International Conference On Mathematical Applications (ICMATAP-20)
International Conference On Mathematical Applications (ICMATAP-20)
International Conference On Mathematical Applications (ICMATAP-20)
(ICMATAP-20)
Delhi, India
22nd March, 2020
No part of this book can be reproduced in any form or by any means without prior written
ISER-Explore
Editorial:
These proceedings collect the up-to-date, comprehensive and worldwide state-of-art knowledge on
Mathematical Applications. All accepted papers were subjected to strict peer-reviewing by 2-4 expert
referees. The papers have been selected for these proceedings because of their quality and the
relevance to the conference. We hope these proceedings will not only provide the readers a broad
overview of the latest research results on Mathematical, Computational Sciences and Management
but also provide the readers a valuable summary and reference in these fields.
The conference is supported by many universities and research institutes. Many professors plaid an
important role in the successful holding of the conference, so we would like to take this opportunity
to express our sincere gratitude and highest respects to them. They have worked very hard in
reviewing papers and making valuable suggestions for the authors to improve their work. We also
would like to express our gratitude to the external reviewers, for providing extra help in the review
process, and to the authors for contributing their research result to the conference.
Since January 2020, the Organizing Committees have received more than 40 manuscript papers,
and the papers cover all the aspects in Mathematical Applications. Finally, after review, about 11
papers were included to the proceedings of ICMATAP-2020.
We would like to extend our appreciation to all participants in the conference for their great
contribution to the success of International Conference 2020. We would like to thank the keynote
and individual speakers and all participating authors for their hard work and time. We also sincerely
appreciate the work by the technical program committee and all reviewers, whose contributions
make this conference possible. We would like to extend our thanks to all the referees for their
constructive comments on all papers; especially, we would like to thank to organizing committee for
their hard work.
Acknowledgement
ISER is hosting the International Conference on Mathematical Applications this year in month of March.
International Conference on Mathematical Applications will provide a forum for students, professional
engineers, academician, and scientist engaged in research and development to convene and present their latest
scholarly work and application in the industry. The primary goal of the conference is to promote research and
developmental activities in Mathematical Applications and to promote scientific information interchange
between researchers, developers, engineers, students, and practitioners working in and around the world. The
aim of the Conference is to provide a platform to the researchers and practitioners from both academia as well
as industry to meet the share cutting-edge development in the field.
I express my hearty gratitude to all my Colleagues, Staffs, Professors, Reviewers and Members of organizing
committee for their hearty and dedicated support to make this conference successful. I am also thankful to all
our delegates for their pain staking effort to travel such a long distance to attain this conference.
Abstract:--Outcome based education system is the need of higher engineering education. It specifies learning objective for the
students. To get the accreditation of a program through NBA, it is required to analyze the attainment of outcomes. Course
Outcome, Program Outcome and Program Specific Outcome are three main outcomes through which we can measure the success
of any program run for the engineering students.
This paper describes the process to quantify the program outcomes using course outcomes. The mathematical approach will be
applied in this process. The performance of the student is the key element of the evaluation of attainment of any program outcome.
The authors of [6] and [7] mentioned the rubrics as the Table 1: Example of CO
measurement tool for the attainment of the program Program outcomes
outcomes.In this paper we present a mathematical Program outcomes (PO) are statements which define the
approach to find attainment of CO, PO and PSO. The paper qualities to be develop in the student after completing the
is divided into five sections. Section-II includes various program. The program outcome defined by NBA[8] are as
outcomes describe in NBA. In section- III, we will discuss follows :
about the tools involve for the attainment. Section-IV 1. Engineering Knowledge
2. Problem Analysis
III.MATHEMATICAL APPROACH TO
MEASURE ATTAINMENT
IV.
As we have discussed in section III program
outcomes attainment can be measure through CO
attainment.
CO Attainment
The mathematical approach presented in this
paper includes following steps to calculate CO Attainment.
Fig.1 : Relation of CO-PO-PSO 1. Define CO in such a way that every unit can
mapped with a CO. That means, if we have six
Tools towards attainment of outcomes units in the certain course then we must have six
CO related with each unit.
According to [2], after specifying course outcome it is
necessary to design the delivery method and assessment 2. Collect the existing data from various assessment
methods in such a way all stated CO can be attained. tools like marks of various test, assignment,
Delivery method includes all those methods using which seminars etc.
students will able to acquire knowledge. Assessment
method used to ensure the attainment of CO.
3. Correlate marks distribution of each assessment also it depends upon the understanding of the subject by an
tool with units of course which will directly individual student and difficulty level of question paper.
connect the question with COs.
7. Both the tables generated in step 5 and 6 are to be
4. Define the % weightage of each CO of a course considered for calculation of assessment of COs.
corresponding to each assessment tool.
In order to calculate CO's, first of all we calculate
5. Generate Assessment Method-CO matrix (as percentage of successful students of each assessment
described in [2] & [3] ) to show weightage method and then we apply following formulae for each
distribution of the percentage of marks distribution CO.
for each CO. The calculation provide better results
if at least three assessment method include a CO in Formulae:
their assessment process. Following table 2 shows i. CO 1= (16.25% x SUE x 70%) + (SUE x 10%) +
the Assessment Method – CO matrix for Applied (50% x CIET-1 x 3%) + (20% x seminar x 2%) +
Mathematics-I (16.25% x SIE x 4%)
6. Generate the table related to overall percentage Evaluation of CO is based on CO % from assessment
distribution of marks according to the marking method and overall percentage distribution of marks. Since
scheme of university. For example according to the target of attainment level is set on the basis of pass %
RTMNU, Nagpur marks distribution is shown in for example “70% students scored more than 40% marks”,
table 4. therefore calculation of CO is also related with pass% of
each assessment method.
As per the scheme CO can be 3 (substantially), 2
(Moderately) and 1 (slightly). In our calculation this values
can be obtained in following ranges
Finally we can find CO attainment for the particular course [2] I.Z. Abidin, A. Anuar,N. H. Shuaib, “Assessing the
using average of the attainment values of CO 1 to CO n. attainment of course outcomes (CO) for an engineering
course”, Preceedings of the 2nd International
Attainment of PO and PSO Conference of Teaching and Learning (ICTI-2009),
INTI University College, Malaysia.
Each CO will be mapped with one or more PO and PSO.
As discussed in section II relation between CO and PO [3] S. Rawat, S. Karkare, “An empirical study on
represented by CO-PO matrix. We called it Expected PO assessment of CO attainment for a diploma course”,
Attainment of the course (shown in table- 6) and similar International Journal of Electronics and
matrix can be prepared for CO and PSO. Communication Engineering &Technololgy(IJECET),
ISSN 0976-6464 (print), ISSN 0976-6472 (online), Vol
6, Issue 2, Feb 2015, PP. 06-12
Table – 7: Expected and Actual PO Attainment [8] National Board of Accreditation, Self Assessment
Corresponding To each CO Report (SAR) Format, Undergraduate Engineering
Programs (TIER-II), www.nbaind.org, June 2015
IV. CONCLUSION
REFERENCES
Abstract:—The aim of this paper is to introduce new class of Fuzzy sets, namely wg**-closed fuzzy set for Fuzzy topological
spaces.This new class is properly lies between the class of closed Fuzzy set and the class of wg-closed fuzzy set, we also introduce
application of wg**-closed fuzzy sets, the concept of fuzzy wg**-continuous, fuzzy wg**-irresolute mapping, fuzzy wg**-closed
maps, fuzzy wg**-open maps and fuzzy wg**-homeomorphism in Fuzzy topological spaces are also introduced, studied and some
of their properties are obtained.
Keywords:—fwg**-closed fuzzy sets, fwg**-continuous, fwg**-irresolute, fwg**-open, fwg**-closed mapping and fwg**-
homeomorphism.
Fuzzy topological spaces and some basic concepts Definition 2.01:A fuzzy set A of afts (X, T) is called:
and results on fuzzy topological spaces from the works of 1) a semi-open fuzzy set, if A ≤ cl(int(A)) and a semi-
C.L.Chang [4], R.H.Warren [17], and C.K.Wong [18] are closed fuzzy set, if int(cl(A)) ≤ 0 [13]
presented. And some basic preliminaries are included. 2) a pre-open fuzzy set, if A ≤ int(cl(A)) and a pre-
N.Levine [7] introduced generalized closed sets (g-closed closed fuzzy set, if cl(int(A)) ≤ A [13]
sets) in general topology as a generalization of closed 3) a α-open fuzzy set, if A ≤ int(cl(int(A))) and a α-
sets. Many researchers have worked on this and related closed fuzzy set, if cl(int(cl(A))) ≤ A [14]
problems both in general and fuzzy topology. Dr. The semi closure (respectively pre-closure, α-closure)
SadanandPatil [14, 15 &16] in the year 2009 and R. Devi of a fuzzy set A in a fts (X, T) is the intersection of all
and M. MuthtamilSelvan[5] in the year 2004, are semi closed (respectively pre closed fuzzy set, α-closed
introduced and studied g-continuous maps. fuzzy set) fuzzy sets containing A and is denoted by
scl(A) (respectively pcl(A) , αcl(A)).
Definition 2.02:A fuzzy set A of afts (X, T) is called: afts. Note that the fuzzy subset B is weakly g** closed
1) a generalized closed (g-closed) fuzzy set, if cl(A) ≤ U fuzzy set in (X, T) but not a closed fuzzy set in (X, T).
,whenever A ≤ U and U is open fuzzy Set in (X, T). [2]
2) a weakly-generalized-closed (wg-closed) fuzzy Theorem 3.04: Every g** - closed fuzzy set is weakly
Set, if cl(A) ≤ U , whenever A ≤ U and U is open fuzzy g** - closed fuzzy set in (X, T).
set in (X, T).[14] Proof: Omitted.
3) a weakly-generalized* closed (wg*-closed) fuzzy set, The converse of the above theorem need not be true as
if cl(A) ≤ U, whenever A ≤ U and U is open fuzzy set in seen from the following example.
(X,T). [14 ,15&16]
Complement of g-closed fuzzy (respectively wg- Example 3.05: Let X={a,b,c} fuzzy sets A and B be
closed fuzzy set and wg*-closed fuzzy set) sets are called defined as follows A={(a,0.2),(b,0.5),(c,0.3)} and
g-open (respectively wg-open fuzzy set and wg*-open B={(a,0.5),(b,0.2),(c,0.3)}. Consider
fuzzy set) sets. T= {0, 1, A}.Then (X, T) is fts. The fuzzy set B is wg*-
closed but not g*closed fuzzy set in X.
Definition 2.03: Let X, Y be two fuzzy topological
spaces. A function f: X→Y is called Theorem 3.06: Every weakly g** closed fuzzy set is
weakly g-closed fuzzy set in fts X.
1) Fuzzy continuous (f-continuous) [14 ,15&16] if f- Proof: Omitted.
1
(B) is open fuzzy set in X , for every open fuzzy set The converse of the above theorem need not be true as
B of Y seen from the following example.
2) Fuzzy generalized- continuous (fg-continuous)
function [14 ,15&16] if f-1(A) is g-closed fuzzy set in Example 3.07: In the example 3.05, The fuzzy set B is
X , for every closed fuzzy set A of Y wg-closed but not wg**-closed fuzzy set.
3) Fuzzy g*-continuous (fg*-continuous) function[14
,15&16] if f-1(A) is g*-closed fuzzy set in X , for Theorem 3.08: Every weakly g** closed fuzzy set is
every closed fuzzy set A of Y weakly g*-closed fuzzy set in fts X.
Proof: Omitted.
Definition 2.04: Let X, Y be two fuzzy topological The converse of the above theorem need not be true as
spaces. A function f: X→Y is called seen from the following example.
1) Fuzzy -open (f-open) [14, 15&16] iff f (V) is open Example 3.09: In the 3.05,The fuzzy set B is wg*-closed
fuzzy set in Y, for every open fuzzy set in X. but not wg**-closed fuzzy set.
2) Fuzzy g-open (fg-open) [14, 15&16] iff f (V) is g-
open- fuzzy set in Y, for every open fuzzy set in X. Theorem 3.10: If a fuzzy set A of afts X is both open
3) Fuzzy g*-open (fg*-open) [14, 15&16] ifff(V) is g- and wg**-closed fuzzy set then it is a closed fuzzy set.
open- fuzzy set in Y, for every open fuzzy set in X. Proof: Suppose a fuzzy set A of fts X is both open and
wg**-closed. Now A ≤ A, A is open and so g*-open.
III. WEAKLY g** CLOSED FUZZY SETS Then we have cl(int A) ≤ A which implies cl(A) ≤ A
Since A is open. Since A ≤ cl(A), we have cl(A) = A.
Definitions 3.01: A fuzzy set A of fuzzy topological Thus A is closed fuzzy set.
space in (X, T) is called weakly g** closed fuzzy sets if
cl(int(A)) ≤ U whenever A ≤ U and U is g*- open fuzzy Theorem 3.11: If a fuzzy set A is both open and wg**-
set in (X,T). closed then it is both regular open and regular closed
fuzzy set.
Theorem 3.02: Every closed fuzzy set is weakly g** Proof: Omitted.
closed fuzzy set.
Proof: Omitted. Theorem 3.12: If a fuzzy set A of fts X is open and
The converse of the above theorem need not be true as wg**-closed then A is g*-closed.
seen from the following example. Proof: Omitted.
Example 3.03: Let X={a, b, c} and the fuzzy sets A and Theorem 3.13: If a fuzzy set A of fts X is open and wg-
B be defined as follows A={(a,0.4),(b,0.5),(c,0.7)}, closed then A is wg* closed.
B={(a,1),(b,0.9),(c,0.8)}. Let T= {0, 1, A}.Then (X, T) is
Proof: Suppose A is open and wg-closed. Let A ≤ U Example 3.20: Let X= {a,b,c}. Define the fuzzy sets A
where U is g-open. Since A is wg-closed we have and B as follows. A={(a,0.4),(b,0.5),(c,0.7)},
A ≤ A, A is open implies cl(int A) ≤ A ≤ U. That is cl(int B={(a,0),(b,0.1),(c,0.2)}. Then (X, T) is afts with the
A) ≤ U and hence A is wg*-closed. fuzzy topology T= {0, 1, A}. Here the fuzzy set B is
weakly g** open fuzzy set but not a open fuzzy set in X.
Theorem 3.14: If A is wg**-closed fuzzy set and cl(int
A) ∧ (1 cl(int A))=0 then cl(int A) ∧ (1-A) has no non Theorem 3.21: If afts every wg**-open fuzzy set is wg-
zero g-closed fuzzy set. open.
Proof: Suppose F is any g-closed fuzzy set such that F ≤ Proof: Omitted.
cl(int A) ∧ (1 A). Now F ≤ 1 A, which implies that A ≤ The converse of the above theorem need not be
1 F, 1 F is g-open. Since A is wg*-closed, cl(int A) ≤ 1 true as shown from the following example.
F, hich implies F ≤ 1 cl(int A).Thus F ≤ cl(int A) and
F ≤ 1 cl(int A).Therefore Example 3.22: In the example 3.20, Here the fuzzy set B
F ≤ cl(int A) ∧ (1-cl(int A)) = 0. Which implies that F = is weakly g closed fuzzy set but not a wg* closed fuzzy
0. Hence the result follows. set in X.
Theorem 3.15: If a fuzzy set A is weakly g** closed Theorem 3.23: If int (cl (A)) ≤ B ≤ A and if A is weakly
fuzzy set in X such that A ≤ B ≤ cl(int A), then B is also g** open fuzzy set, B is weakly g** open fuzzy set in
a weakly g** closed fuzzy set in X. afts X.
Proof: Let U be a g-open fuzzy set in X, such that Proof: e have int(cl (A)) ≤ B ≤ A .Then (1 A) ≤ (1
B ≤ U, then A ≤ U. Since A is weakly g* closed fuzzy B) ≤ cl(int(1 A)) and since (1 A) is weakly g** closed
set, then by definitions cl(int(A)) ≤ U. Now int B ≤ B ≤ fuzzy set and by theorem 2.19 .we have (1 B) is weakly
cl(int(A)),which implies cl(int(B)) ≤ cl(cl(int A) = cl(int g** closed fuzzy set in X. Hence B is weakly g** open
A) ≤ U. That is cl(int(B)) ≤ U. Hence B is a weakly g** fuzzy set is fts X.
closed fuzzy set.
Theorem 3.24: Every g*-open fuzzy set is wg**-open.
Theorem 3.16: Let A ≤ Y ≤ X and suppose that A is Proof: Omitted.
wg**- closed in fts X. Then A is wg**-closed relative to The converse of the above theorem need not be
Y. true as shown from the following example.
Proof: Given that A ≤ Y ≤ X and A is wg**- closed
fuzzy set .To prove that A is wg**-closed relative to Y. Example 3.25: In the example 3.20, the fuzzy set
Let A ≤ Y ∧ G. Then A ≤ G where G is g*-open in X 1 B is wg**-open but not g*-open in X.
Since A is wg** -closed in X. cl(int A) ≤ G. which
implies that cl(int A) ≤ Y ∧ cl(int A) and therefore cl(int Theorem 3.26: A Finite union of weakly g** closed
A) ≤ Y ∧ G. Hence A is wg**-closed relative to Y. fuzzy set is a weakly g** closed fuzzy set.
We introduce weakly g** open fuzzy set Proof: Omitted.
Definition 3.17: A fuzzy set A of the fts (X,T) is called Remark 3.27: The intersection of two wg**-open fuzzy
weakly g** open fuzzy set if its complement 1 A is sets need not be wg** -open.
weakly g** closed fuzzy set. Fuzzy wg*-closure (wg* cl) and fuzzy wg*-
interior (wg* int) of a fuzzy set are defined as follows.
Theorem 3.18: A fuzzy set A of a fts X is weakly g**
open fuzzy set iff F ≤ int(cl A) Definition 3.28: If A is any fuzzy set in afts, then
Whenever F is g*-closed fuzzy set and F ≤ A wg** cl(A)= ˄{U:U is wg**-closed fuzzy set and
Proof: Omitted. A ≤ U}
wg**int(A)= ˅{V:V is wg**-open fuzzy set and
Theorem 3.19: Every open fuzzy set is a weakly g** A ≥ V}
open fuzzy set.
Proof: Omitted. Theorem 3.29: Let A be any fuzzy set in a fts (X, T)
The converse of the above theorem need not be Then
true as seen from the following example. wg** cl(A)=wg**cl(1 A)=1 wg**cl(1 A)=1-
wg**int(A) and wg** int(1 A)=1 wg**cl(A)
Proof: Omitted.
Theorem 3.30: In a fts (X, T), a fuzzy set A is weakly Example 3.35: In the e ample 3.20, the fuzzy subset 1
g**-closed iff A= wg** -cl(A). B={(a,0.4),(b,0.4),(c,0.5)} is wg -open fuzzy set but not
Proof: Let A be a weakly g** -closed fuzzy set in fts (X, weakly g** open fuzzy set in X.
T).since A ≤ A and A is weakly g** -closed fuzzy set, A
∈ {f:f is weakly g** -closed fuzzy set and A ≤ f} and A ≤ Theorem 3.36: In afts X, every weakly g** open fuzzy
f implies that set is wg*-open fuzzy set.
A= ˄ {f:f is weakly g** -closed fuzzy set and A ≤ f} that Proof: Omitted.
is A = wg**-cl(A) The converse of the above theorem need not be
Conversely, Suppose that A= wg**-cl(A), that true as seen from the following example.
is A = ˄ { f:f is weakly g** -closed fuzzy set and A ≤ f}.
This implies that A ∈ {f:f is weakly Example 3.37: In the e ample 3.20, the fuzzy subset 1
g** -closed fuzzy set and A ≤ f}. Hence A is weakly B={(a,0.4),(b,0.4),(c,0.5)} is wg*-open fuzzy set but not
g**-closed fuzzy set. weakly g** open fuzzy set in X.
Theorem 3.31: In fts X be the following results hold for Theorem 3.38: If A ≤ B ≤ X where A is weakly g**
fuzzy weakly g**-closer open fuzzy relative to B and B is weakly g** open fuzzy
1) weakly g**-cl(0)=0 relative to X, Then A is weakly g** open fuzzy relative
2) weakly g**-cl(A) is weakly g**-closed fuzzy to fts X.
set in X Proof: Omitted.
3) weakly g**-cl(A) ≤ weakly g**-cl(B) if
A≤B Remarks 3.39: The following diagram shows the
4) weakly g**-cl(weakly g**-cl(A)) =. weakly relationships of weakly g** closed fuzzy sets with some
g**-cl(A) other fuzzy sets.
5) weakly g**-cl(A ˅ B) ≥ weakly g**-cl(A) ˅
weakly g**-cl(B)
6) weakly g**-cl(A ˄ B) ≤ weakly g**-cl(A) ˄
weakly g**-cl(B)
Proof: The easy verification is omitted.
Theorem 4.02: A function f: X→Y is fwg**-continuous Theorem 4.09: If f: X→Y is f wg**-continuous and g: Y
iff the inverse image of every closed fuzzy set in Y is → Z is f-continuous, then gof:X→ Z is fwg**-
wg**-closed fuzzy set in X. continuous.
Proof: Omitted. Proof: Omitted.
Theorem 4.03: Every f-continuous function is Remark 4.10: The following diagram shows the
fwg**-continuous. relationship of fwg**-continuous maps with some other
Proof: Omitted. fuzzy maps.
The converse of the above theorem need not be
true as seen from the following example.
Example 4.04: Let X=Y= {a,b,c} and the fuzzy sets A,B
and C be defined as follows. A={(a,0),(b,0.1),(c,0.2)},
B={(a,0.4),(b,0.5),(c,0.7)}, C={(a,1),(b,0.9),(c,0.8)}.
Consider T= {0, 1, B} and
σ = {0, 1, A}. Then (X, T) and (Y,σ) are fts. Define f:
X→Y by f (a) =a, f (b) =b and f(c) =c. Then f is
fwg**-continuous but not f-continuous as the fuzzy set C
is closed fuzzy set in Y and f-1(C) =C is not closed fuzzy
set in X but wg**-closed fuzzy set in X. Hence f is
Where represents A
fwg**-continuous
implies B but not conversely. (A and B are independent).
Theorem 4.05: Every fwg**-continuous function is fwg-
Theorem 4.11: Let X1 and X2 be fts and
continuous.
Pi: X1x X2→Xi (i=1, 2) be the projection mappings. If f:
Proof: Omitted.
X→X1 xX2 is fwg**-continuous then the Piof:X→Xi
The converse of the above theorem need not be
(i=1,2) is fwg**-continuous.
true as seen from the following example.
Proof: Omitted.
Example 4.06: Let X=Y= {a,b,c} and the fuzzy sets
Theorem 4.12: Every f -strongly continuous function is
A,B,C and D be defined as follows.
fwg**-continuous.
A={(a,0.2),(b,0.5),(c,0.3)},
Proof: Omitted.
B={(a,0.8),(b,0.5),(c,0.7)},
The converse of the above theorem need not be
C={(a,0.5),(b,0.2),(c,0.3)}and
true as seen from the following example.
D={(a,0.5),(b,0.8),(c,0.7)}. Consider T={0,1,A} and σ
={0,1,A,B}. Then (X, T) and (Y,σ) are fts. Define f:
Example 4.13:In the example 3.05, the function f is
X→Y by f (a) =b, f (b) =a and f(c) =c. Then f is fwg-
fwg**-continuous but not f -strongly continuous, for the
continuous but not fwg**-continuous as the inverse
fuzzy set C in Y, f-1(C) =C is not both open and closed
image of closed fuzzy set A in Y is f-1(A) =C which is
fuzzy set in X
not wg**-closed fuzzy set in X. Hence f is fwg-
continuous.
Theorem 4.14: Every f -perfectly continuous function is
fwg**-continuous.
Theorem 4.07: Every fwg**-continuous function is
Proof: Omitted.
fwg*- continuous.
The converse of the above theorem need not be
Proof: Omitted.
true as seen from the following example.
The converse of the above theorem need not be
true as seen from the following example.
Example 4.15: In the example 3.05, the function f is
fwg**-continuous but not f-perfectly continuous as the
Example 4.08: In the example 4.06, Then f is fwg*-
fuzzy set A is open in Y and f-1(A) = A is not both open
continuous but not fwg**-continuous as the inverse
and closed fuzzy set in X
image of closed fuzzy set A in Y is f-1(A) =C which is
not wg**-closed fuzzy set in X. Hence f is fwg*-
Theorem 4.16: Every f -completely continuous function
continuous
is fwg**-continuous.
Theorem 4.19: A function f: X→Y is fwg**-irresolute Definition 4.28: A function f: X→Y is said to be fuzzy
iff the inverse image of every wg**-open fuzzy set in Y wg**-closed (briefly fwg**-closed) if the image of every
is wg**-open fuzzy set in X. closed fuzzy set in X is wg**-closed fuzzy set in Y.
Proof: Omitted.
Theorem 4.29: Every f-open map is fwg**-open map.
Theorem 4.20: Every fwg**-irresolute function is Proof: Omitted.
fwg**-continuous. The converse of the above theorem need not be
Proof: Omitted. true as seen from the following example.
The converse of the above theorem need not be
true as seen from the following example. Example 4.30: Let X = Y = {a,b,c} and the fuzzy sets
A,B, and C be defined as follows.
Example 4.21: Let X = Y = {a,b,c} and the fuzzy sets A= {(a,0),(b,0.1),(c,0.2)} , B={(a,0.4),(b,0.5),(c,0.7)}
A,B,C,D and E be defined as follows. C= {(a,1),(b,0.9),(c,0.8)}. Consider
A= { (a,1),(b,0),(c,0)} , B = {(a,0),(b,1),(c,0)} T = {0,1,A}and σ = {0,1,B }. Then (X, T) and (Y,σ ) are
C= {(a,1),(b,1),(c,0)}, D = {(a,1),(b,0),(c,1)}, fts. Define f: X→Y by f(a)=a, f(b) = b and f(c) = c. Then
E = {(a, 0),(b,1),(c,1)}. Consider f is fwg**-open map but not f-open map as the fuzzy set
T = {0,1,A,B,C,D}and σ = {0,1,C }. Then (X, T) and A open fuzzy set in X, its image f(A) = A is not open
(Y,σ ) are fts. Define f: X→Y by f(a)=b, f(b) = c and f(c) fuzzy set in Y which is wg**-open fuzzy set in Y.
= a. Then f is fwg**-continuous but not fwg**-irresolute
as the fuzzy set in E is wg**-closed fuzzy set in Y, but f- Theorem 4.31: Every fwg**-open map is fwg-open.
1
(E) = C is not wg**-closed fuzzy set in X. Hence f is Proof: Omitted.
fwg**-continuous. The converse of the above theorem need not be
true as seen from the following example.
Theorem 4.22: If f: X→Y is fwg**-continuous, and g:
Y→Z is f-continuous then gof: X→Z is f wg**- Example 4.32: Let X = Y = {a,b,c} and the fuzzy sets
continuous. A,B, and C be defined as follows.
Proof: Omitted. A= {(a,0.2),(b,0.5),(c,0.3)},
B = {(a,0.8),(b,0.5),(c,0.7)},
Theorem 4.23: Let f: X→Y, g: Y→Z be two functions. C= {(a,0.5),(b,0.2),(c,0.3)}. Consider
If f and g are fwg**-irresolute functions then gof: X→Z T = {0,1,A}and σ = {0,1,A,B }. Then (X, T) and (Y,σ )
is fwg**-irresolute functions. are fts. Define f: X→Y by f(a)=b, f(b) = a and f(c) = c.
Proof: Omitted. Then the function f is fgs-open map but not fwg**-open
map as the image of open fuzzy set A in X is f(A) = C
Theorem 4.24: Let f: X→Y, g: Y→Z be two functions. open fuzzy set in Y but not wg**-open fuzzy set in Y .
If f is fwg**-irresolute and g is fwg**-continuous then
gof: X→Z is fwg**-continuous.
Proof: Omitted. Theorem 4.33: Every f-closed map is fwg**-closed map.
Proof: Omitted.
The converse of the above theorem need not be Theorem 4.42: Every f-homeomorphism is fwg**-
true as seen from the following example. homeomorphism.
Proof: Omitted.
Example 4.34: Let X = Y = {a,b,c} and the fuzzy sets The converse of the above theorem need not be
A,B, and C be defined as follows. true as seen from the following example.
A = {(a,0),(b,0.1),(c,0.2)},
B = {(a,0.4),(b,0.5),(c,0.7)}, Example 4.43: Let X=Y= {a,b,c} and the fuzzy sets A, B
C = {(a,1),(b,0.9),(c,0.8)}. Consider and C be defined as follows. A={(a,1),(b,0),(c,0)},
T = {0,1,A}and σ = {0,1,B }. Then (X, T) and (Y,σ ) are B={(a,1),(b,1),(c,0)}, C={(a,1),(b,0),(c,1)}. Consider T=
fts. Define f: X→Y by f(a)=a, f(b) = b and f(c) = c. Then {0,1,A} and σ={0,1,B}. Then (X, T) and (Y,σ) are fts.
f is fwg**-closed map but not f-closed map as the fuzzy Define
set C is closed fuzzy set in X, and its image f(C) = C is f: X→Y by f(a)=a, f(b)=c and f(c)=b. Then f is
wg**-closed fuzzy set in Y but not closed fuzzy set in Y. fwg**- homeomorphism but not f-homeomorphism as A
is open fuzzy set in X and its image of f(A)=A is not
Theorem 4.35: A map f:X→Y is fwg**-closed iff for open fuzzy set in Y. f-1:Y→X is not
each fuzzy set S of Y and for each open fuzzy set U such f-continuous.
that f-1(S) ≤ U, there is a wg**-open fuzzy set V of Y
such that S ≤ V and f-1(V) ≤ U. Theorem 4.44: Let f: X→Y be a bijective function. Then
Proof: Omitted. the following are equivalent:
a) f is fwg**- homeomorphism.
Theorem 4.36: If a map f: X→Y is fgc-irresolute and b) f is fwg**- continuous and fwg**- open maps.
fwg**- closed and A is wg**- closed fuzzy set of X, then c) f is fwg**- continuous and fwg**- closed maps.
f(A) is wg**- closed fuzzy set in Y. Proof: Omitted.
Proof: Omitted.
Definition 4.45: Let X and Y be two fts. A bijective map
Theorem 4.37: If f: X→Y is f-closed map and f: X→Y is called fuzzy fwg**- c-homeomorphism
h: Y→Z is fwg**- closed maps, then hof: X→Z is (briefly fwg**- c-homeomorphism) if f and f-1 are fuzzy
fwg**- closed map. wg**- irresolute.
Proof: Omitted.
Theorem 4.46: Let X, Y, Z be fuzzy topological spaces
Theorem 4.38: Let f: X→Y be an f -continuous, open and f: X→Y, g: Y→Z be fwg**- c-homeomorphisms
and fwg**- closed surjection. If X is regular fts then Y is then their composition gof: X→Z is fwg**- c-
regular. homeomorphism.
Proof: Omitted. Proof: Omitted.
Theorem 4.39: If f: X→Y and h: Y→Z be two maps Theorem 4.47: Every fwg**- c-homeomorphism is
such that hof: X→Z isfwg**- closed map. fwg**- homeomorphism.
i) If f is f-continuous and surjective, then h is Proof: Omitted.
fwg**- closed map.
ii) If h is fwg**- irresolute and injective, then f is REFERENCE
fwg**- closed map.
Proof: Omitted. [1] K. K. Azad, On fuzzy semi-continuity, fuzzy
almost continuity & fuzzy weakly continuity, J
Definition 4.40: Let X and Y be two fts. A bijective map Math Anal Appl 82, 14-32 (1981).
f: X→Y is called fuzzy-homeomorphism (briefly f- [2] G. Balasubramanian & P. sundaram, “On some
homeomorphism) if f and f-1 are fuzzy-continuous. generalization of fuzzy continuous function, fuzzy
We introduced the following. sets & system, 86, 93-100(1997) .
[3] A.S.Bin shahna, On fuzzy strong continuity &
Definition 4.41: A function f: X→Y is called fuzzy pre continuity, fuzzy sets &
fuzzywg**- homeomorphism (briefly wg**- system,44,(1991),303-308
homeomorphism) if f and f-1 are wg**- continuous. [4] C. L. Chang, Fuzzy topological spaces, J Math
Anal Appl 24,182-190 (1968).
Abstract: —In the present paper, we establish some coupled fixed point theorems for a mapping having mixed monotone property
satisfying a contractive condition in partially metric spaces. An example is given to show that our results are proper generalizations
of the existing ones.
(b) A sequence { } in partial metric space where :[0, [ is a continuous and non-
converges to a point if and only decreasing function such that it is positive in ,
if and ;
; if and only if (i) is continuous or
; (ii) has the following properties :
(c) A sequence { } in partial metric space (a) if a non-decreasing sequence
is called a cauchy sequence if there with then , for all
exists(and is finite) ;
(d) A partial metric space is said to be (b) if a non-increasing sequence
complete if every cauchy sequence { } in with then , for all
converges to a point that is
. (iii) Such that and
.
Lemma 2.5: [7], [9] Let be partial metric space; Then has a coupled fixed point .
(a) { } is Cauchy sequence in if and only Proof: Since (say);
if it is Cauchy sequence in the metric space (say).
; Letting and ;
(b) A partial metric space is complete if and
We denote ( )
only if the metric space is complete;
furthermore,
iff Similarly, ( )
. .
With this notation, we have,
Theorem 2.6: [2]Let be a partially ordered set ,
and let be a partial metric on such that is .
complete. Let be a non-decreasing map with Further for ; we get
respectto . Suppose that the following conditions hold ( ),
for , we have ( ).
We can easily verify that
( )
,
where [ [ is a continuous and non-
decreasing function such that it is positive in , .
and ; We have,
ii) such that , ( )
iii) is continuous in , or
iv) if a non-decreasing sequence converges to ( )
,then for all . and similarly,
Then has fixed point .Moreover ( )
.
( )
III. RESULTS AND DISCUSSION Therefore, by letting:
.
is a non - negative By condition and equation, we get
sequence and hence possess a limit . Taking limit .
when , we get, It follows that
,
and consequently . By our assumption on , Similarly
we conclude , ie. . .
, We now prove that , . We
. shall distinguish the cases (i), ii(a) and ii(b) of the
Theorem 3.1.
We shall show that { }, { } are Cauchy sequences in
Since is a complete metric space, there exist
and there exist . Suppose that at least one
such that , . We now
{ } or { } be not a cauchy sequence. Then there
show that if the assumption (i) holds, then is
exist and two subsequence of integers with
, such that coupled fixed point of .
As, we have
( ) ( )
Further, corresponding to , we can choose ( )
in such a way that it is smallest integer with
satisfying (7), we have and
( ) ( ) .
Using (7) and (8) and triangle inequality, we get ( ) .
( ) ( ) Therefore, is coupled fixed point of .Suppose
( ) ( ) ( ) now that the condition ii (a) and ii (b) of the theorem
( ) holds.
( ) ( ) ( ) The sequence , .
( )
( )
.
Letting and using (6), we have ( )
.
Letting , we have
Now, we get
( ) ( ) This implies that , similarly, we can
( ) ( ) show that . This completes the theorem.
( ) ( ( ))
Theorem 3.2: Let the hypotheses of Theorem 3.1 hold.
Similarly,
We obtain the uniqueness of the coupled fixed point of
( ) ( ) .
( ) ( ) Proof: Suppose and are coupled fixed
( ) ( ( )) points of , that is, ,
Using (10) and (11), we get and . We shall prove
that .
taking on both sides of By assumption there exist
equation (12) comparable with both of them.
. We define sequences , as follows
, , and
Which is a contraction. Therefore { } and . Since is comparable with ,
{ }areCauchy sequences. we may assume that
By lemma (2.5), { } and { }are Cauchy sequence in .
. Since is complete, hence is By using the mathematical induction, it is easy to prove
also complete, so there exist such that, that
( ) ( )
Similarly, we also have
( )
and RHS of
( )
Adding (14) and (15), we get Thus holds.
Case 3- If
. Then LHS of
This implies ( ) ( )
and RHS of
( )
That is, the sequence is decreasing. Therefore there Thus holds.
exist . Such that Case 4- If
Then LHS of
We shall show that . Suppose to contrary, that ( ) ( )
. Taking the limit as in equation (17), we
get ( )
and RHS of
a contradiction. Thus , that is, ( )
Thus holds.
It implies Case5- If
Then LHS of
Similarly we can show that ( ) ( )
( )
From (20) and (21), we have, , .
and RHS of
Example 3.3: Let [ endowed with the usual ( )
partial metric defined by [ with Thus holds.
. The partial metric space is Thus all the conditions of theorem 3.1 are satisfied.
complete because is complete for any , Therefore F has a coupled fixed point in X.
REFERENCES
Thus is Euclidean metric space which is
complete. 1. H. Aydi, “Some coupled fixed point results on
Consider the mapping defined by partial metric spaces”, lnternational Journal of
. Let us take [ [ Mathematical Sciences, Artical ID 647091,
such that 2011..
Clearly is continuous and has the mixed monotone 2. H. Aydi, “Some fixed point results in ordered
property. Also there are in such partial metric spaces”,
that and arXiv:1103.3680v1(math.GN), 2011.
.
Then it is obvious that is the coupled fixed point 3. T.G. Bhaskar and V. Lakshmikantham, “Fixed
of . point theorems in partially ordered metric spaces
Now, we have following possibilities for values of and applications”, Nonlinear Analysis: Theory,
and such that , . Methods and Apllications, 65(7), 1379-1393,
Case 1- If 2006.
Then clearly ( )
Thus holds. 4. L.Ciric and V. Lakshmikantham, “Coupled
Case 2- If random fixed point theorems for nonlinear
Then LHS of contractions in partially ordered metric spaces”,
Abstract:-In the present study we investigated the theoretical calculation of Superconducting state parameter (SSP) by doping of
MN on MgB2 superconductor for concentration (x=0.006, 0.007, 0.014, 0.016, 0.020). We use Ashcroft's pseudo potential in
conjunction Random phase approximation (RPA) dielectric screening function with methodology based on BCS- Elias berg
Mc.Millan framework in which material properties like electron-phonon coupling strength (λ) and Coulomb pseudo potential (µ*)
are obtained from the knowledge of electron-ion pseudo potential. The super-conducting state properties like transition
temperature (TC), isotope effect exponent (α) and interaction strength (N0V) are then obtained by using the values of λ, µ* and
<ω2> relevant to the superconductor .It is also observed that addition of Manganese to superconductor MgB2 causes the
parameters λ, µ*, α, N0V, TC decreases with increasing in Manganese concentration. Present calculation also observed that TC for
alloys Mg1-xMnxB2 is excellent agreement with the experimental results. It is observed that the increase in doping concentration of
MN causes all the superconducting parameters to decrease. This suggests decrease in superconducting behavior of MgB2 due to
effect of magnetic impurity MN.
Index Terms—Electron-phonon coupling strength, Isotope effect, Pseudo potential, Transition temperature
Abstract -By 2030, the world's population is projected to be 8.5 billion and increase to 9.7 billion by 2050 and 11.2 billion by 2100.
Half of humanity today lives in cities. Many cities are experiencing exponential growth as people move from rural areas in search of
better jobs and education. Consequently, cities' services and infrastructures are being stretched to their limits in terms of
scalability, environment, and security as they adapt to support this population growth. Visionaries and planners are thus seeking a
sustainable, post-carbon economy to improve energy efficiency and minimize carbon-emission levels. Along with cities' growth,
innovative solutions are crucial for improving productivity (increasing operational efficiencies) and reducing.
Educational facilities. More investment is needed 3.1 Essential components.The basic underpinnings of a
to improve educational opportunities for all, lifelong smart city include five components:
learning, education through remote learning, and smart
devices in classrooms;
transport, and ICT). An efficient and sustainable ICT 4.3 Networking. Networking technologies enable devices
infrastructure is essential for managing urban systems and people to have reliable communications with one
development. Adepetuet al.1 explained how an ICT model another. Several wireless networking technologies,
works and can be used in sustainable city planning. For a including radio frequency identification (RFID), ZigBee,
sustainable ICT infrastructure, they defined various green and Bluetooth, have been deployed, although they are
performance indicators for ICT resource use, application limited by the number of devices they can support, along
lifecycle, energy impact, and organizing impact. with their throughput and transmission range. New
wireless technologies (such as WiMAX and Long-Term
E-governance. This component focuses on a Evolution) are unsuitable due to their high energy
government's performance through the electronic medium consumption. Novel Wi-Fi technology (such as by the
to facilitate an efficient, speedy, transparent process for IEEE 802.11ah Task Group) could be an efficient solution
disseminating information to the public and also for for smart city services.
performing administration activities. An e-government
system consists of three components: government-to- 4.4 Cloud computing. Cloud computing enables network
citizen, government-to-business, and government-to- access to shared, configurable, reliable computing
government. E-government allows citizens to fulfill their resources. The cloud is considered a resource environment
civic and social responsibilities through a Web portal. A that is dynamically configured to bring together testbeds,
growing number of governments around the world are applets, and services in specific instances where people's
deploying Web 2.0 technologies, an architecture referred to social interaction would call for such services;
as "e-government 2.0," linking citizens, businesses, and 4.5 Service-oriented architectures (SOAs). AnSoA is a
government institutions in a seamless network of principle for software structuring based on service. A smart
resources, capabilities, and information exchange. city's development should focus on SOA-based design
architectures to address its challenges. A smart city thus
IV. FUNDAMENTAL TECHNOLOGIES. requires a new IT infrastructure, from both a technical and
an organizational perspective.
The design and implementation of smart cities also
involves a number of technologies: 4.6 Cybersecurity architectures. Smart cities pose
challenges to the security and privacy of citizens and
4.1 Ubiquitous computing.Ubiquitous devices include government alike. The security issues associated with the
heterogeneous ones that communicate directly through information produced in a smart city extend to
heterogeneous networks. To support a smart and relationships among those citizens, as well as their
ubiquitous environment, telecommunication personal safety. Some smart cities are already confronted
infrastructures, Lee said, should be enhanced to provide a by identity spoofing, data tampering, eavesdropping,
better understanding of networks, services, users, and malicious code, and lack of e-services availability. Other
users' devices with various access connections. Lee also related challenges include scalability, mobility,
identified six capabilities and functions of smart ubiquitous deployment, interoperability (of multiple technologies),
networks including context awareness, content awareness, legal, resources, and latency.
programmability, smart resource management, autonomic
network management, and ubiquity. V .CHALLENGES AND RESEARCH
OPPORTUNITIES
4.2 Big data. Traditional database management tools and
data processing applications cannot process such a huge Here, we highlight some of the challenges faced
amount of information. Data from multiple sources (such by smart cities while exploring research opportunities that
as email messages, video, and text) are distributed in need more attention to assist smart city development and
different systems. Copying all of it from each system to a adoption.
centralized location for processing is impractical for
performance reasons. In addition, the data is unstructured. 5.1 Challenges.
Deploying thousands of sensors and devices in a city poses The following are the most noteworthy challenges
significant challenges in managing, processing, and to be addressed. Lack of investment. The concept of smart
interpreting the big data they generate. Big data,reflecting cities reflects strong potential for investment and business
such properties as volume, variety, and velocity, is a broad opportunities. On the one hand, investment in related
term for complex quantitative data that requires advanced projects has grown in recent years, financed by both
tools and techniques for analyzing and extracting relevant governments (including municipalities and public research
information. Several challenges must be addressed, agencies) and private entities (companies and citizens).
including capture, storage, search, processing, analysis, Navigant Research says investment in smart cities is
and visualization. divided into smart government, smart building, smart
transport, and smart utilities. By 2020, $13 billion in Cyberattacks.As with any infrastructure, smart
funding is expected to establish smart cities all over the cities are prone to cyberattack, and the current attack
world . Yet according to a 2014 research report on surface for cities is wide open. In 2015 identified several
financing models for smart cities, Navigant Research said challenges, including vulnerabilities in the transfer of data,
this infrastructure faces major financial hurdles, including physical consequences for cyberattacks, collection and
the perceived high risk of investing in innovative solutions, storage of large amounts of data in the cloud, and
uncertainty of energy price policies, major investment exploitation of city data by attackers. Detecting behavioral
required, long-term delays before reaping profits, and anomalies in daily human life is very important for
limited capacity for public funding. developing smart systems.
Cost. Many cities are committing large budgets to 5.2 Research opportunities.
get smarter. In India, the national government's annual IoT management. The IoT needs an efficient,
budget for development of 100 smart citiesh is $1.27 secure architecture that enhances urban data harvesting. As
billion, adding 11.5 million homes annually. In the others have noted, ubiquitous and collaborative urban
European Union, smart city market projections are sensing integrated with smart objects can provide an
expected to exceed $1 trillion by the end of 2016. China's intelligent environment. Otherwise, packet latencies and
future smart cities allocations exceed $322 billion for more packet loss are inevitably not controllable. One such
than 600 cities nationwide. All these projects demonstrate proposal is the Mobile Ad hoc Networks (MANET)
how substantial is the rate of investment in smart cities. coordination protocol to opportunistically exploit MANET
However, if some of the challenges (such as cybersecurity) nodes as mobile relays for the fast collection of urgent data
are not addressed early, the ultimate cost of smart cities from wireless sensor networks without sacrificing battery
will only increase. lifetime. Simulation results show that their cluster
formation protocol is reliable and always delivers over
High energy consumption. The U.S. Energy 98% of packets in street and square scenarios. Other issues,
Information Administration estimates approximately 21% including the convergence of IoT and intelligent
of the world's electricity generation was from renewable transportation systems require further investigation.
energy in 2011, with a projected increase to nearly 25% by
2040. The absence of natural resources in the estimation of Data management. Data plays a key role in a
energy consumption for the rest of the 21st century plays a smart city. A huge quantity of data will be generated by
negative role in smart cities investments (see Figure 3). smart cities; understanding, handling, and treating it will be
The future of energy cost and access is uncertain due a challenge. However, mobile phone data can help achieve
primarily to their dependence on projected geopolitical, several smart city objectives. Smartphone data can be used
socioeconomic, and demographic scenarios. to develop a variety of urban applications. For example,
transportation analysis through mobile phone data can be
Smart citizens. Social dimensions must also be applied for estimating road traffic volume and transport
taken into consideration. A city's "smartness" greatly demands. Real-time information from mobile-phone data
depends on citizens' participation in smart city projects, about the origins of visitors combined with taxis' Global
through multiple communication tools (such as a Positioning System data could help manage transportation
municipality's Web portal, social networks, and resources, as in, say, the public's future demand for taxis.
smartphone applications). Smart cities need citizens to be
continuously connected—in public places, in public VANET security. In smart cities, efficient security
transportation, and at home—in order to share their support is an important requirement of VANETs. One
knowledge and experience. The objective is effective consideration is how to secure them by designing solutions
management of natural resources and a higher quality of that reduce the likelihood of network attacks or even how
life for citizens; for example, they can compare their to diminish the effect a successful attack could have on
household use of electricity, gas, and water through their them.Several security challenges persist in the realm of
smartphones. authentication and driver-behavior analysis. A smart city
needs lightweight, scalable authentication frameworks that
Privacy. Privacy will play a pivotal role in any protect drivers from internal and external attackers.
smart city strategy. Citizens interact with smart city
services through their smartphones and computers VI. CONCLUSION
connected through heterogeneous networks and systems. It
is thus imperative smart cities, founded on the use of ICT, The strong interest by municipal and local
be adept at handling important privacy issues (such as governments worldwide in smart cities stems from their
eavesdropping and confidentiality). ability to improve their citizens' quality of life. Here, we
described some of the basic concepts of smart cities,
identifying challenges and future research opportunities to 12. Lausch, A., Schmidt, A., and Tischendorf, L. Data
enable large-scale deployment of smart cities. Developers, mining and linked open data—New perspectives for
architects, and designers should now focus on aspects of data analysis in environmental research. Ecological
IoT management, data management, smart city assessment, Modelling 295, 10 (Jan. 2015), 5–17.
VANET security, and renewable technologies (such as 13. Lee, C., Gyu, M., and Woo, S. Standardization and
solar power). We underscore when designing smart cities, challenges of smart ubiquitous networks. IEEE
security and privacy remain considerable challenges that Communications Magazine 51, 10 (Oct. 2013), 102–
demand proactive solutions. 110.
14. Lee, J., Gong, M., and Mei-Chih Hu, H. Towards an
REFERENCES effective framework for building smart cities: Lessons
from Seoul and San Francisco. Technological
1. Adepetu, A., Arnautovic, E., Svetinovic, D., and de Forecasting and Social Change 89 (Nov. 2014), 80–99.
Weck, L. Complex urban systems ICT infrastructure 15. Ma, Y., Wu, H., Wang, L., Huang, B., Ranjan, R.,
modeling: A sustainable city case study. IEEE Zomaya, A., and Jie, W. Remote sensing big data
Transactions on Systems, Man, and Cybernetics: computing: Challenges and opportunities. Future
Systems 44, 3 (Mar. 2014), 363–374. Generation Computer Systems 51 (Oct. 2015), 47–60.
2. Akselrod, G., Argyropoulos, C., Hoang, T., Ciracì, C., 16. Martinez-Balleste, A., Perez-Martinez, P., and Solanas,
Fang, C., and Huang, J. Probing the mechanisms of A. The pursuit of citizens' privacy: A privacy-aware
large Purcell enhancement in plasmonicnanoantennas. smart city is possible. IEEE Communications Magazine
Nature Photonics 8 (2014), 835–840. 51, 6 (June 2013), 136–141.
3. Amaba, B. Industrial and business systems for smart 17. Mitchell, R. and Chen, I. Behavior-rule-based intrusion
cities. In Proceedings of the First International detection systems for safety-critical smart grid
Workshop on Emerging Multimedia Applications and applications. IEEE Transactions on Smart Grid 4, 3
Services for Smart Cities. ACM Press, New York, (Sept. 2013), 1254–1263.
2014, 21–22. 18. Perttunen, M., Riekki, J., Kostakos, V., and Ojala, T.
4. Angelidou, M. Smart cities: A conjuncture of four Spatio-temporal patterns link your digital identities.
forces. Cities 47 (Sept. 2015), 95–106. Computers, Environment and Urban Systems 47 (Sept.
5. Debnath, A., Chin, H., Haque, M., and Yue, B.A 2014), 58–67.
methodological framework for benchmarking smart 19. Pires, S., Fidélis, T., and Ramos, T. Measuring and
transport cities. Cities 37 (Apr. 2014), 47–56. comparing local sustainable development through
6. Desouza, K. and Flanery, T. Designing, planning, and common indicators: Constraints and achievements in
managing resilient cities: A conceptual framework. practice. Cities 39 (Aug. 2014), 1–9.
Cities 35 (Dec. 2013), 89–99. 20. Rifkin, J. The Zero Marginal Cost Society: The Internet
7. Domingo-Ferrer, J. A three-dimensional conceptual of Things, The Collaborative Commons, and The
framework for database privacy. Chapter in Secure Eclipse of Capitalism. St. Martin's Press, St. Martin's
Data Management, W. Jonker and M. Petkovic, Eds. Griffin, New York, 2015.
Springer, Berlin, Heidelberg, Germany, 2007, 193–202. 21. Sheldon, M., Van de Groep, J., Brown, A., Polman, A.,
8. Ferreira, D. AWARE: A Mobile Context and Atwater, H. Plasmoelectric potentials in metal
Instrumentation Middleware to Collaboratively nanostructures. Science 346, 828 (Nov. 2014), 828–
Understand Human Behavior. Ph.D. dissertation, 831.
Faculty of Technology, University of Oulu, Oulu,
Finland, 2013
9. Huang, L., Chen, X., Mühlenbernd, H., Zhang, H.,
Chen, S., Bai, B., Tan, Q., Jin, G., Cheah, K., Qiu, C.,
Li, J., Zentgraf, T., and Zhang, S. Three-dimensional
optical holography using a
plasmonicmetasurface.Nature Communications 4, 2808
(Nov. 2013).
10. Jagadish, H.V., Gehrke, J., Labrinidis, A.,
Papakonstantinou, Y., Patel, J., Ramakrishnan, R., and
Shahabi, C. Big data and its technical challenges.
Commun. ACM 57, 7 (July 2014), 86–94.
11. Khorov, E., Lyakhov, A., Krotov, A., and Guschin, A.
A survey on IEEE 802.11ah: An enabling networking
technology for smart cities. Computer Communications
58, 1 (Mar. 2015), 53–69.
Abstract -We face many security breaching issues for our desktop applications and online services. Many internet applications
commonly use text based passwords for authentication. Text based passwords are prone to many attacks such as online guessing
attacks , relay attacks ,shoulder surfing and are usually hard to remember. Graphical password proves to be a much better
alternative to overcome these attacks. This paper introduces the use of Captcha as Graphical Password- CaRP to enhance the
security at the time of login. CaRP is the combination of both graphical password and captcha technology. This system allows the
user to select different visual login schemes. CaRP is one of the reasonable solutions that provide added security.
Keywords:---Captcha, CaRP , hotspot, dictionary attack, Graphical password password guessing attack, security primitive.
I. INTRODUCTION
Step 4: While creating CaRP challenge image synchronize point in particular alphabet that has a stable relative
of each alphabet is recorded. When user click on alphabets position in different fonts. User has to provide arrangement
these provided co-ordinates is send to the server. Server of such uniform points by choosing particular alphabet at
then gets letters from co-ordinates. String from these letters time of registration. When user wants to login then he will
is formed and matched with authentic string of password. get CaRP challenge image consist of registered alphabet.
Step 5: If username and password matched then user will User has to trace and click approximate positions in
redirect to next page else user will redirect to login page alphabet which he used at time of registration. Following
again are steps for Text Points:
Step 1: At time of registration user select alphabet and
select string of uniform points as a password shown in
Figure. 4 (in red color). Authentication server stores user
details along with password hash value containing alphabet
and respective uniform point co-ordinates as original
details.
Step 2: When user try to login then he has to give
username along with he has to copy uniform points which
is password sequence shown in Figure. 4
Step3: Authentication server matches these point sequence
with original credentials. If these point string is as expected
then user will be authenticated else user will switch to
login page again. Figure. 4 Text Points CaRP challenge
image. Here following are some precautions to be taken
while performing image processing and generation of
CaRP challenge image. x While generating this CaRP
challenge image, clickable points are kept independent and
care is taken that they should not overlay. The resistance
region should not be overlay. At time of authentication
user clicks represents grid-cells. If clicks are within
resistance then it is true. This grid-cell sequence
Figure 2: Flow chart of CaRPauthentication[2] accomplish by user clicks is matched with genuine
password i.e. genuine grid-cell sequence given at time of
registration.
III. IMPLEMENTATION
1.Home Screen
The home screen comprises of Registration form
for new user and login window for registered user. And
selection procedure of different schemes.
5. Click Animal
In click animal, user needs to select an animal from the
grid of animals. And then user need to select invariant
points on that particular image ,and image and points of
that particular username will be stored in database.
2. Registration Form
A new user needs to fill a simple registration form
in order to access the system. The registration form
comprises of simple fields that need to be filled by the user
and then click on signup button.
phase and need to specify the correct answer that he/she [3] Click and session based - Captcha as Graphical
provided at the registration time. Then account will be Password Authentication Scheme for smart phone and
recovered. web, 2015 International Conference on Information
Processing (ICIP) Dec 16-19, 2015.
8. Password Recovery using Mobile Number [6]Design and Implementation of Password-based Identity
The authorized user need to provide their mobile number Authentication System-2010 International Conference
,then recovery code will be provided on their mobile on Computer Application and System Modeling
number to unlock the account. (ICCASM 2010).
REFERENCES
Abstract -Weather Forecasting is a scientific estimation of fore-casting the weather. Weather is observing the state of atmosphere at
the given period of time. To predict the weather is one of the most challenging task to all the researchers and scientist. Parame-ters
that are considered for predicting weather are temperature, rainfall, humidity and wind. The weather android app shows the
weather conditions of the surrounding. The app is designed to be simple and intuitive as possible. This app will use the
OpenWeatherMap as a data channel and the weather updates will be tiny so that you would not use up any significant internet
bandwidth. The app will support geo-positioning to retrieve the weather conditions for your current location. Manual location input
will also be supported. The app will include a weather map to show rain, wind speed and temperature and detailed 5 day forecast
graphs. The app will have intuitive, seamless user interface and simple design.
utilized for prediction, forecasting of the weather data based paper presents an overview of using the various
on techniques such as data mining, time series analysis, computational intelligence tools in weather forecasting,
neural networks. In this paper a brief review of the works describing the main contributions on this field and providing
carried out in this area in the recent past are presented. The taxonomy of the existing proposals according to the type of
main drawbacks of the system are require more data and tools used. the drawback of this system are accurate weather
computer time for training and there are no structured prediction is a difficult task due to dynamic change of
methods to identify what network structure can best atmosphere, It is susceptible for predict weather in large
approximate the function. areas at a time.
B. A machine-learning approach for climate prediction E. Security SLA based Monitoring in Clouds
using network measures Nowadays, Cloud providers revise the terms of their Service
We present the toolbox ClimateLearn to tackle problems in Level Agreements (SLAs) to include security provisions due
climate prediction using machine learning techniques and to their criticality for their customers. In order to speed up
climate network analysis. The package allows basic their adoption by service providers and consumers and to
operations of data mining, i.e. reading, merging, and make them more actionable, security SLAs monitoring
cleaning data, and running machine learning algorithms should be described in a machine-processable, agile and
such as multilayer artificial neural networks and symbolic extensible way. Several tools for SLA management are
regression with ge-netic programming. Because spatial- available on the market but most deal with performance
temporal information on climate variability 5 can be metrics and do not refer to security properties. There are
efficiently represented by complex network measures, such other tools for monitoring cloud security, in a non-SLA
data are considered here as input to the machine-learning way. However, they are not associated with SLA
algorithms. As an example, the toolbox is applied to the management systems. We propose an extension to an SLA
prediction of the occurrence and the development language (i.e., rSLA) to enable the description of security
of El Nino in the equatorial Pacific, first concentrating on requirements in an SLA document. We also extend the
the occurrence of El Nino events one year ahead and second rSLA framework by a security methodology that makes use
on the evolution of sea surface temperature anomalies with a of known tools and that enables continuously checking that
lead time of three months. The drawbacks of this system are the security requirements are respected during runtime
can generate large trees that require pruning,Harder to according to the SLA document.
classify is greater than 2 classes and Can be affected by
noise. F. A survey on weather forecasting to predict rainfall
using big data analytic
C. A Review of Weather Forecasting Using Data Mining Big data is defined as a large amount of data which requires
Techniques new technologies to make possible to extract value from it
The vast dramatically changes occurs day by day in certain by capturing and analysis process.0T Analytics often
fields due to the development of advanced technology and involves studying past historical data to research potential
nature one such among them is rainfall. The rainfall is the trends. Weather prediction has been one of the most in-
fragment of the agriculture and unable to understand the teresting and fascinating domain and it plays a significant
monsoon condition, predicating the crop yield and the soil role in meteorology. Weather prediction is to estimate of
fertility. Data mining is the techniques used to extract the future weather conditions. Weather condition is the state of
knowledge from the set of data.This paper provides a survey atmosphere at a given time in terms of weather variables
of different data mining techniques being used in weather like rainfall, thunderstorm, cloud conditions, temperature,
prediction or forecasting which helps the farmer for yield pressure, wind direction etc.Predicting the weather is
worthy productive and nourish the soil fertility such as essential to help preparing for the best and the worst of the
artificial feed-forward neural networks (ANNs), fuzzy climate. This paper presents the review of big data analytics
inference system, decision tree method, time series analysis, for Weather Prediction and studies the benefit of using it.
learning vector Quantization (LVQ) and biclustering The drawback of this system are it cannot predict the
technique. The drawback of this system is no guarantee for weather short term efficiently, they used only small limited
finding optimal solutions in a finite amount of time. areas for weather forecasting.
IV. ANALYSIS the app properly. The mobile user will get the permission to
use the feature of the app.
The android users can easily install the WeaKits Weather
App to get the weather information like rain, temperature 2). User- The user will use this app to show all weather
humidity, pressure etc. of their area. The app will ask the parameters information from the OpenWeatherMap server.
user to enter the location manually if the location is not The user simply search the city or detect his location to see
fetched automatically. The user will get all the required the weather detail’s.
information mentioned above with a simple user interface.
The data will also be available in the graphical form for V. PROPOSED SYSTEM
better analysis.
Thousands of apps are released everyday, stable as well as
A. Roles of User in the System: with bugs. This weather app has features and new
1). Admin- The mobile user should have the permission to implementations as follows:
install the application and working internet allowance to use
VI. CONCLUSION
VII. ACKNOWLEDGMENT
REFERENCES
Abstract -An enormous growth of the WWW has been instrumental in spreading social networks. Due to many-fold increase in
internet users taking to online reviews and opinions, the communication, sharing and collaboration through social networks have
gained importance. The rapid growth in web-based activities has led to generation of huge amount of unstructured data which
accounts for over 80% of the information. Exploiting big data alternatives in storing, processing, archiving and analyzing this data
becomes increasingly necessary. Unstructured data refers to information that either does not have predefined data model or is not
organized in a predefined manner. Unstructured data is being constantly generated via call center logs, emails, documents on the
web, blogs, tweets, customer comments, customer reviews and so on. While the amount of data is increasing rapidly, the ability to
summarize, understand and make sense of such data for making better decision remain challenging. So thus there is a need of
sentiment analysis on unstructured data. In this paper we are describing what is sentiment analysis and methodology of analyzing
on unstructured data .We have done analysis on various data sets from twitter , blogs and movielen.com site using r statistical
language and output are visualized in the form of word cloud and histogram.We have created GUI’s for analysis of this datasets by
which users can easily analyze the data.
1. Sentiment Analysis and Feedback the misunderstanding by conveying the internal state
EvaluationFeedback Evaluation is a necessary part of of the users. They divide the framework into two
any institute to maintain and monitor the academic modules, namely Training Module and Emotion
quality of thesystem. Traditionally, a questionnaire Extraction Module. They utilize the concept of
based system is used to evaluate the performance of Exploratory Data Warehouse (DW) technology to train
teachers of an institute. Here, they propose an system. Therefore, DW relies not only on internal data
automatic evaluation system based on sentiment but also on external (Web) data. The DW is used by
analysis, which shall be more versatile and meaningful the Emotion Extraction Module to detect the emotion
than existing system. In their proposed system, of a given text.
feedback is collected in the form of running text and
sentiment analysis is performed to identify important III. METHODOLOGY
aspects along with the orientations using supervised
and unsupervised machine learningAbove paper is We have extracted data from three different
analyzing the feedback and according a teacher graded sources i.e.twitter, blogs,movielenwebsite.So first dataset
in school. is twitter.
2. Sentiment Analysis of Movie Reviews and Blog Posts 1. Twitter Data Set: Flowchart of analyzing tweets
This paper presents their experimental work on of Twitter:
performance evaluation of the SentiWordNet approach
for document-level sentiment classification of Movie
reviews and Blog posts. They have implemented
SentiWordNet approach with different variations of
linguistic features,scoring schemes and aggregation
thresholds. They have used two pre-existing large
datasets of Movie Reviews and two Blog post
datasets on revolutionary changes in Libya
andTunisia. We have computed sentiment polarity and
also its strength for both movie reviews and blog
posts. The paper also presents an evaluative account of
performance of the SentiWordNet approach with two
popular machine learning approaches: Naïve Bayes
and SVM for sentiment classification.
4: Analyze Tweets
Calculate the score of positive ,negative and neutral 4.Analyze Tweets
sentiment To analyze tweets function is used
analysis<score.sentiment(tweets_txt,pos.words,neg.words)
5: Output
In any desirable format like histogram, pie diagram, 5.Output
word cloud format, frequency distribution, mean ,median To display the results:
etc. hist(analysis$score)
consumer_key<-‘xyz’
consumer_secret<-'abc’
access_token<-‘asd’
access_secret<-‘fdg’
setup_twitter_oauth (consumer_key,
consumer_secret,access_token,access_secret)the consumer
key ,consumer secret ,access token ,access secret are
private account keys.
IV. RESULTS
Word cloud is created by : 1.Twitter Dataset:
wordcloud(jeopCorpus, min.freq = 1, The output for twitter analysis is
max.words=200,random.order=FALSE, rot.per=0.35,
colors=brewer.pal(8, "Dark2"))
3.Movie Dataset
1.Extract data
Extract the data from movielen.com website in
.csvformat.The dataset contains three .csv files i.e. Figure 5: Histogam
movies.csv which contains name and the respective genres
of movie. Above is the output for the code in which the
tweets are scored and according to that histogram is drawn.
2.Connect to Database
Connection to sqlite database. 2.Blogs Dataset
The outputs for blog analysis are:
3.Analysis
Analysis is done according to the classification of
genres of movies or according to year in which this
releases,etc.
4.Output
Output is visualized in the form of wordcloud and
histogram.Commands require by this analysis is same as
blog analysis.Also the GUI is prepared for twitter, blog and
movie analysis through which user can easily analyze the
data for their use.This is created in R using the package
called “shiny”.Inshiny,two files need to be created ui.r and
server.r. Both files are connected ui file shows the display
and server file computes the analysis.
3.Movielen Dataset
The outputs for movie dataset analysis are:
VI CONCLUSION
In this era of huge burst of data, it is essential to
make use of that data in efficient manner. This can be
done by analyzing the data coming from different sources,
so as to take good decisions in different feilds. In this paper
,we have discussed about what is sentiment ,what is
unstructured data and the methodologies of analysis on
unstructured data using R language.We have data from
three different sources i.e twitter ,blogs, movie dataset. We
have created the GUI’s where this datasets can be
analyzed and the desired outputs can be seen. This will
help the users to use the big data in efficient manner.
REFERENCES
Abstract - Clipboard is a software facility used for short-term data storage and/or data transfer between documents or applications,
via Copy and Paste operations. The standard built in clipboard of android operating system store only one item at a time so that it
provide speedy access to such content normally android clipboard has disadvantages firstly it store only one item at a time and
secondly when you turn off system it clears memory. My goal is to eradicate the problems of standard clipboard of Android OS to
developed such App that it contains buffer which is located on System Memory and it is permanent storage need not worry about
loss of data. Whatever user copy data that copied is maintained or stored in their respective buffer. When I am going to perform
paste operation it will populate all respective copied buffer data you have to just select the desired data that you want to paste it
save user time and increase the efficiency.
I. INTRODUCTION
In the Introduction five operating systems were Fig. 3. Worldwide Smartphone market share forecast for
mentioned-Google Android, Windows Phone, Apple iOS, 2015 based on data from IDC [17].
BlackBerry, and Nokia Symbian. Surveys using the latest
statistics predict that Apple iOS will remain the second The term "cut and paste" comes from the
biggest platform worldwide, after Google Android (Figure traditional practice in manuscript-editing’s whereby people
2 and 3 shows this data until 2015, when Windows Phone would literally cut paragraphs from a page with scissors
will surpass it [17]. and physically paste them onto another page. This practice
remained standard into the 1980s. [1].
In January 2013, the number of Google Android
apps overtook those of Apple iOS-800,000 apps arenow The act of copying/transferring text from one part
available on Google Play. In October 2012, Google of a computer-based document ("buffer") to a different
announced that the total number of apps in its store location within the same or different computer-based
numbered 700,000. According to a recent press release, document was a part of the earliest on-line computer
775,000 apps are available in Apple’s editors. As soon as computer data entry moved from
App Store. Currently, the Windows Phone Store offers punch-cards to online files (inthe mid/late 1960s) there
150,000 apps [17]. were "commands" for accomplishing this operation. This
mechanism was often used to transfer frequently-used
commands or text snippets from additional buffers into the IV. IMPLEMENTATION
document, as was the case with the QED editor [1].
Often this was done by the provision of a 'move' command, A. Main Window
but some text editors required that the text be first put into This is the main window of my project from
some temporary location for later retrieval/placement. In which you can access all functionality of my project like
1983, the Apple Lisa became the first text editing system home, view logs, copy logs, Settings, Refresh, Exit, view
to call that temporary location "the clipboard" [1]. different buffers etc.
V. CONCLUSION
REFERENCES
29.aspx#_win32_Cut_and_Copy_Operations [Accessed
on dated 11 jul. 2014], at hrs 12:20.
[12] Mark Apperley, Dale Fletcher, Bill Rogers, “Breaking
the Copy/Paste Cycle: The Stretchable Selection Tool”,
Computer Science Department, Waikato University
Hamilton, New Zealand, pp. 1, 2.
[13] K.T.Stolee, S. Elbaum, and G. Rothermel, "Revealing
the Copy and Paste Habits of End Users", Symposium
on Visual Languages and Human-Centric Computing
(VL/HCC) IEEE 2009, pp. 1.
[14] Shaobo Li, ShulinLv, XiaohuiJia, Zhisheng Shao,
“Application of Clipboard Monitoring Technology in
Graphic and Document Information Security Protection
System”, Key Laboratory of Advanced Manufacturing
Technology, Guizhou University Guiyang, 550003,
China.
[15] http://msdn.microsoft.com/en-
us/library/windows/desktop/ms649014%28v=vs.85%
29.aspx [Accessed on dated 11 jul. 2014], at hrs. 12:45.
[16]
http://en.wikipedia.org/wiki/Clipboard_%28computing
%29
[17] http://mhealth.jmir.org/2013/2/e24/
The category topics are usually determined by the The remainder of this survey is organized as
naive category information from recommended systems in follows. The section III demonstrates the literature survey of
Topic Model Method(TM). From the predetermined various Travel based applications using social media with
categories, itis convenient to calculate user preferences. Big Data with the methodologies used and its disadvantages,
Unfortunately, for rich photo sharing networks likeFlickr, and the procedures to overcome the limitations. Section IV
there is no such defined category information. Thus the demonstrates the future enhancement of the paper. Lastly
naive topic-based recommendation approach cannot be we draw a conclusion in section V.
utilized directly in travel recommendations.The problems
are Static Travel Plans,Not supports personalized POI
Recommendations, Category Information is undefined
,Static Datasets for POI[2].
III LITERATURE SURVEY understood. The other one is to deeply mine the user travel
process. Here they focus on sentimental attributes of
1.Graph-based point-of-interest recommendation with location and propose a POI (Point-Of-Interest) Mining
geographical and temporal influences 2014: method[4]. Firstly, we use SPM (Sentiment-based POI
User check-in data availability are available in Mining) algorithm to mine the POIs (Points-Of-Interest)
large Volume from location based social networks . Point- with obvious sentimental attributes, and then recommend
of-interest(POI) recommendation is one of such services, the POIs to users by using SPR (Sentiment-based POI
which is to recommend POIs that users have not visited Recommendation) algorithm. We conduct a series of
before. [1]It has been observed that: (i) user will visit near- experiments in SinaWeibodatasets .[15]
by places (ii) users tend tovisit different places indifferent
timeslots,and in thesame times lot,users tend to periodically 5.Landmark summarization with diverse viewpoints 2015
visit thesame place. Collaborative filtering has been widely This paper tells us about the land mark retrieval
used for recommendation system.Thus point of interest is which gives comprehensive description about the landmark
used via graph based process is used to retrieve the users of users. So the approach for giving a accurate collection of
interest landmark image. [5]Then grouping of images and retrieving
it in diverse point with the help of the text
2.Trip mining and recommendation from geo- tagged 2012 DescriptionSecond, wemodel the relative viewpoint of each
Trip planning is very hard task were there are many image within the VA based on the spatial layout of
criteria that need to be satisfied before planning the trip.[2In distinctive descriptors of a landmark. Third, we express the
this paper geo tagged photo which are in the social media relative viewpoint of an image with a 4-D viewpoint vector,
are retrieved and depending upon the user text file the including horizontal, vertical, scale, and rotation.At last
comparison is made and finally the recommendation for concluding on landmark inpoints of view point.[13]
thru the trip is given.substantial number of travel paths
are minded from the crawled geo-tagged photos. After that, 6.Using multi-criteria decision making for personalized
a search system is built to index and search the paths, and point of interest recommendation 2014
the Sparse Chamfer Distance is proposed to measure the Location-based business review (LBBR) sites (e.g.,
similarity of two paths. [10]The search system supports Yelp) provide us a possibility to recommend new points of
various types of queries, including (1) a destination name, interest (POIs) for users. To this end, we propose a new
(2) a user-specified region on themap, (3) some user- personalized POI recommendation framework using Multi-
preferred locations. Based on the search system, users can Criteria Decision Making (MCDM). [6]Firstly, preference
interact with the system by specifying a region or several models are built for the user’s geographical, category, and
interest points on the map to find paths. attribute preferences. Then, an MCDM-based
recommendation framework is designed to iteratively
3.POI recommendation through cross region collaborative combine the user’s preferences on the three criteria and
filtering 2016 select the top-N POIs as a recommendation list.
Point of interest that can be recommended Experimental results show that our framework not only
according to users current location and past check- in. Here outperforms the state-of- theart POI recommendation
the issue is users POI cannot be predicted if she checks- in techniques, but alsoprovides a better trade-off mechanism
to new places which they have not visited previously..Thus for MCDMthan the weighted sum approach[9].
the collaborative filtering to detect the places that is nearest
to visit according to their check in details [3]. To address 7. Image location estimation by salientregion matching
this issue, we distinguish the user preferences on the content 2015
of POIs from the user preferences on the POIs themselves. In this paper the image that we take and the image
The former is long term and is independent of where POIs locations are widely used in many application scenario for
are located, and the latter is short term and is constrained by geo-tagged images. [7]So the images which are already geo
the proximity of the location of the POI and the user’s tagged we estimate their locations then we use spatial
current location. This distinction motivates a location- informationwords to improve image location estimation. To
independent modeling of user’s content preferences of POIs, improve the retrieval performance, spatial constraint is
and a location-aware modeling of user’s location utilized to code the relative position of visual words[10]. We
preferences of POIs.[11] proposed to generate a position descriptor for each visual
word and build fast indexing structure for visual word
4.Schedule a rich sentimental travel via sentimental POI groups.
miningand recommendation 2016
Mining the point of interest which can be used to
maintain two things. The one is users interest can be deeply
8.Generating location overviews with images and tags by [4] P. Lou, G. Zhao, X. Qian, H. Wang, and X. Hou,
mining user-generated travelogues 2009 “Schedule a rich sentimental travel via sentimental POI
Automatically generating location overviews in the mining and recommendation,” in Proc. 20th ACM Int.
form of both visual and textual descriptions is highly desired Conf. Multimedia Big Data, 2016, pp. 33–
for online services such as travel planning, to provide
attractive and comprehensive outlines of travel [5]X.Qian,Y.Xue,X.Yang,Y.Y.Tang,X.Hou,andT.
destinations[8]. Actually, user-generatedcontent (e.g., Mei,“Landmark summarization with diverse
travelogues) on the Web provides abundant information to viewpoints,” IEEE Trans. Circuits Syst.
various aspects (e.g., landmarks, styles, activities) of most VideoTechnol.,vol.25,no.11,pp.1857– 1869,Nov.2015.
locations in the world. To leverage the experience shared by
Web users, in this paper we propose a location overview [6] Y. Lyu, C.-Y. Chow, R. Wang, and V. C. Lee, “Using
generation approach, which first mines location- multi-criteria decision making for personalized point-of-
representative tags from travelogues and then uses such tags interest recommendations,” in Proc. 22nd ACM
to retrieve web images[15]. The learnt tags and retrieved SIGSPATIAL Int. Conf. Adv. Geographic Inf. Syst.,
images are finally presented via a novel user interface which 2014, pp. 461–464.
provides an informative overview for a given location.
Experimental results based on 23,756 travelogues and [7] X. Qian, Y. Zhao, and J. Han, “Image location
evaluation over 20 locations show promising results on both estimation by salient region matching,” IEEE Trans.
travelogue mining an location overview generation. Image Process., vol. 24, no. 11, pp. 4348–4358, Nov.
2015.
IV FUTURE ENCHANCEMENT
[8] Q. Hao, R. Cai, X. Wang, J. Yang, Y. Pang, and L.
Here we enhance the survey by developing a Zhang, “Generating location overviews with images and
dynamic travel plan with images that develops aa feature tags by mining user-generated travelogues,” in Proc.
were the travel plans can be made dynamically provided the 17th ACM Int. Conf. Multimedia, 2009, pp. 801–804.
process is been submitting the social media images applying
geo-tagging on it . The other enhancement is to make [9] . Liu, T. Mei, J. Luo, H. Li, and S. Li, “Finding perfect
dataset more dynamic and that can be analysed very easily rendezvous on the go: Accurate mobile visual
which helps to make big predications and decisions. localization anditsapplications
torouting,”inProc.20thACMInt.Conf.
V CONCLUSION Multimedia,2012,pp.9–18
As compared with various we can develop [10] J. Li, X. Qian, Y. Y. Tang, L. Yang, and T. Mei, “GPS
application of travel based that can retrieve geo- tagging estimation for places of interest from social users’
from social media.Thus the personalized travel plans are uploaded photos,” IEEE Trans. Multimedia, vol. 15, no.
generated for the user based on POI travel recommendations 8, pp. 2058–2071, Dec. 2013
of the user using personalized travel sequence .
Recommendation on Multi-Source Big Social Media. [11] S. Jiang, X. Qian, J. Shen, Y. Fu, and T. Mei, “Author
topic model based collaborative filtering for personalized
REFERENCES POI recommendation,”IEEETrans.Multimedia,vol.17,n
o.6,pp.907–918,Jun.2015.
[1]Yuan, G. Cong, and A. Sun, “Graph-based point- of-
interest recommendation with geographical and temporal [12] J. Sang, T. Mei, T. J. Sun, S. Li, and C. Xu,
influences,” in Proc. 23rd ACM Int. Conf. “Probabilistic sequential POIs recommendation via
Inform.Knowl.Manage., 2014, pp. 659–668 check-in data,” in Proc. ACM SIGSPATIAL Int. Conf.
Adv. Geographic Inform. Syst., 2012, pp. 402–
[2] H. Yin, C. Wang, N. Yu, and L. Zhang, “Trip mining 405individual location history,” ACM Trans. Web, vol.
and recommendation from geo-tagged photos,” in Proc. 5, no. 1, p. 5, 2011.
IEEE Int. Conf. Multimedia Expo Workshops, 2012, pp.
540–545.. [14] H. Gao, J. Tang, X. Hu, and H. Liu, “Content- aware
point of interest recommendation on location- based
[3] .Zhang and K. Wang, “POI recommendation through social networks,” in Proc. 29th Int. Conf. AAAI, 2015,
crossregion collaborative filtering,” Knowl. Inform. pp. 1721–1727.
Syst., vol. 46, no. 2, pp. 369–387, 2016.
[15] Gao, J. Tang, R. Hong, Q. Dai, T. Chua, and R. Jain,
Abstract— Atanasov (1986) acquaint with the concept of Intuitionistic Fuzzy Set (IFS), as an overview of fuzzy sets, which proved
to be more useful in seizing indefinite, incomplete, or ambiguous information, including a degree of hesitation in various fields of
study. Using the notion of Sharma and Mittal (1975) entropy, Intuitionistic fuzzy entropy of order and degree is proposed. This
measure is a generalized version of the ambiguity of the order and degree and extension of intuitionistic fuzzy entropy defined
by Vlachos and Sergiadis (2007). This paper clearly demonstrates the validity of the measure as intuitionistic fuzzy entropy.
( )
With equality holding only for .Therefore equation
( )) ( ( )) (3) holds only if ( ) ( )
( ) ( )] Hence Property (P2) is proved for ( ).
( ) P3 : As AC = { ( ) ( ) } then from
( )
∑ [( ( )) definition of Entropy function given in equation(1) , we get
( ) ( )] ( ) ( )
( ) P4 : Monotonic Behaviour of proposed Measure
= ( ) ( ) Here we have to prove our entropy function is
( ) monotonically increasing monotonically decreasing with
Next assume that ( ) i.e. respect to ( )and ( ) respectively
For convenience, let ( ) and ( ) then it is
∑ [( ( ) ( )) ( ( )
( ) sufficient to prove that the entropy function:
( ) ( )
( )) ( )] = 1 ( ) [(
( )
or ∑ [( ( ) ( )) ( ( ) )( ) ( ) ( )
]
( )
( )) ( ) ( )] where [ ] is an increasing function with respect to
( ) x and decreasing with respect to y .
Taking partial derivatives of f with respect to x and y
respectively ,we get
( ) ( )
( )( ( ))( ) ( ) ( )
( )
[ ( ) ( )
]
( )( )
( ) ( )
( )( ( ))( ) ( ) ( )
( )
[ ( ) ( )
]
( )( )
For the extreme point of f, we have = 0 and and respect to x, when x such that [ ] and
get Then from the monotonicity of the function ( ), we can
Also i.e. ( )is increasing with respect to x, when have
i.e. ( ) is decreasing with respect to ( ) ( )
x , when x such that [ ] and Hence ( ) is a valid measure of Intuitionistic fuzzy
Similarly i.e. ( ) is increasing with respect to x, entropy of order and degree :
Corollary : For any set A ( )and AC the complement Particular and Limiting Cases
of intuitionistic fuzzy set A , (1) When ,then measure (3.1) reduces to measure
( ) ( ) ( ) ( ) given by Verma and Sharma (2014b).
( ) attains the maximum value when the set is most (2) It may be noticed that if an intuitionistic fuzzy set is
an ordinary fuzzy set, i.e. , ( )
intuitionistic fuzzy set and minimum value when the set is
( ) , then the intuitionistic fuzzy entropy of
crisp set. Moreover, maximum and minimum values are
independent of . order reduces to fuzzy Entropy of order given
by Sharma and Mittal (1975).
It has already been proved that ( ) is maximum if and
only if A is most Intuitionistic fuzzy set, i.e. ( ) IV. CONCLUSIONS
( ) and minimum when A is crisp set . So Entropy measure plays a pivotal role in decision making
,it is sufficient to prove that maximum and minimum values process. The entropy of Intuitionistic Fuzzy set is used to
are independent of describe the degree of uncertainty of the Intuitionistic Fuzzy
Let A be the most Intuitionistic fuzzy set, i.e. ( ) set. This paper analysis the existing Intuitionistic entropy,
( ) formulas and extends to derive new intuitionistic fuzzy
Then entropy which is generalisations of previously derived
measures. This work introduces a new entropy measure of
( ) ( )
∑ [( ( ) order and degree . Moreover some desirable properties
( )
corresponding to this measure has also been discussed.
( )) ( ( ) ( )) Monotonic behaviour of proposed measure is also analysed.
( ) ( )]
Conflict of interest
= ( ) ∑ [ ( )
] The authors declare that there is no conflict of interest
= 1 which is independent of regarding the publications of this paper.
On the other hand, if A is a crisp set , i.e. ( )
( ) ( ) ( ) , REFERENCES
then ( ) for any value of . [1] Attanassov, K. T. (1986). Intuitionistic fuzzy sets.
Fuzzy Sets and Systems, 20(1): 87–96.
[2] Atanassov, K. T. and Gargov, G. (1989). Interval valued [17] Verma, R., Sharma, B.D. (2011). On generalized
intuitionistic fuzzy sets. Fuzzy Sets and Systems, 31(3): exponential fuzzy entropy. World Academy of Science,
343–349. Engineering and Technology, 5: 956-959.
[3] Bhadari, D. and Pal, N. (1993). Some new information [18] Vlachos, I. K. and Sergiadis, G. D. (2007).
measures for fuzzy sets. Information Sciences, 63:209- Intuitionistic fuzzy information-application to pattern
228. recognition, Pattern Recognition Letters, 28: 197-206.
[4] Bustince, H. and Burillo, P. (1996). Vague sets are [19] Zadeh,L.A,(1965). Fuzzy sets. Information and
intuitionistic fuzzy sets. Fuzzy Sets and Systems, 79(3): Computation, 8: 338–353
403–405. [20] Zhang, Q. S. and Jiang, S. Y. (2008). A note on
[5] Cornelis, C., Atanassov, K. T. and Kerre, E. E. (2003). information entropy measure for vague sets.
Intuitionistic fuzzy sets and interval-valued fuzzy sets: a Information Science, 178: 4184 – 4191.
critical comparison. Proceedings of the Conference of
the European Society for Fuzzy Logic and Technology,
159–163, DBLP, Zittau, Germany.
[6] Deluca, A. and Termini, S. (1971). A definition of non-
probabilistic entropy in setting of fuzzy set theory.
Information and Control, 20: 301 – 312.
[7] Deschrijver, G. and Kerre, E. E. (2003). On the
relationship between some extensions of fuzzy set
theory. Fuzzy Sets and Systems, 133(2): 227–235.
[8] Deshmukh, K.C., Khot P.G. and Nikhil (2011)
.Generalized Measures of Fuzzy Entropy and their
properties. International Journal of Mathematical and
Computational Sciences, 5 (8):1176-1180.
[9] Jiang ,D. and Wang Y.(2018). A new entropy and its
properties based on the improved axiomatic definition
of Intuitionistic Fuzzy Entropy. Mathematical Problems
in Engineering, 2018 :1-6.
[10] Mishra, A.R. (2016).Intuitionistic Fuzzy Information
measures with Application in rating of township
development. Iranian Journal of Fuzzy Systems,
13(03):49-70.
[11] Munde, A. (2018 ). Fuzzy Information measures with
multiple parameters. Fuzzy logic based in optimisation
methods and control systems and its applications,
2018:7-23.
[12] Prakash,O. and Gandhi, C. P.(2011) .New generalized
measures of Fuzzy Entropy and their properties. Journal
of Informatics and Mathematical Sciences, 3:1-9.
[13] A. Rényi, “On measures of entropy and information,” in
Proceedings of the 4th Berkeley Symposium on
Mathematical Statistics and Probability, pp. 547–561,
University of California Press, Berkeley, Calif, USA,
1961
[14] Shanon, C. E. (1948), A mathematical theory of
communication.The Bell System Technical Journal,
27(3): 379 – 423.
[15] Sharma, B.D. and Mittal, D.P. (1975). New non-
additive measure of entropy for discrete probability
distributions. J. Math. Sci., 10: 28-40.
[16] Szmidt, E. and Kacprzyk, J. (2001): Entropy for
intuitionistic fuzzy sets, Fuzzy Sets and Systems 118(3),
467 – 477.