Role of Ψμ Operator in Ideal Supra Topological Spaces
Journal Title: INTERNATIONAL JOURNAL OF MATHEMATICS TRENDS AND TECHNOLOGY - Year 2014, Vol 9, Issue 3
Abstract
In this paper, we shall discuss the ideal on supra topological space and the properties of Ψ operator on topological space. Moreover, We introduce Ψ_μ operator and its properties on supra topological space. In addition with the help of Ψ_μ operator, ( )*μ operator and its properties are also discussed here.
Authors and Affiliations
Renukadevi. V , Tessy Cardoz , Assistant Professors, Department of Mathematics, Dr. N. G. P Arts and Science College, Coimbatore, Tamilnadu. India.
Determinants of Students’ Achievements in Senior Secondary School Mathematics and Sciences: What is the role of Test Response Mode and Locus of Control?
This study investigated the effects of test response mode and locus of control on student’s achievements in senior secondary school mathematics and sciences within the blueprint of casual-comparative research of an...
Existential and Uniqueness Results for Boundary Value Problems associated with Non-linear Singular Interface Problems on Time Scales using Fixed Point Theorems
In this paper we present existential and uniqueness results for BVPs associated with 4th order nonlinear singular interface problems on Time Scales. We discuss these results using the classical fixed point theorems of Ba...
Semipre Generalized Homeomorphisms in Intuitionistic Fuzzy Topological Spaces
In this paper we introduce intuitionistic fuzzy semipre generalized homeomorphisms and intuitionistic fuzzy M-semipre generalized homeomorphisms. We investigate some of their properties.
Mode of Entry and Gender as Determinants of Nigerian Pre-service Teachers’ Performance in Degree Mathematics and Science Courses
This study investigated the effects of mode of entry and gender on pre-service teachers’ performance in degree mathematics and science courses. Data were drawn from students’ (125 males and 121 females) final year...
Securing Server System from Buffer Overflow vulnerability using Vel-Alagar Algorithm
Now a day’s buffer overflows have take place the most common target for network based attacks. The main proliferation method used by worms, malicious codes and improper coding by developers. Many techniques have be...