Search results for: PROOF-NUMBER SEARCH - Bridge of Knowledge

Search

Search results for: PROOF-NUMBER SEARCH

Search results for: PROOF-NUMBER SEARCH

  • Porównanie wydajności modyfikacji algorytmu Proof-number search uwzględniających wartości remisowe

    Proof-number search to znana rodzina algorytmów służących do wyznaczania wartości pozycji w nielosowych grach dwóch graczy z pełną informacją. W wersji podstawowej pn-search doskonale radzi sobie z wyszukiwaniem strategii wygrywającej jednego z graczy. Jednak istnieje wiele znanych gier, w których obydwaj gracze posiadają jedynie strategię remisującą (Młynek, Awari, Warcaby). W niniejszej pracy porównano wydajność dwóch modyfikacji...

    Full text to download in external service

  • Ocena poprawności działania algorytmu proof-number search na strukturze digrafu acyklicznego

    Algorytm proof-number search jest znanym algorytmem służącym do rozwiązywania gier logicznych. Rozwiązanie gry jest jednoznaczne ze znalezieniem optymalnej strategii i pozwala przeprowadzić rozgrywkę w sposób pozwalający na osiągnięcie najlepszego możliwego wyniku. Jedną z największych wad tego algorytmu, naturalnie pracującego na strukturze drzewa, jest wielokrotne rozwijanie identycznych poddrzew gry co prowadzi do nadmiarowego...

    Full text to download in external service

  • An Alternative Proof of a Lower Bound on the 2-Domination Number of a Tree

    A 2-dominating set of a graph G is a set D of vertices of G such that every vertex not in D has a at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. Fink and Jacobson [n-domination in graphs, Graph theory with applications to algorithms and computer science, Wiley, New York, 1985, 283-300] established the following lower bound on the 2-domination...

    Full text to download in external service

  • Limiting distribution of Lempel Ziv'78 redundancy

    Publication

    - Year 2011

    We show that the Lempel Ziv'78 redundancy rate tends to a Gaussian distribution for memoryless sources. We accomplish it by extending findings from our 1995 paper [3]. We present a new simplified proof of the Central Limit Theorem for the number of phrases in the LZ'78 algorithm. As in our 1995 paper, here we first analyze the asymptotic behavior of the total path length in a digital search tree (a DST) built from independent sequences....

    Full text to download in external service

  • On the Limiting distribution of Lempel Ziv'78 Redundancy for Memoryles Sources

    Publication

    - Year 2014

    We show that the Lempel Ziv'78 redundancy rate tends to a Gaussian distribution for memoryless sources. We accomplish it by extending findings from our 1995 paper [3]. We present a new simplified proof of the Central Limit Theorem for the number of phrases in the LZ'78 algorithm. As in our 1995 paper, here we first analyze the asymptotic behavior of the total path length in a digital search tree (a DST) built from independent sequences....

  • On the Limiting Distribution of Lempel-Ziv’78 Redundancy for Memoryless Sources

    Publication

    We study the Lempel-Ziv'78 algorithm and show that its (normalized) redundancy rate tends to a Gaussian distribution for memoryless sources. We accomplish it by extending findings from our 1995 paper, in particular, by presenting a new simplified proof of the central limit theorem (CLT) for the number of phrases in the LZ'78 algorithm. We first analyze the asymptotic behavior of the total path length in the associated digital search...

    Full text to download in external service

  • Magdalena Szuflita-Żurawska

    Head of the Scientific and Technical Information Services at the Gdansk University of Technology Library and the Leader of the Open Science Competence Center. She is also a Plenipotentiary of the Rector of the Gdańsk University of Technology for open science.  She is a PhD Candidate. Her main areas of research and interests include research productivity, motivation, management of HEs, Open Access, Open Research Data, information...

  • Przedwojenne wydawnictwa Stowarzyszenia Elektryków Polskich w bibliotekach i bibliotekach cyfrowych

    Artykuł przedstawia krótką historię piśmiennictwa z dziedziny elektrotechniki. Po 1918 r. obserwuje się wzrost liczby publikacji, a wraz z rozwojem nauki zwiększa się obszar tematyczny literatury fachowej. Ogromną zasługę w tym rozwoju miało Stowarzyszenie Elektryków Polskich. W artykule pokazano sposoby wyszukiwania wydawnictw przedwojennych SEP, ich dostępność w bibliotekach, także cyfrowych. Przedstawia w jaki sposób zwiększyć...

    Full text available to download

  • Analiza bibliometryczna w badaniach dotyczących prognozowania upadłości przedsiębiorstw w Polsce

    Publication

    - Year 2020

    Celem opracowania jest ukazanie obrazu piśmiennictwa poświęconego zagadnieniom prognozowania upadłości przedsiębiorstw w Polsce. Jako metodę badawczą zastosowano analizę bibliometryczną. Do analizy wykorzystano bazę Google Scholar oraz narzędzie Publish or Perish 7. Okresem badań objęto lata 1995– 2019. Jako frazy do wyszukiwania publikacji zastosowano: „prognozowanie upadłości”, „prognozowanie zagrożenia finansowego”, „systemy...

  • Neural Architecture Search for Skin Lesion Classification

    Deep neural networks have achieved great success in many domains. However, successful deployment of such systems is determined by proper manual selection of the neural architecture. This is a tedious and time-consuming process that requires expert knowledge. Different tasks need very different architectures to obtain satisfactory results. The group of methods called the neural architecture search (NAS) helps to find effective architecture...

    Full text available to download

  • Isolation Number versus Domination Number of Trees

    Publication
    • M. Lemańska
    • M. J. Souto-Salorio
    • A. Dapena
    • F. Vazquez-Araujo

    - Mathematics - Year 2021

    If G=(VG,EG) is a graph of order n, we call S⊆VG an isolating set if the graph induced by VG−NG[S] contains no edges. The minimum cardinality of an isolating set of G is called the isolation number of G, and it is denoted by ι(G). It is known that ι(G)≤n3 and the bound is sharp. A subset S⊆VG is called dominating in G if NG[S]=VG. The minimum cardinality of a dominating set of G is the domination number, and it is denoted by γ(G)....

    Full text available to download

  • About the Noether’s theorem for fractional Lagrangian systems and a generalization of the classical Jost method of proof

    Recently, the fractional Noether's theorem derived by G. Frederico and D.F.M. Torres in [10] was proved to be wrong by R.A.C. Ferreira and A.B. Malinowska in (see [7]) using a counterexample and doubts are stated about the validity of other Noether's type Theorem, in particular ([9],Theorem 32). However, the counterexample does not explain why and where the proof given in [10] does not work. In this paper, we make a detailed analysis...

    Full text to download in external service

  • Brief Announcement: Energy Constrained Depth First Search

    Publication

    - Year 2018

    Depth first search is a natural algorithmic technique for constructing a closed route that visits all vertices of a graph. The length of such route equals, in an edge-weighted tree, twice the total weight of all edges of the tree and this is asymptotically optimal over all exploration strategies. This paper considers a variant of such search strategies where the length of each route is bounded by a positive integer B (e.g. due...

    Full text to download in external service

  • On-line Search in Two-Dimensional Environment

    Publication

    We consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. As a way of modeling two-dimensional shapes, we restrict our attention to networks that are embedded into partial grids:...

    Full text to download in external service

  • Acoustic journal bearing - A search for adequate configuration

    Classical non-contact bearings are already used in a number of specialist applications but there are somespecialist areas where they cannot be used for variety of reasons and acoustic sliding bearings could be an alternative. The paper presents the quest for a configuration of an acoustic journal bearing and shows that the overall shape of the bearing and its geometry are of a vital importance for the load capacity oft he bearing....

    Full text to download in external service

  • Harmony Search for Data Mining with Big Data

    Publication

    - Year 2016

    In this paper, some harmony search algorithms have been proposed for data mining with big data. Three areas of big data processing have been studied to apply new metaheuristics. The first problem is related to MapReduce architecture that can be supported by a team of harmony search agents in grid infrastructure. The second dilemma involves development of harmony search in preprocessing of data series before data mining. Moreover,...

    Full text to download in external service

  • Fast Approximate String Search for Wikification

    Publication

    The paper presents a novel method for fast approximate string search based on neural distance metrics embeddings. Our research is focused primarily on applying the proposed method for entity retrieval in the Wikification process, which is similar to edit distance-based similarity search on the typical dictionary. The proposed method has been compared with symmetric delete spelling correction algorithm and proven to be more efficient...

    Full text available to download

  • Parallel tabu search for graph coloring problem

    Publication

    - Year 2006

    Tabu search is a simple, yet powerful meta-heuristic based on local search that has been often used to solve combinatorial optimization problems like the graph coloring problem. This paper presents current taxonomy of patallel tabu search algorithms and compares three parallelization techniques applied to Tabucol, a sequential TS algorithm for graph coloring. The experimental results are based on graphs available from the DIMACS...

  • Adaptive Algorithm for Interactive Question-based Search

    Publication

    - Year 2012

    Popular web search engines tend to improve the relevanceof their result pages, but the search is still keyword-oriented and far from "understanding" the queries' meaning. In the article we propose an interactive question-based search algorithm that might come up helpful for identifying users' intents. We describe the algorithm implemented in a form of a questions game. The stress is put mainly on the most critical aspect of this...

  • Network-assisted processing of advanced IoT applications: challenges and proof-of-concept application

    Publication
    • H. Mora
    • F. A. Pujol
    • T. Ramírez
    • A. Jimeno-Morenilla
    • J. Szymański

    - Cluster Computing-The Journal of Networks Software Tools and Applications - Year 2024

    Recent advances in the area of the Internet of Things shows that devices are usually resource-constrained. To enable advanced applications on these devices, it is necessary to enhance their performance by leveraging external computing resources available in the network. This work presents a study of computational platforms to increase the performance of these devices based on the Mobile Cloud Computing (MCC) paradigm. The main...

    Full text available to download

  • T-colorings, divisibility and circular chromatic number

    Let T be a T-set, i.e., a finite set of nonnegative integers satisfying 0 ∈ T, and G be a graph. In the paper we study relations between the T-edge spans espT (G) and espd⊙T (G), where d is a positive integer and d ⊙ T = {0 ≤ t ≤ d (max T + 1): d |t ⇒ t/d ∈ T} . We show that espd⊙T (G) = d espT (G) − r, where r, 0 ≤ r ≤ d − 1, is an integer that depends on T and G. Next we focus on the case T = {0} and show that espd⊙{0} (G) =...

    Full text available to download

  • On trees with double domination number equal to 2-domination number plus one

    A vertex of a graph is said to dominate itself and all of its neighbors. A subset D subseteq V(G) is a 2-dominating set of G if every vertex of V(G)D is dominated by at least two vertices of D, while it is a double dominating set of G if every vertex of G is dominated by at least two vertices of D. The 2-domination (double domination, respectively) number of a graph G is the minimum cardinality of a 2-dominating (double dominating,...

    Full text to download in external service

  • On trees with double domination number equal to total domination number plus one

    Publication

    A total dominating set of a graph G is a set D of vertices of G such that every vertex of G has a neighbor in D. A vertex of a graph is said to dominate itself and all of its neighbors. A double dominating set of a graph G is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D. The total (double, respectively) domination number of a graph G is the minimum cardinality of a total (double,...

    Full text to download in external service

  • Features of a radial user interface to search engines

    The paper is concerned with a new type of user interface to search engines. Instead of presenting search results in a form of a ranked list, the results are presented in radial arrangement. In the center of the interface the most relevant web page is presented. Other web pages are located around the central one. The location of a web page depends on two factors: its relevance to the query and its content. The relevance has influence...

    Full text to download in external service

  • Bondage number of grid graphs

    Publication

    The bondage number b(G) of a nonempty graph G is the cardinality of a smallest set of edges whose removal from G results in a graph with domination number greater than the domination number of G. Here we study the bondage number of some grid-like graphs. In this sense, we obtain some bounds or exact values of the bondage number of some strong product and direct product of two paths.

    Full text available to download

  • 2-Coloring number revisited

    2-Coloring number is a parameter, which is often used in the literature to bound the game chromatic number and other related parameters. However, this parameter has not been precisely studied before. In this paper we aim to fill this gap. In particular we show that the approximation of the game chromatic number by the 2-coloring number can be very poor for many graphs. Additionally we prove that the 2-coloring number may grow...

    Full text available to download

  • Interactive Information Search in Text Data Collections

    Publication

    This article presents a new idea for retrieving in text repositories, as well as it describes general infrastructure of a system created to implement and test those ideas. The implemented system differs from today’s standard search engine by introducing process of interactive search with users and data clustering. We present the basic algorithms behind our system and measures we used for results evaluation. The achieved results...

    Full text to download in external service

  • Bounds on isolated scattering number

    Publication

    - Year 2021

    The isolated scattering number is a parameter that measures the vulnerability of networks. This measure is bounded by formulas de- pending on the independence number. We present new bounds on the isolated scattering number that can be calculated in polynomial time.

    Full text to download in external service

  • Bounds on isolated scattering number

    Publication

    The isolated scattering number is a parameter that measures the vulnerability of networks. This measure is bounded by formulas de- pending on the independence number. We present new bounds on the isolated scattering number that can be calculated in polynomial time.

    Full text to download in external service

  • On-line Search in Two-Dimensional Environment

    We consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. We require that the strategy is connected and monotone, that is, at each point of the execution the part of the graph...

    Full text available to download

  • Navier number and transition to turbulence

    Publication

    The motivation behind this article is to explain a role of the Navier number (Na -dimensionless slip-length) in prediction of closures for laminar to turbulent transition undergoing via eddies detachment from the slip layer in nano-cannals. Additionally the role of the Navier number Na in universal modeling of phenomenon of enhanced mass flow rate reported in micro- and nano-channels has been explained. The Na number should be...

    Full text available to download

  • Synchronous black hole search in directed graphs

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2011

    The paper considers a team of robots which has to explore a graph G, where some nodes can be harmful. Robots are initially located at the so-called home base node. The dangerous nodes are the so-called black hole nodes, and once a robot enters in one of them, it is destroyed. The goal is to find a strategy in order to explore G in such a way that minimum number of robots is wasted. The exploration ends if there is at least one...

    Full text available to download

  • International Journal of Evidence & Proof

    Journals

    ISSN: 1365-7127 , eISSN: 1740-5572

  • KEYSTONE WG2: Activities and Results Overview on Keyword Search

    Publication

    In this chapter we summarize activities and results achieved by the Keyword Search Working Group (WG2) of the KEYSTONE Cost Action IC1302. We present the goals of the WG2, its main activities in course of the action and provide a summary of the selected publications related to the WG2 goals and co-authored by WG2 members. We concludewith a summary of open research directions in the area of keyword search for structured data.

    Full text to download in external service

  • On trees with double domination number equal to 2-outer-independent domination number plus one

    A vertex of a graph is said to dominate itself and all of its neighbors. A double dominating set of a graph G is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D. The double domination number of a graph G is the minimum cardinality of a double dominating set of G. For a graph G=(V,E), a subset D subseteq V(G) is a 2-dominating set if every vertex of V(G)D has at least two neighbors...

    Full text to download in external service

  • Web search results clusterization with background knowledge

    Publication

    - Year 2009

    Clusterization of web pages is an attractive wayfor presenting web resources. Arranging pages into groups ofsimilar topics simplifies and shorten the search process. Thispaper concerns the problem of clustering web pages and presentsour approach to this issue. Our solution is focused on findingsimilarities between documents delivered by different web searchengines. This process was accomplished by applying WordNetdictionary.

  • On domination multisubdivision number of unicyclic graphs

    Publication

    The paper continues the interesting study of the domination subdivision number and the domination multisubdivision number. On the basis of the constructive characterization of the trees with the domination subdivision number equal to 3 given in [H. Aram, S.M. Sheikholeslami, O. Favaron, Domination subdivision number of trees, Discrete Math. 309 (2009), 622–628], we constructively characterize all connected unicyclic graphs with...

    Full text available to download

  • Approximation Strategies for Generalized Binary Search in Weighted Trees

    Publication

    - Year 2017

    We consider the following generalization of the binary search problem. A search strategy is required to locate an unknown target node t in a given tree T. Upon querying a node v of the tree, the strategy receives as a reply an indication of the connected component of T\{v} containing the target t. The cost of querying each node is given by a known non-negative weight function, and the considered objective is to minimize the total...

    Full text to download in external service

  • TOTAL DOMINATION MULTISUBDIVISION NUMBER OF A GRAPH

    Publication

    - Discussiones Mathematicae Graph Theory - Year 2015

    The domination multisubdivision number of a nonempty graph G was defined in [3] as the minimum positive integer k such that there exists an edge which must be subdivided k times to increase the domination number of G. Similarly we define the total domination multisubdivision number msd_t (G) of a graph G and we show that for any connected graph G of order at least two, msd_t (G) ≤ 3. We show that for trees the total domination...

    Full text available to download

  • Relation-based Wikipedia Search System for Factoid Questions Answering

    In this paper we propose an alternative keyword search mechanism for Wikipedia, designed as a prototype solution towards factoid questions answering. The method considers relations between articles for finding the best matching article. Unlike the standard Wikipedia search engine and also Google engine, which search the articles content independently, requiring the entire query to be satisfied by a single article, the proposed...

    Full text available to download

  • Some variants of perfect graphs related to the matching number, the vertex cover and the weakly connected domination number

    Publication

    Given two types of graph theoretical parameters ρ and σ, we say that a graph G is (σ, ρ)- perfect if σ(H) = ρ(H) for every non-trivial connected induced subgraph H of G. In this work we characterize (γw, τ )-perfect graphs, (γw, α′)-perfect graphs, and (α′, τ )-perfect graphs, where γw(G), τ (G) and α′(G) denote the weakly connected domination number, the vertex cover number and the matching number of G, respectively. Moreover,...

    Full text to download in external service

  • The convex domination subdivision number of a graph

    Publication

    Let G = (V;E) be a simple graph. A set D\subset V is a dominating set of G if every vertex in V - D has at least one neighbor in D. The distance d_G(u, v) between two vertices u and v is the length of a shortest (u, v)-path in G. An (u, v)-path of length d_G(u; v) is called an (u, v)-geodesic. A set X\subset V is convex in G if vertices from all (a, b)-geodesics belong to X for any two vertices a, b \in X. A set X is a convex dominating...

    Full text available to download

  • In search for new urban planning education and research formulas

    This paper shows research and educational urban planning projects based on international and mutlicultural cooperation including innovative elements to conduct research on built environment. Their common aim is to search for a new perspective on the city development and challenges resulting from changing conditions.

    Full text to download in external service

  • Deformation Analysis of a Composite Bridge during Proof Loading Using Point Cloud Processing

    Publication

    Remote sensing in structural diagnostics has recently been gaining attention. These techniques allow the creation of three-dimensional projections of the measured objects, and are relatively easy to use. One of the most popular branches of remote sensing is terrestrial laser scanning. Laser scanners are fast and efficient, gathering up to one million points per second. However, the weakness of terrestrial laser scanning is the...

    Full text available to download

  • 0-step K-means for clustering Wikipedia search results

    Publication

    - Year 2011

    This article describes an improvement for K-means algorithm and its application in the form of a system that clusters search results retrieved from Wikipedia. The proposed algorithm eliminates K-means isadvantages and allows one to create a cluster hierarchy. The main contributions of this paper include the ollowing: (1) The concept of an improved K-means algorithm and its application for hierarchical clustering....

  • Context Search Algorithm for Lexical Knowledge Acquisition

    Publication

    - CONTROL AND CYBERNETICS - Year 2012

    A Context Search algorithm used for lexical knowledge acquisition is presented. Knowledge representation based on psycholinguistic theories of cognitive processes allows for implementation of a computational model of semantic memory in the form of semantic network. A knowledge acquisition using supervised dialog templates have been performed in a word game designed to guess the concept a human user is thinking about. The game,...

  • Spectral Clustering Wikipedia Keyword-Based search Results

    The paper summarizes our research in the area of unsupervised categorization of Wikipedia articles. As a practical result of our research, we present an application of spectral clustering algorithm used for grouping Wikipedia search results. The main contribution of the paper is a representation method for Wikipedia articles that has been based on combination of words and links and used for categoriation of search results in this...

    Full text available to download

  • IN SEARCH OF A NEW EXHIBITION SPACE

    Publication

    The buildings considered as raising the prestige and promoting cities are those related to culture. Their impact on urban life is undeniable, which is reflected in a continuous increase in the number of new museum buildings. Apart from places intrinsically linked with culture, which, as such, may be considered as standard - like museum, theatres or galleries - there also appear alternative places of development and promotion of...

    Full text available to download

  • Deep neural network architecture search using network morphism

    Publication

    The paper presents the results of the research on neural architecture search (NAS) algorithm. We utilized the hill climbing algorithm to search for well-performing structures of deep convolutional neural network. Moreover, we used the function preserving transformations which enabled the effective operation of the algorithm in a short period of time. The network obtained with the advantage of NAS was validated on skin lesion classification...

    Full text to download in external service

  • Harmony Search for Self-configuration of Fault–Tolerant and Intelligent Grids

    Publication

    - Year 2016

    In this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Self-configuration of computer grids lies in the fact that new computer nodes are automatically configured by software agents and then integrated into the grid. A base node works due to several configuration parameters that define some aspects of data communications and energy power consumption. We...

    Full text to download in external service

  • Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph

    Publication
    • M. Lemańska
    • J. A. RODRíGUEZ-VELáZQUEZ
    • R. Trujillo-Rasua

    - FUNDAMENTA INFORMATICAE - Year 2017

    A vertex cover of a graph G = (V, E) is a set X ⊂ V such that each edge of G is incident to at least one vertex of X. The ve cardinality of a vertex cover of G. A dominating set D ⊆ V is a weakly connected dominating set of G if the subgraph G[D]w = (N[D], Ew) weakly induced by D, is connected, where Ew is the set of all edges having at least one vertex in D. The weakly connected domination number γw(G) of G is the minimum cardinality...

    Full text to download in external service

  • Weakly convex domination subdivision number of a graph

    Publication

    - FILOMAT - Year 2016

    A set X is weakly convex in G if for any two vertices a; b \in X there exists an ab–geodesic such that all of its vertices belong to X. A set X \subset V is a weakly convex dominating set if X is weakly convex and dominating. The weakly convex domination number \gamma_wcon(G) of a graph G equals the minimum cardinality of a weakly convex dominating set in G. The weakly convex domination subdivision number sd_wcon (G) is the minimum...

    Full text available to download

  • Influence of edge subdivision on the convex domination number

    We study the influence of edge subdivision on the convex domination number. We show that in general an edge subdivision can arbitrarily increase and arbitrarily decrease the convex domination number. We also find some bounds for unicyclic graphs and we investigate graphs G for which the convex domination number changes after subdivision of any edge in G.

    Full text to download in external service

  • Research in Number Theory

    Journals

    ISSN: 2522-0160 , eISSN: 2363-9555

  • Algebra & Number Theory

    Journals

    ISSN: 1937-0652 , eISSN: 1944-7833

  • JOURNAL OF NUMBER THEORY

    Journals

    ISSN: 0022-314X , eISSN: 1096-1658

  • Harmony Search to Self-Configuration of Fault-Tolerant Grids for Big Data

    In this paper, harmony search algorithms have been proposed to self-configuration of fault-tolerant grids for big data processing. Some tasks related to big data processing have been considered. Moreover, two criteria have been applied to evaluate quality of grids. The first criterion is a probability that all tasks meet their deadlines and the second one is grid reliability. Furthermore, some intelligent agents based on harmony...

    Full text to download in external service

  • On the super domination number of lexicographic product graphs

    Publication

    - DISCRETE APPLIED MATHEMATICS - Year 2019

    The neighbourhood of a vertexvof a graphGis the setN(v) of all verticesadjacent tovinG. ForD⊆V(G) we defineD=V(G)\D. A setD⊆V(G) is called a super dominating set if for every vertexu∈D, there existsv∈Dsuch thatN(v)∩D={u}. The super domination number ofGis theminimum cardinality among all super dominating sets inG. In this article weobtain closed formulas and tight bounds for the super dominating number oflexicographic product...

    Full text available to download

  • Coronas and Domination Subdivision Number of a Graph

    Publication

    In this paper, for a graph G and a family of partitions P of vertex neighborhoods of G, we define the general corona G ◦P of G. Among several properties of this new operation, we focus on application general coronas to a new kind of characterization of trees with the domination subdivision number equal to 3.

    Full text available to download

  • Computer Assisted Proof of the Existence of a Periodic Orbit in the Rössler Equations

    Publication

    - Year 2000

    Full text to download in external service

  • Law requirements of explosion proof protection at working with chemical substances

    Publication

    - Prace Naukowe Akademii im. Jana Długosza w Częstochowie. Technika, Informatyka, Inżynieria Bezpieczeństwa - Year 2018

    Full text to download in external service

  • A Systematic Search for New Coupling Schemes of Cross-Coupled Resonator Bandpass Filters

    Publication

    In this paper, a systematic approach to an extensive search for topologies of cross-coupled filters with generalized Chebyshev response is presented. The technique applies graph theory to find unique, nonisomorphic filter configurations, and tests whether a specific frequency response can be realized in a given set of topologies. The results of the search are then stored in a database of possible filter configurations.

    Full text available to download

  • An Efficient Noisy Binary Search in Graphs via Median Approximation

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2021

    Consider a generalization of the classical binary search problem in linearly sorted data to the graph-theoretic setting. The goal is to design an adaptive query algorithm, called a strategy, that identifies an initially unknown target vertex in a graph by asking queries. Each query is conducted as follows: the strategy selects a vertex q and receives a reply v: if q is the target, then =, and if q is not the target, then v is a...

    Full text to download in external service

  • Graphs with isolation number equal to one third of the order

    Publication

    - DISCRETE MATHEMATICS - Year 2024

    A set D of vertices of a graph G is isolating if the set of vertices not in D and with no neighbor in D is independent. The isolation number of G, denoted by \iota(G) , is the minimum cardinality of an isolating set of G. It is known that \iota(G) \leq n/3 , if G is a connected graph of order n, , distinct from C_5 . The main result of this work is the characterisation of unicyclic and block graphs of order n with isolating number...

    Full text to download in external service

  • On trees attaining an upper bound on the total domination number

    A total dominating set of a graph G is a set D of vertices of G such that every vertex of G has a neighbor in D. The total domination number of a graph G, denoted by γ_t(G), is the minimum cardinality of a total dominating set of G. Chellali and Haynes [Total and paired-domination numbers of a tree, AKCE International Journal of Graphs and Combinatorics 1 (2004), 69-75] established the following upper bound on the total domination...

    Full text to download in external service

  • Block graphs with large paired domination multisubdivision number

    Publication

    - Discussiones Mathematicae Graph Theory - Year 2021

    The paired domination multisubdivision number of a nonempty graph G, denoted by msdpr(G), is the smallest positive integer k such that there exists an edge which must be subdivided k times to increase the paired domination number of G. It is known that msdpr(G) ≤ 4 for all graphs G. We characterize block graphs with msdpr(G) = 4.

    Full text available to download

  • Self-Organizing Map representation for clustering Wikipedia search results

    The article presents an approach to automated organization of textual data. The experiments have been performed on selected sub-set of Wikipedia. The Vector Space Model representation based on terms has been used to build groups of similar articles extracted from Kohonen Self-Organizing Maps with DBSCAN clustering. To warrant efficiency of the data processing, we performed linear dimensionality reduction of raw data using Principal...

  • Self–Organizing Map representation for clustering Wikipedia search results

    Publication

    - Year 2011

    The article presents an approach to automated organization of textual data. The experiments have been performed on selected sub-set of Wikipedia. The Vector Space Model representation based on terms has been used to build groups of similar articles extracted from Kohonen Self-Organizing Maps with DBSCAN clustering. To warrant efficiency of the data processing, we performed linear dimensionality reduction of raw data using Principal...

    Full text to download in external service

  • Follow the Light. Where to search for useful research information

    Architectural Lighting Design (ALD) has never been a standalone professional discipline. Rather, it has existed as the combination of art and the science of light. Today, third generation lighting professionals are already creatively intertwining these fields, and the acceleration in scientific, technological and societal studies has only increased the need for reliable multidisciplinary information. Therefore, a thorough re-examination...

    Full text available to download

  • Development of Local IDF-formula Using Controlled Random Search Method for Global Optimization

    Publication

    The aim of the study is to present the effective and relatively simple empirical approach to rainfall Intensity-Duration-Frequency-formulas development, based on Controlled Random Search (CRS) for global optimization. The approach is mainly dedicated to the cases in which the commonly used IDF-relationships do not provide satisfactory fit between simulations and observations, and more complex formulas with higher number of parameters...

    Full text available to download

  • On the independence number of some strong products of cycle-powers

    In the paper we give some theoretical and computational results on the third strong power of cycle-powers, for example, we have found the independence numbers alpha((C^2_10)^⊠3) = 30 and alpha((C^4 _14)^⊠3) = 14. A number of optimizations have been introduced to improve the running time of our exhaustive algorithm used to establish the independence number of the third strong power of cycle-powers. Moreover, our results establish...

    Full text available to download

  • In Search of Naval Beauty. Historical Study of Ship Architecture

    Publication

    - Year 2018

    Designing ships is no mean achievement. In the old days, constructors focused on making their ships visually appealing, while paying scant regard to the living conditions of the crew. Such an approach reflected the state of the art in ship building at the time as well as the social order prevalent in those days. A breakthrough came no earlier than at the turn of the 19th / 20th centuries. The industrial revolution brought along...

    Full text to download in external service

  • Comparison of the Efficiency of Turbo Codes with Mechanisms of Reducing the Number of Iterations

    The paper presents the construction of encoders and decoders turbo codes with different number of states. Simulation results of the transmission quality of the turbo codes were presented. Decoders for turbo codes have worked with a fixed number of iterations and with the mechanisms reducing the number of iterations. Data were transmitted in Outdoor to Indoor & Pedestrian B environment for data rate 384 kbps. The SOVA algorithm...

  • Entanglement and Nonlocality are Inequivalent for Any Number of Parties

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2015

    Understanding the relation between nonlocality and entanglement is one of the fundamental problems in quantum physics. In the bipartite case, it is known that these two phenomena are inequivalent, as there exist entangled states of two parties that do not violate any Bell inequality. However, except for a single example of an entangled three-qubit state that has a local model, almost nothing is known about such a relation in multipartite...

    Full text to download in external service

  • Bounds on the vertex-edge domination number of a tree

    Publication

    - COMPTES RENDUS MATHEMATIQUE - Year 2014

    A vertex-edge dominating set of a graph $G$ is a set $D$ of vertices of $G$ such that every edge of $G$ is incident with a vertex of $D$ or a vertex adjacent to a vertex of $D$. The vertex-edge domination number of a graph $G$, denoted by $\gamma_{ve}(T)$, is the minimum cardinality of a vertex-edge dominating set of $G$. We prove that for every tree $T$ of order $n \ge 3$ with $l$ leaves and $s$ support vertices we have $(n-l-s+3)/4...

    Full text available to download

  • Search for the most useful geometry of an acoustic journal bearing

    Publication

    - TRIBOLOGIA - Year 2017

    Computer simulations of a number of journal bearing’s geometries utilising acoustic levitation were carried out. The choice of the best geometry depended on the ability of a deformed shape, created by piezo-electric elements, to facilitate squeeze film ultrasonic levitation, and also to create three evenly distributed diverging aerodynamic gaps. Deformations of analysed variants of the bearing’s shape were generated by numerical...

    Full text available to download

  • SEARCH-Journal of Media and Communication Research

    Journals

    eISSN: 2672-7080

  • Constant-Factor Approximation Algorithm for Binary Search in Trees with Monotonic Query Times

    Publication

    - Year 2022

    We consider a generalization of binary search in linear orders to the domain of weighted trees. The goal is to design an adaptive search strategy whose aim is to locate an unknown target vertex of a given tree. Each query to a vertex v incurs a non-negative cost ω(v) (that can be interpreted as the duration of the query) and returns a feedback that either v is the target or the edge incident to v is given that is on the path towards...

    Full text to download in external service

  • Entrained Flow Plasma Gasification of Sewage Sludge–Proof-of-Concept and Fate of Inorganics

    Publication
    • D. Mikielewicz
    • P. Ziółkowski
    • V. Vishwajeet
    • H. Pawlak-kruczek
    • M. Baranowski
    • M. Czerep
    • A. Chorążyczkowski
    • K. Krochmalny
    • K. Ostrycharczyk
    • P. Madejski... and 5 others

    - ENERGIES - Year 2022

    Sewage sludge is a residue of wastewater processing that is biologically active and consists of water, organic matter, including dead and living pathogens, polycyclic aromatic hydrocarbons, and heavy metals, as well as organic and inorganic pollutants. Landfilling is on the decline, giving way to more environmentally friendly utilisation routes. This paper presents the results of a two-stage gasification–vitrification system, using...

    Full text available to download

  • A Tabu Search Algorithm for Optimization of Survivable Overlay Computing Systems

    Publication

    - Advances in Intelligent Systems and Computing - Year 2012

    Paradygmat obliczeń rozproszonych ostatnio zyskuje coraz większą uwagę, ponieważ zarówno instytucje przemysłowe, jak i uczelnie wymagają coraz większej mocy obliczeniowej do przetwarzania i analizy danych. Z uwagi na dużą podatność systemów obliczeń na awarie różnych typów (podobnie do systemów sieciowych), gwarancje przeżywalności niniejszych systemów są nieodzowne w celu zapewnienia nieprzerwanego działania usług. Z tego powodu,...

    Full text to download in external service

  • Communications in Number Theory and Physics

    Journals

    ISSN: 1931-4523 , eISSN: 1931-4531

  • International Journal of Number Theory

    Journals

    ISSN: 1793-0421 , eISSN: 1793-7310

  • On Improved-Reliability Design Optimization of High-Frequency Structures Using Local Search Algorithms

    The role of numerical optimization has been continuously growing in the design of high-frequency structures, including microwave and antenna components. At the same time, accurate evaluation of electrical characteristics necessitates full-wave electromagnetic (EM) analysis, which is CPU intensive, especially for complex systems. As rigorous optimization routines involve repetitive EM simulations, the associated cost may be significant....

    Full text available to download

  • Impact of Cyclist Facility Availability at Work on the Number of Bike Commuters

    The article describes the results of research designed to establish whether cycle provision can influence the number of employees commuting by bike. To that end, employee surveys were conducted in three IT companies in 2012 and 2016. The questionnaire asked about travel behaviour and what the staff thought about their company’s provision of cyclist facilities. Since 2012 each of the companies has moved its head office and the...

    Full text to download in external service

  • Can Web Search Queries Predict Prices Change on the Real Estate Market?

    Publication

    This study aims to explore whether the intensity of internet searches, according to the Google Trends search volume index (SVI), is a predictor of changes in real estate prices. The motivation of this study is the possibility to extend the understanding of the extra predictive power of Google search engine query volume of future housing price change (shift direction) by (i) the introduction of a research approach that combines...

    Full text available to download

  • Use of Modified Cuckoo Search algorithm in the design process of integrated power systems for modern and energy self-sufficient farms

    Publication

    In the face of increasingly stringent pollutant emission regulations, designing an agricultural holding becomes a difficult challenge of connecting a large number of coefficients that describe an energy system of a farm in regard to its ecological and economic efficiency. One way to cope with this issue is to design an energy self-sufficient farm that integrates various technologies, including renewable energy. However, the selection...

    Full text to download in external service

  • Approximate search strategies for weighted trees

    Publication

    W pracy podajemy 3-przybliżony algorytm dla problemu spójnego przeszukiwania drzew ważonych.

    Full text available to download

  • In search of a common ground for the space sciences

    Publication

    - Year 2019

    The paper discusses the relations between various aspects of human activities performed in space, taking into consideration the past, present and future contexts. Interdisciplinarity and integrity of technological issues combined with legal and management issues were emphasized. Consequently, it was recognized that it is necessary to build a network of universities, research-and-development companies and engineering companies....

    Full text to download in external service

  • Intelligent Resources Search in Virtual Libraries.

    Publication

    - Year 2004

    Została zaprezentowana koncepcja bibliotek cyfrowych oraz temat wyszukiwania zasobów. W celu poprawy jakości procesu wyszukiwania, zostało zaproponowane użycie koncepcji sieci semantycznej zamiast klasycznego sposóbu opisu zasobów bibliograficznych. Została opisana prosta ontologia oparta o Dublin Core meta-data. Zostało przedyskutowane zastosowanie algorytmu przetważania połączeń semantycznych w celu szukania. Zastosowany w Wirtualnej...

  • Proof-of-concept study on improved efficacy of rHuEPO administered as a long-term infusion in rats

    Publication

    - Pharmacological Reports - Year 2020

    Full text to download in external service

  • Greening procedures and analytical parameters. The polychlorinated naphthalenes analysis in complex matrices as proof of concept

    Due to the complexity of analytical procedures employed for the determination of wide spectrum of persistent organic pollutants (POPs), it is important to consider the green character of the applied protocols and propose the greenest solutions. In this review, the green aspects of several analytical procedures used for the determination of polychlorinated naphthalenes (PCNs) (as a representatives of POPs) in different types of...

    Full text to download in external service

  • Proof of Concept of Indoor Location System Using Long RFID Readers and Passive Tags

    Publication

    The paper proposes a system for persons and objects location with the use of long radio-frequency identifications (RFIDs) readers. In order to investigate all aspects of the proposed location system, several key elements had to be analyzed, including the distance from which the tagged objects and the possibility of using more than one tag within one RFID range at the same time. When designing the system, it is also necessary to...

    Full text to download in external service

  • Experimental Investigation of the Performance of an Innovative Implantable Left Ventricular Assist Device—Proof of Concept

    Publication

    This paper presents the results of experimental performance of an innovative left ventricular assist device working on a specially designed test stand. The introduced invention is mainly applied for supporting the heart in patients with end-stage heart failure accompanied by mitral valve regurgitation and pulmonary hypertension. Moreover, the developed device has the form of a flexible balloon forming an intracardiac inert gas-filled...

    Full text available to download

  • How proteins bind to DNA: target discrimination and dynamic sequence search by the telomeric protein TRF1

    Publication

    Target search as performed by DNA-binding proteins is a complex process, in which multiple factors contribute to both thermodynamic discrimination of the target sequence from overwhelmingly abundant off-target sites and kinetic acceleration of dynamic sequence interrogation. TRF1, the protein that binds to telomeric tandem repeats, faces an intriguing variant of the search problem where target sites are clustered within short fragments...

    Full text available to download

  • Paired domination versus domination and packing number in graphs

    Publication

    Given a graph G = (V(G), E(G)), the size of a minimum dominating set, minimum paired dominating set, and a minimum total dominating set of a graph G are denoted by γ (G), γpr(G), and γt(G), respectively. For a positive integer k, a k-packing in G is a set S ⊆ V(G) such that for every pair of distinct vertices u and v in S, the distance between u and v is at least k + 1. The k-packing number is the order of a largest kpacking and...

    Full text available to download

  • A lower bound on the total outer-independent domination number of a tree

    Publication

    A total outer-independent dominating set of a graph G is a set D of vertices of G such that every vertex of G has a neighbor in D, and the set V(G)D is independent. The total outer-independent domination number of a graph G, denoted by gamma_t^{oi}(G), is the minimum cardinality of a total outer-independent dominating set of G. We prove that for every nontrivial tree T of order n with l leaves we have gamma_t^{oi}(T) >= (2n-2l+2)/3,...

    Full text to download in external service

  • Mechanical exfoliation and layer number identification of single crystal monoclinic CrCl3

    Publication
    • S. Kazim
    • M. Alì
    • S. Palleschi
    • G. D’Olimpio
    • D. Mastrippolito
    • A. Politano
    • R. Gunnella
    • A. DiCicco
    • M. Renzelli
    • G. Moccia... and 6 others

    - NANOTECHNOLOGY - Year 2020

    After the recent finding that CrI3, displays ferromagnetic order down to its monolayer, extensive studies have followed to pursue new two-dimensional (2D) magnetic materials. In this article, we report on the growth of single crystal CrCl3 in the layered monoclinic phase. The system after mechanical exfoliation exhibits stability in ambient air (the degradation occurs on a time scale at least four orders of magnitude longer than...

    Full text to download in external service

  • An upper bound on the 2-outer-independent domination number of a tree

    Publication

    A 2-outer-independent dominating set of a graph G is a set D of vertices of G such that every vertex of V(G)D has a at least two neighbors in D, and the set V(G)D is independent. The 2-outer-independent domination number of a graph G, denoted by gamma_2^{oi}(G), is the minimum cardinality of a 2-outer-independent dominating set of G. We prove that for every nontrivial tree T of order n with l leaves we have gamma_2^{oi}(T) <= (n+l)/2,...

    Full text to download in external service

  • An upper bound on the total outer-independent domination number of a tree

    Publication

    A total outer-independent dominating set of a graph G=(V(G),E(G)) is a set D of vertices of G such that every vertex of G has a neighbor in D, and the set V(G)D is independent. The total outer-independent domination number of a graph G, denoted by gamma_t^{oi}(G), is the minimum cardinality of a total outer-independent dominating set of G. We prove that for every tree T of order n >= 4, with l leaves and s support vertices we have...

    Full text available to download

  • Realistic noise-tolerant randomness amplification using finite number of devices

    Publication
    • F. Brandão
    • R. Ramanathan
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • T. Szarek
    • H. Wojewódka

    - Nature Communications - Year 2016

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...

    Full text available to download