Search results for: EVOLAP GRAPH - Bridge of Knowledge

Search

Search results for: EVOLAP GRAPH

Filters

total: 661
filtered: 534

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: EVOLAP GRAPH

  • On the partition dimension of trees

    Publication

    - DISCRETE APPLIED MATHEMATICS - Year 2014

    Given an ordered partition Π={P1,P2,…,Pt} of the vertex set V of a connected graph G=(V,E), the partition representation of a vertex v∈V with respect to the partition Π is the vector r(v|Π)=(d(v,P1),d(v,P2),…,d(v,Pt)), where d(v,Pi) represents the distance between the vertex vv and the set Pi. A partition Π of V is a resolving partition of G if different vertices of G have different partition representations, i.e., for every...

    Full text available to download

  • Clearing directed subgraphs by mobile agents

    Publication

    - JOURNAL OF COMPUTER AND SYSTEM SCIENCES - Year 2019

    We study several problems of clearing subgraphs by mobile agents in digraphs. The agents can move only along directed walks of a digraph and, depending on the variant, their initial positions may be pre-specified. In general, for a given subset S of vertices of a digraph D and a positive integer k, the objective is to determine whether there is a subgraph H=(V,A) of D such that (a) S is a subset of V, (b) H is the union of k directed...

    Full text available to download

  • Developing Prognostic Models of Organization Evolution

    Publication

    - Year 2011

    The work focuses on the problem of measuring evolution of IT organizations. Changes in business influence functioning of the IT organization. IT departments or companies must ensure that the needs of their parent company/customers will be met. Therefore they must constantly evolve. Following question can be raised: is it possible to support process of changes the IT organization to run it smoother, faster, easier but with reduced...

  • The complexity of zero-visibility cops and robber

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2015

    We consider the zero-visibility cops & robber game restricted to trees. We produce a characterisation of trees of copnumber k and We consider the computational complexity of the zero-visibility Cops and Robber game. We present a heavily modified version of an already-existing algorithm that computes the zero-visibility copnumber of a tree in linear time and we show that the corresponding decision problem is NP-complete on a nontrivial...

    Full text available to download

  • Variable length sliding models for banking clients face biometry

    An experiment was organized in 100 bank branches to acquire biometric samples from nearly 5000 clients including face images. A procedure for creating face verification models based on continuously expanding database of biometric samples is proposed, implemented, and tested. The presented model applies to circumstances where it is possible to collect and to take into account new biometric samples after each positive verification...

    Full text available to download

  • Choosing the Right Cybersecurity Solution: A Review of Selection and Evaluation Criteria

    Publication

    - Year 2022

    Information technologies evolve continuously reaching pioneering areas that bring in new cybersecurity challenges. Security engineering needs to keep pace with the advancing cyberthreats by providing innovative solutions. At the same time, the foundations that include security and risk assessment methodologies should remain stable. Experts are offered with an extensive portfolio of solutions and an informed choice of a particular...

    Full text available to download

  • Modeling of the internal combustion engine cooling system

    Publication

    The article concerns computer modelling of processes in cooling systems of internal combustion engines. Modelling objectives and existing commercial programs are presented. It also describes Author’s own method of binding graphs used to describe phenomena in the cooling system of a spark ignition engine. The own model has been verified by tests on the engine dynamometer. An example of using a commercial program for experimental...

    Full text available to download

  • On the connected and weakly convex domination numbers

    In this paper we study relations between connected and weakly convex domination numbers. We show that in general the difference between these numbers can be arbitrarily large and we focus on the graphs for which a weakly convex domination number equals a connected domination number. We also study the influence of the edge removing on the weakly convex domination number, in particular we show that a weakly convex domination number...

    Full text available to download

  • Extending Service Selection Algorithms with Interoperability Analysis

    Application development by integration of existing, atomic services reduces development cost and time by extensive reuse of service components. In Service Oriented Architecture, there exist alternative versions of services supplying the same functionality but differing in Quality of Service (QoS) attributes, which enables developers to select services with optimal QoS. Existing algorithms of service selection focus on the formal...

    Full text to download in external service

  • Eventual Convergence of the Reputation-Based Algorithm in IoT Sensor Networks

    Publication

    - SENSORS - Year 2021

    Uncertainty in dense heterogeneous IoT sensor networks can be decreased by applying reputation-inspired algorithms, such as the EWMA (Exponentially Weighted Moving Average) algorithm, which is widely used in social networks. Despite its popularity, the eventual convergence of this algorithm for the purpose of IoT networks has not been widely studied, and results of simulations are often taken in lieu of the more rigorous proof....

    Full text available to download

  • Comparing Phylogenetic Trees by Matching Nodes Using the Transfer Distance Between Partitions

    Publication

    - JOURNAL OF COMPUTATIONAL BIOLOGY - Year 2017

    Ability to quantify dissimilarity of different phylogenetic trees describing the relationship between the same group of taxa is required in various types of phylogenetic studies. For example, such metrics are used to assess the quality of phylogeny construction methods, to define optimization criteria in supertree building algorithms, or to find horizontal gene transfer (HGT) events. Among the set of metrics described so far in...

    Full text to download in external service

  • Applying case studies to teaching architectural investment

    Case studies enable students to encounter practical issues during their education. Experiments conducted in class employing this method often feature simplified models of real-world situations. However, they still enable students to encounter actual problems, to which theoretical knowledge is applied. In architectural education, students carrying out semester projects usually rely on data provided by the teacher, without wondering...

    Full text available to download

  • Research into the Movements of Surface Water Masses in the Basins Adjacent to the Port

    Publication

    - Year 2016

    This paper presents the results of the practical and simulation research into determining the routes of movement of small objects moving together with surface water masses in basins adjacent to the port. The results of this research were referenced against the modelling of routes of small objects in port channel basins. The results of practical research concerning the movement of small objects in basins adjacent to the port were...

    Full text to download in external service

  • Dobór optymalnej liczby jednostek funcjonalnych dla realizacji syntezy wysokiego poziomu układów cyfrowych

    Publication

    W pracy przedstawiono algorytm MNP (ang. minimization the number of procesing elements) wyznaczający liczbę jednostek funkcjonalnych niezbędnych do syntezy wysokiego poziomu zadania opisanego grafem przepływu danych (DFG - ang. data flow graph). Liczba jednostek funkcjonalnych wyznaczana przez prezentowany algorytm jest optymalna zarówno z punktu widzenia kosztów wykonania układu, jak i szybkości jego działania. Rozwiązanie tego...

  • Independence in uniform linear triangle-free hypergraphs

    Publication

    - DISCRETE MATHEMATICS - Year 2016

    The independence number a(H) of a hypergraph H is the maximum cardinality of a set of vertices of H that does not contain an edge of H. Generalizing Shearer’s classical lower bound on the independence number of triangle-free graphs Shearer (1991), and considerably improving recent results of Li and Zang (2006) and Chishti et al. (2014), we show a new lower bound for a(H) for an r-uniform linear triangle-free hypergraph H with r>=2.

    Full text available to download

  • Infographics in Educational Settings: A Literature Review

    Publication

    - IEEE Access - Year 2024

    Infographics are visual representations of data that utilize various graphic elements, including pie charts, bar graphs, line graphs, and histograms. Educators and designers can maximize the potential of infographics as powerful educational tools by carefully addressing challenges and capitalizing on emerging technologies. However, current education systems showcase the need for development guidelines and the best practices targeted...

    Full text available to download

  • The content of biogenic amines in Rondo and Zweigelt wines and correlations between selected wine parameters

    Publication

    - FOOD CHEMISTRY - Year 2022

    The purpose of this study was to evaluate the content of biogenic amines (BAs) in wines using dispersive liquid–liquid microextraction–gas chromatography–mass spectrometry (DLLME-GC–MS). An additional objective was to assess the correlations between selected parameters characterizing the samples such as the content of BAs, sugars, and organic acids, pH, and total acidity. Wines produced from the same grape variety in which alcoholic...

    Full text available to download

  • Factory Acceptance Test – Strain Gauge Measurement, Report no: WOiO /II/123/2014

    Publication

    Tested object was 40 meters long jib and its foundation, placed in Gdansk Shiprepair Yard, manufactured by KMK. The contruction was dedicated to the passenger cruise vessel "Quantum of the Seas" The Strain Gauge measurement in different location and load situation was done in order to validate calculation finite element models used during strength analysis for project. The expertise contains: methodology of the measurements, description...

  • Factory Acceptance Test – Strain Gauge Measurement - Report no: WOiO /II/88/2014

    Publication

    Tested object was 40 meters long jib and its foundation, placed in Gdansk Shiprepair Yard, manufactured by KMK. The contruction was dedicated to the passenger cruise vessel "North Star" The Strain Gauge measurement in different location and load situation was done in order to validate calculation finite element models used during strength analysis for project. The expertise contains: methodology of the measurements, description...

  • Arch bridges under test loadings

    This paper illustrates experience in arch bridges test loadings of the research team of Department of Structural Mechanics and Bridge Structures from the Gdansk University of Technology. The presented calculations results constist the analysis of spatial construction schemes made using the finite elements method (FEM) and its comparison to the field studies. Arch bridges with the longest spans, visualisation of the computational...

    Full text available to download

  • Tight bounds on global edge and complete alliances in trees

    In the talk the authors present some tight upper bounds on global edge alliance number and global complete alliance number of trees. Moreover, we present our NP-completeness results from [8] for global edge alliances and global complete alliances on subcubic bipartite graphs without pendant vertices. We discuss also polynomial time exact algorithms for finding the minimum global edge alliance on trees [7] and complete alliance...

    Full text to download in external service

  • Rozwój polskiego winiarstwa w latach 2000–2017

    W artykule przedstawiono historie polskiego winiarstwa. Na podstawie danych zawartych w raportach Agencji Rynku Rolnego przedstawiono kształtowanie się liczby winnic oraz powierzchni upraw winorośli i zbioru winogron w latach 2009–2018. Dane z portalu winogrodnicy.pl posłużyły do scharakteryzowania liczby winnic wraz z ich lokalizacją oraz powierzchnią. Z przeprowadzonej analizy wynika, że polskie winiarstwo od ponad 20 lat przeżywa...

    Full text available to download

  • Zastosowanie audytu wewnętrznego u operatorów produkcyjnych w zapobieganiu kryzysom-studium przypadku

    Głównym tematem artykułu była analiza badań przeprowadzonych u producenta farb proszkowych przedsiębiorstwa X, w zakresie zastosowania audytu wewnętrznego, jako metody pozwalającej na zapobieganie pojawienia się kryzysu. Właściwa współpraca operatorów produkcyjnych z menedżerami ma kluczowe zna-czenie dla budowy właściwej pozycji audytu wewnętrznego w przedsiębiorstwie X. Brak należytej współpracy na etapie badań, przy braku...

    Full text available to download

  • A model, design, and implementation of an efficient multithreaded workflow execution engine with data streaming, caching, and storage constraints

    Publication

    The paper proposes a model, design, and implementation of an efficient multithreaded engine for execution of distributed service-based workflows with data streaming defined on a per task basis. The implementation takes into account capacity constraints of the servers on which services are installed and the workflow data footprint if needed. Furthermore, it also considers storage space of the workflow execution engine and its cost....

    Full text available to download

  • Wpływ struktur wsparcia na efektywność nauczania języka pisanego w środowisku e-learningowym

    Publication

    The process of knowledge and language skills development during an online course can be very effective if student engagement in learning is achieved. This can be attained by introducing general and specific support mechanisms prior to the commencement of the course and during it. The former relates to the technological aspect, that is to familiarizing students with the functionalities of the virtual learning environment they will...

  • Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting

    Publication

    - Year 2019

    NDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...

    Full text available to download

  • 3D Computer Model of the Hip Joint Cartilage

    This paper presents 3D computer model of the hip joint cartilage in the ANSYS program. Model is made on the basis of anatomy and collected data on the material constants of bone and cartilage components. Analysis and comparison of biochemical model, viscoelastic and molecular mixed - aggregation serves to facilitate the creation of the next model of reality, which could be used in the design of joint prostheses. The correctness...

    Full text to download in external service

  • Towards Effective Processing of Large Text Collections

    Publication

    In the article we describe the approach to parallelimplementation of elementary operations for textual data categorization.In the experiments we evaluate parallel computations ofsimilarity matrices and k-means algorithm. The test datasets havebeen prepared as graphs created from Wikipedia articles relatedwith links. When we create the clustering data packages, wecompute pairs of eigenvectors and eigenvalues for visualizationsof...

  • A Parallel Genetic Algorithm for Creating Virtual Portraits of Historical Figures

    In this paper we present a genetic algorithm (GA) for creating hypothetical virtual portraits of historical figures and other individuals whose facial appearance is unknown. Our algorithm uses existing portraits of random people from specific historical period and social background to evolve a set of face images potentially resembling the person whose image is to be found. We then use portraits of the person's relatives to judge...

    Full text available to download

  • PROGRAMMABLE YANG - BASED INTERFACE IN CONTROL OF OPTICAL TRANSPORT NETWORK

    Since over a decade we observe intensive effort of research institutions and industrial consortia on extending flexibility and automation of the transport network control also known under the term network programmability. Key aspect of each programming interface is ability to evolve but also sensitivity to future modifications. As indicated in the past work in the specific context of optical transport networks an important criterion...

    Full text to download in external service

  • The Neural Knowledge DNA Based Smart Internet of Things

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2020

    ABSTRACT The Internet of Things (IoT) has gained significant attention from industry as well as academia during the past decade. Smartness, however, remains a substantial challenge for IoT applications. Recent advances in networked sensor technologies, computing, and machine learning have made it possible for building new smart IoT applications. In this paper, we propose a novel approach: the Neural Knowledge DNA based Smart Internet...

    Full text available to download

  • Comparison of selected algorithms for scheduling workflow applications with dynamically changing service availability

    This paper compares the quality and execution times of several algorithms for scheduling service based workflow applications with changeable service availability and parameters. A workflow is defined as an acyclic directed graph with nodes corresponding to tasks and edges to dependencies between tasks. For each task, one out of several available services needs to be chosen and scheduled to minimize the workflow execution time and...

    Full text to download in external service

  • Interoperability Constraints in Service Selection Algorithms

    Publication

    - Year 2012

    In Service Oriented Architecture, composite applications are developed by integration of existing, atomic services that may be available in alternative versions realizing the same functionality but having different Quality of Service (QoS) attributes. The development process requires effective service selection algorithms that balance profits and constraints of QoS attributes. Additionally, services operate in a heterogeneous environment,...

  • Three levels of fail-safe mode in MPI I/O NVRAM distributed cache

    The paper presents architecture and design of three versions for fail-safe data storage in a distributed cache using NVRAM in cluster nodes. In the first one, cache consistency is assured through additional buffering write requests. The second one is based on additional write log managers running on different nodes. The third one benefits from synchronization with a Parallel File System (PFS) for saving data into a new file which...

    Full text available to download

  • Combining Road Network Data from OpenStreetMap with an Authoritative Database

    Computer modeling of road networks requires detailed and up-to-date dataset. This paper proposes a method of combining authoritative databases with OpenStreetMap (OSM) system. The complete route is established by finding paths in the graph constructed from partial data obtained from OSM. In order to correlate data from both sources, a method of coordinate conversion is proposed. The algorithm queries road data from OSM and provides...

    Full text available to download

  • Comparing phylogenetic trees using a minimum weight perfect matching

    Publication

    - Year 2008

    A phylogenetic tree represents historical evolutionary relationshipbetween different species or organisms. There are various methods for reconstructing phylogenetic trees.Applying those techniques usually results in different treesfor the same input data. An important problem is to determinehow distant two trees reconstructed in such a wayare from each other. Comparing phylogenetic trees is alsouseful in mining phylogenetic information...

    Full text to download in external service

  • Porównanie wydajności modyfikacji algorytmu Proof-number search uwzględniających wartości remisowe

    Proof-number search to znana rodzina algorytmów służących do wyznaczania wartości pozycji w nielosowych grach dwóch graczy z pełną informacją. W wersji podstawowej pn-search doskonale radzi sobie z wyszukiwaniem strategii wygrywającej jednego z graczy. Jednak istnieje wiele znanych gier, w których obydwaj gracze posiadają jedynie strategię remisującą (Młynek, Awari, Warcaby). W niniejszej pracy porównano wydajność dwóch modyfikacji...

    Full text to download in external service

  • GIS Solution for Weather Forecast Data Analysis

    Publication

    In this paper authors present the GIS system for the analysis of the numerical weather prediction data. This kind of data has multidimensional character (three dimensions and time) and its analysis should consider all the available factors. Proposed GIS system consists of RASDAMAN application with implemented OLAP cube mechanism, which enables the user to process data in the spatial-time domain. It also simplifies the meteorological...

    Full text to download in external service

  • Surpassing the Line: Urban-Oriented Strategies in the Development of Business Complexes in Poland

    Development trends regarding the business-related urban complexes seem to evolve from the “big-box” towards the more “multi-use” types of structures. Within it, the special role is reserved for places, which—due to economic, political, and geographical reasons—have not been previously considered as major business hubs. Only recently, places like cities in Central and Eastern Europe have become attractive locations for business...

    Full text available to download

  • COMPUTER-AIDED CONSTRUCTION AT DESIGNING REINFORCED CONCRETE COLUMNS AS PER EC

    The article presents the author’s computer program for designing and dimensioning columns in reinforced concrete structures taking into account phenomena affecting their behaviour and information referring to design as per EC. The computer program was developed with the use of C++ programming language. The program guides the user through particular dimensioning stages: from introducing basic data such as dimensions, concrete...

    Full text available to download

  • Planning optimised multi-tasking operations under the capability for parallel machining

    The advent of advanced multi-tasking machines (MTMs) in the metalworking industry has provided the opportunity for more efficient parallel machining as compared to traditional sequential processing. It entailed the need for developing appropriate reasoning schemes for efficient process planning to take advantage of machining capabilities inherent in these machines. This paper addresses an adequate methodical approach for a non-linear...

    Full text available to download

  • Path-based methods on categorical structures for conceptual representation of wikipedia articles

    Machine learning algorithms applied to text categorization mostly employ the Bag of Words (BoW) representation to describe the content of the documents. This method has been successfully used in many applications, but it is known to have several limitations. One way of improving text representation is usage of Wikipedia as the lexical knowledge base – an approach that has already shown promising results in many research studies....

    Full text available to download

  • Semantic memory knowledge acquisition through active dialogues

    Publication

    - Year 2007

    Szereg zagadnień językowych nie może zostać rozwiązany bez pamięci semantycznej zawierającej opisy cech obiektów, Automatyczne tworzenie tego rodzaju pamięci jest wielkim wyzwaniem nawet dla prostych obszarów dziedzinowych. Implementacja pamięci semantycznej opartej na reprezentacji wiedzy poprzez powiązania obiektu z jego cechami pokazuje ciekawe zastosowania które nie zostały dotychczas zademonstrowane poprzez bardziej wyszukane...

    Full text to download in external service

  • Acoustic Hysteresis in Flows with Different Kinds of Relaxation and Attenuation

    Publication

    Graphs in the thermodynamic plane acoustic pressure versus excess acoustic density representing acoustic hysteresis, are considered as indicators of relaxation processes, equilibrium parameters of a flow, and kinds of wave exciters. Some flows with deviation from adiabaticity are examined: the Newtonian flow of a thermocon- ducting gas, the flow of a gas with vibrational relaxation, the flow of liquid electrolyte with a chemical...

    Full text available to download

  • GIS for processing multidimensional marine data in SAAS model

    Geographic Information Systems (GIS) have always been a useful tool for visualization and processing of geospatial data. However, their capabilities of analysis non-standard information such as hydroacoustic soundings has thus far been very limited. This paper proposes a general-purpose GIS which uses techniques such as OLAP, WCS and WCPS for processing of multidimensional spatio-temporal data. The versatility of the GIS is exemplified...

    Full text available to download

  • Synteza bezczujnikowego sterowania maszyną indukcyjną klatkową zasilaną z falownika prądu

    Publication

    - Year 2016

    Synteza bezczujnikowego sterowania maszyną indukcyjną klatkową zasilaną z falownika prądu stanowi cel niniejszej monografii. Praca zawiera podstawowe informacje na temat modelowania układu napędowego z maszyną indukcyjną klatkową zasilaną z falownika prądu. Przedstawiono informacje na temat linearyzacji nieliniowych obiektów. Na pod-stawie metody syntezy strukturalnej opracowano nowe transformacje do postaci zmien-nych multiskalarnych,...

  • Designing effective educational games - a case study of a project management game

    This paper addresses the issues of designing effective educational games. We aim at investigating how the cognitive, behavioral and emotional aspects of the games influence their educational effectiveness. The results were obtained with an observational user experience study extended with affect analysis carried out for a project management game GraPM. We analyzed the...

    Full text available to download

  • Experimental Investigations On The Momentum Pressure Drop During Flow Boiling Of R134a

    The article presents experimental investigations of the pressure drop during twophase flow. Experiments were performed for both adiabatic and heated flow of R134a. Obtained flow patterns were compared with the literature. Obtained data is used to validate momentum pressure drop predictions, a set of graphs showing comparisons, for a representative set of experimental conditions, of the two-phase frictional pressure gradients for...

    Full text available to download

  • Neural Network Subgraphs Correlation with Trained Model Accuracy

    Publication

    - Year 2020

    Neural Architecture Search (NAS) is a computationally demanding process of finding optimal neural network architecture for a given task. Conceptually, NAS comprises applying a search strategy on a predefined search space accompanied by a performance evaluation method. The design of search space alone is expected to substantially impact NAS efficiency. We consider neural networks as graphs and find a correlation between the presence...

    Full text to download in external service

  • Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects

    Safety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...

    Full text to download in external service