Filters
total: 2531
filtered: 1487
-
Catalog
- Publications 1487 available results
- Journals 241 available results
- Conferences 136 available results
- People 295 available results
- Projects 2 available results
- Research Teams 1 available results
- e-Learning Courses 101 available results
- Events 5 available results
- Open Research Data 263 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: MULTIMODAL COMPUTER INTERFACES
-
Perspectives of Telematics Implementation in Tri-City Transport Systems Management and Planning
PublicationIn 2010 the City of Gdynia applied for match funding the project ''Implementation of the Integrated Traffic Management System TRISTAR in Tri-City" under the Operational Programme Infrastructure and Environment. This year the project has been placed on a list approved by the Ministry of Infrastructure. Tri-City proceeds with a tender for the implementation of the system. The project will be implemented in key elements are included...
-
Measurement of the Development of a Learning IT Organization Supported by a Model of Knowledge Acquisition and Processing
PublicationThe paper presents a model of knowledge acquisition and processing for the development of learning organizations. The theory of a learning organization provides neither metrics nor tools to measure its development The authors' studies in this field are based on their experience gathered after projects realized in real IT organizations. The authors have described the construction of the model and the methods of its verification...
-
A concept for comprehensive knowledge management system
PublicationPrzedstawiono kluczowe elementy koncepji uogólnionego modelu zarządzania wiedzą w oparciu o przepływy pracy w procesowym widzeniu organizacji.
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Evolutionary Sets of Safe Ship Trajectories: improving the method by adjusting evolutionary techniques and parameters
PublicationThe paper presents some of the evolutionary techniques used by the evolutionary sets of safe ship trajectories method. In general, this method utilizes a customized evolutionary algorithm to solve a constrained optimization problem. This problem is defined as finding a set of cooperating trajectories (here the set is an evolutionary individual) of all the ships involved in the encounter situation. The resulting trajectories are...
-
Categorization of Wikipedia articles with spectral clustering
PublicationAbstract. The article reports application of clustering algorithms for creating hierarchical groups withinWikipedia articles.We evaluate three spectral clustering algorithms based on datasets constructed with usage ofWikipedia categories. Selected algorithm has been implemented in the system that categorize Wikipedia search results in the fly.
-
Self-Organizing Map representation for clustering Wikipedia search results
PublicationThe article presents an approach to automated organization of textual data. The experiments have been performed on selected sub-set of Wikipedia. The Vector Space Model representation based on terms has been used to build groups of similar articles extracted from Kohonen Self-Organizing Maps with DBSCAN clustering. To warrant efficiency of the data processing, we performed linear dimensionality reduction of raw data using Principal...
-
Architecture and Basic Assumptions of RSMAD
PublicationThe study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...
-
Performance Measurements of Real Time Video Transmission from Car Patrol
PublicationThe HSUPA technology application to video streaming from moving vehicle to the central server is presented in the paper. A dedicated software for transmission control in case of non public IP address is employed. Quality of video streaming in urban area was measured. Several car routes were investigated in the area of the Polish Tricity. Measurements pointed out that the real time streaming quality during vehicle movement is sufficient...
-
Induction of the common-sense hierarchies in lexical data
PublicationUnsupervised organization of a set of lexical concepts that captures common-sense knowledge inducting meaningful partitioning of data is described. Projection of data on principal components allow for dentification of clusters with wide margins, and the procedure is recursively repeated within each cluster. Application of this idea to a simple dataset describing animals created hierarchical partitioning with each clusters related...
-
Analysis of the Suitability of Selected Data Tranmission Systems in RSMAD
PublicationThis paper analyses the suitability of the selected radio communication systems currently used for data transmission, or usable in the future, in Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The paper also presents the advantages and disadvantages of each systems, paying particular attention to features that directly affect the suitability of the solution in the RSMAD system....
-
A Note on Shannon Capacity for Invariant and Evolving Channels
PublicationIn the paper we discuss the notion of Shannon capacity for invariant and evolving channels. We show how this notion is involved in information theory, graph theory and Ramsey theory.
-
Detection and localization of selected acoustic events in 3D acoustic field for smart surveillance applications
PublicationA method for automatic determination of position of chosen sound events such as speech signals and impulse sounds in 3-dimensional space is presented. The events are localized in the presence of sound reflections employing acoustic vector sensors. Human voice and impulsive sounds are detected using adaptive detectors based on modified peak-valley difference (PVD) parameter and sound pressure level. Localization based on signals...
-
Hierarchical Estimation of Human Upper Body Based on 2D Observation Utilizing Evolutionary Programming and 'Genetic Memory'
PublicationNew method of the human body pose estimation based on single camera 2D observation is presented. It employs 3D model of the human body, and genetic algorithm combined with annealed particle filter for searching the global optimum of model state, best matching the object's 2D observation. Additionally, motion cost metric is employed, considering current pose and history of the body movement, favouring the estimates with the lowest...
-
Terminological and Assertional Queries in KQL Knowledge Access Language
PublicationOne of the directions of development of information systems in recent years in the evolution of data-based systems into the knowledge-based systems. As a part of this process there is ongoing work on a whole range of languages for accessing knowledge bases. They can be used in a variety of applications, however their main drawback is the lack of clearly defined algebra representing a theoretical basis for them. For instance, such...
-
Constructing a map of an anonymous graph: applications of universal sequences
PublicationWe study the problem of mapping an unknown environmentrepresented as an unlabelled undirected graph. A robot (or automaton)starting at a single vertex of the graph G has to traverse the graph and return to its starting point building a map of the graph in the process. We are interested in the cost of achieving this task (whenever possible) in terms of the number of edge traversal made by the robot. Another optimization criteria...
-
Ontology Engineering Aspects in the Intelligent Systems Development
PublicationThe ontology engineering encompasses both, artificial intelligence methods and software engineering discipline. The paper tries to address a selection of aspects pertaining to development activities such as choice of the environmental framework, functionality description, specification methods and roles definition. Authors refer to the ontology development projects they were involved in.
-
Methods of Incomplete and Uncertain Knowledge Acquisition in the Knowledge Processing Environemnt
PublicationThe authors in this paper present a concept of the environment to acquire and process knowledge about information technology. This solution is part of a project of which the objective is to build a system for the evaluation of IT tools and methodologies. Knowledge within this domain is always either uncertain or incomplete. Therefore, the authors focused on designing a dedicated algorithm for its acquisition and processing. One...
-
Supporting Software Project Management Processes Using the Agent System
PublicationThe natural development of information technology area stimulates intense growth of various technologies which support basic organization processes. The range of technologies implies appropriate management thereof, as well as accurate correspondence with conducted activities. Abandonment of activities within individual branches in favour of project approach to performed assignments (especially those connected with software development)...
-
Deterministic rendezvous of asynchronous bounded-memory agents in polygonal terrains
PublicationTwo mobile agents, modeled as points starting at differentlocations of an unknown terrain, have to meet. The terrain is a polygon with polygonal holes. We consider two versions of this rendezvous problem: exact RV, when the points representing the agents have to coincide at some time, and epsilon-RV, when these points have to get at distance less than epsilon in the terrain. In any terrain, each agent chooses its trajectory, but...
-
Interactive cognitive-behavioural decision making system
PublicationPraca przedstawia wyniki przekształcenia modelu psychologicznego człowieka w interaktywny, poznawczo-behawioralny, system podejmowania decyzji, uwarunkowany zarówno środowiskowo, jak i ze względu na stany spełnienia założonych potrzeb. Model ludzkiej psychologii oparty jest na psychologii poznawczej i psychologii osobowości. Zawiera on emocje, potrzeby i struktury ludzkich procesów poznawczych. Opracowany model i sposób realizacji...
-
Supporting Management Decisions with Intelligent Mechanisms of Obtaining and Processing Knowledge
PublicationThis paper is a summary of the authors' work on a model of support for decision processes in organisation management. Key decisions in organisations are often made without sufficient knowledge and by people lacking the proper qualifications and experience. Without full support in decision processes, true threats to organisations are created. Therefore, to support decision processes in numerous organisations, apart from experts...
-
GreedyMAX-type Algorithms for the Maximum Independent Set Problem
PublicationA maximum independent set problem for a simple graph G = (V,E) is to find the largest subset of pairwise nonadjacent vertices. The problem is known to be NP-hard and it is also hard to approximate. Within this article we introduce a non-negative integer valued functionp defined on the vertex set V(G) and called a potential function of agraph G, while P(G) = max{vinV(G)| p(v)} is called a potential of G. For any graph P(G) <= D(G),...
-
Ontology as a Tool for the IT Management Standards Support
PublicationIn this paper the authors discuss the initial idea of using ontologies to model requirements of the standards that support IT management processes. The Open Group Architecture Framework (TOGAF) is set as an example. A need for transition from the generic model do the organization-specific one is indicated. The described example serves as a ground for considering the usefulness of such modeling approach in the wider spectrum of...
-
A Clustering-Based Methodology for Selection of Fault Tolerance Techniques
PublicationDevelopment of dependable applications requires selection of appropriate fault tolerance techniques that balance efficiency in fault handling and resulting consequences, such as increased development cost or performance degradation. This paper describes an advisory system that recommends fault tolerance techniques considering specified development and runtime application attributes. In the selection process, we use the K-means...
-
mechanical engineering education via projects in multibody dynamics
PublicationPraca prezentuje rozważania nad wykorzystaniem interdyscyplinarnych projektów bazujących na zasadach dynamiki układów wieloczłonowych, traktowanych tu jako rozwinięcie kursu klasycznej mechaniki. Celem dydaktycznym jest zebranie w jednym procesie dydaktycznym takich aspektów jak: możliwość wykorzystania poznanych teoretycznie równań do modelowania i analizy znanego mu obiektu rzeczywistego; umożliwienie formułowania i testowania...
-
2-bondage in graphs
PublicationA 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The 2-bondage number of G, denoted by b_2(G), is the minimum cardinality among all sets of edges E' subseteq E such that gamma_2(G-E') > gamma_2(G). If for every E' subseteq E we have...
-
Multisource model of ship electric field
PublicationA steel-hulled ship in sea water produces an electric field around itself. The source of this field are electrochemical processes and ship's cathodic protection. The analysis of the electric field around the ship is important by the reason of the ship's identification and counter-mine protection. The paper presents a simplified model of the ship's multisource electric field, which allows to calculate the electric field distribution...
-
Comparison of Selection Schemes in Evolutionary Method of Path Planning
PublicationThis article compares an impact of using various selection schemes on the quality of the solution for the problem of planning the path for a moving object using the evolutionary method. In study case problem of avoiding collisions at sea is analyzed. The modelled environment includes static constraints (lands, canals, etc.) and dynamic objects (moving ships). Article analyses behaviour of selection schemes in two similar environments...
-
The passive operating mode of the linear optical gesture sensor
PublicationThe study evaluates the influence of natural light conditions on the effectiveness of the linear optical gesture sensor, working in the presence of ambient light only (passive mode). The orientations of the device in reference to the light source were modified in order to verify the sensitivity of the sensor. A criterion for the differentiation between two states - "possible gesture" and "no gesture" - was proposed. Additionally,...
-
KEYSTONE WG2: Activities and Results Overview on Keyword Search
PublicationIn this chapter we summarize activities and results achieved by the Keyword Search Working Group (WG2) of the KEYSTONE Cost Action IC1302. We present the goals of the WG2, its main activities in course of the action and provide a summary of the selected publications related to the WG2 goals and co-authored by WG2 members. We concludewith a summary of open research directions in the area of keyword search for structured data.
-
Clearing directed subgraphs by mobile agents
PublicationWe study several problems of clearing subgraphs by mobile agents in digraphs. The agents can move only along directed walks of a digraph and, depending on the variant, their initial positions may be pre-specified. In general, for a given subset S of vertices of a digraph D and a positive integer k, the objective is to determine whether there is a subgraph H=(V,A) of D such that (a) S is a subset of V, (b) H is the union of k directed...
-
Ranking decision variants by subjective paird comparisons in cases with incomplete data.
PublicationMetoda porównań parami wykorzystywana jest do szeregowania skończonej,zwykle niewielkiej liczby wariantów decyzyjnych. W metodzie tej ekspert lub grupa ekspertów proszona jest o wyrażenie swojej opinii dotyczącej każdej pary wariantów w postaci względnej preferenecji jednego wariantu nad drugim.Zdarza się jednak często, że ekspert nie jest w stanie ocenić pary lub par wiariantów i mamy wtedy do czynienia z sytuacją...
-
Comparison of construction algorithms for minimal, acyclic, deterministicfinite state automata from sets of strings.
PublicationArtykuł porównuje różne metody tworzenia minimalnych, acyklicznych, deterministycznych automatów skończonych ze zbiorów słów. Wdrożone i porównane zostały metody przyrostowe, prawie przyrostowe i nieprzyrostowe.
-
Admission control method based on effective delay for flows using EF PHB.
Publication.
-
Architecture and implementation of distributed data storage using Web Services, CORBA i PVM. W: Proceedings. PPAM 2003. Parallel Processing and Applied Mathematics. Fifth International Conference. Częstochowa, 7-10 September 2003. Architektura i implementacja rozproszonego zarządzania danymi używając systemów Web Services, CORBA i PVN.
PublicationProponujemy architekturę i jej implementację PVMWeb Cluster I/O przeznaczoną do rozproszonego zarządzania danymi. Dane zapisywane są w systemie Web Services z geograficznie odległych klientów lub przez wywołania CORBA z wewnątrz danego klastra co oferuje lepsze osiągi.
-
Remote exception handling for PVM processes.
PublicationArtykuł przedstawia model lokalnej i zdalnej obsługi wyjątków w bibliotece PVM. Działający proces zostaje rozszerzony o możliwość zgłaszania zdalnych wyjątków do procesu nadrzędnego lub otrzymania akcji związanych z obsługą wyjątków. Przedstawiono wzorce obsługi wyjątków w aplikacjach rozproszonych oraz wprowadzono pojęcie Zdalnego Nadzorcy Wyjątków. Nadzorca może kontrolować każdy proces w maszynie wirtualnej (PVM).
-
PVM Web Cluster: integration of PVM clusters using Web services and CORBA.
PublicationProponujemy nową architekturę i jej implementację PVM Web Cluster, która umożliwia łatwe zrównoleglanie wykonania zadań PVM zarówno na geograficznie rozproszone klastry PVM jak i wewnątrz nich. Uruchamianie zadań jest wykonywane poprzez wywołanie usługi sieciowej (Web service), która negocjuje najlepszy klaster (klastry) dla danego zadania i komunikuje się z klastrami za pomocą standardu CORBA.
-
Exception handling model influence factors for discributed systems. W: Proceedings. PPAM 2003. Parallel Processing and Applied Mathematics. 5th In- ternational Conference. Częstochowa, 7-10 September 2003.Model obsługi wyjątków uwzględniający wpływ czynników systemu rozproszonego.
PublicationSpecyfikacja programu jest jasno określona w systemach sekwencyjnych, gdzie posiada standardowe i wyjątkowe przejścia. Praca przedstawia rozszerzony model specyfikacji systemu w środowiskach rozproszonych uwzględniający szereg specyficznych czynników. Model zawiera analizę specyfikacji pod kątem obsługi wyjątków dla rozproszonych danych oraz komunikacji międzyprocesorowej. Ogólny model został zaimplementowany w środowisku...
-
Testing for conformance of parallel programming pattern languages
PublicationThis paper reports on the project being run by TUG and IMAG, aimed at reducing the volume of tests required to exercise parallel programming language compilers and libraries. The idea is to use the ISO STEP standard scheme for conformance testing of software products. A detailed example illustrating the ongoing work is presented.
-
Automated network control and supervision
PublicationPrzedstawiono ogólne problemy związane z postępem w zakresie integracji systemów informatycznych w elektroenergetyce. Podano zasady budowy struktury systemów sterowania i nadzoru.
-
Problem of inconsistent and contradictory judgements in pairwise comparisonmethod in sense of AHP
PublicationThe aim of this paper is to show the relationship between inconsistent and contradictory matrices of data obtained as a result of the pairwise comparison of factors in the sense of the Analytic Hierarchy Process. The consistency check is performed to ensure that judgements are neither random nor illogical. This paper shows that even if a matrix will pass a consistency test successfully, it can be contradictory. Moreover an algorithm...
-
A 27/26-approximation algorithm for the chromatic sum coloring of bipartitegraphs
PublicationWe consider the CHROMATIC SUM PROBLEM on bipartite graphs which appears to be much harder than the classical CHROMATIC NUMBER PROBLEM. We prove that the CHROMATIC SUM PROBLEM is NP-complete on planar bipartite graphs with Delta less than or equal to 5, but polynomial on bipartite graphs with Delta less than or equal to 3, for which we construct an O(n(2))-time algorithm. Hence, we tighten the borderline of intractability for this...
-
Optimal linear control theory in power system application
PublicationPrzedstawiono syntezę stabilizatora systemowego przy wykorzystaniu metodyki Hinf. Zaprojektowany regulator umożliwia uzyskanie lepszych rezultatów w porównaniu z regulatorem odniesienia w szerokim zakresie zmian punktu pracy.
-
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis
PublicationRecently, a survey of cybersecurity assessment methods focused on general characteristics was conducted. Among its major findings, it revealed the methods’ adoption issues. This paper presents a follow-up to the study. It provides an in-depth analysis of the methods’ adoption-related properties based on qualitative metrics. As a result, the proposals which demonstrate a higher adoption potential were identified. The methods are...
-
Object serialization and remote exception pattern for distributed C++/MPI application
PublicationMPI is commonly used standard in development of scientific applications. It focuses on interlanguage operability and is not very well object oriented. The paper proposes a general pattern enabling design of distributed and object oriented applications. It also presents its sample implementations and performance tests.
-
Fast Collaborative Graph Exploration
PublicationWe study the following scenario of online graph exploration. A team of k agents is initially located at a distinguished vertex r of an undirected graph. At every time step, each agent can traverse an edge of the graph. All vertices have unique identifiers, and upon entering a vertex, an agent obtains the list of identifiers of all its neighbors. We ask how many time steps are required to complete exploration, i.e., to make sure...
-
Zero-Visibility Cops and Robber Game on a Graph
PublicationWe examine the zero-visibility cops and robber graph searching model, which differs from the classical cops & robber game in one way: the robber is invisible. We show that this model is not monotonic. We also provide bounds on both the zero-visibility copnumber and monotonic zero-visibility copnumber in terms of the pathwidth.
-
Audio-visual surveillance system for application in bank operating room
PublicationAn audio-visual surveillance system able to detect, classify and to localize acoustic events in a bank operating room is presented. Algorithms for detection and classification of abnormal acoustic events, such as screams or gunshots are introduced. Two types of detectors are employed to detect impulsive sounds and vocal activity. A Support Vector Machine (SVM) classifier is used to discern between the different classes of acoustic...
-
An Algorithm for Listing All Minimal 2-Dominating Sets of a Tree
PublicationWe provide an algorithm for listing all minimal 2-dominating sets of a tree of order n in time O(1.3248n) . This implies that every tree has at most 1.3248 n minimal 2-dominating sets. We also show that this bound is tigh.