Professional Documents
Culture Documents
Proceedings of The National Seminar On Present Trends in Mathematics and Its Applications
Proceedings of The National Seminar On Present Trends in Mathematics and Its Applications
Proceedings of the
Invited Lectures
Survey Articles
Abstracts
Present Trends in
Mathematics and its
Applications
Editors:
Sponsored by UGC
All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any
means, without permission. Any person who does any unauthorized act in relation to this publication
may be liable to criminal prosecution and civil claims for damages.
Printed at
The Organizing Committee, Editors and the publisher of the proceedings of the “National Seminar on
Present Trends in Mathematics and its Applications” are not responsible for the statements made or
opinion expressed by the authors in the proceedings of this Conference. The Organizing committee and
the Editors do not hold any responsibility for any omissions or typographical errors or violation of any
existing copyright or other intellectual property rights of any person in any manner whatsoever.
This book is meant for educational and learning purposes. The author(s) of the papers in this book
has/have taken all reasonable care to ensure that the contents of the book do not violate any existing
copyright or other intellectual property rights of any person in any manner whatsoever. In the event the
author(s) has/have been unable to track any source and if any copyright has been inadvertently
infringed, please notify the publisher in writing for corrective action.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications
Contents Page i
Invited Talks
S.NO. Invited Speaker Title of the Lecture Page
Nos.
Prof. P. V. Arunachalam, Former Vice-
Chancellor, Dravidian University, Kuppam
1. 1-11
(Andhra Pradesh), Former President, Indian Fractional calculus
Mathematical Society.
Prof. L. Radha Krishna, UGC Centre for
Metamathematics in Teaching and
2. Advanced Studies, Bangalore University, 12-17
Research
Bangalore.
Prof. D.R.V. Prasad Rao, Department of
Mathematics, Sri Krishnadevaraya University, Computational Fluid Dynamics-A
3. Anantapur, Andhra Pradesh. Study of Convection in 18-40
Rectangular Cavity by finite
Element Technique.
Prof. Bhavanari Satyanarayana, Department of
4. Mathematics, Acharya Nagarjuna University, Dimension in Vector Spaces and 41-49
Nagarjuna University (Andhra Pradesh) Modules
Prof. S. Sreenadh, Department of Mathematics, Effect of Yield Stress, Elasticity
5. Sri Venkateswara University, Tirupathi (Andhra and Peristalsis on the Transport 50-57
Pradesh) Biofluids
Dr Syam Prasad Kuncham, Department of
6. Mathematics, Manipal University, Manipal-576 Fuzzy Ideals of Gamma Nearrings 58-61
104, Karnataka.
Dr. M. S. Dutt, Department of Mathematics and
Semisimple Hopf Algebras and
7. Statistics, University of Hyderabad, Andhra
their Orbits
62-65
Pradesh
Dr Babushri Srinivas Kedukodi, Department of
8. Mathematics, Manipal University, Manipal-576 Rough Sets 66-68
104, Karnataka.
Dr Nagaraju Dasari, Department of
Finite Dimension in Associative
9. Mathematics, HITS, Hisdustan University,
Rings
69-76
Padur, Chennai.
Prof. I. H. Nagaraja Rao, Sr. Professor,
On Some Results on Semi-
10. Department of Mathematics, GVP College for P
Complete Graphs
77-83
G Courses, Visakapatnam, Andhra Pradesh.
Page ii
Page iii
Students Presentation
Preface Page iv
This Proceedings contains the substance of invited lectures and contributed research
presentations delivered at the UGC Sponsored Two day National Seminar on Present Trends in
Mathematics and its Application, which was held in the Smt. G. S. College, Jaggaiahpet
(in association with the Department of Mathematics, Acharya Nagarjuna University), November
11-12, 2010.
The main object of the seminar is to bring together eminent researchers of various fields of
Mathematics like: Fluid Dynamics / Graph Theory / Fuzzy sets theory / Near-rings / Gamma
Near-rings / Rings & Modules, for exchange of ideas.
Most of the Research papers in this volume have been refereed. The editors express their
gratitude to all the Management and staff of Smt. S G College, colleagues; research Scholars,
students, who helped in many ways for its success.
The event certainly provides an opportunity for young researchers to get strengthen their
collaborative works of common interest.
The hospitality provided by the Organizers of the Seminar, will be greatly appreciated.
Finally, the editors would like to thank the Press and Electronic media, for their extensive
coverage of news.
Editors
Dr Satyanarayana Bhavanari
Proceedings of the National Seminar on Present Trends in Mathematics & its Applications,
SGS College, Jaggaiahpet, A.P., India, November 11-12,
11 12, 2010. (Editors: Dr Eswaraiah Setty
Sreeramula, Dr Satyanarayana Bhavanari and Dr Syam Prasad Kuncham)
Invited Lecture by
Prof.
f. P. V. Arunachalam,
Ex. Vice–Chancellor,
Chancellor,
Fractional Calculus
C Dravidian University,
Kuppam (Andhra Pradesh),
Former President, Indian
Mathematical Society.
Historical Introduction
Differentiation and integration are usually regarded as discrete operations, in the sense that we
differentiate or integrate a function once, twice, or any whole number of times. However, in
some circumstances it’s useful to evaluate a fractional derivative.. In a letter to L’Hospital in
1695, Leibniz raised the possibility of generalizing the operation of differentiation to non-non
integer orders, and L’Hospital asked what would be the result of half-differentiating
half differentiating x.
Leibniz replied “It leads to a paradox, fromfrom which one day useful consequences will be
drawn”. The paradoxical aspects are due to the fact that there are several different ways of
generalizing the differentiation operator to non-integer
non integer powers, leading to inequivalent results.
Pre-requisites
This can be written as a linear operator (and is known as the indefinite integral
operator,
or Volterra operator),
), which we will write here as J: so that.
(Note that for the rest of this post, we assume f(x) is sufficiently continuous and
integrable on the regions in question).
Proc.
c. of the National Seminar on Present Trends in Mathematics and its Applications 2
The answer is yes. We can reduce it to a single integral. Observe in the case of :
Treating this as a double integral, and considering the region of the tu plane over
which it is integrated, we can reverse the order of integration:
integ
As f(u) is a constant with respect to t,, we find that the inner integral is simply
, and we have:
Similarly, we have
,
Proc.
c. of the National Seminar on Present Trends in Mathematics and its Applications 3
which with reordering to make integration by u3 last, and then performing the u1 and
u2 integrals, we obtain (renaming u3 as u):
We can use mathematical induction to prove that this formula is true for all positive
integer n. First, the n=1
=1 case: we see it gives:
Now, we can take the derivative of our formula with respect to x, using the variable
limit form of the Leibniz integral rule:
rule
which is our formula’s value for . Thus our formula holds for
given , and so it holds for all integer n>0
>0 by induction.
can be performed for n>0 even if n is not an integer. Recall, however, that for positive
integer n, , where is the gamma function.. Thus, if we replace the
factorial in our formula with the corresponding gamma function, we obtain the
formula
,
which can be computed for n a positive real number. This is the basis of the Riemann-
Liouville differintegral,, the most often used differintegral (operator combining
differentiation and integration)
ation) in fractional calculus.
and the integration operator J. (Usually J is used instead of I to avoid confusion with
other I-like glyphs and identities).
identities
In this context the term powers refers to iterative application or composition, in the
same sense that f 2(x) = f(f(x)).
For example, one may ask the question of meaningfully interpreting
inte
Proc.
c. of the National Seminar on Present Trends in Mathematics and its Applications 5
for real-number
number values of a in such a way that when a takes an integer value n, the
usual power of n-fold − th power of J
fold differentiation is recovered for n > 0, and the −n
when n < 0.
There are various reasons for looking at this question. One is that in this way the
semigroup of powers Dn in the discrete variable n is seen inside a continuous
semigroup (one hopes) with parameter a which is a real number. Continuous
semigroups are prevalent in mathematics, and have an interesting theory. Notice here
that fraction is then a misnomer for the exponent, since it need not be rational,
rational but the
term fractional calculus has become traditional.
As far as the existence of such a theory is concerned, the foundations of the subject
were laid by Liouville in a paper from 1832. The fractional derivative of a function to
order a is often now defined by means of the Fourier or Mellin integral transforms.[1]
Heuristics
A fairly natural question to ask is whether there exists an operator H, or half-
derivative, such that
It turns out that there is such an operator, and indeed for any a > 0, there exists an
operator P such that
Proc.
c. of the National Seminar on Present Trends in Mathematics and its Applications 6
or to put it another way, the definition of can be extended to all real values of n.
To delve into a little detail, start with the Gamma function , which extends
factorials to non-integer
integer values. This is defined such that
Assuming a function f(x) that is defined where x > 0, form the definite integral from
0 to x. Call this
Simply using the Gamma function to remove the discrete nature of the factorial
function (recalling that , or equivalently )
gives us a natural candidate for fractional applications of
of the integral operator.
,
Proc.
c. of the National Seminar on Present Trends in Mathematics and its Applications 7
The half derivative (purple curve) of the function f(x) = x (blue curve) together with the
first derivative (red curve).
Which, after replacing the factorials with the Gamma function,, leads us to
Proc.
c. of the National Seminar on Present Trends in Mathematics and its Applications 8
derivative of x is
So, for example, the half-derivative
Laplace transform
We can also comee at the question via the Laplace transform.. Noting that
and
etc., we assert
For example
Proc.
c. of the National Seminar on Present Trends in Mathematics and its Applications 9
Laplace transforms "work" on relatively few functions, but they are often
oft useful for
solving fractional differential equations.
Riemann–Liouville
Liouville integral
The classical form of fractional calculus is given by the Riemann–Liouville
Liouville integral,
integral
essentially what has been described above. The theory for periodic functions, functions
therefore including the 'boundary condition' of repeating after a period, is the Weyl
differintegral.. It is defined on Fourier series,, and requires the constant Fourier
coefficient to vanish (so, applies to functions on the unit circle integrating to 0).
By contrast the Grünwald––Letnikov derivative starts with the derivative instead of the
integral.
Functional Calculus
alculus
In the context of functional analysis,
analysis functions f(D) more general than powers are
studied in the functional calculus of spectral theory. The theory of pseudo-differential
pseudo
operators alsoo allows one to consider powers of D.. The operators arising are examples
of singular integral operators;
operators; and the generalisation of the classical theory to higher
dimensions is called the theory of Riesz potentials.. So there are a number of
contemporary theories available, within which fractional calculus can be discussed.
See also Erdélyi-Kober
Kober operator,
operator important in special function theory.
Applications
Fractional Conservation of Mass
scale of heterogeneity and when the flux within the control volume is non-linear.
non In
the referenced paper,
per, the fractional conservation of mass equation for fluid flow is:
This equation has been shown useful for modeling contaminant flow in heterogenous
porous media [3][4][5]
WKB approximation
for
or the semiclassical approximation in one dimensional spatial system (x,t) the inverse
−1 2
of the potential V (x) inside the Hamiltonian H = p + V(x) is given by the half- half
References
• Applications, by Samko, S.; Kilbas,
Fractional Integrals and Derivatives: Theory and Applications,
A.A.; and Marichev, O. Hardcover: 1006 pages. Publisher: Taylor & Francis Books.
ISBN 2-88124-864-00
• Equations, by Kilbas, A. A.;
Theory and Applications of Fractional Differential Equations,
Srivastava, H. M.; and Trujillo, J. J. Amsterdam, Netherlands, Elsevier,
Els February
2006.ISBN0-444-5183251832-0
(http://www.elsevier.com/wps/find/b
http://www.elsevier.com/wps/find/bookdescription.cws_home/707212/description#d
ookdescription.cws_home/707212/description#d
escription)
• Equations by
An Introduction to the Fractional Calculus and Fractional Differential Equations,
Kenneth S. Miller, Bertram Ross (Editor). Hardcover: 384 pages. Publisher: John
Wiley & Sons; 1 edition (May 19, 1993).
1 ISBN 0-471-58884-9
• The Fractional Calculus; Theory and Applications of Differentiation and Integration
to Arbitrary Order (Mathematics in Science and Engineering, V), V) by Keith B.
Oldham, Jerome Spanier. Hardcover. Publisher: Academic Press; (November 1974).
ISBN 0-12-525550-00
• Fractional Differential Equations. An Introduction to Fractional Derivatives,
Fractional
ractional Differential Equations, Some Methods of Their Solution and Some of
Their Applications.,, (Mathematics in Science and Engineering, vol. 198), by Igor
Podlubny. Hardcover. Publisher: Academic Press; (October 1998) ISBN 0-12-
558840-2
• mechanics, by N. Laskin. Chaos Vol.10, pp.780-790
Fractals and quantum mechanics, pp.780 (2000).
(http://link.aip.org/link/?CHAOEH/10/780/1
http://link.aip.org/link/?CHAOEH/10/780/1)
• Mechanics, by A. Carpinteri (Editor),
Fractals and Fractional Calculus in Continuum Mechanics,
F. Mainardi (Editor). Paperback: 348 pages. Publisher: Springer-Verlag
Springer Telos;
(January 1998). ISBN 3-211-82913-X
3
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 11
Proceedings of the National Seminar on Present Trends in Mathematics & its Applications,
SGS College, Jaggaiahpet, A.P., India, November 11-12, 2010. (Editors: Dr Eswaraiah Setty
Sreeramula, Dr Satyanarayana Bhavanari and Dr Syam Prasad Kuncham)
Invited Lecture by
Metamathematics in Prof. L. Radha Krishna,
U.G.C. Centre for Advanced
Teaching and Research Studies, Department of
Mathematics, Bangalore
University, Bangalore-
560001.
Email: lrkwmr@gmail.com
1. Introduction
The three meanings of the prefix ‘meta’are the prepositions: ‘beyond’, ‘after’, and
‘behind’. Accordingly MM-I is devoted to the question of whether there is any
branch of knowledge, which is beyond mathematics. Main emphasis is on the role
of MM-II in teaching and research. Logical symbolism is the essence of MM-III.
2. Metamathematics – I
We consider the analogous topics metaphysics and metaengineering with examples,
where ‘meta’ refers to ‘beyond’. We explain the etymology of the word
‘engineering’ as ‘profiteering using geniuses. From the clause (in engineering) “A
rocket moves at the rate of 6000 miles per hour”, if we drop the words ‘A rocket
moves at the rate of’ the resulting phrase is “6000 miles per hour” which is a common
expression in physics. Consequently we observe that
This supports the view that ‘engineering is the realization of physics’. From the
phrase “6000 miles per hour”, if we drop the words ‘miles per hour’ (from physics)
we are left with the number “6000”. We generalize this situation as
3. Metamathematics – II
a. MM-II for teaching
We develop the theme ‘after mathematics’ in the sense how to appreciate and enjoy
mathematical results ‘after completing the calculations’ or ‘after proving a theorem’
in a class room. Usually teachers are in a hurry to complete the syllabus and ignore
the introspection of the relevance and charm of their class room performance. It is
here that metamathematics helps the teacher to grow into an inspiring professional.
x2 + y2 = 1 (ORDER)
Algebra abounds with ‘Order out of order’ circumstances. The axioms of group are
an instance of order (associativity, existence of unit element, existence of inverse). If
we combine them with another order (the axioms of a field) —in a certain way— we
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 14
get the axioms of yet another order — the famous algebraic structure vector
space. We present this situation as a MM-II:
Thus ‘order out of order’ opens the flood gates of research in algebra. It follows that
MM-II is an effective introspection for finding the secrets of the following structures
by analogy:
√2 = 1. 41421356237…
e = 2.7182818828…
π = 3.141592653… .
On the left hand side of the three equalities there is order, simple to
present. However on the right hand sides there is apparent chaos. This pattern is
‘chaos out of order’. Such results are rare and exciting.
[1] Shakuntala Devi and computer were given to multiply two 14 digit numbers and
Devi gave the product correctly well before the computer could announce the answer:
Here the left hand side and right handed side are both chaotic. No one will try to
remember the result. It is just ignored as it does not improve our knowledge.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 15
[2] In 1984 Rajan Mahadevan recited π to 31,940 decimal places on All India
Radio. It is an example of tremendous memory power of the brain. This feat is
ignored since it has no utility beyond 5 digits.
All theorems that are taught in the classes belong to this variety. We treasure them
and repeatedly teach them for generations. We mention three theorems and how they
bring in order out of obviously chaotic situations.
The word ‘any’ suggests the chaos —the uncountable infinity of choices of a, b, c.
The order is represented by the one formula (3.1). The teachers to be effective
should be able to describe the chaos before the discovery/ invention of the theorem
and the one pleasant order due to the theorem, after completing the proof of the
theorem. This famous theorem has now 370 proofs when C = 90.
[2] Cantor’s theorem (1874): If ℵ0 and ℵ1 denote the countable and uncountable
infinities respectively then = the cardinality (countable infinity) of the set of natural
numbers/ integers.
[3] Gelfond’s theorem (1934): If α is any algebraic number and is any irrational
number, then = where is a transcendental number.
Only two transcendental numbers e, π are well-known, but this formula gives the trick
for manufacturing an uncountable infinity of transcendental numbers!
In a research paper hard core successful calculations are reported in the main body of
the paper. But metamathematical (after calculations) aspects of the paper have to be
inserted in the sections titled
which will be important for reviewers, critics and other research workers. Motivation
for the work, history and philosophy of the topic of research (the ‘Ph’ factor in
‘Ph.D.’ degree) special notation (if any), strategy for solution, type of abstraction,
type of generalization are included in ‘Introduction’. An appreciation of the
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 16
successful calculations (vide the four types of mathematics in Sec. 3), plausible future
applications, possible modifications of the premise and the ism (perspective) of the
paper are included in ‘Conclusion’. For a new research scholar the drafting of
Introduction and conclusion are difficult. The research guide comes to his
rescue. However a concerted effort in this direction will help in the increase of
Science Citation Index of the paper.
4. METAMATHEMATICS III
Consider the logical statements:
i] Complex analysis
ii] means “Every non-negative real number has a square root”. The book
Principia Mathematica by Russell and Whitehead is considered as an
because it is filled with logical symbols. After 362 pages of abstract notation
and no words, they prove 1 + 1 = 2! Thus MM-III runs the risk of
incomprehensibility and jargon.
5. Conclusion
A popular quotation is “Beauty is not in the holder, but in the beholder”.
+1=0 (5.1)
If we identify the symbols with nationalities of their inventors in (5.1), we have the
funny (nonmathematical) enjoyable relation
E = mc2
since Einstein has revised our universe with just that equation, inaugurating the
mathematics of light, the tool of self orthogonal vector fields, the release of atomic
energy and the mathematical study of Microcosmos and Macrocosmos, where high
speeds comparable to the velocity of light exist. It is no wonder that the
mathematician Einstein has been elected as the person of the second millennium
(1001-2000) by TIME.
We have thus seen that “Charm is not in Mathematics (calculations) per se (in itself)
but in Metamathematics” as evidenced by MM-I, MM-II and MM- III for
inspired teaching as well as enlightened reporting of research, as described in
Sections 2, 3, 4.
4. References
Davis, P.J. and Hersh, R., The Mathematical Experience, Cambridge:
Birkhauser, 1981
Acknowledgment
The author wishes to thank Prof. B.Satyanaraayana and Dr Eswaraiah Setty for
inviting him to deliver this talk in the UGC sponsored seminar on Present Trends in
Mathematics and its Applications on 11 and 12 November 2010 at Smt. G.S. College,
Jaggaaiahpet.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 18
Proceedings of the National Seminar on Present Trends in Mathematics & its Applications,
SGS College, Jaggaiahpet, A.P., India, November 11-12, 2010. (Editors: Dr Eswaraiah Setty
Sreeramula, Dr Satyanarayana Bhavanari and Dr Syam Prasad Kuncham)
Invited Lecture by
Computational Fluid
Prof. D.R.V. Prasada Rao,
Dynamics-A Study of Department of Mathematics,
Sri Krishnadevaraya
Convection in Rectangular University, Anantapur-515
Cavity by Finite Element 003, Andhra Pradesh, India.
Technique
1. Introduction
One of the powerful methods to analyse and understand any real phenomenon is to
formulate the best suited mathematical model based on certain hypothesis like
continuum hypothesis etc., which can be solved making use of either exact methods
or possible approximate methods. The mathematical may consists of an ordinary or
partial differential equation or an integral equation or an integro- differential equation
depending on the nature of the phenomenon and the physical conditions associated
with it. The equation together with the prescribed conditions refers to a boundary
value problem.
Such a boundary value problem may or may not be exactly solvable using the
available methods. The solvability of the boundary value problem depends on the
nature of the equation as well as the shape of the boundaries involved. In few cases
the governing equation is a linear differential equation and the boundaries involved
are smooth known shapes and hence can be solved exactly by standard methods.
The Finite element method overcomes the defect of the traditional variatonal method
in which we approximate the solution keeping the entire domain in to consideration.
The approximate solution obtained in such a manner may lead to small errors in
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 19
certain partitions of the domain while gives rise to large error in the remain partitions.
In order to minimize the error and obtain approximation solution valid in each
element of the whole domain it is desirable to sub-divide the domain into finite
number of elements and develop the approximation solution to each of such elements
and assemble these solution using the inter element continuity and equilibrium
requirements as well as the boundary conditions imposed in the problem.
The finite element method was initially developed as an adhoc engineering procedure
for constructing matrix solutions to stress and displacement calculations in structural
analysis. Very few fluid dynamic problems can be expressed in a variatonal form.
Consequently most of the finite applications in fluid dynamics have used the Galerkin
finite element formulation. A traditional engineering interpretation of finite element
method is given by Zienkiewicz and its applications to fluid mechanics are treated by
Thomasset and Baker. A mathematical perspective of this method is provided by
Strang and Fix, Oden and Reddy, Mitchell and Wait. In the recent times this method
and its applications to problems of mechanics have been quite popularized by Reddy,
Jain et al and Fletcher. The Galerkin finite element method has two important
features. Firstly, the approximate solution is written directly in terms of the nodal
unknowns.Secondly the approximating function or the shape functions are chosen
exclusively from low order piecewise polynomials restricted to contiguous elements.
2. Derivation of element equations for all typical element in the mesh we have
(c) Obtain the element equation in the matrix viz stiffness matrix involving
arbitrary co-efficients involved in the approximate solution
(b) Identify the interlement continuity conditions among the primary variables
by relating element to global nodes.
(c) Assembling the element equations using the above steps in terms of the
global nodal values.
During the last few decades the MHD heat transfer has been developed in few of its
extensive applications in Geophysics and Astrophysics. The problem of Steady flow
of mercury in pipes across a magnetic field was first investigated both theoretically
and experimentally by Hartmann and Lazarus. Further investigations
In this paper we discuss the convective heat transfer steady flow of a conducting fluid
through a rectangular vertical duct under a transverse magnetic field. The equations
for the velocity and induced magnetic field are suitably coupled. The walls of the duct
normal to the direction of the applied magnetic field are thermally insulated and those
parallel to the field are maintained at constant temperature.
Heat generation in a porous media due to the presence of temperature dependent heat
sources has number of applications related to the development of energy resources. It
is also important in engineering processes pertaining to flows in which a fluid
supports an exothermic chemical or nuclear reaction. Proposal of disposing the
radioactive waste material by burying in the ground or in deep ocean sediment is
another problem where heat generation in porous medium occurs.
The investigation of heat transfer in enclosures containing porous media began with
the experimental work of Verschooor and Greebler (27). Verschooor and Greebler
(27) were followed by several other investigators interested in porous media heat
transfer in rectangular enclosures. In particular Bankwall(2) has published a great deal
of practical work concerning heat transfer by natural convection in rectangular
enclosures completely filled with porous media. Burns, Cheng (9) described a porous
medium heat transfer flow in a rectangular geometry.
Recently Badruddin et al(1) have investigated the radiation effect and viscous
dissipation on convective heat transfer in porous cavity.
In this paper we investigate the radiation effect on the free convective flow and heat
transfer in as viscous dissipative fluid in a saturated porous medium with temperature
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 21
gradient dependent heat sources, enclosed in a rectangular duct. The Darcy model is
used for the momentum transport. Making use of the incompressibility non-
dimensional momentum and energy equations are derived in terms of the stream
function and temperature. The Galerkin finite element method with triangular
elements is employed to obtain iterative solution of the said coupled non-linear
equations. The temperature field at different horizontal and vertical levels is obtained
and their behavior is investigated for variations in the governing parameters. The local
rate of heat transfer along the side wall is obtained and its variations for different
parameters are discussed.
2. Formulation:
We consider the mixed convection flow of a viscous incompressible fluid in a
saturated porous medium confined in the rectangular duct (Fig. 1) whose base length
is a and height b. The heat flux on the base and top walls is maintained constant. The
Cartesian coordinate system θ(x,y) is chosen with origin on the central axis of the
duct and its base parallel to x-axis.
We assume that
i) The convective fluid and the porous medium are everywhere in local
thermodynamic equilibrium.
ii) There is no phase change of the fluid in the medium.
iii) The properties of the fluid and of the porous medium are homogeneous
and isotrophic.
iv) The porous medium is assumed to be closely packed so that Darcy’s
momentum law is adequate in the porous medium.
v) The Boussinesq approximation is applicable.
∂u ′ ∂v′
+ =0 (2.1)
∂x′ ∂y ′
k ∂p ′
u′ = − (2.2)
µ ∂x ′
k ∂p ′
v′ = − + ρ′g (2.3)
µ ∂y ′
∂T ′2 ∂T ′2 ∂T ′2 ∂T ′2 ∂T µ 2 ∂q
ρσ c p u′ + v′ = K1 2 + +Q
2
+ (u + v 2 ) − r (2.4)
∂x′ ∂y′ ∂x′ ∂y′ ∂y K ∂x
Th + Tc
ρ ′ = ρ 0 {1 − β (T ′ − T0 ) } ; T0 = (2.5)
2
where u′ and v′ are Darcy velocities along θ(x, y) direction. T′, p′ and g′ are the
temperature, pressure and acceleration due to gravity, Tc and Th are the temperature
on the cold and warm side walls respectively. ρ′, µ, ν, and β are the density,
coefficients of viscosity, kinematic viscosity and thermal expansion of he fluid, k is
the permeability of the porous medium, K1 is the thermal conductivity, Cp is the
specific heat at constant pressure and Q is the strength of the heat source. The
boundary conditions are
∂T ′
=0 on the top ( y = 0) and bottom
∂y
x′ = ax; ; y′ = by ; c = b/a
4σ * ∂T '
4
qr =
3β R ∂x
T4 ≈ 4T Te3 - 3T Te4
K ∂p
u = − 2 (2.8)
a ∂x
∂θ ∂θ 4 N ∂ 2θ ∂ 2θ ∂θ
P u +v = 1 + ( ) + α + EC u 2 + v 2 ( ) (2.10)
∂x ∂y 3 ∂x ∂y ∂y
2 2
∂ψ ∂ψ
u= ; v=− (2.11)
∂y ∂x
Eliminating p from the equation (2.8) and (2.9) and making use of (2.11) the
equations in terms of ψ and θ are
∂θ
∇ 2ψ = − Ra (2.12)
∂x
∂ψ ∂θ ∂ψ ∂θ 4 N 4 N ∂ 2θ ∂ 2θ ∂θ ∂ψ ∂ψ (2.11)
2 2
P − = 1 + 1 + ( 2 ) + 2 + α + EC +
∂y ∂x ∂x ∂y 3 3 ∂x ∂y ∂y ∂y ∂x
where
gβ (Th − Tc )a 3
G= (Grashof number)
v2
P = µ cp / K1 (Prandtl number)
3β R K 1
N= (Radiation parameter)
4σ 2 : Te3
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 24
In each case there are r distinct global nodes in the finite element domain and fp (p =
1,2,……r) is the global nodal values of any unknown f defined over the domain then
3 r
f =∑ ∑f p Φ ip ,
i =1 p =1
Fig (ii)
where the first summation denotes summation over s elements and the second one
represents summation over the independent global nodes and
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 25
= 0, otherwise.
fp’ s are determined from the global matrix equation. Based on these lines we now
make a finite element analysis of the given problem governed by (2.12) and (2.13)
subjected to the conditions (2.14) – (2.16).
ψ i = N1i ψ 1i + N 2i ψ 2i + N 3i ψ 3i (3.1)
Substituting the approximate value ψi and θi for ψ and θ respectively in (2.13), the
error
4N ∂ θ
2 i
∂ 2θ i ∂ψ i ∂θ i ∂ψ i ∂θ i ∂θ ∂ψ ∂ψ
2 2
E = 1 +
i
2 + 2 − p − + α + EC +
3 ∂x ∂y ∂y ∂x ∂x ∂y ∂y ∂y ∂x
1
Under Galerkin method this error is made orthogonal over the domain of ei to the
respective shape functions (weight functions) where
eiς E1i N ki dΩ i = 0
∂ψ
2
∂ θ ∂ θ ∂ψ i ∂θ i ∂ψ i ∂θ i
+αθ + EC ∂ψ
z i z i 2
i 4N − p
∫ei N k 1+ 2 + 2 − + dΩ
s
3 ∂x ∂y ∂y ∂x
∂x ∂y
∂y ∂x
(3.3)
Using Green’s theorem we reduce the surface integral (3.3) without affecting ψ terms
and obtain
4 N ∂N k ∂θ i ∂N k ∂θ i ∂ψ i ∂θ i ∂ψ i ∂θ i ∂ψ
2 2
−αθ + E C ∂ψ
i i
i
∫ei N k 1+
s
+ − p i N k − ∂y + dΩ
3 ∂x ∂x ∂y ∂y ∂y ∂x ∂x ∂y ∂x
i ∂θ ∂θ i
i
∫Γi N k nx + n y dΓi
s
∂x ∂y
(3.4)
s 4 N ∂N ki ∂N Li ∂N Li ∂N ki ∂N i ∂N Li ∂N mi ∂N Li
∑ e1i ∫ei 1 +
3 ∂x ∂x
+
∂y ∂y
− P ∑ ψ mi s m −
∂x ∂y
dΩ
L ∂y ∂x
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 26
∂ψ ∂ψ
2 2
− α ∑ θ sN N l dΩi + EC ∫
i +
k ∂y ∂x
∂θ i ∂θ i
= Γis N ki ∫ei nx + n y dΓi = Qki
s
(l, m, k = 1,2,3) (3.5)
∂x ∂y
where
Qki = Qki 1 + Qki 2 + Qki 3 , Qki ’s being the values of Qki on the sides s = (1,2,3) of the
element ei. The sign of Qki ’s depends on the direction of the outward normal w.r.t the
element.
Repeating the above process with each of s elements, we obtain sets of such matrix
equations. Introducing the global coordinates and global values for θ pi and making use
of inter element continuity and boundary conditions relevant to the problem the above
stiffness matrices are assembled to obtain a global matrix equation. This global matrix
is r x r square matrix if there are r distinct global nodes in the domain of flow
considered.
i
∂ θ ∂ θ ∂θ i
z i z i
∫ei N k 2 + 2 + Ra dΩ = 0
s
∂x ∂y ∂x
(3.8)
s ∂N ki ∂ψ i ∂N ki ∂ψ i ∂N ki
+ Ra θ i dΩ
∫ei ∂x ∂x
+
∂y ∂y ∂x
∂ψ i ∂ψ i s
=Γ N s
nx +
i
n y dΓi + ∫ N ki n xθ i dΓi (3.9)
∂x
i k
∂y Γi
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 27
s ∂N ki ∂N mi ∂N mi ∂N ki i ∂N L
i
∑ ∑
s
ψ ∫
i
+ d Ω + Ra θ i
∫ei ∂x
N d Ω
∂x ∂x ∂y ∂y
m i L k i
e
m i L
∂ψ i ∂ψ i s
=Γ N s
nx +
i
n y dΓi + ∫ N ki θ i dΩ i = Γki (3.10)
∂x
i k
∂y Γi
3y
n = 1 − 3x n = 3x −
1,1 1, 2 C
3y 3y
n = 1− n = −1 +
2 ,1 C 2, 2 C
3y
n = 1 − 3x + n = 2 − 3x
2,3 C 3,1
3y 3y
n = −1 + 3 x − n=
3, 2 C 3, 3 C
3y
n = 1− n = −2 + 3x
4 ,1 C 4, 2
3y
n = 2 − 3x + n = 2 − 3x
4,3 C 5,1
3y 3y
n = −1 + 3 x − n=
5, 2 C 5 ,3 C
3y
n = 2 − 3x n = 3x −
6 ,1 6,2 C
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 28
3y 3y
n = 1+ n = 2−
6,3 C 7 ,1 C
3y
n = −2 + 3x n = 1 − 3x +
7, 2 7 ,3 C
3y
n = 3 − 3x n = −1 + 3 x −
8,1 8, 2 C
3y 3y
n = 3x − n = −1 +
9, 2 C 9,3 C
0 0 −1 0 0 −1
c
0 9 0 0
0 0 0 −1 0 0 0 3 0 0
c=
0 0 0 0 −1 −c 0 9 0 0
0 0 0 0 0 1 + c + c − 1 18 − c
2 1
0 0
0 0 0 0 0 −1 1 + c21
9 0 0
0 0 0 0 0 0 0 9−c − 1 0
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 29
5. RESULTS:
The profiles for the temperature distribution (θ) for different values of Ra, N, α & ε
are shown in figures (1 - 10) at different horizontal levels within the depth for Prandtl
number P = 0.71. The actual temperature is greater or lesser than the mean boundary
temperature according as the non-linear temperature is positive or negative. Figs 1-4
depicts the behaviour of temperature at (different levels) (x) different horizontal
levels y = c/3 & y = 2c/3 and vertical levels x = 1/3 & x = 2/3.
Fig 1 represents the variation of the temperature at the horizontal level y = 2c/3. It is
found that the temperature is negative for all values of Rayleigh number Ra. The
temperature which attains the maximum at x = 1/3 decays gradually to attain the
prescribed value at x = 1. At y = c/3 the temperature is also positive these by
indicating that the actual temperature is greater than the ambient temperature. Also
the actual temperature experiences an enhancement with increase in Rayleigh number
Ra. (Fig. 5).
The variation of θ with radiation parameter N is shown in figs 4 & 8. We find that the
actual temperature experiences a enhancement with increase in the radiation
parameter at both the horizontal levels. The variation of θ with heat generating
sources α is shown in figs 3 & 7 at the levels y = 2c/3 & y = c/3. An increase in α
results in a depreciation with α. Figs 2 & 6 represents the variation of θ with viscous
dissipation parameter ε. It is found that an increase ε leads to an depreciation at y =
2c/3 and enhances at y = c/3. It is clearly evident that the values of the actual
temperature at y = c/3 level is much greater than the horizontal y = 2c/3 level. The
variation of temperature at different vertical levels x = 1/3 & x = 2/3 are presented in
figs (9-16) for different values of Ra, N, α & ε. Figs 9 & 10 represents the variation of
θ with Rayleigh number Ra at vertical levels x = 1/3 & x = 2/3. It is found that the
temperature at the vertical level x = 1/3 experiences an enhancement with increase in
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 30
Ra, while at higher vertical level x = 2/3 the temperature enhances in the region 0 ≤ y
≤ 0.198 for Ra ≥ 100 and depreciates with higher Ra ≥ 110. In the region (0.264,
0.528) the temperature enhances for Ra ≤ 90 and depreciates with Ra ≥ 100, while in
the remaining region adjacent to y = 2c/3 it depreciates with all values of Ra (Fig 13).
The variation of temperature with α is shown in figs (11 & 15) at x = 1/3 and x = 2/3.
It is found that the temperature reduces with increase in the strength of heat
generating source at x = 1/3 & 2/3 levels.
Figs 10 & 14, we observe that the temperature at both the vertical levels experiences
an enhancement with increase in the viscous dissipation parameter ε. In general we
notice that the temperature at x = 2/3 is much higher than that at the vertical level x =
1/3.
The rate of heat transfer at three different we segments viz., Nu1, Nu2 & Nu3 are
evaluated for different values of Ra, α, ε & N. The variation of the rate of heat
transfer with respect to the Rayleigh number shows that the rate of heat transfer in the
first & mid level experiences a depreciation with increase in Ra while the rate of heat
transfer in the upper level enhances with increase in Ra. With respect to the variation
of Nu the heat source parameter α we notice that the rate of heat transfer in the lower
segment depreciates with increase in the strength of heat source while in the middle &
upper levels the rate of heat transfer enhances with α.
The variation of Nu with viscous dissipation parameter ε shows that the rate of heat
transfer in the lower level enhances with increase in ε while at the middle & upper
level Nu depreciates with ε ≤ 0.05 & enhances with higher ε ≥ 0. 08.
The variation of Nu with respect to the radiation parameter N exhibits that the rate of
heat transfer at all the three levels experiences a depreciation with increase in the
radiation parameter N. The inclusion of the radiation effect is to depreciate the rate of
heat transfer at all the three levels. We notice that the rate of heat transfer depreciates
as we move along the y = c in the vertical direction.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 31
0
0.67 0.737 0.804 0.871 0.938
-0.005
-0.01 I
II
θ
III
-0.015
IV
-0.02
-0.025
0
0.67 0.737 0.804 0.871 0.938
-0.005
-0.01 I
II
q
III
-0.015 IV
-0.02
-0.025
x
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 32
0
0.67 0.737 0.804 0.871 0.938
-0.005
-0.01
-0.015
-0.02 I
II
θ -0.025
III
-0.03 IV
-0.035
-0.04
-0.045
-0.05
x
I II III IV I II III IV
α 0 2 4 6 N 0.5 1.5 5 10
0
0.67 0.737 0.804 0.871 0.938
-0.005
-0.01 I
II
θ
III
-0.015 IV
-0.02
-0.025
x
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 33
0.5
0.45
0.4
0.35
0.3 I
II
θ 0.25
III
0.2 IV
0.15
0.1
0.05
0
0.333 0.555 0.777 0.999
x
I II III IV I II III IV
0.45
0.4 I
II
θ
III
IV
0.35
0.3
0.33
0.39
0.44
0.50
0.55
0.61
0.66
0.72
0.77
0.83
0.88
0.94
0.99
x
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 34
0.43
0.41
0.39
0.37
I
0.35
II
θ
0.33 III
IV
0.31
0.29
0.27
0.25
0.3
0.4
0.4
0.5
0.6
0.6
0.7
0.7
0.8
0.8
0.9
0.9
1.0
I II III IV I II III IV
α 0 2 4 6 N 0.5 1.5 5 10
0.39
0.37
0.35
I
0.33
II
θ
III
0.31
IV
0.29
0.27
0.25
0.3 0.5 0.7 0.9
x
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 35
0.03
0.02
i
ii
θ
iii
iv
0.01
0
0.0 0.1 0.2 0.3
I II III IV I II III IV
0.03
θ
i
ii
0.02
iii
iv
0.01
0 0.1 0.2 0.3
y
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 36
0.05
0.04
0.03
0.02
i
0.01 ii
θ
0 iii
-0.01
iv
-0.02
-0.03
-0.04
-0.05
y
I II III IV I II III IV
α 0 2 4 6 N 0.5 1.5 5 10
0.045
0.04
0.035
0.03
I
0.025 II
θ
0.02 III
IV
0.015
0.01
0.005
0
0.0 0.1 0.2 0.3
y
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 37
0.5
0.45
0.4
0.35
0.3 I
II
θ 0.25
III
0.2 IV
0.15
0.1
0.05
0
0 0.133 0.266 0.399 0.532 0.665
y
I II III IV I II III IV
0.45
0.4
0.35
0.3
I
0.25 II
θ
0.2 III
IV
0.15
0.1
0.05
0
0 0.133 0.266 0.399 0.532 0.665
y
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 38
0.4
0.35
0.3
0.25 i
ii
θ 0.2
iii
0.15 iv
0.1
0.05
0
0 0.133 0.266 0.399 0.532 0.665
y
I II III IV I II III IV
α 0 2 4 6 N 0.5 1.5 5 10
0.4
0.35
0.3
0.25 i
ii
θ 0.2
iii
0.15 iv
0.1
0.05
0
0 0.133 0.266 0.399 0.532 0.665
y
Table.2
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 39
Table.3
Nusselt Number(Nu) at x=1, P=0.71
Nu1 1.9325692 1.9447176 1.956812 1.9688452
α 0 2 4 6
Table.4
Nusselt Number(Nu) at x=1
P=0.71
Nu1 1.948655 1.944724 1.9449448 1.9493868
N 0.5 1.5 5 10
References:
1. Badruddin,I.A ,Zainal,Z.A, Aswatha Narayana, Seetharamu,K.N : “ Heat transfer in porous
cavity under the influence of radiation and viscous dissipation”,Int.Comm in Heat & Mass
Transfer 33(2006), pp.491-499.
2. Bankwall, C.G. : “Heat transfer in fibrous materials”, Eval.3, pp. 235-243 (1973).
3. Bankwall, C.G. : “Guarded Lot plate apparatus for the investigation of thermal insulations,
Document D5, National British Building Research.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 40
4. Brinkman, H.C. : “Calculation of the viscous force exerted by a concentrating fluid on a dense
swan of particles”, Applied Science Research Al, pp.27-34 (1947).
5. Burns P.J., Chow, L.C. and Tien, C.L. : “Convection in a vertical channel filled with porous
insulation”, Int J. Heat and Mass Transfer, Vol. 14, pp.1-105 (1979).
6. Cheng, P : Heat Transfer in Geo-thermal system, “Advances in Heat Transfer”, v.14, pp. 1-
105 (1979).
9. Desai, C.S. and Avel, J.F. : “Introduction to the finite element method”, A Numerical Method
for Engineering Analysis, Van & Reinhold, New York (1972).
10. Desai, C.S. and Christian, J.T. (eds) : “Seepage in porous media”, Numerical Methods in
Geotechnical Engineering. New York, (forth coming).
11. Desai, C.S. : Overview, trends and projections : Theory and applications of the proceedings of
symposium on application of FEM in Geotechnical Engineering, Desai, C.S. (eds), USA
Engineer Waterways Experiment Station, Vicksburg (1972).
12. Desai, C.S. : Finite element procedures for Seepage analysis using an iso-parametric element,
proceedings of symposium on application of FEM in Geotechnical Engineering, Desai C.S.
(eds), USA Engineer waterways Experimental Station, Vicksburg.
13. Hin-Sun law Masliyah, J.H. and Nandakumar, K : “Effects of Non-uniform Heating on
laminar Mixed convection in Duets”, Heat Transfer, v-109, pp.131-137 (1987).
14. Padmalatha : Ph.D. Thesis on Finite element analysis of laminar convection through a porous
medium in duets, S.K.University, Anantapur, AP, (1997).
15. Rajesh Rajamani, Srinivas, G and Seetharamu, K.N. : International Journal for Numerical
Methods in Fluids, Vol.11, pp.331-339 (1990).
16. Verschoor, J.D. and Greebler, P : Heat Transfer by Gas conduction and radiation in fibrous
insulation, Trans. Am. Soc. Mech. Engrs, pp. 961-968 (1952).
17. Zienkiewicz, D.C., Mayer, P and Cheng, Y.K. : “Solution of an in metric seepage by
finite elements”, Journal of Engineering Mechanics Division, ASCE, 92, No. EMI
(1966).
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 41
Proceedings of the National Seminar on Present Trends in Mathematics & its Applications,
SGS College, Jaggaiahpet, A.P., India, November 11-12, 2010. (Editors: Dr Eswaraiah Setty
Sreeramula, Dr Satyanarayana Bhavanari and Dr Syam Prasad Kuncham)
Invited Lecture by
Email:
bhavanari2002@yahoo.co.in
Introduction: It is well known that the dimension of a vector space is defined as the
number of elements in the basis. One can define a basis of a vector space as a maximal
set of linearly independent vectors or a minimal set of vectors, which span the space. The
former, when generalized to modules over rings, becomes the concept of Goldie
Dimension. We discuss some results and examples related to the dimension in Vector
Spaces as well as Modules over Rings.
1.2 Note: We use F for field. The elements of F are called scalars and the elements of
V are called vectors.
1.4 Examples: (i) Let K be a field and F be a subfield of K. Then K is a vector space
over F.
(ii) Let F be a field. Write V = Fn = {(x1, x2,..., xn) / xi ∈ F, 1 ≤ i ≤ n}. Define α(x1,
x2,..., xn) = (αx1, αx2, ..., αxn) for α ∈ F and (x1, x2, ..., xn) ∈ Fn. Then Fn is a vector
space. If we take F = R, the field of real numbers, then we conclude that the n-
dimensional Euclidean space Rk is a vector space over R.
(iii) Let F be a field. Consider F[x], the ring of polynomials over F. Write Vn = {f(x) /
f(x) ∈ F[x] and deg.(f(x)) ≤ n}. Then (Vn, +) is an Abelian group where “+” is the
addition of polynomials. Now for any α ∈ F and f(x) = a0 + a1x + ... + anxn ∈ Vn ,
define α(f(x)) = αa0 + αa1x + ... + αanxn. Then Vn is a vector space over F.
1.8 Note: (i) S ⊆ L(S); (ii) L(S) is a subspace of V; (iii) S ⊆ T ⇒ L(S) ⊆ L(T);
(iv) L(S ∪ T) = L(S) + L(T); (v) L(L(S)) = L(S); (vi) L(S) is the smallest subspace
containing S.
(iii) If the vectors vi, 1 ≤ i ≤ n are not linearly dependent over F, then they are said
to be linearly independent over F.
1.10 Lemma: Let V be a vector space over F. If v1, v2, ..., vn ∈ V are linearly
independent, then every element v in their linear span has a unique representation as v =
λ1v1 + λ2v2 + ... + λnvn with λi ∈ F, 1 ≤ i ≤ n.
1.11 Corollary: Let vi ∈ V, 1 ≤ i ≤ n and W = L({vi / 1 ≤ i ≤ n}). If v1, v2, ... , vk are
linearly independent, then we can find a subset of {vi / 1 ≤ i ≤ n}, of the form S = {v1,
v2, ... , vk, vi1, vi2, ... vir} such that (i) S is linearly independent and (ii) L(S) = W.
(ii) Let S be a basis for a vector space V. If S contains finite number of elements,
then V is a finite dimensional vector space. If S contains infinite number of elements
then V is called an infinite dimensional vector space;
(iii) If V is a finite dimensional vector space, and S is a basis for V, n = |S|, then the
integer n is called the dimension of V over F, and we write n = dim V.
1.14 Corollary: If A and B are finite dimensional sub spaces of a vector space V.
Then (i) A + B is finite dimensional; and (ii) dim (A + B) = dim A + dim B –
dim (A ∩ B).
(i) r(a+b) = ra + rb; (ii) (r+s)a = ra + sa; and (iii) r(sa) = (rs)a for all a, b ∈ M and
r, s ∈ R. Moreover if R is ring with identity 1, and if 1m = m for all m ∈ M,
then M is called a unital R–Module.
2.2 Example: (i) Every ring R is a module over it self;
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 44
m = m1 + m2 + … + ms where mi ∈ Mi, 1 ≤ i ≤ s.
3.1 Definition: (i) M has finite Goldie dimension (abbr. FGD) if M does not contain a
direct sum of infinite number of non-zero submodules. [Equivalently, M has FGD if for
any strictly increasing sequence H0 ⊆ H1 ⊆ … of submodules of M, there exists an
integer i such that Hk is an essential submodule in Hk+1 for every k ≥ i].
With the concepts defined above, Goldie proved the following Theorem.
3.2 Theorem: (Goldie): If M is a module with finite Goldie dimension, then there exist
uniform submodules U1, U2, …, Un whose sum is direct and essential in M. The
number ‘n’ is independent of the uniform sumodules. The number ‘n’ of the above
theorem is called the Goldie dimension of M, and is denoted by dim M.
3.4 Note (i): As in vector space theory, for any submodules K, H of M such that
(iii) When we observe the following example, we will learn that the condition
dim (M/K) = dim M – dim K does not hold for a general submodule K of M.
3.5 Example: Consider Z, the ring of integers. Since Z is uniform Z-module, we have
that dim Z = 1. Suppose p1, p2, …, pk are distinct primes and consider K, the
submodule generated by the product of these primes. Now Z/K is isomorphic to the
external direct sum of the modules Z/(pi) where (pi) denotes the submodule of Z
generated by pi (for 1 ≤ i ≤ k) and so dim Z/K = k. For k ≥ 2, dim Z – dim K = 1-1 =
0 ≠ k = dim (Z/K). Hence, there arise a type of submodules K which satisfy the
condition dim (M/K) = dim M – dim K. In this connection, Goldie obtained the
following Theorem.
3.6 Theorem: (Goldie [1]): If M has finite Goldie dimension and K is a complement
submodule, then dim (M/K) = dim M – dim K.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 47
On the way of getting the converse for Theorem 3.6, the concept ‘E-irreducible
submodule of M’ was introduced in Satyanarayana [1].
(v) For any submodule K of M with the canonical epimorphism f : M → M/K, we have
that: K1 is a complement submodule in M ⇔ f(K1) is a complement submodule in M/K;
and
(vi) For any submodule K of M with the canonical epimorphism f : M → M/K, we have
that: S is an essential submodule in M imply f(S) is an essential submodule in M/K.
Moreover, if M has finite Goldie dimension, then the above conditions are equivalent to
each of the following:
(vii) M has the descending chain condition on its submodules and M is completely
reducible; and
(viii) For any submodule K of M, we have that M/K has finite Goldie dimension and
dim (M/K) = dim M – dim K.
E-direct systems:
3.13 Definition: A family {Mi}i∈I of submodules of M is said to be an E-direct
system if, for any finite number of elements i1, i2, …, ik of I there is an element
i0 ∈ I such that M i 0 ⊇ M i1 + … + M i k and M i 0 is non-essential submodule of
M.
3.14 Theorem: (Satyanarayana [1]): For an R-module M the following two conditions
are equivalent: (i) M has FGD; and
(ii) Every E-direct system of non-zero submodules of M is bounded above by a non-
essential submodule of M.
References
Chatters A.W & Hajarnivas C.R
[1] "Rings with Chain Conditions", Research Notes in Mathematics, Pitman
Advanced
publishing program, Boston-London-Melbourne, 1980.
Goldie A.W
[1] "The Structure of Noetherian Rings", Lectures on Rings and Modules,
Springer – Verlag,
New York, Lecture Notes, 246 (1974) 213-31.
Lambek J
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 49
Satyanarayana Bh
[1] “A Note on E-direct and S-inverse Systems”, Proc. Japan Academy
64A(1988)
292 – 295.
Varada Rajan K
[1] "Dual Goldie Dimension", Communications in Algebra, 7(1979) 565-610.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 50
Proceedings of the National Seminar on Present Trends in Mathematics & its Applications,
SGS College, Jaggaiahpet, A.P., India, November 11-12, 2010. (Editors: Dr Eswaraiah Setty
Sreeramula, Dr Satyanarayana Bhavanari and Dr Syam Prasad Kuncham)
Invited Lecture by
Effect of Yield Stress,
Prof. S. Sreenadh, Department of
Elasticity and Peristalsis Mathematics, Sri Venkateswara
University, Tirupati, Andhra
on the Transport of Pradesh.
Bio-fluids
Introduction:
Viscous flows of biofluids through elastic tubes are investigated extensively because of
their important applications in biology, engineering and medicine. Among many
discoveries in the area of fluid dynamics, Poiseuille law considered to be very important
as it describes the relation between the flux and the pressure gradient. According to
Poiseuille’s law, the flux of a viscous incompressible fluid through a rigid tube is a linear
function of the pressure difference between the ends of the tube. However in the vascular
beds of mammals, the pressure flow relation is always non-linear. This non-linearity has
been ascribed to the elastic nature of the blood vessels. It is reported that the transport of
blood takes place in small blood vessles due to the mechanism of peristalsis. Some
electrochemical reactions are sepeculated to be responsible for this phenomenon. This
mechanism also occurs in swallowing of food through oesophagus and stomach,the flow
of urine in the ureter, etc. Ramachandra Rao[1], Vajravelu et.al.[ 7, 8,9,10], Shapiro
et.al. [ 4], Usha et.al.[6] and Subba Reddy et.al.[5] and many others investigated on
several peristaltic flows in tubes and channels. But the wall properties of peristaltic flow
are not studied in detail.
The aim of this talk is to develop mathematical models which explaining the influence of
yield stress, elasticity, peristalsis etc. in the biofluid flow through a tube.
Consider the Poiseuille flow of a Herschel-Bulkley fluid in an elastic tube of radius a(z). The
flow is axisymmetric. The axisymmetric geometry facilitates the choice of the cylindrical
coordinate system (R,Θ,Z) to study the problem. Here we concentrate on the difference of the
external pressure to the inlet pressure and the outlet pressure, the flow is inherently unsteady in
the laboratory flame (R,Θ,Z) and becomes steady in the wave frame (r, θ, z). The transformation
between these two frames is given by
The basic equations and boundary conditions in non-dimensional form are: (dropping the bars)
(1)
Where
(2)
Where the non-dimensional quantities are
,
, , , ,
, $
%
,(
)
,*
,+
,
!"
# & ' # & ' #
(5)
/0 /0
Solving eq(1) and (2) subject to the conditions (3) and (4) we obtain the velocity field as
12 * 3 2 3 4
- . .
. /0 - -
(6)
Where
6 0 at r = r0
5
and . Using the condition
-
The upper limit of the plug flow region is obtained as
.
Also by using the condition 8 at r=a we obtain
-
,
Hence
0<τ<1 (7)
Using relation (7) and taking r=r0 in Eq.(6), we get the plug flow velocity as
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 52
. / :!"
5 2 3 1 /0
- /0
for 0 ≤ r ≤ r0 (8)
(9)
Where
> 11 4
@:!" -@0/0- 5
-:!"/0 /0-/0?
and (10)
A5
A
For a Herschel-Bulkley fluid, we assume that the flux Q is related to the pressure gradient by
( BC C
A5 /
the relation
A
(11)
BC C >*/0?
Now, from (9) and (11) , we observe that
(12)
Integrating (11) with respect to z from z=0 and using the inlet condition p(0)=p1, we obtain
( D :
<5@5 B C =CD
" "
5" @5
:
(13)
where p’=p(z)-p0 This equation determines p(z) implicitly in terms of Q and z . To find Q, we set
z=1 and p(1)=p2 in (13) to obtain
'
(15)
Where n= 1\k.
Eq. (19) can be solved if we know the form of the function a*(p’). If the stress or tension T(a) in
the tube wall is known as a function of ‘a’ , then a(p’) can be found using the equilibrium
C C
condition
,
(16)
From the experimental data for human iliac artery, the expansion of T(a) is obtained as (Rubinow
+* E * 1 E- * 1F
and Keller [1])
(17)
C C 1E * 1 E- * 1F 4
Where t1=13 and t2=300, When we substitute (20) in (19) we have
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 53
5" @5
Using (21) in (18), we get
E 1
(
>
M * ?
0 N - E- O4*? 15*- 20* 10 - PQ =*
* *
5' @5
1
respectively. The function g(a) and the constant F is defined by
1
0 21 2
> T1 S V
1 1 1
2
1 22 S3 3 S
S
* ?
4* ?
0F 15*?
0X 20*?
0? 10* ?
0- *?
R* E E- W Y
3S 3S 5 3S 4 3S 3 3S 2 3S
PERISTALTIC FLOW OF A VISCOUS FLUID IN AN ELASTIC TUBE
Consider the peristaltic transport of a Bingham fluid in a elastic tube of radius ‘a’. The
flow is axisymmetric. Cylindrical polar coordinate system (R, θ,Z) is used. The wall deformation
due to the infinite train of peristaltic waves is represented by
2π
R= H ( Z , t ) = a + b sin ( Z − ct ) ------------------(1)
λ
The transformation between the laboratory frame (R,θ,Z) to the wave frame (r,θ,z) is
w r p z h
w* = r* = p* = z* = h* =
uav a0 ρ uav2 a0 a0
a T ct b q
a* = T* = t* = φ= q* = ------------------(3)
a0 a0 ρ uav2 λ a a0 c
Where Uav is the average velocity and a0 is the radius of the tube in the absence of elasticity the
governing equations (dropping the asterisks) are:
∂p
=0 ------------------(4)
∂r
∂ 2 w 1 ∂w ∂p
+ =R ------------------(5)
∂r 2
r ∂r ∂z
The dimensionless boundary conditions are :
∂w
=0 at r = 0 ------------------(6)
∂r
w= -1 at r = h ------------------(7)
Solving eqs (4) and (5) subjected to the boundary conditions (6) and (7), we obtain the velocity as
Z [ 1 1,
.\\' ' ∂p
X \\'
where P=− ------------------(8)
∂z
The volume flux q through each cross-section in the wave frame is given by:
The above relationship can be rewritten for elastic tube as : ( vide Rubinow)
$ B * DD-
5
------------------(10)
Taking elastic property and peristaltic movement of the tube wall into consideration, we can take
(a ' + a" )4
σ =R ------------------(11)
8
Where a ' is the change in the radius of the tube due to elasticity and a '' is the change in radius
of the tube due to peristalsis. As the flow is of Poiseuille type, at each cross section, the radius a '
is a function of pressure p − p0 , a ' ( p − p0 ) and the wall deformation due to the infinite train of
peristaltic waves is represented by a '' ( z ) = 1 + φ sin 2π z which is a function of z.
dp
q + 1 + 2φ sin 2π z + φ 2 sin 2 2π z = −σ ---------------- (12)
dz
Integrating from z=0 at the inlet pressure p (0) =p1 we have
p − p0
φ co s 2 π z sin 4 π zφ 2 zφ 2 φ ---------------- (13)
qz + z − − + + = − ∫ σ ( p − p0 )dp '
π 8π 2 π p 1 − p0
Where p '( z ) = p ( z ) − p0
For one wave length we have z=1 then p (1) =p2, (12) becomes
p1 − p0
φ2
q= ∫ σ ( p ' ) dp ' + −1 ---------------- (14)
p 2 − p0
2
Here σ is a function of p-p0 and z . So Eq(14) can be solved if we know the form of the function
a(p’). If the stress or tension T (a) in the tube wall is known as a function of ‘a’, then a (p’) is
found using the equilibrium condition.
T ------------------ (15)
p '( z ) = p ( z ) − p 0 =
a'
Roach & Burton [2] determined the static pressure-volume relation of a 4 cm long piece of the
human external iliac artery, and converted it into a tension versus length curve. Using least
squares method Rubinow and Keller [3] given the following equation:
Where t1=13 and t2=300. When we substitute (16) in (15) , the latter becomes
p − p0 =
1
[ t1 ( a '− 1 ) + t 2 ( a '− 1 ) 5 ] ------------------ (17)
a'
φ2
q = g ( a1 ) − g ( a 2 ) + −1 ------------------ (18)
2
a '3 a '' 4 a '8 a ' 7 a '6
g ( a ) = t1 [ + 2 a '' a ' + 6 a '' 2 a ' + 4 a ''3 log a ' − ' ] + t 2 [ + (16 a '' − 15) + (24 a '' 2 − 60 a '' + 2 0)
3 a 2 7 6
a '5 a '4
+ (16 a ''3 − 90 a '' − 10) + ( 4 a '' 4 − 60 a ''3 + 120 a '' 2 − 40 a '' ) +
5 4
a '3 a '2
( − 1 5 a '' 4 + 80 a ''3 − 60 a '' 2 + 1) + ( 20 a '' 4 − 40 a ''3 + 4 a '' ) + a ( − 10 a '' 4 + 6 a '' 2 ) +
3 2
a '' 4
4 a ''3 log a ' − '
a
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 56
Graphs are drawn to find the effects of yield stress, elasticity and pressure difference on the
pumping phenomenon of Newtonian and Herschel-Bulkley fluids with and without
Peristalsis. 0.5
Newtonian
120000 1 Bingham
0.4
1–Trapezoidalwave Power law
100000
2-Multisinusoidalwave(n=6) HB
2 0.3
80000 3-Triangularwave Flux
60000
4-Squarewave 0.2
40000
5- Sinusoidal 3
4 0.1
20000
5
0.0
0.0 0.2 0.4 0.6 0.8 1.0
2.2 2.4 2.6 2.8 3 Radius
Radius a’
g versus a1 for different types of waves Flux for different waves
Conclusions:
• On comparing the flux for various fluids like Newtonian (N), Bingham (B), Power law
(P), and Herschel-Bulkley (H) we find that, H>P>B>N.
• Flux increases as the yield stress and the elastic nature of the tube increases.
• If the flowing fluid in the elastic tube is a Herschel-Bulkley fluid, then the flux increases
as the p2-p0 increases. If the flowing fluid is a Newtonian fluid and if it is pumped by a
peristaltic wave then the flux decreases as p2-p0 increases.
• As the amplitude of the peristaltic wave increases then the flux increases, if the fluid
pumped is a Newtonian fluid.
• If we define, 1–Trapezoidal wave, 2-Multisinusoidal wave, 3-Triangular wave, 4-Square
wave, 5- Sinusoidal wave, then the relation in flux is found to be 1<2<3<4<5.
References:
1) RAMACHADRA RAO, A., & PADMAVATHI,K., 1997 Mathematical models foe
Catheter movement in blood vessels, J. Math. Math. Biosci.., 1, 57-78.
2) ROACH, M. R. & BURTON, A. C. 1957, Can. J. Biochem. Physiol. 35,
3) RUBINOW, S. I. AND KELLER, B. JOSEPH. 1972 Flow of a Viscous Fluid Through ad
Elastic Tube with Applications to Blood Flow, J.theor.Biol.35, 299-313.
4) SHAPIRO, A.H., JAFFRIN,M.Y. & WEINBERG, S.L. 1969 Peristaltic pumping with
long wavelengths at low Reynolds number J .Fluid Mech. 37, 799 – 825.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 57
5) SUBBA REDDY, M. V., SREENADH, S., & RAMACHANDRA RAO, A., 2007
Peristaltic motion of a Power-law fluid in an asymmetric channel, Int. J. Nonlinear Mech.
42 , 1153-1161.
6) USHA, & RAMACHANDRA RAO, A. 1997 Peristaltic transport of two-layered power-
law fluids ASME J. Biomech. Engg. 104, 182 – 186.
7) VAJRAVELU, K., HEMADRI REDDY, R. SREENADH, S. & MURUGESAN, K. 2009
Peristaltic Transport of a Casson fluid in contact with a Newtonian Fluid in a Circular
Tube with permeable wall, Int. J.Fluid Mech. Research, 36, 244-254.
8) VAJRAVELU, K., SREENADH,S. & RAMESH BABU, V. 2005 Peristaltic transport of
a Herschel-Bulkley fluid in a channel Appl. Math and Comput 169, 726 – 735.
9) VAJRAVELU, K., SREENADH,S. & RAMESH BABU, V. 2006 Peristaltic transport of
a Herschel-Bulkley fluid in contact with a Newtonian Fluid, Quarterly. Appl. Math, L
XIV,No.4, 593-604.
10) VAJRAVELU,K., SREENADH.S. & RAMESH BABU, V. 2005 Peristaltic transport of
a Herschel- Bulkley fluid in an inclined tube Int. J. Nonlinear Mech. 40, 83 – 90.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 58
Proceedings of the National Seminar on Present Trends in Mathematics & its Applications,
SGS College, Jaggaiahpet, A.P., India, November 11-12, 2010. (Editors: Dr Eswaraiah Setty
Sreeramula, Dr Satyanarayana Bhavanari and Dr Syam Prasad Kuncham)
Invited Lecture by
Email:
kunchamsyamprasad@gmail.com
1. Introduction
The concept of fuzzy subset was introduced by Zadeh [6]. Later several authors like
[1, 3] were studied the concept: fuzziness in different algebraic systems, particularly in
the theory of rings and near-rings. For preliminary definitions and results, refer [2, 3, 4,
6]. A non-empty set N with two binary operations + and . is called a near-ring if N is an
additive group (not necessarily abelian), multiplicative semigroup satisfying one
distributive law (we consider right distributive law).
The concept of Gamma nearring was introduced by Satyanarayana [4] and further studied
in Satyanarayana [5, 6] . The definition given as follows.
Let (M, +) is a group (not necessarily Abelian) and Γ is a non-empty set. Then M is said
to be a Γ-near-ring if there exists a mapping M × Γ × M → M (the image of (a, α, b) is
denoted by aαb), satisfying the following conditions:
(i) (a + b)αc = aαc + bαc; (ii) (aαb)βc = aα(bβc) for all a, b, c ∈ M and α , β ∈ Γ.
Throughout this talk, M stands for a Γ-near-ring. A normal subgroup (I, +) of (M, +) is
called (i) a left ideal if aα(b + i) – aαb ∈ A for all a, b ∈ M, α ∈ Γ , i ∈ I; (ii) a right
ideal if iαa ∈ A for all a ∈ M, α ∈ Γ , i ∈ I; and (iii) an ideal if it is both a left and a
right ideal. M is said to be zero-symmetric if aα0 = 0 for all a ∈ M and α ∈ Γ, where 0 is
the additive identity in M.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 59
We now review some fuzzy logic concepts. A fuzzy set in a set M is a function
µ: M→ [0, 1]. We shall use the notation µt, called a level subset of µ which is defined as
µt = {x ∈ M µ(x) ≥ t} where t ∈ [0, 1]. Let X and Y are two non empty sets and f a
function of X into Y. Let µ and σ be fuzzy subsets of X and Y respectively. Then f(µ),
the image of µ under f is a fuzzy subset of Y defined by
= 0 if f-1(y) = φ.
1.1 Definition: A fuzzy set µ in a Γ-near-ring M is called a fuzzy left (resp. right) ideal
of M if (i) µ is a fuzzy normal subgroup with respect to addition, (ii) µ(xα(y+z)–xαy) ≥
µ(z) (resp. µ(xαy) ≥ µ(x) ) for all x, u, v ∈ M and α ∈ Γ.
1.2 Results: Let µ be a fuzzy ideal of M. Then (i) µ(0) ≥ µ(x); (ii) µ(x + y) = µ(y + x);
(iii) µ(x−y) = µ(0) implies µ(x) = µ(y), for all x, y ∈ M.
1.3 Theorem [3.5 of [1]]: Let µ be a fuzzy set in M. Then µ is a fuzzy left (resp. right)
ideal of M if and only if each level subset µt, t ∈ im (µ ), of µ is a left (resp. right) ideal
of M.
1.4 Theorem [3.2 of [1]]: Let µ be a fuzzy left (resp. right) ideal of M. Then the set
Mµ = {x ∈ Mµ(x) = µ(0)} is a left (resp. right) ideal of M.
1.5 Theorem [3.3 of [1]]: Let A be non-empty subset of M and µA be a fuzzy set in M
s, if x ∈ A
defined by µA (x) = , for all x ∈ M and s, t [0, 1] with s > t. Then µA is a
t, otherwise
fuzzy left (resp. right) ideal of M if and only if A is a left (resp. right) ideal of M.
Moreover MµA = A.
1.6 Definition [5]: Let M and N are Γ-near-rings. A map θ: M → N is called a Γ-near-
ring homomorphism if θ(x + y) = θ(x) + θ(y) and θ(xαy) = θ(x)αθ(y) for all x, y ∈ M
and α ∈ Γ.
1.7 Theorem: If µ is a fuzzy ideal of M and a ∈ M then µ(x) ≥ µ(a) for all x ∈ <a>.
∞
Hint: For a ∈ M, <a> = UA i , where Ak+1 = Ak*∪Ak+∪Ak0 ∪Ak++ and A0 = A,
i =0
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 60
2. Fuzzy Cosets
2.1 Definition: Let µ be a fuzzy ideal of M and m ∈ M. Then a fuzzy subset
m+µ defined by (m+µ)(m1) = µ(m1−m) for all m1 ∈ M is called a fuzzy coset of the fuzzy
ideal µ.
2.3 Theorem: Let µ be a fuzzy ideal of M. Then the set of fuzzy cosets M/µ of µ is a
Γ-near-ring with respect to the operations defined by
2.4 Proposition: Let µ be a fuzzy ideal; the fuzzy subset θµ of M/µ, is defined by
θµ(x+µ) = µ(x) for all x ∈ M, is a fuzzy ideal of M/µ .
2.6 Theorem: The Γ-near-ring M/µ is isomorphic to the Γ-near-ring M/Mµ. The
isomorphic correspondence is given by x+µ→ x+Mµ.
2.7 Lemma: Let µ and σ be two fuzzy ideals of M such that σ ⊇ µ and σ(0) = µ(0). Then
the fuzzy subset θµ of M/µ defined by θσ(x+µ) = σ(x) for all x ∈ M is a fuzzy ideal of
M/µ such that θσ ⊇ θµ.
2.9 Lemma: Let µ be a fuzzy ideal of M and θ be a fuzzy ideal of M/µ such that θ ⊇ θµ.
Then the fuzzy subset σθ of M defined by σθ(x) = θ(x+µ) for all x ∈ M is a fuzzy ideal of
M such that σθ ⊇ µ.
Define η: P → Q by η(σ) = θσ. One can verify that η is an order preserving bijective
correspondence.
Acknowledgements
The author wishes to thank Dr Eswaraiah Setty (Organizing Secretary) Prof. Bhavanari Satyanaraayana
(Academic Secretary) for inviting him to deliver this talk in the UGC sponsored seminar on Present Trends
in Mathematics and its Applications on 11 and 12 November 2010 at Smt. G.S. College, Jaggaaiahpet, AP.
References
1. Jun Y. B., Sapanci M., and Ozturk M. K. “Fuzzy Ideals in Gamma Near-rings”,
Tr. J. of Mathematics, 22(1998), 449-459.
2. Pliz G. “Near-rings”, North Holland, 1983.
3. Salah Abou-Zaid “On Fuzzy Subnear-rings and Ideals”, Fuzzy sets and Systems,
44(1991) 139-146.
4. Satyanarayana Bh., “Contributions to Near-ring Theory”, Doctoral Thesis,
Nagarjuna University, 1984.
5. Satyanarayana Bh. “The f-Prime Radical in Γ-Near-rings, South East. Bull.
Math., (1999) 23: 507-511.
6. Satyanarayana Bh. “A Note on Γ- Near-rings”, Indian J. Mathematics, 41(3),
1999, 427-433.
7. Satyanarayana Bh., and Syam Prasad Kuncham ‘Fuzzy Cosets of Gamma Nearrings’,
Turkish Journal of Mathematics, (29) 11-22, 2005.
8. Syam Prasad K., and Satyanarayana Bh. ‘A Note on IFP N-Groups’ Proc. of 6th
Ramanujam Symposium on Algebra & Applications, 62-65, 1999.
9. Syam Prasad K., and Satyanarayana Bh. “On Fuzzy Prime ideal of a Gamma Nearring”,
Soochow Jr. Mathematics, 31(1) 121-129, 2005.
10. Satyanarayana Bh., Syam Prasad and Kumar TVP “On IFP N-Groups and Fuzzy IFP
Ideals”, Indian J. Mathematics, 46 (1) 11-19, 2004.
11. Syam Prasad K. “Contributions to Near-ring Theory II”, Doctoral Thesis,
Nagarjuna University, 2000.
12. Zadeh L. A. “Fuzzy sets” Inform. & Control 8(1965) 338-353.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 62
Proceedings of the National Seminar on Present Trends in Mathematics & its Applications,
SGS College, Jaggaiahpet, A.P., India, November 11-12, 2010. (Editors: Dr Eswaraiah Setty
Sreeramula, Dr Satyanarayana Bhavanari and Dr Syam Prasad Kuncham)
Invited Lecture by
Proceedings of the National Seminar on Present Trends in Mathematics & its Applications,
SGS College, Jaggaiahpet, A.P., India, November 11-12, 2010. (Editors: Dr Eswaraiah Setty
Sreeramula, Dr Satyanarayana Bhavanari and Dr Syam Prasad Kuncham)
Invited Lecture by
Email:
babushrisrinivas@yahoo.co.in
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 67
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 68
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 69
Proceedings of the National Seminar on Present Trends in Mathematics & its Applications,
SGS College, Jaggaiahpet, A.P., India, November 11-12, 2010. (Editors: Dr Eswaraiah Setty
Sreeramula, Dr Satyanarayana Bhavanari and Dr Syam Prasad Kuncham)
Invited Lecture by
Finite Dimension in Dr Dasari Nagaraju,
Department of Mathematics,
Associative Rings HITS, Hindustan University,
Chennai.
Email:
dasari.nagaraju@gmail.com
Introduction
It is well known that the dimension of a Vector Space is defined as the number of
elements in the basis. A. W. Goldie (University of Leeds) [2] generalized the dimension
concept to modules over rings. A Module M is said to have finite Goldie dimension
(FGD, in short) if M does not contain a direct sum of infinite number of non-zero
submodules. Goldie proved a structure theorem for modules which states that “a module
with FGD contains uniform submodules U1, U2, …, Un whose sum is direct and essential
in M”. The number n obtained here is independent of the choice of U1, U2, …, Un and it
is called as Goldie dimension of M. The concept Goldie dimension in Modules was
studied by several authors like Satyanarayana, Syam Prasad, Nagaraju (refer [3, 10]).
If we consider ring as a module over itself, then the existing literature tells about
dimension theory for ideals (i.e., two sided ideals) in case of commutative rings; and left
(or right) ideals in case of associative (but not commutative) rings. So at present we can
understand the structure theorem for associative rings in terms of one sided ideals only
(that is, if R has FGD with respect to left (right) ideals, then there exist n uniform left (or
right) ideals of R whose sum is direct and essential in R). This result cannot say about
the structure theorem for associative rings in terms of two sided ideals. To fill this gap,
Satyanarayana, Nagaraju, Balamurugan & Godloza [5] started studying the concepts:
complement, essential, uniform, finite dimension with respect to two sided ideals of R.
1. Essential Ideals
1.1 Definition (Satyanarayana, Nagaraju, Balamurugan & Godloza [5]): (i) Let I, J be
two ideals of R such that I ⊆ J. We say that I is essential (or ideal essential) in J if it
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 70
(ii) Let φ ≠ X ⊆ R. We write X1 = X, X2 = X1* ∪ X10 ∪ X1+ ∪ X1. For any i ≥ 3, define
Xi = X *i −1 ∪ X i+−1 ∪ X i0−1 . Let a ∈ X = X1. Now 0 = a - a ∈ X10 ⊆ X2. For any x ∈ X2,
x = x - 0 ∈ X 02 ⊆ X3 and so on X2 ⊆ X3. In this way, we get that X1 ⊆ X2 ⊆ X3…..
∞
1.5 Note: If φ ≠ X ⊆ R, then the ideal generated by X, <X> = U Xi .
i =1
Hint: By above note and the Principle of Mathematical induction we can get the result.
1.7 Lemma (Satyanarayana, Nagaraju, Balamurugan & Godloza [5]): (i) L1, L2, K1, K2
are ideals of R such that Li ⊆ Ki for i = 1, 2 and K1 ∩ K2 = (0). Then L1 ≤e K1 and
L2 ≤e K2 ⇔ L1 + L2 ≤e K1 + K2; and (ii) Let K1, K2, … Kt, L1, L2, … Lt are ideals of R
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 71
2. Uniform Ideals
2.1 Definition (Satyanarayana, Nagaraju, Balamurugan & Godloza [5]): A non-zero ideal
I of R is said to be uniform if (0) ≠ J ⊴ R, and J ⊆ I ⇒ J ≤e I.
2.2 Theorem (Satyanarayana, Nagaraju, Balamurugan & Godloza [5]): (i) I is an uniform
ideal ⇔ L ⊴ R, K ⊴ R, L ⊆ I, K ⊆ I, L ∩ K = (0) ⇒ L = (0) or K = (0).
(iv) If U and K are two ideals of R such that U ∩ K = (0), then U is uniform in R ⇔
(U + K)/K is uniform in R/K.
3.1 Definition (Satyanarayana, Nagaraju, Balamurugan & Godloza [5]): (i) We say that
R has Finite Dimension on Ideals (FDI, in short) if R does not contain a direct sum of
infinite number of non-zero (two sided) ideals of R. (ii) Let (0) ≠ K ⊴ R. We say that K
has Finite Dimension on Ideals of R (FDIR, in short) if K does not contain a direct sum
of infinite number of non-zero ideals of R. It is clear that if R has FDI, then every
ideal K of R has FDIR.
3.2 Theorem (Satyanarayana, Nagaraju, Balamurugan & Godloza [5]): K has FDIR ⇔
for any strictly increasing sequence H1, H2, … of ideals of R contained in K, there is
an integer i such that Hk ≤e Hk+1 for every k ≥ i.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 72
3.3 Lemma (Satyanarayana, Nagaraju, Balamurugan & Godloza [5]): Suppose R has FDI
and (0) ≠ K ⊴ R. Then K contains a uniform ideal.
(i) (Existence) There exist uniform ideals U1, U2, … Un whose sum is direct and
essential in H;
(ii) If Vi, 1 ≤ i ≤ k are uniform ideals of R, such that vi ⊆ H and the sum of vi’s is
direct, then k ≤ n.
(iii) (Uniqueness) if Vi, 1 ≤ i ≤ k are uniform ideals of R whose sum is direct and
essential in H, then k = n.
3.5 Definition (Satyanarayana, Nagaraju, Balamurugan & Godloza [5]): The number n of
the above Theorem is independent of the choice of the uniform ideals. This number n is
called the dimension of R, and is denoted by dim R.
3.6 Theorem (Satyanarayana, Nagaraju, Godloza & Sreenadh [6]): Suppose R has FDI.
(v) If Ii, 1 ≤ i ≤ k are uniform ideals of R whose sum is direct, then k ≤ dim R.
Moreover dim H = max{k / there exist uniform ideals Ii, 1 ≤ i ≤ k of R whose sum is
direct, Ii ⊆ H, 1 ≤ i ≤ k};
(vi). If n = dim R, then the number of summands in any decomposition of a given ideal I
of R as a direct sum of non-zero ideals of R is at most n.; and
(vii) If f: R → S is an isomorphism and R has FDI, then S has FDI and dim R = dim S.
3.7 Result (Satyanarayana, Nagaraju, Godloza & Sreenadh [6]): If H and K are ideals of
R with H ∩ K = (0), then dim (K + H) = dim K + dim H.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 73
Using the above Result and the principle of mathematical induction, we get the following
Corollary.
3.8 Corollary (Satyanarayana, Nagaraju, Godloza & Sreenadh [6]): (i). If I1, I2, …, In
are ideals of R whose sum is direct, then dim(I1 ⊕ I2 ⊕ … ⊕ In) = dim I1 + dim I2 + … +
dim In.
n
(ii). Suppose Ri, 1 ≤ i ≤ n are rings and R = ⊕ Ri is the direct sum of the rings
i =1
Ri, 1 ≤ i ≤ n. Then each Ri has FDI if and only if R has FDI. If R has FDI, then
n
dim R = ∑ dim R
i =1
i .
3.9 Theorem (Satyanarayana, Nagaraju, Godloza & Sreenadh [6]): If R has FDI with
dim R = n and H ⊴ R, then the following conditions are equivalent:
(i). H ≤e R; (ii). dim H = dim R; and (iii). H contains a direct sum of n uniform ideals.
3.10 Proposition (Satyanarayana, Nagaraju, Godloza & Sreenadh [6]): If R has FDI and
if an ideal H of R has no proper essential extensions, then R/H has FDI and dim(R/H)
≤ dim R.
3.11 Proposition (Satyanarayana, Nagaraju, Godloza & Sreenadh [6]): Suppose R has
FDI and K ⊴ R.
3.12 Theorem (Satyanarayana, Nagaraju & Mohiddin Shaw [7]): Let K be an ideal of R
and π: R → R/K be the canonical epimorphism. Then the following three conditions are
equivalent:
(i) K is a complement;
4.2 Examples: Write R = ℤ, the ring of integers. Since every ideal of ℤ is essential in ℤ,
it follows that ℤ is uniform and so dim R = 1.
(i) Write K = 6ℤ. Now K is an uniform ideal of R. So dim K = 1 and dim R - dim K =
1 - 1 = 0. Now R/K = ℤ/6ℤ ≅ ℤ6 ≅ ℤ2 + ℤ3 and so dim(R/K) = 2. Thus dim(R/K) = 2 ≠
0 = dim R - dim K.
(ii) Let p, q be distinct primes and consider H, the ideal of ℤ generated by the product of
these primes (that is, H = pqℤ). Now H is uniform ideal and so dim H = 1. It is known
that ℤ/H = ℤpq ≅ ℤp ⊕ ℤq, and ℤp, ℤq are uniform ideals. So dim(ℤ/H) = 2. Thus
dim (ℤ/H) = 2 ≠ 0 = 1 - 1 = dim ℤ - dim H.
Hence, there arise a type of ideals K which satisfy the condition dim(R/K) = dimR–dimK.
4.3 Theorem (Satyanarayana, Nagaraju & Mohiddin Shaw [7]): If R has FDI and K is a
complement ideal, then dim(R/K) = dim R – dim K.
5. E-Irreducible Ideals
5.1 Definition (Satyanarayana, Nagaraju, Mohiddin Shaw & Eswaraiah Setty [8]): An
ideal I of R is said to be E-irreducible if I = J ∩ K, where J and K are ideals of R, and I is
essential in K, imply I = K or I = J.
5.2 Note: Every complement ideal is an E-irreducible ideal but the converse is not true.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 75
5.3 Example: Consider ℤ, the ring of integers and ℤ12, the ring of integers modulo 12.
The principle ideal I of ℤ-module ℤ12 generated by 2 is an irreducible ideal, but not a
complement ideal.
6.2 Corollary (Satyanarayana, Nagaraju, Mohiddin Shaw & Eswaraiah Setty [8]): Let
I be an E-irreducible ideal of R. Then
6.4 Lemma (Satyanarayana, Nagaraju, Mohiddin Shaw & Eswaraiah Setty [8]): If R has
FDI and I is an E-irreducible ideal of R, then R/I has FDI and dim(R/I) ≤ dim R.
6.5 Lemma (Satyanarayana, Nagaraju, Mohiddin Shaw & Eswaraiah Setty [8]): If I is
essential in R, then I is E-irreducible ⇔ R/I is uniform.
6.6 Theorem (Satyanarayana, Nagaraju, Mohiddin Shaw & Eswaraiah Setty [8]): If I is
an ideal of a ring R and f: R → R/I is the canonical epimorphism, then the conditions
given below are equivalent:
(i). I = R or I is not essential but E-irreducible.
(iii). I is a complement.
References
[2]. A. W. Goldie (1972) "The Structure of Noetherian Rings", Lectures on Rings and
Modules, Springer-Verlag, New York.
[3]. Bh. Satyanarayana "A note on E-direct and S-inverse Systems", Proc. of the Japan
Academy, 64-A (1988) 292-295.
[4]. Satyanarayana Bhavanari and Mohiddin Shaw Shaik "Fuzzy Dimension of Modules
over Rings (Monograph)", VDM Verlag Dr Muller, Germany, 2010 (ISBN: 978-3-
639-23197-7).
[5]. Satyanarayana Bh., Nagaraju D., Balamurugan K. S., & Godloza L. "Finite
Dimension in Associative Rings", Kyungpook Mathematical Journal, 48 (2008) 37-
43. (SOUTH KOREA).
[7]. Satyanarayana Bhavanari, Nagaraju Dasari & Mohiddin Shaw Shaik. “On the
Dimension of the Quotient Ring R/K where K is a complement”, Communicated.
[8]. Satyanarayana Bhavanari, Nagaraju Dasari, Mohiddin Shaw Sk., & Eswaraiah Setty S
“E-Irreducible Ideals and Some Equivalent Conditions” Proceedings of the
International Conference on Challenges and Applications of Mathematics in Science
and Technology (CAMIST 2010), [NIT Rourkela, 11-01-2010 to 13-01-2010],
McMillan Advanced Research Series, India, pp. 681-687 (INDIA).
[9]. Bh. Satyanarayana and K. Syam Prasad (2009) “Discrete Mathematics and Graph
Theory”, Printice Hall of India, New Delhi (ISBN: 978-81-203-3842-5).
Proceedings of the National Seminar on Present Trends in Mathematics & its Applications,
SGS College, Jaggaiahpet, A.P., India, November 11-12, 2010. (Editors: Dr Eswaraiah Setty
Sreeramula, Dr Satyanarayana Bhavanari and Dr Syam Prasad Kuncham)
Invited Lecture by
Proceedings of the National Seminar on Present Trends in Mathematics & its Applications,
SGS College, Jaggaiahpet, A.P., India, November 11-12, 2010. (Editors: Dr Eswaraiah Setty
Sreeramula, Dr Satyanarayana Bhavanari and Dr Syam Prasad Kuncham)
Invited Lecture by
Modified Second-Order
Slope-Rotatable Designs
B. Re. VICTOR BABU
with Equi- Spaced Department of Statistics, Acharya
Nagarjuna University,
Levels-A Review
Email: victorsugnanam@yahoo.co.in
Abstract
This article presents a review on modified second-order slope-rotatable designs (SOSRD)
with equi-spaced levels. It presents different methods of construction of modified
SOSRDs with equi-spaced levels, using central composite designs, balanced incomplete
block designs (BIBD), symmetrical unequal block arrangements (SUBA) with two
unequal block sizes, pairwise balanced designs (PBD) etc. Comparisons of different
methods of constructions of modified SOSRD with equi-spaced levels for 3 ≤ v ≤ 15 are
given.
Introduction
Response surface methodology is a statistical technique very useful in design and
analysis of scientific experiments. In many experimental situations the experimenter is
concern with explaining certain aspects of a functional relationship
Y = f ( x1 , x 2 ,..., x v ) + e , where Y is the response, x1 , x 2 ,..., x v are v factors and e is the
random error. The function f(.) is called response surface or response function. Designs,
which are used, for the study of response surface methods, are called response surface
designs. Response surface methods are useful where several independent variables
influence a dependent variable. The independent variables are assumed to be continuous
and controlled by the experimenter. The response is assumed to be as random variable.
For example, if a chemical engineer wishes to find the temperature ( x1 ) and pressure ( x2 )
that maximizes the yield (response) of his process, the observed response Y may be
written as a function of the factors temperature ( x1 ) and pressure ( x2 ) as Y = f ( x1 , x2 ) + e
.
In many applications of Response Surface Methodology, good estimation of the
derivatives of the response function may be as important or perhaps more important than
estimation of mean response. Certainly, the computation of a stationary point in a
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 85
second-order analysis or the use of gradient techniques for example, steepest ascent or
ridge analysis depends heavily on the partial derivatives of the estimated response
function with respect to the design variables. Since designs that attain certain properties
in Y (estimated response) do not enjoy the same properties for the estimated derivatives
(slopes), it is important for the user to consider experimental designs that are constructed
with the derivatives in mind.
The concept of rotatability, which is very important in response surface second-order
designs, was proposed by Box and Hunter (1957). A design is said to be rotatable if the
variance of the response estimate is a function only of the distance of the point from the
design center. The study of rotatable designs is mainly emphasized on the estimation of
differences of yields and its precision. Estimation of differences in responses at two
different points in the factor space will often be of great importance. If differences in
responses at two points close together is of interest then estimation of local slope (rate of
change) of the response is required. Estimation of slopes occurs frequently in practical
situations. For instance, there are cases in which we want to estimate rate of reaction in
chemical experiment, rate of change in the yield of a crop to various fertilizer doses, rate
of disintegration of radioactive material in an animal etc. Hader and Park (1978)
introduced slope-rotatable central composite designs (SRCCD). Different methods of
constructions of SOSRDs were suggested by various authors, including Victorbabu
(2002a, b, c, 2003, 2007), Victorbabu and Narasimham (1991, 1993a, b,1994, 2000-01),
and so on. Further, Victorbabu (2005a) studied modified slope-rotatable central
composite designs. Different methods of constructions of modified SOSRDs were
suggested by Victorbabu (2005b, 2006a, b, 2008a, 2009b) and so on. Specifically,
Victorbabu (2009a) introduced modified SOSRD with equi-space levels using central
composite designs and balanced incomplete block designs. Different methods of
constructions of modified SOSRD with equi-spaced levels were suggested by Victorbabu
(2008 b, c) and so on.
v v 2 +
Yu = b 0 + ∑ bi x iu + ∑ bii x iu ∑ ∑ b ij x iu x ju + e u (2.1)
i =1 i =1 i< j
where x iu denotes the level of the i th factor ( i = 1,2,.., v) in the u th run (u = 1,2,.., N) of
the experiment, e u ' s are uncorrelated random errors with mean zero and variance
v
( d 2 = ∑ xi2 ) of the point ( x1 , x2 , ..., xv ) from the origin (centre) of the design. Such a
i
spherical variance function for estimation of slopes in the second-order response surface
is achieved if the design points satisfy the following conditions (cf. Hader and Park
(1978, Victorbabu and Narasimham , 1991).
N v α
∑ ∏ x iui = 0 if any α i is odd, for ∑α i ≤ 4 (2.2)
u =1 i =1
N
(i) ∑ x 2 = constant = Nλ ,
iu 2
u =1
N 2 2
∑ x iu x ju = constant = Nλ 4 , for i ≠ j (2.4)
u =1
where c, λ 2 and λ 4 are constants and the summation is over the design points.
1. Modified SOSRD
The usual method of construction of SOSRD is to take combinations with unknown
constants, associate a 2 v factorial combinations or a suitable fraction of it with factors
each at ± 1 levels to make the level codes equidistant. All such combinations form a
design. Generally SOSRDs need at least five levels (suitably coded) at 0, ± 1 , ± a for all
factors (0,0, …,0 – chosen center of the design, unknown level ‘a’ to be chosen suitably
to satisfy slope-rotatability). Generation of design points this way ensures satisfaction of
all the conditions even though the design points contain unknown levels.
Alternatively by putting some conditions indicating some relation among ∑x 2
iu , ∑x 4
iu
and ∑x 2
iu x 2ju some equations involving the unknown levels are obtained and their
solution gives the unknown levels. In SOSRD the conditions used are V (bij ) = 4V (bii )
and c =
∑x 4
iu
. Other conditions are also possible though, it seems, not yet exploited.
∑x x 2
iu
2
ju
We shall investigate the condition ( ∑ x iu2 )2 = N ∑ x iu2 x 2ju i.e., (N λ 2 )2 = N(N λ 4 ) i.e.,
λ 22 = λ 4 to get another series of symmetrical response surface designs which provide more
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 87
precise estimates of response at specific points of interest than what is available from the
corresponding existing designs. By applying this new condition λ 22 = λ 4 in equation
(2.6), we get c=1 or c=5. The non-singularity condition (2.5) leads to c=5. It may be
noted λ 22 = λ 4 and c=5 are equivalent conditions. Further,
V(b̂ 0 ) =
(v + 4)σ 2 , V(b̂ i ) =
σ2
, V(b̂ ij ) =
σ2
, V(b̂ ii ) =
σ2
,
4N N λ4 Nλ4 4 Nλ 4
−σ 2
Cov (b̂ 0 , b̂ ii ) = .
4N λ4
These modifications of the variances and covariances affect the variance of estimated
response at specific points considerably.
∂Ŷ λ4 + d 2 2
V =
σ .
∂ xi Nλ 4
equi-spaced levels in N=
(2 t(v)
+ na 8 )
2
n0 =
(2 t(v)
+ na 8)2
− 2 t(v) − 2vn a .
t(v)
2
b1k1 b 2 k 2
From (i) each treatment occurs in + = r blocks in all.
v v
( v, b, r, k 1 , k 2 , b1 , b 2 , λ) are known as the parameters of the SUBA with two unequal
block sizes.
Let there be a SUBA with two unequal block sizes with parameters
( v, b, r, k 1 , k 2 , b1 , b 2 , λ) and k = sup.(k1 , k 2 ) . Let us write the design in the form of a
b × v matrix, the elements of which are zero and ‘ a ’. If in any block a particular
treatment occurs the element in that block corresponding to that treatment will be ‘ a ’,
otherwise, zero. We denote these design points generated from the transpose of the
incidence matrix of a SUBA with two unequal block sizes by [a − (v, b, r, k1 , k 2 , b1 , b 2 , λ )] .
Let 2 t(k) denotes the number of design points of a fractional factorial design of 2 k in ± 1
levels, such that no interaction with less than five factors is confounded, and
[a − (v, b, r, k1 , k 2 , b1 , b 2 , λ )]2t(k) is the b2t(k) design points generated from the SUBA with
two unequal block sizes by ‘multiplication’. Choose the additional unknown
combinations (±2a,0,0,... ,0) by permuting over the different factors and multiply with 21
associate combinations to obtain the additional design points. Repeat this set of additional
design points say ‘ n a ’ times, where n a is determined so as to satisfy the conditions of
modified slope rotatability.
Theorem 6.1 The design points,
[
a − (v, b, r, k , k , b , b , λ) 2
1 2 1 2
] t(k)
U n (±2a,0,0,...,0)21 U n will give a v-dimensional
a 0
modified SOSRD with equi-spaced levels using SUBA with two unequal block sizes in
(r2 t(k) + 8n a ) 2
N= design points if, n a = (5λ − r)2 t(k) −5 and
λ2 t(k)
(r2 + 8n a ) 2
t(k)
n0 = − b2 t(k) − 2n a v .
λ2 t(k)
the additional design points. Repeat this set of additional design points say ‘ n a ’ times,
where n a is determined so as to satisfy the conditions of modified slope rotatability.
Ƭ
ǡ
ǡ
ǡǤǤǡǡͷͷǦͷǡͶͷͶǤȋǣ
ǡ
Ȍ
ZĞǀŝĞǁĞĚZĞƐĞĂƌĐŚWĂƉĞƌ
Abstract
It is well known that the algebraic system Near-ring is a system satisfying all the axioms of a Ring except
possibly one of the distributive law and commutativity of addition. The concepts Semi-prime ideal, and
Essential ideal play an important role in the theory of Near-rings. The aim of the present short paper is to
prove the following result: If I is a proper ideal of a semi-prime near-ring N, then there exists an essential
ideal J of N such that I = J ∩ (P - rad(I)).
1. Introduction
In this section, we present some fundamental definitions and results from the literature.
An algebraic system (N, +,.) is said to be a near-ring if it satisfies the following three conditions:
(i) (N, +) is a group; (ii) (N, .) is a semi-group; (iii) (x + y)z = xz + yz for all x, y, z ∈ N.
Further if N satisfies the condition that “x0 = 0 for all x ∈ N”, where ‘0’ is the identity element
of (N, +), then N is called a zero-symmetric near-ring. We abbreviate (N, +, .) by N. Throughout
N stands for a zero-symmetric right near-ring. If A1, A2, …, An are subsets of N, then A1A2…An
denotes the set {a1a2…an / ai ∈ Ai for 1 ≤ i ≤ n}. In the special case when all Ai’s are the same
set A, we denote A1A2…An by An.
An ideal P of N is called a prime ideal if for any two ideals J and I of N, IJ ⊆ P, implies either
I ⊆ P or J ⊆ P. An ideal S of N is said to be semi-prime if for any ideal I of N, I2 ⊆ S, implies
I ⊆ S.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϵϯ
A near-ring N is said to be (i) prime near-ring if (0) is a prime ideal; and (ii) Semi-prime near-
ring if (0) is a semi-prime ideal. The intersection of all prime ideals of N is called the prime
radical of N and it is denoted by P-rad(N). For any proper ideal I of N, the intersection of all
prime ideals of N containing I, is called the prime radical of I and is denoted by P-rad(I).
1.1 Remark: Let I and J be two ideals of N such that I ⊆ J. Now P-rad (I) = the intersection
of prime ideals containing I ⊆ the intersection of prime ideals containing J = P-rad (J). Thus I
⊆ J implies P-rad(I) ⊆ P-rad(J).
1.2 Result (Sambasiva Rao [3]): An ideal I of a Near-ring N is a semi prime ideal if and only if
I = P-rad(I).
2. Essential Ideals
We start this section the definitions ‘essential ideal’ and ‘complement ideal’. We also list two
necessary results from the literature.
2.1 Definition: Let I, J be two ideals of N such that I ⊆ J. We say that I is essential (or ideal
essential) in J if it satisfies the following condition:
Equivalently, the ideal K is said to be a complement of an ideal I of N if (i) K I = (0); and (ii)
K1 is an ideal of N containing K properly, imply K1 I v (0).
2.3 Remark (Remark 1.3 of Satyanarayana, Godloza and Vijaya Kumari [9]): Let I & J be
ideals of N.
(iii) If A ∩ B = (0), and C is an ideal of N which is maximal with respect to the property
C Լ A, C ∩ B = (0), then C ⊕ B is essential in N, where ⊕ denote the direct sum. Moreover,
C is a complement of B containing A.
2.4 Result (Result 1.4 of Satyanarayana, Godloza and Vijaya Kumari [9]): (i) The intersection of
finite number of essential ideals is essential;
(ii) If I, J, K are ideals of N such that I ≤e J, and J ≤e K, then I ≤e K;
(iii) I ≤e J I ∩ K ≤e J ∩ K.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϵϰ
(iv) If I ⊆ J ⊆ K, then I ≤e K if and only if I ≤e J, and J ≤e K; and
(v) Suppose N1, N2 are two near-rings and f : N1 → N2 is a near-ring isomorphism. If A is an
ideal of N1, then A ≤e N1 ⇔ f(A) ≤e N2.
Let us fix an ideal I of N. By Zorn’s Lemma, the set of all ideals H of N satisfying H I = (0)
contains a maximal element, say K. Again by using Zorn’s Lemma the set of all ideals X of N
satisfying X
I and X K = (0) contains a maximal element, say K*. Then we have the
following lemma.
2.5 Lemma (See Lemma 1.4 of Satyanarayana [7]) : (i). K is a complement of I; (ii) K* is a
complement of K; (iii) K + I and K + K* are essential ideals; and (iv) I is essential in K*.
3. Semi-prime Near-rings
In this section we prove the main theorem of this paper. Before proving our main theorem, we
prove the following two lemmas.
3.1. Lemma: If N is a semiprime near-ring, then every complement ideal is semiprime.
Proof: Let K be a complement of a non-zero ideal. Suppose K = (0). Since N is a semiprime
near-ring, by definition, K = (0) is a semiprime ideal of N. Now suppose that K is a non zero
ideal of N. Let K be a complement of a non-zero ideal B of N. This means that K is a maximal
among all the ideal J with respect to the property that J ∩ B = (0). In a contrary way, suppose
that K is not a semiprime ideal. Then there exists an ideal A of N such that A2 ⊆ K and A Խ K.
Since A Խ K, and K is a complement ideal, we have that (K + A) ∩ B ≠ (0). Let 0 ≠ a ∈ (K + A)
∩ B. Now <a>2 ⊆ (K + A)2 ⊆ (A2 + K) ⊆ K. Since a ∈ B, we also have that <a>2 ⊆ B.
Therefore <a>2 ⊆ (K ∩ B) = (0). Since N is a semiprime near-ring, we get that a = 0, a
contradiction to the selection of the element a in N. This proves that K is a semiprime ideal.
Hence every complement ideal is a semiprime ideal.
3.2 Lemma: If N is a semiprime near-ring, then every proper ideal I of N is essential in its prime
radical P-rad(I).
Proof: By Lemma 2.5, there exists two ideals K and K* such that K is a complement of I; K* is
a complement of K containing I; and I ⊕ K, K* ⊕ K both are essential ideals of N. Also we
have that I is essential in K*. By above Lemma 3.1, K* is a semiprime ideal. Since I ⊆ K*, by
Remark 1.1, we have that P-rad(I) ⊆ (P-rad(K*)). Since K* is a semiprime ideal, it follows that
P-rad(K*) = K*. Now it is clear that I ⊆ P-rad(I) ⊆ P-rad(K*) = K*. Since I is essential in K*,
and I ⊆ P-rad(I) ⊆ K*, by result 2.4(iv), it follows that I is essential in P-rad(I).
Now we are ready prove the main result of this short paper.
3.3 Theorem: Let I be a proper ideal of a semiprime near-ring N. Then there exists an essential
ideal J of N such that I = J ∩ (P - rad(I)).
Acknowledgements
The author acknowledges the financial assistance from the UGC, New Delhi under the grant F.
No.34-136/2008 (SR) dated 30th December 2008. The author thanks the referee for valuable
comments that improved the paper.
References
1. Pilz G. “Near-rings”, North Holland, New York, 1983.
2. Reddy Y. V. & Satyanarayana Bhavanari “On finiThe f-prime Radical in Near-rings”, Indian J.
Pure & Appl. Math. 17 (1986) 327-330.
3. Sambasiva Rao V. “A Characterization of Semi-prime Ideals in Near-rings”, Journal of
Australian Mathematical Society 32 (1982) 212-214.
4. Sambasiva Rao V. & Satyanarayana Bhavanari "The Prime Radical in Near-rings", Indian
J. Pure & Appl. Math. 15 (1984) 361- 364.
5. Satyanarayana Bhavanari "Tertiary Decomposition in Noetherian N-groups", Communications in
Algebra, 10 (1982) 1951 – 1963.
6. Satyanarayana Bhavanari "Primary Decomposition in Near rings", Indian J. Pure & Appl. Math.
15 (1984) 127-130.
7. Satyanarayana Bhavanari "On Finite Spanning dimension in N-groups", Indian J. Pure &
Appl. Maths. 22 (8) 633-636, August 1991. (Zbl 0748.16024).
8. Satyanarayana Bhavanari “Contributions to Near-ring Theory”, VDM Verlag Dr Muller,
Germany, 2010 (ISBN: 978-3-639-22417-7).
9. Satyanarayana Bh., Godloza L and Vijaya Kumari A. V., “Finite Dimension in Near-rings”,
Journal of AP Society for Mathematical Sciences, 1 (2) (2008) 62-80.
10. Satyanarayana Bhavanari & Richard Weigandt "On the f-prime Radical of Nearrings",
in the book ‘Nearrings and Nearfields (Editors: Hubert Kiechle, Alexander Kreuzer and
Momme Johs Thomsen) (Proc. 18th International Conference on Nearrings and
Nearfields, Universitat Bundeswar, Hamburg, Germany, July 27-Aug 03, 2003), Springer
Verlag, Netherlands, 2005, pp 293-299.
11. Satyanarayana Bhavanari & Syam Prasad Kuncham “Discrete Mathematics and Graph Theory”,
Printice Hall of India, New Delhi, 2009 (ISBN: 978-81-203-3842-5).
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϵϲ
Ƭ
ǡ
ǡ
ǡ ǤǤǡ ǡ ͷͷǦͷǡ ͶͷͶǤ ȋǣ
ǡ
Ȍ
ZĞǀŝĞǁĞĚZĞƐĞĂƌĐŚWĂƉĞƌ
Fuzzy Numbers and Authors: Abdul Hamid, Tanweer Jalal and Neyaz
Ahmad, Department of Mathematics, National
Institute of Technology, Hazatbal, Jammu and Sri
Matrix Nagar (India)-190006,
Abstract
In this paper we characterize the classes ሺǡ ȁሺሻሻ where ൌ ሺሻ ,ሺሻ or l∞ ( R) and ȁሺሻ denotes
the set of fuzzy analytic sequences.
implies Ax ∈Y , we say that A defines a matrix trans- formations from X into Y , denoted by
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϵϳ
A: X → Y . By ( X : Y ) , we mean the class of all matrices A such that A: X → Y .The matrix domain
X A of an infinite matrix A in a sequence space X is defined as
X A ={ x = (xk ) ∈ ω : Ax∈X }
The concept of Fuzzy theory was introduced by Zadeh [5] and later by several authors (see, [1],
[3], [4] ).A fuzzy number is a function from ୬ to [0,1] so that
A sequence ൌ ሺ୬ ሻ is called a fuzzy sequence if the terms ୬ are fuzzy numbers.
A sequence ൌ ሺ୬ ሻ of fuzzy numbers is said to be convergent to the fuzzy number zero, if for
every İ Ͳ there exists a positive integer such that
ሺ ୬ ǡ Ͳሻ ൏ ߝ for ܰ and let ሺሻ ൌthe set of all fuzzy sequences.
A sequence ൌ ሺ୬ ሻ of fuzzy numbers is said to be convergent to the fuzzy number , if for
every İ Ͳ there exists a positive integer such that
ሺ ୬ ǡ ሻ ൏ ߝ for ܰ and let ሺሻ ൌthe set of all fuzzy sequences.
A sequence ൌ ሺ୬ ሻ of fuzzy numbers is said to be bounded if the set ሼ ୬ : אሽ of fuzzy
numbers is bounded and let ሺሻ denote the set of fuzzy bounded se- quences.
Proof: Sufficient Condition: Since ሺ) ؿሺሻ ؿሺሻ, it is enough to prove the sufficiency
for ൌ ሺሻ .Since ሺ ୬ ሻ אሺሻ there is a constant such that
Necessary Condition: It is enough to prove the necessity for ൌ ሺሻ . Suppose that (1) is not
satisfied, then by selecting a subsequence and suppose that Ԃ୬ ՜ monotonically.
(2)
The matrix ܣൌ ሺܽ ሻ to applicable to each member of ሺ) , the series σ୩ ሺܽ୬୩ ǡ Ͳሻ , ݊ אԳ,
must all be convergent. (3)
Also putting ܺ ൌ ͳ and ܺ ൌ Ͳ for all ݆ ് ݇ so that ሺܺ ሻ ܥ א ሺܴሻ.We have ܻ ൌ ܽ .
భ
In this case , if ܻ אȁሺܴሻ,we must have ൣσ୩ ሺܽ୬୩ ǡ Ͳሻ൧ ൏ ܯ for fixed ݇ and݊
(4)
We shall construct a sequence ሺܺ ሻ ܥ א ሺܴሻ with the condition ሺܺ୩ ǡ Ͳሻ ൌ ͳ݇ (5)
and show that the corresponding ܻ בȁሺܴሻ .This will prove the necessity of (1).
ൣσ
ୀబ ାଵ ൫ܽ୬బ ୩ ǡ Ͳ൯൧
బ
൏ͳ (7)
Now,
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϵϵ
భ భ భ
หܻబ หబ ൛݀൫σୀ
బ
ܽ୬బ ୩ ୩ ǡ Ͳ൯ൟబ െ ൛݀൫σ
ୀబశభ ܽ୬బ ୩ ୩ ǡ Ͳ൯ൟ
బ
భ భ
బ
൛หσୀ ܽ୬బ ୩ ห݀ሺ୩ ǡ Ͳሻൟబ െ ൛หσ
ୀబ ାଵ ܽ୬బ ୩ ห݀ሺ ୩ ǡ Ͳሻൟ
బ
భ భ
൛σୀ
బ
หܽ୬బ ୩ หൟబ െ ൛σ
ୀబ ାଵหܽ୬బ ୩ หൟ
బ
భ భ
బ
ൣσୀ ൫ܽ୬బ ୩ ǡ Ͳ൯൧బ െ ൣσ
ୀబ ାଵ ൫ܽ୬బ ୩ ǡ Ͳ൯൧
బ
ൣσ
ୀబ ାଵ ൫ܽభ ୩ ǡ Ͳ൯൧
భ
൏ͳ (12)
But we have
భ
భ
ቄ݀ቀσୀ ܽ ǡ Ͳቁቅ భ
బ ାଵ ୬భ ୩ ୩
భ భ
బ
Ԃభ െ ൣσୀ ൫ܽ୬భ ୩ ǡ Ͳ൯൧భ െ ൣσ
ୀ ൫ܽ୬భ ୩ ǡ Ͳ൯൧
భ
Now, we have
భ భ భ
భ బ
หܻభ ห ቄ݀ቀσୀ ܽ ǡ Ͳቁቅ భ െ ൛݀൫σୀ ܽ୬భ ୩ ୩ ǡ Ͳ൯ൟభ
భ
బ ାଵ భ ୩ ୩
భ భ
భ బ
ቄቚσୀ ܽ ቚ݀ሺ୩ ǡ Ͳሻቅ భ െ ൛หσୀ ܽభ ୩ ห݀ሺ୩ ǡ Ͳሻൟభ
బ ାଵ భ ୩
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϬϬ
భ భ భ
ቄσୀ หܽభ୩ หቅ െ ൛σୀหܽ୬బ ୩ หൟభ െ ൛σ
ୀభ ାଵหܽభ ୩ หൟ
భ భ బ భ
బ ାଵ
భ భ
భ బ
ቂσୀ ൫ܽభ ୩ ǡ Ͳ൯ቃ భ െ ൣσୀ ൫ܽభ୩ ǡ Ͳ൯൧భ
బ ାଵ
References:
[1] Basarir, M. and Mursaleen, “ Some Sequence Spaces of Fuzzy Numbers Genera-
ted by Infinite Matrices ” , The Journal of Fuzzy Mathematics , 11(3),(2003)757-
764.
[2] Maddox, I.J., “ Elements of Functional Analysis” , Cambridge University Press ,
1970.
[3] Matloka, M., “Sequences of Fuzzy Numbers ”, BUSEFAL, 28,(1986) 23-27.
[4] Nanda, S., “ On Sequences of Fuzzy Numbers ” , Fuzzy sets and Systems, 33,
(1989) 123-126.
[5] Zadeh, L. A ., “ Fuzzy Sets ” , Inform and Control 8 , (1965) 338-353.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϬϭ
Ƭ
ǡ
ǡ
ǡ ǤǤǡ ǡ ͷͷǦͷǡ ͶͷͶǤ ȋǣ
ǡ
Ȍ
ZĞǀŝĞǁĞĚZĞƐĞĂƌĐŚWĂƉĞƌ
Some Results on Authors: Pradeep Kumar T.V.*, Satyanarayana
Bhavanari@, Syam Prasad Kuncham# and Mohiddin
Completely Semi-Prime Shaw Sk@.
*: Department of Mathematics, ANU College of
Ideals in Gamma Near- Engineering and Technology, Acharya Nagarjuna
University, Nagarjuna Nagar-522 510, AP.,
Rings @
: Department of Mathematics, Acharya Nagarjuna
University, Nagarjuna Nagar-522 510, AP.
#
: Department of Mathematics, Manipal University,
Manipal-576 104.
Emails: pradeeptv5@gmail.com,
bhavanari2002@yahoo.co.in͕
kunchamsyamprasad@gmail.com
Abstract
In this paper we considered the algebraic system Γ-near-ring that was introduced by Satyanarayana.
Γ-near-ring is a more generalized system than both near-ring and Γ-ring. The aim of this short paper is to
study some important results related to the concepts: Prime and Semi- prime Ideals in Γ-near-rings.
1. Introduction
In recent decades interest has arisen in algebraic systems with binary operations addition and
multiplication satisfying all the ring axioms except possibly one of the distributive laws and
commutativity of addition. Such systems are called “Near-rings”. A natural example of a near-ring is
given by the set M(G) of all mappings of an additive group G (not necessarily abelian) into itself with
addition and multiplication defined by
The concept Γ-ring, a generalization of ‘ring’ was introduced by Nobusawa [4] and generalized by
Barnes [ 1 ]. Later Satyanarayana [8], Satyanarayana, Pradeep Kumar & Srinivasa Rao [12 ] also
contributed to the theory of Γ-rings. A generalization of both the concepts near-ring and Γ-ring, namely
Γ-near-ring was introduced by Satyanarayana [ 9 ] and later studied by several authors like: Booth [ 2 ],
Booth & Godloza [3], Syam Prasad [15], Satyanarayana, Pradeep kumar, Sreenadh, and Eswaraiah Setty
[13].
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϬϮ
This short paper is divided into three sections. The section – 3 contains new results related to the concept:
completely semi-Prime ideal. In the sections 1 and 2, we collect some existing definitions and examples
which are to be used in the later section – 3.
1.1 Definition: An algebraic system (N, +, .) is called a near-ring (or a right near-ring) if it
satisfies the following three conditions:
(i) (N, +) is a group (not necessarily Abelian);
(ii) (N, .) is a semi-group; and
(iii) (n1 + n2)n3 = n1n3 + n2n3 (right distributive law) for all n1, n2, n3 ∈ N.
In general n.0 need not be equal to 0 for all n in N. If a near-ring N satisfies the property n.0 =
0 for all n in N, then we say that N is a zero-symmetric near-ring
1.2. Definitions: A normal subgroup I of (N, +) is said to be
(i) a left ideal of N if n(n1 + i) – nn1 ∈ I for all I ∈ I and n, n1 ∈ N (Equivalently,
n(I + n1) – nn1 ∈ I for all I ∈ I and n, n1 ∈ N); (ii) a right ideal of N if IN ⊆ I; and
(iii) an ideal if I is a left ideal and also a right ideal.
If I is an ideal of N then we denote this fact by I թ N.
For other fundamental definitions and results in near-rings, we refer Pilz [5], Satyanarayana
& Syam Prasad [14].
1. 4. Definition: (Satyanarayna [9]): Let (M, +) be a group (not necessarily Abelian) and Γ be a non-
empty set. Then M is said to be a Γ-near-ring if there exists a mapping M × Γ × M → M (the image of
(a, α, b) is denoted by aαb), satisfying the following conditions:
1.5. Example (Satyanarayana [10]): Let (G, +) be a non-abelian group and X be a non-empty set. Let M
= {f / f: X → G}. Then M is a group under point wise addition.
Since G is non-abelian, we have that (M, +) is non-abelian. Hence forth, M stands for a zero symmetric
Γ-Near-ring.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϬϯ
2. Some relations between Semi-prime, Completely semi-prime
Ideals
2.1. Definitions (Satyanarayana [9, 11]): An ideal A of M is said to be (i) prime if B and C are
ideals of M such that BΓC ⊆ A implies B ⊆ A or C ⊆ A; (ii) completely prime if aΓ b ⊆ A, a, b ∈ M,
implies either a ∈ A or b∈ A; (iii) semi-prime if BΓB ⊆ A implies B ⊆ A; (iv) completely semi-prime
ideal if it satisfies condition: aΓa ⊆ A a∈ A.
2.2. Definitions ( Satyanarayana [9, 11]): (i) An element a in M is said to be a nilpotent element, if there
exists a positive integer n such that (aΓ)na = aΓaΓa...Γa = 0.
(ii) An ideal A of M is said to be a nilpotent ideal, if there exists a positive integer n such that (AΓ)nA =
AΓAΓA...ΓA = 0. We denote the sum of all nilpotent ideals of M by SN(M).
2.3. Lemma: (i) If J ⊆ M and J2 ⊆ I , I is completely semi-prime ideal, then J ⊆ I (in particular every
completely semi-prime ideal is a semi-prime ideal).
Proof: (i) Let a ∈ J. Now aΓa ⊆ JΓJ = J2 ⊆ I a ∈ I (Since I is completely semi-prime ideal of I).
Therefore J ⊆ I.
Proof: (i). Take x , y ∈ (I : a). Then xΓa ⊆ I and yΓa ⊆ I. We have to verify that (x - y)Γa ⊆ I. Let γ ∈
Γ. Consider (x - y)γa = xγa - yγa ∈ xΓa - yΓa ⊆ I - I = I. This shows that x - y ∈ (I : a). Let m∈ M.
Now (m + x - m)γa = mγa + xγa - mγa ∈ I (since xγa ∈ I, and I is a normal subgroup of (M, +)). This is
true for all m ∈ M and γ ∈ Γ.
Now mβaΓx ⊆ I. By Lemma 2.3 (ii), xΓmβa ⊆ I xγmβa ∈ I . This is true for all β ∈ Γ. Therefore
xγmΓa ⊆ I. This shows that (I : a) is a right ideal. The proof is complete.
Proof: (i) (ii): Suppose (i). That is if xΓx ⊆ S, then <x>Γ<x> ⊆ S. Let x ∈ M and xΓx ⊆ S.
<x>Γ<x> ⊆ S (by (i)) <x> ⊆ S (since S is a semi-prime ideal) x ∈ S. Hence S is a completely
semi-prime ideal of M. This proves (i) (ii).
ACKNOWLEDGEMENTS
The second author and fourth author acknowledge the financial assistance from the UGC, New Delhi
under the grant F.No: 34-136/2008(SR), dt: 30-12-2008. The authors thank the referee for valuable
comments that improved the paper.
References
[1] Barnes W.E. “On the Gamma-rings of Nobusawa”, Pacific J. Math 18 (1966) 411- 422.
[8] Satyanarayana Bh. "A Note on Γ-rings", Proceedings of the Japan Academy 59-A(1983)
382-83.
[9] Satyanarayana Bh. “Contributions to Near-ring Theory”, Doctoral Dissertation, Acharya
Nagarjuna University, 1984.
[10] Satyanarayana Bh. “A Note on Γ-near-rings”, Indian J. Mathematics (B.N. Prasad
Birth Centenary commemoration volume) 41(1999) 427-433.
[11] Satyanarayana Bh. “Contributions to Near-ring Theory”, VDM Verlag Dr Muller, Germany,
2010 (ISBN: 978-3-639-22417-7).
[12] Satyanarayana Bh., Pradeep Kumar T.V. and Srinivasa Rao M. “On Prime left ideals in Γ-
rings”, Indian J. Pure & Appl. Mathematics 31 (2000) 687-693.
[13] Satyanarayana Bh., Pradeep kumar T.V., Sreenadh S., and Eswaraiah Setty S. “On
Completely Prime and Completely Semi-Prime Ideals in Γ-Near-Rings”, International
Journal of Computational Mathematical Ideas Vol. 2, No 1(2010) 22 – 27.
[14] Satyanarayana Bhavanari & Syam Prasad Kuncham “Discrete Mathematics & Graph
Theory”, Prentice Hall of India, New Delhi, 2009 (ISBN: 978-81-203-3842-5).
[15] Syam Prasad K. “Contributions to Near-ring Theory II”, Doctoral Dissertation
Acharya Nagarjuna University, 2000.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϬϲ
Ƭ
ǡ
ǡ
ǡ ǤǤǡ ǡ ͷͷǦͷǡ ͶͷͶǤ ȋǣ
ǡ
Ȍ
ZĞǀŝĞǁĞĚZĞƐĞĂƌĐŚWĂƉĞƌ
Almost Convergence and Authors: Abdul Hamid Ganie, Ahmad
Some Matrix Sheikh and Sameer Gupkari, Department
of Mathematics, National Institute of
Transformations Technology, Hazatbal, Jammu and Sri
Nagar (India)-190006,
Emails͗asganie0@rediffmail.com,
neyaznit@yahoo.co.in,
sameergupkari@rediffmail.com
Abstract
The sequence space bv( p ) have been defined and the classes ( bv ( p ): l∞ ) , ( bv( p):c ) and ( bv ( p ): c0 ) of
infinite matrices have been characterized by Abdullah and Malkowsky (see , [1] ). The main purposes of
the present paper is to characterize the classes (bv ( p ): f ∞ ) , ( bv( p): f ) and ( bv ( p ): f 0 ) where f ∞ , f and
f 0 denote respectively the spaces of almost bounded sequences, almost convergent sequences and almost
convergent null sequences with real or complex terms.
Keywords and phrases: Sequence space of non-absolute type, almost convergent sequences,
and Matrix mappings.
-transform of x , whenever An ( x) = ¦ ank xk < ∞ for all n. We write lim Ax = lim An ( x) .If x ∈ X
n n
k
implies Ax ∈ Y , we say that A defines a matrix trans- formations from X into Y , denoted by
A : X → Y . By ( X : Y ) , we mean the class of all matrices A such that A : X → Y .The matrix
domain X A of an infinite matrix A in a sequence space X is defined as
X A = { x = ( xk ) ∈ ω : Ax ∈ X }
Let S : l∞ → l∞ be the shift operator defined by ( Sx ) n = xn +1 for all n ∈` = {0,1, 2,...} . A Banach
limit L is defined on l∞ as a non negative linear functional such that L( sx) = L( x) and L(e) = 1 ,
( e = (1,1,1,...) ) [2]. A sequence space is said to be almost convergent to the gene- ralized limit α
if all Banach limits of x are α [4].We denote the set of almost convergent sequences by f i.e.,
1 m
where , tmn ( x) = ¦ x j +n , t−1,n = 0 and α = f − lim x .
m + 1 j =0
½
f ∞ = ® x ∈l∞ :sup tmn ( x) < ∞ ¾
¯ mn ¿
Abdullah and Malkowsky[1] have defined the sequence space bv( p ) and characterize the matrix
classes ( bv ( p ):l∞ ) , ( bv( p):c ) and ( bv ( p ): c0 ) .In this paper we characterize the matrix classes
(bv ( p ): f ∞ ) , ( bv( p): f ) .and ( bv ( p ): f 0 ) . The space bv( p ) is defined (see,[ 1]) as
½
bv( p) = ® x = ( xk ) ∈ ω : ¦ ∆xk
pk
< ∞¾ .
¯ k ¿
1 m
tmn ( Ax) = ¦ An+i ( x) = ¦k a(n, k , m) xk where,
m + 1 j =0
1 m
a(n, k , m) = ¦ an+ j ,k ; (n, k , m ∈` )
m + 1 j =0
we give the following lemma which will be needed in proving the main results.
Lemma 2.1 [6]: f ⊂ f ∞ .
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϬϴ
Theorem 2.1: Let 1 < pk ≤ M < ∞ for every k ∈ ` .Then A ∈ ( bv ( p ): f ∞ ) if and only if
¦
qk − qk
sup a ( n, k , m ) B < ∞ (2.1)
n , m∈ ` k
Proof: Sufficiency: Suppose the conditions (2.1) holds and x∈bv( p). .Using the inequality
which holds for any C > 0 and any two complex numbers a, b
{
ab ≤ C aC −1 + b
q p
} , where p > 1 and p −1 + q −1 = 1 (see, [4]), we have
¦ B ª¬ a (n, k , m) º , where, pk −1 + qk −1 = 1 .
qk pk
≤ B − qk + xk
k
¼
Taking sup on both sides and using (2.1) we get Ax ∈ f ∞ for every x∈bv( p) , i.e., A ∈ ( bv( p) : f ∞ ) .
m, n
Necessity: Suppose that A ∈ ( bv( p) : f ∞ ) and qn ( x) = sup tmn ( Ax) .It is easy to see that for n ≥ 0, qn
m
is a continuous seminorm on bv( p ) and ( qn ) is pointwise bounded on bv( p ) . Suppose that (2.1) is
not true. Then there exists x∈bv( p) with sup qn = ∞ .By Principle of condensation of singularities
n
[7], the set {x ∈ bv ( p ) : sup qn = ∞} is of second category in bv( p ) and hence nonempty, that is,
n
there is x∈bv( p) with sup qn = ∞ .But this contradicts the fact that ( qn ) is point wise bounded on
n
qn ( x ) ≤ Mg ( x ) (2.2)
Then one can see that x∈bv( p) .Applying this sequence to (2.2) we get the necessity of (2.1) and
completes the proof of the result.
Theorem 2.2: 1< pk ≤ M < ∞ for every k ∈ ` .Then A ∈ ( bv( p ): f ) if and only if
Proof: Sufficiency: Suppose that the conditions (i)-(ii) hold and x∈bv( p) . We observe for j ≥ 1 ,
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϬϵ
j
¦ a ( n, k , m )
qk
≤ B − qk < ∞ ,( qk−1 + pk−1 = 1 ).
k
Consequently reasoning as in the proof of the sufficiency of Theorem 2.1, the series
¦ a(n, k , m) xk and ¦ β k xk converges for every n, m and for every x ∈ bv( p) .Now, for given ε > 0
k k
¦ [ a ( n, k , m ) − β ]
k =1
k < ε , for every m ≥ m0 and uniformly in n . (2.4)
¦ [ a ( n, k , m ) − β ] x
k = k0 +1
k k
∞
Therefore, ¦ [ a ( n, k , m ) − β ] → 0 ( m → ∞ )
k = k0 +1
k
uniformly in n i.e.,
lim ¦ a( n, k , m) xk =¦ β k xk (2.5)
m
k k
Necessity: Suppose that A ∈ ( bv( p ): f ) . Then , since f ⊂ f ∞ ( by Lemma 2.1 ), the necessities of
condition (i) is immediately obtained from Theorem 2.1 . To prove the necessity of (ii), consider
the sequence ek = (0,0,...,1kth − place ,0,0,...) ∈ bv( p) , condition (ii) follows immediately by(2.5) and
the proof is complete.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϭϬ
Note that if we replace f by f0 , then Theorem 2.2 is reduced to the following corollary:
Corollary: A ∈ ( bv ( p ): f 0 ) if and only if condition (i) and (ii) of above Theorem holds along with
β k = 0 for each k ∈ ` .
Reference
[1] Abdullah M. Jarrah, and Malkowsky, E., the Space bv( p ) , its β − dual and matrix
transformations, Collect. Math .,(55)(2004),151-162.
[2] Banach, S., Theӓries des operations linҿaries, Warszawa, 1932.
[3] Lascarides, C.G., Maddox, I.J., Matrix transformations between some classes of
sequences, Proc. Camb. Phil. Soc.,(68) (1970) , 99-104.
[4] Lorentz,G.G., A contribution to the theory of divergent series, Acta
Math.,(80)(1948),167-190.
[5] Mursaleen, Infinite matrices and almost convergent sequences, Southeast Asian Bulletin
of Math. 19(1)(1995),45-48.
[6] Nanda, S., Matrix transformations and almost boundedness, Glasnik Mat.,
14(34)(1979),99-107.
[7] Yasida, K., Functional Analysis, Springer-Verlag, Berlin Heidelberg, New York, 1966.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϭϭ
Ƭ
ǡ
ǡ
ǡ ǤǤǡ ǡ ͷͷǦͷǡ ͶͷͶǤ ȋǣ
ǡ
Ȍ
ZĞǀŝĞǁĞĚZĞƐĞĂƌĐŚWĂƉĞƌ
Authors: Syam Prasad Kuncham*,
Generalized Fuzzy Satyanarayana Bhavanari**, and Venkata
Subba Rao Gunda**
Ideals of Gamma Near- *: Department of Mathematics, Manipal
rings University, Manipal-576 104, India.
Ƭ
ǡ
Ƭ
ǡ
ǡ
ǡ
ǡ
ǡǤǤǡ
ǤǤǡǡ
ǡ
ͷͷǦͷǡ
ͷͷǦͷǡͶͷͶǤ
ͶͷͶǤȋǣ
ȋǣ
ǡ
Ȍ
ǡ
Ȍ
Abstract:
This paper describes new model for estimating terms weights in a Medline and Pubmed
documents and shows how the classification accuracy is improved with this method. The method
uses global relevant weight as term weighing schema .Experiments performed with different
weighing schemas shows that the new global weighing method outperforms the tradition term
weighing approaches.
1. Introduction:
Text Mining is the process to extract meaningful data from the text, and, thus, make the
information contained in the text accessible to the various data mining algorithms. Medline and
Pub med repositories are rich in medical literature. Automatic extraction of useful information
from these online sources remains a challenge because these documents are unstructured and
expressed in a natural language form i.e. in text format.
It is virtually impossible for researchers to obtain all the information that is important and
available for their work. There are several text mining approaches for handling the vast amount
of textual domain-specific information available, some of them are Document clustering , Text
classification .
The goal of Text classification is to build a set of models that can correctly predict the class of
the different text documents. The input to these methods is a set of documents (i.e., training
data), the classes which these documents belong to, and a set of terms describing different
characteristics of the documents. There are several classification systems, which will analyze
structured data from biomedical databases and unstructured data from open access abstracts and
full text documents and provide the voluble knowledge to doctors.[4].
• Document representation
• Term selection
• Term weighing
• Classifier learning.
Term weighing plays an important role in both classification and clustering. We propose new
Term weighing approach which improves accuracy of analysis (classification or clustering).
2 Document representations
Vector space model is used to represent Documents in n-dimensional space. Vector space model
uses term-document matrix. The representation of documents in this model is as follows
D=[d1,d2,d3,d4……dm]
di=(ti1,ti2,ti3,ti4,….tin)
where D indicates Total document set with m elements and di is set of n terms. Each term ti in jth
document identifies features of the documents. In the vector space model a document is located
as point in an n- dimensional vector space. Dimension is equal to the number of features (terms)
in the document set. The occurrence of term represents its proportional significance in
representing the document.
3. Term weighing
Term weighting is an important factor in the performance of information retrieval systems. Many
weighting methods have been developed within text search, and their variety is astounding..
Term weighing is the process of computing weight of every term in the document set. A
weighting scheme is composed of three different types of term weighting: local, global, and
normalization. Local weights are functions of how many times each term appears in a document,
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϮϭ
global weights are functions of how many times each term appears in the entire collection, and
the normalization factor compensates for discrepancies in the lengths of the documents.
There are many different local weight schemas available. Some of them listed in Table 1.
Formula NAME
Global weighting tries to give a “discrimination value” to each term. Many schemes are based on
the idea that the less frequently a term appears in the whole collection, the more discriminating it
is [6].
Phase 1: The document is tokenized for punctuation, special symbols and word abbreviations.
Common words are also removed.
The tf–idf weight (term frequency–inverse document frequency) is a weight often used text
mining. This weight is a statistical measure used to evaluate how important a word is to a
document collection The importance increases proportionally to the number of times a word
appears in the document but is offset by the frequency of the word in the corpus.
D
tf t , d × log
{d ∈ D t ∈ d }
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϮϮ
where tft,d is term frequency of term t in document d , | D | is the total number of documents in
the document set; {d ∈ D t ∈ d } is the number of documents containing the term t.
Global weight of term tij = local weight of term tij * max (Pi), where Pi is the probability of the
term tij belongs to class Ci.
5. Experimental Result:
In our experiment we used 1000 documents, collected from the Pubmed. We partitioned the
dataset into a training set of 600 and a test set of 400 documents. Sample document is showed in
fig1. Pmid is the identification number from the Pubmed. The documents are labeled by 4
categories, which represent the complications of Type 2 diabetes.
We used both local global weights to represent the documents in vector space. After applying the
classification algorithm we measured the effectiveness in terms of precision. Precision is the
fraction of the documents retrieved that are relevant to the user's information need. The results
are tabulated in table 2.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϮϯ
Schema Weighing method Precision
2. Local-Log 0.9452
The local weight combined with the global weight makes the difference. Our global weight
works well in document classification as its precision rate is high compared to other local
weighting schemas.
6. Conclusions:
The Term weighing schema plays an important role in document classification and in Text mining
applications. We proposed the global weight schema based on the probability of term relevance. Our
results show that the accuracy and precision are high when global relevant weight schema is used. We
experimented on Collection of diabetic literature from PUBMED.
References:
1. Dhillon I., Mallela S., Kumar R.,A Divisive Information-Theoretic Feature Clustering
Algorithm for Text Classification, Journal of Machine Learning Research 3, (2003) 1265-1287.
2. S.Sagar Imambi, T.Sudha - A Unified frame work for searching Digital libraries Using Document
Clustering –International Journal of Computational Mathematical ideas Vol 2-No1-(2010) 28-32
3. Nordiannah et.al-Term weighting Schemes Experiment Based on SVD for Malay Text retrieval-
International journal of Computer science and Network security , Vol 8.No.10, (2008).
4. Srinivasa K.G et.al –Feature Extraction using Fuzzy C-Means Clustering for Data mining systems
- International journal of Computer science and Network security Vol 6 No 3A (2006).
5. S.Sagar Imambi, T.Sudha-Clinical Decision Support System for Heart Patients-International
Journal of Computer Science, System Engineering and Information Technology, Vol 2-No2.
(2009) 165-169
6. W. B. Croft and D. J. Harper. Using probabilistic models of document retrieval without
relevance information. , J. Documentation, 35(4)( 1979) 285-295
7. S.Sagar Imambi, T.Sudha -.Building Classification System to Predict Risk factors of Diabetic
Retinopathy Using Text mining - International Journal on Computer Science and Engineering,
Vol. 02, No. 07 ( 2010 ,to print)
8. Christian Borgelt and Andreas Nurnberger-Experiments in Document clustering using Cluster
Specific Term weighing, Citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.4757& rep.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϮϰ
Ƭ
ǡ
ǡ
ǡ ǤǤǡ ǡ ͷͷǦͷǡ ͶͷͶǤ ȋǣ
ǡ
Ȍ
ZĞǀŝĞǁĞĚZĞƐĞĂƌĐŚWĂƉĞƌ
Authors: Satyanarayana Bhavanari* , Mohiddin Shaw
Sk.* and Vijaya kumara Arava** .
Prime Graph of an *: Department of Mathematics, Acharya Nagarjuna
University, Nagarjuna Nagar, Andhra Pradesh, India.
Integral Domain **: Department of Mathematics, J M J College, Tenali
(Guntur Dist), Andhra Pradesh, India
E-mail: bhavanari2002@yahoo.co.in,
mohiddin_shaw26@yahoo.co.in
Abstract
Satyanarayana, Syam Prasad and Nagaraju [ 10 ] introduced the concept ‘Prime Graph of R’
(denoted by PG(R)), where R is a given associative ring. Later it was studied by Satyanarayana,
Mohiddin Shaw, Mallikarjun and Pradeed Kumar [6] and constructed Prime Graphs related to
the ring of integers modulo n. The aim of this present paper is to study the concept of prime
graph of an integral domain and also to study the prime graph of the product ring R × ѐ2 where R
is an integral domain. We present necessary examples.
1. INTORDUCTION
The concept “prime graph” of an associative ring, which is defined by Satyanarayana, Syam
Prasad and Nagarajua [10] is a new bridge between “graph theory” and the algebraic concept
“ring theory”. This paper is a study the prime graph of integral domain. In the present paper we
continue the study in [6, 10]. This paper is divided into three sections. In the present Section-1,
we collect necessary definitions, and results from the literature that are used in the next sections.
Section-2 and 3 contains new theorems.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϮϱ
1.1 Definition: A non empty set R is said to be a ring (or an associative ring) if there exists two
binary operations + and . on R satisfying the three conditions: (i) (R, +) is an Abelian group; (ii)
(R, .) is a semi-group; and (iii) a.(b + c) = a.b + a.c, and (a + b).c = a.c + b.c for any a, b, c ∈ R.
More over, if a ring R satisfies the condition a.b = b.a for all a, b ∈ R, then we say that R is a
commutative ring. If R contains the multiplicative identity, then we say that R is a ring with
identity.
1.2 Definition: Let R be a ring, and φ ≠ I ⊆ R. Then (i) I is said to be a left ideal of R if I is a
subgroup of (R, +) and ra ∈ I for every r ∈ R, a ∈ I; (ii) I is said to be a right ideal of R if I is a
subgroup of (R, +) and ar ∈I for every r ∈ R, a ∈ I; and (iii) I is said to be an ideal (or two sided
ideal) of R if I is both left and right ideal.
1.4 Definition: An integral domain is a commutative ring with identity such that for any two
elements a and b of the ring, ab = 0 implies either a = 0 or b = 0.
1.5 Definitions: A linear graph (or simply a graph) G = (V, E) consists of a set of objects V
= {v1, v2,..} called vertices, and another set E = {e1, e2, …} whose elements are called edges
such that each edge ek is identified with an unordered pair (vi, vj) of vertices. vi and vj are called
the end points of ek. If V and E are finite sets then the graph G is said to be a finite graph. A
graph G is said to be a null graph if it contains no edges, that is E = φ. An edge connecting two
vertices u and v is denoted by vu or uv . A graph G is said to be simple if it contains no loops
and multiple edges. The number of edges incident to a vertex v is called the degree of the vertex
v, and it is denoted by d(v). Each maximal connected subgraph of a graph G is called a
component of the graph G. The distance between the two vertices x and y is denoted by d(x, y).
In this paper we consider only simple graphs.
A graph G = (V, E) is said to be a star graph if there exists a fixed vertex v such that
E = {vu / u ∈ V and u ≠ v}. A star graph is said to be n-star graph if the number of vertices in
the graph is n. A connected graph without circuits is called a tree. It is clear that every star
graph is a tree. (Th. 13.8, Page 347 [9]) A given connected graph G is an Euler graph if and only
if all the vertices of G are of even degree.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϮϲ
For further concepts related to Ring Theory and Graph Theory, we refer Herstein [1], Lambek
[2], Narsing Deo [3] and Satyanarayana & Syam Prasad [9].
1.7 Definition (Satyanarayana, Syam Prasad & Nagaraju [10]): Let R be a ring. A graph
G(V, E) is said to be a prime graph of R (denoted by PG(R)) if V = R and E = { xy / xRy = 0
or yRx = 0, x ≠ y}.
(i) Note that PG(R), when R = ѐn, 1 ≤ n ≤ 5 contains no triangles; and this graph is a star graph.
Ϭ
ϭ ϱ
&ŝŐ͘ϭ͘ϴ;ŝͿ W';ѐϲͿ
Ϯ ϰ
ϯ
Ϭ
ϭ ϳ
&ŝŐ͘ϭ͘ϴ;ŝŝͿ ϱ W';ѐϴͿ
Ϯ ϯ ϲ
ϰ
⇔ (There is no edge between any two non-zero vertices in PG(R)) and (there is an edge
between 0 and a for all a R) ⇔ PG(R) is star graph with centre ‘0’.
AN APPLICATION TO ѐp:
2.2 Theorem: Let p be a prime number. Then ѐp is a field and hence an integral domain.
PG(ѐp) is a star graph with number of vertices p and centre ‘0’. Conversely any star graph with
p vertices is isomorphic to the graph PG(ѐp).
Verification: From the Lemma 2.1, it follows that PG(ѐp) is a star graph with number of
vertices p and centre 0.
(a, b)⋅(c, d) = (a⋅c, b⋅d). Then R × ѐ2 becomes the product ring, and the zero element of R × ѐ2 is
(0, 0). Since (0, 0) v (1, 0) and (0, 0) v (0, 1) are two elements in R × ѐ2 with (1, 0)⋅(0, 1) =
(0,0). Therefore R × ѐ2 is not an integral domain.
;Ϭ͕ϬͿ ;Ϭ͕ϭͿ
&ŝŐͲϯ͘ϭ͗W';Z×ѐϮͿ
;ϭ͕ϭͿ
;ϭ͕ϬͿ
(i) It is clear from the diagram that PG(ѐ2 × ѐ2) = (4-star graph with centre (0, 0)) ∪ one
edge.
We verify this fact algebraically.
;Ϭ͕ϬͿ ;Ϭ͕ϭͿ
;ϭ͕ϬͿ ;Ϭ͕ϭͿ
;ϭ͕ϭͿ
;ϭ͕ϬͿ
&ŝŐͲϯ͘ϭ;ŝͿͲϮ͗'ƌĂƉŚͲ<
&ŝŐͲϯ͘ϭ;ŝͿͲϭ͗'ƌĂƉŚͲ,
(ii). Any graph of the form (4-star graph) ∪ {one edge} is isomorphic to PG(ѐ2 × ѐ2).
Ă Ě
&ŝŐͲϯ͘ϭ;ŝŝͿ
Đ
ď
3.2 Theorem: Let R be an integral domain with ¸ R¸ = n. Then PG(R × ѐ2) contains two
particular elements (0, 0) = a, (say), (0, 1) = b (say) such that ¸ V(PG(R × ѐ2))¸ = 2n and
PG(R × ѐ2) = [ the 2n-star graph with R × ѐ2 as vertex set and centre a] ∪ [the n-star graph with
vertex set { (x, 0) / 0 v x R} with centre b].
Proof: Since ¸ R × ѐ2¸ = ¨R ¸ × ¸ ѐ2 ¸ = (n). (2) = 2n we have that ¸ V(PG(R × ѐ2))¸ = 2n.
Writ a = (0, 0) and b = (0, 1). For any (0, 0) v (x, y) R × ѐ2 we have that (0, 0) (x, y) = (0.x,
0.y) = (0, 0). Thus there exists an edge between (0, 0) and (x, y), for all (0, 0) v (x, y) R
× Z2. Now H = (V1, E1) where V1 = R × ѐ2 and E1 = { (0, 0)( x, y ) / (0, 0) v (x, y) V}.
H is a 2n-star graph which is a subgraph of PG(R × ѐ2). Also note that product of (0, 1) and (x,
0) is equal to (0, 0) and so there is an edge between (0, 1) and (x, 0). Now write K = (V2, E2)
where V2 = { (0, 1) } ∪ {(x, 0) / 0 v x R } and E2 = { (0,1)( x, 0) / 0 v x R }, is a n-star
subgraph of PG(R × ѐ2).
Then a = (c, d) = (0, 0). In this case (c, d )( x, y ) = (0, 0)( x, y ) E(H) = E1.
Case (ii): Suppose c = 0 and y = 0. If d = 0 then (c, d )( x, y ) = (0, 0)( x, y ) E(H) = E1.
Case (iii): Suppose x = 0 and d = 0. If y = 0 then (c, d )( x, y ) = (c, 0)(0, 0) E(H) = E1.
Hence PG(R × ѐ2) = H ∪ K where H and K are subgraphs, H is 2n-star graph, K is a n-star
graph.
3.3 Note: In the proof of above theorem we arrived at two subgraphs H and K of
PG(R × ѐ2). We can state that E(H) ∩ E(K) = φ and a∉V(K).
3.4 Remark: The graph PG(R × ѐ2) where R an integral domain, satisfy the following
properties:
(iii) There exists a subgraph H of G such that H is a 2n-star graph (with centre a).
(iv) There exists a subgrph K of G such that K is a n-star graph (with centre b).
(v) G = H ∪ K.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϯϭ
Observe the converse statement of the above theorem. There arises the question “which type of
graphs are isomorphic to PG(R × ѐ2) where R is an integral domain. This will be an open
question.
The following theorem provides a partial answer.
3.5 Theorem: Suppose G is a graph satisfying the following conditions
(v) G = H* ∪ K*.
Proof: Given that ¸ V(G)¸ = 2p, where p is a prime number. Suppose that V(K*) = {b*,
x1 , x2 , …, x p −1 }. Since ¸ V(G)¸ = 2p and a* V(G) \ V(K*) there exists x p , x p +1 , … , x2 p − 2
such that V(G) = { a*, b* , x1 , x2 , …, x p −1 , x p , x p +1 , … , x2 p − 2 }. Given that H* is a 2p-star
graph with centre a*. So E(H*) = { a*b* } ∪ { a* xi / 1bib(2p-2)}. Given that K* is a p-star
graph with centre b*. So E(K*) = { b* xi / 1bib(p-1)}.
Now E(G) = E(H*) ∪ E(K*). We have to show that G ! PG (ѐP × ѐ2). Write R = ѐp. Since p is
prime, we have that R is an integral domain.
We follow the notation used in the proof of the Theorem 3.2
= { (0, 0)(i, 0) / 1bib(p-1)} ∪ { (0, 0)(i,1) / 0bib(p-1)}. H is a 2n-star graph which is a subgraph
of PG(ѐP × ѐ2). K = ((V2, E2) where V2 = { (0, 1)} ∪ { (i, 0) / 1bib(p-1)} and E2 =
{ (0,1)(i, 0) / 1bib(p-1)}. K is a n-star graph which is a subgraph of PG(ѐP × ѐ2). Also
PG(ѐP × ѐ2) = H ∪ K. Now define f : V(PG(ѐP × ѐ2) → V(G) by f((0, 0)) = a*, f((0, 1) = b*,
f( (i, 0)) = xi for 1bib(p-1), f((i, 1)) = x p +i −1 for 1bib(p-1).
(i) between H and H* ; (ii) between K and K* ; and (iii) between PG(ѐP × ѐ2) = H ∪ K and
H* ∪ K* = G. This completes the proof.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϯϮ
3.6 Example: Let p = 3 and consider R = ѐ3 and R × ѐ2 = ѐ3 × ѐ2. The diagram for
;ϭ͕ϬͿ
&ŝŐͲϯ͘ϲͲϭ͗
;ϭ͕ϭͿ
;Ϯ͕ϬͿ W';ѐϯ×ѐϮͿ
;Ϯ͕ϭͿ
;Ϭ͕ϭͿ
&ŝŐͲϯ͘ϲͲϮ͗'ƌĂƉŚ, ;Ϭ͕ϬͿ
&ŝŐͲϯ͘ϲͲϯ͗
'ƌĂƉŚ<
;ϭ͕ϬͿ ;ϭ͕ϬͿ
;ϭ͕ϭͿ
;Ϯ͕ϬͿ ;Ϯ͕ϬͿ
;Ϯ͕ϭͿ
;Ϭ͕ϭͿ ;Ϭ͕ϭͿ
Note that H is a 2p-star graph (that is 6-star graph), K is a 3-star graph, E(H)∩E(K) = φ and
PG(ѐP × ѐ2) = H ∪ K.
3.7 Example: Consider the graph G given in Fig-3.7(i).
ĂΎ
džϭ džϱ
džϮ džϲ
ĂΎ
džϯ džϳ
džϰ džϴ
džϭ džϱ
&ŝŐͲϯ͘ϳͲ;ŝͿ͗'ƌĂƉŚ' džϮ džϲ
džϯ džϳ
ďΎ
džϰ džϴ
ďΎ
&ŝŐͲϯ͘ϳͲ;ŝŝͿ͗'ƌĂƉŚ,Ύ
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϯϯ
džϭ
džϮ
džϯ
džϰ
ďΎ
&ŝŐͲϯ͘ϳͲ;ŝŝŝͿ͗'ƌĂƉŚ<Ύ
Now ¸ V(G)¸ = 2p, where p = 5, a prime number. H* is 10-star graph (2p-star graph with p = 5)
and a* is the centre. K* is 5-star graph with centre b*. G = H* ∪ K*. Thus G satisfies the
hypothesis of the Theorem 3.5, with p = 5, a prime number. Let us observe through this example
that G ! PG(ѐ5 × ѐ2). The graph for PG(ѐ5 × ѐ2) is given in Fig-3.7(iv)
;Ϭ͕ϬͿ
;ϭ͕ϬͿ ;ϭ͕ϭͿ
;Ϯ͕ϬͿ ;Ϯ͕ϭͿ
;ϯ͕ϬͿ ;ϯ͕ϭͿ
;ϰ͕ϬͿ ;ϰ͕ϭͿ
&ŝŐͲϯ͘ϳͲ;ŝǀͿ͗'ƌĂƉŚŽĨW';ѐϱ×ѐϮͿ
;Ϭ͕ϭͿ
Observe that f: V(PG(ѐP × ѐ2) → V(G) defined (as in the proof of Theorem 3.5 ) as follows:
f((0, 0)) = a*, f((0,1)) = b*, f((i, 0) = xi for 1bib4, f((1, 1)) = x5, f((2, 1)) = x6, f((3,1)) = x7, f((4,
1)) = x8. This f produces an isomorphism between the given graph G and PG(ѐ5 × ѐ2).
Conclusion: If R is an integral domain then it is proved that the related graph PG(R) is a star
graph with number of vertices ¸ R¸. This concept applied and observed for ѐp (as ѐp is an
integral domain). The prime graph of the product ring R × ѐ2 was studied and proved that it is
equal to the disjoint union of two star graphs. A partial converse to this result was obtained.
Necessary examples were presented.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϯϰ
Acknowledgements
The third author thanks the University Grants Commission (UGC), SERO, Hyderabad, for
providing financial assistance under the grant No. F.MRP-3129/09(MRP/UGC-SERO), Sept,
2009.
References
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϯϱ
Ƭ
ǡ
ǡ
ǡ ǤǤǡ ǡ ͷͷǦͷǡ ͶͷͶǤ ȋǣ
ǡ
Ȍ
ZĞǀŝĞǁĞĚZĞƐĞĂƌĐŚWĂƉĞƌ
On Fuzzy Continuous
Authors: Mamta Singh* and Yashveer Singh**,
Functions in Intuitionistic *: Department of Mathematical Sciences and
Computer Applications, Bundelkhand
Fuzzy Topological Spaces University, Jhansi (UP), India
Abstract:
The purpose of this paper is to introduce several types of fuzzy continuity between intuitionistic
fuzzy topological spaces; namely fuzzy somewhat continuity, fuzzy almost-somewhat continuity,
fuzzy weakly-somewhat continuity.
Keywords and phrases: Intuitionistic fuzzy set, intuitionistic fuzzy topological space,
intuitionistic fuzzy regular open set, fuzzy somewhat continuity, fuzzy almost-somewhat
continuity, fuzzy weakly-somewhat continuity.
AMS subject classification: 54A40
1. Introduction
The concept of fuzzy sets was introduced by Zadeh [7]. In [1, 2, 3, 4,] Atanassov introduced the
fundamental concept intuitionistic fuzzy sets. Later, this concept was generalized to intuitionistic
L-fuzzy sets by Atanassov-Stoeva [2, 3]. On the other hand Coker [3] introduced the notion of
intuitionistic fuzzy topological spaces, fuzzy continuity and some other related concepts. In this
paper, we introduced fuzzy somewhat continuity, fuzzy almost-somewhat continuity, fuzzy
weakly-somewhat continuity. Then we give definitions of several types of somewhat continuity
and counter-example between intuitionistic fuzzy topological spaces.
Let X be a set and I = [0,1]. IX denote the set of all mappings λ: X → Y. A member of IX is
called a fuzzy subset of X. Unions and intersections of a fuzzy set denoted by ∨ and ∧
respectively are defined by
2. Preliminaries
Definition 2.1 [4] Let X be a nonempty fixed set. An intuitionistic fuzzy set (IFS for short) A is
an object having the form
where the functions µA : X→ I and ȖA : X→ I denote the degree of membership (namely µA(x))
and the degree of nonmebership (namely ȖA(x)) of each element x ∈ X to the set A,
respectively , and 0 µA(x) + ȖA(x) 1 for each x ∈ X. For the sake of simplicity, we shall use
the symbol A = <x, µA,ȖA> for the IFS A ={<x, µA(x), ȖA(x)> : x ∈ X}.
Definition 2.2 [4] Let X be a nonempty set and the IFS’s A and B be in the form
Definition 2.3 [5] (a) If B = {<y, µB(y), ȖB(y)> : y ∈ Y} is an IFS in Y, then the preimage of B
under f denoted by f-1(B), is the IFS in X defined by
(b) If A = {<x, ȜA(x), ȞA(x)> : x ∈ X}, is an IFS in X, then the image of A under f denoted by
f(A) is the IFS in Y defined by
f(A) = {<y, f(ȜA )(y), f - (ȞA)(y)> : y ∈ Y}, where f - (ȞA) = 1 – f(1 - ȞA).
Definition 2.4 [5] An intuitionistic fuzzy topology (IFT for short) on a nonempty set X is a
family τ of IFS’s in X satisfying the following axioms :
(T1) 0~, 1 ∈ τ,
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϯϳ
(T2) G1 ∩ G2 ∈ τ for any G1, G2 ∈ τ,
In this case the pair (X, τ) is called an intuitionistic fuzzy topological space (IFTS for short) and
each IFS inτ is known as an intuitionistic fuzzy open set (IFOS for short) in X .
Definition 2.5 [5] The complement Ɩ of an IFOS A in an IFTS (X, τ) is called an intuitionistic
fuzzy closed set (IFCS for short) in X.
Definition 2.6 [5] Let (X, τ) be an IFTS and A = <x, µA(x), ȖA(x)> be an IFS in X. Then the
fuzzy interior and fuzzy closure of A are defined by
Definition 3.1 [5] f is said to be fuzzy continuous if the preimage of each IFS in ij is an IFS in τ.
Definition 3.2 [6] A function f is called a fuzzy almost continuous function, if for each
intuitionistic fuzzy regular open set A of Y, f -1(A) ∈ τ.
Definition 3.3 [6] The following are equivalent:
(a) f is a fuzzy almost continuous function,
(b) f -1(B) is an IFCS, for each intuitionistic fuzzy regular closed set B of Y,
Then the family τ = {1~, 0~, G1, G2} of IFS’s in X is an IFT on X and the family ij = {1~, 0~, U1,
U2} of IFS’s in Y is in IFT on Y. If we define the function f: X ĺY by f(a) = 2, f(b) = 3, f(c) = 1,
then
f -1(U1) = <x, (a/.4, b/.5, c/.5), (a/.4, b/.3, c/.4)> 0~
int(f -1(U1)) = G1 0~.
f -1(U2) = <x, (a/.2, b/.4, c/.4), (a/.4, b/.5, c/.5)> 0~
int(f -1(U2)) = G2 0~.
Thus f is fuzzy somewhat continuous, but not fuzzy continuous since
f -1(U2) = <x, (a/.2, b/.4, c/.4), (a/.4, b/.5, c/.5)> בIJ.
Definition 4.3 A function f is said to be fuzzy almost somewhat continuous if for any IFOS A in
Y for which f -1(A) 0~ we have int(f-1(int(cl(A))) 0~.
A fuzzy somewhat continuous function is always fuzzy almost somewhat continuous. But the
converse is not true in general.
Example 4.4 Let X = {a, b, c}, Y = {1, 2, 3} and
G1 = <x,(a/.5,b/.5,c/.4),(a/.4,b/.3,c/.4)>, G2 = <x,(a/.5,b/.35,c/.4),(a/.4,b/.5,c/.5)>,
U1 = <y,(1/.5,2/.6,3/.5),(1/.4,2/.4,3/.3)>, U2 = <y,(1/.4,2/.5,3/.4),(1/.5,2/.4,3/.5)>.
Then the family τ = {1~, 0~, G1, G2} of IFS’s in X is an IFT on X and the family ij = {1~, 0~, U1,
U2} of IFS’s in Y is in IFT on Y. If we define the function f : X ĺY by f(a) = 1, f(b) = 3, f(c) =
2, then
f -1(U1) = <x, (a/.5, b/.5, c/.6), (a/.4, b/.3, c/.4)> 0~
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϯϵ
int(f -1(int(cl(U1)) )) = 1~ 0~.
f -1(U2) = <x, (a/.4, b/.4, c/.5), (a/.5, b/.5, c/.4)> 0~
int(f -1(int(cl (U2)))) = 1~ 0~.
Thus f is fuzzy almost somewhat continuous, but not fuzzy somewhat continuous, since
int(f -1(U1) ) = G1 0~, int(f -1(U2) ) = 0~.
Corollary 4.5 Every fuzzy almost continuous function is also fuzzy almost somewhat
continuous.
Proof: Let A be an IFOS of Y such that f -1(A) 0~. Since f is fuzzy almost fuzzy continuous by
theorem 3.3 f -1(A) كint(f -1(int(cl(A)))). On the other hand, we obtain int(f -1(int(cl(A)))) 0~
from f -1(A) 0~. This show that f is fuzzy almost somewhat continuous.
It is shown in the following example that the converse of the above corollary is not true, in
general.
Example 4.6 Let X = {a, b, c}, Y = {1, 2, 3} and G1 = <x,(a/.4,b/.4,c/.5),(a/.4,b/.4,c/.4)>,
G2 = <x,(a/.2,b/.4,c/.3),(a/.5,b/.5,c/.5)>,
U1 = <y,(1/.3,2/.2,3/.4),(1/.3,2/.35,3/.4)>, U2 = <y,(1/.3,2/.2,3/.5),(1/.2,2/.2, 3/.4)>.
Then the family τ = {1~, 0~, G1, G2} of IFS’s in X is an IFT on X and the family ij = {1~, 0~, U1,
U2} of IFS’s in Y is in IFT on Y. If we define the function f : X ĺY by f(a) =2, f(b) = 3, f(c) = 1,
then
f -1(U1) = <x, (a/.2, b/.4, c/.3), (a/.35, b/.4, c/.3)> 0~
int(f -1(int(cl(U1)) )) = G2 0~.
f -1(U2) = <x, (a/.2, b/.5, c/.3), (a/.2, b/.4, c/.2)> 0~
int(f -1(int(cl(U2)))) = 1~ 0~.
Thus f is fuzzy almost somewhat continuous, but not fuzzy almost continuous, since for U1 ⊂ Y
IFROS
Then the family τ = {1~, 0~, G1, G2} of IFS’s in X is an IFT on X and the family ij = {1~, 0~, U1,
U2} of IFS’s in Y is in IFT on Y. If we define the function f: X ĺY by f(a) = 1, f(b) = 3, f(c) = 2,
then
f -1(U1) = <x, (a/.5, b/.5, c/.4), (a/.4, b/.3, c/.4)> 0~
int(f -1(cl(U1)) )) = 1~ 0~.
f -1(U2) = <x, (a/.4, b/.4, c/.2), (a/.5, b/.5, c/.4)> 0~
int(f -1(cl (U2)))) = G2 0~.
Thus f is fuzzyweakly somewhat continuous, but not fuzzy almost somewhat continuous, since
int(f -1(int(cl(U1) ))) = 1~ 0~
int(f -1(int(cl(U2) ))) = 0~.
Corollary 4.9 Every fuzzy weakly continuous function is also fuzzy weakly somewhat
continuous.
Proof. Let A be an IFOS of Y such that f -1(A) 0~. Since f is fuzzy weakly continuous by
definition 2.4. we have f -1 (A) كint (f -1(cl(A))). On the other hand, we obtain int(f -1(cl(A)))
0~ from f -1(A) 0~ This show that f is fuzzy weakly somewhat continuous.
It is shown in the following example that the converse is not true, in general.
Example 4.10 Refer to example 4.8. Then f is fuzzy weakly somewhat continuous, but not fuzzy
weakly continuous, since f -1(U2) فint(f -1(cl(U2))).
References
[1] K. Atanassov, Intuitionistic Fuzzy Sets, VIIITKR’s Session, Sofia, 1989, (Bulgaria).
[2] K.Atanassov, S.Stoeva, Intuitionistic Fuzzy Sets, Polish Symposium on Interval and Fuzzy
Mathematics,Poznan, 1983,23-26.
[3] K.Atanassov, S.Stoeva,Intuitionistic L-FuzzySets,Cybernetics and System
Research(1984),539-540.
[4] K. Atanassov, Intuitionistic Fuzzy Sets, Fuzzy Set and System 20(1986) 87-96.
[5] D.Coker, An Introduction to Intuitionistic Fuzzy Topological Spaces, to appear in Fuzzy Sets
and Systems.
[6] H. Gurcay, A.H. Es, and D.Coker, On Fuzzy Continuity Intuitionistic Fuzzy Topological
Spaces, to appear in The Journal of Fuzzy Mathematics.
[7] L.A. Zadeh, Fuzzy Sets, Information and Control, 18 (1965) 338-353.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϰϭ
Ƭ
ǡ
ǡ
ǡ ǤǤǡ ǡ ͷͷǦͷǡ ͶͷͶǤ ȋǣ
ǡ
Ȍ
ZĞǀŝĞǁĞĚZĞƐĞĂƌĐŚWĂƉĞƌ
Authors: Satyanarayana Bhavanari* and
Shakira Sk.**,
Gamma Rings and *: Department of Mathematics, Acharya
Abstract
In this paper, we collect some results related to the concepts: Γ-ring, ideal of a Γ-ring,
Γ-homomorphisms, m-system, prime ideal, g-system, prime radical. Finally, in the last section,
we present the proof of a new theorem: If M, M1 are two Γ-rings, f: M → M1 a Γ-epimorphism
and S ⊆ M, then S is an m-system in M ⇔ f(S) is an m-system in f(M).
1. Introduction
Historically, the first step towards Γ-rings was taken by Nobusawa 1964 and the next step was
taken by Barnes 1966. Γ-rings of Barnes were much studied. Many authors studied the system
Γ-ring in different aspects. The radical theory in Γ-rings was studied by several authors like
Booth, Godloza, Satyanarayana, Pradeep Kumar and Srinivasa Rao.
This paper is divided into three sections. In Sections 1 and 2, we provide a collection of well
known related definitions, examples and some results related to these concepts in Gamma Ring
Theory. In Section-3, we study the concept m-systems, and proved a new theorem related to m-
systems in Gamma rings.
In this section, first, we present the definition of Γ-ring and related examples. The definition of
Γ-ring in the sense of Nobusawa [1964] is as follows:
1.1 Definition : Let M be an additive group whose elements are denoted by a, b, c, ... and Γ
another additive group whose elements are α, β, γ, ... . Suppose that aαb is defined to be an
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϰϮ
element of M and that αaβ is defined to be an element of Γ for every a, b, α and β. If the
products satisfy the following three conditions for every a, b, c ∈ M, α, β ∈ Γ: (i) (a + b)αc
= aαc + bαc; a(α + β)b = aαb + aβb; aα(b + c) = aαb + aαc;
(ii) (aαb)βc = aα(bβc) = a(αbβ)c; and (iii) If aαb = 0 for all a and b in M, then α = 0,
1.2 Definition: Let M and Γ be additive Abelian groups. M is said to be a Γ-ring if there exists
a mapping M x Γ x M → M (the image of (a, α, b) is denoted by aαb) satisfying the following
conditions (i) and (ii):
(i) (a + b)αc = aαc + bαc; a(α + β)b = aαb + aβb; aα(b + c) = aαb + aαc; and
The concept Γ-ring in the sense of Barnes is a generalization of the concept Γ-ring in the sense of
Nobusawa. Several authors preferred to study the Γ-ring in the sense of Barnes.
Henceforth, all Γ-rings considered (in this paper) are Γ-rings in the sense of Barnes. A natural
example of a Γ-ring can be constructed in the following way:
1.3 Example (Barnes [ 1 ]): Let (X, +), (Y, +) be two Abelian groups. Write M = Hom(X, Y),
Γ = Hom(Y, X). M and Γ are additive Abelian groups with respect to the usual addition of
mappings. (That is (f + g)(x) = f(x) + g(x) for all x ∈ X).
1.5 Example: Let M be any additive non Abelian group. Take Γ = {0}. Define aαb = a0b =
0M and αbβ = 0b0 = 0Γ for all a, b ∈ M, α, β ∈ Γ. Then it is easy to verify that M is a Γ-ring.
1.6 Example: Suppose M be a right R-module and suppose there exists m ∈ M such that (0:m)
= 0. Take Γ= HomR(M, R). Define aγb = a.γ(b) for all a, b ∈ M, γ ∈Γ. Then it is easy to verify
that M is a Γ-ring.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϰϯ
1.7 Example: Let U, V be vector spaces over the same field F. Write M = Hom(U, V), Γ =
Hom(V, U). Then M is a Γ-ring with respect to point wise addition and composition of
mappings.
1.10 Definition: Let M be a Γ-ring and I an ideal of M. Consider M/I = {x + I / x ∈ M}, the
quotient group of M with respect to the addition subgroup I. Define (x + I)γ(y + I) = xγy + I for
all x, y ∈ M and γ ∈ Γ. Then M/I becomes a Γ-ring. It is called as quotient Γ- ring of M with
respect to the ideal I.
1.12 Theorem (Barnes [1]): (i) If M, M1 are Γ-rings and f: M → M1 is a Γ-homomorphism, then
ker f = {x ∈ M / f(x) = 0} is an ideal of M.
1.15 Definition: An ideal P of M is said to be a prime ideal if for any two ideals A, B of M,
AB ⊆ P A ⊆ P or B ⊆ P.
1.16 Theorem (Barnes [1]): An ideal P of a Γ-ring M is prime if and only if C(P) = M\P is an m-
system.
1.17 Theorem (Barnes [1]): If I and P are ideals of a Γ-ring M, I ⊆ P and P is prime, then P/A is
prime in M/A. Conversely, if P1 is a prime ideal of M/A and f: M→ M/A is the canonical Γ-
epimorphism, then P = f –1(P1) is a prime ideal of M.
1.18 Definition: Let A be an ideal of M. The prime radical of A (denoted by r(A)) is defined as
the set of all elements x of M such that every m-system containing x contains an element of A.
The prime radical of M is defined as the prime radical of the zero ideal.
1.19 Result (Barnes [1]): If A is any ideal of the Γ-ring M, then the prime radical r(A) is equal to
the intersection of all prime ideals containing A.
2. g-Systems
In this section we present the definitions: ideal mapping g, g-system, g-prime ideal and g-prime
radical. We also present some results related to these concepts.
2.1 Definition (Hsu [ 5 ]): Let M be a Γ-ring. We define g as a function of M into the family of
all ideals of M satisfying the following two conditions: (i) a ∈ g(a); and (ii) x ∈ g(a)+A
g(x) ⊆ g(a)+A for any element a ∈ M and for any ideal A of M. We fix such an ideal mapping g
on M.
Proof: Let x ∈ M. x ∈ g(0) + (x) g(x) ⊆ g(0) + (x). Since 0, x ∈ g(x) + (0) we have g(0)
⊆ g(x) + (0) = g(x) and (x) ⊆ g(x) + (0). So g(0) + (x) ⊆ g(x) + (0) = g(x).
2.4 Note: (i) Let P be a prime ideal M\P is an m-system (by Theorem 1.16) M\P is a g-
system (by Definitions 2.3) P is a g-prime ideal;
(ii) The converse of (i) is not true. (For this observe the following Example 2.5).
The following example provides an example of a g-prime ideal which is not prime.
2.5 Example: Let M = ѐ, the set of all integers and Γ = { 0, ± 2, ± 4, ... }. Clearly M is a Γ-
ring. Let P = ¢32². We define g(a) = ¢{a, 2n}² for all a ∈ M where n is a fixed positive integer.
Let S1 = { 2, 22, 23, ... }. Now as in Example 2.3.2 (ii), we can verify that S1 is an m-system.
Let x ∈ M\P. Then 2 n ∈ g(x) ∩ S1. Hence M\P is a g-system with kernel S1. Therefore P is a
g-prime ideal. Clearly ¢3² ¢3² ⊆ ¢32² = P. But ¢3² ⊆ P. Therefore P is not a prime ideal. Thus
we conclude that P is a g-prime ideal but not a prime ideal.
2.6 Lemma (Hsu [5]): For any g-prime ideal P, a, b ∈ M we have that g(a)g(b) ⊆ P a ∈ P or
b ∈ P.
2.7 Definition: The set {x ∈ M / every g-system containing x contains 0} is called the g-prime
radical of M. It is denoted by rg(M).
2.8 Theorem (Hsu [5]): rg(M) = the intersection of all g-prime ideals of M.
2.9 Lemma (Satyanarayana [9]): If A is an ideal of M containing g(0), then the following two
conditions are equivalent: (i) A is prime; and (ii) A is g-prime.
2.10 Theorem (Satyanarayana [9]): If A is an ideal of M, then either rg(A) = A or rg(A) = r(A).
Moreover, rg(M) = (0) or rg(M) = r(M).
2.11 Theorem (Satyanarayana [9]): If r(M) ≠ 0, then the following two conditions are
equivalent: (i) rg(M) = r(M); and (ii) every g-prime ideal is a prime ideal.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϰϲ
1. Some Results on m-systems
In this section, we obtain some new results on m-systems. For proving our main theorem, we
prove three lemmas. We start this section with the following lemma.
3.1 Lemma: Suppose f: M → M1 is a Γ-epimorphism from the Γ-ring M onto the Γ-ring M1. If
a ∈ M, then f(¢a²) = ¢f(a)² .
Proof: Let a ∈ M. Then f(a) ∈ M1. Since ¢f(a)² is an ideal of M1, by Theorem 1.12, we have
that f –1(¢f(a)²) is also an ideal of M. Now f(a) ∈ ¢f(a)² a ∈ f –1(¢f(a)²) ¢a² ⊆ f –1(¢f(a)²)
(since f –1(¢f(a)²) is an ideal) f(¢a²) ⊆ ¢f(a)². Now we prove the other part. Since ¢a² is an
ideal of M, by Theorem 1.12, we have that f(¢a²) is an ideal of M1. Now f(a) ∈ f(¢a²) and f(¢a²) is
an ideal ¢f(a)² ⊆ f(¢a²). Hence ¢f(a)² = f(¢a²).
Proof: Let S be an m-system in M. We have to show that f(S) is an m-system in M1. To verify
that f(S) is an m-system, take a1, b1 ∈ f(S). Since f is onto there exist a, b ∈ S such that f(a) = a1,
f(b) = b1. Since S is an m-system and a, b ∈ S, there exist a* ∈ ¢a², γ ∈ Γ, b* ∈ ¢b² such that
a*γb* ∈ ¢a² ¢b² ∩ S. Now a* ∈ ¢a² f(a*) ∈ f(¢a²) ⊆ ¢f(a)² (by Lemma 3.1) = ¢a1² Similarly
f(b*) ∈ ¢f(b)² = ¢b1² . Now f(a*)γf(b*) ∈ ¢a1² ¢b1². Also f(a*)γf(b*) = f(a*γb*) (since f is Γ-ring
homomorphism)∈ f(S) (since a*γb* ∈ S). Therefore f(a*)γf(b*) ∈ ¢a1² ¢b1² ∩ f(S). Now we
proved that a1, b1 ∈ f(S) implies that ¢a1² ¢b1² ∩ f(S) ≠ φ. This shows that f(S) is an m-system in
M1. The proof is complete.
3.3 Lemma: Let M, M1be two Γ-rings. If S* is an m-system in f(M) = M1, then f -1(S*) is an m-
system in M.
Proof: Let S* be an m-system in f(M). Now we have to verify that f –1(S*) is an m-system in M.
To verify this, let a, b ∈ f -1(S*). Now f(a), f(b) ∈ S*. Since S* is an m-system, it follows that
¢f(a)² ¢f(b)² ∩ S* ≠ φ f(¢a²) f(¢b²) ∩ S* ≠ φ (by the above Lemma 3.1) f(a1)γf(b1) ∈ S* for
some a1 ∈ ¢a², b1 ∈ ¢b², γ ∈ Γ f(a1γb1) ∈ S* (since f is Γ-homomorphism) a1γb1 ∈ f -1(S*)
¢a² ¢b² ∩ f -1(S*) ≠ φ (since a1 ∈ ¢a² and b1 ∈ ¢b²). Therefore f -1(S*) is an m-system. The
proof is complete.
Acknowledgements: The first author acknowledges the financial assistance from the UGC, New
Delhi under the grant F. No.34-136/2008 (SR) dated 30th December 2008.
References:
[1] BARNES W.E "On the Γ-rings of Nobusawa" Pacific J. Math 18 (1966) 411-422.
[2] BOOTH G.L "A Contribution to the Radical Theory of Gamma Rings". Ph. D, Thesis, University of
Stellenbosch, South Africa,1985.
[3] BOOTH G.L. & GODLOZA L "On Primeness and Special Radicals of Γ-rings", Rings and radicals,
Pitman Research notes in Math series (contains selected lectures presented at the international
conference on Rings and Radicals, held at Hebei, Teachers University, Shijazhuang, Chaina, August
1994) pp 123-130.
[4] FACCHINI ALBERTO "Module Theory", Progress in Mathematics, Vol.167, Birkhäuser Verlag,
Switzerland, 1998.
[5] HUS D.F "On Prime Ideals and Primary Decompositions in Γ-rings", Math. Japonicae, 2 (1976) 455-
460.
[6] NOBUSAWA "On a Generalization of the Ring theory" Osaka J. Math. 1(1964) 81-89.
[7] PRADEEP KUMAR T.V. "On g1-γ-Prime Left Ideals and related Prime Radical in Γ-rings", M.
Phil., dissertation, Acharya Nagarjuna University, 1998.
[8] SATYANARAYANA BHAVANARI "A Note on Γ-rings" Proc. Japan Acad. 59-A (1983) 382-33.
[9] SATYANARAYANA BHAVANARI "A Note on g-prime Radical in Gamma rings", Quaestiones
Mathematicae, 12(4) (1989) 415-423.
[10] SATYANARAYANA BH., PRADEEP KUMAR T.V. & SRINIVASA RAO M. "On Prime Left
Ideals in Gamma rings", Indian J. Pure and Appl. Math. 31(6) (2000) 687-693.
[12] WIEGANDT RICHARD "Radical Theory of Rings", The Mathematics Student 51 (1983)145-185.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϰϴ
Ƭ
ǡ
ǡ
ǡ ǤǤǡ ǡ ͷͷǦͷǡ ͶͷͶǤ ȋǣ
ǡ
Ȍ
ZĞǀŝĞǁĞĚZĞƐĞĂƌĐŚWĂƉĞƌ
Reaction of Urdbean
Authors: B. Re. Victor Babu*, K. Rajya
Genotypes on Growth in Lakshmi* and G. Raghavaiah**
*:Department of Statistics, Acharya Nagarjuna
Rainfed Vertisols of University, Nagarjuna Nagar-522 510, Andhra
Pradesh.
Andhra Pradesh – A Case **: Regional Agricultural Research Station,
Acharya N.G. Ranga Agricultural University,
Lam, Guntur-522 034 (Andhra Pradesh)
Study
Abstract
A Field experiment was conducted during Kharif (rainy) season in rain fed vertisols of Regional
Agricultural Station (RARS), LAM, Guntur (A.P.) to study the “Reaction of different genotypes
of Urdbean to leaf curl and Yellow mosaic virus” to elicit the information on relative
resistance/tolerance to the biotic agents. Eighteen genotypes of Urdbean were tested by using
Randomized Block Design with three replications. The data on Leaf curl, and Yellow mosaic
virus were tested (or) subjected to analysis of variance using ‘34’ error degrees of freedom. Leaf
curl on eighteen genotypes of Urdbean did not differ significantly. The growth of the genotypes
in terms of Yellow mosaic virus differs significantly from each other. Among the eighteen
genotypes tested, OBG33 is least susceptible to Yellow mosaic virus followed by NDU3-5 and
KUG50 and COBG672.
Introduction
India is the largest producer and consumer of Pulses in the world accounting for 25% of Global
production, 27% of Global consumption. It is also the importer with 11% share of world imports
during 1995-2001. The percapita availability of pulses has declined from 69 grams/day, in 1961
to 36 grams a day in the recent times, in a country.
Andhra Pradesh is one of the major pulses producing state in the country. Pulse crops are subject
to attack by more than 150 species of insects both in field and storage, 25 species cause serious
damage. Among them thrips are the major groups of insect pests causing damage both by direct
feeding and transmitting leaf curl disease caused by Peanut bud necrosis virus.
Identification of genotypes resistant to thrips and viral diseases is considered a better eco-
friendly option for their management. Keeping in view this important component of integrated
pest/disease managements, effects were made to screen genotypes of Urdbean (18) to identify
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϰϵ
promising resistant/or tolerant genotypes under natural infestation. Therefore, a field trial was
conducted at regional research station, Lam with the following objectives.
1. To study the Reaction of Urdbean genotypes to Leaf curl and Yellow mosaic virus.
2. It was carried the information on relative resistance/tolerance to the biotic agents during
Kharif.
TREATMENTS:
1. NDU-3-4 2. COBG-662 3. COBG-653 4.LBG-20
The biometric data thus collected on Urdbean genotypes were subjected to analysis of variance
as per Randomized Block Design as given by Gomez and Gomez (1784).
ANOVA TABLE:-
Sources of Degrees of Sum of Squares Mean Sum of F calculated F tabulated
Variation freedom Squares
Replications (r-1) R R1 = R/(r-1) R1/E1 F((r-1),*)
Total (rt-1) T. S. S.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϱϬ
σோమ
Where R = Replicate Sum of Squares ൌ െ ܿǤ ݂Ǥ
௧
σ்ೕమ
T = Treatment Sum of Squares ൌ െ ܿǤ ݂Ǥ
Leaf curl:
Total number of plants in each row and number of leaf curl infected plants in each row were
counted and the percentage of leaf curl infected plants per each genotype was computed.
Conclusions:
2. Leaf curl did not affect the growth of the yield.
3. Yellow mosaic virus affects the growth of the yield.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϱϭ
References:
1. All India Co-ordinate Pulses Improvement Project, Annual Progress report for
1981-1982, Punjab Agricultural University, Ludhiana.
2. Amin P.W. (1985). Apparent resistance of ground cultivar ROBUT 33-1 to
Bud necrosis disease.
3. Chhabra K.S. and Kooner B.S. (1998). Insect Pest Management (IPM) in Mungbean
and Black gram and strategies. In IPM system in agriculture, Pulses limited, New
Delhi.
4. Cochran W.G. and Cox G.M. (1957). Experimental Designs, John Wiley & sons,
INC, New York.
5. Das, M.N. and Giri N.C. (1986). Design and Analysis of Experiments, Wiley Eastern
Limited, India.
6. Kalpana G, Vijaya Lakshmi K, Retna Sudhakar T, and Ramesh T (2002). Evaluation
of rice Agriculture against rice thrips, stenches to thrips biform is bagnall. Indian
Journal of Plant Protection, Vol.30, No.1, Page No.81-83.
7. Ranga Swamy R. (1995). A Text book of Agricultural Statistics, Wiley Eastern
Private limited, India.
TREATMENTS R1 R2 R3 R1 R2 R3
NDU3-4 16.32 19.46 32.33 41.32 37.94 53.73
COBG662 30.00 22.22 29.93 45.00 57.67 52.24
COBG653 25.77 17.56 21.97 42.30 39.11 37.17
LBG20 43.74 21.13 23.73 33.46 34.82 36.33
TU-6 13.81 18.34 22.46 43.34 53.73 18.24
TU-17-14 20.70 22.22 27.90 20.70 28.59 54.09
OBG33 16.11 18.72 17.85 18.72 13.05 14.54
LBG752 25.62 33.71 19.91 25.70 36.03 38.94
VALLABH 22.55 24.80 23.73 59.02 61.00 56.79
KUG50 19.09 22.55 26.99 19.09 10.14 30.98
TU-17-19 24.50 25.03 24.50 33.83 42.82 29.40
COBG-26 34.02 27.69 20.27 39.58 31.31 16.43
OBG32 35.24 19.46 28.04 32.96 28.11 33.09
PANT-2-3 28.59 16.74 22.22 42.53 64.38 22.22
NDU3-5 24.12 29.00 21.39 16.74 23.81 18.44
LBG623 45.00 38.65 34.33 30.00 19.28 37.11
COBG672 26.13 24.43 31.88 47.75 49.08 36.21
COBG671 17.76 17.76 23.73 01.62 08.53 56.98
Original values of Leaf curl and Yellow mosaic virus are transformed by using Arc sin values.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϱϮ
In Table-1 we present the converted values, The original data is presented (Table-2) as follows
and it is presented in Parenthesis.
Null Hypothesis:
H01: There is no significant difference between replications.
H02: There is no significant difference between treatments.
)7DEXODWHG
Mean Sum
Calculated
of Squares
Sources of
variation
freedom
Squares
Sum of
value
F
9DOXH
Leaf Yellow Leaf Yellow Leaf Curl Yellow Leaf Curl Yellow
Curl mosaic Curl mosaic virus mosaic mosaic
virus virus virus
Replic 2 2 0093.56 0083.94 46.7801 41.9643 1.4797 0.2770 3.5546
ates
Treatm 17 17 1150.57 6626.73 67.6805 389.8078 2.1408 2.5726 2.4563
ents
Error 34 34 1074.91 5151.73 31.6149 151.5215
Total 53 53 2319.04 11862.39
CONCLUSION:
Leaf Curl:
As F Calculated value is less than the F table value at 5% level of significance with (2,34)
degrees of freedom, so we conclude that there is no significant difference among replications.
As F Calculated value is less than the F table value at 5% level of significance with (17,34)
degrees of freedom, so we conclude that there is no significant difference among treatments.
TABLE: 2
Leaf Curl Yellow mosaic virus
TREATMENTS R1 R2 R3 R1 R2 R3
NDU3-4 (7.9) (11.1) (28.6) (43.6) (37.8) (65)
COBG662 (25) (14.3) (24.9) (50) (71.4) (62.5)
COBG653 (18.9) (9.1) (14) (45.3) (39.8) (36.5)
LBG20 (47.8) (13) (16.2) (30.4) (32.6) (35.1)
TU-6 (5.7) (9.9) (14.6) (47.1) (65) (9.8)
TU-17-14 (12.5) (14.3) (21.9) (12.5) (22.9) (65.6)
OBG33 (7.7) (10.3) (9.4) (10.3) (5.1) (6.3)
LBG752 (18.7) (30.8) (11.6) (18.8) (34.6) (39.5)
VALLABH (14.7) (17.6) (16.2) (73.5) (76.5) (70)
KUG50 (10.7) (14.7) (20.6) (10.7) (3.1) (26.5)
TU-17-19 (17.2) (17.9) (17.2) (31) (46.2) (24.1)
COBG-26 (31.3) (21.6) (12) (40.6) (27) (8.0)
OBG32 (33.3) (11.1) (23.1) (29.6) (22.2) (30.8)
PANT-2-3 (22.9) (8.3) (14.3) (45.7) (81.3) (14.3)
NDU3-5 (16.7) (23.5) (13.3) (8.3) (16.3) (10)
LBG623 (50) (39) (31.8) (25) (10.9) (36.4)
COBG672 (19.4) (17.1) (27.9) (54.8) (57.1) (34.9)
COBG671 (9.3) (9.3) (16.2) (0.8) (2.2) (70.3)
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϱϰ
Ƭ
ǡ
ǡ
ǡ ǤǤǡ ǡ ͷͷǦͷǡ ͶͷͶǤ ȋǣ
ǡ
Ȍ
^ƵƌǀĞLJƌƚŝĐůĞ
English Vocabulary
Development-An Authors: T. S. V. S. Suryanarayana Murthy,
Ganita Avadhani & S.A. Maths, Mukteswaram-
Experiment through 533 211, Ainavilli Mandal, E.G. Dist., Andhra
Pradesh.
I. INTRODUCTION:
Enriching knowledge of vocabulary and the ability to spell those words are significant tasks of
teaching English as a foreign language in our schools. Besides routine teaching of those
vocabulary skills in the class, integration of English vocabulary with teaching of other core
subjects whenever there is chance and if possible, through play way, reinforces children’s
learning of English vocabulary. School mathematics is one subject which can provide such
opportunity. Such integrated teaching can serve two purposes, firstly it takes away the
monotony of learning mathematics; secondly it reinforces what has been learnt in English
language periods or can give a prior feel of some of the vocabulary items before they are
introduced in regular English periods.
II. AIM:
The purpose of this paper is to share with teachers and teacher educators a few ideas regarding
the scope of integrating English vocabulary development with the teaching of a few topics in
school mathematics which was born out of experience while demonstrating the teaching of
‘sets’, a topic for 8th standard to B.Ed. trainees.
This is not strictly an empirical study. This is rather a quasi experimental one indicating the
possibility of integrated teaching of English with other subjects, and its advantages and
establishing feasibility of sound experimental study by those who are interested in this area.
III. EXPANSION OF VOCABULARY:
Vocabulary means the words that we use in day to day life for expressing our feelings and
thoughts. Learning a language is not merely learning words, but yet we cannot speak a language
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϱϱ
unless we know its words. H.W. Beecher says, “ words are pegs to hang ideas on.” Pupils
should do not restrict themselves to a limited vocabulary but on the other hand, should increase
their vocabulary. Word building is an ability that all the pupils should acquire and be as efficient
and skilled as to making their own acquisition an asset to them. The English language teacher
can employ a number of exercises to help pupils enlarge their vocabulary. Language games
play a significant role in the expansion of vocabulary of any language. So is the case with
English language also. Voluntary involvement, healthy competitive spirit, thrill and pleasure are
the principles of a game. Any language learning activity, which possesses these characteristics,
can be called a language game. The following is an example of English Language games.
Eg: Find the word: In this game, the teacher writes a word ‘postpone’ on the board. Then he
will ask the students to find out the words hidden in this word. He may initially work out an
example of how they can write a new word using some of the letters in the given word as for
instance, ‘stop’. Similarly from the word ‘postpone’ , words like post, stop, one, top, pot, pose,
tone, etc. can be formed. The student who writes the largest number of words will be the winner.
In the above paragraphs, part of the work of an English teacher for the development of
vocabulary is described. Even a mathematics teacher can play a vital role in the development of
vocabulary , while applying mathematical principles. He can combine mathematics exercises
with language games by substituting letters for numbers etc. Exercises in “sets” serves as good
example.
IV. SETS:
The main principles of ‘sets’ are given hereunder.
Set : A set is well defined collection of objects.
Element : The objects in the set are called elements or members of the set.
Describing a set : It is customary to name a set by capital letters such as A,B,X, etc.
In order to define a set all the elements of the set are written in a row,
separated by commas and then enclosed in braces. { }. The elements of
a set are represented with small letters such as a,b,c, etc.in the case of
letters. The elements are represented by numbers also.
the elements which occur more than one time. The set of letters given
The letters in the word mathematics. The collection of letters in the above word consists simply
eight distinct letters m, a, t, h, e, i, c, s. Here in the word ‘mathematics’ the letters m, a, t occur
more than one time and hence are dropped.
If a set N = {o, n, w} is given, a student can write – now, own, won. Mathematically these
words are equal sets as each word consists of all the elements of the given set.
When a set is given, it is possible to prepare a list of meaningful words using the elements
(letters) one at a time or more than once. The mathematics teacher’s role in the development of
English vocabulary starts at this point. Encouraging the students to write as many meaningful
words as possible is the primary duty of the mathematics teachers, which in turn develops the
vocabulary of his students.
The idea came into the mind during a demonstration lesson in mathematics. The demonstration
lesson was being given to the B. Ed. trainees of the 2001-2002 batch. The pupils were 8th
standard students of the practicing school of the College of Education where the author is
working. The topic was “SETS”. The pupils being taught the lesson were a group of 16 boys and
24 girls.
Observing the steps of mathematics lesson, as usually key concepts of the topic, ‘sets’ were
introduced. A little practice was also given to the students using numbers and letters as
elements of sets. At this stage, the students were found somewhat restless. Then the author got
the idea of releasing the students from the monotony of learning sets, strictly as a mathematics
lesson. Then the students were told that they would play a game. Two exercise items of sets in
letters, each consisting of four sub-items, were displayed to the class, which are given below:
VII. ITEMS:
I. Write meaningful words from the following sets using all the elements of each set
once only.
(a) {a, r, t} (b) {a, e, t} (c) {a, e, m, t} (d) { a, d, e, r}
II. Write as many meaningful words as possible from the following sets using the
elements one at a time or more than once, of each set.
87.5% of boys wrote the word ‘read’ where as the girls % is 62.55
6.25% of boys wrote the word ‘dare’ where as the girls % is 37.53
81.25% of boys wrote the word ‘dear’ where as the girls % is 70.89
Table-5
ear are era area rare rear arrear
boys 10 12 6 0 1 0 0
% 62.5 75 37.5 0 6.25 0 0
girls 21 17 0 0 2 4 0
% 87.57 70.89 0 0 8.34 16.68 0
total 31 29 6 0 3 4 0
% 77.5 72.5 15 0 7.5 10 0
62.5% of boys wrote this word ‘ear’ where as the girls % is 87.57
75% of boys wrote the word ‘are’ where as the girls % is 70.89
37.5% of boys wrote the word ‘era’ where as the girls % is 0
0% of boys wrote the word ‘area’ where as the girls % is also 0
6.25% of boys wrote this word ‘rare’ where as the girls % is 8.34
0% of boys wrote the word ‘rear’ where as the girls % is 16.68
0% of boys wrote the word ‘arrear’ where as the girls % is also 0
Table-6
east eats sate seat state taste tease attest estate
boys 5 1 0 0 1 1 0 0 0
% 31.25 6.25 0 0 6.25 6.25 0 0 0
girls 18 0 0 1 3 0 0 0 0
% 75.06 0 0 4.17 12.5 0 0 0 0
total 23 1 0 1 4 1 0 0 0
% 57.5 2.5 0 2.5 10 2.5 0 0 0
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϲϬ
31.25% of boys wrote this word ‘east’ where as the girls % is 75.06
6.25% of boys wrote the word ‘eats’ where as the girls % is 0
0% of boys wrote the word ‘sate’ where as the girls % is also 0
0% of boys wrote the word ‘seat’ where as the girls % is 4.17
6.25% of boys wrote this word ‘state’ where as the girls % is 12.5
6.25% of boys wrote the word ‘taste’ where as the girls % is 0
0% of boys wrote the word ‘tease’ where as the girls % is also 0
0% of boys wrote the word ‘at least’ where as the girls % is also 0
0% of boys wrote the word ‘estate’ where as the girls % is also 0
Table-7
87.5% of boys wrote this word ‘leap’ where as the girls % is 91.66
12.5% of boys wrote the word ‘pale’ where as the girls % is 8.34
0% of boys wrote the word ‘peal’ where as the girls % is also 0
50% of boys wrote this word ‘plea’ where as the girls % is 0
6.25% of boys wrote the word ‘apple’ where as the girls % is 58.38
0% of boys wrote the word ‘appeal’ where as the girls % is also 0
0% of boys wrote the word ‘palea’ where as the girls % is also 0
Note: Only % comparisons are made statistical significance between these two persons is not
established.
To find out the effect of this technique of integrated teaching on the students, the next day, the
same class was taken again and the students were asked to work out the same exercise items.
The answer sheets were collected and scanned. Surprisingly it was found that all most all the
students wrote all possible words for all the eight sets, including the zero words in the tables.
Hence this information is not presented in tables for comparison with the first time exercise
results given in tables 1 to 8. It is presumed that because of the new situation, because of the
play way, and because of peer learning possibility, the students could acquire new words and
retain them in their memory. By this, the author felt that the initial idea is practicable and useful;
and it is feasible to conduct a thorough experimental study to confirm it.
At this stage the following advantages can be stated which are due to the integrated teaching
technique.
1. It gives variety to the teaching –learning of mathematics.
2. Mathematical exercises can be made pleasant by integrating them with language games
like word building.
3. Vocabulary items picked up by the students during the practice are retained well by them.
ϰ͘ There is scope for team teaching. For better results, Mathematics and English teachers
should plan the exercises together.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϲϮ
Ƭ
ǡ
ǡ
ǡ ǤǤǡ ǡ ͷͷǦͷǡ ͶͷͶǤ ȋǣ
ǡ
Ȍ
^ƵƌǀĞLJƌƚŝĐůĞ
Cryptography and Security Authors: Swati Joglekar
Introduction:
Security administration can be costly and prone to error because administrators usually specify
access control lists for each user on the system individually. With RBAC security is managed at
a level that corresponds closely to organisations structure. Each user is assigned one or more
roles and each role is assigned one or more privileges that are permitted to users in that role.
Security administration with RBAC consists of determining the operations that must be executed
by persons in particular jobs and assigning employees to the proper roles.
Complexities introduced via mutually exclusive roles or role hierarchies are handled by the
RBAC software making security administration easier.
Field of security is a challenging field as technology changes everyday. There is a need to secure
computers and networks from the hackers by developing new algorithms. Cryptography is an art
of achieving security by encoding messages to make them not readable. Plaintext refers to
message (data) to be sent. When the plaintext message is codified using any suitable scheme, the
resulting message is called ciphertext. The process of encoding plaintext messages into
ciphertext messages is called encryption. Decryption is exactly opposite of encryption.
Decryption transforms a ciphertext message back into plaintext. Every encryption and decryption
process has two aspects, the algorithm and key used for encryption and decryption.
Cryptographic mechanisms are of two types , Symmetric and Asymmetric key cryptosystems
(Public key Cryptosystem). Cryptography plays major role in many information technology
applications like electronic mail, electronic banking, and electronic commerce.
The locks and keys technique combines features of access control lists and capabilities. A piece
of information (the lock) is associated with the object and a second piece of information (the
key) is associated with those subjects authorized to access the object. When a subject tries to
access an object, the subject’s set of keys is checked. If the subject has a key corresponding to
any of the object’s locks, access of the appropriate type is granted. Locks and keys may change
in response to system constraints, general instructions about how entries are to be added and any
factor other than a manual change. Cryptographic implementation of locks and keys is
suggested. The object o is enciphered with a cryptographic key. The subject has deciphering
key. To access the object, the subject deciphers it. This provides a simple way to allow n
subjects to access the data (or-access). Encipher n copies of data using n different keys, one per
subject. The object o is then represented as o’ , where o’ = ( E1(o),E2(o),……,En(o)). The
system can easily access except on the request of n subjects (and –access).Iterate the cipher
using n different keys, one per subject: o’ = E1(E2(……(En(o))……).
5%$&&RQFHSW
8VHU$
Network Backup
File
System Mgt.
Mgt. Recovery ÂÂÂÂ 8VHU&
8VHU%
'HOHJDWLRQRI UHVSRQVLELOLWLHV
*UDQXODULW\
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϲϰ
Users are said to be the owners of the objects under their control. For many organisations end
users do not own the information for which they are allowed access.
Access priorities are controlled by the organisation and are often based on employee functions
rather than data ownership. In many organisations the processes are unclassified but have
sensitive information. In these environments security objectives often support higher level
organisational policies which are derived from existing laws, ethics, regulations or generally
accepted practices. Such environments usually require the ability to access information
according to how that information is labelled based on its sensitivity.
(OHPHQWVRI 5%$&
$XWKRUL]DWLRQV
² 0HFKDQLVPWRJUDQWDFFHVVWR
FRPPDQGVRUFHUWDLQIXQFWLRQDOLW\
5ROHV
² $FRQWDLQHUIRUDXWKRUL]DWLRQVWKDW
FDQEHDVVLJQHGWRDXVHU
3ULYLOHJHV
² 3URFHVVDWWULEXWHWKDWDOORZVSURFHVV
WRE\SDVVDVHFXULW\UHVWULFWLRQ
With role based access control, access decisions are based on the roles that individual users have
as part of an organization. The process of defining roles should be based on a through analysis
of how an organization operates and should include input from a wide spectrum of users in an
organization
Using RBAC users are granted membership into roles based on their competencies and
responsibilities in the organisation. The operations that a user is permitted to perform are based
on the user’s role. Roles can have overlapping responsibilities and privileges; user’s belonging
to different roles may need to perform common operations. Role hierarchies can be established
to provide for the natural structure of an organisation. A role hierarchy defines roles that have
unique attributes and that may contain other roles (one role may implicitly include the
operations that are associated with another role)
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϲϱ
5%$&)UDPHZRUN
6WHSVWRXVH5%$&
$XWKRUL]DWLRQLVFUHDWHGWRDOORZDFFHVVWRDFRPPDQG
PNDXWK DXWKBQDPH
$VHWRI DXWKRUL]DWLRQVDUHFROOHFWHGLQWRDUROH
PNUROH DXWKRUL]DWLRQV DXWKBQDPH UROHBQDPH
5ROHVDUHDVVLJQHGWRDXVHU
FKXVHU UROHV UROHBQDPH XVHU
8SGDWHWKHNHUQHOVHFXULW\WDEOHV
8VHUDFWLYDWHVUROHWRXQORFNFRPPDQGDFFHVV
VZUROH UROHBQDPH
RBAC allows carrying out a broad range of authorized operations and providing great flexibility
and breadth of application.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϲϲ
+RZWRPDNHQHZDSSOLFDWLRQVXVH5%$&"
)LQGRXWWKHSULYLOHJHVUHTXLUHGE\WKHDSSOLFDWLRQ
D)URPURRWORJLQVHWVHFDWWU ²FDFFHVVDXWKV QIVBDXWK HXLG XVUVELQQIV
E)URPQRUPDOXVHUORJLQWUDFHSULY ²HI QIV ²D
39B'$&B:39B)6B&+2:1
0DNHDQHQWU\IRUWKHDSSOLFDWLRQFRPPDQGLQHWFVHFXULW\SULYFPGV
)URPURRWORJLQVHWVHFDWWU ²FDFFHVVDXWKV QIVBDXWK
LQQDWHSULYV 39B'$&B:39B)6B&+2:1
VHFIODJV )6)B(36
XVUVELQQIV
&UHDWH $VVLJQQHFHVVDU\UROHVWRXVHUV
VHWNVW
5XQWKHDSSOLFDWLRQIURPQRUPDOXVHUORJLQ
%RRNV 5HIHUHQFHV
KWWSZZZOLQX[MRXUQDOFRPDUWLFOH
KWWSZZZUHGERRNVLEPFRPDEVWUDFWVVJKWPO
KWWSILQGDUWLFOHVFRPSDUWLFOHVPLBP,.=LVBBDLB
KWWSZZZOLQX[FRPIHDWXUH
KWWSFVUFQLVWJRYJURXSV616UEDF
6(/LQX[ LPSOHPHQWV0XOWL/HYHO6HFXULW\
)HGRUD&RUH5HG+DW(QWHUSULVH/LQX[
&U\SWRJUDSK\DQG1HWZRUN6HFXULW\E\$WXO .DKDWH
,QWURGXFWLRQWR&RPSXWHU6HFXULW\E\0DWW%LVKRSDQG9HQNDWUDPDQD\\D
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϲϳ
Ƭ
ǡ
ǡ
ǡ ǤǤǡ ǡ ͷͷǦͷǡ ͶͷͶǤ ȋǣ
ǡ
Ȍ
^ƵƌǀĞLJƌƚŝĐůĞ
1. Introduction:
Use of mathematical models increase the performance of any process. We can adopt the
mathematical models in the fields like: data mining, text mining, and Business Intelligence. This
will increase awareness of domain knowledge to researchers. Data mining is the automated
discovery of strategic hidden patterns in large amounts of data using intelligent data analysis
methods [1]. The data mining revolution started with large volume data storage became cheaper
and analysis technology became more advanced. The two primary goals of data mining tend to
be prediction and description. Prediction involves some variables or fields in the data set to
predict unknown or future values of other variables of interest. Description focuses on finding
patterns describing the data that can be interpreted by humans. In this paper, we are presenting
some predictive data mining and text mining models.
2. Predictive models:
Predictive analysis is data mining technology that uses our data to build a predictive model
specialized for our domain. This process learns from the collective domain information. The
Knowledge gained is encoded as the predictive model itself. This knowledge and information
can be represented in various formats like number format for example mean, median, mode,
count or it could be in a graphical format such as histogram, line, pie chart, trend lines or moving
averages.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϲϴ
WƌĞĚŝĐƚŝǀĞ
ĂŶĂůLJƐŝƐǁŝƚŚ
ĂƚĂ ĂƚĂŵŝŶŝŶŐ
WƌĞĚŝĐƚŝǀĞ
ŵŽĚĞů
Predictive Data Mining combines database analysis with multivariate statistics and artificial
intelligence. In recent years, predictive data mining has become an essential tool for strategic
decision making among several fields of applications. In business applications predicting future
customer behavior, classifying customer segments and forecasting events are some of
applications. There are many techniques like regression and classification for predictive data
analysis. Mapping the problem into a mathematical model requires some intellectual talent. We
have to carefully choose right model for right problem.
3. Classification:
In a classification, we are given historical data with class labels and unlabeled data. Each labeled
example consists of multiple independent attributes and one target attribute as dependent
attribute. The value of the target attribute is a class label. The unlabeled examples consist of the
independent attributes only. The goal of classification is to construct a model using the historical
data that accurately predicts the class of the unlabeled examples. The historical data with class
labels is considered as train data and data without the class labels is called as test data. Different
classification algorithms use different techniques for finding relations between the predictor
attributes' values and the target attribute's values in the build data. A classification model can
also be used on build data with known target values, to compare the predictions to the known
answers; such data is also known as test data or evaluation data. This technique is called testing a
model, which measures the model's predictive accuracy. Some of Classification techniques are
Logistic Regression, Bayesian Methods, Discriminate Analysis, Neural Net, kNN, CART
ϯ͘ϭdĞdžƚůĂƐƐŝĨŝĐĂƚŝŽŶ͗
Many automated prediction methods exist for extracting patterns from sample cases in text
mining, specifically text categorization. The documents are encoded in terms of features in some
numerical form, requiring a transformation from text to numbers. For each case, a uniform set of
measurements on the features are taken by compiling a dictionary from the collection of training
documents. Prediction methods look at samples of documents with known topics, and attempt to
find patterns for generalized rules that can be applied to new unclassified documents. Once the
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϲϵ
data is in a standard encoding for classification, any standard data mining method, such as
decision trees or nearest neighbors, can be applied.[2].
Algorithms based on neural networks have lot of applications. In Data mining generally the
following neural networks architectures are used. 1) Multi layered Feed forward and 2) Kohonen
self organizing maps. Feed-forward networks regards the perception back-propagation model
and the function network as representatives, and mainly used in the areas such as prediction and
pattern recognition. Self-organization networks uses adaptive resonance theory (ART) model and
Kohonen model as representatives, and mainly used for cluster analysis.
Neural networks are a proven technology for solving complex classification problems. Credit
companies often deploy neural networks to spot fraudulent credit card activity and identity
theft. Other companies deploy neural networks to identify defecting customers in order to
maximize their customer retention.
Neural networks are used to discover marketing opportunities, segment customers and to
discover more complex relationships in your data. With this technology, we can develop more
accurate and effective predictive models for better decision-making.
4. Regression
Regression creates predictive models. The difference between regression and classification is
that regression deals with numerical/continuous target attributes, whereas classification deals
with discrete or categorical target attributes. If the target attribute contains continuous values, a
regression technique is required. If the target attribute contains categorical values, a classification
technique is called for. Some of regression models are Linear Regression, kNN, CART, Neural
Net. The most common form of regression is linear regression, in which a line that best fits the
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϳϬ
data is calculated, that is, the line that minimizes the average distance of all the points from the
line. This line becomes a predictive model when the value of the dependent variable is not
known; its value is predicted by the point on the line that corresponds to the values of the
independent variables for that record. The support vector machine has the baseline form of a
linear discriminator.
K Nearest Neighbor is one of those algorithms that are very simple to understand .The kNN
algorithm predicts the outcome y for an example x by finding the k labeled examples (xi, yi)
closest to x and returning: the average outcome of y. kNN can be used for both Classification and
regression.
CART builds classification and regression trees for predicting continuous dependent variable
(regression) and categorical predictor variables (classification). The classic CART algorithm was
popularized by Breiman et al. (Breiman, Friedman, Olshen, & Stone, 1984)[1]. CART is
powerful because it can deal with incomplete data, multiple types of features like input features
and predicted features. The trees it produces often contain rules which are humanly readable. The
basic CART building algorithm is a greedy algorithm in that it chooses the locally best
discriminatory feature at each stage in the process. This is suboptimal but a full search for a fully
optimized set of question would be computationally very expensive.
• Identify Infrastructure
Text mining can be used to identify the elements of the infrastructure of a technical
discipline. These infrastructure elements are the authors, journals, organizations and other
group or facilities that contribute to the advancement and maintenance of the discipline.
• Geospatial,
Data mining techniques are used to handle spatiotemporal data, robust geographic
concept hierarchies and granularities, and sophisticated geographic relationships,
including non-Euclidean distances, direction, connectivity, attributed geographic space
and constrained interaction structures [6]
• Technology Forecasting
In the process of retrieving and relating useful text data, text mining can also provide the
time series for trend extrapolation. It can be used to identify state-of-the-art Research &
Development (R&D) emphases.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϳϭ
• Telecommunications:
Data mining techniques are used to billing, fraud detection and consumer marketing. of
data
Conclusion: We studied the various predictive data mining models and presented them in
this paper. These new concepts are beginning to guide to build models for various problems in
the fields of banking, Business, Telecommunication, Geospatial and literature mining e.t.c.
References:
[1] Jiawei Han and Micheline Kamber, Data Mining: Concepts and Techniques, Kaufmann
Publishers ( 2006)
[2] A Roadmap to Text Mining and Web Mining. http://www.cs.utexas.edu/users/pebronia/text-
mining/
[3] Jeffrey W. Seifert, Data Mining an Over View , CRS Report for Congress(2004)
[4] Brigitte Mathiak and Silke EcksteinFive Steps to Text Mining in Biomedical Literature
Proceedings of the Second European Workshop on Data Mining and Text Mining in
Bioinformatics(2003)
[5] Shannon R. Anderson, The Dangers of Using Data Mining Technology to Prevent
Terrorism(2002)
[6] Y. W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing,web
application code by static analysis and runtime protection. In Proceedings, of the 13th conference
on World Wide Web, (2004.),pp 40-52.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϳϮ
Ƭ
ǡ
ǡ
ǡ ǤǤǡ ǡ ͷͷǦͷǡ ͶͷͶǤ ȋǣ
ǡ
Ȍ
^ƵƌǀĞLJƌƚŝĐůĞ
Introduction: The Vedas are the earliest records of human wisdom. Vedas consist of the output
related to the results of continuous observations and research of the earlier mankind during the
period approximately 6000 BC – 19000BC. Thus Vedas consists of prehistoric bulk of records
those carry, then believed scientific statements pertaining to several branches of sciences
including mathematics. In particular, Vedic Mathematics is the mathematical knowledge of
ancient Hindus passed down through generations (initially verbally) in the form of hymn/slokas
(verses) in Sanskrit.
Four Parts of the Veda: The Veda was divided into four parts by Sage Veda Vyasa in around
3000BC. The parts are called 1. Rig Veda. 2. Yajur Veda, 3. Sama Veda and 4. Atharvan
Veda. We treat the whole Vedic literature as single unit.
Development of Number system in Vedas: The Rig-Veda contains some statements in the form
of hymn that are related to the fractions.
Jyestha aha camasa dva (1/2) karoti kaniyan trin (1/3) kunavametyaha
kanistha aha caturas karoti (1/4) tvasta ubha vastat panayad vaco vah
(Rig-Veda/mandala-4/Sukta 33/Mantra 5)
The Yajur Veda contains some concepts related to Arithmetic and Geometric Progressions. The
concept of digits to the extent of several millions, can be clearly seen in all the Vedas.
Zero and Infinity: Zero as a member of the numerical system and zero as a symbol of
emptiness, both can be inferred in the philosophical context of the Vedic literature.
The concept of infinitely big (Ananta) and infinitesimal (Paramanu) entities are very much
available in the Vedas.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϳϯ
In the Upanishad entitled “Taittiriya Upanishad”, there presents a hymn ‘anoran i yam mahato
mahiyan’ which means that the Almighty is as big as a ‘Ananta’ (infinity) and as small as
Paramanu (atom). The same concepts were later adopted in mathematics as infinity and zero.
The Yajur Veda contains the following hymn.
Let us consider the set of all even natural numbers. This set is
2 = { 2, 4, 6, 8, ….}, again infinity. Suppose we take all the even natural numbers from the set
of all natural numbers. Then the remaining set is
Note that it appears that 2 is half of , but the modern set theory explains that the number of
elements in N is same as the number of elements in 2. The same meaning was available in this
hymn.
Conclusion: The authors made an attempt to explain few concepts related to the number system
that available in the earlier records: Vedas.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϳϰ
Key words: Vertical duct, Porous medium, Brinkman model, Galerkin FEM.
___________________________________________________
Ideals and Modules in Rings U.Suryakumar and
Abstract: In this paper we study one of the most A. Satyanarayana
important aspects of rings namely ideals, discussion Department of Mathematics,
of prime and maximal ideals and various properties Akkineni Nageswara Rao College,
of these are investigated. We also describe the Gudivada-521301, A.P.
characterization for Jacobson radical ring. Also we
shall formulate and study modules over rings and Email: asnmat1969@yahoo.in
quotient modules. We prove that if Mƍ be a .
submodule of A-module M then there is an order
preserving one to one correspondence between the
submodules of M containing Mƍ and submodule of
M/Mƍ. We also explain the basic properties of Artinian and Noetherian rings.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϳϱ
Normalization of fuzzy s-ideals of
Seminearrings P.Venu Gopala Rao,
Department of Mathematics,
Abstract: In this Paper, the algebraic system
Seminearring has been considered, which is a Andhra Loyola College
generalization of both a semiring and a nearring. (Autonomous), Vijayawada- 520
The normal fuzzy s-ideal of a seminearring with 008, Andhra Pradesh
absorbing zero has been introduced which is
Email:
analogue as that defined for rings, semirings. A venugopalparuchuri@gmail.com
necessary and sufficient condition for a fuzzy s-
ideal of a seminearring to be normal is obtained
and some related results are proved.
_____________________________________________________________________
Abstract: This paper concerns the importance of Graph Theory in teaching. . Concepts
and notations from discrete mathematics are useful in studying and describing objects and
problems in branches of computer science, such as computer algorithms, programming
languages, cryptography. Graph theory plays an important role in several areas of
computer science such as switching theory and logic design, artificial intelligence,
computer graphics, operating systems etc
V. Manjula,
In writing this paper I was guided by my
experience and interest in teaching Discrete B E D Dept., MIC College of
mathematics and and Graph theory the Technology, Kanchikacherla,
motivation is I have been teaching this subject
to computer science and MCA students Email:
manju_adiraju@yahoo.co.in,
Important findings: 1) In mathematics and
computer science, graph theory is the study of ph no: 9948233772
graphs: mathematical structures used to model
pairwise relations between objects from a
certain collection. 2) Graphs especially trees, binary trees are used widely in the
representation of data structures 3)The term graph is used to denote the diagram of
a real valued function=f(x) but in Graph theory we use the term graph as an
object Method of derivation is procedure given in the text books with necessary
formulae and their application.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϳϲ
Graphs and their Applications
What are graphs? Graphs are diagrams that represent systems of connections or inter-
relations among two or more things by a number of distinctive dots, bars or lines. Also,
graphs denote a series of points discrete or continuous, as in forming a curve or surface
that represents a value of a given function. By the help of graphs, a certain data can be
effectively represented. Thereby, it is possible to easily grasp the true significance of a
set of figures. Further, by means of graphs, dry and uninteresting statistical facts can be
presented attractively. Furthermore, graphical representation of data is appealing and
evokes interest in people. Above all, graphs
enable people to easily understand difficult Pokkuluri Suryaprakash,
theories in various subjects including
economics. Graph theory is applied in different Former Lecturer, S.C.I.M.
Government Degree College,
areas like linguistics, social sciences, computer Tanuku, West Godavari District,
science, physics, chemistry and biology. Thus, Andhra Pradesh.
graphs with their different applications are very
useful to people in different walks of life. The
need of the hour is (1) to encourage the
study of graphs, in particular & mathematics, in general, (2) to enable people to
understand different related subjects & their applications in a better light and (3) to make
the best use of them in the present modern world.
____________________________________________________________________
__________________________________________________________________
_________________________________________________________
__________________________________________________________________
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϳϵ
Main Results:
1. Any Wheel Wn (n 4) is Strong semi-complete but not Super Strong semi-complete.
2. For n 4 , Kn is Super Strong semi-complete.
3. For any n 5 , Kn –{e},where ‘e’ is any edge of Kn, is Super Strong semi-complete.
4. Characterization for a semi-complete graph to be a) Weak semi-complete, b) Strong
semi-complete, c) Super Strong semi-complete, are obtained.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 180
S= 1 0 1 0 1 0 1 0 1 0
Fig.1. Computer representation of sets U and S.
_______________________________________________
Fuzzy Submodules and Fuzzy Author: Kavitha Nellore,
Dimension in Modules over Department of Mathematics,
Associative Rings Acharya Nagarjuna University
Abstract: We discuss the existing concepts ͘
and results related to fuzzy Submodules and fuzzy dimension in Modules over
Associative Rings.
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϴϭ
Ƭ
ǡ
ǡ
ǡǤǤǡǡͷͷǦͷǡͶͷͶǤȋǣ
ǡ
Ȍ
Divisible Fuzzy Authors: Ramana Murty N.V., and Mariadas M.,
Department of Mathematics, Andhra Loyola
College, Vijayawada-520008. Email:
Subgroups raman93in@gmail.com
Abstract
This paper makes an attempt to study Divisible Fuzzy Subgroups. It is clear about the concept of divisible
groups in the crisp abelian group theory. In group theory, Divisibility is the most important and basic
concept which led to the development of Purity and Pure-injectivity. Therefore, it is necessary to study
this concept in case of Fuzzy Algebra also. Basic concepts and some of the interesting properties of
divisible fuzzy subgroups have been studied. Throughout this paper, all groups are to be considered as
additive abelian groups, and X denotes a non-empty set. All the notations and basics followed from [1].
1. Basic concepts
Definition 1.1: A function from a set X into the closed interval [0,1] is known as Fuzzy subset of
X and the set [0,1]X is referred to as the Fuzzy power set of X.
Definition 1.2: Suppose Y ⊆ X and a ∈ [0,1]. Then the set aY ∈ [0,1]X is defined as
a for x ∈ Y
aY ( x ) = ® In particular, if Y is singleton, say {y},
¯0 for x ∈ X \ Y .
then a{ y} is known as a Fuzzy point or Fuzzy-singleton and it is denoted by ya .
Definition 1.4: Suppose µ ∈ [0,1]X . Then, the set { x | x ∈ X , µ ( x ) > 0} is called the support of µ
and is denoted by µ * .
Definition 1.5: Let G be an abelian group. Then, a Fuzzy subset µ of G is called a Fuzzy
subgroup of G if µ ( x + y ) ≥ µ ( x ) ∧ µ ( y ) , ∀ x, y ∈ G and µ ( − x ) ≥ µ ( x ) ∀ x ∈ G. The set of all
Fuzzy subgroups of G are denoted by [0,1]G .
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϴϮ
Definition 1.6: A Fuzzy subgroup µ is called divisible if for all xa ⊆ µ with 0 < a ∈ [ 0,1] , and
for all n ∈ `, there exists ya such that ya ⊆ µ and n ( ya ) = xa .
2. Main Results
Lemma 2.1: A Fuzzy subgroup µ of a group G is divisible if and only if µ a is divisible for all
a ∈ {a | 0 < a ≤ µ ( 0 )} .
Proof: Suppose µ is divisible. Therefore, for all xa ⊆ µ with 0 < a ∈ [ 0,1] , and for all n ∈ `,
there exists ya such that ya ⊆ µ and n ( ya ) = xa . Since 0 < a ≤ µ ( 0 ) , the equation ny = x is
solvable in µ a for all n ∈ ` . Hence µ a is divisible. Conversely suppose that µ a is divisible. So,
the equation ny = x is solvable in µ a for all n ∈ ` . This implies the equation n ( ya ) = xa is
solvable in µ for all n ∈ ` , since 0 < a ≤ µ ( 0 ) . Hence µ is divisible. Ŷ
Lemma 2.2: If a Fuzzy subgroup µ of a group G is divisible, then its support µ * is divisible.
Proof: Suppose µ is divisible. Therefore, for all xa ⊆ µ with 0 < a ∈ [ 0,1] , and for all n ∈ `,
there exists ya such that ya ⊆ µ and n ( ya ) = xa . Therefore x ∈ µ * and so there exists y ∈ µ *
such that ny = x. Hence µ * is divisible. Ŷ
Lemma 2.3: If µ is a Fuzzy subgroup of a group G, its support µ * is divisible and µ is constant
on µ * \{0}, then µ is divisible.
Proof: Suppose µ * is divisible and µ is constant on µ * \{0}. Let xa ⊆ µ with a > 0 and n ∈ `.
Since µ * is divisible, for x ∈ µ * there exists y ∈ µ * such that x = ny. So, if y = 0, then x = 0.
Therefore, the result is true. Let y ≠ 0. Since µ is constant on µ * \{0} and a > 0 , we have
µ ( y ) = µ ( x ) ≥ a, by definition of µ * . Thus, ya ⊆ µ and xa = n ( ya ) . Hence µ is divisible.Ŷ
Lemma 2.4: If µ is any Fuzzy subgroup of a group G, then for all x, y ∈ G and n ∈ ` , ny = x
implies that µ ( x ) = µ ( y ) for all divisible Fuzzy subgroups µ of G if and only if G is torsion-
free.
Proof: Suppose the given condition on µ holds. Now, we show that G is torsion-free. To show
this, Let T be the Torsion part of G and x be any element in T. Therefore, there exists n ∈ `
such that nx = 0. Since 1{0} is divisible, 1{0} ( x ) = 1{0} ( 0 ) = 1. Hence x = 0. Thus, T = {0}
implies that G is torsion-free. Conversely, Let G be torsion-free and µ any divisible fuzzy
subgroup of G. Suppose that nx = y. Let a = µ ( x ) . Then n ( ya ) = xa . Now, there exists y′ in G
WƌŽĐ͘ŽĨƚŚĞEĂƚŝŽŶĂů^ĞŵŝŶĂƌŽŶWƌĞƐĞŶƚdƌĞŶĚƐŝŶDĂƚŚĞŵĂƚŝĐƐĂŶĚŝƚƐƉƉůŝĐĂƚŝŽŶƐ ϭϴϯ
such that nya′ = xa and y′ ⊆ µ. Thus ny′ = x. Since G is torsion-free, y = y′ and so ya ⊆ µ.
Thus a = µ ( x ) = µ ( ny ) ≥ µ ( y ) ≥ a. Hence µ ( x ) = µ ( y ) . Ŷ
Lemma 2.5: For all fuzzy divisible subgroups µ of Z ( p ∞ ) (a Quasi-cyclic group), for all
x, y ∈ Z ( p ∞ ) \ {0} , for all n ∈ `, ny = x implies µ ( x ) = µ ( y ) . Ŷ
Theorem 2.6: A Fuzzy subgroup µ is divisible if and only if it is constant on the additive group
of rational numbers _.
Proof: Suppose µ is divisible. Let x ∈ _. Then, there exists n ∈ ` such that nx = m ∈ ]. By the
Lemma 2.4, µ ( x ) = µ ( m ) . Now, m ⋅1 = m and so µ ( m ) = µ (1) by Lemma 2.4. Thus
µ ( x ) = µ (1) . Hence µ is constant on _. Conversely, suppose that µ is constant on _. Let
xa ⊆ µ and n ∈ `. Now, there exists y in _ such that ny = x and so n ( ya ) = xa . since µ is
constant on _ , µ ( y ) = µ ( x ) . Thus ya ⊆ µ . Hence µ is divisible. Ŷ
References:
1. Sidky, F. I. and Mishref, M. A. A., Divisible and Pure and fuzzy subgroups, Fuzzy Sets and Systems, Vol.
34(1990), 377-382.
2. Sidky, F. I. and Mishref, M. A. A., Fuzzy cosets and cyclic and abelian fuzzy subgroups, Fuzzy Sets and systems,
Vol. 43 (1991), 243-250.
3. Malik, D. S. and Mordeson, J. N., Fuzzy subgroups of abelian groups, Chinese J. of Math. Taipei, Vol.19(1992),
129-145.
4. Mordeson, J. N., Invariants of fuzzy subgroups, Fuzzy Sets and Systems, Vol. 63(1994), 81-85.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 184
With best Complements from Dr Bhavanari Research Scholars Association
Dr Kuncham Syam Prasad: He awarded Gold Medal for his first rank in M. Sc., Mathematics in
1994. He is a recipient of CSIR-Senior Research Fellowship. He got awarded M. Phil., (Graph
Theory) in 1998 and Ph.D., (Algebra - Nearrings) in 2000 under the guidance of Dr Bhavanari
Satyanarayana (AP SCIENTIST Awardee). He published Nineteen research papers in reputed
journals and presented research papers in thirteen National Conferences and six International
Conferences in which five of them were outside India: U.S.A (1999), Germany (2003), Taiwan (2005),
Ukraine (2006), Austria (2007), Bankok (2008), Indonesia (2009). He also visited the Hungarian Academy
of Sciences, Hungary for joint research work with Dr Bhavanari Satyanarayana (2003) and the National
University of Singapore (2005) for Scientific Discussions. He authored nine books (UG/PG level). He is also
a recipient of Best Research Paper Prize for the year 2000 by the Indian Mathematical Society for his research
in Algebra. He received INSA Visiting Fellowship Award (2004) for the collaborative Research Work.
Presently working as Associate Professor of Mathematics, Manipal University, Karnataka, India. E-mail:
kunchamsyamprasad@gmail.com, syamprasad.k@manipal.edu
Dr. Tumurukota Venkata Pradeep Kumar: He got awarded M.Phil., (Γ Γ-ring theory) and Ph.
D., (Near-ring Theory) under the guidance of Dr Bhavanari Satyanarayana (AP SCIENTIST
Awardee). He published five research papers in Indian and Abroad International Journals. He
attended three National Conferences and one International Conference. At present he is working as
Assistant Professor in ANU College of Engineering & Technology.
Dr. Dasari Nagaraju: He completed his Ph. D., (Ring Theory) He is a Project Associate in UGC-Major
Research Project (2004-2007) under the Principal Investigatorship of Dr Bhavanari Satyanarayana (AP
SCIENTIST Awardee). He published eight research papers. He Worked in Rajiv Gandhi University
(AP), Periyar Maniammai University (Tanjavur). Presently working in Hindusthan University, Chennai.
Dr. Kedukodi Babushri Srinivas: He is a Associate Professor in Mathematics, Manipal University, Karnataka.
His educational qualifications are DOEACC ‘O’ LEVEL from DOEACC Society, Department of
Electronics, Govt. India, M. Sc., and P.G.D.C.A. from Goa University. He qualified in the Joint
CSIR-UGC JRF(JRF-NET), Maharashra State Eligibility Test (SET) for Lectuership (accredited by
UGC) and GATE in Mathematics. He got Ph.D., (Fuzzy and Graph Theoritic aspects of Near-
rings, 2009) under the guidance of Dr Kuncham Syam Prasad and Dr Bhavanari Satyanarayana ;W
^/Ed/^dǁĂƌĚĞĞͿ. He attended a number of workshops/Seminars in Mathematics and pubished
four research papers in international Journals like: Soft Computing, Communications in Algebra. He presented
papers/delivered Lectures in International Conferences held at Ukraine (2006), Austria (2007), Bankok (2008),
Indonesia (2009). He was awarded first prize for the poster presentation during the MU Scientific meet for the
Ph.D., students. E-mail: kbsrinivas77@yahoo.com
Mr. M. B. V. Lokeswara Rao: He completed his M. Sc., (Mathematics) from ANU with third rank. He got
awarded M. Phil., (Matrix Near-rings) under the guidance of Dr Bhavanari Satyanarayana (AP SCIENTIST
Awardee) with A grade. He is an elected General Secretary of “Association for Improvement of
Maths Education (AIMEd., Vijayawada)”. He published one research paper in Matrix Near-rings.
Mr. Sk. Mohiddin Shaw: He completed his M. Phil., (Module Theory) under the guidance of Dr
Bhavanari Satyanarayana (AP SCIENTIST Awardee). He visited Institute of Mathematical
Sciences (Chennai), IIT (Chennai), ISI (Calcutta), IIT (Guwahati) and Burdwan University (West Bengal) for his
research purpose. He attended eight Conferences/Seminars/ Workshops. He worked as a faculty in
the ANU P.G Centre at Ongole. He published four research papers in Ring Theory.
Mr. J. L. Ramprasad: Awarded with Kavuru Gold Medal for College first in B. Sc., Course and
with JCC Gold Medal for Town first. Qualified in GATE-2001 Examination with Percentile score
of 85.73. Awarded with M. Phil., (Module Theory) in May 2005 under the guidance of Sri. Dr
Bhavanari Satyanarayana ;W^/Ed/^dǁĂƌĚĞĞͿ. He authored two books at PG level. He published a research
paper in USA. Presently working as a Lecturer in P.G. Department of P. B. Siddhartha College, Vijayawada.
E-mail: ram_jupudi@rediffmail.com
Mr. K. S. Balamurugan: He got First Rank in B. Sc., and Second Rank in M. Sc., course. He awarded with
M. Phil., (Ring Theory) under the guidance of Dr Bhavanari Satyanarayana ;W^/Ed/^dǁĂƌĚĞĞͿ in 2006.
He is working as Sr. Lecturer in RVR & JC College of Engineering. He published one research paper in Ring
Theory.
Mrs. T. Madhavi Latha: Her educational are B. Sc., B. Ed., M. Sc., Ed., M. Phil., PGDCA and
IELTS: 7.5. She was a NCERT scholarship holder during 1992-94. She got Visista Acarya Puraskar
Award in 1997 by Amalapuram Educational Society. She was the author of 3 books. She attended
various National and International seminars both on Education and Mathematics. She worked as a
resource person for various academic programmes. Presently she is working as a PGT in APSWR JC.
Proc. of the National Seminar on Present Trends in Mathematics and its Applications 185
With best Complements from Dr Bhavanari Research Scholars Association
Mrs. Sk. Shakeera: She got M. Phil., degree (2007) in Γ-ring theory under the guidance of Dr
Bhavanari Satyanarayana ;W^/Ed/^dǁĂƌĚĞĞͿ͘
Mr. D. Srinivasulu: He got his M. Phil., degree (Graph Theory) under the guidance of Dr
Bhavanari Satyanarayana ;W^/Ed/^dǁĂƌĚĞĞͿ.