Wyniki wyszukiwania dla: graph algorithm - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: graph algorithm

Wyniki wyszukiwania dla: graph algorithm

  • Wpływ struktur wsparcia na efektywność nauczania języka pisanego w środowisku e-learningowym

    Publikacja

    The process of knowledge and language skills development during an online course can be very effective if student engagement in learning is achieved. This can be attained by introducing general and specific support mechanisms prior to the commencement of the course and during it. The former relates to the technological aspect, that is to familiarizing students with the functionalities of the virtual learning environment they will...

  • Total Domination Versus Domination in Cubic Graphs

    Publikacja

    A dominating set in a graph G is a set S of vertices of G such that every vertex not in S has a neighbor in S. Further, if every vertex of G has a neighbor in S, then S is a total dominating set of G. The domination number,γ(G), and total domination number, γ_t(G), are the minimum cardinalities of a dominating set and total dominating set, respectively, in G. The upper domination number, \Gamma(G), and the upper total domination...

    Pełny tekst do pobrania w portalu

  • Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting

    Publikacja

    - Rok 2019

    NDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...

    Pełny tekst do pobrania w portalu

  • Scanning networks with cactus topology

    Publikacja
    • Ł. Wrona

    - Rok 2008

    The family of Pursuit and Evasion problems is widelystudied because of its numerous practical applications,ranging from communication protocols to cybernetic andphysical security. Calculating the search number of a graphis one of most commonly analyzed members of this problemfamily. The search number is the smallest number of mobileagents required to capture an invisible and arbitrarily fastfugitive, for instance piece of malicious...

  • Comparison of selected algorithms for scheduling workflow applications with dynamically changing service availability

    This paper compares the quality and execution times of several algorithms for scheduling service based workflow applications with changeable service availability and parameters. A workflow is defined as an acyclic directed graph with nodes corresponding to tasks and edges to dependencies between tasks. For each task, one out of several available services needs to be chosen and scheduled to minimize the workflow execution time and...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • CAUSALITY IN MODELS OF THERMAL PROCESSES IN SHIP ENGINE ROOMS WITH THE USE OF BOND GRAPH (BG) METHOD

    With a single approach to modeling elements of different physical nature, the method of Bond Graph (BG) is particularly well suited for modeling energy systems consisting of mechanical, thermal, electrical and hydraulic elements that operate in the power system engine room. The paper refers to the earlier presented new concept of thermal process modeling using the BG method. The authors own suggestions for determining causality...

    Pełny tekst do pobrania w portalu

  • Three levels of fail-safe mode in MPI I/O NVRAM distributed cache

    The paper presents architecture and design of three versions for fail-safe data storage in a distributed cache using NVRAM in cluster nodes. In the first one, cache consistency is assured through additional buffering write requests. The second one is based on additional write log managers running on different nodes. The third one benefits from synchronization with a Parallel File System (PFS) for saving data into a new file which...

    Pełny tekst do pobrania w portalu

  • A Model of Thermal Energy Storage According to the Convention of Bond Graphs (BG) and State Equations (SE)

    The main advantage of the use of the Bond Graphs method and State Equations for modeling energy systems with a complex structure (marine power plants, hybrid vehicles, etc.) is the ability to model the system components of different physical nature using identical theoretical basis. The paper presents a method of modeling thermal energy storage, which is in line with basic BG theory. Critical comments have been put forward concerning...

    Pełny tekst do pobrania w portalu

  • COMPUTER-AIDED CONSTRUCTION AT DESIGNING REINFORCED CONCRETE COLUMNS AS PER EC

    The article presents the author’s computer program for designing and dimensioning columns in reinforced concrete structures taking into account phenomena affecting their behaviour and information referring to design as per EC. The computer program was developed with the use of C++ programming language. The program guides the user through particular dimensioning stages: from introducing basic data such as dimensions, concrete...

    Pełny tekst do pobrania w portalu

  • Path-based methods on categorical structures for conceptual representation of wikipedia articles

    Machine learning algorithms applied to text categorization mostly employ the Bag of Words (BoW) representation to describe the content of the documents. This method has been successfully used in many applications, but it is known to have several limitations. One way of improving text representation is usage of Wikipedia as the lexical knowledge base – an approach that has already shown promising results in many research studies....

    Pełny tekst do pobrania w portalu

  • Cops, a fast robber and defensive domination on interval graphs

    Publikacja

    - THEORETICAL COMPUTER SCIENCE - Rok 2019

    The game of Cops and ∞-fast Robber is played by two players, one controlling c cops, the other one robber. The players alternate in turns: all the cops move at once to distance at most one each, the robber moves along any cop-free path. Cops win by sharing a vertex with the robber, the robber by avoiding capture indefinitely. The game was proposed with bounded robber speed by Fomin et al. in “Pursuing a fast robber on a graph”,...

    Pełny tekst do pobrania w portalu

  • The maximum edge-disjoint paths problem in complete graphs

    Publikacja

    Rozważono problem ścieżek krawędziowo rozłącznych w grafach pełnych. Zaproponowano wielomianowe algorytmy: 3.75-przybliżony (off-line) oraz 6.47-przybliżony (on-line), poprawiając tym samym wyniki wcześniej znane z literatury [P. Carmi, T. Erlebach, Y. Okamoto, Greedy edge-disjoint paths in complete graphs, in: Proc. 29th Workshop on Graph Theoretic Concepts in Computer Science, in: LNCS, vol. 2880, 2003, pp. 143-155]. Ponadto...

    Pełny tekst do pobrania w portalu

  • Towards More Realistic Probabilistic Models for Data Structures: The External Path Length in Tries under the Markov Model

    Publikacja

    - Rok 2013

    Tries are among the most versatile and widely used data structures on words. They are pertinent to the (internal) structure of (stored) words and several splitting procedures used in diverse contexts ranging from document taxonomy to IP addresses lookup, from data compression (i.e., Lempel- Ziv'77 scheme) to dynamic hashing, from partial-match queries to speech recognition, from leader election algorithms to distributed hashing...

  • KernelHive: a new workflow-based framework for multilevel high performance computing using clusters and workstations with CPUs and GPUs

    The paper presents a new open-source framework called KernelHive for multilevel parallelization of computations among various clusters, cluster nodes, and finally, among both CPUs and GPUs for a particular application. An application is modeled as an acyclic directed graph with a possibility to run nodes in parallel and automatic expansion of nodes (called node unrolling) depending on the number of computation units available....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects

    Safety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Emotion Recognition from Physiological Channels Using Graph Neural Network

    In recent years, a number of new research papers have emerged on the application of neural networks in affective computing. One of the newest trends observed is the utilization of graph neural networks (GNNs) to recognize emotions. The study presented in the paper follows this trend. Within the work, GraphSleepNet (a GNN for classifying the stages of sleep) was adjusted for emotion recognition and validated for this purpose. The...

    Pełny tekst do pobrania w portalu

  • New Performance Indices for Power System Stabilizers

    Publikacja

    - ENERGIES - Rok 2022

    The subject of the article is issues related to innovative indices for power system stabilizers (PSSs). These new indices will be able to quickly show which PSS (among many other PSSs) is not working properly and that advanced optimization and simulation methods should be used to improve the PSS settings. The authors note the fact that the acceptance requirements for PSSs are different in various power systems. Moreover, the authors...

    Pełny tekst do pobrania w portalu

  • Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce

    Publikacja

    - Rok 2024

    Within the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this...

  • Neural Graph Collaborative Filtering: Analysis of Possibilities on Diverse Datasets

    This paper continues the work by Wang et al. [17]. Its goal is to verify the robustness of the NGCF (Neural Graph Collaborative Filtering) technique by assessing its ability to generalize across different datasets. To achieve this, we first replicated the experiments conducted by Wang et al. [17] to ensure that their replication package is functional. We received sligthly better results for ndcg@20 and somewhat poorer results for...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Communication and Load Balancing Optimization for Finite Element Electromagnetic Simulations Using Multi-GPU Workstation

    This paper considers a method for accelerating finite-element simulations of electromagnetic problems on a workstation using graphics processing units (GPUs). The focus is on finite-element formulations using higher order elements and tetrahedral meshes that lead to sparse matrices too large to be dealt with on a typical workstation using direct methods. We discuss the problem of rapid matrix generation and assembly, as well as...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce

    Within the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this objective...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Scheduling with Complete Multipartite Incompatibility Graph on Parallel Machines

    Publikacja

    In this paper we consider a problem of job scheduling on parallel machines with a presence of incompatibilities between jobs. The incompatibility relation can be modeled as a complete multipartite graph in which each edge denotes a pair of jobs that cannot be scheduled on the same machine. Our research stems from the works of Bodlaender, Jansen, and Woeginger (1994) and Bodlaender and Jansen (1993). In particular, we pursue the...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Method of evaluation of lubricating ability of lube oils and fuels in energetistic formulation

    Publikacja

    The paper presents an interpretation of operation of a boundary layer of a lubricating medium. A model of the homogeneous Poisson process has been proposed to assess the deterioration process of the layer's operation. The assessment considers the original interpretation of operation of a boundary layer, as a lubricity measure of a boundary layer of any lubricant. In the submitted proposal the operation of a boundary layer is understood...

    Pełny tekst do pobrania w portalu

  • Experimental and theoretical investigation of conformational states and noncovalent interactions in crystalline sulfonamides with a methoxyphenyl moiety

    Publikacja

    - CRYSTENGCOMM - Rok 2021

    Four sulfonamide derivatives with a methoxyphenyl moiety, namely N-{4-[(2-methoxyphenyl)sulfamoyl] phenyl}acetamide (1a), N-{4-[(3-methoxyphenyl)sulfamoyl]phenyl}acetamide (1b), 4-amino-N-(2- methoxyphenyl)benzenesulfonamide (2a) and 4-amino-N-(3-methoxyphenyl)benzenesulfonamide (2b), have been synthesized and characterized physiochemically by CHNS, MS, FT-IR, 1H NMR, 13C NMR, PXRD and TG methods. Crystal structures were determined...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Collision-Free Network Exploration

    Publikacja
    • J. Czyzowicz
    • D. Dereniowski
    • L. Gąsieniec
    • R. Klasing
    • A. Kosowski
    • D. Pająk

    - Rok 2014

    A set of mobile agents is placed at different nodes of a n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round may two agents occupy the same node. In each round, an agent may choose to stay at its currently occupied node or to move to one of its neighbors. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest possible...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Detecting type of hearing loss with different AI classification methods: a performance review

    Publikacja
    • M. Kassjański
    • M. Kulawiak
    • T. Przewoźny
    • D. Tretiakow
    • J. Kuryłowicz
    • A. Molisz
    • K. Koźmiński
    • A. Kwaśniewska
    • P. Mierzwińska-Dolny
    • M. Grono

    - Rok 2023

    Hearing is one of the most crucial senses for all humans. It allows people to hear and connect with the environment, the people they can meet and the knowledge they need to live their lives to the fullest. Hearing loss can have a detrimental impact on a person's quality of life in a variety of ways, ranging from fewer educational and job opportunities due to impaired communication to social withdrawal in severe situations. Early...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Clonal selection in discrete optimization

    Publikacja

    - Rok 2009

    W rozprawie zajmujemy się efektywnymi metodami przybliżonego rozwiązywania problemów optymalizacji dyskretnej, a w szczególności algorytmami opartymi na metodzie selekcji klonalnej (SK), należącymi do kategorii sztucznych systemów immunologicznych. Techniki optymalizacji to znaczące pole badań w informatyce, a niektóre ze starszych technik, takie jak algorytmy genetyczne, symulowane wyżarzanie czy przeszukiwanie tabu, stały się...

  • Multi-Criteria Approach in Multifunctional Building Design Process

    Publikacja

    - Rok 2017

    The paper presents new approach in multifunctional building design process. Publication defines problems related to the design of complex multifunctional buildings. Currently, contemporary urban areas are characterized by very intensive use of space. Today, buildings are being built bigger and contain more diverse functions to meet the needs of a large number of users in one capacity. The trends show the need for recognition of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Algorytm ekstrakcji cech biometrycznych twarzy

    Publikacja

    W referacie zawarto opis metody automatycznej lokalizacji oraz parametryzacji punktów charakterystycznych w obrazie twarzy. Do lokalizacji punktów charakterystycznych wykorzystano zmodyfikowany algorytm EBGM (ang. Elastic Bunch Graph Matching). Algorytm ten pozwala lokalizować punkty w obrazie przy założeniu niezmienności topologii grafu połączeń między nimi.W referacie przedstawiono podstawy teoretyczne metody oraz zaimplementowany...

  • Total Completion Time Minimization for Scheduling with Incompatibility Cliques

    Publikacja

    - Rok 2021

    This paper considers parallel machine scheduling with incompatibilities between jobs. The jobs form a graph equivalent to a collection of disjoint cliques. No two jobs in a clique are allowed to be assigned to the same machine. Scheduling with incompatibilities between jobs represents a well-established line of research in scheduling theory and the case of disjoint cliques has received increasing attention in recent...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • SMART SHOP SERVICES FOR BUILDING CUSTOMER-ORIENTED SCENARIOS

    Publikacja

    The shops of today mostly support the customer by offering him or her products based on basic relationships between products viewed or ordered by users with similar tastes. This common approach may fail in many cases especially when the user does not have sufficient knowledge about the market, or when he or she wants to build a set of products in more than one shop. New categories of smart shop services are proposed in order to...

    Pełny tekst do pobrania w portalu

  • Kacper Wereszko mgr inż.

    Osoby

    Kacper Wereszko uzyskał tytuł zawodowy magistra inżyniera w 2016 roku (kierunek: informatyka, specjalność: algorytmy i technologie internetowe), a od 2017 roku jest uczestnikiem studiów doktoranckich z dyscypliny Informatyka. Obecnie pracuje jako asystent w Katedrze Algorytmów i Modelowania Systemów. Jego zainteresowania badawcze obejmują badanie własności bezpieczeństwa w grafach, problemy dominowania w grafach oraz ich praktyczne...

  • Agent-based social network as a simulation of a market behaviour

    Publikacja

    - Rok 2010

    Recent years and the outbreak of world's economic crisis in 2008 proved the crucial importance of reliable analysis of market dynamics. However, werarely apply models of proper detail level (the global prosperity forecast of 2007 can be seen as a grim proof). The behaviour of individuals and companies is far from being ideal and rational. Many claims that the economic paradigm of rational expectations (coming from J. Muth and R....