Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (34)

Search Parameters:
Keywords = vertex transmission

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
13 pages, 295 KiB  
Article
On Dα-Spectrum of the Weakly Zero-Divisor Graph of ℤn
by Amal S. Alali, Mohd Rashid, Asif Imtiyaz Ahmad Khan and Muzibur Rahman Mozumder
Mathematics 2025, 13(15), 2385; https://doi.org/10.3390/math13152385 - 24 Jul 2025
Viewed by 159
Abstract
Let us consider the finite commutative ring R, whose unity is 10. Its weakly zero-divisor graph, represented as WΓ(R), is a basic undirected graph with two distinct vertices, c1 and c2, [...] Read more.
Let us consider the finite commutative ring R, whose unity is 10. Its weakly zero-divisor graph, represented as WΓ(R), is a basic undirected graph with two distinct vertices, c1 and c2, that are adjacent if and only if there exist r ann(c1) and s ann(c2) that satisfy the condition rs=0. Let D(G) be the distance matrix and Tr(G) be the diagonal matrix of the vertex transmissions in basic undirected connected graph G. The Dα matrix of graph G is defined as Dα(G)=αTr(G)+(1α)D(G) for α[0,1]. This article finds the Dα spectrum for the graph WΓ(Zn) for various values of n and also shows that WΓ(Zn) for n=ϑ1ϑ2ϑ3ϑtη1d1η2d2ηsds(di2,t1,s0), where ϑi’s and ηi’s are the distinct primes, is Dα integral. Full article
(This article belongs to the Section E: Applied Mathematics)
Show Figures

Figure 1

21 pages, 9886 KiB  
Article
A Fragile Watermarking Scheme for Authenticity Verification of 3D Models in GLB Format
by Marcin Matczuk, Grzegorz Kozieł and Sławomir Cięszczyk
Appl. Sci. 2025, 15(13), 7246; https://doi.org/10.3390/app15137246 - 27 Jun 2025
Viewed by 284
Abstract
The utilisation of 3D models in low-cost devices, such as the internet of things, virtual reality, and augmented reality, is expanding. The challenge lies in the lack of lightweight solutions for verifying the authenticity of models in the graphics library transmission format (glTF) [...] Read more.
The utilisation of 3D models in low-cost devices, such as the internet of things, virtual reality, and augmented reality, is expanding. The challenge lies in the lack of lightweight solutions for verifying the authenticity of models in the graphics library transmission format (glTF) on devices with limited resources. The glTF standard, which allows storage in glb format, is the leading standard for representing 3D assets. Despite its popularity, research on watermarking glTF models remains limited. This paper proposes a novel method for authenticating 3D models in glb format based on fragile watermarking. Additionally, an analysis was conducted to determine the impact of embedding the watermark in vertex attributes other than position on the integrity and visual quality of the model. The methodology is as follows: (1) embedding the watermark, (2) applying model modification or omitting it, and (3) verifying authenticity based on the recovered watermark. The proposed algorithm attaches a 512-bit hash-based message authentication code (HMAC) to a 3D model using the least significant bits (LSBs) modification method. The use of HMAC and LSBs has resulted in a computationally efficient algorithm that can be implemented in low-cost devices. Full article
Show Figures

Figure 1

18 pages, 1959 KiB  
Review
Modelling Water Waves on Graphs
by André Nachbin
Fluids 2025, 10(6), 140; https://doi.org/10.3390/fluids10060140 - 24 May 2025
Viewed by 701
Abstract
Waves on graphs are a current subject of research interest. As opposed to flows on graphs, the reflection–transmission of waves at the graph’s vertex is a problem that needs to be further modelled mathematically. The literature on the reflection and transmission of waves [...] Read more.
Waves on graphs are a current subject of research interest. As opposed to flows on graphs, the reflection–transmission of waves at the graph’s vertex is a problem that needs to be further modelled mathematically. The literature on the reflection and transmission of waves at a vertex is scarce. Some articles are reviewed and discussed. Water waves are a good topic for comparing different mathematical models, from hyperbolic conservation laws to weakly nonlinear, weakly dispersive systems of partial differential equations on a two-dimensional fattened (thick) graph and the respective one-dimensional graph-model reduction. In this study, we present a particular water wave model in which junction angles are systematically included in the mathematical model. Comparing the solutions with the fattened-graph model gave rise to a more general compatibility condition at the vertex. Current research topics of interest are outlined at the end. Full article
(This article belongs to the Special Issue Modelling Flows in Pipes and Channels)
Show Figures

Figure 1

17 pages, 2759 KiB  
Article
Large-Scale Dynamic Graph Processing with Graphic Processing Unit-Accelerated Priority-Driven Differential Scheduling and Operation Reduction
by Sangho Song, Jihyeon Choi, Donghyeon Cha, Hyeonbyeong Lee, Dojin Choi, Jongtae Lim, Kyoungsoo Bok and Jaesoo Yoo
Appl. Sci. 2025, 15(6), 3172; https://doi.org/10.3390/app15063172 - 14 Mar 2025
Viewed by 914
Abstract
Recently, there has been active research on utilizing GPUs for the efficient processing of large-scale dynamic graphs. However, challenges arise due to the repeated transmission and processing of identical data during dynamic graph operations. This paper proposes an efficient processing scheme for large-scale [...] Read more.
Recently, there has been active research on utilizing GPUs for the efficient processing of large-scale dynamic graphs. However, challenges arise due to the repeated transmission and processing of identical data during dynamic graph operations. This paper proposes an efficient processing scheme for large-scale dynamic graphs in GPU environments with limited memory, leveraging dynamic scheduling and operation reduction. The proposed scheme partitions the dynamic graph and schedules each partition based on active and tentative active vertices, optimizing GPU utilization. Additionally, snapshots are employed to capture graph changes, enabling the detection of redundant edge and vertex modifications. This reduces unnecessary computations, thereby minimizing GPU workloads and data transmission costs. The scheme significantly enhances performance by eliminating redundant operations on the same edges or vertices. Performance evaluations demonstrate an average improvement of 280% over existing static graph processing techniques and 108% over existing dynamic graph processing schemes. Full article
Show Figures

Figure 1

15 pages, 2611 KiB  
Article
Variable Assembly and Procapsid Binding of Bacteriophage P22 Terminase Subunits in Solution
by Julia Elise Cabral, Yanfei Qiu, Albert J. R. Heck and Reginald McNulty
Pathogens 2024, 13(12), 1066; https://doi.org/10.3390/pathogens13121066 - 3 Dec 2024
Viewed by 1514
Abstract
Concatemeric viral DNA is packaged into bacteriophage P22 procapsids via a headful packaging mechanism mediated by a molecular machine consisting of small (gp3) and large (gp2) terminase subunits. Although a negative stain reconstruction exists for the terminase holoenzyme, it is not clear how [...] Read more.
Concatemeric viral DNA is packaged into bacteriophage P22 procapsids via a headful packaging mechanism mediated by a molecular machine consisting of small (gp3) and large (gp2) terminase subunits. Although a negative stain reconstruction exists for the terminase holoenzyme, it is not clear how this complex binds the dodecameric portal protein located at a 5-fold mismatch vertex. Herein, we describe new assemblies for the holoenzyme. Both native mass spectrometry and transmission electron microscopy reveal that the P22 terminase complex adopts three main assemblies, which include a nonameric S-terminase bound to two L-terminase 1(gp3)9:2(gp2), two nonameric S-terminase bound to five L-terminase 2(gp3)9:5(gp2), and three nonameric S-terminase bound to seven L-terminase 3(gp3)9:7(gp2). Native agarose gel electrophoresis shows that the terminase complex interacts with procapsids with mild crosslinking. These results herein illustrate the P22 terminase complex can adopt a variety of conformations and assembly states. Full article
Show Figures

Graphical abstract

9 pages, 337 KiB  
Article
Graphs with a Fixed Maximum Degree and Order Attaining the Upper Bound on Minimum Status
by Wei-Han Tsai, Jen-Ling Shang and Chiang Lin
Mathematics 2024, 12(22), 3600; https://doi.org/10.3390/math12223600 - 17 Nov 2024
Viewed by 1289
Abstract
The status (or transmission) of a vertex in a connected graph is the sum of distances between the vertex and all other vertices. The minimum status (or minimum transmission) of a connected graph is the minimum of the statuses of all vertices in [...] Read more.
The status (or transmission) of a vertex in a connected graph is the sum of distances between the vertex and all other vertices. The minimum status (or minimum transmission) of a connected graph is the minimum of the statuses of all vertices in the graph. Previously, sharp lower and upper bounds have been obtained on the minimum status of connected graphs with a fixed maximum degree k and order n. Moreover, for 2kn2, the following theorem about graphs attaining the maximum on the minimum status has also been proposed without proof. The theorem is as follows: Let G be a connected graph of order n with (G)=k, where 2kn2. Then, the minimum status of G attains the maximum if and only if one of the following holds. (1) G is a path or a cycle, where k=2; (2) Gk,n is a spanning subgraph of G and G is a spanning subgraph of Hk,n, where 3k<n2; and (3) either Gn2,n is a spanning subgraph of G and G is a spanning subgraph of Hn2,n or Gn2,n is a spanning subgraph of G and G is a spanning subgraph of Hn, where k=n2 for even n6. For the integers n,k with 2kn1, the graph Gk,n has the vertex set V(Gk,n)={x1,x2,,xn} and the edge set E(Gk,n)={xixi+1:i=1,2,,nk}{xnk+1xj:j=nk+2,nk+3,,n}; the graph Hk,n is obtained from Gk,n by adding all the edges xixj, where nk+2i<jn; and for even n6 the graph Hn is obtained from Gn2,n by adding the edge xn21xn2+2 and all the edges xixj, where n2+3i<jn. This study provides the proof to complete the above theorem. Full article
(This article belongs to the Special Issue Advances in Combinatorics, Discrete Mathematics and Graph Theory)
Show Figures

Figure 1

20 pages, 3675 KiB  
Article
Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge
by Shenjian Qiu, Zhipeng Shao, Jian Wang, Shiyou Xu and Jiaxuan Fei
Appl. Sci. 2024, 14(14), 6189; https://doi.org/10.3390/app14146189 - 16 Jul 2024
Cited by 1 | Viewed by 1515
Abstract
Against the background of the construction of new power systems, power generation, transmission, distribution, and dispatching services are open to the outside world for interaction, and the accessibility of attack paths has been significantly enhanced. We are facing cyber-physical cross-domain attacks with the [...] Read more.
Against the background of the construction of new power systems, power generation, transmission, distribution, and dispatching services are open to the outside world for interaction, and the accessibility of attack paths has been significantly enhanced. We are facing cyber-physical cross-domain attacks with the characteristics of strong targeting, high concealment, and cross-space threats. This paper proposes a quantitative analysis method for the influence of power cyber-physical cross-domain attack paths based on graph knowledge. First, a layered attack graph was constructed based on the cross-space and strong coupling characteristics of the power cyber-physical system business and the vertical architecture of network security protection focusing on border protection. The attack graph included cyber-physical cross-domain attacks, control master stations, measurement and control equipment failures, transient stable node disturbances, and other vertices, and achieved a comprehensive depiction of the attack path. Second, the out-degree, in-degree, vertex betweenness, etc., of each vertex in the attack graph were comprehensively considered to calculate the vertex vulnerability, and by defining the cyber-physical coupling degree and edge weights, the risk of each attack path was analyzed in detail. Finally, the IEEE RTS79 and RTS96 node systems were selected, and the impact of risk conduction on the cascading failures of the physical space system under typical attack paths was analyzed using examples, verifying the effectiveness of the proposed method. Full article
Show Figures

Figure 1

26 pages, 8086 KiB  
Article
Design and Analysis of Mechanisms of 7-, 8- and 9-Speed Automatic Transmissions for Vehicle Powertrains
by Wenjian Yang and Xindong Xiao
Energies 2023, 16(21), 7402; https://doi.org/10.3390/en16217402 - 2 Nov 2023
Cited by 1 | Viewed by 1847
Abstract
As the core device of engine-driven vehicle powertrains, the automatic transmission (AT) can obtain different output torques and speeds. Designing new mechanisms is the foundation for developing innovative ATs. This paper proposes an innovative design method for 7-speed, 8-speed and 9-speed AT mechanisms [...] Read more.
As the core device of engine-driven vehicle powertrains, the automatic transmission (AT) can obtain different output torques and speeds. Designing new mechanisms is the foundation for developing innovative ATs. This paper proposes an innovative design method for 7-speed, 8-speed and 9-speed AT mechanisms based on fractionated planetary gear trains (PGTs) and investigates the performance analysis of the AT mechanisms. Firstly, the detection of symmetric vertices in the PGT graph is studied, and a method for the topologic synthesis of 11-link 2-degree-of-freedom (DOF) fractionated PGTs is proposed. Secondly, the innovative design of 7-speed, 8-speed and 9-speed AT mechanisms is explored, leading to the discovery of two novel 7-speed AT mechanisms, three novel 8-speed AT mechanisms and four novel 9-speed AT mechanisms. Finally, the performance analyses of kinematics, torque, power flow and transmission efficiency of the AT mechanisms are conducted, and AMESim (Simcenter Amesim 2020.1) software is utilized to simulate speed ratios and transmission efficiencies of the AT mechanisms. The analysis and simulation results demonstrate that the nine novel AT mechanisms obtained in this study exhibit excellent overall performances. The speed ratios of each AT mechanism are reasonable, the step ratio is between 1.1 and 1.8, and the transmission efficiency exceeds 0.95. There is no cyclic power, or the cyclic power values are within an acceptable limit. Full article
Show Figures

Figure 1

13 pages, 1186 KiB  
Article
Band Gap Properties in Metamaterial Beam with Spatially Varying Interval Uncertainties
by Feiyang He, Zhiyu Shi, Zexin Zhang, Denghui Qian and Xuelei Feng
Appl. Sci. 2023, 13(14), 8012; https://doi.org/10.3390/app13148012 - 8 Jul 2023
Cited by 1 | Viewed by 1897
Abstract
First, this study proposed a metamaterial beam model with spatially varying interval density. The interval dynamic equation of this model could be established by incorporating the decomposition results of the interval field based on Karhunen–Loeve expansion into the finite element method. An interval [...] Read more.
First, this study proposed a metamaterial beam model with spatially varying interval density. The interval dynamic equation of this model could be established by incorporating the decomposition results of the interval field based on Karhunen–Loeve expansion into the finite element method. An interval perturbation finite element method was developed to evaluate the bounds of the dynamic response interval vector. Then, an interval vibration transmission analysis could be performed, and the frequency range of the safe band gap could be determined. Meanwhile, Monte Carlo simulations and the vertex method are also presented to provide reference solutions. By comparison, it was found that the calculation accuracy of the interval perturbation finite element method was acceptable. The numerical results also showed that the safe band gap range was significantly smaller than that of the deterministic band gap. Full article
Show Figures

Figure 1

12 pages, 293 KiB  
Article
Fractional Factor Model for Data Transmission in Real-Time Monitoring Network
by Juxiang Zhou, Wei Gao and Hainan Zhang
Fractal Fract. 2023, 7(7), 493; https://doi.org/10.3390/fractalfract7070493 - 22 Jun 2023
Viewed by 1041
Abstract
Modeling data transmission problems in graph theory is internalized to the existence of fractional flows, and thus can be surrogated to be characterized by a fractional factor in diversified settings. We study the fractional factor framework in the network environment when some sites [...] Read more.
Modeling data transmission problems in graph theory is internalized to the existence of fractional flows, and thus can be surrogated to be characterized by a fractional factor in diversified settings. We study the fractional factor framework in the network environment when some sites are damaged. The setting we focus on refers to the lower and upper fractional degrees described by two functions on the vertex set. It is determined that G is fractional (g,f,n) critical if δ(G)a2+b2+2ab+2a+2b34a+n and I(G)>n+(a+b1)22a+2b1a2, where 1ab and b2. Full article
(This article belongs to the Special Issue Feature Papers for Mathematical Physics Section)
18 pages, 2397 KiB  
Article
Evaluation of Aircraft Environmental Control System Order Degree and Component Centrality
by Junyuan Liao, Chunxin Yang and Han Yang
Aerospace 2023, 10(5), 438; https://doi.org/10.3390/aerospace10050438 - 8 May 2023
Cited by 3 | Viewed by 2409
Abstract
Air cycle systems (ACSs) are primarily used in aircraft environmental control systems (ECSs) to provide a suitable cabin temperature and pressure environment for passengers and avionics. It comprises heat exchangers, compressors, turbines, water separators, and various other components that are interconnected to form [...] Read more.
Air cycle systems (ACSs) are primarily used in aircraft environmental control systems (ECSs) to provide a suitable cabin temperature and pressure environment for passengers and avionics. It comprises heat exchangers, compressors, turbines, water separators, and various other components that are interconnected to form an information-transmission network. Traditional research on ACSs has focused primarily on their thermal performance. This study abstracted ACSs into network graphs based on their information-transmission characteristics, determined the weight of each information-transmission route using the fuel weight penalty method, calculated and compared the order degree of different ACSs using the structure entropy method, and measured the importance of each component using centrality for the first time. The results showed that the order degree of the ACSs gradually increased with an increase in the number of wheels in the air cycle machine (ACM), and ACSs with high-pressure water separation had a higher order degree under wet conditions than under dry conditions. Moreover, based on the centrality of each vertex in the graphs, the ACM and secondary heat exchanger in the ACS were fundamentally important and should be focused on during the system design. The methodology proposed in this study provides a theoretical basis for the evaluation of the ACS organizational structure and the design performance of components. Full article
(This article belongs to the Section Aeronautics)
Show Figures

Figure 1

21 pages, 6657 KiB  
Article
Routing Strategies for Isochronal-Evolution Random Matching Network
by Weicheng Lun, Qun Li, Zhi Zhu and Can Zhang
Entropy 2023, 25(2), 363; https://doi.org/10.3390/e25020363 - 16 Feb 2023
Cited by 1 | Viewed by 2136
Abstract
In order to abstract away a network model from some real-world networks, such as navigation satellite networks and mobile call networks, we proposed an Isochronal-Evolution Random Matching Network (IERMN) model. An IERMN is a dynamic network that evolves isochronally and has a collection [...] Read more.
In order to abstract away a network model from some real-world networks, such as navigation satellite networks and mobile call networks, we proposed an Isochronal-Evolution Random Matching Network (IERMN) model. An IERMN is a dynamic network that evolves isochronally and has a collection of edges that are pairwise disjoint at any point in time. We then investigated the traffic dynamics in IERMNs whose main research topic is packet transmission. When a vertex of an IERMN plans a path for a packet, it is permitted to delay the sending of the packet to make the path shorter. We designed a routing decision-making algorithm for vertices based on replanning. Since the IERMN has a specific topology, we developed two suitable routing strategies: the Least Delay Path with Minimum Hop (LDPMH) routing strategy and the Least Hop Path with Minimum Delay (LHPMD) routing strategy. An LDPMH is planned by a binary search tree and an LHPMD is planned by an ordered tree. The simulation results show that the LHPMD routing strategy outperformed the LDPMH routing strategy in terms of the critical packet generation rate, number of delivered packets, packet delivery ratio, and average posterior path lengths. Full article
(This article belongs to the Section Complexity)
Show Figures

Figure 1

14 pages, 290 KiB  
Article
On the General Sum Distance Spectra of Digraphs
by Weige Xi, Lixiang Cai, Wutao Shang and Yidan Su
Mathematics 2023, 11(2), 308; https://doi.org/10.3390/math11020308 - 6 Jan 2023
Viewed by 1311
Abstract
Let G be a strongly connected digraph, and dG(vi,vj) denote the distance from the vertex vi to vertex vj and be defined as the length of the shortest directed path from vi [...] Read more.
Let G be a strongly connected digraph, and dG(vi,vj) denote the distance from the vertex vi to vertex vj and be defined as the length of the shortest directed path from vi to vj in G. The sum distance between vertices vi and vj in G is defined as sdG(vi,vj)=dG(vi,vj)+dG(vj,vi). The sum distance matrix of G is the n×n matrix SD(G)=(sdG(vi,vj))vi,vjV(G). For vertex viV(G), the sum transmission of vi in G, denoted by STG(vi) or STi, is the row sum of the sum distance matrix SD(G) corresponding to vertex vi. Let ST(G)=diag(ST1,ST2,,STn) be the diagonal matrix with the vertex sum transmissions of G in the diagonal and zeroes elsewhere. For any real number 0α1, the general sum distance matrix of G is defined as SDα(G)=αST(G)+(1α)SD(G). The eigenvalues of SDα(G) are called the general sum distance eigenvalues of G, the spectral radius of SDα(G), i.e., the largest eigenvalue of SDα(G), is called the general sum distance spectral radius of G, denoted by μα(G). In this paper, we first give some spectral properties of SDα(G). We also characterize the digraph minimizes the general sum distance spectral radius among all strongly connected r-partite digraphs. Moreover, for digraphs that are not sum transmission regular, we give a lower bound on the difference between the maximum vertex sum transmission and the general sum distance spectral radius. Full article
15 pages, 369 KiB  
Article
On Transmission Irregular Cubic Graphs of an Arbitrary Order
by Anatoly Yu. Bezhaev and Andrey A. Dobrynin
Mathematics 2022, 10(15), 2741; https://doi.org/10.3390/math10152741 - 3 Aug 2022
Cited by 2 | Viewed by 1573
Abstract
The transmission of a vertex v of a graph G is the sum of distances from v to all the other vertices of G. A transmission irregular graph (TI graph) has mutually distinct vertex transmissions. In 2018, Alizadeh and Klavžar posed the [...] Read more.
The transmission of a vertex v of a graph G is the sum of distances from v to all the other vertices of G. A transmission irregular graph (TI graph) has mutually distinct vertex transmissions. In 2018, Alizadeh and Klavžar posed the following question: do there exist infinite families of regular TI graphs? An infinite family of TI cubic graphs of order 118+72k, k0, was constructed by Dobrynin in 2019. In this paper, we study the problem of finding TI cubic graphs for an arbitrary number of vertices. It is shown that there exists a TI cubic graph of an arbitrary even order n22. Almost all constructed graphs are contained in twelve infinite families. Full article
(This article belongs to the Section E1: Mathematics and Computer Science)
Show Figures

Graphical abstract

12 pages, 2721 KiB  
Article
Recent Application of Dijkstra’s Algorithm in the Process of Production Planning
by Marcel Behún, Dušan Knežo, Michal Cehlár, Lucia Knapčíková and Annamária Behúnová
Appl. Sci. 2022, 12(14), 7088; https://doi.org/10.3390/app12147088 - 14 Jul 2022
Cited by 18 | Viewed by 3586
Abstract
This paper aims to develop a method that could serve as a tool for evaluating extracted raw materials in terms of use by considering the place of extraction and consumption. Dijkstra´s algorithm solves many of the shortest path problems observed in the production [...] Read more.
This paper aims to develop a method that could serve as a tool for evaluating extracted raw materials in terms of use by considering the place of extraction and consumption. Dijkstra´s algorithm solves many of the shortest path problems observed in the production planning of raw materials. The algorithm requires knowledge of the relative distance between the vertices and the definition of the Euclidean distance of the vertices from the target vertex. The algorithm scans all of the paths and chooses the one with the minimum distance. At the same time, it would be able to identify the places of sale of raw materials and transport sites for the transportation of raw materials. It would have a database of point and line sources of occurrence (mining, deposit), places of transport (transmission network), and points of sale (seller). At present, geo-statistics is becoming an essential tool for solving various problems in modern deposit geology. Its results are used to calculate reserves and the economic valuation of the deposit. In the process of production planning, it is necessary to constantly process and analyze the geological information obtained during the mining survey. Full article
(This article belongs to the Special Issue Industry 5.0.: Current Status, Challenges, and New Strategies)
Show Figures

Figure 1

Back to TopTop