نتایج جستجو برای: m shadow graph

تعداد نتایج: 731331  

2013
Lichao Zhang Xikun Cai

An intuitionistic method is proposed to design shadow masks to achieve thickness profile control for evaporation coating processes. The proposed method is based on the concept of the shadow matrix, which is a matrix that contains coefficients that build quantitive relations between shape parameters of masks and shadow quantities of substrate directly. By using the shadow matrix, shape parameter...

2008
DYLAN P. THURSTON

It is known since 1954 that every 3-manifold bounds a 4-manifold. Thus, for instance, every 3-manifold has a surgery diagram. There are several proofs of this fact, including constructive proofs, but there has been little attention to the complexity of the 4-manifold produced. Given a 3-manifold M of complexity n, we show how to construct a 4-manifold bounded by M of complexity O(n). Here we me...

2008
DYLAN P. THURSTON

It is known since 1954 that every 3-manifold bounds a 4-manifold. Thus, for instance, every 3-manifold has a surgery diagram. There are several proofs of this fact, including constructive proofs, but there has been little attention to the complexity of the 4-manifold produced. Given a 3-manifold M of complexity n, we show how to construct a 4-manifold bounded by M of complexity O(n). Here we me...

Many graph theoretical parameters have been used to describe the vulnerability of communication networks, including toughness, binding number, rate of disruption, neighbor-connectivity, integrity, mean integrity, edgeconnectivity vector, l-connectivity and tenacity. In this paper we discuss Integrity and its properties in vulnerability calculation. The integrity of a graph G, I(G), is defined t...

Let G(V,E) be a graph with p vertices and q edges. A graph G is said to have an odd mean labeling if there exists a function f : V (G) → {0, 1, 2,...,2q - 1} satisfying f is 1 - 1 and the induced map f* : E(G) → {1, 3, 5,...,2q - 1} defined by f*(uv) = (f(u) + f(v))/2 if f(u) + f(v) is evenf*(uv) = (f(u) + f(v) + 1)/2 if f(u) + f(v) is odd is a bijection. A graph that admits an odd mean labelin...

2011
Alok Kumar

In normal shadow SWIFT commit protocol shadow of all the borrower transactions which satisfy a given criteria are created when the lock manager processes the request. This creates heavy overhead on the system and degrades its performance.. In this paper, we have presented a new method of handling the requests by the borrower transactions. We create the shadow only when the borrower aborts due t...

M. Nouri Jouybari S. Firouzian Y. Talebi

Let R be a commutative ring with identity and M an R-module. The Scalar-Product Graph of M is defined as the graph GR(M) with the vertex set M and two distinct vertices x and y are adjacent if and only if there exist r or s belong to R such that x = ry or y = sx. In this paper , we discuss connectivity and planarity of these graphs and computing diameter and girth of GR(M). Also we show some of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید