2,337 research outputs found

    SMARANDACHE NUMBER RELATED TRIANGLES

    Get PDF
    Given a triangle in Euclidean geometry it is well known that there exist an infinity of triangles each of which is similar to the given one. In Section I we make certain observations on Smarandache numbers

    The First Spark Spectrum of Tellurium Part I

    Get PDF

    Note on the Emission Bands of the Silver Iodide Molecule

    Get PDF

    Convergence of Ishikawa iterates for a multi-valued mapping with a fixed point

    Get PDF
    summary:Existence of fixed points of multivalued mappings that satisfy a certain contractive condition was proved by N. Mizoguchi and W. Takahashi. An alternative proof of this theorem was given by Peter Z. Daffer and H. Kaneko. In the present paper, we give a simple proof of that theorem. Also, we define Mann and Ishikawa iterates for a multivalued map TT with a fixed point pp and prove that these iterates converge to a fixed point qq of TT under certain conditions. This fixed point qq may be different from pp. To illustrate this phenomenon, an example is given

    Testing embedded system through optimal mining technique (OMT) based on multi-input domain

    Get PDF
    Testing embedded systems must be done carefully particularly in the significant regions of the embedded systems. Inputs from an embedded system can happen in multiple order and many relationships can exist among the input sequences. Consideration of the sequences and the relationships among the sequences is one of the most important considerations that must be tested to find the expected behavior of the embedded systems. On the other hand combinatorial approaches help determining fewer test cases that are quite enough to test the embedded systems exhaustively. In this paper, an Optimal Mining Technique that considers multi-input domain which is based on built-in combinatorial approaches has been presented. The method exploits multi-input sequences and the relationships that exist among multi-input vectors. The technique has been used for testing an embedded system that monitors and controls the temperature within the Nuclear reactors

    Securing multi-tenancy systems through multi DB instances and multiple databases on different physical servers

    Get PDF
    Use of the same application by multiple users through internet as a service is supported by cloud computing system. Both the user and attacker stay in the same machine as both of them are users of the same application creating an in-secure environment. Service must ensure secrecy both at the application and data layer level. Data isolation and Application isolation are two basic aspects that must be ensured to cater for security as desired by the clients that accesses the service. In this paper a more secured mechanism has been presented that help ensuring data isolation and security when Multi-tenancy of the users to the same service has been implemented
    corecore