Search results for: ELEMENTARY GRAPH-SET DESCRIPTOR - Bridge of Knowledge

Search

Search results for: ELEMENTARY GRAPH-SET DESCRIPTOR

Search results for: ELEMENTARY GRAPH-SET DESCRIPTOR

  • Simple Fractal Calculus from Fractal Arithmetic

    Publication

    - REPORTS ON MATHEMATICAL PHYSICS - Year 2018

    Non-Newtonian calculus that starts with elementary non-Diophantine arithmetic operations of a Burgin type is applicable to all fractals whose cardinality is continuum. The resulting definitions of derivatives and integrals are simpler from what one finds in the more traditional literature of the subject, and they often work in the cases where the standard methods fail. As an illustration, we perform a Fourier transform of a real-valued...

    Full text available to download

  • The Mott-Schottky characteristics of microwave pulsed-plasma polymerized allylamine by DEIS analysis

    Open Research Data
    open access

    The dataset contains the results obtained for the Mott-Schottky analysis of the microwave pulsed-plasma polymerized allylamine using the multifrequency perturbation signal with Dynamic Electrochemical Impedance Spectroscopy (DEIS) technique. The results were obtained using the perturbation composed of the elementary signals with a frequency range between...

  • Exploiting multi-interface networks: Connectivity and Cheapest Paths

    Publication

    - WIRELESS NETWORKS - Year 2010

    Let G = (V,E) be a graph which models a set of wireless devices (nodes V) that can communicate by means of multiple radio interfaces, according to proximity and common interfaces (edges E). The problem of switching on (activating) the minimum cost set of interfaces at the nodes in order to guarantee the coverage of G was recently studied. A connection is covered (activated) when the endpoints of the corresponding edge share at...

    Full text to download in external service

  • Weakly convex domination subdivision number of a graph

    Publication

    - FILOMAT - Year 2016

    A set X is weakly convex in G if for any two vertices a; b \in X there exists an ab–geodesic such that all of its vertices belong to X. A set X \subset V is a weakly convex dominating set if X is weakly convex and dominating. The weakly convex domination number \gamma_wcon(G) of a graph G equals the minimum cardinality of a weakly convex dominating set in G. The weakly convex domination subdivision number sd_wcon (G) is the minimum...

    Full text available to download

  • Graphs with equal domination and certified domination numbers

    Publication

    - Opuscula Mathematica - Year 2019

    A setDof vertices of a graphG= (VG,EG) is a dominating set ofGif every vertexinVG−Dis adjacent to at least one vertex inD. The domination number (upper dominationnumber, respectively) ofG, denoted byγ(G) (Γ(G), respectively), is the cardinality ofa smallest (largest minimal, respectively) dominating set ofG. A subsetD⊆VGis calleda certified dominating set ofGifDis a dominating set ofGand every vertex inDhas eitherzero...

    Full text available to download

  • Interval Edge Coloring of Bipartite Graphs with Small Vertex Degrees

    An edge coloring of a graph G is called interval edge coloring if for each v ∈ V(G) the set of colors on edges incident to v forms an interval of integers. A graph G is interval colorable if there is an interval coloring of G. For an interval colorable graph G, by the interval chromatic index of G, denoted by χ'_i(G), we mean the smallest number k such that G is interval colorable with k colors. A bipartite graph G is called (α,β)-biregular...

    Full text to download in external service

  • On the size of identifying codes in triangle-free graphs

    Publication

    - DISCRETE APPLIED MATHEMATICS - Year 2012

    In an undirected graph G, a subset C⊆V(G) such that C is a dominating set of G, and each vertex in V(G) is dominated by a distinct subset of vertices from C, is called an identifying code of G. The concept of identifying codes was introduced by Karpovsky, Chakrabarty and Levitin in 1998. For a given identifiable graph G, let gammaID(G) be the minimum cardinality of an identifying code in G. In this paper, we show that for any connected...

    Full text available to download

  • Generalized Dold sequences on partially-ordered sets

    Publication

    - ELECTRONIC JOURNAL OF COMBINATORICS - Year 2022

    Dold sequences constitute an important class of integer sequences that play an important role in combinatorics, number theory, topology and dynamical systems. We generalize the notion of Dold sequence for the case of partially ordered sets and describe their properties. In particular we give two alternative descriptions of generalized Dold sequences: by some class of elementary sequences as well as by different...

    Full text available to download

  • Total Domination Versus Domination in Cubic Graphs

    Publication

    A dominating set in a graph G is a set S of vertices of G such that every vertex not in S has a neighbor in S. Further, if every vertex of G has a neighbor in S, then S is a total dominating set of G. The domination number,γ(G), and total domination number, γ_t(G), are the minimum cardinalities of a dominating set and total dominating set, respectively, in G. The upper domination number, \Gamma(G), and the upper total domination...

    Full text available to download

  • A Systematic Search for New Coupling Schemes of Cross-Coupled Resonator Bandpass Filters

    Publication

    In this paper, a systematic approach to an extensive search for topologies of cross-coupled filters with generalized Chebyshev response is presented. The technique applies graph theory to find unique, nonisomorphic filter configurations, and tests whether a specific frequency response can be realized in a given set of topologies. The results of the search are then stored in a database of possible filter configurations.

    Full text available to download

  • Certified domination

    Publication

    Imagine that we are given a set D of officials and a set W of civils. For each civil x ∈ W, there must be an official v ∈ D that can serve x, and whenever any such v is serving x, there must also be another civil w ∈ W that observes v, that is, w may act as a kind of witness, to avoid any abuse from v. What is the minimum number of officials to guarantee such a service, assuming a given social network? In this paper, we introduce...

    Full text available to download

  • Conley-Morse graphs for a two-patch vaccination model

    This dataset contains selected results of rigorous numerical computations described in Section 5 of the paper "Rich bifurcation structure in a two-patch vaccination model" by D.H. Knipl, P. Pilarczyk, G. Röst, published in SIAM Journal on Applied Dynamical Systems (SIADS), Vol. 14, No. 2 (2015), pp. 980–1017, doi: 10.1137/140993934.

  • Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph

    Publication
    • M. Lemańska
    • J. A. RODRíGUEZ-VELáZQUEZ
    • R. Trujillo-Rasua

    - FUNDAMENTA INFORMATICAE - Year 2017

    A vertex cover of a graph G = (V, E) is a set X ⊂ V such that each edge of G is incident to at least one vertex of X. The ve cardinality of a vertex cover of G. A dominating set D ⊆ V is a weakly connected dominating set of G if the subgraph G[D]w = (N[D], Ew) weakly induced by D, is connected, where Ew is the set of all edges having at least one vertex in D. The weakly connected domination number γw(G) of G is the minimum cardinality...

    Full text to download in external service

  • GreedyMAX-type Algorithms for the Maximum Independent Set Problem

    Publication

    A maximum independent set problem for a simple graph G = (V,E) is to find the largest subset of pairwise nonadjacent vertices. The problem is known to be NP-hard and it is also hard to approximate. Within this article we introduce a non-negative integer valued functionp defined on the vertex set V(G) and called a potential function of agraph G, while P(G) = max{vinV(G)| p(v)} is called a potential of G. For any graph P(G) <= D(G),...

    Full text to download in external service

  • The Maslov index and the spectral flow—revisited

    Publication

    We give an elementary proof of a celebrated theorem of Cappell, Lee and Miller which relates the Maslov index of a pair of paths of Lagrangian subspaces to the spectral flow of an associated path of self-adjoint first-order operators. We particularly pay attention to the continuity of the latter path of operators, where we consider the gap-metric on the set of all closed operators on a Hilbert space. Finally, we obtain from Cappell,...

    Full text available to download

  • Pawlak's flow graph extensions for video surveillance systems

    Publication

    The idea of the Pawlak's flow graphs is applicable to many problems in various fields related to decision algorithms or data mining. The flow graphs can be used also in the video surveillance systems. Especially in distributed multi-camera systems which are problematic to be handled by human operators because of their limited perception. In such systems automated video analysis needs to be implemented. Important part of this analysis...

    Full text to download in external service

  • Characterizing the Performance of <span class="sc">xor</span> Games and the Shannon Capacity of Graphs

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2014

    In this Letter we give a set of necessary and sufficient conditions such that quantum players of a two-party xor game cannot perform any better than classical players. With any such game, we associate a graph and examine its zero-error communication capacity. This allows us to specify a broad new class of graphs for which the Shannon capacity can be calculated. The conditions also enable the parametrization of new families of games...

    Full text to download in external service

  • Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks

    Publication

    - Electronics - Year 2022

    Dominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...

    Full text available to download

  • Parallel immune system for graph coloring

    Publication

    - Year 2008

    This paper presents a parallel artificial immune system designed forgraph coloring. The algorithm is based on the clonal selection principle. Each processor operates on its own pool of antibodies and amigration mechanism is used to allow processors to exchange information. Experimental results show that migration improves the performance of the algorithm. The experiments were performed using a high performance cluster on a set...

    Full text to download in external service

  • Complexity Issues on of Secondary Domination Number

    Publication

    - ALGORITHMICA - Year 2023

    In this paper we study the computational complexity issues of the problem of secondary domination (known also as (1, 2)-domination) in several graph classes. We also study the computational complexity of the problem of determining whether the domination and secondary domination numbers are equal. In particular, we study the influence of triangles and vertices of degree 1 on these numbers. Also, an optimal algorithm for finding...

    Full text available to download

  • The Potential of Greed for Independence

    Publication

    - JOURNAL OF GRAPH THEORY - Year 2012

    The well-known lower bound on the independence number of a graph due to Caro and Wei can be established as a performance guarantee of two natural and simple greedy algorithms or of a simple randomized algorithm. We study possible generalizations and improvements of these approaches using vertex weights and discuss conditions on so-called potential functions p(G) : V(G) -&gt; N_0 defined on the vertex set of a graph G for which suitably...

    Full text to download in external service

  • Algorithms for testing security in graphs

    In this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| &gt;= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...

    Full text available to download

  • Graph security testing

    Set S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...

    Full text to download in external service

  • Generalized Gradient Equivariant Multivalued Maps, Approximation and Degree

    Publication

    Consider the Euclidean space Rn with the orthogonal action of a compact Lie group G. We prove that a locally Lipschitz G-invariant mapping f from Rn to R can be uniformly approximated by G-invariant smooth mappings g in such a way that the gradient of g is a graph approximation of Clarke’s generalized gradient of f . This result enables a proper development of equivariant gradient degree theory for a class of set-valued gradient...

    Full text available to download

  • Bipartite theory of graphs: outer-independent domination

    Publication

    - NATIONAL ACADEMY SCIENCE LETTERS-INDIA - Year 2015

    Let $G = (V,E)$ be a bipartite graph with partite sets $X$ and $Y$. Two vertices of $X$ are $X$-adjacent if they have a common neighbor in $Y$, and they are $X$-independent otherwise. A subset $D \subseteq X$ is an $X$-outer-independent dominating set of $G$ if every vertex of $X \setminus D$ has an $X$-neighbor in $D$, and all vertices of $X \setminus D$ are pairwise $X$-independent. The $X$-outer-independent domination number...

    Full text to download in external service

  • Conley-Morse graphs for a population model with harvesting. Case Hj-Se: Harvesting juveniles only, equal survival rates of juveniles and adults

    This dataset contains selected results of rigorous numerical computations conducted in the framework of the research described in the paper "Global dynamics in a stage-structured discrete population model with harvesting" by E. Liz and P. Pilarczyk: Journal of Theoretical Biology, Vol. 297 (2012), pp. 148–165, doi: 10.1016/j.jtbi.2011.12.012.

  • Conley-Morse graphs for a population model with harvesting. Case He-Se: Equal harvesting and equal survival rates of juveniles and adults

    This dataset contains selected results of rigorous numerical computations conducted in the framework of the research described in the paper "Global dynamics in a stage-structured discrete population model with harvesting" by E. Liz and P. Pilarczyk: Journal of Theoretical Biology, Vol. 297 (2012), pp. 148–165, doi: 10.1016/j.jtbi.2011.12.012.

  • Conley-Morse graphs for a population model with harvesting. Case Hj-S1: Harvesting juveniles only, survival rates of juveniles and adults add up to 1

    This dataset contains selected results of rigorous numerical computations conducted in the framework of the research described in the paper "Global dynamics in a stage-structured discrete population model with harvesting" by E. Liz and P. Pilarczyk: Journal of Theoretical Biology, Vol. 297 (2012), pp. 148–165, doi: 10.1016/j.jtbi.2011.12.012.

  • Conley-Morse graphs for a population model with harvesting. Case Ha-S1: Harvesting adults only, survival rates of juveniles and adults add up to 1

    This dataset contains selected results of rigorous numerical computations conducted in the framework of the research described in the paper "Global dynamics in a stage-structured discrete population model with harvesting" by E. Liz and P. Pilarczyk: Journal of Theoretical Biology, Vol. 297 (2012), pp. 148–165, doi: 10.1016/j.jtbi.2011.12.012.

  • Conley-Morse graphs for a population model with harvesting. Case Ha-Se: Harvesting adults only, equal survival rates of juveniles and adults

    This dataset contains selected results of rigorous numerical computations conducted in the framework of the research described in the paper "Global dynamics in a stage-structured discrete population model with harvesting" by E. Liz and P. Pilarczyk: Journal of Theoretical Biology, Vol. 297 (2012), pp. 148–165, doi: 10.1016/j.jtbi.2011.12.012.

  • Conley-Morse graphs for a population model with harvesting. Case He-S1: Equal harvesting of juveniles and adults, survival rates of juveniles and adults add up to 1

    This dataset contains selected results of rigorous numerical computations conducted in the framework of the research described in the paper "Global dynamics in a stage-structured discrete population model with harvesting" by E. Liz and P. Pilarczyk: Journal of Theoretical Biology, Vol. 297 (2012), pp. 148–165, doi: 10.1016/j.jtbi.2011.12.012.

  • T-colorings, divisibility and circular chromatic number

    Let T be a T-set, i.e., a finite set of nonnegative integers satisfying 0 ∈ T, and G be a graph. In the paper we study relations between the T-edge spans espT (G) and espd⊙T (G), where d is a positive integer and d ⊙ T = {0 ≤ t ≤ d (max T + 1): d |t ⇒ t/d ∈ T} . We show that espd⊙T (G) = d espT (G) − r, where r, 0 ≤ r ≤ d − 1, is an integer that depends on T and G. Next we focus on the case T = {0} and show that espd⊙{0} (G) =...

    Full text available to download

  • Bounds on the cover time of parallel rotor walks

    Publication

    - JOURNAL OF COMPUTER AND SYSTEM SCIENCES - Year 2016

    The rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node successively propagates walkers visiting it along its outgoing arcs in round-robin fashion, according to a fixed ordering. We consider...

    Full text available to download

  • Computer experiments with a parallel clonal selection algorithm for the graph coloring problem

    Publication

    - Year 2008

    Artificial immune systems (AIS) are algorithms that are based on the structure and mechanisms of the vertebrate immune system. Clonal selection is a process that allows lymphocytes to launch a quick response to known pathogens and to adapt to new, previously unencountered ones. This paper presents a parallel island model algorithm based on the clonal selection principles for solving the Graph Coloring Problem. The performance of...

    Full text to download in external service

  • Reliability of production machines in the bakery industry – theoretical and practical issues

    Publication

    The aim of the article is to present probabilistic models, which were then used to analyze the reliability of production machines in the baking industry. The author conducted research in the period from January 2, 2016 to December 31, 2018 regarding the measurement of reliability of a traditional production system based on a probabilistic concept. Due to the limited scope of the article, reliability calculations for a set of thermo-oil...

    Full text to download in external service

  • On the partition dimension of trees

    Publication

    - DISCRETE APPLIED MATHEMATICS - Year 2014

    Given an ordered partition Π={P1,P2,…,Pt} of the vertex set V of a connected graph G=(V,E), the partition representation of a vertex v∈V with respect to the partition Π is the vector r(v|Π)=(d(v,P1),d(v,P2),…,d(v,Pt)), where d(v,Pi) represents the distance between the vertex vv and the set Pi. A partition Π of V is a resolving partition of G if different vertices of G have different partition representations, i.e., for every...

    Full text available to download

  • KOALA Graph Theory Internet Service

    Publication

    KOALA has been created with the idea of C++ library templates, implementing a broad set of procedures in the fields of algorithmic graph theory and network problems in discreate optimization. During the C2NIWA project, a library has been greatly ectended, the code refactored and enclosed with the internet service available in the public repository of thr project. Today it contains interconnected educational materials in the form...

    Full text available to download

  • New potential functions for greedy independence and coloring

    Publication

    - DISCRETE APPLIED MATHEMATICS - Year 2015

    A potential function $f_G$ of a finite, simple and undirected graph $G=(V,E)$ is an arbitrary function $f_G : V(G) \rightarrow \mathbb{N}_0$ that assigns a nonnegative integer to every vertex of a graph $G$. In this paper we define the iterative process of computing the step potential function $q_G$ such that $q_G(v)\leq d_G(v)$ for all $v\in V(G)$. We use this function in the development of new Caro-Wei-type and Brooks-type...

    Full text available to download

  • Separability Assessment of Selected Types of Vehicle-Associated Noise

    Music Information Retrieval (MIR) area as well as development of speech and environmental information recognition techniques brought various tools in-tended for recognizing low-level features of acoustic signals based on a set of calculated parameters. In this study, the MIRtoolbox MATLAB tool, designed for music parameter extraction, is used to obtain a vector of parameters to check whether they are suitable for separation of...

    Full text to download in external service

  • Global edge alliances in graphs

    In the paper we introduce and study a new problem of finding a minimum global edge alliance in a graph which is related to the global defensive alliance (Haynes et al., 2013; Hedetniemi, 2004) and the global defensive set (Lewoń et al., 2016). We proved the NP-completeness of the global edge alliance problem for subcubic graphs and we constructed polynomial time algorithms for trees. We found the exact values of the size of the...

    Full text available to download

  • Selection of effective cocrystals former for dissolution rate improvement of active pharmaceutical ingredients based on lipoaffinity index

    Publication

    New theoretical screening procedure was proposed for appropriate selection of potential cocrystal formers possessing the ability of enhancing dissolution rates of drugs. The procedure relies on the training set comprising 102 positive and 17 negative cases of cocrystals found in the literature. Despite the fact that the only available data were of qualitative character, performed statistical analysis using binary classification...

    Full text to download in external service

  • Global defensive secure structures

    Publication

    Let S ⊂ V (G) for a given simple non-empty graph G. We define for any nonempty subset X of S the predicate SECG,S(X) = true iff |NG[X]∩S| ≥ |NG[X]\S|. Let H be a non-empty family of graphs such that for each vertex v ∈ V (G) there is a subgraph H of G containing v and isomorphic to a member of H. We introduce the concept of H-alliance extending the concept of global defensive secure structures. By an H-alliance in a graph G we...

    Full text to download in external service

  • On the super domination number of lexicographic product graphs

    Publication

    - DISCRETE APPLIED MATHEMATICS - Year 2019

    The neighbourhood of a vertexvof a graphGis the setN(v) of all verticesadjacent tovinG. ForD⊆V(G) we defineD=V(G)\D. A setD⊆V(G) is called a super dominating set if for every vertexu∈D, there existsv∈Dsuch thatN(v)∩D={u}. The super domination number ofGis theminimum cardinality among all super dominating sets inG. In this article weobtain closed formulas and tight bounds for the super dominating number oflexicographic product...

    Full text available to download

  • Analysis of Impulse Responses Measured in Motion in a Towing Tank

    Publication

    - Electronics - Year 2022

    The growing interest in developing autonomous underwater vehicles (AUVs) and creating underwater sensor networks (USNs) has led to a need for communication tools in underwater environments. For obvious reasons, wireless means of communication are the most desirable. However, conducting research in real conditions is troublesome and costly. Moreover, as hydroacoustic propagation conditions change very significantly, even during...

    Full text available to download

  • Analysis of Impulse Responses Measured in Motion in a Towing Tank

    Publication

    - Year 2023

    The growing interest in developing autonomous underwater vehicles (AUVs) and creating underwater sensor networks (USNs) has led to a need for communication tools in underwater environments. For obvious reasons, wireless means of communication are the most desirable. However, conducting research in real conditions is troublesome and costly. Moreover, as hydroacoustic propagation conditions change very significantly, even during...

    Full text to download in external service

  • Comparing Phylogenetic Trees by Matching Nodes Using the Transfer Distance Between Partitions

    Publication

    - JOURNAL OF COMPUTATIONAL BIOLOGY - Year 2017

    Ability to quantify dissimilarity of different phylogenetic trees describing the relationship between the same group of taxa is required in various types of phylogenetic studies. For example, such metrics are used to assess the quality of phylogeny construction methods, to define optimization criteria in supertree building algorithms, or to find horizontal gene transfer (HGT) events. Among the set of metrics described so far in...

    Full text to download in external service

  • A new anisotropic bending model for nonlinear shells: Comparison with existing models and isogeometric finite element implementation

    Publication

    A new nonlinear hyperelastic bending model for shells formulated directly in surface form is presented, and compared to four existing prominent bending models. Through an essential set of elementary nonlinear bending test cases, the membrane and bending stresses of each model are examined analytically. Only the proposed bending model passes all the test cases, while the other bending models either fail or only pass the test cases for...

    Full text to download in external service

  • On coertia and inertia in aspects of Natanson’s nonlinear extended thermodynamics

    Publication
    • J. Badur
    • P. Ziółkowski
    • T. Kowalczyk
    • S. Gotzman
    • D. Sławiński
    • T. Ochrymiuk
    • M. D. Lemański
    • R. Hyrzyński
    • B. Kraszewski
    • M. Bryk... and 2 others

    - Year 2020

    In this article, the previously underrepresented contributions of Natanson to the field of thermodynamics have been presented. In order to identify a source of irreversibility at Nature, Natanson introduced the concept of Coertia, which is similar to inertia. Natanson’s Coertia is a fundamental property of space that is responsible for every irreversible phenomena in matter, as well as in the electromagnetic and gravitational fields....

    Full text available to download

  • Stereo vision with Equal Baseline Multiple Camera Set (EBMCS) for obtaining depth maps of plants

    This paper presents a method of improving the estimation of distances between an autonomous harvesting robot and plants with ripe fruits by using the vision system based on five cameras. The system is called Equal Baseline Multiple Camera Set (EBMCS). EBMCS has some features of a camera matrix and a camera array. EBMCS is regarded as a set of stereo cameras for estimating distances by obtaining disparity maps and depth maps. This...

    Full text to download in external service

  • Modele i algorytmy dla grafowych struktur defensywnych

    Publication

    - Year 2023

    W niniejszej pracy przeprowadzono analizę złożoności istnienia struktur defensywnych oraz równowag strategicznych w grafach. W przypadku struktur defensywnych badano modele koalicji defensywnych, zbiorów defensywnych i koalicji krawędziowych – każdy z nich w wersji globalnej, tj. z wymogiem dominacji całego grafu. W przypadku modeli równowagi strategicznej badano równowagę strategiczną koalicji defensywnych, równowagę strategiczną...

    Full text available to download