Global Journal of Pure and Applied Mathematics (GJPAM)

 

 

Volume 11  Number 1  (2015)

 

 

Contents

 

A Study on linear time-invariant Transistor Circuit using Adomian Decomposition Method
pp.1-3
S. Sekar and M. Nalini

A Study on Single Server Queue in Southern Railway using Monte Carlo Simulation
pp.4-9
S.Shanmugasundaram and P.Banumathi

Analysis of the linear time-invariant Electronic Circuit using Adomian Decomposition Method
pp.10-13
S. Sekar and A. Kavitha

CHARACTERIZATION OF FUZZY BRIDGES AND FUZZY CUTNODES
pp.14-17
A.MOHAMED UDHUMAN, S.NAGARAJAN, M.CHANDRASEKHARAN

CHARACTERIZATION OF NEARLY OPEN SETS USING FUZZY SETS
pp.18-20
R.PADMAPRIYA and P.THANGAVELU

Composition Operators
pp.21-26
G.Balaji C.V.Seshaiah B.Vennila and N. Meenambigai

Decision Tree Construction for Rule Generation Using Rough Set
pp.27-32
P.Seethalakshmi and S.Vengataasalam

Future Behavior of Toll plaza Using Monte Carlo Simulation
pp.33-38
S.Shanmugasundaram and S.Punitha

Fuzzy Row Penalty Method to solve Assignment Problems with uncertain parameters
pp.39-44
K.Rathi, S.Balamohan, P.Shanmugasundaram, and M.Revathi

MULTI-SERVER FUZZY QUEUEING MODEL USING DSW ALGORITHM
pp.45-51
S. Shanmugasundaram and B.Venkatesh

Numerical aspects of Fuzzy Differential Inclusions using Leapfrog Method
pp.52-55
S. Sekar and K. Prabhavathi

Numerical Investigation of Single-Term Haar Wavelet Series to Second Order Linear System with Singular - A
pp.56-61
G. Balaji, A. Shobana, S. Vengataasalam, S. Sekar

Numerical Strategies for the Time Varying Delay System using Haar Wavelet Method
pp.62-67
K. Prabakaran, and S . Vengataasalam

Observer design of Singular Systems (Robot Arm Model) using Leapfrog Method
pp.68-71
S. Sekar and M. Vijayarakavan

Robust reliable sampled-data control for flight control systems via mixed H1 and passivity approach
pp.72-83
K.Sundareswari

Role of cloud in integrating Knowledge management and E-learning system
pp.84-89
A. Priya Dharshini, S. Chandrakumarmangalam

TIME DEPENDENT SOLUTION OF M//1 RETRIAL QUEUE AND FEEDBACK ON NON –RETRAIL CUSTOMERS WITH CATASTROPHES
pp.90-95
S. Shanmugasundaram and S.Chitra

 

SECURED PUBLISH/SUBSCRIBER SYSTEMS VIA TWO WAY AUTHENTICATION USING IDENTITY-BASED ENCRYPTION
pp.95-100
V.Muthu and R.R.Prianka

Web Services Based on User Profile Using Ontology to Minimize Search Time
pp.101-104
J. Sowmiya and Viji Vinod

Intrusion Detection System by Combining Fuzzy Logic with Genetic Algorithm
pp.105-106
A.Angel Cerli and S.Ramamoorthy

Reduction of Dimensionality for High Dimensional Data using Correlation Measures
pp.107-111
S. Malavika and K.Selvam

Relational Parametric Search Methodology and their Performance Measures
pp.112-115
S.Geetha and K.Selvam

An Enhanced Captcha Algorithm for 3D Images
pp.116-123
N. Kamatchi and S. Rama Moorthy

CPACK—APPLYING CLUSTER APPROACH IN PREDICTION BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM
pp.124-127
S.Kokilavani and V.SaralaDevi

MINIMIZING DISTORTION IN 3D IMAGES USING GRADIENT - BASED METHOD.
pp.128-135
G.Dhanalakshmi and S. Rama Moorthy,

GRAPH COLORING ANDEDGE CONNECTIVITY INTRAFFIC SIGNAL PROBLEM
pp.136-142
R.Nagarathinam and N.Parvathi,

 

Minimum spanning tree of a Rough graph having weights as Trapezoidal Fuzzy numbers.
pp.143-147
S.Dhanalakshmi and N.Parvathi

STUDY OF ADVERSARY MODELS IN DISTRIBUTED STORAGE SYSTEMS
pp.148-155
C.K. Shyamala and R.R.Sharanya

COMPARATIVE STUDY ON BIG DATA MINING AND PLATFORM - A SURVEY
pp.156-162
B. Sabira and J. Ilamchezhian

Reinforced learning to enhance life skills in the Autistic: An Artificial Neural Network Approach
pp.163-166
Asha Kurian and Viji Vinod


 

[UP]

 

 

© All rights are reserved with Research India Publications                             Home  Journals  Contact