Search results for: GRAPH NEURAL NETWORK - Bridge of Knowledge

Search

Search results for: GRAPH NEURAL NETWORK

Filters

total: 2701
filtered: 2157

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: GRAPH NEURAL NETWORK

  • Modeling and analysis of the effectiveness of the guard systemswith dynamic graphs

    Publication

    - Year 2011

    In the following paper it will be presented a new model for analysis (in polynomial time) of the effectiveness of the guard systems. Therewill be presented its practical applications in problems such as searching for the weakest points of the system, planning guards' paths or cameras deployment, switching image from multiple cameras on several monitors, or interception of the intruder. This model is based on describing the guarded...

    Full text to download in external service

  • Edge subdivision and edge multisubdivision versus some domination related parameters in generalized corona graphs

    Publication

    - Opuscula Mathematica - Year 2016

    Given a graph G= (V, E), the subdivision of an edge e=uv∈E(G) means the substitution of the edge e by a vertex x and the new edges ux and xv. The domination subdivision number of a graph G is the minimum number of edges of G which must be subdivided (where each edge can be subdivided at most once) in order to increase the domination number. Also, the domination multisubdivision number of G is the minimum number of subdivisions...

    Full text available to download

  • Musical Instrument Tagging Using Data Augmentation and Effective Noisy Data Processing

    Developing signal processing methods to extract information automatically has potential in several applications, for example searching for multimedia based on its audio content, making context-aware mobile applications (e.g., tuning apps), or pre-processing for an automatic mixing system. However, the last-mentioned application needs a significant amount of research to reliably recognize real musical instruments in recordings....

    Full text available to download

  • LONG-TERM RISK CLASS MIGRATIONS OF NON-BANKRUPT AND BANKRUPT ENTERPRISES

    This paper investigates how the process of going bankrupt can be recognized much earlier by enterprises than by traditional forecasting models. The presented studies focus on the assessment of credit risk classes and on determination of the differences in risk class migrations between non-bankrupt enterprises and future insolvent firms. For this purpose, the author has developed a model of a Kohonen artificial neural network to...

    Full text available to download

  • A Novel Spatio–Temporal Deep Learning Vehicle Turns Detection Scheme Using GPS-Only Data

    Publication

    - IEEE Access - Year 2023

    Whether the computer is driving your car or you are, advanced driver assistance systems (ADAS) come into play on all levels, from weather monitoring to safety. These modern-day ADASs use various assisting tools for drivers to keep the journey safe; these sophisticated tools provide early signals of numerous events, such as road conditions, emerging traffic scenarios, and weather warnings. Many urban applications, such as car-sharing...

    Full text available to download

  • The hat problem on cycles on at least nine vertices

    Publication

    The topic is the hat problem in which each of n players is randomly fitted with a blue or red hat. Then everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. The team wins if at least one player guesses his hat color correctly, and no one guesses his hat color wrong; otherwise the team loses. The aim is to maximize the probability of winning. In this version every player...

    Full text available to download

  • Algorithms for testing security in graphs

    In this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...

    Full text available to download

  • 2-Coloring number revisited

    2-Coloring number is a parameter, which is often used in the literature to bound the game chromatic number and other related parameters. However, this parameter has not been precisely studied before. In this paper we aim to fill this gap. In particular we show that the approximation of the game chromatic number by the 2-coloring number can be very poor for many graphs. Additionally we prove that the 2-coloring number may grow...

    Full text available to download

  • Isolation Number versus Domination Number of Trees

    Publication
    • M. Lemańska
    • M. J. Souto-Salorio
    • A. Dapena
    • F. Vazquez-Araujo

    - Mathematics - Year 2021

    If G=(VG,EG) is a graph of order n, we call S⊆VG an isolating set if the graph induced by VG−NG[S] contains no edges. The minimum cardinality of an isolating set of G is called the isolation number of G, and it is denoted by ι(G). It is known that ι(G)≤n3 and the bound is sharp. A subset S⊆VG is called dominating in G if NG[S]=VG. The minimum cardinality of a dominating set of G is the domination number, and it is denoted by γ(G)....

    Full text available to download

  • Modelowanie przepływu pary przez okołodźwiękowe wieńce turbinowe z użyciem sztucznych sieci neuronoych

    Publication

    Niniejszy artykuł stanowi opis modelu przepływu pary przez okołodźwiękowe stopnie turbinowe, stworzonego w oparciu o sztuczne sieci neuronowe (SSN). Przedstawiony model neuronowy pozwala na wyznaczenie rozkładu wybranych parametrów w analizowanym przekroju kanału przepływowego turbiny dla rozpatrywanego zakresu wartości ciśnienia wlotowego.

    Full text available to download

  • A note on total reinforcement in graphs

    Publication

    - DISCRETE APPLIED MATHEMATICS - Year 2011

    In this note we prove a conjecture and inprove some results presendet in a recent paper of N. Sridharan, M.D. Elias, V.S.A. Subramanian, Total reinforcement number of a graph, AKCE Int. J. Graphs Comb. 4 (2) (2007) 197-202.

    Full text available to download

  • Service-based Resilience via Shared Protection in Mission-critical Embedded Networks

    Publication

    - IEEE Transactions on Network and Service Management - Year 2021

    Mission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...

    Full text available to download

  • Taking advantage of symmetries: Gathering of many asynchronous oblivious robots on a ring

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2010

    One of the recently considered models of robot-based computing makes use of identical, memoryless mobile units placed in nodes of an anonymous graph. The robots operate in Look-Compute-Move cycles; in one cycle, a robot takes a snapshot of the current configuration (Look), takes a decision whether to stay idle or to move to one of the nodes adjacent to its current position (Compute), and in the latter case makes an instantaneous...

    Full text available to download

  • Strategic balance in graphs

    For a given graph G, a nonempty subset S contained in V ( G ) is an alliance iff for each vertex v ∈ S there are at least as many vertices from the closed neighbourhood of v in S as in V ( G ) − S. An alliance is global if it is also a dominating set of G. The alliance partition number of G was defined in Hedetniemi et al. (2004) to be the maximum number of sets in a partition of V ( G ) such that each set is an alliance. Similarly,...

    Full text available to download

  • Secure Italian domination in graphs

    Publication

    - JOURNAL OF COMBINATORIAL OPTIMIZATION - Year 2021

    An Italian dominating function (IDF) on a graph G is a function f:V(G)→{0,1,2} such that for every vertex v with f(v)=0, the total weight of f assigned to the neighbours of v is at least two, i.e., ∑u∈NG(v)f(u)≥2. For any function f:V(G)→{0,1,2} and any pair of adjacent vertices with f(v)=0 and u with f(u)>0, the function fu→v is defined by fu→v(v)=1, fu→v(u)=f(u)−1 and fu→v(x)=f(x) whenever x∈V(G)∖{u,v}. A secure Italian dominating...

    Full text available to download

  • Model neuronowy jako alternatywa dla numerycznego modelu okołodźwiękowego przepływu pary przez palisadę turbinową.

    Publication

    - Mechanik - Year 2014

    Występowanie skośnej fali uderzeniowej w przepływie pary przez palisadę turbinową stanowi zagrożenie dla bezpiecznej pracy turbiny oraz dla jej elementów konstrukcyjnych. Detekcja oraz lokalizacja fali uderzeniowej, a także rozpoznanie przyczyny jej powstawania, nie są możliwe do osiągnięcia na drodze pomiarowej. Analizę zjawisk zachodzących wewnątrz kanału przepływowego umożliwiają natomiast modele numeryczne oraz neuronowe. Zaletą...

    Full text available to download

  • Wireless Link Selection Methods for Maritime Communication Access Networks—A Deep Learning Approach

    Publication

    In recent years, we have been witnessing a growing interest in the subject of communication at sea. One of the promising solutions to enable widespread access to data transmission capabilities in coastal waters is the possibility of employing an on-shore wireless access infrastructure. However, such an infrastructure is a heterogeneous one, managed by many independent operators and utilizing a number of different communication...

    Full text available to download

  • Controlled grafting of vinylic monomers on polyolefins: a robust mathematical modeling approach

    Publication
    • M. Saeb
    • B. Rezaee
    • A. Shadman
    • K. Formela
    • Z. Ahmadi
    • F. Hemmati
    • T. Kermaniyan
    • Y. Mohammadi

    - DESIGNED MONOMERS AND POLYMERS - Year 2017

    Experimental and mathematical modeling analyses were used for controlling melt free-radical grafting of vinylic monomers on polyolefins and, thereby, reducing the disturbance of undesired cross-linking of polyolefins. Response surface, desirability function, and artificial intelligence methodologies were blended to modeling/optimization of grafting reaction in terms of vinylic monomer content, peroxide initiator concentration,...

    Full text available to download

  • Self-organising maps in the analysis of strains of human abdominal wall to identify areas of similar mechanical behaviour.

    The study refers to the application of a type of artificial neural network called the Self-Organising Map (SOM) for the identification of areas of the human abdominal wall that behave in a similar mechanical way. The research is based on data acquired during in vivo tests using the digital image correlation technique (DIC). The mechanical behaviour of the human abdominal wall is analysed during changing intra-abdominal pressure....

    Full text available to download

  • Experimental tuning of AuAg nanoalloy plasmon resonances assisted by machine learning method

    Plasmonic nanostructures based on AuAg nanoalloys were fabricated by thermal annealing of metallic films in an argon atmosphere. The nanoalloys were chosen because they can extend the wavelength range in which plasmon resonance occurs and thus allow the design of plasmonic platforms with the desired parameters. The influence of initial fabrication parameters and experimental conditions on the formation of nanostructures was investigated....

    Full text available to download

  • Direct brain stimulation modulates encoding states and memory performance in humans

    Publication
    • Y. Ezzyat
    • J. E. Kragel
    • J. F. Burke
    • D. F. Levy
    • A. Lyalenko
    • P. Wanda
    • L. O'Sullivan
    • K. B. Hurley
    • S. Busygin
    • I. Pedisich... and 16 others

    - CURRENT BIOLOGY - Year 2017

    People often forget information because they fail to effectively encode it. Here, we test the hypothesis that targeted electrical stimulation can modulate neural encoding states and subsequent memory outcomes. Using recordings from neurosurgical epilepsy patients with intracranially implanted electrodes, we trained multivariate classifiers to discriminate spectral activity during learning that predicted remembering from forgetting,...

    Full text available to download

  • A NOTE ON ON-LINE RAMSEY NUMBERS FOR QUADRILATERALS

    Publication

    - Opuscula Mathematica - Year 2014

    We consider on-line Ramsey numbers defined by a game played between two players, Builder and Painter. In each round Builder draws an the edge and Painter colors it either red or blue, as it appears. Builder’s goal is to force Painter to create a monochromatic copy of a fixed graph H in as few rounds as possible. The minimum number of rounds (assuming both players play perfectly) is the on-line Ramsey number \widetilde{r}(H) of...

    Full text available to download

  • Bounds on the cover time of parallel rotor walks

    Publication

    - JOURNAL OF COMPUTER AND SYSTEM SCIENCES - Year 2016

    The rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node successively propagates walkers visiting it along its outgoing arcs in round-robin fashion, according to a fixed ordering. We consider...

    Full text available to download

  • On minimum cost edge searching

    Publication

    We consider the problem of finding edge search strategies of minimum cost. The cost of a search strategy is the sum of searchers used in the clearing steps of the search. One of the natural questions is whether it is possible to find a search strategy that minimizes both the cost and the number of searchers used to clear a given graph G. We call such a strategy ideal. We prove, by an example, that ideal search strategies do not...

    Full text available to download

  • On-line ranking of split graphs

    A vertex ranking of a graph G is an assignment of positive integers (colors) to the vertices of G such that each path connecting two vertices of the same color contains a vertex of a higher color. Our main goal is to find a vertex ranking using as few colors as possible. Considering on-line algorithms for vertex ranking of split graphs, we prove that the worst case ratio of the number of colors used by any on-line ranking algorithm...

    Full text available to download

  • Necessary and Sufficient Condition for State-Independent Contextual Measurement Scenarios

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2014

    The problem of identifying measurement scenarios capable of revealing state-independent contextuality in a given Hilbert space dimension is considered. We begin by showing that for any given dimension d and any measurement scenario consisting of projective measurements, (i) the measure of contextuality of a quantum state is entirely determined by its spectrum, so that pure and maximally mixed states represent the two extremes...

    Full text to download in external service

  • THE IPV4 TO IPV6 MIGRATION OF APPLICATIONS AND SERVICE

    This article presents the problems related to IPv4 to IPv6 migration of applications supporting network services. It summarizes the needs of executing such migration. It shows the basic problems of automating the migration process, having defined the basic terms, i.e.: a network service, a network application. It shows a sample implementation of the automation of the migration process between IP technologies for selected network...

  • Open-Set Speaker Identification Using Closed-Set Pretrained Embeddings

    Publication

    - Year 2022

    The paper proposes an approach for extending deep neural networks-based solutions to closed-set speaker identification toward the open-set problem. The idea is built on the characteristics of deep neural networks trained for the classification tasks, where there is a layer consisting of a set of deep features extracted from the analyzed inputs. By extracting this vector and performing anomaly detection against the set of known...

    Full text available to download

  • Approximation algorithms for job scheduling with block-type conflict graphs

    Publication

    - COMPUTERS & OPERATIONS RESEARCH - Year 2024

    The problem of scheduling jobs on parallel machines (identical, uniform, or unrelated), under incompatibility relation modeled as a block graph, under the makespan optimality criterion, is considered in this paper. No two jobs that are in the relation (equivalently in the same block) may be scheduled on the same machine in this model. The presented model stems from a well-established line of research combining scheduling theory...

    Full text to download in external service

  • DEEP LEARNING BASED ON X-RAY IMAGING IMPROVES COXARTHROSIS DETECTION

    Publication
    • M. Maj
    • J. Borkowski
    • J. Wasilewski
    • S. Hrynowiecka
    • A. Kastrau
    • M. Liksza
    • P. Jasik
    • M. Treder

    - Year 2022

    Objective: The purpose of the study was to create an Artificial Neural Network (ANN) based on X-ray images of the pelvis, as an additional tool to automate and improve the diagnosis of coxarthrosis. The research is focused on joint space narrowing, which is a radiological symptom showing the thinning of the articular cartilage layer, which is translucent to X-rays. It is the first and the most important of the radiological signs...

    Full text to download in external service

  • Generalised heart rate statistics reveal neurally mediated homeostasis transients

    Publication
    • D. Makowiec
    • B. Graff
    • W. Miklaszewski
    • D. Wejer
    • A. Kaczkowska
    • S. Budrejko
    • Z. R. Struzik

    - EPL-EUROPHYS LETT - Year 2015

    Distributions of accelerations and decelerations, obtained from increments of heart rate recorded during a head-up tilt table (HUTT) test provide short-term characterization of the complex cardiovascular response to a rapid controlled dysregulation of homeostasis. A generalised statistic is proposed for evaluating the neural reflexes responsible for restoring the homeostatic dynamics. An evaluation of the effects on heart rate...

    Full text to download in external service

  • Abdominal Aortic Aneurysm segmentation from contrast-enhanced computed tomography angiography using deep convolutional networks

    Publication
    • T. Dziubich
    • P. Białas
    • Ł. Znaniecki
    • J. Halman
    • J. Brzeziński

    - Year 2020

    One of the most common imaging methods for diagnosing an abdominal aortic aneurysm, and an endoleak detection is computed tomography angiography. In this paper, we address the problem of aorta and thrombus semantic segmentation, what is a mandatory step to estimate aortic aneurysm diameter. Three end-to-end convolutional neural networks were trained and evaluated. Finally, we proposed an ensemble of deep neural networks with underlying...

    Full text to download in external service

  • Turán numbers for odd wheels

    Publication

    - DISCRETE MATHEMATICS - Year 2018

    The Turán number ex(n,G) is the maximum number of edges in any n-vertex graph that does not contain a subgraph isomorphic to G. A wheel W_n is a graph on n vertices obtained from a C_{n−1} by adding one vertex w and making w adjacent to all vertices of the C_{n−1}. We obtain two exact values for small wheels: ex(n,W_5)=\lfloor n^2/4+n/2\rfloor, ex(n,W_7)=\lfloor n^2/4+n/2+1 \rfloor. Given that ex(n,W_6) is already known, this...

    Full text available to download

  • Distributed NVRAM Cache – Optimization and Evaluation with Power of Adjacency Matrix

    Publication

    In this paper we build on our previously proposed MPI I/O NVRAM distributed cache for high performance computing. In each cluster node it incorporates NVRAMs which are used as an intermediate cache layer between an application and a file for fast read/write operations supported through wrappers of MPI I/O functions. In this paper we propose optimizations of the solution including handling of write requests with a synchronous mode,...

    Full text to download in external service

  • Urban scene semantic segmentation using the U-Net model

    Publication

    - Year 2023

    Vision-based semantic segmentation of complex urban street scenes is a very important function during autonomous driving (AD), which will become an important technology in industrialized countries in the near future. Today, advanced driver assistance systems (ADAS) improve traffic safety thanks to the application of solutions that enable detecting objects, recognising road signs, segmenting the road, etc. The basis for these functionalities...

    Full text to download in external service

  • Efficient Calibration of Cost-Efficient Particulate Matter Sensors Using Machine Learning and Time-Series Alignment

    Atmospheric particulate matter (PM) poses a significant threat to human health, infiltrating the lungs and brain and leading to severe issues such as heart and lung diseases, cancer, and premature death. The main sources of PM pollution are vehicular and industrial emissions, construction and agricultural activities, and natural phenomena such as wildfires. Research underscores the absence of a safe threshold for particulate exposure,...

    Full text to download in external service

  • A Systematic Search for New Coupling Schemes of Cross-Coupled Resonator Bandpass Filters

    Publication

    In this paper, a systematic approach to an extensive search for topologies of cross-coupled filters with generalized Chebyshev response is presented. The technique applies graph theory to find unique, nonisomorphic filter configurations, and tests whether a specific frequency response can be realized in a given set of topologies. The results of the search are then stored in a database of possible filter configurations.

    Full text available to download

  • New potential functions for greedy independence and coloring

    Publication

    - DISCRETE APPLIED MATHEMATICS - Year 2015

    A potential function $f_G$ of a finite, simple and undirected graph $G=(V,E)$ is an arbitrary function $f_G : V(G) \rightarrow \mathbb{N}_0$ that assigns a nonnegative integer to every vertex of a graph $G$. In this paper we define the iterative process of computing the step potential function $q_G$ such that $q_G(v)\leq d_G(v)$ for all $v\in V(G)$. We use this function in the development of new Caro-Wei-type and Brooks-type...

    Full text available to download

  • Dataset Characteristics and Their Impact on Offline Policy Learning of Contextual Multi-Armed Bandits

    Publication

    The Contextual Multi-Armed Bandits (CMAB) framework is pivotal for learning to make decisions. However, due to challenges in deploying online algorithms, there is a shift towards offline policy learning, which relies on pre-existing datasets. This study examines the relationship between the quality of these datasets and the performance of offline policy learning algorithms, specifically, Neural Greedy and NeuraLCB. Our results...

    Full text available to download

  • An approximation algorithm for maximum P3-packing in subcubic graphs

    Publication

    W pracy podano algorytm 4/3-przyliżony dla trudnego obliczeniowo problemu umieszczania wierzchołkowo rozłącznych dwukrawędziowych ścieżek w grafach o stopniu maksymalnym 3 i stopniu minimalnym 2. Poprawiono tym samym wcześniejsze wyniki dla grafów kubicznych (A. Kelmans, D. Mubayi, Journal of Graph Theory 45, 2004).

    Full text to download in external service

  • A note on mixed tree coloring

    Publication

    - INFORMATION PROCESSING LETTERS - Year 2008

    Zaproponowano liniowy algorytm dla problemu kolorowania mieszanego w drzewach, uzyskując tym samym poprawę w stosunku do algorytmu o złożoności O(n^2) podanego w pracy [P. Hansen, J. Kuplinsky, D. de Werra, Mixed graph colorings, Math. Methods Oper. Res. 45 (1997) 145-160].

    Full text to download in external service

  • An Approximation of the Zero Error Capacity by a Greedy Algorithm

    Publication

    - Year 2020

    We present a greedy algorithm that determines a lower bound on the zero error capacity. The algorithm has many new advantages, e.g., it does not store a whole product graph in a computer memory and it uses the so-called distributions in all dimensions to get a better approximation of the zero error capacity. We also show an additional application of our algorithm.

  • An Approximation of the Zero Error Capacity by a Greedy Algorithm.

    Publication

    - Year 2020

    We present a greedy algorithm that determines a lower bound on the zero error capacity. The algorithm has many new advantages, e.g., it does not store a whole product graph in a computer memory and it uses the so-called distributions in all dimensions to get a better approximation of the zero error capacity. We also show an additional application of our algorithm.

    Full text to download in external service

  • Efficient list cost coloring of vertices and/or edges of bounded cyclicity graphs

    Publication

    Full text to download in external service

  • Trees with equal restrained domination and total restrained domination numbers

    W publikacji scharakteryzowano wszystkie drzewa, w których liczby dominowania powściągniętego oraz podwójnie totalnego są sobie równe.

    Full text available to download

  • Weakly connected domination subdivision numbers

    Liczba podziału krawędzi dla dominowania słabo spójnego to najmniejsza liczba krawędzi jaką należy podzielić, aby wzrosła liczba dominowania słabo wypukłego. W pracy przedstawione są własności liczby podziału krawędzi dla dominowania słabo spójnego dla różnych grafów.

    Full text available to download

  • Graphs with equal domination and 2-distance domination numbers

    W publikacji scharakteryzowane są wszystkie te drzewa i grafy jednocykliczne, w których liczba dominowania oraz liczba 2-dominowania na odległość są sobie równe.

    Full text available to download

  • Total outer-connected domination in trees

    W pracy przedstawiono dolne ograniczenie na liczbę dominowania totalnego zewnętrznie spójnego w grafach oraz scharakteryzowano wszystkie drzewa osiągające to ograniczenie.

    Full text available to download

  • Minimum vertex ranking spanning tree problem for chordal and proper interval graphs

    W pracy rozważamy problem szukania, dla danego grafu prostego, drzewa spinającego, którego uporządkowana liczba chromatyczna jest minimalna. K.~Miyata i inni dowiedli w [Np-hardness proof and an approximation algorithm for the minimum vertex ranking spanning tree problem,Discrete Appl. Math. 154 (2006) 2402-2410], że odpowiedni problem decyzyjny jest NP-trudny już w przypadku pytania o istnienie uporządkowanego 4-pokolorowania....

    Full text available to download

  • Efficient list cost coloring of vertices and/or edges of bounded cyclicity graphs

    W artykule rozważamy listowo-kosztowe kolorowanie wierzchołków i krawędzi grafu w modelu wierzchołkowym, krawędziowym, totalnym i pseudototalnym. Stosujemy programowanie dynamiczne w celu otrzymania algorytmów wielomianowych dla drzew. Następnie uogólniamy to podejście na dowolne grafy z ograniczonymi liczbami cyklomatycznymi i na ich multikolorowania.

    Full text available to download