• 제목/요약/키워드: Cycle Path

검색결과 247건 처리시간 0.027초

SIGNED A-POLYNOMIALS OF GRAPHS AND POINCARÉ POLYNOMIALS OF REAL TORIC MANIFOLDS

  • Seo, Seunghyun;Shin, Heesung
    • 대한수학회보
    • /
    • 제52권2호
    • /
    • pp.467-481
    • /
    • 2015
  • Choi and Park introduced an invariant of a finite simple graph, called signed a-number, arising from computing certain topological invariants of some specific kinds of real toric manifolds. They also found the signed a-numbers of path graphs, cycle graphs, complete graphs, and star graphs. We introduce a signed a-polynomial which is a generalization of the signed a-number and gives a-, b-, and c-numbers. The signed a-polynomial of a graph G is related to the $Poincar\acute{e}$ polynomial $P_{M(G)}(z)$, which is the generating function for the Betti numbers of the real toric manifold M(G). We give the generating functions for the signed a-polynomials of not only path graphs, cycle graphs, complete graphs, and star graphs, but also complete bipartite graphs and complete multipartite graphs. As a consequence, we find the Euler characteristic number and the Betti numbers of the real toric manifold M(G) for complete multipartite graphs G.

A Survey of Public-Key Cryptography over Non-Abelian Groups

  • Lanel, G.H.J.;Jinasena, T.M.K.K.;Welihinda, B.A.K.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.289-300
    • /
    • 2021
  • Non-abelian group based Cryptography is a field which has become a latest trend in research due to increasing vulnerabilities associated with the abelian group based cryptosystems which are in use at present and the interesting algebraic properties associated that can be thought to provide higher security. When developing cryptographic primitives based on non-abelian groups, the researchers have tried to extend the similar layouts associated with the traditional underlying mathematical problems and assumptions by almost mimicking their operations which is fascinating even to observe. This survey contributes in highlighting the different analogous extensions of traditional assumptions presented by various authors and a set of open problems. Further, suggestions to apply the Hamiltonian Cycle/Path Problem in a similar direction is presented.

고장난 재귀원형군의 사이클 임베딩 (Cycle Embedding of Faulty Recursive Circulants)

  • 박정흠
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제31권1_2호
    • /
    • pp.86-94
    • /
    • 2004
  • 이 논문에서는 재귀원형군 $ G(2^m, 4), m{\geq}3$은 고장인 요소의 수가 m-2개 이하일 때, 임의의 1, 4 ${\leq}1{\leq}2^m-f_v$에 대하여 길이 1인 고장 없는 사이클을 가짐을 보인다. 여기서, f$_{v}$ 는 고장 정점의 수이다. 이를 위하여, |F|$\leq$k인 임의의 고장 요소 집합 F에 대해서 G-F가 임의의 두 정점을 잇는 길이가 해밀톤 경로보다 하나 작은 경로를 가질 때, G를 k-고장 하이포해밀톤 연결된 그래프라고 정의하고, $ G(2^m, 4), m{\geq}3$은 m-3-고장 하이포해밀톤 연결된 그래프임을 보인다.

듀티사이클 무선센서네트워크에서 저전력과 저지연을 위한 다중경로 라우팅 프로토콜의 설계 (Design of a multipath routing protocol for energy-efficiency and low-delay in duty-cycled wireless sensor networks)

  • 이형근
    • 전기전자학회논문지
    • /
    • 제24권1호
    • /
    • pp.326-332
    • /
    • 2020
  • 본 논문은 듀티사이클 기반의 무선센서네트워크에서 에너지 효율성을 높이고 시간 지연을 줄일 수 있는 경로설정을 위해 새로운 라우팅 메트릭을 고안하고 이를 활용한 라우팅 프로토콜을 제안한다. 듀티사이클을 고려한 새로운 라우팅 메트릭인 EDW 메트릭을 사용함으로써 에너지 효율적이며 저지연의 경로를 설정할 수 있다. 본 논문에서는 새로운 라우팅 메트릭을 적용하는 크로스레이어 기반의 다중경로 라우팅 프로토콜을 제안하고 실험을 통해 낮은 전송 지연시간과 적은 에너지소비를 확인하였다.

공기 가진력에 의한 팬 블레이드 구조 안정성 평가에 관한 연구 (A study on the Structural Stability about the Fan Blade by the Air Excited Forces.)

  • 정규강;김경희;조생현
    • 한국추진공학회지
    • /
    • 제4권1호
    • /
    • pp.93-101
    • /
    • 2000
  • 엔진 운용 중에 유로(flow Path)에 놓여 있는 팬 블레이드(blade)들은 많은 외부하중에 노출되어 있어서 고주기 피로(high cycle fatigue)에 의한 피로 파괴의 위험성이 크다. 그 중 가장 중요하게 평가되는 것이 주기적인 가진력에 의한 공진 현상과 그에 따른 피로파괴 가능성이다. 본 논문에서는 유동장 (flow field)이 지주(struts)에 의해 영향을 받게 되고, 이러한 유동장의 분포가 지주 후방에서 주기함수 형태로 팬 블레이드를 가진 할 때, 팬 블레이드에서의 진동 응답 특성과 구조적인 안정성을 평가하였다. 팬 블레이드의 피로강도를 시험적으로 평가하고, 팬 블레이드 전방 지주에 의한 공기 가진력을 가정하여 유한 요소 해석을 통한 구조적 안정성을 평가하였다. 그리고 엔진 시험에서 측정된 서지 압력 하중을 팬 블레이드의 유한요소 모델에 적용하여 구조적 영향을 평가함으로써 팬 블레이드의 구조적인 안정성을 확인하였다.

  • PDF

사이클 문제를 고려한 2층채널 배선기에 관한 연구 (A Study on a 2 Layer Channel Router Considering Cycle Problems)

  • Kim, Seung-Youn
    • 대한전자공학회논문지
    • /
    • 제25권2호
    • /
    • pp.102-108
    • /
    • 1988
  • In this paper, a channel routing algorithm which considers cycle problem is proposed. The requirements of routing is given by pin numbers which imply interconnections between a upper block and lower block of the channel. Output is represented by interconnections among equipotential pins. When input is given, the algorithm constructs a channel representation graph and makes weight of each net. And then it checks cycle and finidhes the routing. If the cycle is detected, it finds path with maze routing. This algorithm have coded in C language on IBM-PC /AT. If cycle is not detected, the results are near optimal values. If it is detected, routing is possible as well.

  • PDF

FUSS-NARAYANA STATISTICS

  • Kim, Sangwook
    • 충청수학회지
    • /
    • 제35권4호
    • /
    • pp.335-343
    • /
    • 2022
  • We show that valleys, high peaks, and modular ascents are statistics of Fuss-Catalan paths having a distribution given by the Fuss-Narayana number. We prove the results using the Cycle Lemma and provide bijections among them. We also show that relative peaks are independent of the base path. In particular, valleys and high peaks can be obtained from relative peaks by fixing the base path in certain ways.

대화형 작업장 프로그래밍을 위한 최소 시간 포켓 가공 싸이클 (The minimum time pocketing cycle for the dialog workshop oriented programming)

  • 류제석;강성균;전용주
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1996년도 한국자동제어학술회의논문집(국내학술편); 포항공과대학교, 포항; 24-26 Oct. 1996
    • /
    • pp.848-851
    • /
    • 1996
  • Based on the minimum cutting time criteria, the tool path generation algorithm of a pocket machining is developed as a form of a built-in cycle for the WOP(workshop oriented programming) of a CNC controller. Based on the given CAD database and tool information, an optimal cutting depth and geometric properties can be generated, then six different tool paths will be generated internally and automatically. Finally, the G code which commands tool movements is generated for CNC machining.

  • PDF

모바일 센서 네트워크에서 최단거리 멀티홉 전송을 위한 강한연결 클러스터 기법 (Strong Connection Clustering Scheme for Shortest Distance Multi-hop Transmission in Mobile Sensor Networks)

  • 우매리
    • 한국멀티미디어학회논문지
    • /
    • 제21권6호
    • /
    • pp.667-677
    • /
    • 2018
  • Since sensor networks consist of sensor nodes with limited energy resources, so efficient energy use of sensor nodes is very important in the design of sensor networks. Sensor nodes consume a lot of energy for data transmission. Clustering technique is used to efficiently use energy in data transmission. Recently, mobile sink techniques have been proposed to reduce the energy load concentrated on the cluster header near a sink node. The CMS(Cluster-based Mobile sink) technique minimizes the generation of control messages by creating a data transmission path while creating clusters, and supports the inter-cluster one-hop transmission. But, there is a case where there is no connectivity between neighbor clusters, it causes a problem of having a long hop data transmission path regardless of local distance. In this paper, we propose a SCBC(Strong connection balancing cluster) to support the path of the minimum number of hops. The proposed scheme minimizes the number of hops in the data transmission path and supports efficient use of energy in the cluster header. This also minimizes a number of hops in data transmission paths even when the sink moves and establishes a new path, and it supports the effect of extending the life cycle of the entire sensor network.

Stability-based On-demand Multi-path Distance Vector Protocol for Edge Internet of Things

  • Dongzhi Cao;Peng Liang;Tongjuan Wu;Shiqiang Zhang;Zhenhu Ning
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권10호
    • /
    • pp.2658-2681
    • /
    • 2023
  • In edge computing scenarios, IoT end devices play a crucial role in relaying and forwarding data to significantly improve IoT network performance. However, traditional routing mechanisms are not applicable to this scenario due to differences in network size and environment. Therefore, it becomes crucial to establish an effective and reliable data transmission path to ensure secure communication between devices. In this paper, we propose a trusted path selection strategy that comprehensively considers multiple attributes, such as link stability and edge cooperation, and selects a stable and secure data transmission path based on the link life cycle, energy level, trust level, and authentication status. In addition, we propose the Stability-based On-demand Multipath Distance Vector (STAOMDV) protocol based on the Ad hoc AOMDV protocol. The STAOMDV protocol implements the collection and updating of link stability attributes during the route discovery and maintenance process. By integrating the STAOMDV protocol with the proposed path selection strategy, a dependable and efficient routing mechanism is established for IoT networks in edge computing scenarios. Simulation results validate that the proposed STAOMDV model achieves a balance in network energy consumption and extends the overall network lifespan.