In this paper, we introduce a new class of sets called τ *-generalized closed sets and τ *-generalized open sets in topological spaces and study some of their properties .
In this paper, we introduce the new notions τ*-gλ– closed sets and τ*-gλ– open sets τ*-gλ– continuous maps in Topological spaces. Also we introduce a new space called T τ *-gλ-space. We study some of its properties in Topological spaces.
In this paper we introduce rw-closed map from a topological space X to a topological space Y as the image of every closed set is rw-closed and also we prove that the composition of two rw-closed maps need not be rw-closed map. We also obtain some properties of rw-closed maps. Generalized closed mappings were introduce and studied by Malghan.wg-closed… (More)
The aim of this paper is to introduce and study the concepts of prefilters in intuitionistic fuzzy topological spaces.
We introduce a new set called smg-closed which are defined on a family of sets satisfying some minimal conditions. It is investigated that this set is a stronger form of mg-closed sets due to T. Noiri. This set enable us to unify certain kind of modifications of strongly generalized closed sets due to Sundaram and Pushpalatha .
In this paper, we define the notions of inverse strong non-split r-dominating set and inverse strong non-split r-domination number γ′ sns r(G) of a graph G. We characterize graphs for which γ sns r(G) + γ′ sns r(G) = n, where γ sns r(G) is the strong non-split r-domination number of G. We get many bounds on γ′ sns r(G). Nordhaus-Gaddum type results are also… (More)
In this paper, we introduce the new notions í µí¼ *-g– closed sets and í µí¼ *-g– open sets í µí¼ *-g– continuous maps in Topological spaces. Also we introduce a new space called T τ *-gλ-space. We study some of its properties in Topological spaces. Keywords í µí¼ *-g– closed sets , í µí¼ *-g– open sets , í µí¼ *-g– continuous maps, T τ… (More)
Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs).We propose an iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment. The basic idea of iTrust is introducing a periodically available Trusted Authority (TA) to judge the node's… (More)
A bijection f: (X,) → (Y, σ) is called regular weakly homeomorphism if f and f-1 are rw-continuous. Also we introduce new class of maps namely rw-homeomorphism. This class of maps is closed under composition of maps.
Given an k-tuple of vectors, S = (v1, v2, · · · , v k), the neighborhood adjacency code of a vertex v with respect to S, denoted by ncS(v) and defined by (a1, a2, · · · , a k) where ai is 1 if v and vi are adjacent and 0 otherwise. S is called a Smarandachely neighborhood resolving set on subset V ′ ⊂ V (G) if ncS(u) = ncS(v) for any u, v ∈ V ′.… (More)