����������� �������� ����I��������� ����I� �I��������� ������� ������

V. Chernyakhivskyy
{"title":"����������� �������� ����I��������� ����I� �I��������� ������� ������","authors":"V. Chernyakhivskyy","doi":"10.30970/vam.2019.27.10271","DOIUrl":null,"url":null,"abstract":"The analysis of problem-solving tasks and construction of graphs have been leading to the development of new algorithms and software implementations. To verify the algorithm, it is necessary to make test data in such a way, that all values for the test are predetermined. The values for testing algorithms via graphs are: the number of vertices in the graph; the vertex degree; connectivity of the graph; permissibility of multiple edges and loops; the weight of the graph edges. If the values are known for the test graph then we can calculate the expected results of the designed algorithm and match them with the actual ones in a well-posed manner. The algorithm and some elements of software implementation of generating nite undirected graphs, with such values as the number of vertices n and the degree of the vertices k = const, which correspond to correctness of additional conditional statements, are presented in the article. The general scheme of the algorithm is as follows. Create two lists of vertices L1 and L2. The list L1 is initially empty; in the list L2 we have all vertices of the graph from 1 to n. We take the rst vertex in L2, we build all k edges to it and transfer it to the list L1. Repeat the same for each next vertex of the L2 list, except the last one. The last vertex L2 is just transferred to L1. The algorithm immediately builds the adjacency matrix by modeling list operations with L1 and L2. According to the algorithm, the adjacency matrix will always be the same for xed n and k when the algorithm is repeated. To obtain dierent matrices, the rule of graph isomorphism is used: perform the permutations of the rows and columns of the resulting matrix.","PeriodicalId":302104,"journal":{"name":"Application Mathematics and Informatics","volume":"107 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Application Mathematics and Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30970/vam.2019.27.10271","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The analysis of problem-solving tasks and construction of graphs have been leading to the development of new algorithms and software implementations. To verify the algorithm, it is necessary to make test data in such a way, that all values for the test are predetermined. The values for testing algorithms via graphs are: the number of vertices in the graph; the vertex degree; connectivity of the graph; permissibility of multiple edges and loops; the weight of the graph edges. If the values are known for the test graph then we can calculate the expected results of the designed algorithm and match them with the actual ones in a well-posed manner. The algorithm and some elements of software implementation of generating nite undirected graphs, with such values as the number of vertices n and the degree of the vertices k = const, which correspond to correctness of additional conditional statements, are presented in the article. The general scheme of the algorithm is as follows. Create two lists of vertices L1 and L2. The list L1 is initially empty; in the list L2 we have all vertices of the graph from 1 to n. We take the rst vertex in L2, we build all k edges to it and transfer it to the list L1. Repeat the same for each next vertex of the L2 list, except the last one. The last vertex L2 is just transferred to L1. The algorithm immediately builds the adjacency matrix by modeling list operations with L1 and L2. According to the algorithm, the adjacency matrix will always be the same for xed n and k when the algorithm is repeated. To obtain dierent matrices, the rule of graph isomorphism is used: perform the permutations of the rows and columns of the resulting matrix.
对问题解决任务的分析和图形的构建已经导致了新算法和软件实现的发展。为了验证算法,有必要以这样一种方式制作测试数据,即测试的所有值都是预先确定的。通过图来测试算法的值是:图中顶点的数量;顶点度;图的连通性;多边、多环的允许;图边的权值。如果测试图的值是已知的,那么我们就可以计算出设计算法的预期结果,并以适定的方式将其与实际结果进行匹配。本文给出了生成顶点数n、顶点度k = const等值对应附加条件语句正确性的无向图的算法和软件实现的一些要素。算法的总体方案如下:创建两个顶点L1和L2的列表。列表L1最初是空的;在列表L2中,我们有从1到n的所有顶点,我们取L2中的第一个顶点,我们为它构建所有k条边并将其转移到列表L1中。对L2列表的下一个顶点重复相同的操作,除了最后一个顶点。最后一个顶点L2被转移到了L1上。该算法通过对L1和L2的表操作建模,立即构建邻接矩阵。根据该算法,当算法重复时,对于n和k的邻接矩阵总是相同的。为了得到不同的矩阵,使用图同构规则:对得到的矩阵的行和列进行置换。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信