Operational behaviour of major part assembly system of an automobile incorporating human error in maintenance
Present paper studies the operational behavior of major part assembly system of an automobile incorporating human error. The system consists of eight main units namely: Engine, transmission, fuel supply system, fuel ignition system, exhaust system, cooling system, brake system and build. The whole system can fail due to failure of any of the units. The system satisfies the usual conditions like perfect repair, joint distributions etc. Each operative unit has a constant failure rate but a general repair time distribution. We transform the basic equation into integro differential equation and outline the solution procedure for a repair time distribution with Laplace transform. The transitional state probabilities, asymptotic behaviour and some characteristics such as reliability, availability, MTTF and the cost effectiveness of the system have been obtained using a time dependent version of the supplementary variable method and Gumble-Hougaard copula methodology. At last, some particular cases and numerical examples have been taken to describe the model.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Some properties of Q-Intuitionistic L-Fuzzy subnearrings of a nearring
In this paper, we study some of the properties of Q-intuitionistic L-fuzzy subnearring of a nearring and prove some results on these.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Linear and differential cryptanalysis of DES
The Data Encryption Standard (DES), a symmetric-key cryptosystem, developed for United States government was intended for use by the general public. It has been officially accepted as a cryptographic standard in United States and other countries. The DES is also known as the Data Encryption Algorithm (DEA) by ANSI and DEA-1 by the ISO. It has been a worldwide standard for 30 years. Many hardware and software system have been designed with the DES. Although it is showing signs of old age, it has hold up remarkably well against years of cryptanalysis and it is still secure against all but possibly the most powerful adversaries. In this paper we begin by describing DES then describe and analyze attacks against DES.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Solution of Telegraph Equation by using Double Aboodh Transform
In this paper we apply Double A booth transform to solve the general linear telegraph equation. The applicability of this new transform is demonstrated using some functions.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
The Study of Strategic and Extensive form of Non-cooperative Game Theory
In this paper, we consider a wide range of widely-studied models strategic form behavioral game theory. It is standard multi agent settings to assume that agents will adopt Nash equilibrium strategies. This paper gives a brief overview of game theory. Therefore in the first section we want to outline what game theory generally is and where it is applied. In the next section, we introduce some of the most important terms of Non-cooperative game theory such as strategic form (or) normal form games, extensive form and Nash equilibrium.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Generalized semi generalized closed sets in Bitopological spaces
In this paper, we introduce generalized semi generalized closed sets (gsg-closed sets) in bitopological spaces and basic properties of these sets are analyzed. As an application this closed set we investigate the notion of (i,j) -Tgsg space. Further we define and study (i,j)-gsg continuous mappings in bitopological spaces and some of their properties have been investigated. ?
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Quantum Chemical Computational Method for finding the Survival and Hazard rate for a demonstration of ovarian pituitary feedback loop in women
The objective of this study was to do a comparative study of Follicular and letual phase of inhibins, estrogen, progesterone, LH and FSH. For women in both phases, levels of inhibin A, inhibin B, estradiol and progesterone decreased after the removal of the ovaries. Correlation analysis showed that inhibin , estrogen were significantly negatively correlated in both phases with FSH concentration. Inhibin had negatively correlated in follicular phase and progesterone had a negative correlation in the luteal phase. In this paper we consider the exponentiated Weibull family which has a scale parameter and two shape parameters for the application part. The Weibull family and the exponentiated exponential family are the particular cases of this family. The distribution has been compared with the two-parameter Weibull and Gamma distributions with respect to failure rates. This study showed that ovarian inhibin A and B were cleared from the circulation within 12 h of oophorectomy, whereas E2 and progesterone remain in the circulation for longer. Negative correlation between FSH, inhibin suggests that inhibins may contribute to the observed early rise in FSH after the surgical menopause.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Several types of defined attacks on cryptographic hash function
Hash functions, also called message digests and one-way encryption, are algorithms that, in some sense, use no key. Instead, a fixed-length hash value is computed based upon the plaintext that makes it impossible for either the contents or length of the plaintext to be recovered. Hash algorithms are typically used to provide a digital fingerprint of a file's contents, often used to ensure that the file has not been altered by an intruder or virus. Hash functions are also commonly employed by many operating systems to encrypt passwords. Hash functions, then, provide a measure of the integrity of a file. The goal of this paper is to give an overview of the known methods of attack on hash functions.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Estimation of Temperature Distribution and Thermal Stress Analysis of Composite Circular Rod by Finite Element Method
In this paper the temperature distribution and thermal stress analysis of multilayered composite circular rod is discussed by finite element method and the result temperature and thermal stresses has been computed numerically and illustrated graphically.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Generalization of Magic Square
A magic square of order 3n is 3n×3n matrix containing integers in such a way that each row and column add up to the same value. We generalize this notion to that of a 3n×3n matrix with the help of a special geometrical figure without having much knowledge of algebra and another branch of mathematics.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]