Search results for: GRAPH CHROMATIC GAME - Bridge of Knowledge

Search

Search results for: GRAPH CHROMATIC GAME

Search results for: GRAPH CHROMATIC GAME

  • An approximation algorithm for maximum P3-packing in subcubic graphs

    Publication

    W pracy podano algorytm 4/3-przyliżony dla trudnego obliczeniowo problemu umieszczania wierzchołkowo rozłącznych dwukrawędziowych ścieżek w grafach o stopniu maksymalnym 3 i stopniu minimalnym 2. Poprawiono tym samym wcześniejsze wyniki dla grafów kubicznych (A. Kelmans, D. Mubayi, Journal of Graph Theory 45, 2004).

    Full text to download in external service

  • An Approximation of the Zero Error Capacity by a Greedy Algorithm

    Publication

    - Year 2020

    We present a greedy algorithm that determines a lower bound on the zero error capacity. The algorithm has many new advantages, e.g., it does not store a whole product graph in a computer memory and it uses the so-called distributions in all dimensions to get a better approximation of the zero error capacity. We also show an additional application of our algorithm.

  • An Approximation of the Zero Error Capacity by a Greedy Algorithm.

    Publication

    - Year 2020

    We present a greedy algorithm that determines a lower bound on the zero error capacity. The algorithm has many new advantages, e.g., it does not store a whole product graph in a computer memory and it uses the so-called distributions in all dimensions to get a better approximation of the zero error capacity. We also show an additional application of our algorithm.

    Full text to download in external service

  • Zastosowanie komputerów w dziedzinie wyszukiwania strategii optymalnych w grach logicznych

    Problem jaki stanowi wyszukiwanie strategii optymalnej w grach logicznych jest bardzo złożony. Można go podzielić na następujące podproblemy: obliczeniowy, pamięciowy oraz operacji wejścia/wyjścia. Jednak rosnąca z roku na rok siła obliczeniowa komputerów, ilość pamięci oraz prędkość transferu danych pomiędzy podzespołami zarówno lokalnymi jak i rozproszonymi, a także wzrost skuteczności wykorzystywanych technik algorytmicznych...

    Full text available to download

  • Recognition, understanding and aestheticization of freehand drawing flowcharts

    Publication

    - Year 2007

    In this paper a concept of FCA, a system for recognizing, understanding and aestheticization of freehand drawing flow charts is described. The system is based on a proposed by the author FlowGram graph grammar describing flow charts drawing. An open format FlowChartML for flow charts description is also proposed. The aestheticization criterion is formulated that allows for automatic beautification of flow charts. First experiments...

  • On zero-error codes produced by greedy algorithms

    We present two greedy algorithms that determine zero-error codes and lower bounds on the zero-error capacity. These algorithms have many advantages, e.g., they do not store a whole product graph in a computer memory and they use the so-called distributions in all dimensions to get better approximations of the zero-error capacity. We also show an additional application of our algorithms.

    Full text available to download

  • Multiple access in ad-hoc wireless LANs with noncooperative stations

    Publication

    - Year 2002

    A class of contention-type MAC protocols (e.g., CSMA/CA) relies on random deferment of packet transmission, and subsumes a deferment selection strategy and a scheduling policy that determines the winner of each contention cycle. This paper examines contention-type protocols in a noncooperative an ad-hoc wireless LAN setting, where a number of stations self-optimise their strategies to obtain a more-than-fair bandwidth share. Two...

  • Evolutionary Sets of Safe Ship Trajectories: Evaluation of Individuals

    Publication

    The paper presents a description of the evaluation phase of the Evolutionary Sets of Safe Ship Trajectories method. In general, the Evolutionary Sets of Safe Ship Trajectories method combines some of the assumptions of game theory with evolutionary programming and finds an optimal set of cooperating trajectories of all ships involved in an encounter situation. While developing a new version of this method, the au-thors decided...

  • Separability Assessment of Selected Types of Vehicle-Associated Noise

    Music Information Retrieval (MIR) area as well as development of speech and environmental information recognition techniques brought various tools in-tended for recognizing low-level features of acoustic signals based on a set of calculated parameters. In this study, the MIRtoolbox MATLAB tool, designed for music parameter extraction, is used to obtain a vector of parameters to check whether they are suitable for separation of...

    Full text to download in external service

  • Customized crossover in evolutionary sets of safe ship trajectories

    The paper presents selected aspects of evolutionary sets of safe ship trajectories-a method which applies evolutionary algorithms and some of the assumptions of game theory to solving ship encounter situations. For given positions and motion parameters of the ships, the method finds a near optimal set of safe trajectories of all ships involved in an encounter. The method works in real time and the solutions must be returned within...

    Full text available to download

  • Complexity Issues on of Secondary Domination Number

    Publication

    - ALGORITHMICA - Year 2023

    In this paper we study the computational complexity issues of the problem of secondary domination (known also as (1, 2)-domination) in several graph classes. We also study the computational complexity of the problem of determining whether the domination and secondary domination numbers are equal. In particular, we study the influence of triangles and vertices of degree 1 on these numbers. Also, an optimal algorithm for finding...

    Full text available to download

  • The complexity of minimum-length path decompositions

    Publication

    - JOURNAL OF COMPUTER AND SYSTEM SCIENCES - Year 2015

    We consider a bi-criteria generalization of the pathwidth problem, where, for given integers k, l and a graph G, we ask whether there exists a path decomposition P of G such that the width of P is at most k and the number of bags in P, i.e., the length of P, is at most l. We provide a complete complexity classification of the problem in terms of k and l for general graphs. Contrary to the original pathwidth problem, which is fixed-parameter...

    Full text available to download

  • No-Wait & No-Idle Open Shop Minimum Makespan Scheduling with Bioperational Jobs

    Publication

    In the open shop scheduling with bioperational jobs each job consists of two unit operations with a delay between the end of the first operation and the beginning of the second one. No-wait requirement enforces that the delay between operations is equal to 0. No-idle means that there is no idle time on any machine. We model this problem by the interval incidentor (1, 1)-coloring (IIR(1, 1)-coloring) of a graph with the minimum...

    Full text available to download

  • Application of Doubly Connected Dominating Sets to Safe Rectangular Smart Grids

    Publication

    - ENERGIES - Year 2022

    Smart grids, together with the Internet of Things, are considered to be the future of the electric energy world. This is possible through a two-way communication between nodes of the grids and computer processing. It is necessary that the communication is easy and safe, and the distance between a point of demand and supply is short, to reduce the electricity loss. All these requirements should be met at the lowest possible cost....

    Full text available to download

  • Impedance spectra of ZnO varistor type 440 model A ver. M

    The impedance spectrum of high-voltage ZnO varistor obtained using FRA EIS impedance spectrosocpy measurement method. The 1V sinusoidal excitation was used. The frequency range was chosen from 10 kHz down to 100 uHz. The object under test and the measuring instrument were placed in a Faraday cage due to high impedance of the object. The data was acquired...

  • Impedance spectra of ZnO varistor type 680 model A M ver. 93

    The impedance spectrum of high-voltage ZnO varistor obtained using FRA EIS impedance spectrosocpy measurement method. The 1V sinusoidal excitation was used. The frequency range was chosen from 10 kHz down to 100 uHz. The object under test and the measuring instrument were placed in a Faraday cage due to high impedance of the object. The data was acquired...

  • Impedance spectra of ZnO varistor type 680 model O M ver. 65 13

    The impedance spectrum of high-voltage ZnO varistor obtained using FRA EIS impedance spectrosocpy measurement method. The 1V sinusoidal excitation was used. The frequency range was chosen from 10 kHz down to 100 uHz. The object under test and the measuring instrument were placed in a Faraday cage due to high impedance of the object. The data was acquired...

  • Impedance spectra of ZnO varistor type 680 model A M ver. xx

    The impedance spectrum of high-voltage ZnO varistor obtained using FRA EIS impedance spectrosocpy measurement method. The 1V sinusoidal excitation was used. The frequency range was chosen from 10 kHz down to 100 uHz. The object under test and the measuring instrument were placed in a Faraday cage due to high impedance of the object. The data was acquired...

  • Impedance spectra of ZnO varistor type 280 model A ver. M

    The impedance spectrum of high-voltage ZnO varistor obtained using FRA EIS impedance spectrosocpy measurement method. The 1V sinusoidal excitation was used. The frequency range was chosen from 10 kHz down to 100 uHz. The object under test and the measuring instrument were placed in a Faraday cage due to high impedance of the object. The data was acquired...

  • Impedance spectra of ZnO varistor type 280 model 0 ver. 89

    The impedance spectrum of high-voltage ZnO varistor obtained using FRA EIS impedance spectrosocpy measurement method. The 1V sinusoidal excitation was used. The frequency range was chosen from 10 kHz down to 100 uHz. The object under test and the measuring instrument were placed in a Faraday cage due to high impedance of the object. The data was acquired...

  • Impedance spectra of ZnO varistor type 280 model O ver. 68

    The impedance spectrum of high-voltage ZnO varistor obtained using FRA EIS impedance spectrosocpy measurement method. The 1V sinusoidal excitation was used. The frequency range was chosen from 100 kHz down to 100 uHz. The object under test and the measuring instrument were placed in a Faraday cage due to high impedance of the object. The data was acquired...

  • Impedance spectra of ZnO varistor type 440 model O ver. 68

    The impedance spectrum of high-voltage ZnO varistor obtained using FRA EIS impedance spectrosocpy measurement method. The 1V sinusoidal excitation was used. The frequency range was chosen from 10 kHz down to 10 uHz. The object under test and the measuring instrument were placed in a Faraday cage due to high impedance of the object. The data was acquired...

  • Impedance spectra of ZnO varistor type 680 model O M ver. 65 60

    The impedance spectrum of high-voltage ZnO varistor obtained using FRA EIS impedance spectrosocpy measurement method. The 1V sinusoidal excitation was used. The frequency range was chosen from 10 kHz down to 10 uHz. The object under test and the measuring instrument were placed in a Faraday cage due to high impedance of the object. The data was acquired...

  • Cooperative Word Net Editor for Lexical Semantic Acquisition

    Publication

    - Year 2011

    The article describes an approach for building Word Net semantic dictionary in a collaborative approach paradigm. The presented system system enables functionality for gathering lexical data in a Wikipedia-like style. The core of the system is a user-friendly interface based on component for interactive graph navigation. The component has been used for Word Net semantic network presentation on web page, and it brings functionalities...

    Full text to download in external service

  • Generalized Gradient Equivariant Multivalued Maps, Approximation and Degree

    Publication

    Consider the Euclidean space Rn with the orthogonal action of a compact Lie group G. We prove that a locally Lipschitz G-invariant mapping f from Rn to R can be uniformly approximated by G-invariant smooth mappings g in such a way that the gradient of g is a graph approximation of Clarke’s generalized gradient of f . This result enables a proper development of equivariant gradient degree theory for a class of set-valued gradient...

    Full text available to download

  • A socially responsible university - an attempt to approach the system

    It is the author's thesis that social responsibility of university is an integrated system of both knowledge management (KM), quality management (QM) and organizational development (OD) processes. The author determined that the university "bond" is an institutional culture (IC). An integrated system is the way to create university an open system co-operated and co-opetited with stakeholders. The stakes are high in game - both students...

    Full text available to download

  • Limitations of Emotion Recognition in Software User Experience Evaluation Context

    This paper concerns how an affective-behavioural- cognitive approach applies to the evaluation of the software user experience. Although it may seem that affect recognition solutions are accurate in determining the user experience, there are several challenges in practice. This paper aims to explore the limitations of the automatic affect recognition applied in the usability context as well as...

    Full text available to download

  • Playing the Sprint Retrospective: A Replication Study

    Publication

    - Year 2020

    The Sprint Retrospective is a vehicle for continuous process improvement. Even though it is a well established agile practice, running effective retrospective meetings is challenging. There have been a lot of identified problems that commonly occur during these meetings. To address them, Przybyłek & Kotecka [20] successfully revitalized retrospective meetings by adopting collaborative games, which represent a powerful tool in improving...

    Full text to download in external service

  • GreedyMAX-type Algorithms for the Maximum Independent Set Problem

    Publication

    A maximum independent set problem for a simple graph G = (V,E) is to find the largest subset of pairwise nonadjacent vertices. The problem is known to be NP-hard and it is also hard to approximate. Within this article we introduce a non-negative integer valued functionp defined on the vertex set V(G) and called a potential function of agraph G, while P(G) = max{vinV(G)| p(v)} is called a potential of G. For any graph P(G) <= D(G),...

    Full text to download in external service

  • AUTOMATIC LEARNING OF STRATEGY AND RULES IN CARD GAMES USING IMAGE FROM CAMERA

    Publication

    Below work tries to answer a question: if it is possible to replace real human with computer system in social games. As a subject for experiments, card games were chosen, because they require a lot of player interaction (playing and taking cards), while their rules are easy to present in form of clear list of statements. Such a system, should allow real players to play without constant worrying about guiding or helping computer...

  • Evolutionary Sets Of Safe Ship Trajectories: A New Approach To Collision Avoidance

    Publication

    The paper introduces a new method of solving multi-ship encounter situations for both open waters and restricted water regions. The method, called evolutionary sets of safe trajectories combines some of the assumptions of game theory with evolutionary programming and aims to find optimal set of safe trajectories of all ships involved in an encounter situation. In a two-ship encounter situation it enables the operator of an on-board...

  • MARKETING STRATEGY - SPACE AS A PRODUCT.ARCHITECTURE AS A MARKETING DEVICE.

    Publication

    - Year 2012

    Space has its measurable financial value. From the economic point of view place can be treated as a product that fights for appearing in tourists' and investors' consciousnesses. Space - treated as the object of demand and supply - becomes an element in a marketing game. To reach its maximal value the given space should be competitive to other spaces, from which it wants to stand out. However, in the field of architecture - and...

  • Fake VIP Attacks and Their Mitigation via Double-Blind Reputation

    Publication

    - Year 2017

    In a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...

    Full text available to download

  • Proposal of a method for effective tasks distribution in the execution of compolex problems

    An access to a great number of various services allows for decomposition of complex problems into smaller and less complex tasks. Those tasks can be presented in a form of a dependency graph. This paper shows an idea of executing such a problem using cooperating autonomous agents. Main focus of this work is cooperation covering effective tasks distribution among executors. This paper presents an algorithm for dynamic executor selection...

  • Reliability of production machines in the bakery industry – theoretical and practical issues

    Publication

    The aim of the article is to present probabilistic models, which were then used to analyze the reliability of production machines in the baking industry. The author conducted research in the period from January 2, 2016 to December 31, 2018 regarding the measurement of reliability of a traditional production system based on a probabilistic concept. Due to the limited scope of the article, reliability calculations for a set of thermo-oil...

    Full text to download in external service

  • Nonlinearity shaping in nanostructured glass-diamond hybrid materials for optical fiber preforms

    Publication
    • G. Stępniewski
    • P. Hänzi
    • A. Filipkowski
    • M. Janik
    • M. Mrózek
    • Y. Stepanenko
    • R. Bogdanowicz
    • V. Romano
    • A. Heidt
    • R. Buczyński
    • M. Klimczak

    - CARBON - Year 2023

    Nanodiamond integration with optical fibers has proved a compelling methodology for magneto-optics. We reveal that the applicability of nanodiamonds in nonlinear optics goes beyond the previous demonstrations of frequency converters. Instead, we exploit the recently reported volumetric integration of nanodiamonds along the optical fiber core and show that the nonlinear response of glasses can be manipulated by nanodiamonds. By...

    Full text to download in external service

  • ProSIL Software for functional saferty management in life cycle = Aplikacja ProSIL do zarządzania bezpieczeństwem funkcjonalnym w cyklu życia

    In the paper the ProSIL software to aid the functional safety management is presented. The software consists of three modules to aid: determination of the required SIL level (ProSILen), veryfication of the SIL level (ProSILver). In the aplication the method of the calibrated risk graph to determine the required safety integrity level SIL for defined safety instrumented functions is applied. The methods concerning functional safety...

    Full text available to download

  • Polyhedral Ramsey Numbers

    Given two polygons or polyhedrons P1 and P2, we can transform these figures to graphs G1 and G2, respectively. The polyhedral Ramsey number Rp(G1,G2) is the smallest integer n such that every graph, which represents polyhedron on n vertices either contains a copy of G1 or its complement contains a copy of G2. Using a computer search together with some theoretical results we have established some polyhedral Ramsey numbers, for example...

  • Study of the Flow Dynamics of Surface Water Masses in the Area of the Coastal Gulf of Gdansk

    Publication

    - Year 2017

    The paper describes two methods of predicting the movement of small objects with surface water masses. One of the methods uses graph theory to describe the motion of water masses in port docks. The results of this study were compared to a simulation using the hydrodynamic numerical model M3D. The results obtained in a virtual environment were related to the experiments in the real world. In the coastal area of the Gulf of Gdansk,...

    Full text to download in external service

  • Port-Based Modelling of Distributed-Lumped Parameter Systems

    Publication

    There in the paper is presented an uniform, port-based approach to modelling of both lumped and distributed parameter systems. Port-based model of the distributed system has been defined by application of bond graph methodology and distributed transfer function method (DTFM). The approach proposed combines versatility of port-based modelling and accuracy of distributed transfer function method. The concise representation of lumped-distributed...

    Full text to download in external service

  • Rearrangeability in multicast Clos networks is NP-complete

    Publication

    Przestrajalność w polach Closa z połączeniami jeden do jeden jest problemem wielomianowym. W pracy pokazano, że w polach z połączeniami jeden do wiele problem ten jest NP zupełny.Three-stage elos networks are commutation networks with circuit switching. So far, graph theory has been very useful tool for solving issues related to these networks with unicast connections. This is so because if elos network is represented as a bipartite...

    Full text to download in external service

  • Certified domination

    Publication

    Imagine that we are given a set D of officials and a set W of civils. For each civil x ∈ W, there must be an official v ∈ D that can serve x, and whenever any such v is serving x, there must also be another civil w ∈ W that observes v, that is, w may act as a kind of witness, to avoid any abuse from v. What is the minimum number of officials to guarantee such a service, assuming a given social network? In this paper, we introduce...

    Full text available to download

  • On-line Search in Two-Dimensional Environment

    We consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. We require that the strategy is connected and monotone, that is, at each point of the execution the part of the graph...

    Full text available to download

  • Semantic Memory for Avatars in Cyberspace

    Publication

    - Year 2005

    Avatars that show intelligent behavior should have an access to general knowledge about the world, knowledge that humans store in their semantic memories. The simplest knowledge representation for semantic memory is based on the Concept Description Vectors (CDVs) that store, for each concept, an information whether a given property can be applied to this concept or not. Unfortunately large-scale semantic memories are not available....

  • TOPOLOGICAL CLUES FOR PREDICTING OUTCOMES OF MULTIPLAYER ONLINE BATTLE ARENA GAMES

    Publication

    - Year 2015

    With 27 million people playing League of Legends every day, e-sports became more and more important part of our everyday life. Rise of its popularity builds a demand for better understanding e-sports mechanics on a deeper level. In the article, we test a hypothesis that it is possible to predict an outcome of Multiplayer Online Battle Arena game based on topological clues only (such as area of polygon where vertices are players...

    Full text to download in external service

  • COLREGS compliance in Evolutionary Sets of Cooperating Ship Trajectories

    In general, Evolutionary Sets of Cooperating Ship Trajectories combine some of the assumptions of game theory with evolutionary programming and aim to find optimal set of cooperating trajectoriesof all ships involved in an encounter situation. In a two-ship encounter situation the method enables the operator of an on-board collision-avoidance system to predict the most probable behaviour of atarget and to plan the own manoeuvres...

    Full text available to download

  • Automatic recognition of therapy progress among children with autism

    Publication

    - Scientific Reports - Year 2017

    The article presents a research study on recognizing therapy progress among children with autism spectrum disorder. The progress is recognized on the basis of behavioural data gathered via five specially designed tablet games. Over 180 distinct parameters are calculated on the basis of raw data delivered via the game flow and tablet sensors - i.e. touch screen, accelerometer and gyroscope. The results obtained confirm the possibility...

    Full text available to download

  • A Centralized Reputation System for MANETs Based on Observed Path Performance

    Publication

    A reputation system for MANETs is described that attempts to deduce nodal trustworthiness (forwarding behaviour) from observed end-to-end path performance. The trustworthiness deduction algorithm produces interval estimates and works well if node misbehaviour is not selec-tive with respect to traversing paths. Nodal reputation levels are next calculated in the spirit of generous tit-for-tat so as to best reflect momentary nodal...

  • Adopting Collaborative Games into Agile Software Development

    Publication

    - Year 2018

    Although the emergence of agile methods has triggered a growing awareness that social factors have a crucial impact on the success of software projects, neither the Scrum Guide nor the Agile Manifesto prescribe techniques that aid the human side of software development. To address this challenge, we enriched the Scrum process with a set of collaborative games. Collaborative games refer to techniques inspired by game play, but designed...

    Full text to download in external service

  • Searching by heterogeneous agents

    In this work we introduce and study a pursuit-evasion game in which the search is performed by heterogeneous entities. We incorporate heterogeneity into the classical edge search problem by considering edge-labeled graphs: once a search strategy initially assigns labels to the searchers, each searcher can be only present on an edge of its own label. We prove that this problem is not monotone even for trees and we give instances...

    Full text to download in external service