332 research outputs found

    Multivalued function spaces and Atsuji spaces

    Full text link
    [EN] In this paper we present two themes. The first one describes a transparent treatment of some of the recent results in graph topologies on multi-valued functions. The study includes Vietoris topology, Fell topology, Fell uniform topology on compacta and uniform topology on compacta. The second theme concerns when continuity is equivalent to proximal continuity or uniform continuityNaimpally, S. (2003). Multivalued function spaces and Atsuji spaces. Applied General Topology. 4(2):201-209. doi:10.4995/agt.2003.2025.SWORD2012094

    All hypertopologies are hit-and-miss

    Full text link
    [EN] We solve a long standing problem by showing that all known hypertopologies are hit-and-miss. Our solution is not merely of theoretical importance. This representation is useful in the study of comparison of the Hausdorff-Bourbaki or H-B uniform topologies and the Wijsman topologies among themselves and with others. Up to now some of these comparisons needed intricate manipulations. The H-B uniform topologies were the subject of intense activity in the 1960's in connection with the Isbell-Smith problem. We show that they are proximally locally finite topologies from which the solution to the above problem follows easily. It is known that the Wijsman topology on the hyperspace is the proximal ball (hit-and-miss) topology in”nice” metric spaces including the normed linear spaces. With the introduction of a new far-miss topology we show that the Wijsman topology is hit-and-miss for all metric spaces. From this follows a natural generalization of the Wijsman topology to the hyperspace of any T1 space. Several existing results in the literature are easy consequences of our workNaimpally, S. (2002). All hypertopologies are hit-and-miss. Applied General Topology. 3(1):45-53. doi:10.4995/agt.2002.2111SWORD45533

    What Drives Foundation Expenses & Compensation? Results of a Three-Year Study, Highlights

    Get PDF
    This brief presents key findings from the latest report of the Foundation Expenses and Compensation Project—the first large-scale, longterm, systematic study of independent, corporate, and community foundations' expense and compensation patterns and the factors behind them. Documenting the varying characteristics of the 10,000 largest U.S. grantmaking foundations, the study finds these differences—including foundation type, size, and operating activities—essential for understanding foundation finances. Not surprisingly, hiring staff and taking on staff-intensive activities raise charitable administrative expenditures relative to charitable distributions, while relying on unpaid board and family members and engaging in less-staff-intensive activities lower them. Most foundation operations, however, are somewhere between these poles

    Trajectory Tracking and Control of Differential Drive Robot for Predefined Regular Geometrical Path

    Get PDF
    AbstractTrajectories made by concatenating straight motion and in place turning primitive are one that can be easily followed by a differential drive robot. This paper presents trajectory tracking and control of differential drive robots along a predefined regular geometrical path made up of these primitives. A control algorithm was developed to control the robot along different trajectories. The algorithm takes user input from a user interface through which one can select the type of trajectory, dimensions of the trajectory and tracking velocity. Simulations were carried out to obtain the trajectory tracked by the robot using commercial available software MATLAB, Release 2010. Experiments were conducted for tracking regular trajectories such as Triangular, Rectangular and Square and these experimental results were found to be in good agreement with the simulation results

    Enhancing Network Lifetime in Wireless Sensor Networks Adopting Elephant Swarm Optimization

    Get PDF
    Enhancing the lifetime of wireless sensor networks had baffled researchers for quite some time now. The authors of this research manuscript draw inspiration from the behavior of large elephant swarms and incorporate their behavior into wireless sensor networks. The complex elephant swarm behavior is incorporated using a cross layer approach. The elephant optimization discussed in this paper enables optimized routing techniques, adaptive radio link optimization and balanced scheduling to achieve a cumulative enhanced network performance. The proposed elephant swarm optimization is compared with the popular protocol. The experimental study presented proves that the Elephant Swarm Optimization technique enhances the network life time by about 73%

    Bombay hypertopologies

    Full text link
    [EN] Recently it was shown that, in a metric space, the upper Wijsman convergence can be topologized with the introduction of a new far-miss topology. The resulting Wijsman topology is a mixture of the ball topology and the proximal ball topology. It leads easily to the generalized or g-Wijsman topology on the hyperspace of any topological space with a compatible LO-proximity and a cobase (i.e. a family of closed subsets which is closed under finite unions and which contains all singletons). Further generalization involving a topological space with two compatible LO-proximities and a cobase results in a new hypertopology which we call the Bombay topology. The generalized locally finite Bombay topology includes the known hypertopologies as special cases and moreover it gives birth to many new hypertopologies. We show how it facilitates comparison of any two hypertopologies by proving one simple result of which most of the existing results are easy consequences.Di Maio, G.; Meccariello, E.; Naimpally, S. (2003). Bombay hypertopologies. Applied General Topology. 4(2):421-444. doi:10.4995/agt.2003.2042.SWORD4214444

    Awareness of Recommended Strategies on Hepatitis B Booster Vaccination among Health Care Personnel: Survey from A Tertiary Care Hospital

    Get PDF
    Background: We conducted a survey among doctors, interns, nurses, para- medical and non- medical support staff regarding their status of hepatitis vaccination and knowledge about Hepatitis B booster dose. Method: Cross- sectional survey was conducted using mobile devices. Data was collected using a mobile application – Episurveyor. The questionnaire was custom designed on the website and then downloaded to mobile phones.Results: We surveyed a total of 560 respondents, 138 were doctors, 105 were medical students, 216 were nurses, 41 were in others category (non- medical and paramedical personnel of the hospital) and 60 filled questionnaires were lost. 84.2% of the respondents had previously taken course of hepatitis B vaccine and less than half had taken hepatitis B booster (42.8%). 81.2% doctors, 90.5% medical students and 84.7% nurses, felt periodic booster doses to be necessary in all. Conclusion: This study shows that even though the primary vaccination coverage was good amongst Health care personnel, their knowledge regarding current recommendations of booster doses remains grossly inadequate. Mobile devices provide a feasible and cost- effective alternative for small surveys

    Graph topologies on closed multifunctions

    Full text link
    [EN] In this paper we study function space topologies on closed multifunctions, i.e. closed relations on X x Y using various hypertopologies. The hypertopologies are in essence, graph topologies i.e topologies on functions considered as graphs which are subsets of X x Y . We also study several topologies, including one that is derived from the Attouch-Wets filter on the range. We state embedding theorems which enable us to generalize and prove some recent results in the literature with the use of known results in the hyperspace of the range space and in the function space topologies of ordinary functions.Di Maio, G.; Meccariello, E.; Naimpally, S. (2003). Graph topologies on closed multifunctions. Applied General Topology. 4(2):445-465. doi:10.4995/agt.2003.2044.SWORD4454654

    RASCP: Providing for a Secure Group Communication Plane Using RFID

    Get PDF
    Predominantly large distributed networks currently provide support for group oriented protocols and applications Regardless of the type of distributed network there is a need to provide communication privacy and data integrity to the information exchange amongst the group members This paper introduces a protocol named Authentication based Secure Communication Plane adopts the commutative RSA algorithm to maintain data integrity The proposed protocol not only eliminates the overheads resulting from key distribution and key compromise attacks but also provide for information security in the presence of colluded group members Radio Frequency Identification tags is used for group member identification The RACP protocol is compared with the RFID extended Secure Lock group communication protocol and its efficiency in terms of the computational complexity involved is discussed in this pape
    • …
    corecore