Pub Date : 2025-03-28DOI: 10.1134/S1064562424702417
A. Poddiakov
Chess players’ positions in intransitive (rock-paper-scissors) relations are considered. Intransitivity of chess players’ positions means that: position A of White is preferable (it should be chosen if choice is possible) to position B of Black, if A and B are on a chessboard; position B of Black is preferable to position C of White, if B and C are on the chessboard; position C of White is preferable to position D of Black, if C and D are on the chessboard; but position D of Black is preferable to position A of White, if A and D are on the chessboard. Intransitivity of winningness of chess players’ positions is considered to be a consequence of complexity of the chess environment—in contrast with simpler games with transitive positions only. The space of relations between winningness of chess players’ positions is non-Euclidean. The Zermelo-von Neumann theorem is complemented by statements about possibility vs. impossibility of building pure winning strategies based on the assumption of transitivity of players’ positions. Questions about the possibility of intransitive players’ positions in other positional games are raised.
{"title":"Intransitively Winning Chess Players’ Positions","authors":"A. Poddiakov","doi":"10.1134/S1064562424702417","DOIUrl":"10.1134/S1064562424702417","url":null,"abstract":"<p>Chess players’ positions in intransitive (rock-paper-scissors) relations are considered. Intransitivity of chess players’ positions means that: position A of White is preferable (it should be chosen if choice is possible) to position B of Black, if A and B are on a chessboard; position B of Black is preferable to position C of White, if B and C are on the chessboard; position C of White is preferable to position D of Black, if C and D are on the chessboard; but position D of Black is preferable to position A of White, if A and D are on the chessboard. Intransitivity of winningness of chess players’ positions is considered to be a consequence of complexity of the chess environment—in contrast with simpler games with transitive positions only. The space of relations between winningness of chess players’ positions is non-Euclidean. The Zermelo-von Neumann theorem is complemented by statements about possibility <i>vs</i>. impossibility of building pure winning strategies based on the assumption of transitivity of players’ positions. Questions about the possibility of intransitive players’ positions in other positional games are raised.</p>","PeriodicalId":531,"journal":{"name":"Doklady Mathematics","volume":"110 2 supplement","pages":"S391 - S398"},"PeriodicalIF":0.5,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143716670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-28DOI: 10.1134/S1064562424602725
M. A. Khodiakova
In 1984, Kaminsky, Luks, and Nelson formulated the gladiator game model of two teams with given strengths. Suppose that a team wants to maximize its expected strength at the end of a battle. We consider an optimization problem: how to distribute the team’s strength among its gladiators. In the above we suppose that the teams distribute their strengths at the beginning of a battle. We also consider Nash equilibria when the teams may change gladiators’ strengths before every fight. We consider two cases. In both, the first team wants to maximize its strength. The second team wants to maximize its strength too in the first case or wants to minimize the first team’s strength in the second case.
{"title":"How to Maximize the Total Strength of Survivors in a Battle and Tournament in Gladiator Game Models","authors":"M. A. Khodiakova","doi":"10.1134/S1064562424602725","DOIUrl":"10.1134/S1064562424602725","url":null,"abstract":"<p>In 1984, Kaminsky, Luks, and Nelson formulated the gladiator game model of two teams with given strengths. Suppose that a team wants to maximize its expected strength at the end of a battle. We consider an optimization problem: how to distribute the team’s strength among its gladiators. In the above we suppose that the teams distribute their strengths at the beginning of a battle. We also consider Nash equilibria when the teams may change gladiators’ strengths before every fight. We consider two cases. In both, the first team wants to maximize its strength. The second team wants to maximize its strength too in the first case or wants to minimize the first team’s strength in the second case.</p>","PeriodicalId":531,"journal":{"name":"Doklady Mathematics","volume":"110 2 supplement","pages":"S452 - S462"},"PeriodicalIF":0.5,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143716736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-28DOI: 10.1134/S1064562424602610
P. D. Demchuk, A. V. Korolev, G. A. Ugolnitsky
The basic model of the Cournot oligopoly taking into account competition-cooperation and environmental pollution as a differential game in a normal form is described. The numerical analysis for independent and cooperative behavior is carried out for an example used in the future. Games in the form of the characteristic von Neumann–Morgenstern, Petrosyan–Zaccour, and Gromova–Petrosyan functions are constructed, and the Shapley values are calculated. Hierarchical games with information regulations for direct and reverse Stackelberg games are analyzed, payoffs’ comparative analysis for all methods of organization is provided. All the results are presented for the dynamic game with three players.
{"title":"Dynamic Models of Competition and Cooperation in Cournot Oligopoly Taking into Account the Environmental Impact","authors":"P. D. Demchuk, A. V. Korolev, G. A. Ugolnitsky","doi":"10.1134/S1064562424602610","DOIUrl":"10.1134/S1064562424602610","url":null,"abstract":"<p>The basic model of the Cournot oligopoly taking into account competition-cooperation and environmental pollution as a differential game in a normal form is described. The numerical analysis for independent and cooperative behavior is carried out for an example used in the future. Games in the form of the characteristic von Neumann–Morgenstern, Petrosyan–Zaccour, and Gromova–Petrosyan functions are constructed, and the Shapley values are calculated. Hierarchical games with information regulations for direct and reverse Stackelberg games are analyzed, payoffs’ comparative analysis for all methods of organization is provided. All the results are presented for the dynamic game with three players.</p>","PeriodicalId":531,"journal":{"name":"Doklady Mathematics","volume":"110 2 supplement","pages":"S473 - S486"},"PeriodicalIF":0.5,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143716740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-28DOI: 10.1134/S1064562424702375
V. A. Kochevadov, A. A. Sedakov
The paper examines discrete-time network models of competition with a finite planning horizon. Firms produce a homogeneous product in constant quantities and sell it in a common market. In a nonterminal period, the behavior of each firm is characterized by a multicomponent profile that includes, among other things, the amount of investment and the structure of bilateral links with partner firms. The latter affects the technological state of the firm and allows it to reduce its current costs. The endogenous structure of partner firms is described by a network. For the models under study, an open-loop Nash equilibrium is characterized.
{"title":"Dynamic Models of Competition with Endogenous Network Formation: The Case of Constant Output","authors":"V. A. Kochevadov, A. A. Sedakov","doi":"10.1134/S1064562424702375","DOIUrl":"10.1134/S1064562424702375","url":null,"abstract":"<p>The paper examines discrete-time network models of competition with a finite planning horizon. Firms produce a homogeneous product in constant quantities and sell it in a common market. In a nonterminal period, the behavior of each firm is characterized by a multicomponent profile that includes, among other things, the amount of investment and the structure of bilateral links with partner firms. The latter affects the technological state of the firm and allows it to reduce its current costs. The endogenous structure of partner firms is described by a network. For the models under study, an open-loop Nash equilibrium is characterized.</p>","PeriodicalId":531,"journal":{"name":"Doklady Mathematics","volume":"110 2 supplement","pages":"S357 - S366"},"PeriodicalIF":0.5,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143716947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-22DOI: 10.1134/S1064562424602336
A. S. Veprikov, E. D. Petrov, G. V. Evseev, A. N. Beznosikov
In this paper we consider a distributed optimization problem in the black-box formulation. This means that the target function f is decomposed into the sum of (n) functions ({{f}_{i}}), where (n) is the number of workers, it is assumed that each worker has access only to the zero-order noisy oracle, i.e., only to the values of ({{f}_{i}}(x)) with added noise. In this paper, we propose a new method ZO-MARINA based on the state-of-the-art distributed optimization algorithm MARINA. In particular, the following modifications are made to solve the problem in the black-box formulation: (i) we use approximations of the gradient instead of the true value, (ii) the difference of two approximated gradients at some coordinates is used instead of the compression operator. In this paper, a theoretical convergence analysis is provided for non-convex functions and functions satisfying the PL condition. The convergence rate of the proposed algorithm is correlated with the results for the algorithm that uses the first-order oracle. The theoretical results are validated in computational experiments to find optimal hyperparameters for the Resnet-18 neural network, that is trained on the CIFAR-10 dataset and the SVM model on the LibSVM library dataset and on the Mnist-784 dataset.
{"title":"Zero Order Algorithm for Decentralized Optimization Problems","authors":"A. S. Veprikov, E. D. Petrov, G. V. Evseev, A. N. Beznosikov","doi":"10.1134/S1064562424602336","DOIUrl":"10.1134/S1064562424602336","url":null,"abstract":"<p>In this paper we consider a distributed optimization problem in the black-box formulation. This means that the target function <i>f</i> is decomposed into the sum of <span>(n)</span> functions <span>({{f}_{i}})</span>, where <span>(n)</span> is the number of workers, it is assumed that each worker has access only to the zero-order noisy oracle, i.e., only to the values of <span>({{f}_{i}}(x))</span> with added noise. In this paper, we propose a new method <span>ZO-MARINA</span> based on the state-of-the-art distributed optimization algorithm <i><span>MARINA</span></i>. In particular, the following modifications are made to solve the problem in the black-box formulation: (i) we use approximations of the gradient instead of the true value, (ii) the difference of two approximated gradients at some coordinates is used instead of the compression operator. In this paper, a theoretical convergence analysis is provided for non-convex functions and functions satisfying the PL condition. The convergence rate of the proposed algorithm is correlated with the results for the algorithm that uses the first-order oracle. The theoretical results are validated in computational experiments to find optimal hyperparameters for the Resnet-18 neural network, that is trained on the CIFAR-10 dataset and the SVM model on the LibSVM library dataset and on the Mnist-784 dataset.</p>","PeriodicalId":531,"journal":{"name":"Doklady Mathematics","volume":"110 1 supplement","pages":"S261 - S277"},"PeriodicalIF":0.5,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1134/S1064562424602336.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-22DOI: 10.1134/S106456242460221X
A. Allahverdyan, A. Zhadan, I. Kondratov, O. Petrosian, A. Romanovskii, V. Kharin, Yin Li
In heterogeneous computing environments, efficiently scheduling tasks, especially those forming Directed Acyclic Graphs (DAGs), is critical. This is particularly true for various Cloud and Edge computing tasks, as well as training Large Language Models (LLMs). This paper introduces a new scheduling approach using an Adaptive Neural Hyper-heuristic. By integrating a neural network trained with genetic algorithms, our method aims to minimize makespan. The approach uses a two-level algorithm: the first level prioritizes tasks using adaptive heuristic and the second level assigns resources based on the Earliest Finish Time (EFT) algorithm. Our tests show that this method significantly improves over traditional scheduling heuristics and other machine learning-based approaches. It reduces the makespan by 6.7% for small-scale DAGs and 28.49% for large-scale DAGs compared to the leading DONF algorithm. Additionally, it achieves a proximity of 84.08% to 96.43% to the optimal solutions found using Mixed-Integer Linear Programming (MILP), demonstrating its effectiveness in diverse computational settings.
在异构计算环境中,高效调度任务,尤其是那些形成有向无环图(DAG)的任务,至关重要。对于各种云计算和边缘计算任务以及大型语言模型(LLM)的训练而言,尤其如此。本文介绍了一种使用自适应神经超启发式的新调度方法。通过将经过遗传算法训练的神经网络整合在一起,我们的方法旨在最大限度地减少时间跨度。该方法使用两级算法:第一级使用自适应启发式确定任务的优先级,第二级根据最早完成时间(EFT)算法分配资源。我们的测试表明,与传统的调度启发式方法和其他基于机器学习的方法相比,这种方法有明显改善。与领先的 DONF 算法相比,小规模 DAG 的 makepan 降低了 6.7%,大规模 DAG 的 makespan 降低了 28.49%。此外,它还实现了 84.08% 至 96.43% 的接近度,接近于使用混合整数线性规划(MILP)找到的最优解,证明了它在各种计算环境中的有效性。
{"title":"Heterogeneous Computational Scheduling Using Adaptive Neural Hyper-Heuristic","authors":"A. Allahverdyan, A. Zhadan, I. Kondratov, O. Petrosian, A. Romanovskii, V. Kharin, Yin Li","doi":"10.1134/S106456242460221X","DOIUrl":"10.1134/S106456242460221X","url":null,"abstract":"<p>In heterogeneous computing environments, efficiently scheduling tasks, especially those forming Directed Acyclic Graphs (DAGs), is critical. This is particularly true for various Cloud and Edge computing tasks, as well as training Large Language Models (LLMs). This paper introduces a new scheduling approach using an Adaptive Neural Hyper-heuristic. By integrating a neural network trained with genetic algorithms, our method aims to minimize makespan. The approach uses a two-level algorithm: the first level prioritizes tasks using adaptive heuristic and the second level assigns resources based on the Earliest Finish Time (EFT) algorithm. Our tests show that this method significantly improves over traditional scheduling heuristics and other machine learning-based approaches. It reduces the makespan by 6.7% for small-scale DAGs and 28.49% for large-scale DAGs compared to the leading DONF algorithm. Additionally, it achieves a proximity of 84.08% to 96.43% to the optimal solutions found using Mixed-Integer Linear Programming (MILP), demonstrating its effectiveness in diverse computational settings.</p>","PeriodicalId":531,"journal":{"name":"Doklady Mathematics","volume":"110 1 supplement","pages":"S151 - S161"},"PeriodicalIF":0.5,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1134/S106456242460221X.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-22DOI: 10.1134/S1064562424602269
V. P. Stepashkina, M. I. Hushchyn
This paper presents the development and evaluation of methods for detecting cyberattacks on industrial systems using neural network approaches. The focus is on the task of detecting anomalies in multivariate time series, where the diversity and complexity of potential attack scenarios require the use of advanced models. To address these challenges, a transformer-based autoencoder architecture was used, which was further enhanced by transitioning to a variational autoencoder (VAE) and integrating normalizing flows. These modifications allowed the model to better capture the data distribution, enabling effective anomaly detection, including those not present in the training set. As a result, high performance was achieved, with an F1 score of 0.93 and a ROC-AUC of 0.87. The results underscore the effectiveness of the proposed methodology and provide valuable contributions to the field of anomaly detection and cybersecurity in industrial systems.
{"title":"Prediction of Industrial Cyber Attacks Using Normalizing Flows","authors":"V. P. Stepashkina, M. I. Hushchyn","doi":"10.1134/S1064562424602269","DOIUrl":"10.1134/S1064562424602269","url":null,"abstract":"<p>This paper presents the development and evaluation of methods for detecting cyberattacks on industrial systems using neural network approaches. The focus is on the task of detecting anomalies in multivariate time series, where the diversity and complexity of potential attack scenarios require the use of advanced models. To address these challenges, a transformer-based autoencoder architecture was used, which was further enhanced by transitioning to a variational autoencoder (VAE) and integrating normalizing flows. These modifications allowed the model to better capture the data distribution, enabling effective anomaly detection, including those not present in the training set. As a result, high performance was achieved, with an F1 score of 0.93 and a ROC-AUC of 0.87. The results underscore the effectiveness of the proposed methodology and provide valuable contributions to the field of anomaly detection and cybersecurity in industrial systems.</p>","PeriodicalId":531,"journal":{"name":"Doklady Mathematics","volume":"110 1 supplement","pages":"S95 - S102"},"PeriodicalIF":0.5,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-22DOI: 10.1134/S1064562424602245
B. Kriuk, F. Kriuk
Handwritten character recognition (HCR) is a challenging problem for machine learning researchers. Unlike printed text data, handwritten character datasets have more variation due to human-introduced bias. With numerous unique character classes present, some data, such as Logographic Scripts or Sino-Korean character sequences, bring new complications to the HCR problem. The classification task on such datasets requires the model to learn high-complexity details of the images that share similar features. With recent advances in computational resource availability and further computer vision theory development, some research teams have effectively addressed the arising challenges. Although known for achieving high accuracy while keeping the number of parameters small, many common approaches are still not generalizable and use dataset-specific solutions to achieve better results. Due to complex structure, existing methods frequently prevent the solutions from gaining popularity. This paper proposes a highly scalable approach for detailed character image classification by introducing the model architecture, data preprocessing steps, and testing design instructions. We also perform experiments to compare the performance of our method with that of existing ones to show the improvements achieved.
{"title":"Deep Learning-Driven Approach for Handwritten Chinese Character Classification","authors":"B. Kriuk, F. Kriuk","doi":"10.1134/S1064562424602245","DOIUrl":"10.1134/S1064562424602245","url":null,"abstract":"<p>Handwritten character recognition (HCR) is a challenging problem for machine learning researchers. Unlike printed text data, handwritten character datasets have more variation due to human-introduced bias. With numerous unique character classes present, some data, such as Logographic Scripts or Sino-Korean character sequences, bring new complications to the HCR problem. The classification task on such datasets requires the model to learn high-complexity details of the images that share similar features. With recent advances in computational resource availability and further computer vision theory development, some research teams have effectively addressed the arising challenges. Although known for achieving high accuracy while keeping the number of parameters small, many common approaches are still not generalizable and use dataset-specific solutions to achieve better results. Due to complex structure, existing methods frequently prevent the solutions from gaining popularity. This paper proposes a highly scalable approach for detailed character image classification by introducing the model architecture, data preprocessing steps, and testing design instructions. We also perform experiments to compare the performance of our method with that of existing ones to show the improvements achieved.</p>","PeriodicalId":531,"journal":{"name":"Doklady Mathematics","volume":"110 1 supplement","pages":"S278 - S287"},"PeriodicalIF":0.5,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-22DOI: 10.1134/S1064562424602117
I. Polezhaev, I. Goncharenko, N. Iurina
In this paper, we present a novel methodology we call MDS-ViTNet (Multi Decoder Saliency by Vision Transformer Network) for enhancing visual saliency prediction or eye-tracking. This approach holds significant potential for diverse fields, including marketing, medicine, robotics, and retail. We propose a network architecture that leverages the Vision Transformer, moving beyond the conventional ImageNet backbone. The framework adopts an encoder-decoder structure, with the encoder utilizing a Swin transformer to efficiently embed most important features. This process involves a Transfer Learning method, wherein layers from the Vision Transformer are converted by the Encoder Transformer and seamlessly integrated into a CNN Decoder. This methodology ensures minimal information loss from the original input image. The decoder employs a multi-decoding technique, utilizing dual decoders to generate two distinct attention maps. These maps are subsequently combined into a singular output via an additional CNN model. Our trained model MDS-ViTNet achieves state-of-the-art results across several benchmarks. Committed to fostering further collaboration, we intend to make our code, models, and datasets accessible to the public.
在本文中,我们提出了一种新的方法,我们称之为MDS-ViTNet (Multi Decoder Saliency by Vision Transformer Network),用于增强视觉显著性预测或眼动追踪。这种方法在不同的领域具有巨大的潜力,包括营销、医药、机器人和零售。我们提出了一种利用视觉转换器的网络架构,超越了传统的ImageNet主干。该框架采用编码器-解码器结构,编码器利用Swin变压器有效嵌入最重要的特性。这个过程涉及一种迁移学习方法,其中来自视觉转换器的层由编码器转换器转换并无缝集成到CNN解码器中。这种方法确保了原始输入图像的最小信息损失。解码器采用多重解码技术,利用双解码器生成两个不同的注意图。这些地图随后通过一个额外的CNN模型组合成一个单一的输出。我们训练有素的MDS-ViTNet模型在几个基准测试中取得了最先进的结果。为了促进进一步的合作,我们打算让我们的代码、模型和数据集对公众开放。
{"title":"MDS-ViTNet: Improving Saliency Prediction for Eye-Tracking with Vision Transformer","authors":"I. Polezhaev, I. Goncharenko, N. Iurina","doi":"10.1134/S1064562424602117","DOIUrl":"10.1134/S1064562424602117","url":null,"abstract":"<p>In this paper, we present a novel methodology we call MDS-ViTNet (Multi Decoder Saliency by Vision Transformer Network) for enhancing visual saliency prediction or eye-tracking. This approach holds significant potential for diverse fields, including marketing, medicine, robotics, and retail. We propose a network architecture that leverages the Vision Transformer, moving beyond the conventional ImageNet backbone. The framework adopts an encoder-decoder structure, with the encoder utilizing a Swin transformer to efficiently embed most important features. This process involves a Transfer Learning method, wherein layers from the Vision Transformer are converted by the Encoder Transformer and seamlessly integrated into a CNN Decoder. This methodology ensures minimal information loss from the original input image. The decoder employs a multi-decoding technique, utilizing dual decoders to generate two distinct attention maps. These maps are subsequently combined into a singular output via an additional CNN model. Our trained model MDS-ViTNet achieves state-of-the-art results across several benchmarks. Committed to fostering further collaboration, we intend to make our code, models, and datasets accessible to the public.</p>","PeriodicalId":531,"journal":{"name":"Doklady Mathematics","volume":"110 1 supplement","pages":"S230 - S235"},"PeriodicalIF":0.5,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1134/S1064562424602117.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-22DOI: 10.1134/S1064562424602026
I. Kruzhilov, E. Ikryannikov, A. Shadrin, R. Utegenov, G. Zubkova, I. Bessonov
Coronary arterial dominance classification is essential for SYNTAX score estimation, which is a tool used to determine the complexity of coronary artery disease and guide patient selection toward optimal revascularization strategy. We developed coronary dominance classification algorithm based on the analysis of right coronary artery (RCA) angiograms using neural network.
We employed convolutional neural network ConvNext and Swin transformer for 2D image (frames) classification, along with a majority vote for cardio angiographic view classification. An auxiliary network was also used to detect irrelevant images which were then excluded from the data set.
5-fold cross validation gave the following dominance classification metrics (p = 95%): macro recall = 93.1% ± 4.3%, accuracy = 93.5% ± 3.8%, macro F1 = 89.2% ± 5.6%. The most common case in which the model regularly failed was RCA occlusion, as it requires utilization of left coronary artery (LCA) information.
The use of machine learning approaches to classify coronary dominance based on RCA alone has been shown to be successful with satisfactory accuracy. However, for higher accuracy, it is necessary to utilize LCA information in the case of an occluded RCA and detect cases where there is high uncertainty.
{"title":"Neural Network-Based Coronary Dominance Classification of RCA Angiograms","authors":"I. Kruzhilov, E. Ikryannikov, A. Shadrin, R. Utegenov, G. Zubkova, I. Bessonov","doi":"10.1134/S1064562424602026","DOIUrl":"10.1134/S1064562424602026","url":null,"abstract":"<p>Coronary arterial dominance classification is essential for SYNTAX score estimation, which is a tool used to determine the complexity of coronary artery disease and guide patient selection toward optimal revascularization strategy. We developed coronary dominance classification algorithm based on the analysis of right coronary artery (RCA) angiograms using neural network.</p><p>We employed convolutional neural network ConvNext and Swin transformer for 2D image (frames) classification, along with a majority vote for cardio angiographic view classification. An auxiliary network was also used to detect irrelevant images which were then excluded from the data set.</p><p>5-fold cross validation gave the following dominance classification metrics (<i>p</i> = 95%): macro recall = 93.1% ± 4.3%, accuracy = 93.5% ± 3.8%, macro F1 = 89.2% ± 5.6%. The most common case in which the model regularly failed was RCA occlusion, as it requires utilization of left coronary artery (LCA) information.</p><p>The use of machine learning approaches to classify coronary dominance based on RCA alone has been shown to be successful with satisfactory accuracy. However, for higher accuracy, it is necessary to utilize LCA information in the case of an occluded RCA and detect cases where there is high uncertainty.</p>","PeriodicalId":531,"journal":{"name":"Doklady Mathematics","volume":"110 1 supplement","pages":"S212 - S222"},"PeriodicalIF":0.5,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1134/S1064562424602026.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}