首页 > 最新文献

International Journal of Computer Mathematics: Computer Systems Theory最新文献

英文 中文
Inner zonality in graphs 图的内地带性
IF 0.8 Q4 Computer Science Pub Date : 2022-07-03 DOI: 10.1080/23799927.2022.2113745
Andrew Bowling, Ping Zhang
A zonal labelling of a plane graph G is an assignment of the two nonzero elements of the ring of integers modulo 3 to the vertices of G such that the sum of the labels of the vertices on the boundary of each region of G is the zero element of . A plane graph possessing such a labelling is a zonal graph. A cubic map is a connected 3-regular bridgeless plane graph. It is known that if an independent proof could be given that every cubic map is zonal, then the Four Color Theorem would follow as a corollary. As a step in this direction, it is shown that certain subgraphs of cubic maps are nearly zonal.
平面图G的分区标记是将以3为模的整数环的两个非零元素赋值到G的顶点上,使得G的每个区域边界上的顶点的标记之和为的零元素。具有这样标记的平面图是分区图。三次映射是连通的三规则无桥平面图。众所周知,如果能给出一个独立的证明,证明每一个立方映射都是带状的,那么四色定理就会作为一个推论而出现。作为这个方向的一步,我们证明了三次映射的某些子图是近分区的。
{"title":"Inner zonality in graphs","authors":"Andrew Bowling, Ping Zhang","doi":"10.1080/23799927.2022.2113745","DOIUrl":"https://doi.org/10.1080/23799927.2022.2113745","url":null,"abstract":"A zonal labelling of a plane graph G is an assignment of the two nonzero elements of the ring of integers modulo 3 to the vertices of G such that the sum of the labels of the vertices on the boundary of each region of G is the zero element of . A plane graph possessing such a labelling is a zonal graph. A cubic map is a connected 3-regular bridgeless plane graph. It is known that if an independent proof could be given that every cubic map is zonal, then the Four Color Theorem would follow as a corollary. As a step in this direction, it is shown that certain subgraphs of cubic maps are nearly zonal.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82411499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of batch size-dependent bulk service queue with multiple working vacation 具有多个工作假期的批量服务队列分析
IF 0.8 Q4 Computer Science Pub Date : 2022-07-03 DOI: 10.1080/23799927.2022.2096119
G. Tamrakar, Adrish Banerjee, U. C. Gupta
ABSTRACT The present article analyses an infinite buffer batch size-dependent bulk service queue with multiple working vacation (MWV). The customer's arrival pattern follows the Poisson process, and they get the service in batches according to the general bulk service (GBS) rule in regular period (RP) as well as in working vacation period (WVP). After one service in RP, if the queue size is greater or equal to the lower threshold of the GBS rule, then the server performs the service in RP, otherwise, it starts the working vacation (WV) following exponential vacation time distribution. During the WVP, the server serves the customers in batches (if any) at a lower service rate than the usual service rate. The service time in the RP as well as in WVP is generally distributed. At an arbitrary epoch, the joint probabilities of the queue size and batch size with the server in RP as well as in WVP have been obtained using the supplementary variable technique (SVT) and the bivariate generating function method. Finally, some numerical observations are presented to enhance the applicability of the analytical results.
摘要本文分析了一类具有多个工作假期(MWV)的无限缓冲区批大小相关的批量服务队列。客户到达模式遵循泊松过程,在常规期(RP)和工作休假期(WVP)按照通用批量服务(GBS)规则分批获得服务。在RP中完成一个服务后,如果队列大小大于或等于GBS规则的下限阈值,则服务器在RP中执行该服务,否则按照指数休假时间分布开始工作休假(WV)。在WVP期间,服务器以低于通常服务率的服务速率批量(如果有的话)为客户提供服务。RP和WVP的服务时间一般都是分布的。利用补充变量技术(SVT)和二元生成函数法,得到了任意时刻RP和WVP中队列大小和批大小与服务器的联合概率。最后,给出了一些数值观测,以增强分析结果的适用性。
{"title":"Analysis of batch size-dependent bulk service queue with multiple working vacation","authors":"G. Tamrakar, Adrish Banerjee, U. C. Gupta","doi":"10.1080/23799927.2022.2096119","DOIUrl":"https://doi.org/10.1080/23799927.2022.2096119","url":null,"abstract":"ABSTRACT The present article analyses an infinite buffer batch size-dependent bulk service queue with multiple working vacation (MWV). The customer's arrival pattern follows the Poisson process, and they get the service in batches according to the general bulk service (GBS) rule in regular period (RP) as well as in working vacation period (WVP). After one service in RP, if the queue size is greater or equal to the lower threshold of the GBS rule, then the server performs the service in RP, otherwise, it starts the working vacation (WV) following exponential vacation time distribution. During the WVP, the server serves the customers in batches (if any) at a lower service rate than the usual service rate. The service time in the RP as well as in WVP is generally distributed. At an arbitrary epoch, the joint probabilities of the queue size and batch size with the server in RP as well as in WVP have been obtained using the supplementary variable technique (SVT) and the bivariate generating function method. Finally, some numerical observations are presented to enhance the applicability of the analytical results.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81609874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the connected monophonic number of a graph 图的连通单音数
IF 0.8 Q4 Computer Science Pub Date : 2022-04-03 DOI: 10.1080/23799927.2022.2071765
K. Ganesamoorthy, M. Murugan, A. Santhakumaran
For a connected graph G of order at least two, a connected monophonic set of G is a monophonic set S such that the subgraph induced by S is connected. The minimum cardinality of a connected monophonic set of G is the connected monophonic number of G and is denoted by . The number of extreme vertices and cut-vertices of G is its extreme-cut order . A graph G is an extreme-cut connected monophonic graph if . Some interesting results on the extreme-cut connected monophonic graphs G are studied. For positive integers r, d and with r
对于至少为二阶的连通图G, G的连通单音集是单音集S,使得S引出的子图是连通的。G的连通单音集的最小基数是G的连通单音数,表示为。G的极值顶点和切割顶点的个数就是它的极值切割阶数。图G是一个极切连通单音图。研究了关于极切连通单音图G的一些有趣的结果。对于正整数r、d和r
{"title":"On the connected monophonic number of a graph","authors":"K. Ganesamoorthy, M. Murugan, A. Santhakumaran","doi":"10.1080/23799927.2022.2071765","DOIUrl":"https://doi.org/10.1080/23799927.2022.2071765","url":null,"abstract":"For a connected graph G of order at least two, a connected monophonic set of G is a monophonic set S such that the subgraph induced by S is connected. The minimum cardinality of a connected monophonic set of G is the connected monophonic number of G and is denoted by . The number of extreme vertices and cut-vertices of G is its extreme-cut order . A graph G is an extreme-cut connected monophonic graph if . Some interesting results on the extreme-cut connected monophonic graphs G are studied. For positive integers r, d and with r<d, there exists an extreme-cut connected monophonic graph G with monophonic radius r, monophonic diameter d and the connected monophonic number k. Also if p, d and k are positive integers such that and , then there exists an extreme-cut connected monophonic graph G of order p with monophonic diameter d and .","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73089915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Self-stabilizing algorithm for minimal (α,β)-dominating set 最小(α,β)支配集的自稳定算法
IF 0.8 Q4 Computer Science Pub Date : 2022-04-03 DOI: 10.1080/23799927.2022.2072400
Leila Saadi, Badreddine Benreguia, C. Arar, Moumen Hamouma
This paper deals with the problem of finding dominating set using self-stabilization paradigm in distributed systems. Usually, members of a dominating set are selected to be as cluster heads in Wireless Sensor Networks (WSN) to ensure a permanent service availability. Since failures occur frequently inside WSN due to limited battery energy, self-stabilizing algorithm allows recomputing the dominating set, and hence the network returns to its ordinary running. Existing works have introduced many variants of self-stabilizing algorithms that compute minimal dominating set S where each node out of S has neighbours in S more than it has out S. In this paper, we introduce a generalized self-stabilizing algorithm called minimal -dominating set. An α-dominating set is a subset of nodes S such that for any node v out of S, the rate of neighbours of v inside S must be greater than α, where . In the same way, an -dominating set is a subset of nodes S such that: S is α-dominating set and for each node v in S, the rate of neighbours of v inside S is greater than β, where . Mathematical proofs and simulation tests show the correctness and the efficiency of the proposed algorithm. Through our proposed variant -domination, we prove rigorously the conjecture of Carrier et al. [Self-stabilizing (f,g)-alliances with safe convergence, J. Parallel Distrib. Comput. 81–82 (2015), pp. 11–23. doi:10.1016/j.jpdc.2015.02.001] who have proposed a self-stabilizing algorithm for a domination variant called -alliance set only when . We prove the correctness of the case f
本文研究了分布式系统中利用自稳定范式寻找控制集的问题。在无线传感器网络(WSN)中,通常选择支配集的成员作为簇头,以确保服务的永久可用性。由于电池能量有限,WSN内部经常发生故障,自稳定算法允许重新计算支配集,从而使网络恢复正常运行。现有的工作已经介绍了许多计算最小支配集S的自稳定算法的变体,其中S中的每个节点在S中的邻居多于S中的邻居。在本文中,我们引入了一种称为最小支配集的广义自稳定算法。α-支配集是节点S的子集,使得对于S外的任何节点v, S内v的邻居的比率必须大于α,其中。同样,-支配集是节点S的子集,满足:S是α-支配集,并且对于S中的每个节点v, S内v的邻居的比率大于β,其中。数学证明和仿真实验表明了该算法的正确性和有效性。通过我们提出的变体控制,我们严格地证明了Carrier等人的猜想[j] .自稳定(f,g)-联盟与安全收敛。计算机。81-82 (2015),pp. 11-23。[Doi:10.1016/j.j jpdc.2015.02.001],他们提出了一种自稳定算法,该算法仅当。我们证明了情形f的正确性
{"title":"Self-stabilizing algorithm for minimal (α,β)-dominating set","authors":"Leila Saadi, Badreddine Benreguia, C. Arar, Moumen Hamouma","doi":"10.1080/23799927.2022.2072400","DOIUrl":"https://doi.org/10.1080/23799927.2022.2072400","url":null,"abstract":"This paper deals with the problem of finding dominating set using self-stabilization paradigm in distributed systems. Usually, members of a dominating set are selected to be as cluster heads in Wireless Sensor Networks (WSN) to ensure a permanent service availability. Since failures occur frequently inside WSN due to limited battery energy, self-stabilizing algorithm allows recomputing the dominating set, and hence the network returns to its ordinary running. Existing works have introduced many variants of self-stabilizing algorithms that compute minimal dominating set S where each node out of S has neighbours in S more than it has out S. In this paper, we introduce a generalized self-stabilizing algorithm called minimal -dominating set. An α-dominating set is a subset of nodes S such that for any node v out of S, the rate of neighbours of v inside S must be greater than α, where . In the same way, an -dominating set is a subset of nodes S such that: S is α-dominating set and for each node v in S, the rate of neighbours of v inside S is greater than β, where . Mathematical proofs and simulation tests show the correctness and the efficiency of the proposed algorithm. Through our proposed variant -domination, we prove rigorously the conjecture of Carrier et al. [Self-stabilizing (f,g)-alliances with safe convergence, J. Parallel Distrib. Comput. 81–82 (2015), pp. 11–23. doi:10.1016/j.jpdc.2015.02.001] who have proposed a self-stabilizing algorithm for a domination variant called -alliance set only when . We prove the correctness of the case f","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75003582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vertex resolvability of convex polytopes with n-paths of length p 长度为p的n条路径凸多面体的顶点可分辨性
IF 0.8 Q4 Computer Science Pub Date : 2022-03-31 DOI: 10.1080/23799927.2022.2059012
Sahil Sharma, V. K. Bhat
Let be a simple, connected, and undirected graph. The distance between two vertices denoted by , is the length of the shortest path connecting u and v. A subset of vertices is said to be a resolving set for G if for any two distinct vertices V, there exist a vertex such that . A minimal resolving set is called a metric basis, and the cardinality of the basis set is called the metric dimension of G, denoted by . In this article, we find the metric dimension for two infinite families of plane graphs and , where is obtained by the combination of copies of bipartite graphs , and is obtained by the combination of double antiprism graph with antiprism graph and then adding n-paths of length p.
设一个简单的,连通的,无向图。两个顶点之间的距离用表示,是连接u和V的最短路径的长度。如果对于任意两个不同的顶点V,存在这样一个顶点,则顶点的子集被称为G的解析集。最小解析集称为度量基,基集的基数称为G的度量维数,表示为。本文给出了两个无限族平面图的度量维数,其中度量维数是由二部图的拷贝组合得到的,度量维数是由双反棱镜图与反棱镜图组合,然后加上长度为p的n条路径得到的。
{"title":"Vertex resolvability of convex polytopes with n-paths of length p","authors":"Sahil Sharma, V. K. Bhat","doi":"10.1080/23799927.2022.2059012","DOIUrl":"https://doi.org/10.1080/23799927.2022.2059012","url":null,"abstract":"Let be a simple, connected, and undirected graph. The distance between two vertices denoted by , is the length of the shortest path connecting u and v. A subset of vertices is said to be a resolving set for G if for any two distinct vertices V, there exist a vertex such that . A minimal resolving set is called a metric basis, and the cardinality of the basis set is called the metric dimension of G, denoted by . In this article, we find the metric dimension for two infinite families of plane graphs and , where is obtained by the combination of copies of bipartite graphs , and is obtained by the combination of double antiprism graph with antiprism graph and then adding n-paths of length p.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81533919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Between SC and LOGDCFL: families of languages accepted by logarithmic-space deterministic auxiliary depth-k storage automata SC与LOGDCFL之间:对数空间确定性辅助深度k存储自动机所接受的语言族
IF 0.8 Q4 Computer Science Pub Date : 2022-03-18 DOI: 10.1080/23799927.2023.2166872
T. Yamakami
The closure of deterministic context-free languages under logarithmic-space many-one reductions ( -m-reductions), known as LOGDCFL, has been studied in depth from an aspect of parallel computability because it is nicely situated between and . By replacing a memory device of pushdown automata with an access-controlled storage tape, we introduce a computational model of one-way deterministic depth-k storage automata (k-sda's) whose tape cells are freely modified during the first k accesses and then become blank forever. These k-sda's naturally induce the language family . Similarly to , we study the closure of all languages in under -m-reductions. We demonstrate that by significantly extending Cook's early result (1979) of . The entire hierarch of for all therefore lies between and . As an immediate consequence, we obtain the same simulation bounds for Hibbard's limited automata. We further characterize in terms of a new machine model, called logarithmic-space deterministic auxiliary depth-k storage automata that run in polynomial time. These machines are as powerful as a polynomial-time two-way multi-head deterministic depth-k storage automata. We also provide a ‘generic’ -complete language under -m-reductions by constructing a two-way universal simulator working for all k-sda's.
确定性上下文无关语言在对数空间多一约简(-m-约简)下的闭包,即LOGDCFL,已经从并行可计算性的角度进行了深入研究,因为它很好地位于和之间。通过用访问控制的存储磁带代替下推自动机的存储设备,我们引入了一种单向确定性深度k存储自动机(k-sda)的计算模型,该自动机的磁带单元在前k次访问期间被自由修改,然后永远变为空白。这些k-sda很自然地引出了语族。类似地,我们研究所有语言在-m-约简下的闭包。我们通过显著扩展Cook的早期结果(1979)来证明这一点。因此,“为所有人”的整个等级介于和之间。作为直接的结果,我们得到了Hibbard有限自动机的相同的模拟边界。我们进一步描述了一种新的机器模型,称为对数空间确定性辅助深度k存储自动机,它在多项式时间内运行。这些机器与多项式时间双向多头确定性深度k存储自动机一样强大。我们还通过构建一个适用于所有k-sda的双向通用模拟器,提供了一个在-m-约简下的“通用”完备语言。
{"title":"Between SC and LOGDCFL: families of languages accepted by logarithmic-space deterministic auxiliary depth-k storage automata","authors":"T. Yamakami","doi":"10.1080/23799927.2023.2166872","DOIUrl":"https://doi.org/10.1080/23799927.2023.2166872","url":null,"abstract":"The closure of deterministic context-free languages under logarithmic-space many-one reductions ( -m-reductions), known as LOGDCFL, has been studied in depth from an aspect of parallel computability because it is nicely situated between and . By replacing a memory device of pushdown automata with an access-controlled storage tape, we introduce a computational model of one-way deterministic depth-k storage automata (k-sda's) whose tape cells are freely modified during the first k accesses and then become blank forever. These k-sda's naturally induce the language family . Similarly to , we study the closure of all languages in under -m-reductions. We demonstrate that by significantly extending Cook's early result (1979) of . The entire hierarch of for all therefore lies between and . As an immediate consequence, we obtain the same simulation bounds for Hibbard's limited automata. We further characterize in terms of a new machine model, called logarithmic-space deterministic auxiliary depth-k storage automata that run in polynomial time. These machines are as powerful as a polynomial-time two-way multi-head deterministic depth-k storage automata. We also provide a ‘generic’ -complete language under -m-reductions by constructing a two-way universal simulator working for all k-sda's.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81200948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced signature functionalities from the code equivalence problem 高级签名功能从代码等价问题
IF 0.8 Q4 Computer Science Pub Date : 2022-03-01 DOI: 10.1080/23799927.2022.2048206
Alessandro Barenghi, Jean-François Biasse, Tra Ngô, Edoardo Persichetti, P. Santini
The LESS signature scheme, introduced in 2020, represented a fresh start for code-based signatures. In this paper we explore advanced functionalities for signature schemes, stemming from the work of LESS. First, we adapt a recent protocol of Beullens et al. to obtain a construction for (linkable) ring signatures. Then, we realize an identity-based signature scheme following the traditional approach by Joye and Neven. Our performance numbers confirm that signature schemes based on the code equivalence problem have considerable potential for practical applications.
LESS签名方案于2020年推出,代表了基于代码的签名的新开始。在本文中,我们探讨了签名方案的高级功能,源于LESS的工作。首先,我们采用Beullens等人的最新协议来获得(可链接)环签名的构造。然后,我们根据Joye和Neven的传统方法,实现了一个基于身份的签名方案。我们的性能数据证实了基于代码等价问题的签名方案在实际应用中具有相当大的潜力。
{"title":"Advanced signature functionalities from the code equivalence problem","authors":"Alessandro Barenghi, Jean-François Biasse, Tra Ngô, Edoardo Persichetti, P. Santini","doi":"10.1080/23799927.2022.2048206","DOIUrl":"https://doi.org/10.1080/23799927.2022.2048206","url":null,"abstract":"The LESS signature scheme, introduced in 2020, represented a fresh start for code-based signatures. In this paper we explore advanced functionalities for signature schemes, stemming from the work of LESS. First, we adapt a recent protocol of Beullens et al. to obtain a construction for (linkable) ring signatures. Then, we realize an identity-based signature scheme following the traditional approach by Joye and Neven. Our performance numbers confirm that signature schemes based on the code equivalence problem have considerable potential for practical applications.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83574921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Irregular orbital domination in graphs 图中的不规则轨道支配
IF 0.8 Q4 Computer Science Pub Date : 2021-12-09 DOI: 10.1080/23799927.2021.2014977
Peter Broe, G. Chartrand, Ping Zhang
For a non-negative integer r, the r-orbit of a vertex v in a connected graph G of order n is the set of vertices at distance r from v. A sequence of positive integers with is called an irregular orbital dominating sequence of G if for every pair i, j of integers with and G contains distinct vertices such that We investigate graphs that possess and graphs do not possess an irregular orbital dominating sequence. It is shown that a non-trivial tree has an irregular orbital dominating sequence if and only if it is neither a star, a path of order 2, nor a path of order 6.
对于非负整数r, n阶连通图G中顶点v的r轨道是距离v r处的顶点集合。如果对于每一对整数i, j和G包含不同的顶点,我们研究具有和不具有不规则轨道支配序列的图,则具有的正整数序列称为G的不规则轨道支配序列。证明了非平凡树具有不规则轨道支配序列当且仅当它既不是恒星,也不是2阶路径,也不是6阶路径。
{"title":"Irregular orbital domination in graphs","authors":"Peter Broe, G. Chartrand, Ping Zhang","doi":"10.1080/23799927.2021.2014977","DOIUrl":"https://doi.org/10.1080/23799927.2021.2014977","url":null,"abstract":"For a non-negative integer r, the r-orbit of a vertex v in a connected graph G of order n is the set of vertices at distance r from v. A sequence of positive integers with is called an irregular orbital dominating sequence of G if for every pair i, j of integers with and G contains distinct vertices such that We investigate graphs that possess and graphs do not possess an irregular orbital dominating sequence. It is shown that a non-trivial tree has an irregular orbital dominating sequence if and only if it is neither a star, a path of order 2, nor a path of order 6.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86541866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficiency evaluation in hybrid two-stage network DEA with non-discretionary inputs and shared discretionary inputs 非任意输入和共享任意输入混合两阶段网络DEA效率评价
IF 0.8 Q4 Computer Science Pub Date : 2021-11-05 DOI: 10.1080/23799927.2021.1983876
Elham Abdali, K. Moradipour, Sanaz Asadi-Rahmati, Maryam Fallah
In the network DEA models, it is assumed that all inputs are varied according to decisions of manager. However, in many cases, there are non-discretionary inputs that are beyond the control of a sub-DMUs and DMUs management in the efficiency evaluation, and this problem has not been discussed considerably in network DEA so far. This study proposed a multiplier model to treat a two-stage network system comprised of three sub-DMUs in hybrid form with non- discretionary inputs and shared discretionary inputs, while this issue is not sufficiently rich in the network systems, here, it is being analysed seriously in this study. The proposed model simulate precisely the parallel-series internal structure of network system with non-discretionary inputs and shared discretionary inputs between sub-DMUs, and also uses synthetically additive and multiplicative DEA approaches for evaluating the efficiency of two-stage network system. Finally, a practical example demonstrates the feasibility of the proposed model.
在网络DEA模型中,假设所有的输入根据管理者的决策而变化。然而,在很多情况下,在效率评价中存在非自由裁量的投入,超出了子决策单元和决策单元管理的控制范围,这一问题目前在网络DEA中还没有得到充分的讨论。本研究提出了一个乘数模型来处理由三个非自由裁量投入和共享自由裁量投入混合形式的子dmu组成的两阶段网络系统,而这个问题在网络系统中还不够丰富,在这里,本研究正在认真分析。该模型精确地模拟了具有非任意输入和子dmu之间共享任意输入的网络系统的并联串联内部结构,并采用综合加性和乘性DEA方法对两级网络系统的效率进行了评价。最后,通过实例验证了所提模型的可行性。
{"title":"Efficiency evaluation in hybrid two-stage network DEA with non-discretionary inputs and shared discretionary inputs","authors":"Elham Abdali, K. Moradipour, Sanaz Asadi-Rahmati, Maryam Fallah","doi":"10.1080/23799927.2021.1983876","DOIUrl":"https://doi.org/10.1080/23799927.2021.1983876","url":null,"abstract":"In the network DEA models, it is assumed that all inputs are varied according to decisions of manager. However, in many cases, there are non-discretionary inputs that are beyond the control of a sub-DMUs and DMUs management in the efficiency evaluation, and this problem has not been discussed considerably in network DEA so far. This study proposed a multiplier model to treat a two-stage network system comprised of three sub-DMUs in hybrid form with non- discretionary inputs and shared discretionary inputs, while this issue is not sufficiently rich in the network systems, here, it is being analysed seriously in this study. The proposed model simulate precisely the parallel-series internal structure of network system with non-discretionary inputs and shared discretionary inputs between sub-DMUs, and also uses synthetically additive and multiplicative DEA approaches for evaluating the efficiency of two-stage network system. Finally, a practical example demonstrates the feasibility of the proposed model.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75898846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stationary system-length distribution of Markovian bulk service queue with modified bulk service rule and dynamic service rates 基于改进批量服务规则和动态服务速率的马尔可夫批量服务队列平稳系统长度分布
IF 0.8 Q4 Computer Science Pub Date : 2021-10-30 DOI: 10.1080/23799927.2021.2000503
Gagandeep Singh, A. Kumari, U. C. Gupta
In this paper, we consider a single server bulk service queue, with modified bulk service rule, say rule, wherein customers are served in batches of maximum batch size K with minimum threshold value L. Further, we allow the customers to enter the service if the server has begun the service and is having less than K customers. In addition, service rates of the batches are taken to be dependent on the size of the batch. Analytic expressions for the joint probability distribution of the number of customers in the queue, and with the server, the marginal probability distribution of the number of customers in the queue, system and with the server is derived. A thorough numerical investigation of the effect of various parameters on the distributions obtained above is done and numerical results are presented in the form of tables and graphs. We also obtain various performance measures (both in closed-form as well as numerically) such as the average number of customers in the queue, system, with the server, etc.
在本文中,我们考虑一个单服务器批量服务队列,该队列具有修改后的批量服务规则,即规则,其中客户以最大批大小K和最小阈值l为批,并且如果服务器已经开始服务并且客户少于K,我们允许客户进入服务。此外,批次的服务率被认为依赖于批次的大小。导出了队列中顾客数量和有服务器时的联合概率分布的解析表达式,以及队列中顾客数量、系统中顾客数量和有服务器时的边际概率分布。数值研究了各种参数对上述分布的影响,并以表格和图表的形式给出了数值结果。我们还获得各种性能度量(包括封闭形式和数字形式),例如排队、系统和服务器中的平均客户数量等。
{"title":"Stationary system-length distribution of Markovian bulk service queue with modified bulk service rule and dynamic service rates","authors":"Gagandeep Singh, A. Kumari, U. C. Gupta","doi":"10.1080/23799927.2021.2000503","DOIUrl":"https://doi.org/10.1080/23799927.2021.2000503","url":null,"abstract":"In this paper, we consider a single server bulk service queue, with modified bulk service rule, say rule, wherein customers are served in batches of maximum batch size K with minimum threshold value L. Further, we allow the customers to enter the service if the server has begun the service and is having less than K customers. In addition, service rates of the batches are taken to be dependent on the size of the batch. Analytic expressions for the joint probability distribution of the number of customers in the queue, and with the server, the marginal probability distribution of the number of customers in the queue, system and with the server is derived. A thorough numerical investigation of the effect of various parameters on the distributions obtained above is done and numerical results are presented in the form of tables and graphs. We also obtain various performance measures (both in closed-form as well as numerically) such as the average number of customers in the queue, system, with the server, etc.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73330484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
International Journal of Computer Mathematics: Computer Systems Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1