Search results for: EVOLAP GRAPH - Bridge of Knowledge

Search

Search results for: EVOLAP GRAPH

Filters

total: 661
filtered: 534

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: EVOLAP GRAPH

  • Trees with equal restrained domination and total restrained domination numbers

    W publikacji scharakteryzowano wszystkie drzewa, w których liczby dominowania powściągniętego oraz podwójnie totalnego są sobie równe.

    Full text available to download

  • Weakly connected domination subdivision numbers

    Liczba podziału krawędzi dla dominowania słabo spójnego to najmniejsza liczba krawędzi jaką należy podzielić, aby wzrosła liczba dominowania słabo wypukłego. W pracy przedstawione są własności liczby podziału krawędzi dla dominowania słabo spójnego dla różnych grafów.

    Full text available to download

  • Total outer-connected domination in trees

    W pracy przedstawiono dolne ograniczenie na liczbę dominowania totalnego zewnętrznie spójnego w grafach oraz scharakteryzowano wszystkie drzewa osiągające to ograniczenie.

    Full text available to download

  • Convex universal fixers

    Publication

    Praca dotyczy dominowania wypukłego w grafach pryzmowych.

    Full text available to download

  • Network Approach to Increments of RR-intervals for Visualization of Dynamics of Cardiac Regulation

    Publication

    - Year 2014

    The transition network for RR -increments is pre- sented in a directed and weighted graph, with vertices represent- ing RR -increments and edges corresponding to the order in a sequence of increments. The adjacency matrix and the transition matrix of this network provide a graphical tool which could be useful in the assessment of cardiac regulation. As an example, the method is applied in detecting differences between diurnal activity...

    Full text to download in external service

  • A note on mixed tree coloring

    Publication

    - INFORMATION PROCESSING LETTERS - Year 2008

    Zaproponowano liniowy algorytm dla problemu kolorowania mieszanego w drzewach, uzyskując tym samym poprawę w stosunku do algorytmu o złożoności O(n^2) podanego w pracy [P. Hansen, J. Kuplinsky, D. de Werra, Mixed graph colorings, Math. Methods Oper. Res. 45 (1997) 145-160].

    Full text to download in external service

  • An Approximation of the Zero Error Capacity by a Greedy Algorithm

    Publication

    - Year 2020

    We present a greedy algorithm that determines a lower bound on the zero error capacity. The algorithm has many new advantages, e.g., it does not store a whole product graph in a computer memory and it uses the so-called distributions in all dimensions to get a better approximation of the zero error capacity. We also show an additional application of our algorithm.

  • An Approximation of the Zero Error Capacity by a Greedy Algorithm.

    Publication

    - Year 2020

    We present a greedy algorithm that determines a lower bound on the zero error capacity. The algorithm has many new advantages, e.g., it does not store a whole product graph in a computer memory and it uses the so-called distributions in all dimensions to get a better approximation of the zero error capacity. We also show an additional application of our algorithm.

    Full text to download in external service

  • Recognition, understanding and aestheticization of freehand drawing flowcharts

    Publication

    - Year 2007

    In this paper a concept of FCA, a system for recognizing, understanding and aestheticization of freehand drawing flow charts is described. The system is based on a proposed by the author FlowGram graph grammar describing flow charts drawing. An open format FlowChartML for flow charts description is also proposed. The aestheticization criterion is formulated that allows for automatic beautification of flow charts. First experiments...

  • On zero-error codes produced by greedy algorithms

    We present two greedy algorithms that determine zero-error codes and lower bounds on the zero-error capacity. These algorithms have many advantages, e.g., they do not store a whole product graph in a computer memory and they use the so-called distributions in all dimensions to get better approximations of the zero-error capacity. We also show an additional application of our algorithms.

    Full text available to download

  • Separability Assessment of Selected Types of Vehicle-Associated Noise

    Music Information Retrieval (MIR) area as well as development of speech and environmental information recognition techniques brought various tools in-tended for recognizing low-level features of acoustic signals based on a set of calculated parameters. In this study, the MIRtoolbox MATLAB tool, designed for music parameter extraction, is used to obtain a vector of parameters to check whether they are suitable for separation of...

    Full text to download in external service

  • Complexity Issues on of Secondary Domination Number

    Publication

    - ALGORITHMICA - Year 2023

    In this paper we study the computational complexity issues of the problem of secondary domination (known also as (1, 2)-domination) in several graph classes. We also study the computational complexity of the problem of determining whether the domination and secondary domination numbers are equal. In particular, we study the influence of triangles and vertices of degree 1 on these numbers. Also, an optimal algorithm for finding...

    Full text available to download

  • Cooperative Word Net Editor for Lexical Semantic Acquisition

    Publication

    - Year 2011

    The article describes an approach for building Word Net semantic dictionary in a collaborative approach paradigm. The presented system system enables functionality for gathering lexical data in a Wikipedia-like style. The core of the system is a user-friendly interface based on component for interactive graph navigation. The component has been used for Word Net semantic network presentation on web page, and it brings functionalities...

    Full text to download in external service

  • Generalized Gradient Equivariant Multivalued Maps, Approximation and Degree

    Publication

    Consider the Euclidean space Rn with the orthogonal action of a compact Lie group G. We prove that a locally Lipschitz G-invariant mapping f from Rn to R can be uniformly approximated by G-invariant smooth mappings g in such a way that the gradient of g is a graph approximation of Clarke’s generalized gradient of f . This result enables a proper development of equivariant gradient degree theory for a class of set-valued gradient...

    Full text available to download

  • Proposal of a method for effective tasks distribution in the execution of compolex problems

    An access to a great number of various services allows for decomposition of complex problems into smaller and less complex tasks. Those tasks can be presented in a form of a dependency graph. This paper shows an idea of executing such a problem using cooperating autonomous agents. Main focus of this work is cooperation covering effective tasks distribution among executors. This paper presents an algorithm for dynamic executor selection...

  • Reliability of production machines in the bakery industry – theoretical and practical issues

    Publication

    The aim of the article is to present probabilistic models, which were then used to analyze the reliability of production machines in the baking industry. The author conducted research in the period from January 2, 2016 to December 31, 2018 regarding the measurement of reliability of a traditional production system based on a probabilistic concept. Due to the limited scope of the article, reliability calculations for a set of thermo-oil...

    Full text to download in external service

  • Classification of Polish wines by application of ultra-fast gas chromatography

    The potential of ultra-fast gas chromatography (GC) combined with chemometric analysis for classification of wine originating from Poland according to the variety of grape used for production was investigated. A total of 44 Polish wine samples differing in the type of grape (and grape growth region) used for the production as well as parameters of the fermentation process, alcohol content, sweetness, and others which characterize...

    Full text available to download

  • Zastosowanie odcinków nieliniowej krzywizny w torze zwrotnym rozjazdu kolejowego

    Publication

    W pracy została przedstawiona analityczna metoda kształtowania toru zwrotnego rozjazdu kolejowego posiadającego na swojej długości odcinki nieliniowej krzywizny. Odcinki te służą łagodzeniu wykresu krzywizny w skrajnych strefach rozjazdu W omawianej metodzie dokonano identyfikacji problemu rozkładu krzywizny za pomocą równań różniczkowych. Uzyskane rozwiązania mają charakter uniwersalny; m. in. pozwalają na przyjmowanie dowolnych...

    Full text available to download

  • Zautomatyzowana budowa modeli 3D pomieszczeń

    W artykule przedstawiono budowę systemu do automatycznej budowy modeli 3D wnętrz budynków. System taki może być stosowany do tworzenia lokacji w grach komputerowych. Model jest tworzony na bazie kolorowych oraz głębokościowych obrazów pobranych z kamery Microsoft Kinect. Opisano architekturę komponentową systemu, zastosowane sterowniki do komunikacji. Podano zastosowany algorytm sekwencyjny i równoległy, środowisko testowe oraz...

  • Study of the Flow Dynamics of Surface Water Masses in the Area of the Coastal Gulf of Gdansk

    Publication

    - Year 2017

    The paper describes two methods of predicting the movement of small objects with surface water masses. One of the methods uses graph theory to describe the motion of water masses in port docks. The results of this study were compared to a simulation using the hydrodynamic numerical model M3D. The results obtained in a virtual environment were related to the experiments in the real world. In the coastal area of the Gulf of Gdansk,...

    Full text to download in external service

  • Port-Based Modelling of Distributed-Lumped Parameter Systems

    Publication

    There in the paper is presented an uniform, port-based approach to modelling of both lumped and distributed parameter systems. Port-based model of the distributed system has been defined by application of bond graph methodology and distributed transfer function method (DTFM). The approach proposed combines versatility of port-based modelling and accuracy of distributed transfer function method. The concise representation of lumped-distributed...

    Full text to download in external service

  • ProSIL Software for functional saferty management in life cycle = Aplikacja ProSIL do zarządzania bezpieczeństwem funkcjonalnym w cyklu życia

    In the paper the ProSIL software to aid the functional safety management is presented. The software consists of three modules to aid: determination of the required SIL level (ProSILen), veryfication of the SIL level (ProSILver). In the aplication the method of the calibrated risk graph to determine the required safety integrity level SIL for defined safety instrumented functions is applied. The methods concerning functional safety...

    Full text available to download

  • On-line Search in Two-Dimensional Environment

    We consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. We require that the strategy is connected and monotone, that is, at each point of the execution the part of the graph...

    Full text available to download

  • Rearrangeability in multicast Clos networks is NP-complete

    Publication

    Przestrajalność w polach Closa z połączeniami jeden do jeden jest problemem wielomianowym. W pracy pokazano, że w polach z połączeniami jeden do wiele problem ten jest NP zupełny.Three-stage elos networks are commutation networks with circuit switching. So far, graph theory has been very useful tool for solving issues related to these networks with unicast connections. This is so because if elos network is represented as a bipartite...

    Full text to download in external service

  • Properties of the triset metric for phylogenetic trees

    Publication

    - Year 2012

    the following paper presents a new polynomial time metric for unrootedphylogenetic trees (based on weighted bipartite graphs and the method ofdetermining a minimum perfect matching) and its properties. also many its properties are presented.

    Full text to download in external service

  • A city is not a tree: a multi-city study on street network and urban life

    Publication

    Christopher Alexander, a British-American scholar, differentiated an old (natural) city from a new (planned) one by structure. The former resembles a “semilattice”, or a complex system encompassing many interconnected sub-systems. The latter is shaped in a graph-theoretical “tree”, which lacks the structural complexity as its sub-systems are compartmentalized into a single hierarchy. This structural distinction explains why, or...

    Full text available to download

  • Brief Announcement: Energy Constrained Depth First Search

    Publication

    - Year 2018

    Depth first search is a natural algorithmic technique for constructing a closed route that visits all vertices of a graph. The length of such route equals, in an edge-weighted tree, twice the total weight of all edges of the tree and this is asymptotically optimal over all exploration strategies. This paper considers a variant of such search strategies where the length of each route is bounded by a positive integer B (e.g. due...

    Full text to download in external service

  • On trees with equal 2-domination and 2-outer-independent domination numbers

    For a graph G = (V,E), a subset D \subseteq V(G) is a 2-dominating set if every vertex of V(G)\D$ has at least two neighbors in D, while it is a 2-outer-independent dominating set if additionally the set V(G)\D is independent. The 2-domination (2-outer-independent domination, respectively) number of G, is the minimum cardinality of a 2-dominating (2-outer-independent dominating, respectively) set of G. We characterize all trees...

    Full text available to download

  • On trees with equal domination and total outer-independent domination numbers

    Publication

    For a graph G=(V,E), a subset D subseteq V(G) is a dominating set if every vertex of V(G)D has a neighbor in D, while it is a total outer-independent dominating set if every vertex of G has a neighbor in D, and the set V(G)D is independent. The domination (total outer-independent domination, respectively) number of G is the minimum cardinality of a dominating (total outer-independent dominating, respectively) set of G. We characterize...

  • Enzyme Conjugation - A Promising Tool for Bio-catalytic and Biotransformation Applications – A Review

    Publication
    • M. A. Muneer
    • S. Fatima
    • N. Hussain
    • T. Mashifana
    • A. Sayed
    • G. Boczkaj
    • M. S. R. Rajoka

    - TOPICS IN CATALYSIS - Year 2024

    Enzymes have revolutionized conventional industrial catalysts as more efficient, eco-friendly, and sustainable substitutes that can be used in different biotechnological processes, food, and pharmaceutical industries. Yet, the enzymes from nature are engineered to make them adapt and enhance their durability in the industrial environment. One promising approach involves the combined use of multiple enzymes that catalyze highly...

    Full text to download in external service

  • Asynchronous Networked Estimation System for Continuous Time Stochastic Processes

    Publication

    In this paper we examine an asynchronous networked estimation system for state estimation of continuous time stochastic processes. Such a system is comprised of several estimation nodes connected using a possibly incomplete communication graph. Each of the nodes uses a Kalman filter algorithm and data from a local sensor to compute local state estimates of the process under observation. It also performs data fusion of local estimates...

  • The Snow Team Problem

    Publication

    - Year 2017

    We study several problems of clearing subgraphs by mobile agents in digraphs. The agents can move only along directed walks of a digraph and, depending on the variant, their initial positions may be pre-specified. In general, for a given subset~$\cS$ of vertices of a digraph $D$ and a positive integer $k$, the objective is to determine whether there is a subgraph $H=(\cV_H,\cA_H)$ of $D$ such that (a) $\cS \subseteq \cV_H$, (b)...

    Full text to download in external service

  • TRAVELLING WAVES FOR LOW–GRADE GLIOMA GROWTH AND RESPONSE TO A CHEMOTHERAPY MODEL

    Publication

    - International Journal of Applied Mathematics and Computer Science - Year 2023

    Low-grade gliomas (LGGs) are primary brain tumours which evolve very slowly in time, but inevitably cause patient death. In this paper, we consider a PDE version of the previously proposed ODE model that describes the changes in the densities of functionally alive LGGs cells and cells that are irreversibly damaged by chemotherapy treatment. Besides the basic mathematical properties of the model, we study the possibility of the...

    Full text available to download

  • Adjusting Game Difficulty by Recreating Behavioral Trees of Human Player Actions

    Publication

    - Year 2013

    This paper presents a proposition of a method for adjusting game difficulty to the current level of player's skills in one-on-one games. The method is based on recognition of human player's actions and recording of those actions in the form of behavioral trees. Such trees are later used to drive behaviors of computer-controlled opponents so that human player has beat hit own strategy and improve on it, to win subsequent games....

  • Polynomial triset metric for unrooted phylogenetic trees

    the following paper presents a polynomial triset metric for unrooted phylogenetic trees (based on weighted bipartite graphs and the method of determining a minimum edge cover) and its basic characteristics. also a list of further directions of research and examples of the wider use of this metric is presented.

  • The Complexity of Zero-Visibility Cops and Robber

    Publication

    - Year 2014

    In this work we deal with the computational complexity aspects of the zero-visibility Cops and Robber game. We provide an algorithm that computes the zero-visibility copnumber of a tree in linear time and show that the corresponding decision problem is NP-complete even for the class of starlike graphs.

    Full text to download in external service

  • Ontology-Driven Rule-Based Model for an Extension of Information Technology Infrastructure Library Processes

    Publication

    The aim of this study is to present the stages for building a development model to create information technology (IT) systems for IT service providers. In order to ensure the consistency of the model, a novel solution is proposed where the stages of the model's construction are controlled using ontologies dedicated to the ITIL standard. In this article, a description of models used to assess the provider organization, with particular...

    Full text to download in external service

  • Decisional DNA based framework for representing Virtual Engineering Objects

    Publication

    - Year 2014

    In this paper, we propose a frame-work to represent the Virtual Engineering Objects (VEO) utilizing Set of Knowledge Experience Structure (SOEKS) and Decisional DNA. A VEO will enable the discovery of new knowledge in a manufacturing unit and the generation of new rules that drive reasoning. The proposed VEO framework will not only be knowledge based representation but it will also have its associated experience embedded within...

  • Błędy w przedstawianiu wyników pomiarów i wartości wielkości fizycznych popełniane w pracach studenckich

    Artykuł powstał na bazie doświadczeń zdobytych podczas pracy dydaktycznej autora jako wykładowcy i nauczyciela akademickiego prowadzącego zajęcia w Laboratorium Podstaw Metrologii. Przytoczono przykłady nieprawidłowości w przedsta-wianiu wyników pomiarów i wartości wielkości fizycznych pochodzące z prac pisemnych studentów i skonfrontowano je z zaleceniami Międzynarodowego Układu Jednostek Miar (SI), oraz polskimi aktami prawnymi.

    Full text available to download

  • Distributed state estimation using a network of asynchronous processing nodes

    Publication

    We consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...

    Full text to download in external service

  • The application of nonlinear curvature sections in the turnout diverging track

    Publication

    The paper presents the analytical method of modelling the diverging track of railway turnout with nonlinear curvature sections. These sections were used for smoothing the graph of curvature in the extreme areas of turnout. The problem of the curvature distribution was identified with the use of differential equations. The resulting solutions are of universal nature for example the ability of assuming any values of curvature at...

    Full text available to download

  • Parallel Computations of Text Similarities for Categorization Task

    Publication

    - Year 2013

    In this chapter we describe the approach to parallel implementation of similarities in high dimensional spaces. The similarities computation have been used for textual data categorization. A test datasets we create from Wikipedia articles that with their hyper references formed a graph used in our experiments. The similarities based on Euclidean distance and Cosine measure have been used to process the data using k-means algorithm....

  • Distributed state estimation using a network of asynchronous processing nodes

    We consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...

    Full text to download in external service

  • Knowledge-based functional safety management using ProSIL software

    In the article the ProSIL software for computer aided functional safety management is presented. The software consists of three modules for the determination of the required SIL level (ProSILen) and verification of the SIL level (ProSILver). In the ProSIL the calibrated knowledge-based risk graph method for determining the required safety integrity level (SIL) of the safety functions identified in hazard analysis is implemented....

    Full text to download in external service

  • CRVG - a new model for wireless networks topology generation

    Publication

    This paper presents a new model of wireless network topology generator. Its main advantage is the possibility of relatively sparse networks generation. Because no iteration is needed, the model can be used for massive generation of networks for testing. The topological properties of produced graphs place them in the class of scale free networks, resembling real ones.

  • Edge-coloring of 3-uniform hypergraphs

    We consider edge-colorings of 3-uniform hypergraphs which is a natural generalization of the problem of edge-colorings of graphs. Various classes of hypergraphs are discussed and we make some initial steps to establish the border between polynomial and NP-complete cases. Unfortunately, the problem appears to be computationally difficult even for relatively simple classes of hypergraphs.

    Full text available to download

  • Big Data i 5V – nowe wyzwania w świecie danych (Big Data and 5V – New Challenges in the World of Data)

    Publication

    - Year 2014

    Rodzaje danych, składające się na zbiory typu Big Data, to m.in. dane generowane przez użytkowników portali internetowych, dane opisujące transakcje dokonywane poprzez Internet, dane naukowe (biologiczne, astronomiczne, pomiary fizyczne itp.), dane generowane przez roboty w wyniku automatycznego przeszukiwania przez nie Internetu (Web mining, Web crawling), dane grafowe obrazujące powiązania pomiędzy stronami WWW itd. Zazwyczaj,...

  • Development and validation of an LC–MS/MS method for the determination of biogenic amines in wines and beers

    Biogenic amines are group of organic, basic, nitrogenous compounds that naturally occur in plant, microorganism, and animal organisms. Biogenic amines are mainly produced through decarboxylation of amino acids. They are formed during manufacturing of some kind of food and beverages such as cheese, wine, or beer. Histamine, cadaverine, agmatine, tyramine, putrescine, and b-phenylethylamine are the most common biogenic amines found...

    Full text available to download

  • Hat problem on the cycle C4

    The topic of our paper is the hat problem. In that problem, each of n people is randomly tted with a blue or red hat. Then everybody can try to guess simultanously his own hat color looking at the hat colors of the other people. The team wins if at least one person guesses his hat color correctly and no one guesses his hat color wrong, otherwise the team loses. The aim is to maximize the probability of win. In this version every...

    Full text available to download

  • Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain

    Publication

    Abstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...

    Full text to download in external service