مرور Volume 51, Issue 1 بر اساس تاریخ انتشار
در حال نمایش موارد 1 - 9 از 9
-
Some new restart vectors for explicitly restarted Arnoldi method
(University of Tehran, 2019-06-01)The explicitly restarted Arnoldi method (ERAM) can be used to find some eigenvalues of large and sparse matrices. However, it has been shown that even this method may fail to converge. In this paper, we present two new ...
-
A Closed-Form Solution for Two-Dimensional Diffusion Equation Using Crank-Nicolson Finite Difference Method
(University of Tehran, 2019-06-01)In this paper a finite difference method for solving 2-dimensional diffusion equation is presented. The method employs Crank-Nicolson scheme to improve finite difference formulation and its convergence and stability. The ...
-
Feasibility of detecting and localizing radioactive source using image processing and computational geometry algorithms
(University of Tehran, 2019-06-01)We consider the problem of finding the localization of radioactive source by using data from a digital camera. In other words, the camera could help us to detect the direction of radioactive rays radiation. Therefore, the ...
-
Algorithm for finding the largest inscribed rectangle in polygon
(University of Tehran, 2019-06-01)In many industrial and non-industrial applications, it is necessary to identify the largest inscribed rectangle in a certain shape. The problem is studied for convex and non-convex polygons. Another criterion is the direction ...
-
$k$-Total difference cordial graphs
(University of Tehran, 2019-06-01)Let $G$ be a graph. Let $f:V(G)to{0,1,2, ldots, k-1}$ be a map where $k in mathbb{N}$ and $k>1$. For each edge $uv$, assign the label $left|f(u)-f(v)right|$. $f$ is called a $k$-total difference cordial labeling of $G$ if ...
-
Tenacity and rupture degree parameters for trapezoid graphs
(University of Tehran, 2019-06-01)Reliability of networks is an important issue in the field of graph and network. Computation of network vulnerability parameters is NP-complete for popular network topologies such as tree, Mesh, Cube, etc.In this ...
-
Max-Min averaging operator: fuzzy inequality systems and resolution
(University of Tehran, 2019-06-01)Minimum and maximum operators are two well-known t-norm and s-norm used frequently in fuzzy systems. In this paper, two different types of fuzzy inequalities are simultaneously studied where the convex combination of minimum ...
-
Detour Monophonic Graphoidal Covering Number of Corona Product Graph of Some Standard Graphs with the Wheel
(University of Tehran, 2019-06-01)A chord of a path $P$ is an edge joining two non-adjacent vertices of $P$. A path $P$ is called a monophonic path if it is a chordless path. A longest $x-y$ monophonic path is called an $x-y$ detour monophonic path. A ...
-
Optimization of profit and customer satisfaction in combinatorial production and purchase model by genetic algorithm
(University of Tehran, 2019-06-01)Optimization of inventory costs is the most important goal in industries. But in many models, the constraints are considered simple and relaxed. Some actual constraints are to consider the combinatorial production and ...



