Filters
total: 323
filtered: 253
Search results for: SUSSET
-
On trees with double domination number equal to 2-domination number plus one
PublicationA vertex of a graph is said to dominate itself and all of its neighbors. A subset D subseteq V(G) is a 2-dominating set of G if every vertex of V(G)D is dominated by at least two vertices of D, while it is a double dominating set of G if every vertex of G is dominated by at least two vertices of D. The 2-domination (double domination, respectively) number of a graph G is the minimum cardinality of a 2-dominating (double dominating,...
-
The Snow Team Problem
PublicationWe study several problems of clearing subgraphs by mobile agents in digraphs. The agents can move only along directed walks of a digraph and, depending on the variant, their initial positions may be pre-specified. In general, for a given subset~$\cS$ of vertices of a digraph $D$ and a positive integer $k$, the objective is to determine whether there is a subgraph $H=(\cV_H,\cA_H)$ of $D$ such that (a) $\cS \subseteq \cV_H$, (b)...
-
Differentiating patients with obstructive sleep apnea from healthy controls based on heart rate-blood pressure coupling quantified by entropy-based indices
PublicationWe introduce an entropy-based classification method for pairs of sequences (ECPS) for quantifying mutual dependencies in heart rate and beat-to-beat blood pressure recordings. The purpose of the method is to build a classifier for data in which each item consists of two intertwined data series taken for each subject. The method is based on ordinal patterns and uses entropy-like indices. Machine learning is used to select a subset...
-
Melatonin as a major skin protectant: from free radical scavenging to DNA damage repair
Publication -
Natural convective heat transfer from isothermal cuboids
PublicationThe paper presents results of theoretical and experimental investigations of the convective heat transfer from isothermal cuboid. The analytical solution was performed taking into account complete boundary layer length and the manner of its propagation around isothermal cuboid. It arises at horizontal bottom surface and grows on vertical lateral surface of the block. After changing its direction, the boundary layer occurs above...
-
Numerical single-phase modeling of turbulent flow and heat transfer of nanofluids
PublicationIn this work, Nusselt number and friction factor are calculated numerically for turbulent pipe flow (6 000< Re < 12 000) with constant heat flux boundary condition using nanofluids. The nanofluid is modelled with the single-phase approach and the simulation results are compared with published experimental data.
-
A study of jet impingement cooling enhancement by concave and convex heat sink shape modifications
PublicationThe rising demand for efficient cooling technologies is a strong driver of extensive research in this area. This trend is particularly strong in turbines and microprocessors technology. Presented study is focused on the jet impingement cooling concept, which is used in various configurations for many years. The potential of the heat sink shape modification is not yet fully explored. Available literature suggests that average Nusselt...
-
Bipartite theory of graphs: outer-independent domination
PublicationLet $G = (V,E)$ be a bipartite graph with partite sets $X$ and $Y$. Two vertices of $X$ are $X$-adjacent if they have a common neighbor in $Y$, and they are $X$-independent otherwise. A subset $D \subseteq X$ is an $X$-outer-independent dominating set of $G$ if every vertex of $X \setminus D$ has an $X$-neighbor in $D$, and all vertices of $X \setminus D$ are pairwise $X$-independent. The $X$-outer-independent domination number...
-
Numerical Study of Turbulent Flow and Heat Transfer of Nanofluids in Pipes
PublicationIn this work, Nusselt number and friction factor are calculated numerically for turbulent pipe flow (Reynolds number between 6000 and 12000) with constant heat flux boundary condition using nanofluids. The nanofluid is modelled with the single-phase approach and the simulation results are compared with experimental data. Ethylene glycol and water, 60:40 EG/W mass ratio, as base fluid and SiO2 nanoparticles are used as nanofluid...
-
Analysis of dynamics of a map-based neuron model via Lorenz maps
PublicationModeling nerve cells can facilitate formulating hypotheses about their real behavior and improve understanding of their functioning. In this paper, we study a discrete neuron model introduced by Courbage et al. [Chaos 17, 043109 (2007)], where the originally piecewise linear function defining voltage dynamics is replaced by a cubic polynomial, with an additional parameter responsible for varying the slope. Showing that on a large...
-
Weakly convex domination subdivision number of a graph
PublicationA set X is weakly convex in G if for any two vertices a; b \in X there exists an ab–geodesic such that all of its vertices belong to X. A set X \subset V is a weakly convex dominating set if X is weakly convex and dominating. The weakly convex domination number \gamma_wcon(G) of a graph G equals the minimum cardinality of a weakly convex dominating set in G. The weakly convex domination subdivision number sd_wcon (G) is the minimum...
-
FPGA-Based Implementation of Real Time Optical Flow Algorithm and Its Applications for Digital Image Stabilization
PublicationAn efficient simplification procedure of the optical flow (OF) algorithm as well as its hardware implementation using the field programmable gate array (FPGA) technology is presented. The modified algorithm is based on block matching of subsets of successive frames, and exploits one-dimensional representation of subsets as well as the adaptive adjustments of their sizes. Also, an l1-norm-based correlation function requiring no...
-
Numerical study of turbulent flow and heat transfer of nanofluids in pipes
PublicationIn this work, Nusselt number and friction factor are calculated numerically for turbulent pipe flow (6 000 < Re < 12 000) with constant heat flux boundary condition using nanofluids. The nanofluid is modelled with the single-phase approach and the simulation results are compared with experimental data of Vajjha et al. [1]. Ethylene glycol and water, 60:40 EG/W mass ratio, as base fluid and SiO2 nanoparticles are used as nanofluid...
-
Turbulence model evaluation for numerical modelling of turbulent flow and heat transfer of nanofluids
PublicationIn this work, Nusselt number and friction factor are calculated numerically for turbulent pipe flow (Reynolds number between 6000 and 12000) with constant heat flux boundary condition using nanofluids. The nanofluid is modelled with the single-phase approach and the simulation results are compared with experimental data. Ethylene glycol and water, 60:40 EG/W mass ratio, as base fluid and SiO2 nanoparticles are used as nanofluid...
-
Surgical tool tracking by on-line selection of structural correlation filters
PublicationIn visual tracking of surgical instruments, correlation filtering finds the best candidate with maximal correlation peak. However, most trackers only consider capturing target appearance but not target structure. In this paper we propose surgical instrument tracking approach that integrates prior knowledge related to rotation of both shaft and tool tips. To this end, we employ rigid parts mixtures model of an instrument. The rigidly...
-
Global defensive sets in graphs
PublicationIn the paper we study a new problem of finding a minimum global defensive set in a graph which is a generalization of the global alliance problem. For a given graph G and a subset S of a vertex set of G, we define for every subset X of S the predicate SEC ( X ) = true if and only if | N [ X ] ∩ S | ≥ | N [ X ] \ S | holds, where N [ X ] is a closed neighbourhood of X in graph G. A set S is a defensive alliance if and only if for...
-
Melatonin: A Cutaneous Perspective on its Production, Metabolism, and Functions
Publication -
Efficiency Evaluation of High Performance Computing Systems Using Data Envelopment Analysis
PublicationThe paper presents an evaluation method of high performance computing (HPC) systems using multicriteria efficiency analysis. The Data Envelopment Analysis approach was applied and adapted to the specifics of HPC, which enabled us to compare relative efficiency of systems considering simultaneously multiple parameters. The analysis is based on the TOP500 list of world largest supercomputers and their parameters such as: the number...
-
A Survey Investigating the Influence of Business Analysis Techniques on Software Quality Characteristics
PublicationBusiness analysis is recognized as one of the most important areas determining the outcome (success or failure) of a software project. In this paper we explore this subject further by investigating the potential impact of techniques applied in business analysis on essential software quality characteristics. We conducted a literature search for software quality models, analyzed the existing models and selected a subset of commonly...
-
An Industrial Survey on Business Analysis Problems and Solutions
PublicationThe paper focuses on the problems reported by business analysts which have a negative impact on their work and on the applicability of available business analysis (BA) techniques as solutions to such problems. A unified set of BA techniques was developed on the basis of 3 industrial standards associated with IIBA, REQB and IREB certification schemes. A group of 8 business analysts was surveyed to list problems they encounter in...
-
Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks
PublicationDominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...
-
Performance Models of a Multidomain IMS/NGN Service Stratum
PublicationThis paper quantifies call processing performance (CPP) of a multidomain IMS/NGN architecture, which was proposed to deliver current and future telecommunication services with strict quality requirements, independently of the transport network technologies. A realistic simulation model is used as a reference for evaluation of the analytical results, in which vari-ous types of queuing systems are applied to model the opera-tion...
-
Isolation Number versus Domination Number of Trees
PublicationIf G=(VG,EG) is a graph of order n, we call S⊆VG an isolating set if the graph induced by VG−NG[S] contains no edges. The minimum cardinality of an isolating set of G is called the isolation number of G, and it is denoted by ι(G). It is known that ι(G)≤n3 and the bound is sharp. A subset S⊆VG is called dominating in G if NG[S]=VG. The minimum cardinality of a dominating set of G is the domination number, and it is denoted by γ(G)....
-
Theoretical consideration of free convective heat transfer from a round isothermal plate slightly inclined from the vertical
PublicationA semi-analytical solution of simplified Navier-Stokes and Fourier-Kirchhoff equations describing free convective heat transfer from a round isothermal surface slightly inclined from the vertical is presented. The solution is based on the assumption, typical for natural convection, that the velocity component normal to the surface is negligibly small in comparison to the tangential one. Next we neglect the nonlinear inertia force...
-
Identification of novel halogenated naturally occurring compounds in marine biota by high-resolution mass spectrometry and combined screening approaches
PublicationMarine animals, plants or bacteria are a source of bioactive naturally-occurring halogenated compounds (NHCs) such as bromophenols (BPs), bromoanisoles (BAs) and hydroxylated or methoxylated analogues of polybrominated diphenyl ethers (HO-PBDEs, MeO-PBDEs) and bromobiphenyls (HO-BBs, MeO-BBs). This study applied a comprehensive screening approach using liquid chromatography high-resolution mass spectrometry and combining target,...
-
Usefulness of Keystroke Dynamics Features in User Authentication and Emotion Recognition
PublicationThe study presented in the article focuses on keystroke dynamics analysis applied to recognize emotional states and to authenticate users. An overview of some studies and applications in these areas is presented. Then, an experiment is described, i.e. the way of collecting data, extracting features, training classifiers and finding out the most appropriate feature subsets. The results show that it is difficult to indicate a universal...
-
On trees with double domination number equal to 2-outer-independent domination number plus one
PublicationA vertex of a graph is said to dominate itself and all of its neighbors. A double dominating set of a graph G is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D. The double domination number of a graph G is the minimum cardinality of a double dominating set of G. For a graph G=(V,E), a subset D subseteq V(G) is a 2-dominating set if every vertex of V(G)D has at least two neighbors...
-
Automatic recognition of therapy progress among children with autism
PublicationThe article presents a research study on recognizing therapy progress among children with autism spectrum disorder. The progress is recognized on the basis of behavioural data gathered via five specially designed tablet games. Over 180 distinct parameters are calculated on the basis of raw data delivered via the game flow and tablet sensors - i.e. touch screen, accelerometer and gyroscope. The results obtained confirm the possibility...
-
Verification of the Analytical Traffic Model of a Multidomain IMS/NGN Using the Simulation Model
PublicationIn this paper we verify the previously proposed analytical traffic model of a multidomain Next Generation Network (NGN), which is standardized for delivering multimedia services based on the IP Multimedia Subsystem (IMS). For this reason a proper simulation model used, in which not theoretical queuing system models but the operation of real network elements and standardized call scenarios are accurately implemented. Consequently,...
-
Bounds on the cover time of parallel rotor walks
PublicationThe rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node successively propagates walkers visiting it along its outgoing arcs in round-robin fashion, according to a fixed ordering. We consider...
-
Call processing performance in multidomain IMS/NGN architecture
PublicationThe Next Generation Network (NGN) architecture, which bases on the IP Multimedia Subsystem (IMS) concept, is a proposition of a telecommunication network dedicated to the needs of the modern information society. The main goal of NGN is to provide Quality of Service (QoS), for which proper network design and dimensioning are necessary. This also requires appropriate traffic models, which should be efficient and not excessively complicated...
-
Possibility of thermal imaging use in studies of natural convection heat transfer on the example of an isothermal vertical plate.
PublicationA new method of infrared (IR) camera use in convective heat transfer studies has been presented. Until now, IR cameras were utilized for temperature field visualizations of flat heated surfaces of solid objects only. Because liquids and gasses do not emit radiation in the infrared range of wave lengths, detection of temperature field in the air was conducted with the use of plastic mesh, which, after heating by hot air, emits infrared...
-
Modeling of Passive and Forced Convection Heat Transfer in Channels with Rib Turbulators
PublicationThe main goal of the research presented in this paper was the experimental and numerical analysis of heat enhancement and aerodynamic phenomena during air flow in a channel equipped with flow turbulators in the form of properly configured ribs. The use of ribs intensifies the heat transfer and at the same time increases not only the flow resistance but also the energy costs. Therefore, designing modern heat exchangers with optimal...
-
On-Line Partitioning for On-Line Scheduling with Resource Conflicts
PublicationWithin this paper, we consider the problem of on-line partitioning the sequence of jobs which are competing for non-sharable resources. As a result of partitioning we get the subsets of jobs that form separate instances of the on-line scheduling problem. The objective is to generate a partition into the minimum number of instances such that the response time of any job in each instance is bounded by a given constant. Our research...
-
Autonomous Battery Drive in Trolleybuses: an Overview of Practical Examples
PublicationBattery electric buses are believed to be means of transportation of the future. However, despite the continuous development of electrochemical batteries technology and the multitude of electric buses on offer, it is still no proved solutions that can be widely used. Charging is the one of the weakness point of the electric buses. Trolleybuses are alternative for them. Especially, trolleybuses equipment with traction batteries...
-
Low-Cost Behavioral Modeling of Antennas by Dimensionality Reduction and Domain Confinement
PublicationBehavioral modeling has been rising in importance in modern antenna design. It is primarily employed to diminish the computational cost of procedures involving massive full-wave electromagnetic (EM) simulations. Cheaper alternative offer surrogate models, yet, setting up data-driven surrogates is impeded by, among others, the curse of dimensionality. This article introduces a novel approach to reduced-cost surrogate modeling of...
-
Modeling Object Oriented Systems via Controlled English Verbalization of Description Logic
PublicationThe need for formal methods for Object Oriented (OO) systems resulted in methods like UML and Lepus3 that are de-facto graphical languages equipped with formal tools that are able to handle the design of OO systems. However, they lack precise semantics which might lead to problems, such as inconsistencies or redundancies. On the other hand, to our knowledge, there is no approach that allows one to understand and follow the requirements...
-
Graph security testing
PublicationSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
One-dimensional chaos in a system with dry friction: analytical approach
PublicationWe introduce a new analytical method, which allows to find chaotic regimes in non-smooth dynamical systems. A simple mechanical system consisting of a mass and a dry friction element is considered. The corresponding mathematical model is being studied. We show that the considered dynamical system is a skew product over a piecewise smooth mapping of a segment (the so-called base map). For this base map we demonstrate existence of...
-
An accurate assignment test for extremely low‐coverage whole‐genome sequence data
Publication -
An accurate assignment test for extremely low-coverage whole-genome sequence data
Publication -
Wireless LAN with noncooperative anonymous stations: QOS provisioning via war of attrition
PublicationMAC-layer QoS provision necessitates an admission scheme to grant a requested QoS notwithstanding subse-quent requests. For an ad hoc WLAN with anonymous stations, we assume a degree of power awareness to propose a session- rather than frame-level bidding for bandwidth. Next we analyze the underlying Bayesian war of attrition game.
-
Camera angle invariant shape recognition in surveillance systems
PublicationA method for human action recognition in surveillance systems is described. Problems within this task are discussed and a solution based on 3D object models is proposed. The idea is shown and some of its limitations are talked over. Shape description methods are introduced along with their main features. Utilized parameterization algorithm is presented. Classification problem, restricted to bi-nary cases is discussed. Support vector...
-
CLASSIFICATION OF RESTRAINTS IN THE OPTIMIZATION PROBLEM OF A COLD-FORMED PROFILE
PublicationThis work describes the restraints in the optimization problem. This is an important and complicated issue because it requires taking into account a vast range of information related to the design and production. In order to describe the relations of a specific optimization problem, it is essential to adopt appropriate criteria and to collect information on all kinds of restraints, i.e. boundary conditions. The following paper...
-
Keep It Flexible: Driving Macromolecular Rotary Motions in Atomistic Simulations with GROMACS
PublicationWe describe a versatile method to enforce the rotation of subsets of atoms, e.g., a protein subunit, in molecular dynamics (MD) simulations. In particular, we introduce a “flexible axis” technique that allows realistic flexible adaptions of both the rotary subunit as well as the local rotation axis during the simulation. A variety of useful rotation potentials were implemented for the GROMACS 4.5 MD package. Application to the...
-
ATTEMPTS OF THERMAL IMAGING CAMERA USAGE IN ESTIMATIONS OF THE CONVECTIVE HEAT LOSS FROM A VERTICAL PLATE
PublicationIn this paper a new method for determining heat transfer coefficients using a gradient method has been developed. To verify accuracy of the proposed method vertical isothermal heating plate with natural convection mechanism has been examined. This configuration was deliberately chosen, because of the fact that such case is historically the earliest and most thoroughly studied and its rich scientific documentation - the most reliable....
-
Economic benefits of dynamic charging of electric buses
PublicationDiesel engines buses are still the most used type of buses. Electric buses provide promising green alternatives and a lot of advantages, but their main disadvantages are limited travel range and long charging time. This article is a presentation of innovative solution for charging of electric busses - Dynamic Charging (IMC). The modern IMC system in Solingen was presented. At the end of the article, a proposal was made to introduce...
-
Traffic model for evaluation of call processing performance parameters in IMS-based NGN
PublicationIn the modern world requirements for accurate and fast information distribution are becoming more and more important, which creates a strong necessity for appropriate telecommunication network architecture. Proposition of such an architecture is the Next Generation Network (NGN) concept, which in order to guarantee Quality of Service (QoS), should be correctly designed and dimensioned. For this reason proper traffic models must...
-
An Ontology-based Contextual Pre-filtering Technique for Recommender Systems
PublicationContext-aware Recommender Systems aim to provide users with the most adequate recommendations for their current situation. However, an exact context obtained from a user could be too specific and may not have enough data for accurate rating prediction. This is known as the data sparsity problem. Moreover, often user preference representation depends on the domain or the specific recommendation approach used. Therefore, a big effort...
-
Things You Might Not Know about the k-Nearest Neighbors Algorithm
PublicationRecommender Systems aim at suggesting potentially interesting items to a user. The most common kind of Recommender Systems is Collaborative Filtering which follows an intuition that users who liked the same things in the past, are more likely to be interested in the same things in the future. One of Collaborative Filtering methods is the k Nearest Neighbors algorithm which finds k users who are the most similar to an active user...