86 research outputs found

    An Encounter with Graphs

    Get PDF
    188-200So far diagnosis of some problems we came across during our works with algorithms, graphs played significant roles. In this paper, we have tried to show that graphs really occupy a major role in computer science and engineering. The abstraction of problems as different graph models as well as graphs in digital system design methodology allows us to have a close look or refresher outlook on graphs. We have also touched root level, historical purview, graphs in contemporary Indian scenario, and a significant aspect of perfect graphs in VLSI area. We observe that hard computing does not suit in most of graph problems. Soft computing approaches are often a tool in graph algorithm design. A pessimal algorithm also came across our route that is really an intellectual property to share with the readers. To part, with we remind that no diagnosis is final and that pathology is in fact always eager to have a new look

    Determination of Hamiltonian Circuit and Euler Trail from a Given Graphic Degree Sequence

    Get PDF
    249-252A sequence of nonnegative integers can represent degrees of a graph. Already there is an established condition under which the above conclusion is true. It is our objective in this paper to show that a similar degree sequence represents degrees of vertices of a graph having Hamiltonian Circuit or Euler Tour. The only fallacy of the conclusion is that there may be graphs those are not Hamiltonian or Euler graphs may have the same degree sequence

    Generation of Minimal Spanning Tree Based on Analytical Perspective of Degree Sequence

    Get PDF
    209-216This paper considers generation of Minimal Spanning Trees (MST) of a simple symmetric and connected graph G. In this paper, we propose a new algorithm to find out minimum spanning tree of the graph G based on the degree sequence factor of nodes in graph. The time complexity of the problem is less than O(N log E ) compared to the existing algorithms time complexity, O(E log E )+ C of Kruskal algorithm, which is optimum. The goal is to design an algorithm that is simple, elegant, efficient, easy to understand and applicable in the field of networking design, mobile computing and engineerin

    "The fruits of independence": Satyajit Ray, Indian nationhood and the spectre of empire

    Get PDF
    Challenging the longstanding consensus that Satyajit Ray's work is largely free of ideological concerns and notable only for its humanistic richness, this article shows with reference to representations of British colonialism and Indian nationhood that Ray's films and stories are marked deeply and consistently by a distinctively Bengali variety of liberalism. Drawn from an ongoing biographical project, it commences with an overview of the nationalist milieu in which Ray grew up and emphasizes the preoccupation with colonialism and nationalism that marked his earliest unfilmed scripts. It then shows with case studies of Kanchanjangha (1962), Charulata (1964), First Class Kamra (First-Class Compartment, 1981), Pratidwandi (The Adversary, 1970), Shatranj ke Khilari (The Chess Players, 1977), Agantuk (The Stranger, 1991) and Robertsoner Ruby (Robertson's Ruby, 1992) how Ray's mature work continued to combine a strongly anti-colonial viewpoint with a shifting perspective on Indian nationhood and an unequivocal commitment to cultural cosmopolitanism. Analysing how Ray articulated his ideological positions through the quintessentially liberal device of complexly staged debates that were apparently free, but in fact closed by the scenarist/director on ideologically specific notes, this article concludes that Ray's reputation as an all-forgiving, ‘everybody-has-his-reasons’ humanist is based on simplistic or even tendentious readings of his work

    A Mimetic Algorithm for Computing a Nontrivial Lower Bound on Number of Tracks in Two-Layer Channel Routing

    Get PDF
    199-210Study of algorithms and its design can be progressed in various dimensions. In this paper, we have a definite refinement of lower bound on the number of tracks required to route a channel. The attack is from a complementary viewpoint. Our algorithm succeeds to avoid all kinds of approximation. The approach performs exact mapping of the problem into graphical presentation and analyzes the graph taking help of mimetic algorithm, which uses combination of sequential and GA based vertex coloring. Performance of the algorithm depends on how effectively mimetic approach can be applied selecting appropriate values for the parameters to evaluate the graphical presentation of the problem. This viewpoint has immense contribution against sticking at local minima for this optimization problem. The finer result clearly exemplifies instances, which give better or at least the same lower bound in VLSI channel routing problem

    An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking

    Full text link
    Abstract—Due to emerging trend of design reuse in VLSI circuits, the intellectual property (IP) of design faces serious challenges like forgery, theft, misappropriation etc. These in-creasing risks of design IP stored in design repositories, or the threat of hacking the same during its Internet-based trans-mission, mandates design file encryption and its appropriate watermarking. In this paper, we propose a novel Internet-based scheme to tackle this problem. Input to the proposed scheme is a generic graph corresponding to a digital system design. Watermarking of the graph and its encryption are achieved using a new linear feedback shift register(LFSR)-based locking scheme. The proposed scheme makes unauthorized disclosure of valuable designs almost infeasible, and can easily detect any alteration of the design file during transmission. It ensures authentication of the original designer as well as non-repudiation between the seller and the buyer. Empirical evidences on several well-known benchmark problem sets are encouraging. Index Terms—Intellectual property protection (IPP), Water-marking, Encryption, Decryption
    corecore