فهرست مطالب

International Journal of Industrial Engineering and Productional Research
Volume:19 Issue: 2, Jun 2008

  • تاریخ انتشار: 1378/10/13
  • تعداد عناوین: 4
|
  • M. Alaeiyan Page 1
    Abstract: We call a Cayley graph Γ = Cay (G, S) normal for G, if the right regular representation R(G) of G is normal in the full automorphism group of Aut(Γ). In this paper, a classification of all non-normal Cayley graphs of finite abelian group with valency 6 was presented.
  • M. Hadian Dehkordi *, A. Cheraghi Page 13
    A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was applied to propose a lower bound on the pixel expansion of visual cryptography schemes with graph access structure  (G). In addition a lower bound on the pixel expansion of basis matrices C5 and Peterson graph access structure were presented.
  • A. Neisy Page 17
    Abstract: Determination of the diffusion coefficient on the base of solution of a linear inverse problem of the parameter estimation using the Least-square method is presented in this research. For this propose a set of temperature measurements at a single sensor location inside the heat conducting body was considered. The corresponding direct problem was then solved by the application of the heat fundamental solution.
  • H. Tavallaee *, R. Varmazyar Page 21
    Abstract: Let be a commutative ring and be a unitary module. We define a semiprime submodule of a module and consider various properties of it. Also we define semi-radical of a submodule of a module and give a number of its properties. We define modules which satisfy the semi-radical formula and present the existence of such a module.