نتایج جستجو برای: graph operation

تعداد نتایج: 404081  

2006
ERGUN AKLEMAN JIANER CHEN BURAK MERIC

This paper presents a new approach for intuitive and effective design of periodic symmetric tiles. We observe that planar graphs can effectively represent symmetric tiles and graph drawing provides an intuitive paradigm for designing symmetric tiles. Moreover, based on our theoretical work to represent hexagonal symmetry by rectangular symmetry, we are able to present all symmetric tiles as gra...

Journal: :bulletin of the iranian mathematical society 0
r. kafshgarzaferani

0

2017
Yanxia Xu Jinjing Huang An Liu Zhixu Li Hongzhi Yin Lei Zhao

Graph pattern matching(GPM) is an important operation on graph computation. Most existing work assumes that query graph or data graph is static, which is contrary to the fact that graphs in real life are intrinsically dynamic. Therefore, in this paper, we propose a new problem of Time-Constrained Graph Pattern Matching(TCGPM) in a large temporal graph. Different from traditional work, our work ...

Journal: :journal of linear and topological algebra (jlta) 2015
m ahrari sh. a. safari sabet b amini

the annihilating-ideal graph of a commutative ring $r$ is denoted by $ag(r)$, whose vertices are all nonzero ideals of $r$ with nonzero annihilators and two distinct vertices $i$ and $j$ are adjacent if and only if $ij=0$. in this article, we completely characterize rings $r$ when $gr(ag(r))neq 3$.

Journal: :iranian journal of mathematical chemistry 0
b basavanagoud karnatak university dharwad s. patil karnatak university v r desai karnatak university m tavakoli ferdowsi university of mashhad a r ashrafi university of kashan

a connected graph g is said to be neighbourly irregular graph if no two adjacent vertices of g have same degree. in this paper we obtain neighbourly irregular derived graphs such as semitotal-point graph, k^{tℎ} semitotal-point graph, semitotal-line graph, paraline graph, quasi-total graph and quasivertex-total graph and also neighbourly irregular of some graph products.

2002
Gerda Erica Mang Ioan Mang

Well-known cipher, like DES, FEAL, IDEA or RC6 gain their security by iterating a cryptographically weak function more times. Data are transformed by reusing the same hardware a wished number of times. The first step of a VLSI cipher implementation is the mapping of the cipher data flow onto the hardware architecture. To prove that each combinational level has by entrance a pseudo-random data, ...

Journal: :iranian journal of mathematical chemistry 2012
m. ghorbani a. zaeembashi m. shahrezaei a. tabatabaei adnani

it is necessary to generate the automorphism group of a chemical graph in computer-aidedstructure elucidation. an euclidean graph associated with a molecule is defined by a weightedgraph with adjacency matrix m = [dij], where for i≠j, dij is the euclidean distance between thenuclei i and j. in this matrix dii can be taken as zero if all the nuclei are equivalent. otherwise,one may introduce dif...

Journal: :algebraic structures and their applications 2015
hossein rashmanlou r.a. borzooei

in this paper, we introduce the notions of product vague graph, balanced product vague graph, irregularity and total irregularity of any irregular vague graphs and some results are presented. also, density and balanced irregular vague graphs are discussed and some of their properties are established. finally we give an application of vague digraphs.

2007
Libor Barto Marcin Kozik Todd Niven

We (hopefully) proved the result in the title. 1 Notation By a we understand a tuple (a, . . . , a) and by a −→a the tuple (a0, . . . , an). By an abuse of the notation we sometimes identify a graph with the set of its edges. By a weak near unanimity operation we understand an operation w(x0, . . . , xh−1) such that • w(x, . . . , x) ≈ x and • w(y, x, . . . , x) ≈ w(x, y, . . . , x) ≈ · · · ≈ w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید