963 resultados para indifference graph


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The number of 1-factors (near 1-factors) that mu 1-factorizations (near 1-factorizations) of the complete graph K-v, v even (v odd), can have in common, is studied. The problem is completely settled for mu = 2 and mu = 3.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper compares two hypothetical and identical vehicle deceleration profiles mirrored in time, one linearly descending with time and the other linearly ascending with time. The differences of such profiles on occupant velocity differential and by implication, injury levels at the point of occupant impact are presented. An indifference point is established to assist in comparing which occupant body part will benefit from the altered crash pulse. It is shown that for occupant proximity distances below the indifference point, an ascending profile results in lower injury risk. Above the indifference point, the result is reversed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Hamilton-Waterloo problem asks for a 2-factorisation of K-v in which r of the 2-factors consist of cycles of lengths a(1), a(2),..., a(1) and the remaining s 2-factors consist of cycles of lengths b(1), b(2),..., b(u) (where necessarily Sigma(i)(=1)(t) a(i) = Sigma(j)(=1)(u) b(j) = v). In thus paper we consider the Hamilton-Waterloo problem in the case a(i) = m, 1 less than or equal to i less than or equal to t and b(j) = n, 1 less than or equal to j less than or equal to u. We obtain some general constructions, and apply these to obtain results for (m, n) is an element of {(4, 6)1(4, 8), (4, 16), (8, 16), (3, 5), (3, 15), (5, 15)}.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The trade spectrum of a graph G is essentially the set of all integers t for which there is a graph H whose edges can be partitioned into t copies of G in two entirely different ways. In this paper we determine the trade spectrum of complete partite graphs, in all but a few cases.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Let K-k(d) denote the Cartesian product of d copies of the complete graph K-k. We prove necessary and sufficient conditions for the existence of a K-k(r)-factorization of K-pn(s), where p is prime and k > 1, n, r and s are positive integers. (C) 2002 Elsevier Science B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Let K(r,s,t) denote the complete tripartite graph with partite sets of sizes r, s and t, where r less than or equal to s less than or equal to t. Necessary and sufficient conditions are given for decomposability of K(r, s, t) into 5-cycles whenever r, s and t are all even. This extends work done by Mahmoodian and Mirza-khani (Decomposition of complete tripartite graphs into 5-cycles, in: Combinatorics Advances, Kluwer Academic Publishers, Netherlands, 1995, pp. 235-241) and Cavenagh and Billington. (C) 2002 Elsevier Science B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this note strongly regular graphs with new parameters are constructed using nested "blown up" quadrics in projective spaces. (C) 2002 Elsevier Science B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A 4-cycle trade of volume t corresponds to a simple graph G without isolated vertices, where the edge set can be partitioned into t 4-cycles in at least two different ways such that the two collections of 4-cycles have no 4-cycles in common. The foundation of the trade is v = \V(G)\. This paper determines for which values oft and a there exists a 4-cycle trade of volume t and foundation v.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The most widely used method for predicting the onset of continuous caving is Laubscher's caving chart. A detailed examination of this method was undertaken which concluded that it had limitations which may impact on results, particularly when dealing with stronger rock masses that are outside current experience. These limitations relate to inadequate guidelines for adjustment factors to rock mass rating (RMR), concerns about the position on the chart of critical case history data, undocumented changes to the method and an inadequate number of data points to be confident of stability boundaries. A review was undertaken on the application and reliability of a numerical method of assessing cavability. The review highlighted a number of issues, which at this stage, make numerical continuum methods problematic for predicting cavability. This is in particular reference to sensitivity to input parameters that are difficult to determine accurately and mesh dependency. An extended version of the Mathews method for open stope design was developed as an alternative method of predicting the onset of continuous caving. A number of caving case histories were collected and analyzed and a caving boundary delineated statistically on the Mathews stability graph. The definition of the caving boundary was aided by the existence of a large and wide-ranging stability database from non-caving mines. A caving rate model was extrapolated from the extended Mathews stability graph but could only be partially validated due to a lack of reliable data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article presents Monte Carlo techniques for estimating network reliability. For highly reliable networks, techniques based on graph evolution models provide very good performance. However, they are known to have significant simulation cost. An existing hybrid scheme (based on partitioning the time space) is available to speed up the simulations; however, there are difficulties with optimizing the important parameter associated with this scheme. To overcome these difficulties, a new hybrid scheme (based on partitioning the edge set) is proposed in this article. The proposed scheme shows orders of magnitude improvement of performance over the existing techniques in certain classes of network. It also provides reliability bounds with little overhead.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A theta graph is a graph consisting of three pairwise internally disjoint paths with common end points. Methods for decomposing the complete graph K-nu into theta graphs with fewer than ten edges are given.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we present a technique for visualising hierarchical and symmetric, multimodal fitness functions that have been investigated in the evolutionary computation literature. The focus of this technique is on landscapes in moderate-dimensional, binary spaces (i.e., fitness functions defined over {0, 1}(n), for n less than or equal to 16). The visualisation approach involves an unfolding of the hyperspace into a two-dimensional graph, whose layout represents the topology of the space using a recursive relationship, and whose shading defines the shape of the cost surface defined on the space. Using this technique we present case-study explorations of three fitness functions: royal road, hierarchical-if-and-only-if (H-IFF), and hierarchically decomposable functions (HDF). The visualisation approach provides an insight into the properties of these functions, particularly with respect to the size and shape of the basins of attraction around each of the local optima.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A dissertação aborda a fragilização dos espaços públicos num contexto de utilização de câmeras de vigilância, temática que será problematizada a partir da vigilância exercida pelas câmeras do município de Vila Velha – ES. Partimos da hipótese de que vivemos cercados por objetos técnicos que continuamente produzem informações sobre os sujeitos sociais e os seus espaços como forma de controle. As câmeras representam o exemplo mais conhecido desses objetos, embora sejam apresentadas pelos discursos das administrações públicas como ferramentas de auxílio à segurança. Utilizando como metodologia a observação participante para acompanhamento do trabalho realizado “por trás” das câmeras, concluímos que uma série de fatores desmistificam esses discursos: as câmeras que não são monitoradas, a ausência de manutenção dos equipamentos do sistema, os baixos salários e as condições trabalhistas daqueles que operam as câmeras, a ausência de articulação com os demais setores da prefeitura, a falta de credibilidade das câmeras com a polícia, etc. Por outro lado, ao fazermos um trabalho “na frente” das câmeras, observando o cotidiano de três áreas vigiadas nos bairros Praia da Costa, Glória e Riviera da Barra, bem como entrevistando transeuntes, moradores e comerciantes, concluímos que a maneira surpreendentemente indiferente com que as pessoas lidam com a vigilância é alimentada quando descobrimos que elas não oferecem a segurança pretendida. Se as câmeras não auxiliam a segurança pública, a sua utilização tem um efeito perverso na fragilização dos espaços públicos de Vila Velha, considerando que a vigilância representa ameaças potenciais e reais às condições que o pressupõem: a pluralidade e a liberdade, pois as câmeras atualizam um estado de vigilância permanente alimentando o estigma sobre determinados grupos sociais, que, por sua vez, são os alvos favoritos da vigilância, o que permite às câmeras, ainda, a potencial função de controle socioespacial direto (função admitida inclusive pelos cidadãos entrevistados) sobre os espaços vigiados; e a individualidade dos cidadãos, que é acintosamente violada. As câmeras, portanto, ao pretenderem garantir qualidade de vida à população (oferecendo segurança), produzem o efeito exatamente inverso

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Graphical user interfaces (GUIs) are critical components of todays software. Given their increased relevance, correctness and usability of GUIs are becoming essential. This paper describes the latest results in the development of our tool to reverse engineer the GUI layer of interactive computing systems. We use static analysis techniques to generate models of the user interface behaviour from source code. Models help in graphical user interface inspection by allowing designers to concentrate on its more important aspects. One particularly type of model that the tool is able to generate is state machines. The paper shows how graph theory can be useful when applied to these models. A number of metrics and algorithms are used in the analysis of aspects of the user interface's quality. The ultimate goal of the tool is to enable analysis of interactive system through GUIs source code inspection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful in the areas of reverse engineering, program understanding, testing and software maintenance. Most slicing methods, usually oriented towards the imperative or object paradigms, are based on some sort of graph structure representing program dependencies. Slicing techniques amount, therefore, to (sophisticated) graph transversal algorithms. This paper proposes a completely different approach to the slicing problem for functional programs. Instead of extracting program information to build an underlying dependencies’ structure, we resort to standard program calculation strategies, based on the so-called Bird-Meertens formalism. The slicing criterion is specified either as a projection or a hiding function which, once composed with the original program, leads to the identification of the intended slice. Going through a number of examples, the paper suggests this approach may be an interesting, even if not completely general, alternative to slicing functional programs