Journal of Informatics and Mathematical Sciences
http://www.rgnpublications.com/journals/index.php/jims
<p>The <strong>Journal of Informatics and Mathematical Sciences</strong> is being regularly published since 2009. Its aim is to publish the original reserach articles pertaining to various branches mentioned below</p><table width="636" border="0" cellspacing="0" cellpadding="0"><tbody><tr><td valign="top"><ul><li><strong>Algebra</strong></li><li><strong>Analysis <br /></strong></li><li><strong>Applications of Mathematics to Various Branches of Engineering <br /></strong></li><li><strong>Approximation Theory <br /></strong></li><li><strong>Bayesian Statistics <br /></strong></li><li><strong>Coding Theory <br /></strong></li><li><strong>Combinatorial Optimization <br /></strong></li><li><strong>Computability and Computer Complexities <br /></strong></li><li><strong>Computational Aspects of Geometry and Algebra <br /></strong></li><li><strong>Computational Mathematics <br /></strong></li><li><strong>Computer Networks and Communications Security</strong> <br /><strong></strong></li><li><strong>Computer Science <br /></strong></li><li><strong>Control Theory <br /></strong></li><li><strong>Cryptography <br /></strong></li><li><strong>Dynamical Systems <br /></strong></li><li><strong>Electronic Sciences</strong></li><li><strong>Expert Systems and Artificial Intelligence <br /></strong></li><li><strong><strong>Exploratory Data Analysis</strong></strong></li><li><strong><strong></strong></strong><strong>Functional Equations <br /></strong></li><li><strong></strong><strong>Fuzzy Set Theory </strong></li></ul></td><td valign="top"><ul><li><strong>Game Theory</strong></li><li><strong>Geometry and Topology</strong></li><li><strong>Information Technology</strong></li><li><strong>Information Theory</strong></li><li><strong>Mathematical Theory of Artificial Intelligence <br /></strong></li><li><strong>Mathematical Economics <br /></strong></li><li><strong>Mathematics Education</strong></li><li><strong>Mathematical Linguistics <br /></strong></li><li><strong>Mathematical Logic <br /></strong></li><li><strong>Mathematical Physics <br /></strong></li><li><strong>Mathematical Modelling</strong><br /><strong></strong></li><li><strong>Mechanics </strong></li><li><strong>Nanoscience</strong></li><li><strong>Nanoengineering and Applications</strong></li><li><strong>Number Theory <br /></strong></li><li><strong>Numerical Analysis <br /></strong></li><li><strong>Operation Research including Reliability Theory and Queueing Theory <br /></strong></li><li><strong>Optimization Theory <br /></strong></li><li><strong>Parallel Computing and Artificial Neural Network Theory <br /></strong></li><li><strong>Probability <strong>Theory </strong> and Statistics</strong></li><li><strong>Stochastic Process </strong></li></ul></td></tr></tbody></table>To ensure speedy publication, only articles which are sufficiently well presented, containing significant results and not requiring major revisions will be considered. Papers are accepted only after Peer Review.<p>Editorial decisions on acceptance or otherwise are taken within 4 to 12 weeks (three months) from the date of receipt of the paper.</p><p>The journal will also publish survey articles giving details of research progress made ina specific area during the last three decades.</p> <img src="/journals/icons/jims/icore.jpg" alt="" />RGN Publicationsen-USJournal of Informatics and Mathematical Sciences0974-875X<span>Authors who publish with this journal agree to the following terms:</span><br /><ul><li>Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a CCAL that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</li><li>Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</li><li>Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.</li></ul>On Isometric Error-Correcting Codes over Finite Fields of Prime Order
http://www.rgnpublications.com/journals/index.php/jims/article/view/677
Error-correcting codes obtained from each other via a Hamming distance preserving transformation, called isometry, are equivalent. In this paper, we consider three different isometries which yield permutationally equivalent linear codes, monomially equivalent linear codes, and equivalent nonlinear codes, respectively. For each case, we derive some new necessary and sufficient conditions for equivalence using the concept of weight vector of a code or distance matrix of a code. Results hold for error-correcting codes over a finite field of prime order.T. I. Katsaounis2018-04-302018-04-3010Minimum Equitable Dominating Partition Energy of a Graph
http://www.rgnpublications.com/journals/index.php/jims/article/view/566
The partition energy of a graph was introduced by Sampathkumar et al. [12]. Motivated by this, we introduce the concept of minimum equitable dominating partition energy of a graph, \(E^E_p (G)\) and compute the minimum equitable dominating partition energy \(E^E_p (G)\) of few families of graphs. Also, we establish the bounds for minimum equitable dominating partition energy.Sashi Kanth Reddy AvulaP. Siva Kota ReddyK. N. Prakasha2018-04-302018-04-3010MATLAB Programming to Implement Quantum Walk Algorithm for Presenting Probability Distributions of Quantum Walks
http://www.rgnpublications.com/journals/index.php/jims/article/view/685
There are numerous ideas that have been provided by quantum walks for new quantum algorithms. In this article, we surveyed the discrete quantum walk algorithm to present probability distributions. Moreover, we transformed the algorithm into MATLAB programming. Finally, the programming can be utilised to compare coin flip transformations that generate probability distributions as proposed in several previous articles and also to identify a unitarity of a coin flip transformation.Lila YuwanaAgus PurwantoEndarko Endarko2018-04-302018-04-3010Characterization of Delta Operator for Poisson-Charlier Polynomials
http://www.rgnpublications.com/journals/index.php/jims/article/view/675
The aim of the paper is to study the characterization of delta operator associated with some Sheffer polynomials. In this paper, we consider Poisson-Charlier polynomials and investigate the characterization of delta operator via sequential representation of delta operator. From our investigation, we are able to prove an interesting propositions for the above mentioned.A. Maheswaran2018-04-302018-04-3010An Umbrella Surface in \(\mathbb{R}^{3}\) as An Orbit Surface
http://www.rgnpublications.com/journals/index.php/jims/article/view/680
In this study, an umbrella surface as an orbit surface of an umbrella motion is defined. Matlab applications and some examples are given.Senay BaydasBulent Karakas2018-04-302018-04-3010Influence of Poynting-Robertson Drag and Oblateness on Existence and Stability of Out of Plane Equilibrium Points in Spatial Elliptic Restricted Three Body Problem
http://www.rgnpublications.com/journals/index.php/jims/article/view/674
This paper studies existence and stability of the out of plane equilibrium points \(L_{6,7}\) analytically and numerically in the elliptical restricted three body problem, where both the primaries are radiating oblate spheroid, incorporating the effects of Poynting-Robertson (P-R) drag of the radiating primaries as well. It is observed that consideration of PR-drag forces results in the non-zero y-coordinate of the out of plane equilibrium points. The stability of the equilibrium points is studied in presence of PR-drag forces. Also the stability is further analyzed in the case when the PR-drag forces are neglected. We have explored the existence of out of plane equilibrium points and their stability around the binary systems: Luyten-726 and Sirius.A. ChakrabortyA. Narayan2018-04-302018-04-3010Dynamics of Oblate Test Particle under the Influence of Oblate and Radiating Primaries in Elliptic Restricted Three Body Problem
http://www.rgnpublications.com/journals/index.php/jims/article/view/678
This paper presents a generalized problem of the photogravitational restricted three body, where both the primaries are radiating; in the sense that the eccentricity of the orbits and the oblateness due to both the primaries and infinitesimal are considered. The positions and stability of the equilibrium points of this problem are studied. The stability analysis ensures that, the collinear equilibrium points are unstable in the linear sense while the stability condition for the triangular points is obtained. For illustrative numerical exploration four binary system: Luyten-726, Kruger-60 and Alpha-Centauri are considered, the location and stability of their planar equilibrium points are studied semi-analytically.A. NarayanA. ChakrabortyA. Dewangan2018-04-302018-04-3010Improving Cassification Engine in Content based Image Retrieval by Multi-point Queries via Pareto Approach
http://www.rgnpublications.com/journals/index.php/jims/article/view/456
Machine learning methods have demonstrated promising performance for Content Based Image Retrieval (CBIR) using Relevance Feedback (RF). However, a very limited number of feedback images can significantly degrade the performance of these techniques. In this work, each image is represented by a vector of multiple distance measures corresponding to multiple features. Each feature is considered a sub-query for RF process. In RF process, we propose to use Pareto method to get Pareto points (also called trade-off points) according to different depths. These points are used as relevant queries for the next RF round. Experimental results show that our proposed approach is very effective to improve the performance of the classification engine.Van-Hieu VuTruong-Thang NguyenHuu-Quynh NguyenQuoc-Tao Ngo2018-08-102018-08-1010Improved Binary Tree Coding for Image Compression using Modified Singular Value Decomposition
http://www.rgnpublications.com/journals/index.php/jims/article/view/498
Reducing the transmission cost while maintaining the quality of image data is the most challenging part in data transmission. In this paper, we report the possibility of improving the quality of image reconstruction by using modified singular value decomposition (SVD) and binary tree coding with adaptive scanning order (BTCA) for grayscale image compression. This method uses modified rank one updated SVD as a pre-processing step for binary tree coding to increase the quality of the reconstructed image. The high energy compaction in SVD process offers high image quality with less compression and is requires more number of bits for reconstruction. BTCA compression, also gives high image quality by coding more significant coefficients using adaptive scanning order from bottom to top with high compression rate. The proposed method uses both SVD and BTC for image compression and is tested with several test images and results are compared with those of SPIHT, JPEG, JPEG2000 and BTCA. The results show significant improvement in PSNR at high bitrates as compared to other methods.Naveen KumarB. N. JagadaleJ. S. Bhat2018-08-092018-08-0910Experience of a New Dedicated Meta-analysis Tool in Systematic Review and Meta-Analysis on Training Performances of Virtual Reality Bronchoscopy Simulation
http://www.rgnpublications.com/journals/index.php/jims/article/view/513
The increasing employment of virtual reality bronchoscopy simulation makes it essential to validate the effectiveness of training. This systematic review and meta-analysis performs comparisons among trained groups. Well-known sources (i.e., PubMed, Scopus, and Google Scholar) were systematically searched using a Boolean query based on PRISMA guidelines. The inclusion criteria were peer-reviewed English articles considering virtual reality training simulation based on flexible bronchoscopy for novices and experts, and the studies without enough data or not relevant in content were excluded. Then, the meta-analysis procedure based on random-effects model, heterogeneity and publication bias tests, and subgroup analyses were performed. Eight studies comprising two randomized clinical trials, two prospective, and four observational studies were analyzed. The results for forest plots were illustrated and the significant p values of the target groups were indicative of the fact that the virtual reality bronchoscopy simulation was effective between the groups. The outcomes of meta-regression analyses for sample size and published year showed that the latter one can explain most of the heterogeneity between the studies. And, the funnel plots were indicative of no publication bias. Finally, the high rates of explained variance between studies achieved by subgroup analyses were 89% and 52%. The virtual reality bronchoscopy simulation for training the target groups will be beneficial for both novice trainees and experts. The outcomes of current study showed the effectiveness of virtual reality training technique along with the consistent results in terms of meta-analysis, publication bias, meta-regression, heterogeneity, and subgroup analysis. The stand-alone meta-mums tool is available by requesting through the corresponding authors’ email addresses.Massoud SokoutiRamin SadeghiSaeid PashazadehSaeed Eslami Hasan AbadiMoshen SokoutiMorteza GhojazadehBabak Sokouti2018-08-092018-08-0910Type-2 Fuzzy Equivalence Relation on A Groupoid under Balanced and Semibalanced Maps
http://www.rgnpublications.com/journals/index.php/jims/article/view/535
In this paper we generalize the idea of balanced and semibalanced maps in type-2 fuzzy sets. The notion of type-2 fuzzy G-equivalence and G-congruence on a groupoid are introduced and some properties related to these notions have been established.Dhiman DuttaMausumi Sen2018-08-092018-08-0910About Atom Bond Connectivity and Geometric-Arithmetic Indices of Special Chemical Molecular and Nanotubes
http://www.rgnpublications.com/journals/index.php/jims/article/view/545
Among topological descriptors connectivity indices are very important and they have a prominent role in chemistry. Two useful of them are the <em>geometric-arithmetic</em> (GA) and atom-bond connectivity (<em>ABC</em>) indices and are defined as \(GA(G)=\sum\limits _{uv\in E(G)}\frac{2\sqrt{d_{u} d_{v} } }{d_{u} +d_{v} }\) and \(ABC(G)=\sum\limits _{e=uv\in E(G)}\sqrt{\frac{d_{u} +d_{v} -2}{d_{u} d_{v} } }\), in which \(d_u\) and \(d_v\) are the degrees of the vertices \(u\) and \(v\), respectively. n this paper we compute these connectivity topological indices for a special chemical molecular graph ``$Cas(C)$-$CaR(C)[m,n,p]$ Nanotubes Junction'' are given. The $Cas(C)$-$CaR(C)[m,n,p]$ Nanotubes Junction is a new nano-structure that was defined by M.V. Diudea, on based the new graph operations (Leapfrog Le and Capra Ca) on the cycle graph \(C_n\).Mohammad Reza FarahaniMohamad Nazri HusinWaqas Nazeer2018-08-092018-08-0910Fibonacci, Lucas Numbers with Daul Bicomplex Numbers
http://www.rgnpublications.com/journals/index.php/jims/article/view/575
Recently, the authors give some results about Fibonacci and Lucas numbers. In this present paper, our object introduce a detailed study of a new generation of dual bicomplex Fibonacci numbers. We define new dual vector which is called dual Fibonacci vector. We give properties of dual Fibonacci vector to expert in geometry and then we introduce some formulas, facts and properties about dual bicomplex Fibonacci numbers and variety of geometric and algebraic properties which are not generally known.Faik Babadag2018-08-092018-08-0910Local Closure Functions in Hereditary Generalized Topological Spaces
http://www.rgnpublications.com/journals/index.php/jims/article/view/714
<p>In this paper, we introduce and study the notions of local closure functions and also we introduce the operator \(\Psi_\Gamma\) in hereditary generalized topological spaces.</p>R. RameshKrishna PrakashN. Anbumani2018-08-092018-08-0910An Ensemble Learning Approach to the Predictive Stability of Echo State Networks
http://www.rgnpublications.com/journals/index.php/jims/article/view/827
This paper demonstrates the inherent capacity of the ensemble learning approach to stabilize the notoriously difficult to tune echo state network (ESN) learning machines. ESN learning machines belong to a class of recurrent neural networks made popular because of their ability to perform predictively well on time series data. However, for any given task, building the corresponding optimal ESN is notoriously hard because of the instability of the tuning process. In this paper, we harness the high predictive variance by building ensembles made up of lightly tuned ESNs, and then combining those ESNs (base learners) rather than seeking the daunting task of selecting a single one. Throughout this paper, all our examples consistently demonstrate substantial reductions in average prediction error as a result of using the aggregate learning machine in place of the single one.Qiuyi WuErnest FokoueDhireesha Kudithipudi2018-08-092018-08-0910Nonnegative Matrix Factorization with Toeplitz Penalty
http://www.rgnpublications.com/journals/index.php/jims/article/view/851
Nonnegative Matrix Factorization (NMF) is an unsupervised learning algorithm that produces a linear, parts-based approximation of a data matrix. NMF constructs a nonnegative low rank basis matrix and a nonnegative low rank matrix of weights which, when multiplied together, approximate the data matrix of interest using some cost function. The NMF algorithm can be modified to include auxiliary constraints which impose task-specific penalties or restrictions on the cost function of the matrix factorization. In this paper we propose a new NMF algorithm that makes use of non-datadependent auxiliary constraints which incorporate a Toeplitz matrix into the multiplicative updating of the basis and weight matrices. We compare the facial recognition performance of our new Toeplitz Nonnegative Matrix Factorization (TNMF) algorithm to the performance of the Zellner Nonnegative Matrix Factorization (ZNMF) algorithm which makes use of data-dependent auxiliary constraints. We also compare the facial recognition performance of the two aforementioned algorithms with the performance of several preexisting constrained NMF algorithms that have non-data-dependent penalties. The facial recognition performances are evaluated using the Cambridge ORL Database of Faces and the Yale Database of Faces.Matthew CorsettiErnest Fokoué2018-08-092018-08-0910Speeding Up the Partial Digest Algorithm
http://www.rgnpublications.com/journals/index.php/jims/article/view/611
We consider the partial digest problem, which aims to find the set \(X=\{x_0, x_1,\ldots,x_n\}\) such that \(\Delta X=\{ | x_j – x_i |,\, 0\leq i < j \leq n\}\) is equal to the input of the problem which is a multiset \(D=\{d_1, d_2,\ldots, d_m\}\). In bioinformatics, the lengths of DNA fragments represents the multiset \(D\), while the set of restriction site locations represents the set \(X=\{x_0, x_1,\ldots, x_n\}\). In this paper, we study experimentally the effect of increasing and decreasing the number of levels on the breadth-breadth algorithm which is the best practical algorithm for the partial digest problem. The experimental study shows that the running time of breadth-breadth method is not the minimum time. Also, we obtained the number of levels that is used in the breadth-breadth algorithm to reduce the running time.Hazem M. BahigMostafa M. Abbas2018-08-102018-08-1010Binet Forms Involving Golden Ratio and Two Variables: Convolution Identities
http://www.rgnpublications.com/journals/index.php/jims/article/view/777
The irrational number \(\Phi = \frac{1+\sqrt{5}}{2}\) or \(\phi =\frac{−1+\sqrt{5}}{2}\) is well known as golden ratio.The binet forms \(L_n = \Phi^n + (−\phi)^n\) and \(F_n = \frac{\Phi^n−(−\phi)^n}{\sqrt{p5}}\) define the well known Lucas and Fibonacci numbers. In the present paper, we generalize the binet forms \(\Phi_n(x,y) = \frac{1}{y\cdot \sqrt{5}}[(x + y\Phi)^n−(x−y\phi)^n]\) and \(\pi_n(x,y)=[(x + y\Phi)^n +(x−y\phi)^n]\). As a result we obtain a pair of two variable polynomial which are new combinatorial entities. Many convolution identities of Ln and Fn are getting added to the recent literature. A generalized convolution identities will be a worthy enrichment of such combinatorial identities to the current literature.R. RangarajanHonnegowoda C.K.2018-08-102018-08-1010Solving Non-Homogeneous Coupled Linear Matrix Differential Equations in Terms of Matrix Convolution Product and Hadamard Product
http://www.rgnpublications.com/journals/index.php/jims/article/view/647
<pre>We investigate a system of coupled non-homogeneous linear matrix differential equations. </pre><pre>By applying the diagonal extraction operator, this system is reduced to </pre><pre>a simple vector-matrix differential equation. An explicit formula of the general solution </pre><pre>is then obtained in terms of matrix convolution product, Hadamard product, </pre><pre>and elementary matrix functions. Moreover, we discuss certain special cases of the main system </pre><pre>when initial conditions are imposed.</pre>Sarat SaechaiPattrawut Chansangiam2018-08-102018-08-1010A Dual Method to Study Motion of A Robot End-Effector
http://www.rgnpublications.com/journals/index.php/jims/article/view/679
This paper presents a dual method to study motion of a robot end-effector by using the curvature theory of a dual curve which corresponds to a ruled surface generated by a line fixed in the end-effector. By using dual method, translational and angular differential properties of motion such as velocity and acceleration are determined without redundant parameters. These properties are important information in robot trajectory planning. As a practical example, motion of a robot end-effector in which a line fixed in the end-effector generates a surface of hyperbolic paraboloid is investigated.Burak ŞahinerMustafa KazazHasan Hüseyin Uğurlu2018-08-102018-08-1010Free Convective Unsteady MHD Flow in Slip-Flow Regime Past A Vertical Plate with A Convective Surface Boundary Condition
http://www.rgnpublications.com/journals/index.php/jims/article/view/1050
This paper examines the unsteady free convective viscous incompressible MHD flow past a vertical porous flat plate with convective surface boundary condition in slip flow regime under the influence of uniform magnetic field acting perpendicular to the porous surface. Assuming time dependent variable suction velocity at the porous plate, analytical expressions for the flow characteristics are obtained by using perturbation technique which converts the non-linear partial differential equations into ordinary differential equations. The effect of various parameters such as Prandtl number, Grashoff number, the Magnetic field parameter, Suction parameter and Convective heat change parameter on the transient velocity, transient temperature, skin friction coefficient and the rate of heat transfer are discussed with the help of graphs.Preeti GargG. N. PurohitR. C. Chaudhary2018-08-102018-08-1010Differential Transform Method in General Orthogonal Curvilinear Coordinates
http://www.rgnpublications.com/journals/index.php/jims/article/view/1052
Many real world problems are governed by non-linear differential equations. These may be single or system of ordinary or partial differential equations. In practice, problems involving single differential equations are mostly solved using analytical procedures, while those with systems of equations are solved numerically. A semi-analytical procedure namely Differential Transform Method (DTM) obtained from Taylor series in Cartesian co-ordinates is being used to solve linear or nonlinear equations in practice. This paper introduces the Taylor series and DTM for general orthogonal curvilinear co-ordinates and focuses mainly on DTM in standard two-dimensional polar co-ordinates and three-dimensional cylindrical polar and spherical polar coordinates.Vimala P.Blessie Omega P.2018-08-102018-08-1010Effect of Blade Design on Angular Velocity of Vertical Axis Wind Turbine – CFD Analysis
http://www.rgnpublications.com/journals/index.php/jims/article/view/1053
Application of Vertical Axis Wind Turbine (VAWT) for generation of power is gaining momentum. However no research has been done to increase the efficiency of blade design for bidirectional wind flow. In the present study the effect of blade profile and thickness for a Savonius wind turbine has been studied. Different blade profiles with thickness 2mm, 4mm and 6mm were modelled. A numerical analysis was done for a bi-directional wind input. The model for the rotor was designed on Solidworks 2017 and a numerical analysis was carried outon commercial CFD software, Ansys Fluent. From the analysis, the angular velocity graphs were plotted with respect to time and compared. The effect of the blade profiles and thickness were studied. And it was observed that 2mm blade with curved profile was most suitable for bidirectional wind flow as it gains stable velocity sooner which is an important factor for power generation.Arun Prakash C.Ponsuganth Ilangovan P.Nitin JoySubramanian R.2018-08-102018-08-1010Analysis of Heat Transfer of Cu-Water Nanofluid Flow Past a Moving Wedge
http://www.rgnpublications.com/journals/index.php/jims/article/view/1054
In this paper, heat transfer of a steady, two-dimensional, incompressible Cu-water nanofluid flow over a moving wedge in the presence of thermal radiation effect are investigated. Gyarmati’s variational principle developed on the thermodynamic theory of irreversible processes is employed to solve the problem numerically. The governing boundary layer equations are approximated as simple polynomial functions, and the functional of the variational principle is constructed. The Euler-Langrange equations are reduced to simple polynomial equations in terms of boundary layer thicknesses. The velocity and temperature profiles as well as skin friction and heat transfer are analyzed for various parameters. The obtained numerical solutions are compared with the previously published results and are found to be in good agreement.M. Shanmugapriya2018-08-102018-08-1010Behaviour of Concrete Filled Steel Tubes
http://www.rgnpublications.com/journals/index.php/jims/article/view/1056
Concrete filled steel tubular columns are preferred due to their excellent static and dynamic resistant properties such as high strength, high ductility and large energy absorption capacity. The comparison of the ultimate strength of CFST with Hollow steel tube, RCC and the bond strength between concrete and the steel was done both experimentally and analytically using ANSYS. A total of 18 specimens were cast, out of which ultimate strength was determined for 13 specimens and bond strength was observed for 5 specimens using push out test. Both experimental and analytical observations using ANSYS were carried on a cylinder of height 460mm and a diameter of 113mm. The grade of concrete used for infill is M30. The tests were carried on an Ultimate Testing Machine. The ultimate strength of CFST, RCC and HST were compared and CFST having the advantages of both concrete and steel is found to behave better and average bond strength ranges between 0.7 to 1.1N/mm\(^2\).Sangeetha P.Ashwin Muthuraman R.M.Dachina G.Dhivya M.Janani S.Sai Madumathi2018-08-102018-08-1010Rheodynamic Lubrication of an Externally Pressurized Converging Circular Thrust Bearing using Bingham Lubricant
http://www.rgnpublications.com/journals/index.php/jims/article/view/1057
In this research paper we have theoretically analyzed the effects of the angle of convergence and the non-Newtonian characteristics on the performance of an externally pressurized converging circular thrust bearing using Bingham fluid as the lubricant. Since Bingham lubricants are known to have a characterized yield value, there will be a formation of unyielding core in the region between the plates of the bearing. The solutions are obtained for the pressure and load carrying capacity of the bearing for various values of Bingham number and the angle of convergence. The effects of the Non-Newtonian characteristics of the lubricant and the angle of convergence on the performance of the bearing are discussed.I. Jayakaran AmalrajG. Alexander Raymand2010-08-102010-08-1010Multi Stage Power Generation in An Open Canal System by Accelerated Flow
http://www.rgnpublications.com/journals/index.php/jims/article/view/1058
The present work considers the possibility of using river currents to generate electric power in order to supplement existing power units. A physical system consisting of a flowing river/canal with rectangular cross section, an open channel nozzle, and an impact turbine is modelled mathematically. The model is simulated using MATLAB for varying slopes and two nozzle-turbine sequences. It is found that the usage of nozzles demonstrably increases the velocity, and therefore, the kinetic energy of the flow. A total power ranging from 0.34 to 10.79MW for the lowest and highest value of slope, respectively, is predicted by the model. Possible applications are discussed.Adhithiya SivakumarAnandh R.Arjun AnantharamanSuresh M.2018-08-102018-08-1010A Study on Arithmetic Integer Additive Set-Indexers of Graphs
http://www.rgnpublications.com/journals/index.php/jims/article/view/617
Let $\N$ be the set of all non-negative integers and $\cP(\N)$ be its power set. An integer additive set-indexer (IASI) of a graph $G$ is an injective function $f:V(G)\to \cP(\N)$ such that the induced function $f^+:E(G) \to \cP(\N)$ defined by $f^+ (uv) = f(u)+ f(v)$ is also injective. A graph $G$ which admits an IASI is called an IASI-graph. An IASI $f$ is said to be a {\em weak IASI} if $|f^+(uv)|=\max(|f(u)|,|f(v)|)$ and an IASI $f$ is said to be a {\em strong IASI} if $|f^+(uv)|=|f(u)|\,|f(v)|$ for all $uv\in E(G)$. In this paper, we introduce the notion of arithmetic integer additive set-indexers of a given graph $G$ as an IASI with respect to which all elements of $G$ have arithmetic progressions as their set-labels and study the characteristics of this type of IASIs.Sudev Naduvath2018-08-102018-08-1010Remarks on Common Fixed Point Results in \(C^*\)-Algebra-Valued Metric Spaces
http://www.rgnpublications.com/journals/index.php/jims/article/view/618
<p>In this short note, we study the article of Xin et al. [J. Nonlinear Sci. Appl., (9) 2016] and unexpectedly notice that the common fixed point results of this article do not produce any new result in literature. In fact the main results of this article coincide with some consequences of previous published results.</p>Lakshmi Kanta DeyTanusri Senapati2018-08-102018-08-1010An Algorithm for Improving Algebraic Degree of S-Box Coordinate Boolean Functions Based on Affine Equivalence Transformation
http://www.rgnpublications.com/journals/index.php/jims/article/view/662
The Substitution box (\(S\)-box) plays an important role in a block cipher as it is the only nonlinear part of the cipher in most cases. \(S\)-box \(S\) can be considered as a vectorial Boolean function consisting of \(m\) individual Boolean functions \(f_1,f_2,\dots,f_m\), where \(f_i: GF (2^n)\to GF (2)\) and \( f_i(x)=y_i\) for \(i=1,2,\dots,m\). These functions are called coordinate Boolean functions of the \(S\)-box \(S\). To avoid various attacks on the ciphers and for efficient software implementation, the coordinate Boolean functions of \(S\)-boxes are required to satisfy a lot of properties, for instance being a permutation defined on the fields with even degrees, with a high nonlinearity, a low differential uniformity and a high algebraic degree, etc. However, it seems very difficult to find an \(S\)-box with the coordinate Boolean functions to satisfy all the criteria. The \(S\)-box with low algebraic degree of the coordinate Boolean functions is vulnerable to many attacks such as linear and differential cryptanalysis, for instance higher-order differential attacks, algebraic attacks or cube attacks. In this paper we propose an algorithm for improving algebraic degree of the $S$-box coordinate Boolean functions while not affecting its other important properties. The algorithm is based on affine equivalence transformation of the \(S\)-boxes.Hoang Duc ThoNguyen Truong ThangNguyen Thi Thu NgaPham Quoc Hoang2018-08-102018-08-1010Vorticity and Stress Tensor
http://www.rgnpublications.com/journals/index.php/jims/article/view/1061
The assumptions of the Navier-Stokes equations are reconsidered. Vorticity is one of the three basic isotropic motions of a fluid element about a point. Taking into consideration the isotropic and symmetric nature of the associated tensor, it was assumed that vorticity could not contribute to the viscous stresses and hence was omitted from subsequent derivations of the Navier-Stokes equations. Deviating from this classical approach, the effect of vorticity is included in the derivation of the stress tensor.The equation hence derived contains additional terms involving vortex viscosity. Analogous to Maxwell stress tensor in electromagnetic fields, another stress tensor is defined in a vorticity field. By treating vortices as physical structures, it is possible to define pressure and the shearing stress that deform the volume element.M. J. VedanSusan Mathew Panakkal2018-08-102018-08-1010Variable Viscosity of Casson Fluid Flow Over A Stretching Sheet in Porous Media with Newtonian Heating
http://www.rgnpublications.com/journals/index.php/jims/article/view/630
Casson fluid flow with variable viscosity in porous media over a heated stretching sheet is investigated. The partial differential equations representing the flow motion are first transformed to ordinary differential equations by similarity transformation before being solved numerically by the finite-difference method. The effects of the viscosity variation parameter \((\Omega)\), the permeability number \((\kappa)\), Prandtl number \((Pr)\), Biot number \((Bi)\) and non-Newtonian fluid parameter \((\beta)\) on the fluid flow and heat transfer, along with the temperature and velocity profiles, are presented graphically for some arbitrary values.Kartini AhmadSyafrina Abdul HalimZahir Hanouf2018-08-102018-08-1010Natural Convection Flow of Nanofluids in Squeeze Film with an Exponential Curvature
http://www.rgnpublications.com/journals/index.php/jims/article/view/1069
A theoretical study of the laminar squeeze flow of copper water and alumina water nanofluids between a flat circular stationary disk and a curved circular moving disk is carried out using energy integral method. The squeeze film behaviour is examined analytically and the effects of inertia and curvature on the squeeze film pressure, load carrying capacity of the fluid and temperature are analysed. Further, the problem is solved numerically for a sinusoidal motion of the upper curved disk taking an exponential form of the gap width. It is found that the copper water nanofluid is better than alumina water nanofluid for better heat transfer rates. While high inertia forces strongly influence the squeeze film behaviour, low inertia forces are favourable for temperature distribution. Further, concave nature of the upper disk gives better squeeze film characteristics than convex disk. However, convex disk is better than concave disk as far as the temperature distribution is concerned.Vimala P.Manimegalai K.2010-08-102010-08-1010