نتایج جستجو برای: leap graphs

تعداد نتایج: 101092  

Journal: :iranian journal of mathematical chemistry 2012
m. ghorbani kh. malekjani a. khaki

the eccentricity connectivity index of a molecular graph g is defined as (g) = av(g)deg(a)ε(a), where ε(a) is defined as the length of a maximal path connecting a to othervertices of g and deg(a) is degree of vertex a. here, we compute this topological index forsome infinite classes of dendrimer graphs.

Journal: :Journal of Network and Computer Applications 2021

Knowledge Graphs (KGs) have made a qualitative leap and effected real revolution in knowledge representation. This is leveraged by the underlying structure of KG which underpins better comprehension, reasoning interpretation for both human machine. Therefore, KGs continue to be used as main means tackling plethora real-life problems various domains. However, there no consensus regard plausible ...

2014
M. T. Manzari S. P. G. Madabhushi S. K. Haigh Y. M. Chen Y. G. Zhou

The Liquefaction Experiment and Analysis Project (LEAP), an international research collaboration among researchers from the US, UK, Japan, China and Taiwan, is a validation campaign to assess the capabilities of existing numerical/constitutive models for liquefaction analysis by using laboratory experiments and centrifuge tests. The nature, goals, and scope of the project are presented in this ...

2002
Xiaotie Deng Evangelos Milios

We are interested in the problem of map construction of an unknown environment. Even with a complete map, navigation of real autonomous mobile robots is still conducted with imperfect information. This can be caused by various factors, such as imperfect sensors, imperfect mechanical control capabilities, and imperfect road conditions. Computational resource constraints for real time performance...

2013
Holger Breithaupt

971 The most esoteric research field in the natural sciences is probably quantum physics. Despite the fact that Werner Heisenberg first proposed its central concepts nearly 80 years ago, it continues to baffle physicists and to cause headaches among non-physicists. Even Albert Einstein was unwilling to accept the central tenet that everything is just a matter of possibilities; he famously dismi...

2017
Edward H. Wagner Margaret Flinter Clarissa Hsu DeAnn Cromp Brian T. Austin Rebecca Etz Benjamin F. Crabtree MaryJoan D. Ladden

BACKGROUND Team-based care is now recognized as an essential feature of high quality primary care, but there is limited empiric evidence to guide practice transformation. The purpose of this paper is to describe advances in the configuration and deployment of practice teams based on in-depth study of 30 primary care practices viewed as innovators in team-based care. METHODS As part of LEAP, a...

2007
Jiyong Jang Taekyoung Kwon JooSeok Song

It is not easy to achieve secure key establishment in wireless sensor networks without public key cryptography. Many key management protocols have been proposed for the purpose. Among them, LEAP is a simple and elegant protocol that establishes multi-level keys in an efficient way, but its security mainly relies on that of a single initialization key. Though it is assumed that the initial deplo...

Journal: :journal of optimization in industrial engineering 2010
ellips masehian farzaneh daneshzand

solvable graphs (also known as reachable graphs) are types of graphs that any arrangement of a specified number of agents located on the graph’s vertices can be reached from any initial arrangement through agents’ moves along the graph’s edges, while avoiding deadlocks (interceptions). in this paper, the properties of solvable graphs are investigated, and a new concept in multi agent moti...

2011
Peter Peterson Digvijay Singh William J. Kaiser Peter L. Reiher

We recently used the Atom LEAP (a new energy measurement testbed developed at UCLA) as the foundation for CS 188, an undergraduate research seminar investigating potential trade-offs between security and energy consumption. Twenty-three students, in five groups, researched the energy costs of full disk encryption, network cryptography, and sandboxing techniques, as well as the potential savings...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید