• Title/Summary/Keyword: Hamiltonian Path

Search Result 31, Processing Time 0.03 seconds

Efficient Protection/Restoration by Separation of Domains in Optical Networks (광 네트워크에서의 도메인 분리에 의향 효율적인 보호복구)

  • Yim Soon-Bin;An Hyun-Ki;Lee Tae-Jin
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.77-82
    • /
    • 2005
  • Protection of user service becomes increasingly important since even very short interruption of service due to link or node failure will cause huge data loss and incur tremendous restoration cost in high speed network environment. Thus fast and efficient protection and restoration is one of the most important issues to be addressed. Protection methods have been proposed to provide efficiency and stability in optical networks. In this paper, an original network is separated into several domains using Hamiltonian cycle. and link protection is performed on the cycles of the domains. We have shown that protection path length can be decreased up to $57{\%}$ with marginal increase of backup capacity. Our proposed method can provide high-speed protection with marginal increase of protection capacity.

Conditions for Disjoint Path Coverability in Proper Interval Graphs (진구간 그래프의 서로소인 경로 커버에 대한 조건)

  • Park, Jung-Heum
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.10
    • /
    • pp.539-554
    • /
    • 2007
  • In this Paper, we investigate conditions for proper interval graphs to have k-disjoint path covers of three types each: one-to-one, one-to-many, and many-to-many. It was proved that for $k{\geq}2$, a proper interval graph is one-to-one k-disjoint path coverable if and only if the graph is k-connected, and is one-to-many k-disjoint path coverable if and only if the graph is k+1-connected. For $k{\geq}3$, a Proper interval graph is (paired) many-to-many k-disjoint path coverable if and only if the graph is 2k-1-connected.

An Equilibrium Diffusion Model of Demand and Supply of New Product and Empirical Analysis (신기술 제품의 확산에 관한 수요$\cdot$공급의 균형확산모형과 실증분석)

  • Ha, Tae-Jeong
    • Journal of Technology Innovation
    • /
    • v.13 no.1
    • /
    • pp.113-139
    • /
    • 2005
  • The purpose of this study is to analyse the diffusion process of personal computer (PC) in Korea during the 1990's. To achieve the goal, five research steps have been done such as the literature survey of diffusion theory, set-up of theoretic equilibrium model of supply and demand, derivation of an equilibrium path using Hamiltonian, and empirical analysis. The empirical analysis has been performed based on that equilibrium path. The results can be summarized as follows : First, technological attribute of diffusing product influences the diffusion speed of Product. It has been proven that the size of the network has a significant effect on the diffusion of PC in empirical study Second, supply factors have an important role in the diffusion process. According to the empirical analysis, decreasing cost of production as a result of technological advance promotes the speed of diffusion. This point seems to be manifest theoretically, but existing empirical models have not included supply factors explicitly, Third, it has been found out that expectation of decreasing cost would influence the speed of diffusion negatively as expected ex ante. Theoretically this result is supported by arbitrage condition of purchasing timing.

  • PDF

ON PATHOS BLOCK LINE CUT-VERTEX GRAPH OF A TREE

  • Nagesh, Hadonahalli Mudalagiraiah
    • Communications of the Korean Mathematical Society
    • /
    • v.35 no.1
    • /
    • pp.1-12
    • /
    • 2020
  • A pathos block line cut-vertex graph of a tree T, written P BLc(T), is a graph whose vertices are the blocks, cut-vertices, and paths of a pathos of T, with two vertices of P BLc(T) adjacent whenever the corresponding blocks of T have a vertex in common or the edge lies on the corresponding path of the pathos or one corresponds to a block Bi of T and the other corresponds to a cut-vertex cj of T such that cj is in Bi; two distinct pathos vertices Pm and Pn of P BLc(T) are adjacent whenever the corresponding paths of the pathos Pm(vi, vj) and Pn(vk, vl) have a common vertex. We study the properties of P BLc(T) and present the characterization of graphs whose P BLc(T) are planar; outerplanar; maximal outerplanar; minimally nonouterplanar; eulerian; and hamiltonian. We further show that for any tree T, the crossing number of P BLc(T) can never be one.

Graph coloring problem solving by calculations at the DNA level with operating on plasmids

  • Feng, Xiongfeng;Kubik, K.Bogunia
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.49.3-49
    • /
    • 2001
  • In 1994 Adelman´s pioneer work demonstrated that deoxyribonucleic acid (DNA) could be used as a medium for computation to solve mathematical problems. He described the use of DNA based computational approach to solve the Hamiltonian Path Problem (HPP). Since then a number of combinatorial problems have been analyzed by DNA computation approaches including, for example: Maximum Independent Set (MIS), Maximal Clique and Satisfaction (SAT) Problems. In the present paper we propose a method of solving another classic combinatorial optimization problem - the eraph Coloring Problem (GCP), using specifically designed circular DNA plasmids as a computation tool. The task of the analysis is to color the graph so that no two nodes ...

  • PDF

A Coordinate System of Classification for Effective Visualizations of Story Properties (스토리 창작 특성의 효과적 가시화를 위한 분류 좌표계 연구)

  • Kim, Myoung-Jun
    • Journal of Digital Contents Society
    • /
    • v.18 no.6
    • /
    • pp.1119-1125
    • /
    • 2017
  • Genres and actions of stories can be used to classify stories, and used effectively as well for visualizing story properties. This paper proposes a Genre-Action coordinate system for visualizing story property data in 2-dimension that has similarities between the genre and action items along the axes, i.e. a property of spatial continuum. With the proposed Genre-Action coordinate system we found that the genre and action items in the axes are arranged according to their similarities and we were able to achieve a spatially meaningful visualization of story properties where the related data form clusters.

A Degree-Constrained Minimum Spanning Tree Algorithm Using k-opt (k-opt를 적용한 차수 제약 최소신장트리 알고리즘)

  • Lee, Sang-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.31-39
    • /
    • 2015
  • The degree-constrained minimum spanning tree (d-MST) problem is considered NP-complete for no exact solution-yielding polynomial algorithm has been proposed to. One thus has to resort to an heuristic approximate algorithm to obtain an optimal solution to this problem. This paper therefore presents a polynomial time algorithm which obtains an intial solution to the d-MST with the help of Kruskal's algorithm and performs k-opt on the initial solution obtained so as to derive the final optimal solution. When tested on 4 graphs, the algorithm has successfully obtained the optimal solutions.

A Study on Computational Efficiency Enhancement by Using Full Gray Code Genetic Algorithm (전 영역 그레이코드 유전자 알고리듬의 효율성 증대에 관한 연구)

  • 이원창;성활경
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.20 no.10
    • /
    • pp.169-176
    • /
    • 2003
  • Genetic algorithm (GA), which has a powerful searching ability and is comparatively easy to use and also to apply, is in the spotlight in the field of the optimization for mechanical systems these days. However, it also contains some problems of slow convergence and low efficiency caused by a huge amount of repetitive computation. To improve the processing efficiency of repetitive computation, some papers have proposed paralleled GA these days. There are some cases that mention the use of gray code or suggest using gray code partially in GA to raise its slow convergence. Gray code is an encoding of numbers so that adjacent numbers have a single digit differing by 1. A binary gray code with n digits corresponds to a hamiltonian path on an n-dimensional hypercube (including direction reversals). The term gray code is open used to refer to a reflected code, or more specifically still, the binary reflected gray code. However, according to proposed reports, gray code GA has lower convergence about 10-20% comparing with binary code GA without presenting any results. This study proposes new Full gray code GA (FGGA) applying a gray code throughout all basic operation fields of GA, which has a good data processing ability to improve the slow convergence of binary code GA.

ON ERDŐS CHAINS IN THE PLANE

  • Passant, Jonathan
    • Bulletin of the Korean Mathematical Society
    • /
    • v.58 no.5
    • /
    • pp.1279-1300
    • /
    • 2021
  • Let P be a finite point set in ℝ2 with the set of distance n-chains defined as ∆n(P) = {(|p1 - p2|, |p2 - p3|, …, |pn - pn+1|) : pi ∈ P}. We show that for 2 ⩽ n = O|P|(1) we have ${\mid}{\Delta}_n(P){\mid}{\gtrsim}{\frac{{\mid}P{\mid}^n}{{\log}^{\frac{13}{2}(n-1)}{\mid}P{\mid}}}$. Our argument uses the energy construction of Elekes and a general version of Rudnev's rich-line bound implicit in [28], which allows one to iterate efficiently on intersecting nested subsets of Guth-Katz lines. Let G is a simple connected graph on m = O(1) vertices with m ⩾ 2. Define the graph-distance set ∆G(P) as ∆G(P) = {(|pi - pj|){i,j}∈E(G) : pi, pj ∈ P}. Combining with results of Guth and Katz [17] and Rudnev [28] with the above, if G has a Hamiltonian path we have ${\mid}{\Delta}_G(P){\mid}{\gtrsim}{\frac{{\mid}P{\mid}^{m-1}}{\text{polylog}{\mid}P{\mid}}}$.

An Analysis of the Secret Routing Algorithm for Secure Communications (안전한 통신을 위한 비밀 경로 알고리즘의 분석)

  • Yongkeun Bae;Ilyong Chung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.105-116
    • /
    • 1997
  • Routing security is related to the confidentiality of the route taken by the data transmitted over the network. If the route is detected by the adversary, the probability is higher that the data are lost or the data can be intercepted by the adversary. Therefore, the route must be protected. To accomplish this, we select an intermediate node secretly and transmit the data using this intermediate node, instead of sending the data to the destination node using the shortest path. Furthermore, if we use a number of secret routes from the starting node to the destination node, data security is much stronger since we can transmit partial data rather than the entire data along a secret route. In this paper, the routing algorithm for multiple secret paths on MRNS(Mixed Radix Number System) Network, which requires O(1) for the time complexity where is the number of links on a node, is presented employing the HCLS(Hamiltonian Circuit Latin Square) and is analyzed in terms of entropy.