• Title/Summary/Keyword: Engineering graph

Search Result 1,417, Processing Time 0.032 seconds

Polygon Modeling with Constraint Management (구속조건 관리를 이용한 다각형 모델링)

  • 김기현;김재정
    • Korean Journal of Computational Design and Engineering
    • /
    • v.3 no.3
    • /
    • pp.145-153
    • /
    • 1998
  • An approach has been developed to generate parametric models with Boolean operations. The approach combines Boolean operations and graph manipulation on the constraints imposed on primitives. A Boolean operation is first performed on two primitives and new geometric elements such as vertices and edges are computed. Then to generate the constraint graph of the polygon the each constraints graph of two primitives are merged by adding the new geometric elements with its corresponding constraints. In the merging process, some of the geometric elements belonging to the primitives may be eliminated based on its contribution to the polygon. A computer implementation in a 2D space is described to illustrate the approach with examples.

  • PDF

A Label Graph Based Verifiable Secret Sharing Scheme for General Access Structures

  • Hsu, Ching-Fang;Zeng, Bing;Cheng, Qi
    • Journal of Communications and Networks
    • /
    • v.15 no.4
    • /
    • pp.407-410
    • /
    • 2013
  • Secret sharing is that a dealer distributes a piece of information (called a share) about a secret to each participant such that authorized subsets of participants can reconstruct the secret but unauthorized subsets of participants cannot determine the secret. In this paper, an access structure can be represented by a label graph G, where a vertex denotes a participant and a complete subgraph of G corresponds to a minimal authorized subset. The vertices of G are labeled into distinct vectors uniquely determined by the maximum prohibited structure. Based on such a label graph, a verifiable secret sharing scheme realizing general access structures is proposed. A major advantage of this scheme is that it applies to any access structure, rather than only structures representable as previous graphs, i.e., the access structures of rank two. Furthermore, verifiability of the proposed scheme can resist possible internal attack performed by malicious participants, who want to obtain additional shares or provide a fake share to other participants.

AN iP2 EXTENDED STAR GRAPH AND ITS HARMONIOUS CHROMATIC NUMBER

  • P. MANSOOR;A. SADIQUALI
    • Journal of applied mathematics & informatics
    • /
    • v.41 no.6
    • /
    • pp.1193-1207
    • /
    • 2023
  • In this paper, we introduce an iP2 extension of a star graph Sn for n ≥ 2 and 1 ≤ i ≤ n - 1. Certain general properties satisfied by order, size, domination (or Roman) numbers γ (or γR) of an iP2 extended star graph are studied. Finally, we study how the parameters such as chromatic number and harmonious chromatic number are affected when an iP2 extension process acts on the star graphs.

Stability Assessment of Underground Limestone Mine Openings by Stability Graph Method (Stability graph method에 의한 석회석 지하채굴 공동의 안정성 평가)

  • Sunwoo Choon;Jung Yong-Bok
    • Tunnel and Underground Space
    • /
    • v.15 no.5 s.58
    • /
    • pp.369-377
    • /
    • 2005
  • The stability of underground openings is a major concern for the safety and productivity of mining operations. Rock mass classification methods provide the basis of many empirical design methods as well as a basis for numerical analysis. Of the many factors which influence the stability of openings, the span of the opening for a given rock mass condition provides an important parameter of design. In this paper, the critical span curves proposed by Lang, the Mathews stability graph method and the modified critical span curve suggested by the authors have been assessed. The modified critical span curve was proposed by using Mathews stability graph method. The modified critical span curve by the author have been used to assess the stability of underground openings in several limestone mines.

Analysis of Bubblesort graph's connectivity which has a conditions for limitations (제약 조건을 갖는 버블정렬 그래프의 연결도 분석)

  • Seo, Joungh-hung;Lee, Hyeong-ok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.321-324
    • /
    • 2017
  • Bubblesort graph is mathematically modeled with bubbling methods, which can arrange data. Bubblesort graph Bn's degree is n, it's routing path length ${\frac{n(n-1)}{2}}$, and its network cost is $O(n^3)$. In this paper we suggest the number of Bubblesort graph's degree reduced to half as a solution to improve the network cost of Bubblesort graph. The Bubblesort graph which has the following restriction is a connected graph randomly from node U to node V for routing.

  • PDF

The Implementation of Graph-based SLAM Using General Graph Optimization (일반 그래프 최적화를 활용한 그래프 기반 SLAM 구현)

  • Ko, Nak-Yong;Chung, Jun-Hyuk;Jeong, Da-Bin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.4
    • /
    • pp.637-644
    • /
    • 2019
  • This paper describes an implementation of a graph-based simultaneous localization and mapping(SLAM) method called the General Graph Optimization. The General Graph Optimization formulates the SLAM problem using nodes and edges. The nodes represent the location and attitude of a robot in time sequence, and the edge between the nodes depict the constraint between the nodes. The constraints are imposed by sensor measurements. The General Graph Optimization solves the problem by optimizing the performance index determined by the constraints. The implementation is verified using the measurement data sets which are open for test of various SLAM methods.

Face Recognition based on Weber Symmetrical Local Graph Structure

  • Yang, Jucheng;Zhang, Lingchao;Wang, Yuan;Zhao, Tingting;Sun, Wenhui;Park, Dong Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1748-1759
    • /
    • 2018
  • Weber Local Descriptor (WLD) is a stable and effective feature extraction algorithm, which is based on Weber's Law. It calculates the differential excitation information and direction information, and then integrates them to get the feature information of the image. However, WLD only considers the center pixel and its contrast with its surrounding pixels when calculating the differential excitation information. As a result, the illumination variation is relatively sensitive, and the selection of the neighbor area is rather small. This may make the whole information is divided into small pieces, thus, it is difficult to be recognized. In order to overcome this problem, this paper proposes Weber Symmetrical Local Graph Structure (WSLGS), which constructs the graph structure based on the $5{\times}5$ neighborhood. Then the information obtained is regarded as the differential excitation information. Finally, we demonstrate the effectiveness of our proposed method on the database of ORL, JAFFE and our own built database, high-definition infrared faces. The experimental results show that WSLGS provides higher recognition rate and shorter image processing time compared with traditional algorithms.

Reliability Evaluation of Electrical Distribution Network Containing Distributed Generation Using Directed-Relation-Graph

  • Yang, He-Jun;Xie, Kai-Gui;Wai, Rong-Jong;Li, Chun-Yan
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.4
    • /
    • pp.1188-1195
    • /
    • 2014
  • This paper presents an analytical technique for reliability evaluation of electrical distribution network (EDN) containing distributed generation (DG). Based on hierarchical levels of circuit breaker controlling zones and feeder sections, a directed-relation-graph (DRG) for an END is formed to describe the hierarchical structure of the EDN. The reliability indices of EDN and load points can be evaluated directly using the formed DRG, and the reliability evaluation of an EDN containing DGs can also be done without re-forming the DRG. The proposed technique incorporates multi-state models of photovoltaic and diesel generations, as well as weather factors. The IEEE-RBTS Bus 6 EDN is used to validate the proposed technique; and a practical campus EDN containing DG was also analyzed using the proposed technique.

Crack detection in concrete slabs by graph-based anomalies calculation

  • Sun, Weifang;Zhou, Yuqing;Xiang, Jiawei;Chen, Binqiang;Feng, Wei
    • Smart Structures and Systems
    • /
    • v.29 no.3
    • /
    • pp.421-431
    • /
    • 2022
  • Concrete slab cracks monitoring of modern high-speed railway is important for safety and reliability of train operation, to prevent catastrophic failure, and to reduce maintenance costs. This paper proposes a curvature filtering improved crack detection method in concrete slabs of high-speed railway via graph-based anomalies calculation. Firstly, large curvature information contained in the images is extracted for the crack identification based on an improved curvature filtering method. Secondly, a graph-based model is developed for the image sub-blocks anomalies calculation where the baseline of the sub-blocks is acquired by crack-free samples. Once the anomaly is large than the acquired baseline, the sub-block is considered as crack-contained block. The experimental results indicate that the proposed method performs better than convolutional neural network method even under different curvature structures and illumination conditions. This work therefore provides a useful tool for concrete slabs crack detection and is broadly applicable to variety of infrastructure systems.

A new meta-heuristic optimization algorithm using star graph

  • Gharebaghi, Saeed Asil;Kaveh, Ali;Ardalan Asl, Mohammad
    • Smart Structures and Systems
    • /
    • v.20 no.1
    • /
    • pp.99-114
    • /
    • 2017
  • In cognitive science, it is illustrated how the collective opinions of a group of individuals answers to questions involving quantity estimation. One example of this approach is introduced in this article as Star Graph (SG) algorithm. This graph describes the details of communication among individuals to share their information and make a new decision. A new labyrinthine network of neighbors is defined in the decision-making process of the algorithm. In order to prevent getting trapped in local optima, the neighboring networks are regenerated in each iteration of the algorithm. In this algorithm, the normal distribution is utilized for a group of agents with the best results (guidance group) to replace the existing infeasible solutions. Here, some new functions are introduced to provide a high convergence for the method. These functions not only increase the local and global search capabilities but also require less computational effort. Various benchmark functions and engineering problems are examined and the results are compared with those of some other algorithms to show the capability and performance of the presented method.