Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Three-length-path structure connectivity and substructure connectivity of hypercube networks
YANG Yuxing, LI Xiaohui
Journal of Computer Applications    2019, 39 (2): 509-512.   DOI: 10.11772/j.issn.1001-9081.2018061402
Abstract416)      PDF (660KB)(227)       Save
In order to evaluate the reliability and fault-tolerant ability of multi-processor system which takes hypercubes as underlying networks, combining the fact that structural faults often occur when the system is invaded by computer viruses, three-length-path structure connectivity and substructure connectivity of the n-cube network were investigated. Firstly, by using the three-length-path structure-cut of the n-cube network, an upper bound of three-length-path structure connectivity of the network was obtained. Secondly, by using an equivalent transformation or a reductive transformation of the three-length-path substructure-set of the n-cube network, a lower bound of three-length-path substructure connectivity of the network was obtained. Finally, combining with the property that three-length-path structure connectivity of a network is not less than its three-length-path substructure connectivity, it was proved that both three-length-path structure connectivity and substructure connectivity of a n-cube network were half of n. The results show that to destroy the enemy's multi-processor system which take the n-cubes as underlying networks under three-length-path structure fault model, at least half of n three-length-path structures or substructures of the system should be attacked.
Reference | Related Articles | Metrics
Link connectivity and restricted link connectivity of augmented bubble-sort networks
QIU Yana, YANG Yuxing
Journal of Computer Applications    2016, 36 (11): 3006-3009.   DOI: 10.11772/j.issn.1001-9081.2016.11.3006
Abstract624)      PDF (614KB)(425)       Save
In view of the disadvantages of small link connectivity, restricted edge connectivity and weak fault tolerance, a kind of augmented bubble-sort network was designed by adding some links to the original bubble-sort network. By constructing a minimum link cut of the n dimensional augmented bubble-sort network, the link connectivity of the n dimensional augmented bubble-sort network was proved to be n, which implied that any two nodes are still connected even deleting n-1 links. The restricted link connectivity of the n dimensional augmented bubble-sort network was proved to be 2 n-2. Therefore, any two nodes of the n dimensional augmented bubble-sort network were still connected even deleting 2 n-3 links if the removal of these links doesn't result in singletons. Based on above results, the example rusults show that the augmented bubble-sort networks is better than bubble-sort network.
Reference | Related Articles | Metrics
Recursive algorithm for k-cycle preclusion problem in k-ary n-cubes
YANG Yuxing WANG Shiying
Journal of Computer Applications    2013, 33 (09): 2401-2403.   DOI: 10.11772/j.issn.1001-9081.2013.09.2419
Abstract721)      PDF (586KB)(414)       Save
In order to measure the fault tolerance ability of the parallel computers which take the k-ary n-cube as underlying topology, by constructing the minimum node set whose removal will lead to every k-ary 1-cube in the k-ary n-cube faulty, a recursive algorithm for finding the k-ary 1-cube subnet preclusion node cut of the k-ary n-cube was proposed. It is proved that at least kn-1 nodes need to be damaged if a rival wants to destroy all k-ary 1-cubes in the k-ary n-cube. The result indicates that there are still undamaged k-ary 1-cubes in the parallel computers which take the k-ary n-cube as underlying topology if the number of the faulty nodes does not exceed kn-1-1.
Related Articles | Metrics