• Title/Summary/Keyword: digital k-graph

Search Result 96, Processing Time 0.025 seconds

ON THE SIMPLICIAL COMPLEX STEMMED FROM A DIGITAL GRAPH

  • HAN, SANG-EON
    • Honam Mathematical Journal
    • /
    • v.27 no.1
    • /
    • pp.115-129
    • /
    • 2005
  • In this paper, we give a digital graph-theoretical approach of the study of digital images with relation to a simplicial complex. Thus, a digital graph $G_k$ with some k-adjacency in ${\mathbb{Z}}^n$ can be recognized by the simplicial complex spanned by $G_k$. Moreover, we demonstrate that a graphically $(k_0,\;k_1)$-continuous map $f:G_{k_0}{\subset}{\mathbb{Z}}^{n_0}{\rightarrow}G_{k_1}{\subset}{\mathbb{Z}}^{n_1}$ can be converted into the simplicial map $S(f):S(G_{k_0}){\rightarrow}S(G_{k_1})$ with relation to combinatorial topology. Finally, if $G_{k_0}$ is not $(k_0,\;3^{n_0}-1)$-homotopy equivalent to $SC^{n_0,4}_{3^{n_0}-1}$, a graphically $(k_0,\;k_1)$-continuous map (respectively a graphically $(k_0,\;k_1)$-isomorphisim) $f:G_{k_0}{\subset}{\mathbb{Z}}^{n_0}{\rightarrow}G_{k_1}{\subset}{\mathbb{Z}^{n_1}$ induces the group homomorphism (respectively the group isomorphisim) $S(f)_*:{\pi}_1(S(G_{k_0}),\;v_0){\rightarrow}{\pi}_1(S(G_{k_1}),\;f(v_0))$ in algebraic topology.

  • PDF

A Dependability Modeling of Software Under Memory Faults for Digital System in Nuclear Power Plants

  • Park, Jong-Gyun;Seong, Poong-Hyun
    • Nuclear Engineering and Technology
    • /
    • v.29 no.6
    • /
    • pp.433-443
    • /
    • 1997
  • In this work, an analytic approach to the dependability of software in the operational phase is suggested with special attention to the hardware fault effects on the software behavior : The hardware faults considered are memory faults and the dependability measure in question is the reliability. The model is based on the simple reliability theory and the graph theory which represents the software with graph composed of nodes and arcs. Through proper transformation, the graph can be reduced to a simple two-node graph and the software reliability is derived from this graph. Using this model, we predict the reliability of an application software in the digital system (ILS) in the nuclear power plant and show the sensitivity of the software reliability to the major physical parameters which affect the software failure in the normal operation phase. We also found that the effects of the hardware faults on the software failure should be considered for predicting the software dependability accurately in operation phase, especially for the software which is executed frequently. This modeling method is particularly attractive for the medium size programs such as the microprocessor-based nuclear safety logic program.

  • PDF

AN EQUIVALENT PROPERTY OF A NORMAL ADJACENCY OF A DIGITAL PRODUCT

  • Han, Sang-Eon
    • Honam Mathematical Journal
    • /
    • v.36 no.1
    • /
    • pp.199-215
    • /
    • 2014
  • Owing to the development of the notion of normal adjacency of a digital product [9], product properties of digital topological properties were studied efficiently. To equivalently represent a normal adjacency of a digital product, the present paper proposes an S-compatible adjacency of a digital product. This approach can be helpful to understand a normal adjacency of a digital product. Finally, using an S-compatible adjacency of a digital product, we can study product properties of digital topological properties, which improves the presentations of the normal adjacency of a digital product in [9] and [5, 6].

REMARKS ON DIGITAL HOMOTOPY EQUIVALENCE

  • Han, Sang-Eon
    • Honam Mathematical Journal
    • /
    • v.29 no.1
    • /
    • pp.101-118
    • /
    • 2007
  • The notions of digital k-homotopy equivalence and digital ($k_0,k_1$)-homotopy equivalence were developed in [13, 16]. By the use of the digital k-homotopy equivalence, we can investigate digital k-homotopy equivalent properties of Cartesian products constructed by the minimal simple closed 4- and 8-curves in $\mathbf{Z}^2$.

A Survey on Functions and Characteristics of Conceptual Graph Tools (개념그래프 도구의 기능 및 특성 조사)

  • Yang, Gi-Chul
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.285-292
    • /
    • 2014
  • Intelligent systems are systems that mainly use knowledge rather than data or information. Therefore, knowledge representation is an important factor for intelligent system construction. Conceptual graph is a logical knowledge representation language which has graphical form and it can represent knowledge efficiently. It is, however, cumbersome to use conceptual graphs directly for programming. Various tools were developed to overcome this difficulties. In this paper, we survey on functions and characteristics of conceptual graph tools that can be utilized for constructing intelligent systems by using conceptual graphs. The result of this survey will be very helpful to use conceptual graphs for development of intelligent systems.

Synthesizing multi-loop control systems with period adjustment and Kernel compilation (주기 조정과 커널 자동 생성을 통한 다중 루프 시스템의 구현)

  • Hong, Seong-Soo;Choi, Chong-Ho;Park, Hong-Seong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.3 no.2
    • /
    • pp.187-196
    • /
    • 1997
  • This paper presents a semi-automatic methodology to synthesize executable digital controller saftware in a multi-loop control system. A digital controller is described by a task graph and end-to-end timing requirements. A task graph denotes the software structure of the controller, and the end-to-end requirements establish timing relationships between external inputs and outputs. Our approach translates the end-to-end requirements into a set of task attributes such as task periods and deadlines using nonlinear optimization techniques. Such attributes are essential for control engineers to implement control programs and schedule them in a control system with limited resources. In current engineering practice, human programmers manually derive those attributes in an ad hoc manner: they often resort to radical over-sampling to safely guarantee the given timing requirements, and thus render the resultant system poorly utilized. After task-specific attributes are derived, the tasks are scheduled on a single CPU and the compiled kernel is synthesized. We illustrate this process with a non-trivial servo motor control system.

  • PDF

Automatic Extraction of Metadata Information for Library Collections

  • Yang, Gi-Chul;Park, Jeong-Ran
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.117-122
    • /
    • 2018
  • As evidenced through rapidly growing digital repositories and web resources, automatic metadata generation is becoming ever more critical, especially considering the costly and complex operation of manual metadata creation. Also, automatic metadata generation is apt to consistent metadata application. In this sense, metadata quality and interoperability can be enhanced by utilizing a mechanism for automatic metadata generation. In this article, a mechanism of automatic metadata extraction called ExMETA is introduced in order to alleviate issues dealing with inconsistent metadata application and semantic interoperability across ever-growing digital collections. Conceptual graph, one of formal languages that represent the meanings of natural language sentences, is utilized for ExMETA as a mediation mechanism that enhances the metadata quality by disambiguating semantic ambiguities caused by isolation of a metadata element and its corresponding definition from the relevant context. Hence, automatic metadata generation by using ExMETA can be a good way of enhancing metadata quality and semantic interoperability.

Using Tabu Search for L(2,1)-coloring Problem of Graphs with Diameter 2 (Tabu Search를 이용한 지름이 2인 그래프에 대한 L(2,1)-coloring 문제 해결)

  • Kim, SoJeong;Kim, ChanSoo;Han, KeunHee
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.345-351
    • /
    • 2022
  • For simple undirected graph G=(V,E), L(2,1)-coloring of G is a nonnegative real-valued function f : V → [0,1,…,k] such that whenever vertices x and y are adjacent in G then |f(x)-f(y)|≥ 2 and whenever the distance between x and y is 2, |f(x)-f(y)|≥ 1. For a given L(2,1)-coloring c of graph G, the c-span is λ(c) = max{|c(v)-c(v)||u,v∈V}. L(2,1)-coloring number λ(G) = min{λ(c)} where the minimum is taken over all L(2,1)-coloring c of graph G. In this paper, based on Harary's Theorem, we use Tabu Search to figure out the existence of Hamiltonian Path in a complementary graph and confirmed that if λ(G) is equal to n(=|V|).

A Label Graph Based Verifiable Secret Sharing Scheme for General Access Structures

  • Hsu, Ching-Fang;Zeng, Bing;Cheng, Qi
    • Journal of Communications and Networks
    • /
    • v.15 no.4
    • /
    • pp.407-410
    • /
    • 2013
  • Secret sharing is that a dealer distributes a piece of information (called a share) about a secret to each participant such that authorized subsets of participants can reconstruct the secret but unauthorized subsets of participants cannot determine the secret. In this paper, an access structure can be represented by a label graph G, where a vertex denotes a participant and a complete subgraph of G corresponds to a minimal authorized subset. The vertices of G are labeled into distinct vectors uniquely determined by the maximum prohibited structure. Based on such a label graph, a verifiable secret sharing scheme realizing general access structures is proposed. A major advantage of this scheme is that it applies to any access structure, rather than only structures representable as previous graphs, i.e., the access structures of rank two. Furthermore, verifiability of the proposed scheme can resist possible internal attack performed by malicious participants, who want to obtain additional shares or provide a fake share to other participants.