Henryk Krawczyk - Publications - Bridge of Knowledge

Search

Profile photo: prof. dr hab. inż. Henryk Krawczyk

prof. dr hab. inż. Henryk Krawczyk

Filters

total: 196

  • Category
  • Year
  • Options

clear Chosen catalog filters disabled

Catalog Publications

  • A method for counting people attending large public events

    The algorithm for people counting in crowded scenes, based on the idea of virtual gate which uses optical flow method is presented. The concept and practical application of the developed algorithm under real conditions is depicted. The aim of the work is to estimate the number of people passing through entrances of a large sport hall. The most challenging problem was the unpredicted behavior of people while entering the building....

    Full text available to download

  • Behavior Analysis and Dynamic Crowd Management in Video Surveillance System

    A concept and practical implementation of a crowd management system which acquires input data by the set of monitoring cameras is presented. Two leading threads are considered. First concerns the crowd behavior analysis. Second thread focuses on detection of a hold-ups in the doorway. The optical flow combined with soft computing methods (neural network) is employed to evaluate the type of crowd behavior, and fuzzy logic aids detection...

    Full text to download in external service

  • Optimization of parallel implementation of UNRES package for coarse‐grained simulations to treat large proteins
    Publication

    - JOURNAL OF COMPUTATIONAL CHEMISTRY - Year 2023

    We report major algorithmic improvements of the UNRES package for physics-based coarse-grained simulations of proteins. These include (i) introduction of interaction lists to optimize computations, (ii) transforming the inertia matrix to a pentadiagonal form to reduce computing and memory requirements, (iii) removing explicit angles and dihedral angles from energy expressions and recoding the most time-consuming energy/force terms...

    Full text available to download

  • Tryton Supercomputer Capabilities for Analysis of Massive Data Streams

    The recently deployed supercomputer Tryton, located in the Academic Computer Center of Gdansk University of Technology, provides great means for massive parallel processing. Moreover, the status of the Center as one of the main network nodes in the PIONIER network enables the fast and reliable transfer of data produced by miscellaneous devices scattered in the area of the whole country. The typical examples of such data are streams...

    Full text available to download

  • Genetic Programming with Negative Selection for Volunteer Computing System Optimization
    Publication

    Volunteer computing systems like BOINC or Comcute are strongly supported by a great number of volunteers who contribute resources of their computers via the Web. So, the high efficiency of such grid system is required, and that is why we have formulated a multi-criterion optimization problem for a volunteer grid system design. In that dilemma, both the cost of the host system and workload of a bottleneck host are minimized. On...

    Full text to download in external service

  • Massive surveillance data processing with supercomputing cluster

    In recent years, increasingly complex algorithms for automated analysis of surveillance data are being developed. The rapid growth in the number of monitoring installations and higher expectations of the quality parameters of the captured data result in an enormous computational cost of analyzing the massive volume of data. In this paper a new model of online processing of surveillance data streams is proposed, which assumes the...

    Full text to download in external service

  • User Trust Levels and Their Impact on System Security and Usability

    A multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.

    Full text available to download

  • Multi-level Virtualization and Its Impact on System Performance in Cloud Computing

    The results of benchmarking tests of multi-level virtualized environments are presented. There is analysed the performance impact of hardware virtualization, container-type isolation and programming level abstraction. The comparison is made on the basis of a proposed score metric that allows you to compare different aspects of performance. There is general performance (CPU and memory), networking, disk operations and application-like...

    Full text available to download

  • Mobile Offloading Framework: Solution for Optimizing Mobile Applications Using Cloud Computing
    Publication

    Number of mobile devices and applications is growing rapidly in recent years. Capabilities and performance of these devices can be tremendously extended with the integration of cloud computing. However, multiple challenges regarding implementation of these type of mobile applications are known, like differences in architecture, optimization and operating system support. This paper summarizes issues with mobile cloud computing and...

    Full text available to download

  • Multidimensional Approach to Quality Analysis of IPSec and HTTPS Applications
    Publication

    - Year 2009

    Niniejsza praca omawia aspekty bezpieczeństwa i wydajności aplikacji rozproszonych działających w środowisku sieci publiczno-prywatnych, stworzonych za pośrednictwem technologii IPSec i HTTPS. Jako przykłady implementacji pokazane są: jeden z największych polskojęzycznych portali motoryzacyjnych: www.auto.gda.pl oraz brama IPSec działająca w środowisku ATCA. Przedstawiona w referacie analiza pod kątem wydajności i bezpieczeństwa...

  • Interactive Information Search in Text Data Collections
    Publication

    This article presents a new idea for retrieving in text repositories, as well as it describes general infrastructure of a system created to implement and test those ideas. The implemented system differs from today’s standard search engine by introducing process of interactive search with users and data clustering. We present the basic algorithms behind our system and measures we used for results evaluation. The achieved results...

    Full text to download in external service

  • Categorization of Cloud Workload Types with Clustering

    The paper presents a new classification schema of IaaS cloud workloads types, based on the functional characteristics. We show the results of an experiment of automatic categorization performed with different benchmarks that represent particular workload types. Monitoring of resource utilization allowed us to construct workload models that can be processed with machine learning algorithms. The direct connection between the functional...

    Full text to download in external service

  • UNRES-GPU for Physics-Based Coarse-Grained Simulations of Protein Systems at Biological Time- and Size-Scales

    The dynamics of the virus like particles (VLPs) corresponding to the GII.4 Houston, GII.2 SMV, and GI.1 Norwalk strains of human noroviruses (HuNoV) that cause gastroenteritis was investigated by means of long-time (about 30 μs in the laboratory timescale) molecular dynamics simulations with the coarse-grained UNRES force field. The main motion of VLP units turned out to be the bending at the junction between the P1 subdomain (that...

    Full text available to download

  • Primary role identification in dynamic social networks
    Publication

    - Year 2011

    Identyfikacja ról w sieci społecznej jest jednym z podstawowych zagadnień analizy takich sieci. W artykule przedstawiamy nowe podejście do tego zagadnienia. Pokazujemy w jaki sposób można dokonać identyfikacji ról poprzez wykorzystanie zaproponowanego modelu zachowań aktorów. Model taki tworzą podgrafy wzorcowe oraz diagramy stanów okreslające sekwencje aktywności w zachowaniu aktorów. Na bazie wyznaczonych modeli zachowań oraz...

  • Static and dynamic approach of social roles identification using PISNA and subgraphs matching
    Publication

    - Year 2010

    Identyfikacja ról w sieci społecznej jest jednym z podstawowych zagadnień analiza takich sieci. W artykule przedstawiamy nowe podejście do tego zagadnienia. Pokazujemy w jaki sposób można dokonać identyfikacji ról poprzez tworzenie specjalnych struktur grafowych tzw. grafów wzorcowych. Przy definiowaniu tychże grafów wspieramy się metodą PISNA. Proponujemy statyczne i dynamiczne podejście do identyfikacji ról. Pokazujemy, w jaki...

  • Selection of Relevant Features for Text Classification with K-NN
    Publication

    In this paper, we describe five features selection techniques used for a text classification. An information gain, independent significance feature test, chi-squared test, odds ratio test, and frequency filtering have been compared according to the text benchmarks based on Wikipedia. For each method we present the results of classification quality obtained on the test datasets using K-NN based approach. A main advantage of evaluated...

    Full text to download in external service

  • Practical Evaluation of Internet Systems' Security Mechanisms
    Publication

    A proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.

    Full text available to download

  • Systematic approach to binary classification of images in video streams using shifting time windows

    in the paper, after pointing out of realistic recordings and classifications of their frames, we propose a new shifting time window approach for improving binary classifications. We consider image classification in tewo steps. in the first one the well known binary classification algorithms are used for each image separately. In the second step the results of the previous step mare analysed in relatively short sequences of consecutive...

    Full text available to download

  • Testing for conformance of parallel programming pattern languages

    This paper reports on the project being run by TUG and IMAG, aimed at reducing the volume of tests required to exercise parallel programming language compilers and libraries. The idea is to use the ISO STEP standard scheme for conformance testing of software products. A detailed example illustrating the ongoing work is presented.

  • Application of virtual gate for counting people participating in large public events

    The concept and practical application of the developed algorithm forpeople counting in crowded scene is presented. The aim of the work is to estimatethe number of people passing towards entrances of a large sport hall. Thedetails of implemented the Virtual Gate algorithm are presented. The video signalfrom the camera installed in the building constituted the input for the algorithm.The most challenging problem was the unpredicted...

    Full text to download in external service

  • Extended generalized blockmodeling for compound communities and external actors
    Publication

    - Year 2010

    Niektóre sieci społeczne wykazują się specyficzną strukturą wewnętrzną. W artykule rozpatrujemy społeczności, które składają się z mniejszych wspólnot. Takie społeczności nazywamy społecznościami złożonymi. Dla takich struktur zastosowalismy metodę ogólnego modelowania blokowego proponując odpowiednie rozrzerzenia dla tej metody. Wzięliśmy pod uwagę specyfikę złożonych struktur społecznych oraz ich relacje z aktorami zewnętrznymi...

  • Extended generalized blockmodeling for compound communities and external actors
    Publication

    - Year 2009

    Większość sieci społecznych charakteryzuje się swoją wewnętrzną, unikatową strukturą. W artykule poddano analizie sieci społeczne złożone z wielu mniejszych grup społecznościowych, które określamy mianem złożonych sieci społecznych. Dla tego typu sieci zaproponowano rozszerzenie metody ogólnego modelowania blokowego biorąc pod uwagę specyficzną strukturę złożonych sieci społecznych oraz ich relacje z zewnętrznymi aktorami. W oparciu...

    Full text to download in external service

  • Genetic Programming for Interaction Efficient Supporting in Volunteer Computing Systems
    Publication

    Volunteer computing systems provide a middleware for interaction between project owners and great number volunteers. In this chapter, a genetic programming paradigm has been proposed to a multi-objective scheduler design for efficient using some resources of volunteer computers via the web. In a studied problem, genetic scheduler can optimize both a workload of a bottleneck computer and cost of system. Genetic programming has been...

    Full text to download in external service

  • E-mail user roles identification using OWL-based ontology approach
    Publication

    - Year 2008

    Sieci społeczne jako struktury ukazujące społeczne powiązania pomiędzy osobami lub całymi organizacjami poddawane są często analizie w celu rozpoznania ról, jakie pełnią poszczególni aktorzy w danej sieci. Taka klasyfikacja ról odgrywanych przez aktorów może dostarczać wielu cennych informacji o danej sieci, gdyż daje nam całościowy obraz danej sieci pozwalając na zrozumienie, w jaki sposób sieć jest zorganizowana, i w jaki sposób...

  • Mobile devices and computing cloud resources allocation for interactive applications

    Using mobile devices such as smartphones or iPads for various interactive applications is currently very common. In the case of complex applications, e.g. chess games, the capabilities of these devices are insufficient to run the application in real time. One of the solutions is to use cloud computing. However, there is an optimization problem of mobile device and cloud resources allocation. An iterative heuristic algorithm for...

    Full text available to download

  • Clustering Context Items into User Trust Levels

    An innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....

    Full text available to download

  • Long‐time scale simulations of virus‐like particles from three human‐norovirus strains

    The dynamics of the virus like particles (VLPs) corresponding to the GII.4 Houston, GII.2 SMV, and GI.1 Norwalk strains of human noroviruses (HuNoV) that cause gastroenteritis was investigated by means of long-time (about 30 μs in the laboratory timescale) molecular dynamics simulations with the coarse-grained UNRES force field. The main motion of VLP units turned out to be the bending at the junction between the P1 subdomain (that...

    Full text available to download

  • Task Allocation and Scalability Evaluation for Real-Time Multimedia Processing in a Cluster Envirinment

    An allocation algorithm for stream processing tasks is proposed (Modified best Fit Descendent, MBFD). A comparison with another solution (BFD) is provided. Tests of the algorithms in an HPC environment are descrobed and the results are presented. A proper scalability metric is proposed and used for the evaluation of the allocation algorithm.

    Full text to download in external service

  • Conformance testing of parallel languages

    Przedstawiono propozycję formalizacji opisu procesu generacji, wykonania ioceny testów zgodności dla języków i bibliotek programowania równoległego, wzakresie zgodności funkcjonalnej i wydajnościowej. Przykłady ilustrujące proponowany formalizm wykorzystują platformę programowania Athapascan.

  • Towards Increasing Density of Relations in Category Graphs
    Publication

    In the chapter we propose methods for identifying new associations between Wikipedia categories. The first method is based on Bag-of-Words (BOW) representation of Wikipedia articles. Using similarity of the articles belonging to different categories allows to calculate the information about categories similarity. The second method is based on average scores given to categories while categorizing documents by our dedicated score-based...

    Full text to download in external service

  • Prediction of Processor Utilization for Real-Time Multimedia Stream Processing Tasks
    Publication

    Utilization of MPUs in a computing cluster node for multimedia stream processing is considered. Non-linear increase of processor utilization is described and a related class of algorithms for multimedia real-time processing tasks is defined. For such conditions, experiments measuring the processor utilization and output data loss were proposed and their results presented. A new formula for prediction of utilization was proposed...

  • Dynamic Analysis of Enterprise Business Scenarios
    Publication

    - Year 2011

    W artykule przedstawiono system wspomagający projektowanie i poprawęscenariuszy procesów biznesowych. Scenariusze są wykonywane oraz monitorowane w środowisku SOA. Zaproponowany system oferuje dynamiczne gromadzenie i ocenianie metryk scenariuszy. Na podstawie wyników analizy wydajność, jakość oraz użyteczność scenariuszy są ulepszane. Dzięki elastycznemu API, system obsługuje dowolną rozszerzalną technologię wykonania scenariuszy...

  • Effective Decision-Making in Supply Chain Management

    Proper decision-making in Supply Chain Management (SCM) is crucial for an appropriately functioning mechanisms. The paper presents how IT technologies can impact on an organization and process realization. Especially Service Oriented Architecture (SOA) standard and the Cloud Computing (CC) paradigms are taken into account. A general model of decision-making is proposed and based on a specific practical example is analyzed using...

    Full text to download in external service

  • Improving methods for detecting people in video recordings using shifting time-windows
    Publication

    - Year 2018

    We propose a novel method for improving algorithms which detect the presence of people in video sequences. Our focus is on algorithms for applications which require reporting and analyzing all scenes with detected people in long recordings. Therefore one of the target qualities of the classification result is its stability, understood as a low number of invalid scene boundaries. Many existing methods process images in the recording...

    Full text to download in external service

  • The parallel environment for endoscopic image analysis
    Publication

    - Year 2002

    The jPVM-oriented environment to support high performance computing required for the Endoscopy Recommender System (ERS) is defined. SPMD model of image matching is considered and its two implementations are proposed: Lexicographical Searching Algorithm (LSA) and Gradient Serching Algorithm (GSA). Three classes of experiments are considered and the relative degree of similarity and execution time of each algorithm are analysed....

    Full text to download in external service

  • Paradoks decyzyjny – racjonalne i intuicyjne podejmowanie decyzji
    Publication

    - Year 2021

    W pracy scharakteryzowano poszczególne etapy działań prowadzące do znajdowania najlepszych rozwiązań dla rozpatrywanego problemu. Zwrócono uwagę na paradoks decyzyjny który wskazuje, że mądre rozwiązanie problemu wymaga zarówno racjonalnego, jak i intuicyjnego podejścia. Na przykładzie sortowania obrazów zaprezentowano niezależnie oba podejścia podkreślając potrzebę ich wzajemnego uzupełniania się. Podkreślono trudność budowy algorytmów,...

    Full text to download in external service

  • A Universal Theory of Wisdom . A Mind - oriented Approach
    Publication

    - DIALOGUE AND UNIVERSALISM - Year 2020

    The purpose of the paper is to synthesize the issues of human wisdom in terms of minds which create knowledge-based judgment. We form a transdisciplinary, big-picture view of the wisdom of humans. Findings: Wisdom is the right judgment and choice in the context of the art of living. Practical implications: Wisdom can be developed within the set of minds. Social implications: To pursue wisdom in thinking and action, one must extend...

    Full text to download in external service

  • Wisdom in the context of globalization and civilization
    Publication

    - Year 2019

    The book seeks to answer the question - what is wisdom and how should it be used in everyday life? A model of wisdom is presented in which wisdom describes three attributes: knowledge, qualifications (skills) and inspirations leading to consciously controlled processes of correct assessment of the situation and the correct choice of solution options in the context of the art of living. For each attribute, we can specify a set of...

    Full text to download in external service

  • Inteligentne zarządzanie usługami chmurowymi
    Publication

    Rozwój chmur obliczeniowych stanowi wyzwanie dla nowych efektywnych metod zarządzania zasobami chmurowymi, zwłaszcza, że oprócz usług typu SaaS rozwija się nowe kategorie usług jak obliczenia brzegowe czy wielochmurowe. W pracy zaproponowano ogólny model zarządzania usługami oraz efektywne procedury alokacji zasobów. Podkreślono potrzebę oszacowania parametrów zasobów chmury by zapewnić wykonanie żądanych usług. Przedstawiono również...

  • Algorytm mrówkowy do zarządzania zasobami sprzętowymi chmury obliczeniowej w przypadku różnych kategorii usług
    Publication

    Zarządzanie chmurą obliczeniową odbywa się na dwóch poziomach: zarządzanie żądaniami klientów chmury oraz zarządzanie jej infrastrukturą, na której te usługi są realizowane. Analizując standardy dotyczące zarządzania usługami, w niniejszym rozdziale skoncentrowano się na drugim poziomie zarządzania, którego głównym celem jest efektywne wykonanie wskazanej usługi (lub usług) na dostępnych zasobach sprzętowych, tak by spełnione zostały...

    Full text to download in external service

  • Bridge of Knowledge: an Internet platform for R2R and R2B transfer of knowledge and promotion of cooperation
    Publication

    Currently, the European Commission puts emphasis on supporting collaboration between universities and business. There are many possible ways to create a strong relationship between both these parties. Positive results of such cooperation lead to increased competitiveness of the global market and, in consequence, bring significant growth of innovation. The cooperation between research-to-research (R2R) and research-to-business (R2B)...

    Full text available to download

  • Parallel implementation of a Sailing Assistance Application in a Cloud Environment

    Sailboat weather routing is a highly complex problem in terms of both the computational time and memory. The reason for this is a large search resulting in a multitude of possible routes and a variety of user preferences. Analysing all possible routes is only feasible for small sailing regions, low-resolution maps, or sailboat movements on a grid. Therefore, various heuristic approaches are often applied, which can find solutions...

    Full text available to download

  • General Provisioning Strategy for Local Specialized Cloud Computing Environments
    Publication

    The well-known management strategies in cloud computing based on SLA requirements are considered. A deterministic parallel provisioning algorithm has been prepared and used to show its behavior for three different requirements: load balancing, consolidation, and fault tolerance. The impact of these strategies on the total execution time of different sets of services is analyzed for randomly chosen sets of data. This makes it possible...

    Full text to download in external service

  • Visual Features for Improving Endoscopic Bleeding Detection Using Convolutional Neural Networks
    Publication

    The presented paper investigates the problem of endoscopic bleeding detection in endoscopic videos in the form of a binary image classification task. A set of definitions of high-level visual features of endoscopic bleeding is introduced, which incorporates domain knowledge from the field. The high-level features are coupled with respective feature descriptors, enabling automatic capture of the features using image processing methods....

    Full text available to download

  • SERVICE-ORIENTED CYBERSPACE FOR IMPROVING CYBERSECURITY
    Publication

    - TASK Quarterly - Year 2020

    The paper presents a cyberspace model where different categories of IT services are offered and used largely. A general cybersecurity policy is considered and the corresponding cybersecurity strategies are shown. The role of such technologies as: Internet of Things, Cloud Computing and Big Data is analyzed in order to improve the cybersecurity of a cyberspace. A new kind of service oriented cyberspace is proposed and its main properties...

    Full text available to download

  • SMART SHOP SERVICES FOR BUILDING CUSTOMER-ORIENTED SCENARIOS
    Publication

    The shops of today mostly support the customer by offering him or her products based on basic relationships between products viewed or ordered by users with similar tastes. This common approach may fail in many cases especially when the user does not have sufficient knowledge about the market, or when he or she wants to build a set of products in more than one shop. New categories of smart shop services are proposed in order to...

    Full text available to download

  • Smart Services for Improving eCommerce
    Publication

    - Year 2020

    The level of customer support provided by the existing eCom-merce solutions assumes that the person using the functionality of theshop has sufficient knowledge to decide on the purchase transaction. Alow conversion rate indicates that customers are more likely to seekknowledge about the particular product than finalize the transaction.This is facilitated by the continuous development of customers’ digi-tal...

  • Modele przetwarzania aplikacji na klastrach obliczeniowych
    Publication

    W dzisiejszych czasach badania prowadzone w różnych dziedzinach nauki a także różnego rodzaju aplikacje i wdrożone systemy operują na coraz większych wolumenach danych przy jednocześnie rosnących wymaganiach dotyczących czasu wykonania. Z tego powodu coraz częściej do obliczeń wykorzystuje się klastry obliczeniowe, gdzie do dyspozycji użytkowników pozostaje ogromna moc obliczeniowa (liczona w tera a nawet peta flopach), terabajty...

  • Object serialization and remote exception pattern for distributed C++/MPI application

    MPI is commonly used standard in development of scientific applications. It focuses on interlanguage operability and is not very well object oriented. The paper proposes a general pattern enabling design of distributed and object oriented applications. It also presents its sample implementations and performance tests.

  • Inżynierowie przyszłości
    Publication

    W artykule omówiono dwie podstawowe metody kształcenia inżynierów oraz podkreślono rolę we współczesnym świecie inżynierów,zwracając uwagę na rozwój twórczych umiejętności, tak niezbędnych w globalnej gospodarce. Zaakcentowano potrzeby zmian oraz trudności ich realizacji w obecnych warunkach. Wskazano także rozwiązania już wdrażanie na Politechnice Gdańskiej.

seen 4980 times