L(0,1)-labelling of a graph G=(V,E) is a function f from the vertex set V(G) to the set of non-negative integers such that adjacent vertices get number zero apart, and vertices at distance two get distinct numbers. Th...
详细信息
In the article the detection of “missing” or “hidden” data during the processing of the well-defined queries to database is discussed and on terms of quality the importance is justified, the article also covers or...
详细信息
In the article the detection of “missing” or “hidden” data during the processing of the well-defined queries to database is discussed and on terms of quality the importance is justified, the article also covers organization, processing, and program implementation issues of fuzzy queries to database of information systems.
To maximization the total profit and minimization the total cost we investigate two transportation models with interval transportation parameters and we present a solution of our newly developed models using appropria...
详细信息
As a result of analysis of the existent methods and tools of computer aided design of the technical systems of many industrial areas, the primary purpose of the article that consists in the decision of different proje...
详细信息
As a result of analysis of the existent methods and tools of computer aided design of the technical systems of many industrial areas, the primary purpose of the article that consists in the decision of different project problems within the framework of one programmatic system with the use of comfortable programmatic interface is certain. Architecture of the program interface for computer designing and option of technical systems of different industrial areas on the basis of stage-by-stage automated designing principles with using programmatic and informative supports is worked out. In the article, the problem of computer designing, searching and option of elements of manipulator for flexible manufacture module is considered. As a method of logical simulation of the problem, production model of designing procedures of the program interface and intelligence option of a manipulator, its technical parameters are developed. On the basis of algorithmic scheme of searching, the option of a manipulator from data base is worked out.
Issues related to the curriculum design of C programming language is analysed. Aspects and necessity of programming for engineers is discussed. The enhanced outlay of programming for engineers and generating the curri...
详细信息
ISBN:
(纸本)9789881925329
Issues related to the curriculum design of C programming language is analysed. Aspects and necessity of programming for engineers is discussed. The enhanced outlay of programming for engineers and generating the curriculum is presented. Relativity and dependency briefly highlighted. A superlative teaching model of computer languages is discussed along with its principles. In-Lab monitoring technique is developed successfully using client-server architecture which ensures learner live workshop progress. It is shown how the programming for engineer's curriculum design and techniques help to create highest quality outcome.
In this paper, we study properties of solutions to doubly nonlinear reaction-diffusion systems with variable density and source. We demonstrate the possibilities of the self-similar approach to studying the qualitativ...
详细信息
In this paper, we study properties of solutions to doubly nonlinear reaction-diffusion systems with variable density and source. We demonstrate the possibilities of the self-similar approach to studying the qualitative properties of solutions of such reaction-diffusion systems. We also study the finite speed of propagation (FSP) properties of solutions, an asymptotic behavior of the compactly supported solutions and free boundary asymptotic solutions in quick diffusive and critical cases.
Notice of Violation of IEEE Publication Principles "The Use of Cryptography in Network Security" by Zafar Jafarov in the Proceedings of the 9th International Conference on Application of Information and Comm...
Notice of Violation of IEEE Publication Principles "The Use of Cryptography in Network Security" by Zafar Jafarov in the Proceedings of the 9th International Conference on Application of Information and Communication Technologies (AICT), October 2015 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE’s Publication Principles. This paper is a duplication of the original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission. Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article: "Network Security Using Cryptographic Techniques" by Sumedha Kaushik, Ankur Singhal in the International Journal of Advanced Research in Computer Science and Software Engineering, Vol 2, Issue 12, December 2012 Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software, and information in a network. Only one particular element underlies many of the security mechanisms in use: Cryptographic techniques; hence our focus is on this area Cryptography. Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and a considerable research effort is still required for secured communication.
Contemporary simulation technology for neuronal networks enables the simulation of brain-scale networks using neuron models with a single or a few compartments. However, distributed simulations at full cell density ar...
详细信息
iTask3 is the most recent incarnation of the iTask framework for the construction of distributed systems where users work together on the internet. It offers a domain specific language for defining applications, embed...
详细信息
In this manuscript, an Economic production quantity (EPQ) model have been formulated for deteriorating items under partial trade credit policy with crisp and fuzzy demand. For fuzzy demand we take demand as a triangul...
详细信息
In this manuscript, an Economic production quantity (EPQ) model have been formulated for deteriorating items under partial trade credit policy with crisp and fuzzy demand. For fuzzy demand we take demand as a triangular fuzzy number & we consider upper α 1 − cut & lower α 1 − cut of this fuzzy number. Then the annual inventory cost of retailer is divided into two parts upper α 1 − cut of annual inventory cost & lower α 1 − cut of annual inventory cost. We use weighted sum method to convert multi objective to a single objective. Here we have to derive optimum cycle time so as to minimize the total average cost. Numerical examples are used to illustrate all results obtained in this paper. Finally the model is solved by Generalized Reduced Gradient(GRG) method and using LINGO(12) software.
暂无评论