How to construct the symmetric cycle of length 5 using Haj\'os construction with an adapted Rank Genetic Algorithm

نویسندگان

چکیده

In 2020 Bang-Jensen et. al. generalized the Haj\'os join of two graphs to class digraphs and several results for vertex colorings in digraphs. Although, as a consequence these results, digraph can be obtained by constructions (directed identifying non-adjacent vertices), determining obtain is complex problem. particular, et posed problem operations construct symmetric 5-cycle from complete order 3 using only constructions. We successfully adapted rank-based genetic algorithm solve this introduction innovative recombination mutation operators graph theory. The Join became operator identification independent vertices operator. way, we were able sequence 16 cycle 5.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

the present study is a survey os postmodern historical novel with respect to the voice of women. it argues how the recorded history is regulated by the rules of power and how women have been excluded from this discourse.ther study analysez angela carters nights at the circus as an example of postmodern historical novel to illustrate how this novel has questioned the historical narrative and how it has inserted women into history by breaking the rules of patriarchy.

the present thesis is a study of postmodern historical novel with respect to the voice of women. according to postmodern historiography,the established institution of history is one of the other manifestations of patriarchys power which has silenced women. the study analyzes angela carters nights at the circus as a postmodern historical novel which makes its female characters transgress the pat...

15 صفحه اول

Using Data Compressors to Construct Rank Tests

New nonparametric rank tests for homogeneity and component independence are proposed, which are based on data compressors. For homogeneity testing the idea is to compress the binary string obtained by ordering the two joint samples and writing 0 if the element is from the first sample and 1 if it is from the second sample and breaking ties by randomization (extension to the case of multiple sam...

متن کامل

AN ALGORITHM FOR FINDING THE EIGENPAIRS OF A SYMMETRIC MATRIX

The purpose of this paper is to show that ideas and techniques of the homotopy continuation method can be used to find the complete set of eigenpairs of a symmetric matrix. The homotopy defined by Chow, Mallet- Paret and York [I] may be used to solve this problem with 2""-n curves diverging to infinity which for large n causes a great inefficiency. M. Chu 121 introduced a homotopy equation...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Discrete Mathematics & Theoretical Computer Science

سال: 2023

ISSN: ['1365-8050', '1462-7264']

DOI: https://doi.org/10.46298/dmtcs.10189