نتایج جستجو برای: connectivity
تعداد نتایج: 65970 فیلتر نتایج به سال:
Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...
Background: Autism Spectrum Disorder (ASD) occurs based on the continuous deficit in a person’s verbal skills, visual, auditory, touch, and social behavior. Over the last two decades, one of the most important approaches in studying brain functions in autistic persons is using functional Magnetic Resonance Imaging (fMRI). Objectives: It is common to use all brain regions in functional extracti...
Many graph theoretical parameters have been used to describe the vulnerability of communication networks, including toughness, binding number, rate of disruption, neighbor-connectivity, integrity, mean integrity, edgeconnectivity vector, l-connectivity and tenacity. In this paper we discuss Integrity and its properties in vulnerability calculation. The integrity of a graph G, I(G), is defined t...
Several results concerning existence of k-paths, for which the sum of their vertex degrees is small, are presented.
In this paper, we shall characterize triangulations on the Klein bottle without K6-minors. Our characterization implies that every 5-connected triangulation on the Klein bottle has a K6-minor. The connectivity “5” is best possible in a sense that there is a 4-connected triangulation on the Klein bottle without K6-minors.
the analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. one is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. in terms of a graph, the concept of connectedness is used in dierent forms to study many of the measures of vulnerability. when certain ver...
introduction: virtual bronchoscopy is a reliable and efficient diagnostic method for primary symptoms of lung cancer. the segmentation of airways from ct images is a critical step for numerous virtual bronchoscopy applications. materials and methods: to overcome the limitations of the fuzzy connectedness method, the proposed technique, called fuzzy connectivity - fuzzy c-mean (fc-fcm), utilized...
چکیده ندارد.
We derived explicit formulae for the eccentric connectivity index and Wiener index of 2-dimensional square-octagonal TUC4C8(R) lattices with open and closed ends. New compression factors for both indices are also computed in the limit N-->∞.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید