Filters
total: 356
filtered: 326
Search results for: PHYLOGENETIC TREE METRIC
-
Minimal double dominating sets in trees
PublicationWe provide an algorithm for listing all minimal double dominating sets of a tree of order $n$ in time $\mathcal{O}(1.3248^n)$. This implies that every tree has at most $1.3248^n$ minimal double dominating sets. We also show that this bound is tight.
-
Normalized Partial Scattering Cross Section for Performance Evaluation of Low-Observability Scattering Structures
PublicationThe development of diffusion metasurfaces created new opportunities to elevate the stealthiness of combat aircraft. Despite the potential significance of metasurfaces, their rigorous design methodologies are still lacking, especially in the context of meticulous control over the scattering of electromagnetic (EM) waves through geometry parameter tuning. Another practical issue is insufficiency of the existing performance metrics,...
-
The usefulness of birch saps from the area of Podkarpacie to produce birch syrup
PublicationIn northern European countries, as well as in North America tree saps of maples and birches are used for the production of syrups. Birch syrups are characterized by a specific aromatic taste and can be used as an addition to sweets, desserts, salads and meats. Attention is paid to the health benefits of birch syrups, mainly for high mineral content. The aim of this study was to evaluate the usefulness of birch saps obtained from...
-
Redukcja czasu analizy MZP przez ograniczenie rozmiaru rozwiązania
PublicationAnaliza drzew niezdatności jest uznaną metodą analizy bezpieczeństwa systemów. Notacja ECSDM pozwala definiować zależności czasowe między zdarzeniami drzewa oraz przeanalizować je w celu określenia zależności pomiędzy zdarzeniami z Minimalnych Zbiorów Przyczyn (MZP). Dzięki wprowadzeniu klasyfikacji zdarzeń z MZP można wyodrębnić zależności czasowe istotne dla zapobiegania wywoływania hazardu przez konkretny MZP. Pozostałe zależności...
-
Modeling and Evaluation of Electric Treeing Phenomena in Polymeric Cable Insulation
PublicationThis paper investigates the treeing phenomenon in polymeric materials such as crosslinked polyethylene (XLPE) that is widely used in medium and high voltage power cables as primary insulation. The modeling of electrical tree growth in the insulation from its initiation to breakdown is significant research work that illustrates the discharge dynamics and its impact on aging process in polymeric insulation. This study utilizes pulse...
-
Monitoring Trends of Land Use and Land Cover Changes in Rajang River Basin
PublicationIn this study, the spatiotemporal changes in land use and land cover (LULC) were evaluated from 1992 to 2015 for the Rajang River Basin (RRB) located in the Sarawak State of Malaysia. The changes in water bodies cropped lands, and forests were assessed based on the available remotely sensed satellite data. Supervised classification with the Maximum-Likelihood-Algorithm technique was adopted for monitoring the LULC changes using...
-
Narratives on cutting down trees on private land. A comparison of urban and rural municipalities in Poland using the Q-deliberation method
PublicationIncreased development in rural and urban areas leads to a decrease in tree cover and reduces the ecosystem services that trees provide. Municipal authorities must consider managing trees on private land to ensure that residents have access to trees and green spaces. In doing so, they must frequently confront conflicting stakeholder views, which are driven by diverse public and private interests and impacted by the type of landscape...
-
A PROPOSAL FOR ONE-IMAGE PHOTOGRAMMETRY SYSTEM FOR MEASURING THE CLEARANCE DISTANCE. CASE STUDY
PublicationMeasurement of the clearance distance (both in the context of the rail and road) is one of the current and increasingly discussed topics in the context of photogrammetric and image processing (computer vision) methods. The article presents a description of a simple and rapid method of measure the clearance distance between the obstacles by using one-image photogrammetry. The proposed method was tested for the railway, tram and...
-
Brief Announcement: Energy Constrained Depth First Search
PublicationDepth first search is a natural algorithmic technique for constructing a closed route that visits all vertices of a graph. The length of such route equals, in an edge-weighted tree, twice the total weight of all edges of the tree and this is asymptotically optimal over all exploration strategies. This paper considers a variant of such search strategies where the length of each route is bounded by a positive integer B (e.g. due...
-
Practical Evaluation of Internet Systems' Security Mechanisms
PublicationA proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.
-
Blue applicability grade index (BAGI) and software: a new tool for the evaluation of method practicality
PublicationIn this work, blue applicability grade index (BAGI) is proposed as a new metric tool for evaluating the practicality of an analytical method. BAGI can be considered complementary to the well-established green metrics, and it is mainly focused on the practical aspects of White Analytical Chemistry. This tool evaluates ten main attributes including the type of analysis, the number of analytes that are simultaneously determined, the...
-
Reconfiguring Minimum Dominating Sets in Trees
PublicationWe provide tight bounds on the diameter of γ-graphs, which are reconfiguration graphs of the minimum dominating sets of a graph G. In particular, we prove that for any tree T of order n ≥ 3, the diameter of its γ-graph is at most n/2 in the single vertex replacement adjacency model, whereas in the slide adjacency model, it is at most 2(n − 1)/3. Our proof is constructive, leading to a simple linear-time algorithm for determining...
-
Approximation Strategies for Generalized Binary Search in Weighted Trees
PublicationWe consider the following generalization of the binary search problem. A search strategy is required to locate an unknown target node t in a given tree T. Upon querying a node v of the tree, the strategy receives as a reply an indication of the connected component of T\{v} containing the target t. The cost of querying each node is given by a known non-negative weight function, and the considered objective is to minimize the total...
-
The Arnold conjecture in $ \mathbb C\mathbb P^n $ and the Conley index
Publicationn this paper we give an alternative, purely Conley index based proof of the Arnold conjecture in CP^n asserting that a Hamiltonian diffeomorphism of CP^n endowed with the Fubini-Study metric has at least (n+1) fixed points.
-
Verification of a Novel Method of Detecting Faults in Medium-Voltage Systems with Covered Conductors
PublicationThis paper describes the use of new methods of detecting faults in medium-voltage overhead lines built of covered conductors. The methods mainly address such faults as falling of a conductor, contacting a conductor with a tree branch, or falling a tree branch across three phases of a medium-voltage conductor. These faults cannot be detected by current digital relay protection systems. Therefore, a new system that can detect the...
-
Task Allocation and Scalability Evaluation for Real-Time Multimedia Processing in a Cluster Envirinment
PublicationAn allocation algorithm for stream processing tasks is proposed (Modified best Fit Descendent, MBFD). A comparison with another solution (BFD) is provided. Tests of the algorithms in an HPC environment are descrobed and the results are presented. A proper scalability metric is proposed and used for the evaluation of the allocation algorithm.
-
On trees attaining an upper bound on the total domination number
PublicationA total dominating set of a graph G is a set D of vertices of G such that every vertex of G has a neighbor in D. The total domination number of a graph G, denoted by γ_t(G), is the minimum cardinality of a total dominating set of G. Chellali and Haynes [Total and paired-domination numbers of a tree, AKCE International Journal of Graphs and Combinatorics 1 (2004), 69-75] established the following upper bound on the total domination...
-
Characterization of d-xylose reductase, XyrB, from Aspergillus niger
PublicationD-xylose reductase is a member of the aldo-keto reductase family, and is involved in D-xylose and L-arabinose conversion through the Pentose Catabolic Pathway (PCP) in fungi. In this study, we biochemically characterized a newly identified second D-xylose reductase (XyrB) from Aspergillus niger. This NADPH-dependent reductase is able to efficiently convert D-xylose and L-arabinose, and it has the highest affinity for these sugars...
-
Extending GQM by Argument Structures
PublicationEffective methods for metrics definition are of particular importance, as measurement mechanisms are indispensable in virtually any engineering discipline. The paper describes how the well known Goal-Question-Metric (GQM) method of systematic metrics derivation from measurement goals can be extended by applying argument structures. The proposed approach is called Goal-Argument-Metric (GAM). The general ideas of GQM and GAM are...
-
Extending GQM by argument structures
PublicationEffective metrics definition methods are of particular importance, as measurement mechanisms are indispensable in virtually any engineering discipline. The paper describes how the well known Goal-Question-Metric (GQM) method of systematic metrics derivation from measurement goals can be extended by applying argument structures. The proposed approach is called Goal-Argument-Metric (GAM). We briefly introduce general ideas of GQM...
-
Greenness assessment of analytical methods used for antibiotic residues determination in food samples
PublicationFood of animal origin plays an important role in ensuring a healthy and sustainable human diet. However, residues of pharmaceuticals, especially antibiotics, can be the cause of many health problems. To protect consumers and improve food quality, analytical methods used to determine contaminants should be simple, selective, and have high throughput and low detection limits. Recently, greenness metric tools have proven useful in...
-
Extensions of ETSI performance measurements methodology for statistical results analysis =Rozszerzenia metodologii pomiarów wydajności zaproponowanej przez ETSI przy statystycznej analizy wyników
PublicationNext Generation Network (NGN) architecture was proposed by International Telecommunication Union Telecommunication Standardization Sector (ITU-T) to deliver telecommunication services satisfying the needs of modern society for an access to information. The core of NGN service stratum are IP Multimedia Subsystem (IMS) elements acting as service controls units. To assess performance of IMS components, European Telecommunications...
-
Complementary green analytical procedure index (ComplexGAPI) and software
PublicationIt is not easy to find appropriate tools for the evaluation of the “green”nature of analytical methodologies which involve the use of compounds, materials, or chemicals manufactured prior to the analytical step. Here, we propose a new metric for the evaluation of analytical procedures based on the GAC attributes. The proposed solution expands on the well-known green analytical procedure index by adding additional fields pertaining...
-
Structure and Randomness in Planning and Reinforcement Learning
PublicationPlanning in large state spaces inevitably needs to balance the depth and breadth of the search. It has a crucial impact on the performance of a planner and most manage this interplay implicitly. We present a novel method \textit{Shoot Tree Search (STS)}, which makes it possible to control this trade-off more explicitly. Our algorithm can be understood as an interpolation between two celebrated search mechanisms: MCTS and random...
-
Adding Interpretability to Neural Knowledge DNA
PublicationThis paper proposes a novel approach that adds the interpretability to Neural Knowledge DNA (NK-DNA) via generating a decision tree. The NK-DNA is a promising knowledge representation approach for acquiring, storing, sharing, and reusing knowledge among machines and computing systems. We introduce the decision tree-based generative method for knowledge extraction and representation to make the NK-DNA more explainable. We examine...
-
Inception and Propagation of Electrical Trees in the Presence of Space Charge in HVAC Extruded Cables
PublicationThis paper presents the space charge impact on the inception and propagation of electrical trees in cross-linked polyethylene (XLPE) insulation via simulations and experimentation. A 3D finite element analysis (FEA)-based modeling is proposed to simulate electrical trees via a needle embedded on the XLPE insulation. The proposed FEA model demonstrates the influence of the space charge magnitude and polarity on the initiation of...
-
Automatic Rhythm Retrieval from Musical Files
PublicationThis paper presents a comparison of the effectiveness of two computational intelligence approaches applied to the task of retrieving rhythmic structure from musical files. The method proposed by the authors of this paper generates rhythmic levels first, and then uses these levels to compose rhythmic hypotheses. Three phases: creating periods, creating simplified hypotheses and creating full hypotheses are examined within this study....
-
Morse inequalities via Conley index theory
PublicationThe relation known as the Morse inequalities can be extended to a more general setting of flows on a locally compact metric spaces (Conley index) as well as dynamical systems on Hilbert spaces (LS-index). This paper is a discourse around this extension. Except the part concerning the LS-index the material is self-contained and has a character of a survey.
-
Analysis and Detection of Faults at Insulated Conductors of Overhead Medium Voltage Lines
PublicationThe paper dealt with the issue of breakdowns detection of isolated hanging wires on the medium-voltage transmission. The main aim of article is to describe the function of created breakdowns detector and evaluation its. The breakdowns detector is created based in indicators of faults such as touch between tree limbs and insulated wire, touch tree limbs with several phases or fall insulated wire on the ground. Breakdowns detector...
-
Prevalence Problem in the Set of Quadratic Stochastic Operators Acting on L1
PublicationThis paper is devoted to the study of the problem of prevalence in the class of quadratic stochastic operators acting on the L1 space for the uniform topology. We obtain that the set of norm quasi-mixing quadratic stochastic operators is a dense and open set in the topology induced by a very natural metric. This shows the typical long-term behaviour of iterates of quadratic stochastic operators.
-
On a Recurrence Arising in Graph Compression
PublicationIn a recently proposed graphical compression algorithm by Choi and Szpankowski (2012), the following tree arose in the course of the analysis. The root contains n balls that are consequently distributed between two subtrees according to a simple rule: In each step, all balls independently move down to the left subtree (say with probability p) or the right subtree (with probability 1p). A new node is created as long as...
-
Forecasting energy consumption and carbon dioxide emission of Vietnam by prognostic models based on explainable machine learning and time series
PublicationThis study assessed the usefulness of algorithms in estimating energy consumption and carbon dioxide emissions in Viet- nam, in which the training dataset was used to train the models linear regression, random forest, XGBoost, and AdaBoost, allowing them to comprehend the patterns and relationships between population, GDP, and carbon dioxide emissions, energy consumption. The results revealed that random forest, XGBoost, and AdaBoost...
-
Dempster-shafer theory-based trust and selfishness evaluation in mobile ad hoc networks
PublicationThe paper addresses the problem of selfishness detec-tion in mobile ad hoc networks. It describes an approach based on Dempster-Shafer theory of evidence. Special attention is paid to trust evaluation and using it as a metric for coping with (weighted) recommendations from third-party nodes. Efficiency and robustness of the pre-sented solution is discussed with an emphasis on resil-iency to false recommendations.
-
Super Dominating Sets in Graphs
PublicationIn this paper some results on the super domination number are obtained. We prove that if T is a tree with at least three vertices, then n2≤γsp(T)≤n−s, where s is the number of support vertices in T and we characterize the extremal trees.
-
Exploring Stock Traders’ Cognitive Biases: Research Design and Simulator Framework
PublicationCognitive bias is a phenomenon that has been extensively studied in stock trading and many other fields. This paper presents a framework for a Mobile Stock Trading Simulator (MSTS) that facilitates automatic investment in stocks with minimal human influence, by investigating the behavioral patterns and cognitive errors of stock market investors. The paper aims to determine whether investors’ investment strategies can be improved...
-
Ranking ecosystem services delivered by trees in urban and rural areas
PublicationPolicies and strategies for tree management and protection on a national, regional, and local level have not sufficiently considered differences between rural and urban areas. We used expert knowledge to compare rural and urban areas in a case study evaluating the relative importance of ecosystem services (ES) in policy development. The Analytic Hierarchy Process (AHP) and focus group discussions were used to rank 17 ES, representing...
-
The Complexity of Zero-Visibility Cops and Robber
PublicationIn this work we deal with the computational complexity aspects of the zero-visibility Cops and Robber game. We provide an algorithm that computes the zero-visibility copnumber of a tree in linear time and show that the corresponding decision problem is NP-complete even for the class of starlike graphs.
-
Experience-Driven Model of Decision-Making Processes in Project Teams
PublicationThis article presents a model of decision-making processes in project teams. Project teams constitute a specific type of organization appointed to implement a project. Decisions made by project teams result from the methods of project management and best management practices. The authors have undertaken the task of formalizing these processes using the classical method of constructing decision trees. It has been established that...
-
Searching by heterogeneous agents
PublicationIn this work we introduce and study a pursuit-evasion game in which the search is performed by heterogeneous entities. We incorporate heterogeneity into the classical edge search problem by considering edge-labeled graphs: once a search strategy initially assigns labels to the searchers, each searcher can be only present on an edge of its own label. We prove that this problem is not monotone even for trees and we give instances...
-
A machine learning approach to classifying New York Heart Association (NYHA) heart failure
PublicationAccording to the European Society of Cardiology, globally the number of patients with heart failure nearly doubled from 33.5 million in 1990 to 64.3 million in 2017, and is further projected to increase dramatically in this decade, still remaining a leading cause of morbidity and mortality. One of the most frequently applied heart failure classification systems that physicians use is the New York Heart Association (NYHA) Functional...
-
Molecular identification and genotyping of Staphylococci: genus, species, strains, colnes, lineages, and interspecies exchanges
PublicationStaphylococci are increasingly recognized as etiological agents of many opportunistic human and animal infections, emphasizing the need for a rapid and accurate identification, even to a genotypical level of these bacteria. In the recent years, there has been a significant progress in typing and phylogenetic study of Staphylococcus species. Here, we describe molecular methods used in taxonomy as well as staphylococci characterization....
-
High-Speed Binary-to-Residue Converter Design Using 2-Bit Segmentation of the Input Word
PublicationIn this paper a new approach to the design of the high-speed binary-to-residue converter is proposed that allows the attaining of high pipelining rates by eliminating memories used in modulo m generators. The converter algorithm uses segmentation of the input binary word into 2-bit segments. The use and effects of the input word segmentation for the synthesis of converters for five-bit moduli are presented. For the number represented...
-
Searching by Heterogeneous Agents
PublicationIn this work we introduce and study a pursuit-evasion game in which the search is performed by heterogeneous entities. We incorporate heterogeneity into the classical edge search problem by considering edge-labeled graphs. In such setting a searcher, once a search strategy initially decides on the label of the searcher, can be present on an edge only if the label of the searcher and the label of the edge are the same. We prove...
-
Multi-level Virtualization and Its Impact on System Performance in Cloud Computing
PublicationThe results of benchmarking tests of multi-level virtualized environments are presented. There is analysed the performance impact of hardware virtualization, container-type isolation and programming level abstraction. The comparison is made on the basis of a proposed score metric that allows you to compare different aspects of performance. There is general performance (CPU and memory), networking, disk operations and application-like...
-
A subset of two adherence systems, acute pro-inflammatory pap genes and invasion coding dra, fim, or sfa, increases the risk of Escherichia coli translocation to the bloodstream
PublicationAn analysis of the phylogenetic distribution and virulence genes of Escherichia coli isolates which predispose this bacteria to translocate from the urinary tract to the bloodstream is presented. One-dimensional analysis indicated that the occurrence of P fimbriae and α-hemolysin coding genes is more frequent among the E. coli which cause bacteremia. However, a two-dimensional analysis revealed that a combination of genes coding...
-
Effect of the Road Environment on Road Safety in Poland
PublicationRun-off-road accidents tend to be very severe because when a vehicle leaves the road, it will often crash into a solid obstacle (tree, pole, supports, front wall of a culvert, barrier). A statistical analysis of the data shows that Poland's main roadside hazard is trees and the severity of vehicles striking a tree in a run-off-road crash. The risks are particularly high in north-west Poland with many of the roads lined up with...
-
Preserving Trees in Automata
PublicationWe present a method to store additional information in a minimal automaton so that it is possible to compute a corresponding tree node number for a state. The number can then be used to retrieve additional information. The method works for minimal (and any other) deterministic acyclic finite state automata (DFAs). We also show how to compute the inverse mapping.
-
Similarity Measures for Face Images: An Experimental Study
PublicationThis work describes experiments aimed at finding a straightforward but effective way of comparing face images.We discuss properties of the basic concepts, such as the Euclidean, cosine and correlation metrics, test the simplest version of elastic templates, and compare these solutions with distances based on texture descriptors (Local Ternary Patterns). The influence of selected image processing methods (e.g. bilateral ltering)...
-
Wybrane metody przydatne w analizie niezawodności i bezpieczeństwa funkcjonalnego systemów technicznych.
PublicationPrzedstawiono wybrane metody przydatne w analizie niezawodności i bezpieczeństwa funkcjonalnego systemów technicznych takie jak: metoda FMECA (failure mode, effect and criticality analysis, FTA (fault tree analysis, RBD (reliability block diagram) RCM (reliability centered maintenance, LCC (life cycle cost) i PMO (preventive maintenance optimising.
-
Numerical modelling of different airbag folding patterns and their influence on occupant responses in frontal vehicle impact
PublicationThis paper presented a procedure for airbag folding for the application in occupant safety studies and analysed the influence of different airbag folding patterns on the occupant severity in frontal impact. Airbags were folded in two patterns: zig-zag and top-roll, using two folding techniques: Initial Metric Method and Explicit Folding. The explicit folding was found to be more expensive in terms of preparation time. However,...