Mathematical Applications of Queueing Theory in Call Centers · Blended call center - Combining...
Transcript of Mathematical Applications of Queueing Theory in Call Centers · Blended call center - Combining...
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 1
IJSER © 2012
http://www.ijser.org
Mathematical Applications of Queueing Theory in Call Centers
V.S. Selvi and M. Nishanthi
Abstract: Queueing theory has a wide range of applications to real world problems. In this paper, we present the concept and work
culture in Call centers and summarize some results. We also present the performance, characterization and properties. Finally, we
mention some applications.
Index Terms - Queues, Call Center, Poisson Process, Non-homogeneous Poisson process.
—————————— ——————————
1. INTRODUCTION
call center is a centralized office used for the
purpose of receiving and transmitting a large
volume of requests by telephone. A call center is
operated by a company to administer incoming
product support or information inquiries from
consumers. Outgoing calls for telemarketing,
clientele, product services, and debt collection are
also made. In addition to a call center, collective
handling of letters, faxes, live chat, and e-mails at
one location is known as a contact center.
A call center is often operated through an
extensive open workspace for call center agents,
with work stations that include a computer for
each agent, a telephone set/headset connected to a
telecom switch, and one or more supervisor
stations. It can be independently operated or
networked with additional centers, often linked to
a corporate computer network, including
mainframes, microcomputers and LANs.
Increasingly, the voice and data pathways into the
center are linked through a set of new
technologies called computer telephony
integration (CTI).
————————————————
V. S. Selvi is currently serving in the Department of Mathematics, Theivanai Ammal College for Women, Viluppuram,, India
M. Nishanthi is currently pursuing. Phil. degree program in Mathematics, Theivanai Ammal College for Women, Viluppuram, India
2. VARITIES
Some variations of call center models are listed below:
Contact center – Supports interaction with customers over a variety of media, including but not necessarily limited to telephony, e-mail and internet chat.
Inbound call center - Exclusively or predominantly handles inbound calls (calls initiated by the customer).
Outbound call center - One in which call
center agents make outbound calls to customers or sales leads.
Blended call center - Combining automatic call distribution for incoming calls with predictive dialling for outbound calls, it makes more efficient use of agent time as each type of agent (inbound or outbound) can handle the overflow of the other.
Telephone answering service - A more personalized version of the call center, where agents get to know more about their customers and their callers; and therefore look after calls just as if based in their customers office.
3. CRITICISM AND PERFORMANCE
Criticisms of call centers generally follow a
number of common themes, from both callers and
call center staff. From callers, common criticisms
include:
Operators working from a script
A
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 2 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
Non-expert operators (call screening)
Incompetent or untrained operators
incapable of processing customers'
requests effectively.
Obsequious behavior by operators (e.g.,
relentless use of Sir, Ma'am and I'd be
happy to assist you)
Overseas location, with language and
accent problems
Touch tone menu systems and automated
queuing systems
Excessive waiting times to be connected to
an operator
Complaints that departments of companies
do not engage in communication with one
another
Deceit over location of call center (such as
allocating overseas workers false English
names)
Requiring the caller to repeat the same
information multiple times
Common criticisms from staff include:
Close scrutiny by management (e.g.
frequent random call monitoring)
Low compensation (pay and bonuses)
Restrictive working practices (some
operators are required to follow a pre-
written script)
High stress: a common problem associated
with front-end jobs where employees deal
directly with customers
Repetitive job task
Poor working conditions (e.g. poor
facility, poor maintenance and cleaning,
cramped working conditions, management
interference, lack of privacy and noisy)
Impaired vision and hearing problems
Rude and abusive customers
4. PROISSON PROCESS
In probability theory, a Poisson process is a
stochastic process which counts the number of
events and the time that these events occur in a
given time interval. The time between each pair of
consecutive events has an exponential distribution
with parameter 𝛌 and each of these inter-arrival
times is assumed to be independent of other inter-
arrival times. The process is named after the
French mathematician Siméon-Denis Poisson and
is a good model of radioactive decay, telephone
calls and requests for a particular document on a
web server, among many other phenomena.
The Poisson process is a continuous-time process;
the sum of a Bernoulli process can be thought of
as its discrete-time counterpart. A Poisson process
is a pure-birth process, the simplest example of a
birth-death process. It is also a point process on
the real half-line.
Definition. The basic form of Poisson process,
often referred to as the Poisson process, is a
continuous-time counting process {N(t), t ≥ 0}
that possesses the following properties:
N(0) = 0
Independent increments (the numbers of
occurrences counted in disjoint intervals
are independent from each other)
Stationary increments (the probability
distribution of the number of occurrences
counted in any time interval only depends
on the length of the interval)
No counted occurrences are simultaneous.
Consequences of this definition include:
The probability distribution of N(t) is a
Poisson distribution.
The probability distribution of the waiting
time until the next occurrence is an
exponential distribution.
The occurrences are distributed uniformly
on any interval of time. (Note that N(t), the
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 3
IJSER © 2012
http://www.ijser.org
total number of occurrences, has a Poisson
distribution over (0, t ], whereas the
location of an individual occurrence on t ∈
(a, b] is uniform.)
Other types of Poisson process are described
below.
The homogeneous Poisson process is one of the
most well known Lévy processes. This process is
characterized by a rate parameter λ, also known as
intensity, such that the number of
events in time interval (t, t + τ] follows a Poisson
distribution with associated parameter λτ. This
relation is given as
P [ (N(t+τ) - N(t)) = k] = 𝑒−𝜆𝜏 (𝜆𝜏)𝑘
𝑘! k=0,1,…,
where N(t+τ) - N(t) = k is the number of events in
time interval (t, t + τ].
Just as a Poisson random variable is characterized
by its scalar parameter λ, a homogeneous Poisson
process is characterized by its rate parameter λ,
which is the expected number of events or arrivals
that occur per unit time.
N(t) is a sample homogeneous Poisson process,
not to be confused with a density or distribution
function.
In general, the rate parameter may change over
time; such a process is called a non-homogeneous
Poisson process or inhomogeneous Poisson
process. In this case, the generalized rate function
is given as λ(t). Now the expected number of
events between time a and time b is
𝜆𝑎 ,𝑏 = 𝜆(𝑡)𝑏
𝑎𝑑𝑡
Thus, the number of arrivals in the time interval
(a, b], given as N(b) − N(a), follows a Poisson
distribution with associated parameter λa,b
P [ (N(b) - N(a)) = k] = 𝑒−𝜆𝑎 ,𝑏 (𝜆𝑎 ,𝑏 )𝑘
𝑘! k=0,1,…
A homogeneous Poisson process may be viewed
as a special case when λ(t) = λ, a constant rate.
An important variation on the (notionally time-
based) Poisson process is the spatial Poisson
process. In the case of a one-dimension space (a
line) the theory differs from that of a time-based
Poisson process only in the interpretation of the
index variable. For higher dimension spaces,
where the index variable (now x) is in some vector
space V (e.g. R2 or R
3), a spatial Poisson process
can be defined by the requirement that the random
variables defined as the counts of the number of
"events" inside each of a number of non-
overlapping finite sub-regions of V should each
have a Poisson distribution and should be
independent of each other.
A further variation on the Poisson process, the
space-time Poisson process, allows for separately
distinguished space and time variables. Even
though this can theoretically be treated as a pure
spatial process by treating "time" as just another
component of a vector space, it is convenient in
most applications to treat space and time
separately, both for modeling purposes in practical
applications and because of the types of properties
of such processes that it is interesting to study.
In comparison to a time-based inhomogeneous
Poisson process, the extension to a space-time
Poisson process can introduce a spatial
dependence into the rate function, such that it is
defined as 𝛌(x,t), where x ∈ 𝑉for some vector
space V (e.g. R2 or R
3). However, a space-time
Poisson process may have a rate function which is
constant with respect to either x or t or both. For
any set S ⊂ 𝑉 (e.g. a spatial region) with finite
measure µ(S) , the number of events occurring
inside this region can be modeled as a Poisson
process with associated rate function λS(t) such
that
𝜆 𝑆(𝑡) = 𝜆(𝑥, 𝑡)
𝑆𝑑µ(𝑥)
5. SEPARABLE SPACE-TIME
PROCESSES
In the special case that this generalized rate
function is a separable function of time and space,
we have:
𝛌(x,t) = f(x) 𝛌(t)
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 4 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
for some function f(x) . Without loss of generality,
let
𝑓 𝑥 𝑑𝜇(𝑥)
𝑉
= 1
(If this is not the case, λ(t) can be scaled
appropriately.) Now, f(x) represents the spatial
probability density function of these random
events in the following sense. The act of sampling
this spatial Poisson process is equivalent to
sampling a Poisson process with rate function λ(t),
and associating with each event a random vector
X sampled from the probability density function
f(x) . A similar result can be shown for the
general (non-separable) case.
6. CHARACTERIZATION
In its most general form, the only two conditions
for a counting process to be a Poisson process are
Orderliness: which roughly means lim∆𝑡→0
𝑃 𝑁 𝑡 + ∆𝑡 − 𝑁 𝑡 > 1 𝑁 𝑡 + ∆𝑡
− 𝑁 𝑡 ≥ 1) = 0
which implies that arrivals don't occur
simultaneously (but this is actually a
mathematically stronger statement).
Memorylessness (also called evolution
without after-effects): the number of
arrivals occurring in any bounded interval
of time after time t is independent of the
number of arrivals occurring before time t.
These seemingly unrestrictive conditions actually
impose a great deal of structure in the Poisson
process. In particular, they imply that the time
between consecutive events (called
inter-arrival times) are independent random
variables. For the homogeneous Poisson process,
these inter-arrival times are exponentially
distributed with parameter λ (mean 1/λ).
Proof : Let 𝜏1be the first arrival time of the
Poisson process. Its distribution satisfies
Pr[𝜏1 = 𝑥]
= lim𝑑𝑡→0Pr[𝑁𝑥+𝑑𝑡 >0,𝑁𝑥 =0]
𝑑𝑡
= lim𝑑𝑡→01−Pr[𝑁𝑑𝑡 =0]
𝑑𝑡Pr[𝑁𝑥 = 0]
= lim𝑑𝑡→0
1 − (1 − 𝜆𝑑𝑡 + 𝑂(𝑑𝑡2))
𝑑𝑡exp(−𝜆𝑥)
= 𝛌 exp(-𝛌x)
Also, the memorylessness property entails that the
number of events in any time interval is
independent of the number of events in any other
interval that is disjoint from it. This latter property
is known as the independent increments property
of the Poisson process.
7. PROPERTIES
As defined above, the stochastic process {N(t)} is
a Markov process, or more specifically, a
continuous-time Markov process.
To illustrate the exponentially distributed inter-
arrival times property, consider a homogeneous
Poisson process N(t) with rate parameter λ, and let
Tk be the time of the kth arrival, for k = 1, 2, 3, ... .
Clearly the number of arrivals before some fixed
time t is less than k if and only if the waiting time
until the kth arrival is more than t. In symbols, the
event [N(t) < k] occurs if and only if the event
[Tk > t] occurs. Consequently the probabilities of
these events are the same:
P (𝑇𝑘 > 𝑡) = P (N(t) < 𝑘).
In particular, consider the waiting time until the
first arrival. Clearly that time is more than tif and
only if the number of arrivals before time t is 0.
Combining this latter property with the above
probability distribution for the number of
homogeneous Poisson process events in a fixed
interval gives
P (𝑇1 > 𝑡) = P(N(t) =0) = P[(N(t) – N(0)) = 0]
= 𝑒−𝜆𝑡 (𝜆𝑡 )0
0!= 𝑒−𝜆𝑡 .
Consequently, the waiting time until the first
arrival T1 has an exponential distribution, and is
thus memoryless. One can similarly show that the
other inter-arrival times Tk − Tk−1 share the same
distribution. Hence, they are independent,
identically distributed (i.i.d.) random variables
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 5
IJSER © 2012
http://www.ijser.org
with parameter λ > 0; and expected value 1/λ. For
example, if the average rate of arrivals is 5 per
minute, then the average waiting time between
arrivals is 1 in 5 minutes.
8. APPLICATIONS
The classic example of phenomena well modeled
by a Poisson process is deaths due to horse kick in
the Prussian army, as shown by Ladislaus-
Bortkiewicz in 1898. The following examples are
also well-modeled by the Poisson process:
Requests for telephone calls at a
switchboard.
Goals scored in a soccer match.
Requests for individual documents on a
web server.
Particle emissions due to radioactive decay
by an unstable substance. In this case the
Poisson process is non-homogeneous in a
predictable manner - the emission rate
declines as particles are emitted.
In queueing theory, the times of customer/job
arrivals at queues are often assumed to be a
Poisson process.
Sample Path of a Poisson process N(t)
REFERENCES
[1] A. Panico, Queueing Theory, Prentice-
Hall, Inc., Englewood cliffs, N.J.
[2] Churchman, C.West,Russel L.Ackott,
E.Leonard Arnoff, Introduction to
Operation Reseach, .New York; John Wiley
and sons,Inc,1963.
[3] Donald Gross Carl M.Harris, Fundamentals
of Queueing Theory, Third Edition, Wiley
India, 1998.
[4] G.Srinivasan, Operations Research
Principles and Applications, PHI Learning
Private Limited. New Delhi, 2007.
[5] E. Page, Introduction of Queuing Theory in
operation Research, 1972.
[6] B. Cooper, Introduction to Queuing Theory,
1972.
[7] Jean Walrand, An Introduction to Queuing
Networks, 1988.
[8] H.M. Wagner, Principles of Operation
Research, 1972.
[9] G. F. Newell, Applications of Queuing
Theory, Second Edition, 1982.
[10] L. Venkata Subramaniam, Call Centers of
the Future, 2008 .
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 6 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
On Generalized Preregular Closed Sets In Supra Topological Spaces
Vidhya Menon
Abstract - In this paper, a new class of sets called supra generalized preregular closed sets in supra topological spaces is
introduced and its properties are studied. Further the notion of supra preregular T1/2 space and supra generalized preregular
continuity are introduced.
Index Terms - Supra preclosed set, Supra generalized preclosed set, Supra generalized preregular closed set, Supra
generalized preregular open set, supra generalized preregular continuous function.
—————————— ——————————
1. INTRODUCTION
N 1983, Mashhour et al [6] introduced the
concept of supra topological space and studied S
– continuous maps and S*- continuous maps. The
study on supra topological space was further
extended and in 2008, Devi et al [3] introduced
and studied a class of sets called supra α – open
sets and a class of maps called Sα – continuous
maps between topological spaces. In 2010, Sayed
and Noiri [9] introduced supra b – open sets and
supra b - continuity on topological spaces. In
2011, Ravi et al [8] introduced supra sg - closed
sets and supra gs - closed sets. Arockiarani and
M.Trinita Pricilla [1] introduced supra generalized
b-regular closed sets in 2012. In 1997, Gnanambal
[4] introduced generalized preregular closed sets
in general topological spaces. In this paper we
define and study the properties of supra
generalized preregular closed sets (briefly gprµ -
closed) and their relationship with other classes
of sets in supra topological spaces.
2. PRELIMINARIES
Definition 2.1 [6] A subcollection µ ⊂ P(X) is
called a supra topology on X if X ϵ µ and µ is
closed under arbitrary union. (X,µ) is called a
supra topological space.
———————————
Vidhya Menon is working in the Department of Mathematics, CMS
College of Science and Commerce, Coimbatore, India. E-mail:
The elements of µ are said to be supra open in (X,
µ) and the complement of a supra open set is
called supra closed set. The supra closure of a set
A, denoted by clµ(A), is the intersection of supra
closed sets including A . The supra interior of a
set A, denoted by intµ(A), is the union of supra
open sets included in A. The supra topology µ on
X is associated with the topology τ if τ ⊂ µ.
Throughout this paper (X, µ ), (Y, σ) and (Z, η)
(or simply X, Y and Z) denote supra topological
spaces on which no separation axioms are
assumed unless explicitly stated. (X, µ ) will be
replaced by X if there is no chance of confusion.
Definition 2.2 A subset A of a space ( X, µ ) is
called
i) supra preclosed [8] if clµ(int
µ(A)) ⊆ A .
ii) supra α- closed [8] if clµ(int
µ(cl
µ(A))) ⊆ A.
iii) supra semi – preclosed [8] if
intµ(cl
µ(int
µ(A))) ⊆ A.
iv) supra regular closed [1] if A = clµ(int
µ(A))
The complements of the above mentioned closed
sets are called their respective open sets.
Definition 2.3 Let A be a subset of X.
i) The supra pre-closure of a set A is defined as
pclµ(A) = ∩ (B : B is a supra preclosed
set and A ⊆ B)
ii) The supra pre-interior of a set A is defined as
pintµ (A) = ∪ (B : B is a supra preopen
set and B ⊆ A)
I
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 7
IJSER © 2012
http://www.ijser.org
Definition 2.4 A subset A of a space (X,µ) is
called
i) supra generalized closed (briefly gµ - closed)
[1] if clµ(A) ⊆ U whenever A ⊆ U and U is
supra open in X .
ii) supra generalized α-closed (briefly gαµ -
closed) [1] if αclµ(A) ⊆ U whenever A ⊆ U
and U is supra α –open in X.
iii) supra α- generalized closed (briefly αgµ -
closed) [1] if αclµ(A) ⊆ U whenever A ⊆ U
and U is supra open in X.
iv) supra regular generalized closed (briefly rgµ -
closed) [7] if clµ(A) ⊆ U whenever A ⊆ U
and U is supra regular-open.
v) supra generalized preclosed (briefly gpµ -
closed) if pclµ(A) ⊆ U whenever A ⊆ U and
U is supra open in X.
vi) supra generalized semi - preclosed (briefly
gspµ - closed) if spcl
µ(A) ⊆ U whenever A
⊆ U and U is supra open in X.
3. SUPRA GENERALIZED PREREGULAR
CLOSED SETS Definition 3.1 A subset A of (X,µ) is called supra
generalized preregular closed (briefly gprµ -
closed) if pclµ(A) ⊆ U whenever A ⊆ U and U
is supra regular open in (X,µ).
Theorem 3.2
i) Every rgµ - closed set is gpr
µ - closed .
ii) Every gµ - closed set is gpr
µ - closed .
iii) Every gpµ - closed set is gpr
µ – closed.
iv) Every αgµ - closed set is gpr
µ – closed.
Proof . Obvious.
However the converse of the above said theorems
are not true.
Example 3.3 Let X = {a, b, c, d} and
µ = { ɸ, X, {a},{a , c},{b , c},{a, b, c}}.
A = {b} is gprµ - closed but not rg
µ - closed.
Example 3.4
Let X = {a, b, c}.
i) If µ = { ɸ, X, {b , c}}, A = {b , c} is gprµ -
closed but not gµ - closed.
ii) If µ = { ɸ, X, {a},{a , b},{a , c}}, A = {a} is
gprµ - closed but not gp
µ - closed.
iii) If µ = { ɸ, X, {c},{a , c}} , A = {c} is gprµ -
closed but not αgµ - closed.
Remark 3.5 gprµ - closed sets and gsp
µ – closed
sets are independent of each other.
Example 3.6 Let X = {a, b, c} and
µ ={ ɸ, X, {a},{a , b},{a , c}}.
Let A = {a}. A is gprµ - closed but not gsp
µ –
closed.
Example 3.7
Let X = {a, b, c, d, e} and
µ = { ɸ, X, {a , b},{c , d},{a, b, c, d}}.
Let A = {a , b}. A is gspµ – closed but not gpr
µ –
closed.
Theorem 3.8 If A is supra regular open and gprµ
- closed, then A is supra preclosed.
Proof. If A is supra regular open and gprµ - closed
then pclµ
(A) ⊂ A. Also A ⊂ pclµ
(A) for any set
A .Thus A is supra preclosed.
Remark 3.9 Union of two gprµ - closed sets need
not be gprµ - closed.
Example 3.10 Let X = {a, b, c, d} and
µ = { ɸ, X, {a},{a , c},{b, c},{a, b, c}}.
Let A = {b} and B = {c}. A and B are gprµ -
closed sets but A ∪ B is not gprµ - closed.
Remark 3.11 Intersection of two gprµ - closed
sets need not be gprµ - closed.
Example 3.12
Let X = {a, b, c} and
µ = { ɸ, X, {a}, {b},{a , b}}.
Let A = {a , b} and B = {a , c}. A and B are gprµ
- closed in (X, µ ). But A ∩ B is not gprµ - closed
in (X, µ).
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 8 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
Theorem 3.13 Let A be gprµ - closed in (X, µ).
Then pclµ
(A) – A does not contain any non empty
supra regular closed set.
Proof. Let B be a supra regular closed set such
that B ⊆ pclµ
(A) – A. Thus B ⊆ pclµ(A) and
B⊆Ac. Then B ⊆ X– A implies A ⊆ X – B.
Since A is gprµ - closed and X – B is supra regular
open , pclµ
(A) ⊆ X – B. That is B ⊆ X - pclµ
(A).
Hence B ⊆ pclµ
(A) ∩ (X - pclµ
(A)) = ɸ. This
shows B = ɸ.
The converse of the above theorem is not true .
Example 3.14
Let X = {a, b, c ,d,} and
µ = { ɸ, X, {a},{a, c},{b, c},{a, b, c}}. Let A
= {b, c}, then pclµ
(A) – A = {d}, does not
contain any non empty supra regular closed set
but A is not gprµ - closed. .
Corollary 3.15 Let A be gprµ - closed in (X, µ).
Then A is supra preclosed iff pclµ
(A) – A is
supra regular closed.
Proof. Let A be supra preclosed. Then pclµ
(A) =
A implies pclµ
(A) – A = ɸ which is supra regular
closed.
Conversely suppose pclµ
(A) – A is supra regular
closed. Then pclµ
(A) – A = ɸ and A is gprµ -
closed . This shows pclµ
(A) = A or A is supra
preclosed.
Definition 3.16 Let (X, µ) be a supra topological
space, A ⊂ X and x ϵ X . x is said to be a supra
limit point of A iff every
supra open set containing x contains a point of A
different from x. The supra derived set of A
denoted by 𝐷µ [A] is the set of all supra limit
points of A.
Definition 3.17 Let (X, µ) be a supra topological
space, A ⊂ X and x ϵ X. x is said to be a supra
pre-limit point of A iff every supra preopen set
containing x contains a point of A different from
x. The set of all supra pre- limit points of A is said
to be the supra pre-derived set of A denoted by
𝐷𝑃 µ
[A] .
Theorem 3.18 Let A and B be gprµ - closed
sets in (X, µ ) such that 𝐷µ [A] ⊆ 𝐷𝑃
µ [A] and
𝐷µ [B] ⊆ 𝐷𝑃
µ [B]. Then A ∪ B is gpr
µ - closed
set.
Proof. Let U be supra regular open set such that
(A ∪ B) ⊆ U. Then A ⊆ U and B ⊆ U. Since A
and B are gprµ - closed sets pcl
µ (A) ⊆ U and pcl
µ
(B) ⊆ U. For any set E ⊂ (X, µ ), 𝐷𝑃µ
[E] ⊂
𝐷µ [E]. Hence 𝐷𝑃 µ
[A] = 𝐷µ [A] and 𝐷𝑃
µ [B] =
𝐷µ [B]. That is
clµ
(A) = pclµ
(A) and clµ
(B) = pclµ
(B).
clµ
(A∪ B) = clµ
(A) ∪ clµ
(B) = pclµ
(A) ∪ pclµ
(B) ⊆ U .
But pclµ
(A∪B) ⊆ clµ
(A∪ B). Therefore pclµ
(A∪B) ⊆ U. Thus A∪B is gprµ - closed.
Theorem 3.19 If A is gprµ - closed and A ⊆ B
⊆ pclµ
(A), then B is gprµ
- closed.
Proof. Let B ⊆ U where U is a supra regular open
set. Now A ⊆ B implies A ⊆ U . Since A is
gprµ - closed, pcl
µ(A) ⊆ U. Given B ⊆ pcl
µ(A)
implies pclµ(B) ⊆ pcl
µ(A).Thus pcl
µ(B) ⊆ U.
Therefore B is gprµ - closed.
Definition 3.20 A set A ⊂ X is called gµpr - open
set if and only if its complement is gprµ - closed.
Remark 3.21 pclµ(X – A) = X – pint
µ( A ).
Theorem 3.22 A ⊂ X is gprµ - open set if and
only if F ⊂ pintµ(A) whenever F is supra
regular closed and F ⊂A.
Proof. Let A be gprµ - open. Let F be supra
regular closed and F ⊂ A. This implies X – A ⊂
X – F . So X – F is is supra regular open. Since A
is gprµ - open, X – A is gpr
µ - closed. This
implies pclµ
(X – A) ⊂ X – F . Thus X –
pintµ(A) ⊂ X – F by Remark 3.21.Therefore F
⊂ pintµ(A).
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 9
IJSER © 2012
http://www.ijser.org
Conversely suppose F is supra regular closed and
F ⊂ A. This implies F ⊂ pintµ(A). Let X – A ⊂
U where U is supra regular open. Then X – U ⊂ A
where X – U is supra regular closed. By
hypothesis X– U ⊂ pintµ(A). This implies X –
pintµ(A ) ⊂ U. Thus pcl
µ(X – A) ⊂ U by remark
3.21. Therefore X – A is gprµ - closed. Hence A is
gprµ - open.
Theorem 3.23 If pintµ(A) ⊂ B ⊂ A and A is gpr
µ-
open then B is gprµ - open.
Proof. Given pintµ(A) ⊂ B ⊂ A, implies X – A
⊂ X – B ⊂ X – pintµ(A). That is X – A ⊂ X – B
⊂ pclµ(X - A). Since A is gpr
µ - open, X - A is
gprµ - closed. Then by theorem 3.19 X – B is
gprµ - closed. Thus B is gpr
µ - open.
4. gprµ -CONTINUOUS AND
gprµ – IRRESOLUTE FUNCTIONS
Definition 4.1 A function 𝑓 : (X, µ) → (Y,σ) is
called a gprµ - continuous if 𝑓−1(V) is gpr
µ -
closed in (X, µ) for every supra closed set V of
(Y, σ).
Definition 4.2 A function 𝑓: (X, µ) → (Y,σ) is
called a gprµ - irresolute if 𝑓−1(V) is gpr
µ -closed
in (X, µ) for every gprµ - closed set V in (Y, σ).
Example 4.3
Let X = {a, b, c, d, e} and µ = { ɸ, X,{a, b, c}}
and σ = { ɸ, X, {a, b, c, d}}. Define a function
𝑓 : (X, µ) → (X, σ) by 𝑓(a) = e, 𝑓(b) = d, 𝑓(c) =
c, 𝑓(d) = a, 𝑓(e) = b. Since for every supra closed
set V of (X, σ) , 𝑓−1(V) is gprµ - closed in (X,
µ). Therefore 𝑓 is gprµ - continuous. Also the
inverse image of every gprµ- closed set is gpr
µ -
closed under 𝑓. Hence 𝑓 is gprµ - irresolute.
Theorem 4.4 Every gprµ - irresolute function is
gprµ - continuous.
Proof. It is obvious.
Converse is not true.
Example 4.5 Consider X = {a, b, c}, µ = { ɸ, X, {a}, {c},{a ,
c}} and σ = { ɸ, X, {a}}. Define a function 𝑓 :
(X, µ) → (X, σ) by 𝑓(a) = b, 𝑓(b) = c, 𝑓(c) =
a. Then 𝑓 is gprµ - continuous but not gpr
µ -
irresolute.
Theorem 4.6
i) Let 𝑓 : (X, µ) → (Y, σ) be rgµ- continuous.
Then 𝑓 is gprµ - continuous.
ii) Let 𝑓 : (X, µ) → (Y, σ) be αgµ- continuous.
Then 𝑓 is gprµ - continuous
Proof.
i) Let V be supra closed in (Y, σ).Then 𝑓−1(V)
is rgµ - closed in (X, µ) as 𝑓 is rg
µ- continuous.
By theorem 3.2( i) 𝑓−1(V) is gprµ - closed.
Hence 𝑓 is gprµ - continuous.
ii) Let U be supra closed in (Y, σ) .Then 𝑓−1(U)
is αgµ
- closed in (X, µ) as 𝑓 is αgµ -
continuous. Since every αgµ
- closed set is
gprµ – closed, we have 𝑓−1(U) is gpr
µ -
closed. Hence 𝑓 is gprµ -continuous.
Converse of the above theorem does not hold.
Example 4.7
Let X = {a, b, c, d};
µ = { ɸ, X, {a},{a , c},{b , c},{a, b, c}} and
σ = { ɸ, X, {a, b, d}}.
Define a function 𝑓 : (X, µ) → (X, σ) by 𝑓(a) =
a, 𝑓(b) = b, 𝑓(c) = c, 𝑓(d) = d. Here 𝑓 is gprµ -
continuous but is not rgµ-continuous .
Example 4.8 Let X = {a, b, c } ,
µ = { ɸ, X, {a , c}, {b , c}} and
σ = { ɸ, X, {a}}.
Let g : (X, µ) → (X, σ ) be defined by g(a) = a,
g(b) = b, g(c) = c. Then g is gprµ - continuous in
(X, µ). But it is not αgµ - continuous .
Theorem 4.9 Let 𝑓 : (X, µ) → (Y, σ) be supra
regular irresolute and supra preclosed. Then
for every gprµ - closed set A of (X , µ) , 𝑓(A) is
gprµ - closed in (Y, σ).
Proof. Let A be a gprµ - closed set of (X,
µ). Let 𝑓(A) ⊂ U where U is supra regular open
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 10 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
in Y. Then A ⊂ 𝑓−1(U). Since f is supra regular
irresolute and A is gprµ - closed, pcl
µ (A) ⊂
𝑓−1(U). This implies 𝑓(pclµ
(A)) ⊂ U. Thus pclµ
(𝑓(A)) ⊂ pclµ
(𝑓(pclµ (A))) = 𝑓(pcl
µ (A)) ⊂ U.
Hence 𝑓(A) is gprµ-closed in (Y, σ).
Remark 4.10 The composition of two gprµ -
continuous functions need not be gprµ –
continuous.
Example 4.11 Let X = {a, b, c, d},
µ = { ɸ, X,{a},{a, b},{a, b, d},{b, d}},
σ = { ɸ, X ,{b},{b ,c , d}} and
η = { ɸ, X ,{a, b, c}}.
Define a function
𝑓 : (X, µ) → (X, σ)
by 𝑓(a) = b, 𝑓(b) = c, 𝑓(c) = d, 𝑓(d) = a
Define a function
𝑔 : (X, σ) → (X, η )
by 𝑔(a) = a, 𝑔(b) = d, 𝑔(c) = c, 𝑔(d) = b.
Then 𝑓 and 𝑔 are gprµ - continuous. {d} is supra
closed in (X, η ). (𝑔𝑜𝑓)−1{d} = {a} is not gprµ -
closed in (X, µ). Hence 𝑔o𝑓 is not gprµ -
continuous.
Theorem 4.12 Let 𝑓 : (X, µ) → (Y,σ) and
𝑔 : (Y, σ) → (Z, η )
be any two functions. Then
i) 𝑔𝑜𝑓 is gprµ - continuous , if 𝑔 is supra
continuous and 𝑓 is gprµ - continuous.
ii) 𝑔𝑜𝑓 is gprµ - irresolute , if 𝑔 is gpr
µ -
irresolute and 𝑓 is gprµ - irresolute.
iii) 𝑔𝑜𝑓 is gprµ - continuous , if 𝑔 is gpr
µ -
continuous and 𝑓 is gprµ - irresolute.
Proof.
i) Let V be supra closed in (Z, η ). Then
𝑔−1(V) is supra closed in (Y, σ). Since 𝑔 is
supra continuous , gprµ - continuity of 𝑓
implies 𝑓−1(𝑔−1(V)) is gprµ - closed in (X,
µ) .That is (𝑔𝑜𝑓)−1(V) is gprµ - closed in
(X, µ) . Hence 𝑔𝑜𝑓 is gprµ - continuous.
ii) Let V be gprµ - closed in (Z, η ). Since 𝑔 is
gprµ - irresolute, 𝑔−1(V) is gpr
µ - closed in
(Y, σ). As 𝑓 is gprµ - irresolute 𝑓−1(𝑔−1 (V))
= (𝑔𝑜𝑓)−1(V) is gprµ
- closed in (X, µ ).
Hence 𝑔𝑜𝑓 is gprµ
- irresolute.
iii) Let V be closed in (Z, η ). Since 𝑔 is gprµ -
continuous, 𝑔−1(V) is gprµ - closed in (Y, σ).
As 𝑓 is gprµ - irresolute 𝑓−1(𝑔−1 (V)) =
(𝑔𝑜𝑓)−1 (V) is gprµ - closed in (X, µ). Hence
𝑔𝑜𝑓 is gprµ - continuous.
5. SUPRA PREREGULAR T1/2 SPACES Definition 5.1 A space (X,µ) is called supra
preregular T1/2 space if every gprµ - closed set is
supra preclosed.
Remark 5.2 The notions supra preregular T1/2
and supra T1/2 are independent of each other.
Example 5.3 Let X = {a, b, c, d},
µ = { ɸ, X ,{a,},{b},{c},{a , b},{b , c},{a
, c},{a, b, c}} and σ = { ɸ, X, {a , b}, {c , d}}.
(X, µ) is supra T1/2 but not supra preregular T1/2
whereas (X, σ) is supra preregular T1/2 but not
supra T1/2.
Theorem 5.4 For a supra topological space
(X,µ) the following conditions are equivalent
i) X is a supra preregular T1/2
ii) Every singleton of X is either supra regular
closed or supra preopen.
Proof.
(i) →(ii)
Let x ϵ X and assume that {x} is not supra regular
closed. Then X – {x} is not supra regular open
and X – {x} is trivially gprµ - closed . By (i) it is
supra preclosed and thus {x} is supra preopen.
(ii) → (i)
Let A ⊂ X be gprµ - closed and let x ϵ pcl
µ (A).
We will show that x ϵ A . Consider the following
two cases :
Case 1) The set {x} is supra regular closed. Then,
if x does not belongs to A, there exist a supra
regular closed set in pclµ (A) – A. By theorem
3.13, x ϵ A
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 11
IJSER © 2012
http://www.ijser.org
Case 2) The set {x} is supra preopen. Since x ϵ
pclµ (A), then {x} ∩ pcl
µ (A) ≠ ɸ. Thus x ϵ A.
So, in both cases x ϵ A. Thus pclµ (A) ⊂ A or
equivalently A is supra preclosed.
The collection of all supra preopen and supra
generalized preregular open subsets of X is
denoted by POµ(X)
and GPRO
µ (X) .
Theorem 5.5 Let (X,µ) be a supra topological
space. Then
(i) POµ(X)
⊂ GPROµ (X).
(ii) A space (X, µ) is supra preregular T1/2 iff
POµ(X ) = GPRO
µ (X) .
Proof. i) Let A be supra preopen. Then X - A is supra
preclosed and so gprµ - closed. This implies A
is gprµ - open. Hence PO
µ(X) ⊂ GPRO
µ (X).
ii) Necessity
Let (X, µ) be supra preregular T1/2. Let A ϵ
GPROµ (X). Then X- A is gpr
µ -closed. By
hypothesis X – A is supra preclosed and thus
A ϵ POµ(X). Hence GPRO
µ(X) = PO
µ(X).
Sufficiency
Let POµ(X) = GPRO
µ (X). Let A be gpr
µ -
closed. Then X- A is gprµ - open. Hence X
– A ϵ POµ(X). Thus A is supra preclosed
thereby implying (X, µ) is supra preregular
T1/2.
ACKNOWLEDGEMENT
The author is thankful to Dr. Gnanambal Ilango,
Department of Post Graduate and Research
Studies in Mathematics, Govt. Arts College,
Coimbatore, for her kind help in preparing this
paper.
REFERENCES
[1] I. Arockiarani and M. Trinita Pricilla, On
generalized b - regular closed sets in supra
topological spaces, Asian Journal of Current
Engineering and Maths 1, 1(2012) 1- 4.
[2] P.Bhattacharrya and B.K. Lahari, Semi –
generalized closed sets in topology, Indian J.
Math, 29(3)(1987), 357-382.
[3] R.Devi, S.Sampathkumar and M.Caldas, On
supra α - open sets and Sα –continuous
functions, General Mathematics, Vol 16, Nr.
2(2008), 77-84.
[4] Y.Gnanambal, On generalized preregular
closed sets in topological spaces, Indian J.
pure appl.Math . 28(3), (1997), 351 – 360.
[5] N. Levine, Generalized closed sets in
topology, Rend.Circ.Mat.Palermo, (2)
19(1970), 89 – 96.
[6] A.S.Mashhour, A.A.Allam , F.S.Mahamoud
and F.H.Khedr , On supra topological spaces,
Indian J. Pure and Appl.Math . No.4,
14(1983), 502-510.
[7] O.Ravi, G.Ramkumar and M.Kamarajand
M.L Thivagar , Mildly supra normal spaces
and some maps, International Journal of
Advances in Pure and Applied Mathematics,
1(4)(2011).
[8] O.Ravi, G.Ramkumar and M.Kamaraj, On
supra sg – closed sets and supra gs – closed
sets,International Journal of Mathematical
Archive – 2(11), (2011), 2413 – 2419.
[9] O.R . Sayed and Takashi Noiri, On supra b –
open sets and supra b – continuity on
topological spaces, European Journal of Pure
and Applied Mathematics, Vol 3, No.2,
(2010), 295 – 302.
[10] O.R Sayed , Supra pre – open sets and supra
pre – continuity on topological spaces,
Scientific Studies and Research Series
Mathematics and Informatics, 20(2)(2010),
79 – 88.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 12 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
Mathematical Applications of Queueing Theory in Traffic Congestion
V. S. Selvi and P. Sathya
Abstract - Queueing theory has a wide range of applications. In this paper, we discuss various problems faced because of traffic. We
also summarize the different procedures to measure traffic in different systems.
Index Terms - Queues, Traffic, Erlang distribution.
—————————— ——————————
1. INTRODUCTION
RAFFIC congestion is a condition on road networks that occurs as use increases, and is characterized by slower speeds, longer trip
times, and increased vehicular queueing. The most common example is the physical use of roads by vehicles. When traffic demand is great, then the interaction between vehicles slows the speed of the traffic stream. This results in some congestion. As demand approaches the capacity of a road (or of the intersections along the road), extreme traffic congestion sets in. When vehicles are fully stopped for periods of time, this is colloquially known as a traffic jam or traffic snarl-up.
Traffic congestion occurs when a volume of traffic or modal split generates demand for space greater than the available road capacity; this point is commonly termed saturation. There are a number of specific circumstances which cause or aggravate congestion; most of them reduce the capacity of a road at a given point or over a certain length, or increase the number of vehicles required for a given volume of people or goods. About half of U.S. traffic congestion is recurring, and is attributed to sheer weight of traffic; most of
————————————————
V. S. Selvi is currently serving in the Department of
Mathematics, Theivanai Ammal College for Women,
Viluppuram,, India
P.Sathya is currently pursuing. Phil. degree program
in Mathematics, Theivanai Ammal College for Women,
Viluppuram, India
the rest is attributed to traffic incidents, road work and weather events.
Traffic research still cannot fully predict under which conditions a "traffic jam" (as opposed to heavy, but smoothly flowing traffic) may suddenly occur. It has been found that individual incidents (such as accidents or even a single car braking heavily in a previously smooth flow) may cause ripple effects (a cascading failure) which then spread out and create a sustained traffic jam when, otherwise, normal flow might have continued for some time longer.
The erlang is a dimensionless unit that is used in telephony as a statistical measure of offered load or carried load on service-providing elements such as telephone circuits or telephone switching equipment. It is named after the Danish telephone engineer A. K. Erlang, the originator of traffic engineering and queueing theory.
2. TRAFFIC MEASUREMENTS IN A
TELEPHONE CIRCUIT
When used to represent carried traffic, a value (which can be a non-integer such as 43.5) followed by ―erlangs‖ represents the average number of concurrent calls carried by the circuits (or other service-providing elements), where that average is calculated over some reasonable period of time. The period over which the average is calculated is often one hour, but shorter periods (e.g., 15 minutes) may be used where it is known that there are short spurts of demand and a traffic measurement is desired that does not mask these spurts. One erlang of carried traffic refers to a single resource being in continuous use, or two channels being in use fifty percent of the time, and so on. For example, if an office has two telephone
T
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 13
IJSER © 2012
http://www.ijser.org
operators who are both busy all the time, that would represent two erlangs (2 E) of traffic; or a radio channel that is occupied for one hour continuously is said to have a load of 1 Erlang.
When used to describe offered traffic, a value followed by erlangs represents the average number of concurrent calls that would have been carried if there were an unlimited number of circuits (that is, if the call-attempts that were made when all circuits were in use had not been rejected). The relationship between offered traffic and carried traffic depends on the design of the system and user behavior. Three common models are
a) callers whose call-attempts are rejected go away and never come back,
b) callers whose call-attempts are rejected try again within a fairly short space of time, and
c) the system allows users to wait in queue until a circuit becomes available.
A third measurement of traffic is instantaneous traffic, expressed as a certain number of erlangs, meaning the exact number of calls taking place at a point in time. In this case the number is an integer. Traffic-level-recording devices, such as moving-pen recorders, plot instantaneous traffic.
The concepts and mathematics introduced by Agner Krarup Erlang have broad applicability beyond telephony. They apply wherever users arrive more or less at random to receive exclusive service from any one of a group of service-providing elements without prior reservation, for example, where the service-providing elements are ticket-sales windows, toilets on an airplane, or motel rooms. (Erlang‘s models do not apply where the server-providing elements are shared between several concurrent users or different amounts of service are consumed by different users, for instance, on circuits carrying data traffic.)
Offered traffic (in erlangs) is related to the call arrival rate, λ, and the average call-holding time, h, by
,
provided that h and λ are expressed using the same units of time (seconds and calls per second, or minutes and calls per minute).
The practical measurement of traffic is typically based on continuous observations over several days or weeks, during which the instantaneous traffic is recorded at regular, short intervals (such
as every few seconds). These measurements are then used to calculate a single result, most commonly the busy hour traffic (in erlangs). This is the average number of concurrent calls during a given one-hour period of the day, where that period is selected to give the highest result. (This result is called the time-consistent busy hour traffic). An alternative is to calculate a busy hour traffic value separately for each day (which may correspond to slightly different times each day) and take the average of these values. This generally gives a slightly higher value than the time-consistent busy hour value.
The goal of Erlang‘s traffic theory is to determine exactly how many service-providing elements should be provided in order to satisfy users, without wasteful over-provisioning. To do this, a target is set for the grade of service (GoS) or quality of service (QoS). For example, in a system where there is no queuing, the GoS may be that no more than 1 call in 100 is blocked (i.e., rejected) due to all circuits being in use (a GoS of 0.01), which becomes the target probability of call blocking, Pb, when using the Erlang B formula.
There are several Erlang formulae, including Erlang B, Erlang C and the related Engset formula, based on different models of user behavior and system operation. These are discussed below, and may each be derived by means of a special case of continuous-time Markov processes known as a birth-death process.
The busy-hour carried traffic, Ec, is measured on an already-overloaded system, with a significant level of blocking, it is necessary to take account of the blocked calls in estimating the busy-hour offered traffic Eo (which is the traffic value to be used in the Erlang formula). The offered traffic can be estimated by Eo = Ec/(1 - Pb). For this purpose, where the system includes a means of counting blocked calls and successful calls, Pb can be estimated directly from the proportion of calls that are blocked. Failing that, Pb can be estimated by using Ec in place of Eo in the Erlang formula and the resulting estimate of Pb can then be used in Eo = Ec/(1 - Pb) to estimate Eo. Another method of estimating Eo in an overloaded system is to measure the busy-hour call arrival rate, λ (counting successful calls and blocked calls), and the average call-holding time (for successful calls), h, and then estimate Eo using the formula E = λh.
For a situation where the traffic to be handled is completely new traffic, the only choice is to try to model expected user behavior, estimating active user population, N, expected level of use, U
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 14 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
(number of calls/transactions per user per day), busy-hour concentration factor, C (proportion of daily activity that will fall in the busy hour), and average holding time/service time, h (expressed in minutes). A projection of busy-hour offered traffic would then be Eo = (NUC/60)h erlangs. (The division by 60 translates the busy-hour call/transaction arrival rate into a per-minute value, to match the units in which h is expressed).
Erlang-B also known as the Erlang loss formula, is a formula for the blocking probability derived from the Erlang distribution to describe the probability of call loss on a group of circuits (in a circuit switched network, or equivalent). It is, for example, used in planning telephone networks. The formula was derived by Agner Krarup Erlang and is not limited to telephone networks, since it describes a probability in a queuing system (albeit a special case with a number of servers but no buffer spaces for incoming calls to wait for a free server). Hence, the formula is also used in certain inventory systems with lost sales.
The formula applies under the condition that an unsuccessful call, because the line is busy, is not queued or retried, but instead really lost forever. It is assumed that call attempts arrive following a Poisson process, so call arrivals are independent. Further it is assumed that message length (holding times) are exponentially distributed (Markovian system) although the formula turns out to apply under general holding time distributions.
Erlangs are a dimensionless quantity calculated as the average arrival rate, λ, multiplied by the average call length, h. The Erlang B formula assumes an infinite population of sources (such as telephone subscribers), which jointly offer traffic to N servers (such as links in a trunk group). The rate of arrival of new calls (birth rate) is equal to λ and is constant, not depending on the number of active sources, because the total number of sources is assumed to be infinite. The rate of call departure (death rate) is equal to the number of calls in progress divided by h, the mean call holding time. The formula calculates blocking probability in a loss system, where if a request is not served immediately when it tries to use a resource, it is aborted. Requests are therefore not queued. Blocking occurs when there is a new request from a source, but all the servers are already busy. The formula assumes that blocked traffic is immediately cleared.
The formula provides the GoS (grade of service) which is the probability Pb that a new call arriving at the circuit group is
where
Pb is the probability of blocking m is the number of resources such as
servers or circuits in a group E=𝜆 is the total amount of traffic offered
in erlangs
This may be expressed recursively as follows, in a form that is used to simplify the calculation of tables of the Erlang B formula:
B(E,0) = 1
B(E , j) = 𝐸𝐵(𝐸,𝑗−1)
𝐸𝐵 𝐸 ,𝑗−1 +𝑗
for all j = 1,2,…,m. Typically, instead of B(E,m)
the inverse 1/B(E,m) is calculated in numerical
computation in order to ensure numerical stability:
1
𝐵(𝐸,0) = 1
1
𝐵(𝐸 ,𝑗 ) = 1 +
𝑗
𝐸
1
𝐵(𝐸,𝑗−1) ,
for all j = 1,2,…,m. The Erlang B formula applies to loss systems, such as telephone systems on both fixed and mobile networks, which do not provide traffic buffering, and are not intended to do so. It assumes that the call arrivals may be modeled by a Poisson process, but is valid for any statistical distribution of call holding times with finite mean. Erlang B is a trunk sizing tool for voice switch to voice switch traffic. The Erlang B formula is decreasing and convex in m.
Extended Erlang B is an iterative calculation, rather than a formula, that adds an extra parameter, the Recall Factor, which defines the recall attempts.
The steps in the process are as follows:
1. Calculate
𝑃𝑏=B(E,m)
as above for Erlang B.
2. Calculate the probable number of blocked calls
a. 𝐵𝑒=E𝑃𝑏
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 15
IJSER © 2012
http://www.ijser.org
3. Calculate the number of recalls, R
assuming a Recall Factor, 𝑅𝑓 :
R = 𝐵𝑒𝑅𝑓
4. Calculate the new offered traffic
𝐸𝑖+1 = 𝐸0+R
where 𝐸0 is the initial (baseline) level of traffic.
5. Return to step 1 and iterate until a stable value of E is obtained.
The Erlang C formula expresses the waiting probability in a queuing system. Just as the Erlang B formula, Erlang C assumes an infinite population of sources, which jointly offer traffic of Aerlangs to N servers. However, if all the servers are busy when a request arrives from a source, the request is queued. An unlimited number of requests may be held in the queue in this way simultaneously. This formula calculates the probability of queuing offered traffic, assuming that blocked calls stay in the system until they can be handled. This formula is used to determine the number of agents or customer service representatives needed to staff a call centre, for a specified desired probability of queuing.
𝑃𝑊= 𝐴𝑁
𝑁 !
𝑁
𝑁−𝐴
𝐴𝑖
𝑖! +
𝐴𝑁
𝑁 !𝑁−1𝑖=0
𝑁
𝑁−𝐴
where
A is the total traffic offered in units of erlangs
N is the number of servers 𝑃𝑊 is the probability that a customer has
to wait for service
It is assumed that the call arrivals can be modeled by a Poisson process and that call holding times are described by a negative exponential distribution. A common use for Erlang C is modeling and dimensioning call center agents in a call center environment.
The Engset calculation is a related formula, named after its developer, T. O. Engset, used to
determine the probability of congestion occurring within a telephonycircuit group. It deals with a finite population of S sources rather than the infinite population of sources that Erlang assumes. The formula requires that the user knows the expected peak traffic, the number of sources (callers) and the number of circuits in the network.
3. CONCLUSION
After explaining the concepts of traffic in some
systems, we have described the different erlang
units used to measure traffic.
REFERENCES
[1] Churchman, C.West,Russel L.Ackott,
E.Leonard Arnoff, Introduction to
Operation Reseach, .New York; John
Wiley and sons, Inc, 1963.
[2] Donald Gross Carl M.Harris,
Fundamentals of Queueing Theory, Third
Edition, Wiley India, 1998.
[3] G.Srinivasan Operation Research
Principles of Applications, PHI Learning
Private Limitted.New Delhi, 2007.
[4] E. Pgge, Introduction of Queuing Theory
in operation Research, 1972.
[5] Robert B. Cooper, Introduction to Queuing
Theory, 1972.
[6] Jean Walrand, An Introduction to Queuing
Networks, 1988.
[7] H. M. Wagner, Principles of Operation
Research, 1972.
[8] G. F. Newell, Applications of Queuing
Theory, 1982.
[9] Guoping Zeng, Two common properties of
the ERLONG-B Function, ERLANG-C
Function and Engset blocking function,
Elseuier science (2003).
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 16 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
Solution and Stability of a Mixed Type Functional Equation in RN-Spaces
K. Ravi
and P. Narasimman
Abstract - In this paper, we obtain the general solution and investigate the generalized Hyers-Ulam Rassias stability problem for the following new
mixed type additive and quadratic functional equation
(2 ) (2 ) (2 ) 2 ( ) ( ) ( ) ( ) ( ) ( )f x y f y z f z x f x y f y z f x z f x f y f z
in random normed spaces with the sense of sherstnev under arbitrary t-norms.
Index Terms – Random normed space, Additive functional equation, Quadratic functional equation, Generalized Hyers-Ulam
stability.
—————————— ——————————
1.INTRODUCTION AND PRELIMINARIES
N 1940, S.M.Ulam[28] presented a list of unsolved problems. One of the problem is the
stability problem. It stated as follows: Suppose that a group G and a metric group H are given. For any 0 , does there exist a 0 such that if a function :f G H satisfies the inequality
( ( ), ( , ( ))d f xy f x f y
for all ,x y G , then a homomorphism :a G H exist with ( ( ), ( ))d f x a x for all
x in G ?.
In 1941, D.H.Hyers[12] answered Ulam‘s
problem for the case of approximately additive
functions under the assumption that G and H
are Banachspaces. Hyers result was further
generalized by Th.M.Rassias[25]. He proved the
following theorem.
Theorem 1.1: Let :f E E be a mapping
from normed vector space E into a Banachspace
E subject to the inequality
( ) ( ) ( )p p
f x y f x f y x y (1.1)
——————————————
K. Ravi is serving in the Department of Mathematics, Sacred Heart
College, Tirupattur, India. E-mail: [email protected]
P. Narasimman is pursuing Ph.D. degree in Mathematics, Bharathiar
University, Coimbatore India. E-mail: [email protected]
for all ,x y E where and p are constants with 0 and 1p . Then there exists a unique additive mapping :T E E such that
2( ) ( )
2 2
p
pf x T x x
(1.2)
for all x E . If 0p then the inequality (1.1) holds for all , 0x y and (1.2) for 0x .
Also if the function ( )t f tx from in to E
is continuous for each fixed x E , then T is
linear. In 1991, Z.Gajada[5] answered the
question raised by T.M.Rassias that his theorem
also holds good for 1p . This new concept is
known as Hyers-Ulam-Rassias stability of
functional equation (see [1, 3, 4, 6, 9-11]). In
1982-1998, J.M.Rassias [18-22] generalized the
result of Th.M.Rassias and proved the following
theorem.
Theorem: 1.2. Let X be a real-normed linear
space and let Y be real-complete-normed linear
space. Assume in addition that :f X Y is an
approximately additive mapping for which there
exist constants 0 and ,p q such that
1r p q , and f satisfies the Cauchy-
Gavruta-Rassias inequality
( ) ( ) ( )p p
f x y f x f y x y
for all ,x y X . Then there exists a unique
additive mapping :L X Y satisfying
I
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 17
IJSER © 2012
http://www.ijser.org
( ) ( )2 2
r
rf x L x x
for all x X . If in addition :f X Y is a
mapping such that the transformation ( )t f tx
is continuous in t for each fixed x X , then
L is -linear mapping.
The stability concept that was introduced by
Th.M.Rassias and J.M.Rassias provided a lot of
influence to a number of mathematicians to
develop the notion of what is known today the
term Hyers-Ulam-Rassias stability of the linear
mapping. Since then, the stability of several
functional equations has been extensively
investigated by several mathematicians (see [2, 8,
14, 23, 24]). In 2002, J.M.Rassias[17] estabilished
the Ulam stability of the following mixed-type
functional equation
3 3
1 1 1 3
( ) ( )i i i j
i i i j
f x f x f x x
on restricted domain. P.Nakmalachalasint [16]
generalized the J.M.Rassias work to the following
n-dimensional mixed-type functional equation
1 1 1
( 2) ( ) ( )n n
i i i j
i i i j n
f x n f x f x x
when 2n and investigated its generalized
Ulam-Gavruta-Rassias stability. E.Eshaghi Gordji
and etal [7] obtained general solution and
investigated the generalized Hyers-Ulam-Rassias
stability for the following Mixed- type functional
equations
4[ (3 ) (3 )]
12[ ( ) ( )]
12[ (2 ) (2 )] 8 ( )
192 ( ) (2 ) 30 (2 )
f x y f x y
f x y f x y
f x y f x y f y
f x f y f x
2 2 2
( ) ( )]
( ) ( ) 2(1 ) ( )
and f x ky f x ky
k f x y k f x y k f x
0, 1.k In 2005, K.W. Jun and H.M. Kim [13]
obtained the general solution of a generalized
quadratic and additive type functional equation of
the form
( ) ( ) ( ) ( )f x ay af x y f x ay af x y
for any integer a with 1,0,1.a A.Najati and
M.B.Moghimi [15] dealt the functional equation
(2 ) (2 )
( ) ( ) 2 (2 ) 2 ( )
f x y f x y
f x y f x y f x f x
(1.3)
which is derived from quadratic and additive
functions and established the general solution of
equation (1.3) and investigated the Hyers-Ulam-
Rassias stability for equation (1.3).
Before we proceed to the main theorems, we
present the necessary terminologies notations and
definitions which will be useful to do our main
theorems concerning random normed space. In
this study the space of all probability distribution
functions is denoted by
: , 0,1 :
(0) 0 ( ) 1
F R
F and F
where F is left continuous and non-decreasing on
R . Also the subset is the set
: ( ) 1D F l F
where ( )l f x denotes the left limit of the
function f at the point x , ( ) lim ( )t x
l f x f t
.
The space is partially ordered by the usual
point-wise ordering of functions, i.e., F G if
and only if ( ) ( )F t G t for all t R . The
maximal element for in this order is the
distribution function given by:
0
0, 0,( )
1, 0.
if tt
if t
Definition 1.3. ([26]). A mapping
: 0,1 0,1 0,1T
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 18 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
is a continuous- norm, if T satisfies the following
conditions:
1. T is commutative and associative;
2. T is continuous;
3. T (a, 1) = a for all 0,1a ;
4. ( , ) ( , )T a b T c d whenever a c and
b ≤ d for all , , , 0,1 .a b c d
Typical examples of continuous t norm are
( , )T a b ab , ( , ) min( , )T a b a b and
( , ) max( 1,0)LT a b a b (the Lukasiewicz
t norm ). Now t norm are recursively defined
by 1T T and
1 2 3 1
1
1 2 3 1
( , , ,..., )
( , , ,..., ) ,
n
n
n
n n
T x x x x
T T x x x x x
for all 2n and 0,1ix , for all
1,2,..., 1 .T n The t norm T is Hadzic type if
for given 0,1 there is 0,1 such that
(1 ,...,1 ) 1 ,mT m N .
A typical example of such t- norm is
( , ) min( , )T a b a b .
Recall that if T is a t – norm and nx is a given
sequence of numbers in [0, 1], 1
n
i iT x is defined
recursively by
1
1i i iT x x and 1
1 1( , )n n
i i i i nT x T T x x
for 2n is
defined as 1lim .n
i in
T x
Definition 1.4. ([27]). A random normed space
(briefly, RN space) is a triple (X, μ, T), where X is
a vector space, T is a continuous t- norm and μ is
a mapping from X into D such that the following
conditions hold:
(RN1) 0( ) ( )x t t for all t > 0
if and only if x = 0;
(RN2) ( )x x
tt
for all x X , 0
and 0t ;
(RN4) ( ) ( ( ), ( ))x y x yt s T t s for all
,x y X and , 0t s . Clearly every normed
space ,X defines a RN-space (X, μ, TM),
where ( )x
tt
t x
for all t > 0,
and TM is the minimum. t- norm. This space is
called the induced random normed space.
Definition 1.5. Let (X, μ, T) be an RN-space. A
sequence nx in X is said to be convergent to x
in X if, for every 0t and 0 there exists
positive integer N such that ( ) 1nx x t
whenever .n N
Definition 1.6. Let (X, μ, T) be an RN-space. A
sequence nx in X is called Cauchy sequence if,
for every 0t and 0 there exists positive
integer N such that ( ) 1n mx x t whenever
.n m N
Definition 1.7. A RN-space (X, μ, T) is said to be
complete if and only if every Cauchy sequence in
X is convergent to a point in X.
Theorem 1.8. ([26]). If (X, μ, T) is an RN-space
and nx is a sequence such that
lim ( ) ( )nn x x
nx x then T T
almost everywhere.
In this paper, we are discussing a new mixed type
of additive and quadratic functional equation
(2 ) (2 ) (2 )
2 ( ) ( ) ( )
( ) ( ) ( )
f x y f y z f z x
f x y f y z f x z
f x f y f z
(1.4)
te its general solution and studied its stability in
random normed spaces with the sence of sherstnev
under arbitrary t- norms.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 19
IJSER © 2012
http://www.ijser.org
In Section-2, we investigate the General Solution
of the Functional Equation (1.4) and in Section-3,
we discuss the stability of functional equation
(1.4) in random normed spaces with the sence of
sherstnev under arbitrary t-norm.
2. THE GENERAL SOLUTION OF THE
FUNDAMENTAL EQUATION (1.4)
In this section we establish the general solution of
functional equation (1.4).
Theorem 2.1. Let X and Y be a vector spaces,
and let :f X Y be a function satisfies (1.4).
Then the following assertions hold
a) If f is even function, then f is quadratic
b) If f is odd function, then f is additive
Proof: a) By putting 0x y z in (1.4), we
get (0) 0f . By evenness of f , equation (1.4)
can be written as
(2 ) (2 ) (2 )
2 ( ) ( ) ( )
( ) ( ) ( )
f x y f y z f z x
f x y f y z f x z
f x f y f z
(2.1)
, ,x y z X . Setting ( , , ) ( ,0,0),x y z x ( , ,0)x x
and ( , , )x y y in (2.1), we obtain the following
equations
(2 ) 4 ( )f x f x , (3 ) 9 ( )f x f x and
(2 ) ( 2 )
4 ( ) ( ) ( )
f x y f x y
f x y f x f y
(2.2)
respectively, for all ,x y X . Setting
( , , ) ( , ,0)x y z x y in (2.1), we obtain
(2 ) ( ) 2 ( ) 2 ( )f x y f y f x y f x (2.3)
(2 ) (2 ) (2 )
(2 ) ( 2 )1
(2 ) ( 2 )2
(2 ) ( 2 )
e e ef x y f y z f z x
f x y f x y
f y z f y z
f z x f z x
2 ( ) ( ) ( )
( ) ( ) ( )
e e e
e e e
f x y f y z f x z
f x f y f z
for all , ,x y z X . This means that ef holds in
(1.4). Similarly we can show that ef satisfies
(1.4). By above theorem, ef and ef are quadratic
and additive respectively. Thus there exists a
unique symmetric bi-additive function
:B X X Y such that ( ) ( , )ef x B x x for all
x X . Put ( ) ( )oA x f x for all x X . It
follows that ( ) ( , ) ( )f x B x x A x for all
x X . The proof of the converse is trivial.
3. STABILITY OF THE FUNCTIONAL
EQUATION (1.4)
In the section, the authors present the stability for
the functional equation (1.4) in random normed
space. Throughout this section, assume that X is a
real linear space and ( , , )Y T is a complete RN-
space.
Theorem 3.1. Let :f X Y be a function with
(0) 0f for which there is : X X D
with the property:
(2 ) (2 ) (2 ) , ,2 ( ) ( ) ( )
( ) ( ) ( )
( ) ( )f x y f y z f z x x y zf x y f y z f x z
f x f y f z
t t
(3.1)
for all , ,x y z X and all 0t . If
1 1
1 1
1
1
2
2 ,2 ,0
2
2 ,2 2 ,0
12
2 ,0,0
2
2 2 ,0,0
2
2
2lim 1
2
5
2
i n i n
i n i n
i n
i n
n i
x x
n i
x x
in in
x
n i
x
t
tT
t
t
(3.2)
and 2
2 ,2 ,2lim 2 1n n n
n
x x znt
(3.3)
for all , ,x y z X and all 0t , then there exists a
unique quadratic mapping :Q X Y such that
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 20 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
1 1 1 1
1 1
(2 ) 2 ( ) ( )
2 ,2 ,0 2 ,2 2 ,0
1
2 ,0,0 2 2 ,0,0
( )
22
2
22
5
i i i i
i i
f x f x Q x
ii
x x x x
ii
i
x x
t
tt
Tt
t
(3.4)
for all ,x y X and all 0t .
Proof. Putting , 0y z in (3.1), we get
5 (2 ) 15 ( ) 5 ( ) ,0,0( )
5f x f x f x x
tt
(3.5)
for all x X . Putting ( , , ) ( , ,0)x y z x x and
( ,2 ,0)x x in (3.1) and adding the resultant
equations, we arrive
4 (2 ) 7 ( ) 5 ( ) 2 (4 ) ( 2 )
, ,0 ,2 ,0
( )
2
f x f x f x f x f x
x x x x
t
tt
(3.6)
for all x X . Adding (3.5) and (3.6), we obtain
9 (2 ) 8 ( ) 2 (4 ) ( 2 )
, ,0 ,2 ,0 ,0,0
( )
2 5
f x f x f x f x
x x x x x
t
t tt
(3.7)
for all x X . Setting ( , , ) (2 ,0,0)x y z x in
(3.1) and adding the resultant equation with (3.7),
we arrive
(4 ) 6 (2 ) 8 ( ) , ,0( )2
f x f x f x x x
tt
,2 ,0 ,0,0 2 ,0,05
x x x x
tt t
(3.8)
for all x X . Let
, , , ,0
,2 ,0 ,0,0 2 ,0,0
( )2
5
x x x x x
x x x x
tt
tt t
(3.9)
for all x X . Then equation (3.8) becomes
(4 ) 6 (2 ) 8 ( ) , ,( ) ( )f x f x f x x x xt t (3.10)
for all x X and all 0t . Let :g X Y be a
mapping defined by
( ) (2 ) 2 ( )g x f x f x .
Then we conclude that
(2 ) 4 ( ) , ,( ) ( )g x g x x x xt t (3.11)
for all x X . Thus we have
2
2
(2 ) , ,( )
2
( ) (2 )g x x x xg x
t t
(3.12)
for all x X and all 0t . Hence
1
2( 1) 2
2( 1)
(2 ) (2 ) 2 ,2 ,2
2 2
( ) (2 )k k k k k
k k
k
g x g x x x xt t
(3.13)
for all x X and all k N . This means that
1
2( 1) 2
1
1(2 ) (2 ) 2 ,2 ,2
2 2
(2 )2
k k k k k
k k
k
kg x g x x x x
tt
(3.14)
for all x X , 0t and all k N . By the
triangle inequality from 2
1 1 11 ...
2 2 2n , it
follows that
2
1
2( 1) 2
1 1 1
(2 )( )
2
1
0 1(2 ) (2 )
2 2
1 1
0 2 ,2 ,2
1 2 ,2 ,2
( )
2
2
2
n
n
k k
k k
k k k
i i i
g xg x
n
k kg x g x
n k
k x x x
n i
i x x x
t
tT
T t
T t
(3.15)
for all x X and all 0t . In order to prove the
convergence of the sequence 2
(2 )
2
n
n
g x , we replace
x with 2m x in (3.15) to obtain that
2( ) 2
(2 ) (2 )
2 2
n m m
n m m
g x g xt
1 1 1
2
1 2 ,2 ,2(2 )i m i m i m
n i m
i x x xT t
(3.16)
Since the right hand side of the inequality (3.16)
tends to 1 as m and n tend to infinity, the
sequence 2
(2 )
2
n
n
g x is a Cauchy sequence. Thus we
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 21
IJSER © 2012
http://www.ijser.org
may define 2
(2 )( ) lim
2
n
nn
g xQ x
for all x X .
Now we show that Q is a quadratic mapping.
Replacing ,x y with 2n x and 2n y in (3.1),
respectively, we get
2
(2 ) (2 ) (2 ) 2 ,2 ,22 ( ) ( ) ( )
( ) ( ) ( )
( ) (2 )n n n
n
g x y g y z g z x x y zg x y g y z g x z
g x g y g z
t t
(3.17)
Taking the limit as n , we find that Q
satisfies (1.4) for all ,x y X . By Lemma 2.1 the
mapping :Q X Y is quadratic. Letting the limit
as n in (3.15), we get (3.4) by (3.9). Finally,
to prove the uniqueness of the quadratic mapping
Q subject to (3.4), let us assume that there exists
another quadratic mapping Q which satisfies
(3.4). Since
2 2(2 ) 2 ( ), (2 ) 2 ( )n n n nQ x Q x Q x Q x
for all x X and n N , from (3.4), it follows
that 2 1
( ) ( ) (2 ) (2 )(2 ) (2 )n n
n
Q x Q x Q x Q xt t
1 1
1 1
1
1
1 1
1 1
2
2 ,2 ,0
2
2 ,2 2 ,0
12
2 ,0,0
2
2 2 ,0,0
2
2 ,2 ,0
2
2 ,2 2 ,0
1
2
2
2,
2
5
2
2
2
2
i n i n
i n i n
i n
i n
i n i n
i n i n
n i
x x
n i
x x
in i
x
n i
x
n i
x x
n i
x x
i
t
tT
t
tT
t
tT
1
1
2
2 ,0,0
2
2 2 ,0,0
2
5
2
i n
i n
n i
x
n i
x
t
t
(3.18)
for all x X and all 0t . By letting n in
(3.18), we conclude that Q Q .
Theorem 3.2. Let :f X Y be a function with
(0) 0f for which there is : X X D
with the property:
(2 ) (2 ) (2 ) , ,2 ( ) ( ) ( )
( ) ( ) ( )
( ) ( )f x y f y z f z x x y zf x y f y z f x z
f x f y f z
t t
(3.19)
for all , ,x y z X and all 0t . If
1 1
1 1
1
1
2 ,2 ,0
2 ,2 2 ,0
1
2 ,0,0
2 2 ,0,0
2
2
2lim 1
2
5
2
i n i n
i n i n
i n
i n
n
x x
n
x x
inn
x
n
x
t
tT
t
t
(3.20)
and
2 ,2 ,2
lim 2 1n n n
n
x x znt
(3.21)
for all , ,x y z X and all 0t , then there exists
a unique quadratic mapping :A X Y such that
1 1 1 1
1 1
(2 ) 4 ( ) ( )
2 ,2 ,0 2 ,2 2 ,0
1
2 ,0,0 2 2 ,0,0
( )
2
5
i i i i
i i
f x f x A x
x x x x
i
x x
t
tt
Tt
t
(3.22)
for all ,x y X and all 0t .
Proof. The steps are same as in Theorem 3.1 up
to the equation (3.10). Let :h X Y be a
mapping defined by ( ) (2 ) 4 ( )g x f x f x .
Then we conclude that
(2 ) 2 ( ) , ,( ) ( )h x h x x x xt t (3.23)
for all x X . Thus we have
(2 ) , ,
( )2
( ) (2 )h x x x xh x
t t
(3.24)
for all x X and all 0t . Hence
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 22 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
1
1
1
(2 ) (2 ) 2 ,2 ,2
2 2
( ) (2 )k k k k k
k k
k
h x h x x x xt t
(3.25)
for all x X and all k N . This means that
1
1
1(2 ) (2 ) 2 ,2 ,2
2 2
( )2
k k k k k
k k
kh x h x x x x
tt
(3.26)
for all x X , 0t and all k N . By the
triangle inequality from 2
1 1 11 ...
2 2 2n , it
follows
1
1
1 1 1
1
0 1(2 ) (2 ) (2 )( )
2 2 2
1
0 2 ,2 ,2
1 2 ,2 ,2
( )2
n k k
n k k
k k k
i i i
n
k kh x h x h xh x
n
k x x x
n
i x x x
tt T
T t
T t
(3.27)
for all x X and all 0t . In order to prove the
convergence of the sequence (2 )
2
n
n
h x , we replace
x with 2m x in (3.27) to obtain that
1 1 1
(2 ) (2 )
2 2
1 2 ,2 ,2(2 )
n m m
n m m
i m i m i m
h x h x
n m
i x x x
t
T t
(3.28)
Since the right hand side of the inequality (3.28)
tends to 1 as m and n tend to infinity, the
sequence (2 )
2
n
n
h x is a Cauchy sequence. Thus we
may define
(2 )( ) lim
2
n
nn
h xA x
for all x X . Now we show that A is a additive
mapping. Replacing ,x y with 2n x and 2n y in
(3.19), respectively, we get
(2 ) (2 ) (2 ) 2 ,2 ,22 ( ) ( ) ( )
( ) ( ) ( )
( ) (2 )n n n
n
h x y h y z h z x x y zh x y h y z h x z
h x h y h z
t t
(3.29)
Taking the limit as n , we find that A
satisfies (1.4) for all ,x y X . By Lemma 2.1 the
mapping :A X Y is additive. Letting the limit
as n in (3.27), we get (3.22) by (3.9).
Finally, to prove the uniqueness of the additive
mapping Asubject to (3.4), let us assume that
there exists another additive mapping A which
satisfies (3.4). Since
(2 ) 2 ( ),n nA x A x (2 ) 2 ( )n nA x A x
for all x X and n N , from (3.4), it follows
that
1
( ) ( ) (2 ) (2 )
(2 ) (2 ) (2 ) (2 )
(2 ) (2 )
(2 ), (2 )
n n
n n n n
n
A x A x A x A x
n n
A x h x h x A x
t t
T t t
1 1
1 1
1
1
1 1
1 1
1
2 ,2 ,0
2 ,2 2 ,0
1
2 ,0,0
2 2 ,0,0
2 ,2 ,0
2 ,2 2 ,0
1
2 ,0,0
2
2
2,
2
5
2
2
2
2
2
5
i n i n
i n i n
i n
i n
i n i n
i n i n
i n
n
x x
n
x x
in
x
n
x
n
x x
n
x x
i n
x
t
tT
t
tT
t
tT
t
12 2 ,0,02i n
n
xt
(3.30)
for all x X and all 0t . By letting n in
(3.30), we conclude that A A .
Theorem 3.3. Let :f X Y be a function with
(0) 0f for which there is : X X D
with the property:
(2 ) (2 ) (2 ) , ,2 ( ) ( ) ( )
( ) ( ) ( )
( ) ( )f x y f y z f z x x y zf x y f y z f x z
f x f y f z
t t
(3.31)
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 23
IJSER © 2012
http://www.ijser.org
for all , ,x y z X and all 0t . If
1 1
1 1
1
1
2
2 ,2 ,0
2
2 ,2 2 ,0
12
2 ,0,0
2
2 2 ,0,0
2
2
2lim 1
2
5
2
i n i n
i n i n
i n
i n
n i
x x
n i
x x
in in
x
n i
x
t
tT
t
t
1 1 1 1
1 1
2 ,2 ,0 2 ,2 2 ,0
1
2 ,0,0 2 2 ,0,0
22
2lim
22
5
i n i n i n i n
i n i n
nn
x x x x
i nnn
x x
tt
Tt
t
(3.32)
and
2
2 ,2 ,2lim 2 1n n n
n
x x znt
=
2 ,2 ,2lim 2n n n
n
x x znt
(3.33)
for all , ,x y z X and all 0t , then there exists
a unique quadratic mapping :Q X Y and
unique additive mapping :A X Y such that
1 1 1 1
1 1
1 1 1 1
1 1
( ) ( ) ( )
2 ,2 ,0 2 ,2 2 ,0
1
2 ,0,0 2 2 ,0,0
2 ,2 ,0 2 ,2 2 ,0
1
2 ,0,0 2 2 ,0,0
( )
2 2 2
2 22 2
5
2
22
5
i i i i
i i
i i i i
i i
f x Q x A x
i i
x x x x
ii
i
x x
x x x x
i
x x
t
t t
T tt
t t
T tt
(3.34)
for all ,x y X and all 0t .
Proof. By Theorem 3.1 and Theorem 3.2, there
exist a quadratic mapping :Q X Y and a
additive mapping :A X Y such that
1 1 1 1
1 1
(2 ) 2 ( ) ( )
2 ,2 ,0 2 ,2 2 ,0
1
2 ,0,0 2 2 ,0,0
( )
22
2
22
5
i i i i
i i
f x f x Q x
ii
x x x x
ii
i
x x
t
tt
Tt
t
And
1 1 1 1
1 1
(2 ) 4 ( ) ( )
2 ,2 ,0 2 ,2 2 ,0
1
2 ,0,0 2 2 ,0,0
( )
2
5
i i i i
i i
f x f x A x
x x x x
i
x x
t
tt
Tt
t
for all x X and all 0t . So it follows from the
last inequalities that
1 1 1 1
1 1
( ) ( )( )
2 2
2 ,2 ,0 2 ,2 2 ,0
1
2 ,0,0 2 2 ,0,0
( )
2 2 2
2 22 2
5
i i i i
i i
Q x A xf x
i i
x x x x
ii
i
x x
t
t t
T tt
1 1 1 1
1 1
2 ,2 ,0 2 ,2 2 ,0
1
2 ,0,0 2 2 ,0,0
2
22
5
i i i i
i i
x x x x
i
x x
t t
T tt
for all x X and all 0t . Hence we obtain
(3.34) by letting ( )
( )2
Q xQ x
and
( )( )
2
A xA x
for all x X . The uniqueness
property of Q and A , are trivial.
REFRENCES
[1] T. Aoki, On the stability of the linear
transformation in Banach spaces, J. Math .
Soc.Japan,2(1950), 64-66.
[2] J.H.Bae, K.W.Jun and S.M.Jung, On the
Stability of a Quadratic Functional
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 24 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
Equations, Kyungpook Math. J., 43
(2003), 415 - 423.
[3] T. Bag and S .K. Samanta, Finite
dimensional fuzzy normed linear spaces, J.
Fuzzy Math.11 (3) (2003) 687-705.
[4] G.L. Forti, Hyers -Ulam stability of
functional equations in several variables,
Aequationes Math., 50 (1995), 143 - 190.
[5] Z. Gajada, On stability of additive
mappings, Internat. J. Math. Math. Sci.,
14(1991),431-434.
[6] P. Gavruta, A generalization of the Hyers-
Ulam-Rassias Stability of approximately
additive mapping, J. Math. Anal. Appl.,
184 (1994), 431 - 436.
[7] Eshaghi Gordji and H.Khodaei, Solution
and Stability of Generalized Mixed type
Cubic, Quadratic and Additive Functional
Equation in quasi-Banach Spaces,
Nonlinear Analysis, 71(2009)5629-5643.
[8] A. Grabiec, The generalized Hyers-Ulam
stability of a class of functional equations,
Publ.Math. Debrecen, 48 (1996), 217 -
235.
[9] D.H. Hyers, G. Isac and Th.M. Rassias,
Stability of Functional Equations in
Several Variables, Birkhauser, Basel,
1998.
[10] D.H. Hyers, G. Isac and Th.M. Rassias, On
the asymptoticity aspect of Hyers-Ulam
stability of mappings, Proc. Amer. Math.
Soc., 126 (1998), 425 - 430.
[11] D.H. Hyers, G. Isac and Th.M. Rassias,
Approximate homomorphisms,
Aequationes Math., 44 (1992), 125 - 153.
[12] D. H. Hyers, On the stability of the linear
functional equation, Proc. Natl. Acad. Sci.
27 (1941) 222-224.
[13] K.W.Jun, H.M. Kim, On the Hyers-Ulam-
Rassias stability of a generalized quadratic
and additive functional equation,
Bull.Korean Math.Soc. 42, No:1 (2005),
133-148.
[14] K.W. Jun and Y.H. Lee, On the Hyers-
Ulam-Rassias stability of a Pexiderized
Quadratic inequality, Math. Ineq. Appl.,
4(1) (2001), 93 - 118.
[15] A.Najati and M.B.moghimi, Stability of a
functional equation deriving from
quadratic and additive functions in quasi-
Banach spaces, J.Math.Anal.Appl.337
(2008) 399-415.
[16] P. Nakmahachalasint, On the Generalized
Ulam-Gavruta-Rassias stability of Mixed-
Type Linear and Euler-Lagrange-Rassias
Functional Equation, International Journal
of Mathematics and Mathematical
Sciences.,Vol.2007,Article ID 63239,10
pages.
[17] J. M. Rassias, On the Ulam stability of the
mixed type mappings on restricted
domains, J. Math. Anal. Appl., 276(2002),
747-762.
[18] J.M. Rassias, Solution of a problem of
Ulam, J. Approx. Theory 57(1989), no. 3,
268-273.
[19] J.M. Rassias, On a new approximation of
approximately linear mapping by linear
mappings, Discuss. Math. 7 (1985), 193-
196.
[20] J.M. Rassias, On approximation of
approximately linear mappings by linear
mappings, Bull.Sci. Math. (2) 108 (1984),
NO. 4, 445-446.
[21] J.M. Rassias, On approximation of
approximately linear mappings by linear
mapping, J.Funct. Anal. 46 (1982),no. 1,
126-130.
[22] J.M. Rassias, On the stability of the Euler-
Lagrange functional equation, Chinese
J.Math.,20 (1992),185-190.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 25
IJSER © 2012
http://www.ijser.org
[23] K.Ravi R. Kodandan, P.Narasimman,
Ulam stability of a quadratic Functional
Equation, International Journal of Pure and
Applied Mathematics, Vol. 51, No.
1,2009, 87-101.
[24] Th.M. Rassias, On the stability of
functional equations in Banach spaces, J.
Math. Anal.Appl., 251 (2000), 264 - 284.
[25] Th. M. Rassias, On the stability of the
linear mapping in Banacb spaces, Proc.
Amer. Math. Soc. 72 (1978) 297-300.
[26] B.Schweizer and A.Sklar, Probabilistic
Metric Spaces, Elsevier,North Holand,
New York, 1983
[27] A.N.Sherstnev, On the notion of a random
normed space, Dokl.Akad.Nauk SSSR
149(1963), 280-283(in Russian).
[28] S.M. Ulam, A Colloection of the
Mathematical Problems, Interscience
Publ., New York, 1960.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 26 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
Analysis of Worm Propagation in Computer
Networks with A Discrete Epidemic Model
M. Reni Sagaya Raj, A. George Maria Selvam and T.Sivagnanam
Abstract - Computer worms are self replicating programs that run independently and self-propagating across computer networks.
Computer worms have devastating effects on the economy. In order to defend against the worms, there is a need to understand the
propagation mechanism of worm spreading. An effective worm propagation model helps us to develop strategies to guard against the
worm attacks. In this paper, a modified epidemiological model is proposed. The model is constructed with difference equations and
certain dynamical behavior is investigated. Numerical simulations are performed with MATLAB.
Index Terms – Computer Network, virus, Epidemic model.
—————————— ——————————
1. INTRODUCTION
worm is a program that copies itself without
human intervention. Worms are malicious
computer program codes. In order to prevent
worms from propagating in networks, users need
to understand and predict the dynamic behaviours
of worm propagation in networks. There are
different types of worms such as email worms,
instant messaging (IM) worms, Internet worms,
Internet Relay Chat (IRC) worms and file sharing
networks worms and so on. Worms have
enormous adverse impact on the Internet. Network
worms have the potential to infect many
vulnerable hosts on the Internet before human
countermeasures take place. The aggressive
scanning traffic generated by the infected hosts
have caused network congestion, equipment
failure, and blocking of physical facilities such as
subway stations, 911 call centres, etc. The
detection count of malicious programs in June
2012 was 25,399. The worm called Bancos steals
IDs and passwords for on line banking. Code Red,
SQL Slammers, and Sasser are some of the most
famous examples of worms that have caused
considerable damage. Jerusalem is one of the
earliest worms discovered in 1987. Viruses cost
——————————————
M. Reni Sagayaraj is serving in the Department of Mathematics, Sacred
HeartCollege, Tirupattur, India. E-mail: [email protected]
A. George Maria Selvam is serving in the Department of Mathematics, Sacred HeartCollege, Tirupattur, India.
T.Sivagnanam is serving in the Department of Mathematics, St. Joseph University, Dar Es Salaam, Tanzania.
organizations millions of dollars. The TK worm
inflicted an estimated $ 5.5m of damage across the
Internet. In the following table, we present the
damage caused by some of the famous worm in
the history of Internet.
Name of the
worm
Year Damage in
dollars
Morris worm 1988 10 million
Melissa March 26, 1999 1.1 billion
I Love You May, 3, 2000 8.75
billion
Anna
Kournikova
Virus worm
February 2001 166,827
billion
Code Red July 13, 2001 2.6 billion
Sircam July 19, 2001 1.03
billion
NIMDA September 2001 645
million
Klez October 26,
2001
18.9
billion
SQL
Slammer
January 25,
2003
1.2 billion
Sobig January 2003 36.1
billion
Blaster August 11, 2003 1.3 billion
Mydoom January 26,
2004
38.5
billion
W March 19, 2004 11 million
Sasser April 30, 2004 14.8
billion
As per the latest statistics, there are 2,267,233,742
Internet Users worldwide. Leading global cyber
security firms in May 2012 announced the
A
NTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 27
IJSER © 2012
http://www.ijser.org
detection of a sophisticated new type of malicious
code on hundreds of computers throughout the
Middle East, with particular concentration in Iran.
The malicious code named Flame has been
capturing sensitive user information such as
screen shots, emails, documents and audio files
using a computers microphone. Flame is a data-
mining virus that in May 2012 penetrated the
computers of high-ranking Iranian officials,
sweeping up information from their machines.
2.EPIDEMIC MODELS
Mathematical modelling of infectious diseases can
be traced back to Bernoulli (1790). Bernoulli
developed mathematical models to study the
spread smallpox. In 1906, Hamer formulated a
model to investigate the spread of measles. In
1911, Dr. Ross described the transmission of
malaria between human population and
mosquitoes using a system of differential
equations. Epidemic models with vital dynamics
were constructed by Kermack and Mckendrick in
1927 [6].
A computer is susceptible to a worm if it could
become infected with the worm, provided the
worm is somehow introduced to the computer. In
the SIR model, a machine stays in one of the
following three states: susceptible state, infectious
state and removed state. When an infectious
machine is cleaned of worms, the machine
becomes a removed machine and it is immune to
the same type of worms. A susceptible machine
may become an infectious machine with the
possibility in a unit time. An infectious machine
is cured and becomes a removed machine with the
possibility in a unit time. At time t, ( )S t is the
number of susceptible machines, ( )I t is the
number of infectious machines and ( )R t is the
number of removed machines. The corresponding
differential equations are given by
( )( ) ( )
dS tS t I t
dt
( )
( ) ( ) ( )dI t
S t I t I tdt
( )( )
dR tI t
dt
( ) ( ) ( )S t I t R t N
where N is the total number of machines in the
system. The process of worm propagation on the
Internet is very similar to that of biological viruses
in populations. It can pass from one computer to
others like a biological virus between persons.
Spreading of worms in computer network is
epidemic in nature. Hence epidemic models have
been applied to study the propagation of viruses
and worms. Many authors analysed the process of
worm propagation on the Internet based on the
epidemic models [1, 5, 7, 9, 10].
3. MODEL DESCRIPTION
In this model, the host machines recovering from
the infective are allowed to go into a temporarily
immune state. Let be the rate at which
removals loose the immunization and becomes
susceptible. The assumptions are formulated in to
the following discrete SIRS model.
(1)
The initial conditions are
(0) (0) (0)S I R N
where (0), (0), (0) 0S I R . From the system of
above equations (1), we find
( 1) ( 1) ( 1) ( ) ( ) ( )S t I t R t S t I t R t N
.
If we replace ( )R t by ( ) ( )N I t S t in (1), we
obtain the following system of two equations in S
and I ,
( 1) ( ) ( ) ( ) ( )
( 1) ( )(1 ) ( ) ( )
( 1) ( )(1 ) ( )
S t S t S t I t R tN
I t I t S t I tN
R t R t I t
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 28 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
( 1) ( ) ( ) ( ) [ ( ) ( )]
( 1) ( )(1 ) ( ) ( )
S t S t S t I t N S t I tN
I t I t S t I tN
(2)
4. EQUILIBIRIUM POINTS
There exists two equilibria for the system of equations (2) in
S and I . They can be found by solving the following
equations in S and
*I .
* * * * * *
* * * *
[ ]
(1 )
S S S I N S IN
I I S IN
(3)
Simplifying and solving the equations (3)
simultaneously, we obtain the following two
equilibrium solutions.
* *
* *
1. , 0
( )2. , .
( )
S N I
NS N I
The first equilibrium is the disease-free
equilibrium and the second one is the endemic
equilibrium. The Jacobian matrix has the form
1
( , )
1
I SN N
J S I
I SN N
At the disease-free equilibrium, the Jacobian
matrix is
1( ,0)
0 1J N
The Jacobian matrix is upper triangular. Hence the
eigen values are 1 1 and 2 1 .
The disease free equilibrium is locally
asymptotically stable if1,2 1 . Suitably the
restrictions can be imposed on the parameters
such that 10 1 . The second eigen value
satisfies 20 1 if 1
. The basic
reproduction number is defined as (0)R
. If
(0) 1R , then there exists disease-free
equilibrium and it is locally asymptotically stable.
We shall continue with the analysis of the model
and investigate the stability of the system at the
second equilibrium point for various values of the
parameters. At the second equilibrium point the
Jacobian matrix has the form
* *
( 2 )1 ( )
( , )( )
1
J S I
We shall assume that
( 2 )2 0
.
The equilibrium point is locally asymptotically
stable if the eigen values of the Jacobian matrix J
satisfy 1i if and if only if 1 det 2Tr J J
[3, 8]. Hence
( 2 )2
( 2 )2 ( )
2
yields
0 ( )( ) ( 2 ) (4)
The equilibrium point is locally asymptotically
stable if and only if (4) is satisfied.
5. NUMERICAL SIMULATIONS AND
DISCUSSIONS
In the following discussion we take 100N . Now
we take 0.2, 0.3 and 0.02 so that
(0) 1R . The Jacobian matrix is
NTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 29
IJSER © 2012
http://www.ijser.org
1.02625 0.32
0.00625 1J
For J , we have 2.02625Tr J and
det 1.0243J . The eigen values are
1 2 11.0597, 0.9665, 1 and 2 1 .
Since (0) 1R , the infection dies out. But most of
the machines remain in susceptible state. Hence,
they are vulnerable to another variant of the same
worm.
Choosing the values 0.8, 0.2 and 0.1
and so (0) 1R , the equilibrium point is
(25,25)E . Calculations show that 1.9Tr J and
det 0.96J . Therefore
1 det 2Tr J J
is satisfied. Hence equilibrium point (25,25)E is
locally asymptotically stable. Also the eigen
values are
1 0.95 0.2398i
and 2 0.95 0.2398i
where 0.9798 1i . Due to the fact (0) 1R ,
the worm is not removed from all the machines
and they continue to reside in the network and
they pose a threat to the system. Hence the rate of
removal should be accelerated.
Considering 0.5, 0.2, 0.07 so that
(0) 1R , the equilibrium point is (40,15.6)E . For
the Jacobian matrix J , we have 1.9922Tr J and
det 1.01132J . Also det 1J . The eigen values
are
1,2 0.9961 0.1449i
and 1,2 1.0066 1 .
Hence the equilibrium (40,15.6)E is unstable.
6. CONCLUSION
The paper discusses discrete-time epidemic model
for worm propagation in computer networks with
a modified SIR model allowing fraction of the
hosts in the class R to go back in to susceptible
state. Numerical simulation are presented for the
cases (0) 1R and (0) 1R . This helps the
organization to frame their policy regarding the
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 30 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
use of Anti Virus software‘s and the frequency of
updating the data base of the Anti Virus software.
REFERENCES
[1] Bimal Kumar Mishra, Dinesh Saini,
Mathematical models on computer viruses,
Applied Mathematics and Computation, 187
(2007)929936.
[2] Essam Al Daoud, Iqbal H. Jebril and Belal
Zaqaibeh, Computer Virus Strategies and
Detection Methods, Int. J. Open Problems
Compt. Math., Vol. 1, No. 2, September
2008.
[3] Leah Edelstein-Keshet, Mathematical
Models in Biology, SIAM, Random House,
New York, 2005.
[4] Fangwei Wang, Yunkai Zhang, Jianfeng Ma,
Defending passive worms in unstructured
P2P networks based on healthy file
dissemination, Computers and Security,
28(2009), 628 - 636.
[5] Jonghyun Kim, Sridhar Radhakrishnan,
Sudarshan K.Dhall, Measurement and
analysis of worm propagation on Internet
network Topology, ICCCN 2004.
[6] J.D.Murray, Mathematical Biology I: An
Introduction, 3-e, Springer International
Edition, 2004.
[7] Onwubiko.C, Lenagham A.P and Hebbes.L,
An Improved worm mitigation model for
evaluating the spread of aggressive network
worms, EUROCON 2005.
[8] L.Perko, Differential Equations and
Dynamical Systems, 3-e, Springer - Verlag,
New York Inc, 2001.
[9] Jose R.C. Piqueira, Betyna Fernandez
Navarro and Luiz Henrique Alvez Monteiro,
Epidemic-logical Models Applied to Viruses
in Computer Networks, Journal of Computer
Science, 1 (1): 31 - 34, 2005.
[10] Vasileios Vlachos, Diomidis Spinellis, and
Stefanos Androutsellis-Theotokis, Biological
Aspects of Computer Virology, 3rd
International Conference on e-Democracy,
23-25 September 2009, Athens, Greece.
[11] Xiang Fan, Yang Xiang, Modelling the
propagation of peer-to-peer worms, Future
Generation Computer Systems, 26(2010),
1433 - 1443.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 31
IJSER © 2012
http://www.ijser.org
Sum Labeling for Arbitrary Supersubdivision of Path, Cycle and Star
J. Gerard Rozario, J. Jon Arockiaraj, P. Lawrence Rozario Raj and U. Rizwan
Abstract - A sum labeling is a mapping 𝜆 from the vertices of G into the positive integers such that, for any two vertices
u, v 𝜖 V (G) with labels 𝜆(u) and 𝜆(v), respectively, (uv) is an edge iff 𝜆(u) + 𝜆(v) is the label of another vertex in V (G).
Any graph supporting such a labeling is called a sum graph. It is necessary to add (as a disjoint union) a component to
sum label a graph. This disconnected component is a set of isolated vertices known as isolates and the labeling scheme
that requires the fewest isolates is termed optimal. The number of isolates required for a graph to support a sum labeling
is known as the sum number of the graph. In this paper, we will give optimal sum labeling scheme for some cycle related
graphs.
Index Terms - Sum Labeling, Sum number, Sum graph, isolates
—————————— ——————————
1. INTRODUCTION
LL the graphs considered here are simple,
finite and undirected. For all terminologies
and notations we follow Harary [2] and graph
labeling as in [1]. Sum labeling of graphs was
introduced by Harary [3] in 1990. Following
definitions are useful for the present study.
Definition 1.1 A Sum Labeling is a mapping 𝜆
from the vertices of G into the positive integers
such that, for any two vertices u, v 𝜖 V (G) with
labels 𝜆(u) and 𝜆(v), respectively, (uv) is an edge
iff 𝜆(u) + 𝜆(v) is the label of another vertex in V
(G). Any graph supporting such a labeling is
called a Sum Graph.
——————————————
J. Gerard Rozario is serving in the Department of Mathematics, St. Joseph’s College of Arts and Science, Cudallore, India. E-mail: [email protected]
J. Jon Arockiaraj is serving in the Department of Mathematics, St. Joseph’s College of Arts and Science, Cudallore, India. E-mail: [email protected]
P. Lawrence Rozario Raj is serving in the Department of Mathematics, St. Joseph College, Trichy, India. E-mail : [email protected]
U. Rizwan is serving in the Department of Mathematics, Islamiah College, Vaniyambadi, India. E-mail : [email protected]
efinition 1.2 It is necessary to add (as a disjoint
union) a component to sum label a graph. This
disconnected component is a set of isolated
vertices known as Isolates and the labeling
scheme that requires the fewest isolates is termed
Optimal.
Definition 1.3 The number of isolates required for
a graph G to support a sum labeling is known as
the Sum Number of the graph. It is denoted
as 𝜎 𝐺 .
Definition 1.4 Let G be a graph with q edges. A
graph H is called a Super subdivision of G if H is
obtained from G by replacing every edge ei of G
by a complete bipartite graph im2,K for some mi,
1 i q in such a way that the end vertices of
each ei are identified with the two vertices of 2-
vertices part of im2,K after removing the edge ei
from graph G. If mi is varying arbitrarily for each
edge ei then super subdivision is called arbitrary
super subdivision of G.
In this paper, we will prove that graphs obtained
by arbitrary super subdivision of path 𝑃𝑛 , cycle 𝐶𝑛
and star 𝐾1,𝑛 are optimal summable with sum
number 2.
A
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 32 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
2.OPTIMAL SUM LABELING SCHEME FOR
ARBITRARY SUPER SUBDIVISION OF
PATH, CYCLE AND STAR
Sethuraman et.al [5], introduced a new method of
construction called Supersubdivision of graph and
proved that arbitrary supersubdivision of any path
and cycle Cn are graceful. Kathiresan et.al [4],
proved that arbitrary supersubdivision of any star
is graceful.
In this section, we prove that the arbitrary super
subdivision of path 𝑃𝑛 , cycle 𝐶𝑛 and star 𝐾1,𝑛 are
optimal summable with sum number 2.
Theorem 2.1 Arbitrary supersubdivision of path
𝑃𝑛 are optimal summable with sum number 2.
Proof. Let G be a path 𝑃𝑛 with n vertices. Let vi
(1 i n) be the vertices of G. Let H be the
arbitrary supersubdivision of G which is obtained
by replacing every edge of G with 𝐾2,𝑚 𝑖.
Let 𝑚 = 𝑚𝑖𝑛−11 . Let uj be the vertices which
are used for arbitrary supersubdivision of G
where 1 j m. Let x and y be two isolated
vertices. Therefore, the vertex set of H is
V(H) = { v1, v2,……,vn,u1,u2,……,um}.
Define f : V(G) {1,2,3,…, N}
𝑓 𝑣𝑖 = 𝑖 ; 1 ≤ 𝑖 ≤ 𝑛
𝑓 𝑢1 = 𝑚 + 𝑛
𝑓 𝑢𝑗 = 𝑓 𝑢𝑗−1 − 1 ; 2 ≤ 𝑗 ≤ 𝑚
Then
𝑓 𝑥 = 𝑓 𝑢1 + 1 𝑎𝑛𝑑 𝑓 𝑦 = 𝑓 𝑢1 + 2
Thus, we are able to identify all the edges of path
with just two isolated vertices.
Hence, arbitrary supersubdivision of path 𝑃𝑛 is
optimal summable with sum number 2.
Illustration 2.1 Sum labeling for arbitrary
supersubdivision of path 𝑃5 is given in figure 2.1
Figure 2.1
Theorem: 2.2 Arbitrary super subdivision of
cycle 𝐶𝑛 is optimal summable with sum number 2.
Proof. Let G be a cycle 𝐶𝑛 with n vertices. Let vi
(1 i n) be the vertices of G. Let H be the
arbitrary super subdivision of G which is obtained
by replacing every edge of G with 𝐾2,𝑚 𝑖.
Let 𝑚 = 𝑚𝑖𝑛1 . Let uj be the vertices which are
used for arbitrary supersubdivision of G
where 1 j m. Let x and y be two isolated
vertices. Therefore, the vertex set of H is
V(H) = { v1, v2,……,vn,u1,u2,……,um}.
Define f : V(G) {1,2,3,…, N}
𝑓 𝑣𝑖 = 𝑖 ; 1 ≤ 𝑖 ≤ 𝑛
𝑓 𝑢1 = 𝑚 + 𝑛
𝑓 𝑢𝑗 = 𝑓 𝑢𝑗−1 − 1 ; 2 ≤ 𝑗 ≤ 𝑚
Then 𝑓 𝑥 = 𝑓 𝑢1 + 1 𝑎𝑛𝑑 𝑓 𝑦 = 𝑓 𝑢1 + 2 Thus, we are able to identify all the edges of path
with just two isolated vertices.
Hence, arbitrary supersubdivision of cycle 𝐶𝑛 are
optimal summable with sum number 2.
Illustration 2.2 Sum labeling for arbitrary
supersubdivision of cycle 𝐶5 is given in figure 2.2
Figure 2.2
Theorem: 2.3 Arbitrary supersubdivision of star
𝐾1,𝑛 are optimal summable with sum number 2.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 33
IJSER © 2012
http://www.ijser.org
Proof. Let G be a star 𝐾1,𝑛 with n+1 vertices. Let
vi (1 i n+1) be the vertices of G. Let H be the
arbitrary super subdivision of G which is obtained
by replacing every edge of G with 𝐾2,𝑚 𝑖.
Let 𝑚 = 𝑚𝑖𝑛−11 . Let uj be the vertices which
are used for arbitrary supersubdivision of G
where 1 j m. Let x and y be two isolated
vertices. Therefore, the vertex set of H is
V(H) = { v1, v2,……,vn+1,u1,u2,……,um}.
Define f : V(G) {1,2,3,…, N}
𝑓 𝑣𝑖 = 𝑖 ; 1 ≤ 𝑖 ≤ 𝑛 + 1
𝑓 𝑢1 = 𝑚 + 𝑛 + 1
𝑓 𝑢𝑗 = 𝑓 𝑢𝑗−1 − 1 ; 2 ≤ 𝑗 ≤ 𝑚
Let x and y be two isolated vertices. Then
𝑓 𝑥 = 𝑓 𝑢1 + 1 𝑎𝑛𝑑 𝑓 𝑦 = 𝑓 𝑢1 + 2
Hence, arbitrary supersubdivision of star 𝐾1,𝑛 are
optimal summable with sum number 2.
Figure 2.3
Illustration 2.3 Sum labeling for arbitrary
supersubdivision of star 𝐾1,5 is given in figure 2.3
REFERENCES
[1] Gallian J A, A dynamic survey of graph
labeling, The Electronics Journal of
Combinatorics, 16, (2009) DS6.
[2] Harary F, Graph theory, Addison Wesley,
Reading, Massachusetts, 1972.
[3] Harary F, Sum graphs and Difference
graphs, Congress Numerantium, no.72, 101-
108, 1990.
[4] K.M. Kathiresan, S. Amutha, ―Arbitrary
supersubdivisions of stars are graceful‖,
Indian Journal of pure and applied
Mathematics. 35(1), pp. 81-84, 2004.
[5] G. Sethuraman, P. Selvaraju, ―Gracefulness
of arbitrary supersubdivisions of graphs‖,
Indian Journal of pure and applied
Mathematics, 32(7), pp. 1059-1064, 2001.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 34 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
An Extreme Shock Maintenance Model for a Multistate Degenerative System Under a
Bivariate Replacement Policy
M. Mohamad Yunus, P. Govindaraju and U. Rizwan
Abstract - In this paper, we consider a simple repairable multistate degenerative system which is subjected to random shocks from its environment. The long-run average cost for the extreme shock maintenance model of a degenerative multistate system under a bivariate replacement policy (T, N) , where T is the working age of the system and N is the number of failures of the system, is studied. Explicit expressions for the long-run average cost is given.
Index Terms - Geometric Process, Replacement Policy, Renewal Reward Process, Shock models.
—————————— ——————————
1. INTRODUCTION
HE study of a multistate degenerative system
in a maintenance model plays an important
role in reliability. A multistate degenerative
system is subject to damage and the damage
occurs randomly in an operating stage. Most of
the maintenance models just pay attention on the
internal cause of the system failure, but do not on
an external cause of the system failure. A system
failure may be caused by some external cause,
such as a shock. The shock models have been
successfully applied to different fields, such as
physics, communication, electronic engineering
and medicine, etc. A very few authors considered
the deteriorating systems interrupted by random
shocks. Barlow and Proschen (1983) considered
an imperfect repair model, in which a repair is
perfect with probability p and a minimal repair
with probability 1– p. There were many papers
which consider extreme shock models. In their
models, the system will fail if the amount of
shock exceeds a specific threshold. In these
——————————————
U. Rizwan is serving in the Department of Mathematics, Islamiah
College, Vaniyambadi, India. E-mail: [email protected]
P. Govindaraju is serving in the Department of Mathematics, Islamiah
College, Vaniyambadi, India. E-mail : [email protected]
M. Mohamad Yunus is pursuing Ph.D. in Mathematics, Islamiah College,
Vaniyambadi, India.
models, a shock is called a deadly shock or
extreme shock. Thangaraj and Rizwan (2001)
have introduced and studied the shock model with
NONN repair times are discussed an extended
extreme shock maintenance model for a
deteriorating system and so on. Chen and
Li(2008) have introduced and studied the extreme
shock model.
The rest of the paper is organized as follows: In
section 2, we present an extreme shock model for
the maintenance problem of a multistate
repairable system. In section 3, explicit
expressions for the long-run average cost under a
bivariate replacement policy ),( NT is derived.
2. DESCRIPTION OF THE MODEL
In this section, we first give some definitions.
Next, we describe the model of a one-component
multistate system. We also evaluate the
conditional probabilities of the operating times
and failure times given the state of the system.
Definition 1 A random variable X is said to be
stochastically smaller than another random
variable Y , if )>()>( YPXP , for all real
. It is denoted by YX st . A stochastic process
1,2,=,nX n is said to be stochastically
increasing, if 1 nstn XX , for 1,2,=n .
T
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 35
IJSER © 2012
http://www.ijser.org
Definition 2 A Markov process 1,2,=,nX n
with state space 0,1,2, is said to be
stochastically monotone, if
1 1 1 2| = | = ,n n st n nX X i X X i
1 20 .for any i i
Clearly, the stochastically monotone concept for a
Markov process is defined and based on the
transition probabilities from one state to another
state, conditioning on the former state. However,
the stochastically monotone concept for a
stochastic process defined here is for a general
process and is based on the conditional
distribution of two successive random variables in
the process.
Definition 3 A stochastic process
1,2,=,nX n is a geometric process, (GP) if
there exist a constant 0>a such that
1,2,=,1 nXa n
n forms a renewal process. The
number a is called the ratio of the geometric
process.
If 1<<0 a , then the GP is stochastically
increasing; if 1>a , the GP is stochastically
decreasing and if 1=a , the GP will reduce to a
renewal process.
Definition 4 An integer valued random variable
N is said to be a stopping time for the sequence
of independent random variables ,, 21 XX , if the
event nN = is independent of ,, 21 nn XX , for
all 1,2,=n .
We shall now describe the system states. Consider
a one-component multistate system with lk
states ( k -working states and l -failure states).
The system state at time t is given by
( = 1,2, , )( ) =
( = 1,2, , )
if the systemis in the i thi
working state at time t
i kS t
if the system is in the j thk j
failure state at time t
j l
The set of working states is },{1,2,=1 k ; the
set of failure states is },2,1,{=2 lkkk
and the state space is 21= . Initially,
assume that a new system in working state 1 is
installed. Whenever the system fails, it will be
repaired. Let nt be the completion time of the n -
th repair, 0,1,=n with 0=0t and let ns be the
time of occurrence of the n -th failure, 1,2,=n
Then
.<<<<<< 110 nn tstst
We next describe the probability structure of the
model.
Assume that the transition probability from
working state kii ,1,2,=, , to failure state
ljjk ,1,2,=, , is
jnn qitSjksSP =)=)(|=)(( 1
with 1.=1= j
l
jq Moreover, the transition
probability from failure state ljjk ,1,2,=, ,
to working state kii ,1,2,=, is given by
inn pjksSitSP =)=)(|=)((
with 1.=1= i
k
ip
Let 1X be the operating time of the system after
installation. In general, let 2,3,=, nX n be the
operating time of the system after 1)( n -st repair
and 1,2,=, nYn be the repair time after n -th
failure. Assume that there exist a life-time
distribution )(tU and kiai ,1,=0,> such that
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 36 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
)(=)( 1 tUtXP (1)
and
kitaUitStXP i ,1,2,=),(=)=)(|( 12 (2)
where .1 21 kaaa
In general, for
,,1,2, ki j
).(==)(,,=)(|11
1111 taaUitSitStXPn
iinnn
(3)
Similarly, assume that there exist a life-time
distribution )(tV and libi ,1,2,=0,> such that
),(=)=)(|( 11 tbViksStYP i
(4)
where 0>1 21 lbbb and in general, for
,,1,2, li j
1 1
1
( | ( ) = , , ( ) = )
= ( )
n n n
i in
P Y t S s k i S s k i
V b b t
(5)
In particular, if '
k aaaba ===1,== 211 and '
l bbb ===2 , then the )( lk -state system
reduces to a two-state system. In this case,
equations (3) and (5) become
taUtXP n'
n
1)(=
and ,)(= tbVtYP n'
n
respectively.
Thus the sequence 1,2,=,nX n forms a GP
with ratio 1>'a , while the sequence
1,2,=,nYn forms a GP with ratio 1<<0 'b . In
this case, our model reduces to the GP model for
the one component two-state system introduced
by Lam [1988].
For two working states kii 21 <1 , we have
.=)(|=)(| 112212 itSXitSX st
Therefore, the working state 1i is better than the
working state ,2i in the sense that, the system in
state 1i has a stochastically large operating time
than 66
it does in state 2i . Consequently, the k working
states are arranged in decreasing order, such that
state 1 is the best working state and state k is the
worst working state. Similarly, for two failure
states 1ik and 2ik such that
lkikikk 21 <1 , we have
.=)(|=)(| 211111 iksSYiksSY st
Therefore, the failure state 1ik is better than the
failure state 2ik in the sense that the system in
state 1ik has a stochastically smaller repair time
than it does in state 2ik . Thus, the l failure
states are also arranged in decreasing order, such
that the state 1k is the best failure state and the
state lk is the worst failure state.
Consider a monotone process model for a
multistate one-component system described in this
section and make the following package of
assumptions, 101 AA .
A1 At the beginning, a new system is
installed. The system has )( lk
possible states, where the states
k,1,2, denote, respectively, the first-
type working state, the second-type
working state , , k -th-type working
state and the states
)(,2),(1),( lkkk denote,
respectively, the first-type failure state,
the second-type failure state and the
l -th type failure state of the system. The
occurrences of these types of failures
are stochastic and mutually exclusive.
A2 Whenever the system fails in any of the
failure states, it will be repaired. The
system will be replaced by an identical
one some times later.
A3 Once the system is operating, the
shocks from the environment arrive
according to a renewal process. Let
1,2,=, iX ni be the intervals between
the 1)( i -st and the i -th shock, after
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 37
IJSER © 2012
http://www.ijser.org
the 1)( n -st repair. Let =)( 11XE .
We assume that ,1,2,=, iX ni are iid
sequences for all n
A4 Let 1,2,=, iYni be the sequence of the
amount of shock damage produced by the
i -th shock, after the 1)( n -st repair. Let
=)( 11YE . Then }1,2,=,{ iYni are iid
sequences, for all n . If the system fails, it
is closed, so that the random shocks have
no effect on the system during the repair
time.
A5 Let 1,2,=, nZn be the repair time after
the n -th repair and 1,2,=,nZn
constitute a non decreasing geometric
process with =)( 1ZE and ratio b , such
that 1<0 b . )(tNn is the counting
process denoting the number of shocks
after the 1)( n -st repair. The distribution
of nZ is denoted by )(nG . It is clear that
.=)(1nn
bZE
A6 Let r be the reward rate per unit time of
the system when it is operating and c be
the repair cost rate per unit time of the
system and the replacement cost is .R
The replacement time is a random variable
Z with =)(ZE .
A7 If the system in working state i is
operating, then let the reward rate be r. If
the system in failure state k + i is under
repair, the repair cost is c. The
replacement cost comprisesof two parts :
one part is the basic replacement R and the
other is proportional to the replacement
time Z at rate cp. In other words, the
replacement cost is given by R + cp Z.
A8 Assume that 1 ≤ a1 ≤ a2 ≤ . . . . ≤ ak and
1≥ b1 ≥ b2 ≥ b3 ≥ . . . . ≥ bl > 0.
A9
Assume that )(tFn be the cumulative
distribution of i
n
in XL 1== and )(tGn be
the cumulative distribution of
.=1= i
n
in YM
A10 The working time nX , the repair time nY
and the replacement time Z , )1,2,=( n
are independent random variables.
3. THE POLICY ),( NT
In this section, we introduce and study a bivariate
replacement policy ),( NT for the multistate
degenerative system, under which system is
replaced at working age T or at the time of N -th
failure, whichever occurs first. The problem is to
choose an optimal replacement policy ),( NT
such that the long-run average cost per unit time is
minimized.
The working age T of the system at time t is the
cumulative life-time given by
1
1 1 1 1
<=
<
n n n n n
n n n n n
t M L M t L MT
L L M t L M
where i
n
in XL 1== and i
n
in YM 1== and
0== 00 ML .
Following Lam and Zhang (2004), the distribution
of the survival time nX in A3 and the distribution
of the repair time nY in A4 are given by
),(!!
1)!(=)( 1
11
1
1
1=
1=
taaUppjj
ntXP k
j
k
jk
j
k
j
k
ni
j
k
i
n
(6)
where Zjjj k,,, 21 and
),(!!
!=)( 1
11
1
1
=
1=
tbbVqqjj
ntYP l
j
l
jl
j
l
j
l
ni
j
l
i
n
(7)
where Zjjj l,,, 21 . If =)( 1XE , then the
mean survival time is
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 38 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
,=)(
1nna
XE
(8)
for 1,>n where
1
1=
=
i
ik
i a
pa
(9)
and if =)( 1YE , then the mean repair time is
nn
bYE
=)(
(10)
for 1>n , where
.=
1
1=
j
jl
j b
qb
(11)
Further, if
kiisShererR nin ,1,2,=,=)(w= 1
denotes the reward earned after the n -th repair,
then mean reward earned after 1)( n -st repair is
rXRE =)( 11 and for 2n then expected reward
after installation is given by
,=)(1nnn
a
rXRE
(12)
where
.=1= i
iik
i a
prr
(13)
and if liiksSherecC nin ,1,2,=,=)(w=
denotes the repair cost after the n -th failure, then
mean repair cost after n -th failure is
,=)(1nnn
b
cYCE
(14)
where
.=1= i
iil
i b
qcc
(15)
3.1 The Length of a cycle and its Mean
The length of a cycle under the bivariate
replacement policy ),( NT is
,= >
1=
1
1=1=
ZYTYXW TN
Li
i
TN
Li
N
i
i
N
i
where 1,0,1,2,= N is the number of failures
before the working age of the system exceeds T
and
( )
1 ,=
0 .A
if the event A occurs
if the event A does not occur
From Leung (2005), we have
( < ) = ( < )L T L i N
i NE P L T L
)()(= TLPTLP Ni
).()(= TFTF Ni
Lemma 3.1 The mean length of a cycle is
.)(d)(=)(1
1
1=0
TFb
uuFWE ii
N
i
N
T
(16)
Proof. Consider
1
( )
=1 =1
( > )
=1
( ) =
( )
N N
i i L TN
i i
i L TN
i
E W E X Y
E T Y E Z
uLYXEE NTN
Li
N
i
i
N
i
=|= )(
1
1=1=
)()>(
1=
)>( ZEYETE TN
Li
i
TN
L
)(d)()(d=1
1=00
uFYEuFu Ni
N
i
T
N
T
1
1=1
( ) <N
N i Nii
T F T E L T Lb
)(d)(=
0uFuTFT N
T
N
1 1
1 1=1 =1
( ) ( ) ( )N N
i N Ni ii i
F T F T F Tb b
,)(d)(=1
1
1=0
TFb
uuF ii
N
i
N
T
as desired. ■
3.2 Mean Reward and Mean Repair cost
Lemma 3.2 If TLN and 2n , then the
expected Reward earned is
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 39
IJSER © 2012
http://www.ijser.org
.)(=)(R02
2=2=
uudFa
rTLXE N
T
n
N
n
Nnn
N
n
(17)
Proof.
=2
=2
R ( )
= R ( ) |
N
n n N
n
N
n n N N
n
E X L T
E E X L T L
)(=|R=2=
0udFuLXE NNnn
N
n
T
,)(=02
2=
uudFa
rN
T
n
N
n
as desired. ■
Lemma 3.3 If TLN > and 2n then the
expected reward earned is
.)()(=)>(R2
2=2=
TFTFa
rTLXE Nnn
N
n
Nnn
N
n
(18)
Proof.
=2
=2
( > )
= ( < < )
n n N
n
N
n n n N
n
E R X L T
E R X L T L
)<<()(=2=
Nnnn
N
n
LTLEXRE
.)()(=2
2=
TFTFa
rNnn
N
n
■
Lemma 3.4 If ,TLN then the expected repair
cost is
.)(=)(C1
1
1=
1
1=
TFb
cTLYE Nn
N
n
Nnn
N
n
(19)
Proof.
1
=1
1
=1
C ( )
= C | = ( )
N
n n N
n
N
n n N N
n
E Y L T
E E Y L u L T
)(=|C=1
1=0
udFuLYE nNnn
N
n
T
)()C(=1
1=0
udFYE Nnn
N
n
T
.)(=1
1
1=
TFb
cNn
N
n
■
Lemma 3.5 If ,> TLN then the expected repair
cost is
.)()(=)>(C1
1
1=
1
1=
TFTFb
cTLYE Nnn
N
n
Nnn
n
(20)
Proof.
1
=1
1
=1
C ( > )
= C ( < < )
n n N
n
N
n n n N
n
E Y L T
E Y L T L
)<<()C(=1
1=
Nnnn
N
n
LTLEYE
.)()(=1
1
1=
TFTFb
cNnn
N
n
■
4. THE LONG-RUN AVERAGE COST
UNDER ),( NT POLICY
Let 1T be the first replacement time and let nT
2)( n be the time between 1)( n -st
replacement and n -th replacement. Then the
sequence ,1,2,=, nTn forms a renewal process.
The interarrival time between two consecutive
replacements is a renewal cycle. By the renewal
reward theorem (Ross (1996) ), the long-run
average cost per unit time under the multistate
bivariate replacement policy ),( NT is
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 40 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
( , ) =the expected cost incurredin a cycle
C T Nthe expected length of a cycle
.)(
)(
=
)>(
1=1=
)(
1=
1
1=
WE
ZEcRTYCE
RXRYCE
pTN
Ln
n
nn
n
TN
Lnn
N
n
nn
N
n
Using Lemmas 3.2 to 3.5, we obtain
1
1 2 0=1 =2
1
1 1=1
12=2
1
10=1
( ) ( )
( ) ( )
( ) ( )
( , ) = .
( )d ( )
N N T
N Nn nn n
N
p n Nnn
N
n Nnn
NT
N nnn
c rF T udF u
b a
cc R r F T F T
b
rF T F T rT
aC T N
F u u F Tb
Summarizing the above results, we have the
following.
Theorem 3.1 For the model described in Section
2, under the assumptions A1 to A10, the long-run
average cost per unit time under the bivariate
replacement policy ),( NT for a multistate
degenerative system is given by
1
1 2 0=1 =2
1 2=2
1
10=1
( ) ( )
( ) ( ) ( )
( , ) = .
( )d ( )
N N T
n Nn nn n
N
n Nnn
p
NT
N nnn
c rF T udF u
b a
rr T F T F T
a
c RC T N
F u u F Tb
The standard minimization procedure can be
adapted to determine the optimal values.
REFERENCES
[1] Barlow, R.E. and Proschan, F. (1975)
Statistical Theory of Reliability and life
testing, John Wiley, New York.
[2] Chen, J. and Li, Z. (2008) An extended
extreme shock maintenance model for a
deteriorating system, Relia.Engg and Sys
Saf., 93, 11231129.
[3] Govindaraju. P, Rizwan. U and Thangaraj,
V, (2011) An extreme shock maintenance
Model under a Bivariate Replacement
Policy, Research Methods in Mathematical
Sciences, 110.
[4] Lam, Y. (1988) Geometric Processes and
Replacement Problem, Acta. Math. Sinica,
4, 366377.
[5] Lam,Y. (1991) An Optimal Repairable
Replacement Model for Deteriorating
System, J. App. Prob., 28, 843851.
[6] Lam, Y. and Zhang, Y.L. (2004) A shock
model for the maintenance problem of a
repairable system, Computers and
Operations Research, 31, 18071820.
[7] Leung, K.N.G., (2005), A Note on a
Bivariate Optimal Replacement Policy for a
Repairable System, Engineering
Optimization, 38, 621 -625.
[8] Rizwan. U and Mohamad Yunus. M,
(2011), (2011) An extreme shock
maintenance Model for a Multistate
Degenerative System – I, Research
Methods in Mathematical Sciences, 49 – 62.
[9] Ross, S.M. (1996) Stochastic Processes,
(2nd ed), John Wiley and Sons, New York.
[10] Stadje, W. and Zuckerman, D.(1990)
Optimal strategies for some repair
replacement models, Adv. Appl. Prob., 22,
641656.
[11] Thangaraj, V. and Rizwan, U. (2000) Burn-
in with Optimal Replacement Policies for a
system subject to shocks, Proc. of the
National Conference on Optimization
Techniques in Industrial Mathematics, Ed.,
Elumalai, S, University of Madras, 207215.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 41
IJSER © 2012
http://www.ijser.org
Study of Ionic Conductivity in Li I Grafted Solid Biopolymer Electrolyte
A. Ayisha Begam, K. Prem Nazeer and Rugmini Radhakrishnan
Abstract - Solid Chitosan Acetate Electrolytic Films were prepared by Grafting the Lithium Iodide salt (0.1 – 0.5 wt %) with Chitosan in
the presence of acetic acid. These films were subjected to impedance spectroscopy and ionic conductivity studies. It was found that the
ionic conduction behaviour in the electrolyte systems depends on the concentration of the salt used. The highest room temperature
conductivity (1.05×10−4
S/cm) obtained from impedance measurement for LiI grafted chitosan electrolyte along with the dielectric and
relaxation studies supported the segmental motion of the ion. Study on transference number revealed that the highest conducting
samples were ionic conductors.
Index Terms - Chitosan acetate solid electrolyte films – Impedance analysis – Dielectric studies – Transference number
—————————— ——————————
1. INTRODUCTION
HE science of polymer electrolytes has
attracted both in academia and industry, for
the past two decades due to the potentially
promising applications of such electrolytes, not
only in all solid-state rechargeable batteries, but
also in other electrochemical devices such as
supercapacitors, electrochromic windows, and
sensors (Scrosati, 1930), Gray, 1991, 1997). The
study of polymer electrolytes was launched by
Fenton et al., in 1973, but their technological
significance was not appreciated until the research
undertaken by Armand et al., (1979) a few years
later. These authors claimed that the polymer
complexes formed from alkali metal salts were
capable of demonstrating significant ionic
conductivity, and highlighted their possible
application as battery electrolytes. This work
inspired intense research and development on the
synthesis of new polymer electrolytes, physical
studies of their structure and
——————————————
A. Ayisha Begam is serving in the Department of Physics, Avinashilingam University for Women, Coimbatore, India,
K. Prem Nazeer is serving in the Department of Physics, Islamiah
College, Vaniyambadi, India. E-mail : [email protected]
Rugmini Radhakrishnan served in the Department of Physics, Avinashilingam University for Women, Coimbatore, India
charge transport, theoretical modeling of the charge-
transport processes, the physical and chemical
properties and their relationship etc. (MacCallum and
Vincent (1987, 1989), Song et al.,(1999). This paper
deals with ionic conductivity of alkali metal doped
solid chitosan acetate electrolyte analyzed with the
help of impedance spectroscopy, ac conduction and
transference number studies.
2. EXPERIMENTAL
Chitosan-salt complexes were formed by grinding
1 g of chitosan powder (Fluka - medium
molecular weight) with different concentration (10
– 50 wt %) of LiI salts and by mixing this
compound with 50 ml of acetic acid in a 500 ml
glass beaker. This solution was stirred for about 1
hour continuously using a Teflon pellet, which
was rotated with a help of a magnetic stirrer
maintained at room temperature to form 2 % (w/v)
solution. Most of the chitosan salt complexes
dissolved to give a transparent solution
(electrolyte). Minor insoluble solids were
removed using a syringe filter with a pore size of
1micron and the required Chitosan electrolyte
solutions were collected for the preparation of
solid Chitosan electrolyte films.
Film casting technique is employed in the present
study for the preparation of solid biopolymer
electrolyte. The casting of the films was carried
T
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 42 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
out by pouring the filtered chitosan solution (5ml)
onto optically plane glass moulds (10×10 cm) and
were allowed to dry at room temperature (25 2
C) in a closed atmosphere for 3 days. The dried
films were carefully removed from the mould and
its edges were clamped onto a well cleaned
optically plane glass plate and finally dried (50C,
24 Hrs) and stored under dry condition. The film
thickness was determined using a universal
length-measuring instrument (TRIMOS,
Switzerland) to an accuracy of 0.110–6
m (the
pressure maintained in the ball contact was 2.47
Pa). Typical thicknesses of ~ 50µm were used for
all the studies. In the present work, an automated
Electrochemical Impedance Analyzer (Princeton
Applied Research potentiostat - (Model 2273) was
used to measure various parameter of the
biopolymer electrolyte. DC polarization
technique was adapted to measure transference
number with the help of home made instruments.
3. RESULTS AND DISCUSSION
3.1 Impedance Spectroscopy of Li I Grafted
Chitosan Acetate (CHA) Electrolyte:
Impedance spectroscopy is a powerful method of
characterizing many of the electrical properties of
electrolyte materials and their interfaces with
electronically conducting electrodes. Impedance
plot (plot between real and imaginary parts of
impedance) for CHA doped with various
concentration (10, 30 and 50 wt %) of LiI
biopolymer electrolytes at room temperature are
shown in Fig.1. In the Nyquist plot (Z’ vs -Z”),
one observes a typical spectrum of the ionic
conductors consisting of high frequency
semicircle and low frequency tail. The observed
semicircle in the high frequency region is due to
the bulk effect of the electrolytes, and the linear
region seen at low frequency range is attributed to
the effect of the blocking electrodes. Since the
complex impedance will be dominated by the
ionic conductance when the phase angle is close
to zero, normally, the bulk resistance is directly
obtained from the intercept of complex impedance
plot with real axis (Z0 axis).
Fig. 1 Impedance plot of CHA electrolyte
grafted with Li I at 303 K
From Fig.1, some complex impedance curves
have not touched the real axis though they are
near to the real axis. For these cases, the complex
impedance plot is extrapolated to its intersection
with the real axis and the conductivity of the
electrolyte is calculated. The point where the
semi-circle intersects the real axis (Z’) gives the
value of bulk resistance (Rb). By knowing the
value of bulk resistance (Rb) along with the
dimensions of the sample, the conductivity of the
sample has been calculated by using the relation σ
= d/RbA, where d (≈50μm) is the thickness of the
polymer electrolyte films and A (0.5cm2) the
surface area of the films. As a general trend, in
many studies for the dependence of salt
concentration on the ionic conductivity in solid
polymer electrolytes at low salt concentrations,
the conductivity increases due to build-up of
charge carriers. And at high salt concentrations,
the conductivity decreases due to build-up of
charge carriers offset by the retarding effect of ion
cloud (Anji Reddy Polu and Ranveer Kumar,
2011).
The impedance spectra of Li grafted CHA showed
the retarding effect beyond 50 wt% may be due to
preferential site for interaction as suggested in IR
studies or due to phase transformation found in
the case of UV and XRD studies (Ayisha Begam
(2012)) . Therefore, further studies on LiI grafted
CHA will certainly through more light on the
nature of the required biopolymer electrolyte.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 43
IJSER © 2012
http://www.ijser.org
3.2 Conductivity Studies on Li I Grafted
Chitosan Acetate (CHA) Electrolyte
There are various factors that influence ionic
conductivity; the number of charge carriers, ionic
mobility as well as the availability of a connecting
polar domain as the conduction pathway (Linford,
1993). In this present work, the increase in
conductivity could be attributed to the increment
of charge carriers, while the decline in
conductivity value could simply be explained by
the retarding behaviour of ions at higher
concentration that arises due to some structural
change as reported in IR, UV-Vis and XRD
studies (Ayisha Begam, 2012). The behavior of
the conductivity–metal salt variation can be
explained in terms of weak electrolyte theory. The
weak electrolyte theory states that σ = ηqμ, where
η is the number density of mobile ions which will
be in motion under the action of an electric field;
q is the electronic charge and μ is the mobility of
ionic species (Idris et al., 2009).
From the graph (Fig.2), it can be observed that
CHA grafted with LiI (50 wt %) has the highest
room temperature conductivity of 1.05 × 10−4
S/cm is more than the basic requirement for
electrolyte used for battery applications (Gray et
al. (1997)). Similar behaviour was also observed
for many polymer electrolytes (Ramya et al.,
2005), in which the high ionic conductivity is
attributed to increased ionic mobility and
increased ionic charge carrier concentration. The
temperature-dependent ionic conductivity
measurements were taken to analyze the
mechanism of ionic conduction in polymer
electrolytes. Fig.3 shows the plot of log σac versus
103/T for selected samples in the system. From
these plots, the activation energy was calculated
using the Arrhenius equation:
𝜎 = 𝜎0 𝑒𝑥𝑝 −𝐸𝑎 𝑘𝑇
where σo is the pre-exponential factor; Ea is the
activation energy; T is the absolute temperature
and k is the Boltzmann‘s constant. From the
conductivity–temperature data which obeys
Arrhenius relationship, it can be deduced that the
nature of cation transport is quite similar to that
occurring in ionic crystals, where ions jump into
Fig. 2 Ionic conductivity and Activation Energy
of CHA grafted with various amount
of LiI at 303K
Fig. 3 Temperature-dependent ionic conductivity
of CHA grafted with LiI electrolyte
neighboring vacant sites and hence increase the
ionic conductivity (Kulkarni et al., 2010). A
linear variation observed from this plot suggests
that no phase transition occurred in the polymer
matrix or domain formed by addition of LiI. The
conductivity values do not show any abrupt jump
with temperature, which indicate that, these
electrolytes exhibit amorphous nature (Samsudin
et al., 2011) as reported in the XRD analysis
(Ayisha Begam 2012). Therefore, no dynamic
conformational change in the polymer matrix and
Li ions might migrate through the conduction path
formed by the lattice structure Selvasekarapandian
et al., 2005) of the chitosan chains. The increase
in conductivity with temperature in solid polymer
electrolyte is attributed to segmental motion
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 44 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
which facilitates faster ionic movement (Khiar
and Arof, 2011).
The activation energy, Ea
(combination of the
energy of defect formation and the energy for
migration of ion) calculated by linear fit from the
Fig. 3. The Ea
was assumed to be the energy
required to move the ion, presupposing that the
structure remain unchanged, plus the energy
required to deform the structure enough to allow
the ion to pass. It is observed from the Fig. 2 that
the activation energy decreases gradually with the
salt concentration up to 30 wt% and beyond that a
fast fall is observed. The decrease in activation
energy is due to the density of ions in the polymer
electrolyte increase with increasing of LiI
concentration; hence, the energy barrier to the ion
transport decreases, which would lead to a
decrease in the activation energy (Idris et al.,
2009). Rice and Roth hypothesized that energy
gap exists in the ionic conductor, in which the ion
conducting species can be thermally excited from
localized ionic states to free ion-like states. Since
the ion transfer is greatly affected by the polymer
segmental motion (Samsudin et al., 2011), which
is very active beyond the concentration of 30
wt%, lowers the value of Ea imply rapid ionic
conduction and then increase in mobility of ions
also the ionic conductivity.
3.3 Dielectric Relaxation and Transference Number
of LiI Grafted CHA Electrolyte
The strength and frequency of relaxation depend
on characteristic property of dipolar relaxation
(Pradhan et al., 2008). The study of dielectric loss
will throw more information on relaxation
process. Fig.4. depicts the frequency dependence
of loss tangent for selected samples at ambient
temperature. For maximum dielectric loss (tan
δmax) at a particular frequency, the absorption peak
is described by: τω =1. Here τ is the relaxation
time, ω is the angular velocity with ω=2πf, f is the
frequency value corresponding to maximum tan δ
in Hz. Relaxation time occurs as a result of ionic
charge carriers within the sample to obey the
change in the direction of the applied field. It is
observed from Fig. 5, that the peak frequency
shifted towards higher frequency as the salt
concentration increases. The shift of the peak
towards higher frequency suggests quicker
relaxation time.
As discussed earlier, the increase in ionic
conductivity is due to the enhancement of the
number of carrier ions. On addition of LiI, it is
believed that there is an increase in the amorphous
content in the materials, which in turn speed up
the segmental motion by increasing the available
free volume. It is evidenced by the peak shifting
towards higher frequency side, thereby reducing
the relaxation time. Thus, the relatively fast
segmental motion coupled with mobile ions
enhances the transport properties of the sample
which explains the decrease in relaxation time
with concentration as depicted in Fig. 4 (Khiar
and Arof, 2011).
The transference number is defined as the ratio of
the conductivity of a species to the final
conductivity of the sample (Osman et al., 2001).
Since conductivity could be attributed to ions and
electrons, the ion transference number was
analyzed according to the following equation:
𝑡𝑖𝑜𝑛 + 𝑡𝑒 = 1
where tion and te represent the ionic and electronic
transference number. When a voltage V = 2V,
is applied to the cell below the decomposition
potential of the electrolyte, ionic migration will
occur until steady state is achieved. At the steady
state, the cell is polarized and any residual current
flows because of electron migration across the
electrolyte and interfaces. This is because the
ionic currents through an ion-blocking electrode
fall rapidly with time if the electrolyte is
primarily ionic. The plot of polarized current
versus time is shown in Fig. 6. The initial total
current decreases with time due to the depletion of
the ionic species in the electrolyte and becomes
constant in the fully depleted situation.
The ratio of saturation current to initial current
that gives the lithium transference number 0.22.
Thus the ionic transference number 𝑡+ =𝐼𝑐𝑎𝑡𝑖𝑜𝑛
𝐼0
obtained is 0.78 indicating the sample to be an
ionic conductor. Reports on lithium transference
number ranges from 0.1 to 0.5 (Yahya and Arof,
2002, Khiar and Arof, 2011).
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 45
IJSER © 2012
http://www.ijser.org
Fig. 4. Dependence of tan δ with frequency
for selected samples
Fig. 5 Variation of relaxation time as a
function of salt concentration
Fig. 6 The transference number polarization curve
for the highest conducting LiI grafted
CHA electrolyte
These values show that the polymers grafted
/doped with lithium salts are ionic conductors and
the main conducting species is the anions. Fig. 6
presents the temporal change in polarization
current, which has been normalized for
convenience. Comparing the reported results, LiI
grafted CHA samples are eligible for ionic battery
applications as a suitable biopolymer electrolyte
complex. Since the transference measurements
were attempted manually, there may be some
error (±5%) in the measurement that results in
little lower value (0.78) than the theoretical value.
4. CONCLUSION
The highest room temperature conductivity (1.05
× 10−4
S/cm) was obtained from impedance
measurement. A linear variation in activation
energy suggests that there was no phase transition
in the polymer matrix and it supported the
thermally activated segmental motion of ions.
Dielectric and relaxation studies further support
the segmental motion coupled with ion enhanced
transport property of the samples. Study on
transference number revealed that the highest
conducting samples were ionic conductors.
Further work on the fabrication of biopolymer
battery will open a new avenue in the field of
green and biodegradable electronics.
ACKNOWLEDGEMENTS
The authors would like to thank the authorities of
Avinashilingam University for Women,
Coimbatore and Islamiah College, Vaniyambadi
for their support to carry out this work.
REFERENCES
[1] Ayisha Begam A (2012), ‗Synthesis,
Characterization and Application of
Chitosan and its Composite Films‘,
(Doctoral Thesis), Avinashilingam
University for Women, India.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 46 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
[2] Anji Reddy Polu and Ranveer Kumar
(2011), ‗AC impedance and dielectric
spectroscopic studies of Mg2+ ion
conducting PVA–PEG blended polymer
electrolytes,‘ Bull. Mater. Sci., 34, 5, 1063–
1067.
[3] Armand, M.B; Chabagno, J.M and Duclot,
M (1979), in: Vashista, P; Mundy, J.N and
Shenoy, G.K (Eds), ‗Fast Ion Transport in
Solids‘, Elsevier, Amsterdam.
[4] Gray, F.M (1991), ‗Solid Polymer
Electrolytes—Fundamentals and
Technological Applications‘, VCH, New
York.
[5] Gray, F.M (1997), ‗Polymer Electrolytes‘,
RSC Materials Monographs, The Royal
Society of Chemistry, Cambridge, London.
[6] Idris, N.K; Nik Aziz, N.A; Zambri, M.S.M;
Zakaria, N.A and Isa, M.I.N (2009), ‗Ionic
conductivity studies of chitosan-based
polymer electrolytes doped with adipic acid,
Ionics, 15, 643-646.
[7] MacCallum, J.R and Vincent, C.A (1987),
‗Polymer Electrolyte Reviews-1‘, Elsevier,
London.
[8] MacCallum, J.R and Vincent, C.A (1989),
‗Polymer Electrolyte Reviews-2‘, Elsevier,
London.
[9] Scrosati, B (1930), ‗Applications of
Electroactive Polymers‘, Chapman and Hall,
London.
[10] Song, J.Y; Wang, Y.Y and Wan, C.C
(1999), Review of gel type polymer
electrolyte for lithum ion batteries, J. Power
Sources, 77, 183 -197.
[11] Ramya, C.S; Selvasekarapanidan, S;
Savitha, T and Hirankumar, G (2005),
‗Transport mechanism of Cu-ion conducting
PVA based solid polymer electrolyte‘,
Ionics, 11, 5-6, 436-441.
[12] Linford, R.G (1993), ‗Electrical and
electrochemical properties of ion conducting
polymers in Applications of Electroactive
Polymers‘, B. Scrosati (Ed.), Chapman and
Hall, London.
[13] Khiar, A.S.A and Arof, A.K (2011),
‗Electrical Properties of Starch/Chitosan-
NH4NO3 Polymer Electrolyte‘, World
Academy of Science, Engineering and
Technology, 59, 23-27.
[14] Kulkarni, A.R; Balaji, R and Srinivasa, R.S,
(2010), ‗Structural Investigation of
Polyurethane Based Gel Polymer
Electrolytes Using Small Angle X-ray
Scattering (SAXS)‘ Proc. 3rd Int. Conf.
Physics of Solid State Ionics (ICPSSI-3), J.
Phys. Soc. Jpn, 79, Suppl. A, 154-159.
[15] Pradhan, D.K; Choudhary, R.N.P and
Samantaray, B.K (2008), ‗Studies of
Dielectric Relaxation and AC Conductivity
Behavior of Plasticized Polymer
Nanocomposite Electrolytes‘, Int. J.
Electrochem. Sci., 3, 597-608.
[16] Samsudin, A.S; Kuan, E.C.H and Isa, M.I.N
(2011), ‗Methyl Cellulose – Glycolic Acid
System: Study on the Potential as Proton
Conducting Bio-Polymer Electrolytes‘,
Proc. Conf. Empowering Science,
Technology and Innovation Towards a
Better Tomorrow-UMTAS-2011, 375-379.
[17] Selvasekarapandian, S; Hirankumar, G;
Kuwata, N; Kawamura, J and Hattori, T
(2005), ‗1H Solid State NMR studies on the
Proton conducting polymer electrolytes‘,
Materials Letters, 59, 22, 2741-2745.
[18] Osman, Z; Ibrahim, Z.A and Arof, A.K
(2001), ‗Conductivity enhancement due to
ion dissociation in plasticised chitosan based
polymer electrolytes‘, Carbohydrate
Polymer, 44, 167-173.
[19] Yahya, M.Z.A and Arof, A.K
(2002),‘Studies on lithium acetate doped
chitosan conducting polymer system‘,
European Polymer Journal, 38, 1191–1197.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 47
IJSER © 2012
http://www.ijser.org
Neighborhood Critical Edges of an M -strong Guzzy Graph
S. Ismail Mohideen and A. Mohamed Ismayil
Abstract - A set VS is a neighborhood set of G if = [ ]u V
G N u
and is denoted by setn . The neighborhood
number of G is the minimum scalar cardinality taken over all n-set and is denoted by 0n . 0n -set is a neighborhood set of G
with minimum scalar cardinality. In this paper, we investigate the properties of critical edges. That is whether the end vertices of critical edges are fixed, free and totally free.
Index Terms – Fuzzy Sets, Fuzzy Graph.
—————————— ——————————
1. INTROCUCTION
HE notion of fuzzy graph and several fuzzy
analogs of graph theoretical concepts such as
path, cycle and connectedness are introduced by
Rosenfeld in the year 1975[5]. Mordeson and
Peng introduced the concept of fuzzy line graph
and developed its basic properties in the year
1993[4]. The neighborhood numbers )( 0n of
various known fuzzy graphs are introduced by S.
Ismail Mohideen and A. Mohamed Ismayil in the
year 2010[3]. Neighborhood critical vertex in
crisp graph is introduced by E. Sambathkumar and
Prabha S. Neeralagi in the year 1992[6]. In this
paper, Neighborhood critical edges of an M -
strong fuzzy graph are discussed. Theorems
related to these critcal edges are stated and
proved. In a fuzzy graph G, the neighborhood
number may increase or decrease or remain
unaltered, if a vertex or an edge is removed from
G. Some results based on neighborhood critical
vertices are given in section 3.
———————————
S. Ismail Mohideen is serving in the Department of Mathematics, Jamal
Mohamed College, Tiruchirappalli, India. E-mail:
A. Mohamed Ismayil is serving in the Department of Mathematics, Jamal
Mohamed College, Tiruchirappalli, India. E-mail:
2. PRELIMINARIES
Definition 2.1 Let V be a finite non empty set and
E be the collection of two element subsets of V .
A fuzzy graph ),(= G is a set with two
functions [0,1]: V and [0,1]: E such
that )()(),( vuvu for all ., Vvu
Definition 2.2 Let ),(= G be a fuzzy graph on
V and VS . Then the scalar cardinality of S is
defined by )(uSu
. The order )( p and size
)(q of a fuzzy graph ),(= G are the scalar
cardinality of V and E respectively.
Definition 2.3 A fuzzy graph ),(= 111 G is
called the fuzzy sub graph induced by 1V if
)()(1 uu for all 1Vu and
),()()(),( 111 vuvuvu for all 1, Vvu
and is denoted by 1V . A fuzzy graph
),(= 111 G is called the full fuzzy sub graph
induced by 1V if )(=)(1 uu for all 1Vu and
),()()(=),( 111 vuvuvu for all 1, Vvu
and is denoted by 1V .
Definition 2.4 A vertex u of a fuzzy graph
),(= G is said to be isolated vertex if
)()(<),( vuvu for all uVv \ . An edge
T
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 48 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
),(= vue of a fuzzy graph is called an effective
edge if )()(=),( vuvu . Here the vertex u
is adjacent to v and the edge e is incident to u
and v . A fuzzy graph ),(= G is said to be M -
strong fuzzy graph [1] if )()(=),( vuvu for
all Evu ),( .
Definition 2.5 Let Vvu , and ),(= vue then
)}()(=),(:{=)( vuvuVvuN is called
open neighborhood of u and uuNuN )(=][ is
called closed neighborhood of u .
Definition 2.6 Let ),(= G be a fuzzy graph on
V and let Vvu , . If )()(=),( vuvu then
u dominates v (or v is dominated by u ) in G .
A subset D of V is called a dominating set in G
if for every DVv then there exist Du such
that u dominates v .The minimum fuzzy
cardinality of a dominating set of G is called the
domination number of G and is denoted by )(G
or .
Definition 2.7 Let ),(= G be an M -strong
fuzzy graph. A set VS is a neighborhood set of
G if ][= uNG Su and is denoted by setn .
The neighborhood number of G is the minimium
scalar cardinality taken over all n-set and is
denoted by 0n . 0n -set is a neighborhood set of G
with minimium scalar cardinality.
In a fuzzy graph G, the beighborhood number may
increase or decrcease or remain unaltered if a
vertex is removed from G.
3. NEIGHBORHOOD CRITICAL VERTICES
Definition 3.1 A vertex v of G is
(i) critical if )()( GvG
(ii) critical if )(>)( GvG
(iii) critical if )(<)( GvG
(iv) fixed if v belongs to every -set
(v) free if v belongs to some -set but
not all
(vi) etotallyfre if v does not belong any
-set.
Here the parameter is used as a common
symbol for neighborhood number 0n and
domination number .
Definition 3.2 The set of all critical
( critical , critical , fixed , free ,
totallyfree ) vertices are called setc (
c ,
c , fx ,
fr , settf ).
Example 3.1 Consider the fuzzy graph given in
figure 3.1.
0.5 0.2 0.4 0.4 0.6 0.5 0.7 0.3
. ——— . ——– . ——— . . ——– . ——– . .
1 2 3 4 5 6 7 8v v v v v v v v
Figure: 3.1
Let the set be 8642 ,,, vvvv .
(i) 86421 ,,,, vvvvv is c -set
(ii) 62 ,vv is
c -set
(iii) 841 ,, vvv is
c -set
(iv) 862 ,, vvv is fx -set
(v) 43,vv is fr -set
(vi) 751 ,, vvv is tf -set.
Observation 3.1
1. If the vertex v is isolate then
)(<)( GvG , that is fxv -set.
2. The union of fx-set, fr
-set and tf -set is
V, that is
psetsetset tffrfx = ,
where p is an order of G .
3. Every vertex of -set is .critical
Coverse is not true, for example, In figure
3.1, 1v is critical but not in -set.
Theorem 3.1 Every critical vertex of G is
fixed .
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 49
IJSER © 2012
http://www.ijser.org
Remark 3.1 Converse of the Theorem given in
sec.1.5 need not be true. For example, In figure
3.1, 8v is fixed but not critical .
Theorem 3.2 Let G be a fuzzy graph, if -set is
unique in G , then every vertex of V is either in
fx -set or tf -set. In this case, the union of
fx -
set and tf -set is V. That is
psetset tffx = .
Remark 3.2 If -set is unique, then
1. fr -set is empty.
2. Intersection of fx -set and
tf -set is
empty.
Theorem 3.3 Every vertex of V not in setc is
either in fr -set and
tf -set.
Theorem 3.4
1. A vertex v is critical if and only if
)()( uNuN vDu for some -set D
containing v .
2. v is criticaln
0 if and only if )(vN is a
full induced fuzzy subgraph of
)(uNvDu for some 0n -set D
containing v .
4. NEIGHBORHOOD CRITICAL EDGES
In this section, we intestigate critical edges
and investigate whether the end vertices of critical
edges are fixed, free and totally free edges.
Definition 4.1 An edge e of G is
(i) critical if )()( GeG
(ii) critical if )(>)( GeG
(iii) critical if )(<)( GeG
Observation 4.1
1. If an edge e in G is critical , then
)(>)( GeG . Thus a critical edge is
always critical .
2. An criticaln 0 edge e is either criticaln
0
or criticaln
0. For example, removal of any
one edge of an odd fuzzy cycle of length 5
is criticaln
0, but the edge e in the figure
1.1 is criticaln
0.
Theorem 4.1 An edge e in G is critical if
and only if there is no dominating set of eG
with scalar cardinality )(G .
Proof. If e is ,critical then ( ) > ( ).G e G
Suppose there exists a dominating set of eG
with scalar cardinality )(G . Then
)(=)( GeG , which is a contradiction.
conversely, suppose there is no dominating set of
eG with scalar cardinality )(G . Then
)()( GeG and e is critical .
Theorem 4.2 An edge e in G is criticaln
0(
criticaln
0) if and only if there does not exists
an 0n -set of G ( eG ) with scalar cardinality
)(0 Gn ( )(0 eGn ).
Proof. The proof is on similar lines to that of
theorem 4.1 and is omitted.
Corrolory 4.1 Let ),(= vue be critical . Then
any -set D of G contains exactly one of the
end verex of e .
Proof. Let D be a -set of G and let
Gvue ),(= . If D contains both u and v or
none of u and v , then D is a dominating set of
eG with scalar cardinality )(G and hence e is
not critical which is a contradiction by the
theorem 4.1.
Corrolory 4.2 Let ),(= vue be criticaln
0 .
Then any 0n -set D of G contains exactly one of
the end verex of e .
Proof. Let D be a 0n -set of G and let
Gvue ),(= . If D contains both u and v or
none of u and v , then D is an 0n -set of eG
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 50 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
with scalar cardinality )(0 Gn and hence e is not
criticaln
0 which is a contradiction by the
theorem 4.2.
Observation 4.2 If an edge ),(= vue is
critical , then either
1. u and v are fixed or
2. u is fixed and v is totallyfree or
3. both u and v are free .
5. RELATIONSHIP BETWEEN 0n CRITICAL
AND 0 CRITICAL EDGES
For an critical0 edge e in a fuzzy graph
without isolated vertices, )()( 00 GeG .
Observation 5.1 If G has no fuzzy triagles, then
)(=)( 00 GGn . If r is the scalar cardinality of
the isolated vertices of )( eG , then
reGeGn )(=)( 00
Theorem 5.1 Let e be an edge in an M -strong
fuzzy graph G without any fuzzy triangle. Then
1. e is criticaln
0 if and only if e is
critical0 and e is not a pendent edge.
2. e is criticaln
0 if and only if e is a pendent
edge and if e does not form a component by
itself, then e is not an 0 .critical
Proof.
1. If e is criticaln
0 and G has no fuzzy
triagles, then
0 0
0
0
0
( ) = ( )
< ( )
= ( )
< ( )
G e r n G e
n G
G
G e
Therefore, if = 0r , then e is not a pendent
edge and if 0r , then e is critical0 .
Conversely, if e is critical0 and e is not
pendent edge, then )(<)( 00 GeG and
= 0r then by obsevation 5.1,
)(=)(<)(=)( 0000 GnGeGeGn .
Hence e is criticaln
0.
2. If e is criticaln
0, then
iGneGn )(=)( 00 (for some i)
iG )(= 0 .
by obsevation 5.1. reGG i )(=)( 00 .
(i) If ir = , then )(=)( 00 GeG (or)
(ii) suppose, If e is a component of G , then
ir > . Hence )(>)( 00 eGG .
Conversely, suppose e is a pendent edge such tha
if e does not form a component by itself, then e is
not criticaln 0 . Then either (i) or (ii) holds. If (i)
holds, it follows from the obsevation given in sec.
3.1 that )(>)( 00 GneGn and if (ii) holds, then
trivially e is criticaln
0.
REFERENCES
[1] K.R. Bhutani and A. Battou, On M-strong
fuzzy graphs, Information Sciences 155,
pp.103-109 (2003).
[2] George J.Klir and Bo Yuan, Fuzzy sets and
Fuzzy logic-Theory and Application, Prentice
Hall of India, 2005
[3] S. Ismail Mohideen and A. Mohamed Ismayil,
The vertex neighborhood number of a fuzzy
graph, Int. Jour. Mathematics Research, vol.2,
Number 3, pp. 71-76(2010).
[4] J.N. Mordeson, C.S. Peng, Operations on
fuzzy graphs, Information Sciences 79, 159-
170 (1994).
[5] A. Rosenfeld, Fuzzy graphs, in: L.A. Zedeh,
K.S. Fu, K. Tanaka, M. Shimura (Eds.), Fuzzy
sets and Their Applications to Cognitive and
Decision Processes, Academic Press,
NewYork, 1975, pp 77-95.
[6] Sampathkumar, E and Prabha S. Neeralagi,
Domination and neighborhood critical, fixed,
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 51
IJSER © 2012
http://www.ijser.org
free and totally free points, Indian J. of
Statistics, Special Vol.54,pp. 403-407(1992)
[7] Zimmermann,H.J, Fuzzy Set Theory and its
Application, Springer International Edition,
Fourth Edition(2001).
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 52 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
On Pricing an Exotic Option in a Jump-Diffusion with a Switching Type Volatility
M. Reni Sagaya Raj, P. Manoharan and A. George Maria Selvam
Abstract - In Jump Diffusion models, the frequency of jumps is finite. They are the prototypes for a large class of more complex
models such as the stochastic volatility with jumps. In this paper, we consider the time horizon T (strike time) of a call option and
K (strike price) of the asset. The call option which is called a cliquet option, have its terminal claim given by
( , ) = max ( ),( ),0C T T KC
C T T S K S
where the date CT is called cliquet date. The results obtained can be applied to other areas like Number Theory, Stochastic
Processes and Probabilistic Models.
Index Terms – Jump diffusion, exotic option.
—————————— ——————————
1. INTRODUCTION
ESIDES the standard vanilla options, exotic
options such as barrier options, look back
options, floating-strike options and cliquet options
have become very popular financial trading
instruments. Unlike the vanilla options, the pay -
off functions of the exotic options are path-
dependent and hence the problem of obtaining
closed form solutions for each options are very
much complicated. Several studies have been
made in the last few decades in obtaining pricing
formulas for the exotic options.
However, not much work has been done for
pricing exotic options in stochastic volatility
models. Accordingly, we present the problem
of pricing a cliquet option when the underlying
asset price satisfies a jump-diffusion equation and
the volatility changes according to the occurrence
of the jumps in the asset price.
——————————————
M. Reni Sagayaraj is serving in the Department of Mathematics, Sacred
HeartCollege, Tirupattur, India. E-mail: [email protected]
P. Maoharan is serving in the Department of Mathematics, Sacred
HeartCollege, Tirupattur, India.
A. George Maria Selvam is serving in the Department of Mathematics,
Sacred HeartCollege, Tirupattur, India.
2. FINANCIAL MARKET MODEL
Let T be a positive constant representing the time
horizon and let the market consist of a risk-free
asset (bond) and a risky asset (stock). At time t ,
let the price of the bond be tB and that of the
stock be tS . We assume that 1=0B and AS =0 .
Let tB satisfy the equation
tt rBdB = (1)
where r is a positive constant representing the
risk-free interest rate of the bond price. Then rt
t eB = . We assume that the price tS of the risky
asset satisfies the stochastic jump-diffusion
differential equation
1
2
, 0 ,=
, ,
t t ct
t t ct
dt dW dN t TdS
dt dW dN tS
(2)
where we have assumed
21,, and are positive constants;
tW is a standard Brownian motion on a
probability space ),,( WWW PF ;
tN is a Poisson process on a probability
space ),,( NNN PF ;
cT is random variable independent of tW
and tN; tW
and tN are independent of
each other.
B
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 53
IJSER © 2012
http://www.ijser.org
Let the Poisson process tN be of constant
intensity and the probability density function of
cT be )(uf . Let Tt
W tF 0 be the natural
filtration generated by tW and Tt
NtF 0 be that
generated by tN . Let ),,( PF be the product
space formed by ),,( WWW PF and
),,( NNN PF . Let Tt
tF 0 be the filtration
generated by the direct product of Tt
W tF 0 and
Tt
NtF 0 . Then the asset process TttS0
is
defined on ),,( PF . The equation (1) can be
written as
,<,0= TtdNdWdtS
dSttt
t
t (3)
where c
Ttc
Ttt II 201= with AI denoting
the indicator function of the set A defined by
1( ) =
0A
if x AI x
otherwise
3. AN EQUIVALENT MARTINGALE
MEASURE AND THE STICK PRICE
We now proceed to solve the equation (3) for the
asset price tS and obtain an equivalent martingale
measure Q under which the discounted asset price
becomes a martingale. For this, we let
tNM tt = Then the equation (3) becomes
,<,0)(= TtdMdWdtS
dSttt
t
t (4)
Define the discounted price of the asset
t
rt
t
tt Se
B
SS ==~
Then the equation (4) becomes
,<,0)(=~
~
TtdMdWdtrS
Sdttt
t
t (5)
although tW and tM are P martingale in the
above equation (5), the process tS~
is not a P
martingale. We now seek a probability measure
Q such that tS~
is a Q martingale. First, for each
pair of constants and with 0 , we define
a process tL defined by
ttt NWtL log2
1)(1exp= 2
(6)
Then, we have
1 2 1 2(1 )( ) 2 2
(1 ) log
=0
(1 )
=0
(1 ) (1 )
[ ] = [(log ) ]
( )
!
( )
!
1
t tP
t t
nt n t
n
nt t
n
t t
E L e e E N
te e e
n
te e
n
e e
For each tFA , we define a set function Q such
that
)(=)( dPLAQ t
A
Then Q is a probability measure equivalent to P
such that the Radon-Nikodym derivative tLdP
dQ=
We define
.=,= )()( tNMtWW t
Q
tt
Q
t
Then, with respect to the measure Q , we note that
( ) ( )
( )
( )
( ) 2
1 2( ) 2
[ ]
[ ]
[{ } ]
1[( )exp[{ (1 ) }
2
(log ) ]]
[( ) ]
Q Q
t
Q
t
P
t t
P
t
t t
tP W
t
E W
E W t
E W t L
E W t t
W N
E W t e e
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 54 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
0.=][ )()( Q
t
Q WE (7)
Similarly, we note that ( ) ( )
( )
( )
( ) 2
( ) (1 )
[ ]
[ ]
[( ) ]
1[( )exp[{ (1 ) }
2
(log ) ]]
[( ) ]
Q Q
t
Q
t
P
t t
P
t
t t
NP t tt
E M
E N t
E N t L
E N t t
W N
E N t e
0==][ )()( ttME Q
t
Q (8)
Further the process Q
tW is a standard Brownian
Motion with respect to the measure Q . The
equations (5) becomes
( )
( )
( )
( )
( ) { }=
{ }
( )=
Q
t t
Qt t
Q
t t t
Q
t
r dt d W tdS
S d M t t
r dt dW
dM
(9)
We eliminate the presence of in (9) by
choosing and such that
0= tr (10)
Then from the equation (10), we obtain
t
r
)(=
(11)
Then the equation (9) yields
)()(=~
~Q
t
Q
tt
t
t dMdWS
Sd (12)
The equation (12) clearly establishes the fact that
tS~
is a Q martingale. We solve the equation
(12) by putting tt SX~
log= and noting the fact that
( )
2( )
( )
( )
= ( ),
= ,
= ,
= , = 2,3,...
Q
t
Q
t
Q
t t
nQ
t t
dw o dt
dw dt
dM dN dt
dM dN n
We obtain the equation (12) that
2 3
( ) ( ) 2
3 4
= log 1
1 1= ...
2 3
1
2=
1 1...
3 4
tt
t
t t t
t t t
Q Q
t t t t
t t
dSdX
S
dS dS dS
S S S
dW dM dt
dN dN
t
Q
tttt dNdWdtdX )(1log2
1= )(2
(13)
When cTt 0 , we have from the equation (13),
t
Q
tt NWtXX )(1log2
1= )(
1
2
10
That is, we have
2
0 1
( )
1
1log = log
2
log(1 )
t
Q
t t
S S t
W N
(14)
Similarly, when TtTc , we have from the
equation (13),
2
2
( ) ( )
2
1log = log ( )
2
log(1 ) ( )
t T Cc
Q Q
t TC
t TC
S S t T
W W
N N
(15)
Using (14) and (15), we can solve the problem of
pricing a cliquet option.
REFERENCES
[1] Chesney, M. and Jeanblanc, M. (2004):
Pricing American currency options in an
exponential Levy model, Applied
Mathematical Finance, 11, 207 - 225.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 55
IJSER © 2012
http://www.ijser.org
[2] Cont, R., and Tankov, P.(2004): Financial
modeling with jump processes, Chapman and
Hall, CRC.
[3] Cox, J.C., and Ross, S.A. (1976): Them
valuation of options for alternative stochastic
processes, Journal of Financial Economics, 3,
145 - 166.
[4] Devydov, D. and Linetsky, V.(2001): Pricing
and hedging path - dependent options under
the CEV process, Management Science, 47,
949 - 965.
[5] Duffle, D.(2000): Dynamic Asset Pricing
Theory, 3rd Edition, Princeton University
Press.
[6] Etheridge, A. (2002): A course in Financial
Calculus, Cambridge University Press.
[7] Geman, H. and Yor, M. (1996): Pricing and
Hedging double - barrier options: A
probabilistic approach, Math. Fin., 6, 365 -
378.
[8] Gukhal, C.R. (2001): Analytical valuation of
American options on jump - diffusion
processes, Mathematical Finance, 11, 97 -
115.
[9] Haifeng, Y., Jianqi, Y. and L. Limin (2005):
Pricing cliquet Options in Jump - Diffusion
Models, Stochastic Models, 21, 875 - 884.
[10] Heston, S.L.(1992): A closed form solution
for options with stochastic volatility with
applications to bond and curency options,
Rev. Financial Studies, 6, 333 - 343.
[11] Kallianpur, G. and R.L. Karandikar (2000):
Introduction to Option Pricing Theory
Birkhauser.
[12] Karatzas, I. (1998): On Pricing of American
Options, Appl. Math. Optim., 17, 37 - 60.
[13] Kou, S.G. (2002): A Jump - Diffusion Model
for Option Pricing, Management Science,
48, 1086 - 1101.
[14] Mercurio, F., and Runggaldier, W.J. (1993):
Option pricing for jump - diffusions:
approximations and their interpretation,
Mathematical Finance, 3, 191 - 200.
[15] Myneni, R. (1992): The pricing of American
Option, Ann. Appl. Probob., 2, 1 - 23.
[16] Schoutens, W. (2006): Exotic options under
Levy models: An overview, Journal of
Computational and Applied Mathematics,
189, 526 - 538.
[17] Sharpe, W.F. (1964): Capital Asset Prices:
A theory of market equilibrium under
conditions of risk, J. Financial Studies, 4,
425 - 442.
[18] Smith, C.W. JR. (1976): Option Pricing: A
Review, J. Financial Studies, 3, 3 - 51.
[19] Stein, E.M., and Stein, C.J. (1991): Stock
price distributions with stochastic volatility:
an analytic approach, Rev. Financial
Studies, 4, 727 - 752.
[20] Wiggins, J.B. (1987): Options values under
stochastic volatility: Theory and empirical
estimates, J. Financial Economics, 19, 351 -
372.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 56 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
Some Properties of a Cumulative Damage Threshold Crossing Model with Underlying Birth
Process
U. Rizwan and S. Kasthuri
Abstract - In this paper, we describe the cumulative damage random threshold crossing model with underlying birth process and
give the reliability of the system under this model. We present some stochastic properties of the survival function for this model. It
is shown that some partial orderings, namely the stochastic ordering and the failure rate ordering are preserved among the two
systems under consideration. Finally, some open problems related to the presentation of other ageing properties, for our model
are given.
Index Terms – IFR, NBU, PF2, Stochastic Ordering, Failure Rate Ordering, Pure Birth Process.
—————————— ——————————
1. INTRODUCTION
ONSIDER a system subject to shocks
occurring randomly in time. Each shock
deteriorates the system and the damage
accumulates. The system fails when the total
accumulated damage exceeds a certain threshold
𝑎. Suppose 𝜉𝑖(≥ 0) is the amount of damage
caused by the ith
shock and 𝑁(𝑡) ; 𝑡 ≥ 0 is the
number of shocks the system is subject to in the
time interval 0, 𝑡 . Here 𝜉𝑖 and 𝑁 are
independent. Then the probability 𝐻 (𝑡) that the
system will survive beyond time t is
𝐻 (𝑡) = 𝑃(𝑁(𝑡) = 𝑘)𝑃 (𝑘)∞𝑘=0 , 𝑡 ≥ 0, (1.1)
where 𝑃 (𝑘) = 𝑃(𝜉1 + 𝜉2 + ⋯ + 𝜉𝑘 ≤ 𝑎). Shock
models of this kind have been studied by a
number of authors, in which the number of shocks
are governed by a Poisson process. But the
magnitudes of the damages were not assumed to
grow along with time. Ebrahimi [1999] has
assumed that the magnitudes of the shocks vary
with time.
——————————————
U. Rizwan is serving in the Department of Mathematics, Islamiah College, Vaniyambadi, India. E-mail: [email protected]
S. Kasthuri is pursuing Ph.D. degree in Mathematics, Islamiah College, Vaniyambadi, India and is serving in the Department of Mathematics, Auxillium College, Vellore, India. E-mail: [email protected]
In this paper, we study the cumulative damage
random threshold crossing model in which shocks
occur according to a nonstationary pure birth
process of the following sort : (A-Hameed
[1975]) shocks occur according to a Markov
process; given that k shocks have occurred in
0, 𝑡 , the probability of a shock occurring in
(𝑡, 𝑡 + ∆] is 𝜆𝑘𝜆(𝑡)∆ + 𝜊(∆), while the
probability of more than one shock occurring in
(𝑡, 𝑡 + ∆] is 𝜊 ∆ . Further the damages vary with
time which is different from the existing models.
This is referred to as Pure Birth Shock Model.
Remark 1. In the stationary pure birth process,
given that 𝑘 shocks have occurred in 0, 𝛬 𝑡 , the
probability of a shock occurring in 𝛬 𝑡 , 𝛬 𝑡 +𝜆(𝑡)∆ is of the same form : 𝜆𝑘𝜆(𝑡)∆+𝜊(∆),
where 𝛬 𝑡 = 𝜆 𝑥 𝑡
0𝑑𝑥. It follows that the Pure
Birth Shock Model may be obtained from the
stationary pure birth process by the transformation
𝑡 → 𝛬 𝑡 .
For this shock model, the survival function 𝐻 (𝑡)
in (1.1) can be written as
𝐻 (𝑡) = 𝑆 (𝛬 𝑡 ) and 𝑆 (𝑡) = 𝑧𝑘 𝑡 ∞𝑘=0 𝑃 (𝑘),
where 𝑧𝑘 𝑡 = 𝑃(exactly 𝑘 shocks have occurred
in (0, 𝑡] where 𝜆(𝑡) = 1).
C
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 57
IJSER © 2012
http://www.ijser.org
This means that 𝑆 (∙) is the survival function when
the shocks occur according to a stationary birth
process for which the interarrival times between
the shocks number 𝑘 and 𝑘 + 1, 𝑘 = 0, 1,2, . . ., are independent and exponentially distributed with
mean 1/𝜆𝑘 and 1/𝜆𝑘 ∞𝑘=0 = ∞.
In this paper, we consider a model, which is a
more general shock model than that of Esary et al
[1973] and Ebrahimi [1999].
The rest of the paper is organized as follows : In
Section 2, we first give the concepts that are
needed in the ensuing Sections. We also describe
the model and give the reliability of the system
under this model in this Section. Some stochastic
properties of the survival function are given in
Section 3. It is shown in Section 4, that some
partial orderings, namely the stochastic ordering
and the failure rate ordering are preserved among
the two systems under consideration. Finally, in
Section 5, we raise some questions regarding the
preservation of other ageing properties, for our
model.
2. PRELIMINARIES
In this Section, we first give some definitions and
describe the model.
Definition 2.1. The failure rate 𝑟(∙) of a random
variable 𝑇 with distribution function 𝐹(∙) is
defined by
𝑟 𝑡 = 𝑙𝑖𝑚∆01
∆𝑃 𝑡 < 𝑇 ≤ 𝑡 + ∆∣ 𝑇 > 𝑡
=𝑓 𝑡
𝐹 𝑡 , 𝑡 ≥ 0 ,
provided the probability density function 𝑓(∙)
exists, where 𝐹 𝑡 < 1, for all 𝑡 ≥ 0.
Definition 2.2. Let 𝑋 and 𝑌 be two non-negative
random variables with corresponding distribution
functions 𝐹(∙) and 𝐺(∙). Then 𝑋 is said to be
stochastic larger than 𝑌, denoted by 𝑋≥𝑠𝑡𝑌 ,
𝑖𝑓 𝐹 𝑡 ≤ 𝐺 𝑡 , 𝑓𝑜𝑟 𝑎𝑙𝑙 𝑡 ≥ 0.
Definition 2.3. Let 𝑋 and 𝑌 be two non-negative
random variables with corresponding distribution
functions 𝐹(∙) and 𝐺(∙). Then 𝑋 is said to be
larger than 𝑌 in failure rate order, denoted by
𝑋≥𝐹𝑅𝑌 , 𝑖𝑓 𝐹 (𝑡)/𝐺 (𝑡) is non-decreasing in 𝑡 ≥ 0,
or equivalently, 𝑟𝐹 𝑡 ≤ 𝑟𝐺 𝑡 , for all 𝑡 ≥ 0,
where 𝑟𝐹 ∙ 𝑎𝑛𝑑 𝑟𝐺 ∙ denote the failure rates of
𝐹(∙) and 𝐺(∙).
Definition 2.4. A life distribution 𝐹(∙) and its
survival function 𝐹 = 1 − 𝐹 with support
𝑆 = 𝑡 ∶ 𝐹 > 0 and finite mean 𝜇 = 𝐹 𝑥 𝑑𝑥∞
0
are said to be
(i) increasing failure rate (IFR), if the
conditional survival function 𝐹 𝑥+𝑡
𝐹 𝑡 is
decreasing in t, whenever 𝑥 > 0 and
𝑡 ∊ 𝑆.
(ii) increasing failure rate average (IFRA),
if −𝑙𝑛𝐹 𝑡
𝑡 is increasing in S.
(iii) new better than used (NBU), if
𝐹 𝑥 + 𝑦 ≤ 𝐹 𝑥 𝐹 𝑦 ,
for all 𝑥 ≥ 0 and 𝑦 ≥ 0.
(iv) new better than used in expectation (NBUE), if
𝐹 𝑥 + 𝑦 𝑑𝑦∞
0≤
𝐹 𝑥 𝐹 𝑦 𝑑𝑦∞
0,
for all 𝑥 ≥ 0.
(v) decreasing mean residual life (DMRL), if
1
𝐹 𝑡 𝐹 𝑥 𝑑𝑥
∞
0
is decreasing on S.
(vi) harmonic new better than used in expectation (HNBUE), if
𝐹 𝑥 𝑑𝑥∞
𝑡≤ 𝜇 𝑒𝑥𝑝 −
𝑡
𝜇 , for
𝑡 ≥ 0.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 58 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
Definition 2.5. A function 𝑓(∙) is super additive, if
𝑓 𝑡 + 𝑢 ≥ 𝑓 𝑡 + 𝑓 𝑢 , for 𝑡 ≥ 0, 𝑢 ≥ 0.
Definition 2.6. A function 𝑓(𝑥) defined for x in
−∞, ∞ is a P𝑜 lya frequency function of order 2 𝑃𝐹2 if 𝑓 𝑥 ≥ 0 for all x and
𝑓 𝑥1 − 𝑦1 𝑓 𝑥1 − 𝑦2
𝑓 𝑥2 − 𝑦1 𝑓 𝑥2 − 𝑦2 ≥ 0 ,
whenever −∞ < 𝑥1 < 𝑥2 < ∞ and −∞ < 𝑥1 <𝑥2 < ∞.
Suppose that shocks occur randomly in time in
accordance with a pure birth shock process
𝑁(𝑡) ; 𝑡 ≥ 0 as described in Section 1 here
𝑁(𝑡) denotes the number of shocks that have
occurred upto time t. Suppose 𝑇𝑖 , 𝑖 = 1, 2, . . . are
the shock arrival times and 𝑋𝑖 𝑡 − 𝑇𝑖 , 𝑡 ≥ 𝑇𝑖, is
the evolution of the damage to the system from
the ith
shock. Then
𝑆 𝑡 = 𝑋𝑖 𝑡 − 𝑇𝑖 𝑁 𝑡 𝑖=1 , 𝑡 ≥ 0 (2.1)
is the total damage process. It is assumed here that
the processes 𝑋1 𝑡 , 𝑋2 𝑡 , . . . are independent
and all of them have non-decreasing sample paths,
that is, 𝑋𝑖 𝑡 = 𝑋𝑖 (0, 𝑡] , 𝑡 ≥ 0. The above
model is referred to as explosive Poisson shot
noise process. For more details of this process one
may refer to Kl𝑢 ppelberg and Mikosch[1995].
This model may be used in risk analysis, where
𝑁 𝑡 is the number claims in [0, 𝑡], 𝑋𝑖 𝑡 is the ith
claim and 𝑆 𝑡 is the total claim up to time 𝑡.
Suppose that the system fails when 𝑆 𝑡 , in (2.1),
exceeds a known threshold 𝑎. Then the time to
system failure, 𝑇 𝑎 , can be written as
𝑇 𝑎
= 𝑖𝑛𝑓 𝑡 ∶ 𝑆 𝑡 > 𝑎 𝑖𝑓 𝑡 ∶ 𝑆 𝑡 > 𝑎 ≠ ∅
∞ 𝑖𝑓 𝑡 ∶ 𝑆 𝑡 > 𝑎 = ∅
and the reliability, 𝐹 𝑎 𝑡 , of the system is
𝐹 𝑎 𝑡 = 𝑃 𝑇 𝑡 > 𝑡
= 𝑃 𝑆 𝑡 ≤ 𝑎
= 𝑃 𝑋𝑖 𝑡 − 𝑇𝑖 𝑁 𝑡 𝑖=1 ≤ 𝑎 .
Remark 2. When there is no possibility to
determine the threshold 𝑎, then the failure time of
the system is 𝑇 = 𝑖𝑛𝑓 𝑡 ∶ 𝑆 𝑡 > 𝑉 , where 𝑉 is a
positive random threshold with known probability
density function 𝑔𝑉 ∙ and the survival function
𝐹 𝑣 𝑡 𝑔𝑉 𝑣 𝑑𝑣∞
0.
Here, 𝑉 is independent of 𝑆(𝑡).
We assume that for any 𝑛, 𝑋𝑛 𝑡 is non-
decreasing and cadlag. Hence the realizations of
𝑋𝑛 𝑡 are measure defining functions. The process 𝑆(𝑡) ; 𝑡 ≥ 0 is almost surely finite for every
fixed 𝑡 and defines a random measure 𝑆 on Borel
sets.
We now give the reliability, 𝐹 𝑎 𝑡 , of the system
𝐹 𝑎 𝑡 = 𝑃 𝑋𝑖 𝑡 − 𝑇𝑖
𝑁 𝑡
𝑖=1
≤ 𝑎
= 𝑒𝑥𝑝 −𝜆0𝑡 1 + 𝜆0𝜆1 …𝜆𝑘−1∞𝑘=1 ×
0𝑡0𝑢1…0𝑢𝑘−1𝑃𝑖=1𝑘𝑋𝑖𝑢𝑖≤𝑎 𝑒𝑥𝑝𝑗=1𝑘𝜆𝑗−1−𝜆𝑗𝑢𝑗𝑑𝑢𝑘… 𝑑𝑢1
2.2
Here 𝑢𝑖 = 𝑡 − 𝑡𝑖 and 𝑢0 = 𝑡. The number of
shocks occured upto time 𝑡, 𝑁(𝑡) ; 𝑡 ≥ 0 is a
pure birth process with birth rates 𝜆𝑘 . Note here
that when 𝜆𝑖‘s are all equal and equal to 𝜆, then
(2.2) reduces to (2.1) of Ebrahimi [1999] and in
this case, the pure birth process becomes Poisson
process.
Remark 3. When 𝑋 𝑡 , 𝑋1 𝑡 , 𝑋2 𝑡 , . . . are
identical processes and 𝑌𝑖 𝑡 =𝑑 1
𝑡 𝑋 𝑢 𝑑𝑢
𝑡
0, where
=𝑑 denotes equality in distribution, and i = 1, 2, .
then 𝐹 𝑎 𝑡 can be written as
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 59
IJSER © 2012
http://www.ijser.org
𝐹 𝑎 𝑡
= 𝑃 𝑌𝑖 𝑡
𝑁 𝑡
𝑖=1
≤ 𝑎
= 𝑒𝑥𝑝 −𝜆0𝑡 + 𝑃 𝑌𝑖 𝑡
𝑘
𝑖=1
≤ 𝑎
∞
𝑘=1
× 𝑃 𝑁 𝑡 = 𝑘
= 𝑒𝑥𝑝 −𝜆0𝑡 + 𝐴𝑘 𝑗
𝑘
𝑗=0
𝑒𝑥𝑝 −𝜆𝑗 𝑡
∞
𝑘=1
× 𝑃 𝑌𝑖 𝑡
𝑘
𝑖=1
≤ 𝑎
(2.3)
where
𝐴𝑘 𝑗
= 𝜆0𝜆1 … 𝜆𝑘−1
𝜆0−𝜆𝑗 𝜆1−𝜆𝑗 . . . 𝜆𝑗−1−𝜆𝑗 𝜆𝑗+1−𝜆𝑗 . . . 𝜆𝑛−𝜆𝑗
(2.4)
Here we note that 𝑆 𝑡 = 𝑌𝑖 𝑡 𝑁 𝑡 𝑖=1 where 𝑆 𝑡
is given by (2.1).
For the survival function 𝐹 𝑎 ∙ defined in (2.2), a
property of pure birth process that is needed in
obtaining the qualitative properties of 𝐹 𝑎 𝑡 ,
proved by Rizwan [2001], is given in the
following result.
Theorem 2.1. Suppose that k events have
occurred during 0, 𝑡 and 𝑘 + 𝑗 events have
occurred during [0, 𝑡 + 𝑥], 𝑡, 𝑥 > 0 in a pure
birth process with rates 𝜆𝑘 . Then the conditional
joint density function of 𝑇1, . . . , 𝑇𝑘+𝑗 , the
successive times of occurrence, given that
𝑁(𝑡) = 𝑘 and 𝑁(𝑡 + 𝑥) = 𝑘 + 𝑗 is given by
𝑓(𝑡1, . . . , 𝑡𝑘 , 𝑡𝑘+1 , . . . , 𝑡𝑘+𝑗 ∣ 𝑁(𝑡) = 𝑘, 𝑁(𝑡 + 𝑥) = 𝑘 + 𝑗)
=
𝜆0𝜆1 … 𝜆𝑘…𝜆𝑘+𝑗−1𝑒𝑥𝑝 −𝜆0 𝑡+𝑥 𝑒𝑥𝑝 − 𝜆𝑖−1−𝜆𝑖 𝑘+𝑗𝑖=1
𝑡+𝑥−𝑡𝑖
𝐴𝑘 𝑣
𝑒𝑥𝑝 −𝜆𝑣𝑡 𝑘𝑣=0 𝐴
𝑗 𝑣
𝑒𝑥𝑝 −𝜆𝑣𝑥 𝑗𝑣=0
(2.5)
where 𝐴𝑛 𝑗
are defined as in (2.4).
3. STOCHASTIC PROPERTIES OF 𝐹 𝑎 𝑡
In this Section, we shall prove some stochastic
properties of the survival function 𝐹 𝑎 𝑡 for the
cumulative damage random threshold crossing
model with underlying birth process. We shall
now prove the following result.
Theorem 3.1. Suppose 𝜆𝑘 ↑, 𝛬 𝑡 be super
additive, 𝑃(𝑘) be NBU and 𝑋 𝑡 , 𝑋1 𝑡 , 𝑋2 𝑡 , . .
. are independent and identical processes. Then
the survival function 𝐹 𝑎 𝑡 in (2.2) is NBU.
Proof. Define
𝑧𝑘 𝑡 = 𝑃 𝑁 𝑡 = 𝑘 , 𝑘 = 0, 1, 2, .. .
Then by Taylor and Karlin [1994], p 303,
𝑧𝑘′ 𝑡 = −𝜆𝑘𝑧𝑘 𝑡 + 𝜆𝑘−1𝑧𝑘−1 𝑡 , (𝑘 ≥ 1),
and 𝑧0′ 𝑡 = −𝜆0𝑧0 𝑡 .
Also, let
𝐹 1𝑎 𝑡 = 𝑧𝑘 𝑡 ∞𝑘=0 𝑃 𝑡 .
Then by Remark 1, we may write 𝐹 𝑎 𝑡 =
𝐹 1𝑎 𝛬 𝑡 . For 𝑥, 𝑡 ≥ 0, using Theorem 2.1, we
may write
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 60 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
𝐹 1𝑎 𝑡 + 𝑥 = 𝑧𝑘 𝑡
∞
𝑗 =0
∞
𝑘=0
𝑧𝑘 𝑥 𝐴𝑘 𝑣
𝑒𝑥𝑝 −𝜆𝑣𝑡
𝑘
𝑣=0
𝐴𝑗 𝑣
𝑒𝑥𝑝 −𝜆𝑣𝑥
𝑗
𝑣=0
× …
𝑡
𝑡1
𝑡
0
…
𝑡+𝑥
𝑡𝑘+1
𝑡+𝑥
𝑡
𝑡
𝑡𝑘−1
𝑃 𝑋𝑖 𝑡 + 𝑥 − 𝑡𝑖
𝑘+𝑗
𝑖=1
≤ 𝑎
𝑡+𝑥
𝑘+𝑗−1
× 𝑑𝑡𝑘+𝑗 …𝑑𝑡𝑘+1𝑑𝑡𝑘 …𝑑𝑡1 3.1
Let 𝑢𝑖 = 𝑡 − 𝑡𝑖 , 𝑖 = 1,2, … , 𝑘𝑡 + 𝑥 − 𝑡𝑖 𝑖 = 𝑘 + 1, … , 𝑘 + 𝑗
Then (3.1) becomes
𝐹 1𝑎 𝑡 + 𝑥 = 𝑒𝑥𝑝 −𝜆0 𝑡 + 𝑥 𝜆1 … 𝜆𝑘𝜆𝑘+1 …𝜆𝑘+𝑗∞𝑗=0
∞𝑘=0
× …
𝑢1
0
𝑡
0
…
𝑢𝑘+1
0
𝑥
0
𝑢𝑘−1
0
𝑒𝑥𝑝 𝜆𝑖−1 − 𝜆𝑖
𝑘
𝑖=1
𝑢𝑖 + 𝑥 × 𝑒𝑥𝑝 𝜆𝑖−1 − 𝜆𝑖
𝑘+𝑗
𝑖=𝑘+1
𝑢𝑖
𝑢𝑘+𝑗−1
0
× 𝑃 𝑋𝑖 𝑢𝑖 + 𝑥
𝑘
𝑖=1
+ 𝑋𝑖 𝑢𝑖
𝑘+𝑗
𝑖=𝑘+1
≤ 𝑎 × 𝑑𝑢𝑘+𝑗 …𝑑𝑢1
≤ 𝑒𝑥𝑝 −𝜆0𝑡 𝑒𝑥𝑝 −𝜆0𝑥 𝜆1 … 𝜆𝑘𝜆𝑘+1 …𝜆𝑘+𝑗
∞
𝑗 =0
∞
𝑘=0
× …
𝑢1
0
𝑡
0
…
𝑢𝑘+1
0
𝑥
0
𝑢𝑘−1
0
𝑒𝑥𝑝 𝜆𝑖−1 − 𝜆𝑖
𝑘+𝑗
𝑖=𝑘+1
𝑢𝑖
𝑢𝑘+𝑗−1
0
× 𝑃 𝑋𝑖 𝑢𝑖 + 𝑥
𝑘
𝑖=1
≤ 𝑎
× 𝑃 𝑋𝑖 𝑢𝑖
𝑘+𝑗
𝑖=𝑘+1
≤ 𝑎 𝑑𝑢𝑘+𝑗 …𝑑𝑢1
(since 𝑃 𝑘 is NBU)
≤ 𝑒𝑥𝑝 −𝜆0𝑡 𝑒𝑥𝑝 −𝜆0𝑥 𝜆1 … 𝜆𝑘𝜆𝑘+1 …𝜆𝑘+𝑗
∞
𝑗 =0
∞
𝑘=0
× …
𝑢1
0
𝑡
0
…
𝑢𝑘+1
0
𝑥
0
𝑢𝑘−1
0
𝑒𝑥𝑝 𝜆𝑖−1 − 𝜆𝑖
𝑘+𝑗
𝑖=𝑘+1
𝑢𝑖
𝑢𝑘+𝑗−1
0
× 𝑃 𝑋𝑖 𝑢𝑖
𝑘
𝑖=1
≤ 𝑎 𝑃 𝑋𝑖 𝑢𝑖
𝑘+𝑗
𝑖=𝑘+1
≤ 𝑎 𝑑𝑢𝑘+𝑗 …𝑑𝑢1
= 𝐹 1𝑎 𝑡 𝐹 1𝑎 𝑥 ,
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 61
IJSER © 2012
http://www.ijser.org
since {𝑋𝑛(𝑡) ; 𝑛 = 1, 2, . . . } is a non-decreasing
process. Since 𝛬(𝑡) is super additive and 𝐹 1𝑎 𝑡 is
increasing, it follows that 𝐹 𝑎 𝑡 is NBU. ■
Remark 4. When {𝑋𝑛(𝑡) ; 𝑛 = 1, 2, . . . } is a
non-identical process, then the last inequality in
the proof of Theorem 3.1 be comes less than, and
in this case, the shocks become increasingly
effective in causing damage.
Remark 5. Assume that shocks occur randomly
in time in accordance with a pure birth process.
Further, the threshold is a positive random
variable 𝑉 with cumulative distribution function
𝐺 ∙ and assume that the process {𝑋𝑛(𝑡) ; 𝑛 = 1, 2, . . . } is independent of the threshold 𝑉. The
survival probability 𝐹 𝑡 for the period [0, 𝑡] is
now given by
𝐹 𝑡
= 𝑒𝑥𝑝 −𝜆0𝑡 1 + 𝜆1 …𝜆𝑘
∞
𝑘=1
× …𝑢1
0
𝑡
0
∞
0
𝑃 𝑋𝑖 𝑢𝑖
𝑘
𝑖=1
< 𝑣
𝑢𝑘
0
× 𝑒𝑥𝑝 𝜆𝑗−1 –𝜆𝑗
𝑘
𝑗 =1
𝑢𝑗 𝑑𝑢𝑘 …𝑑𝑢1 𝑑𝐺 𝑣
= 𝑒𝑥𝑝 −𝜆0𝑡 1 + 𝜆1 …𝜆𝑘
∞
𝑘=1
× …𝑢1
0
𝑡
0
𝑒𝑥𝑝 𝜆𝑗−1
𝑘
𝑗 =1
𝑢𝑘
0
− 𝜆𝑗 𝑢𝑗 𝐺 𝑣 𝑑
𝑑𝑣𝑃 𝑋𝑖 𝑢𝑖
𝑘
𝑖=1
∞
0
< 𝑣 𝑑𝑣 𝑑𝑢𝑘 …𝑑𝑢1
= 𝑒𝑥𝑝 −𝜆0𝑡 1
+ 𝜆1 …𝜆𝑘
∞
𝑘=1
…𝑢1
0
𝑡
0
𝐸 𝐺 𝑋𝑖 𝑢𝑖
𝑘
𝑖=1
𝑢𝑘
0
× 𝑒𝑥𝑝 𝜆𝑗−1 − 𝜆𝑗
𝑘
𝑗 =1
𝑢𝑗 𝑑𝑢𝑘 …𝑑𝑢1
Theorem 3.2. Suppose 𝜆𝑘 ↑, 𝛬 𝑡 is super
additive and 𝐺 𝑣 be NBU. Then 𝐹 𝑎 𝑡 is NBU.
Proof. Let 𝑧𝑘 𝑡 be defined as in Theorem 3.1
and let
𝐹 1 𝑡 = 𝑧𝑘 𝑡
∞
𝑘=0
𝑃 𝑘
Then by Remark 1, we may write
𝐹 𝑎 𝑡 = 𝐹 1 𝛬 𝑡 .
Consider
𝐹 1 𝑡 + 𝑥
= 𝑒𝑥𝑝 −𝜆0 𝑡 + 𝑥
× 𝜆1 … 𝜆𝑘𝜆𝑘+1 …𝜆𝑘+𝑗
∞
𝑗 =0
∞
𝑘=0
× …
𝑢1
0
𝑡
0
…
𝑢𝑘+1
0
𝑥
0
𝑢𝑘−1
0
𝐸 𝐺 𝑋𝑖 𝑢𝑖
𝑘
𝑖=1
𝑢𝑘+𝑗−1
0
+ 𝑥 + 𝑋𝑖 𝑢𝑖
𝑘+𝑗
𝑖=𝑘+1
× 𝑒𝑥𝑝 𝜆𝑖−1 − 𝜆𝑖
𝑘
𝑖=1
𝑢𝑖 + 𝑥
+ 𝜆𝑖−1 − 𝜆𝑖
𝑘+𝑗
𝑖=𝑘+1
𝑢𝑖 × 𝑑𝑢𝑘+𝑗 …𝑑𝑢1
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 62 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
≤ 𝑒𝑥𝑝 −𝜆0𝑡 𝑒𝑥𝑝 −𝜆0𝑥 𝜆1 … 𝜆𝑘𝜆𝑘+1 …𝜆𝑘+𝑗
∞
𝑗 =0
∞
𝑘=0
× …
𝑢1
0
𝑡
0
…
𝑢𝑘+1
0
𝑥
0
𝑢𝑘−1
0
𝑒𝑥𝑝 𝜆𝑖−1
𝑘+𝑗
𝑖=𝑘+1
𝑢𝑘+𝑗−1
0
− 𝜆𝑖 𝑢𝑖 𝐸 𝑋𝑖 𝑢𝑖
𝑘
𝑖=1
× 𝑋𝑖 𝑢𝑖
𝑘+𝑗
𝑖=𝑘+1
𝑑𝑢𝑘+𝑗 …𝑑𝑢1
= 𝐹 1 𝑡 𝐹 1 𝑥
That is, 𝐹 1 𝑡 is NBU, and since 𝛬(𝑡) is super
additive, it follows that 𝐹 𝑎 𝑡 is NBU. ■
Remark 6. Although 𝐹 𝑎 𝑡 is NBU, it need not
be an IFR.
Theorem 3.3. Suppose 𝜆𝑘 ↑, 𝜆 𝑡 ↑ and
𝑌 𝑡 =1
𝑡 𝑋 𝑢 𝑑𝑢
𝑡
0. Suppose further that
(a) for any t, 𝐺𝑡 𝑢 = 𝑃 𝑌 𝑡 ≤ 𝑢 is PF2 ;
(b) for 𝑡1 ≤ 𝑡2, 𝐺𝑡1 𝑢 /𝐺𝑡2
𝑢 is non-increasing
in 𝑢 ;
(c) for any 𝑘 ≥ 0 and 𝑡1 < 𝑡2,
𝑃 𝑌𝑖 𝑥 + 𝑡1
𝑘
𝑖=1
≤ 𝑎 /𝑃 𝑌𝑖 𝑥 + 𝑡2
𝑘
𝑖=1
≤ 𝑎
is non-decreasing in 𝑥 ; and
(d) for 𝑡1 ≤ 𝑡2, 𝑘1 ≤ 𝑘2,
𝑃 𝑌𝑖 𝑡1 𝑘2𝑖=1 ≤ 𝑎
𝑃 𝑌𝑖 𝑡1 𝑘1𝑖=1 ≤ 𝑎
×𝑃 𝑌𝑖 𝑡2
𝑘2𝑖=1 ≤ 𝑎
𝑃 𝑌𝑖 𝑡2 𝑘1𝑖=1 ≤ 𝑎
≤ 𝑡2
𝑡1 𝑘2−𝑘1
Then 𝐹 𝑎 𝑡 in (2.3) is IFR.
Proof. We need to prove that the determinant
𝐷 = 𝐹 𝑎 𝑥 + 𝑡1 𝐹 𝑎 𝑥 + 𝑡2
𝐹 𝑎 𝑡1 𝐹 𝑎 𝑡2 ≥ 0
for t1 < t2, 𝐹 𝑎 𝑡2 > 0 and 𝑥 ≥ 0. Let 𝑧𝑘 𝑡 be
defined as in Theorem 3.1. Then by (2.3) we have
𝐷 =
𝑧𝑘1 𝑥 + 𝑡1
∞
𝑘1=0
𝑃 𝑌𝑖 𝑥 + 𝑡1
𝑘1
𝑖=1
≤ 𝑎 𝑧𝑘1 𝑥 + 𝑡2
∞
𝑘1=0
𝑃 𝑌𝑖 𝑥 + 𝑡2
𝑘1
𝑖=1
≤ 𝑎
𝑧𝑘2 𝑡1
∞
𝑘2=0
𝑃 𝑌𝑖 𝑡1
𝑘2
𝑖=1
≤ 𝑎 𝑧𝑘2 𝑡2
∞
𝑘2=0
𝑃 𝑌𝑖 𝑡2
𝑘2
𝑖=1
≤ 𝑎
= 𝑧𝑘1
𝑥 + 𝑡1 𝑧𝑘1 𝑥 + 𝑡2
𝑧𝑘2 𝑡1 𝑧𝑘2
𝑡2
𝑘2<∞0≤𝑘1<
𝑃 𝑌𝑖 𝑥 + 𝑡1
𝑘1
𝑖=1
≤ 𝑎 𝑃 𝑌𝑖 𝑥 + 𝑡2
𝑘1
𝑖=1
≤ 𝑎
𝑃 𝑌𝑖 𝑡1
𝑘2
𝑖=1
≤ 𝑎 𝑃 𝑌𝑖 𝑡2
𝑘2
𝑖=1
≤ 𝑎
3.2
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 63
IJSER © 2012
http://www.ijser.org
by the basic composition theorem (Karlin, Total
Positivity [1968]).
For t1 < t2, the first determinant is non-negative
(Karlin and Proschan [1960], (Theorem 3) ). From
assumptions (a) to (c), it is easy to verify that
𝑃 𝑌𝑖 𝑥 + 𝑡1 𝑘1+𝑗𝑖=1 ≤ 𝑎
𝑃 𝑌𝑖 𝑥 + 𝑡2 𝑘1+𝑗𝑖=1 ≤ 𝑎
≥𝑃 𝑌𝑖 𝑡1
𝑘1+𝑗𝑖=1 ≤ 𝑎
𝑃 𝑌𝑖 𝑡2 𝑘1+𝑗𝑖=1 ≤ 𝑎
≥𝑃 𝑌𝑖 𝑡1
𝑘1𝑖=1 ≤ 𝑎
𝑃 𝑌𝑖 𝑡2 𝑘1𝑖=1 ≤ 𝑎
(3.3)
It follows from (3.3) that the second determinant
on the right hand side of (3.2) is non-negative and
by Remark 1, the proof is complete. ■
4. SOME PARTIAL ORDERINGS RELATED
TO THE MODEL
In this Section, we compare two systems having
different damage distributions, but
fixed identical threshold.
4.1 Stochastic Orderings
Suppose the i - th shock causes a damage 𝑋𝑖 and
𝑊𝑖 to the first and second systems, respectively
and each system fails if the corresponding
accumulated damage exceeds a common fixed
threshold 𝑎. Let 𝑇1 and 𝑇2 denote the failure
times of the system one and two, respectively.
Then, their respective survival distributions are
𝐹 1𝑎 𝑡 = 𝑃 𝑇1 > 𝑡
= 𝑒𝑥𝑝 −𝜆0𝑡 1 + 𝜆1 …𝜆𝑘
∞
𝑘=1
× …𝑢1
0
𝑡
0
𝑃 𝑋𝑖 𝑢𝑖
𝑘
𝑖=1
≤ 𝑎 × 𝑒𝑥𝑝 𝜆𝑗−1 − 𝜆𝑗
𝑘
𝑗 =1
𝑢𝑗 𝑑𝑢𝑘 …𝑑𝑢1
𝑢𝑘−1
0
4.1
and
𝐹 2𝑎 𝑡 = 𝑃 𝑇2 > 𝑡
= 𝑒𝑥𝑝 −𝜆0𝑡 1 + 𝜆1 …𝜆𝑘
∞
𝑘=1
× …𝑢1
0
𝑡
0
𝑃 𝑊𝑖 𝑢𝑖 ≤ 𝑎
𝑘
𝑖=1
× 𝑒𝑥𝑝 𝜆𝑗−1 − 𝜆𝑗
𝑘
𝑗 =1
𝑢𝑗 𝑑𝑢𝑘 …𝑑𝑢1
𝑢𝑘−1
0
4.2
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 64 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
We shall now establish the following result.
Theorem 4.1. If 𝑋𝑖 𝑡 ≥ 𝑊𝑖 𝑡 , for 𝑖 = 1, 2, . .. and for each 𝑡 ≥ 0, then 𝑇1≤
𝑠𝑡𝑇2.
Proof. Since for each 𝑡 ≥ 0, 𝑋𝑖 𝑡 ≥ 𝑊𝑖 𝑡 , for
𝑖 = 1, 2, . .., we have
𝑃 𝑋𝑖 𝑡 ≤ 𝑥 ≤ 𝑃 𝑊𝑖 𝑡 ≤ 𝑥 for all 𝑥.
It follows from (4.1) and (4.2) that 𝐹 1𝑎 𝑡 ≤𝐹 2𝑎 𝑡 or 𝑇1≤
𝑠𝑡𝑇2. ■
4.2 Failure Rate Orderings
Suppose X t , X1 t , X2 t , . . . are independent
and W t , W1 t , W2 t , . . . are also independent
and identical processes. Further, suppose that
{𝑋𝑛(𝑡) ; 𝑛 = 1, 2, . . . } and {𝑊𝑛(𝑡) ; 𝑛 = 1, 2, . . . } are indpendent,
𝑌 𝑡 =1
𝑡 𝑋 𝑢 𝑑𝑢
𝑡
0,
𝑍 𝑡 =1
𝑡 𝑊 𝑢 𝑑𝑢
𝑡
0.
Then we have the following result on failure rate
ordering among two systems.
Theorem 4.2. Suppose that the following hold:
(a) for each 𝑡 ≥ 0, 𝐺𝑡(𝑢) = 𝑃(𝑌(𝑡) ≤ 𝑢) and
𝐻𝑡(𝑢) = 𝑃(𝑍(𝑡) ≤ 𝑢) are both PF2 ;
(b) for 𝑡1 < 𝑡2, 𝐺𝑡2(𝑢)/𝐺𝑡1
(𝑢) and 𝐻𝑡2(𝑢)/
𝐻𝑡1(𝑢) are both non-decreasing in 𝑢 ;
(c) for 𝑡 > 0, 𝐻𝑡(𝑢)/𝐺𝑡(𝑢) in non-decreasing in
𝑢; and
(d) for 𝑡1 < 𝑡2
𝑃 𝑌𝑖 𝑡2
𝑘𝑖=1 ≤ 𝑎
𝑃 𝑌𝑖 𝑡1 𝑘𝑖=1 ≤ 𝑎
≥𝑃 𝑍𝑖 𝑡2
𝑘𝑖=1 ≤ 𝑎
𝑃 𝑍𝑖 𝑡1 𝑘𝑖=1 ≤ 𝑎
Then, the failure rate of 𝑇1 is bigger than the
failure rate of 𝑇2, that is, 𝑇1≤𝐹𝑅𝑇2.
Proof. From (2.3), 𝐹 1𝑎 𝑡 and 𝐹 2𝑎 𝑡 can be
written as
𝐹 1𝑎 𝑡 = 𝑃 𝑌𝑖 𝑡
𝑘
𝑖=1
≤ 𝑎
∞
𝑘=0
𝑃(𝑁(𝑡)
= 𝑘) 4.3
𝐹 2𝑎 𝑡 = 𝑃 𝑍𝑖 𝑡
𝑘
𝑖=1
≤ 𝑎
∞
𝑘=0
𝑃(𝑁(𝑡)
= 𝑘) 4.4 We need to prove that the determinant
𝐷1 = 𝐹 1𝑎 𝑡1 𝐹 1𝑎 𝑡2
𝐹 2𝑎 𝑡1 𝐹 2𝑎 𝑡2 ≥
0 4.5
for t1 < t2, 𝐹 2𝑎 𝑡2 > 0. Let 𝑧𝑘 𝑡 be defined as
in Theorem 3.1. Then by (2.3) we have
𝐷1 =
𝑧𝑘1 𝑡1
∞
𝑘1=0
𝑃 𝑌𝑖 𝑡1
𝑘1
𝑖=1
≤ 𝑎 𝑧𝑘1 𝑡2
∞
𝑘1=0
𝑃 𝑌𝑖 𝑡2
𝑘1
𝑖=1
≤ 𝑎
𝑧𝑘2 𝑡1
∞
𝑘2=0
𝑃 𝑌𝑖 𝑡1
𝑘2
𝑖=1
≤ 𝑎 𝑧𝑘2 𝑡2
∞
𝑘2=0
𝑃 𝑌𝑖 𝑡2
𝑘2
𝑖=1
≤ 𝑎
= 𝑧𝑘1
𝑡1 𝑧𝑘1 𝑡2
𝑧𝑘2 𝑡1 𝑧𝑘2
𝑡2
𝑘2<∞0≤𝑘1<
𝑃 𝑌𝑖 𝑡1
𝑘1
𝑖=1
≤ 𝑎 𝑃 𝑌𝑖 𝑡2
𝑘1
𝑖=1
≤ 𝑎
𝑃 𝑌𝑖 𝑡1
𝑘2
𝑖=1
≤ 𝑎 𝑃 𝑌𝑖 𝑡2
𝑘2
𝑖=1
≤ 𝑎
(4.6)
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 65
IJSER © 2012
http://www.ijser.org
by the basic composition theorem (Karlin, Total
Positivity [1968], p 17).
For t1 < t2, the first determinant is non-negative
(Karlin and Proschan [1960], (Theorem 3) ).
From assumptions (a) to (c), it follows that the
second determinant on the right side of (4.6) is
non-negative. From (4.5), it is evident that
𝐹 1𝑎 𝑡 /𝐹 2𝑎 𝑡 is non-increasing in 𝑡, which in
turn implies 𝑇1≤𝐹𝑅𝑇2.
■
5. CONCLUSION
Under the cumulative damage threshold crossing
model, we have established some stochastic
properties related to the survival distributions of a
device. Under this model, it is still open to
determine the other stochastic properties viz.
IFRA, NBUE, DMRL HNBUE etc. and other
partial orderings related to the damage
distributions.
REFERENCES
[1] ABDEL-HAMEED, M. and SHIMI, I.N.,
[1978] Optimal Replacement of Damaged
Devices, J. Appl. Prob., 15,153-161.
[2] BARLOW, R.E. and PROSCHAN, F.,
[1965] Mathematical Theory of Reliability,
John Wiley, New York.
[3] EBRAHIMI, N., [1999] Stochastic
Properties of a Cumulative Damage
Threshold Crossing Model, J. Appl. Prob.,
36, 720-732.
[4] ESARY, J.D., MARSHAL, A.W. and
PROSCHAN, F., [1973] Shock Models and
Wear Process, Ann. Prob., 1, 627-649.
[5] FELLER, W., [1965] An Introduction to
Probability Theory and its Applications,
John Wiley and Sons, New York.
[6] KARLIN, S., [1968] Total positivity,
Stanford University Press, PaloAlto.
[7] KARLIN, S. and PROSCHAN, F.,
[1960] P𝑜 lya Type Distributions of
Convolutions, Ann. Math. Stat., 31, 721-
736.
[8] KL𝑈 PPELBERG, C and MIKOSCH, T.,
[1995] Explosive Shot Noise Process with
Applications to Risk Retention, Bernoulli,
23, 125-147.
[9] RIZWAN, U., [2001] Contributions to the
Study of some Stochastic Life Time Models,
Ph.D. Thesis, University of Madras, India.
[10] TAYLOR, H.M. and KARLIN, S., [1994]
An Introduction to Stochastic Modelling,
Academic Press, New York.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 66 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
Chemical and Physical Properties of Chitosan Acetate Electrolytic Systems
A. Ayisha Begam, K. Prem Nazeer and Rugmini Radhakrishnan
Abstract - Solid Chitosan Acetate Electrolytic Films were prepared by Grafting the Lithium Iodide salt (0.1 – 0.5 wt %) with Chitosan in
the presence of acetic acid. These films were subjected to Fourier Transform Infrared (FTIR), UV-Visible and XRD spectroscopic
analysis to understand structure, complexation process, optical band gap, type of transition and the shape of the absorption edge. A
systematic study on the suitability of biopolymer electrolyte revealed that the LiI (50 wt %) and chitosan are the most appropriate dopant
and host polymer for the preparation of biopolymer electrolyte respectively.
Index Terms - Chitosan acetate solid electrolyte films – grafting – Structure – Complexation process – Optical Band gap
—————————— ——————————
1. INTRODUCTION
In an attempt to obtain the suitable polymer
electrolytes for electrochemical systems many
new resources have been tried and efforts are
continued to characterize the new materials.
Among the several electrochemical systems, Li+,
Na+ and K
+ ion conducting solid electrolytes have
been developed for high energy density batteries
because of their light weight and high
electrochemical potential (Nazri and Pistoia,
2004; Linden and Reddy, 2002). Unlike the
conventional solid electrolytes, biopolymer
electrolytes are non toxic, degradable, eco friendly
material and can be prepared into flexible thin
films of required size and shape. The flexibility of
polymer electrolytes accommodates the volume
changes of electrodes, which typically occur
during the charge-discharge cycles of the
electrochemical device. It can also act as a
membrane and separator and provide comfortable
path during ion conduction process. Chemically
modified chitosan have been used as a host
polymer to study Solid Polymer Electrolytes(SPE)
——————————————
A. Ayisha Begam is serving in the Department of Physics, Avinashilingam University for Women, Coimbatore, India,
K. Prem Nazeer is serving in the Department of Physics, Islamiah College, Vaniyambadi, India. E-mail : [email protected]
Rugmini Radhakrishnan served in the Department of Physics, Avinashilingam University for Women, Coimbatore, India
for batteries and the Proton Exchange Membranes
(PEM) for fuel cells (Mohamed et al. 1995,
Subban et al., Morni et al. 1997, 1999). This
paper discusses the chemical and physical
properties of LiI grafted chitosan membrane as
applied to ion conductivity and study its suitability
for biopolymer solid electrolyte battery systems.
2. EXPERIMENTAL
Chitosan-salt complexes were formed by grinding
1 g of chitosan powder (Fluka - medium
molecular weight) with different concentration (10
– 50 wt %) of LiI salts and by mixing this
compound with 50 ml of acetic acid in a 500 ml
glass beaker. This solution was stirred for about 1
hour continuously using a Teflon pellet, which
was rotated with a help of a magnetic stirrer
maintained at room temperature to form 2 % (w/v)
solution. Most of the chitosan salt complexes
dissolved to give a transparent solution
(electrolyte). Minor insoluble solids were
removed using a syringe filter with a pore size of
1micron and the required Chitosan electrolyte
solutions were collected for the preparation of
solid Chitosan electrolyte films.
Film casting technique is employed in the present
study for the preparation of solid biopolymer
electrolyte. The casting of the films was carried
out by pouring the filtered chitosan solution (5ml)
onto optically plane glass moulds (10×10 cm) and
were allowed to dry at room temperature (25 2
C) in a closed atmosphere for 3 days. The dried
films were carefully removed from the mould and
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 67
IJSER © 2012
http://www.ijser.org
its edges were clamped onto a well cleaned
optically plane glass plate and finally dried (50C,
24 Hrs) and stored under dry condition. The film
thickness was determined using a universal
length-measuring instrument (TRIMOS,
Switzerland) to an accuracy of 0.110–6
m (the
pressure maintained in the ball contact was 2.47
Pa). Typical thicknesses of ~ 50µm were used for
all the studies. In the present work, FTIR spectra
were recorded by ex situ in the range of 400 –
4000cm-1
using free standing films of biopolymer
electrolytes with a fully computerized Bruker IFS
- 66V spectrometer with 200 scans per spectrum
at 2 cm-1
resolution. The spectral distribution of
transmittance (T) data in the spectral region of
190-1100nm were analyzed at room temperature
using PerkinElmer - Lambada 35 UV-Visible
spectrometer. X-ray diffraction patterns were
recorded using Philips X-ray generator (Model
PW1390) at room temperature with an Ni filter
and CuK radiation( = 1.5418 Å) at 40 kV and
20 mA in the 2 range of 10 to 70 with an
accuracy of 0.02 in 2.
3. RESULTS AND DISCUSSION
3.1 FTIR Spectroscopy Studies on Lithium Iodide
(Li I) Grafted Chitosan Acetate (CHA)
Electrolytes
The FTIR spectra of samples were taken to verify
the occurrence of chitosan - lithium iodide salt
interaction. The small peaks at 1153 cm-1
(C-O-
C vibrations), 900 cm-1
and 647 cm-1
(NH wag
primary and secondary amines) found for pure
chitosan film (Fig 4.1) gradually broadened
and obscured when it is dissolved in acetic
acid (Ayisha Begam et al. (2011)). These
obscured peaks completely disappeared during
complexation process with lithium iodide for
the concentration of 50 wt. % as seen the
Fig 1.
According to Osman and Arof (2003), the
interaction is known to occur between chitosan
and an inorganic salt if there is a shift in
O=C-NHR, NH2 and NH3+ bands from chitosan
Fig. 1 FTIR Spectra of Lithium Iodide grafted
Chitosan Acetate Electrolyte
Scheme 1 Types of possible interaction of Li I
with Chitosan Acetate
spectrum. The bands at 1630 cm-1
and 1568 cm-1
represents acetylated amino group, which is due to
the C=O stretching vibrations of O=C-NHR
(amide I) and NH bending (amide II) respectively
for CHA film. On the addition of Lithium Iodide
(LiI), shift occurred in the carbonyl bands towards
the lower wave numbers. The maximum shift of
the amide I and amide II bands occurred in the
spectra of the samples CHA+ LiI (50 wt. %) is
1615 cm-1
and 1558 cm-1
respectively. All the
observed characteristic bands of chitosan acetate
(CHA) are shifted to lower numbers upon the
addition of LiI salt. The shifting of these bands
particularly depends upon the type of counter
anion and the salt concentration (Muzzarelli
1973). This could be due to the interaction of LiI
salt and nitrogen atom or between the acetic acid
and the nitrogen atom of the chitosan functional
group. The possible H-bonding type of
interaction of LiI salt with N of chitosan acetate is
shown in Scheme 1(a and b).
(c)
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 68 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
(a) (b) (c)
Fig. 2 FTIR spectra of CHA with (a) 10 wt.% Li I;
(b) 30 wt.% LiI; (c) 50 wt.% LiI in the
region 1400- 1800 cm-1
.
Scheme 2 Interaction of LiI with Chitosan Acetate
Fig.2 depicts the carbonyl and amine bands of
salted CHA with various concentrations of Li I
((a) 10 wt. % (b) 30 wt. % and (c) 50 wt. %). The
amine band has shifted about 10 cm-1
(to 1558
cm-1
) on addition of salt compared with CHA. The
carbonyl band has further shifted by 15 cm-1
(to
1615 cm-1
) compared with CHA. In the spectrum
of the sample containing 10 wt.% salt, the full
width at half maximum (FWHM) for the amine
band is slightly wider than that of the carbonyl
band (the maximum height is taken from the
peaks of the carbonyl and amine bands,
respectively, to their meeting point at 1775 cm-1
).
On addition of 30 wt. % salt, the peak of the
carbonyl band is higher than that of the amine
band and the FWHM for the amine band is still
greater than that of the carbonyl band. The same
situation is still observed in Fig. 2 (c) and it is
inferred that salt-chitosan interaction prefers to
take place at the amine site (Scheme 2).
The band corresponding to OH stretching appears
as broad band around 3300 cm-1
. It is observed
that the broadening increased on the addition of
LiI salt. This could be due to the possible NH…I
or O-Li interaction. These interactions perhaps
lead to band broadening as well. Thus FTIR
studies of samples reveals that interaction is there
between LiI salt and chitosan acetate. These
results show that the chitosan acetate behaves a
successful host polymer for the Li-biopolymer
electrolyte.
3.2 Study of Optical Band Gap, Impurity Levels
and Shape of Absorption Edge in Lithium
Iodide Grafted Chitosan Acetate Electrolyte
The spectral distribution of transmittance (T) data
in the spectral region of 190-1100nm were
analyzed at room temperature using PerkinElmer -
Lambada 35 UV-Visible spectrometer for
Chitosan Acetate and Chitosan grafted with
Lithium Iodide (0.1g –0.5g) electrolyte samples.
Fig. 3 Transmittance spectra of Chitosan Acetate
and Chitosan Acetate grafted with Lithium
Iodide
The average thickness of the electrolyte films
measured was 50μm. Higher transmission in the
higher wavelength region and its decline at
absorption edge was observed for all the samples.
The transmittance spectra of the film indicate that
the films are more than 80 % transparent in the
NIR region, as shown in Fig.3. The transparency
decreases in the visible region due to band to band
absorption.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 69
IJSER © 2012
http://www.ijser.org
Table 1 Optical Parameters of LiI Grafted
Chitosan Acetate Electrolytes
Fig. 4 Plots of (h) ½
versus h - indirect
transition in chitosan acetate
electrolyte
Fig. 5 Plots of (h) ½
versus h - indirect
transition in of 10 wt % Li I grafted
Chitosan electrolyte
Fig. 6 Plots of (h) ½
versus h - indirect
transition in 30 wt % Li I grafted
Chitosan electrolyte
Fig. 7 Plots of (h) ½
versus h - indirect
transition in 50 wt % Li I grafted
Chitosan electrolyte
Chitosan electrolytes are composed of Li I salt
dispersed in a chitosan acetate matrix. The LiI
salt dissociated into ions while complexes with
dissolved chitosan matrix. The chitosan acetate
salt, which produced due to a reaction between the
acetic acid and chitosan (Kaneko, 1997), where
the glucosamine (GlcN) convert into glucosamine
acetate unit (ie. H+ of acetic acid has formed a
dative bond with nitrogen of the chitosan
functional groups) and the disassociated Li I salt
in the polymer are responsible for the formation of
defects in the chitosan electrolytes. According to
Mott and Davis (1979), the width of mobility edge
Sample Type of
Transiti
on
Eg (eV)
Chitosan Acetate Indirect
allowed
1.62; 5.06
10 wt.% LiI
grafted Chitosan
Indirect
allowed
1.5; 4.87
30 wt.% LiI
grafted Chitosan
Indirect
allowed
1.4 ; 4.74
50 wt.% LiI
grafted Chitosan
Indirect
allowed
1.03; 4.64
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 70 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
depends on the degree of disorder and defects
present in the amorphous structure. Such defect
produces localized states in the forbidden gap. So
the increase of percentage of LiI salt to chitosan
acetate host increases the localized states which
directly affect the decrease in the optical energy
gap of the chitosan acetate as shown in Table 1.
From the optical transmission data analysis, the
absorption co-efficient (α) has been calculated to
evaluate optical band gap and impurity levels.
The frequency dependence of the absorption
coefficient described by an empirical relation α =
A (hν-Eg) p
is used to evaluate the optical band
gap. The frequency dependence of the absorption
coefficient reasonably fit with the above equation
when the value of p = 2. The plots (αhν) 1/2
versus
hν are linear functions, indicating the existence of
indirect and allowed transitions for both Chitosan
Acetate and Chitosan grafted Lithium Iodide
electrolyte films as shown in the Figs. 4 –7.
Extrapolations of linear dependence to zero
absorption coefficient yields the corresponding
optical band gaps Eg as shown in Table 1.
There are two energy gap values as shown in table
1 for each composites of chitosan. The smaller
one may be due to the formation of defects in the
forbidden gap and larger one is due formation of
defects states close to conduction or valence band
of host polymer. As a result, the energy required
to produce a transition from an occupied energy
level to an unoccupied level is decreased, and the
wavelength of the light absorbed become longer.
Thus optical band gap show a bathochromic shift
when the load of LiI salt increases in chitosan
acetate matrix. These defects states are actually
responsible for the increase in the degree of
disorder and ion conduction in the polymer
electrolyte. Similar result was observed for PEO
complexed with NaF based polymer electrolytic
system (Sasikala et al., 2012). These results are in
agreement with those obtained from XRD and
conductivity studies in the present work.
The study of absorption edge in solids were
understood with the help of different theories put
forwarded by Miller and Abraham (1960), Mott,
(1969) and Tauc (1974). Based on these theories
(a)
(b)
(c)
Fig. 8 Plots of α versus hν for (a) 10 Wt%
(b) 30 Wt% and (c) 50 Wt% Li I
grafted CHA electrolytes
(solid lines are exponential
fit and inset linear fit).
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 71
IJSER © 2012
http://www.ijser.org
shapes of absorption edges in solids were
classified into three types viz, (i) a Lorentzian
broadened (power law) edge, (ii) an Urbach-rule
exponential edge, and (iii) an abrupt edge
expected for a solid with perfect transitional
periodicity. Normally, the fundamental absorption
edges are Lorentzian in most of the solids due to
the fact that the atomic absorption lines are
broadened by collisions and by radiative damping.
In the lowest part of the absorption edge, the
absorption coefficient varies exponentially with
photon energy, which obeys an exponential law
called Urbach‘s rule (α = α0 exp (hν/Eu)). Here Eu
is a characteristic energy known as band tail or
Urbach energy. However, all these models share
a common fact that the Urbach tail is related to
some kind of disorder in the material and its slope
decreases with increasing disorder. Therefore, the
tail characteristics can be considered as a probe
for the structural study.
The Tauc plot (Fig. 5- 7) can give hint about the
type of absorption edge in LiI grafted CHA. But
the hidden parameters can be studied with the help
of Urbach formula, which was verified by plotting
ln α versus hν for CHA and CHA grafted LiI
electrolyte near the absorption edge as shown in
Figure 8 (a-c). The solid lines are the exponential
fit, fit well with experimental data obeys Urbach‘s
rule. The inset of figure 8 (a-c) shows the slope of
the straight line of these curves yields the value of
band tails (Eu) whose magnitude is 0.42, 0.37 and
0.30 for 10, 30 and 50 Wt% LiI grafted CHA
electrolyte respectively. The gradual lowering of
Eu value indicated the existence of structural
disorder in the host polymer, which transforms
chitosan from semi-crystalline to semi-
amorphous. The results obtained from IR and
XRD spectroscopy in the previous and following
sections respectively were fit well with optical
studies that satisfies the few important parameters
of a good polymer electrolyte.
3.3 Structural Study of LiI Grafted Chitosan
Acetate Solid Electrolyte
X-ray diffraction (XRD) method is used to study
the effect of dissolution of salt on the structure of
the polymer of the salted chitosan acetate. In the
present study, room temperature X-ray diffraction
patterns were recorded using Philips X-ray
generator (Model PW1390) with an Ni filter and
CuK radiation( = 1.5418 Å) at 40 kV and 20
mA in the 2 range of 10 to 70 with an accuracy
of 0.02 in 2.
Fig. 9 XRD spectra of LiI grafted CHA
solid electrolytes
XRD pattern of chitosan acetate films
complexed with different concentration of
Lithium Iodide exhibit an amorphous hump
around 20º as shown in Fig.9. It is evident
from the spectra, that the chitosan acetate – Li I
complex can be concluded as amorphous due the
absence of any characteristic X-ray diffraction
peaks. From the JCPDS card 01-0532, it is
identified that the peak position at 24.85o
(111)
corresponds to maximum intensity reflection of
LiI. The characteristic peak of LiI merged with
characteristic peaks of chitosan acetate even for
lower concentration shows the complete
dissolution of LiI salt in the chitosan acetate
solution as seen in the spectra. The absence of
peaks in the XRD as addition of LiI indicates
strong evidence for the formation of complexation
between the salt and the chitosan polymer.
Puteh et al., (2005) observed a similar result with
Lithium trifluoromethane sulfonimide (LiTFSI) as
doping salt and chitosan as host polymer.
Comparing LiI peak with the peaks of chitosan+
Li I samples, a decrease in the 2Θ value can be
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 72 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
observed and it is also an indication of
complexation between the chitosan polymer and
the LiI salt. Similar kind of observations was
reported by Morni and Arof (1999) for chitosan-
lithium triflate electrolyte samples. They also
observed that the chitosan remains amorphous
upon the addition of lithium triflate salt fit with
our observation that shows the reduction of
sharpness of the characteristics amorphous
reflection and the broadening of the area
under the curve.
4. CONCLUSION
The investigations on success of CHA as host
polymer and Li I as a most suitable dopant for
electrolytic applications were confirmed with the
help of IR, UV-Vis and XRD spectroscopic
analyses. The IR study showed the chitosan-salt
interaction and the availability of Li+ for the
conduction process. Optical band gap and Urbach
energy results revealed the existence of defects
states, which are actually responsible for the
increase in the degree of disorder and ion
conduction in the polymer electrolyte. XRD
result supports the increased amorphous phase of
CHA in the presence of LiI, which will favour
intra- and inter-chain ion movement and thus
improve the electrical conduction. A complete
study on ionic conductivity will finalize the
suitability of CHA+LiI system as electrolyte for
battery applications.
ACKNOWLEDGEMENT
The authors would like to thank the authorities of
Avinashilingam University for Women,
Coimbatore and Islamiah College, Vaniyambadi
for their support to carry out this work.
REFERENCES
[1] Ayisha Begam, A., Rugmini Radhakrishnan
and Prem Nazeer, K (2011), ‗Study of
Structure-Property Relationship on Sulfuric
Acid Crosslinked Chitosan Membranes‘,
Malaysian Polym. J., 6(1): 27-38.
[2] Kaneko, H; Miura, Y; Kaneko, M and
Tokura, S (1997), Brine, C.J; Sanford, P.A
and Zikakis, J.P (Ed), ‗Advances in chitin
and chitosan‘, Elsevier Applied Science,
UK, 588.
[3] Linden, D and Reddy, T. B (2002),
‗Handbook of Batteries‘, MacGraw Hill
Publishers, London.
[4] Miller, A and Abrahams, E (1960),
‗Impurity conduction at low concentrations‘,
Phys. Rev., 120, 3, 745-755.
[5] Mohamed, N.S., Subban, R.H.Y. and
Arof, A.K (1995). ‗ Polymer batteries
fabricated from lithium complexed
acetylated chitosan‘, J. Power Sources,
56:153-156.
[6] Morni, M.N and Arof, A.K (1999),
‗Chitosan–lithium triflate electrolyte in
secondary lithium cells Journal of Power
Sources‘, 77, 42-48.
[7] Morni, N.M., Mohamed, N.S.and Arof,
A.K(1997).‘ Silver nitrate doed chitosan
acetate films and electrochemical cell
performance‘, Mater. Sci. Eng. B, 45:
140-146.
[8] Mott, N.F (1969), ‗Conduction in non-
crystalline materials III Localized states in a
pseudo gap and near extremities of
conduction and valence bands‘, J. Non-
crystalline Solid, 19, 160, 835-851.
[9] Mott, N.F and Davis, E.A (1979),
‗Electronic Processes in Non – Crystalline
Materials‘, Clarendon Press, Oxford.
[10] Muzzarelli, R.A.A (1973), ‗Natural
chelating polymers‘, Pergamon Press Ltd,
London.
[11] Muzzarelli, R.A.A (1977), ‗Chitin‘,
Pergamon Press, Oxford.
[12] Nazri, G and Gianfranco Pistoia (Eds)
(2004), ‗Lithium batteries-Science and
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 73
IJSER © 2012
http://www.ijser.org
Technology‘, Kluwer Academic Publishers,
London.
[13] Osman, Z and Arof, A.K (2003), ‗FTIR
studies of chitosan acetate based polymer
electrolytes‘, Electro chimica Acta, 48, 993-
999.
[14] Puteh, R; Yahya, M.Z.A; Ali, A.M.M;
Sulaiman, M.A and Yahya, R (2005),
‗Conductivity studies on chitosan-based
polymer electrolytes with lithium salts‘,
Indonesian Journal of Physics 16, 1, 17-19.
[15] Sasikala, U; Naveen Kumar, P; Rao,
V.V.R.N and Sharma, A.K (2012),
‗Structrual, Electrical and Parametric
Studies of a PEO based Polymer Electrolyte
for Battery Applications‘, Int. J. Engg. Sci.
& Adv. Tech., 2, 3, 722-730.
[16] Subban, R.H.Y, Arof, A.K.and
Radhakrishna, S(1996).‘Polymer
batteries with chitosan electrolyte mixed
with sodium perchlorate‘, Mater.
Sci.Eng.B, 38:156-1 60.
[17] Tauc, J (1974), ‗Amorphous and Liquid
Semiconductor‘, Plenum press, New York.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 74 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
Some Operations and Relations over
Intuitionistic Fuzzy Sets of Root Type
R. Srinivasan
Abstract - In this paper, we define some Operations and relations over Intuitionistic Fuzzy Sets of Root Type and give some properties.
Index Terms - Intuitionistic Fuzzy Set (IFS), Intuitionistic Fuzzy Set of Second Type (IFSST), Intuitionistic Fuzzy Set of Root Type (IFSRT).
—————————— ——————————
1. INTRODUCTION
UZZY sets were introduced by Lofti A. Zadeh
in 1965 as a generalization of classical (Crisp)
sets. Further the Fuzzy Sets are generalized by
Krassimir T. Atanassov in which he has taken
non-membership values also into consideration
and he introduced IFS and its extension IFSST.
Following the definition of IFS, the authors
introduced the IFSRT. In this paper, we define
some Operations and relations over IFSRT and
state few of their properties.
2. PRELIMINARIES
In this section, we give some definition of various
types of IFS.
Definition: 2.1 Let X be a non empty set. An IFS
A in X is defined as an object of the form.
, ( ), ( ) :A AA x x x x X
where the functions : [0,1]A X and
: [0,1]A X denote the membership and non-
membership function of A respectively and
0 ( ) ( ) 1A Ax x for each .x X
Remark:2.2 An ordinary fuzzy set can also be
generalized as
, ( ),1 ( ) :A Ax x x x X
———————————
R. Srinivasan is serving in the Department of Mathematics, Islamaih
College, Vaniyambadi, India. E-mail: [email protected]
Definition: 2.3 Let X be a non-empty set.
An Intuitionistic Fuzzy Set of Second Type
(IFSST) A in X is defined as an object of the form
, ( ), ( ) : ,A AA x x x x X
where the functions : [0,1]A X and
: [0,1]A X denote the degree of membership
and degree of non-membership functions of A
respectively, and 2 20 [ ( )] [ ( )] 1,A Ax x
for each x X .
Remark: 2.4. It is obvious that for all real
numbers a, b [0,1] if 0 1a b then 2 20 1a b
Definition: 2.5 Let X be a non-empty set. An
Intuitionistic Fuzzy Set of Root Type (IFSRT) A
in X is defined as an object of the form
, ( ), ( ) : ,A AA x x x x X
where the functions : [0,1]A X and
: [0,1]A X denote the degree of membership
and degree of non-membership functions of A
respectively, and
1 10 ( ) ( ) 1
2 2A Ax x
F
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 75
IJSER © 2012
http://www.ijser.org
for each x X
Definition 2.6Let X be a non-empty set. Let A
and B be two IFSRTs such that
, ( ), ( ) :A AA x x x x X
, ( ), ( ) :B BB x x x x X
We define the following relations and operations.
(i) A ⊂B if and only if
( ) ( ) ( ) ( ),A B A Bx x and x x
for all x in X
(ii) A B if and only if
( ) ( ) ( ) ( ),A B A Bx x and x x
for all x in X
(iii) A B if and only if
( ) ( ) ( ) ( ),A B A Bx x and x x
for all x in X
(iv)
,max( ( ), ( )),:
min ( ( ), ( ))
A B
A B
x x xA B x X
x x
(v)
,min( ( ), ( )),:
max ( ( ), ( ))
A B
A B
x x xA B x X
x x
(vi)
, ( ) ( )
( ) ( ), :
( ) ( )
A B
A B
A B
x x x
A B x x x X
x x
(vii) The complement of A is defined by
__
, ( ), ( ) :A AA x x x x X
Definition: 2.7 The degree of non-determinacy
(uncertainty) of an element x X to the IFSRT A
is defined by
2
( ) 1 ( ) ( )A A Ax x x
Definition: 2.8 For every IFSRT A, we define the
following operators.
The Necessity measure on A.
2, ( ), (1 ( )) : .A AA x x x x X
The Possibility measure on A,
2
, 1 ( ) , ( ) : .A AA x x x x X
Definition: 2.9 For every two IFSsRT A and B,
we define the following relations.
(i)
( ) ( ), ,
2@ :
( ) ( )
2
A B
A B
x xx
A B x Xx x
(ii)
, ( ). ( ) ,$ :
( ). ( )
A B
A B
x x xA B x X
x x
It is easy to verify the correctness of the defined
relations.
3. PROPERTIES
In this section, we give some properties.
Proposition: 3.1 For every IFSsRT A and B, we
have
(i) A @ A = A
(ii) A $ A = A
(iii) __ __
@ @A B A B
(iv) __ __
$ $A B A B
Proposition: 3.2 For every IFSsRT A, B and C,
we have
(i) ( )@ ( @ ) ( @ )A B C A C B C
(ii) ( )@ ( @ ) ( @ )A B C A C B C
(iii) ( )@ ( @ ) ( @ )A B C A C B C
(iv) ( )$( ) $A B A B A B
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 76 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
Proposition: 3.3 For every IFSsRT A and B, we
have
(i) ( @ ) @A B A B
(ii) ( $ ) $A B A B
(iii) ( @ ) @A B A B
(iv) ( $ ) $A B A B
4. CONCLUSION
We have made an attempt to establish some
operations and relations over IFSsRT. It is still
open to check whether there exist an IFSRT in
case of the operators already defined on an IFS.
REFERENCES
[1] Atanassov, K.T.(1999), Intuitionistic Fuzzy
Sets, theory and Applications, Springer–
Verlag, New York.
[2] Parvathi, R. and Palaniappan, N. (2004) Some
operations on IFSets of Second type, Notes on
Intuitionistic Fuzzy Sets, 10(2), 1 – 19.
[3] Srinivasan, R. and Palaniappan, N. (2006)
Some operations on intuitionistic fuzzy sets of
Root type. Notes on IFS 12(3), 20 – 29.
[4] Srinivasan, R. and Palaniappan, N. (2009)
Some properties of Intituitionstic Fuzzy Sets
of Root Type International Journal of
Computational and Applied Mathematics, 4(3)
pp.383-390.
[5] Srinivasan, R. and Palaniappan, N. (2011)
SomeTopological Operators on Intuitionistic
Fuzzy Sets of Root Type, Research methods in
Mathematical sciences, Edited by Dr.
U.Rizwan, 4 pp23-28 India.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 77
IJSER © 2012
http://www.ijser.org
Generalized Hyers-Ulam Stability of the Geometric Mean Functional Equation in Two
Variables
K. Ravi and B.V. Senthil Kumar
Abstract - In this paper, we find the solution and prove the generalized Hyers-Ulam stability of the geometric mean functional equation in two
variables. We also provide counter-example for singular case.
Index Terms - Functional equation, Quadratic functional equation, Generalized Hyers-Ulam stability.
—————————— ——————————
1. INTRODUCTION
N 1940, S. M. Ulam [10] raised the question
concerning the stability of group
homomorphisms. In the year 1950, Aoki [2]
generalized the Hyers theorem for additive
mappings. In the year 1978, Th. M. Rassias [9]
provided a proof of the stability of the linear
mapping by permitting the Cauchy difference to
become unbounded. In the year 1982, J. M.
Rassias [7] proved a similar result when the
unbounded Cauchy difference is bounded by a
product of powers of norms. Since then, the
stability problems of various functional equations
have been extensively investigated by a number of
authors ([3], [5], [6]). The terminology
generalized Hyers-Ulam stability originates from
these historical backgrounds.
Recently, K. Ravi and B. V. Senthil Kumar [8]
investigated the generalized Hyers-Ulam stability
of generalized square root functional equation
1
1 1 1
1
2p p p
i i i j i j
i i j i
p
i i
i
s x x x
s x
(1.1)
——————————————
K. Ravi is serving in the Department of Mathematics, Sacred Heart
College, Tirupattur, India. E-mail: [email protected]
B. V. Senthil Kumar is serving in the Department of Mathematics, C. Abdul Hakeem College of Engineering and Technology, Melvisharam, India. E-mail : [email protected]
for arbitrary but fixed real numbers
1 2, ,..., (0,0,...,0)p
so that
1
1
0 ... 1p
p i
i
and :s X Y with X and Y are the sets of non-
negative real numbers. The square root mapping
( )s x x is a solution of the functional equation
(1.1). Moreover, if we substitute
1 2 3 41, ... 0p
and 3 4 ... 0px x x
in equation (1.1), we obtain the 2-dimensional
square root functional equation
2 ( ) ( ).s x y xy s x s y (1.2)
In this paper, we obtain the solution and
investigate the generalized Hyers-Ulam stability
of the geometric mean functional equation in two
variables of the form
2 , 2
( , ) ( , ) ( , ) ( , )
G x u xu y v yv
G x y G x v G u y G u v
(1.3)
which originates from the geometric mean of two
non-negative real numbers x and .y The function
( , )G x y xy
is a solution of the functional equation (1.3). The
above mapping represents the geometric mean of
x and .y
I
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 78 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
The following Definition 1.1 is useful for the
proof of the main results in the paper.
Definition. 1.1. Let X be the space of non-
negative real numbers. A mapping :G X X
defined by
( , )G x y xy
is called 2-variable geometric mean mapping if it
satisfies the functional equation (1.3). The
functional equation (1.3) is called geometric mean
functional equation.
For convenience, let us denote
( , , , )
2 , 2
( , ) ( , ) ( , ) ( , ).
G x u y v
G x u xu y v yv
G x y G x v G u y G u v
Throughout this paper, let X be the space of non-
negative real numbers.
2. SOLUTION OF FUNCTIONAL EQUATION (1.3)
Theorem 2.1. A mapping :G X X satisfies
(1.3) if and only if there exists an identity mapping
:I X such that
( , ) ( ) ( ),G x y I x I y for all , .x y X
Proof. Let ( , )G x y be a solution of (1.3). Define
1( ) ( , ),G x G x x for all .x X
It is easy to verify that 1G is an identity mapping.
We denote the identity mapping by ( ).I x That is,
1( ) ( ),I x G x for all .x X Hence
( ) ( ) ( , ),I x I y xy G x y
for all , .x y X
Conversely, assume that there exists an identity
mapping :I X such that
( , ) ( ) ( ),G x y I x I y
for all , .x y X Hence
2 , 2
2 2
G x u xu y v yv
I x u xu I y v yv
( ) ( ) ( ) ( )
( ) ( ) ( ) ( )
I x I y I x I v
I u I y I u I v
( , ) ( , ) ( , ) ( , )G x y G x v G u y G u v
for all , , , ,x u y v X which completes the proof of
Theorem 2.1.
3. A RELATION BETWEEN
FUNCTIONAL EQUATIONS (1.2) AND (1.3)
Theorem 3.1. Let :s X be a mapping
satisfying (1.2) and :G X X be a mapping
defined by
( , ) ( ) ( )G x y s x s y (3.1)
for all , .x y X Then G satisfies (1.3).
Proof. Replacing ( , )x y by
2 , 2x u xu y v yv
in (3.1) and using (1.2), we obtain
2 , 2G x u xu y v yv
2 2s x u xu s y v yv
[ ( ) ( )][ ( ) ( )]s x s u s y s v ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( )s x s y s x s v s u s y s u s v
( , ) ( , ) ( , ) ( , ).G x y G x v G u y G u v
Hence G satisfies (1.3), as desired.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 79
IJSER © 2012
http://www.ijser.org
4. GENERALIZED HYERS - ULAM
STABILLITY FUNCTIONAL EQUATION (1.3)
Theorem 4.1. Let :G X X be a mapping
for which there exists a mapping
: X X X X with the condition
lim4 4 ,4 ,4 ,4 0n n n n n
nx x y y
(4.1)
such that the functional inequality
| ( , , , ) | ( , , , )G x u y v x u y v (4.2)
holds for all , , , .x u y v X Then there exists a
unique 2-variable geometric mean mapping
:g X X R satisfying the functional equation
(1.3) and
1
0
| ( , ) ( , ) |
14 ,4 ,4 ,4
4
i i i i
ii
g x y G x y
x x y y
(4.3)
for all , .x y X The mapping ( , )g x y is defined
by
( , ) lim 4 4 ,4n n n
ng x y G x y
for all , .x y X
Proof. Replacing ( , , , )x u y v by ( , , , )x x y y in (4.2)
and dividing by 4, we obtain
1 1(4 ,4 ) ( , ) ( , , , ).
4 4G x y G x y x x y y
(4.4)
Now, replacing ( , )x y by (4 ,4 )x x in (4.4), dividing
by 4 and summing the resulting inequality with
(4.4), we arrive
2 2
2
1
10
14 ,4 ( , )
4
14 ,4 ,4 ,4 .
4
i i i i
ii
G x y G x y
x x y y
Proceeding further and using induction on a
positive integer ,n we get
1
10
4 4 ,4 ( , )
14 ,4 ,4 ,4
4
n n n
ni i i i
ii
G x y G x y
x x y y
10
14 ,4 ,4 ,4
4
i i i i
ii
x x y y
(4.5)
for all , .x y X In order to prove the convergence
of the sequence
4 4 ,4 ,n n nG x y
replacing ( , )x y by 4 ,4p px y in (4.5) and
multiplying by 4 ,p we find that for 0n p
4 4 ,4 4 4 ,4
4 4 4 ,4 4 ,4
n p n p n p p p p
p n n p n p p p
G x y G x y
G x y G x y
10
14 ,4 ,4 ,4
4
p i p i p i p i
p ii
x x y y
0asp .
This shows that the sequence
4 4 ,4n n nG x y
is a Cauchy sequence. Taking n tending to
infinity in (4.5), we obtain (4.3). To show that g
satisfies (1.3), replacing ( , , , )x u y v by
4 ,4 ,4 ,4n n n nx u y v in (4.2) and multiplying by
4 ,n we obtain
4 4 ,4 ,4 ,4
4 4 ,4 ,4 ,4 .
n n n n n
n n n n n
G x u y v
x u y v
(4.6)
If we suppose n approaches infinity in (4.6), it
follows that g satisfies (1.3) for all , , , .x u y v X
To prove that g is a unique 2-variable geometric
mean mapping satisfying (1.3), let :h X X
be another 2-variable geometric mean mapping
which satisfies (1.3) and the inequality (4.3).
Clearly h and g satisfy (1.3) and using (4.3), we
get
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 80 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
| ( , ) ( , ) |
4 4 ,4 4 ,4n n n n n
h x y g x y
h x y g x y
4 ,4 4 ,44
4 ,4 4 ,4
n n n n
n
n n n n
h x y G x y
G x y g x y
0
14 ,4 ,4 ,4
2
n i n i n i n i
i
x x y y
(4.7)
for all , .x y X Allow n in (4.7) and using
(4.1), we find that g is the unique such mapping.
Theorem 4.2. Let :G X X be a mapping
for which there exists a function
: X X X X with the condition
1 1 1 1lim 4 4 ,4 ,4 ,4 0n n n n n
nx x y y
(4.8)
such that the functional inequality
| ( , , , ) | ( , , , )G x u y v x u y v (4.9)
holds for all , , , .x u y v X Then there exists a
unique 2-variable geometric mean mapping
:g X X R satisfying the functional equation
(1.3) and
1 1 1 1
0
| ( , ) ( , ) |
4 4 ,4 ,4 ,4i i i i i
i
G x y g x y
x x y y
(4.10)
for all , .x y X The mapping ( , )g x y is defined
by
( , ) lim 4 4 ,4n n n
ng x y G x y
for all , .x y X
Proof. Substituting
( , , , ) , , ,4 4 4 4
x x y yx u y v
in (4.9) and proceeding by similar arguments as in
Theorem 4.1, the proof is complete.
Corollary 4.3. If a mapping :G X X
satisfies the functional inequality
1 1
2 2
4 43 3
4 4
4 4
| ( , , , ) |
| | | | | | | | for p 1,k 0
1| | | | | | | | for , 0
2
| | | | | | | |1
for , 0| | | |4
| | | |
1| | | | | | | | for , 0
2
p p p p
a a b b
p p p p
G x u y v
k x u y v
k x u y v a b k
x u y v
k kx u
y v
k x u y v p k
(4.11)
for all , , , .x u y v X Then there exists a unique 2-
variable geometric mean mapping :g X X
satisfying the functional equation (1.3) and
1
2 22
2
2 2
3
4 44
4
2
| ( , ) ( , ) |
2| | | | for 1
4 4
1| | | | for
24 4
| | | | 1for
42 | | | |4 4
4 1| | | | for
24 4
p p
p
a b
p p
p
g x y G x y
kx y p
kx y a b
x yk
x y
kx y p
for all , .x y X
Proof. If we choose
1
2
3 4 4 4 4
4
| ( , , , ) |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
p p p p
a a b b
p p p p
x u y v
k x u y v
k x u y v
x u y vk
x u y v
k x u y v
for all , , , ,x u y v X in Theorems 4.1 and 4.2, it
easy to prove the required results.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 81
IJSER © 2012
http://www.ijser.org
5. COUNTER - EXAMPLE
The following Example 5.1 illustrates the fact that
the functional equation (1.3) is not stable for
1
2p in the fourth inequality of (4.11) in
Corollary 4.3.
Example 5.1. Let : X X be a function
defined by
for , (0,1)( , )
otherwise
xy x yx y
where is a constant, and define a function
:G X X by
0
4 ,4( , ) ,
4
n n
nn
x yG x y
for all , .x y X
Then the function G satisfies the inequality
1 1 1 1
2 2 2 2
| ( , , , ) |
80| | | | | | | |
3
G x u y v
x u y v
(5.1)
for all , , , .x u y v X Therefore there do not exist a
2-variable geometric mean mapping
:g X X and a constant 0 such that 1 1
2 2| ( , ) ( , ) | | | | |g x y G x y x y (5.2)
for all , .x y X
Proof.
0
0
1
( , ) |
4 , 4
4
11
4
4.
3
4
n n
nn
nn
G x y
x y
Hence G is bounded by 4
.3 If
1 1 1 1
2 2 2 21
| | | | | | | | ,4
x u y v
then the left hand side of (5.1) is less than 20
.3
Now, suppose that 1 1 1 1
2 2 2 21
0 | | | | | | | | .4
x u y v
Then there exists a positive integer k such that
1 1 1 1
2 2 2 21
1 1| | | | | | | | .
4 4k kx u y v
(5.3)
Hence 1 1 1 1
2 2 2 21
| | | | | | | |4k
x u y v
implies 1 1 1 1
2 2 2 2 2 24 4 1k k
x u y v
or 1 1 1 1
2 2 2 2 2 2 2 24 4 1, 4 4 1k k k k
x u y v
or
1 1 1 1
2 2 2 2 2 2 2 24 1, 4 1, 4 1, 4 1k k k k
x u y v
or 1 1
2 2
1 1
2 2
1 1
2 2
1 1
2 2
14 ,
2
14 ,
2
14 ,
2
14
2
k
k
k
k
x
u
y
v
and consequently
1 1
1 1
1
1
4 ( ), 4 ( ),
4 ( ), 4 ( ),
4 2 ,
4 2 (0,1).
k k
k k
k
k
x u
y v
x u xu
y v yv
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 82 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
Therefore, for each value of 0,1,2,..., 1,n k we
obtain
4 ( ), 4 ( ),
4 ( ), 4 ( ),
4 2 ,
4 2 (0,1)
n n
n n
n
n
x u
y v
x u xu
y v yv
and
4 2 ,4 2
4 ,4 4 ,4
4 ,4 4 ,4 0
n n
n n n n
n n n n
x u xu y v yv
x y x v
u y u v
for 0,1,2,..., 1.n k Using (5.3) and the
definition of ,G it is easy to prove the inequality
(5.1) holds true.
We claim that the geometric mean functional
equation (1.3) is not stable for 1
2p in the fourth
inequality of (4.11) of Corollary 4.3.
Assume that there exists a 2-variable geometric
mean mapping :g X X satisfying (5.2).
Therefore, we have
1 1
2 2| ( , ) ( 1) | | | | .G x y x y (5.4)
However, we can choose a positive integer m
with 1.m If 10,4 ,mx then 4 (0,1)n x
for all 0,1,2,..., 1n m and therefore
0
1
0
( , )
4 , 4
4
4
4
( 1)
n n
nn
nm
nn
G x y
x y
xy
m xy
xy
which contradicts (5.4). Therefore, the geometric
mean functional equation (1.3) is not stable for
1
2p in the fourth inequality of (4.11) in
Corollary 4.3.
REFERENCES
[1] J. Aczel and J. Dhombres, Functional
Equations in Several Variables, Cambridge
Univ. Press, 1989.
[2] T. Aoki, On the stability of the linear
transformation in Banach spaces, J.
Math.Soc. Japan, 2(1950), 64-66.
[3] S. Czerwik, Functional Equations and
Inequalities in Several Variables, Wolrd
Scientific Publishing Company, Singapore,
New Jersey, London, 2002.
[4] D.H. Hyers, On the stability of the linear
functional equation, Proc. Nat. Acad. Sci.
U.S.A., 27(1941), 222-224.
[5] D.H. Hyers, G. Isac and Th.M. Rassias,
Stability of Functional Equations in Several
Variables, Birkhauser, Baston, Basel, Berlin,
1998.
[6] S.M. Jung, Hyers-Ulam-Rassias stability of
Functional Equations in Mathematical
Analysis, Hadronic Press Inc. Florida, 1994.
[7] J.M. Rassias, On approximation of
approximately linear mappings by linear
mappings, J. Funct. Anal. 46(1982), 126-130.
[8] K. Ravi and B.V. Senthil Kumar, Rassias
stability of generalized square root functional
equation in several variables, Int. J. Math.
Sci. Engg. Appl.3(III)(2009), 35-52.
[9] Th.M. Rassias, On the stability of the linear
mapping in Banach spaces, Proc. Amer.
Math. Soc. 72 (1978), 297-300.
[10] S.M. Ulam, Problems in Modern
Mathematics, Chapter VI, Wiley-Interscience,
New York, 1964.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 83
IJSER © 2012
http://www.ijser.org
Establishment of an efficient drug from simple hydrocarbon - Thiotepa, and evaluation of similar molecules using
the enzyme Cytochrome
P. K. Mohamed Imran
Abstract - A number of in-vitro and in-vivo studies have been conducted to establish the pharmacological and metabolic activity of the
anti-cancer drug, thiotepa, Triethylenethiophosphoramide (TTP). All have discussed on the efficacy and side effects of the drug.
Some have reported it as an alkylating agent capable of breaking the DNA strands along with some mechanism and others have
established it as an effective inhibitor of an enzyme of Cytochrome family, CYP2B6. The latter study was found to have profound
effect on the metabolic activity of the human body. A theoretical study is established to provide essential insight into the nature of the
ligands as well as the enzyme. Descriptive properties such as Global hardness, softness, Fukui function and electrophilicity index
were computed. Docking was performed using Lamarckian Genetic Algorithm and the interactions of the ligand with the
macromolecule were visualized, correlated with the descriptive properties. This was helpful in establishing the effectiveness of a drug
analogue that might help in deciding the toxicity, side effects or promiscuousness of this type of drug.
Index Terms – in-vitro, in-vivo, TTP, Thiotepa, cyp2b6, Docking.
—————————— ——————————
1. INTRODUCTION
ITH regard to human body, small molecules
are foreign molecules, called as xenobiotics
that attempt to deal with a number of responses.
Some drugs are excreted from the human body
intact. Most drugs, however, need to be modified
structurally to facilitate excretion. The
modification process has been termed drug
metabolism. An ideal drug should reach the site
of action intact, cure the disease before it leaves
the body completing the mission. A drug is
actually something that is not needed by a normal
healthy human body. Hence the study of drug
metabolism should serve two purposes: to
elucidate the function and fate of the drug, and to
manipulate the metabolic process of the potential
drug [1].
1.1 Thiotepa as a promiscuous drug
A very common drug for anti cancer that has been
studied by many researchers is Thiotepa (tri-ethyl-
enethio-phosphoramide). In-vivo Metabolic and
——————————————
P. K. Mohamed Imran is serving in the Department of Chemistry,
Islamiah College , Vaniyambadi, India.
pharmacokinetic activity study revealed that
thiotepa is a moderate inhibitor of cytochrome
P450 3A4 and 2B6 isoenzyme [2]. Thiotepa was
studied clinically over several patients and the
bigger challenge was its clearance from the human
body after metabolism. The role of purified
human Glutathione S-Transferase (GST) on the
formation of mono glutathionyl thiotepa was
studied using HPLC and the results showed that
the aziridine moieties in thiotepa were substrates
for the GST and the conclusion was that in GST
catalyzation of glutathione, conjugation of
thiotepa might prove to be an important factor in
the development of drug [3].
In another intravenous study on women with
metastatic adenocarcinoma of the breast the
researchers found a patterned hyper pigmentation
confined to skin occluded by adhesive containing
material. The results suggested that this
alkylating agent is excreted onto the skin surface
in sweat, accumulates beneath adhesive-
containing bandages and electrocardiogram pads,
and exerts a local toxic effect resulting in
hyperpigmentation [4]. The thiotepa metabolite
triethylene phosphoramide was found to
hydrolyze significantly faster than thiotepa. The
authors established that the cytotoxic effects of
thiotepa were oxygen dependent and might
W
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 84 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
involve metabolic processes catalyzed by
cytochrome P-450 enzymes [5].
1.2. The enzyme containing heme
Cytochrome P4502B6 [6] is a genetically
polymorphic enzyme that is important in the
metabolism of a number of clinically used drugs
[7]. This is the least studied enzyme in its class.
Cytochromes contain iron bound with four N
atoms attached to protein molecules, a group
called the heme group. The iron ions in
cytochrome are capable of gaining and losing
electrons to produce Fe2+
and Fe3+
, respectively.
Interference with the action of cytochromes is an
important mode of the action of some toxicants.
Cyanide ion, CN–, has a strong affinity for Fe
3+ in
ferricytochrome, preventing it from reverting back
to the Fe2+
form, thus stopping the transfer of
electrons to O2 and resulting in rapid death in the
case of cyanide poisoning [8]. The toxicity of
other similar drugs as the CYP2B6 does not
affectively metabolise was well brought out in a
in-vitro study by Hamaska et al. [9]. This
information can be used for docking studies as
well as more complex calculations.
1.3. The Docking of drug and enzyme
The exact mechanism of action of thiotepa drug
and the inhibition of the cytochrome by this drug
has so far been not yet studied at either the ab-
initio or the DFT level of computation. The
advent of molecular docking studies and the
concept of ‗promiscuousnesses of a drug‘ should
open the discussion on a wider spectrum and help
establish the mechanism by which this drug
works. Another reason for not making a docking
study so far has been the unavailability of the
crystal structure of the enzyme CYP2B6 at the
PDB or any other databank. Though many closer
models such as those of CYP2B4 and CYP2C6
have been successfully achieved and other formats
like sequence, fasta and xml were available, the
Protein Data Bank (PDB) [11] format is the one
that was required for docking purpose. The
crystal structure of CYP2B6 was obtained after a
loop from CYP2C5 was modified [12]. The
binding site consisted of three main pockets
(Fig. 2). Pocket A was the heme pocket formed by
the side chains of Ala298, Thr302, Leu63 and
Phe206.
Fig. 1. The general structure of the molecule
under study. Local properties were
studied for R8 and R19 atoms
Fig. 2. Cytochrome CYP2B6 - heme group at the
centre, which is also the docking site
of the drug. The grid for docking
was chosen around this area.
Genetic algorithms (GAs) are a class of
optimisation methods that are based on various
computational models of Darwinian evolution
[13, 14]. Genetic and evolutionary algorithms can
be used to perform protein–ligand docking [15].
2. THEORETICAL BACKGROUND
The Hohenberg-Kohn theorem [16] is used to
calculate the ground state energy of an atom or
molecule using the electron density as
][)()(][ HKFdrrvrE
where ν(r) is the external potential with
][][][ eeHK VTF
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 85
IJSER © 2012
http://www.ijser.org
FHK is the universal Hohenberg–Kohn functional,
which comprises of electronic kinetic energy
functional (T[ρ]) and electron-electron interaction
functional (Vee [ρ]). The first and second partial
derivatives of E[ρ], with respect to the number of
electrons N under the constant external potential
v(r), are defined as the chemical potential (μ) and
the global hardness η of the system, respectively
[17]. The global softness (GS) is the half inverse
of the hardness. The global descriptor of hardness
has been known as an indicator of the overall
stability of the system.
The finite difference approximation [18] for the
computation of chemical potential and hardness, is
given as μ = -(IP + EA)/2 and η = (IP - EA)/2,
respectively, where IP and EA are the first vertical
ionization energy and electron affinity of chemical
species respectively. Using koopmans'
approximation [19] the equations have been
defined as μ = (ELUMO + EHOMO) / 2 and η =
(ELUMO - EHOMO) / 2, where EHOMO and ELUMO are
the orbital energies of highest occupied molecular
orbital and lowest unoccupied molecular orbital of
the N electron system respectively.
AutoDock 4.2 uses free-energy scoring functions
that is based on a linear regression analysis, the
AMBER force field [20], and an even larger set of
diverse protein-ligand complexes with known
inhibition constants. It uses an empirical binding
free energy force field that allows the prediction
of binding free energies, and hence binding
constants, for docked ligands. A general equation
for this is:
ΔG = ΔGvdw + ΔGhbond + ΔGelec +ΔGconform +ΔGtor + ΔGsol
The ΔGs are determined via multiple linear
regression.
3. METHODOLOGY AND COMPUTATIONAL
DETAILS
The molecules were first subjected to molecular
mechanics correction and later optimised using
the MOPAC [21] software at the RM1 level.
These optimized geometries were then used to
arrive at higher basis set geometries such as RHF
3-21G, 3-21 G*, Moller Plasset Second order
(MP2) 6-31, 6-31 d and subsequently at the DFT
level using Double Zeta Valence d+ basis set
(DZV d+) at the Becks' 3 Parameter and Lee Yang
Parr method (B3LYP) using GAMESS [22]. To
obtain electronic population analyses of all the
atoms Mulliken [23], Lowdin [24] and Natural
Population Analysis [25] were done.
The optimized geometry using DZV method was
used for docking purpose. The crystal structure of
Cytochrome CYP2B6 was obtained from Juregen
Pleiss [29]. Water molecules were completely
excluded from the receptor for the study. The
suitable programme selected for the docking study
was AutoDock 4.2 [26] using the MGL Tools
interface [27] that ran on the Cygwin [28], a Unix
like interface running on windows. The target
protein was kept rigid and the ligand was kept
flexible. Kollman charges [29] were assigned to
the ligand and polar hydrogen atoms were added
to the receptor PDB file. The heme protein was
considered as a place for docking or binding.
Ligands were assigned Gasteiger charges [30] by
the program and the non-polar hydrogens were
merged. As AutoDock required pre-calculated
grid maps, one for each atom time, present in the
ligand being docked the same was assigned. The
grid was centered near the heme protein and
closer to F-helix (Fig. 2). For this purpose the
grid box size was kept at 80, 80, 80 Ao (x,y,z).
The dockings were run on a dual core AMD
machine.
4. RESULTS AND DISCUSSION
The general structure of the molecule is given in
Fig. 1. The best docked configurations for the
ligands from the docked results were used to
calculate interaction energies. The binding energy
score is given in Table 6.1 which shows many
favourable values other than for thiotepa itself
(TTP10). Some of them had not docked and
interactions were absent. TTP1 had the highest
score, but it was simply positioned in the gorge of
the receptor without any interaction, at a distance
of about 3.616 Ao from the Fe atom in heme
protein with one of the Cyclopropane (CP) ring
directed towards it. Being non-polar it perhaps did
not favour binding to the enzyme. It showed
minimum negative surface potential (Vs,max= -
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 86 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
0.0332) from ESP measurements done in the
previous section. With the introduction of the N-
atom the CP ring was oriented away from the
heme and one of the CP ring without N atom was
at a distance of about 4.541 Ao (Fig. TTP2).
Further introduction of the N-atom lead to the
same thing; orientation of the N-atom contained
CP ring away from the heme group , but at a
distance of about 4.384 Ao (Fig. TTP3). The
incorporation of the third N-atom made the
molecule symmetrical and the distance from the
Fe atom to the ligand became 15.162 Ao. The
molecule was found drifted away from the heme
molecule. Another strand of protein was found in
between the ligand and the heme. This was
evident from the fact that TTP3 & 4 had higher
range of ESP values than TTP10 and had lower
binding energy values lower than TTP10 which
had a (Vs,max) value of -0.1, interestingly, as it can
be taken as standard. Some significant
interactions were found for TTP10. The C of
CP was at a distance of about 3.453 Ao with Fe-
heme. The S atom (R19) was at a distance of
about 6.177Ao from Fe-heme and was found
closer to the heme protein residue.
TTP 3,6,11 and 12 were just above TTP10s‘ Vs,max
value. The docking scores were not in that order.
Hence molecular descriptor values can be made
accountable for the observed property. Drift
towards the heme molecule was found for all
excepting TTP1 as all these molecules are
conceptual and for the same there is a reason that
mere inclusion of N and P atoms does not make
the molecule a better place for being consideration
as an effective drug. TTP11 has the maximum
negative surface potential (-0.12), a good surface
potential range (0.1817) and has a good score
from docking too. The Fe-CP distance was about
6.689Ao and the oxygen atom attached to P (P=O)
was at a distance of about 5.502 Ao. To the lower
end of the heme molecule this O had interaction at
a distance of about 4.249Ao and can be considered
for studies. But this molecule had higher
electrophilicity (ω=0.0057 and 0.0672 at MP2 and
DFT respectively) values which would mean that
this molecule might prove to be toxic. This may
be due to the presence of Oxygen atom. The
TTP11 has the highest ω+ values, which has the
fourth lowest LBE value. The molecule 11 with
P=O in the C3 axis may be considered unfit for the
drug study because of this as it accounts for
toxicity. The values change upon introduction of
N atoms at the base (CP rings). TTP 13, 14, 15
and 16 are the molecules having substituents on
them. The range (ESP) is lower for these than
TTP10, Score higher than TTP10 and Vsmax
higher than the TTP10. The Fe-CP distance was
4.844 A, S-Fe length 4.290 Ao and S-C residue
distance was 5.281 Ao. Fluorine atom was directed
away from the heme molecule (Fig. TTP13).
Another interesting interaction was found between
the C to which O is attached within the heme and
the P atom was found at 3.907Ao. The molecule
appears to be in the midst of many interactions.
If the local philicity is considered for atom 19
(R19), the highest ω- value is shown by TTP7,
that has a P atom in it. TTP6 has the highest ω+
value if the local philicity Index is considered for
atom 8 at MP2 by finite method. The LBE
(lowest binding energy) value is the second
lowest. The first five molecules in the series show
no philicity trend either for ω- or ω+. But the LBE
rises up to molecule four, i.e., when the N atoms
are included. The LBE value drops for TTP5,
when P atom is introduced. It can be inferred here
that the inclusion of N atoms in the CP rings has
no effect on the overall philicity of the molecule
and these do not posses any reactivity property.
However the presence of N atoms is not
favourable for docking too. A look at the Surface
charge, Vs,max values using MEP suggests that all
of them are having values lesser values than
TTP10, and in a peculiar trend. For the first five
molecules as the Vs,max is lowered the LBE raises
and when the potential became higher the LBE
values get lowered. The highest Vs,max potential is
shown by TTP1 which has the highest LBE.
The distance between C of CP (on which NO was
substituted) and Fe-heme was 6.203Ao. These
were the maximum interactions found for any
analogue in the series and hence this molecule
may be tried for an in-vitro study to establish its
efficiency. Quite an opposite type of trend is
found for TTP12. Molecules 13, 14 and 15
provide a favorable trend as good binding ligands
if the ω- values are considered.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 87
IJSER © 2012
http://www.ijser.org
TTP1
TTP2
N
TTP3
NN
TTP4
N
NN
TTP10
P(V)
N
N
N
S
TTP13
N
F
P(V)
N
N
S
TTP14
NCl
P(V)
N
N
S
TTP16
N
N
P(V)N
NS
O
Fig. TTPx, where x=the derivative number;
analogues docked (ball & stick, centre)
with CYP2B6 shown as ribbons
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 88 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
5. CONCLUSION
From the above studies it may be concluded that
for a symmetrical molecule, the heteroatoms at the
principal axis provide a favourable explanation for
change in charges and binding energy upon
docking. That TTP 10 is a good candidate from
the electrophilicity studies, the fluoro and chloro
substituted TTP offer a better ‗performance‘ with
binding energies as far as electrophilicity and
surface charges are considered. The NO
substituent offers a peculiar behaviour and needs
an in-vitro study in view of the biologically
importance of this molecule. This was the only
molecule with maximum closer interactions.
TTP11 and 12 may be considered toxic based on
the electrophilicity values and unfavourable
scores. TTP6 and 15 that have only alkyl group
substituent on R19 and one of the CP rings are
also not favourable. The observation of the
complexes revealed that the alkyl group
substituents are oriented towards the F-heme
protein and those of halogens were quite opposite
to this, i.e. the halo groups oriented away from the
docking site but directed towards the putative
substrate entry. Koopmans' method using MP2
for the electrophilicity offers satisfactory
explanation for these studies, while the DFT fails
to offer plausible explanation of the behaviour of
the molecules of this type.
REFERENCES
[1] Raucy J L, Allen S W; Pharmacogenomics
J., 2001, 1, 3, 178-86.
[2] de Jonge M E, Huitema A D R, Holtkamp
M J, van Dam S M, Beijnen J H, Rodenhuis
S; Cancer Chemother Pharmacol., 2005, 56,
4, 370-8.
[3] Dirven H A, Dictus E L, Broeders N L, van
Ommen B, van Bladeren P J; Cancer Res.,
1995, 15, 55, 8, 1701.
[4] Horn T D, Beveridge R A, Egorin M J,
Abeloff M D, Hood A F; Arch Dermatol.,
1989, 125, 4, 524-7.
[5] Teicher B A, Waxman D J, Holden S A,
Wang Y Y, Clarke L, Sotomayor E A, Jones
S M, Frei E; Cancer Res., 1989, 15, 18, 49.
[6] Code E L, Crespi C L, Penman B W,
Gonzalez F J, Chang T K H, Waxman D J;
Drug Metabol. & Disp., 1997, 25, 8.
[7] Rae J M, Soukhova N V, Hockhart D A,
Desta Z; Drug Metabol. & Disp, 2002, 30,
5, 627, 525-530.
[8] Manahan S E; Toxicological Chemistry and
Biochemistry, 3rd Ed, 2003, Lewis
Publishers, Washington D C.
[9] Hamoka N, Oda Y, Hase I, Asada A; British
Journal of Anesthesia, 2001, 86, 4, 540-544.
[10] Mencher S K, Wang L G; BMC Clinical
Pharmacology, 2005, 5, 3.
[11] Bernstein F C, koetzle T F, Williams G J B,
Meyer E F, Brice M B, Rodgers J R,
Kennard O, Shimanouchi T, Tasumi M ; J.
Mol. Biol., 1977, 112, 535-542.
[12] Bathelt C, Schmid RD, Pleiss J, J Mol
Model, 2002, 8, 327-335.
[13] Goldberg D E; Genetic Algorithms in
Search, Optimization and Machine
Learning, 1989, Addison-Wesley,
Wokingham.
[14] Jones G Genetic and Evolutionary
Algorithms; In: Schleyer P von R, Allinger
N L, Clark T, Gasteiger J, Kollman P A,
Schaefer III H F, Schreiner P R (Ed): The
Encyclopedia of Computational Chemistry,
1998, Chichester, Wiley, p1127–1136.
[15] Oshiro C M, Kuntz I D, Dixon J S; J. Comp.
-Aided Mol. Des., 1995, 9, 113–130.
[16] Hohenberg P, Kohn W; Phys. Rev., 1964,
B136, 864.
[17] Parr R G, Pearson R G; J. Am. Chem. Soc.,
1983, 105, 7512.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 89
IJSER © 2012
http://www.ijser.org
[18] Parr R G, Yang W; DFT of atoms and
molecules, 1989, Oxford University Press,
NY.
[19] Pearson R G J; Chem. Educ., 1987, 64, 561.
[20] Case D A, Cheatham III T E, Darden T,
Gohlke H, Luo R, Merz K M, Onufriev A,
Simmerling C, Wang B, Woods R; J.
Computat. Chem., 2005, 26, 1668-1688.
[21] J J P Stewart; MOPAC, 2007, web: http://
OpenMOPAC.net.
[22] Schmidt M W et al.; GAMESS, J. Comput.
Chem., 1993, 14, 1347.
[23] Mulliken R S; J. Chem. Phys., 1955, 23,
1833.
[24] Löwdin P O; J. Chem. Phys. 1953, 21, 374.
[25] Reed A E, Weinstock R B, Weinhold F; J.
Chem. Phys. 1985, 83, 73.
[26] Morris G M, Goodsell D S, Halliday R S,
Huey R, Hart W E, Belew R K, Olson A J;
J. Comput. Chem., 1998, 19, 1639-1662.
[27] Sanner M F; J. Mol. Graphics Mod., 1999,
17, 57-61.
[28] Cygwin, Version 0.150; Red Hat Inc.,
1.5.19-cr-0x5ef, 2003.
[29] Sing U C, Kollman P A; J. Comp. Chem.,
1984, 5, 129 – 145.
[30] J. Gasteiger, M. Marsili; Tetrahedron, 36,
1980, 3219.
Table 1: The LBE and other parameters from the docking of TTP analogues with CYP2B6
SNo Molecule Lowest
Binding
Energy
LBE
Run
Mean
Binding
Energy
No
in
Cluster
Partition
Function
Q
Free
Energy
A
Internal
Energy
U
Entropy
1 TTP1 -5.63 1 -5.51 10 10.09 -1369.74 -5.51 4.58
2 TTP2 -3.81 1 -3.76 3 10.06 -1367.89 -3.65 4.58
3 TTP3 -2.77 9 -2.59 6 10.04 -1366.84 -2.61 4.58
4 TTP4 -2.20 10 -2.20 1 10.03 -1365.95 -1.71 4.58
5 TTP5 -3.24 3 -3.11 10 10.05 -1367.35 -3.11 4.58
6 TTP6 -4.70 10 -4.44 6 10.07 -1368.66 -4.42 4.58
7 TTP7 -4.66 4 -4.52 9 10.08 -1368.75 -4.51 4.58
8 TTP8 -4.30 7 -4.13 8 10.07 -1368.32 -4.08 4.58
9 TTP9 -3.94 9 -3.70 8 10.06 -1367.94 -3.70 4.58
10 TTP10 -3.66 4 -3.57 3 10.06 -1367.67 -3.44 4.58
11 TTP11 -4.40 3 -4.31 10 10.07 -1368.54 -4.31 4.58
12 TTP12 -3.15 7 -3.07 4 10.05 -1367.29 -3.05 4.58
13 TTP13 -3.67 3 -3.48 7 10.06 -1367.66 -3.43 4.58
14 TTP14 -4.16 8 -3.92 4 10.07 -1368.17 -3.93 4.58
15 TTP15 -3.98 2 -3.98 1 10.06 -1367.94 -3.70 4.58
16 TTP16 -4.81 10 -4.53 5 10.07 -1368.50 -4.27 4.58
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 90 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
Theoretical investigation on the molecular structure of TPD in hole transport layer in
(OLED)
N. Nadeem Afroze and K. Subramani
Abstract - The molecular structure of TPD used as a hole transport layer in organic light emitting diode (OLED). The insertion of hole
blocking and electron injecting layer significantly improves the electroluminescent efficiency and extends the operational life time.
Optimized structure (TPD) neutral molecule in ground and excited states are carried out by Ab initio HF and DFT (B3LYP) method
with 6-311++ G(d,p) as basis set using Gaussian 03 W program. The difference between qualitative agreement with the results for
the neutral molecule in the ground state obtained by density functional theory methods, which were previously reported in the
literature. TPD in the ground state has a pronounced twisted geometry, with both central and peripheral dihedral angles of about 40º.
On the other hand, the structure of excited state is more planar, as the central dihedral angle becomes smaller. We estimated the
reorganization energies associated with the optical transitions, corresponding transition dipole moments, as well as HOMO and
LUMO. .
Index Terms – Optimized structure, TPD, DFT, HOMO, LUMO.
—————————— ——————————
1. INTRODUCTION
N‘- diphenyl-N,N‘-bis(3-methylphenyl)-(1,1‘-
biphenyl)- 4,4‘-diamine (TPD, see Fig. 1) is a
prototypical organic compound used in multi-
layer emitting devices as a hole transporting
material. Its transporting properties were
extensively studied both by experimental and
theoretical methods [1–5]. Recently, more
attention was given to its optical properties, i.e.
absorption and emission behavior [6,7]. It was
found that TPD is also a promising material for
the development of organic lasers, showing
stimulated emission both in neat films and diluted
in polystyrene (PS) [8–12]. Measurements of the
dependence of the signal with the length of the
pump stripe demonstrated that the mechanism
responsible for the amplification process and
narrow emission spectra is amplified spontaneous
emission (ASE). Most organic molecules that
show stimulated emission need to be diluted in a
host matrix in order to show laser activity.
——————————————
N. Nadeem Afroze is pursuing Ph.D. in Chemistry in the Department of Chemistry, Islamiah College, Vaniyambadi, India. E-mail: [email protected]
K. Subramani is serving in the Departmnet of Chemistry, Islamiah College, Vaniyambadi, India.
Few materials, such as various thiophene-based
oligomers [13–15], as well as several spiro-type
materials [16,17], have shown laser action in the
form of neat films. In the case of the
oligothiophenes, their functionalization with
thienyl-S,S-dioxide groups led to high solid-state
PL efficiencies [18] while keeping good chemical
stability. This increase in PL efficiency was due to
the reduction of nonradiative processes in the
functionalized molecules induced by the variation
of both the supramolecular organization in the
solid state and the single molecule properties [19].
CH3
N N
CH3
Figure -1. N,N‘-diphenyl-N,N‘-bis (3-methylphenyl)-
(1,1‘-biphenyl)- 4,4‘-diamine (TPD)
On the other hand, for the spiro-type materials, the
concept of spirolinkage of a chromophore to other
molecular group was used in order to enhance film
quality that has been proven to be a relevant factor
N
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 91
IJSER © 2012
http://www.ijser.org
in preventing the PL quenching due to
intermolecular interaction. Very recently, the
usage of tert-butyl groups in sexiphenyl molecules
[20] has served to prevent crystallization of the
dye molecules, so stimulated emission was
observed, as contrary to the simple p-sexiphenyl
molecule. As previously mentioned, TPD has also
shown stimulated emission in neat films. Since
inter chain interactions seems to play a major role
in the luminescence and hence the laser properties
of organic systems [21], the study of the inter
chain effects in TPD would be important to
understand its optical properties. There exist some
density functional theoretical studies of the
geometric structure and energetics of TPD
[22,23], that have been compared with the crystal
structure determined crystallographically [24,25].
However, the main objective of these reports was
to relate the structure of TPD with its transport
properties, since TPD has been extensively used
as a hole transporting material in LED devices.
Concerning the optical properties of TPD, its
optical and lasing properties have not been
reported so far. In this paper, we report results
related to the first-principle investigations on
density functional theory which shows the optical
properties of the neutral TPD molecule.
2. EXPERIMENTAL
The optical properties of a single N,N‘-diphenyl-
N,N‘- bis (3-methylphenyl) - (1,1‘-biphenyl) -
4,4‘ diamine (TPD) molecule , we treat the
electronic ground and excited states. Theoretical
calculations were performed by first principle
method at the Hartree–Fock (HF) or single
excitation CIS level with 6-311++ G basis set,
using Gaussian 03W program package [26].
3. OPTIMIZED GEOMETRIES
The molecular structure of TPD is displayed in
Fig. 1. It consists of a central biphenyl core and
two twisted triphenylamine terminal wings,
extended with functional methyl groups. The main
structural parameters of the geometry optimization
for various TPD states in trans-type geometry
(with tolyl rings on opposite sides) are reported in
Table 1.
Table 1. HF( CIS) optimized geometrical parameters of
TPD in ground and exited states
Rc is the central bond length; Lc the length of N–C
bond with the central biphenyl part; Lt the length
of
N–C bonds with the terminal rings; α the central
dihedral angle; β the dihedral angle for the central
phenyl ring, measured relative to the terminal ring
with the methyl group; γ the dihedral angle for the
central phenyl ring, measured relative to the
terminal ring without the methyl group; ν the
torsion angle of the terminal ring with the methyl
group; µ is the torsion angle of the terminal ring
without the methyl group.
Figure -2. Optimized structure of N,N‘-diphenyl-N,N‘-
bis (3-methylphenyl)-(1,1‘-biphenyl)-
4,4‘-diamine (TPD)
In the case of the neutral molecule in the ground
state, we obtained a twisted geometry that is in
good agreement with previously reported structure
based on density functional theory (DFT) [22,23].
The central biphenyl bond of 1.49A˚ and dihedral
angle of 42.2˚ are comparable with the theoretical
findings of 1.48 A˚ and 33.8˚reported in Ref. [22]
and 34.9˚ reported in Ref. [23].
State
Geometrical parameters
Rc
(A˚)
Lc
(A˚)
Lt
(A˚)
α
(˚)
β
(˚)
γ
(˚)
ν
(˚)
µ
(˚)
Ground 1.49 1.42 1.42 42.2 45.2 45.5 45.6 46.3
Excited 1.42 1.40 1.42 4.6 38.5 38.4 43.6 44.2
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 92 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
4. RESULTS AND DISCUSSION
The entire set of calculation were performed at
density functional theory (DFT) through the
energetic positions of excitations below the
ionization potential (of 6.25 eV determined by HF
method as an energy of a cation state in the
ground state geometry, comparable with the
experimental value of 6.69 eV [27] ), we see that
the spectra are dominated by the HOMO–LUMO
transition, estimated at 6.61 eV. Focusing on the
ground state and the first excited state, we
calculated the energies of analysed electronic
states for each optimized geometry (see Table 2).
Table 2. Relative energies ( in eV) for ground
and excited states versus geometry
configuration of TPD
According to the Franck–Condon principle, the
shape of the molecule immediately before and
after the electronic transition is practically the
same. The fast electronic transitions are thereafter
followed by slow geometry relaxations towards
the equilibrium geometries of the final electronic
states, see Fig. 2. The larger reorganization
energies correspond to the stronger electron–
vibrational coupling interaction and more
pronounced vibrational structure of related spectra
[28].
5. HOMO, LUMO ANALYSIS
The analysis of the wave function indicates that
the electron absorption corresponds to the
transition from ground to first excited and it is
mainly described by one electron excitation from
the highest occupied molecular orbital (HOMO)
and lowest unoccupied molecular orbital (LUMO)
are very important parameters for quantum
Chemistry. We determine the way the molecule
interacts with other species; hence, they are called
frontier orbital. HOMO in the ground state
geometry is rather delocalized on all benzene
rings (see Figure-3).
Figure -3. HOMO, LUMO
The energies of HOMO and LUMO in the ground
state geometry are EHOMO (g) = – 6.80 eV and
ELUMO (g) = 2.73 eV, respectively. The HOMO-
LUMO gap corresponding to optical spectra,
becomes ELUMO(g) – EHOMO (g) = 9.53 eV.
The energies of HOMO and LUMO in the excited
state geometry are EHOMO(e) = 2.36 eV,
respectively. The HOMO-LUMO gap,
corresponding to PL , is decreased to ELUMO (e) –
EHOMO (e) = 8.56 eV. The absolute energies of 9.53
and 8.56 eV are considerably overestimated
comparing with the previously obtained around
18, 16, and 14A˚ for the, 20 and 30 wt% doped
films. These energy gaps reflect the chemical
activity of the molecule, it is possible to say that
the change of distribution by a change of basis set.
Electronic state Geometry
Ground Excited
Ground 0.0 1.46
Excited 6.61 5.99
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 93
IJSER © 2012
http://www.ijser.org
6. CONCLUSION
The optimized geometric structures and energies
of TPD during the optical transitions in the hole
transport layer we presented a semi-empirical
model for TPD absorption and
photoluminescence. Significantly different
molecular shapes in ground and excited state
electronic potentials lead to different spatial
localization of HOMO and LUMO and large
reorganization energies. This is reflected into a
large Stokes shift, estimated to 0.46 eV. Finally,
we generalize that the possible contribution of
TPD, optimized structure with electron hole
transporting layer which aggregates TPD has
optical properties in organic light emitting diodes
(OLED).
ACKNOWLEDGEMENTS
The first author is thankful to Vaniyambadi
Muslim Educational Society for providing
necessary facilities to carry out this research work.
REFERENCES
[1] V. Bulovic, G. Gu, P.E. Burrows, S.R.
Forrest, M.E. Thompson, Nature 380 (1996)
29.
[2] N. Tamoto, C. Adachi, K. Nagai, Chem.
Mater. 9 (1997) 1077.
[3] P.M. Borsenberger, D.S. Weiss, Organic
Photoreceptors for Xerography, Marcel
Dekker, New York, 1998.
[4] E. Bellmann, S.E. Shaheen, S.
Thayumanavan, S. Barlow, R.H. Grubbs,
S.R. Marder, B. Kippelen, N.
Peyghambarian, Chem. Matter 10 (1998)
1668.
[5] E. Bellmann, S.E. Shaheen, R.H. Grubbs,
S.R. Marder, B. Kippelen,N.
Peyghambarian, Chem. Matter 11 (1999)
399.
[6] N. Tada, S. Tatsuhara, A. Fujii, Y. Ohmori,
K. Yoshino, Jpn. J. Appl. Phys. 36 (1997)
L421.
[7] S. Pfeiffer, H.-H. Ho¨ rhold, H. Boerner, N.
Nikol, W. Busselt, SPIE 3476 (1998) 258.
[8] W. Holzer, A. Penzkofer, H.-H. Ho¨rhold,
Synth. Met. 113 (2000) 281.
[9] M.A. Dı´az-Garcı´a, S.F. de A ´ vila, M.G.
Kuzyk, Appl. Phys. Lett. 80 (2002) 4486.
[10] M.A. Dı´az-Garcı´a, E.M. Calzado, J.M.
Villavilla, P.G. Boj, J.A. Quintana, M.
Kuzyk, J. Nonlin. Opt. Phys. Mater. 13
(2004) 621.
[11] E.M. Calzado, J.M. Villavilla, P.G. Boj, J.A.
Quintana, M.A. Dı´az- Garcı´a, J. Appl.
Phys. 97 (2005) 093103.
[12] E.M. Calzado, J.M. Villavilla, P.G. Boj, J.A.
Quintana, M.A. Dı´az- Garcı´a, Org.
Electron. 7 (2006) 319.
[13] M. Anni, G. Gigli, R. Cingolani, M.
Zavelani-Rossi, C. Gadermaier, G. Lanzani,
G. Barbarella, L. Favaretto, Appl. Phys.
Lett. 78 (2001) 2679.
[14] M. Zavelani-Rossi, G. Lanzani, S. De
Silvestri, M. Anni, G. Gigli, R. Cingolani,
G. Barbarella, L. Favaretto, Appl. Phys.
Lett. 79 (2001) 4082.
[15] D. Pisignano, M. Anni, G. Gigli, R.
Cingolani, M. Zavelani-Rossi, G. Lanzani,
G. Barbarella, L. Favaretto, Appl. Phys.
Lett. 81 (2002) 3543.
[16] N. Johansson, J. Salbeck, J. Bauer, F.
Weisso¨ rtel, P. Bro¨ms, A. Andersson,
W.R. Salaneck, Adv. Mater. (Weinheim,
Ger. ) 10 (1998) 1136.
[17] D. Schneider, T. Rabe, T. Riedl, T.
Dobbertin, O. Werner, M. Kro¨ ger, E.
Becker, H. H. Johannes, W.
Kowalsky, T. Weimann, J. Wang, P. Hinze,
A. Gerhard, P. Sto¨ ssel, H. Vestweber,
Appl. Phys. Lett. 84 (2004) 4693.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 94 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
[18] G. Gigli, G. Barbarella, L. Favaretto, F.
Cacialli, R. Cingolani, Appl. Phys. Lett. 75
(1999) 439.
[19] F. Della Sala, G. Gigli, M.F. Raganato, M.
Anni, D. Pisignano, R. Cingolani, L.
Favaretto, G. Sotgiu, G. Barbarella, L.
Antolini, Org. Electron. 3 (2004) 129.
[20] D. Schneider, T. Rabe, T. Riedl, T.
Dobbertin, M. Kro¨ ger, E. Becker, H.-H.
Johannes, W. Kowalsky, T. Weimann, J.
Wang, P. Hinze, J. Appl. Phys. 98 (2005)
043104.
[21] J. Cornil, D. Beljonne, J.P. Calbert, J.L.
Bre´das, Adv. Mater. 13 (2001) 1053.
[22] M. Malagoli, J.L. Bre´das, Chem. Phys.
Lett. 327 (2000) 13.
[23] M. Malagoli, M. Manoharan, B. Kippelen,
J.L. Bre´das, Chem. Phys. Lett. 354 (2002)
283.
[24] A.R. Kennedy, W.E. Smith, D.R. Tackley,
W.I.F. David, K. Shankland, B. Brown, S.J.
Teat, J. Mater. Chem. 12 (2002) 168.
[25] P.J. Low, M.A.J. Paterson, H. Puschmann,
A.E. Goeta, J.A.K. Howard, C. Lambert,
J.C. Cherryman, D.R. Tackley, S. Leeming,
B. Brown, Chem. Eur. J. 10 (2004) 83.
[26] M.J. Frisch et al., Gaussian 03, Revision
B.01, Gaussian, Inc., Pittsburgh, PA, 2003.
[27] J. Cornil, S. Vanderdonckt, R. Lazzaroni,
D.A. dos Santos, G. Thys, H.J. Geise, L.-M.
Yu, M. Szablewski, D. Bloor, M.
Lo¨gdlund, W.R. Salaneck, N.E. Gruhn,
D.L. Lichtenberger, P.A. Lee, N.R.
Armstrong, J.L. Bre´das, Chem. Mater. 11
(1999) 2436.
[28] J.L. Bre´das, D. Beljonne, V. Coropceanu, J.
Cornil, Chem. Rev. 104 (2004) 4971.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 95
IJSER © 2012
http://www.ijser.org
Sum Labeling for Some Cycle Related Graphs
J. Gerard Rozario, J. Jon Arockiaraj, P. Lawrence Rozario Raj and U. Rizwan
Abstract - A sum labeling is a mapping 𝜆 from the vertices of G into the positive integers such that, for any two vertices
u, v 𝜖 V (G) with labels 𝜆(u) and 𝜆(v), respectively, (uv) is an edge iff 𝜆(u) + 𝜆(v) is the label of another vertex in V (G).
Any graph supporting such a labeling is called a sum graph. It is necessary to add (as a disjoint union) a component to
sum label a graph. This disconnected component is a set of isolated vertices known as isolates and the labeling scheme
that requires the fewest isolates is termed optimal. The number of isolates required for a graph to support a sum labeling
is known as the sum number of the graph. In this paper, we will give optimal sum labeling scheme for some cycle related
graphs.
Index Terms - Sum Labeling, Sum number, Sum graph, Isolates
—————————— ——————————
1. INTRODUCTION
LL the graphs considered here are simple,
finite and undirected. For all terminologies
and notations we follow Harary [3] and graph
labeling as in [2]. Sum labeling of graphs was
introduced by Harary [4] in 1990. Following
definitions are useful for the present study.
Definition 1.1 A Sum Labeling is a mapping 𝜆
from the vertices of G into the positive integers
such that, for any two vertices u, v 𝜖 V (G) with
labels 𝜆(u) and 𝜆(v), respectively, (uv) is an edge
iff 𝜆(u) + 𝜆(v) is the label of another vertex in V
(G). Any graph supporting such a labeling is
called a Sum Graph. Definition 1.2 It is necessary to add (as a disjoint
union) a component to sum label a of isolated
——————————————
J. Gerard Rozario is serving in the Department of Mathematics, St. Joseph’s College of Arts and Science, Cudallore, India. E-mail: [email protected]
J. Jon Arockiaraj is serving in the Department of Mathematics, St. Joseph’s College of Arts and Science, Cudallore, India. E-mail: [email protected]
P. Lawrence Rozario Raj is serving in the Department of Mathematics, St. Joseph College, Trichy, India. E-mail : [email protected]
U. Rizwan is serving in the Department of Mathematics, Islamiah College, Vaniyambadi, India. E-mail : [email protected]
vertices known as Isolates and the labeling
scheme that requires the fewest isolates is termed
Optimal.
Definition 1.3 The number of isolates required for
a graph G to support a sum labeling is known as
the Sum Number of the graph. It is denoted as
𝜎 𝐺
Definition 1.4 Flower Pot Cracker Graph is
obtained from cycle of m vertices and spider of n
vertices, by joining the center vertex of spider and
any one vertex of the cycle. It is denoted by
FPC(Cm,SP( m21 xm
x2
x1 aaa ,...,, )) where a1 < a2 < ... <
am, x1+x2+...+xm = k and a1x1+a2x2+...+amxm= n-
1. For our convenience, we write FPC(Cm,SP(m21 xm
x2
x1 aaa ,...,, )) as FPC(Cm,SPn) or FPCm,n.
Definition 1.5 Consider n copies of stars
namely 𝐾1,𝑚(1)
, 𝐾1,𝑚(2)
, …… , 𝐾1,𝑚(𝑛)
. Then the graph G =
𝐾1,𝑚(1)
𝐾1,𝑚(2)……𝐾1,𝑚
(𝑛) is the graph obtained
by joining apex vertices of each 𝐾1,𝑚𝑝−1 and 𝐾1,𝑚
𝑝 by
an edge as well as to a new vertex 𝑥𝑝−1 where 2 ≤
𝑝 ≤ 𝑛.
Here G has 𝑛(𝑚 + 2) − 1 vertices and 𝑛(𝑚 +3) − 3 edges.
In this paper, we will prove that FPCm,n , the
graph 𝐾1,𝑚(1)
𝐾1,𝑚(2)……𝐾1,𝑚
(𝑛) are
optimal summable with sum number 1.
A
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 96 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
2. OPTIMAL SUM LABELING SCHEME
FOR 𝑭𝑷𝑪𝒑,𝒕 AND 𝐾1,𝑚(1)
𝐾1,𝑚(2)……𝐾1,𝑚
(𝑛)
Jeff Ginn [5], gave the sum labeling for unicyclic
graphs with sum number as
𝜎 𝑈𝐶3 = 1 ; 𝜎 𝑈𝐶4 = 3 ; 𝜎 𝑈𝐶𝑛 = 3
𝑓𝑜𝑟 𝑛 ≥ 5 and sum labeling for a special class of
multicyclic graphs. Lawrence Rozario and Gerard
Rozario [6], proved that 𝐹𝑃𝐶𝑝 ,𝑡 𝑓𝑜𝑟 𝑎𝑙𝑙 𝑝 >
3 & 𝑡 > 1 is a combination graph. Dani, Nilish A
[1], proved that the graph
𝐾1,𝑚(1)
𝐾1,𝑚(2)……𝐾1,𝑚
(𝑛) is a 3-equitable graph.
In this section, we prove that 𝐹𝑃𝐶𝑝 ,𝑡 𝑓𝑜𝑟 𝑎𝑙𝑙 𝑝 ≥
3 & 𝑡 > 1 and 𝐾1,𝑚(1)
𝐾1,𝑚(2)……𝐾1,𝑚
(𝑛) are sum
graphs with sum number 1.
Theorem. 2.1 𝐹𝑃𝐶𝑝 ,𝑡 is optimal summable with
sum number 1 for all 𝑝 ≥ 3 and 𝑡 > 1.
Proof. Let G = 𝐹𝑃𝐶𝑝 ,𝑡 where 𝑝 ≥ 3 𝑎𝑛𝑑 𝑡 > 1.
G has a cycle of p vertices and a spider of t
vertices. G has p + t – 1 vertices. Let v1, v2,
v3,……,vp be the vertices of the cycle where v1 is
the center. vp+1, vp+2…,vp+t-1 be the vertices of
spider. Let ‗m‘ be number of paths in spider and
ni be length of ith
path, where i = 1, 2, 3,…,m.
Define f : V(G) {1,2,3,…, N}
Case (i) p is odd number
Case (i) (a) p =3
For C3, 𝑓(𝑣1) = 1; 𝑓(𝑣2) = 2; 𝑓(𝑣3) = 3 For Spider,
𝑓(𝑣11) = 𝑓(𝑣1) + 𝑓(𝑣3) 𝑓𝑜𝑟 1 ≤ 𝑖 ≤ 𝑚
𝑓 𝑣𝑖2 = 𝑓 𝑣1 + 𝑓 𝑣𝑖1
𝑓 𝑣𝑖𝑗 = 𝑓 𝑣𝑖 𝑗−1 + 𝑓 𝑣𝑖 𝑗−2 ;
3 ≤ 𝑗 < 𝑛𝑖
𝑓 𝑣 𝑖+1 1 = 𝑓 𝑣𝑖𝑗 + 𝑓 𝑣𝑖 𝑗−1 ;
𝑗 = 𝑛𝑖 𝑖 ≠ 𝑚
𝑓 𝑥 = 𝑓 𝑣𝑚 𝑛𝑚 + 𝑓 𝑣𝑚(𝑛𝑚 −1) ,
where x is the isolated vertex.
Hence 𝐹𝑃𝐶3,𝑡 is optimal summable with sum
number 1.
Case (i) (b): p = 5, 7
For C5, C7
𝑓(𝑣1) = 2; 𝑓(𝑣2) = 1; 𝑓(𝑣3) = 3
𝑓(𝑣𝑝) = 𝑓(𝑣1) + 𝑓(𝑣3)
𝑓 𝑣𝑖 = 𝑓 𝑣𝑖−1 + 𝑓 𝑣𝑖−2 ; 4 ≤ 𝑖 𝑝 − 1
For Spider,
𝑓 𝑣11 =
𝑓 𝑣𝑝 + 𝑓 𝑣𝑝−1 𝑖𝑓 𝑓 𝑣𝑝 < 𝑓 𝑣𝑝−1
𝑓 𝑣𝑝−1 + 𝑓 𝑣𝑝−2 𝑖𝑓 𝑓 𝑣𝑝 > 𝑓 𝑣𝑝−1
𝑓𝑜𝑟 1 ≤ 𝑖 ≤ 𝑚
𝑓 𝑣𝑖2 = 𝑓 𝑣1 + 𝑓 𝑣𝑖1
𝑓 𝑣𝑖𝑗 = 𝑓 𝑣𝑖 𝑗−1 + 𝑓 𝑣𝑖 𝑗−2 ;
3 ≤ 𝑗 < 𝑛𝑖
𝑓 𝑣 𝑖+1 1 = 𝑓 𝑣𝑖𝑗 + 𝑓 𝑣𝑖 𝑗−1 ;
𝑗 = 𝑛𝑖 𝑖 ≠ 𝑚
𝑓 𝑥 = 𝑓 𝑣𝑚 𝑛𝑚
+ 𝑓 𝑣𝑚(𝑛𝑚 −1) ,
where x is the isolated vertex.
Hence 𝐹𝑃𝐶𝑝 ,𝑡 is optimal summable with sum
number 1 where p = 5, 7.
Case (i) (c) 𝑝 ≥ 9
For Cp,
𝑓 vp−3
2
= 1;
𝑓 v
p−3
2− 1
= 2;
𝑓 v
p−3
2 + 1
= 3;
𝑓 𝑣 𝑝−3
2− 2
= 5;
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 97
IJSER © 2012
http://www.ijser.org
𝑓 𝑣 𝑝−3
2 + 2
= 4
𝑓𝑜𝑟 1 ≤ 𝑖 ≤𝑝−9
2
𝑓 𝑣
𝑝−3
2 + 𝑖 + 2
= 𝑓 𝑣 𝑝−3
2 – 𝑖
+ 𝑓 𝑣 𝑝−3
2 – 𝑖 −1
𝑓 𝑣 𝑝−3
2 – 𝑖 – 2
= 𝑓 𝑣 𝑝−3
2 + 𝑖 +1
+ 𝑓 𝑣 𝑝−3
2 + 𝑖 + 2
𝑓 𝑣𝑝−3 = 𝑓 𝑣1 + 𝑓 𝑣2 ;
𝑓 𝑣𝑝 = 𝑓 𝑣𝑝−3 + 𝑓 𝑣𝑝−4
𝑓 𝑣𝑝−2 = 𝑓 𝑣1 + 𝑓 𝑣𝑝 ;
𝑓 𝑣𝑝−1 = 𝑓 𝑣𝑝−3 + 𝑓 𝑣𝑝−2
For Spider,
𝑓(𝑣11) = 𝑓(𝑣𝑝) + 𝑓 𝑣𝑝−1 𝑓𝑜𝑟 1 ≤ 𝑖 ≤ 𝑚
𝑓 𝑣𝑖2 = 𝑓 𝑣1 + 𝑓 𝑣𝑖1
𝑓 𝑣𝑖𝑗 = 𝑓 𝑣𝑖 𝑗−1 + 𝑓 𝑣𝑖 𝑗−2 ;
3 ≤ 𝑗 < 𝑛𝑖
𝑓 𝑣 𝑖+1 1 = 𝑓 𝑣𝑖𝑗 + 𝑓 𝑣𝑖 𝑗−1 ;
𝑗 = 𝑛𝑖 𝑖 ≠ 𝑚
𝑓 𝑥 = 𝑓 𝑣𝑚 𝑛𝑚 + 𝑓 𝑣𝑚(𝑛𝑚 −1) ,
where x is the isolated vertex.
Hence 𝐹𝑃𝐶𝑝 ,𝑡 is optimal summable with sum
number 1 if p is odd.
Case (ii): p is even number
Case (ii) (a): p = 4
For C4,
𝑓 𝑣1 = 1;
𝑓 𝑣2 = 2;
𝑓 𝑣4 = 3;
𝑓(𝑣3) = 𝑓(𝑣1) + 𝑓(𝑣4)
For Spider,
𝑓(𝑣11) = 𝑓(𝑣2) + 𝑓(𝑣3) 𝑓𝑜𝑟 1 ≤ 𝑖 ≤ 𝑚
𝑓 𝑣𝑖2 = 𝑓 𝑣1 + 𝑓 𝑣𝑖1
𝑓 𝑣𝑖𝑗 = 𝑓 𝑣𝑖 𝑗−1 + 𝑓 𝑣𝑖 𝑗−2 ;
3 ≤ 𝑗 < 𝑛𝑖
𝑓 𝑣 𝑖+1 1 = 𝑓 𝑣𝑖𝑗 + 𝑓 𝑣𝑖 𝑗−1 ;
𝑗 = 𝑛𝑖 𝑖 ≠ 𝑚
𝑓 𝑥 = 𝑓 𝑣𝑚 𝑛𝑚 + 𝑓 𝑣𝑚(𝑛𝑚 −1) ,
where x is the isolated vertex.
Hence 𝐹𝑃𝐶4,𝑡 is optimal summable with sum
number 1.
Case (ii) (b): 𝑝 ≥ 6
For Cp,
𝑓 𝑣1 = 1; 𝑓 𝑣2 = 2;
𝑓 𝑣𝑝 = 3;
𝑓 𝑣3 = 𝑓 𝑣2 + 𝑓 𝑣𝑝
𝑓(𝑣𝑝−1) = 𝑓(𝑣1) + 𝑓(𝑣𝑝)
𝑓𝑜𝑟 4 ≤ 𝑖 ≤𝑝
2
If i is even,
𝑓 𝑣𝑖 = 𝑓 𝑣𝑖−1 + 𝑓 𝑣𝑖−2 − 1
𝑓 𝑣𝑖+ 𝑝−2𝑖+2 = 𝑓 𝑣𝑖+ 𝑝−2𝑖+2 +1 +
𝑓 𝑣𝑖+ 𝑝−2𝑖+2 +2
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 98 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
If i is odd,
𝑓 𝑣𝑖 = 𝑓 𝑣𝑖−1 + 𝑓 𝑣𝑖−2
𝑓 𝑣𝑖+ 𝑝−2𝑖+2 = 𝑓 𝑣𝑖+ 𝑝−2𝑖+2 +1
+ 𝑓 𝑣𝑖+ 𝑝−2𝑖+2 +2 − 1
𝑓 𝑣 𝑝
2 + 1
= 𝑓 𝑣 𝑝
2 + 𝑓 𝑣
𝑝
2 − 1
For Spider,
𝑓(𝑣11)
=
𝑓 𝑣
𝑝2 + 𝑓 𝑣
𝑝2
+1
𝑖𝑓 𝑓 𝑣 𝑝2 < 𝑓 𝑣
𝑝2
+2
𝑓 𝑣 𝑝2
+1 + 𝑓 𝑣
𝑝2
+2
𝑖𝑓 𝑓 𝑣 𝑝2 > 𝑓 𝑣𝑝+2
𝑓𝑜𝑟 1 ≤ 𝑖 ≤ 𝑚
𝑓 𝑣𝑖2 = 𝑓 𝑣1 + 𝑓 𝑣𝑖1
𝑓 𝑣𝑖𝑗 = 𝑓 𝑣𝑖 𝑗−1 + 𝑓 𝑣𝑖 𝑗−2 ;
3 ≤ 𝑗 < 𝑛𝑖
𝑓 𝑣 𝑖+1 1 = 𝑓 𝑣𝑖𝑗 + 𝑓 𝑣𝑖 𝑗−1 ;
𝑗 = 𝑛𝑖 𝑖 ≠ 𝑚
𝑓 𝑥 = 𝑓 𝑣𝑚 𝑛𝑚
+ 𝑓 𝑣𝑚(𝑛𝑚 −1) ,
where x is the isolated vertex.
Hence 𝐹𝑃𝐶𝑝 ,𝑡 is optimal summable with sum
number 1 where 𝑝 ≥ 6 .
Thus, 𝐹𝑃𝐶𝑝 ,𝑡 is optimal summable with sum
number 1 for all p≥ 3 and t >1.
Illustration 2.1 Sum labeling for 𝐹𝑃𝐶𝑝 ,𝑡 is given
in the figure 2.1
FPC 5,11
FPC 5,10
Figure 2.1
Theorem: 2.2 < 𝐾1,𝑚(1)
𝐾1,𝑚(2)……𝐾1,𝑚
(𝑛)> is
a sum graph with sum number 1.
Proof. Let G = < 𝐾1,𝑚(1)
𝐾1,𝑚(2)……𝐾1,𝑚
(𝑛) >.
The vertex set of
V(G) = {c1, c2,……,cn,
x1,x2,……,xn-1, v11,v12,…,v1m,
v21,v22,…v2m,……,vn1,vn2,… vnm}
where ci is apex vertex of 𝐾1,𝑚(𝑖)
𝑤𝑒𝑟𝑒 𝑖 =
1,2,3, …𝑛. x1,x2,…,xn–1 be vertices such that ci–1
and ci are adjacent to xi–1, where 2 i n of G and
v11,v12,…,vnm are pendant vertices. Let y be the
isolated vertex.
76
71
2
5 4
13
27116
337
231
11 01
28
29
57
58
115
568
79
16
2
5
4
1
3
81
34
36
70
106108
214
322
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 99
IJSER © 2012
http://www.ijser.org
n = 4; m = 5
n = 4; m = 5
Figure 2.2
Define f : V(G) {1,2,3,…, N}
𝑓 𝑐𝑖 = 𝑖 ; 𝑓𝑜𝑟 1 ≤ 𝑖 ≤ 𝑛
Case: (i) n is even
𝑓 𝑥𝑖 = 𝑓 𝑐𝑛−𝑖+2 + 𝑓 𝑐𝑛−𝑖+3 ; 𝑓𝑜𝑟 ( 𝑛 − 1) ≥ 𝑖 ≥ 𝑛
2
𝑓 𝑥𝑖 = 𝑓 𝑥𝑖+1 + 1 ; 𝑓𝑜𝑟 (𝑛 2 − 1) ≥ 𝑖 ≥ 1
𝑓(𝑣11) = 𝑓(𝑥1) + 𝑓 𝑐1
𝑓𝑜𝑟 1 ≤ 𝑖 ≤ 𝑛,
𝑓 𝑣𝑖(𝑗 +1) = 𝑓 𝑣𝑖𝑗 + 𝑓 𝑐𝑖 ; 1 ≤ 𝑗 < 𝑚
𝑓 𝑣 𝑖+1 1 = 𝑓 𝑣𝑖𝑗 + 𝑓 𝑐𝑖 ; 𝑗 = 𝑚 𝑖 ≠ 𝑛
𝑓 𝑦 = 𝑓 𝑣𝑛𝑚 + 𝑓 𝑐𝑛 ,
where y is the isolated vertex.
Hence G is optimal summable with 1 isolated
vertex when n is even.
Case: (ii) n is odd
𝑓 𝑥𝑖 = 𝑓 𝑐𝑛−𝑖+
𝑛−1 2
+ 𝑓 𝑐𝑛−𝑖+
𝑛−1 2
+1 ;
𝑓𝑜𝑟 ( 𝑛 − 1) ≥ 𝑖 ≥(𝑛+1)
2
𝑓 𝑥𝑛−1
2
= 𝑓 𝑥𝑛+1
2
+ 2
𝑓 𝑥𝑖 = 𝑓 𝑥𝑖+1 + 1 ; 𝑓𝑜𝑟 (𝑛−3)
2≥ 𝑖 ≥ 1
𝑓(𝑣11) = 𝑓(𝑥1) + 𝑓 𝑐1
𝑓𝑜𝑟 1 ≤ 𝑖 ≤ 𝑛,
𝑓 𝑣𝑖(𝑗 +1) = 𝑓 𝑣𝑖𝑗 + 𝑓 𝑐𝑖 ; 1 ≤ 𝑗 < 𝑚
𝑓 𝑣 𝑖+1 1 = 𝑓 𝑣𝑖𝑗 + 𝑓 𝑐𝑖 ; 𝑗 = 𝑚 𝑖 ≠ 𝑛
𝑓 𝑦 = 𝑓 𝑣𝑛𝑚 + 𝑓 𝑐𝑛 ,
where y is the isolated vertex.
1 2 3 4
5
1211
8 79
10 13
16
14
18
22
24
20
27
33
36
30
39
43
51
55
47
59
1 2 3 4 5
12 11 9 713
15 16
1417
18
22 24
20
26
28
34 37
31
40
43
51 55
47
59
63
73 78
68
8388
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 100 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
Thus, with just one isolated vertex we are able to
identify all the edges of G.
Hence, the graph < 𝐾1,𝑚(1)
𝐾1,𝑚(2)……𝐾1,𝑚
(𝑛)>
is a sum graph with sum number 1.
Illustration 2.2 Sum Labeling for
< 𝐾1,5(1)
𝐾1,5(2)𝐾1,5
(3)𝐾1,5
(4)>
and < 𝐾1,5(1)
𝐾1,5(2)𝐾1,5
(3)𝐾1,5
(4)𝐾1,5
(5)>
are shown in figure 2.2
REFERENCES
[1] Dani, Nilish A, Study of some interesting
topics in theory of graphs, Saurashtra
University, 2010.
[2] Gallian J A, A dynamic survey of graph
labeling, The Electronics Journal of
Combinatorics, 16, (2009) DS6.
[3] Harary F, Graph theory, Addison Wesley,
Reading, Massachusetts, 1972.
[4] Harary F, Sum graphs and Difference graphs,
Congress Numerantium, no.72, 101-108,
1990.
[5] Jeff Ginn, The Sum Number of a Unicyclic
Graph, Central Michigan University, NSF
DMS – 0097394, 2002.
[6] P. Lawrence Rozario Raj and J. Gerard
Rozario, Combination Labeling for Some
Cycle and Star Related Graphs, Proceedings
of the Heber International Conference on
Applications of Mathematics and Statistics,
Excel India Publishers, New Delhi, 2012, pp.
500-505.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 101
IJSER © 2012
http://www.ijser.org
Multiple Labeling Approach for Finding Shortest Path with Intuitionistic Fuzzy Arc Length
A.Nagoor Gani and M.Mohammed Jabarulla
Abstract - This paper presents a modified multiple labeling method for finding the shortest path in an intuitionistic fuzzy networks. An
intuitionistic fuzzy shortest path problem on a network in which an intuitionistic fuzzy number instead of a fuzzy number is assigned to
each edge. An algorithm for solving the problem is developed and a shortest path derived from the network. An intuitionistic fuzzy
graphs along with generalizations of algorithms for finding optimal paths with in them have emerged as an adequate modeling tool for
imprecise system. Inputs and outputs of the proposed algorithm are intuitionistic fuzzy numbers. Finally an illustrative numerical
example is given to demonstrate the proposed approach.
Index Terms – Intuitionistic Fuzzy Set (IFS), Intuitionistic Fuzzy Graph (IFG), Shortest Path, Intuitionistic Fuzzy Shortest Path,
Intuitionistic Fuzzy Number (IFN), Trapezoidal Intuitionistic Fuzzy Number(TrIFN), Multiple labeling.
—————————— ——————————
1. INTRODUCTION
HE problem of finding the shortest path from a
specified source node to the other nodes is a
fundamental problem that appears in many
applications. It generates essential information in
transportation, routing and communications
applications.
The fuzzy shortest path problem was first
introduced by Dubois and Prade [2]. Generally
fuzziness can be introduced into the network in a
variety of ways. In Dubois and Prade [2]
discussed the solution to the first problem using
extended sum with Floyd‘s and Ford‘s algorithms
used to solve the problem. Kelin [4] presented by
hybrid multi criteria DP recursion and can find a
path or paths corresponding to the threshold of
membership degree set by a decision maker.
In this paper we propose an intuitionistic fuzzy
number instead of a fuzzy number. An algorithm
is based on the idea that from all the shortest paths
——————————————
A.Nagoor Gani is serving in the Department of Mathematics, Jmala
Mohamed College, Tiruchirapalli, India. E-mail:
M.Mohammed Jabarulla i serving in the Department of Mathematics,
Jmala Mohamed College, Tiruchirapalli, India. E-mail:
from source node to destination node, the multiple
labeling method can be considered to be a
generalization of Dijkstra‘s algorithm to solve the
simple shortest path problem.
This paper is organized as follows. In Section 2,
we define trapezoidal intuitionistic fuzzy number
and its addition used through out this paper.
Some terminology about networks considered
here is provided. We define an order relation
among intuitionistic fuzzy numbers which is used
in the ranking path distance represented as
intuitionistic fuzzy numbers. In Section 3, we
define a mathematical formulation and an
algorithm for solving intuitionistic fuzzy shortest
path problem is derived on the basis of multiple
labeling method for a multi criteria shortest path.
In Section 4, the proposed algorithm is
numerically evaluated for any networks.
2. PRELIMINARY DEFINITIONS
The concepts of an intuitionistic fuzzy set was
introduced by Atanassov[1] to deal with
vagueness, which can be defined as follows.
2.1 Intuitionistic Fuzzy Set
Let X be an universe of discourse, then an
Intuitionistic Fuzzy Set (IFS) A in X is given by
A = { (x, µA(x), A(x)) / x X }
T
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 102 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
where the functions µA(x) : X→[0,1] and A(x) :
X→[0,1] determine the degree of membership and
non membership of the element x X,
respectively and for every x X, 0 µA(x) +
A(x) 1. 2.2 Intuitionistic Fuzzy Graph
Let X be an universe, containing fixed graph
vertices and let E X be a fixed set. Construct
the IFS E = { (x, µv(x), v(x)) / x X } where the
functions µv(x):X→[0,1] and v(x):X→[0,1]
determine the degree of membership and non
membership to set E of the element (edge) x X,
respectively and for every x X, such that 0
µv(x) + v(x) 1. 2.3 Intuitionistic Fuzzy Number [19]
Let A = { (x, µA(x), A(x)) / x X } be an IFS, then
we call the pair (µA(x), A(x)) an intuitionistic
fuzzy number.
For convenience, we denote an intuitionistic fuzzy
number by (<a,b,c,d>,<a’,b,c,d’>), where
< a,b,c,d > F(I), < a’,b,c,d’ > F(I), I = [0,1]. 2.4 Trapezoidal Intuitionistic Fuzzy Number [5]
A trapezoidal intuitionistic fuzzy number (TrIFN)
A is denoted by A = {( µA, A) | x R}, where µA
and A are membership and non-membership
functions. The trapezoidal intuitionistic fuzzy
number A is denoted by
' '
1 2 3 4 1 2 3 4, , , , , , ,A a a a a a a a a
where ' '
1 1 2 3 4 4 a a a a a a .The membership
and non-membership functions are as follows.
11 2
2 1
2 3
43 4
4 3
,
1, ( )
,
0,
A
x afor a x a
a a
for a x ax
a xfor a x a
a a
Otherwise
'21 2'
2 1
2 3
'33 4'
4 3
and
,
0, ( )
,
1,
A
a xfor a x a
a a
for a x ax
x afor a x a
a a
Otherwise
Figure . 1 Trapezoidal Intuitionistic Fuzzy Number
' '
1 2 3 4 1 2 3 4, , , , , , ,A a a a a a a a a
2.5 The Additio of Two Trapezoidal Intuitionistic
Fuzzy Number
Let any Trapezoidal Intuitionistic Fuzzy Numbers
' '
1 2 3 4 1 2 3 4, , , : , , , , :A a a a a a a a a
and ' '
1 2 3 4 1 2 3 4, , , : , , , , :B BB b b b b b b b b then
1 1 2 2 3 3 4 4
' ' ' '
1 1 2 2 3 3 4 4
, , ,
: . ,
, , ,
: .
B B
B
a b a b a b a b
A Ba b a b a b a b
2.6 Network Terminology [12]
Consider a directed network G(V, E), consisting of
finite set of nodes V = { 1,2,3,..n } and a set of m
directed edges E V X V. Each edge is denoted
by an ordered pair ( i, j ), Where i, j V and i j.
It is supposed that there is only one directed arc
( i, j ) from i to j. In this network we specify two
nodes, denoted by s and t , which are the source
node and destination node respectively. We
define a path ijP as a sequence
1 1 2 2 -1 -1 { , ( , ), ,..., , ( , ), } si l l l lP i i i i i i i i i j
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 103
IJSER © 2012
http://www.ijser.org
of alternating nodes and edges. The existence of
at least one path siP in G(V,E) is assumed for
every node i V – { s }.
ijl denotes the intuitionistic fuzzy number
associated with edge (i,j), corresponding to the
length necessary to traverse ( i, j ) from i to j. We
remark that each length corresponds to the cost ,
the time, etc in practical problems. The
intuitionistic fuzzy distance along the path P,
denoted as ( )d P is defined as ( , )
( ) ij
i j P
d P l
.
2.7 Order Relation
We consider an order relation among intuitionistic
fuzzy numbers using extension principle the IF
MAX and IF MIN are defined as follows
{ , }{ , }
( ) { ( ), ( )}, amax a b br max s t
r Sup min s t
where { , }
max a b
is the membership function of
{ , }.max a b
{ , }{ , }
( ) { ( ), ( )},amin a b br min s t
r Inf max s t
where { , }
min a b is the non-membership function of
{ , }.min a b
Definition. 2.7.1. Let a and b be intuitionistic
fuzzy numbers, then { , }a b min a b a
Definition. 2.7.2. For intuitionistic fuzzy number
a and b ,
[ ] [ ]
[ ] [ ] [0,1]
a b Sup a Sup b
and
Inf a Inf b for any
Definition. 2.7.3. The Order Relation of
and is defined as follows.
(i) For arbitrary intuitionistic fuzzy number
, ( ).a a a reflexivity
(ii) For arbitrary intuitionistic fuzzy numbers
,
( )
a and b a b and b c a c
Antisymmetry
(iii) For arbitrary intuitionistic fuzzy numbers
, ,
( ).
a b and c a b and b c a c
transitivity
Definition. 2.7.4. Let h be a real number in [0,1].
For intuitionistic fuzzy numbers a and b ,
[ ] [ ]
[ ] [ ] [h,1]
ha b Sup a Sup b
and
Inf a Inf b for any
The strict inequality relation h hfor
is also
defined in the same manner as follows:
Definition. 2.7.5. For intuitionistic fuzzy
numbers a and b , and there exist an ha b
[h,1] holding either
[ ] [ ] [ ] [ ] .Sup a Sup b or Inf a Inf b
The following relation holds with regard to
possibility level h.
Lemma. 2.7.6.
'
' 0 1, h hIf a b and h h then a b
Rule. 2.7.7.
Let a and b be trapezoidal intuitionistic fuzzy
number such that ' '
1 2 3 4 1 2 3 4
' '
1 2 3 4 1 2 3 4
( , , , , , , , )
( , , , , , , , )
a a a a a a a a a
and
b b b b b b b b b
then a b
iff the following four inequalities hold
1 1 2 2 3 3 4 4, , a b a b a b and a b .
ha b
iff the following inequalities hold
1 2 1 1 2 1 2 2 3 3
4 3 4 4 3 4
( ) ( ), ,
( ) ( )
a h a a b h b b a b a b
and
a h a a b h b b
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 104 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
3. MATHEMATICAL FORMULATIONS
We can formulate the intuitionistic fuzzy shortest
path problem in the following linear programming
form (p’):
( , )
j j
( )
1
= 0 , ( 1,2,3..., )
1
0 1 ( , )
ij ij
i j A
ij ji
ij
Min f x l x
Subject to x x
if i s
if i s t i n
if i t
x or for any i j A
where in the objective function means the
addition between trapezoidal intuitionistic fuzzy
numbers.
Definition. 3.1. Let x, yX be two feasible
solution of P’. x dominates y iff ( ) ( )f x f y
holds.
Definition. 3.2. A path stp corresponding to a
non dominated solution x of P’ is called a non
dominated path or pareto optimal path. In other
words, the path stp is a non dominated path or
pareto optimal path iff there exists no other path
'
stp such that '( ) ( ).st std p d p
If we restrict each intuitionistic fuzzy number of
edge length to trapezoidal intuitionistic fuzzy
number, then the problem can be reformulated to
the following multi criteria linear programming
problem with six objective functions.
1 (1)
( , )
2 (2)
( , )
3 (3)
( , )
4 (4)
( , )
'
5 (1)
( , )
'
6 (4)
( , )
( )
( )
( )
( )
( )
( )
ij ij
i j A
ij ij
i j A
ij ij
i j A
ij ij
i j A
ij ij
i j A
ij ij
i j A
Min f x a x
Min f x a x
Min f x a x
Min f x a x
Min f x a x
Min f x a x
subject to x X
where ' '
(1) (2) (3) (4) (1) (4), , , , ,ij ij ij ij ij ija a a a a a are the
elements of trapezoidal intuitionistic fuzzy
number ' '
(1) (2) (3) (4) (1) (2) (3) (4)( , , , , , , , )ij ij ij ij ij ij ij ij ijl a a a a a a a a
In this paper, the proposed problem will be solved
by using the multiple label setting algorithm.
Definition. 3.3. For two trapezoidal intuitionistic
fuzzy numbers
' '
1 2 3 4 1 2 3 4
' '
1 2 3 4 1 2 3 4
( , , , , , , , )
( , , , , , , , ),
a a a a a a a a a
and
b = b b b b b b b b
we say that a is lexicographically smaller than b
if one of the following cases hold
' '
1 1 1 1
' '
1 1 1 1 2 2
' '
1 1 1 1 2 2 3 3
' ' ' '
1 1 1 1 2 2 3 3 4 4 4 4
1. , .
2. , , .
3. , , , .
4. , , , , , .
a b a b
a b a b a b
a b a b a b a b
a b a b a b a b a b a b
4. ALGORITHM
Step-1 Initialization
(i) Assign the label 1[0,( , )] label to node
s, where 0 ( 0,0,0,0 , 0,0,0,0 )TrIFN
(ii) Set the label to temporary one and
initialize the set P to empty as follows:
(1,1) .T and P
Step-2 Label Selection
(i) If ( i = t ), then go to step 7
(ii) Otherwise, among all the temporary labels
determine the lexicographically smallest
one. Let it be the kth
label associated with
node i.
(iii)Discard the pointer (i,k) to this label from
T, and append it to P as follows:
\ ( , ) ( , ).T T i k and P P i k
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 105
IJSER © 2012
http://www.ijser.org
Step-3 Label Scanning
(i) If the edge (i,k) forms the cycle then
discard that edge from Temp.
(ii) Otherwise check the node having more
than one edge from a same node among
the permanent edges.
Step-4 If it occurs, the current edge (i,k) preceding
node will be selected and the other edges will be
rejected from the permanent edges.
Step-5 Return to step-2.
Step-6 Optimal Path
Find the optimal path from the permanent P‘ from
s to t.
Step-7 Terminate the execution of the algorithm.
5. NUMERICAL EXAMPLE
As an example to illustrate algorithm, consider a
network with seven nodes and nine directed edges
as shown in the figure – 2.
Figure – 2
In the first step 1, the temporary edge 1[0,( , )]
is assign to source node s = 1. This node is
determined at the first iteration of step 2, and this
edge is set as a permanent edge. From node s =
1, the edges(1,2) and (1,3) are new temporary
edges with [(<25,30,40,55>,<20,30,40,60>) (1,2)]
and [(<21,28,32,50>,<15,28,32,55>) (1,3)]
respectively.
In the second iteration of step 2, the first edge of
node 3 is [(<21,28,32,50>, <15,28,32,55>) (1,3)]
determined as lexicographically smallest among
all the temporary edges. In step 3, the current
edge (1,3) does not form a cycle and sets it as a
permanent one. In the next iteration of step 2,
from this node 3, the node 4 & 5 are temporary
edges with [(<31,42,48,52>,<28,42,48,58>) (3,4)]
and [(<24,35,40,47>,<20,35,40,55>) (3,5)]
respectively. Among all the temporary edges,
node 5 is [(<24,35,40,47>,<20,35,40,55>) (3,5)] is
the lexicographically smallest. In this step , the
current edge (3,5) does not form a cycle and set it
as permanent one. The iterations are repeated
until they reach the destination node 7. Finally we
obtain the shortest path from source node 1 to
destination node 7 is 1 3 5 7 .
REFERENCES
[1] K.Atanassov, ―Intuitionistic Fuzzy Sets‖
Fuzzy sets and System, Volume 20, No. 1,
PP 87- 96, 1986.
[2] Dubois. D and Prade. H, ―Fuzzy Sets and
System‖, Academic Press, New York, 1980.
[3] Shu MH, Cheng CH, Chang JR., ―Using
intuitionistic fuzzy sets for fault-tree
analysis on printed circuit board assembly‖,
Microelectron Reliab 2006;46(12): 2139–
48.
[4] Klein, C. M. 1991 .Fuzzy Shortest Paths,
Fuzzy Sets and Systems 39, 27–41.
[5] V.Lakshmana Gomathi Nayagam,
G.Venkateshwari and Geetha Sivaraman,
―Ranking Of Intuitionistic Fuzzy Numbers‖,
2008 IEEE International Conference on
Fuzzy Systems (FUZZ 2008).
[6] Lawler E. 1976.Combinational
Optimization; Networks and Matroids, Holt,
Reinehart and Winston, New York.
[7] Lin, K. and M. Chen. 1994. The Fuzzy
Shortest Path Problem and its Most Vital
Arcs, Fuzzy Sets and Systems 58, 343–353.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 106 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
[8] Liu X. Entropy. 1992. Length measure and
similarity measure of fuzzy sets and their
relations. Fuzzy Sets and Systems,52,305–
18.
[9] Martins EQV. 1984. On a multi-criteria
shortest path problem. European Journal of
Operational Research, 16, 236–45.
[10] Nagoor Gani. A and Mohammed Jabarulla.
M, ―An Intuitionistic Fuzzy Multi Objective
Shortest Path‖, Advances in Fuzzy Sets and
Systems, Volume 7, No. 1, 2010, pp17-26.
[11] Nagoor Gani. A and Mohammed Jabarulla.
M, ―On Searching Intuitionistic Fuzzy
Shortest Path in a Network‖, Applied
Mathematical Sciences, Volume 4, No. 69-
72, 2010.
[12] Nagoor Gani. A and Anusuya. V, ―Shortest
Path on a Network using Fuzzy Number‖,
Advances in Fuzzy Sets and Systems,
Volume 7, No. 1, 2010, pp17-26.
[13] Okada, S. and T. Soper. 2000. A Shortest
Path Problem on a Network with Fuzzy Arc
Lengths, Fuzzy Sets and Systems 109, 129–
140.
[14] Pappis CP, Karacapilidis NI. 1993. A
comparative assessment of measures of
similarity of fuzzy values. Fuzzy Sets and
Systems ,56,171–4.
[15] Ramik J, Rimanek J. 1985. Inequality
relation between fuzzy numbers and its use
in fuzzy optimization. Fuzzy Sets and
Systems,16,123–38.
[16] Tanaka H, Ichihashi H, Asai K. 1984. A
formulation of fuzzy linear programming
problem based on comparison of fuzzy
numbers. Control and Cybernetics 13,185–
94.
[17] Tzung-Nan Chuang, Jung-Yuan Kung, ―A
new approach for the fuzzy shortest path
problem‖, Studies in Computational
Intelligence(SCI) 2.89 100(2005).
[18] Tzung-Nan Chuang, Jung-Yuan Kung, ―A
new algorithm for the discrete fuzzy shortest
path problem in a network‖, Applied
Mathematics and Computation 174 (2006)
660–668.
[19] Wang WJ. 1997. New similarity measures
on fuzzy sets and on elements. Fuzzy Sets
and Systems,85,305–9.
[20] Xinfan Wang, ―Fuzzy Number Intuitionistic
Fuzzy Arithmetic Aggregation Operators‖, -
International Journal of Fuzzy systems,
Volume10, No.2, June 2008.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 107
IJSER © 2012
http://www.ijser.org
The Bivariate Replacement Policy (U,N) for an
Alternative Repair Model
U. Rizwan and Zahiruddeen
Abstract - In this paper, a Bivariate Replacement Policy (U, N) with Negligible Or Non-Negligible (NONN) repair times under
which the system is replaced whenever the cumulative repair time of the system reaches U or the number of failures of the
system exceeds N, whichever occurs first is studied. Explicit expressions for the long run average cost for the model is derived.
Optimality conditions are deduced.
Index Terms - Geometric Process, NONN Repair Times, Optimal Replacement Policy.
—————————— ——————————
1. INTRODUCTION
N this paper, we study a repairable system of a
monotone process model for a one component
multistate degenerative system with (k+1) states
(k- failure states and one working state). Also an
alternative repair model, called the Negligible or
Non-Negligible (NONN) repair times introduced
by Thangaraj and Rizwan [2001] is incorporated
in this model to develop a new repair models. A
replacement policy ( U, N ) is adopted by which
the system will be replaced whenever the
cumulative repair time of the system reaches U;
another replacement policy U but with NONN
repair times, the N policy based on the number of
failures of the system assuming NONN repair
times and a bivariate replacement policy ( U, N )
under NONN repair times, where U is the
cumulative repair time of the system and N is the
number of failures of the system are studied.
Furthermore, explicit expressions for the long-run
average cost of the bivariate policy (U,N) with
NONN repair times is derived.
2. THE MODEL
We make the following assumptions:
——————————————
U. Rizwan is serving in the Department of Mathematics, Islamiah
College, Vaniyambadi, India. E-mail: [email protected]
Zahiruddeen ispursuing in Ph.D. degree in Mathematics at Islamiah
College, Vaniyambadi, India. E-mail : [email protected]
At time 0=t , a new system is put into field
use whenever the system fails,it will be
replaced by identical new one,some time later.
The system state at time t , denoted by )(tS is
0,;
( ) =
, ,
= 1,2,....
if the system is
working at time t
S t if the system is in the ith
i type of failure State at time t
i k
Thus the state space is = k0,1,2..... . If the
system fails, then with probability iP , the
system will be in state i , ki 1,2,= and
1=1= i
k
iP
Let iX be the first operating time. For 2n ,
let nX be operating time of the system after
1)( n -st repair, let n be the repair time after
the n -th failure and z be the replacement
time. Now, denote the time of the n th failure
by nt .
Assume that
)(=)( 1 tUtXP ,
and
kitaUitStXP i 1,2,...,=),(=)=)(/( 12 .
In general, for ,1,2,...=;11,2,...,= kinj j
I
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 108 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
),...,(=)=)(,...,=)(/(11
1111 taaUitSitStXPn
iinnn
where ....1 21 kaaa
Similarly, assume that
kitbVitStYP i 1,2,...,=),(=)=)(/( 11 .
In general, for ,1,2,...=;1,2,...,= kinj j
),...,(=)=)(,...,=)(/(1
11 tbbVitSitStYPn
iinnn
where 0....1 21 kbbb
The working age of the system at time T is
the cumulative life-time given by
1
1 1 1
, <( ) =
, <
n n n n n
n n n n n
t M L M t L MT t
L L M t L M
where i
n
i
n XL 1=
=
andYM i
n
i
n 1=
= 0.== 00 NM
Let r be the reward rate per unit time of the
system when it is operating and C be the
repair cost per unit time the system. Assume
further that the replacement cost comprises of
two parts: one part is the basic replacement
cost R and the other part is the cost
proportional to the length of replacement time
Z at rate pC
The replacement policy ),( NU is used. Let
1U be the first replacement time and in
general for 2n , let nU be the time between
the 1)( n -st replacement and n -th
replacement. Then the sequence
}1,2,=,{ nUn forms a renewal process,
therefore, the inter arrival times between two
consecutive replacement is a renewal cycle.
Let ),( NUC be the long run average cost per unit
time under the bivariate replacement policy
),( NU . By the renewal reward theorem, the long
run average cost per unit time under the
replacement policy ),( NU for a multistate
degenerative system with NONN repair times, is
given by
( , ) =the expected cost incurred in a cycle
C U Nthe expected length of a cycle
)(
)]()(
=
)(
1=
1
1=
)>(
1=
WE
RrcE
zECXrcU
NN
Mn
N
n
n
N
n
pNN
Mn
n
(1)
where is a random variable denoting the
number of failures before the working age of the
system reaches T , W is the length of a cycle and
)( denotes the indicator function. Therefore
10,1,...,= N .
The length of a cycle W under the replacement
policy ),( NU is
( > )
=1
1
( )
=1 =1
= n M NN
n
N N
n n M NN
n n
W X U
X Z
where 10,1,...,= N is the number of failures
before the working age of the system exceeds T.
Now
( )
=1
( )N
n M NN
n
E X
( )
=1
= [( ) / ]N
n M N NN
n
E E X M
)()=/(=1=
0udGuMXE NNn
N
n
U
)())((=1=
0udGXE Nn
N
n
U
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER-2012 ISSN 2229-5518 109
IJSER © 2012
http://www.ijser.org
)())(1(=1
1=0
udGppa
Nn
N
n
U
)())(1(=01
1=
udGppa
N
U
n
N
n
)())(1(=1
1=
uGppa
Nn
N
n
(2)
and
]}/)[({=])[( )(
1
1=
)(
1
1=
NUN
Mn
N
n
UN
Mn
N
n
MEEE
)()=/(=1
1=0
udGuME NNn
N
n
U
).(=0
uudGN
U
(3)
Further
( )E W
1
( )
=1 =1
( > )
=1
= [( ) ]
[( ) ] ( )
N N
n n M UN
n n
n M UN
n
E X
E X U E Z
]}=/)[({= )(
1
1=1=
uMXEE NNN
Mn
N
n
n
N
n
( > ) ( > )
=1
[ ] [ ] ( )n M U M UN N
n
E X E U E Z
)(][)(=0
)(
1=
uudGEXE N
U
UN
Mn
N
n
1
( ) ( > )1
=1
( ) [ ] [ ]N
n M U M M Un N N
n
E X E UE
)()())(1(=01
1=
uudGUGppa
N
U
Nn
N
n
(4)
where
1
1=
=
n
nk
n a
Pa
and .=
1
1=
n
nk
n b
Pb
Let j
N
nj
nN XW
1=
=
. Then nNnN WMM = .
Moreover nM and nNW are independent and
),())((=)( 10
ydHytaHtH nNnN
(5)
where )(1 tH nN is the distribution of j
N
njX 1=
.
Since the distribution function of 1nX is
)(=)( taFtH n , equation (5) can be written, by
induction, as )(=)( taGtH n
nNnN . Now
)<<(=][ )<<( nNnn
NMU
nM WMUMPE
)()(=
0udGtdH nnN
uU
U
),())((=
0udGuTaF n
nnN
U
so that equation (4) becomes
)())(1()(=)(1
1=
UGppa
UGUWE Nn
N
n
N
1
10=1
0
( ) ( (1 ) )
( ( )) ( )
NU
N nn
Un
N n n
udG u p pa
G b U u dG u
)())(1()(=)(1
1=0
UGppa
duUGWE Nn
N
n
N
U
1
1=1
0
( (1 ) )
( ( )) ( )
N
nn
Un
N n n
p pa
G b U u dG u
Now equation (1) becomes
( , )C U N
1
1 0=1
10=1
0
10=1
1
1 0=1
(1 ) ( ) ( )
( ) ( (1 ) ) ( )
( )=
( ) ( (1 ) ) ( )
( (1 ) ) ( ( )) ( )
N Un
N n nnn
NU
N Nnn
U
N p
NU
N Nnn
N Un
N n nnn
c p p G b U u dG ua
rUG U c p p dG Ua
r udG u R c
G U du p p G Ua
p p G b U u dG ua
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 110 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
1
1 0=1
1=1
0
10=1
1
1 0=1
{ ( (1 ) ) ( ( )) ( )
( (1 ) ) ( )}
( )=
( ) ( (1 ) ) ( )
(1 ) ( ( )) ( )
N Un
N n nnn
N
N pnn
U
N
NU
N Nnn
N Un
N n nnn
c p p G b U u dG ua
p p G U R ca
r G u du
G U du p p G Ua
p p G b U u dG ua
The standard minimization procedures can be
adapted to determine the optimal values.
3. CONCLUSION
By considering a repairable system of a monotone
process model of a one component multistate
degenerative system, explicit expressions for the
long-run average cost of the bivariate policy (U,
N) with NONN repair times is derived in this
paper.
REFERENCES
[1] Barlow, R.E, and Proschan, F., (1975)
Statistical Theory of Reliablity and life Testing
Holt, Rinchart and Winston,Inc, NY.
[2] Lam,Y., (1988), A note on the optimal
replacement problem, Advances in Applied
Probability, 20, 479 – 782.
[3] Lam,Y., (1992), Optimal policy for a general
repair replacement model: Discounted reward
case, Communication in Statistics: Theory
and Methods, 8,245 – 267.
[4] Tang, Y and Lam Y, A -shock Maintenance
Model for a Deteriorating System, European
Journal of Operational Research, 168, 541 –
556.
[5] Lam Y., and Zhang Y.L, A -shock
Maintenance of a repairable system,
Computer & Operation Research, 31, 1807 –
1820.
[6] Shantikumar JG., Sumita U, (1983), General
Shock assiciated with correlated renewal
sequences, Journal of Applied Probabilty,
20, 600 –614.
[7] Shantikumar J.G., Sumita U, (1984),
Distribution properties of the system failure
time in a general shock models Advances in
Aplied probability, Journal of Applied
Probabilty, 20, 600 –614.
[8] Thangaraj. V and Rizwan. U, (2001), Optimal
Replacement Policies in Burn-in Process for
an Alternative Repair Model, International J.
Inform. and Management Sciences, 12 (3),
43-56.
[9] Zhang Y. L, (1993), A Geometric process
repair model with good as new preventive
repair, IEEE Transaction on Reliability,
51(2), 223 – 228.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 111
IJSER © 2012
http://www.ijser.org
A Study on Comparison between Fuzzy Assignment Problems using Conversion of
Trapezoidal Fuzzy Numbers in to Triangular Fuzzy Numbers and Conventional Method
S. Manimaran and R. Vasuki
Abstract - Assignment problem is a well-known topic and is used very often in solving problems of engineering and
management science. In this paper trapezoidal fuzzy numbers are considered which are more realistic and general in
nature. The fuzzy assignment problem has been used for ranking the fuzzy numbers. The trapezoidal fuzzy numbers
have been transformed into triangular fuzzy numbers. Then we apply conventional method.
Index Terms – Fuzzy sets, Fuzzy Numbers, Fuzzy Assignment Problem, Fuzzy Ranking.
—————————— ——————————
1. INTRODUCTION
SSIGNMENT Problem (AP) is used
worldwide in solving real world problems. An
assignment problem plays an important role in
industry and other applications. In an assignment
problem, n jobs are to be performed by n persons
depending on their efficiency to do the job. In this
problem cij denotes the cost of assigning the jth
job
to the ith
person. We assume that one person can
be assigned exactly one job; also each person can
do at most one job. The problem is to find an
optimal assignment so that for performing all the
jobs, the total cost is minimum or the total profit is
maximum.
In this paper we investigate a more realistic
problem, namely the assignment problem with
fuzzy costs or times ijc~ . Since the objectives are
to minimize the total cost or to maximize the total
profit, subject to some crisp constraints, the
objective function is considered also as a fuzzy
number. The method to rank the fuzzy objective
values of the objective function by some ranking
method for fuzzy numbers to find the best
alternative. On the basis of this idea the Yager‘s
——————————————
S. Manimaran is serving in the Department of Mathematics, RKM
Vivekananda College, Chennai, India.
R. Vasuki is serving in the Department of Mathematics, S.I.V.E.T.
College, Chennai, India
ranking method has been adopted to transform the
fuzzy assignment problem to a crisp one so that
the conventional solution methods may be applied
to solve the AP.
The idea is to transform a problem with fuzzy
parameters to a crisp version in the LPP form and
to solve it by the simplex method. Other than the
fuzzy assignment problem other applications of
this method can be tried in project scheduling,
maximal flow, transportation problem etc.
2. FUZZY ASSIGNMENT PROBLEM AND
FUZZY RANKING METHOD
In recent years, fuzzy transportation and fuzzy
assignment problems have received much
attention.
Lin and Wen [9] solved the assignment problem
with fuzzy interval number costs by a labeling
algorithm. In the paper by Sakawa et al. [12], the
authors dealt with actual problems on production
and work force assignment in a housing material
manufacturer and a subcontract firm and
formulated two kinds of two-level programming
problems. Applying the interactive fuzzy
programming for two-level linear and linear
fractional programming problems, they derived
satisfactory solutions to the problems and
thereafter compared the results. They examined
actual planning of the production and the work
A
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 112 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
force assignment of the two firms to be
implemented. Chen [1] proved some theorems
and proposed a fuzzy assignment model that
considers all individuals to have some skills.
Wang [13] solved a similar model by graph
theory. Dubois and Fortemps [3] surveys
refinements of the ordering of solutions supplied
by the max-min formulation, namely the discrimin
partial ordering and the leximin complete
preordering. They have given a general algorithm
which computes all maximal solutions in the sense
of these relations. Different kinds of fuzzy
transportation problems are solved in the papers.
Dominance of fuzzy numbers can be explained by
many ranking methods. Of these, Yager's ranking
method [14] is a robust ranking technique which
satisfies the properties of compensation, linearity
and additivity. We have applied Yager's ranking
technique.
Zadeh [15] in 1965 first introduced fuzzy set as a
mathematical way of representing impreciseness
or vagueness in everyday life.
Fuzzy set. A fuzzy set is characterized by a
membership function mapping the elements of a
domain, space, or universe of discourse X to the
unit interval [0, 1].
A fuzzy set A~
in a universe of discourse X is
defined as the following set of pairs:
A~
= {(x, A~μ (x) : x X}.
Here A~μ : X [0, 1] is a mapping called the
membership function of the fuzzy set A~
and A~μ
(x) is called the membership value of degree of
membership of x X in the fuzzy set A~
. Larger
the value of A~μ (x), stronger is the grade of
membership form in A~
. These membership
grades are often represented by real numbers
ranging from a minimum of 0 to a maximum of 1.
Normal fuzzy set. A fuzzy set A~
of the universe
of discourse X is called a normal fuzzy set
implying that there exist at least one x X such
that A~μ (x) = 1.
Convex fuzzy set. The fuzzy set A~
is convex if
and only if, for any x1, x2 X, the membership
function of A~
satisfies the inequality
A~μ { x1 + (1)x2} min{
A~μ (x1), A
~μ (x2)},
0 1.
For a trapezoidal fuzzy number A(x), it can be
represented by A(a, b, c, d; 1) with membership
function A~μ (x) given by
otherwise.0,
dxc,c)(d
x)(dcxb1,
bxa,a)(b
a)(x
(x)μA~
satisfying the following conditions.
(i) A~μ (x) is a continuous mapping from R to
the closed interval [0, 1];
(ii) A~μ (x) = 0 for all x (, a];
(iii) Strictly increasing and continuous on [a,
b];
(iv) A~μ (x) = 1 for all x [b, c];
(v) Strictly decreasing and continuous on [c, d];
(vi) A~μ (x) = 0 for all x [d, ).
The graphic representation of a trapezoidal fuzzy
number is shown in Figure 1.
Figure 1: Graphical representation of trapezoidal fuzzy
number (a, b, c, d; 1)
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 113
IJSER © 2012
http://www.ijser.org
For a triangular fuzzy number A(x), it can be
represented by A(a, b, c; 1) with membership
function A~μ (x) given by
otherwise.0,
dxc,b)(c
x)(cbx1,
bxa,a)(b
a)(x
(x)μA~
satisfying the following conditions.
(x) is a continuous mapping from R
to the closed interval [0, 1];
(x) = 0 for all x (, a];
Strictly increasing and continuous
on [a, b];
(x) = 1 at x = b;
Strictly decreasing and continuous
on [b, c];
(x) = 0 for all x [c, ).
3. THE EXISTING METHOD
The assignment problem can be stated in the form
of n n cost matrix [cij] of real numbers as given
in the following table:
Jobs
1 2 3 j n
1 c11 c12 c13 c1j c1n
2 c21 c22 c23 c2j c2n
Persons I ci1 ci2 ci3 cij cin
N cn1 cn2 cn3 cn4 cnn
Mathematically assignment problem can be stated
as
Minimize
n
1i
n
1j
ijijxcz i = 1, 2, …, n;
j = 1, 2, …, n
subject to
n
ij
j 1
x 1, i 1,2,...,n
(1)
n1,2,...,j1,xn
1i
ij
ijx {0,1},
th
thij
if the i person is assigned 1,
where x the j job
0, otherwise
is the decision variable denoting the assignment of
the person 1 to job j. cij is the cost of assigning
the jth
job to the ith
person. The objective is to
minimize the total cost of assigning all the jobs to
the available persons (one job to one person).
When the costs or time ijc~ are fuzzy numbers,
then the total cost becomes a fuzzy number.
.xc~z~n
1i
n
1j
ijij
Hence it cannot be minimized directly. For
solving the problem we defuzzify the fuzzy cost
coefficients into crisp ones by a fuzzy number
ranking method.
Yager's ranking technique is a robust ranking
technique which satisfies compensation, linearity,
and additivity properties and provides results
which are consistent with human intuition. Given
a convex fuzzy number ,c~ the Yager's Ranking
Index is defined by
,dαcc0.5)c~Y(1
0
U
α
L
α
where U
α
L
α cc is the -level cut of the fuzzy
number .c~
In this paper we use this method for ranking the
objective values. The Yager's ranking index )c~Y(
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 114 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
gives the representative value of the fuzzy number
.c~ It satisfies the linearity and additivity
property:
If C~
bB~
aA~
and ,F~
tE~
kD~
where a, b, k, t are constants, then we have
)C~
bY()B~
aY(A~
Y and
).F~
tY()E~
kY()D~
Y(
On the basis of this property the fuzzy assignment
problem can be transformed into a crisp
assignment problem in the LPP form. The
ranking technique of Yager is:
If ),V~
Y()U~
Y( then .V~
U~ i.e.,
.U~
}V~
,U~
min{
For the assignment problem (1), with fuzzy
objective function
n
1i
n
1j
ijijxc~z~min
we apply Yager's ranking method (using the
linearity and additive property) to get the
minimum objective value *z~ from the formulation
n
1i
n
1j
ijij
* xc~Yzminimize)z~Y(
Subject to
n1,2,...,i1,xn
1j
ij
(2)
n1,2,...,j1,xn
1i
ij
ijx {0,1},
th
thij
if the i person is 1,
where x assigned the j job
0, otherwise
is the decision variable denoting the assignment of
the person i to job j. ijc~ is the cost of assigning
the jth
job to the ith
person. The objective is to
minimize the total cost of assigning all the jobs to
the available persons (one job to one person).
Since )c~Y( ij are crisp values, this problem (2) is
obviously the crisp assignment problem of the
form (1) which can be solved by the conventional
methods, namely the Hungarian Method or the
Simplex method to solve the LPP form of the
problem. Once the optimal solution x* of Model
(2) is found, the optimal fuzzy objective value *z~
of the original problem can be calculated as
.xc~z~n
1i
n
1j
*
ijij
*
4. NUMERICAL EXAMPLE
Example 4.1. Let us consider a Fuzzy Assignment
Problem with rows representing 4 persons A, B,
C, D and columns representing the 4 jobs Job1,
Job2, Job3 and Job4. The cost matrix ]c~[ ij is
given whose elements are trapezoidal fuzzy
numbers. The problem is to find the optimal
assignment so that the total cost of job assignment
becomes minimum
Solution. In conformation to Model (2) the fuzzy
assignment problem can be formulated in the
following mathematical programming form
Min [ Y(3, 5, 6, 7)x11 + Y(5, 8, 11, 12)x12
+ Y(9, 10, 11, 15)x13 + Y(5, 8, 10, 11)x14
+ Y(7, 8, 10, 11)x21 + Y(3, 5, 6, 7)x22
+ Y(6, 8, 10, 12)x23 + Y(5, 8, 9, 10)x24
+ Y(2, 4, 5, 6)x31 + Y(5, 7, 10, 11)x32
+ Y(8, 11, 13, 15)x33 + Y(4, 6, 7, 10)x34
+ Y(6, 8, 10, 12)x41 + Y(2, 5, 6, 7)x42
+ Y(5, 7, 10, 11)x43 + Y(2, 4, 5, 7)x44 ]
subject to
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 115
IJSER © 2012
http://www.ijser.org
x11 + x12 + x13 + x14 = 1,
x11 + x21 + x31 + x41 = 1,
x21 + x22 + x23 + x24 = 1,
x12 + x22 + x32 + x42 = 1, (3)
x31 + x32 + x33 + x34 = 1,
x13 + x23 + x33 + x43 = 1,
x41 + x42 + x43 + x44 = 1,
x14 + x24 + x34 + x44 = 1,
xij {0, 1}.
Now we calculate Y(3, 5, 6, 7) by applying the
Yager's Ranking Method. The membership
function of the trapezoidal number (3, 5, 6, 7) is
otherwise.0,
7x6,1
x)(76x51,
5x3,2
)3(x
(x)μA~
The -cut of the fuzzy number (3, 5, 6, 7) is
U
α
L
α cc = (2 + 3, 7 )
for which
11
1L U
α α0
1
0
1
0
Y(c ) Y(3,5,6,7)
0.5 c ,c dα
0.5(2α 3 7 α)dα
0.5(α 10)dα
5.25.
Proceeding similarly, the Yager's ranking indices
for the fuzzy costs ijc~ are calculated as:
12 13 14
21 22 23
24 31 32
33 34 41
42 43 44
Y(c ) 9, Y(c ) 11, Y(c ) 8.5,
Y(c ) 9, Y(c ) 5.25, Y(c ) 9,
Y(c ) 8, Y(c ) 4.25, Y(c ) 8.25,
Y(c ) 11.75, Y(c ) 6.75, Y(c ) 9,
Y(c ) 5, Y(c ) 8.25, Y(c ) 4.5.
We replace these values for their corresponding
ijc~ in (3), which results in a conventional
assignment problem in the LPP form. We solve it
by using LINGO 9.0 to get the following optimal
solution
* * * *
13 22 31 44
* * * * * *
11 12 14 21 23 24
* * * * * *
32 33 34 41 42 43
x x x x 1,
x x x x x x 0,
x x x x x x 0,
with the optimal objective value 25.25)z~Y( *
which represents the optimal total cost. In other
words the optimal assignment is
A 3, B 2, C 1, D 4.
The fuzzy optimal total cost is calculated as
13 22 31 44c c c c
(9,10,11,15) (3,5,6,7)
(2,4,5,6) (2,4,5,7)
= (16, 23, 27, 35).
Also we find that
25.25.35)27,2,Y(16,)z~Y( *
5. CONVENTIONAL (HUNGARIAN) METHOD
Convert the trapezoidal fuzzy numbers into
triangular fuzzy numbers. Then apply
conventional method to find the optimal solution
in fuzzy environment
6. CONCLUSION
A conventional method is proposed to solve the
fuzzy assignment problem with trapezoidal fuzzy
numbers in real life situations. To illustrate the
proposed method a numerical example is solved
and the results are compared with the
conventional method. If there is no uncertainity
about the cost then the conventional method gives
the same result as in the fuzzy assignment
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 116 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
problem with trapezoidal fuzzy numbers. The
proposed method of solving assignment problem
is simple in nature and applicable to any kind of
assignment problems.
REFERENCES
[1] M.S. Chen, On a fuzzy assignment problem,
Tamkang J. Vol. 22, 1985, pp. 407411.
[2] C.B. Chen and C.M. Klein, A simple
approach to ranking a group of aggregated
fuzzy utilities, IEEE Trans. Syst. Man.
Cybern. B., 27, 1997, pp. 2635.
[3] D. Dubois and P. Fortemps, Computing
improved optimal solutions to max-min
flexible constraint satisfaction problems,
European Journal of Operational Research,
Vol. 118, 1999, pp. 95126.
[4] D. Dubois and H. Prade, Fuzzy Sets and
Systems: Theory and Applications,
Academic Press, New York, 1980.
[5] Y. Feng and L. Yang, A two-objective fuzzy
k-cardinality assignment problem, Journal of
Computational and Applied Mathematics,
Vol. 197, 2006, pp. 233244.
[6] P. Fortemps and M. Roubens, Ranking and
defuzzification methods based on area
compensation, Fuzzy Sets and Systems, 82,
1996, pp. 319330.
[7] G.J. Klir and B. Yuan, Fuzzy sets and fuzzy
logic (Theory and applications), Prentice-
Hall, International Inc., 1995.
[8] H.W. Kuhn, The Hungarian method for the
assignment problem, Naval Research
Logistics Quarterly, Vol. 2, 1955, pp.
8397.
[9] C.J. Lin and U.P. Wen, A labeling algorithm
for the fuzzy assignment problem, Fuzzy
Sets and Sytsems, Vol. 142, 2004, pp.
373391.
[10] T.S. Liou and M.J. Wang, Ranking fuzzy
number with integral values, Fuzzy Sets and
Systems, Vol. 50, 1992, pp. 247255.
[11] L. Liu and X. Gao, Fuzzy weighted
equilibrium multi-job assignment problem
and genetic algorithm, Applied
Mathematical Modeling, Vol. 33, 2009, pp.
39263935.
[12] M. Sakawa, I. Nishizaki and Y. Uemura,
Interactive fuzzy programming for two-level
linear and linear fractional production and
assignment problems: a case study,
European Journal of Operational Research,
Vol. 135, 2001, pp. 142157.
[13] X. Wang, Fuzzy optimal assignment
problem, Fuzzy Math., Vol. 3, 1987, pp.
101108.
[14] R.R. Yager, A procedure for ordering fuzzy
subsets of the unit interval, Info. Sci., 24,
1981 pp. 143161.
[15] L.A. Zadeh, Fuzzy Sets, Information and
Control, Vol. 8, 1965, pp. 338353.
[16] L.A. Zadeh, The concept of a linguistic
variable and its application to approximate
reasoning, Information Sciences, Part 1, 2 &
3, Vol. 8, 1975. pp. 199249, Vol. 9, 1976,
pp. 4358.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 117
IJSER © 2012
http://www.ijser.org
Generalized Partial Sums on Infinite Series of Rational Factorial Functions
M.Maria Susai Manuel, G.Britto Antony Xavier, G.Dominic Babu and K.Srinivasan
Abstract - In this paper, the authors obtain some significant formulae for the general partial sums on infinite series of rational
functions of the generalized polynomial factorial using the inverse of generalized difference operator of th
n kind n
for the positive
integer n and for the positive real . Suitable examples are provided to illustrate the main results.
Index Terms - Generalized difference operator, generalized polynomial factorial, generalized factorial, partial sums.
—————————— ——————————
1. INTRODUCTION
N number theory, some applications, like sum
of the n th powers of an arithmetic progression,
the sum of the products of n consecutive terms of
an arithmetic progression and the sum of an
arithmetic-geometric progression are developed in
[2] using the generalized difference operator
defined as
( ) = ( ) ( )u k u k u k .
Using , Generalized Bernolli‘s polynomials
( , )nB k are established in [4, 5]. Qualitative
behaviors, like rotatory, spiral, boundedness,
recessive and dominant properties of the
generalized Ricatti‘s equation
( ) ( ) ( ) ( ) = ( ) ( ), ( )p k u k p k u k q k u k k
——————————————
M. Maria Susai Manuel is serving in the Department of Science and Humanities, R.M.D. Enngineering College, Kavaraipettai, Tamil Nadu, India. E-mail: [email protected]
G. Britto Antony Xavier is serving in the Department of Mathematics, Sacred Heart College, Tirupattur, India.
G. Dominic Babu is serving in the Department of Mathematics, Sacred Heart College, Tirupattur, India.
K. Sriivasan is serving in the Department of Mathematics, Sacred Heart College, Tirupattur, India.
for integers and are developed in [3, 6, 7,
8]. Sums and sum of partial sums of higher
powers, products of consecutive terms of an
arithmetic progression are established in [9]. As
infinite partial sums on product of terms of
rational functions of are not yet developed in the
literature, in this paper, we derive the formula for
infinite partial sums on product of terms of
rational functions of polynomial factorial and
factorials. Here we assume the notations:
( ) ={ , , 2 , }j j j j , 1( ) = ( )j j ,
X and X are the upper integer part and
integer part of X respectively and (0, ) .
2. PRELIMINARIES
In this section, we present some basic definitions
and some results which will be useful for the
subsequent discussion.
Definition 2.1 [2] The generalized difference
operator on real valued function
( ), [0, )u k k is defined as
( ) = ( ) ( ).u k u k u k (1)
and the generalized difference operator of the thr
kind is defined as
I
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 118 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
( ) = ( ( ( ( )))).r
r times
u k u k (2)
Definition 2.2 For (1)n and (0, ) , the
generalized positive polynomial factorial and
reciprocal polynomial factorial are respectively
defined as
( ) = ( )( 2 )...( ( 1) )nk k k k k n (3)
and
( )
1 1= .
( )( 2 )...( ( 1) )n k k k k nk (4)
(4) is generalized reciprocal factorial when
=k
n
.
Definition 2.3 [2] For ( )u k the inverse operator
1 is defined as
1( ) = ( ), ( ) = ( ) ,jif v k u k then v k u k c (5)
where jc is a constant for all
( ), =k
k j j k
.
In general 1 ( 1)( ) = ( ( ))n nu k u k for
(2)n .
Lemma 2.4 [11] If 1 ( ) = 0lim
k
u k
and
=k
j k
, then
1
=1
( ) | = ( ).k
r
u k u k r
(6)
Theorem 2.5 If ( ) = 0limr
k
u k
for =1,2, ,r m
and [ , )k m , then
( 1)
=
( 1)( ) | = ( ).
( 1)!
mm
k
r m
ru k u k m r
m
(7)
Proof. The proof follows by taking 1 on (6) for
( 1)m times and applying (6).
3. MAIN RESULTS AND APPLICATIONS
Here, we present 1 of certain rational functions
to find the sum and partial sums on infinite series
of generalized rational factorial and polynomial
factorial functions.
Theorem 3.1 Let , (1)m n , ( 1)m n ,
0nk . Then
( 1)
( )=
( ) ( )
( 1) 1
( 1)! ( )
1= .
( 1) ( )
m
nr m
m m n m
r
m k m r
n k m
(8)
Proof. From the Definitions 2.1 and 2.3, we
obtain
1
( ) ( 1)
1 1| = , 2.
( 1) ( )kn n
nk n k
(9)
The proof follows by taking 1 on (9) for
( 1)m times and (7).
The following example illustrate Theorem 3.1 for
m=3.
Example 3.2 For 4n , [3 , )k , (0, )
and = 3m , equation (8) becomes
(2)
( ) (3) 3 ( 3)=3
( 1) 1= .
(2)!( ( 2) ) ( 1) ( 3 )n nr
r
k r n k
(10)
In particular, = 2k , = 0.5, = 4n in (10), we
obtain
4
1 3 1=
2 1.5 1 0.5 2.5 2 1.5 1 6 0.5
.
Theorem 3.3 For 0k and (2)( ) 0k r ,
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 119
IJSER © 2012
http://www.ijser.org
2 2
(2)=1
2 (2 1) 1= .
( )r
k r
kk r
(11)
Proof. From (1) and (5), we find
1
2 2(2)
2 1= .
( )
k
kk
(12)
The proof follows by applying (6) on (12) for the
limit k to .
The following is an illustration of Theorem 3.3.
Example 3.4 By taking = 0.4 in (11), we get
2 2
(2)=1
0.4
2 (2 1)(0.4) 1=
(0.4)( (0.4))r
k r
kk r
In particular, when =1k ,
2 2 2 2 2 2
2 1(0.4) 2 3(0.4) 2 5(0.4) 1= .
0.4(1.4) (1) (1.8) (1.4) (2.2) (1.8)
Theorem 3.5 For 0k and (2)( ) 0k r ,
( 1)
=1 (2)
( 1) 1= .
( ) 2 2
k r kr
k r
k r k
(13)
Proof. From (1) and (5), we have
1
(2)
2 1=
( ) 2 2
k k
k
k k
(14)
The proof follows by (6) and (14).
The following is the illustration for Theorem 3.5.
Example 3.6 Taking = 0.5 in (13), we obtain
( 1)(0.5) 0.5
=1 (2) (0.5) 0.50.5
( 1)(0.5) 1= .
2( (0.5)) 2
k r kr
k r
kk r
In particular when = 2k ,
2 2.5 3
0.5 0.5 0.5
3 3.5 4 1= .
16(2.5)(2)2 (3)(2.5)2 (3.5)(3)2
Theorem 3.7 For [ , )k , (0, ) and
(2)2(2 3 ) 0k
(2)
=1 2
1 1=
(2 )2(2 (2 1) )r kk r
(15)
Proof. From (1) and (5), we have
1
(2)2
1 1=
(2 )2(2 3 ) kk
(16)
The proof follows by (6), (16) and = 0jc as
.k
The following is the illustration for Theorem 3.7.
Example 3.8 Taking = 0.5 in (15), we find
(2) (2) (2)0.5 0.5 0.5
1 1 1
(2 1.5) (2 2.5) (2 3.5)
1=
(2 0.5)
k k k
k
In particular when =1.3k , we get
1 1 1 1=
4.1 3.6 5.1 4.6 6.1 5.6 3.1
.
Theorem 3.9 For [ , )k , (0, ) and
(2)( 2 ) 0k
=0 (2)
2( ) 5 1=
( 2 ) 3 ( )3
k r kr
k r
k r k
(17)
Proof. From (1) and (5), we find
1
(2)
2 5 1=
( 2 ) 3 ( )3
k k
k
k k
(18)
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 120 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
The proof follows by (6), (18) and = 0jc as
k .
The following is the illustration for Theorem 3.9.
Example 3.10 Taking = 0.3 in (17), yields
0.3 0.6
(2) (2)0.3 0.30.3 0.3
0.9
(2) 0.3 0.30.3
2 1.5 2 2.1
( 0.6) 3 ( 0.9) 3
2 2.7 1= .
( 1.2) 3 ( 0.3)3
k k
k k
k k
k k
k
k k
In particular when =12k ,
41 42
43 40
25.5 26.1
12.6 12.3 3 12.9 12.6 3
26.7 1= .
13.2 12.9 3 12.3 3
Theorem 3.11 For [ , )k , (0, ) and
(4)( 4 ) 0k
(4) (3)
=0
3 (3 7 )=
( 4 ) 6 ( 3 )r
k r k
k r k
(19)
Proof. From (1) and (5), we get
1
(4) (3)
3 3 7=
( 4 ) 6 ( 3 )
k k
k k
(20)
The proof follows by (6), (20) and = 0jc as
k .
The following is the illustration for Theorem 3.11.
Example 3.12 When = 2.7 , (19) becomes
(4) (4) (4)2.7 2.7 2.7
(3)2.7
8.1 10.8 13.5
( 10.8) ( 13.5) ( 16.2)
3 18.9=
16.2( 8.1)
k k k
k k k
k
k
Theorem 3.13 For [ , )k , (0, ) and
(2)2(2 ) 0k
1=0 (2)
2
1=
3 (2( ) ) 4(3) (2 )
k r kr
k r
k r k
(21)
Proof. From (1) and (5), we get
1
1(2)2
( ) 1=
3 (2 ) 4(3) (2 )
k k
k
k k
(22)
The proof follows by (6), (22) and = 0jc as
.k
The following is the illustration for Theorem 3.13.
Example 3.14 Taking = 0.2 in (21), we arrive
0.2
(2) (2)0.2 0.20.4 0.4
0.41
(2)0.2 0.20.4
0.2 0.4
3 (2 0.2) 3 (2 0.6)
( 0.6) 1=
3 (2 1) 4(3) (2 0.2)
k k
k k
k k
k k
k
k k
Theorem 3.15 For [ , )k , (0, ) and
( ) 0
k
k
=0
( ) 1=
( )
k r kr
r
k r
k r k
(23)
Proof. From (1) and (5), we get
1 =
( )
kk
k
k
kk
(24)
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 121
IJSER © 2012
http://www.ijser.org
The proof follows by (6), (24) and = 0jc as
.k
The following is to illustrate Theorem 3.15.
Example 3.16 Taking =1.2 in (23), we get
1.2 2.4
1.2 1.21.2 1.2
3.6
1.2 1.221.2 1.2
1.2
( 1.2) 1.2( 2.4)
( 2.4) 1=
1.2 ( 3.6)
k k
k k
k k
k k
k
k k
In particular, when = 3k the above series
becomes
(4) (5) 2 (6) (3)1.2 1.2 1.2 1.2
3 4.2 5.4 1=
4.2 (1.2)5.4 1.2 6.6 3a
Theorem 3.17 For [ , )k , (0, ) and
(2)( 4 ) ( ) 0
k
k k
2 2
=0(2)
( 2 ) 3
( 4 ) ( )
1=
( 3 )
k rr
r
k
k r
k r k r
k k
(25)
Proof. From (1) and (5), we find
2 2
1
(2)
(( 2 ) 3 )=
( 4 ) ( ) ( 3 )
k k
k k
k
k k k k
(26)
The proof follows by (6), (26) and = 0jc as
k
The following example illustrates Theorem 3.17.
Example 3.18 When =1.7 , (25) yields
2 2
1.7
1.7(2)1.7 1.7
2 2
2(1.7)
1.7(2)1.7 1.7
1.71.7
( 2(1.7)) 3(1.7)
( 4(1.7)) ( 1.7)
( 3(1.7)) 3(1.7)
1.7( 5(1.7)) ( 2(1.7))
1=
( 3(1.7))
k
k
k
k
k k
k
k k
k k
.
Theorem 3.19 For [ , )k , (0, ) and
2 2 (2)( 2 ) ( ) 0
k
k k
3 3
=02 2 (2)
( )
(( ) 2 ) ( )
k rr
r
k r
k r k r
2 2
1= .
(( ) 2 )
k
k k
(27)
Proof. From (1) and (5), we obtain
3 31
2 2 (2) 2 2
( )=
( 2 ) ( ) (( ) 2 )
k k
k k
k
k k k k
(28)
The proof follows by (6),(28) and = 0jc as
k
The following is the illustration for Theorem 3.19.
Example 3.20 Taking = 3.5 in (27), we obtain
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 122 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
3 3
3.5
3.52 2 (2)3.5 3.5
3 3
2(3.5)
3.52 2 (2)3.5 3.5
3 3
3(3.5
2 2 2 (2)3.5 3.5
3.5
( 2(3.5) ) ( 3.5)
( 3.5) 3.5
3.5(( 3.5) 2(3.5) ) ( 2(3.5))
( 2(3.5)) 3.5
3.5 (( 2(3.5)) 2(3.5) ) ( 3(3.5))
k
k
k
k
k k
k
k k
k
k k
)
3.5
3.52 23.5
1=
(( 3.5) 2(3.5) )
k
k k
In particular, when = 9k , above series becomes
3 3
2 2 (2) (4)3.5 3.5
3 3
2 2 (2) (5)3.5 3.5
3 3
2 2 2 (2) (6)3.5 3.5
2 2 (3)3.5
9 3.5
(9 2(3.5) ) 12.5
12.5 3.5
3.5(12.5 2(3.5) ) 16
16 3.5
3.5 (16 2(3.5) ) 19.5
1=
(5.5 2(3.5) )9
Theorem 3.21 For [ , )k , (0, ) ,
(2)( ( 1) ) ( ) 0
k
k m k
2
=0(2)
(( ) ( 1)( ) )
( ( 1) ) ( )
1= .
( )
k rr
r
k
k r m k r
k r m k r
k m k
(29)
Proof. From (1) and (5), we obtain
21
(2)
(( ) ( 1) )=
( ( 1) ) ( ) ( )
k k
k k
k m k
k m k k m k
(30)
The proof follows by (6), (30) and = 0jc as
k
The following are to illustrate Theorem 3.21.
Example 3.22 Taking = 1, = 0.8m in (29)
2 2
0.8(3)0.8 0.8
2 2
0.8
0.8(3)0.8 0.8
2 2
2(0.8)
0.82 (3)0.8 0.8
0.80.8
0.8
( 0.8)
( 0.8) 0.8
0.8( 2(0.8)) ( 0.8)
( 2(0.8)) 0.8
0.8 ( 3(0.8)) ( 2(0.8))
1=
( 0.8)
k
k
k
k
k
k k
k
k k
k
k k
k k
.
In particular, when = 2k
2 2 2 2
(3) (3) (3) (4) (3)0.8 0.8 0.8 0.8 0.8
2 0.8 2.8 0.8 1=
2.8 2 0.8 3.6 2.8 1.2 2
.
The following theorem gives the formula for
finding sum of infinite second partial sums of
reciprocals of products of consecutive terms of an
arithmetic progression.
Theorem 3.23 For the positive integer 4n ,
[3 , )k and (0, ) ,
(2)
( )=3
3 ( 3)
( 1) 1
2! ( )
1= ,
( 1)( 2)( 3) ( 3 )
nm
n
m
k m
n n n k
(31)
In general for ( 1), [ , )n r k r and
(0, ) ,
( 1)
( )=
( ) ( )
( 1) 1
( 1)! ( )
( 1)= .
( 1) ( )
r
nm r
r
r r n r
m
r k m
n k r
(32)
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 123
IJSER © 2012
http://www.ijser.org
Proof. The proof follows from (8) and constants
' = 0ijc s as k .
The following theorem gives the formula for
finding sum of infinite fifth partial sums of
reciprocals of products of consecutive terms of an
arithmetic progression.
Theorem 3.24 Let 7n , [6 , )k and
(0, ) . Then
(5)
( ) (6) 6 ( 6)=1
( 5) 1 1= .
(5)! ( ( 1) ) ( 1) ( 6 )n nt
t
k t n k
(33)
Proof. The proof follows by (8) and (31).
The following example illustrates Theorem 3.24.
Example 3.25 Substituting = 3.6, = 7n in (33),
we find
(7) (7) (7)3.6 3.6 3.6
6 (1)3.6
1 6 21
( ) ( 3.6) ( 2(3.6))
1=
6!3.6 ( 21.6)
k k k
k
In particular, when = 23k , above series becomes
(7) (7) (7) 63.6 3.6 3.6
1 6 21 1=
23 26.6 30.2 6!3.6 (1.4) .
REFERENCES
[1] R.P Agarwal, Difference Equations and
Inequalities, Marcel Dekker, New York,
2000.
[2] M.Maria Susai Manuel, G.Britto Antony
Xavier and E.Thandapani, Theory of
Generalized Difference Operator and Its
Applications, Far East Journal of
Mathematical Sciences, 20(2) (2006), 163 -
171.
[3] M.Maria Susai Manuel, G.Britto Antony
Xavier and E.Thandapani, Qualitative
Properties of Solutions of Certain Class of
Difference Equations , Far East Journal of
Mathematical Sciences, 23(3) (2006), 295-
304.
[4] M.Maria Susai Manuel, G.Britto Antony
Xavier and E.Thandapani, Generalized
Bernoulli Polynomials Through Weighted
Pochhammer Symbols, Far East Journal of
Applied Mathematics, 26(3) (2007), 321-333.
[5] M.Maria Susai Manuel, A.George Maria
Selvam and G.Britto Antony Xavier, On the
Solutions and applications of Some Class of
Generalized Difference Equations, Far East
Journal of Applied Mathematics, 28(2)
(2007), 223 - 241.
[6] M.Maria Susai Manuel, A.George Maria
Selvam and G.Britto Antony Xavier, Rotatory
and Boundedness of Solutions of Certain
Class of Difference Equations, International
Journal of Pure and Applied Mathematics,
33(3) (2006), 333-343.
[7] M.Maria Susai Manuel and G.Britto Antony
Xavier, Recessive, Dominant and Spiral
Behaviours of Solutions of Certain Class of
Generalized Difference Equations,
International Journal of Differential
Equations and Applications, 10(4) (2007),
423-433.
[8] M.Maria Susai Manuel, A.George Maria
Selvam and G.Britto Antony Xavier, Regular
Sink and Source in terms of Solutions of
Certain Class of Generalized Difference
Equations, Far East Journal of Applied
Mathematics, 28(3) (2007), 441 - 454.
[9] M.Maria Susai Manuel, G.Britto Antony
Xavier and V.Chandrasekar, Generalized
Difference Operator of the Second Kind and
Its Application to Number Theory,
International Journal of Pure and Applied
Mathematics, 47(1) (2008), 127 - 140.
[10] M.Maria Susai Manuel, G.Britto Antony
Xavier, V.Chandrasekar and R.Pugalarasu,
On Generalized Difference Operator of Third
Kind and its Applications to Number
Theory,International Journal of Pure and
Applied Mathematics 53(1) (2009),69-82.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 124 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
[11] M. Maria Susai Manuel, Adem Kilicman, G.
Britto Antony Xavier,R. Pugalarasu3and D.
S. Dilip On the solutions of second order
generalized difference equations Advances in
Difference Equations 2012, (acepted
2012:105).
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 125
IJSER © 2012
http://www.ijser.org
Solution of a Conjecture on Skolem Mean Graph
of stars K1, K1, K1, m K1, n
V. Balaji, D.S.T. Ramesh and V. Maheswari
Abstract – In this paper, we prove the conjecture that the four stars K1, K1, K1, m K1, n is a skolem mean graph
if |m–n| < 4 + 2 for = 2,3,4, . . .; m = 2,3,4, . . . and ≤ m < n.
Index Terms – Skolem mean graph and star.
—————————— ——————————
--
1. INTRODUCTION
LL graphs in this paper are finite, simple and
undirected. Terms not defined here are used
in the sense of Harary [5]. In [1], skolem mean
labeling was focused an assignment of label to the
vertices x V with distinct elements f(x) from 1,
2, . . . , p in such a way that when the edge e = uv
is labeled with
2
f(v)f(u) if f(u) + f(v) is even and
2
1f(v)f(u) if f(u) + f(v) is odd
then the edges get distinct labels from the set {2,3,
…, p} and it was proved that any path is a skolem
mean graph, if m ≥ 4, K1, m is not a skolem mean
graph and the two stars K1, m K1, n is a skolem
mean graph if and only if |m–n| ≤ 4. In [2], it was
proved that the three star K1, K1, m K1, n is a
skolem mean graph if
——————————————
V. Balaji is serving in the Department of Mathematics, Sacred Heart
College, Tirupattur, India. E-mail: [email protected]
D.S.T. Ramesh is serving in the Department of Mathematics,
Margoschis College, Nazerath, India. E-mail : [email protected]
V. Maheswari is serving in the Department of Mathematics,
Manonmaniam Sundaranar University, Tirunelveli, India.
|mn| = 4+ for = 1, 2, 3, . . . ;
m = 1, 2, 3, . . . ;
n = + m + 4 and
≤ m < n ;
the three star K1, K1, m K1, n is not a skolem
mean graph if
|mn| > 4 + for = 1, 2, 3, . . . ;
m = 1, 2, 3, . . . ;
n ≥ + m + 5 and
≤ m < n ;
the four star K1, K1, K1, m K1, n is a
skolem mean graph if
|mn| = 4 + 2 for = 2, 3, 4, . . . ;
m = 2, 3, 4, . . . ;
n = 2 + m + 4 and
≤ m < n ;
the four star K1, K1, K1, m K1, n is not a
skolem mean graph if
|mn| > 4 + 2 for = 2, 3, 4, . . . ;
m = 2, 3, 4, . . . ;
n ≥ 2 + m + 5 and
≤ m < n ;
the four star K1,1 K1, 1 K1, m K1, n is a
skolem mean graph if
|mn| = 7 for m = 1, 2, 3, . . . ;
n = m + 7 and
1 ≤ m < n
and the four star K1,1 K1, 1 K1, m K1, n is not
a skolem mean graph if
A
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 126
IJSER © 2012
http://www.ijser.org
|mn| > 7 for m = 1, 2, 3, . . . ;
n ≥ m + 8 and 1 ≤ m < n.
In [3], the condition for a graph to be skolem
mean is that p ≥ q + 1. In [4], We proved a
conjecture that the three stars K1, K1, m K1, n
is a skolem mean graph if |mn| < 4+ for
= 1, 2, 3, . . . ; m = 1, 2, 3, . . . and ≤ m < n .
2. MAIN THEOREMS
Definition 2.1.0 The four star is the disjoint
union of K1, a, K1, b, K1, c and K1, d . It is denoted
by K1, a K1, b K1, c K1, d.
Theorem 2.1.1 If ≤ m < n, the four star
K1, K1, K1, m K1, n
is a skolem mean graph if |mn| < 4 + 2 for =
2, 3, 4, . . . ; m = 2, 3, 4, . . . .
Proof.
Case : 1 Consider the graph
G = K1, K1, K1, m K1, n.
Let ≤ m < n where n = 2 + m + 3 for = 2, 3,
4, . . . and m = 2, 3, 4, . . . . Let us take the case
that |mn| < 4 + 2 for = 2, 3, 4, . . . ; m = 2, 3,
4, . . . and n = 2 + m + 3. We have to prove that
G is a skolem mean graph.
Therefore, the graph
G = K1, K1, K1, m K1, n
where n = 2 + m + 3 for = 2, 3, 4, . . . and m
= 2, 3, 4, . . . .
Let
{u} {ui: 1 i }, {v} {vj: 1 j },
{w} {wk: 1 k m} and {x} {xh: 1 h n}
be the vertices of G. Then G has 2 + m + n + 4
vertices and 2 + m + n edges.
We have
V(G) = {u, v, w, x} {ui: 1 i }
{vj: 1 j } {wk: 1 k m}
{xh: 1 h n}.
The required vertex labeling f: V(G) {1, 2, 3, 4,
. . . , 2 + m + n + 4} is defined as follows:
The corresponding edge labels are as follows:
The edge label of
uui is i + 3 for 1 i ;
vvj is + j + 3 for 1 j ;
wwk is 2 + k + 4 for 1 k m and
xxh is 2 2 5
2
h m n for 1 h n – 1.
The edge label of xxn is 2 + m + n + 4. Hence
the induced edge labels of G are distinct. Hence
the graph G is a skolem mean graph.
Case : 2 Consider the graph
G = K1, K1, K1, m K1, n.
Let ≤ m < n where n = 2 + m + 2 for = 2, 3,
4, . . . and m = 2, 3, 4, . . . . Let us take the case
that |mn| < 4 + 2 for = 2, 3, 4, . . . ; m = 2, 3,
4, . . . and n = 2 + m + 2. We have to prove that
G is a skolem mean graph.
Therefore, the graph
G = K1, K1, K1, m K1, n
where n = 2 + m + 2 for = 2, 3, 4, . . . and
m = 2, 3, 4, . . . .
Let
{u} {ui: 1 i }, {v} {vj: 1 j },
{w} {wk: 1 k m} and {x} {xh: 1 h n}
be the vertices of G. Then G has 2 + m + n + 4
vertices and 2 + m + n edges.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 127
IJSER © 2012
http://www.ijser.org
We have
V(G) = {u, v, w, x} {ui: 1 i }
{vj: 1 j } {wk: 1 k m}
{xh: 1 h n}.
The required vertex labeling
f: V(G) {1, 2, 3, 4, . . . , 2 + m + n + 4}
is defined as follows:
The corresponding edge labels are as follows:
The edge label of
uui is i + 2 for 1 i ;
vvj is + j + 2 for 1 j ;
wwk is 2 + k + 3 for 1 k m and
xxh is 2 2 6
2
h m n for 1 h n –2.
The edge label of xx n-1 is 2 + m + n +3 and the
edge label of xxn is 2 + m + n + 4. Hence the
induced edge labels of G are distinct. Hence the
graph G is a skolem mean graph.
Case : 3 Consider the graph
G = K1, K1, K1, m K1, n.
Let ≤ m < n where n = 2 + m + 1 for = 2, 3,
4, . . . and m = 2, 3, 4, . . . . Let us take the case
that |mn| < 4 + 2 for = 2, 3, 4, . . . ; m = 2, 3,
4, . . . and n = 2 + m + 1. We have to prove that
G is a skolem mean graph.
Therefore, the graph
G = K1, K1, K1, m K1, n
where n = 2 + m + 1 for = 2, 3, 4, . . . and
m = 2, 3, 4, . . . .
Let
{u} {ui: 1 i }, {v} {vj: 1 j },
{w} {wk: 1 k m}
and {x} {xh: 1 h n}
be the vertices of G. Then G has 2 + m + n + 4
vertices and 2 + m + n edges.
We have
V(G) = {u, v, w, x} {ui: 1 i }
{vj: 1 j } {wk: 1 k m}
{xh: 1 h n}.
The required vertex labeling f: V(G) {1, 2, 3, 4,
. . . , 2 + m + n + 4} is defined as follows:
The corresponding edge labels are as follows:
The edge label of
uui is i + 2 for 1 i ;
vvj is + j + 2 for 1 j ;
wwk is 2 + k + 3 for 1 k m and
xxh is 2 2 7
2
h m n for 1 h n –1.
The edge label of xxn is 2 + m + n + 4. Hence
the induced edge labels of G are distinct. Hence
the graph G is a skolem mean graph.
Case : 4 Consider the graph
G = K1, K1, K1, m K1, n.
Let ≤ m < n where n = 2 + m for = 2, 3, 4, .
. . and m = 2, 3, 4, . . . . Let us take the case that
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 128
IJSER © 2012
http://www.ijser.org
|mn| < 4 + 2 for = 2, 3, 4, . . . ; m = 2, 3, 4, . .
and n = 2 + m. We have to prove that G is a
skolem mean graph.
Therefore, the graph
G = K1, K1, K1, m K1, n
where n = 2 + m for = 2, 3, 4, . . . and
m = 2, 3, 4, . . . .
Let
{u} {ui: 1 i },
{v} {vj: 1 j },
{w} {wk: 1 k m} and
{x} {xh: 1 h n}
be the vertices of G. Then G has 2 + m + n + 4
vertices and 2 + m + n edges.
We have
V(G) = {u, v, w, x} {ui: 1 i }
{vj: 1 j } {wk: 1 k m}
{xh: 1 h n}.
The required vertex labeling
f: V(G) {1, 2, 3, 4, . . . , 2 + m + n + 4}
is defined as follows:
The corresponding edge labels are as follows:
The edge label of
uui is i + 1 for 1 i ;
vvj is + j + 2 for 1 j ;
wwk is 2 + k + 3 for 1 k m and
xxh is 2 2 8
2
h m n for 1 h n –1.
The edge label of xxn is 2 + m + n + 4. Hence
the induced edge labels of G are distinct. Hence
the graph G is a skolem mean graph.
REFERENCES
[1] V. Balaji, D. S. T. Ramesh and A.
Subramanian, Skolem Mean Labeling,
Bulletin of Pure and Applied Sciences, vol.
26E No. 2, 2007, 245 – 248.
[2] V. Balaji, D. S. T. Ramesh and A.
Subramanian, Some Results On Skolem Mean
Graphs, Bulletin of Pure and Applied
Sciences, vol. 27E No. 1, 2008, 67 – 74.
[3] J. A. Gallian, A Dynamic Survey of Graph
Labeling, The Electronic Journal of
combinatorics 16(2009), # DS6.
[4] V. Balaji, Solution of a Conjecture on Skolem
Mean Graph of stars K1, K1, m K1, n
International Journal of Mathematical
Combinatorics, vol.4, 2011, 115 – 117.
[5] F. Harary, Graph Theory, Addison – Wesley,
Reading Mars., (1972).
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 129
IJSER © 2012
http://www.ijser.org
A Geometric Process Repair Model for a Cold Standby epairable System With Imperfect Delay
Repair under T policy
P.Govindaraju and U.Rizwan
Abstract - In this paper, a cold standby repairable system with imperfect delay repair consisting of two dissimilar components and one repairman is studied. Assume that both component 1 and component 2 after repair are not as good as new, and the deterioration of the system is stochastic. Under these assumptions, using a geometric process, we consider a replacement policy T based on the number of failures of component 1 under which the system is replaced when the number of failures of component 1 reaches T. Our problem is to determine an optimal replacement policy T such that the average cost rate (i.e. the long-run average cost per unit time) of the system is minimized. The explicit expression of the average cost rate of the system is derived. Index Terms - Geometric process; Renewal process; Imperfect delay repair; Replacement policy; Renewal reward theorem.
—————————— ——————————
1. INTRODUCTION
T the earlier stage, many replacement models for
a one-component repairable system with one
repairman (i.e. simple repairable system) assumed that
the system after repair is as good as new. This is a
perfect repair model. However, this assumption is not
always true. In practice, most repairable systems are
deteriorative due to the ageing effect and the
accumulative wear. Barlow and Hunter (1960) first
presented a minimal repair model in which the
minimal repair does not change the age of the system.
Brown and Proschan (1983) first reported an imperfect
repair model in which the repair is perfect repair with
probability p or minimal repair with probability
p1 . For a deteriorating repairable system, it seems
reasonable that the successive working times of the
system after repair may become shorter and shorter
while the consecutive repair times of the system after
failure may become longer
——————————————
U. Rizwan is serving in the Department of Mathematics, Islamiah
College, Vaniyambadi, India. E-mail: [email protected]
P. Govindaraju is serving in the Department of Mathematics, Islamiah
College, Vaniyambadi, India. E-mail : [email protected]
and longer. Ultimately, it cannot work any longer,
neither can it be repaired. For such a stochastic
phenomenon, Lam (1988) first introduced a geometric
process repair model to approach it. Under this model,
he studied two kinds of replacement policies for a
simple repairable system, one based on the working
age T of the system and the other based on the
number of failures N of the system. Because the
geometric process is a special monotone process,
Stadje and Zuckerman (1990) introduced a general
monotone process repair model to generalize Lam‘s
work. Finkelstein (1993) presented a general repair
model based on a scale transformation after each repair
to generalize Lam‘s work. Stanley (1993) considered a
repair and replacement model for a system with a
random magnitude of shock at each failure and
proposed a replacement policy based on a random
threshold. In order to improve the reliability, raise the
availability or reduce the cost, a two-component
redundant system is often employed. Based on Lam
(1988), Zhang et al (2006) applied the geometric
process repair model to a two-component cold standby
repairable system with one repairman. Assume that
each component after repair is not as good as new.
Under this assumption, using a geometric process, they
studied two kinds of replacement policies, one based
on the working age T of component 1 under which the
system is replaced when the working age of
component 1 reaches T, and the other based on the
A
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 130
IJSER © 2012
http://www.ijser.org
number of failures N of component 1 under which the
system is replaced when the number of failures of
component 1 reaches N. For example, the maintenance
of the computer after failure needs definite waiting
time such that the repairman can just arrive at the
locale; the system after failure cannot be repaired
immediately because the repairman is taking a
vacation or because the repair is complicated to need
inviting a high-tech repairman or other. These will
cause a delay repair time. Thus, the purpose of this
paper is to consider a cold standby repairable system
consisting of two dissimilar components and one
repairman in which when any component fails,
sometimes the repair is delayed and sometimes the
repair is immediate, and the repair is called imperfect
delay repair. For such a cold standby repairable
system, using a geometric process, we consider a
replacement policy T based on the number of failures
of component 1 under which the system is replaced
when the number of failures of component 1 reaches T
. Our problem is to determine an optimal replacement
policy T such that the average cost rate of the system
is minimized. The explicit expression of the average
cost rate of the system is derived.
2. DESCRIPTION OF THE MODEL
For ease of reference, we first state the definitions of
stochastic order and geometric process as follows.
Definition 1 A random variable X is said to be
stochastically smaller than another random variable
Y , if )>()>( YPXP , for all real . It is
denoted by YX st . A stochastic process
1,2,=,nX n is said to be stochastically
increasing, if 1 nstn XX , for 1,2,=n .
Definition 2 A Markov process 1,2,=,nX n with
state space 0,1,2, is said to be stochastically
monotone, if
1 1 1 2| = | = ,n n st n nX X i X X i
1 20 .for any i i
Clearly, the stochastically monotone concept for a
Markov process is defined for a Markov process and is
based on the transition probabilities from one state to
another state, conditioning on the former state.
However, the stochastically monotone concept for a
stochastic process defined here is for a general process
and is based on the conditional distribution of two
successive random variables in the process.
Definition 3 A stochastic process 1,2,=,nX n is
a geometric process, if there exist a constant 0>a
such that 1,2,=,1 nXa n
n forms a renewal
process. The number a is called the ratio of the
geometric process.
If 1<<0 a , then the GP is stochastically increasing;
if 1>a , the GP is stochastically decreasing and if
1=a , the GP will reduce to a renewal process. If
1=][ 1XE and
11
=][nn
aXE
Definition 4 An integer valued random variable N is
said to be a stopping time for the sequence of
independent random variables ,, 21 XX , if the event
nN = is independent of ,, 21 nn XX , for all
1,2,=n .
We study such a two-component cold standby
repairable system with imperfect delay repair by
making the following assumptions 81 AA .
A1 At the beginning, the two components are
both new, and component 1 is in a
working state while component 2 is in a
cold standby state.
A2 Whenever the system fails in any of the
failure states, it will be repaired. The
system will be replaced by an identical
one some times later.
A3 When the two components in the system
are both good, one is working and the
other is under cold standby. Whenever the
working one breaks down, the repair is
delayed with probability p or immediate
with probability p1 . At the same time,
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 131
IJSER © 2012
http://www.ijser.org
the standby one begins to work. The
repair discipline is ‖first in first out‖.
Whenever the repair of the failed one is
completed, it either begins to work again
or become under cold standby. If a
component fails during the repair of the
other, it must wait for repair and the
system is down.
A4 Assume that the time interval between the
completion of the 1)( n th repair and the
completion of the n th repair of
component i is called the n th cycle of
component 1,2,=1,2;=, nii . Let )()( , i
n
i
n YX and )(i
nZ be respectively the
working time, the repair time and the
delay repair time of component i in the n
th cycle, 1,2,=1,2;=, nii Obviously,)()( , i
n
i
n YX and )(i
nZ are respectively a
sequence of nonnegative random
variables, we define GF , and H
respectively as a distribution for )()( , i
n
i
n YX
and 1,2,=1,2;=,,)( niiZ i
n. The
distributions of )(i
nX and )(i
nY are
respectively denoted by
)(=)();(=)( 1=)(1)( tbGtGtaFtF n
i
i
n
n
i
i
n
where 1,<1,0,1,2,=0, ii bnt and
assume that
1,2.=0,>1
=][0,>1
=][ )(
1
)(
1 iYEXEi
ii
Thus
1,2,=1,2.;=)( niX i
n
and 1,2,=1,2.=)( niY i
n
are, respectively, a stochastically
decreasing geometric process with the
ratio ai and a stochastically increasing
geometric process with the ratio bi. And
assume that 1,2,=1,2.=,)( niZ i
n is a
sequence of nonnegative random variables
with same distribution function
0>),( ttH and assume that
1=][ )(i
nZE .
A5 The survival time )(i
nX , the repair time ( )i
nY and )(i
nZ , )1,2,=( n all are
independent random variables.
A6 Assume that the replacement policy T
based on the number of failures of
component 1 is used. The system will be
replaced sometime by a new and identical
one, and the replacement time is
negligible.
A7 Assume that any component in the system
cannot produce the working reward during
cold standby, and no cost is incurred
during waiting for repair and delay repair.
A8 Assume that the repair cost rate of
component i is 1,2)=()( ic i
r while the
working reward rate of two components is
same c . And the replacement cost of the
system is C .
3. THE REPLACEMENT POLICY T
In this section, we will consider the replacement
policy T based on the number of failures of
component 1. Because the two components appear
alternately in the system, when the failure number
of component 1 reachesT , then component 2 may
be in the cold standby state or in the repair state or
in the delay repair state. Naturally, a practicable
replacement policy T should be that component 1
is not repaired any more when the failure number
of component 1 reaches T ; while component 2
works until failure in the N th cycle. Thus, the
renewal point under the policy T is established.
Let 1 be the first replacement time of the system,
and 2)( nn be the time between the 1)( n cth
replacement and the n th replacement of the
system under policy T : Obviously },,{, 21
forms a renewal process, and the interarrival time
between two consecutive replacements is called a
renewal cycle.
Our problem is to determine an optimal
replacement policy T such that the average cost
rate of the system is minimized. Let )(TC be the
average cost rate of the system with imperfect
delay repair under policy T . Thus, according to
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 132
IJSER © 2012
http://www.ijser.org
renewal reward theorem (see, for example Ross
[19]), we have
t( ) =
t
he expected cost incurred in a renewal cycleC T
he expected length of a renewal cycle
The working age T of the system at time t is the
cumulative life-time given by
1
1 1 1 1
<=
<
n n n n n
n n n n n
t M L M t L MT
L L M t L M
where i
n
i
n XL 1=
= and i
n
i
n YM 1=
= and
0== 00 ML .
Let 1T be the first replacement time and in general
for ,2,3,= n let nT be the time between the
1)( n -st replacement and the n -th replacement.
Thus the sequence ,, 21 TT constitutes a renewal
process. Thus a cycle is completed, if a
replacement is done. By the theory of renewal
reward process, the long-run average cost per unit
time is given by
e( ) =
e
xpected cost incurred in a cycleC T
xpected length of a cycle
,
)(
)(
=1
1=1=
1=
1
1=
ZEYEXE
XREZEcRYcE
i
i
i
i
ii
i
pii
i
(1)
where is a random variable which denotes the
number of failures in time T .
Since is also a stopping time with respect to the
-fields 1,2,=>,,,,< 21 XXX , by
Wald‘s equation, we have
.)(
=1
1=1=
n
n
n
i
i a
TFXE
(2)
where )(nF is the n -fold convolution of )(F
with itself and
.)(
=1=
1
1=n
n
n
i
i b
TGYE
(3)
where )(nG is the n -fold convolution of )(G
with itself.
Using equations (2) and (3) in equation (1), we
obtain on simplification that
12=1 =2
1=1 =1
( ) ( )
( ) =( ) ( )
n npn n
n n
n n
n nn n
G T F Tc R c r r
b aC T
F T G T
a b
(4)
where =)(ZE .
4. CONCLUSION
In this paper, using geometric process repair
model, we studied a cold standby repairable
system consisting of two dissimilar components
and one repairman with imperfect delay repair
under T policy. We have also derived the long-run
average cost under this policy.
REFERENCES
[1] Barlow, R.E. and Hunter, L.C., (1960)
Optimum preventive maintenance policy.
[2] Brown, M. and Proschan, F., (1983)
Imperfect repair. J. Appl. Prob. 20, 851-859.
[3] Lam, Y., (1988) Geometric processes and
replacement problem. Acta Math. Appl. Sin.
4(4), 366-377.
[4] Lam, Y., (1990) A repair replacement
model. Adv. Appl. Prob. 22, 494-497.
[5] Lam, Y., (1991) An optimal repairable
replacement model for deteriorating
systems. J. Appl. Prob. 28, 843-851.
[6] Lam, Y., (2007) The Geometric Process and
Its Applications. World Scientific
Publishing CO. Pte. Ltd., Singapore.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 133
IJSER © 2012
http://www.ijser.org
[7] Leung, K.N.G., (2005) A Note on a
Bivariate Optimal Replacement Policy for a
Repairable System, Engineering
Optimization, 38, 621 -625.
[8] Finkelstein, M. S., (1993) A scale model of
general repair. Microelectron. Reliab. 33,
41-44.
[9] Stadje, W. and Zuckerman, D., (1990)
Optimal strategies for some repair
replacement models. Adv. Appl. Prob. 22,
641-656.
[10] Stanley, A. D. J., (1993) On geometric
processes and repair replacement problems.
Microelectron. Reliab. 33, 489-491.
[11] Zhang, Y.L., (1994) A bivariate optimal
replacement policy for a repairable system.
J. Appl. Prob. 31, 1123-1127.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 134
IJSER © 2012
http://www.ijser.org
District-wise Component Analysis of the Growth of Cotton Production in Tamil Nadu
R. Meenakshi
Abstract: This paper analyzes the components of cotton production in the districts of Tamil Nadu during the pre and post reform
periods.
Index Terms - Component Analysis, Cotton Production, Reform Periods.
—————————— ——————————
1. INTRODUCTION
N attempt is made here to analyze the
components of cotton production in districts
of Tamil Nadu state in pre and post reform
periods. The agricultural development and the
prosperity of rural masses in Tamil Nadu state
mainly depend upon sound agricultural base.
Cotton production by and large can be increased
by increasing area under cultivation, double
cropping and raising yield of cotton by the
application of new agricultural technology and by
the reorganization of institutional factors.
The favourable resource-base complemented by
suitable modern technologies facilitated to
increase cotton output and yield in the state. The
total cotton production in Tamil Nadu state was
estimated at 225448 (in bales of 170 kg / lint)
which contributes around 11 percent of all India
cotton production in 2009 – 2010.
In recent years many attempts have been made to
assess the growth of cotton production of Tamil
Nadu state. So a quantitative assessment of the
growth of cotton and the contribution of
components to the cotton production in this state
assumes significance.
R. Meenakshi is serving as Associate Professor and Head of the
Department of Economics, Sri Sarada College for Women, Salem, India.
Accordingly an attempt has been made in the
present study to apply the seven-factor model with
a view to identify the contribution of the
components to cotton production in districts of
Tamil Nadu state and state as a whole in pre and
post reform periods.
2. METHODOLOGY AND DATA
The basic data comprises year-wise information
on area, production yield and price of cotton and
the total cropped area in districts of Tamil Nadu
state and they are obtained from ‗Season and Crop
Reports‘ published by Tamil Nadu Government
for the pre-reform period 1971-72 to 1989-90 and
post-reform period 1990-91 to 2009-10. The
growth of cotton production for the purpose of
decomposition analysis in pre-reform period has
been compiled as a change in production of
current period (taken as an average of the last
three years) 1987-88 through 1989-90 over the
base period ( taken as an average of first three
years) 1971-72 through 1973-74 for each time
period and in the post-reform period the data have
been compiled as a change in production of
current period (average of the last three years)
2007-08 through 2009-10 over the base period
(average of first three years) 1990-91 through
1992-93. The changes in components have also
been similarly computed on the basis of three-year
averages of base and current years. Constant price
weights have been assigned to cotton crop based
on the three year average of farm harvest prices of
1971-72, 1972-73 and 1973-74 in pre-reform
period and 1990-91, 1991-92 and 1992-93 in post-
reform period.
A
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 135
IJSER © 2012
http://www.ijser.org
The seven component elements of decomposition
analysis are
(i) area
(ii) yield rate
(iii) cropping pattern
(iv) area and yield
(v) area and cropping pattern
(vi) yield and cropping pattern
(vii) area, yield and cropping pattern.
The following is the equation of the model.
Pt = P0 = (At – A0)
0
( )
n
i io io
t
n
i io it io
t
W C Y
A W C Y Y
0
0
( )
( ) ( )
n
i io it io
t
n
t i io it io
t
A W Y C C
A A W Y C C
0
0
( ) ( )
(C )(Y )
n
t i it io io
t
n
i it io it io
t
A A W Y Y C
A W C Y
)Y (Y )C (C WAA ioitioiti
n
t0t
where
Pi = production in the current period
Po = production in the base period
Wi = weight used for each crop
Cio = cropping pattern in the base year
Cit = cropping pattern in the current period
Yio = yield level in the base year
Yit = yield level in the current period
Ao = gross cropped are in the base year
At = gross cropped area in the current year
Further Pt and Po were equated as under.
Pt = ititi
n
tt Y C WA
P0 = ioioi
n
t0 Y C WA
Each component of the equation was multiplied
by 100 and divided by the total components under
consideration so as to obtain a percentage growth
rate of each component. These percentage would
help one to directly assess the share of each
component in the growth rate of cotton
production.
The study addresses itself to the main issues viz,
A) Identifying the components that have
contributed to the increase in cotton
production in districts of Tamil Nadu state.
B) Analyzing the factors which have
contributed to the cotton production and
quantifying the relative contribution of
each component in the growth of cotton in
districts of Tamil Nadu state and state as a
whole.
3. RESULTS AND DISCUSION
Different variables i.e. acreage, yield, change in
crop pattern for cotton crop in districts of Tamil
Nadu state in pre and post reform periods were
estimated in tables with a view to identify their
relative contribution to production. Substituting
these variables in the decomposition model, the
contribution of different factors i.e. area, yield,
cropping pattern towards cotton production is thus
illustrated for all districts and state as a whole.
The contribution of components to the cotton
production is shown in district-wise analysis the
pre-reform period and post-reform period.
4. PRE-REFORM PERIOD
4.1 CHENGALPATTU- MGR
Table I presents a contribution of different
components to production of cotton in this region
in the pre-reform period. The study results in the
table reveal that the only factor contributing to the
highest increase in cotton production was yield
(111.23%). Acreage, I order interaction between
area and crop pattern and the I order interaction
between yield and crop pattern also account for
positive effects of cotton production. The
remaining factors do not account for increase in
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 136
IJSER © 2012
http://www.ijser.org
production and have destabilizing effects on
cotton growth.
4.2 SOUTH ARCOT
Table I reveals that as far as the influence of crop
pattern (37.64%) is concerned, it is responsible for
the maximum increase in cotton production in
South Arcot in pre-reform period. What is
surprising in this district is that all components
resulted in a positive production growth. The
analysis reveals that the whole increase in cotton
production in South Arcot region was brought by
all components though the positive entries of crop
pattern, yield and I order interaction between yield
and crop pattern are more than the positive entries
of the remaining components of cotton
production. 4.3 NORTH ARCOT – AMBEDKAR –
THIRUVANNAMALAI SAMBUVARAYAR
In this region, the data provided show that crop
pattern contributed positively and significantly
towards increase in cotton production followed by
I order interaction between area and crop pattern
(25.80%). The yield factor and the I order
interaction between yield and crop pattern have
also added a positive contribution towards cotton
crop production. A small decrease in production
was noticed by I order interaction between area
and yield, acreage and II order interaction
between area, yield and crop pattern.
4.4 SALEM – DHARMAPURI
The results indicate that the pure effect of crop
pattern (47.05%) contributed positively and
significantly towards increase in cotton production
in Salem and Dharmapuri. The next component
that has resulted in a positive increase in
production was I order interaction between yield
and crop pattern (23.35%). Similar to South Arcot
district, the contribution of all components in
Salem – Dharmapuri had added a positive effect
towards increase in cotton production. 4.5 COIMBATORE - PERIYAR
It may be recalled from Table I that as far as the
influence of acreage (58.61%) is concerned, it is
responsible for the significant increase in cotton
production followed by the significant
contribution of crop pattern (54.62%) for cotton
production. The influence of yield accounts for
reduction in crop production. The first order
interaction terms namely (i) interaction between
area and yield (ii) yield and crop pattern had also
added a positive contribution towards cotton
production. The other interaction terms had a
destablishing effect on production. 4.6 TIRUCHIRAPPALLI – PUDUKOTTAI
As regards cotton production in Tiruchirappalli –
Pudukottai region is concerned it may be noted
that the highest positive entry of the component is
crop pattern (96.11%). Factors like acreage and I
order interaction between area and crop pattern
showed positive contribution towards production.
All other components added negative effect
towards cotton crop production. 4.7 THANJAVUR
With regard to Thanjavur district, the contribution
of crop pattern in positive (138.43%) and there is
every reason to believe that this component plays
an important role in increasing the production of
cotton. The first order interaction between area
and yield and second order interaction between
area, yield and crop pattern are also positive but
negligible towards increase in production. The
remaining components are found to be negative
and are not responsible for cotton growth is this
region. 4.8 MADURAI – DINDIGUL
Considering the importance of increase in cotton
production in Madurai – Dindigul, it may be noted
that components like crop pattern (64.25%), yield
(22.94%) and I order interaction between yield
and crop pattern (21.59%) do contribute positively
and significantly towards this crop. The
contribution of the remaining components is
found to be negative and seemed to be the source
of instability in cotton production. 4.9 RAMANATHAPURAM – KAMARAJAR –
PASUMPON MUTHURAMALINGAM
It may be seen from Table I that the crop pattern
(52.81%) and I order interaction between yield
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 137
IJSER © 2012
http://www.ijser.org
and crop pattern (51.42%) seemed to be the main
source for the significant increase in cotton
production in this area. To a certain extent yield
had also showed a positive effect towards
production. The remaining components failed to
contribute towards increase in cotton crop
production.
4.10 TIRUNELVELI – CHIDAMBARANAR
Table I shows that the I order interaction between
yield and crop pattern (58.19%) contributed
positively and significantly towards increase in
cotton production in this area. The influence of
yield (49.31%) and crop pattern (26.82%) had
added a positive contribution towards this crop.
As against this acreage, I order interaction terms
namely (i) between area and crop pattern (ii)
between area and yield and second order
interaction between area, yield and crop pattern
had a destablishing effect production.
4.11 TAMIL NADU
The state accounted for the maximum increase in
cotton crop production through yield component.
The study results in Table 3.11 and Figure 3.11
reveal that the other factors contributing to the
increase in cotton production were I order
interaction between area and crop pattern and II
order interaction between area, yield and crop
pattern. The remaining components did not
account for increase in production and had a
destablising effect on cotton growth.
The overall result shows that the significant
increase in cotton production is achieved by the
influence of crop pattern followed by yield
component.
Considering the importance of cotton production
in post-reform period an in-depth study is again
taken up for the districts of Tamil Nadu and state
as whole. Different variables i.e. acreage, yield,
crop pattern and their interaction terms were
estimated in the following Table I with a view to
identify their relative contribution to cotton
production.
5. POST-REFORM PERIOD
5.1 CHENGALPATTU- CHENNAI –
KANCHEEPURAM - THIRUVALLUR
Table II shows that as for as the influence of crop
pattern (81.42%) is concerned, it is responsible for
the significant increase in cotton production.
Contrary to this, yield component (-26.84%) did
not account for increase in production and had a
destablishing effect on cotton growth. The
positive entries of acreage followed by I order
interaction between yield and crop pattern had
contributed to the large share of the increase in
production. Again I order interaction between area
and yield, I order interaction between area, yield
and crop pattern appear to be positive components
contributing more or less equal percentage
towards increase in cotton production. With the
exception of yield and I order interaction between
area and crop pattern, other factors are responsible
for increase in cotton production.
5.2 SOUTH ARCOT – CUDALLORE –
VILUPPURAM
The percentage contribution of different variables
to total increased cotton production in this region
is shown in Table II. The study results reveal that
the factor contributing to the highest increase in
cotton production was acreage (80.47%) followed
by yield (69.26%). The I order interaction terms
namely (i) interaction between area and crop
pattern (ii) yield and crop pattern account for a
positive effect towards production. The remaining
components failed to account for increase in
production and had destablising effects on cotton
growth.
5.3 NORTH ARCOT – VELLORE –
THIRUVANNAMALAI SAMBUVARAYAR
Table II shows that acreage (87.64%) is responsible for
the significant increase in cotton production followed
by yield component (23.08%). The positive
contribution of acreage and yield resulted in the
positive contribution of I order interaction between
area and yield. All other components are negative and
had contributed to the decrease in cotton crop
production.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 138
IJSER © 2012
http://www.ijser.org
5.4 SALEM – NAMAKKAL
The results indicate that the pure effect of yield
(123.17%) contributed positively and significantly
towards increase in cotton production. The crop
pattern had also added a positive effect towards
increase in production. Due to this the first order
interaction between yield and crop pattern is
found to be positive and accounted for the growth
of cotton. Acreage I order interaction terms (i)
between area and crop pattern (ii) area and yield
and II order interaction between area, yield and
crop pattern do have a more destabilizing
influence on cotton production. 5.5 DHARMAPURI – KRISHNAGIRI
The data provided in Table II show that all the
major components namely acreage, yield and crop
pattern when considered independently contribute
towards increase in cotton production and among
these three components acreage (55.87%)
accounted for the maximum increase in cotton
crop followed by yield (51.06%). All the I order
interaction terms failed to contribute to the growth
of cotton production. However the second order
interaction between area, yield and crop pattern
had added a positive contribution towards cotton
production. 5.6 COIMBATORE – THIRUPPUR
With regard to Coimbatore district, the
contribution of crop pattern is positive (104.78%)
and there is every reason to believe that this
component plays an important role in increasing
the production of cotton. Acreage and yield failed
to contribute towards increase in production. Due
to this, the first order interaction between acreage
and yield was also negative revealing
destabilizing effect on cotton crop. The remaining
components accounted for the positive increase in
production. 5.7 ERODE
In Erode district crop pattern (107.43%) plays an
important role in influencing cotton crop.
Contrary to crop pattern, yield component does
have a more destabilizing influence on this crop.
The positive entry of crop pattern overweighs the
negative entry of yield. As a result the I order
interaction between yield and crop pattern is
found to be positive and had added a positive
contribution towards cotton production.
Components like acreage, I order interaction
between area and yield are also positive in this
region. The remaining components accounted for
decrease in production due to their negative
entries in cotton production.
5.8 TIRUCHIRAPPALLI – KARUR –
PERAMBALUR – ARIYALUR
In this region both crop pattern (97.54%) and
yield (24.05%) seemed to be the main source for
the significant increase in cotton production. Due
to this, the I order interaction between yield and
crop pattern had added a positive contribution
towards cotton production. Acreage is found to be
negative. It is because of the negative entry of
acreage, components like I order interaction
between area and crop pattern, area and yield, II
order interaction between area, yield and crop
pattern are responsible for decrease in cotton
production. 5.9 PUDUKOTTAI
With respect to Pudukottai district, the
contribution of crop pattern (123.28%) is positive
and significant towards increase in cotton
production. Components like acreage and I order
interaction between area and yield are also
positive and hence they are responsible for
increase in production. All other components are
negative and seemed to be the source of instability
in cotton crop.
5.10 THANJAVUR – THIRUVARUR –
NAGAI QUAID-E-MILLETH –
NAGAPATTINAM
The results indicate that crop pattern (98.17%)
contributed significantly towards increase in
cotton production followed by yield. Along with
these components, the positive values of I order
interaction between area and crop pattern, I order
interaction between area and yield had added an
increase in cotton production. The remaining
components are found to be negative and hence
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 139
IJSER © 2012
http://www.ijser.org
failed to contribute towards increase in production
of cotton crop. 5.11 MADURAI – THENI – DINDIGUL
Considering the importance of cotton production
in this area, crop pattern (103.53%) does
contribute significantly towards increase in
production. Next to this I order interaction
between yield and crop pattern and acreage and
crop pattern contribute positively towards cotton.
Again the entry of I order interaction between area
and yield had added positive increase in
production. All other components failed to
increase cotton crop production.
5.12 RAMANATHAPURAM – VIRUDHUNAGAR – KAMARAJAR – PASUMPON MUTHURAMALINGAM – SIVAGANGAI
The data provided in Table II reveal that all the
major components namely acreage, yield and crop
pattern when considered independently contribute
towards increase in production and among these
components, crop pattern accounted for the
maximum increase in cotton production (89.80%)
followed by yield (28.83%) and acreage (23%).
All I order interaction terms failed to contribute to
the cotton growth. But the II order interaction
between area, yield and crop pattern had added a
positive effect towards increase in production. 5.13 THIRUNELVELI – THOOTHUKUDI
The study results indicate that crop pattern
(98.97%) contributed positively towards increase
in cotton production followed by acreage.
Contrary to these two components, yield is found
to be negative and had a destabilizing effect
towards production. Again I order interaction
between area and crop pattern, II order interaction
between area, yield and crop pattern failed to
contribute towards the growth of production of
cotton. The remaining components contribute
towards increase in cotton production. 5.14 TAMIL NADU
For the state as a whole the increase in cotton
production was mainly due to the influence of
crop pattern (97.15%) followed by acreage
(32.53%). With these two components the I order
interaction between area and yield and the
interaction between yield and crop pattern account
for increase in production. All the remaining
components had negative entries and hence they
were not responsible for cotton production
growth.
The overall result shows that the significant
increase in cotton production is achieved by the
influence of crop pattern in pre-reform period and
yield in the post-reform period.
6. CONCLUSION
Considering the importance of cotton production
in Tamil Nadu state an in-depth study is now
necessary to identify different constraints to the
productivity and then efforts should be made for
enhancing cotton productivity to meet the
domestic requirements of cotton in Tamil Nadu
state. In Tamil Nadu state, cotton is grown under
risky conditions by resource poor farmers. Hence
technologies for this unfavourable environment
and packages of practices to suit these farmers
must be developed. Rainfed cotton crop research
is to be a priority.
To improve the cotton production the following
measures may be considered.
Better cultural practices and the use of tractors
instead of bullocks in seed-bed preparation
after initial watering of land is positively
related to yields.
Farm characteristics including the farmer‘s
education is an important dimension affecting
the difference between below and above
average yields.
A positive link between the farmer‘s visit to
extension agency for advice and his end-
season cotton output is not as apparent as
commonly hypothesized.
Attempts to identify a common and robust
pattern of spray timings applicable for the
entire area.
Minimization of inflator trends in factor prices
is very essential.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 140
IJSER © 2012
http://www.ijser.org
Assuring remunerative output prices, through
effective support price mechanism is the need
of the hour.
Though cotton crop has received attention to a
certain extent by the policy makers in recent
years, in view of the present need, more
efforts have to be focused on research and
development in the cotton crop.
Liberalized import substitution and export
promotional policies may be encouraged.
Greater degree of specialization and
professionalism are to be inducted in expanding
the production of cotton if Tamil Nadu state is to
emerge as the leading producer of cotton in India.
ACKNOWLEDGEMENTS
The Author is highly thankful to the project fellow
Ms. S. Deepalakshmi for data collection.
REFERENCES
[1] A.V.K. Sastri, ―Relative contribution of Area and
Yield to Increased Production of Wheat during the
First Plan‖, Agricultural Situation in India, Vol.
XV, No. 5, August, 1960, 481-486.
[2] B.S. Minhas, ―Rapporteur‘s Report on
Management of Agricultural Growth‖, Indian
Journal of Agricultural Economics, Vol. XXI, No,
4, Oct.-Dec. 1966.
[3] B.S. Minhas and A. Vaidyanathan, ―Growth of
Crop Output in India, 1951-54 to 1956-61: An
Analysis of component Element‖, Journal of
Indian Society of Agricultural Statistics, Vol.
XVII, No. 2, Dec., 1965, 230-252.
[4] J.R. Anderson, Peter BR. Hazell and L. Evans,
―Variability in cereal Yield: Implications for
Agricultural Research and Policy‖, Summary
Proceedings of IFPRI/DSE Workshop on cereal
Yield Variability, Feldanfing. Germany, Nov.,
1986, 26-29.
[5] S. Narender, et al, ―District-wise Measurement and
Decomposition of the Growth of Agricultural
Output in Andhra Pradesh‖, Agricultural Situation in
India, April, 1989, 3-7.
[6] Peter B.R. Hazell, ―Instability in Indian Foodgrain
Production‖, Research Report 30, IFPRI,
Washington DC, U.S.A. 1982.
[7] R. Swarup and B.K. Sikka ―Agricultural
Development in Himachal Pradesh‖, Agricole
Publishing company, 1983, 64-68.
[8] S. Mahendradev, ―Growth and Instability in
Foodgrains Production: An
Inter-State Analysis‖, Economic and Political
Weekly. Sept., 26, 1987, pp A82-A92,
[9] Suresh Pal and A.S. Sirohi, ―Sources of Growth
and Instability in Indian Crap Production-A
Decomposition Analysis‖, Agricultural Situation
in India, Feb., 1989, 933-936.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 10, OCTOBER-2012 ISSN 2229-5518 141
IJSER © 2012
http://www.ijser.org
TABLE I
DISTRICT- WISE PERCENTAGE CONTRIBUTION OF DIFFERENT VARIABLES TO
TOTAL INCREASED COTTON PRODUCTION IN PRE-REFORM PERIOD
(1971 - 1972 to 1989 - 1990) IN TAMIL NADU
DISTRICT 1 2 3 4 5 6 7 Total
1. Chengalpattu-MGR 0.09 111.23 -11.87 0.34 -0.03 0.19 -0.05 100.00
2. South Arcot 5.13 31.87 37.64 2.96 2.51 18.43 1.46 100.00
3.
North Arcot
(Ambedkar-
Thiruvannamalai-
Sambuvarayar)
-3.54 1.49 69.91 25.80 -0.55 10.91 -4.02 100.00
4. Salem –
Dharmapuri 6.60 1.25 47.05 12.35 3.27 23.35 6.13 100.00
5. Coimbatore –
Periyar 58.61 -5.99 54.62 -8.99 0.99 0.92 -0.16 100.00
6. Tiruchirappalli –
Pudukottai 12.07 -8.83 96.11 18.68 -1.72 -13.66 -2.65 100.00
7. Thanjavur -1.60 -1.18 138.43 -22.13 0.19 -16.32 2.61 100.00
8. Madurai – Dindigul -3.38 22.94 64.25 -3.19 -1.14 21.59 -1.07 100.00
9.
Ramanathapuram
(Kamarajar-
Pasumponmuthu
Ramalingam)
-4.26 22.97 52.81 -9.53 -4.14 51.42 -9.28 100.00
10. Tirunelveli -
Chidambaranar -4.97 49.31 26.82 -5.85 -10.78 58.19 -12.72 100.00
11. Tamil Nadu -228.40 466.24 -70.18 9.12 -60.58 -18.62 2.42 100.00
Source : Compiled by the Author.
1.Area 4. I order interaction between area and crop pattern
2.Yield 5. I order interaction between area and yield
3.Crop Pattern 6. I order interaction between yield and crop pattern
7. II order interaction between area, yield and crop pattern
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER - 2012 ISSN 2229-5518 142
IJSER © 2012
http://www.ijser.org
TABLE II
DISTRICT- WISE PERCENTAGE CONTRIBUTION OF DIFFERENT VARIABLES TO TOTAL INCREASED
COTTON PRODUCTION IN POST-REFORM PERIOD (1990 - 1991 to 2009 - 2010) IN TAMIL NADU
DISTRICT 1 2 3 4 5 6 7 Total
1.
Chengalpattu-
Chennai-
Kancheepuram-
Thiruvallur
29.74 -26.84 81.42 -28.58 9.42 25.79 9.05 100.00
2.
South Arcot –
Cuddalore-
Villupuram
80.47 69.26 -56.09 21.56 -26.63 18.56 -7.13 100.00
3.
North Arcot-
Vellore-
Thiruvannamalai-
Sambuvarayar
87.64 23.08 -13.39 -10.38 17.90 -2.73 -2.12 100.00
4. Salem –Namakkal -27.89 123.17 22.84 -5.84 -31.48 25.78 -6.59 100.00
5. Dharmapuri-
Krishnagiri 55.87 51.08 19.99 -6.46 -16.49 -5.90 1.91 100.00
6. Coimbatore-
Thiruppur -0.84 -17.70 104.78 0.62 -0.11 13.17 0.08 100.00
7. Erode 54.66 -106.61 107.43 -33.24 32.98 64.84 -20.06 100.00
8.
Tiruchirappalli-
Karur-Perambalur-
Ariyalur
-18.70 24.05 97.54 -16.36 -4.03 21.03 -3.53 100.00
9. Pudukottai 15.93 -13.38 123.28 -14.14 1.53 -11.86 -1.36 100.00
10.
Thanjavur-
Thiruvarur-Nagai-
Quid-e-milleth-
Nagapattinam
-7.15 20.54 98.17 6.26 1.31 -17.98 -1.15 100.00
11. Madurai-Theni-
Dindigul 27.66 -48.09 103.53 -19.19 8.90 33.37 -6.18 100.00
12
Ramanathapuram-
Virdhunagar-
Kamarajar-
Pasumpon
Muthuramalingam
–Sivagangai
23.00 28.83 89.80 -17.91 -5.75 -22.45 4.48 100.00
13. Tirunelveli-
Thoothukudi 17.91 -11.94 98.97 -15.57 1.88 10.38 -1.63 100.00
Tamil Nadu 32.53 -32.24 97.15 -16.28 5.40 16.14 -2.70 100.00
Source : Compiled by the Author
1. Area 4. I order interaction between area and crop pattern
2. Yield 5. I order interaction between area and yield
3. Crop Pattern 6. I order interaction between yield and crop pattern
7. II order interaction between area, yield and crop pattern
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 10, OCTOBER-2012 ISSN 2229-5518 143
IJSER © 2012
http://www.ijser.org
History of Algebra
U. Rizwan
Abstract - This paper presents a review of the algebra and presents some facts.
Index Terms – Algebra, Geometry.
—————————— ——————————
The Arabic word for restoration, al-jabru, is the
root of the word algebra.
The history of algebra goes way back in time, but
its importance is unparalleled by any other branch
of mathematics. The word Algebra literally
means the re-union of broken parts based on the
origins of Arabic language. It was first used
around 830 AD by Arab scholars.
The history of algebra began in ancient Egypt and
Babylon, where people learned to solve linear (ax
= b) and quadratic (ax2 + bx = c) equations, as
well as indeterminate equations such as x2 + y
2 =
z2, whereby several unknowns are involved. The
ancient Babylonians solved arbitrary quadratic
equations by essentially the same procedures
taught today. They also could solve some
indeterminate equations.
The Alexandrian mathematicians Hero of
Alexandria and Diophantus continued the
traditions of Egypt and Babylon. But
Diophantus's book Arithmetica is on a much
higher level and gives many surprising solutions
to difficult indeterminate equations. This ancient
knowledge of solutions of equations in turn found
a home early in the Islamic world, where it was
known as the science of restoration and balancing.
In the 9th century, the Arab mathematician Al-
Khwarizmi wrote one of the first book on algebras
in Arabic language, a systematic expose of the
basic theory of equations,with examples and
proofs.
——————————————
U. Rizwan is serving in the Department of Mathematics, Islamiah
College, Vaniyambadi, India. E-mail: [email protected]
By the end of the 9th century, the Egyptian
mathematician Abu Kamil had stated and proved
the basic laws and identities of algebra and solved
s complicated problems as finding x, y, and z
such that x + y + z = 10, x2 + y
2 = z
2, and
xz = y2.
Ancient civilizations wrote algebraic expressions
using only occasional abbreviations, but by
medieval times Islamic mathematicians were able
to talk about arbitrarily high powers of the
unknown x, and work out the basic algebra of
polynomials (without yet using modern
symbolism). This included the ability to multiply,
divide, and find square roots of polynomials as
well as a knowledge of the binomial theorem. The
Persian mathematician, astronomer, and poet
Omar Khayyam showed how to express roots of
cubic equations by line segments obtained by
intersecting conic sections, but he could not find a
formula for the roots. A Latin translation of Al-
Khwarizmi's Algebra appeared in the 12th
century. In the early 13th century, the great Italian
mathematician Leonardo Fibonacci achieved a
close approximation to the solution of the cubic
equation x3 + 2x
2 + cx = d. Because Fibonacci had
traveled in Islamic lands,he probably used an
Arabic method of successive approximations.
Early in the 16th century, the Italian
mathematicians Scipione del Ferro, Niccolò
Tartaglia, and Gerolamo Cardano solved the
general cubic equation in terms of the constants
appearing in the equation. Cardano's pupil,
Ludovico Ferrari, soon found an exact solution to
equations of the fourth degree, and as a result,
mathematicians for the next several centuries tried
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 144 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
to find a formula for the roots of equations of
degree five, or higher. Early in the 19th century,
however, the Norwegian mathematician Niels
Abel and the French mathematician Evariste
Galois proved that no such formula exists.
An important development in algebra in the 16th
century was the introduction of symbols for the
unknown and for algebraic powers and operations.
As a result of this development, Book III of La
geometrie (1637), written by the French
philosopher and mathematician René Descartes,
looks much like a modern algebra text.
Descartes's most significant contribution to
mathematics, however, was his discovery of
analytic geometry, which reduces the solution of
geometric problems to the solution of algebraic
ones. His geometry text also contained the
essentials of a course on the theory of equations,
including his so-called rule of signs for counting
the number of what Descartes called the true
(positive) and false (negative) roots of an
equation. Work continued through the 18th
century on the theory of equations, but not until
1799 was the proof published, by the German
mathematician Carl Friedrich Gauss, showing that
every polynomial equation has at least one root in
the complex plane (see Number: Complex
Numbers).
By the time of Gauss, algebra had entered its
modern phase. Attention shifted from solving
polynomial equations to studying the structure of
abstract mathematical systems whose axioms were
based on the behavior of mathematical objects,
such as complex numbers, that mathematicians
encountered when studying polynomial equations.
Two examples of such systems are algebraic
groups (see Group) and quaternions, which share
some of the properties of number systems but also
depart from them in important ways. Groups
began as systems of permutations and
combinations of roots of polynomials, but they
became one of the chief unifying concepts of
19th-century mathematics. Important
contributions to their study were made by the
French mathematicians Galois and Augustin
Cauchy, the British mathematician Arthur Cayley,
and the Norwegian mathematicians Niels Abel and
Sophus Lie. Quaternions were discovered by
British mathematician and astronomer William
Rowan Hamilton, who extended the arithmetic of
complex numbers to quaternions while complex
numbers are of the form a + bi, quaternions are of
the form a + bi + cj + dk.
REFERENCES
[1] Donald R. Hill, Islamic Science and
Engineering (Edinburgh University Press,
1994).
[2] Ziauddin Sardar, Jerry Ravetz, and Borin Van
Loon, Introducing Mathematics (Totem
Books, 1999).
[3] George Gheverghese Joseph, The Crest of the
Peacock: Non-European Roots of
Mathematics (Penguin Book, 2000).
[4] John J O'Connor and Edmund F Robertson,
History Topics: Algebra Index. In Mac Tutor
History of mathematics (University of St
Andrews, 2005)
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11,NOVEMBER-2012 ISSN 2229-5518
145
IJSER © 2012
http://www.ijser.org
Some More Filtering Techniques For The Removal of Speckle Noise From Medical
Images
Gnanambal Ilango and B. Shanthi Gowri
Abstract - In Image Processing, removal of noise from the medical images is very challenging. Many filtering techniques have
been introduced to reduce noise in medical images. The speckle noise is commonly found in medical images. This paper
proposes twelve more filtering techniques for the removal of speckle noise from medical images. The quality of the enhanced
images is measured by the statistical quality measures: RMSE and PSNR.
Index Terms - Digital topological neighbourhood, Brain cancer, Speckle noise, RMSE, PSNR.
—————————— ——————————
1. INTRODUCTION
IGITAL image analysis plays a vital role in
medical imaging like magnetic resonance
imaging, ultra sound imaging, X-ray and
computed tomography. Departure of the ideal
signal is usually referred to as noise. The noises in
such digital images arise during image acquisition
and/or transmission. The data dropout noise is
generally called as speckle noise. Speckle noise is
a multiplicative noise that degrades the visual
evaluation in medical imaging. Speckle noise
suppression plays a very essential role in
diagnosis. The image acquisition devices need
despeckling techniques for medical imaging in
routine clinical practice. Image filtering is an
important technique used for the detection and
removal of noise from the digital images. Median
filter has been introduced by Turkey in 1970[10].
It is a non-linear filter used for smoothing the
images. Sudha et al recommends a novel
thresholding algorithm for denoising speckle noise
in ultrasound images with wavelets[9].
——————————————
Gnanambal Ilango is serving in the Department of Mathematics,
Government Arts College, Coimbatore, India. E-mail :
B. Shanthi Gowri is pursuing Ph.D. degree course in Mathematics,
Government Arts College, Coimbatore, India and is working at Sri
Krishna College of Engineering and Technology, Coimbatore, India. E-
mail : [email protected]
An improved adaptive median filtering method for
denoising impulse noise reduction was carried out
by Mamta Juneja et al [4]. Thangavel et al
showed that the M3-filter had performed better
than Mean, Median, Max, Min and various other
filters [8]. The hybrid max filter which
performs significantly better than many other
existing techniques for removal of speckle
noise was shown
Gnanambal et al [1].In this experimental work, we
took the Magnetic resonance image of the brain
cancer with speckle noise, and applied different
filtering techniques for noise removal. The quality
of the de-noised image is measured by the
statistical quality measures: RMSE and PSNR.
This work is organized as follows: In Section 2,
basic definitions are given. Section 3 discusses the
various filtering techniques for de-noising the
speckle noise in Medical images. Section 4 deals
with the proposed new filtering techniques for de-
noising the speckle noise in MRI. Section 5
discusses the comparison of results of various new
filtering techniques. Section 6 concludes the
experimental results.
2. BASIC DEFINITIONS
Definition 2.1 [7] A digital image is a function
𝑓: 𝑍 𝑋 𝑍 → [0,1,2, … . 𝑁 − 1] in which 𝑁 − 1 is
a positive whole number belonging to the natural
D
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 146 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
interval [1,256]. The functional value of ‗f‘ at any
point p(x, y) is called the intensity or gray level of
the image at that point and it is denoted by f(p).
Definition 2.2 [7] Let X be an array of points
having positive integer coordinates (x, y), where
1 ≤ 𝑥 ≤ 𝑚, 1 ≤ 𝑦 ≤ 𝑛. The neighbourhood of a
point 𝑝 ∈ 𝑋 is a subset of X which contains an
open set containing p. It is denoted by N (p).
Definition 2.3 [6] The 4-neighbours of a point
p(x, y) are its four horizontal and vertical
neighbours 𝑥 ± 1, 𝑦 and 𝑥, 𝑦 ± 1 . The point
p(x, y) together with its 4-neighbours is called the
4 - neighbourhood of the point p. It is denoted by
𝑁4 𝑝 .
Definition 2.4 [6] The 8-neighbours of a point
p(x, y) consists of its 4-neighbours together with
its four diagonal neighbours (𝑥 + 1, 𝑦 ± 1)
and(𝑥 − 1, 𝑦 ± 1). The point p(x, y) together with
its 8-neighbours is called the 8-neighbourhood of
the point p. It is denoted by N8 (𝑝).
Definition 2.5 [1] The LT-neighbours of a point
p(x, y) consists of the neighbours 𝑥 − 1, 𝑦 + 1
and (𝑥 + 1, 𝑦 − 1). The point p(x, y) together
with its LT-neighbours is called the LT-
neighbourhood of the point p. It is denoted
by 𝐿3(𝑝).
Definition 2.6 The 6-neighbours of a point
p(x, y) consists of its 4-neighbours together
with the neighbours (𝑥 − 1, 𝑦 + 1) and
(𝑥 + 1, 𝑦 − 1). The point p(x, y) together with its
6-neighbours is called the 6-neighbourhood of the
point p. It is denoted by 𝑁6(𝑝).
Definition 2.7 The 12-neighbours of a point
p(x, y) consists of its 8-neighbours together with
the neighbours (𝑥 ± 2, 𝑦) and(𝑥, 𝑦 ± 2). The
point p(x, y) together with its 12-neighbours is
called the 12-neighbourhood of the point p. It is
denoted by 𝑁12(𝑝).
3. SOME EXISTING FILTERING
TECHNIQUES In this section, we provide the definitions of some
existing filters. The image processing function in
a spatial domain can be expressed as g(p) = 𝛾(f(p),
where 𝛾 is the transformation function, f(p) is the
pixel value (gray level value) of the point p(x,y)
of input image and g(p) is the pixel value of the
corresponding point of the processed image.
3.1 MEAN FILTER [3]
Mean filter is a simple linear filter, intuitive and
easy to implement method of smoothing images.
This filter reduces the amount of intensity
variation between one pixel and the next. It is
often used to reduce noise in images. In mean
filter, the pixel value of a point p is replaced by
the mean of pixel values of 8-neighbourhood of a
point ‗p‘. The operation of this filter can be
expressed as:
𝑔 𝑝 = 𝑚𝑒𝑎𝑛{ 𝑓 𝑝 , 𝑤𝑒𝑟𝑒 𝑝 𝜖 𝑁8 𝑝 }. 3.2 MEDIAN FILTER [1] The median filter plays an important role in image
processing and vision. It is useful for reducing salt
and pepper noise in an image. In median filter, the
pixel value of a point p is replaced by the median
of pixel values of 8-neighbourhood of a point ‘p‘.
The operation of this filter can be expressed as:
𝑔 𝑝 = 𝑚𝑒𝑑𝑖𝑎𝑛{𝑓 𝑝 , 𝑤𝑒𝑟𝑒 𝑝 𝜖 𝑁8 𝑝 }.
3.3 CENTER WEIGHTED MEAN FILTER [5]
Center weighted mean filter is a filter that gives
more weight to the center pixel. This weight
corresponds to the size of the kernel. If the kernel
is 3x3, then the total number of pixels that will be
converting to array for performing sorting will be
11. This filter is defined as
𝑔 𝑝 = 𝑚𝑒𝑎𝑛{ 2 ◊ 𝑓 𝑝𝑐 , 𝑓 𝑝 𝑤𝑒𝑟𝑒 𝑝 ∈ 𝑁8 𝑝 },
where ◊ represents replication operator and 𝑓(𝑝𝑐)
is gray level value of the center pixel.
3.4 CENTER WEIGHTED MEDIAN FILTER [5]
Center weighted median filter is a filter that gives
more weight to the center pixel. This weight
corresponds to the size of the kernel. If the kernel
is 3x3, then the total number of pixels that will be
converting to array for performing sorting will be
11. This filter is defined as
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11,NOVEMBER-2012 ISSN 2229-5518
147
IJSER © 2012
http://www.ijser.org
𝑔 𝑝 = 𝑚𝑒𝑑𝑖𝑎𝑛{ 2 ◊ 𝑓 𝑝𝑐 , 𝑓 𝑝 𝑤𝑒𝑟𝑒 𝑝 ∈ 𝑁8 𝑝 }
where ◊ represents replication operator and 𝑓(𝑝𝑐)
is gray level value of the center pixel.
4. PROPOSED NEW FILTERING
TECHNIQUES
In this section, we will provide the definition of
proposed filtering techniques. These filters are not
yet applied by the researchers for the removal of
speckle noise in Magnetic resonance image.
4.1 N6 MEAN FILTER
In the N6 Mean filter, the pixel value of a point p
is replaced by the mean of the pixel values of
6-neighbourhood of a point ‗p‘. The operation of
this filter can be expressed as
𝑔 𝑝 = 𝑚𝑒𝑎𝑛{ 𝑓 𝑝 , 𝑤𝑒𝑟𝑒 𝑝 𝜖 𝑁6 𝑝 }.
4.2 N6 MEDIAN FILTER
In the N6 Median filter, the pixel value of a point
p is replaced by the median of the pixel values of
6-neighbourhood of a point ‗p‘. The operation of
this filter can be expressed as
𝑔 𝑝 = 𝑚𝑒𝑑𝑖𝑎𝑛{ 𝑓 𝑝 , 𝑤𝑒𝑟𝑒 𝑝 𝜖 𝑁6 𝑝 }.
4.3 N12 MEAN FILTER
In the N12 Mean filter, the pixel value of a point p
is replaced by the mean of the pixel values of 12-
neighbourhood of a point ‗p‘. The operation of
this filter can be expressed as
𝑔 𝑝 = 𝑚𝑒𝑎𝑛{ 𝑓 𝑝 , 𝑤𝑒𝑟𝑒 𝑝 𝜖 𝑁12 𝑝 }.
4.4 N12 MEDIAN FILTER
In the N12 Median filter, the pixel value of a point
p is replaced by the median of the pixel values of
12-neighbourhood of a point ‗p‘. The operation of
this filter can be expressed as
𝑔 𝑝 = 𝑚𝑒𝑑𝑖𝑎𝑛{ 𝑓 𝑝 , 𝑤𝑒𝑟𝑒 𝑝 𝜖 𝑁12 𝑝 }.
4.5 L3 MEAN FILTER
In the L3 Mean filter, the pixel value of a point p is
replaced by the mean of the pixel values of
LT-neighbourhood of a point ‗p‘. The operation of
this filter can be expressed as
𝑔 𝑝 = 𝑚𝑒𝑎𝑛{ 𝑓 𝑝 , 𝑤𝑒𝑟𝑒 𝑝 𝜖 L𝟑 𝑝 }.
4.6 L3 MEDIAN FILTER
In the L3 Median filter, the pixel value of a point p
is replaced by the median of the pixel values of
LT-neighbourhood of a point ‗p‘. The operation of
this filter can be expressed as
𝑔 𝑝 = 𝑚𝑒𝑑𝑖𝑎𝑛{ 𝑓 𝑝 , 𝑤𝑒𝑟𝑒 𝑝 𝜖 L𝟑 𝑝 }.
4.7 CENTER WEIGHTED N6 MEAN
(CWN6 MEAN) FILTER Center Weighted N6 Mean filter is a filter that
gives more weight to the center pixel of the
6- neighbourhood of a point p. This filter is
defined as
𝑔 𝑝 = 𝑚𝑒𝑎𝑛{ 2 ◊ 𝑓 𝑝𝑐 , 𝑓 𝑝 𝑤𝑒𝑟𝑒 𝑝 ∈ 𝑁6 𝑝 },
where ◊ represents replication operator and 𝑓(𝑝𝑐)
is gray level value of the center pixel. 4.8 CENTER WEIGHTED N6 MEDIAN
(CWN6 MEDIAN) FILTER
Center Weighted N6 Median filter is a filter
that gives more weight to the center pixel of
the 6- neighbourhood of a point p. This filter is
defined as
𝑔 𝑝 = 𝑚𝑒𝑑𝑖𝑎𝑛{ 2 ◊ 𝑓 𝑝𝑐 , 𝑓 𝑝 𝑤𝑒𝑟𝑒 𝑝 ∈ 𝑁6 𝑝 },
where ◊ represents replication operator and 𝑓(𝑝𝑐)
is gray level value of the center pixel.
4.9 CENTER WEIGHTED N12 MEAN
(CWN12 MEAN) FILTER
Center Weighted N12 Mean filter is a filter that
gives more weight to the center pixel of the 12-
neighbourhood of a point p. This filter is defined
as
𝑔 𝑝 = 𝑚𝑒𝑎𝑛{ 2 ◊ 𝑓 𝑝𝑐 , 𝑓 𝑝 𝑤𝑒𝑟𝑒 𝑝 ∈ 𝑁12 𝑝 },
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 148 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
where ◊ represents replication operator and 𝑓(𝑝𝑐)
is gray level value of the center pixel. 4.10 CENTER WEIGHTED N12 MEDIAN
(CWN12 MEDIAN) FILTER
Center Weighted N12 Median filter is a filter
that gives more weight to the center pixel of
the 12- neighbourhood of a point p. This filter is
defined as
𝑔 𝑝 = 𝑚𝑒𝑑𝑖𝑎𝑛{ 2 ◊ 𝑓 𝑝𝑐 , 𝑓 𝑝 𝑤𝑒𝑟𝑒 𝑝 ∈ 𝑁12 𝑝 },
where ◊ represents replication operator and 𝑓(𝑝𝑐)
is gray level value of the center pixel. 4.11 CENTER WEIGHTED L3 MEAN
(CWL3 MEAN) FILTER
Center Weighted L3 Mean filter is a filter that
gives more weight to the center pixel of the
LT- neighbourhood of a point p. This filter is
defined as
𝑔 𝑝 = 𝑚𝑒𝑎𝑛{ 2 ◊ 𝑓 𝑝𝑐 , 𝑓 𝑝 𝑤𝑒𝑟𝑒 𝑝 ∈ 𝐿3 𝑝 },
where ◊ represents replication operator and 𝑓(𝑝𝑐)
is gray level value of the center pixel. 4.12 CENTER WEIGHTED L3 MEDIAN
(CWL3 MEDIAN) FILTER Center Weighted L3 Median filter is a filter that
gives more weight to the center pixel of the
LT neighbourhood of a point p. This filter is
defined as
𝑔 𝑝 = 𝑚𝑒𝑑𝑖𝑎𝑛{ 2 ◊ 𝑓 𝑝𝑐 , 𝑓 𝑝 𝑤𝑒𝑟𝑒 𝑝 ∈ 𝐿3 𝑝 },
and ◊ represents replication operator and 𝑓(𝑝𝑐) is
gray level value of the center pixel.
5. EXPERIMENTAL RESULT ANALYSIS
AND DISCUSSION The proposed filtering techniques have been
implemented using MATLAB7.0. The
performance of all the twelve new filtering
techniques are analyzed and discussed. We use
statistical tools Root Mean Square Error (RMSE)
and Peak Signal to Noise Ratio (PSNR) to
evaluate the enhancement of Magnetic resonance
images.
𝑅𝑀𝑆𝐸 = 𝑓 𝑖, 𝑗 − 𝑔 𝑖, 𝑗
2
𝑚𝑛
𝑃𝑆𝑁𝑅 = 20 log10 255
𝑅𝑀𝑆𝐸
Here 𝑓(𝑖, 𝑗) is pixel value of original MRI, g (i, j)
is the pixel value of enhanced MRI and m and n
are the total number of pixels in the horizontal and
vertical dimensions of the image. If the value of
RMSE is low and the value of the PSNR is high,
then the enhancement approach is better. The
MRI of brain cancer [11] with speckle noise and
filtered MRI of brain cancer image obtained by
the proposed filters are compared and analyzed.
Table-1 shows the RMSE and PSNR values of
different proposed filters for MRI brain cancer
image corrupted by speckle noise with variances
0.015, 0.025, 0.035, 0.045, 0.055
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11,NOVEMBER-2012 ISSN 2229-5518
149
IJSER © 2012
http://www.ijser.org
Fig1. Shows the images obtained by applying the
proposed filtering techniques for the brain cancer
MRI with speckle noise of variance 0.015.
Chart1. Shows the analysis of RMSE and PSNR
values of brain cancer image corrupted by speckle
noise of variance 0.015.
6. CONCLUSION
In this work, we have introduced twelve new
filtering techniques for removal of speckle noise
from medical images. To demonstrate the
performance of the proposed techniques, the
experiments have been conducted on brain cancer
MRI. The performance of speckle noise removal
by proposed filtering techniques is measured
using quantitative performance measures such as
RMSE and PSNR. The experimental results
indicate that the CWN6 Mean, CWN6 Median,
CWN12 Mean, CWN12 Median, CWL3 Mean and
CWL3 Median are comparatively better than N6
Mean, N6 Median, N12 Mean, N12 Median, L3
Mean and L3 Median filters respectively and
CWL3 Median filter performs significantly better
than the other proposed filters as well as better
than the Hybrid max filter proposed by
Gnanambal et al[1].
REFERENCES
[1] Gnanambal Ilango and R. Marudhachalam,
New hybrid filtering techniques for removal
of speckle noise from ultrasound
medical images, Scientia Magna, vol. 7, No.
1, (2011), 38-53.
[2] Gnanambal Ilango and R. Marudhachalam,
New hybrid filtering techniques for removal
of Gaussian noise from medical images,
ARPN Journal of Engineering and Applied
Sciences,Vol 6, No. 2, (2011), 8-12.
[3] R. Gonzalez and R. Woods, Digital Image
Processing, Adison-Wesley, New
York,1992
[4] Mamta Juneja and Rajni Mohana, An
improved Adaptive Median Filtering
Method for Impulse Noise Detection,
International Journal of Recent Trends in
Engineering, No.1, (2009), 274-278.
[5] R. Marudhachalam and Gnanambal Ilango,
Center Weighted Hybrid Filtering
Techniques for denoising of medical
images, World Congress on Engineering and
Technology, (2011), 542-545.
[6] R. Klette and A. Rosenfeld, Digital
Geometry, Kaufmann, San Francisco, 2004.
[7] A. Rosenfeld, Digital Topology, American
Mathematical Monthly, 86 (1979), 621-630
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 150 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
[8] K. Thangavel, R. Manavalan, and
I. Laurence Aroquiaraj, Removal of Speckle
noise from Ultrasound Medical Image based
on Special Filters: Comparative Study,
International Conference on Graphics,
Vision and Image Processing, (2009), 25-32.
[9] S. Sudha, G. R. Suresh and R. Sukanesh,
Speckle noise reduction in Ultrasound
Images by Wavelet thresholding based on
Weighted variance, International journal of
Comp. Theory and Engg, No.1, (2009), 7-12
[10] J. W. Turkey,Nonlinear (nonsuperposable)
methods for smoothing data, Proc. Congr.
Rec. EASCOM‘74, 1974, 673-681
[11] MRI brain cancer image taken from
www.google.com – images – brain – cancer
847 600 x 45
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 151
IJSER © 2012
http://www.ijser.org
Comprehensive Study on Various Types of Stegnographic Schemes and Possible
Steganalysis methods for various Cover Carrier like Image, Text, Audio and Video
H. Faheem Ahmed and U. Rizwan
Abstract - Steganalysis is a very challenging field because of the scarcity of knowledge about the specific characteristics of the cover
media (an image, an audio or video file) that can be exploited to hide information and detect the same. The approaches adopted for
steganalysis also sometimes depend on the underlying steganography algorithm(s) used.
Index Terms – Stegnography, Steganalysis.
—————————— ——————————
1. STEGNOGRAPHY
HE word steganography literally means
covered writing as derived from Greek
steganós (covered) and graptos (writing). Using
steganography, one can embed a secret message
inside a piece of unsuspicious information and
send it without anyone knowing of the existence
of the secret message. As the field of
steganography has progressed, people have
become increasingly interested in being able to
detect these hidden messages inside media. The
field of steganalysis has emerged to meet this
need. Steganalysis can be defined as, ―the art and
science of detecting steganography‖. The main
goals of steganalysis are to detect steganography
and to detect what method (or piece of software)
was used to hide the information.
Steganography and cryptography are closely
related. Cryptography scrambles messages so they
cannot be understood. Steganography on the
other hand, will hide the message so that they
cannot be seen.
Fig.1 Types of Steganography
——————————————
U. Rizwan is serving in the Department of Mathematics, Islamiah College, Vaniyambadi, India. E-mail: [email protected]
H. Faheem Ahmed is pursuing Ph.D. degree in Computer Science,Islamiah College, Vaniyambadi, India.
Fig. 2. A block diagram of a generic steganographic
system
2. IMAGE STEGNOGRAPHIC TECHNIQUES
The various image steganographic techniques are:
(i) Substitution technique in Spatial Domain: In
this technique only the least significant bits of the
cover object is replaced without modifying the
complete cover object. It is a simplest method for
data hiding but it is very weak in resisting even
simple attacks such as compression, transforms,
etc.
1) Data Hiding by LSB: least-significant-bit
2) Data Hiding by MBPIS: The Multi Bit
Plane Image Steganography (MBPIS).
3) Data Hiding by MBNS: Multiple-Based
Notational System based on human vision
sensitivity (HVS).
T
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 152 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
4) Data Hiding by QIM: Quantization index
modulation
5) Data Hiding by PVD: The pixel-value
differencing
6) Data Hiding by GLM : Gray level
modification
(ii)Transform domain technique: The various
transform domains techniques are Discrete Cosine
Transform (DCT), Discrete Wavelet Trans- form
(DWT) and Fast Fourier Transform (FFT) are
used to hide information in transform coefficients
of the cover images that makes much more robust
to attacks such as compression, filtering, etc.
(iii) Spread spectrum technique: The message is
spread over a wide frequency bandwidth than the
minimum required bandwidth to send the
information. The SNR in every frequency band is
small. Hence without destroying the cover image
it is very difficult to remove message completely.
(iv) Statistical technique: The cover is divided
into blocks and the message bits are hidden in
each block. The information is encoded by
changing various numerical properties of cover
image. The cover blocks remain unchanged if
message block is zero.
(v) Distortion technique: Information is stored by
signal distortion. The encoder adds sequence of
changes to the cover and the decoder checks for
the various differences between the original cover
and the distorted cover to recover the secret
message. Some common Image Steganography
Technique in Spatial and Transform Domain
[146] has been discussed below.
3. IMAGE STEGNANALYSIS
Image steganography algorithms are more often
based on an embedding mechanism called Least
Significant Bit (LSB) embedding. Each pixel in an
image is represented as a 24-bitmap value,
composed of 3 bytes representing the R, G and B
values for the three primary colors Red, Green and
Blue respectively. A higher RGB value for a pixel
implies larger intensity. For instance, a pixel p
represented as FF FF FF is composed of all of
these three primary colors at their maximum
intensity and hence the color represented by this
pixel is white. LSB embedding exploits the fact
that changing the least significant bit of each of
the three bytes of a pixel would produce only a
minor change in the intensity of the color
represented by the pixel and this change is not
perceptible to the human eye. For example,
changing the color values of pixel p to FE FE FE
would make the color darker by a factor of 1/256.
Steganography algorithms based on LSB
embedding differ on the pattern of modification a
modification of randomly chosen pixels or
modification restricted to pixels located in certain
areas of the image. Images can be represented in
different formats, the three more commonly used
formats are: GIF (Graphics Interchange Format),
BMP (Bit Map) and JPEG (Joint Photographic
Exchange Group). Each of these image formats
behaves differently when a message is embedded
in it. Accordingly, there exist different image
steganalysis algorithms for each of these three
image formats.
4. PALETTE IMAGE STEGNANALYSIS
Palette image steganalysis is primarily used for
GIF images. The GIF format supports up to 8 bits
per pixel and the color of the pixel is referenced
from a palette table of up to 256 distinct colors
mapped to the 24-bit RGB color space. LSB
embedding of a GIF image changes the 24-bit
RGB value of a pixel and this could bring about a
change in the palette color (among the 256 distinct
colors) of the pixel. The strength of the
steganographic algorithm lies in reducing the
probability of a change in the palette color of the
pixel and in minimizing the visible distortion that
embedding of the secret image can potentially
introduce. The steganalysis of a GIF stego image
is conducted by performing a statistical analysis of
the palette table vis-à-vis the image and the
detection is made when there is an appreciable
increase in entropy (a measure of the variation in
the palette colors).The change in entropy is
maximal when the embedded message is of
maximum length.
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 153
IJSER © 2012
http://www.ijser.org
5. RAW IMAGE STEGNANALYSIS
The Raw image steganalysis technique is
primarily used for BMP images that are
characterized by a lossless LSB plane.LSB
embedding on such images causes the flipping of
the two grayscale values. The embedding of the
hidden message is more likely to result in
averaging the frequency of occurrence of the
pixels with the two gray-scale values. For
example, if a raw image has 20 pixels with one
gray-scale value and 40 pixels with the other gray-
scale value, then after LSB embedding, the count
of the pixels with each of the two gray-scale
values is expected to be around 30. It is based on
the assumption that the message length should be
comparable to the pixel count in the cover image
(for longer messages) or the location of the hidden
message should be known (for smaller messages).
6. JPEG IMAGE STEGNANALYSIS
JPEG is a popular cover image format used in
steganography. Two well-known Steganography
algorithms for hiding secret messages in JPEG
images are: the F5 algorithm and Outguess
algorithm. The F5 algorithm uses matrix
embedding to embed bits in the DCT(Discrete
Cosine Transform) coefficients in order to
minimize the number of changes to a message.
7. GENERIC IMAGE STEGNANALYSIS
ALGORITHMS
The generic steganalysis algorithms, usually
referred to as Universal or Blind Steganalysis
algorithms, work well on all known and unknown
steganography algorithms. These steganalysis
techniques exploit the changes in certain innate
features of the cover images when a message is
embedded. The focus is on to identify the
prominent features of an image that are monotonic
and changes statistically as a result of message
embedding. The generic steganalysis algorithms
are developed to precisely and maximally
distinguish these changes. The accuracy of the
prediction heavily depends on the choice of the
right features, which should not vary across
images of different varieties.
8. EVALUATION OF STEGNANALYSIS
TOOLS
In order to evaluate the steganalysis tools, it is
essential that the whole process is forensically
sound to ensure the validity of the findings.
Therefore, the following are the steps that will be
followed throughout the process: 1.Obtain the
steganographic and steganalysis tools 2. Verify
the tools (to ensure the tools is doing what it
claims) 3. Obtain cover images, and generate
MD5 hashes 4. Apply steganalysis on cover
images, and generate MD5hashes 5. Generate
steganographic images, and generate MD5hashes
6. Apply steganalysis on the steganographic
image, and generate MD5 hashes In each of the
steps where the cover images or the
steganographic images are involved, MD5 hashes
have been used to verify whether the image has
changed in any sense.
9. CONCLUSION
In this paper, we have analyzed the steganalysis
algorithms available for Image Steganography. In
summary, each carrier media has its own special
attributes and reacts differently when a message is
embedded in it. Therefore, the steganalysis
algorithms have also been developed in a manner
specific to the target stego file and the algorithms
developed for one cover media are generally not
effective for a different media. This paper would
cater well to providing an overview of the
steganalysis algorithms available for images.
Image steganalysis algorithms can be classified
into two broad categories: Specific and Generic.
The Specific steganalysis algorithms are based on
the format of the digital image (e.g. GIF, BMP
and JPEG formats) and depend on the underlying
steganography algorithm used. The Generic image
steganalysis algorithms work for any underlying
steganography algorithm, but require more
complex computational and higher-order
statistical analysis. The audio steganalysis
algorithms exploit the variations in the
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 154 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
characteristic features of the audio signal as a
result of message embedding. Audio steganalysis
algorithms that detect the discontinuities in phase
(as a result of phase coding), variations in the
amplitude (as a result of Echo hiding) and the
changes in the perceptual and non-perceptual
audio quality metrics as a result of message
embedding have been proposed. The video
steganalysis algorithms that utilize the temporal
redundancies at the frame level and inter-frame
level have been observed to be more effective
than algorithms based on spatial redundancies.
Nevertheless, video steganalysis algorithms that
simultaneously exploit both the temporal and
spatial redundancies have also been proposed and
shown to be effective. In summary, each carrier
media has its own special attributes and reacts
differently when a message is embedded in it.
Therefore, the steganalysis algorithms have also
been developed in a manner specific to the target
stego file and the algorithms developed for one
cover media are generally not effective for a
different media. This paper would cater well to
providing an overview of the steganalysis
algorithms available for the three commonly used
domains of steganography.
Most of the techniques that can be used on
images, can also be applied on audio files.
Compressing an audio file with lossy compression
will result in loss of the hidden message as it will
change the whole structure of a file. Also, several
lossy compression schemes use the limits of the
human ear to their advantage by removing all
frequencies that cannot be heard. This will also
remove any frequencies that are used by a
steganographic system which hides information in
that part of the spectrum.
Another possible way of removing steganograms
is lowering the bitrate of the audio file. In that
case, there will be less available space to store
hidden data and therefore, at least parts of it will
get lost.
For video, once more again, the same methods as
for images and audio files can be applied to
remove hidden information. To defeat the use of
signals or gestures however, human insight is still
necessary, as computer systems are not yet
capable of detecting this with a reasonable rate of
success.
REFERENCES
[1] Ahmed Ibrahim, Steganalysis in Computer
Forensics, Security Research Centre
Conferences, Australian Digital Forensics
Conference, Edith Cowan University Year
2007.
[2] H. Faheem Ahmed and U. Rizwan, An
Alternative Technique in Data Embedding,
Advanced Materials in Physics, 233-242,
2012.
[3] Greg Goth, Steganalysis Gets Past the Hype,
IEEE, Distributed Systems Online 1541-4922
© 2005 Published by the IEEE Computer
Society Vol. 6, No. 4; April 2005.
[4] Guillermito, Steganography: A few tools to
discover hidden data. Retrieved September
29, 2007,
http://www.guillermito2.net/stegano/tools/ind
ex.html.
[5] J. Kelley, Terrorist instructions hidden online.
Retrieved September 14, 2007,
http://www.usatoday.com /tech/news/2001-
02-05-binladen-side.html
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 155
IJSER © 2012
http://www.ijser.org
k-Stage Fuzzy Transportation Problem Based On Interval Valued Fuzzy Numbers
S. Elizabeth and L. Sujatha
Abstract: The transportation problem is a typical problem where a product is to be transported from ‘m’ sources to ‘n’ destinations. In general, crisp transportation problems are solved with the assumption that the supplies, demands and cost parameters are specified in a precise way, but this is not possible in real life situations due to uncertainty in judgments, lack of evidence etc., which gives rise to fuzzy environment and hence fuzzy decision making method is needed here. In this paper, a procedure is proposed for k-stage fuzzy transportation problem. Illustrative example is also included to demonstrate the proposed approach. Index Terms - Fuzzy transportation problem, Interval valued fuzzy numbers, Transportation Network, Decision Maker.
—————————— ——————————
1. INTRODUCTION
HE basic transportation problem was
originally developed by Hitchcock [4]. It can
be modeled as a standard linear programming
problem. An Initial basic feasible solution (IBFS)
for the transportation problem can be obtained by
using the North-west corner rule, Row minima,
Column minima, Matrix minima or the Vogel‘s
approximation method (VAM). The Modified
distribution method (MDM) is useful for finding
the optimal solution for the transportation
problem. It is not often possible to get relevant
precise data for supplies, demands and cost
parameters hence fuzzy numbers namely interval
valued fuzzy numbers, triangular fuzzy numbers,
trapezoidal fuzzy numbers may represent this
data. Zimmerman [12] showed that solutions
obtained by fuzzy linear programming are always
efficient. Subsequently, Zimmermann‘s fuzzy
linear programming has developed into several
fuzzy optimization methods for solving the
transportation problems. Chanas et.al. [1]
presented a fuzzy linear programming model for
solving transportation problems with crisp cost
coefficients and fuzzy supply and demand values.
Chanas and Kuchta [2] proposed the concept of
the optimal solution for the transportation problem
————————————————
S. Elizabeth is serving in the Department of Mathematics, Auxilium
College, Vellore, India. E-mail: [email protected]
L. Sujatha is pursuing Ph.D. degree in Mathematics, Auxilium College, Vellore, India. E-mail: [email protected]
with fuzzy coefficients expressed as fuzzy
numbers, and developed an algorithm for
obtaining the optimal solution. Saad and Abbas
[10] discussed the solution algorithm for solving
the transportation problem in fuzzy environment.
Liu and Kao [7] described a method for solving
Fuzzy transportation problem (FTP) based on
extension principle. Lin [6] introduced a genetic
algorithm to solve a transportation problem with
fuzzy objective functions. Dinagar and Palanivel
[11] investigated FTP, with the aid of trapezoidal
fuzzy numbers. Fuzzy modified distribution
method is proposed to find the optimal solution in
terms of fuzzy method is proposed to find the
optimal solution in terms of fuzzy numbers.
Pandian and Natarajan [9] proposed a new
algorithm namely, fuzzy zero point method for
finding a fuzzy optimal solution for a FTP, where
the transportation cost, supply and demand are
represented by trapezoidal fuzzy numbers. Thus
numerous papers have been published in fuzzy
transportation problem.
The rest of the paper is organized as follows: In
section 2, basic definitions on Interval valued
fuzzy numbers are reviewed and some new
definitions are coined for the same. In section 3, a
procedure is proposed for k-stage transportation
problem in fuzzy environment. An example is also
illustrated for the proposed approach. Section 4,
concludes the paper.
T
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 156 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
2. PRE-REQUISITES
Definition 1. [5] When interval is defined on real
number . This interval is said to be a subset of
. The interval valued fuzzy number is denoted
by 313131
,,],,[ aaaaaaA and its membership
function is given as follows:
3
31
1
,0
,1
,0
)(
ax
axa
ax
xA
Fig. 1. Interval valued fuzzy number ],[31
aaA
If a1 = a3, this interval indicates a point
],[ 11aaA =
1a
Definition 2. Operations on Interval Valued fuzzy numbers [5] .
Let ],[31
aaA and ],[31
bbB , 31
,31
,, bbaa be
two interval valued fuzzy numbers then :
Addition Operation )(
33113131 ,,)(,)( bababbaaBA
Subtraction Operation )(
13313131 ,,)(,)( bababbaaBA
Multiplication Operation )( :
3313311133133111
3131
....,....
,)(,)(
babababababababa
bbaaBA
The following definitions are introduced in this
paper.
Definition 3. The Centroid Measure for α- cut interval number is given in [3]. The same
procedure is followed here for Interval Valued
fuzzy number. Let ],[31
aaA be an interval valued
fuzzy number.
Then Centroid2
.1
.131
3
1
3
1)()(
aa
dx
xdx
a
a
a
aACA
Definition 4. Let ],[31
aaA and ],[31
bbB be
two interval valued fuzzy numbers. If )()( BCAC
then A is called fuzzy maximum then B and if
)()( BCAC then A is called fuzzy minimum then
B.
Definition 5. Fuzzy zero for interval valued fuzzy number is denoted by IFNO and it is taken as
[0,0] (or) ],[ kk where k and δ are positive
scalars.
Definition 6. Let ],[31
aaA and ],[31
bbB ,
31
,31
,, bbaa be two interval valued fuzzy
numbers. The multiplication Operation on Interval valued fuzzy numbers based on Centroid measure is defined as
Case (i) If 0)(,0)( BCAC and if
0)(,0)( BCAC ,
)(
2),(
2)( 31
331
1bb
abb
aBA
Case (ii) If 0)(,0)( BCAC and if
0)(,0)( BCAC ,
)(
2),(
2)( 3131
13bb
abb
aBA
2.1 Degeneracy in Fuzzy Transportation Problem
Fuzzy Initial basic feasible solution is said to be
degenerate, if the number of allotted cells is less
than m + n – 1, where m is the number of fuzzy
origins and n is the number of fuzzy destinations.
In such cases, we allocate small quantity namely
],[ satisfying the following conditions to one or
more empty cells so that the total number of
allotted cells is equal to m + n – 1 independent
cells.
(i) 0],[
],[],[)(]k,-k[],[)(],[
and ],[],[)(]0,0[]0,0[)(],[ (ii)
kkkk
where )]k,[-k(C and)],[( C
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 157
IJSER © 2012
http://www.ijser.org
(iii) ],[)(],[)3()1(
ijijxx
ijijijijijijxxxxxx ,],[],[
)3()1()3()1(
(iv)
(1) (3) (1) (3)
(1) (3)
[ , ]( )[ , ] [ , ]
[ , ] ,
ij ij ij ij
ij ij ij ij
x x x x
x x x x
where ],[ )3()1(
ijijxxxij is a quantity transported
from ith
fuzzy origin to jth
fuzzy destination. Thus
we obtain the fuzzy initial basic feasible solution
as non-degenerate solution.
3. PROCEDURE FOR k-STAGE FUZZY
TRANSPORTATION PROBLEM
The k-stage fuzzy transportation problem is
framed with an assumption that the destinations
are unable to receive the quantity in excess due to
storage capacity. In such situation after consuming
part of the initial product, they are prepared to
receive the excess quantity in the successive
stages whereas the cost parameters remain the
same in all the k-stages. In k-stages the
transportation of the product from sources to the
destination is done in parallel. Nagoor Gani and
Abdul Razak [8] presented two stage cost
minimizing fuzzy transportation problem in which
supplies and demands are taken as trapezoidal
fuzzy numbers with crisp cost. In this section a
procedure is presented for k-stage fuzzy
transportation problem where the supplies,
demands and cost parameters are taken as Interval
Valued Fuzzy Numbers. A parametric approach is
followed to obtain a fuzzy solution which aim to
minimize the sum of the fuzzy transportation cost
in k-stages.
The linear programming model representing the k-
stage fuzzy transportation problem is given by
Minimize Z =
m n
ijiji j
xc CC1 1
))( ( ( I )
subject to the constraints
)(
1)( i
n
ij aCCj
x
for i= 1,2,…..,m (Row sum)
)(
1)( j
m
ij bCCi
x
for j= 1,2,…..,n (Column sum)
jiC ijx ,0( )
The following steps are followed for k-stage fuzzy
transportation problem.
Step 1. Construct a fuzzy transportation network
with m fuzzy origins (rows) and n fuzzy
destinations (columns). Let fuzzy supply ai = [ai(1)
,
ai(3)
] be the quantity of commodity available at
fuzzy origin i. Let fuzzy demand bj = [bj(1)
, bj(3)
]
be the quantity of commodity needed at fuzzy
destination j and let fuzzy cost cij = [cij(1)
, cij(3)
] be
the cost for transporting one unit of the product
from ith
fuzzy origin to jth
fuzzy destination, where
i = 1,2,….,m (Number of rows), j = 1,2,…..,n
(Number of columns).
Table 3.1. Fuzzy Transportation Problem
FO\
FD
FD1 FD2 ... FDn ai
FO1 [c11(1)
,
c11(3)
]
[c12(1)
,
c12(3)
]
... [c1n(1)
,
c1n(3)
]
a1=[a1(1)
,
a1(3)
]
FO2 [c21(1)
,
c 21(3)
]
[c22(1)
,
c22(3)
]
... [c2n(1)
,c2n(3)
] a2=[a2(1)
,
a2(3)
]
FOm [cm1(1)
,
cm1(3)
]
[cm2(1)
,
cm2(3)
]
... [cmn(1)
,cmn(3)
] am=[am(1)
,
am(3)
]
bj b1=[b1(1)
,
b1(3)
]
b2=[b2(1)
,
b2(3)
]
... bn=[bn(1)
,bn(3)
]
The given fuzzy transportation problem is said to
be balanced if
n
j
m
ijjii
bbaa11
)3()1()3()1(,,
and unbalanced if
n
j
m
ijjii
bbaa11
)3()1()3()1(,, .
The unbalanced fuzzy transportation problem is
converted into balanced fuzzy transportation
problem as follows:
If
n
j
m
ijjii
bbaa11
)3()1()3()1(,,
then the dummy column with cost parameters
[0,0] or ],[ kk , where k and δ are positive
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 158 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
scalars, is introduced which will provide for the
excess demand.
If
n
j
m
ijjii
bbaa11
)3()1()3()1(,,
then the dummy row with cost parameters [0,0] or
],[ kk where k and δ are positive scalars, is
introduced which will provide for the excess
supply. First we have to check whether the given
Fuzzy Transportation Problem is balanced. If so,
divide it into k-stages as follows:
1- stage
Minimize 11
11 c)(z
1
n
jijij
m
i
xcC
subject to the constraints
n
ijj
x1
1 Ai1 for mi ..,,.........2,1 (Row sum)
m
iijx
11
B1j for nj ..,,.........2,1 (Column sum)
jix ,0ij1
2- stage
Minimize 22
12 c)(z
1
n
jijij
m
i
xcC
subject to the constraints
n
ijj
x1
2 Ai2 for mi ..,,.........2,1 (Row sum)
m
iijx
12
B2j for nj ..,,.........2,1 (Column sum)
jix ,0ij2
k- stage
Minimize k
1k c)(z
1
n
jijkij
m
i
xcC
subject to the constraints
n
ijkj
x1
Aik for mi ..,,.........2,1 (Row sum)
m
iijkx
1
Bkj for nj ..,,.........2,1 (Column sum)
jix ,0ijk
(1) (3)
1
(1) (3)
2
,
... ([ , ])
( )2
ij ij ij
ij ij
ij
ij ijk C
C X i jij
x x x x x
x xx
where ],[ )3()1(
ijijxxxij is a quantity transported
from ith
fuzzy origin to jth
fuzzy destination.
Here the optimal parameters are obtained using
centroid measure as follows:
If ai = [ai(1)
, ai(3)
] , bj = [bj(1)
, bj(3)
] , cij = [cij(1)
,
cij(3)
] then
number integer an is and value
decimal a is if
integer an is if
*
*
2)(
)3()1(
iA
iAia iAiA
iAiA
Cii
aa
Similarly,
number integer an is and value
decimal a is if
integer an is if
*
*
2)(
)3()1(
ijC
ijCijCijC
ijCijC
ijij
ij
cccC
mtoiiAoriAiaC 1,)(*
and ntojjBorjBjbC 1,)(*
Now *iAoriA are divided into k- parts namely
iki
AAAi .....,,,21 (or) **
2
*
1,......,,
ikiiAAA ,
where
mmkmmkAAAAAAAA .......,.......,.....
21111211
(or) ***
2
*
1
*
1
*
1
*
12
*
11......,......,......
mmkmmkAAAAAAAA
Similar procedure follows for *
jj BB or . Also
n
jkj
m
iik
n
jj
m
ii BABA
1111
11 ,....., .
If not, that is if
n
jkj
m
iik
n
jj
m
ii BABA
1111
11 ,....., ,
then dummy row with cost parameter zero is
introduced which will provide for the excess
supply.
number integer an is and value
decimal a is if
integer an is if
*
*
2)(
)3()1(
jB
jBjbC jBjB
jBjB
jjbb
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 159
IJSER © 2012
http://www.ijser.org
If
n
jkj
m
iik
n
jj
m
ii BABA
1111
11 ,.....,
then dummy column with cost parameter zero is
introduced which will provide for the excess
demand. But note, most probably the divided
values are chosen such that the FTP in all the k-
stages are balanced.
Step 2. Calculate Fuzzy initial basic feasible
solution using VAM and the fuzzy optimal
solution using MDM for k-stages.
Step 3. Calculate minimum fuzzy transportation
cost kzzz ,......,, 21 from fuzzy optimal solution in
k-stages and it is taken as kccc ,......,, 21
respectively.
Step 4. Declare 1 2 ...... kc c c c as the fuzzy
optimal value of the fuzzy transportation problem
(I) .
4. ILLUSTRATIVE EXAMPLE
Construct a fuzzy transportation network where
nodes denote the fuzzy origin (FO) and fuzzy
destinations (FD), edges denote the fuzzy cost.
Fig. 2. Fuzzy Transportation Network
Table 3.2. Fuzzy Initial Table
FO\
FD
FD1 FD2 FD3 FD4 ai
FO1 [-2,6] [-2,6] [-2,6] [-1,3] [-3,9]
FO2 [4,16] [3,13] [2,8] [1,7] [-3,17]
FO3 [3,11] [2,10] [2,10] [3,13] [-20,30]
bj [-11,19] [-3,9] [-13,21] [1,7] [-26,56]
Table 3.3. Centroid Measure for
FO \
FD
FD1 FD2 FD3 FD4 C (ai)
FO1 2 2 2 1 A1=3
FO2 10 8 5 4 A2=7
FO3 7 6 6 8 A3=5
C (bj) B1=4 B2=3 B3=4 B4=4 15
Here
4
1
3
1
)3()1()3()1(,,
jijjii
bbaa =[-26,56]
15)(b C)(a C
3 4
ji1 1
i j
.
Hence it is a balanced FTP. Let k = 3
1-Stage.
Table 3.4. Fuzzy IBFS using VAM
FO\
FD
FD1 FD2 FD3 FD4 Ai1
FO1 2
1
2
-
2
-
1
-
A11=1
FO2 10
-
8
-
5
1
4
1
A21=2
FO3 7
-
6
1
6
-
8
-
A31=1
B1j B11=1 B12=1 B13=1 B14=1 4
Table 3.5. Fuzzy Optimal Solution
FO\
FD
FD1 FD2 FD3 FD4 FO\ FD
FO1 2
1
2
2
-
1
FO1
FO2 10
-
8
-
5
1
4
1
FO2
FO3 7
-
6
1
6
-
8
-
FO3
Minimize 1z C11 x111+ C12 x121+ C14 x141+
C23x231+ C24x241+ C32 x321
= 1614151212
= 2+5+4+6+3 117317 c
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 160 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
2-Stage.
Table 3.6. Fuzzy IBFS using VAM
FO\
FD
FD1 FD2 FD3 FD4 Ai2
FO1 2
1
2
-
2
-
1
-
A12=1
FO2 10
-
8
-
5
1
4
1
A22=2
FO3 7
-
6
1
6
-
8
-
A32=1
B2j B21=1 B22=1 B23=1 B24=1 4
Table 3.7. Fuzzy Optimal Solution
FO\
FD
FD1 FD2 FD3 FD4 FO\ FD
FO1 2
1
2
2
-
1
FO1
FO2 10
-
8
-
5
1
4
1
FO2
FO3 7
-
6
1
6
-
8
-
FO3
Minimize 2z C11 x112+ C12 x122+ C14 x142
+ C23 x232+ C24 x242+ C32 x322
= 2 1 2 1 5 1 4 1 6 1
= 2+5+4+6+3 217 3 17 c
3- Stage.
Table 3.8. Fuzzy IBFS using VAM
FO\ FD FD1 FD2 FD3 FD4 Ai3
FO1 2
1
2
-
2
-
1
-
A13=1
FO2 10
-
8
-
5
1
4
2
A23=3
FO3 7
1
6
1
6
1
8
-
A33=3
B3j B31=2 B32=1 B33= 2 B34=2 7
Here Fuzzy IBFS given in table 3.8 is an optimal
solution
Minimize 3z C11 x113+ C23x233+ C24x243
+ C31 x313+ C32 x323+ C33x333
3
2 1 5 1 4 2 7 1 6 1 6 1
34 c
Therefore the optimal value of the objective
function of the fuzzy minimum cost transportation
problem is
Minimize Z = 321 ccc
= 17 + 17 + 34
= 68 = c (1)
For the sake of verification, calculating
ijkijij xxx ......21 = Xij
from all k-stages for i=1,2,….,m; j=1,2,…..,n
which is given in the below table 3.9
Table 3.9. Table for verification
FO\
FD
FD1 FD2 FD3 FD4 C (ai)
FO1 2
3
2
2
2
-
1
2
A1=3
FO2 10
-
8
-
5
3
4
4
A2=7
FO3 7
1
6
3
6
1
8
-
A3=5
C (bj) B1= 4 B2= 3 B3= 4 B4=
4
15
Minimize Z = C11 X11+ C12 X12 + C14 X14
+ C23 X23 + C24 X24+ C31X31
+ C32 X32 + C33 X33
2 3 2 2 1 2 5 3 4 4
7 1 6 3 6 1
68
Results and Discussions.
The fuzzy optimal solution using fuzzy VAM and
fuzzy optimality test for Table 3.2 is given in
below Table 3.10
The general linear programming model
representing the fuzzy transportation problem for
table 3.1 is given by
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 ISSN 2229-5518 161
IJSER © 2012
http://www.ijser.org
Minimize Z =
subject to the constraints,
],,[ )3()1(
1
)3()1([] ii
n
ijij aaxxj
for mi ..,,.........2,1
],,[ )3()1(
1
)3()1([] jj
m
ijij bxx bi
for nj ..,,.........2,1
Table 3. 10. Fuzzy Optimal Solution
FO\
FD
FD1 FD2 FD3 FD4 ai
FO1 [-2,6]
[-3,9]
[-2,6]
-
[-2,6]
-
[-1,3]
-
[-3,9]
FO2 [4,16]
-
[3,13]
-
[2,8]
[-4,10]
[1,7]
[1,7]
[-3,17]
FO3 [3,11]
[-8,10]
[2,10]
[-3,9]
[2,10]
[-9,11]
[3,13]
-
[-20,30]
bj
[-11,19]
[-3,9]
[-13,21]
[1,7]
[-26,56]
The general linear programming model
representing the fuzzy transportation problem for
table 3.1 is given by
Minimize Z =
subject to the constraints,
],,[ )3()1(
1
)3()1([] ii
n
ijij aaxxj
for mi ..,,.........2,1
],,[ )3()1(
1
)3()1([] jj
m
ijij bxx bi
for nj ..,,.........2,1
For the table 3.10, the fuzzy minimum
transportation cost is
Minimize Z
2, 6 ( ) 3,9 ( ) 2,8 ( ) 4,10 ( ) 1, 7 ( ) 1, 7
( ) 3,11 ( ) 8,10 ( ) 2,10 ( ) 3,9 ( ) 2,10 ( ) 9,11
=
10,2)(30,6)(11,3)(28,4)(24,6)(18,6
=[15,121]
068 ZC (2)
Hence as given in Step 1, most probably the
divided values are chosen such that the FTP in all
the k – stages are balanced so that the solution
obtained for k-stage FTP (equation (1)) coincides
with the solution obtained using fuzzy VAM and
fuzzy optimality test (equation (2)). If not, they
are approximately equal.
5. CONCLUSION
In Today‘s highly competitive market, the
organization or agency should plan their work in
such a way that they should create and deliver the
products to customers in a cost – effective
manner. Fuzzy Transportation models play a vital
role in solving these types of problems. In this
paper, we developed a method for finding the
fuzzy optimal solution for k-stage fuzzy
transportation problem. We conclude that the
proposed method is very easy to understand and
provide a powerful framework to meet the
challenging problems in real life situations.
REFERENCES
[1] Chanas, S., Kolodziejckzy, W., and Machaj,
A.A., ―A Fuzzy approach to the
transportation problem‖, Fuzzy sets and
Systems, vol. 32, pp. 1-11, 1989.
[2] Chanas, S., and Kuchta, D., ―A concept of the
optimal solution of the transportation
problem with fuzzy cost coefficient‖, Fuzzy
Sets and Systems, vol. 82, pp. 299 - 305,
1996.
[3] Elizabeth. S and Sujatha. L., ―Fuzzy Critical
path in a network‖, in: proceedings of the
International Conference on Mathematical
Modeling and Applied Soft Computing, vol.1,
pp. 97-108, July 11-13, 2012.
[4] Hitchcock, F.L., ―The distribution of a
product from several sources to numerous
m n
ijijijiji j
xxcc1 1
],[)(],[ )3()1()3()1(
m n
ijijijiji j
xxcc1 1
],[)(],[ )3()1()3()1(
jixx ijij ,0],[ )3()1(
jixx ijij ,0],[ )3()1(
INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 11, NOVEMBER -2012 162 ISSN 2229-5518
IJSER © 2012
http://www.ijser.org
localities‖, Journal of Mathematical Physics,
vol. 20, pp. 224-330, 1941.
[5] Kwang. H. Lee, ― First Course on Fuzzy Theory
and Applications‖, Springer (India) Private
Limited, 2005.
[6] Lin, F.T., ―Solving the transportation
problem with fuzzy coefficients using genetic
algorithms‖, in : proceeding IEEE
International Conference on Fuzzy Systems,
pp. 20 – 24, 2009.
[7] Liu, S.T., and Kao, C., ―Solving fuzzy
transportation problems based on extension
principle‖, European Journal of Operational
Research, vol. 153, pp. 661 – 674, 2004.
[8] Nagoor Gani, A., and Abdul Razak, K., ―Two
Stage Fuzzy Transportation Problem‖,
Journal of Physical Sciences, vol. 10, pp. 63
– 69, 2006.
[9] Pandian, P., and Natarajan, G., ―A new
algorithm for finding a fuzzy optimal solution
for fuzzy transportation problems‖, Applied
Mathematical Sciences, vol. 4, pp. 79 – 90,
2010.
[10] Saad, O.M., and Abbas, S.A., ―A parametric
study on transportation problem under fuzzy
environment‖, The Journal of Fuzzy
Mathematics, vol. 11, pp. 115 – 124, 2003.
[11] Stephen Dinagar, D., and Palanivel, K., ―The
Transportation problem in Fuzzy
Environment‖, International Journal of
Algorithms, Computing and Mathematics,
vol. 2, pp. 65 – 71, 2009.
[12] Zimmermann, H.J., ―Fuzzy programming and
linear programming with several objective
function‖, Fuzzy Sets and Systems, vol. 1, pp.
45 – 55, 1978.