oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2018 ( 9 )

2017 ( 9 )

2016 ( 12 )

2015 ( 56 )

Custom range...

Search Results: 1 - 10 of 971 matches for " Idham Arif Alias "
All listed articles are free for downloading (OA Articles)
Page 1 /971
Display every page Item
On the Stability of Quadratic Double Centralizers and Quadratic Multipliers: A Fixed Point Approach
Bodaghi Abasalt,Arif Alias Idham,Gordji MadjidEshaghi
Journal of Inequalities and Applications , 2011,
Abstract: We prove the superstability of quadratic double centralizers and of quadratic multipliers on Banach algebras by fixed point methods. These results show that we can remove the conditions of being weakly commutative and weakly without order which are used in the work of M. E. Gordji et al. (2011) for Banach algebras.
Ulam Stability of a Quartic Functional Equation
Abasalt Bodaghi,Idham Arif Alias,Mohammad Hosein Ghahramani
Abstract and Applied Analysis , 2012, DOI: 10.1155/2012/232630
Abstract: The oldest quartic functional equation was introduced by J. M. Rassias in (1999), and then was employed by other authors. The functional equation (2
On the Stability of Quadratic Double Centralizers and Quadratic Multipliers: A Fixed Point Approach
Abasalt Bodaghi,Idham Arif Alias,Madjid Eshaghi Gordji
Journal of Inequalities and Applications , 2011, DOI: 10.1155/2011/957541
Abstract:
Differential game of many pursuers with integral constraints on a convex set in the plane
Idham Arif Alias,Gafurjan Ibragimov,Massimiliano Ferrara,Mehdi Salimi,Mansor Monsi
Mathematics , 2015,
Abstract: We study a simple motion differential game of many pursuers and one evader in the plane. We give a nonempty closed convex set in the plane, and the pursuers and evader move on this set. They cannot leave this set during the game. Control functions of players are subject to coordinate-wise integral constraints. If the state of the evader $y$, coincides with that of a pursuer $x_i$, $i=\{1,...,m\}$, at some time $t_i$ (unspecified), i.e. $x_i(t_i)=y(t_i)$, then we say that pursuit is completed. We obtain some conditions under which pursuit can be completed from any position of the players in the given set. Moreover, we construct strategies for the pursuers.
Approximately cubic functional equations and cubic multipliers
Bodaghi Abasalt,Alias Idham,Ghahramani Mohammad
Journal of Inequalities and Applications , 2011,
Abstract: In this paper, we prove the Hyers-Ulam stability and the superstability for cubic functional equation by using the fixed point alternative theorem. As a consequence, we show that the cubic multipliers are superstable under some conditions. 2000 Mathematics Subject Classification: 39B82; 39B52.
Japanese Household Fresh Fruits Demand Pattern
Alias Abdullah,Hajime Kobayashi,Ichizen Matsumura,Arif Alam
Trends in Agricultural Economics , 2011,
Abstract: Japanese people consumed at the average of 45.2 kg capita-1 in 1965 and had reached the peak of 54.6 kg capita-1 in 1973 but decreased to 27.5 kg capita-1 in 2006. Fresh fruits household expenses in Japan can be divided into 2 eras which is increasing era (1973-1992) and decreasing era (1992-2006) that shows the consumption pattern for the commodity. In Japan, fruits consumption distribution shows different pattern due to each fruit have different consumption characteristic and trend of demand. Therefore, it is crucial to understand economic characteristic for each fruit by understanding its price and expenditure elasticity. Present study covers the comparison study for the demand of fresh fruits by Japanese household across all over Japan for the period of 1973-1992 and 1992-2006. In this study, we analyze demand elasticity for fruits in general and other 14 fresh fruits available in Japanese market such as apple, pear, peach, persimmon, mandarin orange, orange, other citrus, grapefruits, watermelon, melon, strawberry, grape, banana and other fruit. The demand elasticity estimation was carried out using differentiated double logarithmic demand function. We used SHAZAM software for present regression analysis in this study. Present study have found the demand for fresh fruits by Japanese household are inferior goods and highly affected by the price. Generally, the demand for the fresh fruits by Japanese household is decrease. This study provides important information about the Japanese consumer demand for fresh fruits which could serve as guidelines for understanding consumer spending on fresh fruits as well as making structural marketing adjustments.
Security Approaches in IEEE 802.11 MANET—Performance Evaluation of USM and RAS  [PDF]
Arif Sari
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2014, DOI: 10.4236/ijcns.2014.79038
Abstract: Evaluation of IEEE 802.11 Mobile Ad Hoc Networks (MANET) security issues becomes significant concern for researchers since Denial of Service (DoS) attacks are recognized as one of the most harmful threats. A variety of security mechanisms are proposed to solve security dilemma in MANETs against different layers of DoS attacks. Physical Layer jamming attacks exhaust the victim’s network resources such as bandwidth, computing power, battery, etc. Unified Security Mechanism (USM) and Rate Adaptation Scheme (RAS) are two of the proposed methods by researchers against DoS attacks. USM and RAS mechanisms are simulated through OPNET simulator and Jamming Attack is generated on the network for each security mechanisms to compare specific performance metrics on the network.
Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks  [PDF]
Arif Sari
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2015, DOI: 10.4236/ijcns.2015.83003
Abstract: The Gossip-Based Relay Protocol (GRP) is developed based on Ad Hoc on Demand Distance Vector Protocol (AODV) and proposed to increase the efficiency of package routing functionality in ad hoc networks through specific flooding scheme. This lightweight protocol reduced the collisions on the network through specific mechanisms. Request to Send/Clear to Send (RTS/CTS) mechanism is widely used in ad hoc environment with Temporarily Ordered Routing Algorithm (TORA) in order to eliminate collisions and allow access to the shared medium through proposed authentication methods. Since GRP contains specific mechanism of directed acyclic Graph (DAG) mechanism to mitigate overhead problem, RTS/CTS modified TORA might result in similar performance metrics. In this paper, TORA protocol has a modification of new RTS/CTS mechanism and has been simulated in order to be compared with proposed lightweight robust forwarding GRP scheme in terms of specific performance metrics such as network throughput, end-to-end delay and message flooding rate over the network through OPNET simulation package in order to expose the optimal solution to increase overall network throughput in ad hoc environment.
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications  [PDF]
Arif Sari
Journal of Information Security (JIS) , 2015, DOI: 10.4236/jis.2015.62015
Abstract: Cloud computing has become one of the most projecting words in the IT world due to its design for providing computing service as a utility. The typical use of cloud computing as a resource has changed the scenery of computing. Due to the increased flexibility, better reliability, great scalability, and decreased costs have captivated businesses and individuals alike because of the pay-per-use form of the cloud environment. Cloud computing is a completely internet dependent technology where client data are stored and maintained in the data center of a cloud provider like Google, Amazon, Apple Inc., Microsoft etc. The Anomaly Detection System is one of the Intrusion Detection techniques. It’s an area in the cloud environment that is been developed in the detection of unusual activities in the cloud networks. Although, there are a variety of Intrusion Detection techniques available in the cloud environment, this review paper exposes and focuses on different IDS in cloud networks through different categorizations and conducts comparative study on the security measures of Dropbox, Google Drive and iCloud, to illuminate their strength and weakness in terms of security.
Temporal Three-Dimensional Ontology for Geographical Information Science (GIS)—A Review  [PDF]
Uznir Ujang, Alias Abdul Rahman
Journal of Geographic Information System (JGIS) , 2013, DOI: 10.4236/jgis.2013.53030
Abstract:

While the use of three-dimensional (3D) geographical information system (GIS) is becoming in rapid development and being used in various fields such as urban and regional planning, disaster management and planning, mobile navigation and etc., commercial and open source GIS software packages tend to offer 3D-GIS functionalities for their products. On the basis, GIS analysis functions are to provide information with respect to geographical location and by having 3D spatial data as an input, it will give advantages in providing horizontal position information. However, to analyze moving objects (temporal) in 3D seems not an easy task and not fully supported by current GIS platform packages. Previously in two-dimensional (2D) GIS practice, main issue addressed by researchers in managing temporal spatial objects is GIS packages were designed based on hardware and software constraints whereby it should be based on the temporal spatial objects ontology. Nowadays, the trend of managing temporal 3D data is via 3D spatial simulation or animation. This approach will not in assistance for GIS users in conducting spatial queries. Without having a suitable ontology and valid topological data structure for temporal 3D data, it will cause repetitive of temporal data (redundancy) and complications in executing spatial analysis in 3D environment. Therefore this paper focuses on the ontology for managing moving 3D spatial objects (i.e. air pollution, flood). The characteristics of moving objects were reviewed thoroughly by categorizing it based on its different appearances. Moreover, existing methods in managing temporal database were addressed and discussed for its practicalities. Another important aspect in managing temporal 3D objects is the implementation of topological data structures for 3D spatial objects were reviewed. In the last section of this paper it summarized the issues and further ideas towards implementing and managing temporal 3D spatial objects in GIS based on the Geoinformation Ontology (GeO).

Page 1 /971
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.