An L(0,1)-labelling of a graph G is an assignment of nonnegative integers to the vertices of G such that the difference between the labels assigned to any two adjacent vertices is at least zero and the difference betw...
详细信息
An L(0,1)-labelling of a graph G is an assignment of nonnegative integers to the vertices of G such that the difference between the labels assigned to any two adjacent vertices is at least zero and the difference between the labels assigned to any two vertices which are at distance two is at least one. The span of an L(0,1)-labelling is the maximum label number assigned to any vertex of G. The L(0,1)-labelling number of a graph G, denoted by λ0.1(G) is the least integer k such that G has an L(0,1)-labelling of span k. This labelling has an application to a computer code assignment problem. The task is to assign integer control codes to a network of computer stations with distance restrictions. A cactus graph is a connected graph in which every block is either an edge or a cycle. In this paper, we label the vertices of a cactus graph by L(0,1)-labelling and have shown that, △-1≤λ0.1(G)≤△ for a cactus graph, where △ is the degree of the graph G.
Multi-agent approaches can be applied to model behaviour and relations of entities in cyber-physical systems. Here entities frequently compete on insufficient resources (e.g., hardware) at the same time. Hence, resour...
详细信息
Multi-agent approaches can be applied to model behaviour and relations of entities in cyber-physical systems. Here entities frequently compete on insufficient resources (e.g., hardware) at the same time. Hence, resource conflicts between several agents are one of the most important conflict types in such multi-agent systems. These conflicts can significantly slow the operation of a system down, or in the worst case, might lead to a system halt. In this paper, we investigate the challenge of efficiently detecting resource conflicts. For this purpose, we introduce a conflict detection model based on beliefs of BDI agents. One benefit of our approach is that conflicts are detected using local belief state information of agents without communication. For evaluation purposes we apply our conflict detection model to a multi-agent system representing a transportation service with moving robots on a fictitious airport to measure the rate of collisions and completed transportation tasks. The evaluation study showed that the system deploying the conflict detection model can avoid collisions between moving agents and agents execute tasks successfully.
Data mining has become an important and active area of research because of theoretical challenges and practical applications associated with the problem of discovering interesting and previously unknown knowledge from...
详细信息
Data mining has become an important and active area of research because of theoretical challenges and practical applications associated with the problem of discovering interesting and previously unknown knowledge from very large real world database. These databases contain potential gold mine of valuable information, but it is beyond human ability to analyze massive amount of data and elicit meaningful patterns by using conventional techniques. In this study, DNA sequence was analyzed to locate promoter which is a regulatory region of DNA located upstream of a gene, providing a control point for regulated gene transcription. In this study, some supervised learning algorithms such as artificial neural network (ANN), RULES-3 and newly developed keREM rule induction algorithm were used to analyse to DNA sequence. In the experiments different option of keREM, RULES-3 and ANN were used, and according to the empirical comparisons, the algorithms appeared to be comparable to well-known algorithms in terms of the accuracy of the extracted rule in classifying unseen data.
Accelerators such as graphics processing units (GPUs) provide an inexpensive way of improving the performance of cluster systems. In such an arrangement, the individual nodes of the cluster are directly connected to o...
详细信息
Access control is a vital security mechanism in today's operating systems and the security policies dictating the security relevant behaviors is lengthy and complex for example in Security-Enhanced Linux (SELinux)...
详细信息
In this paper we demonstrate the semantic feature machine translation (MT) system as a combination of two fundamental approaches, where the rule-based side is supported by the functional model of the Russian language ...
详细信息
ISBN:
(纸本)9789898425775
In this paper we demonstrate the semantic feature machine translation (MT) system as a combination of two fundamental approaches, where the rule-based side is supported by the functional model of the Russian language and the statistical side utilizes statistical word alignment. The MT system relies on a semantic-level contextual translational dictionary as its key component. We will present the method for an automatic generation of the dictionary where disambiguation is done on a semantic level.
As a virtual experimental device for analysis and calculation of grown-in microdefects formation in undoped silicon dislocation-free single crystals the software is proposed. The software is built on the basis on diff...
详细信息
As a virtual experimental device for analysis and calculation of grown-in microdefects formation in undoped silicon dislocation-free single crystals the software is proposed. The software is built on the basis on diffusion model of formation, growth and coalescence of grown-in microdefects. Diffusion model describes kinetics of defect structure changes during cooling after growth on crystallization temperature to room temperature. The software allows the use of personal computer to investigate the defect structure of dislocation-free silicon single crystals with a diameter on 30 mm to 400 mm grown by floating-zone and Czochralski methods.
The efficient use of future MPSoCs with f 000 or more processor cores requires new means of resource-aware programming to deal with increasing imperfections such as process variation, fault rates, aging effects, and p...
详细信息
The goal of this paper is to analyze and propose a reconstruction of functional possibilities and database requirements of a Web based Educational Information system. For the research the Information system of the Tec...
详细信息
The goal of this paper is to analyze and propose a reconstruction of functional possibilities and database requirements of a Web based Educational Information system. For the research the Information system of the technology School "electronic Systems" (TUES) associated with the Technical University of Sofia is on focus. The modules for admission of students, specialty classification, and graduation of students, management of the student's work in computer classrooms and lecturers' data management have been analyzed, developed and implemented. The additionally developed modules concern mainly the management of educational process and do not affect the e-learning or the official part modules. That led to the idea that the functionality for managing educational process has to be organized in a separate module defined as module for administrative services of educational process. Such restructuring of the system will bring flexibility in further growth of the system--for example students' admission or selection for different purposes.
暂无评论