Image output by computer is done row by row,the shortcoming of which is that we cannot know the topological relations between points at the image boundary.To obtain the closed boundary of the target from an image and ...Image output by computer is done row by row,the shortcoming of which is that we cannot know the topological relations between points at the image boundary.To obtain the closed boundary of the target from an image and turn points' row permutation of boundary into sequence permutation,an algorithm based on 4-connection relation of pixel points is proposed and the analysis of its correctness and complexity is given.Compared with classical operators and existing method,the single pixel boundary extracted from gray images by this algorithm is more complete and more distinct.Moreover,it has a lower time complexity and can eliminate the noise inside and outside the target area.The obtained sequence permutation of points is also conducive to follow-up image processing.展开更多
The concept of quick trickle characteristic sequence is presented, the properties and count of quick trickle characteristic sequence are researched, the mapping relationship between quick trickle characteristic sequen...The concept of quick trickle characteristic sequence is presented, the properties and count of quick trickle characteristic sequence are researched, the mapping relationship between quick trickle characteristic sequence and quick trickle permutation is discussed. Finally, an efficient construction of quick trickle permutation based on quick trickle characteristic sequence is given, by which quick trickle permutation can be figured out after constructing quick trickle characteristic sequence. Quick trickle permutation has good cryptographic properties.展开更多
Randomness number generation plays a key role in network, information security and IT applications. In this paper, a permutation and complementary algorithm is proposed to use vector complementary and permuta-tion ope...Randomness number generation plays a key role in network, information security and IT applications. In this paper, a permutation and complementary algorithm is proposed to use vector complementary and permuta-tion operations to extend n-variable Logic function space from 22n functions to 22n * 2n! configurations for variant logic framework. Each configuration contains 2n functions can be shown in a 22n-1*22n-1 matrix. A set of visual results can be represented by their symmetric properties in W, F and C codes respec-tively to provide the essential support on the variant logic framework.展开更多
This research presents an approach to solving the limited re-sequencing problem for a JIT system when two objectives are considered for multiple processes. One objective is to minimize the number of setups;the other i...This research presents an approach to solving the limited re-sequencing problem for a JIT system when two objectives are considered for multiple processes. One objective is to minimize the number of setups;the other is to minimize the material usage rate [1]. For this research effort, each unique permutation of the problem’s demand structure is noted, and used as a mechanism for finding subsequent sequences. Two variants of this permutation approach are used: one employs a Monte-Carlo simulation, while the other employs a modification of Ant-Colony Optimization to find sequences satisfying the objectives of interest. Problem sets from the literature are used for assessment, and experimentation shows that the methodology presented here outperforms methodology from an earlier research effort [3].展开更多
For the anti-jamming purpose,frequency hopping sequences are required to have a large linear span. In this paper,we firstly give the linear span of a class of optimal frequency hopping sequences. The results show that...For the anti-jamming purpose,frequency hopping sequences are required to have a large linear span. In this paper,we firstly give the linear span of a class of optimal frequency hopping sequences. The results show that the linear span is very small compared with their periods. To improve the linear span,we transform these optimal frequency hopping sequences into new optimal frequency hopping sequences with large linear span by using a general type of permutation polynomials over a finite field. Furthermore,we give the exact values of the linear span of the transformed optimal frequency hopping sequences.展开更多
If is a permutation of , the graph has vertices where xy is an edge of if and only if (x, y) or (y, x) is an inversion of . Any graph isomorphic to is called a permutation graph. In 1967 Gallai characterized permutati...If is a permutation of , the graph has vertices where xy is an edge of if and only if (x, y) or (y, x) is an inversion of . Any graph isomorphic to is called a permutation graph. In 1967 Gallai characterized permutation graphs in terms of forbidden induced subgraphs. In 1971 Pnueli, Lempel, and Even showed that a graph is a permutation graph if and only if both the graph and its complement have transitive orientations. In 2010 Limouzy characterized permutation graphs in terms of forbidden Seidel minors. In this paper, we characterize permutation graphs in terms of a cohesive order of its vertices. We show that only the caterpillars are permutation graphs among the trees. A simple method of constructing permutation graphs is also presented here.展开更多
基金Sponsored by the National Natural Science Foundation of China (60773044 )PLA General Armament Department Key Foundation(9140A26010308BQ0178)
文摘Image output by computer is done row by row,the shortcoming of which is that we cannot know the topological relations between points at the image boundary.To obtain the closed boundary of the target from an image and turn points' row permutation of boundary into sequence permutation,an algorithm based on 4-connection relation of pixel points is proposed and the analysis of its correctness and complexity is given.Compared with classical operators and existing method,the single pixel boundary extracted from gray images by this algorithm is more complete and more distinct.Moreover,it has a lower time complexity and can eliminate the noise inside and outside the target area.The obtained sequence permutation of points is also conducive to follow-up image processing.
文摘The concept of quick trickle characteristic sequence is presented, the properties and count of quick trickle characteristic sequence are researched, the mapping relationship between quick trickle characteristic sequence and quick trickle permutation is discussed. Finally, an efficient construction of quick trickle permutation based on quick trickle characteristic sequence is given, by which quick trickle permutation can be figured out after constructing quick trickle characteristic sequence. Quick trickle permutation has good cryptographic properties.
文摘Randomness number generation plays a key role in network, information security and IT applications. In this paper, a permutation and complementary algorithm is proposed to use vector complementary and permuta-tion operations to extend n-variable Logic function space from 22n functions to 22n * 2n! configurations for variant logic framework. Each configuration contains 2n functions can be shown in a 22n-1*22n-1 matrix. A set of visual results can be represented by their symmetric properties in W, F and C codes respec-tively to provide the essential support on the variant logic framework.
文摘This research presents an approach to solving the limited re-sequencing problem for a JIT system when two objectives are considered for multiple processes. One objective is to minimize the number of setups;the other is to minimize the material usage rate [1]. For this research effort, each unique permutation of the problem’s demand structure is noted, and used as a mechanism for finding subsequent sequences. Two variants of this permutation approach are used: one employs a Monte-Carlo simulation, while the other employs a modification of Ant-Colony Optimization to find sequences satisfying the objectives of interest. Problem sets from the literature are used for assessment, and experimentation shows that the methodology presented here outperforms methodology from an earlier research effort [3].
基金supported by 973 project (No.2007CB311201)Natural Science Foundation of China (No.60833008)+1 种基金111 project (No.B08038)Foundation of Guangxi Key Lab. of Infor. and Comm. (20902)
文摘For the anti-jamming purpose,frequency hopping sequences are required to have a large linear span. In this paper,we firstly give the linear span of a class of optimal frequency hopping sequences. The results show that the linear span is very small compared with their periods. To improve the linear span,we transform these optimal frequency hopping sequences into new optimal frequency hopping sequences with large linear span by using a general type of permutation polynomials over a finite field. Furthermore,we give the exact values of the linear span of the transformed optimal frequency hopping sequences.
文摘If is a permutation of , the graph has vertices where xy is an edge of if and only if (x, y) or (y, x) is an inversion of . Any graph isomorphic to is called a permutation graph. In 1967 Gallai characterized permutation graphs in terms of forbidden induced subgraphs. In 1971 Pnueli, Lempel, and Even showed that a graph is a permutation graph if and only if both the graph and its complement have transitive orientations. In 2010 Limouzy characterized permutation graphs in terms of forbidden Seidel minors. In this paper, we characterize permutation graphs in terms of a cohesive order of its vertices. We show that only the caterpillars are permutation graphs among the trees. A simple method of constructing permutation graphs is also presented here.
基金国家自然科学基金( the National Natural Science Foundation of China under Grant No.60672041)湖南省自然科学基金( the Natural Science Foundation of Hunan Province of China under Grant No.04JJ3077)