The details of future failures of systems that are serially produced are important for the remanufacturing departments to frame an optimal strategy for the post series supply. The existing one-dimensional and two-dime...
详细信息
Throughout this paper,all groups are finite and G always denotes a finite group;σis some partition of the set of all primes P.A group G is said to beσ-primary if G is aπ-group for someπ∈σ.Aπ-semiprojector of G[...
详细信息
Throughout this paper,all groups are finite and G always denotes a finite group;σis some partition of the set of all primes P.A group G is said to beσ-primary if G is aπ-group for someπ∈σ.Aπ-semiprojector of G[29]is a subgroup H of G such that HN/N is a maximalπ-subgroup of G/N for all normal subgroups N of ***П⊆σ.Then we say thatχ={X_(1),...,X_(t)}is aП-covering subgroup system for a subgroup H in G if all members of the setχareσ-primary subgroups of G and for eachπ∈Пwithπ∩π(H)≠φthere are an index i and aπ-semiprojector U of H such that U≤X_(i).We study the embedding properties of subgroups H of G under the hypothesis that G has aП-covering subgroup systemχsuch that H permutes with X^(x)for all X∈χand x∈*** well-known results are generalized.
Remanufacturing, a popular term in the automotive industry, helps to reduce the need for raw materials, increase profitability, is an effective solution to the challenges of postal items and also benefits the environm...
详细信息
Dixon's method for computing multivariate resultants by simultaneously eliminating many variables is reviewed. The method is found to be quite restrictive because often the Dixon matrix is singular, and the Dixon ...
详细信息
ISBN:
(纸本)9780897916387
Dixon's method for computing multivariate resultants by simultaneously eliminating many variables is reviewed. The method is found to be quite restrictive because often the Dixon matrix is singular, and the Dixon resultant vanished identically yielding no information about solutions for many algebraic and geometry problems. We extend Dixon's method for the case when the Dixon matrix is singular, but satisfies a condition. An efficient algorithm is developed based on the proposed extension for extracting conditions for the existence of affine solutions of a finite set of polynomials. Using this algorithm, numerous geometric and algebraic identities are derived for examples which appear intractable with other techniques of triangulation such as the successive resultant method, the Gro¨bner basis method, Macaulay resultants and Characteristic set method. Experimental results suggest that the resultant of a set of polynomials which are symmetric in the variables is relatively easier to compute using the extended Dixon's method.
In this paper, a competition of selling two substitutable products and one complementary product has been studied in two-echelon supply chain systems in which one of these three products is produced by one manufacture...
详细信息
In this paper, a competition of selling two substitutable products and one complementary product has been studied in two-echelon supply chain systems in which one of these three products is produced by one manufacturer separately, and all produced items are sold through a common retailer in the market. The demand of each product depends linearly on prices of these three products as per their nature. In this study, four different decision scenarios are developed mathematically under the game theory framework to maximize the profit function of each participant of the supply chain, and a number of pricing strategies are subsequently worked out for manufacturers and retailer. Finally, the model under different scenarios is illustrated with numerical data to study the feasibility of the model exploring the managerial insights, as well. Different marketing policies are predicted for maximum individual and system profits.
The diagnosis of possible faults in railway signaling systems is an important issue to provide safe travel and transportation in railways. Signaling system designers have to consider the possible faults which may occu...
详细信息
The aim of this paper is to introduce and study the concept of hesitant multi-fuzzy soft topological space and some of its structural properties, such as the neighbourhood of hesitant multi-fuzzy soft sets and interio...
详细信息
The aim of this paper is to introduce and study the concept of hesitant multi-fuzzy soft topological space and some of its structural properties, such as the neighbourhood of hesitant multi-fuzzy soft sets and interior hesitant multi-fuzzy soft sets, the hesitant multi-fuzzy soft basis and hesitant multi-fuzzy soft subspace topology. Additionally, we introduce and define the hesitant multi-fuzzy soft cover, hesitant multi-fuzzy soft open cover, and hesitant multi-fuzzy soft compactness, and some important results on them are presented.
The aim of this paper is to introduce the concept of generalised multi-fuzzy soft set. We also define several generalised multi-fuzzy soft set operations and study their properties, and applications of generalised mul...
详细信息
The aim of this paper is to introduce the concept of generalised multi-fuzzy soft set. We also define several generalised multi-fuzzy soft set operations and study their properties, and applications of generalised multi-fuzzy soft sets in decision making problem were presented.
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protocol becomes a major concern in the ***,MANET’s lack of infrastructure,unpredictable topology,and restricted resources,as well as the lack of a previously permitted trust relationship among connected nodes,contribute to the attack detection burden.A novel detection approach is presented in this paper to classify passive and active black-hole *** proposed approach is based on the dipper throated optimization(DTO)algorithm,which presents a plausible path out of multiple paths for statistics transmission to boost MANETs’quality of service.A group of selected packet features will then be weighed by the DTO-based multi-layer perceptron(DTO-MLP),and these features are collected from nodes using the Low Energy Adaptive Clustering Hierarchical(LEACH)clustering *** is a powerful classifier and the DTO weight optimization method has a significant impact on improving the classification process by strengthening the weights of key features while suppressing the weights ofminor *** hybridmethod is primarily designed to combat active black-hole *** the LEACH clustering phase,however,can also detect passive black-hole *** effect of mobility variation on detection error and routing overhead is explored and evaluated using the suggested *** diverse mobility situations,the results demonstrate up to 97%detection accuracy and faster execution ***,the suggested approach uses an adjustable threshold value to make a correct conclusion regarding whether a node is malicious or benign.
The development of multi-cloud systems with an acceptable level of service delays that significantly affect the quality of the end-users experience is an open research problem, for which simulation is successfully use...
详细信息
暂无评论