Advances and Applications in Mathematical Sciences

ContentsVOLUME 21, ISSUE 10, August 2022, PAGES 5531-6157

1.

Some fixed point theorems in 2-fuzzy 2-hilbert space

Thangaraj Beaula and R. Abirami
Open Access Article
5531-5543
2.

Computation of numerous topological indices of dutch windmill graph Dnm

R. H. Aravinth and R. Helen
Open Access Article
5545-5554
3.

Interval valued secondary k-range symmetric fuzzy matrices

M. Kaliraja and T. Bhavani
Open Access Article
5555-5574
4.

On soft generalized ** closed sets in soft topological spaces

N. Gomathi and T. Indira
Open Access Article
5575-5595
5.

On bounds for certain closed neighbourhood topological indices

M. S. Srinivasan and R. Helen
Open Access Article
5597-5609
6.

Max-max operation on α-upper level partition of fuzzy square matrices

S. Mallika
Open Access Article
5611-5624
7.

Vague g functions in vague topological spaces

E. L. Mary Tency and M. Helen
Open Access Article
5625-5641
8.

The middle dominating fuzzy graph of a fuzzy graph

A. Nagoor Gani, A. Nafiunisha and P. Muruganantham
Open Access Article
5643-5653
9.

Identification of efficacious algorithm using rough sets

Nirmala Rebecca Paul and R. Sangeetha
Open Access Article
5655-5664
10.

Complement in fuzzy labeling graph

D. Rajalaxmi and V. Vijaya
Open Access Article
5665-5677
11.

Up and down shifted proportional fuzzy stochastic orderings by using exponential triangular fuzzy random variables

C. Senthil Murugan and D. Rajan
Open Access Article
5679-5702
12.

A graph theoretical approach on constellation of stars

S. R. Shreenitha and M. Subathra
Open Access Article
5703-5712
13.

Nano regular b-continuous functions

P. Srividhya and T. Indira
Open Access Article
5713-5730
14.

Multiple intruder locating domination in chordal and bipartite graphs

K. Venugopal and K. A. Vidya
Open Access Article
5731-5742
15.

Finding critical path in a fuzzy project network using neutrosophic fuzzy number

V. Vijaya, D. Rajalaxmi and H. Manikandan
Open Access Article
5743-5753
16.

Secure data transmission protocol using network

Ritesh Pathak and G. Akilarasu
Open Access Article
5755-5768
17.

Deep learning for tumor malignancy detection and classification

Chandni, Monika Sachdeva and Alok Kumar Singh Khushwaha
Open Access Article
5769-5778
18.

Caputo fractional derivative of sine and cosine hyperbolic functions

Rajbir Singh, Dimple Singh and Rekha
Open Access Article
5779-5788
19.

A framework for improving privacy and security of public cloud-based enterprise resource planning systems

Sai Kalki Jajula, Tanya Agrawal, Anil Kumar Mishra, Ashima Narang and Ved Prakash
Open Access Article
5789-5799
20.

Credit card fraud detection using multiple models: a comparative analysis

Tanya Agrawal, Sai Kalki Jajula, Anil Kumar Mishra and Akshat Agrawal
Open Access Article
5801-5810
21.

Automated traffic rules for road safety using image processing

Shweta Sinha, Priyanka Makkar and Priyanka Dubey
Open Access Article
5811-5823
22.

Common fixed point theorems on (φ, ψ)-type multi valued mappings in b-metric spaces

R. Jahir Hussain, K. Maheshwaran and D. Dhamodharan
Open Access Article
5825-5839
23.

Total edge irregularity strength of some polytope structures

S. Teresa Arockiamary and J. Maria Angelin Visithra
Open Access Article
5841-5852
24.

On synchronization of circular semi-flower automata

Shubh N. Singh
Open Access Article
5853-5863
25.

MHD casson fluid flow past an upright plate under the impact of heat sink and chemical reaction

L. Rama Mohan Reddy, P. Rama Krishna Reddy, P. Chandra Reddy and M. C. Raju
Open Access Article
5865-5878
26.

Fixed point theorem and its applications in m-fuzzy metric spaces

Rakesh Tiwari and Shraddha Rajput
Open Access Article
5879-5887
27.

Common fixed point results for hybrid pair of mappings via some properties in g-metric spaces

Anju Panwar and Anita
Open Access Article
5889-5910
28.

On fuzzy implicative ideals in z-algebras

S. Sowmiya and P. Jeyalakshmi
Open Access Article
5911-5922
29.

Radius problem for a subclass of analytic functions defined by first order differential inequality

Asha Thomas, Thomas Rosy and S. Sunil Varma
Open Access Article
5923-5933
30.

New design of S box based on Galois field of odd characteristic and analysis of its cryptographic attributes

P. Aboobacker and M. Viji
Open Access Article
5935-5946
31.

g-Idempotency of linear combinations of two idempotent matrices

B. Vasudevan and N. Anis Fathima
Open Access Article
5947-5958
32.

Properties of adjacent line graphs

B. Vasudevan and K. Vimala
Open Access Article
5959-5974
33.

Topological indices of some derived graphs through m-polynomials

H. S. Boregowda
Open Access Article
5975-5988
34.

Two modulo three graceful labeling of biparitite graphs

A. Sasikala and V. Poovila
Open Access Article
5989-5996
35.

Some fixed point results in modular-like metric spaces and partial modular-like metric spaces with its non-archimedean version

Dipankar Das, Santanu Narzary and Niranjan Bora
Open Access Article
5997-6016
36.

Some arithmetic operations on rearward and mutated fuzzy numbers

K. P. Deepa
Open Access Article
6017-6028
37.

Computational approach for transient behaviour of finite source retrial queueing model with multiple vacations and closed down

J. Indhumathi, A. Muthu Ganapathi Subramanian and Gopal Sekar
Open Access Article
6029-6047
38.

Reliability forecast for peel remover plant of rice by employing algebra of logics

Reena, M. M. Gupta and A. Kumar
Open Access Article
6049-6069
39.

Deductive group invariant analysis of magneto hydrodynamics flow in non-newtonian power-law fluid over a stretching sheet

Kalindi J. Contractor, K. J. Chauhan and M. R. Tailor
Open Access Article
6071-6079
40.

Multivariate statistics to survival data

M. Manikandan, M. Ramakrishnan and R. Ravanan
Open Access Article
6081-6102
41.

Feature selection through robust lasso procedures in predictive modelling

R. Muthukrishnan and C. K. James
Open Access Article
6103-6115
42.

Performance comparison of artificial neural network training algorithms for noise level prediction in industrial zone of Lucknow

Minakshi Mishra and Ratan Kumar Thakur
Open Access Article
6117-6128
43.

Fixed-points theorems for expansive type mapping on F-cone metric spaces

Babita Pandey, Manoj Ughade and Amit Kumar Pandey
Open Access Article
6129-6146
44.

Analysis of QoS parameters using different back off window algorithm in the IEEE 802.11e networks

Harpreet Singh Bedi, Kamal Kumar Sharma, Shakti Raj Chopra and Balraj Singh
Open Access Article
6147-6157