نتایج جستجو برای: symmetric bibd

تعداد نتایج: 81006  

2008
S. D. Prestwich B. Hnich R. Rossi S. A. Tarim

We describe a new partial symmetry breaking method that can be used to break arbitrary variable/value symmetries in combination with depth first search, static value ordering and dynamic variable ordering. The main novelty of the method is a new dominance detection technique based on local search in the symmetry group. It has very low time and memory requirements, yet in preliminary experiments...

Journal: :Australasian J. Combinatorics 2017
R. Julian R. Abel

A necessary condition for existence of a (v, k, k−1) near resolvable BIBD is v ≡ 1 (mod k). In this paper, we update earlier known existence results when k ∈ {9, 12, 16}, and show this necessary condition is sufficient, except possibly for 26, 37 and 149 values of v for k = 9, 12, 16 respectively. Some new results for existence of (9, 8)-frames of type 9 are also obtained; in particular, we sho...

Journal: :Des. Codes Cryptography 2012
Tom Høholdt Heeralal Janwa

We prove lower bounds on the largest and second largest eigenvalue of the adjacency matrix of connected bipartite graphs and give necessary and sufficient conditions for equality. We give several examples of classes of graphs that are optimal with respect to the bounds. We prove that BIBD-graphs are characterized by their eigenvalues. Finally we present a new bound on the expansion coefficient ...

2008
S. D. Prestwich B. Hnich R. Rossi S. A. Tarim

Several methods exist for breaking symmetry in constraint problems, but most potentially suffer from high memory requirements, high computational overhead, or both. We describe a new partial symmetry breaking method that can be applied to arbitrary variable/value symmetries. It models dominance detection as a nonstationary optimisation problem, and solves it by resource-bounded metaheuristic se...

2013
Anil Kumar Kashyap Madan Mohan Singh

The purpose of this paper is to discuss the importance of algebraic coding theory and to investigate the special case in which BIB designs and codes are constructed from planar near-rings. Application of planar near-rings to binary codes were first explored by Modisett [12] and by Fuchs, Hofer and Pilz [14]. Key word: planar near-ring, incidence structure, tactical configuration, BIBD, binary c...

Journal: :IEICE Transactions 2006
In Koo Kang Kishore Sinha Heung-Kyu Lee

Combinatorial designs have been used to construct digital fingerprint codes. Here, a new constructive algorithm for an anticollusion fingerprint code based on group-divisible designs is presented. These codes are easy to construct and available for a large number of individuals, which is important from a business point of view. Group-divisible designs have not been used previously as a tool for...

Journal: :sahand communications in mathematical analysis 0
mohammad hossein sattari department of mathematics, faculty of science, azarbaijan shahid madani university, p.o.box 53751-71379, tabriz, iran. hamid shafieasl department of mathematics, faculty of science, azarbaijan shahid madani university, p.o.box 53751-71379, tabriz, iran.

in this paper we introduce two symmetric variants of amenability, symmetric module amenability and symmetric connes amenability. we determine symmetric module amenability and symmetric connes amenability of some concrete banach algebras. indeed, it is shown that $ell^1(s)$ is  a symmetric $ell^1(e)$-module amenable if and only if $s$ is amenable, where $s$ is an inverse semigroup with subsemigr...

2010
Takafumi Kanamori Hiroaki Uehara Masakazu Jimbo

We study the group test for DNA library screening based on probabilistic approach. Group test is a method of detecting a few positive items from among a large number of items, and has wide range of applications. In DNA library screening, positive item corresponds to the clone having a specified DNA segment, and it is necessary to identify and isolate the positive clones for compiling the librar...

2008
M K Khan

Broadband Fixed Wireless Access (BFWA) systems enable services such as high-speed data communication, high quality voice/video conferencing and high-speed Internet access in areas where a wired link is not possible. However, the BFWA channel is a slow fading channel having deep frequency selective fading caused by clusters of scatterers in the environment that introduce intersymbol interference...

2014
Peter Nightingale Ozgur Akgun Ian P. Gent Christopher Jefferson Ian Miguel

When solving a problem using constraint programming, constraint modelling is widely acknowledged as an important and difficult task. Even a constraint modelling expert may explore many models and spend considerable time modelling a single problem. Therefore any automated assistance in the area of constraint modelling is valuable. Common sub-expression elimination (CSE) is a type of constraint r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید