IJRIT International Journal of Research in Information Technology, Volume 1, Issue 4, April 2013, Pg. 38-50

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

An Algorithm to Construct Super-Symmetric Latin Squares of Order 2n M.A.P.Chamikara1, S.R.Kodituwakku2, A.A.C.A.Jayathilake3, A.A.I.Perera4 1

Postgraduate Institute of Science, University of Peradeniya, Peradeniya, Sri Lanka. 2

Department of Statistics and Computer Science, Faulty of Science, University of Peradeniya, Sri Lanka

3

Department of Mathematics, University of Peradeniya, Peradeniya, Sri Lanka

4

Department of Mathematics, University of Peradeniya, Peradeniya, Sri Lanka

[email protected], [email protected] 2, [email protected], [email protected] 4

Abstract Literature shows that there are several ways of generating Latin squares, but there is not enough implementation about Super-symmetric Latin squares. This paper proposes a mathematical algorithm to construct Super-symmetric Latin squares of order 2 by substituting blocks of order 2n which has the basic properties of a recursive algorithm. The proposed algorithm was tested for a large number of orders and the results proved that the algorithm could be generalized for any input order n where n is a positive integer. Keywords: Combinatorics, Design theory, Graph theory, Latin Square, Super-symmetry

Full text: https://sites.google.com/site/ijrit1/home/V1I406.pdf

An Algorithm to Construct Super-Symmetric Latin ...

Abstract. Literature shows that there are several ways of generating Latin squares, but there is not enough implementation about Super-symmetric Latin squares.

71KB Sizes 0 Downloads 198 Views

Recommend Documents

An Algorithm to Construct Super-Symmetric Latin Squares of Order 2
M.A.P Chamikara, IJRIT. 38 ... Order 2 n. M.A.P.Chamikara. 1 ..... research interests include Crime analysis, GIS (Geographic Information Systems), image.

An Algorithm to Construct Super-Symmetric Latin Squares of Order 2
Moreover, a Latin square of order n is a n n matrix M m with ... first row of the Latin square of order 8 is the array of numbers given by 1 2 3 4 5 6 7 8 . Step 02.

An Approach to Construct Dynamic Service Mashups ...
new Web applications atop of these services in a more agile way. ... services, whereas annotation-based approaches (e.g. SAWSDL [19], hRESTS [7]).

Construct. Trades_COS.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Construct. Trades_COS.pdf. Construct. Trades_COS.pdf. Open. Extract. Open with. Sign In. Main menu.

NON-SUPERSYMMETRIC FOUR-DIMENSIONAL ...
partner S k, while the periodic S 4 is the partner of the periodic space-time co- ordinates X ". ..... where a 0, a 1, c o, c I = 0,1, and will be analyzed next. Any other ...

NON-SUPERSYMMETRIC FOUR-DIMENSIONAL ...
supersymmetry is not necessary in order to have a tachyon-free theory: an example .... In order to discuss the boundary conditions, we start by considering the ten- ..... where integration is extended over a fundamental domain of the complex ...

An algorithm portfolio based solution methodology to ...
9. Subassem bly. 10. CD Drive. 11. Laptop A. Assembly. 13. Laptop B. Assembly. 14 ... Supply chain for laptop family manufactured through PSC. S.R. Yadav et ...

MRR: an Unsupervised Algorithm to Rank Reviews by ... - GitHub
Next steps: Others clustering techniques for graph;. Methods to select the most relevant reviews;. Segmented Bushy Path widely explored in text summarization;. Vinicius Woloszyn, Henrique D. P. dos Santos, et al. (UFRGS). MRR: an Unsupervised Algorit

An Efficient Geometric Algorithm to Compute Time ... - IEEE Xplore
An Efficient Geometric Algorithm to Compute Time-optimal trajectories for a Car-like Robot. Huifang Wang, Yangzhou Chen and Philippe Sou`eres.

Supersymmetric electro-weak effects on
m,/Mw sin c~, and so g2 w ,~ mu 2, i.e. ga w and g2 fv areof the comparable size. ..... for an array of sneutrino masses (from 11 GeV to. 91 GeV) and for A = 3 - x/3 ...

Construct validity and vulnerability to anxiety: A ...
a Psychology Department, Royal Holloway University of London, Egham, Surrey TW20 0EX, United ... degrees, these criticisms share a concern about whether scores on ...... processing that does not draw on immediately available online.

Mediapedia: Mining Web Knowledge to Construct ...
Abstract. In recent years, we have witnessed the blooming of Web 2.0 content such as Wikipedia, Flickr and YouTube, etc. How might we ben- efit from such rich ...

Ecotourism as a Western Construct
laudable, state-of-the-art eco-technology does not come cheap. The operator ..... In the light of the fact that mainstream environmental education was having little ..... Pleumaron, A. (2001) Message 171 Ecotourism Certification Discussion.

An Evolutionary Algorithm for Homogeneous ...
fitness and the similarity between heterogeneous formed groups that is called .... the second way that is named as heterogeneous, students with different ...

An improved Incremental Delaunay Triangulation Algorithm
Abstract: The incremental insertion algorithm of. Delaunay triangulation in 2D is very popular due to its simplicity and stability. We briefly discuss.

An Adaptive Fusion Algorithm for Spam Detection
An email spam is defined as an unsolicited ... to filter harmful information, for example, false information in email .... with the champion solutions of the cor-.

An Algorithm for Implicit Interpolation
More precisely, we consider the following implicit interpolation problem: Problem 1 ... mined by the sequence F1,...,Fn and such that the degree of the interpolants is at most n(d − 1), ...... Progress in Theoretical Computer Science. Birkhäuser .

An Algorithm for Implicit Interpolation
most n(d − 1), where d is an upper bound for the degrees of F1,...,Fn. Thus, al- though our space is ... number of arithmetic operations required to evaluate F1,...,Fn and F, and δ is the number of ...... Progress in Theoretical Computer Science.

An Adaptive Fusion Algorithm for Spam Detection
adaptive fusion algorithm for spam detection offers a general content- based approach. The method can be applied to non-email spam detection tasks with little ..... Table 2. The (1-AUC) percent scores of our adaptive fusion algorithm AFSD and other f

An Algorithm for Nudity Detection
importance of skin detection in computer vision several studies have been made on the behavior of skin chromaticity at different color spaces. Many studies such as those by Yang and Waibel (1996) and Graf et al. (1996) indicate that skin tones differ

Mediapedia: Mining Web Knowledge to Construct ...
because it downloads the media contents as well as the corresponding ... users to distribute, evaluate and interact with each other in the social network. ... problem, where the most popular way may be the k-centers algorithm such as. [3]. ..... 10.

Three ways to construct adaptative WEB menus using ...
Finally, for effective marketing analysis, a company needs to know where the services are ... (i.e.: Web, telephonic services, PDA, 3rd generation telephone, etc.).