Search results for: INDEPENDENCE NUMBER, GREEDY ALGORITHM, GRAPH HARD-TO-PROCESS - Bridge of Knowledge

Search

Search results for: INDEPENDENCE NUMBER, GREEDY ALGORITHM, GRAPH HARD-TO-PROCESS

Filters

total: 1224
filtered: 1064

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: INDEPENDENCE NUMBER, GREEDY ALGORITHM, GRAPH HARD-TO-PROCESS

  • Graph classes generated by Mycielskians

    Publication

    - Discussiones Mathematicae Graph Theory - Year 2020

    In this paper we use the classical notion of weak Mycielskian M'(G) of a graph G and the following sequence: M'_{0}(G) =G, M'_{1}(G)=M'(G), and M'_{n}(G)=M'(M'_{n−1}(G)), to show that if G is a complete graph oforder p, then the above sequence is a generator of the class of p-colorable graphs. Similarly, using Mycielskian M(G) we show that analogously defined sequence is a generator of the class consisting of graphs for which the...

    Full text available to download

  • Novel bio-based thermoplastic poly(ether-urethane)s. Correlations between the structure, processing and properties

    Publication

    - POLYMER - Year 2019

    The main purpose of this work was to analyze the effect of the number of unreacted isocyanate groups and the [NCO]/[OH] molar ratio during the chain extension of a prepolymer during the polymerization process on the structure, processing and selected properties of thermoplastic poly(ether-urethane)s. Three series of novel thermoplastic polyurethanes were obtained via a prepolymer route. Three prepolymers were synthesized from diisocyanate...

    Full text to download in external service

  • Termination functions for evolutionary path planning algorithm

    Publication

    In this paper a study of termination functions (stop criterion) for evolutionary path planning algorithm is presented. Tested algorithm is used to determine close to optimal ship paths in collision avoidance situation. For this purpose a path planning problem is defined. A specific structure of the individual path and fitness function is presented. For the simulation purposes a close to real tested environment is created. Five...

  • Scanning networks with cactus topology

    Publication
    • Ł. Wrona

    - Year 2008

    The family of Pursuit and Evasion problems is widelystudied because of its numerous practical applications,ranging from communication protocols to cybernetic andphysical security. Calculating the search number of a graphis one of most commonly analyzed members of this problemfamily. The search number is the smallest number of mobileagents required to capture an invisible and arbitrarily fastfugitive, for instance piece of malicious...

  • Surface Texture Analysis of Hardened Shafts after Ceramic Ball Burnishing

    Publication

    This article represents the results of testing the surface condition of shafts manufactured by the burnishing process. The shafts with a hardness of approximately 62 HRC (Rockwell C). were burnished with a ceramic ball (Si3N4), where the force range was controlled by the means of a hydraulic system. The machining process consisted of hard turning shafts with cubic boron nitride (CBN) inserts, followed by burnishing with the use...

    Full text available to download

  • Hat problem on odd cycles

    The topic is the hat problem in which each of n players is randomly fitted with a blue or red hat. Then everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. The team wins if at least one player guesses his hat color correctly, and no one guesses his hat color wrong; otherwise the team loses. The aim is to maximize the probability of a win. In this version every player can...

    Full text to download in external service

  • Application of Doubly Connected Dominating Sets to Safe Rectangular Smart Grids

    Publication

    - ENERGIES - Year 2022

    Smart grids, together with the Internet of Things, are considered to be the future of the electric energy world. This is possible through a two-way communication between nodes of the grids and computer processing. It is necessary that the communication is easy and safe, and the distance between a point of demand and supply is short, to reduce the electricity loss. All these requirements should be met at the lowest possible cost....

    Full text available to download

  • Interoperability Constraints in Service Selection Algorithms

    Publication

    - Year 2012

    In Service Oriented Architecture, composite applications are developed by integration of existing, atomic services that may be available in alternative versions realizing the same functionality but having different Quality of Service (QoS) attributes. The development process requires effective service selection algorithms that balance profits and constraints of QoS attributes. Additionally, services operate in a heterogeneous environment,...

  • Reduced-Cost Design Optimization of High-Frequency Structures Using Adaptive Jacobian Updates

    Publication

    - Year 2019

    Electromagnetic (EM) analysis is the primary tool utilized in the design of high-frequency structures. In vast majority of cases, simpler models (e.g., equivalent networks or analytical ones) are either not available or lack accuracy: they can only be used to yield initial designs that need to be further tuned. Consequently, EM-driven adjustment of geometry and/or material parameters of microwave and antenna components is a necessary...

    Full text available to download

  • Multi-Criteria Approach in Multifunctional Building Design Process

    Publication

    - Year 2017

    The paper presents new approach in multifunctional building design process. Publication defines problems related to the design of complex multifunctional buildings. Currently, contemporary urban areas are characterized by very intensive use of space. Today, buildings are being built bigger and contain more diverse functions to meet the needs of a large number of users in one capacity. The trends show the need for recognition of...

    Full text to download in external service

  • METHOD OF ROUTING SHIPS SAILING IN DEDICATED ENVIRONMENT

    Publication

    The method for determining the suboptimal route of sailing vessels operating in a restricted area of the sea are proposed in the paper. The dynamics of the environment including weather conditions and speed characteristics of ships sailing are considered. As optimiza-tion criterion, measure sailing time T, and the number of maneuvers performed ω, are taken into account. An heuristic algorithm, and the appropriate application routing...

    Full text available to download

  • The influence of drying parameters on wood properties

    The influence of drying conditions on wood properties is presented. The classical approach was used to determine energetic effects (cutting forces and cutting power) of wood sawing process on the basis of the wood specific cutting resistance, material constant. Before mashining wood material (soft and hard) was dryied at various conditions using air at 25oC, air-steam meaxture at 80oC and steam at 110oC.

  • Total Domination Versus Domination in Cubic Graphs

    Publication

    A dominating set in a graph G is a set S of vertices of G such that every vertex not in S has a neighbor in S. Further, if every vertex of G has a neighbor in S, then S is a total dominating set of G. The domination number,γ(G), and total domination number, γ_t(G), are the minimum cardinalities of a dominating set and total dominating set, respectively, in G. The upper domination number, \Gamma(G), and the upper total domination...

    Full text available to download

  • Bipartite theory of graphs: outer-independent domination

    Publication

    - NATIONAL ACADEMY SCIENCE LETTERS-INDIA - Year 2015

    Let $G = (V,E)$ be a bipartite graph with partite sets $X$ and $Y$. Two vertices of $X$ are $X$-adjacent if they have a common neighbor in $Y$, and they are $X$-independent otherwise. A subset $D \subseteq X$ is an $X$-outer-independent dominating set of $G$ if every vertex of $X \setminus D$ has an $X$-neighbor in $D$, and all vertices of $X \setminus D$ are pairwise $X$-independent. The $X$-outer-independent domination number...

    Full text to download in external service

  • Necessary and Sufficient Condition for State-Independent Contextual Measurement Scenarios

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2014

    The problem of identifying measurement scenarios capable of revealing state-independent contextuality in a given Hilbert space dimension is considered. We begin by showing that for any given dimension d and any measurement scenario consisting of projective measurements, (i) the measure of contextuality of a quantum state is entirely determined by its spectrum, so that pure and maximally mixed states represent the two extremes...

    Full text to download in external service

  • Minimising the Churn Out of the Service by Using a Fairness Mechanism

    Publication

    The paper proposes an algorithm of bandwidth distribution, ensuring fairness to end-users in computer networks. The proposed algorithm divides users into satisfied and unsatisfied users. It provides fairness in terms of quality of experience (QoE) for satisfied users and quality of service (QoS) for unsatisfied users. In this paper, we present detailed comparisons relevant to service providers to show the advantages of the proposed...

    Full text to download in external service

  • RSS-based DoA Estimation Using ESPAR Antennas and Interpolated Radiation Patterns

    In this letter, it is shown how an algorithm, which employs received signal strength (RSS) values in order to estimate direction-of-arrival (DoA) of impinging signals in wireless sensor network (WSN) nodes equipped with electronically steerable parasitic array radiator (ESPAR) antennas, can easily be improved by applying an interpolation algorithm to radiation patterns recorded in the calibration phase of the DoA estimation process....

    Full text available to download

  • Theoretical modelling of efficient fire safety water networks by certified domination

    Publication

    - Scientific Reports - Year 2024

    This paper explores a new way of designing water supply networks for fire safety using ideas from graph theory, focusing on a method called certified domination. Ensuring a good water supply is crucial for fire safety in communities, this study looks at the rules and problems in Poland for how much water is needed to fight fires in different areas and how this can be achieved at a lowest possible cost. We present a way to plan...

    Full text available to download

  • T-colorings, divisibility and circular chromatic number

    Let T be a T-set, i.e., a finite set of nonnegative integers satisfying 0 ∈ T, and G be a graph. In the paper we study relations between the T-edge spans espT (G) and espd⊙T (G), where d is a positive integer and d ⊙ T = {0 ≤ t ≤ d (max T + 1): d |t ⇒ t/d ∈ T} . We show that espd⊙T (G) = d espT (G) − r, where r, 0 ≤ r ≤ d − 1, is an integer that depends on T and G. Next we focus on the case T = {0} and show that espd⊙{0} (G) =...

    Full text available to download

  • Collaborative Exploration of Trees by Energy-Constrained Mobile Robots

    Publication

    - THEORY OF COMPUTING SYSTEMS - Year 2018

    We study the problem of exploration of a tree by mobile agents (robots) that have limited energy. The energy constraint bounds the number of edges that can be traversed by a single agent. We use a team of agents to collectively explore the tree and the objective is to minimize the size of this team. The agents start at a single node, the designated root of the tree and the height of the tree is assumed to be less than the energy...

    Full text to download in external service

  • Comparison of the Efficiency of Turbo Codes with Mechanisms of Reducing the Number of Iterations

    The paper presents the construction of encoders and decoders turbo codes with different number of states. Simulation results of the transmission quality of the turbo codes were presented. Decoders for turbo codes have worked with a fixed number of iterations and with the mechanisms reducing the number of iterations. Data were transmitted in Outdoor to Indoor & Pedestrian B environment for data rate 384 kbps. The SOVA algorithm...

  • Combining Road Network Data from OpenStreetMap with an Authoritative Database

    Computer modeling of road networks requires detailed and up-to-date dataset. This paper proposes a method of combining authoritative databases with OpenStreetMap (OSM) system. The complete route is established by finding paths in the graph constructed from partial data obtained from OSM. In order to correlate data from both sources, a method of coordinate conversion is proposed. The algorithm queries road data from OSM and provides...

    Full text available to download

  • Optimization algorithm and filtration using the adaptive TIN model at the stage of initial processing of the ALS point cloud

    Publication

    - CANADIAN JOURNAL OF REMOTE SENSING - Year 2011

    Airborne laser scanning (ALS) provides survey results in the form of a point cloud. The ALS point cloud is a source of data used primarily for constructing a digital terrain model (DTM). To generate a DTM, the set of ALS observations must be first subjected to the point cloud processing methodology. A standard methodology is composed of the following stages: acquisition of the ALS data, initial processing (including filtration),...

    Full text to download in external service

  • Dynamical description of quantum computing: generic nonlocality of quantumnoise

    Publication

    We develop a dynamical non-Markovian description of quantum computing in the weak-coupling limit, in the lowest-order approximation. We show that the long-range memory of the quantum reservoir (such as the 1/t4 one exhibited by electromagnetic vacuum) produces a strong interrelation between the structure of noise and the quantum algorithm, implying nonlocal attacks of noise. This shows that the implicit assumption of quantum error...

    Full text available to download

  • A stochastic approach for the solution of single and multi – objective optimisation problems of biological processes in sequencing batch reactor

    This paper investigates the impact of implementing single and multi-optimisation solutions on the biological treatment process in a sequencing batch reactor (SBR). The research is based on a case study of the water resource recovery facility (WRRF) in Swarzewo, Northern Poland. The paper introduces the adaptive extremum seeking control (ESC) method for dissolved oxygen (DO) concentration control and places it in a layered control structure....

    Full text to download in external service

  • Restricted open shop scheduling

    In the real applications the open shop scheduling models often require some additional constraints and adequate models. We concern the restrictions in the open shop scheduling related to an instance of the problem and to a feasible solution. Precisely, we require that each jobs consists of the bounded number of operations and each machine has a bounded load (i.e., the total number of operations executed on this machine in a schedule)....

    Full text to download in external service

  • Efektywna metoda wyznaczania trasy statków żaglowych

    Publication

    - Year 2016

    Zaproponowano metodę wyznaczania suboptymalnej trasy statków żaglowych poruszających się w ograniczonym akwenie morskim. Uwzględniono przy tym dynamikę tego środowiska w tym warunki pogodowe oraz charakterystyki prędkościowe statków żaglowych. Jako kryterium optymalizacji przyjęto czas żeglugi T oraz liczbę wykonanych manewrów ω. Zaprojektowano heurystyczny algorytm oraz odpowiednią aplikację wyznaczania trasy dla ustalonych punktów...

    Full text available to download

  • Multi-fidelity EM simulations and constrained surrogate modelling for low-cost multi-objective design optimisation of antennas

    Publication

    In this study, a technique for low-cost multi-objective design optimisation of antenna structures has been proposed. The proposed approach is an enhancement of a recently reported surrogate-assisted technique exploiting variable-fidelity electromagnetic (EM) simulations and auxiliary kriging interpolation surrogate, the latter utilised to produce the initial approximation of the Pareto set. A bottleneck of the procedure for higher-dimensional...

    Full text to download in external service

  • Expedited Design Closure of Antenna Input Characteristics by Trust Region Gradient Search and Principal Component Analysis

    Publication

    - IEEE Access - Year 2020

    Optimization-based parameter tuning has become an inherent part of contemporary antenna design process. For the sake of reliability, it is typically conducted at the level of full-wave electromagnetic (EM) simulation models. This may incur considerable computational expenses depending on the cost of an individual EM analysis, the number of adjustable variables, the type of task (local, global, single-/multi-objective optimization),...

    Full text available to download

  • Organizacja systemu opieki nad seniorami wyzwaniem dla samorządów lokalnych

    A significant part of the activities undertaken so far under the senior policy, also at the local level, have been focused on seniors’ social (physical and educational) activation. The growing number of the oldest seniors, with limited independence, living alone in single‑person households, away from their families, will force the policy priorities to be reoriented in such a way as to develop efforts to provide different types...

    Full text available to download

  • Method of evaluation of lubricating ability of lube oils and fuels in energetistic formulation

    Publication

    The paper presents an interpretation of operation of a boundary layer of a lubricating medium. A model of the homogeneous Poisson process has been proposed to assess the deterioration process of the layer's operation. The assessment considers the original interpretation of operation of a boundary layer, as a lubricity measure of a boundary layer of any lubricant. In the submitted proposal the operation of a boundary layer is understood...

    Full text available to download

  • Self-Adaptive Mesh Generator for Global Complex Roots and Poles Finding Algorithm

    In any global method of searching for roots and poles, increasing the number of samples increases the chances of finding them precisely in a given area. However, the global complex roots and poles finding algorithm (GRPF) (as one of the few) has direct control over the accuracy of the results. In addition, this algorithm has a simple condition for finding all roots and poles in a given area: it only requires a sufficiently dense...

    Full text to download in external service

  • Polyhedral Ramsey Numbers

    Given two polygons or polyhedrons P1 and P2, we can transform these figures to graphs G1 and G2, respectively. The polyhedral Ramsey number Rp(G1,G2) is the smallest integer n such that every graph, which represents polyhedron on n vertices either contains a copy of G1 or its complement contains a copy of G2. Using a computer search together with some theoretical results we have established some polyhedral Ramsey numbers, for example...

  • A Critical Reanalysis of Uncontrollable Washboarding Phenomenon in Metal Band Sawing

    Publication

    - Materials - Year 2020

    The article analyzes the cutting process of hard bars. Investigations conducted in industrial conditions demonstrated the presence of surface errors in the machined workpieces in the form of washboard patterns. The purpose of this study was to analyze the results of cutting on band sawing machines with different band saw blades. The cutting processes were conducted on three different horizontal band sawing machine types. Analyzed...

    Full text available to download

  • Separability Assessment of Selected Types of Vehicle-Associated Noise

    Music Information Retrieval (MIR) area as well as development of speech and environmental information recognition techniques brought various tools in-tended for recognizing low-level features of acoustic signals based on a set of calculated parameters. In this study, the MIRtoolbox MATLAB tool, designed for music parameter extraction, is used to obtain a vector of parameters to check whether they are suitable for separation of...

    Full text to download in external service

  • Fuzzy Methods and Models for a Team-Building Process

    Publication

    - Year 2014

    This chapter contains an introduction to fuzzy-logic model-based approaches for a team-building process. Such appraches allow extending typical recruiting practice and selection processes to enable a wider and more precise assessment of a new team and/or existing team members, taking into account both their hard and soft skills. Moreover, as effectiveness of teams depends on the interpersonal skills and emotional intelligence...

  • Parallel Background Subtraction in Video Streams Using OpenCL on GPU Platforms

    Publication

    - Year 2014

    Implementation of the background subtraction algorithm using OpenCL platform is presented. The algorithm processes live stream of video frames from the surveillance camera in on-line mode. Processing is performed using a host machine and a parallel computing device. The work focuses on optimizing an OpenCL algorithm implementation for GPU devices by taking into account specific features of the GPU architecture, such as memory access,...

    Full text to download in external service

  • Graphs with equal domination and certified domination numbers

    Publication

    - Opuscula Mathematica - Year 2019

    A setDof vertices of a graphG= (VG,EG) is a dominating set ofGif every vertexinVG−Dis adjacent to at least one vertex inD. The domination number (upper dominationnumber, respectively) ofG, denoted byγ(G) (Γ(G), respectively), is the cardinality ofa smallest (largest minimal, respectively) dominating set ofG. A subsetD⊆VGis calleda certified dominating set ofGifDis a dominating set ofGand every vertex inDhas eitherzero...

    Full text available to download

  • Weldability of S500MC Steel in Underwater Conditions

    Wet welding with the use of covered electrodes is one of the methods of underwater welding. This method is the oldest, the most economic and the most versatile. The main difficulties during underwater wet welding are: high cooling rates of the joint, the presence of hydrogen in the arc area and formation of hard martensitic structure in the weld. These phenomena are often accompanied by porosity of welds and large number of spatters,...

    Full text available to download

  • Optimal shape design of multi-element trawl-doors using local surrogate models

    Publication

    - Journal of Computational Science - Year 2015

    Trawl-doors have a large influence on the fuel consumption of fishing vessels. Design and optimiza-tion of trawl-doors using computational models are a key factor in minimizing the fuel consump-tion. This paper presents an optimization algorithm for the shape design of trawl-door shapes using computational fluid dynamic (CFD) models. Accurate CFD models are computationally expensive. Therefore, the direct use of traditional optimization...

    Full text to download in external service

  • Taking advantage of symmetries: Gathering of many asynchronous oblivious robots on a ring

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2010

    One of the recently considered models of robot-based computing makes use of identical, memoryless mobile units placed in nodes of an anonymous graph. The robots operate in Look-Compute-Move cycles; in one cycle, a robot takes a snapshot of the current configuration (Look), takes a decision whether to stay idle or to move to one of the nodes adjacent to its current position (Compute), and in the latter case makes an instantaneous...

    Full text available to download

  • Systemic analysis of a manufacturing process based on a small scale bakery

    Publication

    - Quality and Quantity - Year 2023

    The main aim of the article is to present two new innovative concepts of reliability of a functioning manufacturing system in the process of making bread in small-scale bakeries. Reliability is understood as one of the representations of an operator acting on specifc streams in time to - t. One of these represents the global reliability of a system as a function of parallel action of all the streams of the system in time to to...

    Full text to download in external service

  • A method for counting people attending large public events

    The algorithm for people counting in crowded scenes, based on the idea of virtual gate which uses optical flow method is presented. The concept and practical application of the developed algorithm under real conditions is depicted. The aim of the work is to estimate the number of people passing through entrances of a large sport hall. The most challenging problem was the unpredicted behavior of people while entering the building....

    Full text available to download

  • Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream

    A background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....

    Full text to download in external service

  • Graph security testing

    Set S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...

    Full text to download in external service

  • Design space reduction and variable-fidelity EM simulations for feasible Pareto optimization of antennas

    Publication

    A computationally efficient procedure for multi-objective optimization of antenna structures is presented. In our approach, a response surface approximation (RSA) model created from sampled coarse-discretization EM antenna simulations is utilized to yield an initial set of Pareto-optimal designs using a multi-objective evolutionary algorithm. The final Pareto front representation for the high-fidelity model is obtained using surrogate-based...

  • Experimental research on evolutionary path planning algorithm with fitness function scaling for collision scenarios

    Publication

    - Year 2011

    This article presents typical ship collision scenarios, simulated using the evolutionary path planning system and analyses the impact of the fitness function scaling on the quality of the solution. The function scaling decreases the selective pressure, which facilitates leaving the local optimum in the calculation process and further exploration of the solution space. The performed investigations have proved that the use of scaling...

    Full text to download in external service

  • Multi-fidelity aerodynamic design trade-off exploration using point-by-point Pareto set identification

    Publication

    - AEROSPACE SCIENCE AND TECHNOLOGY - Year 2018

    Aerodynamic design is inherently a multi-objective optimization (MOO) problem. Determining the best possible trade-offs between conflicting aerodynamic objectives can be computationally challenging when carried out directly at the level of high-fidelity computational fluid dynamics simulations. This paper presents a computationally cheap methodology for exploration of aerodynamic design trade-offs. In particular, point-by-point...

    Full text to download in external service

  • Efficient uncertainty quantification using sequential sampling-based neural networks

    Publication

    - Year 2023

    Uncertainty quantification (UQ) of an engineered system involves the identification of uncertainties, modeling of the uncertainties, and the forward propagation of the uncertainties through a system analysis model. In this work, a novel surrogate-based forward propagation algorithm for UQ is proposed. The proposed algorithm is a new and unique extension of the recent efficient global optimization using neural network (NN)-based...

    Full text to download in external service

  • Reduced-cost optimization-based miniaturization of microwave passives by multi-resolution EM simulations for internet of things and space-limited applications

    Publication

    Stringent performance specifications along with constraints imposed on physical dimensions, make the design of contemporary microwave components a truly onerous task. In recent years, the latter demand has been growing in importance, with the innovative application areas such as Internet of Things coming into play. The need to employ full-wave electromagnetic (EM) simu-lations for response evaluation, reliable yet CPU heavy, only...

    Full text available to download