Cayley-Hamilton Theorem for Fuzzy Matrix
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 1
Abstract
The classical Cayley-Hamilton theorem says that every square matrix satisfies its own characteristic equation. The Cayley-Hamilton theorem has been extended to rectangular matrices, block matrices, pairs of commuting matrices, standard and singular two-dimensional linear (2-D) systems. The Cayley-Hamilton theorem and its generalizations have been used in control systems, electrical circuits, systems with delays, singular systems, 2-D linear systems etc., In this paper the new approach of Cayley-Hamilton theorem was done using the fuzzy matrices. For this, the Characteristic equation of fuzzy matrix, Fuzzy Eigen values and Eigen vectors have been derived.
Authors and Affiliations
M. Clement Joe Anand, A. Rajkumar, A. Victor Devadoss, M. Edal Anand
slugCalculating Threshold Current Density and Output Power of Vertical Cavity Surface Emitting Laser
In this paper, threshold current density and output power of the vertical cavity surface emitting laser is analytically calculated as a function of different electrical and optical parameters, and their interdependency...
An Analysis on Cyber Crime, Cyber Threats and Role of Cyber Analyst
Computer crime is a general term that embraces such crimes as phishing, credit card frauds, bank robbery, illegal downloading, industrial espionage, child pornography, kidnapping children via chat rooms, scams, cyber te...
Structural Analysis of Bicycle Structure and Improvement Analysis using Analytical and Finite Element Analysis
Bicycles are the common man mode of transportation for centuries. They are environmentally friendly and remote places can be easily accessed where road conditions are bad. Since it is essential member of common people,...
A Review on Steganography & Cryptography Techniques
There is a need for more secure methods for transferring data between source to destination due to increase in the number of attack recorded during electronic exchange Cryptography and steganography are well known and w...
A survey on Intrusion Detection System by Using Data Mining Based on Class-Association-Rule Mining Using GNP
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are constructed by manual encoding of expert knowledg...