共查询到20条相似文献,搜索用时 15 毫秒
1.
ZHANG Xian-di LI Man-li 《中国电子科技》2005,3(3):280-283
Parameters k-distance and k-diameter are extension of the distance and the diameter in graph theory. In this paper, the k-distance dk (x,y) between the any vertices x and y is first obtained in a connected circulant graph G with order n (n is even) and degree 3 by removing some vertices from the neighbour set of the x. Then, the k-diameters of the connected circulant graphs with order n and degree 3 are given by using the k-diameter dk (x,y). 相似文献
2.
Parameters k-distance and k-diameter are extension of the distance and the diameter in graph theory. In this paper, the k-distance dk(x,y) between the any vertices x and y is first obtained in a connected circulant graph G with order n(n is even) and degree 3 by removing some vertices from the neighbour set of the x. Then, the k-diameters of the connected circulant graphs with order n and degree 3 are given by using the k-diameter dk(x,y). 相似文献
3.
ZHANG Xian-di 《电子科技学刊:英文版》2004,2(4):72-75
The diameter of a graph G is the maximal distance between pairs of vertices of G. When a network is modeled as a graph, diameter is a measurement for maximum transmission delay. The k-diameter dk(G) of a graph G, which deals with k internally disjoint paths between pairs of vertices of G, is a extension of the diameter of G. It has widely studied in graph theory and computer science. The circulant graph is a group-theoretic model of a class of symmetric interconnection network. Let Cn(i, n/2) be a circulant graph of order n whose spanning elements are i and n/2, where n4 and n is even. In this paper, the diameter, 2-diameter and 3-diameter of the Cn(i, n/2) are all obtained if gcd(n,i)=1, where the symbol gcd(n,i) denotes the maximum common divisor of n and i. 相似文献
4.
针对大规模移动对象网络在构建图立方体的过程中产生的大量浓缩图,引入了图压缩的思想,提出了进一步压缩浓缩图的算法MC-compress,用来合并浓缩图中顶点和相应的边.通过将图中相邻的两个顶点进行合并,再比较两条边合并后权重的最大差异度,从而找出最优的合并顶点对,最终产生构建压缩图的超级顶点和超级边.通过压缩图结构,加快了在图立方体上查询图结构的显示过程,减少了构建图立方体过程中存储大量浓缩图的空间. 相似文献
5.
图谱理论是图论研究的重要领域之一,也是非常活跃的研究方向。实践表明,对特征值的计算十分复杂,但可以研究不同定义的谱之间的关系确定特征值的上下界。通过利用对称矩阵和半正定矩阵的一些性质,讨论简单无向图G及其线图Gl的邻接谱之间的一些关系,推广已有的结果。同时也讨论图的邻接谱和拉普拉斯谱之间的关系。对判定某些图的邻接谱和拉普拉斯谱的范围具有一定的指导作用。 相似文献
6.
7.
传统的多路寻址液晶驱动矩阵电路设计规模与矩阵阶数平方成正比。研究表明:由正交块循环矩阵构造出的多路寻址驱动矩阵的实现复杂度由原来的与矩阵的阶数平方成正比下降为与矩阵的阶数成正比。分析正交块循环矩阵特性后,介绍了基于类单位矩阵的系统化构造正交块循环矩阵的方法。在多行(COMMON)快速帧频响应的多路寻址液晶驱动设计中采用正交块循环矩阵可大大降低实现成本。 相似文献
8.
9.
With the development of computer networks, the attacks with respect to them are increasing explosively. It is a very important problem for security testers to test the security situation of a specific network (i.e., to use a method to model all the possible attacks within the environment). Of all the modeling methods, the Network Attack Graph is widely used because of its visual intuition. Under this circumstance, this paper firstly introduces the construction methods of the Network Attack Graph, then describes its application in the network security, and lastly previews some research directions of the Network Attack Graph. 相似文献
10.
11.
ANewAlgorithmofHarmoniousDecompositionofLinearGraphLiLinAndLuJiajian(DepartrnentofTelecommunicationEngineering,Xi'aninstitute... 相似文献
12.
针对图像分割是典型的结构不良问题,将图谱划分理论作为一种新型的模式分析工具应用到图像分割并引起广大学者关注。考虑到现有的图谱阈值法中图权计算方法采用基于欧氏距离的幂指数函数导致其计算量过大的不足,首先采用基于欧氏距离的分式型柯西函数代替基于欧氏距离的幂指数函数提出图权计算的新方法,其次将其应用基于图谱划分测度的图像阈值分割算法中并得到一种改进的图谱阈值分割方法。实验结果表明,该方法的计算量小且对目标和背景相差比例较大的图像能获得满意的结果。 相似文献
13.
To detect copy-paste tampering, an im-proved SIFT (Scale invariant feature transform)-based al-gorithm was proposed. Maximum angle is defined and a maximum angle-based marked graph is constructed. The m arked graph feature vector is provided to each SIFT key point via discrete polar coordinate transformation. Key points are matched to detect the copy-paste tamper-ing regions. The experimental results show that the pro-posed algorithm can effectively identify and detect the ro-tated or scaled copy-paste regions, and in comparison with the methods reported previously, it is resistant to post-processing, such as blurring, Gaussian white noise and JPEG recompression. The proposed algorithm performs better than the existing algorithm to dealing with scaling transformation. 相似文献
14.
15.
16.
Zhang Hongfen 《中国邮电高校学报(英文版)》1995,(2)
AnSimpleEnumerationofAllMinimalCutsetsofanAll-TerminalGraphZhangHongfen(ShijiazhuangPostalCollege,050021,P.R.China)AnSimpleEn... 相似文献
17.
18.
随着IT业的迅速发展,网络安全也越来越受到重视。一种可适应不同网络、不同初始主机权限的网络权限图的生成算法可以发现已有的网络安全漏洞,帮助网络管理人员提高网络的安全性。这种算法以主机间的连接为分析基础,根据网络状态及各主机的初始权限,得出权限提升路径,从而分析此网络的安全性,同时对网络变化和主机权限调整具有良好的适应性。 相似文献
19.
The demand for the analysis and application of graph data in various fields is increasing day by day.The management of large-scale graph data with complicated structure and high degree of coupling faces two challenges:one is querying speed too slow,the other is space consumption too large.Facing the problems of long query time and large space occupation in graph data management,a two-level index compression algorithm named GComIdx for graph data was proposed.GComIdx algorithm used the ordered Key-Value structure to store the associated nodes and edges as closely as possible,and constructed two-level index and hash node index for efficient attribute query and neighbor query.Furthermore,GComIdx algorithm used a graph data compressed technology to compress the graph data before it directly stored in hard disk,which could effectively reduce the storing space consumption.The experimental results show that GComIdx algorithm can effectively reduce the initialization time of the graph data calculation and the disk space occupancy of the graph data storing,meanwhile,the query time is less than common graph databases and other Key-Value storage solutions. 相似文献