首页 > 最新文献

International Journal of Computer Mathematics: Computer Systems Theory最新文献

英文 中文
Probability theory and public-key cryptography 概率论和公钥密码学
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-06-02 DOI: 10.1080/23799927.2020.1853238
Mariya Bessonov, D. Grigoriev, V. Shpilrain
In this short note, we address a common misconception at the interface of probability theory and public-key cryptography.
在这篇简短的文章中,我们解决了概率论和公钥密码学之间的一个常见误解。
{"title":"Probability theory and public-key cryptography","authors":"Mariya Bessonov, D. Grigoriev, V. Shpilrain","doi":"10.1080/23799927.2020.1853238","DOIUrl":"https://doi.org/10.1080/23799927.2020.1853238","url":null,"abstract":"In this short note, we address a common misconception at the interface of probability theory and public-key cryptography.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"1 1","pages":"285 - 290"},"PeriodicalIF":0.8,"publicationDate":"2020-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74350073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A sufficient condition for visibility paths in simple polygons 简单多边形中可见路径的一个充分条件
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-04-05 DOI: 10.1080/23799927.2023.2166873
Mohammad Reza Zarrabi, N. M. Charkari
ABSTRACT The purpose of this paper is to give a simple proof for a necessary and sufficient condition for visibility paths in simple polygons. A visibility path is a curve such that every point inside a simple polygon is visible from at least one point on the path. This result is essential for finding the shortest watchman route inside a simple polygon specially when the route is restricted to curved paths.
摘要本文的目的是给出简单多边形可见路径的一个充分必要条件的简单证明。可见性路径是一条曲线,使得简单多边形内的每个点从路径上的至少一个点可见。这一结果对于在一个简单多边形内寻找最短的哨兵路线,特别是当路径被限制为弯曲路径时,具有重要的意义。
{"title":"A sufficient condition for visibility paths in simple polygons","authors":"Mohammad Reza Zarrabi, N. M. Charkari","doi":"10.1080/23799927.2023.2166873","DOIUrl":"https://doi.org/10.1080/23799927.2023.2166873","url":null,"abstract":"ABSTRACT The purpose of this paper is to give a simple proof for a necessary and sufficient condition for visibility paths in simple polygons. A visibility path is a curve such that every point inside a simple polygon is visible from at least one point on the path. This result is essential for finding the shortest watchman route inside a simple polygon specially when the route is restricted to curved paths.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"2 1","pages":"93 - 98"},"PeriodicalIF":0.8,"publicationDate":"2020-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91240248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability and sensitivity analysis of a retrial machine repair problem with warm standbys and imperfect coverage 热备和不完全覆盖的重装机维修问题的可靠性和灵敏度分析
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-04-02 DOI: 10.1080/23799927.2020.1748115
Wu-Lin Chen, Kuo-Hsiung Wang
This study aims at proposing system reliability and sensitivity analysis of a retrial machine repair problem with warm standbys and imperfect coverage. When an operating or warm standby machine fails, it may be immediately detected, located, and replaced with a coverage probability by a standby if one is available. The Laplace transform technique is adopted to derive two system performance measures, system reliability and mean time to system failure (MTTF). Sensitivity analysis and relative sensitivity are then executed. In order to realize how each system parameter affects performance measures, extensive numerical experiments are designed and the important results are outlined. The results of this study provide a valuable reference for the good design of related real world systems.
本研究针对不完全覆盖且热备的重审机维修问题,提出系统可靠性与敏感度分析。当一台运行中的或热备用机器发生故障时,它可以立即被检测、定位,并在有覆盖概率的情况下由一台可用的备用机器替换。采用拉普拉斯变换技术推导了系统可靠性和平均故障前时间(MTTF)这两个系统性能指标。然后进行灵敏度分析和相对灵敏度分析。为了了解每个系统参数对性能测量的影响,设计了大量的数值实验,并概述了重要的结果。研究结果为相关系统的良好设计提供了有价值的参考。
{"title":"Reliability and sensitivity analysis of a retrial machine repair problem with warm standbys and imperfect coverage","authors":"Wu-Lin Chen, Kuo-Hsiung Wang","doi":"10.1080/23799927.2020.1748115","DOIUrl":"https://doi.org/10.1080/23799927.2020.1748115","url":null,"abstract":"This study aims at proposing system reliability and sensitivity analysis of a retrial machine repair problem with warm standbys and imperfect coverage. When an operating or warm standby machine fails, it may be immediately detected, located, and replaced with a coverage probability by a standby if one is available. The Laplace transform technique is adopted to derive two system performance measures, system reliability and mean time to system failure (MTTF). Sensitivity analysis and relative sensitivity are then executed. In order to realize how each system parameter affects performance measures, extensive numerical experiments are designed and the important results are outlined. The results of this study provide a valuable reference for the good design of related real world systems.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"7 1","pages":"72 - 86"},"PeriodicalIF":0.8,"publicationDate":"2020-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81724400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The g-extra diagnosability of the generalized exchanged hypercube 广义交换超立方体的g-额外可诊断性
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-04-02 DOI: 10.1080/23799927.2020.1764626
E. Cheng, K. Qiu, Z. Shen
Diagnosability of a self-diagnosable interconnection structure specifies the maximum number of faulty vertices such a structure can identify by itself. A variety of diagnosability models have been suggested. It turns out that a diagnosability property of a network structure is closely associated with its relevant connectivity property. Based on this observation, a general diagnosability derivation process has been suggested. The g-extra connectivity of a graph G characterizes the size of a minimum vertex set F such that, when it is removed, every component in the disconnected survival graph, contains at least g + 1 vertices. In this paper, we discuss the aforementioned general derivation process, derive the g-extra connectivity, and then apply the aforementioned general process to reveal the g-extra diagnosability of the generalized exchanged hypercube.
自诊断互连结构的可诊断性是指该互连结构能够自行识别的故障顶点的最大数目。已经提出了多种诊断模型。结果表明,网络结构的可诊断性与其相关的连通性密切相关。在此基础上,提出了一种通用的诊断性推导过程。图G的G -额外连通性表征了最小顶点集F的大小,当它被移除时,断开生存图中的每个分量至少包含G + 1个顶点。本文讨论了上述的一般推导过程,导出了g-extra连通性,并应用上述的一般推导过程揭示了广义交换超立方体的g-extra可诊断性。
{"title":"The g-extra diagnosability of the generalized exchanged hypercube","authors":"E. Cheng, K. Qiu, Z. Shen","doi":"10.1080/23799927.2020.1764626","DOIUrl":"https://doi.org/10.1080/23799927.2020.1764626","url":null,"abstract":"Diagnosability of a self-diagnosable interconnection structure specifies the maximum number of faulty vertices such a structure can identify by itself. A variety of diagnosability models have been suggested. It turns out that a diagnosability property of a network structure is closely associated with its relevant connectivity property. Based on this observation, a general diagnosability derivation process has been suggested. The g-extra connectivity of a graph G characterizes the size of a minimum vertex set F such that, when it is removed, every component in the disconnected survival graph, contains at least g + 1 vertices. In this paper, we discuss the aforementioned general derivation process, derive the g-extra connectivity, and then apply the aforementioned general process to reveal the g-extra diagnosability of the generalized exchanged hypercube.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"8 1","pages":"112 - 123"},"PeriodicalIF":0.8,"publicationDate":"2020-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90777096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A note on (t - 1)-chromatic Ramsey number of linear forests 线性森林(t - 1)色拉姆齐数的注释
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-04-02 DOI: 10.1080/23799927.2020.1761886
A. Khamseh
Given t distinct colors, we order the t subsets of t−1 colors in some arbitrary manner. Let be graphs. The -chromatic Ramsey number, denoted by , is defined to be the least number n such that if the edges of the complete graph are colored in any fashion with t colors, then for some i the subgraph whose edges are colored with the ith subset of colors contains a . In this paper, we study the -chromatic Ramsey number of linear forests.
给定t种不同的颜色,我们以任意的方式对t−1种颜色的t个子集排序。让我们用图形。表示的-色Ramsey数被定义为最小的数n,如果完全图的边以任意方式用t种颜色着色,则对于某些i,其边用第i种颜色子集着色的子图包含a。本文研究了线性森林的-色拉姆齐数。
{"title":"A note on (t - 1)-chromatic Ramsey number of linear forests","authors":"A. Khamseh","doi":"10.1080/23799927.2020.1761886","DOIUrl":"https://doi.org/10.1080/23799927.2020.1761886","url":null,"abstract":"Given t distinct colors, we order the t subsets of t−1 colors in some arbitrary manner. Let be graphs. The -chromatic Ramsey number, denoted by , is defined to be the least number n such that if the edges of the complete graph are colored in any fashion with t colors, then for some i the subgraph whose edges are colored with the ith subset of colors contains a . In this paper, we study the -chromatic Ramsey number of linear forests.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"24 1","pages":"92 - 97"},"PeriodicalIF":0.8,"publicationDate":"2020-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83262029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dominating functions in graphs – regularity versus irregularity 图中的支配函数-规则与不规则
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-04-02 DOI: 10.1080/23799927.2020.1762744
James Hallas, Maria Talanda-Fisher, Ping Zhang
A vertex v in a graph G is said to dominate a vertex u if either u = v or and a set S of vertices in G is a dominating set of G if every vertex of G is dominated by at least one vertex in S. Domination has been looked at in an equivalent way. A function is a dominating function of a graph G if for every vertex v of G. We use dominating functions to investigate graphs all of whose vertices are dominated by the same number of vertices as well as those graphs whose vertices are dominated by as many different number of vertices as possible.
如果u = v或,则图G中的顶点v被称为支配顶点u,如果G中的每个顶点都被S中的至少一个顶点支配,则G中的顶点集S就是G的支配集。一个函数是图G的支配函数,如果对于G的每个顶点v,我们使用支配函数来研究所有顶点由相同数量的顶点控制的图,以及那些顶点由尽可能多的不同数量的顶点控制的图。
{"title":"Dominating functions in graphs – regularity versus irregularity","authors":"James Hallas, Maria Talanda-Fisher, Ping Zhang","doi":"10.1080/23799927.2020.1762744","DOIUrl":"https://doi.org/10.1080/23799927.2020.1762744","url":null,"abstract":"A vertex v in a graph G is said to dominate a vertex u if either u = v or and a set S of vertices in G is a dominating set of G if every vertex of G is dominated by at least one vertex in S. Domination has been looked at in an equivalent way. A function is a dominating function of a graph G if for every vertex v of G. We use dominating functions to investigate graphs all of whose vertices are dominated by the same number of vertices as well as those graphs whose vertices are dominated by as many different number of vertices as possible.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"14 1","pages":"111 - 98"},"PeriodicalIF":0.8,"publicationDate":"2020-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80815360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hybrid fault diagnosis capability analysis of regular graphs under the PMC model PMC模型下正则图的混合故障诊断能力分析
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-02-26 DOI: 10.1080/23799927.2020.1735523
Hong Zhang, Laijiang Zhang, J. Meng
Diagnosabilty is an important metric to the capability of fault identification for multiprocessor systems. However, most researches on diagnosability focus on vertex fault. In real circumstances, not only vertex faults take place but also malfunctions may arise. In this paper, we study the diagnosability of k-regular 2-cn graph with missing edges. Let be a set of missing edges in graph G with . We prove that the diagnosability of is at most for . Furthermore, we obtain that the worst-case diagnosability (h-edge tolerable diagnosability), denoted by , is maximum number of faulty nodes that a system G can guarantee to locate when the number of faulty links does not exceed h. As applications, the diagnosabilities of many networks with missing edges are determined under the PMC model.
可诊断性是衡量多处理机系统故障识别能力的重要指标。然而,大多数关于可诊断性的研究都集中在顶点故障上。在实际情况下,不仅会发生顶点故障,还可能出现故障。本文研究了缺边k-正则2-cn图的可诊断性。设为图G中缺失边的集合。我们证明的可诊断性最多为。进一步,我们得到了最坏情况可诊断性(h边可容忍可诊断性),用表示为当故障链路数不超过h时,系统G能保证定位的最大故障节点数。作为应用,在PMC模型下确定了许多缺边网络的可诊断性。
{"title":"Hybrid fault diagnosis capability analysis of regular graphs under the PMC model","authors":"Hong Zhang, Laijiang Zhang, J. Meng","doi":"10.1080/23799927.2020.1735523","DOIUrl":"https://doi.org/10.1080/23799927.2020.1735523","url":null,"abstract":"Diagnosabilty is an important metric to the capability of fault identification for multiprocessor systems. However, most researches on diagnosability focus on vertex fault. In real circumstances, not only vertex faults take place but also malfunctions may arise. In this paper, we study the diagnosability of k-regular 2-cn graph with missing edges. Let be a set of missing edges in graph G with . We prove that the diagnosability of is at most for . Furthermore, we obtain that the worst-case diagnosability (h-edge tolerable diagnosability), denoted by , is maximum number of faulty nodes that a system G can guarantee to locate when the number of faulty links does not exceed h. As applications, the diagnosabilities of many networks with missing edges are determined under the PMC model.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"72 1","pages":"61 - 71"},"PeriodicalIF":0.8,"publicationDate":"2020-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81217037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
RSA and redactable blockchains
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-01-29 DOI: 10.1080/23799927.2020.1842808
D. Grigoriev, V. Shpilrain
A blockchain is redactable if a private key holder (e.g. a central authority) can change any single block without violating integrity of the whole blockchain, but no other party can do that. In this paper, we offer a simple method of constructing redactable blockchains inspired by the ideas underlying the well-known RSA encryption scheme. Notably, our method can be used in conjunction with any reasonable hash function that is used to build a blockchain. Public immutability of a blockchain in our construction is based on the computational hardness of the RSA problem and not on properties of the underlying hash function. Corruption resistance is based on the computational hardness of the discrete logarithm problem.
如果私钥持有者(例如中央机构)可以在不违反整个区块链完整性的情况下更改任何单个块,那么区块链是可重写的,但没有其他方可以这样做。在本文中,我们提供了一种简单的方法来构建可读的区块链,其灵感来自于众所周知的RSA加密方案的底层思想。值得注意的是,我们的方法可以与用于构建区块链的任何合理的哈希函数结合使用。在我们的构建中,区块链的公共不变性是基于RSA问题的计算硬度,而不是基于底层哈希函数的属性。抗损坏性是基于离散对数问题的计算硬度。
{"title":"RSA and redactable blockchains","authors":"D. Grigoriev, V. Shpilrain","doi":"10.1080/23799927.2020.1842808","DOIUrl":"https://doi.org/10.1080/23799927.2020.1842808","url":null,"abstract":"A blockchain is redactable if a private key holder (e.g. a central authority) can change any single block without violating integrity of the whole blockchain, but no other party can do that. In this paper, we offer a simple method of constructing redactable blockchains inspired by the ideas underlying the well-known RSA encryption scheme. Notably, our method can be used in conjunction with any reasonable hash function that is used to build a blockchain. Public immutability of a blockchain in our construction is based on the computational hardness of the RSA problem and not on properties of the underlying hash function. Corruption resistance is based on the computational hardness of the discrete logarithm problem.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"12 1","pages":"1 - 6"},"PeriodicalIF":0.8,"publicationDate":"2020-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84714900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A bargaining game model for measuring efficiency of two-stage network DEA with non-discretionary inputs 非自由支配投入下两阶段网络DEA效率测度的议价博弈模型
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-01-02 DOI: 10.1080/23799927.2020.1723708
Elham Abdali, R. Fallahnejad
Conventional data envelopment analysis (DEA) is a method for measuring the efficiency of decision-making units (DMUs). Recently, to measure the efficiency of sub-DMUs (Stages), several network DEA models have been developed, in which the results of network DEA models not only provide the overall efficiency of the whole system but also provide the efficiency of the individual stages. This study develops a bargaining game model for measuring the efficiency of DMUs that have a two-stage network structure with non-discretionary inputs, that the model as a method of dealing with the conflict arising from the intermediate measures. Under the Nash bargaining game theory, the two stages in the network DEA are considered as players and network DEA model is a cooperative game model. Here, the non-discretionary additional inputs in the second stage make changes in the cooperative game model, so that managers of units cannot change the value of non-discretionary inputs in measuring the efficiency of the bargaining game model, and this causes the desired and expected output of the managers not to be produced. In addition, it can be stated that the presence of such inputs is capable, significantly affecting the system efficiency score and stages. So that the existence of the inputs in the measuring efficiency of decision-making units reduces the efficiency score of cooperative game. In this study, linearizing the model in the presence of the non-discretionary input is a new idea in the bargaining game model. A numerical example shows the applicability of the new model.
传统的数据包络分析(DEA)是衡量决策单位效率的一种方法。近年来,为了衡量子决策单元(阶段)的效率,人们开发了几种网络DEA模型,其中网络DEA模型的结果既提供了整个系统的整体效率,也提供了各个阶段的效率。本研究建立了一个讨价还价博弈模型,用于测量具有非自由裁量投入的两阶段网络结构的决策单位的效率,并将该模型作为处理中间措施产生的冲突的方法。在纳什议价博弈论下,网络DEA中的两个阶段被视为参与者,网络DEA模型是一个合作博弈模型。这里,第二阶段的非自由裁量的额外投入改变了合作博弈模型,使得单位管理者在衡量议价博弈模型的效率时无法改变非自由裁量投入的价值,从而导致管理者的期望产出和期望产出无法产生。此外,可以说,这些输入的存在是有能力的,显著影响系统效率得分和阶段。因此,衡量决策单位效率的输入的存在降低了合作博弈的效率得分。在本文中,在存在非自由裁量输入的情况下对模型进行线性化是议价博弈模型中的一个新思路。数值算例表明了该模型的适用性。
{"title":"A bargaining game model for measuring efficiency of two-stage network DEA with non-discretionary inputs","authors":"Elham Abdali, R. Fallahnejad","doi":"10.1080/23799927.2020.1723708","DOIUrl":"https://doi.org/10.1080/23799927.2020.1723708","url":null,"abstract":"Conventional data envelopment analysis (DEA) is a method for measuring the efficiency of decision-making units (DMUs). Recently, to measure the efficiency of sub-DMUs (Stages), several network DEA models have been developed, in which the results of network DEA models not only provide the overall efficiency of the whole system but also provide the efficiency of the individual stages. This study develops a bargaining game model for measuring the efficiency of DMUs that have a two-stage network structure with non-discretionary inputs, that the model as a method of dealing with the conflict arising from the intermediate measures. Under the Nash bargaining game theory, the two stages in the network DEA are considered as players and network DEA model is a cooperative game model. Here, the non-discretionary additional inputs in the second stage make changes in the cooperative game model, so that managers of units cannot change the value of non-discretionary inputs in measuring the efficiency of the bargaining game model, and this causes the desired and expected output of the managers not to be produced. In addition, it can be stated that the presence of such inputs is capable, significantly affecting the system efficiency score and stages. So that the existence of the inputs in the measuring efficiency of decision-making units reduces the efficiency score of cooperative game. In this study, linearizing the model in the presence of the non-discretionary input is a new idea in the bargaining game model. A numerical example shows the applicability of the new model.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"694 1","pages":"48 - 59"},"PeriodicalIF":0.8,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80581884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A characterization of graphs with supereulerian line graphs 用超欧拉线形图刻画图
IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-01-02 DOI: 10.1080/23799927.2019.1708465
Yufei Huang, Weihua He, Guixian Huang, H. Lai, Sulin Song
The line graph of a graph G is a simple graph with being its vertex set, where two vertices are adjacent in whenever the corresponding edges share a common vertex in G. A graph H is even if every vertex of H has even degree, and a graph is supereulerian if it has a spanning closed trail. We obtain a characterization for a graph G to have a supereulerian line graph , as follows: for a connected graph G with , the line graph has a spanning closed trail if and only if G has an even subgraph H (possibly null) such that both G remains connected after deleting all degree 2 vertices not in H, and every degree 2 vertex not in H must be adjacent only to vertices of degree at least 3 in G.
图G的线形图是一个简单图,它的顶点集是两个顶点相邻的,当对应的边在G中有一个共同的顶点时,图H是偶度的,图H是偶度的,图H是超欧拉图,如果它有张成的闭合轨迹。我们获得表征一个图G supereulerian线图,如下:对于一个连通图G,线图的生成封闭落后甚至当且仅当G的子图H(可能为空),这样两个G仍然连接顶点删除所有学位后2 H,每2度顶点不仅在H必须相邻顶点的度至少3 G。
{"title":"A characterization of graphs with supereulerian line graphs","authors":"Yufei Huang, Weihua He, Guixian Huang, H. Lai, Sulin Song","doi":"10.1080/23799927.2019.1708465","DOIUrl":"https://doi.org/10.1080/23799927.2019.1708465","url":null,"abstract":"The line graph of a graph G is a simple graph with being its vertex set, where two vertices are adjacent in whenever the corresponding edges share a common vertex in G. A graph H is even if every vertex of H has even degree, and a graph is supereulerian if it has a spanning closed trail. We obtain a characterization for a graph G to have a supereulerian line graph , as follows: for a connected graph G with , the line graph has a spanning closed trail if and only if G has an even subgraph H (possibly null) such that both G remains connected after deleting all degree 2 vertices not in H, and every degree 2 vertex not in H must be adjacent only to vertices of degree at least 3 in G.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":"11 1","pages":"1 - 14"},"PeriodicalIF":0.8,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78935084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Computer Mathematics: Computer Systems Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1