Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
About
About the Journal
Submissions
Privacy Statement
Editorial Team
Author Guidelines
Archives
Current
Forthcoming Articles
Indexing
Special Issues
Publication Ethics
Subscription
Announcements
Contact
Creative Commons Licence
Search
Register
Login
Home
/
Archives
/
Vol. 13 No. 1 (2022)
Vol. 13 No. 1 (2022)
Published:
22-05-2022
Research Article
A New Root-Finding Method for Univariate Non-Linear Transcendental Equations With Quadratic Convergence
G. Mahesh, V.S. Triveni, G. Swapna, K. Venkateshwarlu
1 - 8
339
PDF
382
On Some Bicomplex Hartley Transformations
Serpil Halici, Sule Curuk
9 - 17
212
PDF
223
A New Definition of Fractional Derivatives With Mittag-Leffler Kernel of Two Parameters
Sanjay Madhukar Chinchole, Ashok Bhadane
19 - 26
854
PDF
524
Some Results of Conditionally Sequential Absorbing Maps in 2-Menger Space
V. Srinivas, K. Satyanna
27 - 40
140
PDF
151
Coincidence Point and Common Fixed Point Theorems for Generalized Kannan Contraction on Weakly Compatible Maps in Generalized Complex Valued Metric Spaces
Issara Inchan
41 - 51
363
PDF
384
Some Results on Core Inverses of Block Matrices Over Skew Fields
D. Krishnaswamy, G. Sankari
53 - 73
157
PDF
199
Subdivision Graph, Power and Line Graph of a Soft Graph
Rajesh K. Thumbakara, Bobin George, Jinta Jose
75 - 85
266
PDF
282
Performance Analysis of \(M^X/M/1\) Queue With Working Vacation, \(N\)-Policy and Customer Impatience
G. Sridhar, V.N. Rama Devi, K. Chandan
87 - 101
273
PDF
156
Analysis of Fractional Order Differential Equation Using Laplace Transform
S. Britto Jacob, A. George Maria Selvam
103 - 115
202
PDF
171
On Secure Total Domination Cover Pebbling Number
S. Sarah Surya, Lian Mathew
117 - 127
224
PDF
181
Some Results on \(r\)-Row-Regular Circulant Partial Hadamard Matrices of Order \((k \times 2k)\)
Pankaj Kumar Manjhi, Mahendra Kumar Rana
129 - 136
195
PDF
122
On Two Classes of Exponential Diophantine Equations
Padma Bhushan Borah, Mridul Dutta
137 - 145
399
PDF
272
An Introduction to Multi Inner Product Space
Sujoy Das
147 - 161
168
PDF
150
Bayesian Analysis for Two Parameter Lomax Distribution Under Different Loss Functions
Pavitra Kumari, Vinay Kumar, Aditi
163 - 170
174
PDF
142
2D Hexagonal Finite Fuzzy Cellular Automata
M. Rajasekar, Lekha Susan Jacob, R. Anbu
171 - 181
155
PDF
109
Automata in Chinese Remainder Theorem
Mridul Dutta, Helen K. Saikia
183 - 197
190
PDF
129
On Hydromagnetic Boundary Layer of Casson Fluid Over Porous Inclined Magnetized Surface With Radiation and Convective Boundary Conditions
Aloliga Golbert, Ibrahim Yakubu Seini, Rabiu Musah
199 - 221
255
PDF
123
On Some Fixed Point Results for Cyclic \((\alpha,\beta)\)-admissible Almost z-Contraction in Metric-Like Space with Simulation Function
Snehlata Mishra, Anil Kumar Dubey, Urmila Mishra, R. P. Dubey
223 - 233
192
PDF
131
Almost \((\alpha/\eta)\)-\(\psi_\Gamma\)-Contraction in Induced Fuzzy Metric Space and Application to Fredholm Integral Equations
Rajesh Kumar Saini, Mukesh Kumar Kushwaha
235 - 252
199
PDF
118
A Generalised Balancing Sequence and Solutions of Diophantine Equations \(x^2\pm pxy + y^2\pm x = 0\)
P. Anuradha Kameswari, K. Anoosha
253 - 263
208
PDF
110
Some Results on Conditionally Compatible and Conditionally Semi-Compatible Mappings in Probabilistic 2-Metric Space
K. Satyanna, V. Srinivas
265 - 280
105
PDF
95
Reliability Modeling of a System With One Main Unit and Two Associate Units Along With Sub-Unit
Hemant Kumar Saw, H. L. Manker
281 - 293
148
PDF
107
Characteristics of Hyperideals in Ternary Semihyperrings
T. Anuradha, V. Lakshmi Prasannam, K. Jayalakshmi
295 - 306
259
PDF
134
On \((1, 2)^\star\)-\(\check{g}_\alpha\)-closed Sets
A. Ponmalar, R. Asokan, O. Nethaji
307 - 314
113
PDF
114
Review Article
Major Security Threats and Attacks that Facing Cloud Computing with the Main Defence Strategies
Abdullah Safhi, Adel Al-Zahrani, Aisha Mubaraki
315 - 329
165
PDF
160
Challenges and Obstacles Facing Data in the Big Data Environment
Hameed Abdullah Aloufi, Adel Habib Abdulaziz
331 - 349
140
PDF
131
Effect of Hidden Neuron Size on Different Training Algorithm in Neural Network
Arvind Kumar, Sartaj Singh Sodhi
351 - 365
322
PDF
138
Applying Artificial Intelligence in Supply Chain Management
Khaled Mofawiz Alfawaz, Ali Abdullah Alshehri
367 - 377
502
PDF
306
Analyzing Public Concerns Over COVID-19 Variants Using Social Media
Musleh Alsulami
379 - 386
134
PDF
117
Analysis User Acceptance of Saudi Banks Applications in Qassim Region Using UTAUT
Bayan S. Almutairi, Ebtihal K. Almutairi, Nora M. Almutairi, Meshaiel M. Alsheail
387 - 400
124
PDF
115
Data Security Challenges with its Defence Strategies of Internet of Things: Critical Review Study
Shuruq Zayed Al-Otaibi
401 - 415
135
PDF
109
Evaluation of Mobile Applications User Interfaces: A Case Study of Children’s Mobile Applications
Wajd Fahad Algashmari, Wajdi Aljedebi
417 - 425
136
PDF
106
Make a Submission
Make a Submission
Indexed in
Most Read Articles
Homomorphism between Rings
912
Some Fixed Point Theorems for \((\alpha,\beta,z)\)-Contraction Mapping under Simulation Functions in Banach Space
394
Incident Vertex \(\pi\)-Coloring of Graphs
282
A New Integral Transform With Applications to Fractional Calculus
262
Cyclic Averages of Regular Polygons and Platonic Solids
230
Keywords