The application of the principles of quantum mechanics to cryptography has led to a respectable new dimension in confidential communication. As a result of these developments, it i...
: In the complete graph K2m+3 for m 2, we study some structures of simple non-isomorphic Hamiltonian sub-graphs of the form H ( 2m+3 , 6m+3) for m 2 . The various structures of t...
Secret sharing schemes are methods for distributing a secret among n participants in such a way that any qualified subsets of participants can recover the secret, and unqualified ...
Abstract A valiant of L-system called `matrix L-system' is introduced to model the folding process of a square paper into small polygons (rectangles or triangles). Using this ...
The problem of finding a negative cycle in a weighted, directed graph is discussed here. First the algorithm for printing out a negative cycle reachable from the source s, with th...
In this paper, we analysis a hypercube-like structure, called the Folded Hypercube, which is basically a standard hypercube with some extra links established between its nodes. We ...
: In this paper, we propose two procedures for multiplication and division using DNA strands. We first show a procedure for multiplication of a pair of two binary numbers. The proc...
We prove an upper bound on the convergence rate of Markov Chain Monte Carlo (MCMC) algorithms for the important special case when the state space can be aggregated into a smaller ...
The displacement structure is extended to a Kronecker matrix W Z. A new class of Kronecker-like matrices with the displacement rank r, r < n will be formulated and presented. ...