Professional Documents
Culture Documents
CONTENTS
Research Papers Page No
Mixed Convection In A Porous Medium With Magnetic Field, Variable Viscosity And 13-21
Varying Wall Temperature
C.N.B.Rao, V. Lakshmi Prasannam , T.Raja Rani
A Unified Frame Work For Searching Digital Libraries Using Document Clustering 28-32
Shaik Sagar Imambi, Thatimakula Sudha
Experimental and theoretical evaluation of ultrasonic velocities in binary liquid mixture 55-59
cyclohexane + o-xylene at 303.15, 308.15, 313.15 and 318.15k.
Narendra K, Narayanamurthy P & Srinivasu Ch
INTERNATIONAL JOURNAL OF
COMPUTATIONAL MATHEMATICAL IDEAS
CONTENTS
Research Papers Page No
Radiation Effects On Mhd Free Convection Flow Past A Semi-Infinite Moving Vertical 73-81
Porous Plate With Soret And Dufour Effect
G.Venkata Ramana Reddy and Dr. A.Rami Reddy
The IJCMI is an international research journal, which publishes top-level work on computational aspects
of mathematics interface between applied mathematics, numerical computation, and applications of systems -
oriented ideas to the physical, biological, social, and behavioral sciences. It includes but not limited to areas of
mathematics such as algebra (especially group theory), combinatorics (especially graph theory), geometry,
number theory and numerical analysis; computational complexity; cryptology; symbolic and algebraic
computation; optimization; the mathematical aspects of: models of computation; automata theory; categories
and logic in computer science; proof theory; type theory; semantics of programming languages; process algebra
and concurrent systems; specification and verification; databases; rewriting; neural nets and genetic algorithms;
computational learning theory; theorem proving, Applied Physics, Solid State Physics, Nuclear Physics
Theoretical Physics and more...
IJCMI Journal publishes research articles and reviews within the whole field of Mathematical
Sciences& Computer Science and Engineering, and it will continue to provide information on the latest trends
and developments in this ever-expanding subject.
The IJCMI will be published three issues in a year. The journal will be reviewed by two independent
reviewers. In addition, the Journal may occasionally publish special issues on various topics in the areas of
Mathematics &Computer science and Engineering, book reviews, conference reports, letters to the honorary
editors, conference announcements, etc.
Finally, The Editor-in-Chief and Honorary Editors wish to congratulate the authors of the published
papers in IJCMI. Satyans Publications to starting Three more International Journals such as International Journal
of Applied Sciences & Engineering ideas (IJASE), International Journal of Artificial Intelligence Ideas (IJAII),
International Journal of Entrepreneurship Ideas (IJEI) for the inspiration of IJCMI. Thanks are due to the
members of the Editorial Board for their precious feedback and advice. We hope that the new International
Journal of Computational Mathematical Ideas will serve Mathematics & Computer science engineering research
community as well as and this journal will be main media of presenting ideas and research work in their area.
Suggestions to improve our efforts in order to deliver a better journal to the authors, readers and subscribers of
this journal will always be appreciated.
Dr.S.Satyanarayana
Editor-In-Chief –IJCMI
E-Mail:ijcmi@in.com
ISSN: 0974-8652
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
ABSTRACT
Partitions play an important role in Number Theory. It has wide applications in various fields. An attempt is
made to develop a theorem on the number of r − partiions of positive integer n in which the least part is k ,
a reduction theorem on r − partiions and some more results on r − partiions are derived.
( {
∴ pr ( S ; n ) - pr −1 S ; n − a (1) + b })
[3.1]
= pr ( S ; n − ar )
Proof: Let λ1 , λ2 , ... , λr be the first,
second,…, 5. Theorem: Let r , n , k ∈ N and
th
r parts of the r-partition of ‘n’ respectively. S = {am + b | a ∈ N , b ∈ Z and m = 1,2,..., n}
So n = (λ1 , λ2 , ... , λr ) be the set of positive integers. then, the number
All the distinct r − partiions of n are arranged of r − partiions of n having the parts are
in such a way that all the parts and elements of S with least part k is
corresponding parts in each r − partiions are
monotonically increasing.
(
pr −1 S ; n − ( k − 1) ar − {a + b} )
n n
where 1 ≤ k ≤
If possible, let λ1 = a + b + 1 ar + b
ar + b
Since all the parts in each r − partiions are [5.1]
monotonically increasing order, the least Proof: Let λ1 , λ2 , ... , λr be the first,
possible value of each λ i for i = 2 to r is second,…,
n r th parts of the r − partiions of n respectively.
a + b + 1 .
ar + b So
Then the sum of all parts in partition is n = (λ1 , λ2 , ... , λr )
n All the distinct r − partiions of n are arranged
r a
+ b + 1 . in such a way that all the parts and
ar + b corresponding parts in each r − partiions are
n monotonically increasing.
But r a
+ b + 1 > n Fixing λ1 = a (1) + b , the remaining value
ar + b
This is contradiction. n − {a (1) + b} of n can be expressed as the sum
n of the remaining r − 1 parts λ2 , λ3 , ... , λr in
Hence λ1 = a +b is the highest
ar + b (
pr −1 S ; n − {a (1) + b} ways. )
integer.
i,e The number of r − partiions in which the
4. Theorem: Let r , n ∈ N and least part of the partition is λ1 = a (1) + b is
S = {am + b | a ∈ N , b ∈ Z and m = 1,2,..., n} pr −1 ( S ; n − {a + b} ) .
be the set of positive integers. Then prove that
( {
pr ( S ; n) - pr −1 S ; n − a (1) + b }) Fixing λ1 = a ( 2 ) + b , the remaining value
are elements of S with least part a (1) + b is Since all the parts in each r-partition are non
not a (1) + b is equal to the number the number of the r − partiions in which the
of r − partiions of n − ar whose parts are
elements of S .
{ }
n − a ( 3) + b of n can be expressed as the sum Corollary 5.2: Let n, r , k ∈ N . Then, the
number of r − partiions of n having the parts
of the remaining r − 1 parts λ2 , λ3 , ... , λr in
are even numbers with least part k is
( )
pr −1 S ; n − {a ( 3) + b} ways.
n
pr −1 e ; n − 2 ( k − 1) r − 2 where 0 ≤ k ≤
pr − 2 ( S ; n − {a ( 4 ) + b ( 2 )}) r − partiions with 2r
λ1 = a ( 3) + b , λ2 = a (1) + b and Proof: Put a = 2, b = 0 in [5.1]
(
pr − 2 S ; n − {a ( 5 ) + b ( 2 )} ) Corollary 5.3: Let n, r , k ∈ N . Then the
-
number of r − partiions of n having the parts
(
pr −3 S ; n − {a ( 6 ) + b ( 3)} ) are odd numbers with least part k is
r − partiions with λ1 = a ( 3) + b , λ2 = a ( 2 ) + b pr −1 o ; n − 2 ( k − 1) r − 1
are to be eliminated n
where 0 ≤ k ≤
(
from pr −1 S ; n − {a ( 3) + b} r − partiions . ) 2r − 1
Then, the number of the r − partiions in Proof: Put a = 2, b = −1 in [5.1]
which the least part of the partition
λ1 = a ( 3) + b is 6. Reduction theorem for pr ( S ; n) :
Let r , n, k ∈ N and
(
pr −1 S ; n − {a ( 3) + b} ) S = {am + b | a ∈ N , b ∈ Z and m = 1, 2,..., n}
(
- pr − 2 S ; n − {a ( 4 ) + b ( 2 )} ) be the set of positive integers. then,
- n
ar +b
(
pr − 2 S ; n − {a ( 5 ) + b ( 2 )} )
pr (S; n) = ∑ pr −1 ( S ; n − ( k − 1) ar − {a + b} )
(
− pr −3 S ; n − {a ( 6 ) + b ( 3)} )
k =1
= pr −1 ( S ; n − a ( r − 1) − {a ( 3) + b}) [6.1]
and
− pr − 2 ( S ; n − a ( r − 2 ) − {a ( 5 ) + b})
n
= pr −1 ( S ; n − ar − {a ( 2 ) + b}) n ar +b
− pr − 2 ( S ; n − ar − {a ( 3 ) + b}) p(S; n) = ∑∑
r =1 k =1
pr −1 ( S ; n − ( k −1) ar − {a + b} )
= pr −1 ( S ; n − a ( r − 1) − ar − {a ( 2 ) + b})
[6.2]
= pr −1 ( S ; n − 2 ar − {a + b} ) Proof: From [5.1] we can observe it
By induction we observe that the number of Corollary 6.1: Prove that
r − partiions of n having the parts are elements n
of S with least part k is n r
pr −1 ( S ; n − ( k − 1) ar − {a + b} )
p (n) = ∑∑ p ( n − ( k − 1) r − 1)
r =1 k =1
r −1
⇒ n = 2r
pr (n) = p1 (n − r ) + p2 (n − r ) + ... + pr (n − r )
+ ∑
i + j =3
pi ( j ) + ∑
i+ j =2
pi ( j )
= p1 (r ) + p2 (r ) + ... + pr (r ) 2m
= p(r )
= 1+ ∑
i+ j=2
pi ( j )
= p( n − r ) n
n
= 1+ ∑
i+ j=2
pi ( j )
Case:2 Let < 2
r Case 2: Let n = 2m + 1 for m ∈ N
n p (n) = p (2m + 1)
Since r < n and < 2
r = p1 (2m + 1) + p2 (2m + 1)
⇒ r < n < 2r
⇒ 0< n−r < n + p3 (2m + 1) + ... + pm (2m + 1)
pr (n) = p1 (n − r ) + p2 (n − r ) + ... + pm +1 (2m + 1) + pm + 2 (2m + 1) + ...
+ pn −r (n − r ) + pn− r +1 (n − r ) + ... + pr (n − r ) + p2 m −1 (2m + 1) + p2 m (2m + 1)
+ p2 m +1 (2m + 1)
= p1 (n − r ) + p2 (n − r ) + ...
+ pn −r (n − r ) + 0 + ... + 0
= p( n − r )
n
Hence pr (n) = p(n − r ) for ≤2
r
= { p1 (2m)}
+ pm +1 (n) +…+ p2 m -2 (n) + p2 m −1 (n) + p2 m (n)
+ { p1 (2m − 1) + p2 (2m − 1)}
+ { p1 (2m − 2) + p2 (2m − 2) + p3 (2m − 2)} + ... = p1 (2m) + p2 (2m) +…+ pm −1 (2m) + pm (2m)
+ { p1 (m + 1) + p2 (m + 1) + ... + pm (m + 1)} + + pm +1 (2m) +…+ p2 m -2 (2m) + p2 m −1 (2m)
p(m) + p(m − 1) + ... + p(2) + p(1) + 1 + p2 m (2m)
= { p1 (2m)}
+ { p1 (2m − 1) + p2 (2m − 1)} = pm −1 (2m + m − 1) + p(m) + p(m -1) +…+ p(2)
+ { p1 (2m − 2) + p2 (2m − 2) + p3 (2m − 2)} + ... + p(1) +1
+ { p1 (m + 1) + p2 (m + 1) + ... + pm ( m + 1)}
=1+ pm −1 (2m + m -1) + { p(1) + p(2) + ... + p(m)}
+ { p1 (m) + p2 (m) + ... + pm ( m)}
m
+ { p1 (m − 1) + p2 ( m − 1) + ... + pm −1 (m − 1)} + ... = 1+ pm −1 (3m -1) + ∑ p(i)
+{ p1 (3) + p2 (3) + p3 (3)} i =1
n
+ { p1 (2) + p2 (2)} + p1 (1) + 1 2
3n
∑ ∑
= 1+ p n -1 + ∑ p(i)
2
=1+ pi ( j ) + pi ( j ) +…+ −1 2
i =1
i + j = 2 m +1 i + j =2m
2 m +1
If n is odd
= 1+ ∑
i+ j=2
pi ( j ) Let n = 2m + 1 for m ∈ N
p ( n) = p1 (n) + p2 (n) +…+ pm −1 (n)
n
= 1+ ∑
i+ j=2
pi ( j ) + pm (n) + pm +1 (n) + pm + 2 (n) +…
+ p2 m −1 (n) + p2 m (n) + p2 m +1 (n)
n
Hence p ( n) = 1 + ∑
i+ j=2
pi ( j )
= p1 (2m +1) + p2 (2m +1) +…+ pm (2m +1)
Corollary 8.1: Let n be a natural number, then + pm+1 (2m +1) + pm+2 (2m +1) +…
p(n) − p(n − 1) = ∑
i+ j=n
pi ( j )
+ p2m-1 (2m +1) + p2 m (2m +1) + p2m+1 (2m +1)
= pm (2m + m +1) + p(m) + p(m -1) +…
n
+ p(2) + p(1) +1
Proof: Since p(n) = 1 + ∑
i+ j=2
pi ( j ) m
= 1+ pm (3m + 1) + ∑ p (i )
n −1 i =1
∴ p(n − 1) = 1 + ∑ pi ( j )
3n -1 2
n −1
+ ∑ p (i )
i + j =2
= 1+ p n -1
2
2 i =1
Hence p(n) − p(n − 1) = ∑
i+ j=n
pi ( j )
Hence
Theorem 9: If n ∈ N then
Theorem 10:
m m + 1
If = 1 ,then = 1 for m, r ∈ Z
r r +1
Proof:
If n is even m
Proof: Since = 1
Let n = 2m for m ∈ N r
p ( n) = p1 (n) + p2 (n) +…+ pm −1 (n) + pm (n) ⇒ r ≤ m < 2r
⇒ r + 1 ≤ m + 1 < 2r + 1
Effects of magnetic field and variable viscosity on similarity solutions of mixed convection adjacent to a
vertical flat plate in a porous medium are studied numerically. Excess of plate temperature over the
ambient temperature and the free stream are assumed to vary as power functions of x , where x is the
distance measured along the plate. The flow and heat transfer quantities of the similarity solutions are
found to be functions of C, λ , γ µ , RP where C is magnetic interaction parameter, λ is power of
index of the plate temperature, γ µ is viscosity variation coefficient and RP, mixed convection
parameter is ratio of the Rayleigh number to the Pe ′clet number. The cases of assisting flow and
opposing flow are discussed. Dual solutions are found for negative values of RP, and ranges of values of
RP are found for which either a unique solution, no solution or dual solutions exist. Skin friction and heat
transfer coefficients are observed to diminish as the intensity of the magnetic field increases (or C takes
diminishing values). The range of negative values of RP over which solutions exist is observed to
increase with decreasing values of C as well as with increasing values of λ and γ µ .
Key Words: Mixed Convection; Variable viscosity; Magnetic field; varying wall temperature
Mathematics Subject Classification Codes: 76S05; 76R10; 76R05; 76DXX
Mixed Convection In A Porous Medium With Magnetic Field, Variable Viscosity And Varying Wall Temperature
13
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
Mixed Convection In A Porous Medium With Magnetic Field, Variable Viscosity And Varying Wall Temperature
14
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
Mixed Convection In A Porous Medium With Magnetic Field, Variable Viscosity And Varying Wall Temperature
15
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
2 0
f′= 3 λ +1
1 2
This can be seen to be proportional to x
1 + Cγ µ θ − 2 ,
like in the free convection case(ref. [7]). For
uniform heat flux surface, Q ( x ) should vary
1
linearly with x and so λ = . For an adiabatic
(5) 3
Evaluating at η = 0, we get the slip velocity surface, Q ( x ) should be independent of x and
f ′(0) as −1
so λ = . Zero value of λ corresponds to
2 (1 + C ( RP ) ) − C γ µ 3
f ′( 0 ) = . the isothermal case. In this study solutions are
2 + Cγ µ found for the values
− 0.3, − 0.2, 0, 0.3, 0.5 and 1 of λ .
When A is positive, an increase in the value of
If γ µ = 0 then f ′(0) = 1 + C ( RP) λ can correspond to an increase in the
III.a PARAMETERS OF THE PROBLEM temperature of the plate, and, in a broader sense,
AND THEIR EFFECT ON THE FLOW it can result in enhanced flow.
AND HEAT TRANSFER: When there is no magnetic field, the
The flow and heat transfer depend on parameter C takes the value unity and for
the parameters γ µ , λ , C and RP where RP is increasing intensity of the magnetic field, the
the ratio of the Rayleigh number to the parameter takes values smaller than unity. In the
present study, solutions are found for the values
P e ′clet number.
0.1, 0.5 and 1 of C. Reduced flow can be
The constant A appearing in the expression for expected for smaller values of C or for
the temperature of the plate can take positive as increased intensity of the magnetic field as the
well as negative values and, as a result, the magnetic field lines obstruct the flow.
temperature of the plate can be higher or lower The effect of simultaneous variation of the
than the ambient temperature. In the present values of the parameters on the flow and heat
work, these correspond to assisting flow and transfer are presented in the discussion.
opposing flow respectively. For liquids (except III.b. NUMERICAL SOLUTION: The
0
for water near 4 C ) the parameter γ µ takes equations for f and θ , i.e., equations 3,5 are
negative values when T0 > T∞ and takes integrated numerically subject to appropriate
boundary conditions by Runge-Kutta-Gill
positive values when T0 < T∞ , while for gases method (Ref. [10]), together with a shooting
technique. The accuracy of the method is tested
it is vice versa. Irrespective of the values of T0 by comparing appropriate results of the present
and T∞ , zero value of γ µ corresponds to analysis with available results. Our results for C
=1 and γ µ =0 (i.e., no magnetic field, constant
constant viscosity case. In this paper, solutions
are found for the values -1, 0, and 1 of γ µ . viscosity) are in very good agreement with
those of in ref. [2]. Also our results for C =1,
The mixed convection parameter RP takes
positive values for assisting flow and negative
γ µ =0 and λ =0 (i.e., no magnetic field,
Mixed Convection In A Porous Medium With Magnetic Field, Variable Viscosity And Varying Wall Temperature
16
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
constant viscosity and isothermal plate) agree case ( λ = 0 ) while it increases with γ µ when
very well with those of ref. [4 ].
IV. DISCUSSION OF THE RESULTS: λ takes positive values.
Qualitatively interesting results related to In the following, more attention is paid to the
the shear stress, heat transfer coefficient, discussion of the dual solutions of the opposing
velocity and temperature are presented, some of flow case. For a given value of RP, the solution
them in the form of tables I,II and others in the corresponding to a relatively larger value of
form of figures 2 to 11. Quantities such as the f ′′ ( 0 ) is referred to as the upper solution
Nusselt number and drag coefficient can be and the one corresponding to a smaller value of
readily obtained from the heat transfer f ′′ ( 0 ) as the lower solution.
coefficient and skin friction. Variations in
f ′ ( 0 ), f ′′ ( 0 ) and '−θ ′( 0 ) ’ for positive
The changes in skin friction with negative
values of RP are presented in table I. Skin values of the mixed convection parameter RP
friction f ′′ ( 0 ) can be observed to be negative are shown in figures 2(a),2(b) for different
for positive values of RP for all values of the values of the parameters C, λ and γ µ . The
other parameters under consideration. Absolute
value of f ′′ ( 0 ) decreases with increasing corresponding changes in heat transfer
coefficient are shown in figures 3(a),3(b)
values of RP and γ µ while it increases with respectively. One curve each corresponding to
increasing values of C.. ref. [2] are presented in figures 2(a),2(b) and
one curve corresponding to ref.[4] in fig.3(a).
From the figures the range of values of RP over
which solutions exist can be seen to be more
when fluid viscosity is taken to be temperature
dependent than when it is constant. Similarly
the range is more in the presence of magnetic
field than in its absence. In the isothermal case,
when viscosity is a constant as well as variable
and in the presence as well as absence of
magnetic field, f ′′ ( 0 ) is observed to be
positive. For C = 0 . 5 , λ = 0 , γ µ = 0 single
solution exists for − 2.1 ≤ RP ≤ 0 , dual
− 2.7 ≤ RP ≤ − 2.0 and
solutions exist for
no solution for RP ≤ − 2.7 . Like the skin
friction f ′′ ( 0 ) , the heat transfer coefficient also
takes positive values when λ = 0 (see figures
2(a) and 3(a)). Except for magnitude, behaviour
of skin friction and heat transfer coefficient
when γ µ = 1 are similar to the corresponding
ones when γ µ = 0.
Mixed Convection In A Porous Medium With Magnetic Field, Variable Viscosity And Varying Wall Temperature
17
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
Mixed Convection In A Porous Medium With Magnetic Field, Variable Viscosity And Varying Wall Temperature
18
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
19
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
Mixed Convection In A Porous Medium With Magnetic Field, Variable Viscosity And Varying Wall Temperature
20
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
21
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
ABSTRACT
In this paper we considered the algebraic system Γ-near-rings that was introduced by Satyanarayana.
“Γ-near-ring” is a more generalized system than both near-ring and gamma ring. The aim of this short
paper is to study and generalize some important results related to the concepts: completely prime and
completely semi-prime ideals, in Γ-near-rings. We included examples when ever necessary.
1.3. Definitions: (i) An ideal (left ideal) P of N f1g1f2 + f1g1f3. To see this, fix 0 ≠ z ∈ G and u ∈
(with P ≠ N) is said to be a prime (prime left) X. Define Gu: G → X by gu(x) = u for all x ∈
ideal of N if it satisfies the condition: I, J are G and fz:X → G by fz(x) = z for all x ∈ X. Now
ideals (left ideals) of N, IJ ⊆ P, implies I ⊆ P or for any two elements f2, f3 ∈ M, consider
J ⊆ P. fzgu(f2+ f3) and fzguf2 + fzguf3. For all x ∈ X,
[fzgu(f2+ f3)] (x) = fz[gu(f2(x) + f3(x))] = fz(u) = z
(ii) An ideal P of N is said to be completely and
prime if for any a, b ∈ N, ab ∈ P ⇒ a ∈ P or b [fzguf2 + fzguf3](x) = fzguf2(x) + fzguf3(x) = fz(u) +
∈P fz(u) = z + z.
(iii) An ideal S of N is said to be semi-prime if Since z ≠ 0, we have z ≠ z + z and hence
for any ideal I of N, I2 ⊆ S implies I ⊆ S. fzgu(f2+ f3) ≠ fzguf2 + fzguf3.
Thus we have that M is a Γ-near-ring which is
(iv) An ideal S of N is said to be completely not a Γ- ring.
semi-prime ideal if for any element a ∈ N, a2∈
S implies either a ∈ S. 1.7. Definition: Let M be a Γ-near-ring. Then a
normal subgroup I of (M, +) is called
1.4. Definitions: (i) For any proper ideal I of N, (i) a left ideal if aα(b + i) - aαb ∈ I for all a, b
the intersection of all prime(Completely Prime, ∈ M, α ∈ Γ and i ∈ I;
respectively) ideals of N containing I, is called (ii) a right ideal if iαa ∈ I for all a ∈ M, α ∈
the prime(Completely Prime, respectively) Γ, i ∈ I; and
radical of I and is denoted by P-rad(I) (C-rad(I) (iii) an ideal if it is both a left and a right ideal.
, respectively).
Let M be a Γ-Near-ring and α ∈ Γ.
(ii) The Prime (Completely Prime, respectively)
Satyanarayana [ 11 ] defined a binary operation
radical P-rad(0)(C-rad(0) , respectively) is also
“*α” on M by a *α b = aαb for all a, b ∈ M.
called as Prime (Completely Prime,
respectively) radical of N and we denote this by Then (M, +, *α) is a near-ring. So we may
P-rad(N) (C-rad(N), respectively). consider every element α ∈ Γ as a binary
operation on M such that (M, +, *α) is a
For some other fundamental definitions and near-ring. Also for any α, β ∈ Γ, we have (a *α
results, we refer Pilz [5], Satyanarayana [9, 13], b) *β c = a *α (b *β c) for all a, b, c ∈ M.
Satyanarayana and Syam Prasad [15].
Conversely, if (M, +) is a group and Γ is a set of
1.5. Definition: (Satyanarayna [9, 11, 12, 15]): binary operations on M satisfying
Let (M, +) be a group (not necessarily Abelian)
and Γ be a non-empty set. Then M is said to be (i) (M, +, * ) is a near-ring for all * ∈ Γ; and
a Γ-near-ring if there exists a mapping M × Γ ×
M → M (the image of (a, α, b) is denoted by (ii) (a *1 b) *2 c = a *1 (b *2 c) for all a, b, c ∈M
aαb), satisfying the following conditions: and for all *1, *2 ∈ Γ, then (M, +) is a Γ-near-
(i) (a + b)αc = aαc + bαc; and ring.
(ii) (aαb)βc = aα(bβc) for all a, b, c ∈ M and
α, β ∈ Γ. 1.8. Remark: (i) If *α, *β are operations on M
with a *α b = a *β b for all a, b ∈ M, then the
M is said to be a zero-symmetric Γ-near-ring if functions *α, *β are one and the same. So in this
aα0 = 0 for all a ∈ M and α ∈ Γ, where 0 is the case, we have *α = *β.
additive identity in M.
(ii) Suppose that (M, +) is a Γ-near-ring and
A natural example of Γ-near-ring is given also (M, +) is a Γ*-near-ring with the following
below: property: α ∈ Γ implies there exists β ∈ Γ* such
that a *α b = a *β b for all a, b ∈ M. Then we
1.6 Example (Satyanarayana [11]): Let (G, +) may consider this case as α = β and so Γ ⊆ Γ*.
be a non - abelian group and X be a non-empty
set. Let M = {f / f: X → G}. Then M is a group 1.9. Definition: Let (M, +) be a group. A Γ-
under point wise addition. near-ring M is said to be a maximal Γ-
near-ring if M cannot be a Γ*-near-ring for any
Since G is non-abelian, then (M, +) is non - Γ ⊂ Γ* (Here it is assumed that the restriction of
abelian. Let Γ be the set of all mappings of G the mapping M × Γ* × M → M to M × Γ × M is
into X. If f1, f2 ∈ M and g ∈ Γ, then, obviously, the mapping M × Γ × M → M).
f1gf2 ∈ M. But f1g1(f2 +f3) need not be equal to
On Completely Prime and Completely Semi-prime Ideals in Γ-near-rings
23
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
1. 10. Theorem (Th. 1.3 of Satyanarayana [ 11 1.14. Definition: Let I be an ideal of N. Then a
]): Let (M, +) be a group and P = {* / * is a prime (completely prime, respectively) ideal of
binary operation on M such that (M, +, *) is a N containing I is called a minimal prime
near-ring and M * M = M}. Then there exists a (minimal completely prime, respectively) ideal
partition {Γi / i ∈ I} of P such that (M, +) is a of I if P is minimal in the set of all prime
maximal Γi-near-ring for all i ∈ I. Conversely, if (completely prime, respectively) ideals
{Γj}j∈J be a disjoint collection of sets such that containing I.
(M, +) is a maximal Γj-near-ring for each j ∈ J
with M * M = M for all * ∈ Γj and for all j ∈ J, 1.15. Theorem ( Th. 1.4 of [ 13 ]): Let I be an
ideal of a near-ring N. Then I is a semi-prime
UΓ
j∈J
j ideal of a N ⇔ I is the intersection of all
then ⊆ P. Moreover (Say property B: minimal prime ideals of N ⇔ I is the
If Γ is a nonempty set such that (M, +) is a intersection of all prime ideals containing I.
maximal Γ-near-ring implies Γ = Γj for some j
∈ J). 1.16. Theorem (Cor. 5.1.10 of Satyanarayana [
9 ]) : Let N be a near-ring and A an ideal of N.
UΓ
j∈J
j Then A is completely semi-prime ideal if and
If property B holds, then = P. only if A is the intersection of completely prime
ideals of N containing A.
1.11. Definition: Let M be a Γ-near-ring and γ
∈ Γ. A subset A of M is said to be a γ-ideal of 1.17. Theorem (Theorem 2.2(b) of
the Γ-near-ring M if A is an ideal of the near- Satyanarayana [ 13]): An ideal P of N is prime
ring (M, +, *γ). and completely semi-prime ⇔ it is completely
prime.
1. 12. Observations: (i) Let (N, +, *) be a near-
ring which is not zero symmetric. Then there 1.18. Theorem (Lemma 2.7 of Satyanarayana [
exists a ∈ N such that a * 0 ≠ 0. Write Γ = {*}. 13 ]): Every minimal prime ideal P of a
Then N is a Γ-near-ring with aα0 ≠ 0 for some a completely semi-prime ideal I is completely
∈ N, α ∈ Γ. Therefore, in this case, N cannot prime. Moreover, P is minimal completely
be a zero symmetric Γ-near-ring. prime ideal of I.
(ii) Let M be a Γ-near-ring and (I, +) a normal
subgroup of (M, +). It is clear that I is an ideal 1.19.Theorem (Theorem 2.8 of Satyanarayana [
13 ]): Let I be a completely semi-prime ideal of
of the Γ-near-ring M if and only if I is an ideal
N. Then I is the intersection of all minimal
of the near-ring (M, +, *α) for all α ∈ Γ. In
completely prime ideals of I.
other words, I is an ideal of the Γ-near-ring M if
and only if I is a γ-ideal of M for all γ ∈ Γ. 1.20. Theorem (Theorem 2.9 of Satyanarayana
[ 13 ]): If P is a prime ideal and I is a
(iii) Let M be a Γ-near-ring. For any Γ* ⊆ Γ completely semi-prime ideal, then P is minimal
we have that M is a Γ*-near-ring. Every ideal I prime ideal of I if and only if P is minimal
of the Γ-near-ring M is also an ideal of Γ*-near- completely prime ideal of I.
ring M, but the converse need not be true.
1.21. Corollary: (Corollary 2.10 Satyanarayana
To see this, we observe the following example. [ 13 ] ): If I is a completely semi-prime ideal
of N, then I is the intersection of all completely
1. 13. Example: Consider G = {0, 1, …, 7} the prime ideals of N containing I.
group of integers modulo 8 and a set X = {a,
b}. Write M = {f / f: X → G such that f(a) = 0} 2. γ-Completely Prime and γ-Completely
= {fi / 0 ≤ i ≤ 7} where fi: X → G is defined Semi-prime γ-Ideals.
by fi(b) = i, fi(a) = 0 for 0 ≤ i ≤ 7. Consider
two mappings g0, g1 from G to X defined by Throughout this section we consider only zero-
g0(i) = a for all i ∈ G, and gi(i) = a if i ∉ {0, 3}, symmetric right near-rings, and M denotes a Γ-
g1(3) = g1(7) = b. near-ring.
Write Γ = {g0, g1} and Γ* = {g0}. Now M is a
Γ-near-ring and also Γ*-near-ring. 2.1 Definition: Let γ ∈ Γ. A γ-ideal I of M is
Now Y = {f0, f2, f4, f6} is an ideal of the Γ*- said to be
near-ring M but not an ideal of the
Γ-near-ring M (since f2 ∈ Y and f3g1(f1 + f2) - (i) γ-completely prime if a, b ∈ M, aγb ∈ I ⇒ a
f3g1f1 = f3 ∉ Y). ∈ I or b ∈ I.
24
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
2.3 Remark: Every γ-completely prime γ-ideal (ii). P is a γ-semi-prime γ-ideal of the Γ-near-
of M is a γ-completely semi-prime γ-ideal of M. ring M ⇔ P is semi-prime ideal of the near-ring
[Verification: Let I be a γ-completely prime γ- (M, +, *γ).
ideal of M. Let a ∈ M. Suppose aγa ∈ I. Since
I is γ-completely prime, we have that a ∈ I. (iii).Suppose that S is a γ-ideal of M. Then (by
Thus I is a γ-completely semi prime γ-ideal of Theorem1.15) we have that S is γ-semi-prime γ-
M.] ideal of M ⇔ S is the intersection of all γ -
prime ideals P of M containing S.
2.4 Corollary: Let M be a Γ-near-ring, γ ∈ Γ
and A be a γ-ideal of M. Then A is γ- The following corollary follows from Theorem
completely semi-prime γ-ideal if and only if A 1.17.
is the intersection of γ-completely prime γ-
ideals of M containing A. 2.9 Corollary: A γ-ideal P of a Γ-near-ring M is
γ-prime and γ-completely semi-prime ⇔ it is
Proof: A is γ-completely semi-prime γ-ideal γ-completely prime.
⇔ A is completely semi-prime ideal of the
near-ring (M, +, *γ) (by Remark 2.3 ) ⇔ A is 2.10 Definitions: Let I be a γ-ideal of a Γ-near-
the intersection of all completely prime ideals of ring M for γ ∈ Γ.
the near-ring (M, +, *γ) containing A (by I is called a minimal γ-prime (γ-Completely
Theorem 1.16) ⇔ A is the intersection of all γ- Prime, respectively) γ-ideal of M if it is minimal
completely prime γ-ideals of M containing A. in the set of all γ-prime (γ-Completely Prime,
The proof is complete. respectively) γ-ideals containing I.
2.5 Definition: Let A be a proper ideal of M. The following corollary follows from Theorem
The intersection of all γ-completely prime γ- 1.18.
ideals of M containing A of M, is called as the
γ-completely prime radical of A and it is 2.11 Corollary: Let P be a γ-ideal of a Γ-near-
denoted by C-γ-rad(A). The γ-completely prime ring M for γ ∈ Γ. Every minimal γ-
radical of M is defined as the γ-completely prime γ-ideal P of a γ-completely semi-prime γ-
prime radical of the zero ideal, and it is denoted ideal I is a γ-completely prime γ-ideal. More
by C-γ-rad(M). over P is a minimal γ-completely prime γ-ideal
of I. The following corollary follows from
2.6 Note: From Theorem 1.16, and Theorem 2.4 Theorem 1.19.
we conclude the following:
(i) An ideal A of a near-ring is completely semi- 2.12 Corollary: Let γ ∈ Γ. If I is γ-completely
prime ⇔ A = C-rad(A). semi-prime γ-ideal of M, then I is the
intersection of all minimal γ-completely prime
(ii) A γ-ideal A of a Γ-near-ring M is γ- γ-ideals of I.
completely semi-prime ⇔ A = C-γ-rad(A).
2.13 Corollary: Let γ ∈ Γ and P be a γ-ideal of
2.7 Definitions: (i). A γ-ideal P of a Γ-near- M. If P is a γ-prime γ-ideal and I is a γ-
ring M is said to be a γ-prime γ-ideal of M (with completely semi-prime γ-ideal, then P is a
25
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
26
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
27
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
Abstract
The increasing interest in processing larger collections of documents from digital libraries has led to a
new emphasis on document clustering problem. Document clustering is a technique for identifying
clusters or groups of documents which share some common features or have overlapping content.
These groupings of documents can be useful in document retrieval from digital libraries. We have
developed the retrieval frame work for searching digital libraries, called UFDC. It is an advanced, an
efficient and effective search facility for digital information. It combines conventional information
retrieval and full-text searching techniques. Automatically linked Top Ranked Document(TRD)
clusters are generated from the digital library information . By grouping together TRDs that share a
common topic, UFDC provides an effective means of finding and tracking documents.
Keywords: Data mining, Digital library, Document clustering, UDFC frame work.
28
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
A Unified frame work for searching Digital libraries Using Document Clustering
29
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
30
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
31
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
A Unified frame work for searching Digital libraries Using Document Clustering
32
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
ABSTRACT
In this paper we define what we mean by reducibility for the Fiorini-Wilson-Fisk Conjecture and outline the
logic used to establish the reducibility of every configuration in U. Of course, a computer actually verifies the
reducibility of each configuration, as it would be too difficult using the present techniques to do so by hand.
Essentially, reducibility for the Fiorini-Wilson-Fisk Conjecture is just a strengthening of reducibility for the
Four Color Theorem, and in fact many of the configurations that were reducible for the Four Color Theorem
are also reducible for the Fiorini-Wilson-Fisk Conjecture.
1.1.1 Tri colorings and Notation Theorem 1.1.1 (Tait) Let G is a triangulation or
Recall that two functions c and c| with identical near-triangulation. The following statements are
domain and range={1, 2,…,K} are equivalent if equivalent,
{c-1({1}), c-1({2}),…, c-1({k})} = {c|-1({1}), c|- (i) The vertices of G can be 4-colored.
1
({2}),…, c|-1({k})}. We will use this frequently (ii) The drawing G has a tri coloring.
when the functions represent colorings. If A is a (iii) The dual of G can be edge-3-colored.
set of functions with domain D and range R =
{1,…, k}, then η (A) will denote the set of all 1.1.1.1 Tri colorings and Contracts
functions with domain D and range R that are
equivalent to some coloring in A. Let T be a The reducibility part of the recent Robertson et al.
triangulation or near-triangulation, and let F(T) proof of the Four Color Theorem essentially
denote the set of all faces of T that are bounded proceeds by induction. Without going into
by exactly 3 edges. A tri coloring of T is a details, the contraction of edges is critical in their
function c :F(T) → {-1, 0, 1} such that for every argument to produce smaller graphs. To avoid
f ∈ F(T), and for any two distinct edges I and j notational difficulties, they introduced the idea of
incident to f, c(i) ≠ c(j). The next theorem a tri coloring of T modulo X, where T is a
establishes a connection between Tri colorings triangulation or near-triangulation and X is a set
and vertex colorings of a graph and edge of edges in T. As the definition will reveal, the
colorings of the dual of the graph. set X represents the set of edges to be contracted.
Following the definitions of Robertson et al. [98],
a set X ⊂ E(T) is said to be sparse if no two
edges of X are incident to a common finite face
33
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
34
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
The following definitions are taken from Therefore α ’ does not γ ’- fit k, because if it
Robertson et. al. [98] A match is a an unordered did, condition ii) of consistency would imply that
pair {e,f} of distinct edges of E(R). A matching is α ’ ∈ C. This establishes that C is A - critical and
a nonempty set of completes the proof of Lemma 1.1.1.
matches {{e1, f1},{e2,f2},…,{ek, fk}} such that for Consistency and criticality are defined in terms of
any i ≠ j, the edges ej and fj colorings of a circuit, but the near triangulations
are in the same component of R – {ei,fi}. Finally, to which we want to apply the ideas of
a signed matching is a collection consistency may have their infinite face bounded
of ordered pairs {({e1,f1}, µ 1), ({e2, f2}, by something other than a circuit. This does not
µ 2),…, ({ek, fk}, µ k)}, where the collection turn out to be a serious obstacle to using
{{e1, f1},{e2, f2},…,{ek, f k}} is a matching, and consistency as we shall now see. Let R be a
where µ i ∈ {-1, 1} for 1 ≤ i ≤ k.The sign of a circuit with vertices {1, 2,…, r} and edges e1,
e2,…, er where edge ei joins vertex i to vertex i +
match is used to differentiate whether both ends
of a kempe chain have the same color or distinct 1 for 1 ≤ i < r, and edge er joins vertex r to
colors. vertex 1. Let H be a near triangulation with outer-
facial walk W = v1, f1, v2, f2, v3,. . . , vr, fr, v1,
If θ ∈ {-1, 0, 1} and k is a coloring of R we say where v1, v2, . . . , vr are vertices, not necessarily
that k θ -fits a signed matching distinct and where {f1, f2,…, fr} are edges
M = {({e1, f1}, µ 1), ({e2, f2}, µ 2), … , ({ek, fk}, such that fi joins vi and vi+1 for 1 ≤ i ≤ r - 1 and
µ k)} if where fr joins the vertices vr and v1. Let φ . E(R)
(i) E(R) - U i ≤ i ≤ k {ei, fi} = {e ∈ E(R) . k (e) = → {f1, f2,…, fr} be defined by φ (ei) = fi. Also
θ } and suppose that k is a tri coloring of H and define a
(ii) For each ({ei, fi}, µ i) ∈ M, k (ei) = k (fi) if function λ on the edges of the circuit E(R) by
and only if µ i = 1. λ (e) = k( φ (e)). Following [98], we say that
A set C of colorings of R is consistent if for every φ wraps R around H and that the coloring λ of
k ∈ C and every θ , θ ’ ∈ {-1, 0, 1} E(R) is a lift of k.
there is a signed matching M such that The next theorem is an important result which
i) k θ -fits M. uses ideas of both Kempe and Birkhoff.
ii) C contains every coloring of R that θ ’-fits M. Theorem 1.1.3 Let H be a near triangulation with
Let A ⊂ c * . A set of colorings C of R is said to outer facial walk W as above,
and let φ wrap the circuit R around H. The set C
be A-critical if for every k ∈ C and every θ , θ ’
∈ {-1, 0, 1}, there is a signed matching M such of all lifts of Tri colorings of H is
that consistent.
i) k θ -fits M., Proof; Let k ∈ C and let θ ∈ {-1, 0, 1}. We
ii) C contains every edge that θ ’-fits M, and will construct a signed matching M = M(k, θ )
iii) there are not two colorings α , α ’ ∈ A and such that k θ -fits M. Following Robertson et. al.
integers γ , γ ’ ∈ {-1, 0, 1} such that both α γ - [98], we define a θ - rib to be a sequence
fits M and α ' γ ’-fits M and α is not equivalent g0,r1,g1,r2,…,rt,gt such that
(i) g0, g1, … , gt are distinct edges of H.
to α ’.
(ii) r1,r2,. . . ,rt are distinct finite faces of H.
(iii) If t > 0 then g0,gt are both incident with the
Lemma 1.1.1 If |A I C| ≤ 1, then C is A - infinite face of H, and if t = 0 then g0 is incident
critical if and only if C is consistent. with no finite face of H.
(iv) For 1 ≤ i ≤ t, ri is incident with gi-1 and with
Proof; If C is A - critical, then it is clearly gi.
consistent. Conversely, let C be a consistent set.
(v) For 0 ≤ i ≤ t, k(gi) ≠ θ .
We must show that under the hypothesis, C is
Any two distinct θ -ribs ρ = g0, r1,g1,r2,g3,…,gt
critical. Let k ∈ C and θ ∈ {-1, 0, 1}. Since C
is consistent, there is a signed matching M such and ρ ’ = g’0,r’1,g’1,…,r’t’ ,g’t’ must have {g0, g1,
that k θ -fits M and C contains every coloring . . . , gt} I {g’0, g’1,… , g’t’ }= θ , and {r0, r1,…,
that θ ’- fits M. Now let α , α ’ ∈ A, and let, rt} I {r’0, r’1, …, r’t’} = θ . To see this, note two
γ , γ ' ∈ {-1, 0, 1}. Since |A I C| ≤ 1, it things. First, if ρ and ρ ’ share a common non-
follows that one of either α or α ’ is not in C. infinite face r, then ρ and ρ ’ must also share
Without loss of generality, assume that α ’ ∉ C. both of the unique (because each of the finite
Reducibility For The Fiorini-Wilson-Fisk Conjecture
35
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
faces is a triangle) edges incident to r that are si+1} = {sj , sj+1}, it follows that the edge ej-1 is in
colored with the colors in {-1, 0, 1} – { θ }, one of the faces si or si+1. Therefore ej ∈ {ei-1, ei,
because of (iv). Second, if ρ and ρ ’ share a ei+1}. Now the choice of j insures that ej-1 ∉{e0,
common edge g then ρ and ρ ’ also share both e1, . . . , ej-2}. Thus, it must be that i + 1 = j-1, so j
= i + 2 and si+1 = sj-1. Thus ei = ej is incident to si,
of the faces that are incident to g, because of (iv) si+1 = sj-1 and si+2 = sj and since each edge is
and (v). Using these two facts, we can show that incident to at most two faces, two of the three
if any two θ - ribs share either an edge or a finite faces si,si+1 and si+2 must actually be the same
face, then the two θ - ribs are identical. face. By the construction, si ≠ si+1 which forces si
Because of (iii), unless a rib consists of a single = si+2. But then ej-1 = ei-1 which contradicts the
edge, it contains at least two edges incident to the choice of j. Thus, every edge of the sequence is
infinite face. Because of (ii) and (iv), a rib does distinct. Since the graph is finite, this means that
not contain more than two edges which are the sequence must terminate on an edge ek other
incident to an infinite face. Thus, if a rib is not a than e0 which is incident to the infinite face. The
single edge, then it has exactly two edges that are sequence e0,s1,e1,s2,. . .,sk,ek is a rib which
incident to the infinite face and colored with contains e0, as desired.
colors in {-1, 0, 1} - { θ }. This shows that each θ - rib ρ defines a pair of
Conversely, we claim every edge that is incident edges {e ρ , f ρ } which are both incident to the
to the infinite face and is colored with a color in infinite face and which both receive colors from
{-1, 0, 1} – { θ } is in some rib. To see this, let e0 {-1, 0, 1} - { θ }. We can thus use ρ to define a
be an edge incident to the infinite face which is signed match, namely ({e ρ , f ρ }, µp ) where
colored α ∈ {-1, 0, 1}-{ θ } and let γ ∈ {-1,
µp = -1 if k(e ρ ) ≠ k (f ρ ) and µp = 1
0, 1} - { θ , α }. If e0 is not incident to a finite otherwise. Now we will show the set of ribs
face, then e0 is itself a rib by (iii). So suppose that { ρ 1 ,… ρp } defines a signed matching. First of
e0 is incident to a unique finite face s1 that is a
all, the set { ρ 1 ,… ρp } defines a set of signed
triangle. Because the given coloring is a tri
coloring, s1 has exactly one edge e1 ≠ e0, which matches M = M(k, θ ) = {({e p1 , f p1 }, µp1 ),…,
receives the color . This edge is incident to a face ({e ρp , f ρp }, µρp )} in the manner defined
s2 ≠ s1. If s2 is the infinite face, then e0,s1,e1 is a above. Because of the planarity of the graph, and
rib and we have proven that e0 is in a rib. If s1 is the fact that two ribs are either disjoint or
not an infinite face, then because the coloring is a
identical, it must be that for every i ≠ j, 1 ≤ i, j
tri coloring and because s1 is a triangle, there is
an edge e2 ≠ e1 which receives the color θ and
≤ p, 1) {e ρi ,f ρi } I {e ρj , f ρj } = θ , and 2) the
is incident to a face s3 ≠ s2. In this way we removal of {e ρi ,f ρi } from the ring could not
generate an alternating sequence of edges and separate e ρj from f ρj . Thus M is a signed
faces e0,s1,e1,s2,. . .. If the sequence ever selects matching. Now we show that k θ - fits M. First,
an infinite face sk+1 it terminates. We now show because every edge incident to the infinite face
that the construction of this sequence guarantees and receiving a color in {-1, 0, 1} – { θ } must be
that all of the edges e0, e1,…, are distinct. If not,
in a rib, it follows that {e ρ 1 ,…, e ρp , f ρ 1 ,…,
there would be integers 0 ≤ i < j such that ei = ej
f ρp } equals {f ∈ E(R) .k(f) ∈ {-1, 0, 1} –
. Of all such pairs (i, j) choose one with the
smallest j and subject to that choose among those { θ }}. The definition of µρi also shows that for
the one with the largest i. As a first case, assume i every integer i (1 ≤ i ≤ p), k(e ρi ) = k (f ρi ) if
= 0. Thus ej is incident to the infinite face. It
and only if µρi = 1. This proves that k θ - fits M
follows that s1 = sj and e1 = ej-1. By the choice of
j, it cannot be that ej-1 ∈ {e0, e1, . . . , ej-2} and so = M(k).
j - 2 = 0. It follows that s1 = sj = s2. This however, We now finish the proof that C is consistent.
contradicts the construction. Thus we have shown First, for every k ∈ C and every θ ∈ {-1, 0, 1},
that i > 0, and in addition that if e0,…, ej-1 are our construction using ribs has produced a signed
distinct and ej is incident to the infinite face, then matching M = M(k, θ ) such that k θ - fits M.
e j ≠ e 0. So let θ ’ ∈ {-1, 0, 1} and let k’ be another
Of the two faces incident to ei, the face si-1
precedes the face si+1 is the sequence. Similarly, coloring that θ ’- fits M(k, θ ) = M. Define the
the face sj precedes the face sj+1 and both are coloring k’’ as follows. k ‘’(e) = θ if k ‘(e) =
incident to ei = ej . Clearly {si, si+1} = {sj, sj+1}. θ ’, k ‘’(e) = θ ’ if k ‘(e) = θ and k ‘’(e) = k ‘(e)
The face sj is incident to an edge ej-1 ≠ ej that if k ‘(e) 2 {-1, 0, 1} – { θ , θ ’}. It follows that k
receives a color in {-1, 0, 1} - { θ }. Since {si, ‘’ θ - fits M. Let c be the coloring of H whose lift
Reducibility For The Fiorini-Wilson-Fisk Conjecture
36
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
is k and let { ρ 1 ,… ρp } be the set of θ - ribs Let k ∈ C1 U C2 and let θ ∈ {-1, 0, 1}.
induced by c which define M. If ({ei, fi}, µ i) is Without loss of generality, we may assume k ∈
the signed match associated with the θ - rib ρi , C1. Therefore there is a matching M that k θ - fits
and such that every other coloring k’ which θ ’-
then the fact that k’’ θ ’- fits implies that
1a) Either k ‘’(ei) = k ‘’(fi) ≠ k (ei) or fits M is in C1 ⊂ C1 U C2.
1b) k ‘’(ei) = k ‘’(fi) = k (ei) or Now suppose by way of contradiction that there
1c) k ‘’(ei) ≠ k ‘’(fi), and k ‘’(ei) ≠ k (ei) or are two non-equivalent colorings α 1, α 2 and
1d) k ‘’(ei) ≠ k ‘’(fi), and k ‘’(ei) = k (ei). two integers λ 1, λ 2 ∈ {-1, 0, 1} such that
where either 1a) or 1b) hold if µ i = 1 and either α 1 λ 1 fits M and α 2 λ 2- fits M. This however
1c) or 1d) hold of µ i = -1. In the θ - rib ρi = violates the A - criticality of either C1 or C2.
g0,r1,g1,r2,…,rt,gt, we have k (g0) = k (g2) = k (g4) This proves that C1 U C2 is A - critical. If |A| ≤
= … = k (g 2 2t ) = α and k (g1) = k (g3) = k 1 the set C is A - critical if and only if it is
consistent and so by choosing A = φ , we deduce
(g1) = … = k ( g 2 t −21 + 1 ) = β where { α , β } that the union of two consistent sets is consistent.
= {-1, 0, 1} – { θ }. There is another tri coloring Now let B ⊂ C*(R). The union of all A - critical
γ of H that can be obtained by exchanging the subsets of B is A - critical and certainly contains
every A - critical subset of B. This completes the
colors α and β along H, namely γ (e) = k (e) proof of Lemma 1.1.2.
if e is not in ρi , γ (e0) = γ (e2) = γ (e4) =… = Lemma 1.1.3 If |A I C| ≤ 1, then the maximal
γ ( e 2 2t ) = β and γ (g1) = γ (g3) = γ (g1) = consistent subset of C equals the maximal A -
critical subset of C.
… = γ ( g 2 t −21 + 1 ) = α . Using this idea, we
Proof: Let MCSA(C) denote the maximal A -
define a new tri coloring c’’ of H by exchanging critical subset of C and let MCS φ (C) denote the
the colors α , β ∈ {-1, 0, 1} – { θ } along each maximal consistent subset of C. We know that
rib ρi for which either 1a) or 1c) holds. The lift MCSA(C) is consistent so MCSA(C) ⊂
of c’’ will be k’’ and thus k’’ ∈ C. Moreover, by MCS φ (C). Also, by Lemma 1.1.1 and the fact
defining a coloring c’ of H from the coloring c’’ that |CA| ≤ 1, MCS φ ,(C) is A - critical. Hence
by swapping the colors θ and θ ’, that is MCS φ (C) ⊂ MCSA(C), and thus the theorem
defining c’(x) = θ if c’’(x) = θ ’, c’(x) = θ ’ if holds.
c’’(x) = θ and c’(x) = c’’(x) otherwise, we see 1.2 Proving Reducibility
that c’ is also tri coloring of H whose lift equals 1.2.1 Using a Corresponding Projection
k’. Thus k’ ∈ C as desired. Let K be a configuration that appears in a
This shows that C is consistent and completes the triangulation T and has free completion S and
proof of Theorem 1.1.3. ring R. In general S will not appear in T, but
Lemma 1.1.2 Let R be a ring and let A ⊂ suppose for illustration that it does. The ring R
C*(R). The empty set is an A – critical set. Also, will naturally split T up into two near
the union of two A - critical sets is an A - critical triangulations, one of them S and the other which
set and in particular, the union of two consistent we denote by H. However, it may be the case that
sets is consistent. Finally, for any subset B of S does not appear in T. The next lemma is a
colorings of R, the maximally A - critical subset technical result to show that we may still in a
of B exists, that is, there is a subset of B which is certain sense decompose T into the near
A - critical, and such that every other A - critical triangulation H and the free completion S.
subset of B is contained in it. Lemma 1.2.1 Let K be a configuration which
Proof: Let A ⊂ C*(R). The statement that the appears in a triangulation T and has free
empty set is A - critical is vacuously true. Let C1, completion S with ring R and let φ be the
C2 ⊂ C*(R) be two A - critical sets, and assume corresponding projection of S into T. Let H be
that for i = 1, 2, and any θ , θ ’, γ , γ ’ ∈ {-1, 0, the graph obtained from T be deleting the vertex-
1} and any k ∈ Ci, there is a signed matching M set φ (V (G(K))). Then
such that 1) H is a near triangulation and φ wraps R
i) k θ - fits M and around H.
ii) every k’ that θ ‘- fits M is in Ci and 2) If X ⊂ E(S) is sparse in S, then φ (X) is
iii) no two non-equivalent colorings α i ∈ A γ I sparse in T.
- fit M for both i = 1 and i = 2. Proof; Since φ fixes G(K) and G(K) is
connected, all of G(K) lies in the same face of the
Reducibility For The Fiorini-Wilson-Fisk Conjecture
37
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
drawing T -V (G(K)). This and the fact that T is a 3) The edges φ (gi), φ (hi) and φ (gi-1) are all
triangulation implies that H = T - φ (V (G(K))) = incident to the finite face ri in T, for 1 ≤ i ≤ p.
T - V (G(K)) is a near triangulation. All of this implies that φ (g0), φ (g1),…, φ (gp)
Let V (R) = {r1, r2,…, rq} and E(R) = {e1, e2,…, is a portion of any clockwise listing in T of edges
eq} where for i = 1, 2, . . . , q - 1, ei has endpoints
incident to φ (v) in T. Moreover, from the claim
ri and ri+1 and eq = {rq, r1}. Suppose that r1,r2,…,rq
is the clockwise order of appearance of the above, φ (ri) is a face of T that is contained in
vertices of V (R). Consider the alternating the infinite face of H. Hence, the edges φ (g1),
sequence W of vertices and edges in T . φ (r1), φ (g2),…, φ (gp-1) are all edges of the infinite
φ (e1), φ (r2), φ (e2),…, φ (rq), φ (eq), φ (r1). face of H, and it therefore follows that φ (gp)
By property (iii) of projections, φ (ri) is incident follows φ (g0) in any clockwise listing in H of
to φ (ei) in T for each i ∈ 1,…, q - 1 because ri is edges incident to φ (v).
incident to ei in S for each i ∈ 1,…, q - 1. For the We now show that the sequence φ (r1), φ (e1),
same reason φ (eq) is incident to φ (r1). Thus W
φ (r2), φ (e2),…, φ (rq), φ (eq), φ (r1) is a
is a closed walk in H.
We now prove some things that will help in facial walk in H that bounds the infinite face.
establishing that W is a facial walk. We claim From what we have just shown, φ (ei-1) follows
that every finite face r ∈ F(S) - F(G) has the φ (ei) in the clockwise listing in T of edges
property that φ (r) is contained in the infinite incident to φ (ri) for 1 ≤ i ≤ q (and where when
face of H. It suffices to show that φ (r) is i = 1, we interpret ei-1 as er). This completes the
incident to some vertex of V (G), because the proof that W is a facial walk of the infinite face
infinite face of H will contain that vertex in its of G and thus shows that φ wraps R around H.
interior. By property 2) of known Lemma r is Now let X ⊂ E(S) be a sparse set of edges. Each
incident to a vertex x ∈ V (G). By property (iii) edge in X must have at least one endpoint in V
of projections, φ (r) is incident to φ (x) = x in T. (G). Therefore, every edge of X is in the domain
This proves that claim. of the natural edge function of Lemma 4.11.
Let u ∈ V (R). By property 6) of Lemma 4.2.1, a Since φ is an extension of the natural edge
clockwise listing in S of edges incident to u is g0, function, φ preserves that embedding at every x
g1,…, gp where g0, gp ∈ E(R), p ≤ 2 and g1,…gp-
∈ V (G), which implies that if e, f ∈ X share a
1 2 E(G). We assume that the endpoints of gi in V
common endpoint x ∈ V (G), but do not share a
(S) - v are xi for 0 ≤ i ≤ p. Also, for 1 ≤ i ≤ p,
common face, then φ (e) and φ (f) have
we label the unique finite face of S that is
incident to gi-1 and gi as ri and the unique edge in common endpoint x in T but are not in a common
E(S) that is incident to ri as hi. Thus, for 1 ≤ i ≤ face of T. This implies that if φ (e) and φ (f) are
p - 1, hi+1, gi, hi is a portion of a clockwise listing in the same face r’ of T for some distinct edges e,
in S of edges incident to xi. From the fact that φ f ∈ X, then φ (e) and φ (f) do not have a
is the extension of the natural edge function, and common endpoint in V (G). However, φ (e) and
the fact that the natural edge function preserves φ (f) both have endpoints in V (G) since e and f
the embedding in S at xi, it follows that φ (hi+1), do. Let xe denote the endpoint of e in V (G) and
φ (gi), φ (hi) is a portion of the clockwise listing xf the endpoint of f in V (G), and let z be the
in T of edges incident to φ (xi) = xi for 1 ≤ i ≤ common endpoint of φ (e) and φ (f) in T.
p - 1. Also, the fact that ≤ is a projection, implies We digress briefly to show that there is an r ∈
that φ (ri) is a face of T that is incident to the F(S) such that φ (r) = r’. Now r’ is adjacent to a
vertex in V (G), (in fact two, xe and xf ). Property
edges fi(gi-1), fi(hi), fi(gi) for 1 ≤ i ≤ p. We
4) of the natural edge function guarantees that φ
claim that for every 1 ≤ i ≤ p, φ (gi) follows φ
restricted to the edges of S which have at least
(gi-1) in the clockwise listing in T of edges
one endpoint in V (G) is a one to one and onto
incident to φ (v). This however follows from function into the set of edges T with at least one
three facts. endpoint in V (G). From the way φ was defined
1) φ (hi) follows φ (gi) in any clockwise listing
for faces, this implies that φ (r) = r’.
in T of edges incident to xi for 1 ≤ i ≤ p. Let g be the edge in S which has endpoints xe
2) φ (gi-1) follows φ (hi) in any clockwise listing and xf and which is incident to the face r. Because
in T of edges incident to xi-1 for 1 ≤ i ≤ p. φ is a projection, φ (g) is incident to r’. Also,
Reducibility For The Fiorini-Wilson-Fisk Conjecture
38
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
since G is an induced sub drawing of S, g ∈ such that |X| = k, φ (X) is contractible and no tri
E(G) and so φ (g) = g. Suppose without loss of coloring of S modulo X is in the
generality that g follows φ (e) in every set MCS φ (C* - CS).
clockwise listing in T of edges incident to xe, and 3. If u ∈ U and u ∉ MCS(u) then we say that u
that φ (f) follows g in every clockwise listing in is D-removable.
T of edges incident to xf . Now the edge e either 4. If u ∈ U and there is a sparse set X ⊂ E(S)
precedes or follows the edge g in any clockwise such that φ (X) is contractible and
listing in S of edges incident to xe. If e follows g MCS(u) I CS(X) = φ , then we say that u is C-
in every clockwise listing in S of edges incident removable.
to xe then φ (e) would both precede and follow 1. A configuration K is U-reducible if
φ (g) in every clockwise listing in T of edges 1) every u ∈ U, is either D-removable or C-
incident to xe. This however is impossible removable.
because dT (xe) = γ K(xe) ≥ 1. Therefore, it must 2) At least one u ∈ U is C-removable or the
configuration K is either D-reducible
be the case that e precedes g in any clockwise or C(4)-reducible.
listing in S of edges incident to xe. For similar Notice that each of the above types of reducibility
reasons, f must follow g in any clockwise listing depends only on R and S and not on H. This has
in S of edges incident to xf . Thus e and f share a the very practical application that if /V (R)/ is
triangular face with each other and with g, which relatively small, say 14 or 11, it is feasible
contradicts that X is sparse. This completes the computationally to calculate Maximum Critical
proof of the lemma. Subsets like MCS(u). This coupled with the
1.2.2 Defining Various Types of Reducibility following observations which relate CH to
We now introduce the notation that will be used MCS(u) are the key to reducibility because
for the rest of this chapter. Let K be a calculations on a small piece of the triangulation
configuration with free completion S and ring R. T yield information about the rest of the
Suppose that K appears in the triangulation T, triangulation which could be immense. Let us
that φ is a corresponding projection of S into T, recall that the operator fi was defined at the
that H is the near triangulation T - V (K(G)), and beginning of the chapter.
that φ wraps R around the outer facial walk of 1) If it is not the case that CH I CS ⊄ η ({u})
H. Finally, let X be a sparse subset of E(S). We for some u ∈ U, then it can be
now define various sets of colorings of R. Let C* shown that T has at least two vertex-4-colorings.
be the set of all colorings of the ring R, let CS be 2) If CH I CS ⊂ η ({u}) for some u ∈ U, then
the set of restrictions to R of Tri colorings of S,
CH ⊂ MCS(u) by Lemma 1.1.3.
and let U ⊂ C be the set of colorings of R which
Thus if T is a minimum counterexample, then CH
extend to a unique tri coloring of S. Note that
fi MCS(u). This will turn out to be valuable
C*(R) - CS is the set of colorings of
because the induction hypothesis can be used to
R which do not extend into S. The set CS(X) will
color H.
denote the set of restrictions to R of tri coloring
Robertson et al. used D-reducibility and C(k)-
of S modulo X. Also, let CH denote the set of lifts
of Tri colorings of H. By Lemma 1.1.2, for any B reducibility for 1 ≤ k ≤ 4 to prove the Four
⊂ C, there is a maximal U - critical subset of B Color Theorem [98]. Notice that reducibility for
which we denote by MCSU (B) or just MCS(B) the Four Color Theorem (Types 1. and 2.) is
for short. The notation MCS φ (B) will denote the defined for entire configurations while
reducibility for the Fiorini- Wilson-Fisk
maximal consistent subset of B. Finally, for u ∈
Conjecture must first be defined in terms of
U we denote the set MCSU ((C* - CS) U {u}) by individual colors in U (types 3. and 4.) and only
MCS(u). With these definitions in place, we now then defined for an entire configuration (type 1.)
define various types of reducibility, the first two This means that proving reducibility for the
of which appear in the literature and are suficient Fiorini-Wilson-Fisk conjecture will tend to be
to prove the Four Color Theorem, and the third, more computationally intensive than proving it
fourth and fifth of which are introduced to prove for the Four Color Theorem because in principle,
the Fiorini-Wilson-Fisk Conjecture. each color in U needs to be considered.
1. The configuration K is D-reducible if MCS φ 1.2.3 Proving Reducibility
(C* - CS) = φ . As noted above, S will not, in general, appear in
2. The configuration K is C(k)-reducible if there T, but suppose again for illustration that it does.
exists a sparse set set X ⊂ E(S) The ring R will appear in T and will naturally
split T up into two near triangulations, one of
them S and the other which we denote by H.
Reducibility For The Fiorini-Wilson-Fisk Conjecture
39
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
40
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
x4} then either C is a short circuit or some pair of Theorem 1.2.3 Let T be a minimum
diagonally opposite vertices of C, say x1 and x3 counterexample. Then no configuration
are adjacent to each other and {x1, x2, x3} and isomorphic to one in Appendix 1appears in T.
{x3, x4, x1} form triangular faces in T. Since Y is Proof: Let T be a minimum counterexample, and
sparse, Y has at most one edge in common which suppose that K is a configuration in Appendix 1
each of these two faces and so |E(C) I Y | ≥ 2 which appears in T. By Theorem 3.3.1, we know
and the inequality follows. If |E(C)| ≥ 6, then |X| that T is internally 6 - connected.
Let H and S be as at the beginning of Section
≥ 4 implies |E(C) - φ (X)| ≤ 2. So we may
1.2.2. We first notice that if CH I CS includes
assume |E(C)| = 1 and thus that |X| = 4. Let C =
x1, x2, x3, x4, x1. We may assume |E(C)-Y | = 1 two non-equivalent colorings, or if k ∈ CH I
and so all 4 edges of Y are in E(C). Let int(C) C S for some k ∈ CS -U, then Lemma 1.2.2
denote the sub drawing of T induced by the implies that T would have at least two non-
vertices in one of the arc-wise connected equivalent vertex-4- colorings. Therefore, we
components of Σ - C and let ext(C) denote the may assume that C H I C S ⊂ (C* - C S U
)
the sub drawing of T induced by the vertices in η ({u}), for some u ∈ U.
the other arc-wise connected component of Σ - Assume first that no u ∈ U is C-removable.
C.We may assume that either |V (int(C))| ≤ 1 or Therefore, every u ∈ U is D-removable, which
|V (ext(C))| ≤ 1, or else C is a short circuit. If |V implies that u ∉ MCS(u) for every u ∈ U. Since
(int(C))| = 0 or |V (ext(C))| = 0, then there are K appears in Appendix 1, Theorem 1.2.2 implies
only edges in one of the two disjoint regions of that K is either D-reducible or C-reducible. We
the sphere defined by C, but this will create first consider the case that K is D-reducible, and
triangular faces containing two edges of Y , a therefore that MCS (C* - C) = φ . Since T is a
violation of the sparseness of Y . Thus we must minimum counterexample, H has a vertex-4-
have |V (int(C))| = 1 or |V (ext(C))| = 1. By
coloring and thus CH ≠ φ ,. If CH I CS = φ ,
symmetry, we may assume the former and we
will let y denote the vertex for which V (int(C)) = then CH ⊂ (C* - CS) which implies that CH ⊂
{y}. Note that y has degree 1 and faces all the MCS(C* - CS) since Lemma 1.1.3 implies the
edges of Y and so cannot be a triad for Y . Since latter is consistent. This however, is a
there is a triad v for Y , v ∈ V (ext(C)), v is contradiction. Assume then that CH I CS = η
incident to at least three vertices xi1 , xi2 , xi3 ⊂ ({u}) for some u ∈ U. This also gives rise to a
{x1, x2, x3, x4, x1} which are, in turn endpoints of contradiction, because then CH ⊂ (C* - CS) U
edges in Y . By relabeling, we may assume xi1 = η ({u}) which implies CH ⊂ MCS(u) since by
x1 and xi2 = x2 and that i3 ∈ {3, 4}. If i3 = 4 then
{v, x4, y, x1} form a short circuit. So assume that Lemma 1.1.3, MCS(u) equals the maximal
i3 = 3, and deduce that {v, x3, x4, x1, x1} is either critical subset of (C* - CS) U η ({u}) and CH is
a short circuit, or there is a degree 1 vertex w that critical by Theorem 1.1.3. Thus u ∈ CH ⊂
is adjacent to {v, x3, x4, x1, x1}. We may assume MCS(u) which contradicts that u is D-removable.
{v, x3, x4, x1, x1} is not a short circuit in T, so the Now consider the case that K is C(4)-reducible,
later holds and v has neighbors {x1, x2, x3,w} and let X be a sparse subset of S such that φ (X)
which form a short circuit. This completes the
is contractible in T and that CS(X) I MCS(C* -
proof of the theorem.
We will call any A - contract X with |X| = 4 and CS) = φ . By Theorem 1.1.2, there is a tricoloring
for which X has a triad a safe contract. of T modulo X which we denote by c. Let cH and
Theorem 1.2.2 Every configuration in Appendix cX be the colorings that are guaranteed to exist by
1 is U-reducible. Moreover, for every u ∈ U that Lemma 1.2.4, let cH(R) be the lift of cH by φ
is C-removable, there is a safe u-contract X. and let cX(R) be the restriction to R of the
Proof: Let K be a configuration in Appendix 1. coloring cX. Lemma 1.2.4 says that cH(R) = cX(R)
The computer verifies that for every u 2 U, u is and that cX(R) ∈ CH I CS. Also, we know that
either D-removable or C-removable. When the
color is C-removable, the computer finds a u- c X(R) ∈ CS(X). Therefore cX(R) ∈ CH I CS I
contract X and verifies that X is safe. After CS(X). From this and our assumption that CH ⊂
showing that every u ∈ U is either D-removable (C* - CS) U η ({u}) for some u 2 ∈ , it follows
or C-removable, the computer verifies that the that cX(R) ∈ U and that CH ⊂ MCS(cX(R))
configuration K is U-reducible. If at least one of since by Theorem 1.1.3, CH is consistent and by
the u 2 U was C-removable, then U-reducibility Lemma 1.1.3, MCS(cX(R)) equals the maximal
for K is immediately established. Otherwise, the consistent subset of (C* -CS) U {cX(R)}. Since
computer verifies that K is either D-reducible or
we are assuming that every u ∈ U is D-
C(4)-reducible
Reducibility For The Fiorini-Wilson-Fisk Conjecture
41
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
REFERENCES:
[1] G.Chartrand, D.Geller. “On uniquely
colorable planar graphs”, J.Combin. Theory 6
(1969) 271-278.
42
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
@
Dept. of CSE, KLEF University, bvmallu@rediffmail.com
#
Dept. of IST, KLEF University, pawantummala@yahoo.co.in
$
Dept. of IST, KLEF University, srikanth_ist@klce.ac.in
^
Dept. of CSE, KLEF University, rajasekhar.kurra@klce.ac.in
ABSTRACT
Plagiarism of data from the internet is a rapidly growing problem in this competitive
world. Most of the students get accustomed to sometimes get their work done with a “cut and
paste” approach in assembling a paper in part. It perverts learning and assessment of subject.
Detection of cut and paste plagiarism is a time consuming and cumbersome task when it is
done manually, and can be greatly aided by automated software tools. This paper presents an
approach on the implementation of a software tool called SNITCH that uses a fast and
accurate plagiarism detection algorithm using the Google Web API. Several issues related to
plagiarism detection software are discussed and in addition to it the performance and
accuracy study are also dealt with.
1. INTRODUCTION
Plagiarism is a pervasive form of academic plagiarism detection and an associated software
dishonesty in collegiate settings. Since it distorts tool called SNITCH.
learning and assessment, deterring and detecting it
are crucial to maintaining academic integrity. 2. DEFINITION OF PLAGIARISM
Plagiarism fundamentally warps two essential
aspects of education, learning and assessment. “Plagiarize” derives from a Latin root meaning
Students who submit plagiarized work deprive “to kidnap”[4]. It is a form of dishonesty that
themselves of the learning opportunities afforded misrepresents intellectual property and that
by authentic academic productions and by deprives the creator of intellectual property due
assessments of those productions by educators [2, recognition. In academia, it is an unpardonable
3]. Large class sizes and an increase in writing mistake. Examples of plagiarism include failure to
assignments that result from writing across the give appropriate acknowledgement when using
curriculum combine to make detection of other’s words and presenting other’s line of
plagiarism burdensome. The rapid increase of thinking[5].
written material on the Internet and its ease of Plagiarism substitutes the physical labour of
appropriation contribute to the problem. theft and misrepresentation for the labour and
Detection of cut and paste plagiarism is time growth of learning. Moreover, plagiarism erodes
consuming when done by hand, so plagiarism the sense of community that is essential to free
detection software has emerged in response[13]. academic inquiry. Misrepresentation masks the true
This paper describes the design of an algorithm for identity of members of the community.
automated
43
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
The problem with this manual approach is Plagiarism detection software that uses the
that it is labour intensive, requiring detailed, on- Internet for its corpus is subject to effective
screen reading and re-reading of each paper, countermeasures. One is that Web sites associated
coupled with the repeated use a search engine with the sale of term papers are not openly
including copying and pasting selected passages connected to the World Wide Web. Materials
from each paper using a mouse and keyboard. acquired through these sites are likely to escape
Although this tedious approach is perhaps less detection. In addition, Web sites can deploy
exhausting than referring textbooks looking for software that repels Web crawlers such as those
potential matches, or being intimately familiar with used by TurnItIn[8,9].
enough such textbooks and other sources to Another issue is that an instructor can recognize
recognize stolen excerpts. where some copied material has been slightly
revised by replacing, adding or deleting one or
3.2 Software Approach more words to avoid detection. Software can
duplicate this approach, although it is a difficult
Software has been developed that reduces a lot of problem to solve. Because search engines allow for
the labour intensive aspects of manual approach of “wildcards” a simple approach of replacing any
detecting plagiarism. There are a number of short or common words in the passage with a
commercially available software tools and services wildcard may be an effective technique to detect
that perform automated checking. But the cost is cut and paste plagiarism.
relatively high, the turn-around time is sufficiently Other technical issue is that of false positives
long, or both, reducing the availability to those and false negatives. Corpus-based programs, such
educators with budget constraints. These available as TurnItIt.com, do an excellent job of finding
automated approaches often assume that large matches between student submissions and items in
sections of a paper, or even entire papers, would be their database. These programs, however, do not
copied verbatim[7]. Yet, for technical oriented distinguish between matches that are properly cited
research papers, such as in computer science and and those that do not, contain a high index of
engineering disciplines, a cut and paste approach plagiarism.
where paragraphs, sentences or even phrases can be Software tools that are available for use by
gathered into a report is easier to get away with. instructors could also be used by students, such that
Software tools have been successfully used students may try to defeat automated plagiarism
for detection of plagiarism in student programming detection by using such a program while submitting
assignments for many years. Two program files are their work [10]. Because of this the student submits
compared after some compiler like pre-processing his work without understanding the original
to try to find similarities in the files that could content.
indicate plagiarism. This form of software
44
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
The issues and approaches raised here, and the will increase or decrease the thoroughness, and
features and techniques used in previous tools and lengthen or shorten the time taken to analyze a
manual methods, provide the motivation for the paper, since the time to perform each search is
design and implementation of the SNITCH determined by load on the Internet, and Google
software. specifically, rather than the capabilities of the
user’s own computer.
5. DESIGN OF SNITCH
5.3 Evaluation
Here in the design of SNITCH the design of the
plagiarism analysis and detection algorithm used in An initial evaluation of the SNITCH software was
SNITCH is discussed in detail. performed to measure its effectiveness at detecting
instances of plagiarism in custom-designed
5.1 Algorithm plagiarism benchmarks and a sampling of typical
computer science student term papers. Results are
The algorithm developed for SNITCH uses a compared with results for the same papers using
sliding window technique and average length per the only other available practical and cost-effective
word metric to identify potential instances of software tool, Eve2. No formal comparison was
plagiarism. In general, the algorithm uses the done with online subscription services due to cost
following steps: constraints.
Open a document
Analyze the document 5.3.1 Comparison of Performance
o Read a window containing the first/next W
words Experiments using four synthetic benchmark term
o Measure the number of characters for each papers and a sampling of 10 actual student term
word papers were performed. The synthetic benchmarks
o Calculate the Weight of the window, the consisted of carefully crafted documents containing
average number of characters per word for the known amounts and instances of cut and paste
words in the window plagiarism representing hypothetical papers
o Associate this Weight with this particular containing high, moderate, minimal, and no
window for later use. plagiarism[4,13]. Actual student papers were
o Repeat for all such windows in the document, manually analyzed using careful online detective
shifting the window forward in the document work, and were divided into similar groupings
by 1 word based on the prevalence of plagiarism that was
Search for plagiarized passages found. These student papers were all rough drafts,
o Order windows in decreasing order, and and any plagiarism detected was later removed by
eliminate overlapping windows. the
o Rank all windows in decreasing order by Students. Three experiments were performed to
Weight. measure analysis speed and accuracy of SNITCH
o Select the top N weighted windows, and on the synthetic and real documents, and in
search the Internet for each, gathering the top comparison with the commercial plagiarism
search result (if any) for each detection program Eve2.
Generate a report – Create an HTML document
containing statistics of search time, number of Manual stats SNITCH stats
searches performed, percentage of document found
PET INSTANCES PET INSTANCES
to be plagiarized, and other
Pertinent statistics. Include the original document 0 0 0 0
with embedded HTML tags linking plagiarized
passages to their sources on the Internet [11]. 15 5 40 2
The algorithm is parameterized to allow
variation of the size of the sliding window (W) and 40 10 50 5
number of searches performed (N), to enable fine-
tuning on a per-user basis. Decreasing W will lead 75 19 63 12
to more potential candidates, but may increase false
TABLE 1: ANALYSIS RESULTS
positive results because the fewer words there are
in a search phrase, the more likely they could occur
by chance. Increasing W can improve the The graphical representation that shows the
confidence in individual search results, but if set performance of SNITCH is better than that of the
manual approach.
too high, it may reduce that likelihood that any
matches will be found if the window is larger that
the plagiarized passage. Increasing or decreasing N
45
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
6. CONCLUSION
ACKONOWLEDGEMENT
REFERENCES:
FIG
3: SNITCH STATS
[1]. Freedman, M. (2004, March). A tale of
Plagiarism and a new paradigm. Phi Delta Kappan
5.3.4 Comparison of performance of
85 (7), 545-549. Retrieved May 6, 2004 from
SNITCH and Eve2
Academic Search Elite.
Eve2 SNITCH
[2]. Kansas College Give First ‘XF’ Grade to
6:45 0.15 Plagiarist. (2003, December 8).Community College
Week. Retrieved May 6, 2004 from Academic
6:45 0.18 Search Elite.
46
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
47
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
ABSTRACT
The source code of the system needs to be analyzed in every step. For analyzing, system should be
represented in the form of a tree using any of the models that suits for our system because the source code
of the soft ware system will be highly detailed. So we can’t analyze the source code without using any
model. So, for analyzing a model is used to describe the entities and relationships .so, to represent that
model a graph is used. In this chapter we are considering a graph known as Attributed Relational graph
[ARG].
Software systems uses graphical representation because it will be very easy for them to trace out
the errors ,if any the source code of the system should be represented in the form of graph and that graph
should be divided in to smaller sub graphs based on their properties.
After representing the system as a graph, we have to find out the entities that were related, To
partition the graph into smaller modules. Related entities can be found out using association properly.
After finding out the similar entities [1], file level and function level measurements are defined.
Keywords:ARG,XML,DTD,Domainmodel,datamining,association.
48
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
Entities and relations of the specified more relations in the software system’s
domain model will be analyzed in source code. The advantage of this
directly if both the file level and domain model is that it is simpler than
function level analysis is carried out in a the detailed source-code domain model.
proper way. In Abstract domain model It is language independent for
the different types of entities are a procedural programming paradigm; and
subset of the types of entities in the yet it is adequate for architecture level
software system’s source code, and each Analysis.
relation in the abstract domain model is
an aggregation of one are
Here the file entities with other type of of these were of different
entities are separated using separate granularities.
entity-abs. this separation is because of iv) Each relation contains the
these were of the same granularity. attributes from and to, to
From the above figure, we can observe denote the source and
the following properties. destination entity for that
i) Entity-abs in a class relation.
ii) Relation-abs inherits all the Two types of relations exists
properties of that are identified i)file level and
by every entity in the abstract ii)function level
domain model.
iii) File entity with other type of File level relations
entities are separated using File level relations are of 4 types.
simple entity-abs (simpEnt- i) import-resource
abs).this separation is because ii) export-resource
iii) use-resource
System Representation For Software Architecture Recovery
49
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
50
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
51
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
52
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
Applying Apriori:
In the source region Gsreg(1) with
node 1 as main seed in fig 3.3.2(d) We consider
two associated groups with nodes 1,7,10,2,13
with entAssoc of 4;and 1,6,10,7,2 with entAssoc
of 3,5. The similarity value of node 10 to the
main seed node 1 is 4 and is obtained from the
first associated group
53
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
54
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
ABSTRACT
A comparison of ultrasonic velocity evaluated from Nomoto’s relation, Vandael ideal mixing
relation, impedence relation, Rao’s specific velocity relation and Junjie’s theory has been made in the
binary mixture cyclohexnae with o-xylene at 303.15, 308.15, 313.15 and 318.15 K. Ultrasonic velocity
and density of these mixtures have also been measured as a function of temperature and the experimental
values are compared with the theoretical values. A good agreement is found between experimental and
Vandael ideal mixing relation ultrasonic velocities. U2exp/U2imx has also been calculated for non-ideality in
the mixtures. The relative applicability of these theories to the present system discussed. The results are
explained in terms of intermolecular interactions occurring in these binary liquid mixtures.
Keywords - Ultrasonic velocity, Binary liquid mixtures, O-xylene, Theories of ultrasonic velocity.
AMS_82D15
55
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
The measurements were made at all the temperatures with the Collision Factor Theory,
help of thermostat with an accuracy of ±0.1K. UCFT = Uα x Smix x Rf mix --- (7)
III. THEORY
Vandael Theory:
The adiabatic compressibility has been determined by using
the experimentally measured ultrasonic velocity (U) and
1
U Vandael = 1/2
-- (8)
density (ρ) by the following formula x1 x
1 ( xM 2 2)
1 1 +xM 2
+ 2 2
βad = --- (1) MU
1 1 MU
2 2
ρU 2 Where, x1, x2 – Mole fractions
The molar volumes of the binary mixtures were calculated M1, M2 – Molecular weights
using the equation U1, U2 – Ultrasonic velocities
V = (X1M1+X2M2)/ρ --- (2)
Junjie Theory:
Nomoto Theory:
3
x1Vm1 +x2 Vm2
x R + x2 R2 UJunjie = 1/2
-- (9)
UNomoto = 1 1 --- (3) x1Vm1 x2Vm2
x1V1 + x2V2 ( x1 M1 +x2 M2 ) 2 + 2
Where R1 and R2 are the radiuses of 1st and 2nd liquid U1 U2
V1 and V2 are the molar volumes for pure liquids Where, x1, x2 – Mole fractions
R1 = molar volume of 1st liquid x (velocity)1/3 M1, M2 – Molecular weights
R2 = molar volume of 2nd liquid x (velocity)1/3 Vm1, Vm2 – Molar volumes
U1, U2 – Ultrasonic velocities
Free Length Theory (FLT):
k IV. RESULTS AND DISCUSSION
UFLT = --- (4) The values of density, viscosity, adiabatic compressibility and
L f x (density )1/ 2 molar volume for different mole fractions of o-xylene with
Where k is a constant and its values are 631, 636.5, 642 and cyclohexane at different temperatures are given in Table 1.
647 at 300C, 350C, 400C and 450C respectively.
Lf – Free length TABLE I - VALUES OF DENSITY (ρ), ADIABATIC COMPRESSIBILITY (β) AND
MOLAR VOLUME (Vm) FOR DIFFERENT MOLEFRACTIONS OF O-XYLENE WITH
CYCLOHEXANE AT DIFFERENT TEMPERATURES
Collision Factor Theory (CFT):
56
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
X1 ρ x 103 (kg/m3) β x 1012 (m2 N-1) Vm (cm3 mol-1)
at 303.15 K
0.0000 0.7678 85.3058 109.6119
0.0908 0.7768 84.0621 110.9140
0.1835 0.7865 82.2063 112.1388
0.2781 0.7975 80.1706 113.2023
0.3747 0.8096 77.9252 114.1358
0.4734 0.8222 75.7054 115.0268
0.5742 0.8304 74.1076 116.5612
0.6772 0.8368 72.3779 118.3771
0.7824 0.8486 69.6749 119.4594
0.8900 0.8614 67.0067 120.4319
1.0000 0.8707 64.0815 121.9249
at 308.15 K
0.0000 0.7625 90.1520 110.3738
0.0908 0.7731 88.3109 111.4448
0.1835 0.7831 85.9713 112.6257
0.2781 0.7946 83.5235 113.6155
0.3747 0.8070 80.9327 114.5035
0.4734 0.8194 78.7345 115.4199
0.5742 0.8280 76.7718 116.8990
0.6772 0.8349 75.1008 118.6465
0.7824 0.8466 72.2496 119.7416
0.8900 0.8600 69.3633 120.6280
1.0000 0.8694 66.5164 122.1072
at 313.15 K
0.0000 0.7587 93.2715 110.9266
0.0908 0.7711 91.1762 111.7339
0.1835 0.7811 88.6288 112.9141
0.2781 0.7930 86.2194 113.8447
0.3747 0.8054 83.4881 114.7310
0.4734 0.8181 80.9494 115.5891
0.5742 0.8270 78.9435 117.0404
0.6772 0.8337 77.3219 118.8173
0.7824 0.8453 74.2945 119.8258
0.8900 0.8585 71.2342 120.8387
1.0000 0.8677 68.4567 122.3464
at 318.15 K
0.0000 0.7531 97.3125 111.7514
0.0908 0.7668 94.8148 112.3605
0.1835 0.7787 92.0530 113.2621
0.2781 0.7907 89.4967 114.1759
0.3747 0.8034 86.7270 115.0166
0.4734 0.8158 84.0702 115.9292
0.5742 0.8254 81.9252 117.2672
0.6772 0.8329 80.0900 118.9314
0.7824 0.8440 77.0418 120.1105
0.8900 0.8567 73.5534 121.0926
1.0000 0.8659 70.6254 122.6008
Experimental and theoretical evaluation of ultrasonic velocities in binary liquid mixture cyclohexane + o-xylene at 303.15, 308.15, 313.15
and 318.15k.
57
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
The experimental values along with the values calculated theoretically using the relations of Nomoto’s, Free length
theory, Collision factor theory, Vandael ideal mixing, Junjie relation for cyclohexane+ o-xylene at the temperatures 303.15,
308.15, 313.15 and 318.15 K are given in Table 2.
TABLE II – EXPERIMENTAL AND THEORETICAL VALUES IN CYCLOHEXANE +O-XYLENE SYSTEM AT DIFFERENT TEMPERATURES
X1 Uexp UNomoto UFLT UCFT Uvandael UJunjie
303.15K
0.0000 1235.63 1235.62 948.71 1235.63 1235.63 1410.15
0.0908 1237.50 1245.69 961.29 1242.93 1239.63 1411.28
0.1835 1243.65 1255.81 978.13 1251.56 1244.67 1412.70
0.2781 1250.63 1265.98 997.37 1262.46 1250.83 1414.41
0.3747 1259.00 1276.21 1019.29 1275.29 1258.24 1416.41
0.4734 1267.50 1286.50 1042.14 1289.08 1267.04 1418.69
0.5742 1274.75 1296.84 1058.55 1296.19 1277.38 1421.28
0.6772 1284.95 1307.23 1075.25 1300.76 1289.46 1424.17
0.7824 1300.50 1317.68 1103.60 1313.96 1303.52 1427.37
0.8900 1316.25 1328.19 1133.82 1328.94 1319.83 1430.88
1.0000 1338.75 1338.75 1165.65 1338.75 1338.75 1434.71
308.15K
0.0000 1206.13 1206.12 919.67 1206.13 1206.13 1381.26
0.0908 1210.25 1216.63 935.64 1215.08 1210.49 1382.68
0.1835 1218.75 1227.22 654.40 1223.26 1215.90 1384.41
0.2781 1227.50 1237.89 975.37 1233.93 1222.46 1386.46
0.3747 1237.38 1248.64 998.56 1246.16 1230.30 1388.83
0.4734 1245.00 1259.48 1020.15 1258.53 1239.57 1391.54
0.5742 1254.25 1270.41 1038.52 1265.26 1250.45 1394.58
0.6772 1261.88 1281.43 1054.37 1269.63 1263.14 1397.97
0.7824 1278.63 1292.53 1082.48 1281.52 1277.91 1401.71
0.8900 1294.75 1303.72 1113.49 1296.17 1295.06 1405.82
1.0000 1315.00 1315.00 1143.26 1305.00 1315.00 1410.31
313.15K
0.0000 1188.75 1188.75 901.90 1188.75 1188.75 1364.76
0.0908 1192.63 1199.21 919.63 1205.33 1193.13 1366.05
0.1835 1201.88 1209.76 938.78 1217.48 1198.55 1367.67
0.2781 1209.38 1220.40 959.03 1231.88 1205.12 1369.61
0.3747 1219.50 1231.13 982.19 1246.33 1212.96 1371.88
0.4734 1228.75 1241.96 1005.36 1260.61 1222.22 1374.48
0.5742 1237.63 1252.88 1023.52 1267.95 1233.08 1377.43
0.6772 1245.50 1263.89 1038.37 1271.31 1245.75 1380.74
0.7824 1261.88 1275.00 1066.66 1281.33 1260.48 1384.42
0.8900 1278.75 1286.20 1097.81 1292.88 1277.60 1388.47
1.0000 1297.50 1297.50 1125.84 1297.50 1297.50 1392.91
318.15K
0.0000 1168.13 1168.13 879.71 1168.13 1168.13 1346.06
0.0908 1171.88 1178.70 900.00 1188.45 1172.65 1347.27
0.1835 1181.13 1189.39 919.74 1201.52 1178.21 1348.80
0.2781 1188.75 1200.18 939.94 1215.84 1184.92 1350.68
0.3747 1198.00 1211.07 962.47 1230.42 1192.91 1352.91
0.4734 1207.50 1222.07 985.08 1243.71 1202.34 1355.50
0.5742 1216.07 1233.19 1003.75 1251.88 1213.37 1358.46
0.6772 1224.38 1244.41 1019.78 1256.02 1226.23 1361.79
0.7824 1240.13 1255.74 1046.67 1264.70 1241.19 1365.52
0.8900 1259.75 1267.19 1079.23 1274.82 1258.56 1369.65
1.0000 1278.15 1278.75 1107.27 1278.75 1278.75 1374.21
Experimental and theoretical evaluation of ultrasonic velocities in binary liquid mixture cyclohexane + o-xylene at 303.15, 308.15, 313.15
and 318.15k.
58
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
2 2
TABLE III - U exp/ U imx VALUES WITH MOLEFRACTION FOR CYCLOHEXANE
WITH O-XYLENE AT DIFFERENT TEMPERATURES [6] Shipra Baluja & Swathi Oza, J Pure & Appl Ultrason, 24 (2002) 850
[7] Ali A, Yasmin A & Nain A K, Indian J Pure & Appl Phys. 40 (2002)
X1 U2exp/ U2 imx 315
[8] Amalendu Pal, Gurcharan Dass & Harsh Kumar, J Pure & Appl
303.15 K 308.15 K 313.15 K 318.15 K Ultrason, 23 (2001) 10
0.0000 1.0000 1.0002 1.0000 1.0000 [9] Rastogi et al, Indian J Pure & Appl Phys, 40 (2002) 256
0.0908 0.9966 1.0008 0.9992 0.9987 [10] Anwar Ali A, Anil Kumar Nain & Soghra Hyder, J Pure & Appl
Ultrason, 23 (2001) 73
0.1835 0.9984 1.0069 1.0056 1.0050 [11] Nomoto O, J Phys Soc Japan, 4 (1949) 280 and 13 (1958) 1528
0.2781 0.9998 1.0116 1.0071 1.0065 [12] Van Dael W & Vangeel E, Proc int conf on calorimetry and
0.3747 1.0014 1.0161 1.0108 1.0085 thermodynamics, Warasa (1955) 555
0.4734 1.0009 1.0147 1.0107 1.0086 [13] Shipra Baluja & Parsania P H, Asian J Chem, 7 (1995) 417
[14] Gokhale V D & Bhagavat N N, J Pure & Appl Ultrason, 11 (1989) 21
0.5742 0.9961 1.0135 1.0074 1.0045 [15] Junjie Z, J China Univ Sci Techn, 14 (1984) 298
0.6772 0.9932 1.0070 0.9996 0.9970 [16] Prakash A, prakash S & Prakash Q, Proc Nat Acd Sci, 55(A) 11 (1985)
0.7824 0.9956 1.0120 1.0022 0.9983 114.
[17] Sabeson R, Natarajan & Varadha Rajan R, Indian J Pure & Appl Phys,
0.8900 0.9947 1.0125 1.0018 1.0019 25 (1987) 489
1.0000 1.0000 1.0154 1.0000 1.0000 [18] Vogel A I, A text book of practical organic chemistry, 5th Edn (John
Wiley, New York)1989
[19] Riddick J A, Bunger W B & SokanoT K, techniques in chemistry, Vol
The ratio U2exp/ U2 imx is used as an important tool to measure
2, organic solvents, 4th Edition (John Wiley, New York) 1986
the non-ideality in the mixtures, especially in those cases [20] Satyanarayana N, Satyanarayana B & Savitha jyostna T, J Chem Eng
where the properties other than sound velocity are not Data, 52 (2007) 405.
known22. A perusal of Table 2 indicate large deviations from [21] Satyanarayana B, Savitha Jyostna T & Satyanarayana N, Indian J Pure
& Appl Phys, 44 (2006) 587.
ideality, which may be due to the existence of strong tendency [22] Viswanatha Sarma A & Viswanatha Sastry J, J Acous Soc Ind, Vol
for the formation of association in liquid mixtures through XXVII (1999) 309
hydrogen bonding as reported by Shukla et al 23. The [23] Shukla B D, Jha L K & Dubey G P, J Pure & Appl Ultrason, 13 (1991)
deviations between theoretical and experimental value of 72 Nikkam P S, Jagdale B S, Sawant A B & Mehdi hasa, J Pure & Appl
Ultrason, 22 (2000) 115.
ultrasonic velocities decrease with increase of temperature due
to breaking of hetero and homo molecular clusters at higher
temperatures24. On increasing the temperature, the ultrasonic
velocity values decreases in the binary liquid mixture. This is
probably due to the fact that the thermal energy activates the
molecule, which would increase the rate of association of
unlike molecules. Hence the complex formation through
hydrogen bonding will occur9. In the present work it is evident
to say experimental values of ultrasonic velocities are nearer
to ultrasonic velocities as calculated from Vandael ideal
mixing relation followed by CFT theory and Nomoto’s
relation. Further from Table.3 U2exp/U2imx indicates small
deviations from ideality, that means no strong interactions in
liquid mixtures through hydrogen bonding. This is probably
due to weak interactions in the liquid mixture.
CONCLUSIONS
An estimation of ultrasonic velocities of the binary mixtures at
four temperatures reveals that it agrees well with Vandael
ideal mixing relation followed by CFT and Nomoto’s relation.
ACKNOWLEDGEMENT
We would like to express our thanks to referees for valuable
comments that improved the paper.
REFERENCES
[1] Prausnitz J M, Lichenthalar & Azevedo, Molecular Thermodynamics of
fluid phase equilibria, second edition, (Prentice-Hall Inc, Englewood
Cliffs, New Jersey) (1986)
[2] Acree W E (Jr), thermodynamics properties of non electrolyte solutions
(Academic Press, New York)(1984)
[3] Rodriguez S, Lafuente C, Artigas H, Royo F M & Urieta J S, J Chem
Thermodynamics, 31 (1999) 139
[4] Naidu P S & Ravindra Prasad K, J Pure Appl Ultrason, 24 (2002) 18.
[5] Rao T S, Veeraiah N & Rambabu C, Indian J Pure & Appl Phys,
40(2002) 850
Experimental and theoretical evaluation of ultrasonic velocities in binary liquid mixture cyclohexane + o-xylene at 303.15, 308.15, 313.15
and 318.15k.
59
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
@
Asst.Professr, Sri Venkateswara Institute of Science Information Technology,Tadepalligudem. Stanlykumar.ande@gmail.com,
#
Professor, JNTU College of Engineering, Kakinada.
$
Professor,SRKR Engineering College,Bhimavaram.
^
Asst.Professr, Sri Venkateswara Institute of Science Information Technology,Tadepalligudem. venkatesh.visit@gmail.com
ABSTRACT
Automatic speech recognition by machine has been a goal of a research for a long time. Speech recognition is the process of
converting an acoustic signal, captured by a microphone or a telephone, to a set of words. The recognized words can be the final
results, as for applications such as commands & control, data entry, and document preparation. They can also serve as the input to
further linguistic processing in order to achieve speech understanding. There are many works carried out in this area. The speech
recognition system has also been implemented on some particular devices. Some of them are personal computer (PC), digital signal
processor, and another kind of single chip integrated circuit. In this paper we propose voice recognition to control robot.
Key words: Euclidean square distance, LPC, Voice recognition, Finger print.
60
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
Speech is a natural source of interface for human– In order to analyze speech, we needed to look at the
machine communication, as well as being one of the most frequency content of the detected word. To do this we used
natural interfaces for human–human communication [8]. several 4th order Chebyshev band pass filters. To create 4th
However, environmental robustness is still one of the main order filters, we cascaded two second order filters using the
barriers to the wide use of speech recognition. Speech following "Direct Form II Transposed" implementation of a
recognition performance degrades significantly under varying difference equations.
environmental conditions for many application areas.
The design had been done in the field of robotics and there P=( ) and Q = ( )
exists a line follower robots, sensor robots and used speech to
control a robot. It would make a robot which obeys human Where P is a dictionary fingerprint and Q is the sampled word
speech commands and performs errands. fingerprint and p i and q i are the data points that make up the
fingerprint. To see if two words are the same we compute the
Mathematics for speech analysis: Speech Analysis: Euclidean distance between them and the words with the
minimum distance are considered to be the same. The
Over View To Implementation Of Robotics With Voice Recognition
61
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
D=
62
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
Fingerprint Generation: first 2 KHz since this usually contains the first and second
speech formants, (resonant frequencies). This also allowed us
The program considers a word detected if a sample value from to sample at 4 KHz and gave us almost enough time to
the ADC is greater than the threshold value. Every sample of implement 10 filters. We thought we needed ten filters each
ADC is typecast to an int and stored in a dummy variable A with approximately a 200 Hz bandwidth so that we would
in. The A in value passes through 8 4th order Chebyshev band have enough frequency resolution to properly identify words.
pass filters with a 40 dB stop band for 2000 samples (half a Originally we had 5 filters that spanned from 0 – 4 KHz and
second) once a word has been detected. When a filter is used were sampling at 8 KHz, but this scheme did not produce
its output is squared and that value is accumulated with the consistent word recognition.
previous squares of the filter output. After 125 samples the
accumulated value is stored as a data point in the fingerprint of Fingerprint Comparison:
that word. The accumulator is then cleared and the process is
begun again. After 2000 samples 16 points have been Once the fingerprints are created and stored in the
generated from each filter, thus every sampled word is divided dictionary when a word was spoken, it was compared against
up into 16 parts. Our code is based around using 10 filters the dictionary fingerprints. In order to do the comparison, we
and since each one outputs 16 data points every fingerprint is called a lookup() function. The lookup() function did a pseudo
made up of 160 data points. Euclidean distance formula by calculating the sum of the
absolute value of the difference between each sample finger
Implementation of Filter: print a finger print from the dictionary. The dictionary has
multiple words in it and the lookup went through all of them
and picked the word with the smallest calculated number.
We had originally used the square of the correct Euclidean
distance calculation, d = Σ(pi – qi) 2. The words we finally
used in our dictionary were Let's Go, (sound of a finger
snapping), daiya [right – in Hindi], rukh [stop – in Hindi],
peiche [back – in Hindi]. We had originally used English
words, go, left, right, stop, and back, but many of these words
seemed to be very similar in frequency as far as our algorithm
was concerned. We then went to vowels and had better
success, but we still wanted to use words that were directions
and so we went to Hindi The set of words that we used were
mostly orthogonal, but in Hindi left is baiya, which sound very
similar to daiya and so that could not be used. We had
previously had success with snapping so we used that for left.
Fig.3. finger print implementation
PWM signal to move ROBOT:
Filter Implementation:
Once a word is recognized, its time to perform an
We chose a 4th order Chebyshev filter with 40 dB action based on the recognized word. To perform an action we
stop band since it had very sharp transitions after the cutoff generated a PWM signal using timercounter1. Control of the
frequency. We designed 10 filters a low pass with a cutoff of PWM signal generation is done by the car control() function.
200 Hz, a high pass with a cutoff of 1.8 KHz, and eight band For our robot, we needed to generate two different PWM
passes that each had a 200 Hz bandwidth and were evenly signals, one for moving the car front/back and another one to
distributed from 200Hz to 1.8 KHz. Thus we had band pass steer left or right. We also need to send a default PWM signal
filters that went from 200-400 Hz, 400-600, 600 – 800 and so to pause a robot. We chose timercounter1 because it has two
on all the way to the filter that covered 1.6 Khz – 1.8 Khz. different compare registers, OCR1A and OCR1B and can
We designed our filters in this way because we felt that most output two unique PWM signals. We used Phase correct mode
of the important frequency content in words was within the
63
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
to generate PWM signals because it is is glitch free, which is [2]. Thiang, “Implementation of Speech Recognition on
better for the motor. MCS51Microcontroller for Controlling Wheelchair”
proceedings of International conference on Intelligent and
To find out a frequency and a duty cycles at which advanced systems. Kuala Lumpur, Malaysia, 2007
car turns forward/backward and left/right, we attached an [3]. Y.M. Lam, M.W. Mak, and P.H.W. Leong , “Fixed point
oscilloscope probe to a car’s receiver. We sent different implementations of Speech Recognition Systems”.
signals to the receiver using the car’s remote control an d Proceedings of the International Signal Processing
measured the frequency and duty cycle for different motions. conference.Dallas. 2003.
From the measurements, we found that car PWM frequency [4]. Treeumnuk, Dusadee. (2001). Implementation of Speech
was 50Hz (period of 20ms) and had the following properties. Recognition on FPGA.Masters research study, Asian Institute
of Technology, 2001).Bangkok: Asian Instituteof Technology.
Conclusion: [5]. Soshi Iba, Christiaan J. J. Paredis, and Pradeep K. Khosla.
“Interactive MultimodalRobot Programming”. The
The Embedded systems design covers a very wide International Journal of Robotics Research (24), pp 83 –104,
range of microprocessor designs Our task is to design a 2005.
control module for a robot. The robot is a simple two wheel [6]. Sriharuksa, Janwit. (2002). An ASIC Design of Real Time
robot that uses two stepper motors for driving. The robot can Speech Recognition.(Masters research study, Asian Institute of
be programmed to drive autonomously a certain path. A list of Technology, 2002). Bangkok: AsianInstitute of Technology.
driving commands are first downloaded from a PC to the
robot, after which the robot will drive automatically through [7]. Lawrence Rabiner, and Biing Hwang Juang,
the program and to provides a framework to specify a system. Fundamentals of Speech Recognition.Prentice Hall, New
At the beginning of our project, we set a goal to recognize five Jersey, 1993.Speech recognition by machine. By William
words, at the end of project we got ive words to be recognized. Anthony Ainsworth, Institution of Electrical Engineers.
However our five words needed to be orthogonal to each other
[8] Andre Harison and Chirag Shah Voice recognition by
because our filters were not giving a high enough resolution
robot.
and inaccuracy in fingerprint calculations due to using fix
point arithmetic made the lookup function to be error prone. [9]. www.speechrecognition.com -/ united states.
As a result, we had to pick various different words that sound
apart. If we had to do this again instead of trying to use the [10]. Frank Vahid and Tony Givargis, Embedded System
Euclidean distance formula to match words we would like to Design: A Unified Hardware/Software Approach.
try do perform a correlation of the two fingerprints. A
correlation is less sensitive to amplitude differences and is a
better way of identifying patterns between two objects. If we
had faster process chip, we could modified our algorithm to
add more filters, perform Fourier transform, or floating point
arithmetic in order to improve our results.
ACKNOWLEDGEMENT
REFERENCES:
64
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
ABSTRACT
Extreme Programming is one of the most discussed to topics in the software development community. In this
paper, we discussed the fundamentals of Extreme Programming, how Extreme Programming distinguished from other
methodologies, how Extreme Programming addresses the risks encountered in software development, the values and basic
principles of Extreme Programming, advantages and disadvantages of Extreme Programming. Then we will see how
Extreme Programming uses a set of practices to build an effective software development team that produces quality
software in a predictable and repeatable manner.
65
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
Its ability to flexibly schedule the (4) Defect Rate: Testing (both programmer as
implementation of functionality, responding well as customer perspectives) Programmer
to changing business needs. (Testing function – b y – function)
66
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
XP insists that only the highest Scope: - Less scope makes it possible to deliver
priority tasks are addressed. better quality. It also let us delivers sooner or
cheaper.
(8) Staff turnover: - Pair programming
XP asks programmers to accept
responsibility for estimating and completing Four values:
their own work, gives them feedback about
Project will be successful when the team
the actual time taken, so that their estimates
follows a style that celebrates a consistent set
can improve.
of values that serve human and commercial
Thus there is less chance of or a needs:
programmer to get frustrated by being asked
Communication
to do the obviously impossible.
Simplicity
XP development cycle:
Feedback
Pair of programmers program together.
Courage
Development is driven by tests. Until, all the
tests run, the process of adding functionality Communication:
is not succeeded. Then coding activity begins.
XP aims to keep the right
Pairs don’t just make the test cases run. They communications flowing by employing many
also evolve the design of the system. Changes practices that can’t be done without
are not restricted to any particular area. Pairs communicating. They are practices that make
add value to the analysis, design, short term sense, like unit, testing, pair
implementation, testing of the system. They programming and task estimator. The effect of
add that value wherever the system needs it. testing, pairing and estimating is that
programmers and customers and managers
Integration immediately follows development,
have to communicate.
including integration testing.
This doesn’t mean that communications
Four Variables:
don’t sometimes get logged in an XP project.
There are four control variables in software People get scared, make mistakes, get
development model distracted XP employs a coach whose job is to
notice when people are not communicating
Cost
and reintroduce them.
Time
Simplicity:
Quality
The second XP value is simplicity. XP is
Scope making a bet. It is betting that it is better to do
a simple thing today and pay a little more
Interactions Between the variables: tomorrow to change it if it needs it than to do
Cost: - Giving a project too little money and it a more a complicated thing today that may
won’t be able to solve the customer’s business never be used any way.
problem, on the other band too much money
Simplicity and communication have a
too soon creates more problems than it solves.
wonderful mutually supporting relationship.
Time: - More time to deliver can improve
Feed back:
quality and increase scope. Give a project too
little time and quality suffers, with scope, time The third value in XP is feedback.
and cost not far behind. Concrete feed back about the current state of
the system is absolutely priceless. Optimism
Quality: - Quality is an important control
is an occupational hazard of programming.
variable we can make very short – term gains Feedback is the treatment. The programmers
by deliberately sacrificing quality, but the cost have minute – by – minute feed back about
– human, business, and technical is enormous.
the state of their system. When customers
write new ‘stories” (descriptions of feature),
Novelty Of Extreme Programming
67
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
the programmers immediately estimate them, problem today, and trust your ability to add
so the customers have concrete feedback complexity in the future where you need it.
about the quality of their stories.
Incremental change:
The person who tracks progress watches
Any problem is solved with a series of the
the completion of the tasks to give the whole
smallest changes that make a difference.
team feedback about whether they are likely
Hence the adoption of changes in XP must be
to finish everything they set out to do in a
taken in little steps.
span of time. The customers and testers write
functional tests for all the stories implemented Embracing change:
by the system. They have concrete feed back
about the current state of their system. The The best strategy is the one that preserves the
most obtains while actually solving your most
customers review the schedule every
pressing problem.
frequently to see if the terms over all velocity
matches the plan and to adjust the plan. The
system is put into production as soon as it
makes sense, to the business can begin to Quality work:
“feel” what the system is like in action & Of all the four Project variables – Quality is
discover how it can best be exploited. not really a free variable. The only possible
Concrete feedback works together with values are “excellent” and insanely excellent
communication and simplicity. depending on whether lives are at stake or not
Courage: otherwise we don’t enjoy our work & the
project goes down the drain.
When combined with communication,
simplicity and concrete feedback, courage Some less central principles:
becomes extremely valuable. Communication Teach learning
supports courage because it opens the
possibility for more high – risk, high – reward Small initial investment
experiments. Simplicity supports courage. Play to win
Concrete feedback supports courage because
of feeling much safer trying radical surgery on Concrete experiments
the code. Open, honest communication
Basic principles: Work with people’s Instincts, not against them
The fundamental principles are Accepted Responsibility
Rapid feed back Local Adaptation
Assume simplicity Travel light
Incremental change Honest Measurement
Embracing change Teach learning:
Quality work We will focus on teaching strategies for
Rapid feed back: learning how much testing you should do.
Also how much design refactoring and
Learning psychology teaches that the time everything else you should do.
between an action and its feedback is critical
to learning. So, our principle to get feed back, Small investment (Initial):
interpret it and put what is learned back into Too many resources too early in a project
the system as quickly as possible. are a recipe for disaster. Tight budgets force
Assume simplicity: programmers & customers to pare
requirements and approaches. Resources can
Treat every problem as if it can be solving be too tight. If you don’t have the resources
with ridiculous simplicity. This is the hardest to solve even one interesting problem, then
principle for programmers to swallow. XP the system you create is guaranteed not to be
says to do a good job of solving today’s
Novelty Of Extreme Programming
68
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
interesting. If you have some one dictating going along. Along the way a person told
scope, dates, quality & cost, there you are what to do will find a thousand of expressing
unlikely to be able to navigate to a successful their frustration, most of them to the detriment
conclusion. of the team & many of them to the detriment
of the person
The alternate is that responsibility be
accepted, not given you are past of a team,
Play to win: and if the team comes to the conclusion that a
certain task need doing, someone will choose
The difference between playing to win to do it, no matter how odious.
and playing not to lose, most software
development I see is played not to lose. Lots Local adaptation:
of paper gets written. Lots of meetings are
This is an application of accepted
held. Everyone is trying to develop “by the
responsibility to your development process.
book”, not because it makes any particular
Adopting XP means that you get to decide
sense, but because they want to be able to say
how to develop i.e. deciding on something
at the end’ that it wasn’t their fault, they were
today and being aware of whether it still
following the process. Software development
works tomorrow. You have to change and
played to win does every thing that helps the
adapt.
team to win and doesn’t do anything that
doesn’t help to win. Travel light:
Concrete experiments: The artifacts to be maintained are
Every time you make a decision and you Few
don’t test it, there is some probability that the
Simple
decision is wrong, the more decisions you
make the more these risks compound. The Valuable
result of a discussion of requirements should
XP team becomes intellectual nomads, always
also be a series of experiments. Every
abstract decision should be tested. prepared to quickly pack up the tents and
follow the herd. XP team gets used to
Open, Honest Communication: traveling light. They don’t carry much in the
way of baggage except what they must have
Programmers have to be able to tell each
to keep producing value for the customer –
other where there are problems in the code.
tests and code.
They have to be free to express their fears,
and get support. They have to be free to Honest measurement:
deliver bad news to customers and
management to deliver it early, and not be Our quest for control over software
development has led us to measure, which is
punished.
fine, but it has led us to measure at a level of
Works with people’s Instincts, not against detail that is not supported by our instruments.
them:
Practices of XP:
People like winning. People like
interacting with other people. People like The values of XP are implemented by
learning. People like being past of a team. employing 12 practices as elucidated by Kent
Beck.
People like being in control – people like
being trusted. XP celebrates what Planning game:
programmers seen to do when left to their
own devices, with just enough to keep the Determining the scope of project and releases
whole process on track, XP matches by combining business priorities with the
observations of programmers in the wild. technical estimates according to the changing
requirements.
Accepted Responsibility:
Primate dominance displays work only so
long in getting people to act like they are
Novelty Of Extreme Programming
69
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
70
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
• Truth: It seems to be a sweet spot for certain Keep the customer in charge of what is
kinds of projects. developed and when.
Advantages: To quickly demonstrate the benefits of XP,
implement it first on a new project with no
XP is indeed flexible. Changes in the legacy code.
priorities can be done repeatedly with very
little notice and customers will be served with Conclusion:
what they requested.
Tacit knowledge and communication among all team
Results and output can be forecasted to members are highlighted in XP. XP practices such as
customers at every schedule. Pair Programming and extensive testing further reinforce
this insight, as well as minimizing documentation. XP
XP team can inculcate satisfaction in puts a high premium on customer satisfaction. Taking
customer by revealing short releases and the customer within the team and receiving feedback
adapting changes requested by the customer. frequently are ways to accomplish it. This way
The unit tests written by the developer customer’s suggestions can be taken into account
team and acceptance tests written by the throughout the development project. The customer also
customer increases the degree of confidence participates in testing. Thus, XP is developed to provide
in the product. a favorable setting for programmers to be able to respond
rapidly to changing customer requirements.
Disadvantages:
Extreme flexibility exerts heavy responsibility
on the customers to produce strategic plans. ACKONOWLEDGEMENT
Responding to sudden changes is part and
parcel of XP, but adopting changes for every We would like to express our thanks to referees for valuable
iteration is confusing and may not be a sound comments that improved the paper.
business practice.
The lack of emphasis on documentation within REFERENCES:
XP does not take into account end user needs
for documentation, including user guides, [1]. Lindstrom, L., & Jeffries, R. (2004). Extreme
integration kits, reference texts and fact programming and agile software Methodologies.
sheets. Information Systems Management, 21(3), 41.
[2]. Beck, Kent and Martin Fowler. Planning Extreme
Programming, Addison-Wesley, Boston MA,
Problems encountered in the implementation of XP: October 2000.
Overly engineering [3]. Armitage, J. (2004). Are agile methods good for
design?`. Interactions, 11(1), n/a. Retrieved
Overly complex integration September 9, 2006, from Proquest database.
Unrepresentative acceptance testing [4]. Jeffries,R.What is extreme programming?
http://www.xprogramming.com
Coding assistant [5]. Osamu Kobayashi., Mitsuyoshi Kawabata., Makoto
Hard to test software Sakai., Eddy Parkinson., Analysis of the Interaction
between Practices for introducing XP effectively,
Obtuse specification ACM, 2006.
Recommendations: [6]. Grenning.,J., Launching Extreme Programming at a
Process Intensive Company, IEEE Software, Vol 18,
Have a contingency plan to manage resistant No.6, pp. 27-33, 2001.
participants who are not won over to XP. [7]. William.A.Wood., William.L.K., Exploring XP for
Make the necessary physical changes to the Scientific Research, IEEE Software, Vol.20, No. 3,
work place to foster too key tenets of XP: Pair pp30-36, 2003.
Programming and constant customer - [8]. Martin Lippert., Stefan Roock., Adopting XP to
developer communication. Complex Application Domains, ACM, 2001.
71
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
72
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
RADIATION EFFECTS ON MHD FREE CONVECTION FLOW PAST A SEMI-INFINITE MOVING VERTICAL
POROUS PLATE WITH SORET AND DUFOUR EFFECT
ABSTRACT
In this paper, we deal with the interaction of Soret and Dufour effects on steady MHD free convection flow in a
porous medium with dissipative fluid has received little attention. Hence, the object of the present chapter is to analyze the
Soret and Dufour effects on steady MHD free convection flow past a semi-infinite moving vertical plate in a porous
medium with viscous dissipation. The governing equations are transformed by using similarity transformation and the
resultant dimensionless equations are solved numerically using the Runge-Kutta method with Shooting technique. The
effects of various governing physical parameters on the fluid velocity, temperature, concentration, skin-friction
coefficient, Nusselt number and Sherwood number are shown in figures and tables and analyzed in detail.
Key words: MHD free convection, porous medium, vertical plate, and Nusselt number
73
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
Radiation Effects On Mhd Free Convection Flow Past A Semi-Infinite Moving Vertical Porous Plate With Soret And Dufour Effect
74
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
75
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
the heated surface more rapidly than for higher values of Pr.
4. RESULTS AND DISCUSSION Hence in the case of smaller Prandtl numbers as the boundary
As a result of the numerical calculations, the layer is thicker and the rate of heat transfer is reduced.
dimensionless velocity, temperature and concentration The effect of the viscous dissipation parameter i.e.,
distributions for the flow under consideration are obtained and the Eckert number Ec on the velocity and temperature are
their behaviour have been discussed for variations in the shown in Figs. 6(a) and 6(b) respectively. The Eckert number
governing parameters viz., the thermal Grashof number Gr, Ec expresses the relationship between the kinetic energy in the
solutal Grashof number Gm, magnetic field parameter M, flow and the enthalpy. It embodies the conversion of kinetic
permeability parameter K, Prandtl number Pr, Eckert number energy into internal energy by work done against the viscous
Ec, Dufour number Du, Schmidt number Sc, Soret number Sr fluid stresses. The positive Eckert number implies cooling of
and the suction parameter f w . the surface i.e., loss of heat from the plate to the fluid. Hence,
greater viscous dissipative heat causes a rise in the
The influence of the thermal Grashof number Gr on temperature as well as the velocity, which is evident from
the velocity is presented in Fig.1. The thermal Grashof Figs. 6 (a) and 6 (b).
number Gr signifies the relative effect of the thermal For different values of the Dufour number Du, the
buoyancy force to the viscous hydrodynamic force in the velocity and temperature profiles are plotted in Figs. 7(a) and
boundary layer. As expected, it is observed that there is a rise 7(b) respectively. The Dufour number Du signifies the
in the velocity due to the enhancement of thermal buoyancy contribution of the concentration gradients to the thermal
force. Here the positive values of Gr correspond to cooling of energy flux in the flow. It is found that an increase in the
the surface. Also, as Gr increases, the peak values of the Dufour number causes a rise in the velocity and temperature
velocity increases rapidly near the wall of the porous plate and throught the boundary layer. For Du ≤ 1 , the temperature
then decays smoothly to the free stream velocity. profiles decay smoothly from the surface to the free stream
Fig.2 presents typical velocity profiles in the value.
boundary layer for various values of the solutal Grashof The influence of Schmidt number Sc on the velocity
number Gm, while all other parameters are kept at some fixed and concentration profiles are plotted in Figs. 8(a) and 8(b)
values. The solutal Grashof number Gm defines the ratio of respectively. The Schmidt number embodies the ratio of the
the species buoyancy force to the viscous hydrodynamic force. momentum to the mass diffusivity. The Schmidt number
The velocity distribution attains a distinctive maximum value therefore quantifies the relative effectiveness of momentum
in the vicinity of the surface and then decreases properly to and mass transport by diffusion in the hydrodynamic
approach the free stream value. As expected, the fluid velocity (velocity) and concentration (species) boundary layers. As the
increases and the peak value is more distinctive due to Schmidt number increases the concentration decreases. This
increase in the species buoyancy force. causes the concentration buoyancy effects to decrease yielding
For various values of the magnetic parameter M, the a reduction in the fluid velocity. The reductions in the velocity
velocity profiles are plotted in Fig.3. It can be seen that as M and concentration profiles are accompanied by simultaneous
increases, the velocity decreases. This result qualitatively reductions in the velocity and concentration boundary layers.
agrees with the expectations, since the magnetic field exerts a These behaviors are clear from Figs. 8(a) and 8(b).
retarding force on the free convection flow. Figs. 9(a) and 9(b) depict the velocity and
The effect of the permeability parameter K on the concentration profiles for different values of Soret number Sr.
velocity field is shown in Fig. 4. The parameter K as The Soret number Sr defines the effect of the temperature
defined in equation (2.6) is inversely proportional to the actual gradients inducing significant mass diffusion effects. It is
permeability K ′ of the porous medium. An increase in K obvious that an increase in the Soret number Sr results in an
will therefore increase the resistance of the porous medium (as increase in the velocity and concentration with in the boundary
the permeability physically becomes less with increasing K ′ ) layer.
which will tend to decelerate the flow and reduce the velocity. Figs.10(a), 10(b) and 10(c) illustrate the influence of
Figs.5(a) and 5(b) illustrate the velocity and suction parameter f w on the velocity, temperature and
temperature profiles for different values of Prandtl number Pr. concentration respectively. It is observed that an increase in
The Prandtl number defines the ratio of momentum diffusivity the suction parameter results in a decrease in the velocity,
to thermal diffusivity. The numerical results show that the temperature and concentration.
effect of increasing values of Prandtl number results in a The effects of various governing parameters on the
decreasing velocity. From Fig.5 (b), it is observed that an
skin friction coefficient C f , Nusselt number Nu and the
increase in the Prandtl number results a decrease of the
thermal boundary layer thickness and in general lower average Sherwood number Sh are shown in Tables 1 and 2. From
temperature with in the boundary layer. The reason is that Table 1, it is observed that as Gr or Gm increases, there is a
smaller values of Pr are equivalent to increasing the thermal rise in the local skin-friction coefficient, Nusselt number and
conductivities, and therefore heat is able to diffuse away from
Radiation Effects On Mhd Free Convection Flow Past A Semi-Infinite Moving Vertical Porous Plate With Soret And Dufour Effect
76
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
f'
0.6
in Pr leads to a decrease in the skin-friction and Sherwood
number and an increase in the Nusselt number. It is also 0.4
noticed that an increase in Ec or Du leads to an increase in the
0.2
skin-friction and Sherwood number and a decrease in the
Nusselt number. It is observed that an increase in the Schmidt 0
0 0.5 1 1.5 2 2.5 3 3.5 4
number Sc reduces the skin-friction coefficient and Nusselt η
number and increases the Sherwood number. It is also seen Fig.3. Velocity profiles for different values of M
that an increase in Soret number Sr leads to an increase in the
1.4
skin-friction and Nusselt number and a decrease in the
Sherwood number. 1.2
K = 0.5, 1.0, 1.5, 2.0
1.4
1
Gr = 1.0, 2.0, 3.0, 4.0
Gr = 2.0 Gm = 2.0 M = 0.5
1.2
0.8 Pr = 0.71 Ec = 0.01 Du = 0.2
Sc = 0.6 Sr = 1.0 fw = 0.5
f'
1
Gm = 2.0 M = 0.5 K = 0.5 0.6
Pr = 0.71 Ec = 0.01 Du = 0.2
0.8
Sc = 0.6 Sr = 1.0 f w = 0.5
f'
0.4
0.6
0.2
0.4
0.2 0
0 0.5 1 1.5 2 2.5 3 3.5 4
η
0
0 0.5 1 1.5 2 2.5 3 3.5 4
η Fig.4. Velocity profiles for different values of K
Fig.1. Velocity profiles for different values of Gr
1.4
1.4
1.2
1.2 Gm = 1.0, 2.0, 3.0, 4.0 Pr = 0.71, 1.0, 1.25, 1.5
1
1 Gr = 2.0 Gm = 2.0 K = 0.5
Gr = 2.0 M = 0.5 K = 0.5 Sc = 0.6 Ec = 0.01 Du = 0.2
0.8
0.8 Pr = 0.71 Ec = 0.01 Du = 0.2 M = 0.5 Sr = 1.0 f w = 0.5
f'
0.6
0.6
0.4
0.4
0.2
0.2
0
0 0.5 1 1.5 2 2.5 3 3.5 4
0
0 0.5 1 1.5 2 2.5 3 3.5 4 η
η
Fig.5(a). Velocity profiles for different values of Pr
Fig.2. Velocity profiles for different values of Gm
Radiation Effects On Mhd Free Convection Flow Past A Semi-Infinite Moving Vertical Porous Plate With Soret And Dufour Effect
77
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
0.8
0.6 Pr = 0.71, 1.0, 1.25, 1.5
Du = 0.0, 0.2, 0.6, 1.0
θ
θ
0.4
0.2 Gr = 2.0 Gm = 2.0 K = 0.5
Pr = 0.71 Ec = 0.01 M = 0.5
Sc = 0.6 Sr = 1.0 f w = 0.5
0 0.2
0 0.5 1 1.5 2 2.5 3 3.5 4
η
0 0.2
0 0.5 1 1.5 2 2.5 3 3.5 4
η
0.6
0.4
0.4
0.2
0.2
0
0 0.5 1 1.5 2 2.5 3 3.5 4 0
η 0 0.5 1 1.5 2 2.5 3 3.5 4
η
Radiation Effects On Mhd Free Convection Flow Past A Semi-Infinite Moving Vertical Porous Plate With Soret And Dufour Effect
78
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
1
Sr = 0.0, 1.0, 1.5, 2.0 0.8
fw = 0.5, 1.0, 1.5, 2.0
0.8
0.6
Gr = 2.0 Gm = 2.0 K = 0.5
Pr = 0.71 Ec = 0.01 Du = 0.2 Gr = 2.0 Gm = 2.0 K = 0.5
φ
0.6
Sc = 0.6 M = 0.5 fw = 0.5 Pr = 0.71 Ec = 0.01 Du = 0.2
0.4 M = 0.5 Sr = 1.0 Sc= 0.6
φ
0.4
0.2
0.2
0
0 0.5 1 1.5 2 2.5 3 3.5 4
0 η
0 0.5 1 1.5 2 2.5 3 3.5 4
η Fig.10(c). Concentration profiles for different values of fw
Fig.9(b). Concentration profiles for different values of Sr
1.4 Table 1 Numerical values of the skin-friction coefficient C f ,
1.2
fw = 0.5, 1.0, 1.5, 2.0 Nusselt number Nu and
1
Sherwood number Sh for
0.8
Gr = 2.0 Gm = 2.0 K = 0.5 Pr = 0.71 , Ec = 0.01 , Du = 0.2 , Sc = 0.6 , Sr = 1.0
f'
0.4
0.2
0
0 0.5 1 1.5 2 2.5 3 3.5 4
η
Gr Gm M K fw Cf Nu Sh
Fig.10(a). Velocity profiles for different values of fw
1
2.0 2.0 0.5 0.5 0.5 0.8230 0.8618 0.4362
4.0 2.0 0.5 0.5 0.5 2 6 2
0.8
2.0 4.0 0.5 0.5 0.5 1.6865 0.9019 0.4647
fw = 0.5, 1.0, 1.5, 2.0
2.0 2.0 1.0 0.5 0.5 0 3 9
2.0 2.0 0.5 1.0 0.5 1.8853 0.9188 0.4794
0.6
2.0 2.0 0.5 0.5 1.0 3 3 3
θ
Radiation Effects On Mhd Free Convection Flow Past A Semi-Infinite Moving Vertical Porous Plate With Soret And Dufour Effect
79
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
Table 2 Numerical values of the skin-friction coefficient C f , [8]. Elabashbeshy E.M.A. (1997), Heat and mass transfer
along a vertical plate with variable temoerature and
Nusselt number Nu and concentration in the presence of magnetic field, Int. J.
Sherwood number Sh for Eng. Sci., Vol.34, pp. 515-522.
[9]. Chamkha A.J. and Khaled A.R.A. (2001), Similarity
Gr = 2.0 , Gm = 2.0 , M = 0.5 , K = 0.5 , f w = 0.5
solutions for hydrodynami simultaneous heat and
mass transfer by natural convection from an inclined
Pr Ec Du Sc Sr Cf Nu Sh plate with internal heat generation or absorption,
Heat Mass Transfer, Vol.37, pp.117-123.
0.7 0.0 0.2 0.6 1.0 0.8230 0.8618 0.4362 [10]. Eckert E.R.G. and Drake R. M. (1972), Analysis of
1 1 0.2 0.6 1.0 2 6 2 Heat and Mass Transfer,
1.0 0.0 0.2 0.6 1.0 0.7537 1.1087 0.2908 [11]. McGraw-Hill Book Co., New York. pp.217-230.
0.7 1 0.4 0.6 1.0 1 2 4 Dursunkaya Z. and Worek W. M. (1992), Diffusion-
1 0.0 0.2 0.7 1.0 0.8240 0.8590 0.4378 thermo and thermal diffusion effects in transient and
0.7 2 0.2 8 2.0 6 6 8 steady natural convection from a vertical surface, Int.
1 0.0 0.6 0.8405 0.8292 0.4573 J. Heat Mass Transfer, Vol.35, pp.2060-2065.
0.7 1 3 4 4 [12]. Kafoussias N.G. and Williams E.M. (1995),
1 0.0 0.7731 0.8469 0.4994 Thermal-diffusion and Diffusion-thermo effects on
0.7 1 5 4 9 free convective and mass transfer boundary layer
1 0.0 1.0084 0.9330 0.2931 flow with temperature dependent viscosity, Int. J.
1 4 8 3 Engg. Science, Vol. 33, pp.1369-1376.
[13]. Anghel M., Takhar H.S. and Pop I. (2000), Dufour
and Soret effects on free convection boundary layer
ACKNOWLEDGEMENT over a vertical surface embedded in a porous
[14]. medium, J. heat and Mass Transfer. Vol.43,
We would like to express our thanks to referees for valuable pp.1265-1274.
comments that improved the paper. [15]. Postelnicu A. (2004), Influence of a magnetic field
on heat and mass transfer by natural convection
REFERENCES from vertical surfaces in porous media considering
Soret and Dufour effects, Int. J. Heat Mass Transfer,
[1]. Bejan A. and Khair K.R. (1985), Heat and mass Vol.47, pp.1467-1472.
transfer by natural convection in a porous medium, [16]. Alam M.S. and Rahman M.M. (2006), Dufour and
Int. J. Heat Mass Transfer, Vol. 28, pp.909-918. Soret effects on mixed convection flow past a
[2]. Lai F.C. and Kulacki F.A. (1990), Coupled heat and vertical porous flat plate with variable suction,
mass transfer from a sphere buried in an infinite Nonlinear Analysis: Modelling and Control, Vol.11,
porous medium, Int. J. Heat Mass Transfer, Vol. 33, pp.435-442.
pp.209-215. [17]. Alam M.S., Ferdows M. and Maleque M.A. (2006),
[3]. Raptis A., Tzivanidis G. and Kafousias N. (1981), Dufour and Soret effects on steady free convection
Free convection and mass transfer flow through a and mass transfer flow past a semi-infinite vertical
porous medium bounded by an infinite vertical plate in a porous medium, Int. J. of Applied
limiting surface with constant suction, Lett. Heat Mechanics& Eng., Vol. 11, No.3, pp.535-545.
Mass Transfer, Vol. 8, pp. 417-424. [18]. Gebharat B.(1962), Effects of viscous dissipation in
[4]. Lai F.C. and Kulacki F.A. (1991), Coupled heat and natural convection , J. Fluid Mech., Vol. 14, pp.225-
mass transfer by natural convection from vertical 232.
surfaces in a porous medium, Int. J. Heat Mass [19]. Gebharat B. and Mollendorf J.(1969), Viscous
Transfer, Vol. 34, pp.1189-1194. dissipation in external natural
[5]. Huges W.F. and Young F.J. (1966), The Electro- [20]. convection flows, J. Fluid. Mech.,Vol.38, pp.97-
Magneto Dynamics of fluids, John Wiley and Sons, 107.
NewYork. [21]. Soundalgekar V.M.(1972), Viscous dissipation
[6]. Raptis A. (1986), Flow through a porous medium in effects on unsteady free convective flow past an
the presence of magnetic field, Int. J. Energy Res., infinite, vertical porous plate with constant suction,
Vol.10, pp. 97-101. Int. J. Heat Mass Transfer, Vol. 15, pp.1253-1261.
[7]. Helmy K.A. (1998), MHD unsteady free convection
flow past a vertical porous plate, ZAMM, Vol. 78,
pp. 255-270.
Radiation Effects On Mhd Free Convection Flow Past A Semi-Infinite Moving Vertical Porous Plate With Soret And Dufour Effect
80
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
Radiation Effects On Mhd Free Convection Flow Past A Semi-Infinite Moving Vertical Porous Plate With Soret And Dufour Effect
81
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
ABSTRACT
Pareto distribution of type IV is considered with a known location and shape parameters.
Estimation of its scale parameter by the well known maximum likelihood method is modified by two
different approaches in order to yield linear estimators. Estimation based on a single optimum quantile is
also presented. The proposed methods are compared with respect to simulated sampling characteristics.
82
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
xi Method I
where zi =
σ i
Let p = , i = 1, 2, 3, − − − − − n,
For M.L.Es of α and σ , i n +1
∂ logL ∂ logL Let Zi, Zi’ be the solutions of the following
= 0, =0 equations
∂α ∂σ
' ' '' ''
After simplification these equations become F(zi ) = pi and F(zi ) = pi
∧
n where
α =
n x pi qi pi qi
∑ log 1 + i '
pi = pi − , pi
' '
= pi +
i =1
σ n n
'' '
the expression zi − zi
zi (2.9)
h(z i ) =
1 + zi and γ i = h zi ( )
− δi zi
(2.6) (2.10)
of the log likelihood equation (2.5) for estimating σ The values of γi and δi in this method for n = 5, 10,
by a linear expression say 15 and 20 and for α = 2, 3and 4 are given in table (1)
h( z i ) ≅ γ i + δ i z i
(2.7) Method II
in certain admissible ranges of Zi. Such
approximations are not feasible for the log likelihood Consider the Taylor’s expansion of
equation of α. Hence we develop our approximate zi
h ( zi ) = in the neighbourhood of ith
ML method for estimation of σ with a known α. As 1 + zi
per the parametric specifications we take α = 2, 3
quantile of our standard Pareto population. We get
and 4. After using the linear approximation given by
another linear approximation for h(z), with δi = h '(zi
equation (2.7) in the equation (2.5) and solving it for
),
σ we get
1
−
(1 + α )∑δ
n
xi
z = (1 − p
i i
α ) , −1
∧ i
σ = i =1
n i
n − (α + 1 ) ∑ γ i pi =
i = 1
n +1
(2.8)
as an approximate MLE of σ , which is a linear γ i = h (z i ) − δ i z i
estimator. We suggest two methods of finding Substituting these approximations in the equation
γi, δi of equation (2.7 ). Similar methods are (2.8) we get another linear estimator of σ with
given in Srinivasa Rao and Kantam (2002) different values of γ i, δ i. The values of γi and δ i in
and Kantam and Sri Ram (2003) this method for n = 5, 10, 15, and 20 and α = 2, 3 and
4 are given in Table ( 2)
83
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
These two methods are asymptotically as efficient as 3 Estimation From Right Censored Samples
exact maximum likelihood estimators as can be seen
As described in section 2, we develop
from the following narration (Tiku et al , 1986;
estimation of the parameter σ from a censored
Balakrishnan, 1990).
sample with a known α.
In the suggested two methods of
Let X1 < X2 < X3 < X4 < -------- < Xn be
approximation, the function h(z) is linearised in the
an ordered sample of size ‘n’ from a Pareto
neighbourhood of the population quantile in two
different senses. Because sample quantiles are distribution with unknown scale parameter σ and a
consistent estimators of the corresponding population known shape parameter α. Let the largest ‘r’
quantiles and sample moments are consistent observations be deleted so that X1 < X2 < X3 <
estimators of the population moments, for large X4 < ------- < Xn –r is Type II right censored sample
values of ‘n’, the neighbourhood of the population (also called failure censored sample) from a Pareto
quantile becomes narrower, thereby giving more distribution (2.1). The log likelihood function to
linearity of h(z) in that neighbourhood. That is the estimate σ from the given censored sample is given
closeness of h (z) to γ + δ z is stronger, the larger from
the sample size. Hence the approximate and exact
∂ log L
expressions of the log likelihood equation
∂σ n −r
α xi
−(α + 1)
−α r
differ by little values. Also exact and approximate L ∝ ∏ 1+ ( 1+ xn−r )
i =1 σ σ
2
∂ log L
values of 2
would differ little. Hence the
∂σ n−r x
α
exact MLE, Modified MLEs by the two methods for tant + ∑ log −(α +1) log 1+ i
logL=Cons
the parameter σ shall have the same asymptotic bias i =1
σ σ
and asymptotic variance (Bhattacharya, 1985).
xn −r
However the same can not be said in small samples.
−α. r log1+
Since the exact MLE of σ is an iterative solution of σ
equation (2.5), its sampling variance can not be
mathematically tractable. Hence, we have resorted where the constant is independent of the parameters
to Monte Carlo simulation to get the empirical to be estimated. The log likelihood equation for
sampling characteristics of the exact M L E. We estimating σ is given by
have computed the simulated bias, variance and M S
E of exact M L E solving equation (2.5) iteratively
∂logL
for σ in 10,000 samples of size 5, 10, 15 and 20 =0
each generated from standard Pareto distribution ∂σ
with α = 2, 3 and 4. These are given in table (3).
⇒
n −r (α +1) n− r x
− 2 ∑ i − 2.
αr x n − r
= 0
The simulated bias, MSE, and variance of MML Es
of σ are also given in table (3).
σ σ i =1 1+xi σ xn − r
1+
σ σ
A comparison of the sampling
characteristics namely the bias, variance, and MSE
⇒
n−r (α +1) n− r zi αr zn − r
∧ ∧
of σ 1 , σ 2 - the two MMLEs together with those of
− ∑ − . =0
σ σ i =1 1+ zi σ 1+ zn − r
the corresponding exact MLE, reveal that MMLE of
Method I is preferable to that of Method II as well as n− r zi zn − r
exact MLE in small samples as Method I recorded ⇒(n − r) − (α + 1) ∑ − αr . =0
minimum values for bias variance and MSE. Coming i =1 1 + zi 1 + zn − r
to the actual magnitudes of these sample (3.1)
characteristics it is MMLE of method I that is closer It can be seen that equation (3.1) cannot be solved
to exact M L method rather than MMLE of Method analytically for σ .The M L E of σ has to be
II. obtained as an iterative solution of (3.1). We
zi
approximate the expression of the
1 + zi
Pareto Distribution - Some Methods Of Estimation
84
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
likelihood equation (3.1) for estimating σ by a linear which certain function is linearised depends on the
expression as size of the sample also. The larger the size, the
closer the approximation. That is, the exactness of
h (z i ) ≅ γi + δ i zi the approximation becomes finer and finer for large
(3.2) values of n. Hence, the approximate log likelihood
equation and the exact log likelihood equation differ
where γi, δi are to be suitably found, to get a by little quantities for large n. Therefore, the
modified MLE of σ. Proceeding on the same lines as solutions of exact and approximate log likelihood
mentioned in section 2.2 approximate likelihood equations tend to each other as n → ∞. Hence the
equation for σ is given by exact and modified M L Es are asymptotically
identical (Tiku et al 1986). However, the same
∂ log L ∂ log L cannot be said in small samples. At the same time
≅ = 0 the small sample variance of exact M L E is not
∂σ ∂σ mathematically tractable. We therefore compared
these estimates in small samples through Monte
Carlo simulation.
n− r
⇒(n−r) − (α+1) ∑ (γi +δi zi ) − αr (γn −r + δn −r zn −r ) = 0 The bias, the variance, the MSE of the
i =1
estimates by the two methods of modification and
that of the exact M L E obtained through simulation
for n = 5, 10, 15 and 20 and α = 2, 3 and 4 with all
n− r n −r xi possible considerations of right censored samples are
⇒ (n − r) − (α + 1) ∑ γ i − ∑ δi − α r γn − r
i =1 i =1 σ given in table 4for α = 2only.
xn − r
− α r δn − r =0 Conclusions:
σ
In most of the situations it is the MMLE of
Method – I that is rated as the most preferable
method; the second preference going to exact MLE.
⇒ σ (n−r) − (α+1) ∑ γi − α r γn − r
n− r
The same trend is observed for other values of α also.
i =1 Thus whether complete or censored sample, one can
n− r
go for MLE with iterative solution or MMLE – I
− (α+1) ∑ δi xi − α r δn − r xn − r = 0 with linear analytical estimator. In large samples, as
i =1 mentioned earlier all the three methods are equally
efficient.
n− r
∧
(α + 1) ∑ δi xi + α r δn − r xn − r
i =1
4 Estimation Based On Sample Quantiles
⇒σ = n− r
The concept of failure censored sample and
(n − r) − (α + 1) ∑ γi − α r γ n − r estimation therefrom as described in section 3 can be
i =1 modified slightly, with the notion of estimating
(3.3) unknown scale parameter σ based on selected order
and the resulting MMLEs of σ from the censored statistics in an optimum way. That is if ‘n’ is the
sample by the two methods are similar to those given given sample size and k is a positive integer less than
in section 2. The relevant values of slope and ‘n’ best linear unbiased estimation based on a subset
intercept are calculated for α = 2, 3, 4; n = 5, 10, 15, of k order statistics in the sample can be thought of
20, and for all possible combinations of r, which run using the theory of Lloyd (1952) if we have the
into 10 pages. Owing to the problem of space we are moments of order statistics in a sample of size ‘n’.
not including those tables here. n
Accordingly we can get c BLUES for σ each with
In the two methods referred above, the basic k
zi
principle is that the expression is its own variance given by the formulae of Lloyd
1 + zi
(1952). Among them, the BLUE with smallest
approximated by a linear function in some
variance is called estimator based on k – optimally
neighbourhood of the population quantile. It can be
selected order statistics. A revision of this procedure
seen that the construction of the neighbourhood over
Pareto Distribution - Some Methods Of Estimation
85
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
may be as fallows. Suppose a population contains a xp
single unknown parameter that requires estimation σˆ = −1
− α
x (4.1)
( ie ) F ( x) = 1 − 1 +
σ For an optimum choice of a sample quantile we have
to minimize the asymptotic variance given by (4.1)
with respect to P
=1 − [1 + x ] − α
(if σ = 1 ) d ∧
[ A S VA R (σ )] = 0
(i. e.) dp
− 1
⇒ ξ = [1 − p ] α
− 1
−1
2
P ( 1 − P ) [1 − P ] α − 1
d
⇒ − 2 (α + 1) = 0
x x dp −1
If is a standard Pareto variate, considering
α [1 − P ]
2 α
σ σ
as ξ, we get
2
−1 1 1
x
ξ = = [1 − p ] α − 1 α
1 − (1 − p)
α
2 − ( 1 − p)
σ 2p
−1
⇒ 4
+ 4
= 0
⇒ ξ = σ [1 − p ] α − 1 α
+ 2 α α
+ 2
( 1 − p) (1 − p )
d2
[ASVAR(xp )]=0
dp2
for a given sample of size n, if σ is to be estimated,
on the basis of a single sample quantile the above 1
1 1
equation can be used as ⇒ (1− p) α −6 pα − 6 p + 2α (1− p) α − 2α2 + 2α2 (1− p) α =
ξ
σ = −1
[1 − p ] −1 α 1 1
2α2 (1− p) α + 4α (1− p) α − 12 pα −16p −2α2
where ξ is the population pth quantile. The above
equation suggests a possible estimator for σ as
86
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
This equation has to be solved iteratively for P to get equation at α = 2, 3 and 4 gives that P = 0.000151,
its optimum value corresponding to a minimum of 0.000251, 0.000332. This shows that the sample size
the asymptotic variance of σˆ should be above thousand to get an asymptotic
We have found that Newton optimum sample quantile what ever may be the
Raphson method when applied to solve the above specified α.
87
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
TABLE 1
88
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
TABLE 2
α =2 α =3 α =4
n I γ δ γ δ γ δ
5 1 0.00759 0.83333 0.00348 0.88555 0.00199 0.91287
5 2 0.03367 0.66667 0.01598 0.76314 0.00929 0.81650
5 3 0.08579 0.50000 0.04256 0.62996 0.02531 0.70711
5 4 0.17863 0.33333 0.09403 0.48075 0.05768 0.57735
5 5 0.35017 0.16667 0.20221 0.30285 0.13036 0.40825
10 1 0.00217 0.90909 0.00098 0.93844 0.00055 0.95346
10 2 0.00911 0.81818 0.00419 0.87478 0.00239 0.90453
10 3 0.02167 0.72727 0.01014 0.80872 0.00586 0.85280
10 4 0.04092 0.63636 0.01956 0.73984 0.01142 0.79772
10 5 0.06836 0.54545 0.03347 0.66758 0.01977 0.73855
10 6 0.10615 0.45455 0.05342 0.59118 0.03201 0.67420
10 7 0.15759 0.36364 0.08193 0.50946 0.04993 0.60302
10 8 0.22826 0.27273 0.12355 0.42055 0.07692 0.52223
10 9 0.32902 0.18182 0.18791 0.32094 0.12041 0.42640
10 10 0.48789 0.09091 0.30289 0.20218 0.20331 0.30151
15 1 0.00101 0.93750 0.00045 0.95789 0.00026 0.96825
15 2 0.00417 0.87500 0.00190 0.91483 0.00108 0.93541
15 3 0.00972 0.81250 0.00447 0.87073 0.00256 0.90139
15 4 0.01795 0.75000 0.00836 0.82548 0.00482 0.86603
15 5 0.02919 0.68750 0.01379 0.77896 0.00800 0.82916
15 6 0.04386 0.62500 0.02103 0.73100 0.01229 0.79057
15 7 0.06250 0.56250 0.03046 0.68142 0.01795 0.75000
15 8 0.08579 0.50000 0.04256 0.62996 0.02531 0.70711
15 9 0.11462 0.43750 0.05801 0.57630 0.03486 0.66144
15 10 0.15026 0.37500 0.07777 0.52002 0.04729 0.61237
15 11 0.19447 0.31250 0.10330 0.46050 0.06367 0.55902
15 12 0.25000 0.25000 0.13693 0.39685 0.08579 0.50000
15 13 0.32147 0.18750 0.18288 0.32759 0.11694 0.43301
15 14 0.41789 0.12500 0.25000 0.25000 0.16435 0.35355
15 15 0.56250 0.06250 0.36379 0.15749 0.25000 0.25000
20 1 0.00058 0.95238 0.00026 0.96800 0.00015 0.97590
20 2 0.00238 0.90476 0.00108 0.93545 0.00061 0.95119
20 3 0.00550 0.85714 0.00251 0.90234 0.00143 0.92582
20 4 0.01005 0.80952 0.00463 0.86860 0.00265 0.89974
20 5 0.01616 0.76190 0.00751 0.83419 0.00432 0.87287
20 6 0.02398 0.71429 0.01126 0.79906 0.00651 0.84515
20 7 0.03367 0.66667 0.01598 0.76314 0.00929 0.81650
20 8 0.04546 0.61905 0.02183 0.72636 0.01277 0.78680
20 9 0.05957 0.57143 0.02896 0.68861 0.01705 0.75593
20 10 0.07632 0.52381 0.03760 0.64980 0.02228 0.72375
20 11 0.09606 0.47619 0.04801 0.60980 0.02866 0.69007
20 12 0.11926 0.42857 0.06054 0.56844 0.03644 0.65465
20 13 0.14653 0.38095 0.07567 0.52551 0.04595 0.61721
20 14 0.17863 0.33333 0.09403 0.48075 0.05768 0.57735
20 15 0.21667 0.28571 0.11653 0.43380 0.07230 0.53452
20 16 0.26220 0.23810 0.14455 0.38415 0.09088 0.48795
20 17 0.31760 0.19048 0.18031 0.33105 0.11517 0.43644
20 18 0.38693 0.14286 0.22776 0.27328 0.14839 0.37796
20 19 0.47802 0.09524 0.29521 0.20855 0.19756 0.30861
20 20 0.61118 0.04762 0.40646 0.13138 0.28394 0.21822
89
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
TABLE 3
90
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
TABLE 4
Sample Characteristics of MLE and MMLE of σ from right censored samples (for α = 2)
BIAS VARIANCE MSE
n r MMLE- MMLE-
MLE MMLE-I II MLE MMLE-I II MLE MMLE-I MMLE-II
5 1 0.14677 -0.02913 0.20894 0.75861 0.58640 0.94666 0.78015 0.58725 0.99031
5 2 0.14934 -0.00262 0.17056 0.74603 0.56047 0.77531 0.76833 0.56047 0.80440
5 3 0.12808 -0.00075 0.13638 0.93202 0.73245 0.94696 0.94843 0.73245 0.96556
91
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
ISSN:0974-8652
ACKNOWLEDGEMENT:
REFERENCES:
92
INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS
FROM
Dr.S.SATYANARAYANA
Editor-in-Chief –IJCMI
ISSN:0974-8652
D.NO:3-250.,PEDAKAKANI(POST)
GUNTUR(DIST).,A.P.,INDIA
E-Mail: ijcmi@in.com,ijcmi@yahoo.com,sijcmi@gmail.com
www.satyanspublications.weebly.com
http://www.ijcmi.webs.com/
To
HOD
Department of Mathematics & CSE
Sir,
Sub: “CALL FOR PAPERS TO INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS (IJCMI)”
The INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS (IJCMI) is a refereed Mathematics &Computer
science and Engineering journal devoted to publication of original research papers, research notes, and review articles, with emphasis on unsolved
problems and open questions in mathematics &Computer science and Engineering. All areas listed on the cover of Mathematical Reviews, such as
pure and applied mathematics.
The INTERNATIONAL JOURNAL OF COMPUTATIONAL MATHEMATICAL IDEAS (IJCMI) is an international research journal,
which publishes top-level work on computational aspects of mathematics interface between applied mathematics, numerical computation, and
applications of systems - oriented ideas to the physical, biological, social, and behavioral sciences. It includes but not limited to areas of mathematics
such as algebra (especially group theory), combinatorics (especially graph theory), geometry, number theory and numerical analysis; computational
complexity; cryptology; symbolic and algebraic computation; optimization; the mathematical aspects of: models of computation; automata theory;
categories and logic in computer science; proof theory; type theory; semantics of programming languages; process algebra and concurrent systems;
specification and verification; databases; rewriting; neural nets and genetic algorithms; computational learning theory; theorem proving ,Engineering
Physics,Applied Physics,Computational Physicsand more...
Journal publishes research articles and reviews within the whole field of Mathematical Sciences& Computer Science and Engineering, and
it will continue to provide information on the latest trends and developments in this ever-expanding subject.
INDIA Rs/- US $
1Year 2000 400
3Years 5800 760
5 Years 9500 1900
Editor-In-Chief-IJCMI