Fuzzy numbers are used in various fields such as fuzzy process methods, decision control theory, problems involving decision making, and systematic reasoning. Fuzzy systems, including fuzzy set theory. In this paper, pentagonal fuzzy variables (PFV) are used to formulate linear programming problems (LPP). Here, we will concentrate on an approach to addressing these issues that uses the simplex technique (SM). Linear programming problems (LPP) and linear programming problems (LPP) with pentagonal fuzzy numbers (PFN) are the two basic categories into which we divide these issues. The focus of this paper is to find the optimal solution (OS) for LPP with PFN on the objective function (OF) and right-hand side. New ranking function (RF) approaches for solving fuzzy linear programming problems (FLPP) with a pentagonal fuzzy number (PFN) have been proposed, based on new ranking functions (N RF). The simplex method (SM) is very easy to understand. Finally, numerical examples (NE) are used to demonstrate the suggested approach's computing process.
The class of quasi semi -convex functions and pseudo semi -convex functions are presented in this paper by combining the class of -convex functions with the class of quasi semi -convex functions and pseudo semi -convex functions, respectively. Various non-trivial examples are introduced to illustrate the new functions and show their relationships with -convex functions recently introduced in the literature. Different general properties and characteristics of this class of functions are established. In addition, some optimality properties of generalized non-linear optimization problems are discussed. In this generalized optimization problems, we used, as the objective function, quasi semi -convex (respectively, strictly quasi semi -convex
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreIn this paper we introduce the notions of bi-ideal with respect to an element r
denoted by (r-bi- ideal ) of a near ring , and the notion fuzzy bi- ideal with respect
to an element of a near ring and the relation between F-r-bi-ideal and r-bi-ideal of
the near ring, we studied the image and inverse image of r-bi- ideal under
epimomorphism ,the intersection of r-bi- ideals and the relation between this ideal
and the quasi ideal of a near ring, also we studied the notion intuitionistic fuzzy biideal
with respect to an element r of the near ring N, and give some theorem about
this ideal .
In this paper, a new analytical method is introduced to find the general solution of linear partial differential equations. In this method, each Laplace transform (LT) and Sumudu transform (ST) is used independently along with canonical coordinates. The strength of this method is that it is easy to implement and does not require initial conditions.
This work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The
... Show MoreContents IJPAM: Volume 116, No. 3 (2017)
Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreAllah created the human from clay and made the system of marriage between male
and female as a reason for life continuity and human staying. This system produced an
organization called (the society) which is defined as a group lived in limited time and place.
Islam put fundamental and conditions of the righteous society in the Holy Quran and
prophetic sunna. Islam also put the solutions for problems (if they got) , naturally, these
problems may happened because of the nature of the life.
The problem of the research is summarized by that the problems of the society
enlarged in our Islamic society more than time ago. In the same time , some solution are
imported from west and east and from scientist and ignorant wit
The linear instability and nonlinear stability analyses are performed for the model of bidispersive local thermal non-equilibrium flow. The effect of local thermal non-equilibrium on the onset of convection in a bidispersive porous medium of Darcy type is investigated. The temperatures in the macropores and micropores are allowed to be different. The effects of various interaction parameters on the stability of the system are discussed. In particular, the effects of the porosity modified conductivity ratio parameters, and , with the int
... Show MoreThis article addresses a new numerical method to find a numerical solution of the linear delay differential equation of fractional order , the fractional derivatives described in the Caputo sense. The new approach is to approximating second and third derivatives. A backward finite difference method is used. Besides, the composite Trapezoidal rule is used in the Caputo definition to match the integral term. The accuracy and convergence of the prescribed technique are explained. The results are shown through numerical examples.