Kuwait-University-Journal-of-Law-header
Search
Kuwait Journal of Science

Current Issue

Volume : 41 Issue : 2 2014

Download Add to cart

Author :ISMAT BEG, M. SAHA, ANAMIKA GANGULY, DEBASHIS DEY
Discipline :Mathematics

Random fixed point of Greguš mapping and its application to nonlinear stochastic integral equations
Abstract
We obtain sufficient conditions for the existence of random fixed point of Greguš type random operators on separable Banach spaces and use it to solve a random nonlinear integral equation of the form: To further illustrate, examples of nonlinear stochastic integral equation are constructed.
Keywords
Random fixed point; Greguš mapping; nonlinear stochastic integral equation; Banach space

Download Add to cart

Author :XUELING MA, JIANMING ZHAN
Discipline :Mathematics

Fuzzy soft -hemirings
Abstract
Maji et al. (2001) introduced the concept of a fuzzy soft set, which is an extension to the concept of a soft set. The concepts of -fuzzy soft left -ideals (right -ideals, -interior-ideals) in -hemirings are introduced. Some new characterization theorems of these kinds of fuzzy soft -ideals of a -hemiring are also given. Finally, we show that -hemiregular and -semisimple -hemirings can be described by -fuzzy soft -ideals and -fuzzy soft -interior-ideals.
Keywords
: -hemirings, Fuzzy soft set; -fuzzy soft (left, right) -ideal; -fuzzy soft -interior-ideal; ( -hemiregular, -semisimple) -hemiring.

Download Add to cart

Author :R. M. EL-ASHWAH, M. K. AOUF
Discipline :Mathematics

Some applications of differential subordination on certain class of analytic functions defined by integral operator
Abstract
Two-parameters function involving the Feltt multiplier operator is introduced. Subordination properties as well as sufficient conditions for starlikeness are also obtained.
Keywords
Analytic functions; differential subordination; multiplier transformations.

Download Add to cart

Author :R. UMAGANDHI, A. V. SENTHIL KUMAR
Discipline :Computer Science

Time heuristics ranking approach for recommended queries using search engine query logs
Abstract
It is obvious that web search queries given by the user are always short and ambiguous. Mostly the shorter length queries do not satisfy the users real information need and may not produce the results properly. Query Recommendation is a technique based on the real intent of the user and to provide the alternate queries to frame the queries in the future. The proposed work recommends the queries for four types of users in three ways (1) Favourite queries of the user are identified and they are recommended. (2) Users who have similar interest are clustered; the recommendation is given from the access logs of similar users. (3) Similar queries are clustered; the favourite query of the cluster is identified and it is recommended. The proposed work also ranks the recommended queries based on the preference and access time of the query. The proposed strategies are experimentally evaluated using real time search engine query log.
Keywords
Favourite Query; preferences; t-measure; frequent query pattern; query log

Download Add to cart

Author :ELANGOVAN UMA, ARPUTHARAJ KANNAN
Discipline :Computer Science

Improved cross site scripting filter for input validation against attacks in web services
Abstract
Nowadays, everybody needs to handle sensitive data like online banking account details and other information related to financial transactions on the Internet. In this scenario, many Web attacks such as injection attacks are targeted on these sensitive data. Such attacks are carried out by running scripts on users computers that utilize vulnerably coded client/server pages. Moreover, these attacks run malicious codes to steal personal information from the server. Though this code can easily be generated by the attacker, it is very difficult to prevent it by the current cross site scripting filters due to their lack in detection accuracy. Therefore, cross site scripting attack is a challenging issue for the Internet users. Hence, it is necessary to detect and prevent the injection attacks through efficient schemes. However, most of the existing schemes lack this capability in terms of accuracy and need further improvement. In this paper, a new self-aware message analysis cum validation algorithm has been proposed for detecting and filtering various types of Web Service attacks. This proposed system receives requests and generates suitable response from the dummy server page to analyze the nature of attack. New policies are created in this work to analyze the response and forward the legitimate request to original Web Service page. The proposed injection filters have been tested with all possible attacks for verifying the robustness of filtering policies. The results obtained from this work show that the proposed filtering policy is highly robust in refining the malicious message. The implementation and accuracy of the proposed approach has been proved through extensive testing using real-world cross site scripting generation and analysis. The results obtained from the work show that the proposed filtering policy is very strong in refining the malicious message, which contains attacks such as cross site scripting, injection, message replay and semantic attacks. We demonstrated the implementation and accuracy of our approach through extended testing using real-world cross site scripting exploits.
Keywords
Cross site scripting attacks; cross site scripting filters; security; semantic attack filter; web services

Download Add to cart

Author :SUNNY CHAUHAN, SERVET KUTUKCU, NEERAJ DHIMAN, SUNEEL KUMAR
Discipline :Mathematics

Variants of R-weakly commuting mappings and common fixed point theorems in intuitionistic fuzzy metric spaces
Abstract
In this paper, we utilize the notion of common limit range property with variants of -weakly commuting mappings and obtain some common fixed point theorems in intuitionistic fuzzy metric spaces. We give some illustrative examples which support our results. Consequently a host of common fixed theorems are generalized and improved.
Keywords
Intuitionistic fuzzy metric space; variants of -weakly commuting mapping; common limit range property; property (E.A); non-compatible mappings.

Download Add to cart

Author :MAHMUT AKYIG١IT, SOLEY ERSOY, MURAT TOSUN
Discipline :Mathematics

Beltrami-Meusnier formulas of generalized semi ruled surfaces in semi Euclidean space
Abstract
In this paper, we study the sectional curvatures of the generalized semi ruled surfaces in semi Euclidean space The first fundamental form and the metric coefficients of the generalized semi ruled surfaces are calculated and in these regards, Riemannian-Christoffel curvatures are obtained by the help of Christoffel Symbols. So, the curvatures of arbitrary non-degenerate tangential sections of the generalized semi ruled surface are investigated. In addition to this, the relations between the sectional curvatures are obtained. These are called semi Euclidean Beltrami-Meusnier formulas.
Keywords
Semi Euclidean space; ruled surface; sectional curvature; Beltrami-Meusnier formula

Download Add to cart

Author :SHITIAN LIU
Discipline :Mathematics

NSE characterization of projective special linear group L3(7)
Abstract
Let be a group and be the set of element orders of . Let and be the number of elements of order in . Let nse. In Khatami et al and Liu's works, the groups , and are unique determined by nse. In this paper, we prove that if is a group such that nse=nse, then .
Keywords
Element order; projective special linear group; Thompson's problem; number of elements of the same order; simple group.

Download Add to cart

Author :FAHIMAH AL-AWADHI, EMAD-ELDIN A. A. ALY
Discipline :Statistics

Multiple change points tests against the umbrella alternative
Abstract
We consider the problem of testing the null hypothesis of no change against the alternative of multiple umbrella-type change points in a series of independent observations. We extend the tests of Mack Wolfe (1981) to the change point set-up. We consider the two cases of known and unknown umbrella peak point. We obtain the asymptotic null distributions of the proposed tests and give approximations for their limiting critical values. We also give tables for their finite sample Monte Carlo critical values. We report the results of several Monte Carlo power studies conducted to compare the proposed tests with a number of multiple change points tests. As an illustration we applied the proposed tests using a real data set.
Keywords
Brownian bridge; limit theorems; Monte Carlo simulations.

Download Add to cart

Author :S. KARMAKAR, G. SHRIVASTAVA, M. K. KOWAR
Discipline :Computer Science

Impact of learning rate and momentum factor in the performance of back-propagation neural network to identify internal dynamics of chaotic motion
Abstract
The utilization of back-propagation neural network in identification of internal dynamics of chaotic motion is found appropriate. However, during its training through Rumelhart algorithm, it is found that, a high learning rate ( ) leads to rapid learning but the weights may oscillate, while a lower value of ` ' leads to slower learning process in weight updating formula Momentum factor ( ) is to accelerate the convergence of error during the training in the equation and while transfer function sigmoid . It is the most complicated and experimental task to identify optimum value of ` ' and ` ' during the training. To identify optimum value of ` ' and ` ' , firstly the network is trained with 103 epochs under different values of ` ' in the close interval and At the convergence of initial weights and minimization of error (i.e., mean square error) process is found appropriate. Afterwards to find optimum value of , the network was trained again with = 0.3 (fixed) and with different values of in the close interval for 103 epochs. It was observed that the convergence of initial weights and minimization of error was appropriate with = 0.3 and = 0.9. On this optimum value of and the network was trained successfully from local minima of error = 1.67029292416874E-03 at 103 epochs to global minima of error = 4.99180426869658E-04 at 15 105 epochs. At the global minima, the network has exhibited excellent performance in identification of internal dynamics of chaotic motion and in prediction of future values by past recorded data series. These essentials are presented through this research paper.
Keywords
Back-propagation; learning rate; momentum factor; neural network.

Download Add to cart

Author :NARJES H. DASHTI, MAGDY S. MONTASSER, NEDAA Y. A. ALI, VINEETHA M. CHERIAN
Discipline :Biology

Influence of plant growth promoting rhizobacteria on fruit yield, pomological characteristics and chemical contents in cucumber mosaic virus-infected tomato plants
Abstract
The influence of two plant growth promoting rhizobacteria (PGPR) strains, Pseudomonas aeruginosa and Stenotrophomonas rhizophilia, on fruit yields, pomological traits and chemical contents on cucumber mosaic virus (CMV) infected-tomato (Solanum lycopersicum) fruits were studied. Two CMV strains were used to infect tomato plants. CMV-KU1 is a locally isolated CMV associated with a benign viral satellite RNA, while CMV-16 is a satellite-free virus that causes severe stunting, manifested by vegetative and fruit yield loss in tomato. The study was conducted in parallel on two different cultivar varieties of tomato, namely Supermarmande and UC82B and results obtained for each were compared. The results indicated that the presence of the PGPR almost doubled the average yield per plant, even of those plants infected by the CMV viruses, compared to the healthy control treatments. There was also a significant improvement in the pomological qualities of the PGPR-treated tomato fruits compared to the corresponding healthy and virus infected treatments, especially, in the average of weight, hight and volume of fruits. The chemical analysis of tomato fruits revealed that the presence of the PGPRs increased the total protein, lycopene, alkalinity and phenol content of the tomato fruits compared to the healthy controls. However, PGPRs had no influence on reduced sugars, total soluble solids or the titerable acid content, but reduced the amount of ascorbic acid in tomato fruits of infected plants compared to healthy controls.
Keywords
PGPR; tomato; fruit quality; CMV.

Download Add to cart

Author :MİKAİL ET, RİFAT ÇOLAK, YAVUZ ALTIN
Discipline :Mathematics

Strongly almost summable sequences of order a
Abstract
In this paper, we introduce the concept statistical convergence of order . Also some relations between -statistical convergence of order and strong -summability of order are given. Furthermore some relations between the spaces and are examined.
Keywords
Statistical convergence; almost convergence; Cesàro summability

Kuwait Journal of Science
Journal of Law

You are Visitor No.

54343

Journal of Law
Journal of Law
Tell your friendsJournal of Law
Journal of Law

Last Updated

Jun 19, 2012

Journal of Law
Journal of Law
Journal of Law

Please enter your email Here to receive our news

Journal of Law