{"title":"After The QALY: Training for a New Start Paradigm in Health Technology Assessment.","authors":"Paul C Langley, Elliott M Sogol","doi":"10.24926/iip.v14i1.5211","DOIUrl":"10.24926/iip.v14i1.5211","url":null,"abstract":"","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10686679/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81803458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some generalizations of fuzzy soft (kˆ *– Â)-quasinormal operators in fuzzy soft Hilbert spaces","authors":"Salim Dawood Mohsen","doi":"10.47974/jim-1612","DOIUrl":"https://doi.org/10.47974/jim-1612","url":null,"abstract":"This article is a continuation of generalizations in field operator theory in mathematics, such as we introduce new classes of fuzzy soft operator, which namely fuzzy soft (kˆ *– Â)-quasinormal operator in fuzzy soft Hilbert space, and shortly FS-(kˆ *– Â)-quasinormal operator. Give the text of the most important of these theorems with explains important properties for this concept and relationships with other types in the same filed finally more characterizations of FS-(kˆ *– Â)-quasinormal operator have been introduced in this article.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135955087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Text encryption with singular values","authors":"Mohammed Abdul-Hameed","doi":"10.47974/jim-1608","DOIUrl":"https://doi.org/10.47974/jim-1608","url":null,"abstract":"In this paper, we will talk about how text is encrypted. Generally, this is done through a number of processes that spread out the later values in a matrix, which is A through remittances are linear and the use of svd enters, including one key where work will start on the application process. New matrices B1 and B2 of the original text matrix are generated in a compound, and the key is entered. The second step of the dispersion involves utilizing SVD on the final matrices and switching the S matrix between the two spectra for the new matrices C1 and C2, which signifies inserting the matrix of the encoded text as correlative F = [C1 C2]. To determine the accuracy of the work, we calculated the matrix of the absolute value of the difference between the matrix of numbers for the original text characters lettering before encryption and the matrix of numbers for text characters after decryption, which resulted in a zero matrix, as well as the calculation of the average values of this matrix which resulted in a zero matrix.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135958061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New problem of Lane Emden type via fractional calculus","authors":"A. Ndiaye, Y. Gouari, Z. Dahmani","doi":"10.47974/jim-1231","DOIUrl":"https://doi.org/10.47974/jim-1231","url":null,"abstract":"We study a nonlinear singular differential equation of Lane Emden type. The problem used the Caputo derivatives and Riemann-Liouville integrals. We first prove an existence and uniqueness result. Another main result is established. At the end, the discussion of two examples to show the applicability of the main results is given. This paper has some relationship with some other papers that have already been published by the same authors.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70464938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some properties of semi (p, e)-convexity","authors":"Rivan Emad Hazim, S. N. Majeed","doi":"10.47974/jim-1481","DOIUrl":"https://doi.org/10.47974/jim-1481","url":null,"abstract":"In this paper, we present a new class of functions called semi (p, e)-convex functions which represent a combination of p- convex and semi e-convex functions. We discuss some important properties and characteristics of this class. For applying this class of new functions to optimize programming, we present some optimality properties such that the cost function of the optimization programming is semi (p, e)-convex and the set of constraints is (p, e)-convex.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70465759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The topological space generated from the graphs by use of some relation","authors":"Z. A. Al-Hasan, M. A. Al-Mselih","doi":"10.47974/jim-1479","DOIUrl":"https://doi.org/10.47974/jim-1479","url":null,"abstract":"In this article, we study the topology and its properties generated from a simple undirected graph with no isolated vertices. We use a simple undirected graph to generate the topology, which connects event edges with the neighboring relationship between vertices, edges, and studies some properties of the graph.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70466000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sandwich results of meromorphic multivalent functions defined by multiplier transform","authors":"Sarah A. Al-Ameedee, Ahmed J. Obaid","doi":"10.47974/jim-1484","DOIUrl":"https://doi.org/10.47974/jim-1484","url":null,"abstract":"We investigate the characteristics of differential subordination for meromorphic multivalent functions and superordination linked to defined multiplier transforms for meromorphic multivalent functions. As a result, we get sandwich outcomes.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70466265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approximation of functions in the Lp.w (X)-space and application","authors":"A. Zaboon","doi":"10.47974/jim-1499","DOIUrl":"https://doi.org/10.47974/jim-1499","url":null,"abstract":"The purpose of this research is to study the approximation of functions in the space Lp.w which is an expansion of the Lebesgue space Lp using the Fejer operator in terms of the average modulus of the second-order with the application of two of the theorems.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70466728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simple method to extract minimal cut sets of a direct network","authors":"R. Fadhil, Zahir Abdul Haddi Hassan","doi":"10.47974/jim-1527","DOIUrl":"https://doi.org/10.47974/jim-1527","url":null,"abstract":"System planning, design, and control, network reliability validation, and evaluation are critical. The enumeration of minimal cut sets (MCs) in a network is usually more complicated than the search for minimal path sets (MPs). The purpose of this research is to offer an efficient accurate approach for enumerating directed networks’ MCs. The method is concerned with determining the MCs depending on the set of minimal path nodes.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70467219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Uhood S. Al-Hassani, S. Kadhim, Muna Jasim Mohammed Ali
{"title":"On Tˉ-pure sub-acts over moniods","authors":"Uhood S. Al-Hassani, S. Kadhim, Muna Jasim Mohammed Ali","doi":"10.47974/jim-1526","DOIUrl":"https://doi.org/10.47974/jim-1526","url":null,"abstract":"The notion of a Tˉ-pure sub-act and so Tˉ-pure sub-act relative to sub-act are introduced. Some properties of these concepts have been studied.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":"1 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70467613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}