New Julia and Mandelbrot Sets for Jungck Ishikawa Iterates
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5
Abstract
The generation of fractals and study of the dynamics of polynomials is one of the emerging and interesting field of research nowadays. We introduce in this paper the dynamics of polynomials z n - z + c = 0 for n 2 and applied Jungck Ishikawa Iteration to generate new Relative Superior Mandelbrot sets and Relative Superior Julia sets. In order to solve this function by Jungck –type iterative schemes, we write it in the form of Sz = Tz, where the function T, S are defined as Tz = z n + c and Sz = z. Only mathematical explanations are derived by applying Jungck Ishikawa Iteration for polynomials in the literature but in this paper we have generated Relative Mandelbrot sets and Relative Julia sets.
Authors and Affiliations
Suman Joshi , Dr. Yashwant Singh Chauhan , Dr. Ashish Negi
Harmony Search Optimization in K-Means Clustering
Clustering is a data mining technique that classifies a set of observations into clusters based on some similarity measures. The most commonly used partitioning based clustering algorithm is K-means. However, the K-means...
Change Management for Human in Enterprise Resource Planning System
In recent years, there are more enterprises that use Enterprise Resource Planning (ERP) to gain significant advantages through allowing for An organization to control its business processes and gaining benefits of enhan...
Survey Paper for Maximization of Profit in Cloud Computing
The cloud is a next generation platform that provides dynamic resource pools, virtualization, and high availability. Today, it have the ability to utilize scalable, distributed computing environments within the confines...
Application of Machine Learning Techniques in Aquaculture
In this paper we present applications of different machine learning algorithms in aquaculture. Machine learning algorithms learn models from historical data. In aquaculture historical data are obtained from farm practice...
Detecting and Localizing the Attackers in Multiple Networks
Spoofing attack which easily attack the network and reduce the performance of the network. In this Paper, Spoofing attacks are detected, Finding the number of attackers that masquerade the node identity, Localizing all t...