• 제목/요약/키워드: digital k-graph

검색결과 96건 처리시간 0.018초

ON THE SIMPLICIAL COMPLEX STEMMED FROM A DIGITAL GRAPH

  • HAN, SANG-EON
    • 호남수학학술지
    • /
    • 제27권1호
    • /
    • pp.115-129
    • /
    • 2005
  • In this paper, we give a digital graph-theoretical approach of the study of digital images with relation to a simplicial complex. Thus, a digital graph $G_k$ with some k-adjacency in ${\mathbb{Z}}^n$ can be recognized by the simplicial complex spanned by $G_k$. Moreover, we demonstrate that a graphically $(k_0,\;k_1)$-continuous map $f:G_{k_0}{\subset}{\mathbb{Z}}^{n_0}{\rightarrow}G_{k_1}{\subset}{\mathbb{Z}}^{n_1}$ can be converted into the simplicial map $S(f):S(G_{k_0}){\rightarrow}S(G_{k_1})$ with relation to combinatorial topology. Finally, if $G_{k_0}$ is not $(k_0,\;3^{n_0}-1)$-homotopy equivalent to $SC^{n_0,4}_{3^{n_0}-1}$, a graphically $(k_0,\;k_1)$-continuous map (respectively a graphically $(k_0,\;k_1)$-isomorphisim) $f:G_{k_0}{\subset}{\mathbb{Z}}^{n_0}{\rightarrow}G_{k_1}{\subset}{\mathbb{Z}^{n_1}$ induces the group homomorphism (respectively the group isomorphisim) $S(f)_*:{\pi}_1(S(G_{k_0}),\;v_0){\rightarrow}{\pi}_1(S(G_{k_1}),\;f(v_0))$ in algebraic topology.

  • PDF

A Dependability Modeling of Software Under Memory Faults for Digital System in Nuclear Power Plants

  • Park, Jong-Gyun;Seong, Poong-Hyun
    • Nuclear Engineering and Technology
    • /
    • 제29권6호
    • /
    • pp.433-443
    • /
    • 1997
  • In this work, an analytic approach to the dependability of software in the operational phase is suggested with special attention to the hardware fault effects on the software behavior : The hardware faults considered are memory faults and the dependability measure in question is the reliability. The model is based on the simple reliability theory and the graph theory which represents the software with graph composed of nodes and arcs. Through proper transformation, the graph can be reduced to a simple two-node graph and the software reliability is derived from this graph. Using this model, we predict the reliability of an application software in the digital system (ILS) in the nuclear power plant and show the sensitivity of the software reliability to the major physical parameters which affect the software failure in the normal operation phase. We also found that the effects of the hardware faults on the software failure should be considered for predicting the software dependability accurately in operation phase, especially for the software which is executed frequently. This modeling method is particularly attractive for the medium size programs such as the microprocessor-based nuclear safety logic program.

  • PDF

AN EQUIVALENT PROPERTY OF A NORMAL ADJACENCY OF A DIGITAL PRODUCT

  • Han, Sang-Eon
    • 호남수학학술지
    • /
    • 제36권1호
    • /
    • pp.199-215
    • /
    • 2014
  • Owing to the development of the notion of normal adjacency of a digital product [9], product properties of digital topological properties were studied efficiently. To equivalently represent a normal adjacency of a digital product, the present paper proposes an S-compatible adjacency of a digital product. This approach can be helpful to understand a normal adjacency of a digital product. Finally, using an S-compatible adjacency of a digital product, we can study product properties of digital topological properties, which improves the presentations of the normal adjacency of a digital product in [9] and [5, 6].

REMARKS ON DIGITAL HOMOTOPY EQUIVALENCE

  • Han, Sang-Eon
    • 호남수학학술지
    • /
    • 제29권1호
    • /
    • pp.101-118
    • /
    • 2007
  • The notions of digital k-homotopy equivalence and digital ($k_0,k_1$)-homotopy equivalence were developed in [13, 16]. By the use of the digital k-homotopy equivalence, we can investigate digital k-homotopy equivalent properties of Cartesian products constructed by the minimal simple closed 4- and 8-curves in $\mathbf{Z}^2$.

개념그래프 도구의 기능 및 특성 조사 (A Survey on Functions and Characteristics of Conceptual Graph Tools)

  • 양기철
    • 디지털융복합연구
    • /
    • 제12권12호
    • /
    • pp.285-292
    • /
    • 2014
  • 지능형 시스템은 자료나 정보보다 지식을 주로 이용하는 시스템이다. 따라서 지식표현은 지능형 시스템 구축에 있어서 중요한 요소이다. 개념그래프는 지식을 효율적으로 표현할 수 있는 그래프 형태의 논리적 지식표현 언어이다. 하지만 개념그래프를 직접 프로그래밍에 활용하기는 쉽지 않다. 이러한 어려움을 극복하기 위하여 여러 가지 도구들이 개발되었다. 본 논문에서는 개념그래프를 이용한 지능형 시스템 구축에 활용할 수 있는 도구들에는 어떤 것들이 있는지 조사하고 그들의 기능과 특성을 비교 분석한다. 조사결과는 지능형 시스템 구축을 위한 개념그래프 활용에 큰 도움이 될 것이다.

주기 조정과 커널 자동 생성을 통한 다중 루프 시스템의 구현 (Synthesizing multi-loop control systems with period adjustment and Kernel compilation)

  • 홍성수;최종호;박홍성
    • 제어로봇시스템학회논문지
    • /
    • 제3권2호
    • /
    • pp.187-196
    • /
    • 1997
  • This paper presents a semi-automatic methodology to synthesize executable digital controller saftware in a multi-loop control system. A digital controller is described by a task graph and end-to-end timing requirements. A task graph denotes the software structure of the controller, and the end-to-end requirements establish timing relationships between external inputs and outputs. Our approach translates the end-to-end requirements into a set of task attributes such as task periods and deadlines using nonlinear optimization techniques. Such attributes are essential for control engineers to implement control programs and schedule them in a control system with limited resources. In current engineering practice, human programmers manually derive those attributes in an ad hoc manner: they often resort to radical over-sampling to safely guarantee the given timing requirements, and thus render the resultant system poorly utilized. After task-specific attributes are derived, the tasks are scheduled on a single CPU and the compiled kernel is synthesized. We illustrate this process with a non-trivial servo motor control system.

  • PDF

Automatic Extraction of Metadata Information for Library Collections

  • Yang, Gi-Chul;Park, Jeong-Ran
    • International Journal of Advanced Culture Technology
    • /
    • 제6권2호
    • /
    • pp.117-122
    • /
    • 2018
  • As evidenced through rapidly growing digital repositories and web resources, automatic metadata generation is becoming ever more critical, especially considering the costly and complex operation of manual metadata creation. Also, automatic metadata generation is apt to consistent metadata application. In this sense, metadata quality and interoperability can be enhanced by utilizing a mechanism for automatic metadata generation. In this article, a mechanism of automatic metadata extraction called ExMETA is introduced in order to alleviate issues dealing with inconsistent metadata application and semantic interoperability across ever-growing digital collections. Conceptual graph, one of formal languages that represent the meanings of natural language sentences, is utilized for ExMETA as a mediation mechanism that enhances the metadata quality by disambiguating semantic ambiguities caused by isolation of a metadata element and its corresponding definition from the relevant context. Hence, automatic metadata generation by using ExMETA can be a good way of enhancing metadata quality and semantic interoperability.

Tabu Search를 이용한 지름이 2인 그래프에 대한 L(2,1)-coloring 문제 해결 (Using Tabu Search for L(2,1)-coloring Problem of Graphs with Diameter 2)

  • 김소정;김찬수;한근희
    • 디지털융복합연구
    • /
    • 제20권2호
    • /
    • pp.345-351
    • /
    • 2022
  • 단순 무방향 그래프 G 의 L(2,1)-coloring은 d(u,v)가 두 정점 사이의 거리일 때 두 가지 조건 (1) d(x,y) = 1 라면 |f(x)-f(y)|≥ 2, (2) d(x,y) = 2 라면 |f(x)-f(y)|≥ 1 을 만족하는 함수 f : V → [0,1,…,k]를 정의하는 것이다. 임의의 L(2,1)-coloring c 에 대하여 G 의 c-span 은 λ(c)=max{|c(u)-c(v)|| u,v∈V} 이며, L(2,1)-coloring number 인 λ(G)는 모든 가능한 c 에 대하여 λ(G) = min{λ(c)} 로 정의된다. 본 논문에서는 Harary의 정리에 기반하여 지름이 2인 그래프에 대하여 여그래프에 해밀턴 경로의 존재여부를 Tabu Search를 사용해 판단하고 이를 통해 λ(G)가 n(=|V|)과 같음을 분석한다.

A Label Graph Based Verifiable Secret Sharing Scheme for General Access Structures

  • Hsu, Ching-Fang;Zeng, Bing;Cheng, Qi
    • Journal of Communications and Networks
    • /
    • 제15권4호
    • /
    • pp.407-410
    • /
    • 2013
  • Secret sharing is that a dealer distributes a piece of information (called a share) about a secret to each participant such that authorized subsets of participants can reconstruct the secret but unauthorized subsets of participants cannot determine the secret. In this paper, an access structure can be represented by a label graph G, where a vertex denotes a participant and a complete subgraph of G corresponds to a minimal authorized subset. The vertices of G are labeled into distinct vectors uniquely determined by the maximum prohibited structure. Based on such a label graph, a verifiable secret sharing scheme realizing general access structures is proposed. A major advantage of this scheme is that it applies to any access structure, rather than only structures representable as previous graphs, i.e., the access structures of rank two. Furthermore, verifiability of the proposed scheme can resist possible internal attack performed by malicious participants, who want to obtain additional shares or provide a fake share to other participants.