首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Parameters k-distance and k-diameter are extension of the distance and the diameter in graph theory. In this paper, the k-distance dk (x,y) between the any vertices x and y is first obtained in a connected circulant graph G with order n (n is even) and degree 3 by removing some vertices from the neighbour set of the x. Then, the k-diameters of the connected circulant graphs with order n and degree 3 are given by using the k-diameter dk (x,y).  相似文献   

2.
         下载免费PDF全文
Parameters k-distance and k-diameter are extension of the distance and the diameter in graph theory. In this paper, the k-distance dk(x,y) between the any vertices x and y is first obtained in a connected circulant graph G with order n(n is even) and degree 3 by removing some vertices from the neighbour set of the x. Then, the k-diameters of the connected circulant graphs with order n and degree 3 are given by using the k-diameter dk(x,y).  相似文献   

3.
         下载免费PDF全文
The diameter of a graph G is the maximal distance between pairs of vertices of G. When a network is modeled as a graph, diameter is a measurement for maximum transmission delay. The k-diameter dk(G) of a graph G, which deals with k internally disjoint paths between pairs of vertices of G, is a extension of the diameter of G. It has widely studied in graph theory and computer science. The circulant graph is a group-theoretic model of a class of symmetric interconnection network. Let Cn(i, n/2) be a circulant graph of order n whose spanning elements are i and n/2, where n4 and n is even. In this paper, the diameter, 2-diameter and 3-diameter of the Cn(i, n/2) are all obtained if gcd(n,i)=1, where the symbol gcd(n,i) denotes the maximum common divisor of n and i.  相似文献   

4.
针对大规模移动对象网络在构建图立方体的过程中产生的大量浓缩图,引入了图压缩的思想,提出了进一步压缩浓缩图的算法MC-compress,用来合并浓缩图中顶点和相应的边.通过将图中相邻的两个顶点进行合并,再比较两条边合并后权重的最大差异度,从而找出最优的合并顶点对,最终产生构建压缩图的超级顶点和超级边.通过压缩图结构,加快了在图立方体上查询图结构的显示过程,减少了构建图立方体过程中存储大量浓缩图的空间.  相似文献   

5.
图谱理论是图论研究的重要领域之一,也是非常活跃的研究方向。实践表明,对特征值的计算十分复杂,但可以研究不同定义的谱之间的关系确定特征值的上下界。通过利用对称矩阵和半正定矩阵的一些性质,讨论简单无向图G及其线图Gl的邻接谱之间的一些关系,推广已有的结果。同时也讨论图的邻接谱和拉普拉斯谱之间的关系。对判定某些图的邻接谱和拉普拉斯谱的范围具有一定的指导作用。  相似文献   

6.
概念图知识表示方法   总被引:1,自引:0,他引:1  
知识表示是人工智能领域研究的核心问题之一,概念图知识表示方法是近年来提出的一种新的知识表示方法。它能有效地表示自然语言的语义,是面向自然语言处理的极其有效的知识表示方法。本文主要讨论概念图知识表示方法所涉及的概念,原则和方法,以及与其它知识表示方法的关系。  相似文献   

7.
传统的多路寻址液晶驱动矩阵电路设计规模与矩阵阶数平方成正比。研究表明:由正交块循环矩阵构造出的多路寻址驱动矩阵的实现复杂度由原来的与矩阵的阶数平方成正比下降为与矩阵的阶数成正比。分析正交块循环矩阵特性后,介绍了基于类单位矩阵的系统化构造正交块循环矩阵的方法。在多行(COMMON)快速帧频响应的多路寻址液晶驱动设计中采用正交块循环矩阵可大大降低实现成本。  相似文献   

8.
陈华杰  韦巍 《电子学报》2006,34(8):1405-1409
针对位于非线性流形上类别数据的判别分析问题,提出了一种基于测地Gabriel图的局部判别器融合算法.利用测地距离表征流形的内在几何结构,由此构造测地Gabriel图确定异类数据相互靠近的局部临界区域,进而训练得到局部线性的判别器.整体的非线性判别器由多个局部判别器融合得到:基于柔性边界准则函数,以迭代优化的方式,为每个局部判别器分配最佳的权重系数,整体上逐步提高异类样本间的区分度.在人工合成数据集以及人脸图像库上的实验证明了本文算法的有效性.  相似文献   

9.
With the development of computer networks, the attacks with respect to them are increasing explosively. It is a very important problem for security testers to test the security situation of a specific network (i.e., to use a method to model all the possible attacks within the environment). Of all the modeling methods, the Network Attack Graph is widely used because of its visual intuition. Under this circumstance, this paper firstly introduces the construction methods of the Network Attack Graph, then describes its application in the network security, and lastly previews some research directions of the Network Attack Graph.  相似文献   

10.
11.
ANewAlgorithmofHarmoniousDecompositionofLinearGraphLiLinAndLuJiajian(DepartrnentofTelecommunicationEngineering,Xi'aninstitute...  相似文献   

12.
针对图像分割是典型的结构不良问题,将图谱划分理论作为一种新型的模式分析工具应用到图像分割并引起广大学者关注。考虑到现有的图谱阈值法中图权计算方法采用基于欧氏距离的幂指数函数导致其计算量过大的不足,首先采用基于欧氏距离的分式型柯西函数代替基于欧氏距离的幂指数函数提出图权计算的新方法,其次将其应用基于图谱划分测度的图像阈值分割算法中并得到一种改进的图谱阈值分割方法。实验结果表明,该方法的计算量小且对目标和背景相差比例较大的图像能获得满意的结果。  相似文献   

13.
To detect copy-paste tampering, an im-proved SIFT (Scale invariant feature transform)-based al-gorithm was proposed. Maximum angle is defined and a maximum angle-based marked graph is constructed. The m arked graph feature vector is provided to each SIFT key point via discrete polar coordinate transformation. Key points are matched to detect the copy-paste tamper-ing regions. The experimental results show that the pro-posed algorithm can effectively identify and detect the ro-tated or scaled copy-paste regions, and in comparison with the methods reported previously, it is resistant to post-processing, such as blurring, Gaussian white noise and JPEG recompression. The proposed algorithm performs better than the existing algorithm to dealing with scaling transformation.  相似文献   

14.
首先证明在n维星图Sn中,当n≥3时如果存在点集S V(Sn),|S|=n-1使得Sn-S是非连通的,那么存在点v∈V(Sn),N(v)=S.进而证明当n≥3时,n+1维星图Sn+1是强n-可诊断的.即在星图系统中所有的错误点不都是某一个点v的邻点集N(v)时,n维星图Sn的限制性诊断度为n.  相似文献   

15.
频率分配与图的着色   总被引:15,自引:1,他引:15  
本文在文献1的基础上,解决了发射台非规则分布时同信道频率距离约束和邻信道频率距离约束信道的分配问题。文中,应用图的广义着色模型,给出了更一般的用于频率距离约束和频率约束信道分配的通用算法。  相似文献   

16.
AnSimpleEnumerationofAllMinimalCutsetsofanAll-TerminalGraphZhangHongfen(ShijiazhuangPostalCollege,050021,P.R.China)AnSimpleEn...  相似文献   

17.
苏华安  张怡 《现代电子技术》2010,33(19):94-96,100
攻击图技术是一种基于模型的网络脆弱性评估方法。它通过对目标网络建模,以攻击规则对攻击者建模,然后根据二者之间的相互作用关系产生攻击图,展示目标网络内各个脆弱性之间的关系、脆弱性与网络安全配置之间的关系。早期的攻击图都是采用手工生成,速度慢效果差。为了方便研究人员使用攻击图分析目标网络安全状况,对攻击图的自动展示技术进行了研究。通过选用成熟的软件和设计合适的转换方法对攻击图进行解析,生成简洁清楚的攻击图,提高了攻击图的效能。  相似文献   

18.
随着IT业的迅速发展,网络安全也越来越受到重视。一种可适应不同网络、不同初始主机权限的网络权限图的生成算法可以发现已有的网络安全漏洞,帮助网络管理人员提高网络的安全性。这种算法以主机间的连接为分析基础,根据网络状态及各主机的初始权限,得出权限提升路径,从而分析此网络的安全性,同时对网络变化和主机权限调整具有良好的适应性。  相似文献   

19.
The demand for the analysis and application of graph data in various fields is increasing day by day.The management of large-scale graph data with complicated structure and high degree of coupling faces two challenges:one is querying speed too slow,the other is space consumption too large.Facing the problems of long query time and large space occupation in graph data management,a two-level index compression algorithm named GComIdx for graph data was proposed.GComIdx algorithm used the ordered Key-Value structure to store the associated nodes and edges as closely as possible,and constructed two-level index and hash node index for efficient attribute query and neighbor query.Furthermore,GComIdx algorithm used a graph data compressed technology to compress the graph data before it directly stored in hard disk,which could effectively reduce the storing space consumption.The experimental results show that GComIdx algorithm can effectively reduce the initialization time of the graph data calculation and the disk space occupancy of the graph data storing,meanwhile,the query time is less than common graph databases and other Key-Value storage solutions.  相似文献   

20.
高琳  覃桂敏  周晓峰 《电子学报》2008,36(8):1603-1609
 本文对图数据中的频繁模式挖掘算法进行了综述.依据算法的特性和数学基础对算法进行了分类,主要集中于算法的求解思想和不同算法之间的关系的比较,并对一些著名的算法进行了详细的分析和讨论.基于算法的特性,比较了各种算法适用的范围以及应用领域.最后,讨论了频繁模式挖掘的最新进展及未来的研究方向.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号