#
Advanced Search Results For "MATRICES (Mathematics)"

##### Your filters

## A TECHNIQUE FOR SOLVING SYSTEM OF GENERALIZED EMDEN-FOWLER EQUATION USING LEGENDRE WAVELET.

Publication Type: Academic Journal

Source(s): TWMS Journal of Applied & Engineering Mathematics. 2023, Vol. 13 Issue 1, p341-361. 21p.

Abstract: This article is concerned with the development of an efficient numerical algorithm for the solution of a system of generalized nonlinear Emden-Fowler equation. The proposed algorithm is based on the Legendre wavelet operational matrix of integration te...

## SPHERICAL FUZZY MATRICES.

Publication Type: Academic Journal

Source(s): TWMS Journal of Applied & Engineering Mathematics. 2023, Vol. 13 Issue 1, p98-109. 12p.

Abstract: In this paper, we introduce spherical fuzzy matrices (SFMs) which is an advanced tool of the fuzzy matrices, intuitionistic fuzzy matrices and picture fuzzy ma-trices. We investigate the basic properties of SFMs and compare the idea SFMs with picture f...

## Derivation of Symmetric Secant Stiffness Matrices for Nonlinear Finite Element Analysis.

Publication Type: Academic Journal

Source(s): Advances in Science & Technology - Research Journal. 2022, Vol. 16 Issue 6, p118-125. 8p.

Abstract: Nonlinear finite element analysis requires the derivation of the secant elastic stiffness matrix of the discretised mechanical system. Most approaches of the literature lead to express the secant stiffness matrix as an asymmetric matrix, which then can...

## NEW IDENTITY CLASSES FOR GENERALISED DEGREE THREE LINEAR RECURRENCE SEQUENCE TERMS.

Publication Type: Academic Journal

Source(s): Palestine Journal of Mathematics. 2022, Vol. 11 Issue 3, p659-663. 5p.

Abstract: We derive, using matrices, new classes of linear recurrence identities linking the general term of a degree three linear recurrence sequence with those of an associated ‘cohort’ sequence that differs only in its initial values. The class description is...

## Computational Mathematics: Solving Dual Fully Fuzzy Nonlinear Matrix Equations Numerically using Broyden’s Method

Publication Type: Academic Journal

Source(s): International Journal of Mathematical, Engineering and Management Sciences, Vol 8, Iss 1, Pp 60-77 (2023)

Abstract: Fuzzy numbers have many applications in various mathematical models in both linear and nonlinear forms. In the form of a nonlinear system, fuzzy nonlinear equations can be constructed in the form of matrix equations. Unfortunately, the matrix equations...

## New characterizations of k-normal and k-EP matrices.

Publication Type: Academic Journal

Source(s): Kuwait Journal of Science. Oct2022, Vol. 49 Issue 4, p1-6. 6p.

Abstract: In this paper, some new characterizations of k-normal and k-EP matrices are obtained using the core-EP decomposition. We obtain several equivalent conditions for a matrix A to be k-normal and k-EP in terms of certain generalized inverses. [ABSTRACT FRO...

## Analysis of T-Spherical Fuzzy Matrix and Their Application in Multiattribute Decision-Making Problems.

Publication Type: Academic Journal

Source(s): Mathematical Problems in Engineering. 9/27/2022, p1-13. 13p.

Abstract: The aim of this study is to introduce an innovative concept of T-spherical fuzzy matrix, which is a hybrid structure of fuzzy matrix and T-spherical fuzzy set. This article introduces the square T-spherical fuzzy matrix and constant T-spherical fuzzy m...

## Computation of the Complexity of Networks under Generalized Operations.

Publication Type: Academic Journal

Source(s): Complexity. 9/8/2022, p1-20. 20p.

Abstract: The connected and acyclic components contained in a network are identified by the computation of its complexity, where complexity of a network refers to the total number of spanning trees present within. The article in hand deals with the enumeration o...

## Mathematical Modeling of Multiattack Behavior Discrimination in the WSN Based on Incidence Matrix.

Publication Type: Academic Journal

Source(s): Complexity. 9/22/2022, p1-8. 8p.

Abstract: The current WSN is vulnerable to a variety of malicious attacks, resulting in the decline of its comprehensive performance. Multihop routing involves a number of safety and privacy issues. Problems such as snooping, sinkhole, manipulation, cloning, wor...

## On the Cospectrality of Hermitian Adjacency Matrices of Mixed Graphs.

Publication Type: Academic Journal

Source(s): European Journal of Pure & Applied Mathematics. Jul2022, Vol. 15 Issue 3, p1090-1097. 8p.

Abstract: A mixed graph D is a graph that can be obtained from a graph by orienting some of its edges. Let α be a primitive nth root of unity, then the α−Hermitian adjacency matrix of a mixed graph is defined to be the matrix Hα = [hrs] where hrs = α if rs is an...