نتایج جستجو برای: symmetric bibd

تعداد نتایج: 81006  

2008
Victor S. Podlazov Artem B. Nikolaev

The method is proposed for building a fault-tolerant system area network (SAN) as a flat network comprised of several copies of the source network. This flat network is based on a theory of balanced incomplete block designs (BIBD).

Journal: :Journal of Statistical Planning and Inference 2007

Journal: :Int. J. Comput. Math. 2011
Daisuke Yokoya Takeo Yamada

A balanced incomplete block design (BIBD) is instrumental in design of experiments. This is usually constructed by algebraic methods such as finite algebra or difference sets. However, in algebraic approaches, no unified method exists, and each BIBD has been constructed in some ad hoc ways. On the other hand, computer-based methods apply the same algorithm to all BIBDs; hence, these are unified...

Journal: :Australasian J. Combinatorics 1992
Alan Rahilly

Given a design V, other designs can be constructed by using unions of various sets of blocks as new blocks. This method of constructing designs is referred to as "the union method". In general, the constructed design has neither constant blocksize nor balance properties. Various situations in which balanced incomplete block designs (BIBD's) and group divisible designs (GDD's) can be constructed...

Journal: :Journal of virology 2015
Jussi Hepojoki Anja Kipar Yegor Korzyukov Lesley Bell-Sakyi Olli Vapalahti Udo Hetzel

UNLABELLED Boid inclusion body disease (BIDB) is a fatal disease of boid snakes, the etiology of which has only recently been revealed following the identification of several novel arenaviruses in diseased snakes. BIBD-associated arenaviruses (BIBDAV) are genetically divergent from the classical Old and New World arenaviruses and also differ substantially from each other. Even though there is c...

Journal: :International Journal of Science and Research Archive 2023

TraceabilityCodes are CombinatorialObjects introduced by Chor, Fiat and Naor in 1994[7] to be used traitor tracing protect Digital Content. Frameproof Codes were given byBoneh Shaw 1994 prevent privacy gave the idea of c-secure codes withέ-error. Traceable is a strong form Codes. Balanced Incomplete Block Design frameproof arealready available literature [4]. Here this paper we will define how ...

Journal: :Electr. J. Comb. 2007
Neil A. McKay David A. Pike

A graph G with vertex set V is said to be n-existentially closed if, for every S ⊂ V with |S| = n and every T ⊆ S, there exists a vertex x ∈ V − S such that x is adjacent to each vertex of T but is adjacent to no vertex of S − T . Given a combinatorial design D with block set B, its block-intersection graph GD is the graph having vertex set B such that two vertices b1 and b2 are adjacent if and...

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

Journal: :Revista Colombiana de Estadística 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید