodic. The document provides background on rational ergodicity, rank-one transformations, and cutting and stacking constructions.
The document discusses types of relations. It defines empty relation, universal relation, reflexive relation, symmetric relation and transitive relation. An equivalence relation is a relation that is reflexive, symmetric and transitive. An equivalence relation partitions a set into mutually exclusive and exhaustive equivalence classes. Elements within an equivalence class are related to each other under the relation, while elements of different classes are not related. Examples of equivalence relations and their equivalence classes are provided.
Application of smooth transition autoregressive (star) models for exchange rateAlexander Decker
This document discusses applying Smooth Transition Autoregressive (STAR) models to analyze exchange rate data. Specifically, it evaluates the suitability of Logistic STAR (LSTAR) and Exponential STAR (ESTAR) models. The document outlines the methodology for testing whether exchange rate data exhibits linear or nonlinear properties. It describes testing procedures that involve estimating an auxiliary regression model based on a Taylor series expansion to detect nonlinear behavior. The study applies these LSTAR and ESTAR models to exchange rate data to determine which model provides a better fit and explanation of deviations from the mean exchange rate. The document concludes that an ESTAR model provides the best adjustment for the analyzed exchange rate data series.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
(1) The document discusses relations and functions in mathematics. It defines different types of relations such as empty relation, universal relation, equivalence relation, reflexive relation, symmetric relation and transitive relation. (2) It provides examples to illustrate these relations and checks whether given relations satisfy the properties. (3) The document also discusses that an equivalence relation partitions a set into mutually exclusive equivalence classes.
The Buckingham Pi Theorem provides a theoretical basis for dimensional analysis by expressing physical relationships as dimensionless pi groups. It states that for n dimensional variables related by k fundamental dimensions, there will be k primary variables and n - k dimensionless pi groups that the relationship can be expressed in terms of. This more compact representation using independent pi groups allows experimental data to be non-dimensionalized and compared more easily. The theorem is applied by defining the problem variables, expressing them in terms of fundamental dimensions, determining the number of pi groups, forming the independent dimensionless groups, and comparing the results to experimental data.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
The Existence of Approximate Solutions for Nonlinear Volterra Type Random Int...ijtsrd
In this paper, we prove the existence of solutions as well as approximations of the solutions for the nonlinear Volterra type random integral equations. We rely our results on a newly constructed hybrid fixed point theorem of B. C. Dhage in partially ordered normed linear space. S. G. Shete | R. G. Metkar "The Existence of Approximate Solutions for Nonlinear Volterra Type Random Integral Equations" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29753.pdf Paper URL: https://www.ijtsrd.com/mathemetics/applied-mathamatics/29753/the-existence-of-approximate-solutions-for-nonlinear-volterra-type-random-integral-equations/s-g-shete
This document discusses rational ergodicity properties of rank-one transformations. It proves that all rank-one transformations are subsequence boundedly rationally ergodic, and that there exist rank-one transformations that are not weakly rationally ergodic. It also proves that rank-one transformations with a bounded sequence of cuts satisfy the stronger property of being boundedly rationally ergodic. The document provides background on rational ergodicity, rank-one transformations, and cutting and stacking constructions.
The document discusses types of relations. It defines empty relation, universal relation, reflexive relation, symmetric relation and transitive relation. An equivalence relation is a relation that is reflexive, symmetric and transitive. An equivalence relation partitions a set into mutually exclusive and exhaustive equivalence classes. Elements within an equivalence class are related to each other under the relation, while elements of different classes are not related. Examples of equivalence relations and their equivalence classes are provided.
Application of smooth transition autoregressive (star) models for exchange rateAlexander Decker
This document discusses applying Smooth Transition Autoregressive (STAR) models to analyze exchange rate data. Specifically, it evaluates the suitability of Logistic STAR (LSTAR) and Exponential STAR (ESTAR) models. The document outlines the methodology for testing whether exchange rate data exhibits linear or nonlinear properties. It describes testing procedures that involve estimating an auxiliary regression model based on a Taylor series expansion to detect nonlinear behavior. The study applies these LSTAR and ESTAR models to exchange rate data to determine which model provides a better fit and explanation of deviations from the mean exchange rate. The document concludes that an ESTAR model provides the best adjustment for the analyzed exchange rate data series.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
(1) The document discusses relations and functions in mathematics. It defines different types of relations such as empty relation, universal relation, equivalence relation, reflexive relation, symmetric relation and transitive relation. (2) It provides examples to illustrate these relations and checks whether given relations satisfy the properties. (3) The document also discusses that an equivalence relation partitions a set into mutually exclusive equivalence classes.
The Buckingham Pi Theorem provides a theoretical basis for dimensional analysis by expressing physical relationships as dimensionless pi groups. It states that for n dimensional variables related by k fundamental dimensions, there will be k primary variables and n - k dimensionless pi groups that the relationship can be expressed in terms of. This more compact representation using independent pi groups allows experimental data to be non-dimensionalized and compared more easily. The theorem is applied by defining the problem variables, expressing them in terms of fundamental dimensions, determining the number of pi groups, forming the independent dimensionless groups, and comparing the results to experimental data.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
The document introduces the concept of generalized Laplace-finite Mellin transform in the distributional sense. It defines the testing function space used and proves that the Laplace-finite Mellin transform space is a Frechet space. Some of its topological properties are also obtained. In particular, it proves that the transform space is complete and is a subspace of the space of infinitely differentiable functions. The generalized transform extends the Laplace-finite Mellin transform into the distributional sense.
The document provides an introduction to calculus concepts including:
- Sets can represent collections of objects and are denoted using curly brackets. There are five regular solids that follow the Euler formula relating the number of faces, vertices and edges of each solid.
- The preface outlines the main purposes and organization of the two-volume calculus text, which includes fundamental concepts, applications, proofs, and multiple approaches.
- Volume I contains 5 chapters covering sets, functions, graphs, limits, differential calculus, integral calculus, sequences, summations, and applications of calculus.
A General Method for Estimating a Linear Structural Equation System
The substantially upgraded new version marks the golden jubilee of a seminal development in the history of Structure Equation Modeling (SEM). A little over a half century ago Professor Karl Jöreskog published a monograph in the Educational Testing Service (ETS) Research Bulletin series entitled A General Method for Estimating a Linear Structural Equation System, along with the LISREL software program.
祺荃企業有限公司 您可以信賴的軟體供應商
國內外原版軟體代理及經銷 | 教育訓練 | 軟體購買諮詢 | Devs Paradise | 線上商店(Store)
Cheer Chain Enterprise Co., Ltd. distributes and sells software with the aim of offering clients guidance when choosing software, as well as technical support !!!
Distribution of Software | Training Courses | Consulting Services
This document is a curriculum vitae that provides biographical information about Hemant Kumar Nashine. It includes his education history, with degrees including a PhD in mathematics from 2007-2010. It also lists his employment history teaching mathematics at various universities in India from 2001-2015. Finally, it provides a bibliography of his 195 journal publications between 2004-2016, with several papers accepted or under review.
Multisets are very powerful and yet simple control mechanisms in regulated rewriting systems. In this paper, we review back the main results on the generative power of multiset controlled grammars introduced in recent research. It was proven that multiset controlled grammars are at least as powerful as additive valence grammars and at most as powerful as matrix grammars. In this paper, we mainly investigate the closure properties of multiset controlled grammars. We show that the family of languages generated by multiset controlled grammars is closed under operations union, concatenation, kleene-star, homomorphism and mirror image.
This document provides a summary of 18 new books available at the library. The books cover a wide range of topics including quality engineering, Zariski geometries, singularity theory, probability, graph theory, isoperimetric problems, number theory, non-Hermitian quantum mechanics, multiphysics modeling, quantum computation, biofuels, irrigation management, biomass combustion, concrete design, steel bridge design, signal analysis, and elliptic curves. Publication years of the books range from 2001 to 2011. Each entry provides the book title, author, a brief description, and call number.
In this article we present a brief history and some applications of semirings, the structure of compact monothetic c semirings. The classification of these semirings be based on known description of discrete cyclic semirings and compact monothetic semirings. Boris Tanana "Compact Monothetic C-semirings" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021, URL: https://www.ijtsrd.com/papers/ijtsrd38612.pdf Paper Url: https://www.ijtsrd.com/mathemetics/algebra/38612/compact-monothetic-csemirings/boris-tanana
This document discusses relations and various types of relations. It begins by defining what a relation is as a subset of the Cartesian product of two sets and provides examples of relations. It then discusses the domain and range of relations and inverse relations. The document outlines several types of relations including reflexive, irreflexive, symmetric, and transitive relations and provides examples of each. It concludes by discussing the objectives of understanding different types of relations and their properties.
Matematika terapan week 4. fungsi dan relasi Hardini_HD
This document introduces the topic of relations and functions in mathematics. It defines what a relation is as a subset of the Cartesian product of two sets. It provides examples of different ways to represent relations visually, including arrow diagrams, tables, matrices, and directed graphs. It also defines inverse relations and describes how to compose two relations. The objectives are to understand these core concepts related to relations between sets as a foundation for further topics in the class.
DOWNLOADS GATE Syllabus - Dips Academy: Regenerating MathematicsDips Academy
content="DIPS Academy is one of the best institute of Mathematics preperation for Advanced Mathematics for the exams like GATE Exam, JRF Exam, NET Exam, IAS Exam, IFS Exam, PCS Exam, ISI Exam, JNU Exam, DRDO Exam, NBHM Exam, JEST Exam, TIFR Exam, IISC Bangalore, AAI Exam, JAM Exam
The document describes MAT 111: Calculus 1, a course the author took during their freshman year at Bethel College. Key topics covered in the class included functions, derivatives, differentials, concavity, and points of inflection. Though the author did not know it at the time, these concepts would prove important in their later engineering courses at Texas Tech. The main focus of the course was understanding what derivatives are and how they measure the rate of change of a function. For example, the derivative of y=2x is 2, while the derivative of y=x^2 is 2x. Integrals are the opposite of derivatives and can be used to find the area under a curve.
This document provides an overview of constraint satisfaction problems (CSPs). It defines a CSP as a problem where variables must be assigned values from their domains to satisfy constraints. Examples of CSPs include the n-queens puzzle, map coloring, Boolean satisfiability, and cryptarithmetic problems. A CSP is represented as a constraint graph with nodes as variables and edges as binary constraints. The goal is to assign values to each variable to satisfy all constraints.
This document provides definitions and concepts related to logic, languages, structures, and the compactness theorem. It defines logical symbols and objects for propositional and first-order logic. A first-order language consists of function symbols, relation symbols, and constant symbols. A structure assigns interpretations to these symbols. The compactness theorem states that a theory is satisfiable if and only if every finite subset of the theory is satisfiable.
This document provides an introduction to Latent Semantic Analysis (LSA) and Probabilistic Latent Semantic Analysis (PLSA). It discusses some challenges with traditional information retrieval based on lexical matching. It then introduces LSA and PLSA as statistical approaches to address these challenges by discovering the latent semantic structure in word usage. The key aspects of LSA include using singular value decomposition to reduce the dimensionality of a term-document matrix. PLSA builds upon LSA by introducing a probabilistic model with a latent class variable to represent topics. The document contrasts the objective functions and interpretations of the reduced dimensional spaces between LSA and PLSA.
The document provides an overview of time series econometrics concepts including:
1) Time series econometrics analyzes the dynamic structure and interrelationships over time in economic data. It examines stationary and non-stationary stochastic processes.
2) A time series is stationary if its mean, variance, and autocovariance remain constant over time. A random walk process is a type of non-stationary process where the variable fluctuates around a stochastic trend.
3) The document discusses key time series econometrics models and techniques including unit root tests, vector autoregressive models, causality tests, cointegration, and error correction models.
The document discusses propositional logic as a knowledge representation language. It defines key concepts in propositional logic including: syntax, semantics, validity, satisfiability, interpretation, models, and entailment. It explains that propositional logic uses symbols to represent facts about the world and connectives to combine symbols into sentences. Sentences can then be evaluated based on the truth values assigned to symbols to determine if the overall sentence is true or false. Propositional logic allows new sentences to be deduced from existing sentences through inference rules while maintaining logical validity.
The document discusses using the Perrón method to examine solutions to the Dirichlet problem for harmonic functions of a bounded domain in the complex plane. It will discuss properties of harmonic functions like the mean-value property, Poisson integral formula and Harnack's principle, which will lead to the topic of subharmonic functions. With an understanding of these properties and subharmonic functions, the document will describe the Perrón method and how it can be used to determine whether solutions to the Dirichlet problem exist.
This paper gives a rather general review of the L1 norm algorithms. The chronology and historical development of the L1 norm estimation theory for the period of 1632-1928 will be surveyed and the algorithms belonging to the after 1928 period will be categorized into three main classes of direct descent, simplex type, and other algorithms.
This document provides an overview of functions and continuity. It begins with essential questions about determining if functions are one-to-one and/or onto, and determining if functions are discrete or continuous. The document then defines key vocabulary terms related to functions, including one-to-one functions, onto functions, discrete relations, continuous relations, and more. It provides examples to demonstrate these concepts, such as evaluating functions, graphing equations, and determining if a relation represents a function.
1) A single-phase matrix converter topology is presented that can synthesize a lower or higher DC output voltage from a given AC supply voltage. It uses an active pulse width modulation technique to maintain a continuous, sinusoidal input current that is in phase with the supply voltage, improving the input power factor.
2) Conventional rectifiers draw discontinuous current with high harmonics, resulting in poor power quality. The proposed single-phase matrix converter acting as a rectifier with active PWM can suppress harmonic current drawn by the rectifier load.
3) Simulation results show that for boost and buck rectification using the proposed single-phase matrix converter with active PWM technique, the supply current is sinusoidal and in phase
This document presents the design and analysis of a microstrip patch antenna for triple band applications in digital communication systems. The antenna is designed to operate at 1.5 GHz, 2.4 GHz, and 5.5 GHz bands. It consists of a rectangular patch fed by a microstrip line with two additional arms of different lengths acting as resonators. Simulation results show the antenna achieves impedance matching across bandwidths of 700 MHz, 800 MHz, and 1 GHz at the three frequencies. It has an omnidirectional radiation pattern and gain between 5-6 dBi. The compact triple band design reduces the antenna size by 67% compared to a conventional patch antenna.
The document introduces the concept of generalized Laplace-finite Mellin transform in the distributional sense. It defines the testing function space used and proves that the Laplace-finite Mellin transform space is a Frechet space. Some of its topological properties are also obtained. In particular, it proves that the transform space is complete and is a subspace of the space of infinitely differentiable functions. The generalized transform extends the Laplace-finite Mellin transform into the distributional sense.
The document provides an introduction to calculus concepts including:
- Sets can represent collections of objects and are denoted using curly brackets. There are five regular solids that follow the Euler formula relating the number of faces, vertices and edges of each solid.
- The preface outlines the main purposes and organization of the two-volume calculus text, which includes fundamental concepts, applications, proofs, and multiple approaches.
- Volume I contains 5 chapters covering sets, functions, graphs, limits, differential calculus, integral calculus, sequences, summations, and applications of calculus.
A General Method for Estimating a Linear Structural Equation System
The substantially upgraded new version marks the golden jubilee of a seminal development in the history of Structure Equation Modeling (SEM). A little over a half century ago Professor Karl Jöreskog published a monograph in the Educational Testing Service (ETS) Research Bulletin series entitled A General Method for Estimating a Linear Structural Equation System, along with the LISREL software program.
祺荃企業有限公司 您可以信賴的軟體供應商
國內外原版軟體代理及經銷 | 教育訓練 | 軟體購買諮詢 | Devs Paradise | 線上商店(Store)
Cheer Chain Enterprise Co., Ltd. distributes and sells software with the aim of offering clients guidance when choosing software, as well as technical support !!!
Distribution of Software | Training Courses | Consulting Services
This document is a curriculum vitae that provides biographical information about Hemant Kumar Nashine. It includes his education history, with degrees including a PhD in mathematics from 2007-2010. It also lists his employment history teaching mathematics at various universities in India from 2001-2015. Finally, it provides a bibliography of his 195 journal publications between 2004-2016, with several papers accepted or under review.
Multisets are very powerful and yet simple control mechanisms in regulated rewriting systems. In this paper, we review back the main results on the generative power of multiset controlled grammars introduced in recent research. It was proven that multiset controlled grammars are at least as powerful as additive valence grammars and at most as powerful as matrix grammars. In this paper, we mainly investigate the closure properties of multiset controlled grammars. We show that the family of languages generated by multiset controlled grammars is closed under operations union, concatenation, kleene-star, homomorphism and mirror image.
This document provides a summary of 18 new books available at the library. The books cover a wide range of topics including quality engineering, Zariski geometries, singularity theory, probability, graph theory, isoperimetric problems, number theory, non-Hermitian quantum mechanics, multiphysics modeling, quantum computation, biofuels, irrigation management, biomass combustion, concrete design, steel bridge design, signal analysis, and elliptic curves. Publication years of the books range from 2001 to 2011. Each entry provides the book title, author, a brief description, and call number.
In this article we present a brief history and some applications of semirings, the structure of compact monothetic c semirings. The classification of these semirings be based on known description of discrete cyclic semirings and compact monothetic semirings. Boris Tanana "Compact Monothetic C-semirings" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021, URL: https://www.ijtsrd.com/papers/ijtsrd38612.pdf Paper Url: https://www.ijtsrd.com/mathemetics/algebra/38612/compact-monothetic-csemirings/boris-tanana
This document discusses relations and various types of relations. It begins by defining what a relation is as a subset of the Cartesian product of two sets and provides examples of relations. It then discusses the domain and range of relations and inverse relations. The document outlines several types of relations including reflexive, irreflexive, symmetric, and transitive relations and provides examples of each. It concludes by discussing the objectives of understanding different types of relations and their properties.
Matematika terapan week 4. fungsi dan relasi Hardini_HD
This document introduces the topic of relations and functions in mathematics. It defines what a relation is as a subset of the Cartesian product of two sets. It provides examples of different ways to represent relations visually, including arrow diagrams, tables, matrices, and directed graphs. It also defines inverse relations and describes how to compose two relations. The objectives are to understand these core concepts related to relations between sets as a foundation for further topics in the class.
DOWNLOADS GATE Syllabus - Dips Academy: Regenerating MathematicsDips Academy
content="DIPS Academy is one of the best institute of Mathematics preperation for Advanced Mathematics for the exams like GATE Exam, JRF Exam, NET Exam, IAS Exam, IFS Exam, PCS Exam, ISI Exam, JNU Exam, DRDO Exam, NBHM Exam, JEST Exam, TIFR Exam, IISC Bangalore, AAI Exam, JAM Exam
The document describes MAT 111: Calculus 1, a course the author took during their freshman year at Bethel College. Key topics covered in the class included functions, derivatives, differentials, concavity, and points of inflection. Though the author did not know it at the time, these concepts would prove important in their later engineering courses at Texas Tech. The main focus of the course was understanding what derivatives are and how they measure the rate of change of a function. For example, the derivative of y=2x is 2, while the derivative of y=x^2 is 2x. Integrals are the opposite of derivatives and can be used to find the area under a curve.
This document provides an overview of constraint satisfaction problems (CSPs). It defines a CSP as a problem where variables must be assigned values from their domains to satisfy constraints. Examples of CSPs include the n-queens puzzle, map coloring, Boolean satisfiability, and cryptarithmetic problems. A CSP is represented as a constraint graph with nodes as variables and edges as binary constraints. The goal is to assign values to each variable to satisfy all constraints.
This document provides definitions and concepts related to logic, languages, structures, and the compactness theorem. It defines logical symbols and objects for propositional and first-order logic. A first-order language consists of function symbols, relation symbols, and constant symbols. A structure assigns interpretations to these symbols. The compactness theorem states that a theory is satisfiable if and only if every finite subset of the theory is satisfiable.
This document provides an introduction to Latent Semantic Analysis (LSA) and Probabilistic Latent Semantic Analysis (PLSA). It discusses some challenges with traditional information retrieval based on lexical matching. It then introduces LSA and PLSA as statistical approaches to address these challenges by discovering the latent semantic structure in word usage. The key aspects of LSA include using singular value decomposition to reduce the dimensionality of a term-document matrix. PLSA builds upon LSA by introducing a probabilistic model with a latent class variable to represent topics. The document contrasts the objective functions and interpretations of the reduced dimensional spaces between LSA and PLSA.
The document provides an overview of time series econometrics concepts including:
1) Time series econometrics analyzes the dynamic structure and interrelationships over time in economic data. It examines stationary and non-stationary stochastic processes.
2) A time series is stationary if its mean, variance, and autocovariance remain constant over time. A random walk process is a type of non-stationary process where the variable fluctuates around a stochastic trend.
3) The document discusses key time series econometrics models and techniques including unit root tests, vector autoregressive models, causality tests, cointegration, and error correction models.
The document discusses propositional logic as a knowledge representation language. It defines key concepts in propositional logic including: syntax, semantics, validity, satisfiability, interpretation, models, and entailment. It explains that propositional logic uses symbols to represent facts about the world and connectives to combine symbols into sentences. Sentences can then be evaluated based on the truth values assigned to symbols to determine if the overall sentence is true or false. Propositional logic allows new sentences to be deduced from existing sentences through inference rules while maintaining logical validity.
The document discusses using the Perrón method to examine solutions to the Dirichlet problem for harmonic functions of a bounded domain in the complex plane. It will discuss properties of harmonic functions like the mean-value property, Poisson integral formula and Harnack's principle, which will lead to the topic of subharmonic functions. With an understanding of these properties and subharmonic functions, the document will describe the Perrón method and how it can be used to determine whether solutions to the Dirichlet problem exist.
This paper gives a rather general review of the L1 norm algorithms. The chronology and historical development of the L1 norm estimation theory for the period of 1632-1928 will be surveyed and the algorithms belonging to the after 1928 period will be categorized into three main classes of direct descent, simplex type, and other algorithms.
This document provides an overview of functions and continuity. It begins with essential questions about determining if functions are one-to-one and/or onto, and determining if functions are discrete or continuous. The document then defines key vocabulary terms related to functions, including one-to-one functions, onto functions, discrete relations, continuous relations, and more. It provides examples to demonstrate these concepts, such as evaluating functions, graphing equations, and determining if a relation represents a function.
1) A single-phase matrix converter topology is presented that can synthesize a lower or higher DC output voltage from a given AC supply voltage. It uses an active pulse width modulation technique to maintain a continuous, sinusoidal input current that is in phase with the supply voltage, improving the input power factor.
2) Conventional rectifiers draw discontinuous current with high harmonics, resulting in poor power quality. The proposed single-phase matrix converter acting as a rectifier with active PWM can suppress harmonic current drawn by the rectifier load.
3) Simulation results show that for boost and buck rectification using the proposed single-phase matrix converter with active PWM technique, the supply current is sinusoidal and in phase
This document presents the design and analysis of a microstrip patch antenna for triple band applications in digital communication systems. The antenna is designed to operate at 1.5 GHz, 2.4 GHz, and 5.5 GHz bands. It consists of a rectangular patch fed by a microstrip line with two additional arms of different lengths acting as resonators. Simulation results show the antenna achieves impedance matching across bandwidths of 700 MHz, 800 MHz, and 1 GHz at the three frequencies. It has an omnidirectional radiation pattern and gain between 5-6 dBi. The compact triple band design reduces the antenna size by 67% compared to a conventional patch antenna.
This paper presents a new approach called service-oriented traffic classification (SOTC) to reduce false positives and false negatives from network traffic classification. SOTC exploits information about previously discovered services in the network to classify traffic flows. The key advantages of SOTC are improved accuracy, limited computational requirements, reduced memory needs, and the ability to use any classifier in the initial service identification stage. Currently, most network classification algorithms fall into payload-based or behavioral categories, both of which have limitations like sensitivity to packet loss, difficulty in signature creation, inability to handle encryption, and high computational demands. This paper aims to address some of these limitations with the proposed SOTC approach.
This document discusses estimating hand muscle power using surface electromyography (EMG). EMG is used to evaluate electrical activity in muscles during activities to grade muscle strength. The research aims to develop an automatic method for grading muscle power. EMG is acquired from hand muscles during different activities and analyzed. Analysis includes root mean square, maximum amplitude, and burst time of EMG signals. Results from fifty young subjects show these metrics increase with greater muscle contraction and resistance, allowing muscle strength grading. The method could improve on manual muscle testing which depends on examiner judgment.
This document describes the development of an automatic single-axis solar tracking system using a servo motor mechanism. The system includes light dependent resistors (LDRs) to sense sunlight intensity, a microcontroller to send signals to the servo motor, and a mechanical structure to support the photovoltaic panel. The controller coding and servo mechanism were first simulated using PROTEUS 7 software. Then a prototype was developed including the mechanical design, active control components like the LDRs, microcontroller and servo motor, and a power system. Testing showed the tracking system improved average efficiency by 7.67% compared to a fixed panel.
This document provides a critique of Karl Marx's 1848 published work "The Communist Manifesto". It first provides biographical details on Marx and an overview of some of his major theories. It then analyzes the contents and focus of "The Communist Manifesto", noting that Marx predicted capitalism would collapse and inequality would disappear, but this did not occur. When communist revolutions succeeded, new regimes experienced economic hardships and totalitarianism emerged. The document argues that Marx was unaware that theories are not permanent and only valid for the societies that create them. It also notes that from an Islamic perspective, this life is temporary and the permanent life is in the hereafter, contrary to Marxism's interests.
This document provides a review of previous research on thermoelectric generators. It begins with an introduction to solar energy and thermoelectric generation technologies. It then discusses the basic components of a thermoelectric module, including the thermocouple. The document reviews three previous works: 1) fabrication and testing of flat plate solar thermoelectric generators for near-earth orbits, which achieved power outputs of 3-3.3 watts; 2) development of a high efficiency thermoelectric power generator using bismuth telluride that achieved a maximum efficiency of 1.85%; 3) parametric analysis and modeling of a solar heat pipe thermoelectric generator unit comprising a thermoelectric module, finned heat pipe,
Industry- Academia Collaboration through Cloud Computing: A Pathway for Susta...IOSR Journals
This document discusses industry-academia collaboration through cloud computing as a way to promote sustainable development in developing countries. It proposes a subscription-based cloud service platform that would allow universities and industries to access networked storage, computing resources, and conduct business transactions through those shared resources in a cost-effective way compared to traditional enterprise computing. The benefits mentioned include lower costs since institutions only pay for resources used, improved research capabilities through access to latest IT, and knowledge sharing between academia and industry. Previous models of collaboration are discussed, along with the need for collaboration to solve community problems and boost economies in developing nations.
This document describes an evaluation of natural draft wet cooling tower (NDWCT) performance using different packing fills in Iraq via artificial neural networks (ANN). Experimental tests were conducted on a NDWCT rig using honeycomb, splash, and trickle fills under varying conditions. An ANN with 10 hidden neurons was developed using the Levenberg-Marquardt backpropagation algorithm in MATLAB to predict the experimental results. The ANN predictions showed good agreement with the experiments based on correlation coefficients above 0.994, low root mean square errors below 6%, and mean relative errors below 8.4%.
This document compares the Perturb and Observe (P&O) and fuzzy logic controller (FLC) maximum power point tracking (MPPT) techniques for photovoltaic (PV) systems. It introduces PV cell modeling and characteristics, and discusses various MPPT techniques including P&O, incremental conductance method, and fuzzy logic control. The document aims to design an FLC-based MPPT controller and compare its performance to P&O control in tracking the maximum power point under changing environmental conditions for improved PV system efficiency.
This document presents a scalable method for image classification using sparse coding and dictionary learning. It proposes parallelizing the computation of image similarity for faster recognition. Specifically, it distributes the task of measuring similarity between images among multiple cores in a cluster. Experimental results on a face recognition dataset show nearly linear speedup when balancing the dataset size and number of nodes. Reconstruction errors are used as a similarity measure, with dictionaries learned using K-SVD for each image. The proposed parallel method distributes this similarity computation process to achieve faster image classification.
This document describes the development of a mini unmanned aerial vehicle (UAV) by students. Key points:
1. Students developed a prototype mini UAV using sensors, a small camera, ZigBee, and a microcontroller. This could be useful for applications like disaster response, weather monitoring, and surveys.
2. The document evaluates parameters like lift, drag, centrifugal force, endurance, and altitude that were achieved with the prototype. Temperature, humidity, and CO2 readings were also obtained using sensors.
3. Potential applications of the mini UAV include aerial photography, surveying, disaster monitoring, carrying small payloads, military, and detecting forest fires. The conclusion is that
This document describes a VSC-HVDC transmission system connecting a strong AC system to a weak island AC system. It investigates the AC filter requirements and designs controllers for the VSC using optimal techniques. The controllers designed are a active power controller for the rectifier, reactive power controller for the rectifier, DC voltage controller for the inverter, and AC voltage controller for the inverter. Simulations are performed in MATLAB to analyze the system's performance for load variations in the island system.
This document provides a review of optimization techniques for the wire electrical discharge machining (WEDM) process. It begins with an introduction to WEDM, describing the working principle and important process parameters like pulse width, time between pulses, servo reference voltage, and wire tension. The document then reviews literature on optimization methods that have been used to maximize material removal rate while minimizing electrode wear rate. Specifically, it discusses two studies that used Taguchi's design of experiments approach and desirability functions to optimize cutting conditions for different materials like minimizing wear rate and maximizing material removal rate in WEDM.
This document discusses the development of a web-based decision support system (DSS) for monitoring and predicting water quality parameters important for outdoor microalgae cultivation. The DSS allows users to monitor temperature and salinity in real-time and predicts future values of these parameters based on historical data using a K-nearest neighbors algorithm. Validation tests found the DSS could accurately forecast temperature and salinity 96.98% and 98.92% of the time respectively. The DSS notifies users when parameter levels rise or fall outside standard ranges and provides suggestions to maintain optimal water quality.
1) The document discusses various ways that artificial intelligence can be applied to different phases of the software engineering lifecycle, including requirements specification, design, coding, testing, and estimation.
2) It provides examples of using techniques like natural language processing to clarify requirements, knowledge graphs to manage requirements information, and computational intelligence for requirements prioritization.
3) For design, the document discusses using intelligent agents to recommend patterns and designs to satisfy quality attributes from requirements and assist with assigning responsibilities to components.
Potential Biodeteriogens of Indoor and Outdoor Surfaces (Coated With Gloss, E...IOSR Journals
Potential Biodeteriogens of indoor and outdoor surfaces (coated with gloss, emulsion and text coat paints) within the University of Port Harcourt, Nigeria were investigated. Potential Biodeteriogens implicated in deterioration of painted surfaces were bacteria, fungi, microalgae and cyanobacteria. The total heterotrophic bacteria counts and total fungal counts for outdoor and indoor painted surfaces ranged from 2.8 x 106 to 9.00 x 106 cfu/g paint scrape, 1.56 x 104 to 6.6 x 104 cfu/g paint scrape; and 1.1 x 106 to 6.5 x 106 cfu/g paint scrapes, 1.31 x 104 to 9.8 x 104 cfu/g paint scrapes respectively. The result of THB and TF count expressed graphically showed surfaces with increasing order of microbial load: Gloss paints < Text coat paint < Emulsion paints. Predominant bacterial genera isolated from the surfaces include Bacillus (29.0%), Pseudomonas (22.6%), Proteus (19.4%), Serratia (16.1%), Citrobacter (6.5%), Enterobacter (3.2%) and Klebsiella (3.2%). Fungal genera isolated include: Alternaria, Aspergillus , Cladosporium , Fusarium ,Geotrichum , Gleosporium , Penicillum , Rhizopus , Saccharomyces and Stachybotrys . Fungi were the predominant biodeteriogens. Predominant microalgae isolated from the wet painted surfaces include Chorella , Characium , Closterium , Geminella , Oscillatoria , Totrogonnidium and Triceratium . Physicochemistry of various paint surfaces revealed the following: TOC (1.30 – 3.49%), Phosphate (0.39-8.82mg/100g), nitrate (4.64-187.58mg/100g), sulphate (99.78-285.00mg/100g), pH (8.55-9.59), oil and Grease (125.00-285.00mg/100g).Result showed that different consortia of biodeteriogens implicated in indoor and outdoor painted surfaces are dependent on the chemical compositions of the various paints, nature of the coating surfaces and physicochemical parameters influencing the microbial processes. Emulsion surfaces habour most potential biodeteriogens on their surfaces than the other surfaces. There were significant differences (P < 0.05) in the various potential biodeteriogens, categories of painted surfaces, indoor and outdoor surfaces.
This document characterizes and analyzes the use of rice husk ash as a pozzolanic material in concrete as a partial replacement for cement. Researchers conducted experiments replacing cement with rice husk ash at rates from 0-40% in concrete mixes. The rice husk ash was collected from rice mills in Lucknow, India and tested for its pozzolanic properties. Test results showed that compressive strengths were maintained with replacements of up to 10-15% rice husk ash and that rice husk ash can be considered an effective pozzolan. The study concluded that rice husk ash has potential as a supplementary cementitious material to reduce the cost of concrete while providing adequate strength and durability.
This document compares the main lobe and side lobes of the frequency response curves for different types of FIR filters designed using the Fourier Series Expansion Method. It analyzes low pass, high pass, and band pass FIR filters with sampling frequencies of 4000Hz, 8000Hz, 12000Hz, 16000Hz, and 20000Hz. The maximum magnitudes in the main lobe and side lobes are observed and compared for each case. The results show that as the sampling frequency increases, the response curves move closer to the ideal response curves with smaller deviations in the magnitudes of the different lobes.
This document provides an overview of digital image steganography and steganalysis. It discusses various image steganography techniques including least significant bit modification in the spatial domain, and algorithms like JSteg and F5 that operate in the transform domain. It also covers hybrid techniques like patchwork and spread spectrum. The document compares the techniques based on parameters like invisibility, bit rate, and robustness. Finally, it discusses steganalysis methods for detecting hidden information in images, including techniques based on higher-order image statistics.
In this paper, the underlying principles about the theory of relativity are briefly introduced and reviewed. The mathematical prerequisite needed for the understanding of general relativity and of Einstein field equations are discussed. Concepts such as the principle of least action will be included and its explanation using the Lagrange equations will be given. Where possible, the mathematical details and rigorous analysis of the subject has been given in order to ensure a more precise and thorough understanding of the theory of relativity. A brief mathematical analysis of how to derive the Einstein’s field’s equations from the Einstein-Hilbert action and the Schwarzschild solution was also given.
Minimality and Equicontinuity of a Sequence of Maps in Iterative Wayinventionjournals
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
Mathematical analysis is a branch of mathematics that studies concepts like differentiation, integration, limits, and infinite series. It evolved from calculus and can be applied to spaces with defined distances or nearness. Key areas include real analysis of real functions and sequences, complex analysis of functions of complex variables, and functional analysis which studies topological vector spaces. Measure theory assigns a size or number to subsets of a set, generalizing concepts like length, area and volume. Numerical analysis uses numerical approximations rather than symbolic manipulations to solve problems in mathematical analysis.
This document provides an overview of methods for solving inverse problems in mathematical physics. It discusses several types of inverse problems that arise for differential equations describing various physical phenomena. These include determining an unknown governing equation and its solution based on additional conditions. Inverse problems for elliptic, parabolic, hyperbolic, and kinetic equations are examined. Specific examples covered include inverse problems in potential theory, elasticity, heat transfer, fluid dynamics, and the Boltzmann equation. The document emphasizes that inverse problems are often ill-posed but can be addressed using regularization methods and incorporating additional structural information about the equations.
11.[36 49]solution of a subclass of lane emden differential equation by varia...Alexander Decker
This document describes applying He's variational iteration method to solve a subclass of Lane-Emden differential equations. The method constructs a sequence of correction functionals that generate successive approximations to the solution. It introduces a polynomial initial approximation satisfying the boundary conditions. The Lagrange multiplier is determined using variational theory. Estimates are established to prove the iterative sequence converges uniformly to the exact solution. The method is illustrated on some example problems and shown to produce exact polynomial solutions, demonstrating the effectiveness of the variational iteration method.
Causal set theory is an approach to quantum gravity that represents spacetime as a locally finite partially ordered set of points with causal relations. It is a minimalist approach that does not assume an underlying spacetime continuum. There are two main methods to reconstruct a manifold from a causal set: 1) extracting manifold properties like dimension from causal sets that can be embedded in a manifold, and 2) sprinkling points randomly into an existing manifold to produce an embedded causal set. To study dynamics, an action must be defined on causal sets that reproduces the Einstein-Hilbert action in the continuum limit. Several proposals have been made to define nonlocal operators on causal sets that approach the d'Alembertian operator in the limit. Overall causal set
This document discusses stochastic partial differential equations (SPDEs). It outlines several approaches that have been used to solve SPDEs, including methods based on diffusion processes, stochastic characteristic systems, direct methods from mathematical physics, and substitution of integral equations. It also discusses using backward stochastic differential equations to study SPDEs and introduces notation for the analysis of an Ito SDE with inverse time. The document is technical in nature and outlines the mathematical frameworks and equations involved in solving SPDEs through various probabilistic methods.
ON THE CATEGORY OF ORDERED TOPOLOGICAL MODULES OPTIMIZATION AND LAGRANGE’S PR...IJESM JOURNAL
A category is an algebraic structure made up of a collection of objects linked together by morphisms. As a foundation of mathematics, categories were created as a way of relating algebraic structures and systems of topological spaces In this paper we define a derivative using cones in the category of topological modules and use the Lagrange’s principle to obtain optimization results in the category.
Abstract algebra & its applications (1)drselvarani
This document provides information about a state level workshop on abstract algebra and its applications that was held on August 28, 2015 at Sri Sarada Niketan College for Women in Amaravathipudur, India. The workshop included a presentation by Dr. S. SelvaRani, the principal of the college, on the topic of abstract algebra and its applications. Abstract algebra is the study of algebraic structures like groups, rings, and fields. It has many applications in areas like number theory, geometry, physics, and more. Representation theory is also discussed as a branch of abstract algebra.
Abstract algebra & its applications (1)drselvarani
This document provides information about a state level workshop on abstract algebra and its applications that was held on August 28, 2015 at Sri Sarada Niketan College for Women in Amaravathipudur, India. The workshop included a presentation by Dr. S. SelvaRani, the principal of the college, on the topic of abstract algebra and its applications. Abstract algebra is the study of algebraic structures like groups, rings, and fields. It has many applications in areas like number theory, geometry, physics, and more. Representation theory is also discussed as an important branch of abstract algebra.
This is a journal concise version (without diagrams and figures) of the preprint arXiv:1308.4060.
Abstract: Polyadic systems and their representations are reviewed and a classification of general polyadic systems is presented. A new multiplace generalization of associativity preserving homomorphisms, a 'heteromorphism' which connects polyadic systems having unequal arities, is introduced via an explicit formula, together with related definitions for multiplace representations and multiactions. Concrete examples of matrix representations for some ternary groups are then reviewed. Ternary algebras and Hopf algebras are defined, and their properties are studied. At the end some ternary generalizations of quantum groups and the Yang-Baxter equation are presented.
Let f(x) =
and g(x) =
1 x
x
that fog is not defined.
19.
If f : A B is bijective, then write n(A) in terms of n(B).
20.
If f : A B is onto and n(A) = 5, n(B) = 3. Then write n(A).
SHORT ANSWER TYPE QUESTIONS (2 MARKS)
1.
Define reflexive, symmetric
A Stochastic Iteration Method for A Class of Monotone Variational Inequalitie...CSCJournals
We examined a general method for obtaining a solution to a class of monotone variational inequalities in Hilbert space. Let H be a real Hilbert space, and Let T : H -> H be a continuous linear monotone operator and K be a non empty closed convex subset of H. From an initial arbitrary point x0 ∈ K. We proposed and obtained iterative method that converges in norm to a solution of the class of monotone variational inequalities. A stochastic scheme {xn} is defined as follows: x(n+1) = xn - anF* (xn), n≥0, F*(xn), n ≥ 0 is a strong stochastic approximation of Txn - b, for all b (possible zero) ∈ H and an ∈ (0,1).
Abstract algebra is the study of algebraic structures like groups, rings, and fields. It emerged in the early 20th century to make algebra more rigorous and abstract. Key developments included the study of symmetry in polynomial equations, which led to the concepts of groups, and the algebraic investigation of quadratic and higher-degree equations, which produced the ideas of rings and ideals. Now abstract algebra is used throughout mathematics and in fields like physics, where group theory can simplify differential equations and describe system symmetries.
Numerical solution of eigenvalues and applications 2SamsonAjibola
This document provides an overview of eigenvalues and their applications. It discusses:
1) Eigenvalues arise in applications across science and engineering, including mechanics, control theory, and quantum mechanics. Numerical methods are used to solve increasingly large eigenvalue problems.
2) Common methods for small problems include the QR and power methods. For large, sparse problems, techniques like the Krylov subspace and Arnoldi methods are used to compute a few desired eigenvalues/eigenvectors.
3) The document outlines the structure of the thesis, which will investigate methods for finding eigenvalues like Krylov subspace, power, and QR. It will also explore applications in areas like biology, statistics, and engineering.
The document is a report submitted by three students on surface and volume integrals and linear systems in real world problems. It discusses line, surface, and volume integrals and defines linear systems. It provides examples of applying integrals in electrostatics, magnetism, and gravity. It also discusses applications of linear systems and integrals in areas like fluid dynamics, mass continuity, and conservation of momentum. The conclusion reiterates that linear systems can have zero, one, or infinite solutions depending on consistency and independence, and methods for solving systems like graphing, substitution, and addition/subtraction are introduced.
This document summarizes a research paper on chaotic group actions. It begins with an abstract discussing how group actions can be considered "chaotic" if they exhibit sensitive dependence on initial conditions and have a dense set of points with finite orbits. The paper then provides definitions and examples of chaotic group actions, discussing how the concept generalizes the definition of chaotic maps. It explores which groups can admit chaotic dynamics on topological spaces and which spaces admit chaotic group actions. Specifically, it shows a group has a chaotic action if and only if it is residually finite. It also constructs examples of chaotic actions and proves several theorems about when group actions are chaotic.
This document summarizes research on chaotic group actions. Key points:
1) The author defines a chaotic group action as one that is topologically transitive with a dense subset of points having finite orbits.
2) It is shown that a group G has a chaotic action if and only if G is residually finite.
3) Examples of chaotic group actions are constructed, including actions of subgroups and finite-index supergroups of residually finite groups.
4) The paper explores chaotic actions of topological semigroups and shows they exhibit sensitive dependence on initial conditions.
Regularity and complexity in dynamical systemsSpringer
This chapter discusses how variational methods have been used to analyze three classes of snakelike robots: 1) hyper-redundant manipulators guided by backbone curves, 2) flexible steerable needles, and 3) concentric tube continuum robots. Variational methods provide a means to determine optimal backbone curves for manipulators, generate optimal plans for needle steering, and model equilibrium conformations for concentric tube robots based on elastic mechanics principles. The chapter reviews how variational formulations using Euler-Lagrange and Euler-Poincare equations are applied in each case.
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. II (Mar-Apr. 2016), PP 60-68
www.iosrjournals.org
DOI: 10.9790/0661-1802026068 www.iosrjournals.org 60 | Page
Numerical Analogy of q-Function
Prashant Singh1
, Prof.P.K.Mishra2
1
(Department of Computer Science,Institute of Science,Banaras Hindu University,India)
2
(Department of Computer Science,Institute of Science,Banaras Hindu University,India)
Abstract : This paper is a collection of q analogue of various classical methods for finding solutions of
algebraic and transcendental equations. It also deals with comparing classical methods with q methods
proposed by us. We have discussed few problems where these methods are equivalent and also cases where q
method is better. We also provide a short explanation about the need of iterative methods in scientific and
engineering problems. We have introduced q analogues of some classical methods and discussed their merits
and demerits. We have presented the basic definitions and classification of iterative methods and discussed
some elementary concepts and definitions regarding roots and systems of nonlinear equations. The fundamental
concepts and classification of iterative methods and their significant features are also stated in this paper. We
have also used various techniques, which are being used by researchers to produce higher order iterative
methods such as functional approximation, sampling, composition, geometric approaches.
Keywords: q analogue , basic analogue , q method ,classical method
I. Introduction and Literature Survey
C.F.Gauss[1,11] started the theory of q hypergeometric series in 1812 and worked on it for more than
five decades.E.Heine[1,11] extended this theory and worked on it for more than three decades. Later on
F.H.Jackson[1,11,17,18,19] in the beginning of twentieth century started working on q function and proposed q-
differentiation and q-integration and worked on transformation of q-series and generalized function of Legendre
and Bessel. G.E.Andrews[11,51,52]contributed a lot on q theory and worked on q-mock theta function,problems
and prospects on basic hypergeometric series,q-analogue of Kummer’s Theorem and on Lost Notebook of
Ramanujan. G.E.Andrew[11,51,52] with R.Askey[1] worked on q extension of Beta Function. J.Dougall[1]
worked on Vondermonde’s Theorem. H.Exton[1] worked a lot on basic hypergeometric function and its
applications.T.M.MocRobert worked on integrals involving E Functions, Confluent Hypergeometric
Function,Gamma E Function,Fourier Series for E Function and basic multiplication formula. M.Rahman with
Nassarallah worked on q-Appells Function,q-Wilson polynomial,q-Projection Formulas.He also worked on
reproducing Kample and bilinear sums for q-Racatanad and q-Wilson polynomial. I Gessel with D.Stanton
[14,15]worked on family of q-Lagrange inversion formulas.T.M.MacRobert worked on integrals involving E
Functions and confluent hypergeometric series.D.Stanton[14,15]worked on partition of q series.Studies in the
nineteenth century included those of Ernst Kummer, and the basic characterization by Bernhard Riemann of the
F-function by means of the differential equation it satisfies. Riemann showed that the second-order differential
equation for F, examined in the complex plane, could be characterised by its three regular singularities: that
effectively the entire algorithmic side of the theory was a upshot of basic facts and the use of Möbius
transformations as a symmetry group.
A generalization, the q-series analogues, called the basic hypergeometric series, were given by Eduard
Heine[1,11] in the late nineteenth century. During the twentieth century this was a prolific area of combinatorial
mathematics, with many connections to other fields. There are plethora of new definitions of hypergeometric
series, by Aomoto, Israel Gelfand and others; and applications for example to the combinatorics of arranging a
number of hyperplanes in complex N-space (see arrangement of hyperplanes).
q series can be developed on[11] Riemannian symmetric spaces and semi-simple Lie groups. Their impact and
role can be understood through a special case: the hypergeometric series 2F1 is directly related to the Legendre
Polynomial and when used in the form of spherical harmonics, it expresses, in a certain sense, the symmetry
properties of the two-sphere or equivalently the rotations given by the Lie group SO(3) Concrete representations
are analogous to the Clebsch-Gordan. A number of hyper-geometric function[1,11] identities were exposed in
the nineteenth and twentieth centuries, One conventional[11] list of such identities is Bailey's list. It is at present
understood that there is a vast number of such identities, and several algorithms are now known to generate and
prove these identities. In a certain sense, the situation can be likened to using a computer to do addition and
multiplication; the actual value of the resulting number is in a sense less significant than the various patterns that
come out; and so it is with hypergeometric identities as well.
Among Indian researchers R.P.Agrawal[53,54,55,56,57] gave a lot to q function . He worked on
fractional q-derivative, q-integral, mock theta function, combitorial analysis, extension of Meijer’s G
2. Numerical Analogy of q-Function
DOI: 10.9790/0661-1802026068 www.iosrjournals.org 61 | Page
Function,Pade approximants,continued fractions and generalized basic hypergeometric function with
unconnected bases.W.A.Al-Salam [2,3] and A.Verma[2,3] worked on quadratic transformations of basic
series.N.A.Bhagirathi [38,39]worked on generalized q hypergeometric function and continued
fractions.V.K.Jain and M.Verma[58] worked on transformations of non termating basic hypergeometric
series,their contour integrals and applications to Rogers ramanujan’s identities.S.N. Singh worked on
transformation of abnormal basic hypergeometric functions, partial theorems, continued fraction and certain
summation formulae. K.N.srivastava and B.R.Bhonsle worked on orthogonal polynomials. H.M.Srivastava with
Karlsson worked on multiple Gaussians Hypergeometric series, polynomial expansion for functions of several
variables. S Ramanujan in his last working days worked on basic hypergeometric series.G.E.Andrews[11,51,52]
published an article on “The Lost Note Book of Ramanujan”. H.S.Shukla worked on certain transformation in
the field of basic hypergeometric function.A.Verma and V.K.Jain worked on summation formulas of q-
hypergeometric series, summation formulae for non terminating basic hypergeometric series,q analogue of a
transformation of Whipple and transformations between basic hypergeometric series on different bases and
identities of Rogers-Ramanujan Type.B.D.Sears worked on transformation theory of basic hypergeometric
functions.P.Rastogi worked on identities of Rogers Ramanujan type. A.Verma and M.Upadhyay worked on
transformations of product of basic bilateral series and its transformations. Generally speaking[1,11] in
particular in the areas of combitorics and special functions, a q-analog of a theorem, identity or expression is a
simplification involving a new parameter q that returns the novel theorem, identity or expression in the limit as q
→ 1 (this limit is often formal, as q is often discrete-valued). Typically, mathematicians are interested in q-
analogues that occur naturally, rather than in randomly contriving q-analogues of recognized results. The
primary q-analogue studied in detail is the q hypergeometric series, which was introduced in the nineteenth
century. q-analogs find applications in a number of areas, including the study of fractals and multi-fractal
measures, and expressions for the entropy of chaotic dynamical systems. The relationship to fractals and
dynamical systems[1,11] results from the fact that many fractal patterns have the symmetries of Fuchsian groups
in general and the modular group in particular. The connection passes through hyperbolic geometry and ergodic
theory, where the elliptic integrals and modular forms play a prominent role; the q-series themselves are closely
related to elliptic integrals. q-analogs also come into sight in the study of quantum groups and in q-deformed
super algebras. The connection here is alike, in that much of string theory is set in the language of Riemann
surfaces, ensuing in connections to elliptic curves, which in turn relate to q-series.
II. Failure of Classical Methods and our proposed q methods
Let us capture an example of Newton’s Method [60] for solving algebraic and transcendental problem
and the state where it fails. Newton’s method is assured to converge under certain circumstances. One well-liked
set of such conditions is this: if a function has a root and has a non-zero derivative at that root, and it is
continuously differentiable in some interval around that root, then there exist some neighborhood of the root so
that if we choose our preliminary point in that region, the iterations will converge to the given root. Conditions
where a classical method fails are when the derivative is zero at the root i.e.the function fails to be continuously
differentiable; and also when we have selected a starting point which is not apt, i.e. one that lies outside the
range of guaranteed convergence. Degenerate roots [61](those where the derivative is 0) are "uncommon" in
general. On the other hand, most functions are not continuous or differentiable at all. The choice of starting
point may be understandable if you have an idea about the rough location of the root, or it could be totally hit-
and-miss. There are other condition sets which may be more or less helpful; there is no all-encompassing way
that captures correctly when the method fails. Generally speaking, if our function is reasonably smooth
(differentiable) and we begin at a arbitrary location, function will most likely converge to some root. Some
times we may unfortunately select initial point that is stationary or lies in some short cycle.
III. q analogues of some iterative methods using single and double parameters
3.1 q-analogue of Newton Raphson Method
(1)
3.2 q-analogue of Newton Raphson Method having multiplicity
– , where m is multiplicity. (2)
3.3 q-analogue of Newton Raphson Method for multiple root
xk+1=xk ( )2
(3)
3. Numerical Analogy of q-Function
DOI: 10.9790/0661-1802026068 www.iosrjournals.org 62 | Page
3.4 q analogue of Euler[1,11,44] Method
It is cubically convergent method with efficiency index 31/3.
It requires three evaluations It is
obtained by considering the parabola x2
+ax+by+c=0 and imposing tangency conditions.
(4)
3.5 q analogue of Euler [1,11,44]Method using two parameters
(5)
3.6 q analogue of Halley[44] Method
(6)
Its efficiency index is also 31/3.
It requires three evaluations It is obtained by considering the
hyperbola axy+bx+c=0 and imposing tangency conditions and calculating next iterate.
3.7 q analogue of Halley[44] Method using two parameters
(7)
3.8 q analogue of Traub Steffensen Method
If the derivative of f(xk) is approximated by .Then we get
(8)
.This method has order of convergence 2 and efficiency index is 21/2 .
3.9 q analogue of method proposed by Homeir[40]
(9)
This method is of order 3.
3.10 q analogue of method proposed by Homeir[40] using two q parameters
(10)
(11)
This method is of order 3.
3.11 q analogue of method proposed by Kou[41,62,63]
(12)
(13)
This method is of order 3.
3.12 q analogue of method proposed by Kou[41,62,63] using two q parameters.
(14)
4. Numerical Analogy of q-Function
DOI: 10.9790/0661-1802026068 www.iosrjournals.org 63 | Page
(15)
This method is of order 3
3.13 q analogue of method proposed by Ozban[42]
(16)
(17)
This method is of order 3.
3.14 q analogue of method proposed by Ozban[42] using two parameters
(18)
(19)
This method is of order 3.
3.15 q analogue of method by Weerakoon[43] and Fernando[43]
(20)
(21)
This method is of order 3.
3.16 q analogue of method by Weerakoon[43] and Fernando[43]
(22)
(23)
This method is of order 3.
3.17 q analogue of method proposed by Bi Wu Ren [66] (Order 8)
(24)
(25)
(26)
3.18 q analogue of method proposed by Bi Wu Ren [66] using double parameter
(27)
(28)
(29)
3.19 q analogue of method proposed by Cordero-Torregrosa-Vassileva [67]
(30)
= (31)
(32)
5. Numerical Analogy of q-Function
DOI: 10.9790/0661-1802026068 www.iosrjournals.org 64 | Page
and (33)
3.20 q analogue of method proposed by Cordero-Torregrosa-Vassileva[67] using two parameters
(34)
= (35)
(36)
and (37)
3.21 q analogue of Thukral’s[65] Method
(38)
(39)
where (40)
3.22 q analogue of Thukral’s[65] Method using two parameters
(41)
(42)
where (43)
3.23 q analogue of method proposed by Liu-Wang[41,62,63,64]
(44)
= (45)
where (46)
3.24 q analogue of method proposed by Liu-Wang[41,62,63,64] using two parameters
6. Numerical Analogy of q-Function
DOI: 10.9790/0661-1802026068 www.iosrjournals.org 65 | Page
(47)
= (48)
where (49)
3.25 q analogue of method by Kou-Wang-Li[62,63]
(50)
= (51)
where,
(52)
3.26 q analogue of method by Kou-Wang-Li[62,63] with two parameters
(53)
= (54)
where ,
(55)
IV. Problems
Problem 1
=0
This function is not differentiable at x=2 and if we choose x0=2 Classical Newton Raphson Method
can not be applied on this problem but q analogue of Newton Raphson Iterative Method is applicable.
7. Numerical Analogy of q-Function
DOI: 10.9790/0661-1802026068 www.iosrjournals.org 66 | Page
x0 q f(x0) f(qx0) x1 q f(x1) f(qx1) x2
2 0.999 2.7182818 2.69266553 1.787769 0.999 1.91963 1.914404 1.131105
2 0.999999 2.7182818 2.71805016 1.976533 0.999999 2.568049 2.56804 1.432849
2 0.989 2.7182818 2.57503132 1.582534 0.989 1.36483 1.321015 1.040274
2 0.99 2.7182818 2.58473299 1.592916 0.99 1.391157 1.350822 1.043515
2 0.98 2.7182818 2.4950233 1.51298 0.98 1.192108 1.118805 1.02088
2 0.97 2.7182818 2.41543867 1.461448 0.97 1.067887 0.96446 1.008759
2 1.001 2.7182818 2.69811227 2.269543 1.001 2.527245 2.52767 -11.2261
2 1.01 2.7182818 2.63957183 2.690708 1.01 2.80673 2.836214 0.129279
f(x2) f(qx2) x3 f(qx3) f(x3) x4 f(x4) f(qx4) x5
0.330953 0.328578 0.284836 -1.25014 -1.24966 1.028571 0.11914 0.11705 0.969947
1.000197 1.000194 0.703346 -0.51168 -0.51168 0.979244 0.01963 0.019628 0.969441
0.14297 0.119668 0.13332 -1.50261 -1.50023 1.05498 0.173038 0.149299 0.970391
0.149585 0.128311 0.139067 -1.49313 -1.49086 1.053903 0.170832 0.149277 0.970378
0.103525 0.062251 0.098332 -1.56017 -1.55699 1.061658 0.186739 0.143278 0.970425
0.078992 0.018132 0.075917 -1.59681 -1.59314 1.066041 0.195745 0.130305 0.970378
-14.1551 -14.1664 3.580464 4.47567 4.465953 1.934963 2.396389 2.403667 1.297878
-1.5068 -1.5047 -12.302 -15.3608 -15.2371 2.860043 3.01337 3.053192 0.695774
Table 1: Calculation of x1,x2,x3,x4,x5 (q analogue of Newton Raphson Method) for different values of q
Problem 2
Proceeding in this way we will get the solution after five iterations i.e x=0.969426 is the solution.
Basic Analogue of Newton Raphson Method:
Let us solve one more problem f(x)= xex
-1
Let x0=1
f(1)= (e-1)
f(q)=qeq
-1
If we calculate x1 by Classical Newton Raphson Method we will get x1=0.6839397 and
f(x1)=0.3553424
q x1
0.96 0.6743415
0.97 0.676762956
0.98 0.679169779
0.99 0.681562017
0.999999999999 0.683945343
1.01 0.686302938
1.09 0.704693177
0.95 0.671905363
0.9 0.659502787
0.8 0.633569653
0.7 0.606095896
0.6 0.577041065
0.5 0.546369238
0.4 0.514049563
0.3 0.480056757
0.2 0.444371563
0.1 0.40698115
Table 2: Calculation of x1 by iterative method(q-analogue of Numerical Methods for different values of q)
Value of x1 by Newton Raphson Method is 0.6839397.
f(x1) by Newton Raphson Method is 0.3553424
f(x1) by q analogue ot Newton Raphson Method at q=0.99 is 0.347423143
f(x1) by q method at q=0.97 is 0.33153.
We can observe that value of f(x1) using q method is closer to zero which means it is more accurate and
converges rapidly towards solution.
V. Conclusion
q-analogue of iterative methods for solving algebraic and transcendental equations gives the same
result as classical methods do but it converges more rapidly towards solution and errors associated with these
methods are comparatively lesser if value of q is chosen accordingly and this method is very appropriate for
solving transcendental equations .By using single parameter we have to choose value of q very close to one but
for double parameter we can get accurate result for most of the values of q1.Problems have been solved using
C++ Programming Language .Open methods (Newton, Halley etc.) differ from the bracketing methods
8. Numerical Analogy of q-Function
DOI: 10.9790/0661-1802026068 www.iosrjournals.org 67 | Page
(Bisection, Regula-Falsi etc.) in the sense that they use information at single point or multiple points. Although
it leads to quicker convergence, but it also includes a possibility that the solution may diverge. In general, the
convergence of open techniques is partially dependent on the quality of the initial guess and the nature of the
function. The closer an initial guess is to a true root, the more likely it is that the methods will be convergent.
However, for a given nonlinear equation, it is rather hard to choose an initial approximation near a root. In
general, any iterative scheme may be divergent if initial approximation is far from the root.
References
[1]. Exton, H. (1983)., q-Hypergeometric functions and applications Ellis Harwood Ltd., Halsted, John Wiley & Sons, New York
[2]. Al-Salam W.A. (1966) Proc. Amer. Math. Soc., 17, 616-621.
[3]. Al-Salam W.A. and Verma A. (1975) Pacific J. Math., 60, 1-9.
[4]. Annaby M.H. and Mansour Z.S. (2008) J. Math.Anal. Appl., 344, 472-483.
[5]. Atkinson K.E. (1989) An Introduction to Numerical Analysis, John Wiley & Sons, New York, USA.
[6]. Bouzeffour F. (2006) J. Nonlinear Math. Phys., 13(2), 293-301.
[7]. Burden R.L. and Faires J.D. (2005) Numerical Analysis, Thom-as Brooks/Cole, Belmont, CA.
[8]. Ernst T. (2003) J. Nonlinear Math. Phys., 10, 487-525.
[9]. Ernst T. (2002) A New Method for q-Calculus., A Doctorial Thesis., Uppsala University.
[10]. Fitouhi A., Brahim, Kamel B., Bettaibi N. (2005) J. Nonlinear Math. Phys., 12, 586-606.
[11]. Gasper G. and Rahman M. (2004) Basic Hypergeometric Se-ries., Cambridge University Press, Cambridge.
[12]. Hämmerlin G. and Hoffmann K.H. (2005) Numerical Methods., Cambridge University Press, Cambridge.
[13]. Ismail M.E.H. (2005) Classical and Quantum Orthogonal Poly-nomials in One Variable, Cambridge University Press, Cam-bridge.
[14]. Ismail M.E.H. and Stanton D. (2003) J. Comp. Appl. Math., 153, 259-272.
[15]. Ismail M.E.H. and Stanton D. (2003) J. Approx. Theory, 123, 125-146.
[16]. Jackson F.H. (1910) Quart. J. Pure and Appl. Math., 41, 193- 203.
[17]. Jackson F.H. (1909) Messenger Math., 39, 62-64.
[18]. Jackson F.H. (1908) Trans. Roy. Soc. Edinburgh, 46, 64-72.
[19]. Jackson F.H. (1904) Proc. Roy. Soc. London, 74, 64-72.
[20]. Kac V., Cheung P. (2002) Quantum Calculus. Springer-Verlag, New York.
[21]. Kajiwara K., Kimura K. (2003) J. Nonlinear Math. Phys., 10(1), 86-102.
[22]. Kim T. (2006) J. Nonlinear Math. Phys., 13, 315-322.
[23]. Lo’pez B., Marco J.M. and Parcet J. (2006) Proc. Amer. Math. Soc., 134(8), 2259-2270.
[24]. Marco J.M. and Parcet J. (2006) Trans. Amer Math. Soc., 358 (1), 183-214.
[25]. S. Ramanujan(1957), Notebooks, 2 Volumes, Tata Institute of Fundamental Research, Bombay.
[26]. Bailey W.N. (1950), On the basic bilateral hypergeometric series 2ψ2, Quart. J.Math. Oxford Ser. 2(1) 194 − 198.
[27]. Bailey W.N. (1952), A note on two of Ramanujan’s formulae, Quart. J. Math. 2(3), 29 − 31.
[28]. Bailey W.N. (1952), A further note on two of Ramanujan’s formulae, Quart. J.Math.(2),3, 158 − 160.
[29]. Berndt B. C. (1985),Ramanujans notebooks. Part I, Springer-Verlag, New York.
[30]. Berndt B. C. (1989),Ramanujans notebooks. Part II, Springer- Verlag, New York.
[31]. Berndt B. C. (1991),Ramanujans notebooks. Part III, Springer- Verlag, New York.
[32]. Berndt B. C. (1994),Ramanujans notebooks. Part IV, Springer- Verlag,New York.
[33]. Berndt B. C. (1998),Ramanujans notebooks. Part V, Springer- Verlag,New York.
[34]. Berndt B. C. and S.H. Chan(2007), Sixth order mock theta functions, Adv. Math.216, 771 − 786.
[35]. Berndt B. C., Chan S.H. B.P. Yeap , and A.J. Yee(2007),, A reciprocity theorem for certain q-series found in Ramanujans lost
notebook, Ramanujan J. 13, 27 − 37.
[36]. Berndt B. C. and Rankin R.A. (1995), Ramanujan: Letters and Commentary,American Mathematical Society, Providence, RI, 1995;
London Mathematical Society, London.
[37]. Berndt B.C. and Rankin R.A. (2001), Ramanujan: Essays and Surveys, American Mathematical Society, Providence, 2001; London
Mathematical Society,London.
[38]. Bhagirathi N. A. (1988),, On basic bilateral hypergeometric series and continued fractions, Math. Student, 56 135 − 141.
[39]. Bhagirathi N. A. (1988),, On certain investigations in q-series and continued fractions, Math. Student, 56, 158 − 170.
[40]. Homeier, H.H.H. (2003).A modified Newton method for root finding with cubic convergence.J.Comput. Appl. Math. 157: 227–230
[41]. Kou, J., Li, Y. and Wang, X. 2006. A modification of Newton method with third order convergence. Appl. Math. Comput.181:
1106–1111
[42]. Ozban, A.Y. (2004).Some new variants of Newton’s method.Appl. Math. Lett.17:677–682
[43]. Weerakoon, S. and Fernando, T.G.I. 2000. A variant of Newton’s method with accelerated third-order convergence. Appl. Math.
Lett.13: 87–93
[44]. Melman, A. (1997).Geometry and convergence of Euler’s and Halley’s methods. SIAM Rev. 39: 728–735
[45]. Davies, M. and Dawson, B. (1975). On the global convergence of Halley’s iteration formula. Numer.Math.24: 133–135
[46]. Traub, J.F. 1964. Iterative Methods for the Solution of Equations. Prentice-Hall, Englewood Cliffs
[47]. Johnson, L.W. and Riess, R.D. (1977). Numerical Analysis. Addison-Wesley, Reading.
[48]. W. HAHN, Uber Orthogonalpolynome, die q-Differenzengleichungen gen¨ ugen.¨ Mathematische Nachrichten 2, 1949, 4–34.
[49]. Askey, R. and Wilson, J(1997), “Some basic hypergeometric Polynomials” that generalize Jacobi polynomials” Men. Amer. Math.
Soc. 54, 319.
[50]. Watson, G.N. (1929)A new proof of Rogers-Ramanujan identities, J. London Math. Soc. 13, 4-9.
[51]. Andrews G.E. and Askey R.(1985), Classical orthogonal polynomials. In: Polynomes Orthogonaux et Applications (eds. C.
Brezinski et al.). Lecture Notes in Mathematics 1171, SpringerVerlag, New York, 1985, 36–62.
[52]. Andrews G.E. and Askey R.and Roy R.(1999), Special Functions. Encyclopedia of Mathematicsand Its Applications 71,
Cambridge University Press, Cambridge.
[53]. Agarwal, R.P.(1965): “An extension of Meijer’s G-function” proc. Nat. Inst. Sci (India), Vol (31) A 536-46.
[54]. Agarwal, R.P (1968): “Certain basic hypergeometric identities associated with mock theta functions”, Quart.J.Math. (Oxford)
20 , 121-128.
[55]. Agarwal, R.P(1976): “Fractional q-derivative and q-integrals and certain hypergeometric transformation”, Ganita, Vol. 27, 25-32.
9. Numerical Analogy of q-Function
DOI: 10.9790/0661-1802026068 www.iosrjournals.org 68 | Page
[56]. Agarwal, R.P.(1991):“Ramanujan’s last gift”, Math, Student, 58 , 121-150.
[57]. Agarwal, R.P :Generalized hypergeometric series and its applications to the theory of Combinatorial analysis and partition theory.
[58]. Verma, A. and Jain, V.K.(1981) , “Some summation formulae of Basic hyper geometric series”, Indian J. of Pure and applied Math.
11 (8), 1021-1038.
[59]. Dougall, J. (1907),,“On Vondermonde’s theorem and some more general expansions”, Proc. Edin. Math. Soc. 25, 114-132.
[60]. Singh Prashant, Mishra P.K. and Pathak R.S. (2013),q-Iterative Methods, IOSR Journal of Mathematics (IOSR-JM), Volume 8,
Issue 6 (Nov. – Dec. 2013), PP 01-06
[61]. Kendall E. Atkinson, An Introduction to Numerical Analysis, (1989) John Wiley & Sons, Inc, ISBN 0-471-62489-6.
[62]. Kou, J., (2007). The improvements of modified Newton’s method. Appl. Math. Comp. 189: 602–609 [117]
[63]. Kou, J. 2007. Some new sixth-order methods for solving non-linear equations. Appl. Math. Comput. 189: 647–651
[64]. Kou, J., Li, Y. and Wang, X. (2006). Efficient continuation Newton-like method for solving systems of non-linear equations. Appl.
Math. Comput. 174: 846–853
[65]. Thukral, R. (2008). Introduction to a Newton-type method for solving nonlinearequations. Appl. Math. Comp. 195: 663–668
[66]. Bi, W., Ren, H. and Wu, Q.( 2008). New family of seventh-order methods for nonlinear equations. Appl. Math. Comput. 203: 408–
412
[67]. Cordero, A., Torregrosa, J.R., Vassileva, M.P. (2011). A famliy of modified Ostrowski’s methods with optimal eighth order of
convergence. Appl. Math. Lett. 24:2082–2086