On the diameter vulnerability of Kautz digraphs We show that in the KautzdigraphK(d, t) with dt + dt1 vertices each having out degree d, there exist d vertex-disjoint paths between any pair of distinct v... DZ Du,DF Hsu,YD Lyuu - 《Discrete Mathematics》 被引量: 76发表: 1996年 Cha...
4.4. It keeps the population S separated in two disjoint sub-populations: a sub-population of feasible individuals and a sub-population of infeasible individuals. The algorithm keeps creating new individuals (offspring) until there have been INI iterations without improvement of the best solution, ...
Literature [5] proposes that data mining is a “discovery” process. We should fully analyze a great quantity of existing data, apply the algorithm to the corresponding data set, analyze the content of the data set, mine the pattern, and summarize the useful structure according to the valuable...
Free list groups separate the data structures associated with the free space management of a table into disjoint sets that are available for individual instances. With free list groups, the contention among processes working on different instances is reduced because data blocks with sufficient free spa...
Free list groups separate the data structures associated with the free space management of a table into disjoint sets that are available for individual instances. With free list groups, the performance issues among processes working on different instances is reduced because data blocks with sufficient ...
Another AES variant we successfully attack is the 5-round version of AES in which the S-box and the linear mixing operations are secret key-dependent components of the same general structure as in AES. The best currently known key recovery attack on this variant, presented by Tiessen et al...
Within the runtime of an Agent any input, output, and intermediate values can use the concept of a semantic type (Section 3.3) to do things like restrict the valid numeric range of a value or allow a union of disjoint types to be present (e.g., a certain value can be a boolean or...
Complex fuzzy soft matrices play a crucial role in various applications, including decision-making, pattern recognition, signals processing, and image processing. The main objective of this study is to introduce the unique notions of complex Pythagorean
One of the best- known methods is clustering analysis, which attempts to par- tition the samples from a dataset into several disjoint subsets with each of them called a "cluster." All similar points are divided into a cluster, which is not like others. This divi- sion process is performed...
set of verticesand astrength-reducing set of edgesin a DRFG. Internally disjoint [w,z]-DRF-paths are always edge-disjoint [w,z]-DRF-paths, although the converse is not necessarily true. We also define the strong size of DRFG. We then present the vertex version of Menger’s theorem for...