Please login to be able to save your searches and receive alerts for new content matching your search criteria.
In a communication network, the vulnerability measures are essential to guide the designer in choosing an appropriate topology. They measure the stability of the network to disruption of operation after the failure of certain stations or communication links. If a station or operative is captured in a spy network, then the adjacent stations will be betrayed and are therefore useless in the whole network. In this sense, Margaret B. Cozzens and Shu-Shih Y. Wu modeled a spy network as a graph and then defined the neighbor integrity of a graph to obtain the vulnerability of a spy network [10]. The neighbor integrity of a graph G, is defined to be , where S is any vertex subversion strategy of G and c(G/S) is the maximum order of the components of G/S. In this paper, we investigate the transformation graphs G-+-, G+--, G++-, G---, G+-+, G-++, G--+ and G+++ of a graph G, and determine their neighbor integrity.
The concept of vulnerability in a communication network plays an important role when there is a disruption in the network. There exist several graph parameters that measure the vulnerability of a communication network. Domination integrity is one of the vulnerability parameters that measure the performance of a communication network. In this paper, we introduce the concept of paired domination integrity of a graph as a new measure of graph vulnerability. Let G=(V,E) be a simple, connected graph. A set of vertices in a graph G, say S, is a paired dominating set if the following two conditions are satisfied: (i) every vertex of G has a neighbor in S and (ii) the subgraph induced by S contains a perfect matching. The paired domination integrity of G, denoted by PDI(G), is defined as PDI(G)=min{|S|+m(G−S):S is a paired dominating set of G}, where m(G−S) is the order of the largest component in the induced subgraph of G−S. In this paper, we determine few bounds relating paired domination integrity with other graph parameters and the paired domination integrity of some classes of graphs.
Since different regions of an image have different importance, therefore only the important information of the image regions, which the users are really interested in, needs to be encrypted and protected emphatically in some special multimedia applications. However, the regions of interest (ROI) are always some irregular parts, such as the face and the eyes. Assuming the bulk data in transmission without being damaged, we propose a chaotic image encryption algorithm for ROI. ROI with irregular shapes are chosen and detected arbitrarily. Then the chaos-based image encryption algorithm with scrambling, S-box and diffusion parts is used to encrypt the ROI. Further, the whole image is compressed with Huffman coding. At last, a message authentication code (MAC) of the compressed image is generated based on chaotic maps. The simulation results show that the encryption algorithm has a good security level and can resist various attacks. Moreover, the compression method improves the storage and transmission efficiency to some extent, and the MAC ensures the integrity of the transmission data.
SINGAPORE – Letting Go.
SINGAPORE & JAPAN – ASLAN Pharmaceuticals Announces First Patient Enrolled in Phase 1 Study of Varlitinib in Japan.
JAPAN & UNITED STATES – Santen and twoXAR Announce Strategic Research Collaboration to Discover New Glaucoma Treatments.
UNITED STATES – New Study Finds Extensive Use of Fluorinated Chemicals in Fast Food Wrappers.
UNITED STATES – What Doesn’t Kill You Makes You Stronger.
UNITED STATES – Non-Invasive Test Offers Quick Skin Cancer Diagnosis.
UNITED STATES – Life Under Pressure.
AUSTRALIA & THAILAND – Commencement of BIT225 Phase 2 HIV-1 Clinical Trial.
CANADA – Understanding the Genetics of Human Height.
TAIWAN – TLC Announces Collaboration with CMUH in Exploring Solutions for Unmet Medical Needs in Oncology and Osteoarthritis.
Corrosion is a common phenomenon and critical aspects of steel structural application. It affects the daily design, inspection, and maintenance in structural engineering, especially for the heavy and complex industrial applications, where the steel structures are subjected to hash corrosive environments in combination of high working stress condition and often in open field and/or under high temperature production environments. In the paper, it presents the actual engineering application of advanced finite element methods in the predication of the structural integrity and robustness at a designed service life for the furnaces of alumina production, which was operated in the high temperature, corrosive environments, and rotating with high working stress condition.