Filters
total: 6562
filtered: 4518
-
Catalog
- Publications 4518 available results
- Journals 281 available results
- Conferences 104 available results
- People 202 available results
- Inventions 1 available results
- Projects 14 available results
- e-Learning Courses 132 available results
- Events 10 available results
- Open Research Data 1300 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: MACHINE LEARNING, DEEP NEURAL NETWORKS, CEREBRAL MICROBLEEDS, CMB DETECTION, MR IMAGES
-
Comparison of selected clustering algorithms of raw data obtained by interferometric methods using artificial neural networks
Publication -
Emotion Recognition from Physiological Channels Using Graph Neural Network
PublicationIn recent years, a number of new research papers have emerged on the application of neural networks in affective computing. One of the newest trends observed is the utilization of graph neural networks (GNNs) to recognize emotions. The study presented in the paper follows this trend. Within the work, GraphSleepNet (a GNN for classifying the stages of sleep) was adjusted for emotion recognition and validated for this purpose. The...
-
MultiRegional PCA for leakage detection and localisation in DWDS - approach
PublicationMonitoring is one of the most important parts in advanced control of complex dynamic systems. Information about systems behavior, including failures indicating, enables for efficient control. The chapter describes an approach to detection and localisation of pipe leakage in Drinking Water Distribution Systems (DWDS) representing complex and distributed dynamic system of large scale. Proposed MultiRegional Principal Component Analysis...
-
EXPERIMENTAL AND THEORETICAL FLOW OF THE FORCES IN DEEP BEAMS WITH CANTILEVAR
PublicationThis article presents the results of experimental research carried out on deep beams with cantilever which was loaded throughout the depth. The main deep beam was directly simply supported on the one side. On the other side the deep beam was suspended in another deep member situated at right angles. All deep beams created a spatial arrangement. The paper is focused on the analysis of the cracks morphology and flow of the internal...
-
Statistical Data Pre-Processing and Time Series Incorporation for High-Efficacy Calibration of Low-Cost NO2 Sensor Using Machine Learning
PublicationAir pollution stands as a significant modern-day challenge impacting life quality, the environment, and the economy. It comprises various pollutants like gases, particulate matter, biological molecules, and more, stemming from sources such as vehicle emissions, industrial operations, agriculture, and natural events. Nitrogen dioxide (NO2), among these harmful gases, is notably prevalent in densely populated urban regions. Given...
-
Feature Reduction Using Similarity Measure in Object Detector Learning with Haar-like Features
PublicationThis paper presents two methods of training complexity reduction by additional selection of features to check in object detector training task by AdaBoost training algorithm. In the first method, the features with weak performance at first weak classifier building process are reduced based on a list of features sorted by minimum weighted error. In the second method the feature similarity measures are used to throw away that features...
-
Grade of service determination methodology in IP networks with SIP protocol
PublicationAlthough Grade of Service is very important in VoIP providers evaluation, We wasn't able to find any paper regarding the topic of measuring GoS variables for IP networks utilizing SIP, which are defined like for PSTN/ISDN/GSM networks (post-selection delay, answering delay, release delay, or probability of end-to-end blocking). Due to the lack of research in this field, it was necessary to start from defining measures and cover...
-
Evaluation the effectiveness of virtual machine integrated with CPU
PublicationIn the paper effectiveness of example CPU with integrated virtual machine is presented. The idea and implementation of virtual machine is shown. In next sections reference CPU and sample virtual machine is described. Finally optimality of the translation process is analysed.
-
A Closed Bipolar Electrochemical Cell for the Interrogation of BDD Single Particles: Electrochemical Advanced Oxidation
PublicationA closed bipolar electrochemical cell containing two conductive boron-doped diamond (BDD) particles of size 250 – 350 m, produced by high-pressure high-temperature (HPHT) synthesis, has been used to demonstrate the applicability of single BDD particles for electrochemical oxidative degradation of the dye, methylene blue (MB). The cell is fabricated using stereolithography 3D printing and the BDD particles are located at either...
-
Model szkolenia "Blended learning" z wykorzystaniem platformy Oracle I-learning.
PublicationW artykule zaproponowano modele organizacyjne szkoleń "blended learning", które pokazują możliwości współpracy firm prywatnych z instytucjami edukacyjnymi w dziedzinie e-learningu. W ramach wspólnego eksperymentu firm Oracle, Incenti S.A., WiedzaNet Sp. z o.o. oraz Centrum Edukacji Niestacjonarnej Politechniki Gdańskiej w semestrze letnim roku akademickiego 2003/2004 udostępniony będzie kurs dla studentów Wydziału Inzynierii Lądowej...
-
From evil demiurge to caring hero: Images of geneticists in the movies
PublicationAlthough images of science and scientists depicted in popular culture have been criticized as an exaggeration and fear mongering, the cinema is an important resource that influences individuals’ beliefs about science. Because popular depictions of science play a crucial role in constructing the public’s ‘scientific imaginary’ they constitute an inherent dimension of the social understanding of science and are as important for...
-
Neural network simulator's application to reference performance determination of turbine blading in the heat-flow diagnostics.
PublicationIn the paper, the possibility of application of artificial neural networks to perform the fluid flow calculations through both damaged and undamaged turbine blading was investigated. Preliminary results are presented and show the potentiality of further development of the method for the purpose of heat-flow diagnostics.
-
Adding Interpretability to Neural Knowledge DNA
PublicationThis paper proposes a novel approach that adds the interpretability to Neural Knowledge DNA (NK-DNA) via generating a decision tree. The NK-DNA is a promising knowledge representation approach for acquiring, storing, sharing, and reusing knowledge among machines and computing systems. We introduce the decision tree-based generative method for knowledge extraction and representation to make the NK-DNA more explainable. We examine...
-
A compact smart sensor based on a neural classifier for objects modeled by Beaunier's model
PublicationA new solution of a smart microcontroller sensor based on a simple direct sensor-microcontroller interface for technical objects modeled by two-terminal networks and by the Beaunier’s model of anticorrosion coating is proposed. The tested object is stimulated by a square pulse and its time voltage response is sampled four times by the internal ADC of microcontroller. A neural classifier based on measurement data classifies the...
-
An Analysis of Neural Word Representations for Wikipedia Articles Classification
PublicationOne of the current popular methods of generating word representations is an approach based on the analysis of large document collections with neural networks. It creates so-called word-embeddings that attempt to learn relationships between words and encode this information in the form of a low-dimensional vector. The goal of this paper is to examine the differences between the most popular embedding models and the typical bag-of-words...
-
E-learning versus traditional learning - Polish case
PublicationE-learning jest współczesnym fenomenem, który pozwala na dostęp do kształcenia i treści edukacyjnych, niezależnie od czasu i miejsca, dla każdego użytkownika. E-learnig tworzy ogromne możliwości dla uczelni akademickich, organizacji, instytucji komercyjnych i szkoleniowych, dostarczając na żądanie kształcenia i szkoleń w wirtualnym środowisku. Student może stworzyć własny plan kształcenia, dostosowując go do swojej pracy i sytuacji...
-
STUDY IN MECHANICAL FAULT ELEMENT THERMOGRAPHY THROUGH THE MACHINE: The case of deep groove ball bearings of a career without screen.
Publication -
Resilient Routing in Communication Networks
PublicationThis important text/reference addresses the latest issues in end-to-end resilient routing in communication networks. The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs). For each of these network architectures, a selection of...
-
Merging Images from Parallel Depth Cameras
PublicationIn this paper a problem of simultaneous information acquisition from multiple depth cameras is investigated, aiming at obtaining single overall picture containing information from all cameras. The experiments are carried out on Microsoft Kinect devices. A methodology for merging images from multiple positioned in a line cameras is proposed. The method is based on the concept of simulating a view of an imaginary camera covering...
-
Merging Images From Parallel Depth Cameras
PublicationIn this paper a problem of simultaneous information acquisition from multiple depth cameras is investigated, aiming at obtaining single overall picture containing information from all cameras. The experiments are carried out on Microsoft Kinect devices. A methodology for merging images from multiple positioned in a line cameras is proposed. The method is based on the concept of simulating a view of an imaginary camera covering...
-
A Computationally Efficient Model for Predicting Successful Memory Encoding Using Machine-Learning-based EEG Channel Selection
PublicationComputational cost is an important consideration for memory encoding prediction models that use data from dozens of implanted electrodes. We propose a method to reduce computational expense by selecting a subset of all the electrodes to build the prediction model. The electrodes were selected based on their likelihood of measuring brain activity useful for predicting memory encoding better than chance (in terms of AUC). A logistic...
-
Machine Learning-Based Wetland Vulnerability Assessment in the Sindh Province Ramsar Site Using Remote Sensing Data
Publication -
Development of advanced machine learning for prognostic analysis of drying parameters for banana slices using indirect solar dryer
PublicationIn this study, eXtreme Gradient Boosting (XGBoost) and Light Gradient Boosting (LightGBM) algorithms were used to model-predict the drying characteristics of banana slices with an indirect solar drier. The relationships between independent variables (temperature, moisture, product type, water flow rate, and mass of product) and dependent variables (energy consumption and size reduction) were established. For energy consumption,...
-
Practical issues for the implementation of survivability and recovery techniques in optical networks
PublicationFailures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...
-
Topology recognition and leader election in colored networks
PublicationTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
Predicting Ice Phenomena in a River Using the Artificial Neural Network and Extreme Gradient Boosting
PublicationForecasting ice phenomena in river systems is of great importance because these phenomena are a fundamental part of the hydrological regime. Due to the stochasticity of ice phenomena, their prediction is a difficult process, especially when data sets are sparse or incomplete. In this study, two machine learning models—Multilayer Perceptron Neural Network (MLPNN) and Extreme Gradient Boosting (XGBoost)—were developed to predict...
-
Modelling relation between oxidation resistance and tribological properties of non-toxic lubricants with the use of artificial neural networks
Publication -
Long Short-Term Memory (LSTM) neural networks in predicting fair price level in the road construction industry
Publication -
Application of neural networks for identification of forcedness having effect on magnitude of turbine rotor vibration using rotor trajectory.
PublicationW pracy dokonano analizy zastosowania sieci neuronowych do wyznaczenia wartości wymuszeń wpływających na wielkość drgań wirnika używając trajektorii jako parametr określający drgania. Badania przeprowadzono na powietrznej, jednostopniowej turbinie modelowej. Przemieszczenia poziome i pionowe wirnika turbiny mierzono przy pomocy systemu pomiarowego i rejestrowano na oscyloskopie cyfrowym. Przeprowadzono pomiary trajektorii ruchu...
-
Application of Shape From Shading Technique for Side Scan Sonar Images
PublicationSide scan sonar (SSS) is one of the most widely used imaging systems in the underwater environment. It is relatively cheap and easy to deploy in comparison with more powerful sensors like multibeam echosounder or synthetic aperture sonar. Although, the SSS does not provide directly the seafloor bathymetry measurements. Its outputs are usually in a form of grey level acoustic images of seafloor. However, the analysis of such images...
-
Discovering Rule-Based Learning Systems for the Purpose of Music Analysis
PublicationMusic analysis and processing aims at understanding information retrieved from music (Music Information Retrieval). For the purpose of music data mining, machine learning (ML) methods or statistical approach are employed. Their primary task is recognition of musical instrument sounds, music genre or emotion contained in music, identification of audio, assessment of audio content, etc. In terms of computational approach, music databases...
-
Deep slot effect in the squirrel-cage induction motors with scalar (V/F) control
PublicationQualitative characteristics of the electrical drive considerably depend on identification accuracy of math model parameters. In particular, it is depend on detection accuracy of stator active resistance r1 that is used in calculation of flux linkages, rotary speed in sensorless control systems. Paper provides analysis of influence of stator deep slot effect to stator active resistance value
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublicationCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Automatic detection of abandoned luggage employing a dual camera system
PublicationA system for automatic detection of events using a system of fixed and PTZ (pan-tilt-zoom) cameras is described. Images from the fixed camera are analyzed by means of object detection and tracking. Event detection system uses a set of rules to analyze data on the tracked moving objects and to detect defined events. A PTZ camera is used to obtain a detailed view of a selected object. A procedure for conversion between the pixel...
-
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublicationIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
Computer-Aided Detection of Hypertensive Retinopathy Using Depth-Wise Separable CNN
PublicationHypertensive retinopathy (HR) is a retinal disorder, linked to high blood pressure. The incidence of HR-eye illness is directly related to the severity and duration of hypertension. It is critical to identify and analyze HR at an early stage to avoid blindness. There are presently only a few computer-aided systems (CADx) designed to recognize HR. Instead, those systems concentrated on collecting features from many retinopathy-related...
-
Images of the Seabed of the Gulf of Gdansk Obtained by Means of the Parametric Sonar
PublicationThe main goal of this paper is to present results of the experimental investigation of the seabed by means of parametric echosounder in the form of chosen images. The phenomena of nonlinear interaction between two parallel beams of high intensity gives as a results very narrow beam of low frequency wave, that enables to penetrate the sea bottom. The first step of our investigations was calibration of all the elements of the measuring...
-
Towards a classification of networks with asymmetric inputs
PublicationCoupled cell systems associated with a coupled cell network are determined by (smooth) vector fields that are consistent with the network structure. Here, we follow the formalisms of Stewart et al (2003 SIAM J. Appl. Dyn. Syst. 2, 609–646), Golubitsky et al (2005 SIAM J. Appl. Dyn. Syst. 4, 78–100) and Field (2004 Dyn. Syst. 19, 217–243). It is known that two non-isomorphic n-cell coupled networks can determine the same sets of...
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublicationAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...
-
The reliability of tree and star networks.
PublicationOne of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...
-
Sensorless Fault Detection of Induction Motor with Inverter Output Filter
PublicationThe paper presents the problem of monitoring and fault detection of a sensorless voltage inverter fed squirrel cage induction motor with LC filter. The detection is based on load torque estimation of the investigated torque transmission system. The load torque is calculated besides the computation of other variables that are mandatory for sensorless drive operation such as rotor flux and speed. The implemented LC filter smooths...
-
Epidemiology of Cranio-Cerebral Injuries in Emergency Medical Services Practice
Publication -
Communication Networks in the Service of the Environmental Monitoring
PublicationIn the paper selected issues relating to communication networks in the services of the environmental monitoring (EM) have been described. It is divided into three main parts: introduction, wire and wireless networks. At the beginning of the basic definitions were explained. The wire part focuses on a plain old telephone service (POTS), an integrated services digital network (ISDN), a digital subscriber line (DSL) and a fiber-optic...
-
Detection of anomalies in bee colony using transitioning state and contrastive autoencoders
PublicationHoneybees plays vital role for the environmental sustainability and overall agricultural economy. Assisting bee colonies within their proper functioning brings the attention of researchers around the world. Electronics systems and machine learning algorithms are being developed for classifying specific undesirable bee behaviors in order to alert about upcoming substantial losses. However, classifiers could be impaired when used...
-
Secure Quaternion Feistel Cipher for DICOM Images
PublicationAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
A novel hybrid adaptive framework for support vector machine-based reliability analysis: A comparative study
PublicationThis study presents an innovative hybrid Adaptive Support Vector Machine - Monte Carlo Simulation (ASVM-MCS) framework for reliability analysis in complex engineering structures. These structures often involve highly nonlinear implicit functions, making traditional gradient-based first or second order reliability algorithms and Monte Carlo Simulation (MCS) time-consuming. The application of surrogate models has proven effective...
-
Feature extraction in detection and recognition of graphical objects
PublicationDetection and recognition of graphic objects in images are of great and growing importance in many areas, such as medical and industrial diagnostics, control systems in automation and robotics, or various types of security systems, including biometric security systems related to the recognition of the face or iris of the eye. In addition, there are all systems that facilitate the personal life of the blind people, visually impaired...
-
Deep Learning-based Recalibration of the CUETO and EORTC Prediction Tools for Recurrence and Progression of Non–muscle-invasive Bladder Cancer
Publication -
Detection of Anomalies in the Operation of a Road Lighting System Based on Data from Smart Electricity Meters
PublicationSmart meters in road lighting systems create new opportunities for automatic diagnostics of undesirable phenomena such as lamp failures, schedule deviations, or energy theft from the power grid. Such a solution fits into the smart cities concept, where an adaptive lighting system creates new challenges with respect to the monitoring function. This article presents research results indicating the practical feasibility of real‐time...
-
Appraisal of images in EIT
PublicationW pracy zaprezentowano metody stosowane do oceny jakości rekonstruowanych obrazów w tomografii elektroimpedancyjnej.