首页 > 最新文献

International Journal of Computer Mathematics: Computer Systems Theory最新文献

英文 中文
A study of existing use case extensions and experience: a systematic review 对现有用例扩展和经验的研究:系统的回顾
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-10-01 DOI: 10.1080/23799927.2020.1815856
O. Arogundade, S. I. Olotu, O. Abayomi-Alli, S. Misra, A. M. Ikotun
Use case has embedded potentials that enable the diversity in its adoption to addressing other issues in software engineering. This objective of this paper is to gathered and classified use case researches carried out over the years and defines the state-of-art. We identified and analysed 62 relevant articles with deep insights into six different initiatives. The publications included 29 journal articles, 18 conference articles, 3 reports, 5 book chapters, 5 workshops and 2 symposiums. This study deduced that as many as 15 different extensions are proposed from use case ranging from formal descriptions to subjective methodology. Use case has evolved from initial functional requirement elicitation to a more formal and extensive structure. There are fewer publications in cloud computing and use case-based systems. This study contributed to the use case body of knowledge by assessing the extended initiatives and giving an overview of the challenges that are not yet resolved.
用例具有内在的潜力,使其在解决软件工程中的其他问题时采用多样性。本文的目标是收集和分类多年来进行的用例研究,并定义技术状态。我们确定并分析了62篇相关文章,对6个不同的倡议有深刻的见解。发表的论文包括29篇期刊文章、18篇会议文章、3篇报告、5篇书籍章节、5篇研讨会和2篇专题讨论会。该研究推断,从正式描述到主观方法论的用例中,提出了多达15种不同的扩展。用例已经从最初的功能需求引出演变为更正式和更广泛的结构。关于云计算和基于用例的系统的出版物较少。该研究通过评估扩展的计划并给出尚未解决的挑战的概述,为用例知识体系做出了贡献。
{"title":"A study of existing use case extensions and experience: a systematic review","authors":"O. Arogundade, S. I. Olotu, O. Abayomi-Alli, S. Misra, A. M. Ikotun","doi":"10.1080/23799927.2020.1815856","DOIUrl":"https://doi.org/10.1080/23799927.2020.1815856","url":null,"abstract":"Use case has embedded potentials that enable the diversity in its adoption to addressing other issues in software engineering. This objective of this paper is to gathered and classified use case researches carried out over the years and defines the state-of-art. We identified and analysed 62 relevant articles with deep insights into six different initiatives. The publications included 29 journal articles, 18 conference articles, 3 reports, 5 book chapters, 5 workshops and 2 symposiums. This study deduced that as many as 15 different extensions are proposed from use case ranging from formal descriptions to subjective methodology. Use case has evolved from initial functional requirement elicitation to a more formal and extensive structure. There are fewer publications in cloud computing and use case-based systems. This study contributed to the use case body of knowledge by assessing the extended initiatives and giving an overview of the challenges that are not yet resolved.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"21 1","pages":"263 - 281"},"PeriodicalIF":0.8,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87132675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recursive and parallel constructions of independent spanning trees in alternating group networks 交替群网络中独立生成树的递归与并行构造
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-10-01 DOI: 10.1080/23799927.2020.1814418
Jie-Fu Huang, S. Hsieh
In this paper, we propose a recursive algorithm and a parallel algorithm for constructing independent spanning trees in ANn. The main ideas of the recursive algorithm are to construct large trees from small trees, use triangle breadth-first search (TBFS) to build a frame of an IST, and use breadth-first search (BFS) to link the rest of the nodes. The main ideas of the parallel algorithm are to build frames through TBFS in parallel, and to use the specific rules to link the rest of the nodes in parallel. We prove the correctness of both algorithms for constructing ISTs in AN n . Both algorithms are accurate; furthermore, the parallel algorithm is more ecient than the recursive algorithm. (An extended abstract of this paper appeared in: Jie-Fu Huang and Sun-Yuan Hsieh ‘Two methods for constructing independent spanning trees in alternating group networks’ Proceedings of International Conference on Creative Lifestyle Computing (ICCLC), 2020.)
本文提出了一种递归算法和一种并行算法来构造人工神经网络中的独立生成树。递归算法的主要思想是由小树构造大树,使用三角形宽度优先搜索(TBFS)构建IST的框架,并使用宽度优先搜索(BFS)连接其余节点。并行算法的主要思想是通过TBFS并行构建帧,并使用特定的规则将其余节点并行连接起来。我们证明了这两种算法在ann中构造list的正确性。两种算法都是准确的;此外,并行算法比递归算法效率更高。(本文的扩展摘要发表在:黄洁福和谢孙元“在交替组网络中构建独立生成树的两种方法”,《国际创意生活方式计算会议论文集》,2020。)
{"title":"Recursive and parallel constructions of independent spanning trees in alternating group networks","authors":"Jie-Fu Huang, S. Hsieh","doi":"10.1080/23799927.2020.1814418","DOIUrl":"https://doi.org/10.1080/23799927.2020.1814418","url":null,"abstract":"In this paper, we propose a recursive algorithm and a parallel algorithm for constructing independent spanning trees in ANn. The main ideas of the recursive algorithm are to construct large trees from small trees, use triangle breadth-first search (TBFS) to build a frame of an IST, and use breadth-first search (BFS) to link the rest of the nodes. The main ideas of the parallel algorithm are to build frames through TBFS in parallel, and to use the specific rules to link the rest of the nodes in parallel. We prove the correctness of both algorithms for constructing ISTs in AN n . Both algorithms are accurate; furthermore, the parallel algorithm is more ecient than the recursive algorithm. (An extended abstract of this paper appeared in: Jie-Fu Huang and Sun-Yuan Hsieh ‘Two methods for constructing independent spanning trees in alternating group networks’ Proceedings of International Conference on Creative Lifestyle Computing (ICCLC), 2020.)","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"5 1","pages":"234 - 262"},"PeriodicalIF":0.8,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81943199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Encrypting and decrypting algorithms using strong face graph of a tree 使用树的强面图进行加密和解密的算法
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-10-01 DOI: 10.1080/23799927.2020.1807606
R. Kuppan, L. Shobana, I. Cangül
The encryption and decryption is based upon the type of cryptographic scheme being employed and also in some form of key. It is most closely associated with the development and creation of the mathematical algorithms used to encrypt and decrypt messages. The combination of graph labelling techniques together with cryptography to encrypt and decrypt the numbers has been already an ongoing aspect of research. In this paper, the concept of face antimagic labelling is used for a strong face of duplication of all vertices by the edges of a tree to encrypt and decrypt 13 secret numbers.
加密和解密基于所采用的加密方案的类型,也基于某种形式的密钥。它与用于加密和解密消息的数学算法的开发和创建密切相关。将图形标记技术与密码学结合起来对数字进行加密和解密已经成为研究的一个方面。本文利用人脸反魔术标记的概念,对树的所有顶点与树的边相复制的强人脸进行了13个秘密数字的加密和解密。
{"title":"Encrypting and decrypting algorithms using strong face graph of a tree","authors":"R. Kuppan, L. Shobana, I. Cangül","doi":"10.1080/23799927.2020.1807606","DOIUrl":"https://doi.org/10.1080/23799927.2020.1807606","url":null,"abstract":"The encryption and decryption is based upon the type of cryptographic scheme being employed and also in some form of key. It is most closely associated with the development and creation of the mathematical algorithms used to encrypt and decrypt messages. The combination of graph labelling techniques together with cryptography to encrypt and decrypt the numbers has been already an ongoing aspect of research. In this paper, the concept of face antimagic labelling is used for a strong face of duplication of all vertices by the edges of a tree to encrypt and decrypt 13 secret numbers.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"14 1","pages":"225 - 233"},"PeriodicalIF":0.8,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78770343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An adaptive attack on 2-SIDH 对2-SIDH的自适应攻击
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-09-24 DOI: 10.1080/23799927.2020.1822446
Samuel Dobson, S. Galbraith, Jason Legrow, Y. Ti, Lukas Zobernig
We present a polynomial-time adaptive attack on the 2-SIDH protocol. The 2-SIDH protocol is a special instance of the countermeasure proposed by Azarderakhsh, Jao and Leonardi to perform isogeny-based key exchange with static keys in the presence of an adaptive attack. This countermeasure has also been recently explicitly proposed by Kayacan. Our attack extends the adaptive attack by Galbraith, Petit, Shani and Ti (GPST) to recover a static secret key using malformed points. The extension of GPST is non-trivial and requires learning additional information. In particular, the attack needs to recover intermediate elliptic curves in the isogeny path, and points on them. We also discuss how to extend the attack to k-SIDH when k>2 and explain that the attack complexity is exponential in k.
提出了一种针对2-SIDH协议的多项式时间自适应攻击方法。2-SIDH协议是Azarderakhsh, Jao和Leonardi提出的在存在自适应攻击的情况下使用静态密钥执行基于同基因的密钥交换的对策的一个特殊实例。卡亚坎最近也明确提出了这一对策。我们的攻击扩展了Galbraith, Petit, Shani和Ti (GPST)的自适应攻击,利用畸形点恢复静态密钥。GPST的扩展是非平凡的,需要学习额外的信息。特别是,攻击需要恢复中间椭圆曲线在等源路径,并在他们的点。我们还讨论了如何在k>2时将攻击扩展到k- sidh,并解释了攻击复杂度在k上是指数的。
{"title":"An adaptive attack on 2-SIDH","authors":"Samuel Dobson, S. Galbraith, Jason Legrow, Y. Ti, Lukas Zobernig","doi":"10.1080/23799927.2020.1822446","DOIUrl":"https://doi.org/10.1080/23799927.2020.1822446","url":null,"abstract":"We present a polynomial-time adaptive attack on the 2-SIDH protocol. The 2-SIDH protocol is a special instance of the countermeasure proposed by Azarderakhsh, Jao and Leonardi to perform isogeny-based key exchange with static keys in the presence of an adaptive attack. This countermeasure has also been recently explicitly proposed by Kayacan. Our attack extends the adaptive attack by Galbraith, Petit, Shani and Ti (GPST) to recover a static secret key using malformed points. The extension of GPST is non-trivial and requires learning additional information. In particular, the attack needs to recover intermediate elliptic curves in the isogeny path, and points on them. We also discuss how to extend the attack to k-SIDH when k>2 and explain that the attack complexity is exponential in k.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"20 1","pages":"282 - 299"},"PeriodicalIF":0.8,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90007046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
On approximations to minimum link visibility paths in simple polygons 关于简单多边形中最小链接可见性路径的近似
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-07-14 DOI: 10.1080/23799927.2020.1831612
Mohammad Reza Zarrabi, N. M. Charkari
We investigate a practical variant of the well-known polygonal visibility path (watchman) problem. For a polygon P, a minimum link visibility path is a polygonal visibility path in P that has the minimum number of links. The problem of finding a minimum link visibility path is NP-hard for simple polygons. If the link-length (number of links) of a minimum link visibility path (tour) is Opt for a simple polygon P with n vertices, we provide an algorithm with runtime that produces polygonal visibility paths (or tours) of link-length at most (or ), where k is a parameter dependent on P, is an output sensitive parameter and γ is the approximation factor of an time approximation algorithm for the geometric travelling salesman problem (path or tour version).
我们研究了众所周知的多边形可见路径(守望者)问题的一个实际变体。对于多边形P,最小链接可见性路径是P中具有最少链接数的多边形可见性路径。寻找最小链接可见性路径的问题对于简单多边形来说是np困难的。如果最小链接可见性路径(巡回)的链接长度(链接数)是一个具有n个顶点的简单多边形P的选择,我们提供了一个运行时算法,该算法产生链接长度最多(或)的多边形可见性路径(或巡回),其中k是依赖于P的参数,是输出敏感参数,γ是几何旅行推销员问题(路径或巡回版本)的时间近似算法的近似因子。
{"title":"On approximations to minimum link visibility paths in simple polygons","authors":"Mohammad Reza Zarrabi, N. M. Charkari","doi":"10.1080/23799927.2020.1831612","DOIUrl":"https://doi.org/10.1080/23799927.2020.1831612","url":null,"abstract":"We investigate a practical variant of the well-known polygonal visibility path (watchman) problem. For a polygon P, a minimum link visibility path is a polygonal visibility path in P that has the minimum number of links. The problem of finding a minimum link visibility path is NP-hard for simple polygons. If the link-length (number of links) of a minimum link visibility path (tour) is Opt for a simple polygon P with n vertices, we provide an algorithm with runtime that produces polygonal visibility paths (or tours) of link-length at most (or ), where k is a parameter dependent on P, is an output sensitive parameter and γ is the approximation factor of an time approximation algorithm for the geometric travelling salesman problem (path or tour version).","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"37 1","pages":"300 - 307"},"PeriodicalIF":0.8,"publicationDate":"2020-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80005909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Edge-pancyclicity of pancake graph 煎饼图的边环性
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-07-02 DOI: 10.1080/23799927.2020.1803972
Chun-Nan Hung, Mohamad Abdallah, Jui-I Weng, Tzu-Liang Kung
ABSTRACT Pancylicity was introduced by Bondy in 1971. A graph G with vertex set and edge set is pancyclic if it contains cycles of lengths l, for . This concept has been extended to edge-pancyclicity. If every edge of G is in a cycle of every length, G is edge-pancyclic. If every edge lies on cycles of all lengths ranging from k to , G is k-edge-pancyclic. In this paper, we prove that the n-dimensional pancake graph is 7-edge-pancyclic.
邦迪于1971年提出了全环性。具有顶点集和边集的图G是泛环,如果它包含长度为l的环,对于。这个概念已经扩展到边环。如果G的每条边都在一个任意长度的环中,则G是边环。如果每条边都位于从k到的所有长度的环上,则G是k边环。本文证明了n维煎饼图是7边环。
{"title":"Edge-pancyclicity of pancake graph","authors":"Chun-Nan Hung, Mohamad Abdallah, Jui-I Weng, Tzu-Liang Kung","doi":"10.1080/23799927.2020.1803972","DOIUrl":"https://doi.org/10.1080/23799927.2020.1803972","url":null,"abstract":"ABSTRACT Pancylicity was introduced by Bondy in 1971. A graph G with vertex set and edge set is pancyclic if it contains cycles of lengths l, for . This concept has been extended to edge-pancyclicity. If every edge of G is in a cycle of every length, G is edge-pancyclic. If every edge lies on cycles of all lengths ranging from k to , G is k-edge-pancyclic. In this paper, we prove that the n-dimensional pancake graph is 7-edge-pancyclic.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"49 1","pages":"125 - 133"},"PeriodicalIF":0.8,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74208104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of stationary queue-length distributions of the BMAP/R(a,b)/1 queue BMAP/R(a,b)/1队列平稳队列长度分布分析
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-07-02 DOI: 10.1080/23799927.2020.1797883
S. K. Samanta, B. Bank
This paper investigates an infinite waiting space single-server queueing system in which customers arrive according to a batch Markovian arrival process. The server serves the customers in batches of maximum size ‘b’ with a minimum threshold value ‘a’. The service time of each batch follows R-type distribution, where R-type distribution represents a class of distributions whose Laplace-Stieltjes transform is rational or approximated rational function, which is independent of service batch size and the arrival process. We determine the queue-length distribution at departure epoch in terms of roots of the associated characteristic equation of the vector probability generating function. To show the strength and advantage of roots method, we also provide a comprehensive analysis of the queue-length distribution at departure epoch using the matrix-analytic method (MAM). To determine the queue-length distribution at random epoch, we obtain a relation between the queue-length distributions at departure and random epochs using the supplementary variable technique with remaining service time of a batch in service as the supplementary variable. We also derive the queue-length distributions at pre-arrival epoch of an arrived batch and post-arrival epoch of a random customer of an arrived batch. Some numerical results are demonstrated for different service-time distributions to show the key performance measures of the system.
本文研究了一类无限等待空间单服务器排队系统,该系统中顾客按批马尔可夫到达过程到达。服务器以最大大小为“b”的批为客户提供服务,最小阈值为“a”。每批服务时间服从r型分布,其中r型分布表示一类Laplace-Stieltjes变换为有理或近似有理函数的分布,与服务批大小和到达过程无关。我们用向量概率生成函数的相关特征方程的根来确定出发时刻的队列长度分布。为了显示根方法的优势和优势,我们还使用矩阵解析方法(MAM)对出发时刻的队列长度分布进行了全面的分析。为了确定随机时刻的队列长度分布,我们采用补充变量技术,以在役批的剩余服务时间为补充变量,得到了出发时刻队列长度分布与随机时刻队列长度分布之间的关系。我们还推导了到达批的随机顾客到达前和到达后的队列长度分布。针对不同的服务时间分布,给出了一些数值结果,以显示系统的关键性能指标。
{"title":"Analysis of stationary queue-length distributions of the BMAP/R(a,b)/1 queue","authors":"S. K. Samanta, B. Bank","doi":"10.1080/23799927.2020.1797883","DOIUrl":"https://doi.org/10.1080/23799927.2020.1797883","url":null,"abstract":"This paper investigates an infinite waiting space single-server queueing system in which customers arrive according to a batch Markovian arrival process. The server serves the customers in batches of maximum size ‘b’ with a minimum threshold value ‘a’. The service time of each batch follows R-type distribution, where R-type distribution represents a class of distributions whose Laplace-Stieltjes transform is rational or approximated rational function, which is independent of service batch size and the arrival process. We determine the queue-length distribution at departure epoch in terms of roots of the associated characteristic equation of the vector probability generating function. To show the strength and advantage of roots method, we also provide a comprehensive analysis of the queue-length distribution at departure epoch using the matrix-analytic method (MAM). To determine the queue-length distribution at random epoch, we obtain a relation between the queue-length distributions at departure and random epochs using the supplementary variable technique with remaining service time of a batch in service as the supplementary variable. We also derive the queue-length distributions at pre-arrival epoch of an arrived batch and post-arrival epoch of a random customer of an arrived batch. Some numerical results are demonstrated for different service-time distributions to show the key performance measures of the system.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"43 1","pages":"198 - 223"},"PeriodicalIF":0.8,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87214834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A discrete-time batch transmission channel with random serving capacity under batch-size-dependent service: 基于批大小的服务下具有随机服务容量的离散批传输信道:
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-07-02 DOI: 10.1080/23799927.2020.1792998
S. Pradhan
Discrete-time queues have increasingly diverse spectrum of applications in the modern packet-basedcommunication systems. Due to the wide range of applicability of such queues, we analyze a discrete-time queue with group-arrival and batch-service, where transmission time depends on the batch-size. The arrival occurs according tothe batch Bernoulli process and service is provided according to the random serving capacity rule. First, we obtain the bivariate probability generating function of the joint distribution of queue and server content at post transmission epoch. After the determination of unknown probabilities, the complete joint distribution has been extracted. We also acquire the probability distribution at random and pre-arrival epochs. An approximation of the tail distribution is also discussed so that it will be useful to improve the cell loss ratio. Some assorted numerical examples are incorporated to validate the analytic procedure and results.
离散时间队列在现代分组通信系统中有着越来越广泛的应用。由于这类队列具有广泛的适用性,我们分析了具有群到达和批服务的离散时间队列,其中传输时间取决于批大小。按批伯努利过程到达,按随机服务容量规则提供服务。首先,我们得到了传输后时刻队列和服务器内容联合分布的二元概率生成函数。在确定未知概率后,提取出完整的联合分布。我们还得到了随机时刻和到达前时刻的概率分布。本文还讨论了尾部分布的近似值,以便于提高电池损失率。结合一些数值算例对分析过程和结果进行了验证。
{"title":"A discrete-time batch transmission channel with random serving capacity under batch-size-dependent service:","authors":"S. Pradhan","doi":"10.1080/23799927.2020.1792998","DOIUrl":"https://doi.org/10.1080/23799927.2020.1792998","url":null,"abstract":"Discrete-time queues have increasingly diverse spectrum of applications in the modern packet-basedcommunication systems. Due to the wide range of applicability of such queues, we analyze a discrete-time queue with group-arrival and batch-service, where transmission time depends on the batch-size. The arrival occurs according tothe batch Bernoulli process and service is provided according to the random serving capacity rule. First, we obtain the bivariate probability generating function of the joint distribution of queue and server content at post transmission epoch. After the determination of unknown probabilities, the complete joint distribution has been extracted. We also acquire the probability distribution at random and pre-arrival epochs. An approximation of the tail distribution is also discussed so that it will be useful to improve the cell loss ratio. Some assorted numerical examples are incorporated to validate the analytic procedure and results.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"388 1","pages":"175 - 197"},"PeriodicalIF":0.8,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84994118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bipartite dot product graphs 二部点积图
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-06-23 DOI: 10.1080/23799927.2020.1779820
Sean Bailey, David E. Brown
Given a bipartite graph , the bipartite dot product representation of G is a function and a positive threshold t such that for any and , if and only if . The minimum k such that a bipartite dot product representation exists for G is the bipartite dot product dimension of G, denoted . We will show that such representations exist for all bipartite graphs as well as give an upper bound for the bipartite dot product dimension of any graph. We will also characterize the bipartite graphs of bipartite dot product dimension 1 by their forbidden subgraphs.
给定一个二部图,G的二部点积表示是一个函数和一个正阈值t,使得对于任意且当且仅当。使G存在二部点积表示的最小k是G的二部点积维数,记为。我们将证明所有二部图都存在这样的表示,并给出任何图的二部点积维数的上界。我们也将用二部点积维数为1的二部图的禁忌子图来描述二部图。
{"title":"Bipartite dot product graphs","authors":"Sean Bailey, David E. Brown","doi":"10.1080/23799927.2020.1779820","DOIUrl":"https://doi.org/10.1080/23799927.2020.1779820","url":null,"abstract":"Given a bipartite graph , the bipartite dot product representation of G is a function and a positive threshold t such that for any and , if and only if . The minimum k such that a bipartite dot product representation exists for G is the bipartite dot product dimension of G, denoted . We will show that such representations exist for all bipartite graphs as well as give an upper bound for the bipartite dot product dimension of any graph. We will also characterize the bipartite graphs of bipartite dot product dimension 1 by their forbidden subgraphs.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"67 1","pages":"148 - 158"},"PeriodicalIF":0.8,"publicationDate":"2020-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89872726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The complexity of total k-domatic partition and total R-domination on graphs with weak elimination orderings 弱消序图上全k域划分和全r支配的复杂性
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-06-04 DOI: 10.1080/23799927.2020.1771427
Chuan-Min Lee
In this paper, we propose two linear-time algorithms. One is for computing a weak elimination ordering of a bipartite distance-hereditary graph, and the other one is an alternative algorithm to solve the total R-domination problem for any chordal bipartite graph with a weak elimination ordering. Our two linear-time algorithms lead to a unified approach to several variations of total domination problems for bipartite distance-hereditary graphs. We also show that tthe total 3-domatic partition problem is NP-complete for planar graphs of maximum degree 9 and planar bipartite graphs of maximum degree 12, and show that the 4-domatic partition problem for planar graphs of maximum degree d is polynomial-time reducible to the total 4-domatic partition problem for planar graphs of maximum degree d + 1.
本文提出了两种线性时间算法。一种是计算二部距离遗传图的弱消序,另一种是求解任何具有弱消序的弦二部图的全r控制问题的替代算法。我们的两种线性时间算法对二部距离遗传图的几种总控制问题给出了统一的解决方法。我们还证明了最大次为9的平面图和最大次为12的平面二部图的总3-域划分问题是np完全的,并证明了最大次为d的平面图的4-域划分问题在多项式时间上可约化为最大次为d + 1的平面图的总4-域划分问题。
{"title":"The complexity of total k-domatic partition and total R-domination on graphs with weak elimination orderings","authors":"Chuan-Min Lee","doi":"10.1080/23799927.2020.1771427","DOIUrl":"https://doi.org/10.1080/23799927.2020.1771427","url":null,"abstract":"In this paper, we propose two linear-time algorithms. One is for computing a weak elimination ordering of a bipartite distance-hereditary graph, and the other one is an alternative algorithm to solve the total R-domination problem for any chordal bipartite graph with a weak elimination ordering. Our two linear-time algorithms lead to a unified approach to several variations of total domination problems for bipartite distance-hereditary graphs. We also show that tthe total 3-domatic partition problem is NP-complete for planar graphs of maximum degree 9 and planar bipartite graphs of maximum degree 12, and show that the 4-domatic partition problem for planar graphs of maximum degree d is polynomial-time reducible to the total 4-domatic partition problem for planar graphs of maximum degree d + 1.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"44 1","pages":"134 - 147"},"PeriodicalIF":0.8,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78632293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computer Mathematics: Computer Systems Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1