##### Elements Weakly Prime and Weakly Primary to Another Element

C. S. Manjarekar, A. N. Chavan

Journal of Advances in Mathematics and Computer Science, Page 1-8
DOI: 10.9734/BJMCS/2016/24931

Let L be a compactly generated multiplicative lattice with 1 compact in which every finite product of compact elements is compact and M be a module over L. In this paper we generalize the concepts of an element prime to another element and an element primary to another element in a lattice module M and obtain the characterizations of an element prime to another element and an element primary to another element in a lattice module.

##### Fast Calculation of Linear Finite Element Method for the Stationary Fractional Advection Dispersion Equations

Zhiqiang Zhou, Hongying Wu

Journal of Advances in Mathematics and Computer Science, Page 1-15
DOI: 10.9734/BJMCS/2016/25617

Appropriate variational formulation and detailed implementation of linear finite element for the stationary fractional advection dispersion equation(FADE) are discussed. Since fractional derivative is nonlocal operator, the stiffness matrix of finite element on traditional variational formulation for FADE is no longer sparse and the computation becomes costly. In this paper, we establish some fractional order integral and differential formulas for linear interpolation basis functions, and then design a special variational formulation which makes the stiffness matrix possess some good properties, such as quasi-symmetry, quasi-sparseness and strictly diagonally domination. These properties are very important in reducing the computational cost and guaranteeing the stability of finite element equations. Numerical examples demonstrating these properties are presented and the applications in contaminant transport in groundwater flow are given.

##### On the Spacelike Curves of R41

M. Aykut Akgun, A. Ihsan Sivridag

Journal of Advances in Mathematics and Computer Science, Page 1-10
DOI: 10.9734/BJMCS/2016/24922

In this paper, we investigate the position vectors of spacelike curves in terms of their curvature functions and give some characterizations for these curves to lie on some subspaces of .

##### A Wireless Sensor Network for Examination Attendance Management System

I. F. Obayemi, O. T. Arulogun, A. S. Falohun

Journal of Advances in Mathematics and Computer Science, Page 1-12
DOI: 10.9734/BJMCS/2016/24661

Every academic institute has special concerns for student’s attendance in examination halls. At present, in developing countries attendance is usually taken using paper sheets and the old file system. The effectiveness of this style is low because it is highly labor-intensive, error-prone, susceptible to examination malpractices, time wastage, data manipulation, and impersonation among others. On the other hand, Wireless Sensor Network is concerned with using sensors technology to acquire, store, trace and transfer examination attendance data to the host computer for report generation and data analysis.

The system uses fingerprint recognition as well as Wireless Sensors technique for obtaining student’s examination attendance, porter registration of courses and tuition payment clearance. The design was achieved with the system divided into units of operation and each unit is designed as a single entity and later combined into a whole.

The proposed solution is limited to four nodes and a server. The nodes can communicate with the Server via signaling. The transmitter used is connected to a fingerprint interface unit and a database server and can only transmit through a distance of approximately 100metres.The four nodes were arranged using a star topology network.

##### A Survey on Kannan Mappings in Universalized Metric Spaces

Ali Mutlu, Nermin Yolcu, Berrin Mutlu

Journal of Advances in Mathematics and Computer Science, Page 1-6
DOI: 10.9734/BJMCS/2016/25443

In this manuscript, firstly, Kannan contraction type mapping is universalised. Secondly, the unique fixed point of the universalized Kannan contraction type mappings in universalized metric space is verified. Furthermore, we clarify that it can not have a fixed point in metric space.

##### Tsĝ-space in Topological Spaces

M. M. El-Sharkasy

Journal of Advances in Mathematics and Computer Science, Page 1-7
DOI: 10.9734/BJMCS/2016/25602

The aim of this paper is to introduce and study the class of sĝ-closed sets, which is properly placed between the classes of semi-closed sets due to Crossley and Hildebrand in 1974 and gs-closed sets due to Arya and Nour in 1990. Also, we investigated the relations of anew notion and the other notions of generalized closed. Moreover as applications, using the notion of sĝ-closed sets, we introduce a new space called T-space.

##### Cournot and Stackelberg Equilibria in an Asymmetric Duopoly

Ivan G. Ivanov, Tonya Mateva

Journal of Advances in Mathematics and Computer Science, Page 1-13
DOI: 10.9734/BJMCS/2016/25705

Aims/Objectives: To study an asymmetric duopoly in gas market where two players produce a homogeneous commodity. One of the players maximizes its profit, while the other- its revenue. The asymmetry also includes a security constraint, saying that the revenue- maximizing player can sell no more than a certain proportion of the quantity of its rival.
Study Design: Interdisciplinary study.
Place and Duration of Study: Department of Information Technologies, College of Dobrich, Shumen University, Bulgaria, between October 2015 and February 2016.
Methodology: We assume that the industry is duopolistic, the product is homogeneous- natural gas and storage is impossible. We impose a security constraint that one of the players cannot produce more than a certain proportion of its rival's quantity and behaves as a revenue maximizer. Cournot and Stackelberg are compared, with and without security constraint.
Results: Results we have reached can be generalized as follows: There is an continuum of Nash- Cournot equilibria and theconstraint is active under some additional conditions; Stackelberg equilibrium is unique; In both Stackelberg and Cournot model the security constraint punishes player f and rewards player l; Stackelberg game with active security constraint punishes even further player f and the revenue is even lower compared to unconstrained market conditions; As typical to oligopolistic markets price is higher and quantity sold is lower even under imposed security constraint; A special Nash- Cournot equilibrium exists where player f maximizes its revenue. An additional condition should be introduced.
Conclusion: We estimate the constraint's impact on profits, consumer surplus, quantities and price. In addition we offer a special case where one of the player maximizes its revenue and the other earns the highest possible profit.