Application of Integral Value Transformation (IVT) in a Specialized Computer Network Design
نویسندگان
چکیده
Integral Value Transformation (IVT) is a family of transformations from to . An algebraic result has been established in p-adic IVT systems and an application of the result is described in this paper. The result in this paper provides the rule to find the p th pre image of a natural number for the Collatz like bijective functions in p-adic IVT systems. Using this result a routing algorithm is proposed. This proposed routing algorithm reduces number of searches and address calculation.
منابع مشابه
Wireless sensor network design through genetic algorithm
In this paper, we study WSN design, as a multi-objective optimization problem using GA technique. We study the effects of GA parameters including population size, selection and crossover method and mutation probability on the design. Choosing suitable parameters is a trade-off between different network criteria and characteristics. Type of deployment, effect of network size, radio communication...
متن کاملCoupled Integral Equations Approach in the Solution of Luikov Equations with Microwave Effect
The objective of this study is to present a mathematical modeling and solution approach for the drying process of spheroidal solids with the application of microwave in capillary porous media based on the Luikov equations, composed of a system of linear and coupled partial differential equations arising from the energy, mass and pressure balances inside the solid matrix. Additionally, the power...
متن کاملApplication of SVC on Large Synchronous Motors Based on LOC Design (RESEARCH NOTE)
This paper describes the application of static var compensators, (SVC) on an electrical distribution network containing two large synchronous motors, one of which is excited via a three-phase thyristor bridge rectifier. The second machine is excited via a diode bridge rectifier. Based on linear optimization control (LOC), the measurable feedback signals are applied to the control system loops o...
متن کاملInterdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملA wavelet method for stochastic Volterra integral equations and its application to general stock model
In this article,we present a wavelet method for solving stochastic Volterra integral equations based on Haar wavelets. First, we approximate all functions involved in the problem by Haar Wavelets then, by substituting the obtained approximations in the problem, using the It^{o} integral formula and collocation points then, the main problem changes into a system of linear or nonlinear equation w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1201.4329 شماره
صفحات -
تاریخ انتشار 2012