• Title/Summary/Keyword: Behavior Graph

Search Result 168, Processing Time 0.022 seconds

Microwave Network Study by Bond Graph Approach. Application to Tow-Port Network Filter

  • Jmal, Sabri;Taghouti, Hichem;Mami, Abdelkader
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.121-128
    • /
    • 2022
  • There are much processing techniques of microwave circuits, whose dimensions are small compared to the wavelength, but the disadvantage is that they cannot be directly applied to circuits working at high and/or low frequencies. In this article, we will consider the bond graph approach as a tool for analyzing and understanding the behavior of microwave circuits, and to show how basic circuit and network concepts can be extended to handle many microwaves analysis and design problems of practical interest. This behavior revealed in the scattering matrix filter, and which will be operated from its reduced bond graph model. So, we propose in this paper, a new application of bond graph approach jointly with the scattering bond graph for a high frequency study.

k-PRIME CORDIAL GRAPHS

  • PONRAJ, R.;SINGH, RAJPAL;KALA, R.;NARAYANAN, S. SATHISH
    • Journal of applied mathematics & informatics
    • /
    • v.34 no.3_4
    • /
    • pp.227-237
    • /
    • 2016
  • In this paper we introduce a new graph labeling called k-prime cordial labeling. Let G be a (p, q) graph and 2 ≤ p ≤ k. Let f : V (G) → {1, 2, . . . , k} be a map. For each edge uv, assign the label gcd (f(u), f(v)). f is called a k-prime cordial labeling of G if |vf (i) − vf (j)| ≤ 1, i, j ∈ {1, 2, . . . , k} and |ef (0) − ef (1)| ≤ 1 where vf (x) denotes the number of vertices labeled with x, ef (1) and ef (0) respectively denote the number of edges labeled with 1 and not labeled with 1. A graph with a k-prime cordial labeling is called a k-prime cordial graph. In this paper we investigate the k-prime cordial labeling behavior of a star and we have proved that every graph is a subgraph of a k-prime cordial graph. Also we investigate the 3-prime cordial labeling behavior of path, cycle, complete graph, wheel, comb and some more standard graphs.

ON PAIR MEAN CORDIAL GRAPHS

  • R. PONRAJ;S. PRABHU
    • Journal of Applied and Pure Mathematics
    • /
    • v.5 no.3_4
    • /
    • pp.237-253
    • /
    • 2023
  • Let a graph G = (V, E) be a (p, q) graph. Define $${\rho}=\{\array{{\frac{p}{2}} & \;\;p\text{ is even} \\ {\frac{p-1}{2}} & \;\;p\text{ is odd,}$$ and M = {±1, ±2, … ± ρ} called the set of labels. Consider a mapping λ : V → M by assigning different labels in M to the different elements of V when p is even and different labels in M to p - 1 elements of V and repeating a label for the remaining one vertex when p is odd. The labeling as defined above is said to be a pair mean cordial labeling if for each edge uv of G, there exists a labeling ${\frac{{\lambda}(u)+{\lambda}(v)}{2}}$ if λ(u) + λ(v) is even and ${\frac{{\lambda}(u)+{\lambda}(v)+1}{2}}$ if λ(u) + λ(v) is odd such that ${\mid}{\bar{{\mathbb{S}}}}_{\lambda}{_1}-{\bar{{\mathbb{S}}}}_{{\lambda}^c_1}{\mid}{\leq}1$ where ${\bar{{\mathbb{S}}}}_{\lambda}{_1}$ and ${\bar{{\mathbb{S}}}}_{{\lambda}^c_1}$ respectively denote the number of edges labeled with 1 and the number of edges not labeled with 1. A graph G for which there exists a pair mean cordial labeling is called a pair mean cordial graph. In this paper, we investigate the pair mean cordial labeling behavior of few graphs including the closed helm graph, web graph, jewel graph, sunflower graph, flower graph, tadpole graph, dumbbell graph, umbrella graph, butterfly graph, jelly fish, triangular book graph, quadrilateral book graph.

Synthesis of the Fault-Causality Graph Model for Fault Diagnosis in Chemical Processes Based On Role-Behavior Modeling (역할-거동 모델링에 기반한 화학공정 이상 진단을 위한 이상-인과 그래프 모델의 합성)

  • 이동언;어수영;윤인섭
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.5
    • /
    • pp.450-457
    • /
    • 2004
  • In this research, the automatic synthesis of knowledge models is proposed. which are the basis of the methods using qualitative models adapted widely in fault diagnosis and hazard evaluation of chemical processes. To provide an easy and fast way to construct accurate causal model of the target process, the Role-Behavior modeling method is developed to represent the knowledge of modularized process units. In this modeling method, Fault-Behavior model and Structure-Role model present the relationship of the internal behaviors and faults in the process units and the relationship between process units respectively. Through the multiple modeling techniques, the knowledge is separated into what is independent of process and dependent on process to provide the extensibility and portability in model building, and possibility in the automatic synthesis. By taking advantage of the Role-Behavior Model, an algorithm is proposed to synthesize the plant-wide causal model, Fault-Causality Graph (FCG) from specific Fault-Behavior models of the each unit process, which are derived from generic Fault-Behavior models and Structure-Role model. To validate the proposed modeling method and algorithm, a system for building FCG model is developed on G2, an expert system development tool. Case study such as CSTR with recycle using the developed system showed that the proposed method and algorithm were remarkably effective in synthesizing the causal knowledge models for diagnosis of chemical processes.

An Analysis on Mathematical Thinking Processes of Gifted Students Using Problem Behavior Graph (PBG(Problem Behavior Graph)를 이용한 수학적 사고 과정 분석)

  • Kang, Eun-Joo;Hong, Jin-Kon
    • Communications of Mathematical Education
    • /
    • v.23 no.3
    • /
    • pp.545-562
    • /
    • 2009
  • This study is trying to analyze characteristics of mathematical thinking processes of the mathematical gifted students in an objective and a systematic way, by using "Protocol Analysis Method"and "Problem Behavior Graph" which is suggested by Newell and Simon as a qualitative analysis. In this study, four middle school students with high achievement in math were selected as subjects-two students for mathematical gifted group and the other two for control group also with high scores in math. The thinking characteristics of the four subjects, shown in the course of solving problems, were elicited, analyzed and compared, through the use of the creative test questionnaires which were supposed to clearly reveal the characteristics of mathematical gifted students' thinking processes. The results showed that there were several differences between the two groups-the mathematical gifted student group and their control group in their mathematical talents. From these case studies, we could say that it is significant to find out the characteristics of mathematical thinking processes of the mathematical gifted students in a more scientific way, in the sense that this result can be very useful to provide them with the chances to get more proper education by making clear the nature of thinking processes of the mathematical gifted students.

  • PDF

Graph Database Design and Implementation for Ransomware Detection (랜섬웨어 탐지를 위한 그래프 데이터베이스 설계 및 구현)

  • Choi, Do-Hyeon
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.24-32
    • /
    • 2021
  • Recently, ransomware attacks have been infected through various channels such as e-mail, phishing, and device hacking, and the extent of the damage is increasing rapidly. However, existing known malware (static/dynamic) analysis engines are very difficult to detect/block against novel ransomware that has evolved like Advanced Persistent Threat (APT) attacks. This work proposes a method for modeling ransomware malicious behavior based on graph databases and detecting novel multi-complex malicious behavior for ransomware. Studies confirm that pattern detection of ransomware is possible in novel graph database environments that differ from existing relational databases. Furthermore, we prove that the associative analysis technique of graph theory is significantly efficient for ransomware analysis performance.

An Analysis on the Web Usage Pattern Graph Using Web Users' Access Information (웹 이용자의 접속 정보 분석을 통한 웹 활용 그래프의 구성 및 분석)

  • Kim, Hu-Gon;Kim, Jae-Gyo
    • Korean Management Science Review
    • /
    • v.23 no.3
    • /
    • pp.63-75
    • /
    • 2006
  • There are many kinds of research on web graph, most of them are focus on the hyperlinked structure of the web graph. Well known results on the web graph are rich-get-richer phenomenon, small-world phenomenon, scale-free network, etc. In this paper, we define 3 new directed web graph, so called the Web Usage Pattern Graph (WUPG), that nodes represent web sites arid arcs between nodes represent a movement between two sites by users' browsing behavior. The data to constructing the WUPG, approximately 56,000 records, are gathered from some users' PCs. The results analysing the data summarized as follows : (i) extremely rich-get-richer phenomenon (ii) average path length between sites is significantly less than the previous one (iii) less external hyperlinks, more internal hyperlinks.

Transient Analysis of Self-Powered Energy-Harvesting using Bond-Graph

  • Makihara, Kanjuro;Shigeta, Daisuke;Fujita, Yoshiyuki;Yamamoto, Yuta
    • International Journal of Aerospace System Engineering
    • /
    • v.2 no.1
    • /
    • pp.47-52
    • /
    • 2015
  • The transient phenomenon of self-powered energy-harvesting is assessed using a bond-graph method. The bond-graph is an energy-based approach to describing physical-dynamic systems. It shows power flow graphically, which helps us understand the behavior of complicated systems in simple terms. Because energy-harvesting involves conversion of power in mechanical form to the electrical one, the bond-graph is a good tool to analyze this power flow. Although the bond-graph method can be used to calculate the dynamics of combining mechanical and electrical systems simultaneously, it has not been used for harvesting analysis. We demonstrate the usability and versatility of bond-graph for not only steady analysis but also transient analysis of harvesting.

An analysis on the web usage pattern graph using web users' access information (웹 이용자의 접속 정보 분석을 통한 웹 활용 그래프의 구성 및 분석)

  • Kim, Hu-Gon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.10a
    • /
    • pp.422-440
    • /
    • 2005
  • There are many kinds of research on web graph, most of them are focus on the hyperlinked structure of the web graph. Well known results on the web graph are rich-get-richer phenomenon, small-world phenomenon, scale-free network, etc. In this paper, we define a new directed web graph, so called the Web Usage Pattern Graph (WUPG), that nodes represent web sites and arcs between nodes represent a movement between two sites by users' browsing behavior. The data to constructing the WUPG, approximately 56,000 records, are gathered in the Kyungsung University. The results analysing the data summarized as follows: (i) extremely rich-get-richer phenomenon (ii) average path length between sites is significantly less than the previous one (iii) less external hyperlinks, more internal hyperlinks

  • PDF